xref: /netbsd-src/tests/lib/libi386/t_user_ldt.c (revision 5231a05ac14901a40b35465945dd6af70d07c9b3)
1*5231a05aSchristos /*	$NetBSD: t_user_ldt.c,v 1.6 2021/04/30 13:53:30 christos Exp $	*/
27ee848d9Smaxv 
37ee848d9Smaxv /*
47ee848d9Smaxv  * Copyright (c) 2020 The NetBSD Foundation, Inc.
57ee848d9Smaxv  * All rights reserved.
67ee848d9Smaxv  *
77ee848d9Smaxv  * This code is derived from software contributed to The NetBSD Foundation
87ee848d9Smaxv  * by Maxime Villard.
97ee848d9Smaxv  *
107ee848d9Smaxv  * Redistribution and use in source and binary forms, with or without
117ee848d9Smaxv  * modification, are permitted provided that the following conditions
127ee848d9Smaxv  * are met:
137ee848d9Smaxv  * 1. Redistributions of source code must retain the above copyright
147ee848d9Smaxv  *    notice, this list of conditions and the following disclaimer.
157ee848d9Smaxv  * 2. Redistributions in binary form must reproduce the above copyright
167ee848d9Smaxv  *    notice, this list of conditions and the following disclaimer in the
177ee848d9Smaxv  *    documentation and/or other materials provided with the distribution.
187ee848d9Smaxv  *
197ee848d9Smaxv  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
207ee848d9Smaxv  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
217ee848d9Smaxv  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
227ee848d9Smaxv  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
237ee848d9Smaxv  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
247ee848d9Smaxv  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
257ee848d9Smaxv  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
267ee848d9Smaxv  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
277ee848d9Smaxv  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
287ee848d9Smaxv  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
297ee848d9Smaxv  * POSSIBILITY OF SUCH DAMAGE.
307ee848d9Smaxv  */
317ee848d9Smaxv 
327ee848d9Smaxv #include <stdio.h>
337ee848d9Smaxv #include <stdlib.h>
347ee848d9Smaxv #include <string.h>
357ee848d9Smaxv #include <unistd.h>
367ee848d9Smaxv #include <errno.h>
377ee848d9Smaxv #include <signal.h>
387ee848d9Smaxv 
397ee848d9Smaxv #include <sys/types.h>
407ee848d9Smaxv #include <sys/mman.h>
417ee848d9Smaxv #include <machine/segments.h>
427ee848d9Smaxv #include <machine/sysarch.h>
437ee848d9Smaxv #include <machine/vmparam.h>
448d6f6701Smaxv #include <machine/gdt.h>
458d6f6701Smaxv 
467ee848d9Smaxv #include <atf-c.h>
477ee848d9Smaxv 
487ee848d9Smaxv static uint8_t *ldt_base;
497ee848d9Smaxv static bool user_ldt_supported;
507ee848d9Smaxv 
517ee848d9Smaxv static void
user_ldt_detect(void)527ee848d9Smaxv user_ldt_detect(void)
537ee848d9Smaxv {
547ee848d9Smaxv 	union descriptor desc;
557ee848d9Smaxv 	int ret;
567ee848d9Smaxv 
577ee848d9Smaxv 	ret = i386_get_ldt(0, &desc, 1);
58d3713544Smaxv 	user_ldt_supported = (ret != -1) || (errno != ENOSYS && errno != EPERM);
597ee848d9Smaxv }
607ee848d9Smaxv 
617ee848d9Smaxv static void
init_ldt_base(void)627ee848d9Smaxv init_ldt_base(void)
637ee848d9Smaxv {
647ee848d9Smaxv 	ldt_base = (uint8_t *)mmap(NULL, 2 * PAGE_SIZE, PROT_READ | PROT_WRITE,
657ee848d9Smaxv 	    MAP_PRIVATE | MAP_ANON, -1, 0);
667ee848d9Smaxv 	if (ldt_base == MAP_FAILED)
677ee848d9Smaxv 		atf_tc_fail("mmap failed");
687ee848d9Smaxv 	munmap(ldt_base + PAGE_SIZE, PAGE_SIZE);
697ee848d9Smaxv }
707ee848d9Smaxv 
717ee848d9Smaxv static void
build_desc(union descriptor * desc,void * basep,uint32_t limit,int type,int dpl,int def32,int gran)727ee848d9Smaxv build_desc(union descriptor *desc, void *basep, uint32_t limit, int type,
737ee848d9Smaxv     int dpl, int def32, int gran)
747ee848d9Smaxv {
757ee848d9Smaxv 	uintptr_t base = (uintptr_t)basep;
767ee848d9Smaxv 
777ee848d9Smaxv 	limit--;
787ee848d9Smaxv 
797ee848d9Smaxv 	desc->sd.sd_lolimit = limit & 0x0000ffff;
807ee848d9Smaxv 	desc->sd.sd_lobase  = base & 0x00ffffff;
817ee848d9Smaxv 	desc->sd.sd_type    = type & 0x1F;
827ee848d9Smaxv 	desc->sd.sd_dpl     = dpl & 0x3;
837ee848d9Smaxv 	desc->sd.sd_p       = 1;
847ee848d9Smaxv 	desc->sd.sd_hilimit = (limit & 0x00ff0000) >> 16;
857ee848d9Smaxv 	desc->sd.sd_xx      = 0;
867ee848d9Smaxv 	desc->sd.sd_def32   = def32 ? 1 : 0;
877ee848d9Smaxv 	desc->sd.sd_gran    = gran ? 1 : 0;
887ee848d9Smaxv 	desc->sd.sd_hibase  = (base & 0xff000000) >> 24;
897ee848d9Smaxv }
907ee848d9Smaxv 
917ee848d9Smaxv static void
set_ds(unsigned int val)9266af4cddSmaxv set_ds(unsigned int val)
9366af4cddSmaxv {
9466af4cddSmaxv 	__asm volatile("mov %0,%%ds"::"r" ((unsigned short)val));
9566af4cddSmaxv }
9666af4cddSmaxv 
9766af4cddSmaxv static void
set_fs(unsigned int val)987ee848d9Smaxv set_fs(unsigned int val)
997ee848d9Smaxv {
1007ee848d9Smaxv 	__asm volatile("mov %0,%%fs"::"r" ((unsigned short)val));
1017ee848d9Smaxv }
1027ee848d9Smaxv 
1037ee848d9Smaxv static uint8_t __noinline
get_fs_byte(const char * addr)1047ee848d9Smaxv get_fs_byte(const char *addr)
1057ee848d9Smaxv {
1067ee848d9Smaxv 	uint8_t val;
1077ee848d9Smaxv 	__asm volatile (
1087ee848d9Smaxv 		".globl fs_read_begin; fs_read_begin:\n"
1097ee848d9Smaxv 		"movb %%fs:%1,%0\n"
1107ee848d9Smaxv 		".globl fs_read_end; fs_read_end:\n"
1117ee848d9Smaxv 		: "=q" (val) : "m" (*addr)
1127ee848d9Smaxv 	);
1137ee848d9Smaxv 	return val;
1147ee848d9Smaxv }
1157ee848d9Smaxv 
1167ee848d9Smaxv /* -------------------------------------------------------------------------- */
1177ee848d9Smaxv 
1187ee848d9Smaxv ATF_TC(filter_ops);
ATF_TC_HEAD(filter_ops,tc)1197ee848d9Smaxv ATF_TC_HEAD(filter_ops, tc)
1207ee848d9Smaxv {
1217ee848d9Smaxv 	atf_tc_set_md_var(tc, "descr",
1227ee848d9Smaxv 	    "Ensure that the kernel correctly filters the descriptors");
1237ee848d9Smaxv }
ATF_TC_BODY(filter_ops,tc)1247ee848d9Smaxv ATF_TC_BODY(filter_ops, tc)
1257ee848d9Smaxv {
1267ee848d9Smaxv 	union descriptor desc;
1277ee848d9Smaxv 	const int forbidden_types[] = {
1287ee848d9Smaxv 		SDT_SYS286TSS,
1297ee848d9Smaxv 		SDT_SYSLDT,
1307ee848d9Smaxv 		SDT_SYS286BSY,
1317ee848d9Smaxv 		SDT_SYS286CGT,
1327ee848d9Smaxv 		SDT_SYSTASKGT,
1337ee848d9Smaxv 		SDT_SYS286IGT,
1347ee848d9Smaxv 		SDT_SYS286TGT,
1357ee848d9Smaxv 		SDT_SYSNULL2,
1367ee848d9Smaxv 		SDT_SYS386TSS,
1377ee848d9Smaxv 		SDT_SYSNULL3,
1387ee848d9Smaxv 		SDT_SYS386BSY,
1397ee848d9Smaxv 		SDT_SYS386CGT,
1407ee848d9Smaxv 		SDT_SYSNULL4,
1417ee848d9Smaxv 		SDT_SYS386IGT,
1427ee848d9Smaxv 		SDT_SYS386TGT
1437ee848d9Smaxv 	};
1447ee848d9Smaxv 	size_t i;
1457ee848d9Smaxv 
1467ee848d9Smaxv 	if (!user_ldt_supported) {
1477ee848d9Smaxv 		atf_tc_skip("USER_LDT disabled");
1487ee848d9Smaxv 	}
1497ee848d9Smaxv 
1507ee848d9Smaxv 	/* The first LDT slots should not be settable. */
1517ee848d9Smaxv 	for (i = 0; i < 10; i++) {
1527ee848d9Smaxv 		build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW,
1537ee848d9Smaxv 		    SEL_UPL, 1, 0);
1547ee848d9Smaxv 		ATF_REQUIRE_EQ(i386_set_ldt(i, &desc, 1), -1);
1557ee848d9Smaxv 		ATF_REQUIRE_EQ(errno, EINVAL);
1567ee848d9Smaxv 	}
1577ee848d9Smaxv 
1587ee848d9Smaxv 	/* SEL_KPL should not be allowed. */
1597ee848d9Smaxv 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_KPL, 1, 0);
1607ee848d9Smaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
1617ee848d9Smaxv 	ATF_REQUIRE_EQ(errno, EACCES);
1627ee848d9Smaxv 
1637ee848d9Smaxv 	/* Long-mode segments should not be allowed. */
1647ee848d9Smaxv 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
1657ee848d9Smaxv 	desc.sd.sd_xx = 0b11; /* sd_avl | sd_long */
1667ee848d9Smaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
1677ee848d9Smaxv 	ATF_REQUIRE_EQ(errno, EACCES);
1687ee848d9Smaxv 
1697ee848d9Smaxv 	/* No forbidden type should be allowed. */
1707ee848d9Smaxv 	for (i = 0; i < __arraycount(forbidden_types); i++) {
1717ee848d9Smaxv 		build_desc(&desc, ldt_base, PAGE_SIZE, forbidden_types[i],
1727ee848d9Smaxv 		    SEL_UPL, 1, 0);
1737ee848d9Smaxv 		ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
1747ee848d9Smaxv 		ATF_REQUIRE_EQ(errno, EACCES);
1757ee848d9Smaxv 	}
1768d6f6701Smaxv 
1778d6f6701Smaxv 	/* Check the slot limit. */
1788d6f6701Smaxv 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
1798d6f6701Smaxv 	ATF_REQUIRE_EQ(i386_set_ldt(MAX_USERLDT_SLOTS-1, &desc, 1),
1808d6f6701Smaxv 	    MAX_USERLDT_SLOTS-1);
1818d6f6701Smaxv 	ATF_REQUIRE_EQ(i386_set_ldt(MAX_USERLDT_SLOTS, &desc, 1), -1);
1828d6f6701Smaxv 	ATF_REQUIRE_EQ(errno, EINVAL);
1837ee848d9Smaxv }
1847ee848d9Smaxv 
1857ee848d9Smaxv /* -------------------------------------------------------------------------- */
1867ee848d9Smaxv 
18766af4cddSmaxv static void
iretq_gp__gp_handler(int signo,siginfo_t * sig,void * ctx)18866af4cddSmaxv iretq_gp__gp_handler(int signo, siginfo_t *sig, void *ctx)
18966af4cddSmaxv {
19066af4cddSmaxv 	ATF_REQUIRE(sig->si_signo == SIGSEGV);
19166af4cddSmaxv 	ATF_REQUIRE(sig->si_code == SEGV_ACCERR);
19266af4cddSmaxv 	atf_tc_pass();
19366af4cddSmaxv 	/* NOTREACHED */
19466af4cddSmaxv }
19566af4cddSmaxv 
19666af4cddSmaxv ATF_TC(iretq_gp);
ATF_TC_HEAD(iretq_gp,tc)19766af4cddSmaxv ATF_TC_HEAD(iretq_gp, tc)
19866af4cddSmaxv {
19966af4cddSmaxv 	atf_tc_set_md_var(tc, "descr",
20066af4cddSmaxv 	    "Ensure that the kernel correctly handles iretq #GP faults");
20166af4cddSmaxv }
ATF_TC_BODY(iretq_gp,tc)20266af4cddSmaxv ATF_TC_BODY(iretq_gp, tc)
20366af4cddSmaxv {
20466af4cddSmaxv 	union descriptor desc;
20566af4cddSmaxv 	struct sigaction act;
20666af4cddSmaxv 
20766af4cddSmaxv 	if (!user_ldt_supported) {
20866af4cddSmaxv 		atf_tc_skip("USER_LDT disabled");
20966af4cddSmaxv 	}
21066af4cddSmaxv 
21166af4cddSmaxv 	/* Build a desc, set %ds to it. */
21266af4cddSmaxv 	build_desc(&desc, 0, 0xFFFFFUL, SDT_MEMRWA, SEL_UPL, 1, 1);
21366af4cddSmaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
21466af4cddSmaxv 	set_ds(LSEL(256, SEL_UPL));
21566af4cddSmaxv 
21666af4cddSmaxv 	/* Register the fault handler. */
21766af4cddSmaxv 	memset(&act, 0, sizeof(act));
21866af4cddSmaxv 	act.sa_sigaction = iretq_gp__gp_handler;
21966af4cddSmaxv 	act.sa_flags = SA_SIGINFO;
22066af4cddSmaxv 	ATF_REQUIRE_EQ(sigaction(SIGSEGV, &act, NULL), 0);
22166af4cddSmaxv 
22266af4cddSmaxv 	/* Set NULL on %ds, iretq should fault. */
22366af4cddSmaxv 	memset(&desc, 0, sizeof(desc));
22466af4cddSmaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
22566af4cddSmaxv 
22666af4cddSmaxv 	atf_tc_fail("test did not fault as expected");
22766af4cddSmaxv }
22866af4cddSmaxv 
22966af4cddSmaxv /* -------------------------------------------------------------------------- */
23066af4cddSmaxv 
23166af4cddSmaxv static void
iretq_np__np_handler(int signo,siginfo_t * sig,void * ctx)23266af4cddSmaxv iretq_np__np_handler(int signo, siginfo_t *sig, void *ctx)
23366af4cddSmaxv {
23466af4cddSmaxv 	ATF_REQUIRE(sig->si_signo == SIGBUS);
23566af4cddSmaxv 	ATF_REQUIRE(sig->si_code == BUS_ADRERR);
23666af4cddSmaxv 	atf_tc_pass();
23766af4cddSmaxv 	/* NOTREACHED */
23866af4cddSmaxv }
23966af4cddSmaxv 
24066af4cddSmaxv ATF_TC(iretq_np);
ATF_TC_HEAD(iretq_np,tc)24166af4cddSmaxv ATF_TC_HEAD(iretq_np, tc)
24266af4cddSmaxv {
24366af4cddSmaxv 	atf_tc_set_md_var(tc, "descr",
24466af4cddSmaxv 	    "Ensure that the kernel correctly handles iretq #NP faults");
24566af4cddSmaxv }
ATF_TC_BODY(iretq_np,tc)24666af4cddSmaxv ATF_TC_BODY(iretq_np, tc)
24766af4cddSmaxv {
24866af4cddSmaxv 	union descriptor desc;
24966af4cddSmaxv 	struct sigaction act;
25066af4cddSmaxv 
25166af4cddSmaxv 	if (!user_ldt_supported) {
25266af4cddSmaxv 		atf_tc_skip("USER_LDT disabled");
25366af4cddSmaxv 	}
25466af4cddSmaxv 
25566af4cddSmaxv 	/* Build a desc, set %ds to it. */
25666af4cddSmaxv 	build_desc(&desc, 0, 0xFFFFFFFFUL, SDT_MEMRWA, SEL_UPL, 1, 1);
25766af4cddSmaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
25866af4cddSmaxv 	set_ds(LSEL(256, SEL_UPL));
25966af4cddSmaxv 
26066af4cddSmaxv 	/* Register the fault handler. */
26166af4cddSmaxv 	memset(&act, 0, sizeof(act));
26266af4cddSmaxv 	act.sa_sigaction = iretq_np__np_handler;
26366af4cddSmaxv 	act.sa_flags = SA_SIGINFO;
26466af4cddSmaxv 	ATF_REQUIRE_EQ(sigaction(SIGBUS, &act, NULL), 0);
26566af4cddSmaxv 
26666af4cddSmaxv 	/* Set non-present on %ds, iretq should fault. */
26766af4cddSmaxv 	desc.sd.sd_p = 0;
26866af4cddSmaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
26966af4cddSmaxv 
27066af4cddSmaxv 	atf_tc_fail("test did not fault as expected");
27166af4cddSmaxv }
27266af4cddSmaxv 
27366af4cddSmaxv /* -------------------------------------------------------------------------- */
27466af4cddSmaxv 
2757ee848d9Smaxv static volatile bool expect_crash;
2767ee848d9Smaxv 
2777ee848d9Smaxv static void
user_ldt__gp_handler(int signo,siginfo_t * sig,void * ctx)27866af4cddSmaxv user_ldt__gp_handler(int signo, siginfo_t *sig, void *ctx)
2797ee848d9Smaxv {
2807ee848d9Smaxv 	ucontext_t *uctx = ctx;
2817ee848d9Smaxv 	extern uint8_t fs_read_begin;
2827ee848d9Smaxv 
2837ee848d9Smaxv 	if (!expect_crash) {
2847ee848d9Smaxv 		atf_tc_fail("unexpected #GP");
2857ee848d9Smaxv 	}
2867ee848d9Smaxv 
2877ee848d9Smaxv 	ATF_REQUIRE(sig->si_signo == SIGSEGV);
2887ee848d9Smaxv 	ATF_REQUIRE(sig->si_code == SEGV_ACCERR);
2897ee848d9Smaxv 
2907ee848d9Smaxv 	if (uctx->uc_mcontext.__gregs[_REG_EIP] != (intptr_t)&fs_read_begin) {
2917ee848d9Smaxv 		atf_tc_fail("got #GP on the wrong instruction");
2927ee848d9Smaxv 	}
2937ee848d9Smaxv 
2947ee848d9Smaxv 	set_fs(GSEL(GUDATA_SEL, SEL_UPL));
2957ee848d9Smaxv 
2967ee848d9Smaxv 	atf_tc_pass();
2977ee848d9Smaxv 	/* NOTREACHED */
2987ee848d9Smaxv }
2997ee848d9Smaxv 
3007ee848d9Smaxv ATF_TC(user_ldt);
ATF_TC_HEAD(user_ldt,tc)3017ee848d9Smaxv ATF_TC_HEAD(user_ldt, tc)
3027ee848d9Smaxv {
3037ee848d9Smaxv 	atf_tc_set_md_var(tc, "descr",
3047ee848d9Smaxv 	    "Ensure that USER_LDT works as expected");
3057ee848d9Smaxv }
ATF_TC_BODY(user_ldt,tc)3067ee848d9Smaxv ATF_TC_BODY(user_ldt, tc)
3077ee848d9Smaxv {
3087ee848d9Smaxv 	union descriptor desc;
3097ee848d9Smaxv 	struct sigaction act;
3107ee848d9Smaxv 
3117ee848d9Smaxv 	if (!user_ldt_supported) {
3127ee848d9Smaxv 		atf_tc_skip("USER_LDT disabled");
3137ee848d9Smaxv 	}
3147ee848d9Smaxv 
3157ee848d9Smaxv 	memset(&act, 0, sizeof(act));
31666af4cddSmaxv 	act.sa_sigaction = user_ldt__gp_handler;
3177ee848d9Smaxv 	act.sa_flags = SA_SIGINFO;
3187ee848d9Smaxv 	ATF_REQUIRE_EQ(sigaction(SIGSEGV, &act, NULL), 0);
3197ee848d9Smaxv 
3207ee848d9Smaxv 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
3217ee848d9Smaxv 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
3227ee848d9Smaxv 
3237ee848d9Smaxv 	set_fs(LSEL(256, SEL_UPL));
3247ee848d9Smaxv 
3257ee848d9Smaxv 	ldt_base[666] = 123;
3267ee848d9Smaxv 	ldt_base[PAGE_SIZE-1] = 213;
3277ee848d9Smaxv 	__insn_barrier();
3287ee848d9Smaxv 	ATF_REQUIRE_EQ(get_fs_byte((char *)666), 123);
3297ee848d9Smaxv 	ATF_REQUIRE_EQ(get_fs_byte((char *)PAGE_SIZE-1), 213);
3307ee848d9Smaxv 
3317ee848d9Smaxv 	/* This one should fault, and it concludes our test case. */
3327ee848d9Smaxv 	expect_crash = true;
3337ee848d9Smaxv 	get_fs_byte((char *)PAGE_SIZE);
3347ee848d9Smaxv 
3357ee848d9Smaxv 	atf_tc_fail("test did not fault as expected");
3367ee848d9Smaxv }
3377ee848d9Smaxv 
3387ee848d9Smaxv /* -------------------------------------------------------------------------- */
3397ee848d9Smaxv 
ATF_TP_ADD_TCS(tp)3407ee848d9Smaxv ATF_TP_ADD_TCS(tp)
3417ee848d9Smaxv {
3427ee848d9Smaxv 	user_ldt_detect();
3437ee848d9Smaxv 	init_ldt_base();
3447ee848d9Smaxv 
3457ee848d9Smaxv 	ATF_TP_ADD_TC(tp, filter_ops);
34666af4cddSmaxv 	ATF_TP_ADD_TC(tp, iretq_gp);
34766af4cddSmaxv 	ATF_TP_ADD_TC(tp, iretq_np);
3487ee848d9Smaxv 	ATF_TP_ADD_TC(tp, user_ldt);
3497ee848d9Smaxv 
3507ee848d9Smaxv 	return atf_no_error();
3517ee848d9Smaxv }
352