From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755422AbdCGPEL (ORCPT ); Tue, 7 Mar 2017 10:04:11 -0500 Received: from aserp1050.oracle.com ([141.146.126.70]:19863 "EHLO aserp1050.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754319AbdCGPEB (ORCPT ); Tue, 7 Mar 2017 10:04:01 -0500 From: Boris Ostrovsky Subject: Re: [PATCH 4/7] xen/9pfs: connect to the backend To: Stefano Stabellini , xen-devel@lists.xenproject.org References: <1488830488-18506-1-git-send-email-sstabellini@kernel.org> <1488830488-18506-4-git-send-email-sstabellini@kernel.org> Cc: linux-kernel@vger.kernel.org, Stefano Stabellini , jgross@suse.com, Eric Van Hensbergen , Ron Minnich , Latchesar Ionkov , v9fs-developer@lists.sourceforge.net Message-ID: Date: Tue, 7 Mar 2017 10:03:03 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.6.0 MIME-Version: 1.0 In-Reply-To: <1488830488-18506-4-git-send-email-sstabellini@kernel.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Source-IP: aserp1040.oracle.com [141.146.126.69] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > > +static int xen_9pfs_front_free(struct xen_9pfs_front_priv *priv) > +{ > + int i, j; > + > + list_del(&priv->list); > + > + for (i = 0; i < priv->num_rings; i++) { > + if (priv->rings[i].intf == NULL) > + break; Are we guaranteed that all subsequent entries are not allocated (i.e. this shouldn't be 'continue')? > + if (priv->rings[i].irq > 0) > + unbind_from_irqhandler(priv->rings[i].irq, priv->dev); > + if (priv->rings[i].bytes != NULL) { > + for (j = 0; j < (1 << XEN_9PFS_RING_ORDER); j++) > + gnttab_end_foreign_access(priv->rings[i].intf->ref[j], 0, 0); > + free_pages((unsigned long)priv->rings[i].bytes, XEN_9PFS_RING_ORDER); > + } > + gnttab_end_foreign_access(priv->rings[i].ref, 0, 0); > + free_page((unsigned long)priv->rings[i].intf); > + } > + kfree(priv->rings); > + kfree(priv); > + > + return 0; > +} > + > static int xen_9pfs_front_remove(struct xenbus_device *dev) > { > + int ret; > + struct xen_9pfs_front_priv *priv = dev_get_drvdata(&dev->dev); > + > + dev_set_drvdata(&dev->dev, NULL); > + ret = xen_9pfs_front_free(priv); > + return ret; > +} > + > +static int xen_9pfs_front_alloc_dataring(struct xenbus_device *dev, > + struct xen_9pfs_dataring *ring) > +{ > + int i; > + int ret = -ENOMEM; > + > + init_waitqueue_head(&ring->wq); > + spin_lock_init(&ring->lock); > + INIT_WORK(&ring->work, p9_xen_response); > + > + ring->intf = (struct xen_9pfs_data_intf *) __get_free_page(GFP_KERNEL | __GFP_ZERO); > + if (!ring->intf) > + goto error; > + memset(ring->intf, 0, XEN_PAGE_SIZE); get_zeroed_page()? (especially given that __get_free_page() returns PAGE_SIZE, not XEN_PAGE_SIZE) > + ring->bytes = (void*)__get_free_pages(GFP_KERNEL | __GFP_ZERO, XEN_9PFS_RING_ORDER); > + if (ring->bytes == NULL) > + goto error; > + for (i = 0; i < (1 << XEN_9PFS_RING_ORDER); i++) > + ring->intf->ref[i] = gnttab_grant_foreign_access(dev->otherend_id, pfn_to_gfn(virt_to_pfn((void*)ring->bytes) + i), 0); > + ring->ref = gnttab_grant_foreign_access(dev->otherend_id, pfn_to_gfn(virt_to_pfn((void*)ring->intf)), 0); > + ring->ring.in = ring->bytes; > + ring->ring.out = ring->bytes + XEN_9PFS_RING_SIZE; > + > + ret = xenbus_alloc_evtchn(dev, &ring->evtchn); > + if (ret) > + goto error; > + ring->irq = bind_evtchn_to_irqhandler(ring->evtchn, xen_9pfs_front_event_handler, > + 0, "xen_9pfs-frontend", ring); > + if (ring->irq < 0) { > + xenbus_free_evtchn(dev, ring->evtchn); > + ret = ring->irq; > + goto error; > + } > return 0; > + > +error: You may need to gnttab_end_foreign_access(). > + if (ring->intf != NULL) > + kfree(ring->intf); > + if (ring->bytes != NULL) > + kfree(ring->bytes); > + return ret; > } > > static int xen_9pfs_front_probe(struct xenbus_device *dev, > const struct xenbus_device_id *id) > { > + int ret = -EFAULT, i; Unnecessary initialization. > + struct xenbus_transaction xbt; > + struct xen_9pfs_front_priv *priv = NULL; > + char *versions; > + unsigned int max_rings, max_ring_order, len; > + > + versions = xenbus_read(XBT_NIL, dev->otherend, "versions", &len); > + if (!len || strcmp(versions, "1")) > + return -EINVAL; > + kfree(versions); > + ret = xenbus_scanf(XBT_NIL, dev->otherend, "max-rings", "%u", &max_rings); > + if (ret < 0 || max_rings < XEN_9PFS_NUM_RINGS) > + return -EINVAL; > + ret = xenbus_scanf(XBT_NIL, dev->otherend, "max-ring-page-order", "%u", &max_ring_order); > + if (ret < 0|| max_ring_order < XEN_9PFS_RING_ORDER) > + return -EINVAL; > + > + > + priv = kzalloc(sizeof(struct xen_9pfs_front_priv), GFP_KERNEL); > + if (!priv) > + return -ENOMEM; > + > + priv->dev = dev; > + priv->num_rings = XEN_9PFS_NUM_RINGS; > + priv->rings = kzalloc(sizeof(struct xen_9pfs_dataring) * priv->num_rings, > + GFP_KERNEL); > + if (!priv->rings) { > + kfree(priv); > + return -ENOMEM; > + } > + > + again: > + ret = xenbus_transaction_start(&xbt); > + if (ret) { > + xenbus_dev_fatal(dev, ret, "starting transaction"); > + goto error; > + } > + ret = xenbus_printf(xbt, dev->nodename, "version", "%u", 1); > + if (ret) > + goto error_xenbus; > + ret = xenbus_printf(xbt, dev->nodename, "num-rings", "%u", priv->num_rings); > + if (ret) > + goto error_xenbus; > + for (i = 0; i < priv->num_rings; i++) { > + char str[16]; > + > + priv->rings[i].priv = priv; > + ret = xen_9pfs_front_alloc_dataring(dev, &priv->rings[i]); Not for -EAGAIN, I think. -boris > + if (ret < 0) > + goto error_xenbus; > + > + sprintf(str, "ring-ref%u", i); > + ret = xenbus_printf(xbt, dev->nodename, str, "%d", priv->rings[i].ref); > + if (ret) > + goto error_xenbus; > + > + sprintf(str, "event-channel-%u", i); > + ret = xenbus_printf(xbt, dev->nodename, str, "%u", priv->rings[i].evtchn); > + if (ret) > + goto error_xenbus; > + } > + priv->tag = xenbus_read(xbt, dev->nodename, "tag", NULL); > + if (ret) > + goto error_xenbus; > + ret = xenbus_transaction_end(xbt, 0); > + if (ret) { > + if (ret == -EAGAIN) > + goto again; > + xenbus_dev_fatal(dev, ret, "completing transaction"); > + goto error; > + } > + > + > + list_add_tail(&priv->list, &xen_9pfs_devs); > + dev_set_drvdata(&dev->dev, priv); > + xenbus_switch_state(dev, XenbusStateInitialised); > + > return 0; > + > + error_xenbus: > + xenbus_transaction_end(xbt, 1); > + xenbus_dev_fatal(dev, ret, "writing xenstore"); > + error: > + dev_set_drvdata(&dev->dev, NULL); > + xen_9pfs_front_free(priv); > + return ret; > } > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Boris Ostrovsky Subject: Re: [PATCH 4/7] xen/9pfs: connect to the backend Date: Tue, 7 Mar 2017 10:03:03 -0500 Message-ID: References: <1488830488-18506-1-git-send-email-sstabellini@kernel.org> <1488830488-18506-4-git-send-email-sstabellini@kernel.org> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1clGct-0000EF-39 for xen-devel@lists.xenproject.org; Tue, 07 Mar 2017 15:02:11 +0000 In-Reply-To: <1488830488-18506-4-git-send-email-sstabellini@kernel.org> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" To: Stefano Stabellini , xen-devel@lists.xenproject.org Cc: jgross@suse.com, Latchesar Ionkov , Eric Van Hensbergen , linux-kernel@vger.kernel.org, Stefano Stabellini , v9fs-developer@lists.sourceforge.net, Ron Minnich List-Id: xen-devel@lists.xenproject.org Cj4gIAo+ICtzdGF0aWMgaW50IHhlbl85cGZzX2Zyb250X2ZyZWUoc3RydWN0IHhlbl85cGZzX2Zy b250X3ByaXYgKnByaXYpCj4gK3sKPiArCWludCBpLCBqOwo+ICsKPiArCWxpc3RfZGVsKCZwcml2 LT5saXN0KTsKPiArCj4gKwlmb3IgKGkgPSAwOyBpIDwgcHJpdi0+bnVtX3JpbmdzOyBpKyspIHsK PiArCQlpZiAocHJpdi0+cmluZ3NbaV0uaW50ZiA9PSBOVUxMKQo+ICsJCQlicmVhazsKCkFyZSB3 ZSBndWFyYW50ZWVkIHRoYXQgYWxsIHN1YnNlcXVlbnQgZW50cmllcyBhcmUgbm90IGFsbG9jYXRl ZCAoaS5lLgp0aGlzIHNob3VsZG4ndCBiZSAnY29udGludWUnKT8KCj4gKwkJaWYgKHByaXYtPnJp bmdzW2ldLmlycSA+IDApCj4gKwkJCXVuYmluZF9mcm9tX2lycWhhbmRsZXIocHJpdi0+cmluZ3Nb aV0uaXJxLCBwcml2LT5kZXYpOwo+ICsJCWlmIChwcml2LT5yaW5nc1tpXS5ieXRlcyAhPSBOVUxM KSB7Cj4gKwkJCWZvciAoaiA9IDA7IGogPCAoMSA8PCBYRU5fOVBGU19SSU5HX09SREVSKTsgaisr KQo+ICsJCQkJZ250dGFiX2VuZF9mb3JlaWduX2FjY2Vzcyhwcml2LT5yaW5nc1tpXS5pbnRmLT5y ZWZbal0sIDAsIDApOwo+ICsJCQlmcmVlX3BhZ2VzKCh1bnNpZ25lZCBsb25nKXByaXYtPnJpbmdz W2ldLmJ5dGVzLCBYRU5fOVBGU19SSU5HX09SREVSKTsKPiArCQl9Cj4gKwkJZ250dGFiX2VuZF9m b3JlaWduX2FjY2Vzcyhwcml2LT5yaW5nc1tpXS5yZWYsIDAsIDApOwo+ICsJCWZyZWVfcGFnZSgo dW5zaWduZWQgbG9uZylwcml2LT5yaW5nc1tpXS5pbnRmKTsKPiArCX0KPiArCWtmcmVlKHByaXYt PnJpbmdzKTsKPiArCWtmcmVlKHByaXYpOwo+ICsKPiArCXJldHVybiAwOwo+ICt9Cj4gKwo+ICBz dGF0aWMgaW50IHhlbl85cGZzX2Zyb250X3JlbW92ZShzdHJ1Y3QgeGVuYnVzX2RldmljZSAqZGV2 KQo+ICB7Cj4gKwlpbnQgcmV0Owo+ICsJc3RydWN0IHhlbl85cGZzX2Zyb250X3ByaXYgKnByaXYg PSBkZXZfZ2V0X2RydmRhdGEoJmRldi0+ZGV2KTsKPiArCj4gKwlkZXZfc2V0X2RydmRhdGEoJmRl di0+ZGV2LCBOVUxMKTsKPiArCXJldCA9IHhlbl85cGZzX2Zyb250X2ZyZWUocHJpdik7Cj4gKwly ZXR1cm4gcmV0Owo+ICt9Cj4gKwo+ICtzdGF0aWMgaW50IHhlbl85cGZzX2Zyb250X2FsbG9jX2Rh dGFyaW5nKHN0cnVjdCB4ZW5idXNfZGV2aWNlICpkZXYsCj4gKwkJc3RydWN0IHhlbl85cGZzX2Rh dGFyaW5nICpyaW5nKQo+ICt7Cj4gKwlpbnQgaTsKPiArCWludCByZXQgPSAtRU5PTUVNOwo+ICsK PiArCWluaXRfd2FpdHF1ZXVlX2hlYWQoJnJpbmctPndxKTsKPiArCXNwaW5fbG9ja19pbml0KCZy aW5nLT5sb2NrKTsKPiArCUlOSVRfV09SSygmcmluZy0+d29yaywgcDlfeGVuX3Jlc3BvbnNlKTsK PiArCj4gKwlyaW5nLT5pbnRmID0gKHN0cnVjdCB4ZW5fOXBmc19kYXRhX2ludGYgKikgX19nZXRf ZnJlZV9wYWdlKEdGUF9LRVJORUwgfCBfX0dGUF9aRVJPKTsKPiArCWlmICghcmluZy0+aW50ZikK PiArCQlnb3RvIGVycm9yOwo+ICsJbWVtc2V0KHJpbmctPmludGYsIDAsIFhFTl9QQUdFX1NJWkUp OwoKZ2V0X3plcm9lZF9wYWdlKCk/ICAoZXNwZWNpYWxseSBnaXZlbiB0aGF0IF9fZ2V0X2ZyZWVf cGFnZSgpIHJldHVybnMKUEFHRV9TSVpFLCBub3QgWEVOX1BBR0VfU0laRSkKCgo+ICsJcmluZy0+ Ynl0ZXMgPSAodm9pZCopX19nZXRfZnJlZV9wYWdlcyhHRlBfS0VSTkVMIHwgX19HRlBfWkVSTywg WEVOXzlQRlNfUklOR19PUkRFUik7Cj4gKwlpZiAocmluZy0+Ynl0ZXMgPT0gTlVMTCkKPiArCQln b3RvIGVycm9yOwo+ICsJZm9yIChpID0gMDsgaSA8ICgxIDw8IFhFTl85UEZTX1JJTkdfT1JERVIp OyBpKyspCj4gKwkJcmluZy0+aW50Zi0+cmVmW2ldID0gZ250dGFiX2dyYW50X2ZvcmVpZ25fYWNj ZXNzKGRldi0+b3RoZXJlbmRfaWQsIHBmbl90b19nZm4odmlydF90b19wZm4oKHZvaWQqKXJpbmct PmJ5dGVzKSArIGkpLCAwKTsKPiArCXJpbmctPnJlZiA9IGdudHRhYl9ncmFudF9mb3JlaWduX2Fj Y2VzcyhkZXYtPm90aGVyZW5kX2lkLCBwZm5fdG9fZ2ZuKHZpcnRfdG9fcGZuKCh2b2lkKilyaW5n LT5pbnRmKSksIDApOwo+ICsJcmluZy0+cmluZy5pbiA9IHJpbmctPmJ5dGVzOwo+ICsJcmluZy0+ cmluZy5vdXQgPSByaW5nLT5ieXRlcyArIFhFTl85UEZTX1JJTkdfU0laRTsKPiArCj4gKwlyZXQg PSB4ZW5idXNfYWxsb2NfZXZ0Y2huKGRldiwgJnJpbmctPmV2dGNobik7Cj4gKwlpZiAocmV0KQo+ ICsJCWdvdG8gZXJyb3I7Cj4gKwlyaW5nLT5pcnEgPSBiaW5kX2V2dGNobl90b19pcnFoYW5kbGVy KHJpbmctPmV2dGNobiwgeGVuXzlwZnNfZnJvbnRfZXZlbnRfaGFuZGxlciwKPiArCQkJCQkwLCAi eGVuXzlwZnMtZnJvbnRlbmQiLCByaW5nKTsKPiArCWlmIChyaW5nLT5pcnEgPCAwKSB7Cj4gKwkJ eGVuYnVzX2ZyZWVfZXZ0Y2huKGRldiwgcmluZy0+ZXZ0Y2huKTsKPiArCQlyZXQgPSByaW5nLT5p cnE7Cj4gKwkJZ290byBlcnJvcjsKPiArCX0KPiAgCXJldHVybiAwOwo+ICsKPiArZXJyb3I6CgpZ b3UgbWF5IG5lZWQgdG8gZ250dGFiX2VuZF9mb3JlaWduX2FjY2VzcygpLgoKPiArCWlmIChyaW5n LT5pbnRmICE9IE5VTEwpCj4gKwkJa2ZyZWUocmluZy0+aW50Zik7Cj4gKwlpZiAocmluZy0+Ynl0 ZXMgIT0gTlVMTCkKPiArCQlrZnJlZShyaW5nLT5ieXRlcyk7Cj4gKwlyZXR1cm4gcmV0Owo+ICB9 Cj4gIAo+ICBzdGF0aWMgaW50IHhlbl85cGZzX2Zyb250X3Byb2JlKHN0cnVjdCB4ZW5idXNfZGV2 aWNlICpkZXYsCj4gIAkJY29uc3Qgc3RydWN0IHhlbmJ1c19kZXZpY2VfaWQgKmlkKQo+ICB7Cj4g KwlpbnQgcmV0ID0gLUVGQVVMVCwgaTsKClVubmVjZXNzYXJ5IGluaXRpYWxpemF0aW9uLgoKPiAr CXN0cnVjdCB4ZW5idXNfdHJhbnNhY3Rpb24geGJ0Owo+ICsJc3RydWN0IHhlbl85cGZzX2Zyb250 X3ByaXYgKnByaXYgPSBOVUxMOwo+ICsJY2hhciAqdmVyc2lvbnM7Cj4gKwl1bnNpZ25lZCBpbnQg bWF4X3JpbmdzLCBtYXhfcmluZ19vcmRlciwgbGVuOwo+ICsKPiArCXZlcnNpb25zID0geGVuYnVz X3JlYWQoWEJUX05JTCwgZGV2LT5vdGhlcmVuZCwgInZlcnNpb25zIiwgJmxlbik7Cj4gKwlpZiAo IWxlbiB8fCBzdHJjbXAodmVyc2lvbnMsICIxIikpCj4gKwkJcmV0dXJuIC1FSU5WQUw7Cj4gKwlr ZnJlZSh2ZXJzaW9ucyk7Cj4gKwlyZXQgPSB4ZW5idXNfc2NhbmYoWEJUX05JTCwgZGV2LT5vdGhl cmVuZCwgIm1heC1yaW5ncyIsICIldSIsICZtYXhfcmluZ3MpOwo+ICsJaWYgKHJldCA8IDAgfHwg bWF4X3JpbmdzIDwgWEVOXzlQRlNfTlVNX1JJTkdTKQo+ICsJCXJldHVybiAtRUlOVkFMOwo+ICsJ cmV0ID0geGVuYnVzX3NjYW5mKFhCVF9OSUwsIGRldi0+b3RoZXJlbmQsICJtYXgtcmluZy1wYWdl LW9yZGVyIiwgIiV1IiwgJm1heF9yaW5nX29yZGVyKTsKPiArCWlmIChyZXQgPCAwfHwgbWF4X3Jp bmdfb3JkZXIgPCBYRU5fOVBGU19SSU5HX09SREVSKQo+ICsJCXJldHVybiAtRUlOVkFMOwo+ICsK PiArCj4gKwlwcml2ID0ga3phbGxvYyhzaXplb2Yoc3RydWN0IHhlbl85cGZzX2Zyb250X3ByaXYp LCBHRlBfS0VSTkVMKTsKPiArCWlmICghcHJpdikKPiArCQlyZXR1cm4gLUVOT01FTTsKPiArCj4g Kwlwcml2LT5kZXYgPSBkZXY7Cj4gKwlwcml2LT5udW1fcmluZ3MgPSBYRU5fOVBGU19OVU1fUklO R1M7Cj4gKwlwcml2LT5yaW5ncyA9IGt6YWxsb2Moc2l6ZW9mKHN0cnVjdCB4ZW5fOXBmc19kYXRh cmluZykgKiBwcml2LT5udW1fcmluZ3MsCj4gKwkJCQkJCUdGUF9LRVJORUwpOwo+ICsJaWYgKCFw cml2LT5yaW5ncykgewo+ICsJCWtmcmVlKHByaXYpOwo+ICsJCXJldHVybiAtRU5PTUVNOwo+ICsJ fQo+ICsKPiArIGFnYWluOgo+ICsJcmV0ID0geGVuYnVzX3RyYW5zYWN0aW9uX3N0YXJ0KCZ4YnQp Owo+ICsJaWYgKHJldCkgewo+ICsJCXhlbmJ1c19kZXZfZmF0YWwoZGV2LCByZXQsICJzdGFydGlu ZyB0cmFuc2FjdGlvbiIpOwo+ICsJCWdvdG8gZXJyb3I7Cj4gKwl9Cj4gKwlyZXQgPSB4ZW5idXNf cHJpbnRmKHhidCwgZGV2LT5ub2RlbmFtZSwgInZlcnNpb24iLCAiJXUiLCAxKTsKPiArCWlmIChy ZXQpCj4gKwkJZ290byBlcnJvcl94ZW5idXM7Cj4gKwlyZXQgPSB4ZW5idXNfcHJpbnRmKHhidCwg ZGV2LT5ub2RlbmFtZSwgIm51bS1yaW5ncyIsICIldSIsIHByaXYtPm51bV9yaW5ncyk7Cj4gKwlp ZiAocmV0KQo+ICsJCWdvdG8gZXJyb3JfeGVuYnVzOwo+ICsJZm9yIChpID0gMDsgaSA8IHByaXYt Pm51bV9yaW5nczsgaSsrKSB7Cj4gKwkJY2hhciBzdHJbMTZdOwo+ICsKPiArCQlwcml2LT5yaW5n c1tpXS5wcml2ID0gcHJpdjsKPiArCQlyZXQgPSB4ZW5fOXBmc19mcm9udF9hbGxvY19kYXRhcmlu ZyhkZXYsICZwcml2LT5yaW5nc1tpXSk7CgpOb3QgZm9yIC1FQUdBSU4sIEkgdGhpbmsuCgoKLWJv cmlzCgo+ICsJCWlmIChyZXQgPCAwKQo+ICsJCQlnb3RvIGVycm9yX3hlbmJ1czsKPiArCj4gKwkJ c3ByaW50ZihzdHIsICJyaW5nLXJlZiV1IiwgaSk7Cj4gKwkJcmV0ID0geGVuYnVzX3ByaW50Zih4 YnQsIGRldi0+bm9kZW5hbWUsIHN0ciwgIiVkIiwgcHJpdi0+cmluZ3NbaV0ucmVmKTsKPiArCQlp ZiAocmV0KQo+ICsJCQlnb3RvIGVycm9yX3hlbmJ1czsKPiArCj4gKwkJc3ByaW50ZihzdHIsICJl dmVudC1jaGFubmVsLSV1IiwgaSk7Cj4gKwkJcmV0ID0geGVuYnVzX3ByaW50Zih4YnQsIGRldi0+ bm9kZW5hbWUsIHN0ciwgIiV1IiwgcHJpdi0+cmluZ3NbaV0uZXZ0Y2huKTsKPiArCQlpZiAocmV0 KQo+ICsJCQlnb3RvIGVycm9yX3hlbmJ1czsKPiArCX0KPiArCXByaXYtPnRhZyA9IHhlbmJ1c19y ZWFkKHhidCwgZGV2LT5ub2RlbmFtZSwgInRhZyIsIE5VTEwpOwo+ICsJaWYgKHJldCkKPiArCQln b3RvIGVycm9yX3hlbmJ1czsKPiArCXJldCA9IHhlbmJ1c190cmFuc2FjdGlvbl9lbmQoeGJ0LCAw KTsKPiArCWlmIChyZXQpIHsKPiArCQlpZiAocmV0ID09IC1FQUdBSU4pCj4gKwkJCWdvdG8gYWdh aW47Cj4gKwkJeGVuYnVzX2Rldl9mYXRhbChkZXYsIHJldCwgImNvbXBsZXRpbmcgdHJhbnNhY3Rp b24iKTsKPiArCQlnb3RvIGVycm9yOwo+ICsJfQo+ICsKPiArCj4gKwlsaXN0X2FkZF90YWlsKCZw cml2LT5saXN0LCAmeGVuXzlwZnNfZGV2cyk7Cj4gKwlkZXZfc2V0X2RydmRhdGEoJmRldi0+ZGV2 LCBwcml2KTsKPiArCXhlbmJ1c19zd2l0Y2hfc3RhdGUoZGV2LCBYZW5idXNTdGF0ZUluaXRpYWxp c2VkKTsKPiArCj4gIAlyZXR1cm4gMDsKPiArCj4gKyBlcnJvcl94ZW5idXM6Cj4gKwl4ZW5idXNf dHJhbnNhY3Rpb25fZW5kKHhidCwgMSk7Cj4gKwl4ZW5idXNfZGV2X2ZhdGFsKGRldiwgcmV0LCAi d3JpdGluZyB4ZW5zdG9yZSIpOwo+ICsgZXJyb3I6Cj4gKwlkZXZfc2V0X2RydmRhdGEoJmRldi0+ ZGV2LCBOVUxMKTsKPiArCXhlbl85cGZzX2Zyb250X2ZyZWUocHJpdik7Cj4gKwlyZXR1cm4gcmV0 Owo+ICB9Cj4gIAoKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fClhlbi1kZXZlbCBtYWlsaW5nIGxpc3QKWGVuLWRldmVsQGxpc3RzLnhlbi5vcmcKaHR0cHM6 Ly9saXN0cy54ZW4ub3JnL3hlbi1kZXZlbAo=