Received: by 2002:a05:6358:701b:b0:131:369:b2a3 with SMTP id 27csp547593rwo; Fri, 21 Jul 2023 16:58:02 -0700 (PDT) X-Google-Smtp-Source: APBJJlG0Q/1m5jnnO/UBv3woQK0mX9OjrA73xRt6l6UpdqSuznJu4OpaCgvJg7qk/iFEHgDQg4DA X-Received: by 2002:a17:906:5192:b0:993:f349:c98e with SMTP id y18-20020a170906519200b00993f349c98emr2827296ejk.2.1689983882253; Fri, 21 Jul 2023 16:58:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689983882; cv=none; d=google.com; s=arc-20160816; b=YHh/jLk0uKamtdxTAWh5rnUUFn7/FexyuNSrhN+hN2WXJN7wgtgfN+RCP4N9OZbSDF 3Y5lUBGbQz5aKRttIr5vCwNFWJgZkNf6WKm07fi5XY0kibrTNHDB/A4HL7Em0IfA2BD6 EjzVaRJsdczrw1dTyn9RxAoJbF8fSrGkKdlIn1l1BE/w04pbE5UEs0OBlnEZt9QLfw8h 0eyhGLVKwGxcb7RN6XFjIM4Xuzqe5+hjZDH42uq/L1IFGbj2oKX8N4F7a5/fcgBvGidP i5oK79hrHBe5FNRQedD0M2223KLqxBxQgF1U4eNu7P5Zkvi6jP6ncsnTEu3BKQVBgZqG LNqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=+KxJ98t1HUPuvIZ1oHSAO5rSMVLjVv6wmtHkxWN/PEI=; fh=YNTvJ/66+PUlgWAhHnDZyvhoDNHSLA55/HdCDdJwrro=; b=rjwwbvXrH+JxzP1akiEQwpgIAy/KIgE068EdP3iKE5jOYWFD3qom6Da4AI0v+mbdw+ ajRcWUdoN6UwwoGm7PrX1EbzvhKeWkaO9zW9iJcOl2AxwhCUqHpmP9Rdgt/5ifrRwUZV QzRv0ym1gl8cOeWx4pNG03eJ07sMdFK56FO2LiIrfCArTljRWP6IUAb1JJivhNA8ybd9 V/43I3EITqpjNHZ3L8HKOEwe34zIWUj/0LaDIXpA55bF2RK9Xw3m+a0Ryib0GO2+p5Uz 980T1LUJy63Y2bqnZE9LDjVQPQqS6TjBPEEI7GNxX6M1QRB8b7J/Sq2FLW7qgjjoAemZ f80w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=AWfHxzIA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x21-20020a1709065ad500b0098ce5bd2ed0si2896499ejs.257.2023.07.21.16.57.15; Fri, 21 Jul 2023 16:58:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=AWfHxzIA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230038AbjGUWkS (ORCPT + 99 others); Fri, 21 Jul 2023 18:40:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229683AbjGUWkQ (ORCPT ); Fri, 21 Jul 2023 18:40:16 -0400 Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E67235B3 for ; Fri, 21 Jul 2023 15:40:14 -0700 (PDT) Received: by mail-qt1-x82a.google.com with SMTP id d75a77b69052e-40540a8a3bbso53541cf.1 for ; Fri, 21 Jul 2023 15:40:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1689979213; x=1690584013; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=+KxJ98t1HUPuvIZ1oHSAO5rSMVLjVv6wmtHkxWN/PEI=; b=AWfHxzIAqYwFR3augj7FBBNaOve04BS5GWA6227rcLPQfeEhFJHhTfs8y4DlGmZf5e wyktloNI72vXTksUqqUMc0VCMHzjg3AULH0LwkI8jVFfmD1weXMR+jLs/Q6mzdXJzmGn NEJbuK27NuogxBApctFQRhi10I2GfIV2icrP9HM8EwIlxUq5amrpnLSMbIXbP+JNa/jo DzzCaHQY8dRH4hsXtu4yMz7BZjCUhQwxvgnMUEHdsZDTRAUk+z5k2ORk5gtZlKis+aX0 G1qb+ipTCOul+J6t91DiE1K8obg1iwuwlvrm4/Fg+EAb7EZuKum2hDCJZh1I88RsdX0a SRbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1689979213; x=1690584013; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=+KxJ98t1HUPuvIZ1oHSAO5rSMVLjVv6wmtHkxWN/PEI=; b=jn3jA1WQvoQCDkqSwuHn9Q2WvhfXPbcBWM0Y6G2W8KObbjXRMaDWsXuC8YWZs9DwU8 xZ++bp03eAzj1/itUSO5IyGKujU5TA08ljnwDaUrKA/byxxNb27466ZQ0NdykNFnDk6j /itsgIyYgJBbdfwE9VCFtMlz4eMhpty8r3TJsl9UPJsfUt0npvWMu6osb95aw1lciNkX KkpvCg9DFGrm9GIWNlELnN4CF1KPvOFKbRtLGw1uPghJL5hlHSeiWnp0tq52RKSQ03Yg 9HXwcmcVF6sAyhWiQVGDc7VDPBrLPSENcCXf02fahB/xnlqmVH8TdBz1Z509MB+w5LAZ +E2A== X-Gm-Message-State: ABy/qLYJ9I3Ffsi3LRhatwq4cQgbeXD1HjkIvTOwmwBmsbXMl5vwIY0E VCtoz6ihtIQP389cgxhctg8afWedpN3wOAnK/LlIRA== X-Received: by 2002:a05:622a:48:b0:403:b1e5:bcae with SMTP id y8-20020a05622a004800b00403b1e5bcaemr99407qtw.10.1689979213360; Fri, 21 Jul 2023 15:40:13 -0700 (PDT) MIME-Version: 1.0 References: <000000000000c0ffe505fe86c9ca@google.com> <69cddb70-771c-4ded-a14e-b46ce6413eb4@rowland.harvard.edu> In-Reply-To: <69cddb70-771c-4ded-a14e-b46ce6413eb4@rowland.harvard.edu> From: Khazhy Kumykov Date: Fri, 21 Jul 2023 15:40:01 -0700 Message-ID: Subject: Re: [syzbot] [usb?] KASAN: slab-out-of-bounds Read in read_descriptors (3) To: Alan Stern Cc: syzbot , gregkh@linuxfoundation.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="000000000000b90d4c060106f2ad" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --000000000000b90d4c060106f2ad Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Fri, Jul 21, 2023 at 11:56=E2=80=AFAM Alan Stern wrote: > > On Fri, Jul 21, 2023 at 11:23:10AM -0700, Khazhy Kumykov wrote: > > On Fri, Jul 21, 2023 at 11:10=E2=80=AFAM Khazhy Kumykov wrote: > > > > > > On Mon, Jun 19, 2023 at 7:56=E2=80=AFPM syzbot > > > wrote: > > > > > > > > Hello, > > > > > > > > syzbot found the following issue on: > > > > > > > > HEAD commit: 40f71e7cd3c6 Merge tag 'net-6.4-rc7' of git://git.k= ernel.o.. > > > > git tree: upstream > > > > console+strace: https://syzkaller.appspot.com/x/log.txt?x=3D1581445= b280000 > > > > kernel config: https://syzkaller.appspot.com/x/.config?x=3Dac24611= 1fb601aec > > > > dashboard link: https://syzkaller.appspot.com/bug?extid=3D18996170f= 8096c6174d0 > > > > compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU = Binutils for Debian) 2.35.2 > > > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=3D15d23= 487280000 > > > > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D16613ed= 3280000 > > > > > > > > Downloadable assets: > > > > disk image: https://storage.googleapis.com/syzbot-assets/30922ad38c= 58/disk-40f71e7c.raw.xz > > > > vmlinux: https://storage.googleapis.com/syzbot-assets/3bd12e7503b8/= vmlinux-40f71e7c.xz > > > > kernel image: https://storage.googleapis.com/syzbot-assets/1dcd340b= 18d4/bzImage-40f71e7c.xz > > > > > > > > IMPORTANT: if you fix the issue, please add the following tag to th= e commit: > > > > Reported-by: syzbot+18996170f8096c6174d0@syzkaller.appspotmail.com > > > > > > > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > > > BUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 driv= ers/usb/core/sysfs.c:883 > > > > Read of size 8 at addr ffff88801e78b8c8 by task udevd/5011 > > > > > > > > CPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-= g40f71e7cd3c6 #0 > > > > Hardware name: Google Google Compute Engine/Google Compute Engine, = BIOS Google 05/27/2023 > > > > Call Trace: > > > > > > > > __dump_stack lib/dump_stack.c:88 [inline] > > > > dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 > > > > print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c= :351 > > > > print_report mm/kasan/report.c:462 [inline] > > > > kasan_report+0x11c/0x130 mm/kasan/report.c:572 > > > > > > "src =3D udev->rawdescriptors[cfgno]" (so, just reading rawdescriptor= s) > > > > > > > read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883 > > > > sysfs_kf_bin_read+0x19a/0x270 fs/sysfs/file.c:97 > > > > kernfs_file_read_iter fs/kernfs/file.c:251 [inline] > > > > kernfs_fop_read_iter+0x387/0x690 fs/kernfs/file.c:280 > > > > call_read_iter include/linux/fs.h:1862 [inline] > > > > new_sync_read fs/read_write.c:389 [inline] > > > > vfs_read+0x4b1/0x8a0 fs/read_write.c:470 > > > > ksys_read+0x12b/0x250 fs/read_write.c:613 > > > > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > > > > do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 > > > > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > > > RIP: 0033:0x7f07c7916b6a > > > > Code: 00 3d 00 00 41 00 75 0d 50 48 8d 3d 2d 08 0a 00 e8 ea 7d 01 0= 0 31 c0 e9 07 ff ff ff 64 8b 04 25 18 00 00 00 85 c0 75 1b 0f 05 <48> 3d 00= f0 ff ff 76 6c 48 8b 15 8f a2 0d 00 f7 d8 64 89 02 48 83 > > > > RSP: 002b:00007ffdf34973d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000= 000 > > > > RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f07c7916b6a > > > > RDX: 0000000000010011 RSI: 00007ffdf3497407 RDI: 0000000000000008 > > > > RBP: 0000000000000008 R08: 0000000000000003 R09: f4f13e10193fbafe > > > > R10: 0000000000000000 R11: 0000000000000246 R12: 000055be37470e10 > > > > R13: 00007ffdf34a7ae8 R14: 00007ffdf34a8138 R15: 00007ffdf3497407 > > > > > > > > > > > > Allocated by task 758: > > > > kasan_save_stack+0x22/0x40 mm/kasan/common.c:45 > > > > kasan_set_track+0x25/0x30 mm/kasan/common.c:52 > > > > ____kasan_kmalloc mm/kasan/common.c:374 [inline] > > > > ____kasan_kmalloc mm/kasan/common.c:333 [inline] > > > > __kasan_kmalloc+0xa2/0xb0 mm/kasan/common.c:383 > > > > kasan_kmalloc include/linux/kasan.h:196 [inline] > > > > __do_kmalloc_node mm/slab_common.c:966 [inline] > > > > __kmalloc+0x5e/0x190 mm/slab_common.c:979 > > > > kmalloc include/linux/slab.h:563 [inline] > > > > kzalloc include/linux/slab.h:680 [inline] > > > > > > kzmalloc(length) -> this length derived from dev->descriptor.bNumConf= igurations > > > > > > The corresponding kfree is in usb_destroy_configuration (makes sense) > > > - we also set rawdescriptors to NULL here. If this race was happening= , > > > I'd also expect some sort of null deref report... > > > > > > Stumbled upon https://lore.kernel.org/all/1599201467-11000-1-git-send= -email-prime.zeng@hisilicon.com/T/, > > > which suggests that we can, instead, race with a descriptor change, > > > which sounds plausible - descriptor changes, bNumConfigurations no > > > longer lines up with our kmalloc... so we may run past the end of it. > > Ah yeah, the syzbot C repro does something like this, it has a virtual > > usb and keeps changing the descs -> which may end up calling > > hub_port_connect_change() > > Yes, that sounds right. > > The problem-causing commit is 45bf39f8df7f ("USB: core: Don't hold > device lock while reading the "descriptors" sysfs file"). When writing > the commit message I only considered changes to the rawdescriptors; it > didn't occur to me that the device descriptor might also change, which > would be just as dangerous. > > > > Looking at hub_port_connect_change(), we seem to read directly into > > > udev->descriptor, check if it changed, and if it did, set > > > udev->descriptor back to the old one...? If we have an ongoing sysfs > > > read, which directly touches udev->descriptor, there might be > > > trouble... > > > > > > I see this is called in both hub_port_connect_change() and > > > usb_reset_and_verify_device()... which both seem to lock the port_dev= ? > > > ("port_dev->status_lock"). This looks like a different lock than > > > usb_lock_device_interruptible would grab, maybe the code has changed > > > since that was reported in 2020. But it seems to suggest we want to > > > grab this lock in sysfs to safely read from udev->descriptor. > > > > > > (I'm not clear on when the sysfs gets added/removed, since it happens > > > in usb_bus_notify()..., the above two functions that touch > > > udev->descriptor don't look like they send the > > > BUS_NOTIFY_ADD/DEL_DEVICE to me, so the race seems plausible) > > > > Ah yeah - in hub_port_connect_change() we call hub_port_connect() if > > the descriptor changed, which notifies us of device remove *after* we > > already directly messed with udev->descriptor for a potentially live > > device. > > > > I do see there's several sysfs files that directly read > > udev->descriptor with no locking - should these all need to grab the > > port_dev->status_lock? > > I suppose some of them should. (For others, the caller will already > hold the device lock.) > > On the other hand, it would almost certainly be simpler if > hub_port_connect_change() and the other places calling > usb_get_device_descriptor() would read into a temporary buffer instead > of directly into udev->descriptor. Do you think the problem could be > solved this way? It would be cleaner in the end. Simpler... It'll probably be cleaner in the end, but we're snapshotting and resetting udev->descriptor several call frames above where we're calling usb_get_device_descriptor in the case of usb_reset_and_verify_device().. For hub_port_connect_change() it should be straightforward - use the on-stack descriptor as the buf for usb_get_descriptor(), and bail out like we do already. For usb_reset_and_verify_device... we're calling hub_port_init, which is directly modifying a bunch of the usb struct, fetches the descriptor, validates it, and we rely on the return here to decide whether or not to simulate a disconnect... I'd personally lean to reverting 45bf39f8df7f, but I'm not that familiar with the code here. :) > > Alan Stern --000000000000b90d4c060106f2ad Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIPmwYJKoZIhvcNAQcCoIIPjDCCD4gCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg ggz1MIIEtjCCA56gAwIBAgIQeAMYYHb81ngUVR0WyMTzqzANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA3MjgwMDAwMDBaFw0yOTAzMTgwMDAwMDBaMFQxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFz IFIzIFNNSU1FIENBIDIwMjAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvLe9xPU9W dpiHLAvX7kFnaFZPuJLey7LYaMO8P/xSngB9IN73mVc7YiLov12Fekdtn5kL8PjmDBEvTYmWsuQS 6VBo3vdlqqXZ0M9eMkjcKqijrmDRleudEoPDzTumwQ18VB/3I+vbN039HIaRQ5x+NHGiPHVfk6Rx c6KAbYceyeqqfuJEcq23vhTdium/Bf5hHqYUhuJwnBQ+dAUcFndUKMJrth6lHeoifkbw2bv81zxJ I9cvIy516+oUekqiSFGfzAqByv41OrgLV4fLGCDH3yRh1tj7EtV3l2TngqtrDLUs5R+sWIItPa/4 AJXB1Q3nGNl2tNjVpcSn0uJ7aFPbAgMBAAGjggGKMIIBhjAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHzM CmjXouseLHIb0c1dlW+N+/JjMB8GA1UdIwQYMBaAFI/wS3+oLkUkrk1Q+mOai97i3Ru8MHsGCCsG AQUFBwEBBG8wbTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AyLmdsb2JhbHNpZ24uY29tL3Jvb3Ry MzA7BggrBgEFBQcwAoYvaHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvcm9vdC1y My5jcnQwNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9yb290LXIz LmNybDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBKDA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5n bG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzANBgkqhkiG9w0BAQsFAAOCAQEANyYcO+9JZYyqQt41 TMwvFWAw3vLoLOQIfIn48/yea/ekOcParTb0mbhsvVSZ6sGn+txYAZb33wIb1f4wK4xQ7+RUYBfI TuTPL7olF9hDpojC2F6Eu8nuEf1XD9qNI8zFd4kfjg4rb+AME0L81WaCL/WhP2kDCnRU4jm6TryB CHhZqtxkIvXGPGHjwJJazJBnX5NayIce4fGuUEJ7HkuCthVZ3Rws0UyHSAXesT/0tXATND4mNr1X El6adiSQy619ybVERnRi5aDe1PTwE+qNiotEEaeujz1a/+yYaaTY+k+qJcVxi7tbyQ0hi0UB3myM A/z2HmGEwO8hx7hDjKmKbDCCA18wggJHoAMCAQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUA MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWdu MRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEg MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzAR BgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4 Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0EXyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuu l9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+JJ5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJ pij2aTv2y8gokeWdimFXN6x0FNx04Druci8unPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh 6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTvriBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti +w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5NUPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEA S0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigHM8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9u bG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmUY/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaM ld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88 q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcya5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/f hO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/XzCCBNQwggO8oAMCAQICEAGy8e6bI55p/yISlXXG SrAwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt c2ExKjAoBgNVBAMTIUdsb2JhbFNpZ24gQXRsYXMgUjMgU01JTUUgQ0EgMjAyMDAeFw0yMzA3MTYw NzQ1MTRaFw0yNDAxMTIwNzQ1MTRaMCIxIDAeBgkqhkiG9w0BCQEWEWtoYXpoeUBnb29nbGUuY29t MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA84UGa4X1/brS7/2vQRLnjHc/oa9+4lri stpvdNGyJgDZNvJouUxTihNXyW4exVS4rkaD+DjMOTcoxFy+KEAzrIzotas1NbZt4P7DTJ9Dp6/1 20YUAt9rnWmZNHmuzZNGlRYhzAAOaDkGhKFnULS1bItsuRmuPA1st6vd7GiVA00TiflQ7IYni7ZN fd1TDheOc7OGHW6PcHPW0P0HGTzzvTpgTKQi4ojKre0fW/Yb0lZEVpBiadSj9MeDn5/f0yUpeFYD fll7rnq2bPGOfS3JjwLalgVSl5Ho6txXv9vlJVYxgnAoNZsZJ2EHvsT7eUQYNHg5an0nClXZYIF7 p2YQGQIDAQABo4IB0jCCAc4wHAYDVR0RBBUwE4ERa2hhemh5QGdvb2dsZS5jb20wDgYDVR0PAQH/ BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMEBggrBgEFBQcDAjAdBgNVHQ4EFgQUKmFDbOAVaL0O 2d1HymA53tUP1hUwTAYDVR0gBEUwQzBBBgkrBgEEAaAyASgwNDAyBggrBgEFBQcCARYmaHR0cHM6 Ly93d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wDAYDVR0TAQH/BAIwADCBmgYIKwYBBQUH AQEEgY0wgYowPgYIKwYBBQUHMAGGMmh0dHA6Ly9vY3NwLmdsb2JhbHNpZ24uY29tL2NhL2dzYXRs YXNyM3NtaW1lY2EyMDIwMEgGCCsGAQUFBzAChjxodHRwOi8vc2VjdXJlLmdsb2JhbHNpZ24uY29t L2NhY2VydC9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcnQwHwYDVR0jBBgwFoAUfMwKaNei6x4schvR zV2Vb4378mMwRgYDVR0fBD8wPTA7oDmgN4Y1aHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9jYS9n c2F0bGFzcjNzbWltZWNhMjAyMC5jcmwwDQYJKoZIhvcNAQELBQADggEBADeZduKRV5+J7StRkfoY hBDfCkyRbFphFmeJ+0A1fPxECLLkrXR2izyctzMAGZH2ceScAlECO1r3aEQcyx9n7/YlMc24ZF0I ++9b72/wv6J6POICeIj6MgschmHIUz4Rw4H5IdBLo62N0jBBzv2T9ASRAl7Yryl6tHUN5X5228Tt 3LJe5Gtb1cm22DdXBM3xnD7Kd59ls9j/tz5I+yEsLIK7zQk7hBt87a31T55CTVgMQZ4lTavG5vdz vEb7YC0jFAT8SmYmtSOr+4aZJRIwVjXlI04Mfr3jcbqDnzfv0VgVp5UlzQK4aApofbSsSDeXsDR+ t30gEkeMNUvUqd6PaxYxggJqMIICZgIBATBoMFQxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i YWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFzIFIzIFNNSU1FIENBIDIwMjAC EAGy8e6bI55p/yISlXXGSrAwDQYJYIZIAWUDBAIBBQCggdQwLwYJKoZIhvcNAQkEMSIEIGT1lCt9 97XqjL+gf/VTkw/z/hp7nlD/v4+Mze9NTEK6MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJ KoZIhvcNAQkFMQ8XDTIzMDcyMTIyNDAxM1owaQYJKoZIhvcNAQkPMVwwWjALBglghkgBZQMEASow CwYJYIZIAWUDBAEWMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzALBgkqhkiG9w0BAQowCwYJKoZI hvcNAQEHMAsGCWCGSAFlAwQCATANBgkqhkiG9w0BAQEFAASCAQDt2C7pKitT49g5z6cu4oOH6qNz LoH5XTpSwMUWWSN6+GIiS5hOWuK1VKfTfIOiz21LNuMdrKwIBLbHtCBEDfIBG+e1NtrrgQ7I0i2x Q17auqcDeAQKyLuTNWy81wL1UEqg2X7E5kaG9H49TyaLAG1Exv68p2v5N8jXKt3EqOI3Rm70vWyw rYtACLGWUtDOzZ2BCiIkVKWbihDZyYpqOZUx5f24nAwF2TlqL3ZDMYO5rcxavmLwUIo5tqsMAUta nCCJ/KMts2jeNNxDIgb7Qd7u7qOeCQID8lfUm4FkEqwHuej+vZj7GB4zU9/icRALXax1Dd14dzF6 OfMCCCrToNZK --000000000000b90d4c060106f2ad--