From e42a2908642cd38beeb116bb29a1b8409ae86169 Mon Sep 17 00:00:00 2001 From: Octavian Purdila Date: Sat, 1 Jul 2017 01:10:22 +0300 Subject: [PATCH 001/297] labs: add lab infrastructure and documentation The Linux kernel labs documentation is a collection of "labs" for various device driver topics. For each topic there are two parts: a walk-through which explain the basic concepts and a hands-on part which contains a few exercises. This commit also adds the labs infrastructure which allows us to build and test kernel modules in a qemu environment. Signed-off-by: Octavian Purdila Signed-off-by: Daniel Baluta --- Documentation/labs/conf.py | 1 + Documentation/labs/exercises-summary.hrst | 42 ++++++ Documentation/labs/exercises.rst | 82 +++++++++++ Documentation/labs/index.rst | 33 +++++ Documentation/labs/subst.hrst | 4 + Documentation/labs/vm.rst | 157 ++++++++++++++++++++++ README.rst | 1 + tools/labs/.gitignore | 7 + tools/labs/Makefile | 42 ++++++ tools/labs/qemu/Makefile | 61 +++++++++ tools/labs/qemu/create_net.sh | 37 +++++ tools/labs/qemu/kernel_config.x86 | 79 +++++++++++ tools/labs/qemu/prepare-image.sh | 28 ++++ tools/labs/qemu/qemu.sh | 21 +++ tools/labs/templates/generate_skels.py | 55 ++++++++ 15 files changed, 650 insertions(+) create mode 100644 Documentation/labs/conf.py create mode 100644 Documentation/labs/exercises-summary.hrst create mode 100644 Documentation/labs/exercises.rst create mode 100644 Documentation/labs/index.rst create mode 100644 Documentation/labs/subst.hrst create mode 100644 Documentation/labs/vm.rst create mode 120000 README.rst create mode 100644 tools/labs/.gitignore create mode 100644 tools/labs/Makefile create mode 100644 tools/labs/qemu/Makefile create mode 100755 tools/labs/qemu/create_net.sh create mode 100644 tools/labs/qemu/kernel_config.x86 create mode 100755 tools/labs/qemu/prepare-image.sh create mode 100755 tools/labs/qemu/qemu.sh create mode 100755 tools/labs/templates/generate_skels.py diff --git a/Documentation/labs/conf.py b/Documentation/labs/conf.py new file mode 100644 index 00000000000000..25a53c0b06c15c --- /dev/null +++ b/Documentation/labs/conf.py @@ -0,0 +1 @@ +rst_prolog = ".. include:: subst.hrst" diff --git a/Documentation/labs/exercises-summary.hrst b/Documentation/labs/exercises-summary.hrst new file mode 100644 index 00000000000000..0cddaa2ba90ade --- /dev/null +++ b/Documentation/labs/exercises-summary.hrst @@ -0,0 +1,42 @@ + +To solve exercises need to perform these steps: + + * prepare skeletons from templates + * build modules + * copy modules to VM + * start the VM and test the module in the VM. + +The current lab name is |LAB_NAME|. See the exercises for the task name. + +.. container:: toggle + + .. container:: header + + **See details** + + The skeleton code is generated from full source examples located in + ``tools/labs/templates``. To solve the tasks start by generating + the skeleton code: + + .. parsed-literal:: shell + + tools/labs $ make clean + tools/labs $ LABS=/ make skels + + Where task name is defined for each task. Once the skelton drivers are + generated build the source: + + .. code-block:: shell + + tools/labs $ make build + + Then copy the modules and start the VM: + + .. code-block:: shell + + tools/labs $ make copy + tools/labs $ make boot + + The modules are placed in /home/root/skels/|LAB_NAME|/. + + Review the `Exercises`_ section for more detailed information. diff --git a/Documentation/labs/exercises.rst b/Documentation/labs/exercises.rst new file mode 100644 index 00000000000000..7120efa856cc0d --- /dev/null +++ b/Documentation/labs/exercises.rst @@ -0,0 +1,82 @@ +Exercises +========= + +In order to facilitate learning each topic has a hands-on exercises +section which will contain in-depth, incremental clues on how to solve +one or multiple tasks. To focus on a particular issue most of the +tasks will be performed on existing skeleton drivers. Each skeleton +driver has clearly marked sections that needs to be filled in order to +complete the tasks. + +The skeleton drivers are generated from full source examples located +in tools/labs/templates. To solve tasks you start by generating the +skeleton drivers, running the **skels** target in *tools/labs*. To +keep the workspace clean it is recommended to generate the skeletons +for one lab only and clean the workspace before start working on a new +lab. Labs can be selecting by using the **LABS** variable: + +.. code-block:: shell + + tools/labs $ make clean + tools/labs $ LABS=kernel_modules make skels + + tools/labs $ ls skels/kernel_modules/ + 1-2-test-mod 3-error-mod 4-multi-mod 5-oops-mod 6-cmd-mod \ + 7-list-proc 8-kprobes 9-kdb + +You can also uses the same variable to generate skeletons for specific +tasks: + +.. code-block:: shell + + tools/labs $ LABS="kernel_modules/6-cmd-mod kernel_modules/8-kprobes" make skels + + tools/labs$ ls skels/kernel_modules + 6-cmd-mod 8-kprobes + + +For each task you may have multiple steps to perform, usually +incremental. These steps are marked in the code source as well as in +the lab exercises with the keyword *TODO*. If we have multiple steps +to perform they will be prefix by a number, like *TODO1*, *TODO2*, +etc. If no number is used it is assumed to be the one and only +step. If you want to resume a tasks from a certain step, you can using +the **TODO** variable. The following example will generate the +skeleton with the first *TODO* step resolved: + +.. code-block:: shell + + tools/labs $ TODO=2 LABS="kernel_modules/8-kprobes" skels + +Once the skelton drivers are generated you can build them with the +**build** make target: + +.. code-block:: shell + + tools/labs $ make build + echo "# autogenerated, do not edit " > skels/Kbuild + for i in ./kernel_modules/8-kprobes; do echo "obj-m += $i/" >> skels/Kbuild; done + make -C /home/tavi/src/linux M=/home/tavi/src/linux/tools/labs/skels ARCH=x86 modules + make[1]: Entering directory '/home/tavi/src/linux' + CC [M] /home/tavi/src/linux/tools/labs/skels/./kernel_modules/8-kprobes/kprobes.o + Building modules, stage 2. + MODPOST 1 modules + CC /home/tavi/src/linux/tools/labs/skels/./kernel_modules/8-kprobes/kprobes.mod.o + LD [M] /home/tavi/src/linux/tools/labs/skels/./kernel_modules/8-kprobes/kprobes.ko + make[1]: Leaving directory '/home/tavi/src/linux' + + +To copy the drivers to the VM you can use either use ssh or update the +VM image directly using the **copy** target: + +.. code-block:: shell + + tools/labs $ make copy + ... + 'skels/kernel_modules/8-kprobes/kprobes.ko' -> '/tmp/tmp.4UMKcISmQM/home/root/skels/kernel_modules/8-kprobes/kprobes.ko' + +.. attention:: The **copy** target will faili if the VM is + running. This is intentional so that the we avoid corrupting the + filesystem. + + diff --git a/Documentation/labs/index.rst b/Documentation/labs/index.rst new file mode 100644 index 00000000000000..9e61a8eed1af21 --- /dev/null +++ b/Documentation/labs/index.rst @@ -0,0 +1,33 @@ +Linux device driver labs +======================== + +This is a collection of "howtos" for various device driver topics. For +each topic there are two parts: + +* a walk-through the topic which contains an overview, the main + abstractions, simple examples and pointers to APIs + +* a hands-on part which contains a few exercises that should be + resolved by the student; to focus on the topic at hand, the student + is presented with a starting coding skeleton and with in-depth tips + on how to solve the exercises + +They are based on the labs of the `Operatings Systems 2 +`_ course, Computer Science +department, Faculty of Automatic Control and Computers, Politehnica +Univesity of Bucharest. + +You can get the latest version at http://github.com/linux-kernel-labs. + +To get started build the documentation from the sources: + +.. code-block:: c + + cd tools/labs && make docs + +then point your browser at **Documentation/output/labs/index.html**. + +.. toctree:: + + vm.rst + exercises.rst diff --git a/Documentation/labs/subst.hrst b/Documentation/labs/subst.hrst new file mode 100644 index 00000000000000..d0f113b1b14cd8 --- /dev/null +++ b/Documentation/labs/subst.hrst @@ -0,0 +1,4 @@ +.. |LXR| replace:: LXR +.. _LXR: http://elixir.free-electrons.com/linux/latest/source + + diff --git a/Documentation/labs/vm.rst b/Documentation/labs/vm.rst new file mode 100644 index 00000000000000..85173080854a47 --- /dev/null +++ b/Documentation/labs/vm.rst @@ -0,0 +1,157 @@ +===================== +Virtual Machine Setup +===================== + +Exercises are designed to run on a qemu based virtual machine. In +order to run the virtual machine you will need following packages: + +* build-essential +* qemu-system-x86 +* qemu-system-arm +* kvm +* python3 + +The virtual machine setup uses prebuild Yocto images that it downloads +from downloads.yocyoproject.org and a kernel image that it builds +itself. The following images are supported: + +* core-image-minimal-qemu +* core-image-minimal-dev-qemu +* core-image-sato-dev-qemu +* core-image-sato-qemu +* core-image-sato-sdk-qemu + +and can be selected from tools/labs/qemu/Makefile. + + +Starting the VM +--------------- + +The virtual machine scripts are available in tools/labs/qemeu and you +can can start the virtual machine by using the **boot** make target in +tools/labs: + +.. code-block:: shell + + ~/src/linux/tools/labs$ make boot + ARCH=x86 qemu/qemu.sh -kernel zImage.x86 -device virtio-serial \ + -chardev pty,id=virtiocon0 -device virtconsole,chardev=virtiocon0 \ + -net nic,model=virtio,vlan=0 -net tap,ifname=tap0,vlan=0,script=no,downscript=no\ + -drive file=rootfs.img,if=virtio,format=raw --append "root=/dev/vda console=hvc0" \ + --display none -s + char device redirected to /dev/pts/19 (label virtiocon0) + + +.. note:: To show the qemu console use "QEMU_DISPLAY=sdl make + boot". This will show the VGA output and will also give + access to the standard keyboard. + +Connecting to the VM +-------------------- + +Once the machine is booted you can connect to it on the serial port. A +link named *serial.pts* is created to the right emulated serial port +and you can use **minicom**, **picocom** to connect to the virtual +machine from the host: + +.. code-block:: shell + + $ minicom -D serial.pts + + Poky (Yocto Project Reference Distro) 2.3 qemux86 /dev/hvc0 + + qemux86 login: root + root@qemux86:~# + +Networking is also setup and you can use ssh to connect to the virtual +machine after finding out the allocated IP address: + +.. code-block:: shell + + $ mincom -D serial.pts + + Poky (Yocto Project Reference Distro) 2.3 qemux86 /dev/hvc0 + + qemux86 login: root + root@qemux86:~# ifconfig + eth0 Link encap:Ethernet HWaddr 52:54:00:12:34:56 + inet addr:172.20.0.6 Bcast:172.20.0.255 Mask:255.255.255.0 + UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 + RX packets:41 errors:0 dropped:0 overruns:0 frame:0 + TX packets:6 errors:0 dropped:0 overruns:0 carrier:0 + collisions:0 txqueuelen:1000 + RX bytes:7578 (7.4 KiB) TX bytes:1296 (1.2 KiB) + + lo Link encap:Local Loopback + inet addr:127.0.0.1 Mask:255.0.0.0 + inet6 addr: ::1%134535719/128 Scope:Host + UP LOOPBACK RUNNING MTU:65536 Metric:1 + RX packets:0 errors:0 dropped:0 overruns:0 frame:0 + TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 + collisions:0 txqueuelen:1000 + RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) + + $ ssh root@172.20.0.6 + The authenticity of host '172.20.0.6 (172.20.0.6)' can't be established. + RSA key fingerprint is SHA256:CW1opJUHi4LDt1lnKjBVv12kXZ4s+8rreMBm5Jsdm00. + Are you sure you want to continue connecting (yes/no)? yes + Warning: Permanently added '172.20.0.6' (RSA) to the list of known hosts. + root@qemux86:~# + +.. attention:: The Yocto core-image-minimal-qemu does not include an + SSH server, so you will not able to connect via ssh if + you are using this image. + + +Connecting a debugger to the VM kernel +-------------------------------------- + +You can connect gdb to the running VM kernel and inspect the state of +the kernel by running the *gdb* target from tools/labs: + +.. code-block :: shell + + $ make gdb + ln -fs /home/tavi/src/linux/vmlinux vmlinux + gdb -ex "target remote localhost:1234" vmlinux + GNU gdb (Ubuntu 7.11.1-0ubuntu1~16.04) 7.11.1 + Copyright (C) 2016 Free Software Foundation, Inc. + License GPLv3+: GNU GPL version 3 or later + This is free software: you are free to change and redistribute it. + There is NO WARRANTY, to the extent permitted by law. Type "show copying" + and "show warranty" for details. + This GDB was configured as "x86_64-linux-gnu". + Type "show configuration" for configuration details. + For bug reporting instructions, please see: + . + Find the GDB manual and other documentation resources online at: + . + For help, type "help". + Type "apropos word" to search for commands related to "word"... + Reading symbols from vmlinux...done. + Remote debugging using localhost:1234 + 0xc13cf2f2 in native_safe_halt () at ./arch/x86/include/asm/irqflags.h:53 + 53asm volatile("sti; hlt": : :"memory"); + (gdb) bt + #0 0xc13cf2f2 in native_safe_halt () at ./arch/x86/include/asm/irqflags.h:53 + #1 arch_safe_halt () at ./arch/x86/include/asm/irqflags.h:95 + #2 default_idle () at arch/x86/kernel/process.c:341 + #3 0xc101f136 in arch_cpu_idle () at arch/x86/kernel/process.c:332 + #4 0xc106a6dd in cpuidle_idle_call () at kernel/sched/idle.c:156 + #5 do_idle () at kernel/sched/idle.c:245 + #6 0xc106a8c5 in cpu_startup_entry (state=) + at kernel/sched/idle.c:350 + #7 0xc13cb14a in rest_init () at init/main.c:415 + #8 0xc1507a7a in start_kernel () at init/main.c:679 + #9 0xc10001da in startup_32_smp () at arch/x86/kernel/head_32.S:368 + #10 0x00000000 in ?? () + (gdb) + +Rebuild the kernel image +------------------------ + +The kernel image is built the first time the VM is started. To rebuild +the kernel remove the **zImage** file and run the zImage target (or +start the VM again). + +.. add info about how to update the image diff --git a/README.rst b/README.rst new file mode 120000 index 00000000000000..a030cc141a5839 --- /dev/null +++ b/README.rst @@ -0,0 +1 @@ +Documentation/labs/index.rst \ No newline at end of file diff --git a/tools/labs/.gitignore b/tools/labs/.gitignore new file mode 100644 index 00000000000000..a6940b60f451c3 --- /dev/null +++ b/tools/labs/.gitignore @@ -0,0 +1,7 @@ +skels +vmlinux +zImage +serial.pts +rootfs.img +core-image-minimal-*.ext4 +.modinst \ No newline at end of file diff --git a/tools/labs/Makefile b/tools/labs/Makefile new file mode 100644 index 00000000000000..d218a90229c029 --- /dev/null +++ b/tools/labs/Makefile @@ -0,0 +1,42 @@ +KDIR=$(shell realpath $(PWD)/../..) + +LABS?=$(shell cd templates && find -mindepth 1 -maxdepth 1 -type d) +MODS=$(shell cd templates && find $(LABS) -mindepth 1 -name Kbuild | xargs dirname) +TODO?=0 + +include qemu/Makefile + +skels: + mkdir -p skels + cd templates && find $(LABS) -type f | xargs ./generate_skels.py --output ../skels --todo $(TODO) + rm -f skels/Kbuild + +skels/Kbuild: + echo "# autogenerated, do not edit " > $@ + echo "ccflags-y += -Wno-unused-function -Wno-unused-label -Wno-unused-variable " >> $@ + for i in $(shell cd skels && find -mindepth 1 -name Kbuild | xargs dirname); do echo "obj-m += $$i/" >> $@; done + +build: $(KCONFIG) skels/Kbuild + $(MAKE) -C $(KDIR) M=$(PWD)/skels ARCH=$(ARCH) modules + for i in $(shell find skels -name Makefile | xargs dirname); do $(MAKE) -C $$i; done + +TEMPDIR := $(shell mktemp -u) + +copy: $(YOCTO_IMAGE) + if [ -e qemu.mon ]; then exit 1; fi + mkdir $(TEMPDIR) + sudo mount -t ext4 -o loop $(YOCTO_IMAGE) $(TEMPDIR) + find skels -type f \( -name *.ko -or -executable \) | xargs sudo cp --parents -t $(TEMPDIR)/home/root || true + sudo umount $(TEMPDIR) + rmdir $(TEMPDIR) + +docs: + $(MAKE) -C $(KDIR) DOCBOOKS= SPHINXDIRS=labs htmldocs + +slides: + $(MAKE) -C $(KDIR) BUILDDIR=$(KDIR)/Documentation/output/slides DOCBOOKS= SPHINXDIRS=labs slides + +clean:: + rm -rf skels + +.PHONY: skels diff --git a/tools/labs/qemu/Makefile b/tools/labs/qemu/Makefile new file mode 100644 index 00000000000000..40e9181c437e40 --- /dev/null +++ b/tools/labs/qemu/Makefile @@ -0,0 +1,61 @@ +QEMU_DISPLAY ?= none +ARCH ?= x86 +ifeq ($(ARCH),x86) +b = b +endif +ZIMAGE=$(KDIR)/arch/$(ARCH)/boot/$(b)zImage +KCONFIG=$(KDIR)/.config + +YOCTO_URL=http://downloads.yoctoproject.org/releases/yocto/yocto-2.3/machines/qemu/qemu$(ARCH)/ +YOCTO_IMAGE=core-image-minimal-qemu$(ARCH).ext4 +#YOCTO_IMAGE=core-image-minimal-dev-qemu$(ARCH).ext4 +#YOCTO_IMAGE=core-image-sato-dev-qemu$(ARCH).ext4 +#YOCTO_IMAGE=core-image-sato-qemu$(ARCH).ext4 +#YOCTO_IMAGE=core-image-sato-sdk-qemu$(ARCH).ext4 + +QEMU_OPTS = -kernel $(ZIMAGE) \ + -device virtio-serial \ + -chardev pty,id=virtiocon0 -device virtconsole,chardev=virtiocon0 \ + -net nic,model=virtio,vlan=0 -net tap,ifname=tap0,vlan=0,script=no,downscript=no \ + -drive file=$(YOCTO_IMAGE),if=virtio,format=raw \ + --append "root=/dev/vda console=hvc0" \ + --display $(QEMU_DISPLAY) -s + +boot: .modinst tap0 + ARCH=$(ARCH) qemu/qemu.sh $(QEMU_OPTS) + +TEMPDIR := $(shell mktemp -u) + +$(KCONFIG): qemu/kernel_config.x86 + cp $^ $@ + $(MAKE) -C $(KDIR) oldnoconfig + +zImage: $(ZIMAGE) + +$(ZIMAGE): $(KCONFIG) + $(MAKE) -C $(KDIR) + $(MAKE) -C $(KDIR) modules + +.modinst: $(ZIMAGE) $(YOCTO_IMAGE) + mkdir $(TEMPDIR) + sudo mount -t ext4 -o loop $(YOCTO_IMAGE) $(TEMPDIR) + sudo $(MAKE) -C $(KDIR) modules_install INSTALL_MOD_PATH=$(TEMPDIR) + sudo umount $(TEMPDIR) + rmdir $(TEMPDIR) + sleep 1 && touch .modinst + +gdb: $(ZIMAGE) + gdb -ex "target remote localhost:1234" $(KDIR)/vmlinux + +$(YOCTO_IMAGE): + wget $(YOCTO_URL)/$(YOCTO_IMAGE) + sudo qemu/prepare-image.sh $(YOCTO_IMAGE) + +tap0: + qemu/create_net.sh $@ + +clean:: + rm -f .modinst + +.PHONY: clean tap0 + diff --git a/tools/labs/qemu/create_net.sh b/tools/labs/qemu/create_net.sh new file mode 100755 index 00000000000000..3f7654790e10fa --- /dev/null +++ b/tools/labs/qemu/create_net.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +if test $# -ne 1; then + echo "Usage: $0 " 1>&2 + echo " must be tap0 or tap1" + exit 1 +fi + +device=$1 + +case "$device" in + "tap0") + subnet=172.213.0 + ;; + "tap1") + subnet=172.214.0 + ;; + *) + echo "Unknown device" 1>&2 + exit 1 + ;; +esac + +# If device doesn't exist add device. +if ! /sbin/ip link show dev "$device" > /dev/null 2>&1; then + sudo ip tuntap add mode tap user "$USER" dev "$device" +fi + +# Reconfigure just to be sure (even if device exists). +sudo /sbin/ip address flush dev "$device" +sudo /sbin/ip link set dev "$device" down +sudo /sbin/ip address add $subnet.1/24 dev "$device" +sudo /sbin/ip link set dev "$device" up + +mkdir -p $PWD/tftp + +sudo dnsmasq --enable-tftp --tftp-root=$PWD/tftp --no-resolv --no-hosts --bind-interfaces --interface $device -F $subnet.2,$subnet.20 -x dnsmasq.pid || true diff --git a/tools/labs/qemu/kernel_config.x86 b/tools/labs/qemu/kernel_config.x86 new file mode 100644 index 00000000000000..bb18e79ab80749 --- /dev/null +++ b/tools/labs/qemu/kernel_config.x86 @@ -0,0 +1,79 @@ +# CONFIG_64BIT is not set +# CONFIG_LOCALVERSION_AUTO is not set +# CONFIG_CROSS_MEMORY_ATTACH is not set +# CONFIG_USELIB is not set +CONFIG_BLK_DEV_INITRD=y +# CONFIG_COMPAT_BRK is not set +CONFIG_SLAB=y +CONFIG_MODULES=y +CONFIG_MODULE_UNLOAD=y +CONFIG_SMP=y +# CONFIG_X86_EXTENDED_PLATFORM is not set +# CONFIG_SCHED_OMIT_FRAME_POINTER is not set +# CONFIG_X86_MCE is not set +# CONFIG_MICROCODE is not set +# CONFIG_COMPACTION is not set +# CONFIG_SECCOMP is not set +# CONFIG_RELOCATABLE is not set +# CONFIG_SUSPEND is not set +CONFIG_BINFMT_AOUT=y +CONFIG_BINFMT_MISC=y +CONFIG_NET=y +CONFIG_PACKET=y +CONFIG_UNIX=y +CONFIG_INET=y +# CONFIG_UEVENT_HELPER is not set +CONFIG_DEVTMPFS=y +# CONFIG_STANDALONE is not set +# CONFIG_PREVENT_FIRMWARE_BUILD is not set +CONFIG_VIRTIO_BLK=y +CONFIG_NETDEVICES=y +CONFIG_VIRTIO_NET=y +# CONFIG_DEVMEM is not set +CONFIG_VIRTIO_CONSOLE=y +# CONFIG_HW_RANDOM is not set +# CONFIG_HWMON is not set +# CONFIG_HID_A4TECH is not set +# CONFIG_HID_APPLE is not set +# CONFIG_HID_BELKIN is not set +# CONFIG_HID_CHERRY is not set +# CONFIG_HID_CHICONY is not set +# CONFIG_HID_CYPRESS is not set +# CONFIG_HID_EZKEY is not set +# CONFIG_HID_KENSINGTON is not set +# CONFIG_HID_LOGITECH is not set +# CONFIG_HID_MICROSOFT is not set +# CONFIG_HID_MONTEREY is not set +# CONFIG_USB_SUPPORT is not set +CONFIG_VIRTIO_PCI=y +# CONFIG_X86_PLATFORM_DEVICES is not set +# CONFIG_IOMMU_SUPPORT is not set +CONFIG_EXT4_FS=y +CONFIG_EXT4_FS_POSIX_ACL=y +CONFIG_EXT4_FS_SECURITY=y +CONFIG_EXT4_ENCRYPTION=y +# CONFIG_DNOTIFY is not set +# CONFIG_INOTIFY_USER is not set +CONFIG_PROC_KCORE=y +CONFIG_TMPFS=y +CONFIG_TMPFS_POSIX_ACL=y +CONFIG_CONFIGFS_FS=y +# CONFIG_MISC_FILESYSTEMS is not set +CONFIG_DEBUG_INFO=y +CONFIG_DEBUG_INFO_DWARF4=y +# CONFIG_ENABLE_WARN_DEPRECATED is not set +# CONFIG_ENABLE_MUST_CHECK is not set +# CONFIG_UNUSED_SYMBOLS is not set +# CONFIG_SECTION_MISMATCH_WARN_ONLY is not set +CONFIG_MAGIC_SYSRQ=y +CONFIG_DEBUG_KERNEL=y +CONFIG_DEBUG_SLAB=y +CONFIG_DEBUG_SLAB_LEAK=y +CONFIG_DEBUG_RT_MUTEXES=y +CONFIG_PROVE_LOCKING=y +CONFIG_DEBUG_ATOMIC_SLEEP=y +# CONFIG_FTRACE is not set +# CONFIG_X86_VERBOSE_BOOTUP is not set +# CONFIG_X86_DEBUG_FPU is not set +CONFIG_CRYPTO_ECHAINIV=y +# CONFIG_VIRTUALIZATION is not set diff --git a/tools/labs/qemu/prepare-image.sh b/tools/labs/qemu/prepare-image.sh new file mode 100755 index 00000000000000..459fa749baf2e8 --- /dev/null +++ b/tools/labs/qemu/prepare-image.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +size=$(stat -c%s $1) +if [ $size -lt 50000000 ]; then + e2fsck -f $1 + resize2fs $1 50M +fi + +TMP=$(mktemp -d) + +mount -t ext4 -o loop $1 $TMP + +# add console +echo "hvc0:12345:respawn:/sbin/getty 115200 hvc0" >> $TMP/etc/inittab + +# add more vty +cat >> $TMP/etc/inittab <> $TMP/etc/network/interfaces + +sudo umount $TMP +rmdir $TMP diff --git a/tools/labs/qemu/qemu.sh b/tools/labs/qemu/qemu.sh new file mode 100755 index 00000000000000..329ef347548a98 --- /dev/null +++ b/tools/labs/qemu/qemu.sh @@ -0,0 +1,21 @@ +#!/bin/bash +# +# This script runs qemu and creates a symbolic link named serial.pts +# to the qemu serial console (pts based). Because the qemu pts +# allocation is dynamic, it is preferable to have a stable path to +# avoid visual inspection of the qemu output when connecting to the +# serial console. + +case $ARCH in + x86) + qemu=qemu-system-i386 + ;; + arm) + qemu=qemu-system-arm + ;; +esac + +echo info chardev | nc -U -l qemu.mon | egrep -o "/dev/pts/[0-9]*" | xargs -I PTS ln -fs PTS serial.pts & +$qemu "$@" -monitor unix:qemu.mon +rm qemu.mon +rm serial.pts diff --git a/tools/labs/templates/generate_skels.py b/tools/labs/templates/generate_skels.py new file mode 100755 index 00000000000000..17a6ea6a1de589 --- /dev/null +++ b/tools/labs/templates/generate_skels.py @@ -0,0 +1,55 @@ +#!/usr/bin/python3 -u + +import argparse, fnmatch, glob, os.path, re, sys, shutil + +parser = argparse.ArgumentParser(description='Generate skeletons sources from full sources') +parser.add_argument('paths', metavar='path', nargs='+', help='list of files to process') +parser.add_argument('--output', help='output dir to copy processed files') +parser.add_argument('--todo', type=int, help='don\'t remove TODOs less then this', default=1) +args = parser.parse_args() + +def process_file(p, pattern): + f = open(p, "r") + g = open(os.path.join(args.output, p), "w") + skip_lines = 0 + for l in f.readlines(): + if skip_lines > 0: + skip_lines -= 1 + m = re.search(pattern, l) + if m : + l = "%s%s%s\n" % (m.group(1), m.group(2), m.group(4)) + g.write(l) + continue + m = re.search(pattern, l) + if m: + todo=1 + if m.group(2): + todo = int(m.group(2)) + if todo >= args.todo: + if m.group(3): + skip_lines = int(m.group(3)) + else: + skip_lines = 1 + l = "%s%s%s\n" % (m.group(1), m.group(2), m.group(4)) + g.write(l) + +for p in args.paths: + print("skel %s" % (p), sep = '') + name=os.path.basename(p) + try: + os.makedirs(os.path.join(args.output, os.path.dirname(p))) + except: + pass + + copy = False + if name == "Kbuild" or name == "Makefile": + pattern="(^#\s*TODO)([0-9]*)\/?([0-9]*)(:.*)" + elif fnmatch.fnmatch(name, '*.c') or fnmatch.fnmatch(name, '*.h'): + pattern="(.*/\*\s*TODO)([ 0-9]*)/?([0-9]*)(:.*)" + else: + copy = True + + if copy: + shutil.copyfile(p, os.path.join(args.output, p)) + else: + process_file(p, pattern) From 7d144cee74d0901677c190036b704d303989f1bb Mon Sep 17 00:00:00 2001 From: Octavian Purdila Date: Sat, 1 Jul 2017 01:17:28 +0300 Subject: [PATCH 002/297] labs: add kernel modules lab Add the documentation and templates for the kernel modules lab which focuses on: creating simple modules; describing the process of kernel module compilation; presenting how a module can be used with a kernel; simple kernel debugging methods Signed-off-by: Octavian Purdila Signed-off-by: Daniel Baluta --- Documentation/labs/index.rst | 1 + Documentation/labs/kernel_modules.rst | 961 ++++++++++++++++++ .../kernel_modules/1-2-test-mod/Kbuild | 3 + .../kernel_modules/1-2-test-mod/hello_mod.c | 21 + .../kernel_modules/3-error-mod/Kbuild | 3 + .../kernel_modules/3-error-mod/err_mod.c | 26 + .../kernel_modules/4-multi-mod/Kbuild | 5 + .../kernel_modules/4-multi-mod/mod1.c | 27 + .../kernel_modules/4-multi-mod/mod2.c | 4 + .../kernel_modules/5-oops-mod/Kbuild | 4 + .../kernel_modules/5-oops-mod/oops_mod.c | 27 + .../templates/kernel_modules/6-cmd-mod/Kbuild | 3 + .../kernel_modules/6-cmd-mod/cmd_mod.c | 26 + .../kernel_modules/7-list-proc/Kbuild | 3 + .../kernel_modules/7-list-proc/list_proc.c | 35 + .../templates/kernel_modules/8-kprobes/Kbuild | 3 + .../kernel_modules/8-kprobes/kprobes.c | 92 ++ .../templates/kernel_modules/9-kdb/Kbuild | 3 + .../kernel_modules/9-kdb/hello_kdb.c | 144 +++ 19 files changed, 1391 insertions(+) create mode 100644 Documentation/labs/kernel_modules.rst create mode 100644 tools/labs/templates/kernel_modules/1-2-test-mod/Kbuild create mode 100644 tools/labs/templates/kernel_modules/1-2-test-mod/hello_mod.c create mode 100644 tools/labs/templates/kernel_modules/3-error-mod/Kbuild create mode 100644 tools/labs/templates/kernel_modules/3-error-mod/err_mod.c create mode 100644 tools/labs/templates/kernel_modules/4-multi-mod/Kbuild create mode 100644 tools/labs/templates/kernel_modules/4-multi-mod/mod1.c create mode 100644 tools/labs/templates/kernel_modules/4-multi-mod/mod2.c create mode 100644 tools/labs/templates/kernel_modules/5-oops-mod/Kbuild create mode 100644 tools/labs/templates/kernel_modules/5-oops-mod/oops_mod.c create mode 100644 tools/labs/templates/kernel_modules/6-cmd-mod/Kbuild create mode 100644 tools/labs/templates/kernel_modules/6-cmd-mod/cmd_mod.c create mode 100644 tools/labs/templates/kernel_modules/7-list-proc/Kbuild create mode 100644 tools/labs/templates/kernel_modules/7-list-proc/list_proc.c create mode 100644 tools/labs/templates/kernel_modules/8-kprobes/Kbuild create mode 100644 tools/labs/templates/kernel_modules/8-kprobes/kprobes.c create mode 100644 tools/labs/templates/kernel_modules/9-kdb/Kbuild create mode 100644 tools/labs/templates/kernel_modules/9-kdb/hello_kdb.c diff --git a/Documentation/labs/index.rst b/Documentation/labs/index.rst index 9e61a8eed1af21..9af739f079fffa 100644 --- a/Documentation/labs/index.rst +++ b/Documentation/labs/index.rst @@ -31,3 +31,4 @@ then point your browser at **Documentation/output/labs/index.html**. vm.rst exercises.rst + kernel_modules.rst diff --git a/Documentation/labs/kernel_modules.rst b/Documentation/labs/kernel_modules.rst new file mode 100644 index 00000000000000..99ceb9a0b6b6b6 --- /dev/null +++ b/Documentation/labs/kernel_modules.rst @@ -0,0 +1,961 @@ +============== +Kernel modules +============== + +Lab objectives +============== + +* creating simple modules +* describing the process of kernel module compilation +* presenting how a module can be used with a kernel +* simple kernel debugging methods + +Overview +======== + +A monolithic kernel, though faster than a microkernel, has the disadvantage of +lack of modularity and extensibility. On modern monolithic kernels, this has +been solved by using kernel modules. A kernel module (or loadable kernel mode) +is an object file that contains code that can extend the kernel functionality +at runtime (it is loaded as needed); When a kernel module is no longer needed, +it can be unloaded. Most of the device drivers are used in the form of kernel +modules. + +For the development of Linux device drivers, it is recommended to download the +kernel sources, configure and compile them and then install the compiled version +on the test / development tool machine. + +An example of kernel module +=========================== + +Below is a very simple example of kernel module. When loading into the kernel, +it will generate the message "Hi". When unloading the kernel module, the "Bye" +message will be generated. + +.. code-block:: c + + #include + #include + #include + + MODULE_DESCRIPTION("My kernel module"); + MODULE_AUTHOR("Me"); + MODULE_LICENSE("GPL"); + + static int dummy_init(void) + { + pr_debug("Hi\n"); + return 0; + } + + static void dummy_exit(void) + { + pr_debug("Bye\n"); + } + + module_init(dummy_init); + module_exit(dummy_exit); + + +The generated messages will not be displayed on the console but will be saved +in a specially reserved memory area for this, from where they will be extracted +by the logging daemon (syslog). To display kernel messages, you can use the dmesg +command or inspect the logs: + +.. code-block:: bash + + # cat /var/log/syslog | tail -2 + Feb 20 13:57:38 asgard kernel: Hi + Feb 20 13:57:43 asgard kernel: Bye + + # dmesg | tail -2 + Hi + Bye + +Compiling kernel modules +======================== + +Compiling a kernel module differs from compiling an user program. First, other +headers should be used. Also, the module should not be linked to libraries. +And, last but not least, the module must be compiled with the same options as +the kernel in which we load the module. For these reasons, there is a standard +compilation method (kbuild). This method requires the use of two files: +a Makefile and a Kbuild file. + +Below is an example of a Makefile: + +.. code-block:: bash + + KDIR = /lib/modules/`uname -r`/build + + kbuild: + make -C $(KDIR) M=`pwd` + + clean: + make -C $(KDIR) M=`pwd` clean + +And the example of a Kbuild file used to compile a module: + +.. code-block:: bash + + EXTRA_CFLAGS = -Wall -g + + obj-m = modul.o + + +As you can see, making the Makefile file in the example shown will result in +the make invocation in the kernel source directory (``/lib/modules/`uname -r`/build``) +and referring to the current directory (``M = `pwd```). This process ultimately +leads to reading the Kbuild file from the current directory and compiling +the module as instructed in this file. + +For labs we will configure different KDIR, according to the virtual machine +specifications: + +.. code-block:: bash + + KDIR = /usr/src/linux-so2 + [...] + +A Kbuild file contains one or more directives for compiling a kernel module. +The easiest example of such a directive is ``obj-m = modul.o``. Following this +directive, a kernel module (ko - kernel object) will be created, +starting from the ``module.o`` file. ``module.o`` will be created starting from +``module.c`` or ``module.S``. All of these files can be found in the Kbuild's +directory. + +An example of a Kbuild file that uses several sub-modules is shown below: + +.. code-block:: bash + + EXTRA_CFLAGS = -Wall -g + + obj-m = supermodul.o + supermodul-y = module-a.o module-b.o + +For the example above, the steps to compile are: + + * compile the module-a.c and module-b.c source, resulting in module-a.o and + module-b.o objects + * module-a.o and module-b.o will then be linked in supermodule.o + * from supermodul.o will create supermodul.ko module + + +The suffix of targets in Kbuild determines how they are used, as follows: + + * M (modules) is a target for loadable kernel modules + * Y (yes) represents a target for object files to be compiled and then linked + to a module (``$(mode_name)-y``) or within the kernel (``obj-y``) + * any other target suffix will be ignored by Kbuild and will not be compiled + + +These suffixes are used to easily configure the kernel by running the ``make +menuconfig`` command or directly editing the .config file. This file sets a +series of variables that are used to determine which features are added to the +kernel at build time. For example, when adding BTRFS support with +``make menuconfig``, add the line CONFIG_BTRFS_FS = y to the .config file. +The BTRFS kbuild contains the line ``obj-$(CONFIG_BTRFS_FS):= btrfs.o``, which +becomes ``obj-y:= btrfs.o``. This will compile the btrfs.o object and will be +linked to the kernel. Before the variable was set, the line became ``obj:=btrfs.o`` +and so it was ignored, and the kernel was build-at without BTRFS support. + +For more details, see the ``makefiles.txt`` file and the ``modules.txt`` file within +the kernel sources. + +Loading/unloading a kernel module +================================= + +To load a kernel module, use the insmod utility. This utility receives as a +parameter the path to the .ko file in which the module was compiled and linked. +Unloading the module from the kernel is done using the rmmod command, which receives +the module name as a parameter. + +.. code-block:: bash + + $ insmod module.ko + $ rmmod module.ko + +When loading the kernel module, the routine specified as a parameter of the +``module_init`` macro will be executed. Similarly, when the module is unloaded +the routine specified as a parameter of the ``module_exit`` will be executed. + +A complete example of compiling and loading/unloading mode is presented below: + +.. code-block:: bash + + faust:~/lab-01/modul-lin# ls + Kbuild Makefile modul.c + + faust:~/lab-01/modul-lin# make + make -C /lib/modules/`uname -r`/build M=`pwd` + make[1]: Entering directory `/usr/src/linux-2.6.28.4' + LD /root/lab-01/modul-lin/built-in.o + CC [M] /root/lab-01/modul-lin/modul.o + Building modules, stage 2. + MODPOST 1 modules + CC /root/lab-01/modul-lin/modul.mod.o + LD [M] /root/lab-01/modul-lin/modul.ko + make[1]: Leaving directory `/usr/src/linux-2.6.28.4' + + faust:~/lab-01/modul-lin# ls + built-in.o Kbuild Makefile modul.c Module.markers + modules.order Module.symvers modul.ko modul.mod.c + modul.mod.o modul.o + + faust:~/lab-01/modul-lin# insmod modul.ko + + faust:~/lab-01/modul-lin# dmesg | tail -1 + Hi + + faust:~/lab-01/modul-lin# rmmod modul + + faust:~/lab-01/modul-lin# dmesg | tail -2 + Hi + Bye + +Information about modules loaded into the kernel can be found using the lsmod +command or by inspecting the ``/proc/modules``, ``/sys/module`` directories. + +Debugging +========= + +Troubleshooting a kernel module is much more complicated than debugging a +regular program. First, a mistake in a kernel module can lead to blocking the +entire system. Troubleshooting is therefore much slowed down. To avoid reboot, +it is recommended to use a virtual machine (qemu, virtualbox, vmware). + +When a module containing bugs is inserted into the kernel, it will eventually +generate a `kernel oops `_. +A kernel oops is an invalid operation detected by the kernel and can only +be generated by the kernel. For a stable kernel version, it almost certainly +means that the module contains a bug. After the oops appears, the kernel will +continue to work. + +Very important to the appearance of a kernel oops is saving the generated +message. As noted above, messages generated by the kernel are saved in logs and +can be displayed with the dmesg command. To make sure that no kernel message +is lost, it is recommended to insert/test the kernel directly from the console, +or periodically check the kernel messages. Noteworthy is that an oops can occur +because of a programming error, but also a hardware error. + +If a fatal error occurs, after which the system can not return to a stable +state, a panic kernel is generated. + +Look at the kernel module below that contains a bug to generate an oops: + +.. code-block:: c + + /* + * Oops generating kernel module + */ + + #include + #include + #include + + MODULE_DESCRIPTION ("Oops"); + MODULE_LICENSE ("GPL"); + MODULE_AUTHOR ("PSO"); + + #define OP_READ 0 + #define OP_WRITE 1 + #define OP_OOPS OP_WRITE + + static int my_oops_init (void) + { + int *a; + + a = (int *) 0x00001234; + #if OP_OOPS == OP_WRITE + *a = 3; + #elif OP_OOPS == OP_READ + printk (KERN_ALERT "value = %d\n", *a); + #else + #error "Unknown op for oops!" + #endif + + return 0; + } + + static void my_oops_exit (void) + { + } + + module_init (my_oops_init); + module_exit (my_oops_exit); + +.. ** + +Inserting this module into the kernel will generate an oops: + +.. code-block:: bash + + faust:~/lab-01/modul-oops# insmod oops.ko + [...] + + faust:~/lab-01/modul-oops# dmesg | tail -32 + BUG: unable to handle kernel paging request at 00001234 + IP: [] my_oops_init+0x5/0x20 [oops] + *de = 00000000 + Oops: 0002 [#1] PREEMPT DEBUG_PAGEALLOC + last sysfs file: /sys/devices/virtual/net/lo/operstate + Modules linked in: oops(+) netconsole ide_cd_mod pcnet32 crc32 cdrom [last unloaded: modul] + + Pid: 4157, comm: insmod Not tainted (2.6.28.4 #2) VMware Virtual Platform + EIP: 0060:[] EFLAGS: 00010246 CPU: 0 + EIP is at my_oops_init+0x5/0x20 [oops] + EAX: 00000000 EBX: fffffffc ECX: c89d4300 EDX: 00000001 + ESI: c89d4000 EDI: 00000000 EBP: c5799e24 ESP: c5799e24 + DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 + Process insmod (pid: 4157, ti=c5799000 task=c665c780 task.ti=c5799000) + Stack: + c5799f8c c010102d c72b51d8 0000000c c5799e58 c01708e4 00000124 00000000 + c89d4300 c5799e58 c724f448 00000001 c89d4300 c5799e60 c0170981 c5799f8c + c014b698 00000000 00000000 c5799f78 c5799f20 00000500 c665cb00 c89d4300 + Call Trace: + [] ? _stext+0x2d/0x170 + [] ? __vunmap+0xa4/0xf0 + [] ? vfree+0x21/0x30 + [] ? load_module+0x19b8/0x1a40 + [] ? __mutex_unlock_slowpath+0xd5/0x140 + [] ? trace_hardirqs_on_caller+0x106/0x150 + [] ? sys_init_module+0x8a/0x1b0 + [] ? trace_hardirqs_on_caller+0x106/0x150 + [] ? trace_hardirqs_on_thunk+0xc/0x10 + [] ? sysenter_do_call+0x12/0x43 + Code: 05 34 12 00 00 03 00 00 00 5d c3 eb 0d 90 90 90 90 90 90 90 90 + EIP: [] my_oops_init+0x5/0x20 [oops] SS:ESP 0068:c5799e24 + ---[ end trace 2981ce73ae801363 ]--- + +Although relatively cryptic, the message provided by the kernel to the +appearance of an oops provides valuable information about the error. First line: + +.. code-block:: bash + + BUG: unable to handle kernel paging request at 00001234 + EIP: [] my_oops_init + 0x5 / 0x20 [oops] + +Tells us the cause and the address of the instruction that generated the error. +In our case this is an invalid access to memory. + +Next line + + ``Oops: 0002 [# 1] PREEMPT DEBUG_PAGEALLOC`` + +Tells us that it's the first oops (#1). This is important in the context that +an oops can lead to other oopses. Usually only the first oops is relevant. +Furthermore, the oops code (0002) provides information about the error type +(in memory manager -> fault.c ): + + * Bit 0 == 0 means no page found, 1 means protection fault + * Bit 1 == 0 means read, 1 means write + * Bit 2 == 0 means kernel, 1 means user - mode + +In this case, we have a write access that generated the oops (bit 1 is 1). + +Below is a dump of the registers. It decodes the instruction pointer (EIP) +value and notes that the bug appeared in the my_oops_init function with a +5-byte offset (``EIP: [] my_oops_init+0x5``). The message also shows +the stack content and a backtrace of calls until then. + +If an invalid read call is generated ( ``#define OP_OOPS OP_READ``), the message +will be the same, but the oops code will differ, which would now be 0000 : + +.. code-block:: bash + + faust:~/lab-01/modul-oops# dmesg | tail -33 + BUG: unable to handle kernel paging request at 00001234 + IP: [] my_oops_init+0x6/0x20 [oops] + *de = 00000000 + Oops: 0000 [#1] PREEMPT DEBUG_PAGEALLOC + last sysfs file: /sys/devices/virtual/net/lo/operstate + Modules linked in: oops(+) netconsole pcnet32 crc32 ide_cd_mod cdrom + + Pid: 2754, comm: insmod Not tainted (2.6.28.4 #2) VMware Virtual Platform + EIP: 0060:[] EFLAGS: 00010292 CPU: 0 + EIP is at my_oops_init+0x6/0x20 [oops] + EAX: 00000000 EBX: fffffffc ECX: c89c3380 EDX: 00000001 + ESI: c89c3010 EDI: 00000000 EBP: c57cbe24 ESP: c57cbe1c + DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 + Process insmod (pid: 2754, ti=c57cb000 task=c66ec780 task.ti=c57cb000) + Stack: + c57cbe34 00000282 c57cbf8c c010102d c57b9280 0000000c c57cbe58 c01708e4 + 00000124 00000000 c89c3380 c57cbe58 c5db1d38 00000001 c89c3380 c57cbe60 + c0170981 c57cbf8c c014b698 00000000 00000000 c57cbf78 c57cbf20 00000580 + Call Trace: + [] ? _stext+0x2d/0x170 + [] ? __vunmap+0xa4/0xf0 + [] ? vfree+0x21/0x30 + [] ? load_module+0x19b8/0x1a40 + [] ? printk+0x0/0x1a + [] ? __mutex_unlock_slowpath+0xd5/0x140 + [] ? trace_hardirqs_on_caller+0x106/0x150 + [] ? sys_init_module+0x8a/0x1b0 + [] ? trace_hardirqs_on_caller+0x106/0x150 + [] ? trace_hardirqs_on_thunk+0xc/0x10 + [] ? sysenter_do_call+0x12/0x43 + Code: 34 12 00 00 c7 04 24 54 30 9c c8 89 44 24 04 e8 58 a0 99 f7 31 + EIP: [] my_oops_init+0x6/0x20 [oops] SS:ESP 0068:c57cbe1c + ---[ end trace 45eeb3d6ea8ff1ed ]--- + +objdump +------- + +Detailed information about the instruction that generated the oops can be found +using the objdump utility. Useful options to use are ``-d`` to disassemble the +code and ``-S`` for interleaving code C in assembly language code. +For efficient decoding, however, we need the address where the kernel module was +loaded. This can be found in /proc/modules. + +Here's an example of using objdump on the above module to identify the instruction +that generated the oops: + +.. code-block:: bash + + faust:~/lab-01/modul-oops# cat /proc/modules + oops 1280 1 - Loading 0xc89d4000 + netconsole 8352 0 - Live 0xc89ad000 + pcnet32 33412 0 - Live 0xc895a000 + ide_cd_mod 34952 0 - Live 0xc8903000 + crc32 4224 1 pcnet32, Live 0xc888a000 + cdrom 34848 1 ide_cd_mod, Live 0xc886d000 + + faust:~/lab-01/modul-oops# objdump -dS --adjust-vma=0xc89d4000 oops.ko + + oops.ko: file format elf32-i386 + + + Disassembly of section .text: + + c89d4000 : + #define OP_READ 0 + #define OP_WRITE 1 + #define OP_OOPS OP_WRITE + + static int my_oops_init (void) + { + c89d4000: 55 push %ebp + #else + #error "Unknown op for oops!" + #endif + + return 0; + } + c89d4001: 31 c0 xor %eax,%eax + #define OP_READ 0 + #define OP_WRITE 1 + #define OP_OOPS OP_WRITE + + static int my_oops_init (void) + { + c89d4003: 89 e5 mov %esp,%ebp + int *a; + + a = (int *) 0x00001234; + #if OP_OOPS == OP_WRITE + *a = 3; + c89d4005: c7 05 34 12 00 00 03 movl $0x3,0x1234 + c89d400c: 00 00 00 + #else + #error "Unknown op for oops!" + #endif + + return 0; + } + c89d400f: 5d pop %ebp + c89d4010: c3 ret + c89d4011: eb 0d jmp c89c3020 + c89d4013: 90 nop + c89d4014: 90 nop + c89d4015: 90 nop + c89d4016: 90 nop + c89d4017: 90 nop + c89d4018: 90 nop + c89d4019: 90 nop + c89d401a: 90 nop + c89d401b: 90 nop + c89d401c: 90 nop + c89d401d: 90 nop + c89d401e: 90 nop + c89d401f: 90 nop + + c89d4020 : + + static void my_oops_exit (void) + { + c89d4020: 55 push %ebp + c89d4021: 89 e5 mov %esp,%ebp + } + c89d4023: 5d pop %ebp + c89d4024: c3 ret + c89d4025: 90 nop + c89d4026: 90 nop + c89d4027: 90 nop + +Note that the instruction that generated the oops (``c89d4005`` identified +earlier) is: + + ``C89d4005: c7 05 34 12 00 00 03 movl $ 0x3,0x1234`` + +That is exactly what was expected - storing value 3 at 0x0001234. + +The /proc/modules is used to find the address where a kernel module is loaded. +The --adjust-vma option allows you to display instructions relative to +``0xc89d4000``. The ``-l`` option displays the number of each line in the source code +interleaved with the assembly language code. + +addr2line +--------- + +A more simplistic way to find the code that generated an oops is to use the +addr2line utility: + +.. code-block:: bash + + faust:~/lab-01/modul-oops# addr2line -e oops.o 0x5 + /root/lab-01/modul-oops/oops.c:23 + +Where ``0x5`` is the value of the program counter (``EIP = c89d4005``) that generated the +oops, minus the base address of the module (``0xc89c4000``) according to ``/proc/modules`` + +minicom +------- + +Minicom (or other equivalent utilities, eg ``picocom``, ``screen``) is a utility that +can be used to connect and interact with a serial port. The serial port is the +basic method for analyzing kernel messages or interacting with an embedded +system in the development phase. There are two more common ways to connect: + +* a serial serial port where the device we are going to use is ``/dev/ttyS0`` +* a serial USB port (FDTI) in which case the device we are going to use is ``/dev/ttyUSB``. + +For the virtual machine used in the lab, the device that we need to use is +displayed after the virtual machine starts: + +``char device redirected to /dev/pts/20 (label virtiocon0)`` + +Minicom use: + +.. code-block:: bash + + #for connecting via COM1 and using a speed of 115,200 characters per second + minicom -b 115200 -D /dev/ttyS0 + + #For USB serial port connection + minicom -D /dev/ttyUSB0 + + #To connect to the serial port of the virtual machine + minicom -D /dev/pts/20 + +netconsole +---------- + +Netconsole is a utility that allows logging of kernel debugging messages over +the network. This is useful when the disk logging system does not work when +serial ports are not available or when the terminal does not respond to +commands. Netconsole comes in the form of a kernel module. + +To work, it needs the following parameters: + + * port, IP address, and the source interface name of the debug station + * port, MAC address, and IP address of the machine to which the debug + messages will be sent + +These parameters can be configured when the module is inserted into the kernel, +or even while the module is inserted if it has been compiled with the +CONFIG_NETCONSOLE_DYNAMIC option. + +An example configuration when inserting is as follows: + +.. code-block:: bash + + alice:~# modprobe netconsole netconsole=6666@192.168.191.130/eth0,6000@192.168.191.1/00:50:56:c0:00:08 + +Thus, the debug messages on the station that has the address 192.168.191.130 +will be sent to the eth0 interface, having source port 6666. The messages will +be sent to 192.168.191.1 with the MAC address 00: 50: 56: c0: 00: 08, on port +6000. + +Messages can be played on the destination station using netcat : + +.. code-block:: bash + + bob:~ # nc -l -p 6000 -u + +Alternatively, the destination station can configure syslogd to intercept these +messages. More information can be found here . + +Printk debugging +---------------- + +``The two oldest and most useful debugging aids are Your brain and Printf`` + +For debugging, a primitive way is often used, but it is quite effective: printk +debugging. Although a debugger can also be used, it is generally not very +useful: simple bugs (uninitialized variables, memory management problems, etc.) +can be easily localized by control messages and the kernel-decoded oop message. + +For more complex bugs, even a debugger can not help us too much unless the +operating system structure is very well understood. When debugging a kernel +module, there are a lot of unknowns in the equation: multiple contexts (we have +multiple processes and threads running at a time), interruptions, virtual +memory, etc. + +You can use printk to display kernel messages to user space. It is similar to +printf's functionality; The only difference is that the transmitted message +can be prefixed with a string of "", where n indicates the error level +(loglevel) and has values between 0 and 7. Instead of "", the levels + +Can also be coded by symbolic constants: + +.. code-block:: c + + KERN_EMERG - n = 0 + KERN_ALERT - n = 1 + KERN_CRIT - n = 2 + KERN_ERR - n = 3 + KERN_WARNING - n = 4 + KERN_NOTICE - n = 5 + KERN_INFO - n = 6 + KERN_DEBUG - n = 7 + + +The definitions of all log levels are found in linux/kern_levels.h. +Basically, these log levels are used by the system to route messages sent to +various outputs: console, log files in /var/log etc. + +To display printk messages in user space, the printk log level must be of +higher priority then ``console_loglevel`` variable. That is, the logging level is +less strict than the console_loglevel variable. For example, if the +``console_loglevel`` has a value of 5 (specific to KERN_NOTICE), only messages +with loglevel stricter than 5 (i.e KERN_EMERG, KERN_ALERT, KERN_CRIT, +KERN_ERR, KERN_WARNING) will be shown. + +Console-redirected messages can be useful for quickly viewing the effect of +executing the kernel code, but they are no longer so useful if the kernel +encounters an irreparable error and the system freezes. In this case, the logs +of the system must be consulted, as they keep the information between system +restarts. These are found in ``/var/log`` and are text files, populated with +syslogd and klogd during the kernel run. syslogd and klogd take the information +from the virtual file system mounted in /proc. In principle, with syslogd and +klogd turned on, all messages coming from the kernel will go to /var/log/kern.log. + +A simpler version for debugging is using the /var/log/debug file. It is populated +only with the printk messages from the kernel with the KERN_DEBUG log level. + +Given that a production kernel (similar to the one we're probably running with) +contains only release code, our module is among the few that send messages +prefixed with KERN_DEBUG . In this way, we can easily navigate through the +/var/log/debug information by finding the messages corresponding to a debugging +session for our module. + +An example of use would be the following: + +.. code-block:: bash + + # Clear the debug file of previous information (or possibly a backup) + $ echo "New debug session" > /var/log/debug + # Run the tests + # If there is no critical error causing a panic kernel, check the output + # if a critical error occurs and the machine only responds to a restart, + restart the system and check /var/log/debug. + +The format of the messages must obviously contain all the information of +interest in order to detect the error, but inserting in the code "printk" to +provide detailed information can be as time-consuming as writing the code to +solve the problem. This is usually a trade-off between the completeness of the +debugging messages displayed using printk and the time it takes to insert these +messages into the text. + +A very simple way, less time-consuming for inserting printk and providing +the possibility to analyze the flow of instructions for tests is +the use of the predefined constants __LINE__ , __LINE__ and __func__ : + + * ``__FILE__`` is replaced by the compiler with the name of the source file it is + currently in the compilation. + * ``__LINE__`` is replaced by the compiler with the line number on which the + current instruction is found in the current source file. + * ``__func__`` /``__FUNCTION__`` is replaced by the compiler with the name of the + function in which the current instruction is found. + +Note : ``__LINE__`` and ``__LINE__`` are part of ANSI C specification specifications: +``__func__`` is part of specification C99; ``__FUNCTION__`` is a GNU C +extension and is not portable; However, since we write code for the Linux kernel, +we can use it without any problems. + +The following macrodefinition can be used in this case: + +.. code-block:: c + + #define PRINT_DEBUG \ + printk (KERN_DEBUG "[% s]: FUNC:% s: LINE:% d \ n", __FILE__, + __FUNCTION__, __LINE__) + +Then, at each point where we want to see if it is "reached" in execution, +insert PRINT_DEBUG; This is a simple and quick way, and can yield by carefully +analyzing the output. + +The dmesg command is used to view the messages printed with printk but not +appearing on the console. + +To delete all previous messages from a log file, run cat /dev/null > +/var/log/debug. To delete messages displayed by the dmesg command, dmesg -c. + + +Dynamic debugging +----------------- + +Dynamic ``dyndbg`` debugging enables dynamic debugging activation/deactivation. +Unlike printk, it offers more advanced printk options for the messages we want +to display - very useful for complex modules or troubleshooting subsystems. +This significantly reduces the amount of messages displayed, leaving only +those relevant for the debug context. To enable dyndbg, the kernel must be +compiled with the CONFIG_DYNAMIC_DEBUG option. Once configured, pr_debug(), +dev_dbg() and print_hex_dump_debug(), print_hex_dump_bytes() can be dynamically +enabled per call. + +The ``/sys/kernel/debug/dynamic_debug/control`` file from the debugfs file debugfs +(where /sys/kernel/debug is the path to which debugfs were mounted) is used to +filter messages or view existing filters. + +.. code-block:: c + + mount -t debugfs none /debug + +Debugfs is a simple file system, used as a kernel-space interface and +user-space interface to configure different debug options. Any debug utility +can create and use its own files / folders in debugfs. + +For example, to display existing filters in dyndbg, you will use: + +.. code-block:: bash + + cat /debug/dynamic_debug/control + +And to enable the debug message from line 1603 in the svcsock.c file: + +.. code-block:: bash + + echo 'file svcsock.c line 1603 +p' > /debug/dynamic_debug/control + +The /debug/dynamic_debug/control file is not a regular file. Its display shows +the dyndbg settings on the filters. Writing in it with an echo will change +these settings (it will not actually make a write). Be aware that the file +contains settings for dyndbg debugging messages. Do not log in this file. + +Dyndbg Options +~~~~~~~~~~~~~~ + +* ``func`` - just the debug messages from the functions that have the same + name as the one defined in the filter. + + .. code-block:: bash + + echo 'func svc_tcp_accept +p' > /debug/dynamic_debug/control + +* ``file`` - the name of the file(s) for which we want to display the debug + messages. It can be just the source name, but also the absolute path or + kernel-tree path. + + .. code-block:: bash + + file svcsock.c + file kernel/freezer.c + file /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svcsock.c + +* ``module`` - module name. + + .. code-block:: bash + + Modules sunrpc + +* ``format`` - only messages whose display format contains the specified string. + + .. code-block:: bash + + format "nfsd: SETATTR" + +* line - the line or lines for which we want to enable debug calls. + + .. code-block:: bash + + # Triggers debug messages between lines 1603 and 1605 in the svcsock.c file + $ echo 'file svcsock.c line 1603-1605 +p' > /sys/kernel/debug/dynamic_debug/control + # Enables debug messages from the beginning of the file to line 1605 + $ echo 'file svcsock.c line -1605 +p' > /sys/kernel/debug/dynamic_debug/control + +In addition to the above options, a series of flags can be specified that can +be added, removed, or set with operators +, - or = : + + * ``p`` activates the pr_debug() . + * ``f`` includes the name of the function in the printed message. + * ``I`` includes the line number in the printed message. + * ``M`` includes the module name in the printed message. + * ``T`` includes the thread id if it is not called from interrupt context + * ``_`` no flag is set. + +Exercises +========= + +.. important:: + + .. include:: exercises-summary.hrst + + .. |LAB_NAME| replace:: kernel_modules + + +0. Intro +-------- + +Using |LXR|_ find the definitions of the following symbols in the Linux kernel: + +* :c:func:`module_init` and :c:func:`module_exit` + + - what does the two macros do? What is ``init_module`` and ``cleanup_module``? +* :c:data:`ignore_loglevel` + + - What is this variable used for? + +1. Module +--------- + +Generate the skeleton for the task named **1-2-test-mod** then build and +copy the module to the VM. Perform the following tasks: + +* load the kernel module. + +* list the kernel modules and check if current module is present + +* unload the kernel module + +* view the messages displayed at loading/unloading the kernel module using + ``dmesg`` command + +.. note:: Read `Loading/unloading a kernel module`_ section. When unloading + a kernel module, only the module name (without extension) can + be specified. + +2. Printk +--------- + +Watch the virtual machine console. Why were the messages not displayed directly +to the virtual machine console? + +Inspect the source code file. Change the source code file so that messages are +displayed directly on the serial console. + +.. hint:: Read the `Printk debugging`_ section of the lab and change + the log level of the prints in the module source. + +.. hint:: Another option is to set the current log level by writting + the desired log level to ``/proc/sys/kernel/printk`` + +.. hint:: An alternative approach is to edit the boot options in + ``tools/labs/qemu/Makefile``. Add ``ignore_loglevel`` option + to the qemu ``--append`` option. + +3. Error +-------- + +Generate the skeleton for the task named **3-error-mod**. Compile the +sources and get the corresponding kernel module. Why have compilation +errors occurred? + +.. hint:: How does this module differ from the previous module? + +Modify the module to solve the cause of those errors. + +4. Sub-modules +-------------- + +Generate the skeleton for the task named **4-multi-mod**. Inspect the +C source files: ``mod1.c`` and ``mod2.c``. Module 2 contains only the +definition of a function used by module 1. + +Create a Kbuild file that will lead to creating the ``multi_mod.ko`` +from the two source files. + +.. hint:: Read the `Compiling kernel modules`_ section of the lab. + +Compile, copy, load and unload the kernel module. Make sure messages +are properly displayed on the console. + +5. Kernel oops +-------------- + +Generate the skeleton for the task named **5-oops-mod** and inspect the +C source file. Notice where the problem will occur. Add -g to +compilation in the Kbuild file. + +.. hint:: Read `Compiling kernel modules`_ section of the lab. + +Compile the associated module and load it into the kernel. Identify the memory +address at which the oops appeared. + +.. hint:: Read `Debugging`_ section of the lab. To identify the + address, follow the oops message and extract the value of + the instructions pointer (EIP) register. + +Determine which instruction has triggered the oops. + +.. hint:: Use the /proc/modules information to get the load address of + the kernel module. Use, on the physical machine, objdump + and/or addr2line . Objdump needs debugging support for + compilation! Read the lab's `objdump`_ and `addr2line`_ + sections. + +Try to unload the kernel module. Notice that the operation does not +work because there are references from the kernel module within the +kernel since the oops; Until the release of those references (which is +almost impossible in the case of an oops), the module can not be +unloaded. + +6. Module parameters +-------------------- + +Generate the skeletons for **6-cmd-mod** and inspect the C +``cmd_mod.c`` source file. Compile and copy the associated module and +load the kernel module to see the printk message. Then unload the +module from the kernel. + +Without modifying the sources, load the kernel module so that the +message shown is ``Early bird gets tired``. + +.. hint:: The str variable can be changed by passing a parameter to + the module. Find more information `here + `_. + +.. _proc-info: + +7. Proc info +------------ + +Generate the skeleton for the task named **7-list-proc**. Add code to +display the Process ID (``PID``) and the executable name. The +information will be displayed both when loading and unloading the +module. + +.. note:: + * In the Linux kernel, a process is described by the + :c:type:`struct task_struct`. Use |LXR|_ to find the + definition of ``struct task_struct``. + + * To find the structure field that contains the name of the + executable, look for the "executable" comment. + + * The pointer to the structure of the current process + running at a given time in the kernel is given by the + :c:macro:`current` variable (of the type ``struct task_struct + *``). + +.. hint:: To use c:macro:`current` you'll need to include the header + in which the ``struct task_struct`` is defined, i.e + ``linux/sched.h``. + +Compile copy and load the module. Unload the kernel module. + +Repeat the loading/unloading operation. Note that the PIDs of the +displayed processes differ. This is because a module is being loaded +from the executable ``/sbin/insmod`` when the module is loaded and +when the module is unloaded a process is created from the executable +``/sbin/rmmod``. diff --git a/tools/labs/templates/kernel_modules/1-2-test-mod/Kbuild b/tools/labs/templates/kernel_modules/1-2-test-mod/Kbuild new file mode 100644 index 00000000000000..8aa44e4d7a24fa --- /dev/null +++ b/tools/labs/templates/kernel_modules/1-2-test-mod/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = hello_mod.o diff --git a/tools/labs/templates/kernel_modules/1-2-test-mod/hello_mod.c b/tools/labs/templates/kernel_modules/1-2-test-mod/hello_mod.c new file mode 100644 index 00000000000000..0ed6520054f72a --- /dev/null +++ b/tools/labs/templates/kernel_modules/1-2-test-mod/hello_mod.c @@ -0,0 +1,21 @@ +#include +#include +#include + +MODULE_DESCRIPTION("Simple module"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +static int my_hello_init(void) +{ + pr_debug("Hello!\n"); + return 0; +} + +static void hello_exit(void) +{ + pr_debug("Goodbye!\n"); +} + +module_init(my_hello_init); +module_exit(hello_exit); diff --git a/tools/labs/templates/kernel_modules/3-error-mod/Kbuild b/tools/labs/templates/kernel_modules/3-error-mod/Kbuild new file mode 100644 index 00000000000000..7bf41fb63f9589 --- /dev/null +++ b/tools/labs/templates/kernel_modules/3-error-mod/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = err_mod.o diff --git a/tools/labs/templates/kernel_modules/3-error-mod/err_mod.c b/tools/labs/templates/kernel_modules/3-error-mod/err_mod.c new file mode 100644 index 00000000000000..057036642574af --- /dev/null +++ b/tools/labs/templates/kernel_modules/3-error-mod/err_mod.c @@ -0,0 +1,26 @@ +#include +#include +/* TODO: add missing kernel headers */ +#include + +MODULE_DESCRIPTION("Error module"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +static int n1, n2; + +static int err_init(void) +{ + n1 = 1; n2 = 2; + pr_info("n1 is %d, n2 is %d\n", n1, n2); + + return 0; +} + +static void err_exit(void) +{ + pr_info("sum is %d\n", n1 + n2); +} + +module_init(err_init); +module_exit(err_exit); diff --git a/tools/labs/templates/kernel_modules/4-multi-mod/Kbuild b/tools/labs/templates/kernel_modules/4-multi-mod/Kbuild new file mode 100644 index 00000000000000..1d211ca44c7035 --- /dev/null +++ b/tools/labs/templates/kernel_modules/4-multi-mod/Kbuild @@ -0,0 +1,5 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +# TODO/2: add rules to create a multi object module +obj-m = multi-mod.o +multi-mod-y = mod1.o mod2.o diff --git a/tools/labs/templates/kernel_modules/4-multi-mod/mod1.c b/tools/labs/templates/kernel_modules/4-multi-mod/mod1.c new file mode 100644 index 00000000000000..9655f54a0d29f3 --- /dev/null +++ b/tools/labs/templates/kernel_modules/4-multi-mod/mod1.c @@ -0,0 +1,27 @@ +#include +#include +#include + +MODULE_DESCRIPTION("Multi-file module"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +extern int add(int a, int b); + +static int n1, n2; + +static int my_hello_init(void) +{ + n1 = 1; n2 = 2; + pr_info("n1 is %d, n2 is %d\n", n1, n2); + + return 0; +} + +static void hello_exit(void) +{ + pr_info("sum id %d\n", add(n1, n2)); +} + +module_init(my_hello_init); +module_exit(hello_exit); diff --git a/tools/labs/templates/kernel_modules/4-multi-mod/mod2.c b/tools/labs/templates/kernel_modules/4-multi-mod/mod2.c new file mode 100644 index 00000000000000..7c923bb3ac5488 --- /dev/null +++ b/tools/labs/templates/kernel_modules/4-multi-mod/mod2.c @@ -0,0 +1,4 @@ +int add(int a, int b) +{ + return a + b; +} diff --git a/tools/labs/templates/kernel_modules/5-oops-mod/Kbuild b/tools/labs/templates/kernel_modules/5-oops-mod/Kbuild new file mode 100644 index 00000000000000..09e3be5e8ab20c --- /dev/null +++ b/tools/labs/templates/kernel_modules/5-oops-mod/Kbuild @@ -0,0 +1,4 @@ +# TODO: add flags to generate debug information +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = oops_mod.o diff --git a/tools/labs/templates/kernel_modules/5-oops-mod/oops_mod.c b/tools/labs/templates/kernel_modules/5-oops-mod/oops_mod.c new file mode 100644 index 00000000000000..9fd1448572a94a --- /dev/null +++ b/tools/labs/templates/kernel_modules/5-oops-mod/oops_mod.c @@ -0,0 +1,27 @@ +#include +#include +#include +#include + +MODULE_DESCRIPTION("Oops generating module"); +MODULE_AUTHOR("So2rul Esforever"); +MODULE_LICENSE("GPL"); + +static int my_oops_init(void) +{ + char *p = 0; + + pr_info("before init\n"); + *p = 'a'; + pr_info("after init\n"); + + return 0; +} + +static void my_oops_exit(void) +{ + pr_info("module goes all out\n"); +} + +module_init(my_oops_init); +module_exit(my_oops_exit); diff --git a/tools/labs/templates/kernel_modules/6-cmd-mod/Kbuild b/tools/labs/templates/kernel_modules/6-cmd-mod/Kbuild new file mode 100644 index 00000000000000..2c5fe9cfd4de33 --- /dev/null +++ b/tools/labs/templates/kernel_modules/6-cmd-mod/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = cmd_mod.o diff --git a/tools/labs/templates/kernel_modules/6-cmd-mod/cmd_mod.c b/tools/labs/templates/kernel_modules/6-cmd-mod/cmd_mod.c new file mode 100644 index 00000000000000..3bd758897f3600 --- /dev/null +++ b/tools/labs/templates/kernel_modules/6-cmd-mod/cmd_mod.c @@ -0,0 +1,26 @@ +#include +#include +#include + +MODULE_DESCRIPTION("Command-line args module"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +static char *str = "the worm"; + +module_param(str, charp, 0000); +MODULE_PARM_DESC(str, "A simple string"); + +static int __init cmd_init(void) +{ + pr_info("Early bird gets %s\n", str); + return 0; +} + +static void __exit cmd_exit(void) +{ + pr_info("Exit, stage left\n"); +} + +module_init(cmd_init); +module_exit(cmd_exit); diff --git a/tools/labs/templates/kernel_modules/7-list-proc/Kbuild b/tools/labs/templates/kernel_modules/7-list-proc/Kbuild new file mode 100644 index 00000000000000..45eb7676b7ec51 --- /dev/null +++ b/tools/labs/templates/kernel_modules/7-list-proc/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = list_proc.o diff --git a/tools/labs/templates/kernel_modules/7-list-proc/list_proc.c b/tools/labs/templates/kernel_modules/7-list-proc/list_proc.c new file mode 100644 index 00000000000000..96a659bd277f03 --- /dev/null +++ b/tools/labs/templates/kernel_modules/7-list-proc/list_proc.c @@ -0,0 +1,35 @@ +#include +#include +#include +/* TODO: add missing headers */ +#include + +MODULE_DESCRIPTION("List current processes"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +static int my_proc_init(void) +{ + struct task_struct *p; + + /* TODO/2: print current process pid and its name */ + pr_info("Current process: pid = %d; comm = %s\n", + current->pid, current->comm); + + /* TODO/3: print the pid and name of all processes */ + pr_info("\nProcess list:\n\n"); + for_each_process(p) + pr_info("pid = %d; comm = %s\n", p->pid, p->comm); + + return 0; +} + +static void my_proc_exit(void) +{ + /* TODO/2: print current process pid and name */ + pr_info("Current process: pid = %d; comm = %s\n", + current->pid, current->comm); +} + +module_init(my_proc_init); +module_exit(my_proc_exit); diff --git a/tools/labs/templates/kernel_modules/8-kprobes/Kbuild b/tools/labs/templates/kernel_modules/8-kprobes/Kbuild new file mode 100644 index 00000000000000..3681cb88f93350 --- /dev/null +++ b/tools/labs/templates/kernel_modules/8-kprobes/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = kprobes.o diff --git a/tools/labs/templates/kernel_modules/8-kprobes/kprobes.c b/tools/labs/templates/kernel_modules/8-kprobes/kprobes.c new file mode 100644 index 00000000000000..21551c5169d5d3 --- /dev/null +++ b/tools/labs/templates/kernel_modules/8-kprobes/kprobes.c @@ -0,0 +1,92 @@ +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Probes module"); +MODULE_AUTHOR("Kernel Hacker"); +MODULE_LICENSE("GPL"); + +/* + * Pre-entry point for do_execveat_common. + */ +static int my_do_execveat_common(int fd, struct filename * filename, + char __user *__user *argv, + char __user *__user *envp, + int flags) +{ + pr_info("do_execveat_common for %s %s(%d) \n", + filename->name, current->comm, current->pid); + /* Always end with a call to jprobe_return(). */ + jprobe_return(); + /*NOTREACHED*/ + return 0; +} + +static struct jprobe my_jprobe = { + .entry = (kprobe_opcode_t *) my_do_execveat_common +}; + +static int my_ret_handler(struct kretprobe_instance *ri, struct pt_regs *regs) +{ + /* TODO/3: print return value, parent process PID and process PID. */ + unsigned long ret_value = regs_return_value(regs); + pr_info("fork for process (PID: %d, PPID: %d) returned with value %ld\n", + current->pid, current->parent->pid, ret_value); + return 0; +} + +static struct kretprobe my_kretprobe = { + .handler = my_ret_handler, +}; + +static int my_probe_init(void) +{ + int ret; + + my_jprobe.kp.addr = + (kprobe_opcode_t *) kallsyms_lookup_name("do_execveat_common"); + if (my_jprobe.kp.addr == NULL) { + pr_info("Couldn't find %s to plant jprobe\n", "do_execveat_common"); + return -1; + } + + ret = register_jprobe(&my_jprobe); + if (ret < 0) { + pr_info("register_jprobe failed, returned %d\n", ret); + return -1; + } + pr_info("Planted jprobe at %p, handler addr %p\n", my_jprobe.kp.addr, + my_jprobe.entry); + + /* TODO/14: Find address of do_fork and register kretprobe. */ + my_kretprobe.kp.addr = + (kprobe_opcode_t *) kallsyms_lookup_name("_do_fork"); + if (my_kretprobe.kp.addr == NULL) { + pr_info("Couldn't find %s to plant jprobe\n", "do_fork"); + return -1; + } + + ret = register_kretprobe(&my_kretprobe); + if (ret < 0) { + pr_info("register_kretprobe failed, returned %d\n", ret); + return -1; + } + pr_info("Planted kretprobe at %p, handler addr %p\n", + my_kretprobe.kp.addr, my_kretprobe.handler); + + return 0; +} + +static void my_probe_exit(void) +{ + unregister_jprobe(&my_jprobe); + pr_info("jprobe unregistered\n"); + /* TODO/2: Uregister kretprobe. */ + unregister_kretprobe(&my_kretprobe); + pr_info("kretprobe unregistered\n"); +} + +module_init(my_probe_init); +module_exit(my_probe_exit); diff --git a/tools/labs/templates/kernel_modules/9-kdb/Kbuild b/tools/labs/templates/kernel_modules/9-kdb/Kbuild new file mode 100644 index 00000000000000..4453b28ab39c4d --- /dev/null +++ b/tools/labs/templates/kernel_modules/9-kdb/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = hello_kdb.o diff --git a/tools/labs/templates/kernel_modules/9-kdb/hello_kdb.c b/tools/labs/templates/kernel_modules/9-kdb/hello_kdb.c new file mode 100644 index 00000000000000..9e730cad57af9d --- /dev/null +++ b/tools/labs/templates/kernel_modules/9-kdb/hello_kdb.c @@ -0,0 +1,144 @@ +#include +#include +#include + +int write_address; +EXPORT_SYMBOL(write_address); + +noinline void dummy_func18(void) +{ + panic("Hello KDB has paniced!"); +} +noinline void dummy_func17(void) +{ + dummy_func18(); +} +noinline void dummy_func16(void) +{ + dummy_func17(); +} +noinline void dummy_func15(void) +{ + dummy_func16(); +} +noinline void dummy_func14(void) +{ + dummy_func15(); +} +noinline void dummy_func13(void) +{ + dummy_func14(); +} +noinline void dummy_func12(void) +{ + dummy_func13(); +} +noinline void dummy_func11(void) +{ + dummy_func12(); +} +noinline void dummy_func10(void) +{ + dummy_func11(); +} +noinline void dummy_func9(void) +{ + dummy_func10(); +} +noinline void dummy_func8(void) +{ + dummy_func9(); +} +noinline void dummy_func7(void) +{ + dummy_func8(); +} +noinline void dummy_func6(void) +{ + dummy_func7(); +} +noinline void dummy_func5(void) +{ + dummy_func6(); +} +noinline void dummy_func4(void) +{ + dummy_func5(); +} +noinline void dummy_func3(void) +{ + dummy_func4(); +} +noinline void dummy_func2(void) +{ + dummy_func3(); +} +noinline void dummy_func1(void) +{ + dummy_func2(); +} + +static int hello_proc_show(struct seq_file *m, void *v) { + seq_printf(m, "Hello proc!\n"); + return 0; +} + +static int hello_proc_open(struct inode *inode, struct file *file) { + return single_open(file, hello_proc_show, NULL); +} + +static int edit_write(struct file *file, const char *buffer, + size_t count, loff_t *data) +{ + write_address = 1; + return count; +} + +static int bug_write(struct file *file, const char *buffer, + size_t count, loff_t *data) +{ + dummy_func1(); + return count; +} + +static const struct file_operations edit_proc_fops = { + .owner = THIS_MODULE, + .open = hello_proc_open, + .read = seq_read, + .write = edit_write, + .llseek = seq_lseek, + .release = single_release, +}; + +static const struct file_operations bug_proc_fops = { + .owner = THIS_MODULE, + .open = hello_proc_open, + .read = seq_read, + .write = bug_write, + .llseek = seq_lseek, + .release = single_release, +}; + +static int __init hello_proc_init(void) { + struct proc_dir_entry *file; + file = proc_create("hello_kdb_bug", 0, NULL, &bug_proc_fops); + if (file == NULL) { + return -ENOMEM; + } + + file = proc_create("hello_kdb_break", 0, NULL, &edit_proc_fops); + if (file == NULL) { + remove_proc_entry("hello_kdb_bug", NULL); + return -ENOMEM; + } + return 0; +} + +static void __exit hello_proc_exit(void) { + remove_proc_entry("hello_kdb_bug", NULL); + remove_proc_entry("hello_kdb_break", NULL); +} + +MODULE_LICENSE("GPL"); +module_init(hello_proc_init); +module_exit(hello_proc_exit); From 38d1472971db32e55b4c8fee4d8f179b81b02ce8 Mon Sep 17 00:00:00 2001 From: Octavian Purdila Date: Sat, 1 Jul 2017 01:24:57 +0300 Subject: [PATCH 003/297] labs: add kernel api lab Add the documentation and templates for the kernel modules lab which focuses on: familiarizing with the basic Linux kernel API, describing memory allocation and locking mechanism. Signed-off-by: Octavian Purdila Signed-off-by: Daniel Baluta --- Documentation/labs/index.rst | 1 + Documentation/labs/kernel_api.rst | 788 ++++++++++++++++++ tools/labs/templates/kernel_api/1-mem/Kbuild | 3 + tools/labs/templates/kernel_api/1-mem/mem.c | 46 + .../templates/kernel_api/2-sched-spin/Kbuild | 3 + .../kernel_api/2-sched-spin/sched-spin.c | 40 + .../labs/templates/kernel_api/3-memory/Kbuild | 3 + .../templates/kernel_api/3-memory/memory.c | 71 ++ tools/labs/templates/kernel_api/4-list/Kbuild | 3 + tools/labs/templates/kernel_api/4-list/list.c | 100 +++ .../templates/kernel_api/5-list-full/Kbuild | 3 + .../kernel_api/5-list-full/list-full.c | 145 ++++ .../templates/kernel_api/6-list-sync/Kbuild | 3 + .../kernel_api/6-list-sync/list-sync.c | 173 ++++ .../templates/kernel_api/7-list-test/Kbuild | 3 + .../kernel_api/7-list-test/list-test.c | 32 + 16 files changed, 1417 insertions(+) create mode 100644 Documentation/labs/kernel_api.rst create mode 100644 tools/labs/templates/kernel_api/1-mem/Kbuild create mode 100644 tools/labs/templates/kernel_api/1-mem/mem.c create mode 100644 tools/labs/templates/kernel_api/2-sched-spin/Kbuild create mode 100644 tools/labs/templates/kernel_api/2-sched-spin/sched-spin.c create mode 100644 tools/labs/templates/kernel_api/3-memory/Kbuild create mode 100644 tools/labs/templates/kernel_api/3-memory/memory.c create mode 100644 tools/labs/templates/kernel_api/4-list/Kbuild create mode 100644 tools/labs/templates/kernel_api/4-list/list.c create mode 100644 tools/labs/templates/kernel_api/5-list-full/Kbuild create mode 100644 tools/labs/templates/kernel_api/5-list-full/list-full.c create mode 100644 tools/labs/templates/kernel_api/6-list-sync/Kbuild create mode 100644 tools/labs/templates/kernel_api/6-list-sync/list-sync.c create mode 100644 tools/labs/templates/kernel_api/7-list-test/Kbuild create mode 100644 tools/labs/templates/kernel_api/7-list-test/list-test.c diff --git a/Documentation/labs/index.rst b/Documentation/labs/index.rst index 9af739f079fffa..222827a9dc201b 100644 --- a/Documentation/labs/index.rst +++ b/Documentation/labs/index.rst @@ -32,3 +32,4 @@ then point your browser at **Documentation/output/labs/index.html**. vm.rst exercises.rst kernel_modules.rst + kernel_api.rst diff --git a/Documentation/labs/kernel_api.rst b/Documentation/labs/kernel_api.rst new file mode 100644 index 00000000000000..f2daaa9e5e6cca --- /dev/null +++ b/Documentation/labs/kernel_api.rst @@ -0,0 +1,788 @@ +========== +Kernel API +========== + +Lab objectives +============== + + * Familiarize yourself with the basic Linux kernel API + * Description of memory allocation mechanisms + * Description of locking mechanisms + +Overview +======== + +Inside the current lab we present a set of concepts and basic functions required +for starting Linux kernel programming. It is important to note that kernel +programming differs greatly from user space programming. The kernel is a +stand-alone entity that can not use libraries in user-space (not even libc). +As a result, the usual user-space functions (printf, malloc, free, open, read, +write, memcpy, strcpy, etc.) can no longer be used. In conclusion, kernel +programming is based on a totally new and independent API that is unrelated to +the user-space API, whether we refer to POSIX or ANSI C (standard C language +library functions). + +Accessing memory +================ + +An important difference in kernel programming is how to access and allocate +memory. Due to the fact that kernel programming is very close to the physical +machine, there are important rules for memory management. First, it works with +several types of memory: + + * Physical memory + * Virtual memory from the kernel address space + * Virtual memory from a process's address space + * Resident memory - we know for sure that the accessed pages are present in + physical memory + +Virtual memory in a process's address space can not be considered resident due +to the virtual memory mechanisms implemented by the operating system: pages may +be swapped or simply may not be present in physical memory as a result of the +demand paging mechanism. The memory in the kernel address space can be resident +or not. Both the data and code segments of a module and the kernel stack of a +process are resident. Dynamic memory may or may not be a resident, depending +on how it is allocated. + +When working with resident memory, things are simple: memory can be accessed at +any time. But if working with non-resident memory, then it can only be accessed +from certain contexts. Non-resident memory can only be accessed from the +process context. Accessing non-resident memory from the context of the +interruption has unpredictable results and, therefore, when the operating +system detects such access, it will take drastic measures: blocking or +resetting the system to prevent serious corruption. + +The virtual memory of a process can not be accessed directly from the kernel. +In general, it is totally discouraged to access the address space of a process, +but there are situations where a device driver needs to do it. The typical case +is where the device driver needs to access a buffer from the user-space. In +this case, the device driver must use special features and not directly access +the buffer. This is necessary to prevent access to invalid memory areas. + +Another difference from the userpace scheduling, relative to memory, is due to +the stack, a stack whose size is fixed and limited. In the Linux 2.6.x kernel, +a stack of 4K , and a stack of 12K is used in Windows. For this reason, the +allocation of large-scale stack structures or the use of recursive calls should +be avoided. + +Contexts of execution +===================== + +In relation to kernel execution, we distinguish two contexts: process context +and interrupt context. We are in the process context when we run code as a +result of a system call or when we run in the context of a thread kernel. When +we run in a routine to handle an interrupt or a deferrable action, we run in +an interrupt context. + +Some of the kernel API calls can block the current process. Common examples are +using a semaphore or waiting for a condition. In this case, the process is +put into the WAITING state and another process is running. An interesting +situation occurs when a function that can lead to suspension of the current +process is called from an interrupt context. In this case, there is no current +process, and therefore the results are unpredictable. Whenever the operating +system detects this condition will generate an error condition that will cause +the operating system to shut down. + +Locking +======= + +One of the most important features of kernel programming is parallelism. Linux +support SMP systems with multiple processors and kernel preemptivity. This makes +kernel programming more difficult because access to global variables must be +synchronized with either spinlock primitives or blocking primitives. Although +it is recommended to use blocking primitives, they can not be used in an interrupt +context, so the only locking solution in the context of the interrupt is spinlocks. + +Spinlocks are used to achieve mutual exclusion. When it can not get access to +the critical region, it does not suspend the current process, but it use the +busy-waiting mechanism (waiting in a loop while releasing the lock). The code +that runs in the critical region protected by a spinlock is not allowed to +suspend the current process (it must adhere to the execution conditions in the +context of an interrupt). Moreover, the CPU will not be released except for +interrupts. Due to the mechanism used, it is important that a spinlock be +detained as little time as possible. + +Preemptivity +============ + +Linux uses a preemptive kernels. The notion of preemptive multitasking should not +be confused with the notion of preemptive kernel. The notion of preemptive multitasking +refers to the fact that the operating system interrupts a process by force when +it expires its quantum of time and runs in user-space to run another process. +A kernel is preemptive if a process running in kernel mode (as a result of a system call) +can be interrupted to run another process. + +Because of preemptivity, when we share resources between two portions of code +that can run from different process contexts, we need to protect ourselves with +synchronization primitives, even with the single processor. + +Linux Kernel API +================ + +Convention indicating errors +---------------------------- + +For Linux kernel programming, the convention used to call functions to indicate +success is the same as UNIX programming: 0 for success, or a value other than 0 +for failure. For failures negative values are returned as shown in the example below: + +.. code-block:: c + + if (alloc_memory() != 0) + return -ENOMEM; + + if (user_parameter_valid() != 0) + return -EINVAL; + +The exhaustive list of errors and a summary explanation can be found in +``include/asm-generic/errno-base.h`` and ``includes/asm-generic/ernno.h``. + +Strings of characters +--------------------- + +In Linux, the kernel programmer is provided with the usual routine functions: +``strcpy``, ``strncpy``, ``strlcpy``, ``strcat``, ``strncat``, ``strlcat``, +``strcmp``, ``strncmp``, ``strnicmp``, ``strnchr``, ``strrchr``, ``strrchr``, +``strstr``, ``strlen``, ``memset``, ``memmove``, ``memcmp``, etc. These functions +are declared in the ``include/linux/string.h`` header and are implemented in the +kernel in the ``lib/string.c`` file. + +printk +------ + +The printf equivalent in the kernel is printk , defined in +``include/linux/printk.h``. The printk syntax is very similar to printf. The first +parameter of printk decides the message category in which the current message falls: + +.. code-block:: c + + #define KERN_EMERG "<0>" /* system is unusable */ + #define KERN_ALERT "<1>" /* action must be taken immediately */ + #define KERN_CRIT "<2>" /* critical conditions */ + #define KERN_ERR "<3>" /* error conditions */ + #define KERN_WARNING "<4>" /* warning conditions */ + #define KERN_NOTICE "<5>" /* normal but significant condition */ + #define KERN_INFO "<6>" /* informational */ + #define KERN_DEBUG "<7>" /* debug-level messages */ + +Thus, a warning message in the kernel would be sent with: + +.. code-block:: c + + printk(KERN_WARNING "my_module input string %s\n", buff); + + +If the logging level is missing from the printk call, logging is done with the +default level at the time of the call. One thing to keep in mind is that +messages sent with printk are only visible on the console and only if their +level exceeds the default level set on the console. + +To reduce the size of lines when using printk, it is recommended to use the +following help functions instead of directly using the printk call: + +.. code-block:: c + + pr_emerg(fmt, ...); /* similar with printk(KERN_EMERG pr_fmt(fmt), ...); */ + pr_alert(fmt, ...); /* similar with printk(KERN_ALERT pr_fmt(fmt), ...); */ + pr_crit(fmt, ...); /* similar with printk(KERN_CRIT pr_fmt(fmt), ...); */ + pr_err(fmt, ...); /* similar with printk(KERN_ERR pr_fmt(fmt), ...); */ + pr_warning(fmt, ...); /* similar with printk(KERN_WARNING pr_fmt(fmt), ...); */ + pr_warn(fmt, ...); /* similar with cu printk(KERN_WARNING pr_fmt(fmt), ...); */ + pr_notice(fmt, ...); /* similar with printk(KERN_NOTICE pr_fmt(fmt), ...); */ + pr_info(fmt, ...); /* similar with printk(KERN_INFO pr_fmt(fmt), ...); */ + +A special case is pr_debug that calls the printk function only when the DEBUG +macro is defined or if dynamic debugging is used. + + +Memory allocation +----------------- + +In Linux only resident memory can be allocated, using kmalloc call. A typical kmalloc +call is presented below: + +.. code-block:: c + + #include + + string = kmalloc (string_len + 1, GFP_KERNEL); + if (!string) { + //report error: -ENOMEM; + } + +As you can see, the first parameter indicates the size in bytes of the allocated +area. The function returns a pointer to a memory area that can be directly used +in the kernel, or NULL if memory could not be allocated. The second parameter +specifies how allocation should be done and the most commonly used values are: + + * ``GFP_KERNEL`` - using this value may cause the current process to be + suspended. Thus, can not be used in the interrupt context. + * ``GFP_ATOMIC`` - when using this value it ensures that the kmalloc function + does not suspend the current process. Can be used anytime. + +Complement to the kmalloc function is ``kfree``, a function that receives as +argument an area allocated by kmalloc. This feature does not suspend the current +process and can therefore be called from any context. + +lists +----- + +Because linked lists are often used, the Linux kernel API provides a unified +way of defining and using lists. This involves using a list_head structure +element in the structure we want to consider as a list node. The list_head +list_head is defined in ``include/linux/list.h`` along with all the other +functions that work on the lists. The following code shows the definition of +the list_head list_head and the use of an element of this type in another +well-known structure in the Linux kernel: + +.. code-block:: c + + struct list_head { + struct list_head *next, *prev; + }; + + struct task_struct { + ... + struct list_head children; + ... + }; + +The usual routines for working with lists are as follows: + + * ``LIST_HEAD(name)`` is used to declare the sentinel of a list + * ``INIT_LIST_HEAD(struct list_head *list)`` is used to initialize the sentinel + of a list when dynamic allocation is made by setting the value of the next and + prev to list fields. + * ``list_add(struct list_head *new, struct list_head *head)`` adds the new + element after the head element. + * ``list_del(struct list_head *entry)`` deletes the item at the entry address of + the list it belongs to. + * ``list_entry(ptr, type, member)`` returns the type structure that contains the + element ptr the member with the member name within the structure. + * ``list_for_each(pos, head)`` iterates a list using pos as a cursor. + * ``list_for_each_safe(pos, n, head)`` iterates a list, using pos as a cursor and + and ``n`` as a temporary cursor. This macro is used to delete an item from the list. + +The following code shows how to use these routines: + +.. code-block:: c + + #include + #include + + struct pid_list { + pid_t pid; + struct list_head list; + }; + + LIST_HEAD(my_list); + + static int add_pid(pid_t pid) + { + struct pid_list *ple = kmalloc(sizeof *ple, GFP_KERNEL); + + if (!ple) + return -ENOMEM; + + ple->pid = pid; + list_add(&ple->list, &my_list); + + return 0; + } + + static int del_pid(pid_t pid) + { + struct list_head *i, *tmp; + struct pid_list *ple; + + list_for_each_safe(i, tmp, &my_list) { + ple = list_entry(i, struct pid_list, list); + if (ple->pid == pid) { + list_del(i); + kfree(ple); + return 0; + } + } + + return -EINVAL; + } + + static void destroy_list(void) + { + struct list_head *i, *n; + struct pid_list *ple; + + list_for_each_safe(i, n, &my_list) { + ple = list_entry(i, struct pid_list, list); + list_del(i); + kfree(ple); + } + } + +The evolution of the list can be seen in the following figure: + +You see the stack type behavior introduced by the list_add macro, and the use +of a sentinel. + +From the above example, it is noted that the way to define and use a list +(double-linked) is generic and, at the same time, does not introduce an +additional overhead. The list_head list_head is used to maintain the links +between the list elements. It is also noted that list iteration is also done +with this structure, and the list item is list_entry using list_entry . This +idea of implementing and using a list is not new, as The Art of Computer +Programming in The Art of Computer Programming by Donald Knuth in the 1980s. + +Several kernel list functions and macrodefinitions are presented and explained +in the include/linux/list.h header. + +Spinlock +-------- + +spinlock_t (defined in ``linux/spinlock.h``) is the basic type that implements +the spinlock concept in Linux. It describes a spinlock, and the operations +associated with a spinlock are spin_lock_init, spin_lock, spin_unlock . An +example of use is given below: + +.. code-block:: c + + #include + + DEFINE_SPINLOCK(lock1); + spinlock_t lock2; + + spin_lock_init(&lock2); + + spin_lock(&lock1); + /* critical region */ + spin_unlock(&lock1); + + spin_lock(&lock2); + /* critical region */ + spin_unlock(&lock2); + + +In Linux, you can use read / write spinlocks useful for writer-reader issues. +These types of locks are identified by ``rwlock_t``, and the functions that can +work on a read / write spinlock are ``rwlock_init``, ``read_lock``, ``write_lock``. +An example of use: + + +.. code-block:: c + + #include + + DEFINE_RWLOCK(lock); + + struct pid_list { + pid_t pid; + struct list_head list; + }; + + int have_pid(struct list_head *lh, int pid) + { + struct list_head *i; + void *elem; + + read_lock(&lock); + list_for_each(i, lh) { + struct pid_list *pl = list_entry(i, struct pid_list, list); + if (pl->pid == pid) { + read_unlock(&lock); + return 1; + } + } + read_unlock(&lock); + + return 0; + } + + void add_pid(struct list_head *lh, struct pid_list *pl) + { + write_lock(&lock); + list_add(&pl->list, lh); + write_unlock(&lock); + } + +mutex +----- + +A mutex is a variable of the ``struct mutex`` type (defined in linux/mutex.h ). +Functions and macros for working with mutex are listed below: + +.. code-block:: c + + #include + + /* functions for mutex initialization */ + void mutex_init(struct mutex *mutex); + DEFINE_MUTEX(name); + + /* functions for mutex acquire */ + void mutex_lock(struct mutex *mutex); + + /* functions for mutex release */ + void mutex_unlock(struct mutex *mutex); + +Operations are similar to classic mutex operations in userspace or spinlock +operations: the mutex is acquired before entering the critical area and +releases to the critical area. Unlike spin-locks, these operations can only be +used in process context. + +.. _atomic-variables: + +Atomic variables +---------------- + +Often, you only need to synchronize access to a simple variable, such as a +counter. For this, an ``atomic_t`` can be used (defined in include/linux/atomic.h +) that holds an integer value. Below are some operations that can be performed on +an atomic_t variable. + +.. code-block:: c + + #include + + void atomic_set(atomic_t *v, int i); + int atomic_read(atomic_t *v); + void atomic_add(int i, atomic_t *v); + void atomic_sub(int i, atomic_t *v); + void atomic_inc(atomic_t *v); + void atomic_dec(atomic_t *v); + int atomic_inc_and_test(atomic_t *v); + int atomic_dec_and_test(atomic_t *v); + int atomic_cmpxchg(atomic_t *v, int old, int new); + +Use of atomic variables +*********************** + +A common way of using atomic variables is to maintain the status of an action +(eg a flag). So we can use an atomic variable to mark exclusive actions. For +example, we consider that an atomic variable can have the LOCKED and UNLOCKED +values, and if LOCKED then a specific function -EBUSY with an -EBUSY message. +The mode of use is shown schematically in the code below: + +.. code-block:: c + + #define LOCKED 0 + #define UNLOCKED 1 + + static atomic_t flag; + + static int my_acquire(void) + { + int initial_flag; + + /* + * Check if flag is UNLOCKED; if not, lock it and do it atomically. + * + * This is the atomic equivalent of + * if (flag == UNLOCKED) + * flag = LOCKED; + * else + * return -EBUSY; + */ + initial_flag = atomic_cmpxchg(&flag, UNLOCKED, LOCKED); + if (initial_flag == LOCKED) { + printk(KERN_ALERT "Already locked.\n"); + return -EBUSY; + } + + /* Do your thing after getting the lock. */ + [...] + } + + static void my_release(void) + { + /* Release flag; mark it as unlocked. */ + atomic_set(&flag, UNLOCKED); + } + + void my_init(void) + { + [...] + /* Atomic variable is initially unlocked. */ + atomic_set(&flag, UNLOCKED); + + [...] + } + + +The above code is the equivalent of using a trylock (such as pthread_mutex_trylock). + +We can also use a variable to remember the size of a buffer and for atomic +updates. For example, the code below: + +.. code-block:: c + + static unsigned char buffer[MAX_SIZE]; + static atomic_t size; + + static void add_to_buffer(unsigned char value) + { + buffer[atomic_read(&size)] = value; + atomic_inc(&size); + } + + static unsigned char remove_from_buffer(void) + { + unsigned char value; + + value = buffer[atomic_read(&size)]; + atomic_dec(&size); + + return value + } + + static void reset_buffer(void) + { + atomic_set(&size, 0); + } + + void my_init(void) + { + [...] + /* Initilized buffer and size. */ + atomic_set(&size, 0); + memset(buffer, 0, sizeof(buffer)); + + [...] + } + +Atomic bitwise operations +------------------------- + +The kernel provides a set of functions (in ``asm/bitops.h``) that modify or test +bits in an atomic way. + +.. code-block:: c + + #include + + void set_bit(int nr, void *addr); + void clear_bit(int nr, void *addr); + void change_bit(int nr, void *addr); + int test_and_set_bit(int nr, void *addr); + int test_and_clear_bit(int nr, void *addr); + int test_and_change_bit(int nr, void *addr); + +Addr represents the address of the memory area whose bits are being modified or +tested and the nr is the bit on which the operation is performed. + +Exercises +========= + +.. important:: + + .. include:: exercises-summary.hrst + .. |LAB_NAME| replace:: kernel_api + +0. Intro +-------- + +Using |LXR|_ find the definitions of the following symbols in the Linux kernel: + + * :c:type:`struct list_head` + * :c:type:`INIT_LIST_HEAD` + * :c:func:`list_add` + * :c:func:`list_for_each` + * :c:func:`list_entry` + * :c:func:`container_of` + * :c:func:`offsetof` + +1. Memory allocation in Linux kernel +------------------------------------ + +Generate the skeleton for the task named **1-mem** and browse the +contents of the ``mem.c`` file. Observe the use of kmalloc call for +memory allocation. + + 1. Compile the source code and load the ``mem.ko`` module using ``insmod``. + 2. View the kernel messages using the ``dmesg`` command. + 3. Unload the kernel module using the ``rmmod mem`` command. + +.. note:: Review the `Memory Allocation`_ section in the lab. + +2. Sleeping in atomic context +----------------------------- + +Generate the skeleton for the task named **2-sched-spin** and browse +the contents of ``sched-spin.c`` file. + + 1. Compile the source code and load the module. + 2. Notice that it is waiting for 5 seconds until the insertion + order is complete. + 3. Unload the kernel mode. + 4. Look for the lines marked with TODO0 to create an atomic + section. Re-compile the source code and reload the module into + the kernel. + +You should now get an error. Look at the stack trace. What is the +cause of the error? + +.. hint:: In the error message, follow the line containing the BUG for + a description of the error. You are not allowed to sleep in + atomic context. The atomic context is given by a section + between a lock operation and an unlock on a spinlock. + +.. note:: The schedule_timeout function, corroborated with the + set_current_state macro, forces the current process to wait + S seconds. + +.. note:: Review the `Contexts of execution`_, `Locking` and `Spinlock`_ sections. + +3. Working with kernel memory +----------------------------- + +Generate the skeleton for the task named **3-memory** directory and +browse the contents of the ``memory.c`` file. Notice the comments +marked with TODO. You must allocate 4 structures of type ``struct +task_info`` and initialize them (in ``memory_init``), then print and +free them (in ``memory_exit``). + + 1. (TODO 1) Allocate memory for task_info structure and initialize + its fields: + + * The pid field to the PID transmitted as a parameter; + * The timestamp field to the value of the jiffies variable, + which hold the number of ticks that have occurred since the + system booted. + + 2. (TODO 2) Allocate task_info for current process, parent process, + next process, the next process of the next process. + + 3. (TODO 3) Display the four structures. + + * Use pr_info to display their two fields: pid and timestamp. + + 4. (TODO 4) Release the space occupied by structures (use kfree). + +.. hint:: + * You can access the current process using ``current`` + macro. + * Look for the relevant fields in the task_struct structure + (pid, parent). + * Use the next_task macro. The macro returns the pointer to + the next process of ``struct task_struct *`` type. + +.. note:: The task_struct struct contains two fields to designate the + parent of a task: + + * ``real_parent`` points to the process that created the + task or to process with pid 1 (init) if the parent + completed its execution. + * ``parent`` indicates to the current task parent (the + process that will be reported if the task completes + execution). + + In general, the values of the two fields are the same, but + there are situations where they differ, for example when + using the ptrace system call. + +.. hint:: Review the `Memory allocation`_ section in the lab. + + +4. Working with kernel lists +---------------------------- + +Generate the skeleton for the task named **4-list**. Browse the +contents of the ``list.c`` file and notice the comments marked with +TODO. The current process will add the four structures from the +previous exercise into a list. The list will be built in the +``task_info_add_for_current`` function which is called when module is +loaded. The list will printed and deleted in the ``list_exit`` +function and the ``task_info_purge_list`` function. + + 1. (TODO 1) Complete the task_info_add_to_list function to allocate + a ``task_info`` struct and add it to the list. + + 2. (TODO 2) Complete the task_info_purge_list function to delete + all the elements in the list. + + 3. Compile the kernel module. Load and unload the module by + following the messages displayed by the kernel. + +.. hint:: Review the labs `Lists`_ section. When deleting items from + the list, you will need to use the + :c:func:`list_for_each_safe` or + :c:func:`list_for_each_entry_safe` calls. + +5. Working with kernel lists for process handling +------------------------------------------------- + +Generate the skeleton for the task named **5-list-full**. Browse the +contents of the ``list-full.c`` and notice comments marked with +TODO. In addition to the ``4-list`` functionality we add the +following: + + * A count field showing how many times a process has been "added" + to the list. + * If a process is "added" several times, no new entry is created in + the list, but: + + * Update the timestamp field. + * Increment count. + + * To implement the counter facility, add a ``task_info_find_pid`` + function that searches for a pid in the existing list. + + * If found, return the reference to the task_info struct. If + not, return NULL + + * An expiration facility. If a process was added more than 3 + seconds ago and if it does not have a count greater than 5 then + it is considered expired and is removed from the list. + * The expiration facility is already implemented in the + ``task_info_remove_expired`` function. + + 1. (TODO 1) Implement the task_info_find_pid function. + 3. (TODO 2) Change a field of an item in the list so it does not + expire. + +.. hint:: For TODO 2, extract the first element from the list (the one + referred by head.next) and set the count field to a large + enough value. Use ``atomic_set``. + +6. Synchronizing list work +-------------------------- + +Generate the skeleton for the task named **6-list-sync**. + + 1. Browse the code and look for ``TODO`` string. + 2. Use a spinlock or a read-write lock to synchronize access to the + list. + 3. Compile, load and unload the kernel module. + +.. important:: Always lock data, not code! + +.. note:: Read `Spinlock`_ section of the lab. + +7. Test module calling in our list module +----------------------------------------- + +Generate the skeleton for the task named **7-list-test** and browse +the contents of the ``list-test.c`` file. We'll use it as a test +module. It will call functions exported by the **6-list-sync** +task. The exported functions are the ones marked with **extern** in +``list-test.c`` file. + +To export the above functions from the 6-list-sync/ module, the +following steps are required: + + 1. Functions must not be static. + 2. Use the EXPORT_SYMBOL macro to export the kernel symbols. For + example: ``EXPORT_SYMBOL(task_info_remove_expired)``; . The + macro must be used for each function after the function is + defined. + 3. Remove from the 6-list-sync/ that avoid the expiration of a + list item. + 4. Compile and load the module from 6-list-sync/ . Once loaded, it + exposes exported functions and can be used by the test + module. You can check this by searching for the function names + in /proc/kallsyms before and after loading the module. + 5. Compile the test module and then load it. + 6. Use lsmod to check that the two modules have loaded. What do + you notice? + 7. Unload the kernel test module. + +What should be the unload order of the two modules (6-list-sync and +test)? What if you use another order? diff --git a/tools/labs/templates/kernel_api/1-mem/Kbuild b/tools/labs/templates/kernel_api/1-mem/Kbuild new file mode 100644 index 00000000000000..85f6de99faec52 --- /dev/null +++ b/tools/labs/templates/kernel_api/1-mem/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = mem.o diff --git a/tools/labs/templates/kernel_api/1-mem/mem.c b/tools/labs/templates/kernel_api/1-mem/mem.c new file mode 100644 index 00000000000000..a18029a88d2216 --- /dev/null +++ b/tools/labs/templates/kernel_api/1-mem/mem.c @@ -0,0 +1,46 @@ +/* + * Kernel API lab + * + * mem.c - Memory allocation in Linux + */ + +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Print memory"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +static char *mem; + +static int mem_init(void) +{ + size_t i; + + mem = kmalloc(4096 * sizeof(*mem), GFP_KERNEL); + if (mem == NULL) + goto err_mem; + + pr_info("chars: "); + for (i = 0; i < 4096; i++) { + if (isalpha(mem[i])) + printk("%c ", mem[i]); + } + pr_info("\n"); + + return 0; + +err_mem: + return -1; +} + +static void mem_exit(void) +{ + kfree(mem); +} + +module_init(mem_init); +module_exit(mem_exit); diff --git a/tools/labs/templates/kernel_api/2-sched-spin/Kbuild b/tools/labs/templates/kernel_api/2-sched-spin/Kbuild new file mode 100644 index 00000000000000..440138296e63a1 --- /dev/null +++ b/tools/labs/templates/kernel_api/2-sched-spin/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = sched-spin.o diff --git a/tools/labs/templates/kernel_api/2-sched-spin/sched-spin.c b/tools/labs/templates/kernel_api/2-sched-spin/sched-spin.c new file mode 100644 index 00000000000000..52fc3d2307c89c --- /dev/null +++ b/tools/labs/templates/kernel_api/2-sched-spin/sched-spin.c @@ -0,0 +1,40 @@ +/* + * Kernel API lab + * + * sched-spin.c: Sleeping in atomic context + */ + +#include +#include +#include +#include + +MODULE_DESCRIPTION("Sleep while atomic"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +static int sched_spin_init(void) +{ + spinlock_t lock; + + spin_lock_init(&lock); + + /* TODO 0/1: Use spin_lock to aquire the lock */ + spin_lock(&lock); + + set_current_state(TASK_INTERRUPTIBLE); + /* Try to sleep for 5 seconds. */ + schedule_timeout(5 * HZ); + + /* TODO 0/1: Use spin_unlock to release the lock */ + spin_unlock(&lock); + + return 0; +} + +static void sched_spin_exit(void) +{ +} + +module_init(sched_spin_init); +module_exit(sched_spin_exit); diff --git a/tools/labs/templates/kernel_api/3-memory/Kbuild b/tools/labs/templates/kernel_api/3-memory/Kbuild new file mode 100644 index 00000000000000..a29f7961d2a9e1 --- /dev/null +++ b/tools/labs/templates/kernel_api/3-memory/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = memory.o diff --git a/tools/labs/templates/kernel_api/3-memory/memory.c b/tools/labs/templates/kernel_api/3-memory/memory.c new file mode 100644 index 00000000000000..1d85b71e2d82e3 --- /dev/null +++ b/tools/labs/templates/kernel_api/3-memory/memory.c @@ -0,0 +1,71 @@ +/* + * SO2 lab3 - task 3 + */ + +#include +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Memory processing"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +struct task_info { + pid_t pid; + unsigned long timestamp; +}; + +static struct task_info *ti1, *ti2, *ti3, *ti4; + +static struct task_info *task_info_alloc(int pid) +{ + struct task_info *ti; + + /* TODO 1/5: allocated and initialize a task_info struct */ + ti = kmalloc(sizeof(*ti), GFP_KERNEL); + if (ti == NULL) + return NULL; + ti->pid = pid; + ti->timestamp = jiffies; + + return ti; +} + +static int memory_init(void) +{ + /* TODO 2/1: call task_info_alloc for current pid */ + ti1 = task_info_alloc(current->pid); + + /* TODO 2/1: call task_info_alloc for parent PID */ + ti2 = task_info_alloc(current->parent->pid); + + /* TODO 2/1: call task_info alloc for next process PID */ + ti3 = task_info_alloc(next_task(current)->pid); + + /* TODO 2/1: call text_info_alloc for next process of the nex process */ + ti4 = task_info_alloc(next_task(next_task(current))->pid); + + return 0; +} + +static void memory_exit(void) +{ + + /* TODO 3/4: print ti* field values */ + printk("pid: %d, timestamp: %lu\n", ti1->pid, ti1->timestamp); + printk("pid: %d, timestamp: %lu\n", ti2->pid, ti2->timestamp); + printk("pid: %d, timestamp: %lu\n", ti3->pid, ti3->timestamp); + printk("pid: %d, timestamp: %lu\n", ti4->pid, ti4->timestamp); + + /* TODO 4/4: free ti* structures */ + kfree(ti1); + kfree(ti2); + kfree(ti3); + kfree(ti4); +} + +module_init(memory_init); +module_exit(memory_exit); diff --git a/tools/labs/templates/kernel_api/4-list/Kbuild b/tools/labs/templates/kernel_api/4-list/Kbuild new file mode 100644 index 00000000000000..7187139dbdb7af --- /dev/null +++ b/tools/labs/templates/kernel_api/4-list/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = list.o diff --git a/tools/labs/templates/kernel_api/4-list/list.c b/tools/labs/templates/kernel_api/4-list/list.c new file mode 100644 index 00000000000000..4745b75c59452a --- /dev/null +++ b/tools/labs/templates/kernel_api/4-list/list.c @@ -0,0 +1,100 @@ +/* + * Kernel API lab + * + * list.c: Working with lists + * + */ + +#include +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Use list to process task info"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +struct task_info { + pid_t pid; + unsigned long timestamp; + struct list_head list; +}; + +static struct list_head head; + +static struct task_info *task_info_alloc(int pid) +{ + struct task_info *ti; + + ti = kmalloc(sizeof(*ti), GFP_KERNEL); + if (ti == NULL) + return NULL; + ti->pid = pid; + ti->timestamp = jiffies; + + return ti; +} + +static void task_info_add_to_list(int pid) +{ + struct task_info *ti; + + /* TODO 1/2: Allocate task_info and add it to list */ + ti = task_info_alloc(pid); + list_add(&ti->list, &head); +} + +static void task_info_add_for_current(void) +{ + /* Add current, parent, next and next of next to the list */ + task_info_add_to_list(current->pid); + task_info_add_to_list(current->parent->pid); + task_info_add_to_list(next_task(current)->pid); + task_info_add_to_list(next_task(next_task(current))->pid); +} + +static void task_info_print_list(const char *msg) +{ + struct list_head *p; + struct task_info *ti; + + pr_info("%s: [ ", msg); + list_for_each(p, &head) { + ti = list_entry(p, struct task_info, list); + pr_info("(%d, %lu) ", ti->pid, ti->timestamp); + } + pr_info("]\n"); +} + +static void task_info_purge_list(void) +{ + struct list_head *p, *q; + struct task_info *ti; + + /* TODO 2/5: Iterate over the list and delete all elements */ + list_for_each_safe(p, q, &head) { + ti = list_entry(p, struct task_info, list); + list_del(p); + kfree(ti); + } +} + +static int list_init(void) +{ + INIT_LIST_HEAD(&head); + + task_info_add_for_current(); + + return 0; +} + +static void list_exit(void) +{ + task_info_print_list("before exiting"); + task_info_purge_list(); +} + +module_init(list_init); +module_exit(list_exit); diff --git a/tools/labs/templates/kernel_api/5-list-full/Kbuild b/tools/labs/templates/kernel_api/5-list-full/Kbuild new file mode 100644 index 00000000000000..45358ad9ca1503 --- /dev/null +++ b/tools/labs/templates/kernel_api/5-list-full/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = list-full.o diff --git a/tools/labs/templates/kernel_api/5-list-full/list-full.c b/tools/labs/templates/kernel_api/5-list-full/list-full.c new file mode 100644 index 00000000000000..1184fcb1e91478 --- /dev/null +++ b/tools/labs/templates/kernel_api/5-list-full/list-full.c @@ -0,0 +1,145 @@ +/* + * Kernel API lab + * + * list-full.c: Working with lists (advanced) + */ + +#include +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Full list processing"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +struct task_info { + pid_t pid; + unsigned long timestamp; + atomic_t count; + struct list_head list; +}; + +static struct list_head head; + +static struct task_info *task_info_alloc(int pid) +{ + struct task_info *ti; + + ti = kmalloc(sizeof(*ti), GFP_KERNEL); + if (ti == NULL) + return NULL; + ti->pid = pid; + ti->timestamp = jiffies; + atomic_set(&ti->count, 0); + + return ti; +} + +static struct task_info *task_info_find_pid(int pid) +{ + struct list_head *p; + struct task_info *ti; + + /* TODO 1/5: Look for pid and return task_info or NULL if not found */ + list_for_each(p, &head) { + ti = list_entry(p, struct task_info, list); + if (ti->pid == pid) + return ti; + } + + return NULL; +} + +static void task_info_add_to_list(int pid) +{ + struct task_info *ti; + + ti = task_info_find_pid(pid); + if (ti != NULL) { + ti->timestamp = jiffies; + atomic_inc(&ti->count); + return; + } + + ti = task_info_alloc(pid); + list_add(&ti->list, &head); +} + +static void task_info_add_for_current(void) +{ + task_info_add_to_list(current->pid); + task_info_add_to_list(current->parent->pid); + task_info_add_to_list(next_task(current)->pid); + task_info_add_to_list(next_task(next_task(current))->pid); +} + +static void task_info_print_list(const char *msg) +{ + struct list_head *p; + struct task_info *ti; + + pr_info("%s: [ ", msg); + list_for_each(p, &head) { + ti = list_entry(p, struct task_info, list); + pr_info("(%d, %lu) ", ti->pid, ti->timestamp); + } + pr_info("]\n"); +} + +static void task_info_remove_expired(void) +{ + struct list_head *p, *q; + struct task_info *ti; + + list_for_each_safe(p, q, &head) { + ti = list_entry(p, struct task_info, list); + if (jiffies - ti->timestamp > 3 * HZ && atomic_read(&ti->count) < 5) { + list_del(p); + kfree(ti); + } + } +} + +static void task_info_purge_list(void) +{ + struct list_head *p, *q; + struct task_info *ti; + + list_for_each_safe(p, q, &head) { + ti = list_entry(p, struct task_info, list); + list_del(p); + kfree(ti); + } +} + +static int list_full_init(void) +{ + INIT_LIST_HEAD(&head); + + task_info_add_for_current(); + task_info_print_list("after first add"); + + set_current_state(TASK_INTERRUPTIBLE); + schedule_timeout(5 * HZ); + + return 0; +} + +static void list_full_exit(void) +{ + struct task_info *ti; + + /* TODO 2/2: Ensure that at least one task is not deleted */ + ti = list_entry(head.prev, struct task_info, list); + atomic_set(&ti->count, 10); + + task_info_remove_expired(); + task_info_print_list("after removing expired"); + task_info_purge_list(); +} + +module_init(list_full_init); +module_exit(list_full_exit); diff --git a/tools/labs/templates/kernel_api/6-list-sync/Kbuild b/tools/labs/templates/kernel_api/6-list-sync/Kbuild new file mode 100644 index 00000000000000..8105af70665ff9 --- /dev/null +++ b/tools/labs/templates/kernel_api/6-list-sync/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = list-sync.o diff --git a/tools/labs/templates/kernel_api/6-list-sync/list-sync.c b/tools/labs/templates/kernel_api/6-list-sync/list-sync.c new file mode 100644 index 00000000000000..5d06e760e59aec --- /dev/null +++ b/tools/labs/templates/kernel_api/6-list-sync/list-sync.c @@ -0,0 +1,173 @@ +/* + * Linux API lab + * + * list-sync.c - Synchronize access to a list + */ + +#include +#include +#include +#include +#include +#include + +MODULE_DESCRIPTION("Full list processing with synchronization"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +struct task_info { + pid_t pid; + unsigned long timestamp; + atomic_t count; + struct list_head list; +}; + +static struct list_head head; + +/* TODO: you can use either a spinlock or rwlock, define it here */ +DEFINE_RWLOCK(lock); + +static struct task_info *task_info_alloc(int pid) +{ + struct task_info *ti; + + ti = kmalloc(sizeof(*ti), GFP_KERNEL); + if (ti == NULL) + return NULL; + ti->pid = pid; + ti->timestamp = jiffies; + atomic_set(&ti->count, 0); + + return ti; +} + +static struct task_info *task_info_find_pid(int pid) +{ + struct list_head *p; + struct task_info *ti; + + /* TODO: Protect list, is this read or write access? */ + read_lock(&lock); + list_for_each(p, &head) { + ti = list_entry(p, struct task_info, list); + if (ti->pid == pid) { + /* TODO: Guess why this comment was added here */ + read_unlock(&lock); + return ti; + } + } + /* TODO: critical section ends here */ + read_unlock(&lock); + + return NULL; +} + +static void task_info_add_to_list(int pid) +{ + struct task_info *ti; + + ti = task_info_find_pid(pid); + if (ti != NULL) { + ti->timestamp = jiffies; + atomic_inc(&ti->count); + return; + } + + ti = task_info_alloc(pid); + /* TODO: protect list access, is this read or write access? */ + write_lock(&lock); + list_add(&ti->list, &head); + /* TODO: critical section ends here */ + write_unlock(&lock); +} + +void task_info_add_for_current(void) +{ + task_info_add_to_list(current->pid); + task_info_add_to_list(current->parent->pid); + task_info_add_to_list(next_task(current)->pid); + task_info_add_to_list(next_task(next_task(current))->pid); +} +EXPORT_SYMBOL(task_info_add_for_current); + +void task_info_print_list(const char *msg) +{ + struct list_head *p; + struct task_info *ti; + + pr_info("%s: [ ", msg); + + /* TODO: Protect list, is this read or write access? */ + read_lock(&lock); + list_for_each(p, &head) { + ti = list_entry(p, struct task_info, list); + pr_info("(%d, %lu) ", ti->pid, ti->timestamp); + } + /* TODO: Critical section ends here */ + read_unlock(&lock); + pr_info("]\n"); +} +EXPORT_SYMBOL(task_info_print_list); + +void task_info_remove_expired(void) +{ + struct list_head *p, *q; + struct task_info *ti; + + /* TODO: Protect list, is this read or write access? */ + write_lock(&lock); + list_for_each_safe(p, q, &head) { + ti = list_entry(p, struct task_info, list); + if (jiffies - ti->timestamp > 3 * HZ && atomic_read(&ti->count) < 5) { + list_del(p); + kfree(ti); + } + } + /* TODO: Critical section ends here */ + write_unlock(&lock); +} +EXPORT_SYMBOL(task_info_remove_expired); + +static void task_info_purge_list(void) +{ + struct list_head *p, *q; + struct task_info *ti; + + /* TODO: Protect list, is this read or write access? */ + write_lock(&lock); + list_for_each_safe(p, q, &head) { + ti = list_entry(p, struct task_info, list); + list_del(p); + kfree(ti); + } + /* TODO: Critical sections ends here */ + write_unlock(&lock); +} + +static int list_sync_init(void) +{ + INIT_LIST_HEAD(&head); + + task_info_add_for_current(); + task_info_print_list("after first add"); + + set_current_state(TASK_INTERRUPTIBLE); + schedule_timeout(5 * HZ); + + return 0; +} + +static void list_sync_exit(void) +{ + struct task_info *ti; + + ti = list_entry(head.prev, struct task_info, list); + atomic_set(&ti->count, 10); + + task_info_remove_expired(); + task_info_print_list("after removing expired"); + task_info_purge_list(); +} + +module_init(list_sync_init); +module_exit(list_sync_exit); diff --git a/tools/labs/templates/kernel_api/7-list-test/Kbuild b/tools/labs/templates/kernel_api/7-list-test/Kbuild new file mode 100644 index 00000000000000..324750ee764344 --- /dev/null +++ b/tools/labs/templates/kernel_api/7-list-test/Kbuild @@ -0,0 +1,3 @@ +ccflags-y = -Wno-unused-function -Wno-unused-label -Wno-unused-variable + +obj-m = list-test.o diff --git a/tools/labs/templates/kernel_api/7-list-test/list-test.c b/tools/labs/templates/kernel_api/7-list-test/list-test.c new file mode 100644 index 00000000000000..e21c5592fd2b70 --- /dev/null +++ b/tools/labs/templates/kernel_api/7-list-test/list-test.c @@ -0,0 +1,32 @@ +/* + * SO2 lab3 - task 7 + */ + +#include +#include +#include + +MODULE_DESCRIPTION("Test list processing"); +MODULE_AUTHOR("SO2"); +MODULE_LICENSE("GPL"); + +extern void task_info_add_for_current(void); +extern void task_info_remove_expired(void); +extern void task_info_print_list(const char *msg); + +static int list_test_init(void) +{ + task_info_add_for_current(); + task_info_print_list("after new addition"); + + return 0; +} + +static void list_test_exit(void) +{ + task_info_remove_expired(); + task_info_print_list("after removing expired"); +} + +module_init(list_test_init); +module_exit(list_test_exit); From 696ea201d1d03e556befb0ecc9f1a1c4c1e91a42 Mon Sep 17 00:00:00 2001 From: Octavian Purdila Date: Sat, 1 Jul 2017 01:27:33 +0300 Subject: [PATCH 004/297] labs: add device drivers lab Add documentation and templates for the device drivers labs which focuses on: understanding the concepts behind character device drivers; understading the various operations that can be performed on character device drivers; working with waiting queues. Signed-off-by: Octavian Purdila Signed-off-by: Daniel Baluta --- Documentation/labs/device_drivers.rst | 970 ++++++++++++++++++ Documentation/labs/index.rst | 1 + Documentation/labs/read.png | Bin 0 -> 33915 bytes Documentation/labs/read2.png | Bin 0 -> 33750 bytes Documentation/labs/write.png | Bin 0 -> 33648 bytes Documentation/labs/write2.png | Bin 0 -> 32721 bytes .../extra/char-driver-lin/Kbuild | 3 + .../extra/char-driver-lin/makenode | 9 + .../extra/char-driver-lin/modul.c | 124 +++ .../device_drivers/include/so2_cdev.h | 14 + .../templates/device_drivers/kernel/Kbuild | 3 + .../device_drivers/kernel/so2_cdev.c | 234 +++++ .../templates/device_drivers/user/Makefile | 2 + .../device_drivers/user/so2_cdev_test | Bin 0 -> 746220 bytes .../device_drivers/user/so2_cdev_test.c | 125 +++ 15 files changed, 1485 insertions(+) create mode 100644 Documentation/labs/device_drivers.rst create mode 100644 Documentation/labs/read.png create mode 100644 Documentation/labs/read2.png create mode 100644 Documentation/labs/write.png create mode 100644 Documentation/labs/write2.png create mode 100644 tools/labs/templates/device_drivers/extra/char-driver-lin/Kbuild create mode 100644 tools/labs/templates/device_drivers/extra/char-driver-lin/makenode create mode 100644 tools/labs/templates/device_drivers/extra/char-driver-lin/modul.c create mode 100644 tools/labs/templates/device_drivers/include/so2_cdev.h create mode 100644 tools/labs/templates/device_drivers/kernel/Kbuild create mode 100644 tools/labs/templates/device_drivers/kernel/so2_cdev.c create mode 100644 tools/labs/templates/device_drivers/user/Makefile create mode 100755 tools/labs/templates/device_drivers/user/so2_cdev_test create mode 100644 tools/labs/templates/device_drivers/user/so2_cdev_test.c diff --git a/Documentation/labs/device_drivers.rst b/Documentation/labs/device_drivers.rst new file mode 100644 index 00000000000000..5d9013611a03a5 --- /dev/null +++ b/Documentation/labs/device_drivers.rst @@ -0,0 +1,970 @@ +======================== +Character device drivers +======================== + +Laboratory objectives +===================== + + * understand the concepts behind character device driver + * understand the various operations that can be performed on character devices + * working with waiting queues + +Overview +======== + +In UNIX, hardware devices are accessed by the user through special device +files . These files are grouped into the /dev directory, and system calls +``open``, ``read``, ``write``, ``close``, ``lseek``, ``mmap`` etc. are +redirected by the operating system to the device driver associated with the +physical device. The device driver is a kernel component (usually a module) +that interacts with a hardware device. + +In the UNIX world there are two categories of device files and thus +device drivers: character and block. This division is done by the speed, +volume and way of organizing the data to be transferred from the device to the +system and vice versa. In the first category, there are slow devices, which +manage a small amount of data, and access to data does not require frequent +seek queries. Examples are devices such as keyboard, mouse, serial ports, +sound card, joystick. In general, operations with these devices (read, write) +are performed sequentially byte by byte. The second category includes devices +where data volume is large, data is organized on blocks, and search is common. +Examples of devices that fall into this category are hard drives, cdroms, ram +disks, magnetic tape drives. For these devices, reading and writing is done at +the data block level. + +For the two types of device drivers, the Linux kernel offers different APIs. +If for device devices system calls go directly to device drivers, in case of +block device devices, the drivers do not work directly with system calls. In +the case of block devices, communication between the user-space and the block +device driver is mediated by the file management subsystem and the block device +subsystem . The role of these subsystems is to prepare the device driver's +necessary resources (buffers), to keep the recently read data in the cache +buffer, and to order the read and write operations for performance reasons. + +Majors and minors +================= + +In UNIX, the devices traditionally had a unique, fixed identifier associated +with them. This tradition is preserved in Linux, although identifiers can be +dynamically allocated (for compatibility reasons, most drivers still use static +identifiers). The identifier consists of two parts: major and minor. The first +part identifies the device type (IDE disk, SCSI disk, serial port, etc.) +and the second one identifies the device (first disk, second serial port, +etc.). Most times, the major identifies the driver, while the minor identifies +each physical device served by the driver. In general, a driver will have a +major associate and will be responsible for all minors associated with that +major. + +.. code-block:: bash + + # ls -la /dev/hda? /dev/ttyS? + brw-rw---- 1 root disk 3, 1 2004-09-18 14:51 /dev/hda1 + brw-rw---- 1 root disk 3, 2 2004-09-18 14:51 /dev/hda2 + crw-rw---- 1 root dialout 4, 64 2004-09-18 14:52 /dev/ttyS0 + crw-rw---- 1 root dialout 4, 65 2004-09-18 14:52 /dev/ttyS1 + +As can be seen from the example above, device-type information can be found +using the ls command. The special character files are identified by the ``c`` +character in the first column of the command output, and the block type by the +character ``b``. In columns ``5`` and ``6`` of the result you can see the +major, respectively the minor for each device. + +Certain major identifiers are statically assigned to devices (in the +``Documentation/devices.txt`` file from the kernel sources). When choosing the +identifier for a new device, you can use two methods: static (choose a number +that does not seem to be used already) or dynamically. In /proc/devices are the +loaded devices, along with the major identifier. + +To create a device type file, use the ``mknod`` command; the command receives the +type (``block`` or ``character``), ``major`` and ``minor`` of the device +(``mknod name type major minor``). Thus, if you want to create a character device +named ``mycdev`` with the major ``42`` and minor ``0``, use the command: + +.. code-block:: bash + + $ mknod /dev/mycdev c 42 0 + +To create the block device with the name mybdev with the 240 and minor 0 +command used will be: + +.. code-block:: bash + + $ # mknod /dev/mybdev b 240 0 + +Next, we'll refer drivers for character devices. + +Data structures for a character device +====================================== + +In the kernel, a character-type device is represented by +:c:type:`struct cdev `, a structure used to register it in the +system. Most driver operations use three important structures: +``struct file_operations``, ``struct file`` and ``struct inode``. + +:c:type:`struct file_operations` +-------------------------------- + +As mentioned above, the device device drivers receive unaltered system calls +made by users over device-type files. Consequently, implementation of a character +device drivers means implementing the system calls specific to files: ``open``, +``close``, ``read``, ``write``, ``lseek``, ``mmap``, etc. These operations are +described in the fields of the file_operations structure: + +.. code-block:: c + + #include + + struct file_operations { + struct module *owner; + loff_t (*llseek) (struct file *, loff_t, int); + ssize_t (*read) (struct file *, char __user *, size_t, loff_t *); + ssize_t (*write) (struct file *, const char __user *, size_t, loff_t *); + [...] + long (*unlocked_ioctl) (struct file *, unsigned int, unsigned long); + [...] + int (*open) (struct inode *, struct file *); + int (*flush) (struct file *, fl_owner_t id); + int (*release) (struct inode *, struct file *); + [...] + +It can be noticed that the signature of the function differs from the system +call that the user uses. The operating system sits between the user and +the device driver to simplify implementation in the device driver. + +``open`` does not receive the parameter path or the various parameters that control +the file opening mode. Similarly, ``read``, ``write``, ``release``, ``ioctl``, ``lseek`` +do not receive as a parameter a file descriptor. Instead, these routines receive as +parameters two structures: ``file`` and ``inode``. Both structures represent a file, +but from different perspectives. + +Most parameters for the presented operations have a direct meaning: + * ``file`` and ``inode`` identifies the device type file; + * ``size`` is the number of bytes to be read or written; + * ``offset`` is the displacement to be read or written (to be updated + accordingly); + * ``user_buffer`` user buffer from which it reads / writes; + * ``whence`` is the way to seek (the position where the search operation starts); + * ``cmd`` and ``arg`` are the parameters sent by the users to the ioctl call (IO + control). + +``inode`` and ``file`` structures +--------------------------------- + +An inode represents a file from the point of view of the file system. Attributes +of an inode are the size, rights, times associated with the file. An inode uniquely +identifies a file in a file system. + +The file structure is still a file, but closer to the user's point of view. +From the attributes of the file structure we list: the inode, the file name, +the file opening attributes, the file position. All open files at a given time +have associated a ``file`` structure. + +To understand the differences between inode and file, we will use an analogy +from object-oriented programming: if we consider a class inode, then the files +are objects, that is, instances of the inode class. Inode represents the static +image of the file (the inode has no state ), while the file represents the +dynamic image of the file (the file has state). + +Returning to device drivers, the two entities have almost always standard ways +of using: the inode is used to determine the major and minor of the device on +which the operation is performed, and the file is used to determine the flags +with which the file was opened, but also to save and access (later) private +data. + +The file structure contains, among many fields: + + * ``f_mode``, which specifies read ``FMODE_READ`` (``FMODE_READ``) or write + (``FMODE_WRITE``); + * ``f_flags``, which specifies the file opening flags (``O_RDONLY``, + ``O_NONBLOCK``, ``O_SYNC``, ``O_APPEND``, ``O_TRUNC``, etc.); + * ``f_op``, which specifies the operations associated with the file (pointer to + the ``file_operations`` structure ); + * ``private_data``, a pointer that can be used by the programmer to store + device-specific data; The pointer will be initialized to a memory location + assigned by the programmer. + * ``f_pos``, the offset within the file + +The inode structure contains, among many information, an ``i_cdev`` +field, which is a pointer to the structure that defines the character +device (when the inode corresponds to a character device). + +Implementation of operations +============================ + +To implement a device driver, it is recommended that you create a structure +that contains information about the device, information used in the module. In +the case of a driver for a character device, the structure will contain a cdev +structure field to refer to the device. The following example uses the struct +my_device_data: + +.. code-block:: c + + #include + #include + + struct my_device_data { + struct cdev cdev; + /* my data starts here */ + //... + }; + + static int my_open(struct inode *inode, struct file *file) + { + struct my_device_data *my_data; + + my_data = container_of(inode->i_cdev, struct my_device_data, cdev); + + file->private_data = my_data; + //... + } + + static int my_read(struct file *file, char __user *user_buffer, size_t size, loff_t *offset) + { + struct my_device_data *my_data; + + my_data = (struct my_device_data *) file->private_data; + + //... + } + +.. ** + +A structure like my_device_data will contain the data associated with a device. +The ``cdev`` field (cdev type) is a character-type device and is used to record it +in the system and identify the device. The pointer to the cdev member can be +found using the i_cdev field of the inode structure (using the ``container_of`` +macro). In the private_data field of the file structure, information can be +stored at open which is then available in the ``read``, ``write``, ``release``, etc. +routines. + +Registration and unregistration of character devices +==================================================== + +The registration/registration of a device is made by specifying the major and +minor. The ``dev_t`` type is used to keep the identifiers of a device (both major +and minor) and can be obtained using the MKDEV macro. + +For the static assignment and unallocation of device identifiers, the +``register_chrdev_region`` and ``unregister_chrdev_region`` functions are used: + +.. code-block:: c + + #include + + int register_chrdev_region(dev_t first, unsigned int count, char *name); + void unregister_chrdev_region(dev_t first, unsigned int count); + +.. ** + +It is recommended that device identifiers be dynamically assigned to the +``alloc_chrdev_region`` function. + +The ``my_minor_count`` sequence reserves my_minor_count devices, starting with +``my_major`` major and my_first_minor minor (if the max value for minor is +exceeded, move to the next major): + +.. code-block:: c + + #include + ... + + err = register_chrdev_region(MKDEV(my_major, my_first_minor), my_minor_count, + "my_device_driver"); + if (err != 0) { + /* report error */ + return err; + } + ... + +.. ** + +After assigning the identifiers, the character device will have to be +initialized (cdev_init) and the cdev_add kernel will have to be notified. The +``cdev_add`` function must be called only after the device is ready to receive +calls. Removing a device is done using the ``cdev_del`` function. + +.. code-block:: c + + #include + + void cdev_init(struct cdev *cdev, struct file_operations *fops); + int cdev_add(struct cdev *dev, dev_t num, unsigned int count); + void cdev_del(struct cdev *dev); + +.. ** + +The following sequence registers and initializes MY_MAX_MINORS devices: + +.. code-block:: c + + #include + #include + + #define MY_MAJOR 42 + #define MY_MAX_MINORS 5 + + struct my_device_data { + struct cdev cdev; + /* my data starts here */ + //... + }; + + struct my_device_data devs[MY_MAX_MINORS]; + + const struct file_operations my_fops = { + .owner = THIS_MODULE, + .open = my_open, + .read = my_read, + .write = my_write, + .release = my_release, + .unlocked_ioctl = my_ioctl + }; + + int init_module(void) + { + int i, err; + + err = register_chrdev_region(MKDEV(MY_MAJOR, 0), MY_MAX_MINORS, + "my_device_driver"); + if (err != 0) { + /* report error */ + return err; + } + + for(i = 0; i < MY_MAX_MINORS; i++) { + /* initialize devs[i] fields */ + cdev_init(&devs[i].cdev, &my_fops); + cdev_add(&devs[i].cdev, MKDEV(MY_MAJOR, i), 1); + } + + return 0; + } + +.. ** + +While the following sequence deletes and registers them: + +.. code-block:: c + + void cleanup_module(void) + { + int i; + + for(i = 0; i < MY_MAX_MINORS; i++) { + /* release devs[i] fields */ + cdev_del(&devs[i].cdev); + } + unregister_chrdev_region(MKDEV(MY_MAJOR, 0), MY_MAX_MINORS); + } + + +.. note:: initialization of the struct my_fops used the initialization + of members by name, defined in C99 standard (see designated + initializers and the file_operations structure ). Structure + members who do not explicitly appear in this initialization + will be set to the default value for their type. For + example, after the initialization above, my_fops.mmap will + be NULL. + +Access to the address space of the process +========================================== + +A driver for a device is the interface between an application and hardware. As +a result, we often have to access a given user-space driver device. Accessing +process address space can not be done directly (by de-referencing a user-space +pointer). Direct access of a user-space pointer can lead to incorrect behavior +(depending on architecture, a user-space pointer may not be valid or mapped to +kernel-space), a kernel oops (the user-mode pointer can refer to a non-resident +memory area) or security issues. Proper access to user-space data is done by +calling the macros / functions below: + +.. code-block:: c + + #include + + put_user(type val, type *address); + get_user(type val, type *address); + unsigned long copy_to_user(void __user *to, const void *from, unsigned long n); + unsigned long copy_from_user(void *to, const void __user *from, unsigned long n) + +.. ** + +All macros / functions turn 0 in case of success and another value in case of +error and have the following roles: + + * ``put_user`` put in the user-space at the address address value of the val; + Type can be one on 8, 16, 32, 64 bit (the maximum supported type depends on the + hardware platform); + * ``get_user`` analogue to the previous function, only that val will be set to a + value identical to the value at the user-space address given by address; + * ``copy_to_user`` copies from the kernel-space from the address referenced by + from in user-space to the address referenced by ``to``, ``byte size`` bytes; + * ``copy_from_user`` copies from user-space from the address referenced by from + in kernel-space to the address referenced by ``to``, ``byte size`` bytes. + +A common section of code that works with these functions is: + +.. code-block:: c + + #include + + /* + * Copy at most size bytes to user space. + * Return ''0'' on success and some other value on error. + */ + if (copy_to_user(user_buffer, kernel_buffer, size)) + return -EFAULT; + else + return 0; + +Open and release +================ + +The open function performs the initialization of a device. In most cases, +these operations refer to initializing the device and filling in specific data +(if it is the first open call). The release function is about releasing +device-specific resources: unlocking specific data and closing the device if +the last call is close. + +In most cases, the open function will have the following structure: + +.. code-block:: c + + static int my_open(struct inode *inode, struct file *file) + { + struct my_device_data *my_data = + container_of(inode->i_cdev, struct my_device_data, cdev); + + /* validate access to device */ + file->private_data = my_data; + + /* initialize device */ + ... + + return 0; + } + +.. ** + +A problem that occurs when implementing the ``open`` function is access control. +Sometimes a device needs to be opened once at a time; More specifically, do not +allow the second open before the release . To implement this restriction, you +choose a way to handle an open call for an already open device: it can return +an error (``-EBUSY``), block open calls until a release operation, or shut down +the device before do the open . + +At the user-space call of the open and close functions on the device, call +my_open and my_release in the driver. An example of a user-space call: + +.. code-block:: c + + int fd = open("/dev/my_device", O_RDONLY); + if (fd < 0) { + /* handle error */ + } + + /* do work */ + //.. + + close(fd); + +.. ** + +Read and write +============== + +The read and write operations are reaching the device driver as a +result of a userpsace program calling the read of write system calls: + +.. code-block:: c + + if (read(fd, buffer, size) < 0) { + /* handle error */ + } + + if (write(fd, buffer, size) < 0) { + /* handle error */ + } + +The read and write functions transfer data between the device and the +user-space: the read function reads the data from the device and transfers it +to the user-space, while writing reads the user-space data and writes it to the +device. The buffer received as a parameter is a user-space pointer, which is +why it is necessary to use the copy_to_user or copy_from_user functions. + +The value returned by read or write can be: + + * the number of bytes transferred; if the returned value is less than the size + parameter (the number of bytes requested), then it means that a partial + transfer was made. Most of the time, the user-space app calls the system call + (read or write) function until the required data number is transferred. + * 0 to mark the end of the file in the case of read ; if write returns the + value 0 then it means that no byte has been written and that no error has + occurred; In this case, the user-space application retries the write call. + * a negative value indicating an error code. + +To perform a data transfer consisting of several partial transfers, the +following operations should be performed: + + * transfer the maximum number of possible bytes between the buffer received + as a parameter and the device (writing to the device/reading from the device + will be done from the offset received as a parameter); + * update the offset received as a parameter to the position from which the + next read / write data will begin; + * returns the number of bytes transferred. + +The sequence below shows an example for the read function that takes +into account the internal buffer size, user buffer size and the offset: + +.. code-block:: c + + static int my_read(struct file *file, char __user *user_buffer, + size_t size, loff_t *offset) + { + struct my_device_data *my_data = (struct my_device_data *) file->private_data; + ssize_t len = min(my_data->size - *offset, size); + + if (len <= 0) + return 0; + + /* read data from device in my_data->buffer */ + if (copy_to_user(user_buffer, my_data->buffer + *offset, len)) + return -EFAULT; + + *offset += len; + return len; + } + + +The images below illustrate the read operation and how data is +transferred between the userspace and the driver: + + 1. when the driver has enough data available (starting with the OFFSET + position) to accurately transfer the required size (SIZE) to the user. + 2. when a smaller amount is transferred than required. + +.. image:: read.png + :width: 49 % +.. image:: read2.png + :width: 49 % + +We can look at the read operation implemented by the driver as a response to a +userpace read request. In this case, the driver is responsible for advancing +the offset according to how much it reads and returning the read size (which +may be less than what is required). + +The structure of the write function is similar: + +.. code-block:: c + + static int my_write(struct file *file, const char __user *user_buffer, + size_t size, loff_t * offset) + { + struct my_device_data *my_data = (struct my_device_data *) file->private_data; + ssize_t len = min(my_data->size - *offset, size); + + if (len <= 0) + return 0; + + /* read data from device in my_data->buffer */ + if (copy_to_user(user_buffer, my_data->buffer, len)) + return -EFAULT; + + *offset += len; + return lent; + } + +The write operation will respond to a write request from userspace. In +this case, depending on the maximum driver capacity (MAXSIZ), you can +write more or less than the required size. + +.. image:: write.png + :width: 49 % +.. image:: write2.png + :width: 49 % + +ioctl +===== + +In addition to read and write operations, a driver needs the ability to perform +certain physical device control tasks. These operations are accomplished by +implementing a ioctl function. Initially, the ioctl system call used Big Kernel +Lock. That's why the call was gradually replaced with its unlocked version +called unlocked_ioctl . You can read more on LWN: +http://lwn.net/Articles/119652/ + +.. code-block:: c + + static long my_ioctl (struct file *file, unsigned int cmd, unsigned long arg); + +cmd is the command sent from user-space. If a whole is being sent to the +user-space call, it can be accessed directly. If a buffer is fetched, the arg +value will be a pointer to it, and must be accessed through the copy_to_user or +copy_from_user. + +Before implementing the ioctl function, the numbers corresponding to the +commands must be chosen. One method is to choose consecutive numbers starting +at 0, but it is recommended to use ``_IOC(dir, type, nr, size)`` macrodefinition +to generate ioctl codes. The macrodefinition parameters are as follows: + + * ``dir`` represents the data transfer (``_IOC_NONE`` , ``_IOC_READ``, + ``_IOC_WRITE``. + * ``type`` represents the magic number (Documentation/ioctl-number.txt); + * ``nr`` is the ioctl code for the device; + * ``size`` is the size transferred data. + +The following example shows an implementation for a ioctl function: + +.. code-block:: c + + #include + + #define MY_IOCTL_IN _IOC(_IOC_WRITE, 'k', 1, sizeof(my_ioctl_data)) + + static long my_ioctl (struct file *file, unsigned int cmd, unsigned long arg) + { + struct my_device_data *my_data = + (struct my_device_data*) file->private_data; + my_ioctl_data mid; + + switch(cmd) { + case MY_IOCTL_IN: + if( copy_from_user(&mid, (my_ioctl_data *) arg, + sizeof(my_ioctl_data)) ) + return -EFAULT; + + /* process data and execute command */ + + break; + default: + return -ENOTTY; + } + + return 0; + } + +At the user-space call for the ioctl function, the my_ioctl function of the +driver will be called. An example of such a user-space call: + +.. code-block:: c + + if (ioctl(fd, MY_IOCTL_IN, buffer) < 0) { + /* handle error */ + } + +Waiting queues +============== + +It is often necessary for a thread to wait for an operation to finish, +but it is desirable that this wait is not busy-waiting. Using waiting +queues we can block a thread until an event occurs. When the condition +is satisfied, elsewhere in the kernel, in another process, or +interrupt or deferrable work, we will wake-up the process. + +A waiting queue is a list of processes that are waiting for a specific +event. A queue is defined with the ``wait_queue_head_t`` type and can +be used by the functions/macros: + +.. code-block:: c + + #include + + DECLARE_WAIT_QUEUE_HEAD(wq_name); + + void init_waitqueue_head(wait_queue_head_t *q); + + int wait_event(wait_queue_head_t q, int condition); + + int wait_event_interruptible(wait_queue_head_t q, int condition); + + int wait_event_timeout(wait_queue_head_t q, int condition, int timeout); + + int wait_event_interruptible_timeout(wait_queue_head_t q, int condition, int timeout); + + void wake_up(wait_queue_head_t *q); + + void wake_up_interruptible(wait_queue_head_t *q); + +The roles of the macros / functions above are: + + * :c:func:`init_waitqueue_head` initializes the queue; if you want to initialize the + queue to compile, you can use the c:macro:`DECLARE_WAIT_QUEUE_HEAD` macro; + * :c:func:`wait_event` and :c:func:`wait_event_interruptible` adds the current thread to the + queue while the condition is false, sets it to TASK_UNINTERRUPTIBLE or + TASK_INTERRUPTIBLE and calls the scheduler to schedule a new thread; Waiting + will be interrupted when another thread will call the wake_up function; + * :c:func:`wait_event_timeout` and :c:func:`wait_event_interruptible_timeout` have the same + effect as the above functions, only waiting can be interrupted at the end of + the timeout received as a parameter; + * :c:func:`wake_up` puts all threads off from state TASK_INTERRUPTIBLE and + TASK_UNINTERRUPTIBLE in TASK_RUNNING status; Remove these threads from the + queue; + * :c:func:`wake_up_interruptible` same action, but only threads with TASK_INTERRUPTIBLE + status are TASK_INTERRUPTIBLE . + +A simple example is that of a thread waiting to change the value of a flag. The +initializations are done by the sequence: + +.. code-block:: c + + #include + + wait_queue_head_t wq; + int flag = 0; + + init_waitqueue_head(&wq); + +A thread will wait for the flag to be changed to a value other than zero: + +.. code-block:: c + + wait_event_interruptible(wq, flag != 0); + +While another thread will change the flag value and wake up the waiting threads: + +.. code-block:: c + + flag = 1 ; + wake_up_interruptible (&wq); + + +Exercises +========= + +.. important:: + + .. include:: exercises-summary.hrst + .. |LAB_NAME| replace:: device_drivers + +As a first step, you will need to create the /dev/so2_cdev character +/dev/so2_cdev using the mknod utility. + +.. attention:: Read the Major and Minor ID in the lab. + +0. Intro +-------- + +Using `LXR `_ find the definitions +of the following symbols in the Linux kernel: + + * :c:type:`struct file` + * :c:type:`struct file_operations` + * :c:type:`generic_ro_fops` + * :c:func:`vfs_read` + + +1. Register/unregister +---------------------- + +The driver will control a single device with the ``MY_MAJOR`` major and +``MY_MINOR`` minor (the macros defined in the kernel/so2_cdev.c file). + + 1. Create **/dev/so2_cdev** character device node using **mknod**. + + .. hint:: Read `Majors and minors`_ section in the lab. + + 2. Implement the registration and deregistration of the device with the name + ``so2_cdev``, respectively in the init and exit module functions. Implement **TODO 1** + + .. hint:: Read the section `Registration and unregistration of character devices`_ + + 3. Display, using ``pr_info``, a message after the registration and unregistration + operations to confirm that they were successful. Then load the module into the kernel: + + .. code-block:: bash + + $ insmod so2_cdev.ko + + And see character devices in ``/proc/devices``: + + .. code-block:: bash + + $ cat /proc/devices | less + + Identify the device type registered with major 42 . Note that ``/proc/devices`` + contains only the device types (major) but not the actual devices (i.e. minors). + + .. note:: Entries in /dev are not created by loading the module. These can be created + in two ways: + + * manually, using the ``mknod`` command as we will do in the following exercises. + * automatically using udev daemon + + 4. Unload the kernel module + + .. code-block:: bash + + rmmod so2_cdev + +2. Register an already registered major +--------------------------------------- + +Modify **MY_MAJOR** so that it points to an already used major number. + +.. hint:: See ``/proc/devices`` to get an already assigned major. + +See `errno-base.h `_ +and figure out what does the error code mean. +Return to the initial configuration of the module. + +3. Open and close +----------------- + +Run ``cat /dev/so2_cdev`` to read data from our char device. +Reading does not work because the driver does not have the open function implemented. +Follow comments marked with TODO 2 and implement them. + + 1. Initialize your device + + * add a cdev struct field to so2_device_data structure. + * Read the section `Registration and unregistration of character devices`_ in the lab. + + 2. Implement the open and release in the driver. + 3. Display a message in the open and release + 4. Read again ``/dev/so2_cdev`` file. Follow the messages displayed by the kernel. We still get an error + because ``read`` function is not yet implemented. + +.. note:: The prototype of a device driver's operations is in the file_operations + structure. Read `Open and release`_ section. + +4. Access restriction +--------------------- + +Restrict access to the device with atomic variables, so that a single process +can open the device at a time. The rest will receive the "device busy" error +("-EBUSY"). Restricting access will be done in the open function displayed by +the driver. Follow comments marked with TODO 3 and implement them. + + 1. Add an atomic_t variable to the device structure. + 2. Initialize the variable at device initialization. + 3. Use the variable in the open function to restrict access to the device. We + recommend using atomic_cmpxchg. + 4. Reset the variable in the release function to retrieve access to the device. + 5. To test your deployment, you'll need to simulate a long-term use of your + device. Call the scheduler at the end of the device opening: + + .. code-block:: bash + + set_current_state(TASK_INTERRUPTIBLE); + schedule_timeout(1000); + + 6. Test using ``cat /dev/so2_cdev`` & ``cat /dev/so2_cdev``. + + +.. note:: The advantage of the atomic_cmpxchg function is that it can check the + old value of the variable and set it up to a new value, all in one + atomic operation. Read more details about `atomic_cmpxchg `_ + An example of use is `here `_. + +5. Read operation +----------------- + +Implement the read function in the driver. Follow comments marked with ``TODO 4`` and implement them. + + 1. Keep a buffer in ``so2_device_data`` structure initialized with the value of MESSAGE macro. + Initializing this buffer will be done in module init function. + 2. At a read call, copy the contents of the kernel space buffer into the user + space buffer. + + * Use the copy_to_user function to copy information from kernel space to + user space. + * Ignore the size and offset parameters at this time. You can assume that + the buffer in user space is large enough. You do not need to check the + validity of the size argument of the read function. + * The value returned by the read call is the number of bytes transmitted + from the kernel space buffer to the user space buffer. + 3. After implementation, test using cat /dev/so2_cdev/ + +.. note:: The command ``cat /dev/so2_cdev`` does not end (use Ctrl+C). + Read the `read and write`_ sections and `Access to the address space of the process`_ + If you want to display the offset value use a construction of the form: + ``pr_info("Offset: %lld \n", *offset)``; The data type loff_t (used by offset ) is a typedef for long long int. + +The command ``cat`` reads to the end of the file, and the end of the file is +signaled by returning the value 0 in the read. Thus, for a correct implementation, +you will need to update and use the offset received as a parameter in the read +function and return the value 0 when the user has reached the end of the buffer. + +Modify the driver so that the ``cat`` commands ends: + + 1. Use the size parameter. + 2. For every read, update the offset parameter accordingly. + 3. Ensure that the read function returns the number of bytes that were copied + into the user buffer. + +.. note:: By dereferencing the offset parameter it is possible to read and move the current + position in the file. Its value needs to be updated every time a read is done + successfully. + +6. Write operation +------------------ + +Add the ability to write a message into kernel buffer to replace the predefined message. Implement +the write function in the driver. Follow comments marked with ``TODO 5`` + +Ignore the offset parameter at a time. You can assume that the driver buffer is +large enough. You do not need to check the validity of the write argument's +size argument. + +.. note:: The prototype of a device driver's operations is in the file_operations + structure. + Test using commands: + + .. code-block:: bash + + echo "arpeggio"> /dev/so2_cdev + cat /dev/so2_cdev + + Read the `read and write`_ sections and `Access to the address space of the process`_ + +7. ioctl operation +------------------ + +For this exercise, we want to add the ioctl MY_IOCTL_PRINT to display the +message from the IOCTL_MESSAGE macro in the driver. Follow the comments marked with ``TODO 6`` + +For this: + + 1. Implement the ioctl function in the driver. + 2. We need to use user/so2_cdev_test.c to call the + ioctl function with the appropriate parameters. + +.. note:: The macro definition MY_IOCTL_PRINT is defined in the include/so2_cdev.h file + Read the `ioctl`_ section in the lab. + +.. note:: Because we need to compile the program for qemu machine which is 32 bit, if your host is 64 bit + then you need to install ``gcc-multilib`` package. + +.. Extra + ----- + + Ioctl with messaging Add two ioctl operations to modify the + message associated with the driver. Use fixed-length buffer ( BUFFER_SIZE ). + + 1. Add the ioctl function from the driver operations: + * MY_IOCTL_SET_BUFFER for writing a message to the device; + * MY_IOCTL_GET_BUFFER to read a message from your device. + 2. Change the user-space program to allow for testing. + + .. note:: Read the ioctl sections and Access to the address space of the lab process. + + Ioctl with waiting queues + ------------------------- + + Add two ioctl to the device driver for queuing. + + 1. Add the ioctl function from the driver operations: + * MY_IOCTL_DOWN to add the process to a queue; + * MY_IOCTL_UP to remove the process from a queue. + 2. Fill the device structure with a wait_queue_head_t field and a + wait_queue_head_t flag. + 3. Do not forget to initialize the wait queue and flag. + 4. Remove xclusive access condition from previous exercise + 5. Change the user-space program to allow for testing. + + When the process is added to the queue, it will remain blocked in execution; To + run the queue command open a new console in the virtual machine with Alt+F2 ; + You can return to the previous console with Alt+F1 . If you're connected via + SSH to the virtual machine, open a new console. + + .. note:: Read the ioctl and Synchronization sections - waiting queues in the lab. diff --git a/Documentation/labs/index.rst b/Documentation/labs/index.rst index 222827a9dc201b..b9439c0afd0263 100644 --- a/Documentation/labs/index.rst +++ b/Documentation/labs/index.rst @@ -33,3 +33,4 @@ then point your browser at **Documentation/output/labs/index.html**. exercises.rst kernel_modules.rst kernel_api.rst + device_drivers.rst diff --git a/Documentation/labs/read.png b/Documentation/labs/read.png new file mode 100644 index 0000000000000000000000000000000000000000..4502fb42271ab6c427d6d840ec0b825abbbed470 GIT binary patch literal 33915 zcmc$`XH-*P&^H?FNRy&;5E7b7@1dzcNTf)yAx)%rA@n9Hf|LLWNDm<021@S;NQWSy zgx)3e(2KNt@c+E;dhmX}>z)s=IA`|WvuA!&_MAC{XltoaU1qrq0)eOya1~t;=qv^V zI+JM! ziBLGslO!4Mlih)|IP#^O4QzYsQk)N4D&1v3QMOE%57 z_at`O#2)TTKf?aOrpZ7pv$713R10p~czjmr{lY8?qIaLwnxDGa)q`riS!wxF35~6@ zAW%%O-3I27B;C?W`)viP!J1j$)X#C}n)m1J_Yr-Y?Dqxo8`FPLM@L32diO4gKWC}9 zvwusscszx@7S;V~b1BHsOd6-Skxkz)u68V?jUSg3G+~!?Cg7Ok08!qSM9qBZxz0>8 zkVo4rP24Y%KETg`z~omYF{L;!zj)aGTi?ht%U-B$xxz?elFGOUMqgyb$gFFYr4o~m z=D1d>JUwbpIMh=AQyI}wuBf^s&by3D_7XY|pv9IMvE1q}vcDX>BrZ4(j=IwjwcRQD zFoOxfUyf#rA<<$vx%Nk8_rL1Ce`PPba|CHbCt46$D&J4cO~qSrtKD3!^yd@7Y>%4m zu+F#u+~!804Lw+TOi|JL#7Zrw3}ZM1R$vb+;2O^eN8tS4eF{ttFRN}Uxx1ao7X7z9rZTyE;O){=-i(FL0^Hbz3$s z0nK1T6X}079YDXfE==<*zVk&+x76}^Jj0Vn--+TWcz7OkzvF^Er+Dh9>-Mnp%Z+yD-o5?XaWLIlk8U=Po`aWYee#QU z{mn*dGRX6k_A5&?tM4QJs4ypjV1?t3@pjgT*Tj-Pl;?Z91NTzgTAgqvQD`<%i|-Z@ zqZ-=OD|<8^Wu$j|NvxCQZrjEC!^bbTaicdDjIk1K`#lFG<$tjOzOcgAJ|?jnZPE-$5ng7o01 z!@rc_mvwhgUD7$LJ|E1gu{ondvaMweA&T^!TxpwLVuV*AV{W0o>Ps{eLhg7`GL!b0 z!8ySq+&5NZI@)+QzV*DL{`PA#ton;tn9o6O(_-jj zwMDXVx0pgSn{@3KIFqfPF6E_Ru*yJ9vnXNHiR4YC_e&ukwbdMTINoun6rYxy*C{?B zH6fRc%;i+*e-&u;t*@5z-Y#CywAG!3yiIhad@403cG9PX$ZVSCG(R?o5=|*lzRXr|UC!UW4oOSzDW~)~52K3F$y8-I zDl>C7QUVD?y)Sm&>P$MBhO z!i#R$CQVm3yEiIP9vrRDf+$^~sV?ZYvmX82^EQAKe<^pzCO>66S?nNY!h-41neh7R zy`_-y*bSz;2Mo{LxBe8;3LTP4JgB}9%^@31Llq>Wq$HdZtH{oNwFg!O1@c6;&G*Vb z&V!^{aE$nDv@OC5mF-f^G@izzi+aeWihdhaBFA=Uym{B_M)+0=J^REphR?f7ReN=9 z$>tcVX%6~(@6;Z%Q?*)JF9skF2lnlHD_0JSZ@dYrz@1Mnl(RnyCbX`tDD*(thd$k+ zK+cna($2u}wz6q;&j(jogiM8hkT+}iUtmf`gqT1ZrV?8-;x8CH*|dcpEtS)VVHh!0 zJJN`=HF{v#iG=ao3lp)B#X+GkG#kRR=CkOQH+wgen=@-tB$=g!>JeKL^oq+N(E^ge zoxQSG+nU;4dMn%D_N92QNkQ z4n};fQFMrnVz7o$hyYOj&Wz$Qcm}APa+S`9QF)L zN{Y)tC&!T*j;3CK<&<11v zHEL7+5Wk@QQ~}neo3xhZs@^@*$1&-8mZJ5(aoz9=J{mpLn{muAqYJE*iR5SaH z$`mx(6-myJ@R1b+y8a%We1Aau+u;1v46hNqhpDG2$LRG8G~Kxpi@(jTCh_EDrhW2n z8_4LTY2DW@?!m88W?ix777*2=j{ZNEI3FHU<@tKMFOBabhbLb|*PCB6g^cUP9-6hH zGFeT1wRV$VEF!t4o}gYYG~I`0({izYDi>%4AK9QXSw4#IDbjJ-mn~#l4Pj!w+pS!5 z;V*26!J2T7%Wde{#@I)#}UdhmRWn&mkVC@m8v_Ngu! zVrLdpKRc_ztn6vYa^DFfUpeahx(PPmWUV4`52KR3E`bp?ia{Fd6yHLb8#WoE5|>mY zhDeqCsX0R7PdH#=HgE8#sn|idRHd)h7Zotk}3Lq&9HGW5IynRV1znR8BxoI7_xHagB2wG1pFi@OB~aTx%IaCriW1G zcFBJA&)SY1TV>tgQWTGfr<$ZB#_@r>qJ=E6xc^B%4F5a$yYqF)l^le@4M?n z`0qlQnuxUQaJT4%M026CvYb7V| zno62InC=(qtcPc7w!JS(_E-0c7rTIy=d@3J|wg%}3GlItjz)$nd3a&bad;0Juc?}%%@Kx1L6z&z!=vVs&wc~-t3 zq6mbNwSy3G%ybGGs^J`g#5j7Tks^%ih9d*AomOCXJ3n#(%|G}B|6>=|sQP+DBcY2cNDy%bl`D&RgYo^o%t@zozh&8v zW8nkZa9v~nb||!?hq8PlsQAH(HjlpK~_gA&vEloKS9)9!n-2id8vSD?kq2s);sxReoWl~&Rt-8 zu2qCh*RYMN^Vc$E$A(w~{TPz+k*~7YvYSXaOd@RsoEI&ZU&r}K5oug~KlT^gAMW|| zrAJ6oaKO0i3iAOcmxb5dd*u{Z!92F-xeB{U6Px%~v^{je{IHp;In%F6{vtKFO}qoX z;8cTH?FcpN66eXF?V2JmA;oV@BH#5)L|iWm*)>9ri9hG%1D7vU%hjjQHqa?{xc?fy zCVA$0&*DUAD7=PeNj^Si?$$RzOYcQ7Z&DIGC8?rya%f9tB#-=oX!=>aD++g^O8$OT zll2qfl_+1*XstBWd$J6Da$_Ox7VWR<>(=@yFtOb4ZVvuog6fiM7snJ0$Z;90g+TjgG(ExtN$-;&k!(A0BEWa)>dX@8VQu38vZ;-=9qKYOV1?m0iuRV_>j|kJ{zoGOlWJ0B3T=n8!b( zh3U?8%^AmR)Au_|Tedn?1!Z-cxGqdXGm}&4kMgX@ISb_Z>hz5pVriM@zHw|wVE&Bv z1X{2(xxRMsM3cG)t57qyUyuJDBW@V6-LwO;qET^dvQIo(<4-lBf50A6#yM)eZT;G6 zP%n<)Hd2A|59)ozhBC+dfDsICf{lfq!loC)e5l?|jww$|JO)D10!)`#Lii8iT~l9; z3XLFZr1b;8c*ZPGERg9dm~Oq_WGO(+ProC1g_c>iJ%<#FR z>{vi~MC@hgjrFwKTMIXhXq&&KzFJ&S1t8S;mW3Lj{fpmn`gBvM${1|~k z%x#r79k4qKF(c26F~WRjv@Mn{1(Anx_aX0R#Cb5N+I-WuGJ*Itvj8@^c}cqN4m(T6 z5WIIr5?b{6&emPjcl~>u0-+BE_*bMJHByDj1~T8cZWJi3c6pRH5RJ zU2#JUjZs4Z$3InKFQ7gR|1_XrxOh_R_@2OcUm&z*)+5MPHyIQ)QH_M@oVa$zz53T@ztFkQG(EsXLX~#_VHXpLKV*Po6fP=rRUFJ0t*p}j^)(IDPgoly{*xM*Qq z6QtApeXiF@mr6D@b$()Fnu{oAZCt-UyOSI7bm-k~xJBNZ4Q&+kcNzY}wQ@?k5aZ$D zS!k8m@u-cBRGn2Yv?{iuT3YSqqbB;G0e0;SA#>$xM!-LIAKQphmYrF z@Sx}sX#iomX`<)K|ITZy%wcpg{;(Naa;W$Euo$_d`23g_$*J1cl{Ei@>75OQg2kp5 zG#jCv5|{lo#=&X$TcHEjMBzot;fJq?a#IqSiW-p_iOmK=dAi^D$Ab|{Nq=^27UtWA z{n^)EmkJknY#bvbuB}ELYpi+IlGRKrROKfdm+9?|P4Ck^=gpUsiRA0a;LqL>w%$kH zR<0vZ#hE({P+33Wi1)D@_qi}coVcx_yeHVW#pLSb@A^U^E%`=Rv;(x=PBrz?Ln z2Ic})^{VC(!Q3~JA6|F{iA0sJ7Mm|LeQj4q^tV<`7uhXYSv?Q8`Xy`cNkIHkj3!_4 zC4Za*NSmBB3HrmwLJl+F8EL6_wCtnq4r4k~TC@wwYVA#kN1(Z-(cT9OAD?+-BKy_B@%?qWv%9a%$jPqVu zhGWr~6_~}1snwjsYu9GXgv3lc)x+jODk5H?xO%iE}dwPe2 z_Kgg+JaiOFLidiF2ET2ha_U>`qL!_`x10P;XI5^HS+ATkfl=chHRwQSSrt4 zi>LG0L!dMySZeT*sD0Sh^RAqq#>`tOf=8e9_*xlF&$qa`^bH@_$Fces!2!Hjkivw# z@Aw&(mTD=CjUq{LB<^HGjI^i#e(~qQurc6tCnYZS2o-~3816ZaH{GN3#DbE@_Mbs| zOlnuI)Ha@T^IjZLD`|N4`8L>VRHh>qYWay`V5=piK3p0mj-`*@2Hg_PMtIl*zFam4JVqfiE#EzZ2b;C}M979DuL1l?5az84Ik ziC;SJs$H(UmvIKPomc^Xkt~X2mkw~4h_Xa)AGc0v0SHj8znhGVasH#9n zbczG^@%~|-1Ov(U6#W&c-r(Bzi_BpzO?yT(v&M5XWI^aaE&bRz*(Dtf#0zr@FmnVe z)kvJ{{6VE4XK5Y@;(JLPR#3P|pq{2wzg@yr$1F;etGXyBiAgd_2~N6Me>A3P=6C^G z78G6ca#ZD^^9EtT8uGqu@~iuk#hiH&_;ZNxnY>}0=5Krs$a3%x#i~WfirmPDwr0GS zR*crrT}@)CB6<74`)kr)SE~unINWcn#S!)=w>=p})$ob~?({2ayOm7WDy^3)*w4{$ zZ2|R)S{)XYXNwZwt}l32buwH1aYLn0tB+5)Y^DfShe>>9C8XZFkpoUrMoTiW!PudBKYwj@lx z@{8>SC0;d{V8H@Tn32bs)tIT(STVX2BC8~L)6pN$Y*C~Q!cCvS~$#OoKXjdPnR*Jp_50+a>i)J0A9`vI4*sMjEzE}C^;Q)oM&!Qs4 zSD_=C>Fj7L6gWY{nOgrKN3sx?#UxOad5w;wPA&Z?_ckx-t*T*zm7B}ZX8Lua?v0x7 zBeCXT<$Qa~4Y>VHy(xNY*8)e=(XqGsfCusBj9K&R`k0!jvj9}al5Sb$wQn#BkLP6E(`seZzt z1yqEEnHjOg<9K0R^%cHnwPQvDo_{-P`!cjSlZGMO{QIuLjJ{-S`!mRBQ;K_@;knJZ za;lCCFgg)TIdiL)#)HBJGtDHAVda(`+iAxPb>OJMJXxIF1_CpWzAHwYH-UKW=2RZs z#j6tKL^0d)DfG!|iQ{>xJ=EiRdo_wS1G=_0LpqKw*vt*W5^}jOMw9NnD9cp|l^xz0 z=y&zPvTP9?e26+b`bvhyo0~S=zb_ge=15vAbvRX0c=cQJH9NMrMK!@WJYIC&A!ia% z;Q8~Mm1=IZg31$p6f?zJQ}Ya>jwq#VRVV&teh^vBHpJqdY7IuVSILZWsoY8EVj8+! zEr#jRIx9R^@p0%^e|CAl5xdXMt9;mn=DzW7<}82w1Fb44!1I=sT8UNxAHHH0cIxTs z_sDG{ls9S3q=1^}O2HKbZo0goBuMHtFr=_36dzyjFLN)X!qZ z1XRBC!Fc2(~f!N@xZe32C6l#2NvyS;!G@FNL<30gp z?k@K7>k7<8v&Q4buvexUSL#kG{Yq7jeh5d&k@%|*9)&OSy@L8QHzlvGad^RXgiHxq z4-8r~^EMFs)fK$YczzQT0YSgQe&e2G{&K4w_f|%u?^=*u6=pj~DpR3%O0lsa_g&ok zVJ@^Q*Djcgn|yFuiUH$3P>$}HX3I;0va~8A;@m;; ztg8HNUBfu%t*WGT`PsWTvzr!4_K)j{18=Kej&hYTviF;eqB2pphbFO)>EsEb9e{nl zG9ky+DfGK_6w?*ihbwjUIT<*q@2*;riw2S~irikw1$q~4pF;=~jx7;zxsh7tf-cQC z8kspZkM$$VGxVF+y9G!-3To?ZvbANVZ=-R=t!#)E3>VSZGj10R7RQCj^P}&MhR+lg z5fT@J5PLQ6d<>}r=!tt#t`Rd4uBppxVCI*H5lL1hNuvA4HIcD8ddDMmZuX1Y57X7g zA%Ky38M=9KD6cCp_oB}Ub0|$E5HbQu;{rql4`FPV$>&P6>o865Ec4opm(&VWz>5}k zrW?{~Z&(F5qqpD165m-R?rX@BdzzFXuT4XtBa1iY*$@Qv7!gf;HcN#q| zcD`{T43Z?%bi4%T^|1LZJ3O8un8VIMk1n?M)ar)lZ2D=v^x%u{>)<$95~iH)eW9Gy zT%W`YFV-p^E9VF9MhLxbYnHqQJ^xIyvGAE_W_Kxm(xbN#&fDkr11W18VW$hO#k@i% zcTLF0Rucni4Tm$3wWIAj8q=mhB6Ekst$6V}?I3omRdx$$%x4@@=GIGgFn$_NZbv-bRHDy5~oEa#i_L z{?f35XQrLa_&(oQb!n>jT%ezoXTr@!*lPuLS2s{{Myn) zj~`_CaLqf_h_k=Hk_%}^-Tq%vqreNheJ4R z{(%)8Q!7~x{RH$ka&b`9`;D;?kA7Vm*SK1NMAdSoz{32EnTpF|m`G=I@;~DuE)B%Yad`liC2`MHU^0Q;2?Aw42NN?%6iw84)|TB_gDo=2#+tnqU0R~w z%1dfpli$P^S?47vZ)gpQzGT(f9i<;D%ozN@Tdnoou{L7~rklx5>l?9mP~79V0D%gw z`wbj?@7b=1o>BMt;@wsDD!^{buqLv19ek|Qg$y@GS$h_6Eo*-4Khvy?Q})Ez3i2q= zp0_bMhYCGT(IF;om=u6i#ioqHzzm4lT(0BEn6;v)pH!efNo4ur&w_SnTodhqO3umk zhXFM!$upYX^538T=VxP@&D&;ylb$7@1Lde8FC>RK74wDXBXi;shFUX}=I?{F+82y> zmR0^wRprdD8L4T!*3GdfR|>pkqc7tHT`-1G_t4^Rkp%?0*PJG5U-6<`=*k~jQ=IXP zU3ZtDfaS{Md!#*kL4|q8@~a|7JqH%SQdjQfMlG7$r~j>P-|ZC~ELg2h)KS8Ql{t1; z_fyJbZ^!MGS`5hsi;|FYQDWtt)UsoNWtoRnpvx~3S z3!^9Kz$Ct)Cf;YCXW?4o*!!LN+hN>b3F9{h?IC>wt6Xmoh@V`kdS~{sD)5rP!tzdy z8iQngu1@85p;`hiUw(^n;j3%vjHOr;d?B`+pA4K-RuOs;B z1GQ7b((Z>0#*mOKj4sd!OYc#%J48F<{U~IH8Htm#&YP|o+-6wcGb=nS3lKBLti4KmB7ev+rx#n_6)#XfKXM68T0!CJzQ?HS!OZd;`7Z!9C$IcoAR9@ZihCo#WY^+Cz`yz$>3V9JL=WkdA*FA1|65 zw{6gDEml%bgB)2C7sO{j>up@3AACt7zP}%H9pOl{qXAY=b7!RMBot-7Mx2p&0 zB22z*R~YT*ygc4lI@ov#yVR#`%e!2S+ds3lb}|(cqJ>>av<_3~z-Kx4Gs(OXLJp%d zh0xw*LIjFn0?>h%)6^r_WM^Nr4QA`KCS3xT>#k}BpaFmeUV+hZg#*dR2bDQCgl2^} z-7|@unf=7r9lGTCtKbk3%q8G4FwYP8-7|?8r`fM!4}HNute-<@fq{W&l}ljqlZUa} zyg%UF0Ocic2r#7xrubP!Rt{S+oYw3VB|io9SceF8EOs5iC-@2)dgJk?>a0!tG|x_v z%{lR+Y!2WuRgVbh5hokA(~P|Q(C)8J+e)Nj6RAL;T_;Dn=P_WB16B;gQ zt=UoS-8*qREfwDepwQcopImA&a%cJq{omeei7O*b?L?^~r3V~t%tE$NZUJeqzr zG2fL;`z)y7ojTrlYJX9jm9!12U(sxVOFYe{1soUT`NdQHCrDW-L%OVvaY=oDw$ z=jBpDe590>#}&Y`+$QaQW&4hnuGB=FM~ds7k(F$MQ8=U?&JC#Rk|~4?Ouqh}y>ILn z)V$A#eqG=h&_p5{>292kGhtg+-ovlMGc86% z?LITJ)P4^4Csc1>8_tiN0~8LZ3_wOb{0yvMyDFhg?()Dj3&_QeD^EuK2Y$;+{N5jF zxka^30=)@8jSpoQdtq@r9v)gmlyqlRbw$l|h5IMTkqSdj(Q&b|h+5tRPB6crdFs}X zm#2Z!lET$&|JCCej)UIA9P1JUQgArIbN)brXAKxNt;m55+YbNX@sCE{!f z(V8$8`yLd3q5XetAXIc5pJP_# z&x*7;&JJ4Fs_9R3-SLv@ZoP$?`M&2-3T-;AU}2|oj1FQJaf&kp{HKOGDVt7s#?GOY+)OOmI`;>X-N~k%sYGt?X|qeiV9mHL z{VBt`>z}(;5u5*8$=@TF`-U<7S!@v7an7LCkG&+8DIhud-$pfv9DV!h*20~%?(VpE z)5osq?^nh-FNepT;-R%>vX_!(85Sm+GX6}xmJPXUEmS7kZ1@x`YtQ|K6L+L`de48t z1e+OBT6a1M?x&!O4qj-?TB)0zCMhuM&HXY^p0u-0T!#QKPH>}~V>vC%B^fatIZZ8b z{Q@MbbH{}3k8OVNyra@TlB8mp^zrBzdeVw>!poK>P={w~LR?Q9Dqw&SIzB>^dxtM@ z`Gc>}RsZ-c!9?0VOBug7CF1q%MAK%tW3~jQ0p~PacM4Kbe!oAKsC)YF%#QR*P-lr? zd~l@1hSMa1w%3(3c~XibgiS&m+kOO@U2@XM6ve?S)Pt%R7;H|j>-Q#62&?S57@uF% zRygIhyDUt6;>0^7BfMP9z4QB~XjdYAUC~pa-G9Rfv4Y~Pe(#%ShBX+nEQS0-j*-(& z3}~`F0~WB%UAC#;@DlHCHU9Vcy(SuDol(gqzsUw9wPW?MWa8&_D_xG$z|bE0#}x0j z{-XTyhHE(6An~*cez6v2E5nJJSz6HHCT~|Q?~#nyF@vX<28nHk?-I-1^3uS0qwS6%>|VYdMD1+)doR{vW#SX!EZbDP2To6OPW#or zjD$^ok)qpkO!s?(6M3Y>Ejxm*FAt2Hefx2^6ebeXw$9JIc=tc(gW{O6I=D2 z45H9QOAOC?S#YA)QT`!mS>j_t){oRjv@hI9{1K@HpG z2*iy4m3y=V0U*u;2pxWsB$|;`G48yBtqiGh&i=y^|1jto`tAmdxfMZfY$awli=D1Y z2)lK|XE9#1WLv!S{P<~L6>PJqsPHs|&qUFq4zOan1LVYYzvX+H>&Sk5o~(2qS`?Lv z^RGy5r8&*^AYP;awyasrXM*so56={$U7uKbY4k((lXLZIhk0_ZJ#KU2ACUXieX^>T z_~b!i>hLj(N;%sx`{$|Y`GT+oF1`By`&Y6q+}%c+U)LKD}E&DCNpb!!)I zWQ01k?Rdot5ipK}k=G?p1K!oLcV)&-v&k_bIzLOP!21di1^TVlZSkI$}6kpDce_gQ}=Mk)HNzUDt>Ij-UOVAEsHx6PmnE=5sA zemV=VEI3ovV5oG48zX)?yop37dRiIR(2>q1G!tUCH3JJ;{@FwS8A&~Yz~(|iK~nr7 z@$!LSPt*093-M}_KNy=RX}0J7F^J+cfjWeBf$rE}(jN!qN-OtwB3Gg=acv5`C6l?gqcyHJAo{ zkoW@}Hvb3{v^Q!GNynDFw0F09YLE6`HUNjluSe@~wKL@q_D^}U-|T-|^g17`=(2pa zG|17Z*YC;LT=30@ohucWaDF`IVG>VzNhN}j9&;MG@hzOtQNAW}`{cMB+8<)mz*Q9Z z@bd-e(x&KyWsP*ui_y(X2O>=!ec>PHMq`BxylHk*Ho}9u@?^&SZjQ%+ye=~V-R`Un zABV>@R0`q!p4ZcaTuFwNgi9ZW=39N7j`&i1E=>b1g{D84ikc~X-uK?tnthR1I=k;C z*lOxz5RcvrPF(-?`qM90ZW2Ai#oK~=^VLcTj6mz~dx@BhrgQ$T&p7&8mRolCO=Bt5 zH?Q>ZgFn_TciNBVeEM)^PJUWVz#lFJVrUnF(Sbk^_4R<<^QZl21coy)j4&R(?w)cm-D0TKB=xt|EZ|vWG*xNN4vcf|^0yaYhqr35% zn&Ma@FF$Lae|8rVY4}FA&>4Clt9cF#G#5pk z?V?j0i8Pnfz6cbsiJtGKK)I4MCnckR=L1ONlKqqfN^y*)4GsH3<2ok@VIxCWkZ&Z@ zw!4`Jn)ZZ3~fJ*`m@pGF_jwY6c8hY{Lrpkm9R@^KFl;DaPkz)&@|+T$smTbUBIfuR!+Fsg{yJ$Xy{5g$ii08=)$& z&))W@E-}&Xg755u_%|1Rr3R5i;) z?>d7v&lk?tyhKk(M*I~jv&%}=gZmW+dE&%Mxc!;x=TB-dx4X5^%?am0yuUvAtL&fw zS@XnOIl~>F>2VZ)UZua~aK2T?%u1G4qjArNp&p290DMfEu#5{2VdGvTU!sUA<@uf% z_vT9tpUM7Qlp`qFN>KhKnue8PSrdM@8%iQ*m0!&z^C#`vgaIOAWm%V$Hjzwxg=UM+ z=TRxZOFRUW{pa|biO$rWyAj7xFfAt~KHPSfL8gbeb>XTn?tmWD$js?B^aXCMJYfJ4xMy6N4` za$E)?x0MPURu02rNICMe@H}<7S6FuTS0TXaz}I?o_u8_{$6ST*R~pHFNzYZy#W9eQ zs>02cYYJ2Irul$QVipUj3yr;=eMi_eh({Rx${Q9Hudqyk@?sBrzyl zw?NZbs}0G2Su!HOK79&w*!H#jn4ssIZ2%s;k{$(YhzXG^A+_$OsRP$|gx%zhs(EGa?H21Ublp+9( zu+!sL;P>RDpDUJEggaLIf%^Pt9j} z*~e1DKI1Hvt^+^|s#Yd~{a7@0*xpaThq^P&OtqL@n{&%!HPWX^n z@^*gApqf=CwpB7XNp$niqDJ|>U^z%Ud`O^T%kkVVF`H7Yh}4cQzIsAF+X20he#iMi z5NGz7gskp09Tm+y*Lle{;f^h`!@A;+J1EMU&-CDrI%_$gYMK3W4ln<6mJID_MTOpu zx@_;KT6%~5sV{8(a=kUsR8H+-C`q8`jYim5ZFi=drPG54FAe6*FVXL?|J{7RnE_<@ znbt?28gfOw6D9caxpJW%4hA)9Z;Zq5Og#O_X_Xz}A^u14ujjq3nIHjEkyLelaCsQ6 zBs}rNmL)C=8~D3)Pr5hQd4ug2E=1=)7p;=;My_XdC`0DPTWaBAo%)0`k&Cc9tPhmG z%7_qpoPz+Yp2#zoD+#Y+#$UG%(iUH$qv2yv{T&~@Ek>@&Tct1FT%C2< z_U-VUsA95)zagdfokh<8zG?bWqt2jKKzf|5SJYHST9neFtUGY5IKho={kx(Jnwt!2 zzjsX+w1RnP7(GY4<~11@)>RkRyL*?g&zWbPQXL{= zxgEFTNtb@_A#Z+1qVoX%oZ>_6n~B-RZVLE14pzi6q+E(+d5XF8xx~G#6GJm^NU>?L zIrm!DvCr(6#BNwb2{0yyf%W{`10c5dxJNX@ZU3`_Kn-T_s?8DSr{>TeT5U*m=yh~4>OXU(Q3qj<$z&98f3p5bc7+{a-nFcN{ll-^cyuq) zL=3juy1z31pEB)#!O}a|W!0P?T$77)_&hOvB-U({e%ZFM<|85cOhg}0GZ*X1^CNmw zVqi-&9mPXwe;bu6ra%3-0G??GWDt+*w8F9N=)-Xj_<)9a<=cEfA$jX*l4xoVWnL;- z_S&fZuqZ)59e=VR^LLuK^&vc$oI+&NSe6xwhM$P}-cJD=LFT8zgxOu~%TE3T2 zrK|oEmy?%$Y1&#EZJz zHAA{aN^E<==Fr2dN;!bQUKhoYvCP$N#YowGrd}**_pO4jR<)WH(lq3sY@x#Z{?OtP zIx2l=M12iu=yUZ198y~qI;+lwPt|nAI~)<7yaWT}7n@HfZSvRI_3*~#zL=?8i9&ot z1?4r*5o6UmTqfC?)e8ljs$G&DZSaaYr}()1z351??Dh9n*H1VTyO7CVcVg&WSqKUu;qc^+DtLy|1T_SoihfbK9`fk@Se~@!0Gy@;5?n55PO*nSV zNTUqPBW!KjcM^DgV8kv_P zA3hTx`i@1vI$9~X=##{a@?mh#iIBAg@-)sa#HZ)VH)!SjPWgj4bpb{Nm=DbGCmKEvoXV9q$W|1-teA&-%C3FB__>;Q zZH)R;FmoKd*)pqtJbO_~j1u^i5_FyC1SD)(9M*3Ja2tt&yU+!<-pd7Q#Cx>~-pjv% zmlUW><6u*DpScl|*+#Ni3-Glz=yqIkJglEbRfi%rOIqE@UY(TjC`y4f+t|t5mji)1 zK~`rb^<$$eu)ptd&D)Y~UQ{PtV0w`1)9U0EC?a8Nk&&kPDNV}Sb-%TD@vdt4O#A^e zsu#Xjycdxjg+9?`+RdP3*c5N04n-o~*gK=8sQ_!{bN^~@D34w~4e$l31QN1*0LOl2 zl~B?}&3^T@u)vD%1K;Iyz0Vyp?ki#UWmNNBprDJ05aue?BBHJWdrqNxom#hH`EXPrM94t zC!9z5=g#$Mv$Eh*loa}j|GE3jYL$l1B9z~?26$NfulkM%B1b5I*t4WAE0^?NQls$f zCllNuKv0jZcna6MX#1+UmwzryM5V&fI%aRQ*KV*t*6gp#^bWvoxFU3VLz(A0>8OAl zk(+Fxp(IASE&OjpaUt=u?)mRtrRlN&n68L5H1DMFiL| zAn~_C)gQ=pBqlY{VcF7Ih9`ty5ak&i{}bB3hlsm!jDi|<+A9=p?3PJguFwQ9pr)4} z_8-BK<r<1&@dpZ-&&7GoQ5kP>r74Q8}T)&?>=Sz6zQB4r|L}{xm>h2uF z9F011Qd!ci(bWIBI0L$M8&dZ~KJty?MW`9Irb8TVQuG6QuUS7BDZy;R=uw3PUf4+qtEX6>b>dzQn~H5H z+4UHTXK=lwr>~j;--3K_$00syJDE_xno|T@9~gX`8lp$uHr2aNN!|twNppIF-WHMc z?p;AtmS*W5(9?7o+Yt6o zrFyH*4h*jEZ{$)X2Ef2*sPMPT2unQh|0QlrKZ1tc7@DlR=zAIGCw|+0eM(89L%oX3r?%ojkf_n6LJ4+gA z@);9;9+ScBxjgswV`wr`7i^RI*2##2bf>Krav7k%{n+}`A3hcZzn<09TdQTzneU7z zK?q2aV?JI6JQ0@9fB5&>l86gb8=y`rSyK1dc$EgFI{wUIWS|B}X|4~Nsmj`#Boyfp zdIH7(XvT(zB8nHVBB_H^?_a9~{<%uo6`D^Uq@HBBnS9^SvV|~aVh77u?O%V?6k_=v|I4{`orvz+b&qejJ~@Hz76FezLAqO5N@{5k7I0bOz83v_fB#4S`^kMh@P*fPV$S=_nKLtI=B&rddIqs9 z)T1aQP$4MI%y+<)W0vuqrN9@cQc+Kya6WW9GR)n-5_;G7p5#@Hg7$tYzD;0jtb5^h z9jf%B`kjWjlUtr0gPAqCY^_gd#Q|^&JAASs(O*8(ITS1) zmfatfrefwy@P|+YH*16e|EfC`sIgQv7cUIw@<%zo!CKA%luEfj%Fm;xB{W6RczxX{ z#R+qZjG)y51S!B8V^D3jbw=HRZOr#@*DPI^zI-M+-aYk6*r>|1(j$HjpyUKawC0Tb zrZ7-8H+oi4XPOX~UN0Q`-b0?5$|H^fE$7|28^9m7{8n^c)W6_skPZjx^XTY!OqK`LEWUBoILUswqOc-jE z>_Nx~Jza;9?JeD{ug`!e53KCrnOJXZ+G#(u#{gmL9^Bz+nby&++4-JxGxfwUH`w&Y zN!ZNEL;)N~^9KnIdN$jC_fcPD_))6Uc629;l;*HW`)GIS$N7#kI;_!Ch+qM>XH-A$ zca=E<``NMU1mrwkoL3g%>s_Uz&abE|2j>IsR+gE~a{KH*Q>bw$Zn>DSXDHh|k#uv4 zeOfdBIqYcK8~uK!PH$}YBw%5~6|M54xpfH6GI$b7?=Va&Ir7#|elPf?Amwx8dZ*M~ z@_P#bo&D^d%}=RzYv6)+J)Nl4ue_2M1If+a{eakeR{0OuH*b#bj$5N4$?&Vhn&~qd zWL?|(YvwDK>WixnC<%osG5Gw0u>#|OKz%VtN7NTID(p-D7IR@RK$bw0|qzKrwq9DI8t)-E@D8dzT=zj{3j zUFS0y{uU$?kVV>4^U#147oF!r#P)Ro3$Bwp-o*gOJip#(Z~givVC0zhvj>DE5zpFH zYo8YB#}OtVIDYkVOY-^szXS!9ui1ou;WaG_6yc4YYz>a}wTNj}2PBA^PJy1_h5vP5 zSftV5%ezyD+ro1wdkb88FO^xX5t-r~ir12`6d!1(QWu})fH}@}i@Mf^vmHc`pQohF zW9caS0@(uj`N}(WXzHsj;I0bVj`cTEprU~p9c13OKU zZ6UGe(+<9CRI{Zj?~BI*DW&G~6KJ*X-Shn2k~svnA!->&=417-(Cd*tDNVzRA9A41 z7deYC;cU%0YWKlR&t~T#ua!^&^{$gOYbGWPP?KE&s&MhJb5yTE)d_T8W;Sl&smueZ z{5;|Q?j+!{jFyWg-Nb&3e%<#Y74pSM6XdVR^H2%ruj$)ZG!6y-DZ55w!*^W`XU#am z_ypT$_)86wk~~T3Hf9DafMfc{kgDO!g-E1&OXQi>Y@LkZ}qdf>SaF-GU98NONz!B7iqlrQ0^j3AzHu($<|q}hER|R zFAOsKRDogl z^Dl9LOLC6tOw=wkDBl=G8_f(6uCGiX41Bh~*8;IeKw}%&@O-VqSJc5HrlrchN^bE# zzdS6!Y?;$mM%N19h}SbEUod%e!sV(=gem_-w2_(?ZmqPUkc4s|_e${fb_(mT9+3FV zdUm&Yu0Ii!{t9Az#_y_Yvr`2k_5TCE*6l|0O4GV}B0#BprTHoe_U2(CTjk9WovnoZ+(-`3 z(Kp6Exqwm#7>>AGHP=TXSlKK@wZOU(-v$t?VrtbFxO@ue`nX%5YwjMw#UC@_k3&Hw z_dzL%6&vQ%?j-P%MiOfRiA9VpDMg(R*1eEu$^jf$!=}3f;{%;yVwMu-QpOJpX1=## zwzs(31`R zSHIp3Ca*R(GZl<}0D6C7d&Nf_PZyC(G2l%+u$Uh+$x0&cH)MjZikn$NgA2{yvVA)g z?kDUqyRU3IM%62Wps%rOD1PAd2F-;#xA=lb)*a*GAuuPvmcgID49NHF-< zP%pbrDjuA5A-mYNgGnKuiK%gEhg>LDKl(GB%v~YB<0<>a{0%_0W+WA;UZf$0%~~KN z!JRwPNfjHf;G%FpKFeBK*x*#DaQEI|93aC{+c4;ifq`gC`j za!Z5Wp~2vC>#M8AF_cU<{+L#}UJ zUrUgw=x3gD@YLd*8_WXy3Z3C*YOJ$^nSe**WAtLjfH2`mcs$P*Ea=AV^<33KgwMlA zTFc#vIT?CUbEHVFy=m0L1yN+0v~Pk2RmWi04xh3`V4}FI%)deGcQk4JmGu+$ey%B` zbm)@Kp~_c4ih2s#qQ@s!yQxp5BKApaCW(5EK%zj6)zK6!e&vTzmtTmKz3eTYBR2VJ zn&@{_Pzj>CGr(mtId;-8->mURy4E-+(}ioHjctmojzGPhyU;dE%CCSY*kAR2!k$su zwsYcEA#Perf4O46bDupB_o)Q?9NBagHS!y?U?jigM@fBQJ<=|;%4tfvO@bfdEKb_CAD4c##)tGmpxT*WU*Ro#ySG=mGdtkrjp63sI=`)K_l>qnj~PNUej5KFBUba;AYKAqNFqml-?+QOw@QvJ>51S z8fVtf5+yR6!hngZ1c=@G9u1M8)ds}{KTOzrZRzqgj}R3hG8?v6;zw)@{Y=en_5Nit z#kCw3G#eD4b?+suVwE*GRB7UOh*~c3V`wT?u#}-{GI&%|Zt{c`(|xu~wmzBHDu?U= z>tgOrq25pu!ErOE^!6wDe7SPii_coQv}s4M^&ijQ=U+Tsk_2uIC?SE+jNfz!kc8H0vFsL)V#u~iqflw3o_y=Qb4S|CZ`1eXo;pP#RT zKjUKsscRmc?xl8f9ev&c?S9DQT^|+vn5M*3(&(Kswn}@;?GvM6d%_-3uU>beRF#Z4 zpL@ArF8P+K&TL1La!gVM;Lq6Kz_TI-4$YSPyv>YNPg1EmTUKkl&PGLF)c32uwnTPN zM9HXg(caoz=$9enF{h| zv$gyT_t=<%Qtq-%Qt7Xg3hXiB&wUXeHd#5Ho!gcJ=`0?|0b9iVDkEaxC=s}X4ojM{ zRQdPqJ9v3$Zy&`W!nj6}-_Z&9W`D>nhg1EACtA4Xi9dvIx!RY9_($BpaF3?7X9nfc z01m9BX_iCXQa8Tm~J^ScM`fv!w51B$p<@6An9 ztgnyB3dz!*b`1@lJu;2Iv%cF<;$*6IGct`4AV>^Cn znjPgFMIEeyzP4KN-^09r?e%8az1X_Tq;cC_XWWO{txf|++^w3Y6OFnt6hWLroX`N&r z%(0xbiIF%@Di@?ec!uanf_Yu@W|D8uXzVVtiUoZSU~$RUBrK>9KSikCPz z8Gk3>@&4JY$2XD&OYCecd+iFQfBpR+Mc`Jaw=0o|tgp)*(%Cj5GQ!I(gq&j9?!IE) zT{KSAKYqklIy3#CnOX2gP|JP6VGsYkC>`35!U-W`LoDCK0WF;PZX|3mwEuER8#m~N+K?#VhQ}~{98L8Cp&AWo znuN^^e}b*;i@a8m+GvIK8H?St&Z74YGCN9tD(8z|B^qbAq~4ImevRz&G#S*S#YoX0 z5nuz0S4#muy0XVy9N-q!OJv?RW72t3Fmg=2RjTU|0TwQd(2+HwoJx4V@Cnp+e?0fS zzrGJ}L!Al`*kVea)nMLOD+;oEg0F(P{d+w7YFd=mU z%uPsX81x8m+Vp-abZLBIJt`b~=0&$)Fd-I(9`k-WMpq@S|JA3`P4fc*mb4b9vTvEe zMrJ=z)GD|Wh^QF3Z+FKUlRo}BpX7Vl*huz$$gmW2=`L1KaOH>T7iO9Gl5fz z2|PhJ`SN}d>!@s)=03Cc)Kvaa<2J#^3I!jA0q?6-R~(=UlZeTehC3`Civ6Qm+^&$! zU704buv&oay#FJ@>K84%;$w9HJlD0k2KZ0fZjeP;Z=hZgS%bb8R%3TT;)vKcS@pp zP1mCoH=-!0jtJeMYzvYIQ4OkASb67X+Q#=`;^hm7;}^j$e4_*`O-7-+3O6|yZJKpQ zYC>_%UINav=W&XNwc6xwRJJvT&m$ND_+OiR8|KB+4iA0d;DYcd_$~bu2z+WElDh&; zl?+DK-h3QyRtCsYQELhER1mby>(TBn&5-*U-LE4q3Rdkz%F_#_r@xn)f6{SiX}xV% zk1hTCr>I{yNZygCH>=~tyhqCYDZoGY(Nb=dVRv%rTKTo^`@<&qoWC+g51kb*IYqpGFEuz~aj-e<+$INQEIWsyd&iBTB_0*Xtoq z6U?lzG@0Rdvy?$qX0!Z}3}cxJf6=aq_uE~nChm3oK#Z0Q_qSvgq<)3)Eq7tNA^mpa zbu8u4IYgT_^kC_Jm)c)YQmhbbf*%j7RflYv=_st)6lsJk{LPt32ltzP@!bpx))ySk z@{RcXL}+c;s+8(_Kvo0ZZy|>nZ{KCnB%HX?RsfK+`k4kiz4G6^xM-4teyW^vNMNE{ z5cqC&3k%nx+Ji?66w3Q>F?sfkE0Ei+^O`L{h#}P-+2!hjn0`GFm#tc9%>aJOtLibG z-af-{K1s`$o>*9rO06e?i8vs|oQ%$vioc!9GMVquMw42wPOg?xZ9XY9MnxDjg=r9v zYAPUdtPk}VsCu*1XGY)S1bzNW_m&1E|7$?LrQ~m2ONGmf1BL>{UYnQsX(eIt;-uB1 zIekgQ9__r#<3^rXBOx}e(1a&SE})^Hn#59+`8C^62pTs{O)3I`+Ij3J%*{$){2TE` zlg^moC?|unwl9(l9=H$Q5ll%Dc5L|$YFwi_0TO&K7H(aVhhxEg+?M8|9=^6Z8d#F)9 zIxzKOKi~=;c&c&h!Slkd!1L)7Q8a`18Ztxmx;yE7g|Wa?p*(syLqV<4{VVfj(~C>e ztMjZovW3n?sRF}e_e?}3yBYGXd1ONzFKVX0Pidk56qVq?n-G{zek64s8!qq~lT0|m z_ORkFE8P~0a&OL)gAA(@jVr589}3p3ut32~tXSCPBG7I3dus#F zPXE>?JIb`UhK*XS-0eZDae<5Kp(>|V80sSsPz>msMgg}v41mRG54alQoiCX ziFOT4TA>*;`W=4+pez;l#rc^EYn$4Z!W zjF=NM7IwIEomXMbtlD!+9;m8o^_|x?d_hP&a0R%iJ)1W}XjV971tplL(CY~V>;jov zK%t4ZYTbo`Ee`!-^sudT`N2{jr#eLHKtA_2ChH6U0Vq>QETz`5Ecgok#ey#+tdcv; zAr{1Ros$6UQbCve2{L!uWV)5O@$DI0>tc11{*Df)c!nchbIfIlj+}wfRLu)Lvvw0} zGef1Z%tYq{aqR#B*Oow4hguyuNVi20&W%$?tmOWKk1(zMkO7Fgy|$9HbM8nrd#)&d zJHdgl%-uh!8x*rH`*0n&|JPL|l_8qHtpNL+gkuf=>}P5*me%{>6Mcq*cUfp&x2Sry z4$2^ZbyAc??M4lIDFD&mLG^T&w)UU0W*YCwU7=UcFFMfmTg8@b1)CWw5aprU*HB_S zdAli)%^3kclNJZDcgH%x;nBs|7h3I${Ep8mGFRBIQTTCfCxMC5@VbV{a=rIcmDGOl z>n|@_AiO@AL4kl&AWan5l(GCH70%MQqIH*y5Om{kAi^3*f4l}bNF*&G@P+>W3NGd7 z8_?X7JmukwPE8rX(^G0>!Cc`ACmM@3#CH+1yS}PIPCAN z{smP&`WNh-jm>f1ZTmFbjOj{Ib!`X^L=jfO;;kQih)EgvYYmE%dy|_}WkoIAs4Lnu z8bHmZ-HvuhLDKfe=~MgXG{Gd?7{bLY-; zzD6uJ$?H0=EEDn_v;5!82E7O=EH{%F*O(9uw79fmTK|p z9d4on3EjoB)|u4#-QA0$bW+KA{~c44*uyUkcLZVKs3FmVy63~gd-y1{uie#lKf6EBFIDr~J?4+v!OU3B+ntri zqJ*zp1gAb8>?*^bHgBj$Q9=>4854YpuEH{L#8WH$+ zUVy*E(R9X-9NYW4s5nSmc;qjCUG7;oIe9s3I5Pa-Afg(UH}`IqY-0BtP@Ka~W)Qk; zU%)g6Z(?Qli<+(rftay_Xx9BH&goBQZ1O?O_{LinVsNK=+zO4j=PI`W`^DlU&rEs% zVLK(Nj;13>P+^nN#^95A?h{97L6Fc1Q~X~;{ggb7zaP3IXdJz41*1->qcLBAHoggx zBN$*L^B*;{KGn@{Ph=hJN0j12(izzRC~hiaEqzK=%c&IU`Poya_OVXa*v9om9Oxgg z&3>$*9bPka=X}(^&!U}VPn)8=58!v1ah0z@oTLApG&Sz-d`H97nA_oMg5_0Ld>_;u zZ3<9%P5-yu-^_&8vFvqMgLTOWx%J$SkrqS=zqJ_|&=bmai`{8rcYvNSQ{LsoME8YK9HMBl)w*O2Hub`xQML=}|5wkMuJ+6sR8Ev%v=c5h)O z@-9|G=(^nvgwL7j&3|xeyO=>6e70-K$^P~(4b5`~FaFl_`d1-a9rk9(cmBcOi3?J| zW|_?2`(N2LPNe`R2#r(woZ3GMg!^7lJYFd(cWB~XwJ*5z+%hb9ftk9y0N<5R%B{!} z#B~ZX2YPMkG&z*XNJ3wsr>f)7YQWg8$@3x9*KB@Gr&j3?pE+v5^n;nHo4sOA)d+74 z_h1&1QR@uIRiQ{3uLTViQ^l8RlWksiy5>~iJUEZuYfFR`?T=1KvKyW%*UQzsy z`wp=hr&*%7zWBcwZ_|)HrH)M$f@buj&qeMQCx3gZ^k*`tQa8YnjMt)Y~CIi zL*Utr_x=0ohE246S2i}o)h|d|b3ccQguAu<{|K?DW6r2S;`_|W9c$19G3X7;HqngG zL#55Ae~mqP8$@2r6R$PPVxJ-cUHuOQrs%_oH_jj|DI4cmJm=N_r z8+dWBr5RiEBJBTG#bKxC0_h#*mCgLNb`)E_4!Nx<{R=%6I38~AhC{=7XV8CKNg!4I z?YLMbE{gD{UvHg%$}9Ln9^#MA*D`LU^+;^4+y6?83&hDJ`*3N z@(3T04`qu!Pzh}9KrN)i{q8b1_20^)(xRtMe?gR`@p!Jh3~3Y&jFGfs72*7kO&TWY zLl;K7WbTE`A3g#yJ%~0I;$&Po-~p4Gi_U(VAGnU-@I7;}PAdWRv9^_6jgD1{ zX*R=Ktp#)Hfd$rl7|AdzFhr>{RSoo1>>P7IX?M7?NDrR=CMa7cmhw1ur zavy|s*Jy9+PF*r|mSkSX@rna?Sm@s}bLN=Wz-KIBn={TAkvjCEa^%gX60$KE^ZHMk zd=aTQ@c-j=2TIii3lG$@zi{rAaS(E+91$(L9p{4NE0-0Y{0#eV=gR%@?U)Uj`8W+t zffsvb?D;B^@J8o7Yhmrm^OQ^BI^R4i?Ege*G_n{(QeWi|ndjik=6*To=$k|MKRK+U z&l*)w0wZZXVmPwn4H$IHB1I6wX}1*qlSSPsR1#Gw6~P9X;wVmdo%4t9^;;8@4P=@| zwSt+pGzhn@aTA;WWW#UYR1!{gIj=plJx2;qEXNHan7>u~Zj{Wi+Xi>dQDx1p@=V&BJ`=yaJ<$Q37uI4Padq9_ zM2qZ%VN_(+HXW$Bp6ZGGx$zyC*ENT;0kp3iaS&R#tc}0vjUDHF*V=aiC7d5uB(2(o zliS0ak+k^t;4i9$c3#-GQF1%+GX4i@pGu+0aZQSNYAmvq_=?+_U-)~SKP?%kzS`6N zg}v#267w-aYh&oqfZX!%!TuWmp?5sm>@a!y4Z~Ti5`F09bOWb}&ex0oTbbv}65V+t zl2$c~%c8t-{_5yw#BnK!&C7bFXV3#WM**lOM*DxyxrLAx|p%otG2jzYZaOhZ8$&{ zz4CSqxx9)0RV#-!unzUzy0%d zH+4dVtkdW(? z8?%tt2uNA{9l*#8y3?{fF$(;mMlp|l>%#K%xg@YnvH*=vjJbi->IFWYO9kdj3pq8lH;Zf=Clr zrkJPY8?FEh+dM;tbKIe@m)&ecj_zB^1$*HOjbXptCqvb_JZuHsd1`;>F1rB23%p)a z4ut15=uoGrr{LQ{w`4RezKzL2_uV`bE)CM11UND0oHB>Ot!?OAfl55)12f zSuW?Bi4VC(f#a}P^v$e`2x;=|aa@w(Nc5gMrX`5s$j`m;Wc(TM@Y&9h=@WME_~Adg zzKOFaCaO++tfeqo%fRB>p0OP5D<$dX^)heYB`v~#&Vt~txB%GcmXsl2DkD3;W>Z8*qBheZ4*+L753fjg;RAh z+e;^t+>@?TqzIKR9@bJCes3#Yjw8QsDZtLmCHl<^!W+5%3~MwNVxc{MV2+zW2uZnJ zoKf$IH@lKaL~W^YI@bmh_jI!}cub-~9QYVsuqhoNdLdq(O{IwEId;W;+-Pb#*2D|2O= zV|A$$dS7AIvBwXZ{Tqi@xbx$Xk0iTa)a~oy_5Ktt*%bVNh;frN6%ffb9WptZe{ce= z__O2RGkYuuKZSTM>g9N0XV#Wl+n$~4oXjpGR!r1ofO%2yUN;>ZsJy2=&cLfA%DI- zYXDm`BB;AKx%$+8sC%>57oacw(6>Q!N%EX3Ew*PJUH;tfC zZm)*FtUT)5p7&<<8FOe>#l6!jKF0T@$tRNPvE+6Y4@dThZpE9bpy~6wQK_|pu%R|! z%9-G>S(eun(;MPLCl~4Sm)!8cy3ZOXI`Dwdg*$cqBnjR6uRi!AnOeiwoDU$uGOiWN z{-PwU(@lQKmuN4xFSJ%4!;5|M7(cbuW#tV!?wq317*Q~!$+SPc;#Y0kMJ=C9o}%5g zI7$AujQS)4`|O!3R*1DFOZF3+O0ry8Z_AG7D4>m4uGJA{Ap((<%**X$~rpjgEYLC;|9YS(X(bBFUNY zqg_EKa@CE`e!sd9L7Gahs1=&#RmWvfoK-!vU(eMiMN4!&`*SMLS5?F*aPBbTFteBv8Pw7}*`lf|JQHWl|`m=KK68 z4{L5%dovbmg(v}KbEZ*9Up8NHyGl1}J5e)``d~h78W&4CGGsM7KBQB7sZ_i&K%5Z^ zrhdbQG%ju(q& zMRKR;vSgWh1KY8)1JEtb`Z;L)+?Dczz0F8&+>TD$_h2S~dKS2{=Nvj51j)%0EZI=#Pbd8g)^mGkt`p?9> zew6Dn+X%ef$x10l~-4GtUx_&Eb*tMC0`#>?yC551M zdZM(r72vNK-kZIsk!F$6lbeA!mqe%wqu)Tn6{FG%$rFW*!1?YszO<52xe12AM2^PE z9FE_+*}Gy#%gk^qA(@)_DBy|=&s2jC@7vlP*f4*N*Y_NmNb=|v;q2ZPMZh{=3d8RW zX9C-xs1sa%#k?^v%_yKkK-7ha?xWrwTs$CsUJ|^^3=Bz!DA3e3&fe9(?c+#brX4)k z5*+R|(XVLa5yu(c7Y#zHt7etFvEAFjg$?U$UJSGa^2-GTKE8tloLfOORLu1q&Kyrp z$mPtzfd?LgmlgQ$qIhzy9?=$`Qy&-{JvlNXlHqGxSe(c6cb#!#4kWq%r(WS!f_O3+ z^O3H1Tg*>I2ZDsgRAlCA!CR@eZ>OSH+*h{;6^{D%QAf91U>6Ty{D4Z6$e7AwT{XVs zveIKtd+d`=a!9CZ*5Iv^1@z|kHlqn;?A5-c)o!MjS_aIojMscb6=?;dQfAnhR-vEE z$H}p}vInxAS*o`ZP$!9+ZQn-S&+I#=e^=F90b=?#zPB96HT6_Z`h& zdGaR#+sQU~)t<^Rw6}>7Rfv3}LyX?yt6&n{Xv#TN@i!!aR?vj~3D3DQ`r(4t%PKYL zotw`vh2OHMcZc~X=oDtXIE`b1$liAg_>f*5_N#pHbeD6&G?V$t$Z2v%oHDFg0XVLn zW>yM2*k^OOSbqfLq^n%u!cCHRImh5U;-fiRZ~HdI?_+*i=aRJvTK>~kX&>d2;#R8l^AKjNO%Rscn3SlQI__^DgLGBOe4!U%H#Z>Ql zQ*oqo)o!weR)3r*kDb9jQy#P%3^~jNmIpcyF{gnp|Kg11B9vqid;k$9s;AO4j+5xk z^yO$>_=pTxE1>FnV&su#M${Re*9}*x;K|%N6Wu;FO$IT`ZAj)dr0_JR`O_~X-`jLE7!Pwe+connMvipTS z%>e0f!7lT5#-zu|S5#hcQ8LRqYR!EQK5x}R1vXA=Rf!UG@}z|dVc}cepY`rB7s&44 z&PTVsuJP*Jsah$V8QJ@Mvq(0FakL-m9Zsf=@ppis5aIG&%7JFYE z?%Ls8zN|DHS6qujH-0uQV0$N7gtAcnZKTGXSe0^e!EYYNS(-1Dc>+O?6Z&O&DHfu@ zZP<29mw2lek^@!{z*NA_AA5TwOV#pI&A8BrsssB?z^kUX8*`P1+sfQ(*=-TiKJnh} zr(I;sETcBwg)JL)>0i!|1O>k%*wjnt5btN(AJty42jU!hxAzBVV`DYMnBQVo_*!Q; zRcG^^wn`{6cQMetVWt6q0J++<%9rVsYM-g=5k1OE zZut!8uMI=XMISo->IXm7Y}ygjX|za|k?SF%k8XN}gqnxxay~pZ1_CXe$xFkILgi+k zu-{i?-uE#y;20`^juFf0-wvse1HuZXwO!c4PMdCY?b)0Kw2lGEW^>Fg+~zF}J}s;5 z8GAurKa^B=jT=a90A>IGJ=wc^TbLNqG@pf{YIVs8OxBvf@2@&n9=19F8NkK>eEq+F zoTGQXFrs8IUq*fe5F})|1Ea=LJ6D%+)%*K0u!sbM1eV91wano&FW@gtgfa!Q#r!lN zM6iesA7{iWbY1zEs{;QU8uZ-KFPNIRs>lT~M%pP~POwPU&K5yTfq2`7)(2HDq0f(} zWC&Ex3Yto-0UNJ=!iNC2O{}))GSI=@7JRH_^afE2-Yj}(#DgZl#`?B<#DyEIYy6!| zXbiCqEeA|XIKqkGCSg*?Q8ifrRvRUx6d4amF(#q*ZvJwzH}pE zbVuJ9uvqK66G1mU-Ek=^v%pfDe+i`&PM-&tY`0&Gw014aY&EyK8w$`hP4Azl*6n)P zu0+7a*SG*9R-tyRsCvXWp1%UP9O&qy7-bcl($RYnI2lrwUz}Hkx9QpY`pP>*=L9zE z4EwDD*F9_bt75a@eHJk|Db&#z7m{(UJS}1{CksqGE8i$V>r3tCgQGo8BWBNp8~gw- z!;{D1Y_IHrqa0#$vNeVgI066?UaU>!2$S+1;Z#Su1Pn#*2%ETiDjyY z9e%1g{CWA+fy>T<<`!`9^{wZH_C;^IrVD&Vd#V8dNJ#mq%yWB4R%Db?7rIpi+k@$% zc~_=tZv9QM?c{re_NBBdgB3HBL@2&+)!X$E9THhAHL>hoC9k-e^we`TJyZ z5pfeppD@*;=(Ro#NiHYf*@Lf<@!zXQuBvF=^n>8^a&ZIbeXT4+R6%Q(R@cV|=u`En zwi3XVhBb1+sQ<2bUvOA2D$U>aC+y>sH((oGL1I;3V)*$3!m?bv-a@LzXg7tG&Ej#n znq$Mk04X%G0yr$fs^M0m$n`||eJ^IGh?sHu2}2>z*Vtzdip}BkVX?+Ho9YG8Wj4dY z{9%lZS_Ci_wgDK`$cY*HwBWk7q!Nj^?Hd8}=5Aia!?uwf>NGpE1J)h+awZfzVU=!4 z-HEv1@#hN;411LkCz#3|-!gB^jQP3ea1}{~7r8h;sx6+Y-+URSpT4}Dv#FK20#lE)UH99> zcz@Rld&6VH_?N)Y42Sw~RPtzwL+|!t?<{SHo(o${5r|u3?8NlfV!yi)a$+jP9i0Vw z-fvbZQhVGVbU9zRvA7(dnCI|d8_lpO`pF*&u!YdgUXkv7o4N~5$x9bcLn47w1LPS( zr-6OeD{a;mu$vS{{{Z9nw{nXjb zyqB>mX88^Nuw}3d^S%{9l1<*yT|E}4of*Tb!%)Z6ushm43+<2>P$;H$sx_sdYkn)% z?S5c#CO=-!;cLglx~b!RBZ8Jd?U&$NA&4rVWusJaoZy#+Tt==vY1F?&D=e;nm;dk2 cH^IX|Y*fsTOKGWg6sEYcy!z8}*;m2;4=sx#a{vGU literal 0 HcmV?d00001 diff --git a/Documentation/labs/read2.png b/Documentation/labs/read2.png new file mode 100644 index 0000000000000000000000000000000000000000..6f04b13ee8ae0dd441b8a29007f114b5c58119b2 GIT binary patch literal 33750 zcmc$`bySpJ)IUlqiZmjjfQW#=(A^*{jR6cu2#Dm+-2&1gFm$I%*U(7I07FUVARU7Y zFw*zI?|bih^|#jj@2>m&!=;6(tI%2QcAkC~koNo6~`sdaaJ&OeWjDFr9d$8T?lez*SaAh;ctEPD_4 zZmY>-at%}9@z7-Y)*(l5`!)?HCw)al1&@iT>Al;g#NUvlZ$z*uLhkV}e#5@a#Cqm+ z?2Bk^L7dKcm)1@ioMD0^(Gq2~7=yFRSKFtH43jK4044uFJzCgFhHmd{MVGCH433*D zyqS8721L2nnq!kB>%MLpIV_ybB|F=OeWnpvYkC{0z&lrk;yRnI(i|(xGIU$YsGq26 zN@_`SHXgjfy%2{xNeCgv7YijX-%W=)55=*s+(4h#?jFH%+dLP~Ln%HpU}0s??W97F z9ng!AugT8OMPl&iv)t%y7A>2%OTDw~M0)K@QUlE;Eets$n8qFi&m87BFBtcUlIU?= zh%+nR*WOG!laM44U9ZV+Q#+fogx5XvtH1vhoI?ZfZ(JU{b^B8A={SB#ezfa*(9p8g}I&Vq$sqqovq6O%q3n}K7P(_n@p2cd@OMkX+R=d72qL>=XnPDC1 zZi6AK^TPPA80%hh_Pw@`$T`At;+;kA^fLq3%e}f)yA#@QcCsK+G^aRtJM!k+UA{o(ck);M1U{D|BDgAD1$0l%gqD6= z542pmrJr-+oJP^!SYiHY5UVriR52T{IJMg#U+A+S=Qmjdp{FC9i4(ghXIex*Tt2Ji z+s3z8WIlOXgAB}kmL?Z-SHu3po)Ot;v3 z0gf13^II;%!jk#XRp9$!^X)||r0%supvO*2)Q@F4SL61`1J{}>p{|mvy_Sv1pWCC^ z5cGW6m@oaos5|~QZfBC?)JEGqzGb+N0g{=dQ2*|1BusC;D`UiW-*57*%!%#ur{FU0 zHu&pSF;s01JkDm$!?j{h#I>^r;%Y^sVTL!EhDMb@;u#)g(F7lnLe|9UZ)4k;u-$;9 z^j1x&l-s>C8uY}K^NtC=V)s|nJBELsK;)IAQJ{B{`(gHq={CN!zeKj?&jMLvSal9j z?93Z00~sexB&3{b#`6r`xTIqXGD~ScrGroAIiSp_RJ3v1#o>(41l%kQ8%5x*F!&X7 z>7mS1{ClmI@NB{RaHdJE9&Xm{?XP|tV9NV03#}=%DT3GW{iq_1b*~%_aJf4{Giz`)<$}uUFHBRL~o|F$LQ)2CSFzjkD5vH82-+a447XeGL8i z$jy;ol)svKSGT{q@hhg|55|$KY9+P8nr}4>h5KZ*EDXqkLytaL26->4GoEV#%gIT0 zYCIhJZZ5qOk$?M~N}z&bvTbE5)_Sq?z!hJ9ynQr>@>5x7bk%*T7FXrgp~s8j_OOi}G%(?v7C$*(>}57OSl zz#7^BM6n9Up-^7ph^7H9735*>y)eZ#W);0*9#(U`))=g~HkC zl@?Rl$^&4{2Qy%UZ^LmeqKZF0UO1*7u|ZzwNr_H=mr!xMRD1gRNg8bK~ zW#ernS=Z{F+Hy9(j1H46&pUW+|zaa#9H>`mh@#rkyqF9wq)E6Fld2qqfIp!^4}SlpkDB)pF( zU-s-7x8>3I+xBfERFdMkdlIzoBAtvc=VpBzX6)ki6r2wP`P}2JqR(~=`((f|YOUY8 z0s5UNpxW$ock`QWhCxgZk1U!k(nGvI5K~`?%W*!2NTl&{9}8%BWg-u1daH(PHcgUB zl!=-5UPHOFXq2S-PG+|%eNx%Cc^x3r&m1pRo*Du?Zbs$UXYx7rRGTbNc*%Y&s(*ND zU;q(amOLXSpD-78OOf{!Y}`6*BN6`P?xh*H5$s z%8(O7fD`W?g61nQn0U^FR-3(>S8?YlSz1s}>k2BP)GvA6V}!OzZ{I-cI|pjr2Ee~fI7JfJDfhDnsh!CWvPhy1T;4dfrxFrI=And%s(V5Tsm z2(=4);i^3nmAah?22K@oeikz5rvumT)|tprs)Hwtv68YV;=7z7&F1!AJ}3(&kTejb zWIslZMh9Wya?CG4zs`6&)7M2+s5eaX;}Ni^BW-Y__03jjaVac_7sS)Uz3KPZwO`}_ zl^I?GQ~Ob+TsrIkY52J0<9>DE14TOJGeR~Oww*#(YYgN4c-}qj4Q5qUY$Ao)d$uVb zuUOv< z`LEh{wi>N5Jxw|DD+ekXPel;+kJ?}YPg>tb&T=F@(suGdd*LiE6BC>tbQLv8^Q-KW-ifI)E0fgYgV0c$D4-?>Pc{*@EsrRn z{P-W>zADrbg{E6pye7lB3`nQZniiPVSa`^~mij}`g@Bf|CFQ);hCvW|U0q*@LaM2W z$*$&=u&c_05wkG$l(NTcdHRG4lN*YUuHxPVE=;6j790t7Jr#4u(g5M>>3~m(2aR#G zH*Q6JCoRgMK}*h(OY%D>?q6Pj9h!J!RO4x&&0VX>FWstnG0Oxn&%VmibXJ$Q)GR(E z8_y!V?LxxUK9=+6L3ZodM;gFqT%Z*v*~ayr!To2fE^BB?=w3unJ)T*QIyK}44rCLw z9UW=xL-(*4*;SC$=FGk-Y43HxW*^W^<>$HTt~xHO4XgQ^a_7cr-H^CcpZXE+PF?1@&2d z0{3NeR{>J-#*Y?RQ}}9OKK~c07hx;ptwp7?bxsV(uhHHe+;8>2ZVQw>qJJe4=~%Y- zaLZ^GuK6L8X|o;{)$c0G@*29s)lF1E&$^@L8KJhw)D}aEP)E?9ToD%XUWv)|qek35d;df4j~p{qiBcOps^ni)XkM0^&NoX4P? z;ur(2svSbaN%-QbF^W%-Ez^~0ri~Er#?f5`eUlrdTa3HnF&7n{-L~G6 z&!P2@hVtw_zvz2R$M4bww>LJQ4SBX>c0xrCwE3SZM5x_&b$6bYOj{J(5`oektQ+U# z+~XaN3`k9q&eJfkaxrM#GxCZquD(-#S(`qWva7P9)!+>)#HDXAEYH|gwkm8V*z-8- zcdW@rj_xsJK=%CSIeK}lT)1S4hfLD=6?U`(0LDPZ6VK=LymOXDk-fA(oZCGuED5b&yq%C zCapePi9ToGv)h`Wu&EY}fGeQ%oqtNIJsxm|mwxIFKsAJWSl&rPobP8U$)Y}sqP&R* z-MOBgE4uTz0b6XWcaK3~a$N?mh$~OxP_R$Z%t4>|m)9F44!g{Uoqm|2@aYrz7>5E+ zS-xW&*VsX&&dCC$!D6Tt!Y-L|oOjaSTBeHIv~h8)2>mCELJ&JqH)`^V1#oqZCd?NA z)vsYMl$zeRxqHa^(Ec#3Y{$Vy*DK>5=9xZ+eBlFiVpFms|E8 zFgb?V&*249r@58EVn!%83D=5h*h*S~CJbL|tkwO;iZ`P5OOTUjmSXx9(}{y8u!fB^ zm`g@$?@d`p_7V6O#i+OEQI3VX?_hMd)p}NZ|GwzGNyA?X?$=K4ID9O3g7!wP|xOj#r?ljS>&S)I434c#|IQ+H0wM zS;s(gi!JR8u>cQp$$ITPVWb%_j_xRt9G+=7eQ7wi&EmoTm`LoiZ%+ohC-rWoQDaCp^&C1$xrk}KT zoUGxANbLssO(twoRFk0w_?6;f0ky-@BNwN=%+z6nrZAzs?MsY{MTJy1@D)DZYI1i^ z%w@yR8%_Des>*pCE<-xMJN)=5Jk6*ouE#x2-?Z)!ovR#0EHzKZ%dY`Rz@ekx)V=u= z7uXYr0`uXm=D0NmB!(czdM{bC<#|qlCl@6F%1|52Ugda-K ziRmSoZK^A-M(VdOKi6MXaB`~oq=x6$J%g+*IJ7Zy>gIVfy<`g=HMya3cwayj0`wZk zP1`@kHx(L&k+FN%>PAptJ-qjE=qpRmbzY>f!z?TJ-YcPJ;(Z-LY#LbM?Q5$NIcz|; z|1TaBm<0tTu^tTx``53lkK!Oe1cu-zc0xS(`s-(ck6JqKfeR8m7q1P z7)H*c>f4mee_pklI4|Aou1~tJ<~_Zg$oycwph7wWjW7@zFFMP#oldQ>Qh)j0H_JkP zdnL_Uv(e|YqlTfhyb>=fOL)DoQl;EC|Ki+d;NmTVi0h8`fK_7)Ni7Zfv(lOdb@Npv$%q(njL6=7 z!-4EYS3~3Hz6-C%mprqmx41V=&NDHfX%$ClW^7cLaX-QV#nB=Dn9DEaPSNk3cl~u! zjzd}Mj+Z)J&RpNmEG3ZXcI6j)Y1?;LILo`EE*`NlwMA*2?;CgU$Alkd1VtzL(%Rhh zX**>Uhe}&%NvkvWrtEQ>7e0_;@u@rO6k*CETXcTX!i6wKA<;!l8VK`&bw7o}VEet5 zda|nH_XkZkY=$3k4BAID`tjg!-2uEsq4|)1yic9xfcJVKg!WLl*KQjYO$+!pK^7j1d0$EXr+^i=hMoEV^TmuXQ|*o7 z;SA=-+=DllqSv1iY1jIiPBb>~{{GIHuQEI46&k$HES05zc+LF%sSU`vcZ(rzq`# z6L+TFoxujb_)D6JMY}X94UenEW+{*DLxeLT#h=h~;pqoBn$lND1Ke8lyR7I|&7dgC z^Xe|T+5gE2T1qpi+5LOVm<9r8f#o)P_o{4!(^)tfl!1MAld;YG+|NI0-+56t0&ZHw zJ$;&{=9s~}PCLtM(0)2mez5-4qH}w@ZNQ<{?)Q+*qBzi9HRAX<6vioi=fi{Nt+5^> zB;tAW3cC$+u42%(D3c%7b7^{Z%g@Aim&YW)q4G0>t-3F{nYfE|dzm&vT{nH-96_C9 zoeAkVeK(@l92rdKLM4iGGLd{=FQQV`v$i)Lky+)%#F6Su$m zW1wye^5}gIUW{~CB%EZuA@S$QNwN-j=D0MgNrUN4SVmwZBD`+hKGu*(#BcL_C^6is z!+fCD%g$U^+|@0~+NoBb>m2u(L;R=IK<~aQ zwq-=?ucIN}BX={Lg~^~=6)>0kp6&#X${1$!+g>v7e+@n?HGwoN6ZVs+2q|yeYWzTn z5&l#O1Ai)q(<%|jfD3&W%EeY4pW{L{%h*12`bu-=zg4rLiG+J<{*1NS`At#|+lZ&rHG4 zCw{iygDIm#qTdN3-=EW>J6b_Y#`8B^rWR7H*V9Em*YnKPUWl_xxzjJ-#LP}BpPfMC zpm<2~2y$qD0@|r9N)!|3b051tZ%i8Srjvg!eW6vkq#>sXQ8|11jas=14}*kkmRRqphV~1 z4@BFsW7x#O9JH3+FoeLf?^)k??y^kpY{ztwh@3vuLC_5C=_FX-EM;}t{Ynw(G)1EvaqH`Q*p525jAe(~t!eO?9HasDyH$RH|MF#o zcgyk2a@-imn8oL)7xolkOCULBCEr>;E9Ca*2#n1~+QIlXC8SA!=WR*CeF(^G?O=|^ z=mS!=1D8@(>Xoejbhnj5#_`L?R-HznrQDHRn;>#tKoobObmVPBC@nFy>aU%Ak21dX zj6K-nzjFgSW-N|*X2_htWe$siW7LSJ-oC3qI{raz0?b}Rn;UWFO}NmgV+9d?oRL!a za!gvutJ#tkvZ)v^`HV5aBg=&qG*8pL8Xk!IlClTb(dutZ%$xON-{v5Ho#9uPg%tmK z^FqMRp}F^d`? zmreY<-z@DSC2df(?rV(H`DvqPK3n!fsq%y?OxKvd1U8pYUU?^!T;vkNKC_u!Bq8&sYMU&?~4B15ZG-Cjriz=u;o4cWMW65#z8`;kb_RLE=^+EK*V75 z&GqcGb9EIZ6d5!eZlA8@o|2hG+mUf+u3sMvQuBz*U{`64^)_q`Ey8rKH9!KY$f4Fs zquztkuO81;830~zQGUi*KNDjbELfCj)Hg|Ey%?0_T(0aPHQ~-IG|9ZcV%=SE*`v9h zK~8;MkR}1$=9~JBAGsG<_Lr003$*nWcZwE6AeCf;g64j?JNx~4Ze5^ zc0&`9aHN@{L86hQshUhNE&%ul_C29*s(**W7cNGN3o6mrh$gl+w*eaZo3tBg@rV4= zmrj=?Dyuc37}6kODwfO>!07&qn1#%|ScP8d10d^Gh2q0xRlbM-c1ndT@%oiN}2 z8uV?H(ZPe^*7yiD=>UXkhqtM|EeffVPq90b<<<-H* zDXF5<6Ky|Sid~+m_0A)Oi`*1-VU0N zM4ov+$C22OM2QgZl;faqfnzTsGtrL9xkML!3TmS{D{?oTh2G~R79yb6Ry`Vxq)_0L zB0z9Z*((D$c2Q|;F_0>X>6Fm>w(c7@3_md1+GDyLDS)}mdZqeS;vIfh1cTsNYUcC5 zSttm*R}l$_KA3C>ey`?;)ebVyI2l^)D`iTULRbt#8atTlFd=^#GX{MDZmhgPtUF;kpWA(@`WsZ%55y^u%~rMe1*o_Uf2I!D-V2w{ zn%=p~LI^OrWUt^c6}PweO_5F-qukmtx6Dd*H@Y{?^9t=?v&$XF1&FlcG#A8*YRFQw zjrm?(@T0SkoG$v*2#uz~2Gfvqp^%48sxu$=CX+u>%<|M1&vZDt68?apEFN~ zxxgQSkZX+LYVP}HV%_U^AI|6*b+5wmHP2f~52T_gpw6QyDWl)gYJxAr;kH1ghC5pF z<5Iy-)2w>6x6ku6dL)?Vmvl@|{C1_zG*4)4KQG^0eo6R1xdvBG5P*2`UHtUJx z-rIRf!1X->&8OVdoAM zRlHT`+4-%R)EWwYw&gVi;?xTX=o{-C&QI}vYojDf)v9B(V92J}STFuu(e_Tr2Yqpa zL*?4LF-?9~4|_a+gzXkQMMNFWPEQ@oV6^0VH!Ed|ZUAsUyq`*{@p++{`NqtBb6NKaW__W_A7jMu!mXsG_p7_;-I{4Hz{@An4sAJvN;PF6< zQ~~Fg&Sduw5nUApouy~y=<2I?15bWna9y7ve|`TdGF!O zg2K})uuIIm%ApY6#U%$JB9VTgXRct$Tj0yPO0y^9^}_2perdxGR&DTFcZ2+b#h66tVFJ7aj(E02VRQ$si<1g{xaEsOq2kr=m_Pe|DrfEx8eP;4p=jMZ`gBAY z3JaOX+qKec-OJD}vIHTgr=NM)x#OKa>GoBu9C^R;QxVqkE8R|bx3AO_p)TU<(UX8k z(-n#iK^~~K7S5@Txm)3Mts0RmYA3E=C#B6&G@1l@@cL7A)nzO+@;*`~KW(_tPvpO$Xi!vjH1# zeljGw`}gcvOq^Zv;(BYC8#%EF40$AKF>6S+A>KJ^^dL{f8;X3`OVBb5YQBM?c|QL# zY=tK~x>?y#qr6yqj!%Scg*;P0gl(zMa=dXF}V8Kp!`968&AJk{2LqzJjR zt{MbEGZ1PXd(+wHHnK5}$*`SO-v&BHkoQSUl@uzLTnZ)4vES^!_3HtW;9b1p)j1Ij zn1}*eBw15AMl^G_i6xzt*HzHuek>nUkM%pt{l?+wQ}fKYp^(@+UpLC`Dpw7-jG#-E znz7^Ily=BRh0XT-2Ol%>RKGd(bR5Wzt~0=q@9Vf#=Zf6;pE zZmFWr3#E-V@8Bpun)_L6_@Ymt z1JPtiHd+RT9dsF`58v*{pcf$?A@$ocao74Oq)5RCvU%3YFCOp1_MKuq2D;?F5$rV~ zf?KV#kUthY5a%f)6s`Ued>$)eS7z-;w@aKYv2jr5iAuqhK*4+7wl{@T1%2k(IXV($ zf6T(97jBPx`d^*`>s)DPLq0h7e}4VYXa&SNv;l>Zze7 z0naTN=Z?2#+Jh`7@Yt|PRaT{F~ ze|llXG3j!N#}6%Z+3#r2z+WgiH}<|%8gJw;y0iXZtr;;Ok~N#1`rix(6p2vY++QUY zB%_3JX!yv8Q_`>*Li=pV2FW9{f1C{7F#8t%a>pYqC6jjg= zHkM5Hh-4z-z}51=8~)hq+?eX)?a>9glVzW_A+KXv~Nd&e*By^3!d9=OK-ta`&=y}@s(_-5C3%{%sv1)Jp?_udAL@r`|T zY>Vb6^C-h^p6kw?6|!}jc$TgriN_0_(dkbM5XEF}45MdGS+9rs$`BD_jKP*Fu>+N} zIDXYsRaY@#xS^)^?mAq3xIp=Hzs8uD9aZYC1k>x@y?58TzC$QbH3$CU>|>q|bnck8 zxE*BoJV$K%ep>u~fb^5xtbs~6PWS3-c*Z4={y)Y@pLa@|yn1rRdi68w{72^1n#1K< zx&PJX;uU)F3ina!V0#CLtJc=mo(jD}9Nk&O;>G;p#SyCB|9rCTYOw8st4 zAV@McFx18J(^e4cj8lxA>iOxeN*7Bgtc!;TLMSqTbx4Jk5iJp?aVwDp^-6DOs5D3% zA4x6`HoF%J!=tyvI=z)ZKi^qGW=4mN)E)cW+&@_i`{KJn8LmbI`Ctlc79EqZH#lkw zm`)U1ICSN;u*D{NH3DH>q|kezOd#y*l?1`Q2EumSi)6rNK(9_xXh0{C%^u{2CV zUa3~s-$Q9xh8otf?Y1P*3Lb-JKD;=3t*+WUUsWhd0{OrM;w6#?;}G*>`Qk6#9^(>E zbi3?-q~^RBJ(a%W{Lch|n$HUPflf?T%9HP;`t~d7-avVIuMy+Gws^`b-BcO2$9rs zZ#hL!X~9+S<*F(U@0VV|qSau`3IE^xWoy;xOv-IUj?UwHGEH+yXAqKxT3acHrT18u ze)x+~INcR1gjLkc^sgl#C1xn7`<}5P#u4eW?i!nWR7_G0{hL#`g9-fRCDrj?hAL+R zQq-t?(}t`L7e5f~txS849Mk@Kj*0RUX(RlbZBA=bWFOQ~ui{`eU&Xn5GKjjeFUrEA z{3dJB8DoEsAII(1voEpqDgmbFCmQsb`tjSaYK{7)jAHyo*kU<;iG~>y;$NX;tI^o_`Q#pvJeOK|t96gf!F9IzpMg$n` zW4_xcah?K^vEJz?=Sy`0OaPz+fT;clr8t5z-Sb80TwQO6>97+NwKaFv#s1Jpn=s#9 z=;Yd!cdhT=V%>;s_c`t|PuQ%QDj_Pr5LW_p=6}IE5NCv?O8mf8y1+p!xJ2|(82{b6 zKkWT8=^t)n7s@$nh{2z&4=f&-D9)UTqpKADo+IFi>#e`vVEw=T+~9zZ4(XqOR*8~> z|3((ex>i3!G}T{h!B-v733%mWH?4ciFz4Ps98cp|$9JEvVvoT4yU(Z@=9N^vZ3yyj zZ4Ru7663DNjR1CC|655L0c5zb|FedTBv##&Fv@?-j0-%_vqrmk8;yCC!3!705l~Lul3W_NiZ>L|tK?ZKzyB00>Jh{Hs>w8cCk;yb~(7}l3 zNI~sG+91U`N$Y8=_9M*<^jGCpemTm&Nx!vJb3ta5o=lGF70r4#gs2N^?F9h}QZ_Cw6uPUxQcsq{JddjLwz@>tKiNHm&m_Cak8xV(wAfTLR|z?KldKi{EtY@ z9GSnwBG4YceQQ9@}gCWiVm{}Dp#jtDobg?wQ#+QsrkuWmS8ecj#epEj4a;`|{` zVv=w}z-_ObjoWFntsVvfg`YlRxi0@O{lKC#yjpx+0XlJDe^dCt)nOxttetz!p|Rd+ zX0Er?-C-8r{ckiS2LAj{PUHIHy`a7AT#^i&zXb`=*MXG0tzfz{fKFNRle(2&`41{? zjmEi==5p|-oxIr@xha0kqcda;~$xPD3fy$&F9l?)**JseGPAuVQ-xx0G<~PkFdsooz|`S!%q-3|Vb( z9QxelN$=mfpv9SrI*<>_D{n*|a0T|k<42Mt#V60BV0#(??LZmvUnF){fcy&&elOot z;Q)n6LQ3iq(Jj92Wv*jY-|@0ioGrzU>Z6$dMojC*gMN3b7g}ifnE=sxY<}ny9!v%_ z*AFPRW{4e~RuYXzIy(3qT zvHiADIQ*d{ft^7DIw6bBP0BmuA4Uv-?OmBb4!4qNB%JpkOx^2q+4AteIUC0C2?+UqdB2XaT^;@4du18e6nlhqPa=>kGjG$LyC58Qa~HikIUdR-S#3$ z=k=S$X$A%Qj{k%uG|D~Eud2C4sjMl;kX7s%lnkc)nfiJBu~wPw zQT!RJ;7$2|d%Q}*?V8q9a@iWyQ5Qa-WL&bm)r??K+7F#pf@|cr*w!=rgL#W=eL*wc z&4DE~_}ZCEc^;Rc?R2P1Qg>O}8O`3maT1M(OC9P}E9lda`k42IaW8Mg?Z07~J1iN) zZz<$FKNUgQgm?G)Bj7Cl@9+={NnRQ9pUp?o{qbvCp?li&h|Q*YgSv?o_W>30S8=t3 z>r)NxU+E0lD|G)x&v=p|`~m;n34=V|Yd!`nvGx=y@|2wGYWZ@RKny z_As-1J_9$Nhh`Drq;7V$WU4yiO;KATK5P7=r44w6ppTNoq)tllQdn9^&+2T;Ei{?r zbgf^X&g(?B2NJ?k-88u!9cf>C-r1{|8)tCCwLBywoh7 z?@n)fwd61YPNOYe*AK$HTu2QSo%?r5I)=1Na-1CSCZ=aKwnY{sOq2dX(N)?(|E?Sc zWa}h|8wv-l8?>ta`KV*4_{?I};*;pYSt;uil;LryMIOuUKRX~TIX!S|%}%z(7}dX< zBP}^gLm|DKe@6Y+rI^~*f1M87eut~yzwEs}=rC#`UBor(7*nb$-uO?T@MfTd+2`?X zSf-+*Z(q*Gw~SfY=Sf9FqF(3K7GXNJWoonRmoNWABjJoB)sR4htGoI5{j!n``n zB46I}!{;ILRkbp=Wp;0m#JLl;9 z_>wAZkbdt+**Cx2$);j8GTf9{}Yi#dpNuMQ1dN zO{59566=gstWyhz93pYMWAScmEyH6n;K~=z%^15ek=iFhsAv!8 z!9BWR-_$YuxiJ{}z-UhnJkyd|ug9&|w|vgN`vV_KOS9~{4_5bB+{T7B1bILYA*3<| zHUq&w*4T&xW^!?ruDGw$McLBare_Bi3-4iX^f~nkG8WV7yp$nWddh%-%U_3!zg~>BWXltF6@YkaM0w6WM&L2B z&j{HKe`blm&7PPVH$YvN-~?RqaK3g9vaX;odLcl@2zsu!Rng&r?aI4>-*e zO|$!)L-1#b=~2nluJXwRAzQ-+$%zP27cZfirdBbSf^(Cf&%n_{TLRVYFfHb^a z2+z|t(ft1v74_Ys>yvk$zoSi$Roh!Q<^*kL1_2qc(~zM<0Yjj$$J`qAyxQ%J@f=!Y zOAFg&qGPWqH4hj(wiTMWijV;IZoue4DFSAEPw+q3l&|?5SIFvT40vxojl>H$t$v(w zJ`i+G!bU7bnc59$7S9>7NvXm0lv;L ziwx~_x#@cu^6)*mBg^YCQY@K^hNS)C;XibySANsjfgj6_ax>81@~{?WH`rkQQh5K} zlOSGTOp^tx8I)^x2iqT(dclocb^{sPdbH zOI+}w2v%@sU>B-V@y|HQ@~wNd13|v);?(SBY@~N&EUb|30L%krZ>TOlTg>{d41SQj zu5wpVix;REyqO9NDUgSnBUgN%BR!RJJL5g;;*<6zlSOfe+VWU9Tz3<+?i^S76ew#W zg&I}Gz(S-<@*aE{1Z0dGO#Dbvt;(m)x@)ycw2jXDpv+lT5D++!8X)`u0r@MtBq(DQ zv)UA*uAVvCFL(oyUuHqg;+1vTcU9mHrwsTZDCePV+HqkuKA=JEGQZ-GzMqPK<8ikH z7h&ZEq8~s}Tew;mi(Xjh$}rdUjPIj~FCOj&7+;V=Pl?Rxu2Z}aLc#XJRwi2J_NC*i z{E?jMyU>9b07FB<;Wp^2mKiA|`K^w<+EGe8^XoZy%}?7Rnnr@UE##9+0hokSLOp@_ z=0L9dC&w<4iAiON+$i3!emO9oA;9tgSV*c^($84jdlEebpS+5-<6yRZS=EV+I$_h- z_p*Z5aDDnmUa*<ml1KV)41iWxY@%*Gav0G{`cm4rd)jwe1vIo}2y9g_YDhp3 z&rie*Pu^WlY;?RmyKc-PZ^gbN^+i7-k8kRtvN7sJ`BgvBd>*bUV$|1oRseaRR~0GU zzTgNn4Tu*_l#a@ClY!_F2=7NU)$Hp`RTFGhZie}}op^S!To2b*2N?y-!_97Onz?ok zF>}v{yEM-xH;oIE8JS2%4Ido{Ae~gJzF&M*{Cv&zfcW9Kp@kv^VD=5hfIH1dkom;) zfaH2|bZbeBRG-Lgt@(!(yJv9x{nMwkHbUr9?94p-(G2UmSdB71pE}{t03uRIg0I`a^+&=jRIdy%3t^kT0S(Lr?OX_YLeH(_i z<6dhPmWd1ve=a#|h1XYAs|Fidm(7)EpF5Y%Pj>X_Tx=aPIv=#LM#JWKCI>tEzTXDg zYmtW?gyt603ss>Mp;<3^Js-c$8`!Gqd#oVt2qO!l!;etQ?FP_;HI7HuyuyqdMjlbX z-g3jZ^6mV#El@&X3`J}WY>+BQk^-&03+Nyvi0mTL>W{IDaxrZ{mJ8^43a@ZE-nP@F zPh1%tpSKTPEIHe0rTg~o{Wosw8+Z>pY<+25@eJ;&zouNW^b1eW_Oi%04y(gQ-`8!n~&pXh`bd2<3U|;-? zSH!~YsDpI}M$q=)w8{#znf4nPJ_S#g-bFtfk zfN+WDIc)OkLDU}eO3s7Nfq@2+y?!JT<^AVJl>3uil7z|t4!+SB^JI-wyi`Dk=T~Ce0tXkL{?>g5XH-&W?R!HkfZkhFYsGy{?1*hEe z;R#n-$Yl;LzC)qC6>w?SJ&J9oAY(Auh7_9);4Y)m4$=FyDsu!_FeTymKq15P0ry7g z%9>Z!+Nl;p-J>i0R)Iet#d^~I)#dp4wZK+~MK+4?jmIK_)gsznY+#L5m&_K>eo(tl zq@QSpVFnBy7EuDli3xoZZbV+y26+#OZtNJokuJuiHQ8oJ7r(ZnkohzP?Fw8&Yn<~R zk(hmuzWwKd3>M>!y6EboH}t&4j~CS?jj22a?>G-KQ2OtB#F<%=16EP&m5^2IOZ=Zj zn2Z1Tm;P4SsxA_X`bT$$tnFQo`K-0nFM6`2uXv75AD$@D56OWwRJ>EZfCl|Y$UZr& z!3gkEfwNWiKQs~v2`|$qXj|_PA>{)nYpiWtUO&Lj-s-L`na#i{`wB+r7$9@HWsc%6%mUqrvq(WP!rEiT&t%q zqPryKI5dyP|_83be%U1St)2)TUV@b3PjL47HZ zVSBcSerFp%r^j!xuB9qb`j-yVNTToPmeG1)q5Znr5UgEk`Npnls+uZE4`)Xui*ueN~8VpwtFjXpan zQyed;cZgg*o~V@GgXRCWc~7j-oYI)VUIIHDnO4oHB~lZ0a%g?6`-#*AaCcaY<~svj zBrB4{D`<+X0t!M|hnO%2tM72-&MCpeJASo^;E6B7L5x^LQ46U8XFVC zX>G_zU5+52U0+pLaco9@vVe?SdVFPPu#0#6mJL7O2U=%~*G0<%sNpJB^1Vy5>n0;bZi70xYafo4zpglCuE%;>83Iui+q6-i87DDl~$n|kI>aE5A$sf6F}r5JM{;c^Ez($Gk$4m+;Xwv}%{c37hW9fd);i8BreEd%DDNu#7e!*v_YxP=x>sn}W z%#ousBMw^hwI&7;i}9%6~Pa_XH_R@t_k~mI$kgVI$-t1k*zqE ztkkMQ#zXx$O>4Z}7}zciM#?2hT7aW=935!yyF(-ftMbIGYt53-@7j{ctXA@q(=vTr zH9L}l@@z#FfJ`}^7R{y6403+9DxOY~$K+fuvK$7JcGK34wDMn3jX>9gt3&PrT^aGK zfvjP7v9IrxaLj>1;N*_`rF>tQ->S->JoxnOe#vud#6ep~xO&EJ^Id{x*94knD2k7{ z$Uw#ksNCELS8M|(Tlgl=H2{|R{Z!#n1)okOusnHuk-$=a{ofL>0vv(+=}SQ=g{LM^ zo&~_JsBGeqJd}Rd!Zxe3F40{ODMcYTJRL|j@t;*8r5&Y7Vf}37J3PJdy3iPUySXg7 z-}4zTIv>at1dJXve0}QzE2x1tW}00=o8v|Pr?GN2f%xM4#f-J`EgMRi<5dxVf`*&z zg^?aqNjwvG=&;d-fs=E*lg+umZMvgeaAu;CHd_B|j<8r{yYufHS1CfqBRs8!vx`}x z8i^(qr{8$GUXP{sC%ln)FCt7l4TxMEq&~lQ*F&97+i`wy*Dc4Ek|(zV{gkEV9zASHool3AXEZ-uqa6Z3DPy0J_#q{DUcIAe84 zA;e8ExH%ui@EVkSW+HGdAZ;wuo zN8*<#1{4AXylVlz?oxSIzCWsb(Z26)tT{Lgc{V1RL>69m9wzR~Asz+fsg_j0->IV) z_t;(YLABTsa%Oy6<2#DK6qfE3QgGRHpE)yZz+Fmw@>SvWHLP~VYEXvcQ@qc`m?hbd z{2X6&E+swVGHH~2q9>k#7gEp*kBnsa@8}(|WlYa$r(T*{f`u~BjUW8Jm>rJ!_oS9068i} z0`;;zJ2qezxc=WJ_XI|A)Y?PYVrC)&F;d~!vvnE(^_46?3=gKGVLL2Ukj{p?vc5n| z6UO9EL#-t=5qWio%)R*>Z;MKTW|j&Q^*;~$7Lh?oM!k7570~w?{u`E(bwo`2j8e&N zgi(yUFq8UL^Il!U+8u!KiTqS+i_vhn`KB+=%YZKK#N7f~KR_8euQwXZVxa2A!|%O!mYxu_4V*$a^<=wchNFK6f5e0s6?#u5vWe!jx7mB}e+z?}KpNjahi4~!!aJib{t^5hVVL&54kS1{XLfI=59+(SV zGfLjxyPmWLnOgz`>l>GFYE-rM@#BFhz{#`+INH-^b427Gryt1@3FNmVXkpMXK#*k$ z7Gsa3#eIBz;d^qr|LmrAiMK%8?Ju$bc_uOyWTcB6JB)G--R(IQ(E1qqWG~6`eTNMN zaAQ=B?TZ<2z8`C(2|!bxx5e^raMf*r^VUFmtsAqThX1RzHw}dP`vS(LREn}MSyIXt zW0#%CQnHIMh+^!6Lfs|)^%z3cHq z$9(G{@F`eZ!ca7oQ(6*U7){qp3Jey$OVbt7YUcVUg~R$`joswPs#|yHIkJ^`^qXf9 z0sX#t|7zW`cseI)r~ZPP6*uvCAvi=qa^knYP2#csH9MYVZ08=AXYg0K){$;35N+M$ ze`0(3a^M>2cL)>}YCJl9*GmS~%w9$u#&K0&reUf@7 z-g{Zj`um)5PaAr9Yp+?Z^~+`}XO4J?Zv%2p*Sq=KW-AvamD_aGv70+BilHmYNtLsF zaZ`PpB4@_mq4%d;u-L#z8(>yTE5U)F#we{qkdS0@OZ(-L>Bw^ujlBFCegd4ItK(Fjh+V&z2dDIWEmaN@Ne zI_7!SkHjkse@kNvQZR|9;`b{YS9TG6yXm{xI!(Gf?ox-Tg=AyHw_RSPAd-zHJ%r&j z>tZ7bP}=q4yN$*vm>1-56UEYN+PU%O3v%OUBX1dFF&CR1)a8j%y?~sH@n&V#`v$=N zdNPfwS-~9ao^JsGEPN0W$|QVtO}SPQQ019vfl42Lc>ML#e8Q~?{WT0}X!r{U5-&6_ z#+<yx-fvmaukdw868Nz?k+F4;y>mY0+;!_rnkfOOn}n~eF&Tsg4^lb-X=_5I?&UR^;|@Sa@+ zR8FPOR*_oBc-d#3zaZVX8yPvp-+ff~#det8K;X54_mpmFuFO){NLCaN%iH%Ww1B0l#OAiT! zLg9rh4K({;wy(v!m)T#I-JyqjO7%;RIg#Tj2Fy}zGtr)@>A+GwMY~0HeTPlr$=;x2}ouQap-t(AwQLMl})nKHJe{b)wKWN zC-LU8@RN*O*|V|Y%V(hJLVp?$V;@{3dI`L!ik4Zm|18tE;q-OW_{7+G!!<>~3*V@? zYT`PPhJ0S`a$3s`(1CXdW)q0r7Zsvnt6|Eu`fEMl%O@m6bc0@wNHO*C(6U@%#%sjt zD?B;fT1>~D2jCwc_VVhlnK6ou%W6smjuPz-J{PA^bho2^svHcBK@gp@Lk_RZ? z$A2=vX(5K_!`rD0I>yqggxkO5A)vcwZbyC!M{;xsev^q%60!Pc&t|HWjjvWq$P36GODf9`;P_}KawxBgdF4k7_c5gIf)>-8hJ zm*#{|OWPwo^~wZd!xsjt!-t=jPbMm5Cy8EJAG>5CMF(#5|*B^gwC;cRG&LdKM5jLlp zed*xCLkT0FPQzHmLy82~tCbY%0IK9N^~nt!N_86sw6bfNt{UgJ4)7oRY9#(r|3YYj zlm*@S`7;VeYcg^N?4I80qQc0O33(t-n)}p}-b!|L2hI5Z6nX051rjVOmgKV9bh$pv z$uVp;oD+mCPgi)x?lyXxSh+2YscQV}UP$*YyYPVaV=et4gqw1I&m((|Jc36nNA&y; zSrLQF*#%WMHoH9)eJ^K%!n3yqY?Acchp$hDXW6$DeRtMSIV)5O0%;XgX+0#_jw}D< z!jj4!V5}rUz8-}{@tp_8(#WTr>y+iyjm7X0&DGfV#Y&^LRzm2Itm|sd(U&Z!M7lM>g^X}ptYfZ7Q|6)Kd}g7TH`z?4sua#T z^py?Ug%m}crf$5t(;1U=_Mr*KC0$D(NY}^!m+9DmQO>Z*G&$8NC>rkoU6O9+4^dB7 z-t(k6V;df_|1I0;1>8jcQ?|&n5+x_GMn?EEnPZS-5wb#Cas}wg4#X< zU%r4|ObdQ#SsH3J^H$k5(RHgZyze0pTh_f0>uo)(AhQueh^F%loehSCzXy;Irug~V zn(tYc^jS6m*T*?U48P*6Y6&l#OK9Z{cI{StlV_JKz|L|L&E-Njq;dA@6EDP6uD7Za zY#K`<$92f~Z%_ywbwcOMo_$^PTK2e>tIX(Tjjh$}w&ZotTsJ~uj#>j#c3RmRN3HX| z3vdBcuU$%z$9DoM-0n09ytB#ux==IRc{9mC_8KVVZE~4#!>)4CEj>N8h`Btuo{zxc z2*v!sn`&O~v+Hx=U%t?;Nlq69)yu3yGggXepSAyvJoTcl3qe{NWrw}`qx;kYXfHtJ z*Hc2)NZGKn__S2L3z>$c?`3|8JxsJ==|(p%bRjy+9tcwsF+C`6QtpG2E%9x(90ira`OEe09jt$6XtF?r8=8f!&) z?|mS2+3#@<`&|c-!7sO(qTz>OXyC+#I*}n`)Lk$TX!bSMzSpyN^E6!I4F1kj(;RhU z4+uFa5O}l_Cyzz-d>Jp0E2545|KHJ0ryh(iQ#6?y`_1)v2!83KAqTjhyq0jV0 zL;;_*8EU!yZDVXA6iJTh(DT(?HeX`=7@&4pES5=AVkV&npqPBllTgN&)WHH`9_-#4TTKf80WyM;J zbDuVUtSE||yhpa%EEyFR2Ao=c&>>2c&&VxA-n#mVvHnTsT>*Z^p>MbA)I3#LpR$ib zI)X9zga^QC8abcE&z1>83PG32`I~@HB*?G6{$_^LfRFf?0*N8Cv6Uv{O5SiLDxZ7h z;UPX}y>usZ_@=^zrr>^ql}@qsTMuO2B0@fsQNZ?iv7kzy@4HX!mf)9w9L>Q#gX$27 zxjb?Ny2lfDCsryvL<&0cvf4PR9+m9vRK#-aw@!$x)NYWb;f@thqT{#ALPmM)(~jnd zV9!0IYy>9$4^2jiqqaf-F_oB|%Z@T$*1vGt5f>0Bvs-b`Q#J7h?b@)|zy}pNUyp3T zweAntsvb}a#NhMstVDwSwvqyq62PdDv9J8}4PYMVr-_&klFZTBgTaz|_AC`wZ^>yT z7++4J0#uErMeVh$1^*2rVhc_7Ed%#j-4KicQ$w6i$T^vaJC=ZC(VJ~a$Mkqz8e@|Y z{hG7o%TmRv8E+6GHbA4Z(vg-jz_1_~ds?F7@>>2aRv-5H=wTG5AHyP07OtApDf(Jp z%9e~?RjLZfw@4~0kDp+i;0xSmQH(;V_z=1(S=LYR(pS3M6{spK9p*}re}vr?fl-8{ z0rgKh_*%mm;8MHg-j5jQSU!~y-et`tF?u7*U$d+-&zdT_rU-cMB3-2Ta zP1A$v;a@(=Ucah!nPO{kP|!ATQ$hm2z;wNA!V`HqrgbHeE^MC{->oc&t} z!}>Mv&=!lVK}3fP<~LtIE5!x>#c{tbnr_4Tdc~x9OVy6G6Z~n+fFh^f>iH8L!s@Hn zWP4!-5s_Z5-w(6jQ-o2D%b+rW;~vpj3FIpIsEx;rFB6{8_Dk?SScrdM^Q?yX`R&4H zU(7I|eJJGeU%Zmx8oAybPFB4!cHIFDx(FtC)xhS0GWA^HXWL%-QWraq!&fplksw_F zpvO~+-rNEwVyMdbEMV2L{j;p6AXO{dRFHg%%8Sd=nRDff8uCWQkoh0#1A{mVQYsc=t*A zH6ZJmbot{pGdOUbv861$`<9E(bAOKTfXj8>Q-8E;ZCV_Q8!K?FgpkZIR+%x0#y+-ZtO4h2=E zkyyRmZu`z=$$K|}m`8&*w)uB0LyS(=Jw=}cE3Cgq=MdV4_`!be8e!~@^6icDeP$&a zugj>h1kquWQ@K0?ecsrl_r;N9Gz!GaEw5pXn_lDBey8(;`1>&2^Q&7UXil7)VF&M! z=1U#>PC4tJKwR|2&U1$g6jb82+3PurZKuebmlUf@eL0oUK0^)zpHe4+LI;$4ULvD* zZa=(VJ}xEhA?r_J!1K)hJG;gY=@d<|C^UiqQhF&Dnt7dyBCIrza_web@d%>u1J$n- zuBngxdD2~a0!5y9!XCr zt_R+b>;3QsH&p0POnL^>p$NM^c&eGTWHAiPZVp_|FklEodJN185#wJ!@M=CqJAUQ` z%G^QNK)7BRvQ*43@(Vw4hthNXJ7|@78UYp}-x#xK&y7K85eV4k_JqiIj4(iOW2(%{~ z4=CS%X8`m5JTOMATi53?L1$ooP9Vy|miatE+5l{pCuPfVI(kR3cK`mylA$36F z;c5(1GM{>9#c`4k$;2IDL62YaD&|eULBZ7bD&WY~n5jW&@>8T+fb8yoLeUanUdJlR zidGrFL=_>D?ev>bOyLQIs|*ll9fU=Em=>`Dq97;-5;c- zbS`tQhqc)GjW-}6qB_rpV!MD#G<@(YNqzUBU1I_eN8Q%5YLDQ~i}o2w1KdCCPe4fX zsby8g7ej*+=@VKhLf(&)0dUnmP)-uKZ$VxpI`M zUzWU&hsV!!CvzOVHaiZ$d60N4WXYFOab)cvkf=#k+wvb&oeugO3|Yv^m5d zNhYn0Jts}qKLxz^;AMa$Gt#}a! zFk{}r`l8$Doe47>?iLd>02nh@L#>mx6gY4w4Q%kw>V^S(qdNx)2~r5#VdE(L=+cjNPujHVZhy48^>)9f0U_!z|$@F+*4KwjCEsA zIx?}XoI&=W--ryvTWVj?iV*{p|f z(zygJ;>ymCD7|>XKBZ-R^gzZ+%d-KpagS<|uKzN{eptUpvz{T-ccZ>0=k)886k+nY zNGTiR3o^{90V2z;Y#DHJ8nTsz`MYObM9%(8K#wWWa-<#mZ=uv{%V)f{*Ry9&0lo4h z-|-JomoYj7g5ezr4hJ2yjA_2qOWQVeYoTyGidR74VukX%{*wBBmvYgy$Y#si0#^VA z=H(sYMo%X{i`g;W#w8F*+Ly*gZobzSnIs%3JCubAp+(x(&wY4}ff)h)tMS>J6xVJP z(HmXmWdaUPRAt5y?~A4}{P9b{ubuhd9+{24+?$L93Ju%#;KwnxY^L?PN7&=H%#z2F zb1#vMG#^n!OL^ z<1YXY=JBJi2H+K%1#Q}HL?I{fP~{-8SGJy9(s#$$2+b3yA_!=qVqST#Qj$<2q6#Jc z-5rq<(PRdby}kvnK7Drm``DRbyvNid!L9{zRpP(CnS@Ce4Zy?oRpYJ6)(PF#E(2~} zz4f=Uf*x+KW^C-Vvnw78I2+0XW)psWtJo zR)kf}T85`0EWOQ2hhHUq5gX_;VAHn;lahiBH%!-he{x$^F6a1Le>Pj`N@ED1!GJ$K z!C&Dr!`-3j%gb#vK+PxQ+if!ob!VnQpoE@W&`9<_zDMy+JG4B}8Tia|DgctOj`a`q z{pJl+>yfJ_fd(}_Qy$C1&;%+3hq+X*RHnQRQ0075@CZEgB#v#3^0sCi5>UD6 zKg#&OhmXUc@b0s=F9@8GoS_oEV_uCaw6Y_8?f;@TR&d7MJ0@i$VS)0zzl(~@6;z&{Uwx3HptBsS zowX3WH4q|z#-;gg5KX_+e*+T#|DoqBCG*p^_~A`%=$h4Yct)#^9B+52EKHgJMDKw% zKxF`+AZG{JTYsjmN5`Ooh~7P3WnFEM-d{xn-!B2_>;NH8f^tCJHN!+<_38CDT(^H4 zv}uU_r4_ISRgE;CF8ekv!M_zvz%Oi$ngvQaawcDbY`nV`B>qvAOs!b;(=(0~nF>V7 z7?chYRL~;oT|eKZZd}NeECgJB{}1T)I}koXL6-BpALTIT>o}@k@Yr#O3zm|zP@8$m9^l%Jh=RRJgAomN4x2@;m$g zZQ1{xm%+>khW|=*eeoWsboqzKFZP!5RjE!+J3J4_WfwrD0w;%}lD~&iWfdxn}muJIBFD92HkNFg?Cg0(6BRXg} zOz~9=F8fV+vdh$tV1`wU{r^xN#=Qs1s=oe#TBXWvU<~C330B#kQki#YO!<(itAKSh zne=<9r{R^60vs>>2gG?*$etdT;jLo2ZQ2SeQIz8NIF3aCqk37>z7jD+$7; z&g+FnMJ;ltle{#ZP`-ke_#MH!nM%E!iB(ffgi5YI#M@e5CyxD4K~ietpzti2+3~{! z;I0%PS^Pvsw-7%Nj(ry3OB^$M$8~;f?S?ltF=3W>fe+7hI(mBg7?YOsXFML3>fQZA zVx|mNo&Ti9LwEkn_3PIu>BD6`fv*@<9z7m9`txTf$$tWUVq#*>Pp?mA-^V?D=79H* z`L=BmvI=i&z&(&u=!-w<4eyA{~o{OL{^k3x`Rk%<4_3s z9y7D{`1w!#nZ-LSXGtP)TlGxfI_HGC)OCU(&_r;Cfuf$hwo+`b8l~)cM)K-Z^BA;m z4yqjV5nA$w0Tii2@%!voekO}@v}lgTvxb>>-68MWB6SeJvr}OitROQNyaL;G@DV-e ztoCt%AwWAqQd$08~W`cisAwTBszRS@P$56I-z#PNh^!7$y@2mnn`LGs``Vi#j> zp>cCJ%Zu`0TbV^@d{g7U5!(BGKNv%npUznoEpCauS#jx}n>~EjJulyjo}&YhO2(Xe z3+nm2ZBc9FG>Lgz$8Jo`FW_}B-{@GQ!9OT;^8CIfH!DX^8-Bwg*2QB$OKSg6$8<_^ zVBF#tgk6gdV{)eVRrR6py6B^SSkLtsT!VZz7FF9lqjLT)A?m+88+sXKsQs@yjs49` zj0*AAyWNNXrc(dPzl0v<>Oh>3o2}=AFnD9>(tpk8te32wJ!R?t53N-=-zBb=Oauw^ zq(X6Jr05n*;s#g<5dpB3Mcf^)24hi$U4<+kPQMkaC2NT$bS2-y9pIKpGB9MSR5{6A z^vEB%t8QL8MxGJi=rE{UJRI%4Mqa|-CgM~%hAu{_^1ciMV>4hf&d7|&)^o@tJV*Vb zZm{L@c46pZSY^BEXzWY2NzngD-PDJNF3PWFrM59~zP5v!3Hc9^8ROrMs?`=3Qav?C{ms`*HR_u=Knd>3Ba#2Gxp(_wY|^ z`+9aJ}9dG1OjV@LMGuwBhw0bO~T(22NePvGi&7BgT$YN z8~=sBy#`;;$0HMoRIm+%_w?kl;c$u{gMzS4$XKwqe1;h9s8|M61uKk*gIf)aybpmHh*Xc`6+kO{LEswqDY_bw6XMc29k z^d}Sbape}$&g?7=oCA$-;~QyZV@VwH?h2jW7;aq{nlr5mBa#tBRyyxKE(qtY)6#*S zERiy6yGcB({3ESxl`@K@P8hH5CpJ$faVH#U1dx(%)tJpy@HLz8@weKLcaJBn3$e1a ztdLN*3-ADF>spO0Ss#(n6XcTT$1*CK7i2THz2>*cFfO~#s&#tXUe#{NGRsF`bp&;? z%7|rM*?(LZHrO&>jgh!|xFQU0Hu3#6p(ks?3^J=)zx+Sp9j5P`NKE}Ak#NKPf#424 zL#kL1+}c-LZtaEnCr0&#vmviGkGfZf8=0^`#TF`T52%SYD*q0UliQjEa@aw0y!I{PU)7ZVd>&@LHQP!gI z)<~wI1P-+Y&j}A$)V}FI_IOnRD6CIIwJqs9gk1(TaB%DHU=}T2*BO(sv%Mc5dH=sL zd#a2c|3cP^M8^^2d)A2&a+Cj4J8eVXdd!QSsp0xQSenNiFb(kczJzzeblOxdREaw! z{HOTujaL5IE43qyxsp1EYR{o-YXoZ>Rw~EXV&)Jn=LFC6iuwJIEfV^Lc~beY=HF|x zOd}e*T}dg_b=%LD%KQS1Ho=5p9Fp+jNN@5#bT~z154Kd-tleW7xwNkcyTUJ2r;by~ zCPt`ldi}bZcO0QE?gRQy7o|M>WgGzhERu7xcI7p?TQCwyKyPQh?O5nEN(!DRX}j-+ zAqy#4dGM`zvUGeW2rRDNoBrhQ3PUXvfK*!EQrZV6bV5CuwyZ{@vW9982ajJ{|3g#! zkNd^kS;21(kIcH~SUQMLRf?9e_xw#5AJ5(VOl(QLg;*z4x)J`zRVfc6x@6VZ`1=El zFSwOgh0Gx;HjPF+(0Br)>*NQhvYbBp@FT5?P%Rd|uFOK#9SDHKAB;{xVarYp32Hdu zN>QE3IYbpQ<&u5YzIm0%s0#BWw$o>Wn)#omspJL?G+xo-H`5_4FfMf+^0&0wPerKP zRMsk%j>GsTkKiYJD6qvpmY-FM-<&5TG-$!H*9D4`;Dg6(0Hj_*+R%c1&$*Nd( z)CQud)3o`rl-?h2vPE@bF3FpA5D}H0_)$atL3XTCUYnX8p*>nrZq0z;x>$_)h(J%)*gxQi6;q)}Bs&JX;Ni0_K7;A7=KrhxC- zS5_p+2D;dkN7#ARFrBK7AUQFxF4jbd09=b-kLuL@bmyVL#S)siQkhIX?$Wcb5B=8Mjs9r?-G; z2*o>K_fYcDx?|>Wu&a!m2wqwT4mQ~me-5@t`HaUVwh6gt^pI|$Dxt)oNx|q$)=jqU>5f)WcGRZ6 z598SD;J0e7n_v$g;2@@bcdMA`Ai;RA>1x!~{&-}HBF&VJk$%;a=e8ew{lw9N>QbX6U--ffrI+ ztnf`&TdgbufUXZnm9ODyB-mbJ6l#myh_9&g0nP*{emE};@Nw`TztjopO0(AQAlg@L zV)gSB)Ee01jR1=L|M6+Bo?0FWEOH-Plf;zNRNMRty;JwU4g?sW4yTADy9d zBc&<9O!ptBbK{qhk3Kl%j89`i@Bxc+hdJvX^<^Ny8%3Elrb_8a!74{tM;%tT1@ZJcJAV5f;wTk{?KQ(jkOV;d?|4D zswgHXjr&+!VN@?Lp?0=dD|39o?ODA4@!SE$%u{}FrZyizV0UcNwe9kzyZ29BGYxmu_R1fRw^dWGp0P~7O8oys8;3tq1Lc^Nt>zA5s$=!pXRzb zt1Tb1I>E0=a+#R9wP_%_f2;I7hsyA`J;QogMr=wf<9O);PprI-Ey77IK~{afE`4sE zASI(a&Y*s`E$wb7f@hcsgzX?2u^l=DAEF0GbC`R7QMaTV&+m$~)FRKr#Z`|iw=JfN z3?AAmO?s5i$dO)cZPfVV>MYl)%zt1vFW)GVPJGGu^%vLgAkRmh@kNaOp{Yh;pMqL8 z74|DobE|wiM9HVSE?81jZwSpgyeS}AX(R7g_%sFh5NggWHA@``yJ|w?#1FWbLoXfV zps+IPcN~az;J!%}ZC@}w9qHA0bD1nrS-V%EKjHYpHSp0}x6om1L+q}=HvaGu*5x7$ zv~Ht(>Nt43P%3o)mA3(TF`F&Z69_#D^)Y5XpyWqJO?AU1>4vWEtzwv~yYT(n;nZ{>?RI>1 zWg`K~Ia4XL7axdPuoes}GYiH)yN^S9#o;t)j?0Z~T0RozIt8pFrw!-2V{4BYSH_IF zd<9?cu1V)S+_5=uUohhcre+mw6G?Q2UEYOnu_RQft`0o{ID``v$GF~T7}b&*ZkNZT zxA8Ed$8PeDI%z9qp^kZSdzYRh!oi?#qEdSvZlg}3ev(c(3|?yK+PkA`!)0w$AJ6;X zaN`qL@bKEq0P}gcpE@pP(hG_DX&nbk?~zX@E>y%x=PVpF)yVfi8zyEG<%kO(FlvVg z+;Q!mJAN`$1W?t8&V|YJ!`br-=Ebchwck_H=alvMUq{c(I$E16OAuSHQ!M10c+>I^ z0Pas)MD0D}$KNLp8)hC|78L}`ylP#5bKt+d9gDc8z_&!*}?4F6L+#K+5WI~Mj-b%ZCs9GjO)1qA-it8SMA*zwRSb)pn#5J zriS}jW>>>#)>Fm4^5Y%7UpK#_)K@H-zK8NQVgzj`CqP6Jj%)dXe_dV|{prT|ZVL&W z6b{)8_&&4svAfkfk1#Z7ehJW%-Rw^@gxXjM5Bt5Ra)$goMZlR4W$~nTX`{b_3^~cCJ%2`hV6cSHwDE50WfH6ZOj23(^x8xHPmM0tDyb01BdM`G0JBHOdav4@-b+%|~GAGh5JhXyxtvnJp}U zg;iddvLECIcrnz+$wKEDqzjsc(hFip*V5FYh3l?=!*mjkhG{6EA)WTh9hO0c_f$6IoD z)6kKd)|CTv_3iZJt5Yi5DQxD!obdpZzha<7iRv8t>ThF1_nuA(mvczxiCzsrvx~LA zwQ+%&FN}#tAn%Bx53dxetMq66UBtY`s zgag=8ZK!ag%5T4?2E;Q~p(K4tz-*y~ui93iZRXD0x@tt%57Fs|B)dtznE#LtO{-hh ziIX{WX4jjDUy+VP9^55bb$(`1$7yd=PvZ(-MrB7HA-~Osv|*r`En-<{yKQvXB$%(| zt@W5`y}!*`b?1W7{^^0qbY-EBKX=TG>%p`wgdZE1274mcyaQQQa46ws-8-B1z;)R$ z>Vr7IhN_{3d-`k&RJYMcs~GlanWgH?RJxByBq$#iQ^UOx?T`G3%lU(fUkr}Gx~u*` zoWlRQRs5wanVt0yP`Onw%+n=yN-(j+<^!?(c>=)#52E!;2Mpkn%gGL1~91Ymnefi;29-5H)k zJ&GrE-?V1A->B)dHfy)lNVDGO&p6zO3^tV)v|0C-fQ?)SZ(N3YO)e^T1b;%7=LOC? zv@m(?MO(Tc?Ctiz`HAHgo{R#hfQfe+D*DV(_~TROgO2x9|rL^lYtk0g+fAho34S~qrdQRItRAtS7H@!314B*sIX@`AfYKD`4~yGXC=WdElj^Y7K1>fiYAvFu&K5d$WrnMYCIXuw z%?n-7Ptp3Ux6{}n^U2#f>#;d$h}4-a-|nEAoP;rxg|RB*O|6{%k)BsWejEDxiqfwv zK#@m;WJ(GsZKpl`JG^=m;@rOOXw{<&R);G(7i5TM`0Dnnm!EWgR)*`vez0Esv^L+m ze5THg&Pph<26i}7&GfCla{>^zSmFQ;#2W9Gwx-%5@ThkHS^s$Ij+^kwL zvk^-Ch?H-`OgrhRGLN+Ri`#^_uWDW2M%vpvbqgM$+iQK88R1cs)P$a`VS&HMj@+l# zmQg!S&Z=zKxdMxba|vLP^lkl~Fovt)Dmap3>m*q{=&0fj)MAPI(R@2EfHGAeLEG(Z z$3yyGwVlM6hsHKsZziNyAkyxbPmX4uIkTq4Z986rxNaC8J;}ML5Wv4<6F4unyK2{o zozLCj>Qk|KVcIrUl{#U5X$!I}S;Ibo8BPnur5-@oDSj_n3^=ptpy#kXgW26aA1Bon z@#O}gS7(ad5w)~Ilp#`f^_h2b-eP*qFP@7-V_j^YqpHLUq2{{*=9j8MuG$@Oar>~p zi-f|CH(+FcsDLeeU-`*;BUdRLcvlls)z7lk*zoxjuTRSWPnM-bqrYu@JQFE{2Aj6$@$NaRQxxsKCJ&ap#CX>Ok|(w&EG1KB9sQaKf3nNiv^S$O z{mU0h0W0{oyag?`%C-!p8Z_%T9^!#~5NiG4uH+u1vHr}|Rb9YL9<`3zzG)b?DU`bX zk|2XxCC^?ZTgkwWdI|5jA|0^_tD7#ujdD!^{^tMdBW8W85qKVEsJK32UL@lKxLg#S z6RRURdTy)aQZyi1`TzZLuh0j=dOv~80ScN`%L{N4uyIp_*&g1X*-|wFeiZwtQUY5d zcZ~Y{Iua>Kp1xg-+hImxl*TGG8-KFu#<)+!>BqVOBKm%bw`KrT;~bUzwZ+h18nue*@}0{xB1DC z$7~cP{n0fO%eCtYG9<&FXr#JVaEooQ?zfjS;9sL@u&Z(%JeP(b5G(RyOF^FIQDz!P zm5^uI~K_;j4}f#%=0;e1pxSMm(kIR<+~ULKLSwrUb_vLJ)QfefW8O^=6GPsAlz5 zq9Q;Q>hh}Jj9S0B3kGFH!7_nwcDrFq1I1S$vm$)D@_LhYD$2ScO|W}zQ~GY`?PMV4 zz&B%cfy+jyc1p+AG2m?H!um*Aq>iilXZNLhO9?cKsSd&sSI@%%dVY*dFh8%W0?DP- zs6R0O>?XHb9$X$6CX&Tt-pSY-rgbCH{+UC@P#+p$8-gp(x zv+`#MM)%lmG=NLw@P-#$t5`r!C`cnk{Y8R13wY=K4M=~j3R>Kb?Z9eSKao`JD@fH< z+Iv{Gl(^1v@>;uz4@|EUj0X3TVF|vWU!e`@T%u8xbu+;}>z4TXB1tBYS*1))fL^1ZuvO!T|)DIamqhE*_-#KU)PmrFuX9mJM0h2?imh}vJ} z=TifYTUUqMMDJg##gJ$K^vn1XW@)d0+M>3T>wXT^%Fgs-%*8CylA-3+asz7?HSXAq zwOwUFHx7I@^1A<#KDpJ<8gyUDY3uAp-2HA_E{p%p)?qL174VvJ{u7JaCrf;RbK8>>V#dx? z)<4}A$ixhrJtVe-y9pOy1;;$)dnRMu2$tL=j88m@mh{QN4JH-^9D8`1kHCGJgF+^f z&J8sl9cFTErvd>!3UCb&+@ewLsFzY}>h(m~Z%z<6@Rl3f>00Jkulzz34DkeIR_&W) z!2+aWhJ9cG#l7@Yj$TRbDNWBvh7vu)phU+9GnI5W#IO5qaw3tP`pj-hoVlT_WF7Up zG!i+>Ff3~9OaL~y&(;fdQHL9la^m#6PJ2+)muPc?W5xl|&8dq&Q!c!k3jywZf0qU| zKl907)OKp2Omx`0B@=L86oW+ST<}3zEwz#KoeOsI*3HqC7%$8})nEXv9xs;vlcu?HyDuM+wq~&@Sbp z`#!m!hnkx`qpUSEd$Z<8@8HIf5g^DqwD2F8JU_XlV5vXuvNo7asgcB1-C@0weqyl; zxM^EUHV5JBOEV)Ol=|eQ?ScJLRz1J6mZ$kz`B3erwRbq3Lk`^3!E3HM#Z^~NbGJ?zmHqZ#R`pp}LLn->q2*Vuamj#tbX>O6 z>`+7E36+>E6Gg~F%h0#ntckk?@0IjByU|Z^dwW2R=iC+_Ri7F2B!0NIKUVdMOFl|` zu0SeB4YyX*E6Da~z)?l9*wLFNcyntKMo4lmgcUcA_z12R)x@rgKX#9dLne3S?&&XC zX%^U6>fb-LXQlo)9=B=B;(#NOhd1jsTFN@3mGNPUdrNLEBsEUi;Xe)e|NOW8_mN5) Wff~UY6Lg>4@ScX=-7>Yu&;Jhs2mAp5 literal 0 HcmV?d00001 diff --git a/Documentation/labs/write.png b/Documentation/labs/write.png new file mode 100644 index 0000000000000000000000000000000000000000..d87abc99e511b45cc47e2e5ebbc703995087edb4 GIT binary patch literal 33648 zcmc$`c|4SD^e{f9l1eI-orF+X#%}Cn-`B#}l6{M@??sed)Qn}2ow8*e`%Vml5gA*F z8Dq`9=e_CsJilMh_wV=f&VTOvI{UfKIoG+*<&BnxBKalSOCS)4Tv_Rn4hTd72Z7FJ zU%UW3NxaevJO~CUKa$b&#w|5SDG5$Dt?rOLIsJK?Q$D=%nET#na8n4Wkoc=`MC5bw zC*I9a)+f}ZrM&c)fgjoJ+ivlZuc)p(c|sj$&J4Y*%=$#Bl()TA_VpPu(^B3q2}gU& zmHnpu{Kq?oN-Wvgp{Yw(%qelGYQ{^N3{*M4Y{$Kt0%rkQ+v%X$Rn^saS;R>i0 zxK)bLQLW|*sM@T{*?GUxSH(rxiT0MP{_dEP!@0>|;gsdrX$)~9_Eiu|-lrKQ!?tPc z?WPZpss|(YOnzGcE(7t3S5?43@O_?;}a#7CfwWKR~c-HV}~)K zg-jsO9UApKOWzyorIP~plVLFDt~2Ap$PKTpXI0Z8K@Q%Mbw3@AKl~3-%RQQb;=De| zklc{fYRoHF>XS?6S83mE_oi4kZ~MT0@7F2Vo)~#7 zNtI#D|6xH$6$esyE=zKJ>%;L}YEz?OlReQ0#{xm9&dbAmR#M@fORL!uZtjcj^P>{T zUBz;Yx>7g|j7-_bv*#Cf!nhJ?B62`~P%(NLYua^xH|4$YJ}+TB$~8#j0}Vi?-KIzU zk$xbSXrQu?LF`65w7U{gVSb*FDQ?pKRk{wSECr(1i%=if!JAR1m&5a*zY?>BOx4bd z4tND+S*cjcVXRweL(f%|GxgpB@bN8WytCjgTEkY)wSoJcnj$UDxxsLKKKP1~e=00J z`#v*iCsN3h?(_7=@@eU4bdHeeJ>*9Q8SjDKl z`Z;=sc7oVMuqbJNqZ~6q;2C4jVrO%KYl@1N#tJx3E)X_=LRoHh>2P@Tof+dA#Qx`M#jN9x=bVc9g zrOVLqHCgo1AHZQ6uEnGA=bAj)bv?INooyO^j7|SO&hWZrfoz+~ zIj0<0HQFezQ+V^42mUNXS&wEjJh!TeJaA&k$?S)9LZ!CFQ@}XQK`SZ`jjBd?s*vXj zXZR25We?sAjU|azNjhuY#KAZ_lEwapd-mso&;*>}B_GLe>*Xxv)$SG`P=@_ORrhBG zYvRLFcOe@>Z>QCR?LH&jUD~DS0xD^qYlzJ-9r2)}#)dD-#B=`)%dM7SO(UsldXze@ z8u~)Xp8M+rG@O1_HiAaNUa4N2Yqe3B`2ec)T%g+v>l(?IgtHSP-%B&b60f#0yl_qy znmH;iKZ~9Vb5}q&%$3sUT1003z=(_M-h|KCwoeou``&*q{lZj+J+hN>Gbr zSa)Y!8vl8QP$wiF_HbSph5V5*7{`izS_g(Vi8G8*Y9gckAcyHUTxe}?q30?IUV`FV zD11T5T(D)$!Ms<$_k!IhXPe6!lm3%6Y9=xJqUEh`6+hmj_T@-4Nf4uE$diP&Ie)N( z7$SPbb32^91ILRAIK)~-NXF}4VU2^|Zl)shJ0>cUEgH9H2~pu@jFwVA!CIqaeOCNo z@5Mcu7+fhv4i*Y^!+aYz()@nv_haB^G*R_F{dV0IEsrrrz5|vTbZ;jso(SuId3A_- zX!*sm^CHx4}mhkSN}-W(fA@3b&g7W4L_as=Td>-=5g2Hif6 zRKq^#9_UrodXBgU*PD7Bv_c>@k&Gn#*WBpG&yd@f_$2qv1s^5%SI&<*m-E884bN@T zctm}#KBuY3#5>1u+hfdFW6GVmGsx@Ow(;>8(2* z=fcK*AsRBaMzYpntR*S%d)mue{IfVOv)QAo-f2GM3;NwVXvp$!xx>-9dt~#Lu8TaY zf}KG0D~`3KnT##3>3`k-tg*%p^_+e~oBrp5!)u(6A z3BGvaDc;yK!4|!R}_4gVQot-d3Z;6Q0FC^STQWI7tmSv%1@S zcBSz}=kOg4Bbu@cW!?U6&f~l9zC%#UXJEvb3bihd%cF;wSM&~98MUq@QVr}eIlD0x z_#p;1zZ=JJ*ovNV(?Jc>3diE}t5*0aNQ`3W$xHDmB?UL0xdcmbq)3|gxz8_Q}c66A$*89+@WI&x2X z=xl%kv9;~JWRK6o3cN$&{1GwZD(IN{gS|fLIZB~rr<~x=k@j@jEF~f9FefJ20{U0&nY=+g)3Y4R}kNQeDy+dL1{uqU57sbZir!p@UTi+)4T45qf#t;X& zgKk&nD&NgOA};wRzCzKjQ#+KT^}!x;m<$@it&p!!(D-KiOWxjL7)-_l{uu)eJm>!8qa*jUPQ~<_OG&Dc z#oAClEBwyWpW}HZ9Ssy3-RX;G6DItMbrM|}Wj+eA`IvsoMCVioEC^sP@9{GgA2E8V z7uGR)i^&^Wa-RWZ@E~@m>4YWP!}5Oq)bJSMRPgM;eDktUgX}zPb;FmeQdCz3M(@BV1=fuOVWO;3S@IOmo@hiz zKrjF7w5`F<@^u6Zq`YNWNjCE$Uo(;KX-|RkU0vyI`T7!_vt!EtK+3GjcQlAmrK-h! z2+_NBvy%ZR7_=t7OW3T#8a{Z1WL20cbxf2PQJk zf#ZH$PvcEWu8{!I8|>auBfX!;ylS4o3U*%GS-!tbiKrh9-H{Rev6FW27|J5K1pXxl zUVW^ZTQnC>S21o|h80EhT5L!-+>pp(na4dz*yRja0&h*_@;qnf=Y#v*px?a+2*LM+ zBn!Ll_^4hu{b*@?&Lyw>m~-sh=lKz6ElYvx5MvF)`6hRkbdB&LH5h6ET&s=L*bx~Q zt)lUwHGe|7CD0D7WymRd{nLpwv5YQpK`xUrvM!4v@0I{u`@$GQfytIn*|nXVZc7>b z`W=~Yf33g^50ZJtphB}YrEuObo#fs#nn=kUZ_e2Z1!Ga)yr6-($27eKOA~iYv^ysP zEZ#m&>)kpxituB4ZZj9<)8l-%MWT206~W^YjHuA{n+*s`w>kn4wOI($!@HDW9@HCr zaGAX;6i+>e?y0fgb9^+g+^zB6mb-yrr411#%JF3<(R~Euft3l0u((1sXY>4R$~FGY z+d5{rF?U7J)^#RRbAsR zs1<O9 zdf6&H2X#0{lx9Gzrf#_xPkN}9;JvPhjX##KUN+4Pxh^lShsHwhPeJ`g@m>@Vh9o(R zWD2-Hi;kpn8T`nvGgKIjLL!=i#E^k$ zCyZnl=OS1Wwzpids@~-&?7tvvdw)NNAU_!9zOLF&w{bKMBcHY7ZgA>g#2^iMxq|Rw zNL8PQaQKx4*jOI2t~1*rFkLM3mT(3p`7p`Xs&9!h$NDw%KHq@=eVYiuM`q)?Rv0;1 zOeQk)jAlRsU7P3vimJ)4c)2ANozsokN_4^Rvh?q1_@RG(#Oy`+6eFpy3Smf_+1f*B zh#$jGtNf`0PxXfLeT~oaq#s)aaDhP5cdEf+w_?-!N0emnZc2wN`#y^6_gDjcBNWLP zxnLxNkIs*Fk3(@W^VQkC6o_!t@VXaN62@b!t1b#KhECSDf069^sq0dJ)iP19boavY)#x6im~Kr z;I`aLMd5Nj_%^OF+DBuDd1vMmdM@r!-W}Io+k3OLe$jgp)i=Zwo^pTZm&rmnXJk8_ z7+J&^ESBJ`xCogMD;I!|NPEMW_mOR-MD&HEXfK$gb_)+9oA_6ic)U(h;xDM5XFGRH z{FhegXeFD_AwO=-AsQ1he)zVZyUOh2*EEp0`K?4tynmxCn&_)!V!(!(dw(v^!me|- zaqU``D+^LuK|Wb^JgJd__}Wa>TRQ7AI>(7l^ZLEaq+gPV9F)76?D@IKBfhRH59$CJ z5e`oL?NJT1a*_jc<;>203=!T!?VK!r7|2DR_zmYP=EJmmTMbibWX1y>*8oNDrQO_0Wsr0OGS1tLV?UuYY&64{%UBp=carL0^j%UMw40&K| zbXbk*SJ}QY2Z2$Jh;Q?H_Q;|&PGas;xorV9k$@W~*zX9bm}#wan?4;mWK;?-o*e(8 zL>|Ha*!}(zeMcOE3um2E%A>5o3G}mq_sus*8Fg<4s80w8yAEfIoVjx@<>wQaLyQ(Z zfN4vHX$c}>FnU*Amp&je7cBBciSi~p=v;;>Us@l3_;qh!&Hsg8u;jDS9B>5S#V5Z{ z%Bc=^ML9@nh$AsG2lL*5L-NlHgcGqSXPWaB>fGty^DuXnMH{M49jSxJr~mWFWt$;u zcW@}aBCo*|f*(X)I+$My!VO6)6C|dFK36EJ!$UpN_2m{V`zqLxk^#=R*pX4CC=4b! zAi;J5EBQ7sP-w<~lUBsFf?+MGg76`kFP%wc&*vj^^3$S{q77Q8vHm0Y8*~aGt6?hE z822mj6;oFKD&v-8O7C}wh96Jvdx(6ic>7O-Uj#s~aS{4bR!Tb`RsrsQ#*t?NO z9&7XbINyP8d*sOcC5D@=UP>tSD9>_9iph;B0_GGQwp30eUS3Z6N#6dj1Qm6ltR<5c zt$k>3*NP4P^k#DkYGAxCWPjVg(KiH=Af>3)q|TDZZ^F%z%h<@~U2)Ls9u+RvNO)A6 zlGgBcW`q3@9sV1Ox|7+OBkS6xSGU$xiE=J-rHET%T7A*qT=-&B}pCn4kM6_I!DOXZUqaFdO( zs^y9LNZIL2lMrhi#dgoWSKp_2N%L_!h;8wKilfvN2u|?WGta!q*VJ}bqPek;oHOP& ziL*foSgL8&^5JC6VFSTwGK(1&Dt@iK}YiwHY>I&rNUX=)#B%d5ss`WidB4FKeXkA3H&|EG8}_ z?u5e*MMm}Gl6F;gUt0HVKx@}3e%N3Fp7DJ^O=u3_8(DC_Y+|b|Ry}-aH(=vrz)=Gh zbgc60^N#`1PU}#r(f|iR#FTb#7-4V2G4P|)p?me(o4bb`aHl1F%`@i_D7h(^n(LAmvuWABR4YzMlqd|F)=meeWj zBbIhFRfc=xs>uLmFc?*0=-ORj&Z7*Pr_T7njp64E(O}@|q++%& z6TG;?HqWHrjoBKqO795xvVRYaULb=Jcdm&Gj<1}Rbji!Ry=H)G7+X=O&+*Bzzf9n6 z-#sYf_@OJ*BLrVb%h; z*bav!OmxA&F^bJ6E|@t_o9opC{WObn+T-)7i_oYPe0H{RI%x7o|MIlTFH}}sxbYaC zk4Tt4%XkB!+P%;SpT$8Q&f^MONq*mBDSwv@y(bHqo<#K0?1`=~*|>q>Usei!Y7iiW zB~Q)X;>@Qia)#Z@$WNlI#%2`=R@N2NJ&kLM2*;O_S_9c<{s7hiE1vX|*Rj zqM-CJVln2>YJb@bY$o(%LVH$@usvguOyf?OEhO**i6=b7hI zieHTDolnOK)S5VD56*i!ds$8iNZl}XACMpn`HZKqW(?(H;~_-|RBEL6+RTphS2!ID zAW9rI!pztMC`V{ExYkDQ3#)gzh_Jv!?@Q%Lkv81vfZl7$OB0=g(EohZ@)83xuZrAI zdpVwDwrQtp(Hkd(Ji5nc-=>V7dwoc6vVUtZZ1EX4oNa3OiI~3M{an-pY`>8tZTm3w zJG4ano_5pX)ZR)NH4pRlQ+mbmN%!U*pp6tRXwM&DbLDXAZLKcJ(aZgB)&BBP&@@q( z$F1IRyNeI*(0%&QG@og?YXF83HQGkPJHoOfA4Q=;oxN9Q7>(O2_1S?6pDaM=0*m_d z8Uegpvrn3W$2?$x)q<7C^}XPL?EuKyz8M|s{HHrGJ2N+bZ?%YJM0&XY2(rP7|Vsyk-V{}BP z$KhiHUMHJUyd%2X*V>f3qp#q7CzLVrxT3N&W={sa{~+^fp)>a+)g0X!qCvp!KjY^l*wgYBKC|%%JF@>sq74m@2Q7TBD>>Vj>Tc( zyF;@s5n`F4s87Pq;Uays2_9>huaDn3JRoP6{G9u}#b(?f!qTw^^L)p&+~tV=iNOfXt~0uJS}W2?$`C{SHT+fe9XiVi99eI#(Y$mKmEO7I|Ns%ZdpM+H1alC zRrvL{fGaFd;6h7+;o7>EMa=ZEcH9^?@1vPC)|5^cS4$IdrNj7UP9plsW-ot`Lvd_; z6nZXS*VIgw{$1KLy+DmGu345>RlRTQVc&Akl=hP{tjs9wU%RxJFZ2L+hLIN;OG(zB zwSE7$t|~9Qx$+%@a!F3bXlE%nfNGsU=eN@rFeDBS)m>>DFEU5BT%;)hGvryzK8Qi(#6^LY-=yu}^Q&h4zX4a+}3=wxV-V zXzf^MauieH-A+J8(kP>+%v7!hxDjM}vX)lt)k`B{o-Ge+!%4#C&I=Ko^YWDZ)n}S5-=^EXm zq;+5@y7iYi=|F8_S$dn^k}w)X&Ijk`#I@?TA1(KxRw)kZzh5#^lytyJPYA|FGKUHG zKx@zVo3a{$xbmq2F)EUnQk}Tcc||StXL(46P+R$I8;xrH^zQ+pa`4-!92#UF*|4mx7>lxI6 znoi{_@B(7LhJse`xzPGII7Yo_3HY|bzfQlgQ$sOMhGv_6?ljry80qY`R9{k5i|8G^ z$uK3i7W9M0ntKu?>FYuRd{spBKHJe7m3AV9UdAOw^ON*?#!NqjMglo49@fw)8f%lc zJXQdA=1qzWwc4W@3TwE~LjHZ@K5gO&5!XcjuC$&qOq!94ubU%fZO1!-NlSM8rbEFUZg&U1iOv`t#qtpyOat$ zp3fL2x(b$UOLORO7E^a!>Ns~02IfH87TbU^mJc#mR*JJGq6WjJ*~Wml7##b4(jD$p zQ;Z)HeC@~F*|)l}a)Y3OzMe9~>l3RP(rWqFE%eTe5MAk!+4Zx{^-2RREsPs7>0VjKG3v z!lXOD>)3Wdi3RaWxBsKf5QWr$rhuNYfZz2=zqhk3pV8rWP@@wD-Kz~`yd@=M<87JJ z#4Em#7DJ+LL?r#<=oiS2d%i}&f{s`Vsif0v-$pY`j!4>|{86^zn>LvS?Gn|jg~W{b z+eV^$`FVR5 z(>}t4S0}TG?6pz(jXpz^L~A^)fALA>{tYKh2*ii!Il2FvAm=A&wnSGawI_;a`y})_Qpi;pP7NKcPeOrr-=1p&YokR4} zVt>tRyk&pJSk$~qE#NYrjBg6jbDAst(v_l+AmRKwJXL5^pefpu)XKy-L9iA$`f5<6 zc=Y(Zy!(RDv5h~?@4R&NkxR9UFiS@^Ybayp{JG&jEe9>RrSb3!^8eGB`11@T5m~I5 zluP~RFX=(~sbo5pECV}%{Cp^!RsxGxHu|vp=cT#aq1@#i~apf7-RvY(5zll{G{O}K%XRq%;B@_E`?E=1Uw=2H>NbO&n1Xr$f+qH>?(_n0J zQ!zz4eSenjCG|vJ#O@9ag}9%c6{icKs%WAe4vA97$88+dF?YhSHshI=Dx?K&Ku7Un z-+NDbb!}D-s=K>kFmW1MB9Jo^? z$7541_go#Tm~KDmd~lIDRO@v;e|QWhW$3ki2WQ{;>q4^x+Art7SU(%=eeJ{IpvW&( z=g2{F-Nmyy^=D`ULnC)a6rA;_RzLKbEC9W4I8BY7`tbxzDbTfqM->bcQO<#AWMEokm*s6TZ~Q!3#fm*Lt!Fguih=rufJ3#WHfHjRHIUsW}_H ziJTkUm(Xm$`_Pk>WWlIUT;yMbBc8mYeMvhIe}m`mm+jDzX6X9>ZFBDH_#4cjs7DA@ z5ZbCJFQIWZUp|5w_69)0e1h(*IroR2D^&vQ%a!kG1-I33Zw$7Y6uF$Lh6N5R{s9K) zAyk8z)T-R?E+4*g&BX`OmW!IM%fC3m8wv0s1>PGR!>j@ z+ySh4TN~A`(+G;YZu>YA`=~LWL^tUl!}Pg3dCO}}U`CSOl0gywF!2XsSA{$|Vj)@8 zi+t8646B*vA7wFgedtV{tC1l19~Fn9&Y{_Ew!QC)YoPhLiwDE)x6>pJR;=BxcJ+Ii zde|9Js8Tny|6?$~T8Q38>sFewLjkNRm#`!Y+9ZcTqQDp0hE z>>s@XQa3|o`{_mR4T`-Q#z2h>==p2jy`ZU>-ijMst#xaJ-S~THc%4+v z&r~L9Z8e9`uB7vR{a*clTcMlE5Bo&jf?G2uVLOX1d4@?mpAOjkP|jbO&3`j&$635Ek3mHLNh#EMo@1*%7zoGuge?8-mDWt2SKKQ@Ycn%CY zW-{A88~^#fF(4*rX30i({ z#pv%II;&gy#Y>Tpo=;K*hYd|#^ZGaJp2mdP-WL@iv(Q@tt?-+4%{JpU#t4+&3PW4? zUrxuYIEB34_$2~q+$LI$x``jU@Syf@Ux;IJcK;d+4Cx|ZftNYabE1EX_VhW+$E*6k z4ja*^Wi|mgNq_zl`0o||V{Yg<=ku6V9E~A^x;ghKa=P;GK*t;;guLE*ng6^;#a%+x z5~AI2k7i7$8@gcA$e;^}`kP@hgJ{t@4>hRH+~l?5IRb8g#4>mqJ?-u^mn|Aghe0{r z_Ww_+FmoGvRq${jEGsKtle2%ZJ~Z-QCp%3VVE8RTc*F%dh-YqH81ZBCb=7~}^&~lk zGG;R`-+2VL7TD;R|3WQBKFhB&^PhYH`rAbNuQL2ob%(Alh5W_)hr9X8Dg5um7Y_qI zWp4}?6w|V8H{?_X2WY6b4Re0({ToTo2jKG)__=d1y>RTToN6prACWjY*CS?+!EJ(zDFhY$HzU*rvluf{3drSXuBYz*E zcRs{&E;RJ2k`320Q+&}6M6Y!OCLMv9`a5WyW(`$a?swSKzVX+vKs%jCsFF?5y}z9< zmD&wGu5t-x*xsF?9_jY}sY=n&67%0{o+@w)>mYg;&njHdM8Xc=eTO*@d^rCf0oHBr zZ%BSXIVy?OesY%TUOUX4wRwi~;J;5J^lp1#FRGZ6;ooF+8av~7>TaZdW&ym{9XFoH z5@9FuHXS7>74>FZING&q3ARXWnqrh=`0GC&6!0YcSopMq=2kJj2~N%3{T@FrvJh->J~ zX(e}3@12wnsuwMr)x1pj-hDE9=zZxl&;fbkpM(g4eUT#r{s8h75QUndBjhGoBFR`U zmx_vsIWM%5*ps-gi1KB0Ial=U%k}?}sY<}ex96KV;K036w6eN^#fy$2ngNv3i(ua`L z=FC64_%s$VhqZ|BAS&7Tm%j?Wr@d%f7z&fPetfai#ahqf?>r$}c_mjPUSb{W7XDTo zr1d_kx?+4tHF$9N`iKXoaOr6!`>z?cxgyv3i@NhL^WXi?tFM(|x(gRnaf1#76@*aa zKcV5YD56$l%JSs=dNqUJw*Tnv_d_#doP*uJ@$%m~rmCwys9i0xfgB-J_xc|Me{v^% zh|fS4pjR7HKlI%HGTc*Mi3_ki#r|>R-Ge!PH`L$J{R1=vrTqhT#J2ohGF>uk9qX9F zx%;1L5XXlbQa{_^7lm_b{|!6;`*vSt!3$s0j-Y_KXgfp*o5}xIEu0i5hQ_pK6dpbR zvPGv6&YsBpeYYf6Tj>7tzmo(T{_{)xI>&c}P~Kcg#Q#DOre-ylvqq0O>a@JSYGmYK zSCjc4hm<|94ci+T3RF#y_%CX`IO6*YzVm;J0i0p}IRTwUN*Twh;fFtJaMF0#?v&w1 zioiFFvg*hFDmFVsc*kGGSsa)>W{rmDyEkpi7IU~l<_rJBb>lRVgZb^%_gAyOLE+n( zyJr8CZkfqRy_R2uMOYVHOw76cE;Cg6^S|46LO&U4alL@f|Bw=?b3EBSUx#56xz+Qg zJpEv2{46;>+0SwLVSdXajyInQ=ouJ}7K2ib=YozNhrGE~2>*R@4h`}(o%g^TQRwRj z?e&_it67D|J%)X&nzDF=^I>kVlNhN(C_v0}^A|XN)NM4_oA2-oc;=<8HagplislN! zlhbC0Hs~lWKl~|}{*&e8ti4sM(f5!mbbaWCXOZxr@L5es;b?aLIg7R>emeyQlRiYm zV@t2ELwT4TsEzpj{a#oMWq%b_x?S0}a3I9GLi;&QiED_oNq5ZeW3wTRju3!RQ*lh+ z@tXt2Oe_VcAu2{>Ar()!GHqKh=7@h@?0I!N9COhj4yA`j!p1XuJ}BBI3mwe)#GeIi zS#)h2K8wB%0u5han8R*GrE^}%xqunNpeP+N4$~)v)XgsObnU(Yk}D7=&y*QZK9?VG zCb zXww0AV8qGEVi|8)abtMl11xIFegUQSVJArUXXcMPfmv8k;>NWqis|K>cwnA>;KA}? zf5lgl2$GDEhrQ{lYCup1fzG?SFgDuXB&9_3$`e`|l)4d#dl$<95vX53T+In*`5yKHKvzJ7v7J{6w$OJRN z3UYPwZUu@SFzJSBS#ZB97zZ7_B%g&vpDv|{R-=1=e-3NOQRL1*hrRNl@S!q$_~OMA zs=29zTL1|VNJRl=H>G+=pGu%s&F5_!N~%@wx{>iaRf*kp^eV7NK^gw;4Re{`m{nlQ z>*G*dHk|k8<74jGxq%j9@s3pmVYDae4Yucd#yCuFk$A&5JeR1opts@*C}Df47gPE5 z