From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from out-177.mta0.migadu.com (out-177.mta0.migadu.com [91.218.175.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B18EC2AE7C for ; Wed, 29 Jan 2025 02:08:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.177 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738116487; cv=none; b=Oy0hNAOFM2noOcts+SOHAtikuGz+m7TA6ZVADFSTDSI2YJZu+hOqyi5G3GBKfCtBr3nlRvaAEofuyXzK5BKfRuZ+DE6na7J9Lkj0+6ki1hPOqbrzYegVS2BiKW9YwxnKS78zUeXj4GRUPn1+n1dcCBHlJyKD94/E/No6/MpzaSA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738116487; c=relaxed/simple; bh=TnoiYQPHEkMogIv/c06URwtZAs4Gs+dd5/MwQl3rCHo=; h=MIME-Version:Date:Content-Type:From:Message-ID:Subject:To:Cc: In-Reply-To:References; b=j2T5d2Pr7zSBuSDXkvwEX07KqT8NsyH8F26TgmqVT1KByYgSXotZIXJ6ML/rlFTlrtcyDHngG0/6nzjV52sDDshk2dQLn1epIZ1f1RooZD2XKTbpN7Y06mSJofDxC2zv+qxITnY4IZ4uv9SOHtZeZxwYdTt5iX3Tse9Hh8fufrE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=AnTFkeq3; arc=none smtp.client-ip=91.218.175.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="AnTFkeq3" Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1738116467; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=vxFwu5R7sxps9teXeOqSJ8ZpqQ5AyDlKfsho2IFEN1o=; b=AnTFkeq3b6TXFV6Ogt+Be6Mxklk3mFNdKxoBTZMKGjv6z+kBP4niiHFyeIBStgFb7sVpbT oOwaxOX7a5wNxuuCCkE6tjzYZd1dMMsCcTK6c3H9dcSb7ufLnFXhrKmmT5fk/ewLKEaj5v 1cVaY9C0o3MvHlI9WMsie9posK2fu+M= Date: Wed, 29 Jan 2025 02:07:45 +0000 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: "Ihor Solodrai" Message-ID: TLS-Required: No Subject: Re: [PATCH bpf-next v1 7/8] selftests/bpf: Add selftests for load-acquire and store-release instructions To: "Eduard Zingerman" , "Peilin Ye" , bpf@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: bpf@ietf.org, "Xu Kuohai" , "David Vernet" , "Alexei Starovoitov" , "Daniel Borkmann" , "Andrii Nakryiko" , "Martin KaFai Lau" , "Song Liu" , "Yonghong Song" , "John Fastabend" , "KP Singh" , "Stanislav Fomichev" , "Hao Luo" , "Jiri Olsa" , "Jonathan Corbet" , "Paul E. McKenney" , "Puranjay Mohan" , "Catalin Marinas" , "Will Deacon" , "Quentin Monnet" , "Mykola Lysenko" , "Shuah Khan" , "Josh Don" , "Barret Rhoden" , "Neel Natu" , "Benjamin Segall" , linux-kernel@vger.kernel.org In-Reply-To: <131a817f7f2749e78e527a251ca7971588cf62f8.camel@gmail.com> References: <3f2de7c6e5d2def7bdfb091347c1dacea0915974.1737763916.git.yepeilin@google.com> <131a817f7f2749e78e527a251ca7971588cf62f8.camel@gmail.com> X-Migadu-Flow: FLOW_OUT January 28, 2025 at 5:06 PM, "Eduard Zingerman" wrote= : >=20 >=20On Sat, 2025-01-25 at 02:19 +0000, Peilin Ye wrote: >=20 >=20>=20 >=20> Add several ./test_progs tests: > >=20 >=20>=20=20 >=20>=20 >=20> - atomics/load_acquire > >=20 >=20> - atomics/store_release > >=20 >=20> - arena_atomics/load_acquire > >=20 >=20> - arena_atomics/store_release > >=20 >=20> - verifier_load_acquire/* > >=20 >=20> - verifier_store_release/* > >=20 >=20> - verifier_precision/bpf_load_acquire > >=20 >=20> - verifier_precision/bpf_store_release > >=20 >=20>=20=20 >=20>=20 >=20> The last two tests are added to check if backtrack_insn() handles = the > >=20 >=20> new instructions correctly. > >=20 >=20>=20=20 >=20>=20 >=20> Additionally, the last test also makes sure that the verifier > >=20 >=20> "remembers" the value (in src_reg) we store-release into e.g. a st= ack > >=20 >=20> slot. For example, if we take a look at the test program: > >=20 >=20>=20=20 >=20>=20 >=20> #0: "r1 =3D 8;" > >=20 >=20> #1: "store_release((u64 *)(r10 - 8), r1);" > >=20 >=20> #2: "r1 =3D *(u64 *)(r10 - 8);" > >=20 >=20> #3: "r2 =3D r10;" > >=20 >=20> #4: "r2 +=3D r1;" /* mark_precise */ > >=20 >=20> #5: "r0 =3D 0;" > >=20 >=20> #6: "exit;" > >=20 >=20>=20=20 >=20>=20 >=20> At #1, if the verifier doesn't remember that we wrote 8 to the sta= ck, > >=20 >=20> then later at #4 we would be adding an unbounded scalar value to t= he > >=20 >=20> stack pointer, which would cause the program to be rejected: > >=20 >=20>=20=20 >=20>=20 >=20> VERIFIER LOG: > >=20 >=20> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >=20 >=20> ... > >=20 >=20> math between fp pointer and register with unbounded min value is n= ot allowed > >=20 >=20>=20=20 >=20>=20 >=20> All new tests depend on the pre-defined __BPF_FEATURE_LOAD_ACQ_STO= RE_REL > >=20 >=20> feature macro, which implies -mcpu>=3Dv4. > >=20 >=20 > This restriction would mean that tests are skipped on BPF CI, as it >=20 >=20currently runs using llvm 17 and 18. Instead, I suggest using some Eduard, if this feature requires a particular version of LLVM, it's not difficult to add a configuration for it to BPF CI. Whether we want to do it is an open question though. Issues may come up with other tests when newer LLVM is used. >=20 >=20macro hiding an inline assembly as below: >=20 >=20 asm volatile (".8byte %[insn];" >=20 >=20 : >=20 >=20 : [insn]"i"(*(long *)&(BPF_RAW_INSN(...))) >=20 >=20 : /* correct clobbers here */); >=20 >=20See the usage of the __imm_insn() macro in the test suite. >=20 >=20Also, "BPF_ATOMIC loads from R%d %s is not allowed\n" and >=20 >=20 "BPF_ATOMIC stores into R%d %s is not allowed\n" >=20 >=20situations are not tested. >=20 >=20[...] >=20 >=20>=20 >=20 > [...] > From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.ietf.org (mail.ietf.org [50.223.129.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C8A1B18C31 for ; Wed, 29 Jan 2025 02:15:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=50.223.129.194 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738116957; cv=none; b=r6vdv08VKZrZvq4k8XnAEs8LzhNX0A3bLj7GPFRTqQBCHBFvLJRBoszIHpDfR3gf8L/jQz1dsG1kdZmZhaysRX0nQctkJSRWVtQp/thXGCGNo/cwz7hpLUEcTiT0v+iUqKTTJdjQ6TFJkWiC5ob49MnfLIcNxBi1gSEx9o1m8k8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738116957; c=relaxed/simple; bh=JfjE4Nuzc0ERvp7gWZd4mPNRIZrTOOONHFk2jNBOekM=; h=MIME-Version:Date:Content-Type:From:Message-ID:To:In-Reply-To: References:CC:Subject; b=t2Iukv5kLLc+j/A531lYJJVbjpZtwzF8VgT9YNxqKo55nIS6CWLks3yNXreJq4DjbwLq0A33BFdur5FCxCwhe+D16CL9+qJmSNmpKgsUy5eQA/KihoGcDugYHHrS1wbG5MQ8aGQXJO9CyIq/terif3BLTQiSsaDq6j+r7M/0aTI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=ietf.org; dkim=pass (1024-bit key) header.d=ietf.org header.i=@ietf.org header.b=cemsClvi; dkim=pass (1024-bit key) header.d=ietf.org header.i=@ietf.org header.b=cemsClvi; dkim=fail (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=AnTFkeq3 reason="signature verification failed"; arc=none smtp.client-ip=50.223.129.194 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=ietf.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=ietf.org header.i=@ietf.org header.b="cemsClvi"; dkim=pass (1024-bit key) header.d=ietf.org header.i=@ietf.org header.b="cemsClvi"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="AnTFkeq3" Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C012C1D6FCC for ; Tue, 28 Jan 2025 18:09:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1738116592; bh=JfjE4Nuzc0ERvp7gWZd4mPNRIZrTOOONHFk2jNBOekM=; h=Date:From:To:In-Reply-To:References:CC:Subject:List-Id: List-Archive:List-Help:List-Owner:List-Post:List-Subscribe: List-Unsubscribe; b=cemsClviN7/kasX0i5XSI4zv5aZghXrkyJIX091vy1zH0u4RSL3V7pYIPgy1H1FJD FoiBFh/ZtQI+9wmB3jvpZ/TgmdusmJXzKgQ4OjqDTVKX/hgDsNlYlcd4141XbZSQjB F/oreOx1618On7C31pumReW+5t8Cjxp0r1TZig9k= X-Mailbox-Line: From bpf-bounces+bpf=vger.kernel.org@ietf.org Tue Jan 28 18:09:52 2025 Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 31C4EC1D6219 for ; Tue, 28 Jan 2025 18:09:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1738116592; bh=JfjE4Nuzc0ERvp7gWZd4mPNRIZrTOOONHFk2jNBOekM=; h=Date:From:To:In-Reply-To:References:CC:Subject:List-Id: List-Archive:List-Help:List-Owner:List-Post:List-Subscribe: List-Unsubscribe; b=cemsClviN7/kasX0i5XSI4zv5aZghXrkyJIX091vy1zH0u4RSL3V7pYIPgy1H1FJD FoiBFh/ZtQI+9wmB3jvpZ/TgmdusmJXzKgQ4OjqDTVKX/hgDsNlYlcd4141XbZSQjB F/oreOx1618On7C31pumReW+5t8Cjxp0r1TZig9k= Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F76CC16940B for ; Tue, 28 Jan 2025 18:07:59 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.104 X-Spam-Level: Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=linux.dev Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mpeOWYJQOAJE for ; Tue, 28 Jan 2025 18:07:54 -0800 (PST) Received: from out-186.mta0.migadu.com (out-186.mta0.migadu.com [91.218.175.186]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A401DC1840EA for ; Tue, 28 Jan 2025 18:07:53 -0800 (PST) Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1738116467; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=vxFwu5R7sxps9teXeOqSJ8ZpqQ5AyDlKfsho2IFEN1o=; b=AnTFkeq3b6TXFV6Ogt+Be6Mxklk3mFNdKxoBTZMKGjv6z+kBP4niiHFyeIBStgFb7sVpbT oOwaxOX7a5wNxuuCCkE6tjzYZd1dMMsCcTK6c3H9dcSb7ufLnFXhrKmmT5fk/ewLKEaj5v 1cVaY9C0o3MvHlI9WMsie9posK2fu+M= Date: Wed, 29 Jan 2025 02:07:45 +0000 Content-Type: text/plain; charset="utf-8" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: "Ihor Solodrai" Message-ID: TLS-Required: No To: "Eduard Zingerman" , "Peilin Ye" , bpf@vger.kernel.org, linux-arm-kernel@lists.infradead.org In-Reply-To: <131a817f7f2749e78e527a251ca7971588cf62f8.camel@gmail.com> References: <3f2de7c6e5d2def7bdfb091347c1dacea0915974.1737763916.git.yepeilin@google.com> <131a817f7f2749e78e527a251ca7971588cf62f8.camel@gmail.com> X-Migadu-Flow: FLOW_OUT Message-ID-Hash: K7OY6ONTQJFWARVQOA4HZL7FWQRQ2QCE X-Message-ID-Hash: K7OY6ONTQJFWARVQOA4HZL7FWQRQ2QCE X-MailFrom: ihor.solodrai@linux.dev X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: bpf@ietf.org, Xu Kuohai , David Vernet , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Jonathan Corbet , "Paul E. McKenney" , Puranjay Mohan , Catalin Marinas , Will Deacon , Quentin Monnet , Mykola Lysenko , Shuah Khan , Josh Don , Barret Rhoden , Neel Natu , Benjamin Segall , linux-kernel@vger.kernel.org X-Mailman-Version: 3.3.9rc6 Precedence: list Subject: =?utf-8?q?=5BBpf=5D_Re=3A_=5BPATCH_bpf-next_v1_7/8=5D_selftests/bpf=3A_Add_s?= =?utf-8?q?elftests_for_load-acquire_and_store-release_instructions?= Archived-At: List-Archive: List-Help: List-Owner: List-Post: X-Mailman-Copy: yes Content-Transfer-Encoding: base64 Message-ID: <20250129020745.PbFlK7QOfQPfAxMuIfpvWJiz1T87u73F0iRRAC6smZ8@z> SmFudWFyeSAyOCwgMjAyNSBhdCA1OjA2IFBNLCAiRWR1YXJkIFppbmdlcm1hbiIgPGVkZHl6ODdA Z21haWwuY29tPiB3cm90ZToNCg0KDQoNCj4gDQo+IE9uIFNhdCwgMjAyNS0wMS0yNSBhdCAwMjox OSArMDAwMCwgUGVpbGluIFllIHdyb3RlOg0KPiANCj4gPiANCj4gPiBBZGQgc2V2ZXJhbCAuL3Rl c3RfcHJvZ3MgdGVzdHM6DQo+ID4gDQo+ID4gIA0KPiA+IA0KPiA+ICAtIGF0b21pY3MvbG9hZF9h Y3F1aXJlDQo+ID4gDQo+ID4gIC0gYXRvbWljcy9zdG9yZV9yZWxlYXNlDQo+ID4gDQo+ID4gIC0g YXJlbmFfYXRvbWljcy9sb2FkX2FjcXVpcmUNCj4gPiANCj4gPiAgLSBhcmVuYV9hdG9taWNzL3N0 b3JlX3JlbGVhc2UNCj4gPiANCj4gPiAgLSB2ZXJpZmllcl9sb2FkX2FjcXVpcmUvKg0KPiA+IA0K PiA+ICAtIHZlcmlmaWVyX3N0b3JlX3JlbGVhc2UvKg0KPiA+IA0KPiA+ICAtIHZlcmlmaWVyX3By ZWNpc2lvbi9icGZfbG9hZF9hY3F1aXJlDQo+ID4gDQo+ID4gIC0gdmVyaWZpZXJfcHJlY2lzaW9u L2JwZl9zdG9yZV9yZWxlYXNlDQo+ID4gDQo+ID4gIA0KPiA+IA0KPiA+ICBUaGUgbGFzdCB0d28g dGVzdHMgYXJlIGFkZGVkIHRvIGNoZWNrIGlmIGJhY2t0cmFja19pbnNuKCkgaGFuZGxlcyB0aGUN Cj4gPiANCj4gPiAgbmV3IGluc3RydWN0aW9ucyBjb3JyZWN0bHkuDQo+ID4gDQo+ID4gIA0KPiA+ IA0KPiA+ICBBZGRpdGlvbmFsbHksIHRoZSBsYXN0IHRlc3QgYWxzbyBtYWtlcyBzdXJlIHRoYXQg dGhlIHZlcmlmaWVyDQo+ID4gDQo+ID4gICJyZW1lbWJlcnMiIHRoZSB2YWx1ZSAoaW4gc3JjX3Jl Zykgd2Ugc3RvcmUtcmVsZWFzZSBpbnRvIGUuZy4gYSBzdGFjaw0KPiA+IA0KPiA+ICBzbG90LiBG b3IgZXhhbXBsZSwgaWYgd2UgdGFrZSBhIGxvb2sgYXQgdGhlIHRlc3QgcHJvZ3JhbToNCj4gPiAN Cj4gPiAgDQo+ID4gDQo+ID4gICMwOiAicjEgPSA4OyINCj4gPiANCj4gPiAgIzE6ICJzdG9yZV9y ZWxlYXNlKCh1NjQgKikocjEwIC0gOCksIHIxKTsiDQo+ID4gDQo+ID4gICMyOiAicjEgPSAqKHU2 NCAqKShyMTAgLSA4KTsiDQo+ID4gDQo+ID4gICMzOiAicjIgPSByMTA7Ig0KPiA+IA0KPiA+ICAj NDogInIyICs9IHIxOyIgLyogbWFya19wcmVjaXNlICovDQo+ID4gDQo+ID4gICM1OiAicjAgPSAw OyINCj4gPiANCj4gPiAgIzY6ICJleGl0OyINCj4gPiANCj4gPiAgDQo+ID4gDQo+ID4gIEF0ICMx LCBpZiB0aGUgdmVyaWZpZXIgZG9lc24ndCByZW1lbWJlciB0aGF0IHdlIHdyb3RlIDggdG8gdGhl IHN0YWNrLA0KPiA+IA0KPiA+ICB0aGVuIGxhdGVyIGF0ICM0IHdlIHdvdWxkIGJlIGFkZGluZyBh biB1bmJvdW5kZWQgc2NhbGFyIHZhbHVlIHRvIHRoZQ0KPiA+IA0KPiA+ICBzdGFjayBwb2ludGVy LCB3aGljaCB3b3VsZCBjYXVzZSB0aGUgcHJvZ3JhbSB0byBiZSByZWplY3RlZDoNCj4gPiANCj4g PiAgDQo+ID4gDQo+ID4gIFZFUklGSUVSIExPRzoNCj4gPiANCj4gPiAgPT09PT09PT09PT09PQ0K PiA+IA0KPiA+ICAuLi4NCj4gPiANCj4gPiAgbWF0aCBiZXR3ZWVuIGZwIHBvaW50ZXIgYW5kIHJl Z2lzdGVyIHdpdGggdW5ib3VuZGVkIG1pbiB2YWx1ZSBpcyBub3QgYWxsb3dlZA0KPiA+IA0KPiA+ ICANCj4gPiANCj4gPiAgQWxsIG5ldyB0ZXN0cyBkZXBlbmQgb24gdGhlIHByZS1kZWZpbmVkIF9f QlBGX0ZFQVRVUkVfTE9BRF9BQ1FfU1RPUkVfUkVMDQo+ID4gDQo+ID4gIGZlYXR1cmUgbWFjcm8s IHdoaWNoIGltcGxpZXMgLW1jcHU+PXY0Lg0KPiA+IA0KPiANCj4gVGhpcyByZXN0cmljdGlvbiB3 b3VsZCBtZWFuIHRoYXQgdGVzdHMgYXJlIHNraXBwZWQgb24gQlBGIENJLCBhcyBpdA0KPiANCj4g Y3VycmVudGx5IHJ1bnMgdXNpbmcgbGx2bSAxNyBhbmQgMTguIEluc3RlYWQsIEkgc3VnZ2VzdCB1 c2luZyBzb21lDQoNCkVkdWFyZCwgaWYgdGhpcyBmZWF0dXJlIHJlcXVpcmVzIGEgcGFydGljdWxh ciB2ZXJzaW9uIG9mIExMVk0sIGl0J3MNCm5vdCBkaWZmaWN1bHQgdG8gYWRkIGEgY29uZmlndXJh dGlvbiBmb3IgaXQgdG8gQlBGIENJLg0KDQpXaGV0aGVyIHdlIHdhbnQgdG8gZG8gaXQgaXMgYW4g b3BlbiBxdWVzdGlvbiB0aG91Z2guIElzc3VlcyBtYXkgY29tZQ0KdXAgd2l0aCBvdGhlciB0ZXN0 cyB3aGVuIG5ld2VyIExMVk0gaXMgdXNlZC4NCg0KPiANCj4gbWFjcm8gaGlkaW5nIGFuIGlubGlu ZSBhc3NlbWJseSBhcyBiZWxvdzoNCj4gDQo+ICBhc20gdm9sYXRpbGUgKCIuOGJ5dGUgJVtpbnNu XTsiDQo+IA0KPiAgOg0KPiANCj4gIDogW2luc25dImkiKCoobG9uZyAqKSYoQlBGX1JBV19JTlNO KC4uLikpKQ0KPiANCj4gIDogLyogY29ycmVjdCBjbG9iYmVycyBoZXJlICovKTsNCj4gDQo+IFNl ZSB0aGUgdXNhZ2Ugb2YgdGhlIF9faW1tX2luc24oKSBtYWNybyBpbiB0aGUgdGVzdCBzdWl0ZS4N Cj4gDQo+IEFsc28sICJCUEZfQVRPTUlDIGxvYWRzIGZyb20gUiVkICVzIGlzIG5vdCBhbGxvd2Vk XG4iIGFuZA0KPiANCj4gICJCUEZfQVRPTUlDIHN0b3JlcyBpbnRvIFIlZCAlcyBpcyBub3QgYWxs b3dlZFxuIg0KPiANCj4gc2l0dWF0aW9ucyBhcmUgbm90IHRlc3RlZC4NCj4gDQo+IFsuLi5dDQo+ IA0KPiA+IA0KPiANCj4gWy4uLl0NCj4NCg0KLS0gCkJwZiBtYWlsaW5nIGxpc3QgLS0gYnBmQGll dGYub3JnClRvIHVuc3Vic2NyaWJlIHNlbmQgYW4gZW1haWwgdG8gYnBmLWxlYXZlQGlldGYub3Jn Cg==