From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jeff Layton Subject: Re: [PATCH v23 03/22] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags Date: Tue, 05 Jul 2016 07:07:47 -0400 Message-ID: <1467716867.3800.4.camel@redhat.com> References: <1467294433-3222-1-git-send-email-agruenba@redhat.com> <1467294433-3222-4-git-send-email-agruenba@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE Cc: Christoph Hellwig , Theodore Ts'o , Andreas Dilger , "J. Bruce Fields" , Trond Myklebust , Anna Schumaker , Dave Chinner , linux-ext4-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, xfs-VZNHf3L845pBDgjK7y7TUQ@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-nfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Andreas Gruenbacher , Alexander Viro Return-path: In-Reply-To: <1467294433-3222-4-git-send-email-agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> Sender: linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org List-ID: On Thu, 2016-06-30 at 15:46 +0200, Andreas Gruenbacher wrote: > Normally, deleting a file requires MAY_WRITE access to the parent > directory.=C2=A0=C2=A0With richacls, a file may be deleted with MAY_D= ELETE_CHILD access > to the parent directory or with MAY_DELETE_SELF access to the file. >=20 > To support that, pass the MAY_DELETE_CHILD mask flag to inode_permiss= ion() > when checking for delete access inside a directory, and MAY_DELETE_SE= LF > when checking for delete access to a file itelf. >=20 Minor misspelling in changelog above. It should be "itself". > The MAY_DELETE_SELF permission overrides the sticky directory check. >=20 > Signed-off-by: Andreas Gruenbacher > Reviewed-by: J. Bruce Fields > Reviewed-by: Steve French > --- > =C2=A0fs/namei.c=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= | 20 ++++++++++++-------- > =C2=A0include/linux/fs.h |=C2=A0=C2=A02 ++ > =C2=A02 files changed, 14 insertions(+), 8 deletions(-) >=20 > diff --git a/fs/namei.c b/fs/namei.c > index dc91858..663933e 100644 > --- a/fs/namei.c > +++ b/fs/namei.c > @@ -454,9 +454,9 @@ static int sb_permission(struct super_block *sb, = struct inode *inode, int mask) > =C2=A0 * this, letting us set arbitrary permissions for filesystem ac= cess without > =C2=A0 * changing the "normal" UIDs which are used for other things. > =C2=A0 * > - * MAY_WRITE must be set in @mask whenever MAY_APPEND, MAY_CREATE_FI= LE, or > - * MAY_CREATE_DIR are set.=C2=A0=C2=A0That way, file systems that do= n't support these > - * permissions will check for MAY_WRITE instead. > + * MAY_WRITE must be set in @mask whenever MAY_APPEND, MAY_CREATE_FI= LE, > + * MAY_CREATE_DIR, or MAY_DELETE_CHILD are set.=C2=A0=C2=A0That way,= file systems that > + * don't support these permissions will check for MAY_WRITE instead. > =C2=A0 */ > =C2=A0int inode_permission(struct inode *inode, int mask) > =C2=A0{ > @@ -2778,14 +2778,18 @@ static int may_delete_or_replace(struct inode= *dir, struct dentry *victim, > =C2=A0 BUG_ON(victim->d_parent->d_inode !=3D dir); > =C2=A0 audit_inode_child(dir, victim, AUDIT_TYPE_CHILD_DELETE); > =C2=A0 > - error =3D inode_permission(dir, mask); > + error =3D inode_permission(dir, mask | MAY_WRITE | MAY_DELETE_CHILD= ); > + if (!error && check_sticky(dir, inode)) > + error =3D -EPERM; > + if (error && IS_RICHACL(inode) && > + =C2=A0=C2=A0=C2=A0=C2=A0inode_permission(inode, MAY_DELETE_SELF) =3D= =3D 0 && > + =C2=A0=C2=A0=C2=A0=C2=A0inode_permission(dir, mask) =3D=3D 0) > + error =3D 0; > =C2=A0 if (error) > =C2=A0 return error; > =C2=A0 if (IS_APPEND(dir)) > =C2=A0 return -EPERM; > - > - if (check_sticky(dir, inode) || IS_APPEND(inode) || > - =C2=A0=C2=A0=C2=A0=C2=A0IS_IMMUTABLE(inode) || IS_SWAPFILE(inode)) > + if (IS_APPEND(inode) || IS_IMMUTABLE(inode) || IS_SWAPFILE(inode)) > =C2=A0 return -EPERM; > =C2=A0 if (isdir) { > =C2=A0 if (!d_is_dir(victim)) > @@ -2803,7 +2807,7 @@ static int may_delete_or_replace(struct inode *= dir, struct dentry *victim, > =C2=A0 > =C2=A0static int may_delete(struct inode *dir, struct dentry *victim,= bool isdir) > =C2=A0{ > - return may_delete_or_replace(dir, victim, isdir, MAY_WRITE | MAY_EX= EC); > + return may_delete_or_replace(dir, victim, isdir, MAY_EXEC); > =C2=A0} > =C2=A0 > =C2=A0static int may_replace(struct inode *dir, struct dentry *victim= , bool isdir) > diff --git a/include/linux/fs.h b/include/linux/fs.h > index dd614ad..86bfa10 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -86,6 +86,8 @@ typedef int (dio_iodone_t)(struct kiocb *iocb, loff= _t offset, > =C2=A0#define MAY_NOT_BLOCK 0x00000080 > =C2=A0#define MAY_CREATE_FILE 0x00000100 > =C2=A0#define MAY_CREATE_DIR 0x00000200 > +#define MAY_DELETE_CHILD 0x00000400 > +#define MAY_DELETE_SELF 0x00000800 > =C2=A0 > =C2=A0/* > =C2=A0 * flags in file.f_mode.=C2=A0=C2=A0Note that FMODE_READ and FM= ODE_WRITE must correspond Reviewed-by: Jeff Layton From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754863AbcGELHy (ORCPT ); Tue, 5 Jul 2016 07:07:54 -0400 Received: from mail-qk0-f180.google.com ([209.85.220.180]:36557 "EHLO mail-qk0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754821AbcGELHu (ORCPT ); Tue, 5 Jul 2016 07:07:50 -0400 Message-ID: <1467716867.3800.4.camel@redhat.com> Subject: Re: [PATCH v23 03/22] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags From: Jeff Layton To: Andreas Gruenbacher , Alexander Viro Cc: Christoph Hellwig , "Theodore Ts'o" , Andreas Dilger , "J. Bruce Fields" , Trond Myklebust , Anna Schumaker , Dave Chinner , linux-ext4@vger.kernel.org, xfs@oss.sgi.com, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, linux-api@vger.kernel.org Date: Tue, 05 Jul 2016 07:07:47 -0400 In-Reply-To: <1467294433-3222-4-git-send-email-agruenba@redhat.com> References: <1467294433-3222-1-git-send-email-agruenba@redhat.com> <1467294433-3222-4-git-send-email-agruenba@redhat.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.18.5.2 (3.18.5.2-1.fc23) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2016-06-30 at 15:46 +0200, Andreas Gruenbacher wrote: > Normally, deleting a file requires MAY_WRITE access to the parent > directory.  With richacls, a file may be deleted with MAY_DELETE_CHILD access > to the parent directory or with MAY_DELETE_SELF access to the file. > > To support that, pass the MAY_DELETE_CHILD mask flag to inode_permission() > when checking for delete access inside a directory, and MAY_DELETE_SELF > when checking for delete access to a file itelf. > Minor misspelling in changelog above. It should be "itself". > The MAY_DELETE_SELF permission overrides the sticky directory check. > > Signed-off-by: Andreas Gruenbacher > Reviewed-by: J. Bruce Fields > Reviewed-by: Steve French > --- >  fs/namei.c         | 20 ++++++++++++-------- >  include/linux/fs.h |  2 ++ >  2 files changed, 14 insertions(+), 8 deletions(-) > > diff --git a/fs/namei.c b/fs/namei.c > index dc91858..663933e 100644 > --- a/fs/namei.c > +++ b/fs/namei.c > @@ -454,9 +454,9 @@ static int sb_permission(struct super_block *sb, struct inode *inode, int mask) >   * this, letting us set arbitrary permissions for filesystem access without >   * changing the "normal" UIDs which are used for other things. >   * > - * MAY_WRITE must be set in @mask whenever MAY_APPEND, MAY_CREATE_FILE, or > - * MAY_CREATE_DIR are set.  That way, file systems that don't support these > - * permissions will check for MAY_WRITE instead. > + * MAY_WRITE must be set in @mask whenever MAY_APPEND, MAY_CREATE_FILE, > + * MAY_CREATE_DIR, or MAY_DELETE_CHILD are set.  That way, file systems that > + * don't support these permissions will check for MAY_WRITE instead. >   */ >  int inode_permission(struct inode *inode, int mask) >  { > @@ -2778,14 +2778,18 @@ static int may_delete_or_replace(struct inode *dir, struct dentry *victim, >   BUG_ON(victim->d_parent->d_inode != dir); >   audit_inode_child(dir, victim, AUDIT_TYPE_CHILD_DELETE); >   > - error = inode_permission(dir, mask); > + error = inode_permission(dir, mask | MAY_WRITE | MAY_DELETE_CHILD); > + if (!error && check_sticky(dir, inode)) > + error = -EPERM; > + if (error && IS_RICHACL(inode) && > +     inode_permission(inode, MAY_DELETE_SELF) == 0 && > +     inode_permission(dir, mask) == 0) > + error = 0; >   if (error) >   return error; >   if (IS_APPEND(dir)) >   return -EPERM; > - > - if (check_sticky(dir, inode) || IS_APPEND(inode) || > -     IS_IMMUTABLE(inode) || IS_SWAPFILE(inode)) > + if (IS_APPEND(inode) || IS_IMMUTABLE(inode) || IS_SWAPFILE(inode)) >   return -EPERM; >   if (isdir) { >   if (!d_is_dir(victim)) > @@ -2803,7 +2807,7 @@ static int may_delete_or_replace(struct inode *dir, struct dentry *victim, >   >  static int may_delete(struct inode *dir, struct dentry *victim, bool isdir) >  { > - return may_delete_or_replace(dir, victim, isdir, MAY_WRITE | MAY_EXEC); > + return may_delete_or_replace(dir, victim, isdir, MAY_EXEC); >  } >   >  static int may_replace(struct inode *dir, struct dentry *victim, bool isdir) > diff --git a/include/linux/fs.h b/include/linux/fs.h > index dd614ad..86bfa10 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -86,6 +86,8 @@ typedef int (dio_iodone_t)(struct kiocb *iocb, loff_t offset, >  #define MAY_NOT_BLOCK 0x00000080 >  #define MAY_CREATE_FILE 0x00000100 >  #define MAY_CREATE_DIR 0x00000200 > +#define MAY_DELETE_CHILD 0x00000400 > +#define MAY_DELETE_SELF 0x00000800 >   >  /* >   * flags in file.f_mode.  Note that FMODE_READ and FMODE_WRITE must correspond Reviewed-by: Jeff Layton From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from relay.sgi.com (relay3.corp.sgi.com [198.149.34.15]) by oss.sgi.com (Postfix) with ESMTP id 427637CC9 for ; Tue, 5 Jul 2016 06:07:56 -0500 (CDT) Received: from cuda.sgi.com (cuda2.sgi.com [192.48.176.25]) by relay3.corp.sgi.com (Postfix) with ESMTP id AFFE9AC001 for ; Tue, 5 Jul 2016 04:07:52 -0700 (PDT) Received: from mail-qk0-f178.google.com (mail-qk0-f178.google.com [209.85.220.178]) by cuda.sgi.com with ESMTP id 9zEFAjegRbuIUnjG (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Tue, 05 Jul 2016 04:07:50 -0700 (PDT) Received: by mail-qk0-f178.google.com with SMTP id e3so83060491qkd.0 for ; Tue, 05 Jul 2016 04:07:50 -0700 (PDT) Message-ID: <1467716867.3800.4.camel@redhat.com> Subject: Re: [PATCH v23 03/22] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags From: Jeff Layton Date: Tue, 05 Jul 2016 07:07:47 -0400 In-Reply-To: <1467294433-3222-4-git-send-email-agruenba@redhat.com> References: <1467294433-3222-1-git-send-email-agruenba@redhat.com> <1467294433-3222-4-git-send-email-agruenba@redhat.com> Mime-Version: 1.0 List-Id: XFS Filesystem from SGI List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: xfs-bounces@oss.sgi.com Sender: xfs-bounces@oss.sgi.com To: Andreas Gruenbacher , Alexander Viro Cc: "J. Bruce Fields" , linux-nfs@vger.kernel.org, Theodore Ts'o , linux-cifs@vger.kernel.org, linux-api@vger.kernel.org, Trond Myklebust , linux-kernel@vger.kernel.org, xfs@oss.sgi.com, Christoph Hellwig , Andreas Dilger , linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, Anna Schumaker T24gVGh1LCAyMDE2LTA2LTMwIGF0IDE1OjQ2ICswMjAwLCBBbmRyZWFzIEdydWVuYmFjaGVyIHdy b3RlOgo+IE5vcm1hbGx5LCBkZWxldGluZyBhIGZpbGUgcmVxdWlyZXMgTUFZX1dSSVRFIGFjY2Vz cyB0byB0aGUgcGFyZW50Cj4gZGlyZWN0b3J5LsKgwqBXaXRoIHJpY2hhY2xzLCBhIGZpbGUgbWF5 IGJlIGRlbGV0ZWQgd2l0aCBNQVlfREVMRVRFX0NISUxEIGFjY2Vzcwo+IHRvIHRoZSBwYXJlbnQg ZGlyZWN0b3J5IG9yIHdpdGggTUFZX0RFTEVURV9TRUxGIGFjY2VzcyB0byB0aGUgZmlsZS4KPiAK PiBUbyBzdXBwb3J0IHRoYXQsIHBhc3MgdGhlIE1BWV9ERUxFVEVfQ0hJTEQgbWFzayBmbGFnIHRv IGlub2RlX3Blcm1pc3Npb24oKQo+IHdoZW4gY2hlY2tpbmcgZm9yIGRlbGV0ZSBhY2Nlc3MgaW5z aWRlIGEgZGlyZWN0b3J5LCBhbmQgTUFZX0RFTEVURV9TRUxGCj4gd2hlbiBjaGVja2luZyBmb3Ig ZGVsZXRlIGFjY2VzcyB0byBhIGZpbGUgaXRlbGYuCj4gCgpNaW5vciBtaXNzcGVsbGluZyBpbiBj aGFuZ2Vsb2cgYWJvdmUuIEl0IHNob3VsZCBiZSAiaXRzZWxmIi4KCj4gVGhlIE1BWV9ERUxFVEVf U0VMRiBwZXJtaXNzaW9uIG92ZXJyaWRlcyB0aGUgc3RpY2t5IGRpcmVjdG9yeSBjaGVjay4KPiAK PiBTaWduZWQtb2ZmLWJ5OiBBbmRyZWFzIEdydWVuYmFjaGVyIDxhZ3J1ZW5iYUByZWRoYXQuY29t Pgo+IFJldmlld2VkLWJ5OiBKLiBCcnVjZSBGaWVsZHMgPGJmaWVsZHNAcmVkaGF0LmNvbT4KPiBS ZXZpZXdlZC1ieTogU3RldmUgRnJlbmNoIDxzdGV2ZS5mcmVuY2hAcHJpbWFyeWRhdGEuY29tPgo+ IC0tLQo+IMKgZnMvbmFtZWkuY8KgwqDCoMKgwqDCoMKgwqDCoHwgMjAgKysrKysrKysrKysrLS0t LS0tLS0KPiDCoGluY2x1ZGUvbGludXgvZnMuaCB8wqDCoDIgKysKPiDCoDIgZmlsZXMgY2hhbmdl ZCwgMTQgaW5zZXJ0aW9ucygrKSwgOCBkZWxldGlvbnMoLSkKPiAKPiBkaWZmIC0tZ2l0IGEvZnMv bmFtZWkuYyBiL2ZzL25hbWVpLmMKPiBpbmRleCBkYzkxODU4Li42NjM5MzNlIDEwMDY0NAo+IC0t LSBhL2ZzL25hbWVpLmMKPiArKysgYi9mcy9uYW1laS5jCj4gQEAgLTQ1NCw5ICs0NTQsOSBAQCBz dGF0aWMgaW50IHNiX3Blcm1pc3Npb24oc3RydWN0IHN1cGVyX2Jsb2NrICpzYiwgc3RydWN0IGlu b2RlICppbm9kZSwgaW50IG1hc2spCj4gwqAgKiB0aGlzLCBsZXR0aW5nIHVzIHNldCBhcmJpdHJh cnkgcGVybWlzc2lvbnMgZm9yIGZpbGVzeXN0ZW0gYWNjZXNzIHdpdGhvdXQKPiDCoCAqIGNoYW5n aW5nIHRoZSAibm9ybWFsIiBVSURzIHdoaWNoIGFyZSB1c2VkIGZvciBvdGhlciB0aGluZ3MuCj4g wqAgKgo+IC0gKiBNQVlfV1JJVEUgbXVzdCBiZSBzZXQgaW4gQG1hc2sgd2hlbmV2ZXIgTUFZX0FQ UEVORCwgTUFZX0NSRUFURV9GSUxFLCBvcgo+IC0gKiBNQVlfQ1JFQVRFX0RJUiBhcmUgc2V0LsKg wqBUaGF0IHdheSwgZmlsZSBzeXN0ZW1zIHRoYXQgZG9uJ3Qgc3VwcG9ydCB0aGVzZQo+IC0gKiBw ZXJtaXNzaW9ucyB3aWxsIGNoZWNrIGZvciBNQVlfV1JJVEUgaW5zdGVhZC4KPiArICogTUFZX1dS SVRFIG11c3QgYmUgc2V0IGluIEBtYXNrIHdoZW5ldmVyIE1BWV9BUFBFTkQsIE1BWV9DUkVBVEVf RklMRSwKPiArICogTUFZX0NSRUFURV9ESVIsIG9yIE1BWV9ERUxFVEVfQ0hJTEQgYXJlIHNldC7C oMKgVGhhdCB3YXksIGZpbGUgc3lzdGVtcyB0aGF0Cj4gKyAqIGRvbid0IHN1cHBvcnQgdGhlc2Ug cGVybWlzc2lvbnMgd2lsbCBjaGVjayBmb3IgTUFZX1dSSVRFIGluc3RlYWQuCj4gwqAgKi8KPiDC oGludCBpbm9kZV9wZXJtaXNzaW9uKHN0cnVjdCBpbm9kZSAqaW5vZGUsIGludCBtYXNrKQo+IMKg ewo+IEBAIC0yNzc4LDE0ICsyNzc4LDE4IEBAIHN0YXRpYyBpbnQgbWF5X2RlbGV0ZV9vcl9yZXBs YWNlKHN0cnVjdCBpbm9kZSAqZGlyLCBzdHJ1Y3QgZGVudHJ5ICp2aWN0aW0sCj4gwqAJQlVHX09O KHZpY3RpbS0+ZF9wYXJlbnQtPmRfaW5vZGUgIT0gZGlyKTsKPiDCoAlhdWRpdF9pbm9kZV9jaGls ZChkaXIsIHZpY3RpbSwgQVVESVRfVFlQRV9DSElMRF9ERUxFVEUpOwo+IMKgCj4gLQllcnJvciA9 IGlub2RlX3Blcm1pc3Npb24oZGlyLCBtYXNrKTsKPiArCWVycm9yID0gaW5vZGVfcGVybWlzc2lv bihkaXIsIG1hc2sgfCBNQVlfV1JJVEUgfCBNQVlfREVMRVRFX0NISUxEKTsKPiArCWlmICghZXJy b3IgJiYgY2hlY2tfc3RpY2t5KGRpciwgaW5vZGUpKQo+ICsJCWVycm9yID0gLUVQRVJNOwo+ICsJ aWYgKGVycm9yICYmIElTX1JJQ0hBQ0woaW5vZGUpICYmCj4gKwnCoMKgwqDCoGlub2RlX3Blcm1p c3Npb24oaW5vZGUsIE1BWV9ERUxFVEVfU0VMRikgPT0gMCAmJgo+ICsJwqDCoMKgwqBpbm9kZV9w ZXJtaXNzaW9uKGRpciwgbWFzaykgPT0gMCkKPiArCQllcnJvciA9IDA7Cj4gwqAJaWYgKGVycm9y KQo+IMKgCQlyZXR1cm4gZXJyb3I7Cj4gwqAJaWYgKElTX0FQUEVORChkaXIpKQo+IMKgCQlyZXR1 cm4gLUVQRVJNOwo+IC0KPiAtCWlmIChjaGVja19zdGlja3koZGlyLCBpbm9kZSkgfHwgSVNfQVBQ RU5EKGlub2RlKSB8fAo+IC0JwqDCoMKgwqBJU19JTU1VVEFCTEUoaW5vZGUpIHx8IElTX1NXQVBG SUxFKGlub2RlKSkKPiArCWlmIChJU19BUFBFTkQoaW5vZGUpIHx8IElTX0lNTVVUQUJMRShpbm9k ZSkgfHwgSVNfU1dBUEZJTEUoaW5vZGUpKQo+IMKgCQlyZXR1cm4gLUVQRVJNOwo+IMKgCWlmIChp c2Rpcikgewo+IMKgCQlpZiAoIWRfaXNfZGlyKHZpY3RpbSkpCj4gQEAgLTI4MDMsNyArMjgwNyw3 IEBAIHN0YXRpYyBpbnQgbWF5X2RlbGV0ZV9vcl9yZXBsYWNlKHN0cnVjdCBpbm9kZSAqZGlyLCBz dHJ1Y3QgZGVudHJ5ICp2aWN0aW0sCj4gwqAKPiDCoHN0YXRpYyBpbnQgbWF5X2RlbGV0ZShzdHJ1 Y3QgaW5vZGUgKmRpciwgc3RydWN0IGRlbnRyeSAqdmljdGltLCBib29sIGlzZGlyKQo+IMKgewo+ IC0JcmV0dXJuIG1heV9kZWxldGVfb3JfcmVwbGFjZShkaXIsIHZpY3RpbSwgaXNkaXIsIE1BWV9X UklURSB8IE1BWV9FWEVDKTsKPiArCXJldHVybiBtYXlfZGVsZXRlX29yX3JlcGxhY2UoZGlyLCB2 aWN0aW0sIGlzZGlyLCBNQVlfRVhFQyk7Cj4gwqB9Cj4gwqAKPiDCoHN0YXRpYyBpbnQgbWF5X3Jl cGxhY2Uoc3RydWN0IGlub2RlICpkaXIsIHN0cnVjdCBkZW50cnkgKnZpY3RpbSwgYm9vbCBpc2Rp cikKPiBkaWZmIC0tZ2l0IGEvaW5jbHVkZS9saW51eC9mcy5oIGIvaW5jbHVkZS9saW51eC9mcy5o Cj4gaW5kZXggZGQ2MTRhZC4uODZiZmExMCAxMDA2NDQKPiAtLS0gYS9pbmNsdWRlL2xpbnV4L2Zz LmgKPiArKysgYi9pbmNsdWRlL2xpbnV4L2ZzLmgKPiBAQCAtODYsNiArODYsOCBAQCB0eXBlZGVm IGludCAoZGlvX2lvZG9uZV90KShzdHJ1Y3Qga2lvY2IgKmlvY2IsIGxvZmZfdCBvZmZzZXQsCj4g wqAjZGVmaW5lIE1BWV9OT1RfQkxPQ0sJCTB4MDAwMDAwODAKPiDCoCNkZWZpbmUgTUFZX0NSRUFU RV9GSUxFCQkweDAwMDAwMTAwCj4gwqAjZGVmaW5lIE1BWV9DUkVBVEVfRElSCQkweDAwMDAwMjAw Cj4gKyNkZWZpbmUgTUFZX0RFTEVURV9DSElMRAkweDAwMDAwNDAwCj4gKyNkZWZpbmUgTUFZX0RF TEVURV9TRUxGCQkweDAwMDAwODAwCj4gwqAKPiDCoC8qCj4gwqAgKiBmbGFncyBpbiBmaWxlLmZf bW9kZS7CoMKgTm90ZSB0aGF0IEZNT0RFX1JFQUQgYW5kIEZNT0RFX1dSSVRFIG11c3QgY29ycmVz cG9uZAoKUmV2aWV3ZWQtYnk6IEplZmYgTGF5dG9uIDxqbGF5dG9uQHJlZGhhdC5jb20+CgpfX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwp4ZnMgbWFpbGluZyBs aXN0Cnhmc0Bvc3Muc2dpLmNvbQpodHRwOi8vb3NzLnNnaS5jb20vbWFpbG1hbi9saXN0aW5mby94 ZnMK