ELF>@@AW1AVAUIպATUSgIHHIAH^IHI_HLI@Io8HILÅI1LIG H0M~A`LLtALÅu?LÅu1HE1 IL9DLÅtMtH=tLH=H1H=H;H9IHI_HLI@Io8HIHALIÅL[]A\A]A^A_HQH1H81A1LIG(HAu>LÅLÅH~LM}A븻[]A\A]A^A_HWLM}SLM}GHHIܻfAUATUSH_8Lg`HohLop߃1xtufutHwnH%H=>tHuYHLHIH=w+HHLHHLHc[]A\A]H[]A\A]HH㐐AUATUSH_hLg`HoXLo(߃1xuugusHwmH%H=>tHuXHDHIH=w*DHHgLHc[]A\A]H[]A\A]HH㐐AWAVAUATUSH LwhH_`eHHD$1LgXHG(HD$HD$DH$,1EAIAL HIHMLIHH-D$HI IGD$ IGD$IGD$IGH9tMHH|$HtLH$H$HHT$eH+uJH []A\A]A^A_<$DLLLHH$H$HHH3kexec: Could not allocate control_code_buffer 3kexec: Could not allocate swap buffer GCC: (Debian 12.2.0-14+deb12u1) 12.2.0GNU $9ELf=HNarz0 (>O_kexec.cdo_kexec_load__kexec_lockdo_kimage_alloc_initkexec_imagememcpysanity_check_segment_listkimage_alloc_control_pagesarch_crash_hotplug_supportmachine_kexec_preparekimage_crash_copy_vmcoreinfokimage_load_segmentkexec_crash_imagearch_kexec_protect_crashkreskimage_freearch_kexec_unprotect_crashkrescrashk_reskfree__x86_return_thunkkimage_terminate_printkkimage_free_page_list__x64_sys_kexec_loadkexec_load_permittedsecurity_kernel_load_datasecurity_locked_downmemdup_user__ia32_sys_kexec_load__ia32_compat_sys_kexec_load__ref_stack_chk_guard__kmalloc_noprof_copy_from_user__stack_chk_fail(R{      '/7COafmz   : U g    8Pdr0DR >Rd! "/ c#D $.symtab.strtab.shstrtab.rela.text.data.bss.rodata.str1.8.rela__patchable_function_entries.rela.smp_locks.comment.note.GNU-stack.note.gnu.property @@x H &,12aE8 @@` gXb@  r0\({ `  p8