libbpf1-1.1.0-150500.3.3.1<>,sfL`p9|?+wX`2(_h0}^EO,c$KUȪm;IҮqYd}O,c1; ]ȟcE&r^4UyA"N~N\.2amIzo>i E+X}eD).Y?=ߒsߣlsJ+]mL1?t3nIz1Vk$g~2NtylDwk\3 , X9ژp31Y&u]>@=?=d   K ;AHP T X `  (89(: >9V@9eF9tG9H9I9X9Y9\:0]:8^:Tb:`c; d;e;f;l;u;v;wLGPL-2.1-onlyhttps://www.suse.com/Unspecifiedhttps://github.com/libbpf/libbpflinuxs390xfL`fL`b12c4277a392c0bfdc1df92e5f3f65bc31fa325cc5ad88b183a985cb21245d1elibbpf.so.1.1.0rootrootrootrootlibbpf-1.1.0-150500.3.3.1.src.rpmlibbpf.so.1()(64bit)libbpf.so.1(LIBBPF_0.0.1)(64bit)libbpf.so.1(LIBBPF_0.0.2)(64bit)libbpf.so.1(LIBBPF_0.0.3)(64bit)libbpf.so.1(LIBBPF_0.0.4)(64bit)libbpf.so.1(LIBBPF_0.0.5)(64bit)libbpf.so.1(LIBBPF_0.0.6)(64bit)libbpf.so.1(LIBBPF_0.0.7)(64bit)libbpf.so.1(LIBBPF_0.0.8)(64bit)libbpf.so.1(LIBBPF_0.0.9)(64bit)libbpf.so.1(LIBBPF_0.1.0)(64bit)libbpf.so.1(LIBBPF_0.2.0)(64bit)libbpf.so.1(LIBBPF_0.3.0)(64bit)libbpf.so.1(LIBBPF_0.4.0)(64bit)libbpf.so.1(LIBBPF_0.5.0)(64bit)libbpf.so.1(LIBBPF_0.6.0)(64bit)libbpf.so.1(LIBBPF_0.7.0)(64bit)libbpf.so.1(LIBBPF_0.8.0)(64bit)libbpf.so.1(LIBBPF_1.0.0)(64bit)libbpf.so.1(LIBBPF_1.1.0)(64bit)libbpf1libbpf1(s390-64)@@@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.22)(64bit)libc.so.6(GLIBC_2.28)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libc.so.6(GLIBC_2.9)(64bit)libelf.so.1()(64bit)libelf.so.1(ELFUTILS_1.0)(64bit)libelf.so.1(ELFUTILS_1.3)(64bit)libelf.so.1(ELFUTILS_1.5)(64bit)libelf.so.1(ELFUTILS_1.6)(64bit)libz.so.1()(64bit)libz.so.1(ZLIB_1.2.3.3)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3fLccFcjDc< @bc@b1@b)@b%b!@aaQ@a(a@a@`@^(@^6^r]?shung-hsi.yu@suse.comshung-hsi.yu@suse.comdmueller@suse.comshung-hsi.yu@suse.comdmueller@suse.comgmbr3@opensuse.orgshung-hsi.yu@suse.comjeffm@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.deshung-hsi.yu@suse.commsuchanek@suse.commsuchanek@suse.comgmbr3@opensuse.orgmsuchanek@suse.commrostecki@suse.commrostecki@opensuse.orgtchvatal@suse.commrostecki@opensuse.org- Fix null pointer dereference in bpf_object__collect_prog_relos() (bsc#1221101) * Add libbpf-Fix-NULL-pointer-dereference-in-bpf_object__c.patch- Remove requirement of linux-glibc-devel >= 5.16 for devel package- update to v1.1.0: User space-side features and APIs: * user-space ring buffer (BPF_MAP_TYPE_USER_RINGBUF) support; * new documentation page listing all recognized SEC() definitions; * BTF dedup improvements: * unambiguous fwd declaration resolution for structs and unions; * better handling of some corner cases with identical structs and arrays; * mixed enum and enum64 forward declaration resolution logic; * bpf_{link,btf,pro,mapg}_get_fd_by_id_opts() and bpf_get_fd_by_id_opts() APIs; * libbpf supports loading raw BTF for BPF CO-RE from known search paths; * support for new cgroup local storage (BPF_MAP_TYPE_CGRP_STORAGE); * libbpf will only add BPF_F_MMAPABLE flag for data maps with global (i.e., non-static) vars; * latest Linux UAPI headers with lots of changes synced into include/uapi/linux. BPF-side features and APIs; * BPF_PROG2() macro added that supports struct-by-value arguments; * new BPF helpers: * bpf_user_ringbuf_drain(); * cgrp_storage_get() and cgrp_storage_delete(). Bug fixes * better handling of padding corner cases; * btf__align_of() determines packed structs better now; * improved handling of enums of non-standard sizes; * USDT spec parsing improvements; * overflow handling fixes for ringbufs; * Makefile fixes to support cross-compilation for 32-bit targets; * fix crash if SEC("freplace") programs don't have attach_prog_fd set; * better handling of file existence checks when running as non-root with enhanced capabilities; * a bunch of small fixes: * ELF handling improvements; * fix memory leak in USDT argument parsing logic; * fix NULL dereferences in few corner cases; * improved netlink attribute iteration handling. - drop libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch, libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch, libbpf-Fix-memory-leak-in-parse_usdt_arg.patch libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch (upstream)- Fix out-of-bound heap write (boo#1194248 boo#1194249 CVE-2021-45940 CVE-2021-45941) + libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch - Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534) + libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch - Fix memory leak in parse_usdt_arg() (boo#1204393 CVE-2022-3533) + libbpf-Fix-memory-leak-in-parse_usdt_arg.patch - Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606) + libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch- update to 1.0.1: * fix inadvertently changed struct bpf_object_open_opts memory layout; * fix btf.h header relying on struct enum64 type defined in kernel UAPI headers; * fix NULL pointer exception in API btf_dump__dump_type_data; * remove struct btf_map_def accidentally left in bpf_helpers.h header. * All deprecated APIs and features removed! * support for syscall-specific kprobe/kretprobe (SEC("ksyscall/") and SEC("kretsyscall/")); * support for sleepable uprobe BPF programs (SEC("uprobe.s")); * support for per-cgroup LSM BPF programs (SEC("lsm_cgroup")); * support for new BPF CO-RE relocation TYPE_MATCHES; * bpf_prog_load() and bpf_map_create() are now smarter about handling program and map name on old kernels (it will be ignored if kernel doesn't support names); * BTF_KIND_ENUM64 support; * increase tracing attachment (kprobe/uprobe/tracepoint) robustness by using tracefs or debugfs, whichever is mounted; * new APIs for converting BPF enums to their string representation: * libbpf_bpf_prog_type_str(); * libbpf_bpf_map_type_str(); * libbpf_bpf_link_type_str(); * libbpf_bpf_attach_type_str(); * bpf_program__set_autoattach() and bpf_program__autoattach() to allow opting out from auto-attaching of BPF program by BPF skeleton; * perf_buffer__buffer() API to give access to underlying per-CPU buffer for BPF ringbuf; * bpf_obj_get_opts() API for more flexible fetching of BPF kernel objects' information. - see https://github.com/libbpf/libbpf/releases/tag/v1.0.0 for detailed changelog- Update to release 0.8.1: * make shared xsk creation network namespace aware- Update to release 0.8.0 * New features and APIs: - support auto-resolution of binaries and shared libraries from PATH, if necessary; - support attaching by function names (only by IP was supported before); - support attaching to USDTs (SEC("usdt/...") and bpf_program__attach_usdt()) with initially supported architectures: x86-64 (amd64); x86 (i386); s390x; ARM64 (aarch64); RISC V (riscv); - improved BPF verifier log reporting for CO-RE relocation failures (no more obscure "invalid func unknown#195896080" errors); - auto-adjust BPF ringbuf size according to host kernel's page size requirements; - high-level BPF map APIs: bpf_map__lookup_elem(), bpf_map__update_elem(), etc that validate key/value buffer sizes; - bpf_link_create() can create all bpf_link-based (including raw_tp, fentry/fexit, etc), falling back to bpf_raw_tracepoint_open() on old kernels transparently; - support opting out from auto-loading BPF programs declaratively with SEC("?..."); - support opting out from auto-creation of declarative BPF maps with bpf_map__set_autocreate(); - support multi-kprobes (SEC("kprobe.multi/...") and bpf_program__attach_kprobe_multi_opts()); - support target-less SEC() programs (e.g., SEC("kprobe"), SEC("tp"), etc); - support BPF sub-skeletons for "incomplete" BPF object files (requires matching bpftool to generate .subskel.h); - BPF cookie support for fentry/fexit/fmod_ret BPF programs (bpf_program__attach_trace_opts()); - support for custom SEC() handlers (libbpf_register_prog_handler()). * BPF-side API - BPF-side USDT APIs. See new usdt.bpf.h header: * BPF_USDT() program wrapper macro; bpf_usdt_arg(), bpf_usdt_arg_cnt(), * bpf_usdt_cookie() helpers; - new bpf_core_field_offset() CO-RE helper and support bpf_core_field_size(type, field) forms; - barrier() and barrier_var() macros for improving BPF code generation; - __kptr and __kptr_ref tags added; - ARC architecture support in bpf_tracing.h header; - new BPF helpers: * bpf_skb_set_tstamp(); * bpf_ima_file_hash(); * bpf_kptr_xchg(); * bpf_map_lookup_percpu_elem(). * Bug fixes - netlink bug fixes; - libbpf.pc fixes to support patch releases properly; - BPF_MAP_TYPE_PERF_EVENT_ARRAY map auto-pinning fix; - minor CO-RE fixes and improvements for some corner cases; - various other small fixes and improvements.- Enable building and packaging of static library. Explicitly enable fat LTO objects.- Python is not used during build; remove it and help break a cycle.- Update to release 0.7.0 * legacy BPF map definitions (using struct bpf_map_def) are deprecated when LIBBPF_STRICT_MAP_DEFINITIONS is passed to libbpf_set_strict_mode(). Please use BTF-defined map definitions. * ability to control and capture BPF verifier log output on per-object and per-program level * CO-RE support and other improvements for "light skeleton" * improved compilation when system BTF UAPI headers are outdated- Update to release 0.6.1 * Introduce legacy kprobe events support * Add legacy uprobe attaching support * Support uniform BTF-defined key/value specification across all BPF maps * Support kernel module function calls * Support detecting and attaching of writable tracepoint program * Add bloom filter map implementation * Add typeless and weak ksym support to gen_loader * Add RISC-V (RV64) support to bpf_tracing.h * Deprecate AF_XDP support * Support BTF_KIND_TYPE_TAG- Update to 0.5.0: + New features and user-space APIs: - libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details. - streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in); - "Light" BPF skeleton support; - BPF_PROG_TYPE_SYSCALL support; - BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs; - BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs; - allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API; - btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations; - sk_reuseport/migrate program type support; - btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description; - btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them; - btf__load_vmlinux_btf() and btf__load_module_btf() APIs; - bpf_map__initial_value() API to get initial value of mmap-ed BPF maps; - bpf_map_lookup_and_delete_elem_flags() API. + BPF-side APIs and features: - support for weak typed __ksym externs; - BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel(); - bpf_get_attach_cookie() helper to get BPF cookie from BPF program side; - bpf_get_func_ip() helper; - bpf_sys_bpf() helper; - bpf_task_pt_regs() helper; - bpf_btf_find_by_name_kind() helper; - usability improvements for bpf_tracing.h when target architecture is missing. + Bug fixes and compatibility improvements: - improve BPF support detection on old Red Hat kernels with backported BPF patches; - improvements for LTO builds with GCC 10+; - pass NLM_F_EXCL when creating TC qdisc; - better support of BPF map reuse on old kernels; - fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself. - Remove patches merged upstream + libdir.patch + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Fix LTO build (bsc#1188749). + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Depend on new enough Linux headers.- Create libbpf0-32bit needed by libdwarves1-32bit- libbpf is now a separate project, stop building from the kernel (bsc#1188419 jsc#SLE-17288 jsc#SLE-18805). - Fix LIBSUBDIR + libdir.patch- Add python3 as a build dependency.- Build libbpf from kernel sources, not from github sources, for consistency with bpftool package.- Reflect SUSE CFLAGS - Do not bother with obscpio if we are fetching direct releases - Remove patch 0001-makefile-Fix-install-target.patch seems to build/install without it just fine - Update to 0.0.6: + New features - new extensible bpf_object__open_{file,mem} APIs and DECLARE_LIBBPF_OPTS() macro to go with them - bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now distributed with libbpf - BPF CO-RE: added field size, field existence, and bitfield relocation support - BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(), bpf_core_field_size() and other BPF CO-RE related helpers available through bpf_core_read.h header - bpf_object__open() API now auto-detects program type from its section name - BPF_PROG_TRACING programs support (incuding BTF-typed raw tracepoints, fentry/fexit programs) - mmap() support for BPF global variables - declarative map pinning support added - probe_read_{user,kernel}[_str]() BPF helpers added - bpf_get_link_xdp_info() function to get more XDP information added - a bunch of other AF_XDP changes + Usability improvements - no need for int version SEC('version') = 1; anymore - raw_tp/tp and uprobe/uretprobe section prefixes added - new bpf_program__get_{type,expected_attach_type} getters - preserve error code on program load failure + Fixes - btf_dump padding handling - bpf_object__name() returning name, not path - ELF section handling off-by-one bug fix - mem leak/double free fix in BPF program relocation code- Initial release/sbin/ldconfig/sbin/ldconfigs390zp32 17162815731.1.0-150500.3.3.11.1.0-150500.3.3.1libbpf.so.1libbpf.so.1.1.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33986/SUSE_SLE-15-SP5_Update/0cd15d3dec476d582fd15a7dc7acc38e-libbpf.SUSE_SLE-15-SP5_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=e34a76a5a6461713839323a7931b347fdf6c7495, stripped9PPPPPPPPPPPPPPPP P P P P P P P P P PPPPPPPPPPPPPRRRRRRRR RR RR R RR RRRR?-KK)d:930rutf-893421ec178cadd9d833e7fd616a09e650ad724349d9c823ffde708040baa8177?7zXZ !t/]1]"k%ne8^ Ղ%LIIpBJ~F灮iw?5ٜpw ~ɓCDzS` ǚB6~Κ|*)v=ʺw~'i^98L1Id#9Ą~sz^3ww/ѨX&(W10cFoŘPw.P/ )XSBtGv@;^^`UQ%X0詝%@]\3~Ʋǫ1]v!# dx$~BW*YXk1窋@ }נ۟XhFD M2B3T$/.n NW:kNinջ;D%D{,3\]^K&Ƹ.1+Mqs"S<Ͱ~U'0<p*|< B^֣ȬIfU1Jak'/%gL ΛqY4eJY(9CTԡWy̝ =Z FY͜-CtE`y:8uCԥߝwMv[In#!J|(im#\\j]hٌ#H 2 4~ZoL5Ȭ:\g4Zo/vQYOSx +X=^E "}}|P3KUmsYvnʳk{v/uƼn]Ux _&Ŕ.45 oPt7ni"W7(1qPW3S`ڜ1(#Dx z67\ԁ5NQ#5:7l=i9DTJ=e:I9 ^iy CHUro~6]R4ywD.9[xOZ\:kt_n [y Ĩs!m4?P"_$Nwĸ!vl1L`V(¾16ȥ˹ 8VFد[53?uvK"3l[զ7N˽b̆ #QG*߮&(,?VxȡIr bj8k_j\{8LKxHnqG>'adٔGf\5}O7լ^q5u̸dN]/u\]h}*,ljp84j'i#83Ą$&R;z.)˷ ékI;2Y[n)T,xOGJ!(iov\ pE㨒Fu2g1ǵf Ey;Qۼ g:Elca%NCsBϬ#d{yK#0y(w9bpv}'(d5! E؋0R©mH>ẩcf?h nB p&)VђȤXT˂ =vj\'ކr׷8*gGsklq,V(WoVzmbwTomdz5t`0O9s5%aU:|u:D?m:Q p+%+;#W,ԭGF.,ZDPQ 3~Rn\G'y83ݘ5f FIʡFpmبf4>Gr q7e:JخnH**lhh_{}O(ET9('-! >tK~ElߏEՏNx]`0&ɢ<}ohr@pUF3߿Ri6kDTe/ :f!ƮwnZQ#Z#;V )b+8ޘ'@/;}ʡ2)wT*n˞w:}&z]JY:hl28eYKEZ'T؈qyX|m^Fba fⅇ4CQpsb =؉GbjF`x]…ksW4 K}<@]W5l0tA?Oi4߬ =Uif Αi㴲#ə 93DQIFt(x7 t`zS￯̭&L4#4iw7#Sg[q^-aV opݞ{)lԆԋ^v4L8rbԛ ' 5_؇x Y0'(|CI7!QR{/C3Xd-vE3vpg u䲻np&F> [řI<rb' Gf4 M'`G@7i1h-/O|i) zŶ(6|8VE-K7'XI ELh;Z4&H"(5$94XHwyL2LN-q[C!;hXys{[Ȣw;8xOn_4@iK u/ h±zaXze'GXӸBFv)2L607ۤrYnS?GGj690z,5-34AvL8h6rg6y]-Ke/)#{{ RӣJv#~\7&W7 ̣AeM5Hˆ2 Emzӣ䅽B"TN7eH/>ܫi kh:{);9aCg-a{$t%vYF":1IJvר5~] e«\˅UtRT{gE&rPd4&"# i_ZbLKsGDeG!uKeU!=kW[=lt! 5f{䡽:IFV@FGJ7]3w$']myRr(~0qׯNq0* !nra]|յ (j ]'Qm.炜wM/KLU䜁>`xcp7|J%b[豣3]+0}㺷.%ڳ?vNhP!y|E澀(ڑ("y6b?X Q>e҇/ m%kW0or  ͓U_-9 ^.T\ I-8b6n+[k^5r0iYU 7wsܨ% dTi=:'{ny[ ť#hX9rm25~;hSitڂ5.lJ$mnS1JAl{hjg܏Bu\GYPݴ$jUp3n 5o)B):rS;ޒ-Eڕ eR\{٤}JD+sўբ)&rQ@;$fH5Z>Ѻ!\Ūt'@rfKZ91 nќrLV̹J!}a^,3!=WBob2=.iwkݰ Vfu;ۉ,-A x }k"0=SՁصw1DQt^&m||t lq}F4&TVXG'Uc$w!KdԎO kZUHN2Tޗc(5n,o]F?с&l' L2 h3aRڷu"RR,*7G A#dcW x*w k vP̭tKLA}*W-[ zw C[Lcc Tos#e7T7dI-9N/'c](~2]crK71j<[Czib 7'TmX'hk 4J1~xk=$ҵUi䳭Ks`?3)ۓI^jLZYW,y)n|+ ۡw+,q}9l:P=.mV`Uj'++ Ȏ1\˺]eX`|69[CH-E (8`W:]C;x]H%]PXOJ7hO&ݫu+_'$&rW9y" s-` g[pRq}Gq xqX"f4{[w /pjةFf{ˆ6爧Ѫ˫Iv:kW}m =NCpXo-u{zsl~!W x1MNCF(ۢ4В% <ppyץ% 86Ut-fy1!oP[We\ݴsP'[_ca/Ĕ;e~hv||lmR$W.4eX(ig{m9ߞ4$< Gy1օ$&kV.%ƋoS2WB˚qL,u@qb}}(TrFk"kMbqV3!S~^fr>O&RJEmi51T?1G75V<ئ+-iAE)N%"ҾIԖo^R6ZW( \@h.F*O2_2ap!ݭHϥ+w=&?YyvԹqkYԳrG~&]ר;gegݽi]_cŠ,)xga͢>`H$BC13_-,psw']jFCr {*79Д5yiio {;Z"INqH/΍LҎ`+=uԾ,Ffl6-)j.n!YB]vH\^5gmc%:M?{F):)) *?7t ?]7-|rIr*om!y߀9+ZuG@_&1E>sRd;~W]lXK1UK'ڏ.Py;G8"J׈[jH Rpl|EJˍg/#/\;zA>%dJz P'3` icfsD}{YRȗ)ctz {숦+5_%SEO̪):sՇYP^+#֛+JC'Ȉ)g/5 p&#B;6w"6m:%}@LVe.x 4Vڞ2fsf//% bKp(3%)N? -`9Jލ]R_ ~ni и9 aM/Twtw?fYd-X? Fc_Eނn{4$ZYm]ZqF:]յM[&tѢiF.v>`_eߵ& 0!->g:񯑥B'l|޳sFr9s_Z1.W,hyvՂٟ$64uhq͒_+ +0ԮCdƿ찙4 ;v# >_};HT!4h$u:yK$$؊P"NTw.,Wn& <(`vqٮȋݴ,x5Rd|c&IQmP|aPA[DM ߟ:j9"Wq26xĦUs͓Fk+A>8?xDxt'tb14q>И."Ne gN>Su6o:MB֗,y5h:[ )$Iŵt8ͫ`r*fPd \;=Oբ1"3 s90RBl7Zf2h(@z %]RL0p9/$Ml9O__Qϳ vb~fxH/J5/14В(oGY^"OJicH^ª\/|>ffUL:MK$ذz0m4 Ec̭m]YO=V,)X>L;(Ό8(zE6+=OH$c &yDNٹEmlqNz*n 1[>ѧ j 8Bs eI"tj9`U2+a`7Ef_LQ 7bEŕG׉Œr&4JJgKڙ5/DCsX_&ũެbyܑpȷj`nCf/Jes^Ygжn|8x \H .ceti|u:lpg+usSˆP0Ewu?Ϗ5*!RdFL[:Rŧ~E4{a5Rc2q:1+`lm/B)[=jъdox~&696K@lX<ݑl>p# g]&82,e zN~v\6s j|σ9{0išO r|\+t6n) h2΍b#m5\af7|&Bg9#\Ghc6@AV:XE@'`04ؘ+Z9"hbB26jXx oVFYZ]>܌Y, @sQ˻Z8#eǎk ђM}&#,Ļ$Au~5j%4xߞ&.: ^j%-* 6[X\UZfmν%"x2/m콫c^M^M!u.Urmwr;CPq.V!~?.RW6 -7,mL)sY0aoX.KONL\lE0h_gI@>dbY\o (EK~RoT.l' Ax)2 q& Nu/j F( >H]`DT8¸ofq'b> ?Qe(ͺ%#͗j3% !]T> jnz$9|Jf 9Hw@d"-M|M_ܒpT+ {H*)L-߃,a󨋂gwT;aǨm؈6CZږ,#>UK+ttx $Vx <'#]9fkJj PJf6կ V.޼}L(-Kaf.o%hï{FmZv`6Ovk#Ks[@}Q>1gMb.Ym%lAbKAk7 (}sIWɋvoCSS6p؂kb;ySuVb=A%$p&@7s]>D# N~@E{9j,rHs4ba㷙6J,' B5 VȎLQ&4H|h @=MCk ՀZq._Hw F]ZzTDz[oIhTZЌFj^e뢴?3.-J W## SV xqdb7v Qkc/tg2:4Pֹv{0i[CDf1TXG޾;iS.lO+Rc~nߕ4|Eü ͵~ptP[$A5d99z%;ՃR,y&Ou8b`e "Z4BQ$s"Kftd:U5mFa(Z8p0z@AB&''3z˩!,w麰!/60@w5*H,Ïd%ƘA+'D gKXD?v ~q[Mt+E pRO~cu0dHhmVk(U& Wݟ F=˿1&g| x >i%j7.WK ]B]s!DGl)X>b ܍ BU}sōu1%~'_ezi~U9~V9Np 0p1N<L,;mP`M%Z~B]cCq/2y@$rHC61q*s;iXe A8>qCi<شB'F$%JbT=s}g)0'*ڊvӾHyD䬄Q%^ة 3޴W C@GHʯv;m͑V{Up{v4i 8{M "貾a;s.hGsQV8u/[\{J(L"s -=/s\T,y7BZ`'|{ FYOD|/1S¸h+4 ~C=19NÓwҞl!ck t fdi#$ϩ=vB!Au 0 ewVeJW_n55ke34{P&lc C YZ