From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?B?VG9yYWxmIEbDtnJzdGVy?= Subject: Issues with a rather unusual configured NFS server Date: Sun, 11 Aug 2013 11:48:49 +0200 Message-ID: <52075E01.7030506@gmx.de> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE Cc: "user-mode-linux-devel@lists.sourceforge.net" , linux-ext4@vger.kernel.org, Linux Kernel To: Linux NFS mailing list Return-path: Received: from mout-xforward.gmx.net ([82.165.159.40]:58354 "EHLO mout-xforward.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752745Ab3HKJsx (ORCPT ); Sun, 11 Aug 2013 05:48:53 -0400 Received: from [92.224.126.156] ([92.224.126.156]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0MRGTX-1VZ52a0heJ-00UddU for ; Sun, 11 Aug 2013 11:48:51 +0200 Sender: linux-ext4-owner@vger.kernel.org List-ID: so that the server either crashes (if it is a user mode linux image) or= at least its reboot functionality got broken - if the NFS server is hammered with scary NFS calls using a fuzzy tool= running at a remote NFS client under a non-privileged user id. It can re reproduced, if - the NFS share is an EXT3 or EXT4 directory - and it is created at file located at tempfs and mounted via loop dev= ice - and the NFS server is forced to umount the NFS share - and the server forced to restart the NSF service afterwards - and trinity is used I could find a scenario for an automated bisect. 2 times it brought thi= s commit=20 commit 68a3396178e6688ad7367202cdf0af8ed03c8727 Author: J. Bruce Fields Date: Thu Mar 21 11:21:50 2013 -0400 nfsd4: shut down more of delegation earlier to be the one after which the user mode linux server crashes with a bac= k trace like this: $ cat /mnt/ramdisk/bt.v3.11-rc4-172-g8ae3f1d [New LWP 14025] Core was generated by `/home/tfoerste/devel/linux/linux earlyprintk ubd= a=3D/home/tfoerste/virtual/uml/tr'. Program terminated with signal 6, Aborted. #0 0xb77ef424 in __kernel_vsyscall () #0 0xb77ef424 in __kernel_vsyscall () #1 0x083a33c5 in kill () #2 0x0807163d in uml_abort () at arch/um/os-Linux/util.c:93 #3 0x08071925 in os_dump_core () at arch/um/os-Linux/util.c:138 #4 0x080613a7 in panic_exit (self=3D0x85a1518 , u= nused1=3D0, unused2=3D0x85d6ce0 ) at arch/um/kernel/um_arch.= c:240 #5 0x0809a3b8 in notifier_call_chain (nl=3D0x0, val=3D0, v=3D0x85d6ce0= , nr_to_call=3D-2, nr_calls=3D0x0) at kernel/notifier.c:93 #6 0x0809a503 in __atomic_notifier_call_chain (nr_calls=3D, nr_to_call=3D, v=3D, val=3D, nh=3D) at kernel/notifier.c:182 #7 atomic_notifier_call_chain (nh=3D0x85d6cc4 , v= al=3D0, v=3D0x85d6ce0 ) at kernel/notifier.c:191 #8 0x08400ba8 in panic (fmt=3D0x0) at kernel/panic.c:128 #9 0x0818edf4 in ext4_put_super (sb=3D0x4a042690) at fs/ext4/super.c:8= 18 #10 0x081010d2 in generic_shutdown_super (sb=3D0x4a042690) at fs/super.= c:418 #11 0x0810209a in kill_block_super (sb=3D0x0) at fs/super.c:1028 #12 0x08100f6a in deactivate_locked_super (s=3D0x4a042690) at fs/super.= c:299 #13 0x08101001 in deactivate_super (s=3D0x4a042690) at fs/super.c:324 #14 0x08118e0c in mntfree (mnt=3D) at fs/namespace.c:891 #15 mntput_no_expire (mnt=3D0x0) at fs/namespace.c:929 #16 0x0811a2f5 in SYSC_umount (flags=3D, name=3D) at fs/namespace.c:1335 #17 SyS_umount (name=3D134541632, flags=3D0) at fs/namespace.c:1305 #18 0x0811a369 in SYSC_oldumount (name=3D) at fs/namespa= ce.c:1347 #19 SyS_oldumount (name=3D134541632) at fs/namespace.c:1345 #20 0x080618e2 in handle_syscall (r=3D0x49e919d4) at arch/um/kernel/ska= s/syscall.c:35 #21 0x08073c0d in handle_trap (local_using_sysemu=3D, re= gs=3D, pid=3D) at arch/um/os-Linux/skas/p= rocess.c:198 #22 userspace (regs=3D0x49e919d4) at arch/um/os-Linux/skas/process.c:43= 1 #23 0x0805e65c in fork_handler () at arch/um/kernel/process.c:160 #24 0x00000000 in ?? () A real system however would not crash bug would give a kernel BUG as re= ported here: http://article.gmane.org/gmane.comp.file-systems.ext4/38915 =46urthermore the server won't be able any longer to reboot - it would = hang infinitely in the reboot phase. Just the magic sysrq keys still works then. Steps to reproduce at two 32 bit Gentoo Linux user mode linux images: 1. prepare the server : mkdir /mnt/ramdisk/victims dd if=3D/dev/zero of=3D/mnt/ramdisk/disk1 bs=3D1M count=3D257 2>/dev/n= ull yes | mkfs.ext4 -q /mnt/ramdisk/disk1 1>/dev/null mount -o loop /mnt/ramdisk/disk1 /mnt/ramdisk/victims chmod 777 /mnt/ramdisk/victims /etc/init.d/nfs restart 2. prepare the client mount the NFS share onto the local mount point /mnt/ramdisk/victims/ w= ith NFSv4 =09 3. run the fuzzy tool trinity at the client: while [[ : ]]; do <(re-)create and fill /mnt/ramdisk/victims/v1/v2 with 100 empty files= and 100 empty directories> trinity -V /mnt/ramdisk/victims/v1/v2 -C 1 -N 10000 -q sleep 3 done 4. after 15 min kill the user mode linux client with -9 5. now run at the server umount /mnt/ramdisk/victims || /etc/init.d/nfs restart && umount /mnt/= ramdisk/victims && echo ' no issue so far' You might need this patch too from Oleg Nesterov (not= in mainline currently) . --- x/kernel/exit.c +++ x/kernel/exit.c @@ -783,8 +783,8 @@ void do_exit(long code) exit_shm(tsk); exit_files(tsk); exit_fs(tsk); - exit_task_namespaces(tsk); exit_task_work(tsk); + exit_task_namespaces(tsk); check_stack_usage(); exit_thread(); --=20 MfG/Sincerely Toralf F=C3=B6rster pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3 -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" i= n the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: linux-nfs-owner@vger.kernel.org Received: from mout-xforward.gmx.net ([82.165.159.42]:55506 "EHLO mout-xforward.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752788Ab3HKJsx (ORCPT ); Sun, 11 Aug 2013 05:48:53 -0400 Received: from [92.224.126.156] ([92.224.126.156]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0M3iU5-1Vz2zD3RE9-00rHOc for ; Sun, 11 Aug 2013 11:48:51 +0200 Message-ID: <52075E01.7030506@gmx.de> Date: Sun, 11 Aug 2013 11:48:49 +0200 From: =?UTF-8?B?VG9yYWxmIEbDtnJzdGVy?= MIME-Version: 1.0 To: Linux NFS mailing list CC: "user-mode-linux-devel@lists.sourceforge.net" , linux-ext4@vger.kernel.org, Linux Kernel Subject: Issues with a rather unusual configured NFS server Content-Type: text/plain; charset=UTF-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: so that the server either crashes (if it is a user mode linux image) or at least its reboot functionality got broken - if the NFS server is hammered with scary NFS calls using a fuzzy tool running at a remote NFS client under a non-privileged user id. It can re reproduced, if - the NFS share is an EXT3 or EXT4 directory - and it is created at file located at tempfs and mounted via loop device - and the NFS server is forced to umount the NFS share - and the server forced to restart the NSF service afterwards - and trinity is used I could find a scenario for an automated bisect. 2 times it brought this commit commit 68a3396178e6688ad7367202cdf0af8ed03c8727 Author: J. Bruce Fields Date: Thu Mar 21 11:21:50 2013 -0400 nfsd4: shut down more of delegation earlier to be the one after which the user mode linux server crashes with a back trace like this: $ cat /mnt/ramdisk/bt.v3.11-rc4-172-g8ae3f1d [New LWP 14025] Core was generated by `/home/tfoerste/devel/linux/linux earlyprintk ubda=/home/tfoerste/virtual/uml/tr'. Program terminated with signal 6, Aborted. #0 0xb77ef424 in __kernel_vsyscall () #0 0xb77ef424 in __kernel_vsyscall () #1 0x083a33c5 in kill () #2 0x0807163d in uml_abort () at arch/um/os-Linux/util.c:93 #3 0x08071925 in os_dump_core () at arch/um/os-Linux/util.c:138 #4 0x080613a7 in panic_exit (self=0x85a1518 , unused1=0, unused2=0x85d6ce0 ) at arch/um/kernel/um_arch.c:240 #5 0x0809a3b8 in notifier_call_chain (nl=0x0, val=0, v=0x85d6ce0 , nr_to_call=-2, nr_calls=0x0) at kernel/notifier.c:93 #6 0x0809a503 in __atomic_notifier_call_chain (nr_calls=, nr_to_call=, v=, val=, nh=) at kernel/notifier.c:182 #7 atomic_notifier_call_chain (nh=0x85d6cc4 , val=0, v=0x85d6ce0 ) at kernel/notifier.c:191 #8 0x08400ba8 in panic (fmt=0x0) at kernel/panic.c:128 #9 0x0818edf4 in ext4_put_super (sb=0x4a042690) at fs/ext4/super.c:818 #10 0x081010d2 in generic_shutdown_super (sb=0x4a042690) at fs/super.c:418 #11 0x0810209a in kill_block_super (sb=0x0) at fs/super.c:1028 #12 0x08100f6a in deactivate_locked_super (s=0x4a042690) at fs/super.c:299 #13 0x08101001 in deactivate_super (s=0x4a042690) at fs/super.c:324 #14 0x08118e0c in mntfree (mnt=) at fs/namespace.c:891 #15 mntput_no_expire (mnt=0x0) at fs/namespace.c:929 #16 0x0811a2f5 in SYSC_umount (flags=, name=) at fs/namespace.c:1335 #17 SyS_umount (name=134541632, flags=0) at fs/namespace.c:1305 #18 0x0811a369 in SYSC_oldumount (name=) at fs/namespace.c:1347 #19 SyS_oldumount (name=134541632) at fs/namespace.c:1345 #20 0x080618e2 in handle_syscall (r=0x49e919d4) at arch/um/kernel/skas/syscall.c:35 #21 0x08073c0d in handle_trap (local_using_sysemu=, regs=, pid=) at arch/um/os-Linux/skas/process.c:198 #22 userspace (regs=0x49e919d4) at arch/um/os-Linux/skas/process.c:431 #23 0x0805e65c in fork_handler () at arch/um/kernel/process.c:160 #24 0x00000000 in ?? () A real system however would not crash bug would give a kernel BUG as reported here: http://article.gmane.org/gmane.comp.file-systems.ext4/38915 Furthermore the server won't be able any longer to reboot - it would hang infinitely in the reboot phase. Just the magic sysrq keys still works then. Steps to reproduce at two 32 bit Gentoo Linux user mode linux images: 1. prepare the server : mkdir /mnt/ramdisk/victims dd if=/dev/zero of=/mnt/ramdisk/disk1 bs=1M count=257 2>/dev/null yes | mkfs.ext4 -q /mnt/ramdisk/disk1 1>/dev/null mount -o loop /mnt/ramdisk/disk1 /mnt/ramdisk/victims chmod 777 /mnt/ramdisk/victims /etc/init.d/nfs restart 2. prepare the client mount the NFS share onto the local mount point /mnt/ramdisk/victims/ with NFSv4 3. run the fuzzy tool trinity at the client: while [[ : ]]; do <(re-)create and fill /mnt/ramdisk/victims/v1/v2 with 100 empty files and 100 empty directories> trinity -V /mnt/ramdisk/victims/v1/v2 -C 1 -N 10000 -q sleep 3 done 4. after 15 min kill the user mode linux client with -9 5. now run at the server umount /mnt/ramdisk/victims || /etc/init.d/nfs restart && umount /mnt/ramdisk/victims && echo ' no issue so far' You might need this patch too from Oleg Nesterov (not in mainline currently) . --- x/kernel/exit.c +++ x/kernel/exit.c @@ -783,8 +783,8 @@ void do_exit(long code) exit_shm(tsk); exit_files(tsk); exit_fs(tsk); - exit_task_namespaces(tsk); exit_task_work(tsk); + exit_task_namespaces(tsk); check_stack_usage(); exit_thread(); -- MfG/Sincerely Toralf Förster pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1V8SGh-00044B-OX for user-mode-linux-devel@lists.sourceforge.net; Sun, 11 Aug 2013 09:48:59 +0000 Received: from mout-xforward.gmx.net ([82.165.159.13]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:AES128-SHA:128) (Exim 4.76) id 1V8SGg-0007W6-4S for user-mode-linux-devel@lists.sourceforge.net; Sun, 11 Aug 2013 09:48:59 +0000 Received: from [92.224.126.156] ([92.224.126.156]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0LmrUq-1VnGCk3krc-00h4Gt for ; Sun, 11 Aug 2013 11:48:51 +0200 Message-ID: <52075E01.7030506@gmx.de> Date: Sun, 11 Aug 2013 11:48:49 +0200 From: =?UTF-8?B?VG9yYWxmIEbDtnJzdGVy?= MIME-Version: 1.0 List-Id: The user-mode Linux development list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: user-mode-linux-devel-bounces@lists.sourceforge.net Subject: [uml-devel] Issues with a rather unusual configured NFS server To: Linux NFS mailing list Cc: linux-ext4@vger.kernel.org, Linux Kernel , "user-mode-linux-devel@lists.sourceforge.net" c28gdGhhdCB0aGUgc2VydmVyIGVpdGhlciBjcmFzaGVzIChpZiBpdCBpcyBhIHVzZXIgbW9kZSBs aW51eCBpbWFnZSkgb3IgYXQgbGVhc3QgaXRzIHJlYm9vdCBmdW5jdGlvbmFsaXR5IGdvdCBicm9r ZW4KLSBpZiB0aGUgTkZTIHNlcnZlciBpcyBoYW1tZXJlZCB3aXRoIHNjYXJ5IE5GUyBjYWxscyB1 c2luZyBhIGZ1enp5IHRvb2wgcnVubmluZyBhdCBhIHJlbW90ZSBORlMgY2xpZW50IHVuZGVyIGEg bm9uLXByaXZpbGVnZWQgdXNlciBpZC4KCkl0IGNhbiByZSByZXByb2R1Y2VkLCBpZgoJLSB0aGUg TkZTIHNoYXJlIGlzIGFuIEVYVDMgb3IgRVhUNCBkaXJlY3RvcnkKCS0gYW5kIGl0IGlzIGNyZWF0 ZWQgYXQgZmlsZSBsb2NhdGVkIGF0IHRlbXBmcyBhbmQgbW91bnRlZCB2aWEgbG9vcCBkZXZpY2UK CS0gYW5kIHRoZSBORlMgc2VydmVyIGlzIGZvcmNlZCB0byB1bW91bnQgdGhlIE5GUyBzaGFyZQoJ LSBhbmQgdGhlIHNlcnZlciBmb3JjZWQgdG8gcmVzdGFydCB0aGUgTlNGIHNlcnZpY2UgYWZ0ZXJ3 YXJkcwoJLSBhbmQgdHJpbml0eSBpcyB1c2VkCgpJIGNvdWxkIGZpbmQgYSBzY2VuYXJpbyBmb3Ig YW4gYXV0b21hdGVkIGJpc2VjdC4gMiB0aW1lcyBpdCBicm91Z2h0IHRoaXMgY29tbWl0IApjb21t aXQgNjhhMzM5NjE3OGU2Njg4YWQ3MzY3MjAyY2RmMGFmOGVkMDNjODcyNwpBdXRob3I6IEouIEJy dWNlIEZpZWxkcyA8YmZpZWxkc0ByZWRoYXQuY29tPgpEYXRlOiAgIFRodSBNYXIgMjEgMTE6MjE6 NTAgMjAxMyAtMDQwMAoKICAgIG5mc2Q0OiBzaHV0IGRvd24gbW9yZSBvZiBkZWxlZ2F0aW9uIGVh cmxpZXIKCgp0byBiZSB0aGUgb25lIGFmdGVyIHdoaWNoIHRoZSB1c2VyIG1vZGUgbGludXggc2Vy dmVyIGNyYXNoZXMgd2l0aCBhIGJhY2sgdHJhY2UgbGlrZSB0aGlzOgoKCiQgY2F0IC9tbnQvcmFt ZGlzay9idC52My4xMS1yYzQtMTcyLWc4YWUzZjFkCltOZXcgTFdQIDE0MDI1XQpDb3JlIHdhcyBn ZW5lcmF0ZWQgYnkgYC9ob21lL3Rmb2Vyc3RlL2RldmVsL2xpbnV4L2xpbnV4IGVhcmx5cHJpbnRr IHViZGE9L2hvbWUvdGZvZXJzdGUvdmlydHVhbC91bWwvdHInLgpQcm9ncmFtIHRlcm1pbmF0ZWQg d2l0aCBzaWduYWwgNiwgQWJvcnRlZC4KIzAgIDB4Yjc3ZWY0MjQgaW4gX19rZXJuZWxfdnN5c2Nh bGwgKCkKIzAgIDB4Yjc3ZWY0MjQgaW4gX19rZXJuZWxfdnN5c2NhbGwgKCkKIzEgIDB4MDgzYTMz YzUgaW4ga2lsbCAoKQojMiAgMHgwODA3MTYzZCBpbiB1bWxfYWJvcnQgKCkgYXQgYXJjaC91bS9v cy1MaW51eC91dGlsLmM6OTMKIzMgIDB4MDgwNzE5MjUgaW4gb3NfZHVtcF9jb3JlICgpIGF0IGFy Y2gvdW0vb3MtTGludXgvdXRpbC5jOjEzOAojNCAgMHgwODA2MTNhNyBpbiBwYW5pY19leGl0IChz ZWxmPTB4ODVhMTUxOCA8cGFuaWNfZXhpdF9ub3RpZmllcj4sIHVudXNlZDE9MCwgdW51c2VkMj0w eDg1ZDZjZTAgPGJ1Zi4xNTkwND4pIGF0IGFyY2gvdW0va2VybmVsL3VtX2FyY2guYzoyNDAKIzUg IDB4MDgwOWEzYjggaW4gbm90aWZpZXJfY2FsbF9jaGFpbiAobmw9MHgwLCB2YWw9MCwgdj0weDg1 ZDZjZTAgPGJ1Zi4xNTkwND4sIG5yX3RvX2NhbGw9LTIsIG5yX2NhbGxzPTB4MCkgYXQga2VybmVs L25vdGlmaWVyLmM6OTMKIzYgIDB4MDgwOWE1MDMgaW4gX19hdG9taWNfbm90aWZpZXJfY2FsbF9j aGFpbiAobnJfY2FsbHM9PG9wdGltaXplZCBvdXQ+LCBucl90b19jYWxsPTxvcHRpbWl6ZWQgb3V0 Piwgdj08b3B0aW1pemVkIG91dD4sIHZhbD08b3B0aW1pemVkIG91dD4sIG5oPTxvcHRpbWl6ZWQg b3V0PikgYXQga2VybmVsL25vdGlmaWVyLmM6MTgyCiM3ICBhdG9taWNfbm90aWZpZXJfY2FsbF9j aGFpbiAobmg9MHg4NWQ2Y2M0IDxwYW5pY19ub3RpZmllcl9saXN0PiwgdmFsPTAsIHY9MHg4NWQ2 Y2UwIDxidWYuMTU5MDQ+KSBhdCBrZXJuZWwvbm90aWZpZXIuYzoxOTEKIzggIDB4MDg0MDBiYTgg aW4gcGFuaWMgKGZtdD0weDApIGF0IGtlcm5lbC9wYW5pYy5jOjEyOAojOSAgMHgwODE4ZWRmNCBp biBleHQ0X3B1dF9zdXBlciAoc2I9MHg0YTA0MjY5MCkgYXQgZnMvZXh0NC9zdXBlci5jOjgxOAoj MTAgMHgwODEwMTBkMiBpbiBnZW5lcmljX3NodXRkb3duX3N1cGVyIChzYj0weDRhMDQyNjkwKSBh dCBmcy9zdXBlci5jOjQxOAojMTEgMHgwODEwMjA5YSBpbiBraWxsX2Jsb2NrX3N1cGVyIChzYj0w eDApIGF0IGZzL3N1cGVyLmM6MTAyOAojMTIgMHgwODEwMGY2YSBpbiBkZWFjdGl2YXRlX2xvY2tl ZF9zdXBlciAocz0weDRhMDQyNjkwKSBhdCBmcy9zdXBlci5jOjI5OQojMTMgMHgwODEwMTAwMSBp biBkZWFjdGl2YXRlX3N1cGVyIChzPTB4NGEwNDI2OTApIGF0IGZzL3N1cGVyLmM6MzI0CiMxNCAw eDA4MTE4ZTBjIGluIG1udGZyZWUgKG1udD08b3B0aW1pemVkIG91dD4pIGF0IGZzL25hbWVzcGFj ZS5jOjg5MQojMTUgbW50cHV0X25vX2V4cGlyZSAobW50PTB4MCkgYXQgZnMvbmFtZXNwYWNlLmM6 OTI5CiMxNiAweDA4MTFhMmY1IGluIFNZU0NfdW1vdW50IChmbGFncz08b3B0aW1pemVkIG91dD4s IG5hbWU9PG9wdGltaXplZCBvdXQ+KSBhdCBmcy9uYW1lc3BhY2UuYzoxMzM1CiMxNyBTeVNfdW1v dW50IChuYW1lPTEzNDU0MTYzMiwgZmxhZ3M9MCkgYXQgZnMvbmFtZXNwYWNlLmM6MTMwNQojMTgg MHgwODExYTM2OSBpbiBTWVNDX29sZHVtb3VudCAobmFtZT08b3B0aW1pemVkIG91dD4pIGF0IGZz L25hbWVzcGFjZS5jOjEzNDcKIzE5IFN5U19vbGR1bW91bnQgKG5hbWU9MTM0NTQxNjMyKSBhdCBm cy9uYW1lc3BhY2UuYzoxMzQ1CiMyMCAweDA4MDYxOGUyIGluIGhhbmRsZV9zeXNjYWxsIChyPTB4 NDllOTE5ZDQpIGF0IGFyY2gvdW0va2VybmVsL3NrYXMvc3lzY2FsbC5jOjM1CiMyMSAweDA4MDcz YzBkIGluIGhhbmRsZV90cmFwIChsb2NhbF91c2luZ19zeXNlbXU9PG9wdGltaXplZCBvdXQ+LCBy ZWdzPTxvcHRpbWl6ZWQgb3V0PiwgcGlkPTxvcHRpbWl6ZWQgb3V0PikgYXQgYXJjaC91bS9vcy1M aW51eC9za2FzL3Byb2Nlc3MuYzoxOTgKIzIyIHVzZXJzcGFjZSAocmVncz0weDQ5ZTkxOWQ0KSBh dCBhcmNoL3VtL29zLUxpbnV4L3NrYXMvcHJvY2Vzcy5jOjQzMQojMjMgMHgwODA1ZTY1YyBpbiBm b3JrX2hhbmRsZXIgKCkgYXQgYXJjaC91bS9rZXJuZWwvcHJvY2Vzcy5jOjE2MAojMjQgMHgwMDAw MDAwMCBpbiA/PyAoKQoKCgpBIHJlYWwgc3lzdGVtIGhvd2V2ZXIgd291bGQgbm90IGNyYXNoIGJ1 ZyB3b3VsZCBnaXZlIGEga2VybmVsIEJVRyBhcyByZXBvcnRlZCBoZXJlOgpodHRwOi8vYXJ0aWNs ZS5nbWFuZS5vcmcvZ21hbmUuY29tcC5maWxlLXN5c3RlbXMuZXh0NC8zODkxNQpGdXJ0aGVybW9y ZSB0aGUgc2VydmVyIHdvbid0IGJlIGFibGUgYW55IGxvbmdlciB0byByZWJvb3QgLSBpdCB3b3Vs ZCBoYW5nIGluZmluaXRlbHkgaW4gdGhlIHJlYm9vdCBwaGFzZS4KSnVzdCB0aGUgbWFnaWMgc3lz cnEga2V5cyBzdGlsbCB3b3JrcyB0aGVuLgoKCgpTdGVwcyB0byByZXByb2R1Y2UgYXQgdHdvIDMy IGJpdCBHZW50b28gTGludXggdXNlciBtb2RlIGxpbnV4IGltYWdlczoKCjEuIHByZXBhcmUgdGhl IHNlcnZlciA6Cgk8bW91bnQgYSB0ZW1wZnMgb250byAvbW50L3JhbWRpc2s+Cglta2RpciAvbW50 L3JhbWRpc2svdmljdGltcwoJZGQgaWY9L2Rldi96ZXJvIG9mPS9tbnQvcmFtZGlzay9kaXNrMSBi cz0xTSBjb3VudD0yNTcgMj4vZGV2L251bGwKCXllcyB8IG1rZnMuZXh0NCAtcSAvbW50L3JhbWRp c2svZGlzazEgMT4vZGV2L251bGwKCW1vdW50IC1vIGxvb3AgL21udC9yYW1kaXNrL2Rpc2sxIC9t bnQvcmFtZGlzay92aWN0aW1zCgljaG1vZCA3NzcgL21udC9yYW1kaXNrL3ZpY3RpbXMKCS9ldGMv aW5pdC5kL25mcyByZXN0YXJ0CgoyLiBwcmVwYXJlIHRoZSBjbGllbnQKCW1vdW50IHRoZSBORlMg c2hhcmUgb250byB0aGUgbG9jYWwgbW91bnQgcG9pbnQgL21udC9yYW1kaXNrL3ZpY3RpbXMvIHdp dGggTkZTdjQKCQozLiBydW4gdGhlIGZ1enp5IHRvb2wgdHJpbml0eSBhdCB0aGUgY2xpZW50OgoJ d2hpbGUgW1sgOiBdXTsgZG8KCQk8KHJlLSljcmVhdGUgYW5kIGZpbGwgL21udC9yYW1kaXNrL3Zp Y3RpbXMvdjEvdjIgd2l0aCAxMDAgZW1wdHkgZmlsZXMgYW5kIDEwMCBlbXB0eSBkaXJlY3Rvcmll cz4KCQl0cmluaXR5IC1WIC9tbnQvcmFtZGlzay92aWN0aW1zL3YxL3YyIC1DIDEgLU4gMTAwMDAg LXEKCQlzbGVlcCAzCglkb25lCgo0LiBhZnRlciAxNSBtaW4ga2lsbCB0aGUgdXNlciBtb2RlIGxp bnV4IGNsaWVudCB3aXRoIC05Cgo1LiBub3cgcnVuIGF0IHRoZSBzZXJ2ZXIKCXVtb3VudCAvbW50 L3JhbWRpc2svdmljdGltcyB8fCAvZXRjL2luaXQuZC9uZnMgcmVzdGFydCAmJiB1bW91bnQgL21u dC9yYW1kaXNrL3ZpY3RpbXMgJiYgZWNobyAnIG5vIGlzc3VlIHNvIGZhcicKCgpZb3UgbWlnaHQg bmVlZCB0aGlzIHBhdGNoIHRvbyBmcm9tIE9sZWcgTmVzdGVyb3YgPG9sZWdAcmVkaGF0LmNvbT4g KG5vdCBpbiBtYWlubGluZSBjdXJyZW50bHkpIC4KCi0tLSB4L2tlcm5lbC9leGl0LmMKKysrIHgv a2VybmVsL2V4aXQuYwpAQCAtNzgzLDggKzc4Myw4IEBAIHZvaWQgZG9fZXhpdChsb25nIGNvZGUp CiAgICAgICAgZXhpdF9zaG0odHNrKTsKICAgICAgICBleGl0X2ZpbGVzKHRzayk7CiAgICAgICAg ZXhpdF9mcyh0c2spOwotICAgICAgIGV4aXRfdGFza19uYW1lc3BhY2VzKHRzayk7CiAgICAgICAg ZXhpdF90YXNrX3dvcmsodHNrKTsKKyAgICAgICBleGl0X3Rhc2tfbmFtZXNwYWNlcyh0c2spOwog ICAgICAgIGNoZWNrX3N0YWNrX3VzYWdlKCk7CiAgICAgICAgZXhpdF90aHJlYWQoKTsKCgotLSAK TWZHL1NpbmNlcmVseQpUb3JhbGYgRsO2cnN0ZXIKcGdwIGZpbmdlciBwcmludDogN0IxQSAwN0Y0 IEVDODIgMEY5MCBENEMyIDg5MzYgODcyQSBFNTA4IDdEQjYgOURBMwoKLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tCkdldCAxMDAlIHZpc2liaWxpdHkgaW50byBKYXZhLy5ORVQgY29kZSB3aXRoIEFwcER5 bmFtaWNzIExpdGUhCkl0J3MgYSBmcmVlIHRyb3VibGVzaG9vdGluZyB0b29sIGRlc2lnbmVkIGZv ciBwcm9kdWN0aW9uLgpHZXQgZG93biB0byBjb2RlLWxldmVsIGRldGFpbCBmb3IgYm90dGxlbmVj a3MsIHdpdGggPDIlIG92ZXJoZWFkLiAKRG93bmxvYWQgZm9yIGZyZWUgYW5kIGdldCBzdGFydGVk IHRyb3VibGVzaG9vdGluZyBpbiBtaW51dGVzLiAKaHR0cDovL3B1YmFkcy5nLmRvdWJsZWNsaWNr Lm5ldC9nYW1wYWQvY2xrP2lkPTQ4ODk3MDMxJml1PS80MTQwL29zdGcuY2xrdHJrCl9fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fClVzZXItbW9kZS1saW51eC1k ZXZlbCBtYWlsaW5nIGxpc3QKVXNlci1tb2RlLWxpbnV4LWRldmVsQGxpc3RzLnNvdXJjZWZvcmdl Lm5ldApodHRwczovL2xpc3RzLnNvdXJjZWZvcmdlLm5ldC9saXN0cy9saXN0aW5mby91c2VyLW1v ZGUtbGludXgtZGV2ZWwK