ELF>H@@32H9u&eHHHH9tHH@HDff.HHHH HeHH 01HƿHff.HHH H9r+HH8rH ȹ HH 0+101Ҿ1Hƿ @eHH9teH=HHH 0H1ҿHfHt%Hu5t HuS#2H HH +tMHHHDHڹ#H 0[H1ҿ#5H1ҿ#[HUSwte[]1ۃtHڹ#H 04#2H H H H9tȐ 1H#H9t1H޿#뻹#2HH H :H됹#2HH H HtH1ҿ#H\H1ҿ#HDS@t[H[fDHHtHHthHJHHu݋HP@PHeH;tU1똋=OHCw?HHPPHeH;u1;Hu\HPu(PPHeH;t1 H4Hu g1  t P HHeH;1sHPbPPHeH;19PPPHeH;1R ;FP@(O1H=tF=t=t HP P@OeH;=uPPPOeH;=uH<$H<$HtKHt9HtHHjH1t uhtBwuHP @uHPH<HH <AvBv1w9HP HPHPHS ff.fHH0r=t-HHHeHH 0=u1HƿHfSHHw =w =twHH[iHu =oH:H$Hvq_wHA=4HHHHHH9HHHHDI11HHHt @H H/HHy@HH@t=HH+r=t9HHHHHHHHf.HHĀt!HHHHHfAWAVAUATUSHHHVk=HIILEHH#svHIH#raHIH!rLHH,sHH-r=Iu HIH$HLDHIt.HIH1rHH-HLDHIH3HLEwH IHLEHHHH6HHEHH:rpAUIHAVHAWHATHH H[]A\A]A^A_wHIhI\HL $HL $mHHL $HHODIHHHH[]A\A]A^A_HHH,fHHשt!HHHHHHHשt;HH=rHHHHHHHff.fHHש HH4HuMHu3HHHHHt HHHHHHHHHש@tmHHtDHu\HHHHHHHHHHHHHHשtHHHHDHHשt!HHHHHHHשtct?HHuUHHHHHHHHHHHHHff.@HHשPwLt u_T5HVHHFHHHHHHHHHHHHHH s!HHHHHHHש@t!HHHHHHHH"s!HHHHHHHH&s4HuHHHHHH@HHH's!HHHHHHHH)s!HHHHHHHH*s!HHHHH=tH GPLGPLGPLGPLGPLGPLGPLGPLGPLGPLGPLeH1ff.w'wm1ut^H 11H੐u.uXu1t^1uuӿuſ1IuutHttSHHtrHu1[HHt(HHu111[H@ttSHHtrHu1[HHt(HHu111[HttSHHtrHu1[HHt(HHu111[Ht^HH"sISHHu1[;ou{nu{u1[1ff.@Ht*HtH1?ounuu 1f.Ht`H@tKSHHu1[HHu1[1ff.fHSHHu1[;ou{nu{u1[HHu:HH'r up 1[HHufHHuDHH0 늸DHUHSHu1[]+ou{nu{u1[]HHtvt$HH1[]{muր{uyHtSHHu1[;ou{nu{u1[HHu1[HH럸ff.HSHHHu1[HHt!HHu11HHt(HHu&111lHHS1D[f.HSHHt%HHu$1[1[HHtHHuHHu HHuff.fHSHHt%HHu$1[1[HHu4HH*r u-  HH뎐 ͸HUHS,HHHtDHHHuHHu7HHu-HHu51[]HHu5HHHu1[]HHu HHu HHtDHHu@Hut  @1HHD=uMt8HH+s6HHH@HHH eH01HƿHf.PHt;tYtN|HHHHHH eH0uHH,rDE  P}tdHHH3r5  HH-r ^ HKHH:9<t< &=HH0rt  HHrHHH1r=t  5u`HH,rDEi  HH>RHAc=HHH9HH6r @ @Hwr,HH-r D Eu{ :sH1ҿH H   d  | "AVAUATUSH eHHD$1H2H H HHHHH1 H_x_HĀu Ou HHHD$HD$ D$HHGaHH:rHH;HHT$HHHD$1HD$ D$LcMEyHHHHHLA9uLLH|$uHHcHcHH8tLHH"!HH1 =H]<"< !nHH>$M1H޿HHH:'HmHt$H%"HH:r HH;r HH1{HHHD$HD$ D$u iH+HW=wHTtH@DHH+H%* t2H^H@tHH+>HH"ttH= tHH+ HHH5t&HtHHHH ==#H -wtuH@H@tVHS#2H H Hf @HH'HH#s=uHH)|t,H HH HH*o HH:] ==Z HaHtk===zzHHHH'sM-  =:5H4HHH:rHH; HH;  wH HHHtD= HHHH@THH+B=Hu H%H HcH|$HcHHu y[u HHH4HHH@HHH"#H<t^HH =HHH4dH4HHtv=tNHHtHHtH4HHH"sA=cHHH=HH $HH*s4==H4HHĀt#yH4H  Z  = H=u'=^=$=  rHH=rDEv T=tl=HH2r5  H@=?=2=9= a+HH.2 @ @HH/r =HH8r  HHHH@t0 H4HunHH.rD%E @ @HH3  HHHHH,sHH-HH":HHHHH eH0 HH#  a  ={HD$eH+H []A\A]A^H!-%HM=+@,4=t݋*A1/=HtkHH9Y=L=HHHtH =HHH HH4HH:r  LHT$H1HŸIIM$9 HH :I$̋IH4H]]H4Hn|cHH2rDEM  =u =1HH2rD E  Hl=u =V1J=~HHH!rD E  HH$rDE  HH-r5 =HH.r @ @TH 1=HH2r   HJH:HH7rDE HHHHHH eH08/HH,r.HH*rD5E  HH.rD-Et @ @HHHH w HHHHHHOHH4HHHHHH> LHHI:7HH><H= H4]HH*r  HH:  onHH;-u =1HH.rR @ @HH/r/ HHH<F< >H-HH.rD-E @ @HH3rD%E  HHHHHHHH2r=  HH2r   HH-  HH +H t:HH+r,HH$r  HH%r At3f]HB3^1=]HH4CH- HHHDE` W1HƿHHH#6ċ }1H޿# HhH1HƿHCD5E HT$H1HŸIII$9.HHeI$̨ Ob (HH4H@( QHH4%!% HHHHhHHHHH^HSHH=HH*r  onHcLH|$%HcHcHHkUHH>uHLHHHH8uKH-u vLF u LH뤃 v-6h #=LHHH9HH:C H HL>HH1!%HH(VG=/1D/XlL H1<%{HLMHHH8C HHHH$DE nH3~5H9rt  HHH<=    i    G c 6 [ " J ` r    a =Hrv HHm>I1tH@QHt$HHt$HHS HHH9nk G U p a] /H9Unknown bug %x arch/x86/kernel/cpu/bugs.cofffullfull,nosmtforcevmexitstuffuserflush,nowarnflushflush,nosmtfull,forcemicrocodesafe-retibpbibpb-vmexitautounretnosmtMitigation: TSX disabledVulnerable: No microcodeVulnerableMitigation: IBRSMitigation: Enhanced IBRSMitigation: StuffingUser space: VulnerableMitigation: IBPB on VMEXITalways-onconditionalcuser_kernel, cuser_user, cguest_host, cguest_guest, cSMT mitigations: coff cauto con nospectre_v2spectre_v2spectre_v2_usernospec_store_bypass_disablespec_store_bypass_disable6SRBDS: %s 6Spectre V2 : %s 6RETBleed: %s 6ITS: %s 6MDS: %s 6TAA: %s 6MMIO Stale Data: %s 6VMSCAPE: %s 6Spectre V1 : %s 6active return thunk: %ps 6GDS: %s Not affected Mitigation: PTI Vulnerable %s - vulnerable module loaded; BHI: Not affected; BHI: BHI_DIS_S; BHI: SW loop, KVM: SW loop; BHI: Retpoline; BHI: Vulnerable; PBRSB-eIBRS: Not affected; PBRSB-eIBRS: SW sequence; PBRSB-eIBRS: Vulnerable; RSB filling; STIBP: forced; STIBP: disabled; STIBP: always-on; STIBP: conditional; IBRS_FW; IBPB: always-on; IBPB: conditional; IBPB: disabledVulnerable: LFENCE %s%s%s%s%s%s%s%s Mitigation: PTE Inversionvulnerablemitigateddisabled%s; SMT Host state unknown %s; SMT %s Processor vulnerable enabled with STIBP protectionMitigation: SMT disabledMitigation: Safe RETMitigation: IBPBonprctlseccompretpolineretpoline,amdretpoline,lfenceretpoline,genericeibrseibrs,lfenceeibrs,retpolineibrsMitigation: RetpolinesMitigation: LFENCEprctl,ibpbseccomp,ibpbMitigation: Clear CPU buffersMitigation: Microcode   E         .  {    !      I   s  v z  &  '             t    G  uuuuuu_u3ITS: Ignoring unknown indirect_target_selection option (%s).3Transient Scheduler Attacks: Ignoring unknown tsa=%s option. 3Spectre V2 : Ignoring unknown spectre_bhi option (%s)3Speculative Return Stack Overflow: Ignoring unknown SRSO option (%s).3VMSCAPE: Ignoring unknown vmscape=%s option. 3RETBleed: Ignoring unknown retbleed option (%s).4Spectre V2 : WARNING: IBRS mitigation selected on Enhanced IBRS CPU, this may cause unnecessary performance loss 6Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT 6Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT 4Spectre V2 : Unknown Spectre v2 mode, disabling RSB mitigation 6Spectre V2 : Enabling Speculation Barrier for firmware calls 6Spectre V2 : Enabling Restricted Speculation for firmware calls Unknown: Dependent on hypervisor statusMitigation: Aligned branch/return thunksUser space: Mitigation: STIBP always-on protectionVulnerable: Clear CPU buffers attempted, no microcode6mitigations: Enabled attack vectors: 3Spectre V2 : unknown option (%s). Switching to default mode 3Spectre V2 : %s selected but CPU doesn't have Enhanced or Automatic IBRS. Switching to AUTO select 3Spectre V2 : %s selected, but CPU doesn't have a serializing LFENCE. Switching to AUTO select 3Spectre V2 : %s selected but not Intel CPU. Switching to AUTO select 3Spectre V2 : %s selected but CPU doesn't have IBRS. Switching to AUTO select 6Spectre V2 : %s selected on command line. 3Spectre V2 : WARNING: LFENCE mitigation is not recommended for this CPU, data leaks possible! 3RETBleed: WARNING: CPU does not support IBPB. 3RETBleed: WARNING: retbleed=stuff only supported for Intel CPUs. 6Spectre V2 : spectre_v2_user=%s forced on command line. 3Spectre V2 : Unknown user space protection option (%s). Switching to default 3Speculative Store Bypass: unknown option (%s). Switching to default mode 6Speculative Store Bypass: %s 6L1D Flush : Conditional flush on switch_mm() enabled 4Speculative Return Stack Overflow: IBPB-extending microcode not applied! 4Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options.5Speculative Return Stack Overflow: Reducing speculation to address VM/HV SRSO attack vector. 4GDS: Mitigation locked. Disable failed. 6Transient Scheduler Attacks: %s 3RETBleed: WARNING: retbleed=stuff depends on retpoline 3RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! 3ITS: WARNING: Spectre-v2 mitigation is off, disabling ITS 3ITS: WARNING: ITS mitigation is not compatible with lfence mitigation 6Spectre V2 : Selecting STIBP always-on mode to complement retbleed mitigation 6Register File Data Sampling: %s 6Speculative Return Stack Overflow: %s 3RETBleed: WARNING: BTB untrained return thunk mitigation is only effective on AMD/Hygon! 6Spectre V2 : mitigation: Enabling %s Indirect Branch Prediction Barrier 4L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. 6L1TF: You may make it effective by booting the kernel with mem=%llu parameter. 6L1TF: However, doing so will make a part of your RAM unusable. 6L1TF: Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide. 4GDS: Microcode update needed! Disabling AVX as mitigation. 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on VM exit only 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit 3Spectre V2 : System may be vulnerable to spectre v2 6Spectre V2 : Update user space SMT mitigation: STIBP %s 4MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. 4TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. 4MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. 4VMSCAPE: SMT on, STIBP is required for full protection. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/vmscape.html for more details. Unknown (XEN PV detected, hypervisor mitigation required) ; BHI: Vulnerable, KVM: SW loopVulnerable: untrained return thunk / IBPB on non-AMD based uarch Unknown: running under hypervisorUnpatched return thunk in use. This should not happen! Mitigation: IBPB before exit to userspaceVulnerable: Safe RET, no microcodeVulnerable: Microcode, no safe RETMitigation: IBPB on VMEXIT onlyMitigation: Reduced SpeculationMitigation: Speculative Store Bypass disabledMitigation: Speculative Store Bypass disabled via prctlMitigation: Speculative Store Bypass disabled via prctl and seccompMitigation: Enhanced / Automatic IBRSMitigation: Enhanced / Automatic IBRS + RetpolinesMitigation: Enhanced / Automatic IBRS + LFENCEUser space: Mitigation: STIBP protectionUser space: Mitigation: STIBP via prctlUser space: Mitigation: STIBP via seccomp and prctlMitigation: Clear CPU buffers: user/kernel boundaryMitigation: Clear CPU buffers: VMMitigation: Vulnerable, KVM: Not affectedMitigation: Retpolines, Stuffing RSBMitigation: untrained return thunkVulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriersMitigation: usercopy/swapgs barriers and __user pointer sanitizationMitigation: AVX disabled, no microcodeMitigation: Microcode (locked)Mitigation: Clear Register File  vmscapespec_rstack_overflowl1tfspectre_bhi tsaindirect_target_selectionretbleednospectre_v1gather_data_samplingl1d_flushsrbdsreg_file_data_samplingmmio_stale_datatsx_async_abortmdsGCC: (Debian 12.2.0-14+deb12u1) 12.2.0GNU+Q w0@P`p!Er%< ^ %8 @H_  %X%T  P%P%E %L%D q%HI @=- &7+ s ` L%0 [% d Pj%   y%$Q  % %,%(E v%%x + <|P%@a%p#`p%%%F'`(#@P%' '8'('' 4' D'W'8c' P#p' |' '8'@0' 0'(    ' 8  I!g##%'!#!0#)")\!H~# !`#!x#!3# V!s# !#)!# +A!]##}!#)! #@ !8- #PW !Pk #` ) )  )( )0? )8n )@ )H )P ;,a,?@0@U1U  8 F V d w    >  %    %4  # %h7 %`P Nf w     {(     0 7 ? S  l ~      %p  % `"P8I_p: @S%^< P[mp vP G  I&c4`A Z;q0IP III@\ I0I=pIN0bugs.c__export_symbol_x86_spec_ctrl_base__export_symbol_x86_spec_ctrl_current__export_symbol_x86_ibpb_exit_to_user__export_symbol_spec_ctrl_current__export_symbol_switch_vcpu_ibpb__export_symbol_cpu_buf_idle_clear__export_symbol_cpu_buf_vm_clear__export_symbol_x86_virt_spec_ctrl__export_symbol_gds_ucode_mitigated__export_symbol_itlb_multihit_kvm_mitigation__export_symbol_l1tf_vmx_mitigationgds_mitigationspectre_v1_mitigationshould_mitigate_vulnmds_mitigationmds_nosmttaa_mitigationtaa_nosmtmmio_mitigationmmio_nosmtrfds_mitigationsrbds_offl1d_flush_mitigationits_mitigationtsa_mitigationbhi_mitigationsrso_mitigationvmscape_mitigationretbleed_mitigationretbleed_nosmtupdate_stibp_msrspec_ctrl_disable_kernel_rrsbarrsba_disabledx86_arch_cap_msrspectre_v2_apply_mitigation__already_done.6x86_amd_ssb_disablesrbds_mitigationspectre_v2_cmdv2_user_optionsspectre_v2_user_ibpbspectre_v2_user_stibpverw_clear_cpu_buf_mitigation_selectedits_stringsssb_mitigation_optionsssb_modessb_stringsretbleed_stringstaa_stringsmmio_stringsvmscape_stringsspectre_v1_stringsgds_stringssrso_stringsmds_stringsrfds_stringsspectre_v2_stringssrbds_stringstsa_stringsspectre_v2_user_stringsspectre_v2_bad_modulespec_ctrl_mutex__already_done.3__already_done.2__already_done.4__already_done.1__already_done.0__setup_vmscape_parse_cmdline__setup_str_vmscape_parse_cmdline__setup_srso_parse_cmdline__setup_str_srso_parse_cmdline__setup_l1tf_cmdline__setup_str_l1tf_cmdline__UNIQUE_ID___addressable_l1tf_vmx_mitigation662__UNIQUE_ID___addressable_itlb_multihit_kvm_mitigation661__setup_spectre_bhi_parse_cmdline__setup_str_spectre_bhi_parse_cmdline__setup_tsa_parse_cmdline__setup_str_tsa_parse_cmdline__setup_its_parse_cmdline__setup_str_its_parse_cmdline__setup_retbleed_parse_cmdline__setup_str_retbleed_parse_cmdline__setup_nospectre_v1_cmdline__setup_str_nospectre_v1_cmdline__setup_gds_parse_cmdline__setup_str_gds_parse_cmdline__UNIQUE_ID___addressable_gds_ucode_mitigated595__setup_l1d_flush_parse_cmdline__setup_str_l1d_flush_parse_cmdline__setup_srbds_parse_cmdline__setup_str_srbds_parse_cmdline__setup_rfds_parse_cmdline__setup_str_rfds_parse_cmdline__setup_mmio_stale_data_parse_cmdline__setup_str_mmio_stale_data_parse_cmdline__setup_tsx_async_abort_parse_cmdline__setup_str_tsx_async_abort_parse_cmdline__setup_mds_cmdline__setup_str_mds_cmdline__UNIQUE_ID___addressable_x86_virt_spec_ctrl582__UNIQUE_ID___addressable_cpu_buf_vm_clear581__UNIQUE_ID___addressable_cpu_buf_idle_clear580__UNIQUE_ID___addressable_switch_vcpu_ibpb579__UNIQUE_ID___addressable_spec_ctrl_current578__UNIQUE_ID___addressable_x86_ibpb_exit_to_user577__UNIQUE_ID___addressable_x86_spec_ctrl_current576__UNIQUE_ID___addressable_x86_spec_ctrl_base575.LC1__x86_return_thunkcpu_attack_vector_mitigated__warn_printksmt_mitigationsboot_cpu_dataconst_current_taskspeculation_ctrl_updatestrcmpalternatives_patchedcpu_caps_setl1tf_mitigationstrchr__tracepoint_write_msrdo_trace_write_msrspectre_v2_enabledmsr_set_bitdump_stackx86_amd_ls_cfg_basex86_amd_ls_cfg_ssbd_maskupdate_spec_ctrl_condupdate_srbds_msr__tracepoint_read_msrdo_trace_read_msrupdate_gds_msrcpu_select_mitigations__ref_stack_chk_guardx86_read_arch_cap_msrboot_command_linecmdline_find_option_boolcmdline_find_optionstrlenstrncmpcpu_mitigations_offswitch_mm_cond_l1d_flushstatic_key_enablecpu_smt_possiblecpu_smt_disablestatic_key_disablesetup_clear_cpu_capsrso_return_thunkcall_depth_return_thunkx86_pred_cmdits_return_thunkswitch_mm_cond_ibpbswitch_mm_always_ibpbstatic_key_countretbleed_return_thunke820__mapped_anysrso_alias_return_thunk__stack_chk_failretpoline_module_okarch_prctl_spec_ctrl_setspeculation_ctrl_update_currentwrite_ibpbarch_seccomp_spec_mitigatearch_prctl_spec_ctrl_getx86_spec_ctrl_setup_apcpu_bugs_smt_updatemutex_locksched_smt_presentswitch_to_cond_stibpmutex_unlock__cpu_online_maskon_each_cpu_cond_maskcpu_show_meltdownx86_hyper_typesysfs_emitcpu_show_spectre_v1cpu_show_spectre_v2cpu_show_spec_store_bypasscpu_show_l1tfcpu_show_mdscpu_show_tsx_async_abortcpu_show_itlb_multihitcpu_show_srbdscpu_show_mmio_stale_datacpu_show_retbleedcpu_show_spec_rstack_overflowcpu_show_gdscpu_show_reg_file_data_samplingcpu_show_old_microcodecpu_show_indirect_target_selectioncpu_show_tsacpu_show_vmscape__warn_thunkb8k\!/D<"b<.tb<b8'= )Vbb!fbtb8bCbtbbbb#abwbb"bDbb ( - 5 bV [ a bTs bL ^ bH ^ b  b  bT  ^( ? D P U [ br b  | ^ ) ^   + e )    " . 3 > bHH btV [ g )`m ^s  ) ^  )( ^   D       & )+ W e b4l t cy        ; <  | P. |5 aC TQ T^ b f ~o |v )    T  D  D ;  | b" ) 4D; ;B ;O JZDgx  c  5 ;  T  z f$ "0 8T \b  c D     %3 8g{bT< c       '7bLB cN<^ e jx        7Gb<N V c@[i nbH< c       ! &Wkb(zb  ' c  c   ) '7b > F c KY ^b8  c bD  c  GX<f ky )`~ b,  c` 'b. 6 c ;I Nwb  c ^^ )$EJ\a ;Shy28w48`[ K    2   M,? qbu- Re%rBU(8HXhx0 0(0@8@H0PX`Phpp@x     0  @  p(0P8@H PX@`hppx0`b0} 4P^lz +bP / 4bPbObPWn +s}bH / 4bHb@bH +#-bD@ /HS 4[ebDqb?zbD +b@b@LZ +_hy +b4 ?"b4q +yb(b( ?b(W Eb(( L0:b(M )R +bb R )@b&b] +eobb Eb )& ++5H WP[ dcm{ j / v1 +9 D L V bh b{     b b   b ) ! +) 4 < F bX bk ?s ~    X b )   + # b(4 < N +V ` b$t |  b$   b$   b$ L  b$   ?  - < D VP b c )0h  b bu T    b  b " 5 |I O |     T  X (  )0D,;ICKDXgHowDb'TY) ) ) T-Y5)PD^nHv~D )h^DDI$ )KTYeXm(~ )^DIP ) Wbt\cu b0b0   (6b AHYb({DD   ap  a`*A alM )R\ ahbb\b )b$ Db$6BDT )Y_b$nb$ )HbDbDbD   $3EVdubTbALbLbHL/@bDSbv\bAdub;bsL<b8 )X ?yt  )b)|:b V|hv<b8bvb,bb):bN|\bg n ) sxDbbb+b b' 2b$= D _IP]zb'b, c` oDDbbbD |)b0 3? LDKXbAebPpt ) zbPLbAbHtbHbtbL'1 aHebpb ) cbPbHbD$b@9b8VbH`bAlbw| ) bb'  ) b( cbL c bAbD$bt6tBtTbD_ )gbHt c{ bAb@bv  )p b@bbb'!b'.b;bC cJ OVab4r cy ~b(bbH*07HFDTdJlsbTbLbHbA49  btb?  bC  b0 6 b ] To Xw ( T  X (  T  Z *   !!bv!b8-! c4! 9!?!b,T!Tb!r!Xz!(!T!Y!)! ! !! !!b!T!T!|"" "."|@"H"OO"bp"b""G"G"""#b#b#1#B#b(Z#Dk#x## ) ##b(# # o##b##b'#b $|$"$b6$D$b K$ ) S$ c X${$T$$Z$*$$ $ $$ a % a%%bT(% c/% z4%?%bDP% cW% )p \%p%bz%b%4%%9% %b@%%%4%%9& &&bO"&0&;&bI& )`N&U&|c&s&{&O&|&&&O&b&|&&&P&b&|'''P)'b4' J@'F'bCT'4a'p'9x' ''b'|''b('D''I' (()(;(bK(TY(|g(w((P(T((X((( ( (( (( ((b( )) )) o) )( #) e,)7)>) LF) cK)W) {\)f)u) z))) ))) ))D) ))))b *D(*4*tC*P*b<X* c@d*Tq**X*(*T*Z******D*b$**+T+!+X)+(1+T>+M+XU+(]+ d+ k+o+ t+{++ ) ++T++X+(+T++Y+)+ ,  ,, ,", ',3, 8,D, I,U,4b,q,9y, ,4,,9, ,|,,b4,L, -D-T%-4-W<-'D-TQ-`-Wh-'o-b4z-bH-b$-- ) --b$-b$--. ..b. c )./.b8;. @.J.X.bq..b,. ) ...b8. ...| /b8/b41/B/b8M/ X/b$c/ w/// %/ // a@/ aP/0bH0bT0bD'0L90M0b(a0 cl0bAx0b40b0 000 )x 00 ) 00 ) 01 )h 11bH 1 )+1b51bE1 )@J1Q1 )V1\1bi1by1T11X1(1111 a1D 2|2 )'282 aA2G2b|22 )22233 )X3D-3C3b N3b3bm3\s3b33b(3b 3b33b33b4b8.4<4b]4bP~4b@4b,4b44b(4b,4 444b5b 5b 5'5 ) ,525b8M5b8S5bvf5 ) k5q5555b 555 )55|55b$ 6b86 46bDC6bd6bn6b66Z6*6 6 66 66b67 ) 77 ) 77b7 )777b88|%838bH8 )HY8 )^8e88b88b8b8b8 )8D9b$79R9X9b,g9b(r9 )!k-F)49 oy .5?g9{A b t  R d  m  w    u ) D"(Vf.h ([0\8^@ H P X5 `6 h8 px&') (08@H,P,X,`}.h~.p.x...///000555666666666 6(60686@6H6P7X7`7h 7p7x77777 7"7(7)7+7172747:7;7=7C7D7F7L7M7 O7(U70V78X7@^7H_7Pa7Xg7`h7hj7pp7xq7s7y7z7|7777777888 9999999  9("90(98)9@+9HH9PI9XK9`hpx \ $6 (04<'@HLTX`dlpx|,~../056666 6 7$,7087<D 7HP)7T\27`h;7ltD7xM7V7_7h7q7z777899 9)9I9 (,48DDI *I. 8`< F`JTXbfpt~((e.e.##($)\c WDa.0JI&b8HJI\vnb E\J c-E2W?DQ VDc(ha.u(z0  9 A   8$@(d,l048*<2@kDsHLPbTjXa\i`dhl lt p t x | o!w!!!="E"$$%%%%p&x&&&&&''m'u'''t(|(((}****+&+J+ R+++++ n,$v,(,,,01-49-8]-<e-@1D1H6L6P~TX\`dhlpLtx|ez     $N(P0c4e<@HBLDTqXs`dlpxH|Jac)+$"&"-(/(     $( 0P4}8 @eDlH PTX `Nd{h pstx 2  T mx 5+ &/ &". /(l/ .< $( 01 43 8@N D+ HP T X` d hp tM x % 7 < k      Yua a  0a8HaPP`ahxa`a aaaa#@a) a@(8aP@PPa`X@P`+p+ 0@`p+"-p)J 08)@)HEP^Xs`)@h)`))))0)X)3)))) 08)P@)H:`p)x)))s)0)) X()0)X@PXX`h)X)):)::) (08@HP.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela.export_symbol.rela.noinstr.text.rela__patchable_function_entries.rela.init.text.rodata.str1.1.rela.discard.annotate_insn.rela__bug_table.rela.altinstructions.rela.altinstr_replacement.rela.altinstr_aux.rodata.str1.8.rela.smp_locks.rela__ex_table.rela__jump_table.data..once.rela.init.setup.rela.init.rodata.rela.data..ro_after_init.rela.rodata.rela.discard.addressable.init.data.data..percpu.comment.note.GNU-stack.note.gnu.property @@ x'0+@ &@001`;`6@0O!J@00b8]@0 {9@(e0 2[SnY@A 0Y^@@N 0`@W0ya-@Z0a~@[02(b8#`y@]h 03{.@g00C{ >@ k 0P~a~h\@t0!rd m@w(0#@y0%  @yx0'X@80) 0 (18 Xh1 [@