qemu-kvm-block-iscsi-15:6.0.0-33.el8 >  H a z뾂al vPmCmʄw:rX;˒Vdd PC&jt~{x5)RoZW%WP\91Fh *!dNr{t.l=/)ۿs) Z:v:9*³~T`߆:c4r\to! j̘LR)}Ӎ+!M.8,jœnXs"̤ξ+g[&?5%t4 %Tb,*:K9ba807b4d83cd732afbed2054aeeb6d1c1e2990dc3fe1d679748765b9ff3b1410de897b1b1fcc3b67dd69985db7b6bd119be3b2a\a z뾂al bQ++'ųnc}k:;Rb{5ͥjJp=>?>d$ ( @  "4IOXh p x   $8XhD(y89:G;LH;\I;lX;pY;x\;];^;b<5d=ae=ff=il=kt=u=v=w>Dx>Ty>d >>>>Cqemu-kvm-block-iscsi6.0.033.el8QEMU iSCSI block driverThis package provides the additional iSCSI block driver for QEMU. Install this package if you want to access iSCSI volumes.a^aarch64-03.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxaarch64-AAa]a]a]aY8b99c6a1c7881c3f91d3421ac4f13f41fc4a74ade275591555e3ed507b43d98a../../../../usr/lib64/qemu-kvm/block-iscsi.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8.src.rpmqemu-kvm-block-iscsiqemu-kvm-block-iscsi(aarch-64)@@@@@@@@    @ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.3.1)(64bit)libiscsi.so.8()(64bit)qemu-kvm-common(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el83.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el815:6.0.0-33.el8.build-id8a94ba2812d03cc57ad15d03dd3a09a8b3eed37ablock-iscsi.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/8a//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=8a94ba2812d03cc57ad15d03dd3a09a8b3eed37a, stripped RRRRRRRRR utf-80528aab0589a51198fc62747f196dc07a3eb5676e7a8a4959d5f34d7e2d89b10?07zXZ !#,A:] b2u jӫ`(y-$%C,wvLnMeƇ.m؇t펖U"_m%GAC60 υհD.KB[1 QOpSBH>޽y_; 17o*'۱EF0 {SyvY1RDQO@7po\jʼ #Vse?r]TdGVADʘ&i OQN ̝5)$kD<#OM.F| >u}_Z%~z)k{NJwinDrFc'DiW3vᕼE'pGu,nt}c@f!(wk)[dOeQm=k[ue&)Y#zGRlwHG5p)yL؁qN%Y?nԕDMf̍m/'r1h&wFځ v]JrKI1뼌CR+3(dAdhoAZloȩa/N ۇMZӐ^UW.j$nʪf2`gtQ`gOFA$0PKɃS@҂Dsrd_F3m?RBrrFaICqɠP Ƭ/:T /t]4v^UګiA"Й;_푈xFS4NVLYB9Ծ\JL7R`i=x0A-PΩۑ{AV8^58 JYkr V<|0nSJy٨q hOPur -Ųh(-+YYJ,La_r@30t[9} f`(9Q IRzB016Z[J ZA>47ad/J!bt3ifBs-G۳^'tiR@ ^<ץwvʛD1q]k};Xejsד(TEf52hȟlVbtbij doBB!y-pc B *A})OߥILaOeÁfFl p ^PLafdT ZpdlwODutXf?S  p&-go6]wx%.gSB6ka~p-v==/8G^Lg5ֆw'x墮 ^!4hN`ƙGs L鞭E]Fu7m"%?"kwy/ y6icRNĜ\t W@cS(.鿌zKNp1JªhL\> oV'OK*hu4OImn+,t~iG.a*~;HUQDaoGMBKDv}.7H28+uS6كOhm0G&+3OeC>{U*cCSߊ BPwyl* _-8֐K|NKJn;v30V) 1LGŧ7}oAv7Zz_K%w2͏9jJ]o겲Pk?KC%ղF|>{E]ݮ\JC'?v볢hM&L2p4kM,!RuciFKˀFZ^A,M o7.M}^ <'es Qpl- @s/8HJc B{(xcoF7^}غ F~Jl@3bN4GׯEI%3ZK8b_+ 4N|MRN]6a:K!oPA뫩uVKgŇVDMCxPn ׅ{q M: ӴB8.͘K{a*G,Tr׭zP0ffMh+kx-+8ىMn2#X_.Z t@|ǹH5b,u`O`Ce 2IYl#`~i#^8 PiW]E$qAe!iՊS3ٿUG&ӣP_gP ]Ҏs}|3VKNXDmՇLW, !!E_-n! S9d("3zlەs'/Lǧ!v*^ 2m4ɁZh7ajzI:Mrբ.J q^ɺ^Dz k T!{NJ_nؓp!P:2ADEB;J[T3103b«q-ͯcc34IR+w< [.!;Y n Պj̢$[fH ).NcnYJz(#$2ȕ9ⅆf̨שf+@Z8|Z^AIF\5B_-H+:eIXPM@0 CqbZqNuj)\8!=Jw0p: 'C.2Bs궆Q=Ȳ N?R.&bƀO;Vڑ#5)WDˌ#*b`CdfٍKcQj`#EJBػ |h=Vs#ѓlLnH`#  \AW;E;*vH-*D Gu:0*P Dmy+aH_!EޭfW`;w!^bOUMwG<۟;{'OϬ*"D! 0{P ft],A,$Az^䴻4+>ѷඪX=Č`CcY "Zq썚kFP Rasd5aa~<,p=_C<긓g%kXio$C8$j6Vқ櫍\׷)\do- {<+J_  괫8{G $>\&8.'"%H_@z "#4 t{u45hu_+ӯ[2K6[S-{6 :సfZ~)SJ,Z2q~-,9\ 1,r3H^X2 y |vsH;\h8m|TL"Etjڢ KncԩWB$ۮw[Jņ vT <Ѕ _obbҋJLнЧ9x'RV ^`>]/-Kޒ/[n'Lޯ ?Szx5*GfzYeԡff)DnإBlK{Q'0ZTp͏[\c-j*&؁Ed% R{ 'I zQ% +b|HY΀odRBNdW ]x&?!͊~.!mD%V9uAb4\,R{<7,v۪kΤ $1'^u 3t5a{rGUq-_Rҿ`NDp0\Iȁ2T~F晏 ݴqS5G^99,76aK_.Ûx_[9k1%?gDbCTCah W?)hNYѩĄi%Q^H!(E{ X"E5tl Wz?/y7sD.̪M' I:/6b:H1ɆBJ DFiҼ(I>9VUŵGW"?~VrtyDMXPe~QBF5Y0wEPë&rRKp/*E=K(2H( /Okg %B_ie]f ;B˰3 f !>h]Mb"t%v"cG⶟XO}=z7Y/Rkm *tB Qa'CXvڡ+.aCui([Mw&e 2[LOM,9R]kkZVVb%Snmc~l;#D ;87 +94>L~~탈-!H9o+ƻ;1oYN#f+eo/ dN樶i;>8tSլms$! t@y#HׄoԆCk2No^|>DwvPa^:#@״^$JgYݕlf4.?Js2 74ʧ|,xVKNc}TMVưJ$KȁbMTn2VH/]8@w`G`M4'']t;L>[`lNm&3^].l yrKaM^)΀ي]eq| J,ŽҴ- XeOھ` Ktv (L-%our||`xe"ۄC&!ЬҴ^I!z$3!"%/?ʤ:a\0$woX~sOq3rӕש.ON5&f˒ z뎨H3S0fh>lKQ *j3G)6/<w8Vq*4{N?6MЯ" ϟ,HEr6"AG]9B]#W@89apO?]L'e\OC[۲ؙw9ua\ Z jmk._u^AGʡ,xwl0uިAT+"4J`z9|`;#/g^ 'KI5W~@elG5ȱ{}af(SDI_:ƻ:)[!=@+GR9uGd9SL O:7״jI N:F@3oL[8\溧? ӹf0&ƤUmJU@z)`"gn̓43VQ(:fXC}nKVⅢ1k{{HJ |D˒)|EX 10߈4Z[;G-ZP?[ˁC"wھwnckpM Y8| H~ɦ!D>33߃6|[[N jO/ux tceaG3Ha30Yp-A N;"S\zĝdՅM+*M;&3axFeO+ UuƩ!3Ž'BΟ\7ӎ|#mkfuLr3~UzbV}ZyyN2J,F9~qڋ<"^uk):i#2N7nE'0$jv>lPeȩ&maU4j~q& y63;6CE/ &.;ux~K`Emh X`lyZK+68? }4 =l ͊ \SpW+|: OU'k,ݤ1.3=,BkEn G`q^ _cPLiXNaPv~vG ail n,q(f] N&kɍ/ST@E,+!kA3(3gUDÕ;95ٷ+Ic]%$z^kёlР?ն$}@jy}dcYӻ %L1- oYl1!G= H-I\t֬to缃L&HA.)$ ~/+ 1 !ފ}"0p4M?8A뗡;uZT؜a hhLZ6X=]W"%~ L#3WĿ' q+]^&֕mCjPX=Q\dXz & mY ߕ9l8 ԐfYDZ:Noy,$mo66={jB[AM8b?&Fm52(*tIÈŋӃ1 1\/ &M&mpUep !2nrS&p2<0.W~nx-Rup~ Ehh4tn_Dž8*<aK5$Bܫ3]|1S, Gn|!>9[?C梁ɁgLi;OWI@_, I/6X<#Ef7tO}6m]{mgXaM8J'9ISuG Cio5KV4FO|.,cV7ʸgzn^wt"_sV8A5] Q=|&F9 zٜnVa ב_%.eF^iZJaѨt"J4 t' ëWRLoy@K.AF.aMg$ÒUE'/]1ya-@;\v-_3Y^,4& fgAQդm,#U'uXrW9q$BβZEl,Os}wO. 70O>n/H˽d;0*^tY#BH|%hN)GEo TG2 į CEƞؼ4>}kh3ۦGR1{a.ݕݞX ׯyy$dn LD9lN\<"<KN&TPY0t=-b,b9eVϨEcsI ݈)=,=fo'FeYNAKER"9R47c!p-ϰ ^j^Z=JL_?ޱ˥'imdNڳ A^\GP݃n#NjeÍsNuYzl:?(9/%r 1-%2~ 9zĘ\Rzn)_ ;PV3`q RTMh|jt"x@ q`+);N0C?~c>U611fLx{rrX> iO) ֭F\W?%-Z:NB "S?:-2~ד]ZUK=ATQZx- P,FMةUމMj"Khoi+SB-(# ڪ ̾ _ !y^;h/ /)I+… 2r;yU)ЉL0~bf;93BZ%Ѐ-cfsr12gVI_Iq>i.^w%'׷ 5j8`ȣ'ܫ"<حm^y]yMu#~ıtS/cH] ?*Z G@g/ !PhVXm՞i SA!'򚎘}CְfQ8{O%7^ln^Lm*hx.wk/c> P<ߚKIߧ/˹[ !+eDG-^0uW-RNf q2FFcQPg-i#I泜4xtMʣ5} :sCNm\zKR}lYAV}|gb97ǣy |EL1 725mgK_0 }nQ ,pk=*Vƛ9%vBf+o $qlc TX(&w\n*jw9u 3PZ=7UR}XUX>4)+'B.RZLt%H<|zci0i6l;풌V"2SFiХyKbnXpK|F- H;h 6u6l!!)-%K/HלKibVu*heiJ^.xe S[|h7EL>$a].85Ō–v8X(qM-R2EwQSrxbH,Uajd!˰Ȍ*x_ j³Rҍ =P=8xb|%HtcKN .K1_YR1hłcVW9̓94%;kLḷÃDNo#Kf ]fĴ:$̆Yd"fPwn8i >qR t'A]hKX>.`%ǹ{hFZ785^ݹ%N9/{}Y">ю&ጳzVCD99 @*T h0)ږ+ٌKT{Ћ6+'==ɲ|=jKq7]-K-Z9r͆dN$>Nr:i;fgS5pWt<6( iʜγMNŬZT)aH>qBa% FrRE[#PrAcad S}qJPnD;yuTc*ҾB\y{]}2:FeU腓x\>"ƙ~ 졌1 h TZW^z񄬘<2u 4(#ǍqRP` >ÜD{loXS7)="jEHm RveRX}ViCiёY37 +c̄QNhYS;r!癷Ķ V>>X;sH1Zgn.r<=RkU ٣)Õ>߿ē R~q#6euEuoA!ΞM`.Prr49TMj%/Flm^a"x 0c_r)f U}V$< \_//2glm sNA2sƚMOa_̔jQfD{YHjݶ e%HE i&52J'ٰ'OTqtT$ S[3Ez븐!@Zלey 9n5\Y,[an\hŰ)Ŭh' SsKȒbI<LHe"̌-)Vq=' DCs^|0{/{8wbd5MNWuJbhP`7e4K#T075x{4˕+2iR4<^ >/{h$e|Ȁg +/WX}H/_ƕwZpd<҆DovV>j"̟ldX~=A/kB%S IXy XUU'd(x Ը0Ytej^or1+'p0N[+J^{/S{"6ՎM@(0;yv|~ ԡ_ K(3's1Cqs+=Ȩ7LD @^[%˺VT*YQ!K0Yҫ٬ f_(ꏶ`OE`|0D:t$`Mх˛zC \erfy5d&#k\_05m<^{| BI:w{6d`F(l+e+rY =L)%=>{lDqvʰAdשnf])][nTjmF0Tq$/mT0FnoBG^q#(d~%H_]ԄB+vJgT/Oiǧd|XNFb€t>|Lӡ>fp!fdP \դxŗnV~'ߙmŒ:Nぃ+ggKQ9+!|qdV3ɥ|L W@/wN]ga$F&,I H` B[ubkKla"rӸr}_scjΏ.Zh_RB- %TDׇv!! HDdq]?/\;O̭8߾% tȧWGbS _1 38K_ߖE7>4yB_ĿI8JN%*nrɫ2轚]kI#t}4@ndƂv n@TMn"٭>p7.XѺ9^}lSڗ&9 AՙR}d6P$~3 ktJ ۗk8;"ǹo80~ݜ[ֆǩG#A Ҿ_Cya?3tұ+#7@'9)nLw+2Z3SZ$6NCdõ֣p3Cn;A '!3Ey͗/Iar&ׇB,h:k 1]gYvˋb"7U-- k㩈A_>bIO[ %;Yd*xc=Mwh'NH:_ﴋ.uRm1Zb$q(\G:W: K@kK69ΰ+hNCɊ_Khi/ϲюB%x[M>r*u4 ib)r$.e`|(@l(! sCxmmlt-G "-CCJCtT6rEoJS↏\qKmhvC@Ve?5rw=s8FS`~G;@Fg94!a9 mV&Gp,#B~F;T-_3f%Foik6+Aa\1v%@pxNecWNN,'ӂ>1H\\űU-$bC2h;}!PO[*<'T3J] YZ