From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-28.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D53AFC433B4 for ; Thu, 6 May 2021 08:35:44 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 954B8611AE for ; Thu, 6 May 2021 08:35:44 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233655AbhEFIgl (ORCPT ); Thu, 6 May 2021 04:36:41 -0400 Received: from linux.microsoft.com ([13.77.154.182]:42214 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231880AbhEFIgk (ORCPT ); Thu, 6 May 2021 04:36:40 -0400 Received: from minint-m3g9p8n.europe.corp.microsoft.com (unknown [49.207.195.141]) by linux.microsoft.com (Postfix) with ESMTPSA id 6D60520B7178; Thu, 6 May 2021 01:35:40 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 6D60520B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620290142; bh=uHEyc6gEkmpQ8MDeew9UNjfOeJf96WgjbUsOQcoORok=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=SxEu96Rb436DGqNmZhU1DeZjxJzB+1PQAR0kuRdtzep5K0tgSXx/X/3098xyoQRHc +ggWYMe+1N6XPDUXn7IE93d9sYS7rABdLW8SxdgEEbVfYJiPw9KDUytGg8EeLgqbF5 FB+uZ8t9OPoHtQlQcQyJIco5s0KeSN8TE0RQhlbE= Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Subject: Re: [PATCH v2 1/2] optee: fix tee out of memory failure seen during kexec reboot From: Allen Pais In-Reply-To: Date: Thu, 6 May 2021 14:05:37 +0530 Cc: Allen Pais , zajec5@gmail.com, bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Content-Transfer-Encoding: quoted-printable Message-Id: References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210225090610.242623-2-allen.lkml@gmail.com> <9a6c017c-d156-f939-f907-d6dfe83c41ac@linux.microsoft.com> <409F60D9-F0FB-4B69-B64B-CC6B3704038E@linux.microsoft.com> <51FC863B-96C5-47BA-8EBF-3D9FB6DE7DD2@linux.microsoft.com> To: Jens Wiklander X-Mailer: Apple Mail (2.3654.60.0.2.21) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>=20 >>>>=20 >>>>>>>>>> [ 0.368428] tee_bnxt_fw optee-clnt0: tee_shm_alloc failed >>>>>>>>>> [ 0.368461] tee_bnxt_fw: probe of optee-clnt0 failed with = error -22 >>>>>>>>>>=20 >>>>>>>>>> tee_shm_release() is not invoked on dma shm buffer. >>>>>>>>>>=20 >>>>>>>>>> Implement .shutdown() method to handle the release of the = buffers >>>>>>>>>> correctly. >>>>>>>>>>=20 >>>>>>>>>> More info: >>>>>>>>>> https://github.com/OP-TEE/optee_os/issues/3637 >>>>>>>>>>=20 >>>>>>>>>> Signed-off-by: Allen Pais >>>>>>>>>> --- >>>>>>>>>> drivers/tee/optee/core.c | 20 ++++++++++++++++++++ >>>>>>>>>> 1 file changed, 20 insertions(+) >>>>>>>>>=20 >>>>>>>>> This looks good to me. Do you have a practical way of testing = this on >>>>>>>>> QEMU for instance? >>>>>>>>>=20 >>>>>>>>=20 >>>>>>>> Jens, >>>>>>>>=20 >>>>>>>> I could not reproduce nor create a setup using QEMU, I could = only >>>>>>>> do it on a real h/w. >>>>>>>>=20 >>>>>>>> I have extensively tested the fix and I don't see any issues. >>>>>>>=20 >>>>>>> I did a few test runs too, seems OK. >>>>>>=20 >>>>>> I carried these changes and have not run into any issues with = Kexec so far. >>>>>> Last week, while trying out kdump, we ran into a crash(this is = when the >>>>>> Kdump kernel reboots). >>>>>>=20 >>>>>> $echo c > /proc/sysrq-trigger >>>>>>=20 >>>>>> Leads to: >>>>>>=20 >>>>>> [ 18.004831] Unable to handle kernel paging request at virtual = address ffff0008dcef6758 >>>>>> [ 18.013002] Mem abort info: >>>>>> [ 18.015885] ESR =3D 0x96000005 >>>>>> [ 18.019034] EC =3D 0x25: DABT (current EL), IL =3D 32 bits >>>>>> [ 18.024516] SET =3D 0, FnV =3D 0 >>>>>> [ 18.027667] EA =3D 0, S1PTW =3D 0 >>>>>> [ 18.030905] Data abort info: >>>>>> [ 18.033877] ISV =3D 0, ISS =3D 0x00000005 >>>>>> [ 18.037835] CM =3D 0, WnR =3D 0 >>>>>> [ 18.040896] swapper pgtable: 4k pages, 48-bit VAs, = pgdp=3D0000000970a78000 >>>>>> [ 18.047811] [ffff0008dcef6758] pgd=3D000000097fbf9003, = pud=3D0000000000000000 >>>>>> [ 18.054819] Internal error: Oops: 96000005 [#1] SMP >>>>>> [ 18.059850] Modules linked in: bnxt_en pcie_iproc_platform = pcie_iproc diagbe(O) >>>>>> [ 18.067395] CPU: 3 PID: 1 Comm: systemd-shutdow Tainted: G = O 5.4.83-microsoft-standard #1 >>>>>> [ 18.077174] Hardware name: Overlake (DT) >>>>>> [ 18.081219] pstate: 80400005 (Nzcv daif +PAN -UAO) >>>>>> [ 18.086170] pc : tee_shm_free+0x18/0x48 >>>>>> [ 18.090126] lr : optee_disable_shm_cache+0xa4/0xf0 >>>>>> [ 18.095066] sp : ffff80001005bb90 >>>>>> [ 18.098484] x29: ffff80001005bb90 x28: ffff000037e20000 >>>>>> [ 18.103962] x27: 0000000000000000 x26: ffff00003ed10490 >>>>>> [ 18.109440] x25: ffffca760e975f90 x24: 0000000000000000 >>>>>> [ 18.114918] x23: ffffca760ed79808 x22: ffff00003ec66e18 >>>>>> [ 18.120396] x21: ffff80001005bc08 x20: 00000000b200000a >>>>>> [ 18.125874] x19: ffff0008dcef6700 x18: 0000000000000010 >>>>>> [ 18.131352] x17: 0000000000000000 x16: 0000000000000000 >>>>>> [ 18.136829] x15: ffffffffffffffff x14: ffffca760ed79808 >>>>>> [ 18.142307] x13: ffff80009005b897 x12: ffff80001005b89f >>>>>> [ 18.147786] x11: ffffca760eda4000 x10: ffff80001005b820 >>>>>> [ 18.153264] x9 : 00000000ffffffd0 x8 : ffffca760e59b2c0 >>>>>> [ 18.158742] x7 : 0000000000000000 x6 : 0000000000000000 >>>>>> [ 18.164220] x5 : 0000000000000000 x4 : 0000000000000000 >>>>>> [ 18.169698] x3 : 0000000000000000 x2 : ffff0008dcef6700 >>>>>> [ 18.175175] x1 : 00000000ffff0008 x0 : ffffca760e59ca04 >>>>>> [ 18.180654] Call trace: >>>>>> [ 18.183176] tee_shm_free+0x18/0x48 >>>>>> [ 18.186773] optee_disable_shm_cache+0xa4/0xf0 >>>>>> [ 18.191356] optee_shutdown+0x20/0x30 >>>>>> [ 18.195135] platform_drv_shutdown+0x2c/0x38 >>>>>> [ 18.199538] device_shutdown+0x180/0x298 >>>>>> [ 18.203586] kernel_restart_prepare+0x44/0x50 >>>>>> [ 18.208078] kernel_restart+0x20/0x68 >>>>>> [ 18.211853] __do_sys_reboot+0x104/0x258 >>>>>> [ 18.215899] __arm64_sys_reboot+0x2c/0x38 >>>>>> [ 18.220035] el0_svc_handler+0x90/0x138 >>>>>> [ 18.223991] el0_svc+0x8/0x208 >>>>>> [ 18.227143] Code: f9000bf3 aa0003f3 aa1e03e0 d503201f = (b9405a60) >>>>>> [ 18.233435] ---[ end trace 835d756cd66aa959 ]--- >>>>>> [ 18.238621] Kernel panic - not syncing: Fatal exception >>>>>> [ 18.244014] Kernel Offset: 0x4a75fde00000 from = 0xffff800010000000 >>>>>> [ 18.250299] PHYS_OFFSET: 0xffff99c680000000 >>>>>> [ 18.254613] CPU features: 0x0002,21806008 >>>>>> [ 18.258747] Memory Limit: none >>>>>> [ 18.262310] ---[ end Kernel panic - not syncing: Fatal = exception ]=E2=80=94 >>>>>>=20 >>>>>> I see that before secure world returns = OPTEE_SMC_RETURN_ENOTAVAIL(which >>>>>> Should disable and clear all the cache) we run into the crash = trying to free shm. >>>>>>=20 >>>>>> Thoughts? >>>>>=20 >>>>> It seems that the pointer is invalid, but the pointer doesn't look >>>>> like garbage. Could the kernel have unmapped the memory area = covering >>>>> that address? >>>>>=20 >>>>=20 >>>> Yes, I am not entirely sure if the kernel had the time to unmap the = memory. >>>> Right after triggering the crash the kdump kernel is booted and I = see the following >>>>=20 >>>> [ 2.050145] optee: probing for conduit method. >>>> [ 2.054743] optee: revision 3.6 (f84427aa) >>>> [ 2.054821] optee: dynamic shared memory is enabled >>>> [ 2.066186] optee: initialized driver >>>>=20 >>>> Could this be previous un-released maps causing corruption? >>>=20 >>> Aha, yes, that could be it. >>>=20 >>=20 >> How about checking for the ptr? >>=20 >> diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c >> index aadedec3bfe7..8dc4fe9a1588 100644 >> --- a/drivers/tee/optee/call.c >> +++ b/drivers/tee/optee/call.c >> @@ -426,10 +426,12 @@ void optee_disable_shm_cache(struct optee = *optee) >> if (res.result.status =3D=3D = OPTEE_SMC_RETURN_ENOTAVAIL) >> break; /* All shm's freed */ >> if (res.result.status =3D=3D OPTEE_SMC_RETURN_OK) { >> - struct tee_shm *shm; >> + struct tee_shm *shm =3D NULL; >>=20 >> shm =3D = reg_pair_to_ptr(res.result.shm_upper32, >> res.result.shm_lower32); >> + if (IS_ERR(shm)) >> + return PTR_ERR(shm); >> tee_shm_free(shm); >=20 > I don't think that will help. If your theory is correct then that > pointer is from an older incarnation of the kernel. It could be worth > trying calling this function just before the call to > optee_enable_shm_cache() in optee_probe() but skipping the calls to > `tee_shm_free()` in that case. Since the kernel has restarted these > returned pointers are not valid any more and there's nothing to free, > we just need to make sure that secure world stops using those too. >=20 I thought about it too, but was not very sure.=20 Calling optee_disable_shm_cache() before the enable call to ensure That we have dropped all references to the secure world and looking To start of fresh. Lemme try that out. Thanks. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F3A0BC433ED for ; Thu, 6 May 2021 08:38:40 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4F11C61166 for ; Thu, 6 May 2021 08:38:40 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4F11C61166 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:To:References:Message-Id:Cc:Date:In-Reply-To:From: Subject:Mime-Version:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=FeOWLe08TSbRtNuRdDsTs1q/ePYLH5nAiy6a8PBsQ9o=; b=VTFXH8ygL9p/kHVi+/p+FqAC/ Vjww2MFOfEDkDnUVuYZx6XqndYWCNCEW+csNx7y7T2BpZY/ZvS+f4roUqA4KnoRuFwyZT9gTQTbwQ iB3aI2JZx3LfMWbxfSRLhzrQhw6NKJYO+t8TOLBTCnB4HYVKq0b3OsZRU85H1n7RDUCd6wMDqEPS/ 26eX09FXGoCnOrqaK6J75nz9Vu20FK19Iw3LDkn2q2dFl3uvRM09Fs9XlyBMgNcBoPmRUQWx7YG6H RHn5X8Yj0geNe0JDp30grHRDatHRMwDqIiR8IA5ENPJSh0yxX0ubi08QFc8fmIT6rDly6m+XaGG6P zc1uvnwyA==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1leZU9-003gxq-UM; Thu, 06 May 2021 08:35:54 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1leZU4-003gxJ-IM for linux-arm-kernel@desiato.infradead.org; Thu, 06 May 2021 08:35:49 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description; bh=uHEyc6gEkmpQ8MDeew9UNjfOeJf96WgjbUsOQcoORok=; b=rCoeXxsudG2QbTsMhltQ82GzY3 DF6tQBun8RTtE03FE031m4HA8Cpi3GLmXV+slxH3Al2E6HiL8CtDAj++UaefE20wmLM/KoXlzpu5P 0j0wBLXwevxEvte+y8ppShufRZU7HIU4JbBDvqZ6SUlKCron6DMCpOd+qkSN1HuR3ANz3bTD9r+kJ Oy1D7MGCNzHcl1naglq9f9yKCGLDgqQGUd1srh0C3958WAtP8PKjtmprWVpqZfKGcK4r2EQZix+nd tDX4OZ5WvXfMiFYEi3qtrU/l65z5ml/SusF1PFhO9N8G2UjKruKBn2yuMyWESPc8WdtoG2v02Hmhu CU6HjDJw==; Received: from linux.microsoft.com ([13.77.154.182]) by bombadil.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1leZU1-005sJ1-Ca for linux-arm-kernel@lists.infradead.org; Thu, 06 May 2021 08:35:47 +0000 Received: from minint-m3g9p8n.europe.corp.microsoft.com (unknown [49.207.195.141]) by linux.microsoft.com (Postfix) with ESMTPSA id 6D60520B7178; Thu, 6 May 2021 01:35:40 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 6D60520B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620290142; bh=uHEyc6gEkmpQ8MDeew9UNjfOeJf96WgjbUsOQcoORok=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=SxEu96Rb436DGqNmZhU1DeZjxJzB+1PQAR0kuRdtzep5K0tgSXx/X/3098xyoQRHc +ggWYMe+1N6XPDUXn7IE93d9sYS7rABdLW8SxdgEEbVfYJiPw9KDUytGg8EeLgqbF5 FB+uZ8t9OPoHtQlQcQyJIco5s0KeSN8TE0RQhlbE= Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Subject: Re: [PATCH v2 1/2] optee: fix tee out of memory failure seen during kexec reboot From: Allen Pais In-Reply-To: Date: Thu, 6 May 2021 14:05:37 +0530 Cc: Allen Pais , zajec5@gmail.com, bcm-kernel-feedback-list@broadcom.com, Linux ARM , Linux Kernel Mailing List , OP-TEE TrustedFirmware Message-Id: References: <20210225090610.242623-1-allen.lkml@gmail.com> <20210225090610.242623-2-allen.lkml@gmail.com> <9a6c017c-d156-f939-f907-d6dfe83c41ac@linux.microsoft.com> <409F60D9-F0FB-4B69-B64B-CC6B3704038E@linux.microsoft.com> <51FC863B-96C5-47BA-8EBF-3D9FB6DE7DD2@linux.microsoft.com> To: Jens Wiklander X-Mailer: Apple Mail (2.3654.60.0.2.21) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210506_013545_502959_3E5489DB X-CRM114-Status: GOOD ( 27.99 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Cgo+PiAKPj4+PiAKPj4+Pj4+Pj4+PiBbICAgIDAuMzY4NDI4XSB0ZWVfYm54dF9mdyBvcHRlZS1j bG50MDogdGVlX3NobV9hbGxvYyBmYWlsZWQKPj4+Pj4+Pj4+PiBbICAgIDAuMzY4NDYxXSB0ZWVf Ym54dF9mdzogcHJvYmUgb2Ygb3B0ZWUtY2xudDAgZmFpbGVkIHdpdGggZXJyb3IgLTIyCj4+Pj4+ Pj4+Pj4gCj4+Pj4+Pj4+Pj4gdGVlX3NobV9yZWxlYXNlKCkgaXMgbm90IGludm9rZWQgb24gZG1h IHNobSBidWZmZXIuCj4+Pj4+Pj4+Pj4gCj4+Pj4+Pj4+Pj4gSW1wbGVtZW50IC5zaHV0ZG93bigp IG1ldGhvZCB0byBoYW5kbGUgdGhlIHJlbGVhc2Ugb2YgdGhlIGJ1ZmZlcnMKPj4+Pj4+Pj4+PiBj b3JyZWN0bHkuCj4+Pj4+Pj4+Pj4gCj4+Pj4+Pj4+Pj4gTW9yZSBpbmZvOgo+Pj4+Pj4+Pj4+IGh0 dHBzOi8vZ2l0aHViLmNvbS9PUC1URUUvb3B0ZWVfb3MvaXNzdWVzLzM2MzcKPj4+Pj4+Pj4+PiAK Pj4+Pj4+Pj4+PiBTaWduZWQtb2ZmLWJ5OiBBbGxlbiBQYWlzIDxhcGFpc0BsaW51eC5taWNyb3Nv ZnQuY29tPgo+Pj4+Pj4+Pj4+IC0tLQo+Pj4+Pj4+Pj4+IGRyaXZlcnMvdGVlL29wdGVlL2NvcmUu YyB8IDIwICsrKysrKysrKysrKysrKysrKysrCj4+Pj4+Pj4+Pj4gMSBmaWxlIGNoYW5nZWQsIDIw IGluc2VydGlvbnMoKykKPj4+Pj4+Pj4+IAo+Pj4+Pj4+Pj4gVGhpcyBsb29rcyBnb29kIHRvIG1l LiBEbyB5b3UgaGF2ZSBhIHByYWN0aWNhbCB3YXkgb2YgdGVzdGluZyB0aGlzIG9uCj4+Pj4+Pj4+ PiBRRU1VIGZvciBpbnN0YW5jZT8KPj4+Pj4+Pj4+IAo+Pj4+Pj4+PiAKPj4+Pj4+Pj4gSmVucywK Pj4+Pj4+Pj4gCj4+Pj4+Pj4+IEkgY291bGQgbm90IHJlcHJvZHVjZSBub3IgY3JlYXRlIGEgc2V0 dXAgdXNpbmcgUUVNVSwgSSBjb3VsZCBvbmx5Cj4+Pj4+Pj4+IGRvIGl0IG9uIGEgcmVhbCBoL3cu Cj4+Pj4+Pj4+IAo+Pj4+Pj4+PiBJIGhhdmUgZXh0ZW5zaXZlbHkgdGVzdGVkIHRoZSBmaXggYW5k IEkgZG9uJ3Qgc2VlIGFueSBpc3N1ZXMuCj4+Pj4+Pj4gCj4+Pj4+Pj4gSSBkaWQgYSBmZXcgdGVz dCBydW5zIHRvbywgc2VlbXMgT0suCj4+Pj4+PiAKPj4+Pj4+IEkgY2FycmllZCB0aGVzZSBjaGFu Z2VzIGFuZCBoYXZlIG5vdCBydW4gaW50byBhbnkgaXNzdWVzIHdpdGggS2V4ZWMgc28gZmFyLgo+ Pj4+Pj4gTGFzdCB3ZWVrLCB3aGlsZSB0cnlpbmcgb3V0IGtkdW1wLCB3ZSByYW4gaW50byBhIGNy YXNoKHRoaXMgaXMgd2hlbiB0aGUKPj4+Pj4+IEtkdW1wIGtlcm5lbCByZWJvb3RzKS4KPj4+Pj4+ IAo+Pj4+Pj4gJGVjaG8gYyA+IC9wcm9jL3N5c3JxLXRyaWdnZXIKPj4+Pj4+IAo+Pj4+Pj4gTGVh ZHMgdG86Cj4+Pj4+PiAKPj4+Pj4+IFsgICAxOC4wMDQ4MzFdIFVuYWJsZSB0byBoYW5kbGUga2Vy bmVsIHBhZ2luZyByZXF1ZXN0IGF0IHZpcnR1YWwgYWRkcmVzcyBmZmZmMDAwOGRjZWY2NzU4Cj4+ Pj4+PiBbICAgMTguMDEzMDAyXSBNZW0gYWJvcnQgaW5mbzoKPj4+Pj4+IFsgICAxOC4wMTU4ODVd ICAgRVNSID0gMHg5NjAwMDAwNQo+Pj4+Pj4gWyAgIDE4LjAxOTAzNF0gICBFQyA9IDB4MjU6IERB QlQgKGN1cnJlbnQgRUwpLCBJTCA9IDMyIGJpdHMKPj4+Pj4+IFsgICAxOC4wMjQ1MTZdICAgU0VU ID0gMCwgRm5WID0gMAo+Pj4+Pj4gWyAgIDE4LjAyNzY2N10gICBFQSA9IDAsIFMxUFRXID0gMAo+ Pj4+Pj4gWyAgIDE4LjAzMDkwNV0gRGF0YSBhYm9ydCBpbmZvOgo+Pj4+Pj4gWyAgIDE4LjAzMzg3 N10gICBJU1YgPSAwLCBJU1MgPSAweDAwMDAwMDA1Cj4+Pj4+PiBbICAgMTguMDM3ODM1XSAgIENN ID0gMCwgV25SID0gMAo+Pj4+Pj4gWyAgIDE4LjA0MDg5Nl0gc3dhcHBlciBwZ3RhYmxlOiA0ayBw YWdlcywgNDgtYml0IFZBcywgcGdkcD0wMDAwMDAwOTcwYTc4MDAwCj4+Pj4+PiBbICAgMTguMDQ3 ODExXSBbZmZmZjAwMDhkY2VmNjc1OF0gcGdkPTAwMDAwMDA5N2ZiZjkwMDMsIHB1ZD0wMDAwMDAw MDAwMDAwMDAwCj4+Pj4+PiBbICAgMTguMDU0ODE5XSBJbnRlcm5hbCBlcnJvcjogT29wczogOTYw MDAwMDUgWyMxXSBTTVAKPj4+Pj4+IFsgICAxOC4wNTk4NTBdIE1vZHVsZXMgbGlua2VkIGluOiBi bnh0X2VuIHBjaWVfaXByb2NfcGxhdGZvcm0gcGNpZV9pcHJvYyBkaWFnYmUoTykKPj4+Pj4+IFsg ICAxOC4wNjczOTVdIENQVTogMyBQSUQ6IDEgQ29tbTogc3lzdGVtZC1zaHV0ZG93IFRhaW50ZWQ6 IEcgICAgICAgICAgIE8gICAgICA1LjQuODMtbWljcm9zb2Z0LXN0YW5kYXJkICMxCj4+Pj4+PiBb ICAgMTguMDc3MTc0XSBIYXJkd2FyZSBuYW1lOiBPdmVybGFrZSAoRFQpCj4+Pj4+PiBbICAgMTgu MDgxMjE5XSBwc3RhdGU6IDgwNDAwMDA1IChOemN2IGRhaWYgK1BBTiAtVUFPKQo+Pj4+Pj4gWyAg IDE4LjA4NjE3MF0gcGMgOiB0ZWVfc2htX2ZyZWUrMHgxOC8weDQ4Cj4+Pj4+PiBbICAgMTguMDkw MTI2XSBsciA6IG9wdGVlX2Rpc2FibGVfc2htX2NhY2hlKzB4YTQvMHhmMAo+Pj4+Pj4gWyAgIDE4 LjA5NTA2Nl0gc3AgOiBmZmZmODAwMDEwMDViYjkwCj4+Pj4+PiBbICAgMTguMDk4NDg0XSB4Mjk6 IGZmZmY4MDAwMTAwNWJiOTAgeDI4OiBmZmZmMDAwMDM3ZTIwMDAwCj4+Pj4+PiBbICAgMTguMTAz OTYyXSB4Mjc6IDAwMDAwMDAwMDAwMDAwMDAgeDI2OiBmZmZmMDAwMDNlZDEwNDkwCj4+Pj4+PiBb ICAgMTguMTA5NDQwXSB4MjU6IGZmZmZjYTc2MGU5NzVmOTAgeDI0OiAwMDAwMDAwMDAwMDAwMDAw Cj4+Pj4+PiBbICAgMTguMTE0OTE4XSB4MjM6IGZmZmZjYTc2MGVkNzk4MDggeDIyOiBmZmZmMDAw MDNlYzY2ZTE4Cj4+Pj4+PiBbICAgMTguMTIwMzk2XSB4MjE6IGZmZmY4MDAwMTAwNWJjMDggeDIw OiAwMDAwMDAwMGIyMDAwMDBhCj4+Pj4+PiBbICAgMTguMTI1ODc0XSB4MTk6IGZmZmYwMDA4ZGNl ZjY3MDAgeDE4OiAwMDAwMDAwMDAwMDAwMDEwCj4+Pj4+PiBbICAgMTguMTMxMzUyXSB4MTc6IDAw MDAwMDAwMDAwMDAwMDAgeDE2OiAwMDAwMDAwMDAwMDAwMDAwCj4+Pj4+PiBbICAgMTguMTM2ODI5 XSB4MTU6IGZmZmZmZmZmZmZmZmZmZmYgeDE0OiBmZmZmY2E3NjBlZDc5ODA4Cj4+Pj4+PiBbICAg MTguMTQyMzA3XSB4MTM6IGZmZmY4MDAwOTAwNWI4OTcgeDEyOiBmZmZmODAwMDEwMDViODlmCj4+ Pj4+PiBbICAgMTguMTQ3Nzg2XSB4MTE6IGZmZmZjYTc2MGVkYTQwMDAgeDEwOiBmZmZmODAwMDEw MDViODIwCj4+Pj4+PiBbICAgMTguMTUzMjY0XSB4OSA6IDAwMDAwMDAwZmZmZmZmZDAgeDggOiBm ZmZmY2E3NjBlNTliMmMwCj4+Pj4+PiBbICAgMTguMTU4NzQyXSB4NyA6IDAwMDAwMDAwMDAwMDAw MDAgeDYgOiAwMDAwMDAwMDAwMDAwMDAwCj4+Pj4+PiBbICAgMTguMTY0MjIwXSB4NSA6IDAwMDAw MDAwMDAwMDAwMDAgeDQgOiAwMDAwMDAwMDAwMDAwMDAwCj4+Pj4+PiBbICAgMTguMTY5Njk4XSB4 MyA6IDAwMDAwMDAwMDAwMDAwMDAgeDIgOiBmZmZmMDAwOGRjZWY2NzAwCj4+Pj4+PiBbICAgMTgu MTc1MTc1XSB4MSA6IDAwMDAwMDAwZmZmZjAwMDggeDAgOiBmZmZmY2E3NjBlNTljYTA0Cj4+Pj4+ PiBbICAgMTguMTgwNjU0XSBDYWxsIHRyYWNlOgo+Pj4+Pj4gWyAgIDE4LjE4MzE3Nl0gIHRlZV9z aG1fZnJlZSsweDE4LzB4NDgKPj4+Pj4+IFsgICAxOC4xODY3NzNdICBvcHRlZV9kaXNhYmxlX3No bV9jYWNoZSsweGE0LzB4ZjAKPj4+Pj4+IFsgICAxOC4xOTEzNTZdICBvcHRlZV9zaHV0ZG93bisw eDIwLzB4MzAKPj4+Pj4+IFsgICAxOC4xOTUxMzVdICBwbGF0Zm9ybV9kcnZfc2h1dGRvd24rMHgy Yy8weDM4Cj4+Pj4+PiBbICAgMTguMTk5NTM4XSAgZGV2aWNlX3NodXRkb3duKzB4MTgwLzB4Mjk4 Cj4+Pj4+PiBbICAgMTguMjAzNTg2XSAga2VybmVsX3Jlc3RhcnRfcHJlcGFyZSsweDQ0LzB4NTAK Pj4+Pj4+IFsgICAxOC4yMDgwNzhdICBrZXJuZWxfcmVzdGFydCsweDIwLzB4NjgKPj4+Pj4+IFsg ICAxOC4yMTE4NTNdICBfX2RvX3N5c19yZWJvb3QrMHgxMDQvMHgyNTgKPj4+Pj4+IFsgICAxOC4y MTU4OTldICBfX2FybTY0X3N5c19yZWJvb3QrMHgyYy8weDM4Cj4+Pj4+PiBbICAgMTguMjIwMDM1 XSAgZWwwX3N2Y19oYW5kbGVyKzB4OTAvMHgxMzgKPj4+Pj4+IFsgICAxOC4yMjM5OTFdICBlbDBf c3ZjKzB4OC8weDIwOAo+Pj4+Pj4gWyAgIDE4LjIyNzE0M10gQ29kZTogZjkwMDBiZjMgYWEwMDAz ZjMgYWExZTAzZTAgZDUwMzIwMWYgKGI5NDA1YTYwKQo+Pj4+Pj4gWyAgIDE4LjIzMzQzNV0gLS0t WyBlbmQgdHJhY2UgODM1ZDc1NmNkNjZhYTk1OSBdLS0tCj4+Pj4+PiBbICAgMTguMjM4NjIxXSBL ZXJuZWwgcGFuaWMgLSBub3Qgc3luY2luZzogRmF0YWwgZXhjZXB0aW9uCj4+Pj4+PiBbICAgMTgu MjQ0MDE0XSBLZXJuZWwgT2Zmc2V0OiAweDRhNzVmZGUwMDAwMCBmcm9tIDB4ZmZmZjgwMDAxMDAw MDAwMAo+Pj4+Pj4gWyAgIDE4LjI1MDI5OV0gUEhZU19PRkZTRVQ6IDB4ZmZmZjk5YzY4MDAwMDAw MAo+Pj4+Pj4gWyAgIDE4LjI1NDYxM10gQ1BVIGZlYXR1cmVzOiAweDAwMDIsMjE4MDYwMDgKPj4+ Pj4+IFsgICAxOC4yNTg3NDddIE1lbW9yeSBMaW1pdDogbm9uZQo+Pj4+Pj4gWyAgIDE4LjI2MjMx MF0gLS0tWyBlbmQgS2VybmVsIHBhbmljIC0gbm90IHN5bmNpbmc6IEZhdGFsIGV4Y2VwdGlvbiBd 4oCUCj4+Pj4+PiAKPj4+Pj4+IEkgc2VlIHRoYXQgYmVmb3JlIHNlY3VyZSB3b3JsZCByZXR1cm5z IE9QVEVFX1NNQ19SRVRVUk5fRU5PVEFWQUlMKHdoaWNoCj4+Pj4+PiBTaG91bGQgZGlzYWJsZSBh bmQgY2xlYXIgYWxsIHRoZSBjYWNoZSkgd2UgcnVuIGludG8gdGhlIGNyYXNoIHRyeWluZyB0byBm cmVlIHNobS4KPj4+Pj4+IAo+Pj4+Pj4gVGhvdWdodHM/Cj4+Pj4+IAo+Pj4+PiBJdCBzZWVtcyB0 aGF0IHRoZSBwb2ludGVyIGlzIGludmFsaWQsIGJ1dCB0aGUgcG9pbnRlciBkb2Vzbid0IGxvb2sK Pj4+Pj4gbGlrZSBnYXJiYWdlLiBDb3VsZCB0aGUga2VybmVsIGhhdmUgdW5tYXBwZWQgdGhlIG1l bW9yeSBhcmVhIGNvdmVyaW5nCj4+Pj4+IHRoYXQgYWRkcmVzcz8KPj4+Pj4gCj4+Pj4gCj4+Pj4g WWVzLCBJIGFtIG5vdCBlbnRpcmVseSBzdXJlIGlmIHRoZSBrZXJuZWwgaGFkIHRoZSB0aW1lIHRv IHVubWFwIHRoZSBtZW1vcnkuCj4+Pj4gUmlnaHQgYWZ0ZXIgdHJpZ2dlcmluZyB0aGUgY3Jhc2gg dGhlIGtkdW1wIGtlcm5lbCBpcyBib290ZWQgYW5kIEkgc2VlIHRoZSBmb2xsb3dpbmcKPj4+PiAK Pj4+PiBbIDIuMDUwMTQ1XSBvcHRlZTogcHJvYmluZyBmb3IgY29uZHVpdCBtZXRob2QuCj4+Pj4g WyAyLjA1NDc0M10gb3B0ZWU6IHJldmlzaW9uIDMuNiAoZjg0NDI3YWEpCj4+Pj4gWyAyLjA1NDgy MV0gb3B0ZWU6IGR5bmFtaWMgc2hhcmVkIG1lbW9yeSBpcyBlbmFibGVkCj4+Pj4gWyAyLjA2NjE4 Nl0gb3B0ZWU6IGluaXRpYWxpemVkIGRyaXZlcgo+Pj4+IAo+Pj4+IENvdWxkIHRoaXMgYmUgcHJl dmlvdXMgdW4tcmVsZWFzZWQgbWFwcyBjYXVzaW5nIGNvcnJ1cHRpb24/Cj4+PiAKPj4+IEFoYSwg eWVzLCB0aGF0IGNvdWxkIGJlIGl0Lgo+Pj4gCj4+IAo+PiBIb3cgYWJvdXQgY2hlY2tpbmcgZm9y IHRoZSBwdHI/Cj4+IAo+PiBkaWZmIC0tZ2l0IGEvZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5jIGIv ZHJpdmVycy90ZWUvb3B0ZWUvY2FsbC5jCj4+IGluZGV4IGFhZGVkZWMzYmZlNy4uOGRjNGZlOWEx NTg4IDEwMDY0NAo+PiAtLS0gYS9kcml2ZXJzL3RlZS9vcHRlZS9jYWxsLmMKPj4gKysrIGIvZHJp dmVycy90ZWUvb3B0ZWUvY2FsbC5jCj4+IEBAIC00MjYsMTAgKzQyNiwxMiBAQCB2b2lkIG9wdGVl X2Rpc2FibGVfc2htX2NhY2hlKHN0cnVjdCBvcHRlZSAqb3B0ZWUpCj4+ICAgICAgICAgICAgICAg IGlmIChyZXMucmVzdWx0LnN0YXR1cyA9PSBPUFRFRV9TTUNfUkVUVVJOX0VOT1RBVkFJTCkKPj4g ICAgICAgICAgICAgICAgICAgICAgICBicmVhazsgLyogQWxsIHNobSdzIGZyZWVkICovCj4+ICAg ICAgICAgICAgICAgIGlmIChyZXMucmVzdWx0LnN0YXR1cyA9PSBPUFRFRV9TTUNfUkVUVVJOX09L KSB7Cj4+IC0gICAgICAgICAgICAgICAgICAgICAgIHN0cnVjdCB0ZWVfc2htICpzaG07Cj4+ICsg ICAgICAgICAgICAgICAgICAgICAgIHN0cnVjdCB0ZWVfc2htICpzaG0gPSBOVUxMOwo+PiAKPj4g ICAgICAgICAgICAgICAgICAgICAgICBzaG0gPSByZWdfcGFpcl90b19wdHIocmVzLnJlc3VsdC5z aG1fdXBwZXIzMiwKPj4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgcmVzLnJlc3VsdC5zaG1fbG93ZXIzMik7Cj4+ICsgICAgICAgICAgICAgICAgICAgICAgIGlm IChJU19FUlIoc2htKSkKPj4gKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICByZXR1cm4g UFRSX0VSUihzaG0pOwo+PiAgICAgICAgICAgICAgICAgICAgICAgIHRlZV9zaG1fZnJlZShzaG0p Owo+IAo+IEkgZG9uJ3QgdGhpbmsgdGhhdCB3aWxsIGhlbHAuIElmIHlvdXIgdGhlb3J5IGlzIGNv cnJlY3QgdGhlbiB0aGF0Cj4gcG9pbnRlciBpcyBmcm9tIGFuIG9sZGVyIGluY2FybmF0aW9uIG9m IHRoZSBrZXJuZWwuIEl0IGNvdWxkIGJlIHdvcnRoCj4gdHJ5aW5nIGNhbGxpbmcgdGhpcyBmdW5j dGlvbiBqdXN0IGJlZm9yZSB0aGUgY2FsbCB0bwo+IG9wdGVlX2VuYWJsZV9zaG1fY2FjaGUoKSBp biBvcHRlZV9wcm9iZSgpIGJ1dCBza2lwcGluZyB0aGUgY2FsbHMgdG8KPiBgdGVlX3NobV9mcmVl KClgIGluIHRoYXQgY2FzZS4gU2luY2UgdGhlIGtlcm5lbCBoYXMgcmVzdGFydGVkIHRoZXNlCj4g cmV0dXJuZWQgcG9pbnRlcnMgYXJlIG5vdCB2YWxpZCBhbnkgbW9yZSBhbmQgdGhlcmUncyBub3Ro aW5nIHRvIGZyZWUsCj4gd2UganVzdCBuZWVkIHRvIG1ha2Ugc3VyZSB0aGF0IHNlY3VyZSB3b3Js ZCBzdG9wcyB1c2luZyB0aG9zZSB0b28uCj4gCgpJIHRob3VnaHQgYWJvdXQgaXQgdG9vLCBidXQg d2FzIG5vdCB2ZXJ5IHN1cmUuIAoKQ2FsbGluZyBvcHRlZV9kaXNhYmxlX3NobV9jYWNoZSgpIGJl Zm9yZSB0aGUgZW5hYmxlIGNhbGwgdG8gZW5zdXJlClRoYXQgd2UgaGF2ZSBkcm9wcGVkIGFsbCBy ZWZlcmVuY2VzIHRvIHRoZSBzZWN1cmUgd29ybGQgYW5kIGxvb2tpbmcKVG8gc3RhcnQgb2YgZnJl c2guIExlbW1lIHRyeSB0aGF0IG91dC4KClRoYW5rcy4KCgpfX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fXwpsaW51eC1hcm0ta2VybmVsIG1haWxpbmcgbGlzdAps aW51eC1hcm0ta2VybmVsQGxpc3RzLmluZnJhZGVhZC5vcmcKaHR0cDovL2xpc3RzLmluZnJhZGVh ZC5vcmcvbWFpbG1hbi9saXN0aW5mby9saW51eC1hcm0ta2VybmVsCg==