ELF0@@     R_     _     _    _     {S[**R @!7a@*`@`@*T R?qTSA[B@{Ĩ_֠!**!     |q嗟_q*4R*_ 5{"R*{_    @ @q\ QqTA@!4B9?@_R_    {S[ck@G,@_ka"TH@w*@@yTSA*[BcCkD{Ũ_ R@"s@!TR T!B;CA8@# 8b@"  ?!BaH"B;C! 8!@#@ ! ?"BՀ@a@HT*@uR@ @!x @Rr @!RB @eRd@B`B`* 7!R4@AF`?*@~?T"B;CA8@$ 8@#  ?"B H"B;C! 8!@#@ ! ?"B`9~?T9H!B;CA8@# 8b@"  ?!BR8 !B;C 8@@  ?!Bv4vSA*[BcCkD{Ũ_~?iTRSA*[BcCkD{Ũ_!RR"B;CA8@$ 8@#  ?"B!H"B;C! 8!@#@ ! ?"B !? ! s!sT _ B#!IT* Rvbpf_dummy_ops_stateonly access to bpf_dummy_ops_state is supported write access at off %d with size %d memsetbpf_dummy_opsGCC: (GNU) 13.2.1 20231205 (Red Hat 13.2.1-6)-  C8 QP ahHXH0   %4BVl )0=K[ bpf_dummy_struct_ops.c$x$dbpf_dummy_initbpf_dummy_init_memberbpf_dummy_regbpf_dummy_unregbpf_dummy_ops_btf_struct_accessbpf_dummy_ops_is_valid_accessbpf_dummy_ops_check_memberbpf_dummy_verifier_opsbtf_find_by_name_kindbtf_type_by_idbpf_logbtf_ctx_accessbpf_struct_ops_test_runkmalloc_cacheskmalloc_trace__check_object_size__arch_copy_from_userbpf_jit_alloc_execfind_vm_areabpf_prog_incbpf_struct_ops_link_lopsbpf_link_initbpf_struct_ops_prepare_trampolineset_memory_ro__arch_copy_to_userkfreebpf_jit_free_execbpf_link_putmemsetset_memory_xfortify_panic__copy_overflowbpf_bpf_dummy_ops'(( )(P,P0)* t,x,-./@-P0\1-233456T789 89$8,988\8d9l:;8<;$/|xx=>89 8(PP0H`@H(h.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela__patchable_function_entries.rodata.str1.8.rela__ex_table.rela.rodata.comment.note.GNU-stack @@+0 &@1P;P6@p;X6@;`6@ ;h6@ X2p;6@;6@;6@;6@l  g@00|00w@`00`/' m