From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-23.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 946F2C433ED for ; Fri, 7 May 2021 13:17:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 4EBD961443 for ; Fri, 7 May 2021 13:17:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235811AbhEGNS2 (ORCPT ); Fri, 7 May 2021 09:18:28 -0400 Received: from linux.microsoft.com ([13.77.154.182]:38096 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229886AbhEGNS0 (ORCPT ); Fri, 7 May 2021 09:18:26 -0400 Received: from sequoia (162-237-133-238.lightspeed.rcsntx.sbcglobal.net [162.237.133.238]) by linux.microsoft.com (Postfix) with ESMTPSA id 9568220B7178; Fri, 7 May 2021 06:17:26 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 9568220B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620393447; bh=O0sGut629s/5sRDO5XmeFujIZDeFV3Zst2hFoI075uw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jf5DC2Tj09LIfYhxgX7I0s4OYkx/IwQlJjlhfziAPdzwxYBo/4Bhv0uEhNgHv7DVM nYohU3SUahtBs7Zv0cg70SHav0UIZatLoFfOZxBKSeXXUy9dSnLb5jDvY2EZo2ugdD FUTcO5wm0pkS2eg9Vy4VgHOt9nu1TCH/zoBF9oSY= Date: Fri, 7 May 2021 08:17:22 -0500 From: Tyler Hicks To: Jens Wiklander Cc: Allen Pais , zajec5@gmail.com, Allen Pais , bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Subject: Re: [PATCH] optee: Disable shm cache when booting the crash kernel Message-ID: <20210507131722.GI4967@sequoia> References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210507035816.426585-1-tyhicks@linux.microsoft.com> <720CDF03-42F9-43C3-B3B3-999E4A5E2864@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-05-07 11:23:17, Jens Wiklander wrote: > On Fri, May 7, 2021 at 9:00 AM Allen Pais wrote: > > > > > > > > > On 07-May-2021, at 9:28 AM, Tyler Hicks wrote: > > > > > > The .shutdown hook is not called after a kernel crash when a kdump > > > kernel is pre-loaded. A kexec into the kdump kernel takes place as > > > quickly as possible without allowing drivers to clean up. > > > > > > That means that the OP-TEE shared memory cache, which was initialized by > > > the kernel that crashed, is still in place when the kdump kernel is > > > booted. As the kdump kernel is shutdown, the .shutdown hook is called, > > > which calls optee_disable_shm_cache(), and OP-TEE's > > > OPTEE_SMC_DISABLE_SHM_CACHE API returns virtual addresses that are not > > > mapped for the kdump kernel since the cache was set up by the previous > > > kernel. Trying to dereference the tee_shm pointer or otherwise translate > > > the address results in a fault that cannot be handled: > > > > > > Unable to handle kernel paging request at virtual address ffff4317b9c09744 > > > Mem abort info: > > > ESR = 0x96000004 > > > EC = 0x25: DABT (current EL), IL = 32 bits > > > SET = 0, FnV = 0 > > > EA = 0, S1PTW = 0 > > > Data abort info: > > > ISV = 0, ISS = 0x00000004 > > > CM = 0, WnR = 0 > > > swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000970b1e000 > > > [ffff4317b9c09744] pgd=0000000000000000, p4d=0000000000000000 > > > Internal error: Oops: 96000004 [#1] SMP > > > Modules linked in: bnxt_en pcie_iproc_platform pcie_iproc diagbe(O) > > > CPU: 4 PID: 1 Comm: systemd-shutdow Tainted: G O 5.10.19.8 #1 > > > Hardware name: Redacted (DT) > > > pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--) > > > pc : tee_shm_free (/usr/src/kernel/drivers/tee/tee_shm.c:363) > > > lr : optee_disable_shm_cache (/usr/src/kernel/drivers/tee/optee/call.c:441) > > > sp : ffff80001005bb70 > > > x29: ffff80001005bb70 x28: ffff608e74648e00 > > > x27: ffff80001005bb98 x26: dead000000000100 > > > x25: ffff80001005bbb8 x24: aaaaaaaaaaaaaaaa > > > x23: ffff608e74cf8818 x22: ffff608e738be600 > > > x21: ffff80001005bbc8 x20: ffff608e738be638 > > > x19: ffff4317b9c09700 x18: ffffffffffffffff > > > x17: 0000000000000041 x16: ffffba61b5171764 > > > x15: 0000000000000004 x14: 0000000000000fff > > > x13: ffffba61b5c9dfc8 x12: 0000000000000003 > > > x11: 0000000000000000 x10: 0000000000000000 > > > x9 : ffffba61b5413824 x8 : 00000000ffff4317 > > > x7 : 0000000000000000 x6 : 0000000000000000 > > > x5 : 0000000000000000 x4 : 0000000000000000 > > > x3 : 0000000000000000 x2 : ffff4317b9c09700 > > > x1 : 00000000ffff4317 x0 : ffff4317b9c09700 > > > Call trace: > > > tee_shm_free (/usr/src/kernel/drivers/tee/tee_shm.c:363) > > > optee_disable_shm_cache (/usr/src/kernel/drivers/tee/optee/call.c:441) > > > optee_shutdown (/usr/src/kernel/drivers/tee/optee/core.c:636) > > > platform_drv_shutdown (/usr/src/kernel/drivers/base/platform.c:800) > > > device_shutdown (/usr/src/kernel/include/linux/device.h:758 /usr/src/kernel/drivers/base/core.c:4078) > > > kernel_restart (/usr/src/kernel/kernel/reboot.c:221 /usr/src/kernel/kernel/reboot.c:248) > > > __arm64_sys_reboot (/usr/src/kernel/kernel/reboot.c:349 /usr/src/kernel/kernel/reboot.c:312 /usr/src/kernel/kernel/reboot.c:312) > > > do_el0_svc (/usr/src/kernel/arch/arm64/kernel/syscall.c:56 /usr/src/kernel/arch/arm64/kernel/syscall.c:158 /usr/src/kernel/arch/arm64/kernel/syscall.c:197) > > > el0_svc (/usr/src/kernel/arch/arm64/kernel/entry-common.c:368) > > > el0_sync_handler (/usr/src/kernel/arch/arm64/kernel/entry-common.c:428) > > > el0_sync (/usr/src/kernel/arch/arm64/kernel/entry.S:671) > > > Code: aa0003f3 b5000060 12800003 14000002 (b9404663) > > > > > > When booting the kdump kernel, drain the shared memory cache while being > > > careful to not translate the addresses returned from > > > OPTEE_SMC_DISABLE_SHM_CACHE. Once the invalid cache objects are drained > > > and the cache is disabled, proceed with re-enabling the cache so that we > > > aren't dealing with invalid addresses while shutting down the kdump > > > kernel. > > > > > > Signed-off-by: Tyler Hicks > > > --- > > > > > > This patch fixes a crash introduced by "optee: fix tee out of memory > > > failure seen during kexec reboot"[1]. However, I don't think that the > > > original two patch series[2] plus this patch is the full solution to > > > properly handling OP-TEE shared memory across kexec. > > > > > > While testing this fix, I did about 10 kexec reboots and then triggered > > > a kernel crash by writing 'c' to /proc/sysrq-trigger. The kdump kernel > > > became unresponsive during boot while steadily streaming the following > > > errors to the serial console: > > > > > > arm-smmu 64000000.mmu: Blocked unknown Stream ID 0x2000; boot with "arm-smmu.disable_bypass=0" to allow, but this may have security implications > > > arm-smmu 64000000.mmu: GFSR 0x00000002, GFSYNR0 0x00000002, GFSYNR1 0x00002000, GFSYNR2 0x00000000 > > > > > > I suspect that this is related to the problems of OP-TEE shared memory > > > handling across kexec. My current hunch is that while we've disabled the > > > shared memory cache with this patch, we haven't unregistered all of the > > > addresses that the previous kernel (which crashed) had registered with > > > OP-TEE and that perhaps OP-TEE OS is still trying to make use those > > > addresses? @Jens did you have any thoughts on what could be happening here with the arm-smmu errors? Do I need to try to unregister the cached shared memory addresses when booting the kdump kernel, rather than just disabling the caches? Tyler > > > > > > I'm still pretty early in investigating that assumption and > > > I'm learning about OP-TEE as I go but I wanted to get this initial > > > fix-of-the-fix out so that it was clear that the v2 of the series[2] is > > > not complete. > > > > > > [1] https://lore.kernel.org/lkml/20210225090610.242623-2-allen.lkml@gmail.com/ > > > [2] https://lore.kernel.org/lkml/20210225090610.242623-1-allen.lkml@gmail.com/#t > > > > > > drivers/tee/optee/call.c | 11 ++++++++++- > > > drivers/tee/optee/core.c | 13 +++++++++++-- > > > drivers/tee/optee/optee_private.h | 2 +- > > > 3 files changed, 22 insertions(+), 4 deletions(-) > > > > > > diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c > > > index 6132cc8d014c..799e84bec63d 100644 > > > --- a/drivers/tee/optee/call.c > > > +++ b/drivers/tee/optee/call.c > > > @@ -417,8 +417,10 @@ void optee_enable_shm_cache(struct optee *optee) > > > * optee_disable_shm_cache() - Disables caching of some shared memory allocation > > > * in OP-TEE > > > * @optee: main service struct > > > + * @is_mapped: true if the cached shared memory addresses were mapped by this > > > + * kernel, are safe to dereference, and should be freed > > > */ > > > -void optee_disable_shm_cache(struct optee *optee) > > > +void optee_disable_shm_cache(struct optee *optee, bool is_mapped) > > > { > > > struct optee_call_waiter w; > > > > > > @@ -437,6 +439,13 @@ void optee_disable_shm_cache(struct optee *optee) > > > if (res.result.status == OPTEE_SMC_RETURN_OK) { > > > struct tee_shm *shm; > > > > > > > Thanks Tyler. > > From what I understand from my email exchange with Jens, I don’t > > Think we want to touch optee_disable_shm_cache(), I could be wrong too, > > @Jens, comments? > > Changing optee_disable_shm_cache() is fine. Bear in mind that there > are other times where we can't recover from a kernel crash. For > instance if a thread is executing in OP-TEE in secure world. > > Cheers, > Jens > From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id ECF08C433B4 for ; Fri, 7 May 2021 13:19:24 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 54D6D61042 for ; Fri, 7 May 2021 13:19:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 54D6D61042 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=XdEcUVrpsjV90AA4mhPlSMn5tkDHBXDHaq4+6mbEiRc=; b=dxZGcJuXmwNzezlVA6oIZraV9 kvAGUGm34EfH+pnc1N+Q112T5Zt6Q8+CLvrMjqzLyEVIKvfcOVJoPcMPTZwfmEFzDmYQhtyWTQCfh I1EYRPYbpQbPkJEG6UPppnxQiPZv6Ftq2kyjDPi01JPkbuf8Dsnwqu0V0kkaOI7PSSxFCTsuG3If0 uo0gZGHEv1s11msXrf8Emk+/3Z4J47Dj6tQsXL1zi3e/ZJMxmWPHouFtlV0Kg0pfhlcvYAX8Lp33s GGeV/hNxYoTOsVby0/YeqWukwzsRLC32SzEDmHmbVspxyefsyIQ7JAXXRixtNzHfuJTFP1Xht7peq Too6AxfxA==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lf0MJ-00797V-GH; Fri, 07 May 2021 13:17:35 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lf0MG-00796y-JO for linux-arm-kernel@desiato.infradead.org; Fri, 07 May 2021 13:17:33 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=In-Reply-To:Content-Transfer-Encoding :Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date: Sender:Reply-To:Content-ID:Content-Description; bh=O0sGut629s/5sRDO5XmeFujIZDeFV3Zst2hFoI075uw=; b=DkKil9CbMvyYui3uVOzUWF84v4 7D7lRrp3kb1tktTOSD4Md/Chh4hv40DZk1rIQg01oFOhMH1gaBx4OWZ6Z7vtBXH1wgjGxGfushc+Z +gYfZ0Ww/7NIwFeTwu9PHPSvIqhqqZ6ulvUZ4pEbOerTJ23cnqbRVVxBC4+CAxChLjYls7IBMa3Dw VIqIF3gg/kODU56JqgFIvvjTax3AhwdBbIYLXO8DI2VD3SrNZm0s012fy3NQohEC3HHVtc+Y+OZjH 7DnVLJ+Cj4KofvT/jvng1S6AOKXProskescwN/g/qVbnbkWYazz2ZJYeGE7lvE2g8D3vvyL6Rxlku 7dzZKCmA==; Received: from linux.microsoft.com ([13.77.154.182]) by bombadil.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lf0MD-006siG-CL for linux-arm-kernel@lists.infradead.org; Fri, 07 May 2021 13:17:31 +0000 Received: from sequoia (162-237-133-238.lightspeed.rcsntx.sbcglobal.net [162.237.133.238]) by linux.microsoft.com (Postfix) with ESMTPSA id 9568220B7178; Fri, 7 May 2021 06:17:26 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 9568220B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620393447; bh=O0sGut629s/5sRDO5XmeFujIZDeFV3Zst2hFoI075uw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jf5DC2Tj09LIfYhxgX7I0s4OYkx/IwQlJjlhfziAPdzwxYBo/4Bhv0uEhNgHv7DVM nYohU3SUahtBs7Zv0cg70SHav0UIZatLoFfOZxBKSeXXUy9dSnLb5jDvY2EZo2ugdD FUTcO5wm0pkS2eg9Vy4VgHOt9nu1TCH/zoBF9oSY= Date: Fri, 7 May 2021 08:17:22 -0500 From: Tyler Hicks To: Jens Wiklander Cc: Allen Pais , zajec5@gmail.com, Allen Pais , bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Subject: Re: [PATCH] optee: Disable shm cache when booting the crash kernel Message-ID: <20210507131722.GI4967@sequoia> References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210507035816.426585-1-tyhicks@linux.microsoft.com> <720CDF03-42F9-43C3-B3B3-999E4A5E2864@linux.microsoft.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210507_061729_501417_FFDE0E33 X-CRM114-Status: GOOD ( 46.03 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org T24gMjAyMS0wNS0wNyAxMToyMzoxNywgSmVucyBXaWtsYW5kZXIgd3JvdGU6Cj4gT24gRnJpLCBN YXkgNywgMjAyMSBhdCA5OjAwIEFNIEFsbGVuIFBhaXMgPGFwYWlzQGxpbnV4Lm1pY3Jvc29mdC5j b20+IHdyb3RlOgo+ID4KPiA+Cj4gPgo+ID4gPiBPbiAwNy1NYXktMjAyMSwgYXQgOToyOCBBTSwg VHlsZXIgSGlja3MgPHR5aGlja3NAbGludXgubWljcm9zb2Z0LmNvbT4gd3JvdGU6Cj4gPiA+Cj4g PiA+IFRoZSAuc2h1dGRvd24gaG9vayBpcyBub3QgY2FsbGVkIGFmdGVyIGEga2VybmVsIGNyYXNo IHdoZW4gYSBrZHVtcAo+ID4gPiBrZXJuZWwgaXMgcHJlLWxvYWRlZC4gQSBrZXhlYyBpbnRvIHRo ZSBrZHVtcCBrZXJuZWwgdGFrZXMgcGxhY2UgYXMKPiA+ID4gcXVpY2tseSBhcyBwb3NzaWJsZSB3 aXRob3V0IGFsbG93aW5nIGRyaXZlcnMgdG8gY2xlYW4gdXAuCj4gPiA+Cj4gPiA+IFRoYXQgbWVh bnMgdGhhdCB0aGUgT1AtVEVFIHNoYXJlZCBtZW1vcnkgY2FjaGUsIHdoaWNoIHdhcyBpbml0aWFs aXplZCBieQo+ID4gPiB0aGUga2VybmVsIHRoYXQgY3Jhc2hlZCwgaXMgc3RpbGwgaW4gcGxhY2Ug d2hlbiB0aGUga2R1bXAga2VybmVsIGlzCj4gPiA+IGJvb3RlZC4gQXMgdGhlIGtkdW1wIGtlcm5l bCBpcyBzaHV0ZG93biwgdGhlIC5zaHV0ZG93biBob29rIGlzIGNhbGxlZCwKPiA+ID4gd2hpY2gg Y2FsbHMgb3B0ZWVfZGlzYWJsZV9zaG1fY2FjaGUoKSwgYW5kIE9QLVRFRSdzCj4gPiA+IE9QVEVF X1NNQ19ESVNBQkxFX1NITV9DQUNIRSBBUEkgcmV0dXJucyB2aXJ0dWFsIGFkZHJlc3NlcyB0aGF0 IGFyZSBub3QKPiA+ID4gbWFwcGVkIGZvciB0aGUga2R1bXAga2VybmVsIHNpbmNlIHRoZSBjYWNo ZSB3YXMgc2V0IHVwIGJ5IHRoZSBwcmV2aW91cwo+ID4gPiBrZXJuZWwuIFRyeWluZyB0byBkZXJl ZmVyZW5jZSB0aGUgdGVlX3NobSBwb2ludGVyIG9yIG90aGVyd2lzZSB0cmFuc2xhdGUKPiA+ID4g dGhlIGFkZHJlc3MgcmVzdWx0cyBpbiBhIGZhdWx0IHRoYXQgY2Fubm90IGJlIGhhbmRsZWQ6Cj4g PiA+Cj4gPiA+IFVuYWJsZSB0byBoYW5kbGUga2VybmVsIHBhZ2luZyByZXF1ZXN0IGF0IHZpcnR1 YWwgYWRkcmVzcyBmZmZmNDMxN2I5YzA5NzQ0Cj4gPiA+IE1lbSBhYm9ydCBpbmZvOgo+ID4gPiAg IEVTUiA9IDB4OTYwMDAwMDQKPiA+ID4gICBFQyA9IDB4MjU6IERBQlQgKGN1cnJlbnQgRUwpLCBJ TCA9IDMyIGJpdHMKPiA+ID4gICBTRVQgPSAwLCBGblYgPSAwCj4gPiA+ICAgRUEgPSAwLCBTMVBU VyA9IDAKPiA+ID4gRGF0YSBhYm9ydCBpbmZvOgo+ID4gPiAgIElTViA9IDAsIElTUyA9IDB4MDAw MDAwMDQKPiA+ID4gICBDTSA9IDAsIFduUiA9IDAKPiA+ID4gc3dhcHBlciBwZ3RhYmxlOiA0ayBw YWdlcywgNDgtYml0IFZBcywgcGdkcD0wMDAwMDAwOTcwYjFlMDAwCj4gPiA+IFtmZmZmNDMxN2I5 YzA5NzQ0XSBwZ2Q9MDAwMDAwMDAwMDAwMDAwMCwgcDRkPTAwMDAwMDAwMDAwMDAwMDAKPiA+ID4g SW50ZXJuYWwgZXJyb3I6IE9vcHM6IDk2MDAwMDA0IFsjMV0gU01QCj4gPiA+IE1vZHVsZXMgbGlu a2VkIGluOiBibnh0X2VuIHBjaWVfaXByb2NfcGxhdGZvcm0gcGNpZV9pcHJvYyBkaWFnYmUoTykK PiA+ID4gQ1BVOiA0IFBJRDogMSBDb21tOiBzeXN0ZW1kLXNodXRkb3cgVGFpbnRlZDogRyAgICAg ICAgICAgTyAgICAgIDUuMTAuMTkuOCAjMQo+ID4gPiBIYXJkd2FyZSBuYW1lOiBSZWRhY3RlZCAo RFQpCj4gPiA+IHBzdGF0ZTogNjA0MDAwMDUgKG5aQ3YgZGFpZiArUEFOIC1VQU8gLVRDTyBCVFlQ RT0tLSkKPiA+ID4gcGMgOiB0ZWVfc2htX2ZyZWUgKC91c3Ivc3JjL2tlcm5lbC9kcml2ZXJzL3Rl ZS90ZWVfc2htLmM6MzYzKQo+ID4gPiBsciA6IG9wdGVlX2Rpc2FibGVfc2htX2NhY2hlICgvdXNy L3NyYy9rZXJuZWwvZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5jOjQ0MSkKPiA+ID4gc3AgOiBmZmZm ODAwMDEwMDViYjcwCj4gPiA+IHgyOTogZmZmZjgwMDAxMDA1YmI3MCB4Mjg6IGZmZmY2MDhlNzQ2 NDhlMDAKPiA+ID4geDI3OiBmZmZmODAwMDEwMDViYjk4IHgyNjogZGVhZDAwMDAwMDAwMDEwMAo+ ID4gPiB4MjU6IGZmZmY4MDAwMTAwNWJiYjggeDI0OiBhYWFhYWFhYWFhYWFhYWFhCj4gPiA+IHgy MzogZmZmZjYwOGU3NGNmODgxOCB4MjI6IGZmZmY2MDhlNzM4YmU2MDAKPiA+ID4geDIxOiBmZmZm ODAwMDEwMDViYmM4IHgyMDogZmZmZjYwOGU3MzhiZTYzOAo+ID4gPiB4MTk6IGZmZmY0MzE3Yjlj MDk3MDAgeDE4OiBmZmZmZmZmZmZmZmZmZmZmCj4gPiA+IHgxNzogMDAwMDAwMDAwMDAwMDA0MSB4 MTY6IGZmZmZiYTYxYjUxNzE3NjQKPiA+ID4geDE1OiAwMDAwMDAwMDAwMDAwMDA0IHgxNDogMDAw MDAwMDAwMDAwMGZmZgo+ID4gPiB4MTM6IGZmZmZiYTYxYjVjOWRmYzggeDEyOiAwMDAwMDAwMDAw MDAwMDAzCj4gPiA+IHgxMTogMDAwMDAwMDAwMDAwMDAwMCB4MTA6IDAwMDAwMDAwMDAwMDAwMDAK PiA+ID4geDkgOiBmZmZmYmE2MWI1NDEzODI0IHg4IDogMDAwMDAwMDBmZmZmNDMxNwo+ID4gPiB4 NyA6IDAwMDAwMDAwMDAwMDAwMDAgeDYgOiAwMDAwMDAwMDAwMDAwMDAwCj4gPiA+IHg1IDogMDAw MDAwMDAwMDAwMDAwMCB4NCA6IDAwMDAwMDAwMDAwMDAwMDAKPiA+ID4geDMgOiAwMDAwMDAwMDAw MDAwMDAwIHgyIDogZmZmZjQzMTdiOWMwOTcwMAo+ID4gPiB4MSA6IDAwMDAwMDAwZmZmZjQzMTcg eDAgOiBmZmZmNDMxN2I5YzA5NzAwCj4gPiA+IENhbGwgdHJhY2U6Cj4gPiA+IHRlZV9zaG1fZnJl ZSAoL3Vzci9zcmMva2VybmVsL2RyaXZlcnMvdGVlL3RlZV9zaG0uYzozNjMpCj4gPiA+IG9wdGVl X2Rpc2FibGVfc2htX2NhY2hlICgvdXNyL3NyYy9rZXJuZWwvZHJpdmVycy90ZWUvb3B0ZWUvY2Fs bC5jOjQ0MSkKPiA+ID4gb3B0ZWVfc2h1dGRvd24gKC91c3Ivc3JjL2tlcm5lbC9kcml2ZXJzL3Rl ZS9vcHRlZS9jb3JlLmM6NjM2KQo+ID4gPiBwbGF0Zm9ybV9kcnZfc2h1dGRvd24gKC91c3Ivc3Jj L2tlcm5lbC9kcml2ZXJzL2Jhc2UvcGxhdGZvcm0uYzo4MDApCj4gPiA+IGRldmljZV9zaHV0ZG93 biAoL3Vzci9zcmMva2VybmVsL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NzU4IC91c3Ivc3JjL2tl cm5lbC9kcml2ZXJzL2Jhc2UvY29yZS5jOjQwNzgpCj4gPiA+IGtlcm5lbF9yZXN0YXJ0ICgvdXNy L3NyYy9rZXJuZWwva2VybmVsL3JlYm9vdC5jOjIyMSAvdXNyL3NyYy9rZXJuZWwva2VybmVsL3Jl Ym9vdC5jOjI0OCkKPiA+ID4gX19hcm02NF9zeXNfcmVib290ICgvdXNyL3NyYy9rZXJuZWwva2Vy bmVsL3JlYm9vdC5jOjM0OSAvdXNyL3NyYy9rZXJuZWwva2VybmVsL3JlYm9vdC5jOjMxMiAvdXNy L3NyYy9rZXJuZWwva2VybmVsL3JlYm9vdC5jOjMxMikKPiA+ID4gZG9fZWwwX3N2YyAoL3Vzci9z cmMva2VybmVsL2FyY2gvYXJtNjQva2VybmVsL3N5c2NhbGwuYzo1NiAvdXNyL3NyYy9rZXJuZWwv YXJjaC9hcm02NC9rZXJuZWwvc3lzY2FsbC5jOjE1OCAvdXNyL3NyYy9rZXJuZWwvYXJjaC9hcm02 NC9rZXJuZWwvc3lzY2FsbC5jOjE5NykKPiA+ID4gZWwwX3N2YyAoL3Vzci9zcmMva2VybmVsL2Fy Y2gvYXJtNjQva2VybmVsL2VudHJ5LWNvbW1vbi5jOjM2OCkKPiA+ID4gZWwwX3N5bmNfaGFuZGxl ciAoL3Vzci9zcmMva2VybmVsL2FyY2gvYXJtNjQva2VybmVsL2VudHJ5LWNvbW1vbi5jOjQyOCkK PiA+ID4gZWwwX3N5bmMgKC91c3Ivc3JjL2tlcm5lbC9hcmNoL2FybTY0L2tlcm5lbC9lbnRyeS5T OjY3MSkKPiA+ID4gQ29kZTogYWEwMDAzZjMgYjUwMDAwNjAgMTI4MDAwMDMgMTQwMDAwMDIgKGI5 NDA0NjYzKQo+ID4gPgo+ID4gPiBXaGVuIGJvb3RpbmcgdGhlIGtkdW1wIGtlcm5lbCwgZHJhaW4g dGhlIHNoYXJlZCBtZW1vcnkgY2FjaGUgd2hpbGUgYmVpbmcKPiA+ID4gY2FyZWZ1bCB0byBub3Qg dHJhbnNsYXRlIHRoZSBhZGRyZXNzZXMgcmV0dXJuZWQgZnJvbQo+ID4gPiBPUFRFRV9TTUNfRElT QUJMRV9TSE1fQ0FDSEUuIE9uY2UgdGhlIGludmFsaWQgY2FjaGUgb2JqZWN0cyBhcmUgZHJhaW5l ZAo+ID4gPiBhbmQgdGhlIGNhY2hlIGlzIGRpc2FibGVkLCBwcm9jZWVkIHdpdGggcmUtZW5hYmxp bmcgdGhlIGNhY2hlIHNvIHRoYXQgd2UKPiA+ID4gYXJlbid0IGRlYWxpbmcgd2l0aCBpbnZhbGlk IGFkZHJlc3NlcyB3aGlsZSBzaHV0dGluZyBkb3duIHRoZSBrZHVtcAo+ID4gPiBrZXJuZWwuCj4g PiA+Cj4gPiA+IFNpZ25lZC1vZmYtYnk6IFR5bGVyIEhpY2tzIDx0eWhpY2tzQGxpbnV4Lm1pY3Jv c29mdC5jb20+Cj4gPiA+IC0tLQo+ID4gPgo+ID4gPiBUaGlzIHBhdGNoIGZpeGVzIGEgY3Jhc2gg aW50cm9kdWNlZCBieSAib3B0ZWU6IGZpeCB0ZWUgb3V0IG9mIG1lbW9yeQo+ID4gPiBmYWlsdXJl IHNlZW4gZHVyaW5nIGtleGVjIHJlYm9vdCJbMV0uIEhvd2V2ZXIsIEkgZG9uJ3QgdGhpbmsgdGhh dCB0aGUKPiA+ID4gb3JpZ2luYWwgdHdvIHBhdGNoIHNlcmllc1syXSBwbHVzIHRoaXMgcGF0Y2gg aXMgdGhlIGZ1bGwgc29sdXRpb24gdG8KPiA+ID4gcHJvcGVybHkgaGFuZGxpbmcgT1AtVEVFIHNo YXJlZCBtZW1vcnkgYWNyb3NzIGtleGVjLgo+ID4gPgo+ID4gPiBXaGlsZSB0ZXN0aW5nIHRoaXMg Zml4LCBJIGRpZCBhYm91dCAxMCBrZXhlYyByZWJvb3RzIGFuZCB0aGVuIHRyaWdnZXJlZAo+ID4g PiBhIGtlcm5lbCBjcmFzaCBieSB3cml0aW5nICdjJyB0byAvcHJvYy9zeXNycS10cmlnZ2VyLiBU aGUga2R1bXAga2VybmVsCj4gPiA+IGJlY2FtZSB1bnJlc3BvbnNpdmUgZHVyaW5nIGJvb3Qgd2hp bGUgc3RlYWRpbHkgc3RyZWFtaW5nIHRoZSBmb2xsb3dpbmcKPiA+ID4gZXJyb3JzIHRvIHRoZSBz ZXJpYWwgY29uc29sZToKPiA+ID4KPiA+ID4gYXJtLXNtbXUgNjQwMDAwMDAubW11OiBCbG9ja2Vk IHVua25vd24gU3RyZWFtIElEIDB4MjAwMDsgYm9vdCB3aXRoICJhcm0tc21tdS5kaXNhYmxlX2J5 cGFzcz0wIiB0byBhbGxvdywgYnV0IHRoaXMgbWF5IGhhdmUgc2VjdXJpdHkgaW1wbGljYXRpb25z Cj4gPiA+IGFybS1zbW11IDY0MDAwMDAwLm1tdTogICAgIEdGU1IgMHgwMDAwMDAwMiwgR0ZTWU5S MCAweDAwMDAwMDAyLCBHRlNZTlIxIDB4MDAwMDIwMDAsIEdGU1lOUjIgMHgwMDAwMDAwMAo+ID4g Pgo+ID4gPiBJIHN1c3BlY3QgdGhhdCB0aGlzIGlzIHJlbGF0ZWQgdG8gdGhlIHByb2JsZW1zIG9m IE9QLVRFRSBzaGFyZWQgbWVtb3J5Cj4gPiA+IGhhbmRsaW5nIGFjcm9zcyBrZXhlYy4gTXkgY3Vy cmVudCBodW5jaCBpcyB0aGF0IHdoaWxlIHdlJ3ZlIGRpc2FibGVkIHRoZQo+ID4gPiBzaGFyZWQg bWVtb3J5IGNhY2hlIHdpdGggdGhpcyBwYXRjaCwgd2UgaGF2ZW4ndCB1bnJlZ2lzdGVyZWQgYWxs IG9mIHRoZQo+ID4gPiBhZGRyZXNzZXMgdGhhdCB0aGUgcHJldmlvdXMga2VybmVsICh3aGljaCBj cmFzaGVkKSBoYWQgcmVnaXN0ZXJlZCB3aXRoCj4gPiA+IE9QLVRFRSBhbmQgdGhhdCBwZXJoYXBz IE9QLVRFRSBPUyBpcyBzdGlsbCB0cnlpbmcgdG8gbWFrZSB1c2UgdGhvc2UKPiA+ID4gYWRkcmVz c2VzPwoKQEplbnMgZGlkIHlvdSBoYXZlIGFueSB0aG91Z2h0cyBvbiB3aGF0IGNvdWxkIGJlIGhh cHBlbmluZyBoZXJlIHdpdGggdGhlCmFybS1zbW11IGVycm9ycz8gRG8gSSBuZWVkIHRvIHRyeSB0 byB1bnJlZ2lzdGVyIHRoZSBjYWNoZWQgc2hhcmVkIG1lbW9yeQphZGRyZXNzZXMgd2hlbiBib290 aW5nIHRoZSBrZHVtcCBrZXJuZWwsIHJhdGhlciB0aGFuIGp1c3QgZGlzYWJsaW5nIHRoZQpjYWNo ZXM/CgpUeWxlcgoKPiA+ID4KPiA+ID4gSSdtIHN0aWxsIHByZXR0eSBlYXJseSBpbiBpbnZlc3Rp Z2F0aW5nIHRoYXQgYXNzdW1wdGlvbiBhbmQKPiA+ID4gSSdtIGxlYXJuaW5nIGFib3V0IE9QLVRF RSBhcyBJIGdvIGJ1dCBJIHdhbnRlZCB0byBnZXQgdGhpcyBpbml0aWFsCj4gPiA+IGZpeC1vZi10 aGUtZml4IG91dCBzbyB0aGF0IGl0IHdhcyBjbGVhciB0aGF0IHRoZSB2MiBvZiB0aGUgc2VyaWVz WzJdIGlzCj4gPiA+IG5vdCBjb21wbGV0ZS4KPiA+ID4KPiA+ID4gWzFdIGh0dHBzOi8vbG9yZS5r ZXJuZWwub3JnL2xrbWwvMjAyMTAyMjUwOTA2MTAuMjQyNjIzLTItYWxsZW4ubGttbEBnbWFpbC5j b20vCj4gPiA+IFsyXSBodHRwczovL2xvcmUua2VybmVsLm9yZy9sa21sLzIwMjEwMjI1MDkwNjEw LjI0MjYyMy0xLWFsbGVuLmxrbWxAZ21haWwuY29tLyN0Cj4gPiA+Cj4gPiA+IGRyaXZlcnMvdGVl L29wdGVlL2NhbGwuYyAgICAgICAgICB8IDExICsrKysrKysrKystCj4gPiA+IGRyaXZlcnMvdGVl L29wdGVlL2NvcmUuYyAgICAgICAgICB8IDEzICsrKysrKysrKysrLS0KPiA+ID4gZHJpdmVycy90 ZWUvb3B0ZWUvb3B0ZWVfcHJpdmF0ZS5oIHwgIDIgKy0KPiA+ID4gMyBmaWxlcyBjaGFuZ2VkLCAy MiBpbnNlcnRpb25zKCspLCA0IGRlbGV0aW9ucygtKQo+ID4gPgo+ID4gPiBkaWZmIC0tZ2l0IGEv ZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5jIGIvZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5jCj4gPiA+ IGluZGV4IDYxMzJjYzhkMDE0Yy4uNzk5ZTg0YmVjNjNkIDEwMDY0NAo+ID4gPiAtLS0gYS9kcml2 ZXJzL3RlZS9vcHRlZS9jYWxsLmMKPiA+ID4gKysrIGIvZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5j Cj4gPiA+IEBAIC00MTcsOCArNDE3LDEwIEBAIHZvaWQgb3B0ZWVfZW5hYmxlX3NobV9jYWNoZShz dHJ1Y3Qgb3B0ZWUgKm9wdGVlKQo+ID4gPiAgKiBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZSgpIC0g RGlzYWJsZXMgY2FjaGluZyBvZiBzb21lIHNoYXJlZCBtZW1vcnkgYWxsb2NhdGlvbgo+ID4gPiAg KiAgICAgICAgICAgICAgICAgICAgICAgICAgaW4gT1AtVEVFCj4gPiA+ICAqIEBvcHRlZTogICAg bWFpbiBzZXJ2aWNlIHN0cnVjdAo+ID4gPiArICogQGlzX21hcHBlZDogICAgICAgdHJ1ZSBpZiB0 aGUgY2FjaGVkIHNoYXJlZCBtZW1vcnkgYWRkcmVzc2VzIHdlcmUgbWFwcGVkIGJ5IHRoaXMKPiA+ ID4gKyAqICAgICAgICAgICBrZXJuZWwsIGFyZSBzYWZlIHRvIGRlcmVmZXJlbmNlLCBhbmQgc2hv dWxkIGJlIGZyZWVkCj4gPiA+ICAqLwo+ID4gPiAtdm9pZCBvcHRlZV9kaXNhYmxlX3NobV9jYWNo ZShzdHJ1Y3Qgb3B0ZWUgKm9wdGVlKQo+ID4gPiArdm9pZCBvcHRlZV9kaXNhYmxlX3NobV9jYWNo ZShzdHJ1Y3Qgb3B0ZWUgKm9wdGVlLCBib29sIGlzX21hcHBlZCkKPiA+ID4gewo+ID4gPiAgICAg ICBzdHJ1Y3Qgb3B0ZWVfY2FsbF93YWl0ZXIgdzsKPiA+ID4KPiA+ID4gQEAgLTQzNyw2ICs0Mzks MTMgQEAgdm9pZCBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZShzdHJ1Y3Qgb3B0ZWUgKm9wdGVlKQo+ ID4gPiAgICAgICAgICAgICAgIGlmIChyZXMucmVzdWx0LnN0YXR1cyA9PSBPUFRFRV9TTUNfUkVU VVJOX09LKSB7Cj4gPiA+ICAgICAgICAgICAgICAgICAgICAgICBzdHJ1Y3QgdGVlX3NobSAqc2ht Owo+ID4gPgo+ID4KPiA+ICBUaGFua3MgVHlsZXIuCj4gPiAgRnJvbSB3aGF0IEkgdW5kZXJzdGFu ZCBmcm9tIG15IGVtYWlsIGV4Y2hhbmdlIHdpdGggSmVucywgSSBkb27igJl0Cj4gPiBUaGluayB3 ZSB3YW50IHRvIHRvdWNoIG9wdGVlX2Rpc2FibGVfc2htX2NhY2hlKCksIEkgY291bGQgYmUgd3Jv bmcgdG9vLAo+ID4gQEplbnMsIGNvbW1lbnRzPwo+IAo+IENoYW5naW5nIG9wdGVlX2Rpc2FibGVf c2htX2NhY2hlKCkgaXMgZmluZS4gQmVhciBpbiBtaW5kIHRoYXQgdGhlcmUKPiBhcmUgb3RoZXIg dGltZXMgd2hlcmUgd2UgY2FuJ3QgcmVjb3ZlciBmcm9tIGEga2VybmVsIGNyYXNoLiBGb3IKPiBp bnN0YW5jZSBpZiBhIHRocmVhZCBpcyBleGVjdXRpbmcgaW4gT1AtVEVFIGluIHNlY3VyZSB3b3Js ZC4KPiAKPiBDaGVlcnMsCj4gSmVucwo+IAoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX18KbGludXgtYXJtLWtlcm5lbCBtYWlsaW5nIGxpc3QKbGludXgtYXJt LWtlcm5lbEBsaXN0cy5pbmZyYWRlYWQub3JnCmh0dHA6Ly9saXN0cy5pbmZyYWRlYWQub3JnL21h aWxtYW4vbGlzdGluZm8vbGludXgtYXJtLWtlcm5lbAo=