From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 15DADC10F14 for ; Tue, 16 Apr 2019 18:39:41 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D139F206BA for ; Tue, 16 Apr 2019 18:39:40 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="h3e1Nm3R" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730546AbfDPSjj (ORCPT ); Tue, 16 Apr 2019 14:39:39 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:37966 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730348AbfDPSix (ORCPT ); Tue, 16 Apr 2019 14:38:53 -0400 Received: by mail-wm1-f68.google.com with SMTP id w15so290951wmc.3; Tue, 16 Apr 2019 11:38:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=TLleK0VtrURc8NakouQBGkqZbPDHg07f9BvqliSxF70=; b=h3e1Nm3R3xsbD+PYUqSpNvsqvv25b71V1k+JePPL/XPpDetWnd7J/zs42/KuJEfJGF S9MVNlIxKBIr/pxNEFOa7GVi+5nYrR3xQQgIRMCBdti8z6/C2FkP5W1ZhONqzIGoXd/p joJoIrnNevNZVJuInDW7FJNIlEtpaHygBfUS/dFzlUCrAHNTdQlVprBu+rtP8RR6/yUr ByNbE8HMarmtuTKhwQhx9TG1Ukycwhdhgb76FVzBL9wRYQhWF3ZLB7wapcE1sIXCfUpM hXkRscYpsz9Zbl4yBd2ABW0K5gbKn3MNDCTGJ+E39/cU69vsf09kV5AxUfsOEFCPWRZV UO7g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=TLleK0VtrURc8NakouQBGkqZbPDHg07f9BvqliSxF70=; b=TFMEIalIJRUTUAj7XZFZDWvWdfVQmgnbvi0kb0xmCmHp5oRFA2/GmXBICgeBYChwXO Q44TxoQEFf5/aqDBsWvLl97BzmPegW08KkZ8LprFlI08cMVgfh2z59un2zjzeykzlNAv J7poMM/oB9PdlQ5mP+wmNZgC/PfKoHhPnuTOwss3QNa/X4N3I2fn7W3j7Bi9NxcNVeqg v2EIQmNEMApzyO8Si6kBnXwpuaiwf8S8hjV4jqq3pWH3IjsNPWvUpgKYYkwjZvHicHQF a1fkaHejipVStYMONBebrLaL3ppKUh0SYyfjYgx/VWQ/dlYaiV+AXfVTfwMwLpLY2nVW iQnw== X-Gm-Message-State: APjAAAUGPHFzim33sz87Stx/lteDFnzmVh1DQ2zrTm90apTu0zIY/Pu1 RTdhUHZFjBKr5RaeGbGXtn61a0ZZ X-Google-Smtp-Source: APXvYqz07VW+fNme+N9AqBbL6HOJCdOJCyAxD2ZszHK1Hf1dhl/j/yKTr8NoWJMd6oM74U0ThWkt2w== X-Received: by 2002:a1c:eb07:: with SMTP id j7mr26684391wmh.138.1555439931201; Tue, 16 Apr 2019 11:38:51 -0700 (PDT) Received: from abel.fritz.box ([2a02:908:1252:fb60:fcfa:e34f:82c0:3f66]) by smtp.gmail.com with ESMTPSA id m13sm128823wmg.42.2019.04.16.11.38.50 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 16 Apr 2019 11:38:50 -0700 (PDT) From: "=?UTF-8?q?Christian=20K=C3=B6nig?=" X-Google-Original-From: =?UTF-8?q?Christian=20K=C3=B6nig?= To: sumit.semwal@linaro.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org, amd-gfx@lists.freedesktop.org Subject: [PATCH 05/12] dma-buf: add explicit buffer pinning Date: Tue, 16 Apr 2019 20:38:34 +0200 Message-Id: <20190416183841.1577-6-christian.koenig@amd.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190416183841.1577-1-christian.koenig@amd.com> References: <20190416183841.1577-1-christian.koenig@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add optional explicit pinning callbacks instead of implicitly assume the exporter pins the buffer when a mapping is created. Signed-off-by: Christian König --- drivers/dma-buf/dma-buf.c | 39 +++++++++++++++++++++++++++++++++++++++ include/linux/dma-buf.h | 37 +++++++++++++++++++++++++++++++------ 2 files changed, 70 insertions(+), 6 deletions(-) diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c index a3738fab3927..f23ff8355505 100644 --- a/drivers/dma-buf/dma-buf.c +++ b/drivers/dma-buf/dma-buf.c @@ -630,6 +630,41 @@ void dma_buf_detach(struct dma_buf *dmabuf, struct dma_buf_attachment *attach) } EXPORT_SYMBOL_GPL(dma_buf_detach); +/** + * dma_buf_pin - Lock down the DMA-buf + * + * @dmabuf: [in] DMA-buf to lock down. + * + * Returns: + * 0 on success, negative error code on failure. + */ +int dma_buf_pin(struct dma_buf *dmabuf) +{ + int ret = 0; + + reservation_object_assert_held(dmabuf->resv); + + if (dmabuf->ops->pin) + ret = dmabuf->ops->pin(dmabuf); + + return ret; +} +EXPORT_SYMBOL_GPL(dma_buf_pin); + +/** + * dma_buf_unpin - Remove lock from DMA-buf + * + * @dmabuf: [in] DMA-buf to unlock. + */ +void dma_buf_unpin(struct dma_buf *dmabuf) +{ + reservation_object_assert_held(dmabuf->resv); + + if (dmabuf->ops->unpin) + dmabuf->ops->unpin(dmabuf); +} +EXPORT_SYMBOL_GPL(dma_buf_unpin); + /** * dma_buf_map_attachment_locked - Maps the buffer into _device_ address space * with the reservation lock held. Is a wrapper for map_dma_buf() of the @@ -666,6 +701,8 @@ dma_buf_map_attachment_locked(struct dma_buf_attachment *attach, */ if (attach->invalidate) list_del(&attach->node); + else + dma_buf_pin(attach->dmabuf); sg_table = attach->dmabuf->ops->map_dma_buf(attach, direction); if (attach->invalidate) list_add(&attach->node, &attach->dmabuf->attachments); @@ -735,6 +772,8 @@ void dma_buf_unmap_attachment_locked(struct dma_buf_attachment *attach, attach->dmabuf->ops->unmap_dma_buf(attach, sg_table, direction); + if (!attach->invalidate) + dma_buf_unpin(attach->dmabuf); } EXPORT_SYMBOL_GPL(dma_buf_unmap_attachment_locked); diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h index ece4638359a8..a615b74e5894 100644 --- a/include/linux/dma-buf.h +++ b/include/linux/dma-buf.h @@ -100,14 +100,40 @@ struct dma_buf_ops { */ void (*detach)(struct dma_buf *, struct dma_buf_attachment *); + /** + * @pin_dma_buf: + * + * This is called by dma_buf_pin and lets the exporter know that an + * importer assumes that the DMA-buf can't be invalidated any more. + * + * This is called with the dmabuf->resv object locked. + * + * This callback is optional. + * + * Returns: + * + * 0 on success, negative error code on failure. + */ + int (*pin)(struct dma_buf *); + + /** + * @unpin_dma_buf: + * + * This is called by dma_buf_unpin and lets the exporter know that an + * importer doesn't need to the DMA-buf to stay were it is any more. + * + * This is called with the dmabuf->resv object locked. + * + * This callback is optional. + */ + void (*unpin)(struct dma_buf *); + /** * @map_dma_buf: * * This is called by dma_buf_map_attachment() and is used to map a * shared &dma_buf into device address space, and it is mandatory. It - * can only be called if @attach has been called successfully. This - * essentially pins the DMA buffer into place, and it cannot be moved - * any more + * can only be called if @attach has been called successfully. * * This call may sleep, e.g. when the backing storage first needs to be * allocated, or moved to a location suitable for all currently attached @@ -148,9 +174,6 @@ struct dma_buf_ops { * * This is called by dma_buf_unmap_attachment() and should unmap and * release the &sg_table allocated in @map_dma_buf, and it is mandatory. - * It should also unpin the backing storage if this is the last mapping - * of the DMA buffer, it the exporter supports backing storage - * migration. * * This is always called with the dmabuf->resv object locked when * no_sgt_cache is true. @@ -442,6 +465,8 @@ int dma_buf_fd(struct dma_buf *dmabuf, int flags); struct dma_buf *dma_buf_get(int fd); void dma_buf_put(struct dma_buf *dmabuf); +int dma_buf_pin(struct dma_buf *dmabuf); +void dma_buf_unpin(struct dma_buf *dmabuf); struct sg_table *dma_buf_map_attachment_locked(struct dma_buf_attachment *, enum dma_data_direction); struct sg_table *dma_buf_map_attachment(struct dma_buf_attachment *, -- 2.17.1 From mboxrd@z Thu Jan 1 00:00:00 1970 From: "=?UTF-8?q?Christian=20K=C3=B6nig?=" Subject: [PATCH 05/12] dma-buf: add explicit buffer pinning Date: Tue, 16 Apr 2019 20:38:34 +0200 Message-ID: <20190416183841.1577-6-christian.koenig@amd.com> References: <20190416183841.1577-1-christian.koenig@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: In-Reply-To: <20190416183841.1577-1-christian.koenig-5C7GfCeVMHo@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: amd-gfx-bounces-PD4FTy7X32lNgt0PjOBp9y5qC8QIuHrW@public.gmane.org Sender: "amd-gfx" To: sumit.semwal-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org, linux-media-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, dri-devel-PD4FTy7X32lNgt0PjOBp9y5qC8QIuHrW@public.gmane.org, linaro-mm-sig-cunTk1MwBs8s++Sfvej+rw@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, amd-gfx-PD4FTy7X32lNgt0PjOBp9y5qC8QIuHrW@public.gmane.org List-Id: dri-devel@lists.freedesktop.org QWRkIG9wdGlvbmFsIGV4cGxpY2l0IHBpbm5pbmcgY2FsbGJhY2tzIGluc3RlYWQgb2YgaW1wbGlj aXRseSBhc3N1bWUgdGhlCmV4cG9ydGVyIHBpbnMgdGhlIGJ1ZmZlciB3aGVuIGEgbWFwcGluZyBp cyBjcmVhdGVkLgoKU2lnbmVkLW9mZi1ieTogQ2hyaXN0aWFuIEvDtm5pZyA8Y2hyaXN0aWFuLmtv ZW5pZ0BhbWQuY29tPgotLS0KIGRyaXZlcnMvZG1hLWJ1Zi9kbWEtYnVmLmMgfCAzOSArKysrKysr KysrKysrKysrKysrKysrKysrKysrKysrKysrKysrKysKIGluY2x1ZGUvbGludXgvZG1hLWJ1Zi5o ICAgfCAzNyArKysrKysrKysrKysrKysrKysrKysrKysrKysrKysrLS0tLS0tCiAyIGZpbGVzIGNo YW5nZWQsIDcwIGluc2VydGlvbnMoKyksIDYgZGVsZXRpb25zKC0pCgpkaWZmIC0tZ2l0IGEvZHJp dmVycy9kbWEtYnVmL2RtYS1idWYuYyBiL2RyaXZlcnMvZG1hLWJ1Zi9kbWEtYnVmLmMKaW5kZXgg YTM3MzhmYWIzOTI3Li5mMjNmZjgzNTU1MDUgMTAwNjQ0Ci0tLSBhL2RyaXZlcnMvZG1hLWJ1Zi9k bWEtYnVmLmMKKysrIGIvZHJpdmVycy9kbWEtYnVmL2RtYS1idWYuYwpAQCAtNjMwLDYgKzYzMCw0 MSBAQCB2b2lkIGRtYV9idWZfZGV0YWNoKHN0cnVjdCBkbWFfYnVmICpkbWFidWYsIHN0cnVjdCBk bWFfYnVmX2F0dGFjaG1lbnQgKmF0dGFjaCkKIH0KIEVYUE9SVF9TWU1CT0xfR1BMKGRtYV9idWZf ZGV0YWNoKTsKIAorLyoqCisgKiBkbWFfYnVmX3BpbiAtIExvY2sgZG93biB0aGUgRE1BLWJ1Zgor ICoKKyAqIEBkbWFidWY6CVtpbl0JRE1BLWJ1ZiB0byBsb2NrIGRvd24uCisgKgorICogUmV0dXJu czoKKyAqIDAgb24gc3VjY2VzcywgbmVnYXRpdmUgZXJyb3IgY29kZSBvbiBmYWlsdXJlLgorICov CitpbnQgZG1hX2J1Zl9waW4oc3RydWN0IGRtYV9idWYgKmRtYWJ1ZikKK3sKKwlpbnQgcmV0ID0g MDsKKworCXJlc2VydmF0aW9uX29iamVjdF9hc3NlcnRfaGVsZChkbWFidWYtPnJlc3YpOworCisJ aWYgKGRtYWJ1Zi0+b3BzLT5waW4pCisJCXJldCA9IGRtYWJ1Zi0+b3BzLT5waW4oZG1hYnVmKTsK KworCXJldHVybiByZXQ7Cit9CitFWFBPUlRfU1lNQk9MX0dQTChkbWFfYnVmX3Bpbik7CisKKy8q KgorICogZG1hX2J1Zl91bnBpbiAtIFJlbW92ZSBsb2NrIGZyb20gRE1BLWJ1ZgorICoKKyAqIEBk bWFidWY6CVtpbl0JRE1BLWJ1ZiB0byB1bmxvY2suCisgKi8KK3ZvaWQgZG1hX2J1Zl91bnBpbihz dHJ1Y3QgZG1hX2J1ZiAqZG1hYnVmKQoreworCXJlc2VydmF0aW9uX29iamVjdF9hc3NlcnRfaGVs ZChkbWFidWYtPnJlc3YpOworCisJaWYgKGRtYWJ1Zi0+b3BzLT51bnBpbikKKwkJZG1hYnVmLT5v cHMtPnVucGluKGRtYWJ1Zik7Cit9CitFWFBPUlRfU1lNQk9MX0dQTChkbWFfYnVmX3VucGluKTsK KwogLyoqCiAgKiBkbWFfYnVmX21hcF9hdHRhY2htZW50X2xvY2tlZCAtIE1hcHMgdGhlIGJ1ZmZl ciBpbnRvIF9kZXZpY2VfIGFkZHJlc3Mgc3BhY2UKICAqIHdpdGggdGhlIHJlc2VydmF0aW9uIGxv Y2sgaGVsZC4gSXMgYSB3cmFwcGVyIGZvciBtYXBfZG1hX2J1ZigpIG9mIHRoZQpAQCAtNjY2LDYg KzcwMSw4IEBAIGRtYV9idWZfbWFwX2F0dGFjaG1lbnRfbG9ja2VkKHN0cnVjdCBkbWFfYnVmX2F0 dGFjaG1lbnQgKmF0dGFjaCwKIAkgKi8KIAlpZiAoYXR0YWNoLT5pbnZhbGlkYXRlKQogCQlsaXN0 X2RlbCgmYXR0YWNoLT5ub2RlKTsKKwllbHNlCisJCWRtYV9idWZfcGluKGF0dGFjaC0+ZG1hYnVm KTsKIAlzZ190YWJsZSA9IGF0dGFjaC0+ZG1hYnVmLT5vcHMtPm1hcF9kbWFfYnVmKGF0dGFjaCwg ZGlyZWN0aW9uKTsKIAlpZiAoYXR0YWNoLT5pbnZhbGlkYXRlKQogCQlsaXN0X2FkZCgmYXR0YWNo LT5ub2RlLCAmYXR0YWNoLT5kbWFidWYtPmF0dGFjaG1lbnRzKTsKQEAgLTczNSw2ICs3NzIsOCBA QCB2b2lkIGRtYV9idWZfdW5tYXBfYXR0YWNobWVudF9sb2NrZWQoc3RydWN0IGRtYV9idWZfYXR0 YWNobWVudCAqYXR0YWNoLAogCiAJYXR0YWNoLT5kbWFidWYtPm9wcy0+dW5tYXBfZG1hX2J1Zihh dHRhY2gsIHNnX3RhYmxlLAogCQkJCQkJZGlyZWN0aW9uKTsKKwlpZiAoIWF0dGFjaC0+aW52YWxp ZGF0ZSkKKwkJZG1hX2J1Zl91bnBpbihhdHRhY2gtPmRtYWJ1Zik7CiB9CiBFWFBPUlRfU1lNQk9M X0dQTChkbWFfYnVmX3VubWFwX2F0dGFjaG1lbnRfbG9ja2VkKTsKIApkaWZmIC0tZ2l0IGEvaW5j bHVkZS9saW51eC9kbWEtYnVmLmggYi9pbmNsdWRlL2xpbnV4L2RtYS1idWYuaAppbmRleCBlY2U0 NjM4MzU5YTguLmE2MTViNzRlNTg5NCAxMDA2NDQKLS0tIGEvaW5jbHVkZS9saW51eC9kbWEtYnVm LmgKKysrIGIvaW5jbHVkZS9saW51eC9kbWEtYnVmLmgKQEAgLTEwMCwxNCArMTAwLDQwIEBAIHN0 cnVjdCBkbWFfYnVmX29wcyB7CiAJICovCiAJdm9pZCAoKmRldGFjaCkoc3RydWN0IGRtYV9idWYg Kiwgc3RydWN0IGRtYV9idWZfYXR0YWNobWVudCAqKTsKIAorCS8qKgorCSAqIEBwaW5fZG1hX2J1 ZjoKKwkgKgorCSAqIFRoaXMgaXMgY2FsbGVkIGJ5IGRtYV9idWZfcGluIGFuZCBsZXRzIHRoZSBl eHBvcnRlciBrbm93IHRoYXQgYW4KKwkgKiBpbXBvcnRlciBhc3N1bWVzIHRoYXQgdGhlIERNQS1i dWYgY2FuJ3QgYmUgaW52YWxpZGF0ZWQgYW55IG1vcmUuCisJICoKKwkgKiBUaGlzIGlzIGNhbGxl ZCB3aXRoIHRoZSBkbWFidWYtPnJlc3Ygb2JqZWN0IGxvY2tlZC4KKwkgKgorCSAqIFRoaXMgY2Fs bGJhY2sgaXMgb3B0aW9uYWwuCisJICoKKwkgKiBSZXR1cm5zOgorCSAqCisJICogMCBvbiBzdWNj ZXNzLCBuZWdhdGl2ZSBlcnJvciBjb2RlIG9uIGZhaWx1cmUuCisJICovCisJaW50ICgqcGluKShz dHJ1Y3QgZG1hX2J1ZiAqKTsKKworCS8qKgorCSAqIEB1bnBpbl9kbWFfYnVmOgorCSAqCisJICog VGhpcyBpcyBjYWxsZWQgYnkgZG1hX2J1Zl91bnBpbiBhbmQgbGV0cyB0aGUgZXhwb3J0ZXIga25v dyB0aGF0IGFuCisJICogaW1wb3J0ZXIgZG9lc24ndCBuZWVkIHRvIHRoZSBETUEtYnVmIHRvIHN0 YXkgd2VyZSBpdCBpcyBhbnkgbW9yZS4KKwkgKgorCSAqIFRoaXMgaXMgY2FsbGVkIHdpdGggdGhl IGRtYWJ1Zi0+cmVzdiBvYmplY3QgbG9ja2VkLgorCSAqCisJICogVGhpcyBjYWxsYmFjayBpcyBv cHRpb25hbC4KKwkgKi8KKwl2b2lkICgqdW5waW4pKHN0cnVjdCBkbWFfYnVmICopOworCiAJLyoq CiAJICogQG1hcF9kbWFfYnVmOgogCSAqCiAJICogVGhpcyBpcyBjYWxsZWQgYnkgZG1hX2J1Zl9t YXBfYXR0YWNobWVudCgpIGFuZCBpcyB1c2VkIHRvIG1hcCBhCiAJICogc2hhcmVkICZkbWFfYnVm IGludG8gZGV2aWNlIGFkZHJlc3Mgc3BhY2UsIGFuZCBpdCBpcyBtYW5kYXRvcnkuIEl0Ci0JICog Y2FuIG9ubHkgYmUgY2FsbGVkIGlmIEBhdHRhY2ggaGFzIGJlZW4gY2FsbGVkIHN1Y2Nlc3NmdWxs eS4gVGhpcwotCSAqIGVzc2VudGlhbGx5IHBpbnMgdGhlIERNQSBidWZmZXIgaW50byBwbGFjZSwg YW5kIGl0IGNhbm5vdCBiZSBtb3ZlZAotCSAqIGFueSBtb3JlCisJICogY2FuIG9ubHkgYmUgY2Fs bGVkIGlmIEBhdHRhY2ggaGFzIGJlZW4gY2FsbGVkIHN1Y2Nlc3NmdWxseS4KIAkgKgogCSAqIFRo aXMgY2FsbCBtYXkgc2xlZXAsIGUuZy4gd2hlbiB0aGUgYmFja2luZyBzdG9yYWdlIGZpcnN0IG5l ZWRzIHRvIGJlCiAJICogYWxsb2NhdGVkLCBvciBtb3ZlZCB0byBhIGxvY2F0aW9uIHN1aXRhYmxl IGZvciBhbGwgY3VycmVudGx5IGF0dGFjaGVkCkBAIC0xNDgsOSArMTc0LDYgQEAgc3RydWN0IGRt YV9idWZfb3BzIHsKIAkgKgogCSAqIFRoaXMgaXMgY2FsbGVkIGJ5IGRtYV9idWZfdW5tYXBfYXR0 YWNobWVudCgpIGFuZCBzaG91bGQgdW5tYXAgYW5kCiAJICogcmVsZWFzZSB0aGUgJnNnX3RhYmxl IGFsbG9jYXRlZCBpbiBAbWFwX2RtYV9idWYsIGFuZCBpdCBpcyBtYW5kYXRvcnkuCi0JICogSXQg c2hvdWxkIGFsc28gdW5waW4gdGhlIGJhY2tpbmcgc3RvcmFnZSBpZiB0aGlzIGlzIHRoZSBsYXN0 IG1hcHBpbmcKLQkgKiBvZiB0aGUgRE1BIGJ1ZmZlciwgaXQgdGhlIGV4cG9ydGVyIHN1cHBvcnRz IGJhY2tpbmcgc3RvcmFnZQotCSAqIG1pZ3JhdGlvbi4KIAkgKgogCSAqIFRoaXMgaXMgYWx3YXlz IGNhbGxlZCB3aXRoIHRoZSBkbWFidWYtPnJlc3Ygb2JqZWN0IGxvY2tlZCB3aGVuCiAJICogbm9f c2d0X2NhY2hlIGlzIHRydWUuCkBAIC00NDIsNiArNDY1LDggQEAgaW50IGRtYV9idWZfZmQoc3Ry dWN0IGRtYV9idWYgKmRtYWJ1ZiwgaW50IGZsYWdzKTsKIHN0cnVjdCBkbWFfYnVmICpkbWFfYnVm X2dldChpbnQgZmQpOwogdm9pZCBkbWFfYnVmX3B1dChzdHJ1Y3QgZG1hX2J1ZiAqZG1hYnVmKTsK IAoraW50IGRtYV9idWZfcGluKHN0cnVjdCBkbWFfYnVmICpkbWFidWYpOwordm9pZCBkbWFfYnVm X3VucGluKHN0cnVjdCBkbWFfYnVmICpkbWFidWYpOwogc3RydWN0IHNnX3RhYmxlICpkbWFfYnVm X21hcF9hdHRhY2htZW50X2xvY2tlZChzdHJ1Y3QgZG1hX2J1Zl9hdHRhY2htZW50ICosCiAJCQkJ CSAgICAgICBlbnVtIGRtYV9kYXRhX2RpcmVjdGlvbik7CiBzdHJ1Y3Qgc2dfdGFibGUgKmRtYV9i dWZfbWFwX2F0dGFjaG1lbnQoc3RydWN0IGRtYV9idWZfYXR0YWNobWVudCAqLAotLSAKMi4xNy4x CgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwphbWQtZ2Z4 IG1haWxpbmcgbGlzdAphbWQtZ2Z4QGxpc3RzLmZyZWVkZXNrdG9wLm9yZwpodHRwczovL2xpc3Rz LmZyZWVkZXNrdG9wLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2FtZC1nZng=