qemu-kvm-block-rbd-15:6.0.0-33.el8s >  H awN z뾂ala2;o/T֜>:Rؙ'=GWd~}fP0JI=QkS i܂F-Ȯ~2&O&#b#ΦaHDwv4a2~=׆,ބL_Hf5.P*%!$?`l(* w/LIJzM*N-MͿ@Sy\8[HAEu> |k&FX5qm57Okvݺ58526484d2d0840e28c50dd7ddab0781d24cb4e492f05d14ba118ee43273e1c6c90951ea03b1aee08a11b608a2f0b06d73651761oawM z뾂al BC&O<='%3gA&.f[3, DRa!ͭ8Sɚ Wc)on)t֕v~Xp"e@-D:{ a.q8b*{E7,wfr6w +"XfWҨ?tRbW `TONnZKa1R)FARG/?}n& īeX"Mn0&FFp=>?>d$ ( C1 FXms|      0DXx   (8$9l:G:H;I;X;Y;\;@];P^;b;d=+e=0f=3l=5t=Pu=`v=pw>x>y>(>@>D>J>Cqemu-kvm-block-rbd6.0.033.el8sQEMU Ceph/RBD block driverThis package provides the additional Ceph/RBD block driver for QEMU. Install this package if you want to access remote Ceph volumes using the rbd protocol.ar9kojid-x86-01.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxx86_64+AAar/ar/ar/ar966928386f40844b34d9179223da0c9c5f9eba2c715b078b6ef198d8ac270a163../../../../usr/lib64/qemu-kvm/block-rbd.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8s.src.rpmqemu-kvm-block-rbdqemu-kvm-block-rbd(x86-64)@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)librados.so.2()(64bit)librbd.so.1()(64bit)qemu-kvm-common(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el8s15:6.0.0-33.el8s.build-ide3150afbf1ecbe296cd6029a1cebc48c9ccc8cb4block-rbd.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/e3//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=e3150afbf1ecbe296cd6029a1cebc48c9ccc8cb4, strippedRRRRRR utf-88d39eee630886ece9e108561f9ec797e2dd2c7bf557b2b50ef3dc4c31c6ec640?07zXZ !#,,] b2u jӫ`(y-#;_t0Es κaH<6¬#\}m;k32j{aWMQz}  v)Ǫ4:nB=нG$ Gw5Uk$hCbeca]D} eZDzpdMe{%sLM6xL jpqOz[ B673U da#bG P] 6xB/3ʹ= ? (6j6!KbBXԯfBy@H nDo :|Ж0`S nI d?BIZ_ *ܮ$~P[WHВ-3 ŋ򞑥6MO5 C̑wp(Vֲ$[| k"2eaJ-wQ2c(ek*ƪ[z|?` ҰATzr?&Xc*)^s2G~u-,kVj b`5te20!u&'paT )=p;(|q s. 5W,AdH,5~#otΔW ,/} Jt6 z1] v+ǍŌ-G3h5Ip*+55.O9 sz | nUF:=w% z=0!fR82V_9PXMT3Eׄ=5@ޭA9pA=yrqm,k/ސ+iIiu1W>?FkZɩ!,_ُ&ĄIi=l6~9O(~9|9k5su>Ī 9 7$8 %G\h@ lV2(/dkYlb?^Ĥ {/$g в/ ߷`o Q[?o!ThYU㟼/q+uߘdZ8(ĥTzWÑ\_#} ^]OVAu_Z1tC ^Y뒷 ;R!n&pv;zJ'4clt%z% mks- n^&6?v5DlPjǾ Aidrc-OT -XMGl*Ƒ8p8K&: yg麝\J}LOtA,`wDph֑r6ϝumTVa-oϏogUcץ9V14&uzŰEi~`e踻HЉ_5 fcN ,8U=;;쪆sɰl%57/;Y֞bbwfQp&~ ̸ck*;8YXA"l; բ]b[WcYIPxuˍTv],H>klk\}$ 1d޺hy/›|mB{LFWz&DZ=qMWC`Zx"MJ`ͺ(Z%Z( WkľHUG*-Zo sQ 2բu ?PrvbuBh#OjtR}-tS_YZ̖ 5 5;$W0O.H;blqN؏X/;VnI[GDOz?Mg@ϊHn l+wwTIJgvƼmdo MZ9:f ۀB>r,ɖgUiSAYH}X~6^ pYGW8sik]t8wRf`+^MRcFu~)p̗@ Gx݁p?-UztΝ⼉}UZ0VG4ɬ@i;}aM+8oq&O ~>wN5&ƌ7,.uՙt҆XAE6 yDiCe )LmVsIjB!(x|U"exjxENa&Xl0Kɞo*w$RūRU#:2T֧("XALE]nF(,,S%X98@h%CKsD8S4 KH-Eħ~,AAp|04iA)mޯ/',M=5md/_"Q99 5zsԻ5un:q#|uHEgtq pL7C`HOByF$8 &^Rj9y8iч`n} xZs'JS+59$(AYsk661hefR,7 ~HosT"n(=kyXRߊ4Ae~#(]1þ9Jdlg-4E9+ 7&rJCU~H+>|<Pβi03;dؒNV?WHoN]):\V3ިZJ.|*Jl͆Bt_0`a&w o uko?\:zrCBbr9V(ѐ쿄Hf2ˊ "h; KFI]l>r>33Ot|;c=}" =F)*&Ì`Iͳ;xdxUZ?uhzsQfǦK;'KK=f܂,l|O$tZNFm 43\v0b G^]j,.0wnUXwUٶ_QO:B*nSfNq/ M ?Z ڿuFutsmV S}xkȬxŠKhb9^icl^m^A}[GUJ_|"em e]ȶ//:39Hgi՛de?>Df]8ݱAHL.nL'3&F۵MJB<>rB DԍǪ.j_(1R6Mab} -@;^3WM>w;Q$;q`R%)D^҂affCρۡC'腋5.3?p :t& $Mb*!o8uL6֭TBwY3]p|ċ.73Al;b S«=$脵!z`|ۍJ94j:4W|<42Sf<UüGه4dCUZ5/5)NXk0 8n#mؽm|J9g59(ùG<N$8J81^aoY$`>Q;jQ]'r.ɒ]hU^`ȧCBgn&D:X ;7]R4b(qy(bs#CT0li6BTi_J>iYPGo&J ʢ潭]^=ڽe &{ZE U0~(j-XDBPG\G!",oA@\z62TI 8aCx&(:A+Qky*1 L U$(0 3P^zb{T%1op+ѣh91mqsVi2Ί6]܏*Ig/;*lo˘# 59R2X2j cq"ؠgSqD07CDa3ز(]qɏI^e]OHÓ?oGD~:NAxJB ʶO_Mf6ͩM˥SFge,fvVda>q~WKA/TX'H X',)ɜE8dUb*Woyambq^/>i.-DJ ԨJW]Vu eybmߪ k&HgQ7b-T2f ggpas؃mR;\.)kϒlE>eޱNX:c^R) 鷹T{n =gdqiѨ~}jY8W>tw]ius( G Q !;\pUTM[pms٬gĪevU" z*@ب fik?g×+ޟ֩&>"=o:#9 iuYAL \ \6䫇 i\3̛lê_@H ہ:@Yd?@`%0JgQrnvy/;dzVםd!uljH3>#eTQ鯢դ`׺S(1mꆡڌJ$𨨰gQ`- ]zXC)^ZW;S6QN:\}ӹDbjJ Ő[qG`4N.Upŋa/%ΠN}_"]=A0s,ƣ$hpc")DRb^SzB-nύz5 I3nv_b'0ѥEu=Kl.0%qL0 !5>xCt&]sϔaKZX0v%h]:76D_oB;?WѕbX>3{U^ޗ !n*IQwB|'~ЮE%(#(4 %WBݪ[D^f=Aj;Gqps"bnCMj YLU@@QWY@*rļ ?9[5\N #C}OMi,f@LzO}5'=מYU>ȳ uV8:nK86r+ڗA*_zfB\h]9bt(43Y_OK܃棦Iv/\l 7 ~2@>E4 Ŀz,Z?(ݏҶN 4WPO"?$? *s$52;µ![Y&R+[> hzVu̠AG&s)?~9,0Ps+{bE-RMXe>AMvc:.(#Ubo/7&~7Qɦ*nPD7 j)o=6J_A{ziܖ58VP~ FE6؜0 u3e4L_ X;Χ0g*[h( S(YBh2.5YdQ.hAa E18*<a/уrXȁn1Rpc{rGAiͩSJ;IG.s= rLkb{ԟ}<#{9k]mYY?}Mt4)mU SG>R7%|X)xK7S+?78^>+yz΄cN:5 EhWrF]m nzeJRvLDDysB4T噊)mq[=ruxnJ-zĝ x&cӕ+WE#t< K8 Z|x5p,Fe< { ]l)H8KMxXȽ g j @l!VڶL2SkFgw y~SFlv[ _ 6epa%o j ' >bvZ*le7i7sl.J-n{^Rf~DYNOs7&t˗E* ^B ?7"g!^ 3٬uxi"3gêsisUXƘfbyp4B"2LiBgS[Vb/qK$5t`n_^,k1[X>Yr_KidVX+VΆ6QfUՖE>wW s]$ǰl]SerGz\EIHg_JDDT!HUTj;Av]K7M!gγպW󻕧0C#«W`dԖnr@ӝɠxSfy7_WCCxbiYR39hfi1yl7Cd2#nZ|R_Ԣ8\^ݡyq,/LAzy)xG>3'Iv% "|M6*#9#ܧWW$)}Z$=ݶp;`ڶr<ߋ^$a. KeY\ ȃ3 𞸟=!N:B=<1"d䵿2w0pQ6j !$|GE٦-i\e|-o+u~.脥zW=Ou_8cC!WdW#QF=*.׺GwV2lQVm_v^dz\ ݭWy ܻ~gpƅ-=, XѢ{R(qGՠRxlV*jUb^| CD|K 7X9{Uu;B~ "򼫊q[O 7ʣ4~YWʙv$z*4ǥT'( m8쁣Vfuē܍o!=-;R,W- [6Mh_OтR^'8uq{I`D(!r`U2IsO'V R["($XaH3rw[2%esPV种OxFIkY@׸ZfB]Nd5,.C4FN.Wdq:[+\DYĦNpߊ?2Ju}OdHي ƌ$ d+ڙ`ߏ?ew/f]%c=Q t= 8S1Jd AM1LM782EpOuiU;a&ѹ#p%ME!{1AAV:SGЕan$v~ɋ"WE>ಅug벶s\܊ᵸw/ 'gMv i~*o|v˛4Mi9-|nx# PU[j َ})(.\`57t D>vD|;YD:+},W+HM]kn1't)mK,z1y7ӿU|I%.1AFD)Zg8~|#u'h ~ r'hkڬ=/Zt+Υz3E '%u  &ZcFv pbUtK=_@<`^i<kk/ck`l4_gc:zbc N@@4 m0t@b6*_a:3wzsydm!Ey߿d,4W&a[E(дf9k}-]7(Jծ슓adYEį5K|Zċk9s& 2E)ȃ|lA&#"ՏwɲPG$efO8?*;Ԕ&ZWrd xsJ:0 M$}j+oI66A8e7ӵnly ,KЂB']\%]&ef"|De:鯳E䨎5PDQe_RQSZXҚtQY6Fl*t QPLkF4Mut\8y,Cu8:O4j'| lY۶5`8l RJMs#oQDh_P m9(ڴD7 S)Do 5Z=|H's@3#&=0! C]~ĞKK`RajZێ|Jxwkg凝a??J#i}$6کaЂh,iJ4tT[{c<e_Ng u68xYH^Y7Or1&5!>,;3-STǿ&#iw;EF^o^J`2D!vZ.?+,TR"ԝֵ-%"C2x U3@gDPY`^tn6&rTЀ!5%/.V#J E%/`&=E`fg?+0%M"ϜZx ^z$+=LK{0H7O(^R 5TG({ s*PEm;uʰ+Ѫcʊ#e^ #Zj GR v]^0ؓb _ +c鶈/XmDHo' qgh[UM0Q oe%[r;{XƱhP~%K>5|vX녭L%rv t@ u) vHyaحΫcyH%_#ۇFO?nJ'Z] :gfMRom )$g-Dž5O7?NKaP ڪɱ/[A K$D!)7 y t}a՜ ^kF^fAeB|]͎_g 7^@qas!b>l} vzY?-=XDçܛj'*Is#jdIHV<]?~'A5ad}K\sy_+C0<ҔMR t]GZ,# .y{_j"bzEq*!:)D-OlL 2? !0@Rg%;42 $Il /~JQ;yYDJ)KևŎRû&\a{?5 zگe{%ʽg,sMoGU5GM>rԳ#Fz}^ըLmM[v鲗 |u5٠oŋȞ< |bF]?~|?