Received: by 2002:a05:7412:98c1:b0:fa:551:50a7 with SMTP id kc1csp1054524rdb; Sun, 7 Jan 2024 01:12:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IFC7YNvqDqMu07kpf2Y1ebxuNXPevrHj3vf88aGyFUzSTYTIcUKjXvuImRl/xDF7IBwgzbb X-Received: by 2002:a50:cdd2:0:b0:553:84c0:1792 with SMTP id h18-20020a50cdd2000000b0055384c01792mr701409edj.42.1704618726767; Sun, 07 Jan 2024 01:12:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704618726; cv=none; d=google.com; s=arc-20160816; b=KrZ7xSQkwtV+TS4CuckQunXQQlrc1dy6OTVs62XD/mzsl64a7TJiLIwGXsbwfHJ/d4 orEfLiZQysMe/rXKPNhJpZQTUnUYej1ngtaXDq9pa/hAUvwQm4fSCclndWzHr6g1NAR+ 7WGmj9VZkvMH/sp93aBm58MUAxkQRoHYdezCtPecGz/E/QSC3JeZ3U+z299WNVgO9VZu 8npRxZPNn022D3I38M3cR/6djvZIpn3qJa+UQIVHVs76ir7Bx1fzSb5z7L/q7zp9CFlB Yd/XyLbyBQ2/6Z06rGMwi/wPGbk4MBV7RIiebAPKaJORlveNb8bn9EuNMzheDOsexho2 MXpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :subject:user-agent:references:in-reply-to:message-id:date:cc:to :from:dkim-signature; bh=OwxbboA+N5mE+7+muvIID+7kAwYNbNBouWitlYAmS0I=; fh=tuSBHDjZAm36bZph5K31m8uuTVcXsIc+XKMPecRL2zk=; b=T52UDX3PY9fddmCjvnYnvMye+kan10K75/k4H1X8E7Ux7XQpwQh4B9Nput3bkKN9f4 S/eAjKQUhXKohDGqzskChe5KDWNNDD4VoGJ5se5ZQ6aIKIe5ECjctYTnF8nhn3JgAZFr Biji8WJk/ZL4nzkzNe94+q/sl2cpGKdcQhHUu7m8ALi1hwkqicVrp8M0jbFyWGXsmTRl V8pmHsTMwxZv0pSYeZUegY4tCrnkOwYVAlhNc2xyCfRfyB0vsY/eugV6WI36KJCDaSP/ /fiZCNC0OIxygdULOEY6yi8h2Go09ARwPwvHWMR5ES/Wy7HdwcktXpE714HE2FFNw+G5 JTPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=huOQJoOY; spf=pass (google.com: domain of linux-wireless+bounces-1559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1559-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id h8-20020a1709063b4800b00a26ebc84d25si2050844ejf.823.2024.01.07.01.12.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 07 Jan 2024 01:12:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-1559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=huOQJoOY; spf=pass (google.com: domain of linux-wireless+bounces-1559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1559-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4AB141F21B90 for ; Sun, 7 Jan 2024 09:12:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9CFAB12B74; Sun, 7 Jan 2024 09:12:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=broadcom.com header.i=@broadcom.com header.b="huOQJoOY" X-Original-To: linux-wireless@vger.kernel.org Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AF15212B68 for ; Sun, 7 Jan 2024 09:11:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=broadcom.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=broadcom.com Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-40d6b4e2945so12429715e9.0 for ; Sun, 07 Jan 2024 01:11:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; t=1704618718; x=1705223518; darn=vger.kernel.org; h=mime-version:subject:user-agent:references:in-reply-to:message-id :date:cc:to:from:from:to:cc:subject:date:message-id:reply-to; bh=OwxbboA+N5mE+7+muvIID+7kAwYNbNBouWitlYAmS0I=; b=huOQJoOYeSyH/izI7DTOhRyJU1B0+BYinBmGEIOHztLmY12rtQPCMkJzpGqw+wz1mM mwTrypmRIUFej9Sgl1hg/94F2dj07W70N1x3fKmdYd4ktzGE36EFy4epMmICux/XClzE jZ5aW2CCnbkMn1qjjtY8HApntGcFou0g6bvLY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704618718; x=1705223518; h=mime-version:subject:user-agent:references:in-reply-to:message-id :date:cc:to:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=OwxbboA+N5mE+7+muvIID+7kAwYNbNBouWitlYAmS0I=; b=rsn8ysweBmtwMxGF0pzfpqRrFEo+NnfNMzfCjxB/vlfJXNUq6tlh9nCng9Q/1afbmd k/SkChzTK7PN8GwIHFn+qPfElbXcEzUelZbW7BjGM6StCzagtSesufx/AusRuVgHYosE veBgmRa0acwTAMFXQ2qd/D0PiPgx86vUqRQ8F2pwTmVOODL6HNBST9thSPS/8/TThCRD 9Rv1jbuVA0uh/KRfh7jioY5fAp5o+WydbUZPtVSZ6f3KywHFXsGZgAEQN/CXg4l2/l5r GgRy/bTGyH6yWvFgFnDrKsKvpoIx1C7gAoMGI4R2PF58Vo9J/Blp5IqK7zAAssq6zBRb F3Nw== X-Gm-Message-State: AOJu0YyDd7M0vB4pZQX+/xpE/0Wn28i7siPOTgAnSdggNugBCZ2w8XV/ jIcdqdbXL2eGMrTrwWMDz9LsK2Ah2yd6V0QOalbqVwuNTYnaUCU= X-Received: by 2002:a05:600c:1d94:b0:40e:44eb:a83b with SMTP id p20-20020a05600c1d9400b0040e44eba83bmr154029wms.47.1704618717878; Sun, 07 Jan 2024 01:11:57 -0800 (PST) Received: from [10.230.43.52] ([192.19.152.250]) by smtp.gmail.com with ESMTPSA id y5-20020a056000108500b003366a9cb0d1sm4888048wrw.92.2024.01.07.01.11.56 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 07 Jan 2024 01:11:57 -0800 (PST) From: Arend Van Spriel To: Greg KH CC: Kalle Valo , , Hector Martin , Date: Sun, 07 Jan 2024 10:11:54 +0100 Message-ID: <18ce3316390.279b.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> In-Reply-To: <2024010717-riverbed-cycle-d43e@gregkh> References: <20240106103835.269149-1-arend.vanspriel@broadcom.com> <20240106103835.269149-2-arend.vanspriel@broadcom.com> <2024010757-bootie-librarian-51f7@gregkh> <2024010717-riverbed-cycle-d43e@gregkh> User-Agent: AquaMail/1.49.0 (build: 104900403) Subject: Re: [PATCH V2 1/3] wifi: brcmfmac: Demote vendor-specific attach/detach messages to info Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="0000000000002d6b4c060e5779c1" --0000000000002d6b4c060e5779c1 Content-Type: text/plain; format=flowed; charset="us-ascii" Content-Transfer-Encoding: 8bit On January 7, 2024 9:52:33 AM Greg KH wrote: > On Sun, Jan 07, 2024 at 09:52:01AM +0100, Greg KH wrote: >> On Sat, Jan 06, 2024 at 11:38:33AM +0100, Arend van Spriel wrote: >>> From: Hector Martin >>> >>> People are getting spooked by brcmfmac errors on their boot console. >>> There's no reason for these messages to be errors. >>> >>> Cc: stable@vger.kernel.org # 6.2.x Hi Greg So I assume the bot stumbled over the appended comment here. Is it still helpful or is it redundant with the Fixes: tag in place. Regards, Arend >>> Fixes: d6a5c562214f ("wifi: brcmfmac: add support for vendor-specific >>> firmware api") >>> Signed-off-by: Hector Martin >>> [arend.vanspriel@broadcom.com: remove attach/detach vendor callbacks] >>> Signed-off-by: Arend van Spriel >>> --- >>> .../broadcom/brcm80211/brcmfmac/bca/core.c | 13 ---------- >>> .../broadcom/brcm80211/brcmfmac/cyw/core.c | 13 ---------- >>> .../broadcom/brcm80211/brcmfmac/fwvid.c | 7 +++-- >>> .../broadcom/brcm80211/brcmfmac/fwvid.h | 26 ++----------------- >>> .../broadcom/brcm80211/brcmfmac/wcc/core.c | 15 +---------- >>> 5 files changed, 6 insertions(+), 68 deletions(-) >>> >>> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/bca/core.c >>> b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/bca/core.c >>> index a5d9ac5e6763..a963c242975a 100644 >>> --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/bca/core.c >>> +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/bca/core.c >>> @@ -11,17 +11,6 @@ >>> >>> #include "vops.h" >>> >>> -static int brcmf_bca_attach(struct brcmf_pub *drvr) >>> -{ >>> - pr_err("%s: executing\n", __func__); >>> - return 0; >>> -} >>> - >>> -static void brcmf_bca_detach(struct brcmf_pub *drvr) >>> -{ >>> - pr_err("%s: executing\n", __func__); >>> -} >>> - >>> static void brcmf_bca_feat_attach(struct brcmf_if *ifp) >>> { >>> /* SAE support not confirmed so disabling for now */ >>> @@ -29,7 +18,5 @@ static void brcmf_bca_feat_attach(struct brcmf_if *ifp) >>> } >>> >>> const struct brcmf_fwvid_ops brcmf_bca_ops = { >>> - .attach = brcmf_bca_attach, >>> - .detach = brcmf_bca_detach, >>> .feat_attach = brcmf_bca_feat_attach, >>> }; >>> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cyw/core.c >>> b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cyw/core.c >>> index 24670497f1a4..bec5748310b9 100644 >>> --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cyw/core.c >>> +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cyw/core.c >>> @@ -11,17 +11,6 @@ >>> >>> #include "vops.h" >>> >>> -static int brcmf_cyw_attach(struct brcmf_pub *drvr) >>> -{ >>> - pr_err("%s: executing\n", __func__); >>> - return 0; >>> -} >>> - >>> -static void brcmf_cyw_detach(struct brcmf_pub *drvr) >>> -{ >>> - pr_err("%s: executing\n", __func__); >>> -} >>> - >>> static int brcmf_cyw_set_sae_pwd(struct brcmf_if *ifp, >>> struct cfg80211_crypto_settings *crypto) >>> { >>> @@ -49,7 +38,5 @@ static int brcmf_cyw_set_sae_pwd(struct brcmf_if *ifp, >>> } >>> >>> const struct brcmf_fwvid_ops brcmf_cyw_ops = { >>> - .attach = brcmf_cyw_attach, >>> - .detach = brcmf_cyw_detach, >>> .set_sae_password = brcmf_cyw_set_sae_pwd, >>> }; >>> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.c >>> b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.c >>> index 86eafdb40541..f633e2bbd891 100644 >>> --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.c >>> +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.c >>> @@ -89,8 +89,7 @@ int brcmf_fwvid_register_vendor(enum brcmf_fwvendor >>> fwvid, struct module *vmod, >>> if (fwvid >= BRCMF_FWVENDOR_NUM) >>> return -ERANGE; >>> >>> - if (WARN_ON(!vmod) || WARN_ON(!vops) || >>> - WARN_ON(!vops->attach) || WARN_ON(!vops->detach)) >>> + if (WARN_ON(!vmod) || WARN_ON(!vops)) >>> return -EINVAL; >>> >>> if (WARN_ON(fwvid_list[fwvid].vmod)) >>> @@ -150,7 +149,7 @@ static inline int brcmf_fwvid_request_module(enum >>> brcmf_fwvendor fwvid) >>> } >>> #endif >>> >>> -int brcmf_fwvid_attach_ops(struct brcmf_pub *drvr) >>> +int brcmf_fwvid_attach(struct brcmf_pub *drvr) >>> { >>> enum brcmf_fwvendor fwvid = drvr->bus_if->fwvid; >>> int ret; >>> @@ -175,7 +174,7 @@ int brcmf_fwvid_attach_ops(struct brcmf_pub *drvr) >>> return ret; >>> } >>> >>> -void brcmf_fwvid_detach_ops(struct brcmf_pub *drvr) >>> +void brcmf_fwvid_detach(struct brcmf_pub *drvr) >>> { >>> enum brcmf_fwvendor fwvid = drvr->bus_if->fwvid; >>> >>> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h >>> b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h >>> index d9fc76b46db9..dac22534d033 100644 >>> --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h >>> +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h >>> @@ -12,8 +12,6 @@ struct brcmf_pub; >>> struct brcmf_if; >>> >>> struct brcmf_fwvid_ops { >>> - int (*attach)(struct brcmf_pub *drvr); >>> - void (*detach)(struct brcmf_pub *drvr); >>> void (*feat_attach)(struct brcmf_if *ifp); >>> int (*set_sae_password)(struct brcmf_if *ifp, struct >>> cfg80211_crypto_settings *crypto); >>> }; >>> @@ -24,30 +22,10 @@ int brcmf_fwvid_register_vendor(enum brcmf_fwvendor >>> fwvid, struct module *mod, >>> int brcmf_fwvid_unregister_vendor(enum brcmf_fwvendor fwvid, struct module >>> *mod); >>> >>> /* core driver functions */ >>> -int brcmf_fwvid_attach_ops(struct brcmf_pub *drvr); >>> -void brcmf_fwvid_detach_ops(struct brcmf_pub *drvr); >>> +int brcmf_fwvid_attach(struct brcmf_pub *drvr); >>> +void brcmf_fwvid_detach(struct brcmf_pub *drvr); >>> const char *brcmf_fwvid_vendor_name(struct brcmf_pub *drvr); >>> >>> -static inline int brcmf_fwvid_attach(struct brcmf_pub *drvr) >>> -{ >>> - int ret; >>> - >>> - ret = brcmf_fwvid_attach_ops(drvr); >>> - if (ret) >>> - return ret; >>> - >>> - return drvr->vops->attach(drvr); >>> -} >>> - >>> -static inline void brcmf_fwvid_detach(struct brcmf_pub *drvr) >>> -{ >>> - if (!drvr->vops) >>> - return; >>> - >>> - drvr->vops->detach(drvr); >>> - brcmf_fwvid_detach_ops(drvr); >>> -} >>> - >>> static inline void brcmf_fwvid_feat_attach(struct brcmf_if *ifp) >>> { >>> const struct brcmf_fwvid_ops *vops = ifp->drvr->vops; >>> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/wcc/core.c >>> b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/wcc/core.c >>> index 2d8f80bd7382..fd593b93ad40 100644 >>> --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/wcc/core.c >>> +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/wcc/core.c >>> @@ -7,21 +7,10 @@ >>> #include >>> #include >>> #include >>> -#include >>> +#include >>> >>> #include "vops.h" >>> >>> -static int brcmf_wcc_attach(struct brcmf_pub *drvr) >>> -{ >>> - pr_debug("%s: executing\n", __func__); >>> - return 0; >>> -} >>> - >>> -static void brcmf_wcc_detach(struct brcmf_pub *drvr) >>> -{ >>> - pr_debug("%s: executing\n", __func__); >>> -} >>> - >>> static int brcmf_wcc_set_sae_pwd(struct brcmf_if *ifp, >>> struct cfg80211_crypto_settings *crypto) >>> { >>> @@ -30,7 +19,5 @@ static int brcmf_wcc_set_sae_pwd(struct brcmf_if *ifp, >>> } >>> >>> const struct brcmf_fwvid_ops brcmf_wcc_ops = { >>> - .attach = brcmf_wcc_attach, >>> - .detach = brcmf_wcc_detach, >>> .set_sae_password = brcmf_wcc_set_sae_pwd, >>> }; >>> -- >>> 2.32.0 >> >> >> >> >> This is not the correct way to submit patches for inclusion in the >> stable kernel tree. Please read: >> https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html >> for how to do this properly. >> >> > > Sorry, bot is wrong here, this is fine. --0000000000002d6b4c060e5779c1 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIQdwYJKoZIhvcNAQcCoIIQaDCCEGQCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg gg3OMIIFDTCCA/WgAwIBAgIQeEqpED+lv77edQixNJMdADANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA5MTYwMDAwMDBaFw0yODA5MTYwMDAwMDBaMFsxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTEwLwYDVQQDEyhHbG9iYWxTaWduIEdDQyBS MyBQZXJzb25hbFNpZ24gMiBDQSAyMDIwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA vbCmXCcsbZ/a0fRIQMBxp4gJnnyeneFYpEtNydrZZ+GeKSMdHiDgXD1UnRSIudKo+moQ6YlCOu4t rVWO/EiXfYnK7zeop26ry1RpKtogB7/O115zultAz64ydQYLe+a1e/czkALg3sgTcOOcFZTXk38e aqsXsipoX1vsNurqPtnC27TWsA7pk4uKXscFjkeUE8JZu9BDKaswZygxBOPBQBwrA5+20Wxlk6k1 e6EKaaNaNZUy30q3ArEf30ZDpXyfCtiXnupjSK8WU2cK4qsEtj09JS4+mhi0CTCrCnXAzum3tgcH cHRg0prcSzzEUDQWoFxyuqwiwhHu3sPQNmFOMwIDAQABo4IB2jCCAdYwDgYDVR0PAQH/BAQDAgGG MGAGA1UdJQRZMFcGCCsGAQUFBwMCBggrBgEFBQcDBAYKKwYBBAGCNxQCAgYKKwYBBAGCNwoDBAYJ KwYBBAGCNxUGBgorBgEEAYI3CgMMBggrBgEFBQcDBwYIKwYBBQUHAxEwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUljPR5lgXWzR1ioFWZNW+SN6hj88wHwYDVR0jBBgwFoAUj/BLf6guRSSu TVD6Y5qL3uLdG7wwegYIKwYBBQUHAQEEbjBsMC0GCCsGAQUFBzABhiFodHRwOi8vb2NzcC5nbG9i YWxzaWduLmNvbS9yb290cjMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9zZWN1cmUuZ2xvYmFsc2lnbi5j b20vY2FjZXJ0L3Jvb3QtcjMuY3J0MDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5jb20vcm9vdC1yMy5jcmwwWgYDVR0gBFMwUTALBgkrBgEEAaAyASgwQgYKKwYBBAGgMgEo CjA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAN BgkqhkiG9w0BAQsFAAOCAQEAdAXk/XCnDeAOd9nNEUvWPxblOQ/5o/q6OIeTYvoEvUUi2qHUOtbf jBGdTptFsXXe4RgjVF9b6DuizgYfy+cILmvi5hfk3Iq8MAZsgtW+A/otQsJvK2wRatLE61RbzkX8 9/OXEZ1zT7t/q2RiJqzpvV8NChxIj+P7WTtepPm9AIj0Keue+gS2qvzAZAY34ZZeRHgA7g5O4TPJ /oTd+4rgiU++wLDlcZYd/slFkaT3xg4qWDepEMjT4T1qFOQIL+ijUArYS4owpPg9NISTKa1qqKWJ jFoyms0d0GwOniIIbBvhI2MJ7BSY9MYtWVT5jJO3tsVHwj4cp92CSFuGwunFMzCCA18wggJHoAMC AQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUAMEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9v dCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5 MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEgMB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENB IC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0E XyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuul9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+J J5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJpij2aTv2y8gokeWdimFXN6x0FNx04Druci8u nPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTv riBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti+w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGj QjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5N UPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEAS0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigH M8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9ubG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmU Y/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaMld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V 14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcy a5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/fhO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/ XzCCBVYwggQ+oAMCAQICDE79bW6SMzVJMuOi1zANBgkqhkiG9w0BAQsFADBbMQswCQYDVQQGEwJC RTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTExMC8GA1UEAxMoR2xvYmFsU2lnbiBHQ0MgUjMg UGVyc29uYWxTaWduIDIgQ0EgMjAyMDAeFw0yMjA5MTAxMTQzMjNaFw0yNTA5MTAxMTQzMjNaMIGV MQswCQYDVQQGEwJJTjESMBAGA1UECBMJS2FybmF0YWthMRIwEAYDVQQHEwlCYW5nYWxvcmUxFjAU BgNVBAoTDUJyb2FkY29tIEluYy4xGTAXBgNVBAMTEEFyZW5kIFZhbiBTcHJpZWwxKzApBgkqhkiG 9w0BCQEWHGFyZW5kLnZhbnNwcmllbEBicm9hZGNvbS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IB DwAwggEKAoIBAQDxOB8Yu89pZLsG9Ic8ZY3uGibuv+NRsij+E70OMJQIwugrByyNq5xgH0BI22vJ LT7VKCB6YJC88ewEFfYi3EKW/sn6RL16ImUM40beDmQ12WBquJRoxVNyoByNalmTOBNYR95ZQZJw 1nrzaoJtK0XIsv0dNCUcLlAc+jHkngD+I0ptVuWoMO1BcJexqJf5iX2M1CdC8PXTh9g4FIQnG2mc 2Gzj3QNJRLsZu1TLyOyBBIr/BE7UiY3RabgRzknBGAPmzhS+fmyM8OtM5BYBsFBrSUFtZZO2p/tf Nbc24J2zf2peoZ8MK+7WQqummYlOnz+FyDkA9EybeNMcS5C+xi/PAgMBAAGjggHdMIIB2TAOBgNV HQ8BAf8EBAMCBaAwgaMGCCsGAQUFBwEBBIGWMIGTME4GCCsGAQUFBzAChkJodHRwOi8vc2VjdXJl Lmdsb2JhbHNpZ24uY29tL2NhY2VydC9nc2djY3IzcGVyc29uYWxzaWduMmNhMjAyMC5jcnQwQQYI KwYBBQUHMAGGNWh0dHA6Ly9vY3NwLmdsb2JhbHNpZ24uY29tL2dzZ2NjcjNwZXJzb25hbHNpZ24y Y2EyMDIwME0GA1UdIARGMEQwQgYKKwYBBAGgMgEoCjA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3 dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJBgNVHRMEAjAAMEkGA1UdHwRCMEAwPqA8oDqG OGh0dHA6Ly9jcmwuZ2xvYmFsc2lnbi5jb20vZ3NnY2NyM3BlcnNvbmFsc2lnbjJjYTIwMjAuY3Js MCcGA1UdEQQgMB6BHGFyZW5kLnZhbnNwcmllbEBicm9hZGNvbS5jb20wEwYDVR0lBAwwCgYIKwYB BQUHAwQwHwYDVR0jBBgwFoAUljPR5lgXWzR1ioFWZNW+SN6hj88wHQYDVR0OBBYEFIikAXd8CEtv ZbDflDRnf3tuStPuMA0GCSqGSIb3DQEBCwUAA4IBAQCdS5XCYx6k2GGZui9DlFsFm75khkqAU7rT zBX04sJU1+B1wtgmWTVIzW7ugdtDZ4gzaV0S9xRhpDErjJaltxPbCylb1DEsLj+AIvBR34caW6ZG sQk444t0HPb29HnWYj+OllIGMbdJWr0/P95ZrKk2bP24ub3ZP/8SyzrohfIba9WZKMq6g2nTLZE3 BtkeSGJx/8dy0h8YmRn+adOrxKXHxhSL8BNn8wsmIZyYWe6fRcBtO3Ks2DOLyHCdkoFlN8x9VUQF N2ulEgqCbRKkx+qNirW86eF138lr1gRxzclu/38ko//MmkAYR/+hP3WnBll7zbpIt0jc9wyFkSqH p8a1MYICbTCCAmkCAQEwazBbMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1z YTExMC8GA1UEAxMoR2xvYmFsU2lnbiBHQ0MgUjMgUGVyc29uYWxTaWduIDIgQ0EgMjAyMAIMTv1t bpIzNUky46LXMA0GCWCGSAFlAwQCAQUAoIHUMC8GCSqGSIb3DQEJBDEiBCAg4YiqLx7E0HkLaBeV bepZFzpkU/19xHWPDQVg1jaawzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJ BTEPFw0yNDAxMDcwOTExNThaMGkGCSqGSIb3DQEJDzFcMFowCwYJYIZIAWUDBAEqMAsGCWCGSAFl AwQBFjALBglghkgBZQMEAQIwCgYIKoZIhvcNAwcwCwYJKoZIhvcNAQEKMAsGCSqGSIb3DQEBBzAL BglghkgBZQMEAgEwDQYJKoZIhvcNAQEBBQAEggEAIGuriI9jL/81eshpPdHuebYDegvFfn/ANXVU YxyU4fDhEZYXy8WQCd90FlSycGP8LVi/yPzzrCQJGupdtfVzEFPw/OM5ws2FSR64IQ6bOasvuI6/ M5O24pL6ksQJl4UKAzd+mTL51+sRntVtF6FDBBc00N8Es416LKz43Qzn6zIFsLTX4SHYLyGi015P tBr744p57EzOGG/iLUMsgIqidimHocPyJonam0kacDqaA3IQOFhBCZgcZkko4ZBSWrT+AJzBl4wf sFA1yDtELbekZPVOKN4Mx5uFJyDBuJdaFHmfXfr4CK5NIVV6DUzNk3Ew529vcnW9uI9I5PSGc1pK tQ== --0000000000002d6b4c060e5779c1--