From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-23.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A8E53C433B4 for ; Fri, 7 May 2021 09:33:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 78A176145E for ; Fri, 7 May 2021 09:33:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236697AbhEGJeO (ORCPT ); Fri, 7 May 2021 05:34:14 -0400 Received: from linux.microsoft.com ([13.77.154.182]:36162 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230092AbhEGJeD (ORCPT ); Fri, 7 May 2021 05:34:03 -0400 Received: from minint-m3g9p8n.europe.corp.microsoft.com (unknown [49.207.195.141]) by linux.microsoft.com (Postfix) with ESMTPSA id 1D7AF20B7178; Fri, 7 May 2021 02:33:01 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 1D7AF20B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620379984; bh=AAKa+WXf4npmVNkCzj93bcUly6WwXQf3/AhT89AJV4I=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=itdmyfZMW69Z6wXF5OzikjEijoDF3XyNkT70NpqBKspDAsMr2MWOe16JR+SACV2Mm RoGRWU+Niq/FS1QsY8sAHlgKeyODwqsSpQICsWpfv0xwUiS946aDL4VMkpngVxEbUT xrWHPGyfoVphcaZdwFjWQ1UgtAcQbc+oS2QV1rxU= Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Subject: Re: [PATCH] optee: Disable shm cache when booting the crash kernel From: Allen Pais In-Reply-To: Date: Fri, 7 May 2021 15:02:58 +0530 Cc: Tyler Hicks , zajec5@gmail.com, Allen Pais , bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Content-Transfer-Encoding: quoted-printable Message-Id: <14C574FD-AF31-4D10-9685-E59FDD248C2C@linux.microsoft.com> References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210507035816.426585-1-tyhicks@linux.microsoft.com> <720CDF03-42F9-43C3-B3B3-999E4A5E2864@linux.microsoft.com> To: Jens Wiklander X-Mailer: Apple Mail (2.3654.60.0.2.21) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>=20 >>=20 >>> On 07-May-2021, at 9:28 AM, Tyler Hicks = wrote: >>>=20 >>> The .shutdown hook is not called after a kernel crash when a kdump >>> kernel is pre-loaded. A kexec into the kdump kernel takes place as >>> quickly as possible without allowing drivers to clean up. >>>=20 >>> That means that the OP-TEE shared memory cache, which was = initialized by >>> the kernel that crashed, is still in place when the kdump kernel is >>> booted. As the kdump kernel is shutdown, the .shutdown hook is = called, >>> which calls optee_disable_shm_cache(), and OP-TEE's >>> OPTEE_SMC_DISABLE_SHM_CACHE API returns virtual addresses that are = not >>> mapped for the kdump kernel since the cache was set up by the = previous >>> kernel. Trying to dereference the tee_shm pointer or otherwise = translate >>> the address results in a fault that cannot be handled: >>>=20 >>> Unable to handle kernel paging request at virtual address = ffff4317b9c09744 >>> Mem abort info: >>> ESR =3D 0x96000004 >>> EC =3D 0x25: DABT (current EL), IL =3D 32 bits >>> SET =3D 0, FnV =3D 0 >>> EA =3D 0, S1PTW =3D 0 >>> Data abort info: >>> ISV =3D 0, ISS =3D 0x00000004 >>> CM =3D 0, WnR =3D 0 >>> swapper pgtable: 4k pages, 48-bit VAs, pgdp=3D0000000970b1e000 >>> [ffff4317b9c09744] pgd=3D0000000000000000, p4d=3D0000000000000000 >>> Internal error: Oops: 96000004 [#1] SMP >>> Modules linked in: bnxt_en pcie_iproc_platform pcie_iproc diagbe(O) >>> CPU: 4 PID: 1 Comm: systemd-shutdow Tainted: G O = 5.10.19.8 #1 >>> Hardware name: Redacted (DT) >>> pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=3D--) >>> pc : tee_shm_free (/usr/src/kernel/drivers/tee/tee_shm.c:363) >>> lr : optee_disable_shm_cache = (/usr/src/kernel/drivers/tee/optee/call.c:441) >>> sp : ffff80001005bb70 >>> x29: ffff80001005bb70 x28: ffff608e74648e00 >>> x27: ffff80001005bb98 x26: dead000000000100 >>> x25: ffff80001005bbb8 x24: aaaaaaaaaaaaaaaa >>> x23: ffff608e74cf8818 x22: ffff608e738be600 >>> x21: ffff80001005bbc8 x20: ffff608e738be638 >>> x19: ffff4317b9c09700 x18: ffffffffffffffff >>> x17: 0000000000000041 x16: ffffba61b5171764 >>> x15: 0000000000000004 x14: 0000000000000fff >>> x13: ffffba61b5c9dfc8 x12: 0000000000000003 >>> x11: 0000000000000000 x10: 0000000000000000 >>> x9 : ffffba61b5413824 x8 : 00000000ffff4317 >>> x7 : 0000000000000000 x6 : 0000000000000000 >>> x5 : 0000000000000000 x4 : 0000000000000000 >>> x3 : 0000000000000000 x2 : ffff4317b9c09700 >>> x1 : 00000000ffff4317 x0 : ffff4317b9c09700 >>> Call trace: >>> tee_shm_free (/usr/src/kernel/drivers/tee/tee_shm.c:363) >>> optee_disable_shm_cache = (/usr/src/kernel/drivers/tee/optee/call.c:441) >>> optee_shutdown (/usr/src/kernel/drivers/tee/optee/core.c:636) >>> platform_drv_shutdown (/usr/src/kernel/drivers/base/platform.c:800) >>> device_shutdown (/usr/src/kernel/include/linux/device.h:758 = /usr/src/kernel/drivers/base/core.c:4078) >>> kernel_restart (/usr/src/kernel/kernel/reboot.c:221 = /usr/src/kernel/kernel/reboot.c:248) >>> __arm64_sys_reboot (/usr/src/kernel/kernel/reboot.c:349 = /usr/src/kernel/kernel/reboot.c:312 /usr/src/kernel/kernel/reboot.c:312) >>> do_el0_svc (/usr/src/kernel/arch/arm64/kernel/syscall.c:56 = /usr/src/kernel/arch/arm64/kernel/syscall.c:158 = /usr/src/kernel/arch/arm64/kernel/syscall.c:197) >>> el0_svc (/usr/src/kernel/arch/arm64/kernel/entry-common.c:368) >>> el0_sync_handler = (/usr/src/kernel/arch/arm64/kernel/entry-common.c:428) >>> el0_sync (/usr/src/kernel/arch/arm64/kernel/entry.S:671) >>> Code: aa0003f3 b5000060 12800003 14000002 (b9404663) >>>=20 >>> When booting the kdump kernel, drain the shared memory cache while = being >>> careful to not translate the addresses returned from >>> OPTEE_SMC_DISABLE_SHM_CACHE. Once the invalid cache objects are = drained >>> and the cache is disabled, proceed with re-enabling the cache so = that we >>> aren't dealing with invalid addresses while shutting down the kdump >>> kernel. >>>=20 >>> Signed-off-by: Tyler Hicks >>> --- >>>=20 >>> This patch fixes a crash introduced by "optee: fix tee out of memory >>> failure seen during kexec reboot"[1]. However, I don't think that = the >>> original two patch series[2] plus this patch is the full solution to >>> properly handling OP-TEE shared memory across kexec. >>>=20 >>> While testing this fix, I did about 10 kexec reboots and then = triggered >>> a kernel crash by writing 'c' to /proc/sysrq-trigger. The kdump = kernel >>> became unresponsive during boot while steadily streaming the = following >>> errors to the serial console: >>>=20 >>> arm-smmu 64000000.mmu: Blocked unknown Stream ID 0x2000; boot with = "arm-smmu.disable_bypass=3D0" to allow, but this may have security = implications >>> arm-smmu 64000000.mmu: GFSR 0x00000002, GFSYNR0 0x00000002, = GFSYNR1 0x00002000, GFSYNR2 0x00000000 >>>=20 >>> I suspect that this is related to the problems of OP-TEE shared = memory >>> handling across kexec. My current hunch is that while we've disabled = the >>> shared memory cache with this patch, we haven't unregistered all of = the >>> addresses that the previous kernel (which crashed) had registered = with >>> OP-TEE and that perhaps OP-TEE OS is still trying to make use those >>> addresses? >>>=20 >>> I'm still pretty early in investigating that assumption and >>> I'm learning about OP-TEE as I go but I wanted to get this initial >>> fix-of-the-fix out so that it was clear that the v2 of the series[2] = is >>> not complete. >>>=20 >>> [1] = https://lore.kernel.org/lkml/20210225090610.242623-2-allen.lkml@gmail.com/= >>> [2] = https://lore.kernel.org/lkml/20210225090610.242623-1-allen.lkml@gmail.com/= #t >>>=20 >>> drivers/tee/optee/call.c | 11 ++++++++++- >>> drivers/tee/optee/core.c | 13 +++++++++++-- >>> drivers/tee/optee/optee_private.h | 2 +- >>> 3 files changed, 22 insertions(+), 4 deletions(-) >>>=20 >>> diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c >>> index 6132cc8d014c..799e84bec63d 100644 >>> --- a/drivers/tee/optee/call.c >>> +++ b/drivers/tee/optee/call.c >>> @@ -417,8 +417,10 @@ void optee_enable_shm_cache(struct optee = *optee) >>> * optee_disable_shm_cache() - Disables caching of some shared memory = allocation >>> * in OP-TEE >>> * @optee: main service struct >>> + * @is_mapped: true if the cached shared memory addresses = were mapped by this >>> + * kernel, are safe to dereference, and should be freed >>> */ >>> -void optee_disable_shm_cache(struct optee *optee) >>> +void optee_disable_shm_cache(struct optee *optee, bool is_mapped) >>> { >>> struct optee_call_waiter w; >>>=20 >>> @@ -437,6 +439,13 @@ void optee_disable_shm_cache(struct optee = *optee) >>> if (res.result.status =3D=3D OPTEE_SMC_RETURN_OK) { >>> struct tee_shm *shm; >>>=20 >>=20 >> Thanks Tyler. >> =46rom what I understand from my email exchange with Jens, I don=E2=80=99= t >> Think we want to touch optee_disable_shm_cache(), I could be wrong = too, >> @Jens, comments? >=20 > Changing optee_disable_shm_cache() is fine. Bear in mind that there > are other times where we can't recover from a kernel crash. For > instance if a thread is executing in OP-TEE in secure world. I agree. My bad, I meant, =E2=80=9Cwe don=E2=80=99t want to touch = optee_disable_shm_cache()=E2=80=9D. And precisely for the reason you have mentioned above. Thanks.= From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9C389C433ED for ; Fri, 7 May 2021 09:34:44 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 16E226145D for ; Fri, 7 May 2021 09:34:44 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 16E226145D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:To:References:Message-Id:Cc:Date:In-Reply-To:From: Subject:Mime-Version:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=2M0Em3H6wnsM4qYfU9i1QZqqgX5Ali5oXcpKmaTLH0c=; b=gTPh1EQoavlY7qfx1aSBe1im0 7vSMlVi9BAxt19xWVJUDyUgcofKdRsYjm0JcfJHB6AEcCXAqxsiLzgPTTBB5x+XQsb0BOSOC2hT3+ ZLt1SEDEyXtpQPcWwA8W4nuaIXmyxi+bRiz2i/k2BQNQv5sj9IIyEczMxs+Me8zXwGBk0DL3BpKGU PpIpgRjq/1gkjUDSNfzB2vJ+6TGy/edhSePoEuDT2gXjfxW4K1SfHCvNP6aHBDUf/IEhnybuFnLML oIzTxNQH2RAm9QUEt7ok3/s82gk4rt8dCyRn/UiUtgOI32IrYZoUIX7MTzjWhuwwEO/6pXb+8Uz0s 64Unkoi6g==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lewr9-006fut-LY; Fri, 07 May 2021 09:33:12 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lewr7-006fuX-0A for linux-arm-kernel@desiato.infradead.org; Fri, 07 May 2021 09:33:09 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description; bh=AAKa+WXf4npmVNkCzj93bcUly6WwXQf3/AhT89AJV4I=; b=Ms0J89s7357AFRW65Q6Bd0XEtM 0CTaA/7Hyw9R8rCvMsmCYqQ6d9vsE6/2DxYJxZZ8OOTJpa6HlQwVYq2YxRC7KrObxpXuhXVLpJqag ddr32RNHnZMQ8A40iPQ57ErEC40QD90TrbSsG5oFoezyFlgiWAKwGM+sxF0d+TKAm3dPvr8j0j2nR OyFIBNLa7nAAY5drp5Fr75lgQAj/tJd4Y0411J5zn6WNlmP+W6ddpxoQWpgWPH+71osyXpzZP3ymL mEA6r77jA4XqxzlmPGEbXfy14z2EFmbW0yAcHOKdbDsCVEsjGs/2quX/ZCZT79ETaQkC5WyCcxSE/ /n8/yVSQ==; Received: from linux.microsoft.com ([13.77.154.182]) by bombadil.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lewr3-006jsf-P6 for linux-arm-kernel@lists.infradead.org; Fri, 07 May 2021 09:33:07 +0000 Received: from minint-m3g9p8n.europe.corp.microsoft.com (unknown [49.207.195.141]) by linux.microsoft.com (Postfix) with ESMTPSA id 1D7AF20B7178; Fri, 7 May 2021 02:33:01 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 1D7AF20B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620379984; bh=AAKa+WXf4npmVNkCzj93bcUly6WwXQf3/AhT89AJV4I=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=itdmyfZMW69Z6wXF5OzikjEijoDF3XyNkT70NpqBKspDAsMr2MWOe16JR+SACV2Mm RoGRWU+Niq/FS1QsY8sAHlgKeyODwqsSpQICsWpfv0xwUiS946aDL4VMkpngVxEbUT xrWHPGyfoVphcaZdwFjWQ1UgtAcQbc+oS2QV1rxU= Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Subject: Re: [PATCH] optee: Disable shm cache when booting the crash kernel From: Allen Pais In-Reply-To: Date: Fri, 7 May 2021 15:02:58 +0530 Cc: Tyler Hicks , zajec5@gmail.com, Allen Pais , bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Message-Id: <14C574FD-AF31-4D10-9685-E59FDD248C2C@linux.microsoft.com> References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210507035816.426585-1-tyhicks@linux.microsoft.com> <720CDF03-42F9-43C3-B3B3-999E4A5E2864@linux.microsoft.com> To: Jens Wiklander X-Mailer: Apple Mail (2.3654.60.0.2.21) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210507_023305_925118_44DEA885 X-CRM114-Status: GOOD ( 22.35 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Pj4gCj4+IAo+Pj4gT24gMDctTWF5LTIwMjEsIGF0IDk6MjggQU0sIFR5bGVyIEhpY2tzIDx0eWhp Y2tzQGxpbnV4Lm1pY3Jvc29mdC5jb20+IHdyb3RlOgo+Pj4gCj4+PiBUaGUgLnNodXRkb3duIGhv b2sgaXMgbm90IGNhbGxlZCBhZnRlciBhIGtlcm5lbCBjcmFzaCB3aGVuIGEga2R1bXAKPj4+IGtl cm5lbCBpcyBwcmUtbG9hZGVkLiBBIGtleGVjIGludG8gdGhlIGtkdW1wIGtlcm5lbCB0YWtlcyBw bGFjZSBhcwo+Pj4gcXVpY2tseSBhcyBwb3NzaWJsZSB3aXRob3V0IGFsbG93aW5nIGRyaXZlcnMg dG8gY2xlYW4gdXAuCj4+PiAKPj4+IFRoYXQgbWVhbnMgdGhhdCB0aGUgT1AtVEVFIHNoYXJlZCBt ZW1vcnkgY2FjaGUsIHdoaWNoIHdhcyBpbml0aWFsaXplZCBieQo+Pj4gdGhlIGtlcm5lbCB0aGF0 IGNyYXNoZWQsIGlzIHN0aWxsIGluIHBsYWNlIHdoZW4gdGhlIGtkdW1wIGtlcm5lbCBpcwo+Pj4g Ym9vdGVkLiBBcyB0aGUga2R1bXAga2VybmVsIGlzIHNodXRkb3duLCB0aGUgLnNodXRkb3duIGhv b2sgaXMgY2FsbGVkLAo+Pj4gd2hpY2ggY2FsbHMgb3B0ZWVfZGlzYWJsZV9zaG1fY2FjaGUoKSwg YW5kIE9QLVRFRSdzCj4+PiBPUFRFRV9TTUNfRElTQUJMRV9TSE1fQ0FDSEUgQVBJIHJldHVybnMg dmlydHVhbCBhZGRyZXNzZXMgdGhhdCBhcmUgbm90Cj4+PiBtYXBwZWQgZm9yIHRoZSBrZHVtcCBr ZXJuZWwgc2luY2UgdGhlIGNhY2hlIHdhcyBzZXQgdXAgYnkgdGhlIHByZXZpb3VzCj4+PiBrZXJu ZWwuIFRyeWluZyB0byBkZXJlZmVyZW5jZSB0aGUgdGVlX3NobSBwb2ludGVyIG9yIG90aGVyd2lz ZSB0cmFuc2xhdGUKPj4+IHRoZSBhZGRyZXNzIHJlc3VsdHMgaW4gYSBmYXVsdCB0aGF0IGNhbm5v dCBiZSBoYW5kbGVkOgo+Pj4gCj4+PiBVbmFibGUgdG8gaGFuZGxlIGtlcm5lbCBwYWdpbmcgcmVx dWVzdCBhdCB2aXJ0dWFsIGFkZHJlc3MgZmZmZjQzMTdiOWMwOTc0NAo+Pj4gTWVtIGFib3J0IGlu Zm86Cj4+PiAgRVNSID0gMHg5NjAwMDAwNAo+Pj4gIEVDID0gMHgyNTogREFCVCAoY3VycmVudCBF TCksIElMID0gMzIgYml0cwo+Pj4gIFNFVCA9IDAsIEZuViA9IDAKPj4+ICBFQSA9IDAsIFMxUFRX ID0gMAo+Pj4gRGF0YSBhYm9ydCBpbmZvOgo+Pj4gIElTViA9IDAsIElTUyA9IDB4MDAwMDAwMDQK Pj4+ICBDTSA9IDAsIFduUiA9IDAKPj4+IHN3YXBwZXIgcGd0YWJsZTogNGsgcGFnZXMsIDQ4LWJp dCBWQXMsIHBnZHA9MDAwMDAwMDk3MGIxZTAwMAo+Pj4gW2ZmZmY0MzE3YjljMDk3NDRdIHBnZD0w MDAwMDAwMDAwMDAwMDAwLCBwNGQ9MDAwMDAwMDAwMDAwMDAwMAo+Pj4gSW50ZXJuYWwgZXJyb3I6 IE9vcHM6IDk2MDAwMDA0IFsjMV0gU01QCj4+PiBNb2R1bGVzIGxpbmtlZCBpbjogYm54dF9lbiBw Y2llX2lwcm9jX3BsYXRmb3JtIHBjaWVfaXByb2MgZGlhZ2JlKE8pCj4+PiBDUFU6IDQgUElEOiAx IENvbW06IHN5c3RlbWQtc2h1dGRvdyBUYWludGVkOiBHICAgICAgICAgICBPICAgICAgNS4xMC4x OS44ICMxCj4+PiBIYXJkd2FyZSBuYW1lOiBSZWRhY3RlZCAoRFQpCj4+PiBwc3RhdGU6IDYwNDAw MDA1IChuWkN2IGRhaWYgK1BBTiAtVUFPIC1UQ08gQlRZUEU9LS0pCj4+PiBwYyA6IHRlZV9zaG1f ZnJlZSAoL3Vzci9zcmMva2VybmVsL2RyaXZlcnMvdGVlL3RlZV9zaG0uYzozNjMpCj4+PiBsciA6 IG9wdGVlX2Rpc2FibGVfc2htX2NhY2hlICgvdXNyL3NyYy9rZXJuZWwvZHJpdmVycy90ZWUvb3B0 ZWUvY2FsbC5jOjQ0MSkKPj4+IHNwIDogZmZmZjgwMDAxMDA1YmI3MAo+Pj4geDI5OiBmZmZmODAw MDEwMDViYjcwIHgyODogZmZmZjYwOGU3NDY0OGUwMAo+Pj4geDI3OiBmZmZmODAwMDEwMDViYjk4 IHgyNjogZGVhZDAwMDAwMDAwMDEwMAo+Pj4geDI1OiBmZmZmODAwMDEwMDViYmI4IHgyNDogYWFh YWFhYWFhYWFhYWFhYQo+Pj4geDIzOiBmZmZmNjA4ZTc0Y2Y4ODE4IHgyMjogZmZmZjYwOGU3Mzhi ZTYwMAo+Pj4geDIxOiBmZmZmODAwMDEwMDViYmM4IHgyMDogZmZmZjYwOGU3MzhiZTYzOAo+Pj4g eDE5OiBmZmZmNDMxN2I5YzA5NzAwIHgxODogZmZmZmZmZmZmZmZmZmZmZgo+Pj4geDE3OiAwMDAw MDAwMDAwMDAwMDQxIHgxNjogZmZmZmJhNjFiNTE3MTc2NAo+Pj4geDE1OiAwMDAwMDAwMDAwMDAw MDA0IHgxNDogMDAwMDAwMDAwMDAwMGZmZgo+Pj4geDEzOiBmZmZmYmE2MWI1YzlkZmM4IHgxMjog MDAwMDAwMDAwMDAwMDAwMwo+Pj4geDExOiAwMDAwMDAwMDAwMDAwMDAwIHgxMDogMDAwMDAwMDAw MDAwMDAwMAo+Pj4geDkgOiBmZmZmYmE2MWI1NDEzODI0IHg4IDogMDAwMDAwMDBmZmZmNDMxNwo+ Pj4geDcgOiAwMDAwMDAwMDAwMDAwMDAwIHg2IDogMDAwMDAwMDAwMDAwMDAwMAo+Pj4geDUgOiAw MDAwMDAwMDAwMDAwMDAwIHg0IDogMDAwMDAwMDAwMDAwMDAwMAo+Pj4geDMgOiAwMDAwMDAwMDAw MDAwMDAwIHgyIDogZmZmZjQzMTdiOWMwOTcwMAo+Pj4geDEgOiAwMDAwMDAwMGZmZmY0MzE3IHgw IDogZmZmZjQzMTdiOWMwOTcwMAo+Pj4gQ2FsbCB0cmFjZToKPj4+IHRlZV9zaG1fZnJlZSAoL3Vz ci9zcmMva2VybmVsL2RyaXZlcnMvdGVlL3RlZV9zaG0uYzozNjMpCj4+PiBvcHRlZV9kaXNhYmxl X3NobV9jYWNoZSAoL3Vzci9zcmMva2VybmVsL2RyaXZlcnMvdGVlL29wdGVlL2NhbGwuYzo0NDEp Cj4+PiBvcHRlZV9zaHV0ZG93biAoL3Vzci9zcmMva2VybmVsL2RyaXZlcnMvdGVlL29wdGVlL2Nv cmUuYzo2MzYpCj4+PiBwbGF0Zm9ybV9kcnZfc2h1dGRvd24gKC91c3Ivc3JjL2tlcm5lbC9kcml2 ZXJzL2Jhc2UvcGxhdGZvcm0uYzo4MDApCj4+PiBkZXZpY2Vfc2h1dGRvd24gKC91c3Ivc3JjL2tl cm5lbC9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjc1OCAvdXNyL3NyYy9rZXJuZWwvZHJpdmVycy9i YXNlL2NvcmUuYzo0MDc4KQo+Pj4ga2VybmVsX3Jlc3RhcnQgKC91c3Ivc3JjL2tlcm5lbC9rZXJu ZWwvcmVib290LmM6MjIxIC91c3Ivc3JjL2tlcm5lbC9rZXJuZWwvcmVib290LmM6MjQ4KQo+Pj4g X19hcm02NF9zeXNfcmVib290ICgvdXNyL3NyYy9rZXJuZWwva2VybmVsL3JlYm9vdC5jOjM0OSAv dXNyL3NyYy9rZXJuZWwva2VybmVsL3JlYm9vdC5jOjMxMiAvdXNyL3NyYy9rZXJuZWwva2VybmVs L3JlYm9vdC5jOjMxMikKPj4+IGRvX2VsMF9zdmMgKC91c3Ivc3JjL2tlcm5lbC9hcmNoL2FybTY0 L2tlcm5lbC9zeXNjYWxsLmM6NTYgL3Vzci9zcmMva2VybmVsL2FyY2gvYXJtNjQva2VybmVsL3N5 c2NhbGwuYzoxNTggL3Vzci9zcmMva2VybmVsL2FyY2gvYXJtNjQva2VybmVsL3N5c2NhbGwuYzox OTcpCj4+PiBlbDBfc3ZjICgvdXNyL3NyYy9rZXJuZWwvYXJjaC9hcm02NC9rZXJuZWwvZW50cnkt Y29tbW9uLmM6MzY4KQo+Pj4gZWwwX3N5bmNfaGFuZGxlciAoL3Vzci9zcmMva2VybmVsL2FyY2gv YXJtNjQva2VybmVsL2VudHJ5LWNvbW1vbi5jOjQyOCkKPj4+IGVsMF9zeW5jICgvdXNyL3NyYy9r ZXJuZWwvYXJjaC9hcm02NC9rZXJuZWwvZW50cnkuUzo2NzEpCj4+PiBDb2RlOiBhYTAwMDNmMyBi NTAwMDA2MCAxMjgwMDAwMyAxNDAwMDAwMiAoYjk0MDQ2NjMpCj4+PiAKPj4+IFdoZW4gYm9vdGlu ZyB0aGUga2R1bXAga2VybmVsLCBkcmFpbiB0aGUgc2hhcmVkIG1lbW9yeSBjYWNoZSB3aGlsZSBi ZWluZwo+Pj4gY2FyZWZ1bCB0byBub3QgdHJhbnNsYXRlIHRoZSBhZGRyZXNzZXMgcmV0dXJuZWQg ZnJvbQo+Pj4gT1BURUVfU01DX0RJU0FCTEVfU0hNX0NBQ0hFLiBPbmNlIHRoZSBpbnZhbGlkIGNh Y2hlIG9iamVjdHMgYXJlIGRyYWluZWQKPj4+IGFuZCB0aGUgY2FjaGUgaXMgZGlzYWJsZWQsIHBy b2NlZWQgd2l0aCByZS1lbmFibGluZyB0aGUgY2FjaGUgc28gdGhhdCB3ZQo+Pj4gYXJlbid0IGRl YWxpbmcgd2l0aCBpbnZhbGlkIGFkZHJlc3NlcyB3aGlsZSBzaHV0dGluZyBkb3duIHRoZSBrZHVt cAo+Pj4ga2VybmVsLgo+Pj4gCj4+PiBTaWduZWQtb2ZmLWJ5OiBUeWxlciBIaWNrcyA8dHloaWNr c0BsaW51eC5taWNyb3NvZnQuY29tPgo+Pj4gLS0tCj4+PiAKPj4+IFRoaXMgcGF0Y2ggZml4ZXMg YSBjcmFzaCBpbnRyb2R1Y2VkIGJ5ICJvcHRlZTogZml4IHRlZSBvdXQgb2YgbWVtb3J5Cj4+PiBm YWlsdXJlIHNlZW4gZHVyaW5nIGtleGVjIHJlYm9vdCJbMV0uIEhvd2V2ZXIsIEkgZG9uJ3QgdGhp bmsgdGhhdCB0aGUKPj4+IG9yaWdpbmFsIHR3byBwYXRjaCBzZXJpZXNbMl0gcGx1cyB0aGlzIHBh dGNoIGlzIHRoZSBmdWxsIHNvbHV0aW9uIHRvCj4+PiBwcm9wZXJseSBoYW5kbGluZyBPUC1URUUg c2hhcmVkIG1lbW9yeSBhY3Jvc3Mga2V4ZWMuCj4+PiAKPj4+IFdoaWxlIHRlc3RpbmcgdGhpcyBm aXgsIEkgZGlkIGFib3V0IDEwIGtleGVjIHJlYm9vdHMgYW5kIHRoZW4gdHJpZ2dlcmVkCj4+PiBh IGtlcm5lbCBjcmFzaCBieSB3cml0aW5nICdjJyB0byAvcHJvYy9zeXNycS10cmlnZ2VyLiBUaGUg a2R1bXAga2VybmVsCj4+PiBiZWNhbWUgdW5yZXNwb25zaXZlIGR1cmluZyBib290IHdoaWxlIHN0 ZWFkaWx5IHN0cmVhbWluZyB0aGUgZm9sbG93aW5nCj4+PiBlcnJvcnMgdG8gdGhlIHNlcmlhbCBj b25zb2xlOgo+Pj4gCj4+PiBhcm0tc21tdSA2NDAwMDAwMC5tbXU6IEJsb2NrZWQgdW5rbm93biBT dHJlYW0gSUQgMHgyMDAwOyBib290IHdpdGggImFybS1zbW11LmRpc2FibGVfYnlwYXNzPTAiIHRv IGFsbG93LCBidXQgdGhpcyBtYXkgaGF2ZSBzZWN1cml0eSBpbXBsaWNhdGlvbnMKPj4+IGFybS1z bW11IDY0MDAwMDAwLm1tdTogICAgIEdGU1IgMHgwMDAwMDAwMiwgR0ZTWU5SMCAweDAwMDAwMDAy LCBHRlNZTlIxIDB4MDAwMDIwMDAsIEdGU1lOUjIgMHgwMDAwMDAwMAo+Pj4gCj4+PiBJIHN1c3Bl Y3QgdGhhdCB0aGlzIGlzIHJlbGF0ZWQgdG8gdGhlIHByb2JsZW1zIG9mIE9QLVRFRSBzaGFyZWQg bWVtb3J5Cj4+PiBoYW5kbGluZyBhY3Jvc3Mga2V4ZWMuIE15IGN1cnJlbnQgaHVuY2ggaXMgdGhh dCB3aGlsZSB3ZSd2ZSBkaXNhYmxlZCB0aGUKPj4+IHNoYXJlZCBtZW1vcnkgY2FjaGUgd2l0aCB0 aGlzIHBhdGNoLCB3ZSBoYXZlbid0IHVucmVnaXN0ZXJlZCBhbGwgb2YgdGhlCj4+PiBhZGRyZXNz ZXMgdGhhdCB0aGUgcHJldmlvdXMga2VybmVsICh3aGljaCBjcmFzaGVkKSBoYWQgcmVnaXN0ZXJl ZCB3aXRoCj4+PiBPUC1URUUgYW5kIHRoYXQgcGVyaGFwcyBPUC1URUUgT1MgaXMgc3RpbGwgdHJ5 aW5nIHRvIG1ha2UgdXNlIHRob3NlCj4+PiBhZGRyZXNzZXM/Cj4+PiAKPj4+IEknbSBzdGlsbCBw cmV0dHkgZWFybHkgaW4gaW52ZXN0aWdhdGluZyB0aGF0IGFzc3VtcHRpb24gYW5kCj4+PiBJJ20g bGVhcm5pbmcgYWJvdXQgT1AtVEVFIGFzIEkgZ28gYnV0IEkgd2FudGVkIHRvIGdldCB0aGlzIGlu aXRpYWwKPj4+IGZpeC1vZi10aGUtZml4IG91dCBzbyB0aGF0IGl0IHdhcyBjbGVhciB0aGF0IHRo ZSB2MiBvZiB0aGUgc2VyaWVzWzJdIGlzCj4+PiBub3QgY29tcGxldGUuCj4+PiAKPj4+IFsxXSBo dHRwczovL2xvcmUua2VybmVsLm9yZy9sa21sLzIwMjEwMjI1MDkwNjEwLjI0MjYyMy0yLWFsbGVu LmxrbWxAZ21haWwuY29tLwo+Pj4gWzJdIGh0dHBzOi8vbG9yZS5rZXJuZWwub3JnL2xrbWwvMjAy MTAyMjUwOTA2MTAuMjQyNjIzLTEtYWxsZW4ubGttbEBnbWFpbC5jb20vI3QKPj4+IAo+Pj4gZHJp dmVycy90ZWUvb3B0ZWUvY2FsbC5jICAgICAgICAgIHwgMTEgKysrKysrKysrKy0KPj4+IGRyaXZl cnMvdGVlL29wdGVlL2NvcmUuYyAgICAgICAgICB8IDEzICsrKysrKysrKysrLS0KPj4+IGRyaXZl cnMvdGVlL29wdGVlL29wdGVlX3ByaXZhdGUuaCB8ICAyICstCj4+PiAzIGZpbGVzIGNoYW5nZWQs IDIyIGluc2VydGlvbnMoKyksIDQgZGVsZXRpb25zKC0pCj4+PiAKPj4+IGRpZmYgLS1naXQgYS9k cml2ZXJzL3RlZS9vcHRlZS9jYWxsLmMgYi9kcml2ZXJzL3RlZS9vcHRlZS9jYWxsLmMKPj4+IGlu ZGV4IDYxMzJjYzhkMDE0Yy4uNzk5ZTg0YmVjNjNkIDEwMDY0NAo+Pj4gLS0tIGEvZHJpdmVycy90 ZWUvb3B0ZWUvY2FsbC5jCj4+PiArKysgYi9kcml2ZXJzL3RlZS9vcHRlZS9jYWxsLmMKPj4+IEBA IC00MTcsOCArNDE3LDEwIEBAIHZvaWQgb3B0ZWVfZW5hYmxlX3NobV9jYWNoZShzdHJ1Y3Qgb3B0 ZWUgKm9wdGVlKQo+Pj4gKiBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZSgpIC0gRGlzYWJsZXMgY2Fj aGluZyBvZiBzb21lIHNoYXJlZCBtZW1vcnkgYWxsb2NhdGlvbgo+Pj4gKiAgICAgICAgICAgICAg ICAgICAgICAgICAgaW4gT1AtVEVFCj4+PiAqIEBvcHRlZTogICAgbWFpbiBzZXJ2aWNlIHN0cnVj dAo+Pj4gKyAqIEBpc19tYXBwZWQ6ICAgICAgIHRydWUgaWYgdGhlIGNhY2hlZCBzaGFyZWQgbWVt b3J5IGFkZHJlc3NlcyB3ZXJlIG1hcHBlZCBieSB0aGlzCj4+PiArICogICAgICAgICAgIGtlcm5l bCwgYXJlIHNhZmUgdG8gZGVyZWZlcmVuY2UsIGFuZCBzaG91bGQgYmUgZnJlZWQKPj4+ICovCj4+ PiAtdm9pZCBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZShzdHJ1Y3Qgb3B0ZWUgKm9wdGVlKQo+Pj4g K3ZvaWQgb3B0ZWVfZGlzYWJsZV9zaG1fY2FjaGUoc3RydWN0IG9wdGVlICpvcHRlZSwgYm9vbCBp c19tYXBwZWQpCj4+PiB7Cj4+PiAgICAgIHN0cnVjdCBvcHRlZV9jYWxsX3dhaXRlciB3Owo+Pj4g Cj4+PiBAQCAtNDM3LDYgKzQzOSwxMyBAQCB2b2lkIG9wdGVlX2Rpc2FibGVfc2htX2NhY2hlKHN0 cnVjdCBvcHRlZSAqb3B0ZWUpCj4+PiAgICAgICAgICAgICAgaWYgKHJlcy5yZXN1bHQuc3RhdHVz ID09IE9QVEVFX1NNQ19SRVRVUk5fT0spIHsKPj4+ICAgICAgICAgICAgICAgICAgICAgIHN0cnVj dCB0ZWVfc2htICpzaG07Cj4+PiAKPj4gCj4+IFRoYW5rcyBUeWxlci4KPj4gRnJvbSB3aGF0IEkg dW5kZXJzdGFuZCBmcm9tIG15IGVtYWlsIGV4Y2hhbmdlIHdpdGggSmVucywgSSBkb27igJl0Cj4+ IFRoaW5rIHdlIHdhbnQgdG8gdG91Y2ggb3B0ZWVfZGlzYWJsZV9zaG1fY2FjaGUoKSwgSSBjb3Vs ZCBiZSB3cm9uZyB0b28sCj4+IEBKZW5zLCBjb21tZW50cz8KPiAKPiBDaGFuZ2luZyBvcHRlZV9k aXNhYmxlX3NobV9jYWNoZSgpIGlzIGZpbmUuIEJlYXIgaW4gbWluZCB0aGF0IHRoZXJlCj4gYXJl IG90aGVyIHRpbWVzIHdoZXJlIHdlIGNhbid0IHJlY292ZXIgZnJvbSBhIGtlcm5lbCBjcmFzaC4g Rm9yCj4gaW5zdGFuY2UgaWYgYSB0aHJlYWQgaXMgZXhlY3V0aW5nIGluIE9QLVRFRSBpbiBzZWN1 cmUgd29ybGQuCgpJIGFncmVlLiBNeSBiYWQsIEkgbWVhbnQsIOKAnHdlIGRvbuKAmXQgd2FudCB0 byB0b3VjaCBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZSgp4oCdLgpBbmQgcHJlY2lzZWx5IGZvciB0 aGUgcmVhc29uIHlvdSBoYXZlIG1lbnRpb25lZCBhYm92ZS4KClRoYW5rcy4KX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KbGludXgtYXJtLWtlcm5lbCBtYWls aW5nIGxpc3QKbGludXgtYXJtLWtlcm5lbEBsaXN0cy5pbmZyYWRlYWQub3JnCmh0dHA6Ly9saXN0 cy5pbmZyYWRlYWQub3JnL21haWxtYW4vbGlzdGluZm8vbGludXgtYXJtLWtlcm5lbAo=