libbpf1-32bit-1.2.2-150600.3.6.2<>,PhFp9|m8$xl }I3*K+i!Ʒpzna(~ue;eFn<{NB*-a锜Y9F_k4A PPklU#:@Ytn% (ȝ7nWDpfFH>E`?EPd # Q ?EL\d h l t  H("8,9: I>AGA$HA,IA4XA8YA\A]A^AbAcBdC=eCBfCElCGuC\vCdwCxDyD>EEE ELClibbpf1-32bit1.2.2150600.3.6.2C library for managing eBPF programs and mapslibbpf is a C library which provides API for managing eBPF programs and maps.hFh03-ch2c&SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/Unspecifiedhttps://github.com/libbpf/libbpflinuxx86_64/sbin/ldconfig&hFhFc6dfe2bef24124a061125d4f2f9c0abdc8bbc8d34c80999426cc356c1f5d984dlibbpf.so.1.2.2rootrootrootrootlibbpf-1.2.2-150600.3.6.2.src.rpmlibbpf.so.1libbpf.so.1(LIBBPF_0.0.1)libbpf.so.1(LIBBPF_0.0.2)libbpf.so.1(LIBBPF_0.0.3)libbpf.so.1(LIBBPF_0.0.4)libbpf.so.1(LIBBPF_0.0.5)libbpf.so.1(LIBBPF_0.0.6)libbpf.so.1(LIBBPF_0.0.7)libbpf.so.1(LIBBPF_0.0.8)libbpf.so.1(LIBBPF_0.0.9)libbpf.so.1(LIBBPF_0.1.0)libbpf.so.1(LIBBPF_0.2.0)libbpf.so.1(LIBBPF_0.3.0)libbpf.so.1(LIBBPF_0.4.0)libbpf.so.1(LIBBPF_0.5.0)libbpf.so.1(LIBBPF_0.6.0)libbpf.so.1(LIBBPF_0.7.0)libbpf.so.1(LIBBPF_0.8.0)libbpf.so.1(LIBBPF_1.0.0)libbpf.so.1(LIBBPF_1.1.0)libbpf.so.1(LIBBPF_1.2.0)libbpf1-32bitlibbpf1-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.22)libc.so.6(GLIBC_2.28)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.2)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.38)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libc.so.6(GLIBC_2.9)libelf.so.1libelf.so.1(ELFUTILS_1.0)libelf.so.1(ELFUTILS_1.3)libelf.so.1(ELFUTILS_1.5)libelf.so.1(ELFUTILS_1.6)libz.so.1libz.so.1(ZLIB_1.2.3.3)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3hFfLd8dP@ccFcjDc< @bc@b1@b)@b%b!@aaQ@a(a@a@`@^(@^6^r]?shung-hsi.yu@suse.comshung-hsi.yu@suse.comshung-hsi.yu@suse.comdmueller@suse.comshung-hsi.yu@suse.comdmueller@suse.comshung-hsi.yu@suse.comdmueller@suse.comgmbr3@opensuse.orgshung-hsi.yu@suse.comjeffm@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.deshung-hsi.yu@suse.commsuchanek@suse.commsuchanek@suse.comgmbr3@opensuse.orgmsuchanek@suse.commrostecki@suse.commrostecki@opensuse.orgtchvatal@suse.commrostecki@opensuse.org- Workaround kernel module size increase due to BTF deduplication issue since the introduction of TYPEOF_UNQUAL (poo#183503 bsc#1244135) * add 0001-libbpf-Add-identical-pointer-detection-to-btf_dedup_.patch- Fix null pointer dereference in bpf_object__collect_prog_relos() (bsc#1221101) * Add libbpf-Fix-NULL-pointer-dereference-in-bpf_object__c.patch- update to v1.2.2: * fix a regression in perf tool caused by libbpf resetting its custom catch-all SEC() handler on explicit bpf_program__set_type() call * fix possible double-free in USDT-related libbpf code, which happens when libbpf runs out of space in __bpf_usdt_specs map due to having too many unique USDT specs- update to 1.2.0: * completely overhauled "Libbpf overview" landing documentation page; * support for BPF link-based `struct_ops` programs: * `SEC(".struct_ops.link")` annotations; * `bpf_map__attach_struct_ops()` attach API; * `bpf_link__update_map()` link update API; * support sleepable `SEC("struct_ops.s")` programs * improved thread-safety of libbpf print callbacks and `libbpf_set_print()` * improve handling and reporting of missing BPF kfuncs * `bpf_{btf,link,map,prog}_get_info_by_fd()` APIs * `bpf_xdp_query_opts()` supports fetching XDP/XSK supported features; * `perf_buffer__new()` allows customizing notification/sampling period now; * BPF verifier logging improvements: * pass-through BPF verifier log level and flags to kernel as is * support `log_true_size` for getting required log buffer size to fit BPF verifier log completely; * allow precise control over kprobe/uprobe attach mode: legacy, perf-based, link-based. * fix legacy kprobe events names sanitization; * fix clobbering errno in some cases; * fix BPF map's `BPF_F_MMAPABLE` flag sanitization; * fix BPF-side USDT support code on s390x architecture; * fix `BPF_PROBE_READ{_STR}_INTO()` on s390x architecture; * fix kernel version setting for Debian kernels; * fix netlink protocol handling in some cases; * improve robustness of attaching to legacy kprobes and uprobes; * fix double-free during static linking empty ELF sections; * a bunch of other small fixes here and there.- Remove requirement of linux-glibc-devel >= 5.16 for devel package- update to v1.1.0: User space-side features and APIs: * user-space ring buffer (BPF_MAP_TYPE_USER_RINGBUF) support; * new documentation page listing all recognized SEC() definitions; * BTF dedup improvements: * unambiguous fwd declaration resolution for structs and unions; * better handling of some corner cases with identical structs and arrays; * mixed enum and enum64 forward declaration resolution logic; * bpf_{link,btf,pro,mapg}_get_fd_by_id_opts() and bpf_get_fd_by_id_opts() APIs; * libbpf supports loading raw BTF for BPF CO-RE from known search paths; * support for new cgroup local storage (BPF_MAP_TYPE_CGRP_STORAGE); * libbpf will only add BPF_F_MMAPABLE flag for data maps with global (i.e., non-static) vars; * latest Linux UAPI headers with lots of changes synced into include/uapi/linux. BPF-side features and APIs; * BPF_PROG2() macro added that supports struct-by-value arguments; * new BPF helpers: * bpf_user_ringbuf_drain(); * cgrp_storage_get() and cgrp_storage_delete(). Bug fixes * better handling of padding corner cases; * btf__align_of() determines packed structs better now; * improved handling of enums of non-standard sizes; * USDT spec parsing improvements; * overflow handling fixes for ringbufs; * Makefile fixes to support cross-compilation for 32-bit targets; * fix crash if SEC("freplace") programs don't have attach_prog_fd set; * better handling of file existence checks when running as non-root with enhanced capabilities; * a bunch of small fixes: * ELF handling improvements; * fix memory leak in USDT argument parsing logic; * fix NULL dereferences in few corner cases; * improved netlink attribute iteration handling. - drop libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch, libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch, libbpf-Fix-memory-leak-in-parse_usdt_arg.patch libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch (upstream)- Fix out-of-bound heap write (boo#1194248 boo#1194249 CVE-2021-45940 CVE-2021-45941) + libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch - Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534) + libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch - Fix memory leak in parse_usdt_arg() (boo#1204393 CVE-2022-3533) + libbpf-Fix-memory-leak-in-parse_usdt_arg.patch - Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606) + libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch- update to 1.0.1: * fix inadvertently changed struct bpf_object_open_opts memory layout; * fix btf.h header relying on struct enum64 type defined in kernel UAPI headers; * fix NULL pointer exception in API btf_dump__dump_type_data; * remove struct btf_map_def accidentally left in bpf_helpers.h header. * All deprecated APIs and features removed! * support for syscall-specific kprobe/kretprobe (SEC("ksyscall/") and SEC("kretsyscall/")); * support for sleepable uprobe BPF programs (SEC("uprobe.s")); * support for per-cgroup LSM BPF programs (SEC("lsm_cgroup")); * support for new BPF CO-RE relocation TYPE_MATCHES; * bpf_prog_load() and bpf_map_create() are now smarter about handling program and map name on old kernels (it will be ignored if kernel doesn't support names); * BTF_KIND_ENUM64 support; * increase tracing attachment (kprobe/uprobe/tracepoint) robustness by using tracefs or debugfs, whichever is mounted; * new APIs for converting BPF enums to their string representation: * libbpf_bpf_prog_type_str(); * libbpf_bpf_map_type_str(); * libbpf_bpf_link_type_str(); * libbpf_bpf_attach_type_str(); * bpf_program__set_autoattach() and bpf_program__autoattach() to allow opting out from auto-attaching of BPF program by BPF skeleton; * perf_buffer__buffer() API to give access to underlying per-CPU buffer for BPF ringbuf; * bpf_obj_get_opts() API for more flexible fetching of BPF kernel objects' information. - see https://github.com/libbpf/libbpf/releases/tag/v1.0.0 for detailed changelog- Update to release 0.8.1: * make shared xsk creation network namespace aware- Update to release 0.8.0 * New features and APIs: - support auto-resolution of binaries and shared libraries from PATH, if necessary; - support attaching by function names (only by IP was supported before); - support attaching to USDTs (SEC("usdt/...") and bpf_program__attach_usdt()) with initially supported architectures: x86-64 (amd64); x86 (i386); s390x; ARM64 (aarch64); RISC V (riscv); - improved BPF verifier log reporting for CO-RE relocation failures (no more obscure "invalid func unknown#195896080" errors); - auto-adjust BPF ringbuf size according to host kernel's page size requirements; - high-level BPF map APIs: bpf_map__lookup_elem(), bpf_map__update_elem(), etc that validate key/value buffer sizes; - bpf_link_create() can create all bpf_link-based (including raw_tp, fentry/fexit, etc), falling back to bpf_raw_tracepoint_open() on old kernels transparently; - support opting out from auto-loading BPF programs declaratively with SEC("?..."); - support opting out from auto-creation of declarative BPF maps with bpf_map__set_autocreate(); - support multi-kprobes (SEC("kprobe.multi/...") and bpf_program__attach_kprobe_multi_opts()); - support target-less SEC() programs (e.g., SEC("kprobe"), SEC("tp"), etc); - support BPF sub-skeletons for "incomplete" BPF object files (requires matching bpftool to generate .subskel.h); - BPF cookie support for fentry/fexit/fmod_ret BPF programs (bpf_program__attach_trace_opts()); - support for custom SEC() handlers (libbpf_register_prog_handler()). * BPF-side API - BPF-side USDT APIs. See new usdt.bpf.h header: * BPF_USDT() program wrapper macro; bpf_usdt_arg(), bpf_usdt_arg_cnt(), * bpf_usdt_cookie() helpers; - new bpf_core_field_offset() CO-RE helper and support bpf_core_field_size(type, field) forms; - barrier() and barrier_var() macros for improving BPF code generation; - __kptr and __kptr_ref tags added; - ARC architecture support in bpf_tracing.h header; - new BPF helpers: * bpf_skb_set_tstamp(); * bpf_ima_file_hash(); * bpf_kptr_xchg(); * bpf_map_lookup_percpu_elem(). * Bug fixes - netlink bug fixes; - libbpf.pc fixes to support patch releases properly; - BPF_MAP_TYPE_PERF_EVENT_ARRAY map auto-pinning fix; - minor CO-RE fixes and improvements for some corner cases; - various other small fixes and improvements.- Enable building and packaging of static library. Explicitly enable fat LTO objects.- Python is not used during build; remove it and help break a cycle.- Update to release 0.7.0 * legacy BPF map definitions (using struct bpf_map_def) are deprecated when LIBBPF_STRICT_MAP_DEFINITIONS is passed to libbpf_set_strict_mode(). Please use BTF-defined map definitions. * ability to control and capture BPF verifier log output on per-object and per-program level * CO-RE support and other improvements for "light skeleton" * improved compilation when system BTF UAPI headers are outdated- Update to release 0.6.1 * Introduce legacy kprobe events support * Add legacy uprobe attaching support * Support uniform BTF-defined key/value specification across all BPF maps * Support kernel module function calls * Support detecting and attaching of writable tracepoint program * Add bloom filter map implementation * Add typeless and weak ksym support to gen_loader * Add RISC-V (RV64) support to bpf_tracing.h * Deprecate AF_XDP support * Support BTF_KIND_TYPE_TAG- Update to 0.5.0: + New features and user-space APIs: - libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details. - streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in); - "Light" BPF skeleton support; - BPF_PROG_TYPE_SYSCALL support; - BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs; - BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs; - allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API; - btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations; - sk_reuseport/migrate program type support; - btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description; - btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them; - btf__load_vmlinux_btf() and btf__load_module_btf() APIs; - bpf_map__initial_value() API to get initial value of mmap-ed BPF maps; - bpf_map_lookup_and_delete_elem_flags() API. + BPF-side APIs and features: - support for weak typed __ksym externs; - BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel(); - bpf_get_attach_cookie() helper to get BPF cookie from BPF program side; - bpf_get_func_ip() helper; - bpf_sys_bpf() helper; - bpf_task_pt_regs() helper; - bpf_btf_find_by_name_kind() helper; - usability improvements for bpf_tracing.h when target architecture is missing. + Bug fixes and compatibility improvements: - improve BPF support detection on old Red Hat kernels with backported BPF patches; - improvements for LTO builds with GCC 10+; - pass NLM_F_EXCL when creating TC qdisc; - better support of BPF map reuse on old kernels; - fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself. - Remove patches merged upstream + libdir.patch + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Fix LTO build (bsc#1188749). + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Depend on new enough Linux headers.- Create libbpf0-32bit needed by libdwarves1-32bit- libbpf is now a separate project, stop building from the kernel (bsc#1188419 jsc#SLE-17288 jsc#SLE-18805). - Fix LIBSUBDIR + libdir.patch- Add python3 as a build dependency.- Build libbpf from kernel sources, not from github sources, for consistency with bpftool package.- Reflect SUSE CFLAGS - Do not bother with obscpio if we are fetching direct releases - Remove patch 0001-makefile-Fix-install-target.patch seems to build/install without it just fine - Update to 0.0.6: + New features - new extensible bpf_object__open_{file,mem} APIs and DECLARE_LIBBPF_OPTS() macro to go with them - bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now distributed with libbpf - BPF CO-RE: added field size, field existence, and bitfield relocation support - BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(), bpf_core_field_size() and other BPF CO-RE related helpers available through bpf_core_read.h header - bpf_object__open() API now auto-detects program type from its section name - BPF_PROG_TRACING programs support (incuding BTF-typed raw tracepoints, fentry/fexit programs) - mmap() support for BPF global variables - declarative map pinning support added - probe_read_{user,kernel}[_str]() BPF helpers added - bpf_get_link_xdp_info() function to get more XDP information added - a bunch of other AF_XDP changes + Usability improvements - no need for int version SEC('version') = 1; anymore - raw_tp/tp and uprobe/uretprobe section prefixes added - new bpf_program__get_{type,expected_attach_type} getters - preserve error code on program load failure + Fixes - btf_dump padding handling - bpf_object__name() returning name, not path - ELF section handling off-by-one bug fix - mem leak/double free fix in BPF program relocation code- Initial release/bin/sh1.2.2-150600.3.6.21.2.2-150600.3.6.2libbpf.so.1libbpf.so.1.2.2/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39139/SUSE_SLE-15-SP6_Update/63c249027fb7d2f24e9734f071edb4ca-libbpf.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=37a22c0e3faa079831d61af72a943a1918cb6af9, stripped>PPPPPPPPPPPPPPPP P P P P P P P P P PPPPPPPPPPPPPPPRRRRRR RR RRRRR RR RRR RRRRutf-8980165c4e61bd10673610f105d9f6429e9150dff34ff02594a2ade23d406abbe? 7zXZ !t/T.=]"k%]e8^ ՂW9JGՂ@m]~q2|\aVT W5˂Y7em_h$2t[1γ^lRآ!MJa<V#ߔ|QADSܾy%wUr=r)6N]"Li-AK3c8}%^8mSoO1R_H#ĘU*}]Nӿx4$|9H(S5 T8ғ lF$~.fd$e7h 9ˍ3ӽ NeW2I< o ,K0-o8JN e͂ni]G>|m+=L@n{}v3y~4&?غGuu䚪\JzY3ְ\ /V/o ~>p=͙ C5򝟡3Zҷ aAθG&G*Mk,kݚu& _? j0qQ;\ dރj/-E4qu^-gx/n붔XV. a{|2O\,_AB}Yt  Wp犯b_[%h[~*}a90?,.ߧrȀg|±{+6f37BO=eIty]xߵ̭.ʄؿNU}ٛ߇y,Fk~cNƼUlK}⛡n K7y .P;|Ng+m΃/&Q+pQ%lN{Пη,Ax,=(_B*#{c꾅/d(vm7UG`4PǯW`/! 1;H+ydFz _/c̋ބ4^\Z,(BhnmD}1LL0fL +ըY~=Ɍej[n"OjIu`f1OpcX6HH;%tbD,cMd R?f&a'BO8c n&_1,(F?ry>y5*)"H&:2NlLt"9I^1@S @_uըj A,4ꔊLOF[_nDG=s♍/w_Y5 %ΑpYzy׮&]KNHun#(pž^f'IcwšT;|݇“^aﲦ۶sxBG\\|,NDa Oˉ2h8]G]{3 ֳ\Gl~ `;˨#Px ٳ`ј8oI|[Yy;Oƫp[BQGƼ׏Q S[lkCY3hcԱ<,Nr,*45B\~nmrbp#N2REƊ<;ٙ ÍaZ4 A!`ҦiO^4盨 4rz ^G9;Ȯx&(e?J'R-n(ZQJvfCsQLֿqbfލ)G)qMNӅ|"B4".Q4fBv7|sy3 e^v^L'of8x7"iFT5ɵ4yP'"Dk*Z.LSh.OvkVa {nl,dlD毷}ȑ]@6>Is`̯2rPyX9` F{zƐߋ?gj_y-@E?4@Tˆ-$Z-SY#_n>QsjJd G#ߊNUNdhIvHh/xUND"tx_ T8ϫ}9w:txgT6$1i Nb N2 \G]fjC3z'LQ?N;sP1VJMpr]֧gLMWzn7\vT]zH*,G:v0;Y袇RGR:|>L&q?kzE~ѭ+. ٰJ^ua Z[ . ʑY|>@-jg1[ȎUކn5E%7iu*PU\ V P}+WU\k68pS/oJ}| ~6,LX(=%3\*:is 6VҊ#2( }p b!T0ݓ ѷF1.d3_W aq2D54="4ao[ƫZ`m!JF 5/`m%}5i2ƿN- SЗDo vίɢ4C3S]B4 L$OeZ9!D~6<#h~~BѲ4r pZE)1,G:.)7sdkWf  [91-璢#/ aL7+.pP@:s$ClA?HV)J<:L 5%E8u6ߨtÛuRvJ  '}F@ÈF`>blF格Xa2Ol@^`þP~ _QzۀVO%G)c<^g-f]{ك.gݕaE{cUծ3V"ܠDRtTY>| +~/6*ϟwUȀ^.B4SXiEG=ceSȐ|SY("ªl%8AZ6S+ %ʹTPtP, t+ fS(x\.#zcgVfopb.RRsPE[p@ճ D݆S!z$1a49=k\63un9d0Gh5Y\ai~n}~ʭ";J2 \*HzyQTStwwK~[.]Ѽ9hKvWfE6K! ADNR7'勯AeEaE]2iМQhd )c²H"|Qzӯ EIBO2?eo.~g_Xcpbo|b{R.;֣Pʄ}˵ 8 qF. tYo7JQ(- wZSvb+{f8`AT1.Ҝ_Ze)džۺ $fҴ TTABt>IUU<ӕ=֨HY C4^*n!ͳ Kr(ڛ/ɺߎ3 ZZ2hQU0V%geF=4 SAGK2ƷNhagT:T9pG?5M`o/9 zsH+p Sl39*RAkճ0_pKt6L+C Y18O -6!7zfU"/ڴN>ȗ-}9wޖG ~G[coggc58J۵'CҨm[7J¬F7Hv$]8"kuF[Gq .uO2(E^Hn^yY)DKiq qT&g+NzzԸR -WpUYԡb9|zzqK}U ӸRh,*dpxXjkVZ_ ^tCG#c' ȜYc0V<”-fM4< 7Ղ=0qLϻȩg΂}WL[CLP`sΈ ׾aWb9 #F8q\MQ#U@Ji73ͻ]# >jopN!%yUKpp?~(ɗ/\NQ>)U4v$8Lg ]i "}ތn6l\/=gxbM/Јj[I @kƈf^!#EŮ)_dqu4o؟,jH6Fi2Ei }ӬTO/&oS23^wݥYVqjc\bc1*{P.V[7CJnҴ?:;V+whԕPWtzAHB^Hw^UE{6=<Ӭc A H;+5$P" 3 PozIjjl޲@E7QLەI<VٰɅ$(1sʜzЂ/5S//HaX -%]ǚ$ Ϗ\9$A9ƃt{pW(&+5TEr2k{f9sdR!au;!۠*<ظ՚GP Myα-C͹s:i1I: FbXK:Yw$Me?cX%]"mq/ R{QJ1n_s4/˕9JP4 >[ aŽ@OO?~OZ&\xuBoݦ)T G+qIvⰎFS;hv: #>1OuV-TedMD;q݄iG+Ok6r @'cGj:]nzK:N˱1\255О6wa^O8v>92(gjRM˛0Knh'Z^EC;푦\/n,ɴ5tqh5T~%V#J9d\l4p*4u})D=L+T:\:7}ZL(A>Ag&GhG׻l&[=㿃2Fmк8m$p0/[DshX_Γ븺m29UG;8/NsN?$Jr:G)` |(RC /e՞7U>I/!8m9vM=i1#uQ<П,o׉ Isn%.K soH Q%"o4U$>Q6B0NJ\7l6cͱx&ߚ ,~`Q\AI89$<f +SBŲh@Vd, ,XIixuҠ V#lpF>-CmFC ADW;;Y↼kC"6Y<+r(^EZĕ<NۼdbӓB}{MU2y(Pr>1 |?pԥ6TX@SvӚ!qrGړ4LGW?]1(`&2,pCS-*[ϞJ~+{o#rS-|hmgQ&H͇&i?x&wP1s9nUк,ѧԳ[˲Hw^B*9%5_6E糼 0 *C@aDk2uE}gX+`2#+FKnJm?W0e, Kh™Q$SjO_\tI2f?٧yUH& y)>ࢤA{x iN%U u13 &Q0E화'E&ʴ* CͰ;7WIzMc@18\M'pzd6_E6oO zҭ8'V9'}'.{$qAf2jeW/X e.qU;!u<%?]d~)mjWd6#8i&1híèeOݘI]"izx;4ăluDE-@f EM LR* i$8C5g}[žhazƇT]JFXb/ ns8/hՂ ꂒe7JRt\>@ c[Xcw9f'T7i`"*(pQIvbv?q-^KY#;/]Ϸexy.P/)-aS儎ɤ:ۭ+h{p1m!;f QU;22T5[bgXҍ'2{1n_z m1r1O({S DMY,^75ڧѰ:\Sb^jzw.՘*K.!7:4Ǒ5PH&m}-XNu{1_ưཋ#5"qKC(Q+^IZٶDy{*I] *1 3YJZe.enE;[db'"f';ޮCfKa4}'U_ Շ`wq3qn:n x B֜nDG8ИǼԔ`3rq2& Cow+< ^'cDXSﶆ[}' 0A6Y|]eA3p4Vf{k4һ'jW4̵P)AՇHΛMNgdQ 2S]ĄxW ?%MQ <* :9"riW-V=x =PdrmyM1/^9̯+k-*w)[cܓDKY#<seH/؃{)ėk]&}f$fMXȬc˯WᐅqͯXfzu-3oRK,\"X9X9Z(}-,,5]* ~q(%YKhl^\Y$Hngheg, a[qKG}3`eO Õck b"0$-,$nÆ-lj ב.a.N, %eo4(=oaXy#0dV=D*;a6rg+d3!~j,GVa팟ϒ?C\̀tYcNL̾Pq6C%hhԬLpu[Ër'Q(fy@ Hbl.QUC>%@X[5saڼo󕃣6AD7.R$սP`M$Wф%ߑrԎ)/s BԄxQg=<ҿҥ)wwA% &sK4$6⮬,[p/o3)&| h@ r`vI1Uv!f$O]tgPlC]C'CO3a,mdq=S <=ͱ6.=W>B"CR׃DInTE}tǎNx].Zر0:wu7gx$N#_\ʟKAzh!fBN[m5߯Խk wT3 t}SJOe^G<ʹB (pC(W&3_|O- ԺMJD~R2EЂW?}$MmT2/:NoesKt8wW2wu^-ci5J|slʐ3k 0lYr4h zSxY m> WyZVE ]&Rk՛-0@)ラ!*^t$[)UTIMwIihmB0!HQVA9l^o,(vIn1D*`Z/{3o*- ,8}K=Ǝľ\ODկrnk $%tY;[۳ w=9%q^˴꣧ o]J '7elSPezqy[`A#Xjc?en<6"X(=2}GGfDrdSX fMJU̦r<ĤK->_ =Kz7KPSLSaΩByJR6EO`%ƽNK^Z@z^ūݖ}a θBEA qb)STՇnqUMn.I#-e&gL7oZSI핑gXlzw9y9&"ٗ-մۍBvV݌ҍqQ~8q?,ZuS[+' s˾yM302b{BKv\+ 0K-''C~&}T~A`,*8qg]s"Z/3D(NyK0p<2ӊG1B\ki˷!1Int !x8ŜwZ},8| HcL|4.dٱRxI_\=РtQ&֦O[X.(6(s{rܓ'#!zng2-.,s} (RndӤSSm?1Ul}.o^c#h5ڝ*}3wȓsۧ>өE4ըQ U$8YȦ8O \vc⎹ƲLw6#~H^{.%C.Y|_x8] LFq>&p2#ӻm#V|oӮR+!3l{S6Z̃صaIQ#+9[F8SC 5>`1p޳Ƞ6B%K[c:HYY(0aS~N.G?ZxϨO@I+K+ d?Cm@'ˮq,Y 3՟j~sq|K+ͪ]֏=N]{1F-N^!wU[fL;xvD-lسZY}bv;{eFH!mqJ4e,I?N'۞i>.ʼU_v۟Ҋ~#h8dikRY1&$#|ݢblq]5M2HGy__a)p!ٵȐIkqDCڱz'"g7Kz](9z S2Rchct~935~7hcO.[Q-] ±KnͲ #g\I ByeVZbozC(bJaPd9WXҵ:}Vl]^$3v0 *B8s✋mS, c?V)Vr.RNLI8t$Lg* h`ZO2^&c ޱ Б M%#Pku=, sZ*fײe/)d,=Kjg;0[ u<| F fiz~{~hN wQƑ[y:~{LA{6,Թ \\@Sn*5}@): {tSbi_ ~3wgҮ\gfMCoJ 0u)Ҥ srB ?JdLMzimo_D`ڮ;qzOMBƨLI #쫢l.?#9wڀ1"U%D  u7>@uzzsGV;˪&tU7ɂu|9zB16&@r&@d؍zT_ ~]+DLc(ԯ.Z.ޙáh5Z\AڣdMD6Tt^z%nG%Қ;9HWZnR `8E󒗯Q|ZhYbr3ͣE7ٙƳ)xhR=e8~/զ~@ga%Pa~)@)p@9s[1MfK_3Ζl\1,^م=쮉Rw&䝈,*ܭȭ@O kIl>/ (Ԭ~LeޝVgZݔQ i&VHng zhAeJcOhr# Xƻ(Xm@JڇzbwE)Tvǻ$" X@]/~5ي~?^p({S:F]qV_ܞɦ/ۢĻwۓGp:l4I7o,+ޏY5F?1aRI]fNKBEC,s{¼{5v2!}h}n*:F)nDNnT|u7kg2w=s]`@ʩmc{,R9 tneɓ$KWT(팦6J}AZZ+I`\l{'x,|o>Ob2XЯbC?v\Za-Y쳔c1a#[rY3Yava?Y\wYV溅M. ԜL~Zg#1&z N^9{-TrW2<ޥlc1f̶qn%"4.EeG<|݂nW*P&"[Uao*r %EF5 b7swzb)Y(6@7ƜyKwt@74 i,O@㴁E~<%z A]!hV^_Mp+݁UVp wwP(R;ėswVsn叻l9z[: [J/ߕ/$ 5J`2x֗6dZ-*j-"C!}(%xP]MhU[ !j%i{% YZ