efb135b74c
* Clear CPU side data on GPU buffer clears * Implement tracked fill operation that can signal other resource types except buffer * Fix tests, add missing XML doc * PR feedback
705 lines
22 KiB
C#
705 lines
22 KiB
C#
using ARMeilleure.Memory;
|
|
using Ryujinx.Cpu.Tracking;
|
|
using Ryujinx.Memory;
|
|
using Ryujinx.Memory.Range;
|
|
using Ryujinx.Memory.Tracking;
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Runtime.CompilerServices;
|
|
using System.Runtime.InteropServices;
|
|
using System.Threading;
|
|
|
|
namespace Ryujinx.Cpu.Jit
|
|
{
|
|
/// <summary>
|
|
/// Represents a CPU memory manager.
|
|
/// </summary>
|
|
public sealed class MemoryManager : MemoryManagerBase, IMemoryManager, IVirtualMemoryManagerTracked, IWritableBlock
|
|
{
|
|
public const int PageBits = 12;
|
|
public const int PageSize = 1 << PageBits;
|
|
public const int PageMask = PageSize - 1;
|
|
|
|
private const int PteSize = 8;
|
|
|
|
private const int PointerTagBit = 62;
|
|
|
|
private readonly MemoryBlock _backingMemory;
|
|
private readonly InvalidAccessHandler _invalidAccessHandler;
|
|
|
|
/// <inheritdoc/>
|
|
public bool Supports4KBPages => true;
|
|
|
|
/// <summary>
|
|
/// Address space width in bits.
|
|
/// </summary>
|
|
public int AddressSpaceBits { get; }
|
|
|
|
private readonly ulong _addressSpaceSize;
|
|
|
|
private readonly MemoryBlock _pageTable;
|
|
|
|
/// <summary>
|
|
/// Page table base pointer.
|
|
/// </summary>
|
|
public IntPtr PageTablePointer => _pageTable.Pointer;
|
|
|
|
public MemoryManagerType Type => MemoryManagerType.SoftwarePageTable;
|
|
|
|
public MemoryTracking Tracking { get; }
|
|
|
|
public event Action<ulong, ulong> UnmapEvent;
|
|
|
|
/// <summary>
|
|
/// Creates a new instance of the memory manager.
|
|
/// </summary>
|
|
/// <param name="backingMemory">Physical backing memory where virtual memory will be mapped to</param>
|
|
/// <param name="addressSpaceSize">Size of the address space</param>
|
|
/// <param name="invalidAccessHandler">Optional function to handle invalid memory accesses</param>
|
|
public MemoryManager(MemoryBlock backingMemory, ulong addressSpaceSize, InvalidAccessHandler invalidAccessHandler = null)
|
|
{
|
|
_backingMemory = backingMemory;
|
|
_invalidAccessHandler = invalidAccessHandler;
|
|
|
|
ulong asSize = PageSize;
|
|
int asBits = PageBits;
|
|
|
|
while (asSize < addressSpaceSize)
|
|
{
|
|
asSize <<= 1;
|
|
asBits++;
|
|
}
|
|
|
|
AddressSpaceBits = asBits;
|
|
_addressSpaceSize = asSize;
|
|
_pageTable = new MemoryBlock((asSize / PageSize) * PteSize);
|
|
|
|
Tracking = new MemoryTracking(this, PageSize);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void Map(ulong va, ulong pa, ulong size, MemoryMapFlags flags)
|
|
{
|
|
AssertValidAddressAndSize(va, size);
|
|
|
|
ulong remainingSize = size;
|
|
ulong oVa = va;
|
|
ulong oPa = pa;
|
|
while (remainingSize != 0)
|
|
{
|
|
_pageTable.Write((va / PageSize) * PteSize, PaToPte(pa));
|
|
|
|
va += PageSize;
|
|
pa += PageSize;
|
|
remainingSize -= PageSize;
|
|
}
|
|
|
|
Tracking.Map(oVa, size);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void MapForeign(ulong va, nuint hostPointer, ulong size)
|
|
{
|
|
throw new NotSupportedException();
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void Unmap(ulong va, ulong size)
|
|
{
|
|
// If size is 0, there's nothing to unmap, just exit early.
|
|
if (size == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
AssertValidAddressAndSize(va, size);
|
|
|
|
UnmapEvent?.Invoke(va, size);
|
|
Tracking.Unmap(va, size);
|
|
|
|
ulong remainingSize = size;
|
|
while (remainingSize != 0)
|
|
{
|
|
_pageTable.Write((va / PageSize) * PteSize, 0UL);
|
|
|
|
va += PageSize;
|
|
remainingSize -= PageSize;
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public T Read<T>(ulong va) where T : unmanaged
|
|
{
|
|
return MemoryMarshal.Cast<byte, T>(GetSpan(va, Unsafe.SizeOf<T>()))[0];
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public T ReadTracked<T>(ulong va) where T : unmanaged
|
|
{
|
|
try
|
|
{
|
|
SignalMemoryTracking(va, (ulong)Unsafe.SizeOf<T>(), false);
|
|
|
|
return Read<T>(va);
|
|
}
|
|
catch (InvalidMemoryRegionException)
|
|
{
|
|
if (_invalidAccessHandler == null || !_invalidAccessHandler(va))
|
|
{
|
|
throw;
|
|
}
|
|
|
|
return default;
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void Read(ulong va, Span<byte> data)
|
|
{
|
|
ReadImpl(va, data);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void Write<T>(ulong va, T value) where T : unmanaged
|
|
{
|
|
Write(va, MemoryMarshal.Cast<T, byte>(MemoryMarshal.CreateSpan(ref value, 1)));
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void Write(ulong va, ReadOnlySpan<byte> data)
|
|
{
|
|
if (data.Length == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
SignalMemoryTracking(va, (ulong)data.Length, true);
|
|
|
|
WriteImpl(va, data);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void WriteUntracked(ulong va, ReadOnlySpan<byte> data)
|
|
{
|
|
if (data.Length == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
WriteImpl(va, data);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool WriteWithRedundancyCheck(ulong va, ReadOnlySpan<byte> data)
|
|
{
|
|
if (data.Length == 0)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
SignalMemoryTracking(va, (ulong)data.Length, false);
|
|
|
|
if (IsContiguousAndMapped(va, data.Length))
|
|
{
|
|
var target = _backingMemory.GetSpan(GetPhysicalAddressInternal(va), data.Length);
|
|
|
|
bool changed = !data.SequenceEqual(target);
|
|
|
|
if (changed)
|
|
{
|
|
data.CopyTo(target);
|
|
}
|
|
|
|
return changed;
|
|
}
|
|
else
|
|
{
|
|
WriteImpl(va, data);
|
|
|
|
return true;
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Writes data to CPU mapped memory.
|
|
/// </summary>
|
|
/// <param name="va">Virtual address to write the data into</param>
|
|
/// <param name="data">Data to be written</param>
|
|
[MethodImpl(MethodImplOptions.AggressiveInlining)]
|
|
private void WriteImpl(ulong va, ReadOnlySpan<byte> data)
|
|
{
|
|
try
|
|
{
|
|
AssertValidAddressAndSize(va, (ulong)data.Length);
|
|
|
|
if (IsContiguousAndMapped(va, data.Length))
|
|
{
|
|
data.CopyTo(_backingMemory.GetSpan(GetPhysicalAddressInternal(va), data.Length));
|
|
}
|
|
else
|
|
{
|
|
int offset = 0, size;
|
|
|
|
if ((va & PageMask) != 0)
|
|
{
|
|
ulong pa = GetPhysicalAddressInternal(va);
|
|
|
|
size = Math.Min(data.Length, PageSize - (int)(va & PageMask));
|
|
|
|
data.Slice(0, size).CopyTo(_backingMemory.GetSpan(pa, size));
|
|
|
|
offset += size;
|
|
}
|
|
|
|
for (; offset < data.Length; offset += size)
|
|
{
|
|
ulong pa = GetPhysicalAddressInternal(va + (ulong)offset);
|
|
|
|
size = Math.Min(data.Length - offset, PageSize);
|
|
|
|
data.Slice(offset, size).CopyTo(_backingMemory.GetSpan(pa, size));
|
|
}
|
|
}
|
|
}
|
|
catch (InvalidMemoryRegionException)
|
|
{
|
|
if (_invalidAccessHandler == null || !_invalidAccessHandler(va))
|
|
{
|
|
throw;
|
|
}
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public ReadOnlySpan<byte> GetSpan(ulong va, int size, bool tracked = false)
|
|
{
|
|
if (size == 0)
|
|
{
|
|
return ReadOnlySpan<byte>.Empty;
|
|
}
|
|
|
|
if (tracked)
|
|
{
|
|
SignalMemoryTracking(va, (ulong)size, false);
|
|
}
|
|
|
|
if (IsContiguousAndMapped(va, size))
|
|
{
|
|
return _backingMemory.GetSpan(GetPhysicalAddressInternal(va), size);
|
|
}
|
|
else
|
|
{
|
|
Span<byte> data = new byte[size];
|
|
|
|
ReadImpl(va, data);
|
|
|
|
return data;
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public unsafe WritableRegion GetWritableRegion(ulong va, int size, bool tracked = false)
|
|
{
|
|
if (size == 0)
|
|
{
|
|
return new WritableRegion(null, va, Memory<byte>.Empty);
|
|
}
|
|
|
|
if (IsContiguousAndMapped(va, size))
|
|
{
|
|
if (tracked)
|
|
{
|
|
SignalMemoryTracking(va, (ulong)size, true);
|
|
}
|
|
|
|
return new WritableRegion(null, va, _backingMemory.GetMemory(GetPhysicalAddressInternal(va), size));
|
|
}
|
|
else
|
|
{
|
|
Memory<byte> memory = new byte[size];
|
|
|
|
GetSpan(va, size).CopyTo(memory.Span);
|
|
|
|
return new WritableRegion(this, va, memory, tracked);
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public ref T GetRef<T>(ulong va) where T : unmanaged
|
|
{
|
|
if (!IsContiguous(va, Unsafe.SizeOf<T>()))
|
|
{
|
|
ThrowMemoryNotContiguous();
|
|
}
|
|
|
|
SignalMemoryTracking(va, (ulong)Unsafe.SizeOf<T>(), true);
|
|
|
|
return ref _backingMemory.GetRef<T>(GetPhysicalAddressInternal(va));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Computes the number of pages in a virtual address range.
|
|
/// </summary>
|
|
/// <param name="va">Virtual address of the range</param>
|
|
/// <param name="size">Size of the range</param>
|
|
/// <param name="startVa">The virtual address of the beginning of the first page</param>
|
|
/// <remarks>This function does not differentiate between allocated and unallocated pages.</remarks>
|
|
[MethodImpl(MethodImplOptions.AggressiveInlining)]
|
|
private int GetPagesCount(ulong va, uint size, out ulong startVa)
|
|
{
|
|
// WARNING: Always check if ulong does not overflow during the operations.
|
|
startVa = va & ~(ulong)PageMask;
|
|
ulong vaSpan = (va - startVa + size + PageMask) & ~(ulong)PageMask;
|
|
|
|
return (int)(vaSpan / PageSize);
|
|
}
|
|
|
|
private static void ThrowMemoryNotContiguous() => throw new MemoryNotContiguousException();
|
|
|
|
[MethodImpl(MethodImplOptions.AggressiveInlining)]
|
|
private bool IsContiguousAndMapped(ulong va, int size) => IsContiguous(va, size) && IsMapped(va);
|
|
|
|
[MethodImpl(MethodImplOptions.AggressiveInlining)]
|
|
private bool IsContiguous(ulong va, int size)
|
|
{
|
|
if (!ValidateAddress(va) || !ValidateAddressAndSize(va, (ulong)size))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
int pages = GetPagesCount(va, (uint)size, out va);
|
|
|
|
for (int page = 0; page < pages - 1; page++)
|
|
{
|
|
if (!ValidateAddress(va + PageSize))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (GetPhysicalAddressInternal(va) + PageSize != GetPhysicalAddressInternal(va + PageSize))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
va += PageSize;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IEnumerable<HostMemoryRange> GetHostRegions(ulong va, ulong size)
|
|
{
|
|
if (size == 0)
|
|
{
|
|
return Enumerable.Empty<HostMemoryRange>();
|
|
}
|
|
|
|
var guestRegions = GetPhysicalRegionsImpl(va, size);
|
|
if (guestRegions == null)
|
|
{
|
|
return null;
|
|
}
|
|
|
|
var regions = new HostMemoryRange[guestRegions.Count];
|
|
|
|
for (int i = 0; i < regions.Length; i++)
|
|
{
|
|
var guestRegion = guestRegions[i];
|
|
IntPtr pointer = _backingMemory.GetPointer(guestRegion.Address, guestRegion.Size);
|
|
regions[i] = new HostMemoryRange((nuint)(ulong)pointer, guestRegion.Size);
|
|
}
|
|
|
|
return regions;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IEnumerable<MemoryRange> GetPhysicalRegions(ulong va, ulong size)
|
|
{
|
|
if (size == 0)
|
|
{
|
|
return Enumerable.Empty<MemoryRange>();
|
|
}
|
|
|
|
return GetPhysicalRegionsImpl(va, size);
|
|
}
|
|
|
|
private List<MemoryRange> GetPhysicalRegionsImpl(ulong va, ulong size)
|
|
{
|
|
if (!ValidateAddress(va) || !ValidateAddressAndSize(va, size))
|
|
{
|
|
return null;
|
|
}
|
|
|
|
int pages = GetPagesCount(va, (uint)size, out va);
|
|
|
|
var regions = new List<MemoryRange>();
|
|
|
|
ulong regionStart = GetPhysicalAddressInternal(va);
|
|
ulong regionSize = PageSize;
|
|
|
|
for (int page = 0; page < pages - 1; page++)
|
|
{
|
|
if (!ValidateAddress(va + PageSize))
|
|
{
|
|
return null;
|
|
}
|
|
|
|
ulong newPa = GetPhysicalAddressInternal(va + PageSize);
|
|
|
|
if (GetPhysicalAddressInternal(va) + PageSize != newPa)
|
|
{
|
|
regions.Add(new MemoryRange(regionStart, regionSize));
|
|
regionStart = newPa;
|
|
regionSize = 0;
|
|
}
|
|
|
|
va += PageSize;
|
|
regionSize += PageSize;
|
|
}
|
|
|
|
regions.Add(new MemoryRange(regionStart, regionSize));
|
|
|
|
return regions;
|
|
}
|
|
|
|
private void ReadImpl(ulong va, Span<byte> data)
|
|
{
|
|
if (data.Length == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
try
|
|
{
|
|
AssertValidAddressAndSize(va, (ulong)data.Length);
|
|
|
|
int offset = 0, size;
|
|
|
|
if ((va & PageMask) != 0)
|
|
{
|
|
ulong pa = GetPhysicalAddressInternal(va);
|
|
|
|
size = Math.Min(data.Length, PageSize - (int)(va & PageMask));
|
|
|
|
_backingMemory.GetSpan(pa, size).CopyTo(data.Slice(0, size));
|
|
|
|
offset += size;
|
|
}
|
|
|
|
for (; offset < data.Length; offset += size)
|
|
{
|
|
ulong pa = GetPhysicalAddressInternal(va + (ulong)offset);
|
|
|
|
size = Math.Min(data.Length - offset, PageSize);
|
|
|
|
_backingMemory.GetSpan(pa, size).CopyTo(data.Slice(offset, size));
|
|
}
|
|
}
|
|
catch (InvalidMemoryRegionException)
|
|
{
|
|
if (_invalidAccessHandler == null || !_invalidAccessHandler(va))
|
|
{
|
|
throw;
|
|
}
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool IsRangeMapped(ulong va, ulong size)
|
|
{
|
|
if (size == 0UL)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
if (!ValidateAddressAndSize(va, size))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
int pages = GetPagesCount(va, (uint)size, out va);
|
|
|
|
for (int page = 0; page < pages; page++)
|
|
{
|
|
if (!IsMapped(va))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
va += PageSize;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
[MethodImpl(MethodImplOptions.AggressiveInlining)]
|
|
public bool IsMapped(ulong va)
|
|
{
|
|
if (!ValidateAddress(va))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
return _pageTable.Read<ulong>((va / PageSize) * PteSize) != 0;
|
|
}
|
|
|
|
private bool ValidateAddress(ulong va)
|
|
{
|
|
return va < _addressSpaceSize;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks if the combination of virtual address and size is part of the addressable space.
|
|
/// </summary>
|
|
/// <param name="va">Virtual address of the range</param>
|
|
/// <param name="size">Size of the range in bytes</param>
|
|
/// <returns>True if the combination of virtual address and size is part of the addressable space</returns>
|
|
private bool ValidateAddressAndSize(ulong va, ulong size)
|
|
{
|
|
ulong endVa = va + size;
|
|
return endVa >= va && endVa >= size && endVa <= _addressSpaceSize;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Ensures the combination of virtual address and size is part of the addressable space.
|
|
/// </summary>
|
|
/// <param name="va">Virtual address of the range</param>
|
|
/// <param name="size">Size of the range in bytes</param>
|
|
/// <exception cref="InvalidMemoryRegionException">Throw when the memory region specified outside the addressable space</exception>
|
|
private void AssertValidAddressAndSize(ulong va, ulong size)
|
|
{
|
|
if (!ValidateAddressAndSize(va, size))
|
|
{
|
|
throw new InvalidMemoryRegionException($"va=0x{va:X16}, size=0x{size:X16}");
|
|
}
|
|
}
|
|
|
|
private ulong GetPhysicalAddress(ulong va)
|
|
{
|
|
// We return -1L if the virtual address is invalid or unmapped.
|
|
if (!ValidateAddress(va) || !IsMapped(va))
|
|
{
|
|
return ulong.MaxValue;
|
|
}
|
|
|
|
return GetPhysicalAddressInternal(va);
|
|
}
|
|
|
|
private ulong GetPhysicalAddressInternal(ulong va)
|
|
{
|
|
return PteToPa(_pageTable.Read<ulong>((va / PageSize) * PteSize) & ~(0xffffUL << 48)) + (va & PageMask);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void TrackingReprotect(ulong va, ulong size, MemoryPermission protection)
|
|
{
|
|
AssertValidAddressAndSize(va, size);
|
|
|
|
// Protection is inverted on software pages, since the default value is 0.
|
|
protection = (~protection) & MemoryPermission.ReadAndWrite;
|
|
|
|
long tag = protection switch
|
|
{
|
|
MemoryPermission.None => 0L,
|
|
MemoryPermission.Write => 2L << PointerTagBit,
|
|
_ => 3L << PointerTagBit
|
|
};
|
|
|
|
int pages = GetPagesCount(va, (uint)size, out va);
|
|
ulong pageStart = va >> PageBits;
|
|
long invTagMask = ~(0xffffL << 48);
|
|
|
|
for (int page = 0; page < pages; page++)
|
|
{
|
|
ref long pageRef = ref _pageTable.GetRef<long>(pageStart * PteSize);
|
|
|
|
long pte;
|
|
|
|
do
|
|
{
|
|
pte = Volatile.Read(ref pageRef);
|
|
}
|
|
while (pte != 0 && Interlocked.CompareExchange(ref pageRef, (pte & invTagMask) | tag, pte) != pte);
|
|
|
|
pageStart++;
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public CpuRegionHandle BeginTracking(ulong address, ulong size, int id)
|
|
{
|
|
return new CpuRegionHandle(Tracking.BeginTracking(address, size, id));
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public CpuMultiRegionHandle BeginGranularTracking(ulong address, ulong size, IEnumerable<IRegionHandle> handles, ulong granularity, int id)
|
|
{
|
|
return new CpuMultiRegionHandle(Tracking.BeginGranularTracking(address, size, handles, granularity, id));
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public CpuSmartMultiRegionHandle BeginSmartGranularTracking(ulong address, ulong size, ulong granularity, int id)
|
|
{
|
|
return new CpuSmartMultiRegionHandle(Tracking.BeginSmartGranularTracking(address, size, granularity, id));
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void SignalMemoryTracking(ulong va, ulong size, bool write, bool precise = false, int? exemptId = null)
|
|
{
|
|
AssertValidAddressAndSize(va, size);
|
|
|
|
if (precise)
|
|
{
|
|
Tracking.VirtualMemoryEvent(va, size, write, precise: true, exemptId);
|
|
return;
|
|
}
|
|
|
|
// We emulate guard pages for software memory access. This makes for an easy transition to
|
|
// tracking using host guard pages in future, but also supporting platforms where this is not possible.
|
|
|
|
// Write tag includes read protection, since we don't have any read actions that aren't performed before write too.
|
|
long tag = (write ? 3L : 1L) << PointerTagBit;
|
|
|
|
int pages = GetPagesCount(va, (uint)size, out _);
|
|
ulong pageStart = va >> PageBits;
|
|
|
|
for (int page = 0; page < pages; page++)
|
|
{
|
|
ref long pageRef = ref _pageTable.GetRef<long>(pageStart * PteSize);
|
|
|
|
long pte;
|
|
|
|
pte = Volatile.Read(ref pageRef);
|
|
|
|
if ((pte & tag) != 0)
|
|
{
|
|
Tracking.VirtualMemoryEvent(va, size, write, precise: false, exemptId);
|
|
break;
|
|
}
|
|
|
|
pageStart++;
|
|
}
|
|
}
|
|
|
|
private ulong PaToPte(ulong pa)
|
|
{
|
|
return (ulong)_backingMemory.GetPointer(pa, PageSize);
|
|
}
|
|
|
|
private ulong PteToPa(ulong pte)
|
|
{
|
|
return (ulong)((long)pte - _backingMemory.Pointer.ToInt64());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Disposes of resources used by the memory manager.
|
|
/// </summary>
|
|
protected override void Destroy() => _pageTable.Dispose();
|
|
|
|
private void ThrowInvalidMemoryRegionException(string message) => throw new InvalidMemoryRegionException(message);
|
|
}
|
|
}
|