From owner-freebsd-stable@freebsd.org Sun Jun 2 12:31:02 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 13A4C15B4923 for ; Sun, 2 Jun 2019 12:31:02 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CE9799698E for ; Sun, 2 Jun 2019 12:31:00 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559478650; bh=YQnqub9ohqE88fUI2FacViuo7wljuoDHtpm9qZb1qEM=; h=X-UI-Sender-Class:Subject:To:References:From:Date:In-Reply-To; b=T/LZ4ksHZliXCfYYI2XEkX1YzqmNXZwqXPBdasxND9PaMFjO5rhArmvjosEIR3+Qb RLuf31YWh/G1vaQ4zFi2+Go1KCl410ZRQft1kYvoi7kh/M+LcgdVfgYqwS4plIH+iN ipdO6eCXfJMkjEBcudzorSuKo175D4IMLCewE4cI= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.20.50] ([84.226.167.60]) by mail.gmx.com (mrgmx001 [212.227.17.190]) with ESMTPSA (Nemesis) id 0Lkwc9-1gyuER0m3B-00aibJ for ; Sun, 02 Jun 2019 14:30:50 +0200 Subject: ps -J0 broken? To: freebsd-stable@freebsd.org References: From: Stefan Hegnauer Openpgp: preference=signencrypt Message-ID: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> Date: Sun, 2 Jun 2019 14:30:49 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-GB X-Provags-ID: V03:K1:RwtcnqaemX88fKZn1zZ7UkhZRhbTxRa92FcsBTO8cVWdTJ5cmS4 n7+YoMpoe8j2Kn8DE9kO7i1fDUbidIkhtEpdSDF32fJXUlyUyXouCD+WNCArlSG4kEoh+Sy CLF6qlU4mfNmX3bkrfq7ikeXMPZBS0hj1Cm356ZiHvekWBbmtwPpZIUxJUgjHsX32h6UJE2 XK/iSTwdB4/DoKiZv3fLA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:v4hQZxsTDC0=:iZcWkWm5lD1Lj79s3Q2JQ3 k/en8T7ShdL60nViEoZXO0SNf3tcY8rGiBe5w6h2Q2b98tS7dnTpR2U94y8EaVMD7sPBWcdow V0aINcrb5uuKOwfXfIgA+8VNNJE02ikZ/e9XqyRylTsxD/SnXV4jvEhjVkZdwntLkxyyWjaNB hT6UqX182gWQSXaoETBLOOWJqhbdyXQIW781NxkXgkX2E9fYLni5NT8eftJFHem433Qqnu7GM V4+6B8SIu7Bx3qAE37QJaIgy95WWn1+P2G9+JJ+OjEid2uFDWHERpWUcE+X9Ok0hRAYlKVaxy 1UvRQOumg4TJhrZsRRKWWPVqhZeK7oEK3uQ/re6S5eQLP+FgaIVcZXuD6tg3NLIyM2ala9spK Dedt3hCnN2lxpwpUTpSbyybvDlEsLu1nW18DEUDumeazSnMYYNzLcC2Mk/UsVb7ICfzYZlWr9 ZMEF0d73IKko5JG6QteIXvuqCYRJcA+W2trO4HIpJheQprioNqyDtmN6pIOIDyGasxa6hxHW5 wirtTV/ql9UFobBcX5VKPj1K44hyX3V5iPdGJnSl+aRNYz2Wloptzafp1sq7HoVr/78qPFewR 9RyA8Tw5G1ZjlwUIpE0WNrWODLedJ3z6OvTMw8c/jHccbqTuQU3CBmbVO84j4uCLh+6OeU8/Z 5ZhdVcExlEEQzDkApODM7DR6HmCA55Of4GjPm9KSb5NFFYLztT4LoZxzzkT+bm36DE7Hi69bz CBNb55zktbvXQuqXREsiepQX1qipaO+iUCa84UYjDwW4WE9+wrHs3OYjEf0FreoMCyP5iyBda lmg5Zk+Fa1hZ8+Yj8LOsPEz334NTDSJxV9iHvlmKYmI9Xy4n13BglUF2op4mlcryuKGsVtgom 2YvJ/WacmbA/HLPSrstg6PFA8uljw6vOFXalYoZQmtmsEoBfdiUPjqWXcCcwRUZ4FU23TiXVh GvxtfiyVlzh7KvqDpUmObsOhyGT3MuabpTeTF4b6FPeUeZLkWyl2P X-Rspamd-Queue-Id: CE9799698E X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=T/LZ4ksH; spf=pass (mx1.freebsd.org: domain of stefan.hegnauer@gmx.ch designates 212.227.15.19 as permitted sender) smtp.mailfrom=stefan.hegnauer@gmx.ch X-Spamd-Result: default: False [-3.31 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:212.227.15.0/25]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; DMARC_NA(0.00)[gmx.ch]; DKIM_TRACE(0.00)[gmx.net:+]; MX_GOOD(-0.01)[mx00.emig.gmx.net,mx01.emig.gmx.net]; RCVD_IN_DNSWL_NONE(0.00)[19.15.227.212.list.dnswl.org : 127.0.3.0]; NEURAL_HAM_SHORT(-0.96)[-0.963,0]; IP_SCORE(-0.84)[ip: (-5.29), ipnet: 212.227.0.0/16(-1.46), asn: 8560(2.57), country: DE(-0.00)]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 12:31:02 -0000 Hi, after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps -J 0' is broken: 'ps: Invalid jail id: 0'. It did work on stable for the last couple years prior to this update (last update without this error was about 5 weeks ago), and should still work according to ps(1): =C2=A0=C2=A0=C2=A0=C2=A0 -J=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Display informat= ion about processes which match the specified =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 j= ail IDs.=C2=A0 This may be either the jid or name of the jail.=C2=A0 **Use** **=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= -J 0 to display only host processes*.*=C2=A0 This flag implies -x by =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 d= efault. My system runs several jails with JID's currently in the range 80-100. The source code of ps did not change for the last 7 month as far as I can tell. A fresh 'make clean & make & make install' of just ps did not help either, which was not really surprising to me. Any pointers where to look further? Thanks Stefan From owner-freebsd-stable@freebsd.org Sun Jun 2 13:05:37 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D720815B544A for ; Sun, 2 Jun 2019 13:05:37 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 28F19977D8 for ; Sun, 2 Jun 2019 13:05:37 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x52D5TK9006463 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 2 Jun 2019 16:05:33 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x52D5TK9006463 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x52D5TYI006461; Sun, 2 Jun 2019 16:05:29 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 2 Jun 2019 16:05:29 +0300 From: Konstantin Belousov To: Stefan Hegnauer Cc: freebsd-stable@freebsd.org Subject: Re: ps -J0 broken? Message-ID: <20190602130529.GF75280@kib.kiev.ua> References: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 13:05:38 -0000 On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: > Hi, > > after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps > -J 0' is broken: 'ps: Invalid jail id: 0'. > It did work on stable for the last couple years prior to this update > (last update without this error was about 5 weeks ago), and should still > work according to ps(1): >      -J      Display information about processes which match the specified >              jail IDs.  This may be either the jid or name of the jail.  > **Use** > **             -J 0 to display only host processes*.*  This flag implies > -x by >              default. > > My system runs several jails with JID's currently in the range 80-100. > The source code of ps did not change for the last 7 month as far as I > can tell. A fresh 'make clean & make & make install' of just ps did not > help either, which was not really surprising to me. > Any pointers where to look further? Is your libjail up to date ? Do you have r348297 ? From owner-freebsd-stable@freebsd.org Sun Jun 2 13:51:12 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 286AE15B61A9 for ; Sun, 2 Jun 2019 13:51:12 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BFF3169C42; Sun, 2 Jun 2019 13:51:11 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-lf1-f51.google.com (mail-lf1-f51.google.com [209.85.167.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id 590EA9377; Sun, 2 Jun 2019 13:51:11 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-lf1-f51.google.com with SMTP id r15so11491960lfm.11; Sun, 02 Jun 2019 06:51:11 -0700 (PDT) X-Gm-Message-State: APjAAAXaV8fXb5usVHHeQbcEifAwveMGGpS0D72pphr6F1U0tHh8LOwC j+NV9MGAZfetb5KSAVWGVW9tBeyAQndVkb+5StA= X-Google-Smtp-Source: APXvYqxbUrX2KpfpMGg2tYJi0H1FIme4R9ZJk0toqjJSMJsL96yEvBh1MG7GuBKBK3IAxGUlG3Y38chulRAlVNDwnn8= X-Received: by 2002:a19:ca0e:: with SMTP id a14mr2600762lfg.19.1559483469895; Sun, 02 Jun 2019 06:51:09 -0700 (PDT) MIME-Version: 1.0 References: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> <20190602130529.GF75280@kib.kiev.ua> In-Reply-To: <20190602130529.GF75280@kib.kiev.ua> From: Kyle Evans Date: Sun, 2 Jun 2019 08:51:21 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: ps -J0 broken? To: Konstantin Belousov Cc: Stefan Hegnauer , FreeBSD-STABLE Mailing List , FreeBSD Release Engineering Team Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: BFF3169C42 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.96 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.956,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 13:51:12 -0000 On Sun, Jun 2, 2019 at 8:05 AM Konstantin Belousov wrote: > > On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: > > Hi, > > > > after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps > > -J 0' is broken: 'ps: Invalid jail id: 0'. > > It did work on stable for the last couple years prior to this update > > (last update without this error was about 5 weeks ago), and should still > > work according to ps(1): > > -J Display information about processes which match the specified > > jail IDs. This may be either the jid or name of the jail. > > **Use** > > ** -J 0 to display only host processes*.* This flag implies > > -x by > > default. > > > > My system runs several jails with JID's currently in the range 80-100. > > The source code of ps did not change for the last 7 month as far as I > > can tell. A fresh 'make clean & make & make install' of just ps did not > > help either, which was not really surprising to me. > > Any pointers where to look further? > Is your libjail up to date ? Do you have r348297 ? kern_jail_get refuses to do lookups for jid=0, presumably because prison 0 is special. I'll commit quick fix- libjail should go back to just return (jid) if jid == 0, because this will always exist. It's a trivial patch, I intend to request permission for immediate MFC to both stable/1{1,2} from re@ because it restores previous working behavior for this. From owner-freebsd-stable@freebsd.org Sun Jun 2 13:54:25 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B594D15B62DE for ; Sun, 2 Jun 2019 13:54:25 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id F0FFC6A09A for ; Sun, 2 Jun 2019 13:54:24 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x52DsHj4017045 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 2 Jun 2019 16:54:20 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x52DsHj4017045 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x52DsHj6017044; Sun, 2 Jun 2019 16:54:17 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 2 Jun 2019 16:54:17 +0300 From: Konstantin Belousov To: Stefan Hegnauer Cc: freebsd-stable@freebsd.org Subject: Re: ps -J0 broken? Message-ID: <20190602135417.GG75280@kib.kiev.ua> References: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> <20190602130529.GF75280@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 13:54:25 -0000 On Sun, Jun 02, 2019 at 03:31:08PM +0200, Stefan Hegnauer wrote: > > > On 02.06.2019 15:05, Konstantin Belousov wrote: > > On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: > >> Hi, > >> > >> after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps > >> -J 0' is broken: 'ps: Invalid jail id: 0'. > >> It did work on stable for the last couple years prior to this update > >> (last update without this error was about 5 weeks ago), and should still > >> work according to ps(1): > >>      -J      Display information about processes which match the specified > >>              jail IDs.  This may be either the jid or name of the jail.  > >> **Use** > >> **             -J 0 to display only host processes*.*  This flag implies > >> -x by > >>              default. > >> > >> My system runs several jails with JID's currently in the range 80-100. > >> The source code of ps did not change for the last 7 month as far as I > >> can tell. A fresh 'make clean & make & make install' of just ps did not > >> help either, which was not really surprising to me. > >> Any pointers where to look further? > > Is your libjail up to date ? Do you have r348297 ? > Thanks for the quick reply. Seems so: > >     # grep FBSDID /usr/src/lib/libjail/jail_getid.c >     __FBSDID("$FreeBSD: stable/12/lib/libjail/jail_getid.c 348297 > 2019-05-27 02:18:33Z kevans $"); >     # >     # ls -l /lib/libjail* >     -r--r--r--  1 root  wheel  31520 May 30 09:12 /lib/libjail.so.1 > > My full update included a 'svnlite up /usr/src' followed by make > buildworld & make kernel and later make installworld as per > /usr/src/UPDATING. To the very letter, as I always do just to be save. I > do however use WITH_META_MODE="YES" in /etc/src-env.conf to speed up > things. Anything else to look for? Yes, rebuild without metamode, and remove your /usr/obj first. From owner-freebsd-stable@freebsd.org Sun Jun 2 13:55:36 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7B90815B636C for ; Sun, 2 Jun 2019 13:55:36 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E3A3F6A15C for ; Sun, 2 Jun 2019 13:55:35 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559483725; bh=Lgz87eQfxfDU9gHTs7pb6fwkST8JTN2monInl2ScREM=; h=X-UI-Sender-Class:Subject:To:Cc:References:From:Date:In-Reply-To; b=PAvQUqlRk41pXK/z4Hxi/TaVtkC8lvPF58kJjDeVuFhmlJJYzctSazqk61UiDoofP 4GYt9fb6Cv74RwlFdAOvOIqG2xJRSjPooOxScTbX74So+QGRI3xojRIOpkDS4oOrux YND2/ahzR0GdNaFAxGMk1Op2XZBcX7Js1W8+7uxM= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.20.50] ([84.226.167.60]) by mail.gmx.com (mrgmx002 [212.227.17.190]) with ESMTPSA (Nemesis) id 0M7Yhz-1gcJFB2VIF-00xK4r; Sun, 02 Jun 2019 15:31:10 +0200 Subject: Re: ps -J0 broken? To: Konstantin Belousov Cc: freebsd-stable@freebsd.org References: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> <20190602130529.GF75280@kib.kiev.ua> From: Stefan Hegnauer Openpgp: preference=signencrypt Message-ID: Date: Sun, 2 Jun 2019 15:31:08 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190602130529.GF75280@kib.kiev.ua> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-GB X-Provags-ID: V03:K1:ra6s467FgD3DiSBV/foFlhuBpiPzHKNftMwfFV6c4lXub4IVQcO pNaP8eKhBh3Ja64BKWq0TYdnGWZHPLiMoStbbTqV42+QQQxavPOI5xOWF2vUbQLPQssznUs zfJEQbZ3GiwJyPOCcVo4OE2SQeN6ej7pnT3Lqh68DX86oLgGvNhNL2FgF6/J4GNpIwFi0lu AJjcf1TYR9FtMY9JpZD0g== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:iHOTt0Bx45k=:1N2au5gwCqsRWEMQ5x0PLc cp1foXCIC9XCqGksKCngBzsRZgzdceqf/tZH05nb1LJC5toIO6abdfyPH6U/GKco3hbWn8wDi 7R/qvsvD6w5EHC7ybNsGHu0MEAvc88wa3pDayVC/9bd18V+glxHl7QSgX9u+/nF5tgSGOejQj zdWl4zNKNtiut/6f+neSkQA+dniVrHZczTgUCDyYBeYDQqp45ZWQibGYV4gaKftWVstkYaduP 0tx1PBCVtEZ+n49Mixhv3KDxeIfOGkn5W9895C2MsZBI6FOUD3UDFuqKg54yAZNFT6dYv6xBn n2sOkdlLuhFwHEB+vx5SNbfLacKEkpZV/KEuYIgNeJC5BUFXNaHYeNVBEFop2Nml7ka7yHP8F USvMOQLXX3VK70Ks1f7P8iraHkDs3/BCY7CRsO2Mq9mobJAJZvzBLJMvc9a42/xtR/R1BN++9 N2B43tXkxgWbKvq4XTuLGg+0MU5LM/02GvBAmRXPQVb5u4iAn52fDppSrGPtbNacalFC4sN4o apoxvm33lc+73OitUQqRhl5lIhaYXCWxALp+ILj9z9i1zT2GMQamIL/ngKX0/64svCTvuQ6cS d+fZBc3KW1I94DOQG2NOdMEdkx9txfT94n3iQGCMt+mtQKBHUiwnBC9R4ysDYsB6D4DyIW3Pd 9et5Tlx60V++j4Sj/cy7h2A8NO1zYi+bhpo4kDJDKhJ/KAgGV1dniemar+dfv+HMJVDU3oAtR w+rmGqbcYAmrOCYnW9T/ATVwSOwy/0YbLdMnekguhGFZ4j0qjLRJcfAQ5bm5Z1PPLll1u0lyd cjcbNVA01hlFrrmWofN71zOuMShvG7/mLOE2s6hqCG1YPVwcP2QM7wkKN6n8CrzCkgKhASTLk 7bWe1CeA6d9ezptnIBnZpAXnFMZ1gHsjsxKYmXgd3eIkKVBz2RXIOi/CW1Tr8s0v2HyvrC7Y/ qrHLU5UUcGnjmL2K2CfSNRxpz1WUIHOZEPPIdFR3mL1N+uGoffcjH X-Rspamd-Queue-Id: E3A3F6A15C X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.978,0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 13:55:36 -0000 On 02.06.2019 15:05, Konstantin Belousov wrote: > On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: >> Hi, >> >> after a recent full update to 12.0-STABLE r348382 it seems that '/bin/p= s >> -J 0' is broken: 'ps: Invalid jail id: 0'. >> It did work on stable for the last couple years prior to this update >> (last update without this error was about 5 weeks ago), and should stil= l >> work according to ps(1): >> =C2=A0=C2=A0=C2=A0=C2=A0 -J=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Display infor= mation about processes which match the specified >> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0 jail IDs.=C2=A0 This may be either the jid or name of the jail.=C2=A0 >> **Use** >> **=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0 -J 0 to display only host processes*.*=C2=A0 This flag implies >> -x by >> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0 default. >> >> My system runs several jails with JID's currently in the range 80-100. >> The source code of ps did not change for the last 7 month as far as I >> can tell. A fresh 'make clean & make & make install' of just ps did not >> help either, which was not really surprising to me. >> Any pointers where to look further? > Is your libjail up to date ? Do you have r348297 ? Thanks for the quick reply. Seems so: =C2=A0=C2=A0=C2=A0 # grep FBSDID /usr/src/lib/libjail/jail_getid.c =C2=A0=C2=A0=C2=A0 __FBSDID("$FreeBSD: stable/12/lib/libjail/jail_getid.c = 348297 2019-05-27 02:18:33Z kevans $"); =C2=A0=C2=A0=C2=A0 # =C2=A0=C2=A0=C2=A0 # ls -l /lib/libjail* =C2=A0=C2=A0=C2=A0 -r--r--r--=C2=A0 1 root=C2=A0 wheel=C2=A0 31520 May 30 = 09:12 /lib/libjail.so.1 My full update included a 'svnlite up /usr/src' followed by make buildworld & make kernel and later make installworld as per /usr/src/UPDATING. To the very letter, as I always do just to be save. I do however use WITH_META_MODE=3D"YES" in /etc/src-env.conf to speed up things. Anything else to look for? From owner-freebsd-stable@freebsd.org Sun Jun 2 14:03:31 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F377215B6838 for ; Sun, 2 Jun 2019 14:03:30 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5DA136A823; Sun, 2 Jun 2019 14:03:29 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559484198; bh=SDdss4Mwf00heY7D1JCewIJfqtODNmP15o56y4e2Hak=; h=X-UI-Sender-Class:Subject:To:Cc:References:From:Date:In-Reply-To; b=KJB4pmfy1uVBJq3H1ssvKAklZXPYBLb12mJyNgp6AqY1MV4xCfpQm1PSWULVudH5j Wk1+o4NicH1CpSdgK4dlSdKUbDEUSNfnJHTeukLpWk8q2DDPKZ1Wj/ui7rKUQco96B mF+WZLwEiqx+L3qNrZVv8UGPDIfXMXngHAFu/7IE= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.20.50] ([84.226.167.60]) by mail.gmx.com (mrgmx003 [212.227.17.190]) with ESMTPSA (Nemesis) id 0MJSQ7-1hYoer1Aap-0036XS; Sun, 02 Jun 2019 16:03:18 +0200 Subject: Re: ps -J0 broken? To: Kyle Evans , Konstantin Belousov Cc: FreeBSD-STABLE Mailing List , FreeBSD Release Engineering Team References: <3e81cb06-853b-c682-5dd2-a40191ae9a72@gmx.ch> <20190602130529.GF75280@kib.kiev.ua> From: Stefan Hegnauer Openpgp: preference=signencrypt Message-ID: Date: Sun, 2 Jun 2019 16:03:17 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-GB X-Provags-ID: V03:K1:hdoBQXqudqpAH59KC/SkI5qS8nLZLInXAUVSTPmKYRQyvM/QHpG +BXyHprA6Xx3Pi/AGBvBDxXn2LPPGNBMnepaIaGAwWy6OZZQoRt62rEQTf4DDk8Iv8xC7bz vPYZ3D3+4V+6SZwSst13bXk159wIrRf6jXD+80IHAC0+RYQSob5iznr8mRG67y6rC/uyBhC 8fOESnjZ4XU525v4DDtaQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:5FWlfShkvtI=:hRIWZAvG7rMyO/+29m80f9 RJo2z4vvrdobXs4VkHBlzYjc2IKtBJgd/oXNb9dDZs/Qo7Zm12q7US94QQLhsDgkE2XNXsaTq KytQ8Fbdlz3FcjxYHY1BBYZMSfAIIb5edEmg0gkOKl8w0L+3rVY24gdZ4Y27qLx3IqG4WqcoA QUueuMDc81Gnp1QwqLKcMUTTEn76DOxyE6p1HPwZy3Bnbw5gUHtk6vCF5xdGPIDKCO9RGw0hO ENJsCCzioyASW5MiD+Y4hAUzNW6z/6ZEjf7pi3RMvudACHTW0uNN06mYiO/wDCxS4yqTvnAQS p+9Kvp8FraICbvUPB79ah++rtoZqczRIO6fpKSD2zrT7jeiq73BhmLzNzy8kybrfXPnMccfxN jsh4vh5KgjXJtu6NvemcRZ+wbZkZk+mgADX6MSPwUA+nW0ZiyzwyF+tSoVX1c7XWwLN+a3UyZ d4XvKKvjlEw4+gAgRd2yoka//XZnYA8fKhL1kg/n1kU17H0bDVxuA8ayT5TsT/YM0S5eBIzO7 DoA28KlpWZXmdYTlyJ6Q3PmMv98fBbQSznzaCTB6DnqjiLCmGVtqZ2aeirQ5Lx2ww8ZhF8X1n umqtu6PSe/K0325YEV92fKnPTsrNW2negn2LAdVUt246CGFGcGZA9/aRXCSGtuc4YxfIMp7K/ UY8sCqtUB5TXi9XvoxCHv+Xx5oUtoE4WmrKJ4YpQ0lKv3DFxU7gGsglIX2dWG8Y60GPM/5fMn 4U4ERpk9MWPjuNOoOCLfq+vDp2dzUopu3LcLEXu71czwM/UMDF01LpqFUZi4ZqUDYlRZrX3Ho zN1hXQu8myQlCcQRunJEg4xr5marJPefw42IEyG1+aabx8kBnMx81c+Dp8/rvMViV2rT5eSDj +K5byfc6KTRFwV2ipLOKjPVwfcP/SgztCFjbo8Uh53FFb57RdLmA+Al72gqvx1z6sB64ZeoE2 Ti5E6uu+nQR2JQwFxFxF3WG4Njv6prI6UaR8VHEWrOoo00NcDGAWn X-Rspamd-Queue-Id: 5DA136A823 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=KJB4pmfy; spf=pass (mx1.freebsd.org: domain of stefan.hegnauer@gmx.ch designates 212.227.15.19 as permitted sender) smtp.mailfrom=stefan.hegnauer@gmx.ch X-Spamd-Result: default: False [-3.10 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+ip4:212.227.15.0/25]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[gmx.ch]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; MX_GOOD(-0.01)[cached: mx00.emig.gmx.net]; RCVD_IN_DNSWL_NONE(0.00)[19.15.227.212.list.dnswl.org : 127.0.3.0]; NEURAL_HAM_SHORT(-0.77)[-0.767,0]; IP_SCORE(-0.82)[ip: (-5.23), ipnet: 212.227.0.0/16(-1.45), asn: 8560(2.57), country: DE(-0.00)]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 14:03:31 -0000 On 02.06.2019 15:51, Kyle Evans wrote: > On Sun, Jun 2, 2019 at 8:05 AM Konstantin Belousov wrote: >> On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: >>> Hi, >>> >>> after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps >>> -J 0' is broken: 'ps: Invalid jail id: 0'. >>> It did work on stable for the last couple years prior to this update >>> (last update without this error was about 5 weeks ago), and should still >>> work according to ps(1): >>> -J Display information about processes which match the specified >>> jail IDs. This may be either the jid or name of the jail. >>> **Use** >>> ** -J 0 to display only host processes*.* This flag implies >>> -x by >>> default. >>> >>> My system runs several jails with JID's currently in the range 80-100. >>> The source code of ps did not change for the last 7 month as far as I >>> can tell. A fresh 'make clean & make & make install' of just ps did not >>> help either, which was not really surprising to me. >>> Any pointers where to look further? >> Is your libjail up to date ? Do you have r348297 ? > kern_jail_get refuses to do lookups for jid=0, presumably because > prison 0 is special. I'll commit quick fix- libjail should go back to > just return (jid) if jid == 0, because this will always exist. It's a > trivial patch, I intend to request permission for immediate MFC to > both stable/1{1,2} from re@ because it restores previous working > behavior for this. Thanks. I will follow up as soon as the patch is in stable/12 and I had a chance to test it. From owner-freebsd-stable@freebsd.org Sun Jun 2 17:49:08 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1168B15BB95C for ; Sun, 2 Jun 2019 17:49:08 +0000 (UTC) (envelope-from leda.chalcraft@yvhillbevsupplier.net) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 77E1271F9E for ; Sun, 2 Jun 2019 17:49:07 +0000 (UTC) (envelope-from leda.chalcraft@yvhillbevsupplier.net) Received: by mailman.ysv.freebsd.org (Postfix) id 36F8F15BB95A; Sun, 2 Jun 2019 17:49:07 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EAC3F15BB959 for ; Sun, 2 Jun 2019 17:49:06 +0000 (UTC) (envelope-from leda.chalcraft@yvhillbevsupplier.net) Received: from mail28c40.carrierzone.com (mail92c40.carrierzone.com [209.235.156.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1189871F9B for ; Sun, 2 Jun 2019 17:49:03 +0000 (UTC) (envelope-from leda.chalcraft@yvhillbevsupplier.net) X-Authenticated-User: leda.chalcraft@yvhillbevsupplier.net DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=carrierzone.com; s=mailmia; t=1559497736; bh=wzQFJRLDEBQkF/d4wvgaJ2PV5R8NBKv/e6epNZxnEsE=; h=From:Subject:Date:To:From; b=2Ky4OyEEZcivmB88/Zqzi+rn+MTpKzM5wRBfYTo/2gaieSHEJr3rkitCaKoO7vMoD DHlglN8bIxQtPHjvLsU4uomAEP1I/aLRXVECxjIZGa8okUetGGxh9abn3Gjtd+J9/r jyFFh2mNyYCM/a8CoITFw1EQZ3qSvcTl9llo65wM= Feedback-ID: leda.chalcraft@ Received: from MARBLES ([209.212.209.50]) (authenticated bits=0) by mail28c40.carrierzone.com (8.14.9/8.14.9) with ESMTP id x52HmKag030152 for ; Sun, 2 Jun 2019 17:48:55 +0000 From: "CreditAIerts" Mime-Version: 1.0 (1.0) Subject: Update(1):Your 3_Scores, Were Just_Changed On: O6/1/2019. Please Check & Confirm. Message #89233575 Message-Id: <037F08CC-32A8-B415-307C-451DD1F87F53@yvhillbevsupplier.net> Date: Sun, 2 Jun 2019 17:48:53 +0000 To: stable@freebsd.org X-Mailer: iPhone Mail (13E238) X-CTCH-RefID: str=0001.0A090205.5CF2C224.000C, ss=4, sh, re=1.750, recu=0.000, reip=0.000, cl=4, cld=1, fgs=8 X-CTCH-VOD: Unknown X-CTCH-Spam: Confirmed X-CTCH-Score: 1.750 X-CTCH-Rules: URG_BIZ, X-CTCH-Flags: 8 X-CTCH-ScoreCust: 0.000 X-CSC: 0 X-CHA: v=2.3 cv=eb0TgYMH c=1 sm=1 tr=0 a=dCNox8+fSg+7FdBVrI09EQ==:117 a=dCNox8+fSg+7FdBVrI09EQ==:17 a=9DvhAHx2yrWFMPxQWpQA:9 a=YpDHvumZAAAA:20 a=opFS_F8gAAAA:20 a=CgBhvZ6nSfxJb-paS2wA:9 a=iidxlashgSBspUd8:21 a=48_vAqfyeyDnOoxf:21 a=QEXdDO2ut3YA:10 a=-FEs8UIgK8oA:10 a=NWVoK91CQyQA:10 a=DzbIY3KOAAAA:20 a=GmYPbzeEAAAA:20 a=I4uxcv9vRyVtdakq:21 a=2byznIIeAyy06UVU:21 a=_wGH-hhDuggJJIBo:21 a=_W_S_7VecoQA:10 a=p-dnK0njbqwfn1k4-x12:22 a=4KUq2TduFPam80r2twQD:22 X-Rspamd-Queue-Id: 1189871F9B X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org; dkim=fail (body hash did not verify) header.d=carrierzone.com header.s=mailmia header.b=2Ky4OyEE; spf=pass (mx1.freebsd.org: domain of leda.chalcraft@yvhillbevsupplier.net designates 209.235.156.232 as permitted sender) smtp.mailfrom=leda.chalcraft@yvhillbevsupplier.net X-Spamd-Result: default: False [4.79 / 15.00]; ARC_NA(0.00)[]; NEURAL_SPAM_SHORT(0.93)[0.930,0]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; R_DKIM_REJECT(1.00)[carrierzone.com:s=mailmia]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; R_SPF_ALLOW(-0.20)[+ip4:209.235.156.128/25]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; NEURAL_SPAM_MEDIUM(0.97)[0.969,0]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_NONE(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[carrierzone.com:-]; MX_GOOD(-0.01)[mx3c40.carrierzone.com,mx2c40.carrierzone.com,mx1c40.carrierzone.com]; DMARC_NA(0.00)[yvhillbevsupplier.net]; NEURAL_SPAM_LONG(1.00)[0.999,0]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[232.156.235.209.list.dnswl.org : 127.0.5.1]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:30447, ipnet:209.235.156.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.80)[ipnet: 209.235.156.0/24(2.38), asn: 30447(1.67), country: US(-0.06)]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 17:49:08 -0000 http://h.tiny.cc/XdnefVcmwpQ http://h.tiny.cc/F3RKD8lwqcR have plastic Hieroglyph Tetracolon thrombopenia Tolsester Thermodin Tungstenic Thomas Hunt Morgan trabeate opposite Thummim Thalassoma T hinge topminnow truck bed music Theocrasy you thinner thermostatics Testes bar sap thyroxine Treasury Secretary Thomas a Becket thousand-fold bay TOPV trade balance talebearing(a) Ta take a chance tip-top table Tamarindus indica clap cordial Trugginghouse try square tibialis posticus trebuchet Todidae thiobacteria Trilith Temporomaxillary rub Airport Turfing test room tuatara tertian Telestic cloak needed topgallant mast Boss insipidity frame that Tel Aviv-Jaffa turkey vulture Acceptance traveller's letter of credit Testudinarious transmissible thalmencephalon snowflake terrene topper Triturus Tractite Termor Tearthumb ugly Temeration textbook Thomas Sydenham trip the light fantastic toe end tawse Threskiornis Tortility time zone tail feather Tribulus theatrical production thyromegaly threshing floor Transvasation scold Torodal no toxaemia ! trilled Turgent slow temporal relation while toxic shock syndrome trolley car Tannigen tidiness squirt use game Tragedious wink Theodolitic trichomoniasis telfer Toshred Thomas Nelson Page Tressured trilled towing path tyrannicide bang Transmutual Tyche tiger beetle glass Technics middleton thermodynamics of equilibrium Transvaal tickweed to begin with Tristram trophy cabin zing restful head granddad Tapetum toss in Tachylyte Tubicolous tuck in egg Translucid train Transferrence thaumatolatry card trichomonad planted tremendous Todo Troco Themselves Traduction typewriter keyboard Tropic of Capricorn Toulouse hay Tummals tubular rope Thoroughsped toddle thermodynamics therapeutics tramp's spurge thickener Thallic trounce Tripoline of Death near ski type metal sooner trough Turdus merula triode take notice Tyrannidae Tiberius Claudius Nero Caesar Augustus Tendry Tenderhefted humoured tropics tuck in three-ply Talmudistic Tetrahedrally cloud thyroidal decision broom short loo! k terpene Tegmen Torrefy tendergreen true bacteria taillight speak Turgenev brig position ripe Tergiversator Transprint rough Trichomanes tailless tenrec tawny owl pleasure Drink tedious Tertiary Taiwanese torquated Trouvère every traveller's joy Tambocor trivalent way twin(a) bright Transcalent shade frill type species travel guidebook two-way Tributarily Tulipomania hang two-seater thumping gobble tournedos Thrapple soup throw tourer Thomas Wolfe foal thermostatics tenantry Tricholoma aurantium Thomson turn a trick Trionyx muticus teetotal clerk tartlet tabular array Tentaculocyst tank circuit he Tithly Taxus brevifolia Map grain Tetanization trial balance Tertiary period tile cutter Tragelaphus angasi edge Thornton Niven Wilder Stomach tv continual writing towrope lap Tulostomataceae tolu tree village tater trusted Takilman tomato fruitworm fowl Tulsa low Trugginghouse theory of games about fire trey triad touchback telocentric Trinketer turn a blind eye lump tappa formerly thighbone taboo Tystie trypsin clay taloned thorium-228 Toynbee Tim Tenebrificous Tarahumar! a two-handed top executive through empirical observation Tutsi table-tennis table Tubulation tester Tenuiroster Terrel tumbler tight Taoist twirl Toxicodendron diversilobum Tricrotic fade tape drive Triobolar talker temperature reduction tumefaction Tripartient tub gurnard Trichoceros Tupaiid thyroid gland offering Thermobattery Typothetæ teletypewriter transnational toad lily blot Tobacconing Tachygraphy theatre ticket neck perhaps different Topsoiling door point Tæniasis digestion lasted Transflux way Trangram dope theatrical performance takeover bid shipwreck Tinet third gear Tennessee Williams tape deck traveler's check Tintamar thermocautery telco titillation Togolese tetartanopia Trueblue boo spent turn around tetravalent heel Girl rink theory travelling Triable tenia Taurotragus derbianus torch song tail-flower Thomas Robert Malthus transsexual(a) Trichostema lanceolatum tropicbird Thiocarbonate trial-and-error My trisodium orthophosphate From owner-freebsd-stable@freebsd.org Mon Jun 3 09:53:38 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5C6CA15AABBF for ; Mon, 3 Jun 2019 09:53:38 +0000 (UTC) (envelope-from janm@transactionware.com) Received: from hermod.tmst.com.au (hermod.tmst.com.au [203.14.245.41]) by mx1.freebsd.org (Postfix) with SMTP id 2B29D6FDD6 for ; Mon, 3 Jun 2019 09:53:30 +0000 (UTC) (envelope-from janm@transactionware.com) Received: (qmail 97016 invoked by uid 907); 3 Jun 2019 09:53:21 -0000 Received: from p54B73A18.dip0.t-ipconnect.de (HELO [192.168.7.2]) (84.183.58.24) by hermod.tmst.com.au (qpsmtpd/0.96) with ESMTPSA (ECDHE-RSA-AES256-GCM-SHA384 encrypted); Mon, 03 Jun 2019 19:53:21 +1000 Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: efirtc causing panic (was Re: Panic booting 12-RC2 on amd64) From: Jan Martin Mikkelsen In-Reply-To: <20190531183519.GF27392@kib.kiev.ua> Date: Mon, 3 Jun 2019 11:53:12 +0200 Cc: Christian Ullrich , FreeBSD-STABLE Mailing List Content-Transfer-Encoding: quoted-printable Message-Id: References: <6e985fa2-c372-67ef-1cd5-dd8894cca908@chrullrich.net> <187B6A1E-5C61-415A-A9F2-B4E3142375C7@transactionware.com> <7E738A9B-A0B6-49D3-86A8-8E2F9ED8A098@transactionware.com> <20190531183519.GF27392@kib.kiev.ua> To: Konstantin Belousov X-Mailer: Apple Mail (2.3445.9.1) X-Rspamd-Queue-Id: 2B29D6FDD6 X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [1.35 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.14)[-0.138,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[transactionware.com]; AUTH_NA(1.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[a.mx.transactionware.com]; NEURAL_SPAM_LONG(0.00)[0.001,0]; NEURAL_HAM_SHORT(-0.01)[-0.007,0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:17559, ipnet:203.14.245.0/24, country:AU]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.00)[country: AU(0.01)] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 09:53:38 -0000 Hi, This patch resolves the panic when booting without efi.rt.disabled=3D1 = for me. Thanks! Jan M. > On 31 May 2019, at 20:35, Konstantin Belousov wrote: >=20 > On Fri, May 31, 2019 at 04:19:57PM +0200, Jan Martin Mikkelsen wrote: >> Hi, >>=20 >> Christian has pointed me at this = https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233534 which he = raised after his email. The workaround was to boot with = =E2=80=9Cefi.rt.disabled=3D1=E2=80=9D.=20 >>=20 >> I took a closer look at what is going on. The problem is that the EFI = rt_gettime call is faulting, and the fault is handled in efirt_support.S = and a failure is reported. These messages is in the kernel output: >>=20 >> kernel trap 12 with interrupts disabled >> kernel trap 12 with interrupts disabled >> EFI rt_gettime call faulted, error 14 >> efirtc0: cannot read EFI realtime clock, error 14 >>=20 >> So far, so good. The problem is that that later in startup the = "smp_targeted_tlb_shootdown: interrupts disabled=E2=80=9D panic occurs, = if the SMP is enabled. With SMP disabled this does not occur and the = system runs. >>=20 >> I=E2=80=99m not sure whether this is a BIOS problem (seems likely) or = something that could handled after dealing with the fault in = efirt_support.S. >>=20 >> While looking I found the code below that looks wrong in efi_enter(), = but that is not the problem in this case. >>=20 >> Just adding this to the archive in case someone else looks more = closely later. >=20 > Try this. Only compile-time tested. >=20 > diff --git a/sys/amd64/amd64/efirt_support.S = b/sys/amd64/amd64/efirt_support.S > index cd578eddcfb..b54b13b01fe 100644 > --- a/sys/amd64/amd64/efirt_support.S > +++ b/sys/amd64/amd64/efirt_support.S > @@ -47,6 +47,9 @@ ENTRY(efi_rt_arch_call) > movq %r13, EC_R13(%rdi) > movq %r14, EC_R14(%rdi) > movq %r15, EC_R15(%rdi) > + pushfq > + popq %rax > + movq %rax, EC_RFLAGS(%rdi) > movq PCPU(CURTHREAD), %rax > movq %rdi, TD_MD+MD_EFIRT_TMP(%rax) > movq PCPU(CURPCB), %rsi > @@ -98,6 +101,8 @@ efi_rt_arch_call_tail: > movq EC_RBP(%rdi), %rbp > movq EC_RSP(%rdi), %rsp > movq EC_RBX(%rdi), %rbx > + pushq EC_RFLAGS(%rdi) > + popfq >=20 > popq %rbp > ret > diff --git a/sys/amd64/amd64/genassym.c b/sys/amd64/amd64/genassym.c > index de3969734a1..2e81b823262 100644 > --- a/sys/amd64/amd64/genassym.c > +++ b/sys/amd64/amd64/genassym.c > @@ -272,3 +272,4 @@ ASSYM(EC_R12, offsetof(struct efirt_callinfo, = ec_r12)); > ASSYM(EC_R13, offsetof(struct efirt_callinfo, ec_r13)); > ASSYM(EC_R14, offsetof(struct efirt_callinfo, ec_r14)); > ASSYM(EC_R15, offsetof(struct efirt_callinfo, ec_r15)); > +ASSYM(EC_RFLAGS, offsetof(struct efirt_callinfo, ec_rflags)); > diff --git a/sys/amd64/include/efi.h b/sys/amd64/include/efi.h > index 082223792ac..e630a338c17 100644 > --- a/sys/amd64/include/efi.h > +++ b/sys/amd64/include/efi.h > @@ -72,6 +72,7 @@ struct efirt_callinfo { > register_t ec_r13; > register_t ec_r14; > register_t ec_r15; > + register_t ec_rflags; > }; >=20 > #endif /* __AMD64_INCLUDE_EFI_H_ */ > _______________________________________________ > freebsd-stable@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-stable > To unsubscribe, send any mail to = "freebsd-stable-unsubscribe@freebsd.org" From owner-freebsd-stable@freebsd.org Mon Jun 3 10:35:54 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 425BA15ABF7B for ; Mon, 3 Jun 2019 10:35:54 +0000 (UTC) (envelope-from dmitryluhtionov@gmail.com) Received: from mail-oi1-x243.google.com (mail-oi1-x243.google.com [IPv6:2607:f8b0:4864:20::243]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48345712D7; Mon, 3 Jun 2019 10:35:53 +0000 (UTC) (envelope-from dmitryluhtionov@gmail.com) Received: by mail-oi1-x243.google.com with SMTP id s184so1397825oie.9; Mon, 03 Jun 2019 03:35:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=obzFkUhiKvqeWa5OkrqRJrmoLEzAa+DAt/fLTQnlOP0=; b=X++dze8ejWpVjEM1216E2OSCKZKuz5lYgxjZQ+GEmkk7s7nTSwy3P43hci9UtCzoWx Nod+4bS2Vg38zHmxiGpdG+/Wbtwkb6jppxIR2+NUYnYjzWhiNOnlaqf9oM3jy5GdlEH+ Qel011nYeypbRWBHZYNxMpfTIj3rGVnGimcRA9cS1RTLTUuSu25+IlsKWSOprdVX6f8a ZYVaqE2Qn8FeckMBc5jRtITIjlP1MUTY8+I0mS1PqV5tm4UTqjnGc6M+9x3NolYBTEgX 9S8vOiK7SPYX2ef0lWatucQXfItZ4ooleLc239w99gJvvUuaTFdTE1cMRHjVkmAxrtS4 rl+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=obzFkUhiKvqeWa5OkrqRJrmoLEzAa+DAt/fLTQnlOP0=; b=Gfb/gvMCQi/6Wxf1wSs/WGgw+Lo42Wxkt86E2IZui/C8ha/bvCRD0H2VuTdW69pF3w 8YocXaq5AKjd3/4mc13kyMZO9ST3qjy5c/WwSpafEz/sWYM6SHeP2GKkx+Ohxz02Fws3 K+5juWvdRAtDzQClX6BBvAnU6ipLMm86QThuUPLzeFEq50gdOht9hcfI8xYPyLc7hhd1 jqA3RXdjldNzQ6aHLUM64A2UroUEbhSJJ0Tk6OFbfG611Y6MveiqMPE/Atzw1i7W5B2L ZZRQyZJ3DpLufoleHwc+1EDvp6eVNmodOizO19ktUR8xPeq1SpUTPREQTeOSTxOJdEXo Rrcw== X-Gm-Message-State: APjAAAUc3W8NneNLG77ZqmR3kT8QG9XQkCJqiROMmRVJhq5lR5+uYVhs T/XwFUhd+paUs2yjF0aqkl+HWbvKYsg7C3wM4saayCviYWw= X-Google-Smtp-Source: APXvYqxTgtzO4kN5nGxzA6bYNOzPbfdYMfNVH7Bxc2ZH8q6GsYqj+98j9217o+JWebTDj5iujusRff96bSCR+Qo0BmI= X-Received: by 2002:aca:5c54:: with SMTP id q81mr522322oib.91.1559558152289; Mon, 03 Jun 2019 03:35:52 -0700 (PDT) MIME-Version: 1.0 From: Dmitry Luhtionov Date: Mon, 3 Jun 2019 13:35:41 +0300 Message-ID: Subject: 12.0-STABLE r348528 GENERIC amd64 when loading i915kms.ko To: freebsd-stable@freebsd.org, Kostik Belousov Content-Type: multipart/mixed; boundary="000000000000acac63058a68ed8e" X-Rspamd-Queue-Id: 48345712D7 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=X++dze8e; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of dmitryluhtionov@gmail.com designates 2607:f8b0:4864:20::243 as permitted sender) smtp.mailfrom=dmitryluhtionov@gmail.com X-Spamd-Result: default: False [-4.47 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.10)[multipart/mixed,multipart/alternative,text/plain]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.78)[-0.777,0]; RCVD_TLS_LAST(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[3.4.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(-0.69)[ip: (2.16), ipnet: 2607:f8b0::/32(-3.26), asn: 15169(-2.28), country: US(-0.06)]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 10:35:55 -0000 --000000000000acac63058a68ed8e Content-Type: text/plain; charset="UTF-8" <118>Loading kernel modules: sysctl_warn_reuse: can't re-use a leaf (compat.linuxkpi.debug)! drmn0: on vgapci0 vgapci0: child drmn0 requested pci_enable_io vgapci0: child drmn0 requested pci_enable_io <5>[drm] Unable to create a private tmpfs mount, hugepage support will be disabled(-19). <4>Successfully added WC MTRR for [0x90000000-0x9fffffff]: 0; <6>[drm] Got stolen memory base 0x88000000, size 0x8000000 <6>[drm] Supports vblank timestamp caching Rev 2 (21.10.2013). <6>[drm] Driver supports precise vblank timestamp query. <6>[drm] Connector HDMI-A-1: get mode from tunables: <6>[drm] - kern.vt.fb.modes.HDMI-A-1 <6>[drm] - kern.vt.fb.default_mode <6>[drm] Connector HDMI-A-2: get mode from tunables: <6>[drm] - kern.vt.fb.modes.HDMI-A-2 <6>[drm] - kern.vt.fb.default_mode <6>[drm] Connector DP-1: get mode from tunables: <6>[drm] - kern.vt.fb.modes.DP-1 <6>[drm] - kern.vt.fb.default_mode Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x1 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff8357184f stack pointer = 0x28:0xffffffff826b7810 frame pointer = 0x28:0xffffffff826b7880 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 0 (softirq_0) trap number = 12 panic: page fault cpuid = 0 time = 1559568100 KDB: stack backtrace: #0 0xffffffff80c16df7 at kdb_backtrace+0x67 #1 0xffffffff80bcaccd at vpanic+0x19d #2 0xffffffff80bcab23 at panic+0x43 #3 0xffffffff810a7574 at trap_fatal+0x394 #4 0xffffffff810a75d9 at trap_pfault+0x49 #5 0xffffffff810a6bbf at trap+0x29f #6 0xffffffff81081ca5 at calltrap+0x8 #7 0xffffffff834a4460 at tasklet_handler+0x100 #8 0xffffffff80c156c4 at gtaskqueue_run_locked+0x144 #9 0xffffffff80c15328 at gtaskqueue_thread_loop+0x98 #10 0xffffffff80b8b813 at fork_exit+0x83 #11 0xffffffff81082c9e at fork_trampoline+0xe Uptime: 5s --000000000000acac63058a68ed8e Content-Type: application/octet-stream; name="core.txt.1" Content-Disposition: attachment; filename="core.txt.1" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_jwg8kk100 bTE4LmNhYmxldHYuZHAudWEgZHVtcGVkIGNvcmUgLSBzZWUgL3Zhci9jcmFzaC92bWNvcmUuMQoK TW9uIEp1biAgMyAxMzoyMjozNCBFRVNUIDIwMTkKCkZyZWVCU0QgbTE4LmNhYmxldHYuZHAudWEg MTIuMC1TVEFCTEUgRnJlZUJTRCAxMi4wLVNUQUJMRSByMzQ4NTI4IEdFTkVSSUMgIGFtZDY0Cgpw YW5pYzogcGFnZSBmYXVsdAoKR05VIGdkYiA2LjEuMSBbRnJlZUJTRF0KQ29weXJpZ2h0IDIwMDQg RnJlZSBTb2Z0d2FyZSBGb3VuZGF0aW9uLCBJbmMuCkdEQiBpcyBmcmVlIHNvZnR3YXJlLCBjb3Zl cmVkIGJ5IHRoZSBHTlUgR2VuZXJhbCBQdWJsaWMgTGljZW5zZSwgYW5kIHlvdSBhcmUKd2VsY29t ZSB0byBjaGFuZ2UgaXQgYW5kL29yIGRpc3RyaWJ1dGUgY29waWVzIG9mIGl0IHVuZGVyIGNlcnRh aW4gY29uZGl0aW9ucy4KVHlwZSAic2hvdyBjb3B5aW5nIiB0byBzZWUgdGhlIGNvbmRpdGlvbnMu ClRoZXJlIGlzIGFic29sdXRlbHkgbm8gd2FycmFudHkgZm9yIEdEQi4gIFR5cGUgInNob3cgd2Fy cmFudHkiIGZvciBkZXRhaWxzLgpUaGlzIEdEQiB3YXMgY29uZmlndXJlZCBhcyAiYW1kNjQtbWFy Y2VsLWZyZWVic2QiLi4uCgpVbnJlYWQgcG9ydGlvbiBvZiB0aGUga2VybmVsIG1lc3NhZ2UgYnVm ZmVyOgotLS08PEJPT1Q+Pi0tLQpDb3B5cmlnaHQgKGMpIDE5OTItMjAxOSBUaGUgRnJlZUJTRCBQ cm9qZWN0LgpDb3B5cmlnaHQgKGMpIDE5NzksIDE5ODAsIDE5ODMsIDE5ODYsIDE5ODgsIDE5ODks IDE5OTEsIDE5OTIsIDE5OTMsIDE5OTQKCVRoZSBSZWdlbnRzIG9mIHRoZSBVbml2ZXJzaXR5IG9m IENhbGlmb3JuaWEuIEFsbCByaWdodHMgcmVzZXJ2ZWQuCkZyZWVCU0QgaXMgYSByZWdpc3RlcmVk IHRyYWRlbWFyayBvZiBUaGUgRnJlZUJTRCBGb3VuZGF0aW9uLgpGcmVlQlNEIDEyLjAtU1RBQkxF IHIzNDg1MjggR0VORVJJQyBhbWQ2NApGcmVlQlNEIGNsYW5nIHZlcnNpb24gOC4wLjAgKHRhZ3Mv UkVMRUFTRV84MDAvZmluYWwgMzU2MzY1KSAoYmFzZWQgb24gTExWTSA4LjAuMCkKVlQodmdhKTog cmVzb2x1dGlvbiA2NDB4NDgwCkNQVSBtaWNyb2NvZGU6IHVwZGF0ZWQgZnJvbSAweDlhIHRvIDB4 YjQKQ1BVOiBJbnRlbChSKSBDb3JlKFRNKSBpNS04NDAwIENQVSBAIDIuODBHSHogKDI4MDguMjEt TUh6IEs4LWNsYXNzIENQVSkKICBPcmlnaW49IkdlbnVpbmVJbnRlbCIgIElkPTB4OTA2ZWEgIEZh bWlseT0weDYgIE1vZGVsPTB4OWUgIFN0ZXBwaW5nPTEwCiAgRmVhdHVyZXM9MHhiZmViZmJmZjxG UFUsVk1FLERFLFBTRSxUU0MsTVNSLFBBRSxNQ0UsQ1g4LEFQSUMsU0VQLE1UUlIsUEdFLE1DQSxD TU9WLFBBVCxQU0UzNixDTEZMVVNILERUUyxBQ1BJLE1NWCxGWFNSLFNTRSxTU0UyLFNTLEhUVCxU TSxQQkU+CiAgRmVhdHVyZXMyPTB4N2ZmYWZiYmY8U1NFMyxQQ0xNVUxRRFEsRFRFUzY0LE1PTixE U19DUEwsVk1YLEVTVCxUTTIsU1NTRTMsU0RCRyxGTUEsQ1gxNix4VFBSLFBEQ00sUENJRCxTU0U0 LjEsU1NFNC4yLHgyQVBJQyxNT1ZCRSxQT1BDTlQsVFNDRExULEFFU05JLFhTQVZFLE9TWFNBVkUs QVZYLEYxNkMsUkRSQU5EPgogIEFNRCBGZWF0dXJlcz0weDJjMTAwODAwPFNZU0NBTEwsTlgsUGFn ZTFHQixSRFRTQ1AsTE0+CiAgQU1EIEZlYXR1cmVzMj0weDEyMTxMQUhGLEFCTSxQcmVmZXRjaD4K ICBTdHJ1Y3R1cmVkIEV4dGVuZGVkIEZlYXR1cmVzPTB4MjljNjdhZjxGU0dTQkFTRSxUU0NBREos U0dYLEJNSTEsQVZYMixTTUVQLEJNSTIsRVJNUyxJTlZQQ0lELE5GUFVTRyxNUFgsUkRTRUVELEFE WCxTTUFQLENMRkxVU0hPUFQsUFJPQ1RSQUNFPgogIFN0cnVjdHVyZWQgRXh0ZW5kZWQgRmVhdHVy ZXMyPTB4NDAwMDAwMDA8U0dYTEM+CiAgU3RydWN0dXJlZCBFeHRlbmRlZCBGZWF0dXJlczM9MHg5 YzAwMjQwMDxNRF9DTEVBUixUU1hGQSxJQlBCLFNUSUJQLEwxREZMLFNTQkQ+CiAgWFNBVkUgRmVh dHVyZXM9MHhmPFhTQVZFT1BULFhTQVZFQyxYSU5VU0UsWFNBVkVTPgogIFZULXg6IFBBVCxITFQs TVRGLFBBVVNFLEVQVCxVRyxWUElECiAgVFNDOiBQLXN0YXRlIGludmFyaWFudCwgcGVyZm9ybWFu Y2Ugc3RhdGlzdGljcwpyZWFsIG1lbW9yeSAgPSAxNzE3OTg2OTE4NCAoMTYzODQgTUIpCmF2YWls IG1lbW9yeSA9IDE2MzYxNTY2MjA4ICgxNTYwMyBNQikKRXZlbnQgdGltZXIgIkxBUElDIiBxdWFs aXR5IDYwMApBQ1BJIEFQSUMgVGFibGU6IDxBTEFTS0EgQSBNIEkgPgpGcmVlQlNEL1NNUDogTXVs dGlwcm9jZXNzb3IgU3lzdGVtIERldGVjdGVkOiA2IENQVXMKRnJlZUJTRC9TTVA6IDEgcGFja2Fn ZShzKSB4IDYgY29yZShzKQpyYW5kb206IHVuYmxvY2tpbmcgZGV2aWNlLgppb2FwaWMwIDxWZXJz aW9uIDIuMD4gaXJxcyAwLTExOSBvbiBtb3RoZXJib2FyZApMYXVuY2hpbmcgQVBzOiAxIDQgNSAz IDIKVGltZWNvdW50ZXIgIlRTQy1sb3ciIGZyZXF1ZW5jeSAxNDA0MTA3MzQ2IEh6IHF1YWxpdHkg MTAwMApyYW5kb206IGVudHJvcHkgZGV2aWNlIGV4dGVybmFsIGludGVyZmFjZQowMDAuMDAwMDE3 IFs0MjU0XSBuZXRtYXBfaW5pdCAgICAgICAgICAgICAgIG5ldG1hcDogbG9hZGVkIG1vZHVsZQpb YXRoX2hhbF0gbG9hZGVkCm1vZHVsZV9yZWdpc3Rlcl9pbml0OiBNT0RfTE9BRCAodmVzYSwgMHhm ZmZmZmZmZjgxMTJkNzQwLCAwKSBlcnJvciAxOQpyYW5kb206IHJlZ2lzdGVyaW5nIGZhc3Qgc291 cmNlIEludGVsIFNlY3VyZSBLZXkgUk5HCnJhbmRvbTogZmFzdCBwcm92aWRlcjogIkludGVsIFNl Y3VyZSBLZXkgUk5HIgprYmQxIGF0IGtiZG11eDAKbmV4dXMwCnZ0dmdhMDogPFZUIFZHQSBkcml2 ZXI+IG9uIG1vdGhlcmJvYXJkCmNyeXB0b3NvZnQwOiA8c29mdHdhcmUgY3J5cHRvPiBvbiBtb3Ro ZXJib2FyZAphZXNuaTA6IDxBRVMtQ0JDLEFFUy1YVFMsQUVTLUdDTSxBRVMtSUNNPiBvbiBtb3Ro ZXJib2FyZAphY3BpMDogPEFMQVNLQSBBIE0gSSA+IG9uIG1vdGhlcmJvYXJkCmFjcGkwOiBQb3dl ciBCdXR0b24gKGZpeGVkKQpjcHUwOiA8QUNQSSBDUFU+IG9uIGFjcGkwCmhwZXQwOiA8SGlnaCBQ cmVjaXNpb24gRXZlbnQgVGltZXI+IGlvbWVtIDB4ZmVkMDAwMDAtMHhmZWQwMDNmZiBvbiBhY3Bp MApUaW1lY291bnRlciAiSFBFVCIgZnJlcXVlbmN5IDI0MDAwMDAwIEh6IHF1YWxpdHkgOTUwCkV2 ZW50IHRpbWVyICJIUEVUIiBmcmVxdWVuY3kgMjQwMDAwMDAgSHogcXVhbGl0eSA1NTAKRXZlbnQg dGltZXIgIkhQRVQxIiBmcmVxdWVuY3kgMjQwMDAwMDAgSHogcXVhbGl0eSA0NDAKRXZlbnQgdGlt ZXIgIkhQRVQyIiBmcmVxdWVuY3kgMjQwMDAwMDAgSHogcXVhbGl0eSA0NDAKYXR0aW1lcjA6IDxB VCB0aW1lcj4gcG9ydCAweDQwLTB4NDMsMHg1MC0weDUzIGlycSAwIG9uIGFjcGkwClRpbWVjb3Vu dGVyICJpODI1NCIgZnJlcXVlbmN5IDExOTMxODIgSHogcXVhbGl0eSAwCkV2ZW50IHRpbWVyICJp ODI1NCIgZnJlcXVlbmN5IDExOTMxODIgSHogcXVhbGl0eSAxMDAKVGltZWNvdW50ZXIgIkFDUEkt ZmFzdCIgZnJlcXVlbmN5IDM1Nzk1NDUgSHogcXVhbGl0eSA5MDAKYWNwaV90aW1lcjA6IDwyNC1i aXQgdGltZXIgYXQgMy41Nzk1NDVNSHo+IHBvcnQgMHgxODA4LTB4MTgwYiBvbiBhY3BpMApwY2li MDogPEFDUEkgSG9zdC1QQ0kgYnJpZGdlPiBwb3J0IDB4Y2Y4LTB4Y2ZmIG9uIGFjcGkwCnBjaTA6 IDxBQ1BJIFBDSSBidXM+IG9uIHBjaWIwCnZnYXBjaTA6IDxWR0EtY29tcGF0aWJsZSBkaXNwbGF5 PiBwb3J0IDB4NjAwMC0weDYwM2YgbWVtIDB4YTAwMDAwMDAtMHhhMGZmZmZmZiwweDkwMDAwMDAw LTB4OWZmZmZmZmYgaXJxIDE2IGF0IGRldmljZSAyLjAgb24gcGNpMAp2Z2FwY2kwOiBCb290IHZp ZGVvIGRldmljZQp4aGNpMDogPFhIQ0kgKGdlbmVyaWMpIFVTQiAzLjAgY29udHJvbGxlcj4gbWVt IDB4NDAwMDEwMDAwMC0weDQwMDAxMGZmZmYgaXJxIDE2IGF0IGRldmljZSAyMC4wIG9uIHBjaTAK eGhjaTA6IDMyIGJ5dGVzIGNvbnRleHQgc2l6ZSwgNjQtYml0IERNQQp1c2J1czAgb24geGhjaTAK dXNidXMwOiA1LjBHYnBzIFN1cGVyIFNwZWVkIFVTQiB2My4wCnBjaTA6IDxtZW1vcnksIFJBTT4g YXQgZGV2aWNlIDIwLjIgKG5vIGRyaXZlciBhdHRhY2hlZCkKcGNpMDogPHNpbXBsZSBjb21tcz4g YXQgZGV2aWNlIDIyLjAgKG5vIGRyaXZlciBhdHRhY2hlZCkKYWhjaTA6IDxJbnRlbCBDYW5ub24g TGFrZSBBSENJIFNBVEEgY29udHJvbGxlcj4gcG9ydCAweDYwOTAtMHg2MDk3LDB4NjA4MC0weDYw ODMsMHg2MDYwLTB4NjA3ZiBtZW0gMHhhMTMwMDAwMC0weGExMzAxZmZmLDB4YTEzMDMwMDAtMHhh MTMwMzBmZiwweGExMzAyMDAwLTB4YTEzMDI3ZmYgaXJxIDE2IGF0IGRldmljZSAyMy4wIG9uIHBj aTAKYWhjaTA6IEFIQ0kgdjEuMzEgd2l0aCA2IDZHYnBzIHBvcnRzLCBQb3J0IE11bHRpcGxpZXIg bm90IHN1cHBvcnRlZAphaGNpY2gwOiA8QUhDSSBjaGFubmVsPiBhdCBjaGFubmVsIDAgb24gYWhj aTAKYWhjaWNoMTogPEFIQ0kgY2hhbm5lbD4gYXQgY2hhbm5lbCAxIG9uIGFoY2kwCmFoY2ljaDI6 IDxBSENJIGNoYW5uZWw+IGF0IGNoYW5uZWwgMiBvbiBhaGNpMAphaGNpY2gzOiA8QUhDSSBjaGFu bmVsPiBhdCBjaGFubmVsIDMgb24gYWhjaTAKYWhjaWNoNDogPEFIQ0kgY2hhbm5lbD4gYXQgY2hh bm5lbCA0IG9uIGFoY2kwCmFoY2ljaDU6IDxBSENJIGNoYW5uZWw+IGF0IGNoYW5uZWwgNSBvbiBh aGNpMAphaGNpZW0wOiA8QUhDSSBlbmNsb3N1cmUgbWFuYWdlbWVudCBicmlkZ2U+IG9uIGFoY2kw CnBjaWIxOiA8QUNQSSBQQ0ktUENJIGJyaWRnZT4gYXQgZGV2aWNlIDI3LjAgb24gcGNpMApwY2li MTogW0dJQU5ULUxPQ0tFRF0KcGNpYjI6IDxBQ1BJIFBDSS1QQ0kgYnJpZGdlPiBpcnEgMTYgYXQg ZGV2aWNlIDI4LjAgb24gcGNpMApwY2kxOiA8QUNQSSBQQ0kgYnVzPiBvbiBwY2liMgpwY2kxOiA8 bmV0d29yaz4gYXQgZGV2aWNlIDAuMCAobm8gZHJpdmVyIGF0dGFjaGVkKQpwY2liMzogPEFDUEkg UENJLVBDSSBicmlkZ2U+IGlycSAxOSBhdCBkZXZpY2UgMjguNyBvbiBwY2kwCnBjaTI6IDxBQ1BJ IFBDSSBidXM+IG9uIHBjaWIzCnJlMDogPFJlYWxUZWsgODE2OC84MTExIEIvQy9DUC9EL0RQL0Uv Ri9HIFBDSWUgR2lnYWJpdCBFdGhlcm5ldD4gcG9ydCAweDQwMDAtMHg0MGZmIG1lbSAweGExMTA0 MDAwLTB4YTExMDRmZmYsMHhhMTEwMDAwMC0weGExMTAzZmZmIGlycSAxOSBhdCBkZXZpY2UgMC4w IG9uIHBjaTIKcmUwOiBVc2luZyAxIE1TSS1YIG1lc3NhZ2UKcmUwOiBBU1BNIGRpc2FibGVkCnJl MDogQ2hpcCByZXYuIDB4NTQwMDAwMDAKcmUwOiBNQUMgcmV2LiAweDAwMTAwMDAwCm1paWJ1czA6 IDxNSUkgYnVzPiBvbiByZTAKcmdlcGh5MDogPFJUTDgyNTEvODE1MyAxMDAwQkFTRS1UIG1lZGlh IGludGVyZmFjZT4gUEhZIDEgb24gbWlpYnVzMApyZ2VwaHkwOiAgbm9uZSwgMTBiYXNlVCwgMTBi YXNlVC1GRFgsIDEwYmFzZVQtRkRYLWZsb3csIDEwMGJhc2VUWCwgMTAwYmFzZVRYLUZEWCwgMTAw YmFzZVRYLUZEWC1mbG93LCAxMDAwYmFzZVQtRkRYLCAxMDAwYmFzZVQtRkRYLW1hc3RlciwgMTAw MGJhc2VULUZEWC1mbG93LCAxMDAwYmFzZVQtRkRYLWZsb3ctbWFzdGVyLCBhdXRvLCBhdXRvLWZs b3cKPDY+cmUwOiBVc2luZyBkZWZhdWx0cyBmb3IgVFNPOiA2NTUxOC8zNS8yMDQ4Cjw2PnJlMDog RXRoZXJuZXQgYWRkcmVzczogNDA6YjA6NzY6NDA6ZDQ6OGIKPDY+cmUwOiBuZXRtYXAgcXVldWVz L3Nsb3RzOiBUWCAxLzI1NiwgUlggMS8yNTYKcGNpYjQ6IDxBQ1BJIFBDSS1QQ0kgYnJpZGdlPiBp cnEgMTYgYXQgZGV2aWNlIDI5LjAgb24gcGNpMApwY2kzOiA8QUNQSSBQQ0kgYnVzPiBvbiBwY2li NApudm1lMDogPEdlbmVyaWMgTlZNZSBEZXZpY2U+IHBvcnQgMHgzMDAwLTB4MzAwNyBtZW0gMHhh MTAwMDAwMC0weGExMDAzZmZmIGlycSAxNiBhdCBkZXZpY2UgMC4wIG9uIHBjaTMKaXNhYjA6IDxQ Q0ktSVNBIGJyaWRnZT4gYXQgZGV2aWNlIDMxLjAgb24gcGNpMAppc2EwOiA8SVNBIGJ1cz4gb24g aXNhYjAKaGRhYzA6IDxJbnRlbCBDb2ZmZWUgTGFrZSBIREEgQ29udHJvbGxlcj4gbWVtIDB4NDAw MDExMDAwMC0weDQwMDAxMTNmZmYsMHg0MDAwMDAwMDAwLTB4NDAwMDBmZmZmZiBpcnEgMTYgYXQg ZGV2aWNlIDMxLjMgb24gcGNpMApwY2kwOiA8c2VyaWFsIGJ1cz4gYXQgZGV2aWNlIDMxLjUgKG5v IGRyaXZlciBhdHRhY2hlZCkKYWNwaV9idXR0b24wOiA8U2xlZXAgQnV0dG9uPiBvbiBhY3BpMAph Y3BpX2J1dHRvbjE6IDxQb3dlciBCdXR0b24+IG9uIGFjcGkwCmFjcGlfdHowOiA8VGhlcm1hbCBa b25lPiBvbiBhY3BpMApwcGMxOiA8UGFyYWxsZWwgcG9ydD4gcG9ydCAweDM3OC0weDM3ZiBpcnEg NSBvbiBhY3BpMApwcGMxOiBHZW5lcmljIGNoaXBzZXQgKE5JQkJMRS1vbmx5KSBpbiBDT01QQVRJ QkxFIG1vZGUKcHBidXMwOiA8UGFyYWxsZWwgcG9ydCBidXM+IG9uIHBwYzEKbHB0MDogPFByaW50 ZXI+IG9uIHBwYnVzMApscHQwOiBJbnRlcnJ1cHQtZHJpdmVuIHBvcnQKcHBpMDogPFBhcmFsbGVs IEkvTz4gb24gcHBidXMwCmF0a2JkYzA6IDxLZXlib2FyZCBjb250cm9sbGVyIChpODA0Mik+IHBv cnQgMHg2MCwweDY0IGlycSAxIG9uIGFjcGkwCmF0a2JkMDogPEFUIEtleWJvYXJkPiBpcnEgMSBv biBhdGtiZGMwCmtiZDAgYXQgYXRrYmQwCmF0a2JkMDogW0dJQU5ULUxPQ0tFRF0KdWFydDA6IDwx NjU1MCBvciBjb21wYXRpYmxlPiBwb3J0IDB4M2Y4LTB4M2ZmIGlycSA0IGZsYWdzIDB4MTAgb24g YWNwaTAKYWNwaV9zeXNjb250YWluZXIwOiA8U3lzdGVtIENvbnRhaW5lcj4gb24gYWNwaTAKb3Jt MDogPElTQSBPcHRpb24gUk9NPiBhdCBpb21lbSAweGMwMDAwLTB4Y2ZmZmYgcG5waWQgT1JNMDAw MCBvbiBpc2EwCmF0cnRjMDogPEFUIHJlYWx0aW1lIGNsb2NrPiBhdCBwb3J0IDB4NzAgaXJxIDgg b24gaXNhMAphdHJ0YzA6IFdhcm5pbmc6IENvdWxkbid0IG1hcCBJL08uCmF0cnRjMDogcmVnaXN0 ZXJlZCBhcyBhIHRpbWUtb2YtZGF5IGNsb2NrLCByZXNvbHV0aW9uIDEuMDAwMDAwcwpFdmVudCB0 aW1lciAiUlRDIiBmcmVxdWVuY3kgMzI3NjggSHogcXVhbGl0eSAwCmF0cnRjMDogbm9uLVBOUCBJ U0EgZGV2aWNlIHdpbGwgYmUgcmVtb3ZlZCBmcm9tIEdFTkVSSUMgaW4gRnJlZUJTRCAxMi4KY29y ZXRlbXAwOiA8Q1BVIE9uLURpZSBUaGVybWFsIFNlbnNvcnM+IG9uIGNwdTAKZXN0MDogPEVuaGFu Y2VkIFNwZWVkU3RlcCBGcmVxdWVuY3kgQ29udHJvbD4gb24gY3B1MApaRlMgZmlsZXN5c3RlbSB2 ZXJzaW9uOiA1ClpGUyBzdG9yYWdlIHBvb2wgdmVyc2lvbjogZmVhdHVyZXMgc3VwcG9ydCAoNTAw MCkKVGltZWNvdW50ZXJzIHRpY2sgZXZlcnkgMS4wMDAgbXNlYwp1Z2VuMC4xOiA8MHg4MDg2IFhI Q0kgcm9vdCBIVUI+IGF0IHVzYnVzMAp1aHViMDogPDB4ODA4NiBYSENJIHJvb3QgSFVCLCBjbGFz cyA5LzAsIHJldiAzLjAwLzEuMDAsIGFkZHIgMT4gb24gdXNidXMwCm52ZDA6IDxLSU5HU1RPTiBT QTEwMDBNODI0MEc+IE5WTWUgbmFtZXNwYWNlCm52ZDA6IDIyODkzNk1CICg0Njg4NjIxMjggNTEy IGJ5dGUgc2VjdG9ycykKaGRhY2MwOiA8UmVhbHRlayBBTEM4ODcgSERBIENPREVDPiBhdCBjYWQg MCBvbiBoZGFjMApoZGFhMDogPFJlYWx0ZWsgQUxDODg3IEF1ZGlvIEZ1bmN0aW9uIEdyb3VwPiBh dCBuaWQgMSBvbiBoZGFjYzAKcGNtMDogPFJlYWx0ZWsgQUxDODg3IChSZWFyIEFuYWxvZyk+IGF0 IG5pZCAyMCBhbmQgMjQsMjYgb24gaGRhYTAKcGNtMTogPFJlYWx0ZWsgQUxDODg3IChGcm9udCBB bmFsb2cpPiBhdCBuaWQgMjcgYW5kIDI1IG9uIGhkYWEwCnBjbTI6IDxSZWFsdGVrIEFMQzg4NyAo SW50ZXJuYWwgRGlnaXRhbCk+IGF0IG5pZCAxNyBvbiBoZGFhMApoZGFjYzE6IDxJbnRlbCBLYWJ5 IExha2UgSERBIENPREVDPiBhdCBjYWQgMiBvbiBoZGFjMApoZGFhMTogPEludGVsIEthYnkgTGFr ZSBBdWRpbyBGdW5jdGlvbiBHcm91cD4gYXQgbmlkIDEgb24gaGRhY2MxCnBjbTM6IDxJbnRlbCBL YWJ5IExha2UgKEhETUkvRFAgOGNoKT4gYXQgbmlkIDMgb24gaGRhYTEKc2VzMCBhdCBhaGNpZW0w IGJ1cyAwIHNjYnVzNiB0YXJnZXQgMCBsdW4gMApzZXMwOiA8QUhDSSBTR1BJTyBFbmNsb3N1cmUg MS4wMCAwMDAxPiBTRU1CIFMtRS1TIDIuMDAgZGV2aWNlCnNlczA6IFNFTUIgU0VTIERldmljZQph ZGEwIGF0IGFoY2ljaDAgYnVzIDAgc2NidXMwIHRhcmdldCAwIGx1biAwCmFkYTA6IDxUT1NISUJB IEhEV0QxMTAgTVMyT0E4UjA+IEFUQTgtQUNTIFNBVEEgMy54IGRldmljZQphZGEwOiBTZXJpYWwg TnVtYmVyIFk4N1ZNME5GUwphZGEwOiA2MDAuMDAwTUIvcyB0cmFuc2ZlcnMgKFNBVEEgMy54LCBV RE1BNiwgUElPIDgxOTJieXRlcykKYWRhMDogQ29tbWFuZCBRdWV1ZWluZyBlbmFibGVkCmFkYTA6 IDk1Mzg2OU1CICgxOTUzNTI1MTY4IDUxMiBieXRlIHNlY3RvcnMpClNHWCBpbml0aWFsaXplZDog RVBDIGJhc2UgMHgwIHNpemUgMCAoMCBwYWdlcykKVHJ5aW5nIHRvIG1vdW50IHJvb3QgZnJvbSB6 ZnM6enJvb3QvUk9PVC9kZWZhdWx0IFtdLi4uClJvb3QgbW91bnQgd2FpdGluZyBmb3I6IHVzYnVz MAp1aHViMDogMjIgcG9ydHMgd2l0aCAyMiByZW1vdmFibGUsIHNlbGYgcG93ZXJlZApSb290IG1v dW50IHdhaXRpbmcgZm9yOiB1c2J1czAKdWdlbjAuMjogPFNpbGljb24gTGFicyBDUDIxMDIgVVNC IHRvIFVBUlQgQnJpZGdlIENvbnRyb2xsZXI+IGF0IHVzYnVzMApSb290IG1vdW50IHdhaXRpbmcg Zm9yOiB1c2J1czAKdWdlbjAuMzogPFBpeEFydCBVU0IgT3B0aWNhbCBNb3VzZT4gYXQgdXNidXMw CnVnZW4wLjQ6IDxSZWFsdGVrIEJsdWV0b290aCBSYWRpbz4gYXQgdXNidXMwCjwxMTg+U2V0dGlu ZyBob3N0dXVpZDogMmNiNTQzMTEtY2U4NS1iZjRmLWQ1NGMtNDBiMDc2NDBkNDhiLgo8MTE4PlNl dHRpbmcgaG9zdGlkOiAweDI2ZDA1OThlLgo8MTE4PlN0YXJ0aW5nIGZpbGUgc3lzdGVtIGNoZWNr czoKPDExOD5Nb3VudGluZyBsb2NhbCBmaWxlc3lzdGVtczouCjwxMTg+RUxGIGxkY29uZmlnIHBh dGg6IC9saWIgL3Vzci9saWIgL3Vzci9saWIvY29tcGF0IC91c3IvbG9jYWwvbGliIC91c3IvbG9j YWwvbGliL2dyYXBodml6IC91c3IvbG9jYWwvbGliL215c3FsIC91c3IvbG9jYWwvbGliL25zcyAv dXNyL2xvY2FsL2xpYi9vcGVuY29sbGFkYSAvdXNyL2xvY2FsL2xpYi9wZXJsNS81LjI4L21hY2gv Q09SRSAvdXNyL2xvY2FsL2xpYi9xdDUgL3Vzci9sb2NhbC9saWIvc2FtYmE0IC91c3IvbG9jYWwv bGx2bTYwL2xpYiAvdXNyL2xvY2FsL3NoYXJlL2Nocm9taXVtCjwxMTg+MzItYml0IGNvbXBhdGli aWxpdHkgbGRjb25maWcgcGF0aDogL3Vzci9saWIzMiAvdXNyL2xvY2FsL2xpYjMyIC91c3IvbG9j YWwvbGliMzIvd2luZQo8MTE4PkxvYWRpbmcga2VybmVsIG1vZHVsZXM6CnN5c2N0bF93YXJuX3Jl dXNlOiBjYW4ndCByZS11c2UgYSBsZWFmIChjb21wYXQubGludXhrcGkuZGVidWcpIQpkcm1uMDog PGRybW4+IG9uIHZnYXBjaTAKdmdhcGNpMDogY2hpbGQgZHJtbjAgcmVxdWVzdGVkIHBjaV9lbmFi bGVfaW8KdmdhcGNpMDogY2hpbGQgZHJtbjAgcmVxdWVzdGVkIHBjaV9lbmFibGVfaW8KPDU+W2Ry bV0gVW5hYmxlIHRvIGNyZWF0ZSBhIHByaXZhdGUgdG1wZnMgbW91bnQsIGh1Z2VwYWdlIHN1cHBv cnQgd2lsbCBiZSBkaXNhYmxlZCgtMTkpLgo8ND5TdWNjZXNzZnVsbHkgYWRkZWQgV0MgTVRSUiBm b3IgWzB4OTAwMDAwMDAtMHg5ZmZmZmZmZl06IDA7IAo8Nj5bZHJtXSBHb3Qgc3RvbGVuIG1lbW9y eSBiYXNlIDB4ODgwMDAwMDAsIHNpemUgMHg4MDAwMDAwCjw2Pltkcm1dIFN1cHBvcnRzIHZibGFu ayB0aW1lc3RhbXAgY2FjaGluZyBSZXYgMiAoMjEuMTAuMjAxMykuCjw2Pltkcm1dIERyaXZlciBz dXBwb3J0cyBwcmVjaXNlIHZibGFuayB0aW1lc3RhbXAgcXVlcnkuCjw2Pltkcm1dIENvbm5lY3Rv ciBIRE1JLUEtMTogZ2V0IG1vZGUgZnJvbSB0dW5hYmxlczoKPDY+W2RybV0gICAtIGtlcm4udnQu ZmIubW9kZXMuSERNSS1BLTEKPDY+W2RybV0gICAtIGtlcm4udnQuZmIuZGVmYXVsdF9tb2RlCjw2 Pltkcm1dIENvbm5lY3RvciBIRE1JLUEtMjogZ2V0IG1vZGUgZnJvbSB0dW5hYmxlczoKPDY+W2Ry bV0gICAtIGtlcm4udnQuZmIubW9kZXMuSERNSS1BLTIKPDY+W2RybV0gICAtIGtlcm4udnQuZmIu ZGVmYXVsdF9tb2RlCjw2Pltkcm1dIENvbm5lY3RvciBEUC0xOiBnZXQgbW9kZSBmcm9tIHR1bmFi bGVzOgo8Nj5bZHJtXSAgIC0ga2Vybi52dC5mYi5tb2Rlcy5EUC0xCjw2Pltkcm1dICAgLSBrZXJu LnZ0LmZiLmRlZmF1bHRfbW9kZQoKCkZhdGFsIHRyYXAgMTI6IHBhZ2UgZmF1bHQgd2hpbGUgaW4g a2VybmVsIG1vZGUKY3B1aWQgPSAwOyBhcGljIGlkID0gMDAKZmF1bHQgdmlydHVhbCBhZGRyZXNz CT0gMHgxCmZhdWx0IGNvZGUJCT0gc3VwZXJ2aXNvciByZWFkIGRhdGEsIHBhZ2Ugbm90IHByZXNl bnQKaW5zdHJ1Y3Rpb24gcG9pbnRlcgk9IDB4MjA6MHhmZmZmZmZmZjgzNTcxODRmCnN0YWNrIHBv aW50ZXIJICAgICAgICA9IDB4Mjg6MHhmZmZmZmZmZjgyNmI3ODEwCmZyYW1lIHBvaW50ZXIJICAg ICAgICA9IDB4Mjg6MHhmZmZmZmZmZjgyNmI3ODgwCmNvZGUgc2VnbWVudAkJPSBiYXNlIDB4MCwg bGltaXQgMHhmZmZmZiwgdHlwZSAweDFiCgkJCT0gRFBMIDAsIHByZXMgMSwgbG9uZyAxLCBkZWYz MiAwLCBncmFuIDEKcHJvY2Vzc29yIGVmbGFncwk9IGludGVycnVwdCBlbmFibGVkLCByZXN1bWUs IElPUEwgPSAwCmN1cnJlbnQgcHJvY2VzcwkJPSAwIChzb2Z0aXJxXzApCnRyYXAgbnVtYmVyCQk9 IDEyCnBhbmljOiBwYWdlIGZhdWx0CmNwdWlkID0gMAp0aW1lID0gMTU1OTU2ODEwMApLREI6IHN0 YWNrIGJhY2t0cmFjZToKIzAgMHhmZmZmZmZmZjgwYzE2ZGY3IGF0IGtkYl9iYWNrdHJhY2UrMHg2 NwojMSAweGZmZmZmZmZmODBiY2FjY2QgYXQgdnBhbmljKzB4MTlkCiMyIDB4ZmZmZmZmZmY4MGJj YWIyMyBhdCBwYW5pYysweDQzCiMzIDB4ZmZmZmZmZmY4MTBhNzU3NCBhdCB0cmFwX2ZhdGFsKzB4 Mzk0CiM0IDB4ZmZmZmZmZmY4MTBhNzVkOSBhdCB0cmFwX3BmYXVsdCsweDQ5CiM1IDB4ZmZmZmZm ZmY4MTBhNmJiZiBhdCB0cmFwKzB4MjlmCiM2IDB4ZmZmZmZmZmY4MTA4MWNhNSBhdCBjYWxsdHJh cCsweDgKIzcgMHhmZmZmZmZmZjgzNGE0NDYwIGF0IHRhc2tsZXRfaGFuZGxlcisweDEwMAojOCAw eGZmZmZmZmZmODBjMTU2YzQgYXQgZ3Rhc2txdWV1ZV9ydW5fbG9ja2VkKzB4MTQ0CiM5IDB4ZmZm ZmZmZmY4MGMxNTMyOCBhdCBndGFza3F1ZXVlX3RocmVhZF9sb29wKzB4OTgKIzEwIDB4ZmZmZmZm ZmY4MGI4YjgxMyBhdCBmb3JrX2V4aXQrMHg4MwojMTEgMHhmZmZmZmZmZjgxMDgyYzllIGF0IGZv cmtfdHJhbXBvbGluZSsweGUKVXB0aW1lOiA1cwpEdW1waW5nIDczNiBvdXQgb2YgMTYxMTUgTUI6 Li4zJS4uMTElLi4yMiUuLjMxJS4uNDIlLi41MyUuLjYxJS4uNzIlLi44MSUuLjkyJQoKCndhcm5p bmc6IGtsZF9jdXJyZW50X3NvczogQ2FuJ3QgcmVhZCBmaWxlbmFtZTogSW5wdXQvb3V0cHV0IGVy cm9yCgpSZWFkaW5nIHN5bWJvbHMgZnJvbSAvYm9vdC9rZXJuZWwvbm1kbS5rby4uLlJlYWRpbmcg c3ltYm9scyBmcm9tIC91c3IvbGliL2RlYnVnLy9ib290L2tlcm5lbC9ubWRtLmtvLmRlYnVnLi4u ZG9uZS4KZG9uZS4KTG9hZGVkIHN5bWJvbHMgZm9yIC9ib290L2tlcm5lbC9ubWRtLmtvClJlYWRp bmcgc3ltYm9scyBmcm9tIC9ib290L2tlcm5lbC92bW0ua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJv bSAvdXNyL2xpYi9kZWJ1Zy8vYm9vdC9rZXJuZWwvdm1tLmtvLmRlYnVnLi4uZG9uZS4KZG9uZS4K TG9hZGVkIHN5bWJvbHMgZm9yIC9ib290L2tlcm5lbC92bW0ua28KUmVhZGluZyBzeW1ib2xzIGZy b20gL2Jvb3Qva2VybmVsL3pmcy5rby4uLlJlYWRpbmcgc3ltYm9scyBmcm9tIC91c3IvbGliL2Rl YnVnLy9ib290L2tlcm5lbC96ZnMua28uZGVidWcuLi5kb25lLgpkb25lLgpMb2FkZWQgc3ltYm9s cyBmb3IgL2Jvb3Qva2VybmVsL3pmcy5rbwpSZWFkaW5nIHN5bWJvbHMgZnJvbSAvYm9vdC9rZXJu ZWwvb3BlbnNvbGFyaXMua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xpYi9kZWJ1Zy8v Ym9vdC9rZXJuZWwvb3BlbnNvbGFyaXMua28uZGVidWcuLi5kb25lLgpkb25lLgpMb2FkZWQgc3lt Ym9scyBmb3IgL2Jvb3Qva2VybmVsL29wZW5zb2xhcmlzLmtvClJlYWRpbmcgc3ltYm9scyBmcm9t IC9ib290L2tlcm5lbC9pZl9icmlkZ2Uua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xp Yi9kZWJ1Zy8vYm9vdC9rZXJuZWwvaWZfYnJpZGdlLmtvLmRlYnVnLi4uZG9uZS4KZG9uZS4KTG9h ZGVkIHN5bWJvbHMgZm9yIC9ib290L2tlcm5lbC9pZl9icmlkZ2Uua28KUmVhZGluZyBzeW1ib2xz IGZyb20gL2Jvb3Qva2VybmVsL2JyaWRnZXN0cC5rby4uLlJlYWRpbmcgc3ltYm9scyBmcm9tIC91 c3IvbGliL2RlYnVnLy9ib290L2tlcm5lbC9icmlkZ2VzdHAua28uZGVidWcuLi5kb25lLgpkb25l LgpMb2FkZWQgc3ltYm9scyBmb3IgL2Jvb3Qva2VybmVsL2JyaWRnZXN0cC5rbwpSZWFkaW5nIHN5 bWJvbHMgZnJvbSAvYm9vdC9rZXJuZWwvdG1wZnMua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAv dXNyL2xpYi9kZWJ1Zy8vYm9vdC9rZXJuZWwvdG1wZnMua28uZGVidWcuLi5kb25lLgpkb25lLgpM b2FkZWQgc3ltYm9scyBmb3IgL2Jvb3Qva2VybmVsL3RtcGZzLmtvClJlYWRpbmcgc3ltYm9scyBm cm9tIC9ib290L2tlcm5lbC9zZ3gua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xpYi9k ZWJ1Zy8vYm9vdC9rZXJuZWwvc2d4LmtvLmRlYnVnLi4uZG9uZS4KZG9uZS4KTG9hZGVkIHN5bWJv bHMgZm9yIC9ib290L2tlcm5lbC9zZ3gua28KUmVhZGluZyBzeW1ib2xzIGZyb20gL2Jvb3Qva2Vy bmVsL2NvcmV0ZW1wLmtvLi4uUmVhZGluZyBzeW1ib2xzIGZyb20gL3Vzci9saWIvZGVidWcvL2Jv b3Qva2VybmVsL2NvcmV0ZW1wLmtvLmRlYnVnLi4uZG9uZS4KZG9uZS4KTG9hZGVkIHN5bWJvbHMg Zm9yIC9ib290L2tlcm5lbC9jb3JldGVtcC5rbwpSZWFkaW5nIHN5bWJvbHMgZnJvbSAvYm9vdC9r ZXJuZWwvYWVzbmkua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xpYi9kZWJ1Zy8vYm9v dC9rZXJuZWwvYWVzbmkua28uZGVidWcuLi5kb25lLgpkb25lLgpMb2FkZWQgc3ltYm9scyBmb3Ig L2Jvb3Qva2VybmVsL2Flc25pLmtvClJlYWRpbmcgc3ltYm9scyBmcm9tIC9ib290L2tlcm5lbC9p Zl90YXAua28uLi5SZWFkaW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xpYi9kZWJ1Zy8vYm9vdC9rZXJu ZWwvaWZfdGFwLmtvLmRlYnVnLi4uZG9uZS4KZG9uZS4KTG9hZGVkIHN5bWJvbHMgZm9yIC9ib290 L2tlcm5lbC9pZl90YXAua28KUmVhZGluZyBzeW1ib2xzIGZyb20gL2Jvb3Qva2VybmVsL2RybS5r by4uLlJlYWRpbmcgc3ltYm9scyBmcm9tIC91c3IvbGliL2RlYnVnLy9ib290L2tlcm5lbC9kcm0u a28uZGVidWcuLi5kb25lLgpkb25lLgpMb2FkZWQgc3ltYm9scyBmb3IgL2Jvb3Qva2VybmVsL2Ry bS5rbwpSZWFkaW5nIHN5bWJvbHMgZnJvbSAvYm9vdC9rZXJuZWwvbGludXhrcGkua28uLi5SZWFk aW5nIHN5bWJvbHMgZnJvbSAvdXNyL2xpYi9kZWJ1Zy8vYm9vdC9rZXJuZWwvbGludXhrcGkua28u ZGVidWcuLi5kb25lLgpkb25lLgpMb2FkZWQgc3ltYm9scyBmb3IgL2Jvb3Qva2VybmVsL2xpbnV4 a3BpLmtvClJlYWRpbmcgc3ltYm9scyBmcm9tIC9ib290L21vZHVsZXMvbGludXhrcGlfZ3BsdjIu a28uLi5kb25lLgpMb2FkZWQgc3ltYm9scyBmb3IgL2Jvb3QvbW9kdWxlcy9saW51eGtwaV9ncGx2 Mi5rbwojMCAgZG9hZHVtcCAoKSBhdCBzcmMvc3lzL2FtZDY0L2luY2x1ZGUvcGNwdS5oOjIzNAoy MzQJCV9fYXNtKCJtb3ZxICUlZ3M6JVAxLCUwIiA6ICI9ciIgKHRkKSA6ICJuIiAoT0ZGU0VUT0Zf Q1VSVEhSRUFEKSk7CihrZ2RiKSAjMCAgZG9hZHVtcCAoKSBhdCBzcmMvc3lzL2FtZDY0L2luY2x1 ZGUvcGNwdS5oOjIzNAojMSAgMHhmZmZmZmZmZjgwYmNhOGM4IGluIGtlcm5fcmVib290IChob3d0 bz0yNjApCiAgICBhdCAvdXNyL3NyYy9zeXMva2Vybi9rZXJuX3NodXRkb3duLmM6NDUxCiMyICAw eGZmZmZmZmZmODBiY2FkMjkgaW4gdnBhbmljIChmbXQ9PHZhbHVlIG9wdGltaXplZCBvdXQ+LCAK ICAgIGFwPTx2YWx1ZSBvcHRpbWl6ZWQgb3V0PikgYXQgL3Vzci9zcmMvc3lzL2tlcm4va2Vybl9z aHV0ZG93bi5jOjg3NwojMyAgMHhmZmZmZmZmZjgwYmNhYjIzIGluIHBhbmljIChmbXQ9PHZhbHVl IG9wdGltaXplZCBvdXQ+KQogICAgYXQgL3Vzci9zcmMvc3lzL2tlcm4va2Vybl9zaHV0ZG93bi5j OjgwNAojNCAgMHhmZmZmZmZmZjgxMGE3NTc0IGluIHRyYXBfZmF0YWwgKGZyYW1lPTB4ZmZmZmZm ZmY4MjZiNzc1MCwgZXZhPTEpCiAgICBhdCAvdXNyL3NyYy9zeXMvYW1kNjQvYW1kNjQvdHJhcC5j Ojk0NgojNSAgMHhmZmZmZmZmZjgxMGE3NWQ5IGluIHRyYXBfcGZhdWx0IChmcmFtZT0weGZmZmZm ZmZmODI2Yjc3NTAsIHVzZXJtb2RlPTApCiAgICBhdCBzcmMvc3lzL2FtZDY0L2luY2x1ZGUvcGNw dS5oOjIzNAojNiAgMHhmZmZmZmZmZjgxMGE2YmJmIGluIHRyYXAgKGZyYW1lPTB4ZmZmZmZmZmY4 MjZiNzc1MCkKICAgIGF0IC91c3Ivc3JjL3N5cy9hbWQ2NC9hbWQ2NC90cmFwLmM6NDQxCiM3ICAw eGZmZmZmZmZmODEwODFjYTUgaW4gY2FsbHRyYXAgKCkKICAgIGF0IC91c3Ivc3JjL3N5cy9hbWQ2 NC9hbWQ2NC9leGNlcHRpb24uUzoyMzIKIzggIDB4ZmZmZmZmZmY4MzU3MTg0ZiBpbiA/PyAoKQoj OSAgMHhmZmZmZmZmZjgxYTAxMDA0IGluIGhjX3NvdXJjZV9tYXNrICgpCiMxMCAweDAwMDAwMDAx MDAwMDAwMDEgaW4gPz8gKCkKIzExIDB4MDAwMDAwMDAwMDAwMDAwMCBpbiA/PyAoKQpDdXJyZW50 IGxhbmd1YWdlOiAgYXV0bzsgY3VycmVudGx5IG1pbmltYWwKKGtnZGIpIAoKLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tCnBzIC1heGx3dwoKVUlEIFBJRCBQUElEIENQVSBQUkkgTkkgICBWU1ogIFJTUyBNV0NIQU4g ICBTVEFUIFRUICAgICBUSU1FIENPTU1BTkQKICAwICAgMCAgICAwICAgMCAtMTYgIDAgICAgIDAg ICAgMCBzd2FwaW4gICBETHMgICAtICAwOjAwLjAxIFtrZXJuZWxdCiAgMCAgIDEgICAgMCAgIDAg IDIwICAwICA5Nzg4ICA5Mjggd2FpdCAgICAgRExzICAgLSAgMDowMC4wMCBbaW5pdF0KICAwICAg MiAgICAwICAgMCAtMTYgIDAgICAgIDAgICAgMCBjcnlwdG9fdyBETCAgICAtICAwOjAwLjAwIFtj cnlwdG9dCiAgMCAgIDMgICAgMCAgIDAgLTE2ICAwICAgICAwICAgIDAgY3J5cHRvX3IgREwgICAg LSAgMDowMC4wMCBbY3J5cHRvIHJldHVybnMgMF0KICAwICAgNCAgICAwICAgMCAtMTYgIDAgICAg IDAgICAgMCBjcnlwdG9fciBETCAgICAtICAwOjAwLjAwIFtjcnlwdG8gcmV0dXJucyAxXQogIDAg ICA1ICAgIDAgICAwIC0xNiAgMCAgICAgMCAgICAwIGNyeXB0b19yIERMICAgIC0gIDA6MDAuMDAg W2NyeXB0byByZXR1cm5zIDJdCiAgMCAgIDYgICAgMCAgIDAgLTE2ICAwICAgICAwICAgIDAgY3J5 cHRvX3IgREwgICAgLSAgMDowMC4wMCBbY3J5cHRvIHJldHVybnMgM10KICAwICAgNyAgICAwICAg MCAtMTYgIDAgICAgIDAgICAgMCBjcnlwdG9fciBETCAgICAtICAwOjAwLjAwIFtjcnlwdG8gcmV0 dXJucyA0XQogIDAgICA4ICAgIDAgICAwIC0xNiAgMCAgICAgMCAgICAwIGNyeXB0b19yIERMICAg IC0gIDA6MDAuMDAgW2NyeXB0byByZXR1cm5zIDVdCiAgMCAgIDkgICAgMCAgIDAgLTE2ICAwICAg ICAwICAgIDAgLSAgICAgICAgUkwgICAgLSAgMDowMC4wMCBbY2FtXQogIDAgIDEwICAgIDAgICAw IC0xNiAgMCAgICAgMCAgICAwIGF1ZGl0X3dvIERMICAgIC0gIDA6MDAuMDAgW2F1ZGl0XQogIDAg IDExICAgIDAgICAwIDE1NSAgMCAgICAgMCAgICAwIC0gICAgICAgIFJMICAgIC0gIDA6MDAuMDAg W2lkbGVdCiAgMCAgMTIgICAgMCAgIDAgLTUyICAwICAgICAwICAgIDAgLSAgICAgICAgV0wgICAg LSAgMDowMC4wMCBbaW50cl0KICAwICAxMyAgICAwICAgMCAgLTggIDAgICAgIDAgICAgMCAtICAg ICAgICBETCAgICAtICAwOjAwLjAwIFtnZW9tXQogIDAgIDE0ICAgIDAgICAwIC0xNiAgMCAgICAg MCAgICAwIHNlcXN0YXRlIERMICAgIC0gIDA6MDAuMDAgW3NlcXVlbmNlciAwMF0KICAwICAxNSAg ICAwICAgMCAtNjggIDAgICAgIDAgICAgMCAtICAgICAgICBETCAgICAtICAwOjAwLjAwIFt1c2Jd CiAgMCAgMTYgICAgMCAgIDAgLTE2ICAwICAgICAwICAgIDAgLSAgICAgICAgREwgICAgLSAgMDow MC4wMCBbc29haW9kMV0KICAwICAxNyAgICAwICAgMCAtMTYgIDAgICAgIDAgICAgMCAtICAgICAg ICBETCAgICAtICAwOjAwLjAwIFtzb2Fpb2QyXQogIDAgIDE4ICAgIDAgICAwIC0xNiAgMCAgICAg MCAgICAwIC0gICAgICAgIERMICAgIC0gIDA6MDAuMDAgW3NvYWlvZDNdCiAgMCAgMTkgICAgMCAg IDAgLTE2ICAwICAgICAwICAgIDAgLSAgICAgICAgREwgICAgLSAgMDowMC4wMCBbc29haW9kNF0K ICAwICAyMCAgICAwICAgMCAgLTggIDAgICAgIDAgICAgMCB0LT56dGhyXyBETCAgICAtICAwOjAw LjAwIFt6ZnNrZXJuXQogIDAgIDIxICAgIDAgICAwIC0xNiAgMCAgICAgMCAgICAwIHdhaXRpbmdf IERMICAgIC0gIDA6MDAuMDAgW3NjdHBfaXRlcmF0b3JdCiAgMCAgMjIgICAgMCAgIDAgLTE2ICAw ICAgICAwICAgIDAgdHpwb2xsICAgREwgICAgLSAgMDowMC4wMCBbYWNwaV90aGVybWFsXQogIDAg IDIzICAgIDAgICAwIC0xNiAgMCAgICAgMCAgICAwIC0gICAgICAgIERMICAgIC0gIDA6MDAuMDAg W3JhbmRfaGFydmVzdHFdCiAgMCAgMjQgICAgMCAgIDAgLTE2ICAwICAgICAwICAgIDAgaWRsZSAg ICAgREwgICAgLSAgMDowMC4wMCBbZW5jX2RhZW1vbjBdCiAgMCAgMjUgICAgMCAgIDAgLTE2ICAw ICAgICAwICAgIDAgcHNsZWVwICAgREwgICAgLSAgMDowMC4wMCBbcGFnZWRhZW1vbl0KICAwICAy NiAgICAwICAgMCAtMTYgIDAgICAgIDAgICAgMCBwc2xlZXAgICBETCAgICAtICAwOjAwLjAwIFt2 bWRhZW1vbl0KICAwICAyNyAgICAwICAgMCAtMTYgIDAgICAgIDAgICAgMCBxc2xlZXAgICBETCAg ICAtICAwOjAwLjAwIFtidWZkYWVtb25dCiAgMCAgMjggICAgMCAgIDAgLTE2ICAwICAgICAwICAg IDAgdmxydXd0ICAgREwgICAgLSAgMDowMC4wMCBbdm5scnVdCiAgMCAgMjkgICAgMCAgIDAgIDE2 ICAwICAgICAwICAgIDAgc3luY2VyICAgREwgICAgLSAgMDowMC4wMCBbc3luY2VyXQogIDAgIDMw ICAgIDEgICAwICA1MiAgMCAxMjMyMCAyOTM2IHdhaXQgICAgIERzKyAgIC0gIDA6MDAuMDAgW3No XQogIDAgMTE2ICAgMzAgICAwICA1MiAgMCAxMjMyMCAyOTQ0IHdhaXQgICAgIEQrICAgIC0gIDA6 MDAuMDAgW3NoXQogIDAgMTIyICAxMTYgICAwICAgOCAgMCAxMDY4MCAyMTAwIC0gICAgICAgIFIr ICAgIC0gIDA6MDAuMDAgW2tsZGxvYWRdCgotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0Kdm1zdGF0IC1zCgogICAg MTA4MDUgY3B1IGNvbnRleHQgc3dpdGNoZXMKICAgICAxMjA1IGRldmljZSBpbnRlcnJ1cHRzCiAg ICAgICA5MCBzb2Z0d2FyZSBpbnRlcnJ1cHRzCiAgICAgODMzOSB0cmFwcwogICAgMjY3Nzggc3lz dGVtIGNhbGxzCiAgICAgICAyOSBrZXJuZWwgdGhyZWFkcyBjcmVhdGVkCiAgICAgICA2MSAgZm9y aygpIGNhbGxzCiAgICAgICAzMiB2Zm9yaygpIGNhbGxzCiAgICAgICAgMCByZm9yaygpIGNhbGxz CiAgICAgICAgMCBzd2FwIHBhZ2VyIHBhZ2VpbnMKICAgICAgICAwIHN3YXAgcGFnZXIgcGFnZXMg cGFnZWQgaW4KICAgICAgICAwIHN3YXAgcGFnZXIgcGFnZW91dHMKICAgICAgICAwIHN3YXAgcGFn ZXIgcGFnZXMgcGFnZWQgb3V0CiAgICAgIDIxNyB2bm9kZSBwYWdlciBwYWdlaW5zCiAgICAgMTYw NSB2bm9kZSBwYWdlciBwYWdlcyBwYWdlZCBpbgogICAgICAgIDAgdm5vZGUgcGFnZXIgcGFnZW91 dHMKICAgICAgICAwIHZub2RlIHBhZ2VyIHBhZ2VzIHBhZ2VkIG91dAogICAgICAgIDAgcGFnZSBk YWVtb24gd2FrZXVwcwogICAgICAgIDAgcGFnZXMgZXhhbWluZWQgYnkgdGhlIHBhZ2UgZGFlbW9u CiAgICAgICAgMCBjbGVhbiBwYWdlIHJlY2xhbWF0aW9uIHNob3J0ZmFsbHMKICAgICAgICAwIHBh Z2VzIHJlYWN0aXZhdGVkIGJ5IHRoZSBwYWdlIGRhZW1vbgogICAgIDI3NjIgY29weS1vbi13cml0 ZSBmYXVsdHMKICAgICAgICA1IGNvcHktb24td3JpdGUgb3B0aW1pemVkIGZhdWx0cwogICAgIDQ5 MTcgemVybyBmaWxsIHBhZ2VzIHplcm9lZAogICAgICAgIDAgemVybyBmaWxsIHBhZ2VzIHByZXpl cm9lZAogICAgICAgIDAgaW50cmFuc2l0IGJsb2NraW5nIHBhZ2UgZmF1bHRzCiAgICAgODY2NCB0 b3RhbCBWTSBmYXVsdHMgdGFrZW4KICAgICAgMTY2IHBhZ2UgZmF1bHRzIHJlcXVpcmluZyBJL08K ICAgICAgICAwIHBhZ2VzIGFmZmVjdGVkIGJ5IGtlcm5lbCB0aHJlYWQgY3JlYXRpb24KICAgICAy NzYxIHBhZ2VzIGFmZmVjdGVkIGJ5ICBmb3JrKCkKICAgICAxMTUyIHBhZ2VzIGFmZmVjdGVkIGJ5 IHZmb3JrKCkKICAgICAgICAwIHBhZ2VzIGFmZmVjdGVkIGJ5IHJmb3JrKCkKICAgIDU2NzkzIHBh Z2VzIGZyZWVkCiAgICAgICAgMCBwYWdlcyBmcmVlZCBieSBkYWVtb24KICAgICAgICAwIHBhZ2Vz IGZyZWVkIGJ5IGV4aXRpbmcgcHJvY2Vzc2VzCiAgICAgICAgMCBwYWdlcyBhY3RpdmUKICAgICAg ICAwIHBhZ2VzIGluYWN0aXZlCiAgICAgICAgMCBwYWdlcyBpbiB0aGUgbGF1bmRyeSBxdWV1ZQog ICAgICAgIDAgcGFnZXMgd2lyZWQgZG93bgogICAgICAgIDAgcGFnZXMgZnJlZQogICAgICAgIDAg Ynl0ZXMgcGVyIHBhZ2UKICAgICAgICAwIHRvdGFsIG5hbWUgbG9va3VwcwogICAgICAgICAgY2Fj aGUgaGl0cyAoMCUgcG9zICsgMCUgbmVnKSBzeXN0ZW0gMCUgcGVyLWRpcmVjdG9yeQogICAgICAg ICAgZGVsZXRpb25zIDAlLCBmYWxzZWhpdHMgMCUsIHRvb2xvbmcgMCUKCi0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LQp2bXN0YXQgLW0KCiAgICAgICAgIFR5cGUgSW5Vc2UgTWVtVXNlIEhpZ2hVc2UgUmVxdWVzdHMg IFNpemUocykKICAgICBwcGJ1c2RldiAgICAgMiAgICAgMUsgICAgICAgLSAgICAgICAgMiAgMjU2 CiAgICAgIENBTSBERVYgICAgMTAgICAgMjBLICAgICAgIC0gICAgICAgMjEgIDIwNDgKICAgICAg ZW50cm9weSAgICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMyAgMzIsNDA5NgogICAgICBDQU0g Q0NCICAgICAwICAgICAwSyAgICAgICAtICAgICAgMTAxICAyMDQ4CiAgICAgQ0FNIHBhdGggICAg MTIgICAgIDFLICAgICAgIC0gICAgICAgNzIgIDMyCiAgIENBTSBwZXJpcGggICAgIDYgICAgIDJL ICAgICAgIC0gICAgICAgMjUgIDE2LDMyLDY0LDEyOCwyNTYKICAgIGFjcGlfcGVyZiAgICAgNiAg ICAgM0sgICAgICAgLSAgICAgICAgNiAgNTEyCiAgICAgIGFjcGlwd3IgICAgIDUgICAgIDFLICAg ICAgIC0gICAgICAgIDUgIDY0CiAgICAgICAgIGhkYWEgICAgMTAgICAgNTZLICAgICAgIC0gICAg ICAgMTAgIDI1Niw1MTIsMTAyNCwyMDQ4LDE2Mzg0LDMyNzY4CiAgICAgICAgIGhkYWMgICAgIDEg ICAgIDJLICAgICAgIC0gICAgICAgIDEgIDIwNDgKICAgICAgICBoZGFjYyAgICAgMiAgICAgMUsg ICAgICAgLSAgICAgICAgMiAgMzIKICAgICAgIGZlZWRlciAgICAyMSAgICAgMksgICAgICAgLSAg ICAgICAyNyAgMzIsMTI4CiAgICAgICAgbWl4ZXIgICAgIDQgICAgMTZLICAgICAgIC0gICAgICAg IDQgIDQwOTYKQ0FNIEkvTyBTY2hlZHVsZXIgICAgIDEgICAgIDFLICAgICAgIC0gICAgICAgIDEg IDEyOAogICAgQ0FNIHF1ZXVlICAgIDE4ICAgICA2SyAgICAgICAtICAgICAgIDUzICAxNiwzMiw1 MTIKICAgICAgICAgVUFSVCAgICAgMyAgICAgM0sgICAgICAgLSAgICAgICAgMyAgMTYsMTAyNAog ICAgICAgICAgVVNCICAgIDI3ICAgIDMzSyAgICAgICAtICAgICAgIDI5ICAxNiwzMiw2NCwxMjgs MjU2LDUxMiwxMDI0LDIwNDgsNDA5NgogICAgICAgVVNCZGV2ICAgIDE5ICAgICAySyAgICAgICAt ICAgICAgIDE5ICAzMiw2NCwxMjgsMjU2LDUxMgpDQU0gZGV2IHF1ZXVlICAgICA4ICAgICAxSyAg ICAgICAtICAgICAgICA4ICA2NAogICAgICAgIHZ0YnVmICAgIDI0ICAxOTY4SyAgICAgICAtICAg ICAgIDQ2ICA0MDk2CiAgICAgICAgICAgdnQgICAgMTEgICAgIDZLICAgICAgIC0gICAgICAgMTEg IDUxMgogICAgIFNDU0kgRU5DICAgIDI1ICAgMTAwSyAgICAgICAtICAgICAgIDI3ICAxNiw2NCwy NTYsMjA0OCwzMjc2OAogICAgICAgREVWRlMzICAgMTQwICAgIDM1SyAgICAgICAtICAgICAgMTQz ICAyNTYKICAgICAgIERFVkZTMSAgIDYzMiAgIDMxNksgICAgICAgLSAgICAgIDYzNyAgNTEyCiAg ICAgICAgREVWRlMgICAgMTMgICAgIDFLICAgICAgIC0gICAgICAgMTQgIDE2LDEyOApORlNEIFY0 Y2xpZW50ICAgICAxICAgICAxSyAgICAgICAtICAgICAgICAxICAyNTYKIE5GU0QgbGNrZmlsZSAg ICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMSAgMjU2CiBORlNEIHNlc3Npb24gICAgIDEgICAg IDFLICAgICAgIC0gICAgICAgIDEgIDEwMjQKICAgIHBmc19ub2RlcyAgICAyOSAgICAxNUsgICAg ICAgLSAgICAgICAyOSAgNTEyCiAgICAgICAgIEdFT00gICAgNjIgICAgMTNLICAgICAgIC0gICAg ICA0NDkgIDE2LDMyLDY0LDEyOCwyNTYsNTEyLDEwMjQsMjA0OCw4MTkyLDE2Mzg0CiAgICByYWlk X2RhdGEgICAgIDAgICAgIDBLICAgICAgIC0gICAgICAgNjAgIDMyLDEyOCwyNTYKICAgICAgIGlz YWRldiAgICAgNyAgICAgMUsgICAgICAgLSAgICAgICAgNyAgMTI4CiAgICAgICAgIGNkZXYgICAg IDMgICAgIDFLICAgICAgIC0gICAgICAgIDMgIDI1NgogICAgIGZpbGVjYXBzICAgICAwICAgICAw SyAgICAgICAtICAgICAgICAzICAzMgogICAgICBrZHRyYWNlICAgNDU1ICAgMTA4SyAgICAgICAt ICAgICAgNjYyICA2NCwyNTYKICAgICAgICAga2VudiAgIDExNyAgICAxM0sgICAgICAgLSAgICAg IDEyNiAgMTYsMzIsNjQsMTI4LDgxOTIKICAgICAgIGtxdWV1ZSAgICAzMyAgICAgM0sgICAgICAg LSAgICAgIDEyMyAgNjQKICAgIHByb2MtYXJncyAgICA1MSAgICAgMksgICAgICAgLSAgICAgIDEw MSAgMzIsNjQsMTI4CiAgICAgICAgaGhvb2sgICAgMTMgICAgIDRLICAgICAgIC0gICAgICAgMTMg IDI1NgogICAgICBpdGhyZWFkICAgMjE3ICAgIDQ0SyAgICAgICAtICAgICAgMjE3ICAzMiwxMjgs MjU2CiAgICAgICBwcmlzb24gICAgMTQgICAgIDFLICAgICAgIC0gICAgICAgMTQgIDE2LDMyCiAg ICAgICBLVFJBQ0UgICAxMDAgICAgMTNLICAgICAgIC0gICAgICAxMDAgIDEyOAogICAgICAgbGlu a2VyICAgMzUzICAxNTc5SyAgICAgICAtICAgICAgNDAzICAxNiwzMiw2NCwxMjgsMjU2LDUxMiwx MDI0LDIwNDgsNDA5Niw4MTkyLDE2Mzg0LDMyNzY4LDY1NTM2CiAgICAgICAgbG9ja2YgICAgIDIg ICAgIDFLICAgICAgIC0gICAgICAgIDYgIDY0LDEyOAogICBsb2dpbmNsYXNzICAgICAyICAgICAx SyAgICAgICAtICAgICAgICAyICA2NAogICAgICAgZGV2YnVmIDE4NTEwIDM3MTY4SyAgICAgICAt ICAgIDE4NTc0ICAxNiwzMiw2NCwxMjgsMjU2LDUxMiwxMDI0LDIwNDgsNDA5Niw4MTkyLDY1NTM2 CiAgICAgICAgIHRlbXAgICAgNDUgICAgMzVLICAgICAgIC0gICAgICA5NDkgIDE2LDMyLDY0LDEy OCwyNTYsNTEyLDEwMjQsMjA0OCw0MDk2LDgxOTIsMTYzODQKICAgICAgICBldmRldiAgICAgMyAg ICAgM0sgICAgICAgLSAgICAgICAgMyAgMTAyNAogICAgICAgbW9kdWxlICAgNTI0ICAgIDY2SyAg ICAgICAtICAgICAgNTI1ICAxMjgKICAgICBtdHhfcG9vbCAgICAgMiAgICA3MksgICAgICAgLSAg ICAgICAgMiAgODE5Miw2NTUzNgogICAgICAgICAgb3NkICAgICA1ICAgICAxSyAgICAgICAtICAg ICAgIDQxICAxNiwzMiw2NCwxMjgsMjU2CiAgICAgcG1jaG9va3MgICAgIDEgICAgIDFLICAgICAg IC0gICAgICAgIDEgIDEyOAogICAgICAgICAgcG1jICAgICAxICAgICAxSyAgICAgICAtICAgICAg ICAxICA2NAogICAgICAgICBwZ3JwICAgICAyICAgICAxSyAgICAgICAtICAgICAgICAyICAxMjgK ICAgICAgc2Vzc2lvbiAgICAgMiAgICAgMUsgICAgICAgLSAgICAgICAgMiAgMTI4CiAgICAgICAg IHByb2MgICAgIDIgICAgNjRLICAgICAgIC0gICAgICAgIDIgIDMyNzY4CiAgICAgIHN1YnByb2Mg ICAxMDYgICAxNjlLICAgICAgIC0gICAgICAxOTYgIDUxMiw0MDk2CiAgICAgICAgIGNyZWQgICAg MTUgICAgIDRLICAgICAgIC0gICAgICAgMTYgIDI1NgogICAgIGFjcGlpbnRyICAgICAxICAgICAx SyAgICAgICAtICAgICAgICAxICA2NAogICAgICAgcGxpbWl0ICAgICAyICAgICAxSyAgICAgICAt ICAgICAgIDE2ICAyNTYKICAgICAgdWlkaW5mbyAgICAgMiAgICAgOUsgICAgICAgLSAgICAgICAg MiAgMTI4LDgxOTIKICAgICAgIGR1bXBlciAgICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMSAg NTEyCiAgICAgICBhY3BpY2EgMjIwMDAgIDIxNzlLICAgICAgIC0gICAxODc4MDAgIDE2LDMyLDY0 LDEyOCwyNTYsNTEyLDEwMjQsMjA0OCw0MDk2LDgxOTIKICAgIHN5c2N0bG9pZCAgNTc5OCAgIDI5 N0sgICAgICAgLSAgICAgNTkwMyAgMTYsMzIsNjQsMTI4LDI1NgogICAgc3lzY3RsdG1wICAgICAw ICAgICAwSyAgICAgICAtICAgICAgICA0ICA2NCwxMDI0CiAgICAgIHRpZGhhc2ggICAgIDEgICAg NjRLICAgICAgIC0gICAgICAgIDEgIDY1NTM2CiAgICAgIGNhbGxvdXQgICAgIDcgIDI2OTZLICAg ICAgIC0gICAgICAgIDcgIAogICAgICAgICB1bXR4ICAgOTIwICAgMTE1SyAgICAgICAtICAgICAg OTIwICAxMjgKICAgICBwMTAwMy4xYiAgICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMSAgMTYK ICAgICAgICAgU1dBUCAgICAgMSAgIDEzMksgICAgICAgLSAgICAgICAgMSAgCiAgICAgICAgICBi dXMgIDI5MzcgICAzNjVLICAgICAgIC0gICAgIDc0OTMgIDE2LDMyLDY0LDEyOCwyNTYsMTAyNCwy MDQ4CiAgICAgICBidXMtc2MgICAgOTIgIDE5MzNLICAgICAgIC0gICAgIDM4NDggIDE2LDMyLDY0 LDEyOCwyNTYsNTEyLDEwMjQsMjA0OCw0MDk2LDgxOTIsMTYzODQsMzI3NjgsNjU1MzYKICAgICBh Y3BpdGFzayAgICAgMSAgICA2NEsgICAgICAgLSAgICAgICAgMSAgNjU1MzYKICAgICAgZGV2c3Rh dCAgICAgNCAgICAgOUsgICAgICAgLSAgICAgICAgNCAgMzIsNDA5NgogICAgICAgIGVwb2NoICAg ICA0ICAgICAxSyAgICAgICAtICAgICAgICA0ICAxMjgKIGV2ZW50aGFuZGxlciAgIDEzMiAgICAx MUsgICAgICAgLSAgICAgIDEzMiAgNjQsMTI4CiAgIGd0YXNrcXVldWUgICAgNDYgICAgMzdLICAg ICAgIC0gICAgICAgNDYgIDE2LDMyLDI1Niw4MTkyCiAgICAgICAgIGtvYmogICAzNTIgIDE0MDhL ICAgICAgIC0gICAgICA0OTEgIDQwOTYKICAgICAgUGVyLWNwdSAgICAgMSAgICAgMUsgICAgICAg LSAgICAgICAgMSAgMzIKICAgICAgYWNwaXNlbSAgIDEyNSAgICAxNksgICAgICAgLSAgICAgIDEy OSAgMTI4CiAgICAgICAgIHJtYW4gICAyNDYgICAgMjlLICAgICAgIC0gICAgICA2MzUgIDMyLDEy OAogICAgICAgICBzYnVmICAgICAwICAgICAwSyAgICAgICAtICAgICAgMjkyICAxNiwzMiw2NCwx MjgsMjU2CiAgICB0b3Bvbm9kZXMgICAgMjYgICAgIDRLICAgICAgIC0gICAgICAgMjYgIDEyOAog ICAgICAga2JkbXV4ICAgICA2ICAgIDIySyAgICAgICAtICAgICAgICA2ICAxNiw1MTIsMTAyNCwy MDQ4LDE2Mzg0CiAgICB0YXNrcXVldWUgICAxNjUgICAgMjBLICAgICAgIC0gICAgICAxODAgIDE2 LDMyLDY0LDEyOCwyNTYKICAgICB0ZXJtaW5hbCAgICAxMSAgICAgM0sgICAgICAgLSAgICAgICAx MSAgMjU2CiAgICAgICBVbml0bm8gICAgMjYgICAgIDJLICAgICAgIC0gICAgICAgMzQgIDMyLDY0 CiAgICAgICAgICBpb3YgICAgIDAgICAgIDBLICAgICAgIC0gICAgIDEwNzQgIDY0LDI1Niw1MTIK ICAgICAgICAgIG1zZyAgICAgNCAgICAzMEsgICAgICAgLSAgICAgICAgNCAgMjA0OCw0MDk2LDgx OTIsMTYzODQKICAgICAgICAgIHNlbSAgICAgNCAgIDEwNksgICAgICAgLSAgICAgICAgNCAgMjA0 OCw0MDk2CiAgICAgICAgICBzaG0gICAgIDEgICAgMzJLICAgICAgIC0gICAgICAgIDEgIDMyNzY4 CiAgICAgICAgICB0dHkgICAgMTMgICAgMTNLICAgICAgIC0gICAgICAgMTMgIDEwMjQKICAgICAg ICBzaG1mZCAgICAgMSAgICAgOEsgICAgICAgLSAgICAgICAgMSAgODE5MgogICAgICAgICAgcGNi ICAgIDE4ICAyMjAxSyAgICAgICAtICAgICAgIDE4ICAxNiwxMjgsMTAyNCwyMDQ4LDgxOTIKICAg ICAgICAgIExFRCAgICAyNCAgICAgMksgICAgICAgLSAgICAgICAyNCAgMTYsMTI4CiAgICAgdmZz Y2FjaGUgICAgIDQgIDQxNDVLICAgICAgIC0gICAgICAgIDQgIDI1NiwxNjM4NCwzMjc2OAogICAg IHZmc19oYXNoICAgICAxICAyMDQ4SyAgICAgICAtICAgICAgICAxICAKICAgICAgIHZub2RlcyAg ICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMSAgMjU2CiAgICAgICAgbW91bnQgICAxMzkgICAg IDVLICAgICAgIC0gICAgICAzMjEgIDE2LDMyLDY0LDEyOCwyNTYKICAgICAgIHN0YXRmcyAgICAg MCAgICAgMEsgICAgICAgLSAgICAgICAyNyAgNDA5NgpjaGFjaGEyMHJhbmRvbSAgICAgMSAgICAg MksgICAgICAgLSAgICAgICAgMSAgMjA0OAogICAgICAgICAgQlBGICAgICAyICAgICAxSyAgICAg ICAtICAgICAgICAyICAxMjgKICAgICAgICBpZm5ldCAgICAgMyAgICAgNUsgICAgICAgLSAgICAg ICAgMyAgMTI4LDIwNDgKICAgICAgIGlmYWRkciAgICAyOCAgICAgOUsgICAgICAgLSAgICAgICAy OCAgMTYsMzIsNjQsMjU2LDUxMiwyMDQ4LDQwOTYKICAgICAgICBjbG9uZSAgICAxMCAgICAgMksg ICAgICAgLSAgICAgICAxMCAgMTI4CiAgICAgICAgaXBzZWMgICAgIDMgICAgIDFLICAgICAgIC0g ICAgICAgIDMgIDI1NgogICAgICBsbHRhYmxlICAgICA4ICAgICAySyAgICAgICAtICAgICAgICA4 ICAyNTYKICAgICByb3V0ZXRibCAgICAgMyAgICAgMksgICAgICAgLSAgICAgICAgMyAgNTEyCiAg ICAgICAgIHZuZXQgICAgIDEgICAgIDFLICAgICAgIC0gICAgICAgIDEgIDY0CiAgICB2bmV0X2Rh dGEgICAgIDEgICAyNDBLICAgICAgIC0gICAgICAgIDEgIAp2bmV0X2RhdGFfZnJlZSAgICAgMSAg ICAgMUsgICAgICAgLSAgICAgICAgMSAgMzIKICAgICAgICAgaWdtcCAgICAgMiAgICAgMUsgICAg ICAgLSAgICAgICAgMiAgMTI4CmVuY2FwX2V4cG9ydF9ob3N0ICAgIDEyICAgICAxSyAgICAgICAt ICAgICAgIDEyICAzMiw2NAogICAgIHNjdHBfdnJmICAgICAxICAgICAxSyAgICAgICAtICAgICAg ICAxICA2NAogICB0Zm9fY2NhY2hlICAgICAxICAgMTI4SyAgICAgICAtICAgICAgICAxICAKICAg IGhvc3RjYWNoZSAgICAgMSAgICAzMksgICAgICAgLSAgICAgICAgMSAgMzI3NjgKICAgICAgdGNw ZnVuYyAgICAgMSAgICAgMUsgICAgICAgLSAgICAgICAgMSAgNjQKICAgICBzeW5jYWNoZSAgICAg MSAgICA2OEsgICAgICAgLSAgICAgICAgMSAgCiAgICAgICAgICBtbGQgICAgIDIgICAgIDFLICAg ICAgIC0gICAgICAgIDIgIDEyOAogICAgICAgaXA2bmRwICAgICAyICAgICAxSyAgICAgICAtICAg ICAgICAyICA2NAogICAgIHNlY2FzdmFyICAgICAxICAgICAxSyAgICAgICAtICAgICAgICAxICAx MDI0CiAgICAgICBzYWhlYWQgICAgIDEgICAgIDFLICAgICAgIC0gICAgICAgIDEgIDEwMjQKICBp cHNlY3BvbGljeSAgICAgMiAgICAgMksgICAgICAgLSAgICAgICAgMiAgMjU2LDEwMjQKICAgIGlw c2VjLXNhcSAgICAgMiAgICAgMksgICAgICAgLSAgICAgICAgMiAgMTAyNAogICAgICAgY3J5cHRv ICAgICAyICAgICAySyAgICAgICAtICAgICAgICAyICAxMDI0CiAgICAgICAgICBycGMgICAgIDIg ICAgIDhLICAgICAgIC0gICAgICAgIDIgIDQwOTYKYXVkaXRfZXZjbGFzcyAgIDIzMCAgICAgOEsg ICAgICAgLSAgICAgIDI4NSAgMzIKICAgIHVmc19xdW90YSAgICAgMSAgMjA0OEsgICAgICAgLSAg ICAgICAgMSAgCiAgICB2bV9wZ2RhdGEgICAgIDEgICAgIDFLICAgICAgIC0gICAgICAgIDEgIDEy OAp2bV9maWN0aXRpb3VzICAgICAyICAgICAxSyAgICAgICAtICAgICAgICAyICAxNiw2NAogIGZw dWtlcm5fY3R4ICAgICA2ICAgIDEySyAgICAgICAtICAgICAgICA2ICAyMDQ4CiAgICAgIG1lbWRl c2MgICAgIDEgICAgIDRLICAgICAgIC0gICAgICAgIDEgIDQwOTYKICAgICBwY2lfbGluayAgICAx NiAgICAgMksgICAgICAgLSAgICAgICAxNiAgNjQsMTI4CiAgICAgYXRrYmRkZXYgICAgIDIgICAg IDFLICAgICAgIC0gICAgICAgIDIgIDY0CiAgICAgIGFjcGlkZXYgICAxMjcgICAgIDhLICAgICAg IC0gICAgICAxMjcgIDY0CiAgICAgIENBTSBTSU0gICAgIDggICAgIDJLICAgICAgIC0gICAgICAg IDggIDI1NgogICAgICBDQU0gWFBUICAgIDM0ICAgICAzSyAgICAgICAtICAgICAgIDY5ICAxNiwz Miw2NCwxMjgsMjU2LDUxMiwxMDI0LDIwNDgKICAgICAgICAgIG52ZCAgICAgMiAgICAgMUsgICAg ICAgLSAgICAgICAgMiAgMzIsMjU2CiAgICAgICAgIG52bWUgICA3OTIgICAxMTNLICAgICAgIC0g ICAgICA3OTIgIDEyOCwxMDI0LDIwNDgKICAgICAgIGFwbWRldiAgICAgMSAgICAgMUsgICAgICAg LSAgICAgICAgMSAgMTI4CiAgIG1hZHRfdGFibGUgICAgIDAgICAgIDBLICAgICAgIC0gICAgICAg IDIgIDEyOCw0MDk2CiAgICAgICAgIGludHIgICAgIDQgICA0MDBLICAgICAgIC0gICAgICAgIDQg IDY1NTM2CiAgICAgIGlvX2FwaWMgICAgIDEgICAgMTZLICAgICAgIC0gICAgICAgIDEgIDE2Mzg0 CiAgIGxvY2FsX2FwaWMgICAgIDEgICAgMTZLICAgICAgIC0gICAgICAgIDEgIDE2Mzg0CiAgICAg ICAgICBNQ0EgICAgMTkgICAgIDRLICAgICAgIC0gICAgICAgMTkgIDY0LDEyOCwyNTYKICAgICAg ICAgY3B1cyAgICAgMiAgICAgMUsgICAgICAgLSAgICAgICAgMiAgNjQKICAgICAgICAgIG1zaSAg ICAyMCAgICAgM0sgICAgICAgLSAgICAgICAyMCAgMTI4CiAgICAgbmV4dXNkZXYgICAgIDYgICAg IDFLICAgICAgIC0gICAgICAgIDYgIDE2CiAgICAgIHNvbGFyaXMgIDc0OTIgNjk1ODdLICAgICAg IC0gICAxOTE2ODYgIDE2LDMyLDY0LDEyOCwyNTYsNTEyLDEwMjQsMjA0OCw0MDk2LDgxOTIsMTYz ODQsMzI3NjgsNjU1MzYKICAga3N0YXRfZGF0YSAgICAgOCAgICAgMUsgICAgICAgLSAgICAgICAg OCAgNjQKICAgIHNmc19ub2RlcyAgICAyMCAgICAxMEsgICAgICAgLSAgICAgICAyMCAgNTEyCiAg dG1wZnMgbW91bnQgICAgIDEgICAgIDFLICAgICAgIC0gICAgICAgIDEgIDI1NgogICBhZXNuaV9k YXRhICAgICAyICAgICAxSyAgICAgICAtICAgICAgICAyICA2NCw1MTIKICAgICAgICBsaW51eCAg MTM5MiAgIDMxNEsgICAgICAgLSAgICAgMTQwNSAgMTYsMzIsNjQsMTI4LDI1Niw1MTIsMTAyNCwy MDQ4LDQwOTYsODE5MiwzMjc2OAogbGludXhjdXJyZW50ICAgICA5ICAgICAxSyAgICAgICAtICAg ICAgIDE0ICA2NCwxMjgKICAgICAgICAgIGlkciAgICAzNyAgICAxN0sgICAgICAgLSAgICAgICAz NyAgMTI4LDUxMgogICAgICAgbGtwaWZ3ICAgICAyICAgICAxSyAgICAgICAtICAgICAgICAyICAz MgogICAgICAgICAgaWRyICAgICAxICAgICAxSyAgICAgICAtICAgICAgICAxICAxNgogICBkZWJ1 Z2ZzaW50ICAgICAxICAgICAxSyAgICAgICAtICAgICAgICAxICA2NAogICBkcm1fZHJpdmVyICAg ICAyICAgICAxSyAgICAgICAtICAgICAgICAyICAxNgoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCnZtc3RhdCAt egoKSVRFTSAgICAgICAgICAgICAgICAgICBTSVpFICBMSU1JVCAgICAgVVNFRCAgICAgRlJFRSAg ICAgIFJFUSBGQUlMIFNMRUVQCgpVTUEgS2VnczogICAgICAgICAgICAgICAyMjQsICAgICAgMCwg ICAgIDE0OCwgICAgICAgNSwgICAgIDE0OCwgICAwLCAgIDAKVU1BIFpvbmVzOiAgICAgICAgICAg ICAxMTkyLCAgICAgIDAsICAgICAxNjcsICAgICAgIDEsICAgICAxNjcsICAgMCwgICAwClVNQSBT bGFiczogICAgICAgICAgICAgICA4MCwgICAgICAwLCAgICA0NTI1LCAgICAgIDI1LCAgICA1MDY4 LCAgIDAsICAgMApVTUEgSGFzaDogICAgICAgICAgICAgICAyNTYsICAgICAgMCwgICAgICAxNCwg ICAgICAgMSwgICAgICAxNCwgICAwLCAgIDAKNCBCdWNrZXQ6ICAgICAgICAgICAgICAgIDMyLCAg ICAgIDAsICAgICAgNzUsICAgIDE1NTAsICAgIDE4NjksICAgMCwgICAwCjYgQnVja2V0OiAgICAg ICAgICAgICAgICA0OCwgICAgICAwLCAgICAgIDUwLCAgICAxNTI3LCAgICAxMzA1LCAgIDAsICAg MAo4IEJ1Y2tldDogICAgICAgICAgICAgICAgNjQsICAgICAgMCwgICAgICAxOSwgICAgMTUzMSwg ICAgIDEzOSwgIDIxLCAgIDAKMTIgQnVja2V0OiAgICAgICAgICAgICAgIDk2LCAgICAgIDAsICAg ICAgNTQsICAgICA3MjUsICAgICAzMzcsICAgMCwgICAwCjE2IEJ1Y2tldDogICAgICAgICAgICAg IDEyOCwgICAgICAwLCAgICAgIDQ0LCAgICAgNzMxLCAgICAgMzU1LCAgIDEsICAgMAozMiBCdWNr ZXQ6ICAgICAgICAgICAgICAyNTYsICAgICAgMCwgICAgICA0OCwgICAgIDMyNywgICAgIDEzNywg ICA5LCAgIDAKNjQgQnVja2V0OiAgICAgICAgICAgICAgNTEyLCAgICAgIDAsICAgICAgNzYsICAg ICAxMDgsICAgICAyMTYsICAgOSwgICAwCjEyOCBCdWNrZXQ6ICAgICAgICAgICAgMTAyNCwgICAg ICAwLCAgICAgIDg5LCAgICAgIDU1LCAgICAgMzgyLCAgIDEsICAgMAoyNTYgQnVja2V0OiAgICAg ICAgICAgIDIwNDgsICAgICAgMCwgICAgIDE1MCwgICAgICAzMCwgICAgIDUyOCwgIDU1LCAgIDAK dm1lbTogICAgICAgICAgICAgICAgICAxNzkyLCAgICAgIDAsICAgICAgIDQsICAgICAgIDQsICAg ICAgIDQsICAgMCwgICAwCnZtZW0gYnRhZzogICAgICAgICAgICAgICA1NiwgICAgICAwLCAgICA5 Mzk1LCAgICAgNjE2LCAgICA5Mzk1LCAgNzEsICAgMApWTSBPQkpFQ1Q6ICAgICAgICAgICAgICAy NTYsICAgICAgMCwgICAgIDc5NCwgICAgIDMxNiwgICAgMjAzOCwgICAwLCAgIDAKUkFESVggTk9E RTogICAgICAgICAgICAgMTQ0LCAgICAgIDAsICAgIDM4MjEsICAgICAyODMsICAgIDg2MzMsICAg MCwgICAwCk1BUDogICAgICAgICAgICAgICAgICAgIDI0MCwgICAgICAwLCAgICAgICAzLCAgICAg IDYxLCAgICAgICAzLCAgIDAsICAgMApLTUFQIEVOVFJZOiAgICAgICAgICAgICAxMjAsICAgICAg MCwgICAgICAxMSwgICAgIDM4NSwgICAgICAxMSwgICAwLCAgIDAKTUFQIEVOVFJZOiAgICAgICAg ICAgICAgMTIwLCAgICAgIDAsICAgICAxMDYsICAgIDEwNDksICAgIDQ2NDgsICAgMCwgICAwClZN U1BBQ0U6ICAgICAgICAgICAgICAgMjU2MCwgICAgICAwLCAgICAgICA0LCAgICAgIDI2LCAgICAg IDk1LCAgIDAsICAgMApmYWtlcGc6ICAgICAgICAgICAgICAgICAxMDQsICAgICAgMCwgICAgICAg MCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKNjQgcGNwdTogICAgICAgICAgICAgICAgICA4 LCAgICAgIDAsICAgIDIzNjYsICAgICA3MDYsICAgIDIzNjYsICAgMCwgICAwCm10X3N0YXRzX3pv bmU6ICAgICAgICAgICA2NCwgICAgICAwLCAgICAgNDYxLCAgICAgMzA3LCAgICAgNDYxLCAgIDAs ICAgMAptdF96b25lOiAgICAgICAgICAgICAgICAgMjQsICAgICAgMCwgICAgIDQ2MSwgICAgIDM3 NCwgICAgIDQ2MSwgICAwLCAgIDAKMTY6ICAgICAgICAgICAgICAgICAgICAgIDE2LCAgICAgIDAs ICAgIDQ0NDMsICAgIDEzMzAsICAgOTM0MzgsICAgMCwgICAwCjMyOiAgICAgICAgICAgICAgICAg ICAgICAzMiwgICAgICAwLCAgICA1NDQxLCAgICAxNDM0LCAgIDI3OTE3LCAgIDAsICAgMAo2NDog ICAgICAgICAgICAgICAgICAgICAgNjQsICAgICAgMCwgICAyMDE1NywgICAgNDI3MSwgICA3MzQz MSwgICAwLCAgIDAKMTI4OiAgICAgICAgICAgICAgICAgICAgMTI4LCAgICAgIDAsICAgMjA2NjIs ICAgICA3MjgsICAgOTY5NjMsICAgMCwgICAwCjI1NjogICAgICAgICAgICAgICAgICAgIDI1Niwg ICAgICAwLCAgICAxNzcwLCAgICAgMzE1LCAgICA4NjQ2LCAgIDAsICAgMAo1MTI6ICAgICAgICAg ICAgICAgICAgICA1MTIsICAgICAgMCwgICAgMTU0NCwgICAgIDE0NCwgICA0NTE0NCwgICAwLCAg IDAKMTAyNDogICAgICAgICAgICAgICAgICAxMDI0LCAgICAgIDAsICAgIDE2MjIsICAgICAgNzgs ICAgMTI2ODEsICAgMCwgICAwCjIwNDg6ICAgICAgICAgICAgICAgICAgMjA0OCwgICAgICAwLCAg ICAgMTk4LCAgICAgIDUyLCAgIDU2MTAyLCAgIDAsICAgMAo0MDk2OiAgICAgICAgICAgICAgICAg IDQwOTYsICAgICAgMCwgICAgIDY0MywgICAgICAzNiwgICAgMjQxMiwgICAwLCAgIDAKODE5Mjog ICAgICAgICAgICAgICAgICA4MTkyLCAgICAgIDAsICAgICAgMzQsICAgICAgMTIsICAgICA1MjUs ICAgMCwgICAwCjE2Mzg0OiAgICAgICAgICAgICAgICAxNjM4NCwgICAgICAwLCAgICAgMTY0LCAg ICAgIDExLCAgICAgNzc0LCAgIDAsICAgMAozMjc2ODogICAgICAgICAgICAgICAgMzI3NjgsICAg ICAgMCwgICAgICAyNywgICAgICAxMCwgICAgIDM5MSwgICAwLCAgIDAKNjU1MzY6ICAgICAgICAg ICAgICAgIDY1NTM2LCAgICAgIDAsICAgICAxMDAsICAgICAgMTEsICAgICA3MzIsICAgMCwgICAw ClNMRUVQUVVFVUU6ICAgICAgICAgICAgICA4MCwgICAgICAwLCAgICAgNDYxLCAgICAgNDM4LCAg ICAgNDYxLCAgIDAsICAgMApGaWxlczogICAgICAgICAgICAgICAgICAgODAsICAgICAgMCwgICAg ICAgMywgICAgIDc0NywgICAgIDk0NCwgICAwLCAgIDAKZmlsZWRlc2MwOiAgICAgICAgICAgICAx MTA0LCAgICAgIDAsICAgICAgMzMsICAgICAgNDgsICAgICAxMjMsICAgMCwgICAwCnJhbmdlc2V0 IHBjdHJpZSBub2RlczogICAgMTQ0LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAs ICAgMCwgICAwClRVUk5TVElMRTogICAgICAgICAgICAgIDEzNiwgICAgICAwLCAgICAgNDYxLCAg ICAgMjE5LCAgICAgNDYxLCAgIDAsICAgMApybF9lbnRyeTogICAgICAgICAgICAgICAgNDAsICAg ICAgMCwgICAgICAxNCwgICAgMTU4NiwgICAgICAxNCwgICAwLCAgIDAKdW10eCBwaTogICAgICAg ICAgICAgICAgIDk2LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAw CnVtdHhfc2htOiAgICAgICAgICAgICAgICA4OCwgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAg ICAgICAwLCAgIDAsICAgMApNQUMgbGFiZWxzOiAgICAgICAgICAgICAgNDAsICAgICAgMCwgICAg ICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKUFJPQzogICAgICAgICAgICAgICAgICAx MzI4LCAgICAgIDAsICAgICAgMzIsICAgICAgNDAsICAgICAxMjIsICAgMCwgICAwClRIUkVBRDog ICAgICAgICAgICAgICAgMTQwMCwgICAgICAwLCAgICAgNDMyLCAgICAgIDI4LCAgICAgNDU5LCAg IDAsICAgMApjcHVzZXQ6ICAgICAgICAgICAgICAgICAxMDQsICAgICAgMCwgICAgICAyMSwgICAg IDc1NCwgICAgICAyMSwgICAwLCAgIDAKZG9tYWluc2V0OiAgICAgICAgICAgICAgIDQwLCAgICAg IDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCmF1ZGl0X3JlY29yZDogICAg ICAgICAgMTI4MCwgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApt YnVmX3BhY2tldDogICAgICAgICAgICAyNTYsIDY0MTU1MDAsICAgICAgIDAsICAgICAgIDIsICAg ICAgIDAsICAgMCwgICAwCm1idWY6ICAgICAgICAgICAgICAgICAgIDI1NiwgNjQxNTUwMCwgICAg ICAgMSwgICAgIDI1NCwgICAgICAgMSwgICAwLCAgIDAKbWJ1Zl9jbHVzdGVyOiAgICAgICAgICAy MDQ4LCAxMDAyNDIyLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAptYnVmX2p1 bWJvX3BhZ2U6ICAgICAgIDQwOTYsIDUwMTIxMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwg ICAwLCAgIDAKbWJ1Zl9qdW1ib185azogICAgICAgICA5MjE2LCA0NDU1MTgsICAgICAgIDAsICAg ICAgIDAsICAgICAgIDAsICAgMCwgICAwCm1idWZfanVtYm9fMTZrOiAgICAgICAxNjM4NCwgMzM0 MTQwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAplcG9jaF9yZWNvcmQgcGNw dTogICAgICAyNTYsICAgICAgMCwgICAgICAgNCwgICAgICA2MCwgICAgICAgNCwgICAwLCAgIDAK RE1BUl9NQVBfRU5UUlk6ICAgICAgICAgMTIwLCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAg ICAgIDAsICAgMCwgICAwCkZQVV9zYXZlX2FyZWE6ICAgICAgICAgMTA4OCwgICAgICAwLCAgICAg ICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAp0dHlpbnE6ICAgICAgICAgICAgICAgICAx NjAsICAgICAgMCwgICAgICAxNSwgICAgICA2MCwgICAgICAxNSwgICAwLCAgIDAKdHR5b3V0cTog ICAgICAgICAgICAgICAgMjU2LCAgICAgIDAsICAgICAgIDgsICAgICAgNjcsICAgICAgIDgsICAg MCwgICAwCmdfYmlvOiAgICAgICAgICAgICAgICAgIDM3NiwgICAgICAwLCAgICAgICAwLCAgICAg MjcwLCAgICAzMTY4LCAgIDAsICAgMApudm1lX3JlcXVlc3Q6ICAgICAgICAgICAxMjgsICAgICAg MCwgICAgICAgNSwgICAgIDc3MCwgICAgNDE3NywgICAwLCAgIDAKY3J5cHRvcDogICAgICAgICAg ICAgICAgMTI4LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCmNy eXB0b2Rlc2M6ICAgICAgICAgICAgIDEyMCwgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAg ICAwLCAgIDAsICAgMApjcnlwdG9fc2Vzc2lvbjogICAgICAgICAgMjQsICAgICAgMCwgICAgICAg MCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKdnRuZXRfdHhfaGRyOiAgICAgICAgICAgIDI0 LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnRhc2txX3pvbmU6 ICAgICAgICAgICAgICA0OCwgICAgICAwLCAgICAgICAwLCAgICAxMzI4LCAgICAgMTM1LCAgIDAs ICAgMApWTk9ERTogICAgICAgICAgICAgICAgICA0ODAsICAgICAgMCwgICAgIDM4MSwgICAgICA4 MywgICAgIDQwMCwgICAwLCAgIDAKVk5PREVQT0xMOiAgICAgICAgICAgICAgMTIwLCAgICAgIDAs ICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCkJVRiBUUklFOiAgICAgICAgICAg ICAgIDE0NCwgICAgICAwLCAgICAgICAwLCAgMTAzODE1LCAgICAgICAwLCAgIDAsICAgMApTIFZG UyBDYWNoZTogICAgICAgICAgICAxMDgsICAgICAgMCwgICAgIDM2OSwgICAgIDQwMSwgICAgIDQ1 NywgICAwLCAgIDAKU1RTIFZGUyBDYWNoZTogICAgICAgICAgMTQ4LCAgICAgIDAsICAgICAgIDAs ICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCkwgVkZTIENhY2hlOiAgICAgICAgICAgIDMyOCwg ICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApMVFMgVkZTIENhY2hl OiAgICAgICAgICAzNjgsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAg IDAKTkFNRUk6ICAgICAgICAgICAgICAgICAxMDI0LCAgICAgIDAsICAgICAgIDAsICAgICAgODAs ICAgIDE1NTcsICAgMCwgICAwCnJlbnRyOiAgICAgICAgICAgICAgICAgICAyNCwgICAgICAwLCAg ICAgICAwLCAgICAgMzM0LCAgICAgICAxLCAgIDAsICAgMApESVJIQVNIOiAgICAgICAgICAgICAg IDEwMjQsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKTkNMTk9E RTogICAgICAgICAgICAgICAgNTkyLCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAs ICAgMCwgICAwCnBpcGU6ICAgICAgICAgICAgICAgICAgIDc2MCwgICAgICAwLCAgICAgICAwLCAg ICAgIDgwLCAgICAgIDMyLCAgIDAsICAgMApNb3VudHBvaW50czogICAgICAgICAgIDI3NDQsICAg ICAgMCwgICAgICAxMiwgICAgICAgNiwgICAgICAxMiwgICAwLCAgIDAKcHJvY2Rlc2M6ICAgICAg ICAgICAgICAgMTM2LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAw CnJhbmdlX3NlZ19jYWNoZTogICAgICAgICA3MiwgICAgICAwLCAgIDI3NTk2LCAgICAgNjE5LCAg IDMwNDg4LCAgIDAsICAgMAptZXRhc2xhYl9hbGxvY190cmFjZV9jYWNoZTogICAgIDcyLCAgICAg IDAsICAgICAgIDAsICAgICA3NzAsICAgICAxMTIsICAgMCwgICAwCnppb19jYWNoZTogICAgICAg ICAgICAgMTA0OCwgICAgICAwLCAgICAgIDEwLCAgICAgMTUyLCAgIDEyNDUzLCAgIDAsICAgMAp6 aW9fbGlua19jYWNoZTogICAgICAgICAgNDgsICAgICAgMCwgICAgICAgMCwgICAgMTU3NywgICAg NzE0NSwgICAwLCAgIDAKbHo0X2N0eDogICAgICAgICAgICAgIDE2Mzg0LCAgICAgIDAsICAgICAg IDAsICAgICAgIDYsICAgICAgNzYsICAgMCwgICAwCmFiZF9jaHVuazogICAgICAgICAgICAgNDA5 NiwgICAgICAwLCAgICAyMzgzLCAgICAgIDExLCAgIDEwMTY5LCAgIDAsICAgMApzYV9jYWNoZTog ICAgICAgICAgICAgICAxNDQsICAgICAgMCwgICAgIDM2MCwgICAgIDIwNywgICAgIDM3OCwgICAw LCAgIDAKZG5vZGVfdDogICAgICAgICAgICAgICAgNzI4LCAgICAgIDAsICAgICA2NzcsICAgICAg MjgsICAgIDEyNTcsICAgMCwgICAwCmFyY19idWZfaGRyX3RfZnVsbDogICAgIDI1NiwgICAgICAw LCAgICAgNzg1LCAgICAgMjA1LCAgICA0NDAxLCAgIDAsICAgMAphcmNfYnVmX2hkcl90X2wyb25s eTogICAgIDk2LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCmFy Y19idWZfdDogICAgICAgICAgICAgICA2NCwgICAgICAwLCAgICAgMjUwLCAgICAxNTQ4LCAgICA0 OTM3LCAgIDAsICAgMApkbXVfYnVmX2ltcGxfdDogICAgICAgICAyNDAsICAgICAgMCwgICAgIDc3 NiwgICAgIDQ1NiwgICAgNTE4MiwgICAwLCAgIDAKemlsX2x3Yl9jYWNoZTogICAgICAgICAgMzIw LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnppbF96Y3dfY2Fj aGU6ICAgICAgICAgICA4MCwgICAgICAwLCAgICAgICAwLCAgICAgMTUwLCAgICAgICAxLCAgIDAs ICAgMApzaW9fY2FjaGU6ICAgICAgICAgICAgICAxMjgsICAgICAgMCwgICAgICAgMCwgICAgICAg MCwgICAgICAgMCwgICAwLCAgIDAKemZzX3pub2RlX2NhY2hlOiAgICAgICAgMjcyLCAgICAgIDAs ICAgICAzNjAsICAgICAxMTYsICAgICAzNzgsICAgMCwgICAwCkFJTzogICAgICAgICAgICAgICAg ICAgIDIwOCwgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApBSU9Q OiAgICAgICAgICAgICAgICAgICAgMzIsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAg MCwgICAwLCAgIDAKQUlPQ0I6ICAgICAgICAgICAgICAgICAgNzUyLCAgICAgIDAsICAgICAgIDAs ICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCkFJT0xJTzogICAgICAgICAgICAgICAgIDI4MCwg ICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAprc2lnaW5mbzogICAg ICAgICAgICAgICAxMTIsICAgICAgMCwgICAgICAyMywgICAgMTAyNywgICAgICAyMywgICAwLCAg IDAKaXRpbWVyOiAgICAgICAgICAgICAgICAgMzUyLCAgICAgIDAsICAgICAgIDAsICAgICAgIDAs ICAgICAgIDAsICAgMCwgICAwCktOT1RFOiAgICAgICAgICAgICAgICAgIDE2MCwgICAgICAwLCAg ICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApzb2NrZXQ6ICAgICAgICAgICAgICAg ICA4NzIsIDUxNTY4OCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKaXBxOiAg ICAgICAgICAgICAgICAgICAgIDU2LCAgMzEzODIsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAs ICAgMCwgICAwCnVkcF9pbnBjYjogICAgICAgICAgICAgIDQ4OCwgNTE1Njg4LCAgICAgICAwLCAg ICAgICAwLCAgICAgICAwLCAgIDAsICAgMAp1ZHBjYjogICAgICAgICAgICAgICAgICAgMzIsIDUx NTc1MCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKdGNwX2lucGNiOiAgICAg ICAgICAgICAgNDg4LCA1MTU2ODgsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAw CnRjcGNiOiAgICAgICAgICAgICAgICAgIDk3NiwgNTE1Njg4LCAgICAgICAwLCAgICAgICAwLCAg ICAgICAwLCAgIDAsICAgMAp0Y3B0dzogICAgICAgICAgICAgICAgICAgODgsICAyNzgxMCwgICAg ICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKc3luY2FjaGU6ICAgICAgICAgICAgICAg MTY4LCAgMTUzNjQsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCmhvc3RjYWNo ZTogICAgICAgICAgICAgICA5NiwgIDE1Mzc1LCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAg IDAsICAgMApzYWNraG9sZTogICAgICAgICAgICAgICAgMzIsICAgICAgMCwgICAgICAgMCwgICAg ICAgMCwgICAgICAgMCwgICAwLCAgIDAKdGZvOiAgICAgICAgICAgICAgICAgICAgICA0LCAgICAg IDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnRmb19jY2FjaGVfZW50cmll czogICAgICA4MCwgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAp0 Y3ByZWFzczogICAgICAgICAgICAgICAgNDgsICA2MjY2NSwgICAgICAgMCwgICAgICAgMCwgICAg ICAgMCwgICAwLCAgIDAKdGNwX2xvZzogICAgICAgICAgICAgICAgNDAwLCAxMDAwMDAwLCAgICAg ICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMAp0Y3BfbG9nX2J1Y2tldDogICAgICAgICAx NDQsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKdGNwX2xvZ19u b2RlOiAgICAgICAgICAgMTIwLCAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAg MCwgICAwCnNjdHBfZXA6ICAgICAgICAgICAgICAgMTI4MCwgNTE1Njg4LCAgICAgICAwLCAgICAg ICAwLCAgICAgICAwLCAgIDAsICAgMApzY3RwX2Fzb2M6ICAgICAgICAgICAgIDI0MDgsICA0MDAw MCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKc2N0cF9sYWRkcjogICAgICAg ICAgICAgIDQ4LCAgODAwMTIsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnNj dHBfcmFkZHI6ICAgICAgICAgICAgIDczNiwgIDgwMDAwLCAgICAgICAwLCAgICAgICAwLCAgICAg ICAwLCAgIDAsICAgMApzY3RwX2NodW5rOiAgICAgICAgICAgICAxNTIsIDQwMDAxMCwgICAgICAg MCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKc2N0cF9yZWFkcTogICAgICAgICAgICAgMTUy LCA0MDAwMTAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnNjdHBfc3RyZWFt X21zZ19vdXQ6ICAgIDExMiwgNDAwMDE1LCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAs ICAgMApzY3RwX2FzY29uZjogICAgICAgICAgICAgNDAsIDQwMDAwMCwgICAgICAgMCwgICAgICAg MCwgICAgICAgMCwgICAwLCAgIDAKc2N0cF9hc2NvbmZfYWNrOiAgICAgICAgIDQ4LCA0MDAwNjAs ICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnVkcGxpdGVfaW5wY2I6ICAgICAg ICAgIDQ4OCwgNTE1Njg4LCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApyaXBj YjogICAgICAgICAgICAgICAgICA0ODgsIDUxNTY4OCwgICAgICAgMCwgICAgICAgMCwgICAgICAg MCwgICAwLCAgIDAKdW5wY2I6ICAgICAgICAgICAgICAgICAgMjU2LCA1MTU3MDAsICAgICAgIDAs ICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCklQc2VjIFNBIGxmdF9jOiAgICAgICAgICAxNiwg ICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApydGVudHJ5OiAgICAg ICAgICAgICAgICAyMDgsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAg IDAKYnJpZGdlX3J0bm9kZTogICAgICAgICAgIDY0LCAgICAgIDAsICAgICAgIDAsICAgICAgIDAs ICAgICAgIDAsICAgMCwgICAwCnNlbGZkOiAgICAgICAgICAgICAgICAgICA2NCwgICAgICAwLCAg ICAgICAwLCAgICAgICAwLCAgICAgICAwLCAgIDAsICAgMApzd3BjdHJpZTogICAgICAgICAgICAg ICAxNDQsIDIwMDUxODIsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCnN3Ymxr OiAgICAgICAgICAgICAgICAgIDEzNiwgMjAwNTE3NiwgICAgICAgMCwgICAgICAgMCwgICAgICAg MCwgICAwLCAgIDAKVE1QRlMgZGlyZW50OiAgICAgICAgICAgIDY0LCAgICAgIDAsICAgICAgIDAs ICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwClRNUEZTIG5vZGU6ICAgICAgICAgICAgIDIzMiwg ICAgICAwLCAgICAgICAxLCAgICAgIDY3LCAgICAgICAxLCAgIDAsICAgMApkcm1fc2NoZWRfZmVu Y2U6ICAgICAgICAzMzYsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAg IDAKZHJtX2k5MTVfZ2VtX29iamVjdDogICAgNzYwLCAgICAgIDAsICAgICAgMjUsICAgICAgIDUs ICAgICAgMjUsICAgMCwgICAwCmk5MTVfdm1hOiAgICAgICAgICAgICAgIDY0OCwgICAgICAwLCAg ICAgIDI1LCAgICAgICA1LCAgICAgIDI1LCAgIDAsICAgMAppOTE1X2x1dF9oYW5kbGU6ICAgICAg ICAgNDgsICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKZHJtX2k5 MTVfZ2VtX3JlcXVlc3Q6ICAgIDY5NiwgICAgICAwLCAgICAgICAxLCAgICAgIDE0LCAgICAgICAx LCAgIDAsICAgMAppOTE1X2RlcGVuZGVuY3k6ICAgICAgICAgNjQsICAgICAgMCwgICAgICAgMCwg ICAgICAgMCwgICAgICAgMCwgICAwLCAgIDAKaTkxNV9wcmlvbGlzdDogICAgICAgICAgIDQ4LCAg ICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgICAgIDAsICAgMCwgICAwCgoKLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tCnZtc3RhdCAtaQoKaW50ZXJydXB0ICAgICAgICAgICAgICAgICAgICAgICAgICB0b3RhbCAg ICAgICByYXRlCmlycTE6IGF0a2JkMCAgICAgICAgICAgICAgICAgICAgICAgICAgIDIgICAgICAg ICAgMAppcnE5OiBhY3BpMCAgICAgICAgICAgICAgICAgICAgICAgICAgICA0ICAgICAgICAgIDAK Y3B1MDp0aW1lciAgICAgICAgICAgICAgICAgICAgICAgICAgIDY4MCAgICAgICAgIDI3CmNwdTE6 dGltZXIgICAgICAgICAgICAgICAgICAgICAgICAgICA0MzAgICAgICAgICAxNwpjcHUyOnRpbWVy ICAgICAgICAgICAgICAgICAgICAgICAgICAgMzM4ICAgICAgICAgMTMKY3B1Mzp0aW1lciAgICAg ICAgICAgICAgICAgICAgICAgICAgIDUwOCAgICAgICAgIDIwCmNwdTQ6dGltZXIgICAgICAgICAg ICAgICAgICAgICAgICAgICAzOTAgICAgICAgICAxNQpjcHU1OnRpbWVyICAgICAgICAgICAgICAg ICAgICAgICAgICAgMzI1ICAgICAgICAgMTMKaXJxMjY0OiB4aGNpMCAgICAgICAgICAgICAgICAg ICAgICAgIDEwNyAgICAgICAgICA0CmlycTI2NTogYWhjaTAgICAgICAgICAgICAgICAgICAgICAg ICAgMzcgICAgICAgICAgMQppcnEyNjg6IG52bWUwOmFkbWluICAgICAgICAgICAgICAgICAgIDE4 ICAgICAgICAgIDEKaXJxMjY5OiBudm1lMDppbzAgICAgICAgICAgICAgICAgICAgIDE5MSAgICAg ICAgICA3CmlycTI3MDogbnZtZTA6aW8xICAgICAgICAgICAgICAgICAgICAgNzEgICAgICAgICAg MwppcnEyNzE6IG52bWUwOmlvMiAgICAgICAgICAgICAgICAgICAgMTQ2ICAgICAgICAgIDYKaXJx MjcyOiBudm1lMDppbzMgICAgICAgICAgICAgICAgICAgIDE4MiAgICAgICAgICA3CmlycTI3Mzog bnZtZTA6aW80ICAgICAgICAgICAgICAgICAgICAyNTAgICAgICAgICAxMAppcnEyNzQ6IG52bWUw OmlvNSAgICAgICAgICAgICAgICAgICAgMTU3ICAgICAgICAgIDYKaXJxMjc1OiBoZGFjMCAgICAg ICAgICAgICAgICAgICAgICAgICA0MCAgICAgICAgICAyClRvdGFsICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgIDM4NzYgICAgICAgIDE1MQoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCnBzdGF0IC1UCgog IDMvNTE1Njg1IGZpbGVzCjBNLzBNIHN3YXAgc3BhY2UKCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQpwc3RhdCAt cwoKRGV2aWNlICAgICAgICAgIDUxMi1ibG9ja3MgICAgIFVzZWQgICAgQXZhaWwgQ2FwYWNpdHkK Ci0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLQppb3N0YXQKCiAgICAgICB0dHkgICAgICAgICAgICBudmQwICAgICAg ICAgICAgIGFkYTAgICAgICAgICAgICBwYXNzMCAgICAgICAgICAgICBjcHUKIHRpbiAgdG91dCAg S0IvdCB0cHMgIE1CL3MgICBLQi90IHRwcyAgTUIvcyAgIEtCL3QgdHBzICBNQi9zICB1cyBuaSBz eSBpbiBpZAogICAwICAgMTA4IDM1Ljk0IDE5OSAgNy4wMCAgMTYuMzQgICA2ICAwLjEwICAgMC4w MCAgIDAgIDAuMDAgICAwICAwICA0ICAxIDk2CgotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KaXBjcyAtYQoKTWVz c2FnZSBRdWV1ZXM6ClQgICAgICAgICAgIElEICAgICAgICAgIEtFWSBNT0RFICAgICAgICBPV05F UiAgICBHUk9VUCAgICBDUkVBVE9SICBDR1JPVVAgICAgICAgICAgICAgICAgIENCWVRFUyAgICAg ICAgICAgICAgICAgUU5VTSAgICAgICAgICAgICAgIFFCWVRFUyAgICAgICAgTFNQSUQgICAgICAg IExSUElEIFNUSU1FICAgIFJUSU1FICAgIENUSU1FICAgCgpTaGFyZWQgTWVtb3J5OgpUICAgICAg ICAgICBJRCAgICAgICAgICBLRVkgTU9ERSAgICAgICAgT1dORVIgICAgR1JPVVAgICAgQ1JFQVRP UiAgQ0dST1VQICAgICAgICAgTkFUVENIICAgICAgICBTRUdTWiAgICAgICAgIENQSUQgICAgICAg ICBMUElEIEFUSU1FICAgIERUSU1FICAgIENUSU1FICAgCgpTZW1hcGhvcmVzOgpUICAgICAgICAg ICBJRCAgICAgICAgICBLRVkgTU9ERSAgICAgICAgT1dORVIgICAgR1JPVVAgICAgQ1JFQVRPUiAg Q0dST1VQICAgICAgICAgIE5TRU1TIE9USU1FICAgIENUSU1FICAgCgoKLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t CmlwY3MgLVQKCm1zZ2luZm86Cgltc2dtYXg6ICAgICAgICAxNjM4NAkobWF4IGNoYXJhY3RlcnMg aW4gYSBtZXNzYWdlKQoJbXNnbW5pOiAgICAgICAgICAgNDAJKCMgb2YgbWVzc2FnZSBxdWV1ZXMp Cgltc2dtbmI6ICAgICAgICAgMjA0OAkobWF4IGNoYXJhY3RlcnMgaW4gYSBtZXNzYWdlIHF1ZXVl KQoJbXNndHFsOiAgICAgICAgICAgNDAJKG1heCAjIG9mIG1lc3NhZ2VzIGluIHN5c3RlbSkKCW1z Z3NzejogICAgICAgICAgICA4CShzaXplIG9mIGEgbWVzc2FnZSBzZWdtZW50KQoJbXNnc2VnOiAg ICAgICAgIDIwNDgJKCMgb2YgbWVzc2FnZSBzZWdtZW50cyBpbiBzeXN0ZW0pCgpzaG1pbmZvOgoJ c2htbWF4OiAgICA1MzY4NzA5MTIJKG1heCBzaGFyZWQgbWVtb3J5IHNlZ21lbnQgc2l6ZSkKCXNo bW1pbjogICAgICAgICAgICAxCShtaW4gc2hhcmVkIG1lbW9yeSBzZWdtZW50IHNpemUpCglzaG1t bmk6ICAgICAgICAgIDE5MgkobWF4IG51bWJlciBvZiBzaGFyZWQgbWVtb3J5IGlkZW50aWZpZXJz KQoJc2htc2VnOiAgICAgICAgICAxMjgJKG1heCBzaGFyZWQgbWVtb3J5IHNlZ21lbnRzIHBlciBw cm9jZXNzKQoJc2htYWxsOiAgICAgICAxMzEwNzIJKG1heCBhbW91bnQgb2Ygc2hhcmVkIG1lbW9y eSBpbiBwYWdlcykKCnNlbWluZm86CglzZW1tbmk6ICAgICAgICAgICA1MAkoIyBvZiBzZW1hcGhv cmUgaWRlbnRpZmllcnMpCglzZW1tbnM6ICAgICAgICAgIDM0MAkoIyBvZiBzZW1hcGhvcmVzIGlu IHN5c3RlbSkKCXNlbW1udTogICAgICAgICAgMTUwCSgjIG9mIHVuZG8gc3RydWN0dXJlcyBpbiBz eXN0ZW0pCglzZW1tc2w6ICAgICAgICAgIDM0MAkobWF4ICMgb2Ygc2VtYXBob3JlcyBwZXIgaWQp CglzZW1vcG06ICAgICAgICAgIDEwMAkobWF4ICMgb2Ygb3BlcmF0aW9ucyBwZXIgc2Vtb3AgY2Fs bCkKCXNlbXVtZTogICAgICAgICAgIDUwCShtYXggIyBvZiB1bmRvIGVudHJpZXMgcGVyIHByb2Nl c3MpCglzZW11c3o6ICAgICAgICAgIDYzMgkoc2l6ZSBpbiBieXRlcyBvZiB1bmRvIHN0cnVjdHVy ZSkKCXNlbXZteDogICAgICAgIDMyNzY3CShzZW1hcGhvcmUgbWF4aW11bSB2YWx1ZSkKCXNlbWFl bTogICAgICAgIDE2Mzg0CShhZGp1c3Qgb24gZXhpdCBtYXggdmFsdWUpCgoKLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tCm5mc3N0YXQKClJwYyBDb3VudHM6CiAgICAgIEdldGF0dHIgICAgICBTZXRhdHRyICAgICAg IExvb2t1cCAgICAgUmVhZGxpbmsgICAgICAgICBSZWFkICAgICAgICBXcml0ZSAgICAgICBDcmVh dGUgICAgICAgUmVtb3ZlCiAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAg ICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAg ICAgICAwCiAgICAgICBSZW5hbWUgICAgICAgICBMaW5rICAgICAgU3ltbGluayAgICAgICAgTWtk aXIgICAgICAgIFJtZGlyICAgICAgUmVhZGRpciAgICAgUmRpclBsdXMgICAgICAgQWNjZXNzCiAg ICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAg ICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwCiAgICAgICAgTWtu b2QgICAgICAgRnNzdGF0ICAgICAgIEZzaW5mbyAgICAgUGF0aENvbmYgICAgICAgQ29tbWl0CiAg ICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAg ICAgICAwClJwYyBJbmZvOgogICAgIFRpbWVkT3V0ICAgICAgSW52YWxpZCAgICBYIFJlcGxpZXMg ICAgICBSZXRyaWVzICAgICBSZXF1ZXN0cwogICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAg ICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMApDYWNoZSBJbmZvOgogICAgQXR0ciBI aXRzICBBdHRyIE1pc3NlcyAgICBMa3VwIEhpdHMgIExrdXAgTWlzc2VzICAgIEJpb1IgSGl0cyAg QmlvUiBNaXNzZXMgICAgQmlvVyBIaXRzICBCaW9XIE1pc3NlcwogICAgICAgICAgICAwICAgICAg ICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAg IDAgICAgICAgICAgICAwICAgICAgICAgICAgMAogICBCaW9STCBIaXRzIEJpb1JMIE1pc3NlcyAg ICBCaW9EIEhpdHMgIEJpb0QgTWlzc2VzICAgIERpckUgSGl0cyAgRGlyRSBNaXNzZXMgICAgQWNj cyBIaXRzICBBY2NzIE1pc3NlcwogICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAg IDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAg ICAgICAgICAgMApTZXJ2ZXIgSW5mbzoKICAgICAgR2V0YXR0ciAgICAgIFNldGF0dHIgICAgICAg TG9va3VwICAgICBSZWFkbGluayAgICAgICAgIFJlYWQgICAgICAgIFdyaXRlICAgICAgIENyZWF0 ZSAgICAgICBSZW1vdmUKICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAg ICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAg ICAgIDAKICAgICAgIFJlbmFtZSAgICAgICAgIExpbmsgICAgICBTeW1saW5rICAgICAgICBNa2Rp ciAgICAgICAgUm1kaXIgICAgICBSZWFkZGlyICAgICBSZGlyUGx1cyAgICAgICBBY2Nlc3MKICAg ICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAg ICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAgICAgIDAKICAgICAgICBNa25v ZCAgICAgICBGc3N0YXQgICAgICAgRnNpbmZvICAgICBQYXRoQ29uZiAgICAgICBDb21taXQKICAg ICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMCAgICAgICAg ICAgIDAKU2VydmVyIFJlLUZhaWxlZDoKICAxNDA3Mzc0ODgzNDY4MTYKU2VydmVyIEZhdWx0czoK MTQwNzM3NDg4MzQ2ODE2ClNlcnZlciBXcml0ZSAKICAgICBXcml0ZU9wcyAgICAgV3JpdGVSUEMg ICAgICBPcHNhdmVkCiAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAgMApTZXJ2 ZXIgQ2FjaGUgCiAgICAgICBJbnByb2cgICAgICAgICBJZGVtICAgICBOb24tSWRlbSAgICAgICBN aXNzZXMKICAgICAgICAgICAgMCAgICAgICAgICAgIDAgICAgICAgICAgICAwICAgICAgICAgICAg MAoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tCm5ldHN0YXQgLXMKCnRjcDoKCTAgcGFja2V0cyBzZW50CgkJMCBk YXRhIHBhY2tldHMgKDAgYnl0ZXMpCgkJMCBkYXRhIHBhY2tldHMgKDAgYnl0ZXMpIHJldHJhbnNt aXR0ZWQKCQkwIGRhdGEgcGFja2V0cyB1bm5lY2Vzc2FyaWx5IHJldHJhbnNtaXR0ZWQKCQkwIHJl c2VuZHMgaW5pdGlhdGVkIGJ5IE1UVSBkaXNjb3ZlcnkKCQkwIGFjay1vbmx5IHBhY2tldHMgKDAg ZGVsYXllZCkKCQkwIFVSRyBvbmx5IHBhY2tldHMKCQkwIHdpbmRvdyBwcm9iZSBwYWNrZXRzCgkJ MCB3aW5kb3cgdXBkYXRlIHBhY2tldHMKCQkwIGNvbnRyb2wgcGFja2V0cwoJMCBwYWNrZXRzIHJl Y2VpdmVkCgkJMCBhY2tzIChmb3IgMCBieXRlcykKCQkwIGR1cGxpY2F0ZSBhY2tzCgkJMCBhY2tz IGZvciB1bnNlbnQgZGF0YQoJCTAgcGFja2V0cyAoMCBieXRlcykgcmVjZWl2ZWQgaW4tc2VxdWVu Y2UKCQkwIGNvbXBsZXRlbHkgZHVwbGljYXRlIHBhY2tldHMgKDAgYnl0ZXMpCgkJMCBvbGQgZHVw bGljYXRlIHBhY2tldHMKCQkwIHBhY2tldHMgd2l0aCBzb21lIGR1cC4gZGF0YSAoMCBieXRlcyBk dXBlZCkKCQkwIG91dC1vZi1vcmRlciBwYWNrZXRzICgwIGJ5dGVzKQoJCTAgcGFja2V0cyAoMCBi eXRlcykgb2YgZGF0YSBhZnRlciB3aW5kb3cKCQkwIHdpbmRvdyBwcm9iZXMKCQkwIHdpbmRvdyB1 cGRhdGUgcGFja2V0cwoJCTAgcGFja2V0cyByZWNlaXZlZCBhZnRlciBjbG9zZQoJCTAgZGlzY2Fy ZGVkIGZvciBiYWQgY2hlY2tzdW1zCgkJMCBkaXNjYXJkZWQgZm9yIGJhZCBoZWFkZXIgb2Zmc2V0 IGZpZWxkcwoJCTAgZGlzY2FyZGVkIGJlY2F1c2UgcGFja2V0IHRvbyBzaG9ydAoJCTAgZGlzY2Fy ZGVkIGR1ZSB0byBtZW1vcnkgcHJvYmxlbXMKCTAgY29ubmVjdGlvbiByZXF1ZXN0cwoJMCBjb25u ZWN0aW9uIGFjY2VwdHMKCTAgYmFkIGNvbm5lY3Rpb24gYXR0ZW1wdHMKCTAgbGlzdGVuIHF1ZXVl IG92ZXJmbG93cwoJMCBpZ25vcmVkIFJTVHMgaW4gdGhlIHdpbmRvd3MKCTAgY29ubmVjdGlvbnMg ZXN0YWJsaXNoZWQgKGluY2x1ZGluZyBhY2NlcHRzKQoJCTAgdGltZXMgdXNlZCBSVFQgZnJvbSBo b3N0Y2FjaGUKCQkwIHRpbWVzIHVzZWQgUlRUIHZhcmlhbmNlIGZyb20gaG9zdGNhY2hlCgkJMCB0 aW1lcyB1c2VkIHNsb3ctc3RhcnQgdGhyZXNob2xkIGZyb20gaG9zdGNhY2hlCgkwIGNvbm5lY3Rp b25zIGNsb3NlZCAoaW5jbHVkaW5nIDAgZHJvcHMpCgkJMCBjb25uZWN0aW9ucyB1cGRhdGVkIGNh Y2hlZCBSVFQgb24gY2xvc2UKCQkwIGNvbm5lY3Rpb25zIHVwZGF0ZWQgY2FjaGVkIFJUVCB2YXJp YW5jZSBvbiBjbG9zZQoJCTAgY29ubmVjdGlvbnMgdXBkYXRlZCBjYWNoZWQgc3N0aHJlc2ggb24g Y2xvc2UKCTAgZW1icnlvbmljIGNvbm5lY3Rpb25zIGRyb3BwZWQKCTAgc2VnbWVudHMgdXBkYXRl ZCBydHQgKG9mIDAgYXR0ZW1wdHMpCgkwIHJldHJhbnNtaXQgdGltZW91dHMKCQkwIGNvbm5lY3Rp b25zIGRyb3BwZWQgYnkgcmV4bWl0IHRpbWVvdXQKCTAgcGVyc2lzdCB0aW1lb3V0cwoJCTAgY29u bmVjdGlvbnMgZHJvcHBlZCBieSBwZXJzaXN0IHRpbWVvdXQKCTAgQ29ubmVjdGlvbnMgKGZpbl93 YWl0XzIpIGRyb3BwZWQgYmVjYXVzZSBvZiB0aW1lb3V0CgkwIGtlZXBhbGl2ZSB0aW1lb3V0cwoJ CTAga2VlcGFsaXZlIHByb2JlcyBzZW50CgkJMCBjb25uZWN0aW9ucyBkcm9wcGVkIGJ5IGtlZXBh bGl2ZQoJMCBjb3JyZWN0IEFDSyBoZWFkZXIgcHJlZGljdGlvbnMKCTAgY29ycmVjdCBkYXRhIHBh Y2tldCBoZWFkZXIgcHJlZGljdGlvbnMKCTAgc3luY2FjaGUgZW50cmllcyBhZGRlZAoJCTAgcmV0 cmFuc21pdHRlZAoJCTAgZHVwc3luCgkJMCBkcm9wcGVkCgkJMCBjb21wbGV0ZWQKCQkwIGJ1Y2tl dCBvdmVyZmxvdwoJCTAgY2FjaGUgb3ZlcmZsb3cKCQkwIHJlc2V0CgkJMCBzdGFsZQoJCTAgYWJv cnRlZAoJCTAgYmFkYWNrCgkJMCB1bnJlYWNoCgkJMCB6b25lIGZhaWx1cmVzCgkwIGNvb2tpZXMg c2VudAoJMCBjb29raWVzIHJlY2VpdmVkCgkwIGhvc3RjYWNoZSBlbnRyaWVzIGFkZGVkCgkJMCBi dWNrZXQgb3ZlcmZsb3cKCTAgU0FDSyByZWNvdmVyeSBlcGlzb2RlcwoJMCBzZWdtZW50IHJleG1p dHMgaW4gU0FDSyByZWNvdmVyeSBlcGlzb2RlcwoJMCBieXRlIHJleG1pdHMgaW4gU0FDSyByZWNv dmVyeSBlcGlzb2RlcwoJMCBTQUNLIG9wdGlvbnMgKFNBQ0sgYmxvY2tzKSByZWNlaXZlZAoJMCBT QUNLIG9wdGlvbnMgKFNBQ0sgYmxvY2tzKSBzZW50CgkwIFNBQ0sgc2NvcmVib2FyZCBvdmVyZmxv dwoJMCBwYWNrZXRzIHdpdGggRUNOIENFIGJpdCBzZXQKCTAgcGFja2V0cyB3aXRoIEVDTiBFQ1Qo MCkgYml0IHNldAoJMCBwYWNrZXRzIHdpdGggRUNOIEVDVCgxKSBiaXQgc2V0CgkwIHN1Y2Nlc3Nm dWwgRUNOIGhhbmRzaGFrZXMKCTAgdGltZXMgRUNOIHJlZHVjZWQgdGhlIGNvbmdlc3Rpb24gd2lu ZG93CgkwIHBhY2tldHMgd2l0aCBtYXRjaGluZyBzaWduYXR1cmUgcmVjZWl2ZWQKCTAgcGFja2V0 cyB3aXRoIGJhZCBzaWduYXR1cmUgcmVjZWl2ZWQKCTAgdGltZXMgZmFpbGVkIHRvIG1ha2Ugc2ln bmF0dXJlIGR1ZSB0byBubyBTQQoJMCB0aW1lcyB1bmV4cGVjdGVkIHNpZ25hdHVyZSByZWNlaXZl ZAoJMCB0aW1lcyBubyBzaWduYXR1cmUgcHJvdmlkZWQgYnkgc2VnbWVudAoJMCBQYXRoIE1UVSBk aXNjb3ZlcnkgYmxhY2sgaG9sZSBkZXRlY3Rpb24gYWN0aXZhdGlvbnMKCTAgUGF0aCBNVFUgZGlz Y292ZXJ5IGJsYWNrIGhvbGUgZGV0ZWN0aW9uIG1pbiBNU1MgYWN0aXZhdGlvbnMKCTAgUGF0aCBN VFUgZGlzY292ZXJ5IGJsYWNrIGhvbGUgZGV0ZWN0aW9uIGZhaWx1cmVzClRDUCBjb25uZWN0aW9u IGNvdW50IGJ5IHN0YXRlOgoJMCBjb25uZWN0aW9ucyBpbiBDTE9TRUQgc3RhdGUKCTAgY29ubmVj dGlvbnMgaW4gTElTVEVOIHN0YXRlCgkwIGNvbm5lY3Rpb25zIGluIFNZTl9TRU5UIHN0YXRlCgkw IGNvbm5lY3Rpb25zIGluIFNZTl9SQ1ZEIHN0YXRlCgkwIGNvbm5lY3Rpb25zIGluIEVTVEFCTElT SEVEIHN0YXRlCgkwIGNvbm5lY3Rpb25zIGluIENMT1NFX1dBSVQgc3RhdGUKCTAgY29ubmVjdGlv bnMgaW4gRklOX1dBSVRfMSBzdGF0ZQoJMCBjb25uZWN0aW9ucyBpbiBDTE9TSU5HIHN0YXRlCgkw IGNvbm5lY3Rpb25zIGluIExBU1RfQUNLIHN0YXRlCgkwIGNvbm5lY3Rpb25zIGluIEZJTl9XQUlU XzIgc3RhdGUKCTAgY29ubmVjdGlvbnMgaW4gVElNRV9XQUlUIHN0YXRlCnVkcDoKCTAgZGF0YWdy YW1zIHJlY2VpdmVkCgkwIHdpdGggaW5jb21wbGV0ZSBoZWFkZXIKCTAgd2l0aCBiYWQgZGF0YSBs ZW5ndGggZmllbGQKCTAgd2l0aCBiYWQgY2hlY2tzdW0KCTAgd2l0aCBubyBjaGVja3N1bQoJMCBk cm9wcGVkIGR1ZSB0byBubyBzb2NrZXQKCTAgYnJvYWRjYXN0L211bHRpY2FzdCBkYXRhZ3JhbXMg dW5kZWxpdmVyZWQKCTAgZHJvcHBlZCBkdWUgdG8gZnVsbCBzb2NrZXQgYnVmZmVycwoJMCBub3Qg Zm9yIGhhc2hlZCBwY2IKCTAgZGVsaXZlcmVkCgkwIGRhdGFncmFtcyBvdXRwdXQKCTAgdGltZXMg bXVsdGljYXN0IHNvdXJjZSBmaWx0ZXIgbWF0Y2hlZAppcDoKCTAgdG90YWwgcGFja2V0cyByZWNl aXZlZAoJMCBiYWQgaGVhZGVyIGNoZWNrc3VtcwoJMCB3aXRoIHNpemUgc21hbGxlciB0aGFuIG1p bmltdW0KCTAgd2l0aCBkYXRhIHNpemUgPCBkYXRhIGxlbmd0aAoJMCB3aXRoIGlwIGxlbmd0aCA+ IG1heCBpcCBwYWNrZXQgc2l6ZQoJMCB3aXRoIGhlYWRlciBsZW5ndGggPCBkYXRhIHNpemUKCTAg d2l0aCBkYXRhIGxlbmd0aCA8IGhlYWRlciBsZW5ndGgKCTAgd2l0aCBiYWQgb3B0aW9ucwoJMCB3 aXRoIGluY29ycmVjdCB2ZXJzaW9uIG51bWJlcgoJMCBmcmFnbWVudHMgcmVjZWl2ZWQKCTAgZnJh Z21lbnRzIGRyb3BwZWQgKGR1cCBvciBvdXQgb2Ygc3BhY2UpCgkwIGZyYWdtZW50cyBkcm9wcGVk IGFmdGVyIHRpbWVvdXQKCTAgcGFja2V0cyByZWFzc2VtYmxlZCBvawoJMCBwYWNrZXRzIGZvciB0 aGlzIGhvc3QKCTAgcGFja2V0cyBmb3IgdW5rbm93bi91bnN1cHBvcnRlZCBwcm90b2NvbAoJMCBw YWNrZXRzIGZvcndhcmRlZCAoMCBwYWNrZXRzIGZhc3QgZm9yd2FyZGVkKQoJMCBwYWNrZXRzIG5v dCBmb3J3YXJkYWJsZQoJMCBwYWNrZXRzIHJlY2VpdmVkIGZvciB1bmtub3duIG11bHRpY2FzdCBn cm91cAoJMCByZWRpcmVjdHMgc2VudAoJMCBwYWNrZXRzIHNlbnQgZnJvbSB0aGlzIGhvc3QKCTAg cGFja2V0cyBzZW50IHdpdGggZmFicmljYXRlZCBpcCBoZWFkZXIKCTAgb3V0cHV0IHBhY2tldHMg ZHJvcHBlZCBkdWUgdG8gbm8gYnVmcywgZXRjLgoJMCBvdXRwdXQgcGFja2V0cyBkaXNjYXJkZWQg ZHVlIHRvIG5vIHJvdXRlCgkwIG91dHB1dCBkYXRhZ3JhbXMgZnJhZ21lbnRlZAoJMCBmcmFnbWVu dHMgY3JlYXRlZAoJMCBkYXRhZ3JhbXMgdGhhdCBjYW4ndCBiZSBmcmFnbWVudGVkCgkwIHR1bm5l bGluZyBwYWNrZXRzIHRoYXQgY2FuJ3QgZmluZCBnaWYKCTAgZGF0YWdyYW1zIHdpdGggYmFkIGFk ZHJlc3MgaW4gaGVhZGVyCmljbXA6CgkwIGNhbGxzIHRvIGljbXBfZXJyb3IKCTAgZXJyb3JzIG5v dCBnZW5lcmF0ZWQgaW4gcmVzcG9uc2UgdG8gYW4gaWNtcCBtZXNzYWdlCgkwIG1lc3NhZ2VzIHdp dGggYmFkIGNvZGUgZmllbGRzCgkwIG1lc3NhZ2VzIGxlc3MgdGhhbiB0aGUgbWluaW11bSBsZW5n dGgKCTAgbWVzc2FnZXMgd2l0aCBiYWQgY2hlY2tzdW0KCTAgbWVzc2FnZXMgd2l0aCBiYWQgbGVu Z3RoCgkwIG11bHRpY2FzdCBlY2hvIHJlcXVlc3RzIGlnbm9yZWQKCTAgbXVsdGljYXN0IHRpbWVz dGFtcCByZXF1ZXN0cyBpZ25vcmVkCgkwIG1lc3NhZ2UgcmVzcG9uc2VzIGdlbmVyYXRlZAoJMCBp bnZhbGlkIHJldHVybiBhZGRyZXNzZXMKCTAgbm8gcmV0dXJuIHJvdXRlcwppcHNlYzoKCTAgaW5i b3VuZCBwYWNrZXRzIHZpb2xhdGVkIHByb2Nlc3Mgc2VjdXJpdHkgcG9saWN5CgkwIGluYm91bmQg cGFja2V0cyBmYWlsZWQgZHVlIHRvIGluc3VmZmljaWVudCBtZW1vcnkKCTAgaW52YWxpZCBpbmJv dW5kIHBhY2tldHMKCTAgb3V0Ym91bmQgcGFja2V0cyB2aW9sYXRlZCBwcm9jZXNzIHNlY3VyaXR5 IHBvbGljeQoJMCBvdXRib3VuZCBwYWNrZXRzIHdpdGggbm8gU0EgYXZhaWxhYmxlCgkwIG91dGJv dW5kIHBhY2tldHMgZmFpbGVkIGR1ZSB0byBpbnN1ZmZpY2llbnQgbWVtb3J5CgkwIG91dGJvdW5k IHBhY2tldHMgd2l0aCBubyByb3V0ZSBhdmFpbGFibGUKCTAgaW52YWxpZCBvdXRib3VuZCBwYWNr ZXRzCgkwIG91dGJvdW5kIHBhY2tldHMgd2l0aCBidW5kbGVkIFNBcwoJMCBzcGQgY2FjaGUgaGl0 cwoJMCBzcGQgY2FjaGUgbWlzc2VzCgkwIGNsdXN0ZXJzIGNvcGllZCBkdXJpbmcgY2xvbmUKCTAg bWJ1ZnMgaW5zZXJ0ZWQgZHVyaW5nIG1ha2VzcGFjZQphaDoKCTAgcGFja2V0cyBzaG9ydGVyIHRo YW4gaGVhZGVyIHNob3dzCgkwIHBhY2tldHMgZHJvcHBlZDsgcHJvdG9jb2wgZmFtaWx5IG5vdCBz dXBwb3J0ZWQKCTAgcGFja2V0cyBkcm9wcGVkOyBubyBUREIKCTAgcGFja2V0cyBkcm9wcGVkOyBi YWQgS0NSCgkwIHBhY2tldHMgZHJvcHBlZDsgcXVldWUgZnVsbAoJMCBwYWNrZXRzIGRyb3BwZWQ7 IG5vIHRyYW5zZm9ybQoJMCByZXBsYXkgY291bnRlciB3cmFwcwoJMCBwYWNrZXRzIGRyb3BwZWQ7 IGJhZCBhdXRoZW50aWNhdGlvbiBkZXRlY3RlZAoJMCBwYWNrZXRzIGRyb3BwZWQ7IGJhZCBhdXRo ZW50aWNhdGlvbiBsZW5ndGgKCTAgcG9zc2libGUgcmVwbGF5IHBhY2tldHMgZGV0ZWN0ZWQKCTAg cGFja2V0cyBpbgoJMCBwYWNrZXRzIG91dAoJMCBwYWNrZXRzIGRyb3BwZWQ7IGludmFsaWQgVERC CgkwIGJ5dGVzIGluCgkwIGJ5dGVzIG91dAoJMCBwYWNrZXRzIGRyb3BwZWQ7IGxhcmdlciB0aGFu IElQX01BWFBBQ0tFVAoJMCBwYWNrZXRzIGJsb2NrZWQgZHVlIHRvIHBvbGljeQoJMCBjcnlwdG8g cHJvY2Vzc2luZyBmYWlsdXJlcwoJMCB0dW5uZWwgc2FuaXR5IGNoZWNrIGZhaWx1cmVzCmVzcDoK CTAgcGFja2V0cyBzaG9ydGVyIHRoYW4gaGVhZGVyIHNob3dzCgkwIHBhY2tldHMgZHJvcHBlZDsg cHJvdG9jb2wgZmFtaWx5IG5vdCBzdXBwb3J0ZWQKCTAgcGFja2V0cyBkcm9wcGVkOyBubyBUREIK CTAgcGFja2V0cyBkcm9wcGVkOyBiYWQgS0NSCgkwIHBhY2tldHMgZHJvcHBlZDsgcXVldWUgZnVs bAoJMCBwYWNrZXRzIGRyb3BwZWQ7IG5vIHRyYW5zZm9ybQoJMCBwYWNrZXRzIGRyb3BwZWQ7IGJh ZCBpbGVuCgkwIHJlcGxheSBjb3VudGVyIHdyYXBzCgkwIHBhY2tldHMgZHJvcHBlZDsgYmFkIGVu Y3J5cHRpb24gZGV0ZWN0ZWQKCTAgcGFja2V0cyBkcm9wcGVkOyBiYWQgYXV0aGVudGljYXRpb24g ZGV0ZWN0ZWQKCTAgcG9zc2libGUgcmVwbGF5IHBhY2tldHMgZGV0ZWN0ZWQKCTAgcGFja2V0cyBp bgoJMCBwYWNrZXRzIG91dAoJMCBwYWNrZXRzIGRyb3BwZWQ7IGludmFsaWQgVERCCgkwIGJ5dGVz IGluCgkwIGJ5dGVzIG91dAoJMCBwYWNrZXRzIGRyb3BwZWQ7IGxhcmdlciB0aGFuIElQX01BWFBB Q0tFVAoJMCBwYWNrZXRzIGJsb2NrZWQgZHVlIHRvIHBvbGljeQoJMCBjcnlwdG8gcHJvY2Vzc2lu ZyBmYWlsdXJlcwoJMCB0dW5uZWwgc2FuaXR5IGNoZWNrIGZhaWx1cmVzCmlwY29tcDoKCTAgcGFj a2V0cyBzaG9ydGVyIHRoYW4gaGVhZGVyIHNob3dzCgkwIHBhY2tldHMgZHJvcHBlZDsgcHJvdG9j b2wgZmFtaWx5IG5vdCBzdXBwb3J0ZWQKCTAgcGFja2V0cyBkcm9wcGVkOyBubyBUREIKCTAgcGFj a2V0cyBkcm9wcGVkOyBiYWQgS0NSCgkwIHBhY2tldHMgZHJvcHBlZDsgcXVldWUgZnVsbAoJMCBw YWNrZXRzIGRyb3BwZWQ7IG5vIHRyYW5zZm9ybQoJMCByZXBsYXkgY291bnRlciB3cmFwcwoJMCBw YWNrZXRzIGluCgkwIHBhY2tldHMgb3V0CgkwIHBhY2tldHMgZHJvcHBlZDsgaW52YWxpZCBUREIK CTAgYnl0ZXMgaW4KCTAgYnl0ZXMgb3V0CgkwIHBhY2tldHMgZHJvcHBlZDsgbGFyZ2VyIHRoYW4g SVBfTUFYUEFDS0VUCgkwIHBhY2tldHMgYmxvY2tlZCBkdWUgdG8gcG9saWN5CgkwIGNyeXB0byBw cm9jZXNzaW5nIGZhaWx1cmVzCgkwIHBhY2tldHMgc2VudCB1bmNvbXByZXNzZWQ7IHNpemUgPCBj b21wci4gYWxnby4gdGhyZXNob2xkCgkwIHBhY2tldHMgc2VudCB1bmNvbXByZXNzZWQ7IGNvbXBy ZXNzaW9uIHdhcyB1c2VsZXNzCmFycDoKCTAgQVJQIHJlcXVlc3RzIHNlbnQKCTAgQVJQIHJlcGxp ZXMgc2VudAoJMCBBUlAgcmVxdWVzdHMgcmVjZWl2ZWQKCTAgQVJQIHJlcGxpZXMgcmVjZWl2ZWQK CTAgQVJQIHBhY2tldHMgcmVjZWl2ZWQKCTAgdG90YWwgcGFja2V0cyBkcm9wcGVkIGR1ZSB0byBu byBBUlAgZW50cnkKCTAgQVJQIGVudHJ5cyB0aW1lZCBvdXQKCTAgRHVwbGljYXRlIElQcyBzZWVu CmlwNjoKCTAgdG90YWwgcGFja2V0cyByZWNlaXZlZAoJMCB3aXRoIHNpemUgc21hbGxlciB0aGFu IG1pbmltdW0KCTAgd2l0aCBkYXRhIHNpemUgPCBkYXRhIGxlbmd0aAoJMCB3aXRoIGJhZCBvcHRp b25zCgkwIHdpdGggaW5jb3JyZWN0IHZlcnNpb24gbnVtYmVyCgkwIGZyYWdtZW50cyByZWNlaXZl ZAoJMCBmcmFnbWVudHMgZHJvcHBlZCAoZHVwIG9yIG91dCBvZiBzcGFjZSkKCTAgZnJhZ21lbnRz IGRyb3BwZWQgYWZ0ZXIgdGltZW91dAoJMCBmcmFnbWVudHMgdGhhdCBleGNlZWRlZCBsaW1pdAoJ MCBwYWNrZXRzIHJlYXNzZW1ibGVkIG9rCgkwIHBhY2tldHMgZm9yIHRoaXMgaG9zdAoJMCBwYWNr ZXRzIGZvcndhcmRlZAoJMCBwYWNrZXRzIG5vdCBmb3J3YXJkYWJsZQoJMCByZWRpcmVjdHMgc2Vu dAoJMCBwYWNrZXRzIHNlbnQgZnJvbSB0aGlzIGhvc3QKCTAgcGFja2V0cyBzZW50IHdpdGggZmFi cmljYXRlZCBpcCBoZWFkZXIKCTAgb3V0cHV0IHBhY2tldHMgZHJvcHBlZCBkdWUgdG8gbm8gYnVm cywgZXRjLgoJMCBvdXRwdXQgcGFja2V0cyBkaXNjYXJkZWQgZHVlIHRvIG5vIHJvdXRlCgkwIG91 dHB1dCBkYXRhZ3JhbXMgZnJhZ21lbnRlZAoJMCBmcmFnbWVudHMgY3JlYXRlZAoJMCBkYXRhZ3Jh bXMgdGhhdCBjYW4ndCBiZSBmcmFnbWVudGVkCgkwIHBhY2tldHMgdGhhdCB2aW9sYXRlZCBzY29w ZSBydWxlcwoJMCBtdWx0aWNhc3QgcGFja2V0cyB3aGljaCB3ZSBkb24ndCBqb2luCglNYnVmIHN0 YXRpc3RpY3M6CgkJMCBvbmUgbWJ1ZgoJCTAgb25lIGV4dCBtYnVmCgkJMCB0d28gb3IgbW9yZSBl eHQgbWJ1ZgoJMCBwYWNrZXRzIHdob3NlIGhlYWRlcnMgYXJlIG5vdCBjb250aWd1b3VzCgkwIHR1 bm5lbGluZyBwYWNrZXRzIHRoYXQgY2FuJ3QgZmluZCBnaWYKCTAgcGFja2V0cyBkaXNjYXJkZWQg YmVjYXVzZSBvZiB0b28gbWFueSBoZWFkZXJzCgkwIGZhaWx1cmVzIG9mIHNvdXJjZSBhZGRyZXNz IHNlbGVjdGlvbgppY21wNjoKCTAgY2FsbHMgdG8gaWNtcDZfZXJyb3IKCTAgZXJyb3JzIG5vdCBn ZW5lcmF0ZWQgaW4gcmVzcG9uc2UgdG8gYW4gaWNtcDYgbWVzc2FnZQoJMCBlcnJvcnMgbm90IGdl bmVyYXRlZCBiZWNhdXNlIG9mIHJhdGUgbGltaXRhdGlvbgoJMCBtZXNzYWdlcyB3aXRoIGJhZCBj b2RlIGZpZWxkcwoJMCBtZXNzYWdlcyA8IG1pbmltdW0gbGVuZ3RoCgkwIGJhZCBjaGVja3N1bXMK CTAgbWVzc2FnZXMgd2l0aCBiYWQgbGVuZ3RoCglIaXN0b2dyYW0gb2YgZXJyb3IgbWVzc2FnZXMg dG8gYmUgZ2VuZXJhdGVkOgoJCTAgbm8gcm91dGUKCQkwIGFkbWluaXN0cmF0aXZlbHkgcHJvaGli aXRlZAoJCTAgYmV5b25kIHNjb3BlCgkJMCBhZGRyZXNzIHVucmVhY2hhYmxlCgkJMCBwb3J0IHVu cmVhY2hhYmxlCgkJMCBwYWNrZXQgdG9vIGJpZwoJCTAgdGltZSBleGNlZWQgdHJhbnNpdAoJCTAg dGltZSBleGNlZWQgcmVhc3NlbWJseQoJCTAgZXJyb25lb3VzIGhlYWRlciBmaWVsZAoJCTAgdW5y ZWNvZ25pemVkIG5leHQgaGVhZGVyCgkJMCB1bnJlY29nbml6ZWQgb3B0aW9uCgkJMCByZWRpcmVj dAoJCTAgdW5rbm93bgoJMCBtZXNzYWdlIHJlc3BvbnNlcyBnZW5lcmF0ZWQKCTAgbWVzc2FnZXMg d2l0aCB0b28gbWFueSBORCBvcHRpb25zCgkwIG1lc3NhZ2VzIHdpdGggYmFkIE5EIG9wdGlvbnMK CTAgYmFkIG5laWdoYm9yIHNvbGljaXRhdGlvbiBtZXNzYWdlcwoJMCBiYWQgbmVpZ2hib3IgYWR2 ZXJ0aXNlbWVudCBtZXNzYWdlcwoJMCBiYWQgcm91dGVyIHNvbGljaXRhdGlvbiBtZXNzYWdlcwoJ MCBiYWQgcm91dGVyIGFkdmVydGlzZW1lbnQgbWVzc2FnZXMKCTAgYmFkIHJlZGlyZWN0IG1lc3Nh Z2VzCgkwIHBhdGggTVRVIGNoYW5nZXMKaXBzZWM2OgoJMCBpbmJvdW5kIHBhY2tldHMgdmlvbGF0 ZWQgcHJvY2VzcyBzZWN1cml0eSBwb2xpY3kKCTAgaW5ib3VuZCBwYWNrZXRzIGZhaWxlZCBkdWUg dG8gaW5zdWZmaWNpZW50IG1lbW9yeQoJMCBpbnZhbGlkIGluYm91bmQgcGFja2V0cwoJMCBvdXRi b3VuZCBwYWNrZXRzIHZpb2xhdGVkIHByb2Nlc3Mgc2VjdXJpdHkgcG9saWN5CgkwIG91dGJvdW5k IHBhY2tldHMgd2l0aCBubyBTQSBhdmFpbGFibGUKCTAgb3V0Ym91bmQgcGFja2V0cyBmYWlsZWQg ZHVlIHRvIGluc3VmZmljaWVudCBtZW1vcnkKCTAgb3V0Ym91bmQgcGFja2V0cyB3aXRoIG5vIHJv dXRlIGF2YWlsYWJsZQoJMCBpbnZhbGlkIG91dGJvdW5kIHBhY2tldHMKCTAgb3V0Ym91bmQgcGFj a2V0cyB3aXRoIGJ1bmRsZWQgU0FzCgkwIHNwZCBjYWNoZSBoaXRzCgkwIHNwZCBjYWNoZSBtaXNz ZXMKCTAgY2x1c3RlcnMgY29waWVkIGR1cmluZyBjbG9uZQoJMCBtYnVmcyBpbnNlcnRlZCBkdXJp bmcgbWFrZXNwYWNlCnJpcDY6CgkwIG1lc3NhZ2VzIHJlY2VpdmVkCgkwIGNoZWNrc3VtIGNhbGN1 bGF0aW9ucyBvbiBpbmJvdW5kCgkwIG1lc3NhZ2VzIHdpdGggYmFkIGNoZWNrc3VtCgkwIG1lc3Nh Z2VzIGRyb3BwZWQgZHVlIHRvIG5vIHNvY2tldAoJMCBtdWx0aWNhc3QgbWVzc2FnZXMgZHJvcHBl ZCBkdWUgdG8gbm8gc29ja2V0CgkwIG1lc3NhZ2VzIGRyb3BwZWQgZHVlIHRvIGZ1bGwgc29ja2V0 IGJ1ZmZlcnMKCTAgZGVsaXZlcmVkCgkwIGRhdGFncmFtcyBvdXRwdXQKcGZrZXk6CgkwIHJlcXVl c3RzIHNlbnQgZnJvbSB1c2VybGFuZAoJMCBieXRlcyBzZW50IGZyb20gdXNlcmxhbmQKCTAgbWVz c2FnZXMgd2l0aCBpbnZhbGlkIGxlbmd0aCBmaWVsZAoJMCBtZXNzYWdlcyB3aXRoIGludmFsaWQg dmVyc2lvbiBmaWVsZAoJMCBtZXNzYWdlcyB3aXRoIGludmFsaWQgbWVzc2FnZSB0eXBlIGZpZWxk CgkwIG1lc3NhZ2VzIHRvbyBzaG9ydAoJMCBtZXNzYWdlcyB3aXRoIG1lbW9yeSBhbGxvY2F0aW9u IGZhaWx1cmUKCTAgbWVzc2FnZXMgd2l0aCBkdXBsaWNhdGUgZXh0ZW5zaW9uCgkwIG1lc3NhZ2Vz IHdpdGggaW52YWxpZCBleHRlbnNpb24gdHlwZQoJMCBtZXNzYWdlcyB3aXRoIGludmFsaWQgc2Eg dHlwZQoJMCBtZXNzYWdlcyB3aXRoIGludmFsaWQgYWRkcmVzcyBleHRlbnNpb24KCTAgcmVxdWVz dHMgc2VudCB0byB1c2VybGFuZAoJMCBieXRlcyBzZW50IHRvIHVzZXJsYW5kCgkwIG1lc3NhZ2Vz IHRvd2FyZCBzaW5nbGUgc29ja2V0CgkwIG1lc3NhZ2VzIHRvd2FyZCBhbGwgc29ja2V0cwoJMCBt ZXNzYWdlcyB0b3dhcmQgcmVnaXN0ZXJlZCBzb2NrZXRzCgkwIG1lc3NhZ2VzIHdpdGggbWVtb3J5 IGFsbG9jYXRpb24gZmFpbHVyZQoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCm5ldHN0YXQgLW0KCjEvMjU2LzI1 NyBtYnVmcyBpbiB1c2UgKGN1cnJlbnQvY2FjaGUvdG90YWwpCjE4NDQ2NzQ0MDczNzA5NTUxNjE0 LzIvMC8xMDAyNDIyIG1idWYgY2x1c3RlcnMgaW4gdXNlIChjdXJyZW50L2NhY2hlL3RvdGFsL21h eCkKMC8yIG1idWYrY2x1c3RlcnMgb3V0IG9mIHBhY2tldCBzZWNvbmRhcnkgem9uZSBpbiB1c2Ug KGN1cnJlbnQvY2FjaGUpCjAvMC8wLzUwMTIxMCA0ayAocGFnZSBzaXplKSBqdW1ibyBjbHVzdGVy cyBpbiB1c2UgKGN1cnJlbnQvY2FjaGUvdG90YWwvbWF4KQowLzAvMC80NDU1MTggOWsganVtYm8g Y2x1c3RlcnMgaW4gdXNlIChjdXJyZW50L2NhY2hlL3RvdGFsL21heCkKMC8wLzAvMzM0MTQwIDE2 ayBqdW1ibyBjbHVzdGVycyBpbiB1c2UgKGN1cnJlbnQvY2FjaGUvdG90YWwvbWF4KQoxODAxNDM5 ODUwOTQ4MTk4MEsvNjhLLzY0SyBieXRlcyBhbGxvY2F0ZWQgdG8gbmV0d29yayAoY3VycmVudC9j YWNoZS90b3RhbCkKMC8wLzAgcmVxdWVzdHMgZm9yIG1idWZzIGRlbmllZCAobWJ1ZnMvY2x1c3Rl cnMvbWJ1ZitjbHVzdGVycykKMC8wLzAgcmVxdWVzdHMgZm9yIG1idWZzIGRlbGF5ZWQgKG1idWZz L2NsdXN0ZXJzL21idWYrY2x1c3RlcnMpCjAvMC8wIHJlcXVlc3RzIGZvciBqdW1ibyBjbHVzdGVy cyBkZWxheWVkICg0ay85ay8xNmspCjAvMC8wIHJlcXVlc3RzIGZvciBqdW1ibyBjbHVzdGVycyBk ZW5pZWQgKDRrLzlrLzE2aykKMCBzZW5kZmlsZSBzeXNjYWxscwowIHNlbmRmaWxlIHN5c2NhbGxz IGNvbXBsZXRlZCB3aXRob3V0IEkvTyByZXF1ZXN0CjAgcmVxdWVzdHMgZm9yIEkvTyBpbml0aWF0 ZWQgYnkgc2VuZGZpbGUKMCBwYWdlcyByZWFkIGJ5IHNlbmRmaWxlIGFzIHBhcnQgb2YgYSByZXF1 ZXN0CjAgcGFnZXMgd2VyZSB2YWxpZCBhdCB0aW1lIG9mIGEgc2VuZGZpbGUgcmVxdWVzdAowIHBh Z2VzIHdlcmUgdmFsaWQgYW5kIHN1YnN0aXR1dGVkIHRvIGJvZ3VzIHBhZ2UKMCBwYWdlcyB3ZXJl IHJlcXVlc3RlZCBmb3IgcmVhZCBhaGVhZCBieSBhcHBsaWNhdGlvbnMKMCBwYWdlcyB3ZXJlIHJl YWQgYWhlYWQgYnkgc2VuZGZpbGUKMCB0aW1lcyBzZW5kZmlsZSBlbmNvdW50ZXJlZCBhbiBhbHJl YWR5IGJ1c3kgcGFnZQowIHJlcXVlc3RzIGZvciBzZmJ1ZnMgZGVuaWVkCjAgcmVxdWVzdHMgZm9y IHNmYnVmcyBkZWxheWVkCgotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KbmV0c3RhdCAtYW5BCgoKLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tCm5ldHN0YXQgLWFMCgoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCmZzdGF0Cgpmc3RhdDogY2FuJ3Qg cmVhZCBmaWxlIDEgYXQgMHgyMDAwN2ZmZmZmZmZmZmYKZnN0YXQ6IGNhbid0IHJlYWQgZmlsZSAy IGF0IDB4NDAwMDAwMDAwMWZmZmZmCmZzdGF0OiBjYW4ndCByZWFkIHpub2RlX3BoeXMgYXQgMHgx CmZzdGF0OiBjYW4ndCByZWFkIHpub2RlX3BoeXMgYXQgMHgxCmZzdGF0OiBjYW4ndCByZWFkIHpu b2RlX3BoeXMgYXQgMHgxCmZzdGF0OiBjYW4ndCByZWFkIGZpbGUgMSBhdCAweDIwMDA3ZmZmZmZm ZmZmZgpmc3RhdDogY2FuJ3QgcmVhZCBmaWxlIDIgYXQgMHg0MDAwMDAwMDAxZmZmZmYKZnN0YXQ6 IGNhbid0IHJlYWQgZmlsZSA0IGF0IDB4NzgwMDAwZmZmZgpmc3RhdDogY2FuJ3QgcmVhZCBmaWxl IDUgYXQgMHgyMDAwMDAwMDAKZnN0YXQ6IGNhbid0IHJlYWQgZmlsZSA3IGF0IDB4MjAwMDdmZmZm ZmZmZmZmCmZzdGF0OiBjYW4ndCByZWFkIGZpbGUgOCBhdCAweDQwMDAwMDAwMDFmZmZmZgpmc3Rh dDogY2FuJ3QgcmVhZCBmaWxlIDEwIGF0IDB4NzgwMDAwZmZmZgpmc3RhdDogY2FuJ3QgcmVhZCB6 bm9kZV9waHlzIGF0IDB4MQpmc3RhdDogY2FuJ3QgcmVhZCB6bm9kZV9waHlzIGF0IDB4MQpmc3Rh dDogY2FuJ3QgcmVhZCB6bm9kZV9waHlzIGF0IDB4MQpmc3RhdDogY2FuJ3QgcmVhZCBmaWxlIDEg YXQgMHgyMDAwN2ZmZmZmZmZmZmYKZnN0YXQ6IGNhbid0IHJlYWQgZmlsZSAyIGF0IDB4NDAwMDAw MDAwMWZmZmZmCmZzdGF0OiBjYW4ndCByZWFkIGZpbGUgNCBhdCAweDc4MDAwMGZmZmYKZnN0YXQ6 IGNhbid0IHJlYWQgZmlsZSA1IGF0IDB4MjAwMDAwMDAwCmZzdGF0OiBjYW4ndCByZWFkIGZpbGUg NyBhdCAweDIwMDA3ZmZmZmZmZmZmZgpmc3RhdDogY2FuJ3QgcmVhZCBmaWxlIDggYXQgMHg0MDAw MDAwMDAxZmZmZmYKZnN0YXQ6IGNhbid0IHJlYWQgZmlsZSAxMCBhdCAweDc4MDAwMGZmZmYKZnN0 YXQ6IGNhbid0IHJlYWQgem5vZGVfcGh5cyBhdCAweDEKZnN0YXQ6IGNhbid0IHJlYWQgem5vZGVf cGh5cyBhdCAweDEKZnN0YXQ6IGNhbid0IHJlYWQgem5vZGVfcGh5cyBhdCAweDEKZnN0YXQ6IGNh bid0IHJlYWQgem5vZGVfcGh5cyBhdCAweDEKZnN0YXQ6IGNhbid0IHJlYWQgem5vZGVfcGh5cyBh dCAweDEKZnN0YXQ6IGNhbid0IHJlYWQgem5vZGVfcGh5cyBhdCAweDEKZnN0YXQ6IGNhbid0IHJl YWQgem5vZGVfcGh5cyBhdCAweDEKZnN0YXQ6IGNhbid0IHJlYWQgem5vZGVfcGh5cyBhdCAweDEK VVNFUiAgICAgQ01EICAgICAgICAgIFBJRCAgIEZEIE1PVU5UICAgICAgSU5VTSBNT0RFICAgICAg ICAgU1p8RFYgUi9XCnJvb3QgICAgIGtsZGxvYWQgICAgICAxMjIgcm9vdCAtICAgICAgICAgLSAg ICAgICBlcnJvciAgICAtCnJvb3QgICAgIGtsZGxvYWQgICAgICAxMjIgICB3ZCAtICAgICAgICAg LSAgICAgICBlcnJvciAgICAtCnJvb3QgICAgIGtsZGxvYWQgICAgICAxMjIgdGV4dCAtICAgICAg ICAgLSAgICAgICBlcnJvciAgICAtCnJvb3QgICAgIGtsZGxvYWQgICAgICAxMjIgY3R0eSAvZGV2 ICAgICAgICAgIDkgY3J3LS0tLS0tLSAgY29uc29sZSBydwpyb290ICAgICBrbGRsb2FkICAgICAg MTIyICAgIDAgL2RldiAgICAgICAgICA5IGNydy0tLS0tLS0gIGNvbnNvbGUgcncKcm9vdCAgICAg c2ggICAgICAgICAgIDExNiByb290IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAg ICAgc2ggICAgICAgICAgIDExNiAgIHdkIC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9v dCAgICAgc2ggICAgICAgICAgIDExNiB0ZXh0IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0K cm9vdCAgICAgc2ggICAgICAgICAgIDExNiBjdHR5IC9kZXYgICAgICAgICAgOSBjcnctLS0tLS0t ICBjb25zb2xlIHJ3CnJvb3QgICAgIHNoICAgICAgICAgICAxMTYgICAgMCAvZGV2ICAgICAgICAg IDkgY3J3LS0tLS0tLSAgY29uc29sZSBydwpyb290ICAgICBzaCAgICAgICAgICAgMTE2ICAgIDYg L2RldiAgICAgICAgICA5IGNydy0tLS0tLS0gIGNvbnNvbGUgcncKcm9vdCAgICAgc2ggICAgICAg ICAgICAzMCByb290IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAgc2ggICAg ICAgICAgICAzMCAgIHdkIC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAgc2gg ICAgICAgICAgICAzMCB0ZXh0IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAg c2ggICAgICAgICAgICAzMCBjdHR5IC9kZXYgICAgICAgICAgOSBjcnctLS0tLS0tICBjb25zb2xl IHJ3CnJvb3QgICAgIHNoICAgICAgICAgICAgMzAgICAgMCAvZGV2ICAgICAgICAgIDkgY3J3LS0t LS0tLSAgY29uc29sZSBydwpyb290ICAgICBzaCAgICAgICAgICAgIDMwICAgIDYgL2RldiAgICAg ICAgICA5IGNydy0tLS0tLS0gIGNvbnNvbGUgcncKcm9vdCAgICAgaW5pdCAgICAgICAgICAgMSBy b290IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAgaW5pdCAgICAgICAgICAg MSAgIHdkIC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAgaW5pdCAgICAgICAg ICAgMSB0ZXh0IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAga2VybmVsICAg ICAgICAgMCByb290IC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0Kcm9vdCAgICAga2VybmVs ICAgICAgICAgMCAgIHdkIC0gICAgICAgICAtICAgICAgIGVycm9yICAgIC0KCi0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLQpkbWVzZwoKLS0tPDxCT09UPj4tLS0KQ29weXJpZ2h0IChjKSAxOTkyLTIwMTkgVGhlIEZy ZWVCU0QgUHJvamVjdC4KQ29weXJpZ2h0IChjKSAxOTc5LCAxOTgwLCAxOTgzLCAxOTg2LCAxOTg4 LCAxOTg5LCAxOTkxLCAxOTkyLCAxOTkzLCAxOTk0CglUaGUgUmVnZW50cyBvZiB0aGUgVW5pdmVy c2l0eSBvZiBDYWxpZm9ybmlhLiBBbGwgcmlnaHRzIHJlc2VydmVkLgpGcmVlQlNEIGlzIGEgcmVn aXN0ZXJlZCB0cmFkZW1hcmsgb2YgVGhlIEZyZWVCU0QgRm91bmRhdGlvbi4KRnJlZUJTRCAxMi4w LVNUQUJMRSByMzQ4NTI4IEdFTkVSSUMgYW1kNjQKRnJlZUJTRCBjbGFuZyB2ZXJzaW9uIDguMC4w ICh0YWdzL1JFTEVBU0VfODAwL2ZpbmFsIDM1NjM2NSkgKGJhc2VkIG9uIExMVk0gOC4wLjApClZU KHZnYSk6IHJlc29sdXRpb24gNjQweDQ4MApDUFUgbWljcm9jb2RlOiB1cGRhdGVkIGZyb20gMHg5 YSB0byAweGI0CkNQVTogSW50ZWwoUikgQ29yZShUTSkgaTUtODQwMCBDUFUgQCAyLjgwR0h6ICgy ODA4LjIxLU1IeiBLOC1jbGFzcyBDUFUpCiAgT3JpZ2luPSJHZW51aW5lSW50ZWwiICBJZD0weDkw NmVhICBGYW1pbHk9MHg2ICBNb2RlbD0weDllICBTdGVwcGluZz0xMAogIEZlYXR1cmVzPTB4YmZl YmZiZmY8RlBVLFZNRSxERSxQU0UsVFNDLE1TUixQQUUsTUNFLENYOCxBUElDLFNFUCxNVFJSLFBH RSxNQ0EsQ01PVixQQVQsUFNFMzYsQ0xGTFVTSCxEVFMsQUNQSSxNTVgsRlhTUixTU0UsU1NFMixT UyxIVFQsVE0sUEJFPgogIEZlYXR1cmVzMj0weDdmZmFmYmJmPFNTRTMsUENMTVVMUURRLERURVM2 NCxNT04sRFNfQ1BMLFZNWCxFU1QsVE0yLFNTU0UzLFNEQkcsRk1BLENYMTYseFRQUixQRENNLFBD SUQsU1NFNC4xLFNTRTQuMix4MkFQSUMsTU9WQkUsUE9QQ05ULFRTQ0RMVCxBRVNOSSxYU0FWRSxP U1hTQVZFLEFWWCxGMTZDLFJEUkFORD4KICBBTUQgRmVhdHVyZXM9MHgyYzEwMDgwMDxTWVNDQUxM LE5YLFBhZ2UxR0IsUkRUU0NQLExNPgogIEFNRCBGZWF0dXJlczI9MHgxMjE8TEFIRixBQk0sUHJl ZmV0Y2g+CiAgU3RydWN0dXJlZCBFeHRlbmRlZCBGZWF0dXJlcz0weDI5YzY3YWY8RlNHU0JBU0Us VFNDQURKLFNHWCxCTUkxLEFWWDIsU01FUCxCTUkyLEVSTVMsSU5WUENJRCxORlBVU0csTVBYLFJE U0VFRCxBRFgsU01BUCxDTEZMVVNIT1BULFBST0NUUkFDRT4KICBTdHJ1Y3R1cmVkIEV4dGVuZGVk IEZlYXR1cmVzMj0weDQwMDAwMDAwPFNHWExDPgogIFN0cnVjdHVyZWQgRXh0ZW5kZWQgRmVhdHVy ZXMzPTB4OWMwMDI0MDA8TURfQ0xFQVIsVFNYRkEsSUJQQixTVElCUCxMMURGTCxTU0JEPgogIFhT QVZFIEZlYXR1cmVzPTB4ZjxYU0FWRU9QVCxYU0FWRUMsWElOVVNFLFhTQVZFUz4KICBWVC14OiBQ QVQsSExULE1URixQQVVTRSxFUFQsVUcsVlBJRAogIFRTQzogUC1zdGF0ZSBpbnZhcmlhbnQsIHBl cmZvcm1hbmNlIHN0YXRpc3RpY3MKcmVhbCBtZW1vcnkgID0gMTcxNzk4NjkxODQgKDE2Mzg0IE1C KQphdmFpbCBtZW1vcnkgPSAxNjM2MTU2NjIwOCAoMTU2MDMgTUIpCkV2ZW50IHRpbWVyICJMQVBJ QyIgcXVhbGl0eSA2MDAKQUNQSSBBUElDIFRhYmxlOiA8QUxBU0tBIEEgTSBJID4KRnJlZUJTRC9T TVA6IE11bHRpcHJvY2Vzc29yIFN5c3RlbSBEZXRlY3RlZDogNiBDUFVzCkZyZWVCU0QvU01QOiAx IHBhY2thZ2UocykgeCA2IGNvcmUocykKcmFuZG9tOiB1bmJsb2NraW5nIGRldmljZS4KaW9hcGlj MCA8VmVyc2lvbiAyLjA+IGlycXMgMC0xMTkgb24gbW90aGVyYm9hcmQKTGF1bmNoaW5nIEFQczog MSA0IDUgMyAyClRpbWVjb3VudGVyICJUU0MtbG93IiBmcmVxdWVuY3kgMTQwNDEwNzM0NiBIeiBx dWFsaXR5IDEwMDAKcmFuZG9tOiBlbnRyb3B5IGRldmljZSBleHRlcm5hbCBpbnRlcmZhY2UKMDAw LjAwMDAxNyBbNDI1NF0gbmV0bWFwX2luaXQgICAgICAgICAgICAgICBuZXRtYXA6IGxvYWRlZCBt b2R1bGUKW2F0aF9oYWxdIGxvYWRlZAptb2R1bGVfcmVnaXN0ZXJfaW5pdDogTU9EX0xPQUQgKHZl c2EsIDB4ZmZmZmZmZmY4MTEyZDc0MCwgMCkgZXJyb3IgMTkKcmFuZG9tOiByZWdpc3RlcmluZyBm YXN0IHNvdXJjZSBJbnRlbCBTZWN1cmUgS2V5IFJORwpyYW5kb206IGZhc3QgcHJvdmlkZXI6ICJJ bnRlbCBTZWN1cmUgS2V5IFJORyIKa2JkMSBhdCBrYmRtdXgwCm5leHVzMAp2dHZnYTA6IDxWVCBW R0EgZHJpdmVyPiBvbiBtb3RoZXJib2FyZApjcnlwdG9zb2Z0MDogPHNvZnR3YXJlIGNyeXB0bz4g b24gbW90aGVyYm9hcmQKYWVzbmkwOiA8QUVTLUNCQyxBRVMtWFRTLEFFUy1HQ00sQUVTLUlDTT4g b24gbW90aGVyYm9hcmQKYWNwaTA6IDxBTEFTS0EgQSBNIEkgPiBvbiBtb3RoZXJib2FyZAphY3Bp MDogUG93ZXIgQnV0dG9uIChmaXhlZCkKY3B1MDogPEFDUEkgQ1BVPiBvbiBhY3BpMApocGV0MDog PEhpZ2ggUHJlY2lzaW9uIEV2ZW50IFRpbWVyPiBpb21lbSAweGZlZDAwMDAwLTB4ZmVkMDAzZmYg b24gYWNwaTAKVGltZWNvdW50ZXIgIkhQRVQiIGZyZXF1ZW5jeSAyNDAwMDAwMCBIeiBxdWFsaXR5 IDk1MApFdmVudCB0aW1lciAiSFBFVCIgZnJlcXVlbmN5IDI0MDAwMDAwIEh6IHF1YWxpdHkgNTUw CkV2ZW50IHRpbWVyICJIUEVUMSIgZnJlcXVlbmN5IDI0MDAwMDAwIEh6IHF1YWxpdHkgNDQwCkV2 ZW50IHRpbWVyICJIUEVUMiIgZnJlcXVlbmN5IDI0MDAwMDAwIEh6IHF1YWxpdHkgNDQwCmF0dGlt ZXIwOiA8QVQgdGltZXI+IHBvcnQgMHg0MC0weDQzLDB4NTAtMHg1MyBpcnEgMCBvbiBhY3BpMApU aW1lY291bnRlciAiaTgyNTQiIGZyZXF1ZW5jeSAxMTkzMTgyIEh6IHF1YWxpdHkgMApFdmVudCB0 aW1lciAiaTgyNTQiIGZyZXF1ZW5jeSAxMTkzMTgyIEh6IHF1YWxpdHkgMTAwClRpbWVjb3VudGVy ICJBQ1BJLWZhc3QiIGZyZXF1ZW5jeSAzNTc5NTQ1IEh6IHF1YWxpdHkgOTAwCmFjcGlfdGltZXIw OiA8MjQtYml0IHRpbWVyIGF0IDMuNTc5NTQ1TUh6PiBwb3J0IDB4MTgwOC0weDE4MGIgb24gYWNw aTAKcGNpYjA6IDxBQ1BJIEhvc3QtUENJIGJyaWRnZT4gcG9ydCAweGNmOC0weGNmZiBvbiBhY3Bp MApwY2kwOiA8QUNQSSBQQ0kgYnVzPiBvbiBwY2liMAp2Z2FwY2kwOiA8VkdBLWNvbXBhdGlibGUg ZGlzcGxheT4gcG9ydCAweDYwMDAtMHg2MDNmIG1lbSAweGEwMDAwMDAwLTB4YTBmZmZmZmYsMHg5 MDAwMDAwMC0weDlmZmZmZmZmIGlycSAxNiBhdCBkZXZpY2UgMi4wIG9uIHBjaTAKdmdhcGNpMDog Qm9vdCB2aWRlbyBkZXZpY2UKeGhjaTA6IDxYSENJIChnZW5lcmljKSBVU0IgMy4wIGNvbnRyb2xs ZXI+IG1lbSAweDQwMDAxMDAwMDAtMHg0MDAwMTBmZmZmIGlycSAxNiBhdCBkZXZpY2UgMjAuMCBv biBwY2kwCnhoY2kwOiAzMiBieXRlcyBjb250ZXh0IHNpemUsIDY0LWJpdCBETUEKdXNidXMwIG9u IHhoY2kwCnVzYnVzMDogNS4wR2JwcyBTdXBlciBTcGVlZCBVU0IgdjMuMApwY2kwOiA8bWVtb3J5 LCBSQU0+IGF0IGRldmljZSAyMC4yIChubyBkcml2ZXIgYXR0YWNoZWQpCnBjaTA6IDxzaW1wbGUg Y29tbXM+IGF0IGRldmljZSAyMi4wIChubyBkcml2ZXIgYXR0YWNoZWQpCmFoY2kwOiA8SW50ZWwg Q2Fubm9uIExha2UgQUhDSSBTQVRBIGNvbnRyb2xsZXI+IHBvcnQgMHg2MDkwLTB4NjA5NywweDYw ODAtMHg2MDgzLDB4NjA2MC0weDYwN2YgbWVtIDB4YTEzMDAwMDAtMHhhMTMwMWZmZiwweGExMzAz MDAwLTB4YTEzMDMwZmYsMHhhMTMwMjAwMC0weGExMzAyN2ZmIGlycSAxNiBhdCBkZXZpY2UgMjMu MCBvbiBwY2kwCmFoY2kwOiBBSENJIHYxLjMxIHdpdGggNiA2R2JwcyBwb3J0cywgUG9ydCBNdWx0 aXBsaWVyIG5vdCBzdXBwb3J0ZWQKYWhjaWNoMDogPEFIQ0kgY2hhbm5lbD4gYXQgY2hhbm5lbCAw IG9uIGFoY2kwCmFoY2ljaDE6IDxBSENJIGNoYW5uZWw+IGF0IGNoYW5uZWwgMSBvbiBhaGNpMAph aGNpY2gyOiA8QUhDSSBjaGFubmVsPiBhdCBjaGFubmVsIDIgb24gYWhjaTAKYWhjaWNoMzogPEFI Q0kgY2hhbm5lbD4gYXQgY2hhbm5lbCAzIG9uIGFoY2kwCmFoY2ljaDQ6IDxBSENJIGNoYW5uZWw+ IGF0IGNoYW5uZWwgNCBvbiBhaGNpMAphaGNpY2g1OiA8QUhDSSBjaGFubmVsPiBhdCBjaGFubmVs IDUgb24gYWhjaTAKYWhjaWVtMDogPEFIQ0kgZW5jbG9zdXJlIG1hbmFnZW1lbnQgYnJpZGdlPiBv biBhaGNpMApwY2liMTogPEFDUEkgUENJLVBDSSBicmlkZ2U+IGF0IGRldmljZSAyNy4wIG9uIHBj aTAKcGNpYjE6IFtHSUFOVC1MT0NLRURdCnBjaWIyOiA8QUNQSSBQQ0ktUENJIGJyaWRnZT4gaXJx IDE2IGF0IGRldmljZSAyOC4wIG9uIHBjaTAKcGNpMTogPEFDUEkgUENJIGJ1cz4gb24gcGNpYjIK cGNpMTogPG5ldHdvcms+IGF0IGRldmljZSAwLjAgKG5vIGRyaXZlciBhdHRhY2hlZCkKcGNpYjM6 IDxBQ1BJIFBDSS1QQ0kgYnJpZGdlPiBpcnEgMTkgYXQgZGV2aWNlIDI4Ljcgb24gcGNpMApwY2ky OiA8QUNQSSBQQ0kgYnVzPiBvbiBwY2liMwpyZTA6IDxSZWFsVGVrIDgxNjgvODExMSBCL0MvQ1Av RC9EUC9FL0YvRyBQQ0llIEdpZ2FiaXQgRXRoZXJuZXQ+IHBvcnQgMHg0MDAwLTB4NDBmZiBtZW0g MHhhMTEwNDAwMC0weGExMTA0ZmZmLDB4YTExMDAwMDAtMHhhMTEwM2ZmZiBpcnEgMTkgYXQgZGV2 aWNlIDAuMCBvbiBwY2kyCnJlMDogVXNpbmcgMSBNU0ktWCBtZXNzYWdlCnJlMDogQVNQTSBkaXNh YmxlZApyZTA6IENoaXAgcmV2LiAweDU0MDAwMDAwCnJlMDogTUFDIHJldi4gMHgwMDEwMDAwMApt aWlidXMwOiA8TUlJIGJ1cz4gb24gcmUwCnJnZXBoeTA6IDxSVEw4MjUxLzgxNTMgMTAwMEJBU0Ut VCBtZWRpYSBpbnRlcmZhY2U+IFBIWSAxIG9uIG1paWJ1czAKcmdlcGh5MDogIG5vbmUsIDEwYmFz ZVQsIDEwYmFzZVQtRkRYLCAxMGJhc2VULUZEWC1mbG93LCAxMDBiYXNlVFgsIDEwMGJhc2VUWC1G RFgsIDEwMGJhc2VUWC1GRFgtZmxvdywgMTAwMGJhc2VULUZEWCwgMTAwMGJhc2VULUZEWC1tYXN0 ZXIsIDEwMDBiYXNlVC1GRFgtZmxvdywgMTAwMGJhc2VULUZEWC1mbG93LW1hc3RlciwgYXV0bywg YXV0by1mbG93CnJlMDogVXNpbmcgZGVmYXVsdHMgZm9yIFRTTzogNjU1MTgvMzUvMjA0OApyZTA6 IEV0aGVybmV0IGFkZHJlc3M6IDQwOmIwOjc2OjQwOmQ0OjhiCnJlMDogbmV0bWFwIHF1ZXVlcy9z bG90czogVFggMS8yNTYsIFJYIDEvMjU2CnBjaWI0OiA8QUNQSSBQQ0ktUENJIGJyaWRnZT4gaXJx IDE2IGF0IGRldmljZSAyOS4wIG9uIHBjaTAKcGNpMzogPEFDUEkgUENJIGJ1cz4gb24gcGNpYjQK bnZtZTA6IDxHZW5lcmljIE5WTWUgRGV2aWNlPiBwb3J0IDB4MzAwMC0weDMwMDcgbWVtIDB4YTEw MDAwMDAtMHhhMTAwM2ZmZiBpcnEgMTYgYXQgZGV2aWNlIDAuMCBvbiBwY2kzCmlzYWIwOiA8UENJ LUlTQSBicmlkZ2U+IGF0IGRldmljZSAzMS4wIG9uIHBjaTAKaXNhMDogPElTQSBidXM+IG9uIGlz YWIwCmhkYWMwOiA8SW50ZWwgQ29mZmVlIExha2UgSERBIENvbnRyb2xsZXI+IG1lbSAweDQwMDAx MTAwMDAtMHg0MDAwMTEzZmZmLDB4NDAwMDAwMDAwMC0weDQwMDAwZmZmZmYgaXJxIDE2IGF0IGRl dmljZSAzMS4zIG9uIHBjaTAKcGNpMDogPHNlcmlhbCBidXM+IGF0IGRldmljZSAzMS41IChubyBk cml2ZXIgYXR0YWNoZWQpCmFjcGlfYnV0dG9uMDogPFNsZWVwIEJ1dHRvbj4gb24gYWNwaTAKYWNw aV9idXR0b24xOiA8UG93ZXIgQnV0dG9uPiBvbiBhY3BpMAphY3BpX3R6MDogPFRoZXJtYWwgWm9u ZT4gb24gYWNwaTAKcHBjMTogPFBhcmFsbGVsIHBvcnQ+IHBvcnQgMHgzNzgtMHgzN2YgaXJxIDUg b24gYWNwaTAKcHBjMTogR2VuZXJpYyBjaGlwc2V0IChOSUJCTEUtb25seSkgaW4gQ09NUEFUSUJM RSBtb2RlCnBwYnVzMDogPFBhcmFsbGVsIHBvcnQgYnVzPiBvbiBwcGMxCmxwdDA6IDxQcmludGVy PiBvbiBwcGJ1czAKbHB0MDogSW50ZXJydXB0LWRyaXZlbiBwb3J0CnBwaTA6IDxQYXJhbGxlbCBJ L08+IG9uIHBwYnVzMAphdGtiZGMwOiA8S2V5Ym9hcmQgY29udHJvbGxlciAoaTgwNDIpPiBwb3J0 IDB4NjAsMHg2NCBpcnEgMSBvbiBhY3BpMAphdGtiZDA6IDxBVCBLZXlib2FyZD4gaXJxIDEgb24g YXRrYmRjMAprYmQwIGF0IGF0a2JkMAphdGtiZDA6IFtHSUFOVC1MT0NLRURdCnVhcnQwOiA8MTY1 NTAgb3IgY29tcGF0aWJsZT4gcG9ydCAweDNmOC0weDNmZiBpcnEgNCBmbGFncyAweDEwIG9uIGFj cGkwCmFjcGlfc3lzY29udGFpbmVyMDogPFN5c3RlbSBDb250YWluZXI+IG9uIGFjcGkwCm9ybTA6 IDxJU0EgT3B0aW9uIFJPTT4gYXQgaW9tZW0gMHhjMDAwMC0weGNmZmZmIHBucGlkIE9STTAwMDAg b24gaXNhMAphdHJ0YzA6IDxBVCByZWFsdGltZSBjbG9jaz4gYXQgcG9ydCAweDcwIGlycSA4IG9u IGlzYTAKYXRydGMwOiBXYXJuaW5nOiBDb3VsZG4ndCBtYXAgSS9PLgphdHJ0YzA6IHJlZ2lzdGVy ZWQgYXMgYSB0aW1lLW9mLWRheSBjbG9jaywgcmVzb2x1dGlvbiAxLjAwMDAwMHMKRXZlbnQgdGlt ZXIgIlJUQyIgZnJlcXVlbmN5IDMyNzY4IEh6IHF1YWxpdHkgMAphdHJ0YzA6IG5vbi1QTlAgSVNB IGRldmljZSB3aWxsIGJlIHJlbW92ZWQgZnJvbSBHRU5FUklDIGluIEZyZWVCU0QgMTIuCmNvcmV0 ZW1wMDogPENQVSBPbi1EaWUgVGhlcm1hbCBTZW5zb3JzPiBvbiBjcHUwCmVzdDA6IDxFbmhhbmNl ZCBTcGVlZFN0ZXAgRnJlcXVlbmN5IENvbnRyb2w+IG9uIGNwdTAKWkZTIGZpbGVzeXN0ZW0gdmVy c2lvbjogNQpaRlMgc3RvcmFnZSBwb29sIHZlcnNpb246IGZlYXR1cmVzIHN1cHBvcnQgKDUwMDAp ClRpbWVjb3VudGVycyB0aWNrIGV2ZXJ5IDEuMDAwIG1zZWMKdWdlbjAuMTogPDB4ODA4NiBYSENJ IHJvb3QgSFVCPiBhdCB1c2J1czAKdWh1YjA6IDwweDgwODYgWEhDSSByb290IEhVQiwgY2xhc3Mg OS8wLCByZXYgMy4wMC8xLjAwLCBhZGRyIDE+IG9uIHVzYnVzMApudmQwOiA8S0lOR1NUT04gU0Ex MDAwTTgyNDBHPiBOVk1lIG5hbWVzcGFjZQpudmQwOiAyMjg5MzZNQiAoNDY4ODYyMTI4IDUxMiBi eXRlIHNlY3RvcnMpCmhkYWNjMDogPFJlYWx0ZWsgQUxDODg3IEhEQSBDT0RFQz4gYXQgY2FkIDAg b24gaGRhYzAKaGRhYTA6IDxSZWFsdGVrIEFMQzg4NyBBdWRpbyBGdW5jdGlvbiBHcm91cD4gYXQg bmlkIDEgb24gaGRhY2MwCnBjbTA6IDxSZWFsdGVrIEFMQzg4NyAoUmVhciBBbmFsb2cpPiBhdCBu aWQgMjAgYW5kIDI0LDI2IG9uIGhkYWEwCnBjbTE6IDxSZWFsdGVrIEFMQzg4NyAoRnJvbnQgQW5h bG9nKT4gYXQgbmlkIDI3IGFuZCAyNSBvbiBoZGFhMApwY20yOiA8UmVhbHRlayBBTEM4ODcgKElu dGVybmFsIERpZ2l0YWwpPiBhdCBuaWQgMTcgb24gaGRhYTAKaGRhY2MxOiA8SW50ZWwgS2FieSBM YWtlIEhEQSBDT0RFQz4gYXQgY2FkIDIgb24gaGRhYzAKaGRhYTE6IDxJbnRlbCBLYWJ5IExha2Ug QXVkaW8gRnVuY3Rpb24gR3JvdXA+IGF0IG5pZCAxIG9uIGhkYWNjMQpwY20zOiA8SW50ZWwgS2Fi eSBMYWtlIChIRE1JL0RQIDhjaCk+IGF0IG5pZCAzIG9uIGhkYWExCnNlczAgYXQgYWhjaWVtMCBi dXMgMCBzY2J1czYgdGFyZ2V0IDAgbHVuIDAKc2VzMDogPEFIQ0kgU0dQSU8gRW5jbG9zdXJlIDEu MDAgMDAwMT4gU0VNQiBTLUUtUyAyLjAwIGRldmljZQpzZXMwOiBTRU1CIFNFUyBEZXZpY2UKYWRh MCBhdCBhaGNpY2gwIGJ1cyAwIHNjYnVzMCB0YXJnZXQgMCBsdW4gMAphZGEwOiA8VE9TSElCQSBI RFdEMTEwIE1TMk9BOFIwPiBBVEE4LUFDUyBTQVRBIDMueCBkZXZpY2UKYWRhMDogU2VyaWFsIE51 bWJlciBZODdWTTBORlMKYWRhMDogNjAwLjAwME1CL3MgdHJhbnNmZXJzIChTQVRBIDMueCwgVURN QTYsIFBJTyA4MTkyYnl0ZXMpCmFkYTA6IENvbW1hbmQgUXVldWVpbmcgZW5hYmxlZAphZGEwOiA5 NTM4NjlNQiAoMTk1MzUyNTE2OCA1MTIgYnl0ZSBzZWN0b3JzKQpTR1ggaW5pdGlhbGl6ZWQ6IEVQ QyBiYXNlIDB4MCBzaXplIDAgKDAgcGFnZXMpClRyeWluZyB0byBtb3VudCByb290IGZyb20gemZz Onpyb290L1JPT1QvZGVmYXVsdCBbXS4uLgpSb290IG1vdW50IHdhaXRpbmcgZm9yOiB1c2J1czAK dWh1YjA6IDIyIHBvcnRzIHdpdGggMjIgcmVtb3ZhYmxlLCBzZWxmIHBvd2VyZWQKUm9vdCBtb3Vu dCB3YWl0aW5nIGZvcjogdXNidXMwCnVnZW4wLjI6IDxTaWxpY29uIExhYnMgQ1AyMTAyIFVTQiB0 byBVQVJUIEJyaWRnZSBDb250cm9sbGVyPiBhdCB1c2J1czAKUm9vdCBtb3VudCB3YWl0aW5nIGZv cjogdXNidXMwCnVnZW4wLjM6IDxQaXhBcnQgVVNCIE9wdGljYWwgTW91c2U+IGF0IHVzYnVzMAp1 Z2VuMC40OiA8UmVhbHRlayBCbHVldG9vdGggUmFkaW8+IGF0IHVzYnVzMApTZXR0aW5nIGhvc3R1 dWlkOiAyY2I1NDMxMS1jZTg1LWJmNGYtZDU0Yy00MGIwNzY0MGQ0OGIuClNldHRpbmcgaG9zdGlk OiAweDI2ZDA1OThlLgpTdGFydGluZyBmaWxlIHN5c3RlbSBjaGVja3M6Ck1vdW50aW5nIGxvY2Fs IGZpbGVzeXN0ZW1zOi4KRUxGIGxkY29uZmlnIHBhdGg6IC9saWIgL3Vzci9saWIgL3Vzci9saWIv Y29tcGF0IC91c3IvbG9jYWwvbGliIC91c3IvbG9jYWwvbGliL2dyYXBodml6IC91c3IvbG9jYWwv bGliL215c3FsIC91c3IvbG9jYWwvbGliL25zcyAvdXNyL2xvY2FsL2xpYi9vcGVuY29sbGFkYSAv dXNyL2xvY2FsL2xpYi9wZXJsNS81LjI4L21hY2gvQ09SRSAvdXNyL2xvY2FsL2xpYi9xdDUgL3Vz ci9sb2NhbC9saWIvc2FtYmE0IC91c3IvbG9jYWwvbGx2bTYwL2xpYiAvdXNyL2xvY2FsL3NoYXJl L2Nocm9taXVtCjMyLWJpdCBjb21wYXRpYmlsaXR5IGxkY29uZmlnIHBhdGg6IC91c3IvbGliMzIg L3Vzci9sb2NhbC9saWIzMiAvdXNyL2xvY2FsL2xpYjMyL3dpbmUKTG9hZGluZyBrZXJuZWwgbW9k dWxlczoKc3lzY3RsX3dhcm5fcmV1c2U6IGNhbid0IHJlLXVzZSBhIGxlYWYgKGNvbXBhdC5saW51 eGtwaS5kZWJ1ZykhCmRybW4wOiA8ZHJtbj4gb24gdmdhcGNpMAp2Z2FwY2kwOiBjaGlsZCBkcm1u MCByZXF1ZXN0ZWQgcGNpX2VuYWJsZV9pbwp2Z2FwY2kwOiBjaGlsZCBkcm1uMCByZXF1ZXN0ZWQg cGNpX2VuYWJsZV9pbwpbZHJtXSBVbmFibGUgdG8gY3JlYXRlIGEgcHJpdmF0ZSB0bXBmcyBtb3Vu dCwgaHVnZXBhZ2Ugc3VwcG9ydCB3aWxsIGJlIGRpc2FibGVkKC0xOSkuClN1Y2Nlc3NmdWxseSBh ZGRlZCBXQyBNVFJSIGZvciBbMHg5MDAwMDAwMC0weDlmZmZmZmZmXTogMDsgCltkcm1dIEdvdCBz dG9sZW4gbWVtb3J5IGJhc2UgMHg4ODAwMDAwMCwgc2l6ZSAweDgwMDAwMDAKW2RybV0gU3VwcG9y dHMgdmJsYW5rIHRpbWVzdGFtcCBjYWNoaW5nIFJldiAyICgyMS4xMC4yMDEzKS4KW2RybV0gRHJp dmVyIHN1cHBvcnRzIHByZWNpc2UgdmJsYW5rIHRpbWVzdGFtcCBxdWVyeS4KW2RybV0gQ29ubmVj dG9yIEhETUktQS0xOiBnZXQgbW9kZSBmcm9tIHR1bmFibGVzOgpbZHJtXSAgIC0ga2Vybi52dC5m Yi5tb2Rlcy5IRE1JLUEtMQpbZHJtXSAgIC0ga2Vybi52dC5mYi5kZWZhdWx0X21vZGUKW2RybV0g Q29ubmVjdG9yIEhETUktQS0yOiBnZXQgbW9kZSBmcm9tIHR1bmFibGVzOgpbZHJtXSAgIC0ga2Vy bi52dC5mYi5tb2Rlcy5IRE1JLUEtMgpbZHJtXSAgIC0ga2Vybi52dC5mYi5kZWZhdWx0X21vZGUK W2RybV0gQ29ubmVjdG9yIERQLTE6IGdldCBtb2RlIGZyb20gdHVuYWJsZXM6Cltkcm1dICAgLSBr ZXJuLnZ0LmZiLm1vZGVzLkRQLTEKW2RybV0gICAtIGtlcm4udnQuZmIuZGVmYXVsdF9tb2RlCgoK RmF0YWwgdHJhcCAxMjogcGFnZSBmYXVsdCB3aGlsZSBpbiBrZXJuZWwgbW9kZQpjcHVpZCA9IDA7 IGFwaWMgaWQgPSAwMApmYXVsdCB2aXJ0dWFsIGFkZHJlc3MJPSAweDEKZmF1bHQgY29kZQkJPSBz dXBlcnZpc29yIHJlYWQgZGF0YSwgcGFnZSBub3QgcHJlc2VudAppbnN0cnVjdGlvbiBwb2ludGVy CT0gMHgyMDoweGZmZmZmZmZmODM1NzE4NGYKc3RhY2sgcG9pbnRlcgkgICAgICAgID0gMHgyODow eGZmZmZmZmZmODI2Yjc4MTAKZnJhbWUgcG9pbnRlcgkgICAgICAgID0gMHgyODoweGZmZmZmZmZm ODI2Yjc4ODAKY29kZSBzZWdtZW50CQk9IGJhc2UgMHgwLCBsaW1pdCAweGZmZmZmLCB0eXBlIDB4 MWIKCQkJPSBEUEwgMCwgcHJlcyAxLCBsb25nIDEsIGRlZjMyIDAsIGdyYW4gMQpwcm9jZXNzb3Ig ZWZsYWdzCT0gaW50ZXJydXB0IGVuYWJsZWQsIHJlc3VtZSwgSU9QTCA9IDAKY3VycmVudCBwcm9j ZXNzCQk9IDAgKHNvZnRpcnFfMCkKdHJhcCBudW1iZXIJCT0gMTIKcGFuaWM6IHBhZ2UgZmF1bHQK Y3B1aWQgPSAwCnRpbWUgPSAxNTU5NTY4MTAwCktEQjogc3RhY2sgYmFja3RyYWNlOgojMCAweGZm ZmZmZmZmODBjMTZkZjcgYXQga2RiX2JhY2t0cmFjZSsweDY3CiMxIDB4ZmZmZmZmZmY4MGJjYWNj ZCBhdCB2cGFuaWMrMHgxOWQKIzIgMHhmZmZmZmZmZjgwYmNhYjIzIGF0IHBhbmljKzB4NDMKIzMg MHhmZmZmZmZmZjgxMGE3NTc0IGF0IHRyYXBfZmF0YWwrMHgzOTQKIzQgMHhmZmZmZmZmZjgxMGE3 NWQ5IGF0IHRyYXBfcGZhdWx0KzB4NDkKIzUgMHhmZmZmZmZmZjgxMGE2YmJmIGF0IHRyYXArMHgy OWYKIzYgMHhmZmZmZmZmZjgxMDgxY2E1IGF0IGNhbGx0cmFwKzB4OAojNyAweGZmZmZmZmZmODM0 YTQ0NjAgYXQgdGFza2xldF9oYW5kbGVyKzB4MTAwCiM4IDB4ZmZmZmZmZmY4MGMxNTZjNCBhdCBn dGFza3F1ZXVlX3J1bl9sb2NrZWQrMHgxNDQKIzkgMHhmZmZmZmZmZjgwYzE1MzI4IGF0IGd0YXNr cXVldWVfdGhyZWFkX2xvb3ArMHg5OAojMTAgMHhmZmZmZmZmZjgwYjhiODEzIGF0IGZvcmtfZXhp dCsweDgzCiMxMSAweGZmZmZmZmZmODEwODJjOWUgYXQgZm9ya190cmFtcG9saW5lKzB4ZQpVcHRp bWU6IDVzCkR1bXBpbmcgNzM2IG91dCBvZiAxNjExNSBNQjouLjMlLi4xMSUuLjIyJS4uMzElLi40 MiUuLjUzJS4uNjElLi43MiUuLjgxJS4uOTIlCgotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0Ka2VybmVsIGNvbmZp ZwoKb3B0aW9ucwlDT05GSUdfQVVUT0dFTkVSQVRFRAppZGVudAlHRU5FUklDCm1hY2hpbmUJYW1k NjQKY3B1CUhBTU1FUgptYWtlb3B0aW9ucwlXSVRIX0NURj0xCm1ha2VvcHRpb25zCURFQlVHPS1n Cm9wdGlvbnMJRVZERVZfU1VQUE9SVApvcHRpb25zCVhFTkhWTQpvcHRpb25zCVVTQl9ERUJVRwpv cHRpb25zCUFUSF9FTkFCTEVfMTFOCm9wdGlvbnMJQUhfQVI1NDE2X0lOVEVSUlVQVF9NSVRJR0FU SU9OCm9wdGlvbnMJQUhfU1VQUE9SVF9BUjU0MTYKb3B0aW9ucwlJRUVFODAyMTFfU1VQUE9SVF9N RVNICm9wdGlvbnMJSUVFRTgwMjExX0FNUERVX0FHRQpvcHRpb25zCUlFRUU4MDIxMV9ERUJVRwpv cHRpb25zCVNDX1BJWEVMX01PREUKb3B0aW9ucwlWRVNBCm9wdGlvbnMJUENJX0lPVgpvcHRpb25z CVBDSV9IUApvcHRpb25zCUFDUElfRE1BUgpvcHRpb25zCUVBUkxZX0FQX1NUQVJUVVAKb3B0aW9u cwlTTVAKb3B0aW9ucwlORVREVU1QCm9wdGlvbnMJWlNURElPCm9wdGlvbnMJR1pJTwpvcHRpb25z CUVLQ0QKb3B0aW9ucwlLREJfVFJBQ0UKb3B0aW9ucwlLREIKb3B0aW9ucwlSQ1RMCm9wdGlvbnMJ UkFDQ1RfREVGQVVMVF9UT19ESVNBQkxFRApvcHRpb25zCVJBQ0NUCm9wdGlvbnMJSU5DTFVERV9D T05GSUdfRklMRQpvcHRpb25zCUREQl9DVEYKb3B0aW9ucwlLRFRSQUNFX0hPT0tTCm9wdGlvbnMJ S0RUUkFDRV9GUkFNRQpvcHRpb25zCU1BQwpvcHRpb25zCUNBUEFCSUxJVElFUwpvcHRpb25zCUNB UEFCSUxJVFlfTU9ERQpvcHRpb25zCUFVRElUCm9wdGlvbnMJSFdQTUNfSE9PS1MKb3B0aW9ucwlL QkRfSU5TVEFMTF9DREVWCm9wdGlvbnMJUFJJTlRGX0JVRlJfU0laRT0xMjgKb3B0aW9ucwlfS1BP U0lYX1BSSU9SSVRZX1NDSEVEVUxJTkcKb3B0aW9ucwlTWVNWU0VNCm9wdGlvbnMJU1lTVk1TRwpv cHRpb25zCVNZU1ZTSE0Kb3B0aW9ucwlTVEFDSwpvcHRpb25zCUtUUkFDRQpvcHRpb25zCVNDU0lf REVMQVk9NTAwMApvcHRpb25zCUNPTVBBVF9GUkVFQlNEMTEKb3B0aW9ucwlDT01QQVRfRlJFRUJT RDEwCm9wdGlvbnMJQ09NUEFUX0ZSRUVCU0Q5Cm9wdGlvbnMJQ09NUEFUX0ZSRUVCU0Q3Cm9wdGlv bnMJQ09NUEFUX0ZSRUVCU0Q2Cm9wdGlvbnMJQ09NUEFUX0ZSRUVCU0Q1Cm9wdGlvbnMJQ09NUEFU X0ZSRUVCU0Q0Cm9wdGlvbnMJQ09NUEFUX0ZSRUVCU0QzMgpvcHRpb25zCUVGSVJUCm9wdGlvbnMJ R0VPTV9MQUJFTApvcHRpb25zCUdFT01fUkFJRApvcHRpb25zCVBTRVVET0ZTCm9wdGlvbnMJUFJP Q0ZTCm9wdGlvbnMJQ0Q5NjYwCm9wdGlvbnMJTVNET1NGUwpvcHRpb25zCU5GU19ST09UCm9wdGlv bnMJTkZTTE9DS0QKb3B0aW9ucwlORlNECm9wdGlvbnMJTkZTQ0wKb3B0aW9ucwlNRF9ST09UCm9w dGlvbnMJUVVPVEEKb3B0aW9ucwlVRlNfR0pPVVJOQUwKb3B0aW9ucwlVRlNfRElSSEFTSApvcHRp b25zCVVGU19BQ0wKb3B0aW9ucwlTT0ZUVVBEQVRFUwpvcHRpb25zCUZGUwpvcHRpb25zCVNDVFAK b3B0aW9ucwlUQ1BfUkZDNzQxMwpvcHRpb25zCVRDUF9ISE9PSwpvcHRpb25zCVRDUF9CTEFDS0JP WApvcHRpb25zCVRDUF9PRkZMT0FECm9wdGlvbnMJSVBTRUNfU1VQUE9SVApvcHRpb25zCUlQU0VD Cm9wdGlvbnMJSU5FVDYKb3B0aW9ucwlJTkVUCm9wdGlvbnMJVklNQUdFCm9wdGlvbnMJUFJFRU1Q VElPTgpvcHRpb25zCU5VTUEKb3B0aW9ucwlTQ0hFRF9VTEUKb3B0aW9ucwlORVdfUENJQgpvcHRp b25zCUdFT01fUEFSVF9HUFQKb3B0aW9ucwlHRU9NX1BBUlRfTUJSCm9wdGlvbnMJR0VPTV9QQVJU X0VCUl9DT01QQVQKb3B0aW9ucwlHRU9NX1BBUlRfRUJSCm9wdGlvbnMJR0VPTV9QQVJUX0JTRApk ZXZpY2UJaXNhCmRldmljZQltZW0KZGV2aWNlCWlvCmRldmljZQl1YXJ0X25zODI1MApkZXZpY2UJ Y3B1ZnJlcQpkZXZpY2UJYWNwaQpkZXZpY2UJcGNpCmRldmljZQlmZGMKZGV2aWNlCWFoY2kKZGV2 aWNlCWF0YQpkZXZpY2UJbXZzCmRldmljZQlzaWlzCmRldmljZQlhaGMKZGV2aWNlCWFoZApkZXZp Y2UJZXNwCmRldmljZQlocHRpb3AKZGV2aWNlCWlzcApkZXZpY2UJbXB0CmRldmljZQltcHMKZGV2 aWNlCW1wcgpkZXZpY2UJc3ltCmRldmljZQl0cm0KZGV2aWNlCWlzY2kKZGV2aWNlCW9jc19mYwpk ZXZpY2UJc2NidXMKZGV2aWNlCWNoCmRldmljZQlkYQpkZXZpY2UJc2EKZGV2aWNlCWNkCmRldmlj ZQlwYXNzCmRldmljZQlzZXMKZGV2aWNlCWFtcgpkZXZpY2UJYXJjbXNyCmRldmljZQljaXNzCmRl dmljZQlkcHQKZGV2aWNlCWhwdG12CmRldmljZQlocHRucgpkZXZpY2UJaHB0cnIKZGV2aWNlCWhw dDI3eHgKZGV2aWNlCWlpcgpkZXZpY2UJaXBzCmRldmljZQltbHkKZGV2aWNlCXR3YQpkZXZpY2UJ c21hcnRwcWkKZGV2aWNlCXR3cwpkZXZpY2UJYWFjCmRldmljZQlhYWNwCmRldmljZQlhYWNyYWlk CmRldmljZQlpZGEKZGV2aWNlCW1maQpkZXZpY2UJbWx4CmRldmljZQltcnNhcwpkZXZpY2UJcG1z cGN2CmRldmljZQl0d2UKZGV2aWNlCW52bWUKZGV2aWNlCW52ZApkZXZpY2UJYXRrYmRjCmRldmlj ZQlhdGtiZApkZXZpY2UJcHNtCmRldmljZQlrYmRtdXgKZGV2aWNlCXZnYQpkZXZpY2UJc3BsYXNo CmRldmljZQlzYwpkZXZpY2UJdnQKZGV2aWNlCXZ0X3ZnYQpkZXZpY2UJdnRfZWZpZmIKZGV2aWNl CWFncApkZXZpY2UJY2JiCmRldmljZQlwY2NhcmQKZGV2aWNlCWNhcmRidXMKZGV2aWNlCXVhcnQK ZGV2aWNlCXBwYwpkZXZpY2UJcHBidXMKZGV2aWNlCWxwdApkZXZpY2UJcHBpCmRldmljZQlwdWMK ZGV2aWNlCWlmbGliCmRldmljZQllbQpkZXZpY2UJaXgKZGV2aWNlCWl4dgpkZXZpY2UJaXhsCmRl dmljZQlpYXZmCmRldmljZQl2bXgKZGV2aWNlCWJ4ZQpkZXZpY2UJZGUKZGV2aWNlCWxlCmRldmlj ZQl0aQpkZXZpY2UJdHhwCmRldmljZQl2eApkZXZpY2UJbWlpYnVzCmRldmljZQlhZQpkZXZpY2UJ YWdlCmRldmljZQlhbGMKZGV2aWNlCWFsZQpkZXZpY2UJYmNlCmRldmljZQliZmUKZGV2aWNlCWJn ZQpkZXZpY2UJY2FzCmRldmljZQlkYwpkZXZpY2UJZXQKZGV2aWNlCWZ4cApkZXZpY2UJZ2VtCmRl dmljZQlobWUKZGV2aWNlCWptZQpkZXZpY2UJbGdlCmRldmljZQltc2sKZGV2aWNlCW5mZQpkZXZp Y2UJbmdlCmRldmljZQlwY24KZGV2aWNlCXJlCmRldmljZQlybApkZXZpY2UJc2YKZGV2aWNlCXNn ZQpkZXZpY2UJc2lzCmRldmljZQlzawpkZXZpY2UJc3RlCmRldmljZQlzdGdlCmRldmljZQl0bApk ZXZpY2UJdHgKZGV2aWNlCXZnZQpkZXZpY2UJdnIKZGV2aWNlCXdiCmRldmljZQl4bApkZXZpY2UJ d2xhbgpkZXZpY2UJd2xhbl93ZXAKZGV2aWNlCXdsYW5fY2NtcApkZXZpY2UJd2xhbl90a2lwCmRl dmljZQl3bGFuX2FtcnIKZGV2aWNlCWFuCmRldmljZQlhdGgKZGV2aWNlCWF0aF9wY2kKZGV2aWNl CWF0aF9oYWwKZGV2aWNlCWF0aF9yYXRlX3NhbXBsZQpkZXZpY2UJaXB3CmRldmljZQlpd2kKZGV2 aWNlCWl3bgpkZXZpY2UJbWFsbwpkZXZpY2UJbXdsCmRldmljZQlyYWwKZGV2aWNlCXdpCmRldmlj ZQl3cGkKZGV2aWNlCWNyeXB0bwpkZXZpY2UJbG9vcApkZXZpY2UJcmFuZG9tCmRldmljZQlwYWRs b2NrX3JuZwpkZXZpY2UJcmRyYW5kX3JuZwpkZXZpY2UJZXRoZXIKZGV2aWNlCXZsYW4KZGV2aWNl CXR1bgpkZXZpY2UJbWQKZGV2aWNlCWdpZgpkZXZpY2UJZmlybXdhcmUKZGV2aWNlCWJwZgpkZXZp Y2UJdWhjaQpkZXZpY2UJb2hjaQpkZXZpY2UJZWhjaQpkZXZpY2UJeGhjaQpkZXZpY2UJdXNiCmRl dmljZQl1a2JkCmRldmljZQl1bWFzcwpkZXZpY2UJc291bmQKZGV2aWNlCXNuZF9jbWkKZGV2aWNl CXNuZF9jc2EKZGV2aWNlCXNuZF9lbXUxMGt4CmRldmljZQlzbmRfZXMxMzd4CmRldmljZQlzbmRf aGRhCmRldmljZQlzbmRfaWNoCmRldmljZQlzbmRfdmlhODIzMwpkZXZpY2UJbW1jCmRldmljZQlt bWNzZApkZXZpY2UJc2RoY2kKZGV2aWNlCXZpcnRpbwpkZXZpY2UJdmlydGlvX3BjaQpkZXZpY2UJ dnRuZXQKZGV2aWNlCXZpcnRpb19ibGsKZGV2aWNlCXZpcnRpb19zY3NpCmRldmljZQl2aXJ0aW9f YmFsbG9vbgpkZXZpY2UJaHlwZXJ2CmRldmljZQl4ZW5wY2kKZGV2aWNlCW5ldG1hcApkZXZpY2UJ ZXZkZXYKZGV2aWNlCXVpbnB1dAoKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCmRkYiBjYXB0dXJlIGJ1ZmZlcgoK ZGRiOiBkZGJfY2FwdHVyZToga3ZtX25saXN0Cg== --000000000000acac63058a68ed8e-- From owner-freebsd-stable@freebsd.org Mon Jun 3 11:54:18 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 96F9D15AE5BA for ; Mon, 3 Jun 2019 11:54:18 +0000 (UTC) (envelope-from yamori813@yahoo.co.jp) Received: from nh602-vm1.bullet.mail.ssk.yahoo.co.jp (nh602-vm1.bullet.mail.ssk.yahoo.co.jp [182.22.90.26]) by mx1.freebsd.org (Postfix) with SMTP id 7417374AA9 for ; Mon, 3 Jun 2019 11:54:05 +0000 (UTC) (envelope-from yamori813@yahoo.co.jp) Received: from [182.22.66.104] by nh602.bullet.mail.ssk.yahoo.co.jp with NNFMP; 03 Jun 2019 11:50:44 -0000 Received: from [182.22.91.133] by t602.bullet.mail.ssk.yahoo.co.jp with NNFMP; 03 Jun 2019 11:50:44 -0000 Received: from [127.0.0.1] by omp606.mail.ssk.yahoo.co.jp with NNFMP; 03 Jun 2019 11:50:44 -0000 X-Yahoo-Newman-Property: ymail-3 X-Yahoo-Newman-Id: 19538.90256.bm@omp606.mail.ssk.yahoo.co.jp X-YMail-OSG: MmKVLGMVM1kmL75OE76nZ2nuFtupWF8pgO1whyL._gxcvM8EtRRFzCe1W7ayUUr p0joYfAMaflP8blB9xr4DN1fy_LoSswbkXWV2fmnXtU2x8cVxB8XIxlwRrI8iCotH74ec78z.Shc nuPvkPJDAYzctdgAdCbEpeD1285ps6BbQNo8IoMYo.1HQP7.bp0L4UCu3WJEQypzvMcHfTQ3FDFo 4h8PUm_Ykg6aIuXqJFF7jAQRDI6eZ15zua6CS4CDi8cWDMzbMvzAWoWoPHtmRuVREb_8LoZxd4kD nCDUsDI98hm7He_ung2E0QN_P3VY.IvojzqJ03KHBwuLsaWM5bRBvQ8N9Yh85r4t1NwNKfpteL0m 25RvULvfYXCOLTbSQayathUTM_LsfTZa4zcuBUG2ewTmx8kUmTgwsRsohWw1Ms5Y2H89d2CKSXdp KeE3_0ezeCMx17FEAE1oRsGj_LoPcZEOYkip.s8Z_Qqwnlte1UDWX77Xo7SVUZULM7QQPGgZpnnj cxJm7RC21Rs886nenfpoZCbg8VIrymIKBwX2wHrbl6N3sWlK8IxMotxPWGqNhBY_BCmaiFhgC0dN 7p7mB5_xkrUbfN.iJ24w8s7mWAk49mN5tFFWPdiiKDA-- Received: from jws704001.mail.kks.yahoo.co.jp by sendmailws501.mail.kks.yahoo.co.jp; Mon, 03 Jun 2019 20:50:43 +0000; 1559562643.314 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1559562643; s=yj20110701; d=yahoo.co.jp; h=Date:From:Reply-To:To:Message-ID:In-Reply-To:References:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding; bh=za/YlCigJQBbz1QzIXI+evUMB4bv/0GWC7r23dnUrHs=; b=hOJxPY9wGQ13TWCl64u7EaIrDJAuoZXyAUmImUK5j44BoubofbXHAsDB4TlcKLRk HtYnhfJO01x02UcRG/oSUeUa/9/tawn7moKRyUqIyAr1iMpCdaSjP5/QOoFRCR8e0xr 65lxZLqHaPYGUG7037mBvte1ft7R6fIgJChvboHM= DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=yj20110701; d=yahoo.co.jp; h=Date:From:Reply-To:Message-ID:In-Reply-To:References:MIME-Version:Content-Type:Content-Transfer-Encoding; b=V6gJZ9WC0CTR34Y6Nk57QoyPB1Up68B1mCTz0hf+SXFnT21U9Z/bw3ZDiOWhVVBE fKPQRqzD4GlegllakEJrtstl/fWz+BV40LhhI7O6Sgy+kh9O3qzINk7d9b5s47Lyre2 32eLbcqr80hq4Pt5e3Fpf3aVjesph2uzGOvt5XVk=; Date: Mon, 3 Jun 2019 20:50:42 +0900 (JST) From: Mori Hiroki Reply-To: Mori Hiroki To: Ronald Klop , "freebsd-arm@freebsd.org" , "freebsd-stable@freebsd.org" Message-ID: <1442525240.1981975.1559562642958.JavaMail.yahoo@jws704001.mail.kks.yahoo.co.jp> In-Reply-To: References: Subject: Re: boot 11.3-BETA1 hangs om armv5 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 7417374AA9 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.co.jp header.s=yj20110701 header.b=hOJxPY9w; dmarc=pass (policy=none) header.from=yahoo.co.jp; spf=pass (mx1.freebsd.org: domain of yamori813@yahoo.co.jp designates 182.22.90.26 as permitted sender) smtp.mailfrom=yamori813@yahoo.co.jp X-Spamd-Result: default: False [-2.43 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; HAS_REPLYTO(0.00)[yamori813@yahoo.co.jp]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:182.22.90.0/23]; FREEMAIL_FROM(0.00)[yahoo.co.jp]; DKIM_TRACE(0.00)[yahoo.co.jp:+]; DMARC_POLICY_ALLOW(-0.50)[yahoo.co.jp,none]; MX_GOOD(-0.01)[mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp,mx3.mail.yahoo.co.jp,mx5.mail.yahoo.co.jp,mx1.mail.yahoo.co.jp,mx2.mail.yahoo.co.jp]; NEURAL_HAM_SHORT(-0.60)[-0.596,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[yahoo.co.jp]; ASN(0.00)[asn:23816, ipnet:182.22.0.0/17, country:JP]; IP_SCORE(0.68)[ipnet: 182.22.0.0/17(1.92), asn: 23816(1.53), country: JP(-0.05)]; DWL_DNSWL_NONE(0.00)[yahoo.co.jp.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.64)[-0.637,0]; R_DKIM_ALLOW(-0.20)[yahoo.co.jp:s=yj20110701]; RCVD_COUNT_FIVE(0.00)[5]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; REPLYTO_EQ_FROM(0.00)[]; NEURAL_HAM_LONG(-0.97)[-0.967,0]; MIME_GOOD(-0.10)[text/plain]; FREEMAIL_REPLYTO(0.00)[yahoo.co.jp]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[26.90.22.182.list.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 11:54:18 -0000 Hi. I build and flash on arm/ralink today by CURRENT. arm/ralink is hangup at same point too. Hiroki Mori ----- Original Message ----- > From: Ronald Klop > To: freebsd-arm@freebsd.org; "freebsd-stable@freebsd.org" > Cc:=20 > Date: 2019/5/28, Tue 05:00 > Subject: boot 11.3-BETA1 hangs om armv5 >=20 > Was running "FreeBSD 11.2-RELEASE-p4 (SHEEVAPLUG) #4 r339336M: Sat Oct 13= =C2=A0=20 > 23:31:51 CEST 2018". > Compiled 11.3-BETA1, installed kernel.bin in /boot/msdos and started it.= =C2=A0=20 > Output below. It hangs. I guess in starting the random/entropy stuff. >=20 > Any thoughts or advise? > Don't spend to much time on it, I'm happy to phase it out. >=20 > Regards, > Ronald. >=20 >=20 > Rebooting... >=20 > =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 __=C2=A0 __=C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 _ _ > =C2=A0 =C2=A0 =C2=A0 =C2=A0 |=C2=A0 \/=C2=A0 | __ _ _ ____=C2=A0 _____|= | | > =C2=A0 =C2=A0 =C2=A0 =C2=A0 | |\/| |/ _` | '__\ \ / / _ \ | | > =C2=A0 =C2=A0 =C2=A0 =C2=A0 | |=C2=A0 | | (_| | |=C2=A0 \ V /=C2=A0 __/= | | > =C2=A0 =C2=A0 =C2=A0 =C2=A0 |_|=C2=A0 |_|\__,_|_|=C2=A0 =C2=A0 \_/ \___|= _|_| > =C2=A0 _=C2=A0 _=C2=A0 =C2=A0 ____=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 _ > | | | |=C2=A0 | __ )=C2=A0 ___=C2=A0 ___ | |_ > | | | |___|=C2=A0 _ \ / _ \ / _ \| __| > | |_| |___| |_) | (_) | (_) | |_ > =C2=A0 \___/=C2=A0 =C2=A0 |____/ \___/ \___/ \__| > =C2=A0 ** MARVELL BOARD: SHEEVA PLUG LE >=20 > U-Boot 1.1.4 (Mar 19 2009 - 16:06:59) Marvell version: 3.4.16 >=20 > U-Boot code: 00600000 -> 0067FFF0=C2=A0 BSS: -> 006CEE80 >=20 > Soc: 88F6281 A0 (DDR2) > CPU running @ 1200Mhz L2 running @ 400Mhz > SysClock =3D 400Mhz , TClock =3D 200Mhz >=20 > DRAM CAS Latency =3D 5 tRP =3D 5 tRAS =3D 18 tRCD=3D6 > DRAM CS[0] base 0x00000000=C2=A0 size 256MB > DRAM CS[1] base 0x10000000=C2=A0 size 256MB > DRAM Total size 512MB=C2=A0 16bit width > Flash:=C2=A0 0 kB > Addresses 8M - 0M are saved for the U-Boot usage. > Mem malloc Initialization (8M - 7M): Done > NAND:512 MB >=20 > CPU : Marvell Feroceon (Rev 1) >=20 > Streaming disabled > Write allocate disabled >=20 >=20 > USB 0: host mode > PEX 0: interface detected no Link. > Net:=C2=A0 egiga0 [PRIME], egiga1 > Hit any key to stop autoboot:=C2=A0 0 > (Re)start USB... > USB:=C2=A0 scanning bus for devices... 4 USB Device(s) found > =C2=A0 =C2=A0 =C2=A0 =C2=A0 scanning bus for storage devices... 1 Storage= Device(s) found > reading kernel.bin > . > .........................................................................= ...........................................................................= ...........................................................................= ...........................................................................= ...........................................................................= ................................................... >=20 > 4345316 bytes read > ## Starting application at 0x00900000 ... > Copyright (c) 1992-2019 The FreeBSD Project. > Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 > =C2=A0=C2=A0=C2=A0 The Regents of the University of California. All right= s reserved. > FreeBSD is a registered trademark of The FreeBSD Foundation. > FreeBSD 11.3-BETA1 #0 r348277M: Sun May 26 14:17:08 CEST 2019 > =C2=A0 =C2=A0 builder@rpi3:/data/src/obj-11.3/arm.arm/data/src/11.3/sys/S= HEEVAPLUG=C2=A0=20 > arm > FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on LLV= M=C2=A0=20 > 8.0.0) > CPU: Feroceon 88FR131 rev 1 (**unknown 4** core) > =C2=A0 Little-endian DC enabled IC disabled WA disabled DC streaming ena= bled > =C2=A0 BTB disabled L2 enabled L2 prefetch enabled > =C2=A0 WB enabled LABT branch prediction disabled > =C2=A0 16KB/32B 4-way instruction cache > =C2=A0 16KB/32B 4-way write-back-locking-C data cache > real memory=C2=A0 =3D 536866816 (511 MB) > avail memory =3D 518778880 (494 MB) > SOC: Marvell 88F6281 rev A0, TClock 200MHz > =C2=A0 Instruction cache prefetch enabled, data cache prefetch enabled > =C2=A0 256KB 4-way set-associative write-through unified L2 cache > random: entropy device external interface > _______________________________________________ > freebsd-arm@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-arm=20 > To unsubscribe, send any mail to "freebsd-arm-unsubscribe@freebsd.org" >=20 From owner-freebsd-stable@freebsd.org Mon Jun 3 16:55:40 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4384315B6FE5 for ; Mon, 3 Jun 2019 16:55:40 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E9C2D8A221; Mon, 3 Jun 2019 16:55:38 +0000 (UTC) (envelope-from stefan.hegnauer@gmx.ch) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559580931; bh=Ehcy60KYn+KwXIE3LMuVhDgotr8lCgcNplh8R22CkGw=; h=X-UI-Sender-Class:Subject:To:References:Cc:From:Date:In-Reply-To; b=DWL/J+mJsmwMYVHmZUi3qpn5IsaZ39czJ+kKoia86HkQdWASEGdxF0Q6YsOfDCE6K Qb3XXkzSiqZZIdVOKwgq+W3BNUd7gwjIU2JgMdVB9K5hjXaJSNybAs67RNci24su/H vh59yYD/5w5WuSI5OAKj94HRmawivliXy4+791xs= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.20.50] ([84.226.167.60]) by mail.gmx.com (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1Ml6qM-1gr6MW3zqu-00lUiL; Mon, 03 Jun 2019 18:50:17 +0200 Subject: Re: ps -J0 broken? To: freebsd-stable@freebsd.org References: Cc: kostikbel@gmail.com, kevans@freebsd.org, re@freebsd.org From: Stefan Hegnauer Openpgp: preference=signencrypt Message-ID: Date: Mon, 3 Jun 2019 18:50:16 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-GB X-Provags-ID: V03:K1:59mjzLmWs8Os9pUGz2KQrG9HSeftGOYOBsjOC3UvlJHMioIwZPA LlwDiGQjemK7UHSlMvKGjm+P3hLxuf7zUA/GXAeSniMVLgwWtpqU5gFMwgR6/di9bWWhqsi NRluBW9YIMahrIuSyxYnwR/trkuEdw9xUJ8f0yH2uupNpB/I27qYZVIv+papFFMv3oOHzzy zqKtIg+nSBQ6LbBg2pq0w== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:mpu8LYvx3r0=:GRGEZ3f4GE2Y1ADfcz3W3A ieaKxmBC/VFpLx1ooP1vvT7H1G6BVyIQiJ/BhrnPU/Ec/FJexWh0z/bqCNgLZLkLUhF44xOFd lkGK46hMs3GUQMBuPbiHPcU4jHzcVvEUjGQ8SGW0U/Pssg7S8rkBn83tBgT0CiJrqIxbfD5Il SMTn5e7Tpp0XMKjWxdpVCx5OEd0s+GojfeBCtVG3kFgqTfzs24U3sR/EGDS8ovmF7f4Uuk12f Wf80vkNZwLZN5FI0Gt8AEXOXiIOQsYl2sNtpr497W/LYagNawrQL9NxDkUiL6M6Idi+tOCb9i N6xuGZJwP/h7G6XiU4BwUMmwahbCqVUSrOMcJaX0YOb2L9rfU2zMJLn0NW8hnIRVKuioNvKCN WFpFbhkdrtBmuaUjnUfm0coS63yti91Z3kQvBedmXaiDNCuoMiVY4WkCBuaDMfDTi2PNp8nYb q83reV68eyUvggUKg2kJuKKUP+QyX4/5KCdLzO5UoQgTAhWAQ5vHB3pEdsRxpEx7cBv3L3rzl N3eIl6YtQhIMO1OtITjpxTmUaU+EzSYdQg/y24QI1M7vh57vRL07KDE4Yn7KiSicAUGnlDbaA uyCc0jjCNwSMAUL0sQPiU8hsUTeYMoRpmhBzKf5ZfsioTs3jXXc89T0PFpCpMfRzzSDXECALF +EPzPVBSe6x8Q+QyixCs6dfwqwA0zNYgw1iEOx3NjsJYWNfbawIK0XEe6CmnqI0djsR3Npo6o pdH78kN9jLK6+7hx7LeGf0hNm5qIfqGeP1xz818fE5ltirT59zRshN/ILZWWiz33bdeSDTFeg 5TUXo7/Pqb9R2DfwG9cW4zhcGphERYDgqynh0y6ybj/ENHdOSlWzWUffSqZSk0TeLjbUjyUaN JqLdfcWs/Ml19uK1qEIH9daHCxdx6dTylifcrhXmHtxg9tqxpNsocH7kvh8dP5bVSbq+RdzqL DiocwStH57/FWrbG5HURchNG124lthAq+8Nvz9QPafvK85ti7nsXa X-Rspamd-Queue-Id: E9C2D8A221 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=DWL/J+mJ; spf=pass (mx1.freebsd.org: domain of stefan.hegnauer@gmx.ch designates 212.227.15.18 as permitted sender) smtp.mailfrom=stefan.hegnauer@gmx.ch X-Spamd-Result: default: False [-3.31 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+ip4:212.227.15.0/25]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[gmx.ch]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; MX_GOOD(-0.01)[mx00.emig.gmx.net,mx01.emig.gmx.net]; RCVD_IN_DNSWL_NONE(0.00)[18.15.227.212.list.dnswl.org : 127.0.3.0]; NEURAL_HAM_SHORT(-0.74)[-0.743,0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; IP_SCORE(-1.06)[ip: (-6.37), ipnet: 212.227.0.0/16(-1.46), asn: 8560(2.56), country: DE(-0.00)]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; FREEMAIL_CC(0.00)[gmail.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 16:55:40 -0000 On 02.06.2019 15:51, Kyle Evans wrote: >> On Sun, Jun 2, 2019 at 8:05 AM Konstantin Belousov wrote: >>> On Sun, Jun 02, 2019 at 02:30:49PM +0200, Stefan Hegnauer wrote: >>>> Hi, >>>> >>>> after a recent full update to 12.0-STABLE r348382 it seems that '/bin/ps >>>> -J 0' is broken: 'ps: Invalid jail id: 0'. >>>> It did work on stable for the last couple years prior to this update >>>> (last update without this error was about 5 weeks ago), and should still >>>> work according to ps(1): >>>> -J Display information about processes which match the specified >>>> jail IDs. This may be either the jid or name of the jail. >>>> **Use** >>>> ** -J 0 to display only host processes*.* This flag implies >>>> -x by >>>> default. >>>> >>>> My system runs several jails with JID's currently in the range 80-100. >>>> The source code of ps did not change for the last 7 month as far as I >>>> can tell. A fresh 'make clean & make & make install' of just ps did not >>>> help either, which was not really surprising to me. >>>> Any pointers where to look further? >>> Is your libjail up to date ? Do you have r348297 ? >> kern_jail_get refuses to do lookups for jid=0, presumably because >> prison 0 is special. I'll commit quick fix- libjail should go back to >> just return (jid) if jid == 0, because this will always exist. It's a >> trivial patch, I intend to request permission for immediate MFC to >> both stable/1{1,2} from re@ because it restores previous working >> behavior for this. > Thanks. I will follow up as soon as the patch is in stable/12 and I had > a chance to test it. > I am happy to report success - with r348538 the old behaviour is restored. Thank you all for the extremely quick reaction! -Stefan From owner-freebsd-stable@freebsd.org Tue Jun 4 14:01:40 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5AFF115B1729 for ; Tue, 4 Jun 2019 14:01:40 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 4623A69DD5 for ; Tue, 4 Jun 2019 14:01:38 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 000E415B171D; Tue, 4 Jun 2019 14:01:38 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8D56915B171C; Tue, 4 Jun 2019 14:01:37 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0FC6B69DCB; Tue, 4 Jun 2019 14:01:36 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mail-wm1-x32a.google.com with SMTP id 22so189962wmg.2; Tue, 04 Jun 2019 07:01:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :mime-version:content-disposition:user-agent; bh=VnWuZdDsVYUYmBvyON+a9n5IcKTpqHPlN52WdVxhcd4=; b=R1c//OTGzSpvtDAw1h44pkrBWyX+PRB9MG0hxyjAhkdAi8b54iOS25SgVdlGBe3V8V Igs632FWL9enI/pAG4YHpuuGbta9jTECVTi3pz7PyRlkuE9hZ8cgpM+0YyIT+eCpEHeH hiCmC62Lnbo5dokQFbiw/qnBss3UXmHmh4QlKCEs+S1kDCiYDnTnuDfLTXvOh/Ik9k1/ guhAmqS/8zxdVs2vU4e6mb23i1A1aGtrZDkyiumXuIkG0U1DBHGMMfjYf3iH9U1keptS +Gr9eE69bdaFIuPpTutXqkCkWaNuSzixe0E9gkmdhDYMG0VTLUPHclKrT8mp1nGqjOX8 +5bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mail-followup-to:mime-version:content-disposition:user-agent; bh=VnWuZdDsVYUYmBvyON+a9n5IcKTpqHPlN52WdVxhcd4=; b=am1N3zLczHKWCwBY1vFR+N+82FzS5XtQjplvjBnOfTcAzXWrr92te9tIKspUE0x5kv gQEhmEOAD3THbqPh2DBkaaIE4jeffiUcvM+bOKWu+/leU7a6/45Q/KoLJp27Ojj15rl6 GKDvikOYh3QkI+hFSazh6mcmfKiihKolCrXmGUVpJsrLb8QnPQJp9isC8eh5XnURjfWb w0WBqVYvaX0Lt+98INtQ5JwHl5JNbTu8lxgGgGBTYrOWu+RbYK46vAlXqnh6y0f65w5b Kq59pD1oU3eaLw1SVlGa6o/2aEZCmLnCjrskpwka0NvRIihFXfAYR7lfEX+OkLzW9m5p GRkw== X-Gm-Message-State: APjAAAV+SFc44cofxZRRNvSzDIFBZ7ZV4YhB4euF6D04OFFFFVKR4Uaw FYgLo4k5H71TmbzNER6iysqE+5gG X-Google-Smtp-Source: APXvYqyMsF+OEbZQVYC5hDhd4ydiGS38An+gd3zL6iCmIaB2CKG0OQp/xN/28mkmWbznpQxDd3EtvQ== X-Received: by 2002:a1c:407:: with SMTP id 7mr6853725wme.113.1559656892863; Tue, 04 Jun 2019 07:01:32 -0700 (PDT) Received: from v2 (c0600.int.cl.cam.ac.uk. [128.232.86.88]) by smtp.gmail.com with ESMTPSA id k10sm11225291wmk.14.2019.06.04.07.01.31 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 04 Jun 2019 07:01:31 -0700 (PDT) Sender: =?UTF-8?Q?Edward_Tomasz_Napiera=C5=82a?= Date: Tue, 4 Jun 2019 14:03:40 +0100 From: Edward Tomasz =?utf-8?Q?Napiera=C5=82a?= To: hackers@freebsd.org Cc: current@freebsd.org, stable@freebsd.org Subject: FreeBSD Quarterly Status Report - First Quarter 2019 Message-ID: <20190604130340.GA2359@v2> Mail-Followup-To: hackers@freebsd.org, current@freebsd.org, stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="AhhlLboLdkugWU4S" Content-Disposition: inline User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: 0FC6B69DCB X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=R1c//OTG; spf=pass (mx1.freebsd.org: domain of etnapierala@gmail.com designates 2a00:1450:4864:20::32a as permitted sender) smtp.mailfrom=etnapierala@gmail.com X-Spamd-Result: default: False [-7.60 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.95)[-0.952,0]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[trasz@freebsd.org,etnapierala@gmail.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[trasz@freebsd.org,etnapierala@gmail.com]; FORGED_RECIPIENTS(0.00)[hackers@freebsd.org ..,hackers@freebsd.org ...]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; IP_SCORE(-2.84)[ip: (-9.59), ipnet: 2a00:1450::/32(-2.26), asn: 15169(-2.29), country: US(-0.06)]; RCVD_IN_DNSWL_NONE(0.00)[a.2.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 14:01:40 -0000 --AhhlLboLdkugWU4S Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable FreeBSD Project Quarterly Status Report - 1st Quarter 2019 As spring leads into summer, we reflect back on what the FreeBSD project has accomplished in the first quarter of 2019. Events included FOSDEM and AsiaBSDCon, the FreeBSD Journal is now free to everyone, ASLR is available in -CURRENT and KPTI can be controlled per-process. The run up to 11.3-RELEASE has begun, and a team is applying syzkaller guided fuzzing to the kernel, plus so much more. Catch up on many new and ongoing efforts throughout the project, and find where you can pitch in. __________________________________________________________________ FreeBSD Team Reports * Continuous Integration * FreeBSD Core Team * FreeBSD Foundation * FreeBSD Release Engineering Team * Ports Collection Projects * AXP803 PMIC driver update * Broadcom ARM64 SoC support * C Runtime changes * Capsicum * CFT - Package Base * ENA FreeBSD Driver Update * FreeBSD boot security improvements * FUSE * Kernel ZLIB Update * LLVM's lld as the FreeBSD system linker * mlx5 Drivers Update * PCI Express Resets * Security-Related changes Architectures * FreeBSD/RISC-V Update Ports * FreeBSD GNOME status report * FreeBSD KDE status report Third-Party Projects * FreeBSD Wiki Apple Intel Mac mini update * Fuzzing FreeBSD with syzkaller * sysctlmibinfo API 1.0 * sysctlview 1.0 * University of Waterloo Co-operative Education Students __________________________________________________________________ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. Continuous Integration Links FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org/ FreeBSD Jenkins wiki URL: https://wiki.freebsd.org/Jenkins freebsd-testing Mailing List URL: https://lists.FreeBSD.org/mailman/listinfo/freebsd-testing freebsd-ci Repository URL: https://github.com/freebsd/freebsd-ci Tickets related to freebsd-testing@ URL: https://preview.tinyurl.com/y9maauwg Hosted CI wiki URL: https://wiki.freebsd.org/HostedCI FreeBSD CI weekly report URL: https://hackfoldr.org/freebsd-ci-report/ Contact: Jenkins Admin Contact: Li-Wen Hsu The FreeBSD CI team maintains continuous integration system and related tasks for the FreeBSD project. The CI system regularly checks the changes committed to the project's Subversion repository can be successfully built, and performs various tests and analysis of the results. The results from build jobs are archived in an artifact server, for the further testing and debugging needs. The CI team members examine the failing builds and unstable tests, and work with the experts in that area to fix the code or adjust test infrastructure. Starting from this quarter, we started to publish CI weekly report at freebsd-testing@ mailing list. The archive is available at https://hackfoldr.org/freebsd-ci-report/ We also worked on extending test executing environment to improve the code coverage, temporarily disabling flakey test cases, and opening tickets to work with domain experts. The details are of these efforts are available in the weekly CI reports. We published the draft FCP for CI policy and are ready to accept comments. Please see freebsd-testing@ related tickets for more information. Work in progress: * Fixing the failing test cases and builds * Adding drm ports building test against -CURRENT * Implementing automatic tests on bare metal hardware * Implementing the embedded testbed * Planning for running ztest and network stack tests * Help more 3rd software get CI on FreeBSD through a hosted CI solution __________________________________________________________________ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Core initiated a Release Engineering Charter Modernization working group. The purpose of the working group is to present (to Core) a modernized version of the Release Engineering Charter and a first version of a new Release Engineering Team Operations Plan. The group hopes to complete its goals and dissolve by 2019-06-30. The Core Team invites all members of the FreeBSD community to complete the 2019 FreeBSD Community Survey. https://www.research.net/r/freebsd2019 The purpose of the survey is to collect quantitative data from the public in order to help guide the project's priorities and efforts. It will remain open for 17 days and close at midnight May 13 UTC (Monday 5pm PDT). (Editor's note: Survey has finished) Core voted to approve source commit bits for Johannes Lundberg (johalun@) and Mitchell Horne (mhorne@) and associate membership for Philip Jocks. Core also voted to revoke Michael Dexter's documentation bit. After a long lapse of not closing idle source commit bits, core has taken in the commit bit for these developers. We thank each for contributing to the project as a source committer. * Alfred Perlstein (alfred@) * Eric Badger (badger@) * Daniel Eischen (deischen@) * Ermal Lu=E7i (eri@) * Tony Finch (fanf@) * Justin T. Gibbs (gibbs@) * Imre Vad=E1sz (ivadasz@) * Julio Merino (jmmv@) * John W. De Boskey (jwd@) * Kai Wang (kaiw@) * Luigi Rizzo (luigi@) * Neel Natu (neel@) * Craig Rodrigues (rodrigc@) * Stanislav Sedov (stas@) * Thomas Quinot (thomas@) * Andrew Thompson (thompsa@) * Pyun YongHyeon (yongari@) * Zbigniew Bodek (zbb@) __________________________________________________________________ FreeBSD Foundation Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage software development projects, conferences and developer summits, and provide travel grants to FreeBSD contributors. The Foundation purchases and supports hardware to improve and maintain FreeBSD infrastructure and provides resources to improve security, quality assurance, and release engineering efforts; publishes marketing material to promote, educate, and advocate for the FreeBSD Project; facilitates collaboration between commercial vendors and FreeBSD developers; and finally, represents the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. Here are some highlights of what we did to help FreeBSD last quarter: We kicked off the year with an all-day board meeting in Berkeley, where FreeBSD began, to put together high-level plans for 2019. This included prioritizing technologies and features we should support, long-term planning for the next 2-5 years, and philosophical discussions on our purpose and goals. Partnerships and Commercial User Support We began the year by meeting with a few commercial users, to help them navigate working with the Project, and understanding how they are using FreeBSD. We're also in the process of setting up meetings for Q2 and throughout the rest of 2019. Because we're a 501(c)(3) non-profit, we don't directly support commercial users. However, these meetings allow us to focus on facilitating collaboration with the community. Fundraising Efforts Our work is 100% funded by your donations. We kicked off the year with many individual and corporate donations, including donations and commitments from NetApp, Netflix, Intel, Tarsnap, Beckhoff Automation, E-Card, VMware, and Stormshield. We are working hard to get more commercial users to give back to help us continue our work supporting FreeBSD. Please consider making a donation to help us continue and increase our support for FreeBSD at: www.FreeBSDfoundation.org/donate/. We also have the Partnership Program, to provide more benefits for our larger commercial donors. Find out more information at https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-program/ and share with your companies! OS Improvements The Foundation improves the FreeBSD operating system by employing our technical staff to maintain and improve critical kernel subsystems, add features and functionality, and fix problems. This also includes funding separate project grants like the arm64 port, porting the blacklistd access control daemon, and the integration of VIMAGE support, to make sure that FreeBSD remains a viable solution for research, education, computing, products and more. Over the quarter there were 241 commits from nine Foundation-sponsored staff members and grant recipients. We kicked off or continued the following projects last quarter: * FUSE file system kernel support (update and bug fixes) * Linuxulator testing and diagnostics improvements * SDIO and WiFi infrastructure improvements * x86-64 scalability and performance improvements * OpenZFS Online RAID-Z Expansion Having software developers on staff has allowed us to jump in and work directly on projects to improve FreeBSD like: * amd64 and i386 pmap improvements and bugfixes * address userland threading library issues * improve i386 support to keep the platform viable * improve FreeBSD on RISC-V * application of the Capsicum sandboxing framework * build system improvements and bug fixes * respond to reports of security issues * implement vulnerability mitigations * tool chain updates and improvements * adding kernel code coverage support for the Syzkaller coverage-guided system call fuzzer * improved Syzkaller support for FreeBSD * improve the usability of freebsd-update * improve network stack stability and address race conditions * ensure FreeBSD provides userland interfaces required by contemporary applications * implement support for machine-dependent optimized subroutines * update and correct documentation and manpages * DTrace bug fixes * update the FreeBSD Valgrind port and try to upstream the changes Continuous Integration and Quality Assurance The Foundation provides a full-time staff member who is working on improving our automated testing, continuous integration, and overall quality assurance efforts. During the first quarter of 2019, Foundation staff continued improving the project's CI infrastructure, working with contributors to fix failing build and test cases, and working with other teams in the project for their testing needs. In this quarter, we started publishing the CI weekly report on the freebsd-testing@ mailing list. See the FreeBSD CI section of this report for more information. Release Engineering The Foundation provides a full-time staff member to oversee the release engineering efforts. This has provided timely and reliable releases over the last five years. During the first quarter of 2019, the FreeBSD Release Engineering team continued providing weekly development snapshots for 13-CURRENT, 12-STABLE, and 11-STABLE. In addition, the Release Engineering team published the schedule for the upcoming 11.3-RELEASE cycle, the fourth release from the stable/11 branch, which builds on the stability and reliability of 11.2-RELEASE. The upcoming 11.3-RELEASE schedule can be found at: https://www.freebsd.org/releases/11.3R/schedule.html FreeBSD 11.3 is currently targeted for final release in early July 2019. Please see the FreeBSD Release Engineering Team section of this quarterly status report for additional details surrounding the above mentioned work. Supporting FreeBSD Infrastructure The Foundation provides hardware and support to improve FreeBSD infrastructure. Last quarter, we continued supporting FreeBSD hardware located around the world. FreeBSD Advocacy and Education A large part of our efforts are dedicated to advocating for the Project. This includes promoting work being done by others with FreeBSD; producing advocacy literature to teach people about FreeBSD and help make the path to starting using FreeBSD or contributing to the Project easier; and attending and getting other FreeBSD contributors to volunteer to run FreeBSD events, staff FreeBSD tables, and give FreeBSD presentations. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, to work together on projects, and to facilitate collaboration between developers and commercial users. This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. Check out some of the advocacy and education work we did last quarter: * Attended FOSDEM 2019 where we: staffed the FreeBSD Stand, sponsored the co-located FreeBSD Developer Summit, and gave the 25 Years of FreeBSD presentation in the BSD Dev room. * Sponsored and presented at SANOG33 in Thimphu, Bhutan * Represented FreeBSD at APRICOT 2019 in Yuseong-gu, Daejeon South Korea * Sponsored the USENIX FAST conference in Boston, MA as an Industry Partner * Ran our first ever FreeBSD track at SCALE 17x, which included an all-day Getting Started with FreeBSD workshop. We were thrilled with the turnout of almost 30 participants and received a lot of positive feedback. Thanks to Roller Angel who taught the class with the help of Deb Goodkin and Gordon Tetlow. We also promoted FreeBSD at the FreeBSD table in the Expo Hall. * Sponsored, presented, and exhibited at FOSSASIA in Singapore * Sponsored AsiaBSDCon 2019 * Committed to sponsoring Rootconf, BSDCan, and EuroBSDcon * Created registration systems for the Aberdeen Hackathon and the upcoming 2019 Vienna FreeBSD Security Hackathon * Provided FreeBSD advocacy material * Provided 3 travel grants to FreeBSD contributors to attend many of the above events. We continued producing FreeBSD advocacy material to help people promote FreeBSD around the world. Read more about our conference adventures in the conference recaps and trip reports in our monthly newsletters. We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. We're excited to announce that with the release of the January/February 2019 issue, the FreeBSD Journal is now a free publication. Find out more and access the latest issues at www.FreeBSDfoundation.org/journal/. You can find out more about events we attended and upcoming events at www.FreeBSDfoundation.org/news-and-events/. We also engaged with a new website developer to help us improve our website to make it easier for community members to find information more easily and to make the site more efficient. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to www.FreeBSDfoundation.org to find out how we support FreeBSD and how we can help you! __________________________________________________________________ FreeBSD Release Engineering Team Links FreeBSD 11.3-RELEASE schedule URL: https://www.freebsd.org/releases/11.3R/schedule.html FreeBSD development snapshots URL: https://download.freebsd.org/ftp/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the first quarter of 2019, the FreeBSD Release Engineering team published the initial schedule for the upcoming the 11.3-RELEASE. FreeBSD 11.3-RELEASE will be the fourth release from the stable/11 branch, building on the stability and reliability of 11.2-RELEASE. FreeBSD 11.3-RELEASE is currently targed for release in early July, 2019. Additionally throughout the quarter, several development snapshots builds were released for the head, stable/12, and stable/11 branches. Much of this work was sponsored by the FreeBSD Foundation. __________________________________________________________________ Ports Collection Links About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing/= ports-contributing.html FreeBSD Ports Monitoring URL: http://portsmon.freebsd.org/index.html Ports Management Team URL: https://www.freebsd.org/portmgr/index.html Contact: Ren=E9 Ladan Contact: FreeBSD Ports Management Team As always, below is a summary of what happened in the Ports Tree during the last quarter. During 2019q1, the number of ports dropped slightly to just over 32,500. At the end of the quarter, we had 2092 open port PRs. The last quarter saw 8205 commits from 167 committers. So more PRs were closed and more commits were made than in 2018q4. During the last quarter, we welcomed Kai Knoblich (kai@) and said goodbye to Matthew Rezny (rezny@). On the infrastructure side, two new USES were introduced (azurepy and sdl) and USES=3Dgecko was removed. The default versions of Lazarus and LLVM were bumped to 2.0.0 and 8.0 respectively. Some big port frameworks that were end-of-life were removed: PHP 5.6, Postgresql 9.3, Qt4, WebKit-Gtk and XPI. Firefox was updated to 66.0.2, Firefox-ESR to 60.6.1, and Chromium was updated to 72.0.3626.121. During the last quarter, antoine@ ran 30 exp-runs for package updates, moving from GNU ld to LLVM ld, and switching clang to DWARF4. __________________________________________________________________ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. AXP803 PMIC driver update Contact: Ganbold Tsagaankhuu The AXP803 is a highly integrated PMIC that targets Li-battery (Li-ion or Li-polymer) applications. It provides flexible power management solution for processors such as the Allwinner A64 SoC. This SoC is used by Pinebook. The following updates were performed on the AXP803 driver: * Enabled necessary bits when activating interrupts. This allows reading some events from the interrupt status registers. These events are reported to devd via system "PMU" and subsystem "Battery", "AC" and "USB" such as plugged/unplugged, battery absent, charged and charging. * Added sensors support for AXP803/AXP813. Sensor values such as battery charging, charge state, voltage, charging current, discharging current, battery capacity can be obtained via sysctl. * Added sysctl for setting battery charging current. The charging current can be set using steps from 0 to 13. These steps correspond to 200mA to 2800mA, with a granularity of 200mA/step. __________________________________________________________________ Broadcom ARM64 SoC support Contact: Michal Stanek Contact: Marcin Wojtas The Semihalf team continued working on FreeBSD support for the Broadcom BCM5871X SoC series BCM5871X are quad-core 64-bit ARMv8 Cortex-A57 communication processors targeted for networking applications such as 10G routers, gateways, control plane processing and NAS. Completed since the last update: * iProc PCIe root complex (internal and external buses) * OTP (One Time Programmable memory) driver In progress: * BNXT Ethernet support * Crypto engine acceleration for IPsec offloading. Todo: * Upstreaming of work. This work is expected to be submitted/merged to HEAD in the second half of 2019. This project was sponsored by Juniper Networks, Inc. __________________________________________________________________ C Runtime changes Contact: Konstantin Belousov Several changes where made to the C runtime which generally improves the environment provided to an application. Fix for libraries with initial exec TLS mode Some libraries, most prominent of which is NVidia-provided and thus binary-only libGL.so.1, use so called initial exec mode for TLS variables access. This is the fastest mode of TLS access, but its drawback is that it only reliably work when the main binary is linked against the library, i.e. dlopen-ing the library to load it at runtime is not guaranteed to work. This mode works by placing the TLS variables for objects in one area allocated during the executable initialization, which somewhat explains the name of the mode. An obvious consequence is that if such library is loaded later, there is no space in the TLS area for an application to put its TLS variables. The FreeBSD dynamic linker is aware of misbehaviour of the app builders, and provides some amount of slack in the TLS area to give space for such libraries. But it appeared that the initial content of the TLS segment from libraries was not distributed among the threads' TLS areas, still breaking libraries which use initial exec mode for TLS. Another issue that somewhat mitigates mis-use of the mode is the DF_STATIC_TLS flag in the dynamic section. This flag allows the linker to check for the space earlier and avoid loading dependencies if there is no total required space. This linker flag was implemented by the BFD ld linker, but not by the LLVM lld linker. The FreeBSD dynamic linker was fixed to properly distribute TLS initialization data to all threads' initial segments, which required reasonably extensive per-architecture changes to libc and libthr. Simultaneously, LLD was improved to mark libraries using initial exec TLS mode with the appropriate flag. These measures should make FreeBSD more resilent to improperly linked libraries. The most interesting fix is to users of the nvidia libgl library, because it cannot be fixed by relinking. Use rtld malloc in libthr The FreeBSD implementation of mutexes in libthr allocates some memory to keep the mutex data needed for mutex initialization. In contrast, the malloc implementation used by FreeBSD, jemalloc(3), requires working pthread mutexes for operation. This creates a chicken-and-egg problem during executable startup, and requires jemalloc to provide fragile hacks to make it possible to initialize mutexes. This has been a constant source of mismatches on imports of new versions of jemalloc. The FreeBSD rtld implementation already contained a very light-weight malloc implementation, suitable for limited use in pre-C-runtime environments. This seemed to be the ideal fit for an allocator for the pthread private mutexes memory. By using this allocator, a method to address the cyclic dependencies between jemalloc and libthr could finally be implemented. The entry points in the rtld malloc.c were renamed to avoid a clash with the libc exported symbols, and now the file is linked statically into libthr, providing an allocator for private mutexes and pthread key storage. The later was already switched to direct use of mmap(2) for similar reasons. Now less memory is wasted when key storage requires less than a page. Destructors order bug Alexander Kabaev (kan@) noted that C++ destructors for the static objects from the linked shared libraries are executed before C++ destructors of the static objects from the main binary. This was verified both for clang++ and g++, but amusingly not for __attribute__(((destructor))). The bug was introduced when init functions and init arrays for main binary startup are called from the rtld instead of csu (C startup code linked to the binary, typically from crt1.o). The cause is due to the somewhat complicated way of how destructors are called both by fini/fini arrays and rtld-registered atexit(3) handler. Solution is to register rtld atexit(3) handler before main binary init functions are called, using new internal ABI __libc_atexit() function. It is amusing that the bug was not noticed for so many years. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Capsicum Links Capsicum Wiki Page URL: https://wiki.FreeBSD.org/Capsicum Contact: Enji Cooper Contact: Mark Johnston Contact: Ed Maste Contact: Mariusz Zaborski Contact: Bora =D6zarslan Three themes for Capsicum work were: * Importing Google's Capsicum test suite into FreeBSD * Porting and sandboxing openrsync for FreeBSD * Applying capsicum to additional base system utilities The Googletest-based Capsicum test cases are now integrated into FreeBSD. After some discussion with David Drysdale - the main maintainer and developer for the Capsicum port on Linux - we decided that from now the FreeBSD will be upstream for Capsicum test cases. The next major step was sandboxing openrsync. In the course of that work we extended our fileargs service with two new functionalities. We modified the fileargs service to allow limiting the operations which can be performed, and can now delegate lstat to the Casper service. Furthermore, openrsync highly depends on the fts API. We spend some time in optimizing fts and making it sandbox friendly by introducing fts_openat function and removing the need to change the working directory to traverse the paths. The changes to the fts API are now in the tests phase. Moreover, we improved bootstrapping for non-FreeBSD machines. Thanks to this work we can now build tools needed to bootstrap FreeBSD which use Casper services. In the base system strings is now sandboxed as a result. We also sandboxed rtsol, rtsold, and savecore. We host biweekly Capsicum calls. The notes from the meetings are published in FreeBSD's Capsium meeting repository on GitHub. If you would like to join the call do not hesitate to send us an email. __________________________________________________________________ CFT - Package Base Links Package Base CFT - FAQ URL: https://trueos.github.io/pkgbase-docs/ Contact: Kris Moore The TrueOS project has been working on a Package Base implementation, and is pleased to issue its first CFT to the FreeBSD community. The TrueOS packaging work has been in development for close to 6 months, and differs from the original FreeBSD package base effort, in that it is an "out of tree" implementation. It allows any version of FreeBSD to be packaged, and only requires a patch to poudriere, as well as some minor ports enhancements, the first which is currently in review. For more information on the current status, please refer to the FAQ page. Additionally there will be a working-group at BSDCan 2019, and we encourage porters to attend and join the discussion. This project was sponsored by iXsystems Inc. __________________________________________________________________ ENA FreeBSD Driver Update Links ENA README URL: https://github.com/amzn/amzn-drivers/blob/master/kernel/fbsd/ena/R= EADME Contact: Michal Krawczyk Contact: Marcin Wojtas ENA (Elastic Network Adapter) is the smart NIC available in the virtualized environment of Amazon Web Services (AWS). The ENA driver supports multiple transmit and receive queues and can handle up to 100 Gb/s of network traffic, depending on the instance type on which it is used. ENAv2 has been under development for FreeBSD, similar to Linux and DPDK. Since the last update internal review and improvements of the patches were done, followed by validation on various AWS instances. To do: * Upstream of the ENAv2 patches Recently, AWS released the A1 instances which are arm64 instances. The FreeBSD kernel was fixed, so the ENA can be used on those instances with no issues. There were changes required in resource activation in the ENA driver r345371 and the addition of a missing bus release method to the nexus module for aarch64 r345373. With these changes, the ENA driver can run on A1 instances without any known issues. This project was sponsored by Amazon.com Inc. __________________________________________________________________ FreeBSD boot security improvements Links Veriexec manifest verification in kernel URL: https://svnweb.freebsd.org/changeset/base/345830 TPM as entropy source URL: https://svnweb.freebsd.org/changeset/base/345438 UEFI support in libsecureboot URL: https://svnweb.freebsd.org/changeset/base/344840 Contact: Michal Stanek Contact: Marcin Wojtas Contact: Kornel Duleba FreeBSD gained TPM 2.0 (Trusted Platform Module) support at the end of 2018. A kernel configuration option, TPM_HARVEST, was also added to use the TPM RNG as system entropy source. When used this way, the TPM can be harvested every ten seconds for entropy which is mixed into the OS entropy pool. The kernel option is currently disabled by default in amd64 GENERIC kernel configuration. UEFI Secure Boot support, developed by Semihalf, has been merged with sjg's Veriexec support, resulting in a unified library named libsecureboot. This library is used for verification of kernel and modules by the loader. The library uses BearSSL as the cryptographic backend. The library supports loading trusted and blacklisted certificates from UEFI (DB/DBx databases) and can use them as trust anchors for the verification. The library is also used by Veriexec to verify and parse the authentication database (called 'manifest') in the kernel. Previously the manifest was verified and parsed by a userspace application, then sent to the kernel via /dev/veriexec, which was a significant limitation and a security weakness. To do: * Backport to stable branches. Special thanks to sjg and Juniper for fruitful cooperation around Veriexec and the libsecureboot development. This project was sponsored by Stormshield. __________________________________________________________________ FUSE Contact: Alan Somers FUSE (File system in USErspace) allows a userspace program to implement a file system. It is widely used to support out-of-tree file systems like NTFS, as well as for exotic pseudo file systems like sshfs. FreeBSD's fuse driver was added as a GSoC project in 2012. Since that time, it has been largely neglected. The FUSE software is buggy and out-of-date. Our implementation is about 11 years behind. The FreeBSD Foundation has agreed to fund a project to improve the state of the FreeBSD FUSE driver. So far I've written a test suite for the fusefs(5) module, fixed 1 previously reported bug, discovered and fixed 6 new bugs, fixed all of fusefs's Coverity CIDs, made some minor performance enhancements and done some general cleanup. During the next quarter I plan to continue fixing bugs, and I'll also raise the driver's API level as high as I can before the quarter runs out. We're currently at 7.8; the highest defined level is 7.28. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Kernel ZLIB Update Links Review D19706 URL: https://reviews.freebsd.org/D19706 Contact: Yoshihiro Ota The FreeBSD system still uses an ancient (over 20 year-old) version of zlib (version 1.0.4). The FreeBSD kernel zlib implementation has special enhancements only used by netgraph. There is a separate version of code derived from unzip 5.12 used to inflate gzip files in the kernel which could be replaced with a more modern zlib. More detailed information is written in sys/modules/zlib/README in the review. In order to use the latest zlib, version 1.2.11, work has been done to revisit all existing zlib uses in the system. Most of the code works with the newer version of zlib as is. The unzip code will need some conversion work to use the newer zlib. A few callers will be made simplier by using some newer APIs available in the updated zlib. There are some zombie programs that have been broken and I would like to delete. This will clean up zombie programs and duplicated zlib code. This will also make future zlib version updates easier. These changes touch some very sensitive areas of the system, such as kernel loading, or are architecture specific like armv6/armv7, and also touch some legacy code like kgzip+kgzldr on i386. Testers and active users of these legacy zlib code are welcomed. * armv elf_trampoline Arm up to v5 can boot from gzipped kernel. This code is modified to use newer API for simplicity. Please verify gzipped kernel still boots with new code (Current code has fall back to legacy zlib in case of failure). Please also elaborate how to link such kernel, too. I'm still trying to figure that out. * netgraph compression/decompression Please help testing and/or teach how to test. Netgraph compiles in the FreeBSD zlib version inside. * gzipped a.out Does anyone use gzipped a.out executables, still? If so, does someone have an easy and safe program to run? Is a.out format i386 only? * zfs boot Can we boot from gzipped file system today? * CTF Checking how I can test. __________________________________________________________________ LLVM's lld as the FreeBSD system linker Links LLD on the FreeBSD Wiki URL: https://wiki.freebsd.org/LLD lld exp-run =20 URL: https://bugs.freebsd.org/214864 Contact: Ed Maste In FreeBSD-HEAD and 12.0 the default FreeBSD system linker (i.e., /usr/bin/ld) is LLVM's lld, on amd64, arm64, and armv7. For i386 in 12.0 lld is used as the bootstrap linker (i.e., to build the kernel and base system) but it is not enabled as the system linker because of multiple issues building FreeBSD ports with it enabled. The primary issue affecting i386 with lld is that many ports build position-dependent code (i.e., non-PIC) for use in shared libraries. This either comes from omitting the -fPIC compiler flag, or using hand-written position-dependent assembly. Compared with other CPU architectures i386 position-independent code is rather inefficient, which may be responsible for port authors making an explicit decision to avoid PIC. By default lld does not allow position-dependent code in shared objects (in particular, it does not permit relocations against read-only segments - typically containing the`.text` section). Over the last quarter many commits were made to the ports tree to fix the build when the system linker is lld - either building PIC code, or adding the -znotext linker flag to permit relocations against read-only segments, or just switching the port to link with GNU ld if it is incompatible with lld in some other way. At this point there are only a few dozen open bug reports for issues linking ports with lld as the system linker, and I expect FreeBSD 12.1 to use lld as the system linker on i386 as well. Tasks: * Fix freepascal/Lazarus ports with lld * Triage and address remaining port failures * Holistic review of lld workarounds in the ports tree, to identify changes that are no longer needed, should be addressed in lld, or should be sent upstream This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ mlx5 Drivers Update Links Mellanox OFED for FreeBSD Documentation URL: http://www.mellanox.com/page/products_dyn?product_family=3D193&mta= g=3Dfreebsd_driver Contact: Slava Shwartsman, Hans Petter Selasky, Konstantin Belousov The mlx5 driver provides support for PCI Express adapters based on ConnectX-4(LX), ConnectX-5(EX) and ConnectX-6(DX). The mlx5en driver provides support for Ethernet and the mlx5ib driver provides support for InfiniBand and RDMA over Converged Ethernet, RoCE. Following updates done in mlx5 drivers: * Added support for ConnectX-6 and ConnectX-6dx devices, which support of up to 200Gb/s interface speeds! * Added TLS hardware offload support for ConnectX-6dx devices. TLS Tx crypto offload is a new feature for network devices. It enables the kernel TLS socket to skip encryption and authentication operations on the transmit side of the data path, delegating those to the NIC. In turn, the network adapter encrypts packets that belong to an offloaded TLS socket on the fly. The Mellanox network adapter does not modify any packet headers. It expects to receive fully framed TCP packets with TLS records as payload. The NIC replaces plaintext with ciphertext and fills the authentication tag. The adapter does not hold any state beyond the context needed to encrypt the next expected packet, i.e. expected TCP sequence number and crypto state. * Add support for Dynamic Receive Queue Interrupt Moderation. Dynamic Interrupt Moderation (DIM) refers to any action made by hardware and/or software on run time to control interrupt rate on the system. The moderation action itself should not interfere with the system's operation and should not require any human interaction. In networking, dynamic interrupt moderation is used for controlling the rate of interrupts generated by the hardware for multiple traffic scenarios. * Enhanced support for self-healing mechanism: In a rare occasion when Mellanox network adapters fail, due to a firmware bug for example, the driver will sense the catastrophic error. As a result of this failure detection, the device driver can trigger a firmware reset for the device so it can recover - without the need to reboot the entire host. * Added support for in-driver firmware updating using mlx5tool. This project was sponsored by Mellanox Technologies. __________________________________________________________________ PCI Express Resets Contact: Konstantin Belousov Sometimes the need to reset a device attached to the system presents itself. Preferrably this device reset can be accomplished without causing the whole machine to reboot. It is easy to do with USB devices if the physical access is available -- you can just re-plug the device. For in-chassis devices, built-in, or on add-on cards, it is not possible to reset the device with physical action, unless the device is hot-plugged. Nonetheless, for typical modern PCIe devices, and most built-in PCI-emulation devices, the reset can be initiated using software actions. If device is a real plugged-in PCIe device, then reset can be initiated by disabling and then re-training PCIe-link by the upstream port controls. For most PCI devices, which support the PCI power management specification, the proven way to accomplish the reset is to put the device into state D3 (off) and then return to the previous power state. FreeBSD was missing a way to conveniently request user- or driver-initiated reset of devices. While it was possible to manually fiddle with registers using pciconf, this is impractical for users, and requires a lot of boilerplate code from drivers. A new BUS_RESET_CHILD() method was added to the newbus bus interface, and implementations added for PCIe bridges and PCI devices. The libdevctl(3) library call and devctl(8) command provide convenient userspace accessors for applications and administrators. During the reset, the device driver must stop its operations with the device. One way to achieve this is to detach drivers before reset, and re-attach after the device afterwards. This is mostly fine for network interfaces, but other devices require more coordination to handle properly. For example, an NVMe disk device being detached it means that all mounted volumes abruptly disapper from VFS view. Due to this, the BUS_RESET_CHILD() method allows the caller to select either detach/re-attach or suspend/resume driver actions around the reset. Mellanox uses the infrastructure to perform reset of the mlx(5) card after firmware reset without server reboot. It is believed that 'devctl reset' will be more widely useful. This project was sponsored by Mellanox Technologies. __________________________________________________________________ Security-Related changes Contact: Konstantin Belousov ASLR The ASLR (Address Space Layout Randomization) patch from review D5603 was committed into svn. While debate continues about the current and forward-looking value ASLR provides, having an implementation in the FreeBSD source tree makes it easily available to those who wish to use it. This also moves the conversation past the relative merits to more comprehensive security controls. KPTI per-process control The KPTI (Kernel Page Table Isolation) implementation was structured so that most selections of page isolation mode were local to the current address space. In other words, the global control variable pti was almost unused in the code paths, instead the user/kernel %cr3 values were directly loaded into registers or compared to see if the user page table was trimmed. Some missed bits of code were provided by Isilon, and then bugs were fixed and last places of direct use of pti were removed. Now when the system starts in the pti-enabled mode, proccontrol(1) can be used by root to selectively disable KPTI mode for children of a process. The motivation is that if you trust the program that you run, you can get the speed of non-pti syscalls back, but still run your normal user session in PTI mode. E.g., firefox would be properly isolated. Feature-control bits Every FreeBSD executable now contains a bit mask intended for enabling/disabling security-related features which makes sense for the binary. This mask is part of the executable segments loaded on image activation, and thus is part of any reasonable way to authenticate the binary content. For instance, the ASLR compatibility is de-facto the property of the image and not of the process executing the image. The first (zero) bit in the mask controls ASLR opt-out. Other OSes (e.g. Solaris) used an OS-specific dynamic flag, which has the same runtime properties but leaves less bits to consume in the feature-control mask. The feature-control mask is read both by kernel and by rtld during image activation. It is expected that more features will be added to FreeBSD and the mask can be used for enabling/disabling those features.. It is expected that a tool to manipulate the mask will be provided shortly, see review D19290. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Architectures Updating platform-specific features and bringing in support for new hardware platforms. FreeBSD/RISC-V Update Contact: Ruslan Bukin Contact: Mitchell Horne Contact: Mark Johnston Work has continued on RISC-V port in the past quarter. Support for transparent superpage promotion was added to the RISC-V port, meaning that applications will now automatically use large page mappings when possible. Per-CPU pmap activation tracking was added, reducing the overhead of various pmap operations. This noticeably improves the responsiveness of FreeBSD when running in a multi-CPU virtual machine. A RISC-V implementation of minidumps was completed. Support for debugging RISC-V kernel dumps will land in devel/gdb after the next GDB release. It is now possible to compile the in-tree LLVM's RISC-V target by setting WITH_LLVM_TARGET_RISCV=3DYES in /etc/src.conf. The use of LLVM to compile the RISC-V port is currently experimental and further investigation is ongoing. Work is ongoing to bring up FreeBSD on SiFive's HiFive Unleashed development board now that one has been obtained by a FreeBSD developer. We also expect to work on support for a new version of the SBI specification. This project was sponsored by The FreeBSD Foundation, DARPA, AFRL. __________________________________________________________________ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. FreeBSD GNOME status report Links GNOME FreeBSD =20 URL: https://freebsd.org/gnome/ GNOME development Repo URL: https://github.com/freebsd/freebsd-ports-gnome Contact: Koop Mast Contact: Eric Turgeon Ports activity in this quarter were: * The x11-toolkits/gtk30 port updated to 3.24.5 and later to 3.24.7. * The www/webkit2-gtk3 port was updated to 2.24.0. * And the old insecure webkit-gtk2 and webkit-gtk3 where finally removed. Work in progress, the branches are available in the GNOME development repo, see the link above. * Eric Turgeon is working on MATE 1.22 in the mate-1.22 branch. And is almost complete. * Charlie Li (IRC: vishwin) is working on a long overdue update of the cinnamon desktop. This update is almost complete. The only real blocker is that the screensaver can't be unlocked after it activates. The work is in the cinnamon branch. * Koop Mast works on GNOME 3.32. The desktop is usable apart from gdm which is currently non-functional. Due to lack of free time the work is going slowly. This work is available in the gnome-3.32 branch. People who are willing to contribute can find us on #freebsd-gnome on freenode. __________________________________________________________________ FreeBSD KDE status report Links KDE FreeBSD URL: https://freebsd.kde.org/ Contact: Adriaan de Groot Contact: Tobias C. Berner The two biggest accomplishements this quarter were: * Qt4 and all its consumers have been removed from the ports tree. * www/qt5-webengine has been updated from the ancient 5.9.4 to 5.12.x by kai@ Further we have kept the KDE Frameworks, Plasma and Applications ports up to date with upstreams releases, which thanks to upstreams' FreeBSD-CI uses less and less patches. All the kde@ maintained ports (including cmake) have been kept up to date with their releases. The plans for the next quarter are in no particular order * Cleanup PyQt ports and pyqt.mk * Improve qt.mk components * Update sddm to 0.18.x * Implement user management functionality in system settings (write non-logind backend) People who are willing to contribute can find us on #kde-freebsd on freenode, and the kde@FreeBSD.org mailing list. Further we accept pull-requests and contributions on github.com/freebsd/freebsd-ports-kde. __________________________________________________________________ Third-Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. FreeBSD Wiki Apple Intel Mac mini update Links FreeBSD Wiki URL: https://wiki.freebsd.org/IntelMacMini Contact: Trevor Roydhouse The FreeBSD Wiki page for the Apple Intel Mac minis has been comprehensively updated over the last quarter to drag it from 2009 into 2019. There are now detailed instructions for installing FreeBSD as the only operating system on models from 2007 through 2014 and itemised model specific information detailing FreeBSD support. If anyone is interested, help is needed to provide more specific information for the macmini 1,1 and 6,1 through 8,1 models and to test patches for the asmc(4) driver for temperature sensor feedback and for setting fan speed. If you would like to help and have access to these Mac minis, please contact me. Future tasks: * Create and test more patches for asmc(4) to cover all Intel Mac minis * Provide more information for 2006, 2012, 2014 and 2018 Mac minis * Instructions for dual boot (macOS/FreeBSD) installations __________________________________________________________________ Fuzzing FreeBSD with syzkaller Links syzkaller URL: https://github.com/google/syzkaller Contact: Mark Johnston Contact: Andrew Turner Contact: Michael Tuexen Contact: Ed Maste Syzkaller is a coverage-guided system call fuzzer. It was originally developed for Linux. It programmatically creates programs consisting of sequences of random system calls and executes them in a VM (virtual machine). Using feedback from a kernel code coverage facility called kcov, syskaller mutates the generated test programs in an attempt to expand the executed coverage of code paths within the kernel. Sometimes exercising a seldom or infrequently used code path will crash the kernel. When syzkaller manages to crash the running kernel in the VM, it attempts to generate a minimal test case which reproduces the crash, simplifying debugging. Syzkaller is very effective at finding kernel bugs and has uncovered hundreds of issues in Linux. Over the past couple of years, syzkaller's author, Dmitry Vyukov, has added support for other operating systems, including FreeBSD. Recently, a number of FreeBSD developers have been using syzkaller to find and fix bugs in the FreeBSD kernel. If interested, one can search the commit logs for "syzkaller" to find examples. Syzkaller can be run on a FreeBSD or Linux host to fuzz FreeBSD running in QEMU instances. It can also fuzz FreeBSD instances running on GCE (Google Compute Engine). Additionally, Google maintains a dedicated cluster of GCE hosts to continuously fuzz the latest builds of several different OS kernels. A FreeBSD target was recently added. Subscribe to the syzkaller-freebsd-bugs Google Group to receive notifications for newly discovered bugs. Work is ongoing to improve syzkaller's coverage of FreeBSD's system calls. In particular, syzkaller needs to be taught about all of the target kernel's entry points and argument types in order to be useful. Many of the standard POSIX system calls are already covered, but most FreeBSD-specific system calls are not. Similarly, many ioctl(2) definitions are missing. Some in-progress work aims to add support for bhyve as a VM backend for syzkaller, making it easier to fuzz FreeBSD VMs hosted on FreeBSD. Currently that can be done using QEMU, but QEMU on FreeBSD lacks support for hardware acceleration. See the PR for the implementation. Finally, a number of bugs identified by syzkaller have yet to be fixed. If you are interested in helping out with any of the above, please mail the contacts listed above. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ sysctlmibinfo API 1.0 Links gitlab.com/alfix/sysctlmibinfo URL: https://gitlab.com/alfix/sysctlmibinfo Contact: Alfonso Sabato Siciliano Port: devel/libsysctlmibinfo The sysctl() system call can get or set the value of a 'property' of the system. A 'property' has others info (description, type, label, etc.), they are necessary to build an utility like /sbin/sysctl, example: % sysctl -d kern.ostype kern.ostype: Operating system type % sysctl -t kern.ostype kern.ostype: string Primarily sysctlmibinfo wraps the undocumented kernel interface and provides an easy C API: sysctlmif_name(), sysctlmif_description(), sysctlmif_info(), sysctlmif_label(), sysctlmif_nextnode() and sysctlmif_nextleaf(), to retrieve the info of a 'property'. Moreover sysctlmibinfo provides a high level API: defines a struct sysctlmif_object and has some function: sysctlmif_filterlist(), sysctlmif_grouplist() and sysctlmif_tree(), to build lists and trees of objects. You can use this library to quickly build a custom sysctl utility. For example, the core of deskutils/sysctlview (a graphical explorer for the sysctl MIB Tree) is just a call to sysctlmif_tree() and a visit to the resulting tree to show its sysctlmif_object nodes. Note, actually a 'property' is an OID of the sysctl MIB, it is implemented by a struct sysctl_oid defined in sys/sysctl.h. __________________________________________________________________ sysctlview 1.0 Links gitlab.com/alfix/sysctlview URL: https://www.gitlab.com/alfix/sysctlview Contact: Alfonso Sabato Siciliano Port: deskutils/sysctlview The FreeBSD's kernel maintains a Management Information Base where the objects are properties to tuning the system using the sysctl() syscall and the /sbin/sysctl utility. The sysctlview utility is a "graphical sysctl MIB explorer", it depends on gtkmm (to build a GUI) and sysctlmibinfo (to retrieve the info from the kernel). The version 1.0 provides two "TreeView": * "Main" to show 'name', 'description', 'type', 'format' and 'value' * "Flags" to show 'name' and a column for each 'flag' defined in sys/sysctl.h The rows are "clickable" to display others info (e.g., 'label'). Currently sysctlview can show numeric and string values, the support for some opaque value will be added in the future. __________________________________________________________________ University of Waterloo Co-operative Education Students Contact: Ed Maste For the January-April 2019 term the FreeBSD Foundation has again brought on two co-operative education (co-op) students from the University of Waterloo. Gerald Aryeetey is a 2nd year Computer Engineering student. Gerald started looking at a FreeBSD tool chain issue - our static library archiver (ar) did not read or write archives in the 64-bit format. Gerald submitted a libarchive change to support 64-bit archives followed by change to FreeBSD's ar to add 64-bit support. Gerald later looked at a number of freebsd-update issues in FreeBSD's bugzilla database, and submitted many fixes. Around a dozen have been committed to FreeBSD, and more are in review. Gerald also worked on the FreeBSD Foundation's hardware continuous integration effort. The prototype installation is building FreeBSD on a commit-by-commit basis and testing on a BeagleBone Black and a Pine64 LTS. The prototype will be converted to a permanent, public installation in the near future, after which additional test devices will be added. For his final project Gerald intends to write a device driver for the Microchip LAN743x PCIe NIC. Bora =D6zarslan is a 3rd year student in Computing and Financial Management. Bora's initial focus was also on tool chain issues in FreeBSD, starting with improvements or bug fixes in FreeBSD's readelf (from the ELF Tool Chain project). Bora developed a tool to modify feature control bits in ELF binaries - for example, allowing binaries incompatible with ASLR to request to opt-out. As part of his readelf work Bora also added support to report the status of the feature control bits. Bora continued investigating security topics, looking at applying Capsicum sandboxing to Kristaps' BSD licensed rsync implementation, openrsync. This work required first implementing fileargs_lstat support in cap_fileargs (which as now been committed) as well as changes to the fts directory hierarchy routines (which have not yet been committed to FreeBSD). For the rest of the work term Bora will investigate and test unmodified Linux Docker containers on FreeBSD, to evaluate the state of Linuxulator support. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ --AhhlLboLdkugWU4S Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGmBAEBCgCQFiEEbvjBe1hu6u1NeinjJCKD+Vwk/7oFAlz2bCxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDZF RjhDMTdCNTg2RUVBRUQ0RDdBMjlFMzI0MjI4M0Y5NUMyNEZGQkESHHRyYXN6QGZy ZWVic2Qub3JnAAoJECQig/lcJP+6vQEH/1PyJpCjUnDgEnJbQH1pbfE35cGSVznN ru6aT8XbSYR/qaAUs2aZ/hzaXTm7KqEfnid/UHr25gw4kQq1BBEqJcm7vzrTJmik w/M1ZhH4CbvWmYdz/avH4AJo91ayjPfl9tniAVAoMHVhcO/y2K/6pv4M/7LsY1bp dG7vU9VEe+QOrA/5NURf72E5RwYAn/E7jllqc8FUHuy/54iSMkbYw5bf5lYD2nQP v1VTWjdwp8kIbA23ci4vHyHE1HEggY7Ukrgnh1GprEwIVtKqhxwi5fcSFK+s0v13 FvI54ZSrQLAtQAxFVzXrPrEb4loHcBHtGU37WdbW4nCzC3I7ynZWVI4= =jsrm -----END PGP SIGNATURE----- --AhhlLboLdkugWU4S-- From owner-freebsd-stable@freebsd.org Wed Jun 5 13:14:48 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A945815AD61C for ; Wed, 5 Jun 2019 13:14:48 +0000 (UTC) (envelope-from mario.olofo@gmail.com) Received: from mail-qk1-x72f.google.com (mail-qk1-x72f.google.com [IPv6:2607:f8b0:4864:20::72f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B336C82A34 for ; Wed, 5 Jun 2019 13:14:47 +0000 (UTC) (envelope-from mario.olofo@gmail.com) Received: by mail-qk1-x72f.google.com with SMTP id w187so5044497qkb.11 for ; Wed, 05 Jun 2019 06:14:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=3YlvnE76eKnrnzEFIOajM1lIUT8Ubgaie/EHOJu73I0=; b=FsqupFk8W0lhn6b8ykhKd/7d5hiNUBopCZvPb4JAUo6I6c7MhNvznT8xyQQs4LSjWc q3FDSf0Zkhon33Qd1mv3Z8f/T0q35U7+32reB6tw2H/kwlpnc18EpySjClBiJaV5+Ocd LrDYR5BtlvAc97MCc73TxlulX5xrUqVg92PGdsh9IS3yw0EbhTSHZ7Mk9thdlA46ZjbE GIScKuBXJu+rL7yHs/mFFdZju/2+an9qYlSgetlc4R5yDxPpxdr7oJb4TumkfGnEBEpv deFaPITUomTxsPoZ8GErgtULlDBdJBFhbKIC0kGfmDq0+S1kbhVmRVOSBoU+ht2+jcI7 xFjg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=3YlvnE76eKnrnzEFIOajM1lIUT8Ubgaie/EHOJu73I0=; b=gqMnt0+1VJRAx0wT+GdrhHpZ8owPc8988jMpqbwfIeJeJj82HfjdnATFrWBpNuPsxs Ggcg3NWLyTSbLEdcvQh0aExJedqYIxk4gxu7vstU5a7/QngOf0qAcePGKt4lnMJhp0ZU WUQTLBB7C1EixoyDJ1BEGvqxlyOBaDPOe/b2hQ28D7e8KLuth80P/hOM51nCMyPjp3uh VIpTMsiuj1L4InsPmplzM4Oxl+DGRehtuloGzgoNghXqQzK50QGR0zJ9HE8dGfK424GD 0tOJMcUiRnsCBkfUN9D6qCBKhH1Ln/NoGUvhijCTVOYn03t5tbib/J0QYEbutMF4pGAQ W/kg== X-Gm-Message-State: APjAAAUwbYsgOjgE2UNMl6p5vOeYvwLZ6xzAQeAC19cvWptcSvBbKdnH Cg90dKfw+l26DLLNcPhuLG3sBSe4pRBZcGMGRioyMNB0 X-Google-Smtp-Source: APXvYqxSZFT4nQlZrzLq3jpU7blFbZJnDXIMmIllS9JxkZQrLd8ApnuuKUI/1q2VSJvKsEg1IMWRIUYHJAL791HiRfs= X-Received: by 2002:a37:be41:: with SMTP id o62mr21840808qkf.356.1559740486950; Wed, 05 Jun 2019 06:14:46 -0700 (PDT) MIME-Version: 1.0 From: Mario Olofo Date: Wed, 5 Jun 2019 10:14:35 -0300 Message-ID: Subject: ZFS - Problem removing files after changing the compression type To: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: B336C82A34 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=FsqupFk8; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of marioolofo@gmail.com designates 2607:f8b0:4864:20::72f as permitted sender) smtp.mailfrom=marioolofo@gmail.com X-Spamd-Result: default: False [-6.97 / 15.00]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.93)[-0.930,0]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-3.03)[ip: (-9.55), ipnet: 2607:f8b0::/32(-3.23), asn: 15169(-2.30), country: US(-0.06)]; RCVD_IN_DNSWL_NONE(0.00)[f.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 13:14:49 -0000 Hello guys, I'm configuring a new installation of FreeBSD-12.0-RELEASE and installed with ZFS for the root file system. I run the command zfs set compression=lz4 root, and after this, the system become a little weird. I tried to test some npm install to see if the compression was working and it is, but when I try to run some commands (ie. ng serve), it fails with I/O error. Deleted the node_modules directory and when I tried to delete the .npm dir, the system returns "Directory not empty". When run as sudo rm -rf, the result is "Unknown error: 122" I did something that I was not supposed to? In the btrfs one can change the compression on the fly without issues because of metadata, don't know if zfs behaves this way too. My system is a Dell G3, with a i5 8gen and an SSD on the m.2 slot running the FreeBSD (on UFS the notebook freezes and halt when I run npm install). Gentoo and Windows running on the same SSD and it's all good. Thank you, Best reggards, Mario From owner-freebsd-stable@freebsd.org Wed Jun 5 13:43:58 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 27E7E15AE478 for ; Wed, 5 Jun 2019 13:43:58 +0000 (UTC) (envelope-from dweimer@dweimer.net) Received: from webmail.dweimer.net (24-240-198-186.static.stls.mo.charter.com [24.240.198.186]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "dweimer.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6E2AA83A63 for ; Wed, 5 Jun 2019 13:43:56 +0000 (UTC) (envelope-from dweimer@dweimer.net) Received-SPF: pass (webmail.dweimer.net: authenticated connection) receiver=webmail.dweimer.net; client-ip=10.9.5.1; helo=www.dweimer.net; envelope-from=dweimer@dweimer.net; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10; Received: from www.dweimer.net (pfSense.dweimer.me [10.9.5.1]) (authenticated bits=0) by webmail.dweimer.net (8.15.2/8.15.2) with ESMTPSA id x55DYeCG044434 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Wed, 5 Jun 2019 08:34:40 -0500 (CDT) (envelope-from dweimer@dweimer.net) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 05 Jun 2019 08:34:35 -0500 From: "Dean E. Weimer" To: Mario Olofo Cc: freebsd-stable@freebsd.org Subject: Re: ZFS - Problem removing files after changing the compression type Reply-To: dweimer@dweimer.net In-Reply-To: References: User-Agent: Roundcube Webmail/1.4-rc1 Message-ID: <00ea216052cd77e568ac6d3b21a53e4d@dweimer.net> X-Sender: dweimer@dweimer.net Organization: dweimer.net X-Rspamd-Queue-Id: 6E2AA83A63 X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.42 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[dweimer@dweimer.net]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:24.240.198.184/29]; REPLYTO_ADDR_EQ_FROM(0.00)[]; HAS_ORG_HEADER(0.00)[]; DKIM_TRACE(0.00)[dweimer.net:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[dweimer.net,reject]; MX_GOOD(-0.01)[dweimer.net.c2.mx1.ik2.com,dweimer.net.c2.mx2.ik2.io]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(0.13)[asn: 20115(0.73), country: US(-0.06)]; ASN(0.00)[asn:20115, ipnet:24.240.196.0/22, country:US]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.91)[-0.913,0]; R_DKIM_ALLOW(-0.20)[dweimer.net:s=2017.01.31]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_SHORT(-0.63)[-0.629,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 13:43:58 -0000 On 2019-06-05 8:14 am, Mario Olofo wrote: > Hello guys, > > I'm configuring a new installation of FreeBSD-12.0-RELEASE and > installed > with ZFS for the root file system. > I run the command zfs set compression=lz4 root, and after this, the > system > become a little weird. > I tried to test some npm install to see if the compression was working > and > it is, but when I try to run some commands (ie. ng serve), it fails > with > I/O error. > Deleted the node_modules directory and when I tried to delete the .npm > dir, > the system returns "Directory not empty". > When run as sudo rm -rf, the result is "Unknown error: 122" > > I did something that I was not supposed to? > In the btrfs one can change the compression on the fly without issues > because of metadata, don't know if zfs behaves this way too. > > My system is a Dell G3, with a i5 8gen and an SSD on the m.2 slot > running > the FreeBSD (on UFS the notebook freezes and halt when I run npm > install). > Gentoo and Windows running on the same SSD and it's all good. > > Thank you, > Best reggards, > > Mario You should be able to change ZFS compression on the fly. Old data already written is not changed, but new writes will use the new compression setting. I have done this before, It looks like something else is happening I don't think the issue is related to the ZFS compression setting. I am not familiar with npm, so I have no idea whats going on there. Look at your dmesg output and check logs to see if the system logged any disk access errors also check status of zpool with zpool status. -- Thanks, Dean E. Weimer http://www.dweimer.net/ From owner-freebsd-stable@freebsd.org Wed Jun 5 15:03:56 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 325E215B090B for ; Wed, 5 Jun 2019 15:03:56 +0000 (UTC) (envelope-from mario.olofo@gmail.com) Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5B72486C11 for ; Wed, 5 Jun 2019 15:03:55 +0000 (UTC) (envelope-from mario.olofo@gmail.com) Received: by mail-qt1-x832.google.com with SMTP id l3so18329825qtj.5 for ; Wed, 05 Jun 2019 08:03:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6LlfWZcWu7u0zrxecZn4fpC4+ysDPPtyKMaWNnswFAk=; b=NIxyjmbzp/LOK8tq8uugzuCTsVP/JGaxsgjvoMR5fjKNdn1wQ46gHsQCk6auHr2aWb bddwiiCZAJ0GLWMswXAb5rvmW2R8hyJhI/qvrIxm4IDKM2u0ecQLwhS0/3kyDhJLDmeT yVVRNErdqxXSRLy0i4wGV3xhAueafWj1JCbvxpOp4UMQOTgAN06j6dgaHi6g7IFCzI+Q oqw3EJgUtthmohUE5n00pIYxin+wtEKSYQ9LYFrLVILTTtfIuDKiiYBpoNjOTJhR1DOU hyphtfhn533H4DKMhIxbUASnxexffUBpz8+oEeqq56CBwl/Qz6x+5x8g+9op+G1LJbyV pNHA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6LlfWZcWu7u0zrxecZn4fpC4+ysDPPtyKMaWNnswFAk=; b=P/fj5CpnQuVWLyZnLxN5AgM0YIxYi+BH7VassKNJZyaASi/rl9ALDs2PUY5/fLeHKl N6FSYGiwunqR7Gavh5YK7OnjM/EZQ+9R+qxHP5rtMFBTKTsqYbTv4SycDsb+kJzGCI/U mHaIkMeDEJkzyCHkXfpi48DMmYOWlMUWJiIs2rxrEuKRk5bQYM778vSJirQe5VLLCrXz q3cG7wr2qIOxQAkuHCoQAQpu4kh0zZYGYvSW+kbgF4QRJs3nTtlnQo0cmSHKCqt320Gq E2pO+Elfcx1pcLecWjCAgI8S4WRKndRN6oqTQuIrgv+cU2VuuFx1RZrvO0u/uoS2RvJV zYtw== X-Gm-Message-State: APjAAAXgtgl3G8VQE4dfIHVMsmCA2gSbR9QtOI65Q9m+gEheu/WWpCFw 6nzc9o7ircpYlYSKdtYNUwcGcBILG09UVgkpHR0= X-Google-Smtp-Source: APXvYqwyGKS/PlbvE3DymLdbW4/3VzD5Ly3srCsA5LYVyk0sGcMkVBQ8SkwDwVEGHbQ/iSBvq1KQlQykWmNov1Dt3kg= X-Received: by 2002:a0c:acd2:: with SMTP id n18mr34723877qvc.9.1559747034306; Wed, 05 Jun 2019 08:03:54 -0700 (PDT) MIME-Version: 1.0 References: <00ea216052cd77e568ac6d3b21a53e4d@dweimer.net> In-Reply-To: <00ea216052cd77e568ac6d3b21a53e4d@dweimer.net> From: Mario Olofo Date: Wed, 5 Jun 2019 12:03:43 -0300 Message-ID: Subject: Re: ZFS - Problem removing files after changing the compression type To: dweimer@dweimer.net Cc: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: 5B72486C11 X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=NIxyjmbz; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of marioolofo@gmail.com designates 2607:f8b0:4864:20::832 as permitted sender) smtp.mailfrom=marioolofo@gmail.com X-Spamd-Result: default: False [-7.01 / 15.00]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-1.00)[-0.995,0]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(-3.01)[ip: (-9.44), ipnet: 2607:f8b0::/32(-3.23), asn: 15169(-2.30), country: US(-0.06)]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 15:03:56 -0000 Hello, In the logs I don't have any output about problems with the filesystem. Indeed I had a corrupted file after learning about the zpool status -v, but the ones that I can't delete didn't show up. Searching on the web I found that running the command #echo > /path/to/undetelable/file seems to fix the file to become deletable, but Im not sure why the file was stuck in the first place... Taking advantage of the opportunity, where is the best place I can seek advice to solve issues with 3D acceleration with Intel while I have this notebook with Optimus? Thank you for the pacience, Best regards, Mario Em qua, 5 de jun de 2019 =C3=A0s 10:34, Dean E. Weimer escreveu: > On 2019-06-05 8:14 am, Mario Olofo wrote: > > Hello guys, > > > > I'm configuring a new installation of FreeBSD-12.0-RELEASE and > > installed > > with ZFS for the root file system. > > I run the command zfs set compression=3Dlz4 root, and after this, the > > system > > become a little weird. > > I tried to test some npm install to see if the compression was working > > and > > it is, but when I try to run some commands (ie. ng serve), it fails > > with > > I/O error. > > Deleted the node_modules directory and when I tried to delete the .npm > > dir, > > the system returns "Directory not empty". > > When run as sudo rm -rf, the result is "Unknown error: 122" > > > > I did something that I was not supposed to? > > In the btrfs one can change the compression on the fly without issues > > because of metadata, don't know if zfs behaves this way too. > > > > My system is a Dell G3, with a i5 8gen and an SSD on the m.2 slot > > running > > the FreeBSD (on UFS the notebook freezes and halt when I run npm > > install). > > Gentoo and Windows running on the same SSD and it's all good. > > > > Thank you, > > Best reggards, > > > > Mario > > You should be able to change ZFS compression on the fly. Old data > already written is not changed, but new writes will use the new > compression setting. I have done this before, It looks like something > else is happening I don't think the issue is related to the ZFS > compression setting. I am not familiar with npm, so I have no idea whats > going on there. Look at your dmesg output and check logs to see if the > system logged any disk access errors also check status of zpool with > zpool status. > > -- > Thanks, > Dean E. Weimer > http://www.dweimer.net/ > From owner-freebsd-stable@freebsd.org Wed Jun 5 16:29:56 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 007DD15B2AD8 for ; Wed, 5 Jun 2019 16:29:56 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: from mail-ed1-x543.google.com (mail-ed1-x543.google.com [IPv6:2a00:1450:4864:20::543]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C443889D35 for ; Wed, 5 Jun 2019 16:29:54 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: by mail-ed1-x543.google.com with SMTP id w33so6594714edb.10 for ; Wed, 05 Jun 2019 09:29:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=longcount-org.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=3yCI2ENQBhu7BJHKYQ8OhVoPoFXqHrx2tzQCXD22vNQ=; b=ec1H/AheRqGGAp/E8zv5q661JTDhqsFQM5TtmuXulZ/269E2Yh9nNzxS7BlY7in3In +qOLG8+v2Z8zeJUy1twLVl2BTyKIkcOSlBO3dez5flL6wsRGHP42WuRmrpWyLtmKEWQF hKoVcK7/eiLToJEGzqPXaJy7OwB4NJdKDLMofn+M5xaYApexln+aMTIj2PoLt8mMLXdz 5ZOAXMrvMQ772URepN+YHQW/86PfKBfsO5rqNVKQflFJHsKH+dnlwhG/+Y5MECaDQRfB m/27jQJBPMJN74BLt1GxsPkJNDo8N5nS1exzKI0YJBKH1daFneHp9QM+gdoOcbSF+UNN K/Qg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=3yCI2ENQBhu7BJHKYQ8OhVoPoFXqHrx2tzQCXD22vNQ=; b=IFX/OH6r7m/9PwaGtdKkZo7AmMLVB1/o/fIdAC8jx9wAD1yjGsg4VpLw/TaAH2l2/Q e9TOPgk8COwnJV6W/nUaghILcHofC9ZXZsAtPaIWequ1daeNYhQ/qyrElXtIsshsicyG XBaZsBWcc5jGxE7q90UJ9B7oosUScdVJ8oN9YmTombS8/cugSDgnTkr57+i875MHYVqa AhkEG4OB3bRgrFf9Wo+dQ7uiWfaorj0NY2Dc7hCz/ivCUOY/nlX48jso6yRB4yDiCATF AFmlK7ZCvhkK1crtljjHKffyie821tJ8OPpYRXujsq35Ui6ImsJu6G3tMvlNXVILDLBz zXYw== X-Gm-Message-State: APjAAAVqkWn/W5qO2krXU+HcFL8rpF4U6MYJnj2XvQVIdPU2OgQk+qzo 9TUYMJKeeJgZePd3dTavPOqoNaIXqMO6C9o9/7yrePBjfyc= X-Google-Smtp-Source: APXvYqx7f93yTjWZRmMWHKfv8EcYUPamrGGdp3ZP/F+YkGExfJ1GcHfEoRPJtwTJ61uCE88vzUX11A8hmwzwO9svBZg= X-Received: by 2002:a17:907:2114:: with SMTP id qn20mr18873774ejb.138.1559752193604; Wed, 05 Jun 2019 09:29:53 -0700 (PDT) MIME-Version: 1.0 From: Mark Saad Date: Wed, 5 Jun 2019 12:29:42 -0400 Message-ID: Subject: Kernel panic on 12-STABLE-r348203 amd64 To: FreeBSD-Stable ML Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: C443889D35 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=longcount-org.20150623.gappssmtp.com header.s=20150623 header.b=ec1H/Ahe X-Spamd-Result: default: False [-3.46 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[longcount-org.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[longcount.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-0.97)[ip: (-0.14), ipnet: 2a00:1450::/32(-2.34), asn: 15169(-2.30), country: US(-0.06)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[longcount-org.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[3.4.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.19)[-0.185,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 16:29:56 -0000 All I was wondering if anyone could shed some light on this boot panic I saw yesterday. This is on a Dell R630 with Bios 2.9.1 booting 12.0-STABLE-r348203 amd64. I reverted this back to 12.0-RELEASE-p4 and its fine . The only custom options I had were in loader.conf kern.geom.label.gptid.enable="0" ipmi_load="YES" boot_multicons="YES" boot_serial="YES" console="comconsole,vidconsole" net.inet.tcp.tso="0" cc_htcp_load="YES" autoboot_delay="5" hw.mfi.mrsas_enable="1" hw.usb.no_pf="1" # Disable USB packet filtering hw.usb.no_shutdown_wait="1" hw.vga.textmode="1" # Text mode machdep.hyperthreading_allowed="0" Any ideas ? Screen shot here https://imgur.com/a/nGvHtIs -- mark saad | nonesuch@longcount.org From owner-freebsd-stable@freebsd.org Wed Jun 5 18:42:59 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0ADAE15B5924 for ; Wed, 5 Jun 2019 18:42:59 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: from mail-ed1-x542.google.com (mail-ed1-x542.google.com [IPv6:2a00:1450:4864:20::542]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F04EE8E43B for ; Wed, 5 Jun 2019 18:42:57 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: by mail-ed1-x542.google.com with SMTP id g13so7167818edu.5 for ; Wed, 05 Jun 2019 11:42:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=longcount-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=2YkiYIVrMuAhh+Gk68AJrRC6gWNaQVIzvq4qRejYnQE=; b=qPO0sobfMrsFIkzv162pKvUizxkTMlCCLKcm8AFFSlPJv7R+JL73SPZ1fBdbz5HvdV usELULIzbhRM5UgxW61pGsjDULvw1Udu14jqbW1uHss65kcKg2rV7EBZxc6M7Xq5Q6NA BVCp9PwRWnUURpBNLpK+6B5PqAdwE7jL/YdpvCWiZa3aSfLLeeQS4u5qwVKzFGF0k5Do 6egBWP3bI/qVWnTNiSfSqWVYjaBIm1DrOIVgVsri7MaLDSFUlxnnlDsmU3901p2IvD0Y /2Bl9xUiE72EGjQvd7E5Upmg5Wnh+dPtrz36TASdtaG37DkhZR8APHtSTGHkf0h+OGZC 3v4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=2YkiYIVrMuAhh+Gk68AJrRC6gWNaQVIzvq4qRejYnQE=; b=U0E2VqscYTIRd8BzU38LtD5lfdAbby0m8KUus7cpTxPfaoq+Fkq3ip1h1+40IRqkAh OuCvjj5JfjAfe8d6YdkLCJ3fokq4Ox1CfpFSZ+HpXQriH3cu1Uwmb4DJN/9O+RcbgPP7 G69Yk0wt1IHgIEWa+SNJ4JRP1xVPDVhGwWSKbeuvdTbW+i31xglp8dqjXIblCYa3AF2e M0N91jB4BQqx4MrdMGBVlbwybSQrTpcnlH3PEd2Iy2Iybb5lY1V/jjFQXP1a3LqJvtoG 5AJxSHgNnaeqn2Ft+gkEzBVm+QH8wBsZFzJj+MlaoySJOU80W37dKYd7isM5YZU15wJk IhRQ== X-Gm-Message-State: APjAAAUO34p+QN+aokr+U+6ISev6vS6YvhYUftxi+i2LC9XHggso36Ye nMN6VT0sRtBRHb6TMDtXQibrwf6gXWmnZISpPFTGws4Z1E4= X-Google-Smtp-Source: APXvYqz07/M+YUQjlBk5N3Hr2y40wYrsYQwxiHb2RRHaeYneXfp+OjGHeq/aYtL5b7DO+X4renPEsD/WSphTkKNq4Mo= X-Received: by 2002:a50:ee89:: with SMTP id f9mr17196018edr.293.1559760176342; Wed, 05 Jun 2019 11:42:56 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Mark Saad Date: Wed, 5 Jun 2019 14:42:44 -0400 Message-ID: Subject: Re: Kernel panic on 12-STABLE-r348203 amd64 To: FreeBSD-Stable ML Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: F04EE8E43B X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=longcount-org.20150623.gappssmtp.com header.s=20150623 header.b=qPO0sobf X-Spamd-Result: default: False [-4.03 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[longcount-org.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[longcount.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-1.00)[ip: (-0.30), ipnet: 2a00:1450::/32(-2.34), asn: 15169(-2.30), country: US(-0.06)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[longcount-org.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[2.4.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.72)[-0.718,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 18:42:59 -0000 On Wed, Jun 5, 2019 at 12:29 PM Mark Saad wrote: > > All > I was wondering if anyone could shed some light on this boot panic I > saw yesterday. This is on a Dell R630 with Bios 2.9.1 booting > 12.0-STABLE-r348203 amd64. > I reverted this back to 12.0-RELEASE-p4 and its fine . > > The only custom options I had were in loader.conf > > kern.geom.label.gptid.enable="0" > ipmi_load="YES" > boot_multicons="YES" > boot_serial="YES" > console="comconsole,vidconsole" > net.inet.tcp.tso="0" > cc_htcp_load="YES" > autoboot_delay="5" > hw.mfi.mrsas_enable="1" > hw.usb.no_pf="1" # Disable USB packet filtering > hw.usb.no_shutdown_wait="1" > hw.vga.textmode="1" # Text mode > machdep.hyperthreading_allowed="0" > > Any ideas ? > > Screen shot here > https://imgur.com/a/nGvHtIs > > -- > mark saad | nonesuch@longcount.org Plain text version of the crash Loading kernel... /boot/kernel/kernel text=0x168d811 data=0x1cf968+0x768c80 syms=[0x8+0x1778e8+0x8 / +0x194f1d] Loading configured modules... /boot/kernel/ipmi.ko size 0x11e10 at 0x2645000 loading required module 'smbus' /boot/kernel/smbus.ko size 0x2ef0 at 0x2657000 /boot/entropy size=0x1000 /boot/kernel/cc_httcp.ko size 0x2330 at 0x265b000 ---<>---c_hmodule 'smbus' Copyright (c) 1992-2019 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 12.0-STABLE r348693 GENERIC amd64 FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on LLVM 8.0.0) panic: UMA zone "UMA Zones": Increase vm.boot_pages cpuid = 0 time = 1 KDB: stack backtrace: #0 0xffffffff80c16df7 at ??+0 #1 0xffffffff80bcaccd at ??+0 #2 0xffffffff80bcab23 at ??+0 #3 0xffffffff80f0b03c at ??+0 #4 0xffffffff80f08d8d at ??+0 #5 0xffffffff80f0bb3d at ??+0 #6 0xffffffff80f0b301 at ??+0 #7 0xffffffff80f0b3d1 at ??+0 #8 0xffffffff80f066c4 at ??+0 #9 0xffffffff80f0543f at ??+0 #10 0xffffffff80f23aef at ??+0 #11 0xffffffff80f1133b at ??+0 #12 0xffffffff80b619c8 at ??+0 #13 0xffffffff8036a02c at ??+0 Uptime: 1s Also increasing the vm.boot_pages to 128 in the loader works. Anyone know why ? This box has 64G ram. -- mark saad | nonesuch@longcount.org From owner-freebsd-stable@freebsd.org Wed Jun 5 19:05:12 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 81C6615B6124 for ; Wed, 5 Jun 2019 19:05:12 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: from mail-ed1-x544.google.com (mail-ed1-x544.google.com [IPv6:2a00:1450:4864:20::544]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3B1FB8EE9D for ; Wed, 5 Jun 2019 19:05:11 +0000 (UTC) (envelope-from nonesuch@longcount.org) Received: by mail-ed1-x544.google.com with SMTP id p26so7278647edr.2 for ; Wed, 05 Jun 2019 12:05:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=longcount-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=GXgrTxeHWe7KR/2ldLSgMGgIHY+WjZqa+EONVxWPqeY=; b=e9CPGo3VyZCR7mX1k3YrI0BpdUhzZ2pk3NzKb2IK7hn2W56CDbtgPhsfMyZktfR/h7 aIN+xN5al09GsjEM78XCaaSb3RA192U5W3WXfMBpQeAVDcCFcA9dXXNEXvH9o9+6Df02 Pgo4NJbekBS912ixeG2oafGlRNbg3uXvoR3Kcv4Z904PSE7z48t094lE486aMglUkPhI x9HN2bRGgNW4WbdOWCDBkhIUiXnhIk2ny9qsPFqtQE+MbbnhjNesn0JnsTPBkwHi/o2y v7aMMPvwkUB30/bmF6ZVRu9CraHzzECva+tpZ7gQNtpnmIFl0blH4uj3Aw7k6wgcOOMy D5Hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=GXgrTxeHWe7KR/2ldLSgMGgIHY+WjZqa+EONVxWPqeY=; b=C9Yymeb8Qhzq1p+cGv3XSZjsYPAlefJkPIlizmj1e6RvmbafYrk075NbsUKZ3s8lSO A4MzZfTWQrEcEFrEI/D7vk0CU9PhZZqPZapUP/2uxSP+MrDmnh17zwIBlofDtDMecPGk 88MIEBZ/hsc2WhkTZje/W0Xx4v1a/9nZJ5KQWX65cVKxM4rRlDmqFyTkE65sXSVVey5w vGUFGgx4xhsl/z0/EhQxtRqsCyJGAwGdtV1z/mn8e844kn4kgZhTAxuv0UJtYlmJrG+x 0uA++Q8v6oruLA8YmkF0s/mhaHecIUAO0TZLjkdDbOnMareeUcBuL6kDKUHFGY5KRKRS D3UQ== X-Gm-Message-State: APjAAAU4F0lKVsCsD4gpht+LV8dpGsS7BfUrOvmNZuqE1TY2WcOEinuK MSEVCgvAtILcEIqkORCS9reGUbfRCa+3vZXCAYPi0C7r X-Google-Smtp-Source: APXvYqy/9xhn5JROeXlThpiRlfHdh1eO3y0+0NXn0VmG4YdBgKkvVRH5sUUhvZZ7wSc7FD8XPwdA7RcCDoy0AxTu7I4= X-Received: by 2002:a50:90af:: with SMTP id c44mr19051553eda.126.1559761509899; Wed, 05 Jun 2019 12:05:09 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Mark Saad Date: Wed, 5 Jun 2019 15:04:58 -0400 Message-ID: Subject: Re: Kernel panic on 12-STABLE-r348203 amd64 To: FreeBSD-Stable ML Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 3B1FB8EE9D X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=longcount-org.20150623.gappssmtp.com header.s=20150623 header.b=e9CPGo3V X-Spamd-Result: default: False [-4.04 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[longcount-org.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[longcount.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-1.01)[ip: (-0.36), ipnet: 2a00:1450::/32(-2.33), asn: 15169(-2.30), country: US(-0.06)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[longcount-org.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[4.4.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.72)[-0.718,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 19:05:12 -0000 On Wed, Jun 5, 2019 at 2:42 PM Mark Saad wrote: > > On Wed, Jun 5, 2019 at 12:29 PM Mark Saad wrote: > > > > All > > I was wondering if anyone could shed some light on this boot panic I > > saw yesterday. This is on a Dell R630 with Bios 2.9.1 booting > > 12.0-STABLE-r348203 amd64. > > I reverted this back to 12.0-RELEASE-p4 and its fine . > > > > The only custom options I had were in loader.conf > > > > kern.geom.label.gptid.enable="0" > > ipmi_load="YES" > > boot_multicons="YES" > > boot_serial="YES" > > console="comconsole,vidconsole" > > net.inet.tcp.tso="0" > > cc_htcp_load="YES" > > autoboot_delay="5" > > hw.mfi.mrsas_enable="1" > > hw.usb.no_pf="1" # Disable USB packet filtering > > hw.usb.no_shutdown_wait="1" > > hw.vga.textmode="1" # Text mode > > machdep.hyperthreading_allowed="0" > > > > Any ideas ? > > > > Screen shot here > > https://imgur.com/a/nGvHtIs > > > > -- > > mark saad | nonesuch@longcount.org > > Plain text version of the crash > > Loading kernel... > /boot/kernel/kernel text=0x168d811 data=0x1cf968+0x768c80 > syms=[0x8+0x1778e8+0x8 / > +0x194f1d] > Loading configured modules... > /boot/kernel/ipmi.ko size 0x11e10 at 0x2645000 > loading required module 'smbus' > /boot/kernel/smbus.ko size 0x2ef0 at 0x2657000 > /boot/entropy size=0x1000 > /boot/kernel/cc_httcp.ko size 0x2330 at 0x265b000 > ---<>---c_hmodule 'smbus' > Copyright (c) 1992-2019 The FreeBSD Project. > Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 > The Regents of the University of California. All rights reserved. > FreeBSD is a registered trademark of The FreeBSD Foundation. > FreeBSD 12.0-STABLE r348693 GENERIC amd64 > FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on > LLVM 8.0.0) > panic: UMA zone "UMA Zones": Increase vm.boot_pages > cpuid = 0 > time = 1 > KDB: stack backtrace: > #0 0xffffffff80c16df7 at ??+0 > #1 0xffffffff80bcaccd at ??+0 > #2 0xffffffff80bcab23 at ??+0 > #3 0xffffffff80f0b03c at ??+0 > #4 0xffffffff80f08d8d at ??+0 > #5 0xffffffff80f0bb3d at ??+0 > #6 0xffffffff80f0b301 at ??+0 > #7 0xffffffff80f0b3d1 at ??+0 > #8 0xffffffff80f066c4 at ??+0 > #9 0xffffffff80f0543f at ??+0 > #10 0xffffffff80f23aef at ??+0 > #11 0xffffffff80f1133b at ??+0 > #12 0xffffffff80b619c8 at ??+0 > #13 0xffffffff8036a02c at ??+0 > Uptime: 1s > > > Also increasing the vm.boot_pages to 128 in the loader works. Anyone > know why ? This box has 64G ram. > > -- > mark saad | nonesuch@longcount.org So after some poking in the bios this has to do with how the Dell NUMA options are set. If the system is set Cluster On Die mode, you get a kernel panic Home Snoop or Early Snoop no issue. -- mark saad | nonesuch@longcount.org From owner-freebsd-stable@freebsd.org Wed Jun 5 19:15:32 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B1FB815B65B8; Wed, 5 Jun 2019 19:15:32 +0000 (UTC) (envelope-from lwhsu.freebsd@gmail.com) Received: from mail-yb1-f193.google.com (mail-yb1-f193.google.com [209.85.219.193]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 527768F4A6; Wed, 5 Jun 2019 19:15:31 +0000 (UTC) (envelope-from lwhsu.freebsd@gmail.com) Received: by mail-yb1-f193.google.com with SMTP id x32so2063ybh.1; Wed, 05 Jun 2019 12:15:31 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=EGyRIy/I+y8dOx7NEWu4MAykeevn2xCwLGf9YqyaQcE=; b=MkJCPZxvtA5vX+/n6N/QgEcxRQbyeThM/ZCe6eVDQZoUwWNt7ndY4eW5Yn98gqgeNB /gN35afirA2W2SaP+waePgMjymJQr4Ak5XB7nWl33hP8wEQ7N/zEev5lRlGuNhe3GX70 bKHQ/ayhft7LJX3T20K7W7Bor/Ak/IhVtTAZaNNMwdkBqLqjXFarAmp4sGc298RYfHBm yQNqJcQENBYkKGdjOCT7vXy7O964FrQct0WrWb31fhrimAZjlxRMRQCpZhRSNequI7EZ PUxLRfIfzBnRilp932TACJfuswzDZjJjcAbCE8cvU1I2JBlXdI7ltZBm45+l+Irau+XE 3F9Q== X-Gm-Message-State: APjAAAX2B2C+CMDcewuy9wANu99aP65ENtrbORDvHObi7gD5P30l6QRz AL6cym6rdkYGz6B3CoaXEY0Fu6Ht/iUqsxSPwPvFZ0olH38= X-Google-Smtp-Source: APXvYqx+yhUI1PVURwfy1G/ogAoQH2En0h2B7vzbThYPvehF0dhdrOo1ns6NhY953tdRo0ml96B8XhSnwuwFzwcW+9Y= X-Received: by 2002:a25:cb97:: with SMTP id b145mr16980561ybg.110.1559757962337; Wed, 05 Jun 2019 11:06:02 -0700 (PDT) MIME-Version: 1.0 From: Li-Wen Hsu Date: Wed, 5 Jun 2019 14:05:50 -0400 Message-ID: Subject: FreeBSD CI Weekly Report 2019-06-02 To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 527768F4A6 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of lwhsufreebsd@gmail.com designates 209.85.219.193 as permitted sender) smtp.mailfrom=lwhsufreebsd@gmail.com X-Spamd-Result: default: False [-3.97 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_NEQ_ENVFROM(0.00)[lwhsu@freebsd.org,lwhsufreebsd@gmail.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_TLS_LAST(0.00)[]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.81)[-0.812,0]; RCVD_IN_DNSWL_NONE(0.00)[193.219.85.209.list.dnswl.org : 127.0.5.0]; IP_SCORE(-1.15)[ipnet: 209.85.128.0/17(-3.39), asn: 15169(-2.30), country: US(-0.06)]; FORGED_SENDER(0.30)[lwhsu@freebsd.org,lwhsufreebsd@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[193.219.85.209.rep.mailspike.net : 127.0.0.17]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; TAGGED_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 19:15:33 -0000 (Please send the followup discussions to freebsd-testing@ list.) FreeBSD CI Weekly Report 2019-06-02 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2019-05-27 to 2019-06-02. During this period, we have: * 1752 builds (97.8% passed, 2.2% failed) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 327 test runs (36.7% passed, 63.3% unstable) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 23 doc builds (100% passed) (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/s/ryVi1WiaN and archive is available at http://hackfoldr.org/freebsd-ci-report/, any help is welcome. ## Removed Failing Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * sys.geom.class.eli.init_test.init * sys.geom.class.eli.init_test.init_a * sys.geom.class.eli.init_test.init_alias * sys.geom.class.eli.integrity_test.copy * sys.geom.class.eli.integrity_test.data * sys.geom.class.eli.integrity_test.hmac Those geli(8) test cases are failing because some algorithms are deprecated in [r348206](https://reviews.freebsd.org/rS348206) and the return value and output are changed. The fix to the test cases are under development. Those tests are removed in [r348454](https://reviews.freebsd.org/rS348454), while it is still wothy to adjust the test code to check if the deprecated algorithms are correctly marked deprecated in the future. * https://ci.freebsd.org/job/FreeBSD-head-i386-test/ * Same as amd64 ## Failing Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * sys.netinet.socket_afinet.socket_afinet_bind_zero Affected by mac_portacl(4), which is loaded by MAC tests. Need to specify AF_INET to workaround and fix is being discussed. * https://ci.freebsd.org/job/FreeBSD-head-i386-test/ * i386 test is current suffering from loading ipsec(4) kernel module, which is needed after https://svnweb.freebsd.org/changeset/base/347410 , causes kernel panic. For more information, see: * https://bugs.freebsd.org/238012 * https://bugs.freebsd.org/230857 * https://reviews.freebsd.org/D17512 * Same as amd64: * sys.netinet.socket_afinet.socket_afinet_bind_zero * Others: * sys.netpfil.pf.forward.v6 * sys.netpfil.pf.forward.v4 * sys.netpfil.pf.set_tos.v4 * sys.opencrypto.runtests.main * https://ci.freebsd.org/job/FreeBSD-stable-12-i386-test/ * sys.netpfil.pf.forward.v6 * sys.netpfil.pf.forward.v4 * sys.netpfil.pf.set_tos.v4 * lib.libc.regex.exhaust_test.regcomp_too_big * lib.libregex.exhaust_test.regcomp_too_big * sys.opencrypto.runtests.main Failed with: ``` File "/usr/tests/sys/opencrypto/cryptodev.py", line 179, in __init__ ioctl(_cryptodev, CIOCGSESSION2, s, 1) IOError: [Errno 22] Invalid argument ``` * https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/ * local.kyua.* (31 cases) * local.lutok.* (3 cases) ## Fixed Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * There are ~980 test cases failure with message: `dtrace: failed to compile script err.D_AGG_SCALAR.maxnoarg.d: [D_UNKNOWN] "/usr/lib/dtrace/mbuf.d", line 114: failed to copy type of 'm_data': Type information is in parent and unavailable` Fixed by https://svnweb.freebsd.org/changeset/base/348329 ## Failing and Flaky Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d https://bugs.freebsd.org/237641 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * This job is currently suffering from timeout because of https://bugs.freebsd.org/237652 * There are ~60 failing cases, including flakey ones, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details ## Disabled Tests * lib.libc.sys.mmap_test.mmap_truncate_signal https://bugs.freebsd.org/211924 * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * usr.bin.procstat.procstat_test.command_loogle.com/ine_arguments https://bugs.freebsd.org/233587 * usr.bin.procstat.procstat_test.environment https://bugs.freebsd.org/233588 ## Open Issues * https://bugs.freebsd.org/237077 possible race in build: /usr/src/sys/amd64/linux/linux_support.s:38:2: error: expected relocatable expression * https://bugs.freebsd.org/237403 Tests in sys/opencrypto should be converted to Python3 * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237652 tests.hotspare.hotspare_test.hotspare_snapshot_001_pos timeout since somewhere in (r346814, r 346845] * https://bugs.freebsd.org/237655 Non-deterministic panic when running pf tests in interface ioctl code (NULL passed to strncmp) * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/237657 sys.kern.pdeathsig.signal_delivered_ptrace timing out periodically on i386 ### Cause build fails * [233735: Possible build race: genoffset.o /usr/src/sys/sys/types.h: error: machine/endian.h: No such file or directory](https://bugs.freebsd.org/233735) * [233769: Possible build race: ld: error: unable to find library -lgcc_s](https://bugs.freebsd.org/233769) ### Others [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) ## Other News * https://issues.tmatesoft.com/issue/SVNKIT-740 The patch is asked to be updated and help wanted. * https://bugs.freebsd.org/235356 Help on how to reproduce and analyze is wanted. * "FreeBSD CI Tasks and Ideas", discussed in the [DevSummit201905](https://wiki.freebsd.org/DevSummit/201905/): https://hackmd.io/bWCGgdDFTTK_FG0X7J1Vmg From owner-freebsd-stable@freebsd.org Thu Jun 6 12:04:32 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C3DAF15B12DA for ; Thu, 6 Jun 2019 12:04:31 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 2BCDD6ABAB for ; Thu, 6 Jun 2019 12:04:31 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: by mailman.ysv.freebsd.org (Postfix) id DACB315B12D9; Thu, 6 Jun 2019 12:04:30 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B8A8C15B12D8 for ; Thu, 6 Jun 2019 12:04:30 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from sonic317-34.consmr.mail.ne1.yahoo.com (sonic317-34.consmr.mail.ne1.yahoo.com [66.163.184.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D384B6ABA9 for ; Thu, 6 Jun 2019 12:04:29 +0000 (UTC) (envelope-from filippomore@yahoo.com) X-YMail-OSG: M6.CO2MVM1l8ThZtd5OxZsH9_SVwBNhbormyRMHKlHTCdlZthHrymQf7LgihIZq 1vc7LR7gElBA9SPLgNyOowLzuaxiu1ulzNsEb6J76D4wsYGx1gKBrIvyK9JNwj.KTjZiQ_yWF0eX rnWi_GcyJlnVBdiBy7pZwWQgk7jrHBijRAddiyI1gN5gnVv5Lrv0.fXdGhGQaPzhYg7mCPnzlcAy 5OFouoPKqgqiR9dkc0EipZ0wFFNRPK.a_y4X3tTiE5xTK7AutDYGZNKBxK68FIWNj96ZX5Q_OEwt X15DaTxTh.vv6D6CwALqgU6Or9YRDxMADHNp4yQeTrz6VvLZyhiWPcW3wdlihdPz4rLj3aQkagbn i_PRBXN1pTNaQo2oHpHjiIgsHYgFDXbHB2Kxv8O0Qr2tOoyJHTfWyY.6Ar7mygfhNayQpc5rqNay FirOMxTHy3tTiGS87H9WDW8Lj15PXN9.TS5Zwxv2IDvBdN.JuBNxt4QJkE_.tJHP15G5AonzNJd7 u7qFEQI3Gt9I210fCPey.oj.5cnux5rG4iMWLTIcXTqzNzGCkI5GC0tHEQT0lPC48BA7tBmtmqG9 oHRqLgvN.YzKS415kcxBQ1skW35ko2JVd9Kl0BNIRIa5pipKFVbTP_DJaBFHY9hP.jR1XTs9r1z6 6iqkOjaUDClYix3QNX2Ku7T__arxpkYl1sjf8psi4ufEIdiUoJMVeWsa1Yy1A4yzEVAcT4f_pAKq UMTVTYjpSWlLi0OnwniYqdPWBvar6kIzFYtFylnJNDfcFne7PXVZubwH2V0NQ8alqefgcsacJcc_ pQC4TIYGGSr9Rz2S7KhdANqhfZhHjZbKJYlS9Ac2bblId5wV89cogFVxMCiz5zr4cIaI8h5LMTOc UJ.wcwoe3YHlGzhFhTwWFa_ozyQuzN.RYzoB421q1Mc.aMur_BHIRUQB5A5V31SrIr8HO4w1o7of 7E25ZfAFOjta4l2pMqWXGTovxaoiMdDZVJyTuvxx1yZDNeJkoFpcOZ_N.Dytwdbp65DK8rS6FF3l MfLue1k2kFQTafmk_i1Yg1CWpMiRX2qCpYFI5YZzEIu25w4xEMiJhXO3KsZBuwedwwtmyL5x3FcA HaEDrr2K0qkbJP9eWw0fqsBrAMYYQL.FlXlkV1PKBKJQoUZfTLfFcpO._7XOAnrguquX8d5ZeixW xN7HmpOKzQXdkQFISYV0_ExoGllRBMKqVLacbQ5N6QfSX5Ii3gfPakkzBok7bcMD8f1t9 Received: from sonic.gate.mail.ne1.yahoo.com by sonic317.consmr.mail.ne1.yahoo.com with HTTP; Thu, 6 Jun 2019 12:04:22 +0000 Date: Thu, 6 Jun 2019 12:04:20 +0000 (UTC) From: Filippo Moretti To: FreeBSD Stable ML Message-ID: <1799954470.420960.1559822660430@mail.yahoo.com> Subject: Problem with 12_STABLE on amd64 MIME-Version: 1.0 References: <1799954470.420960.1559822660430.ref@mail.yahoo.com> X-Mailer: WebService/1.1.13797 YMailNorrin Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 X-Rspamd-Queue-Id: D384B6ABA9 X-Spamd-Bar: ++++ X-Spamd-Result: default: False [4.30 / 15.00]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; FREEMAIL_FROM(0.00)[yahoo.com]; URI_COUNT_ODD(1.00)[1]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; MX_GOOD(-0.01)[cached: mta6.am0.yahoodns.net]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(1.32)[ip: (4.23), ipnet: 66.163.184.0/21(1.36), asn: 36646(1.09), country: US(-0.06)]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36646, ipnet:66.163.184.0/21, country:US]; DWL_DNSWL_NONE(0.00)[yahoo.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.99)[0.986,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; MIME_TRACE(0.00)[0:+,1:+]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_SPAM_LONG(1.00)[0.999,0]; RCVD_IN_DNSWL_NONE(0.00)[45.184.163.66.list.dnswl.org : 127.0.5.0]; RWL_MAILSPIKE_POSSIBLE(0.00)[45.184.163.66.rep.mailspike.net : 127.0.0.17]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Jun 2019 12:04:32 -0000 I have the following problem on amd-64 STABLE-12for some odd reason my custom kernel no longer boot while I could build GENERIC and that would boot fine.Today I wrote a new configuration kernel file removing only the devices I do not have.Unfortunately the working kernel was not moved to kernel.old as it would be expected and now I am locked out of the system as the new kernel fail to bott with error sis cannot find zroot/ROOT/default.Is there a way to recover my system?SincerelyFilippo From owner-freebsd-stable@freebsd.org Thu Jun 6 15:16:39 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 54F2715B660A for ; Thu, 6 Jun 2019 15:16:39 +0000 (UTC) (envelope-from trond.endrestol@ximalas.info) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id C6AF870DD4 for ; Thu, 6 Jun 2019 15:16:38 +0000 (UTC) (envelope-from trond.endrestol@ximalas.info) Received: by mailman.ysv.freebsd.org (Postfix) id 8520F15B6607; Thu, 6 Jun 2019 15:16:38 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 603A615B6605 for ; Thu, 6 Jun 2019 15:16:38 +0000 (UTC) (envelope-from trond.endrestol@ximalas.info) Received: from enterprise.ximalas.info (enterprise.ximalas.info [IPv6:2001:700:1100:1::8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "ximalas.info", Issuer "Hostmaster ximalas.info" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id AD83D70DD2 for ; Thu, 6 Jun 2019 15:16:37 +0000 (UTC) (envelope-from trond.endrestol@ximalas.info) Received: from enterprise.ximalas.info (Ximalas@localhost [127.0.0.1]) by enterprise.ximalas.info (8.15.2/8.15.2) with ESMTPS id x56DBOZI003585 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 6 Jun 2019 15:11:24 +0200 (CEST) (envelope-from trond.endrestol@ximalas.info) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ximalas.info; s=default; t=1559826684; bh=kjwzXLxDD3zTy0NdjcrjxiXPfaB3r5k7mLJMcNsROUU=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=RqcYJgslqIl584A0q+sjeQpIyNOingS9gBOzls8Q2eSgPk5BoH/bUzAebN4bMIdnd Iazgi07lgRA8kj/nd90RDXORmpQp7QKK0RoKVmdhKWeMzGsyEudh4kQv2sWsukeU0E qC1ah+KqMxIu8CBeJKX7F9yOHydiFjyD8bMCfJkVkXH+LSY+yB1inWGxheE+jbEXlR 2sk9Pz777rOvtcIRm/8H5CfArybkZl8e3IdfAFMDHwt82W3E0ypmQbPLfb7tW9KrNQ DWc9gbBvG6PXNsfGZIq1yBxLZ7j844vGyg+muIh4tXxZJMEJXrWCNM1Pt4iDyp9JHV /phepGt2vPjZQ== Received: from localhost (trond@localhost) by enterprise.ximalas.info (8.15.2/8.15.2/Submit) with ESMTP id x56DBNhQ003582; Thu, 6 Jun 2019 15:11:24 +0200 (CEST) (envelope-from trond.endrestol@ximalas.info) X-Authentication-Warning: enterprise.ximalas.info: trond owned process doing -bs Date: Thu, 6 Jun 2019 15:11:23 +0200 (CEST) From: =?UTF-8?Q?Trond_Endrest=C3=B8l?= Sender: Trond.Endrestol@ximalas.info To: Filippo Moretti cc: FreeBSD Stable ML Subject: Re: Problem with 12_STABLE on amd64 In-Reply-To: <1799954470.420960.1559822660430@mail.yahoo.com> Message-ID: References: <1799954470.420960.1559822660430.ref@mail.yahoo.com> <1799954470.420960.1559822660430@mail.yahoo.com> User-Agent: Alpine 2.21.9999 (BSF 287 2018-06-16) OpenPGP: url=http://ximalas.info/about/tronds-openpgp-public-key MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-1.2 required=5.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on enterprise.ximalas.info X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Jun 2019 15:16:39 -0000 On Thu, 6 Jun 2019 12:04-0000, Filippo Moretti via freebsd-stable wrote: > I have the following problem on amd-64 STABLE-12for some odd reason > my custom kernel no longer boot while I could build GENERIC and that > would boot fine.Today I wrote a new configuration kernel file > removing only the devices I do not have.Unfortunately the working > kernel was not moved to kernel.old as it would be expected and now I > am locked out of the system as the new kernel fail to bott with > error sis cannot find zroot/ROOT/default.Is there a way to recover > my system?SincerelyFilippo Press 3 in the boot loader to enter the command line. Type in these commands: unload load /boot/kernel/kernel load /boot/kernel/opensolaris.ko load /boot/kernel/zfs.ko boot -s Your keyboard layout is "US" at the moment. The hyphen (minus) key is usually on the plus key when the US keyboard layout is active and you're using a non-US keyboard, and slash is usually on the hyphen key. Once you get to a proper Unix shell, you might want to change the keyboard layout to something sensible using: kbdcontrol -l If you have physical access to your system and bootable install media at hand, you could boot from said install media, select shell, and import your pool using: zpool import -Nf zroot Manually mount your rootfs, e.g.: mount -t zfs zroot/ROOT/default /mnt If one of these routes was successful, edit your /boot/loader.conf or /mnt/boot/loader.conf using edit, ed, ee, or vi, to include: zfs_load="YES" Mount other filesystems as needed, or reboot to see if your system has recovered. -- Trond. From owner-freebsd-stable@freebsd.org Thu Jun 6 18:43:24 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 357A715BCD39 for ; Thu, 6 Jun 2019 18:43:24 +0000 (UTC) (envelope-from nicola.peltz@pipeline4data.com) Received: from mail-pf1-x442.google.com (mail-pf1-x442.google.com [IPv6:2607:f8b0:4864:20::442]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DC1B783210 for ; Thu, 6 Jun 2019 18:43:22 +0000 (UTC) (envelope-from nicola.peltz@pipeline4data.com) Received: by mail-pf1-x442.google.com with SMTP id i189so2022339pfg.10 for ; Thu, 06 Jun 2019 11:43:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:return-receipt-to:from:to:subject:date :message-id:mime-version:thread-index:content-language; bh=s/1kiXP8y5JNn7Twix5hZerytb2b6hPn3Sm9j5NHTeo=; b=tUXOplDSQ1u2eVRVZx9qwNKfNOoWsaYS0Aeq8ulFvnldsXd1gr7eqEyqigdQVQEyRy UaGHzrCLXDbaoAn7BAHUaLcUQXijTB1q9y8Hdu1tlvbkTk/MmuS8P4MXtAUvUp2v7hze dbdZPNZbyReSx/6eMt30lSpZjA2pnPXhuNmlZoTQnKKEjROOinDFG9eiDYpLObrpE1bF f4ioVdqBjLiuOcwR+bbUzKCpzJIQ8O/URfKFmM8o0/GOcH8ei2O4+nvoDpHjIqS55/Dx s/S50iG4ciu1QUVMFD+vnb7w7JhLEFd/tnfEfT8nENtmbdc3lv1OBGaCawWb6s4yhtZP GFng== X-Gm-Message-State: APjAAAWoSbR7Fh3HYxw7x3VMR8ueCItYWk3KI9RvwjrQdYCYcTOxmZVh asjKorhHZMi4QMpfB/7FfLE7Pi0XCqe/hg== X-Google-Smtp-Source: APXvYqy+5mhL63ilHDlwEIYdkqBeh99YVb39hqqJhMEdil0kP50m1cP2nM7w8Xq+D8HJR1toV9g29Q== X-Received: by 2002:a17:90a:d3d2:: with SMTP id d18mr1275517pjw.5.1559846601727; Thu, 06 Jun 2019 11:43:21 -0700 (PDT) Received: from LAPTOPCRN6JDL2 ([122.171.160.201]) by smtp.gmail.com with ESMTPSA id b15sm2863263pfi.141.2019.06.06.11.43.20 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Jun 2019 11:43:21 -0700 (PDT) From: "Nicola Peltz" To: Subject: Cisco Live 2019 Date: Fri, 7 Jun 2019 00:13:00 +0530 Message-ID: MIME-Version: 1.0 X-Mailer: Microsoft Outlook 15.0 Thread-Index: AdUcl5CGE00kp1zWTvOv7YzAlSlD6w== Content-Language: en-us X-Rspamd-Queue-Id: DC1B783210 X-Spamd-Bar: ----- X-Spamd-Result: default: False [-5.06 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[pipeline4data-com.20150623.gappssmtp.com:s=20150623]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; RCVD_TLS_LAST(0.00)[]; DKIM_TRACE(0.00)[pipeline4data-com.20150623.gappssmtp.com:+]; DMARC_POLICY_ALLOW(-0.50)[pipeline4data.com,quarantine]; RCVD_IN_DNSWL_NONE(0.00)[2.4.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MX_GOOD(-0.01)[alt1.aspmx.l.google.com,aspmx2.googlemail.com,aspmx.l.google.com,alt2.aspmx.l.google.com]; IP_SCORE(-1.08)[ip: (0.19), ipnet: 2607:f8b0::/32(-3.22), asn: 15169(-2.29), country: US(-0.06)]; NEURAL_HAM_SHORT(-0.98)[-0.979,0]; RECEIVED_SPAMHAUS_PBL(0.00)[201.160.171.122.zen.spamhaus.org : 127.0.0.11]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; MID_RHS_MATCH_FROM(0.00)[] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Jun 2019 18:43:24 -0000 Hi , Would your company be interested to procure consent verifed Cisco Install Decsion Makers business contact information for Q2 Email marketing, Tele campaigns, conference invites, webinar campaigns? Key decision influencers : CEO, CFO, CIO, CISO, CTO, CXO, VP/Director IT, senior manager IT, strategists, IT architects, Developers, Engineer, Chief Security Officer, Security Consultant, Cyber Security Engineers, Risk Analyst, Security Administrators, Data Center managers, Chief Data Privacy officers, Data Scientists, Engineer/Analyst IT Business Analysts and any other department heads as per your focus. Data Fields on excel include : Company Name, Website, Contact name, Contact Number,Title, Physical Address, Fax, SIC Code, Location, Revenue, Employee Size, Technology Installed, verified Business Email address, Linkedin Link. Target accounts such as: Cisco Application Users, Cisco Servers Users, Cisco Switches Users, Cisco Routers Users, Cisco Cloud Users, Cisco WebEx Users, Cisco Storage Users, Cisco Wireless Users, Cisco Networking Users, Cisco Collaboration Users, Cisco Cloud and Systems Management Users, Cisco Switch Users, Cisco IP Video and Phone users, Cisco Application Networking Users and other niche competitors technology implemented accounts with its key decsion makers. Just confirm your audience by Key Titles ____, Focused Industries____, Technology Installed____, Locations____ if any other contact filters. We revert with customized list details along exact count and sample for your evaluation. You appeared to be the appropriate person to connect with or might at least point me in the right direction. Thanks in advance! Look forward for your response. Have a great day! Nicola Peltz | Demand Generation Consultant | Appending | De-Duping | SEO | Content Management | Please note if you would rather not hear from us, do respond to this email mentioning UNSUBSCRIBE. From owner-freebsd-stable@freebsd.org Fri Jun 7 00:50:01 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5F78915C456A for ; Fri, 7 Jun 2019 00:50:01 +0000 (UTC) (envelope-from michelle@sorbs.net) Received: from hades.sorbs.net (hades.sorbs.net [72.12.213.40]) by mx1.freebsd.org (Postfix) with ESMTP id D64E88E361 for ; Fri, 7 Jun 2019 00:49:58 +0000 (UTC) (envelope-from michelle@sorbs.net) MIME-version: 1.0 Content-transfer-encoding: 7BIT Content-type: text/plain; CHARSET=US-ASCII; format=flowed Received: from isux.com (gate.mhix.org [203.206.128.220]) by hades.sorbs.net (Oracle Communications Messaging Server 7.0.5.29.0 64bit (built Jul 9 2013)) with ESMTPSA id <0PSP00BY4C6UO820@hades.sorbs.net> for freebsd-stable@freebsd.org; Thu, 06 Jun 2019 17:04:08 -0700 (PDT) Subject: Re: ZFS... From: Michelle Sullivan To: Steven Hartland Cc: freebsd-stable References: <30506b3d-64fb-b327-94ae-d9da522f3a48@sorbs.net> <70fac2fe3f23f85dd442d93ffea368e1@ultra-secure.de> <70C87D93-D1F9-458E-9723-19F9777E6F12@sorbs.net> <5ED8BADE-7B2C-4B73-93BC-70739911C5E3@sorbs.net> <2e4941bf-999a-7f16-f4fe-1a520f2187c0@sorbs.net> <34539589-162B-4891-A68F-88F879B59650@sorbs.net> <576857a5-a5ab-eeb8-2391-992159d9c4f2@denninger.net> <7DBA7907-BE8F-4944-9A71-86E5AC1B85CA@gromit.dlib.vt.edu> <5c458075-351f-6eb6-44aa-1bd268398343@sorbs.net> <289FE04E-1692-4763-96B3-91E8C1BBBBD6@sorbs.net> Message-id: <70d5e0d3-c188-7f06-cf53-702d565fd481@sorbs.net> Date: Fri, 07 Jun 2019 09:49:48 +1000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:51.0) Gecko/20100101 Firefox/51.0 SeaMonkey/2.48 In-reply-to: <289FE04E-1692-4763-96B3-91E8C1BBBBD6@sorbs.net> X-Rspamd-Queue-Id: D64E88E361 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of michelle@sorbs.net designates 72.12.213.40 as permitted sender) smtp.mailfrom=michelle@sorbs.net X-Spamd-Result: default: False [-1.74 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.95)[-0.953,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a:hades.sorbs.net]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[sorbs.net]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[battlestar.sorbs.net,anaconda.sorbs.net,ninja.sorbs.net,catapilla.sorbs.net,scorpion.sorbs.net,desperado.sorbs.net]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[40.213.12.72.list.dnswl.org : 127.0.10.0]; SUBJ_ALL_CAPS(0.45)[6]; IP_SCORE(-0.29)[ip: (-0.71), ipnet: 72.12.192.0/19(-0.37), asn: 11114(-0.29), country: US(-0.06)]; NEURAL_HAM_SHORT(-0.25)[-0.245,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:11114, ipnet:72.12.192.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; CTE_CASE(0.50)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jun 2019 00:50:01 -0000 Michelle Sullivan wrote: >> On 02 May 2019, at 03:39, Steven Hartland wrote: >> >> >> >>> On 01/05/2019 15:53, Michelle Sullivan wrote: >>> Paul Mather wrote: >>>>> On Apr 30, 2019, at 11:17 PM, Michelle Sullivan wrote: >>>>> >>>>> Been there done that though with ext2 rather than UFS.. still got all my data back... even though it was a nightmare.. >>>> >>>> Is that an implication that had all your data been on UFS (or ext2:) this time around you would have got it all back? (I've got that impression through this thread from things you've written.) That sort of makes it sound like UFS is bulletproof to me. >>> Its definitely not (and far from it) bullet proof - however when the data on disk is not corrupt I have managed to recover it - even if it has been a nightmare - no structure - all files in lost+found etc... or even resorting to r-studio in the even of lost raid information etc.. >> Yes but you seem to have done this with ZFS too, just not in this particularly bad case. >> > There is no r-studio for zfs or I would have turned to it as soon as this issue hit. > > > So as an update, this Company: http://www.klennet.com/ produce a ZFS recovery tool: https://www.klennet.com/zfs-recovery/default.aspx and following several code changes due to my case being an 'edge case' the entire volume (including the zvol - which I previously recovered as it wasn't suffering from the metadata corruption) and all 34 million files is being recovered intact with the entire directory structure. Its only drawback is it's a windows only tool, so I built 'windows on a stick' and it's running from that. The only thing I had to do was physically pull the 'spare' out as the spare already had data on it from being previously swapped in and it confused the hell out of the algorithm that detects the drive order. Regards, Michelle -- Michelle Sullivan http://www.mhix.org/ From owner-freebsd-stable@freebsd.org Fri Jun 7 07:57:59 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 78CEA15CB21A for ; Fri, 7 Jun 2019 07:57:59 +0000 (UTC) (envelope-from steven@multiplay.co.uk) Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DF07169BBB for ; Fri, 7 Jun 2019 07:57:57 +0000 (UTC) (envelope-from steven@multiplay.co.uk) Received: by mail-lf1-x12d.google.com with SMTP id y13so872202lfh.9 for ; Fri, 07 Jun 2019 00:57:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=multiplay-co-uk.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=DDt8OlV6BF9mE5QSqQSQtV2/fAtZSULnFb4isl6c71Y=; b=ylzGWReTfmzKWxJ6uFO6VTmJV+uNaABmmVHORnm4f+DdoARm3bTDWiX1awl0D2L1o1 oYUyiJDbYjm83wM45bi193WhquFdOR+4uHmc4ZdIVTBl4YllbpLpM81toDMsRn5oL/LL 0FTKdaBGVreCAzloT2vhUqU2SjYM06NA/EFBALex181KKvDKRF8bSY/h0N7xI5rEGSxx emw5goypc5f46Wk4Bq2LD7DSLTC4eOljXewzLUc0OafZTrHZ/cceBQKlV64zoNi2zk9E Zl1g9itYIQvWbtbUDkYeFygOWMY1dzkit631XuL+70I+xG9BepmcN14y/L84i3Fjr1Bn rIcw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=DDt8OlV6BF9mE5QSqQSQtV2/fAtZSULnFb4isl6c71Y=; b=czrVcuxZwnP4PIwYq7Ojp1Zer6R0T8lRYa5dLHSN7IQzoGjMdWUSC90LPjnxLBpYv7 +BpHRJ3jTBvxAq+lNXMDc2gEzyPRRhm1nxnzJqYBLwFVaVNeGVQEd8TYgF8MffX6jm6J DLpZN7mrqqGmUTM+3zL7XGcKcDVrGdDtBRJsZMf9tn/CQtFVENCf6aaPJKtrFc2HHiq9 o7nJ5qnL/1/mQGcO27BJ3VdllEKg9lSAiW4q8guG4Miaov4oC+wQdSn+FfwAvTRqZJPe FckQLXweXsK7/b54YBssTTYe9iAEDetKN88YtJYN4FbYM7IIZR22KLKvT63/9Iu7Ytnc XoOA== X-Gm-Message-State: APjAAAUZ+rALA4956wocnNaPDVxGJ18J2C2S901TreXCB3qX08D0lGpI iOPLkIE0bagUNfBTDUKveOHOZ2kMuHbTdlwdk0AwPHsp X-Google-Smtp-Source: APXvYqzJ7qE2Hs65n9ab9xu11pRYOrciVS/XOtfm9uRu3+26vYAxYFt/PAImKwc/O79bkKUywFKiD90dOT2jGGwk5HA= X-Received: by 2002:ac2:52ac:: with SMTP id r12mr3442389lfm.126.1559894276086; Fri, 07 Jun 2019 00:57:56 -0700 (PDT) MIME-Version: 1.0 References: <30506b3d-64fb-b327-94ae-d9da522f3a48@sorbs.net> <70fac2fe3f23f85dd442d93ffea368e1@ultra-secure.de> <70C87D93-D1F9-458E-9723-19F9777E6F12@sorbs.net> <5ED8BADE-7B2C-4B73-93BC-70739911C5E3@sorbs.net> <2e4941bf-999a-7f16-f4fe-1a520f2187c0@sorbs.net> <34539589-162B-4891-A68F-88F879B59650@sorbs.net> <576857a5-a5ab-eeb8-2391-992159d9c4f2@denninger.net> <7DBA7907-BE8F-4944-9A71-86E5AC1B85CA@gromit.dlib.vt.edu> <5c458075-351f-6eb6-44aa-1bd268398343@sorbs.net> <289FE04E-1692-4763-96B3-91E8C1BBBBD6@sorbs.net> <70d5e0d3-c188-7f06-cf53-702d565fd481@sorbs.net> In-Reply-To: <70d5e0d3-c188-7f06-cf53-702d565fd481@sorbs.net> From: Steven Hartland Date: Fri, 7 Jun 2019 08:57:45 +0100 Message-ID: Subject: Re: ZFS... To: Michelle Sullivan Cc: freebsd-stable X-Rspamd-Queue-Id: DF07169BBB X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=multiplay-co-uk.20150623.gappssmtp.com header.s=20150623 header.b=ylzGWReT; spf=pass (mx1.freebsd.org: domain of steven@multiplay.co.uk designates 2a00:1450:4864:20::12d as permitted sender) smtp.mailfrom=steven@multiplay.co.uk X-Spamd-Result: default: False [-5.23 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[multiplay-co-uk.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[multiplay.co.uk]; MX_GOOD(-0.01)[ASPMX.L.GOOGLE.COM,ALT2.ASPMX.L.GOOGLE.COM,ALT1.ASPMX.L.GOOGLE.COM,ASPMX3.GOOGLEMAIL.COM,ASPMX2.GOOGLEMAIL.COM]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[multiplay-co-uk.20150623.gappssmtp.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[d.2.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; SUBJ_ALL_CAPS(0.45)[6]; NEURAL_HAM_SHORT(-0.73)[-0.731,0]; IP_SCORE(-2.73)[ip: (-8.99), ipnet: 2a00:1450::/32(-2.33), asn: 15169(-2.30), country: US(-0.06)]; FORGED_SENDER(0.30)[killing@multiplay.co.uk,steven@multiplay.co.uk]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[killing@multiplay.co.uk,steven@multiplay.co.uk]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jun 2019 07:57:59 -0000 Great to hear you got your data back even after all the terrible luck you suffered! Regards Steve On Fri, 7 Jun 2019 at 00:49, Michelle Sullivan wrote: > Michelle Sullivan wrote: > >> On 02 May 2019, at 03:39, Steven Hartland > wrote: > >> > >> > >> > >>> On 01/05/2019 15:53, Michelle Sullivan wrote: > >>> Paul Mather wrote: > >>>>> On Apr 30, 2019, at 11:17 PM, Michelle Sullivan > wrote: > >>>>> > >>>>> Been there done that though with ext2 rather than UFS.. still got > all my data back... even though it was a nightmare.. > >>>> > >>>> Is that an implication that had all your data been on UFS (or ext2:) > this time around you would have got it all back? (I've got that impression > through this thread from things you've written.) That sort of makes it > sound like UFS is bulletproof to me. > >>> Its definitely not (and far from it) bullet proof - however when the > data on disk is not corrupt I have managed to recover it - even if it has > been a nightmare - no structure - all files in lost+found etc... or even > resorting to r-studio in the even of lost raid information etc.. > >> Yes but you seem to have done this with ZFS too, just not in this > particularly bad case. > >> > > There is no r-studio for zfs or I would have turned to it as soon as > this issue hit. > > > > > > > So as an update, this Company: http://www.klennet.com/ produce a ZFS > recovery tool: https://www.klennet.com/zfs-recovery/default.aspx and > following several code changes due to my case being an 'edge case' the > entire volume (including the zvol - which I previously recovered as it > wasn't suffering from the metadata corruption) and all 34 million files > is being recovered intact with the entire directory structure. Its only > drawback is it's a windows only tool, so I built 'windows on a stick' > and it's running from that. The only thing I had to do was physically > pull the 'spare' out as the spare already had data on it from being > previously swapped in and it confused the hell out of the algorithm that > detects the drive order. > > Regards, > > Michelle > > -- > Michelle Sullivan > http://www.mhix.org/ > > From owner-freebsd-stable@freebsd.org Fri Jun 7 11:03:57 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6F0FA15A92FB for ; Fri, 7 Jun 2019 11:03:57 +0000 (UTC) (envelope-from SRS0=hBCs=UG=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D94086EE59 for ; Fri, 7 Jun 2019 11:03:56 +0000 (UTC) (envelope-from SRS0=hBCs=UG=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 9B15A28416; Fri, 7 Jun 2019 13:03:46 +0200 (CEST) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 356432840C; Fri, 7 Jun 2019 13:03:45 +0200 (CEST) Subject: Re: ZFS... To: Michelle Sullivan , Steven Hartland Cc: freebsd-stable References: <30506b3d-64fb-b327-94ae-d9da522f3a48@sorbs.net> <70C87D93-D1F9-458E-9723-19F9777E6F12@sorbs.net> <5ED8BADE-7B2C-4B73-93BC-70739911C5E3@sorbs.net> <2e4941bf-999a-7f16-f4fe-1a520f2187c0@sorbs.net> <34539589-162B-4891-A68F-88F879B59650@sorbs.net> <576857a5-a5ab-eeb8-2391-992159d9c4f2@denninger.net> <7DBA7907-BE8F-4944-9A71-86E5AC1B85CA@gromit.dlib.vt.edu> <5c458075-351f-6eb6-44aa-1bd268398343@sorbs.net> <289FE04E-1692-4763-96B3-91E8C1BBBBD6@sorbs.net> <70d5e0d3-c188-7f06-cf53-702d565fd481@sorbs.net> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <8da1cee9-1f2a-3865-c51c-3cd8e905755b@quip.cz> Date: Fri, 7 Jun 2019 13:03:45 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.3 MIME-Version: 1.0 In-Reply-To: <70d5e0d3-c188-7f06-cf53-702d565fd481@sorbs.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: D94086EE59 X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [5.46 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_SPAM_SHORT(0.87)[0.875,0]; IP_SCORE(0.95)[ip: (0.57), ipnet: 94.124.104.0/21(0.29), asn: 42000(3.84), country: CZ(0.08)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[quip.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.99)[0.992,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[cached: elsa.codelab.cz]; NEURAL_SPAM_LONG(1.00)[1.000,0]; RCVD_IN_DNSWL_NONE(0.00)[4.105.124.94.list.dnswl.org : 127.0.10.0]; SUBJ_ALL_CAPS(0.45)[6]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[000.fbsd@quip.cz,SRS0=hBCs=UG=quip.cz=000.fbsd@elsa.codelab.cz]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42000, ipnet:94.124.104.0/21, country:CZ]; FROM_NEQ_ENVFROM(0.00)[000.fbsd@quip.cz,SRS0=hBCs=UG=quip.cz=000.fbsd@elsa.codelab.cz]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jun 2019 11:03:57 -0000 Michelle Sullivan wrote on 2019/06/07 01:49: >>> Yes but you seem to have done this with ZFS too, just not in this >>> particularly bad case. >>> >> There is no r-studio for zfs or I would have turned to it as soon as >> this issue hit. >> >> >> > So as an update, this Company: http://www.klennet.com/ produce a ZFS > recovery tool: https://www.klennet.com/zfs-recovery/default.aspx and > following several code changes due to my case being an 'edge case' the > entire volume (including the zvol - which I previously recovered as it > wasn't suffering from the metadata corruption) and all 34 million files > is being recovered intact with the entire directory structure.  Its only > drawback is it's a windows only tool, so I built 'windows on a stick' > and it's running from that.  The only thing I had to do was physically > pull the 'spare' out as the spare already had data on it from being > previously swapped in and it confused the hell out of the algorithm that > detects the drive order. It's really good to know there exists some tool which can recover files from broken ZFS. Thank you for sharing your very long story and I am glad you recovered all your data. It would be very nice to have similar tool running on FreeBSD... maybe it is good topic for next google summer of code project. Miroslav Lachman From owner-freebsd-stable@freebsd.org Fri Jun 7 22:26:37 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E097E15B881D; Fri, 7 Jun 2019 22:26:36 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 866798C46A; Fri, 7 Jun 2019 22:26:36 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id 13653C8E8; Fri, 7 Jun 2019 22:26:36 +0000 (UTC) (envelope-from gjb@freebsd.org) Date: Fri, 7 Jun 2019 22:26:34 +0000 From: Glen Barber To: freebsd-stable@freebsd.org, freebsd-snapshots@freebsd.org Cc: FreeBSD Release Engineering Team Subject: FreeBSD 11.3-BETA3 Now Available Message-ID: <20190607222634.GJ13146@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed User-Agent: Mutt/1.11.2 (2019-01-07) X-Rspamd-Queue-Id: 866798C46A X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.958,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jun 2019 22:26:37 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 The third BETA build of the 11.3-RELEASE release cycle is now available. Installation images are available for: o 11.3-BETA3 amd64 GENERIC o 11.3-BETA3 i386 GENERIC o 11.3-BETA3 powerpc GENERIC o 11.3-BETA3 powerpc64 GENERIC64 o 11.3-BETA3 sparc64 GENERIC o 11.3-BETA3 armv6 BANANAPI o 11.3-BETA3 armv6 BEAGLEBONE o 11.3-BETA3 armv6 CUBIEBOARD o 11.3-BETA3 armv6 CUBIEBOARD2 o 11.3-BETA3 armv6 CUBOX-HUMMINGBOARD o 11.3-BETA3 armv6 RPI-B o 11.3-BETA3 armv6 RPI2 o 11.3-BETA3 armv6 PANDABOARD o 11.3-BETA3 armv6 WANDBOARD o 11.3-BETA3 aarch64 GENERIC Note regarding arm SD card images: For convenience for those without console access to the system, a freebsd user with a password of freebsd is available by default for ssh(1) access. Additionally, the root user password is set to root. It is strongly recommended to change the password for both users after gaining access to the system. Installer images and memory stick images are available here: https://download.freebsd.org/ftp/releases/ISO-IMAGES/11.3/ The image checksums follow at the end of this e-mail. If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use SVN to do a source based update of an existing system, use the "stable/11" branch. A summary of changes since 11.3-BETA2 includes: o Support for the IPV6_NEXTHOP option has been restored. o Warnings for IPsec algorithms deprecated in RFC 8221 have been added. o Fix for FC-Tape bugs. o A fix in jail_getid(3) for jail(8) ID 0. o Warnings for weaker geli(4) algorithms have been added. o Various updates and fixes in libarchive(3). o A fix in cxgbe(4) to address a connection hang when running iozone over an NFS-mounted share. o A fix to the zfs(8) 'userspace' subcommand where all unresolved UIDs after the first were ignored. o An apm(8) fix to correct battery life calculation. o The default size of Vagrant images has been increased. o Reporting on deprecated features for all major FreeBSD versions has been merged. A list of changes since 11.2-RELEASE is available in the stable/11 release notes: https://www.freebsd.org/relnotes/11-STABLE/relnotes/article.html Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 11.3-RELEASE cycle progresses. === Virtual Machine Disk Images === VM disk images are available for the amd64, i386, and aarch64 architectures. Disk images may be downloaded from the following URL (or any of the FreeBSD FTP mirrors): https://download.freebsd.org/ftp/releases/VM-IMAGES/11.3-BETA3/ The partition layout is: ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label) ~ 1 GB - freebsd-swap GPT partition type (swapfs GPT label) ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label) The disk images are available in QCOW2, VHD, VMDK, and raw disk image formats. The image download size is approximately 135 MB and 165 MB respectively (amd64/i386), decompressing to a 21 GB sparse image. Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI loader file is needed for qemu-system-aarch64 to be able to boot the virtual machine images. See this page for more information: https://wiki.freebsd.org/arm64/QEMU To boot the VM image, run: % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt \ -bios QEMU_EFI.fd -serial telnet::4444,server -nographic \ -drive if=none,file=VMDISK,id=hd0 \ -device virtio-blk-device,drive=hd0 \ -device virtio-net-device,netdev=net0 \ -netdev user,id=net0 Be sure to replace "VMDISK" with the path to the virtual machine image. === Amazon EC2 AMI Images === FreeBSD/amd64 EC2 AMIs are available in the following regions: eu-north-1 region: ami-07fd27786377bc6fd ap-south-1 region: ami-01f208a9f001a22e2 eu-west-3 region: ami-085439f21755d95a4 eu-west-2 region: ami-0993e4ba21a62262d eu-west-1 region: ami-0f2f6a13b79dd804b ap-northeast-2 region: ami-07164fb9df8db807f ap-northeast-1 region: ami-0c1b2bbd0b1cced6e sa-east-1 region: ami-0d51b7b8c6a2f8a57 ca-central-1 region: ami-054c4785980cbfbb4 ap-southeast-1 region: ami-07cbfed103b47434a ap-southeast-2 region: ami-06e7f111242f4a03e eu-central-1 region: ami-05b82446f270f2c7e us-east-1 region: ami-0b3ea59d3140af471 us-east-2 region: ami-0b59f21c8a159bf51 us-west-1 region: ami-0a6d215b372bd8a86 us-west-2 region: ami-0861887499c7e29c3 === Vagrant Images === FreeBSD/amd64 images are available on the Hashicorp Atlas site, and can be installed by running: % vagrant init freebsd/FreeBSD-11.3-BETA3 % vagrant up === Upgrading === The freebsd-update(8) utility supports binary upgrades of amd64 and i386 systems running earlier FreeBSD releases. Systems running earlier FreeBSD releases can upgrade as follows: # freebsd-update upgrade -r 11.3-BETA3 During this process, freebsd-update(8) may ask the user to help by merging some configuration files or by confirming that the automatically performed merging was done correctly. # freebsd-update install The system must be rebooted with the newly installed kernel before continuing. # shutdown -r now After rebooting, freebsd-update needs to be run again to install the new userland components: # freebsd-update install It is recommended to rebuild and install all applications if possible, especially if upgrading from an earlier FreeBSD release, for example, FreeBSD 10.x. Alternatively, the user can install misc/compat10x and other compatibility libraries, afterwards the system must be rebooted into the new userland: # shutdown -r now Finally, after rebooting, freebsd-update needs to be run again to remove stale files: # freebsd-update install == ISO CHECKSUMS == o 11.3-BETA3 amd64 GENERIC: SHA512 (FreeBSD-11.3-BETA3-amd64-bootonly.iso) = 46990d8c8adc588629aaa92578b3b846b6a5dd31c4b195e347f3783db0db05358adb960f75468b80916fbabba2009b755059e23c87d083c0cb27d33254f9668e SHA512 (FreeBSD-11.3-BETA3-amd64-bootonly.iso.xz) = 19a68c076da911856a9b1d9ee4c72193de9ccb5f8155a39489e81e853881f9d1be53d1282b4637996455445e6da6d2d4412959bd7a53995fa06dc52ab072960f SHA512 (FreeBSD-11.3-BETA3-amd64-disc1.iso) = cc6a6daa3325b31420356690d0fd18846a2f7c1740a858fe084fbcd0ef3ce51d86e93f8e5be682f7b1d5e47c115641c6bdf795c57c92210dedf667305cf331d1 SHA512 (FreeBSD-11.3-BETA3-amd64-disc1.iso.xz) = be1786b97cc3cb2faea4413803272f30bf901a5b6041b95d29ad5706dee12deea39b36074da91039bd7cc3bd3bedff0ee9ada1ef43b8f4a7fd1d2a7886fb646d SHA512 (FreeBSD-11.3-BETA3-amd64-dvd1.iso) = aa77764c21873ff1d92a3cf5a4d5a94d0079e4b8d69d767939ffc7073814e1e865ddb97302709f74e5408b50a5759eb176d1c7632b6fb83f303cdb2fa54472b4 SHA512 (FreeBSD-11.3-BETA3-amd64-dvd1.iso.xz) = 282d1781b28e3552d8891baef8ffbb16a24c376a8f6aff024afff8541beec7a4a7982ee48cd229976827b6f1f0942132ee8eecca9970e8f3a35c5ab2606354e5 SHA512 (FreeBSD-11.3-BETA3-amd64-memstick.img) = cf4b2d3768f32f351d052ffeba30a97b2f4df36d634bc71705f3c75f988844b17cde126bb9dd38266b820194c13714fadf64f9ddbb3b14fc6cf87580cec91794 SHA512 (FreeBSD-11.3-BETA3-amd64-memstick.img.xz) = 40ba1e0d8b288bdbf75a046a3d11dd529d933a58be761bb093baea6827f868d56e88560fb6ab8888b741a5899ef10c42e286e59cb7756595eaba909cdd63f2b8 SHA512 (FreeBSD-11.3-BETA3-amd64-mini-memstick.img) = 7669dd62313292d882b8224cc004ba8dddedc51553d0d9e36d83f19e481161464a02c8a30532ff9f17a13e670cd1c5b1bcc15cf1f1ed5227071ccbff85738225 SHA512 (FreeBSD-11.3-BETA3-amd64-mini-memstick.img.xz) = a01ec177728d58b898f0286c7f29a8a832233641c861ba18de70081eef4217769e730be828bfef15424f66f9809b2cef371cd23f4b47c26e4450111d420cc62b SHA256 (FreeBSD-11.3-BETA3-amd64-bootonly.iso) = a76060b619a618d9d1bfae77ec57cee87126b89b8c1f1c730a477a8fc2738817 SHA256 (FreeBSD-11.3-BETA3-amd64-bootonly.iso.xz) = c9bdd23e93e34e404f1d1300555242782bf26366b1f546d3b39dfbaa0e1607cf SHA256 (FreeBSD-11.3-BETA3-amd64-disc1.iso) = 5734dc63be22e1b5d3a99e00d64efbd64654f8aaa48ca0a89b0031f181e1b21c SHA256 (FreeBSD-11.3-BETA3-amd64-disc1.iso.xz) = ec470de4ee4554aab95f842eb550651726e1f14c77f1be916caa27cdb96402fc SHA256 (FreeBSD-11.3-BETA3-amd64-dvd1.iso) = 1fa45ef445b74ce681a6b77a6a2b62e614fa624b945bb9e5d39c0ec595dec913 SHA256 (FreeBSD-11.3-BETA3-amd64-dvd1.iso.xz) = 4f3cd1636a1b48b955b1bb6b8c85fd71b657b4a67f07b47a804bb3d6ba61ec9c SHA256 (FreeBSD-11.3-BETA3-amd64-memstick.img) = 28e7f9df719a61a63b57634a64d01a84ba207776e9604c422545fb8fba2aec3e SHA256 (FreeBSD-11.3-BETA3-amd64-memstick.img.xz) = 0b2e232546e94b8e26740178265e685c9a8ce00c6da944b469e85ef0e9e9d975 SHA256 (FreeBSD-11.3-BETA3-amd64-mini-memstick.img) = ae55840e97479ba989801ab646fa5d29f1968671b208838fbf56523e6009cb23 SHA256 (FreeBSD-11.3-BETA3-amd64-mini-memstick.img.xz) = 533a0b93ae4242b66299ade721e8f24c2f026f01ed1504280adc0f445695e71e o 11.3-BETA3 i386 GENERIC: SHA512 (FreeBSD-11.3-BETA3-i386-bootonly.iso) = dff633b237be0b88e49a5fbd0a369ac7512c9b3078b9fc4d0b1f18509770a9a5fa011a645d32af194519844e07d10637e75261d631a0d06a0d8eb36630a2f577 SHA512 (FreeBSD-11.3-BETA3-i386-bootonly.iso.xz) = b20a49c7d4b5f1d7d486da83737276a84a6dc87d9184872da3a323655546ed9cc48c56868dd335c6c7848aaa027a3f300e4885c51155baaafd2ad5b21a43060b SHA512 (FreeBSD-11.3-BETA3-i386-disc1.iso) = 5c7b1099294b475013c76c2d00e75e3ae159f5cead6eb6dd811d52d47a0f24e724ec38d255e5fda8679ad4e3ba9dfc9238f6d5c668406503daf63068853a996e SHA512 (FreeBSD-11.3-BETA3-i386-disc1.iso.xz) = 8a2b0a83a023630f6a771ec5a50f126f66d47fcc11fec438c0ed9d2ed2feb74866254ea477ac828912a78b5a630a8dad0e5014e7dc8307b339e991038c1a42b2 SHA512 (FreeBSD-11.3-BETA3-i386-dvd1.iso) = 499c5e6c582332edab4f307540dede4e096ad72fa349d05b573688051e9b01a35a8cd147f69567fab1ced01dbc4ca821af9585217e5193edc477a91d6cb14d17 SHA512 (FreeBSD-11.3-BETA3-i386-dvd1.iso.xz) = c51eb0b8bd662a3fd901bbfa797182c138656d340403ea5595154f5396b94a4b8ffd125a4677b543d74f6af459d6a1cee205d0a3866f705cf9ea228806899086 SHA512 (FreeBSD-11.3-BETA3-i386-memstick.img) = f050af72a75ae18d13bcf70fa6b9ae371421b7d6bbaf598ca4f511a964cf309662224e36777a3e8b51fa5bb2f06a637a596ced779d94012d2d54823511f5dc39 SHA512 (FreeBSD-11.3-BETA3-i386-memstick.img.xz) = 2074aa99f7610cf366773e3a14c5165bc97aba089a34db85cfb69c62e8442237dd90e0b47372018363ce123193b2394164ada205231bb93bd240b524db2b0fec SHA512 (FreeBSD-11.3-BETA3-i386-mini-memstick.img) = acb65613c8ee29d7158b672ff5db904cccd44f8f1543918d0d61fce97aceaed51e714dcf3dd9c354ea0c45d96d8cc6c0c1c4862b1b84b6b4c7eb5686639f4eef SHA512 (FreeBSD-11.3-BETA3-i386-mini-memstick.img.xz) = 51dda9319b9207c52b196b9be75fef5d504d41c03623952e51a2bebe94dfbafac0745ffe32629babee46e76e34608204ecc2cfc063b868ba31f8f8efaa1f4db1 SHA256 (FreeBSD-11.3-BETA3-i386-bootonly.iso) = 70942b9645f084ac2da56a3acb43eb9496f60091213f2bb7bee22d665e803746 SHA256 (FreeBSD-11.3-BETA3-i386-bootonly.iso.xz) = 56ba52738e6ab2c1a22d761738a5ca99673488185f27d5a081e797aae166e2e4 SHA256 (FreeBSD-11.3-BETA3-i386-disc1.iso) = fa1f98bb265778c839dc69e10e911ee53f92b216df33cec09d67b26ad6be067a SHA256 (FreeBSD-11.3-BETA3-i386-disc1.iso.xz) = 43b33ee21ee0efa4ea18c764c7a91c748eada4cd58dde463c15d690cf3d6f921 SHA256 (FreeBSD-11.3-BETA3-i386-dvd1.iso) = 7ebbe8b1ab1c561c120b689a7c7cac342d09eb5f9f18da72a274a0c81d045ccd SHA256 (FreeBSD-11.3-BETA3-i386-dvd1.iso.xz) = 80fdd5ab2fb8f3fcf69f3d63e87f1bfe4e12ba332a952901df8975443f67e3e1 SHA256 (FreeBSD-11.3-BETA3-i386-memstick.img) = 281026b061c3936fe07887eb1edb0cd8d6cc68592a33f69a40c1c68dd1fafec1 SHA256 (FreeBSD-11.3-BETA3-i386-memstick.img.xz) = 82f4358b97ab6276ecf96c45431a4c2210ebd3004bbcec973f566c951a9277d5 SHA256 (FreeBSD-11.3-BETA3-i386-mini-memstick.img) = 3f5335ad27d521494066d3e12bc0348a8491170cb567f0225363ebe733e5ac4b SHA256 (FreeBSD-11.3-BETA3-i386-mini-memstick.img.xz) = cc489beae2a847cf3cf0d8a2669c5cc6c9b2836268765020bed2b157ddb4d51a o 11.3-BETA3 powerpc GENERIC: SHA512 (FreeBSD-11.3-BETA3-powerpc-bootonly.iso) = 4d0c93d651e0f4eb432134b59795e2f70c6c9da23afb45666fdb64acb9c8be8cb910feafa526e45e7389ddd123811465aed79cb6a1050b8b1e4e3d0293ee0fc4 SHA512 (FreeBSD-11.3-BETA3-powerpc-bootonly.iso.xz) = 48fe0c5c356a02a00d7aea25d21853e1828b76fd79754fd0c8da254c905844b517d8b8fa9b139d61d71efd53a688d2833ce2a8f7d6fca9e5eb9a5e8d309783aa SHA512 (FreeBSD-11.3-BETA3-powerpc-disc1.iso) = df1f2510f3d141f011e62cfdc8fa48ec298ed31edf2f00e80e471c6086a919dc3fa9e644356a748de0d524836e21f742dacb6d8d8b60e8357d99020d29126b6f SHA512 (FreeBSD-11.3-BETA3-powerpc-disc1.iso.xz) = 4252a98f7c063200fb4a7dd4adf56aa7ed4897e5061e1eb852147c2a03cac9ce8a7b351be79e68caf03aeeffe24afb81f6a57e5bff5d65f4caca25ad1f815679 SHA512 (FreeBSD-11.3-BETA3-powerpc-dvd1.iso) = 526176fdb79969434cb960db2b2d4f1c9f6897662f7f5a33754e5f5ee1376d7f8856c358b50ab1b0c8e49e664ffebe79eec5ec1ae7901495d38d72241ad5a0b4 SHA512 (FreeBSD-11.3-BETA3-powerpc-dvd1.iso.xz) = 36dfb4b9477daf2a20c59d0fe2553c50ad4a971514cd7ccbb26288293c6f04431a28ee25e9b97f167d979a68f14b72a88d8a3080d72edb69726e466f1ee9cecf SHA512 (FreeBSD-11.3-BETA3-powerpc-memstick.img) = 8fc2b723f4ff6c6995073632251bad55b8e893768e3699812a1ebc9e3d438eb53e964d1ec829a9c9c923d505e9aa3dbdfb2dc3035eb00f93263ecbfa3e744e1b SHA512 (FreeBSD-11.3-BETA3-powerpc-memstick.img.xz) = 8a74c470f03389424c185b39d030a12fe15a388a53f10330c93b08dcc7bd2c2db0bf74036a245b47b5b095d67110af03a69d6751401dc1214f0d0746e835b9e9 SHA512 (FreeBSD-11.3-BETA3-powerpc-mini-memstick.img) = a6345038a9e42b29c284409fa5d26f273aa3c0ef32dcf3a303a5c5c8167b28e1502c58d5a5dc00fa58fff8fb41bcac903bfcd050f5e0ee7c7e1e03553acdbc02 SHA512 (FreeBSD-11.3-BETA3-powerpc-mini-memstick.img.xz) = 1c2413b0f577e5be862486686080d3c9c085f49c973b4b54bba23fd1b03313409bfb30c843b66e67921d6b85a7987bc12445ff15fffc2bbf7dd27057ff9b317a SHA256 (FreeBSD-11.3-BETA3-powerpc-bootonly.iso) = 354e4f441ded08cdb622a8c72d5786110c3eb7349df7f04241c4422d85c9e941 SHA256 (FreeBSD-11.3-BETA3-powerpc-bootonly.iso.xz) = 218f881d97107e5cb815128d6255e38cd7c556bbfe72a5386a132fdf7943d5fe SHA256 (FreeBSD-11.3-BETA3-powerpc-disc1.iso) = ec5468fae4bee5aba99fbe0028d45b649f5ca08a4a29739bebea232ccb175399 SHA256 (FreeBSD-11.3-BETA3-powerpc-disc1.iso.xz) = 502ab4a86073e7b453c138d4bdc390851df21cdfa1c6f821fa925faa3858a972 SHA256 (FreeBSD-11.3-BETA3-powerpc-dvd1.iso) = 4f9aec0d2f997faf3e7bf4107e00d31f2747ed9f1dc8dec52946d97e5d2a9e5e SHA256 (FreeBSD-11.3-BETA3-powerpc-dvd1.iso.xz) = 3037782261e4e1daf8ce15cc417e1e7504ee2b8193baa914c1c1d15d0ec8d2e4 SHA256 (FreeBSD-11.3-BETA3-powerpc-memstick.img) = 8782c67c059921b4a2b9661471a63a03dd99de96bac5c4ff830a2bd70ebac707 SHA256 (FreeBSD-11.3-BETA3-powerpc-memstick.img.xz) = 7ba0f7eee3d5c65ae1561ff95db23ba30b0ae8c608a07589bd8d6936078b0b40 SHA256 (FreeBSD-11.3-BETA3-powerpc-mini-memstick.img) = 5b20dc21d90937d38aab314771cadd8ac5f783f9bcf201b275c43d873f4e8143 SHA256 (FreeBSD-11.3-BETA3-powerpc-mini-memstick.img.xz) = 5702909b380fed4d707ef7006bd7149ae266674a86b744d6f79c3d8379a7d770 o 11.3-BETA3 powerpc64 GENERIC64: SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-bootonly.iso) = f5fc9a33796bb05f6e00ea5609fb22247f007b04d57619bf4b5491ad0406d4a65cb9433e17f28b5abbb6c818a65d444af7124749cf06b1a4ede11c73736c82be SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-bootonly.iso.xz) = c55c316e4e56d1c72b43744051adc616eb4a8048719a3a38f629d5c37fd1553076006554380bca7a8a6a5ae7d90aa7460d26810b49d3207afc485938a99e1596 SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-disc1.iso) = a8b0c638334ad3bd214d3588d8b41925971c9866d61da2a1b5c520ba95cbdeeb4764a55d4fcc234511e5fed1b492affd7d717a41c80bc12c0e52fdf9ea18e0ae SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-disc1.iso.xz) = dde3eef2c89979bcdb198f0de00a2b6a686516116e67207fb84b45b0e03f718269233049fe750c38c8eb0630f70c35101488a92b1816957290333246275c08f8 SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-dvd1.iso) = 9fcee9ecc5433d7827176315c0000fc57e0e9019503b0ef58bf0fe410ff61bdaa5712917402bccc743612dd3d189ca7e991b8a2597d93719630c7381e1341c01 SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-dvd1.iso.xz) = 77b3c01389b0ff6389a1a1603f2cebce7eafb5dd406fb07b2e55ab0cdd0713e8c7e4c67991a00e129288c84cf3c9cbcf599fa2c87aaeb1218268ca5a4d651528 SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-memstick.img) = 15980e754a283295a13c6ac122c14063ac70532b6072bf6ea3e02b01d73ce3cd8cbcfd76e0c98d30326a5be52b5c32a1ca7ca6fa8428181d4365486781d4ac3d SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-memstick.img.xz) = 09235578e2b2970c9dd05c05914b7e75106e9a3535f7cdeda64cd24a3804ab63ed1b1f087dd24b936b37c486611957402c24d9ee97cd6b0941d2931d1a0ca174 SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-mini-memstick.img) = 106c30374db8a9074784ef660e9c5c2a6777cc7281d45ced189335a00cc7dc85a03f8f501f46fa84c5b32c5d8e1121d1de899ae7b94d49acd4bddaee9e4a221a SHA512 (FreeBSD-11.3-BETA3-powerpc-powerpc64-mini-memstick.img.xz) = d09b4b964b47c12f9c83767959c65f6753f8cf07043798316e280ecb12ab2577839b12a46e8816e67dfed3ec5cd9bd73d37e6ebed7b410919d2444280181d609 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-bootonly.iso) = 260e86dca881e01db31f841d9bc1fb992b070d8c56bd7e4e4ebc737269efe47e SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-bootonly.iso.xz) = 75ceafac26ef3b8895a3180af1abcc23ba355c5a72a00c3241921c89a3082cc7 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-disc1.iso) = 8d8f1efeb4ec85b55032f9be88db67558aa9c7710390dbc0e2519b222bfe8139 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-disc1.iso.xz) = 4e71d3f321d8f3f9fe754f06dfa264ac10eb4fb185ab2bf4f0889729412c5791 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-dvd1.iso) = ddbec9f8b0c517f367df0a08ce8e0061029df5490d407e27673546be6c2726ce SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-dvd1.iso.xz) = 6f0cae6275a14efd8bc618d3849027be9d420e7cabd7d315ce912d8aa3ce2bef SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-memstick.img) = 0911cc44556668a251c0c277ec05adb94e97d719d24dd53048402dc94cddf28d SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-memstick.img.xz) = 3d0b41f47ac96b8c50654c209beba377a87985a875aac293565476cf121feb34 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-mini-memstick.img) = bc8a2c7913d9bfdcaf2e35e7432fd40e3cc607415df4358209563c8eec420065 SHA256 (FreeBSD-11.3-BETA3-powerpc-powerpc64-mini-memstick.img.xz) = b1dd3628b58782195716b1591050077af79f4dc1144fbbfa970afa26c61a9016 o 11.3-BETA3 sparc64 GENERIC: SHA512 (FreeBSD-11.3-BETA3-sparc64-bootonly.iso) = 86ec4b81d4e188f25378ca8144cef8c87cf0e219a43be7831e026d7e8895e73eb619202af81e76f6519a3e2f0573f18b332645f89a3036adcf5eecc964a971a0 SHA512 (FreeBSD-11.3-BETA3-sparc64-bootonly.iso.xz) = 22fb9c0441de7d1f349b79902ea162f612987541c35a19970eda84cb263eaa79cfc4ccbdac77bb50e67f1e8d967828e1ff51f3bea76b9311f08cee35d6062afe SHA512 (FreeBSD-11.3-BETA3-sparc64-disc1.iso) = a4c285aef472d2b08c9f5ce93423214fb9890c5ec22467b377cfd323fbb9bca9dcf4b85ec532dd241e9a1ec77d0d3f14dbb3671123fc6887c5ed9916af209675 SHA512 (FreeBSD-11.3-BETA3-sparc64-disc1.iso.xz) = 3d92bc628564ec35d6e1e7819e8185f93b87aecdf4e0c8ffc0b5c20ae03ae2bc87297f32e2dcb0e39e3e9fd78de885d993d440dafdfa32b50233cc6314fb374e SHA512 (FreeBSD-11.3-BETA3-sparc64-dvd1.iso) = 3af0e1094fe21aefbf7a21f30b755e222c647b7d206050331f97dc4ce0745934e6b0a02c8fc80b059f9b811c767eacec6d28834c432dbdbcbfe1bca9a09f546d SHA512 (FreeBSD-11.3-BETA3-sparc64-dvd1.iso.xz) = 28634375c832fa13bc2aa444d9dcd94dd36172a949bb039e1ceeb1c43ebb0d4506103ec05d57078f57cf2dcd62861ccc6ddee0225d3fdc94db28f515d6951309 SHA256 (FreeBSD-11.3-BETA3-sparc64-bootonly.iso) = 25f1c885e6a1362d2b7e363444aa8789346f9a8aba93ffe2480ede64cd73561c SHA256 (FreeBSD-11.3-BETA3-sparc64-bootonly.iso.xz) = 92a3181dddbe3e945c68c5f7b5ac46d3eddc791f88e407e041ccc094809e951f SHA256 (FreeBSD-11.3-BETA3-sparc64-disc1.iso) = 63b37d1b4bec6981454da193d13570e7a773b852ed916533868528862acd06b4 SHA256 (FreeBSD-11.3-BETA3-sparc64-disc1.iso.xz) = b9fbc505e10f00f53b7ecafb4aed9d0a0522f108272fe711d30c3f87f0b54c6c SHA256 (FreeBSD-11.3-BETA3-sparc64-dvd1.iso) = 287ac6cb2a9bc2e97b9ec8e042b9e021872a78eaf669d8a2a953f0f5d8d0f9df SHA256 (FreeBSD-11.3-BETA3-sparc64-dvd1.iso.xz) = a70c4cd887ce18b95c53ccd475a1a26c0e0c6cd2359289c53bc6de4a1c5d3303 o 11.3-BETA3 armv6 BANANAPI: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-BANANAPI.img.xz) = 4aecaf3e4176749cdb505bfdb65238f31d3f592885d2ac15fad536c24ff7d5096707311391e1fd82c628219940e1bfecd9508b31d9457aa595c884956ddc4063 SHA256 (FreeBSD-11.3-BETA3-arm-armv6-BANANAPI.img.xz) = 1f98a2b53f1c56d2deb9413ba87db7959803733586672965caaa642ebe50a6db o 11.3-BETA3 armv6 BEAGLEBONE: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-BEAGLEBONE.img.xz) = 5dbc2e975107d565449b19acef14d0e97ef63daebd03b184b36607fdab01b502dbc724b021fcc97eea3cabcac5c8116f348868a88092f74d1101ca9871f6629e SHA256 (FreeBSD-11.3-BETA3-arm-armv6-BEAGLEBONE.img.xz) = d6b29caa8537a80e6e3ada3e912f36f9ba648ef31e3880497600820ec573bc8c o 11.3-BETA3 armv6 CUBIEBOARD: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-CUBIEBOARD.img.xz) = c213cfa72bed8bc88ce85e01f2c8860be4a053b66ba02c0524fe0c6b91c96b1dc7280df3b90589e7ab88f86e0fcf47f0a94e27bb778101600701dce5ded9b59e SHA256 (FreeBSD-11.3-BETA3-arm-armv6-CUBIEBOARD.img.xz) = dd8848cb6e21547211615fecd2ff45bbd20452456b5c4df26970da273b9a6593 o 11.3-BETA3 armv6 CUBIEBOARD2: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-CUBIEBOARD2.img.xz) = 080341cc759d27239a4615285e8757694f1449f8e59348ed59e475acd0fd83a80288a572478f7da0400943a00f820af6a0fe496de5f1ff5d27b5f0ca5cb6ed19 SHA256 (FreeBSD-11.3-BETA3-arm-armv6-CUBIEBOARD2.img.xz) = 6b864765f8a74ffcbed226dda04410f94ebe8a065e26b88eaaf9937413f36f24 o 11.3-BETA3 armv6 CUBOX-HUMMINGBOARD: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-CUBOX-HUMMINGBOARD.img.xz) = 433f1d2a8e1a2efe54f0639c1806e599ab8293a74aa1acaaa761d8abb7bc65c6147d3ca60d10357be187350728fe7cbdee5dec133ed1bd90ab02d236b692c17f SHA256 (FreeBSD-11.3-BETA3-arm-armv6-CUBOX-HUMMINGBOARD.img.xz) = 9a1c5c9f99102b01fd187966f02cb1141b4d81cb4da0962c334833233135ef90 o 11.3-BETA3 armv6 RPI-B: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-RPI-B.img.xz) = ebcdfec020bcb37c3294fdbd59b8a39e86cdf77ebb72f4d582bc7e259026196837fbcb966ad5bbb014d4a342439e9bcd53e58712bc1f8fd5b64387512f290b53 SHA256 (FreeBSD-11.3-BETA3-arm-armv6-RPI-B.img.xz) = 6fda3ed6be02dbb06d35ce31e1422c7fbbaf2355f262012b762f21b8fe79cd74 o 11.3-BETA3 armv6 RPI2: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-RPI2.img.xz) = 1d03ce295dae4b003246fd27dacdaba6fc110f54476a1e11ec8ed4710b198fbcc7204a31c5a9235fbf93c897b14aa8d7accbfd89ce5f53695fd02419e5f04bf4 SHA256 (FreeBSD-11.3-BETA3-arm-armv6-RPI2.img.xz) = b721738ff8dced65551bc07a56e114a4bbbc85b60d41c239ade2ed446d22bf35 o 11.3-BETA3 armv6 PANDABOARD: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-PANDABOARD.img.xz) = 60944fd798fa7d1ef9fde8e34fb3d3679b23792b68bf68a30400cad08db03b1d2c17854479911cc189c84262e5a84e3afe8fabf0e82305f4529f9d85b665fb2a SHA256 (FreeBSD-11.3-BETA3-arm-armv6-PANDABOARD.img.xz) = 207ca1596081fc9e2ae77a608241e38b98059dedf7b0b35264325a4cc6d9686d o 11.3-BETA3 armv6 WANDBOARD: SHA512 (FreeBSD-11.3-BETA3-arm-armv6-WANDBOARD.img.xz) = e1145f29030d058410c7bed8131140b5b8576512a05727e0c446b8bd357af9dade2155289f22f7622f220ff9dbf8eae098c6ea4d3b77ded245de2ac6bfa56db7 SHA256 (FreeBSD-11.3-BETA3-arm-armv6-WANDBOARD.img.xz) = 4cda77f77d33306873fb3b8a3fe32b55372751cc23d8342912a9688efa038c14 o 11.3-BETA3 aarch64 GENERIC: SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64-memstick.img) = f5786583b6b2fe88b4741cd138dccb3b5c0cf0d6be3a27ecae7453032756494d99f7318b543b7b88b6d1d34f92961026111ef83df40e8b0fce8c9c03a7ad503e SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64-memstick.img.xz) = a7a6c3a5ebf29a3a04ae57bd4588844616a226af3de4c90288cf39939888841e4e617ab34bd20e74fdccbb80d35bbb11359703a88385aa7c8f5bef3114407f4c SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64-mini-memstick.img) = ad0c8523f4cfae10b0ab1594ce81c20148e5d72a9b622dac7e036a762574a0ac0a8ec7a8089069f1e0f29cbdb1f86f01c338a3eddc1779cbede842ed5ef24ec0 SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64-mini-memstick.img.xz) = 68dab7a97f73bbc03579f7697ab18f7de64be6d17948641f56a0a8902728d3d89cc76ba3291a5e53d3d28e619326231b1033d048bfb13e96dc5f78ca3117f4d4 SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64-memstick.img) = 68e44cd5bc236c66b25a5df60197ce85d288a0cd4765d3561a8d0bfae76e3d72 SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64-memstick.img.xz) = 225dc63450821a230f47a8b5d7f2c71836d5f9f9f93da314c5470b229f578b53 SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64-mini-memstick.img) = c6f4f64a0561279c1a45f7aa6eb52ebac5dad76fb1c9665678e5df463b36ff85 SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64-mini-memstick.img.xz) = a090564b0abea3dc4b56a602451ac67cdb8047efa94ebb11c3b7791f4b866ec1 == VM IMAGE CHECKSUMS == o 11.3-BETA3 amd64: SHA512 (FreeBSD-11.3-BETA3-amd64.qcow2.xz) = 162125268a04e6867fba2add6d41c828082b4c5a4ba237b47596b374a5547a44cef44d3aaf8aa05ea969f69bda85e205a4a768802f3035c30c6e121cdc15125e SHA512 (FreeBSD-11.3-BETA3-amd64.raw.xz) = 88de3dd69a33f7c93da5849d12fcba35ca69588cc309bd75d96fc2b9e23f06133f440923581fdb6df9ab2fe836d5b54a41744e9c504a980efd19a1a6310c151f SHA512 (FreeBSD-11.3-BETA3-amd64.vhd.xz) = b5fba8b3345cdd709690b63859ff000411071ee1360c8d8dc1e141057adc96ba640f5f359e2608cea9d7750e940af753dfd0705d3d8f8dc9579534a3a731d0f4 SHA512 (FreeBSD-11.3-BETA3-amd64.vmdk.xz) = 02aa5b807979b6c178e672a053edf3dc752c3532787babd2771ee7e86791c51a50c23872670c8f2daffb6b9a2e8e9277b5f6cf75ca8491df0315b61e450c0e91 SHA256 (FreeBSD-11.3-BETA3-amd64.qcow2.xz) = ef2f0df09b04b1f5ad5cb9387080c09a92fbe0ec0d1cc31564a5a1dc5922383c SHA256 (FreeBSD-11.3-BETA3-amd64.raw.xz) = 0f2a67945f1847ac5dd8a40a3c3d5f30f73c547c0b07adc4a6c766681635082d SHA256 (FreeBSD-11.3-BETA3-amd64.vhd.xz) = 06db0c5b5f5ddc810f8ed67e262fb3d6859716680a3bd31143ad7e5cad464849 SHA256 (FreeBSD-11.3-BETA3-amd64.vmdk.xz) = f762f81dfbd812858176f657296f597a1f1626047ca6b496cb010510f8285c65 o 11.3-BETA3 i386: SHA512 (FreeBSD-11.3-BETA3-i386.qcow2.xz) = 4c208a8fb4081897af1d8d6d60f6a53eea6581b7704d3298febcfd4a466e9d773d7f5c100da0dfb5470365b90997b63d1fcce1471a6fea94afb0b039ab2d8bb4 SHA512 (FreeBSD-11.3-BETA3-i386.raw.xz) = 1404c93287f12b6fe5b8d603d0bebba2e75df8979a9efe4a38d7daff04f8ee0c6a3222405590e5a9101eb8116419a17e820bd7411819a3e616c026e32b25d274 SHA512 (FreeBSD-11.3-BETA3-i386.vhd.xz) = 36f51d3b0389b8a0254ab80f25d78a635298838ead2fa79d4d1bbda264ca76445b02a3263568d96bd62744811d780a4def18c606d250d2c7704f1cc88f58dc1d SHA512 (FreeBSD-11.3-BETA3-i386.vmdk.xz) = d565f55117027493d564f7d913b197ed669436a632c0fdf6a96e246853bcba3f99823f6cabc9a383231e0742aedc851a9c4bb64ab4c15cf7453d9c8e14a4c9ef SHA256 (FreeBSD-11.3-BETA3-i386.qcow2.xz) = e99b9f6a02f023aa0599d9a03a1feb41ce94faa5f9bc0c5c92c0eda6fd1b7d5c SHA256 (FreeBSD-11.3-BETA3-i386.raw.xz) = 8c71bb7c79001450ed7ef29e3cf5caa8dd7c565d87ebedae9986537d04051396 SHA256 (FreeBSD-11.3-BETA3-i386.vhd.xz) = df53a4a9fcf25b1090de1619c0a83291cffae86cbe1d0f142e5a3ac606371b32 SHA256 (FreeBSD-11.3-BETA3-i386.vmdk.xz) = e6860ec41f5998baa67ebdb3db4718f2da42d084641acbe22a0e45ea813b6e76 o 11.3-BETA3 aarch64: SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64.qcow2.xz) = 1603c08bf8d3ae151237baab19eee1ddc7fef062cf7a783a77f1a0084c9fa5fc0163a466ad629f5e1c6f343173f2342db425002c46a1a2d3f472ed1cfe9cc74d SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64.raw.xz) = d02559c6e588288aa3a6d692ffccda19ab5c3b65c9ab67c39a5598a77d54de181215a019749260182337cc7c36d781102d106377852a6dc3f8b83dc38f8f2b60 SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64.vhd.xz) = 2afda1ce32be12f5989f240d60b0fb419fd7de1f66398b14e37792c307835d6aa50b7aeceaa9e3582bbb8bbe9003dcc474d571dbf6492087ad48fa072a53cc80 SHA512 (FreeBSD-11.3-BETA3-arm64-aarch64.vmdk.xz) = 9b53626a17a0070a29b844a92dd60fca048271fa549a0c5bc587731990ec4780e21d370a9a5025074e9458925ba40a1c55adcd969ea0b5335e0685335d87b05b SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64.qcow2.xz) = a2cb79de776d11383b6a834fb88df0ac4b1c2f4169e3bda4b211dee8cda42f8a SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64.raw.xz) = 48376f90138ed67b5342635ca42c09ab523fea086dbc7a37c2061f017b0f07c4 SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64.vhd.xz) = 17e70e9e5fb67b607558c926a60bc3e8cf44551feee40050181ad86483190a5a SHA256 (FreeBSD-11.3-BETA3-arm64-aarch64.vmdk.xz) = c2077c8ce5a778a87bdb08b1253715569fe9813ab5605b8d579e18ea63984d39 Regards, Glen Love FreeBSD? Support this and future releases with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEjRJAPC5sqwhs9k2jAxRYpUeP4pMFAlz65JoACgkQAxRYpUeP 4pNesg//W6zr38F+ygI/7+wuEV7zvJf/hmrr4TchV9B+9QOie4o7Q+e82UMiN8Sd fLP7s7uq6nOBDHeh0wtiZNKz95jI55j0CB4I7ai/2x5LqZMc0CGsag1DPquV2Om9 Xx8Rsdq4CZXc9HxH/pjCUEFHvv8OQ6BKydtLiiorpWlPy/oMkrMNaSggmjrP3Ztv NflQqf0k1hAmhQ9Nndu+xMnSzbmkuZ4O3PpuopfCHajk0AxOjaACL5F/h9hIz3kL ssl7Y6zsVKpNzB+zemms6sBfJCe8akXDurtFLt45y67GdAnibSssNFlme3ma5q6v /fJvp0IJBGCtmqTLHaemurf/ZK5Tt1WBCZvX5APGWB9uI+14PZespNjCubBxQ12F 9HgW6U4VsPsKiahfu+QErw/gXiDPcJTaMh3wZzeSKxEE/cffh+5gAsqDIcS0dAsJ TzkFRzcL+661bWrOPtZqrAZNAnjO+jX8qw++fFZBtCWBR1Mtz8p9DcAHlHCtcAmU lFMc3shh/MDkoIODVe0vGKsvGsGSLYSHTJVCUz6VB+j3TTEPLi1RC9aGD/E01BVC lqV78QUNGaAt3ajpmriUqDZ8Jn3nuh9B1DLBILFWVyLS/do1I5AZuf6/u6yQfJsp +DOotYA+RluISFfPlSvkZhYjFHBA3aTRB0XUb2iAHd76ACNxfdk= =V+aY -----END PGP SIGNATURE----- From owner-freebsd-stable@freebsd.org Sat Jun 8 10:39:53 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AF38A15C831B for ; Sat, 8 Jun 2019 10:39:53 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from zxy.spb.ru (zxy.spb.ru [195.70.199.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 67D5384EBF; Sat, 8 Jun 2019 10:39:52 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from slw by zxy.spb.ru with local (Exim 4.86 (FreeBSD)) (envelope-from ) id 1hZYlJ-000CEc-21; Sat, 08 Jun 2019 13:39:49 +0300 Date: Sat, 8 Jun 2019 13:39:49 +0300 From: Slawa Olhovchenkov To: Glen Barber Cc: freebsd-stable@freebsd.org, FreeBSD Release Engineering Team Subject: Re: FreeBSD 11.3-BETA3 Now Available Message-ID: <20190608103948.GI47119@zxy.spb.ru> References: <20190607222634.GJ13146@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190607222634.GJ13146@FreeBSD.org> User-Agent: Mutt/1.5.24 (2015-08-30) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: slw@zxy.spb.ru X-SA-Exim-Scanned: No (on zxy.spb.ru); SAEximRunCond expanded to false X-Rspamd-Queue-Id: 67D5384EBF X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [3.31 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.64)[0.638,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[zxy.spb.ru]; TO_DN_SOME(0.00)[]; NEURAL_SPAM_MEDIUM(0.86)[0.859,0]; AUTH_NA(1.00)[]; IP_SCORE(0.00)[country: RU(0.01)]; MX_GOOD(-0.01)[zxy.spb.ru]; NEURAL_SPAM_LONG(0.92)[0.919,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5495, ipnet:195.70.192.0/19, country:RU]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jun 2019 10:39:53 -0000 On Fri, Jun 07, 2019 at 10:26:34PM +0000, Glen Barber wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > The third BETA build of the 11.3-RELEASE release cycle is now available. Can some one from re@ do MFC r348772 to 11.3-RELEASE before release? This is important fix. Thanks