ELF>@@21H9u&eHHHH9tHH@HDff.HHHH HeHH 01HƿHff.HHH H9r+HH8rH ȹ HH 0+101Ҿ1Hƿ @eHH9teH=HHH 0H1ҿHfHt%Hu5t HuS#2H HH +tMHHHDHڹ#H 0[H1ҿ#5H1ҿ#[HUSwte[]1ۃtHڹ#H 04#2H H H H9tȐ 1H#H9t1H޿#뻹#2HH H :H됹#2HH H HtH1ҿ#H\H1ҿ#HDS@t[H[fDHHtHHthHJHHu݋HP@PHeH;tU1똋=OHCw?HHPPHeH;u1;Hu\HPu(PPHeH;t1 H4Hu g1  t P HHeH;1sHPbPPHeH;19PPPHeH;1R ;FP@(O1H=tF=t=t HP P@OeH;=uPPPOeH;=uH<$H<$HtSHtAHtHHnH1t ultBwyHP @vHPH<HH<AvBv1w9HP HPHPHS HH0r=t-HHHeHH 0=u1HƿHfSHHw =w =twHH[iHu =oH:H$Hvq_wHA=4HHHHHH9HHHHDI11HHHt @H H/HHy@HH@t=HH+r=t9HHHHHHHHf.HHĀt!HHHHHfAWAVAUATUSHHH\=HIILEHH#suHIH#r`HIH!rKHH,sHH-r=IuHIH$HLDHIt-HIH1rHH-HLDHIH3HLEIHLEHHHH6HHEHH:AUIHAVHAWHATH HH[]A\A]A^A_wHIdIXHt#I1HL $HL $FHHL $HHOHHHH[]A\A]A^A_fHHשt!HHHHHHHשt;HH=rHHHHHHHff.fHHש HH4HuMHu3HHHHHt HHHHHHHHHש@tmHHtDHu\HHHHHHHHHHHHHHשtHHHHDHHשt!HHHHHHHשtct?HHuUHHHHHHHHHHHHHff.@HHשPwLt u_T5HVHHFHHHHHHHHHHHHHH s!HHHHHHHש@t!HHHHHHHH"s!HHHHHHHH&s4HuHHHHHH@HHH's!HHHHHHHH)s!HHHHHHHH*s!HHHHH=tH GPLGPLGPLGPLGPLGPLGPLGPLGPLGPLGPLeH1ff.1@1@w#wNts1tntqtsH 11H੐u[u'u1tj1uu1uuuͿuvdHttSHHtrHu1[HHt(HHu111[H@ttSHHtrHu1[HHt(HHu111[HttSHHtrHu1[HHt(HHu111[Ht^HH"sISHHu1[;ou{nu{u1[1ff.@Ht*HtH1?ounuu 1f.Ht`H@tKSHHu1[HHu1[1ff.fHSHHu1[;ou{nu{u1[HHu:HH'r up 1[HHufHHuDHH0 늸DHUHSHu1[]+ou{nu{u1[]HHtvt$HH1[]{muր{uyHSHHt%HHu$1[1[;ou{nu{u HHu HHt"HHuufHHuDHH0H=SHHu1[;ouv{nup{ujHu  HH%r 1[HHu[HHt5HHt"HHu%1HHu! = HHuHHu{HHuYHHu 7HH#ff.HtSHHu1[;ou{nu{u1[HHu1[HH럸ff.H=SHHu1[;ou{nu{u1[HHu HHt&HHu"1nHHZHSHHHu1[HHt!HHu11HHt(HHu&111lHHS1D[f.HSHHt%HHu$1[1[HHtHHuHHu HHuff.fHSHHt%HHu$1[1[HHu4HH*r u-  HH뎐 ͸HUHS,HHHtDHHHuHHu7HHu-HHu51[]HHu5HHHu1[]HHu HHu HHtDHHu@Hut  @1HHD=uMt8HH+s6HHH@HHH eH01HƿHf.SH2H HH KHHHH1DP\H+HĀu u PHH>&HB!H$ b$ TH1ҿHHHHH"H2HH:rHH;sg"ZuDHH:r HH;r H#=c!HH19H4HH@=!H= tH@-HH+R H&N t$HH@HH"ttH= tHH+HBHHD Et&HtHHHH ==rH#wtuH@H@tVH;  #2H HH  HH'[bHH#s=u HH)t,H +HHHH*vHH:d=E=aH/HtP=== H4HHH'sM} e =idH4HHH:rHH;HH;  wH HHHtD=H9HHH@HH+=yHu H%H G} HHH"H hHH HH:Ht@<R< JHH>qH4HHtv=tNHHtHHtH4HHH"sA=K HH5u HH s'=H4HHH*s4=B =5 H4HHĀt#KH4HPH { l A =H=u'=^=$= Z ;HH=r   DEtn=#HH2rDEt  H@=) = =# = z HH. @ @HH/r= =H)H8r R  HHHH@t0H4H ulHH.r/ @ @HH3  HHHHH,sHH-HH"HHHHH eH0HH#  % j =tl[H!-%Ho=+b,V=t݋Lc1QHH.r{ @ @[HH,r  HH>P  f}tZHHH3rU  HH-M HHH:<t< =UHH0rDEt  H7u5HH1T HH1rU=]HHH9YGHH6rDE @ @H HH*r=J  HH:r5'  onHH;u =1yH.w HHHHHHO=HH7r HHHHHH eH0 lHHHt=H{mdHH9R=E6vXHH><!HH:rB  }H4HH4H@'M HH@HH2r  =u =1HH2r  H=u =1=HHHH!rD E|  HH$rDEW  HH-r5I t+HH-r HH,r[  RH1=HH2rD E(  I/H1H!HHHHHH eH0[FHH,r,HH*r   HH.r' @ @HHHHHHHL  =W HH9 HidHH4vuH=HHHHtDEkHH+I=H=3 H4HHH.rD ES @ @HH/rDE HHH<< HHH.r  @ @HH3rH  HHHHHHH2r=  eHH2r   HH-VH ?HH RH t:HH+r,HH$r   HH%re $&t3=4H H;H3=UHlH4\HH4HHHH1rt  nH1ҿH =HnH*H7DEM D1HƿHHH##DE1H޿# 1=fHH1HƿH 5HHH4H@/ Q.H4Q  w^DE HHHHHHHHHHHS HH=fH$HH*r  onHH(}= eJT_q1>F HHM^EH H1<HH1]HH12HHHH$DE PHiHH9r5t  HHH  i  H |  ,    {     q        Hv HH 1tH@bH* GHH9>    * 4o "2HUnknown bug %x arch/x86/kernel/cpu/bugs.cofffullfull,nosmtforcevmexitstuffuserautoprctlprctl,ibpbseccompseccomp,ibpbretpolineretpoline,amdretpoline,lfenceretpoline,genericeibrseibrs,lfenceeibrs,retpolineibrsflush,nowarnflushflush,nosmtfull,forcemicrocodesafe-retibpbibpb-vmexitunretnosmtVulnerableMitigation: TSX disabledVulnerable: No microcodeMitigation: IBRSMitigation: Enhanced IBRSMitigation: StuffingUser space: VulnerableMitigation: IBPBMitigation: IBPB on VMEXITalways-onconditionalcuser_kernel, cuser_user, cguest_host, cguest_guest, cSMT mitigations: coff cauto con 6SRBDS: %s 6Spectre V2 : %s 6RETBleed: %s 6ITS: %s 6MDS: %s 6TAA: %s 6MMIO Stale Data: %s 6VMSCAPE: %s 6Spectre V1 : %s 6active return thunk: %ps 6GDS: %s Not affected Mitigation: PTI Vulnerable %s - vulnerable module loaded; BHI: Not affected; BHI: BHI_DIS_S; BHI: SW loop, KVM: SW loop; BHI: Retpoline; BHI: Vulnerable; PBRSB-eIBRS: Not affected; PBRSB-eIBRS: SW sequence; PBRSB-eIBRS: Vulnerable; RSB filling; STIBP: forced; STIBP: disabled; STIBP: always-on; STIBP: conditional; IBRS_FW; IBPB: always-on; IBPB: conditional; IBPB: disabled%s%s%s%s%s%s%s%s Mitigation: PTE Inversionvulnerablemitigateddisabled%s; SMT Host state unknown %s; SMT %s Processor vulnerable enabled with STIBP protectionMitigation: SMT disabledMitigation: Safe RETMitigation: RetpolinesVulnerable: LFENCEMitigation: Clear CPU buffersMitigation: Microcode     G 0   k   t t  Z   ^     y   K -  z ~ p             s m  a     x f  [     uuuuuu_u3ITS: Ignoring unknown indirect_target_selection option (%s).3Transient Scheduler Attacks: Ignoring unknown tsa=%s option. 3Spectre V2 : Ignoring unknown spectre_v2_user option (%s).3Spectre V2 : Ignoring unknown spectre_v2 option (%s).3Spectre V2 : Ignoring unknown spectre_bhi option (%s)3Speculative Store Bypass: Ignoring unknown spec_store_bypass_disable option (%s). 3Speculative Return Stack Overflow: Ignoring unknown SRSO option (%s).3VMSCAPE: Ignoring unknown vmscape=%s option. 3RETBleed: Ignoring unknown retbleed option (%s).Unknown: Dependent on hypervisor statusMitigation: Aligned branch/return thunksUser space: Mitigation: STIBP always-on protectionVulnerable: Clear CPU buffers attempted, no microcode6mitigations: Enabled attack vectors: 3Spectre V2 : EIBRS selected but CPU doesn't have Enhanced or Automatic IBRS. Switching to AUTO select 3Spectre V2 : LFENCE selected, but CPU doesn't have a serializing LFENCE. Switching to AUTO select 3Spectre V2 : IBRS selected but not Intel CPU. Switching to AUTO select 3Spectre V2 : IBRS selected but CPU doesn't have IBRS. Switching to AUTO select 3Spectre V2 : WARNING: LFENCE mitigation is not recommended for this CPU, data leaks possible! 3RETBleed: WARNING: CPU does not support IBPB. 3RETBleed: WARNING: retbleed=stuff only supported for Intel CPUs. 6Speculative Store Bypass: %s 6L1D Flush : Conditional flush on switch_mm() enabled 4Speculative Return Stack Overflow: IBPB-extending microcode not applied! 4Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options.5Speculative Return Stack Overflow: Reducing speculation to address VM/HV SRSO attack vector. 4GDS: Mitigation locked. Disable failed. 6Transient Scheduler Attacks: %s 3RETBleed: WARNING: retbleed=stuff depends on retpoline 3RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! 3ITS: WARNING: Spectre-v2 mitigation is off, disabling ITS 3ITS: WARNING: ITS mitigation is not compatible with lfence mitigation 6Spectre V2 : Selecting STIBP always-on mode to complement retbleed mitigation 6Register File Data Sampling: %s 6Speculative Return Stack Overflow: %s 4Spectre V2 : WARNING: IBRS mitigation selected on Enhanced IBRS CPU, this may cause unnecessary performance loss 6Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT 6Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT 4Spectre V2 : Unknown Spectre v2 mode, disabling RSB mitigation 6Spectre V2 : Enabling Speculation Barrier for firmware calls 6Spectre V2 : Enabling Restricted Speculation for firmware calls 3RETBleed: WARNING: BTB untrained return thunk mitigation is only effective on AMD/Hygon! 6Spectre V2 : mitigation: Enabling %s Indirect Branch Prediction Barrier 4L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. 6L1TF: You may make it effective by booting the kernel with mem=%llu parameter. 6L1TF: However, doing so will make a part of your RAM unusable. 6L1TF: Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide. 4GDS: Microcode update needed! Disabling AVX as mitigation. 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on VM exit only 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit 3Spectre V2 : System may be vulnerable to spectre v2 6Spectre V2 : Update user space SMT mitigation: STIBP %s 4MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. 4TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. 4MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. 4VMSCAPE: SMT on, STIBP is required for full protection. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/vmscape.html for more details. Unknown (XEN PV detected, hypervisor mitigation required) ; BHI: Vulnerable, KVM: SW loopVulnerable: untrained return thunk / IBPB on non-AMD based uarch Unknown: running under hypervisorUnpatched return thunk in use. This should not happen! Mitigation: IBPB before exit to userspaceVulnerable: Safe RET, no microcodeVulnerable: Microcode, no safe RETMitigation: IBPB on VMEXIT onlyMitigation: Reduced SpeculationMitigation: Speculative Store Bypass disabledMitigation: Speculative Store Bypass disabled via prctlMitigation: Speculative Store Bypass disabled via prctl and seccompMitigation: Enhanced / Automatic IBRSMitigation: Enhanced / Automatic IBRS + RetpolinesMitigation: Enhanced / Automatic IBRS + LFENCEUser space: Mitigation: STIBP protectionUser space: Mitigation: STIBP via prctlUser space: Mitigation: STIBP via seccomp and prctlMitigation: Clear CPU buffers: user/kernel boundaryMitigation: Clear CPU buffers: VMMitigation: Vulnerable, KVM: Not affectedMitigation: Retpolines, Stuffing RSBMitigation: untrained return thunkVulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriersMitigation: usercopy/swapgs barriers and __user pointer sanitizationMitigation: AVX disabled, no microcodeMitigation: Microcode (locked)Mitigation: Clear Register File  vmscapespec_rstack_overflowl1tfspec_store_bypass_disablenospec_store_bypass_disablespectre_bhispectre_v2nospectre_v2spectre_v2_usertsaindirect_target_selectionretbleednospectre_v1gather_data_samplingl1d_flushsrbdsreg_file_data_samplingmmio_stale_datatsx_async_abortmdsGCC: (Debian 12.2.0-14+deb12u1) 12.2.0GNU+Q w0@P`p!Er$D  $@J @$$ p$$  9  $` $\G  $X#$M  P-$T=$L  qH$P  =X=  &b* s  w$8 $( $  $H  u $,5 $T $4$0E @v.$=$N|b$Hs$ $$&($N&8&(&(& & P& $&7& 8C T& a&  m&8&`0&@0&(        -!K##$&m!#!0#((@!HZ#"x!`#<!x#X !#d B!e#o !#|!#!.#L!k# ! # !8# (5 !PU # *y !h # ! # ! #? !e #  ! # ( (  ((I (0w (8 (@ (H (P< ;+a+?@0@U1UA T p ~       v  $   1 $pE $h^ Nt      (  $<  '8DTg{C $x`P$ 0H:\u@_^  p1>Pf vxP G pIcP ;  I/H@ZIxpII0\II`I0bugs.c__export_symbol_x86_spec_ctrl_base__export_symbol_x86_spec_ctrl_current__export_symbol_x86_ibpb_exit_to_user__export_symbol_spec_ctrl_current__export_symbol_switch_vcpu_ibpb__export_symbol_cpu_buf_idle_clear__export_symbol_cpu_buf_vm_clear__export_symbol_x86_virt_spec_ctrl__export_symbol_gds_ucode_mitigated__export_symbol_itlb_multihit_kvm_mitigation__export_symbol_l1tf_vmx_mitigationgds_mitigationspectre_v1_mitigationnospectre_v2spectre_v2_cmdnossbssb_modeshould_mitigate_vulnmds_mitigationmds_nosmttaa_mitigationtaa_nosmtmmio_mitigationmmio_nosmtrfds_mitigationsrbds_offl1d_flush_mitigationits_mitigationtsa_mitigationspectre_v2_user_cmdbhi_mitigationsrso_mitigationvmscape_mitigationretbleed_mitigationretbleed_nosmtupdate_stibp_msrspec_ctrl_disable_kernel_rrsbarrsba_disabledx86_arch_cap_msrx86_amd_ssb_disablesrbds_mitigationspectre_v2_user_ibpbspectre_v2_user_stibpssb_stringsverw_clear_cpu_buf_mitigation_selectedretbleed_stringsits_stringstaa_stringsmmio_stringssrso_stringsvmscape_stringsspectre_v1_stringsgds_strings__already_done.6rfds_stringsmds_stringsspectre_v2_stringssrbds_stringstsa_stringsspectre_v2_user_stringsspectre_v2_bad_modulespec_ctrl_mutex__already_done.3__already_done.2__already_done.4__already_done.1__already_done.0__setup_vmscape_parse_cmdline__setup_str_vmscape_parse_cmdline__setup_srso_parse_cmdline__setup_str_srso_parse_cmdline__setup_l1tf_cmdline__setup_str_l1tf_cmdline__UNIQUE_ID___addressable_l1tf_vmx_mitigation668__UNIQUE_ID___addressable_itlb_multihit_kvm_mitigation667__setup_ssb_parse_cmdline__setup_str_ssb_parse_cmdline__setup_nossb_parse_cmdline__setup_str_nossb_parse_cmdline__setup_spectre_bhi_parse_cmdline__setup_str_spectre_bhi_parse_cmdline__setup_spectre_v2_parse_cmdline__setup_str_spectre_v2_parse_cmdline__setup_nospectre_v2_parse_cmdline__setup_str_nospectre_v2_parse_cmdline__setup_spectre_v2_user_parse_cmdline__setup_str_spectre_v2_user_parse_cmdline__setup_tsa_parse_cmdline__setup_str_tsa_parse_cmdline__setup_its_parse_cmdline__setup_str_its_parse_cmdline__setup_retbleed_parse_cmdline__setup_str_retbleed_parse_cmdline__setup_nospectre_v1_cmdline__setup_str_nospectre_v1_cmdline__setup_gds_parse_cmdline__setup_str_gds_parse_cmdline__UNIQUE_ID___addressable_gds_ucode_mitigated597__setup_l1d_flush_parse_cmdline__setup_str_l1d_flush_parse_cmdline__setup_srbds_parse_cmdline__setup_str_srbds_parse_cmdline__setup_rfds_parse_cmdline__setup_str_rfds_parse_cmdline__setup_mmio_stale_data_parse_cmdline__setup_str_mmio_stale_data_parse_cmdline__setup_tsx_async_abort_parse_cmdline__setup_str_tsx_async_abort_parse_cmdline__setup_mds_cmdline__setup_str_mds_cmdline__UNIQUE_ID___addressable_x86_virt_spec_ctrl584__UNIQUE_ID___addressable_cpu_buf_vm_clear583__UNIQUE_ID___addressable_cpu_buf_idle_clear582__UNIQUE_ID___addressable_switch_vcpu_ibpb581__UNIQUE_ID___addressable_spec_ctrl_current580__UNIQUE_ID___addressable_x86_ibpb_exit_to_user579__UNIQUE_ID___addressable_x86_spec_ctrl_current578__UNIQUE_ID___addressable_x86_spec_ctrl_base577.LC1__x86_return_thunkcpu_attack_vector_mitigated__warn_printksmt_mitigationsboot_cpu_dataconst_current_taskspeculation_ctrl_updatestrcmpalternatives_patchedcpu_caps_setl1tf_mitigationstrchr__tracepoint_write_msrdo_trace_write_msrx86_amd_ls_cfg_basex86_amd_ls_cfg_ssbd_maskupdate_spec_ctrl_condupdate_srbds_msr__tracepoint_read_msrdo_trace_read_msrupdate_gds_msrcpu_select_mitigationsx86_read_arch_cap_msrspectre_v2_enabledswitch_mm_cond_l1d_flushstatic_key_enablecpu_smt_possiblemsr_set_bitcpu_smt_disablestatic_key_disablesetup_clear_cpu_capsrso_return_thunkcall_depth_return_thunkdump_stackswitch_mm_cond_ibpbswitch_mm_always_ibpbstatic_key_countx86_pred_cmdits_return_thunkretbleed_return_thunke820__mapped_anysrso_alias_return_thunkretpoline_module_okarch_prctl_spec_ctrl_setspeculation_ctrl_update_currentwrite_ibpbarch_seccomp_spec_mitigatearch_prctl_spec_ctrl_getx86_spec_ctrl_setup_apcpu_bugs_smt_updatemutex_locksched_smt_presentswitch_to_cond_stibpmutex_unlock__cpu_online_maskon_each_cpu_cond_maskcpu_show_meltdownx86_hyper_typesysfs_emitcpu_show_spectre_v1cpu_show_spectre_v2cpu_show_spec_store_bypasscpu_show_l1tfcpu_show_mdscpu_show_tsx_async_abortcpu_show_itlb_multihitcpu_show_srbdscpu_show_mmio_stale_datacpu_show_retbleedcpu_show_spec_rstack_overflowcpu_show_gdscpu_show_reg_file_data_samplingcpu_show_old_microcodecpu_show_indirect_target_selectioncpu_show_tsacpu_show_vmscape__warn_thunkf@k\!/D<"fD.tfDf@'= /HVff!fftf 8f Cf tf fff#afff .f Dff ( - 5 f V [ a f\s fT b fP b f$  f  f\  b( ? D P U [ fr f  | b / b   +  /    " . 3 > fPH f|V [ g /m bs  /X b  / b   D  K  :  , & /P+ W e f<l Wt gy  ,    [ w x  |  |& 4 TB TO fW ` |g /t    T  D  D w .  f  L <D" w) w6 ADRc m gt  q w|f  ^     & 6 ,>wf W g ,D K   W# ,(Wkf\r<z g   -     ,'fT2 g><N U -Zh o -t W ,  9 ,'7fD> WF g`KY ,^fP< g  -  ? W , G[f0j|f   O g - g W  / ,'f(. W6 g ;I ,Nwf@ W g  ,fL W g  ,7H<V K[i /n| ,f4 W g ,f$ W& g@+9 ,>gwf~ W g ,bb / $EJ\a ;Shy28w48`[ W    2   S/a{ReBUbu2E(8HXhx0 `(008@H@PX`hpx    00  ( 0@ 8 @`HP@X`hppx0` Pf8FfOfvff %D\q +fX0 /8C 4KUfXafWjfX +fP / 4fPfHfPWn +s}fL / 4fLfGfL  +#-fHPfH +,; +CMf<` ?hrf< +f0f0  ?"f03>FWV E^hf0x Lf0 / +f f / R7J /@OWf vf  W +ff f \ *f7 b?J mR\fkf{ uf /f + f$ * f; J R UZ g v ~ W   f       f f   fB J T fn v  f W  f   f /  +  fB fU E] g f} /  f W  f f + ( f5 \= H mP Z fm f /0   +       + : B M /U _ t     +   f$f$+ 3> "FPf$\f$i 'q{f$ / + "ff ?#.;FNXUfe /j +f0 W +f,$ 3,6f,F WNXf,l "t~f, Lf, 9 ?Vf( /BfKf}UTcvff / f|+=O^ Rcif8f8fD|1MT` /(elrfff0DDff fD%f0D=fHYfgDxf g /f\fILfT*fP>PbsfLf~fIfCf{L<f@ /8 { t & /+2Cf'P^|of(|<f@f~f4+8f ESf^of$|f  c /XDff f3f((f/5Bf0J gQ V]jf/f4 g DDfffD '|6f = L QXefIrfX}t / fXLfIfPtfPf|fT-fP8>fIQWfLmsfHf@f$| /f$D /f,$D5f,Df,SfTd gk pwfIfLf|ttfL /fP g fIfHf~- c4 / :fHCIfSf^kf/xf( g  /@ f/f'f g f< g |.4cf0ffH H D-<JDKf\]fTpfP{fI49  f|fGfKf' f(9TKXS([ThwX(TZ*   f~f@ g  !  f40 T= L XT (\ Tn Yv )~    f T T |   !|!"!O)!f$J!fr!G!G!!!!|!!!P"D" "H("0"DA"s" /8 x""D""I""D"H"""D"#f/#T#/#Y7#)?# / D#]#fg#fr#\#f#f#\#f#b###D $$D+$;$IC$K$ / P$V$f0f$Ts$$X$($T$$Z$*$$$$D$f,$% %f% %%%f=% B%I% N%U%  \% / e% n%t%f%D%%I%%%%% /p%&f0 & ?& &6&f=&fM&`&q&f0&D&&&f&&D'&'T3'B'ZJ'*U'`'fLq' gx' / }''f\' g ' ''f'f''((fX(fP,(49(H(9P( W(fH`(n(z(4((9( ((fW(((f ( / ((|)))O!)|/)?)G)ON)f$^)|k)z))P)T)X)()T))X)()f) * *fK*4(*8*9@* P*^*f$m*f0|*f*f *|******T+|++'+P/+T<+K+XS+([+ b+ i+m+ r+~+ %+++ 3+++ B++ +++D ,,-,4, <, gA,L,\,f,g, |{,f/, , /,, ?,f,,f, ?,,f,f -L-fI%-t4-A-fDI- g`Y-e- fj-v-T--X-(-T--X-(- - -- --. /` ..T%.4.X<.(D.TQ.`.Yh.)p. w. ~.. .. u.. m..4..9. .4./9 / /|#/;/LM/[/Di/Tv//W/'/T//W/'/f</f</f,/0 /0 0f,0f,,0|=0f$H0 S0fPb0p0 /Hu0{0f,0 000f@0 00f$0 g@00f$00 / 1 1T1&1Y.1)M1S1^1u1f41 /0111f@1 J111|1f@2f< 232@2K2f@V2 ca2f,l2 22fP2L22f\2fL2f02 g2f< 3 363 B3r33 / 33 /` 33 / 33 / 33fP3 /33 /p 334 /44 /844f''4f$74 /<4H4TU4d4Xl4(w4444f04f4f@44f$5fH85f4C5f N5\5f j5x5f 5fL5fX5f5f<5f06f46 /P66%6fR6 /W6c6 h6t66f 6\6f6f6\6f6f66 /p 66f@7f@7f~/7 / 47;7|M7e7f,t7f@7 ?77 /777f$77Z7*7 7 77 8 8f?8 / E8bK8 9 /(9$9 /)9/9f:9 /I9[9i9f y99|99f$99f$99D:f,F:b:f4q:f0|: /`!X3=Rj)y)49\cmY~O(d   g + N s    g   n  $|e'DS!!%V91h (08@- H. P0 X6 `7 h9 ppxqs(#)#+#//0/2/1 1"1j1k1m11 1(10383@3H,3P-3X/3`O3hP3pR3xZ7[7]7777888!8"8$8*8+8-8384868T8U8W8 ]8(^80`88f8@g8Hi8Po8Xp8`r8hx8py8x{888888888888888888888 8(80888@8H8P8X8`8h8p8x88888888888899999:::: :(:0%:8&:@(:H.:P/:X1:`7:h8:p::xW:X:Z: . $7 (0q4<@HLT)#X`0/dl 1pxk1|13-3P3[778"8+848U8^8 g8 p8$,y8088<D8HP8T\8`h8lt8x8888888899::&:/: (8:,4X:8@DLPDDI *I. 8`< F`JTXbfpt~%%8181##($)\c W4113JI&b8HJI\vnb E\J c-E2W?DQVc%h41u%z13;CG O s { CK $(9,A048H<P@tD|HLPI TQ Xk \s `!d!h!l!p"t%"x"|""",#4#8$@$$$$$%%?'G'E(M((())<)D)w))))))5*=*+$+H+P+- ---1.9. ].$e.(.,.0.4/8/</@/D/H#1L+1Pa4Ti4X7\7`~dhlptx|Lez NP$c(e04<B@DHqLsTX`dlHpJxa|c !%%**  P$}( 0e4l8 @DH PNT{X `sdh pt2x  T mx ; 2 !1 %u2 *B1 .< $( 01 43 8@N D+ HP T X` d hp tM x % 7 < k      Iexee  0e8 He"P `e<hpxeX edeo@e|eee e(8e@ PeXhepeePe ex?/X ?0c8/@/HmPX`/h/?//H/?///(|/X// /@?PcX/`/ h?/H/`/x?/|//  ?0c8/h@H/P/8`?pcxJ/8?/c?/?/J ?08/ (08@HP.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela.export_symbol.rela.noinstr.text.rela__patchable_function_entries.rela.init.text.rodata.str1.1.rela.discard.annotate_insn.rela__bug_table.rela.altinstructions.rela.altinstr_replacement.rela.altinstr_aux.rodata.str1.8.rela.smp_locks.rela__ex_table.rela__jump_table.data..once.rela.init.setup.init.rodata.rela.data..ro_after_init.rela.rodata.rela.discard.addressable.init.data.data..percpu.comment.note.GNU-stack.note.gnu.property @@``'/+@ &@0/1`;`6@/O!J@0/b8]@(@/ :@h0i/ 2T~Z@F@/>_X@T` /a@8^/vb-@8a/b~@b/2(c#y@d /3{.@n0/C| >@r /P~a~\@{/!m z@P/$`@ @hx/&X@/( 0 (18 X0 P