From nobody Tue Jan 17 02:59:19 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NwtsM2c5vz2t7Pf for ; Tue, 17 Jan 2023 02:59:35 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NwtsL0hpXz4Vq6 for ; Tue, 17 Jan 2023 02:59:34 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPSA id 30H2xJHk043162 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Mon, 16 Jan 2023 21:59:25 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> Date: Mon, 16 Jan 2023 21:59:19 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Content-Language: en-US To: FreeBSD Hackers From: George Mitchell Subject: Which fonts have lesser-used UTF-8 characters? Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.0 required=10.0 tests=HELO_NO_DOMAIN autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mattapan.m5p.com X-Spamd-Result: default: False [-2.30 / 15.00]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; MLMMJ_DEST(0.00)[freebsd-hackers@FreeBSD.org]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US]; R_DKIM_NA(0.00)[]; TAGGED_FROM(0.00)[freebsd]; TO_DN_ALL(0.00)[]; DMARC_NA(0.00)[m5p.com]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4NwtsL0hpXz4Vq6 X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N For instance, I'm happy to report that Bitstream Vera Sans Mono Bold, which I use in xfce4-terminal, has such relative oddities as ⇒ (U+21d2, rightward double arrow) and ≡ (U+2261, identical to), as well as U+23b5, bottom square bracket -- which isn't in the Fixed Width font in which I am composing this email. But how would I find a font that has, let's say, U+1d4db, mathematical bold script capital L? Is there a font character search tool that knows UTF-8 code points? -- George From nobody Tue Jan 17 03:14:12 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NwvBN3Cv4z2t9Jl for ; Tue, 17 Jan 2023 03:14:20 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NwvBM5BQHz4XfD for ; Tue, 17 Jan 2023 03:14:19 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPSA id 30H3ECgk043213 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Mon, 16 Jan 2023 22:14:17 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: Date: Mon, 16 Jan 2023 22:14:12 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Subject: Re: Which fonts have lesser-used UTF-8 characters? Content-Language: en-US To: freebsd-hackers@freebsd.org References: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> From: George Mitchell In-Reply-To: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.0 required=10.0 tests=HELO_NO_DOMAIN,NICE_REPLY_A autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mattapan.m5p.com X-Spamd-Result: default: False [-2.27 / 15.00]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.97)[-0.974]; R_SPF_ALLOW(-0.20)[+a:c]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[m5p.com]; TAGGED_FROM(0.00)[freebsd]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US]; FROM_EQ_ENVFROM(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; ARC_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4NwvBM5BQHz4XfD X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N On 1/16/23 21:59, George Mitchell wrote: > For instance, I'm happy to report that Bitstream Vera Sans Mono Bold, > which I use in xfce4-terminal, has such relative oddities as ⇒ (U+21d2, > rightward double arrow) and ≡ (U+2261, identical to), as well as U+23b5, > bottom square bracket -- which isn't in the Fixed Width font in which I > am composing this email.  But how would I find a font that has, let's > say, U+1d4db, mathematical bold script capital L?  Is there a font > character search tool that knows UTF-8 code points?         -- George After some research with pypi.org and /usr/ports, it looks like maybe print/py-fontaine is what I want, or maybe print/py-fonttools. Sorry for the noise ... -- George From nobody Tue Jan 17 14:52:35 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NxBhD5vkWz2sVVt for ; Tue, 17 Jan 2023 14:52:44 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NxBhD10RHz4F3c for ; Tue, 17 Jan 2023 14:52:44 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPSA id 30HEqZcU045991 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Tue, 17 Jan 2023 09:52:42 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: Date: Tue, 17 Jan 2023 09:52:35 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Subject: Re: Which fonts have lesser-used UTF-8 characters? Content-Language: en-US To: freebsd-hackers@freebsd.org References: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> From: George Mitchell In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 X-Spam-Status: No, score=0.0 required=10.0 tests=HELO_NO_DOMAIN,NICE_REPLY_A autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mattapan.m5p.com X-Spamd-Result: default: False [-2.20 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; R_SPF_ALLOW(-0.20)[+a]; MIME_BASE64_TEXT(0.10)[]; MIME_GOOD(-0.10)[text/plain]; FROM_EQ_ENVFROM(0.00)[]; DMARC_NA(0.00)[m5p.com]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; R_DKIM_NA(0.00)[]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; TAGGED_FROM(0.00)[freebsd]; FROM_HAS_DN(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US] X-Rspamd-Queue-Id: 4NxBhD10RHz4F3c X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N T24gMS8xNi8yMyAyMjoxNCwgR2VvcmdlIE1pdGNoZWxsIHdyb3RlOg0KPiBPbiAxLzE2LzIz IDIxOjU5LCBHZW9yZ2UgTWl0Y2hlbGwgd3JvdGU6DQo+PiBGb3IgaW5zdGFuY2UsIEknbSBo YXBweSB0byByZXBvcnQgdGhhdCBCaXRzdHJlYW0gVmVyYSBTYW5zIE1vbm8gQm9sZCwNCj4+ IHdoaWNoIEkgdXNlIGluIHhmY2U0LXRlcm1pbmFsLCBoYXMgc3VjaCByZWxhdGl2ZSBvZGRp dGllcyBhcyDih5IgKFUrMjFkMiwNCj4+IHJpZ2h0d2FyZCBkb3VibGUgYXJyb3cpIGFuZCDi iaEgKFUrMjI2MSwgaWRlbnRpY2FsIHRvKSwgYXMgd2VsbCBhcyBVKzIzYjUsDQo+PiBib3R0 b20gc3F1YXJlIGJyYWNrZXQgLS0gd2hpY2ggaXNuJ3QgaW4gdGhlIEZpeGVkIFdpZHRoIGZv bnQgaW4gd2hpY2ggSQ0KPj4gYW0gY29tcG9zaW5nIHRoaXMgZW1haWwuwqAgQnV0IGhvdyB3 b3VsZCBJIGZpbmQgYSBmb250IHRoYXQgaGFzLCBsZXQncw0KPj4gc2F5LCBVKzFkNGRiLCBt YXRoZW1hdGljYWwgYm9sZCBzY3JpcHQgY2FwaXRhbCBMP8KgIElzIHRoZXJlIGEgZm9udA0K Pj4gY2hhcmFjdGVyIHNlYXJjaCB0b29sIHRoYXQga25vd3MgVVRGLTggY29kZSBwb2ludHM/ wqDCoMKgwqDCoMKgwqDCoCAtLSBHZW9yZ2UNCj4gDQo+IEFmdGVyIHNvbWUgcmVzZWFyY2gg d2l0aCBweXBpLm9yZyBhbmQgL3Vzci9wb3J0cywgaXQgbG9va3MgbGlrZSBtYXliZQ0KPiBw cmludC9weS1mb250YWluZSBpcyB3aGF0IEkgd2FudCwgb3IgbWF5YmUgcHJpbnQvcHktZm9u dHRvb2xzLsKgIFNvcnJ5DQo+IGZvciB0aGUgbm9pc2UgLi4uwqDCoMKgwqDCoMKgwqDCoMKg wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg wqDCoMKgwqDCoMKgwqDCoCAtLSBHZW9yZ2UNCg0KQW5kIG9kZGx5LCBNb3VzZXBhZCdzIGRl ZmF1bHQgZm9udCwgYmxhbmRseSBjYWxsZWQgTW9ub3NwYWNlIFJlZ3VsYXIsDQpoYXMgYWxs IHRoZSBjb2RlIHBvaW50cyBJIGN1cnJlbnRseSBuZWVkLiAgRXZlbiBtb3JlIG9kZGx5LCBU aHVuZGVyYmlyZA0KZG9lc24ndCBhZG1pdCB0aGF0IE1vbm9zcGFjZSBSZWd1bGFyIGV4aXN0 cy4gICAgICAgICAgICAgICAgICAtLSBHZW9yZ2UNCg== From nobody Tue Jan 17 15:41:08 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NxCm60sCnz2sbh1 for ; Tue, 17 Jan 2023 15:41:10 +0000 (UTC) (envelope-from theraven@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NxCm60RPwz4Kpy for ; Tue, 17 Jan 2023 15:41:10 +0000 (UTC) (envelope-from theraven@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1673970070; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=XQnARCMvVRW3SIAaLWWmLtQpTwu5NAbVg4eyR7+itQw=; b=C/A74Fe5GTc7eq71UjXYbvqB5TlCXsJadOYiNwXbE+azyYy4k84b6DqKSCEdo0ObvR9wC7 tEqZ7gF2zl9eQw8ngazU804LQBHiieTZZauvr47bnl77wRRNwOa07U99aNFwB/VzYYi4qG hsTz3xbQ7LR2IdWqrxOfYbgcu/F7E1P9qL/xbtd4oS9DEg1oS8qimD8gOLhoXXRvl+9Cq+ 05r22C3n/2VKSXdK+9cFMPiE+CmPVntC2cvGSLS8fxSo0TjvHM6+ovwl9jjmKUAHoyikFa Ok8VJYl9sTbFTjPNLizH8dyHEGe0/RlNdRhEYjktidhdse9GcGp0R54xVphf+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1673970070; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=XQnARCMvVRW3SIAaLWWmLtQpTwu5NAbVg4eyR7+itQw=; b=WHelSQtLIg7BEI5eVfCNL06DANpTEJ1hI5IeyoMh9jaD/5RENzOnfnAgDgdVnqNh8Nz9vc Ub5Ekpn4Hc+pgtD3I8zxIrce+xWttks52ifpicTB6OVy2GYBQH+Sfln9huyOY8kwvh9cUq Jv8O28kvU8KGgrWjY7oraPEYvP/Tfek3QbSjfXrU8+IWKkZvio+TKxw+pfUT5Zn2HkgRla opds411Qvd9vv35V+BuSbilpAsrexsYB187b7WrFGoF+RxYplJZPcSo/B1SjlC1mNEHDQw dwBmdb0qeeKknwmuMJeutzxVHYcrMxlAHuGdSgY0Jk3R69rUeKO2o7VNdUjQ0w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1673970070; a=rsa-sha256; cv=none; b=ffu0OqQPbW+OXIN+RNEbCL9dvG1lUG+iC4od5j6GgL16hvKsCl7pBB3IP+wryQe3RT5UuT BRgaB9d1FdicCPKNLFM9Hlix+fiRD3sN/MDu3MKx1p6phdi+J/K35cEN1C+HSs0ZEbnl1S 3BWgIoJ4dUvpu6FB71j2g3jRJjBBhl1RREZYEzq7UsuJyQqtjjxYG8RpGWiNW4oPH7vtx0 xpUISsrsUFf9ybto9S+PZcsswv+m12p3laGrVqWHGbL/TW6aoqIVIZRzxcHHlIJ7HGdipU QhhL86V8lo7B4D6dBCftFdGLzaSe1wfJ1nKKQhWK4y/fd58eIx7QEyPnjSSEXg== Received: from smtp.theravensnest.org (smtp.theravensnest.org [45.77.103.195]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: theraven) by smtp.freebsd.org (Postfix) with ESMTPSA id 4NxCm56ZXKzvHy for ; Tue, 17 Jan 2023 15:41:09 +0000 (UTC) (envelope-from theraven@FreeBSD.org) Received: from [192.168.1.202] (host31-51-178-9.range31-51.btcentralplus.com [31.51.178.9]) by smtp.theravensnest.org (Postfix) with ESMTPSA id 2D0FE1759 for ; Tue, 17 Jan 2023 15:41:09 +0000 (GMT) Message-ID: <76f88f19-0797-0af9-cefd-cb8656e71cf9@FreeBSD.org> Date: Tue, 17 Jan 2023 15:41:08 +0000 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: Which fonts have lesser-used UTF-8 characters? To: freebsd-hackers@freebsd.org References: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> Content-Language: en-GB From: David Chisnall In-Reply-To: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-ThisMailContainsUnwantedMimeParts: N On 17/01/2023 02:59, George Mitchell wrote: > For instance, I'm happy to report that Bitstream Vera Sans Mono Bold, > which I use in xfce4-terminal, has such relative oddities as ⇒ (U+21d2, > rightward double arrow) and ≡ (U+2261, identical to), as well as U+23b5, > bottom square bracket -- which isn't in the Fixed Width font in which I > am composing this email.  But how would I find a font that has, let's > say, U+1d4db, mathematical bold script capital L?  Is there a font > character search tool that knows UTF-8 code points?         -- George Google publishes a no-tofu font family, including a mono version: https://fonts.google.com/noto/specimen/Noto+Sans+Mono These have a glyph for every unicode code point and are designed to be used as fall-back for when the selected font does not have a glyph (and would otherwise give blank rectangles: 'tofu') David From nobody Tue Jan 17 17:49:18 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NxGcL1Rn5z2stXd for ; Tue, 17 Jan 2023 17:49:38 +0000 (UTC) (envelope-from david@crossfamilyweb.com) Received: from mail.dcrosstech.com (rrcs-24-97-5-251.nys.biz.rr.com [24.97.5.251]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail.dcrosstech.com", Issuer "DCrossTech.com LLC CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NxGcJ61yRz3Py4 for ; Tue, 17 Jan 2023 17:49:36 +0000 (UTC) (envelope-from david@crossfamilyweb.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of david@crossfamilyweb.com designates 24.97.5.251 as permitted sender) smtp.mailfrom=david@crossfamilyweb.com; dmarc=none X-Virus-Scanned: amavisd-new at dcrosstech.com Received: from [10.1.12.130] (d130.office.dcrosstech.com [10.1.12.130]) (authenticated bits=0) by mail.dcrosstech.com (8.15.2/8.15.2) with ESMTPSA id 30HHnI7R015591 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Tue, 17 Jan 2023 17:49:19 GMT (envelope-from david@crossfamilyweb.com) X-Authentication-Warning: mail.priv.dcrosstech.com: Host d130.office.dcrosstech.com [10.1.12.130] claimed to be [10.1.12.130] Message-ID: Date: Tue, 17 Jan 2023 12:49:18 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Content-Language: en-US To: FreeBSD Hackers From: "David E. Cross" Subject: review D38047 for fixes to NSS subsystem Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spamd-Result: default: False [-3.30 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:11351, ipnet:24.97.0.0/16, country:US]; MIME_TRACE(0.00)[0:+]; TO_DN_ALL(0.00)[]; DMARC_NA(0.00)[crossfamilyweb.com]; RCPT_COUNT_ONE(0.00)[1]; FROM_HAS_DN(0.00)[]; FREEFALL_USER(0.00)[david]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; MID_RHS_MATCH_FROM(0.00)[]; HAS_XAW(0.00)[]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4NxGcJ61yRz3Py4 X-Spamd-Bar: --- X-ThisMailContainsUnwantedMimeParts: N Hello, It's been awhile since I was able to contribute in bulk, and looking to fix that, but I may be out of touch with current procedures (last had my commit bit back in ~2003 ish) I have put up for review at https://reviews.freebsd.org/D38047 numerous fixes for the NSS subsystem around caching.  I'd love to get these in to -CURRENT and then into 13.2. Eager to hear any comments on this. Thanks! From nobody Tue Jan 17 17:51:32 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NxGfj5cprz2sttS for ; Tue, 17 Jan 2023 17:51:41 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NxGfh5KgBz3QvS for ; Tue, 17 Jan 2023 17:51:40 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPSA id 30HHpWQn047510 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Tue, 17 Jan 2023 12:51:39 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: <16a4b5c8-c15a-15b9-f9e5-d13f783f888a@m5p.com> Date: Tue, 17 Jan 2023 12:51:32 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Subject: Re: Which fonts have lesser-used UTF-8 characters? Content-Language: en-US To: FreeBSD Hackers References: <46d5a32a-f94d-f72d-6cf0-a213c9e60932@m5p.com> <76f88f19-0797-0af9-cefd-cb8656e71cf9@FreeBSD.org> From: George Mitchell In-Reply-To: <76f88f19-0797-0af9-cefd-cb8656e71cf9@FreeBSD.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.0 required=10.0 tests=HELO_NO_DOMAIN,NICE_REPLY_A autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mattapan.m5p.com X-Spamd-Result: default: False [-2.30 / 15.00]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; MLMMJ_DEST(0.00)[freebsd-hackers@FreeBSD.org]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US]; TO_DN_ALL(0.00)[]; DMARC_NA(0.00)[m5p.com]; RCPT_COUNT_ONE(0.00)[1]; FROM_HAS_DN(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; TAGGED_FROM(0.00)[freebsd] X-Rspamd-Queue-Id: 4NxGfh5KgBz3QvS X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N On 1/17/23 10:41, David Chisnall wrote: > On 17/01/2023 02:59, George Mitchell wrote: >> For instance, I'm happy to report that Bitstream Vera Sans Mono Bold, >> which I use in xfce4-terminal, has such relative oddities as ⇒ (U+21d2, >> rightward double arrow) and ≡ (U+2261, identical to), as well as U+23b5, >> bottom square bracket -- which isn't in the Fixed Width font in which I >> am composing this email.  But how would I find a font that has, let's >> say, U+1d4db, mathematical bold script capital L?  Is there a font >> character search tool that knows UTF-8 code points?         -- George > > > Google publishes a no-tofu font family, including a mono version: > > https://fonts.google.com/noto/specimen/Noto+Sans+Mono > > These have a glyph for every unicode code point and are designed to be > used as fall-back for when the selected font does not have a glyph (and > would otherwise give blank rectangles: 'tofu') > > David Hmm, 𝓘I have that font installed, and it works in Mousepad, but Thunderbird seems unable to avail itself of all the code points. Fortunately, I don't need to put these characters in email very often. (In fact, never, until yesterday!) -- George From nobody Tue Jan 17 17:54:11 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NxGjq6tJ7z2svQL for ; Tue, 17 Jan 2023 17:54:23 +0000 (UTC) (envelope-from david@crossfamilyweb.com) Received: from mail.dcrosstech.com (rrcs-24-97-5-251.nys.biz.rr.com [24.97.5.251]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail.dcrosstech.com", Issuer "DCrossTech.com LLC CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NxGjq03wmz3hnV for ; Tue, 17 Jan 2023 17:54:22 +0000 (UTC) (envelope-from david@crossfamilyweb.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of david@crossfamilyweb.com designates 24.97.5.251 as permitted sender) smtp.mailfrom=david@crossfamilyweb.com; dmarc=none X-Virus-Scanned: amavisd-new at dcrosstech.com Received: from [10.1.12.130] (d130.office.dcrosstech.com [10.1.12.130]) (authenticated bits=0) by mail.dcrosstech.com (8.15.2/8.15.2) with ESMTPSA id 30HHsBRc016156 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Tue, 17 Jan 2023 17:54:12 GMT (envelope-from david@crossfamilyweb.com) X-Authentication-Warning: mail.priv.dcrosstech.com: Host d130.office.dcrosstech.com [10.1.12.130] claimed to be [10.1.12.130] Content-Type: multipart/mixed; boundary="------------mTZOvfcS9s08MedTDy097KQ6" Message-ID: Date: Tue, 17 Jan 2023 12:54:11 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Content-Language: en-US To: FreeBSD Hackers From: "David E. Cross" Subject: ...tales of lost ENs. X-Spamd-Result: default: False [-2.20 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; MIME_BASE64_TEXT_BOGUS(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+mx:c]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; MIME_BASE64_TEXT(0.10)[]; FREEFALL_USER(0.00)[david]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; DMARC_NA(0.00)[crossfamilyweb.com]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_DN_ALL(0.00)[]; HAS_XAW(0.00)[]; HAS_ATTACHMENT(0.00)[]; ARC_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:+,4:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:11351, ipnet:24.97.0.0/16, country:US]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4NxGjq03wmz3hnV X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N This is a multi-part message in MIME format. --------------mTZOvfcS9s08MedTDy097KQ6 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit So, many (many) months ago I complained about 'missing' ENs. I was then told that no EN had ever been filed (which since I was asking about bug reports I had seen listed by other people never occurred to me that it hadn't been done). I then submitted 3 ENs (date on the files is Aug 30, 2022) Then yet another person commented about one of those bugs in a new release (12.x) that never got fixed. I then posted all 3 ENs, this time publically. I have not seen any mention of these; how do I nudge these along?  (re-attached for visibility, they are out of date since at least one now affects 12.x because it sat so long) --------------mTZOvfcS9s08MedTDy097KQ6 Content-Type: text/plain; charset=UTF-8; name="libstand.txt" Content-Disposition: attachment; filename="libstand.txt" Content-Transfer-Encoding: base64 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT0KRnJlZUJTRC1FTi1FUlJBVEFfVEVNUExBVEUgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEVycmF0YSBOb3RpY2UKICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFRo ZSBGcmVlQlNEIFByb2plY3QKClRvcGljOgoKQ2F0ZWdvcnk6ICAgICAgIGNvcmUKTW9kdWxl OiAgICAgICAgIGxvYWRlcgpBbm5vdW5jZWQ6ICAgICAgMjAyMi1YWC1YWApDcmVkaXRzOgpB ZmZlY3RzOiAgICAgICAgRnJlZUJTRCAxMy4xCkNvcnJlY3RlZDogICAgICA/Pz8/CgpGb3Ig Z2VuZXJhbCBpbmZvcm1hdGlvbiByZWdhcmRpbmcgRnJlZUJTRCBFcnJhdGEgTm90aWNlcyBh bmQgU2VjdXJpdHkKQWR2aXNvcmllcywgaW5jbHVkaW5nIGRlc2NyaXB0aW9ucyBvZiB0aGUg ZmllbGRzIGFib3ZlLCBzZWN1cml0eQpicmFuY2hlcywgYW5kIHRoZSBmb2xsb3dpbmcgc2Vj dGlvbnMsIHBsZWFzZSB2aXNpdAo8VVJMOmh0dHBzOi8vc2VjdXJpdHkuRnJlZUJTRC5vcmcv Pi4KCkkuICAgQmFja2dyb3VuZAoKZ2VsaSBpcyBhbiBlbmNycHl0aW9uIGNvbXBvbmVudCBv ZiB0aGUgR0VPTSBzdWJzeXN0ZW0gb2YgRnJlZUJTRCB0aGF0CmFsbG93cyBwYXJ0aXRpb25z IG9yIGRpc2tzIHRvIGJlIGVuY3J5cHRlZC4gIEJvdGggdGhlIGtlcm5lbCBhbmQgbG9hZGVy KDgpCmhhdmUgc3VwcG9ydCB0byBhbGxvdyBib290aW5nIGZyb20gZW5jcnlwdGVkIGRpc2tz IGFuZCBwcm9tcHRpbmcgZm9yIGEKcGFzc3dvcmQgYXQgYm9vdCB0aW1lLgoKSUkuICBQcm9i bGVtIERlc2NyaXB0aW9uCgpBIGNoYW5nZSB0byBsaWJzdGFuZCgzKSBzb21ldGltZSBiZXR3 ZWVuIDEzLjAgYW5kIDEzLjEgcHJldmVudHMgbG9hZGVyIGZyb20KcmVjb2duaXppbmcgdGhl IHBhcnRpdGlvbiBhZnRlciB0aGUgYnVpbHQgaW4gZ2VsaSBkcml2ZXIgaGFzIGF0dGFjaGVk IHRoZQpwYXJ0aXRpb24gLCBwcmV2ZW50aW5nIGF1dG8gYm9vdGluZyBvZiBlbmNyeXB0ZWQg cm9vdCBwYXJ0aXRpb25zLgoKVGhpcyBidWcgd2FzIHRyYWNrZWQgYXQ6Cmh0dHBzOi8vYnVn cy5mcmVlYnNkLm9yZy9idWd6aWxsYS9zaG93X2J1Zy5jZ2k/aWQ9MjY0MjgyCgoKSUlJLiBJ bXBhY3QKClN5c3RlbXMgcnVubmluZyAxMy4xIHdpdGggZW5jcnlwdGVkIHJvb3QgZGlza3Mg d2lsbCBub3QgYXV0b2Jvb3QuCgpJVi4gIFdvcmthcm91bmQKClN5c3RlbXMgYWZmZWN0ZWQg bWF5IHJldmVydCB0byBsb2FkZXIoOCkgZnJvbSAxMy4wLiAgQWRkaXRpb25hbGx5CnNldHRp bmcgY3VycmRldiBhbmQgcm9vdGRldiB0byB0aGUgY29ycmVjdCBwYXJ0aXRpb24gbWFudWFs bHkgd2lsbAphbGxvdyBib290aW5nIG9mIHRoZSBzeXN0ZW0uCgpTeXN0ZW1zIHdpdGhvdXQg Z2VsaSByb290IGRpc2sgZW5jcnlwdGlvbiBhcmUgdW5hZmZlY3RlZC4KClYuICAgU29sdXRp b24KClBBVENICgpVcGdyYWRlIHlvdXIgc3lzdGVtIHRvIGEgc3VwcG9ydGVkIEZyZWVCU0Qg c3RhYmxlIG9yIHJlbGVhc2UgLyBzZWN1cml0eQpicmFuY2ggKHJlbGVuZykgZGF0ZWQgYWZ0 ZXIgdGhlIGNvcnJlY3Rpb24gZGF0ZS4KW1hYIE5lZWRzIHJlYm9vdD8gTWVudGlvbiBwbGVh c2VdCgpQZXJmb3JtIG9uZSBvZiB0aGUgZm9sbG93aW5nOgoKMSkgVG8gdXBkYXRlIHlvdXIg c3lzdGVtIHZpYSBhIGJpbmFyeSBwYXRjaDoKClN5c3RlbXMgcnVubmluZyBhIFJFTEVBU0Ug dmVyc2lvbiBvZiBGcmVlQlNEIG9uIHRoZSBhbWQ2NCwgaTM4Niwgb3IKKG9uIEZyZWVCU0Qg MTMgYW5kIGxhdGVyKSBhcm02NCBwbGF0Zm9ybXMgY2FuIGJlIHVwZGF0ZWQgdmlhIHRoZQpm cmVlYnNkLXVwZGF0ZSg4KSB1dGlsaXR5OgoKIyBmcmVlYnNkLXVwZGF0ZSBmZXRjaAojIGZy ZWVic2QtdXBkYXRlIGluc3RhbGwKCioqKiBSZWJvb3QgbmVlZGVkIHRvIHZhbGlkYXRlIGZp eCAqKioKCjIpIFRvIHVwZGF0ZSB5b3VyIHN5c3RlbSB2aWEgYSBzb3VyY2UgY29kZSBwYXRj aDoKClRoZSBmb2xsb3dpbmcgcGF0Y2hlcyBoYXZlIGJlZW4gdmVyaWZpZWQgdG8gYXBwbHkg dG8gdGhlIGFwcGxpY2FibGUKRnJlZUJTRCByZWxlYXNlIGJyYW5jaGVzLgoKYSkgRG93bmxv YWQgdGhlIHJlbGV2YW50IHBhdGNoIGZyb20gdGhlIGxvY2F0aW9uIGJlbG93LCBhbmQgdmVy aWZ5IHRoZQpkZXRhY2hlZCBQR1Agc2lnbmF0dXJlIHVzaW5nIHlvdXIgUEdQIHV0aWxpdHku CgpbRnJlZUJTRCAxMy4xXQojIGZldGNoIGh0dHBzOi8vc2VjdXJpdHkuRnJlZUJTRC5vcmcv cGF0Y2hlcy9FTi1YWDpYWC9YWFhYLnBhdGNoCiMgZmV0Y2ggaHR0cHM6Ly9zZWN1cml0eS5G cmVlQlNELm9yZy9wYXRjaGVzL0VOLVhYOlhYL1hYWFgucGF0Y2guYXNjCiMgZ3BnIC0tdmVy aWZ5IFhYWFgucGF0Y2guYXNjCgpiKSBBcHBseSB0aGUgcGF0Y2guICBFeGVjdXRlIHRoZSBm b2xsb3dpbmcgY29tbWFuZHMgYXMgcm9vdDoKCiMgY2QgL3Vzci9zcmMKIyBwYXRjaCA8IC9w YXRoL3RvL3BhdGNoCgo8Zm9yIGEgdXNlcmxhbmQgdXRpbGl0eTo+CgpjKSBSZWNvbXBpbGUg dGhlIG9wZXJhdGluZyBzeXN0ZW0gdXNpbmcgYnVpbGR3b3JsZCBhbmQgaW5zdGFsbHdvcmxk IGFzCmRlc2NyaWJlZCBpbiA8VVJMOmh0dHBzOi8vd3d3LkZyZWVCU0Qub3JnL2hhbmRib29r L21ha2V3b3JsZC5odG1sPi4KClZJLiAgQ29ycmVjdGlvbiBkZXRhaWxzCgpUaGlzIGlzc3Vl IGlzIGNvcnJlY3RlZCBieSB0aGUgY29ycmVzcG9uZGluZyBHaXQgY29tbWl0IGhhc2ggb3Ig U3VidmVyc2lvbgpyZXZpc2lvbiBudW1iZXIgaW4gdGhlIGZvbGxvd2luZyBzdGFibGUgYW5k IHJlbGVhc2UgYnJhbmNoZXM6CgpCcmFuY2gvcGF0aCAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgSGFzaCAgICAgICAgICAgICAgICAgICAgIFJldmlzaW9uCi0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0Kc3RhYmxlLzEzLyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFhYWFhYWFhY WFhYWCAgICBzdGFibGUvMTMtblhYWFhYWApyZWxlbmcvMTMuMS8gICAgICAgICAgICAgICAg ICAgICAgICAgICAgWFhYWFhYWFhYWFhYICByZWxlbmcvMTMuMS1uWFhYWFhYCi0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0KCkZvciBGcmVlQlNEIDEzIGFuZCBsYXRlcjoKClJ1biB0aGUgZm9sbG93 aW5nIGNvbW1hbmQgdG8gc2VlIHdoaWNoIGZpbGVzIHdlcmUgbW9kaWZpZWQgYnkgYQpwYXJ0 aWN1bGFyIGNvbW1pdDoKCiMgZ2l0IHNob3cgLS1zdGF0IDxjb21taXQgaGFzaD4KCk9yIHZp c2l0IHRoZSBmb2xsb3dpbmcgVVJMLCByZXBsYWNpbmcgTk5OTk5OIHdpdGggdGhlIGhhc2g6 Cgo8VVJMOmh0dHBzOi8vY2dpdC5mcmVlYnNkLm9yZy9zcmMvY29tbWl0Lz9pZD1OTk5OTk4+ CgpUbyBkZXRlcm1pbmUgdGhlIGNvbW1pdCBjb3VudCBpbiBhIHdvcmtpbmcgdHJlZSAoZm9y IGNvbXBhcmlzb24gYWdhaW5zdApuTk5OTk5OIGluIHRoZSB0YWJsZSBhYm92ZSksIHJ1bjoK CiMgZ2l0IHJldi1saXN0IC0tY291bnQgLS1maXJzdC1wYXJlbnQgSEVBRAoKVklJLiBSZWZl cmVuY2VzCgo8b3RoZXIgaW5mbyBvbiB0aGUgcHJvYmxlbT4KCjxVUkw6aHR0cHM6Ly9idWdz LmZyZWVic2Qub3JnL2J1Z3ppbGxhL3Nob3dfYnVnLmNnaT9pZD1YWFhYWFg+CgpUaGUgbGF0 ZXN0IHJldmlzaW9uIG9mIHRoaXMgYWR2aXNvcnkgaXMgYXZhaWxhYmxlIGF0CjxVUkw6aHR0 cHM6Ly9zZWN1cml0eS5GcmVlQlNELm9yZy9hZHZpc29yaWVzL0ZyZWVCU0QtRU4tWFg6WFgu WFhYWFguYXNjPgo= --------------mTZOvfcS9s08MedTDy097KQ6 Content-Type: text/plain; charset=UTF-8; name="llvm.txt" Content-Disposition: attachment; filename="llvm.txt" Content-Transfer-Encoding: base64 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT0KRnJlZUJTRC1FTi1FUlJBVEFfVEVNUExBVEUgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEVycmF0YSBOb3RpY2UKICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFRo ZSBGcmVlQlNEIFByb2plY3QKClRvcGljOgoKQ2F0ZWdvcnk6ICAgICAgIGNvcmUKTW9kdWxl OiAgICAgICAgIExMVk0KQW5ub3VuY2VkOiAgICAgIDIwMjItWFgtWFgKQ3JlZGl0czoKQWZm ZWN0czogICAgICAgIFVuc3VyZT8gIDEzLjEgZGVmaW5pdGVseSwgYnVnIHJlcG9ydCByZWZl cmVuY2VzIDEyLngKCQlidXQgdW5zdXJlIGlmIHRoYXQgbWFkZSBpdCB0byBhIC1SRUxFQVNF CkNvcnJlY3RlZDogICAgICAyMDIyLVhYLVhYIFhYOlhYOlhYIFVUQyAoc3RhYmxlLzEzLCAx My4xLVNUQUJMRSkKICAgICAgICAgICAgICAgIDIwMjItWFgtWFggWFg6WFg6WFggVVRDIChy ZWxlbmcvMTMuMSwgMTMuMS1SRUxFQVNFLXBYWCkKICAgICAgICAgICAgICAgIDIwMjItWFgt WFggWFg6WFg6WFggVVRDIChyZWxlbmcvMTMuMCwgMTMuMC1SRUxFQVNFLXBYWCkKICAgICAg ICAgICAgICAgIDIwMjItWFgtWFggWFg6WFg6WFggVVRDIChzdGFibGUvMTIsIDEyLjMtU1RB QkxFKQogICAgICAgICAgICAgICAgMjAyMi1YWC1YWCBYWDpYWDpYWCBVVEMgKHJlbGVuZy8x Mi4zLCAxMi4zLVJFTEVBU0UpCgpGb3IgZ2VuZXJhbCBpbmZvcm1hdGlvbiByZWdhcmRpbmcg RnJlZUJTRCBFcnJhdGEgTm90aWNlcyBhbmQgU2VjdXJpdHkKQWR2aXNvcmllcywgaW5jbHVk aW5nIGRlc2NyaXB0aW9ucyBvZiB0aGUgZmllbGRzIGFib3ZlLCBzZWN1cml0eQpicmFuY2hl cywgYW5kIHRoZSBmb2xsb3dpbmcgc2VjdGlvbnMsIHBsZWFzZSB2aXNpdAo8VVJMOmh0dHBz Oi8vc2VjdXJpdHkuRnJlZUJTRC5vcmcvPi4KCkkuICAgQmFja2dyb3VuZAoKTExWTSBpcyBh IHRoaXJkIHBhcnR5IGNvbXBpbGVyIHRoYXQgaXMgZGlzdHJpYnV0ZWQgYXMgcGFydCBvZiBi YXNlLgpGcmVlQlNEIHVzZXMgdGhpcyBjb21waWxlciB0byBjb252ZXJ0IHNvdXJjZSBjb2Rl IHRvIHN5c3RlbSBvYmplY3QgY29kZSAKZm9yIHRoZSBrZXJuZWwsIGxpYnJhcmllcywgc3lz dGVtIHV0aWxpdGllcywgYW5kIHBvcnRzLgoKQVZYIGlzIGEgc2V0IG9mIGluc3RydWN0aW9u cyBvbiBJbnRlbCBwcm9jZXNzb3JzIHRoYXQgc3BlZWQgY2VydGFpbgp2ZWN0b3IgY29tcHV0 aW5nIG9wZXJhdGlvbnMuICBBVlgtNTEyIGlzIGEgc3BlY2lmaWMgdmVyc2lvbiBvZiB0aGVz ZQppbnN0cnVjdGlvbnMgYXZhaWxhYmxlIG9uIHNwZWNpZmljIENQVXMuCgpJSS4gIFByb2Js ZW0gRGVzY3JpcHRpb24KCkZyZWVCU0QgYW5kIExMVk0gYWxsb3cgdmFyaW91cyBvcHRpb25z IHRvIGJlIHNldCB0byB0YWlsb3IgdGhlIHN5c3RlbSAKdG8gc3BlY2lmaWMgZW52aXJvbm1l bnRzIGJ5IHNldHRpbmcgYnVpbGQgcGFyYW1ldGVycyB0aGF0IGFmZmVjdCBsaW5raW5nLApv cHRpbWl6YXRpb24sIGFuZCB0YXJnZXQgQ1BVLiAgVGhlIHZlcnNpb24gb2YgTExWTSBpbmNs dWRlZCB3aXRoIApGcmVlQlNEIDEzLjEgKGFuZCBtYXliZSAxMi54PykgaW5jbHVkZXMgYSBi dWcgd2l0aCBjZXJ0YWluIHRhcmdldCBDUFVzCnVzaW5nIEFWWC01MTIgaW5zdHJ1Y3Rpb25z IHRoYXQgY2F1c2VzIHRoZSBjb21waWxlciB0byBlbnRlciBhbiBpbmZpbml0ZQpsb29wLCBl dmVudHVhbGx5IHRlcm1pbmF0aW5nIHdoZW4gaXQgaGFzIHVzZWQgYWxsIGF2YWlsYWJsZSBt ZW1vcnkuCgpJSUkuIEltcGFjdAoKV2hlbiBjb21waWxpbmcgY2VydGFpbiBsaWJyYXJpZXMg b3IgYXBwbGljYXRpb25zIHdpdGggdGhlIHN5c3RlbSBMTFZNIAppbiAxMy4xIChhbmQgbWF5 YmUgMTIueD8pIHRoZSBjb21waWxlciB3aWxsIGhhbmcuCgpJVi4gIFdvcmthcm91bmQKClJl bW92aW5nIHRoZSBDUFVUWVBFIG9wdGlvbiBmcm9tIC9ldGMvbWFrZS5jb25mLCBvciBieSBz ZXR0aW5nIGl0IHRvIGEKQ1BVVFlQRSB0aGF0IGRvZXMgbm90IGhhdmUgQVZYNTEyIHdpbGwg cHJldmVudCB0aGUgaW5maW5pdGUgbG9vcC4KClNldHRpbiB0aGUgQ1BVVFlQRSBpcyBhIG5v bi1kZWZhdWx0IHNldHRpbmcsIHN5c3RlbXMgdXNpbmcgZGVmYXVsdApjb25maWd1cmF0aW9u cyBhcmUgdW5hZmZlY3RlZC4KClYuICAgU29sdXRpb24KClBhdGNoIGZyb20gOiBodHRwczov L2J1Z3MuZnJlZWJzZC5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dpP2lkPTI2NDM5NAoKVXBn cmFkZSB5b3VyIHN5c3RlbSB0byBhIHN1cHBvcnRlZCBGcmVlQlNEIHN0YWJsZSBvciByZWxl YXNlIC8gc2VjdXJpdHkKYnJhbmNoIChyZWxlbmcpIGRhdGVkIGFmdGVyIHRoZSBjb3JyZWN0 aW9uIGRhdGUuCltYWCBOZWVkcyByZWJvb3Q/IE1lbnRpb24gcGxlYXNlXQoKUGVyZm9ybSBv bmUgb2YgdGhlIGZvbGxvd2luZzoKCjEpIFRvIHVwZGF0ZSB5b3VyIHN5c3RlbSB2aWEgYSBi aW5hcnkgcGF0Y2g6CgpTeXN0ZW1zIHJ1bm5pbmcgYSBSRUxFQVNFIHZlcnNpb24gb2YgRnJl ZUJTRCBvbiB0aGUgYW1kNjQsIGkzODYsIG9yCihvbiBGcmVlQlNEIDEzIGFuZCBsYXRlcikg YXJtNjQgcGxhdGZvcm1zIGNhbiBiZSB1cGRhdGVkIHZpYSB0aGUKZnJlZWJzZC11cGRhdGUo OCkgdXRpbGl0eToKCiMgZnJlZWJzZC11cGRhdGUgZmV0Y2gKIyBmcmVlYnNkLXVwZGF0ZSBp bnN0YWxsCltYWCBOZWVkcyByZWJvb3Q/IE1lbnRpb24gcGxlYXNlXQoKMikgVG8gdXBkYXRl IHlvdXIgc3lzdGVtIHZpYSBhIHNvdXJjZSBjb2RlIHBhdGNoOgoKVGhlIGZvbGxvd2luZyBw YXRjaGVzIGhhdmUgYmVlbiB2ZXJpZmllZCB0byBhcHBseSB0byB0aGUgYXBwbGljYWJsZQpG cmVlQlNEIHJlbGVhc2UgYnJhbmNoZXMuCgphKSBEb3dubG9hZCB0aGUgcmVsZXZhbnQgcGF0 Y2ggZnJvbSB0aGUgbG9jYXRpb24gYmVsb3csIGFuZCB2ZXJpZnkgdGhlCmRldGFjaGVkIFBH UCBzaWduYXR1cmUgdXNpbmcgeW91ciBQR1AgdXRpbGl0eS4KCltGcmVlQlNEIDEzLjFdCgpi KSBBcHBseSB0aGUgcGF0Y2guICBFeGVjdXRlIHRoZSBmb2xsb3dpbmcgY29tbWFuZHMgYXMg cm9vdDoKCiMgY2QgL3Vzci9zcmMKIyBwYXRjaCA8IC9wYXRoL3RvL3BhdGNoCgo8Zm9yIGEg dXNlcmxhbmQgdXRpbGl0eTo+CgpjKSBSZWNvbXBpbGUgdGhlIG9wZXJhdGluZyBzeXN0ZW0g dXNpbmcgYnVpbGR3b3JsZCBhbmQgaW5zdGFsbHdvcmxkIGFzCmRlc2NyaWJlZCBpbiA8VVJM Omh0dHBzOi8vd3d3LkZyZWVCU0Qub3JnL2hhbmRib29rL21ha2V3b3JsZC5odG1sPi4KClZJ LiAgQ29ycmVjdGlvbiBkZXRhaWxzCgpUaGlzIGlzc3VlIGlzIGNvcnJlY3RlZCBieSB0aGUg Y29ycmVzcG9uZGluZyBHaXQgY29tbWl0IGhhc2ggb3IgU3VidmVyc2lvbgpyZXZpc2lvbiBu dW1iZXIgaW4gdGhlIGZvbGxvd2luZyBzdGFibGUgYW5kIHJlbGVhc2UgYnJhbmNoZXM6CgpC cmFuY2gvcGF0aCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSGFzaCAgICAgICAgICAg ICAgICAgICAgIFJldmlzaW9uCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0Kc3RhYmxlLzEzLyAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgIFhYWFhYWFhYWFhYWCAgICBzdGFibGUvMTMtblhY WFhYWApyZWxlbmcvMTMuMS8gICAgICAgICAgICAgICAgICAgICAgICAgICAgWFhYWFhYWFhY WFhYICByZWxlbmcvMTMuMS1uWFhYWFhYCnJlbGVuZy8xMy4wLyAgICAgICAgICAgICAgICAg ICAgICAgICAgICBYWFhYWFhYWFhYWFggIHJlbGVuZy8xMy4wLW5YWFhYWFgKc3RhYmxlLzEy LyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgclhYWFhYWApyZWxlbmcvMTIuMy8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICByWFhYWFhYCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KCkZv ciBGcmVlQlNEIDEzIGFuZCBsYXRlcjoKClJ1biB0aGUgZm9sbG93aW5nIGNvbW1hbmQgdG8g c2VlIHdoaWNoIGZpbGVzIHdlcmUgbW9kaWZpZWQgYnkgYQpwYXJ0aWN1bGFyIGNvbW1pdDoK CiMgZ2l0IHNob3cgLS1zdGF0IDxjb21taXQgaGFzaD4KCk9yIHZpc2l0IHRoZSBmb2xsb3dp bmcgVVJMLCByZXBsYWNpbmcgTk5OTk5OIHdpdGggdGhlIGhhc2g6Cgo8VVJMOmh0dHBzOi8v Y2dpdC5mcmVlYnNkLm9yZy9zcmMvY29tbWl0Lz9pZD1OTk5OTk4+CgpUbyBkZXRlcm1pbmUg dGhlIGNvbW1pdCBjb3VudCBpbiBhIHdvcmtpbmcgdHJlZSAoZm9yIGNvbXBhcmlzb24gYWdh aW5zdApuTk5OTk5OIGluIHRoZSB0YWJsZSBhYm92ZSksIHJ1bjoKCiMgZ2l0IHJldi1saXN0 IC0tY291bnQgLS1maXJzdC1wYXJlbnQgSEVBRAoKRm9yIEZyZWVCU0QgMTIgYW5kIGVhcmxp ZXI6CgpSdW4gdGhlIGZvbGxvd2luZyBjb21tYW5kIHRvIHNlZSB3aGljaCBmaWxlcyB3ZXJl IG1vZGlmaWVkIGJ5IGEgcGFydGljdWxhcgpyZXZpc2lvbiwgcmVwbGFjaW5nIE5OTk5OTiB3 aXRoIHRoZSByZXZpc2lvbiBudW1iZXI6CgojIHN2biBkaWZmIC1jTk5OTk5OIC0tc3VtbWFy aXplIHN2bjovL3N2bi5mcmVlYnNkLm9yZy9iYXNlCgpPciB2aXNpdCB0aGUgZm9sbG93aW5n IFVSTCwgcmVwbGFjaW5nIE5OTk5OTiB3aXRoIHRoZSByZXZpc2lvbiBudW1iZXI6Cgo8VVJM Omh0dHBzOi8vc3Zud2ViLmZyZWVic2Qub3JnL2Jhc2U/dmlldz1yZXZpc2lvbiZyZXZpc2lv bj1OTk5OTk4+CgpWSUkuIFJlZmVyZW5jZXMKCjxvdGhlciBpbmZvIG9uIHRoZSBwcm9ibGVt PgoKPFVSTDpodHRwczovL2J1Z3MuZnJlZWJzZC5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dp P2lkPVhYWFhYWD4KClRoZSBsYXRlc3QgcmV2aXNpb24gb2YgdGhpcyBhZHZpc29yeSBpcyBh dmFpbGFibGUgYXQKPFVSTDpodHRwczovL3NlY3VyaXR5LkZyZWVCU0Qub3JnL2Fkdmlzb3Jp ZXMvRnJlZUJTRC1FTi1YWDpYWC5YWFhYWC5hc2M+Cg== --------------mTZOvfcS9s08MedTDy097KQ6 Content-Type: text/plain; charset=UTF-8; name="userboot.txt" Content-Disposition: attachment; filename="userboot.txt" Content-Transfer-Encoding: base64 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT0KRnJlZUJTRC1FTi1FUlJBVEFfVEVNUExBVEUgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEVycmF0YSBOb3RpY2UKICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFRo ZSBGcmVlQlNEIFByb2plY3QKClRvcGljOgoKQ2F0ZWdvcnk6ICAgICAgIGNvcmUKTW9kdWxl OiAgICAgICAgIGJoeXZlCkFubm91bmNlZDogICAgICAyMDIyLVhYLVhYCkNyZWRpdHM6CkFm ZmVjdHM6ICAgICAgICAxMy4xCkNvcnJlY3RlZDogICAgICAyMDIyLVhYLVhYIFhYOlhYOlhY IFVUQyAoc3RhYmxlLzEzLCAxMy4xLVNUQUJMRSkKICAgICAgICAgICAgICAgIDIwMjItWFgt WFggWFg6WFg6WFggVVRDIChyZWxlbmcvMTMuMSwgMTMuMS1SRUxFQVNFLXBYWCkKCkZvciBn ZW5lcmFsIGluZm9ybWF0aW9uIHJlZ2FyZGluZyBGcmVlQlNEIEVycmF0YSBOb3RpY2VzIGFu ZCBTZWN1cml0eQpBZHZpc29yaWVzLCBpbmNsdWRpbmcgZGVzY3JpcHRpb25zIG9mIHRoZSBm aWVsZHMgYWJvdmUsIHNlY3VyaXR5CmJyYW5jaGVzLCBhbmQgdGhlIGZvbGxvd2luZyBzZWN0 aW9ucywgcGxlYXNlIHZpc2l0CjxVUkw6aHR0cHM6Ly9zZWN1cml0eS5GcmVlQlNELm9yZy8+ LgoKSS4gICBCYWNrZ3JvdW5kCgpiaHl2ZSBpcyB0aGUgRnJlZUJTRCBoeXBlcnZpc29yLCBs b2FkZXIgaXMgdGhlIEZyZWVCU0QgYm9vdCBsb2FkZXIsCnVzZXJib290LnNvIGlzIGEgdmVy c2lvbiBvZiBsb2FkZXIgdGhhdCBydW5zIGluIHVzZXJsYW5kIGFzIHBhcnQgb2YgdGhlIApi aHl2ZWxvYWQgcHJvY2VzcyB0byBzZXR1cCB0aGUgYmh5dmUgZW52aXJvbmVtbnQgZm9yIGV4 ZWN1dGluZyBhIEZyZWVCU0QKZ3Vlc3Qgb3BlcmF0aW5nIHN5c3RlbSB1bmRlciBiaHl2ZS4K CkJJTkRfTk9XIGlzIGEgc3lzdGVtIGhhcmRlbmluZyBzZXR0aW5nIHRoYXQgbWFrZXMgY2Vy dGFpbiB0eXBlcyBvZgptZW1vcnkgY29ycnVwdGlvbiBtb3JlIGRpZmZpY3VsdC4KCklJLiAg UHJvYmxlbSBEZXNjcmlwdGlvbgoKQ29tcGlsaW5nIHRoZSB3b3JsZCB3aXRoIEJJTkRfTk9X IChhIG5vbi1kZWZhdWx0IG9wdGlvbikgcmVzdWx0cyBpbiBhCnZlcnNpb24gb2YgdXNlcmJv b3Quc28gdGhhdCB3aWxsIG5vdCBsaW5rIHdpdGggYmh5dmVsb2FkLCBwcmV2ZW50aW5nCnNl dHVwIGFuZCBleGVjdXRpb24gb2YgRnJlZUJTRCBiYXNlZCBndWVzdCBvcGVyYXRpbmcgc3lz dGVtcyB3aXRoIHRoZQpiaHl2ZSBWTS4KCklJSS4gSW1wYWN0CgpTeXN0ZW1zIHRoYXQgY2hv b3NlIHRoaXMgaGFyZGVuaW5nIG9wdGlvbiBhcmUgdW5hYmxlIHRvIHJ1biB0aGUgZGVmYXVs dAp0eXBlIG9mIEZyZWVCU0QgVk0gdW5kZXIgYmh5dmUuCgpJVi4gIFdvcmthcm91bmQKCk11 bHRpcGxlIHdvcmthcm91bmRzIGV4aXN0LgogYSkgUmVtb3ZpbmcgQklORF9OT1cgZnJvbSBz eXN0ZW0gYnVpbGQgb3B0aW9ucyBpbiBzcmMuY29uZiBhbmQgcmVidWlsZGluZwogYikgdXNp bmcgVUVGSSBiYXNlZCBiaHl2ZSBWTXMgKG5vdCBhdmFpbGFibGUgb24gYWxsIGhhcmR3YXJl KQogYykgdXNpbmcgYSBkaWZmZXJlbnQgdmVyc2lvbiBvZiB1c2VyYm9vdC5zbyB2aWEgdGhl IC1sIG9wdGlvbiB0bwogICAgYmh5dmVsb2FkLiAgRm9yIGV4YW1wbGUgb25lIHNhdmVkIGlu IGFuIGFsdGVybmF0ZSBsb2NhdGlvbiBhZnRlciBhIGJ1aWxkCiAgICB3aXRob3V0IEJJTkRf Tk9XCgpWLiAgIFNvbHV0aW9uCgpBcHBseSBwYXRjaCBmcm9tOgpodHRwczovL2J1Z3MuZnJl ZWJzZC5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dpP2lkPTI2MjkyMAoKVXBncmFkZSB5b3Vy IHN5c3RlbSB0byBhIHN1cHBvcnRlZCBGcmVlQlNEIHN0YWJsZSBvciByZWxlYXNlIC8gc2Vj dXJpdHkKYnJhbmNoIChyZWxlbmcpIGRhdGVkIGFmdGVyIHRoZSBjb3JyZWN0aW9uIGRhdGUu CgpEb2VzIG5vdCBuZWVkIHJlYm9vdC4KClBlcmZvcm0gb25lIG9mIHRoZSBmb2xsb3dpbmc6 CgoxKSBUbyB1cGRhdGUgeW91ciBzeXN0ZW0gdmlhIGEgYmluYXJ5IHBhdGNoOgoKU3lzdGVt cyBydW5uaW5nIGEgUkVMRUFTRSB2ZXJzaW9uIG9mIEZyZWVCU0Qgb24gdGhlIGFtZDY0LCBp Mzg2LCBvcgoob24gRnJlZUJTRCAxMyBhbmQgbGF0ZXIpIGFybTY0IHBsYXRmb3JtcyBjYW4g YmUgdXBkYXRlZCB2aWEgdGhlCmZyZWVic2QtdXBkYXRlKDgpIHV0aWxpdHk6CgojIGZyZWVi c2QtdXBkYXRlIGZldGNoCiMgZnJlZWJzZC11cGRhdGUgaW5zdGFsbApbWFggTmVlZHMgcmVi b290PyBNZW50aW9uIHBsZWFzZV0KCjIpIFRvIHVwZGF0ZSB5b3VyIHN5c3RlbSB2aWEgYSBz b3VyY2UgY29kZSBwYXRjaDoKClRoZSBmb2xsb3dpbmcgcGF0Y2hlcyBoYXZlIGJlZW4gdmVy aWZpZWQgdG8gYXBwbHkgdG8gdGhlIGFwcGxpY2FibGUKRnJlZUJTRCByZWxlYXNlIGJyYW5j aGVzLgoKYSkgRG93bmxvYWQgdGhlIHJlbGV2YW50IHBhdGNoIGZyb20gdGhlIGxvY2F0aW9u IGJlbG93LCBhbmQgdmVyaWZ5IHRoZQpkZXRhY2hlZCBQR1Agc2lnbmF0dXJlIHVzaW5nIHlv dXIgUEdQIHV0aWxpdHkuCgpbRnJlZUJTRCAxMy4xXQojIGZldGNoIGh0dHBzOi8vc2VjdXJp dHkuRnJlZUJTRC5vcmcvcGF0Y2hlcy9FTi1YWDpYWC9YWFhYLnBhdGNoCiMgZmV0Y2ggaHR0 cHM6Ly9zZWN1cml0eS5GcmVlQlNELm9yZy9wYXRjaGVzL0VOLVhYOlhYL1hYWFgucGF0Y2gu YXNjCiMgZ3BnIC0tdmVyaWZ5IFhYWFgucGF0Y2guYXNjCgpiKSBBcHBseSB0aGUgcGF0Y2gu ICBFeGVjdXRlIHRoZSBmb2xsb3dpbmcgY29tbWFuZHMgYXMgcm9vdDoKCiMgY2QgL3Vzci9z cmMKIyBwYXRjaCA8IC9wYXRoL3RvL3BhdGNoCgo8Zm9yIGEgdXNlcmxhbmQgdXRpbGl0eTo+ CgpjKSBSZWNvbXBpbGUgdGhlIG9wZXJhdGluZyBzeXN0ZW0gdXNpbmcgYnVpbGR3b3JsZCBh bmQgaW5zdGFsbHdvcmxkIGFzCmRlc2NyaWJlZCBpbiA8VVJMOmh0dHBzOi8vd3d3LkZyZWVC U0Qub3JnL2hhbmRib29rL21ha2V3b3JsZC5odG1sPi4KClZJLiAgQ29ycmVjdGlvbiBkZXRh aWxzCgpUaGlzIGlzc3VlIGlzIGNvcnJlY3RlZCBieSB0aGUgY29ycmVzcG9uZGluZyBHaXQg Y29tbWl0IGhhc2ggb3IgU3VidmVyc2lvbgpyZXZpc2lvbiBudW1iZXIgaW4gdGhlIGZvbGxv d2luZyBzdGFibGUgYW5kIHJlbGVhc2UgYnJhbmNoZXM6CgpCcmFuY2gvcGF0aCAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgSGFzaCAgICAgICAgICAgICAgICAgICAgIFJldmlzaW9u Ci0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0Kc3RhYmxlLzEzLyAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIFhYWFhYWFhYWFhYWCAgICBzdGFibGUvMTMtblhYWFhYWApyZWxlbmcvMTMuMS8g ICAgICAgICAgICAgICAgICAgICAgICAgICAgWFhYWFhYWFhYWFhYICByZWxlbmcvMTMuMS1u WFhYWFhYCnJlbGVuZy8xMy4wLyAgICAgICAgICAgICAgICAgICAgICAgICAgICBYWFhYWFhY WFhYWFggIHJlbGVuZy8xMy4wLW5YWFhYWFgKc3RhYmxlLzEyLyAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgclhYWFhYWApyZWxlbmcv MTIuMy8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICByWFhYWFhYCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KCkZvciBGcmVlQlNEIDEzIGFuZCBs YXRlcjoKClJ1biB0aGUgZm9sbG93aW5nIGNvbW1hbmQgdG8gc2VlIHdoaWNoIGZpbGVzIHdl cmUgbW9kaWZpZWQgYnkgYQpwYXJ0aWN1bGFyIGNvbW1pdDoKCiMgZ2l0IHNob3cgLS1zdGF0 IDxjb21taXQgaGFzaD4KCk9yIHZpc2l0IHRoZSBmb2xsb3dpbmcgVVJMLCByZXBsYWNpbmcg Tk5OTk5OIHdpdGggdGhlIGhhc2g6Cgo8VVJMOmh0dHBzOi8vY2dpdC5mcmVlYnNkLm9yZy9z cmMvY29tbWl0Lz9pZD1OTk5OTk4+CgpUbyBkZXRlcm1pbmUgdGhlIGNvbW1pdCBjb3VudCBp biBhIHdvcmtpbmcgdHJlZSAoZm9yIGNvbXBhcmlzb24gYWdhaW5zdApuTk5OTk5OIGluIHRo ZSB0YWJsZSBhYm92ZSksIHJ1bjoKCiMgZ2l0IHJldi1saXN0IC0tY291bnQgLS1maXJzdC1w YXJlbnQgSEVBRAoKRm9yIEZyZWVCU0QgMTIgYW5kIGVhcmxpZXI6CgpSdW4gdGhlIGZvbGxv d2luZyBjb21tYW5kIHRvIHNlZSB3aGljaCBmaWxlcyB3ZXJlIG1vZGlmaWVkIGJ5IGEgcGFy dGljdWxhcgpyZXZpc2lvbiwgcmVwbGFjaW5nIE5OTk5OTiB3aXRoIHRoZSByZXZpc2lvbiBu dW1iZXI6CgojIHN2biBkaWZmIC1jTk5OTk5OIC0tc3VtbWFyaXplIHN2bjovL3N2bi5mcmVl YnNkLm9yZy9iYXNlCgpPciB2aXNpdCB0aGUgZm9sbG93aW5nIFVSTCwgcmVwbGFjaW5nIE5O Tk5OTiB3aXRoIHRoZSByZXZpc2lvbiBudW1iZXI6Cgo8VVJMOmh0dHBzOi8vc3Zud2ViLmZy ZWVic2Qub3JnL2Jhc2U/dmlldz1yZXZpc2lvbiZyZXZpc2lvbj1OTk5OTk4+CgpWSUkuIFJl ZmVyZW5jZXMKCjxvdGhlciBpbmZvIG9uIHRoZSBwcm9ibGVtPgoKPFVSTDpodHRwczovL2J1 Z3MuZnJlZWJzZC5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dpP2lkPVhYWFhYWD4KClRoZSBs YXRlc3QgcmV2aXNpb24gb2YgdGhpcyBhZHZpc29yeSBpcyBhdmFpbGFibGUgYXQKPFVSTDpo dHRwczovL3NlY3VyaXR5LkZyZWVCU0Qub3JnL2Fkdmlzb3JpZXMvRnJlZUJTRC1FTi1YWDpY WC5YWFhYWC5hc2M+Cg== --------------mTZOvfcS9s08MedTDy097KQ6-- From nobody Fri Jan 20 07:23:48 2023 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Nyrb83kg4z2skyd for ; Fri, 20 Jan 2023 07:24:04 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic309-22.consmr.mail.gq1.yahoo.com (sonic309-22.consmr.mail.gq1.yahoo.com [98.137.65.148]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Nyrb72qlPz4KKv for ; Fri, 20 Jan 2023 07:24:03 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b="uS/W00iJ"; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.65.148 as permitted sender) smtp.mailfrom=marklmi@yahoo.com; dmarc=pass (policy=reject) header.from=yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1674199441; bh=q9JEipvvbkkOPMKHY2OaI9gZn9f07ii9YJDXiIep8Gk=; h=From:Subject:Date:Cc:To:References:From:Subject:Reply-To; b=uS/W00iJZSbXC9+8vhAExu1vTvMfoE6M9MH4pUZyHYkwcAZ8m9EreNIfm8SwesTswYH1Q5JaXnDjI0YJdOUQBBz55hcSowRpDWjTzjmHyCmEAS00HsJKlqe/cneg5Sncesf91OZBQtAqYNyMSL5gAOqFxyucPzPpdBRKIVVcJTQQ/T5/4wCa15U1b6ZXsP1DBq4nh9sgsoCJLYdEIpdquzSVzz637NjCCMBAHL36qpgzv64Wtsb+yxVO2zbCVAe3QfoV2Eqb1dJVXn50WxEqKKRax9lyBVEKXPemT45ox9a6TB5tGskj1pdweKlm5Y/UrLdbnOJUGhsYC49NyzZFOg== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1674199441; bh=09PADtWju+EwUAfzJ2QiBztn1CcgnFnkVHGwaWajDO+=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=Fgg0vgBKpZQOk+qjonQdgvUbxFzhRHElYx9Y3XGwx5N/piucXhFlIJezsiq2M3+4JZe69fYtx/vds3u8tGhLfqNmUNQCoEA8thUIftlTFl2LWv8Lhw5aOxp+f5Sfp/7gAzYanOGq9EodRT9gEjvXi5sYbrGI0wlyKtpWjmnC0bSaTnXOeYmBUbHbhc5PvVJaljmhnvbY+TT/291HbUQZfeanH37dKKDMPseQ7c35DtFJiy3lfK8hMZMBFuEsYGhLUkBsOn7t52MA5VlFn7x9uszLGvWxPP4PwhCwq7P4SmS/2VSIy7r3sLX1QtTFYPdfQLPsNo0zuxJRjJVmzPAIGw== X-YMail-OSG: 8FVSyqMVM1mhhXpJek9kq8o80McR5JPHS2IRX9MW7.oj6d7NspFPCOjSH7l_hvs S.2mEx31DMyGhQuzDdLM2PryrinhdKo8zycRqtuJohy6MahtVwquLivcSkgHyUGpa141lPFceHKw Rrtd2DdAZFdTiPIld9.F1pZ.ExPNA0RclsEOHiBYm9DfIbPPaQlP5SHe841rILTtB4IHydw6n3bE U9wIUYcZliVK6zCWJne3eyURJivOmVc5wBB_alHDq51mER.80Yglc89UMba2tplDLFz3ae97MLgd HoIV4UEsx7y65AMJPHQm3BeAyV0Whn9MNXjAa3XcO0iDNFiFW85lqjx5j3YIj0LA5alVetJjs978 yr4OOztV.T874CrzZj89Vu.t.Deq0g5XpCbUbdpRq9FXEpXjeNyvyy4dMOB2ZcDN.QeZWP_7iPBy p48mBbhkTAVB0SHgL3MIX6R0N7HuaJs6z7JkFapvu_wc3KH_hIQ1fKEhXQXvrTPUPZ0jV6EQTfwI wuha2CN7MWsTv.jEFCPxbLfyA_FBQMblDaaLyrhTR0IszCdjTJZuJ0NmCOZImokTJV4NNkhZSJPd 0l.nBvuuhlE9rLILABYxieC7pa.76gn_wwO_vOc.AupAINGFb051fFYFJuMV.o4PKkjTuAPZk33V pq7DwdEArYXJKjc2Tz9zjRu9PjRqPFsNxYj6ZsCSHQ.CfmI.r4XICx6OCSYjm7CHCBsakPd.FZt_ KTEpIEnc7hhqTX9GS2rzc8PHhogbvZnbuXxwyXqXY2m2wBPJalxvE0EpA_2uGacN9sQdBoaOTKYO u5TuAPhJdI_kJgYpzjfHb_KPUBz2FaygByHmJ5j838WmNACI4SIN4.kFezc9Ux5Eoq_usm4e4Ukn jdzNOulm._UKVLEt82ijCUYBpr.3j24u0gfRjD7p.V8O4bsG1jUchy_56jiuN_gQiqDxQVDUUEen Hr9I9Cw0Txj4P_Q4vwTU7cnbhLPuNECZ09rN28o522dT1zTRb3wBUMqul6ynRUfCCLHhFzinr2PP rrnORQWodtq7zQSo7g6oijboc1K96RzyJjMYlaXnujBxHF523cblFScsnhx6D5Z_h6AyRL5mijUw GeScwRci3tM9oNNIUQAbpFl4.r2pCvotyzLXdlh_4JlA86glfvfsKXpHrIC2e1Qcdv2Y8GwhbDVJ DFmgmbm_h3rs0LGoLs2hrIf0LcFxU1bmtVtX2F1HdSJ1iT4d6IotjH9n61SyWVyxDmOu0N6VRmDc 1I92dXoRps3rZExMqNBra4j89cw_kQftHp0PcmkXND7CqELsnyRpl6TncWEv9Cg_sA67JzHuvYuB HZWdlazBUGPtzQ.lYEPt9.w2D5rB3sdl_VulIaPhfJ8iRM.r9QBY6DUYOAT4822D2vhLTSW1i4j2 XbiodSz._lzelgeacHPiRqnDUyeNLU6w7bvF.43PNImNACLRGoE8OcfMMijWQzPoy9R7e6RqSJV. fdC04HHhnjB8g13Gn_adWKWVohKJvbG1Axr5Xy6fbpqBNoLe7q1l.ukHYB1e5Dmt447hmfu9qlAu QAOTcTeS1.cmeCQxam2jsy6xzcb3ud8T1SlwsqVktuVwLzMr5HGldezLt8uwIY7fYVfuZUA84jHq fRP94UWNHVuD358hL43EVKnR4muQZlP9E_kiZ8FMkt7eyIcCNu3ivAZQ31uKIRU1IAyJ7PE6Tusp FMEMPFlT_XGJzIT39tgvlW4BlS9Pfjbu2eIgvfZAhSM0qbNWPbswnk5.6_9wnecFYcBwhP6nEiZo eUcRpEXxxdgQep4SQX59RpzfCL4Wls5XY8aFR3qn8scjsWMIecocaQ0hJ42uaEAmspBHKXO4XdnP 7MXrpzJvh9fph7v5XvYp3oD2h19OtzPdMacZtzxZ.hZFjk.gr5Z1ebL_COp5y98hBq7W8qpP.JLf VE1brB3w0wMaOr_QsTunD1FfhGiSHgzDmXxczf_Cia61eL3VOHoOkBhWO1ZsGcpc0IREtVEnRYsx 7giUJW7ySzbl3i8YvShrX.iYo9hxZQkPJgsWMuoavebO6IWBmzhfjZV5ASZP8rbvMKKOYTyG7S6z SByS7Mt5RkbWPTJfbtdfPhLC3wdiCuBGVpmqmZOWE8FyYuqs9_0tqaZ.m6tDre4d52vk2aOoU0pT tojW.b2B6QnOzlKo05DtwQ5JFxEZlqBD2UEMabk6na8uN3.u2BE5m7KweeHseNLxLMgLIAoKeAP. z7zVkcYM.tWF7RItRAukfoNiXu1CTVD34uSm7nQi.wwZ5ZJAqn0.hfWDJpRBqkiORy_qdHbA- X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic309.consmr.mail.gq1.yahoo.com with HTTP; Fri, 20 Jan 2023 07:24:01 +0000 Received: by hermes--production-bf1-6bb65c4965-lwg94 (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID ab0aeaf2d470d99a9475b164205a0f85; Fri, 20 Jan 2023 07:24:00 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.300.101.1.3\)) Subject: Any hints about how to get (a RPi4B) PCIe/XHCI combination to deal with a "PCI addr: 0x400000000, CPU addr: 0x0" from dma-ranges? Message-Id: Date: Thu, 19 Jan 2023 23:23:48 -0800 Cc: Hans Petter Selasky To: FreeBSD Hackers X-Mailer: Apple Mail (2.3731.300.101.1.3) References: X-Spamd-Result: default: False [-2.48 / 15.00]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.978]; MV_CASE(0.50)[]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; MIME_GOOD(-0.10)[text/plain]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_IN_DNSWL_NONE(0.00)[98.137.65.148:from]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; TO_DN_ALL(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; FREEMAIL_FROM(0.00)[yahoo.com]; MID_RHS_MATCH_FROM(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; FROM_EQ_ENVFROM(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; RCVD_TLS_LAST(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.65.148:from] X-Rspamd-Queue-Id: 4Nyrb72qlPz4KKv X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N For my own edification, I've been looking into having RPi4B's use the dma-ranges device tree information to set up the inbound configuration for its PCIe/XHCI context. This would allow the modern "C0T" parts that have more than 3 GiBytes of RAM to avoid bounce buffering associated with the only-lower-3-GiBytes works PCIe wrapper-logic problem that exists for "B0T" parts. For a "C0T" 8 GiByte RPI4B the live Device Tree sections involved look like: . . . #address-cells =3D <0x00000002>; #size-cells =3D <0x00000001>; . . . scb { compatible =3D "simple-bus"; #address-cells =3D <0x00000002>; #size-cells =3D <0x00000002>; . . . pcie@7d500000 { compatible =3D "brcm,bcm2711-pcie", = "brcm,bcm7445-pcie"; reg =3D <0x00000000 0x7d500000 0x00000000 = 0x00009310>; device_type =3D "pci"; #address-cells =3D <0x00000003>; #interrupt-cells =3D <0x00000001>; #size-cells =3D <0x00000002>; . . . ranges =3D <0x02000000 0x00000000 0xc0000000 = 0x00000006 0x00000000 0x00000000 0x40000000>; dma-ranges =3D <0x02000000 0x00000004 0x00000000 = 0x00000000 0x00000000 0x00000002 0x00000000>; . . . pci@0,0 { device_type =3D "pci"; #address-cells =3D <0x00000003>; #size-cells =3D <0x00000002>; ranges; reg =3D <0x00000000 0x00000000 = 0x00000000 0x00000000 0x00000000>; usb@0,0 { reg =3D <0x00000000 0x00000000 = 0x00000000 0x00000000 0x00000000>; resets =3D <0x0000002e = 0x00000000>; }; }; }; . . . xhci@7e9c0000 { compatible =3D "generic-xhci"; status =3D "disabled"; reg =3D <0x00000000 0x7e9c0000 0x00000000 = 0x00100000>; interrupts =3D <0x00000000 0x000000b0 = 0x00000004>; power-domains =3D <0x00000013 0x00000006>; phandle =3D <0x000000e2>; }; . . . Showing in boot -v output like form, the pcib0 would look like (showing both Inbound and Outbound): pcib0: Inbound pcie dma-range: PCI addr: 0x400000000, CPU addr: 0x0, = Size: 0x200000000 pcib0: parsing FDT for ECAM0: pcib0: PCI addr: 0xc0000000, CPU addr: 0x600000000, Size: 0x40000000 Note the: PCI addr: 0x400000000, . . ., Size: 0x200000000 vs. PCI addr: 0xc0000000, . . ., Size: 0x40000000 which nicely avoid PCI addr overlaps and leave the Inbound context with a size of 8 GiBytes, matching the RAM size. Unfortunately, for as little as I've figured out, I have to override (just) the 0x400000000 and use 0x0 (to numerically match the CPU addr values): pcib0: Inbound pcie dma-range: PCI addr: 0x0, CPU addr: 0x0, Size: = 0x200000000 pcib0: parsing FDT for ECAM0: pcib0: PCI addr: 0xc0000000, CPU addr: 0x600000000, Size: 0x40000000 Note the: PCI addr: 0x00000000, . . ., Size: 0x200000000 vs. PCI addr: 0xc0000000, . . ., Size: 0x40000000 With this they do overlap. While it boots this way, it is only because it has not yet run into the overlap. (I can do USB tests that lead to a crash.) It appears that I need a hint about how to get the XHCI to deal with the "PCI addr: 0x400000000, CPU addr: 0x0" combination, translating addresses between spaces appropriately. I am already setting the PCIe RC Inbound PCIe related registers. But I expect that there is more to it in order for the XHCI activity to use that mapping. The hint might just be pointing me at something to read that I've not managed to find. For reference, the 0x400000000 context starts its boot failure with a "Run timeout": . . . bcm_xhci0: (New XHCI DeviceId=3D0x34831106) bcm_xhci0: Run timeout. bcm_xhci0: XHCI halt/start/probe failed err=3D18 device_attach: bcm_xhci0 attach returned 6 . . . =3D=3D=3D Mark Millard marklmi at yahoo.com