From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751553AbeDNAwL (ORCPT ); Fri, 13 Apr 2018 20:52:11 -0400 Received: from freki.datenkhaos.de ([81.7.17.101]:48570 "EHLO freki.datenkhaos.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750980AbeDNAwJ (ORCPT ); Fri, 13 Apr 2018 20:52:09 -0400 Date: Sat, 14 Apr 2018 02:42:31 +0200 From: Johannes Hirte To: Yazen Ghannam Cc: linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org, bp@suse.de, tony.luck@intel.com, x86@kernel.org Subject: Re: [PATCH 3/3] x86/MCE/AMD: Get address from already initialized block Message-ID: <20180414004230.GA2033@probook> References: <20180201184813.82253-1-Yazen.Ghannam@amd.com> <20180201184813.82253-3-Yazen.Ghannam@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180201184813.82253-3-Yazen.Ghannam@amd.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018 Feb 01, Yazen Ghannam wrote: > From: Yazen Ghannam > > The block address is saved after the block is initialized when > threshold_init_device() is called. > > Use the saved block address, if available, rather than trying to > rediscover it. > > We can avoid some *on_cpu() calls in the init path that will cause a > call trace when resuming from suspend. > > Cc: # 4.14.x > Signed-off-by: Yazen Ghannam > --- > arch/x86/kernel/cpu/mcheck/mce_amd.c | 15 +++++++++++++++ > 1 file changed, 15 insertions(+) > > diff --git a/arch/x86/kernel/cpu/mcheck/mce_amd.c b/arch/x86/kernel/cpu/mcheck/mce_amd.c > index bf53b4549a17..8c4f8f30c779 100644 > --- a/arch/x86/kernel/cpu/mcheck/mce_amd.c > +++ b/arch/x86/kernel/cpu/mcheck/mce_amd.c > @@ -436,6 +436,21 @@ static u32 get_block_address(unsigned int cpu, u32 current_addr, u32 low, u32 hi > { > u32 addr = 0, offset = 0; > > + if ((bank >= mca_cfg.banks) || (block >= NR_BLOCKS)) > + return addr; > + > + /* Get address from already initialized block. */ > + if (per_cpu(threshold_banks, cpu)) { > + struct threshold_bank *bankp = per_cpu(threshold_banks, cpu)[bank]; > + > + if (bankp && bankp->blocks) { > + struct threshold_block *blockp = &bankp->blocks[block]; > + > + if (blockp) > + return blockp->address; > + } > + } > + > if (mce_flags.smca) { > if (smca_get_bank_type(bank) == SMCA_RESERVED) > return addr; > -- > 2.14.1 I have a KASAN: slab-out-of-bounds, and git bisect points me to this change: Apr 13 00:40:32 probook kernel: ================================================================== Apr 13 00:40:32 probook kernel: BUG: KASAN: slab-out-of-bounds in get_block_address.isra.3+0x1e9/0x520 Apr 13 00:40:32 probook kernel: Read of size 4 at addr ffff8803f165ddf4 by task swapper/0/1 Apr 13 00:40:32 probook kernel: Apr 13 00:40:32 probook kernel: CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.16.0-10757-g4ca8ba4ccff9 #532 Apr 13 00:40:32 probook kernel: Hardware name: HP HP ProBook 645 G2/80FE, BIOS N77 Ver. 01.12 12/19/2017 Apr 13 00:40:32 probook kernel: Call Trace: Apr 13 00:40:32 probook kernel: dump_stack+0x5b/0x8b Apr 13 00:40:32 probook kernel: ? get_block_address.isra.3+0x1e9/0x520 Apr 13 00:40:32 probook kernel: print_address_description+0x65/0x270 Apr 13 00:40:32 probook kernel: ? get_block_address.isra.3+0x1e9/0x520 Apr 13 00:40:32 probook kernel: kasan_report+0x232/0x350 Apr 13 00:40:32 probook kernel: get_block_address.isra.3+0x1e9/0x520 Apr 13 00:40:32 probook kernel: ? kobject_init_and_add+0xde/0x130 Apr 13 00:40:32 probook kernel: ? get_name+0x390/0x390 Apr 13 00:40:32 probook kernel: ? kasan_unpoison_shadow+0x30/0x40 Apr 13 00:40:32 probook kernel: ? kasan_kmalloc+0xa0/0xd0 Apr 13 00:40:32 probook kernel: allocate_threshold_blocks+0x12c/0xc60 Apr 13 00:40:32 probook kernel: ? kobject_add_internal+0x800/0x800 Apr 13 00:40:32 probook kernel: ? get_block_address.isra.3+0x520/0x520 Apr 13 00:40:32 probook kernel: ? kasan_kmalloc+0xa0/0xd0 Apr 13 00:40:32 probook kernel: mce_threshold_create_device+0x35b/0x990 Apr 13 00:40:32 probook kernel: ? init_special_inode+0x1d0/0x230 Apr 13 00:40:32 probook kernel: threshold_init_device+0x98/0xa7 Apr 13 00:40:32 probook kernel: ? mcheck_vendor_init_severity+0x43/0x43 Apr 13 00:40:32 probook kernel: do_one_initcall+0x76/0x30c Apr 13 00:40:32 probook kernel: ? trace_event_raw_event_initcall_finish+0x190/0x190 Apr 13 00:40:32 probook kernel: ? kasan_unpoison_shadow+0xb/0x40 Apr 13 00:40:32 probook kernel: ? kasan_unpoison_shadow+0x30/0x40 Apr 13 00:40:32 probook kernel: kernel_init_freeable+0x3d6/0x471 Apr 13 00:40:32 probook kernel: ? rest_init+0xf0/0xf0 Apr 13 00:40:32 probook kernel: kernel_init+0xa/0x120 Apr 13 00:40:32 probook kernel: ? rest_init+0xf0/0xf0 Apr 13 00:40:32 probook kernel: ret_from_fork+0x22/0x40 Apr 13 00:40:32 probook kernel: Apr 13 00:40:32 probook kernel: Allocated by task 1: Apr 13 00:40:32 probook kernel: kasan_kmalloc+0xa0/0xd0 Apr 13 00:40:32 probook kernel: kmem_cache_alloc_trace+0xf3/0x1f0 Apr 13 00:40:32 probook kernel: allocate_threshold_blocks+0x1bc/0xc60 Apr 13 00:40:32 probook kernel: mce_threshold_create_device+0x35b/0x990 Apr 13 00:40:32 probook kernel: threshold_init_device+0x98/0xa7 Apr 13 00:40:32 probook kernel: do_one_initcall+0x76/0x30c Apr 13 00:40:32 probook kernel: kernel_init_freeable+0x3d6/0x471 Apr 13 00:40:32 probook kernel: kernel_init+0xa/0x120 Apr 13 00:40:32 probook kernel: ret_from_fork+0x22/0x40 Apr 13 00:40:32 probook kernel: Apr 13 00:40:32 probook kernel: Freed by task 0: Apr 13 00:40:32 probook kernel: (stack is not available) Apr 13 00:40:32 probook kernel: Apr 13 00:40:32 probook kernel: The buggy address belongs to the object at ffff8803f165dd80 which belongs to the cache kmalloc-128 of size 128 Apr 13 00:40:32 probook kernel: The buggy address is located 116 bytes inside of 128-byte region [ffff8803f165dd80, ffff8803f165de00) Apr 13 00:40:32 probook kernel: The buggy address belongs to the page: Apr 13 00:40:32 probook kernel: page:ffffea000fc59740 count:1 mapcount:0 mapping:0000000000000000 index:0x0 Apr 13 00:40:32 probook kernel: flags: 0x2000000000000100(slab) Apr 13 00:40:32 probook kernel: raw: 2000000000000100 0000000000000000 0000000000000000 0000000180150015 Apr 13 00:40:32 probook kernel: raw: dead000000000100 dead000000000200 ffff8803f3403340 0000000000000000 Apr 13 00:40:32 probook kernel: page dumped because: kasan: bad access detected Apr 13 00:40:32 probook kernel: Apr 13 00:40:32 probook kernel: Memory state around the buggy address: Apr 13 00:40:32 probook kernel: ffff8803f165dc80: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 Apr 13 00:40:32 probook kernel: ffff8803f165dd00: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc Apr 13 00:40:32 probook kernel: >ffff8803f165dd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc Apr 13 00:40:32 probook kernel: ^ Apr 13 00:40:32 probook kernel: ffff8803f165de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc Apr 13 00:40:32 probook kernel: ffff8803f165de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc Apr 13 00:40:32 probook kernel: ================================================================== -- Regards, Johannes From mboxrd@z Thu Jan 1 00:00:00 1970 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Subject: [3/3] x86/MCE/AMD: Get address from already initialized block From: Johannes Hirte Message-Id: <20180414004230.GA2033@probook> Date: Sat, 14 Apr 2018 02:42:31 +0200 To: Yazen Ghannam Cc: linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org, bp@suse.de, tony.luck@intel.com, x86@kernel.org List-ID: T24gMjAxOCBGZWIgMDEsIFlhemVuIEdoYW5uYW0gd3JvdGU6Cj4gRnJvbTogWWF6ZW4gR2hhbm5h bSA8eWF6ZW4uZ2hhbm5hbUBhbWQuY29tPgo+IAo+IFRoZSBibG9jayBhZGRyZXNzIGlzIHNhdmVk IGFmdGVyIHRoZSBibG9jayBpcyBpbml0aWFsaXplZCB3aGVuCj4gdGhyZXNob2xkX2luaXRfZGV2 aWNlKCkgaXMgY2FsbGVkLgo+IAo+IFVzZSB0aGUgc2F2ZWQgYmxvY2sgYWRkcmVzcywgaWYgYXZh aWxhYmxlLCByYXRoZXIgdGhhbiB0cnlpbmcgdG8KPiByZWRpc2NvdmVyIGl0Lgo+IAo+IFdlIGNh biBhdm9pZCBzb21lICpvbl9jcHUoKSBjYWxscyBpbiB0aGUgaW5pdCBwYXRoIHRoYXQgd2lsbCBj YXVzZSBhCj4gY2FsbCB0cmFjZSB3aGVuIHJlc3VtaW5nIGZyb20gc3VzcGVuZC4KPiAKPiBDYzog PHN0YWJsZUB2Z2VyLmtlcm5lbC5vcmc+ICMgNC4xNC54Cj4gU2lnbmVkLW9mZi1ieTogWWF6ZW4g R2hhbm5hbSA8eWF6ZW4uZ2hhbm5hbUBhbWQuY29tPgo+IC0tLQo+ICBhcmNoL3g4Ni9rZXJuZWwv Y3B1L21jaGVjay9tY2VfYW1kLmMgfCAxNSArKysrKysrKysrKysrKysKPiAgMSBmaWxlIGNoYW5n ZWQsIDE1IGluc2VydGlvbnMoKykKPiAKPiBkaWZmIC0tZ2l0IGEvYXJjaC94ODYva2VybmVsL2Nw dS9tY2hlY2svbWNlX2FtZC5jIGIvYXJjaC94ODYva2VybmVsL2NwdS9tY2hlY2svbWNlX2FtZC5j Cj4gaW5kZXggYmY1M2I0NTQ5YTE3Li44YzRmOGYzMGM3NzkgMTAwNjQ0Cj4gLS0tIGEvYXJjaC94 ODYva2VybmVsL2NwdS9tY2hlY2svbWNlX2FtZC5jCj4gKysrIGIvYXJjaC94ODYva2VybmVsL2Nw dS9tY2hlY2svbWNlX2FtZC5jCj4gQEAgLTQzNiw2ICs0MzYsMjEgQEAgc3RhdGljIHUzMiBnZXRf YmxvY2tfYWRkcmVzcyh1bnNpZ25lZCBpbnQgY3B1LCB1MzIgY3VycmVudF9hZGRyLCB1MzIgbG93 LCB1MzIgaGkKPiAgewo+ICAJdTMyIGFkZHIgPSAwLCBvZmZzZXQgPSAwOwo+ICAKPiArCWlmICgo YmFuayA+PSBtY2FfY2ZnLmJhbmtzKSB8fCAoYmxvY2sgPj0gTlJfQkxPQ0tTKSkKPiArCQlyZXR1 cm4gYWRkcjsKPiArCj4gKwkvKiBHZXQgYWRkcmVzcyBmcm9tIGFscmVhZHkgaW5pdGlhbGl6ZWQg YmxvY2suICovCj4gKwlpZiAocGVyX2NwdSh0aHJlc2hvbGRfYmFua3MsIGNwdSkpIHsKPiArCQlz dHJ1Y3QgdGhyZXNob2xkX2JhbmsgKmJhbmtwID0gcGVyX2NwdSh0aHJlc2hvbGRfYmFua3MsIGNw dSlbYmFua107Cj4gKwo+ICsJCWlmIChiYW5rcCAmJiBiYW5rcC0+YmxvY2tzKSB7Cj4gKwkJCXN0 cnVjdCB0aHJlc2hvbGRfYmxvY2sgKmJsb2NrcCA9ICZiYW5rcC0+YmxvY2tzW2Jsb2NrXTsKPiAr Cj4gKwkJCWlmIChibG9ja3ApCj4gKwkJCQlyZXR1cm4gYmxvY2twLT5hZGRyZXNzOwo+ICsJCX0K PiArCX0KPiArCj4gIAlpZiAobWNlX2ZsYWdzLnNtY2EpIHsKPiAgCQlpZiAoc21jYV9nZXRfYmFu a190eXBlKGJhbmspID09IFNNQ0FfUkVTRVJWRUQpCj4gIAkJCXJldHVybiBhZGRyOwo+IC0tIAo+ IDIuMTQuMQoKSSBoYXZlIGEgS0FTQU46IHNsYWItb3V0LW9mLWJvdW5kcywgYW5kIGdpdCBiaXNl Y3QgcG9pbnRzIG1lIHRvIHRoaXMKY2hhbmdlOgoKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2Vy bmVsOiA9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT0KQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBCVUc6IEtBU0FO OiBzbGFiLW91dC1vZi1ib3VuZHMgaW4gZ2V0X2Jsb2NrX2FkZHJlc3MuaXNyYS4zKzB4MWU5LzB4 NTIwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogUmVhZCBvZiBzaXplIDQgYXQgYWRk ciBmZmZmODgwM2YxNjVkZGY0IGJ5IHRhc2sgc3dhcHBlci8wLzEKQXByIDEzIDAwOjQwOjMyIHBy b2Jvb2sga2VybmVsOiAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBDUFU6IDEgUElE OiAxIENvbW06IHN3YXBwZXIvMCBOb3QgdGFpbnRlZCA0LjE2LjAtMTA3NTctZzRjYThiYTRjY2Zm OSAjNTMyCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogSGFyZHdhcmUgbmFtZTogSFAg SFAgUHJvQm9vayA2NDUgRzIvODBGRSwgQklPUyBONzcgVmVyLiAwMS4xMiAxMi8xOS8yMDE3CkFw ciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogQ2FsbCBUcmFjZToKQXByIDEzIDAwOjQwOjMy IHByb2Jvb2sga2VybmVsOiAgZHVtcF9zdGFjaysweDViLzB4OGIKQXByIDEzIDAwOjQwOjMyIHBy b2Jvb2sga2VybmVsOiAgPyBnZXRfYmxvY2tfYWRkcmVzcy5pc3JhLjMrMHgxZTkvMHg1MjAKQXBy IDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiAgcHJpbnRfYWRkcmVzc19kZXNjcmlwdGlvbisw eDY1LzB4MjcwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogID8gZ2V0X2Jsb2NrX2Fk ZHJlc3MuaXNyYS4zKzB4MWU5LzB4NTIwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDog IGthc2FuX3JlcG9ydCsweDIzMi8weDM1MApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6 ICBnZXRfYmxvY2tfYWRkcmVzcy5pc3JhLjMrMHgxZTkvMHg1MjAKQXByIDEzIDAwOjQwOjMyIHBy b2Jvb2sga2VybmVsOiAgPyBrb2JqZWN0X2luaXRfYW5kX2FkZCsweGRlLzB4MTMwCkFwciAxMyAw MDo0MDozMiBwcm9ib29rIGtlcm5lbDogID8gZ2V0X25hbWUrMHgzOTAvMHgzOTAKQXByIDEzIDAw OjQwOjMyIHByb2Jvb2sga2VybmVsOiAgPyBrYXNhbl91bnBvaXNvbl9zaGFkb3crMHgzMC8weDQw CkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogID8ga2FzYW5fa21hbGxvYysweGEwLzB4 ZDAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiAgYWxsb2NhdGVfdGhyZXNob2xkX2Js b2NrcysweDEyYy8weGM2MApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICA/IGtvYmpl Y3RfYWRkX2ludGVybmFsKzB4ODAwLzB4ODAwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5l bDogID8gZ2V0X2Jsb2NrX2FkZHJlc3MuaXNyYS4zKzB4NTIwLzB4NTIwCkFwciAxMyAwMDo0MDoz MiBwcm9ib29rIGtlcm5lbDogID8ga2FzYW5fa21hbGxvYysweGEwLzB4ZDAKQXByIDEzIDAwOjQw OjMyIHByb2Jvb2sga2VybmVsOiAgbWNlX3RocmVzaG9sZF9jcmVhdGVfZGV2aWNlKzB4MzViLzB4 OTkwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogID8gaW5pdF9zcGVjaWFsX2lub2Rl KzB4MWQwLzB4MjMwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIHRocmVzaG9sZF9p bml0X2RldmljZSsweDk4LzB4YTcKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiAgPyBt Y2hlY2tfdmVuZG9yX2luaXRfc2V2ZXJpdHkrMHg0My8weDQzCkFwciAxMyAwMDo0MDozMiBwcm9i b29rIGtlcm5lbDogIGRvX29uZV9pbml0Y2FsbCsweDc2LzB4MzBjCkFwciAxMyAwMDo0MDozMiBw cm9ib29rIGtlcm5lbDogID8gdHJhY2VfZXZlbnRfcmF3X2V2ZW50X2luaXRjYWxsX2ZpbmlzaCsw eDE5MC8weDE5MApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICA/IGthc2FuX3VucG9p c29uX3NoYWRvdysweGIvMHg0MApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICA/IGth c2FuX3VucG9pc29uX3NoYWRvdysweDMwLzB4NDAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2Vy bmVsOiAga2VybmVsX2luaXRfZnJlZWFibGUrMHgzZDYvMHg0NzEKQXByIDEzIDAwOjQwOjMyIHBy b2Jvb2sga2VybmVsOiAgPyByZXN0X2luaXQrMHhmMC8weGYwCkFwciAxMyAwMDo0MDozMiBwcm9i b29rIGtlcm5lbDogIGtlcm5lbF9pbml0KzB4YS8weDEyMApBcHIgMTMgMDA6NDA6MzIgcHJvYm9v ayBrZXJuZWw6ICA/IHJlc3RfaW5pdCsweGYwLzB4ZjAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sg a2VybmVsOiAgcmV0X2Zyb21fZm9yaysweDIyLzB4NDAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sg a2VybmVsOgpBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6IEFsbG9jYXRlZCBieSB0YXNr IDE6CkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGthc2FuX2ttYWxsb2MrMHhhMC8w eGQwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGttZW1fY2FjaGVfYWxsb2NfdHJh Y2UrMHhmMy8weDFmMApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICBhbGxvY2F0ZV90 aHJlc2hvbGRfYmxvY2tzKzB4MWJjLzB4YzYwCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5l bDogIG1jZV90aHJlc2hvbGRfY3JlYXRlX2RldmljZSsweDM1Yi8weDk5MApBcHIgMTMgMDA6NDA6 MzIgcHJvYm9vayBrZXJuZWw6ICB0aHJlc2hvbGRfaW5pdF9kZXZpY2UrMHg5OC8weGE3CkFwciAx MyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGRvX29uZV9pbml0Y2FsbCsweDc2LzB4MzBjCkFw ciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGtlcm5lbF9pbml0X2ZyZWVhYmxlKzB4M2Q2 LzB4NDcxCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGtlcm5lbF9pbml0KzB4YS8w eDEyMApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICByZXRfZnJvbV9mb3JrKzB4MjIv MHg0MApBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6IApBcHIgMTMgMDA6NDA6MzIgcHJv Ym9vayBrZXJuZWw6IEZyZWVkIGJ5IHRhc2sgMDoKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2Vy bmVsOiAoc3RhY2sgaXMgbm90IGF2YWlsYWJsZSkKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2Vy bmVsOiAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBUaGUgYnVnZ3kgYWRkcmVzcyBi ZWxvbmdzIHRvIHRoZSBvYmplY3QgYXQgZmZmZjg4MDNmMTY1ZGQ4MAogd2hpY2ggYmVsb25ncyB0 byB0aGUgY2FjaGUga21hbGxvYy0xMjggb2Ygc2l6ZSAxMjgKQXByIDEzIDAwOjQwOjMyIHByb2Jv b2sga2VybmVsOiBUaGUgYnVnZ3kgYWRkcmVzcyBpcyBsb2NhdGVkIDExNiBieXRlcyBpbnNpZGUg b2YKIDEyOC1ieXRlIHJlZ2lvbiBbZmZmZjg4MDNmMTY1ZGQ4MCwgZmZmZjg4MDNmMTY1ZGUwMCkK IEFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogVGhlIGJ1Z2d5IGFkZHJlc3MgYmVsb25n cyB0byB0aGUgcGFnZToKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBwYWdlOmZmZmZl YTAwMGZjNTk3NDAgY291bnQ6MSBtYXBjb3VudDowIG1hcHBpbmc6MDAwMDAwMDAwMDAwMDAwMCBp bmRleDoweDAKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBmbGFnczogMHgyMDAwMDAw MDAwMDAwMTAwKHNsYWIpCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogcmF3OiAyMDAw MDAwMDAwMDAwMTAwIDAwMDAwMDAwMDAwMDAwMDAgMDAwMDAwMDAwMDAwMDAwMCAwMDAwMDAwMTgw MTUwMDE1CkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogcmF3OiBkZWFkMDAwMDAwMDAw MTAwIGRlYWQwMDAwMDAwMDAyMDAgZmZmZjg4MDNmMzQwMzM0MCAwMDAwMDAwMDAwMDAwMDAwCkFw ciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogcGFnZSBkdW1wZWQgYmVjYXVzZToga2FzYW46 IGJhZCBhY2Nlc3MgZGV0ZWN0ZWQKQXByIDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiAKQXBy IDEzIDAwOjQwOjMyIHByb2Jvb2sga2VybmVsOiBNZW1vcnkgc3RhdGUgYXJvdW5kIHRoZSBidWdn eSBhZGRyZXNzOgpBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICBmZmZmODgwM2YxNjVk YzgwOiBmYyBmYyBmYyBmYyBmYyBmYyBmYyBmYyAwMCAwMCAwMCAwMCAwMCAwMCAwMCAwMApBcHIg MTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICBmZmZmODgwM2YxNjVkZDAwOiAwMCAwMCAwMCAw MCAwMCAwMCAwMCBmYyBmYyBmYyBmYyBmYyBmYyBmYyBmYyBmYwpBcHIgMTMgMDA6NDA6MzIgcHJv Ym9vayBrZXJuZWw6ID5mZmZmODgwM2YxNjVkZDgwOiAwMCAwMCAwMCAwMCAwMCAwMCAwMCAwMCAw MCAwMCAwMCAwMCAwMCBmYyBmYyBmYwpBcHIgMTMgMDA6NDA6MzIgcHJvYm9vayBrZXJuZWw6ICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICBeCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtlcm5lbDogIGZmZmY4ODAzZjE2NWRlMDA6IGZj IGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjCkFwciAxMyAwMDo0 MDozMiBwcm9ib29rIGtlcm5lbDogIGZmZmY4ODAzZjE2NWRlODA6IGZjIGZjIGZjIGZjIGZjIGZj IGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjIGZjCkFwciAxMyAwMDo0MDozMiBwcm9ib29rIGtl cm5lbDogPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09Cg==