Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4805145pxj; Tue, 22 Jun 2021 08:23:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwON/UD8ZGsUpctVe/tLsXHm9IAdvPtCxSCMgHisBlylMgnoGDqUUbx23M4ieFtr4Cw1dvW X-Received: by 2002:a02:cca6:: with SMTP id t6mr4592792jap.36.1624375401297; Tue, 22 Jun 2021 08:23:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624375401; cv=none; d=google.com; s=arc-20160816; b=GTdDFy4b5Og9wQP6uIdf7MdaE8FuVGON4XuPT8kQhjBYi9SeR6Dgrx76jd0pQARaq2 YgE/43c6e6DUI9jDCXEewAX86zU1FDsszPx6nC0aA2J9EON7Y/qmGnBOFNFzDct6KHjb I8lyAkLu7/H7nAHQqWLsruVOmAX00+uHQvggT1GqVnbVgfWl/cSwGyynXYJI1FulQhXH m/6KAav6moJ+CSpLtbKziUMO3X6NKdj10QiJEVVv8LjD0/IA65ozrXN0M+wJID/O3NCQ YBwvf8tGVrRgontMd7AZ4N/DIC9tlnaTsWjqmHJDncDsAa14n2fA9Kv6DMzUgikUZ4Io 8STQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:mime-version:references:message-id :subject:cc:to:from:date:dkim-signature; bh=bVhNFsBZG7ILXYCpWmOXcrum5fIMkB2OfUwgZNMcago=; b=Qf5c/ZrOrb7ftkBAIUi4EwkM6gI9qumo6YdKE7+xXMDtZVbl13ubyOwXn7uroSnder tUXZpTagd5/WBdeBLiQTWNRrB9CI2v4tK0qTxxp0ScR6S85Zg6tcwS3qlkwBg+o79BJ6 dVKgWSeZN3Shjgovwg56+Wqmrk98lo9M2YOyM6uzaETlCKvD4ufTFaa/9QZWTjjeZZ+E VGdtaYas+fYnARoRXBWB2tg9Ubct1zqYpVRdSMG1ACj9KWDbm2TpYFisTNXVXKIiypGB Uc5e21qvEhCdXyemnH8coa+/TEOWkpCuL9PCKP1OuFb0MSiM7GS54ALvv2PNCH/6O/YV fPag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=f+h2d8Mp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i1si28012490iow.32.2021.06.22.08.23.07; Tue, 22 Jun 2021 08:23:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=f+h2d8Mp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232169AbhFVPYv (ORCPT + 99 others); Tue, 22 Jun 2021 11:24:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58020 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232120AbhFVPYs (ORCPT ); Tue, 22 Jun 2021 11:24:48 -0400 Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D847C061756 for ; Tue, 22 Jun 2021 08:22:32 -0700 (PDT) Received: by mail-pl1-x629.google.com with SMTP id y21so4753844plb.4 for ; Tue, 22 Jun 2021 08:22:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :in-reply-to; bh=bVhNFsBZG7ILXYCpWmOXcrum5fIMkB2OfUwgZNMcago=; b=f+h2d8MpbNhXZeZLbaYCWBI+S6R3cOxKEKbcKoAsR1NZAFU6EtuOsA+yDtt8KrMt2e x8S4RtbdeywDc1/Vz3ul7bvQoPj/e0XcoRDiQL8J8UjnFal8dzPuIE/UyAextBn/dy/n l0QuZ7fc7CMqSb97CT4uwiv4AvcRZP7Qj9iyI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:in-reply-to; bh=bVhNFsBZG7ILXYCpWmOXcrum5fIMkB2OfUwgZNMcago=; b=aI6DKCV8TwVeZ5Rd+yllIy/4lnGvEtg5yVpnT/SJoz40ET6QobhIY+ehsbPQZ8VILk OCgy58/ce7fEXrxtchLyJK+tKGgz7e43m0I5vWhN/x0xQhMwRnKY8DoPeCRnhogoV7dS +4RF1cp48yyCzPH9ugm8l7zrN44inlrvORps7MQ6ao8Qe2K9nYSJDiXDXwlCWo8fyGYq XpEKWDpL1CiezrVcJ3UHMIQVc0bcxI31gjXvNBGxLwgYIP4wGMJySj547xDRd2rOJWRg Yxp/EuPegAzKI4VcbnEKyZWzQfo7RFelyOCUcy4jO1Nk3vHWk+DCyEGZmNBxJm2jtyk5 /Amw== X-Gm-Message-State: AOAM532MfX//9BOpaZCaXWgRQ7ECkAYc5ME5VrhGpsLrzcU8SCsck1r1 s7XNVMOAQFOPdxmWxEXq7x0RSg== X-Received: by 2002:a17:90a:19d2:: with SMTP id 18mr4493664pjj.173.1624375351771; Tue, 22 Jun 2021 08:22:31 -0700 (PDT) Received: from noodle ([192.19.250.250]) by smtp.gmail.com with ESMTPSA id h8sm21114926pgr.43.2021.06.22.08.22.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 22 Jun 2021 08:22:30 -0700 (PDT) Date: Tue, 22 Jun 2021 18:22:18 +0300 From: Boris Sukholitko To: Jamal Hadi Salim Cc: Vladimir Oltean , Vadym Kochan , "David S. Miller" , Jakub Kicinski , Cong Wang , Andrew Lunn , Serhiy Boiko , Volodymyr Mytnyk , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, jiri@resnulli.us, idosch@idosch.org, ilya.lifshits@broadcom.com Subject: Re: [PATCH net-next] net/sched: cls_flower: fix resetting of ether proto mask Message-ID: <20210622152218.GA1608@noodle> References: <20210617161435.8853-1-vadym.kochan@plvision.eu> <20210617164155.li3fct6ad45a6j7h@skbuf> <20210617195102.h3bg6khvaogc2vwh@skbuf> <20210621083037.GA9665@builder> <20210622131314.GA14973@builder> <451abd22-4c81-2821-e8d4-4f305697890c@mojatatu.com> MIME-Version: 1.0 In-Reply-To: <451abd22-4c81-2821-e8d4-4f305697890c@mojatatu.com> Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="000000000000d946fa05c55c5b21" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --000000000000d946fa05c55c5b21 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Jun 22, 2021 at 10:17:45AM -0400, Jamal Hadi Salim wrote: > Hi Boris, > > On 2021-06-22 9:13 a.m., Boris Sukholitko wrote: > > Hi Jamal, > > > > On Mon, Jun 21, 2021 at 10:04:41AM -0400, Jamal Hadi Salim wrote: > > > On 2021-06-21 4:32 a.m., Boris Sukholitko wrote: > > [..] > > > > I like this solution. To be more explicit, the plan becomes: > > > > > > > > 1. Add FLOW_DISSECTOR_KEY_ETH_TYPE and struct flow_dissector_key_eth_type. > > > > 2. Have skb flow dissector use it. > > > > 3. Userspace does not set TCA_FLOWER_KEY_ETH_TYPE automagically > > > > anymore. cls_flower takes basic.n_proto from struct tcf_proto. > > > > 4. Add eth_type to the userspace and use it to set TCA_FLOWER_KEY_ETH_TYPE > > > > 5. Existence of TCA_FLOWER_KEY_ETH_TYPE triggers new eth_type dissector. > > > > > > > > IMHO this neatly solves non-vlan protocol match case. > > > > > > > > What should we do with the VLANs then? Should we have vlan_pure_ethtype > > > > and cvlan_pure_ethtype as additional keys? > > > > > > > > > > I didnt see the original patch you sent until after it was applied > > > and the cursory 30 second glance didnt say much to me. > > > > > > Vlans unfortunately are a speacial beast: You will have to retrieve > > > the proto differently. > > > > Do you by any chance have some naming suggestion? Does > > vlan_pure_ethtype sound ok? What about vlan_{orig, pkt, raw, hdr}_ethtype? > > > > The distinction is in getting the inner vs outer proto, correct? Yes. To be more explicit: the outer protocol (ETH_P_PPP_SES in this case) is invisible to the user due to __skb_flow_dissect drilling down to find the inner protocol. > > Before we go there let me push back a little since no other > classifier has this problem. IIUC: > For the hardware offload current scheme works fine. On the > non-offload side, the issue seems to be that classify() was > not getting the proper protocol? Yes. Talking specifically about flower's fl_classify and the following rule (0x8864 is ETH_P_PPP_SES): tc filter add dev eth0 ingress protocol 0x8864 flower action simple sdata hi6 skb_flow_dissect sets skb_key.basic.n_proto to the inner protocol contained inside the PPP tunnel. fl_mask_lookup will fail finding the outer protocol configured by the user. > > I pointed to Toke's change since it tries to generalize the > solution. you'd use that approach > (eg setting to true). > > Would that solve the issue? > I don't see how it might help ... > If not maybe we need a naming convention for inner vs out proto. > Should be noted that user space semantics require that the "current > protocol" be specified in the policy. i.e if you have an inner > protocol and you need both looked at then you would have two rules > like this: > > 1) tc filter ... protocol outer .... action-to-strip-outer-header \ > action reclassify > 2) tc filter ... protoco inner ... action blah > > The action-to-strip-outer-header will set properly the skb->proto > after moving the data pointers so that #2 will match it. It looks to me that there is no way to match on outer protocol such as ETH_P_PPP_SES at least in flower. Although other filters (e.g. matchall) will work, VLAN packets containing ETH_P_PPP_SES will require flower and still will not match. > > > > > > > Q: Was this always broken? Example look at Toke's change here: > > > commit d7bf2ebebc2bd61ab95e2a8e33541ef282f303d4 > > > > > > > IMHO we've always had this problem. I did some archeology on this > > code and didn't see anything which might have caused the bug. > > > > Suprised it took this long to find out. > > > Toke's change doesn't look related because in fl_classify it does: > > > > skb_key.basic.n_proto = skb_protocol(skb, false); > > > > before running the dissector. In case of a known tunnelling protocol (such > > as ETH_P_PPP_SES) the n_proto will be overriden by __skb_flow_dissect. > > > > Toke's change may have left things as they were before > but generally to get vlan protos you'd do things differently. > > This is because when vlan offloading was merged it skewed > things a little and we had to live with that. > > Flower is unique in its use of the dissector which other classifiers > dont. Is this resolvable by having the fix in the dissector? Yes, the solution suggested by Vladimir and elaborated by myself involves extending the dissector to keep the outer protocol and having flower eth_type match on it. This is the "plan" being quoted above. I believe this is the solution for the non-vlan tagged traffic. For the vlans we already have [c]vlan_ethtype keys taken. Therefore we'll need new [c]vlan_outer_ethtype keys. Thanks, Boris. > > cheers, > jamal > --000000000000d946fa05c55c5b21 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIQeQYJKoZIhvcNAQcCoIIQajCCEGYCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg gg3QMIIFDTCCA/WgAwIBAgIQeEqpED+lv77edQixNJMdADANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA5MTYwMDAwMDBaFw0yODA5MTYwMDAwMDBaMFsxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTEwLwYDVQQDEyhHbG9iYWxTaWduIEdDQyBS MyBQZXJzb25hbFNpZ24gMiBDQSAyMDIwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA vbCmXCcsbZ/a0fRIQMBxp4gJnnyeneFYpEtNydrZZ+GeKSMdHiDgXD1UnRSIudKo+moQ6YlCOu4t rVWO/EiXfYnK7zeop26ry1RpKtogB7/O115zultAz64ydQYLe+a1e/czkALg3sgTcOOcFZTXk38e aqsXsipoX1vsNurqPtnC27TWsA7pk4uKXscFjkeUE8JZu9BDKaswZygxBOPBQBwrA5+20Wxlk6k1 e6EKaaNaNZUy30q3ArEf30ZDpXyfCtiXnupjSK8WU2cK4qsEtj09JS4+mhi0CTCrCnXAzum3tgcH cHRg0prcSzzEUDQWoFxyuqwiwhHu3sPQNmFOMwIDAQABo4IB2jCCAdYwDgYDVR0PAQH/BAQDAgGG MGAGA1UdJQRZMFcGCCsGAQUFBwMCBggrBgEFBQcDBAYKKwYBBAGCNxQCAgYKKwYBBAGCNwoDBAYJ KwYBBAGCNxUGBgorBgEEAYI3CgMMBggrBgEFBQcDBwYIKwYBBQUHAxEwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUljPR5lgXWzR1ioFWZNW+SN6hj88wHwYDVR0jBBgwFoAUj/BLf6guRSSu TVD6Y5qL3uLdG7wwegYIKwYBBQUHAQEEbjBsMC0GCCsGAQUFBzABhiFodHRwOi8vb2NzcC5nbG9i YWxzaWduLmNvbS9yb290cjMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9zZWN1cmUuZ2xvYmFsc2lnbi5j b20vY2FjZXJ0L3Jvb3QtcjMuY3J0MDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5jb20vcm9vdC1yMy5jcmwwWgYDVR0gBFMwUTALBgkrBgEEAaAyASgwQgYKKwYBBAGgMgEo CjA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAN BgkqhkiG9w0BAQsFAAOCAQEAdAXk/XCnDeAOd9nNEUvWPxblOQ/5o/q6OIeTYvoEvUUi2qHUOtbf jBGdTptFsXXe4RgjVF9b6DuizgYfy+cILmvi5hfk3Iq8MAZsgtW+A/otQsJvK2wRatLE61RbzkX8 9/OXEZ1zT7t/q2RiJqzpvV8NChxIj+P7WTtepPm9AIj0Keue+gS2qvzAZAY34ZZeRHgA7g5O4TPJ /oTd+4rgiU++wLDlcZYd/slFkaT3xg4qWDepEMjT4T1qFOQIL+ijUArYS4owpPg9NISTKa1qqKWJ jFoyms0d0GwOniIIbBvhI2MJ7BSY9MYtWVT5jJO3tsVHwj4cp92CSFuGwunFMzCCA18wggJHoAMC AQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUAMEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9v dCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5 MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEgMB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENB IC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0E XyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuul9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+J J5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJpij2aTv2y8gokeWdimFXN6x0FNx04Druci8u nPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTv riBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti+w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGj QjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5N UPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEAS0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigH M8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9ubG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmU Y/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaMld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V 14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcy a5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/fhO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/ XzCCBVgwggRAoAMCAQICDDSzinKpvcPTN4ZIJTANBgkqhkiG9w0BAQsFADBbMQswCQYDVQQGEwJC RTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTExMC8GA1UEAxMoR2xvYmFsU2lnbiBHQ0MgUjMg UGVyc29uYWxTaWduIDIgQ0EgMjAyMDAeFw0yMTAyMjIwNzMwMDRaFw0yMjA5MDUwNzM3NTVaMIGW MQswCQYDVQQGEwJJTjESMBAGA1UECBMJS2FybmF0YWthMRIwEAYDVQQHEwlCYW5nYWxvcmUxFjAU BgNVBAoTDUJyb2FkY29tIEluYy4xGTAXBgNVBAMTEEJvcmlzIFN1a2hvbGl0a28xLDAqBgkqhkiG 9w0BCQEWHWJvcmlzLnN1a2hvbGl0a29AYnJvYWRjb20uY29tMIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEAy/C7bjpxs+95egWV8sWrK9KO0SQi6Nxu14tJBgP+MOK5tvokizPFHoiXTymZ 7ClfnmbcqT4PzWgI3thyfk64bgUo1nQkCTApn7ov3IRsWjmHExLSNoJ/siUHagO6BPAk4JSycrj5 9tC9sL4FnIAbAHmOSILCyGyyaBAcmiyH/3toYqXyjJkK+vbWQSTxk2NlqJLIN/ypLJ1pYffVZGUs 52g1hlQtHhgLIznB1Qx3Fop3nOUk8nNpQLON/aM8K5sl18964c7aXh7YZnalUQv3md4p2rAQQqIR rZ8HBc7YjlZynwOnZl1NrK4cP5aM9lMkbfRGIUitHTIhoDYp8IZ1dwIDAQABo4IB3jCCAdowDgYD VR0PAQH/BAQDAgWgMIGjBggrBgEFBQcBAQSBljCBkzBOBggrBgEFBQcwAoZCaHR0cDovL3NlY3Vy ZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvZ3NnY2NyM3BlcnNvbmFsc2lnbjJjYTIwMjAuY3J0MEEG CCsGAQUFBzABhjVodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9nc2djY3IzcGVyc29uYWxzaWdu MmNhMjAyMDBNBgNVHSAERjBEMEIGCisGAQQBoDIBKAowNDAyBggrBgEFBQcCARYmaHR0cHM6Ly93 d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wCQYDVR0TBAIwADBJBgNVHR8EQjBAMD6gPKA6 hjhodHRwOi8vY3JsLmdsb2JhbHNpZ24uY29tL2dzZ2NjcjNwZXJzb25hbHNpZ24yY2EyMDIwLmNy bDAoBgNVHREEITAfgR1ib3Jpcy5zdWtob2xpdGtvQGJyb2FkY29tLmNvbTATBgNVHSUEDDAKBggr BgEFBQcDBDAfBgNVHSMEGDAWgBSWM9HmWBdbNHWKgVZk1b5I3qGPzzAdBgNVHQ4EFgQUtBmGs9S4 t1FcFSfkrP2LKQQwBKMwDQYJKoZIhvcNAQELBQADggEBAJMAjVBkRmr1lvVvEjMaLfvMhwGpUfh6 CMZsKICyz/ZZmvTmIZNwy+7b9r6gjLCV4tP63tz4U72X9qJwfzldAlYLYWIq9e/DKDjwJRYlzN8H 979QJ0DHPSJ9EpvSKXob7Ci/FMkTfq1eOLjkPRF72mn8KPbHjeN3VVcn7oTe5IdIXaaZTryjM5Ud bR7s0ZZh6mOhJtqk3k1L1DbDTVB4tOZXZHRDghEGaQSnwU/qxCNlvQ52fImLFVwXKPnw6+9dUvFR ORaZ1pZbapCGbs/4QLplv8UaBmpFfK6MW/44zcsDbtCFfgIP3fEJBByIREhvRC5mtlRtdM+SSjgS ZiNfUggxggJtMIICaQIBATBrMFsxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52 LXNhMTEwLwYDVQQDEyhHbG9iYWxTaWduIEdDQyBSMyBQZXJzb25hbFNpZ24gMiBDQSAyMDIwAgw0 s4pyqb3D0zeGSCUwDQYJYIZIAWUDBAIBBQCggdQwLwYJKoZIhvcNAQkEMSIEIB8hKO8L4poWc4aZ BwlEFe//U2xTIx0l0mG4Ox8Sve4HMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcN AQkFMQ8XDTIxMDYyMjE1MjIzMlowaQYJKoZIhvcNAQkPMVwwWjALBglghkgBZQMEASowCwYJYIZI AWUDBAEWMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzALBgkqhkiG9w0BAQowCwYJKoZIhvcNAQEH MAsGCWCGSAFlAwQCATANBgkqhkiG9w0BAQEFAASCAQDIDiqLbbNSwvhpeLLWTfR6e7c/SXQ9vR7+ xO/LoIlE+KCXl6l9LnVZtFjLdr343vroDNOE5PBNweUPMNLCSQ67iKeYAMMuH3TimRL/A35/wpf/ ejl7yVUYpNlBzO3sByseSdDZaJXiakgY7oz5Pe3xzC7hJKB5CG5sMutm20Rjmh7MkUbBi2xF66FU qJ4ltiNcH9rcEQHp2WBbdWCswh4uhDNH38uGSCcwt5d6ZapjjmkmR2/7BtxROiCB1yzpmaTVtOCP KUmu71kNoruzBiFP+0auNhcxaCLsb89WRuPmfp9Iaeb7JBTPu7+iB4EZDXIJtimnM/soZIOU22nO FhM1 --000000000000d946fa05c55c5b21--