ELF`@@@ @@K_*RA#@@QAPQxr?qᇟ*5_qT_qT_ R_<qHq*_*0qT R?qT!|Q?k_q_@ @@K_@#@_k`T@K_H@y!H@yK_ @y @y@K_@9? qT6!Q!?q T@@,H_?qaT__qTA@A6R?q@T@@&8@FEC_aT &aEqT"BRCA9qBC@qTqB|yB|*_kMT#BcjA9_qTP@_k"T_#X@DX@kT&@FCp@&AF&BF&CF&DF&EF&FD0@F&8@F8D0Cp&aE @C@T# @RD @#T#@D@T#@D@+T#P@DP@kT#T@DT@k#T#H@DH@kT L@BL@_kෟ_R_q*?qkT R$4XC@ e@c _kTkT`Tb@5 Rd)_R_ֿk_!R_@_\ qTH"BRa_!Ԡ_TEqTBRcB0kTD@kATT94D@,EkTqRdEz|!aTh%R?TE!QT_֠_he@ @@B?#{A8-B/`T@B5A8/@,BB!T{ɨ#_C' )CCD?#{S*@T@T7S7SA{¨#_!6!SA{¨#_!S6!?#{SckF 7z"@: [+  W{y*Rs*q@T`XqATa@95`9F6**s*qTbE?qmT B`yӅA9qaTh`qTA959F7bE ?q s"QkKT@S@9kTZ#@Z[B+@SAcCkD{ƨ#_**VbR@!Q**q-T7d|@R&@")T?#{R@%|%P@xgheqTTq!T**!2*{#_֥QqTX@***!#*{#_*_֥@zT6**!*{#_**!*{#_?#{SR[*c@P@xg4@ @7***`5@Q"@@b B @_kB *SA[BcC{Ĩ#_ָ*!*SA[BcC{Ĩ#_*!?#{*@RP@xb!"@A0@A87@7R{#*_Rq@TB @**!qTB @**!?#{[*Sc**k+*@`|"P@9xb @@T 6A|@ P@T****-*`5`|s@  @_T*** ** 5*SA[BcCkD+@{ƨ#_ **** *4*!S*!M*!F*!?@JJ' @q T?#{ @*$ RR+Rc5#hcQraT#&k09QkTB k@T@9#?qT@9 rT@0qT#&k(9 #q@TC?q@TyC k`EzKT!{#_#Q?Tqa AzTmkIT*B*a|| %iakT{#R_cQqT**@c !{#_R_?#{'@*(@9B r#,HY9`4RSA[B{è#_@qTR**P**K**!**B=**!!?#{R[*S*w"Rw`5 R$Ra.C~%!$9a.C!$95SA[B@{Ĩ#_`.C~}RR%BR*9ja@ k USA[B@{Ĩ#_?#{A8SR[**@,B7hQP@xa'h@xaq@Tq!6@ @qF  ?q`Ti`E Kj@Iz TR kTA87@",BcTSA[B{Ǩ#_@s@T@cKT@ F  q6*!Ca***!8A**!*?#CA8{CS4C,BG!@6Bq`TB­?wBcc?v?u?t?k?r?lBʅ s#B!#$xtB(A8G@,BBT{ASBC#_M˭?#{A8S`*$@7a@?qTccR?jAT`@a@A87@",BcaTSA@{Ǩ#_bAa@y!a@od@*!a@dd@*!?#{S 0@"c`TR _kT7b2@q!ar7dr@*&x$6a@:d@c@!YSA{¨#_րnk"T.RSA{¨#_ p@6RSA{¨#_*R@&P@!xfd5 p@R2 p_ `T@c#l_?#{_ !T l@4,CQ R"R $9?l"0@CR{#_"0@#R{#_?#{S*[vAu@s@s_T`@s2 kTҿTs@s R(TSA[B{è#_!RSA[B{è#_c@!RSA[B{è#_!RSA[B{è#_!R?#{ A8Sq[**@9 -B?'@*(q TTqTITq TQqTR ՟q @zT RA8?@",BcҡTSA[B@{Ȩ#_քR!*!5a@@ |@`A~@rTbA##d@**BR!pq@Tq!TR4qTT<qTR,qT0qTR`@ |@`A~@rTbA##d@**!<Rq @zaTRRRRR?#{_[DATSA|Û@|?RTSA[B@{Ĩ#_bˀRB|SA[B@{Ĩ#_[B@{Ĩ#_SA?#{S[*@P@xatVE`B~@~@`@wVRRJF~!JaB h4aB!6aT9A5aB!"SA[B@{Ĩ#_b.E`?#{ RS@a.C"A95RSA{è#_[@}R>@r~}c@RCb@"h5>SA[B{è#_`[B?#{ @`dB pS$$B ` T@@?qT|@|@?qTЂb?qT?qRBaR{@!c`d$@hb )e* @{¨#_`@?qT?q@T|@``@``` )` ) @{¨#_R<@`|@b|@`d` )` )`<@<@@`?#{ RSc|&,C%hccTc@e@c@c?*@5 R9!4@*SA{è#_sA!!?#{ A#dI)c*"xeR@B*kcdV@_k!*BІk kc )e ) @{¨#_?#{S[@@pXBQB_qTc*xkRz2W<rTA@Z3@9QB_qT q`T&Ě$6` @ykT RcCkD *q@Tr!TcCkDRSA[B{Ũ#_֡@ҡ4 @@9&6` @ykcT!RcCkD?#{A8Scka,B/y@a@ 54@[*@9R 0q T@ ``a@90q T3R*r!TZkT5sk@T*@9!?<qT@ 5qmT*@y04BQRBB`!0?T @kaT @*R2*@T[ @*b@9BBQB_q(TR*![BA8/@,BBA T*SAcCkD{ƨ#_ BR FF4bQB  P"!@_T @aTR[BS@TW@!BR q@Tc||t"&rTFFRF[B3!@*d*3!`& !a@!![?#{S 4RSA@{è#_`Z@Z@rT^@`^@SA@{è#_?#{S[?@TA|ÛS|**"@SA[B{Ĩ#_SA[B{Ĩ#_@?#{S[c*k*s@,Cd@w @(B9 5***@4*SA[BcCkDsE{Ǩ#_քmD4B**RskT@@?kHT: *kT5cJkiTkCT*k@TQklT3J?ks3sJcK kIT@@ C 4;AR@?kiTs@kAT*RE@k)TfK**|RdBkTA_kHT @?kT 4kTC||ackckTBQQA||zk!A||a 4KB|3@@ CK @CkT@7@e~|*ahf!@cKB#$_k#Tm*c R*BP$@KkTk! B_TK R* [!@9B! `*: 5*!J?kT*@KcKB*53B||{@mK~@e~@K-`AbC  BKB|}`Cc@K`mj@R: RR**o @" @kT_H@y!H@y_k4_@"_qT!x_@#@bR!@!@?@T!@a6X@_!@?DqT?<qcR$Rza_R_?#{ qHT!!3X` @{¨#_sA@95#R*C9!?#{  q@T!!@3X` @{¨#_BsA@95#R*C9!@9 q`T@qqGzT@@Qxr_֧R qTq`jT@q_q@TqT qT R5rD@z_ RqT@9 @q_q _*b4`q_ւ5!@ R?kT_ R_?#{A8S,B7c!@TA!}@!tA87@,BBҁTSA@{Ǩ#_!d@q@T_@q`T_6?#{ @!@{#@_ @@_{#_?#{A8S*(@,B7w#7* @ @@s RkT@A87@",BcTSA{Ǩ#_ֳ@"A**!@**!?#{A8 C,B@9!?qTRA8@",BcAT @{è#_@ '@RB@?#{S[**R@9R5*SA[B{è#_kTq*SA[B{è#_?#{S[**R@9R5*SA[B{è#_k TK~@` q*SA[B{è#_?#{S!@@9ARc!$Ú6@R?qTSA@{è#_a@BSA@{è#_"P@b4"XbAT94A( L@q*_R*_9A5_?#{S*cs[c(#6*s|@a~@9"ˤTq`T3TSA[BcC#@{Ũ#_ss9A_?#{Scs[c(#6 3*spS|@9Td~@qT"Ě˓TSA[BcC#@{Ũ#_ss?#{aS7{@TA8C,@6 @ "BT!H*SA@{è#_SA{è#_!B@_rTR?#{S*[*c@qT @ R` Q|`@**@Tk* Rs@4~|.C3}" ћ7Rz7@1T"R!Ja9qT@9KF"RBKB  RB|* Q)  kT h[9;{5*"RR1TzcJ9?kTv.bm`*QsB*P" `@a kBTasB_!T@@X@_q TBQRQB @ kBT_!TkDsESA[BcC{Ǩ#_҃Tc.C R!B@@?#{6SF<A8 LH@G  ,Bg+#ygys/,ҰҬ=<iORhORWҒҰ7ҮLO *cRH*N50@yOyyWyy C cysywyyy@~|b2B*s2 jt!Q!KALA8g@",BcTSA@{ͨ#_?#{A8[ks ,B!KY9"@C@U @c(`?*<qT(5"@@@(B95B SS;q*TcG?QB_qT 2 š_AT! ! !_aTs"kMTd@9RQ?j!T!/Cv  R R#b@_4q ThT_qTB,Q_qHT J|0@8R?@qTXR? qT?qRRo*#qT @ RkykTq`T! RqT#q! R R! Ka9 `y')#@S R@?*Q'N)8qT@4kT Q S`4C<qTa@!,HӟqTI} *Rh)j)8h)xA9A}`@ RsSZj!8,H 9 Rh!x Qh!o@q!TC}a@Z!,H3S @9 h#xj#8 3h# 3 9**8{Q { ;3 s"k TSAcCRA8@",BcҡT[BkDsE{Ө#__<qT_8q TRr_kATqaTq!R"R**`9 @@ C DBx_@qT@?@W#@S@?*Q8qT4@@5 SAcC!!/Cv  R#b@_4q!TG@7!/Cv  R@R#a@94g@D**c {  ;3 C@*@qTA}`@ RsSZj!8,H 9 h!x ÚQh!cI} *Rh)j)8h)xA9!5R*R{Q SAcC`m!FSAcCe!>SAcC]SAZ`SAcCWSc?#{[6S մzsBBz3sR@kT>@>5SA[B{è#_SA[B{è#_?#{R[cr"@<@!<@> S@R@R@skTu~@szuBBz5R@kbTA99A99R@R.@.b@bJ@J"@"n@nr@r#zuVR`BҁB^`RҀVE`V`BbEBqBB|B|@O`bE`bR@kcTzu/@R@z5RSA[BcC{Ĩ#_SA`[BcC{Ĩ#_?#{S3R$@4[A@k?qs*4[BR*SA{è#_քq` T T qT @@@?kT@@@?kaTZ@Z@rTr! T[BqT0Y9 5A9*4r@TŽAArTZ@Z@5@5@![BQqT[B8qTDQqT@@?T@@?T @ @?TrTŽAAr@TZ@Z@rT^@^@[BrTj@j@[B?kŽAA[B| 4[Bu?#{Sk!,@@,@?TRSAkD{ƨ#_[b@A`@q?qkaT5A9A9?kTTcWszvzv!+E`+E?k! T< dr@s@T*r@ TaT(cERqT3ka %DZ|@A9A4?qB;Y9jTbcE_kMTbBBFA9?q T?kATqTA9?q@ T(T?q TTskTq`$Bc|c|yp@?@aT*skkT WEaWEkTq-TR WEkTR#B| aB!h``h`raT [BcCsE}TB r!T [Bu4SA[BcCkDsE{ƨ#_?qT@@@?T@@@?kATA@@J@TA\@\@rT(cE qTR@kT RA@@@`TrT(cE?#{S@[*c*xRw@b"@c@Bb"b:C`T)H5A9b"@*9_@qT"@H@!HSA[BcC{Ĩ#_!`@!Ru@URJ@`"@tQ`"`@@4SA[BcC{Ĩ#_?#{#||SA8[@*Rcks*R3@D,BgҺjc`@#F#@: yi7[i7m{@{@BD* 7"C4@9@(@9 45@ k!Tql T|@4q(@9ןjT@yqQ2 qlTRR`||j`_ k T;@*~~:#@R9B _kD@zT#?kT@@ 53@lj943@"R@@894Q;|@#Q`@yzxbq[ybQ2K@q qT3@*!I A8g@,BBҡT*SA[BcCkDsE{ͨ#_B@@95#R*C9!3@!'4Q H'$R @D,9T3@lj9`53@*!3@*!?#{A8s `S[ck@@X@)sqT@@8@@T@S#q#TfQRqᖟRw?`7-R9CR`@@!`54j@y@0yA@!\@"p5rT`@B``y@5`@5/C  R6RCR%%+c@) @?)`/Rd@^  37 TR?qTkq T@(? qTT*@"?q'T?qAT6@!`<?q 'T? q TJ@!`2@@y2@y@@y` 7@@@RA@R@  R"`9~#?Y9/C4@@A@Th{6! %T$@fRAArjR ?)*)cRcd@ @#37 a@@R@\@pc@@cRc `#'cRd@ !?dqTF@!`rT?qT?q T?qT?q!T$ c#R`37@# :@!`R{@$ k@ccR#'{V@c@?@*|1 TQ8qHT* @Q w 37 z@@@h{" ! T!5CHCh{C@B[*7h\qT w@ c*RaQ  37 GLAd$G D"`o #Rc/@" 37 %`@c@!!B@!`  d"oaO2@!`@!`a@^@!`$ c#R{4!!!b@!?#{SA@?pqT@@8@@@_@TB@ R_jT?`qT@ $7B6?q T?`qT@ $ 77`@(B9 5@!T@?hqTb@RB4B94!Q?|qTbfA$7!DSA@{è#_6?`qT@ $@6!3SA@{è#_!)SA@{è#_r!T!!SA@{è#_! !?#{S[c*#!(@ @!@@r`T @ R Rr_qr@"_@qT \rT*!R! @qT!*SA[BcC#@{Ũ#_ Rr@@!@*#R* 5 @`*@_ q@@@ @rAT@Rn!*SA[BcC#@{Ũ#_֙?#{?qS*A8@C,B! @$TzT[@*bm7BD*b6`mqT||@*a-tj%[B`mQA8@",BcaTSA{Ĩ#_[B!E!?[B[?#{S"@@_qT@@q@TҠ.@@b@7@ 2`B 2!@?qBbSA@{è#_6!@`@`@!@.@!@@! !?#{A8[VSa`cks.E#@W"D5{ZRq T`@*cb@!b9s?/qT|@|452n$6*ar@qT`A9:5`@B*!cZ@#5c^@5`@?@qTq@Tc@!QqHTc @B!`@c@a@?d@A-Tc@a"@?d@+Tc@C*c"@T!y`@TbA!ia@RcJ@?#d@z,Ta@cN@?#d@zA)TcR@a@q*$@!*T`"@cV@@#dA:!'T9!Ms?/qTbEqTsR9RBHy"R` hb8Bq#c88_$T945W!$ښ6bA9_q@T_qT!_q@Tha8!c8C8?$AT:*9BpSas@3! bEqZ_kTVE4B@%5T9#5BU9 $5!2.A8՟W@,BB(TSA[BcCkDsE{˨#_*WCqTa@b@3@3@!cZ@#4!c^@C4!`@?@qaT R kTc!Q qT`@B!C)`@c@!<hh:*BpScas@c@qATB!z`A9 5`@cb@!bobEf`_@4:*BpSfas@b@a@_$@zTBc_@` @c7`]c@e @7@b!MbEDZ:*CyBpSCas@e` @):b_@4!4bE+!+!#!!!cR@a@q*$@ T!!*!bE!'3@3@$!BU9 4!!!VEqT3RRskT`~6BBh`B4VE!`@@<?#{S W8C?Tb@!RSA{¨#_`!b&WRRDk! Q2KR|SA{¨#_?#{A8S[@C,B/ҢR@Zbc@q TBQaT9zb4a$tq T!_@A8/@",Bc TSA[B{ƨ#_`@`A`B`C`D`E`F`:@:`T94`*EF@T`B`BR@R"QRZ!@!("R@!"RbAraT#cs@bVRaBҀB `VEV!`@?#{R[5|Sa?|.`Rrj5@` @`@`SA[B{è#_?#{A8s@`S[ckz?Y9@ov@s@n@4`R@7 *Jz`7"||B!B}bhb_qdT` B m!*-yx {`!{`!c_kBTc Tu`U?`;`FԂ@ 7?@*7@-,6k|T! Tkyk `Eڄ?q  kTBy@A9qTT! TJQ!_1TI* *@ @  Մڄڂ|BB}ӠX@4hbqaT4 {`"{`B!kBT+RA8o@,BBafT*SA[BcCkDsE{Ψ#_Aha?qATX@44 ****!"7@ A?@ҋT,R - zeR.a(qT@c4B@"4;@BQ` "H"_ T@kaT {e!* {%(qAT.aEq T+q kT"By@A9qTAha?qATX@4@@4;@Q` "H"_T@kaT{e!Ě{%.aEq kT R@kTSI7447@A{a"{a!BkBTk T44QQ>@}"B@_kTeQ*`@ @_k&T |}! L Jk|8@k| ,H ^@5 RjTRrjT3@? T"@?Z-"@?"T@?3Z&@?KT@?ࣟZ@V@kTR@k3ZJ@k TN@kࣟZ R@k)TV@kZ@5?#{S[eAaB`@A@cBc_a"@BІfJ@ ?!cdN@`67gJ)% 7kg )dVD# ?!`a"gJ)k kf )f )D#D ?!```A`J)`?cAdBe@"A @B_aBd"@Іb 널eSA[B@{Ĩ#_g6k f )fR ``?#{`@ad@T@?T@@_T @HT )k{#_ )?#{S@!@ `"@a"@`""@a@`@a@Ё`AbA`A?SA{¨#_?#{ A!b+ @{¨#_`J@bJ)b7aN@A7!|@|@` @{¨#_@ @{¨#_?#{S[c*ks AAzAb@A_qaT*Bq`TTqT)TqT47**FG4?aTFGq TTzqTSA[BcCkDsE{Ȩ#_ֿBqT4*^ )^ )Fpq TqT4*Q`R@k `RV@kV`qT 5`"@`"@ qT|4*!q4T`J@k`JN@kЁN>5`@Ё`@zSA[BcCkDsE{Ȩ#_5`@ `"@"4`A*`w^ )w^ )FG 4Q`V@k`VR@k R`GFSA[BcCkDsE{Ȩ#_ T`@`@ЂZ )Z )6F6TFr`vvvZ )vZ )Ff"Q`N@kЂ`NJ@kJ4Ѹ*QAbF?#{@*P@xb 5S )@.R Ra` xaB_ TC\@kaT5Y9_|*-@N_J_| )_hc5=Y9_cRML|E P< )_ )BC8_!T`Eq TBRCA9qBC\@kTqbBS}yB| *_kTBJcstA9qT=Y9McRP@!_kTSA{¨#_5Y9_|*-@N_J_,_hc5=Y9_cRML|EHQ(C9`E=Y9McR?#{ @@6cZ@kT @{¨#_ !*a5!a@a!a@aA!AB?@qT`@54 R`.!i?@hT@@7Z7 R k!T?#{RST[c#P@z`!8K)_q@Xz @zTzv *s*?ATbEqTBRA9?q**bEqbBa*B|$|y_kmTB!A9qT*_kTR@kBTSA[BcC#@{Ũ#_*4!?#{S_(q(TRSLa?|.`SA{¨#_!!)j)RR@?|)?&?| )?h>Y9(BR?$ )? )"9?? !TSA{¨#_?#{A8S[6<c8<@,B73@CA@y7`@Xv@A87@,BB TSA[BcC{Ǩ#_Xq TWW@7AA8C,@!66 @ ~HT!H3O@@TrT@XRAD|G|@"j'f y!!63*5!!B@_rT!`R*!y?#{A8S*[U<c@d,BW7@KvkqqD @z! T @zTu5@X@T`@ 9>@!\@;y"p pqT*s@90qT @@94qT@3a@*7r TqD @zT*rTZ_:!T*srT*`5pR3@|0@ X)Hy*4kDsEkDRA8W@,BBT*SA[BcC{˨#_R@b57*B@!@y 6r T`@@y6Rk^e!!kD7@*7pkDsEgJY9BR7rgJ9*!kDsE*!kDsEwA!!3@!kDsEwA!w!qkDz3@!ikDsEqwA!blkskDwf*?#{S!@9! ?qATay?q!4kTB@Ta@!@SA{¨#_@4SA{¨#_!/SA{¨#_?#{S[cC@ 4y?q5 4@*@HT#@*@U @@*`R`"tRy @avb#@SA[BcC{Ũ#_T!SA[BcC{Ũ#_֠#@?#{|}SA8[RR3@,Bgs"vdje k Tfje8*"Q_qhT qTR@q Td4 R3R.C**%"R9e* 5y**! BR\*@A8g@,BBҡ T*SA[B{ͨ#_R"RI* 7?q T@*s *$R"R;*5 R!R.Cs~"9.C9@9 r!T@?qT@q**#R*.C R!R 9@9 qAT)5O@@H6 R"R.C~ !"9.C 9@9 @y?#{!'R GxD($@H$($AH$($BH$($CH$E($DH$ ($EH$a($FH$` 8@@|C` S&@Gh_!H$__F=Y9O8J_4_|_hL,Fp9G__E _HD=Y9_JDP 9D 84LK|GX_4_Xh_D=Y9_XJD0 984LPKTG9`4R @{¨#_FQE|yR|y "Bd|@cBB_9"BBB_9 qT#B.Rb ,@_|a_`nh%J_,_hY9' J?$ 9SA{¨#_!!vj)R@R ?|)?&?| )?h>Y9(R?$ )? ) 9?? !TSA{¨#_?#{*@@P@@! # xe?)qT R-R+}!1n* !*1. `"4?)q Tq@R!2q`5@Bm_qTR{#_ikA4?)q T4m@4-CQ R" 9mCR1@1@ * {#_ *q *!  *!!?#{A8[RV|6S3c*k**s**a@,BW`@@`@ )6Y9;4@@y`67`@`@jv!X7!`7 @@`6q`T @q`T! q T*** 7q8*7|W @qT5RA8W@",BcTSA[BcCkDsE{˨#_`@r`T!qTA6 @q@T`^@5!67jvp7a^@5!!@!xbA o@;@rTk@ 2k4_M)s@_M)s@q@T*R2R!j!SW@@4B94Rk`@rT @**@?֐@@A9a5,@jv G7o@;@rTk@ 2k RjTRrj T7k@l k*rbA**!e! ^**!U**!LM);@%7r`TM);@ Rr*krTk@`w6xkp**!'k@rT!?#{*S*@P@xd?kTj KR)*+W k`T%kc@kc|DZf!Úc|y&Bc%cA9 qT_kTT|@|`p@!2pSA{Ĩ#_RT|@[WL7V||}u?|. R`j69[B@j KR?#{S**#R[C@@TaR@@9@vzaB,H 7SA[B{è#_@BY9' J?$ 9j"SA{¨#_!!j)R@R ?|)?&?| )?h>Y9(R?$ )? ) 9?? !TSA{¨#_?#{S3R[ *)s.qTRBRT.ESA[B{è#_?#{S[ck@S@"_q,T*[b[ac+**81 *T`@@A~~haxqT@R! _ T@R?k@TQqT"bB$Ú7@!Tv5`F@TcR@*J*BRTRn*SA[BcCkD{ƨ#_?qT@q TR@!S@CB{#."@*24ca2.R`ҀBVBVE#@V@?*5scR[@*Z*BR_TS@w7SJQ `F@T*SA[BcCkDsE{ƨ#_րBBS@{ *SA[BcCkD{ƨ#_*!*SA[BcCkD{ƨ#_4@!z*!]sc7$R @dt*9{J8@R b"@a@B`:Ctb"b)J_@q T.@#RJR@ @–24a2.`6E#@6@?*5cR@*k*BR TRnsE !S"RJ!K"RBsE!A`@!Ru@RJ@`"@vQ`"`@ 4sE!!"!vAv?#{FSR[UW$GD$HD$ID J@ ĖKD ĖLD ĖMD v@AtG|__B@b~dłc*Rbb $@ @a``!^_BCDEF*A~ejhc"J>Y9 JdR 9o8d 4lk_|jZ6ZH>Y9Zc Jc2 9j984lRkV4RSA[B@{Ĩ#_?#{RS[cW"|#@R@zcvA#ahb@?qT* @T@҂6@B_#aT.@7 5?! Tb@Z@?k!T@ R*R  R a` `ys!?T"@F@qATB _RqT6Y9"5?|@*?&?| )?h>Y9?BR)(|# -0 )? )!"8?T`EqTBR"A9_q!"@F@q@Tq!|y!|*kjTBB1RA9_qT?R!.Z@b#@SA[BcC{Ũ#_?|@*?&?| )?h>Y9)BR`Q@skBT.RbSA[BcC#@{Ũ#_B _RqT6Y9B5?|@*?&?,?h>Y9?BR)(|#<.("9`E?|@*?&?,?h>Y9)BR!+@ay@T@6N#B!SA[BcC#@{Ũ#_Bc!#@!#@*!!#@"!#@~!#@w?#{cRSB[uc#y8@@cz_|jxBb` R~ ~ ~ a_|bRx~aj_|~~c$Rx`bb ~ ~a`~!d4@lc"J>Y9JeR 9j$e  gf_|dZ6ZL>Y9cJc2 9$ ZgRfVdB9 4RSA[BcC#@{Ũ#_?#{Sb[5Rc`kas~fdV\@u v.j>Y9|!Jya9?JF J|jgg@Gghcb BR!ҟ`z~ 09XD@dDAdDBdDCdDDdDEdDFdB8@b|ujv^>Y9~BJj|njybbr9uJ>Y9BJbR 9b"\l_hyx|uZ6Zvc >Y9ZBJb2 9u9|lhyRxV7@4RSA[BcCkDsE{Ȩ#_?#{S[ 4|@8*Rck@`4a?Rru?|tyjzz` ~ ~ ~ @bB@b@b~=a?|z @b~@b@b)c%Rd |  4@ejal6`bb !>Y9~kJjj&"gkr9ed J>Y9cJcR 9c"j$ gf_|6eZZL>Y9ZcJc2 9e9$ gRfV 4R*SA[BcCkD{Ũ#_cCkD*SA[B{Ũ#_?#{cA8[v@,BO7t@3@kA4kTS4@BQqTrTkR*s@*:@@@*|A8w*5 5 /@ 6@@iTSAkDsE A8O@,BBT*[BcC{ʨ#_#*C5@@@!T`|SkT$*#ct}ӣ*5sZkTw@@**41@TSAkDsEAH##o Ro@!@?r@TSAkDsER*!kk@SAkDsE!owM)5A8",@3@ B6@k~THk@ 5SA3@w@ SAkDsE!@?rTSks#BN|y`A9qAT?#{0@95BN|y`@q TSEQ$[ š|yW ŚR Bb|@c9 B9 qT"B @BJ-R DX@ Ra` xcB_TH@yEqATH @kT4Y9_|5H%@M_H_| )_h!8A**!+***c! a@B?!~@@b@A@B@C@D@E@FF0@DF@;@@8F0DY!*!?#CR{C'|'S*[*#w@CP@FxchgG qTqTqTqaT@**ER3{ASB[C#@C#_Dq THqTH7@@@**8{ASB[C#@C#_qTqaT@ Rd @9*** 5@***ER {ASB[C#@C#_@qT@**%RW{ASB[C#@C#_֤ @9a4**!>`@@q @z@AzTA **!(R! @**{ASB[C#@C#_d @9a5@*@*R@h{ASB[C#@C#__w@!T’@)***X{ASB[C#@C#_@@%Rd @95R5 @94a@Q9*RRHRF?#{S[v! @ cBa@*b"@s@_T*Q @4SA[B{Ĩ#_*QR@4SA[B{Ĩ#_*SA[B{Ĩ#_*!!?#{CQSR*[c|A8@@,BҁP@xa36hcq` T# R5#R#*#RC9 4A8@",Bc!TSA[B@{Ҩ#_b@ bA bB bC bDbEbFa:@#R#*x#RC94JbKbLbMbNbObPb@a:#*_#*Y!ԭ?#C{CS*[B@_qlT_|qT_q T_qlT_qTa@9 !$@6a@R!Y9Rr9>WkTUB65^@X&R@4!@5@@$@z`T!@$*!O*MR)s7|@?B@@$@zT!@$*!`-Bs@'?#{cSA8[s@",BRdP@xxd@@9,H*|ss}ksqT6@bY9!R9kD!{74CqTJ@@K_k᧟ 7a5N@!K?k⧟!7_qR!R@ )_kTV@BKRK@V@_᧟5@a⧟%O_q!@_>T"c"sAc@Rq TTqTTAqCT I)cc(B( )c@R*`* q@'TqTTcAqATc@a&*cc@ J)c$B$ ) ՠAJ@J)7N@7B|@|@gvkD*5k HT_r TCqT3kssAsAAk@as@3@:V@J@Rk*_qV )sJAc(@"@?!"Ns"yc@AB@"A @B_aB"@Ї뢂 륐qTRkD-kFzCTҦt4$R@ cB,Hӟc@_ן_kןA*k;k@R )R )3@;@?kן @!"R!Dc!cxd 3kssAsAAk@bs@3@&!*J@R* )q!s )Acv@`ҡ"?Nso3kss?As@k@3@?@7J@@@7RkTV@kTR@|| )'7 )%@@?T"@(T@|} &VTcqTAc@a&qTRV@K"B Ě_@#TR@c  * )J@@ _kן7A5N@ kן7_qR! )R@+b TV@!+7_q!Z@ )@_ן5@ן#_q!@@bT"@!7_%c"sAc@_᧟_k᧟Ra`?|.c@N )N )BHkD"@Bˢ RR} @TI)?q"|`ӡ"@B|`ӟqc? T*aR&A )*AB@"A @B_aB"@І뢂 널B*R(Ț(Ța`𒣊*3Ca3@`c$ٚB$ȚA*kk@N )N )3@A*kk@N )N )3@.⧟Fk⧟(ן@! B Ța&?TRV@cK!! Ú?@"TR@B c "@𒠊$ٚ*?TRa&𒡂$k?#{S[c#7@9@Bqq"P@*9xb4` Ta@?Lr!6Tb@@@Q_qx@za5T<q5T!,HR*5@a@6Y9P@#,Hxd5b@c |cc}hcqGT"R**SA[BcC#@{Ũ#_ֿq TBqBT7`@9 rT`yqTTa@R!,H*5BqR@zT`@9@7b@C4 R?qCzaTRqR kT!7a@?LraT`@4!`@5`yq,TTBqR@zTa@R!TB_(!T*??@!**/zss$`kTQ|![CcD#A#@94! JHR_k??kD*4`5 [CcD**! A8@,BB! T*{ASBkEsF#_֡HR?kk#*HR?kk#*c4mbx CqAT*R*G5 յ T`@B**@*`4 *[CcD R@d/C!!qs@TqI"T`^QqT@0@86c Q`^QqAzTha`A T@C9cR*@@h!`@s@P@w/Cxc2qTA@? qAThA@$@x @qkT@RqT @k !T@*9*RERR@4*[CcDqq TqT`@a7Y9P@xb5hxqT*!O[CcD[_`$T@C9cR"*@qT7R`@qT`A`G67h6`qcT`^@<4C959c^@4A50qT(qhTqTTqT$qaT`@a@r TA"RtqTxqTR*g*4TTq`TIT\qT`qAT***R*4DqT qT4`@qT`A s@` @>O*R9.*4,XqAT`@P@xaA@"(@"@b_@(TC@6C @_#Ts@b@s HqTLqAT` @/qTs@c@a@ AaTk!Ts @q!T`@@b@**4"R+raT![CcD(Ӛ6**b*!qLT`s@@@Hq`TxqPT<qT`@qT`@O@%P@xahxd@C9P@xa 4QA!!@@9?`q0TA5R|j`qT**!O[CcD["_@qTO@B`0TRr?kTRIQTr?k TITR#xrkPT!1[CcD="A(a6`@P@xa2qT*5qTTqT TFq@TqATG/A~*4[CcDqTqTG/Ao**q@TT.qTFqTG/A`*q TqTz@?q!TcR@**BRTnV@^q ,T Tq#Tr T"q)T2R qT@+@sҡT@8@4@s@4`KF`KZ*ɦ*rVT.qWTV5STAA^@@?5qTTST"qA?T!@"Q!Q ) )s@'@ Q?tq$TBBXaxa""@ֿ q TTq TR3`R*s@4qaTs@qTqTR R*@ s@2qaT~*4!Q[CcD]sҠ5K`@qZT*!?[CcDK@tqaT`@@?qT@H@@`5!,[CcD8G/A*A5A@5j@a@@8xbPqTCR*7|yBX@\7j@a@@8xbPq@TCR*@7|yB\@7R2s@4RD@s@,R|j`Pq T%h@CRBxe*7|yB@?q lT*5??@@*![CcDRh+A@@9Qq(T_ 2@s@+ARNs@p2 As@6G7@@`@(T@6`KF`KZ@***!r[CcD~R'R*s@@XQ?q^zTq6q@z@T`@@ygH6qd [zTa@ @y2 yq`bT@@<5R[CcDXq@zTa2Q?qTXaxa `^QqT@***!/[CcD;q!TRFqTLQxrATqb@*_@TF*5@ 4ABbj@a@`@4xbqTS@CR7B|y@ \@`5*![CcDAdq 2?kTXq4W .dq?TsҠT@@`@@@ @rJ!T@@?!@?@@@!@*![CcD?k TȯT"x_@qaTXq6MF AG6?q@@zT*![CcD6qTs@@ Q?tqHTBBXaxa""@ q`JQAzTRb2Q_qHT!!XbxbA! `^QxrTR q`rQAz(TR q`FQAzhTRb2Q_q(T!!XbxbA! q` QAziqT`QqHT`R q`QAzTRb2Q_qHT!!XbxbA! JqTFqTqHoT(Ӛn7RqioTq Rd@zTR2qAT`mqT`@@y`n7!0[CcD<q T`zqTRnq T`QqTqTJq@ziTa2Q?qTXaxa q@zTa2Q?qTXaxa Ĭ54**`7 )`qTqlTqAT@ )jS.q!T4**![CcDs@`@*R&*b4$`@P@xa! @"@@k@(@i@@3@h3T@r3TsR# @4@ *n@? qT`@ |4`@`@+t@2@86C9r6T*![CcD*#R*'[4>O9Z6B*RB @*Y4.q>T2qR**R*Y5*$RR*V4`_@^T`A Bn@+R  R a`yca7Y9|@ | )h!5a?Y9!R  | 0 ) )9 T@&Qq$IzTDqT@?i`Ta?Y9 !R`Eq TBRA9?q @'Q?q$Iz!Ta7Y9|@ ,h5a?Y9!R  |@(9`Eq|y|*kTQ@ckBTDq!T@?iTB1A9_qTa?Y9 !RqtQ Az]TqFT@*@E4[CcD A`q**!פ@ o:A?@]T@6CD @cp@U@ *`?ր[5c@*#5*v6!a@ Rv/C/A5|ju8.66`@RP@xbAq3Tju8 3j58/AG* *sUh@c@@)@cxd?PqT"*?q |_ql0TaB|y @R4 q@@qT!u[CcD**!iw\@*!`*5cE/R?<q,T@?q#cR k*gTBcb\@kTbA9_qaTb0@94*hcE"!@[CcDL`@@rqT@!8@3@jq"T q8T@y!2yB!([CcD4**!*@*`5a@ @y2 y! [CcD!! ![CcDrT`@ @p@b@*"@ERRcK* &5@#b@cp@v@ *`?`5g@R"@6!K"!̣[CcD@!£[CcD*![CcD![CcD*![CcDZ@|7^@![CcDR@#@H T R*@ s@@Q?qJz`TKP**!w[CcD!o@qT1@<qT-@ q T)@qT%@`qT!@XQqT@pq`~T@lq}T@tq`}T@Hq|T *!?[CcDK2j58R`@P@xbA_qTju8 3j58/A@@(@rMT@ 2jr T`@**![CcD !ԭ@AR6@k`![CcD *![CcD![CcD*![CcD!ߢ[CcD`R@8Q?,qsT( v6Jq@z T*ϥrpTH(Ӛq7RhrsT![CcD![CcD![CcDc@@@R̽@*k![CcD[c@@![CcD@]@qkTEB!x[CcD*!o[CcD{R*!R|Ab[CcDn!Z[CcDf*!Q[CcD]*!H[CcDT@ qT@HQ?xrOz@cT@|qbT*!1[CcD=!**!"[CcD.R!R|A[CcD"**!R [CcD![CcD ![CcD![CcD[CcD![CcD[CcD!١[CcD*!С[CcD"!ǡ[CcD!*![CcD![CcD![CcD![CcD*![CcD![CcD![CcD?#{CSTA8[*smocA,Bc-cFҀ @c3Rcc7R9Ҁ.@wJRR`L@s҂ҕ24`5b3.abR@J`narvzb5`@@pq T**53R@q Tq TcDq@TsqTa@bF# s@B! @b@`O[?k)fT*k O@a~}"m` vha8BHR "-r_khT[@ Rp<@ /C4KA9#5A94[@B*`"5A8@?r TTkE`@!Rs@ Հذ`5RuJ@`#@uQ`#`@@Rz*R*81aT`@3@SkER@*{4s@S sF@R3`@`Ya@! @Y4R v~}ssF@Ro3`@`@ @kIVT`@@!7@ F6@4 @# @)A9q!}[@"RaP@axar F@`T"3n!B`4[@AP@Axa!@Bģ"@ ;C #![#"7Y9W@ ;C!#W # ' @!@@(B94"@* 5 @P@A9xb5 @ R"/C!m4B95@$G7@qI`Tha8@? qYT@?qeT@!Q!?qiTQ?rsT5!@3/C"P@6xb`q:TW@y +5I"Rha!,Hӽ*5IhaW@#@9,H4|Ӕ˔} r@T RW@~a@9 qTqT`jwR "{`W@@9 qTRj4 @@$@q`T! 6T*kE`@5@9!R8@u5A9!n nKqT!m mK q@2S@!@"@{`# @(EJ S Vx`,R Ra`H@5L@kTP@S@k;TD@R*!{ksN@ka TJ@R@aS@%4Z`E@U94f[aE4E4EkTK@k.CBB@95T|@z`u{`  5?TJFXRTA9`4`A94zrTR@`h7 |@|})A )}jh `Eqcc|qT!B"A9y_qT"@EqTekhB@BJ_trT!kT!?cT"F@*nq{@ןkBT. ?Y9R?jAT54o@R@!n n"?Y9!$m#n$-#.!. .`5*x5aJ@|N?qT?@#o?RR B)@P@* @xa!(EJ"A xaaFP@" @xa(EJ x S@ ?k{c||! bzc &"0(qTR {c ||!!@ p?(q!TS@c*kT{gezg`E_qMTB#y!pBBB0`E_q@? k+TS@kT @ R!/C"TJFTXRA9`4`A94rT`S@@a{`&@%H@!|@Bxf! !*?q AB||y @q`T @@*5nnBK_LqHTmmBK_qT{ @F@ kTb@p@6J@95RGnQ.v@/kT@*{@4!JFTXRA9`4`A94cr T@R@aS@?kT??@_kRzwxwR{+qTb8 p@br@r@BzUzT*q5*qaT`n@ 4!/CQ R{"!R9n+qATcEҿq T5qskETbE?q k*ETB`yӁBB!Dp@ p@rBzCz T7cE@Fv@W@*5;@s3@5khTkE@*!`@cDA8@,BBT*{ASB[CsF#_ x`{`B(E!(E_kTkT@ap@7mTp@"2p?@!T|B@ | )h!?Y9!R  )$ )8AT`Eq,T/a`EB?q _ k T`BMy p@$2p?@AToBRD@ |i-,h$?Y9 R9i-`B !!9? qATa`EB?q _ kKTP@kTxgap@ Wq.TqTW@@5IRha!Tq@T4jt"BQ_q$Iz!T@_qT?$q@bT$qATD!!!J9b@B6?qT{T?q{T?qaT_1_TW@R"@Dy _@3I_@?@bP@he8jatxba6he@Th$TFq0T 'TJqT!@ @LQtQ_qCzT!!@ @ Qq1T@?q/TAOr`-TTArT!@ @y2 y @W@ y`5 @ 5W@o*!`@kE)@9 rZT@qW@**g*0#@3C* @"mw@W@e@ #A_!D ,A|~Ahax+5aRj4 @qATW@"m4C*@s #  -D,7W@;*>qT6!`@kE!`@kE @ @<5 CY9W5W@#@dy 1UkE`@ A9@4 @9rT!`@kE!`@kE R3@@a^Q?xrT@!x`@kE@_q=T@Aq!T#7Y9C5#@dP@cxdchtqT!_`@kEpaCU964@?qa1TAprAT#c`@kEZ!@`@kEQ!7`@kEHzq`TqT!vqAT!@"@_qT @H@@`5!"qaT @@qTa@a*!`@kEIRha!qTaz?$q`T!`@kE!`@kE!ؗ`@kE!@!@!,@A4c+ @qT`@kE!`@kEapvqAT@H@@5!`@kERkE!`@kE!`@kE!`@kEIj`!,HӧS@ja8*!65Iha!B,H@P?qITha@|j`?q`TaZ@!4@,H P X@?kTC@-I_@im!,H!P 'imhaW@*,H*#@Pb|@g?@S@j`qO@haTtcD?pqT!Iha@[5a@@ # @qT[@`4AY9Z!Ja2 9a -0?,jReVSA[B@{Ĩ#_?#{A8k,BG@p@Y@/4S*[csB@@A/* .a@1 @@@$B9 5bC14R`As_k0T3a~@@k!T10T`A$@9?sqT@y+6@A@k`/ThqT@ @pq THT\q*T`Q qT`@90q!T?sqTkk@4SA[BcCsEW,5@@y 7!?sq@ T@ @pqTh"T\q%T`Q qi T7r7@T!q`T?sqT`@90q`T*!@@ @?sq'T@ @\q TXqiTpqT`@90qaTa @@94qT@5nRfSA[BcCsEA8G@",Bc!"TkD{ɨ#_֩ TqT$R`@90qTa @k@94q!T@@k@@@A@@_kT@ @kT@zT7rT! SA[BcCsE`@9 qTB5a @*@9!?qT@@94q@T>T<@74@P@s@@@4B9@4@@hqATp@{*`@/7!@@ҳ@4B95@ @hqT *"@4!SA[BcCsEL @`Qq T@ @q@THTpqTT\qT`Q qHT`@90qATqTn!**!!!!*!*!*!!!!!S[cs!!@_?#{A8S[K,BCRs@`@  @`~@||_.@HqmTR.CB @!kAT3@! #  @ @s@>@*cxd@¢R ?r@6TC)@*5 Rcks2.@@RT.@R?!!9r;TR69r <TR:9r<TRB9r<TRF9r@=T>9@@5@Rr @}`2@RB*@*q5#;Rq<T@RR k T Չ ?xraT>Y94Rk&T@y@&7#`k9T*@ kAT>Y9$5!7@C@F)7mHRnnrnn!ג@m7@B@?@Cx*@<q4!5!T@$5BF55FF95"C@ < @A"m4B*A$|#}!jdDh#m_kT@ @A"5A6 @pqaT?@3@@ '4cCkDsE.CA8@,BB+T*SA[B{ը#_֠.@ C9d)TJ**7Z@7@[`5j@`4J@@TrT@;@@[@Z@A@k[N@*@4mk@?kT`"QqT`rT@RO@oRk@@@~}әAc*&~R_@%*k@g@c@@@5@J5@Z/_kIT`@kT@`@`pX0qT_@B~h"x!@ @9!?4qT@@9!?q(T$(6k@Z@{CkTMSL @k@ @ @_@K@[@*5*5@R#@w8@@@9,@|q`T!4B9!k4hqTtqT!$!j7!Б7@a G6*7T@* @*s@`5A8C,@K@0c6@~?TH7@* 4@ @RrTC)@5cksICcjt!B|ÛBDӊ!m4b*RzBmk)T@yqmkHT!jcCkDsERR69r!TRR:9rTRRB9raTRRF9rTR>9@4K@*@ k!07Dm|ӗj F6m4s|*jcmkT@R|}@@ABFB}@BF@@@sBF@ @SAsFF @M@R||@@AFF B|@FF@ @~" @ _qTB$"  @9?`qT@9# q`T! 9 _T@ @ qT`3@9 5`+@9 4!c@7_@"4!!7@@5B*m4R47!4@94*ɢ 7mkT2Uy)R@<Q K 2< @ " ?qm TRRRR RO**ass ||j`kT;*@y yRy@y!? Q!K2 <B kT@@*.C qAT@@qTA |'d`h`8@6@c7@U<"#" KA`j@  R Q)RZ R:b *[2Uy@O@ @@4@{  @.C?qTXR R7@qTB@qD@zT@y4B Bh;@4@ 5Ry@B(B9 5{@@"#?k`*T@9*sCD q!T5@.C" @_q TBQ R! DC @b5$9 ! !TI*5* 5@|#`@(B9!4\@mqT@@8B95a@R4R9RRO*7@#?k )T@ k'TskT@m{ D@7 !0UyO@ @x@һ.@l#v y.CqTR7@RS  Rr `t{A@9  q@T7 qT{@,S54"RҫrTqT@@qTD9R#*{@39*PQ  .C{kT@S@@!@ 9@|#a@y`@\@6(B9`5mqITa@Ra4$7@*RR @*RZ kAzT@m UR$DU7 Ry@~""R.Ceh @ k`Tb@#_kHT@T4` @9Ba@ ` 9@4RRR R @B _kTya|&.CAhaa@c ?khT;1TQqT4rATC9t qT@q!T @RR k@T18TD9{@CR 3* 39d" _qT@b6< S_qT 5y4"RRr T[)u?q{W @.C?q TRkT R$KRb B _k`T@c44*{*`x5@ @kKT @ RqTkT@w?aT*"Rc5Q!@R]lq`VTpQ?qZzA1T?@#**5wZ@pqTW@@ xa @ @@H@@L@@@@@ @ @\q_Tpq+T@tqThq\T7*o@ @ #n@ <@@*`(5#_qM T[QO@9?qT`qTk`T @`5@9 r` Tq$Tq`T@ KBF*! h$Bz!@LQxrT@@5W6!~W@J7@_qTW@@@7@AB @7@!R7,9@L*L1T!Qs@55A8",@K@046@~?2T7c@_@TB@T@9@5#R*CT9!ԳI!l!)@> RbR.C`~ "h D*4!H3@*W4*O@ @xS@[@Ra@R @4 X@@7Z@@Bh@@?a@ @kTm4@~@"{a@@X {amkT` @9Ba@ ` 9Ay5*!؊߶@s@ @ a@!O@Ŋ@*@S@[@ 4 ) RRRRh}@%+#{ha ` @4RkT y {`@ @B` @! kT @ kT y#{`c@# {`4@ @`@kP!{hm!@ $ kT`4R@_Tmk T@ {w@!{w`TxA!wp!@@xAS@[@e!f~!Ra@R4RRR_kT R.C|!7@hxyB m"`D@a@#k"T@*sB _kAT Ry|".C@h`ya@a@yb@!2ayR!@!@a!@!@a!@!@!AA"@a@B@BC"a@9Pa@m"$-q)T3Rmsk)Tw~@5{w@y7 @!x @y5{w@7 !*!7!߉7B@_rT*@!7Љ!ˉ@*!‰@sA7!@7H7@5c@_@!@?raT[K@@c@ALW@O@`6@*` @9Ba@x ` 9N5s7s@sR*j@ 7@*@*!f@7y*@*!Y7@m!PW@z6@a*!CW@@y6@4s*7Ncks"@!O@,W@@7*)@:c@s70s7,+<           6 $6 '6 T6    T : '   3 (  8 ?  ? 7 > r7 E J F f kernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.cinclude/linux/thread_info.hkernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.cinclude/linux/bpf.hinclude/linux/bpf.hkernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.ckernel/bpf/verifier.c_rwDmark_precise: frame%d: falling back to forcing all scalars precise force_precise: frame%d: forcing r%d to be precise force_precise: frame%d: forcing fp%d to be precise invalid access to map key, key_size=%d off=%d size=%d invalid access to map value, value_size=%d off=%d size=%d invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d) invalid access to memory, mem_size=%u off=%d size=%d R%d min value is negative, either use unsigned index or do a if (index >=0) check. R%d offset is outside of the packet write into map forbidden, value_size=%d off=%d size=%d read from map forbidden, value_size=%d off=%d size=%d R%d min value is outside of the allowed memory range R%d unbounded memory access, make sure to bounds check any such access R%d max value is outside of the allowed memory range jump out of range from insn %d to %d last insn is not an exit or jmp addsubpointer arithmetic with it prohibited for !rootR%d has unknown scalar with mixed signed bounds, %s R%d has pointer with unsupported alu operation, %s R%d tried to %s from different maps, paths or scalars, %s R%d tried to %s beyond pointer bounds, %s R%d could not be pushed for speculative verification, %s verifier internal error: unknown reason (%d) same insn cannot be used with different pointers %s has to be at a constant offset cannot pass in %s at an offset=%d verifier internal error: multiple dynptr args verifier internal error: no dynptr arg found cannot update sockmap in this context Unreleased reference id=%d alloc_insn=%d %s %d: back-edge from insn %d to %d insn state internal bug indirect access to read from write toinvalid unbounded variable-offset%s stack R%d invalid%s stack R%d off=%d size=%d invalid variable-offset%s stack R%d var_off=%s size=%d rdonly_ringbuf_user_percpu_rcu_untrusted_trusted_%s%s%s%s%s%s%s%s%s%snegative offset %s ptr R%d off=%d disallowed dereference of modified %s ptr R%d off=%d disallowed variable %s access var_off=%s disallowed verifier BUG type %s var_off %lld off %d math between %s pointer and %lld is not allowed %s pointer offset %d is not allowed math between %s pointer and register with unbounded min value is not allowed value %lld makes %s pointer be out of bounds flow keys key value context stack sock sock_common tcp_sock xdp_sock misaligned packet access off %d+%s+%d+%d size %d misaligned %saccess off %s+%d+%d size %d tail_call abusing map_ptr callback function not allowed for map max struct nesting depth exceeded invalid module BTF object FD specified. kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig. ldimm64 insn specifies invalid btf_id %d. pseudo btf_id %d in ldimm64 isn't KIND_VAR or KIND_FUNC ldimm64 failed to find the address for kernel symbol '%s'. .data..percpuldimm64 unable to resolve the size of type '%s': %ld unknown dynptr type %d unknown iter state %d R0At %s the register %s has value %shas unknown scalar value should have been in %s rdonlyrdwrR%d invalid %s buffer access: off=%d, size=%d R%d invalid variable buffer offset: off=%d, var_off=%s __szk,%sr%d%s%dinsn %d cannot be patched due to 16-bit range bpf verifier is misconfigured bpf verifier narrow ctx access misconfigured bpf verifier narrow ctx load misconfigured The sequence of %d jumps is too complex. tail_calls are not allowed when call stack of previous frames is %d bytes. Too large combined stack size of %d calls is %d. Too large verifier bug. No program starts at insn %d verifier bug. subprog has tail_call and async cb the call stack of %d frames is too deep ! invalid kernel function call not eliminated in verifier pass verifier internal error: kernel function descriptor not found for func_id %u adding tail call poke descriptor failed kernel subsystem misconfigured func %s#%d tracking tail call prog failed tracing progs cannot use bpf_{list_head,rb_root} yet socket filter progs cannot use bpf_spin_lock yet tracing progs cannot use bpf_spin_lock yet tracing progs cannot use bpf_timer yet offload device mismatch between prog and map bpf_struct_ops map cannot be used in prog Sleepable programs can only use array, hash, ringbuf and local storage maps invalid kptr access, R%d type=%s%s expected=%s%s or %s%s call to invalid destination too many subprograms verifier internal error: ref_set_non_owning w/o active lock verifier internal error: NON_OWN_REF already set frame%d: R%d=P%s%lld(%sid=%d%sref_obj_id=%d%soff=%d%sr=%d%sks=%d,vs=%d%simm=%llx%ssmin=%lld%ssmax=%lld%sumin=%llu%sumax=%llu%svar_off=%s%ss32_min=%d%ss32_max=%d%su32_min=%d%su32_max=%d) fp%d=%s=dynptr_%s(ref_id=%d)=iter_%s(ref_id=%d,state=%s,depth=%u) refs=%d,%d cb async_cbnon_own_ref%s%s%*c;%d:cannot return stack pointer to the caller R0 not a scalar value callback returnreturning from callee: to caller at %d: backtracing misusemark_precise: frame%d: last_idx %d first_idx %d subseq_idx %d BUG backtracking func entry subprog %d reg_mask %x stack_mask %llx verifier backtracking bugmark_precise: frame%d: regs=%s stack=%s before BUG spi %d BUG regs %x BUG subprog exit from frame 0 BUG subprog enter from frame %d BUG backtracking idx %d mark_precise: frame%d: parent state regs=%s stack=%s: mark_reg_known_zero(regs, %u) too many different module BTFs kfunc offset > 0 without fd_array is invalid invalid module BTF fd specified BTF fd for kfunc is not a module BTF calling kernel function is not supported without CONFIG_DEBUG_INFO_BTF JIT is required for calling kernel function JIT does not support calling kernel function cannot call kernel function from non-GPL compatible program negative offset disallowed for kernel module function call failed to find BTF for kernel function too many different kernel function calls kernel btf_id %u is not a function kernel function btf_id %u does not have a valid func_proto cannot find address for kernel function %s address of kernel function %s is out of range mark_reg_unknown(regs, %u) R%d is invalid R%d !read_ok frame pointer is read only 'struct %s' access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN Cannot access kernel 'struct %s' from non-GPL compatible program R%d is ptr_%s invalid negative access: off=%d R%d is ptr_%s invalid variable offset: off=%d, var_off=%s R%d is ptr_%s access user memory: off=%d R%d is ptr_%s access percpu memory: off=%d verifier internal error: reg->btf must be kernel btf verifier internal error: ref_obj_id for allocated object must be non-zero __safe_trusted__safe_rcu__safe_rcu_or_nullonly read is supported map_ptr access not supported without CONFIG_DEBUG_INFO_BTF map_ptr access not supported for map type %d R%d is %s invalid negative access: off=%d only read from %s is supported mark_reg_not_init(regs, %u) the call stack of %d frames is too deep verifier bug. Frame %d already allocated Caller passes invalid args into func#%d Func#%d is global and valid. Skipping. verifier bug: kfunc %s#%d not marked as callback-calling The sequence of %d jumps is too complex for async cb. caller: callee: verifier bug: helper %s#%d not marked as callback-calling maplocalkptrR%d doesn't have constant offset. bpf_spin_lock has to be at the constant offset map '%s' has to have BTF in order to use bpf_spin_lock %s '%s' has no valid bpf_spin_lock off %lld doesn't point to 'struct bpf_spin_lock' that is at %d Locking two bpf_spin_locks are not allowed bpf_spin_unlock without taking a lock bpf_spin_unlock of different lock nonzero tailing record in core_reloInvalid core_relo[%u].insn_off:%u prog->len:%u cannot overwrite referenced dynptr nonzero tailing record in line_infoInvalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u) Invalid insn code at line_info[%u].insn_off Invalid line_info[%u].line_off or .file_name_off missing bpf_line_info for func#%u missing bpf_line_info for %u funcs starting from func#%u indirectinvalid zero-sized read R%d%s variable offset stack access prohibited for !root, var_off=%s potential write to dynptr at off=%d disallowed invalid%s read from stack R%d off %d+%d size %d invalid%s read from stack R%d var_off %s+%d size %d bpf_spin_lockbpf_timerbpf_list_headbpf_list_nodebpf_rb_rootbpf_rb_nodebpf_refcountunknownkptr cannot be accessed indirectly by helper kptr access cannot have variable offset kptr access misaligned expected=%u off=%llu kptr access size must be BPF_DW %s cannot be accessed directly by load/store R%d variable stack access prohibited for !root, var_off=%s off=%d R%d stack pointer arithmetic goes out of range, prohibited for !root; off=%d R%d pointer arithmetic of map value goes out of range, prohibited for !root R%d 32-bit pointer arithmetic prohibited R%d pointer arithmetic on %s prohibited, null-check it first R%d pointer arithmetic on %s prohibited R%d tried to subtract pointer from scalar R%d subtraction from stack pointer prohibited R%d bitwise operator %s on pointer prohibited R%d pointer arithmetic with %s operator prohibited attempt to corrupt spilled pointer on stack ; invalid size of register spill cannot spill pointers to stack into stack frame of the caller unknown stack slot type %d write to change key R%d not allowed R%d leaks addr into map kptr in map can only be accessed using BPF_MEM instruction mode store to referenced kptr disallowed BPF_ST imm must be 0 when storing to kptr at off=%u kptr in map can only be accessed using BPF_LDX/BPF_STX/BPF_ST R%d invalid mem access '%s' R%d cannot write into %s R%d leaks addr into mem R%d leaks addr into ctx invalid bpf_context access off=%d size=%d variable offset stack pointer cannot be passed into helper function; var_off=%s off=%d size=%d invalid size of register fill invalid read from stack off %d+%d size %d leaking pointer from stack off %d spilled ptr in range of var-offset stack write; insn %d, ptr off: %duninit stack in range of var-offset write prohibited for !root; insn %d, off: %dcannot write into packet R%d leaks addr into packet R%d leaks addr into flow keys invalid access to flow keys off=%d size=%d R%d invalid %s access off=%d size=%d tracepointR%d type=%s expected=%s R%d min value is negative, either use unsigned or 'var &= const' R%d unbounded memory access, use 'var &= const' or 'if (var < const)' BPF_ATOMIC uses invalid atomic opcode %02x invalid atomic operand size BPF_ATOMIC stores into R%d %s is not allowed verifier internal error: misconfigured dynptr helper type flags Dynptr has to be an uninitialized dynptr dynptrcannot pass pointer to const bpf_dynptr, the helper mutates it Expected an initialized dynptr as arg #%d Expected a dynptr of type %s as arg #%d iterexpected uninitialized iter_%s as arg #%d expected an initialized iter_%s as arg #%d R%d pointer %s pointer prohibited verifier internal error: no src_reg BPF_NEG uses reserved fields BPF_END uses reserved fields R%d pointer arithmetic prohibited BPF_MOV uses reserved fields R%d sign-extension part of pointer R%d partial copy of pointer invalid BPF_ALU opcode %x BPF_ALU uses reserved fields div by zero invalid shift %d R%d must have zero offset when passed to release func or trusted arg to kfunc void, calling kernel function %s is not allowed destructive kfunc calls require CAP_SYS_BOOT capability program must be sleepable to call sleepable kfunc %s Calling bpf_rcu_read_{lock,unlock} in unnecessary rbtree callback nested rcu read lock (kernel function %s) kernel func %s is sleepable within rcu_read_lock region Function %s has %d > %d args __ignR%d is not a scalar __kverifier internal error: only one constant argument permitted R%d must be a known constant rdonly_buf_sizerdwr_buf_size2 or more rdonly/rdwr_buf_size parameters for kfuncR%d is not a const Unrecognized arg#%d type %s Possibly NULL pointer passed to trusted arg%d verifier internal error: more than one arg with ref_obj_id R%d %u %u __alloc__refcounted_kptrkernel function %s args#%d pointer type %s %s is not supported __szR%d must be referenced or trusted R%d must be a rcu pointer arg#%d expected pointer to ctx, but got %s arg#%d expected pointer to allocated object allocated object must be referenced arg#%d expected pointer to stack or dynptr_ptr __uninitverifier internal error: failed to obtain dynptr id verifier internal error: invalid spi when querying dynptr type arg#%d expected pointer to map value or allocated object verifier internal error: unexpected btf mismatch in kfunc call R%d doesn't have constant offset. %s has to be at the constant offset %s not found at offset=%u verifier internal error: unknown reg type for lock check held lock and object are not in the same allocation bpf_spin_lock at off=%d must be held for %s verifier internal error: repeating %s arg operation on %s expects arg#1 %s at offset=%d in struct %s, but arg is at offset=%d in struct %s arg#1 offset=%d, but expected %s at offset=%d in struct %s rbtree_remove node input must be non-owning ref rbtree_remove not allowed in rbtree cb arg#%d is %s expected %s or socket kernel function %s args#%d expected pointer to %s %s but R%d has a pointer to %s %s arg#%d reference type('%s %s') size cannot be determined: %ld arg#%d arg#%d memory, len pair leads to invalid memory access verifier internal error: Couldn't find btf_record arg#%d doesn't point to a type with bpf_refcount field release kernel function %s expects refcounted PTR_TO_BTF_ID kfunc %s#%d reference has not been acquired before verifier internal error: ref_obj_id is zero for owning -> non-owning conversion verifier internal error: ref state missing for ref_obj_id kfunc %s#%d conversion of owning ref to non-owning failed kfunc %s#%d failed callback verification acquire kernel function does not return PTR_TO_BTF_ID local type ID argument must be in range [0, U32_MAX] bpf_obj_new requires prog BTF bpf_obj_new type ID argument must be of a struct kernel function %s unhandled dynamic return type kernel function %s returns pointer type %s %s is not supported verifier internal error: unexpected iterator state %d (%s) verifier internal error: %s node arg for unknown kfunc arg#%d is neither owning or non-owning ref verifier internal error: %s head arg for unknown kfunc __optarg#%d pointer type %s %s must point to %sscalar, or struct with scalar invalid func %s#%d unknown func %s#%d cannot call GPL-restricted function from non-GPL compatible program helper call is not allowed in probe helper call might sleep in a non-sleepable prog kernel subsystem misconfigured func %s#%d: r1 != ctx sleepable helper %s#%d in rcu_read_lock region R%d leaks addr into helper function helper access to the packet is not allowed invalid map_ptr to access map->type invalid arg_type for sockmap/sockhash verifier internal error: unsupported arg type %d R%d type=%s expected=%s, %s() may write into memory pointed by R%d type=%s Possibly NULL pointer passed to helper arg%d verifier internal error: missing arg compatible BTF ID verifier internal error:R%d has non-overwritten BPF_PTR_POISON type R%d is of type %s but %s is expected verifier internal error: unimplemented handling of MEM_ALLOC verifier internal error: invalid PTR_TO_BTF_ID register for type match arg %d is an unacquired reference cannot release unowned const bpf_dynptr verifier internal error: more than one release argument timer pointer in R1 map_uid=%d doesn't match map pointer in R2 map_uid=%d invalid map_ptr to access map->key invalid map_ptr to access map->value Helper has invalid btf_id in R%d can't spin_{lock,unlock} in rbtree cb verifier internal error R%d doesn't have constant offset. bpf_timer has to be at the constant offset map '%s' has to have BTF in order to use bpf_timer map '%s' has no valid bpf_timer off %lld doesn't point to 'struct bpf_timer' that is at %d verifier bug. Two map pointers in a timer helper R%d is not a known constant' R%d is not a constant address' no direct value access support for this map type direct value access on string failed string is not zero-terminated R%d doesn't have constant offset. kptr has to be at the constant offset map '%s' has to have BTF in order to use bpf_kptr_xchg map '%s' has no valid kptr off=%d doesn't point to kptr off=%d kptr isn't referenced kptr kernel subsystem misconfigured verifier write into map forbidden verifier internal error: CONST_PTR_TO_DYNPTR cannot be released verifier internal error: misconfigured ref_obj_id func %s#%d reference has not been acquired before tail_call would lead to reference leak verifier bug Invalid format string Unsupported reg type %s for bpf_dynptr_from_mem data BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value! verifier internal error: meta.dynptr_id already set verifier internal error: meta.ref_obj_id already set verifier internal error: failed to obtain dynptr ref_obj_id unable to resolve the size of type '%s': %ld func %s has non-overwritten BPF_PTR_POISON return type invalid return type %u of func %s#%d unknown return type %u of func %s#%d verifier internal error: func %s#%d sets ref_obj_id more than once cannot pass map_type %d into func %s#%d cannot get callchain buffer for func %s#%d func %s#%d supported only for fentry/fexit/fmod_ret programs func %s#%d not supported for program type %d R%d does not point to a readonly map' R%d must be referenced when passed to release function tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls get_local_storage() doesn't support non-zero flags (speculative execution)invalid insn idx %d insn_cnt %d BPF program is too large. Processed %d insn propagate_live: parent frame %d current frame %d frame %d: propagating r%d,r%dframe %d: propagating fp%d,fp%dBUG live_done but branches_to_explore %d BUG is_state_visited:branches_to_explore=%d insn %d from %d to %d%s: safe %d: safe from %d to %d%s:BPF_STX uses reserved fields BPF_ST uses reserved fields BPF_CALL uses reserved fields function calls are not allowed while holding a lock BPF_JA uses reserved fields BPF_EXIT uses reserved fields bpf_spin_unlock is missing bpf_rcu_read_unlock is missing R0 leaks addr as return value In async callback the register R0 is not a known value (%s) async callbackAt subprogram exit the register R0 is not a scalar value (%s) At program exit the register R0 is not a known value (%s) program exitNote, BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value! BUG update_branch_counts:branches_to_explore=%d invalid BPF_JMP/JMP32 opcode %x BPF_JMP/JMP32 uses reserved fields R%d pointer comparison prohibited BPF_LD_[ABS|IND] instructions not allowed for this program type BPF_LD_[ABS|IND] uses reserved fields BPF_LD_[ABS|IND] cannot be mixed with socket references BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region BPF_LD_[ABS|IND] cannot be used inside bpf_rcu_read_lock-ed region at the time of BPF_LD_ABS|IND R6 != pointer to skb invalid BPF_LD_IMM insn BPF_LD_IMM64 uses reserved fields missing btf func_info callback function not static invalid BPF_LD mode infinite loop detected at insn %d Tracing programs must provide btf_id FENTRY/FEXIT program can only be attached to another program annotated with BTF attach_btf_id %u is invalid attach_btf_id %u doesn't have a name Target program bound device mismatchSubprog %s doesn't exist Cannot replace static functions Extension programs should be JITed Can attach to only JITed progs Cannot recursively attach Cannot extend fentry/fexit Cannot replace kernel functions Only FENTRY/FEXIT progs are attachable to another BPF prog attach_btf_id %u is not a typedef attach_btf_id %u points to wrong type name %s attach_btf_id %u is not a function The address of function %s cannot be found %s is not sleepable can't modify return codes of BPF programs security_%s() is not modifiable btf_trace_in-kernel BTF is malformed loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN func#%d @%d LD_ABS is not allowed in subprogs without BTF tail_call is not allowed in subprogs without BTF number of funcs in func_info doesn't match number of subprogs invalid func info rec size %u nonzero tailing record in func infononzero insn_off %u for the first func info recordsame or smaller insn offset (%u) than previous func info record (%u)func_info BTF section doesn't match subprog layout in BPF program invalid type id %d in func infoLD_ABS is only allowed in functions that return 'int'. tail_call is only allowed in functions that return 'int'. Syscall programs can only be sleepable Only fentry/fexit/fmod_ret, lsm, iter, uprobe, and struct_ops programs can be sleepable struct ops programs must have a GPL compatible license attach_btf_id %u is not a supported struct attach to invalid member idx %u of struct %s attach to invalid member %s(@idx %u) of struct %s attach to unsupported member %s of struct %s BPF_LDX uses reserved fields invalid bpf_ld_imm64 insn unrecognized bpf_ld_imm64 insn fd_idx without fd_array is invalid fd %d is not pointing to valid bpf_map direct value offset of %u is not allowed invalid access to map value pointer, value_size=%u off=%u only one cgroup storage of each type is allowed unknown opcode %02x visit_insn internal bug pop stack internal bug unreachable insn %d Func#%d is safe for any args that match its prototype verifier bug. zext_dst is set, but no reg is defined JIT doesn't support bpf-to-bpf calls calling kernel functions are not allowed in non-JITed programs callbacks are not allowed in non-JITed programs verification time %lld usec stack depth %d+processed %d insns (limit %d) max_states_per_insn %d total_states %d peak_states %d mark_read %d activedrainedringbufskbxdp?scalarctxmap_ptrmap_valuemap_keyfppkt_metapktpkt_endflow_keyssocksock_commontcp_socktp_bufferxdp_sockptr_membuffuncdynptr_ptrF  [V   TT75So^X-XCC7 FcTLKKlgKKKeeHDdoi>iTT0HK'AI#########I##I#I######################I#############:::########]C####)#################%%##I#########I########22##2##########..#########66#######################################222########I0   0      000 D*            0-{?rm0di@P 0`p    GCC: (Ubuntu 11.4.0-1ubuntu1~22.04) 11.4.0GNU d3t4HU(nxh8`(Lt  0!P9  AP, i 4|  | Tp)>hLVkdt(X # p$",%3%Ix'e<(t{(T*-l.8/2833p4t&4;5^x6pm6 78<99x:<1:J;eT<},=?HAPTmH}Д8ؗL$x\Lpd3| E Vpd|D0ܮ`$8 ) x8; T T t t<   h 0  , P* B @k\^ 4pv   T$ x t   (&0 <5! 4W*   T.,  > R d      (       p N  0   0  0  x0  0;  0)  807  0x  0F  H0X  h0q  0  0  X0  (0  0  0  0           1  C  T  f  x                  + < M _ p ,BXt$:P(f3|>IT_ju,BVj0F%\0r;FQ\ gy*BJYn{ #8KRZp (08Hh "1@Oair-GYt 4>[pX00xp1*12$2 CD2Q4,h~%9UksH&.Gb}l x4*%CRe $>Vj~%=Nbw"=Ws verifier.c$xbtf_id_cmp_funcis_acquire_functionis_ptr_cast_functioncmp_subprogskfunc_desc_cmp_by_id_offkfunc_btf_cmp_by_offinsn_def_regnosave_register_statemay_access_direct_pkt_dataset_callee_statefind_good_pkt_pointersfind_equal_scalarsrange_withincheck_ids$didset_pushrelease_reference_stateverboseprint_livenessmark_all_scalars_precise__check_mem_accesscheck_packet_accesscheck_map_access_typecheck_mem_region_accesscheck_subprogssanitize_errsave_aux_ptr_typestack_slot_obj_get_spiget_dynptr_arg_regmay_update_sockmapcheck_reference_leakverbose_linfopush_insnvisit_func_call_insncheck_stack_access_within_boundsreg_type_str__check_ptr_off_regmark_reg_readmark_btf_func_reg_sizecheck_reg_sane_offsetcheck_ptr_alignmentrealloc_arrayacquire_reference_statepush_jmp_historycoerce_reg_to_size_sxset_map_elem_callback_state__update_reg32_bounds__btf_type_is_scalar_structcheck_pseudo_btf_idregs_exactcopy_arrayverifier_remove_insnskfunc_desc_cmp_by_imm_offmark_ptr_not_null_regdynptr_type_striter_state_stris_reg64.constprop.0verbose_invalid_scalar.constprop.0reg_btf_recordcheck_buffer_access.constprop.0__is_kfunc_ptr_arg_type.isra.0is_kfunc_arg_scalar_with_name.isra.0__kfunc_param_match_suffix.isra.0is_kfunc_arg_const_mem_sizein_rbtree_lock_required_cb.isra.0fmt_reg_mask.constprop.0fmt_stack_mask.constprop.0copy_from_bpfptr_offsetbpf_patch_insn_datainline_bpf_loopconvert_ctx_accessesfree_verifier_statecopy_verifier_stateregsafe.part.0states_equal.part.0push_stackcheck_max_stack_depth_subprogdo_misc_fixupscheck_map_prog_compatibilitymap_kptr_match_typeadd_subprogref_set_non_owning.isra.0print_verifier_stateprint_insn_stateprepare_func_exitmark_reg_graph_node__mark_chain_precisiondisasm_kfunc_nameis_branch_takenreg_bounds_sync__reg_combine_64_into_32__reg_combine_min_max__reg_combine_32_into_64reg_set_min_maxrelease_referencemark_ptr_or_null_reg.constprop.0mark_ptr_or_null_regsmark_reg_known_zero__find_kfunc_desc_btfadd_kfunc_callfetch_kfunc_metavisit_insnset_loop_callback_stateinvalidate_dynptrmark_reg_unknowncheck_reg_argcheck_ptr_to_btf_accessmark_reg_stack_readsanitize_speculative_pathsanitize_ptr_alu.isra.0check_ptr_to_map_accessmark_reg_not_initinit_reg_state__check_func_callset_find_vma_callback_stateprocess_spin_lockset_timer_callback_stateset_user_ringbuf_callback_stateset_rbtree_add_callback_statecheck_core_relodestroy_if_dynptr_stack_slotcheck_btf_linecheck_stack_range_initializedcheck_map_accesssanitize_check_boundstry_match_pkt_pointersadjust_ptr_min_max_valscheck_stack_write_fixed_offcheck_helper_mem_accesscheck_mem_size_regcheck_kfunc_mem_size_regcheck_atomicprocess_dynptr_funcprocess_iter_argadjust_reg_min_max_valscheck_alu_opcheck_kfunc_callcheck_helper_calldo_check_commonbpf_verifier_lockrcu_protected_typesspecial_kfunc_setbtf_non_sleepable_error_injectbtf_id_denystr.2CSWTCH.1051CSWTCH.1053slot_type_charreg2btf_idscaller_savedcompatible_reg_typesconst_map_ptr_typesscalar_typescontext_typesspin_lock_typesint_ptr_typesfullsock_typesringbuf_mem_typesbtf_id_sock_common_typespercpu_btf_ptr_typesfunc_ptr_typesstack_ptr_typesconst_str_ptr_typestimer_typeskptr_typesdynptr_typesopcode_flip.0bpf_verifier_ops__already_done.24__already_done.23__already_done.7__already_done.10__already_done.9__already_done.18__already_done.17__already_done.16__already_done.15__already_done.14__already_done.19__already_done.13__already_done.12__already_done.11__already_done.20__already_done.8__already_done.22__already_done.5__already_done.4__already_done.21__already_done.3__already_done.6.L144721.L144722.L144723.L144724.L144725.L144726.L144727.L144728.L144729.L1447210.L1447211.L1447212.L1447213.L1447214.L1447215.L1447216.L1447217.L1447218.L1447219.L1447220.L1447221.L1447222.L1447223.L1447224.L1447225.L1447226.L1447227.L1447228.L1447229.L1447230.L1447231.L1447232.L1447233.L1447234.L1447235.L1447236.L1447237.L1447238.L1447239.L1447240.L1447241.L1447242.L1447243.L1447244.L1447245bpf_verifier_vlog__stack_chk_failbtf_name_by_offset_ctypetnum_strnsnprintftnum_consttnum_addtnum_is_alignedkmalloc_size_roundupkreallocmemsetkfreetnum_unknowntnum_rangetnum_subregbtf_type_skip_modifiersbtf_getbtf_type_by_idkallsyms_lookup_namebtf_nr_typesbtf_is_modulestrcmpbtf_get_by_fdbtf_putbtf_resolve_sizebtf_try_get_modulememcmpksizememcpybpf_remove_insnsbpf_prog_offload_remove_insnsmemmove__warn_printkbtf_find_struct_metabtf_types_are_samestrlenstrncmp__arch_copy_from_usercopy_from_kernel_nofaultvzallocbpf_patch_insn_singlebpf_tcp_sock_convert_ctx_accessbpf_xdp_sock_convert_ctx_accessbpf_sock_convert_ctx_accesskmalloc_cacheskmalloc_tracetnum_inbsearchjiffies__bpf_call_basebpf_jit_supports_far_kfunc_callbpf_user_rnd_init_oncesortbpf_jit_supports_subprog_tailcallsbpf_jit_add_poke_descriptorfunc_id_namebpf_map_offload_opsbpf_offload_prog_map_matchbtf_is_kernelbtf_struct_ids_matchbpf_vlog_resetprint_bpf_insntnum_intersecttnum_clear_subregtnum_ortnum_andtnum_const_subregbpf_dev_bound_kfunc_idbpf_dev_bound_kfunc_checkbtf_distill_func_protobpf_jit_supports_kfunc_callkmalloc_largebpf_dev_bound_resolve_kfuncbpf_dynptr_from_skb_rdonlybtf_kfunc_id_set_containsbtf_struct_accessbtf_nested_type_is_trustedbtf_check_subprog_callbtf_tracing_idsbtf_record_findbpf_check_uarg_tail_zerobpf_core_apply__arch_copy_to_userkvmalloc_nodekvfreebpf_alu_stringtnum_subbpf_sock_common_is_valid_accesstnum_castbpf_xdp_sock_is_valid_accessbpf_map_write_activebpf_tcp_sock_is_valid_accessbpf_sock_is_valid_accesstnum_arshifttnum_rshifttnum_xortnum_multnum_lshiftbpf_get_kfunc_addrbpf_free_kfunc_btf_tabmodule_putbpf_prog_has_kfunc_callbpf_jit_find_kfunc_modelcheck_mem_regcheck_func_arg_reg_offbtf_get_prog_ctx_typecapablebtf_type_is_voidbtf_type_ids_nocast_aliasbtf_type_strget_kern_ctx_btf_idbpf_global_ma_setbtf_type_resolve_func_ptrbpf_helper_changes_pkt_datanr_cpu_idsbpf_bprintf_preparesysctl_perf_event_max_stackget_callchain_buffersstrnchrbpf_prog_has_trampolinebtf_prepare_func_argsbtf_check_subprog_arg_matchbpf_prog_offload_verify_insnmap_set_for_each_callback_argsbpf_check_attach_targetbtf_check_type_matchbpf_logbpf_prog_dev_bound_matchfind_kallsyms_symbol_valuebtf_kfunc_is_modify_returnbpf_get_btf_vmlinuxbpf_checkktime_getbpf_vlog_initbpf_vlog_finalize__kmallocmutex_lockmutex_unlock__bpf_free_used_maps__bpf_free_used_btfsbpf_patch_call_argsbpf_prog_offload_replace_insnget_random_u32bpf_jit_needs_zextbpf_prog_alloc_jited_linfobpf_prog_jit_attempt_donebpf_trampoline_getbpf_prog_calc_tag__fdget__bpf_map_getbpf_prog_offload_verifier_prepbpf_opcode_in_insntablebpf_iter_prog_supportedbpf_prog_offload_finalizebpf_prog_alloc_no_statsbpf_int_jit_compilebpf_struct_ops_findbpf_map_incbpf_cgroup_storage_assignfputbpf_jit_freebtf_obj_idbpf_prog_kallsyms_addfind_vm_areaset_memory_robtf_bpf_map_idbtf_sock_idssk_filter_verifier_opstc_cls_act_verifier_opsxdp_verifier_opscg_skb_verifier_opscg_sock_verifier_opslwt_in_verifier_opslwt_out_verifier_opslwt_xmit_verifier_opssock_ops_verifier_opssk_skb_verifier_opscg_dev_verifier_opssk_msg_verifier_opscg_sock_addr_verifier_opslwt_seg6local_verifier_opssk_reuseport_verifier_opsflow_dissector_verifier_opscg_sysctl_verifier_opscg_sockopt_verifier_opsbpf_struct_ops_verifier_opsbpf_extension_verifier_opssk_lookup_verifier_opsbpf_syscall_verifier_opsnetfilter_verifier_ops    ` hd h hl    ( 0 d Pl P     ( (  < D d Pl P@@xxx| 48<@X\x`dx@@((XXHL\`d@l@hhdx,0hlxx  PP4LxPx` (08TX\` d t|t  PPD H x     H H x!!! ! " "0"8 8"8 X" `" |"( "( " " " " " "#p #p # (# 4# <# D# L# T# \# d# l# t# |# ## # $d$% % &&& (' P'l' '( ( (( 0( T( ))) ) D*H*X*d******H *H ++$+<++++, , ,,,,$- ,- 8-<-@-T- \- t-- - --X -X -@ -@ - ... . . $//!0"P1#2#d2#2#3 3 33 3 344 4 4$04 44 T4X4\4 `4 t4 x4 4$5 5 5 5 55 6 6$6 (6 d6 h6 t66%7H 7@ 7H 7@ 77 7 7P 7P 78l8t888&88'89'9`9't99'9( :T: X: ::: : : ; ;;;; ; ; ; ;<)<*$=t=+=,$> X> >-?-? ? DAA.A.A/A/B0B0|EEF(F(FXGX8GlGtG|GGGLHTH\HtH1|H1H dI2J3K3L3LlO1|O1O2(P0PdPPQPQ4RRS S8SHccc`c`ccc(c(0d@dLd?dddhdhdddd8eHee@ee8ftl>t>;>;>qDA>lAH.tAH.BH. BH.LB8TB8|B1B1BBB;B;DC tCP3|CP3CCCCDDE8$E=E8$ E=DELEdEX$hE=lEX$pE=EEnE=E=FFTFsFFF@FtFtG(9G(9HGuGTG 7G 7G8$G7G8$G7HT$H4HXH@HHH$H`8HH$H`8HTI 7 I 7IX$ I7$IX$(I7I@KlK|KtK<K<KtK3K3K2K2 L9(L9PL9XL9L8:L8:MMM44M<S>StSSS8$S7S8$S7S8$S6S8$S6TX$ T7TX$T7(T`7,T`7TT5\T5TX2TX2T<T<T`<T`<T(<T(<(U0=0U0=PUX$TU7XUX$\U7tUX$xU6|UX$U6U1U1U5U5UUUH$V8$VH$V8$ V7V7V:$V:4V8$8V7[>\< \,\$]o^?^?a?a?a@a@b<bGbG,cB4cBcx'cx'cc4dT8dTdd hd eeeyeyeefGfGfPKfPK@gXHHgXHhglggH.gH.hH.hH.h<(i@,i@\ij<(jI0jIj<j< k<8kXJPv>vxDvxDPw`FXw`Fpw<|wh>wh>w{w{w|wFwFw>w>w?x?xFxF0x_x}xExExAxA y8Ey8E,yXE4yXELyETyE|y5y5yz<zx?zx?4z`G