libbpf-devel-1.2.2-150600.3.3.1<>,jfL\p9|ޒӔ[&nqhQ`],낊6 (D|ܢuZX VVO}`rkG"t#!d00F)RR{!{7ňj,V{󋡲Q)dԇ ٍ]gSَ+M_oր$nZFꢟR'DTˊ k>FMY ClĹ6dyؘ;/[dg4Q$ugtBu~>>I<?I,d " ? 39D   L  \8\  ( 8 9 0: FBGBHCLICXCYC\C]DL^EbbFcFdGDeGIfGLlGNuGdvGwH xHdyHzHHHHI(Clibbpf-devel1.2.2150600.3.3.1Development files for libbpflibbpf is a C library which provides API for managing eBPF programs and maps.fL\ibs-power9-13`.SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/Unspecifiedhttps://github.com/libbpf/libbpflinuxppc64leNLs9I E${! !?qkA큤A큤A큤fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\fL\dfL\ddd1674fee7c38d4f90f8bd38cacb0eca8c1fafc02d4890e078ba8e2c481e417334f8693c88554b9377dbddd77efaa40113919b3245fe5a517160492e21f409328f64b77c97b089ca06203d0451407844fe93933b4e36e7315a294745fa29d058fb7cb679c3641e9ca8d0c317a13dcc3553985fc975cdc3678413b6e1547bbbf6a7e320a7681c18208003b15c222707f55584752ab1665fdaa8881e7e020885141473b036a5f154b2d5a9eff74e4adeeaefb649291fa151a830eca2177d39d2a410e28e5bca81a5d782e27088da750712c747acb9ab1764bd944bf3e7fc15d4b50324ff5032adf45d6cf35aeb15e8335b8b8b509d5f63a43dcc1b2ae345d623284856479a26578ea1893eee35510daab188c7547bf18be0ab01d38c295420ed95b24b09b8535b0eb9da94e8eafba8edcb2abc742bb07dd870bd216c3eea955a18d8ad556d599405c7c779b8eda644bfd0b0610929f1140734aaefa961dbb972af14a2f7fa02729c0bab05f5bdcab5b0b46e0ec91387518125d6bf6c4451d536fe6ba95c0b514ddb2996af399caba5a312141b227f36dd91f7e0d08573282c9beaa6d78a7039f0c5e1dc558d775f8f5d353408122b4524b1f8517e888243622fa39500c7316ba0e2d30f5a95983aa7bd5f816aa9c94cd45eb6908168a44f22b76bb6847f4addbd56e2d5be20c4ea0845e972672fc07b755fadaae5f7abd35d71e349e1638b9a0c68ca90fad3df1d6b4e430804d2fbdc15e58d02cffddfae38953bbf0b9a4febcdee6de55872501d5c1a8f5d8b0d1650cd4d5351995ceb22e889f8calibbpf.so.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibbpf-1.2.2-150600.3.3.1.src.rpmlibbpf-devellibbpf-devel(ppc-64)pkgconfig(libbpf)@@@    /usr/bin/pkg-configlibbpf1pkgconfig(libelf)pkgconfig(zlib)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.2.23.0.4-14.6.0-14.0-15.2-14.14.3fLd8dP@ccFcjDc< @bc@b1@b)@b%b!@aaQ@a(a@a@`@^(@^6^r]?shung-hsi.yu@suse.comshung-hsi.yu@suse.comdmueller@suse.comshung-hsi.yu@suse.comdmueller@suse.comshung-hsi.yu@suse.comdmueller@suse.comgmbr3@opensuse.orgshung-hsi.yu@suse.comjeffm@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.deshung-hsi.yu@suse.commsuchanek@suse.commsuchanek@suse.comgmbr3@opensuse.orgmsuchanek@suse.commrostecki@suse.commrostecki@opensuse.orgtchvatal@suse.commrostecki@opensuse.org- Fix null pointer dereference in bpf_object__collect_prog_relos() (bsc#1221101) * Add libbpf-Fix-NULL-pointer-dereference-in-bpf_object__c.patch- update to v1.2.2: * fix a regression in perf tool caused by libbpf resetting its custom catch-all SEC() handler on explicit bpf_program__set_type() call * fix possible double-free in USDT-related libbpf code, which happens when libbpf runs out of space in __bpf_usdt_specs map due to having too many unique USDT specs- update to 1.2.0: * completely overhauled "Libbpf overview" landing documentation page; * support for BPF link-based `struct_ops` programs: * `SEC(".struct_ops.link")` annotations; * `bpf_map__attach_struct_ops()` attach API; * `bpf_link__update_map()` link update API; * support sleepable `SEC("struct_ops.s")` programs * improved thread-safety of libbpf print callbacks and `libbpf_set_print()` * improve handling and reporting of missing BPF kfuncs * `bpf_{btf,link,map,prog}_get_info_by_fd()` APIs * `bpf_xdp_query_opts()` supports fetching XDP/XSK supported features; * `perf_buffer__new()` allows customizing notification/sampling period now; * BPF verifier logging improvements: * pass-through BPF verifier log level and flags to kernel as is * support `log_true_size` for getting required log buffer size to fit BPF verifier log completely; * allow precise control over kprobe/uprobe attach mode: legacy, perf-based, link-based. * fix legacy kprobe events names sanitization; * fix clobbering errno in some cases; * fix BPF map's `BPF_F_MMAPABLE` flag sanitization; * fix BPF-side USDT support code on s390x architecture; * fix `BPF_PROBE_READ{_STR}_INTO()` on s390x architecture; * fix kernel version setting for Debian kernels; * fix netlink protocol handling in some cases; * improve robustness of attaching to legacy kprobes and uprobes; * fix double-free during static linking empty ELF sections; * a bunch of other small fixes here and there.- Remove requirement of linux-glibc-devel >= 5.16 for devel package- update to v1.1.0: User space-side features and APIs: * user-space ring buffer (BPF_MAP_TYPE_USER_RINGBUF) support; * new documentation page listing all recognized SEC() definitions; * BTF dedup improvements: * unambiguous fwd declaration resolution for structs and unions; * better handling of some corner cases with identical structs and arrays; * mixed enum and enum64 forward declaration resolution logic; * bpf_{link,btf,pro,mapg}_get_fd_by_id_opts() and bpf_get_fd_by_id_opts() APIs; * libbpf supports loading raw BTF for BPF CO-RE from known search paths; * support for new cgroup local storage (BPF_MAP_TYPE_CGRP_STORAGE); * libbpf will only add BPF_F_MMAPABLE flag for data maps with global (i.e., non-static) vars; * latest Linux UAPI headers with lots of changes synced into include/uapi/linux. BPF-side features and APIs; * BPF_PROG2() macro added that supports struct-by-value arguments; * new BPF helpers: * bpf_user_ringbuf_drain(); * cgrp_storage_get() and cgrp_storage_delete(). Bug fixes * better handling of padding corner cases; * btf__align_of() determines packed structs better now; * improved handling of enums of non-standard sizes; * USDT spec parsing improvements; * overflow handling fixes for ringbufs; * Makefile fixes to support cross-compilation for 32-bit targets; * fix crash if SEC("freplace") programs don't have attach_prog_fd set; * better handling of file existence checks when running as non-root with enhanced capabilities; * a bunch of small fixes: * ELF handling improvements; * fix memory leak in USDT argument parsing logic; * fix NULL dereferences in few corner cases; * improved netlink attribute iteration handling. - drop libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch, libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch, libbpf-Fix-memory-leak-in-parse_usdt_arg.patch libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch (upstream)- Fix out-of-bound heap write (boo#1194248 boo#1194249 CVE-2021-45940 CVE-2021-45941) + libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch - Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534) + libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch - Fix memory leak in parse_usdt_arg() (boo#1204393 CVE-2022-3533) + libbpf-Fix-memory-leak-in-parse_usdt_arg.patch - Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606) + libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch- update to 1.0.1: * fix inadvertently changed struct bpf_object_open_opts memory layout; * fix btf.h header relying on struct enum64 type defined in kernel UAPI headers; * fix NULL pointer exception in API btf_dump__dump_type_data; * remove struct btf_map_def accidentally left in bpf_helpers.h header. * All deprecated APIs and features removed! * support for syscall-specific kprobe/kretprobe (SEC("ksyscall/") and SEC("kretsyscall/")); * support for sleepable uprobe BPF programs (SEC("uprobe.s")); * support for per-cgroup LSM BPF programs (SEC("lsm_cgroup")); * support for new BPF CO-RE relocation TYPE_MATCHES; * bpf_prog_load() and bpf_map_create() are now smarter about handling program and map name on old kernels (it will be ignored if kernel doesn't support names); * BTF_KIND_ENUM64 support; * increase tracing attachment (kprobe/uprobe/tracepoint) robustness by using tracefs or debugfs, whichever is mounted; * new APIs for converting BPF enums to their string representation: * libbpf_bpf_prog_type_str(); * libbpf_bpf_map_type_str(); * libbpf_bpf_link_type_str(); * libbpf_bpf_attach_type_str(); * bpf_program__set_autoattach() and bpf_program__autoattach() to allow opting out from auto-attaching of BPF program by BPF skeleton; * perf_buffer__buffer() API to give access to underlying per-CPU buffer for BPF ringbuf; * bpf_obj_get_opts() API for more flexible fetching of BPF kernel objects' information. - see https://github.com/libbpf/libbpf/releases/tag/v1.0.0 for detailed changelog- Update to release 0.8.1: * make shared xsk creation network namespace aware- Update to release 0.8.0 * New features and APIs: - support auto-resolution of binaries and shared libraries from PATH, if necessary; - support attaching by function names (only by IP was supported before); - support attaching to USDTs (SEC("usdt/...") and bpf_program__attach_usdt()) with initially supported architectures: x86-64 (amd64); x86 (i386); s390x; ARM64 (aarch64); RISC V (riscv); - improved BPF verifier log reporting for CO-RE relocation failures (no more obscure "invalid func unknown#195896080" errors); - auto-adjust BPF ringbuf size according to host kernel's page size requirements; - high-level BPF map APIs: bpf_map__lookup_elem(), bpf_map__update_elem(), etc that validate key/value buffer sizes; - bpf_link_create() can create all bpf_link-based (including raw_tp, fentry/fexit, etc), falling back to bpf_raw_tracepoint_open() on old kernels transparently; - support opting out from auto-loading BPF programs declaratively with SEC("?..."); - support opting out from auto-creation of declarative BPF maps with bpf_map__set_autocreate(); - support multi-kprobes (SEC("kprobe.multi/...") and bpf_program__attach_kprobe_multi_opts()); - support target-less SEC() programs (e.g., SEC("kprobe"), SEC("tp"), etc); - support BPF sub-skeletons for "incomplete" BPF object files (requires matching bpftool to generate .subskel.h); - BPF cookie support for fentry/fexit/fmod_ret BPF programs (bpf_program__attach_trace_opts()); - support for custom SEC() handlers (libbpf_register_prog_handler()). * BPF-side API - BPF-side USDT APIs. See new usdt.bpf.h header: * BPF_USDT() program wrapper macro; bpf_usdt_arg(), bpf_usdt_arg_cnt(), * bpf_usdt_cookie() helpers; - new bpf_core_field_offset() CO-RE helper and support bpf_core_field_size(type, field) forms; - barrier() and barrier_var() macros for improving BPF code generation; - __kptr and __kptr_ref tags added; - ARC architecture support in bpf_tracing.h header; - new BPF helpers: * bpf_skb_set_tstamp(); * bpf_ima_file_hash(); * bpf_kptr_xchg(); * bpf_map_lookup_percpu_elem(). * Bug fixes - netlink bug fixes; - libbpf.pc fixes to support patch releases properly; - BPF_MAP_TYPE_PERF_EVENT_ARRAY map auto-pinning fix; - minor CO-RE fixes and improvements for some corner cases; - various other small fixes and improvements.- Enable building and packaging of static library. Explicitly enable fat LTO objects.- Python is not used during build; remove it and help break a cycle.- Update to release 0.7.0 * legacy BPF map definitions (using struct bpf_map_def) are deprecated when LIBBPF_STRICT_MAP_DEFINITIONS is passed to libbpf_set_strict_mode(). Please use BTF-defined map definitions. * ability to control and capture BPF verifier log output on per-object and per-program level * CO-RE support and other improvements for "light skeleton" * improved compilation when system BTF UAPI headers are outdated- Update to release 0.6.1 * Introduce legacy kprobe events support * Add legacy uprobe attaching support * Support uniform BTF-defined key/value specification across all BPF maps * Support kernel module function calls * Support detecting and attaching of writable tracepoint program * Add bloom filter map implementation * Add typeless and weak ksym support to gen_loader * Add RISC-V (RV64) support to bpf_tracing.h * Deprecate AF_XDP support * Support BTF_KIND_TYPE_TAG- Update to 0.5.0: + New features and user-space APIs: - libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details. - streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in); - "Light" BPF skeleton support; - BPF_PROG_TYPE_SYSCALL support; - BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs; - BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs; - allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API; - btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations; - sk_reuseport/migrate program type support; - btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description; - btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them; - btf__load_vmlinux_btf() and btf__load_module_btf() APIs; - bpf_map__initial_value() API to get initial value of mmap-ed BPF maps; - bpf_map_lookup_and_delete_elem_flags() API. + BPF-side APIs and features: - support for weak typed __ksym externs; - BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel(); - bpf_get_attach_cookie() helper to get BPF cookie from BPF program side; - bpf_get_func_ip() helper; - bpf_sys_bpf() helper; - bpf_task_pt_regs() helper; - bpf_btf_find_by_name_kind() helper; - usability improvements for bpf_tracing.h when target architecture is missing. + Bug fixes and compatibility improvements: - improve BPF support detection on old Red Hat kernels with backported BPF patches; - improvements for LTO builds with GCC 10+; - pass NLM_F_EXCL when creating TC qdisc; - better support of BPF map reuse on old kernels; - fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself. - Remove patches merged upstream + libdir.patch + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Fix LTO build (bsc#1188749). + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Depend on new enough Linux headers.- Create libbpf0-32bit needed by libdwarves1-32bit- libbpf is now a separate project, stop building from the kernel (bsc#1188419 jsc#SLE-17288 jsc#SLE-18805). - Fix LIBSUBDIR + libdir.patch- Add python3 as a build dependency.- Build libbpf from kernel sources, not from github sources, for consistency with bpftool package.- Reflect SUSE CFLAGS - Do not bother with obscpio if we are fetching direct releases - Remove patch 0001-makefile-Fix-install-target.patch seems to build/install without it just fine - Update to 0.0.6: + New features - new extensible bpf_object__open_{file,mem} APIs and DECLARE_LIBBPF_OPTS() macro to go with them - bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now distributed with libbpf - BPF CO-RE: added field size, field existence, and bitfield relocation support - BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(), bpf_core_field_size() and other BPF CO-RE related helpers available through bpf_core_read.h header - bpf_object__open() API now auto-detects program type from its section name - BPF_PROG_TRACING programs support (incuding BTF-typed raw tracepoints, fentry/fexit programs) - mmap() support for BPF global variables - declarative map pinning support added - probe_read_{user,kernel}[_str]() BPF helpers added - bpf_get_link_xdp_info() function to get more XDP information added - a bunch of other AF_XDP changes + Usability improvements - no need for int version SEC('version') = 1; anymore - raw_tp/tp and uprobe/uretprobe section prefixes added - new bpf_program__get_{type,expected_attach_type} getters - preserve error code on program load failure + Fixes - btf_dump padding handling - bpf_object__name() returning name, not path - ELF section handling off-by-one bug fix - mem leak/double free fix in BPF program relocation code- Initial releaseibs-power9-13 1716280535 1.2.2-150600.3.3.11.2.2-150600.3.3.11.2.2bpfbpf.hbpf_core_read.hbpf_endian.hbpf_helper_defs.hbpf_helpers.hbpf_tracing.hbtf.hlibbpf.hlibbpf_common.hlibbpf_legacy.hlibbpf_version.hskel_internal.husdt.bpf.hlibbpf.solibbpf.pclibbpf-develREADME.mdlibbpf-develLICENSELICENSE.BSD-2-ClauseLICENSE.LGPL-2.1/usr/include//usr/include/bpf//usr/lib64//usr/lib64/pkgconfig//usr/share/doc/packages//usr/share/doc/packages/libbpf-devel//usr/share/licenses//usr/share/licenses/libbpf-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33984/SUSE_SLE-15-SP6_Update/fc35553e658afb5b81cfa75f5cea4316-libbpf.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxdirectoryC source, ASCII textpkgconfig fileUTF-8 Unicode textASCII textPRRR1kpzcNlutf-8110535c48ba831948339eed52716dc3741b8689e47f3c89c02f10b7fd957599b? 7zXZ !t/t]"k%AK37i251beH|8\<` 6&VWe |@c?v$'z;*u;xKM^ Y B;8IgnkAIh |Ʒj$3M8ŖQrꚟQJߐüaX'v'm~rˍ8^LfrO@gpT!wD^ tL+ *'^nR(6o\n ՟/dH{#KrwO;M;gpԩ ' KpF q-,  l͎54 ۶$虐 nv&xY.ÜmF(bz1x~L d/xN䅖#ceG--4Q5_u(7-0܆\AkcAu<&~,e. H׵*f_,\#,#T(-{ZsLaZқD_ xˌ"2'[FfG9茴~X$9u/cܘ CDP@Ϙ,MI=;mx h2wnB@N?Z >p'98N0bE"WDZS\]hpߏih\.Q\+6 A&ۛfLی\v;Ϗڼ9IPrØg7r sN h?.\$~\E HbA*Q9|'86{#T[sI:M w\se4tUܚ&A PWU`mHq=1}wr6eB 7r>t2x]c7 Nx;U-25J2K }~] 74 #%1SPOfB;s}e1vE=NGm;g5ꔔA F_#GmBgxgze!?Uyڬ 9%vŢU>U3h@B3ٲV]9wowy3y)4nBpT5ڜT.>0%wiqeHL>M1D9٤P(-@G;؅ʿFW?(b^zߜEW6r;7xh&ﱛ&)^~m>_?(?^%P$D.@5z9U5DsyWrXO6αR[8dlkibOTlK0.AڂP]6v߃mKOLd9h|<*CMcw{OxIkń_ ?d|Ȩ)Ib:PBa, G8$~4 XV3)Pł1P֑M6 zeW|/ι"/oR7Vb6mZINI{?g;caAk7 c/-f颚u PTY]p\sD왐Hsp|hfu 9B>b ! UgEu"H?׵aд5Y?JiU?L%rJ?g+ pAT"ZQ2IWzX,Ϭn&J߈_?hW=?N,ɷIuLdзNKcd ^ ׫ vA/ə kHFVzx!轄š:sX=ߑ{zS߄'昻cłjDZŌ8@1BZ,g2Ux;0k`&O m6ЊO uII>7'=ڐGo2J]};ً>Qn^X<vyRj^ZgnS67| Z,W`[΀]E񣂎z)|pa#_D咀y05iIQϹhs#'<$iu3@}dz^Yr}O$tfEttYm4&SBX?$vY]R cZu<Ӥ:|uŬU(͎d7,艬9K5 }^kn@0Ĝ;IWg%j_ ?} kw`rO @g)@ToՉN)S"5wr1]JJyB7 i)N -գ͜0VQxE/f9ܣ օDIZ¨}&OUeT-r'RSis]|1,F+Y<=_ WޮU& f)= 7t@?n TY%WgƥkG+YŽeAKGm',w>桙㬐\뒸@jaB"kN=9?+(VE 7dUd?lJGoEU!8L=> kr': zV < ؉G_`dv,Ha ?(>-wwnB4`NɼE1$&|+z/N#ҹ|+Yol6t Atb:xP+tJ0:!4?Ay$EUz9$&hv m)R]dE+GYf!s,59w7l,59՚u %NDÈi@oeÙeTUJ gI˓Bvy5و!lZHޭ]%ԍD]w$Ӑ$ѐ9i_?dZC@s"t3{Pv#UKY!,y-|j a{7 yH-vx> F&}}b7fVI3<- ME~jc "sLd?KCח'r}X[@=d{9TNn~#z3 17bs? 'II/{!Рu?{#ZZY5?O9OI\ "VVq:C?E.JԫuFH?F|xBMr`" `&̖OU5]R"]2Bwk%yn6|5 ?6 K:ME[)JJsȅyg: J :=8@~+0%Ex`h0s}gRdӔiOEbvvkl2an& 8CSlx}1u@nߣ]XDu^:7NUr:2F5V>KDFrwN,E ",B slJXMNAMxNϱ0 Y_/m*|t7(c2&tBxN:5e tDi~>׊N&'Q8zd6Smg[ʖ^kdYǐ=X|= >Dc]T=g'Sni}^)}U35`hF+iM7;ӷ#;ϔu쫲!dЋ훹VGEV&0Wt|iA$食] Α>`Q?KHFx13_O 3uۺi}D:x[,w_>A`aOC/Jͭsy_|=vcBQYc%G 8uڨtEUI?2͢Qq"~k*bW:@b\Cj'pHssTea~AVd _W>z&-1{JP F3uNp|/Gb ^day۳բ zaO 6Y0fnzi iMH%PĴutv|@ai; ~?t,D svERe J3+bQU {MS~S5n"8}E`!>johDZ]{Av9p,2 o >hiS$!t5] ȅћL$8xSGƱ/PK=̰n! Ҏc]3xن!=bp?.@Ǵ6逴'h=r-aq:Ĕ :B~-{vȱ wʸ}F^8Wgi3eҍh>?А&8LMBMW5opʖZEy^pTvj [6 ~ AѕzR!y F~c+&~sK<;0?62.{AEΨ@^wrՊ@ 0(rnOn: QYTiۑ|BibLk-,}l$aJ D9}d3hL7vucq)nWo3+,ZX#,QЌF-?ڴcD)Q/c0X#36ƌSe _8ؠkoru P =_לǙy1%Y剌_'YXZ@hQf"~Fpq #MT^UFhg S\U@w4=M2R+ǔ$qU JMm0v ;U(TwZycZ_YyLO}eS7 CI|^O?mv@ U[x kRoLP+7GP٣=ڡ 3u]kv XG z{^B_2Vfoi;b> dc*])jp^oAӼM4^Ἱ t?0=DXU5X@]gb',yC vTmҴ:A9/ؽdaQ{,*CG>^Y%KPˆ$A}$d5vt0!꣆Ƕ|n pX^B k1_jG-.B95}_i DgOqR=!؏g~xשl#'j:T|$oFL04eJzc)hHA8p:ABr$ϿwDvS@xJ۩VA=/.+jB{BOFM ЈԊp"n.1Sd0=9mV` 3.M) d]np/% O!Ww.zCOVGRbĺz[b'tj*c,/[Ťn[&rO ~rommkՉz?AM(۪;waq֬3y/(?Z̳>D")ބu~2hҷ7I(WO@i(*Kq<Ɋ@"$+|PGbt[y ToEx ִg }!3`xL qvM6H_譇1 xVf;Xޛf`)O_,<]g _2+eϾwY[xn;MQ ω&< ;Q섗rc4j;H2fJ-KR0vhT9TXE4fB>Qvj $ ݛyN1)ɳK4|(`JU |/W!@ Qא܋txY e 9 sÝ5V7Zc}Pǻ.dyVn&5t&S?ZAJ3{/>,u }dW|K iE j:!%EK0p3ePޣދgR!kM CFf|ߗQ0651},E_b3Úwێ1 | }Lϐ: A`?s˘$VKGfRn6n-{9#\#Ϳ΍J>Iũ^o@vg,?rd 2 l Q6`HhA݇l?3y n6W6V⣝9^ɚ:&ISV~,C%f6bADpf٫0#mtޒ{&ʍ#>׬4BO <KGaaQw$vVE a#wWiv#]  :7| YZ