qemu-kvm-ui-opengl-15:6.0.0-33.el8s >  H aw* z뾂aly  ;4RbǓʏi zZ$x1)OV15BpS뻼O{)@~(2`e[Q(D;|xZY>fV+y+K/'T6zɁPaė_3Om%jM3wZ 0nO)KXzPE`EqldBi?wf ;LF΅\`o `Cnr7<[Ra97d8d8450c90e744b11c37970366d89a648e43498a258bf2da9d3e5c4c3b7e84508392f968a7d16b57f89c96d73ca612a607b6bw aw* z뾂alFIe5/ M@T9VTI86m FsF\6&*{^8uK[ ow>;]vi\kˤtp=@?@d$ ( <dh  * 8 T  @\P(89<: lG;H;I;X<Y<\<,]we>|f>l>t>u>v>w?x@y@4 @d@h@n@Cqemu-kvm-ui-opengl6.0.033.el8sQEMU opengl supportThis package provides opengl support.ar9kojid-x86-01.rdu2.centos.orgXCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxx86_64+11 s8AAAar/ar/ar/ar/ar/ar:ar90ac0355a5272800d23e3ca2db12044ebd28830bc69188357b9d712418dfe52695fa1564773945325e25d60f7974ab73b2e3683abd2a97be92ad9fb1614ba5512../../../../usr/lib64/qemu-kvm/ui-opengl.so../../../../usr/lib64/qemu-kvm/ui-egl-headless.sorootrootrootrootrootrootrootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8s.src.rpmqemu-kvm-ui-openglqemu-kvm-ui-opengl(x86-64)@@@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libepoxy.so.0()(64bit)libgbm.so.1()(64bit)libpixman-1.so.0()(64bit)mesa-dri-driversmesa-libEGLmesa-libGLqemu-kvm-common(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el8s15:6.0.0-33.el8s.build-id3e62043790e3a22d03cb726c63705632f9ef013274d48f7efb11d93e04007aad0242ab9b4aaad2baui-egl-headless.soui-opengl.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/3e//usr/lib/.build-id/74//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=74d48f7efb11d93e04007aad0242ab9b4aaad2ba, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=3e62043790e3a22d03cb726c63705632f9ef0132, strippedRRRRRRRRRRRRutf-88f7fd39653b9a4fa72f24c835a8905de1f53675b3f3ef01abafea10c0cf37c45?07zXZ !#,G2$] b2u jӫ`(y-#;_t0Es κaH<6¬#\}l'l-8=vD L("PK[bLMPg㫒 |p酝5W,G0I S/eƂ5N bqg|ug>~HU8@/9dxz“0q2Tߊ>+(xW!z岉pA9JJ}G 2Q5E˳Պ4lJܳs.%7ENt2Z!pd_".G=$bUq~ó3 Y0!L/ovsφ#7F5иwg2"7,!44Ѽyp8+XcjwY456Yt'yh]ÛSg  3HeoOA{L,&̛_ x pK8:ȇ(`c+ٗP>"kc&;_À"C# ̎Ƚq4P 何bLVּF!1өKyS@LL"EJl畾ūg+))GZuf,/zD?XKWm|T?cIc%g#!'Ta(ܻXkxrr5#Y3Xj$ Ò_W䌏1ka[Mo (5%O͋FSrw\iDyKrb"X{EfrDW܍&9ՖaLZh.NyЗ&Am9Q SRpSiPbd}JwZw˽cNChs n6ĘF;H#[(,I0甮%DS-fyM*|*)Gp߬+72XE8m,s+9}s3]'KЫ ުt9QH2%Ӎu5z ZM*ߝoZJU-V杨!bJ,4I6ZMG&ƢB>Oht tTBv 3ȢިB[|r^ݰKb7":S 38Qgʒ-!+9ZPJvy/@ "%k4tI>34x1^VG[a'ɒ*I  */yo$nBBpӨI"LɇqQ󜙑mjj>]wo"ִnE/vz]P߂Dtذtn36D^BX4Mو)2P`*&kt] lju16#p -_e4kV;=7S;tw(6f&٥}@=:~` {Ju5!2)^l}^ߌgS osDRSVV$ O7pm>!q|ff&1ZJu]mI~21L9PPL4PZounPѐ4q4/~A`§YNQ-x+(NN e2}1NwvG qqeMas m\Zgw0_)@WWnWryeN־ͤ|mjKDž,qu*} D NveTlͰT9505H߾Yy>6aR6 avB ,ޛzu~u3Ah9$YC|{lQ2)C{.KշO}5h@W`h u; s|LBIHU|ەE'vz"!갘4Oưmr9{( ? iV^ZwP(Ρp2!WHG9T\{>΢CHD2PrHl5rFh :|{ +g].s4 dQ'H)Y^؟]gj}2Hoj%y;jHTu6  $GtV0hCYžN&[ߐ7=S^pQHժW@]vu %t^U/8?(MFI%. ,aW/;OfKdɛ—oY;qSPy#g9,u^PgJjxh(w Z xq"yمјAJgwZ 4!M/CP5u $oW`%(y 0e; .q`f)E(o"#@ˑ+e[ou>E:}U.y&9a&GE ]1H̵bPzj<~q*g2d_r=`ZDtJ$+ g|#O"WƠhE3~gtO='P,WRz⪋@L:~P\ ^5MFh1ﺓFW(aPCRTֈr@`1#" P1IG V_|@.XLsy^>n&@}޺\#n5*1%`ڼ,b7hw3Lݗov ɎՐ2C65UoIPhZ*w3U_̽2`rEgE2Vf\7bMs8m |LU|KhDHm85hyNeʍddo;Gx=OmsM{oGlDnWAp,]J/tA 3 }$~[oL%tOVSi't,cH(R8q E vtoI6| jdf;ru m7!MNw;[_25c~tȐ\Z]0`‚twP2y`˘?΁ oXN#&-V 67Z̔&|xX#YD-vk<ӎ78dl s&EFI4?Y4Q, #ʃ}!Ʊwﹺ(Fb [P|dI"!0ms.wwcNJCv[6s 3*{E/}^Zfߓ& M0Uƒ6!P3C np`k/膳1#9 bk DЕ1W \]߱5X;|d?]}6i'FJBh5` 8S:d>x_WDt>E'r40c4_NA5s?,l>6r:Ol&'4> R$C{C=%=<#^gaTvs#i+X Po97g =ͪO.C{iC?j FPF`9*ڮjAwpS'Z 2(XTTGxJcoK)Yx Hs=dڝV&ۈ,vBLRn\R` JsI?x ?t0SHקO}1yỊEW,W\5Sk Of8^fۻWm4~_`'" g'׺>۩*]' ,!t~0M2ard&P:Ed鏠c'ݫ2CG;^}p#@Br,AMd*Y}L0ug 37s$6ĝ#2 ͫJ9Np p+US<˙c_ӳL i,‚os6^BW3~sZ [lyuߛO.9YJ2oo ÍBaɂ}1ӣJNt$;QI- u Z)@`.WUJ4 E BVj;Mdlk^ַM]_PW|,@sxGRA)&BAZDI  !T]gL0ۯ>l0EWV0ZG7q#,j HF[E3HTJBٜ>Ӵ%\ AGc`Np(gSq۸R^Ow\aJo0>+E>@œ+?-7dGB'Iڭ܉̞F{{^9Wq8qB]|L{FvMr!FAe-kc/ %&~u`{ٔ_ɖ&t!ۦO#+C '9F#ZOА羝vɗ#c4 'nT:K0#nc3ҤdR#/<3 !uҞJ)%ƥ:AM%p0DCjr],~cJY?{CJX6x/ig; %lX8+C*Qɗ!Ԓg:e '+eҠ :7i\%:}o1.dic0W]$dk;E&_ /k"VBױm,ې.1d\Ǚ炁ý~Fif%p@A&ݚwM'#,e.qV#/+264`iT~ɡ^%t>z [ p*yB| -Sѿn@ raw2F.N΋Hr>LA^4CG0v`$.Kr`z]K30b2CQ ^$ːc3IQ@H\V\D iU=\$#'VnM9$ 1sH e̟-W &/%8z*͢Vp;C H1@"XBO&_ԠBCrW7 G9'ád.  _  YN*W[\Tr4A@+eAzKVM rtEkX74+&}¸n/?ͺ";GnK/ P6cK  MvPChZyaubsQ=,4z@gqF i_ar'<:0譁 Whd[ =&;}k$hT@LYQgh7=JdT > Ő z~KxTf_ƻGeIkjx+4 T)#jKkP(C7.iGϭiI?,:Z ]FkТ{$k}阴G%Xŏ`aጶ:H^X=lgIyC_ow;=-.<^jaGW t/I]g(ךZ AR" dUUa{V+,$p@~ie_ۻS~%XFdC?FR46VYU`4OH"cY?pbUN3_r40-&6z3' `L>@12WQ@QKe+0F4{[ aeWr(Loh1P{]xjG=8klF M !m 8t, 򳸞w?w/V[.$ή0mO^ .i6)H ~ 0pT5J @TF~4m2+;"%kxا}I7;:q7H2 LF(qM |9`k1գJ~#HķR>kX Bo.|Þ֬v%bffB5bͯTiq\b(zuӟTl34G?y2c ݣ _3YQKdy0 Cz,=ޮ^P|e`\oup.R=XVeٙIDĝ2Se !57o0>c MT r/qq_Q.__ZfGHP&9v^ů7GR(xP*Y5eʧ)}hnUpj[#wCQahߢ\iD[qnn+L%@ln@Bs5sPK9~B#nT#eE"_= r?z&5ڵ'b 8ȼqA7?252}MYw-d%aӮHQ O\zVRϚ??}Cn8)6e`| ˪Wk,lQ%"o~gQ=QD0aYѺ,%J7rQνlt9W0t\Iޟ)zwQV_$VEk^Qٜ? ]Th3L\d\ (զ)B2Pa>O0bO4 *%`bR#$DAP׉Sjӄ#P$iy ^˫gzc؍>Oq4EnxDQjj^5g#m0ꐫ%ct:\7hm[ɧ@FSM(HxzW+(>0: p*ٿli/κf.SG\ #[ɘ _w-!$T0o\FS`t$@Y]6;i=Elb['4eEY$Sk9w%Ga[ʅUWjn%t`IUYb/O0;@`F_}F\ºTMK1].$(- *B J.Gb㍔n3lOϤiz<-(7XOc]'+`(̻+Ԅn2M1aż ݹ ʸGJh(VDz g#}(C_b,MO}\L_O4Sv\J$"ݬ_-ݣJԩȸD~ c$mҶ1xq+$LnWC}@RX26-eGP3C퐟ˣmzK^ Z' K#W:fiSS-MucT` D] >E<%o0>=Jݱ2n_NZhG%<~d8A-mF`8=RR<4b0kYv o٢ޕy̸ kt+%h(K]zC!U1IbɁBEW4b X!F)#䢒Z4*Jyq'1S_t=JPȚfH|Gy-n{DS%#O9v&+?R_x,ۉvHV$uL }×bGǧH(}J^'q-#l*|&t`0N&&rN(a {WNs"'l!savT0 Y*)Cgj}p4\Z[>Zbl.x)b+>>g̈Ѣr13đsQ듧,L/sdRB4@+onF\^NQb7w|),VIFtlGVX.< 9~Pe.略MKTmaϮܨYܒ v70q3,2m`)4ps3F =ܺb\p/"/ʔĬ)4::ieՕ]Ih6*98͔xCɜ<{CeEmz'!UO,UL;/)>9~!cZNin䠖 oK%?uۮдHn""N}{ G= q9yK  z7揜|n}L dKp=#ƨ 롿JS  %( CQU|1\{+6H5Œ9Mh12a)1r^O;WtK|'A4xukW >L%5)79te ѐ7~ovF;S:l9 ѕj/'fcC>}s IS@ gu(Vs ǖ>J\4kqi[ߨ:r!9&&9+~o(lm?fW7uZM7y(S'i"umbM+j ׁ[Z+ٿ7B2)F|T!}*C{BivNZ(:P&;(^(%䚂y6HjK9WR%sD#6\;ԃwUvmuu.[{yxφRx/Yl+o`]ܯs*)Elsta15. XIIjw }hNMTzC} A4/[EKA9[0S*Ml$|%n6N6_zS#B H# 40Җ Ax(w/xCcQy8Tp,У)!_սn~Us5 R&s5ŚjEtz>iddá|8RH] a\5U#H89(d15F27J{*>[C^9?3u h~.-3(j3b!ad(ぬ+XзlG=&Q.oG !O P&;=@Wu z7Ep Oy!d~rf4{Mwiy{>pJڏLm~}9<];2OßNO r}B.vzUzW8_ &}UahYznߢϹߎx/&uRAy؏%ܗ 6JX+ښ)&䯹"lBhls6K 8$yX˕_av.5S&DK!6VF 7Vk"D$_S;S,A |T2]J 浻|Oل(6yY>9XK":řlel L8skB_.S&+ ެH#1lSc:s'oHFI*6簄W7w/%sGU+nmt˳گ hd1'/ 4ؿ7v'NۮGZN5 $˻x)Ly$`CBqUc̊D(ݓ3f6xl }0 s g ;+# <:,J4J6ʂL =V?d'H^ YZ