From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.5 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 36225C433DF for ; Wed, 1 Jul 2020 07:15:30 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0F05C2077D for ; Wed, 1 Jul 2020 07:15:30 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728167AbgGAHP2 (ORCPT ); Wed, 1 Jul 2020 03:15:28 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:50350 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728068AbgGAHP2 (ORCPT ); Wed, 1 Jul 2020 03:15:28 -0400 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 1F30BD60DE3960F6D055; Wed, 1 Jul 2020 15:15:26 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.206) with Microsoft SMTP Server (TLS) id 14.3.487.0; Wed, 1 Jul 2020 15:15:20 +0800 Subject: Re: [f2fs-dev] [PATCH] f2fs: add symbolic link to kobject in sysfs To: Daeho Jeong CC: , , , Daeho Jeong References: <20200630005625.2405062-1-daeho43@gmail.com> <961072bb-4c8f-b01e-666d-1f5e35a8b76d@huawei.com> From: Chao Yu Message-ID: <9d1afacc-6033-2bae-d55d-909d50f1904b@huawei.com> Date: Wed, 1 Jul 2020 15:15:19 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/7/1 15:04, Daeho Jeong wrote: > Actually, I want to keep the mount number remaining to the same > number, even if it's re-mounted. Then once there is f2fs umounter, the order will be incorrect... > Or we need to keep track of the number being increased whenever it's > remounted. :( IMO, it needs to always keep the number being increased. Thanks, > > 2020년 7월 1일 (수) 오후 3:36, Chao Yu 님이 작성: >> >> Hi Daeho, >> >> On 2020/6/30 8:56, Daeho Jeong wrote: >>> From: Daeho Jeong >>> >>> Added a symbolic link to directory of sysfs. It will >>> create a symbolic link such as "mount_0" and "mount_1" to >>> each f2fs mount in the order of mounting filesystem. It will >>> provide easy access to sysfs node even if not knowing the >>> specific device node name like sda19 and dm-3. >> >> Just out of curiosity, if we mount/umount as below: >> >> mount /dev/zram0 /mnt/f2fs0 >> mount /dev/zram1 /mnt/f2fs1 >> umount /mnt/f2fs0 >> mount /dev/zram0 /mnt/f2fs0 >> >> Shouldn't sysfs structure be: >> mount_2 -> zram0 >> mount_1 -> zram1 >> zram0 >> zram1 >> >> Then we can know zram0 is mounted after zram1? >> >> However the result shows: >> mount_0 -> zram0 >> mount_1 -> zram1 >> zram0 >> zram1 >> >> Thanks, >> >>> >>> Signed-off-by: Daeho Jeong >>> --- >>> fs/f2fs/f2fs.h | 4 ++++ >>> fs/f2fs/sysfs.c | 31 +++++++++++++++++++++++++++---- >>> 2 files changed, 31 insertions(+), 4 deletions(-) >>> >>> diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h >>> index 4b28fd42fdbc..7d6c5f8ce16b 100644 >>> --- a/fs/f2fs/f2fs.h >>> +++ b/fs/f2fs/f2fs.h >>> @@ -1419,6 +1419,8 @@ struct decompress_io_ctx { >>> #define MAX_COMPRESS_LOG_SIZE 8 >>> #define MAX_COMPRESS_WINDOW_SIZE ((PAGE_SIZE) << MAX_COMPRESS_LOG_SIZE) >>> >>> +#define MOUNT_NAME_SIZE 20 >>> + >>> struct f2fs_sb_info { >>> struct super_block *sb; /* pointer to VFS super block */ >>> struct proc_dir_entry *s_proc; /* proc entry */ >>> @@ -1599,6 +1601,8 @@ struct f2fs_sb_info { >>> /* For sysfs suppport */ >>> struct kobject s_kobj; >>> struct completion s_kobj_unregister; >>> + int s_mount_id; >>> + char s_mount_name[MOUNT_NAME_SIZE]; >>> >>> /* For shrinker support */ >>> struct list_head s_list; >>> diff --git a/fs/f2fs/sysfs.c b/fs/f2fs/sysfs.c >>> index ab40e1f89f23..64bbe0b3b830 100644 >>> --- a/fs/f2fs/sysfs.c >>> +++ b/fs/f2fs/sysfs.c >>> @@ -18,6 +18,7 @@ >>> #include >>> >>> static struct proc_dir_entry *f2fs_proc_root; >>> +static struct ida f2fs_mount_ida; >>> >>> /* Sysfs support for f2fs */ >>> enum { >>> @@ -906,6 +907,9 @@ int __init f2fs_init_sysfs(void) >>> } else { >>> f2fs_proc_root = proc_mkdir("fs/f2fs", NULL); >>> } >>> + >>> + ida_init(&f2fs_mount_ida); >>> + >>> return ret; >>> } >>> >>> @@ -915,6 +919,7 @@ void f2fs_exit_sysfs(void) >>> kset_unregister(&f2fs_kset); >>> remove_proc_entry("fs/f2fs", NULL); >>> f2fs_proc_root = NULL; >>> + ida_destroy(&f2fs_mount_ida); >>> } >>> >>> int f2fs_register_sysfs(struct f2fs_sb_info *sbi) >>> @@ -926,12 +931,22 @@ int f2fs_register_sysfs(struct f2fs_sb_info *sbi) >>> init_completion(&sbi->s_kobj_unregister); >>> err = kobject_init_and_add(&sbi->s_kobj, &f2fs_sb_ktype, NULL, >>> "%s", sb->s_id); >>> - if (err) { >>> - kobject_put(&sbi->s_kobj); >>> - wait_for_completion(&sbi->s_kobj_unregister); >>> - return err; >>> + if (err) >>> + goto err1; >>> + >>> + sbi->s_mount_id = ida_simple_get(&f2fs_mount_ida, 0, 0, GFP_KERNEL); >>> + if (sbi->s_mount_id < 0) { >>> + err = sbi->s_mount_id; >>> + goto err1; >>> } >>> >>> + snprintf(sbi->s_mount_name, MOUNT_NAME_SIZE, "mount_%d", >>> + sbi->s_mount_id); >>> + err = sysfs_create_link(&f2fs_kset.kobj, &sbi->s_kobj, >>> + sbi->s_mount_name); >>> + if (err) >>> + goto err2; >>> + >>> if (f2fs_proc_root) >>> sbi->s_proc = proc_mkdir(sb->s_id, f2fs_proc_root); >>> >>> @@ -946,6 +961,12 @@ int f2fs_register_sysfs(struct f2fs_sb_info *sbi) >>> victim_bits_seq_show, sb); >>> } >>> return 0; >>> +err2: >>> + ida_simple_remove(&f2fs_mount_ida, sbi->s_mount_id); >>> +err1: >>> + kobject_put(&sbi->s_kobj); >>> + wait_for_completion(&sbi->s_kobj_unregister); >>> + return err; >>> } >>> >>> void f2fs_unregister_sysfs(struct f2fs_sb_info *sbi) >>> @@ -957,6 +978,8 @@ void f2fs_unregister_sysfs(struct f2fs_sb_info *sbi) >>> remove_proc_entry("victim_bits", sbi->s_proc); >>> remove_proc_entry(sbi->sb->s_id, f2fs_proc_root); >>> } >>> + sysfs_remove_link(&f2fs_kset.kobj, sbi->s_mount_name); >>> + ida_simple_remove(&f2fs_mount_ida, sbi->s_mount_id); >>> kobject_del(&sbi->s_kobj); >>> kobject_put(&sbi->s_kobj); >>> } >>> > . > From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.3 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2EE3C433E0 for ; Wed, 1 Jul 2020 07:15:39 +0000 (UTC) Received: from lists.sourceforge.net (lists.sourceforge.net [216.105.38.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B0E9E206BE; Wed, 1 Jul 2020 07:15:39 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=sourceforge.net header.i=@sourceforge.net header.b="m/LbNq7E"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=sf.net header.i=@sf.net header.b="jhApCmvU" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B0E9E206BE Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=huawei.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=linux-f2fs-devel-bounces@lists.sourceforge.net Received: from [127.0.0.1] (helo=sfs-ml-1.v29.lw.sourceforge.com) by sfs-ml-1.v29.lw.sourceforge.com with esmtp (Exim 4.90_1) (envelope-from ) id 1jqWy3-0005PG-BE; Wed, 01 Jul 2020 07:15:39 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-1.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jqWy1-0005Op-Lk for linux-f2fs-devel@lists.sourceforge.net; Wed, 01 Jul 2020 07:15:37 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:Content-Type:In-Reply-To: MIME-Version:Date:Message-ID:From:References:CC:To:Subject:Sender:Reply-To: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=OtDncL7Pnc2bb95NrShvvPUz8EsGjmECZsV5x1roPas=; b=m/LbNq7EDYgJSMEX/ALVmPgPP+ QiIiB5/pNKxr5aOtixC5gxEPmaq7YHN4Zm3F4uUAv506INPzNO8YWcesijXOlFR473wnmBQcr5C15 bn1cQ8ZY4lbBqLLVpsVIqxSuhbxHtEnXssCyg5dy7Wo/hBqvfsZS5tkT9m+w9RKzQhsI=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:CC:To:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=OtDncL7Pnc2bb95NrShvvPUz8EsGjmECZsV5x1roPas=; b=jhApCmvUs3u/zIj+QISH13WtDD YxhUl3KkBmZGLZglhoXV5raInL9kLq5MWZQJOdIH7kSK23XMPsJz13E5EfqtPVIj6wGMZXIm+2qfJ smMR7rEpolRUC63UINMrJ83N17zXaRKotIcDxVdiiZoJTk0WQG2ic2+jP5Nhz77yayKM=; Received: from szxga06-in.huawei.com ([45.249.212.32] helo=huawei.com) by sfi-mx-1.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.2) id 1jqWxy-008MoB-Dx for linux-f2fs-devel@lists.sourceforge.net; Wed, 01 Jul 2020 07:15:36 +0000 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 1F30BD60DE3960F6D055; Wed, 1 Jul 2020 15:15:26 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.206) with Microsoft SMTP Server (TLS) id 14.3.487.0; Wed, 1 Jul 2020 15:15:20 +0800 To: Daeho Jeong References: <20200630005625.2405062-1-daeho43@gmail.com> <961072bb-4c8f-b01e-666d-1f5e35a8b76d@huawei.com> From: Chao Yu Message-ID: <9d1afacc-6033-2bae-d55d-909d50f1904b@huawei.com> Date: Wed, 1 Jul 2020 15:15:19 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected X-Headers-End: 1jqWxy-008MoB-Dx Subject: Re: [f2fs-dev] [PATCH] f2fs: add symbolic link to kobject in sysfs X-BeenThere: linux-f2fs-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Daeho Jeong , kernel-team@android.com, linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: linux-f2fs-devel-bounces@lists.sourceforge.net T24gMjAyMC83LzEgMTU6MDQsIERhZWhvIEplb25nIHdyb3RlOgo+IEFjdHVhbGx5LCBJIHdhbnQg dG8ga2VlcCB0aGUgbW91bnQgbnVtYmVyIHJlbWFpbmluZyB0byB0aGUgc2FtZQo+IG51bWJlciwg ZXZlbiBpZiBpdCdzIHJlLW1vdW50ZWQuCgpUaGVuIG9uY2UgdGhlcmUgaXMgZjJmcyB1bW91bnRl ciwgdGhlIG9yZGVyIHdpbGwgYmUgaW5jb3JyZWN0Li4uCgo+IE9yIHdlIG5lZWQgdG8ga2VlcCB0 cmFjayBvZiB0aGUgbnVtYmVyIGJlaW5nIGluY3JlYXNlZCB3aGVuZXZlciBpdCdzCj4gcmVtb3Vu dGVkLiA6KAoKSU1PLCBpdCBuZWVkcyB0byBhbHdheXMga2VlcCB0aGUgbnVtYmVyIGJlaW5nIGlu Y3JlYXNlZC4KClRoYW5rcywKCj4gCj4gMjAyMOuFhCA37JuUIDHsnbwgKOyImCkg7Jik7ZuEIDM6 MzYsIENoYW8gWXUgPHl1Y2hhbzBAaHVhd2VpLmNvbT7ri5jsnbQg7J6R7ISxOgo+Pgo+PiBIaSBE YWVobywKPj4KPj4gT24gMjAyMC82LzMwIDg6NTYsIERhZWhvIEplb25nIHdyb3RlOgo+Pj4gRnJv bTogRGFlaG8gSmVvbmcgPGRhZWhvamVvbmdAZ29vZ2xlLmNvbT4KPj4+Cj4+PiBBZGRlZCBhIHN5 bWJvbGljIGxpbmsgdG8gZGlyZWN0b3J5IG9mIHN5c2ZzLiBJdCB3aWxsCj4+PiBjcmVhdGUgYSBz eW1ib2xpYyBsaW5rIHN1Y2ggYXMgIm1vdW50XzAiIGFuZCAibW91bnRfMSIgdG8KPj4+IGVhY2gg ZjJmcyBtb3VudCBpbiB0aGUgb3JkZXIgb2YgbW91bnRpbmcgZmlsZXN5c3RlbS4gSXQgd2lsbAo+ Pj4gcHJvdmlkZSBlYXN5IGFjY2VzcyB0byBzeXNmcyBub2RlIGV2ZW4gaWYgbm90IGtub3dpbmcg dGhlCj4+PiBzcGVjaWZpYyBkZXZpY2Ugbm9kZSBuYW1lIGxpa2Ugc2RhMTkgYW5kIGRtLTMuCj4+ Cj4+IEp1c3Qgb3V0IG9mIGN1cmlvc2l0eSwgaWYgd2UgbW91bnQvdW1vdW50IGFzIGJlbG93Ogo+ Pgo+PiBtb3VudCAvZGV2L3pyYW0wIC9tbnQvZjJmczAKPj4gbW91bnQgL2Rldi96cmFtMSAvbW50 L2YyZnMxCj4+IHVtb3VudCAvbW50L2YyZnMwCj4+IG1vdW50IC9kZXYvenJhbTAgL21udC9mMmZz MAo+Pgo+PiBTaG91bGRuJ3Qgc3lzZnMgc3RydWN0dXJlIGJlOgo+PiBtb3VudF8yIC0+IHpyYW0w Cj4+IG1vdW50XzEgLT4genJhbTEKPj4genJhbTAKPj4genJhbTEKPj4KPj4gVGhlbiB3ZSBjYW4g a25vdyB6cmFtMCBpcyBtb3VudGVkIGFmdGVyIHpyYW0xPwo+Pgo+PiBIb3dldmVyIHRoZSByZXN1 bHQgc2hvd3M6Cj4+IG1vdW50XzAgLT4genJhbTAKPj4gbW91bnRfMSAtPiB6cmFtMQo+PiB6cmFt MAo+PiB6cmFtMQo+Pgo+PiBUaGFua3MsCj4+Cj4+Pgo+Pj4gU2lnbmVkLW9mZi1ieTogRGFlaG8g SmVvbmcgPGRhZWhvamVvbmdAZ29vZ2xlLmNvbT4KPj4+IC0tLQo+Pj4gIGZzL2YyZnMvZjJmcy5o ICB8ICA0ICsrKysKPj4+ICBmcy9mMmZzL3N5c2ZzLmMgfCAzMSArKysrKysrKysrKysrKysrKysr KysrKysrKystLS0tCj4+PiAgMiBmaWxlcyBjaGFuZ2VkLCAzMSBpbnNlcnRpb25zKCspLCA0IGRl bGV0aW9ucygtKQo+Pj4KPj4+IGRpZmYgLS1naXQgYS9mcy9mMmZzL2YyZnMuaCBiL2ZzL2YyZnMv ZjJmcy5oCj4+PiBpbmRleCA0YjI4ZmQ0MmZkYmMuLjdkNmM1ZjhjZTE2YiAxMDA2NDQKPj4+IC0t LSBhL2ZzL2YyZnMvZjJmcy5oCj4+PiArKysgYi9mcy9mMmZzL2YyZnMuaAo+Pj4gQEAgLTE0MTks NiArMTQxOSw4IEBAIHN0cnVjdCBkZWNvbXByZXNzX2lvX2N0eCB7Cj4+PiAgI2RlZmluZSBNQVhf Q09NUFJFU1NfTE9HX1NJWkUgICAgICAgICAgICAgICAgOAo+Pj4gICNkZWZpbmUgTUFYX0NPTVBS RVNTX1dJTkRPV19TSVpFICAgICAoKFBBR0VfU0laRSkgPDwgTUFYX0NPTVBSRVNTX0xPR19TSVpF KQo+Pj4KPj4+ICsjZGVmaW5lIE1PVU5UX05BTUVfU0laRSAgICAgICAgICAgICAgICAgICAgICAy MAo+Pj4gKwo+Pj4gIHN0cnVjdCBmMmZzX3NiX2luZm8gewo+Pj4gICAgICAgc3RydWN0IHN1cGVy X2Jsb2NrICpzYjsgICAgICAgICAgICAgICAgIC8qIHBvaW50ZXIgdG8gVkZTIHN1cGVyIGJsb2Nr ICovCj4+PiAgICAgICBzdHJ1Y3QgcHJvY19kaXJfZW50cnkgKnNfcHJvYzsgICAgICAgICAgLyog cHJvYyBlbnRyeSAqLwo+Pj4gQEAgLTE1OTksNiArMTYwMSw4IEBAIHN0cnVjdCBmMmZzX3NiX2lu Zm8gewo+Pj4gICAgICAgLyogRm9yIHN5c2ZzIHN1cHBwb3J0ICovCj4+PiAgICAgICBzdHJ1Y3Qg a29iamVjdCBzX2tvYmo7Cj4+PiAgICAgICBzdHJ1Y3QgY29tcGxldGlvbiBzX2tvYmpfdW5yZWdp c3RlcjsKPj4+ICsgICAgIGludCBzX21vdW50X2lkOwo+Pj4gKyAgICAgY2hhciBzX21vdW50X25h bWVbTU9VTlRfTkFNRV9TSVpFXTsKPj4+Cj4+PiAgICAgICAvKiBGb3Igc2hyaW5rZXIgc3VwcG9y dCAqLwo+Pj4gICAgICAgc3RydWN0IGxpc3RfaGVhZCBzX2xpc3Q7Cj4+PiBkaWZmIC0tZ2l0IGEv ZnMvZjJmcy9zeXNmcy5jIGIvZnMvZjJmcy9zeXNmcy5jCj4+PiBpbmRleCBhYjQwZTFmODlmMjMu LjY0YmJlMGIzYjgzMCAxMDA2NDQKPj4+IC0tLSBhL2ZzL2YyZnMvc3lzZnMuYwo+Pj4gKysrIGIv ZnMvZjJmcy9zeXNmcy5jCj4+PiBAQCAtMTgsNiArMTgsNyBAQAo+Pj4gICNpbmNsdWRlIDx0cmFj ZS9ldmVudHMvZjJmcy5oPgo+Pj4KPj4+ICBzdGF0aWMgc3RydWN0IHByb2NfZGlyX2VudHJ5ICpm MmZzX3Byb2Nfcm9vdDsKPj4+ICtzdGF0aWMgc3RydWN0IGlkYSBmMmZzX21vdW50X2lkYTsKPj4+ Cj4+PiAgLyogU3lzZnMgc3VwcG9ydCBmb3IgZjJmcyAqLwo+Pj4gIGVudW0gewo+Pj4gQEAgLTkw Niw2ICs5MDcsOSBAQCBpbnQgX19pbml0IGYyZnNfaW5pdF9zeXNmcyh2b2lkKQo+Pj4gICAgICAg fSBlbHNlIHsKPj4+ICAgICAgICAgICAgICAgZjJmc19wcm9jX3Jvb3QgPSBwcm9jX21rZGlyKCJm cy9mMmZzIiwgTlVMTCk7Cj4+PiAgICAgICB9Cj4+PiArCj4+PiArICAgICBpZGFfaW5pdCgmZjJm c19tb3VudF9pZGEpOwo+Pj4gKwo+Pj4gICAgICAgcmV0dXJuIHJldDsKPj4+ICB9Cj4+Pgo+Pj4g QEAgLTkxNSw2ICs5MTksNyBAQCB2b2lkIGYyZnNfZXhpdF9zeXNmcyh2b2lkKQo+Pj4gICAgICAg a3NldF91bnJlZ2lzdGVyKCZmMmZzX2tzZXQpOwo+Pj4gICAgICAgcmVtb3ZlX3Byb2NfZW50cnko ImZzL2YyZnMiLCBOVUxMKTsKPj4+ICAgICAgIGYyZnNfcHJvY19yb290ID0gTlVMTDsKPj4+ICsg ICAgIGlkYV9kZXN0cm95KCZmMmZzX21vdW50X2lkYSk7Cj4+PiAgfQo+Pj4KPj4+ICBpbnQgZjJm c19yZWdpc3Rlcl9zeXNmcyhzdHJ1Y3QgZjJmc19zYl9pbmZvICpzYmkpCj4+PiBAQCAtOTI2LDEy ICs5MzEsMjIgQEAgaW50IGYyZnNfcmVnaXN0ZXJfc3lzZnMoc3RydWN0IGYyZnNfc2JfaW5mbyAq c2JpKQo+Pj4gICAgICAgaW5pdF9jb21wbGV0aW9uKCZzYmktPnNfa29ial91bnJlZ2lzdGVyKTsK Pj4+ICAgICAgIGVyciA9IGtvYmplY3RfaW5pdF9hbmRfYWRkKCZzYmktPnNfa29iaiwgJmYyZnNf c2Jfa3R5cGUsIE5VTEwsCj4+PiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJXMiLCBz Yi0+c19pZCk7Cj4+PiAtICAgICBpZiAoZXJyKSB7Cj4+PiAtICAgICAgICAgICAgIGtvYmplY3Rf cHV0KCZzYmktPnNfa29iaik7Cj4+PiAtICAgICAgICAgICAgIHdhaXRfZm9yX2NvbXBsZXRpb24o JnNiaS0+c19rb2JqX3VucmVnaXN0ZXIpOwo+Pj4gLSAgICAgICAgICAgICByZXR1cm4gZXJyOwo+ Pj4gKyAgICAgaWYgKGVycikKPj4+ICsgICAgICAgICAgICAgZ290byBlcnIxOwo+Pj4gKwo+Pj4g KyAgICAgc2JpLT5zX21vdW50X2lkID0gaWRhX3NpbXBsZV9nZXQoJmYyZnNfbW91bnRfaWRhLCAw LCAwLCBHRlBfS0VSTkVMKTsKPj4+ICsgICAgIGlmIChzYmktPnNfbW91bnRfaWQgPCAwKSB7Cj4+ PiArICAgICAgICAgICAgIGVyciA9IHNiaS0+c19tb3VudF9pZDsKPj4+ICsgICAgICAgICAgICAg Z290byBlcnIxOwo+Pj4gICAgICAgfQo+Pj4KPj4+ICsgICAgIHNucHJpbnRmKHNiaS0+c19tb3Vu dF9uYW1lLCBNT1VOVF9OQU1FX1NJWkUsICJtb3VudF8lZCIsCj4+PiArICAgICAgICAgICAgICAg ICAgICAgc2JpLT5zX21vdW50X2lkKTsKPj4+ICsgICAgIGVyciA9IHN5c2ZzX2NyZWF0ZV9saW5r KCZmMmZzX2tzZXQua29iaiwgJnNiaS0+c19rb2JqLAo+Pj4gKyAgICAgICAgICAgICAgICAgICAg IHNiaS0+c19tb3VudF9uYW1lKTsKPj4+ICsgICAgIGlmIChlcnIpCj4+PiArICAgICAgICAgICAg IGdvdG8gZXJyMjsKPj4+ICsKPj4+ICAgICAgIGlmIChmMmZzX3Byb2Nfcm9vdCkKPj4+ICAgICAg ICAgICAgICAgc2JpLT5zX3Byb2MgPSBwcm9jX21rZGlyKHNiLT5zX2lkLCBmMmZzX3Byb2Nfcm9v dCk7Cj4+Pgo+Pj4gQEAgLTk0Niw2ICs5NjEsMTIgQEAgaW50IGYyZnNfcmVnaXN0ZXJfc3lzZnMo c3RydWN0IGYyZnNfc2JfaW5mbyAqc2JpKQo+Pj4gICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgdmljdGltX2JpdHNfc2VxX3Nob3csIHNiKTsKPj4+ICAgICAgIH0KPj4+ICAgICAgIHJldHVy biAwOwo+Pj4gK2VycjI6Cj4+PiArICAgICBpZGFfc2ltcGxlX3JlbW92ZSgmZjJmc19tb3VudF9p ZGEsIHNiaS0+c19tb3VudF9pZCk7Cj4+PiArZXJyMToKPj4+ICsgICAgIGtvYmplY3RfcHV0KCZz YmktPnNfa29iaik7Cj4+PiArICAgICB3YWl0X2Zvcl9jb21wbGV0aW9uKCZzYmktPnNfa29ial91 bnJlZ2lzdGVyKTsKPj4+ICsgICAgIHJldHVybiBlcnI7Cj4+PiAgfQo+Pj4KPj4+ICB2b2lkIGYy ZnNfdW5yZWdpc3Rlcl9zeXNmcyhzdHJ1Y3QgZjJmc19zYl9pbmZvICpzYmkpCj4+PiBAQCAtOTU3 LDYgKzk3OCw4IEBAIHZvaWQgZjJmc191bnJlZ2lzdGVyX3N5c2ZzKHN0cnVjdCBmMmZzX3NiX2lu Zm8gKnNiaSkKPj4+ICAgICAgICAgICAgICAgcmVtb3ZlX3Byb2NfZW50cnkoInZpY3RpbV9iaXRz Iiwgc2JpLT5zX3Byb2MpOwo+Pj4gICAgICAgICAgICAgICByZW1vdmVfcHJvY19lbnRyeShzYmkt PnNiLT5zX2lkLCBmMmZzX3Byb2Nfcm9vdCk7Cj4+PiAgICAgICB9Cj4+PiArICAgICBzeXNmc19y ZW1vdmVfbGluaygmZjJmc19rc2V0LmtvYmosIHNiaS0+c19tb3VudF9uYW1lKTsKPj4+ICsgICAg IGlkYV9zaW1wbGVfcmVtb3ZlKCZmMmZzX21vdW50X2lkYSwgc2JpLT5zX21vdW50X2lkKTsKPj4+ ICAgICAgIGtvYmplY3RfZGVsKCZzYmktPnNfa29iaik7Cj4+PiAgICAgICBrb2JqZWN0X3B1dCgm c2JpLT5zX2tvYmopOwo+Pj4gIH0KPj4+Cj4gLgo+IAoKCl9fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fCkxpbnV4LWYyZnMtZGV2ZWwgbWFpbGluZyBsaXN0Ckxp bnV4LWYyZnMtZGV2ZWxAbGlzdHMuc291cmNlZm9yZ2UubmV0Cmh0dHBzOi8vbGlzdHMuc291cmNl Zm9yZ2UubmV0L2xpc3RzL2xpc3RpbmZvL2xpbnV4LWYyZnMtZGV2ZWwK