ELF>;@@32H9u&eHHHH9tHH@HDff.HHHeH=H 0H1ҿHHHHH HeHH 01HƿHff.HFHtWHtHP@POeH;=u6/t,wjP HtJOeH;=tU1t`vtۍPnP@묋؋HIHH 돸Hw6HHufPPOeH;=t;1Hu:HPPPOeH;=u1PPPOeH;=t1HPu&PPOeH;=t1ff.@HHH H9r+HH8rH ȹ HH 0+101Ҿ1Hƿ @eHH9teH=HHH 0H1ҿHfHt%Hu5t HuS#2H HH &tNtCt?Hڹ#H 0[H1ҿ#5H1ҿ#[HHUSwte[]1ۃtHڹ#H 04#2H H H H9tȐ 1H#H9t1H޿#뻹#2HH H :H됹#2HH H HtH1ҿ#H\H1ҿ#HDS@t[H[fDSH]HwsH HtQ-Hw@>=u5H uWvvv H[=uHHHHHH9tHHHHDI11HHG=HHt @HHtHt!HtHH HtHug1O1ff.=t!=t=t"HH<$0=H<$t=t HHHtKHt9HtHHjH1t uhtBwuHP @uHPH<HH <AvBv1w9HP HPHPHS ff.fHH0r=t-HHHeHH 0=uc1HƿHfHH@t=HH+r=t9HHHHHHHHf.HHĀt!HHHHHfAWAVAUATUSHHHVk=HIILEHH#svHIH#raHIH!rLHH,sHH-r=Iu HIH$HLDHIt.HIH1rHH-HLDHIH3HLEwH IHLEHHHH6HHEHH:rpAUIHAVHAWHATHH H[]A\A]A^A_wHIhI\HL $HL $mHHL $HHODIHHHH[]A\A]A^A_HHH,fHHשt!HHHHHHHשt;HH=rHHHHHHHff.fHHש HH4HuMHu3HHHHHt HHHHHHHHHש@tqHHtHtDHu\HHHHHHHHHHHH@HHשtHHHHDHHשt!HHHHHHHשHtZtZHH HuP4HHHuHHHHHHHHHHHHfDHHשPwLt u_T5HVHHFHHHHHHHHHHHHHH sBH u!HHHHHHHfDHHש@t!HHHHHHHH"s!HHHHH=tH GPLGPLGPLGPLGPLGPLGPLGPLGPLGPLeH1ff.HH"rut@t-HH2r u$   DHuu=tHu HH2r u9  Hu=t1u딐 ff.@H@HH+r tqHHH H D‰HH2r u=  =u t1 ff.HtHtuHH@HHH2H@u*H tH t 1Ҩ ƒ=u t1HH+fHH2rt  5IHHAff.fHttSHHtrHu1[HHt(HHu111[H@ttSHHtrHu1[HHt(HHu111[HttSHHtrHu1[HHt(HHu111[Ht^HH"sISHHu1[;ou{nu{u1[1ff.@Ht*HtH1?ounuu 1f.Ht`H@tKSHHu1[HHu1[1ff.fHtSHHu1[;ou{nu{u1[HHu1[HH럸ff.HSHHHu1[HHt!HHu11HHt(HHu&111lHHS1D[f.HSHHt%HHu$1[1[HHtHHuHHu HHuff.fHUHS,HHHtDHHHuHHu7HHu-HHu51[]HHu5HHHu1[]HHu HHu HHtDHHu@Hut  @1HHD=uMt8HH+s6HHH@HHH eH01HƿHf.AWAVAUATUSH eH%(HD$1H2H H HHHHHĀQHHHD$HD$ D$GHHHH:rHH;>D$HD$HD$ @Ņ 4HH:HH5r w*H* TtHHHHHHOHH;sP@tKA xHH1HHHH11HH==^=$=  t& HHHHHH= ZHH2stD=EuHtD5EuH@t=HD-E`HH@YH(HHH" HtV tHH+HHH4D%Et&HtHHHHH na-SH=m=P6AiH@HH.rDE @ @HH/rD E =H>H8r=  HHHHH@DHD$eH+%(@H []A\A]A^A_h=|HH.rt @ @HH3rt  H=~  =HF HHH:yHT$H1HLcMEyALLH|$HH IIIMA9uH1ҿHHHPHHHD$HD$ D$e HHt HH@HHHD$eH+%(H H[]A\A]A^A_ H4HHT$H1HŸ]IIM$9HH OI$H4Hvu #2H H H t6H4H[V HH"JzHLcHcHH8tLHIA$ ~HQ wH_lHeH}<< -xHH*r5t  HH:r t  onHH; 1H`HcLH|$HcHcHHkUH HH> uHHHH8C Hu I  HHH,r5  HH>l A LHHHH>E1HH=HH=w HH#HH4HH3rD5E'  HHVPHH-rDE HHt%HH:s<F< >H Au H9:-HH.rDEt @ @HH/r=t H<o< gHV A(HHH1rD-Et  HHH,sHH-kHH"xHHHHH eH0HH#rt  R1HH-r  HH,r  H6H!-%HO=+B,6=(׾HHT$H1HŸIII$9-HHI$̋HH4HH4HH4HH4WuHA11wBHt'tHH9s =Aw=XA~HH6rD E @ @HHHH4Ht$HhH:HH rHH4sH@H tHH:C H HHH$ HLHHHt$HH OHH*r5j  HH:r G  onH4LHH'LHH  2 aH(HT _H9r DEur  H \    B   - W  LA1Yarch/x86/kernel/cpu/bugs.cofffullfull,nosmtforcevmexitflush,nowarnflushflush,nosmtfull,forcemicrocodesafe-retibpbibpb-vmexitautounretstuffnosmtMitigation: IBRSMitigation: Enhanced IBRSMitigation: Stuffingalways-onconditionalUser space: VulnerableMitigation: IBPBVulnerable: No microcodeMitigation: Safe RET6Spectre V1 : %s nospectre_v2spectre_v26Spectre V2 : %s 6RETBleed: %s spectre_v2_usernospec_store_bypass_disablespec_store_bypass_disable6MDS: %s 6TAA: %s 6MMIO Stale Data: %s 6SRBDS: %s 6GDS: %s Not affected Mitigation: PTI Vulnerable %s - vulnerable module loaded; BHI: Not affected; BHI: BHI_DIS_S; BHI: SW loop, KVM: SW loop; BHI: Retpoline; BHI: Vulnerable; PBRSB-eIBRS: Not affected; PBRSB-eIBRS: SW sequence; PBRSB-eIBRS: Vulnerable; RSB filling; STIBP: forced; STIBP: disabled; STIBP: always-on; STIBP: conditional; IBRS_FW; IBPB: always-on; IBPB: conditional; IBPB: disabledVulnerable: LFENCE %s%s%s%s%s%s%s%s Mitigation: PTE Inversionvulnerablemitigateddisabled%s; SMT Host state unknown %s; SMT %s Processor vulnerable Unknown: No mitigations Vulnerableenabled with STIBP protectionMitigation: SMT disabled onprctlseccompretpolineretpoline,amdretpoline,lfenceretpoline,genericeibrseibrs,lfenceeibrs,retpolineibrsMitigation: RetpolinesMitigation: LFENCEprctl,ibpbseccomp,ibpbMitigation: MicrocodeMitigation: TSX disabledMitigation: Clear CPU buffers  g    s t  W ] ^ P Q J g    s  A   S   \ F W  A  B  W  X   H  E  $  uuuuuu_u03Spectre V2 : Ignoring unknown spectre_bhi option (%s)3Speculative Return Stack Overflow: Ignoring unknown SRSO option (%s).3RETBleed: Ignoring unknown retbleed option (%s).User space: Mitigation: STIBP always-on protectionUser space: Mitigation: STIBP protectionVulnerable: Safe RET, no microcodeUnknown: Dependent on hypervisor status3Spectre V2 : unknown option (%s). Switching to default mode 3Spectre V2 : %s selected but CPU doesn't have Enhanced or Automatic IBRS. Switching to AUTO select 3Spectre V2 : %s selected, but CPU doesn't have a serializing LFENCE. Switching to AUTO select 3Spectre V2 : %s selected but not Intel CPU. Switching to AUTO select 3Spectre V2 : %s selected but CPU doesn't have IBRS. Switching to AUTO select 6Spectre V2 : %s selected on command line. 3Spectre V2 : WARNING: LFENCE mitigation is not recommended for this CPU, data leaks possible! 4Spectre V2 : WARNING: IBRS mitigation selected on Enhanced IBRS CPU, this may cause unnecessary performance loss 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on VM exit only 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit 6Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch 6Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT 6Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT 6Spectre V2 : Enabling Speculation Barrier for firmware calls 6Spectre V2 : Enabling Restricted Speculation for firmware calls 3RETBleed: WARNING: CPU does not support IBPB. 3RETBleed: WARNING: retbleed=stuff depends on spectre_v2=retpoline 3RETBleed: WARNING: BTB untrained return thunk mitigation is only effective on AMD/Hygon! 3RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! 6Spectre V2 : spectre_v2_user=%s forced on command line. 3Spectre V2 : Unknown user space protection option (%s). Switching to AUTO select 6Spectre V2 : mitigation: Enabling %s Indirect Branch Prediction Barrier 6Spectre V2 : Selecting STIBP always-on mode to complement retbleed mitigation 3Speculative Store Bypass: unknown option (%s). Switching to default mode 6Speculative Store Bypass: %s 4L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. 6L1TF: You may make it effective by booting the kernel with mem=%llu parameter. 6L1TF: However, doing so will make a part of your RAM unusable. 6L1TF: Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide. 6MMIO Stale Data: Unknown: No mitigations 6Register File Data Sampling: %s 6L1D Flush : Conditional flush on switch_mm() enabled 4Speculative Return Stack Overflow: IBPB-extending microcode not applied! 4Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options.6Speculative Return Stack Overflow: %s 4GDS: Microcode update needed! Disabling AVX as mitigation. 4GDS: Mitigation locked. Disable failed. 3Spectre V2 : System may be vulnerable to spectre v2 6Spectre V2 : Update user space SMT mitigation: STIBP %s 4MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. 4TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. 4MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Unknown (XEN PV detected, hypervisor mitigation required) ; BHI: Vulnerable, KVM: SW loopVulnerable: untrained return thunk / IBPB on non-AMD based uarch Unpatched return thunk in use. This should not happen! Vulnerable: Microcode, no safe RETMitigation: IBPB on VMEXIT onlyMitigation: Speculative Store Bypass disabledMitigation: Speculative Store Bypass disabled via prctlMitigation: Speculative Store Bypass disabled via prctl and seccompMitigation: Enhanced / Automatic IBRSMitigation: Enhanced / Automatic IBRS + RetpolinesMitigation: Enhanced / Automatic IBRS + LFENCEUser space: Mitigation: STIBP via prctlUser space: Mitigation: STIBP via seccomp and prctlMitigation: untrained return thunkVulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriersMitigation: usercopy/swapgs barriers and __user pointer sanitizationMitigation: AVX disabled, no microcodeMitigation: Microcode (locked)Mitigation: Clear Register FileVulnerable: Clear CPU buffers attempted, no microcode  spec_rstack_overflowl1tfspectre_bhi retbleednospectre_v1gather_data_samplingl1d_flushsrbdsreg_file_data_samplingmmio_stale_datatsx_async_abortmdsGCC: (Debian 12.2.0-14) 12.2.0GNU+Q n0@P`pIm%8 N |%4 @{%@%x %X%T %P%L( S?%HO%DO   Pu q9 =Zy &d+ s y%+ ` %  p %(%$/EP %% p%  v=%L|`%<q%'`(%,%#@p'#'@ ' 0'`8# P'$'1' ='I'0Z'8g'(x      !##%'#!8#Q))!0#p !H## F!`c# !x#)! # +1!M#m!#!#!#G![#"s)) )( )01 )8[ )@ )H p;,a%?0@U,Y      * E X j y  f %     %h %`& 0N< M c u P       @  %0& 7  P  %pb z     P     ! P:5 I T f `{    b  m  S  ^` v&5@ GTP h Ic;I00j&I3IS@0`bugs.c__export_symbol_x86_spec_ctrl_base__export_symbol_x86_spec_ctrl_current__export_symbol_x86_pred_cmd__export_symbol_spec_ctrl_current__export_symbol_mds_idle_clear__export_symbol_mmio_stale_data_clear__export_symbol_x86_virt_spec_ctrl__export_symbol_gds_ucode_mitigated__export_symbol_itlb_multihit_kvm_mitigation__export_symbol_l1tf_vmx_mitigationgds_mitigationspectre_v1_mitigationrfds_select_mitigationrfds_mitigationx86_arch_cap_msrmds_select_mitigationmds_mitigationmds_nosmttaa_select_mitigationtaa_mitigationtaa_nosmtmmio_select_mitigationmmio_mitigationmmio_nosmtsrbds_offl1d_flush_mitigationbhi_mitigationsrso_cmdretbleed_cmdretbleed_nosmtupdate_spec_ctrlupdate_stibp_msrib_prctl_setspectre_v2_user_ibpbspectre_v2_user_stibpssb_prctl_setssb_modespec_ctrl_disable_kernel_rrsbarrsba_disabledx86_amd_ssb_disablesrbds_mitigationspectre_v2_cmdsrbds_stringsretbleed_mitigationsrso_mitigationv2_user_optionsspectre_v1_stringsssb_stringsgds_stringsspectre_v2_stringsssb_mitigation_optionsrfds_stringsmmio_stringstaa_stringsmds_stringsretbleed_stringssrso_stringsspectre_v2_user_stringsspectre_v2_bad_modulespec_ctrl_mutex__already_done.2__already_done.1__already_done.3__already_done.0__setup_srso_parse_cmdline__setup_str_srso_parse_cmdline__setup_l1tf_cmdline__setup_str_l1tf_cmdline__UNIQUE_ID___addressable_l1tf_vmx_mitigation578__UNIQUE_ID___addressable_itlb_multihit_kvm_mitigation577__setup_spectre_bhi_parse_cmdline__setup_str_spectre_bhi_parse_cmdline__setup_retbleed_parse_cmdline__setup_str_retbleed_parse_cmdline__setup_nospectre_v1_cmdline__setup_str_nospectre_v1_cmdline__setup_gds_parse_cmdline__setup_str_gds_parse_cmdline__UNIQUE_ID___addressable_gds_ucode_mitigated527__setup_l1d_flush_parse_cmdline__setup_str_l1d_flush_parse_cmdline__setup_srbds_parse_cmdline__setup_str_srbds_parse_cmdline__setup_rfds_parse_cmdline__setup_str_rfds_parse_cmdline__setup_mmio_stale_data_parse_cmdline__setup_str_mmio_stale_data_parse_cmdline__setup_tsx_async_abort_parse_cmdline__setup_str_tsx_async_abort_parse_cmdline__setup_mds_cmdline__setup_str_mds_cmdline__UNIQUE_ID___addressable_x86_virt_spec_ctrl518__UNIQUE_ID___addressable_mmio_stale_data_clear517__UNIQUE_ID___addressable_mds_idle_clear516__UNIQUE_ID___addressable_spec_ctrl_current515__UNIQUE_ID___addressable_x86_pred_cmd514__UNIQUE_ID___addressable_x86_spec_ctrl_current513__UNIQUE_ID___addressable_x86_spec_ctrl_base512.LC0__x86_return_thunkboot_cpu_datacpu_mitigations_offalternatives_patchedcpu_caps_setcpu_smt_disablecpu_mitigations_auto_nosmtstatic_key_disablestatic_key_enableconst_pcpu_hotspeculation_ctrl_updatestrcmpl1tf_mitigationstrchr__tracepoint_write_msrdo_trace_write_msrspeculation_ctrl_update_currentx86_amd_ls_cfg_basex86_amd_ls_cfg_ssbd_maskupdate_spec_ctrl_condupdate_srbds_msr__tracepoint_read_msrdo_trace_read_msrupdate_gds_msrcpu_select_mitigationsx86_read_arch_cap_msrboot_command_linecmdline_find_option_boolcpu_smt_controlswitch_mm_always_ibpbstatic_key_countspectre_v2_enablede820__mapped_anyswitch_mm_cond_l1d_flushsrso_return_thunkcall_depth_return_thunkcmdline_find_optionstrncmpstrlensetup_clear_cpu_capswitch_mm_cond_ibpbmsr_set_bitretbleed_return_thunkcpu_smt_possiblesrso_alias_return_thunk__stack_chk_failretpoline_module_okcpu_bugs_smt_updatemutex_locksched_smt_presentswitch_to_cond_stibpmutex_unlock__cpu_online_maskon_each_cpu_cond_maskarch_prctl_spec_ctrl_setarch_seccomp_spec_mitigatearch_prctl_spec_ctrl_getx86_spec_ctrl_setup_apcpu_show_meltdownx86_hyper_typesysfs_emitcpu_show_spectre_v1cpu_show_spectre_v2cpu_show_spec_store_bypasscpu_show_l1tfcpu_show_mdscpu_show_tsx_async_abortcpu_show_itlb_multihitcpu_show_srbdscpu_show_mmio_stale_datacpu_show_retbleedcpu_show_spec_rstack_overflowcpu_show_gdscpu_show_reg_file_data_sampling__warn_thunk__warn_printk\4kn\\\\)\1\8?r\/`\D8E<\8t\8V\4/Vr , ws \ \T "\L2X< , BXHT\Tb\Lp\D X ,PX   ,    X , !X'3 8C\DM\t[ ` \ \ \B \O \ \   \ \b \ D \ # 1 \H g v D  E  4  &  ,   \0 Q ] ' &, h y  s U q r  |  |  T T \  | ,H$ / 6 E TL Z Dh s Dz q ( | \ F 6 D q q  D " ]`)Q V] kl qx      X & '7\> QF ]@KY &^D E  Q &\T"<* ]<M W ;\j w     &\L ]<   ; # ;(6 Q;I &N\ a G &\8 Q ]`  &7FVg\Dv<~ ]  ; &  ;  ] v  Q7K\(Zl\s   ] ; ] Q  ,h &|%\, Q4 ]9G LZ &_\4 Q ]  &\< Q ]  &FXTX] ,b$E"J"\a" "1hY 8is} J"2OTkz)qk [    1 J T        3 BRec/BUh@Sf%Nl(8HXhx0 (0p80@HP@X`hpxPp ` @`  @ @pp  P  (@ 08p@HPpX` h pxp0\,CP\8^h\<r\v|49 \8\P\St\P4*59= ER\OaL\H\L\Tt\t\L 4%9- 4\G<R\H\@\D4 \t#t4tL\?S\DZqL49  \t \P0 8C $KU\Pa\Oj\P \H  $\H\G\HWn s}\@  $\@\?\@  #-\8P\8 um,; CM\0` /hr\0 \\ 5 \- ,2g  < I O   $ 6 [> L    f  \ \ p  y  \ \ ~! + \; ,8@     \$     \    \ & . 8 \ L yT ^ \ k s } \   /     V \ , " \+ \u5 TC V b l \  \   \t  \,$ `+ J Y ` r D D  \ D DI \0 5;\F KR Y ,b krD\ ,\ xD\ "2Yu{HDJ4\T\P-\L9F\HVh\<x\sL< \4\8" * ]`/6mBtP U\ , ah|o\\'\|T X"(*T8HXP(W_TrZ* \ 8 ,  \$0=\$HTUdXl(tTY) \'  D  Nk [Pp~ [@  |<+\06 ,HU iw\0 ] M m  [ [ ]@ , &4\4:\vL\0q\4\0\4 ] t\4\8 [L! ,&2 [Hg r\4\0\v\0 | \(3T@OXW(_Tl{Z*D\   [D5|EV [c|DHD \4, ,18ODi|y x ]`DI ,!D/?HGO ,hT[iDwD\\$TX(TX( '+ B ,GyTY) ,\ TT| (6|CRZOpvTX(TX( GG<F_ h m [  [0\< ,  ]\D  ]\L  ]\T " ]'8 ,HHhu\ DD I  , * ,/ 5 \(< D ]I Z ,d u , z  \@ L L   D T !W!'!T!,!W4!';!\0G!R!W!k!\$v! !\ ! ,p!!|!!!O!|!!!O""T "/"Z7"*>"\L"R"\Z" ]""D"""\#"T""Y")# , ##\(*# ,5#G#\(]# ]i# ,n#z# , ## ,p ##\#\# #|#D#\$#t$"$ ,p ($\1$7$\?$ ]I$]$ ,0 b$l$ , q$x$ , }$$ , $$ ,h$$ ,$$ ,h$$]$$ ,0 $$\4% ] !%0%|>%N%~V%Ng%\y%\$% % ,%%% ,p %%%% [("&D/&>&IF&S&^&c&&&D&&& ,(&&|&'\' ,' ,1'8'T' ,pY'`''T''X'('T''Z'*'\''''\( ]( ,("(<( ,A(H(y(\( , ( ,0(((Z(*( ()5)H!Y\GL[ej)y)49\cmY~#> b   O  E  r w   "DdL&"V&"h2 :"*  $ (,048<@DHLPTX\`&dGhOlWp tx|EM~aiLTx<D OW   !)!1!!! !$!(,",4"0"4"8K%<S%@;&DC&H'L'P'T'X(\(`dk l(n0_8`@bHPX` h p x]^`~HIKtuw (08 @ H PX`hKpLxN%!&!(!!!!!!!(")"+"%%%&&'t'u' w'(\(0](8_(@e(Hf(Ph(Xn(`o(hq(p(x((((((((((((((((())) )  )()0)8)@)H)P)X!)`,)h-)p/)x Yfgij l`$(0 4<@H^LTX`dlpxI|u L&!!!)"%&u' ]( f($,o(08(<D(HP(T\(`h(lt(x) )))-) gD!D!I !*I.! 8`<! F`J!TOX!bIf!pIt!~ ! !K&!K&! &! &!%\c WT &!&JI&b8HJI\vnb E\J c-E2W?ODTQ V cL&h&uL&z& f h $(04<f@hHLTX`dlpx|  Y[,.+ -  & h ${ ( 04 8 @DH PhToX `dh ptx        e! . $ 0 $A(0.4n8@D|HPTX`dhp t5 x- =    H}r}h[ [ `0[p8H[Pp `[hx[ [[[[P[[" 0@P`  (@P`pWbpv, , 8(0,@vH,0P,`X,`vh-pDx,,,@,,,p,v,,,P v(0,8o@,H,H`vhpox,Hv,v,v,v, (08@H.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela.export_symbol.rela.noinstr.text.rela__patchable_function_entries.rela.init.text.rodata.str1.1.rela.smp_locks.rela.discard.annotate_insn.rela__bug_table.rela.altinstructions.rela.altinstr_replacement.rela.altinstr_aux.rodata.str1.8.rela__ex_table.rela__jump_table.data..once.rela.init.setup.rela.init.rodata.rela.data..ro_after_init.rela.rodata.rela.discard.addressable.init.data.data..percpu.comment.note.GNU-stack.note.gnu.property @p@ %0+ &@001z;6@80O!J@(00b]@X0 @K)@`H0 2AHGh@hp0H@  0XL@P0,N@ 0N%@ 0#O~ @!02O63b.@#0Cc>@&0Peae \@H/@0!rf& m@1(0#h@30%i @3(0'kP@80)kk0k ll 8l@1 xn9