elfutils-0.177-150300.11.6.1<>,zd@ Ap9|K#GlQ89-@]TD3n3yp|&dSJ.+Y`zCÑU !HtY5u2c]rH_{ɲnMX1t'/._;*uy2LYް6M[W49/]=/uoM\Ƣo~NE)ٙD߳KV[/86EdRh-U*swO{|YJ*Ԣ10>>o<?o,d   H $=^o < r    o      ,  ( T(((S8\9:FY GY$HYIYXZYZ \ZH]Z^[b\7c\d]ce]hf]kl]mu]v]wkxkykznnnno(Celfutils0.177150300.11.6.1Higher-level library to access ELF fileselfutils is a collection of utilities and libraries to read, create and modify ELF binary files, find and handle DWARF debug data, symbols, thread state and stacktraces for processes and core files.d@ Aibs-arm-5zSUSE Linux Enterprise 15SUSE LLC GPL-3.0-or-laterhttps://www.suse.com/Development/Tools/Buildinghttps://sourceware.org/elfutils/linuxaarch64   h 8 8 H _  h P H p  X5V1 OGKA큤A큤d@ Td@ Td@ Td@ Td@ Td@ Td@ Td@ Bd@ Td@ Td@ Td@ Td@ Td@ Td@ Td@ Td@ Td@ 8]Sޑ]Sޑ]Sޑ]Sޑ]Sޑ]Sޑ]Sޑd@ 8]Sޑ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-0.177-150300.11.6.1.src.rpmelfutilselfutils(aarch-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    /bin/shld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libasm.so.1()(64bit)libasm.so.1(ELFUTILS_1.0)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.17)(64bit)libdw.so.1()(64bit)libdw.so.1(ELFUTILS_0.122)(64bit)libdw.so.1(ELFUTILS_0.126)(64bit)libdw.so.1(ELFUTILS_0.127)(64bit)libdw.so.1(ELFUTILS_0.130)(64bit)libdw.so.1(ELFUTILS_0.138)(64bit)libdw.so.1(ELFUTILS_0.148)(64bit)libdw.so.1(ELFUTILS_0.149)(64bit)libdw.so.1(ELFUTILS_0.158)(64bit)libdw.so.1(ELFUTILS_0.159)(64bit)libdw.so.1(ELFUTILS_0.160)(64bit)libdw.so.1(ELFUTILS_0.161)(64bit)libdw.so.1(ELFUTILS_0.165)(64bit)libdw.so.1(ELFUTILS_0.167)(64bit)libdw.so.1(ELFUTILS_0.171)(64bit)libdw.so.1(ELFUTILS_0.173)(64bit)libdw.so.1(ELFUTILS_0.177)(64bit)libelf.so.1()(64bit)libelf.so.1(ELFUTILS_1.0)(64bit)libelf.so.1(ELFUTILS_1.1)(64bit)libelf.so.1(ELFUTILS_1.1.1)(64bit)libelf.so.1(ELFUTILS_1.2)(64bit)libelf.so.1(ELFUTILS_1.3)(64bit)libelf.so.1(ELFUTILS_1.4)(64bit)libelf.so.1(ELFUTILS_1.5)(64bit)libelf.so.1(ELFUTILS_1.6)(64bit)libelf.so.1(ELFUTILS_1.7)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d?bb@by@]A\9[#@YbYm@YFk@Y*Y@X:@X@XDX@XJWu@W@Wq@W)@VяVpVO @U@TD@TTT>ameissner@suse.comjeffm@suse.comjeffm@suse.comschwab@suse.dejmoreira@suse.comjmoreira@suse.comjengelh@inai.dejengelh@inai.deschwab@linux-m68k.orgjengelh@inai.demliska@suse.czmliska@suse.czjengelh@inai.debwiedemann@suse.comrguenther@suse.commliska@suse.czmatz@suse.comschwab@suse.defcrozat@suse.comnormand@linux.vnet.ibm.comnormand@linux.vnet.ibm.comschwab@suse.deidonmez@suse.comtonyj@suse.comtonyj@suse.comtonyj@suse.comp.drouand@gmail.comjengelh@inai.de- 0001-libelf-Fixup-SHF_COMPRESSED-sh_addralign-in-elf_upda.patch: make debuginfo extraction from go1.19 built binaries work again. (bsc#1203599)- Added 4G memory build constraint for aarch64 to pass testing.- Update to version 0.177 (Martin Liška): elfclassify: New tool to analyze ELF objects. readelf: Print DW_AT_data_member_location as decimal offset. Decode DW_AT_discr_list block attributes. libdw: Add DW_AT_GNU_numerator, DW_AT_GNU_denominator and DW_AT_GNU_bias. libdwelf: Add dwelf_elf_e_machine_string. dwelf_elf_begin now only returns NULL when there is an error reading or decompressing a file. If the file is not an ELF file an ELF handle of type ELF_K_NONE is returned. backends: Add support for C-SKY. - Update to version 0.176 build: Add new --enable-install-elfh option. Do NOT use this for system installs (it overrides glibc elf.h). backends: riscv improved core file and return value location support. Fixes CVE-2019-7146, CVE-2019-7148, CVE-2019-7149, CVE-2019-7664 - CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bnc#1123685) - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (CVE is a bit misleading, as this is not a bug in libelf as described) (bnc#1125007) - Removed patches: - libdwfl-sanity-check-partial-core-file-dyn-data-read.patch - libebl-check-NT_PLATFORM-core-notes.patch - Update to version 0.175 (Martin Liška): readelf: Handle mutliple .debug_macro sections. Recognize and parse GNU Property, NT_VERSION and GNU Build Attribute ELF Notes. strip: Handle SHT_GROUP correctly. Add strip --reloc-debug-sections-only option. Handle relocations against GNU compressed sections. libdwelf: New function dwelf_elf_begin. libcpu: Recognize bpf jump variants BPF_JLT, BPF_JLE, BPF_JSLT and BPF_JSLE. backends: RISCV handles ADD/SUB relocations. Handle SHT_X86_64_UNWIND. - CVE-2018-18521: arlib: Divide-by-zero vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bnc#1112723) - CVE-2018-18310: Invalid Address Read problem in dwfl_segment_report_module.c (bnc#1111973) - CVE-2018-18520: eu-size: Bad handling of ar files inside are files (bnc#1112726) - Removed patches: - arlib-check-that-sh_entsize-isnt-zero.patch - libdwfl-sanity-check-partial-core-file-data-reads.patch - size-handle-recursive-elf-ar-files.patch - Update to version 0.174 (Martin Liška): libelf, libdw and all tools now handle extended shnum and shstrndx correctly. elfcompress: Don't rewrite input file if no section data needs updating. Try harder to keep same file mode bits (suid) on rewrite. strip: Handle mixed (out of order) allocated/non-allocated sections. unstrip: Handle SHT_GROUP sections. backends: RISCV and M68K now have backend implementations to generate CFI based backtraces. - CVE-2018-16402: libelf: denial of service/double free on an attempt to decompress the same section twice (bnc#1107066) Double-free crash in nm and readelf - CVE-2018-16403: heap buffer overflow in readelf (bnc#1107067) - CVE-2018-16062: heap-buffer-overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bnc#1106390) Removed patches: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch libdw-check-end-of-attributes-list-consistently.patch libdw-readelf-make-sure-there-is-enough-data-to-read.patch - Update to version 0.173 (Martin Liška): More fixes for crashes and hangs found by afl-fuzz. In particular various functions now detect and break infinite loops caused by bad DIE tree cycles. readelf: Will now lookup the size and signedness of constant value types to display them correctly (and not just how they were encoded). libdw: New function dwarf_next_lines to read CU-less .debug_line data. dwarf_begin_elf now accepts ELF files containing just .debug_line or .debug_frame sections (which can be read without needing a DIE tree from the .debug_info section). Removed dwarf_getscn_info, which was never implemented. backends: Handle BPF simple relocations. The RISCV backends now handles ABI specific CFI and knows about RISCV register types and names. - Update to version 0.172 (Martin Liška): No functional changes compared to 0.171. Various bug fixes in libdw and eu-readelf dealing with bad DWARF5 data. Thanks to running the afl fuzzer on eu-readelf and various testcases. - Update to version 0.171 (Martin Liška): DWARF5 and split dwarf, including GNU DebugFission, are supported now. Data can be read from the new DWARF sections .debug_addr, .debug_line_str, .debug_loclists, .debug_str_offsets and .debug_rnglists. Plus the new DWARF5 and GNU DebugFission encodings of the existing .debug sections. Also in split DWARF .dwo (DWARF object) files. This support is mostly handled by existing functions (dwarf_getlocation*, dwarf_getsrclines, dwarf_ranges, dwarf_form*, etc.) now returning the data from the new sections and data formats. But some new functions have been added to more easily get information about skeleton and split compile units (dwarf_get_units and dwarf_cu_info), handle new attribute data (dwarf_getabbrevattr_data) and to keep references to Dwarf_Dies that might come from different sections or files (dwarf_die_addr_die). Not yet supported are .dwp (Dwarf Package) and .sup (Dwarf Supplementary) files, the .debug_names index, the .debug_cu_index and .debug_tu_index sections. Only a single .debug_info (and .debug_types) section are currently handled. readelf: Handle all new DWARF5 sections. - -debug-dump=info+ will show split unit DIEs when found. - -dwarf-skeleton can be used when inspecting a .dwo file. Recognizes GNU locviews with --debug-dump=loc. libdw: New functions dwarf_die_addr_die, dwarf_get_units, dwarf_getabbrevattr_data and dwarf_cu_info. libdw will now try to resolve the alt file on first use of an alt attribute FORM when not set yet with dwarf_set_alt. dwarf_aggregate_size() now works with multi-dimensional arrays. libdwfl: Use process_vm_readv when available instead of ptrace. backends: Add a RISC-V backend. There were various improvements to build on Windows. The sha1 and md5 implementations have been removed, they weren't used. - Update to version 0.170 (Martin Liška): libdw: Added new DWARF5 attribute, tag, character encoding, language code, calling convention, defaulted member function and macro constants to dwarf.h. New functions dwarf_default_lower_bound and dwarf_line_file. dwarf_peel_type now handles DWARF5 immutable, packed and shared tags. dwarf_getmacros now handles DWARF5 .debug_macro sections. strip: Add -R, --remove-section=SECTION and --keep-section=SECTION. backends: The bpf disassembler is now always build on all platforms. - Includes changes in 0.169 backends: Add support for EM_PPC64 GNU_ATTRIBUTES. Frame pointer unwinding fallback support for i386, x86_64, aarch64. translations: Update Polish translation. - CVE-2017-7611: elfutils: DoS (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033088) - CVE-2017-7610: elflint: heap-based buffer overflow in check_group (bnc#1033087) - CVE-2017-7609: memory allocation failure in __libelf_decompress (bnc#1033086) - CVE-2017-7607: heap-based buffer overflow in handle_gnu_hashi (readelf.c) (bnc#1033084) - CVE-2017-7608: heap-based buffer overflow in ebl_object_note_type_name (eblobjnotetypename.c) (bnc#1033085) - CVE-2017-7613: elfutils: denial of service (memory consumption) via a crafted ELF file (bnc#1033090) - CVE-2017-7612: elfutils: denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033089) - Removed patches: - obsolete 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch - ppc-machine-flags.patch - elflint-check-symbol-table-data-is-big-enough-before-check.patch - elflint-dont-check-section-group-without-flags-word.patch - libelf-check-compression-before-allocate-output-buffer.patch - readelf-fix-off-by-one-sanity-check.patch - use-the-empty-string-for-note-names-with-zero-size.patch - elflint-sanity-check-the-number-of-phdrs-and-shdrs.patch - elfutils-dont-trust-sh_entsize.patch - Packaging cleanups: - Modernize specfile and metadata. (Jan Engelhardt) - Use %make_build (Martin Liška) - Update License tag to GPL-3.0-or-later, as requested by legal review. (Dominique Leuenberger) - Don't make elfutils recommend elfutils-lang as elfutils-lang already supplements elfutils. (Antoine Belvire) - Fix typo in the recommends name bsc#1104264 (Tomas Chvatal) - Use %license (boo#1082318) (Fabian Vogt) - Test fixes (Andreas Schwab): - disable-tests-with-ptrace.patch: Remove, set XFAIL_TESTS instead - dwelf_elf_e_machine_string.patch: Avoid spurious failure- disable-tests-with-ptrace.patch: Remove, set XFAIL_TESTS instead - dwelf_elf_e_machine_string.patch: Avoid spurious failure- CVE-2018-16402: libelf: denial of service/double free on an attempt to decompress the same section twice (bnc#1107066) Add patch: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch - CVE-2018-18521: arlib: Divide-by-zero vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bnc#1112723) Add patch: arlib-check-that-sh_entsize-isnt-zero.patch - CVE-2017-7611: elfutils: DoS (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033088) Add patch: elflint-check-symbol-table-data-is-big-enough-before-check.patch - CVE-2017-7610: elflint: heap-based buffer overflow in check_group (bnc#1033087) Add patch: elflint-dont-check-section-group-without-flags-word.patch - CVE-2018-16403: heap buffer overflow in readelf (bnc#1107067) Add patch: libdw-check-end-of-attributes-list-consistently.patch - CVE-2018-16062: heap-buffer-overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bnc#1106390) Add patch: libdw-readelf-make-sure-there-is-enough-data-to-read.patch - CVE-2018-18310: Invalid Address Read problem in dwfl_segment_report_module.c (bnc#1111973) Add patch: libdwfl-sanity-check-partial-core-file-data-reads.patch - CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bnc#1123685) Add patch: libdwfl-sanity-check-partial-core-file-dyn-data-read.patch - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (CVE is a bit misleading, as this is not a bug in libelf as described) (bnc#1125007) Add patch: libebl-check-NT_PLATFORM-core-notes.patch - CVE-2017-7609: memory allocation failure in __libelf_decompress (bnc#1033086) Add patch: libelf-check-compression-before-allocate-output-buffer.patch - CVE-2018-16402: Double-free crash in nm and readelf (bnc#1107066) Add patch: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch - CVE-2017-7607: heap-based buffer overflow in handle_gnu_hashi (readelf.c) (bnc#1033084) Add patch: readelf-fix-off-by-one-sanity-check.patch - CVE-2018-18520: eu-size: Bad handling of ar files inside are files (bnc#1112726) Add patch: size-handle-recursive-elf-ar-files.patch - CVE-2017-7608: heap-based buffer overflow in ebl_object_note_type_name (eblobjnotetypename.c) (bnc#1033085) Add patch: use-the-empty-string-for-note-names-with-zero-size.patch- CVE-2017-7613: elfutils: denial of service (memory consumption) via a crafted ELF file (bnc#1033090) Add patch: elflint-sanity-check-the-number-of-phdrs-and-shdrs.patch - CVE-2017-7612: elfutils: denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033089) Add patch: elfutils-dont-trust-sh_entsize.patch- Restore obsolete on libebl.- Update package descriptions. - Rename libebl1 to libebl-plugins as these are not linked, but dlopened using their unversioned libebl_$ARCH.so name. - Have libelf1 require libebl-plugins (libebl.a, which does the dlopen call, is staticly built into libelf1). This is necessary for pahole to display its results. [boo#1049871]- ppc-machine-flags.patch: support EM_PPC machine flags - disable-tests-with-ptrace.patch: disable more tests- Update Git-Clone URL- Add 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch unconditionally in the spec file. As we can't support binary diff, a newly added test-case is removed from the patch.- Add 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch: fix .gnu.attributes checking on ppc64{,le}.- Add missing ldconfig calls for libasm1- make tests pass when user does not want debuginfo (boo#1031556)- Update to version 0.168: libelf: gelf_newehdr and gelf_newehdr now return void *. libdw: dwarf.h corrected the DW_LANG_PLI constant name (was DW_LANG_PL1). readelf: Add optional --symbols[=SECTION] argument to select section name. - Includes changes from 0001-Add-GCC7-Wimplicit-fallthrough-support-fixes.patch and 0001-ar-Fix-GCC7-Wformat-length-issues.patch. - Remove elfutils-0.137-dwarf-header-check-fix.diff which is no longer required after a debugedit fix.- Add 0001-Add-GCC7-Wimplicit-fallthrough-support-fixes.patch: fix new warning introduced in GCC 7. - Add 0001-ar-Fix-GCC7-Wformat-length-issues.patch: fix -Wformat-length warning introduced in GCC 7.- Update to version 0.167: libasm: Add eBPF disassembler for EM_BPF files. backends: Add m68k and BPF backends. ld: Removed. dwelf: Add ELF/DWARF string table creation functions. dwelf_strtab_init, dwelf_strtab_add, dwelf_strtab_add_len, dwelf_strtab_finalize, dwelf_strent_off, dwelf_strent_str and dwelf_strtab_free. Support compressed sections from binutils 2.27. - Remove patch elfutils-0.166-elfcmp-comp-gcc6.patch: included upstream.- disable-tests-with-ptrace.patch: disable tests that use ptrace when running under qemu-linux-user- Update to version 0.166: + config: The default program prefix for the installed tools is now eu-. Use configure --program-prefix="" to not use a program prefix. + Various bugfixes. - Drop elfutils-0.164-dt-ppc-opt.patch and elfutils-0.164-gcc6.patch (merged upstream) - Add patch elfutils-0.166-elfcmp-comp-gcc6.patch: fix self-comparison error with GCC 6. - Changes from 0.165: + Add eu-elfcompress + Add pkg-config files for libelf and libdw.- add elfutils-0.164-gcc6.patch- rename dt-ppc-opt.patch as elfutils-0.164-dt-ppc-opt.patch and add reference to upstream commit id- dt-ppc-opt.patch: add support for DT_PPC_OPT- Update to version 0.164 Drop the following patches, fixed upstream: * elfutils-portability-0.163.patch * elfutils-revert-portability-scanf.patch * elfutils-uninitialized.diff * libebl-prototype-fix.diff Changelog: - strip, unstrip: * Handle ELF files with merged strtab/shstrtab tables. * Handle missing SHF_INFO_LINK section flags. - libelf: * Use int64_t for offsets in libelf.h instead of loff_t. - libdw: * dwarf.h Add preliminary DWARF5 DW_LANG_Haskell. - libdwfl: * dwfl_standard_find_debuginfo now searches any subdir of the binary path under the debuginfo root when the separate debug file couldn't be found by build-id. * dwfl_linux_proc_attach can now be called before any Dwfl_Modules have been reported. - Implement %check- Update to version 0.163 Drop patch elfutils-fix-dir-traversal-vuln-in-ar-extraction.patch Drop patch elfutils-0.148-dont-crash.diff (fixed by 9ceebe69) Drop patch elfutils-portability-0.161.patch Add patch elfutils-portability-0.163.patch Changelog: 0.163: - Bug fixes only, no new features. 0.162: - libdw: Install new header elfutils/known-dwarf.h. dwarf.h Add preliminary DWARF5 constants DW_TAG_atomic_type, DW_LANG_Fortran03, DW_LANG_Fortran08. dwarf_peel_type now also handles DW_TAG_atomic_type. - addr2line: Input addresses are now always interpreted as hexadecimal numbers, never as octal or decimal numbers. New option -a, --addresses to print address before each entry. New option -C, --demangle to show demangled symbols. New option --pretty-print to print all information on one line. - ar: CVE-2014-9447 Directory traversal vulnerability in ar extraction. - backends: x32 support.- Make ebl modversion predictable to allow build-compare (bnc#916043)- CVE-2014-9447: elfutils: Directory traversal vulnerability (bnc#911662) Add patch: elfutils-fix-dir-traversal-vuln-in-ar-extraction.patch- Update to version 0.161 + libdw: New function dwarf_peel_type. dwarf_aggregate_size now uses dwarf_peel_type to also provide the sizes of qualified types. dwarf_getmacros will now serve either of .debug_macro and .debug_macinfo transparently. New interfaces dwarf_getmacros_off, dwarf_macro_getsrcfiles, dwarf_macro_getparamcnt, and dwarf_macro_param are available for more generalized inspection of macros and their parameters. dwarf.h: Add DW_AT_GNU_deleted, DW_AT_noreturn, DW_LANG_C11, DW_LANG_C_plus_plus_11 and DW_LANG_C_plus_plus_14. - Remove merged patches + elfutils-robustify.patch + elfutils-no-po-test-build.diff + elfutils-check-for-overflow-before-calling-malloc-to-uncompress-data.patch - Refreshed patch (from Fedora sources) + elfutils-portability.patch > elfutils-portability-0.161.patch - Add a lang subpackage- Update homepage URL and improve RPM group classificationibs-arm-5 1681918785 0.177-150300.11.6.10.177-150300.11.6.1eu-addr2lineeu-areu-elfclassifyeu-elfcmpeu-elfcompresseu-elflinteu-findtextreleu-make-debug-archiveeu-nmeu-objdumpeu-ranlibeu-readelfeu-sizeeu-stackeu-stringseu-stripeu-unstripelfutilsAUTHORSChangeLogNEWSNOTESREADMETHANKSTODOelfutilsCOPYING/usr/bin//usr/share/doc/packages//usr/share/doc/packages/elfutils//usr/share/licenses//usr/share/licenses/elfutils/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:28668/SUSE_SLE-15-SP3_Update/0af6bf54508082dd78ff0a301413ca59-elfutils.SUSE_SLE-15-SP3_Updatedrpmxz5aarch64-suse-linux ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=1c0bdb0c530640217a3ac2b6725de79a1b609ff1, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=44d11929a47d2e797fb2de1eefd9d67769a328e1, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=5a9a521f5d2c81de94caeef1ba7dc61f3610aa6f, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=428d44136af31a47e971407d8386d37182a67fb3, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=918d4799cfb643442384a644bfa02aadec3dded5, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=c78fd5739caa91821b670470703314ebde3247e3, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=9554c76bcc83132c20ca745584beb6fa77b29da0, for GNU/Linux 3.7.0, strippedPOSIX shell script, ASCII text executableELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=2e98405558c8f669eb41a41f502ff83a0b2b70b2, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=c2976e70b98ea204d4165c77012417ad5a99c527, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=f961876194371842f131e365f161b698de595891, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=3f945d9c6c24f889368b8f49f924eb5cdc1e10da, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=b6ca8a05d52fd5e2e5a3fe54295138784deeb0ed, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=edbc97f3dee874d7abd512721ede0830cc5f4559, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=273eefa2b1ef4b54d209dd333e2f8ae0af59d597, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=219b7fcc0666bf78626c88d015f731bace962e01, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=76eb67b16723bbf5d3fd6106831bbd5d8f577a61, for GNU/Linux 3.7.0, strippeddirectoryASCII text *5AJKVah     RRRRRR R R!RR RRRRRRRRRRRRR!RR"RRRR RRRRRR!R"RRRRRRRRR!R"R#RRRR RRRRRRR#RRRRRRRRR RR"RR RRRRRRR R!RRR RRRRRRRR!RRRRRRRRRRRRRRRRRRRRRRRRRRR RR R!R"RR#RRR RRRRRR!R"RRRRRRRRR R RRRR RRRR!RRRRRRRRR!R"R#RRRR RRRRRRR R R!R"RRRR RR3xճO+=utf-8483a66d51a577af62fba92b2770711ae230c340ca82a622ca93b2383f7ab45f8? 7zXZ !t/]"k%ZhWGG~Ty6U.@Ƚj?p`f=,c1;s1y#]Ū##Sj1۟R?[vcaXbbbqřc8K 9Is#]bj?{ҘsET8*#u B'>iPN/Nf"Pk<i2 ~5 Fк1-3?;+)",J=uDV&Q'$\P-7|1k<LrD d$#Y` 6{{qDɾ%,r / 򝟋ʟ& (ύSO1{E<,P1ܼ>5Z=b%Lȝl9U =&YЭMJfj6Y)F'xGs?Z8` "wE Di"Aҫp6/d^N>TW*51'f5GBrbxg cZĽ0я+ N\t]Vv ǥ*@?@R8%4'/<ыjOuclZc{Scƽ&$sw f`t`"g Pga$PnFŮKOFnѬ0!d:`&CV~2E=Ga )$!TgMBo_c 9/Ţm<|Dn"[E8Sq P!}^\#*)HVA+QO4!Dh??J" 򧻱}Cc_m^:;:G==QJƊD e[ӫ=QK59xvR9GwqK[ͥB^{ʤ2.e/HrxAHð~<34vLLW'.ĤZecmAn)Ů2N>Ac MwM)! +|k^@jf0m7Aj7y łbIos1jfpb=Ħfw3VП+XFNʜP:^[otZ':l_"Wq\D h5~R#Gw$'_di ؉D01`0/#,s7WGb+=e}sf+{oM[SbºD.I$F JP.>)q +o(iJmTa-cIH p\E6Ncg+uX"(>QnW~.2w7xXǼqA#_Qt:Z48pS9@<{L`m˲5?j`!9={Xgopcd.8cd8~gv(?4 Qs\Ł2OUt]|G77_ܴ,xBܧ'ľf 8&-N6g#/ejnY(ǹ VdJ!fWI(}rj4KL$_h~5SFde x,"2POGaN(lp-QVYMwdٳcx[~4Z !$+p,%& !KVtj#iղ*7D*2 8M쇻e0% YZ