Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp2821066rdb; Fri, 8 Dec 2023 23:58:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IGKr4ivEpC0n7eeFbnfn7L+LIipRsLPfott49I/cclt4cQEVmzgfpAFTKFM3ft9z2yf4lvd X-Received: by 2002:a05:6871:5b09:b0:1fb:75a:de75 with SMTP id op9-20020a0568715b0900b001fb075ade75mr1734347oac.99.1702108719904; Fri, 08 Dec 2023 23:58:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702108719; cv=none; d=google.com; s=arc-20160816; b=sxC7VEg4FX9a7Zumj1dKCOiOFLIew/VCEORLibBnghE05dIxU7Y1di9dOxUBmRbgkY uXs814jVBJdxdlxqRzmhOYsGRw8usmd1FZkGsoBYSzdVHYDMKZg3RZaQPJ/5Oc9MxVGW rSCMx6kUqEsQfVanSl4dZR0tXiLurdVyfNs3HUFUGRtn6CfdocBRzbDjuwxtkGUjPSsH dPPJGW2XQS0SfYUbwRk1fVt2Kqzs/3nckjdV0Wvj3OZarFpesYfO2wzcfh/WS4W3qFDj pBYJ1JNGeOF8+Cb16Fkx7vyRvlVEuKGbo78JJwNUzjoSTJcXO7b9v+Hdb4yoju5thF7T UEUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=6YNpEYHydAPTQGJBc6ZUo5zWhqwiXSbrcGd/Ik+gHmc=; fh=SbuWAQnqqCpQwZBw62J8OSzy2jKAmqUxArTloFui9wo=; b=p/MR2FNhGw+na7UPd9pM/30sBmgfUCXy67e24lZlbvKpCHldGEkupkmYClwX5aDBTs DQLB9d/bZJ7JAcoqInRpEr4JQLsb5Pz5nymEtRegMtPAhkXJczaUFXVL593E7yvTl3bX ORKrEv4m68TC5kdGOQDIPue8ws0HLHmBZOBgciirERByM+3DTrB2GbAAvR/+q/MAp7n7 X4CEKl+javKfPhF9Bz7XNOJAXNztbSbM9D794tEQXJWsJptIVtgNnIBcyDhbveo8AxIq 9fgjYekpsUIluti1DO6qcDwcLdfN6Do3M+9MgJOt3FvD15uyx5CaTw+cq/aLDdlsG3L0 QSaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="VyX6nd/v"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id bw32-20020a056a0204a000b005c663eae37fsi2822624pgb.295.2023.12.08.23.58.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Dec 2023 23:58:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="VyX6nd/v"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 40ECA826651C; Fri, 8 Dec 2023 23:58:36 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229769AbjLIH6L (ORCPT + 99 others); Sat, 9 Dec 2023 02:58:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37396 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234535AbjLIH6B (ORCPT ); Sat, 9 Dec 2023 02:58:01 -0500 Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F2C510E0 for ; Fri, 8 Dec 2023 23:58:06 -0800 (PST) Received: by mail-lf1-x12c.google.com with SMTP id 2adb3069b0e04-50beed2a46eso2064e87.0 for ; Fri, 08 Dec 2023 23:58:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1702108685; x=1702713485; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6YNpEYHydAPTQGJBc6ZUo5zWhqwiXSbrcGd/Ik+gHmc=; b=VyX6nd/vvktuiAkycjX7+m3KcrAYG8YLPWLxXMSGlKrroCWmpD1ax//SI+IVNUGFFI +I0tMh9PPZFM1HEMmoiU0ODH1B19tOszpvS070usx9G4tlnvctswOCjOXsOin89/KE77 79FKSMO7eSstg5Y8d6uH2OtqK61lBodYHwE4Z+5xzMTA2ugr32m8j4zWc2DCLqPN7Rr2 V/kv4hgbOc0IsLQizEiKFWGyiQxAi9zNwvJpzAQY1AaQC6vDlTfqv10UZS+6vTNpJnzp /lbpzZVOqKsfQXweTFZIC/iqmCODnvTR6SQt3JNNV+QJTsM7pQo1giHWrhIMGEOPkfoN qDlw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702108685; x=1702713485; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6YNpEYHydAPTQGJBc6ZUo5zWhqwiXSbrcGd/Ik+gHmc=; b=rQyML3/e6TS+DdoPyqRn+sGPvRSLOSOUsPaUJ7QHrUGZn1IzUv0JFZKexjYY/gOQyz 352H6oPFcbtraamXpOhDJkOmSIldWVsTeIdeWBtVlz0TdW/gHpu1AeFAOsBLwS33cbNm HAnSIgsCGGz6G11Pe/4zjZ4u3HGiLeO/FGZUuFUeElCfRREd+Vv8VMS+Mc8z1oxsC0yz XDgkPREOIw7Za05znNSscRkryIi4FOMtArkIEnZAiDzeANOLo0/MiTLnOzPeR3avKo0B a67uehtOWIBAlUGj7kPHUEVszc10yiscf8B3U0C4CiaonR+i/VLiX6nD5QyXE+OQfr9F o4Ew== X-Gm-Message-State: AOJu0YzuRyKM2s7vsKkShRM7Jc8aGtM2shBXlcCb7Wn+71grB/sBuNhe BX0TNnyaOwWW0msEsqMCLlyF91rew4LoNlimTt4NBg== X-Received: by 2002:a19:655e:0:b0:50b:fa6c:3e11 with SMTP id c30-20020a19655e000000b0050bfa6c3e11mr80979lfj.6.1702108684751; Fri, 08 Dec 2023 23:58:04 -0800 (PST) MIME-Version: 1.0 References: <20231204221932.1465004-1-rmoar@google.com> <20231204221932.1465004-5-rmoar@google.com> In-Reply-To: <20231204221932.1465004-5-rmoar@google.com> From: David Gow Date: Sat, 9 Dec 2023 15:57:53 +0800 Message-ID: Subject: Re: [PATCH v3 5/6] kunit: add ability to run tests after boot using debugfs To: Rae Moar Cc: shuah@kernel.org, dlatypov@google.com, brendan.higgins@linux.dev, sadiyakazi@google.com, keescook@chromium.org, arnd@arndb.de, linux-kselftest@vger.kernel.org, linux-arch@vger.kernel.org, kunit-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="0000000000008c28b2060c0f0f01" X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 08 Dec 2023 23:58:36 -0800 (PST) --0000000000008c28b2060c0f0f01 Content-Type: text/plain; charset="UTF-8" On Tue, 5 Dec 2023 at 06:19, Rae Moar wrote: > > Add functionality to run built-in tests after boot by writing to a > debugfs file. > > Add a new debugfs file labeled "run" for each test suite to use for > this purpose. > > As an example, write to the file using the following: > > echo "any string" > /sys/kernel/debugfs/kunit//run > > This will trigger the test suite to run and will print results to the > kernel log. > > To guard against running tests concurrently with this feature, add a > mutex lock around running kunit. This supports the current practice of > not allowing tests to be run concurrently on the same kernel. > > This new functionality could be used to design a parameter > injection feature in the future. > > Signed-off-by: Rae Moar > --- This looks good to me. A future feature which may be useful would be to support other kunit actions here (like list, list_attr), but that's probably worth leaving as a follow-up. Reviewed-by: David Gow Cheers, -- David > > Changes since v2: > - Move resetting the log to test.c > - Add is_init attribute and patches to change linker sections to avoid > re-running tests that use init data and functions > > lib/kunit/debugfs.c | 68 +++++++++++++++++++++++++++++++++++++++++++++ > lib/kunit/test.c | 10 +++++++ > 2 files changed, 78 insertions(+) > > diff --git a/lib/kunit/debugfs.c b/lib/kunit/debugfs.c > index 270d185737e6..2e0a92a0c461 100644 > --- a/lib/kunit/debugfs.c > +++ b/lib/kunit/debugfs.c > @@ -8,12 +8,14 @@ > #include > > #include > +#include > > #include "string-stream.h" > #include "debugfs.h" > > #define KUNIT_DEBUGFS_ROOT "kunit" > #define KUNIT_DEBUGFS_RESULTS "results" > +#define KUNIT_DEBUGFS_RUN "run" > > /* > * Create a debugfs representation of test suites: > @@ -21,6 +23,8 @@ > * Path Semantics > * /sys/kernel/debug/kunit//results Show results of last run for > * testsuite > + * /sys/kernel/debug/kunit//run Write to this file to trigger > + * testsuite to run > * > */ > > @@ -99,6 +103,51 @@ static int debugfs_results_open(struct inode *inode, struct file *file) > return single_open(file, debugfs_print_results, suite); > } > > +/* > + * Print a usage message to the debugfs "run" file > + * (/sys/kernel/debug/kunit//run) if opened. > + */ > +static int debugfs_print_run(struct seq_file *seq, void *v) > +{ > + struct kunit_suite *suite = (struct kunit_suite *)seq->private; > + > + seq_puts(seq, "Write to this file to trigger the test suite to run.\n"); > + seq_printf(seq, "usage: echo \"any string\" > /sys/kernel/debugfs/kunit/%s/run\n", > + suite->name); > + return 0; > +} > + > +/* > + * The debugfs "run" file (/sys/kernel/debug/kunit//run) > + * contains no information. Write to the file to trigger the test suite > + * to run. > + */ > +static int debugfs_run_open(struct inode *inode, struct file *file) > +{ > + struct kunit_suite *suite; > + > + suite = (struct kunit_suite *)inode->i_private; > + > + return single_open(file, debugfs_print_run, suite); > +} > + > +/* > + * Trigger a test suite to run by writing to the suite's "run" debugfs > + * file found at: /sys/kernel/debug/kunit//run > + * > + * Note: what is written to this file will not be saved. > + */ > +static ssize_t debugfs_run(struct file *file, > + const char __user *buf, size_t count, loff_t *ppos) > +{ > + struct inode *f_inode = file->f_inode; > + struct kunit_suite *suite = (struct kunit_suite *) f_inode->i_private; > + > + __kunit_test_suites_init(&suite, 1); > + > + return count; > +} > + > static const struct file_operations debugfs_results_fops = { > .open = debugfs_results_open, > .read = seq_read, > @@ -106,10 +155,22 @@ static const struct file_operations debugfs_results_fops = { > .release = debugfs_release, > }; > > +static const struct file_operations debugfs_run_fops = { > + .open = debugfs_run_open, > + .read = seq_read, > + .write = debugfs_run, > + .llseek = seq_lseek, > + .release = debugfs_release, > +}; > + > void kunit_debugfs_create_suite(struct kunit_suite *suite) > { > struct kunit_case *test_case; > > + /* If suite log already allocated, do not create new debugfs files. */ > + if (suite->log) > + return; > + > /* Allocate logs before creating debugfs representation. */ > suite->log = alloc_string_stream(GFP_KERNEL); > string_stream_set_append_newlines(suite->log, true); > @@ -124,6 +185,13 @@ void kunit_debugfs_create_suite(struct kunit_suite *suite) > debugfs_create_file(KUNIT_DEBUGFS_RESULTS, S_IFREG | 0444, > suite->debugfs, > suite, &debugfs_results_fops); > + > + /* Do not create file to re-run test if test runs on init */ > + if (!suite->attr.is_init) { > + debugfs_create_file(KUNIT_DEBUGFS_RUN, S_IFREG | 0644, > + suite->debugfs, > + suite, &debugfs_run_fops); > + } > } > > void kunit_debugfs_destroy_suite(struct kunit_suite *suite) > diff --git a/lib/kunit/test.c b/lib/kunit/test.c > index 8bae6e2bc6a0..58e46bb3b4c4 100644 > --- a/lib/kunit/test.c > +++ b/lib/kunit/test.c > @@ -13,6 +13,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -22,6 +23,8 @@ > #include "string-stream.h" > #include "try-catch-impl.h" > > +static DEFINE_MUTEX(kunit_run_lock); > + > /* > * Hook to fail the current test and print an error message to the log. > */ > @@ -654,6 +657,7 @@ static void kunit_init_suite(struct kunit_suite *suite) > kunit_debugfs_create_suite(suite); > suite->status_comment[0] = '\0'; > suite->suite_init_err = 0; > + string_stream_clear(suite->log); > } > > bool kunit_enabled(void) > @@ -670,6 +674,11 @@ int __kunit_test_suites_init(struct kunit_suite * const * const suites, int num_ > return 0; > } > > + /* Use mutex lock to guard against running tests concurrently. */ > + if (mutex_lock_interruptible(&kunit_run_lock)) { > + pr_err("kunit: test interrupted\n"); > + return -EINTR; > + } > static_branch_inc(&kunit_running); > > for (i = 0; i < num_suites; i++) { > @@ -678,6 +687,7 @@ int __kunit_test_suites_init(struct kunit_suite * const * const suites, int num_ > } > > static_branch_dec(&kunit_running); > + mutex_unlock(&kunit_run_lock); > return 0; > } > EXPORT_SYMBOL_GPL(__kunit_test_suites_init); > -- > 2.43.0.rc2.451.g8631bc7472-goog > --0000000000008c28b2060c0f0f01 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIPnwYJKoZIhvcNAQcCoIIPkDCCD4wCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg ggz5MIIEtjCCA56gAwIBAgIQeAMYYHb81ngUVR0WyMTzqzANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA3MjgwMDAwMDBaFw0yOTAzMTgwMDAwMDBaMFQxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFz IFIzIFNNSU1FIENBIDIwMjAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvLe9xPU9W dpiHLAvX7kFnaFZPuJLey7LYaMO8P/xSngB9IN73mVc7YiLov12Fekdtn5kL8PjmDBEvTYmWsuQS 6VBo3vdlqqXZ0M9eMkjcKqijrmDRleudEoPDzTumwQ18VB/3I+vbN039HIaRQ5x+NHGiPHVfk6Rx c6KAbYceyeqqfuJEcq23vhTdium/Bf5hHqYUhuJwnBQ+dAUcFndUKMJrth6lHeoifkbw2bv81zxJ I9cvIy516+oUekqiSFGfzAqByv41OrgLV4fLGCDH3yRh1tj7EtV3l2TngqtrDLUs5R+sWIItPa/4 AJXB1Q3nGNl2tNjVpcSn0uJ7aFPbAgMBAAGjggGKMIIBhjAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHzM CmjXouseLHIb0c1dlW+N+/JjMB8GA1UdIwQYMBaAFI/wS3+oLkUkrk1Q+mOai97i3Ru8MHsGCCsG AQUFBwEBBG8wbTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AyLmdsb2JhbHNpZ24uY29tL3Jvb3Ry MzA7BggrBgEFBQcwAoYvaHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvcm9vdC1y My5jcnQwNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9yb290LXIz LmNybDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBKDA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5n bG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzANBgkqhkiG9w0BAQsFAAOCAQEANyYcO+9JZYyqQt41 TMwvFWAw3vLoLOQIfIn48/yea/ekOcParTb0mbhsvVSZ6sGn+txYAZb33wIb1f4wK4xQ7+RUYBfI TuTPL7olF9hDpojC2F6Eu8nuEf1XD9qNI8zFd4kfjg4rb+AME0L81WaCL/WhP2kDCnRU4jm6TryB CHhZqtxkIvXGPGHjwJJazJBnX5NayIce4fGuUEJ7HkuCthVZ3Rws0UyHSAXesT/0tXATND4mNr1X El6adiSQy619ybVERnRi5aDe1PTwE+qNiotEEaeujz1a/+yYaaTY+k+qJcVxi7tbyQ0hi0UB3myM A/z2HmGEwO8hx7hDjKmKbDCCA18wggJHoAMCAQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUA MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWdu MRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEg MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzAR BgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4 Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0EXyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuu l9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+JJ5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJ pij2aTv2y8gokeWdimFXN6x0FNx04Druci8unPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh 6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTvriBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti +w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5NUPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEA S0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigHM8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9u bG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmUY/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaM ld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88 q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcya5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/f hO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/XzCCBNgwggPAoAMCAQICEAHOBX7j6YmdTMbtcPLp 3a4wDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt c2ExKjAoBgNVBAMTIUdsb2JhbFNpZ24gQXRsYXMgUjMgU01JTUUgQ0EgMjAyMDAeFw0yMzA4MTUw MjQyNDNaFw0yNDAyMTEwMjQyNDNaMCQxIjAgBgkqhkiG9w0BCQEWE2RhdmlkZ293QGdvb2dsZS5j b20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCnYKS3ueVXUlVatkXVQgk8pbgZH4/s KBKSGW9Z8e4hylAI35vqFf5f5D4U5KhUYUyG0+AYhurwEiUyZUhGcLqRNmSroohx9nbZjXDXjkVV LXBAr7xaCU3DDQcA1SaxmALxBC7u4zlcVHfUKope2JNJ2xn5kU0Z/kr01tZuJD5/jn+2hp68jdym tbFd3zzOJmtG6hb4ULJNXSi1qkjtZp6SyDLEsliQGRuI5AIha7GQPeSNsFmIpi+V5UxhrznuAv0y Uxd27MtO+/mgSMpLmUb4vuSjy2zuftatzVYvFG00pfHldrnJ1od+kW8lAl6gyahVgMp+j3GAlO2M oGCkihK9AgMBAAGjggHUMIIB0DAeBgNVHREEFzAVgRNkYXZpZGdvd0Bnb29nbGUuY29tMA4GA1Ud DwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDBAYIKwYBBQUHAwIwHQYDVR0OBBYEFJO3Y8Jq ddIn9n5Jt6Z1o79zxraLMEwGA1UdIARFMEMwQQYJKwYBBAGgMgEoMDQwMgYIKwYBBQUHAgEWJmh0 dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29tL3JlcG9zaXRvcnkvMAwGA1UdEwEB/wQCMAAwgZoGCCsG AQUFBwEBBIGNMIGKMD4GCCsGAQUFBzABhjJodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9jYS9n c2F0bGFzcjNzbWltZWNhMjAyMDBIBggrBgEFBQcwAoY8aHR0cDovL3NlY3VyZS5nbG9iYWxzaWdu LmNvbS9jYWNlcnQvZ3NhdGxhc3Izc21pbWVjYTIwMjAuY3J0MB8GA1UdIwQYMBaAFHzMCmjXouse LHIb0c1dlW+N+/JjMEYGA1UdHwQ/MD0wO6A5oDeGNWh0dHA6Ly9jcmwuZ2xvYmFsc2lnbi5jb20v Y2EvZ3NhdGxhc3Izc21pbWVjYTIwMjAuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQBtHFwIgQZjer5K H+4Q+wns10k7qN+4wN2Uf+JsyOYjukaMEgdLErfA1wwtQ9uHkoYQZcWBuVVkQFa5hI+sqI2m1Weq riMCFSiU38s1tADdMX12IMfJRN60Nznhrw+nPyDRZqRhUTW24TwnHorkDnFPW8PHo7fAw4FrpI0n impZAng7ccvvK09K3ZuhwTIxJMsPXCZYsrXWORTw5sczRAP6XvKbPBJnsJoSTe5dFBPBHOQJOGhU qWfEfWnWMJPF3LxSGLpLFQXO3RwQqmxv08avwXfVPouh1xuB3FX7rpDabT8YDhu9JgIZkLEKko7L yQt6zWwng7k8YF/jGbiAta6VMYICajCCAmYCAQEwaDBUMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQ R2xvYmFsU2lnbiBudi1zYTEqMCgGA1UEAxMhR2xvYmFsU2lnbiBBdGxhcyBSMyBTTUlNRSBDQSAy MDIwAhABzgV+4+mJnUzG7XDy6d2uMA0GCWCGSAFlAwQCAQUAoIHUMC8GCSqGSIb3DQEJBDEiBCBk WDNVUGsXoZ+hLI/x0VfoCPGJtGH96mvaz6zGMdFJXzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcB MBwGCSqGSIb3DQEJBTEPFw0yMzEyMDkwNzU4MDVaMGkGCSqGSIb3DQEJDzFcMFowCwYJYIZIAWUD BAEqMAsGCWCGSAFlAwQBFjALBglghkgBZQMEAQIwCgYIKoZIhvcNAwcwCwYJKoZIhvcNAQEKMAsG CSqGSIb3DQEBBzALBglghkgBZQMEAgEwDQYJKoZIhvcNAQEBBQAEggEAZv/VqNQctnrTo7jJJZTy SNeWI8zj1JW3PRsu+W5QEriKsqnVXbH0IhFzivQRsmDZX+I1uEkzew9NnnYYlnMlcMNyv+ivyCzq +MlxF9QQJZST9RobmGRC9oSnPqrheAP8ONC0amyK/cNajA4eD0fYFRCP5BaXX1U9hZ/XDmcl7Dti 9VVidPFiDEawqaQB7y6umpZ0ZR22SmhY3NUdmXTgS6UUS9pmkdEXgKsfI1OFzGuzKHyRkMSRub/y 6/lu4oTlvAeR+0dm7li/9ck0+omotMFCPYkhPnZ6sRo/fSWNjoNEKt32L3kQMe3ZE8uscDy5C1Ig rRVBk2+vzvKbW+FAEg== --0000000000008c28b2060c0f0f01--