From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,URIBL_DBL_ABUSE_MALW,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C4C31C352A1 for ; Wed, 5 Feb 2020 12:54:38 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 821D4218AC for ; Wed, 5 Feb 2020 12:54:38 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=shipmail.org header.i=@shipmail.org header.b="buK5MNYa" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728286AbgBEMyh (ORCPT ); Wed, 5 Feb 2020 07:54:37 -0500 Received: from ste-pvt-msa2.bahnhof.se ([213.80.101.71]:29432 "EHLO ste-pvt-msa2.bahnhof.se" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728217AbgBEMya (ORCPT ); Wed, 5 Feb 2020 07:54:30 -0500 Received: from localhost (localhost [127.0.0.1]) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTP id 528EC3F7D8; Wed, 5 Feb 2020 13:54:28 +0100 (CET) Authentication-Results: ste-pvt-msa2.bahnhof.se; dkim=pass (1024-bit key; unprotected) header.d=shipmail.org header.i=@shipmail.org header.b=buK5MNYa; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at bahnhof.se Authentication-Results: ste-ftg-msa2.bahnhof.se (amavisd-new); dkim=pass (1024-bit key) header.d=shipmail.org Received: from ste-pvt-msa2.bahnhof.se ([127.0.0.1]) by localhost (ste-ftg-msa2.bahnhof.se [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xwxjaHezVQgY; Wed, 5 Feb 2020 13:54:24 +0100 (CET) Received: from mail1.shipmail.org (h-205-35.A357.priv.bahnhof.se [155.4.205.35]) (Authenticated sender: mb878879) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTPA id 9F76D3F83D; Wed, 5 Feb 2020 13:54:23 +0100 (CET) Received: from localhost.localdomain.localdomain (h-205-35.A357.priv.bahnhof.se [155.4.205.35]) by mail1.shipmail.org (Postfix) with ESMTPSA id 79913360444; Wed, 5 Feb 2020 13:54:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=shipmail.org; s=mail; t=1580907258; bh=U1J1iUDEsQnTs0xYqB07x5UJ8erVSPEVFA9nUgaJz7U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=buK5MNYaMuuf1c7AXbrIy09v8mqwP9g/gjrfUVbvMLWxfnDX9omaOMPIZLwHnl37v iprTWN9iCdDNQNSdrCRlEl7s4mbG3c4hpcbGPawKbxEQq0MkT50C5jY1LWniMtXL1k d2FVG4YOR7b8cpRRdImxlyK80QrC8xsnowWK2pJE= From: =?UTF-8?q?Thomas=20Hellstr=C3=B6m=20=28VMware=29?= To: linux-mm@kvack.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Cc: pv-drivers@vmware.com, linux-graphics-maintainer@vmware.com, Thomas Hellstrom , Andrew Morton , Michal Hocko , "Matthew Wilcox (Oracle)" , "Kirill A. Shutemov" , Ralph Campbell , =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , =?UTF-8?q?Christian=20K=C3=B6nig?= , Dan Williams , Roland Scheidegger Subject: [PATCH v3 5/9] drm/ttm, drm/vmwgfx: Support huge TTM pagefaults Date: Wed, 5 Feb 2020 13:53:49 +0100 Message-Id: <20200205125353.2760-6-thomas_os@shipmail.org> X-Mailer: git-send-email 2.21.1 In-Reply-To: <20200205125353.2760-1-thomas_os@shipmail.org> References: <20200205125353.2760-1-thomas_os@shipmail.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Hellstrom Support huge (PMD-size and PUD-size) page-table entries by providing a huge_fault() callback. We still support private mappings and write-notify by splitting the huge page-table entries on write-access. Note that for huge page-faults to occur, either the kernel needs to be compiled with trans-huge-pages always enabled, or the kernel needs to be compiled with trans-huge-pages enabled using madvise, and the user-space app needs to call madvise() to enable trans-huge pages on a per-mapping basis. Furthermore huge page-faults will not succeed unless buffer objects and user-space addresses are aligned on huge page size boundaries. Cc: Andrew Morton Cc: Michal Hocko Cc: "Matthew Wilcox (Oracle)" Cc: "Kirill A. Shutemov" Cc: Ralph Campbell Cc: "Jérôme Glisse" Cc: "Christian König" Cc: Dan Williams Signed-off-by: Thomas Hellstrom Reviewed-by: Roland Scheidegger --- drivers/gpu/drm/ttm/ttm_bo_vm.c | 145 ++++++++++++++++++++- drivers/gpu/drm/vmwgfx/vmwgfx_page_dirty.c | 2 +- include/drm/ttm/ttm_bo_api.h | 3 +- 3 files changed, 145 insertions(+), 5 deletions(-) diff --git a/drivers/gpu/drm/ttm/ttm_bo_vm.c b/drivers/gpu/drm/ttm/ttm_bo_vm.c index 389128b8c4dd..e0973575452d 100644 --- a/drivers/gpu/drm/ttm/ttm_bo_vm.c +++ b/drivers/gpu/drm/ttm/ttm_bo_vm.c @@ -156,6 +156,89 @@ vm_fault_t ttm_bo_vm_reserve(struct ttm_buffer_object *bo, } EXPORT_SYMBOL(ttm_bo_vm_reserve); +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +/** + * ttm_bo_vm_insert_huge - Insert a pfn for PUD or PMD faults + * @vmf: Fault data + * @bo: The buffer object + * @page_offset: Page offset from bo start + * @fault_page_size: The size of the fault in pages. + * @pgprot: The page protections. + * Does additional checking whether it's possible to insert a PUD or PMD + * pfn and performs the insertion. + * + * Return: VM_FAULT_NOPAGE on successful insertion, VM_FAULT_FALLBACK if + * a huge fault was not possible, or on insertion error. + */ +static vm_fault_t ttm_bo_vm_insert_huge(struct vm_fault *vmf, + struct ttm_buffer_object *bo, + pgoff_t page_offset, + pgoff_t fault_page_size, + pgprot_t pgprot) +{ + pgoff_t i; + vm_fault_t ret; + unsigned long pfn; + pfn_t pfnt; + struct ttm_tt *ttm = bo->ttm; + bool write = vmf->flags & FAULT_FLAG_WRITE; + + /* Fault should not cross bo boundary. */ + page_offset &= ~(fault_page_size - 1); + if (page_offset + fault_page_size > bo->num_pages) + goto out_fallback; + + if (bo->mem.bus.is_iomem) + pfn = ttm_bo_io_mem_pfn(bo, page_offset); + else + pfn = page_to_pfn(ttm->pages[page_offset]); + + /* pfn must be fault_page_size aligned. */ + if ((pfn & (fault_page_size - 1)) != 0) + goto out_fallback; + + /* Check that memory is contiguous. */ + if (!bo->mem.bus.is_iomem) { + for (i = 1; i < fault_page_size; ++i) { + if (page_to_pfn(ttm->pages[page_offset + i]) != pfn + i) + goto out_fallback; + } + } else if (bo->bdev->driver->io_mem_pfn) { + for (i = 1; i < fault_page_size; ++i) { + if (ttm_bo_io_mem_pfn(bo, page_offset + i) != pfn + i) + goto out_fallback; + } + } + + pfnt = __pfn_to_pfn_t(pfn, PFN_DEV); + if (fault_page_size == (HPAGE_PMD_SIZE >> PAGE_SHIFT)) + ret = vmf_insert_pfn_pmd_prot(vmf, pfnt, pgprot, write); +#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD + else if (fault_page_size == (HPAGE_PUD_SIZE >> PAGE_SHIFT)) + ret = vmf_insert_pfn_pud_prot(vmf, pfnt, pgprot, write); +#endif + else + WARN_ON_ONCE(ret = VM_FAULT_FALLBACK); + + if (ret != VM_FAULT_NOPAGE) + goto out_fallback; + + return VM_FAULT_NOPAGE; +out_fallback: + count_vm_event(THP_FAULT_FALLBACK); + return VM_FAULT_FALLBACK; +} +#else +static vm_fault_t ttm_bo_vm_insert_huge(struct vm_fault *vmf, + struct ttm_buffer_object *bo, + pgoff_t page_offset, + pgoff_t fault_page_size, + pgprot_t pgprot) +{ + return VM_FAULT_FALLBACK; +} +#endif + /** * ttm_bo_vm_fault_reserved - TTM fault helper * @vmf: The struct vm_fault given as argument to the fault callback @@ -163,6 +246,7 @@ EXPORT_SYMBOL(ttm_bo_vm_reserve); * @num_prefault: Maximum number of prefault pages. The caller may want to * specify this based on madvice settings and the size of the GPU object * backed by the memory. + * @fault_page_size: The size of the fault in pages. * * This function inserts one or more page table entries pointing to the * memory backing the buffer object, and then returns a return code @@ -176,7 +260,8 @@ EXPORT_SYMBOL(ttm_bo_vm_reserve); */ vm_fault_t ttm_bo_vm_fault_reserved(struct vm_fault *vmf, pgprot_t prot, - pgoff_t num_prefault) + pgoff_t num_prefault, + pgoff_t fault_page_size) { struct vm_area_struct *vma = vmf->vma; struct ttm_buffer_object *bo = vma->vm_private_data; @@ -268,6 +353,13 @@ vm_fault_t ttm_bo_vm_fault_reserved(struct vm_fault *vmf, prot = pgprot_decrypted(prot); } + /* We don't prefault on huge faults. Yet. */ + if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && fault_page_size != 1) { + ret = ttm_bo_vm_insert_huge(vmf, bo, page_offset, + fault_page_size, prot); + goto out_io_unlock; + } + /* * Speculatively prefault a number of pages. Only error on * first page. @@ -334,7 +426,7 @@ vm_fault_t ttm_bo_vm_fault(struct vm_fault *vmf) return ret; prot = vma->vm_page_prot; - ret = ttm_bo_vm_fault_reserved(vmf, prot, TTM_BO_VM_NUM_PREFAULT); + ret = ttm_bo_vm_fault_reserved(vmf, prot, TTM_BO_VM_NUM_PREFAULT, 1); if (ret == VM_FAULT_RETRY && !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) return ret; @@ -344,6 +436,50 @@ vm_fault_t ttm_bo_vm_fault(struct vm_fault *vmf) } EXPORT_SYMBOL(ttm_bo_vm_fault); +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +static vm_fault_t ttm_bo_vm_huge_fault(struct vm_fault *vmf, + enum page_entry_size pe_size) +{ + struct vm_area_struct *vma = vmf->vma; + pgprot_t prot; + struct ttm_buffer_object *bo = vma->vm_private_data; + vm_fault_t ret; + pgoff_t fault_page_size = 0; + bool write = vmf->flags & FAULT_FLAG_WRITE; + + switch (pe_size) { + case PE_SIZE_PMD: + fault_page_size = HPAGE_PMD_SIZE >> PAGE_SHIFT; + break; +#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD + case PE_SIZE_PUD: + fault_page_size = HPAGE_PUD_SIZE >> PAGE_SHIFT; + break; +#endif + default: + WARN_ON_ONCE(1); + return VM_FAULT_FALLBACK; + } + + /* Fallback on write dirty-tracking or COW */ + if (write && !(pgprot_val(vmf->vma->vm_page_prot) & _PAGE_RW)) + return VM_FAULT_FALLBACK; + + ret = ttm_bo_vm_reserve(bo, vmf); + if (ret) + return ret; + + prot = vm_get_page_prot(vma->vm_flags); + ret = ttm_bo_vm_fault_reserved(vmf, prot, 1, fault_page_size); + if (ret == VM_FAULT_RETRY && !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) + return ret; + + dma_resv_unlock(bo->base.resv); + + return ret; +} +#endif + void ttm_bo_vm_open(struct vm_area_struct *vma) { struct ttm_buffer_object *bo = vma->vm_private_data; @@ -445,7 +581,10 @@ static const struct vm_operations_struct ttm_bo_vm_ops = { .fault = ttm_bo_vm_fault, .open = ttm_bo_vm_open, .close = ttm_bo_vm_close, - .access = ttm_bo_vm_access + .access = ttm_bo_vm_access, +#ifdef CONFIG_TRANSPARENT_HUGEPAGE + .huge_fault = ttm_bo_vm_huge_fault, +#endif }; static struct ttm_buffer_object *ttm_bo_vm_lookup(struct ttm_bo_device *bdev, diff --git a/drivers/gpu/drm/vmwgfx/vmwgfx_page_dirty.c b/drivers/gpu/drm/vmwgfx/vmwgfx_page_dirty.c index f07aa857587c..17a5dca7b921 100644 --- a/drivers/gpu/drm/vmwgfx/vmwgfx_page_dirty.c +++ b/drivers/gpu/drm/vmwgfx/vmwgfx_page_dirty.c @@ -477,7 +477,7 @@ vm_fault_t vmw_bo_vm_fault(struct vm_fault *vmf) else prot = vm_get_page_prot(vma->vm_flags); - ret = ttm_bo_vm_fault_reserved(vmf, prot, num_prefault); + ret = ttm_bo_vm_fault_reserved(vmf, prot, num_prefault, 1); if (ret == VM_FAULT_RETRY && !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) return ret; diff --git a/include/drm/ttm/ttm_bo_api.h b/include/drm/ttm/ttm_bo_api.h index 66ca49db9633..4fc90d53aa15 100644 --- a/include/drm/ttm/ttm_bo_api.h +++ b/include/drm/ttm/ttm_bo_api.h @@ -732,7 +732,8 @@ vm_fault_t ttm_bo_vm_reserve(struct ttm_buffer_object *bo, vm_fault_t ttm_bo_vm_fault_reserved(struct vm_fault *vmf, pgprot_t prot, - pgoff_t num_prefault); + pgoff_t num_prefault, + pgoff_t fault_page_size); vm_fault_t ttm_bo_vm_fault(struct vm_fault *vmf); -- 2.21.1 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,URIBL_DBL_ABUSE_MALW,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1FDDEC352A3 for ; Wed, 5 Feb 2020 12:54:48 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id EA877218AC for ; Wed, 5 Feb 2020 12:54:47 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=shipmail.org header.i=@shipmail.org header.b="buK5MNYa" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org EA877218AC Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=shipmail.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=dri-devel-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 9A3A26F590; Wed, 5 Feb 2020 12:54:31 +0000 (UTC) Received: from ste-pvt-msa2.bahnhof.se (ste-pvt-msa2.bahnhof.se [213.80.101.71]) by gabe.freedesktop.org (Postfix) with ESMTPS id DAA766F593 for ; Wed, 5 Feb 2020 12:54:29 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTP id 528EC3F7D8; Wed, 5 Feb 2020 13:54:28 +0100 (CET) Authentication-Results: ste-pvt-msa2.bahnhof.se; dkim=pass (1024-bit key; unprotected) header.d=shipmail.org header.i=@shipmail.org header.b=buK5MNYa; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at bahnhof.se Authentication-Results: ste-ftg-msa2.bahnhof.se (amavisd-new); dkim=pass (1024-bit key) header.d=shipmail.org Received: from ste-pvt-msa2.bahnhof.se ([127.0.0.1]) by localhost (ste-ftg-msa2.bahnhof.se [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xwxjaHezVQgY; Wed, 5 Feb 2020 13:54:24 +0100 (CET) Received: from mail1.shipmail.org (h-205-35.A357.priv.bahnhof.se [155.4.205.35]) (Authenticated sender: mb878879) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTPA id 9F76D3F83D; Wed, 5 Feb 2020 13:54:23 +0100 (CET) Received: from localhost.localdomain.localdomain (h-205-35.A357.priv.bahnhof.se [155.4.205.35]) by mail1.shipmail.org (Postfix) with ESMTPSA id 79913360444; Wed, 5 Feb 2020 13:54:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=shipmail.org; s=mail; t=1580907258; bh=U1J1iUDEsQnTs0xYqB07x5UJ8erVSPEVFA9nUgaJz7U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=buK5MNYaMuuf1c7AXbrIy09v8mqwP9g/gjrfUVbvMLWxfnDX9omaOMPIZLwHnl37v iprTWN9iCdDNQNSdrCRlEl7s4mbG3c4hpcbGPawKbxEQq0MkT50C5jY1LWniMtXL1k d2FVG4YOR7b8cpRRdImxlyK80QrC8xsnowWK2pJE= From: =?UTF-8?q?Thomas=20Hellstr=C3=B6m=20=28VMware=29?= To: linux-mm@kvack.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 5/9] drm/ttm, drm/vmwgfx: Support huge TTM pagefaults Date: Wed, 5 Feb 2020 13:53:49 +0100 Message-Id: <20200205125353.2760-6-thomas_os@shipmail.org> X-Mailer: git-send-email 2.21.1 In-Reply-To: <20200205125353.2760-1-thomas_os@shipmail.org> References: <20200205125353.2760-1-thomas_os@shipmail.org> MIME-Version: 1.0 X-BeenThere: dri-devel@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Direct Rendering Infrastructure - Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Thomas Hellstrom , Michal Hocko , pv-drivers@vmware.com, Roland Scheidegger , Dan Williams , Ralph Campbell , "Matthew Wilcox \(Oracle\)" , =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , linux-graphics-maintainer@vmware.com, Andrew Morton , =?UTF-8?q?Christian=20K=C3=B6nig?= , "Kirill A. Shutemov" Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: dri-devel-bounces@lists.freedesktop.org Sender: "dri-devel" RnJvbTogVGhvbWFzIEhlbGxzdHJvbSA8dGhlbGxzdHJvbUB2bXdhcmUuY29tPgoKU3VwcG9ydCBo dWdlIChQTUQtc2l6ZSBhbmQgUFVELXNpemUpIHBhZ2UtdGFibGUgZW50cmllcyBieSBwcm92aWRp bmcgYQpodWdlX2ZhdWx0KCkgY2FsbGJhY2suCldlIHN0aWxsIHN1cHBvcnQgcHJpdmF0ZSBtYXBw aW5ncyBhbmQgd3JpdGUtbm90aWZ5IGJ5IHNwbGl0dGluZyB0aGUgaHVnZQpwYWdlLXRhYmxlIGVu dHJpZXMgb24gd3JpdGUtYWNjZXNzLgoKTm90ZSB0aGF0IGZvciBodWdlIHBhZ2UtZmF1bHRzIHRv IG9jY3VyLCBlaXRoZXIgdGhlIGtlcm5lbCBuZWVkcyB0byBiZQpjb21waWxlZCB3aXRoIHRyYW5z LWh1Z2UtcGFnZXMgYWx3YXlzIGVuYWJsZWQsIG9yIHRoZSBrZXJuZWwgbmVlZHMgdG8gYmUKY29t cGlsZWQgd2l0aCB0cmFucy1odWdlLXBhZ2VzIGVuYWJsZWQgdXNpbmcgbWFkdmlzZSwgYW5kIHRo ZSB1c2VyLXNwYWNlCmFwcCBuZWVkcyB0byBjYWxsIG1hZHZpc2UoKSB0byBlbmFibGUgdHJhbnMt aHVnZSBwYWdlcyBvbiBhIHBlci1tYXBwaW5nCmJhc2lzLgoKRnVydGhlcm1vcmUgaHVnZSBwYWdl LWZhdWx0cyB3aWxsIG5vdCBzdWNjZWVkIHVubGVzcyBidWZmZXIgb2JqZWN0cyBhbmQKdXNlci1z cGFjZSBhZGRyZXNzZXMgYXJlIGFsaWduZWQgb24gaHVnZSBwYWdlIHNpemUgYm91bmRhcmllcy4K CkNjOiBBbmRyZXcgTW9ydG9uIDxha3BtQGxpbnV4LWZvdW5kYXRpb24ub3JnPgpDYzogTWljaGFs IEhvY2tvIDxtaG9ja29Ac3VzZS5jb20+CkNjOiAiTWF0dGhldyBXaWxjb3ggKE9yYWNsZSkiIDx3 aWxseUBpbmZyYWRlYWQub3JnPgpDYzogIktpcmlsbCBBLiBTaHV0ZW1vdiIgPGtpcmlsbC5zaHV0 ZW1vdkBsaW51eC5pbnRlbC5jb20+CkNjOiBSYWxwaCBDYW1wYmVsbCA8cmNhbXBiZWxsQG52aWRp YS5jb20+CkNjOiAiSsOpcsO0bWUgR2xpc3NlIiA8amdsaXNzZUByZWRoYXQuY29tPgpDYzogIkNo cmlzdGlhbiBLw7ZuaWciIDxjaHJpc3RpYW4ua29lbmlnQGFtZC5jb20+CkNjOiBEYW4gV2lsbGlh bXMgPGRhbi5qLndpbGxpYW1zQGludGVsLmNvbT4KU2lnbmVkLW9mZi1ieTogVGhvbWFzIEhlbGxz dHJvbSA8dGhlbGxzdHJvbUB2bXdhcmUuY29tPgpSZXZpZXdlZC1ieTogUm9sYW5kIFNjaGVpZGVn Z2VyIDxzcm9sYW5kQHZtd2FyZS5jb20+Ci0tLQogZHJpdmVycy9ncHUvZHJtL3R0bS90dG1fYm9f dm0uYyAgICAgICAgICAgIHwgMTQ1ICsrKysrKysrKysrKysrKysrKysrLQogZHJpdmVycy9ncHUv ZHJtL3Ztd2dmeC92bXdnZnhfcGFnZV9kaXJ0eS5jIHwgICAyICstCiBpbmNsdWRlL2RybS90dG0v dHRtX2JvX2FwaS5oICAgICAgICAgICAgICAgfCAgIDMgKy0KIDMgZmlsZXMgY2hhbmdlZCwgMTQ1 IGluc2VydGlvbnMoKyksIDUgZGVsZXRpb25zKC0pCgpkaWZmIC0tZ2l0IGEvZHJpdmVycy9ncHUv ZHJtL3R0bS90dG1fYm9fdm0uYyBiL2RyaXZlcnMvZ3B1L2RybS90dG0vdHRtX2JvX3ZtLmMKaW5k ZXggMzg5MTI4YjhjNGRkLi5lMDk3MzU3NTQ1MmQgMTAwNjQ0Ci0tLSBhL2RyaXZlcnMvZ3B1L2Ry bS90dG0vdHRtX2JvX3ZtLmMKKysrIGIvZHJpdmVycy9ncHUvZHJtL3R0bS90dG1fYm9fdm0uYwpA QCAtMTU2LDYgKzE1Niw4OSBAQCB2bV9mYXVsdF90IHR0bV9ib192bV9yZXNlcnZlKHN0cnVjdCB0 dG1fYnVmZmVyX29iamVjdCAqYm8sCiB9CiBFWFBPUlRfU1lNQk9MKHR0bV9ib192bV9yZXNlcnZl KTsKIAorI2lmZGVmIENPTkZJR19UUkFOU1BBUkVOVF9IVUdFUEFHRQorLyoqCisgKiB0dG1fYm9f dm1faW5zZXJ0X2h1Z2UgLSBJbnNlcnQgYSBwZm4gZm9yIFBVRCBvciBQTUQgZmF1bHRzCisgKiBA dm1mOiBGYXVsdCBkYXRhCisgKiBAYm86IFRoZSBidWZmZXIgb2JqZWN0CisgKiBAcGFnZV9vZmZz ZXQ6IFBhZ2Ugb2Zmc2V0IGZyb20gYm8gc3RhcnQKKyAqIEBmYXVsdF9wYWdlX3NpemU6IFRoZSBz aXplIG9mIHRoZSBmYXVsdCBpbiBwYWdlcy4KKyAqIEBwZ3Byb3Q6IFRoZSBwYWdlIHByb3RlY3Rp b25zLgorICogRG9lcyBhZGRpdGlvbmFsIGNoZWNraW5nIHdoZXRoZXIgaXQncyBwb3NzaWJsZSB0 byBpbnNlcnQgYSBQVUQgb3IgUE1ECisgKiBwZm4gYW5kIHBlcmZvcm1zIHRoZSBpbnNlcnRpb24u CisgKgorICogUmV0dXJuOiBWTV9GQVVMVF9OT1BBR0Ugb24gc3VjY2Vzc2Z1bCBpbnNlcnRpb24s IFZNX0ZBVUxUX0ZBTExCQUNLIGlmCisgKiBhIGh1Z2UgZmF1bHQgd2FzIG5vdCBwb3NzaWJsZSwg b3Igb24gaW5zZXJ0aW9uIGVycm9yLgorICovCitzdGF0aWMgdm1fZmF1bHRfdCB0dG1fYm9fdm1f aW5zZXJ0X2h1Z2Uoc3RydWN0IHZtX2ZhdWx0ICp2bWYsCisJCQkJCXN0cnVjdCB0dG1fYnVmZmVy X29iamVjdCAqYm8sCisJCQkJCXBnb2ZmX3QgcGFnZV9vZmZzZXQsCisJCQkJCXBnb2ZmX3QgZmF1 bHRfcGFnZV9zaXplLAorCQkJCQlwZ3Byb3RfdCBwZ3Byb3QpCit7CisJcGdvZmZfdCBpOworCXZt X2ZhdWx0X3QgcmV0OworCXVuc2lnbmVkIGxvbmcgcGZuOworCXBmbl90IHBmbnQ7CisJc3RydWN0 IHR0bV90dCAqdHRtID0gYm8tPnR0bTsKKwlib29sIHdyaXRlID0gdm1mLT5mbGFncyAmIEZBVUxU X0ZMQUdfV1JJVEU7CisKKwkvKiBGYXVsdCBzaG91bGQgbm90IGNyb3NzIGJvIGJvdW5kYXJ5LiAq LworCXBhZ2Vfb2Zmc2V0ICY9IH4oZmF1bHRfcGFnZV9zaXplIC0gMSk7CisJaWYgKHBhZ2Vfb2Zm c2V0ICsgZmF1bHRfcGFnZV9zaXplID4gYm8tPm51bV9wYWdlcykKKwkJZ290byBvdXRfZmFsbGJh Y2s7CisKKwlpZiAoYm8tPm1lbS5idXMuaXNfaW9tZW0pCisJCXBmbiA9IHR0bV9ib19pb19tZW1f cGZuKGJvLCBwYWdlX29mZnNldCk7CisJZWxzZQorCQlwZm4gPSBwYWdlX3RvX3Bmbih0dG0tPnBh Z2VzW3BhZ2Vfb2Zmc2V0XSk7CisKKwkvKiBwZm4gbXVzdCBiZSBmYXVsdF9wYWdlX3NpemUgYWxp Z25lZC4gKi8KKwlpZiAoKHBmbiAmIChmYXVsdF9wYWdlX3NpemUgLSAxKSkgIT0gMCkKKwkJZ290 byBvdXRfZmFsbGJhY2s7CisKKwkvKiBDaGVjayB0aGF0IG1lbW9yeSBpcyBjb250aWd1b3VzLiAq LworCWlmICghYm8tPm1lbS5idXMuaXNfaW9tZW0pIHsKKwkJZm9yIChpID0gMTsgaSA8IGZhdWx0 X3BhZ2Vfc2l6ZTsgKytpKSB7CisJCQlpZiAocGFnZV90b19wZm4odHRtLT5wYWdlc1twYWdlX29m ZnNldCArIGldKSAhPSBwZm4gKyBpKQorCQkJCWdvdG8gb3V0X2ZhbGxiYWNrOworCQl9CisJfSBl bHNlIGlmIChiby0+YmRldi0+ZHJpdmVyLT5pb19tZW1fcGZuKSB7CisJCWZvciAoaSA9IDE7IGkg PCBmYXVsdF9wYWdlX3NpemU7ICsraSkgeworCQkJaWYgKHR0bV9ib19pb19tZW1fcGZuKGJvLCBw YWdlX29mZnNldCArIGkpICE9IHBmbiArIGkpCisJCQkJZ290byBvdXRfZmFsbGJhY2s7CisJCX0K Kwl9CisKKwlwZm50ID0gX19wZm5fdG9fcGZuX3QocGZuLCBQRk5fREVWKTsKKwlpZiAoZmF1bHRf cGFnZV9zaXplID09IChIUEFHRV9QTURfU0laRSA+PiBQQUdFX1NISUZUKSkKKwkJcmV0ID0gdm1m X2luc2VydF9wZm5fcG1kX3Byb3Qodm1mLCBwZm50LCBwZ3Byb3QsIHdyaXRlKTsKKyNpZmRlZiBD T05GSUdfSEFWRV9BUkNIX1RSQU5TUEFSRU5UX0hVR0VQQUdFX1BVRAorCWVsc2UgaWYgKGZhdWx0 X3BhZ2Vfc2l6ZSA9PSAoSFBBR0VfUFVEX1NJWkUgPj4gUEFHRV9TSElGVCkpCisJCXJldCA9IHZt Zl9pbnNlcnRfcGZuX3B1ZF9wcm90KHZtZiwgcGZudCwgcGdwcm90LCB3cml0ZSk7CisjZW5kaWYK KwllbHNlCisJCVdBUk5fT05fT05DRShyZXQgPSBWTV9GQVVMVF9GQUxMQkFDSyk7CisKKwlpZiAo cmV0ICE9IFZNX0ZBVUxUX05PUEFHRSkKKwkJZ290byBvdXRfZmFsbGJhY2s7CisKKwlyZXR1cm4g Vk1fRkFVTFRfTk9QQUdFOworb3V0X2ZhbGxiYWNrOgorCWNvdW50X3ZtX2V2ZW50KFRIUF9GQVVM VF9GQUxMQkFDSyk7CisJcmV0dXJuIFZNX0ZBVUxUX0ZBTExCQUNLOworfQorI2Vsc2UKK3N0YXRp YyB2bV9mYXVsdF90IHR0bV9ib192bV9pbnNlcnRfaHVnZShzdHJ1Y3Qgdm1fZmF1bHQgKnZtZiwK KwkJCQkJc3RydWN0IHR0bV9idWZmZXJfb2JqZWN0ICpibywKKwkJCQkJcGdvZmZfdCBwYWdlX29m ZnNldCwKKwkJCQkJcGdvZmZfdCBmYXVsdF9wYWdlX3NpemUsCisJCQkJCXBncHJvdF90IHBncHJv dCkKK3sKKwlyZXR1cm4gVk1fRkFVTFRfRkFMTEJBQ0s7Cit9CisjZW5kaWYKKwogLyoqCiAgKiB0 dG1fYm9fdm1fZmF1bHRfcmVzZXJ2ZWQgLSBUVE0gZmF1bHQgaGVscGVyCiAgKiBAdm1mOiBUaGUg c3RydWN0IHZtX2ZhdWx0IGdpdmVuIGFzIGFyZ3VtZW50IHRvIHRoZSBmYXVsdCBjYWxsYmFjawpA QCAtMTYzLDYgKzI0Niw3IEBAIEVYUE9SVF9TWU1CT0wodHRtX2JvX3ZtX3Jlc2VydmUpOwogICog QG51bV9wcmVmYXVsdDogTWF4aW11bSBudW1iZXIgb2YgcHJlZmF1bHQgcGFnZXMuIFRoZSBjYWxs ZXIgbWF5IHdhbnQgdG8KICAqIHNwZWNpZnkgdGhpcyBiYXNlZCBvbiBtYWR2aWNlIHNldHRpbmdz IGFuZCB0aGUgc2l6ZSBvZiB0aGUgR1BVIG9iamVjdAogICogYmFja2VkIGJ5IHRoZSBtZW1vcnku CisgKiBAZmF1bHRfcGFnZV9zaXplOiBUaGUgc2l6ZSBvZiB0aGUgZmF1bHQgaW4gcGFnZXMuCiAg KgogICogVGhpcyBmdW5jdGlvbiBpbnNlcnRzIG9uZSBvciBtb3JlIHBhZ2UgdGFibGUgZW50cmll cyBwb2ludGluZyB0byB0aGUKICAqIG1lbW9yeSBiYWNraW5nIHRoZSBidWZmZXIgb2JqZWN0LCBh bmQgdGhlbiByZXR1cm5zIGEgcmV0dXJuIGNvZGUKQEAgLTE3Niw3ICsyNjAsOCBAQCBFWFBPUlRf U1lNQk9MKHR0bV9ib192bV9yZXNlcnZlKTsKICAqLwogdm1fZmF1bHRfdCB0dG1fYm9fdm1fZmF1 bHRfcmVzZXJ2ZWQoc3RydWN0IHZtX2ZhdWx0ICp2bWYsCiAJCQkJICAgIHBncHJvdF90IHByb3Qs Ci0JCQkJICAgIHBnb2ZmX3QgbnVtX3ByZWZhdWx0KQorCQkJCSAgICBwZ29mZl90IG51bV9wcmVm YXVsdCwKKwkJCQkgICAgcGdvZmZfdCBmYXVsdF9wYWdlX3NpemUpCiB7CiAJc3RydWN0IHZtX2Fy ZWFfc3RydWN0ICp2bWEgPSB2bWYtPnZtYTsKIAlzdHJ1Y3QgdHRtX2J1ZmZlcl9vYmplY3QgKmJv ID0gdm1hLT52bV9wcml2YXRlX2RhdGE7CkBAIC0yNjgsNiArMzUzLDEzIEBAIHZtX2ZhdWx0X3Qg dHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVkKHN0cnVjdCB2bV9mYXVsdCAqdm1mLAogCQlwcm90ID0g cGdwcm90X2RlY3J5cHRlZChwcm90KTsKIAl9CiAKKwkvKiBXZSBkb24ndCBwcmVmYXVsdCBvbiBo dWdlIGZhdWx0cy4gWWV0LiAqLworCWlmIChJU19FTkFCTEVEKENPTkZJR19UUkFOU1BBUkVOVF9I VUdFUEFHRSkgJiYgZmF1bHRfcGFnZV9zaXplICE9IDEpIHsKKwkJcmV0ID0gdHRtX2JvX3ZtX2lu c2VydF9odWdlKHZtZiwgYm8sIHBhZ2Vfb2Zmc2V0LAorCQkJCQkgICAgZmF1bHRfcGFnZV9zaXpl LCBwcm90KTsKKwkJZ290byBvdXRfaW9fdW5sb2NrOworCX0KKwogCS8qCiAJICogU3BlY3VsYXRp dmVseSBwcmVmYXVsdCBhIG51bWJlciBvZiBwYWdlcy4gT25seSBlcnJvciBvbgogCSAqIGZpcnN0 IHBhZ2UuCkBAIC0zMzQsNyArNDI2LDcgQEAgdm1fZmF1bHRfdCB0dG1fYm9fdm1fZmF1bHQoc3Ry dWN0IHZtX2ZhdWx0ICp2bWYpCiAJCXJldHVybiByZXQ7CiAKIAlwcm90ID0gdm1hLT52bV9wYWdl X3Byb3Q7Ci0JcmV0ID0gdHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVkKHZtZiwgcHJvdCwgVFRNX0JP X1ZNX05VTV9QUkVGQVVMVCk7CisJcmV0ID0gdHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVkKHZtZiwg cHJvdCwgVFRNX0JPX1ZNX05VTV9QUkVGQVVMVCwgMSk7CiAJaWYgKHJldCA9PSBWTV9GQVVMVF9S RVRSWSAmJiAhKHZtZi0+ZmxhZ3MgJiBGQVVMVF9GTEFHX1JFVFJZX05PV0FJVCkpCiAJCXJldHVy biByZXQ7CiAKQEAgLTM0NCw2ICs0MzYsNTAgQEAgdm1fZmF1bHRfdCB0dG1fYm9fdm1fZmF1bHQo c3RydWN0IHZtX2ZhdWx0ICp2bWYpCiB9CiBFWFBPUlRfU1lNQk9MKHR0bV9ib192bV9mYXVsdCk7 CiAKKyNpZmRlZiBDT05GSUdfVFJBTlNQQVJFTlRfSFVHRVBBR0UKK3N0YXRpYyB2bV9mYXVsdF90 IHR0bV9ib192bV9odWdlX2ZhdWx0KHN0cnVjdCB2bV9mYXVsdCAqdm1mLAorCQkJCSAgICAgICBl bnVtIHBhZ2VfZW50cnlfc2l6ZSBwZV9zaXplKQoreworCXN0cnVjdCB2bV9hcmVhX3N0cnVjdCAq dm1hID0gdm1mLT52bWE7CisJcGdwcm90X3QgcHJvdDsKKwlzdHJ1Y3QgdHRtX2J1ZmZlcl9vYmpl Y3QgKmJvID0gdm1hLT52bV9wcml2YXRlX2RhdGE7CisJdm1fZmF1bHRfdCByZXQ7CisJcGdvZmZf dCBmYXVsdF9wYWdlX3NpemUgPSAwOworCWJvb2wgd3JpdGUgPSB2bWYtPmZsYWdzICYgRkFVTFRf RkxBR19XUklURTsKKworCXN3aXRjaCAocGVfc2l6ZSkgeworCWNhc2UgUEVfU0laRV9QTUQ6CisJ CWZhdWx0X3BhZ2Vfc2l6ZSA9IEhQQUdFX1BNRF9TSVpFID4+IFBBR0VfU0hJRlQ7CisJCWJyZWFr OworI2lmZGVmIENPTkZJR19IQVZFX0FSQ0hfVFJBTlNQQVJFTlRfSFVHRVBBR0VfUFVECisJY2Fz ZSBQRV9TSVpFX1BVRDoKKwkJZmF1bHRfcGFnZV9zaXplID0gSFBBR0VfUFVEX1NJWkUgPj4gUEFH RV9TSElGVDsKKwkJYnJlYWs7CisjZW5kaWYKKwlkZWZhdWx0OgorCQlXQVJOX09OX09OQ0UoMSk7 CisJCXJldHVybiBWTV9GQVVMVF9GQUxMQkFDSzsKKwl9CisKKwkvKiBGYWxsYmFjayBvbiB3cml0 ZSBkaXJ0eS10cmFja2luZyBvciBDT1cgKi8KKwlpZiAod3JpdGUgJiYgIShwZ3Byb3RfdmFsKHZt Zi0+dm1hLT52bV9wYWdlX3Byb3QpICYgX1BBR0VfUlcpKQorCQlyZXR1cm4gVk1fRkFVTFRfRkFM TEJBQ0s7CisKKwlyZXQgPSB0dG1fYm9fdm1fcmVzZXJ2ZShibywgdm1mKTsKKwlpZiAocmV0KQor CQlyZXR1cm4gcmV0OworCisJcHJvdCA9IHZtX2dldF9wYWdlX3Byb3Qodm1hLT52bV9mbGFncyk7 CisJcmV0ID0gdHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVkKHZtZiwgcHJvdCwgMSwgZmF1bHRfcGFn ZV9zaXplKTsKKwlpZiAocmV0ID09IFZNX0ZBVUxUX1JFVFJZICYmICEodm1mLT5mbGFncyAmIEZB VUxUX0ZMQUdfUkVUUllfTk9XQUlUKSkKKwkJcmV0dXJuIHJldDsKKworCWRtYV9yZXN2X3VubG9j ayhiby0+YmFzZS5yZXN2KTsKKworCXJldHVybiByZXQ7Cit9CisjZW5kaWYKKwogdm9pZCB0dG1f Ym9fdm1fb3BlbihzdHJ1Y3Qgdm1fYXJlYV9zdHJ1Y3QgKnZtYSkKIHsKIAlzdHJ1Y3QgdHRtX2J1 ZmZlcl9vYmplY3QgKmJvID0gdm1hLT52bV9wcml2YXRlX2RhdGE7CkBAIC00NDUsNyArNTgxLDEw IEBAIHN0YXRpYyBjb25zdCBzdHJ1Y3Qgdm1fb3BlcmF0aW9uc19zdHJ1Y3QgdHRtX2JvX3ZtX29w cyA9IHsKIAkuZmF1bHQgPSB0dG1fYm9fdm1fZmF1bHQsCiAJLm9wZW4gPSB0dG1fYm9fdm1fb3Bl biwKIAkuY2xvc2UgPSB0dG1fYm9fdm1fY2xvc2UsCi0JLmFjY2VzcyA9IHR0bV9ib192bV9hY2Nl c3MKKwkuYWNjZXNzID0gdHRtX2JvX3ZtX2FjY2VzcywKKyNpZmRlZiBDT05GSUdfVFJBTlNQQVJF TlRfSFVHRVBBR0UKKwkuaHVnZV9mYXVsdCA9IHR0bV9ib192bV9odWdlX2ZhdWx0LAorI2VuZGlm CiB9OwogCiBzdGF0aWMgc3RydWN0IHR0bV9idWZmZXJfb2JqZWN0ICp0dG1fYm9fdm1fbG9va3Vw KHN0cnVjdCB0dG1fYm9fZGV2aWNlICpiZGV2LApkaWZmIC0tZ2l0IGEvZHJpdmVycy9ncHUvZHJt L3Ztd2dmeC92bXdnZnhfcGFnZV9kaXJ0eS5jIGIvZHJpdmVycy9ncHUvZHJtL3Ztd2dmeC92bXdn ZnhfcGFnZV9kaXJ0eS5jCmluZGV4IGYwN2FhODU3NTg3Yy4uMTdhNWRjYTdiOTIxIDEwMDY0NAot LS0gYS9kcml2ZXJzL2dwdS9kcm0vdm13Z2Z4L3Ztd2dmeF9wYWdlX2RpcnR5LmMKKysrIGIvZHJp dmVycy9ncHUvZHJtL3Ztd2dmeC92bXdnZnhfcGFnZV9kaXJ0eS5jCkBAIC00NzcsNyArNDc3LDcg QEAgdm1fZmF1bHRfdCB2bXdfYm9fdm1fZmF1bHQoc3RydWN0IHZtX2ZhdWx0ICp2bWYpCiAJZWxz ZQogCQlwcm90ID0gdm1fZ2V0X3BhZ2VfcHJvdCh2bWEtPnZtX2ZsYWdzKTsKIAotCXJldCA9IHR0 bV9ib192bV9mYXVsdF9yZXNlcnZlZCh2bWYsIHByb3QsIG51bV9wcmVmYXVsdCk7CisJcmV0ID0g dHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVkKHZtZiwgcHJvdCwgbnVtX3ByZWZhdWx0LCAxKTsKIAlp ZiAocmV0ID09IFZNX0ZBVUxUX1JFVFJZICYmICEodm1mLT5mbGFncyAmIEZBVUxUX0ZMQUdfUkVU UllfTk9XQUlUKSkKIAkJcmV0dXJuIHJldDsKIApkaWZmIC0tZ2l0IGEvaW5jbHVkZS9kcm0vdHRt L3R0bV9ib19hcGkuaCBiL2luY2x1ZGUvZHJtL3R0bS90dG1fYm9fYXBpLmgKaW5kZXggNjZjYTQ5 ZGI5NjMzLi40ZmM5MGQ1M2FhMTUgMTAwNjQ0Ci0tLSBhL2luY2x1ZGUvZHJtL3R0bS90dG1fYm9f YXBpLmgKKysrIGIvaW5jbHVkZS9kcm0vdHRtL3R0bV9ib19hcGkuaApAQCAtNzMyLDcgKzczMiw4 IEBAIHZtX2ZhdWx0X3QgdHRtX2JvX3ZtX3Jlc2VydmUoc3RydWN0IHR0bV9idWZmZXJfb2JqZWN0 ICpibywKIAogdm1fZmF1bHRfdCB0dG1fYm9fdm1fZmF1bHRfcmVzZXJ2ZWQoc3RydWN0IHZtX2Zh dWx0ICp2bWYsCiAJCQkJICAgIHBncHJvdF90IHByb3QsCi0JCQkJICAgIHBnb2ZmX3QgbnVtX3By ZWZhdWx0KTsKKwkJCQkgICAgcGdvZmZfdCBudW1fcHJlZmF1bHQsCisJCQkJICAgIHBnb2ZmX3Qg ZmF1bHRfcGFnZV9zaXplKTsKIAogdm1fZmF1bHRfdCB0dG1fYm9fdm1fZmF1bHQoc3RydWN0IHZt X2ZhdWx0ICp2bWYpOwogCi0tIAoyLjIxLjEKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fCmRyaS1kZXZlbCBtYWlsaW5nIGxpc3QKZHJpLWRldmVsQGxpc3Rz LmZyZWVkZXNrdG9wLm9yZwpodHRwczovL2xpc3RzLmZyZWVkZXNrdG9wLm9yZy9tYWlsbWFuL2xp c3RpbmZvL2RyaS1kZXZlbAo=