ELF>H@@43HHHH HeHH 01HƿHff.HHH H9r+HH8rH ȹ HH 0+101Ҿ1Hƿ @eHH9teH=HHH 0H1ҿHfH9u&eHHHH9tHH@HDff.Ht%Hu5t HuS#2H HH +tMHHHDHڹ#H 0[H1ҿ#5H1ҿ#[HUSwte[]1ۃtHڹ#H 04#2H H H H9tȐ 1H#H9t1H޿#뻹#2HH H :H됹#2HH H HtH1ҿ#H\H1ҿ#HDS@t[H[fDHHtHHthHJHHu݋HP@PHeH;tU1똋=OHCw?HHPPHeH;u1;Hu\HPu(PPHeH;t1 H4Hu g1  t P HHeH;1sHPbPPHeH;19PPPHeH;1R ;FP@(O1H=tF=t=t HP P@OeH;=uPPPOeH;=uH<$H<$HtSHtAHtHHnH1t ultBwyHP @vHPH<HH<AvBv1w9HP HPHPHS HH0r=t-HHHeHH 0=us1HƿHfSHHw =w =twHH[iHu =oH:H$Hvq_wHA=4HHHHHH9HHHHDI11HHHt @H H/HHy@HH@t=HH+r=t9HHHHHHHHf.HHĀt!HHHHHfAWAVAUATUSHHH\=HIILEHH#suHIH#r`HIH!rKHH,sHH-r=IuHIH$HLDHIt-HIH1rHH-HLDHIH3HLEIHLEHHHH6HHEHH:AUIHAVHAWHATH HH[]A\A]A^A_wHIdIXHt#I1HL $HL $FHHL $HHOHHHH[]A\A]A^A_fHHשt!HHHHHHHשt;HH=rHHHHHHHff.fHHש HH4HuMHu3HHHHHt HHHHHHHHHש@tmHHtDHu\HHHHHHHHHHHHHHשtHHHHDHHשt!HHHHHHHשtct?HHuUHHHHHHHHHHHHHff.@HHשPwLt u_T5HVHHFHHHHHHHHHHHHHH s!HHHHHHHש@t!HHHHHHHH"s!HHHHHHHH&s4HuHHHHHH@HHH's!HHHHHHHH)s!HHHHHHHH*s!HHHHHH=GPLGPLGPLGPLeH1ff.1@1@HttSHHtrHu1[HHt(HHu111[H@ttSHHtrHu1[HHt(HHu111[HttSHHtrHu1[HHt(HHu111[Ht^HH"sISHHu1[;ou{nu{u1[1ff.@Ht*HtH1?ounuu 1f.Ht`H@tKSHHu1[HHu1[1ff.fHSHHHu1[HHt!HHu11HHt(HHu&111lHHS1D[f.HUHS,HHHtDHHHuHHu7HHu-HHu51[]HHu5HHHu1[]HHu HHu HHtDHHu@Hut  @1HHDHSHHu1[;ou{nu{u1[HHu:HH'r up 1[HHufHHuDHH0 늸DHUHSHu1[]+ou{nu{u1[]HHtvt$HH1[]{muր{uyHSHHt%HHu$1[1[;ou{nu{u HHu HHt"HHuufHHuDHH0H=SHHu1[;ouv{nup{ujHu  HH%r 1[HHu[HHt5HHt"HHu%1HHu! = HHuHHu{HHuYHHu 7HH#ff.HtSHHu1[;ou{nu{u1[HHu1[HH럸ff.H=SHHu1[;ou{nu{u1[HHu HHt&HHu"1nHHZHSHHt%HHu$1[1[HHtHHuHHu HHuff.fHSHHt%HHu$1[1[HHu4HH*r u-  HH뎐 ͸w#wKtp1tktntpHH11H੐u[u'u1tj1uu1uuuͿuvdf.5tn=tjHH2r   HH-s} @tH=uT=tKHH3r uL  @uH=t1u l 뮐 ?=uMt8HH+s6HHH@HHH eH01HƿHf.SH2H HH HHHHH1 HF,HĀu 1u PHH>_'H!H$) $!TH1ҿHHHHH"H2HH:rHH;sg#uDHH:r HH;r H=i!HH1/H4HH=H tH@HH+ H&T t$HH@HH"i ttH=R tHH+HHHDEt&HtHHHH t==H#wtuH@H@tVHq 4E#2H HH f >HH'X(HH#s=uVHH)yt,H UHHHH* HH: = = HHtP=>w=7=H4HHH'sM  =H4HHH:rHH;dHH;(  wH HHHtD= HpHHH@HH+=kHu H%H 9 HHH"H hHH HH:H1<< HH>.H4HHtv=tNH$HtHHtH4HHH"sA= HH=u HH s'=:H4HHH*s4= = H4HHĀt#H4HP6H ) 3  |=mH=u'=^K=$=?  uHH=r. n r = = )  HH. @ @HH/r= =HH8r .  HHHH@t0aH4H ulHH.r  @ @HH3  HHHHH,sHH-HH"! HHHHH eH0}HH#R  H  q =tl[H!-%H=+,=t݋1HH.rN @ @[HH,r  HH>bP  d*tZHHH3r:  HH- HHH:<t< =SHH0rt  Hu5HH1 % HH1r=2HHH9HH6rDE @ @HHH*rDE  HH:r=  onHH; u =1Hw HHHHHHO=HH7r HHHHHH eH0G 0_HHH="HHH9=v+H@R HH><HH:r  a H4HLH4H`1  HH@+EHH2rr  HH-rDEV =u =1=HH2rDE>  HH-rD E HH2r  HH-re H(=u =11 w = HHH!rD E5  HH$rDE  HH-r5 t+HH- HH,r   /HIHHrHHHHHH eH0;HH,r,HH*r/  HH.r6 @ @HHHQHH4HJH>H-HvuHH HH t = HH96 H DEHH+H= H4S)HHHH2r 6  HH-  HTHH2r=  ^HH.rDEp @ @HH/rD EK HHH<f< ^HMHH.r5 @ @HH3r   HHHktHHHH H t:HH+r,HH$r5  HH%r C t3H= H H4WH"HHH1rt  H1ҿHT KDEHHH DE 1HƿHHH#t1=sD E1H޿# HfH1HƿH HH4H@ ) Q[H4%  $DEJ A HHHHeHHHHHYHbHH QHH=#HHH*r  onHH(I:P=Do1<^={ozHH;1)$H H1<HH1'HH1HHHHH$\DEL CH3HH9r5t  HHHH0    T H  b          A       K  Hv HH1tH@LA]RH, HH9?    J X DHofffullfull,nosmtforceflush,nowarnflushflush,nosmtfull,forceautounretibpbstuffnosmtarch/x86/kernel/cpu/bugs.cvmexituserprctlprctl,ibpbseccompseccomp,ibpbretpolineretpoline,amdretpoline,lfenceretpoline,genericeibrseibrs,lfenceeibrs,retpolineibrsmicrocodesafe-retibpb-vmexitUnknown bug %x always-onVulnerableMitigation: TSX disabledVulnerable: No microcodeMitigation: IBRSMitigation: Enhanced IBRSMitigation: StuffingUser space: VulnerableMitigation: IBPBMitigation: IBPB on VMEXITconditionalcuser_kernel, cuser_user, cguest_host, cguest_guest, cSMT mitigations: coff cauto con 6SRBDS: %s 6Spectre V2 : %s 6RETBleed: %s 6ITS: %s 6MDS: %s 6TAA: %s 6MMIO Stale Data: %s 6VMSCAPE: %s 6Spectre V1 : %s 6active return thunk: %ps 6GDS: %s Not affected Mitigation: PTI Vulnerable %s - vulnerable module loaded; BHI: Not affected; BHI: BHI_DIS_S; BHI: SW loop, KVM: SW loop; BHI: Retpoline; BHI: Vulnerable; PBRSB-eIBRS: Not affected; PBRSB-eIBRS: SW sequence; PBRSB-eIBRS: Vulnerable; RSB filling; STIBP: forced; STIBP: disabled; STIBP: always-on; STIBP: conditional; IBRS_FW; IBPB: always-on; IBPB: conditional; IBPB: disabled%s%s%s%s%s%s%s%s Mitigation: PTE Inversionvulnerablemitigateddisabled%s; SMT Host state unknown %s; SMT %s Processor vulnerable enabled with STIBP protectionMitigation: SMT disabledMitigation: Safe RETMitigation: RetpolinesVulnerable: LFENCEMitigation: Clear CPU buffersMitigation: Microcode3RETBleed: Ignoring unknown retbleed option (%s).3ITS: Ignoring unknown indirect_target_selection option (%s).3Transient Scheduler Attacks: Ignoring unknown tsa=%s option. 3Spectre V2 : Ignoring unknown spectre_v2_user option (%s).3Spectre V2 : Ignoring unknown spectre_v2 option (%s).3Spectre V2 : Ignoring unknown spectre_bhi option (%s)3Speculative Store Bypass: Ignoring unknown spec_store_bypass_disable option (%s). 3Speculative Return Stack Overflow: Ignoring unknown SRSO option (%s).3VMSCAPE: Ignoring unknown vmscape=%s option. 3Spectre V2 : System may be vulnerable to spectre v2 6Spectre V2 : Update user space SMT mitigation: STIBP %s 4MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. 4TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. 4MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. 4VMSCAPE: SMT on, STIBP is required for full protection. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/vmscape.html for more details. Unknown: Dependent on hypervisor statusMitigation: Aligned branch/return thunksUser space: Mitigation: STIBP always-on protectionVulnerable: Clear CPU buffers attempted, no microcode6mitigations: Enabled attack vectors: 3Spectre V2 : EIBRS selected but CPU doesn't have Enhanced or Automatic IBRS. Switching to AUTO select 3Spectre V2 : LFENCE selected, but CPU doesn't have a serializing LFENCE. Switching to AUTO select 3Spectre V2 : IBRS selected but not Intel CPU. Switching to AUTO select 3Spectre V2 : IBRS selected but CPU doesn't have IBRS. Switching to AUTO select 3Spectre V2 : WARNING: LFENCE mitigation is not recommended for this CPU, data leaks possible! 3RETBleed: WARNING: CPU does not support IBPB. 3RETBleed: WARNING: retbleed=stuff only supported for Intel CPUs. 6Speculative Store Bypass: %s 6L1D Flush : Conditional flush on switch_mm() enabled 4Speculative Return Stack Overflow: IBPB-extending microcode not applied! 4Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options.5Speculative Return Stack Overflow: Reducing speculation to address VM/HV SRSO attack vector. 4GDS: Mitigation locked. Disable failed. 6Transient Scheduler Attacks: %s 3RETBleed: WARNING: retbleed=stuff depends on retpoline 3RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! 3ITS: WARNING: Spectre-v2 mitigation is off, disabling ITS 3ITS: WARNING: ITS mitigation is not compatible with lfence mitigation 6Spectre V2 : Selecting STIBP always-on mode to complement retbleed mitigation 6Register File Data Sampling: %s 6Speculative Return Stack Overflow: %s 4Spectre V2 : WARNING: IBRS mitigation selected on Enhanced IBRS CPU, this may cause unnecessary performance loss 6Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT 6Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT 4Spectre V2 : Unknown Spectre v2 mode, disabling RSB mitigation 6Spectre V2 : Enabling Speculation Barrier for firmware calls 6Spectre V2 : Enabling Restricted Speculation for firmware calls 3RETBleed: WARNING: BTB untrained return thunk mitigation is only effective on AMD/Hygon! 6Spectre V2 : mitigation: Enabling %s Indirect Branch Prediction Barrier 4L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. 6L1TF: You may make it effective by booting the kernel with mem=%llu parameter. 6L1TF: However, doing so will make a part of your RAM unusable. 6L1TF: Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide. 4GDS: Microcode update needed! Disabling AVX as mitigation. 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on VM exit only 6Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit Unknown (XEN PV detected, hypervisor mitigation required) ; BHI: Vulnerable, KVM: SW loopVulnerable: untrained return thunk / IBPB on non-AMD based uarch Unknown: running under hypervisorUnpatched return thunk in use. This should not happen! Mitigation: IBPB before exit to userspaceVulnerable: Safe RET, no microcodeVulnerable: Microcode, no safe RETMitigation: IBPB on VMEXIT onlyMitigation: Reduced SpeculationMitigation: Speculative Store Bypass disabledMitigation: Speculative Store Bypass disabled via prctlMitigation: Speculative Store Bypass disabled via prctl and seccompMitigation: Enhanced / Automatic IBRSMitigation: Enhanced / Automatic IBRS + RetpolinesMitigation: Enhanced / Automatic IBRS + LFENCEUser space: Mitigation: STIBP protectionUser space: Mitigation: STIBP via prctlUser space: Mitigation: STIBP via seccomp and prctlMitigation: Clear CPU buffers: user/kernel boundaryMitigation: Clear CPU buffers: VMMitigation: Vulnerable, KVM: Not affectedMitigation: Retpolines, Stuffing RSBMitigation: untrained return thunkVulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriersMitigation: usercopy/swapgs barriers and __user pointer sanitizationMitigation: AVX disabled, no microcodeMitigation: Microcode (locked)Mitigation: Clear Register File  ~ }   % ] _ \  m   W       C       -        H I > ? b K a V S P L      K     D     uuuuuu_uvmscapespec_rstack_overflowl1tfspec_store_bypass_disablenospec_store_bypass_disablespectre_bhispectre_v2nospectre_v2spectre_v2_usertsaindirect_target_selectionretbleednospectre_v1gather_data_samplingl1d_flushsrbdsreg_file_data_samplingmmio_stale_datatsx_async_abortmdsGCC: (Debian 12.2.0-14+deb12u1) 12.2.0GNU.T v0 b (@ @((L p(( 2  (`(\ P(X(M  (T(LX q'(P @=7y &A, sV(D `  e(4y(0 0 (8 P((` ( P  ( 0  0(,l ( 6 @(N>(OE` @v(p| (Hx( ($ $$&$7$H*(T*8e*(q*(}* * P* ** 8$* *  *8*`0*@0*(5"$d%''(*%'%0' %H&'"D%``'<%x'X %'d %1'o X%~'|%'%'%7' Z% w' %8'%P' ,%h0'P%k'%'% ' * %> 'V " " " "  "(F `L aR 0X  ->- _ r   (         ' p: Q d (px (h N `U      2 A :U (<h      @_ ^  $ / A `V c v    ")     a (x&10BPV@l}( vP G .pIIcWPd}; I@IpII0\0ISI``Iq~bugs.c__export_symbol_x86_spec_ctrl_current__export_symbol_x86_ibpb_exit_to_user__export_symbol_spec_ctrl_current__export_symbol_cpu_buf_idle_clearspectre_v1_mitigationnospectre_v2spectre_v2_cmdnossbssb_modemds_mitigationmds_nosmttaa_mitigationtaa_nosmtmmio_mitigationmmio_nosmtrfds_mitigationsrbds_offl1d_flush_mitigationgds_mitigationretbleed_mitigationretbleed_nosmtits_mitigationtsa_mitigationspectre_v2_user_cmdbhi_mitigationsrso_mitigationvmscape_mitigationshould_mitigate_vulnmmio_apply_mitigationverw_clear_cpu_buf_mitigation_selectedx86_arch_cap_msrupdate_stibp_msrspec_ctrl_disable_kernel_rrsbarrsba_disabledx86_amd_ssb_disablesrbds_mitigationspectre_v2_bad_modulespectre_v2_user_ibpbspectre_v2_user_stibpspec_ctrl_mutex__already_done.3__already_done.2__already_done.4__already_done.1ssb_stringsretbleed_stringsits_stringstaa_stringsmmio_stringssrso_stringsvmscape_stringsspectre_v1_stringsgds_strings__already_done.6rfds_stringsmds_stringsspectre_v2_stringssrbds_stringstsa_stringsspectre_v2_user_strings__UNIQUE_ID_addressable___SCK__WARN_trap_703.0__setup_vmscape_parse_cmdline__setup_str_vmscape_parse_cmdline__setup_srso_parse_cmdline__setup_str_srso_parse_cmdline__setup_l1tf_cmdline__setup_str_l1tf_cmdline__setup_ssb_parse_cmdline__setup_str_ssb_parse_cmdline__setup_nossb_parse_cmdline__setup_str_nossb_parse_cmdline__setup_spectre_bhi_parse_cmdline__setup_str_spectre_bhi_parse_cmdline__setup_spectre_v2_parse_cmdline__setup_str_spectre_v2_parse_cmdline__setup_nospectre_v2_parse_cmdline__setup_str_nospectre_v2_parse_cmdline__setup_spectre_v2_user_parse_cmdline__setup_str_spectre_v2_user_parse_cmdline__setup_tsa_parse_cmdline__setup_str_tsa_parse_cmdline__setup_its_parse_cmdline__setup_str_its_parse_cmdline__setup_retbleed_parse_cmdline__setup_str_retbleed_parse_cmdline__setup_nospectre_v1_cmdline__setup_str_nospectre_v1_cmdline__setup_gds_parse_cmdline__setup_str_gds_parse_cmdline__setup_l1d_flush_parse_cmdline__setup_str_l1d_flush_parse_cmdline__setup_srbds_parse_cmdline__setup_str_srbds_parse_cmdline__setup_rfds_parse_cmdline__setup_str_rfds_parse_cmdline__setup_mmio_stale_data_parse_cmdline__setup_str_mmio_stale_data_parse_cmdline__setup_tsx_async_abort_parse_cmdline__setup_str_tsx_async_abort_parse_cmdline__setup_mds_cmdline__setup_str_mds_cmdline__UNIQUE_ID_addressable___SCK__WARN_trap_597.7__UNIQUE_ID_addressable_cpu_buf_idle_clear_596__UNIQUE_ID_addressable_spec_ctrl_current_595__UNIQUE_ID_addressable_x86_ibpb_exit_to_user_594__UNIQUE_ID_addressable_x86_spec_ctrl_current_593.LC13.LC14.LC41.LC154__x86_return_thunkboot_cpu_datastrcmpl1tf_mitigationstrchralternatives_patchedcpu_caps_set_printkcpu_attack_vector_mitigated__SCT__WARN_trapsmt_mitigationsstatic_key_enablecpu_smt_disablex86_spec_ctrl_base__tracepoint_write_msrdo_trace_write_msrx86_amd_ls_cfg_basex86_amd_ls_cfg_ssbd_maskupdate_spec_ctrl_condx86_virt_spec_ctrlconst_current_taskspeculation_ctrl_updateupdate_srbds_msr__tracepoint_read_msrdo_trace_read_msrgds_ucode_mitigatedupdate_gds_msrretpoline_module_okspectre_v2_enabledarch_prctl_spec_ctrl_setspeculation_ctrl_update_currentswitch_mm_cond_l1d_flushwrite_ibpbarch_seccomp_spec_mitigatearch_prctl_spec_ctrl_getx86_spec_ctrl_setup_apcpu_bugs_smt_updatemutex_locksched_smt_presentswitch_to_cond_stibpmutex_unlockstatic_key_disable__cpu_online_maskon_each_cpu_cond_maskcpu_select_mitigationsx86_read_arch_cap_msrcpu_smt_possiblemsr_set_bitsetup_clear_cpu_capsrso_return_thunkcall_depth_return_thunkdump_stackswitch_vcpu_ibpbswitch_mm_cond_ibpbswitch_mm_always_ibpbstatic_key_countx86_pred_cmdits_return_thunkretbleed_return_thunke820__mapped_anysrso_alias_return_thunkcpu_show_meltdownx86_hyper_typesysfs_emitcpu_show_spectre_v1cpu_show_spectre_v2cpu_show_spec_store_bypasscpu_show_l1tfcpu_show_mdscpu_show_tsx_async_abortcpu_show_itlb_multihitcpu_show_srbdscpu_show_mmio_stale_datacpu_show_retbleedcpu_show_spec_rstack_overflowcpu_show_gdscpu_show_reg_file_data_samplingcpu_show_old_microcodecpu_show_indirect_target_selectioncpu_show_tsacpu_show_vmscape__warn_thunk__SCK__WARN_trapl1tf_vmx_mitigationitlb_multihit_kvm_mitigation$5s\zD<bDtV\bDb@b@'= &8sVbb!fbtb 8b Cb tb bbb#abbb .b Dbb ( - 5 b V [ a b\s bT ^ bP ^ b$  b  b\  ^( ? D P U [ br b  | ^ & ^    @ &p    " . 3 > bPH b|V [ g &m ^s  &H ^  & ^   D  L  ;  - & &P+ W e b<l Xt cy  -   s \ ` x  |  |& 4 TB TO bW ` |g &t    T  D  D ` .  b  L <D" `) `6 ADRc m ct  q `|b  ^     & 6 ->wb X c -D L   X# -(Wkb\r<z c   -     -'bT2 c><N U -Zh o -t X -  9 -'7bD> XF c`KY -^bP< c  -  J X - G[b0j|b   O c - c X  & -'b(. X6 c ;I -Nwb@ X c  -bL X c  -7H<V L[i &n| -b4 X c -b$ X& c@+9 ->gwb~ X c -)\BQC$;JeCjC |C2Gn48`[ W    2   S/a{ReBUbu2E(8   0 `  ( @0 8 @ 0H P X P` ph p @x   @  p      0 0`P0  ( 0 8@ @ H`PX@`hpxp0` Pb8FbObvbb bX   bXbWbXWn s}bP   bPbHbP #-bL@ HS  [ebLqbGzbL bHbHLZ _hu b< "b<g   ' - $6 9>L b0 D b, I&b,6 D>Hb,\ Odnb,{ Tb, Z Vb( &A ISb0vb0 b0W |b0 T b0 &8"a jtb b   &xb b 1 D9 D L V bh b b   b     b b   b &% _ bn v  b  b   U    W   b0 8 C K V ^ h bw b   b   b   b D " b2  : D bW &\    b b |  b &0 ? bN DV ` b b   b     b b &hA IT \fb$xb$  Ob$b$ $b$ &1 9D OLVbhb{ Xb &6)L@r BbPLbIV4cr9z |Pb|bG|Qb| bG BbKb}UTcvbb & b|+=O^ Scib8b8bD|.JQ] &0biobbb0DDbb bD"b-D:bEVbdDub} c &b\bILbT'bP;M_pbLb~bIbCb{L<b@ &@ | t # &(/@b'M[|lb(|<b@b~b4(5b BPb[lb$|b  n &` Dbb b3b(%b/2?b0G cN SZgb/b4 c DDbbbD$|3b : I NUbbIobXzt & bXLbIbPtbPb| bT*bP5;bINTbLjpbHb@b$| & b$D &b,"D3b,BbTS cZ _fsbI|bLb|ttbL &bP c bIbHb~ n# & )bH28bBbMZb/gb(o c v &H {b/b'b c b< c |#Rb0sbbHHD+J3:b\LbTcbKoub'b(TX(TX(  T * Z2 *: A H L Q X e b~r b@ c  "  b4 T  X ( T Y ) ! ! !!b $!T2!TD!|V!h!t!!|!!O!b$!b!G!G"(".":"|G"V"^"P~"D""H""D"" &@ ""D##I#%#D7#H?#G#Y#Dk#}#b/#T##Y#)# & ##b#b#\#b$b$\$$bL$^X$_$q$D$$D$$I$$ & $$b0$T$$X%( %T%(%Z0%*;%E%O%V%Dg%b,q%%%b% %%b% %% %%  % &% @%%b%D &&I &-&@&L&q& &x v&|&b0& J& &&&b&b&&&b0'D'!'0'bE'K'`'b,'D''T''Z'*''bL( c( & ((b\/( c 6( ;(O(bY(bi({(((((bX(bP(4((9( (| ))#)P*)bH3)A)L)bKZ)4h)x)9) )|)))P)4))9) )|)* *P*$*bW-*;*G*Y*g*b0v*b * &**|***O*|***O*b$*|+++P:+TL+XT+(\+Ti+x+X+(+b+ ++b$+|++b +b,,#,0,<,TJ,|W,f,n,Pv,T,,X,(, , ,, ,,, , c,, &,,- 4-- - C%-1- 6-A-Q-b,\- p-b0w- -b,- J-b- J--D--..%.b8.b P.La.bIn.t}.t.bD. c`.. v.. n..4..9. .| /%/ g*/6/4C/R/9Z/ g/Tu//X/(/T//X/(/ / // /// &h/ 0T0%0X-0(50TB0Q0YY0)a0 h0 o0s0 x00b<0bP0|0b$0 0L00D0T11W1'$1T11@1WH1'O1b<Z1b,i11 & 11b,1b,11 &P11b,11b@1b$1 c@12b$2%2 & *212T>2M2YU2)t2z222b42 &8 222b@2 U233|#303<3b@K3b<c3t3b@3 n3b,3 33bP3L33bL3b\4b04 c#4b<24I4_4lk444 &44 &h44 &44 &44bP4 &4 55 &x #5)5C5 &H5O5 &@ T5Z5b'g5b$w5 &|55T55X5(5555b05b6b@)676b$F6b Q6_6b m6{6b 6bL6bX66b6bH7b<"7 &X'7.747bJ7\7p7 &u77b07b47 777b 7\7b7b7\7b7b8#8 &x(8.8b@I8b@O8b~b8 &g8n8|88b,8b@8 J8 &8888b$8 9Z9*9 #9 *9.9 39>9bN9 & S99 & 9^9a: &0 f:z: & ::b: &:::b ::|::b$;;b$-;A;b;Ds;b,;;b4;b0; &h!X)49 oy .5?b U_7 b t 4         l   rbtG"CD!e"&&CV`2Ch    +  ,( .0 8 @ H P X ` h p x    ! " $ ' ( * # # # / / / F2 G2  I2( 20 28 2@ 2H 2P 2X >4` ?4h A4p U4x V4 X4 x4 y4 {4 8 8 8 9 9 9 \9 ]9 _9 e9 f9 h9 n9 o9 q9 w9  x9( z90 98 9@ 9H 9P 9X 9` 9h 9p 9x 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9  9( 90 98 9@ 9H 9P :X :` :h :p :x : : : : : : ": (: ): +: 1: 2: 4: :: ;: =: C: D: F: L: M:  O:( U:0 V:8 X:@ V;H W;P Y;X ;` ;h ;p ;x ; ; ; ; ; ; ; ; ; ; ; ; ; ;  ,  $(0 48@ DHP :TX` dhp "tx ( # / G2 2 2 ?4 V4  y4$(0 848@ 9DHP ]9TX` f9dhp o9tx x9 9 9 9 9 9 9 9 9 9  9$(0 948@ 9DHP :TX` :dhp :tx : ): 2: ;: D: M: V: W; ; ;  ;$(0 ;48@ ;DHP ;TX`dh))) )0 )@()P0)`8)p@)H>P>X> `>0hBpBxC>@BB CB BC$BBC6>P>`>p>)>>>BB >()0>8>@>H>P>X> `>0h>@p>Px>`BB#CH>p>>)B#B(CZ>>))B(B-Cl))) )() 0)08)@@)PH)`P)pX)`)h)p)x))))))) )0)@)P)`)p))))))))) )() 0)08)@@)PH>P>X>`>h>p>x)`          $ ( o, w0 4 8 < @~DHLPTX\`Ldhlptx|ez ( 0     '  /      ! ! S" [" " " # # 4# <# # #  $ $ $ % %%  -%$ &( &, '0 '4 (8 (< )@ )D u)H })L )P )T )X )\ *` *d *h *l *p *t +x +| I+ Q+ u+ }+ c, k, , , . . O/ W/ / / / / "0 *0 N0 V0 1 1 =1 E1 J2 R2 5 5 9 9=?   $(0648<@HALCTX`dlHpJxa|c     x! z! P& R& ', ),?F    $( 048 @8D?H PTKX `Cdbh pt2x  T mx .< 1 3 N +       $M (0 4% 8@7 D< HPk T X` d hp t 8x   X3  z! 2  R& 3  ), i2   IexBBd B*d.B 8i<B FiJBTXBbfBptB~B B B# %&B# %&B( _2B( _2B-$| w $ [2) Z4HJ&I8bJI\vnb $e |-j2?eDwQ V c &&h [2u &&z Z4 (a a  00a8 `Ha"P 0 `a<h pxaX ad P ao @a| a Pa 0a  a( 8a@ PaX hap @a a a  Pa xJ&X J0n8&@&HmPX`&h&J&&H&J&&&(&X&& &@JPnX&`& hJ&H&h&xJ&&&  J0n8&h@H&P&@`JpnxU&@J&nJ&J&U J08&.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela.export_symbol.rela.noinstr.text.rela__patchable_function_entries.rela.init.text.rodata.str1.1.rodata.str1.8.rela.discard.annotate_insn.rela__bug_table.rela.discard.annotate_data.rela.smp_locks.rela__ex_table.rela__jump_table.rela.altinstructions.rela.altinstr_replacement.rela.altinstr_aux.rela.discard.addressable.data..once.rela.init.setup.init.rodata.rela.data..ro_after_init.rela.rodata.init.data.data..percpu.comment.note.GNU-stack.note.gnu.property @@'1+  &@011@z;@@6@8`1O!J@01b]@X1 p;@ 0l1 2bU2`[0r@PL1wp@[x1z@j 1~@u 1  @01Ȁ @ 1-(@x1Cȃ->@x1^~Y@P1 qx0l@H1"@ؓ1% @1(@@ @x1* 0(  P2 0(