From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.1 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_RED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 59A0DC433E1 for ; Tue, 23 Mar 2021 15:47:10 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2B721619BF for ; Tue, 23 Mar 2021 15:47:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233057AbhCWPql (ORCPT ); Tue, 23 Mar 2021 11:46:41 -0400 Received: from pio-pvt-msa1.bahnhof.se ([79.136.2.40]:57348 "EHLO pio-pvt-msa1.bahnhof.se" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233050AbhCWPqK (ORCPT ); Tue, 23 Mar 2021 11:46:10 -0400 Received: from localhost (localhost [127.0.0.1]) by pio-pvt-msa1.bahnhof.se (Postfix) with ESMTP id CB47340788; Tue, 23 Mar 2021 16:46:08 +0100 (CET) Authentication-Results: pio-pvt-msa1.bahnhof.se; dkim=pass (1024-bit key; unprotected) header.d=shipmail.org header.i=@shipmail.org header.b="rHKVk9Lc"; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at bahnhof.se Received: from pio-pvt-msa1.bahnhof.se ([127.0.0.1]) by localhost (pio-pvt-msa1.bahnhof.se [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tFJo68TOyrQL; Tue, 23 Mar 2021 16:46:07 +0100 (CET) Received: by pio-pvt-msa1.bahnhof.se (Postfix) with ESMTPA id 5ACE040789; Tue, 23 Mar 2021 16:46:05 +0100 (CET) Received: from [192.168.0.209] (unknown [192.198.151.43]) by mail1.shipmail.org (Postfix) with ESMTPSA id 282813602AF; Tue, 23 Mar 2021 16:46:03 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=shipmail.org; s=mail; t=1616514364; bh=/YRbLyyT2+b0x+xy9LzPsteGLOtTqIZRl6La1xXuixw=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=rHKVk9LcDAJi/SFeskJmGVMZq6XkliOXWcwycvl8g1nRLVTmb4RIpIgFak5JH/47E 7xkSJb3MvPNZA1viPKpoAz16O2Zy+u/aA7/MJRjbs3g4VyZQ5qPYACWBnuYg0pvNiY ecAJqm0cFWJxCsXdn1qoqg2Pq7HyVugR8sFtk6+U= Subject: Re: [RFC PATCH 2/2] mm,drm/ttm: Use VM_PFNMAP for TTM vmas To: Jason Gunthorpe Cc: dri-devel@lists.freedesktop.org, Christian Koenig , David Airlie , Daniel Vetter , Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <20210321184529.59006-1-thomas_os@shipmail.org> <20210321184529.59006-3-thomas_os@shipmail.org> <20210323140030.GE2356281@nvidia.com> From: =?UTF-8?Q?Thomas_Hellstr=c3=b6m_=28Intel=29?= Message-ID: Date: Tue, 23 Mar 2021 16:46:00 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20210323140030.GE2356281@nvidia.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/23/21 3:00 PM, Jason Gunthorpe wrote: > On Sun, Mar 21, 2021 at 07:45:29PM +0100, Thomas Hellström (Intel) wrote: >> To block fast gup we need to make sure TTM ptes are always special. >> With MIXEDMAP we, on architectures that don't support pte_special, >> insert normal ptes, but OTOH on those architectures, fast is not >> supported. >> At the same time, the function documentation to vm_normal_page() suggests >> that ptes pointing to system memory pages of MIXEDMAP vmas are always >> normal, but that doesn't seem consistent with what's implemented in >> vmf_insert_mixed(). I'm thus not entirely sure this patch is actually >> needed. >> >> But to make sure and to avoid also normal (non-fast) gup, make all >> TTM vmas PFNMAP. With PFNMAP we can't allow COW mappings >> anymore so make is_cow_mapping() available and use it to reject >> COW mappigs at mmap time. >> >> There was previously a comment in the code that WC mappings together >> with x86 PAT + PFNMAP was bad for performance. However from looking at >> vmf_insert_mixed() it looks like in the current code PFNMAP and MIXEDMAP >> are handled the same for architectures that support pte_special. This >> means there should not be a performance difference anymore, but this >> needs to be verified. >> >> Cc: Christian Koenig >> Cc: David Airlie >> Cc: Daniel Vetter >> Cc: Andrew Morton >> Cc: Jason Gunthorpe >> Cc: linux-mm@kvack.org >> Cc: dri-devel@lists.freedesktop.org >> Cc: linux-kernel@vger.kernel.org >> Signed-off-by: Thomas Hellström (Intel) >> drivers/gpu/drm/ttm/ttm_bo_vm.c | 22 ++++++++-------------- >> include/linux/mm.h | 5 +++++ >> mm/internal.h | 5 ----- >> 3 files changed, 13 insertions(+), 19 deletions(-) >> >> diff --git a/drivers/gpu/drm/ttm/ttm_bo_vm.c b/drivers/gpu/drm/ttm/ttm_bo_vm.c >> index 1c34983480e5..708c6fb9be81 100644 >> +++ b/drivers/gpu/drm/ttm/ttm_bo_vm.c >> @@ -372,12 +372,7 @@ vm_fault_t ttm_bo_vm_fault_reserved(struct vm_fault *vmf, >> * at arbitrary times while the data is mmap'ed. >> * See vmf_insert_mixed_prot() for a discussion. >> */ >> - if (vma->vm_flags & VM_MIXEDMAP) >> - ret = vmf_insert_mixed_prot(vma, address, >> - __pfn_to_pfn_t(pfn, PFN_DEV), >> - prot); >> - else >> - ret = vmf_insert_pfn_prot(vma, address, pfn, prot); >> + ret = vmf_insert_pfn_prot(vma, address, pfn, prot); >> >> /* Never error on prefaulted PTEs */ >> if (unlikely((ret & VM_FAULT_ERROR))) { >> @@ -555,18 +550,14 @@ static void ttm_bo_mmap_vma_setup(struct ttm_buffer_object *bo, struct vm_area_s >> * Note: We're transferring the bo reference to >> * vma->vm_private_data here. >> */ >> - >> vma->vm_private_data = bo; >> >> /* >> - * We'd like to use VM_PFNMAP on shared mappings, where >> - * (vma->vm_flags & VM_SHARED) != 0, for performance reasons, >> - * but for some reason VM_PFNMAP + x86 PAT + write-combine is very >> - * bad for performance. Until that has been sorted out, use >> - * VM_MIXEDMAP on all mappings. See freedesktop.org bug #75719 >> + * PFNMAP forces us to block COW mappings in mmap(), >> + * and with MIXEDMAP we would incorrectly allow fast gup >> + * on TTM memory on architectures that don't have pte_special. >> */ >> - vma->vm_flags |= VM_MIXEDMAP; >> - vma->vm_flags |= VM_IO | VM_DONTEXPAND | VM_DONTDUMP; >> + vma->vm_flags |= VM_PFNMAP | VM_IO | VM_DONTEXPAND | VM_DONTDUMP; >> } >> >> int ttm_bo_mmap(struct file *filp, struct vm_area_struct *vma, >> @@ -579,6 +570,9 @@ int ttm_bo_mmap(struct file *filp, struct vm_area_struct *vma, >> if (unlikely(vma->vm_pgoff < DRM_FILE_PAGE_OFFSET_START)) >> return -EINVAL; >> >> + if (unlikely(is_cow_mapping(vma->vm_flags))) >> + return -EINVAL; >> + >> bo = ttm_bo_vm_lookup(bdev, vma->vm_pgoff, vma_pages(vma)); >> if (unlikely(!bo)) >> return -EINVAL; >> diff --git a/include/linux/mm.h b/include/linux/mm.h >> index 77e64e3eac80..c6ebf7f9ddbb 100644 >> +++ b/include/linux/mm.h >> @@ -686,6 +686,11 @@ static inline bool vma_is_accessible(struct vm_area_struct *vma) >> return vma->vm_flags & VM_ACCESS_FLAGS; >> } >> >> +static inline bool is_cow_mapping(vm_flags_t flags) >> +{ >> + return (flags & (VM_SHARED | VM_MAYWRITE)) == VM_MAYWRITE; >> +} > Most driver places are just banning VM_SHARED. > > I see you copied this from remap_pfn_range(), but that logic is so > special I'm not sure.. It's actually used all over the place. Both in drivers and also redefined with CONFIG_MEM_SOFT_DIRTY which makes me think Daniels idea of vma_is_cow_mapping() is better since it won't clash and cause compilation failures... > > Can the user mprotect the write back on with the above logic? No, it's blocked by mprotect. > Do we > need VM_DENYWRITE too? Seems tied to MAP_DENYWRITE which is nowadays ignored according to man mmap(). Thanks, Thomas > > Jason From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.1 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_RED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E059DC433C1 for ; Tue, 23 Mar 2021 15:46:12 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 87D23619BD for ; Tue, 23 Mar 2021 15:46:12 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 87D23619BD Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=shipmail.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=dri-devel-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 0375B6E84F; Tue, 23 Mar 2021 15:46:12 +0000 (UTC) Received: from pio-pvt-msa1.bahnhof.se (pio-pvt-msa1.bahnhof.se [79.136.2.40]) by gabe.freedesktop.org (Postfix) with ESMTPS id 91BCB6E84F for ; Tue, 23 Mar 2021 15:46:10 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by pio-pvt-msa1.bahnhof.se (Postfix) with ESMTP id CB47340788; Tue, 23 Mar 2021 16:46:08 +0100 (CET) Authentication-Results: pio-pvt-msa1.bahnhof.se; dkim=pass (1024-bit key; unprotected) header.d=shipmail.org header.i=@shipmail.org header.b="rHKVk9Lc"; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at bahnhof.se Received: from pio-pvt-msa1.bahnhof.se ([127.0.0.1]) by localhost (pio-pvt-msa1.bahnhof.se [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tFJo68TOyrQL; Tue, 23 Mar 2021 16:46:07 +0100 (CET) Received: by pio-pvt-msa1.bahnhof.se (Postfix) with ESMTPA id 5ACE040789; Tue, 23 Mar 2021 16:46:05 +0100 (CET) Received: from [192.168.0.209] (unknown [192.198.151.43]) by mail1.shipmail.org (Postfix) with ESMTPSA id 282813602AF; Tue, 23 Mar 2021 16:46:03 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=shipmail.org; s=mail; t=1616514364; bh=/YRbLyyT2+b0x+xy9LzPsteGLOtTqIZRl6La1xXuixw=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=rHKVk9LcDAJi/SFeskJmGVMZq6XkliOXWcwycvl8g1nRLVTmb4RIpIgFak5JH/47E 7xkSJb3MvPNZA1viPKpoAz16O2Zy+u/aA7/MJRjbs3g4VyZQ5qPYACWBnuYg0pvNiY ecAJqm0cFWJxCsXdn1qoqg2Pq7HyVugR8sFtk6+U= Subject: Re: [RFC PATCH 2/2] mm,drm/ttm: Use VM_PFNMAP for TTM vmas To: Jason Gunthorpe References: <20210321184529.59006-1-thomas_os@shipmail.org> <20210321184529.59006-3-thomas_os@shipmail.org> <20210323140030.GE2356281@nvidia.com> From: =?UTF-8?Q?Thomas_Hellstr=c3=b6m_=28Intel=29?= Message-ID: Date: Tue, 23 Mar 2021 16:46:00 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20210323140030.GE2356281@nvidia.com> Content-Language: en-US X-BeenThere: dri-devel@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Direct Rendering Infrastructure - Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: David Airlie , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-mm@kvack.org, Andrew Morton , Christian Koenig Content-Transfer-Encoding: base64 Content-Type: text/plain; charset="utf-8"; Format="flowed" Errors-To: dri-devel-bounces@lists.freedesktop.org Sender: "dri-devel" Ck9uIDMvMjMvMjEgMzowMCBQTSwgSmFzb24gR3VudGhvcnBlIHdyb3RlOgo+IE9uIFN1biwgTWFy IDIxLCAyMDIxIGF0IDA3OjQ1OjI5UE0gKzAxMDAsIFRob21hcyBIZWxsc3Ryw7ZtIChJbnRlbCkg d3JvdGU6Cj4+IFRvIGJsb2NrIGZhc3QgZ3VwIHdlIG5lZWQgdG8gbWFrZSBzdXJlIFRUTSBwdGVz IGFyZSBhbHdheXMgc3BlY2lhbC4KPj4gV2l0aCBNSVhFRE1BUCB3ZSwgb24gYXJjaGl0ZWN0dXJl cyB0aGF0IGRvbid0IHN1cHBvcnQgcHRlX3NwZWNpYWwsCj4+IGluc2VydCBub3JtYWwgcHRlcywg YnV0IE9UT0ggb24gdGhvc2UgYXJjaGl0ZWN0dXJlcywgZmFzdCBpcyBub3QKPj4gc3VwcG9ydGVk Lgo+PiBBdCB0aGUgc2FtZSB0aW1lLCB0aGUgZnVuY3Rpb24gZG9jdW1lbnRhdGlvbiB0byB2bV9u b3JtYWxfcGFnZSgpIHN1Z2dlc3RzCj4+IHRoYXQgcHRlcyBwb2ludGluZyB0byBzeXN0ZW0gbWVt b3J5IHBhZ2VzIG9mIE1JWEVETUFQIHZtYXMgYXJlIGFsd2F5cwo+PiBub3JtYWwsIGJ1dCB0aGF0 IGRvZXNuJ3Qgc2VlbSBjb25zaXN0ZW50IHdpdGggd2hhdCdzIGltcGxlbWVudGVkIGluCj4+IHZt Zl9pbnNlcnRfbWl4ZWQoKS4gSSdtIHRodXMgbm90IGVudGlyZWx5IHN1cmUgdGhpcyBwYXRjaCBp cyBhY3R1YWxseQo+PiBuZWVkZWQuCj4+Cj4+IEJ1dCB0byBtYWtlIHN1cmUgYW5kIHRvIGF2b2lk IGFsc28gbm9ybWFsIChub24tZmFzdCkgZ3VwLCBtYWtlIGFsbAo+PiBUVE0gdm1hcyBQRk5NQVAu IFdpdGggUEZOTUFQIHdlIGNhbid0IGFsbG93IENPVyBtYXBwaW5ncwo+PiBhbnltb3JlIHNvIG1h a2UgaXNfY293X21hcHBpbmcoKSBhdmFpbGFibGUgYW5kIHVzZSBpdCB0byByZWplY3QKPj4gQ09X IG1hcHBpZ3MgYXQgbW1hcCB0aW1lLgo+Pgo+PiBUaGVyZSB3YXMgcHJldmlvdXNseSBhIGNvbW1l bnQgaW4gdGhlIGNvZGUgdGhhdCBXQyBtYXBwaW5ncyB0b2dldGhlcgo+PiB3aXRoIHg4NiBQQVQg KyBQRk5NQVAgd2FzIGJhZCBmb3IgcGVyZm9ybWFuY2UuIEhvd2V2ZXIgZnJvbSBsb29raW5nIGF0 Cj4+IHZtZl9pbnNlcnRfbWl4ZWQoKSBpdCBsb29rcyBsaWtlIGluIHRoZSBjdXJyZW50IGNvZGUg UEZOTUFQIGFuZCBNSVhFRE1BUAo+PiBhcmUgaGFuZGxlZCB0aGUgc2FtZSBmb3IgYXJjaGl0ZWN0 dXJlcyB0aGF0IHN1cHBvcnQgcHRlX3NwZWNpYWwuIFRoaXMKPj4gbWVhbnMgdGhlcmUgc2hvdWxk IG5vdCBiZSBhIHBlcmZvcm1hbmNlIGRpZmZlcmVuY2UgYW55bW9yZSwgYnV0IHRoaXMKPj4gbmVl ZHMgdG8gYmUgdmVyaWZpZWQuCj4+Cj4+IENjOiBDaHJpc3RpYW4gS29lbmlnIDxjaHJpc3RpYW4u a29lbmlnQGFtZC5jb20+Cj4+IENjOiBEYXZpZCBBaXJsaWUgPGFpcmxpZWRAbGludXguaWU+Cj4+ IENjOiBEYW5pZWwgVmV0dGVyIDxkYW5pZWxAZmZ3bGwuY2g+Cj4+IENjOiBBbmRyZXcgTW9ydG9u IDxha3BtQGxpbnV4LWZvdW5kYXRpb24ub3JnPgo+PiBDYzogSmFzb24gR3VudGhvcnBlIDxqZ2dA bnZpZGlhLmNvbT4KPj4gQ2M6IGxpbnV4LW1tQGt2YWNrLm9yZwo+PiBDYzogZHJpLWRldmVsQGxp c3RzLmZyZWVkZXNrdG9wLm9yZwo+PiBDYzogbGludXgta2VybmVsQHZnZXIua2VybmVsLm9yZwo+ PiBTaWduZWQtb2ZmLWJ5OiBUaG9tYXMgSGVsbHN0csO2bSAoSW50ZWwpIDx0aG9tYXNfb3NAc2hp cG1haWwub3JnPgo+PiAgIGRyaXZlcnMvZ3B1L2RybS90dG0vdHRtX2JvX3ZtLmMgfCAyMiArKysr KysrKy0tLS0tLS0tLS0tLS0tCj4+ICAgaW5jbHVkZS9saW51eC9tbS5oICAgICAgICAgICAgICB8 ICA1ICsrKysrCj4+ICAgbW0vaW50ZXJuYWwuaCAgICAgICAgICAgICAgICAgICB8ICA1IC0tLS0t Cj4+ICAgMyBmaWxlcyBjaGFuZ2VkLCAxMyBpbnNlcnRpb25zKCspLCAxOSBkZWxldGlvbnMoLSkK Pj4KPj4gZGlmZiAtLWdpdCBhL2RyaXZlcnMvZ3B1L2RybS90dG0vdHRtX2JvX3ZtLmMgYi9kcml2 ZXJzL2dwdS9kcm0vdHRtL3R0bV9ib192bS5jCj4+IGluZGV4IDFjMzQ5ODM0ODBlNS4uNzA4YzZm YjliZTgxIDEwMDY0NAo+PiArKysgYi9kcml2ZXJzL2dwdS9kcm0vdHRtL3R0bV9ib192bS5jCj4+ IEBAIC0zNzIsMTIgKzM3Miw3IEBAIHZtX2ZhdWx0X3QgdHRtX2JvX3ZtX2ZhdWx0X3Jlc2VydmVk KHN0cnVjdCB2bV9mYXVsdCAqdm1mLAo+PiAgIAkJICogYXQgYXJiaXRyYXJ5IHRpbWVzIHdoaWxl IHRoZSBkYXRhIGlzIG1tYXAnZWQuCj4+ICAgCQkgKiBTZWUgdm1mX2luc2VydF9taXhlZF9wcm90 KCkgZm9yIGEgZGlzY3Vzc2lvbi4KPj4gICAJCSAqLwo+PiAtCQlpZiAodm1hLT52bV9mbGFncyAm IFZNX01JWEVETUFQKQo+PiAtCQkJcmV0ID0gdm1mX2luc2VydF9taXhlZF9wcm90KHZtYSwgYWRk cmVzcywKPj4gLQkJCQkJCSAgICBfX3Bmbl90b19wZm5fdChwZm4sIFBGTl9ERVYpLAo+PiAtCQkJ CQkJICAgIHByb3QpOwo+PiAtCQllbHNlCj4+IC0JCQlyZXQgPSB2bWZfaW5zZXJ0X3Bmbl9wcm90 KHZtYSwgYWRkcmVzcywgcGZuLCBwcm90KTsKPj4gKwkJcmV0ID0gdm1mX2luc2VydF9wZm5fcHJv dCh2bWEsIGFkZHJlc3MsIHBmbiwgcHJvdCk7Cj4+ICAgCj4+ICAgCQkvKiBOZXZlciBlcnJvciBv biBwcmVmYXVsdGVkIFBURXMgKi8KPj4gICAJCWlmICh1bmxpa2VseSgocmV0ICYgVk1fRkFVTFRf RVJST1IpKSkgewo+PiBAQCAtNTU1LDE4ICs1NTAsMTQgQEAgc3RhdGljIHZvaWQgdHRtX2JvX21t YXBfdm1hX3NldHVwKHN0cnVjdCB0dG1fYnVmZmVyX29iamVjdCAqYm8sIHN0cnVjdCB2bV9hcmVh X3MKPj4gICAJICogTm90ZTogV2UncmUgdHJhbnNmZXJyaW5nIHRoZSBibyByZWZlcmVuY2UgdG8K Pj4gICAJICogdm1hLT52bV9wcml2YXRlX2RhdGEgaGVyZS4KPj4gICAJICovCj4+IC0KPj4gICAJ dm1hLT52bV9wcml2YXRlX2RhdGEgPSBibzsKPj4gICAKPj4gICAJLyoKPj4gLQkgKiBXZSdkIGxp a2UgdG8gdXNlIFZNX1BGTk1BUCBvbiBzaGFyZWQgbWFwcGluZ3MsIHdoZXJlCj4+IC0JICogKHZt YS0+dm1fZmxhZ3MgJiBWTV9TSEFSRUQpICE9IDAsIGZvciBwZXJmb3JtYW5jZSByZWFzb25zLAo+ PiAtCSAqIGJ1dCBmb3Igc29tZSByZWFzb24gVk1fUEZOTUFQICsgeDg2IFBBVCArIHdyaXRlLWNv bWJpbmUgaXMgdmVyeQo+PiAtCSAqIGJhZCBmb3IgcGVyZm9ybWFuY2UuIFVudGlsIHRoYXQgaGFz IGJlZW4gc29ydGVkIG91dCwgdXNlCj4+IC0JICogVk1fTUlYRURNQVAgb24gYWxsIG1hcHBpbmdz LiBTZWUgZnJlZWRlc2t0b3Aub3JnIGJ1ZyAjNzU3MTkKPj4gKwkgKiBQRk5NQVAgZm9yY2VzIHVz IHRvIGJsb2NrIENPVyBtYXBwaW5ncyBpbiBtbWFwKCksCj4+ICsJICogYW5kIHdpdGggTUlYRURN QVAgd2Ugd291bGQgaW5jb3JyZWN0bHkgYWxsb3cgZmFzdCBndXAKPj4gKwkgKiBvbiBUVE0gbWVt b3J5IG9uIGFyY2hpdGVjdHVyZXMgdGhhdCBkb24ndCBoYXZlIHB0ZV9zcGVjaWFsLgo+PiAgIAkg Ki8KPj4gLQl2bWEtPnZtX2ZsYWdzIHw9IFZNX01JWEVETUFQOwo+PiAtCXZtYS0+dm1fZmxhZ3Mg fD0gVk1fSU8gfCBWTV9ET05URVhQQU5EIHwgVk1fRE9OVERVTVA7Cj4+ICsJdm1hLT52bV9mbGFn cyB8PSBWTV9QRk5NQVAgfCBWTV9JTyB8IFZNX0RPTlRFWFBBTkQgfCBWTV9ET05URFVNUDsKPj4g ICB9Cj4+ICAgCj4+ICAgaW50IHR0bV9ib19tbWFwKHN0cnVjdCBmaWxlICpmaWxwLCBzdHJ1Y3Qg dm1fYXJlYV9zdHJ1Y3QgKnZtYSwKPj4gQEAgLTU3OSw2ICs1NzAsOSBAQCBpbnQgdHRtX2JvX21t YXAoc3RydWN0IGZpbGUgKmZpbHAsIHN0cnVjdCB2bV9hcmVhX3N0cnVjdCAqdm1hLAo+PiAgIAlp ZiAodW5saWtlbHkodm1hLT52bV9wZ29mZiA8IERSTV9GSUxFX1BBR0VfT0ZGU0VUX1NUQVJUKSkK Pj4gICAJCXJldHVybiAtRUlOVkFMOwo+PiAgIAo+PiArCWlmICh1bmxpa2VseShpc19jb3dfbWFw cGluZyh2bWEtPnZtX2ZsYWdzKSkpCj4+ICsJCXJldHVybiAtRUlOVkFMOwo+PiArCj4+ICAgCWJv ID0gdHRtX2JvX3ZtX2xvb2t1cChiZGV2LCB2bWEtPnZtX3Bnb2ZmLCB2bWFfcGFnZXModm1hKSk7 Cj4+ICAgCWlmICh1bmxpa2VseSghYm8pKQo+PiAgIAkJcmV0dXJuIC1FSU5WQUw7Cj4+IGRpZmYg LS1naXQgYS9pbmNsdWRlL2xpbnV4L21tLmggYi9pbmNsdWRlL2xpbnV4L21tLmgKPj4gaW5kZXgg NzdlNjRlM2VhYzgwLi5jNmViZjdmOWRkYmIgMTAwNjQ0Cj4+ICsrKyBiL2luY2x1ZGUvbGludXgv bW0uaAo+PiBAQCAtNjg2LDYgKzY4NiwxMSBAQCBzdGF0aWMgaW5saW5lIGJvb2wgdm1hX2lzX2Fj Y2Vzc2libGUoc3RydWN0IHZtX2FyZWFfc3RydWN0ICp2bWEpCj4+ICAgCXJldHVybiB2bWEtPnZt X2ZsYWdzICYgVk1fQUNDRVNTX0ZMQUdTOwo+PiAgIH0KPj4gICAKPj4gK3N0YXRpYyBpbmxpbmUg Ym9vbCBpc19jb3dfbWFwcGluZyh2bV9mbGFnc190IGZsYWdzKQo+PiArewo+PiArCXJldHVybiAo ZmxhZ3MgJiAoVk1fU0hBUkVEIHwgVk1fTUFZV1JJVEUpKSA9PSBWTV9NQVlXUklURTsKPj4gK30K PiBNb3N0IGRyaXZlciBwbGFjZXMgYXJlIGp1c3QgYmFubmluZyBWTV9TSEFSRUQuCj4KPiBJIHNl ZSB5b3UgY29waWVkIHRoaXMgZnJvbSByZW1hcF9wZm5fcmFuZ2UoKSwgYnV0IHRoYXQgbG9naWMg aXMgc28KPiBzcGVjaWFsIEknbSBub3Qgc3VyZS4uCgpJdCdzIGFjdHVhbGx5IHVzZWQgYWxsIG92 ZXIgdGhlIHBsYWNlLiBCb3RoIGluIGRyaXZlcnMgYW5kIGFsc28gCnJlZGVmaW5lZCB3aXRoCkNP TkZJR19NRU1fU09GVF9ESVJUWSB3aGljaCBtYWtlcyBtZSB0aGluayBEYW5pZWxzIGlkZWEgb2Yg CnZtYV9pc19jb3dfbWFwcGluZygpIGlzIGJldHRlciBzaW5jZSBpdCB3b24ndCBjbGFzaCBhbmQg Y2F1c2UgCmNvbXBpbGF0aW9uIGZhaWx1cmVzLi4uCgo+Cj4gQ2FuIHRoZSB1c2VyIG1wcm90ZWN0 IHRoZSB3cml0ZSBiYWNrIG9uIHdpdGggdGhlIGFib3ZlIGxvZ2ljPwpObywgaXQncyBibG9ja2Vk IGJ5IG1wcm90ZWN0Lgo+IERvIHdlCj4gbmVlZCBWTV9ERU5ZV1JJVEUgdG9vPwoKU2VlbXMgdGll ZCB0byBNQVBfREVOWVdSSVRFIHdoaWNoIGlzIG5vd2FkYXlzIGlnbm9yZWQgYWNjb3JkaW5nIHRv IG1hbiAKbW1hcCgpLgoKVGhhbmtzLAoKVGhvbWFzCgo+Cj4gSmFzb24KX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KZHJpLWRldmVsIG1haWxpbmcgbGlzdApk cmktZGV2ZWxAbGlzdHMuZnJlZWRlc2t0b3Aub3JnCmh0dHBzOi8vbGlzdHMuZnJlZWRlc2t0b3Au b3JnL21haWxtYW4vbGlzdGluZm8vZHJpLWRldmVsCg==