Received: by 2002:ab2:3350:0:b0:1f4:6588:b3a7 with SMTP id o16csp1837740lqe; Tue, 9 Apr 2024 01:37:18 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVeHtXxmbE3Mn3PnHEkTqQwX//H4iNUQkZX4cDlKU5gpzwXFSyVkbndgBlscJQ17dFB+cguFdTUejtdlzBqjcge6QRyO1Krp0VzPcNQyQ== X-Google-Smtp-Source: AGHT+IGHzPOZyw/072+QGMem4ITOPvJfsZCr6cNWfjFOEQwe11/spDyUmk672H5juD8tXjBuUgTd X-Received: by 2002:a17:903:1104:b0:1e2:7916:6b7a with SMTP id n4-20020a170903110400b001e279166b7amr11062648plh.6.1712651838007; Tue, 09 Apr 2024 01:37:18 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712651837; cv=pass; d=google.com; s=arc-20160816; b=GQmATYKwZZyRRF8u8Th8GDnzOOAP5wBC8VKFNXCU1rg7FBglctv9k1Moln+ro5ii3g J0AjEBAvh+gbPt5UYsSFUpmEug6dQuaOvKYM3cBnioYLIOkOmGqFraKAGWdZT+YUkIyD UaoozLsoUlgF4hPQBjaRLOzuct4lT710DWrpka+L1WxX2DSLCXlfISaHqKj1u5yjnFdz bqlzOO2THpQClRx4MgT08QzVnnCROapNgEiWDJksIbKUKtY4OMlwQDujBj1huT5b+wxx Fvpg3fGH8/NK/ONSmnwwnoTHXVc/Y+zYkvu2Dma+a+vV+A1t3foOMxIzdnmdTA2EULaI Hl7w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :dkim-signature; bh=yGpmp1vlAaJ5rie0DjXiyv1WF0QHiXUG/gbcjy6VGdI=; fh=BnopQ9nJ06jN5qV7oAtfXUzp5hWDJU5kGCUzPaUh2Ow=; b=qweis0WICwjrTyrDjcJ1Dfj3M8tDywprefinyFOAeeSuX0iIszD+v/sKQLhO7FEy6U n7IMx47o6atUCzEbsH3V3mrZMJz4XbSWvV+LxJ8O+98Kv5Nz2/4dVzLwgxofO+w1iZtG zmx7VZuBysDcoGOjk14emfZJ5yxuCFhPxLNFQaWdgqC07Yy4BLSfBhno0fbbslt9SJ8N WAUT6PUdtVCBDm1iPrgoBUtfoeuXhyJv3K9JtM9yNpQQVamfRWFZtVcM1157oNf7ztYR v6MCyfHBXfDOb7GwcG9/5wfYkE3NvjEOTy9x3vusKB9JM6lMq8mDy/1Fd2NwEh0A4l6p rr8g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="KO1lN/MH"; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-136482-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-136482-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id m3-20020a170902c44300b001e2a0cfc3f1si7874493plm.495.2024.04.09.01.37.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Apr 2024 01:37:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-136482-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="KO1lN/MH"; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-136482-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-136482-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id A58392834E2 for ; Tue, 9 Apr 2024 08:37:17 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DDF3384D02; Tue, 9 Apr 2024 08:29:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="KO1lN/MH" Received: from mail-ed1-f53.google.com (mail-ed1-f53.google.com [209.85.208.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 502A08288F for ; Tue, 9 Apr 2024 08:29:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.208.53 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712651398; cv=none; b=pWA5FD0E7pMJR02VecaDFBFlPqTcpEQ8UX0kl8F3eB08fyO95vrgb+7ncuL6/iZmqAyeKs5eaMDqiHM3oQnaouxpZ+3K56aBcCNStjvCoHK48gM/hUlZ8/bVNW3wwy2FW3dYKRYIK2VWCmQtdz7Dk+M2FUYjrcPXGBjDE4LrewY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712651398; c=relaxed/simple; bh=W6zvKwrYSU4hWDGRcgSF7lgiQIacPlEu9FJOZVHFeIU=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=G+UMTpupjaw15a9vmxMD6tHijoJLx7Jp+lmxrZvEgGiqD++rojKDUZ51GQNUT0p82igJPJlrAB50EOvnKqVJpaoZXSeyb48kMhwNb0SmzlLZWThgf2M4GQobUghJZUK6hTVDmcoYi5l9nLpEFZMa6mBm9gHAd/hKyH76BQBDr+g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=KO1lN/MH; arc=none smtp.client-ip=209.85.208.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=google.com Received: by mail-ed1-f53.google.com with SMTP id 4fb4d7f45d1cf-56e5174ffc2so7150a12.1 for ; Tue, 09 Apr 2024 01:29:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1712651395; x=1713256195; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=yGpmp1vlAaJ5rie0DjXiyv1WF0QHiXUG/gbcjy6VGdI=; b=KO1lN/MHulx3wiJU/TkfpEkHwU4J9djPkqIuDo1owtVImBTkmEcgFtuenm/R3HTuZd p+wJFvhUkxp6nc8LB9fOJnMEluij4FcLGYjC2piHDcuaTLomA+7O4GENDw30u7efBaGQ ZXqUQWFC2SXovGseyxyWQJcCZ7wij3gXTev3acUgb4w8H5uLjXQVKV7TcT0cGnYj6Ea4 vjNKNzJD7W00DBLKzs+8gHaKhtE++DYahH/VP/W9dWhngWNZFFxugXEAwTlyTM0IZHvt w7c9iGDQISDI5p3UknhVBVT+iBlfKIEgHEUa5CiQDPqzL6MLXbqC+NaOgRT+8UBE5fZK 5xBQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712651395; x=1713256195; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=yGpmp1vlAaJ5rie0DjXiyv1WF0QHiXUG/gbcjy6VGdI=; b=HccvZ9HSxUxMZrpq0hMezA8PUGlyUR5N+6Kxk7KsXruWGWTdq1XNUZDgy1AWA8D1Lm 1uhMnxWNCDiRVw3EAKiBGiZUqQXLvnRmzKVzcNH/hJmtuKnDPoDQDizz6MN+MBo8l4fs 87g/6LGn2xmOrTDA6jz3lamROyBOHkzjW2YebUb9N6BDCY1OJqlf31IGz4DgNTlPlVl8 0Fme3EsgXXehZyMZcnK245lOEnNf8nifApK3sCOgTW2+scbq83ghns8jZq+EYRbqE4II tvDBtCI7VQT6bqYctbuYTPSdX1OW8ZaRl5KBcxT/fePlkxcBoE/gPzMNhjc5g3I0sFiE XncQ== X-Forwarded-Encrypted: i=1; AJvYcCUedy7Y2Tcqy6ml6GHJVCVA7E7s/f2BbQf512fUBI+rbJoi47l1nF5ncTIpSBKJ3DdbT2CAEAjJkkJ6wQQc9NakNMxvETjJ67o2lUK8 X-Gm-Message-State: AOJu0YyfIMwpQqNxDMLarUUqqD2swsVpYZyH6ARywJWfU2/xKUhiNhSS 80wxZ7pK/igjZW3GLybaukNUE3aTu//cIJYUmOXTlIjR99lXw4tgrpsLnPkwAK0verQf9v0ikq5 PG2BOSIF3Rpg3l4PmQ/L8OFlT0AGnwSCptp/O X-Received: by 2002:aa7:d157:0:b0:56e:2b67:a2f8 with SMTP id r23-20020aa7d157000000b0056e2b67a2f8mr88428edo.7.1712651394704; Tue, 09 Apr 2024 01:29:54 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240403131936.787234-1-linux@roeck-us.net> <20240403131936.787234-4-linux@roeck-us.net> In-Reply-To: <20240403131936.787234-4-linux@roeck-us.net> From: David Gow Date: Tue, 9 Apr 2024 16:29:42 +0800 Message-ID: Subject: Re: [PATCH v3 03/15] kunit: Add test cases for backtrace warning suppression To: Guenter Roeck Cc: linux-kselftest@vger.kernel.org, David Airlie , Arnd Bergmann , =?UTF-8?B?TWHDrXJhIENhbmFs?= , Dan Carpenter , Kees Cook , Daniel Diaz , Arthur Grillo , Brendan Higgins , Naresh Kamboju , Maarten Lankhorst , Andrew Morton , Maxime Ripard , =?UTF-8?B?VmlsbGUgU3lyasOkbMOk?= , Daniel Vetter , Thomas Zimmermann , dri-devel@lists.freedesktop.org, kunit-dev@googlegroups.com, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, loongarch@lists.linux.dev, netdev@vger.kernel.org, x86@kernel.org, Linux Kernel Functional Testing Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="000000000000077ff80615a5ba32" --000000000000077ff80615a5ba32 Content-Type: text/plain; charset="UTF-8" On Wed, 3 Apr 2024 at 21:19, Guenter Roeck wrote: > > Add unit tests to verify that warning backtrace suppression works. > > If backtrace suppression does _not_ work, the unit tests will likely > trigger unsuppressed backtraces, which should actually help to get > the affected architectures / platforms fixed. > > Tested-by: Linux Kernel Functional Testing > Acked-by: Dan Carpenter > Reviewed-by: Kees Cook > Signed-off-by: Guenter Roeck > --- There's a typo in the Makefile, which stops this from being built at all. Otherwise, it seems good to me. -- David > v2: > - Rebased to v6.9-rc1 > - Added Tested-by:, Acked-by:, and Reviewed-by: tags > - Introduced KUNIT_SUPPRESS_BACKTRACE configuration option > v3: > - Rebased to v6.9-rc2 > > lib/kunit/Makefile | 7 +- > lib/kunit/backtrace-suppression-test.c | 104 +++++++++++++++++++++++++ > 2 files changed, 109 insertions(+), 2 deletions(-) > create mode 100644 lib/kunit/backtrace-suppression-test.c > > diff --git a/lib/kunit/Makefile b/lib/kunit/Makefile > index 545b57c3be48..3eee1bd0ce5e 100644 > --- a/lib/kunit/Makefile > +++ b/lib/kunit/Makefile > @@ -16,10 +16,13 @@ endif > > # KUnit 'hooks' and bug handling are built-in even when KUnit is built > # as a module. > -obj-y += hooks.o \ > - bug.o > +obj-y += hooks.o > +obj-$(CONFIG_KUNIT_SUPPRESS_BACKTRACE) += bug.o > > obj-$(CONFIG_KUNIT_TEST) += kunit-test.o > +ifeq ($(CCONFIG_KUNIT_SUPPRESS_BACKTRACE),y) s/CCONFIG_/CONFIG_/ ? > +obj-$(CONFIG_KUNIT_TEST) += backtrace-suppression-test.o > +endif > > # string-stream-test compiles built-in only. > ifeq ($(CONFIG_KUNIT_TEST),y) > diff --git a/lib/kunit/backtrace-suppression-test.c b/lib/kunit/backtrace-suppression-test.c > new file mode 100644 > index 000000000000..47c619283802 > --- /dev/null > +++ b/lib/kunit/backtrace-suppression-test.c > @@ -0,0 +1,104 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * KUnit test for suppressing warning tracebacks > + * > + * Copyright (C) 2024, Guenter Roeck > + * Author: Guenter Roeck > + */ > + > +#include > +#include > + > +static void backtrace_suppression_test_warn_direct(struct kunit *test) > +{ > + DEFINE_SUPPRESSED_WARNING(backtrace_suppression_test_warn_direct); > + > + START_SUPPRESSED_WARNING(backtrace_suppression_test_warn_direct); > + WARN(1, "This backtrace should be suppressed"); > + END_SUPPRESSED_WARNING(backtrace_suppression_test_warn_direct); > + > + KUNIT_EXPECT_EQ(test, SUPPRESSED_WARNING_COUNT(backtrace_suppression_test_warn_direct), 1); > +} > + > +static void trigger_backtrace_warn(void) > +{ > + WARN(1, "This backtrace should be suppressed"); > +} > + > +static void backtrace_suppression_test_warn_indirect(struct kunit *test) > +{ > + DEFINE_SUPPRESSED_WARNING(trigger_backtrace_warn); > + > + START_SUPPRESSED_WARNING(trigger_backtrace_warn); > + trigger_backtrace_warn(); > + END_SUPPRESSED_WARNING(trigger_backtrace_warn); > + > + KUNIT_EXPECT_EQ(test, SUPPRESSED_WARNING_COUNT(trigger_backtrace_warn), 1); > +} > + > +static void backtrace_suppression_test_warn_multi(struct kunit *test) > +{ > + DEFINE_SUPPRESSED_WARNING(trigger_backtrace_warn); > + DEFINE_SUPPRESSED_WARNING(backtrace_suppression_test_warn_multi); > + > + START_SUPPRESSED_WARNING(backtrace_suppression_test_warn_multi); > + START_SUPPRESSED_WARNING(trigger_backtrace_warn); > + WARN(1, "This backtrace should be suppressed"); > + trigger_backtrace_warn(); > + END_SUPPRESSED_WARNING(trigger_backtrace_warn); > + END_SUPPRESSED_WARNING(backtrace_suppression_test_warn_multi); > + > + KUNIT_EXPECT_EQ(test, SUPPRESSED_WARNING_COUNT(backtrace_suppression_test_warn_multi), 1); > + KUNIT_EXPECT_EQ(test, SUPPRESSED_WARNING_COUNT(trigger_backtrace_warn), 1); > +} > + > +static void backtrace_suppression_test_warn_on_direct(struct kunit *test) > +{ > + DEFINE_SUPPRESSED_WARNING(backtrace_suppression_test_warn_on_direct); > + > + if (!IS_ENABLED(CONFIG_DEBUG_BUGVERBOSE) && !IS_ENABLED(CONFIG_KALLSYMS)) > + kunit_skip(test, "requires CONFIG_DEBUG_BUGVERBOSE or CONFIG_KALLSYMS"); > + > + START_SUPPRESSED_WARNING(backtrace_suppression_test_warn_on_direct); > + WARN_ON(1); > + END_SUPPRESSED_WARNING(backtrace_suppression_test_warn_on_direct); > + > + KUNIT_EXPECT_EQ(test, > + SUPPRESSED_WARNING_COUNT(backtrace_suppression_test_warn_on_direct), 1); > +} > + > +static void trigger_backtrace_warn_on(void) > +{ > + WARN_ON(1); > +} > + > +static void backtrace_suppression_test_warn_on_indirect(struct kunit *test) > +{ > + DEFINE_SUPPRESSED_WARNING(trigger_backtrace_warn_on); > + > + if (!IS_ENABLED(CONFIG_DEBUG_BUGVERBOSE)) > + kunit_skip(test, "requires CONFIG_DEBUG_BUGVERBOSE"); > + > + START_SUPPRESSED_WARNING(trigger_backtrace_warn_on); > + trigger_backtrace_warn_on(); > + END_SUPPRESSED_WARNING(trigger_backtrace_warn_on); > + > + KUNIT_EXPECT_EQ(test, SUPPRESSED_WARNING_COUNT(trigger_backtrace_warn_on), 1); > +} > + > +static struct kunit_case backtrace_suppression_test_cases[] = { > + KUNIT_CASE(backtrace_suppression_test_warn_direct), > + KUNIT_CASE(backtrace_suppression_test_warn_indirect), > + KUNIT_CASE(backtrace_suppression_test_warn_multi), > + KUNIT_CASE(backtrace_suppression_test_warn_on_direct), > + KUNIT_CASE(backtrace_suppression_test_warn_on_indirect), > + {} > +}; > + > +static struct kunit_suite backtrace_suppression_test_suite = { > + .name = "backtrace-suppression-test", > + .test_cases = backtrace_suppression_test_cases, > +}; > +kunit_test_suites(&backtrace_suppression_test_suite); > + > +MODULE_LICENSE("GPL"); > -- > 2.39.2 > --000000000000077ff80615a5ba32 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIPqgYJKoZIhvcNAQcCoIIPmzCCD5cCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg gg0EMIIEtjCCA56gAwIBAgIQeAMYYHb81ngUVR0WyMTzqzANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA3MjgwMDAwMDBaFw0yOTAzMTgwMDAwMDBaMFQxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFz IFIzIFNNSU1FIENBIDIwMjAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvLe9xPU9W dpiHLAvX7kFnaFZPuJLey7LYaMO8P/xSngB9IN73mVc7YiLov12Fekdtn5kL8PjmDBEvTYmWsuQS 6VBo3vdlqqXZ0M9eMkjcKqijrmDRleudEoPDzTumwQ18VB/3I+vbN039HIaRQ5x+NHGiPHVfk6Rx c6KAbYceyeqqfuJEcq23vhTdium/Bf5hHqYUhuJwnBQ+dAUcFndUKMJrth6lHeoifkbw2bv81zxJ I9cvIy516+oUekqiSFGfzAqByv41OrgLV4fLGCDH3yRh1tj7EtV3l2TngqtrDLUs5R+sWIItPa/4 AJXB1Q3nGNl2tNjVpcSn0uJ7aFPbAgMBAAGjggGKMIIBhjAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHzM CmjXouseLHIb0c1dlW+N+/JjMB8GA1UdIwQYMBaAFI/wS3+oLkUkrk1Q+mOai97i3Ru8MHsGCCsG AQUFBwEBBG8wbTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AyLmdsb2JhbHNpZ24uY29tL3Jvb3Ry MzA7BggrBgEFBQcwAoYvaHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvcm9vdC1y My5jcnQwNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9yb290LXIz LmNybDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBKDA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5n bG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzANBgkqhkiG9w0BAQsFAAOCAQEANyYcO+9JZYyqQt41 TMwvFWAw3vLoLOQIfIn48/yea/ekOcParTb0mbhsvVSZ6sGn+txYAZb33wIb1f4wK4xQ7+RUYBfI TuTPL7olF9hDpojC2F6Eu8nuEf1XD9qNI8zFd4kfjg4rb+AME0L81WaCL/WhP2kDCnRU4jm6TryB CHhZqtxkIvXGPGHjwJJazJBnX5NayIce4fGuUEJ7HkuCthVZ3Rws0UyHSAXesT/0tXATND4mNr1X El6adiSQy619ybVERnRi5aDe1PTwE+qNiotEEaeujz1a/+yYaaTY+k+qJcVxi7tbyQ0hi0UB3myM A/z2HmGEwO8hx7hDjKmKbDCCA18wggJHoAMCAQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUA MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWdu MRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEg MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzAR BgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4 Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0EXyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuu l9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+JJ5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJ pij2aTv2y8gokeWdimFXN6x0FNx04Druci8unPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh 6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTvriBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti +w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5NUPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEA S0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigHM8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9u bG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmUY/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaM ld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88 q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcya5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/f hO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/XzCCBOMwggPLoAMCAQICEAHS+TgZvH/tCq5FcDC0 n9IwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt c2ExKjAoBgNVBAMTIUdsb2JhbFNpZ24gQXRsYXMgUjMgU01JTUUgQ0EgMjAyMDAeFw0yNDAxMDcx MDQ5MDJaFw0yNDA3MDUxMDQ5MDJaMCQxIjAgBgkqhkiG9w0BCQEWE2RhdmlkZ293QGdvb2dsZS5j b20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDY2jJMFqnyVx9tBZhkuJguTnM4nHJI ZGdQAt5hic4KMUR2KbYKHuTQpTNJz6gZ54lsH26D/RS1fawr64fewddmUIPOuRxaecSFexpzGf3J Igkjzu54wULNQzFLp1SdF+mPjBSrcULSHBgrsFJqilQcudqXr6wMQsdRHyaEr3orDL9QFYBegYec fn7dqwoXKByjhyvs/juYwxoeAiLNR2hGWt4+URursrD4DJXaf13j/c4N+dTMLO3eCwykTBDufzyC t6G+O3dSXDzZ2OarW/miZvN/y+QD2ZRe+wl39x2HMo3Fc6Dhz2IWawh7E8p2FvbFSosBxRZyJH38 84Qr8NSHAgMBAAGjggHfMIIB2zAeBgNVHREEFzAVgRNkYXZpZGdvd0Bnb29nbGUuY29tMA4GA1Ud DwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDBAYIKwYBBQUHAwIwHQYDVR0OBBYEFC+LS03D 7xDrOPfX3COqq162RFg/MFcGA1UdIARQME4wCQYHZ4EMAQUBATBBBgkrBgEEAaAyASgwNDAyBggr BgEFBQcCARYmaHR0cHM6Ly93d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wDAYDVR0TAQH/ BAIwADCBmgYIKwYBBQUHAQEEgY0wgYowPgYIKwYBBQUHMAGGMmh0dHA6Ly9vY3NwLmdsb2JhbHNp Z24uY29tL2NhL2dzYXRsYXNyM3NtaW1lY2EyMDIwMEgGCCsGAQUFBzAChjxodHRwOi8vc2VjdXJl Lmdsb2JhbHNpZ24uY29tL2NhY2VydC9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcnQwHwYDVR0jBBgw FoAUfMwKaNei6x4schvRzV2Vb4378mMwRgYDVR0fBD8wPTA7oDmgN4Y1aHR0cDovL2NybC5nbG9i YWxzaWduLmNvbS9jYS9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcmwwDQYJKoZIhvcNAQELBQADggEB AK0lDd6/eSh3qHmXaw1YUfIFy07B25BEcTvWgOdla99gF1O7sOsdYaTz/DFkZI5ghjgaPJCovgla mRMfNcxZCfoBtsB7mAS6iOYjuwFOZxi9cv6jhfiON6b89QWdMaPeDddg/F2Q0bxZ9Z2ZEBxyT34G wlDp+1p6RAqlDpHifQJW16h5jWIIwYisvm5QyfxQEVc+XH1lt+taSzCfiBT0ZLgjB9Sg+zAo8ys6 5PHxFaT2a5Td/fj5yJ5hRSrqy/nj/hjT14w3/ZdX5uWg+cus6VjiiR/5qGSZRjHt8JoApD6t6/tg ITv8ZEy6ByumbU23nkHTMOzzQSxczHkT+0q10/MxggJqMIICZgIBATBoMFQxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFzIFIz IFNNSU1FIENBIDIwMjACEAHS+TgZvH/tCq5FcDC0n9IwDQYJYIZIAWUDBAIBBQCggdQwLwYJKoZI hvcNAQkEMSIEIEYJ92tMQt1mLZYqUzFbjlRJnCW5B3EIBXcLly2sk0FjMBgGCSqGSIb3DQEJAzEL BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTI0MDQwOTA4Mjk1NVowaQYJKoZIhvcNAQkPMVww WjALBglghkgBZQMEASowCwYJYIZIAWUDBAEWMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzALBgkq hkiG9w0BAQowCwYJKoZIhvcNAQEHMAsGCWCGSAFlAwQCATANBgkqhkiG9w0BAQEFAASCAQBplz+p lHrF075AA3Dg264/7JsidsEuMH8LUuD/nhtJfIRePel9iinmyz3Pt0SHKta1ZisckWpcyZBUeLUH L9Yl5yKfQrGvmEm6CsKybVt8o0j7oQNg77ZGWNYNWKl+Ff/FrTD2W6r61cCtyEXBEDwcswc4UpjK pnXKHLQND2+g/2bQNDdgKN/EJY5538GJg3KL4KcLrAzvc2yXb/X4LemO9o+DFOISDuRRozuHWrzy +JhEobM2fnXkDgwX+Zw3cYWq4xjZHMgzjFgd8hDOGM53gDSGkE+3ZLc1z7ilc/49hbGL++hVrf4B IgY0FfUEYjqaoYvtSGBxMVSnLGFL83E3 --000000000000077ff80615a5ba32--