ELF@@87@ @@K_    RA"@ qhTLq(TqT_<q_Hq*_PQa $_R_q_    |Q*_q Q⇟q㇟@*`5?q_    @ @@K_    @#@_k`T@K_H@y!H@yK_     @y @y@K_    @9_ qT6BQB_qT__qT @,H_qT"@6R_q@T @&8@FECaT aEqTBRFA9qBF@qTfq° kTBBIA9?q Tq° kTP@_k"T_&X@IX@?kT*,@J,Cp@*,AJ,*,BJ,*,CJ,*,DJ,*,EJ,*,FF0@J,)8@I8F0CpaE      @C@T# @RD @#T#@D@T#@D@+T#P@DP@kT#T@DT@k#T#H@DH@kT L@BL@_kෟ_R_     q?qk`TR_4XCD e@c _k@TkT Tb@5`) R_ֿk_!R    #B'R|aH$@'?`(?,?h!9    {!@B#R Bq`T$@9c!`q!T3BqT @{¨_! @{¨_!    @@pqT@c8@c@?q`TR_@xqhT A   ÚThqaTpq@T{!R{__     {S[@P@xa`.E`4`T96RdVERqT bT9cBc6e@b.EkTb @)dVE&R2kT5@RSA[B{Ĩ_@    {RhQS*[*@P@x`''h@x`q`Tq )6@ @qF  ?q`T `E Kj@Iz+TR kTSA[B{ƨ_@s@?T@cKTI F ) q( 6*!ga***!\A**!N     C{CS*RCu3@6BqT@wcBCvDuEtFkGr@l!Bʅ CB!C$xuB({ASB@C_M˭     {S 0@"c TR _kT7b2@qar7dr@*&x$6a@c@d@!SA{¨_րnkBT.SAR{¨_ p@6     *R@&P@!xfd5 p@R2 p_ `T@c#l_{_ T l@4,CQ R"R $9?l"0@CR{_"0@#R{_    {qS[*cRk*Rs *@*P@xc77j@xaq@T5{%R***g5@`BY96B    *4*kJT ՟qB@cEB|kM Tk DB DZB|y|@#cA9qT q Tc5c:Y9 7 A9qThbq`T`6Y9 6u 5"0@QCR=k!T@3EK`0Uy?kJT0ySA[BcCkDsEg@{ʨ_@ #@9 6 k*TFcE4* kTq!kCB!|B!|yDZa!"!A9?q TQkT)g@SA[BcCkDsE{ʨ_@<*K@A***!g4!@R 9AB!7U7@R@BHR #cA949@B qT55R{W****!*Y*!!A*!    {S*[vAu@s@s_T`@s2 kHTҿ`Ts@s RhTSA[B{è_,!nRSA[B{è_c@!aR!WR !NR     {S!@?qTccR?jT`@a@SA{ƨ_bAa@!&a@//@d@*!a@//@d@*!      {qS*[*@9!@*?(q@ TT?q` TT?q T?qA TRq@zT`@ |@`A~@ 6RSA[B@{Ǩ_?4qTT?,qTR?qT!Q?qTR*@7a@@ |@`A~@7bAd@**BR!RRR?<q!TRRRRRbAd@**!x     {_DA[c@TSA|Û@|?R@ITb˔~"B|_hTRSA[BcC{Ĩ_SA[BcC{Ĩ_cC[B{Ĩ_SA    {S[*@P@xa`BtVE~@~@` wVRRJF~!JaB h4aB!6aT9!7aB!"SA[B@{Ĩ_b.E`     { RS@a.C"A97RSA{è_[@}R>@r`~}b@"a@h5>[B[B`    { @cB"pSd$š$š š š_T?q@ T?qRBaR!{@c`d$@hb )e* @{¨_?qT?q T|@c|@ЃBRa{@`@?q`T?qT|@``@``` )` ) @{¨_<@`<@c<@a`Ѐ"BR@c@Ѓ"RҸ|@"|@`c` )` )`@`     {S"5RuzaD@dDAdDBdDCdDDdDEdDFdB8@bjaab Zsu8!`4RSA@{è_     { RSc|'%,ChccTc@e@Ec@?*5 R8!4*SA{¨_sA!!     { A#gI)c*eJ)"xB*kc_k!*BІkc ) ke ) @{¨_    {ScA@ pXQqT[V0R?<rT*kz`Rs RR@@ !pX!Q!?qiTkTk[zT` @y2kcTkDsE R[BSAcC{ƨ_*q`T7[BkDsER@4 @@ RRkAzT` @y2kT!y[BRkDsE     {S 4SAR@{è_`Z@Z@6^@`^@SA@{è_     {[?@TA|ÛSS|**"TSA[B@{Ĩ_@[B{Ĩ_SA     @qT_@q`T_6{ @!@@{_ @@_{_     {[RS@@9Ra4k TK~@` qSA*[B{è_     {[RS@@9R5SA*[B{è_k!TqSA*[B{è_    {S[c*k*@,Cd@e @g(B97***4SA*[BcCkD{Ȩ_smJ4B*Rsk@T@@?kHT< *kT5cJkiTkCTkKk T`~|@K'ҥ||cB`~@7~@@B8C$5ITmKkK-@ABCc~@ BK B|}@Ck@K@mkT3sJcK kBT@`@C4AR@_?k TskT@@?kHTkBTQ3K***RB_kT'@!@k#Ta@?k T 5R`QA  ա@!KTm*C R*BP$@KkTk! B_Tg@ R*K!@9 [! SA*[BcCkDsE{Ȩ_@J< RkT Հ3Jks3JYa@?kTkT||ib_kTQBQ||i!4*Q$KB|a@F CK `@CKkTR*@97!R9B?!F?@GkAT     @" @kT RZ_H@y R!H@y_k Z_    @"_qT!x_@#@bR!@!@?@T!@a6X@_!@?DqT?<qcR$Rza_R_     qT!! X`_BA@96_{#R*C9!{_      qT!!@ X`_BA@96_{#R*C9!{_     {S*@TSA{¨_! @T6!S6!SA{¨_!     *q TB7e|@R"@'T_֥@zT{R@ | P@xeh`qTTqT***!{_***!Qq(TX@**!***!     {SR[*c@P@xg4@ @7***@5@Q"@@b B @_kB *SA[BcC{Ĩ_ָ*!SA*[BcC{Ĩ_*!v    {[*Sc**k+*@`|"P@9xb @  T 6A|@ P@T****Y*@5`|s@  @_T*** *I*5[B*SAcCkD+@{ƨ_ ****8*4*!%[B*SAcCkD+@{ƨ_*![B*SAcCkD+@{ƨ_*! *!     {S!u! naTSA@{è_    {S_(q(TRT|aYj4SA{è_!u! JaT@    {S!u! 2aTSA@{è_    {S!@@ RRkk`*4@R?qTSA@{è_BSA@{è_    {S!cp@TA!c@!ZSA@{ƨ_!R E6a@RAh$_~RT{!B;CA8@$ 8@"  ?!BՠH"B;C! 8!@#@ ! ?"B{__    { @@R!?kT @R{è_@/@RB@ @{è_     "P@b4"XbAT96A( L@q*_R*_     @9 qT@qqGzT@@Qxr_֧R qTq jT`@q_ RqT`@9 @q_q _qTq@T qT_q_zq*_*"4`q_ւ5!@ R?kT_ R_     {SGT*@4a@#@gC'4! @kTaAqT#@$RkTe@c@k"TQ4a2C?@TC+ )DE`@ @@A@9! `8(6 @@8 `8/7!\t2SA{ɨ_     {S|@[*`VfVxc_q T?DqLT 7a@! @?kI T R(Rg.C~!~@9g.C(9xeA5B2x#Rx%`@azm @?kbT `z-! RSA[B{è_% @q`T?qTB2x#RSA[B{è_?@qLT7a@! @?kIT~@d6`>Y97**\**W**!**BI**!!    {R[*S*w"Rx`5 R$Ra.C~%!$9a.C!$97SA[B@{Ĩ_`.C~}RR%BR*9ja@ k WSA[B@{Ĩ_     9A5_{cS*c(s[6*|@"cˤTq`T!TSA[BcC{Ĩ_8ڵ     9A_{cSc(s[68*pS|@"ĚcˤTq`TTSA[BcC{Ĩ_֘ڵ    {S?|.`tttR )tR )SA{¨_     {_(qTR@{_U{_    {[S߆ҷJFJR`z4R a29ZD@dDAdDBdDCdDDdDEdDFdB8@bejaaab ]Zst8!`4RSA[B@{Ĩ_     {RS&GF&HF I@ JF ҆KF LF MF v@@t rb@`~a@d^D_DdBDdCDdDDdEDdFD*Acab Z Rs`8!`4RSA@{è_     {cRS5@@C5uBR /u~R`j`)uaab Z Rs`8!`4RSA@{è_     {S*[*c;@qT @ R` Q|@`@**7@T*k@4Fs R~x}#!,C [?6R6@1T"R*!R9q`T7@?@ @bK RBKBQ  B|*kT v^;Y36*"RR1TcRs9kTGw.`*QsB*"mP"`@a kBTasB!T7@@@X@_qTBQRQB@ kBT_!TkDsESA[BcC7@{Ȩ_҅T7;@ R!,CB@@     {jORiORyF E@ 6Ҍy0 gRM,S<<'+sy 򈰎**D<҂Ұ7WKG *y1A/9M1yWy_yC wyyyyy@s~|ӂ2sB*2 js!Q4KTLSA@{ͨ_    {[ckHY9@?"@@U @#(`?*<qhT'5"@@@(B9@7B SS7qm*TsP!_ T"/C  R !"@_4q@T T_q`TB,Q_qhT J;0@AoZ |y?@qT? q`T4R#qT#@;s@?*Q8qT;@[5_q!Td|}a@Kc!,H2S`@9 Ii$xLh$8 3i$ 3`9*o`o@Q  w 73 s"kTz@9BQB_qT 2 š_T"/C  R@R !"@9"6h@D** s  73 s"kTSAsER[BcCkD{Ө__<q`T_8qTAx?@qTRr_kTqT@Z _q!R"R**`9 @@ C  @` Tk*TqTK!<" R! b9ay#@;s@?*Q8qHT;@@4kTkITo@Q S@ 4<qTa@k!,Hq Td|}L *Ri$Kh$8_i$x9a|}`@K RrScLh!8,H`9 R_i!x Qi!U6R#qhTkmTq` TqT" RRoSAsE!;G@$?@J@*XC@VRRk TqTRRoqTa|}`@K RrScLh!8,H`9 _i!x ĚQi!#qT"RRoRod|}L *Ri$Kh$8_i$x97R*RQ SAsE`<!SAsE4!SAsE,SA)K" R!<P    { @@6cZ@kT @{¨_ !*4a@a!a@aA!AB?@qT`@56 R`.!*@hT@7Z7!    {RS[Uc#P@{`!4K)_q@Tz @zT{w٢ **s?ATbE?qTBA9_q**bE#?q`bskTBA9qT?qb`skTS@kBTSA[BcC#@{Ũ_*$4!    {[6S մzsBBz3sR@kT>@>7SA[B{è_SA[B{è_    {R[rc<@"@!<@> S@R@R@skT u~@zuBBz5sR@kbTA99A99R@R.@.b@bJ@J"@"n@nr@r#zu`BRB҂V`RҀVE`V`BbEBqBB|B|@~`bE`bR@kcTzu/@R z5SAR[BcC{Ĩ_SA`[BcC{Ĩ_    {S @@[wx`57v@u@RJ@Da"@Ru!Qa"[B@SA{Ĩ_ց@`      {[*k@P@xbA*5Sc:@X{wsTb^@kaT"7Y9"7sT cE_qTBҀA9q^@k TD_qcskTBA9qT_qcskT@S@kBTSAcC*[BkD{Ũ_֪ 7Y97cEcE    {S4R$p@@T$@4R4[A@k?q*4[BR*SA{Ĩ_քq` T T qhTa @@@?k Ta@@@?kT`Z@Z@H67 [Bq!T0Y9W 6 4[B@8qTDQqTa@@?!Ta@@?Ta @ @?!T6ŽA`A 6`Z@Z@6^@`^@[BQqT:[BŽA`A[B-6j@aj@[B?k`A9*@67[B*@ŽA`A 6`Z@Z@5@5@![B@t     {S[s!P@@P@?kATJFTҀXRA9`6A96.@.@? T RSA*[BsE{Ǩ_֠b@b@q?qkAT`5A9A9?kTTck7 7@z`z`A+E+E?kA T[s 69TFcERqlT:kb !ADZ"|@A94:Y96q`TcEk TBbBA9kAT?qTA9?q TT?q@ T sk*Tqa#@Bc|c|yp@_@T*cEkTBbBA9qT_ qTWE@WEkATRqT&@WEs2?kJTB@B9!hshs07cCkD|?qT@a@_T@a@_kT@b@!J?@T\@a\@@6FcE7@R@!7kBTcCkD^@b@!?@T`6FcET҂`7J {St7{@(TR[ HT!B;CA8@# 8b@"  ?!BՁH B;C! 8!@"@ ! ? B[B*SA{è_SA{è_!sR     {S[c8<7<@/#!@y6`@Xw@SA[BcC{ƨ_XqTW ҁ~~ҷ&B`5G@@(T6 XRAD|G|@"j'f y!!!!     {S*[U<c@7@KkqqD @z T @zAT5@@T`@ 9>@!\@+y"p` pqT*s@RkaT @@RkAT@3 `@7* 7qD @z T*7Z_:T*s6*`5pR3@|0@ X)Hy*`4SA*[BcCkDsE{ʨ_kDRSA*[BcC{ʨ_R@b7*B@!@y6` 6`@@y6R k^i!?!;kD7@*7pkDsEzJY9BRG@!<zJ9*!kDsE*!kDsEwA!!*3@!kDsEwA!!kD3@!kDsEwwA!rkDwo    {S!@9! ?qTay?q4Tn@Ta@!@SA{¨_@TSA{¨_!SA{¨_    {S[cC@4y?q5 4@#@T@*@U @@*R`2tRy @avb#@SA[BcC{Ũ_T# !_SA[BcC{Ũ_֠#@*#@    {|}RSR[3@s"vdje k Tdje8*"Q_qT qTR@q T57?q T@*s *$R"R*@5 R!R.Cs~"9.C9SA*[B{ͨ_R"R*SA*[B{ͨ_ R3R.C**%"R9*5y**! BR*@@9<q(T@R?qT@q* *SA*[B{ͨ_#R*SA*[B{ͨ_ւ.C R!R 9@9 qAT#!5W@@H6 R"R.C~ !"9.C 9@9 @y     {S#@ @ @@a T3~R[c R@ R3Rz-`QqT`*7* 4qTzm`QqTT?qT?kMTzxq`T*!lzmR7sQqT[BcC*SA#@{Ũ_!Rs!Is[BcC[BscC     {S@[*c*xw@Rb"@c@Bb"b:C`T)H5A9b"@*9_@qT"@H@!HSA[BcC{Ĩ_!`@!Ru@ RJ@`"@tQ`"`@``5SA[BcC{Ĩ_     {S[RcRks*@*!||@zkab@;?@@i4Bm: h4o o@BD" 7`"4@9(@9 6 7@ kTq T@|@`4q(@9ן_jaT@yqQ2 qLTRR||jk`_ kTC@*~~:#@ R;@B _ks9DKzҀT#_kATG@ 7?@lj96?@!R@@894|<QQ~@@yqyaZxaQ2K@@ qmT?@*!]SA*[BcCkDsE{Ψ_B@ @9`6SA*[BcCkDsE{Ψ_?@!CqT"R 7  D`,9T?@lj96?@@@89?@*!'SA*[BcCkDsE{Ψ_#R*C 9!Է?@*!    {S[c*#!(@ @!@`@6 @ Rr@Q?qa@ @q!T$$ qTa@v@!@*#R*`5 @a@ q @c@b@*@6SA*[BcC#@{Ũ_ Rrw*!Rm! @q T!RY!a@    {[U|yks!B A9qT0@97BU|y @q TSDQ#c` š|yEWc ĚR@ ՀB"|@!9B9? qTB[@X@ y{w4s@Tb@Bx_DqATb@kTB7Y9B 7s!T #cEq-T3B`A9qsb@Bx_DqT`@kTeqkT3Bs`A9qTqkT`S@kBTBaj5Baj6Bp@!2pBp@!2pSAcCR[BkDsE{ƨ_@7Y97#cE{x#cE!     {S[s@`@) )pqT`@8@@ku@s#q "Tc@ҷRR7kAB R R#9 R`@Y9.C6`@A@@Thc6!`#T$@fRAArjR))*d@cR{ `#S< lb@@@\@pcRSA*[BsE{֨_`@cR)! `cRd@{ a@y"6CQA\QqR Bz㇟_qDDz_ qc*!* 4&  R.C|!#ha!?T9@_q`T_`qT,T_qTlT_ q`TT_qT_qaT 7@!`!cc@SA*[BsE{֨_@6l_qT$! #RsBS<  _q`T_ q`T_dqT G@!`cCkD#W@sc 3`?s@3@*|1 TQ8qT*cc@Q | S< @hc" ! T53G3@hcBg@*`7b_\qT ?@!`_q@Tk@?hqT_qT$! R&҇`! cR)){`@c@!cCkD 3@!`tb@J@*) ;@!`i4!cCkD K@!`Z @!`T C@!`N @!`H!cCkDb@!!cc@cCkDk@?hqT_qT_qTo@dQqT#R *s! a>LҦDkA)ho&"G! #R+#E`# S< ( g"oaOR*     {RST"|#[c@R@zcsvA7kahbx@?q@TM`@(T@6b@B_#T.@ 7?!?AT`Z@b@?kT+ R;@ x{ws@Ta@"_@qAT! ?RqT"7Y97s!T cE?qTBR`A9qsb@C@qT#?qbkTBsbA9_qT?qbkTaS@?kT.R+@ ?!.aZ@bRkDSA[BcC{ƨ_B _RqT 7Y97scEolcE+@`@(T@6҄Bc!kDB!kD!kD!kD*!!kD!kD    {?qS*@! @$Tz-T[@*bm?BD*6`mqHT||@*a-tj%[B`mQSA{Ĩ_SA[B{Ĩ_!m!g[B     {S3R[*n)s.qTR .ESA[B{è_    {S"@@_q`T@@q TҠ.@ b@7@ 2`B 2!@?qBbSA@{è_6`@!@@!@.@!@`!!     {S[ 5|@@*Rc`@ 4vRrҳxzv @`B@b@b~ҥx @b~@b@baTjaPab LZ Rs`8!`4RSA*[BcC{Ĩ_cCSA*[B{Ĩ_     {S[Vcks",EbD5{@R7_q+T*NY?CqT@;@@;@!}Z@##5^@$5@?@q$T_qT@!k QqHT @!`@@ҡ@?d@A2T@"@?d@0T@C/"@T!F@TA!6@RJ@?#d@z1T@N@?#d@zA.T@R@q*$@!/T"@V@@#dA:!,T!/q T@z45`2n$6* r@7@_qATA97@B!@!b/qAT ՇbEq TR:R7 ՈBiy" R #hb8%Bqc88_$T#967`W$ۚ6A9q TqTqT;*iiBpSs@q#TB!A9@&7@) ՇbE q{kTVE4B@"%5T9 "7BU9"7!2.SA[BcCkDsE{˨_9Q? qhT@!C)@@@!yZ!t@@*'!j!fZ@*#4!\^@C4!S@?@qaT R kTc!A@*:_@4;*!BpS0s@@@_$@zATB @?_@{s`s@ @?@b!bEqk Tk{;*cyBpSs@ @7@_@4!bE{qk+TL  #h`8"c8C8$AT;*BpSs@!bE-!!v!h!!@R@q*$@ T!!m*Q;@;@$i!BU96!!!{@!tVE?qMT5R2?k-TBhvB4bVE@!{bXbEqkKT    {S W8C?Tb@!>RSA{¨_`!b&WRRDk! Q2K'RqSA{¨_     {ST@qT@7",Q_qT"Q_qHTBqTBq@TSA@{è_`@?T  RSA@{è_cC7q@TTqTTq TqT`"@?T`@?ZSAR@{è_֟qTTBq TqT`@?CT`"@?#Z?@q T?Dq!T`Aq T Tq`TTq@TqT`V@kHT`R@kZqTBq!T`@ `@?T`"@?)T RqTBqaT`@?*T`@?೟Zq@ThTBq TqT`R@kcT`V@k#ZaA_ aTZ`@?T`@?ßZ`@?T`@?ӟZy`@`@?T`"@Zpa^@5 Rj@TRrj Te`"@?bT`@?3Z_`@?T`@?ࣟZXq TBqaT `R@kT`V@kT RTq TBqT`N@kT`J@k೟Z@`@<`@8`V@kT`R@k3Z1`N@kT`J@kӟZ*a`R@kT`V@kZ"`R@kHT R&`J@kKT`N@kࣟZ`J@kmT`N@kßZ!~@jaTZ@5@5    {S[eAfB`CA@cBc_BЇ ?!cfI)`67gJ) 7kg )dVD# ?!`a"gJ)k kf )f )D#D ?!```A`J)`cAgBeC"A @B_aBІ 널beSA[B@{Ĩ_֧6k f )fR ``    {`a@@dT@?T@@_T @HT )k{_ )    {S@!@ `"@a"@`""@a@`@a@Ё`AbA`?=SA{¨_     { A!ab& @{¨_`J@bJ)b7aN@7|@!|@`@ @{¨_     {S[*cks AA{Ab@A_qa T*?Cq TT?qT(T?Cq!T6*Z )Z )F?qT T?q`T?q T?qT| 6*`N@kЂ`NJ@kJ`GFomSA[BcCkDsE{Ȩ_|6`A*`vZ )vZ )FG"{_qT<6?qaT*Q`J@k`JN@kЁN?qT75FaTF{SA[BcCkDsE{Ȩ_֢?qaTa@?!a@?!Ѐ6*FG*4?TFGaQ<7`"@`"@ \6`R@k `RV@kVJF`uuuV )uV )V )V )6Q?qT6`V@k`VR@k R&6Q`@ `"@"a@?!Ђa@?!x     {S*@P@xd_kTWjK"*R+ k`T%kc@kc|DZf!Úc|y&Bc%cA9 qT_kT*qhTRN!~@ |`p@!2pSA{¨_RҀN R~@~|"R}cbj b9*~@jKR    {S**#R[5@ TaR@@9@vzaB,H`6_(qHT*B |A@BT  š*`V`F$A7R"*J$#mjaT@9 (qTy *q@|q9T šV_ T@ qT"** -#- _q  **`-#@*4҈@ {hCm#+R* |!!}Ӊha?qTIma!!! A-|T@!T Vj `Eqa! yӉ" k*TBa ,A9qTV)) T" TF`7Q1AT$Aңz`az`!BkBT"*RM)-A9, -6Am,, L-khkq!T)A9"6V##+9!9*!.! @@96SA6hjRR kTq@TRkaT@4?q T @?@qThj8 6J$ R  !*@mj T**@-@CQq(T `$Ú6_q@T$A *J$bm_hr,T!xa-D*4Q*m"R"@9!SA@**}ʅAm#C9*!?@Va!;@"RC@h@9 qT$AJ$ mx"-rT!! 4@97"R"49!SAm@B* ;{C;@D@7@C@F!@{@!A|~ h`xq`T$A!*J$bm_hrT x``Q!R* bmE!!K% jTk-mB*-?qT4Q*$J$"m_rA TqCxD T@RR%H@#- kTqT*! @9`7"R"9!T!A9@"! ${b# @0E54(E1Tdhr` T!2! @97"R"9!SA4@5Bq Tb4J$* m2 -#-kT$AJ$m_rTBx*-!! 8@9 7"R"89!SA!! (@9 7"R"(9!SA!! @9 779!SA!! @9@7<9!SA*4'R&" @ |! Im!}Ө## C-ha?qAT9 T@ @R!! <@97"R"<9!SAV!! ,@97"R",9!SA!! 0@97"R"09!SA!{! $@97"R"$9!SA}! @9 7"R" 9s?!?@s@L     {S"*[*c*ks**@` 2"`E %_qA!1$@@!|| /S!|@|@w@7?CT@7Y9qu~7B~yA9q Hz$T@@AGY9P@xb1 TR%7Y|8}ah` 4qT?rB~yBG@ `T@9Qq)TB/C R!R 9*?i5@W!! ՚{ @y?@ @ 5q T @`T!@@@?Y96w@(qT*^`5** #@` kTB~yXRSA[BcCkDsE{Ш_!6*.`5@W!{ ! ՚@;57@ A9tq`TB~yh5BA9? q T?qTRCRB!!A9B49? qT"q T @FRq@ T*vK ՁBkC`DZ!BQ 9kTR?4qT!<Q?qT"qT*RcRB@b9rT"q TqCT!cBp@!2p!6S<Qqᇟ@"QB_qiTBCD@97#RCD9!ԀB7@"A9tqTFR AN@ 5*fR4a;L@4@?Y9`6R#*##$R** RM!@?T!@?AT @ #@T!'@a?!T!+@`?TU!1`/B*T!$     {[kmq<TScRsY@5#%@4RRR7 b@[C*7@B _k*DVzTe@Bm  R"R`!!D 7aya@@/Ch8b`@ kT%@s"kT*5@mR}@5\S*RR @mk)T@RrbK`K$kpSz3k@!8!  B|}zs!@k@zs zs 5zsRa@y!2ayzs!@3(zs#@!@cA#zs#@!@cA#zs#@!@cC#zs#@!@cX@#Xzs#@!@c@#$@@!4 ՁX@A7B#4@kTkTzsc@# $@@_kCTzsR!@"@9zs @y!@"zsA@y!2Ayzs!@C@y!TS#3Cyzs"@!@B\@"\zs"@!@B`@"`zs"@!@BA"zs"@!@BC"zs"@!@BA"zs@!@"zs  @D|}ӄ 4 "@9! CqTBhBQ_rT*@Czss_8@89zsz3s@y6*^bIx!@RR @4  X@`7s@@Bh@@?!@ @kTBm4 ~@z`!@?Xz`Bm_kT*! @9B%@R! ! 9RR R4@|#! ?kTyA/C!hb%@"khTSAcCsE*[BkD{Ȩ_B@H@9` 6SAcCsE 4 )RRRR }@(zja ` @ 4RkT yz`@ @B` @! _kBT @ kT yB! z`c@#z`4@ @` @_kT`@Pzj@m!@ $kCT 4R @T@mk Tw~@szw@zw?`T!cxAga@#R CH9!Ԧq T3Rss@mkhT%@E4RsRRkT RWC*E/C"| ҢhxyB Bm?"DB%@"k"T@* kT RyB/C!|#Ahay%@!@y"@!2!y@!@!@!@!@!@!AA@!@B@BC"!@4P!@Bm"$SAcCsERBv#    {S*#@@P@@! xe# *qT[cR8Ra2n~#*!*a2.54*qTr@R!2r`7b@Bnq`T[BRcCSA#@{Ũ_!kw4*qT6n@4a.CQ R"9n2@CR2@*SA[BcC#@{Ũ_'*!*![BcC!     {S3||sB![**c*@*P@xf x@#@`5 @*_@TA@4~@+ҭ4R,  Ո|@$f@A' @"@qTqITQA@!ɚ? TA ?TA`q!T@!Ta"@*TH!@#QxrT?q TT? q T T?q` TB?qaT!8SA[BcC{Ĩ_ֿqTa@!c@aT"qTA@?kHTAqTqA T!*!!! !?qT?qTB?qT!BBB?@qTBBBB     {S@Y9!@4,H7A@?qT?qTCAD@ ?qhTRSA{ƨ_B@*ERR#R14*!**!BA//@*!     {S[ckRs@ uRBdP@wZCx"@yxdeB?c@;c#@7CB@E@9@,H|cc}$X!T qTAq! T7Y9 6RSA[BcCkDsE{Ϩ_XTa@&@7 $q@TT qT` @zaT!k#Gb[@X+)b@@G@+R) 6b@/)O 6O@a@`/R)|qTqTqTkDc *!cxk$4qT(qTkk@! *<q`T *! kDc *!cxkA@9RG/)G@/R) 7Aq T`@ !@T7@ן 5?@@_ן5;@BTC@7! bA7`A7@`@`@b@@QqTKFKXb@7! 67@7@77@A@9&Re7@6*77@য়?@_⧟`T`@qT`@K|@!@ T7@য়5?@@_⧟B5;@TC@˙bA7`A7@`@`@b@@Qq(TKFKXb@7@ןb@?@_ן{7@?@;@C@ `A`@ `@b@{7@?@;@C@ `A`[@X`@K`@b@hkk@! * *! *!      @9%6{SRqT qT Tq@ TqT#@ q TqT$qTB@R_ q!TRNa@R@!Ta&*k@ J)B$c$ ) AJ@J) 7N@ 7B|@|@kCsN+ZzTI4  @qT?Cqa2TBY9.C@6J@aKkয়f7` 5N@Kk㧟{75R@ )k.TV@cKK@ )˟য়@5@`⧟5@_,T"@@˄RAi`4@FR?qTHT5J@a kן[75N@ kן75R@ )`+%TV@!+7q!Z@ )aן`5@ןb5@@"#T"@!7_$RA য়kয়k㧟㧟!"R<!@B,H_(q*T*A |G@!A ]ңBY9.C@7 R$@96@94 qaT@#5R9 Dc!cxdZ?TAq!T I)c(B( )*R`* A7Rs7@{ 7J@s@ 7Rk TV@kH TR@|A ))7 )  @ @( T"@T@||(ןkןןkןA7RRAA7@bBJ@ * )b*_qs! )A@!cMa`VST"@`@aTI)q|`f|`q¤?Ta&RA )*&ABC"A @B_aBІ 널sBkDsERRҝ?CqT A7RsRAAs@7@V@J@kb*_q )! )A@@"@_B!c*7a`C7@$Ӛ!$ŚB*R(Ś(Śa`A*7@R )R )A*FR )R )G@A*7@N )N )1~HTAkk@a&|qTRV@K"B Ś_@##TR@c B  )*qR`$Ӛ?T@" Ӛ!Śa&~TRV@!K @"#TR@B c 'a&YBY9.C@c7cҲ    {S[c#@7@9dP@Bqqxxd9*4 Ta@??q;Tb@@@Q_qx@zA:T<q9T!,HR*`5@6Y9a@P@!,Hxc7* |}`h`qCT"R*[B*SAcC#@{Ũ_ֿq TBqDT77`@9<qT`yq,TTa@R!,H*5BqR@z!T`@97`@5!7a@??qhT`@`4!`@5`yqLTTBqR@zTa@R!kAT @qTR!kE_PqTCRsR4`6zR `qT`qHTC@qT@qATZR*0*!c`Qk TR?Pq!T @4*_PqaT:R{R RkATR @ q`T @qT4*7B\B\`QRkT;Rb*!M**!C!?     C{CS[cRk*s*@@dP@cxd8 8 @!@@@3@@~S@6@k@ *;xe1T !74aBQR|y"cBc@ @9?q`TaTBTrSRqTvkT9***RERR"D*@4{A*SB[CcDkEsFC_ր@k@"@*@xa;m74B|y!! ]4R X!T YkT @9_q!T?aTc!kT ]4@@$@zT!@$*!;@*9*7a~@?@y~yk@*zK5xaW9k` TaBCR!"0@"ܚQ@4*@;@*k@@;@xe*7*B* 7|~yR4XB*Rk<;@qr@#R2)^ҥrRWbK!{! škATRe;@R*7|@?9@k@9@k@!xb?@!B;a_@" W6@;@*k@xeȻ*74B|y^@*59Br@aK>2r!#ZрWkTR%!R* @@$@z@T!@$*! BGB     { @?\@y"p@Ra @{Ũ_֠    Հ{ XQa4  |@!a @`X`z``XQa5 @{¨__     @\@_     {@%@y&@A\@C"p3ky{Ĩ_     {{_     {R/{_    {S[c**5@qT RU@6b@ bA bB bC bD bEbFa:@#R**#R#94IbJbKbLbMbNbOb@a:SA[BcC{Ѩ_!AR! R#R**#R#9@5****    {%@ch6c`qFz T#@5R{_ֿDq T*hT@q`TRTqTQq)T RrkT(TBQ@Qx r@T*Hq)TDQqTRRx  rkT*#R{_!˸    {C[cD@#@@sDP@Wxd5R{A*[CcD_Cck*41T5S Rs@@/C'A@@! 'I_ 9507s;(6@@@4B9w6A@#A A9` 7u5 R 9R @y0??qT)4RCO[s?@C@8L9dP@@vxdC@w7R`@Rk RAz!TjwqTO@@e6E97@*i7@9*@kT[@s@@'AD96/5!@u@@=-6u44@!5SBsFc@Rk!T'AURj(Tjwq)T@)@7_@4@ (4;A5;9a @#g!@oA@#A P@ x`w"4@@I@S@pqT@8@@S@ *,RR@4_@R?q**\7@Q,q) TjwqT@5@@I@?pqT@8@@ 7C@!зkEBd69@@@*9q4[@@kVTD9!5#A 4cF@aT@ @'AY7a@R R!?k$@zT@@b @P@xap@!2p_ q`TA@6l @yRC@R95@*#ʺ?k T@ҵ@!?k!T*һ#?k!TUH7SBRkEsF_@@sANAX@S@{`4TE?qMTBR!"@kT0?aT!L@R!Fx? xz|`T^@kaT^TcE_qmTB A9q! \@kTC_qa kTB! A9q T_qa kT`R@kT?@** M5HSA*4@*R!SBkEsF@?\cER`7!SBXdxd փ_@4;A*!նSBkEsF5@!˶SBkEsFR!\!\@G#A*@4@*!*SBkEsF@R?k` T`6@@_T"@3!P҄@zAT@sA_@  S@B$R64_@`5jwR"@xb@ R?jTRr?j`Tk@866RS@B}@T7S@R@J o7yN5@rNTRRna @#A@@@nT@RkmT@dD9;A R"BR @A4^X46@2@KF@KZ@@P@xap@!2 )W5W4@T@6Z@@5@KF@KZjw"_@qbTxbb@ A4@@IB7@A4_@@A4I;R@@4!A3S@AS@*@@* @7g@@o@**!jwRrqAzaTkaT_@h4@@?AlT@@+4B!εSBkEsF @SxjwqTzzTPqRCRBýK@s@q* 2*t*R7t7A@k@jw4xbPqfTCRB9*@w7|yBX@v7B@k@jw @Txc?Pq@`T@"*?q |_q_TB|y @BCR7B|y \@&jw?@q FT*!kjwRr?kXT_@Y4@?q@@ @T@@s @jw>4RrkUT_@`V4@@?ZTB!Cu?@; jwRWL8v[?q<T* *d7@ 6E9=7@`h@ R9*jwRrqAzAuTkaT_@O4@@?!TT@4B! ?s@c*6SB*kEsFKjwRr?kaKT_@K4@@?!PT@4B!g@3@HFTA* 6@!ٴSBsF@@R@kTq@\`T!Ǵ@@WF9SF9P@xvyxb3Bs`@Q?qnTqTb@CRRb3br RSBkEsFBռ7S@RkEa @@9Qq Ts@RAP@YxvBB@@btS2@ P@ x`@ec@@R9 *bjw?qTRr?k`T!d @c!]@@ZD@@R9 *Xjw?qTRr?k@T!E @c!>s@`L@@ ",*R+@k!+T@` @a@@@@@d @&Re@R@`\6@y@@skxT` @@**c! >@I *SS@@R@?jTS@"R@ҿ 7S@BR@Ϳ`$7S@bR@ȿ(7S@R@ÿ'7Rw@#!h`8?@qTxa Bg@@9Qq"TRCDRRA@@#,@[@IT!`@kaIT@AHrA@@#,@[@DT!`@k!DT@Cd*!@9`=6@@(>T@@@A=*=@Rk=TRoRr* @_@E96@@P@xap@!2 )5=Fs@I*7U4[4Z^<s@?*7E97*!_?@q`T!WA@@BW@7*!F{!As6 R k`T R9#=@ 6*!/d3@TA R9@@!JRr?jT7;ĵ*!;@R rjgA !/@@ AdRRRRҰR A"@3!P`54@!ײ *B!ϲRR*!Ʋ!@o@*!g@o@*!RRdRR*!!SBkEsF*!_@;!A@k@jw4xbPqT_@ *R!v!q[@!j R kaT_@ 5@@A@`` 7@@?T@@@ ?*R@@kT@` @a@@@@@d @&Re@R@6@y@@skkR@AzTw@hdqTS@{@QPS@B 7g@o@*!g@    {CSk@ @pqT @8@@?@@C@@NqT` @@s*@?`@@y6/@ ? 6`@@4B9`7+@97@6@qT RcB)R'@99_kC)kk@T#@k`Tkq T@QqT`QAq@?q!TBHR_k_k *5Qaq@?q!TcHRk__k *5Qq@?q T5Q?q㇟#@q T@`5'@qTn$@TC[cxaxa@8qT$q=TqT6!?aT`@A9A6+@97a@!@!4B96Q?q:TJqTb.C R!R 9`@3;P@{{xahw4*Rs$* 5"qTQq(T q`#T@@q@%T$q dNzaT x{a@*"P@x` xb hw5r"xBrExAqc0C bq T գze!4k`%T(AT?s@!ݯ?@* QH6F@ίTQd!ï[CcDsF*{ASBkE_ց#@9A6!sFkTkT#@kAT**!sFHRӟk__k *0HRӿk?k@*@4_mCx b@5 [CcD`@a6Y9P@xb7hwqUT {T`@GqtQ AzTqT@ s@V5***4{A*SB[CcDkEsF_ Rd.C!!o@qTqT^QqhT"@0@86 Q^QqAziThaT`_@T@C9cR"*@h!`@o@P@u.Cxc2qT"A@? qThAx @B$@q KTҠ@RqT@kMT@R9**RERb* 4qTq`T@C9cR*@@o@@HqTxqGT<q TqT6R@@ qT @A*?s@!ծ@?@qTc"R@7!Ů(Ԛ7{"_@qT TRr?k TIbTBB?k TɚTBC#xk bT![CcDsFG6 6h6`q=T@_@4C9 59C_@4@5Q\qhT!!X`x`! d@C9P@xa4Q!!@@9?`q@T@5R|j`qjT*s*!ks@[CcDsF`@P@xa2qTH"A(!7*sҠ5*5 ՟qqTTqT,WTFqTqT2qT_* 5cF@*R*BR:Tn@^q TH5T qTqT4o@q**67.q_Tx6@^@05q/TgT"qT!@"Q!Q ) )o@v@ Qtq3T2Q?qɯT6q`R@z8Ta@ @y H6qaT2 yG@`O7[CRcDsF*@@ qT@@q@MTs@!ۭ[CcDsF*qvT JTq`lTq!Tz@?qT!ŭn5??@@ts@!R|j`Pq`T%h@CRBxe;B* 7;@|yB@?q TT*5J.qT2qRc**RB* 5$R*R*4(`@a@~`7A"RtqTxq!TR**4R****4`@P@xa! @"@@(@ @@@HT@rToR# @5@ *@? qT`@P@xaA@"(@"@_@hTC@#6C @B_#ATo@@o>O9v6c*RB @*D4U@2@`86C97s@!V@ @'@@@4@@@@#@@B@**`4s@c#R*D4o@@*R*4o@@@C@A?TkTors@cR*D4@4@@q{To@ @>Oc*R9*4p*!Ĭ`@*BT8* 5@ "ABAdqa@Bk@@@5xbqTBCR?7B|y \@5s@![CcDsF{@ )o@vqR@z@Tnqa Ta@ @y2 yqeTrADTq@iT;!R*o@@ 4`JF`JZI.qTx7*6* 7 )M!!X`x`! ր^QqT2Q?qhTXaxa ֟FqT@***!B[CcDsFq@zT2Q?q TqR@zTqaT`@@rqT@!8@4@jq`}T q!T@y!2y4q@TJqTq}Tq@TqT2qT`mqIT`@@y@7! [CcDsFFQxr`TqCzTJq@zT2Q?qTXaxa ֟ qJQAzhT2Q?qHTXaxa ֟FqTzqTQ?qhTXaxa ֟nqTq`TqIqTJqT*7|q@zTx qrQAzITs qFQAzTnq QAz TQq Tf qQAzTa^QxrT]@ATR?kTT"x_@q!T!Gh6Xq@>Tk4s@!q1TqTG'Ai*5F.qTFqATG'A\*59@Aw@zuآ `6Y9`7T@"Q_qIz@T?DqT@i`T֪bEqTԶBRA9?q@"CQq$IzT`6Y9 7bEqAkTԶB9A9?qTqAkTR@k"T<_Dq!T@?iTbE A7@@^%sF**! J**!sF?\@s*K}s@K@h5`E8R?<q,T?q {k*TB\@kTA9_q!<T0@96*;s;@@`EqDTqTq`To@@ QtqhT!!X`x`! z@ R{.C'AZv`kz8@K66`@P@xaAq@LT`kz8@ 3`k:8'AG**di5ek~@5@|5a@j@@8xbPq`?TCR(*>7|yBX@$>7a@j@@8xbPq =TCRs*^7|ys@B\@]7)1@tqT`@@?qAT@H@@5!`[CcDsF"qaT2 qPT+@sҡ sT@W@\4@o@@ k:A?@uT@7CӤ@cp@nA *`?֠s5_@*6*6!s%s@[CcDsFbnc@h@@)@cxd?PqT"*?q |_qJTaB|y @ l4 q@G'A*DT5G'A*$S5@q-T![CcDsF'**!ݩ 2?keT6h6&RXqTq`MTsҠRT@@`@@@3 3J@L7@@?!@?@@@!@s@!5l@@!![CcDsF@*75a@ @y2 yqAsT***!~[CcDsF@o@3aR*o@*o@ 2A@6o@?q@?qF _j T#A@@9QqT_ 2@o@#AR*o@2o@!%sFd!sF]!T@Ls"![CcDsFKB![CcDsFA!@A **![CcDsF*o@@X@HXT@X6`JF`JZ@k@w7@@@p@ B@Rs@"@ERcK<*-5@B@cp@D@ *`?* 5c@R"@6!K(![CcDsF6q To@@ Qtq(UT!!X`x`! s@!Z@d7^@$!sk@@.T R*@o@ P ?Xaxa ֕R*!p!sE!f!s;2`k:8`@P@xaA_q T`kz8@ 3`k:8'A AR@k(Ԛ6q JTs 6`@&ReXaxa @|q HTH(Ԛ{72Q?qETXaxa @L@Q?qJzET@tqET@pqDT@lqDT@`qCT@XQqBT@XQ?q^z BT@HQ?xrOz`AT@LQxr@T@Hq@@T@q?T@qlT@<q>T@8Q,qrT (=6@ q@=T*s*!c@@(@7@ 2*z![CcDsF!@q8Tf!Լ!@@Rs#s@Nn7o@@ Qtq3T!!X`x`! ![CcDsF![CcDsF!cD*[CsF!vs@!p!k**!Ra[CcDsFR!RT[CdAcDsF*!Js@!D!?|!:s@!5r!0!+s@!%b! ]!s@ q`T@@! [CcDsFJnq@PT![CcDsF>*!4B![CcDsF.*![CcDsF$"!ݦ[CcDsF*!Ӧ[CcDsFR*!RŦq!!!!*![CcDsF**!!![CcDsF    {CST[c*RmF @c2-g@e9.@#RcJRR`c@҂Ҙ2482.bR@J`nartzb5@@pq!T**5B qpTDquTsT`@qT@RzҀR*81TF@@S@O% @4 kOT!ks)  s~}mGBjs8- {HRr_kTO@ Rp@.C"A9{7A96O@*5A8@!g07@9f7@F6@4@ @)A9!@ڥO@"RaP@axa"F@TW@2n[@[`5WO@AP@Axat@B@:C"!CG@6Y9:C"W"&@@@(B96@*5@P@A9xb7.C R@m4A9@$<7{@q`QT{@js8? qJT{@?q VT{@!Q!?q [T!Q?ryT5@.C"P@5xb`qDTG@y`D5js"R!,Hw* m4kEsF@@!R{{@@* RJ@"@Q"@,`5** S4@*SsF@R3*@@! @a4*R u~}ssF@R3@@ @kiT@*{A*SB[CcD_ږ@9'R@z7A9*nnKqTmmK qZ3P@@@x`# @(EJ 5 Y9R?jATC6g@R@ mnn>Y9!-n...C@Bc7CNC@*@~5!K@8O?qT<@ lCC@RR<B@P@ @xa!(EJ"A xa!GP@ @xa(EJ x P@ ?k!%|' Նxc ||!!"{c B0?(qTRxc ||!!@ p?(q!TP@c*kT҅xg&{g`E_qMTB#y!pB´BB0`E_q@? k+TP@kT.C R@"17@*z6@G@ k*Td@p@ 6K@!.5RnQ.|@SR@kT|@{`z`  59Tf6S@b7}}Ӂkh `Eqcc|qT B A9_qT@DqTjhB@BJ_ q(T!kT!^@G|@G@w*5@s@kTkEsF@**!-҆z`x`(E!(EkATkT@p@7w* kzsTs@2s@!TTbEqMTCbE_qA!kTBy!"p@C2#p_@ATBԢRj8 B"B9_ qATbE_qA!kTC@sR@kTK*k@w@@@Iq`MTqTG@@@5jsR!57jsrT{@qG@iTy5G@@s w @Rw JFJ`ZKL@97$RL9!Ԇ@S@c@R@@?kT R8Rk_kR"RBKRB@ CztD|;xt|#˂zS KZTr@Cs@rcdBzdSzT*Sq5*qT@o@@4.CQZ99_CTfcEK@C@q TqkTcE?q k*TaByӂB!B p@Dp@rBzCz T;7fcETkEsF*@G@js#@9,H<|Ӝ˜}ӥ<qi:T?(qsT??@ RG@"!@9! ?qRT?q`jT k`R z`G@@9 q!:TRj<@@ $@q7T!@js8 ;7G@A@9 qTByB:5?|q:T{@? @DFz9T@B,@Q?<q 7T@qTG@ y`5 @P4@!@@DP@a@Uxd?pqTa@!8@!@?qT! Q?q/T @! @js_jAT`qT?qaTG@@9<qT@!RR*5*}5@,@A97BB qT?qvTRR-*7`F@**BRnT@n  Շxi @?qAT9_AT`E_qmT ByeA9qTaha?qaT9`E_qA! k TP@) kT"P@_kT_@k@@-* 5S@3RO:z 7?@*:R@?qTA9A6r@@TF6#6*!* mb"R!*-+qT"cE_qMT:4#BydA9qaT`haqTA96p@@`TF@67*BpS6**!V"ךR"cE _qA!kkT6ZQ#_1!T?@H* 6]G@**j5@s*@B*!kEsFF@qTc@ ]7G@@\5jsr{@Fz \T@ ,@O@6*e5O@P@ -4@R@Z`"@_q@T!T9Qz`AF6 t_qOT@!kEsFR.@Ca7qATF@T@@"4@@A9!@a@2. aT @ H@!qHETB@T@9`,6sC9 61@kEsF@ R@@@!7kEsFkE*sF@@!)vG@ R" !@jTjf!Q?qIz!>Tjs8"_qA6*q 5T$q4TG@R@Dy `sK@bP@js8jaxxb 26js@.7`@y7!SA[BcC277@`7!SA[BcC#?sq+T` @pqT@RkT @@RkT@5ҳjRfSA[BcCkDsE{Ȩ_`@ @IT\qAT@RkaTB`5 @*@@R!?kAT@@RkTSA[BcC6SA[BcCkDsE{Ȩ_6!SA [BcCq`T?sqT@RkTkk@`4` @hq`TZ* 7"4!SA[BcC@@P@s@)@ @`QqiT` @pqTT\qaT!SA[BcCg*`6\p҄@s* @/6H`Q q(T@Rk!T$RqTf}@60*!SA[BcC,!'!SA[BcC*!SA[BcC!SA[BcC *!SA[BcC*!SA[BcC!SA[BcC!SA[BcC*!SA[BcC!SA[BcC!SA[BcC!SA[BcC!SA[BcC    @_     {[7`ScGOR;>@ Ҕ @~@|՛|?. =qT@q@T R.C!B  @kAT7@! #  @b>@ @3@҂cxd@ R76b@aC)C*@5 Rcks{2.@@_Ta.@R?!!98669R 96:9R96B9R96F9R`56?@>97@Rr @}0@B*RKu@K@*q5{#<Rq-BTK**RR@RR kTk`TkT`>Y9I6@y@ 7#k>T*@ kT`>Y9G6@ O 6*:* Հ@@;@Fˀ@!47mHRnnrnn!sӗ@C@B@mCx*@s@<q,4IT@* @ACAB @pqaT?@7@?@`$6cCkDsEc.Cc@cc@SA*[B{ը_`.@ CӀ9rk!TKLK@`57`Z@G@K`5`j@ 4`J@[[@*C@HT[[@7@3@!@K@:cZ@@Kx*@wN@c4mkT"Q?qHTrT@s*@R`|}ӄ@RcAk[`@~R@k@[@* S2 3@@`5Aҩ 5@:?kT@kT@@R`kT~Ck"x!@ h@R!?kgT@@@!?k7TR?k`R$@z6Tc@@B!Ts@[@ @@M @ @dj@K@oĚ4kTx^@CQq(TrT||Rckc@@@R3@*@*v2@@ARk@R[s@g T@{BkTA3@*7@@5,@5@{4kBT@kTO A9`4[@ @[@@ m@kTg@|A@h`kT;R{ 7b@aC)C*@5cks>cCkDsEcc@R>9?@6R69R 7R:9R7RB9R`7RF9R7hT@h5BF 5FF@5"C@ @ABm4JB*C!҂m_qITA$|"}!hddh"m_kT@ @}Ccjt!sB|ÛBD3!/s@m 4b**Rb@y mk#T*!ss@7sBmkCT*K@m|h F6m@4* ~|*jcmkTQ@@C@|}Rc`@@ABFc@}Tcc@@BF@FF@4@||Rc`@@ACFF |T T@FFc@@ a!@@CA!hFF cc@@hBFcc@@ @" @ _q-TB$" @9?`qT@9# q`T! 9 _T@13@G@s @O@0s@4@ @3@G@ @O@"54!i @ qTu2@97*@96!\[@Ck!QC@@@h5B*mR`4*_7mkBT64@9`6*T6*M2Uy'R@@?QK 2* @ " ?_qM TR**R*R *R Ra ||k`kT;*@y@ yRs@ya> QK2 <B ?kT@@*.C qAT@@qT |)h`h`8@6@`<K`" K@K@`A  R Q@ R'R7a@?=T`@hqzTA@!4B96Q|qTaf $6 R@9.C::R f@q@T@k(zT`@p@#y*[`?[@v5@<ABF;4*`?TAx`aT`j:v6"98L@!KK@*6@C`@ 4B9 7!qlqAT`@yv6*KK@ t @z @ @y_krT*!K@!!~ӗka@@K@`j @#K`?*K@\5`@H`@L@ @mg@s@@_kMT@k@@@av@C@C`@K@A 4?k+Tx@CQqH+Tr+Tc@RvB@*CW@**K[cm=5Ad@@.T`|Sk).T$*ct}cA5k&T@W@*4K@*[@c@1T!KIE@)4!ԑC@ 5@~@@T@@@pqT@@8@@a@?@T!@ R?jaT6q6T`qTB B$6!6`qTB B$36!@@` @hqh!T\qTqTW^S@B c~ K5AQqȨT6@7ct qT@q!T@RR k`T1 ;T'D9@CR 3* 3'9E@@.C[+5@U@9@RRZ _kA1T@C` R[@88@;k.T3R*`17okT?s_k'T*@R!?kT@o@5q%T*0@y$4QR`B0#TA@@kAT @*[@R h8vzFF!$4 P!@ #T@aT`6`qHTA $6!ݐ6@!א{7!ΐ'*!Ȑk@C!ԝK@[@@`@BF`j:*! Bz!`@LQxrT@@`56!V>7`@@H`@@L`@@qAT@7K@*!@40pqT`@!R,9@Ck@!uMM*1aT!iIC *4[@sg@*s@1@ Tk@[@[@Co!L`KK@]6@*!>v@**!5m RbR.C  "h  7R5`@K @K@a*!K@/AB @KK@` C@K*K@@6@A6qT!Q@T!K@*[@ @*@9QqT[@R h8v|?qTR!#' 7FFFBBK*!ďqb_z{ BR h8 @!@*!h!G@*r@9!!q6p6@RR k pTK@!!@@@ 9@!z(K@@@6@!R@ 9@@y6@(B9@7x*~+@!]@q@@ 9!So@C @O@5k@\*!ACT!:CM@T[@ BR h8A` 3R'l!(e*C&[@ hA@!I+@*!!GL*b#@*!KK@67*s6!ێ4*!Վ7K@*+@*!ǎ*!hA[@Ch!K@h%!hChh!*!+< C      $6 '6 6 T6         ' F T : 3   (  ? 8 ?  7 r7 > J E kernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.cinclude/linux/thread_info.hkernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.cinclude/linux/bpf.hinclude/linux/bpf.hkernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.cmark_precise: frame%d: falling back to forcing all scalars precise force_precise: frame%d: forcing r%d to be precise force_precise: frame%d: forcing fp%d to be precise write into map forbidden, value_size=%d off=%d size=%d read from map forbidden, value_size=%d off=%d size=%d last insn is not an exit or jmp jump out of range from insn %d to %d addsubpointer arithmetic with it prohibited for !rootR%d has unknown scalar with mixed signed bounds, %s R%d has pointer with unsupported alu operation, %s R%d tried to %s from different maps, paths or scalars, %s R%d tried to %s beyond pointer bounds, %s R%d could not be pushed for speculative verification, %s verifier internal error: unknown reason (%d) same insn cannot be used with different pointers %s has to be at a constant offset cannot pass in %s at an offset=%d verifier internal error: multiple dynptr args verifier internal error: no dynptr arg found cannot update sockmap in this context Unreleased reference id=%d alloc_insn=%d indirect access to read from write toinvalid unbounded variable-offset%s stack R%d invalid%s stack R%d off=%d size=%d invalid variable-offset%s stack R%d var_off=%s size=%d rdonly_ringbuf_user_percpu_rcu_untrusted_trusted_%s%s%s%s%s%s%s%s%s%sverifier BUG type %s var_off %lld off %d indirectinvalid zero-sized read R%d%s variable offset stack access prohibited for !root, var_off=%s potential write to dynptr at off=%d disallowed invalid%s read from stack R%d off %d+%d size %d invalid%s read from stack R%d var_off %s+%d size %d math between %s pointer and %lld is not allowed %s pointer offset %d is not allowed math between %s pointer and register with unbounded min value is not allowed value %lld makes %s pointer be out of bounds negative offset %s ptr R%d off=%d disallowed dereference of modified %s ptr R%d off=%d disallowed variable %s access var_off=%s disallowed flow keys key value context stack sock sock_common tcp_sock xdp_sock misaligned packet access off %d+%s+%d+%d size %d misaligned %saccess off %s+%d+%d size %d memsettail_call abusing map_ptr callback function not allowed for map max struct nesting depth exceeded memcpyfield "env->subprog_info + i" at kernel/bpf/verifier.c:17369memmove: detected field-spanning write (size %zu) of single %s (size %zu) unknown dynptr type %d unknown iter state %d _rwDinvalid access to map key, key_size=%d off=%d size=%d invalid access to map value, value_size=%d off=%d size=%d invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d) invalid access to memory, mem_size=%u off=%d size=%d R%d min value is negative, either use unsigned index or do a if (index >=0) check. R%d offset is outside of the packet R%d min value is outside of the allowed memory range R%d unbounded memory access, make sure to bounds check any such access R%d max value is outside of the allowed memory range mark_reg_unknown(regs, %u) mark_reg_not_init(regs, %u) mark_reg_known_zero(regs, %u) __szkR0At %s the register %s has value %shas unknown scalar value should have been in %s %s %d: back-edge from insn %d to %d insn state internal bug ,%sr%d%s%dinsn %d cannot be patched due to 16-bit range bpf verifier is misconfigured bpf verifier narrow ctx access misconfigured bpf verifier narrow ctx load misconfigured too many different module BTFs kfunc offset > 0 without fd_array is invalid invalid module BTF fd specified BTF fd for kfunc is not a module BTF calling kernel function is not supported without CONFIG_DEBUG_INFO_BTF JIT is required for calling kernel function JIT does not support calling kernel function cannot call kernel function from non-GPL compatible program negative offset disallowed for kernel module function call failed to find BTF for kernel function too many different kernel function calls kernel btf_id %u is not a function kernel function btf_id %u does not have a valid func_proto cannot find address for kernel function %s address of kernel function %s is out of range visit_insn internal bug pop stack internal bug unreachable insn %d The sequence of %d jumps is too complex. tail_calls are not allowed when call stack of previous frames is %d bytes. Too large combined stack size of %d calls is %d. Too large verifier bug. No program starts at insn %d verifier bug. subprog has tail_call and async cb the call stack of %d frames is too deep ! invalid kptr access, R%d type=%s%s expected=%s%s or %s%s cannot overwrite referenced dynptr invalid kernel function call not eliminated in verifier pass verifier internal error: kernel function descriptor not found for func_id %u adding tail call poke descriptor failed kernel subsystem misconfigured func %s#%d tracking tail call prog failed maplocalkptrR%d doesn't have constant offset. bpf_spin_lock has to be at the constant offset map '%s' has to have BTF in order to use bpf_spin_lock %s '%s' has no valid bpf_spin_lock off %lld doesn't point to 'struct bpf_spin_lock' that is at %d Locking two bpf_spin_locks are not allowed bpf_spin_unlock without taking a lock bpf_spin_unlock of different lock call to invalid destination too many subprograms verifier internal error: ref_set_non_owning w/o active lock verifier internal error: NON_OWN_REF already set frame%d: R%d=P%s%lld(%sid=%d%sref_obj_id=%dnon_own_ref%s%s%soff=%d%sr=%d%sks=%d,vs=%d%simm=%llx%ssmin=%lld%ssmax=%lld%sumin=%llu%sumax=%llu%svar_off=%s%ss32_min=%d%ss32_max=%d%su32_min=%d%su32_max=%d) fp%d=%s=dynptr_%s(ref_id=%d)=iter_%s(ref_id=%d,state=%s,depth=%u) refs=%d,%d cb async_cb%*c;%d:backtracing misusemark_precise: frame%d: last_idx %d first_idx %d subseq_idx %d BUG backtracking func entry subprog %d reg_mask %x stack_mask %llx verifier backtracking bugmark_precise: frame%d: regs=%s stack=%s before BUG spi %d BUG regs %x BUG subprog exit from frame 0 BUG subprog enter from frame %d BUG backtracking idx %d mark_precise: frame%d: parent state regs=%s stack=%s: attempt to corrupt spilled pointer on stack ; invalid size of register spill cannot spill pointers to stack into stack frame of the caller unknown stack slot type %d JIT doesn't support bpf-to-bpf calls R%d is invalid R%d !read_ok frame pointer is read only bpf_spin_lockbpf_timerbpf_list_headbpf_list_nodebpf_rb_rootbpf_rb_nodebpf_refcountunknownkptr cannot be accessed indirectly by helper kptr access cannot have variable offset kptr access misaligned expected=%u off=%llu kptr access size must be BPF_DW %s cannot be accessed directly by load/store R%d variable stack access prohibited for !root, var_off=%s off=%d R%d stack pointer arithmetic goes out of range, prohibited for !root; off=%d R%d pointer arithmetic of map value goes out of range, prohibited for !root R%d 32-bit pointer arithmetic prohibited R%d pointer arithmetic on %s prohibited, null-check it first R%d pointer arithmetic on %s prohibited R%d tried to subtract pointer from scalar R%d subtraction from stack pointer prohibited R%d bitwise operator %s on pointer prohibited R%d pointer arithmetic with %s operator prohibited map_ptr access not supported without CONFIG_DEBUG_INFO_BTF map_ptr access not supported for map type %d 'struct %s' access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN R%d is %s invalid negative access: off=%d only read from %s is supported Cannot access kernel 'struct %s' from non-GPL compatible program R%d is ptr_%s invalid negative access: off=%d R%d is ptr_%s invalid variable offset: off=%d, var_off=%s R%d is ptr_%s access user memory: off=%d R%d is ptr_%s access percpu memory: off=%d verifier internal error: reg->btf must be kernel btf only read is supported verifier internal error: ref_obj_id for allocated object must be non-zero __safe_trusted__safe_rcu__safe_rcu_or_nullthe call stack of %d frames is too deep verifier bug. Frame %d already allocated Caller passes invalid args into func#%d Func#%d is global and valid. Skipping. verifier bug: kfunc %s#%d not marked as callback-calling verifier bug: helper %s#%d not marked as callback-calling The sequence of %d jumps is too complex for async cb. caller: callee: R%d pointer %s pointer prohibited verifier internal error: no src_reg BPF_NEG uses reserved fields BPF_END uses reserved fields R%d pointer arithmetic prohibited BPF_MOV uses reserved fields R%d sign-extension part of pointer R%d partial copy of pointer invalid BPF_ALU opcode %x BPF_ALU uses reserved fields div by zero invalid shift %d rdonlyrdwrwrite to change key R%d not allowed R%d leaks addr into map kptr in map can only be accessed using BPF_MEM instruction mode store to referenced kptr disallowed BPF_ST imm must be 0 when storing to kptr at off=%u kptr in map can only be accessed using BPF_LDX/BPF_STX/BPF_ST R%d invalid mem access '%s' R%d cannot write into %s R%d leaks addr into mem R%d leaks addr into ctx invalid bpf_context access off=%d size=%d variable offset stack pointer cannot be passed into helper function; var_off=%s off=%d size=%d invalid size of register fill invalid read from stack off %d+%d size %d leaking pointer from stack off %d spilled ptr in range of var-offset stack write; insn %d, ptr off: %duninit stack in range of var-offset write prohibited for !root; insn %d, off: %dcannot write into packet R%d leaks addr into packet R%d leaks addr into flow keys invalid access to flow keys off=%d size=%d R%d invalid %s access off=%d size=%d tracepointR%d invalid %s buffer access: off=%d, size=%d R%d invalid variable buffer offset: off=%d, var_off=%s R%d type=%s expected=%s R%d min value is negative, either use unsigned or 'var &= const' R%d unbounded memory access, use 'var &= const' or 'if (var < const)' BPF_ATOMIC uses invalid atomic opcode %02x invalid atomic operand size BPF_ATOMIC stores into R%d %s is not allowed verifier internal error: misconfigured dynptr helper type flags Dynptr has to be an uninitialized dynptr dynptrcannot pass pointer to const bpf_dynptr, the helper mutates it Expected an initialized dynptr as arg #%d Expected a dynptr of type %s as arg #%d iterexpected uninitialized iter_%s as arg #%d expected an initialized iter_%s as arg #%d R%d must have zero offset when passed to release func or trusted arg to kfunc void, calling kernel function %s is not allowed destructive kfunc calls require CAP_SYS_BOOT capability program must be sleepable to call sleepable kfunc %s Calling bpf_rcu_read_{lock,unlock} in unnecessary rbtree callback nested rcu read lock (kernel function %s) kernel func %s is sleepable within rcu_read_lock region Function %s has %d > %d args __ignR%d is not a scalar __kverifier internal error: only one constant argument permitted R%d must be a known constant rdonly_buf_sizerdwr_buf_size2 or more rdonly/rdwr_buf_size parameters for kfuncR%d is not a const Unrecognized arg#%d type %s Possibly NULL pointer passed to trusted arg%d verifier internal error: more than one arg with ref_obj_id R%d %u %u __alloc__refcounted_kptrkernel function %s args#%d pointer type %s %s is not supported __szarg#%d pointer type %s %s must point to %sscalar, or struct with scalar R%d must be referenced or trusted R%d must be a rcu pointer arg#%d expected pointer to ctx, but got %s arg#%d expected pointer to allocated object allocated object must be referenced arg#%d expected pointer to stack or dynptr_ptr __uninitverifier internal error: failed to obtain dynptr id verifier internal error: invalid spi when querying dynptr type arg#%d expected pointer to map value or allocated object verifier internal error: unexpected btf mismatch in kfunc call verifier internal error: %s head arg for unknown kfunc R%d doesn't have constant offset. %s has to be at the constant offset %s not found at offset=%u verifier internal error: unknown reg type for lock check held lock and object are not in the same allocation bpf_spin_lock at off=%d must be held for %s verifier internal error: repeating %s arg verifier internal error: %s node arg for unknown kfunc operation on %s expects arg#1 %s at offset=%d in struct %s, but arg is at offset=%d in struct %s arg#1 offset=%d, but expected %s at offset=%d in struct %s rbtree_remove node input must be non-owning ref rbtree_remove not allowed in rbtree cb arg#%d is %s expected %s or socket kernel function %s args#%d expected pointer to %s %s but R%d has a pointer to %s %s arg#%d reference type('%s %s') size cannot be determined: %ld __optarg#%d arg#%d memory, len pair leads to invalid memory access arg#%d is neither owning or non-owning ref verifier internal error: Couldn't find btf_record arg#%d doesn't point to a type with bpf_refcount field release kernel function %s expects refcounted PTR_TO_BTF_ID kfunc %s#%d reference has not been acquired before verifier internal error: ref_obj_id is zero for owning -> non-owning conversion verifier internal error: ref state missing for ref_obj_id kfunc %s#%d conversion of owning ref to non-owning failed kfunc %s#%d failed callback verification acquire kernel function does not return PTR_TO_BTF_ID local type ID argument must be in range [0, U32_MAX] bpf_obj_new requires prog BTF bpf_obj_new type ID argument must be of a struct kernel function %s unhandled dynamic return type kernel function %s returns pointer type %s %s is not supported verifier internal error: unexpected iterator state %d (%s) invalid func %s#%d unknown func %s#%d cannot call GPL-restricted function from non-GPL compatible program helper call is not allowed in probe helper call might sleep in a non-sleepable prog kernel subsystem misconfigured func %s#%d: r1 != ctx sleepable helper %s#%d in rcu_read_lock region R%d leaks addr into helper function helper access to the packet is not allowed invalid map_ptr to access map->type invalid arg_type for sockmap/sockhash verifier internal error: unsupported arg type %d R%d type=%s expected=%s, %s() may write into memory pointed by R%d type=%s Possibly NULL pointer passed to helper arg%d verifier internal error: missing arg compatible BTF ID verifier internal error:R%d has non-overwritten BPF_PTR_POISON type R%d is of type %s but %s is expected verifier internal error: unimplemented handling of MEM_ALLOC verifier internal error: invalid PTR_TO_BTF_ID register for type match arg %d is an unacquired reference cannot release unowned const bpf_dynptr R%d must be referenced when passed to release function verifier internal error: more than one release argument timer pointer in R1 map_uid=%d doesn't match map pointer in R2 map_uid=%d invalid map_ptr to access map->key invalid map_ptr to access map->value Helper has invalid btf_id in R%d can't spin_{lock,unlock} in rbtree cb verifier internal error R%d doesn't have constant offset. bpf_timer has to be at the constant offset map '%s' has to have BTF in order to use bpf_timer map '%s' has no valid bpf_timer off %lld doesn't point to 'struct bpf_timer' that is at %d verifier bug. Two map pointers in a timer helper R%d is not a known constant' R%d does not point to a readonly map' R%d is not a constant address' no direct value access support for this map type direct value access on string failed string is not zero-terminated R%d doesn't have constant offset. kptr has to be at the constant offset map '%s' has to have BTF in order to use bpf_kptr_xchg map '%s' has no valid kptr off=%d doesn't point to kptr off=%d kptr isn't referenced kptr kernel subsystem misconfigured verifier write into map forbidden verifier internal error: CONST_PTR_TO_DYNPTR cannot be released verifier internal error: misconfigured ref_obj_id func %s#%d reference has not been acquired before tail_call would lead to reference leak get_local_storage() doesn't support non-zero flags verifier bug Invalid format string Unsupported reg type %s for bpf_dynptr_from_mem data BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value! verifier internal error: meta.dynptr_id already set verifier internal error: meta.ref_obj_id already set verifier internal error: failed to obtain dynptr ref_obj_id unable to resolve the size of type '%s': %ld func %s has non-overwritten BPF_PTR_POISON return type invalid return type %u of func %s#%d unknown return type %u of func %s#%d verifier internal error: func %s#%d sets ref_obj_id more than once tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls cannot pass map_type %d into func %s#%d cannot get callchain buffer for func %s#%d func %s#%d supported only for fentry/fexit/fmod_ret programs func %s#%d not supported for program type %d (speculative execution)invalid insn idx %d insn_cnt %d BPF program is too large. Processed %d insn infinite loop detected at insn %d propagate_live: parent frame %d current frame %d frame %d: propagating r%d,r%dframe %d: propagating fp%d,fp%dBUG live_done but branches_to_explore %d BUG is_state_visited:branches_to_explore=%d insn %d from %d to %d%s: safe %d: safe from %d to %d%s:BPF_STX uses reserved fields BPF_ST uses reserved fields BPF_CALL uses reserved fields function calls are not allowed while holding a lock BPF_JA uses reserved fields BPF_EXIT uses reserved fields bpf_spin_unlock is missing bpf_rcu_read_unlock is missing cannot return stack pointer to the caller R0 not a scalar value callback returnreturning from callee: to caller at %d: R0 leaks addr as return value In async callback the register R0 is not a known value (%s) async callbackAt subprogram exit the register R0 is not a scalar value (%s) At program exit the register R0 is not a known value (%s) program exitNote, BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value! BUG update_branch_counts:branches_to_explore=%d invalid BPF_JMP/JMP32 opcode %x BPF_JMP/JMP32 uses reserved fields R%d pointer comparison prohibited BPF_LD_[ABS|IND] instructions not allowed for this program type BPF_LD_[ABS|IND] uses reserved fields BPF_LD_[ABS|IND] cannot be mixed with socket references BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region BPF_LD_[ABS|IND] cannot be used inside bpf_rcu_read_lock-ed region at the time of BPF_LD_ABS|IND R6 != pointer to skb invalid BPF_LD_IMM insn BPF_LD_IMM64 uses reserved fields missing btf func_info callback function not static invalid BPF_LD mode Tracing programs must provide btf_id FENTRY/FEXIT program can only be attached to another program annotated with BTF attach_btf_id %u is invalid attach_btf_id %u doesn't have a name Target program bound device mismatchSubprog %s doesn't exist Cannot replace static functions Extension programs should be JITed Can attach to only JITed progs Cannot recursively attach Cannot extend fentry/fexit Cannot replace kernel functions Only FENTRY/FEXIT progs are attachable to another BPF prog attach_btf_id %u is not a typedef attach_btf_id %u points to wrong type name %s attach_btf_id %u is not a function The address of function %s cannot be found %s is not sleepable can't modify return codes of BPF programs security_%s() is not modifiable btf_trace_in-kernel BTF is malformed loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN func#%d @%d LD_ABS is not allowed in subprogs without BTF tail_call is not allowed in subprogs without BTF number of funcs in func_info doesn't match number of subprogs invalid func info rec size %u nonzero tailing record in func infononzero insn_off %u for the first func info recordsame or smaller insn offset (%u) than previous func info record (%u)func_info BTF section doesn't match subprog layout in BPF program invalid type id %d in func infoLD_ABS is only allowed in functions that return 'int'. tail_call is only allowed in functions that return 'int'. nonzero tailing record in line_infoInvalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u) Invalid insn code at line_info[%u].insn_off Invalid line_info[%u].line_off or .file_name_off missing bpf_line_info for func#%u missing bpf_line_info for %u funcs starting from func#%u nonzero tailing record in core_reloInvalid core_relo[%u].insn_off:%u prog->len:%u Syscall programs can only be sleepable Only fentry/fexit/fmod_ret, lsm, iter, uprobe, and struct_ops programs can be sleepable struct ops programs must have a GPL compatible license attach_btf_id %u is not a supported struct attach to invalid member idx %u of struct %s attach to invalid member %s(@idx %u) of struct %s attach to unsupported member %s of struct %s BPF_LDX uses reserved fields invalid bpf_ld_imm64 insn invalid module BTF object FD specified. kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig. ldimm64 insn specifies invalid btf_id %d. pseudo btf_id %d in ldimm64 isn't KIND_VAR or KIND_FUNC ldimm64 failed to find the address for kernel symbol '%s'. .data..percpuldimm64 unable to resolve the size of type '%s': %ld unrecognized bpf_ld_imm64 insn fd_idx without fd_array is invalid fd %d is not pointing to valid bpf_map tracing progs cannot use bpf_{list_head,rb_root} yet socket filter progs cannot use bpf_spin_lock yet tracing progs cannot use bpf_spin_lock yet tracing progs cannot use bpf_timer yet offload device mismatch between prog and map bpf_struct_ops map cannot be used in prog Sleepable programs can only use array, hash, ringbuf and local storage maps direct value offset of %u is not allowed invalid access to map value pointer, value_size=%u off=%u only one cgroup storage of each type is allowed unknown opcode %02x Func#%d is safe for any args that match its prototype verifier bug. zext_dst is set, but no reg is defined verification time %lld usec stack depth %d+processed %d insns (limit %d) max_states_per_insn %d total_states %d peak_states %d mark_read %d activedrainedringbufskbxdp?scalarctxmap_ptrmap_valuemap_keyfppkt_metapktpkt_endflow_keyssocksock_commontcp_socktp_bufferxdp_sockptr_membuffuncdynptr_ptrxnWyrod= E>]]x]]]88V ; ]uhTTTTTTTTTTTTcTTTTTTTTTTTTTTTTTTTTTkggTTTTTgTTTTTTTTT[[[TTTTTTTTVPTTTTJEJTTTTTTTTTTTTTTTTTAATTTTTTTTTTTTTTTTTTT==TT=TTTTTTTTTT99TTTTTTTTT55TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT/TT===TTTTTTTT__==  = ==  uuuussgg uuuuSSSSSSSSSSSSS]}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}y}}}}sns}}}}}}}}}}}}}}}}}jj}}}}}}}}}}}}}}}}}}}ff}}f}}}}}}}}}}bb}}}}}}}}}^^}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}X}}fff}}}}}}}}E}}GOKK}K???:4.).%%}}!!!!!!CC'''''''''l''l''''''F'''F'''''''''''''::'lgssXPIIIIIIIXIIIII?rm0di@P 0`p    GCC: (GNU) 13.2.1 20231205 (Red Hat 13.2.1-6) "p68 K X0q(H|Xlh@   "# d%)';h )S d++,[ .t0 0 2@468P:<> p@+TB8`DFHF]H{4JL<NX Ph!R0"T"V$X%Z:X&p\P&^l`(|`w(b)ldH*f*h+8j/@l0n0tp 81tr/1t>P2 vQh3xeX4z}(6`|6~7`7(88$9C :Dep:u;<<>?h@0ATA@A B,7(DPDdG`tHNO8PQpS8TxUXXT[,\Bx^PQbccXtdthg8iTjPmopr @P(9LWX l}h xH 0 8# ; R n h{ @   T P `\  ! 89 P4 @`F  ^  q   hH t 8< " '$$& F0)( o-*,.0    ' F  R $ X $H (d $p p $  $ $8  $P $0 $ 0 $p0 $@0 $0 $`0 $0 $0; $0 $0 $004 $0I $P0X $ 0h $ 0| $ 0 $ 0 $` 0 $H  $X 2 22 2 2 2 2 2+ 2= 2O 2a 2 s 2  2  2  2  2 2 2 222'2924K"U"_",i"Bs"X}"n""""""""$":"P"f"|""")"4"?"J"U",`"Bk"Xv"n"""""""""0"F"\"r"""&"  #%'),.02468:<>@BDFHJLNPRTVXZ\^`bdfhjlnprtvxz|~   "&(*,.031>PZaju~2:ARZx">M[jr4Td~%3H_1;Sey+4=Iis"p"|#(#T= $0$ AX$O%f| )4Hdz ` (A\qhp( #.;Pet  .AIVq}/.GXp*F`{6Qbyverifier.c$xbtf_id_cmp_func$dis_acquire_functionis_ptr_cast_functioncmp_subprogskfunc_desc_cmp_by_id_offkfunc_btf_cmp_by_offinsn_def_regnosave_register_statemay_access_direct_pkt_dataset_callee_statefind_good_pkt_pointersfind_equal_scalarsrange_withincheck_ids__mark_reg_unknowninvalidate_dynptrrelease_reference_stateverbosemark_all_scalars_precisecheck_map_access_typecheck_subprogssanitize_errsave_aux_ptr_typestack_slot_obj_get_spiget_dynptr_arg_regmay_update_sockmapcheck_reference_leakcheck_stack_access_within_boundsreg_type_strmark_reg_readmark_btf_func_reg_sizecheck_stack_range_initializedcheck_reg_sane_offset__check_ptr_off_regcheck_ptr_alignmentrealloc_arrayacquire_reference_statepush_jmp_historycoerce_reg_to_size_sxset_loop_callback_stateset_map_elem_callback_state__update_reg32_bounds__btf_type_is_scalar_structregs_exactcopy_arrayreg_btf_record__kfunc_param_match_suffixis_kfunc_arg_scalar_with_nameverifier_remove_insnskfunc_desc_cmp_by_imm_offmark_ptr_not_null_regdynptr_type_striter_state_strprint_liveness__check_mem_accesscheck_packet_accesscheck_mem_region_accessmark_reg_unknown.part.0mark_reg_not_initmark_reg_known_zero.part.0is_kfunc_arg_const_mem_sizeverbose_invalid_scalar.constprop.0copy_to_sockptr_offset.constprop.0__is_kfunc_ptr_arg_type.isra.0in_rbtree_lock_required_cb.isra.0is_reg64.isra.0verbose_linfopush_insnvisit_func_call_insnfmt_reg_mask.constprop.0fmt_stack_mask.constprop.0__mark_reg_knownmark_reg_known_zeroset_user_ringbuf_callback_stateset_find_vma_callback_stateset_timer_callback_statebpf_patch_insn_datainline_bpf_loopconvert_ctx_accessesmark_ptr_or_null_reg.isra.0mark_ptr_or_null_regsfree_verifier_statecopy_verifier_statepop_stackrelease_referenceregsafestates_equalcopy_from_bpfptr_offset__find_kfunc_desc_btfadd_kfunc_calldisasm_kfunc_namefetch_kfunc_metavisit_insncheck_cfgpush_stackcheck_max_stack_depth_subprogmap_kptr_match_typedestroy_if_dynptr_stack_slotdo_misc_fixupsprocess_spin_lockadd_subproginit_reg_stateref_set_non_owning.isra.0set_rbtree_add_callback_stateprint_verifier_stateprint_insn_stateis_branch_takenreg_bounds_sync__reg_combine_64_into_32__reg_combine_min_max__reg_combine_32_into_64reg_set_min_maxmark_reg_stack_readsanitize_speculative_pathsanitize_ptr_alu.isra.0__mark_chain_precisioncheck_stack_write_fixed_offjit_subprogscheck_reg_argcheck_map_accesssanitize_check_boundsadjust_ptr_min_max_valstry_match_pkt_pointerscheck_ptr_to_map_accesscheck_ptr_to_btf_access__check_func_calladjust_reg_min_max_valscheck_alu_opcheck_helper_mem_accesscheck_mem_size_regcheck_kfunc_mem_size_regcheck_atomicprocess_dynptr_funcprocess_iter_argcheck_kfunc_callcheck_helper_calldo_check_commonbpf_verifier_lockrcu_protected_typesspecial_kfunc_setbtf_non_sleepable_error_injectbtf_id_denystr.6CSWTCH.1085CSWTCH.1087slot_type_charreg2btf_idscaller_savedcompatible_reg_typesconst_map_ptr_typesscalar_typescontext_typesspin_lock_typesint_ptr_typesfullsock_typesringbuf_mem_typesbtf_id_sock_common_typespercpu_btf_ptr_typesfunc_ptr_typesstack_ptr_typesconst_str_ptr_typestimer_typeskptr_typesdynptr_typesopcode_flip.0bpf_verifier_ops__already_done.16__already_done.41__already_done.40__already_done.21__already_done.24__already_done.23__already_done.32__already_done.31__already_done.30__already_done.29__already_done.28__already_done.33__already_done.27__already_done.26__already_done.25__already_done.34__already_done.22__already_done.39__already_done.10__already_done.20__already_done.19__already_done.35.L144721.L144722.L144723.L144724.L144725.L144726.L144727.L144728.L144729.L1447210.L1447211.L1447212.L1447213.L1447214.L1447215.L1447216.L1447217.L1447218.L1447219.L1447220.L1447221.L1447222.L1447223.L1447224.L1447225.L1447226.L1447227.L1447228.L1447229.L1447230.L1447231.L1447232.L1447233.L1447234.L1447235.L1447236.L1447237.L1447238.L1447239.L1447240.L1447241.L1447242.L1447243.L1447244.L1447245tnum_unknownbpf_verifier_vlogtnum_strnmemsetsnprintftnum_consttnum_addtnum_is_alignedkmalloc_size_roundupkreallockfreefortify_panictnum_rangetnum_subregbtf_type_skip_modifiersmemcmpksizememcpybtf_find_struct_metastrlenbtf_name_by_offsetstrncmpstrcmpbpf_remove_insnsmemmovebpf_prog_offload_remove_insns__warn_printk__arch_copy_to_userbtf_types_are_same_ctypebtf_tracing_idsvzallocbpf_patch_insn_singlebpf_tcp_sock_convert_ctx_accessbpf_xdp_sock_convert_ctx_accessbpf_sock_convert_ctx_accesskmalloc_cacheskmalloc_tracebpf_vlog_resettnum_in__check_object_size__arch_copy_from_usercopy_from_kernel_nofaultbsearchbtf_get_by_fdbtf_is_modulebtf_try_get_modulesortbtf_putbtf_type_by_idkallsyms_lookup_namebpf_dev_bound_kfunc_idbpf_jit_supports_far_kfunc_call__bpf_call_basebpf_dev_bound_kfunc_checkbtf_distill_func_protobpf_jit_supports_kfunc_callkmalloc_largebpf_dev_bound_resolve_kfuncbpf_dynptr_from_skb_rdonlybtf_kfunc_id_set_containskvmalloc_nodekvfreebtf_is_kernelbtf_struct_ids_matchbpf_user_rnd_init_oncebpf_jit_supports_subprog_tailcallsbpf_jit_add_poke_descriptorjiffiesfunc_id_namebtf_record_findtnum_intersecttnum_clear_subregtnum_ortnum_const_subregtnum_andprint_bpf_insnbpf_prog_alloc_jited_linfo__kmallocbpf_prog_alloc_no_statsbpf_prog_calc_tagbpf_int_jit_compilebpf_jit_freebpf_prog_jit_attempt_donebpf_prog_kallsyms_addbpf_alu_stringtnum_subbtf_struct_accessbtf_nested_type_is_trustedbtf_check_subprog_calltnum_rshifttnum_arshifttnum_multnum_xortnum_lshiftbpf_sock_common_is_valid_accesstnum_castbpf_map_write_activebpf_xdp_sock_is_valid_accessbpf_sock_is_valid_accessbpf_tcp_sock_is_valid_accessbpf_get_kfunc_addrbpf_free_kfunc_btf_tabmodule_putbpf_prog_has_kfunc_callbpf_jit_find_kfunc_modelcheck_mem_regcheck_func_arg_reg_offbtf_get_prog_ctx_typeget_kern_ctx_btf_idcapablebtf_type_is_voidbtf_type_strbtf_resolve_sizebtf_type_ids_nocast_aliasbpf_global_ma_setbtf_type_resolve_func_ptrbpf_helper_changes_pkt_datanr_cpu_idsbpf_bprintf_preparesysctl_perf_event_max_stackget_callchain_buffersstrnchrbpf_prog_has_trampolinebtf_prepare_func_argsbtf_check_subprog_arg_matchbpf_prog_offload_verify_insnmap_set_for_each_callback_argsbpf_check_attach_targetbpf_logbpf_prog_dev_bound_matchfind_kallsyms_symbol_valuebtf_check_type_matchbtf_kfunc_is_modify_returnwithin_error_injection_listbpf_lsm_is_sleepable_hookbpf_get_btf_vmlinuxbpf_checkktime_getbpf_vlog_initbpf_vlog_finalizebpf_check_uarg_tail_zeromutex_lockmutex_unlock__bpf_free_used_btfs__bpf_free_used_mapsget_random_u32bpf_prog_offload_replace_insnbpf_trampoline_getbpf_opcode_in_insntablebpf_prog_offload_verifier_prepbpf_map_offload_opsfputbpf_struct_ops_findbpf_core_apply__fdget__bpf_map_getbpf_jit_needs_zextbtf_getbtf_nr_typesbpf_offload_prog_map_matchbpf_map_incbpf_cgroup_storage_assignbpf_iter_prog_supportedbtf_obj_idbpf_lsm_verify_progbpf_prog_offload_finalizebtf_bpf_map_idbtf_sock_idssk_filter_verifier_opskprobe_verifier_opstc_cls_act_verifier_opsxdp_verifier_opsperf_event_verifier_opscg_skb_verifier_opscg_sock_verifier_opslwt_in_verifier_opslwt_out_verifier_opslwt_xmit_verifier_opssock_ops_verifier_opssk_skb_verifier_opscg_dev_verifier_opssk_msg_verifier_opsraw_tracepoint_verifier_opscg_sock_addr_verifier_opslwt_seg6local_verifier_opssk_reuseport_verifier_opsflow_dissector_verifier_opscg_sysctl_verifier_opsraw_tracepoint_writable_verifier_opscg_sockopt_verifier_opstracing_verifier_opsbpf_struct_ops_verifier_opsbpf_extension_verifier_opslsm_verifier_opssk_lookup_verifier_opsbpf_syscall_verifier_opsnetfilter_verifier_ops,&0&x ' -H -H - - - - - - - - -( -(\-P`-P--x-x-------h -$-h@-D-X-\-`-d-|------(--(h-l- -h$-h4-@8-@----l-t----`-p-`-pd-Hh-H|----(--8)d-h-l-p-x- - -0-0-8-8-@-@-H-H-X-X-h-h*! ! -x-x*--x-|-t(|---$-D-XH-Xd-(h-(x-|-(--`-d----x-x-(-(d(------|-X-X+,---,+<,D-X(p-x--x-x-p-p-`-`-------P-P -@ -@ (8 -< - . / )H!0T!- X!- \!1"."/\#&`#&#+$+$2$+h%2&2$&-@ ,&-@ 8&- @&- t&3H'4'44(-h 8(-h (5$)60).L)/h)7)0)- )- )1*8t*9*:*9*;+9(+:T+9h+<+=,>->.>.?8/>x/M|/M/- /M/- /- /- /@0! 0! 0M0M0-( 0-( 1-8 1-8 1@1-( 1-( H1! L1! \1M`1Ml1-( p1-( 1-P 1-P 1@1-( 1-( 1-h 1-h 2-x 2-x 2- 2- 42-p 82-p 2- 2- 2- 3- (3- 03- H3-H P3-H 4- 4- @4- D4- 5- 5- 5- 5- 5- 5- 6-8 6-8 P6- T6- 6- 6- @7- D7- 748- 8- D8-( H8-( X8- \8- 8(8-@ 8-@ 8(8-p 8-p 8-P 8-P T9A949499:Bd<'x<:<C<C<- <- >- >- D>- H>- d>- h>- |>-P>-P>- >- ?-?-?- ?- @* @- @- @-@-@- @- @*@- @- `A+B2lCpCD|CCDD2D2@EE\EFE7(F7FGLGG`G- dG- hIHlIIpIHtIIIJIJ,M-(0M-(tN-HxN-HN-xN-x$Q0,Q04Q0PQ0tQ0R0R0R04RK-5>-5,>-54>-5>>>R>-9>-9>->-3>->-3?-/?-/?-`/?-`/,?D?-h0H?-h0\?t?-@6x?-@6?-x1?-x1?-1?-1?-0?-0@-H2@-H2<@-.D@-.T@-2X@-2p@-7t@-7@@@mAXAX8AgdA:xA- |A- 5A- A- 5A- A-3A- A-3A- A-@3A- A-@3A-5A-5A-6A-6B:,B:DB- HB-LB- PB-TB-4XB-4tB-1xB-1B- /B- /B-2B-2B-B-@3B-B-@3B--B-- C@C-X9DC-X9TC- 9XC- 9hC-x9lC-x9C-C-P4C-C-P4C-3C-3C-C-3C-C-3D- D-@3D-D-@3$D-(D-P4,D-0D-P4@D-3DD-3XD-2\D-2lDxD-H1D-H1D-(1D-(1D-1D-1D-D-3D-D-3D-D-@3D-D-@3E-6E-6(E-(:0E-(:HE:XE:pE-tE-xE-|E-E-4E-4EE4PF-0TF-0pFxF-0-|F-0-F-0F-0FF-F-xGG)J! J! J-<J-<J-<J-<K- K- LK-:PK-:KlK-xK-xLN-<N-<O-;O-;tO->|O->O!O!\PldP-CpP-C(Q! ,Q! QQR->R->R-DS-DSlDS-<HS-<tS-+|S-+TmU-pAU-pAW-; W-;W-+W-+W-H>W-H>X!HX!HX!X!XlY-8GY-8GY-FY-FDZ!HZ!xZ!|Z!Z!4Z!4[-<[-<[B[B(\A0\A]l]-:]-:^l^-@;^-@;_!@ _!@x_$|_$_-+_-+`-D`-D``pa|a-Da-Db(D$b(D@b%Hb%pb-XDtb-XDblb-h:b-h:bccg,cX k-p>@k-H2Dk-H2kik!0 k!0 k-(<k-(<k-?k-?l-E l-E@l-<Dl-<Xl-0\l-0ll->pl->lll-XFl-XFlll-Gl-Gl-Cl-Cm-PA m-PAm-? m-?0m-H=4m-H=Dm-h=Hm-h=Xm-=\m-=lm-Apm-Am-?m-?m-h?m-h?m-@m-@m:m-Em-En-@n-@?`@(AAAB DDGHNOPQhS0TUPX\p^bcd`g0ijmohr8 P@0`8X0H `0x""x##$($P$%' -^ -^ -^ -^ -^ -^ -^ -^ -^ -^ -^ -^ -^ -_ -_ -(_ -8_( -@_0 -H_8 -P_@ -X_H -P -X -h^` -p^h -x^p -x -X^ -`^    X !` ! h ! p ! x !p !p !@ ! !` ! ! ! ! ! !p !0 ! !P !  ! !  !  !` ` h p x                     ( 0 8 @ H P X XFo`.symtab.strtab.shstrtab.rela.text.rela.data.bss.rela__patchable_function_entries.rela__bug_table.rodata.str.rodata.str1.8.rela.rodata.data.once.comment.note.GNU-stack @@x5+8 &@@051X$;X6@p5;`6@5;h6@5 ;p6@5 ;x6@Г5;6@5;6@5;6@5;6@05;6@H5;6@`5;6@x5;6@5]X@p5 i2;6@5#;6@05%;6@H5';6@`5)u2c_;H66@x5,;P66@5.;X66@50;`66@52;h66@؝54;p66@56;x66@58;66@ 5:;66@85<;66@P5>;66@h5@;66@5B;66@5D;66@5F;66@Ȟ5H;66@5J;66@5L;66@5N;66@(5P;66@@5R;66@X5T;66@p5V;66@5X;76@5Z;76@5\;76@П5^;76@5`; 76@5b;(76@5d;076@05f;876@H5h;@76@`5j;H76@x5l;P76@5n;X76@5p;`76@5r;h76@ؠ5t;p76@5v;x76@5x;76@ 5z;76@85|;76@P5~;76@h5;76@5;76@5;76@5;76@ȡ5;76@5;76@5;76@5;76@(5;76@@5;76@X5;76@p5;76@5;86@5;86@5;86@Т5;86@5; 86@5;(86@5;086@05;886@H5;@86@`5;H86@x5;P86@5;X86@5;`86@5;h86@أ5;p86@5;x86@5;86@ 5;86@85;86@P5;86@h5;86@5;86@5;86@5;86@Ȥ5;86@5;86@5;86@5;86@(5;86@@5;86@X5;86@p5;86@5;96@5;96@5;96@Х5;96@5; 96@5;(96@5;096@05;896@H5;@96@`5;H96@x5;P96@5;X96@5;`96@5;h96@ئ5;p96@5;x96@5;96@ 5;96@85;96@P5;96@h5;96@5;96@5;96@5;96@ȧ5;96@5 ;96@5 ;96@5;96@(5;96@@5;96@X5;96@p5;96@5;:6@5;:6@5;:6@Ш5;:6@5 ; :6@5"(:@@5$;J6@X5&;J6@p5(;J6@5*;J6@5,;J6@5.;J6@б50J0J/-K0KF6& ȑ