libdw1-0.177-150300.11.6.1<>,]d@ Ap9|I!2A~ tLd,!l s3տ6{;`dO\}U{Y&`% Ia Hƅ0'^.8sWa[kBh}KjE_[6yrOphb-u8٧5HXXb"[/ LoEܮȨ.2Ke-_l?.+ ~F2oRǺ/fǮf"bM!ʧ H~1*:>,Vug+]d5|">@U?U d   K' =Nou     080(89 4: >Pt@PFPGPHPIPXPYQ0\Qt]Q|^QbQcRKdReRfRlRuRvRwSxSySEzTTTTUClibdw10.177150300.11.6.1Library to access DWARF debugging informationThis package provides a high-level library to access the DWARF debugging information. This is part of the elfutils package.d@ Aibs-arm-5SUSE Linux Enterprise 15SUSE LLC GPL-3.0-or-laterhttps://www.suse.com/System/Librarieshttps://sourceware.org/elfutils/linuxaarch64d@ Td@ Qb497762fd99bd4379dcfe5bcbf31ec162be3687b05187902da3ae368f3424663libdw-0.177.sorootrootrootrootelfutils-0.177-150300.11.6.1.src.rpmlibdw.so.1()(64bit)libdw.so.1(ELFUTILS_0)(64bit)libdw.so.1(ELFUTILS_0.122)(64bit)libdw.so.1(ELFUTILS_0.126)(64bit)libdw.so.1(ELFUTILS_0.127)(64bit)libdw.so.1(ELFUTILS_0.130)(64bit)libdw.so.1(ELFUTILS_0.136)(64bit)libdw.so.1(ELFUTILS_0.138)(64bit)libdw.so.1(ELFUTILS_0.142)(64bit)libdw.so.1(ELFUTILS_0.143)(64bit)libdw.so.1(ELFUTILS_0.144)(64bit)libdw.so.1(ELFUTILS_0.146)(64bit)libdw.so.1(ELFUTILS_0.148)(64bit)libdw.so.1(ELFUTILS_0.149)(64bit)libdw.so.1(ELFUTILS_0.156)(64bit)libdw.so.1(ELFUTILS_0.157)(64bit)libdw.so.1(ELFUTILS_0.158)(64bit)libdw.so.1(ELFUTILS_0.159)(64bit)libdw.so.1(ELFUTILS_0.160)(64bit)libdw.so.1(ELFUTILS_0.161)(64bit)libdw.so.1(ELFUTILS_0.165)(64bit)libdw.so.1(ELFUTILS_0.167)(64bit)libdw.so.1(ELFUTILS_0.170)(64bit)libdw.so.1(ELFUTILS_0.171)(64bit)libdw.so.1(ELFUTILS_0.173)(64bit)libdw.so.1(ELFUTILS_0.175)(64bit)libdw.so.1(ELFUTILS_0.177)(64bit)libdw1libdw1(aarch-64)@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libbz2.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.17)(64bit)libelf.so.1()(64bit)libelf.so.1(ELFUTILS_1.0)(64bit)libelf.so.1(ELFUTILS_1.3)(64bit)libelf.so.1(ELFUTILS_1.5)(64bit)libelf.so.1(ELFUTILS_1.6)(64bit)libelf.so.1(ELFUTILS_1.7)(64bit)liblzma.so.5()(64bit)liblzma.so.5(XZ_5.0)(64bit)libz.so.1()(64bit)libz.so.1(ZLIB_1.2.2.3)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d?bb@by@]A\9[#@YbYm@YFk@Y*Y@X:@X@XDX@XJWu@W@Wq@W)@VяVpVO @U@TD@TTT>ameissner@suse.comjeffm@suse.comjeffm@suse.comschwab@suse.dejmoreira@suse.comjmoreira@suse.comjengelh@inai.dejengelh@inai.deschwab@linux-m68k.orgjengelh@inai.demliska@suse.czmliska@suse.czjengelh@inai.debwiedemann@suse.comrguenther@suse.commliska@suse.czmatz@suse.comschwab@suse.defcrozat@suse.comnormand@linux.vnet.ibm.comnormand@linux.vnet.ibm.comschwab@suse.deidonmez@suse.comtonyj@suse.comtonyj@suse.comtonyj@suse.comp.drouand@gmail.comjengelh@inai.de- 0001-libelf-Fixup-SHF_COMPRESSED-sh_addralign-in-elf_upda.patch: make debuginfo extraction from go1.19 built binaries work again. (bsc#1203599)- Added 4G memory build constraint for aarch64 to pass testing.- Update to version 0.177 (Martin Liška): elfclassify: New tool to analyze ELF objects. readelf: Print DW_AT_data_member_location as decimal offset. Decode DW_AT_discr_list block attributes. libdw: Add DW_AT_GNU_numerator, DW_AT_GNU_denominator and DW_AT_GNU_bias. libdwelf: Add dwelf_elf_e_machine_string. dwelf_elf_begin now only returns NULL when there is an error reading or decompressing a file. If the file is not an ELF file an ELF handle of type ELF_K_NONE is returned. backends: Add support for C-SKY. - Update to version 0.176 build: Add new --enable-install-elfh option. Do NOT use this for system installs (it overrides glibc elf.h). backends: riscv improved core file and return value location support. Fixes CVE-2019-7146, CVE-2019-7148, CVE-2019-7149, CVE-2019-7664 - CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bnc#1123685) - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (CVE is a bit misleading, as this is not a bug in libelf as described) (bnc#1125007) - Removed patches: - libdwfl-sanity-check-partial-core-file-dyn-data-read.patch - libebl-check-NT_PLATFORM-core-notes.patch - Update to version 0.175 (Martin Liška): readelf: Handle mutliple .debug_macro sections. Recognize and parse GNU Property, NT_VERSION and GNU Build Attribute ELF Notes. strip: Handle SHT_GROUP correctly. Add strip --reloc-debug-sections-only option. Handle relocations against GNU compressed sections. libdwelf: New function dwelf_elf_begin. libcpu: Recognize bpf jump variants BPF_JLT, BPF_JLE, BPF_JSLT and BPF_JSLE. backends: RISCV handles ADD/SUB relocations. Handle SHT_X86_64_UNWIND. - CVE-2018-18521: arlib: Divide-by-zero vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bnc#1112723) - CVE-2018-18310: Invalid Address Read problem in dwfl_segment_report_module.c (bnc#1111973) - CVE-2018-18520: eu-size: Bad handling of ar files inside are files (bnc#1112726) - Removed patches: - arlib-check-that-sh_entsize-isnt-zero.patch - libdwfl-sanity-check-partial-core-file-data-reads.patch - size-handle-recursive-elf-ar-files.patch - Update to version 0.174 (Martin Liška): libelf, libdw and all tools now handle extended shnum and shstrndx correctly. elfcompress: Don't rewrite input file if no section data needs updating. Try harder to keep same file mode bits (suid) on rewrite. strip: Handle mixed (out of order) allocated/non-allocated sections. unstrip: Handle SHT_GROUP sections. backends: RISCV and M68K now have backend implementations to generate CFI based backtraces. - CVE-2018-16402: libelf: denial of service/double free on an attempt to decompress the same section twice (bnc#1107066) Double-free crash in nm and readelf - CVE-2018-16403: heap buffer overflow in readelf (bnc#1107067) - CVE-2018-16062: heap-buffer-overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bnc#1106390) Removed patches: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch libdw-check-end-of-attributes-list-consistently.patch libdw-readelf-make-sure-there-is-enough-data-to-read.patch - Update to version 0.173 (Martin Liška): More fixes for crashes and hangs found by afl-fuzz. In particular various functions now detect and break infinite loops caused by bad DIE tree cycles. readelf: Will now lookup the size and signedness of constant value types to display them correctly (and not just how they were encoded). libdw: New function dwarf_next_lines to read CU-less .debug_line data. dwarf_begin_elf now accepts ELF files containing just .debug_line or .debug_frame sections (which can be read without needing a DIE tree from the .debug_info section). Removed dwarf_getscn_info, which was never implemented. backends: Handle BPF simple relocations. The RISCV backends now handles ABI specific CFI and knows about RISCV register types and names. - Update to version 0.172 (Martin Liška): No functional changes compared to 0.171. Various bug fixes in libdw and eu-readelf dealing with bad DWARF5 data. Thanks to running the afl fuzzer on eu-readelf and various testcases. - Update to version 0.171 (Martin Liška): DWARF5 and split dwarf, including GNU DebugFission, are supported now. Data can be read from the new DWARF sections .debug_addr, .debug_line_str, .debug_loclists, .debug_str_offsets and .debug_rnglists. Plus the new DWARF5 and GNU DebugFission encodings of the existing .debug sections. Also in split DWARF .dwo (DWARF object) files. This support is mostly handled by existing functions (dwarf_getlocation*, dwarf_getsrclines, dwarf_ranges, dwarf_form*, etc.) now returning the data from the new sections and data formats. But some new functions have been added to more easily get information about skeleton and split compile units (dwarf_get_units and dwarf_cu_info), handle new attribute data (dwarf_getabbrevattr_data) and to keep references to Dwarf_Dies that might come from different sections or files (dwarf_die_addr_die). Not yet supported are .dwp (Dwarf Package) and .sup (Dwarf Supplementary) files, the .debug_names index, the .debug_cu_index and .debug_tu_index sections. Only a single .debug_info (and .debug_types) section are currently handled. readelf: Handle all new DWARF5 sections. - -debug-dump=info+ will show split unit DIEs when found. - -dwarf-skeleton can be used when inspecting a .dwo file. Recognizes GNU locviews with --debug-dump=loc. libdw: New functions dwarf_die_addr_die, dwarf_get_units, dwarf_getabbrevattr_data and dwarf_cu_info. libdw will now try to resolve the alt file on first use of an alt attribute FORM when not set yet with dwarf_set_alt. dwarf_aggregate_size() now works with multi-dimensional arrays. libdwfl: Use process_vm_readv when available instead of ptrace. backends: Add a RISC-V backend. There were various improvements to build on Windows. The sha1 and md5 implementations have been removed, they weren't used. - Update to version 0.170 (Martin Liška): libdw: Added new DWARF5 attribute, tag, character encoding, language code, calling convention, defaulted member function and macro constants to dwarf.h. New functions dwarf_default_lower_bound and dwarf_line_file. dwarf_peel_type now handles DWARF5 immutable, packed and shared tags. dwarf_getmacros now handles DWARF5 .debug_macro sections. strip: Add -R, --remove-section=SECTION and --keep-section=SECTION. backends: The bpf disassembler is now always build on all platforms. - Includes changes in 0.169 backends: Add support for EM_PPC64 GNU_ATTRIBUTES. Frame pointer unwinding fallback support for i386, x86_64, aarch64. translations: Update Polish translation. - CVE-2017-7611: elfutils: DoS (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033088) - CVE-2017-7610: elflint: heap-based buffer overflow in check_group (bnc#1033087) - CVE-2017-7609: memory allocation failure in __libelf_decompress (bnc#1033086) - CVE-2017-7607: heap-based buffer overflow in handle_gnu_hashi (readelf.c) (bnc#1033084) - CVE-2017-7608: heap-based buffer overflow in ebl_object_note_type_name (eblobjnotetypename.c) (bnc#1033085) - CVE-2017-7613: elfutils: denial of service (memory consumption) via a crafted ELF file (bnc#1033090) - CVE-2017-7612: elfutils: denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033089) - Removed patches: - obsolete 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch - ppc-machine-flags.patch - elflint-check-symbol-table-data-is-big-enough-before-check.patch - elflint-dont-check-section-group-without-flags-word.patch - libelf-check-compression-before-allocate-output-buffer.patch - readelf-fix-off-by-one-sanity-check.patch - use-the-empty-string-for-note-names-with-zero-size.patch - elflint-sanity-check-the-number-of-phdrs-and-shdrs.patch - elfutils-dont-trust-sh_entsize.patch - Packaging cleanups: - Modernize specfile and metadata. (Jan Engelhardt) - Use %make_build (Martin Liška) - Update License tag to GPL-3.0-or-later, as requested by legal review. (Dominique Leuenberger) - Don't make elfutils recommend elfutils-lang as elfutils-lang already supplements elfutils. (Antoine Belvire) - Fix typo in the recommends name bsc#1104264 (Tomas Chvatal) - Use %license (boo#1082318) (Fabian Vogt) - Test fixes (Andreas Schwab): - disable-tests-with-ptrace.patch: Remove, set XFAIL_TESTS instead - dwelf_elf_e_machine_string.patch: Avoid spurious failure- disable-tests-with-ptrace.patch: Remove, set XFAIL_TESTS instead - dwelf_elf_e_machine_string.patch: Avoid spurious failure- CVE-2018-16402: libelf: denial of service/double free on an attempt to decompress the same section twice (bnc#1107066) Add patch: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch - CVE-2018-18521: arlib: Divide-by-zero vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bnc#1112723) Add patch: arlib-check-that-sh_entsize-isnt-zero.patch - CVE-2017-7611: elfutils: DoS (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033088) Add patch: elflint-check-symbol-table-data-is-big-enough-before-check.patch - CVE-2017-7610: elflint: heap-based buffer overflow in check_group (bnc#1033087) Add patch: elflint-dont-check-section-group-without-flags-word.patch - CVE-2018-16403: heap buffer overflow in readelf (bnc#1107067) Add patch: libdw-check-end-of-attributes-list-consistently.patch - CVE-2018-16062: heap-buffer-overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bnc#1106390) Add patch: libdw-readelf-make-sure-there-is-enough-data-to-read.patch - CVE-2018-18310: Invalid Address Read problem in dwfl_segment_report_module.c (bnc#1111973) Add patch: libdwfl-sanity-check-partial-core-file-data-reads.patch - CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bnc#1123685) Add patch: libdwfl-sanity-check-partial-core-file-dyn-data-read.patch - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (CVE is a bit misleading, as this is not a bug in libelf as described) (bnc#1125007) Add patch: libebl-check-NT_PLATFORM-core-notes.patch - CVE-2017-7609: memory allocation failure in __libelf_decompress (bnc#1033086) Add patch: libelf-check-compression-before-allocate-output-buffer.patch - CVE-2018-16402: Double-free crash in nm and readelf (bnc#1107066) Add patch: libelf-error-if-elf_compress_gnu-is-used-on-SHF_COMPRESSED.patch - CVE-2017-7607: heap-based buffer overflow in handle_gnu_hashi (readelf.c) (bnc#1033084) Add patch: readelf-fix-off-by-one-sanity-check.patch - CVE-2018-18520: eu-size: Bad handling of ar files inside are files (bnc#1112726) Add patch: size-handle-recursive-elf-ar-files.patch - CVE-2017-7608: heap-based buffer overflow in ebl_object_note_type_name (eblobjnotetypename.c) (bnc#1033085) Add patch: use-the-empty-string-for-note-names-with-zero-size.patch- CVE-2017-7613: elfutils: denial of service (memory consumption) via a crafted ELF file (bnc#1033090) Add patch: elflint-sanity-check-the-number-of-phdrs-and-shdrs.patch - CVE-2017-7612: elfutils: denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bnc#1033089) Add patch: elfutils-dont-trust-sh_entsize.patch- Restore obsolete on libebl.- Update package descriptions. - Rename libebl1 to libebl-plugins as these are not linked, but dlopened using their unversioned libebl_$ARCH.so name. - Have libelf1 require libebl-plugins (libebl.a, which does the dlopen call, is staticly built into libelf1). This is necessary for pahole to display its results. [boo#1049871]- ppc-machine-flags.patch: support EM_PPC machine flags - disable-tests-with-ptrace.patch: disable more tests- Update Git-Clone URL- Add 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch unconditionally in the spec file. As we can't support binary diff, a newly added test-case is removed from the patch.- Add 0001-backends-Add-support-for-EM_PPC64-GNU_ATTRIBUTES.patch: fix .gnu.attributes checking on ppc64{,le}.- Add missing ldconfig calls for libasm1- make tests pass when user does not want debuginfo (boo#1031556)- Update to version 0.168: libelf: gelf_newehdr and gelf_newehdr now return void *. libdw: dwarf.h corrected the DW_LANG_PLI constant name (was DW_LANG_PL1). readelf: Add optional --symbols[=SECTION] argument to select section name. - Includes changes from 0001-Add-GCC7-Wimplicit-fallthrough-support-fixes.patch and 0001-ar-Fix-GCC7-Wformat-length-issues.patch. - Remove elfutils-0.137-dwarf-header-check-fix.diff which is no longer required after a debugedit fix.- Add 0001-Add-GCC7-Wimplicit-fallthrough-support-fixes.patch: fix new warning introduced in GCC 7. - Add 0001-ar-Fix-GCC7-Wformat-length-issues.patch: fix -Wformat-length warning introduced in GCC 7.- Update to version 0.167: libasm: Add eBPF disassembler for EM_BPF files. backends: Add m68k and BPF backends. ld: Removed. dwelf: Add ELF/DWARF string table creation functions. dwelf_strtab_init, dwelf_strtab_add, dwelf_strtab_add_len, dwelf_strtab_finalize, dwelf_strent_off, dwelf_strent_str and dwelf_strtab_free. Support compressed sections from binutils 2.27. - Remove patch elfutils-0.166-elfcmp-comp-gcc6.patch: included upstream.- disable-tests-with-ptrace.patch: disable tests that use ptrace when running under qemu-linux-user- Update to version 0.166: + config: The default program prefix for the installed tools is now eu-. Use configure --program-prefix="" to not use a program prefix. + Various bugfixes. - Drop elfutils-0.164-dt-ppc-opt.patch and elfutils-0.164-gcc6.patch (merged upstream) - Add patch elfutils-0.166-elfcmp-comp-gcc6.patch: fix self-comparison error with GCC 6. - Changes from 0.165: + Add eu-elfcompress + Add pkg-config files for libelf and libdw.- add elfutils-0.164-gcc6.patch- rename dt-ppc-opt.patch as elfutils-0.164-dt-ppc-opt.patch and add reference to upstream commit id- dt-ppc-opt.patch: add support for DT_PPC_OPT- Update to version 0.164 Drop the following patches, fixed upstream: * elfutils-portability-0.163.patch * elfutils-revert-portability-scanf.patch * elfutils-uninitialized.diff * libebl-prototype-fix.diff Changelog: - strip, unstrip: * Handle ELF files with merged strtab/shstrtab tables. * Handle missing SHF_INFO_LINK section flags. - libelf: * Use int64_t for offsets in libelf.h instead of loff_t. - libdw: * dwarf.h Add preliminary DWARF5 DW_LANG_Haskell. - libdwfl: * dwfl_standard_find_debuginfo now searches any subdir of the binary path under the debuginfo root when the separate debug file couldn't be found by build-id. * dwfl_linux_proc_attach can now be called before any Dwfl_Modules have been reported. - Implement %check- Update to version 0.163 Drop patch elfutils-fix-dir-traversal-vuln-in-ar-extraction.patch Drop patch elfutils-0.148-dont-crash.diff (fixed by 9ceebe69) Drop patch elfutils-portability-0.161.patch Add patch elfutils-portability-0.163.patch Changelog: 0.163: - Bug fixes only, no new features. 0.162: - libdw: Install new header elfutils/known-dwarf.h. dwarf.h Add preliminary DWARF5 constants DW_TAG_atomic_type, DW_LANG_Fortran03, DW_LANG_Fortran08. dwarf_peel_type now also handles DW_TAG_atomic_type. - addr2line: Input addresses are now always interpreted as hexadecimal numbers, never as octal or decimal numbers. New option -a, --addresses to print address before each entry. New option -C, --demangle to show demangled symbols. New option --pretty-print to print all information on one line. - ar: CVE-2014-9447 Directory traversal vulnerability in ar extraction. - backends: x32 support.- Make ebl modversion predictable to allow build-compare (bnc#916043)- CVE-2014-9447: elfutils: Directory traversal vulnerability (bnc#911662) Add patch: elfutils-fix-dir-traversal-vuln-in-ar-extraction.patch- Update to version 0.161 + libdw: New function dwarf_peel_type. dwarf_aggregate_size now uses dwarf_peel_type to also provide the sizes of qualified types. dwarf_getmacros will now serve either of .debug_macro and .debug_macinfo transparently. New interfaces dwarf_getmacros_off, dwarf_macro_getsrcfiles, dwarf_macro_getparamcnt, and dwarf_macro_param are available for more generalized inspection of macros and their parameters. dwarf.h: Add DW_AT_GNU_deleted, DW_AT_noreturn, DW_LANG_C11, DW_LANG_C_plus_plus_11 and DW_LANG_C_plus_plus_14. - Remove merged patches + elfutils-robustify.patch + elfutils-no-po-test-build.diff + elfutils-check-for-overflow-before-calling-malloc-to-uncompress-data.patch - Refreshed patch (from Fedora sources) + elfutils-portability.patch > elfutils-portability-0.161.patch - Add a lang subpackage- Update homepage URL and improve RPM group classification/sbin/ldconfig/sbin/ldconfigibs-arm-5 16819187850.177-150300.11.6.10.177-150300.11.6.1libdw-0.177.solibdw.so.1/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:28668/SUSE_SLE-15-SP3_Update/0af6bf54508082dd78ff0a301413ca59-elfutils.SUSE_SLE-15-SP3_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=51cc12e44a0861d3be32d686cf90f28cf486d5e1, strippedEPPPPPPPPPPPPPPPP P P P P P P P P P PPPPPPPPPPPPPPPPPPPPPPPPPPPRRRRR R RR R RR RRRRRR3xճO+=utf-8ac5e2f2b3a33147d65d42ead00342e88d10d87653b0e79570e839aff93b9238c?7zXZ !t/"]"k%wdPJ9XG#wxt]rI)*W0͡&{\.y>kg".)SMax'ֳmlpvNńy*^OJ0v)4e#*PH[N3z3k6EصD; F{37Za.q #glMjAHtiQ}wgzkuKZqtfj:{|a I3b^Z oo}yϫQt! Dd:ɳ()Hd+A'GM!>=lAQџcwF^,뮑9y}),70XJl#2=Gue=zE9hԥc/oq{4H|I:?A^+Y{Iq6Zj&ޠQ53K > !,C΄]=($Q= r];Ml=C_X%]lOHO{b4BQZ2Uq@gBe"xaMQگEOC_o= )/7IkķTȶ+UexǷT" .9`t;vj:*,HJEEH4{0j(:tsh^_0M5T U}Ww :Tj]jbGY0&O[_dx%]huf+uBuA[\N{>F{QS 2Ʈ<'ӊ)_kĮl#V'aucb;(#фmM^rLxgh "Г#,&ݑ v,=n3y^_.L]0 h\!nmJ2r_&aeXLJtivm\.6zQTt!r\N7rvlND;C˛:])f䆩޴<&!e,,mAvuEQel*h YZ