arm-trusted-firmware-imx8mq-2.6-150400.4.5 >  A bwp9|l(p:J O̘5 [.@qRޙSj&;D\w?Fs-AQ> D (嵞룏}>qDϪpۜz4#lENcC)TE-2^<52}:J csM (QGcUshj&8"vGtwcPtY6$m$oM5404eea68018434928917a7e6401e1e593af72a9a6ebd02b5d09d8f2258938ee5c461d29fce3ff8568afec11d5c7c1fcbb0bb21e0(bwp9|J?,N p̔%l΀{63lVJt>+Qx'+Ȩ4$L?ĬSDSB[hazQ4Y ?c'w^3˖_VqGOgnG66Q]Gg3͐"R[#R-Pc47J9L(fw6l8]h+MtSZ$If[)W)?mHeԳxwz]EdF|A>p;:$?:d" - D %FS iu             J | g(8<9|<: h<F6G60 H6X I6 X6Y6\6 ]6 ^7zb8Bc8d9Xe9]f9`l9bu9t v9z9999:Carm-trusted-firmware-imx8mq2.6150400.4.5Arm Trusted Firmware-ATrusted Firmware-A (TF-A) provides a reference implementation of secure world software for Armv7-A and Armv8-A, including a Secure Monitor executing at Exception Level 3 (EL3).bw`ibs-arm-4 [SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/System/Boothttps://www.trustedfirmware.org/linuxnoarchp.L\ A큤A큤A큤bw`bw`bw`a2a2a2a2a2bw`a2de58688247eb86a6d02616c8d4e9388f05a809d575d0dfb039f638d591d7c78510a9180abb55545fd52720fdff00d63305e2bc4f5c15db25f510fbdda7a67f4900ef6426304876886b2b8b3ea425c4e34758ddd779295be440b4fd5a780ab86353a0a460f8eccb279580aa16013c5f98936eba73554d267632f5ea83d8e890b11f1763e188e8c297192b40b973860974db9fcc09cb07fea8520f86aa5b7cc6c17c8895e89d771f723c176afc9d69a230c185c7c6adc3838ea509b379256e2221e3f7de3cd0aea44aad09419b6dc5e6356d3d43c7bd850801a44a6211b94162b0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootarm-trusted-firmware-imx8mq-2.6-150400.4.5.src.rpmarm-trusted-firmware-imx8mq    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3b4t@b[@ar@a@aaeaaA@`E``@`O@__@__@^@^@^@^5h@]@]o@]B@]/@\@\@\@\@[[@[@[@[@[@[5@[[[[[c@[c@[c@Z~Z~ZliZliZe@ZX@ZX@ZR ZR ZR ZR ZOhZOhZLZKt@ZKt@ZDXa@Wivan.ivanov@suse.commatwey.kornilov@gmail.comsweiberg@suse.comsweiberg@suse.comguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgivan.ivanov@suse.comguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgafaerber@suse.deafaerber@suse.densaenzjulienne@suse.comguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgmatwey.kornilov@gmail.comguillaume.gardet@opensuse.orgafaerber@suse.deguillaume.gardet@opensuse.orgafaerber@suse.deafaerber@suse.deafaerber@suse.deguillaume.gardet@opensuse.orgafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.deafaerber@suse.dematwey.kornilov@gmail.commatwey.kornilov@gmail.commatwey.kornilov@gmail.commatwey.kornilov@gmail.comafaerber@suse.deafaerber@suse.de- Backport fallowing patches mitigating CVE-2022-23960 [1] and [2]. 0001-docs-security-security-advisory-for-CVE-2022-23960.patch 0002-fix-security-workaround-for-CVE-2022-23960.patch 0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch 0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch 0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch 0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch Fixes bsc#1196657 [1] https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-9.html [2] https://review.trustedfirmware.org/q/topic:"spectre_bhb"- Update A3700-utils-marvell version: Fix build SATA bootloader for A3700 boards Drop fix-A3700-gcc11.patch: upstreamed Enable %fdupes which is particularly useful for a3700 flavour- ExclusiveArch got overwritten, using else branches instead as SLE 15 SP4 continued to build excluded flavours (related to bsc#1193779 and bsc#1195129)- Fixing the if statement to disable some targets on SLE 15 SP4, as the prior change resulted in the packages being built on other architectures than aarch64 on SLE 15 SP4 (related to bsc#1193779 and bsc#1195129)- Disable some targets on SLE15-SP4 because of missing deps in SLE: a3700, hikey, hikey960, imx8qm, imx8qx, rk3399 Fixes bsc#1193779 and bsc#1195129- Add qemu_sbsa flavor- Auto install on RPi4- Update to version 2.6: * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md - Update mv-ddr-marvell-armada-atf-master to latest version - Drop upstreamed patch: * atf-2411053.diff - Add patch to allow to use non-git checkouts: * atf-allow-non-git-dir.patch- Update mv-ddr-marvell to use master branch as upstream recommends This fixes build of a80x0_mcbin - Update A3700-utils-marvell to use master branch as upstream recommends - Re-enable A3700 tools with patch: * fix-A3700-gcc11.patch - And refresh patch: * A3700_utils-drop-git.patch- Disable A3700 tools until fixed upstream: https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22- Fix rk3399 build: * atf-2411053.diff- Update to version 2.5: * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25- Update to version 2.4: * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7 - Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements - Drop upstream patch: * mv-ddr.diff- Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes) - Clean up rpi4 build - Drop comments to avoid RPM errors about %else and %endif end of line - Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0 * Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error * Add a _service to clarify its origin and facilitate future updates - Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch * Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged) * Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged) * Actually apply A3700_utils-drop-git.patch (output cleanup) - Build and package A3700 utils as part of -tools (non-noarch, ensure PIE) - Build the tools for all architectures again - Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch - Add a80x0_mcbin and extend a3700 to build and package all needed files * Suppress OP-TEE for now, as it fails to initialize- Build fixes for a3700 and a80x0_mcbin- Add rpi4- Disable debug on imx8mq to fix build- Update to 2.3: * Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components. * Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS). * Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC). Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development. * Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf). * Changes necessary to support SEPARATE_NOBITS_REGION feature * TSP and BL2_AT_EL3: Add Position Independent Execution PIE support * Enable MTE support * Enable Link Time Optimization in GCC * Add CPU support: - cortex-a57: Enable higher performance non-cacheable load forwarding - Hercules: Workaround for Errata 1688305 - Klein: Support added for Klein CPU - Matterhorn: Support added for Matterhorn CPU * Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3- Initial implementation for Marvel A3700 platform- Switch to _multibuild system - Update to 2.2: * Enable Pointer Authentication (PAuth) support for Secure World - Adds support for ARMv8.3-PAuth in BL1 SMC calls and BL2U image for firmware updates. * Enable Memory Tagging Extension (MTE) support in both secure and non-secure worlds - Adds support for the new Memory Tagging Extension arriving in ARMv8.5. MTE support is now enabled by default on systems that support it at EL0. - To enable it at ELx for both the non-secure and the secure world, the compiler flag CTX_INCLUDE_MTE_REGS includes register saving and restoring when necessary in order to prevent information leakage between the worlds. * Add support for Branch Target Identification (BTI) * Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-2 - Drop upstreamed patches: * arm-trusted-firmware_hikey960_race.patch * arm-trusted-firmware_poplar_mmc_dma.patch * arm-trusted-firmware_zynqmp_ipi.patch- Add zynqmp * arm-trusted-firmware_zynqmp_ipi.patch- Add initial bits for a80x0_mcbin support for MacchiatoBin- rpi3: By now building okay with OP-TEE - rpi3: Replace dependency on deprecated bootstrap code with U-Boot - rpi3: Change installation location (adopted from u-boot-rpi3) - poplar: Fix eMMC DMA FIFO breaking U-Boot eMMC access (https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1230) arm-trusted-firmware_poplar_mmc_dma.patch - poplar: Build for both 2 GiB and 1 GiB boards (b96o#834)- Add imxmq and imxmm- Fix build date by escaping %S (which expanded to %SOURCE). - hikey960: Avoid a race condition (boo#1134788) arm-trusted-firmware_hikey960_race.patch- Update to v2.1: * Add ARMv8.3 pointer authentication in the normal and secure worlds * Cortex-Axx workarounds for erratums * New platforms * Full changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/about/docs/change-log.rst#version-2-1 - Remove outdated patch: * hikey960.diff- rpi3: Package armstub8.bin, fip.bin, bl1.bin, bl2.bin- pre_checkin.sh: Fix package names for sun50i_{a64,h6}- Add imx8qm, imx8qx, sun50i_a64, sun50i_h6- Update to v2.0 * Drop upstream patches arm-trusted-firmware_cve-2018-3639_smccc_rename.patch arm-trusted-firmware_cve-2018-3639_smccc_return.patch arm-trusted-firmware_cve-2018-3639_rename.patch arm-trusted-firmware_cve-2018-3639_static.patch arm-trusted-firmware_cve-2018-3639_static_aarch32.patch arm-trusted-firmware_cve-2018-3639_dynamic.patch * fip_create wrapper is no longer built (use fiptool instead) * Set BL33 for qemu- Conditionally enable OP-TEE as BL32- Add rpi3- Set BUILD_MESSAGE_TIMESTAMP for reproducible builds - Simplify tegra packaging, reusing %target_soc- Address CVE-2018-3639 (bsc#1085308) arm-trusted-firmware_cve-2018-3639_smccc_rename.patch arm-trusted-firmware_cve-2018-3639_smccc_return.patch arm-trusted-firmware_cve-2018-3639_rename.patch arm-trusted-firmware_cve-2018-3639_static.patch arm-trusted-firmware_cve-2018-3639_static_aarch32.patch arm-trusted-firmware_cve-2018-3639_dynamic.patch- hikey960.diff: Fix assertion on HiKey 960 (b9o#739)- Package bl2 for hikey and hikey960- Add tegra186- Package poplar_layout.h header for l-loader in devel package- Build recovery version of poplar, too- Adopt %license - Add poplar - Prepare tegra186- Update to v1.5 * Dropped upstream patches: arm-trusted-firmware_pie_1.patch arm-trusted-firmware_pie_2.patch arm-trusted-firmware_fiptool_pad.patch arm-trusted-firmware_fiptool_pad_useafterfree.patch arm-trusted-firmware_fiptool_pad_hikey.patch arm-trusted-firmware_fiptool_pad_hikey960.patch arm-trusted-firmware_cve-2017-5715_a57_a72.patch arm-trusted-firmware_cve-2017-5715_a73_a75.patch arm-trusted-firmware_cve-2017-5715_pfr0.patch arm-trusted-firmware_cve-2017-5715_errata_format.patch arm-trusted-firmware_cve-2017-5715_errata_output.patch arm-trusted-firmware_cve-2017-5715_platforms.patch arm-trusted-firmware_cve-2017-5715_bpiall.patch arm-trusted-firmware_cve-2017-5715_smccc.patch arm-trusted-firmware_cve-2017-5715_psci.patch arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch- Apply fiptool patches to tools package, too (b9o#633) - Prepare for detecting PIE support (gh#ARM-software/tf-issues#519) arm-trusted-firmware_pie_1.patch arm-trusted-firmware_pie_2.patch- Implement SMCCC v1.1 (bsc#1074741) arm-trusted-firmware_cve-2017-5715_platforms.patch arm-trusted-firmware_cve-2017-5715_bpiall.patch arm-trusted-firmware_cve-2017-5715_smccc.patch arm-trusted-firmware_cve-2017-5715_psci.patch arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch- Pad HiKey FIP to avoid hanging fastboot transfer (b9o#633) arm-trusted-firmware_fiptool_pad.patch arm-trusted-firmware_fiptool_pad_useafterfree.patch arm-trusted-firmware_fiptool_pad_hikey.patch arm-trusted-firmware_fiptool_pad_hikey960.patch- Add CVE-2017-5715 output (bsc#1074741) arm-trusted-firmware_cve-2017-5715_errata_format.patch arm-trusted-firmware_cve-2017-5715_errata_output.patch- Use debug builds- rk3399: Don't require cross binutils (let cross gcc choose which)- hikey960: Build fip and require EDK2 for SCP_BL2 and BL33 - Refresh CVE-2017-5715 patches (bsc#1074741) Drop arm-trusted-firmware_cve-2017-5715_ic_iallu.patch Add arm-trusted-firmware_cve-2017-5715_pfr0.patch - Suppress debuginfo for firmware- Make noarch so that it can be exported- hikey: Build fip and require EDK2 for SCP_BL2 - Add tegra210- Add hikey960- Add hikey - Clean up pre_checkin.sh - Don't package bl31.bin for Rockchip, we need bl31.elf only- Require arm-none gcc for RK3399- Address CVE-2017-5715 (bsc#1074741) arm-trusted-firmware_cve-2017-5715_a57_a72.patch arm-trusted-firmware_cve-2017-5715_a73_a75.patch arm-trusted-firmware_cve-2017-5715_ic_iallu.patch- Return lost doc files- Package bl31.elf- acknowledgements.md renamed to acknowledgements.rst- Version 1.4- Update to v1.3 final- Initialibs-arm-4 1651967840 2.6-150400.4.5arm-trusted-firmware-imx8mqbl31.binarm-trusted-firmware-imx8mqacknowledgements.rstcontributing.rstdco.txtmaintainers.rstreadme.rstarm-trusted-firmware-imx8mqlicense.rst/usr/share//usr/share/arm-trusted-firmware-imx8mq//usr/share/doc/packages//usr/share/doc/packages/arm-trusted-firmware-imx8mq//usr/share/licenses//usr/share/licenses/arm-trusted-firmware-imx8mq/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP4:GA/standard/8367215ab1134926f2baf8a830925bd9-arm-trusted-firmware:imx8mqcpioxz5noarch-suse-linuxdirectoryASCII text>B} /utf-87d5a9a31a45533432c909b36b3c045441ed7203c9af9bd962977c7c3cfaad5c5?P7zXZ !t/X] crt:bLL ^1iu*IbTCGiAA%^7ey *ALe0cS 3Ğ~H e\-K$,VWYuHI(P_ƺ4JWCН`dLGs N cZ-afVV_]CKߤIO|*cf>ZpAϥBzH7aL:6a=c5;fmk${,hаan b0N-ƕ36g)Ys\;I*zA% +HMЙg5 p#f;Z ?0WiJw@W"R6Gԁk׉-#dgf_QH.q.fJ}J;UnG TTTvZ-+PMv펽Id-˺/SJ"]Uk' 4yv?RLr$:X`y쏜á}ѝ4D(4[TJj0 ۸3"Kr}ŝ[y$*ilm[/tql KPZ,c_`GlXH#^xM3<5y "=f2@ࢧù<%ێWU-6#yJA>|I lAmu ϻ ;ԱϠ2Lq"MViLOAwdr4Ljp?0[kIKam*Q>cOw׻D[YC8-U)jմ%Ddiä8^0-Ӳ,ę,#1r/mUܜUO #)]9/5®vRd5 ^n{M F^mgN/*f';ۺlGfmL`ig˻]nO4 .91\ ䷤!&i9]Ks/h(tnY=xZxV=VrO(0us8;Zp& jR?T"] p[*zRT e]TDl⑨;TH 󉃞E6W m>ڠ 2luUwlAg*XBt$8LJREAR`yl X.vco2,Q#ӤC,yduSl24DxTS|3 ^eʩ mCIzdW$zf[tޫ1` {$mC=я^?_⃚W/De֙$ B`] =Β1{ ]sP<g&Hq!cU/JF*JqnFJ("IH.HgffE!VC6S?[I? o_z7@ gթ!d~[q,zGK*A71Psˡ?EW?Qwl6!M+TK9 wo,w{I$L~d-$5W ˣ1}>Xc}G(i4RsKç_m{I;넄WԳ >tUb$o\O8pqjBZFÉ/$'*QA*7ZvDvA HugaaO\TQn{zNwT/JX2Y H%H$̺\}b1YU0.{)ĭU|rpegeefnS+Hh7#Ac}=Vm )PDDOGj~wbamF`ޟ=;ǹҋ|F 9÷(*$,oz!8KBH[Yq66++a*Rb KFuuppF6=Ds eQ9t$ };MvhA:6D2ݘV2ʺJ[)N X󠈎θ>;"UدK[>mI%iZm2f tk$G,]T.Bd`@wͲ5@be]0Ek6\"7{t|U \+LcǏo™z??ǻI=Қi u_şĚgOF4v1MBvҶ,ȎVҶNk%]-bPe(zD z# d+׶5ޟ_55yP'Uv)\kQne[(PpqQ?p8}7~6ʌoZ%%Z4gs8g+J Z.^(n BW۬ {"KT#VvՒ6ųz8I`zF[㑫'+/<-ͭ0IJlgYHvRNUxYoKܳ0>^Ԭvǰh'~C*cd.Pft%P .7-Ї3{i-YGߥIFk' AGUXL^FU52"UwZoRVN;_E~Ѥ'SJX 1uNS` 'UDЖJhF\c婱DAӟh1HXϨ1yFGI  ܿ$0l-Z"} $WON^ 9CKx-Rc#7`.t1Gqڦf?>v|?-Q?0n6*eny. y<7Tl(ǩlgȜ-1PQ.^g<q۱ iZ\m=e;] fRZ"};, 'ف>}+ӡ@Fq3`HCs3hQ<޷#/p~r~dT{kmvjlNLoKR@_USUa8l?h^gi/<|dŇ]SdiwJ2t7פ挎y%;CCBZϋ~ͻxI@e/._-o"MFKp\.O&>@5bC96DĶc!i=E<$?&$Lpכ+2)1] VJٺZpD6 wWߓԾyE@<^wVl# w*z|\>hC#d,WX\CN٬לǴY !A%|Z!ĸ.~Avh(=\e-yZrw,l V;caY,.ޏAȱ2 t5^\X/'&mJ̓@1ӝ{ͮ {YˀlZpq5xpf-zSee"*ށee|\qu;3`+Kv80r͞LEm oi:kb gvzMyFՙVC +L!aU׺S@ 7\qw]?9dNg\~| E[Rpv=Z*NYsrfUD:5f!> ĥ:,zg ݉^#)jIQuHaOct J޼b} kصq kUA_j< p%3PH:HUfU21aw#QQpGfda%|fd'1ې|іjd#;d#M,A$k66ŝΖ0t>+25p?ԻFxaAaԄ u4\ݿ%R!$fI3(.?)To _e<7V#6"p5?^~Ѩ"JkyaE/زe79UkuqƴI8*[mXNl\Sb!4)cV7~ٶxWDwecpv8ʷpt]xؕOk{膬50$U#bg]1UkW7b.{_ԓiAMھ;2{ydGqz;.4v$EK9O7Y7Tqɣc\-Sk*>o8u4RecjA_RY1K.\>fij ؊ՠG!S;8=e-G&fUt1*=C`k*'9X>8*֝%^tL]m2sg*sIP }~0'{Av[صx^Ӿ@c?G[^ŶԦJ:cY`"ָ漢'aG&h<ꖻFmE\6fF␮bU֖ x`D2[q# `W>yzz((oa::6xh=.jw(ݹxN130q'  ̣#ɲ܄V|(52'-lJgoG^K^+raq?4@} rZåP_0ys[8Zhne:ВeUc9ż=J|Q`'eҩY`_eH;9oV%J\ySVdޝ<6+Gh6oڽ#`$Bs]5}w]d$Qv} *P3, Z+}k2f]\,F} Xe1|EP<&Zw ̷|K?̜r V5@qx ` $bL/K6Lm {G}nf@1FIkD[p l!&鐤3+TkẒ0ؖN^gIōm7Tkxb@JގMDj3'&neZuTަR;]#0' jƞr@vh DCtTT|v&6@5>N &6M),si8*>> 5<āh $k4QR$dc8 ~ ` UhR>\mk]Ą^=F/Ktoٶikx:/4(VH%yc |PwpLiZg%O@9j "!1?QFm1> XCqH 0rq``z̟w#㨅%و݁yȎ̫Yhם;l%P"Fp; ]V E>X`^'Tcɴgp7y a >¦~fTd 젬< XƔR:}NmʝVDs1CwĂ¯ .JUXlc^8P)_Tڰf )vvJAGΐlK⦏,k1`^EfQݕR#C.׆e ͣ\a^}/ 9n-['vie1·+(?W^Ew4s4BdRc>Ȉ-=bL]*>y8\7Uү-]fި"f.%[qz`o+1(^Fzm=6|ьDk(m3I*o3^bd>yŧ =Bߞʌե:Ax _\\E}!%qJQ14_xk&11Gԉ? xn@GЦkDDXstX,A햣9D3ULm>*WefGw[s)7@@ %GM@??`tx ;vfa1pOvI*WtnQ6;CUwTR#t$gC|`܎K ϓΒRgX eDSlH|JA|dyh4ClI0FLEm/cۥ1 i}z\1 WpԜ#/RepMHhͶuZ^EW旡9!Lr?V!`O`UD$$*Cinj[qu29F2'µws\̀3h7EM:~%f< ["CAǫZ5, pZ7z8}:Pwdw-X+;"vRWYeh.s.#/ ,4w -,&P=&0b.>-ÕDM]BzH aTHQIOczG2M!+4TI> Y4-&al?DY (SHz+!~Yi*e2=4HZAhyhx"c=sߐq)p<#3œR;%'!VTv4qu‡z"L5pN(zdIBR*?cۨ.X?79JHE$.+FMi!x\eH!Y_٩l * aI)/-/~mZۍw$FF%эL]O8]/3% (%sgHh,V3q&{cĂk)OϯӨ#\V}7I GA1NZzXq"!{8ۇA#^ۍ PH$HsP&#fp y-*e[Ϸ4`koē=g,,˙?><ud5_^Cww)vrw@\  :&GFM,1 ,`]=dJ ךxvt Tu:rXPkkD<TA 0Qp t۵|Su2~`؅H9c ֩[)ϊ} NtWI:zd֥Xq+DFw|Tisdm!/]᩻lVhaL*Q!S*zo n/ +1rJ̭ͫ,{v̲B| kṬeی:,W8yvӹi9JH|"zxgTdg&™=_/ӁVra V=Um5$Vai}-S;Qǐw '?5DY{WVK\5w&$ؤ{H 83U2OZzXJ&kOXO]cwLxpkdgTzVr{_kT!>P_vvFW1  #0tju8ɴ#3qTʶTRS/p>}qIVuI\̟ ]Ъiױ5G(_v\ =vv',hx?;+A+5\Y#2#yE" ,MΰXꤱ#|m:H(stT֯P߆ɳK2Y:b*Зp ZW NJ#/ZHPm.[ xQ7VXm>gxwQ2~nC'xo!b޳'6w˹W'=6r)xIG+ (HV eXD9Y+j薂SDTDi][ ]y+$Hٸ ZX7_v ƺ!ė$uc 5yIV(1gMÌwW r" e*XBqБl_"n$P TmvE}5fnT$2Iv̜vDZ`<ƶќ31Izy0[eAF ?CF H3諙l1"E\ %8{15S }kdpp % ՇRia,1Px.O3`_B'LjOWGLB3"(ڡVg<%?'z7JrN6?H:̼;4DͩpYHyy(o"/5;w#z|h-4!}lT’Eȥnvo %Ÿb% ݨkʿ{n4!册7``M,*zD`.wK<;Un]uq/][O`>Lᅵ}rQ#a5GN% &@ً> 4!%tNiMI(V`{r3>-٤_/Cw?w;.U$TDGq9wg2r?'r^nM:F9}0G14% ջNV0 2dNeQmHB,944g'1y$hҊ6CAO ;*`I˖ rI$ Uh)V|yT8_ w L'oy.? fX OIM)&2+. M ]54QYSp%GH(ýM4J>()0<;Nd|V1}FGep6cI͋NOMJHI٢'NBkk,/UuxAu\+܁9e)mhdb O5QsQ^Ig~>Ql~n@_\șs%Mx&NdM,$ܮDH6(XY]dDDJk4s_-8tQXIF $߯6 `C)qó Fvsњm"-UifR&_fT'ֆX%TsRU'}ΑVtx`%1?%BMʠkP4H:QySU@1QXfdLAJRᖥd[ '?#pܫȐi8CGsV l*;OF2ꤙ/nqZb-_b_HS4er$|TwʙE + |S3:͊bQ#]usV3k$yk:xUxg;uJ-;,tЛ &bFOu@QBipS ׫A]}15פ|C]eI!EF C7Pb&+_i^[<ͯːS@b2j(n{u cNŬimgυiPWi7nXoͬFrK֧<)[eN^ @ͦ6Z;b YHB;h?ÙqT?NlrƢ 4%i=]WF:pЫmkvWjJWv8cfB0c]*j6 GNc%hS铭{9ON-F[/NŦ~t,ya m|y #D^KHl}O)joJȲ̉l᧐ȡ{Y B{N7[k+9dW玣f\;dg.!bZU(*4--q)&firnwiY]/bUG=j,70[ Ƀa F|<3i֓6Z& 5-wЉA\s͉g[m `zyiS@1qx%ZX2LsCq"Vgk=J7O- 4*⌗S :(>|wmxX>>\<-ί7xǙ*ܕHc À]B vS}/o+PCS.hxúiF![W=8н0FkOö4NjgUL0E,P 72Rү{`@xpjV{0붍,٭Gb5Sj;ͬi6Ŀv jԒEEɰ3gX.h+}kǯm)z}3lxCș?G!nYWA\qCc>R҄#Z9W)t"&T<< 3Qa KR <" h^~*ja&d0nw]ٍ'B-؉JOei\æA0:ڱD[<䥤=6Qq6͜d ҁ \ {u6$X񵹥 H `Bb+\4G x`ت|٫&voU |Zˬ(HNJdt_$3z A\b]8ƶG.2v.f(6hd-I1LJ|)Wl9nv1ȚؓlwC[ ǿǦZm[QMQ]I(^U H1MHl,(NzɌ]yZmskoZ—ؒ 86oo|X֐Jz z"~ng5t~(5Vv+g2).NPVߒH Aџ|RkgSpg, \jT7E DB`Gf#D^8 0In[{Ȑl ɷ] C3bIIfZy v)!MFY vݷ@,Nly|j3&9bj6eO"鹾I&6&>j>C=bfXú)=}}g̿#.դy\D׌fHx:tuW5Go|L!i8 Jwby4QgzЁN X靇 ^e;4M0*_hyr\*(L@>Ա=ZzL^fx,ɀF6s0ȇx&~ᶲV Q2/x}܂Z}`gD9.͎%[)7'z1q BuH)tBӃb6!,V(Ăb{I(0v~g,DoNwb|f S ++&ŧ{vGs\Eoq^̠ݯs05)&.ҊY򬈪vw@ڂ\_nCG.uLZ~Q-`hW),{Th'-jѰK<@HuRC+ g% ƆR/Ng!~A/m9!)O5$NS:O{roO~NkyxKBf(tBSqm~QW y>t /fCw6#w YБr> fA|xg\|?lf>PbӨC}!M0*#039qWj^y&?&ija Y4md;Dlp0A!{3+J @@@ 3$4)| A*x>Zn+Pӯ;n1 *hGRSV:j#.>&mZɍÓ^H1\'GS>T?}3$(2u#M" P\ͽn4g)qgl9k,M0 Smq?g`ڎ~\&&d sy 7%M1~ƨ:Unu紬ڽ/*W\=m17xR/~Hi^Ar,H[A0D#SK:oFTЂ%hu~ c»yPT!$w!5c(DU$@Ok c=3Ic :,VE) +ZM=!^!bY!,[Xr<{]{x s?n#'C׺˒f"ֶMsgDzy{IcEpw܅9 㬵߽TP Zԧ1>%6[gpI ,.Mg]Q6mV1)-|2B u LF&w֬"k)b3L2a7FGɢ4:!`[VV IErudpB( =nu"vp+A6T.n0VF*D[?\ܶhN6XqعcjN1@:CV:GDIc瑯؟ l۽Wq3 B.L7ϟjj46й?CdUFM/{e!$1H*P"c;ω,&y=.DÄ*@5d&"@{qme`{"QEAU#1VjQZq-2u`FVV<2:Jt8:i+77P {e{.ңRk.xu +92闼MSp*Pgl _afXOj]<6 Vb`fI(F+a{uSlE4*t1}I vfPֻBG8 nv|f8BC2|[41MӫQɃߙK\(? Sf%5G!&HĒ.qdv'qsWD"᎔\ZԠ 0p;J3N$yvrZsRhı\]Z0B[jh*{֓33LMl2R3[B ^ko1&@jpi[xS0@+U{PFE ]C['Yp>DHV""t$2pZJX_fuDޝ9q16|l*JYK"%Xrn7)$2{"!gkcLa{oM[KwOiw~- JȭY x"&.zrc2Z?YԻF*\4+!E_r%$w:_a "BExMjAKR5c%0)Xߪ?c|ccH{pie2pLά^놦%~u|(=v6RY~{z\"t)s8̣vɇeWf78"wАB-MuLhZ@}h)T,(MJCFt9׻1WR l?+p[ŒT]y2D{  ZLWI/Ro[ڻӘ\*-hU [,ܾZKEɋix>+ډa!INuޟ˔ /\l+R?rW[oy"`:Ds^n+Y'eAQ䎯"\O\#% ~3 Jod⌹twM@*lKgjύf7n$7L2Xlj_J˜aF| L3,~87YIH`qbo-l|=ӈ琗w4%)`lG`0Vdiq,-~[ڍQٳSQ@ݢqȰ_rN,t] w; 09vC'[ͅiuDH}(W *2;?DUJ!kz'`LNeQQI1e j M9ӻm("uwũ$_X^Ay㳧]b)旝d8J 2F棡F!S93bPTFgK蟌wo30pLκ=M| =9~/q*m۸*":sPﳉ Y{m"Fgh>$ HtƢ}diN3q]˿f(re'%IOs!nAgnS{>2WTfաYN]ᕠDFɑ\! b<t?k%;%E"j4eXAv@E0ـ='xͥl`S+8UorQTuI)~w^D*yu^iuAsc|ZE{w宰 !*,"ndZS]DX ΖC=oR|2-ztॻġ}~Aǽ.{gAq BmN5!қ9ďP~&e,`(ǡ^}`7.o gH+.HCqS$XyԝaV* Yr~#}BQ_'G0K,EK`v<Bsާr'I{L{n델2#7ybpnfk9-U U|ۭ_{70x56r]hPfQY_ i1?ԷDk릠l3{Erh⃍#r%heL4ÈTPOeIMبK5EPUc'S}P=L,AU*ިRΧL:7c.D5GSUhkz*Hq*s:nf .s2tOlIgIC+Q~O?H R?#Xà,%:FY_Tt$?cL`&^?j4V{q^@ Zf:b{]{NM,kh(.ɽfd˫?V{&CUެYuP+_>?ۙ&bϼ\SD¾11ieÐ?"0괕Vl͸(Ud0 F97_Xa0kPF^gP:{K,#$\D<88{n T8-OR9aTtD<2s T.^trLAӽ%=9ƕV@>Y;Deg!Dգ9B9>߰UkЮ 6vZoe?SiHvWY-(gCz\J|2dp{z, *7*D@Ù xh7"e(|V~у7d3!(JP.Ecea]ATﭟOKMd' YZ