From owner-freebsd-current@freebsd.org Sun Mar 15 00:31:08 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 865402684FF for ; Sun, 15 Mar 2020 00:31:08 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670049.outbound.protection.outlook.com [40.107.67.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48g0j62r7vz4bmK for ; Sun, 15 Mar 2020 00:31:05 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c1WgUQoMTI/mKYJIDx2NEiKKuDSe38fR6UgLniMG+VJq23DK+If5U8sluTQMXdscc4ILqwN4b+NC1Oaoxb/lQiUlZYA8pDG6iC2oXPfuWzdurezpeKusDXGOQuTiD4BujN3eQbkUZ0jnQP89i02j5OZeG2z+zoeS3eXEgDl4MKqSOi6r067ZxnKmuiSE+tKkKeMq9CQeTEuPtvMtQlaeUUycHsGaqBROntENwA+s5dKyjDoE9riTOfjXnmoNqs7h6OOCmE78aSQfUiKxh36il4+3ZY7zw+EHR1TxpGC8qZiOshVMYEzh94wOPPXqEHPLxsc1HOUKNOS5NXdEk2M7+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DqCB+PpT8YtKgMlyC3P9gDOzEpCfL/0AadPeZdTOymI=; b=OW1sgjH5+qnvR0pgb9o7Eyic4FqcuW7oMQV9E3P99d5xtV/a9cLsnQONbrsOXARa9niph6MX3TuLSpUi+8ToWDgB3Yu5kyGZZuA7OOXXSFXwnsDCCQR94PJqXjqGICwY/pCpcjOguDbiqt1US9zHw/fuUgh6i82hyjchR07nl8WDWHBPx+Gb77rI4XDaMq4xYFxuzqMgthGB7w826gARKlGYfQyjqaiXS+TeuFNBtljLYY1ngkX/MLc4GZoHJ5pRBBArUn+/MfqYGkKdmrcTkw/XPUeD+owd7mSlZTkjkvo6FwpjtlF2ApRk5WhfY29M+clcJ7sZPmUNo1tbxzJu9A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM (10.255.46.82) by YTBPR01MB2351.CANPRD01.PROD.OUTLOOK.COM (10.255.46.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2814.19; Sun, 15 Mar 2020 00:31:03 +0000 Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4]) by YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4%6]) with mapi id 15.20.2814.018; Sun, 15 Mar 2020 00:31:03 +0000 From: Rick Macklem To: Garrett Wollman CC: "freebsd-current@FreeBSD.org" Subject: Re: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Topic: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Index: AQHV+Z9BqmBxwqP+PUqf7mEWx47LjahHfK6AgAFOxSQ= Date: Sun, 15 Mar 2020 00:31:03 +0000 Message-ID: References: , <202003140420.02E4Kx4q055789@hergotha.csail.mit.edu> In-Reply-To: <202003140420.02E4Kx4q055789@hergotha.csail.mit.edu> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 80212905-454b-4fbc-ef3b-08d7c87824f6 x-ms-traffictypediagnostic: YTBPR01MB2351: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-forefront-prvs: 0343AC1D30 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(366004)(136003)(39860400002)(396003)(199004)(66476007)(66946007)(8676002)(76116006)(64756008)(66446008)(66556008)(186003)(33656002)(81156014)(71200400001)(8936002)(786003)(4326008)(81166006)(316002)(9686003)(478600001)(6916009)(5660300002)(55016002)(2906002)(52536014)(7696005)(6506007)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:YTBPR01MB2351; H:YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: v3s6OIZqXWqMJOPmaQ/DlFU5W96ahO7Xijivup5EqEdM97fEr0IRd9IihLzALpf5otmsgUgXP+/E2UdXujM5UkiKNM2sbKgo0oPcc5940BNC8DKARokm2R2wL95BOu8+fftELGs7NjRf8yryw5Yp+MFdCLC1C0JjHkeZv1PsOLFNKTqrQvNSkmINErda4PKbPvwHCG7qtZ3drz+mQi2qnwQUW7p/84coAcLNIVQYW75wCs5fFW9I8th35O2ec+3EaOpSWtjfa9K3H/Uzkfxsuj1s9zsIOF1Crjgm7ab5pox4L9cG6lXSFQiuw9MjWZeRyD6kz8aK0rkCfF7WciNjHOoQJhgigj7uaBCTfU9TPmFuCvXnCGhc42/6g1r5eB5Sci8oVNKloof5oBhvL+repn/wkzTLK8lV4jcuGqam/jx7MuFyJ7ZRc1qOscQsGHBX x-ms-exchange-antispam-messagedata: R7+SHOKefSFYH8gkAknBMmgeNK7KbN9pOLEHPJuW99QsbxDFhNbewqO+2vRrvEutO6IcUX0m0Mc1K9NWopfNPkdsaGO4EYXR4x+aUjTUxBA01YgSH/NeA3E3PR0vWgWhQvpKZ4jek28omaiI69AoDfqK2pRtpKwOILIo2/eMaTjeJDn3HKI71oj6aEmxtgjMdEVSy4Dw8ixYEVEZsVoI9A== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 80212905-454b-4fbc-ef3b-08d7c87824f6 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2020 00:31:03.7008 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 53UdZ31xFWgQAvaGv2+6dz1EcPWoNDXN1Yom6JsOIJfG4Czne3AilURXDb8PtC1rabokt6DTQB46GMeyJJtBHQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTBPR01MB2351 X-Rspamd-Queue-Id: 48g0j62r7vz4bmK X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.67.49 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-3.67 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.986,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[49.67.107.40.list.dnswl.org : 127.0.3.0]; IP_SCORE(-1.39)[ipnet: 40.64.0.0/10(-3.77), asn: 8075(-3.10), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:8075, ipnet:40.64.0.0/10, country:US]; SUBJECT_ENDS_QUESTION(1.00)[]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 00:31:08 -0000 Garrett Wollman wrote:=0A= >Rick Macklem writes:=0A= >>Since it is done in sample code, I have an option in the RPC-over-TLS=0A= >>server daemon that does the SSL_CTX_set_client_CA_list() call.=0A= >>When I test, I have not used this option and the code seems to work.=0A= >>Maybe this is because the client only has a single certificate?=0A= >=0A= >In general, the server needs to send a list of CAs that it's willing=0A= >to accept for client certificate use, because the server should never=0A= >accept just any old CA; normally, a client will interpret receiving=0A= >the list as a request to send a client certificate issued by one of=0A= >the indicated CAs, but the client can send its certificate even if the=0A= >server doesn't send the list or even if the server sends a list but=0A= >client certificate isn't issued by a CA on the list.=0A= >=0A= >It's probably a good idea to send the list even if there's only a=0A= >single valid CA, configured by prior agreement; the overhead is=0A= >minimal and it gives an indication to a fussy or confused client what=0A= >is being required of it.=0A= Ok, so does SSL_CTX_load_verify_locations() set up the server to verify=0A= the certificates and SSL_CTX_set_client_CA_list() set the list of certifica= te=0A= names sent to the client?=0A= =0A= Put another way, should the server normally:=0A= SSL_CTX_load_verify_locations(ctx, cafile, NULL);=0A= and=0A= SSL_CTX_set_client_CA_list(SSL_CTX_load_client_CA_file(cafile));=0A= where cafile is the file with the CA certificates in it?=0A= =0A= I currently have the server setting these via separate options and only do = the=0A= first one.=0A= If they both use the same file, then I can simplify things and get rid of o= ne of=0A= the options.=0A= =0A= Thanks for your help with this, rick=0A= =0A= >My recollection is that in the OpenSSL API in particular, if you don't=0A= >set an explicit client CA list, but you *do* set a CA bundle or=0A= >directory to automatically construct the *server's* trust path, then=0A= >the library will just send the name of every single CA it knows about.=0A= =0A= -GAWollman=0A= =0A= From owner-freebsd-current@freebsd.org Sun Mar 15 01:17:27 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 33B71269DBE for ; Sun, 15 Mar 2020 01:17:27 +0000 (UTC) (envelope-from bogorodskiy@gmail.com) Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48g1kZ6QGHz418D; Sun, 15 Mar 2020 01:17:26 +0000 (UTC) (envelope-from bogorodskiy@gmail.com) Received: by mail-lj1-x241.google.com with SMTP id u12so14730176ljo.2; Sat, 14 Mar 2020 18:17:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=7jGVgUilXfvcWY0FUiNpSom1tJYS8AkJSWVfo3gfihk=; b=S+NWRhXcAGIr4nnNnMjvFfe1/nEuINg7FPT5VgqrUaPWJ0Nt7+aysP+iMcrayXePNX /TZDtwgQOWpJOrpKE7GtzkyG6e4/uTMNYZpBcYpxMjrN4EocqkgFpJ+MFk6NMZuEWIFQ dn4HnLdbLOB2ZebbjI6m7MG1hC/2pzn77JioZBMetWMyTtrCTfOg24jxuIfYW2Gjy7YO 0HfRQgfR06nmqkzbJM51eLs0KrmgpcgoSYY5R19oXD01DWJKrFYVo2UZuS9Co1C0rnME Kl0SXrBdpqICEc/ipBA09wSK+REISF6zBxAmmSY1yGhdSes+f76tmd4TKo9fv5jZux9+ GPaQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=7jGVgUilXfvcWY0FUiNpSom1tJYS8AkJSWVfo3gfihk=; b=fzgztn1OK/Ic7Oqn2m9K83t+FI6d4kHUW1CURLD1xcRCf69/bK2zqVG11Ujq+hW+v3 /UW9fouLXPjEh5G4aOKt0pkMoyBJQrVY7/hc/35z1KmfpDARxCf258T/DgvBfxTrrfsz sJejgXN8uGXow8+NvAXdgojkG/dgAWmQzxYNllv97KkWJKife09W+/Ergq6qf1LUyvaC Kjkk87yy+z7cLwkeklK0BUD2eaee2S4kAOlzOTSBLqB8lc5hiJcKamF6RQortYP9fUvg UZNDrTB8tC0zknwFy1AazxffyPZfiWUYxnSZemK6TXNRb+4nmSawgC1gVzQRtpO+CY2n 6k/A== X-Gm-Message-State: ANhLgQ3ksW0OwVK3vysfOf5U5nd49XyUufPMI+gYaBtzHrISBhdJBpyw EpMr1nbJQVofcA2HKppcVPFpKiU1CzU= X-Google-Smtp-Source: ADFU+vtBoOny6sDFhMkHqAIjGPwCMV1P72jLjz1H/ivbQzgOV4Z0DBd1kGSjMFd4P+e6q15oLmNrBQ== X-Received: by 2002:a05:651c:1114:: with SMTP id d20mr12088595ljo.103.1584235043961; Sat, 14 Mar 2020 18:17:23 -0700 (PDT) Received: from kloomba ([31.29.228.135]) by smtp.gmail.com with ESMTPSA id y6sm5343260lfy.38.2020.03.14.18.17.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 14 Mar 2020 18:17:22 -0700 (PDT) Sender: Roman Bogorodskiy Date: Sun, 15 Mar 2020 05:17:18 +0400 From: Roman Bogorodskiy To: Dimitry Andric Cc: waitman@waitman.net, FreeBSD Current Subject: Re: Build failed compiling ittnotify_static.pico Message-ID: <20200315011718.GA1724@kloomba> References: <20200313205706.GD1053@rancor.immure.com> <8740b5f9fef5ce417ea8968543de2992@waitman.net> <14a5e39b65511d7ab4ffe370717d57e5@waitman.net> <20200314162429.GA47907@kloomba> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="rwEMma7ioTxnRzrJ" Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 48g1kZ6QGHz418D X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.00 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 01:17:27 -0000 --rwEMma7ioTxnRzrJ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Dimitry Andric wrote: > On 14 Mar 2020, at 17:24, Roman Bogorodskiy wrote: > >=20 > > Dimitry Andric wrote: > >> On 13 Mar 2020, at 23:58, Waitman Gobble wrote: > >>>=20 > >>> On 2020-03-13 17:49, Waitman Gobble wrote: > >>>> On 2020-03-13 16:57, Bob Willcox wrote: > >> ... > >>>>> cc: error: no such file or directory: > >>>>> '/usr/src/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnot= ify/ittnotify_static.c' > >>>>> cc: error: no input files > >>>>> *** [ittnotify_static.pico] Error code 1 > >>>>> Anyone else seeing this? Any suggestions for a fix? > >>>>> Thanks, > >>>>> Bob > >>>> I've been getting the same thing since yesterday. I think the file i= s actually > >>>> ittnotify_static.cpp > >>>=20 > >>>=20 > >>> This is supposed to handle the rename, for some reason it's not happe= ning on my machine. > >>>=20 > >>> Makefile.inc1 > >>>=20 > >>> # 20200310 r358851 rename of openmp's ittnotify_static.c to .cpp > >>> .for f in ittnotify_static > >>> @if [ -e "${OBJTOP}/lib/libomp/.depend.${f}.pico" ] && \ > >>> egrep -qw '${f}\.c' ${OBJTOP}/lib/libomp/.depend.${f}.pico;= then \ > >>> echo "Removing stale dependencies for ${f}"; \ > >>> rm -f ${OBJTOP}/lib/libomp/.depend.${f}.* \ > >>> ${OBJTOP}/obj-lib32/lib/libomp/.depend.${f}.* \ > >>> ${LIBCOMPAT:D${LIBCOMPAT_OBJTOP}/lib/libomp/.depend.= ${f}.*}; \ > >>> fi > >>> .endfor > >>=20 > >> Hm, so during your buildworld, does it show "Removing stale dependenci= es > >> for ittnotify_static" or not? And is the .depend file there? Can you > >> check /usr/obj for the file .depend.ittnotify_static.pico, and list its > >> permissions? > >>=20 > >> -Dimitry > >>=20 > >=20 > > I have the same issue updating one of my poudriere jails. > > I don't see "Removing stale dependencies ..." messages. > >=20 > > I see a couple of ittnotify_static related messages: > >=20 > > make[5]: /usr/obj/workspace/poudriere/jails/current/usr/src/amd64.amd64= /obj-lib32/lib/libomp/.depend.ittnotify_static.pico, 43: ignoring stale .de= pend for /workspace/poudriere/jails/current/usr/src/contrib/openmp/runtime/= src/thirdparty/ittnotify/ittnotify_static.c > > ... > > make[5]: /usr/obj/workspace/poudriere/jails/current/usr/src/amd64.amd64= /obj-lib32/lib/libomp/.depend.ittnotify_static.pico, 43: ignoring stale .de= pend for /workspace/poudriere/jails/current/usr/src/contrib/openmp/runtime/= src/thirdparty/ittnotify/ittnotify_static.h >=20 > These are for the 32-bit stage. The initial fix I committed in r358907 > worked for the main buildword stage, but apparently not for the 32-bit > stage, which stores its object files in a slightly different directory > (e.g. the obj-lib32 subpath). >=20 > Ed Maste tried to fix that up in r358909, but maybe it does not work in > all situations, for example with custom MAKEOBJDIRPREFIX settings? >=20 >=20 > > $ ls -al /usr/obj/workspace/poudriere/jails/current/usr/src/amd64.amd64= /lib/libomp/.depend.ittnotify_static.pico > > -rw-r--r-- 1 root wheel 6565 Mar 14 19:30 /usr/obj/workspace/poudrie= re/jails/current/usr/src/amd64.amd64/lib/libomp/.depend.ittnotify_static.pi= co >=20 > What is in the first two lines of that file? $ head -2 /usr/obj/workspace/poudriere/jails/current/usr/src/amd64.amd64/li= b/libomp/.depend.ittnotify_static.pico ittnotify_static.pico: \ /workspace/poudriere/jails/current/usr/src/contrib/llvm-project/openmp/ru= ntime/src/thirdparty/ittnotify/ittnotify_static.cpp \ $ > -Dimitry >=20 Roman Bogorodskiy --rwEMma7ioTxnRzrJ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEEi6TfKtFPmbY34ABwyW1f/gjCImoFAl5tghsACgkQyW1f/gjC Imo1nAf8CpEZV8Hj2QTeqpUve9kWuLF9Z9jCqHlMM9nqiK7QP65qIHlhh7HJvIOK X06xi5otb+Ht49UkX/Q57fW/BlBPS6Inx7rcYa5TtSvxpq7q1SX2DBCpUrEOYzoh PdXj0Oyy3JQx3N8CFiq18dB0vGB8ksIBSx7Qcn1YfQWxweduUH6GVwUNlshPpMHy vB3+CmoIjSs4rD5CBejruGdxzpphRHv4PbAKbnwctKtJoIARY1LRNUPvMW9LndzA rmY88sBZMzrFzwmIgzPZ/dJPfXyGQbDQoEaz1URT/hk6xhAWBEDv5xAeIYYYtDOB pXzL16t53pJWHzOXlgYD2BrET1LeJQ== =//NH -----END PGP SIGNATURE----- --rwEMma7ioTxnRzrJ-- From owner-freebsd-current@freebsd.org Sun Mar 15 10:34:37 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DD4782713DE for ; Sun, 15 Mar 2020 10:34:37 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48gG5T4fvdz3Blc for ; Sun, 15 Mar 2020 10:34:37 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1472) id 8FB501773; Sun, 15 Mar 2020 10:34:36 +0000 (UTC) To: freebsd-current@FreeBSD.org Subject: [2 WEEKS LEFT REMINDER] Call for 2020Q1 quarterly status reports Message-Id: <20200315103437.8FB501773@freefall.freebsd.org> Date: Sun, 15 Mar 2020 10:34:36 +0000 (UTC) From: Lorenzo Salvadore X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 10:34:38 -0000 Dear FreeBSD Community, The deadline for the next FreeBSD Quarterly Status update is April 1, 2020, for work done since the last round of Quarterly Reports: January, 2020 - March, 2020. I would like to remind you that reports are collected during the last month of every quarter. Status report submissions do not need to be very long. They may be about anything happening in the FreeBSD project and community, and they provide a great way to inform FreeBSD users and developers about work that is underway or has been completed. Report submissions are not limited to committers; anyone doing anything interesting and FreeBSD related can -- and should -- write one! The preferred method is to follow the guidelines at the Quarterly GitHub repository: https://github.com/freebsd/freebsd-quarterly Alternatively you can fetch the Markdown template, fill it in, and email it to quarterly@FreeBSD.org. The template can be found at: https://raw.githubusercontent.com/freebsd/freebsd-quarterly/master/report-sample.md We look forward to seeing your 2020Q1 reports! Thanks, Lorenzo Salvadore (on behalf of quarterly@) From owner-freebsd-current@freebsd.org Sun Mar 15 11:34:18 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 16CDB276A3A for ; Sun, 15 Mar 2020 11:34:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48gHQK3fl7z3QnR; Sun, 15 Mar 2020 11:34:17 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id BC4697ED5; Sun, 15 Mar 2020 11:34:16 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from [10.10.132.20] (unknown [IPv6:2001:2c0:ce03:c605:195f:4624:8e6e:276f]) (Authenticated sender: kp) by venus.codepro.be (Postfix) with ESMTPSA id 329F73C87C; Sun, 15 Mar 2020 12:34:12 +0100 (CET) From: "Kristof Provost" To: FreeBSD-Current Subject: bridge project update (Week of March 9th) Date: Sun, 15 Mar 2020 20:34:08 +0900 X-Mailer: MailMate (1.13.1r5671) Message-ID: <621E7E68-2ACC-4B56-A551-51D1275F78BF@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed; markup=markdown Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 11:34:18 -0000 Hi, As this is the first status report sent to a wider audience I’ll try to give a bit of background information. I’m working on a performance improvement project for if_bridge. Right now it’s a big bottleneck for a number of different scenarios (e.g. for VNET jail or VM hosts). if_bridge currently has a single mutex to protect its internal data structures. As a result it’s nowhere near as fast as it could be. I’ve started the project by adding a number of tests to ensure that I don’t break things (or at least not everything) during this project. A number of tests have already been committed. One more will go in soon (https://reviews.freebsd.org/D23961). They all live in /usr/tests/sys/net/if_bridge_test. Aside from that I’ve been investigating the possibility of using the NET_EPOCH to improve bridge throughput. It’s very early, of course, but I’m investigating the possibility of keeping the bridge lock, but removing it from bridge_input/bridge_output/… (i.e. the data path), instead relying on NET_EPOCH to ensure that the important data structures don’t go away while we’re processing packets. Part of that work was building my own understanding of how the epoch system is supposed to work. Very briefly (and with the caveat that I’ve only just started looking at it): Use lockless lists (CK_*). Objects should remain valid (i.e. not free()d) in between NET_EPOCH_ENTER() and NET_EPOCH_EXIT(). To accomplish this the object can be freed through a NET_EPOCH_CALL() callback, which will only be done once all CPUs have left their NET_EPOCH_(ENTER|EXIT) sections. This requires an epoch_context, which can best be placed in the to-be freed structure. Feel free to get in touch if you have questions, remarks or suggestions. Best regards, Kristof From owner-freebsd-current@freebsd.org Sun Mar 15 18:41:12 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 78F8C275C18 for ; Sun, 15 Mar 2020 18:41:12 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smarthost1.greenhost.nl (smarthost1.greenhost.nl [195.190.28.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48gStt23DTz3FCp for ; Sun, 15 Mar 2020 18:41:09 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smtp.greenhost.nl ([213.108.110.112]) by smarthost1.greenhost.nl with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1jDYCA-000203-4Q; Sun, 15 Mar 2020 19:41:06 +0100 Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: "freebsd-current@FreeBSD.org" , "Rick Macklem" Subject: Re: when does a server need to use SSL_CTX_set_client_CA_list()? References: Date: Sun, 15 Mar 2020 19:41:08 +0100 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Ronald Klop" Message-ID: In-Reply-To: User-Agent: Opera Mail/12.16 (FreeBSD) X-Authenticated-As-Hash: 398f5522cb258ce43cb679602f8cfe8b62a256d1 X-Virus-Scanned: by clamav at smarthost1.samage.net X-Spam-Level: / X-Spam-Score: -0.2 X-Spam-Status: No, score=-0.2 required=5.0 tests=ALL_TRUSTED, BAYES_50 autolearn=disabled version=3.4.2 X-Scan-Signature: 8b3222cd26cce149ddb9ffa05c4da76e X-Rspamd-Queue-Id: 48gStt23DTz3FCp X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of ronald-lists@klop.ws designates 195.190.28.88 as permitted sender) smtp.mailfrom=ronald-lists@klop.ws X-Spamd-Result: default: False [-1.40 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.89)[-0.895,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:195.190.28.64/27]; NEURAL_HAM_LONG(-0.99)[-0.993,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[klop.ws]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[88.28.190.195.list.dnswl.org : 127.0.10.0]; IP_SCORE(-0.71)[ip: (-0.64), ipnet: 195.190.28.0/24(-0.25), asn: 47172(-2.71), country: NL(0.03)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:47172, ipnet:195.190.28.0/24, country:NL]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 18:41:12 -0000 On Sat, 14 Mar 2020 02:28:22 +0100, Rick Macklem wrote: > Hi, > > Since it is done in sample code, I have an option in the RPC-over-TLS > server daemon that does the SSL_CTX_set_client_CA_list() call. > When I test, I have not used this option and the code seems to work. > Maybe this is because the client only has a single certificate? > > Here's the lame description I have in the man page for the option: > .It Fl C Ar client_cafile > If this option is specified, the server calls > .Dq > SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(``client_cafile'')) > during TLS context configuration. > I do not know when this is needed, but it appears to be required for > certain TLS configurations. > > Does someone know when this call is needed? > Can you explain it? (Just about anything is better than the above;-) > grep -r SSL_CTX_set_client_CA_list /usr/src/* gives a couple of matches (sendmail, wpa & unbound). Maybe that source gives a hint. Regard, Ronald. > Thanks, rick > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to > "freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Sun Mar 15 19:52:44 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 459D6276F11 for ; Sun, 15 Mar 2020 19:52:44 +0000 (UTC) (envelope-from ctuffli@gmail.com) Received: from mail-ot1-f68.google.com (mail-ot1-f68.google.com [209.85.210.68]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48gVTQ2MRLz4QbW; Sun, 15 Mar 2020 19:52:42 +0000 (UTC) (envelope-from ctuffli@gmail.com) Received: by mail-ot1-f68.google.com with SMTP id g15so15685506otr.0; Sun, 15 Mar 2020 12:52:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0mIf7dWNLg3+gAfgTrK2Dy0Lv10RtCCNowfqr5Xf/CI=; b=HVXau2tMAOXHfV/hbr2wUmagvnm9XB1T7ptcWYjvyUuew96Ll5VzTaL/uJNvrt5771 OTA+HTCau8kGfl3JqO/DA6YPcPkxWdE6OnveaeLSgtC7CyDiBRdiweGKReh16+hA591V 8dz3rqVuT4PZj1wVFU6U/2glLytJaHF6y3DUmxvrONLZR8E6o7EIfTjEvuykn/Mb6C9W kRlAvnMCDgnzx6ivM04Br/kGXzsQJEjlIyX8yqmmY9zTZxiw0ySRh7DGYFkXFtbM3JYH Y4VZ2aRKOHB1up9FBfxMWvvUBS9Mgjvyzwnkq8tS/YF1EoNDRECjsV4+oyFKsz+B2U4Z Amxw== X-Gm-Message-State: ANhLgQ1ghxFj4X04UQ2SpVFIW+zuQsO0i8XPAEDNGlMMfTzBbOPkbUOB rftQUAI5c83OneWJ89j+IQAhstH7 X-Google-Smtp-Source: ADFU+vuE+M45/YfWtsdQJRcaneNX9CStwrGzYxgc/cnO/jsOepjOcYc+rAny6RJZfZAPR1ujtxa3pg== X-Received: by 2002:a05:6830:1ad4:: with SMTP id r20mr12337262otc.316.1584301960341; Sun, 15 Mar 2020 12:52:40 -0700 (PDT) Received: from mail-ot1-f45.google.com (mail-ot1-f45.google.com. [209.85.210.45]) by smtp.gmail.com with ESMTPSA id l19sm8053419otj.69.2020.03.15.12.52.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 15 Mar 2020 12:52:40 -0700 (PDT) Received: by mail-ot1-f45.google.com with SMTP id r2so259454otn.6; Sun, 15 Mar 2020 12:52:39 -0700 (PDT) X-Received: by 2002:a05:6830:10b:: with SMTP id i11mr17158063otp.99.1584301959425; Sun, 15 Mar 2020 12:52:39 -0700 (PDT) MIME-Version: 1.0 References: <5606b11ff31f576b48458a15d224f8b1@waitman.net> <6973b60ef1e9ef142bf9b8fd8f2f3b41@waitman.net> <20200314.125321.1799337201319868712.ish@amail.plala.or.jp> In-Reply-To: From: Chuck Tuffli Date: Sun, 15 Mar 2020 12:52:28 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Build failed compiling ittnotify_static.pico To: Dimitry Andric Cc: freebsd-current@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 48gVTQ2MRLz4QbW X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of ctuffli@gmail.com designates 209.85.210.68 as permitted sender) smtp.mailfrom=ctuffli@gmail.com X-Spamd-Result: default: False [-2.94 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[68.210.85.209.rep.mailspike.net : 127.0.0.18]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[4]; IP_SCORE(-0.95)[ip: (-0.07), ipnet: 209.85.128.0/17(-2.97), asn: 15169(-1.65), country: US(-0.05)]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[68.210.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-0.99)[-0.987,0]; FORGED_SENDER(0.30)[chuck@freebsd.org,ctuffli@gmail.com]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[chuck@freebsd.org,ctuffli@gmail.com] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 19:52:44 -0000 On Sat, Mar 14, 2020 at 1:16 AM Dimitry Andric wrote: > > On 14 Mar 2020, at 04:53, Masachika ISHIZUKA wrote: > > > >>>>>>> cc: error: no such file or directory: > >>>>>>> '/usr/src/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/ittnotify_static.c' > >>>>>>> cc: error: no input files > >>>>>>> *** [ittnotify_static.pico] Error code 1 > >> > >> 'make cleanworld' solved it, build without error. > >> I used to always delete obj for years, but I've not done that for a > >> couple of years without any problems I've noticed. > > > > Thank you for information. > > I'll try it. > > Obviously, cleaning up your /usr/obj will always help, but that is not > the point of the fix. It should always be possible to do an incremental > buildworld, but there is a deficiency in our dependency tracking system. > When a file changes extension, but its basename stays the same, the > tracking does not notice it. 0. rm -rf the obj directory contents 1. buildworld using r358851 (just prior to the llvm/clang commit) this completed. Note I do use MAKEOBJDIRPREFIX when building 2. update to r359007 and buildworld fails with: cc: error: no such file or directory: '/usr/home/ctuffli/dev/freebsd/freebsd.hg/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/ittnotify_static.c' cc: error: no input files *** [ittnotify_static.pico] Error code 1 The build log does not show "Removing stale dependencies" The first two lines of the amd64 depend are: $ head -2 ../obj/usr/home/ctuffli/dev/freebsd/freebsd.hg/amd64.amd64/lib/libomp/.depend.ittnotify_static.pico ittnotify_static.pico: \ /usr/home/ctuffli/dev/freebsd/freebsd.hg/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/ittnotify_static.c \ The first two lines of the 32-bit depend are: $ head -2 ../obj/usr/home/ctuffli/dev/freebsd/freebsd.hg/amd64.amd64/obj-lib32/lib/libomp/.depend.ittnotify_static.pico ittnotify_static.pico: \ /usr/home/ctuffli/dev/freebsd/freebsd.hg/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/ittnotify_static.c \ --chuck From owner-freebsd-current@freebsd.org Sun Mar 15 23:28:03 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8039727BCE6 for ; Sun, 15 Mar 2020 23:28:03 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-qb1can01on0616.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5c::616]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48gbFr55XCz4SRN for ; Sun, 15 Mar 2020 23:28:00 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fysBiTldM2yrI82q31Mp6NXe/9VimPxBHvwqho5W1WZEw0B5AqpjJ+mx8nEUyawQNz+EQVHJEx/O4tvATrDyszb/ir/oFdC1MMkrmE7rOrkgbEkVGiF1lWusqtKYCHe51ddifYWbUVXKWRQVlUCr2OxMd5qLYdJVb3dDF8609IBrRT93cKtP6zzyNPLZ8Payi1UcRQo9ByFNZpfBUZyiNBZB3qkqNPAQReBKmwSBk/z2MHpRX2LPy5LP5HDi0hGzLqWEJKFbtNBj18j/Pqbvb7ZJV/QD6xPiMqeVLDe4mXc8/jr9rfuK1Lm1dcTkimDmVcQNDzk2rzas78gySR0Wdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=otBtirC8rNtWwxAYy5hZmNIyyRfcvVPYqPiBZZd2FG4=; b=mdKWqfEByYL5qUnL6Yn06p0sCklGK8cCMwohXA+xKJr9QcSKffLY5zsnSVa/ZxE4IIypoCdLsI6mf/sqEoe9MZvK1K7xChXVSQg9zzgT/BPOZZGzP6djg0S+t0fz+NDGbR6cGuwHvyH5SJlE2rIuGl0E3+YjKrLswVMt4eLdzIiYiQi4ctfQXEoyNE+pbgDaJkpDb1PyM2BLdXsLXPEgV0fg8lncR9PIZWEEgk5ig223KzRQqhuJCfMW/rlYfly7kfaSyyxlGdrJTqVSRGCdNG6ldBj+PbwMfc4EaKOsnoPpj5WjfX0W8TAshwbEYu4frQsShFKuLCjKdtZyZezwmQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM (10.255.46.82) by YTBPR01MB3454.CANPRD01.PROD.OUTLOOK.COM (10.255.46.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2814.21; Sun, 15 Mar 2020 23:27:58 +0000 Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4]) by YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4%6]) with mapi id 15.20.2814.018; Sun, 15 Mar 2020 23:27:58 +0000 From: Rick Macklem To: Ronald Klop , "freebsd-current@FreeBSD.org" Subject: Re: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Topic: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Index: AQHV+Z9BqmBxwqP+PUqf7mEWx47LjahJ/1YAgABL3DI= Date: Sun, 15 Mar 2020 23:27:58 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 7dd0b60e-0db8-41d5-42ae-08d7c9387f28 x-ms-traffictypediagnostic: YTBPR01MB3454: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:5236; x-forefront-prvs: 0343AC1D30 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(346002)(136003)(376002)(39860400002)(396003)(199004)(76116006)(110136005)(8936002)(81156014)(81166006)(8676002)(5660300002)(71200400001)(33656002)(86362001)(7696005)(786003)(316002)(2906002)(186003)(66476007)(55016002)(64756008)(66446008)(66556008)(6506007)(66946007)(9686003)(966005)(478600001)(52536014); DIR:OUT; SFP:1101; SCL:1; SRVR:YTBPR01MB3454; H:YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: XtW8y6dzygQAAHIfw2t/PFlWJv5EuB+q5P2Kj/8NDlJJe/zYhP9NtE8g1YCHuFmsKq9tTq56K6V4xPgCQbNRmOpKEFHwOhbMv5AlR+MpX4Dx1UTV6fmCW+0pb1ov2QEHwJ8Q2IrNCN4lbzKgI3emP0rN29zQqmhULatkgGTos9pDm1L1qVHaPNKwJ7YGl1d00r0brHbL3qLGzaNfEE2Mqg== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 7dd0b60e-0db8-41d5-42ae-08d7c9387f28 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2020 23:27:58.4261 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: dwlCT7c13VLNBf6fW+9oiqwcmdarKjZPWr/IQsLfjAKzkFjZXUoG2rJlCkFwlqtJyOaT+qec/N96STvf+HzqvQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTBPR01MB3454 X-Rspamd-Queue-Id: 48gbFr55XCz4SRN X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 2a01:111:f400:fe5c::616 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-3.72 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.988,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; IP_SCORE(-1.43)[ipnet: 2a01:111:f000::/36(-4.00), asn: 8075(-3.10), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; SUBJECT_ENDS_QUESTION(1.00)[]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Mar 2020 23:28:03 -0000 Ronald Klop wrote:=0A= >On Sat, 14 Mar 2020 02:28:22 +0100, Rick Macklem =0A= >wrote:=0A= >=0A= >> Hi,=0A= >>=0A= >> Since it is done in sample code, I have an option in the RPC-over-TLS=0A= >> server daemon that does the SSL_CTX_set_client_CA_list() call.=0A= >> When I test, I have not used this option and the code seems to work.=0A= >> Maybe this is because the client only has a single certificate?=0A= >>=0A= >> Here's the lame description I have in the man page for the option:=0A= >> .It Fl C Ar client_cafile=0A= >> If this option is specified, the server calls=0A= >> .Dq=0A= >> SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(``client_cafile''= ))=0A= >> during TLS context configuration.=0A= >> I do not know when this is needed, but it appears to be required for=0A= >> certain TLS configurations.=0A= >>=0A= >> Does someone know when this call is needed?=0A= >> Can you explain it? (Just about anything is better than the above;-)=0A= >>=0A= >=0A= >=0A= >grep -r SSL_CTX_set_client_CA_list /usr/src/* gives a couple of matches=0A= >(sendmail, wpa & unbound). Maybe that source gives a hint.=0A= Good point. I had looked at the s_server in openssl, but not the others.=0A= It looks like wpa and unbound do what I was thinking of and uses the=0A= CAfile argument for both SSL_CTX_load_verify_locations() and=0A= SSL_CTX_set_client_CA_list(SSL_load_client_CA_file()), setting CApath NULL= =0A= for SSL_CTX_load_verify_locations().=0A= =0A= Sendmail and the s_server.c in openssl pass both CAfile and CApath argument= s=0A= to SSL_CTX_load_verify_locations() and then uses the CAfile argument for=0A= SSL_CTX_set_client_CA_list(SSL_load_client_CA_file()).=0A= This means that SSL_CTX_set_client_CA_list() was only called for the CAfile= case=0A= and not the CApath case. (The SSL_CTX_load_verify_locations() man page note= s that=0A= the certificates in CApath are only loaded when verification is being done = and=0A= only when a certificate is not found in CAfile, but that doesn't seem to an= swer=0A= when/if CApath gets used. It is a directory of CA files, but why do it that= way=0A= instead of putting them all in a single CAfile?)=0A= =0A= As such, it stills seems to be a bit of a mystery to me, but it seems that = putting=0A= all the certificates in a CAfile and not using a CApath directory is the si= mpler=0A= way to go.=0A= =0A= I haven't yet decided whether or not I'll specify a command option for sett= ing=0A= CApath. Sendmail does. wpa and unboud don't?=0A= =0A= Thanks for the suggestion, rick=0A= =0A= Regard,=0A= =0A= Ronald.=0A= =0A= =0A= > Thanks, rick=0A= > _______________________________________________=0A= > freebsd-current@freebsd.org mailing list=0A= > https://lists.freebsd.org/mailman/listinfo/freebsd-current=0A= > To unsubscribe, send any mail to=0A= > "freebsd-current-unsubscribe@freebsd.org"=0A= From owner-freebsd-current@freebsd.org Mon Mar 16 08:19:54 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6C0B925E5B1 for ; Mon, 16 Mar 2020 08:19:54 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (mailgate.leidinger.net [IPv6:2a00:1828:2000:313::1:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48gq3X5WcRz4NRG for ; Mon, 16 Mar 2020 08:19:52 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165CEE.dip0.t-ipconnect.de [91.22.92.238]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 396196C46; Mon, 16 Mar 2020 09:19:43 +0100 (CET) Received: from webmail.leidinger.net (webmail.Leidinger.net [IPv6:fd73:10c7:2053:1::3:102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id B61AC3127; Mon, 16 Mar 2020 09:19:40 +0100 (CET) Received: (from www@localhost) by webmail.leidinger.net (8.15.2/8.14.4/Submit) id 02G8JeRx095208; Mon, 16 Mar 2020 09:19:40 +0100 (CET) (envelope-from Alexander@leidinger.net) X-Authentication-Warning: webmail.leidinger.net: www set sender to Alexander@leidinger.net using -f Received: from [::ffff:192.168.1.28] ([::ffff:192.168.1.28]) by webmail.leidinger.net (Horde Framework) with HTTPS; Mon, 16 Mar 2020 09:19:40 +0100 Date: Mon, 16 Mar 2020 09:19:40 +0100 Message-ID: <20200316091940.Horde.16mziiZfZLwd2x3zuIke061@webmail.leidinger.net> From: Alexander Leidinger To: Rick Macklem Cc: Ronald Klop , freebsd-current@freebsd.org Subject: Re: when does a server need to use SSL_CTX_set_client_CA_list()? References: In-Reply-To: User-Agent: Horde Application Framework 5 Accept-Language: de,en Content-Type: multipart/signed; boundary="=_JFcTW89M6Xtr5SY4ANXEc3O"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48gq3X5WcRz4NRG X-Spamd-Bar: ------ X-Spamd-Result: default: False [-6.71 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-0.87)[-0.875,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; HAS_XAW(0.00)[]; TO_DN_SOME(0.00)[]; XAW_SERVICE_ACCT(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; RCVD_COUNT_THREE(0.00)[4]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:2a00:1828::/32, country:DE]; RCVD_TLS_ALL(0.00)[]; IP_SCORE(-3.73)[ip: (-9.83), ipnet: 2a00:1828::/32(-4.91), asn: 34240(-3.91), country: DE(-0.02)]; RECEIVED_SPAMHAUS_PBL(0.00)[238.92.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 08:19:54 -0000 This message is in MIME format and has been PGP signed. --=_JFcTW89M6Xtr5SY4ANXEc3O Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Rick Macklem (from Sun, 15 Mar 2020=20=20 23:27:58=20+0000): > As such, it stills seems to be a bit of a mystery to me, but it=20=20 >=20seems that putting > all the certificates in a CAfile and not using a CApath directory is=20= =20 >=20the simpler > way to go. If you have multiple CAs in the file, the code needs to search for one=20= =20 which=20matches. If you use the path, the code just needs to list the=20=20 directory=20and check the filename which matches the id of the CA-cert.=20= =20 On=20a recent -current system have where you've never run "certctl=20=20 rehash"=20have a look into /etc/ssl/certs, then run "certctl rehash",=20=20 and=20then check /etc/ssl/certs again to see what I mean. For a program which communicates with a lot of different systems which=20= =20 use=20different CAs (mailserver, browser), the path makes sense. For a=20= =20 NFS=20server I wouldn't configure all the Mozilla-accepted CAs. As such=20= =20 a=20CAfile may be enough, but having the possibility for both allows the=20= =20 user=20to chose which way he wants to configure his system (e.g. maybe=20= =20 he=20has just one CA in a directory, but for consistency reasons he=20=20 prefers=20to specify the path to be able to use one way to configure=20=20 things). You=20can do it either way, technically it doesn't matter. It makes=20=20 sense=20to have both possibilities (that would be my preference, to give=20= =20 the=20user the choice which way he wants to handle it). Having only the=20= =20 file-way=20would not be stupid (as you can see with wpa and unbound,=20=20 which=20are used in a similar way in this regard than one would use=20=20 NFS).=20Only the path-way would be less favorable in my opinion. > I haven't yet decided whether or not I'll specify a command option=20=20 >=20for setting > CApath. Sendmail does. wpa and unboud don't? Sendmail needs to use more than one CA if it wants to validate=20=20 connections=20from anyone, and it wants to do it in a performant way.=20=20 WIFI=20and DNS typically only need one CA. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_JFcTW89M6Xtr5SY4ANXEc3O Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJebzacAAoJEBINsJsD+NiGyDMP/RYTDvwDKNqGDGl+I25+JRNd gGQkjTse/+F+9RIElG4z8id2tsCN8tQiHK0kinFxUNorPO830qLIVL821K2428ZG AHvnKi9BdReLloqEkvnNUZtfLbrNNxX3mE7eVV6ZQVCHgNRSuU6Tj+3ZFOL7cZci 7mmgsCNyTeYNWob4r6r1/lLx4NnfGYsX8Y5Tfj69/mFdZ/zM2p/RoxuOr77m44p+ gZGisJgQk0pv7Iq6RzphdJW1Bk7k6JtKZzwoExsvL2rxNJltP5LEJps+o9i8lDtv NfVtXu3MSU8kXZCrXleYHubZc9DMWY2pNCk7J88sbmQyqrURW6fSJuLoStWM+R99 pwOENqggdAmpebOKa/OuKIu1AW2HeGQq+gl4sskrkRcpSx/aBavmC43dReDcoXL2 eXXJuYdoGOnmg/d/VmPKBiCXM/PTutaDFEQrFBkEiFWdwpKwRoTZTAs3M7TZ5gvP 8xYfkp8+Jj71lEoVtbioNaA7tRwnG2vyjCPVxKtIsYoSNBDL1ft2bG8h0Q/ftUkb RkwgJQ/BeGT/K0s8hbsjIGTNR6qdSbiQ3zr0iYmsgUG+I3G5deb3ZwSokFJGKgWZ aSy0lm/RodSuk/R6GFFNCQuncIlT18KHptM0p2jmsJVHUzBZiUnhGUjTqQ6akfZ4 fXdWpVwndf9NWeThl4z7 =aFLJ -----END PGP SIGNATURE----- --=_JFcTW89M6Xtr5SY4ANXEc3O-- From owner-freebsd-current@freebsd.org Mon Mar 16 21:38:17 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9D0FB27015B for ; Mon, 16 Mar 2020 21:38:17 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic310-21.consmr.mail.gq1.yahoo.com (sonic310-21.consmr.mail.gq1.yahoo.com [98.137.69.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48h8ml3jPfz3y3j for ; Mon, 16 Mar 2020 21:38:15 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: ._OGYaEVM1msV6GWgQPtsltdRfE3Cw20ilreJeTQhr4A52xF3zETNz4gaRh7Gfx MosGMcf43WSVGtZ3M3C74ufuWlbO9RaqOggQsT0YeokVQdA_nzNuf3LAQrx6UM_CL4zRujq8sTgR NwRTauAy6tRCa5G0clnHaIwlpseKoTdKBZIizXtC53jz78JY5HZH3cQP4VCr8r2hNb7JLsNlhH4v 1KsEp3pAbz8gV4Bwi6HQOuyRIa37qfGHjtiCUHNp5VvTti5ZzCis219eg44_Rvz4vTZxT1yXfK_O 0ZbCrmSha9ika_ruvNUbI5vM.It6y9ta4G4QSXcfXcKHn58kTPy6uhgHCAHiXGRA6.fNn01.c.90 LKIqrzjQePUeQ7of4PEg9iWnpMHAky5DEFSwOiZXNmGTo78PIL5DSUxSOtuRtqMDos5iAGm1Ash1 tV2z_KSpgB5N0j9liz8trNrJcmj5VJrLPOj9umZHElFMJq_b1iip8rF0SECYzg06q9mnrqTVVt0h KIZUHDrozaXv6xXGq59itG4.09.8iRpYA5TUesbVnbhu_DqaJRlBZOunhS_.zHsJ._Lu73ativfU FIfVX0_kcjmOzNT16Djc1rFLFjd3DvxR9CZRBtvZew_5vl40m.uGn2Cx6sPQVPl1KtGtLhLA9Sqb xX2.frPUsVPL9Sfb.ycn5yFZq0RdpfIBfOTj7P2fwrZZSoAhzRewL0vlmHplSK5jRclAcS1K9eHy HTxgemFsHsL1v_.RVPuHV7HP7jwbj5DdQa0DOYpXthddhc7tlA.tV5qNs8PVvezNb7siLhapmUm2 DTU1ea.RvDnmLq8dSdIrr8Z3BTTHR_HHZI_TaoTHlmQHjoWeIA5om7yy0R57nvNZaU_lG.G9YDnq Img2Nt3jrO2gQLaX.gwCtOtxi.fSt08KlBhVuSq3MmH.GvcxWK81O0OSNjQkqjbRfSo.2iQNAdmY fhCIp6EJoI7qmTGxNG5s6Y2XNgsV8pIOZo14kquyMuzic5Lz5eMkejeYFFZ13xj1RPjo6LTJpNHh gCAG10N26fbybuTuIVha6E.TBQXmErJ3Ep.BDMHiSz3_d0ygHJnvpcqgOcYM.9lUYHMbotctoyyJ YUV5l.AJ9H8Ko8PLa6dOuNUg2UiAVEGP61BJPtZQ1ywjm2BgRbL.UZ6ZF2mckCH78XicsRrkrWAZ 9ZlN1rZZrZHlOJv1bxUPEXT07Qol1CmCKweXMeia3ZtybfgDKt8ohzjAyH3X2e3qBduX_8YEvGEv 2p1kROFWp54GrTcJCyhiL5aVP5CuHMKmpcTxwM8VwjKNcMDAn17wM2S7ZKq16jDAvm6NUQlv38pS zD6Mjl5Z0bsHAx1p2A6H5ONgT3kVn33XzEsmn3gklpf_2YPyPe_KTSsr_3x8R4dNDYwicKOJ8hBp hSRlfzMkGn6skhoA04gwbZXhdb2BjxstwEH3sANhwZVJ2pfqIXEyvub1rKA-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic310.consmr.mail.gq1.yahoo.com with HTTP; Mon, 16 Mar 2020 21:38:13 +0000 Received: by smtp404.mail.ne1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 32dc05ca41e8c722ac2471342e4bb61a; Mon, 16 Mar 2020 21:38:12 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: Build failed compiling ittnotify_static.pico Date: Mon, 16 Mar 2020 14:38:10 -0700 References: <84F40BA3-ABFE-4567-B76D-54FDCBC57B32@yahoo.com> To: FreeBSD Current , Ed Maste , Dimitry Andric In-Reply-To: <84F40BA3-ABFE-4567-B76D-54FDCBC57B32@yahoo.com> Message-Id: X-Mailer: Apple Mail (2.3608.60.0.2.5) X-Rspamd-Queue-Id: 48h8ml3jPfz3y3j X-Spamd-Bar: + X-Spamd-Result: default: False [1.22 / 15.00]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; FREEMAIL_FROM(0.00)[yahoo.com]; MV_CASE(0.50)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/21, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(0.00)[ip: (3.27), ipnet: 98.137.64.0/21(0.83), asn: 36647(0.66), country: US(-0.05)]; NEURAL_SPAM_MEDIUM(0.99)[0.992,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(0.73)[0.730,0]; RCVD_IN_DNSWL_NONE(0.00)[147.69.137.98.list.dnswl.org : 127.0.5.0]; RWL_MAILSPIKE_POSSIBLE(0.00)[147.69.137.98.rep.mailspike.net : 127.0.0.17]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 21:38:17 -0000 On 2020-Mar-13, at 16:01, Mark Millard wrote: > Bob Willcox bob at immure.com wrote on > Fri Mar 13 21:08:16 UTC 2020 : >=20 >> My 13.0-current system (just updated about 2 hours ago) that is = failing with this >> error when trying to do a 'make makeworld' >>=20 >> --- ittnotify_static.pico --- >> cc -target x86_64-unknown-freebsd13.0 = --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp = -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin -fpic -DPIC -O2 -pipe = -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS = -I/usr/src/lib/libomp -I/usr/src/contrib/llvm-project/openmp/runtime/src = -I/usr/src/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify = -ffunction-sections -fdata-sections -g -MD = -MF.depend.ittnotify_static.pico -MTittnotify_static.pico -std=3Dgnu99 = -Wno-format-zero-length -fstack-protector-strong -Wno-atomic-alignment = -Wsystem-headers -Werror -Wno-pointer-sign -Wno-empty-body = -Wno-string-plus-int -Wno-unused-const-variable = -Wno-tautological-compare -Wno-unused-value -Wno-parentheses-equality = -Wno-unused-function -Wno-enum-conversion -Wno-unused-local-typedef = -Wno-address-of-packed-member -Wno-switch -Wno-switch-enum = -Wno-knr-promoted-parameter -Wno-parentheses -Qunused-arguments -c = /usr/src/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/ittn= otify_static.c -o ittnotify_static.pico >> cc: error: no such file or directory: = '/usr/src/contrib/llvm-project/openmp/runtime/src/thirdparty/ittnotify/itt= notify_static.c' >> cc: error: no input files >> *** [ittnotify_static.pico] Error code 1 >>=20 >>=20 >> Anyone else seeing this? Any suggestions for a fix? >=20 >=20 > The problem introduced in head -r358851 was supposed > to be fixed by head -r358907: >=20 > QUOTE >=20 > Dimitry Andric dim at FreeBSD.org=20 > Thu Mar 12 11:39:07 UTC 2020 > =E2=80=A2 Previous message (by thread): svn commit: r358906 - = head/stand/i386/libi386 > =E2=80=A2 Next message (by thread): svn commit: r358908 - in = head/sys: conf modules powerpc/conf > =E2=80=A2 Messages sorted by: [ date ] [ thread ] [ subject ] [ = author ] > Author: dim > Date: Thu Mar 12 11:39:04 2020 > New Revision: 358907 > URL:=20 > https://svnweb.freebsd.org/changeset/base/358907 >=20 >=20 > Log: > Allow -DNO_CLEAN build across r358851. >=20 > The openmp 10.0.0 import renamed one .c file to .cpp, and this is > something our dependency system does not handle correctly. Add = another > ad-hoc cleanup to get rid of the stale dependency. >=20 > PR: 244251 > MFC after: 6 weeks > X-MFC-With: 358851 >=20 > Modified: > head/Makefile.inc1 >=20 > Modified: head/Makefile.inc1 > = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D > --- head/Makefile.inc1 Thu Mar 12 06:45:08 2020 = (r358906) > +++ head/Makefile.inc1 Thu Mar 12 11:39:04 2020 = (r358907) > @@ -924,6 +924,15 @@ _sanity_check: .PHONY .MAKE > _cleanobj_fast_depend_hack: .PHONY > # Syscall stubs rewritten in C and obsolete MD assembly = implementations > # Date SVN Rev Syscalls/Changes > +# 20200310 r358851 rename of openmp's ittnotify_static.c to .cpp > +.for f in ittnotify_static > + @if [ -e "${OBJTOP}/lib/libomp/.depend.${f}.pico" ] && \ > + egrep -qw '${f}\.c' ${OBJTOP}/lib/libomp/.depend.${f}.pico; = then \ > + echo "Removing stale dependencies for ${f}"; \ > + rm -f ${OBJTOP}/lib/libomp/.depend.${f}.* \ > + = ${LIBCOMPAT:D${LIBCOMPAT_OBJTOP}/lib/libomp/.depend.${f}.*}; \ > + fi > +.endfor > # 20191009 r353340 removal of opensolaris_atomic.S (also r353381) > .if ${MACHINE} !=3D i386 > .for f in opensolaris_atomic >=20 > END QUOTE >=20 > I've not upgraded to a lvm10 based vintage yet. I found > the above while looking into if updating looked reasonable. > So I've no direct evidence of if the change served its > purpose or not. >=20 > But it does suggest that removing any stale files > from the build area that have names matching: >=20 > .depend.ittnotify_static.* >=20 > is supposed to be sufficient to get rid of old > ittnotify_static.c file references for the following > build attempts. >=20 > It looks like two separate lib/libomp/ areas may have > such files. >=20 Another kind of path that I've run into the issue with is: = /usr/obj/usr/src/amd64.amd64/nxb/*/lib/libomp/.depend.ittnotify_static.pic= o where * was sometimes arm.armv7 and sometimes arm64.aarch64 in my context. I simply deleted such files and retried the builds. =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-current@freebsd.org Mon Mar 16 21:44:44 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BA1A7270C64 for ; Mon, 16 Mar 2020 21:44:44 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660043.outbound.protection.outlook.com [40.107.66.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48h8wB4HGkz4DFc for ; Mon, 16 Mar 2020 21:44:42 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=THKaTSNGZ7QI+Uww9MzwHp5cze6eQYH0MVK1CjZLUD88F0/nXni+SuhsP4AAkzxW/CV4/W/gIayWPp5yDARXFpAN4Xe+jlzPuvM8TJLJqgaCzgj1ewCFqMCCFclXtENyS3hZmG1hbxiBV4J08PReYprrvLALRUOQDdPKBElG3JeLYbA+b98QPQZ9ErnnjOxYNFDWSonbuIjlCAcgY1MvivDn3VqOgGBAJR4M2sfMMiHTPVsmLm6sFuJ21EvXfWuuLd3Q1qlDIu6XBDmmCmHf5gSPTg9xwqro4rlNEN2NVbxATtceu/Taek4aCt9677R2W40TMAN7BjMfUqsXgWUqVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hIETBVl3k3NefPUUMFUya22lUxmJtjPFXPAFIc563iM=; b=Iv5+TzfWsXs9WZldw2KvbZl5LO1jmN2+oiF98jWz7I4fmGhXp3S+RCMubjl+ndFAcrWGBJL1yINc1QQogISsSjRmCYA/T0MNn1a8Ad9t3yBD6ZSUU/rbVMV3GHqqALVtrE/2uape+k4YKZBpUNC+xzyESHlP+++iM9G1amxVPtx/qXQ8p0lb6n9q27W4+kfk8+KQGN518BdIj/4NtkK1ybt+ZBvPnpuYd6CyR6cbrejUeRHXbfG8Erb6zRs8BSv8pChL/R3M847aTVexEsC5YE9vOfDyvG93esXYkwxPi2LhBM61vJjVAd05bqyxeW3bHz+z2u6C8BLBqH3amknWEQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM (10.255.46.82) by YTBPR01MB3502.CANPRD01.PROD.OUTLOOK.COM (10.255.46.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2814.21; Mon, 16 Mar 2020 21:44:40 +0000 Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4]) by YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4%6]) with mapi id 15.20.2814.021; Mon, 16 Mar 2020 21:44:40 +0000 From: Rick Macklem To: Alexander Leidinger CC: Ronald Klop , "freebsd-current@FreeBSD.org" Subject: Re: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Topic: when does a server need to use SSL_CTX_set_client_CA_list()? Thread-Index: AQHV+9rU9owsQVvLs0u1H0PZkYY2cg== Date: Mon, 16 Mar 2020 21:44:40 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 898b09aa-d12b-4df5-a908-08d7c9f33b07 x-ms-traffictypediagnostic: YTBPR01MB3502: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:765; x-forefront-prvs: 03449D5DD1 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(346002)(376002)(366004)(396003)(136003)(199004)(2906002)(33656002)(4326008)(966005)(66946007)(478600001)(6916009)(64756008)(66556008)(66476007)(86362001)(66574012)(76116006)(91956017)(66446008)(26005)(316002)(6506007)(186003)(54906003)(5660300002)(7696005)(9686003)(8936002)(55016002)(8676002)(71200400001)(81156014)(52536014)(81166006)(786003); DIR:OUT; SFP:1101; SCL:1; SRVR:YTBPR01MB3502; H:YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: Fq0Fg+HE+63keMRYYvdN8SSudhbprhmALjKF6uWfdsJipjCdyvwpd3aKWmH7e2LPnJn/2Sdhhw7YrV2oHAL2MV3eIlFyGytPpqVi9H9WsYyNb/Xo4bx4N9csv+kQc4Dl6zvbLEK3OddI8oeKMaSHCg== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 898b09aa-d12b-4df5-a908-08d7c9f33b07 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2020 21:44:40.0388 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: QPnrMVGw1WwrC5A19iGDyPRWoIeAQtmPXV1t/W2b9yNDrdnLbUNyHNJgL3n/+MhQ6RhYgN8sRKfZHgBbE8cvLg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTBPR01MB3502 X-Rspamd-Queue-Id: 48h8wB4HGkz4DFc X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.66.43 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-2.66 / 15.00]; FAKE_REPLY(1.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.98)[-0.976,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[uoguelph.ca]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[43.66.107.40.list.dnswl.org : 127.0.3.0]; RCVD_TLS_LAST(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:8075, ipnet:40.64.0.0/10, country:US]; ARC_ALLOW(-1.00)[i=1]; IP_SCORE(-1.39)[ipnet: 40.64.0.0/10(-3.77), asn: 8075(-3.10), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 21:44:44 -0000 Alexander Leidinger wrote:=0A= >Quoting Rick Macklem (from Sun, 15 Mar 2020=A0 =0A= >23:27:58 +0000):=0A= >=0A= >> As such, it stills seems to be a bit of a mystery to me, but it=A0 =0A= >> seems that putting=0A= >> all the certificates in a CAfile and not using a CApath directory is=A0 = =0A= >> the simpler=0A= >> way to go.=0A= >=0A= >If you have multiple CAs in the file, the code needs to search for one=A0 = =0A= >which matches. If you use the path, the code just needs to list the=A0 =0A= >directory and check the filename which matches the id of the CA-cert.=A0 = =0A= >On a recent -current system have where you've never run "certctl=A0 =0A= >rehash" have a look into /etc/ssl/certs, then run "certctl rehash",=A0 =0A= >and then check /etc/ssl/certs again to see what I mean.=0A= >=0A= >For a program which communicates with a lot of different systems which=A0 = =0A= >use different CAs (mailserver, browser), the path makes sense. For a=A0 = =0A= >NFS server I wouldn't configure all the Mozilla-accepted CAs. As such=A0 = =0A= >a CAfile may be enough, but having the possibility for both allows the=A0 = =0A= >user to chose which way he wants to configure his system (e.g. maybe=A0 = =0A= >he has just one CA in a directory, but for consistency reasons he=A0 =0A= >prefers to specify the path to be able to use one way to configure=A0 =0A= >things).=0A= >=0A= >You can do it either way, technically it doesn't matter. It makes=A0 =0A= >sense to have both possibilities (that would be my preference, to give=A0 = =0A= >the user the choice which way he wants to handle it). Having only the=A0 = =0A= >file-way would not be stupid (as you can see with wpa and unbound,=A0 =0A= >which are used in a similar way in this regard than one would use=A0 =0A= >NFS). Only the path-way would be less favorable in my opinion.=0A= Well, I can easily provide command line options for both CAfile and CApath.= =0A= The part that confuses me is that only CAfile gets used for:=0A= SSL_CTX_set_client_CA_list(SSL_load_CA_names(CAfile))=0A= in the examples I've found, so the CA list that goes to the client doesn't = seem=0A= to get set for the CApath case?=0A= As such, there does seem to be a technical difference between using CAfile = and=0A= CApath.=0A= =0A= And Garrett seems to indicate SSL_CTX_set_client_CA_LIST() should always be= done.=0A= =0A= Note that NFS will often (not always, that's a decision for the NFS admin) = want=0A= certificates from clients (something that a web server doesn't normally do)= .=0A= =0A= For now, I'll just provide both command line arguments, but note in the man= =0A= page that SSL_CTX_set_client_CA_list() is only done for CAfile.=0A= =0A= Thanks for your comments, rick=0A= =0A= > I haven't yet decided whether or not I'll specify a command option=A0 =0A= > for setting=0A= > CApath. Sendmail does. wpa and unboud don't?=0A= =0A= Sendmail needs to use more than one CA if it wants to validate=A0 =0A= connections from anyone, and it wants to do it in a performant way.=A0 =0A= WIFI and DNS typically only need one CA.=0A= =0A= Bye,=0A= Alexander.=0A= =0A= -- =0A= http://www.Leidinger.net Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF=0A= http://www.FreeBSD.org=A0=A0=A0 netchild@FreeBSD.org=A0 : PGP 0x8F31830F9F2= 772BF=0A= =0A= =0A= From owner-freebsd-current@freebsd.org Mon Mar 16 22:23:11 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BC2D52719C3; Mon, 16 Mar 2020 22:23:11 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (static-24-113-41-81.wavecable.com [24.113.41.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "ultimatedns.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48h9mZ1thMz4Rbw; Mon, 16 Mar 2020 22:23:09 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (localhost [IPv6:0:0:0:0:0:0:0:1]) by udns.ultimatedns.net (8.15.2/8.15.2) with ESMTPS id 02GMNC2U049755 (version=TLSv1.2 cipher=DHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 16 Mar 2020 15:23:18 -0700 (PDT) (envelope-from bsd-lists@BSDforge.com) X-Mailer: Cypht MIME-Version: 1.0 From: Chris Reply-To: bsd-lists@BSDforge.com To: freebsd-stable , freebsd-current Subject: what 3rd party boot mgr is required to boot multiple freebsd versions? Date: Mon, 16 Mar 2020 15:23:18 -0700 Message-Id: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 48h9mZ1thMz4Rbw X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of bsd-lists@BSDforge.com has no SPF policy when checking 24.113.41.81) smtp.mailfrom=bsd-lists@BSDforge.com X-Spamd-Result: default: False [3.04 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[bsd-lists@BSDforge.com]; XM_UA_NO_VERSION(0.01)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[BSDforge.com]; REPLYTO_ADDR_EQ_FROM(0.00)[]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.95)[0.947,0]; IP_SCORE(-0.30)[ip: (-0.47), ipnet: 24.113.0.0/16(-0.23), asn: 11404(-0.75), country: US(-0.05)]; TO_DN_ALL(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.48)[0.479,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:11404, ipnet:24.113.0.0/16, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 22:23:11 -0000 I'm attempting to boot multiple versions of FreeBSD=2E I started with an install of older 11 with a (u)efi boot partition installed=2E I then grabbed an current 11 usbstick, and installed that=2E Which stated it needed to install a (u)efi boot partition=2E I let it do it=2E But the new (additional) install doesn't show up at boot=2E Altho my UEFI BIOS sees it=2E I guess there are just too many uefi bios versions, and too many changes in the FreeBSD uefi boot code to expect consistent results over the long haul=2E Should I just convert the 1st efi (GPT) boot partition to a PMBR, and delete the second efi partition=2E Or is there a recommended bootmanager I can use to boot multiple versions of FreeBSD? Windows? Thank you! --Chris From owner-freebsd-current@freebsd.org Mon Mar 16 22:24:34 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E8E91271C7F for ; Mon, 16 Mar 2020 22:24:34 +0000 (UTC) (envelope-from karl@denninger.net) Received: from colo1.denninger.net (colo1.denninger.net [104.236.120.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48h9p91X8nz4VH1 for ; Mon, 16 Mar 2020 22:24:32 +0000 (UTC) (envelope-from karl@denninger.net) Received: from denninger.net (ip68-1-57-197.pn.at.cox.net [68.1.57.197]) by colo1.denninger.net (Postfix) with ESMTP id E64312110BD for ; Mon, 16 Mar 2020 18:24:25 -0400 (EDT) Received: from [192.168.10.25] (D15.Denninger.Net [192.168.10.25]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by denninger.net (Postfix) with ESMTPSA id A763C16B8E5 for ; Mon, 16 Mar 2020 17:24:25 -0500 (CDT) Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? To: freebsd-current@freebsd.org References: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> From: Karl Denninger Autocrypt: addr=karl@denninger.net; prefer-encrypt=mutual; keydata= xsFNBF1Rd+gBEACmLAH7SAzdQq57ZN56QQEy0jDFfH5BvGOMZgCaP+Y5lJQ5u9WphCoCALMs Rg0o1Q9DRNWgUmy/cgsxioXAEzZFXXzOHPJhwplVOgfjxnoByD5KQhWG8Owm9QmATdtiZPSV 4UYVNUIbZv7btSnnAXysG2OUHajYS5PVeFQxFbhNFq/SS8VaXr1WEVTFa8NFKp2W3/KY1A+U KKDUlYwnOauK3fnY9chF2IRSoxAbBJFrJ4lPGz04HtzNos4Q9CBfTphKcdFjcPntNS9wrqs3 sm+7hLNTH9B2Kj6aekG5UhD03eyP+gevTgBy51RL6ULzI13Kc4aeyOByuBXrA8D2m2Ee67iy 4+ZSxM9Wn1gQce5624OWzCYIGBH2r75Bshp1KHKu36N2rN//kyKYnwl/z6UZB/S9cMUFKZgL gFx7QxpFX/HvSiBcPfcGS0meModpg6qma7/2jRoQAXacslpiT+uOfRGspNbnglkbw435RzX/ kMUclJQNZBBBUpPiGjVCjeBTiAfN8TyjS+pWzwxNCUZWbYO5xVaS0gbIhgVNoBOGn1rdTsdA PP65SRjaoL5KY6bzkkzrXLB2Djx8/p4vr0qIqxIQWbewJq3xKyKGiqI46ae77BF7k0B++Ndx g9K9UeWKl/iJ0eoI0ftR+xH3aIHTU1Or3j/tj4j8Z0tnVSyt1wARAQABzSNLYXJsIERlbm5p bmdlciA8a2FybEBkZW5uaW5nZXIubmV0PsLBfwQTAQgAKQUCXVF36AIbIwUJCWYBgAcLCQgH AwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEG8twBXrj1l4swkP/3uOzRxW16K6H4JIEIRMUEbt nxDhmk+gR/7H9phg7HtvR7i22QejZX1N1NHcGRNmBwLshWVjJkHKhCE/AM8Cf9XyaV2ft6qn g1xK6NuhapxVuaaMeCVPUzsPkTcR+JMl72ZR4Q+mJMVQButCITekmr7aIzIZ80fF0t86rnq+ O74ZGt0SAMsLV/GAKlIw8fGMi9Xj4OKDgqmxTnIoV4+0mpo26W957pnlOrjN3/6VqWUyAdHH DkyqsuP/9jx2f5pZCcD7X04+93GI+sGb1s6BOFRHq2oJgs6W0z0nPx5Ks9MDDgSQlxXAryje 17WphTR7DWn1BeF3Y8AhRkzc2+Mgc5s1i2fPe6YwvksDNOEyNXIvFV7chwDQYb0Q3I8XsoHu 2WUjXp0kVokobJPdVdY55nbY+brezweRJMiEpFtGOmoUekQWlI5KS1kE8+Xuqpm+MSxEpqY8 5ncPt0lekOrICGajlOotkUK86iVemlW1rMzMc5Xwp9j8oxa+bRtGD6u1rYz4i+qIdE+GSCBy 1nnHN/my0nefhQyHXr8wGVEbyiMZCten9fm1iXpBr0jY+tvtbo8XqZQG7Lr+3kSO6VUgc8kW IPf2HxIV7AnGUN+ddZGCcPPhb2mY/Yy7si54wJFj6YoG+/+rNjF9F5d8WeLoeUWczgHTvZmS o6F7UhjjuwzgzsFNBF1Rd+gBEADNVFS8nQ+kpKOpgtP+f3bCVxHAm7eHMbX6oew5yZiQwfD+ 1RWNWLVOMeTt7G2e5HsHpJOUwFUJhbDb0omB0r38xTSVSAig9kmUfb7tTMJG2bG7WfWykBOM WIZ4OhCf+ISv9dUkjNgx4ionWotFxwDiPRwWumVQ7WYZmRZlhDWMiaHgKvBrjJ7Y6GKPRbQc 5/0Qz9xGhXKlFxDQrrSMkyRThIOxXqdfD9z3rEsV3ZwOojzNsnkIImnQMKyIAR0FBQop34G9 wDQi7fxk8wGIfDszwfR4oAdDdPGq4gcAvE7Fd3xKyNpGyjSED5szoaFjldaZSXQIffquSUvy sFCTTLRIso5Dn9uQgi57gIv+5mnyKBfm2Z2P6pEQPSt073TED9rS0+JpniJL7rKRVpO5niqw sQJS6ht+JF88rXro+SiwxD/KeDpTuuJ10+ohLVi1Y+X82X7BIQEhqtFp9FVJSds4o/eNyaHd SoqfoeWMy3EV+rdJ3DneXcPS1BgxO57Rko5Hx3NUSVK83ovFb+Ofes9SLNdqNu3xAUcfpRdS DyxzpVbCq6Y2CIojiaweiYe5BOBhmR9OPGhqP8YD7GukYmQufAVuOrIVyctBlVPHgMBb+UX+ ItYXuX4weSJWLOsmM45xd/EYvBq2DWFpKlyihoktNzTGqxGsNeG7gCOEUTAnUwARAQABwsFl BBgBCAAPBQJdUXfoAhsMBQkJZgGAAAoJEG8twBXrj1l4Dm0P/iEx2gIHSOnvgpG799Vf2RM0 7gPbDWzDaw8YTV49H+VTOqq7RlT52aO0QfNAmtppX0V1/5f30fuSCF46NWnYGu35P/LvOAPb sLbeWCyJy4GOPN4cjsBMbgmooGdl24RdcvGMmY177o7oOSWBqXfhAj+YA6r+hEar1qxqLgwB Gy8wAId4qYSQhN/FxiQbyUs2tPAI6Wn/41pI7Hu6WgmRGpZrBv8HhVV9Gl7jallSsS/g+fhu WRbDKCknUS5SX3+w2AUFr4kf62gSSxXBxd075KnViV9c0sraAPI31XbM5QUc0Xssfaqs6Srr z4MjKaLhb7GD8C1JwI23PuGdFvk9WK996UvIyjdWIE99VSlg/5gEKkXzwx7oysrSG9BqkfGf I4addK55xRQPul0V3s2LtDoQTxg3VHrL6wrvGhYUcTHLmlsvNx1EOb5a3xBT+SUK/Ltq08LW YcmNbU/G217MlfvDJYHCb0uOtxqJFm8RiZGj2eEcLgvyWnlWCD2rfP4EqCxmpr3Ic725FiQR cBbdTV3clTgclhBG3TA9dxVjfZDcatz5cFBwXP8k5Yn9tNl90T2r79V4SNh1mCHtGTSEf449 qz9tm7EguLchjmoirJTuiipZKcalcHAHtz4VPUykdXsrfEJTzdEcujzqF6v/9CY+DjpAd3et Z0vw7xC5tS+b Message-ID: Date: Mon, 16 Mar 2020 17:24:24 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-512; boundary="------------ms020502010603090702070806" X-Rspamd-Queue-Id: 48h9p91X8nz4VH1 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=denninger.net; spf=pass (mx1.freebsd.org: domain of karl@denninger.net designates 104.236.120.189 as permitted sender) smtp.mailfrom=karl@denninger.net X-Spamd-Result: default: False [-6.33 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.85)[-0.850,0]; FROM_HAS_DN(0.00)[]; SIGNED_SMIME(-2.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; DMARC_POLICY_ALLOW(-0.50)[denninger.net,none]; TO_DN_NONE(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:14061, ipnet:104.236.64.0/18, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-2.58)[ip: (-9.84), ipnet: 104.236.64.0/18(-4.45), asn: 14061(1.43), country: US(-0.05)]; RECEIVED_SPAMHAUS_PBL(0.00)[197.57.1.68.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11] X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 22:24:35 -0000 This is a cryptographically signed message in MIME format. --------------ms020502010603090702070806 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 3/16/2020 17:23, Chris wrote: > I'm attempting to boot multiple versions of FreeBSD. > I started with an install of older 11 with a (u)efi > boot partition installed. I then grabbed an current 11 > usbstick, and installed that. Which stated it needed to > install a (u)efi boot partition. I let it do it. But the > new (additional) install doesn't show up at boot. Altho > my UEFI BIOS sees it. > I guess there are just too many uefi bios versions, > and too many changes in the FreeBSD uefi boot code > to expect consistent results over the long haul. > Should I just convert the 1st efi (GPT) boot partition > to a PMBR, and delete the second efi partition. Or is > there a recommended bootmanager I can use to boot multiple > versions of FreeBSD? Windows? > > Thank you! > > --Chris > Refind perhaps? --=20 Karl Denninger karl@denninger.net /The Market Ticker/ /[S/MIME encrypted email preferred]/ --------------ms020502010603090702070806 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgMFADCABgkqhkiG9w0BBwEAAKCC DdgwggagMIIEiKADAgECAhMA5EiKghDOXrvfxYxjITXYDdhIMA0GCSqGSIb3DQEBCwUAMIGL MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAf BgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTAeFw0xNzA4MTcxNjQyMTdaFw0yNzA4 MTUxNjQyMTdaMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkwFwYDVQQKDBBD dWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExJTAjBgNVBAMMHEN1 ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQC1aJotNUI+W4jP7xQDO8L/b4XiF4Rss9O0B+3vMH7Njk85fZ052QhZpMVlpaaO+sCI KqG3oNEbuOHzJB/NDJFnqh7ijBwhdWutdsq23Ux6TvxgakyMPpT6TRNEJzcBVQA0kpby1DVD 0EKSK/FrWWBiFmSxg7qUfmIq/mMzgE6epHktyRM3OGq3dbRdOUgfumWrqHXOrdJz06xE9NzY vc9toqZnd79FUtE/nSZVm1VS3Grq7RKV65onvX3QOW4W1ldEHwggaZxgWGNiR/D4eosAGFxn uYeWlKEC70c99Mp1giWux+7ur6hc2E+AaTGh+fGeijO5q40OGd+dNMgK8Es0nDRw81lRcl24 SWUEky9y8DArgIFlRd6d3ZYwgc1DMTWkTavx3ZpASp5TWih6yI8ACwboTvlUYeooMsPtNa9E 6UQ1nt7VEi5syjxnDltbEFoLYcXBcqhRhFETJe9CdenItAHAtOya3w5+fmC2j/xJz29og1KH YqWHlo3Kswi9G77an+zh6nWkMuHs+03DU8DaOEWzZEav3lVD4u76bKRDTbhh0bMAk4eXriGL h4MUoX3Imfcr6JoyheVrAdHDL/BixbMH1UUspeRuqQMQ5b2T6pabXP0oOB4FqldWiDgJBGRd zWLgCYG8wPGJGYgHibl5rFiI5Ix3FQncipc6SdUzOQIDAQABo4IBCjCCAQYwHQYDVR0OBBYE FF3AXsKnjdPND5+bxVECGKtc047PMIHABgNVHSMEgbgwgbWAFBu1oRhUMNEzjODolDka5k4Q EDBioYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJ TmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5 c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYIJAKxAy1WBo2kY MBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4IC AQCB5686UCBVIT52jO3sz9pKuhxuC2npi8ZvoBwt/IH9piPA15/CGF1XeXUdu2qmhOjHkVLN gO7XB1G8CuluxofOIUce0aZGyB+vZ1ylHXlMeB0R82f5dz3/T7RQso55Y2Vog2Zb7PYTC5B9 oNy3ylsnNLzanYlcW3AAfzZcbxYuAdnuq0Im3EpGm8DoItUcf1pDezugKm/yKtNtY6sDyENj tExZ377cYA3IdIwqn1Mh4OAT/Rmh8au2rZAo0+bMYBy9C11Ex0hQ8zWcvPZBDn4v4RtO8g+K uQZQcJnO09LJNtw94W3d2mj4a7XrsKMnZKvm6W9BJIQ4Nmht4wXAtPQ1xA+QpxPTmsGAU0Cv HmqVC7XC3qxFhaOrD2dsvOAK6Sn3MEpH/YrfYCX7a7cz5zW3DsJQ6o3pYfnnQz+hnwLlz4MK 17NIA0WOdAF9IbtQqarf44+PEyUbKtz1r0KGeGLs+VGdd2FLA0e7yuzxJDYcaBTVwqaHhU2/ Fna/jGU7BhrKHtJbb/XlLeFJ24yvuiYKpYWQSSyZu1R/gvZjHeGb344jGBsZdCDrdxtQQcVA 6OxsMAPSUPMrlg9LWELEEYnVulQJerWxpUecGH92O06wwmPgykkz//UmmgjVSh7ErNvL0lUY UMfunYVO/O5hwhW+P4gviCXzBFeTtDZH259O7TCCBzAwggUYoAMCAQICEwCg0WvVwekjGFiO 62SckFwepz0wDQYJKoZIhvcNAQELBQAwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3Jp ZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBD QTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQTAeFw0xNzA4MTcyMTIx MjBaFw0yMjA4MTYyMTIxMjBaMFcxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRswGQYDVQQDDBJrYXJsQGRlbm5pbmdlci5uZXQw ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+HVSyxVtJhy3Ohs+PAGRuO//Dha9A 16l5FPATr6wude9zjX5f2lrkRyU8vhCXTZW7WbvWZKpcZ8r0dtZmiK9uF58Ec6hhvfkxJzbg 96WHBw5Fumd5ahZzuCJDtCAWW8R7/KN+zwzQf1+B3MVLmbaXAFBuKzySKhKMcHbK3/wjUYTg y+3UK6v2SBrowvkUBC+jxNg3Wy12GsTXcUS/8FYIXgVVPgfZZrbJJb5HWOQpvvhILpPCD3xs YJFNKEPltXKWHT7Qtc2HNqikgNwj8oqOb+PeZGMiWapsatKm8mxuOOGOEBhAoTVTwUHlMNTg 6QUCJtuWFCK38qOCyk9Haj+86lUU8RG6FkRXWgMbNQm1mWREQhw3axgGLSntjjnznJr5vsvX SYR6c+XKLd5KQZcS6LL8FHYNjqVKHBYM+hDnrTZMqa20JLAF1YagutDiMRURU23iWS7bA9tM cXcqkclTSDtFtxahRifXRI7Epq2GSKuEXe/1Tfb5CE8QsbCpGsfSwv2tZ/SpqVG08MdRiXxN 5tmZiQWo15IyWoeKOXl/hKxA9KPuDHngXX022b1ly+5ZOZbxBAZZMod4y4b4FiRUhRI97r9l CxsP/EPHuuTIZ82BYhrhbtab8HuRo2ofne2TfAWY2BlA7ExM8XShMd9bRPZrNTokPQPUCWCg CdIATQIDAQABo4IBzzCCAcswPAYIKwYBBQUHAQEEMDAuMCwGCCsGAQUFBzABhiBodHRwOi8v b2NzcC5jdWRhc3lzdGVtcy5uZXQ6ODg4ODAJBgNVHRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIF oDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMDMGCWCG SAGG+EIBDQQmFiRPcGVuU1NMIEdlbmVyYXRlZCBDbGllbnQgQ2VydGlmaWNhdGUwHQYDVR0O BBYEFLElmNWeVgsBPe7O8NiBzjvjYnpRMIHKBgNVHSMEgcIwgb+AFF3AXsKnjdPND5+bxVEC GKtc047PoYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UE BwwJTmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRh IFN5c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYITAORIioIQ zl6738WMYyE12A3YSDAdBgNVHREEFjAUgRJrYXJsQGRlbm5pbmdlci5uZXQwDQYJKoZIhvcN AQELBQADggIBAJXboPFBMLMtaiUt4KEtJCXlHO/3ZzIUIw/eobWFMdhe7M4+0u3te0sr77QR dcPKR0UeHffvpth2Mb3h28WfN0FmJmLwJk+pOx4u6uO3O0E1jNXoKh8fVcL4KU79oEQyYkbu 2HwbXBU9HbldPOOZDnPLi0whi/sbFHdyd4/w/NmnPgzAsQNZ2BYT9uBNr+jZw4SsluQzXG1X lFL/qCBoi1N2mqKPIepfGYF6drbr1RnXEJJsuD+NILLooTNf7PMgHPZ4VSWQXLNeFfygoOOK FiO0qfxPKpDMA+FHa8yNjAJZAgdJX5Mm1kbqipvb+r/H1UAmrzGMbhmf1gConsT5f8KU4n3Q IM2sOpTQe7BoVKlQM/fpQi6aBzu67M1iF1WtODpa5QUPvj1etaK+R3eYBzi4DIbCIWst8MdA 1+fEeKJFvMEZQONpkCwrJ+tJEuGQmjoQZgK1HeloepF0WDcviiho5FlgtAij+iBPtwMuuLiL shAXA5afMX1hYM4l11JXntle12EQFP1r6wOUkpOdxceCcMVDEJBBCHW2ZmdEaXgAm1VU+fnQ qS/wNw/S0X3RJT1qjr5uVlp2Y0auG/eG0jy6TT0KzTJeR9tLSDXprYkN2l/Qf7/nT6Q03qyE QnnKiBXWAZXveafyU/zYa7t3PTWFQGgWoC4w6XqgPo4KV44OMYIFBzCCBQMCAQEwgZIwezEL MAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBM TEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExM QyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTANBglghkgBZQMEAgMFAKCCAkUw GAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjAwMzE2MjIyNDI1 WjBPBgkqhkiG9w0BCQQxQgRAp7VHkwoPx3jbzPUyLNrwYm6aiYk2nOzQ+EZ34F3ROWwagta6 dJbf9g/Ed8c0PnIolD44y+6rJRBl7qCsLQXh0jBsBgkqhkiG9w0BCQ8xXzBdMAsGCWCGSAFl AwQBKjALBglghkgBZQMEAQIwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3 DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMIGjBgkrBgEEAYI3EAQxgZUwgZIwezEL MAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBM TEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExM QyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTCBpQYLKoZIhvcNAQkQAgsxgZWg gZIwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lz dGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0 ZW1zIExMQyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTANBgkqhkiG9w0BAQEF AASCAgBbm1fzbHmdjxYZoFsR+QSItSjir2QFMZr2vUEXD592VXcvZ2mdD5ISmmzhSurb+yr/ UzRGP5RUQ9iR84g9k0QKTuiuzc6hvw0FCLhr6BnAJ5OpXV4bDwGYd4XAoa8e2htUJKjPv2Qr KjZqP03eFAtDLLOc8Xzf9mi8Z1bJgkAK/2SOAxJJa13OCr9DbWz6REWngnGHTciPcdcrECAi 9ZCa48E/e/cNV3ZuN75Fy+/72aa/qHBsvmEZw9uU6d2fo5jCaphza9aBZEKAy+5l0tNI5NYi YtOH7MzFGeAZmVrk7JLWyhdaA0qseU4gyRx+atUgPgCNlMzwjdm+H7wXxF0mB7KEmiYZ8lBs fyeW7dxXA7nznCgYtT9XR1CdgzIXyzHuiBfdamFZUlzNBgTelxlAE6cFCqeXp8tfNg9kdj3H xIXv30KPQWCwAz/Iac1UUuKQYF9Lb2FS9I0efWRZwbf+9rjtMzw+RKiHBbPwhkAr9WFeZpo2 dsvRPP4Y8PDs7fCGc1P0R7oPQVJ7HQtd6IiLDskLeUPSf2ozNpH3EEGS40UbXh1zpvZbo53q vNB0glKGif4niDPgvXvu6DoNJUl7Ks3ceajYRGngvAOZsmdP7+DfYBPk4YdAVD4T9p65lUcK zXLRxjtiw9c075O91Kp4SIwqwDgLIcaIbZj7EKCKsQAAAAAAAA== --------------ms020502010603090702070806-- From owner-freebsd-current@freebsd.org Mon Mar 16 22:32:14 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 973802721FD; Mon, 16 Mar 2020 22:32:14 +0000 (UTC) (envelope-from f0andrey@gmail.com) Received: from mail-wm1-x344.google.com (mail-wm1-x344.google.com [IPv6:2a00:1450:4864:20::344]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48h9z12Fs2z3L8S; Mon, 16 Mar 2020 22:32:13 +0000 (UTC) (envelope-from f0andrey@gmail.com) Received: by mail-wm1-x344.google.com with SMTP id m3so19878297wmi.0; Mon, 16 Mar 2020 15:32:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HQIWruTlbET/Jl3Rmv7TBcEs9aDrIPFWV4uLwlOiMJg=; b=cq3WsYwPMQBGXvrzbN2QXRgE4Z2d63aAYFGLfuEKb4MXzKL87m68VJaJbfUKVk7K6s Rmbwpwld0TwjWqxjyno58s/pfkrEfd9eRG1hAyoZxQiU79Q5zFYGaHGUAs81FZadk/LO ohvU9POlOLv4lXPHAiFxfCIAA6Chap9C9jvYtCaW5sg/82lqW5pL5XAvzDqoz/a1KkUV Z4Yo+zjMlWoM5gYulrw8ukcLz52P14NpfMaI1qhu9r2FP5ipPisisLN+MCMbBma+gMQ2 4qqjOAFkF/2P8Gs1+0TkMC1BJrEZsLDqBGlrCm3HqAPHzzhKWCIAvlRmLiJinD3jex/t qc8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HQIWruTlbET/Jl3Rmv7TBcEs9aDrIPFWV4uLwlOiMJg=; b=KdpxzFOmldKEhz7HYvGTsJW/IqbsC7hRtoKzh+sZdvn8bdZC3HjxujHF8I7AoUFPZt Z9e6FCKsMoLcCtfZVAgiU4+HBNjioC/I+7diJVThYBFwvVnPemMiINIGX9/e4WtaQCfc ZUBdTx60wRT2uIbgHkOcl0By5O6x53ZdNtgsImM5sA3j9Zm1EY5P8Ocz0GkpzQvCy5wi CrepTZthIWC6q4x/f+7EYOFOt7Bntzb9SQzO8PAGZX2mgCSgNTR4G4ReXOi0bB9G7F+W cCLAjKkNs5AwR8t6P+laATolucMh05uO4phED3e6rE/aMJGpL21Hqx6r4H6mJjtiJxpo cZ+A== X-Gm-Message-State: ANhLgQ0cdWriVL53FA5Qq5+gXkhAgOeeKckNr8l2ozr2Lm76P5ntpMl3 Ihf8rSqPbYF7fnxQl9WuJBzMPYdicTFeXHS9kZ4= X-Google-Smtp-Source: ADFU+vuec63wxZmRq9WLomQFeN03QRX26SI88wMIRr5Hd5mpaUvTLMGa3J6lRq2hWk4bzsrP6RnVf1b44f59Rbgo9mk= X-Received: by 2002:a05:600c:2947:: with SMTP id n7mr1333282wmd.13.1584397930931; Mon, 16 Mar 2020 15:32:10 -0700 (PDT) MIME-Version: 1.0 References: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> In-Reply-To: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> From: Andrey Fesenko Date: Tue, 17 Mar 2020 01:31:59 +0300 Message-ID: Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? To: bsd-lists@bsdforge.com Cc: freebsd-stable , freebsd-current Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 48h9z12Fs2z3L8S X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=cq3WsYwP; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of f0andrey@gmail.com designates 2a00:1450:4864:20::344 as permitted sender) smtp.mailfrom=f0andrey@gmail.com X-Spamd-Result: default: False [-2.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[4.4.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.62), ipnet: 2a00:1450::/32(-2.40), asn: 15169(-1.65), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 22:32:14 -0000 On Tue, Mar 17, 2020 at 1:24 AM Chris wrote: > > I'm attempting to boot multiple versions of FreeBSD. > I started with an install of older 11 with a (u)efi > boot partition installed. I then grabbed an current 11 > usbstick, and installed that. Which stated it needed to > install a (u)efi boot partition. I let it do it. But the > new (additional) install doesn't show up at boot. Altho > my UEFI BIOS sees it. > I guess there are just too many uefi bios versions, > and too many changes in the FreeBSD uefi boot code > to expect consistent results over the long haul. > Should I just convert the 1st efi (GPT) boot partition > to a PMBR, and delete the second efi partition. Or is > there a recommended bootmanager I can use to boot multiple > versions of FreeBSD? Windows? > upgrade system and use https://www.freebsd.org/cgi/man.cgi?query=efibootmgr&sektion=8&manpath=freebsd-release-ports ;) From owner-freebsd-current@freebsd.org Mon Mar 16 22:32:57 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DF78B2722D2 for ; Mon, 16 Mar 2020 22:32:57 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (static-24-113-41-81.wavecable.com [24.113.41.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "ultimatedns.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48h9zr3bkZz3Mmn for ; Mon, 16 Mar 2020 22:32:56 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (localhost [IPv6:0:0:0:0:0:0:0:1]) by udns.ultimatedns.net (8.15.2/8.15.2) with ESMTPS id 02GMX22x050057 (version=TLSv1.2 cipher=DHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 16 Mar 2020 15:33:08 -0700 (PDT) (envelope-from bsd-lists@BSDforge.com) X-Mailer: Cypht MIME-Version: 1.0 Cc: In-Reply-To: From: Chris Reply-To: bsd-lists@BSDforge.com To: Karl Denninger Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? Date: Mon, 16 Mar 2020 15:33:08 -0700 Message-Id: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 48h9zr3bkZz3Mmn X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of bsd-lists@BSDforge.com has no SPF policy when checking 24.113.41.81) smtp.mailfrom=bsd-lists@BSDforge.com X-Spamd-Result: default: False [2.67 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[bsd-lists@BSDforge.com]; XM_UA_NO_VERSION(0.01)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(-0.30)[ip: (-0.47), ipnet: 24.113.0.0/16(-0.23), asn: 11404(-0.75), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[BSDforge.com]; REPLYTO_ADDR_EQ_FROM(0.00)[]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.96)[0.957,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.11)[0.106,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:11404, ipnet:24.113.0.0/16, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2020 22:32:57 -0000 On Mon, 16 Mar 2020 17:24:24 -0500 Karl Denninger karl@denninger=2Enet said > On 3/16/2020 17:23, Chris wrote: > > I'm attempting to boot multiple versions of FreeBSD=2E > > I started with an install of older 11 with a (u)efi > > boot partition installed=2E I then grabbed an current 11 > > usbstick, and installed that=2E Which stated it needed to > > install a (u)efi boot partition=2E I let it do it=2E But the > > new (additional) install doesn't show up at boot=2E Altho > > my UEFI BIOS sees it=2E > > I guess there are just too many uefi bios versions, > > and too many changes in the FreeBSD uefi boot code > > to expect consistent results over the long haul=2E > > Should I just convert the 1st efi (GPT) boot partition > > to a PMBR, and delete the second efi partition=2E Or is > > there a recommended bootmanager I can use to boot multiple > > versions of FreeBSD? Windows? > > > > Thank you! > > > > --Chris > > > Refind perhaps? Thanks for the reply, Karl! :) I've used that before for FreeBSD/MacOS combos=2E I'll look at it again=2E For the record=2E I'm *only* using FreeBSD in this situation=2E I only mentioned Windows above, for the use of it's boot manager=2E Thanks again! --Chris >=20 >=20 > --=20 > Karl Denninger > karl@denninger=2Enet > /The Market Ticker/ > /[S/MIME encrypted email preferred]/ From owner-freebsd-current@freebsd.org Tue Mar 17 02:23:49 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 353E6276CFD for ; Tue, 17 Mar 2020 02:23:49 +0000 (UTC) (envelope-from groenveld@acm.org) Received: from mail.groenveld.us (mail.groenveld.us [207.68.114.134]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hH6C0SXSz3xV2 for ; Tue, 17 Mar 2020 02:23:46 +0000 (UTC) (envelope-from groenveld@acm.org) Received: from mail.groenveld.us (localhost [127.0.0.1]) by mail.groenveld.us (8.14.4+Sun/8.14.4) with ESMTP id 02H2P1eu012093 for ; Mon, 16 Mar 2020 22:25:01 -0400 (EDT) Message-Id: <202003170225.02H2P1eu012093@groenveld.us> From: John D Groenveld X-uri: To: freebsd-current@freebsd.org Subject: link_elf_obj: symbol bcmp undefined MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <12091.1584411901.1@mail.groenveld.us> Content-Transfer-Encoding: quoted-printable Date: Mon, 16 Mar 2020 22:25:01 -0400 X-Rspamd-Queue-Id: 48hH6C0SXSz3xV2 X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=softfail (mx1.freebsd.org: 207.68.114.134 is neither permitted nor denied by domain of groenveld@acm.org) smtp.mailfrom=groenveld@acm.org X-Spamd-Result: default: False [0.36 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.31)[-0.306,0]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; R_SPF_SOFTFAIL(0.00)[~all]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_SPAM_MEDIUM(0.66)[0.657,0]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[acm.org]; IP_SCORE(0.11)[asn: 701(0.62), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:701, ipnet:207.68.96.0/19, country:US]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 02:23:49 -0000 # uname -U 1300084 # pkg info | grep virtualbox virtualbox-ose-additions-5.2.34_2 VirtualBox additions for FreeBSD guests # kldload vboxvfs kldload: an error occurred while loading module vboxvfs. Please check dmes= g(8) for more details. # dmesg | tail -2 link_elf_obj: symbol bcmp undefined linker_load_file: /boot/modules/vboxvfs.ko - unsupported file type Unsure if this is compiler/linker or kernel bug. John groenveld@acm.org From owner-freebsd-current@freebsd.org Tue Mar 17 03:03:35 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EDFE8277F22 for ; Tue, 17 Mar 2020 03:03:35 +0000 (UTC) (envelope-from karl@denninger.net) Received: from colo1.denninger.net (colo1.denninger.net [104.236.120.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hJ062H3bz3C3k for ; Tue, 17 Mar 2020 03:03:34 +0000 (UTC) (envelope-from karl@denninger.net) Received: from denninger.net (ip68-1-57-197.pn.at.cox.net [68.1.57.197]) by colo1.denninger.net (Postfix) with ESMTP id 84E1721108B for ; Mon, 16 Mar 2020 23:03:03 -0400 (EDT) Received: from [192.168.10.25] (D15.Denninger.Net [192.168.10.25]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by denninger.net (Postfix) with ESMTPSA id 302BF16C1CB for ; Mon, 16 Mar 2020 22:03:03 -0500 (CDT) Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? To: freebsd-current@freebsd.org References: From: Karl Denninger Autocrypt: addr=karl@denninger.net; prefer-encrypt=mutual; keydata= xsFNBF1Rd+gBEACmLAH7SAzdQq57ZN56QQEy0jDFfH5BvGOMZgCaP+Y5lJQ5u9WphCoCALMs Rg0o1Q9DRNWgUmy/cgsxioXAEzZFXXzOHPJhwplVOgfjxnoByD5KQhWG8Owm9QmATdtiZPSV 4UYVNUIbZv7btSnnAXysG2OUHajYS5PVeFQxFbhNFq/SS8VaXr1WEVTFa8NFKp2W3/KY1A+U KKDUlYwnOauK3fnY9chF2IRSoxAbBJFrJ4lPGz04HtzNos4Q9CBfTphKcdFjcPntNS9wrqs3 sm+7hLNTH9B2Kj6aekG5UhD03eyP+gevTgBy51RL6ULzI13Kc4aeyOByuBXrA8D2m2Ee67iy 4+ZSxM9Wn1gQce5624OWzCYIGBH2r75Bshp1KHKu36N2rN//kyKYnwl/z6UZB/S9cMUFKZgL gFx7QxpFX/HvSiBcPfcGS0meModpg6qma7/2jRoQAXacslpiT+uOfRGspNbnglkbw435RzX/ kMUclJQNZBBBUpPiGjVCjeBTiAfN8TyjS+pWzwxNCUZWbYO5xVaS0gbIhgVNoBOGn1rdTsdA PP65SRjaoL5KY6bzkkzrXLB2Djx8/p4vr0qIqxIQWbewJq3xKyKGiqI46ae77BF7k0B++Ndx g9K9UeWKl/iJ0eoI0ftR+xH3aIHTU1Or3j/tj4j8Z0tnVSyt1wARAQABzSNLYXJsIERlbm5p bmdlciA8a2FybEBkZW5uaW5nZXIubmV0PsLBfwQTAQgAKQUCXVF36AIbIwUJCWYBgAcLCQgH AwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEG8twBXrj1l4swkP/3uOzRxW16K6H4JIEIRMUEbt nxDhmk+gR/7H9phg7HtvR7i22QejZX1N1NHcGRNmBwLshWVjJkHKhCE/AM8Cf9XyaV2ft6qn g1xK6NuhapxVuaaMeCVPUzsPkTcR+JMl72ZR4Q+mJMVQButCITekmr7aIzIZ80fF0t86rnq+ O74ZGt0SAMsLV/GAKlIw8fGMi9Xj4OKDgqmxTnIoV4+0mpo26W957pnlOrjN3/6VqWUyAdHH DkyqsuP/9jx2f5pZCcD7X04+93GI+sGb1s6BOFRHq2oJgs6W0z0nPx5Ks9MDDgSQlxXAryje 17WphTR7DWn1BeF3Y8AhRkzc2+Mgc5s1i2fPe6YwvksDNOEyNXIvFV7chwDQYb0Q3I8XsoHu 2WUjXp0kVokobJPdVdY55nbY+brezweRJMiEpFtGOmoUekQWlI5KS1kE8+Xuqpm+MSxEpqY8 5ncPt0lekOrICGajlOotkUK86iVemlW1rMzMc5Xwp9j8oxa+bRtGD6u1rYz4i+qIdE+GSCBy 1nnHN/my0nefhQyHXr8wGVEbyiMZCten9fm1iXpBr0jY+tvtbo8XqZQG7Lr+3kSO6VUgc8kW IPf2HxIV7AnGUN+ddZGCcPPhb2mY/Yy7si54wJFj6YoG+/+rNjF9F5d8WeLoeUWczgHTvZmS o6F7UhjjuwzgzsFNBF1Rd+gBEADNVFS8nQ+kpKOpgtP+f3bCVxHAm7eHMbX6oew5yZiQwfD+ 1RWNWLVOMeTt7G2e5HsHpJOUwFUJhbDb0omB0r38xTSVSAig9kmUfb7tTMJG2bG7WfWykBOM WIZ4OhCf+ISv9dUkjNgx4ionWotFxwDiPRwWumVQ7WYZmRZlhDWMiaHgKvBrjJ7Y6GKPRbQc 5/0Qz9xGhXKlFxDQrrSMkyRThIOxXqdfD9z3rEsV3ZwOojzNsnkIImnQMKyIAR0FBQop34G9 wDQi7fxk8wGIfDszwfR4oAdDdPGq4gcAvE7Fd3xKyNpGyjSED5szoaFjldaZSXQIffquSUvy sFCTTLRIso5Dn9uQgi57gIv+5mnyKBfm2Z2P6pEQPSt073TED9rS0+JpniJL7rKRVpO5niqw sQJS6ht+JF88rXro+SiwxD/KeDpTuuJ10+ohLVi1Y+X82X7BIQEhqtFp9FVJSds4o/eNyaHd SoqfoeWMy3EV+rdJ3DneXcPS1BgxO57Rko5Hx3NUSVK83ovFb+Ofes9SLNdqNu3xAUcfpRdS DyxzpVbCq6Y2CIojiaweiYe5BOBhmR9OPGhqP8YD7GukYmQufAVuOrIVyctBlVPHgMBb+UX+ ItYXuX4weSJWLOsmM45xd/EYvBq2DWFpKlyihoktNzTGqxGsNeG7gCOEUTAnUwARAQABwsFl BBgBCAAPBQJdUXfoAhsMBQkJZgGAAAoJEG8twBXrj1l4Dm0P/iEx2gIHSOnvgpG799Vf2RM0 7gPbDWzDaw8YTV49H+VTOqq7RlT52aO0QfNAmtppX0V1/5f30fuSCF46NWnYGu35P/LvOAPb sLbeWCyJy4GOPN4cjsBMbgmooGdl24RdcvGMmY177o7oOSWBqXfhAj+YA6r+hEar1qxqLgwB Gy8wAId4qYSQhN/FxiQbyUs2tPAI6Wn/41pI7Hu6WgmRGpZrBv8HhVV9Gl7jallSsS/g+fhu WRbDKCknUS5SX3+w2AUFr4kf62gSSxXBxd075KnViV9c0sraAPI31XbM5QUc0Xssfaqs6Srr z4MjKaLhb7GD8C1JwI23PuGdFvk9WK996UvIyjdWIE99VSlg/5gEKkXzwx7oysrSG9BqkfGf I4addK55xRQPul0V3s2LtDoQTxg3VHrL6wrvGhYUcTHLmlsvNx1EOb5a3xBT+SUK/Ltq08LW YcmNbU/G217MlfvDJYHCb0uOtxqJFm8RiZGj2eEcLgvyWnlWCD2rfP4EqCxmpr3Ic725FiQR cBbdTV3clTgclhBG3TA9dxVjfZDcatz5cFBwXP8k5Yn9tNl90T2r79V4SNh1mCHtGTSEf449 qz9tm7EguLchjmoirJTuiipZKcalcHAHtz4VPUykdXsrfEJTzdEcujzqF6v/9CY+DjpAd3et Z0vw7xC5tS+b Message-ID: <6bf1a155-b0c7-e96c-6760-54ca5b5a92a8@denninger.net> Date: Mon, 16 Mar 2020 22:03:02 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-512; boundary="------------ms010108080507080003010202" X-Rspamd-Queue-Id: 48hJ062H3bz3C3k X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=denninger.net; spf=pass (mx1.freebsd.org: domain of karl@denninger.net designates 104.236.120.189 as permitted sender) smtp.mailfrom=karl@denninger.net X-Spamd-Result: default: False [-6.33 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.85)[-0.851,0]; FROM_HAS_DN(0.00)[]; SIGNED_SMIME(-2.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; DMARC_POLICY_ALLOW(-0.50)[denninger.net,none]; TO_DN_NONE(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:14061, ipnet:104.236.64.0/18, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-2.58)[ip: (-9.84), ipnet: 104.236.64.0/18(-4.45), asn: 14061(1.43), country: US(-0.05)]; RECEIVED_SPAMHAUS_PBL(0.00)[197.57.1.68.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11] X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 03:03:36 -0000 This is a cryptographically signed message in MIME format. --------------ms010108080507080003010202 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 3/16/2020 17:33, Chris wrote: > On Mon, 16 Mar 2020 17:24:24 -0500 Karl Denninger karl@denninger.net sa= id > >> On 3/16/2020 17:23, Chris wrote: >> > I'm attempting to boot multiple versions of FreeBSD. >> > I started with an install of older 11 with a (u)efi >> > boot partition installed. I then grabbed an current 11 >> > usbstick, and installed that. Which stated it needed to >> > install a (u)efi boot partition. I let it do it. But the >> > new (additional) install doesn't show up at boot. Altho >> > my UEFI BIOS sees it. >> > I guess there are just too many uefi bios versions, >> > and too many changes in the FreeBSD uefi boot code >> > to expect consistent results over the long haul. >> > Should I just convert the 1st efi (GPT) boot partition >> > to a PMBR, and delete the second efi partition. Or is >> > there a recommended bootmanager I can use to boot multiple >> > versions of FreeBSD? Windows? >> > >> > Thank you! >> > >> > --Chris >> > >> Refind perhaps? > Thanks for the reply, Karl! :) > I've used that before for FreeBSD/MacOS combos. I'll look at it again. > > For the record. I'm *only* using FreeBSD in this situation. I > only mentioned Windows above, for the use of it's boot manager. > > Thanks again! > Refind will find all the bootable EFI "elements" in the EFI partition and menu them.=C2=A0 The question then becomes whether multiple efi loade= rs can be told to each use a *different* partition to load the kernel from (and thus the loader file, which in turn can tell it where the root filesystem is.) Reading through the man page it appears they may not be.=C2=A0 You could = of course interrupt it and manually select that, but I suspect that's not what you want to have to do. I use refind on a dual-boot (win10/FreeBSD) system but not with multiple independent FreeBSD versions. --=20 Karl Denninger karl@denninger.net /The Market Ticker/ /[S/MIME encrypted email preferred]/ --------------ms010108080507080003010202 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgMFADCABgkqhkiG9w0BBwEAAKCC DdgwggagMIIEiKADAgECAhMA5EiKghDOXrvfxYxjITXYDdhIMA0GCSqGSIb3DQEBCwUAMIGL MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAf BgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTAeFw0xNzA4MTcxNjQyMTdaFw0yNzA4 MTUxNjQyMTdaMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkwFwYDVQQKDBBD dWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExJTAjBgNVBAMMHEN1 ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQC1aJotNUI+W4jP7xQDO8L/b4XiF4Rss9O0B+3vMH7Njk85fZ052QhZpMVlpaaO+sCI KqG3oNEbuOHzJB/NDJFnqh7ijBwhdWutdsq23Ux6TvxgakyMPpT6TRNEJzcBVQA0kpby1DVD 0EKSK/FrWWBiFmSxg7qUfmIq/mMzgE6epHktyRM3OGq3dbRdOUgfumWrqHXOrdJz06xE9NzY vc9toqZnd79FUtE/nSZVm1VS3Grq7RKV65onvX3QOW4W1ldEHwggaZxgWGNiR/D4eosAGFxn uYeWlKEC70c99Mp1giWux+7ur6hc2E+AaTGh+fGeijO5q40OGd+dNMgK8Es0nDRw81lRcl24 SWUEky9y8DArgIFlRd6d3ZYwgc1DMTWkTavx3ZpASp5TWih6yI8ACwboTvlUYeooMsPtNa9E 6UQ1nt7VEi5syjxnDltbEFoLYcXBcqhRhFETJe9CdenItAHAtOya3w5+fmC2j/xJz29og1KH YqWHlo3Kswi9G77an+zh6nWkMuHs+03DU8DaOEWzZEav3lVD4u76bKRDTbhh0bMAk4eXriGL h4MUoX3Imfcr6JoyheVrAdHDL/BixbMH1UUspeRuqQMQ5b2T6pabXP0oOB4FqldWiDgJBGRd zWLgCYG8wPGJGYgHibl5rFiI5Ix3FQncipc6SdUzOQIDAQABo4IBCjCCAQYwHQYDVR0OBBYE FF3AXsKnjdPND5+bxVECGKtc047PMIHABgNVHSMEgbgwgbWAFBu1oRhUMNEzjODolDka5k4Q EDBioYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJ TmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5 c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYIJAKxAy1WBo2kY MBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4IC AQCB5686UCBVIT52jO3sz9pKuhxuC2npi8ZvoBwt/IH9piPA15/CGF1XeXUdu2qmhOjHkVLN gO7XB1G8CuluxofOIUce0aZGyB+vZ1ylHXlMeB0R82f5dz3/T7RQso55Y2Vog2Zb7PYTC5B9 oNy3ylsnNLzanYlcW3AAfzZcbxYuAdnuq0Im3EpGm8DoItUcf1pDezugKm/yKtNtY6sDyENj tExZ377cYA3IdIwqn1Mh4OAT/Rmh8au2rZAo0+bMYBy9C11Ex0hQ8zWcvPZBDn4v4RtO8g+K uQZQcJnO09LJNtw94W3d2mj4a7XrsKMnZKvm6W9BJIQ4Nmht4wXAtPQ1xA+QpxPTmsGAU0Cv HmqVC7XC3qxFhaOrD2dsvOAK6Sn3MEpH/YrfYCX7a7cz5zW3DsJQ6o3pYfnnQz+hnwLlz4MK 17NIA0WOdAF9IbtQqarf44+PEyUbKtz1r0KGeGLs+VGdd2FLA0e7yuzxJDYcaBTVwqaHhU2/ Fna/jGU7BhrKHtJbb/XlLeFJ24yvuiYKpYWQSSyZu1R/gvZjHeGb344jGBsZdCDrdxtQQcVA 6OxsMAPSUPMrlg9LWELEEYnVulQJerWxpUecGH92O06wwmPgykkz//UmmgjVSh7ErNvL0lUY UMfunYVO/O5hwhW+P4gviCXzBFeTtDZH259O7TCCBzAwggUYoAMCAQICEwCg0WvVwekjGFiO 62SckFwepz0wDQYJKoZIhvcNAQELBQAwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3Jp ZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBD QTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQTAeFw0xNzA4MTcyMTIx MjBaFw0yMjA4MTYyMTIxMjBaMFcxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRswGQYDVQQDDBJrYXJsQGRlbm5pbmdlci5uZXQw ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+HVSyxVtJhy3Ohs+PAGRuO//Dha9A 16l5FPATr6wude9zjX5f2lrkRyU8vhCXTZW7WbvWZKpcZ8r0dtZmiK9uF58Ec6hhvfkxJzbg 96WHBw5Fumd5ahZzuCJDtCAWW8R7/KN+zwzQf1+B3MVLmbaXAFBuKzySKhKMcHbK3/wjUYTg y+3UK6v2SBrowvkUBC+jxNg3Wy12GsTXcUS/8FYIXgVVPgfZZrbJJb5HWOQpvvhILpPCD3xs YJFNKEPltXKWHT7Qtc2HNqikgNwj8oqOb+PeZGMiWapsatKm8mxuOOGOEBhAoTVTwUHlMNTg 6QUCJtuWFCK38qOCyk9Haj+86lUU8RG6FkRXWgMbNQm1mWREQhw3axgGLSntjjnznJr5vsvX SYR6c+XKLd5KQZcS6LL8FHYNjqVKHBYM+hDnrTZMqa20JLAF1YagutDiMRURU23iWS7bA9tM cXcqkclTSDtFtxahRifXRI7Epq2GSKuEXe/1Tfb5CE8QsbCpGsfSwv2tZ/SpqVG08MdRiXxN 5tmZiQWo15IyWoeKOXl/hKxA9KPuDHngXX022b1ly+5ZOZbxBAZZMod4y4b4FiRUhRI97r9l CxsP/EPHuuTIZ82BYhrhbtab8HuRo2ofne2TfAWY2BlA7ExM8XShMd9bRPZrNTokPQPUCWCg CdIATQIDAQABo4IBzzCCAcswPAYIKwYBBQUHAQEEMDAuMCwGCCsGAQUFBzABhiBodHRwOi8v b2NzcC5jdWRhc3lzdGVtcy5uZXQ6ODg4ODAJBgNVHRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIF oDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMDMGCWCG SAGG+EIBDQQmFiRPcGVuU1NMIEdlbmVyYXRlZCBDbGllbnQgQ2VydGlmaWNhdGUwHQYDVR0O BBYEFLElmNWeVgsBPe7O8NiBzjvjYnpRMIHKBgNVHSMEgcIwgb+AFF3AXsKnjdPND5+bxVEC GKtc047PoYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UE BwwJTmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRh IFN5c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYITAORIioIQ zl6738WMYyE12A3YSDAdBgNVHREEFjAUgRJrYXJsQGRlbm5pbmdlci5uZXQwDQYJKoZIhvcN AQELBQADggIBAJXboPFBMLMtaiUt4KEtJCXlHO/3ZzIUIw/eobWFMdhe7M4+0u3te0sr77QR dcPKR0UeHffvpth2Mb3h28WfN0FmJmLwJk+pOx4u6uO3O0E1jNXoKh8fVcL4KU79oEQyYkbu 2HwbXBU9HbldPOOZDnPLi0whi/sbFHdyd4/w/NmnPgzAsQNZ2BYT9uBNr+jZw4SsluQzXG1X lFL/qCBoi1N2mqKPIepfGYF6drbr1RnXEJJsuD+NILLooTNf7PMgHPZ4VSWQXLNeFfygoOOK FiO0qfxPKpDMA+FHa8yNjAJZAgdJX5Mm1kbqipvb+r/H1UAmrzGMbhmf1gConsT5f8KU4n3Q IM2sOpTQe7BoVKlQM/fpQi6aBzu67M1iF1WtODpa5QUPvj1etaK+R3eYBzi4DIbCIWst8MdA 1+fEeKJFvMEZQONpkCwrJ+tJEuGQmjoQZgK1HeloepF0WDcviiho5FlgtAij+iBPtwMuuLiL shAXA5afMX1hYM4l11JXntle12EQFP1r6wOUkpOdxceCcMVDEJBBCHW2ZmdEaXgAm1VU+fnQ qS/wNw/S0X3RJT1qjr5uVlp2Y0auG/eG0jy6TT0KzTJeR9tLSDXprYkN2l/Qf7/nT6Q03qyE QnnKiBXWAZXveafyU/zYa7t3PTWFQGgWoC4w6XqgPo4KV44OMYIFBzCCBQMCAQEwgZIwezEL MAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBM TEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExM QyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTANBglghkgBZQMEAgMFAKCCAkUw GAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjAwMzE3MDMwMzAy WjBPBgkqhkiG9w0BCQQxQgRA/7E2516bAU9K38kMluYFLrPYvSMWZMn+Vf8GpB5ha3Lozi6B zR3tChO5SRq8y4rWezlJgegOh6oCfw2fe9yAYTBsBgkqhkiG9w0BCQ8xXzBdMAsGCWCGSAFl AwQBKjALBglghkgBZQMEAQIwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3 DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMIGjBgkrBgEEAYI3EAQxgZUwgZIwezEL MAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBM TEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExM QyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTCBpQYLKoZIhvcNAQkQAgsxgZWg gZIwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lz dGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0 ZW1zIExMQyAyMDE3IEludCBDQQITAKDRa9XB6SMYWI7rZJyQXB6nPTANBgkqhkiG9w0BAQEF AASCAgCe44Ba6TVVgMjUYVQsgXzu6G8d7V9zwxCkUv4rEM5cDCwDFqZye07O99E6FxDeOuwt MOnYs/a1llRxdzTI8xcI4ZYcaFx1TJLuo1DN6efcXiUb4C1Rt9//Z4sYTZ7fbu/1BhBSleM9 NpcdcT20rxVxsmbcAHW1w++MsWF7goGuyHirQhuIdbP5JW0drtp7ufoGng1uWdvjwixZVh+M AGATWL4d3ilBKVfipIcUYuMZHwr7d5GCsa34xSibTE3s0QX0g9dC/yCb5qjBhrA+UwfRQUg9 JkPkttd37KTJAF6ffVUogAfejCDVP7XMPmqLv9euWOpP3OZ9sgJs1j4mXO9IOAvYYuw4bglD GppFbm/sQA5stIgK8y5v2s3enwek0Ys22Rpj4U1qkpvaCzzEcnZqHpM6hCaXs2GCRgWeqxgP //rbNcZSRSC1EY+vpl1H/6A0igT8/phfa6YOyGLbypXkOJoF2fpm7i+wsYpOe9B48/ASN3/D FVAXwW0/x4JeXzfwWKdV9idOGUTxz5QDjUtjoDEM93O0oIqFuw3VAuYaemAiR49m4s57OQZJ 3wVn2WqpnmIK/xxpOM7LJA4FQ7UBexx0sdObT5Y3Hkg9CmXeiG5kMTcxZwVjjJbuaJUOVW8B 4ZpcUzFNgwn5OHVp3w1pA9gAqRWXhPgaV/9FGvnQpAAAAAAAAA== --------------ms010108080507080003010202-- From owner-freebsd-current@freebsd.org Tue Mar 17 12:58:17 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B076B265510 for ; Tue, 17 Mar 2020 12:58:17 +0000 (UTC) (envelope-from flo@snakeoilproductions.net) Received: from resurgam.purplekraken.com (resurgam.purplekraken.com [92.60.39.37]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hYBJ1lDKz48Gk for ; Tue, 17 Mar 2020 12:58:15 +0000 (UTC) (envelope-from flo@snakeoilproductions.net) Received: from [192.168.2.107] (p5089D511.dip0.t-ipconnect.de [80.137.213.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by resurgam.purplekraken.com (Postfix) with ESMTPSA id 45AB22E457 for ; Tue, 17 Mar 2020 13:58:12 +0100 (CET) Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? To: freebsd-current@freebsd.org References: From: Florian Limberger Message-ID: <7c00489f-b9a2-2cc9-dd6b-dae600019099@snakeoilproductions.net> Date: Tue, 17 Mar 2020 13:58:12 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US X-Clacks-Overhead: GNU Terry Pratchett Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48hYBJ1lDKz48Gk X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of flo@snakeoilproductions.net designates 92.60.39.37 as permitted sender) smtp.mailfrom=flo@snakeoilproductions.net X-Spamd-Result: default: False [1.13 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[17.213.137.80.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_SPAM_MEDIUM(0.86)[0.865,0]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.31)[-0.313,0]; TO_DN_NONE(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[37.39.60.92.list.dnswl.org : 127.0.20.0]; IP_SCORE(-0.12)[asn: 197540(-0.60), country: DE(-0.02)]; DMARC_NA(0.00)[snakeoilproductions.net]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:197540, ipnet:92.60.36.0/22, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 12:58:17 -0000 On 16.03.20 23:33, Chris wrote: > For the record. I'm *only* using FreeBSD in this situation. I > only mentioned Windows above, for the use of it's boot manager. If you only use FreeBSD, and also use ZFS, you might find beadm[1] interesting. [1]: https://www.freshports.org/sysutils/beadm Regards -flo From owner-freebsd-current@freebsd.org Tue Mar 17 13:50:01 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B673E2669FD; Tue, 17 Mar 2020 13:50:01 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from dec.sakura.ne.jp (dec.sakura.ne.jp [210.188.226.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hZKz0PHPz3xCs; Tue, 17 Mar 2020 13:49:58 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from kalamity.joker.local (124-18-96-116.dz.commufa.jp [124.18.96.116]) (authenticated bits=0) by dec.sakura.ne.jp (8.15.2/8.15.2/[SAKURA-WEB]/20080708) with ESMTPA id 02HD79fA070588; Tue, 17 Mar 2020 22:07:10 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Tue, 17 Mar 2020 22:07:09 +0900 From: Tomoaki AOKI To: freebsd-current@freebsd.org Cc: bsd-lists@BSDforge.com, freebsd-stable@freebsd.org Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? Message-Id: <20200317220709.7f373ad9ed39ebb07878ac42@dec.sakura.ne.jp> In-Reply-To: References: <89828bad8ceede6e2377dde200d98a98@udns.ultimatedns.net> Reply-To: junchoon@dec.sakura.ne.jp Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd12.1) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48hZKz0PHPz3xCs X-Spamd-Bar: ++++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of junchoon@dec.sakura.ne.jp has no SPF policy when checking 210.188.226.8) smtp.mailfrom=junchoon@dec.sakura.ne.jp X-Spamd-Result: default: False [6.18 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[junchoon@dec.sakura.ne.jp]; MV_CASE(0.50)[]; TO_DN_NONE(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; HAS_ORG_HEADER(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[116.96.18.124.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:9370, ipnet:210.188.224.0/19, country:JP]; R_DKIM_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MIME_GOOD(-0.10)[text/plain]; SUBJECT_ENDS_QUESTION(1.00)[]; DMARC_NA(0.00)[sakura.ne.jp]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(1.00)[1.000,0]; IP_SCORE(1.78)[ipnet: 210.188.224.0/19(4.95), asn: 9370(3.93), country: JP(0.04)]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; GREYLIST(0.00)[pass,body] X-Spam: Yes X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 13:50:01 -0000 On Tue, 17 Mar 2020 01:31:59 +0300 Andrey Fesenko wrote: > On Tue, Mar 17, 2020 at 1:24 AM Chris wrote: > > > > I'm attempting to boot multiple versions of FreeBSD. > > I started with an install of older 11 with a (u)efi > > boot partition installed. I then grabbed an current 11 > > usbstick, and installed that. Which stated it needed to > > install a (u)efi boot partition. I let it do it. But the > > new (additional) install doesn't show up at boot. Altho > > my UEFI BIOS sees it. > > I guess there are just too many uefi bios versions, > > and too many changes in the FreeBSD uefi boot code > > to expect consistent results over the long haul. > > Should I just convert the 1st efi (GPT) boot partition > > to a PMBR, and delete the second efi partition. Or is > > there a recommended bootmanager I can use to boot multiple > > versions of FreeBSD? Windows? > > > > upgrade system and use > https://www.freebsd.org/cgi/man.cgi?query=efibootmgr&sektion=8&manpath=freebsd-release-ports > ;) > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" Or if you want boot-time selection, try the patch proposed on Bug 207940 [1]. efibootmgr can be used only for "next boot and later", IIUC. The latest patch is for head and stable/12. Applicable on top of /usr/src. Patch for stable/11 is NOT tested / maintained for more than one year, so possibly doesn't apply / work anymore. [1] https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207940 -- Tomoaki AOKI From owner-freebsd-current@freebsd.org Tue Mar 17 13:51:28 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id ACB95266DF9 for ; Tue, 17 Mar 2020 13:51:28 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48hZMh2w6Dz41DD for ; Tue, 17 Mar 2020 13:51:28 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.infracaninophile.co.uk (smtp.infracaninophile.co.uk [81.2.117.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.infracaninophile.co.uk", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: matthew/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id C50C6AFC for ; Tue, 17 Mar 2020 13:51:27 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from liminal.local (unknown [IPv6:2001:8b0:151:1:583:5c49:dd53:bef2]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: m.seaman@infracaninophile.co.uk) by smtp.infracaninophile.co.uk (Postfix) with ESMTPSA id 94886E669 for ; Tue, 17 Mar 2020 13:51:25 +0000 (UTC) Authentication-Results: smtp.infracaninophile.co.uk; dmarc=none (p=none dis=none) header.from=FreeBSD.org Authentication-Results: smtp.infracaninophile.co.uk/94886E669; dkim=none; dkim-atps=neutral Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? To: freebsd-current@freebsd.org References: <7c00489f-b9a2-2cc9-dd6b-dae600019099@snakeoilproductions.net> From: Matthew Seaman Autocrypt: addr=matthew@FreeBSD.org; prefer-encrypt=mutual; keydata= mQINBFJIL80BEADi7/VbnnErDU6pjEhI/SzEZ/HbDRkJ5g7HroAtqIRm6nj8ZwOAgZ/2ZnWn 5F+fXTuLsG0FLNtkd17FoVcuCi5e/GPliXI5cmamV7E1Yz4T8UsJ7RQolimyxVexccKd16Tc AA7B9bFlJSKkBUSD0buj7VjT07xWhRzu6Vgi5r0UjLALYJz977uZA0F1aOGOXREDEAOhdcNc kSNjynqAwDA6dCT1Elpi4key1fYjv4jyDF+GU/YXul2Y/rguA8FCkHd9vyym5eAsLQ5mG00V V9fkEHIpH5KorNVnl/ufHXnkZqmHAZVpFDcrshb7aZ/pL45PXyWgLj+e6etelgj3a2bZi0JF cVdXCnBZVP2oIyYblM11ugTbfCwodORU8a5KfPeztMdAtDr4e+32NTrPdPi5rLT+GUsYz+PL 3A3m3u8bdsFp40DlIrBtSByVjqERxcfhphrEB4J8BXHUG7OAtXkZMlW/PGKDwXJq0O6Z5Tcg YHAoEiSWbXiexHgXNJyP+sqnIlhLWhSJGeJ+C83wqI6oYlZUCW00NkPxcIHnQPV/z+5wQVci TMyaWC2YCIHz4Ljs+TnwWMz0E8PNFDfHVbQ0W4PRGV7gRAqxfL+yKufauIEGbEq8rNDbSwL3 bcUCxR4ZDlaUEUwT4J8naf7rjdgiEYHs2Ig3jeK1+ER4FPG1sQARAQABtCRNYXR0aGV3IFNl YW1hbiA8bWF0dGhld0BmcmVlYnNkLm9yZz6JAlQEEwEKAD4CGwMFCwkIBwMFFQoJCAsFFgMC AQACHgECF4AWIQRyz6whebywJLW1RZADb2ye5/OevwUCWttU6gUJDFmAlAAKCRADb2ye5/Oe v7D/EACF6YL98cq6u20rai9gDCS+XY7HDGxowreE2HTAZXQmJTatSaEgiJMJUXfjXn7U/L+q zFhjOC2kiOze1yIWrptoxFa29lSUi3jWHNv7BM2bA4i7jjtwR8Ep2wSvDDl99jewDc6Ewot4 p598S5tZt4my9yGLeaCiN44IPg4U2ftnjcoONtrBOVyIHvVK5QL5r+wyqfdlySbAs026kJAZ rkwAL2ZVy3m1xNSmM8MojwSeX/5puv5JG2FoFb+VphZKCpgaqoEAN2jCqoJW9nnbAth1bYiM djiVr+k8pQl4CltFgpzSKxGbxXUSdPmEpA67FsV0BLIq5xy5VkvzoM+SD1hd3EQgfCyvFlf5 ClSwb5aQRf9ZqiyFAkVEtEOgF7S9q7H6MHyVFzrLfGzmTdpzu7jCCoYbZ7dX1aniatAxLKl6 EBgZxtLRu5bqalguv0FV1C8qnGLuvUMqp8RoJzLd8sWBGMTsUl/GOf+cEZl5u0q9vg9pBJxg KLi2NX3V4Bk8vkOUJFuk8ll7kRQ/7rrGLBkZNfcadb970jB5bvsxMhoc9P/2dIa1YzsGnqbE vG+JrZ2475hvs1jPZ/gdLWEcquGAhGjekfArLBbagqfo6gsuHnUD1K+HfVGQBkKJl+lNhbOR guHGT5hx/4RSYBVakz1RpM5dnk271lH0LxWeE4okSrkCDQRSUUKTARAAt6FH3HbDFoumOWUu JlDgOQs3wdp2n3IKv7gqzbDdgaoWW7hDTvjO0Cb6p2PGUKEoxMQQoIdDO0pQ9rgr4Sh4VSVC 9WMO/fUwqdrIs2nACIg4OwvNhIccW08S+N72f+yuXWOQ/dv79cwruE26/BEXgIP09MYcOWwc UCXzOoUR3er+jzcsN9uFjcsBVUJLIEru1askHRzCUa5P9S9GAFBwN49HC5IJWEzdLP27FjjO G5UG3+QZahHrjG1i6S3bIYXtaGsqNyfkp9Is7Wpj2kk+s9Ua+YMG/V5YVlbANIexa1yr75p1 W9biqXpCWnB3TaHSfI0G1t9w8K2qhR/Z1/YLIcRzZ2aHJnvbzJYw5Cs1jfNpFytbASsxj0rb ReouftlBvVWFRxsZ+oG1ZXL64/SVKMZAnfBNxd1uajp+HtoQtYoTu88la6zcdnAhOD5JdOnt N2VF8iQnDfPgkidfuSZ1C059xaRPTSRJBgMRDtOlDxgz7Pxx/7L2jwxRY1dq6NGioflY7CCp Gc7bi1K6xnf3lBL8X2nGpRAVsg9Lx1ShIWkgNbTAcPXpXcXlJ1xqz8HS8Twadh6gIfk/RNch BIED9lkVCKHYp/XQb8T8vMwn/kTWUm5WlPkQUFQN4D1b6+dJw4bwn/wiRS8did1MU1OytJB6 tljfEUCx0uKkzqr+33MAEQEAAYkEuwQYAQoAJgIbAhYhBHLPrCF5vLAktbVFkANvbJ7n856/ BQJa21VJBQkMUG42AonBvSAEGQEKAGYFAlJRQpNfFIAAAAAALgAoaXNzdWVyLWZwckBub3Rh dGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5RjE1NEVDQkYxMTJFNTA1NDRFM0Yz MDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp5OdNFg//ZqeVdGoKkMvALPzZjGz84+6l0kcM xSN4TfWmec0YpSmDEzCw4/SZoGqHlZb8lcTevmNrNXg6c+wVw6P+Ycl20Nzb98Kt9C5sz+zG VmPPK+3O9gaPnEqlIKnnbxKXXNHQdd8Mf0UTpifMqX0IkWOqhe/tQKGoQ9+feKvLIaToIe/N josW6vJ9YAgFqZ0015zwbElhMNFmgDMOI2SgjBZ9ngP1U82Mqb7/7G9GxHtnwuJBSnPJgN8t av2O9uWPC0N8deyZBH4y9ERBPTFMc46wjkW030olcq7g4hZ55rpPIEyGQZCq4u1gGibbiQJZ EyUQT7BJm70/PeUr3uNjPlQODV/lF5TBvqGHEmlSQfo6Yb/QQx07CK9bvhUSO2XP3ybS8Jwo MZlgZzZcjiPiQF9ot6152/Cp/XrsKgtk+fg5ARZpyywRlQk1JCHRZvhgXIxqNYA04uwdPFcL I4vPiDaLS8mhXHLRZsSpHmIBqqrnam5Lq7iDc39UZrSJMM40oy3iAOI2B7AOCbzxRuEplJd3 E/tEqrnFGcPVN+h52ka74lEyfkwA2RrASWJJcXLN3/VsizEj8okepefzjU/UPnU8sirzeWWo 8Z4uKddovk//NwAPUJbee4vZLjYE6MWdpEoZP9CZXbtIPWuc9Djg16aHOgv44JPokDMaHA27 A4rw2KwJEANvbJ7n856/SPkP/1bGUde7lnRTNd8c0ZrUtEi+OOibKyh7BjLUpzlihj3rGl9l jAF0eCdBrL1We3MDDcyi+XO7VZLiecZTlG6LLXFvEFjYpyPRx3bXlWk1/ahEiBoLWxedseNd FrO+H5XX6ODmKFFLhXgpsXnAxtM6Mxmrx0CGW4qzfUi7Vsqj86gqlcet0/k5RqPMAhrGX5fN nQNWSAwumeFKM8UgDpKY0u7M2tS07B0ozXOSpqGTSJhX6Ld2Nl95CL3wbSGuh1pDUOysAnzK 5Rl/OQ9LtYpWomAKg6yn7gKYij5XmekAg/E+ybr5Gyx2PgMQUGtuNmBRWP1qKtVUbrOekiuN z7kpdrP7M2O7i/cxWjGpVtjDNWuGkFgY3c+sKKawBma81K4rg044nkGwFX98vfEHVGu+HOd3 D+Mv47nv4LQvzynBG/YflwaPmLhpw7HCPvpa4W7y8+5AKxDqWlM2NvrLwmwbmz9dQMGtjnNR m4uHfPX8AyzBoMtDrxNLIvDYlLqh+G2Q1shNNNdRNXn9Z1pvri6KAHmH9GlISuM/jQfItout +Gtx9QUlNX3aIsdScTLA3jnMOpHcALCGI+XMiBNaVuYUxHgHh+MNYhmjQZZqASBCvVj1Hyib DPZa/iQ4DBGBRlJb+8saPPqYVDQhosWSF20aJKwepZIIOFjpMgmCIqZAnqK4uQINBFJRQrgB EADUWFag56O3CaycayGght1rYWYz7P9/3s7OlqAuEAId8/kSz8jXzAb/Qb6t0247a2MD0gxn jgZQy2OiQOsOTrc31L6tUrLVATL5Q3oKIh9hOlNMA+cRjsgY3UmMaSw+Gftp64EJDBQwBXWT 7CSUEJw4PqzwMPiTHRkmqQfzdfNagFJVqZ0e+cznoLzI9WvkccwLW1kicBYEysX5yOXUQ9/P cKqRWcbxLFznJ16JsxL1DeUct5WRWUxECY2rM0t+AkNRa3NpzskiMUSzFhiGmJo9yyy1RS4d rjMhEn/IcM1sO21ZF/WWuUVkul65qngFnaFDDRQ5lU3AagWhLhmppmK/yabSVfqz38B1APoB WuldYprslTbAOJrL2xFtiH7m9VYbP2aGdwr9V/C27kiNWnm/lYzP9Z+dTFkxw2V+BOjiLWzD DD6pEE7YDhiPyoopadOyXtoJf3aK1OI+DBu3piBA/CDDDvavruM+3mjxUxcOo8w8rMaJzDUD LG0yOyhKWef3UW5ly3CKXe8+m/MZe0GavNBJt0ObLQpPmnn9b2kP/xS0ssszo8uzlfSMiGi9 AedAoRQ7vFXfI0MBb0M8gJ6Ht/+j1b5Al9ABeeA3PRuu+aBJwBRdFp4AV5BsCa0Qb3aqVJUP uBvtY56aWWB9sSfQ1qeu/loRxkJbHhaPJswscQARAQABiQI8BBgBCgAmAhsMFiEEcs+sIXm8 sCS1tUWQA29snufznr8FAlrbVUkFCQxQbhEACgkQA29snufznr+YBw//TJtAC9d/FYQQHKQg /QOEkcAL8Qx4HA2SICnhKqv64jPcYIUYocOO8Qayh+IVDa6MGkbsWdweUFuexMsW+17dqETf QjUApx32TUwF44WgIEfARLW2zRdRcXfsT4A2sQJCvNJrJnH3lywiJi+V848Q4sC3sSJREpcJ d07oc2jxSKZyYZ1DBPfK1MyiwcBt2uFCTXdyFMham2aYLDP2JYvFP08tjTUAIKhe4B0bPTtl dCf5sH5q8xrpaHnKHf0n7qMmK7NtGW/9R6WiCruiNsLnO95fms1tzKKfA4QXIYCEWl8XsRKw p51HZDjQu/KxPsjm6BL4eThnae9t3Zs5J0LiPxoFbN+pW7anft3YCeezB8+gus7I1Rn5yJMR yYRRVHtZZTBDQfoDqHgLY14GYtFGOT0IR/OuAzYM1CoMvVExgqVWixDwF5RH1OHO1TANqTGc rRm1lvasCWIphpoQVtkN4/PXGa+NhzsRmr/c5OUYxQNroE8cdsK8mOIBRz9D2JpF7d2nr1X+ vA4zk2JL61aCnc62BfSYNZWhCcOPJZUhFT9BqAkew0kkJzQ3jwHGAhfcfozTHoFsD08qAW0O UriEtH+EOXl+dYbjlNUjFPjJu49cZbtp/1TpsYOBdME1QLM1TPanYXa7tb+IrRZN+Oi9i9VV ym16DK7q21k3j0qRC0s= Message-ID: <059a7ecf-4ef8-0903-d2ee-debb8bb108b4@FreeBSD.org> Date: Tue, 17 Mar 2020 13:51:25 +0000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <7c00489f-b9a2-2cc9-dd6b-dae600019099@snakeoilproductions.net> Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="M4PkxxaQRxeLVWmWdSp3QuYUmushZiKZs" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 13:51:28 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --M4PkxxaQRxeLVWmWdSp3QuYUmushZiKZs Content-Type: multipart/mixed; boundary="9mPhgiX8nPtaOx8FYXstumVH2vHcJkQsU" --9mPhgiX8nPtaOx8FYXstumVH2vHcJkQsU Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable On 17/03/2020 12:58, Florian Limberger wrote: > On 16.03.20 23:33, Chris wrote: >=20 >> For the record. I'm *only* using FreeBSD in this situation. I >> only mentioned Windows above, for the use of it's boot manager. >=20 > If you only use FreeBSD, and also use ZFS, you might find beadm[1] > interesting. >=20 > [1]: https://www.freshports.org/sysutils/beadm >=20 Did you know that the system now comes with bectl(8) which is very similar to beadm? As far as I can tell, the biggest difference is that if you have more than one ZFS in your boot environment then: beadm create FOO is actually equivalent to bectl create -r FOO ie. turning on the recursive functionality in bectl. However, this is not really what the OP was asking about. As I understand it, they were looking for something that would allow choosing between several independent installations of different versions of FreeBSD, rather than having multiple environments in the same installation. You can achieve pretty much the same effect though -- there is a boot menu option to switch between BEs. You would have to manage any ported software between the different OS versions, perhaps by including /usr/local and /var/db/pkg are both parts of your BEs. Cheers, Matthew --9mPhgiX8nPtaOx8FYXstumVH2vHcJkQsU-- --M4PkxxaQRxeLVWmWdSp3QuYUmushZiKZs Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEGfFU7L8RLlBUTj8wAFE/EOCp5OcFAl5w1d1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp 5Ofa7g//frR/OYcR3ZrtlUSV6PhmH7VllCWkJgmDUa6FfHt1dahaz1E+5ZwJPswA eiEiiUWI9IFLTGl6GYhQxFx05ANBRwVJ6s/hYTE7iiVZaCOff5sLt/HA72SCCFrT EPOxX7/zvRFnPia1FvHkUSDLmFD8cTrvaaSEeth7+gonJ+ofhNZd0X646h9bhbpI ezhXeh9w2VPhGtwx1okMCUks2C2T6PNUYx179/AJEugNSsHpSdOpWmjNg48sc+Z3 76DQXhhUlyU5w7uAbwRF4VekChKp9UdlhD7ff9YE5tkW5bEo0GM3Totz+bhbuzbZ LWqKPgdHfBHU+F2nmS6lwRw8Jbki2lsftCQE+77OVhONIGdBmKyF38Wud7RxRvyG 3fUimwaI8MNBTG00zGjKEo4eBOYYsxVIDjEtm5mFjk4mv+3q7LQ9fe0dtQepAJSq +1DUZoR/VfElUnzK61FsNlRK4mS/qNWAfQw7iFxlMII1HIiSn9yjqWm25kBXrbt+ pQyNAEvaoNBEOH58nOmjMCCpNS4CdtBj8Jzs1WW17gbWcfePYqU3qF4K81gdcE6z jmXpO45Bw+vFAlD5oXryM6Qqm8071h6oGuunw5Wvhqi1hIn1QsPtNEuvY3g0s8cb jv6zx+/mwG8v+CGHfFwh/hJ4TSyixFzN47gdMQfM6NoaurtsF0I= =kdZO -----END PGP SIGNATURE----- --M4PkxxaQRxeLVWmWdSp3QuYUmushZiKZs-- From owner-freebsd-current@freebsd.org Tue Mar 17 14:17:41 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C51EB267EF0 for ; Tue, 17 Mar 2020 14:17:41 +0000 (UTC) (envelope-from tsoome@me.com) Received: from st43p00im-zteg10061901.me.com (st43p00im-zteg10061901.me.com [17.58.63.168]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hZxw0KBlz3GR7 for ; Tue, 17 Mar 2020 14:17:39 +0000 (UTC) (envelope-from tsoome@me.com) Received: from [10.247.0.203] (unknown [91.209.240.229]) by st43p00im-zteg10061901.me.com (Postfix) with ESMTPSA id C1D33860385; Tue, 17 Mar 2020 14:17:35 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? From: Toomas Soome In-Reply-To: <059a7ecf-4ef8-0903-d2ee-debb8bb108b4@FreeBSD.org> Date: Tue, 17 Mar 2020 16:17:31 +0200 Cc: freebsd-current@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <7c00489f-b9a2-2cc9-dd6b-dae600019099@snakeoilproductions.net> <059a7ecf-4ef8-0903-d2ee-debb8bb108b4@FreeBSD.org> To: Matthew Seaman X-Mailer: Apple Mail (2.3608.60.0.2.5) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-03-17_05:, , signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-2003170061 X-Rspamd-Queue-Id: 48hZxw0KBlz3GR7 X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.42 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:17.58.0.0/16]; FREEMAIL_FROM(0.00)[me.com]; MV_CASE(0.50)[]; DKIM_TRACE(0.00)[me.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[me.com,quarantine]; RCVD_IN_DNSWL_LOW(-0.10)[168.63.58.17.list.dnswl.org : 127.0.5.1]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; FREEMAIL_ENVFROM(0.00)[me.com]; ASN(0.00)[asn:714, ipnet:17.58.63.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.82)[-0.819,0]; R_DKIM_ALLOW(-0.20)[me.com:s=1a1hai]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(0.00)[ip: (-4.07), ipnet: 17.58.63.0/24(-1.56), asn: 714(-2.38), country: US(-0.05)]; IP_SCORE_FREEMAIL(0.00)[]; DWL_DNSWL_LOW(-1.00)[me.com.dwl.dnswl.org : 127.0.5.1]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 14:17:41 -0000 > On 17. Mar 2020, at 15:51, Matthew Seaman wrote: >=20 > On 17/03/2020 12:58, Florian Limberger wrote: >> On 16.03.20 23:33, Chris wrote: >>=20 >>> For the record. I'm *only* using FreeBSD in this situation. I >>> only mentioned Windows above, for the use of it's boot manager. >>=20 >> If you only use FreeBSD, and also use ZFS, you might find beadm[1] >> interesting. >>=20 >> [1]: https://www.freshports.org/sysutils/beadm >>=20 >=20 > Did you know that the system now comes with bectl(8) which is very > similar to beadm? As far as I can tell, the biggest difference is = that > if you have more than one ZFS in your boot environment then: >=20 > beadm create FOO >=20 > is actually equivalent to >=20 > bectl create -r FOO >=20 > ie. turning on the recursive functionality in bectl. >=20 > However, this is not really what the OP was asking about. As I > understand it, they were looking for something that would allow = choosing > between several independent installations of different versions of > FreeBSD, rather than having multiple environments in the same > installation. You can achieve pretty much the same effect though -- > there is a boot menu option to switch between BEs. You would have to > manage any ported software between the different OS versions, perhaps = by > including /usr/local and /var/db/pkg are both parts of your BEs. >=20 > Cheers, >=20 > Matthew >=20 BE=E2=80=99s can solve some scenarios. However, it is easy to add = support for few more. The current BE menu is populated automatically = from the zfs. However, it is also simple task to add a file parser to it = and read menu file with entries with different pool (we only need to = activate such entries same way as it is currently done for =E2=80=9Cnormal= =E2=80=9D BE, or entries with chain load). Read this menu file first and = zfs BE list after, and you have BE menu with manual and automatic = entries. Can be implemented within few hours.=20 rgds, Toomas From owner-freebsd-current@freebsd.org Tue Mar 17 14:28:33 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 09ACE2683DD for ; Tue, 17 Mar 2020 14:28:33 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (static-24-113-41-81.wavecable.com [24.113.41.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "ultimatedns.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48hbBS23qTz4Dxc for ; Tue, 17 Mar 2020 14:28:31 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (localhost [IPv6:0:0:0:0:0:0:0:1]) by udns.ultimatedns.net (8.15.2/8.15.2) with ESMTPS id 02HESeD7033009 (version=TLSv1.2 cipher=DHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 17 Mar 2020 07:28:47 -0700 (PDT) (envelope-from bsd-lists@BSDforge.com) X-Mailer: Cypht MIME-Version: 1.0 Cc: In-Reply-To: <6bf1a155-b0c7-e96c-6760-54ca5b5a92a8@denninger.net> From: Chris Reply-To: bsd-lists@BSDforge.com To: Karl Denninger Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? Date: Tue, 17 Mar 2020 07:28:46 -0700 Message-Id: <5f539384af3832da5f80a0671cea767c@udns.ultimatedns.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 48hbBS23qTz4Dxc X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.17 / 15.00]; NEURAL_SPAM_MEDIUM(0.98)[0.975,0]; ASN(0.00)[asn:11404, ipnet:24.113.0.0/16, country:US]; local_wl_ip(0.00)[24.113.41.81]; NEURAL_HAM_LONG(-0.80)[-0.802,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 14:28:33 -0000 On Mon, 16 Mar 2020 22:03:02 -0500 Karl Denninger karl@denninger=2Enet said > On 3/16/2020 17:33, Chris wrote: > > On Mon, 16 Mar 2020 17:24:24 -0500 Karl Denninger karl@denninger=2Enet sa= id > > > >> On 3/16/2020 17:23, Chris wrote: > >> > I'm attempting to boot multiple versions of FreeBSD=2E > >> > I started with an install of older 11 with a (u)efi > >> > boot partition installed=2E I then grabbed an current 11 > >> > usbstick, and installed that=2E Which stated it needed to > >> > install a (u)efi boot partition=2E I let it do it=2E But the > >> > new (additional) install doesn't show up at boot=2E Altho > >> > my UEFI BIOS sees it=2E > >> > I guess there are just too many uefi bios versions, > >> > and too many changes in the FreeBSD uefi boot code > >> > to expect consistent results over the long haul=2E > >> > Should I just convert the 1st efi (GPT) boot partition > >> > to a PMBR, and delete the second efi partition=2E Or is > >> > there a recommended bootmanager I can use to boot multiple > >> > versions of FreeBSD? Windows? > >> > > >> > Thank you! > >> > > >> > --Chris > >> > > >> Refind perhaps? > > Thanks for the reply, Karl! :) > > I've used that before for FreeBSD/MacOS combos=2E I'll look at it again=2E > > > > For the record=2E I'm *only* using FreeBSD in this situation=2E I > > only mentioned Windows above, for the use of it's boot manager=2E > > > > Thanks again! > > > Refind will find all the bootable EFI "elements" in the EFI partition > and menu them=2E=C2=A0 The question then becomes whether multiple efi loade= rs > can be told to each use a *different* partition to load the kernel from > (and thus the loader file, which in turn can tell it where the root > filesystem is=2E) >=20 > Reading through the man page it appears they may not be=2E=C2=A0 You could = of > course interrupt it and manually select that, but I suspect that's not > what you want to have to do=2E >=20 > I use refind on a dual-boot (win10/FreeBSD) system but not with multiple > independent FreeBSD versions=2E Thanks for all the detail, Karl=2E I was also looking at those details=2E It occurs to me that an *ideal* arrangement might be the ability to name each efi loader according to it's target, or probably better; (name) the directo= ries that hold the loaders=2E It just seems wasteful/inefficient to create x numbe= r of efi partitions for x number of OSs=2E Maybe boot0 could be coerced info something similar? I'm currently looking at Clover (popular with the "hackintosh" users) that seems to do something similar=2E Thanks again! --Chris >=20 > --=20 > Karl Denninger > karl@denninger=2Enet > /The Market Ticker/ > /[S/MIME encrypted email preferred]/ From owner-freebsd-current@freebsd.org Tue Mar 17 16:01:59 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 83BCE26A5CE for ; Tue, 17 Mar 2020 16:01:59 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (static-24-113-41-81.wavecable.com [24.113.41.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "ultimatedns.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48hdGG0fK1z3wlq for ; Tue, 17 Mar 2020 16:01:57 +0000 (UTC) (envelope-from bsd-lists@BSDforge.com) Received: from udns.ultimatedns.net (localhost [IPv6:0:0:0:0:0:0:0:1]) by udns.ultimatedns.net (8.15.2/8.15.2) with ESMTPS id 02HG2857035591 (version=TLSv1.2 cipher=DHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Tue, 17 Mar 2020 09:02:15 -0700 (PDT) (envelope-from bsd-lists@BSDforge.com) X-Mailer: Cypht MIME-Version: 1.0 In-Reply-To: From: Chris Reply-To: bsd-lists@BSDforge.com To: Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? Date: Tue, 17 Mar 2020 09:02:14 -0700 Message-Id: <062e3f0ca7fbb87adc424215b441f897@udns.ultimatedns.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 48hdGG0fK1z3wlq X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.67 / 15.00]; NEURAL_SPAM_MEDIUM(0.97)[0.974,0]; ASN(0.00)[asn:11404, ipnet:24.113.0.0/16, country:US]; local_wl_ip(0.00)[24.113.41.81]; NEURAL_HAM_LONG(-0.30)[-0.302,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 16:01:59 -0000 On Tue, 17 Mar 2020 16:17:31 +0200 Toomas Soome tsoome@me=2Ecom said > > On 17=2E Mar 2020, at 15:51, Matthew Seaman wrote: > >=20 > > On 17/03/2020 12:58, Florian Limberger wrote: > >> On 16=2E03=2E20 23:33, Chris wrote: > >>=20 > >>> For the record=2E I'm *only* using FreeBSD in this situation=2E I > >>> only mentioned Windows above, for the use of it's boot manager=2E > >>=20 > >> If you only use FreeBSD, and also use ZFS, you might find beadm[1] > >> interesting=2E > >>=20 > >> [1]: https://www=2Efreshports=2Eorg/sysutils/beadm > >>=20 > >=20 > > Did you know that the system now comes with bectl(8) which is very > > similar to beadm? As far as I can tell, the biggest difference is that > > if you have more than one ZFS in your boot environment then: > >=20 > > beadm create FOO > >=20 > > is actually equivalent to > >=20 > > bectl create -r FOO > >=20 > > ie=2E turning on the recursive functionality in bectl=2E > >=20 > > However, this is not really what the OP was asking about=2E As I > > understand it, they were looking for something that would allow choosin= g > > between several independent installations of different versions of > > FreeBSD, rather than having multiple environments in the same > > installation=2E You can achieve pretty much the same effect though -- > > there is a boot menu option to switch between BEs=2E You would have to > > manage any ported software between the different OS versions, perhaps b= y > > including /usr/local and /var/db/pkg are both parts of your BEs=2E > >=20 > > =09Cheers, > >=20 > > =09Matthew > >=20 >=20 > BE=E2=80=99s can solve some scenarios=2E However, it is easy to add support= for few > more=2E The current BE menu is populated automatically from the zfs=2E Howeve= r, > it is also simple task to add a file parser to it and read menu file with > entries with different pool (we only need to activate such entries same w= ay > as it is currently done for =E2=80=9Cnormal=E2=80=9D BE, or entries with = chain load)=2E > Read this menu file first and zfs BE list after, and you have BE menu wit= h > manual and automatic entries=2E Can be implemented within few hours=2E=20 >=20 A *huge* thanks for all the thoughtful replies! In detail=2E I maintain *many* ports, and it's not always enough to ensure that they build properly=2E In some cases I need to ensure they actually operate on FreeBSD/some-version=2E To test for building; it's been enough for me to spin up any number of jails using whatever (fbsd) revision I'm testin= g against=2E I had/am hoping that I can create a similar environment=2E That allo= ws for pouring a (fbsd) revision on a slice, and actually booting into it *and= * a DE=2E This requires (in my mind) the necessity to dedicate a box for that task=2E This is (currently) all on GPT/UFS scheme/slices=2E I use the pre-creat= ed revision(s) I already use in my jails, which are all tarballs named after the version-revision=2E disk0: gpart destroy -F ada0 gpart create -s GPT ada0 gpart add -t freebsd-boot -l =2E=2E=2E ada0 gpart add -t freebsd-ufs -l workdrive -s ada0 =2E=2E=2E gpart add -t freebsd-ufs -l 11R-rXXXXXX -s ada0 gpart add -t freebsd-usf -l 12S-rXXXXXX -s ada0 gpart add -t freebsd-usf -l 12C-rXXXXXX -s ada0 =2E=2E=2E disk1: one *giant* unbootable slice containing all the tarred up revisions I work with=2E Boot into workdrive; which also mounts disk1; newfs a slice && unpack the appropriate archive onto the newly formatted slice=2E Then *attempt* to boot into it after bouncing the box=2E The last part is the one I'm asking th= is question for=2E It seems to me that /boot on any one of the slices should hav= e enough in it to be a legal candidate to boot into=2E It seems that it *should= * be possible to get there with whats already available on the beginning of t= he drive=2E I'd use any one of the ZFS suggestions, except the spare I'm working with is only a SandyBridge=2E So probably not powerful enough to manage the overhead required=2E I hope this clears things up, and isn't *too* verbose=2E Thanks for all the valuable input I received, and any additional enlightenment that might foll= ow! :) --Chris From owner-freebsd-current@freebsd.org Tue Mar 17 19:39:20 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8D5E8270B14 for ; Tue, 17 Mar 2020 19:39:20 +0000 (UTC) (envelope-from gpalmer@freebsd.org) Received: from mail.in-addr.com (mail.in-addr.com [IPv6:2a01:4f8:191:61e8::2525:2525]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48hk536BqLz42ml for ; Tue, 17 Mar 2020 19:39:19 +0000 (UTC) (envelope-from gpalmer@freebsd.org) Received: from gjp by mail.in-addr.com with local (Exim 4.92.3 (FreeBSD)) (envelope-from ) id 1jEI3T-00080v-VK; Tue, 17 Mar 2020 19:39:12 +0000 Date: Tue, 17 Mar 2020 19:39:11 +0000 From: Gary Palmer To: Chris Cc: freebsd-current@freebsd.org Subject: Re: what 3rd party boot mgr is required to boot multiple freebsd versions? Message-ID: <20200317193911.GA5808@in-addr.com> References: <062e3f0ca7fbb87adc424215b441f897@udns.ultimatedns.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <062e3f0ca7fbb87adc424215b441f897@udns.ultimatedns.net> X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: gpalmer@freebsd.org X-SA-Exim-Scanned: No (on mail.in-addr.com); SAEximRunCond expanded to false X-Rspamd-Queue-Id: 48hk536BqLz42ml X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-0.36 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_LONG(-0.89)[-0.887,0]; NEURAL_SPAM_MEDIUM(0.53)[0.526,0]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Mar 2020 19:39:20 -0000 On Tue, Mar 17, 2020 at 09:02:14AM -0700, Chris wrote: > On Tue, 17 Mar 2020 16:17:31 +0200 Toomas Soome tsoome@me.com said > > > > On 17. Mar 2020, at 15:51, Matthew Seaman wrote: > > > > On 17/03/2020 12:58, Florian Limberger wrote: > > >> On 16.03.20 23:33, Chris wrote: > > >> >>> For the record. I'm *only* using FreeBSD in this situation. I > > >>> only mentioned Windows above, for the use of it's boot manager. > > >> >> If you only use FreeBSD, and also use ZFS, you might find beadm[1] > > >> interesting. > > >> >> [1]: https://www.freshports.org/sysutils/beadm > > >> > > Did you know that the system now comes with bectl(8) which is > > very > > > similar to beadm? As far as I can tell, the biggest difference is that > > > if you have more than one ZFS in your boot environment then: > > > > beadm create FOO > > > > is actually equivalent to > > > > bectl create -r FOO > > > > ie. turning on the recursive functionality in bectl. > > > > However, this is not really what the OP was asking about. As I > > > understand it, they were looking for something that would allow choosing > > > between several independent installations of different versions of > > > FreeBSD, rather than having multiple environments in the same > > > installation. You can achieve pretty much the same effect though -- > > > there is a boot menu option to switch between BEs. You would have to > > > manage any ported software between the different OS versions, perhaps by > > > including /usr/local and /var/db/pkg are both parts of your BEs. > > > > Cheers, > > > > Matthew > > > > > > > BE???s can solve some scenarios. However, it is easy to add support for few > > more. The current BE menu is populated automatically from the zfs. However, > > it is also simple task to add a file parser to it and read menu file with > > entries with different pool (we only need to activate such entries same way > > as it is currently done for ???normal??? BE, or entries with chain load). > > Read this menu file first and zfs BE list after, and you have BE menu with > > manual and automatic entries. Can be implemented within few hours. > > > A *huge* thanks for all the thoughtful replies! > In detail. I maintain *many* ports, and it's not always enough to ensure > that they build properly. In some cases I need to ensure they actually > operate on FreeBSD/some-version. To test for building; it's been enough for > me to spin up any number of jails using whatever (fbsd) revision I'm testing > against. I had/am hoping that I can create a similar environment. That allows > for pouring a (fbsd) revision on a slice, and actually booting into it *and* > a DE. This requires (in my mind) the necessity to dedicate a box for that > task. This is (currently) all on GPT/UFS scheme/slices. I use the pre-created > revision(s) I already use in my jails, which are all tarballs named after > the version-revision. > disk0: > gpart destroy -F ada0 > gpart create -s GPT ada0 > gpart add -t freebsd-boot -l ... ada0 > gpart add -t freebsd-ufs -l workdrive -s ada0 > ... > gpart add -t freebsd-ufs -l 11R-rXXXXXX -s ada0 > gpart add -t freebsd-usf -l 12S-rXXXXXX -s ada0 > gpart add -t freebsd-usf -l 12C-rXXXXXX -s ada0 > ... > disk1: > one *giant* unbootable slice containing all the tarred up revisions I work > with. > Boot into workdrive; which also mounts disk1; newfs a slice && unpack > the appropriate archive onto the newly formatted slice. Then *attempt* to > boot into it after bouncing the box. The last part is the one I'm asking this > question for. It seems to me that /boot on any one of the slices should have > enough in it to be a legal candidate to boot into. It seems that it *should* > be possible to get there with whats already available on the beginning of the > drive. I'd use any one of the ZFS suggestions, except the spare I'm working > with is only a SandyBridge. So probably not powerful enough to manage the > overhead required. > > I hope this clears things up, and isn't *too* verbose. Thanks for all the > valuable input I received, and any additional enlightenment that might follow! :) Hi, Why not use VirtualBox and different VMs with different versions? That would seem to be easier than messing with boot environments, assuming the hardware has enough RAM to support VBOX. Gary From owner-freebsd-current@freebsd.org Wed Mar 18 02:14:26 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id ECB47279606 for ; Wed, 18 Mar 2020 02:14:26 +0000 (UTC) (envelope-from neel@neelc.org) Received: from rainpuddle.neelc.org (rainpuddle.neelc.org [IPv6:2001:19f0:8001:fed:5400:2ff:fe73:c622]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48htrx2xxMz4JjN for ; Wed, 18 Mar 2020 02:14:25 +0000 (UTC) (envelope-from neel@neelc.org) Received: from mail.neelc.org (rainpuddle.neelc.org [IPv6:2001:19f0:8001:fed:5400:2ff:fe73:c622]) by rainpuddle.neelc.org (Postfix) with ESMTPSA id 8B79FB1EF6 for ; Tue, 17 Mar 2020 19:14:16 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Tue, 17 Mar 2020 19:14:15 -0700 From: Neel Chauhan To: freebsd-current@freebsd.org Subject: [MFC Request]: snd_hda: Add Intel Cannon Lake support (r352775) isn't in 12-STABLE or 11-STABLE User-Agent: Roundcube Webmail/1.4.1 Message-ID: X-Sender: neel@neelc.org X-Rspamd-Queue-Id: 48htrx2xxMz4JjN X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=neelc.org; spf=pass (mx1.freebsd.org: domain of neel@neelc.org designates 2001:19f0:8001:fed:5400:2ff:fe73:c622 as permitted sender) smtp.mailfrom=neel@neelc.org X-Spamd-Result: default: False [-5.94 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.90)[-0.899,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; IP_SCORE(-3.34)[ip: (-9.82), ipnet: 2001:19f0:8000::/38(-4.91), asn: 20473(-1.91), country: US(-0.05)]; DMARC_POLICY_ALLOW(-0.50)[neelc.org,none]; RCVD_COUNT_ONE(0.00)[1]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:20473, ipnet:2001:19f0:8000::/38, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; ONCE_RECEIVED(0.10)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Mar 2020 02:14:27 -0000 Hi freebsd-current@, Back in September, I submitted a patch which adds support for the HD Audio codecs in Intel's Cannon Lake PCH as used by the HP Spectre x360 2018/13-ap0053dx (the "13-p0043dx" is a typo). This was committed as r352775 and r352776. However, these two patches are not in 12-STABLE or 11-STABLE, despite having a MFC tag. This means people with newer Cannon Lake-based laptops like the 2018 Spectre x360 (or a ThinkPad with an equivalent PCH) are forced to use CURRENT. Could someone please MFC these patches? -Neel === https://www.neelc.org/ From owner-freebsd-current@freebsd.org Wed Mar 18 20:36:09 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E0F4026C08C for ; Wed, 18 Mar 2020 20:36:09 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic314-21.consmr.mail.ne1.yahoo.com (sonic314-21.consmr.mail.ne1.yahoo.com [66.163.189.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jMJ84ZYmz4Cpq for ; Wed, 18 Mar 2020 20:36:08 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: dKsfGqAVM1mHrPT2roOjZzFz_9pFwrDaojQJ3nk48kShpifP17PdUNx.tood9JX 3XRnu8PktC0ZWbS.y5TJP_ZnbozHpjeGzcb56oDMdcZ6vWDNNUhkjJKDasUko3bpqZLF6nzut0OS Iv524BXkErqDLMGB.8TQSBvUZ0gccmqhvZVg9YunAHxX0x5yBND_WmO_Ci4r8hA0bivT9KeqLZO4 YeTb9jlUuUCMgcDnS8OX.vHvPmbgKln3jgXOqlZEqx7iDVVvmx8527gKJKxFit1jFB2g2MSomuMX 9n.cocTLpHpLOhZzQhTcEGIbEKbF41uz8FpRkfuEO21jY9Gbvb90EbgamT7f058BkmieBYQpwNfG 9IoB0eaFTcv_eRbvbuoyKItgASSKjumsxpl4Q.2TiGFZSOXj.RwoRkIypW7_4FBUgTmC1vZiHBfD B.gisWXQeLvRfQun7xMAr7Q.ftGX2wdsyIK0L61cn4BD9Fsm9wYbY9JsJshthf9ebGiBxox5CPDA D3IrGHNUx5FD4lBzxVdyRyoWxGbYv38GChPjNq.PJ9jQdC8BckYKZns0pHXQIZBrLDSkmdQ_AOVp _VkTycNnZYo8fatk29ZK3C30Jq9J5XFt9FxWLVlGxBcH9lhwN_uq1Bo3q3uXChzOWd.S4wzSEHEe u0ISOgjgksoJz2QL4IODBFF9eVhuenjAUXOtGUOIBfvBW9hTJZzxsF29l.cO3aSrU3fnwA33rSXV V2O__wujejb4k1EbgAI3tWYGuTmRg6eXWWHthFxhlpaIe9owNjSXAINPEZAU.auHuGb9OiQLNVsB OW9UPqcD2rRD0HvzNjGQCjtdpPWp9F7gfsXNbTgtWD4wYnMn1mfF2JohvQ8GF9NFe.N7sHD3MuQW f.HQhHl8arw25jb4UD6lc2iHFeW6botfr3zz0WjeCXwBxm8nb3amdQvzaZTfyHOI5zln3UgHFqKU qtzUJacqGKTnv9bE6ipnrDll1PW97P129O96g156FMA65xz2pP51maTCBhmrvKCnTZTURHwdtzwq Z5BNZQqdR3bWaFPf6IKL3nFGsDt.bzYvGXHmVa3BbO3pdGI6il6gtRlrNGbdMiQEGFjpqKNrgv6I rOi3h4tmijT1EexfqMVKAdtsV6pPiQmvbHNP3BzCM1j7.pffte5jLXVaijsH4KnXDk7.VTg5WlHy kopbGKW8HYlKZrwTS4ThyHP8RkvWM0NfwWW.PvDuTZxC7Of1aOkSwDrAy5.X34VUtKw2rvzPX1Ch ieMzAQSywtdziJzJKYI0mNJyc.0SXtjHHcEOkHyi2vAcAA5d0_R0o1GJu8Xqdk6Vkk_YSRDXf3Cm ef7a8yHptmGtXv.GnyLZCGtCuJksMPPqcY8ErqG3X7TMMlKP2H5yyUmfUfrceShm2fMr_ltGjs0z A5EemOJdeBPh57xybn577ghomQ_5K3gvvhfDDM3yi5zrrV952XDrXPUtaFWw- Received: from sonic.gate.mail.ne1.yahoo.com by sonic314.consmr.mail.ne1.yahoo.com with HTTP; Wed, 18 Mar 2020 20:36:06 +0000 Received: by smtp404.mail.ne1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID ae191b1f03707104a6da5e9c2253e209; Wed, 18 Mar 2020 20:36:04 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: head -r538966 on OrangePi+ 2ed: boot loader crashes when USB drive is present at power-on/boot Message-Id: <863312E1-4216-49BA-A623-CAC85F123655@yahoo.com> Date: Wed, 18 Mar 2020 13:36:02 -0700 To: freebsd-arm , FreeBSD Current X-Mailer: Apple Mail (2.3608.60.0.2.5) References: <863312E1-4216-49BA-A623-CAC85F123655.ref@yahoo.com> X-Rspamd-Queue-Id: 48jMJ84ZYmz4Cpq X-Spamd-Bar: + X-Spamd-Result: default: False [1.48 / 15.00]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; FREEMAIL_FROM(0.00)[yahoo.com]; MIME_GOOD(-0.10)[text/plain]; MV_CASE(0.50)[]; RCVD_COUNT_TWO(0.00)[2]; NEURAL_SPAM_MEDIUM(0.99)[0.995,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[147.189.163.66.list.dnswl.org : 127.0.5.0]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; RCVD_TLS_LAST(0.00)[]; NEURAL_SPAM_LONG(0.99)[0.987,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36646, ipnet:66.163.184.0/21, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.00)[ip: (4.56), ipnet: 66.163.184.0/21(1.18), asn: 36646(0.94), country: US(-0.05)]; DWL_DNSWL_NONE(0.00)[yahoo.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Mar 2020 20:36:10 -0000 Without a USB drive present at power-on or boot, the OPi+2e boots fine. (The USB drives involved have a partition holding a ufs file system and a partition holding a swap/aging space.) In all cases below, /boot/ is from the microsd card. But the intended configuration is for vfs.root.mountfrom to be used to direct the stages after kernel-booting to the USB drive. The output sequence related to the crash when the USB drive is present looks like: QUOTE U-Boot SPL 2019.07 (Aug 02 2019 - 11:19:36 +0000) DRAM: 2048 MiB Trying to boot from MMC1 U-Boot 2019.07 (Aug 02 2019 - 11:19:36 +0000) Allwinner Technology CPU: Allwinner H3 (SUN8I 1680) Model: Xunlong Orange Pi Plus 2E DRAM: 2 GiB MMC: Device 'mmc@1c11000': seq 1 is in use by 'mmc@1c10000' mmc@1c0f000: 0, mmc@1c10000: 2, mmc@1c11000: 1 Loading Environment from FAT... Unable to use mmc 1:1... In: serial Out: serial Err: serial Net: phy interface7 eth0: ethernet@1c30000 starting USB... Bus usb@1c1a000: USB EHCI 1.00 Bus usb@1c1a400: USB OHCI 1.0 Bus usb@1c1b000: USB EHCI 1.00 Bus usb@1c1b400: USB OHCI 1.0 Bus usb@1c1c000: USB EHCI 1.00 Bus usb@1c1c400: USB OHCI 1.0 Bus usb@1c1d000: USB EHCI 1.00 Bus usb@1c1d400: USB OHCI 1.0 scanning bus usb@1c1a000 for devices... 1 USB Device(s) found scanning bus usb@1c1a400 for devices... 1 USB Device(s) found scanning bus usb@1c1b000 for devices... 1 USB Device(s) found scanning bus usb@1c1b400 for devices... 1 USB Device(s) found scanning bus usb@1c1c000 for devices... 1 USB Device(s) found scanning bus usb@1c1c400 for devices... 1 USB Device(s) found scanning bus usb@1c1d000 for devices... 2 USB Device(s) found scanning bus usb@1c1d400 for devices... 1 USB Device(s) found scanning usb for storage devices... 1 Storage Device(s) found Hit any key to stop autoboot: 0=20 switch to partitions #0, OK mmc0 is current device Scanning mmc 0:1... Found U-Boot script /boot.scr 199 bytes read in 1 ms (194.3 KiB/s) ## Executing script at 43100000 384312 bytes read in 19 ms (19.3 MiB/s) ## Starting application at 0x42000000 ... Consoles: U-Boot console =20 Compatible U-Boot API signature found @0xb9f6ea60FreeBSD/armv7 U-Boot = loader, Revision 1.3 DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. Found U-Boot device: disk Probing all devices... Checking unit=3D0 slice=3D partition=3D...data abort pc : [<42009068>] lr : [<420603f8>] reloc pc : [] lr : [] sp : b9f649f8 ip : 42062900 fp : b9f64a28 r10: b9f64a58 r9 : 42062640 r8 : 420623c0 r7 : 420626c0 r6 : 00000000 r5 : 42062650 r4 : 420626c0 r3 : 00000000 r2 : 00000980 r1 : 00000000 r0 : 000000ee Flags: nZCv IRQs off FIQs off Mode SVC_32 Code: e3500080 1afffefb e5d801c2 e35000ee (059821c6)=20 Resetting CPU ... resetting ... END QUOTE Stopping it earlier and using: setenv loaderdev mmc 0 boot avoids the problem because it avoids "probing" the USB drive at the stage indicated above. But the boot then actually uses: vfs.root.mountfrom=3D"ufs:/dev/gpt/BPIM3root" in the /boot/loader.conf on the microsd card. ufs:/dev/gpt/BPIM3root is a reference to the ufs partition on the USB media. (With the mountfrom commented out the microsd card is bootable by itself.) So later the USB drive is put to use successfully when the initial probing is avoided. Looking in the /usr/src/stand/uboot/common/main.c code shows: static int probe_disks(int devidx, int load_type, int load_unit, int load_slice, int load_partition) { . . . if (load_unit =3D=3D -1) { printf(" Probing all %s devices...\n", = device_typename(load_type)); /* Try each disk of given type in succession until one = works. */ for (unit =3D 0; unit < UB_MAX_DEV; unit++) { currdev.dd.d_unit =3D = uboot_diskgetunit(load_type, unit); if (currdev.dd.d_unit =3D=3D -1) break; print_disk_probe_info(); open_result =3D devsw[devidx]->dv_open(&f, = &currdev); if (open_result =3D=3D 0) { printf(" good.\n"); return (0); } printf("\n"); } return (-1); } . . . } So it appears that the crash is during the code involved for the line: open_result =3D devsw[devidx]->dv_open(&f, &currdev); Note that the boot attempt reported "Probing all devices..." so device_typename(load_type) came up with "". (I've no clue if that is significant to the issue or not.) It appeared that /usr/src/stand/usb/storage/umass_loader.c and its umass_disk_open and umass_disk_open_sub might be involved and then code from the likes of: /usr/src/sys/dev/usb/ --such as from usb_msctest.c for usb_msc_read_capacity. (I stopped looking around there: well outside areas I know how to interpret.) For reference, I used the OPi+2e u-boot material from my poudriere-devel based port builds: # ls -ldT /usr/local/share/u-boot/u-boot-orangepi-plus-2e/* -rw-r--r-- 1 root wheel 503 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/README -rw-r--r-- 1 root wheel 199 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/boot.scr -rw-r--r-- 1 root wheel 66 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/metadata -rw-r--r-- 1 root wheel 471250 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/u-boot-sunxi-with-spl.bin (The USB drives are USB SSDs.) =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-current@freebsd.org Thu Mar 19 02:09:14 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8846C275F01 for ; Thu, 19 Mar 2020 02:09:14 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670075.outbound.protection.outlook.com [40.107.67.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48jVhR36nsz3Kqx; Thu, 19 Mar 2020 02:09:10 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UpOd1z79cFkXDtjnfIeW/3XYNEwgA0qhxyz6mtdJid5rjo8LJ/tfrutJO749C72hRZD1tu34aCyxcQNmgNCXnKaNd/RTMdUNbFFwnF7Rt5u9MeJdaSwPhBWPggdzY0n7y4ASSFqG+aw1OeilLhmX9JHQjIO/MtwiDxTikXXBpH/qqDKLFCNuDTs9PRR21fPzigt3BHVa7ZIpM9t8VsBjSZkMfbeUsuhBfnTlEq6NaVhmO0tYUisuf9P5gOWM5WU8f3iP1ZyHhQAq0XquDrXWxBp9XQAsy/6u3XexsKyzdu6jaaD2w8WKI+/fr3I43U0iC0pt9ZzPI6H9WbbpcXVylg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7Wi2Tbn4iZCdrcyxpYPlf7stG1SfRIV9ueNJucZHQTo=; b=nxzTjfuqQGobZmDqoUsM9x1v645R+ZUi1qk8xyBMqSUAu28zVcxLH3uaK1OKxteOj+ITmL8iOlagAt5rNrR09rkzZRlBVA1LnO7VySbMyjHMJCMcevLRWTr4lVgAnye6P7B7aKuUfev9kiSLK+9jvVhVxBYFAscs98BY8if6Gri1GYUl/XtMgMIpA0Y1IGnzZLYjyxe3DsZKd4DFzjr57LCltyuEokKmIemsmyr+GMCkLe9jXgbbHyBoJFGkpWlCp9zKnU5BmRHZVNqsVjgHkYICmJFCV73nJW8lrF3njO2kVI/3pCc53WnlCLjUPAMe1ZaxnJlZnmLsLfGHIIOFFw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM (10.255.46.82) by YTBPR01MB2559.CANPRD01.PROD.OUTLOOK.COM (10.255.46.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2814.22; Thu, 19 Mar 2020 02:09:09 +0000 Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4]) by YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4%6]) with mapi id 15.20.2814.025; Thu, 19 Mar 2020 02:09:09 +0000 From: Rick Macklem To: Miroslav Lachman <000.fbsd@quip.cz>, Hiroki Sato CC: "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Thread-Topic: TLS certificates for NFS-over-TLS floating client Thread-Index: AQHV8dDjD29GK4BL2kGnxfg+gW2rAag32PeAgABluQCAFwCY9g== Date: Thu, 19 Mar 2020 02:09:08 +0000 Message-ID: References: <20200304.133515.520383339344620673.hrs@FreeBSD.org>, In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 139250ad-a962-4dec-f77f-08d7cbaa827f x-ms-traffictypediagnostic: YTBPR01MB2559: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-forefront-prvs: 0347410860 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(376002)(396003)(39860400002)(366004)(199004)(478600001)(110136005)(2906002)(786003)(86362001)(4326008)(316002)(33656002)(71200400001)(966005)(8936002)(9686003)(6506007)(55016002)(66476007)(66556008)(81156014)(52536014)(186003)(76116006)(8676002)(66446008)(64756008)(66946007)(5660300002)(7696005)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:YTBPR01MB2559; H:YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: 3TVb+2MIM8TM6qyko0622PhmZPHjM0ZKCuz7CgEVOcZawPiGPE/NO7qNfhrFsr4vLWH1m9S9NCjQmQlT+jgv7uth7s4P6v5LglG93zeSOm+bU/MPyeLZ7DaeIAp+NBH/OgHYOdeNJXx8dcS0DXPwbeao4O6Fnqhj2FpTapT7OTE8JVgZpLExWFR+YRZOw67jK/u2k+pnMdAotyz6nC30Rg== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 139250ad-a962-4dec-f77f-08d7cbaa827f X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Mar 2020 02:09:08.9418 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: lyk7/FHNGZp1FrOwEZip6/r1ZvTgZyA/Fp+WY+XIfLO3jojTTO1be1Pipey5oQI6CO/2ffTyAEZZlkvN6bAAbA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTBPR01MB2559 X-Rspamd-Queue-Id: 48jVhR36nsz3Kqx X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.67.75 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-4.67 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.989,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[75.67.107.40.list.dnswl.org : 127.0.3.0]; IP_SCORE(-1.38)[ipnet: 40.64.0.0/10(-3.75), asn: 8075(-3.10), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8075, ipnet:40.64.0.0/10, country:US]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 02:09:14 -0000 Miroslav Lachman wrote:=0A= >Hiroki Sato wrote on 2020/03/04 05:35:=0A= >=0A= [...]=0A= >=0A= >> I do not think it is a good idea to use a certificate with an=0A= >> embedded secret for authentication and/or authorization.=0A= >>=0A= >> In the case that the client offers a certificate upon establishing a= =0A= >> TLS connection for authentication purpose, the authenticity will be=0A= >> checked on the server usually by using the CA certificate which was=0A= >> used to issue the client certificate. The CA cert must be put to=0A= >> somewhere the NFS server can read.=0A= >>=0A= >> The CA cert is secret. So if the NFS server can check the client=0A= >> certificate by the CA certificate, it means the NFS server can=0A= >> trust the client. I think no additional information is required.=0A= >=0A= >NFS (or any other server) should check list of revoked certificates too.= =0A= >Otherwise you will not be able to deny access to user which you no=0A= >longer want to have an access.=0A= Yes, good point.=0A= I won't claim to understand this stuff, but from what I can see, all that i= s=0A= done is the CRL is appended to the CAfile (the one with the CA certificates= =0A= are in being used for certificate verification via SSL__CTX_load_verify_loc= ations().=0A= (https://raymii.org/s/articles/OpenSSL_manually_verify_a_certificate_agains= t_a_CRL.html=0A= shows a CAfile and CRLfile being concatenated and then used to verify a cer= tificate.)=0A= =0A= There is code in sendmail that loads a CRL file separately, but it seems to= =0A= just put it in the X509 store returned by SSL_CTX_get_cert_store(), which= =0A= is the one where the CAfile certificates are stored via SSL_CTX_load_verify= _locations(),=0A= I think?=0A= (It just seems easier to append it to CAfile than do this. The sendmail cod= e uses=0A= poorly documented functions where the man page says=0A= "SSL_CTX_load_verify_locations()" normally takes care of this.)=0A= =0A= Does this sound right? rick=0A= =0A= > Authorization such as which mount point can be mounted by using the=0A= > client cert can be implemented by using the CN field or other X.509=0A= > attributes, of course. It can be just a clear text.=0A= >=0A= > I think this is one of the most reliable and straightforward ways=0A= > because in most cases both NFS servers and the clients are under the=0A= > sysadmin's control.=0A= >=0A= > rm> Now, I'm not sure, but I don't think this certificate can be created = via=0A= > rm> a trust authority such that it would "verify". However, the server ca= n=0A= > rm> look for the "secret" in the certificate and allow the mount based on= that.=0A= >=0A= > In the way described above, to use TLS client authentication, the NFS= =0A= > server admin has to have a certificate which allows to sign another=0A= > certificate. This means that the admin must be a CA or trusted=0A= > authority.=0A= >=0A= > In practice, one can generate a self-signed certificate by using=0A= > openssl(1) and use it as its CA certificate. He can issue=0A= > certificates signed by it for the NFS clients, and put his CA=0A= > certificate to somewhere the NFS server can read.=0A= =0A= Take a look on easy-rsa=0A= https://www.freshports.org/security/easy-rsa/=0A= =0A= It is used for example by OpenVPN to create private CA and sign=0A= certificates of clients. It is good starting point to understand what=0A= and how can work.=0A= =0A= > rm> Also, even if the NFS client/server have fixed IP addresses with well= known=0A= > rm> DNS names, it isn't obvious to me how signed certificates can be acqu= ired=0A= > rm> for them?=0A= > rm> (Lets Encrypt expects the Acme protocol to work and that seems to be= =0A= > rm> web site/http specific?)=0A= >=0A= > TLS certificates do not always have (or do not need to have) a domain= =0A= > name as an attribute. Data in attributes are restricted depending on= =0A= > the purpose, so certificates issued by Let's Encrypt can have only=0A= > domain names (CN or Subject Alternative Name), for example. An=0A= > example which is not supported by Let's Encrypt is a certificate for=0A= > S/MIME email encryption which has an email address.=0A= =0A= Kind regards=0A= Miroslav Lachman=0A= From owner-freebsd-current@freebsd.org Thu Mar 19 07:58:00 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D941727E7F7 for ; Thu, 19 Mar 2020 07:58:00 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48jfQv3nJCz3J8Q for ; Thu, 19 Mar 2020 07:57:59 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: by mailman.nyi.freebsd.org (Postfix) id E88E927E7F4; Thu, 19 Mar 2020 07:57:58 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E81FE27E7F3; Thu, 19 Mar 2020 07:57:58 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jfQr5YC0z3J5g; Thu, 19 Mar 2020 07:57:55 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165AB6.dip0.t-ipconnect.de [91.22.90.182]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id F2E0729F; Thu, 19 Mar 2020 08:57:47 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 780E8117D3; Thu, 19 Mar 2020 08:57:45 +0100 (CET) Date: Thu, 19 Mar 2020 08:57:45 +0100 Message-ID: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> From: Alexander Leidinger To: current@freebsd.org, stable@freebsd.org Subject: HOWTO donate CPU to the fight against the Corona-virus Accept-Language: de,en Content-Type: multipart/signed; boundary="=_7hmd_MhWj8wdmu47Tyk4apJ"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48jfQr5YC0z3J5g X-Spamd-Bar: ------- X-Spamd-Result: default: False [-7.95 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-0.15)[-0.145,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-0.99)[-0.990,0]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[leidinger.net:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-3.71)[ip: (-9.75), ipnet: 89.238.64.0/18(-4.87), asn: 34240(-3.91), country: DE(-0.02)]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[182.90.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 07:58:01 -0000 This message is in MIME format and has been PGP signed. --=_7hmd_MhWj8wdmu47Tyk4apJ Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, if someone wants to donate some FreeBSD based CPU resources to the=20=20 fight=20against the Corona-virus, here is a quick HOWTO in terms of=20=20 installing=20the Folding@Home client on FreeBSD: https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-fre= ebsd-foldinghome/ I tested this on a recent -current. If you are interested in how this helps in the fight against the=20=20 virus,=20please refer to the https://foldingathome.org/ website. In=20=20 short=20and over-simplified: they search for vaccines. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_7hmd_MhWj8wdmu47Tyk4apJ Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJecyX4AAoJEBINsJsD+NiGO3gQAKT1yDHsc/LPYFGhokQtGiXO zpjvoiIZKRhQMEkl+Qwrz/mnVnGCHjK1ZH/cOmEiLeqTNLaRxmkPRidLw6qCIfsN vnMGpaVFChUxMm5YNyEXcVJ7ue7qQ5XwzZ/yUUro84vJjTmxGAQvaqeN87k8OxvS vbQ2KfYEJnzK+rtTLupXwKJvMHnznrOfbvsauSkaQP9lyFoGnXA7N95hW4UqTPwM l47vz2YScFyPyYW3S62zTzg2zTrDZ1hmWzrs8R1DemVHCuZB3Hj4Y1KFFqz80IBs MWMA8cT0IPLsWC3ZhfBEHlRHGSk1koxsjDQevB0lP1TxXOtljJwDzpmFtZzRV9YJ 7yVET1htHqbmQuTWvaun9uS19fyfbo76jCWtvOLsFuTPcabQ6sjsiarkzu9G0nKv pYxyn8m1/NyW6BLPr80/6Zhs4nt6wZ2HIzqJGg+i8muZ2/VRDdhZBVpovoosur+C jFwEtjIYyHy7G6AHaOIecn6FEVjUTKKDq1oLTc62b8XCkgFCaA93F0oUBAo49KoR Tn1I365KyRfjpj6B4RxSEdHmwgqmFr2P2hrMmLSR6oq3F90FkTsuz6FB3o54DdkA nSOUZvvHJ463g9AtckbcsAzI/8HAiPOU0edt4eaePAmrUjr6yrBGx6nlbRTmeqir gl0VhovYngJLiAUHS1K8 =t+1g -----END PGP SIGNATURE----- --=_7hmd_MhWj8wdmu47Tyk4apJ-- From owner-freebsd-current@freebsd.org Thu Mar 19 08:20:10 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5A1B427F2A2 for ; Thu, 19 Mar 2020 08:20:10 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic313-21.consmr.mail.gq1.yahoo.com (sonic313-21.consmr.mail.gq1.yahoo.com [98.137.65.84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jfwS3WXFz4WRr for ; Thu, 19 Mar 2020 08:20:08 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: uJX6rIsVM1lq1FuSKzeLaqvjvnhGeWmd86iWv2vtg27nXEoVpbNi9rPgdwYy82p YnORf8AC04Cx8DcUh1RRd3lPuFRUb3IMUMQKrP1nTC4eI_NGhaAV0MuipvH53tEGAcurMBJvTyFs 0feCP6khhrGK5EOynSA3__n2Q_sC5_kZQ7b5a.8hykXKJkJg60nmGQIu.yWQOqDYexSsa.7yNLZx vwYKO0OY7TomwbA9QbQCM8BHcPEjxdmCrAHtjTBQee19pio67X6dbSOXuIB.hM2omAc_1DV15S0E l2WDpCLOVu7EUwlNvOPtrazz67VU4E3VQ6uxK7JTPPO52rkmTwo9coPm99anp6IaOpWsQug.hYdj 2nvAhXswhBqIv3SfOWXNVXJiywZkL.0CdcsJ.cHgknj3pprlwkQ7P1ou5DiIi77Xuf8Piif5RicZ CPK7J7svvLGvNG4Ddo7WWMpHgZYofguD92mCcVTbfeCaniZoVsPxKdKKHdLafyGtLaLDRquJ7v5s 5VSKR4tvGRNbocV3mRJU_dvTkiQT7AcoVCl_FB6sEQxt8Tctek3TdpvLIKx2vm4YsdjZMdl2Jhsm MvI7oH7gbDLdjVqaNxSmxkHFyW66lliOOXScyMxdkT.gZ_r9AWZxoRC3t1XdAGP41UGAR3tqEVI. 0BKxpC118wMwbwRltBjsbkiz4fU8.3r8PxFbCWaoCVFZ2Sbp33N3yhNrsiPoWEjDf6xZOlZaJoNu DzKIamP4GXLc0TT5i0V3Tc0nZP4A8mnkNtfG6nToR9aiTMRWW.JZkirZ.VCxknDsI9YusTLJsVf7 8Y2O8WHlkzjSh.S.cphL1EeDNXAvdDwkkGeLSkxwJEmWeh1Tky10Lw_sben56GdzdC273AUfDA1D 6sQvqB7Cn8.wBv90aNIX6lUmJlYwxn8vEKvHPVedT9JhHwqvJ0MToSXFpO8uSzs4TbqIk58Fxoaz vN33p4lXWeqdP13OSKxLqVHyAhQzAs3J6BYago9eJZktattNdk9doPoTk7efi55WxZjsNlaHidDf tENhw3zZq.KBRszoWH0U0eB.uuccekarLmi3elpF379b_pyL7seirUWyg8EQA._FShA0HGNpLAg. XJuHHgwgeDRUIRPBJdMgKrwsZkP2Gj_VEJ03LYYO9iDiABR6BKrcqa3XwaV685kbfY4zvkLyBU85 xo6A.xPp2hlhyzdnKGfXjYdPJNx5v5_MkWX5o41WEShSa7HzywLyJFMi_69e0nxljB_gcTDm2zUO A3BMxRWCFyTv77GmIQ9AbeajpGgL.LCJsG99dFwhLfv7g6t3_muZjK0jF0ObOoEPOrqdWEbg3104 lwauoknW3QoOt.KM.yUAhzrHoxtlCNmLzupelPoY7vr44INbK67W7gEGq.EIx8oVPQDwqKjH1nnp 23IPY9_eWjqqPi9sFg_zWUEdJyMtjc64tMu4gzlAgMn.Ln5jyPuX_ Received: from sonic.gate.mail.ne1.yahoo.com by sonic313.consmr.mail.gq1.yahoo.com with HTTP; Thu, 19 Mar 2020 08:20:06 +0000 Received: by smtp410.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID ac6c44e0c34aa685250d8dcf0439a8fd; Thu, 19 Mar 2020 08:20:04 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: head -r538966 on OrangePi+ 2ed: boot loader crashes when USB drive is present at power-on/boot: its a misaligned access by code from -r354746 Date: Thu, 19 Mar 2020 01:20:02 -0700 References: <863312E1-4216-49BA-A623-CAC85F123655@yahoo.com> To: Toomas Soome , freebsd-arm , FreeBSD Current In-Reply-To: <863312E1-4216-49BA-A623-CAC85F123655@yahoo.com> Message-Id: <30A666F0-8773-41B7-AD37-7E319AA510CA@yahoo.com> X-Mailer: Apple Mail (2.3608.60.0.2.5) X-Rspamd-Queue-Id: 48jfwS3WXFz4WRr X-Spamd-Bar: + X-Spamd-Result: default: False [1.03 / 15.00]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; FREEMAIL_FROM(0.00)[yahoo.com]; MV_CASE(0.50)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; FREEMAIL_TO(0.00)[me.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/21, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(0.00)[ip: (1.53), ipnet: 98.137.64.0/21(0.82), asn: 36647(0.66), country: US(-0.05)]; NEURAL_SPAM_MEDIUM(0.96)[0.964,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(0.57)[0.570,0]; RCVD_IN_DNSWL_NONE(0.00)[84.65.137.98.list.dnswl.org : 127.0.5.0]; RWL_MAILSPIKE_POSSIBLE(0.00)[84.65.137.98.rep.mailspike.net : 127.0.0.17]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 08:20:10 -0000 [I built with -DDEBUG -DDISK_DEBUG -DPART_DEBUG and show with some extra output as well. It shows that a misaligned access causes the crash. The access in question is from head -r354746 code additions.] On 2020-Mar-18, at 13:36, Mark Millard wrote: > Without a USB drive present at power-on or > boot, the OPi+2e boots fine. (The USB drives > involved have a partition holding a ufs file > system and a partition holding a swap/aging > space.) >=20 > In all cases below, /boot/ is from the microsd > card. But the intended configuration is for > vfs.root.mountfrom to be used to direct the > stages after kernel-booting to the USB drive. >=20 > The output sequence related to the crash when > the USB drive is present looks like: >=20 > QUOTE > . . . > END QUOTE I'm replacing the original quote with better information. First I quote the definition of dos_partition for reference: struct dos_partition { unsigned char dp_flag; /* bootstrap flags */ unsigned char dp_shd; /* starting head */ unsigned char dp_ssect; /* starting sector */ unsigned char dp_scyl; /* starting cylinder */ unsigned char dp_typ; /* partition type */ unsigned char dp_ehd; /* end head */ unsigned char dp_esect; /* end sector */ unsigned char dp_ecyl; /* end cylinder */ uint32_t dp_start; /* absolute starting sector = number */ uint32_t dp_size; /* partition size in sectors */ }; Note that access to dp_start or dp_size requires address%4=3D=3D0 alignment but the other fields do not. This is important for &dp[i].dp_start reported in the below (and then dp[i].dp_start is accessed in the code). I also had it report dp, which shows that dp has dp%4!=3D0 as well. Here is with -DDEBUG and -DDISK_DEBUG -DPART_DEBUG in place for the code (with some extra debug output added): FreeBSD/armv7 U-Boot loader, Revision 1.3 signature: version =3D 1 checksum =3D 0x98de198b sc entry =3D 0xbdf8cb01 addresses info: _etext (sdata) =3D 0x4204fdb4 _edata =3D 0x4205ebb8 __sbss_start =3D 0x4205ec28 __sbss_end =3D 0x4205ec28 __sbss_start =3D 0x4205ec28 _end =3D 0x42062aa0 syscall entry =3D 0xbdf8cb01 DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. stor_init(): storage devices found: 2 Found U-Boot device: disk Probing all devices... Checking unit=3D0 slice=3D partition=3D...disk_open: = disk0s0: unit 0, slice 0, partition -2 =3D> 0x420631c0 stor_readdev(): reading blk=3D0 size=3D1 @ 0x420633c0 stor_readdev(): reading blk=3D64 size=3D1 @ 0x420636c0 stor_readdev(): reading blk=3D1 size=3D1 @ 0x420636c0 ptable_open: BEFORE NDOSPART loop #1 ptable_open: dp=3D0x4206357e ptable_open: IN NDOSPART loop #1 after 1st if ptable_open: IN NDOSPART loop #1: &dp[i].dp_start=3D0x42063586 data abort pc : [<42009350>] lr : [<42009348>] reloc pc : [] lr : [] sp : b9f649e8 ip : 4205e200 fp : b9f64a18 r10: 42063640 r9 : b9f64a50 r8 : 420633c0 r7 : 420636c0 r6 : 4200818c r5 : 4205cd95 r4 : 42063586 r3 : bdf8cdf7 r2 : 0000000a r1 : 01c28000 r0 : 000000ee Flags: nZCv IRQs off FIQs off Mode SVC_32 Code: e08f0000 eb0114af e5d801c2 e35000ee (05940000)=20 Resetting CPU ... resetting ... My extra messages are from: # svnlite diff /usr/src/stand/common/part.c Index: /usr/src/stand/common/part.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D --- /usr/src/stand/common/part.c (revision 358966) +++ /usr/src/stand/common/part.c (working copy) @@ -715,18 +715,26 @@ * start sector 1. After DOSPTYP_PMBR, there may be other = partitions. * UEFI compliant PMBR has no other partitions. */ + DPRINTF("BEFORE NDOSPART loop #1"); + DPRINTF("dp=3D%p", (void*)dp); for (i =3D 0; i < NDOSPART; i++) { if (dp[i].dp_flag !=3D 0 && dp[i].dp_flag !=3D 0x80) { DPRINTF("invalid partition flag %x", = dp[i].dp_flag); goto out; } + DPRINTF("IN NDOSPART loop #1 after 1st if"); + DPRINTF("IN NDOSPART loop #1: &dp[i].dp_start=3D%p", = (void*)&dp[i].dp_start); #ifdef LOADER_GPT_SUPPORT if (dp[i].dp_typ =3D=3D DOSPTYP_PMBR && dp[i].dp_start = =3D=3D 1) { + DPRINTF("BEFORE table->type assignment for PMBR = detected"); + DPRINTF("table=3D%p for PMBR detected", = (void*)table); table->type =3D PTABLE_GPT; DPRINTF("PMBR detected"); } + DPRINTF("IN NDOSPART loop #1 after 2nd if"); #endif } + DPRINTF("AFTER NDOSPART loop #1"); #ifdef LOADER_GPT_SUPPORT if (table->type =3D=3D PTABLE_GPT) { table =3D ptable_gptread(table, dev, dread); Note that "IN NDOSPART loop #1 after 2nd if" is never reported. Nor is "BEFORE table->type assignment for PMBR detected". The condition in the 2nd if never completes its evaluation because of the misaligned access involved in dp[i].dp_start being evaluated. > Stopping it earlier and using: >=20 > setenv loaderdev mmc 0 > boot >=20 > avoids the problem because it avoids "probing" the > USB drive at the stage indicated above. Yep: The above loop is then not evaluated. > But the > boot then actually uses: >=20 > vfs.root.mountfrom=3D"ufs:/dev/gpt/BPIM3root" >=20 > in the /boot/loader.conf on the microsd card. > ufs:/dev/gpt/BPIM3root is a reference to the ufs > partition on the USB media. (With the mountfrom > commented out the microsd card is bootable by > itself.) So later the USB drive is put to use > successfully when the initial probing is avoided. >=20 > Looking in the /usr/src/stand/uboot/common/main.c > code shows: >=20 > static int > probe_disks(int devidx, int load_type, int load_unit, int load_slice, > int load_partition) > { > . . . > if (load_unit =3D=3D -1) { > printf(" Probing all %s devices...\n", = device_typename(load_type)); > /* Try each disk of given type in succession until one = works. */ > for (unit =3D 0; unit < UB_MAX_DEV; unit++) { > currdev.dd.d_unit =3D = uboot_diskgetunit(load_type, unit); > if (currdev.dd.d_unit =3D=3D -1) > break; > print_disk_probe_info(); > open_result =3D devsw[devidx]->dv_open(&f, = &currdev); > if (open_result =3D=3D 0) { > printf(" good.\n"); > return (0); > } > printf("\n"); > } > return (-1); > } > . . . > } >=20 > So it appears that the crash is during the code involved > for the line: >=20 > open_result =3D devsw[devidx]->dv_open(&f, &currdev); >=20 > Note that the boot attempt reported "Probing all > devices..." so device_typename(load_type) came up with > "". (I've no clue if that is significant to the > issue or not.) Looks like the below paragraph was junk. Sorry. > It appeared that /usr/src/stand/usb/storage/umass_loader.c > and its umass_disk_open and umass_disk_open_sub might > be involved and then code from the likes of: > /usr/src/sys/dev/usb/ --such as from usb_msctest.c for > usb_msc_read_capacity. (I stopped looking around > there: well outside areas I know how to interpret.) > For reference, I used the OPi+2e u-boot material from > my poudriere-devel based port builds: >=20 > # ls -ldT /usr/local/share/u-boot/u-boot-orangepi-plus-2e/* > -rw-r--r-- 1 root wheel 503 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/README > -rw-r--r-- 1 root wheel 199 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/boot.scr > -rw-r--r-- 1 root wheel 66 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/metadata > -rw-r--r-- 1 root wheel 471250 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/u-boot-sunxi-with-spl.bin >=20 >=20 >=20 > (The USB drives are USB SSDs.) =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-current@freebsd.org Thu Mar 19 09:00:50 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 415FE258B89 for ; Thu, 19 Mar 2020 09:00:50 +0000 (UTC) (envelope-from tsoome@me.com) Received: from pv50p00im-zteg10011401.me.com (pv50p00im-zteg10011401.me.com [17.58.6.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jgqP3M95z4D3N for ; Thu, 19 Mar 2020 09:00:49 +0000 (UTC) (envelope-from tsoome@me.com) Received: from nazgul.lan (148-52-235-80.sta.estpak.ee [80.235.52.148]) by pv50p00im-zteg10011401.me.com (Postfix) with ESMTPSA id F0CB0900764; Thu, 19 Mar 2020 09:00:44 +0000 (UTC) From: Toomas Soome Message-Id: <26DEEA3C-C880-410C-BCB4-CE1314EAFA02@me.com> Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: head -r538966 on OrangePi+ 2ed: boot loader crashes when USB drive is present at power-on/boot: its a misaligned access by code from -r354746 Date: Thu, 19 Mar 2020 11:00:42 +0200 In-Reply-To: <30A666F0-8773-41B7-AD37-7E319AA510CA@yahoo.com> Cc: freebsd-arm , FreeBSD Current To: Mark Millard References: <863312E1-4216-49BA-A623-CAC85F123655@yahoo.com> <30A666F0-8773-41B7-AD37-7E319AA510CA@yahoo.com> X-Mailer: Apple Mail (2.3608.60.0.2.5) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-03-19_01:, , signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=2 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-2003190041 X-Rspamd-Queue-Id: 48jgqP3M95z4D3N X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.08 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; FREEMAIL_FROM(0.00)[me.com]; R_SPF_ALLOW(-0.20)[+ip4:17.58.0.0/16]; MV_CASE(0.50)[]; URI_COUNT_ODD(1.00)[5]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[me.com:+]; DMARC_POLICY_ALLOW(-0.50)[me.com,quarantine]; FREEMAIL_TO(0.00)[yahoo.com]; RECEIVED_SPAMHAUS_PBL(0.00)[148.52.235.80.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; RCVD_IN_DNSWL_LOW(-0.10)[41.6.58.17.list.dnswl.org : 127.0.5.1]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:714, ipnet:17.58.0.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[me.com]; R_DKIM_ALLOW(-0.20)[me.com:s=1a1hai]; NEURAL_HAM_MEDIUM(-0.48)[-0.484,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-0.997,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE(0.00)[ip: (-4.18), ipnet: 17.58.0.0/20(-2.00), asn: 714(-2.38), country: US(-0.05)]; IP_SCORE_FREEMAIL(0.00)[]; DWL_DNSWL_LOW(-1.00)[me.com.dwl.dnswl.org : 127.0.5.1]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 09:00:50 -0000 I think this should fix it. We need to create copy of dos partition = array, so we will get proper alignment.=20 tsoome@freebsd-2:/usr/src % svn diff stand/common/part.c Index: stand/common/part.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D --- stand/common/part.c (revision 359099) +++ stand/common/part.c (working copy) @@ -654,6 +654,7 @@ int has_ext; #endif table =3D NULL; + dp =3D NULL; buf =3D malloc(sectorsize); if (buf =3D=3D NULL) return (NULL); @@ -708,7 +709,11 @@ goto out; } /* Check that we have PMBR. Also do some validation. */ - dp =3D (struct dos_partition *)(buf + DOSPARTOFF); + dp =3D malloc(NDOSPART * sizeof(struct dos_partition)); + if (dp =3D=3D NULL) + goto out; + bcopy(buf + DOSPARTOFF, dp, NDOSPART * sizeof(struct = dos_partition)); + /* * In mac we can have PMBR partition in hybrid MBR; * that is, MBR partition which has DOSPTYP_PMBR entry defined = as @@ -770,6 +775,7 @@ #endif /* LOADER_MBR_SUPPORT */ #endif /* LOADER_MBR_SUPPORT || LOADER_GPT_SUPPORT */ out: + free(dp); free(buf); return (table); } tsoome@freebsd-2:/usr/src % > On 19. Mar 2020, at 10:20, Mark Millard wrote: >=20 > [I built with -DDEBUG -DDISK_DEBUG -DPART_DEBUG and show > with some extra output as well. It shows that a misaligned > access causes the crash. The access in question is from > head -r354746 code additions.] >=20 > On 2020-Mar-18, at 13:36, Mark Millard wrote: >=20 >> Without a USB drive present at power-on or >> boot, the OPi+2e boots fine. (The USB drives >> involved have a partition holding a ufs file >> system and a partition holding a swap/aging >> space.) >>=20 >> In all cases below, /boot/ is from the microsd >> card. But the intended configuration is for >> vfs.root.mountfrom to be used to direct the >> stages after kernel-booting to the USB drive. >>=20 >> The output sequence related to the crash when >> the USB drive is present looks like: >>=20 >> QUOTE >> . . . >> END QUOTE >=20 > I'm replacing the original quote with > better information. >=20 > First I quote the definition of dos_partition > for reference: >=20 > struct dos_partition { > unsigned char dp_flag; /* bootstrap flags */ > unsigned char dp_shd; /* starting head */ > unsigned char dp_ssect; /* starting sector */ > unsigned char dp_scyl; /* starting cylinder */ > unsigned char dp_typ; /* partition type */ > unsigned char dp_ehd; /* end head */ > unsigned char dp_esect; /* end sector */ > unsigned char dp_ecyl; /* end cylinder */ > uint32_t dp_start; /* absolute starting sector = number */ > uint32_t dp_size; /* partition size in sectors */ > }; >=20 > Note that access to dp_start or dp_size > requires address%4=3D=3D0 alignment but the > other fields do not. This is important for > &dp[i].dp_start reported in the below (and > then dp[i].dp_start is accessed in the code). > I also had it report dp, which shows that > dp has dp%4!=3D0 as well. >=20 >=20 >=20 > Here is with -DDEBUG and -DDISK_DEBUG -DPART_DEBUG > in place for the code (with some extra debug output > added): >=20 > FreeBSD/armv7 U-Boot loader, Revision 1.3 >=20 > signature: > version =3D 1 > checksum =3D 0x98de198b > sc entry =3D 0xbdf8cb01 >=20 > addresses info: > _etext (sdata) =3D 0x4204fdb4 > _edata =3D 0x4205ebb8 > __sbss_start =3D 0x4205ec28 > __sbss_end =3D 0x4205ec28 > __sbss_start =3D 0x4205ec28 > _end =3D 0x42062aa0 > syscall entry =3D 0xbdf8cb01 > DRAM: 2048MB > Number of U-Boot devices: 2 > U-Boot env: loaderdev not set, will probe all devices. > stor_init(): storage devices found: 2 > Found U-Boot device: disk > Probing all devices... > Checking unit=3D0 slice=3D partition=3D...disk_open: = disk0s0: unit 0, slice 0, partition -2 =3D> 0x420631c0 > stor_readdev(): reading blk=3D0 size=3D1 @ 0x420633c0 > stor_readdev(): reading blk=3D64 size=3D1 @ 0x420636c0 > stor_readdev(): reading blk=3D1 size=3D1 @ 0x420636c0 > ptable_open: BEFORE NDOSPART loop #1 > ptable_open: dp=3D0x4206357e > ptable_open: IN NDOSPART loop #1 after 1st if > ptable_open: IN NDOSPART loop #1: &dp[i].dp_start=3D0x42063586 > data abort > pc : [<42009350>] lr : [<42009348>] > reloc pc : [] lr : [] > sp : b9f649e8 ip : 4205e200 fp : b9f64a18 > r10: 42063640 r9 : b9f64a50 r8 : 420633c0 > r7 : 420636c0 r6 : 4200818c r5 : 4205cd95 r4 : 42063586 > r3 : bdf8cdf7 r2 : 0000000a r1 : 01c28000 r0 : 000000ee > Flags: nZCv IRQs off FIQs off Mode SVC_32 > Code: e08f0000 eb0114af e5d801c2 e35000ee (05940000)=20 > Resetting CPU ... >=20 > resetting ... >=20 >=20 > My extra messages are from: >=20 > # svnlite diff /usr/src/stand/common/part.c > Index: /usr/src/stand/common/part.c > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > --- /usr/src/stand/common/part.c (revision 358966) > +++ /usr/src/stand/common/part.c (working copy) > @@ -715,18 +715,26 @@ > * start sector 1. After DOSPTYP_PMBR, there may be other = partitions. > * UEFI compliant PMBR has no other partitions. > */ > + DPRINTF("BEFORE NDOSPART loop #1"); > + DPRINTF("dp=3D%p", (void*)dp); > for (i =3D 0; i < NDOSPART; i++) { > if (dp[i].dp_flag !=3D 0 && dp[i].dp_flag !=3D 0x80) { > DPRINTF("invalid partition flag %x", = dp[i].dp_flag); > goto out; > } > + DPRINTF("IN NDOSPART loop #1 after 1st if"); > + DPRINTF("IN NDOSPART loop #1: &dp[i].dp_start=3D%p", = (void*)&dp[i].dp_start); > #ifdef LOADER_GPT_SUPPORT > if (dp[i].dp_typ =3D=3D DOSPTYP_PMBR && dp[i].dp_start = =3D=3D 1) { > + DPRINTF("BEFORE table->type assignment for PMBR = detected"); > + DPRINTF("table=3D%p for PMBR detected", = (void*)table); > table->type =3D PTABLE_GPT; > DPRINTF("PMBR detected"); > } > + DPRINTF("IN NDOSPART loop #1 after 2nd if"); > #endif > } > + DPRINTF("AFTER NDOSPART loop #1"); > #ifdef LOADER_GPT_SUPPORT > if (table->type =3D=3D PTABLE_GPT) { > table =3D ptable_gptread(table, dev, dread); >=20 >=20 > Note that "IN NDOSPART loop #1 after 2nd if" is > never reported. Nor is "BEFORE table->type > assignment for PMBR detected". The condition in > the 2nd if never completes its evaluation because > of the misaligned access involved in dp[i].dp_start > being evaluated. >=20 >=20 >> Stopping it earlier and using: >>=20 >> setenv loaderdev mmc 0 >> boot >>=20 >> avoids the problem because it avoids "probing" the >> USB drive at the stage indicated above. >=20 > Yep: The above loop is then not evaluated. >=20 >> But the >> boot then actually uses: >>=20 >> vfs.root.mountfrom=3D"ufs:/dev/gpt/BPIM3root" >>=20 >> in the /boot/loader.conf on the microsd card. >> ufs:/dev/gpt/BPIM3root is a reference to the ufs >> partition on the USB media. (With the mountfrom >> commented out the microsd card is bootable by >> itself.) So later the USB drive is put to use >> successfully when the initial probing is avoided. >>=20 >> Looking in the /usr/src/stand/uboot/common/main.c >> code shows: >>=20 >> static int >> probe_disks(int devidx, int load_type, int load_unit, int load_slice, >> int load_partition) >> { >> . . . >> if (load_unit =3D=3D -1) { >> printf(" Probing all %s devices...\n", = device_typename(load_type)); >> /* Try each disk of given type in succession until one = works. */ >> for (unit =3D 0; unit < UB_MAX_DEV; unit++) { >> currdev.dd.d_unit =3D = uboot_diskgetunit(load_type, unit); >> if (currdev.dd.d_unit =3D=3D -1) >> break; >> print_disk_probe_info(); >> open_result =3D devsw[devidx]->dv_open(&f, = &currdev); >> if (open_result =3D=3D 0) { >> printf(" good.\n"); >> return (0); >> } >> printf("\n"); >> } >> return (-1); >> } >> . . . >> } >>=20 >> So it appears that the crash is during the code involved >> for the line: >>=20 >> open_result =3D devsw[devidx]->dv_open(&f, &currdev); >>=20 >> Note that the boot attempt reported "Probing all >> devices..." so device_typename(load_type) came up with >> "". (I've no clue if that is significant to the >> issue or not.) >=20 >=20 > Looks like the below paragraph was junk. Sorry. >=20 >> It appeared that /usr/src/stand/usb/storage/umass_loader.c >> and its umass_disk_open and umass_disk_open_sub might >> be involved and then code from the likes of: >> /usr/src/sys/dev/usb/ --such as from usb_msctest.c for >> usb_msc_read_capacity. (I stopped looking around >> there: well outside areas I know how to interpret.) >=20 >=20 >> For reference, I used the OPi+2e u-boot material from >> my poudriere-devel based port builds: >>=20 >> # ls -ldT /usr/local/share/u-boot/u-boot-orangepi-plus-2e/* >> -rw-r--r-- 1 root wheel 503 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/README >> -rw-r--r-- 1 root wheel 199 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/boot.scr >> -rw-r--r-- 1 root wheel 66 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/metadata >> -rw-r--r-- 1 root wheel 471250 Oct 26 19:12:16 2019 = /usr/local/share/u-boot/u-boot-orangepi-plus-2e/u-boot-sunxi-with-spl.bin >>=20 >>=20 >>=20 >> (The USB drives are USB SSDs.) >=20 >=20 >=20 >=20 > =3D=3D=3D > Mark Millard > marklmi at yahoo.com > ( dsl-only.net went > away in early 2018-Mar) >=20 From owner-freebsd-current@freebsd.org Thu Mar 19 10:45:48 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 562A325B945 for ; Thu, 19 Mar 2020 10:45:48 +0000 (UTC) (envelope-from SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jk8V57yFz44Q2; Thu, 19 Mar 2020 10:45:46 +0000 (UTC) (envelope-from SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 3466F28422; Thu, 19 Mar 2020 11:45:44 +0100 (CET) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 6546F28416; Thu, 19 Mar 2020 11:45:42 +0100 (CET) Subject: Re: TLS certificates for NFS-over-TLS floating client To: Rick Macklem , Hiroki Sato Cc: "freebsd-current@FreeBSD.org" References: <20200304.133515.520383339344620673.hrs@FreeBSD.org> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <4865c166-33de-475f-1ddd-8ab8c5612683@quip.cz> Date: Thu, 19 Mar 2020 11:45:42 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.3 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48jk8V57yFz44Q2 X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz has no SPF policy when checking 94.124.105.4) smtp.mailfrom=SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz X-Spamd-Result: default: False [4.04 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; IP_SCORE(0.84)[ip: (0.30), ipnet: 94.124.104.0/21(0.15), asn: 42000(3.64), country: CZ(0.09)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[quip.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(1.00)[1.000,0]; RCVD_IN_DNSWL_NONE(0.00)[4.105.124.94.list.dnswl.org : 127.0.10.0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[000.fbsd@quip.cz,SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42000, ipnet:94.124.104.0/21, country:CZ]; FROM_NEQ_ENVFROM(0.00)[000.fbsd@quip.cz,SRS0=nYxM=5E=quip.cz=000.fbsd@elsa.codelab.cz]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 10:45:48 -0000 Rick Macklem wrote on 2020/03/19 03:09: > Miroslav Lachman wrote: >> > [...] >> NFS (or any other server) should check list of revoked certificates too. >> Otherwise you will not be able to deny access to user which you no >> longer want to have an access. > Yes, good point. > I won't claim to understand this stuff, but from what I can see, all that is > done is the CRL is appended to the CAfile (the one with the CA certificates > are in being used for certificate verification via SSL__CTX_load_verify_locations(). > (https://raymii.org/s/articles/OpenSSL_manually_verify_a_certificate_against_a_CRL.html > shows a CAfile and CRLfile being concatenated and then used to verify a certificate.) > > There is code in sendmail that loads a CRL file separately, but it seems to > just put it in the X509 store returned by SSL_CTX_get_cert_store(), which > is the one where the CAfile certificates are stored via SSL_CTX_load_verify_locations(), > I think? > (It just seems easier to append it to CAfile than do this. The sendmail code uses > poorly documented functions where the man page says > "SSL_CTX_load_verify_locations()" normally takes care of this.) > > Does this sound right? rick I think it would be better to have it in a separate file as Apache does https://httpd.apache.org/docs/current/mod/mod_ssl.html#sslcarevocationfile Seems more convenient to have CA file write protected (read only) and then separate file for list of revoked client certificates, maybe somewhere else than CA certificate. Kind regards Miroslav Lachman From owner-freebsd-current@freebsd.org Thu Mar 19 17:11:14 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EB1E2264A5D for ; Thu, 19 Mar 2020 17:11:14 +0000 (UTC) (envelope-from grahamperrin@gmail.com) Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48jtjD4kgGz4cKd for ; Thu, 19 Mar 2020 17:11:12 +0000 (UTC) (envelope-from grahamperrin@gmail.com) Received: by mail-wm1-x32a.google.com with SMTP id 6so3409751wmi.5 for ; Thu, 19 Mar 2020 10:11:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:from:subject:message-id:date:user-agent:mime-version :content-language; bh=qGRG5VgHskj8f5TohAH1MVLvvP04hpA086KY2kte7Pk=; b=b/67gcpgRjtNvYIIuMtPDraMSHuNxUUYxIBLQegn9+uZUj9OispmkE0gT+GqBJC9+R yTWSKpXiGZnEOutZNeTKT7uHfWG+oA8en/6JIQP607QCcw1bRWucJ9vzP2bRwD6SqCra Ska8JRJZH6Ss12qTSZiAri93Bwv6X9fi81QOYF/+qO5kJvovTKUTpx0YEuRPd9jzaOFt pAnX+YEPCtDkD47gmmxHsf9znxB8S5hLFxCFxJxnLRSSt0rUIQSxtTAF2YvpfwuJMiPw bEqES5DGn2XJp0C6FvOMGQiqYTIsL2Mmbz+CpviSdgi//VOgHiEMixXjkDUmmI6vsCwL LVeA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version:content-language; bh=qGRG5VgHskj8f5TohAH1MVLvvP04hpA086KY2kte7Pk=; b=iGWX7uXIFb5qbIo/XEDy5m4qNaSOwVcOmIKFFFiGaEhSc9/LZbnTzcich1XzMDOPgX 9aBomP8nebBFlwrOLamEwev9DVTyVAtQRa4v3Jsb3Ig9gRY7wwq6R/OCL35fdGoH7FrH 2egts7tzfFnC9QlxCxP76xh+r1fzRWWO5TJjXOYw8M6GwGI8cuiH3qPDhfsviGtbbiJT KfrnZomRCO30iunJMD059nnJ4vRA7SLR45TPfPxvii6L/Uqng4COd+hXYJday7erB1IM HA2G7mHolfeKbBJx2pRaQCBS9hHFN7Bh/FNWWxaqs+y9VlWFmQdo0d+dvJ01QNINVx69 fPkg== X-Gm-Message-State: ANhLgQ0TDNs2AciiyBnYPxg3JdcgRHfrL+QWpQya9X9szH5vpTKtdFaJ J6jYLVTtrjxZ8iAkCZCmdGLAlFvYbHw= X-Google-Smtp-Source: ADFU+vvxDDu2XtgEOD4xHbmfr4jMgjRut/4KiNuKhwwzX6m0Vrc2qkpR/fLDi82CS52+zCv0Un5arQ== X-Received: by 2002:a1c:a714:: with SMTP id q20mr4824113wme.148.1584637869865; Thu, 19 Mar 2020 10:11:09 -0700 (PDT) Received: from [192.168.1.7] (79-66-147-78.dynamic.dsl.as9105.com. [79.66.147.78]) by smtp.gmail.com with ESMTPSA id q10sm4398804wrx.12.2020.03.19.10.11.08 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 19 Mar 2020 10:11:08 -0700 (PDT) To: FreeBSD From: Graham Perrin Subject: VirtualBox segmentation fault, FreeBSD-CURRENT r359068 Message-ID: Date: Thu, 19 Mar 2020 17:11:07 +0000 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="------------C69341C75F28E9208C1CA33C" Content-Language: en-US X-Rspamd-Queue-Id: 48jtjD4kgGz4cKd X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=b/67gcpg; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of grahamperrin@gmail.com designates 2a00:1450:4864:20::32a as permitted sender) smtp.mailfrom=grahamperrin@gmail.com X-Spamd-Result: default: False [-1.89 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; CTYPE_MIXED_BOGUS(1.00)[]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MIME_BASE64_TEXT(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.987,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RECEIVED_SPAMHAUS_PBL(0.00)[78.147.66.79.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(0.00)[ip: (-9.39), ipnet: 2a00:1450::/32(-2.39), asn: 15169(-1.65), country: US(-0.05)]; RCVD_IN_DNSWL_NONE(0.00)[a.2.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 17:11:15 -0000 This is a multi-part message in MIME format. --------------C69341C75F28E9208C1CA33C Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Is this maybe related to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244847 or should I make a separate bug report? --------------C69341C75F28E9208C1CA33C Content-Type: text/plain; charset=UTF-8; name="VirtualBox segmentation fault.txt" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="VirtualBox segmentation fault.txt" Z3JhaGFtcGVycmluQG1vbWgxNjctZ2pwNC04NTcwcDp+ICUgZGF0ZSA7IHVuYW1lIC12ClRo dSAxOSBNYXIgMjAyMCAxMjoxMjowMSBHTVQKRnJlZUJTRCAxMy4wLUNVUlJFTlQgIzAgcjM1 OTA2ODogV2VkIE1hciAxOCAyMToxNDoxMiBHTVQgMjAyMCAgICAgcm9vdEBtb21oMTY3LWdq cDQtODU3MHA6L3Vzci9vYmovdXNyL3NyYy9hbWQ2NC5hbWQ2NC9zeXMvR0VORVJJQy1OT0RF QlVHIApncmFoYW1wZXJyaW5AbW9taDE2Ny1nanA0LTg1NzBwOn4gJSBwa2cgcXVlcnkgJyVv ICV2ICVSJyB2aXJ0dWFsYm94LW9zZSB2aXJ0dWFsYm94LW9zZS1rbW9kCmVtdWxhdG9ycy92 aXJ0dWFsYm94LW9zZSA1LjIuMzRfMSBGcmVlQlNECmVtdWxhdG9ycy92aXJ0dWFsYm94LW9z ZS1rbW9kIDUuMi4zNCBwb3VkcmllcmUKZ3JhaGFtcGVycmluQG1vbWgxNjctZ2pwNC04NTcw cDp+ICUgdmlydHVhbGJveApTZWdtZW50YXRpb24gZmF1bHQKZ3JhaGFtcGVycmluQG1vbWgx NjctZ2pwNC04NTcwcDp+ICUgdHJ1c3MgdmlydHVhbGJveAptbWFwKDB4MCwxMzUxNjgsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT04sLTEsMHgwKSA9IDM0MzYy MTMwNDMyICgweDgwMDI0ODAwMCkKaXNzZXR1Z2lkKCkgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgID0gMCAoMHgwKQpzaWdmYXN0YmxvY2soMHgxLDB4ODAwMjQ3OWMw KSAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi9ldGMvbGlibWFwLmNvbmYi LE9fUkRPTkxZfE9fQ0xPRVhFQywwMTExMzAwMzApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9k ZT0tcnctci0tci0tICxpbm9kZT0xNjY0NSxzaXplPTExNSxibGtzaXplPTQwOTYgfSkgPSAw ICgweDApCnJlYWQoMywiIyAkRnJlZUJTRDogaGVhZC9saWJleGVjL3J0bGQtZWwiLi4uLDEx NSkgPSAxMTUgKDB4NzMpCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9ldGMvbGlibWFwLmQiLE9f UkRPTkxZfE9fTk9OQkxPQ0t8T19ESVJFQ1RPUll8T19DTE9FWEVDLDAxNjUpID0gMyAoMHgz KQpmY250bCgzLEZfSVNVTklPTlNUQUNLLDB4MCkgICAgICAgICAgICAgICAgICAgICAgPSAw ICgweDApCmdldGRpcmVudHJpZXMoMywiXE0tdVxeWlxeRFwwXDBcMFwwXDBcXkFcMFwwXDBc MCIuLi4sNDA5Nix7IDB4MCB9KSA9IDEwNCAoMHg2OCkKb3BlbigiL3Vzci9sb2NhbC9ldGMv bGlibWFwLmQvb3BlcmEuY29uZiIsT19SRE9OTFl8T19DTE9FWEVDLDAxNjUpID0gNCAoMHg0 KQpmc3RhdCg0LHsgbW9kZT0tcnctci0tci0tICxpbm9kZT04MDkxNTIsc2l6ZT02MCxibGtz aXplPTQwOTYgfSkgPSAwICgweDApCnJlYWQoNCwibGliZnJlZXR5cGUuc28uOVx0bGliZnJl ZXR5cGUuc28iLi4uLDYwKSA9IDYwICgweDNjKQpjbG9zZSg0KSAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmdldGRpcmVudHJpZXMoMywweDgw MDI0ZDAwOCw0MDk2LHsgMHgxNDlmMGVkNyB9KSA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdmFy L3J1bi9sZC1lbGYuc28uaGludHMiLE9fUkRPTkxZfE9fQ0xPRVhFQywwMTAwMTUxMDcpID0g MyAoMHgzKQpyZWFkKDMsIkVobnRcXkFcMFwwXDBcTV5AXDBcMFwwXF5FXF5CXDAiLi4uLDEy OCkgPSAxMjggKDB4ODApCmZzdGF0KDMseyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTcyMTE1 MyxzaXplPTY0NSxibGtzaXplPTQwOTYgfSkgPSAwICgweDApCnByZWFkKDMsIi9saWI6L3Vz ci9saWI6L3Vzci9saWIvY29tcGF0Oi91Ii4uLiw1MTcsMHg4MCkgPSA1MTcgKDB4MjA1KQpj bG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCm9wZW4oIi9saWIvbGliZWRpdC5zby43IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJ RlksMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTIz NTcxLHNpemU9MjE2ODQwLGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0 MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAz NDM2MjI2NTYwMCAoMHg4MDAyNjkwMDApCm1tYXAoMHgwLDI0MTY2NCxQUk9UX05PTkUsTUFQ X0dVQVJELC0xLDB4MCkgICAgICA9IDM0MzYyMjY5Njk2ICgweDgwMDI2YTAwMCkKbW1hcCgw eDgwMDI2YTAwMCw4NjAxNixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9O T0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNjIyNjk2OTYgKDB4ODAwMjZh MDAwKQptbWFwKDB4ODAwMjdmMDAwLDEyNjk3NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxNDAw MCkgPSAzNDM2MjM1NTcxMiAoMHg4MDAyN2YwMDApCm1tYXAoMHg4MDAyOWUwMDAsODE5MixQ Uk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxU X1JFQUQsMywweDMyMDAwKSA9IDM0MzYyNDgyNjg4ICgweDgwMDI5ZTAwMCkKbW1hcCgweDgw MDJhMDAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MzMwMDApID0gMzQzNjI0OTA4ODAgKDB4ODAwMmEw MDAwKQptbWFwKDB4ODAwMmExMDAwLDE2Mzg0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSwweDApID0gMzQzNjI0OTQ5NzYgKDB4ODAw MmExMDAwKQptdW5tYXAoMHg4MDAyNjkwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAg ICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICA9IDAgKDB4MCkKb3BlbigiL2xpYi9saWJjLnNvLjciLE9fUkRPTkxZfE9fQ0xP RVhFQ3xPX1ZFUklGWSwwMTIzMjA0NDMwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0t ci0tci0tci0tICxpbm9kZT0xMTE1MDY3LHNpemU9MjA2MTI3MixibGtzaXplPTEzMTA3MiB9 KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BS RUZBVUxUX1JFQUQsMywweDApID0gMzQzNjIyNjU2MDAgKDB4ODAwMjY5MDAwKQptbWFwKDB4 MCw0Mjg0NDE2LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAzNDM2MjUxMTM2 MCAoMHg4MDAyYTUwMDApCm1tYXAoMHg4MDAyYTUwMDAsNTUyOTYwLFBST1RfUkVBRCxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDM2MjUxMTM2MCAoMHg4MDAyYTUwMDApCm1tYXAoMHg4MDAzMmMwMDAsMTM5MjY0MCxQ Uk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHg4NjAwMCkgPSAzNDM2MzA2NDMyMCAoMHg4MDAzMmMwMDAp Cm1tYXAoMHg4MDA0ODAwMDAsNDA5NjAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZB VEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxZDkwMDApID0gMzQzNjQ0NTY5 NjAgKDB4ODAwNDgwMDAwKQptbWFwKDB4ODAwNDhhMDAwLDI4NjcyLFBST1RfUkVBRHxQUk9U X1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MWUy MDAwKSA9IDM0MzY0NDk3OTIwICgweDgwMDQ4YTAwMCkKbW1hcCgweDgwMDQ5MTAwMCwyMjY5 MTg0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfQU5P TiwtMSwweDApID0gMzQzNjQ1MjY1OTIgKDB4ODAwNDkxMDAwKQptdW5tYXAoMHg4MDAyNjkw MDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3Blbigi L2xpYi9saWJuY3Vyc2Vzdy5zby45IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0 MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9 MTEyNTAwNixzaXplPTQ1NzQzMixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNjIyNjU2MDAgKDB4ODAwMjY5MDAwKQptbWFwKDB4MCw0NzEwNDAsUFJPVF9OT05F LE1BUF9HVUFSRCwtMSwweDApICAgICAgPSAzNDM2Njc5NTc3NiAoMHg4MDA2YmIwMDApCm1t YXAoMHg4MDA2YmIwMDAsMTkyNTEyLFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM2Njc5NTc3NiAoMHg4 MDA2YmIwMDApCm1tYXAoMHg4MDA2ZWEwMDAsMjQ5ODU2LFBST1RfUkVBRHxQUk9UX0VYRUMs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMyww eDJlMDAwKSA9IDM0MzY2OTg4Mjg4ICgweDgwMDZlYTAwMCkKbW1hcCgweDgwMDcyNzAwMCwx NjM4NCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BS RUZBVUxUX1JFQUQsMywweDZhMDAwKSA9IDM0MzY3MjM4MTQ0ICgweDgwMDcyNzAwMCkKbW1h cCgweDgwMDcyYjAwMCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDZkMDAwKSA9IDM0MzY3MjU0NTI4ICgw eDgwMDcyYjAwMCkKbXVubWFwKDB4ODAwMjY5MDAwLDQwOTYpICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAwMjllMDAwLDgxOTIsUFJPVF9S RUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDA0ODAwMDAsMzY4NjQs UFJPVF9SRUFEKSAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwMDcyNzAwMCwx NjM4NCxQUk9UX1JFQUQpICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAwNDgw MDAwLDM2ODY0LFBST1RfUkVBRHxQUk9UX1dSSVRFKSA9IDAgKDB4MCkKbXByb3RlY3QoMHg4 MDA0ODAwMDAsMzY4NjQsUFJPVF9SRUFEKSAgICAgICAgICAgID0gMCAoMHgwKQpyZWFkbGlu aygiL2V0Yy9tYWxsb2MuY29uZiIsMHg3ZmZmZmZmZmQwYzAsMTAyNCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCmlzc2V0dWdpZCgpICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKX19zeXNjdGwoInZtLm92ZXJjb21taXQiLDIs MHg3ZmZmZmZmZmQwNzQsMHg3ZmZmZmZmZmQwNjgsMHgwLDApID0gMCAoMHgwKQptbWFwKDB4 MCwyMDk3MTUyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1B UF9BTElHTkVEKDIxKSwtMSwweDApID0gMzQzNjgxMjY5NzYgKDB4ODAwODAwMDAwKQptbWFw KDB4MCwzMjc2OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxN QVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY3MjY2ODE2ICgweDgwMDcyZTAwMCkKbW1h cCgweDAsNDE5NDMwNCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5P TnxNQVBfQUxJR05FRCgyMSksLTEsMHgwKSA9IDM0MzcwMjI0MTI4ICgweDgwMGEwMDAwMCkK bW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5P TnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzYyMjY1NjAwICgweDgwMDI2OTAwMCkK bXByb3RlY3QoMHgyMjgwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgICAgID0gMCAo MHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1B UF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjcyOTk1ODQgKDB4ODAwNzM2 MDAwKQpvcGVuKCIvdXNyL3NoYXJlL2xvY2FsZS9lbl9HQi5VVEYtOC9MQ19DT0xMQVRFIixP X1JET05MWSwwMTM3MjA2NDYwNTcpID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0t ci0tICxpbm9kZT0xMTI5MDc2LHNpemU9Nzk2OTIsYmxrc2l6ZT03OTg3MiB9KSA9IDAgKDB4 MCkKbW1hcCgweDAsNzk2OTIsUFJPVF9SRUFELE1BUF9QUklWQVRFLDMsMHgwKSAgICAgID0g MzQzNjczMDM2ODAgKDB4ODAwNzM3MDAwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3Ivc2hhcmUvbG9jYWxl L2VuX0dCLlVURi04L0xDX0NUWVBFIixPX1JET05MWSwwMTM3MjA2NDYwNTcpID0gMyAoMHgz KQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTI5NTE2LHNpemU9NDk4ODAs Ymxrc2l6ZT01MDE3NiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDk4ODAsUFJPVF9SRUFELE1B UF9QUklWQVRFLDMsMHgwKSAgICAgID0gMzQzNjczODU2MDAgKDB4ODAwNzRiMDAwKQpjbG9z ZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDAp Cm1tYXAoMHgwLDEwMjQwMCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBf QU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY3NDM4ODQ4ICgweDgwMDc1ODAw MCkKbXVubWFwKDB4ODAwNzRiMDAwLDQ5ODgwKSAgICAgICAgICAgICAgICAgICAgICAgID0g MCAoMHgwKQpvcGVuKCIvdXNyL3NoYXJlL2xvY2FsZS9lbl9HQi5VVEYtOC9MQ19NT05FVEFS WSIsT19SRE9OTFl8T19DTE9FWEVDLDA3NjEzMjcwMDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7 IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEzNzA1OCxzaXplPTMzLGJsa3NpemU9NDA5NiB9 KSA9IDAgKDB4MCkKbW1hcCgweDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDM2NzM4NTYwMCAo MHg4MDA3NGIwMDApCnJlYWQoMywiR0JQIFxuXE0tQlxNLSNcbi5cbixcbjNcblxuLVxuMiIu Li4sMzMpICA9IDMzICgweDIxKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3Ivc2hhcmUvbG9jYWxlL2VuX0dC LlVURi04L0xDX05VTUVSSUMiLE9fUkRPTkxZfE9fQ0xPRVhFQywwMzQ2NDA0MDApID0gMyAo MHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTM3MzQyLHNpemU9Nixi bGtzaXplPTQwOTYgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1Rf V1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAz NDM2NzM5Nzg4OCAoMHg4MDA3NGUwMDApCnJlYWQoMywiLlxuLFxuM1xuIiw2KSAgICAgICAg ICAgICAgICAgICAgICAgICAgICA9IDYgKDB4NikKY2xvc2UoMykgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL3NoYXJlL2xv Y2FsZS9lbl9HQi5VVEYtOC9MQ19USU1FIixPX1JET05MWXxPX0NMT0VYRUMsMDE1NTMzNjcx NDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEzODQw OCxzaXplPTM4MSxibGtzaXplPTQwOTYgfSkgPSAwICgweDApCm1tYXAoMHgwLDI4NjcyLFBS T1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEy KSwtMSwweDApID0gMzQzNjc0MDE5ODQgKDB4ODAwNzRmMDAwKQpyZWFkKDMsIkphblxuRmVi XG5NYXJcbkFwclxuTWF5XG5KdW5cbkp1Ii4uLiwzODEpID0gMzgxICgweDE3ZCkKY2xvc2Uo MykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpv cGVuKCIvdXNyL3NoYXJlL2xvY2FsZS9lbl9HQi5VVEYtOC9MQ19NRVNTQUdFUyIsT19SRE9O TFl8T19DTE9FWEVDLDAxMTMyMDQ0MzQwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1y LS1yLS1yLS0gLGlub2RlPTExMzcxMzcsc2l6ZT03NCxibGtzaXplPTQwOTYgfSkgPSAwICgw eDApCm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1B UF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc1NDEyNDggKDB4ODAwNzcx MDAwKQpyZWFkKDMsIl4oKFt5WV0oW2VFXVtzU10pPyl8KFt5WV0pKVxuXigoIi4uLiw3NCkg PSA3NCAoMHg0YSkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpnZXRwaWQoKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgPSAzODE0MiAoMHg5NGZlKQpnZXRldWlkKCkgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgPSAxMDAyICgweDNlYSkKZ2V0cHBpZCgpICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMzgxNDEgKDB4OTRmZCkKbW1h cCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxN QVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY3NDMwNjU2ICgweDgwMDc1NjAwMCkKbW1h cCgweDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058 TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDM2NzU1MzUzNiAoMHg4MDA3NzQwMDApCm1t YXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9O fE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc1NzQwMTYgKDB4ODAwNzc5MDAwKQpt bWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5P TnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY3NTk0NDk2ICgweDgwMDc3ZTAwMCkK bW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5P TnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY3NDM0NzUyICgweDgwMDc1NzAwMCkK bW1hcCgweDAsMjg2NzIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FO T058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDM2NzYxNDk3NiAoMHg4MDA3ODMwMDAp Cm1tYXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2NDM2NDggKDB4ODAwNzhhMDAw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2NjQxMjggKDB4ODAwNzhmMDAw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2NjgyMjQgKDB4ODAwNzkwMDAw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2NzIzMjAgKDB4ODAwNzkxMDAw KQpnZXR1aWQoKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAx MDAyICgweDNlYSkKZ2V0ZXVpZCgpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMTAwMiAoMHgzZWEpCmdldGdpZCgpICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICA9IDEwMDIgKDB4M2VhKQpnZXRlZ2lkKCkgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAxMDAyICgweDNlYSkKb3BlbmF0KEFUX0ZE Q1dELCIvdXNyL2xvY2FsL2Jpbi92aXJ0dWFsYm94IixPX1JET05MWXxPX0NMT0VYRUMsMDAp ID0gMyAoMHgzKQpmY250bCgzLEZfRFVQRkRfQ0xPRVhFQywweGEpICAgICAgICAgICAgICAg ICAgICAgPSAxMCAoMHhhKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgPSAwICgweDApCnNpZ2FjdGlvbihTSUdJTlQsMHgwLHsgU0lHX0RGTCBT QV9SRVNUQVJUIHNzX3QgfSkgPSAwICgweDApCnNpZ2FjdGlvbihTSUdJTlQseyAweDIyNDc2 MCAweDAgc3NfdCB9LDB4MCkgICAgICA9IDAgKDB4MCkKc2lnYWN0aW9uKFNJR1FVSVQsMHgw LHsgU0lHX0RGTCBTQV9SRVNUQVJUIHNzX3QgfSkgPSAwICgweDApCnNpZ2FjdGlvbihTSUdR VUlULHsgMHgyMjQ3NjAgMHgwIHNzX3QgfSwweDApICAgICA9IDAgKDB4MCkKc2lnYWN0aW9u KFNJR1RFUk0sMHgwLHsgU0lHX0RGTCAweDAgc3NfdCB9KSAgICAgID0gMCAoMHgwKQpzaWdh Y3Rpb24oU0lHVEVSTSx7IFNJR19ERkwgMHgwIHNzX3QgfSwweDApICAgICAgPSAwICgweDAp CmZzdGF0YXQoQVRfRkRDV0QsIi4iLHsgbW9kZT1kcnd4ci14ci14ICxpbm9kZT0xNixzaXpl PTE0MSxibGtzaXplPTE2Mzg0IH0sMHgwKSA9IDAgKDB4MCkKZnN0YXRhdChBVF9GRENXRCwi L2hvbWUvZ3JhaGFtcGVycmluIix7IG1vZGU9ZHJ3eHIteHIteCAsaW5vZGU9MTYsc2l6ZT0x NDEsYmxrc2l6ZT0xNjM4NCB9LDB4MCkgPSAwICgweDApCnJlYWQoMTAsIiMhL2Jpbi9zaFxu I1xuIyBPcmFjbGUgVk0gVmlydHVhIi4uLiwxMDI0KSA9IDEwMjQgKDB4NDAwKQptbWFwKDB4 MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9B TElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2NzY0MTYgKDB4ODAwNzkyMDAwKQptbWFwKDB4 MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9B TElHTkVEKDEyKSwtMSwweDApID0gMzQzNjc2ODA1MTIgKDB4ODAwNzkzMDAwKQpmc3RhdGF0 KEFUX0ZEQ1dELCIvdXNyL2xvY2FsL2V0Yy92Ym94L3Zib3guY2ZnIiwweDdmZmZmZmZmZGZk OCwweDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpmc3RhdGF0KEFUX0ZE Q1dELCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94Iix7IG1vZGU9ZHJ3eHIteHIteCAsaW5v ZGU9MTc4MzMxMCxzaXplPTU0LGJsa3NpemU9NjY1NiB9LDB4MCkgPSAwICgweDApCmZzdGF0 YXQoQVRfRkRDV0QsIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvVkJveFJULnNvIix7IG1v ZGU9LXJ3LXItLXItLSAsaW5vZGU9MTEyNzQ0LHNpemU9MTMzNTQ3NzYsYmxrc2l6ZT0xMzEw NzIgfSwweDApID0gMCAoMHgwKQpyZWFkKDEwLCJwcm9ibGVtXG5LREVfRk9SS19TTEFWRVM9 MTsgZXhwbyIuLi4sMTAyNCkgPSA4NTUgKDB4MzU3KQpmc3RhdGF0KEFUX0ZEQ1dELCIvdXNy L2Jpbi9iYXNlbmFtZSIseyBtb2RlPS1yLXhyLXhyLXggLGlub2RlPTExMzA0OTMsc2l6ZT05 Njg4LGJsa3NpemU9OTcyOCB9LDB4MCkgPSAwICgweDApCm1tYXAoMHgwLDEyMjg4LFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwt MSwweDApID0gMzQzNjc2ODQ2MDggKDB4ODAwNzk0MDAwKQpwaXBlMigweDdmZmZmZmZmZGYw OCwwKSAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCnZmb3JrKCkgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDM4MTQzICgweDk0ZmYpCmNs b3NlKDQpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKcmVhZCgzLCJ2aXJ0dWFsYm94XG4iLDEyOCkgICAgICAgICAgICAgICAgICAgICAgID0g MTEgKDB4YikKcmVhZCgzLDB4N2ZmZmZmZmZlMGMwLDEyOCkgICAgICAgICAgICAgICAgICAg ICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgPSAwICgweDApCndhaXQ0KC0xLHsgRVhJVEVELHZhbD0wIH0sMHgwLDB4MCkg ICAgICAgICAgICAgICA9IDM4MTQzICgweDk0ZmYpCmV4ZWN2ZSgiL3Vzci9sb2NhbC9saWIv dmlydHVhbGJveC9WaXJ0dWFsQm94IiwweDgwMDc5MmI3MCwweDgwMDc5MmUwOCkgRUpVU1RS RVRVUk4KbW1hcCgweDAsMTM1MTY4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9BTk9OLC0xLDB4MCkgPSAzNDM2NjE4NTQ3MiAoMHg4MDA2MjYwMDApCmlzc2V0dWdp ZCgpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKc2ln ZmFzdGJsb2NrKDB4MSwweDgwMDYyNTljMCkgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpfX3N5c2N0bCgia2Vybi5vc3R5cGUiLDIsMHg4MDA2MjUzNDQsMHg3ZmZmZmZmZmQ5MjAs MHgwLDApID0gMCAoMHgwKQpfX3N5c2N0bCgia2Vybi5ob3N0bmFtZSIsMiwweDgwMDYyNTQ0 NCwweDdmZmZmZmZmZDkyMCwweDAsMCkgPSAwICgweDApCl9fc3lzY3RsKCJrZXJuLm9zcmVs ZWFzZSIsMiwweDgwMDYyNTU0NCwweDdmZmZmZmZmZDkyMCwweDAsMCkgPSAwICgweDApCl9f c3lzY3RsKCJrZXJuLnZlcnNpb24iLDIsMHg4MDA2MjU2NDQsMHg3ZmZmZmZmZmQ5MjAsMHgw LDApID0gMCAoMHgwKQpfX3N5c2N0bCgiaHcubWFjaGluZSIsMiwweDgwMDYyNTc0NCwweDdm ZmZmZmZmZDkyMCwweDAsMCkgPSAwICgweDApCm9wZW4oIi9ldGMvbGlibWFwLmNvbmYiLE9f UkRPTkxZfE9fQ0xPRVhFQywwMzA1MTAwMzApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0t cnctci0tci0tICxpbm9kZT0xNjY0NSxzaXplPTExNSxibGtzaXplPTQwOTYgfSkgPSAwICgw eDApCnJlYWQoMywiIyAkRnJlZUJTRDogaGVhZC9saWJleGVjL3J0bGQtZWwiLi4uLDExNSkg PSAxMTUgKDB4NzMpCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9ldGMvbGlibWFwLmQiLE9fUkRP TkxZfE9fTk9OQkxPQ0t8T19ESVJFQ1RPUll8T19DTE9FWEVDLDAxNjUpID0gMyAoMHgzKQpm Y250bCgzLEZfSVNVTklPTlNUQUNLLDB4MCkgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCmdldGRpcmVudHJpZXMoMywiXE0tdVxeWlxeRFwwXDBcMFwwXDBcXkFcMFwwXDBcMCIu Li4sNDA5Nix7IDB4MCB9KSA9IDEwNCAoMHg2OCkKb3BlbigiL3Vzci9sb2NhbC9ldGMvbGli bWFwLmQvb3BlcmEuY29uZiIsT19SRE9OTFl8T19DTE9FWEVDLDAxNjUpID0gNCAoMHg0KQpm c3RhdCg0LHsgbW9kZT0tcnctci0tci0tICxpbm9kZT04MDkxNTIsc2l6ZT02MCxibGtzaXpl PTQwOTYgfSkgPSAwICgweDApCnJlYWQoNCwibGliZnJlZXR5cGUuc28uOVx0bGliZnJlZXR5 cGUuc28iLi4uLDYwKSA9IDYwICgweDNjKQpjbG9zZSg0KSAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmdldGRpcmVudHJpZXMoMywweDgwMDYy YjAwOCw0MDk2LHsgMHgxNDlmMGVkNyB9KSA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xv Y2FsL2xpYi92aXJ0dWFsYm94L2xpYnRoci5zby4zIixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL3Zhci9ydW4vbGQtZWxmLnNvLmhpbnRzIixPX1JET05MWXxPX0NMT0VYRUMsMDIw MDAzNzIxKSA9IDMgKDB4MykKcmVhZCgzLCJFaG50XF5BXDBcMFwwXE1eQFwwXDBcMFxeRVxe QlwwIi4uLiwxMjgpID0gMTI4ICgweDgwKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxp bm9kZT03MjExNTMsc2l6ZT02NDUsYmxrc2l6ZT00MDk2IH0pID0gMCAoMHgwKQpwcmVhZCgz LCIvbGliOi91c3IvbGliOi91c3IvbGliL2NvbXBhdDovdSIuLi4sNTE3LDB4ODApID0gNTE3 ICgweDIwNSkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgID0gMCAoMHgwKQpvcGVuKCIvbGliL2xpYnRoci5zby4zIixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXIt LXItLXItLSAsaW5vZGU9MTEyNTM2MSxzaXplPTEyODk2OCxibGtzaXplPTEyOTAyNCB9KSA9 IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZB VUxUX1JFQUQsMywweDApID0gMzQzNjYzMjA2NDAgKDB4ODAwNjQ3MDAwKQptbWFwKDB4MCwx ODAyMjQsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgPSAzNDM2NjMyNDczNiAo MHg4MDA2NDgwMDApCm1tYXAoMHg4MDA2NDgwMDAsNTMyNDgsUFJPVF9SRUFELE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0 MzY2MzI0NzM2ICgweDgwMDY0ODAwMCkKbW1hcCgweDgwMDY1NTAwMCw2OTYzMixQUk9UX1JF QUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHhjMDAwKSA9IDM0MzY2Mzc3OTg0ICgweDgwMDY1NTAwMCkKbW1hcCgw eDgwMDY2NjAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MWQwMDApID0gMzQzNjY0NDc2MTYgKDB4ODAw NjY2MDAwKQptbWFwKDB4ODAwNjY3MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxZDAwMCkgPSAzNDM2 NjQ1MTcxMiAoMHg4MDA2NjcwMDApCm1tYXAoMHg4MDA2NjgwMDAsNDkxNTIsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAz NDM2NjQ1NTgwOCAoMHg4MDA2NjgwMDApCm11bm1hcCgweDgwMDY0NzAwMCw0MDk2KSAgICAg ICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xp Yi92aXJ0dWFsYm94L2xpYnN0ZGMrKy5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJ RlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL2xpYi9saWJzdGRjKysuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAx NDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbGliL2xpYnN0ZGMrKy5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0 MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vz ci9saWIvY29tcGF0L2xpYnN0ZGMrKy5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJ RlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL3Vzci9sb2NhbC9saWIvbGlic3RkYysrLnNvLjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9lMmZzcHJvZ3MvbGlic3RkYysrLnNvLjYiLE9fUkRP TkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9nY2M2L2xpYnN0ZGMrKy5z by42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4 MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9OTY4NTU5LHNpemU9MTYzNTY4 MCxibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQs TUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNjYzMjA2NDAgKDB4 ODAwNjQ3MDAwKQptbWFwKDB4MCwzNzQ3ODQwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgw KSAgICAgPSAzNDM2NjUwNDk2MCAoMHg4MDA2NzQwMDApCm1tYXAoMHg4MDA2NzQwMDAsMTU4 NTE1MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9D T1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0MzY2NTA0OTYwICgweDgwMDY3NDAw MCkKbW1hcCgweDgwMDlmNzAwMCw0OTE1MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDE4MzAwMCkgPSAzNDM3MDE4 NzI2NCAoMHg4MDA5ZjcwMDApCm1tYXAoMHg4MDBhMDMwMDAsMTYzODQsUFJPVF9SRUFEfFBS T1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDM3 MDIzNjQxNiAoMHg4MDBhMDMwMDApCm11bm1hcCgweDgwMDY0NzAwMCw0MDk2KSAgICAgICAg ICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92 aXJ0dWFsYm94L2xpYm0uc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2 NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGli bS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSA9IDMgKDB4 MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEyMjk0NCxzaXplPTIxMDg0 MCxibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQs TUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNjYzMjA2NDAgKDB4 ODAwNjQ3MDAwKQptbWFwKDB4MCwyMDQ4MDAsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDAp ICAgICAgPSAzNDM3MDI1MjgwMCAoMHg4MDBhMDcwMDApCm1tYXAoMHg4MDBhMDcwMDAsNzM3 MjgsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0MzcwMjUyODAwICgweDgwMGEwNzAwMCkKbW1hcCgweDgw MGExOTAwMCwxMjI4ODAsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTEwMDApID0gMzQzNzAzMjY1 MjggKDB4ODAwYTE5MDAwKQptbWFwKDB4ODAwYTM3MDAwLDQwOTYsUFJPVF9SRUFEfFBST1Rf V1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyZTAw MCkgPSAzNDM3MDQ0OTQwOCAoMHg4MDBhMzcwMDApCm1tYXAoMHg4MDBhMzgwMDAsNDA5NixQ Uk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxU X1JFQUQsMywweDJlMDAwKSA9IDM0MzcwNDUzNTA0ICgweDgwMGEzODAwMCkKbXVubWFwKDB4 ODAwNjQ3MDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9z ZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDAp Cm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliZ2NjX3Muc28uMSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliZ2NjX3Muc28uMSIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2Rl PS1yLS1yLS1yLS0gLGlub2RlPTExMjM4NzMsc2l6ZT05NDc5MixibGtzaXplPTk1MjMyIH0p ID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM2NjMyMDY0MCAoMHg4MDA2NDcwMDApCm1tYXAoMHgw LDEwNjQ5NixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICA9IDM0MzcwNDU3NjAw ICgweDgwMGEzOTAwMCkKbW1hcCgweDgwMGEzOTAwMCwzNjg2NCxQUk9UX1JFQUQsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0g MzQzNzA0NTc2MDAgKDB4ODAwYTM5MDAwKQptbWFwKDB4ODAwYTQyMDAwLDU3MzQ0LFBST1Rf UkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BS RUZBVUxUX1JFQUQsMywweDgwMDApID0gMzQzNzA0OTQ0NjQgKDB4ODAwYTQyMDAwKQptbWFw KDB4ODAwYTUwMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxNTAwMCkgPSAzNDM3MDU1MTgwOCAoMHg4 MDBhNTAwMDApCm1tYXAoMHg4MDBhNTIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxN QVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDE2MDAwKSA9IDM0 MzcwNTYwMDAwICgweDgwMGE1MjAwMCkKbXVubWFwKDB4ODAwNjQ3MDAwLDQwOTYpICAgICAg ICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGli L3ZpcnR1YWxib3gvbGliYy5zby43IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDI3 NjU3NDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9s aWJjLnNvLjciLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMjc2NTc0MDApID0gMyAo MHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTE1MDY3LHNpemU9MjA2 MTI3MixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNjYzMjA2NDAg KDB4ODAwNjQ3MDAwKQptbWFwKDB4MCw0Mjg0NDE2LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEs MHgwKSAgICAgPSAzNDM3MDU2NDA5NiAoMHg4MDBhNTMwMDApCm1tYXAoMHg4MDBhNTMwMDAs NTUyOTYwLFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3MDU2NDA5NiAoMHg4MDBhNTMwMDApCm1tYXAo MHg4MDBhZGEwMDAsMTM5MjY0MCxQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1B UF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg4NjAwMCkgPSAzNDM3 MTExNzA1NiAoMHg4MDBhZGEwMDApCm1tYXAoMHg4MDBjMmUwMDAsNDA5NjAsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMs MHgxZDkwMDApID0gMzQzNzI1MDk2OTYgKDB4ODAwYzJlMDAwKQptbWFwKDB4ODAwYzM4MDAw LDI4NjcyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MWUyMDAwKSA9IDM0MzcyNTUwNjU2ICgweDgwMGMzODAwMCkK bW1hcCgweDgwMGMzZjAwMCwyMjY5MTg0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSwweDApID0gMzQzNzI1NzkzMjggKDB4ODAwYzNm MDAwKQptdW5tYXAoMHg4MDA2NDcwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAg PSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDA2NjYwMDAsNDA5NixQUk9UX1JFQUQpICAg ICAgICAgICAgID0gMCAoMHgwKQptdW5tYXAoMHg4MDA2MzAwMDAsOTQyMDgpICAgICAgICAg ICAgICAgICAgICAgICAgPSAwICgweDApCm1tYXAoMHgwLDI2MjE0NCxQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTiwtMSwweDApID0gMzQzNzQ4NDg1MTIgKDB4 ODAwZTY5MDAwKQptcHJvdGVjdCgweDgwMDlmNzAwMCw0MDk2MCxQUk9UX1JFQUQpICAgICAg ICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAwYTM3MDAwLDQwOTYsUFJPVF9SRUFEKSAg ICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDBhNTAwMDAsNDA5NixQUk9UX1JF QUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwMGMyZTAwMCwzNjg2NCxQ Uk9UX1JFQUQpICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAwYzJlMDAwLDM2 ODY0LFBST1RfUkVBRHxQUk9UX1dSSVRFKSA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDBjMmUw MDAsMzY4NjQsUFJPVF9SRUFEKSAgICAgICAgICAgID0gMCAoMHgwKQpyZWFkbGluaygiL2V0 Yy9tYWxsb2MuY29uZiIsMHg3ZmZmZmZmZmQwYzAsMTAyNCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCmlzc2V0dWdpZCgpICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICA9IDAgKDB4MCkKX19zeXNjdGwoInZtLm92ZXJjb21taXQiLDIsMHg3ZmZm ZmZmZmQwNzQsMHg3ZmZmZmZmZmQwNjgsMHgwLDApID0gMCAoMHgwKQptbWFwKDB4MCwyMDk3 MTUyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElH TkVEKDIxKSwtMSwweDApID0gMzQzNzY1MTU1ODQgKDB4ODAxMDAwMDAwKQptbWFwKDB4MCwz Mjc2OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJ R05FRCgxMiksLTEsMHgwKSA9IDM0MzY2MjI2NDMyICgweDgwMDYzMDAwMCkKbW1hcCgweDAs NDE5NDMwNCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBf QUxJR05FRCgyMSksLTEsMHgwKSA9IDM0Mzc4NjEyNzM2ICgweDgwMTIwMDAwMCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBf QUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY2MjU5MjAwICgweDgwMDYzODAwMCkKbW1hcCgw eDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQ X0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDM2NjI2MzI5NiAoMHg4MDA2MzkwMDApCm1tYXAo MHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1B UF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQzNjYyNzU1ODQgKDB4ODAwNjNjMDAwKQptbWFw KDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxN QVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0MzY2Mjg3ODcyICgweDgwMDYzZjAwMCkKX19z eXNjdGwoImtlcm4udXNyc3RhY2siLDIsMHg4MDA2NzI1ODAsMHg3ZmZmZmZmZmQ0YzgsMHgw LDApID0gMCAoMHgwKQpnZXRybGltaXQoUkxJTUlUX1NUQUNLLHsgY3VyPTUzNjg3MDkxMixt YXg9NTM2ODcwOTEyIH0pID0gMCAoMHgwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9 IDM0MzY2MzAwMTYwICgweDgwMDY0MjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9 IDM0MzY2MzIwNjQwICgweDgwMDY0NzAwMCkKdGhyX3NlbGYoMHg4MDA2NDIwMDApICAgICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQptbWFwKDB4N2ZmZmRmZmZlMDAwLDQw OTYsUFJPVF9OT05FLE1BUF9BTk9OLC0xLDB4MCkgPSAxNDA3MzY5NTE0NzYyMjQgKDB4N2Zm ZmRmZmZlMDAwKQpydHByaW9fdGhyZWFkKFJUUF9MT09LVVAsMTAxMTU5LDB4N2ZmZmZmZmZk NDg4KSAgPSAwICgweDApCnNpZ2FjdGlvbihTSUdUSFIseyAweDgwMDY1YmYyMCBTQV9TSUdJ TkZPIHNzX3QgfSwweDApID0gMCAoMHgwKQpzaWdwcm9jbWFzayhTSUdfVU5CTE9DSyx7IH0s MHgwKSAgICAgICAgICAgICAgICAgPSAwICgweDApCl91bXR4X29wKDB4N2ZmZmZmZmZkNDkw LFVNVFhfT1BfV0FLRSwweDEsMHgwLDB4MCkgPSAwICgweDApCm1wcm90ZWN0KDB4MCwwLFBS T1RfTk9ORSkgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKZ2V0cGlkKCkgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMzgxNDIgKDB4OTRmZSkK Z2V0cGlkKCkgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMzgx NDIgKDB4OTRmZSkKc2lncHJvY21hc2soU0lHX0JMT0NLLHsgU0lHSFVQfFNJR0lOVHxTSUdR VUlUfFNJR0lMTHxTSUdUUkFQfFNJR0FCUlR8U0lHRU1UfFNJR0ZQRXxTSUdLSUxMfFNJR0JV U3xTSUdTRUdWfFNJR1NZU3xTSUdQSVBFfFNJR0FMUk18U0lHVEVSTXxTSUdVUkd8U0lHU1RP UHxTSUdUU1RQfFNJR0NPTlR8U0lHQ0hMRHxTSUdUVElOfFNJR1RUT1V8U0lHSU98U0lHWENQ VXxTSUdYRlNafFNJR1ZUQUxSTXxTSUdQUk9GfFNJR1dJTkNIfFNJR0lORk98U0lHVVNSMXxT SUdVU1IyIH0seyB9KSA9IDAgKDB4MCkKc2lnZmFzdGJsb2NrKDB4MywweDApICAgICAgICAg ICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpzaWdwcm9jbWFzayhTSUdfU0VUTUFTSyx7 IH0sMHgwKSAgICAgICAgICAgICAgICAgPSAwICgweDApCnNpZ2Zhc3RibG9jaygweDEsMHg4 MDA2NDIwMzgpICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKZ2V0Y29udGV4dCgweDdm ZmZmZmZmY2Y5MCkgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpzeXNhcmNoKEFN RDY0X0dFVF9YRlBVU1RBVEUsMHg3ZmZmZmZmZmNmNTgpICAgICAgPSAwICgweDApCm1tYXAo MHgwLDEzNTE2OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTiwt MSwweDApID0gMzQzNzUxMTA2NTYgKDB4ODAwZWE5MDAwKQptbWFwKDB4MCw0MDk2LFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwt MSwweDApID0gMzQzNzUyNDU4MjQgKDB4ODAwZWNhMDAwKQptbWFwKDB4MCw4NjAxNixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiks LTEsMHgwKSA9IDM0Mzc1MjQ5OTIwICgweDgwMGVjYjAwMCkKZ2V0cGlkKCkgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMzgxNDIgKDB4OTRmZSkKX19zeXNj dGwoImtlcm4ucHJvYy5wYXRobmFtZS4zODE0MiIsNCwweDYwODhjMCwweDdmZmZmZmZmZTQw OCwweDAsMCkgPSAwICgweDApCmdldHVpZCgpICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICA9IDEwMDIgKDB4M2VhKQpnZXRnaWQoKSAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgPSAxMDAyICgweDNlYSkKZ2V0ZXVpZCgpICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMTAwMiAoMHgzZWEpCmdldGVn aWQoKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDEwMDIgKDB4 M2VhKQpnZXRldWlkKCkgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg PSAxMDAyICgweDNlYSkKVmlydHVhbEJveHdyaXRlKDIsIlZpcnR1YWxCb3giLDEwKSAgICAg ICAgICAgICAgICAgICAgICAgPSAxMCAoMHhhKQo6IHdyaXRlKDIsIjogIiwyKSAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDIgKDB4MikKRXJyb3Igd3JpdGUo MiwiRXJyb3IgIiw2KSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSA2ICgweDYp Ci13cml0ZSgyLCItIiwxKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDEg KDB4MSkKMTB3cml0ZSgyLCIxMCIsMikgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgPSAyICgweDIpCiBpbiB3cml0ZSgyLCIgaW4gIiw0KSAgICAgICAgICAgICAg ICAgICAgICAgICAgICA9IDQgKDB4NCkKU1VQUjNIYXJkZW5lZE1haW53cml0ZSgyLCJTVVBS M0hhcmRlbmVkTWFpbiIsMTcpICAgICAgICAgICAgICAgICAgICAgICAgID0gMTcgKDB4MTEp CiEKd3JpdGUoMiwiIVxuIiwyKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0g MiAoMHgyKQpWaXJ0dWFsQm94d3JpdGUoMiwiVmlydHVhbEJveCIsMTApICAgICAgICAgICAg ICAgICAgICAgICA9IDEwICgweGEpCjogd3JpdGUoMiwiOiAiLDIpICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgID0gMiAoMHgyKQpFZmZlY3RpdmUgVUlEIGlzIG5v dCByb290IChldWlkPXdyaXRlKDIsIkVmZmVjdGl2ZSBVSUQgaXMgbm90IHJvb3QgKGV1aWQ9 IiwzMikgICA9IDMyICgweDIwKQoxMDAyd3JpdGUoMiwiMTAwMiIsNCkgICAgICAgICAgICAg ICAgICAgICAgICAgICAgPSA0ICgweDQpCiBlZ2lkPXdyaXRlKDIsIiBlZ2lkPSIsNikgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gNiAoMHg2KQoxMDAyd3JpdGUoMiwiMTAw MiIsNCkgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSA0ICgweDQpCiB1aWQ9d3JpdGUo MiwiIHVpZD0iLDUpICAgICAgICAgICAgICAgICAgICAgICAgICA9IDUgKDB4NSkKMTAwMndy aXRlKDIsIjEwMDIiLDQpICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gNCAoMHg0KQog Z2lkPXdyaXRlKDIsIiBnaWQ9Iiw1KSAgICAgICAgICAgICAgICAgICAgICAgICAgPSA1ICgw eDUpCjEwMDJ3cml0ZSgyLCIxMDAyIiw0KSAgICAgICAgICAgICAgICAgICAgICAgICAgICA9 IDQgKDB4NCkKKXdyaXRlKDIsIikiLDEpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgID0gMSAoMHgxKQoKd3JpdGUoMiwiXG4iLDEpICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgID0gMSAoMHgxKQoKd3JpdGUoMiwiXG4iLDEpICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgID0gMSAoMHgxKQpWaXJ0dWFsQm94d3JpdGUoMiwiVmlydHVhbEJv eCIsMTApICAgICAgICAgICAgICAgICAgICAgICA9IDEwICgweGEpCjogd3JpdGUoMiwiOiAi LDIpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMiAoMHgyKQpU aXAhIEl0IG1heSBoZWxwIHRvIHJlaW5zdGFsbCBWaXJ0dWFsQm94Lgp3cml0ZSgyLCJUaXAh IEl0IG1heSBoZWxwIHRvIHJlaW5zdGFsbCBWaSIuLi4sNDIpID0gNDIgKDB4MmEpCnNldHJl c2dpZCgweDNlYSwweDNlYSwweDNlYSkgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkK c2V0cmVzdWlkKDB4M2VhLDB4M2VhLDB4M2VhKSAgICAgICAgICAgICAgICAgICAgID0gMCAo MHgwKQpnZXRyZXN1aWQoMHg3ZmZmZmZmZmUyYWMsMHg3ZmZmZmZmZmUyYTgsMHg3ZmZmZmZm ZmUyYjApID0gMCAoMHgwKQpnZXRyZXNnaWQoMHg3ZmZmZmZmZmUyYjgsMHg3ZmZmZmZmZmUy YjQsMHg3ZmZmZmZmZmUyYmMpID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0 dWFsYm94L1ZpcnR1YWxCb3guc28iLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkg PSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1ydy1yLS1yLS0gLGlub2RlPTExMjkxMyxzaXpl PTIwMDM2NTkzNixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQ Uk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUz MzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwxNDIxNzIxNixQUk9UX05PTkUsTUFQX0dV QVJEfE1BUF9BTElHTkVEX1NVUEVSLC0xLDB4MCkgPSAzNDM4MjgwNzA0MCAoMHg4MDE2MDAw MDApCm1tYXAoMHg4MDE2MDAwMDAsMTE3NzE5MDQsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDM4MjgwNzA0MCAoMHg4MDE2MDAwMDApCm1tYXAoMHg4MDIzM2EwMDAsMzMxNzc2LFBS T1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4YjNhMDAwKSA9IDM0Mzk2Njc2MDk2ICgweDgwMjMzYTAwMCkKbW1hcCgweDgw MjM4YjAwMCwxNjM4NCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0Mzk3MDA3ODcyICgweDgwMjM4YjAwMCkKbXVubWFw KDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpj bG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliWGluZXJhbWEuc28uMSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gv bGliWGluZXJhbWEuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2 NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGli WGluZXJhbWEuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xp YlhpbmVyYW1hLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYw MDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9j b21wYXQvbGliWGluZXJhbWEuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAx NDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbG9jYWwvbGliL2xpYlhpbmVyYW1hLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14 ICxpbm9kZT03ODQwOTgsc2l6ZT0yMDQ3MixibGtzaXplPTIwNDgwIH0pID0gMCAoMHgwKQpt bWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDIwNDgwLFBST1Rf Tk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0Mzc1MzQwMDMyICgweDgwMGVlMTAw MCkKbW1hcCgweDgwMGVlMTAwMCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTM0MDAzMiAo MHg4MDBlZTEwMDApCm1tYXAoMHg4MDBlZTIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9FWEVD LE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMs MHgxMDAwKSA9IDM0Mzc1MzQ0MTI4ICgweDgwMGVlMjAwMCkKbW1hcCgweDgwMGVlMzAwMCw4 MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDM3NTM0ODIyNCAoMHg4MDBlZTMwMDApCm1tYXAo MHg4MDBlZTUwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBf RklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0Mzc1MzU2NDE2ICgweDgwMGVlNTAwMCkKbXVu bWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAw ICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGlieGNiLnNvLjEiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNo IGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xp YnhjYi5zby4xIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJ4Y2Iuc28u MSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05v IHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYnhjYi5zby4xIixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3Vj aCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYnhjYi5zby4x IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8g c3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbGlieGNiLnNv LjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgz KQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT0xOTE5Njcsc2l6ZT0xNjY5OTIs Ymxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1B UF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgw MGVlMDAwMCkKbW1hcCgweDAsMTcyMDMyLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAg ICAgID0gMzQzNzUzNjA1MTIgKDB4ODAwZWU2MDAwKQptbWFwKDB4ODAwZWU2MDAwLDkwMTEy LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MCkgPSAzNDM3NTM2MDUxMiAoMHg4MDBlZTYwMDApCm1tYXAoMHg4MDBl ZmMwMDAsNjk2MzIsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTYwMDApID0gMzQzNzU0NTA2MjQg KDB4ODAwZWZjMDAwKQptbWFwKDB4ODAwZjBkMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyNzAwMCkg PSAzNDM3NTUyMDI1NiAoMHg4MDBmMGQwMDApCm1tYXAoMHg4MDBmMGYwMDAsNDA5NixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgw KSA9IDM0Mzc1NTI4NDQ4ICgweDgwMGYwZjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYp ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9j YWwvbGliL3ZpcnR1YWxib3gvbGliR0wuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAxNTcyMDQ1MzAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliR0wuc28uMSIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAxNTcyMDQ1MzAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBk aXJlY3RvcnknCm9wZW4oIi9saWIvbGliR0wuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAxNTcyMDQ1MzAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi91c3IvbGliL2xpYkdMLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklG WSwwMTU3MjA0NTMwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVu KCIvdXNyL2xpYi9jb21wYXQvbGliR0wuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAxNTcyMDQ1MzAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi91c3IvbG9jYWwvbGliL2xpYkdMLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTU3MjA0NTMwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14 ICxpbm9kZT0xMTQ2NTg4LHNpemU9NTk3MDk2LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVB RCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDYxMDMwNCxQ Uk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICA9IDM0Mzc1NTMyNTQ0ICgweDgwMGYx MDAwMCkKbW1hcCgweDgwMGYxMDAwMCwyNjYyNDAsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1B UF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1NTMy NTQ0ICgweDgwMGYxMDAwMCkKbW1hcCgweDgwMGY1MTAwMCwzMjM1ODQsUFJPVF9SRUFEfFBS T1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4NDAwMDApID0gMzQzNzU3OTg3ODQgKDB4ODAwZjUxMDAwKQptbWFwKDB4ODAw ZmEwMDAwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4OGUwMDApID0gMzQzNzYxMjIzNjggKDB4ODAwZmEw MDAwKQptbWFwKDB4ODAwZmEzMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg5MDAwMCkgPSAzNDM3NjEz NDY1NiAoMHg4MDBmYTMwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAg ICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0 dWFsYm94L1ZCb3hERFUuc28iLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNTMwMDAp ID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnctci0tci0tICxpbm9kZT0xMTMyODksc2l6 ZT0yNjMxMjE2LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBS T1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMz NTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDI1MTA4NDgsUFJPVF9OT05FLE1BUF9HVUFS RCwtMSwweDApICAgICA9IDM0Mzk3MDI0MjU2ICgweDgwMjM4ZjAwMCkKbW1hcCgweDgwMjM4 ZjAwMCw0MDU1MDQsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM5NzAyNDI1NiAoMHg4 MDIzOGYwMDApCm1tYXAoMHg4MDI1ZjEwMDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg2MjAwMCkgPSAz NDM5OTUyMjgxNiAoMHg4MDI1ZjEwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAg ICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xp Yi92aXJ0dWFsYm94L1ZCb3hLZXlib2FyZC5zbyIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDA1MzAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1ydy1yLS1yLS0gLGlub2Rl PTExMzI5OCxzaXplPTEyMTAyNCxibGtzaXplPTEyMTM0NCB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwyMTY2Nzg0LFBST1RfTk9O RSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAzNDM5OTUzNTEwNCAoMHg4MDI1ZjQwMDApCm1t YXAoMHg4MDI1ZjQwMDAsNTczNDQsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM5OTUz NTEwNCAoMHg4MDI1ZjQwMDApCm1tYXAoMHg4MDI4MDIwMDAsMTIyODgsUFJPVF9SRUFEfFBS T1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhl MDAwKSA9IDM0NDAxNjg5NjAwICgweDgwMjgwMjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQw OTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3Iv bG9jYWwvbGliL3ZpcnR1YWxib3gvVkJveFJULnNvIixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDE1NzIwNDUzMDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3LXItLXIt LSAsaW5vZGU9MTEyNzQ0LHNpemU9MTMzNTQ3NzYsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgw eDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9S RUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsNTAxMzUw NCxQUk9UX05PTkUsTUFQX0dVQVJEfE1BUF9BTElHTkVEX1NVUEVSLC0xLDB4MCkgPSAzNDQw Mzc3ODU2MCAoMHg4MDJhMDAwMDApCm1tYXAoMHg4MDJhMDAwMDAsMjcyNzkzNixQUk9UX1JF QUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0NDAzNzc4NTYwICgweDgwMmEwMDAwMCkKbW1hcCgweDgw MmU5OTAwMCwxNTU2NDgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyOTkwMDApID0gMzQ0MDg1OTk1NTIgKDB4ODAy ZTk5MDAwKQptbWFwKDB4ODAyZWJmMDAwLDM2ODY0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSwweDApID0gMzQ0MDg3NTUyMDAgKDB4 ODAyZWJmMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAg ICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9W Qm94UkVNLnNvIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE1NzIwNDUzMDAwKSA9 IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3LXItLXItLSAsaW5vZGU9MTEzMzA1LHNpemU9 NTg5ODY4MCxibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9U X1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5 MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwzMjQ4MTI4LFBST1RfTk9ORSxNQVBfR1VBUkQs LTEsMHgwKSAgICAgPSAzNDQwODc5MjA2NCAoMHg4MDJlYzgwMDApCm1tYXAoMHg4MDJlYzgw MDAsNzA4NjA4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1B UF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0MDg3OTIwNjQgKDB4ODAy ZWM4MDAwKQptbWFwKDB4ODAzMTc0MDAwLDQ1MDU2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4YWMwMDApID0gMzQ0 MTE1OTM3MjggKDB4ODAzMTc0MDAwKQptbWFwKDB4ODAzMTdmMDAwLDQwMTQwOCxQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9 IDM0NDExNjM4Nzg0ICgweDgwMzE3ZjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwv bGliL3ZpcnR1YWxib3gvVkJveFZNTS5zbyIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDA2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1ydy1yLS1yLS0gLGlub2RlPTEx MjkxMCxzaXplPTE4MDE3MDg4LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4 MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDU2MzYwOTYsUFJPVF9OT05F LE1BUF9HVUFSRHxNQVBfQUxJR05FRF9TVVBFUiwtMSwweDApID0gMzQ0MTIxNjcxNjggKDB4 ODAzMjAwMDAwKQptbWFwKDB4ODAzMjAwMDAwLDMyMTk0NTYsUFJPVF9SRUFEfFBST1RfRVhF QyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MCkgPSAzNDQxMjE2NzE2OCAoMHg4MDMyMDAwMDApCm1tYXAoMHg4MDM3MTEwMDAsMzIz NTg0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4MzExMDAwKSA9IDM0NDE3NDc5NjgwICgweDgwMzcxMTAwMCkKbXVu bWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAw ICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliWGN1cnNvci5zby4x IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJY Y3Vyc29yLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMy ICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYlhjdXJzb3Iuc28u MSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYlhjdXJzb3Iuc28uMSIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBv ciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9saWJYY3Vyc29yLnNvLjEiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUg b3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJYY3Vyc29yLnNvLjEiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tcnd4ci14ci14ICxpbm9kZT0xMDg5Njc1LHNpemU9NTIxMTIsYmxrc2l6ZT01MjIy NCB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFw KDB4MCw1NzM0NCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDM3NjE0 Mjg0OCAoMHg4MDBmYTUwMDApCm1tYXAoMHg4MDBmYTUwMDAsMTYzODQsUFJPVF9SRUFELE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgw KSA9IDM0Mzc2MTQyODQ4ICgweDgwMGZhNTAwMCkKbW1hcCgweDgwMGZhOTAwMCwyODY3MixQ Uk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHg0MDAwKSA9IDM0Mzc2MTU5MjMyICgweDgwMGZhOTAwMCkK bW1hcCgweDgwMGZiMDAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4YjAwMCkgPSAzNDM3NjE4NzkwNCAo MHg4MDBmYjAwMDApCm1tYXAoMHg4MDBmYjIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0Mzc2MTk2MDk2 ICgweDgwMGZiMjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAg ICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxi b3gvbGliWGV4dC5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2 MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2Nh bC9saWIvdmlydHVhbGJveC9saWJYZXh0LnNvLjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvbGliL2xpYlhleHQuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAx NDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbGliL2xpYlhleHQuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIz MjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3Iv bGliL2NvbXBhdC9saWJYZXh0LnNvLjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSww MTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIv dXNyL2xvY2FsL2xpYi9saWJYZXh0LnNvLjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklG WSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxp bm9kZT0xMDg1NjkzLHNpemU9ODA4NDAsYmxrc2l6ZT04MDg5NiB9KSA9IDAgKDB4MCkKbW1h cCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMyww eDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw4NjAxNixQUk9UX05P TkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDM3NjIwMDE5MiAoMHg4MDBmYjMwMDAp Cm1tYXAoMHg4MDBmYjMwMDAsMjQ1NzYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc2MjAwMTkyICgw eDgwMGZiMzAwMCkKbW1hcCgweDgwMGZiOTAwMCw0OTE1MixQUk9UX1JFQUR8UFJPVF9FWEVD LE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMs MHg2MDAwKSA9IDM0Mzc2MjI0NzY4ICgweDgwMGZiOTAwMCkKbW1hcCgweDgwMGZjNTAwMCw4 MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4MTIwMDApID0gMzQzNzYyNzM5MjAgKDB4ODAwZmM1MDAwKQptbWFw KDB4ODAwZmM3MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDM3NjI4MjExMiAoMHg4MDBmYzcwMDApCm11 bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0g MCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYlgxMS5zby42IixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3Ig ZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYlgxMS5zby42 IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUg b3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYlgxMS5zby42IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVu KCIvdXNyL2xpYi9saWJYMTEuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAw KSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29t cGF0L2xpYlgxMS5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMy ICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJY MTEuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSA9IDMgKDB4MykKZnN0 YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MjI5NDUwMSxzaXplPTEzNDc2NTYsYmxr c2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9Q UklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVl MDAwMCkKbW1hcCgweDAsMTM0NzU4NCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAg ID0gMzQ0MDE3MDE4ODggKDB4ODAyODA1MDAwKQptbWFwKDB4ODAyODA1MDAwLDcwMDQxNixQ Uk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxU X1JFQUQsMywweDApID0gMzQ0MDE3MDE4ODggKDB4ODAyODA1MDAwKQptbWFwKDB4ODAyOGIw MDAwLDYyMjU5MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhhYjAwMCkgPSAzNDQwMjQwMjMwNCAo MHg4MDI4YjAwMDApCm1tYXAoMHg4MDI5NDgwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDE0MzAwMCkg PSAzNDQwMzAyNDg5NiAoMHg4MDI5NDgwMDApCm1tYXAoMHg4MDI5NGEwMDAsMTYzODQsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9S RUFELDMsMHgxNDUwMDApID0gMzQ0MDMwMzMwODggKDB4ODAyOTRhMDAwKQptdW5tYXAoMHg4 MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3Nl KDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkK b3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9WQm94WFBDT00uc28iLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tcnctci0tci0tICxpbm9kZT0xMTI3NDgsc2l6ZT0xMDA5OTgzMixibGtzaXplPTEz MTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8 TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQpt bWFwKDB4MCwzMjExMjY0LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAzNDQx NzgwMzI2NCAoMHg4MDM3NjAwMDApCm1tYXAoMHg4MDM3NjAwMDAsMTA1Njc2OCxQUk9UX1JF QUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0NDE3ODAzMjY0ICgweDgwMzc2MDAwMCkKbW1hcCgweDgw M2E2MjAwMCw0OTE1MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDEwMjAwMCkgPSAzNDQyMDk1NzE4NCAoMHg4MDNh NjIwMDApCm1tYXAoMHg4MDNhNmUwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0NDIxMDA2MzM2ICgweDgw M2E2ZTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAg ICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGli UXQ1WDExRXh0cmFzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYw MDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2Fs L2xpYi92aXJ0dWFsYm94L2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9y eScKb3BlbigiL2xpYi9saWJRdDVYMTFFeHRyYXMuc28uNSIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi91c3IvbGliL2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9y eScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JET05M WXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9y IGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbGliUXQ1WDExRXh0cmFzLnNvLjUi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNo IGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9lMmZzcHJvZ3MvbGli UXQ1WDExRXh0cmFzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYw MDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2Fs L2xpYi9nY2M2L2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL3Vzci9sb2NhbC9saWIvZ2NjOS9saWJRdDVYMTFFeHRyYXMuc28uNSIsT19SRE9OTFl8 T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBk aXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2dyYXBodml6L2xpYlF0NVgxMUV4dHJh cy5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAn Tm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbXlzcWwv bGliUXQ1WDExRXh0cmFzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIy NjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xv Y2FsL2xpYi9teXNxbC9wbHVnaW4vbGliUXQ1WDExRXh0cmFzLnNvLjUiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGly ZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9vcGVuY29sbGFkYS9saWJRdDVYMTFFeHRy YXMuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL3Blcmw1 LzUuMzAvbWFjaC9DT1JFL2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9y eScKb3BlbigiL3Vzci9sb2NhbC9saWIvcXQ1L2xpYlF0NVgxMUV4dHJhcy5zby41IixPX1JE T05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7 IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MjA4ODMyLHNpemU9MjMyNjQsYmxrc2l6ZT0yMzU1 MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFw KDB4MCwyNDU3NixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDM3NjI4 NjIwOCAoMHg4MDBmYzgwMDApCm1tYXAoMHg4MDBmYzgwMDAsODE5MixQUk9UX1JFQUQsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzYyODYyMDggKDB4ODAwZmM4MDAwKQptbWFwKDB4ODAwZmNhMDAwLDgxOTIsUFJP VF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDM3NjI5NDQwMCAoMHg4MDBmY2EwMDApCm1t YXAoMHg4MDBmY2MwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDQwMDApID0gMzQzNzYzMDI1OTIgKDB4 ODAwZmNjMDAwKQptbWFwKDB4ODAwZmNkMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1MDAwKSA9IDM0 Mzc2MzA2Njg4ICgweDgwMGZjZDAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAg ICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGli L3ZpcnR1YWxib3gvbGliUXQ1Q29yZS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJ RlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Blbigi L3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJRdDVDb3JlLnNvLjUiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGly ZWN0b3J5JwpvcGVuKCIvbGliL2xpYlF0NUNvcmUuc28uNSIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi91c3IvbGliL2xpYlF0NUNvcmUuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi91c3IvbGliL2NvbXBhdC9saWJRdDVDb3JlLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhF Q3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJRdDVDb3JlLnNvLjUiLE9fUkRPTkxZfE9fQ0xP RVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0 b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9lMmZzcHJvZ3MvbGliUXQ1Q29yZS5zby41IixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjNi9saWJRdDVDb3Jl LnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdO byBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9nY2M5L2xp YlF0NUNvcmUuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkg RVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGli L2dyYXBodml6L2xpYlF0NUNvcmUuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbG9jYWwvbGliL215c3FsL2xpYlF0NUNvcmUuc28uNSIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi91c3IvbG9jYWwvbGliL215c3FsL3BsdWdpbi9saWJRdDVDb3JlLnNvLjUiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9vcGVuY29sbGFkYS9saWJR dDVDb3JlLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVS UiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9w ZXJsNS81LjMwL21hY2gvQ09SRS9saWJRdDVDb3JlLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhF Q3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9xdDUvbGliUXQ1Q29yZS5zby41IixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9 LXJ3eHIteHIteCAsaW5vZGU9MTIwMzE5OCxzaXplPTU0MTU2MDAsYmxrc2l6ZT0xMzEwNzIg fSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9Q UkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgw eDAsNTQ0MzU4NCxQUk9UX05PTkUsTUFQX0dVQVJEfE1BUF9BTElHTkVEX1NVUEVSLC0xLDB4 MCkgPSAzNDQyMjY1MjkyOCAoMHg4MDNjMDAwMDApCm1tYXAoMHg4MDNjMDAwMDAsMjM2MzM5 MixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZB VUxUX1JFQUQsMywweDApID0gMzQ0MjI2NTI5MjggKDB4ODAzYzAwMDAwKQptbWFwKDB4ODAz ZTQxMDAwLDI4Nzk0ODgsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MjQwMDAwKSA9IDM0NDI1MDE2 MzIwICgweDgwM2U0MTAwMCkKbW1hcCgweDgwNDEwMDAwMCw1MzI0OCxQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDRm ZTAwMCkgPSAzNDQyNzg5NTgwOCAoMHg4MDQxMDAwMDApCm1tYXAoMHg4MDQxMGQwMDAsMTMx MDcyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4NTBhMDAwKSA9IDM0NDI3OTQ5MDU2ICgweDgwNDEwZDAwMCkKbW1h cCgweDgwNDEyZDAwMCwxNjM4NCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0NDI4MDgwMTI4ICgweDgwNDEyZDAwMCkK bXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAo MHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg PSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliUXQ1R3VpLnNv LjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdO byBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFs Ym94L2xpYlF0NUd1aS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMy MjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9s aWJRdDVHdWkuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xp YlF0NUd1aS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAw KSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29t cGF0L2xpYlF0NUd1aS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMy MjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9s b2NhbC9saWIvbGliUXQ1R3VpLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSww MTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIv dXNyL2xvY2FsL2xpYi9lMmZzcHJvZ3MvbGliUXQ1R3VpLnNvLjUiLE9fUkRPTkxZfE9fQ0xP RVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGly ZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9nY2M2L2xpYlF0NUd1aS5zby41IixPX1JE T05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjOS9saWJRdDVHdWku c28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2dyYXBo dml6L2xpYlF0NUd1aS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMy MjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9s b2NhbC9saWIvbXlzcWwvbGliUXQ1R3VpLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvdXNyL2xvY2FsL2xpYi9teXNxbC9wbHVnaW4vbGliUXQ1R3VpLnNvLjUiLE9fUkRP TkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9vcGVuY29sbGFkYS9saWJR dDVHdWkuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkg RVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGli L3Blcmw1LzUuMzAvbWFjaC9DT1JFL2xpYlF0NUd1aS5zby41IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVj dG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvcXQ1L2xpYlF0NUd1aS5zby41IixPX1JET05M WXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7 IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTUxMzAxNixzaXplPTU4MTIyMDgsYmxrc2l6ZT0x MzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRF fE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkK bW1hcCgweDAsNTg0MDg5NixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgID0gMzQ0 MjgwOTY1MTIgKDB4ODA0MTMxMDAwKQptbWFwKDB4ODA0MTMxMDAwLDE3MjAzMjAsUFJPVF9S RUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHgwKSA9IDM0NDI4MDk2NTEyICgweDgwNDEzMTAwMCkKbW1hcCgweDgwNDJkNTAwMCwz OTE5ODcyLFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9O T0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDFhNDAwMCkgPSAzNDQyOTgxNjgzMiAoMHg4 MDQyZDUwMDApCm1tYXAoMHg4MDQ2OTIwMDAsNjU1MzYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1NjEwMDApID0g MzQ0MzM3MzY3MDQgKDB4ODA0NjkyMDAwKQptbWFwKDB4ODA0NmEyMDAwLDEwNjQ5NixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JF QUQsMywweDU3MTAwMCkgPSAzNDQzMzgwMjI0MCAoMHg4MDQ2YTIwMDApCm1tYXAoMHg4MDQ2 YmMwMDAsMjg2NzIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQzMzkwODczNiAoMHg4MDQ2YmMwMDApCm11bm1hcCgw eDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xv c2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYlF0NVdpZGdldHMuc28uNSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9y IGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJRdDVXaWRn ZXRzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliUXQ1V2lkZ2V0cy5zby41IixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3Ig ZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJRdDVXaWRnZXRzLnNvLjUiLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv cnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9saWJRdDVXaWRnZXRzLnNvLjUiLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv cnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYlF0NVdpZGdldHMuc28uNSIsT19SRE9OTFl8 T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9y eScKb3BlbigiL3Vzci9sb2NhbC9saWIvZTJmc3Byb2dzL2xpYlF0NVdpZGdldHMuc28uNSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9y IGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjNi9saWJRdDVXaWRnZXRzLnNv LjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2djYzkvbGliUXQ1V2lkZ2V0 cy5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNo IGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9ncmFwaHZpei9saWJR dDVXaWRnZXRzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL215c3Fs L2xpYlF0NVdpZGdldHMuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIv bXlzcWwvcGx1Z2luL2xpYlF0NVdpZGdldHMuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vz ci9sb2NhbC9saWIvb3BlbmNvbGxhZGEvbGliUXQ1V2lkZ2V0cy5zby41IixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9wZXJsNS81LjMwL21hY2gvQ09SRS9saWJRdDVXaWRn ZXRzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL3F0NS9saWJRdDVX aWRnZXRzLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgPSAzICgweDMp CmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTE1MTQ0MjAsc2l6ZT02OTY2NTUy LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxN QVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4 MDBlZTAwMDApCm1tYXAoMHgwLDY5NjcyOTYsUFJPVF9OT05FLE1BUF9HVUFSRHxNQVBfQUxJ R05FRF9TVVBFUiwtMSwweDApID0gMzQ0MzUyMzU4NDAgKDB4ODA0ODAwMDAwKQptbWFwKDB4 ODA0ODAwMDAwLDI2NzA1OTIsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf Tk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDM1MjM1ODQwICgweDgwNDgw MDAwMCkKbW1hcCgweDgwNGE4YzAwMCwzOTQ4NTQ0LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDI4 YzAwMCkgPSAzNDQzNzkwNjQzMiAoMHg4MDRhOGMwMDApCm1tYXAoMHg4MDRlNTAwMDAsMTg0 MzIwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4NjUwMDAwKSA9IDM0NDQxODU0OTc2ICgweDgwNGU1MDAwMCkKbW1h cCgweDgwNGU3ZDAwMCwxNjM4NDAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg2N2QwMDApID0gMzQ0NDIwMzkyOTYg KDB4ODA0ZTdkMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAg ICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJv eC9saWJRdDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2Nh bC9saWIvdmlydHVhbGJveC9saWJRdDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL2xpYi9saWJRdDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Blbigi L3Vzci9saWIvbGliUXQ1UHJpbnRTdXBwb3J0LnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbGliL2NvbXBhdC9saWJRdDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL3Vzci9sb2NhbC9saWIvbGliUXQ1UHJpbnRTdXBwb3J0LnNvLjUiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi91c3IvbG9jYWwvbGliL2UyZnNwcm9ncy9saWJRdDVQcmludFN1cHBvcnQuc28u NSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxl IG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjNi9saWJRdDVQcmludFN1 cHBvcnQuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8g c3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjOS9saWJR dDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIv Z3JhcGh2aXovbGliUXQ1UHJpbnRTdXBwb3J0LnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbG9jYWwvbGliL215c3FsL2xpYlF0NVByaW50U3VwcG9ydC5zby41IixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9teXNxbC9wbHVnaW4vbGliUXQ1UHJpbnRTdXBwb3J0 LnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL29wZW5jb2xsYWRhL2xp YlF0NVByaW50U3VwcG9ydC5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xp Yi9wZXJsNS81LjMwL21hY2gvQ09SRS9saWJRdDVQcmludFN1cHBvcnQuc28uNSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVj dG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvcXQ1L2xpYlF0NVByaW50U3VwcG9ydC5zby41 IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tcnd4ci14ci14ICxpbm9kZT0yMDkzMTYsc2l6ZT00NzIwNjQsYmxrc2l6ZT0xMzEw NzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1h cCgweDAsNDcxMDQwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0MDMw NDk0NzIgKDB4ODAyOTRlMDAwKQptbWFwKDB4ODAyOTRlMDAwLDIzMzQ3MixQUk9UX1JFQUQs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMyww eDApID0gMzQ0MDMwNDk0NzIgKDB4ODAyOTRlMDAwKQptbWFwKDB4ODAyOTg3MDAwLDIwODg5 NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JF fE1BUF9QUkVGQVVMVF9SRUFELDMsMHgzOTAwMCkgPSAzNDQwMzI4Mjk0NCAoMHg4MDI5ODcw MDApCm1tYXAoMHg4MDI5YmEwMDAsMTYzODQsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg2YzAwMCkgPSAzNDQwMzQ5 MTg0MCAoMHg4MDI5YmEwMDApCm1tYXAoMHg4MDI5YmUwMDAsMTIyODgsUFJPVF9SRUFEfFBS T1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg3 MDAwMCkgPSAzNDQwMzUwODIyNCAoMHg4MDI5YmUwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0 MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNy L2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYlF0NU9wZW5HTC5zby41IixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRp cmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJRdDVPcGVuR0wu c28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliUXQ1T3BlbkdMLnNv LjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdO byBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJRdDVPcGVuR0wu c28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9saWJR dDVPcGVuR0wuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwv bGliL2xpYlF0NU9wZW5HTC5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0 MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vz ci9sb2NhbC9saWIvZTJmc3Byb2dzL2xpYlF0NU9wZW5HTC5zby41IixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRp cmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvZ2NjNi9saWJRdDVPcGVuR0wuc28uNSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2djYzkvbGliUXQ1 T3BlbkdMLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xp Yi9ncmFwaHZpei9saWJRdDVPcGVuR0wuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi91c3IvbG9jYWwvbGliL215c3FsL2xpYlF0NU9wZW5HTC5zby41IixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9y IGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbXlzcWwvcGx1Z2luL2xpYlF0NU9w ZW5HTC5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIv b3BlbmNvbGxhZGEvbGliUXQ1T3BlbkdMLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvdXNyL2xvY2FsL2xpYi9wZXJsNS81LjMwL21hY2gvQ09SRS9saWJRdDVPcGVuR0wu c28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL3F0NS9s aWJRdDVPcGVuR0wuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2 NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTIwOTMw MSxzaXplPTM3NTM0NCxibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5 NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQz NzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwzNzY4MzIsUFJPVF9OT05FLE1BUF9H VUFSRCwtMSwweDApICAgICAgPSAzNDQyMTAxNDUyOCAoMHg4MDNhNzAwMDApCm1tYXAoMHg4 MDNhNzAwMDAsMTgwMjI0LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05P Q09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQyMTAxNDUyOCAoMHg4MDNhNzAw MDApCm1tYXAoMHg4MDNhOWMwMDAsMTgwMjI0LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDJjMDAw KSA9IDM0NDIxMTk0NzUyICgweDgwM2E5YzAwMCkKbW1hcCgweDgwM2FjODAwMCw4MTkyLFBS T1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4NTgwMDApID0gMzQ0MjEzNzQ5NzYgKDB4ODAzYWM4MDAwKQptbWFwKDB4ODAz YWNhMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1YTAwMCkgPSAzNDQyMTM4MzE2OCAoMHg4MDNhY2Ew MDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9 IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYlhhdS5z by42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAn Tm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJYYXUuc28uNiIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYlhhdS5zby42IixPX1JET05M WXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxl IG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYlhhdS5zby42IixPX1JE T05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbGliWGF1LnNvLjYiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3Rh dCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT02NDA3NDcsc2l6ZT0xNTEwNCxibGtzaXpl PTE1MzYwIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFU RXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDAp Cm1tYXAoMHgwLDIwNDgwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0 Mzc2MzEwNzg0ICgweDgwMGZjZTAwMCkKbW1hcCgweDgwMGZjZTAwMCw0MDk2LFBST1RfUkVB RCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MCkgPSAzNDM3NjMxMDc4NCAoMHg4MDBmY2UwMDApCm1tYXAoMHg4MDBmY2YwMDAsNDA5 NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JF fE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMDAwKSA9IDM0Mzc2MzE0ODgwICgweDgwMGZjZjAw MCkKbW1hcCgweDgwMGZkMDAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDM3NjMxODk3 NiAoMHg4MDBmZDAwMDApCm1tYXAoMHg4MDBmZDIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9X UklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0Mzc2MzI3 MTY4ICgweDgwMGZkMjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1 YWxib3gvbGliWGRtY3Auc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliWGRt Y3Auc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgRVJSIzIgJ05v IHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYlhkbWNwLnNvLjYi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9jb21wYXQvbGliWGRtY3Auc28uNiIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYlhkbWNwLnNvLjYiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tcnd4ci14ci14ICxpbm9kZT0xMTE0MjEzLHNpemU9MzgwMzIsYmxrc2l6ZT0zODQw MCB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFw KDB4MCwzMjc2OCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDM3NjMz MTI2NCAoMHg4MDBmZDMwMDApCm1tYXAoMHg4MDBmZDMwMDAsMTIyODgsUFJPVF9SRUFELE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgw KSA9IDM0Mzc2MzMxMjY0ICgweDgwMGZkMzAwMCkKbW1hcCgweDgwMGZkNjAwMCwxMjI4OCxQ Uk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHgzMDAwKSA9IDM0Mzc2MzQzNTUyICgweDgwMGZkNjAwMCkK bW1hcCgweDgwMGZkOTAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4NjAwMCkgPSAzNDM3NjM1NTg0MCAo MHg4MDBmZDkwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAg ICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJ6LnNvLjYi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xsdm04MC9saWIvbGliei5zby42 IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJ6LnNvLjYiLE9fUkRPTkxZfE9fQ0xP RVhFQ3xPX1ZFUklGWSwwNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0t ci0tICxpbm9kZT0xMTI0Nzc5LHNpemU9MTAzNzUyLGJsa3NpemU9MTAzOTM2IH0pID0gMCAo MHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDExNDY4 OCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICA9IDM0Mzc2MzY0MDMyICgweDgw MGZkYjAwMCkKbW1hcCgweDgwMGZkYjAwMCwzNjg2NCxQUk9UX1JFQUQsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzYz NjQwMzIgKDB4ODAwZmRiMDAwKQptbWFwKDB4ODAwZmU0MDAwLDY5NjMyLFBST1RfUkVBRHxQ Uk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxU X1JFQUQsMywweDgwMDApID0gMzQzNzY0MDA4OTYgKDB4ODAwZmU0MDAwKQptbWFwKDB4ODAw ZmY1MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxODAwMCkgPSAzNDM3NjQ3MDUyOCAoMHg4MDBmZjUw MDApCm1tYXAoMHg4MDBmZjYwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDE4MDAwKSA9IDM0Mzc2NDc0 NjI0ICgweDgwMGZmNjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYmV4 cGF0LnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0g MyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT04MzA2MjUsc2l6ZT0x ODYxNDQsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2 ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTg0MzIwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEs MHgwKSAgICAgID0gMzQ0MDM1MjA1MTIgKDB4ODAyOWMxMDAwKQptbWFwKDB4ODAyOWMxMDAw LDU3MzQ0LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQwMzUyMDUxMiAoMHg4MDI5YzEwMDApCm1tYXAo MHg4MDI5Y2YwMDAsMTE0Njg4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweGUwMDApID0gMzQ0MDM1 Nzc4NTYgKDB4ODAyOWNmMDAwKQptbWFwKDB4ODAyOWViMDAwLDEyMjg4LFBST1RfUkVBRHxQ Uk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4 MmEwMDApID0gMzQ0MDM2OTI1NDQgKDB4ODAyOWViMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAs NDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vz ci9sb2NhbC9saWIvbGlieGNiLWRyaTMuc28uMCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlu b2RlPTE5MTcyNSxzaXplPTE5Njg4LGJsa3NpemU9MTk5NjggfSkgPSAwICgweDApCm1tYXAo MHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgw KSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMjA0ODAsUFJPVF9OT05F LE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQzNzY0Nzg3MjAgKDB4ODAwZmY3MDAwKQpt bWFwKDB4ODAwZmY3MDAwLDgxOTIsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc2NDc4NzIwICgweDgw MGZmNzAwMCkKbW1hcCgweDgwMGZmOTAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDIw MDApID0gMzQzNzY0ODY5MTIgKDB4ODAwZmY5MDAwKQptbWFwKDB4ODAwZmZhMDAwLDgxOTIs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgzMDAwKSA9IDM0Mzc2NDkxMDA4ICgweDgwMGZmYTAwMCkKbXVubWFwKDB4 ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9z ZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDAp Cm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYnhjYi14Zml4ZXMuc28uMCIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2Rl PS1yd3hyLXhyLXggLGlub2RlPTE5MTc3NCxzaXplPTMzMTIwLGJsa3NpemU9MzMyODAgfSkg PSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAs MzI3NjgsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQ0MDM3MDQ4MzIg KDB4ODAyOWVlMDAwKQptbWFwKDB4ODAyOWVlMDAwLDE2Mzg0LFBST1RfUkVBRCxNQVBfUFJJ VkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAz NDQwMzcwNDgzMiAoMHg4MDI5ZWUwMDApCm1tYXAoMHg4MDI5ZjIwMDAsODE5MixQUk9UX1JF QUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHg0MDAwKSA9IDM0NDAzNzIxMjE2ICgweDgwMjlmMjAwMCkKbW1hcCgw eDgwMjlmNDAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4NjAwMCkgPSAzNDQwMzcyOTQwOCAoMHg4MDI5 ZjQwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAg ICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJ4Y2ItcHJlc2VudC5z by4wIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4 MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTkxNzMzLHNpemU9MTk0ODgs Ymxrc2l6ZT0xOTk2OCB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQ X1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAw ZWUwMDAwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAg ICAgPSAzNDQwMzczNzYwMCAoMHg4MDI5ZjYwMDApCm1tYXAoMHg4MDI5ZjYwMDAsODE5MixQ Uk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxU X1JFQUQsMywweDApID0gMzQ0MDM3Mzc2MDAgKDB4ODAyOWY2MDAwKQptbWFwKDB4ODAyOWY4 MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQ X05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDQwMzc0NTc5MiAoMHg4 MDI5ZjgwMDApCm1tYXAoMHg4MDI5ZjkwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxN QVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDMwMDApID0gMzQ0 MDM3NDk4ODggKDB4ODAyOWY5MDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAg ICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIv bGlieGNiLXN5bmMuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAw MCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTE5MTc2Nixz aXplPTMyNTkyLGJsa3NpemU9MzI3NjggfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1 OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMzI3NjgsUFJPVF9OT05FLE1BUF9HVUFSRCwt MSwweDApICAgICAgID0gMzQ0MTIwNDAxOTIgKDB4ODAzMWUxMDAwKQptbWFwKDB4ODAzMWUx MDAwLDE2Mzg0LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQxMjA0MDE5MiAoMHg4MDMxZTEwMDApCm1t YXAoMHg4MDMxZTUwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1B UF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg0MDAwKSA9IDM0NDEy MDU2NTc2ICgweDgwMzFlNTAwMCkKbW1hcCgweDgwMzFlNzAwMCw4MTkyLFBST1RfUkVBRHxQ Uk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4 NjAwMCkgPSAzNDQxMjA2NDc2OCAoMHg4MDMxZTcwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0 MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNy L2xvY2FsL2xpYi9saWJ4c2htZmVuY2Uuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTA4 NjI3NyxzaXplPTE1MDQ4LGJsa3NpemU9MTUzNjAgfSkgPSAwICgweDApCm1tYXAoMHgwLDQw OTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0 Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTYzODQsUFJPVF9OT05FLE1BUF9H VUFSRCwtMSwweDApICAgICAgID0gMzQzNzY0OTkyMDAgKDB4ODAwZmZjMDAwKQptbWFwKDB4 ODAwZmZjMDAwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9D T1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc2NDk5MjAwICgweDgwMGZmYzAw MCkKbW1hcCgweDgwMGZmZDAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZB VEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDEwMDApID0g MzQzNzY1MDMyOTYgKDB4ODAwZmZkMDAwKQptbWFwKDB4ODAwZmZlMDAwLDgxOTIsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHgyMDAwKSA9IDM0Mzc2NTA3MzkyICgweDgwMGZmZTAwMCkKbXVubWFwKDB4ODAwZWUw MDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4o Ii91c3IvbG9jYWwvbGliL2xpYmdsYXBpLnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxp bm9kZT0xMTQ2NTk3LHNpemU9MzczODY0LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQpt bWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDM5MzIxNixQUk9U X05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICA9IDM0NDIxMzkxMzYwICgweDgwM2FjYzAw MCkKbW1hcCgweDgwM2FjYzAwMCwyNDE2NjQsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDIxMzkxMzYw ICgweDgwM2FjYzAwMCkKbW1hcCgweDgwM2IwNzAwMCwxMTA1OTIsUFJPVF9SRUFEfFBST1Rf RVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVB RCwzLDB4M2EwMDApID0gMzQ0MjE2MzMwMjQgKDB4ODAzYjA3MDAwKQptbWFwKDB4ODAzYjIy MDAwLDI4NjcyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4NTQwMDApID0gMzQ0MjE3NDM2MTYgKDB4ODAzYjIyMDAw KQptbWFwKDB4ODAzYjI5MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZB VEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1YTAwMCkgPSAzNDQyMTc3MjI4 OCAoMHg4MDNiMjkwMDApCm1tYXAoMHg4MDNiMmEwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9X UklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0NDIxNzc2 Mzg0ICgweDgwM2IyYTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYlhk YW1hZ2Uuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkg PSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTEwODY0MDAsc2l6 ZT0xNTIwMCxibGtzaXplPTE1MzYwIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1Rf UkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkz NiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDIwNDgwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEs MHgwKSAgICAgICA9IDM0NDAzNzU4MDgwICgweDgwMjlmYjAwMCkKbW1hcCgweDgwMjlmYjAw MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQwMzc1ODA4MCAoMHg4MDI5ZmIwMDApCm1tYXAo MHg4MDI5ZmMwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMDAwKSA9IDM0NDAzNzYy MTc2ICgweDgwMjlmYzAwMCkKbW1hcCgweDgwMjlmZDAwMCw4MTkyLFBST1RfUkVBRHxQUk9U X1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MjAw MCkgPSAzNDQwMzc2NjI3MiAoMHg4MDI5ZmQwMDApCm1tYXAoMHg4MDI5ZmYwMDAsNDA5NixQ Uk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEs MHgwKSA9IDM0NDAzNzc0NDY0ICgweDgwMjlmZjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQw OTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3Iv bG9jYWwvbGliL2xpYlhmaXhlcy5zby4zIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5v ZGU9MTk3MjE3LHNpemU9MzQ2MzIsYmxrc2l6ZT0zNDgxNiB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwzMjc2OCxQUk9UX05PTkUs TUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQxMjA3Mjk2MCAoMHg4MDMxZTkwMDApCm1t YXAoMHg4MDMxZTkwMDAsODE5MixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1B UF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0MTIwNzI5NjAgKDB4ODAz MWU5MDAwKQptbWFwKDB4ODAzMWViMDAwLDEyMjg4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDIw MDApID0gMzQ0MTIwODExNTIgKDB4ODAzMWViMDAwKQptbWFwKDB4ODAzMWVlMDAwLDgxOTIs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHg1MDAwKSA9IDM0NDEyMDkzNDQwICgweDgwMzFlZTAwMCkKbW1hcCgweDgw MzFmMDAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfQU5PTiwtMSwweDApID0gMzQ0MTIxMDE2MzIgKDB4ODAzMWYwMDAwKQptdW5tYXAo MHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNs b3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvbGliWDExLXhjYi5zby4xIixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9 LXJ3eHIteHIteCAsaW5vZGU9MjI5NDQ5NyxzaXplPTE0NTY4LGJsa3NpemU9MTQ4NDggfSkg PSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAs MTYzODQsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQ0MTIxMDU3Mjgg KDB4ODAzMWYxMDAwKQptbWFwKDB4ODAzMWYxMDAwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0 NDEyMTA1NzI4ICgweDgwMzFmMTAwMCkKbW1hcCgweDgwMzFmMjAwMCw0MDk2LFBST1RfUkVB RHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZB VUxUX1JFQUQsMywweDEwMDApID0gMzQ0MTIxMDk4MjQgKDB4ODAzMWYyMDAwKQptbWFwKDB4 ODAzMWYzMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyMDAwKSA9IDM0NDEyMTEzOTIwICgweDgwMzFm MzAwMCkKbW1hcCgweDgwMzFmNDAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MzAwMCkgPSAzNDQxMjEx ODAxNiAoMHg4MDMxZjQwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAg ICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJ4 Y2ItZ2x4LnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDAp ID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT0xOTE3Mjksc2l6 ZT0xMTAxMTIsYmxrc2l6ZT0xMTA1OTIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1 OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTEwNTkyLFBST1RfTk9ORSxNQVBfR1VBUkQs LTEsMHgwKSAgICAgID0gMzQ0MjE3ODQ1NzYgKDB4ODAzYjJjMDAwKQptbWFwKDB4ODAzYjJj MDAwLDczNzI4LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQyMTc4NDU3NiAoMHg4MDNiMmMwMDApCm1t YXAoMHg4MDNiM2UwMDAsMjQ1NzYsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTIwMDApID0gMzQ0 MjE4NTgzMDQgKDB4ODAzYjNlMDAwKQptbWFwKDB4ODAzYjQ0MDAwLDEyMjg4LFBST1RfUkVB RHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MTgwMDApID0gMzQ0MjE4ODI4ODAgKDB4ODAzYjQ0MDAwKQptdW5tYXAoMHg4MDBlZTAw MDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3Blbigi L3Vzci9sb2NhbC9saWIvbGlieGNiLWRyaTIuc28uMCIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhy LXggLGlub2RlPTE5MTcyMCxzaXplPTI0MDE2LGJsa3NpemU9MjQwNjQgfSkgPSAwICgweDAp Cm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMjQ1NzYsUFJP VF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQ0MTIxMjIxMTIgKDB4ODAzMWY1 MDAwKQptbWFwKDB4ODAzMWY1MDAwLDEyMjg4LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBf RklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQxMjEyMjEx MiAoMHg4MDMxZjUwMDApCm1tYXAoMHg4MDMxZjgwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9F WEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHgzMDAwKSA9IDM0NDEyMTM0NDAwICgweDgwMzFmODAwMCkKbW1hcCgweDgwMzFmOTAw MCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4NDAwMCkgPSAzNDQxMjEzODQ5NiAoMHg4MDMxZjkwMDApCm11 bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0g MCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJYeGY4NnZtLnNvLjEiLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tcnd4ci14ci14ICxpbm9kZT0yMjczMjYsc2l6ZT0zMzUyMCxibGtzaXplPTMzNzky IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAo MHgwLDMyNzY4LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0NDIxODk1 MTY4ICgweDgwM2I0NzAwMCkKbW1hcCgweDgwM2I0NzAwMCw4MTkyLFBST1RfUkVBRCxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDQyMTg5NTE2OCAoMHg4MDNiNDcwMDApCm1tYXAoMHg4MDNiNDkwMDAsMTIyODgsUFJP VF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDQyMTkwMzM2MCAoMHg4MDNiNDkwMDApCm1t YXAoMHg4MDNiNGMwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDUwMDApID0gMzQ0MjE5MTU2NDggKDB4 ODAzYjRjMDAwKQptbWFwKDB4ODAzYjRlMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQyMTkyMzg0MCAo MHg4MDNiNGUwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAg ICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJkcm0uc28u MiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgPSAzICgweDMpCmZzdGF0 KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTEyODAxNjIsc2l6ZT04OTAwMCxibGtzaXpl PTg5MDg4IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFU RXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDAp Cm1tYXAoMHgwLDk0MjA4LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0 NDIxOTI3OTM2ICgweDgwM2I0ZjAwMCkKbW1hcCgweDgwM2I0ZjAwMCwyODY3MixQUk9UX1JF QUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQs MywweDApID0gMzQ0MjE5Mjc5MzYgKDB4ODAzYjRmMDAwKQptbWFwKDB4ODAzYjU2MDAwLDUz MjQ4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NP UkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDcwMDApID0gMzQ0MjE5NTY2MDggKDB4ODAzYjU2 MDAwKQptbWFwKDB4ODAzYjYzMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxNDAwMCkgPSAzNDQyMjAw OTg1NiAoMHg4MDNiNjMwMDApCm1tYXAoMHg4MDNiNjUwMDAsNDA5NixQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0NDIy MDE4MDQ4ICgweDgwM2I2NTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAg ICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3Zp cnR1YWxib3gvbGlicnQuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAyNTI1 MTQwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9j YWwvbGliL3ZpcnR1YWxib3gvbGlicnQuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAyNTI1MTQwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4o Ii9saWIvbGlicnQuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAyNTI1MTQw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xp YnJ0LnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMjUyNTE0MDApID0gMyAo MHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTI0Mzc4LHNpemU9MjMx MjAsYmxrc2l6ZT0yMzU1MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQs TUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4 ODAwZWUwMDAwKQptbWFwKDB4MCwzNjg2NCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkg ICAgICAgPSAzNDQyMjAyMjE0NCAoMHg4MDNiNjYwMDApCm1tYXAoMHg4MDNiNjYwMDAsMTIy ODgsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0NDIyMDIyMTQ0ICgweDgwM2I2NjAwMCkKbW1hcCgweDgw M2I2OTAwMCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyMDAwKSA9IDM0NDIyMDM0NDMy ICgweDgwM2I2OTAwMCkKbW1hcCgweDgwM2I2YzAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dS SVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4NDAwMCkg PSAzNDQyMjA0NjcyMCAoMHg4MDNiNmMwMDApCm1tYXAoMHg4MDNiNmQwMDAsODE5MixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JF QUQsMywweDQwMDApID0gMzQ0MjIwNTA4MTYgKDB4ODAzYjZkMDAwKQptdW5tYXAoMHg4MDBl ZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMp ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3Bl bigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJ4bWwyLnNvLjIiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGly ZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYnhtbDIuc28uMiIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGlieG1sMi5zby4yIixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRp cmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGlieG1sMi5zby4yIixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9y eScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYnhtbDIuc28uMiIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv cnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYnhtbDIuc28uMiIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hy LXhyLXggLGlub2RlPTk4MzUyOCxzaXplPTE2NzU1MjgsYmxrc2l6ZT0xMzEwNzIgfSkgPSAw ICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTY3 OTM2MCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgID0gMzQ0NDIyMDMxMzYgKDB4 ODA0ZWE1MDAwKQptbWFwKDB4ODA0ZWE1MDAwLDQ3OTIzMixQUk9UX1JFQUQsTUFQX1BSSVZB VEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0 NDIyMDMxMzYgKDB4ODA0ZWE1MDAwKQptbWFwKDB4ODA0ZjFhMDAwLDExNDY4ODAsUFJPVF9S RUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4NzUwMDApID0gMzQ0NDI2ODIzNjggKDB4ODA0ZjFhMDAwKQptbWFw KDB4ODA1MDMyMDAwLDM2ODY0LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1B UF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MThkMDAwKSA9IDM0NDQzODI5MjQ4ICgw eDgwNTAzMjAwMCkKbW1hcCgweDgwNTAzYjAwMCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDE5NjAwMCkg PSAzNDQ0Mzg2NjExMiAoMHg4MDUwM2IwMDApCm1tYXAoMHg4MDUwM2UwMDAsNDA5NixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgw KSA9IDM0NDQzODc4NDAwICgweDgwNTAzZTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYp ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9j YWwvbGliL3ZpcnR1YWxib3gvbGliY3VybC5zby40IixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJjdXJsLnNvLjQiLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUg b3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmN1cmwuc28uNCIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJl Y3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmN1cmwuc28uNCIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv cnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9saWJjdXJsLnNvLjQiLE9fUkRPTkxZfE9fQ0xP RVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGly ZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJjdXJsLnNvLjQiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9k ZT0tcnd4ci14ci14ICxpbm9kZT00OTIyNzMsc2l6ZT01NTQ4ODAsYmxrc2l6ZT0xMzEwNzIg fSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9Q UkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgw eDAsNTU3MDU2LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0MjIwNTkw MDggKDB4ODAzYjZmMDAwKQptbWFwKDB4ODAzYjZmMDAwLDE0MzM2MCxQUk9UX1JFQUQsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQ0MjIwNTkwMDggKDB4ODAzYjZmMDAwKQptbWFwKDB4ODAzYjkyMDAwLDM5NzMxMixQ Uk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHgyMzAwMCkgPSAzNDQyMjIwMjM2OCAoMHg4MDNiOTIwMDAp Cm1tYXAoMHg4MDNiZjMwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDg0MDAwKSA9IDM0NDIyNTk5Njgw ICgweDgwM2JmMzAwMCkKbW1hcCgweDgwM2JmNTAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dS SVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4ODYwMDAp ID0gMzQ0MjI2MDc4NzIgKDB4ODAzYmY1MDAwKQptbWFwKDB4ODAzYmY2MDAwLDQwOTYsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4 MCkgPSAzNDQyMjYxMTk2OCAoMHg4MDNiZjYwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2 KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xv Y2FsL2xpYi92aXJ0dWFsYm94L2xpYnNzbC5zby4xMTEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYnNzbC5zby4xMTEiLE9fUkRP TkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYnNzbC5zby4xMTEiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3Ig ZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJzc2wuc28uMTExIixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9 LXItLXItLXItLSAsaW5vZGU9MTEyOTU5MyxzaXplPTYxMDA1NixibGtzaXplPTEzMTA3MiB9 KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BS RUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4 MCw2MjI1OTIsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgPSAzNDQzMzkzNzQw OCAoMHg4MDQ2YzMwMDApCm1tYXAoMHg4MDQ2YzMwMDAsMjMzNDcyLFBST1RfUkVBRCxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDQzMzkzNzQwOCAoMHg4MDQ2YzMwMDApCm1tYXAoMHg4MDQ2ZmMwMDAsMzI3NjgwLFBS T1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDM4MDAwKSA9IDM0NDM0MTcwODgwICgweDgwNDZmYzAwMCkK bW1hcCgweDgwNDc0YzAwMCwzNjg2NCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDg3MDAwKSA9IDM0NDM0NDk4NTYw ICgweDgwNDc0YzAwMCkKbW1hcCgweDgwNDc1NTAwMCwyNDU3NixQUk9UX1JFQUR8UFJPVF9X UklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDhmMDAw KSA9IDM0NDM0NTM1NDI0ICgweDgwNDc1NTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYp ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9j YWwvbGliL3ZpcnR1YWxib3gvbGliY3J5cHRvLnNvLjExMSIsT19SRE9OTFl8T19DTE9FWEVD fE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv cnknCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliY3J5cHRvLnNvLjExMSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliY3J5cHRvLnNvLjExMSIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0 KDMseyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTExMjg0MTAsc2l6ZT0yOTE1MTY4LGJsa3Np emU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJ VkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAw MDApCm1tYXAoMHgwLDI5NDA5MjgsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICA9 IDM0NDQzODgyNDk2ICgweDgwNTAzZjAwMCkKbW1hcCgweDgwNTAzZjAwMCwxMTM4Njg4LFBS T1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4MCkgPSAzNDQ0Mzg4MjQ5NiAoMHg4MDUwM2YwMDApCm1tYXAoMHg4MDUxNTYw MDAsMTU4MTA1NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMTYwMDApID0gMzQ0NDUwMjUyODAg KDB4ODA1MTU2MDAwKQptbWFwKDB4ODA1MmQ4MDAwLDE3NjEyOCxQUk9UX1JFQUR8UFJPVF9X UklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDI5NzAw MCkgPSAzNDQ0NjYwNjMzNiAoMHg4MDUyZDgwMDApCm1tYXAoMHg4MDUzMDMwMDAsMjg2NzIs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgyYzEwMDApID0gMzQ0NDY3ODI0NjQgKDB4ODA1MzAzMDAwKQptbWFwKDB4 ODA1MzBhMDAwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfQU5PTiwtMSwweDApID0gMzQ0NDY4MTExMzYgKDB4ODA1MzBhMDAwKQptdW5t YXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDAp CmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAg KDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJYcmVuZGVyLnNvLjEi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBz dWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYlhyZW5kZXIuc28uMSIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYlhyZW5kZXIuc28uMSIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9saWJYcmVuZGVyLnNv LjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdO byBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJYcmVu ZGVyLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0g MyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT0yNTg4MDMsc2l6ZT01 MjQ2NCxibGtzaXplPTUyNzM2IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVB RCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAo MHg4MDBlZTAwMDApCm1tYXAoMHgwLDQ5MTUyLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgw KSAgICAgICA9IDM0NDM0NTYwMDAwICgweDgwNDc1YjAwMCkKbW1hcCgweDgwNDc1YjAwMCwx MjI4OCxQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BS RUZBVUxUX1JFQUQsMywweDApID0gMzQ0MzQ1NjAwMDAgKDB4ODA0NzViMDAwKQptbWFwKDB4 ODA0NzVlMDAwLDI0NTc2LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDMwMDApID0gMzQ0MzQ1NzIy ODggKDB4ODA0NzVlMDAwKQptbWFwKDB4ODA0NzY0MDAwLDgxOTIsUFJPVF9SRUFEfFBST1Rf V1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg5MDAw KSA9IDM0NDM0NTk2ODY0ICgweDgwNDc2NDAwMCkKbW1hcCgweDgwNDc2NjAwMCw0MDk2LFBS T1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSww eDApID0gMzQ0MzQ2MDUwNTYgKDB4ODA0NzY2MDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5 NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9s b2NhbC9saWIvdmlydHVhbGJveC9saWJrdm0uc28uNyIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3Rvcnkn Cm9wZW4oIi9saWIvbGlia3ZtLnNvLjciLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSww MTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9k ZT0xMTIzOTg4LHNpemU9NzI1NTIsYmxrc2l6ZT03MjcwNCB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw4MTkyMCxQUk9UX05PTkUs TUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQzNDYwOTE1MiAoMHg4MDQ3NjcwMDApCm1t YXAoMHg4MDQ3NjcwMDAsMjQ1NzYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDM0NjA5MTUyICgweDgw NDc2NzAwMCkKbW1hcCgweDgwNDc2ZDAwMCw0OTE1MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1 MDAwKSA9IDM0NDM0NjMzNzI4ICgweDgwNDc2ZDAwMCkKbW1hcCgweDgwNDc3OTAwMCw0MDk2 LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MTAwMDApID0gMzQ0MzQ2ODI4ODAgKDB4ODA0Nzc5MDAwKQptbWFwKDB4 ODA0NzdhMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMDAwMCkgPSAzNDQzNDY4Njk3NiAoMHg4MDQ3 N2EwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAg ICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYnBy b2NzdGF0LnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTIzMjA0NDMwMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYnByb2Nz dGF0LnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTIzMjA0NDMwMDApIEVS UiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJwcm9j c3RhdC5zby4xIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDEyMzIwNDQzMDAwKSA9 IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEyNDEzNixzaXpl PTQ1MDI0LGJsa3NpemU9NDUwNTYgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2 ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsNTczNDQsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSww eDApICAgICAgID0gMzQ0MzQ2OTEwNzIgKDB4ODA0NzdiMDAwKQptbWFwKDB4ODA0NzdiMDAw LDE2Mzg0LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQzNDY5MTA3MiAoMHg4MDQ3N2IwMDApCm1tYXAo MHg4MDQ3N2YwMDAsMjg2NzIsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBf RklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MzAwMCkgPSAzNDQzNDcw NzQ1NiAoMHg4MDQ3N2YwMDApCm1tYXAoMHg4MDQ3ODYwMDAsODE5MixQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDkw MDApID0gMzQ0MzQ3MzYxMjggKDB4ODA0Nzg2MDAwKQptbWFwKDB4ODA0Nzg4MDAwLDQwOTYs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHhhMDAwKSA9IDM0NDM0NzQ0MzIwICgweDgwNDc4ODAwMCkKbXVubWFwKDB4 ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9z ZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDAp Cm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliZXhlY2luZm8uc28uMSIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliZXhlY2luZm8uc28uMSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmV4ZWNpbmZvLnNvLjEiLE9fUkRP TkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgz LHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTIzODYxLHNpemU9MTIyOTYsYmxrc2l6ZT0x MjgwMCB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8 TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQpt bWFwKDB4MCwyNDU3NixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQy MjYxNjA2NCAoMHg4MDNiZjcwMDApCm1tYXAoMHg4MDNiZjcwMDAsODE5MixQUk9UX1JFQUQs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMyww eDApID0gMzQ0MjI2MTYwNjQgKDB4ODAzYmY3MDAwKQptbWFwKDB4ODAzYmY5MDAwLDgxOTIs UFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MTAwMCkgPSAzNDQyMjYyNDI1NiAoMHg4MDNiZjkwMDAp Cm1tYXAoMHg4MDNiZmIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDIwMDApID0gMzQ0MjI2MzI0NDgg KDB4ODAzYmZiMDAwKQptbWFwKDB4ODAzYmZjMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyMDAwKSA9 IDM0NDIyNjM2NTQ0ICgweDgwM2JmYzAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwv bGliL3ZpcnR1YWxib3gvbGliaWN1aTE4bi5zby42NiIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi9saWIvbGliaWN1aTE4bi5zby42NiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91 c3IvbGliL2xpYmljdWkxOG4uc28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSww MzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNy L2xpYi9jb21wYXQvbGliaWN1aTE4bi5zby42NiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4o Ii91c3IvbG9jYWwvbGliL2xpYmljdWkxOG4uc28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci14ci14ci14 ICxpbm9kZT0xMTgxMzMyLHNpemU9MzI1MjMwNCxibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4 MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JF QUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwzMjY4NjA4 LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAzNDQ0NjgyMzQyNCAoMHg4MDUz MGQwMDApCm1tYXAoMHg4MDUzMGQwMDAsMTQ5MDk0NCxQUk9UX1JFQUQsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0NDY4 MjM0MjQgKDB4ODA1MzBkMDAwKQptbWFwKDB4ODA1NDc5MDAwLDE2OTk4NDAsUFJPVF9SRUFE fFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MTZiMDAwKSA9IDM0NDQ4MzE0MzY4ICgweDgwNTQ3OTAwMCkKbW1hcCgw eDgwNTYxODAwMCw2NTUzNixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBf RklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDMwOTAwMCkgPSAzNDQ1MDAxNDIwOCAoMHg4 MDU2MTgwMDApCm1tYXAoMHg4MDU2MjgwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxN QVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDMxODAwMCkgPSAz NDQ1MDA3OTc0NCAoMHg4MDU2MjgwMDApCm1tYXAoMHg4MDU2MmEwMDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX0FOT04sLTEsMHgwKSA9 IDM0NDUwMDg3OTM2ICgweDgwNTYyYTAwMCkKbW1hcCgweDAsMTM1MTY4LFBST1RfUkVBRHxQ Uk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQzNDc0ODQxNiAo MHg4MDQ3ODkwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAg ICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94 L2xpYmljdXVjLnNvLjY2IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2 MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJp Y3V1Yy5zby42NiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkg RVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmlj dXVjLnNvLjY2IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0 L2xpYmljdXVjLnNvLjY2IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2 MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2Nh bC9saWIvbGliaWN1dWMuc28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQy MzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci14ci14ci14ICxpbm9kZT0x MTgwOTc3LHNpemU9MjA2ODE5MixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwyMDg0ODY0LFBST1RfTk9O RSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAzNDQ1MDA5MjAzMiAoMHg4MDU2MmIwMDApCm1t YXAoMHg4MDU2MmIwMDAsOTYyNTYwLFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1MDA5MjAzMiAoMHg4 MDU2MmIwMDApCm1tYXAoMHg4MDU3MTYwMDAsMTAzNjI4OCxQUk9UX1JFQUR8UFJPVF9FWEVD LE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMs MHhlYTAwMCkgPSAzNDQ1MTA1NDU5MiAoMHg4MDU3MTYwMDApCm1tYXAoMHg4MDU4MTMwMDAs Nzc4MjQsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9Q UkVGQVVMVF9SRUFELDMsMHgxZTYwMDApID0gMzQ0NTIwOTA4ODAgKDB4ODA1ODEzMDAwKQpt bWFwKDB4ODA1ODI2MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxZjgwMDApID0gMzQ0NTIxNjg3MDQg KDB4ODA1ODI2MDAwKQptbWFwKDB4ODA1ODI3MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQ1MjE3Mjgw MCAoMHg4MDU4MjcwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAg ICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFs Ym94L2xpYnBjcmUyLTE2LnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIy NjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xp YnBjcmUyLTE2LnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYwMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJw Y3JlMi0xNi5zby4wIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0 L2xpYnBjcmUyLTE2LnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMzIyNjYw MDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2Fs L2xpYi9saWJwY3JlMi0xNi5zby4wIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMy MjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTIw MTg4OCxzaXplPTY2ODk1MixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAs NDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0g MzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw2Nzk5MzYsUFJPVF9OT05FLE1B UF9HVUFSRCwtMSwweDApICAgICAgPSAzNDQ1MjE3Njg5NiAoMHg4MDU4MjgwMDApCm1tYXAo MHg4MDU4MjgwMDAsMTYzODQwLFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQ X05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1MjE3Njg5NiAoMHg4MDU4 MjgwMDApCm1tYXAoMHg4MDU4NTAwMDAsNTA3OTA0LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDI3 MDAwKSA9IDM0NDUyMzQwNzM2ICgweDgwNTg1MDAwMCkKbW1hcCgweDgwNThjYzAwMCw0MDk2 LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4YTIwMDApID0gMzQ0NTI4NDg2NDAgKDB4ODA1OGNjMDAwKQptbWFwKDB4 ODA1OGNkMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhhMjAwMCkgPSAzNDQ1Mjg1MjczNiAoMHg4MDU4 Y2QwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAg ICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmds aWItMi4wLnNvLjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMy ICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmdsaWItMi4wLnNv LjAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNo IGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJnbGliLTIuMC5zby4wIixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxl IG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYmdsaWItMi4wLnNvLjAi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZp bGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xpYi9saWJnbGliLTIuMC5zby4w IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSA9IDMgKDB4MykKZnN0YXQo Myx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9NTkxMzkxLHNpemU9MTE3Njg4OCxibGtzaXpl PTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZB VEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAw KQptbWFwKDB4MCwxMTc5NjQ4LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgPSAz NDQ1Mjg1NjgzMiAoMHg4MDU4Y2UwMDApCm1tYXAoMHg4MDU4Y2UwMDAsNjIyNTkyLFBST1Rf UkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVB RCwzLDB4MCkgPSAzNDQ1Mjg1NjgzMiAoMHg4MDU4Y2UwMDApCm1tYXAoMHg4MDU5NjYwMDAs NTQ0NzY4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9O T0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDk4MDAwKSA9IDM0NDUzNDc5NDI0ICgweDgw NTk2NjAwMCkKbW1hcCgweDgwNTllYjAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTFkMDAwKSA9IDM0 NDU0MDI0MTkyICgweDgwNTllYjAwMCkKbW1hcCgweDgwNTllYzAwMCw0MDk2LFBST1RfUkVB RHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MTFlMDAwKSA9IDM0NDU0MDI4Mjg4ICgweDgwNTllYzAwMCkKbW1hcCgweDgwNTllZDAw MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf QU5PTiwtMSwweDApID0gMzQ0NTQwMzIzODQgKDB4ODA1OWVkMDAwKQptdW5tYXAoMHg4MDBl ZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMp ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3Bl bigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJjKysuc28uMSIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL2xpYi9saWJjKysuc28uMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAw KSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGli YysrLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgPSAzICgweDMpCmZz dGF0KDMseyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTExMjI1MDAsc2l6ZT04MjAzNjgsYmxr c2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9Q UklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVl MDAwMCkKbW1hcCgweDAsODM5NjgwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAg ID0gMzQ0NTQwMzY0ODAgKDB4ODA1OWVlMDAwKQptbWFwKDB4ODA1OWVlMDAwLDM3NjgzMixQ Uk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxU X1JFQUQsMywweDApID0gMzQ0NTQwMzY0ODAgKDB4ODA1OWVlMDAwKQptbWFwKDB4ODA1YTRh MDAwLDQyMTg4OCxQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg1YjAwMCkgPSAzNDQ1NDQxMzMxMiAo MHg4MDVhNGEwMDApCm1tYXAoMHg4MDVhYjEwMDAsMjQ1NzYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhjMTAwMCkg PSAzNDQ1NDgzNTIwMCAoMHg4MDVhYjEwMDApCm1tYXAoMHg4MDVhYjcwMDAsODE5MixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JF QUQsMywweGM2MDAwKSA9IDM0NDU0ODU5Nzc2ICgweDgwNWFiNzAwMCkKbW1hcCgweDgwNWFi OTAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfQU5PTiwtMSwweDApID0gMzQ0NTQ4Njc5NjggKDB4ODA1YWI5MDAwKQptdW5tYXAoMHg4 MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3Nl KDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkK b3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJjeHhydC5zby4xIixPX1JET05M WXxPX0NMT0VYRUN8T19WRVJJRlksMDQxNDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRp cmVjdG9yeScKb3BlbigiL2xpYi9saWJjeHhydC5zby4xIixPX1JET05MWXxPX0NMT0VYRUN8 T19WRVJJRlksMDQxNDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAs aW5vZGU9MTEyMjUzNCxzaXplPTExMzIxNixibGtzaXplPTExMzY2NCB9KSA9IDAgKDB4MCkK bW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQs MywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwxNDMzNjAsUFJP VF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgPSAzNDQzNDg4MzU4NCAoMHg4MDQ3YWEw MDApCm1tYXAoMHg4MDQ3YWEwMDAsNTMyNDgsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9G SVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDM0ODgzNTg0 ICgweDgwNDdhYTAwMCkKbW1hcCgweDgwNDdiNzAwMCw1NzM0NCxQUk9UX1JFQUR8UFJPVF9F WEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHhjMDAwKSA9IDM0NDM0OTM2ODMyICgweDgwNDdiNzAwMCkKbW1hcCgweDgwNDdjNTAw MCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MTkwMDApID0gMzQ0MzQ5OTQxNzYgKDB4ODA0N2M1MDAwKQpt bWFwKDB4ODA0N2M3MDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxYTAwMCkgPSAzNDQzNTAwMjM2OCAo MHg4MDQ3YzcwMDApCm1tYXAoMHg4MDQ3YzgwMDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQzNTAwNjQ2 NCAoMHg4MDQ3YzgwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAg ICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi9xdDUvbGli cG5nMTYuc28uMTYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTA3MjM0NTAwMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYnBuZzE2 LnNvLjE2IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDEwNzIzNDUwMDAwKSBFUlIj MiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGlicG5nMTYu c28uMTYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTA3MjM0NTAwMDApIEVSUiMy ICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9jb21wYXQvbGli cG5nMTYuc28uMTYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTA3MjM0NTAwMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xvY2FsL2xp Yi9saWJwbmcxNi5zby4xNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxMDcyMzQ1 MDAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTE5OTQz OCxzaXplPTI1NzExMixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5 NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQz NzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwyNTgwNDgsUFJPVF9OT05FLE1BUF9H VUFSRCwtMSwweDApICAgICAgPSAzNDQ1NDg3NjE2MCAoMHg4MDVhYmIwMDApCm1tYXAoMHg4 MDVhYmIwMDAsNjk2MzIsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9D T1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDU0ODc2MTYwICgweDgwNWFiYjAw MCkKbW1hcCgweDgwNWFjYzAwMCwxODAyMjQsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJ VkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTEwMDAp ID0gMzQ0NTQ5NDU3OTIgKDB4ODA1YWNjMDAwKQptbWFwKDB4ODA1YWY4MDAwLDgxOTIsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9S RUFELDMsMHgzZDAwMCkgPSAzNDQ1NTEyNjAxNiAoMHg4MDVhZjgwMDApCm11bm1hcCgweDgw MGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2Uo MykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpv cGVuKCIvdXNyL2xvY2FsL2xpYi9xdDUvbGliaGFyZmJ1enouc28uMCIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL2xpYi9saWJoYXJmYnV6ei5zby4wIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJ RlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xp Yi9saWJoYXJmYnV6ei5zby4wIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVS UiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9jb21wYXQv bGliaGFyZmJ1enouc28uMCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIj MiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9saWIvbGli aGFyZmJ1enouc28uMCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSA9IDMgKDB4 MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9ODA1OTUyLHNpemU9OTI3Njgw LGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxN QVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4 MDBlZTAwMDApCm1tYXAoMHgwLDkyOTc5MixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkg ICAgICA9IDM0NDU1MTM0MjA4ICgweDgwNWFmYTAwMCkKbW1hcCgweDgwNWFmYTAwMCwyNDE2 NjQsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVG QVVMVF9SRUFELDMsMHgwKSA9IDM0NDU1MTM0MjA4ICgweDgwNWFmYTAwMCkKbW1hcCgweDgw NWIzNTAwMCw2NzU4NDAsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4M2IwMDApID0gMzQ0NTUzNzU4 NzIgKDB4ODA1YjM1MDAwKQptbWFwKDB4ODA1YmRhMDAwLDQwOTYsUFJPVF9SRUFEfFBST1Rf V1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhlMDAw MCkgPSAzNDQ1NjA1MTcxMiAoMHg4MDViZGEwMDApCm1tYXAoMHg4MDViZGIwMDAsNDA5NixQ Uk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxU X1JFQUQsMywweGUxMDAwKSA9IDM0NDU2MDU1ODA4ICgweDgwNWJkYjAwMCkKbW1hcCgweDgw NWJkYzAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfQU5PTiwtMSwweDApID0gMzQ0NTYwNTk5MDQgKDB4ODA1YmRjMDAwKQptdW5tYXAo MHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNs b3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJsem1hLnNvLjUiLE9fUkRP TkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJl Y3RvcnknCm9wZW4oIi9saWIvbGlibHptYS5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNy L2xpYi9saWJsem1hLnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgPSAz ICgweDMpCmZzdGF0KDMseyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTExMjM5OTMsc2l6ZT0x NzI0NzIsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2 ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTg0MzIwLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEs MHgwKSAgICAgID0gMzQ0MzUwMjY5NDQgKDB4ODA0N2NkMDAwKQptbWFwKDB4ODA0N2NkMDAw LDYxNDQwLFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQzNTAyNjk0NCAoMHg4MDQ3Y2QwMDApCm1tYXAo MHg4MDQ3ZGMwMDAsMTEwNTkyLFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweGUwMDApID0gMzQ0MzUw ODgzODQgKDB4ODA0N2RjMDAwKQptbWFwKDB4ODA0N2Y3MDAwLDgxOTIsUFJPVF9SRUFEfFBS T1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgy ODAwMCkgPSAzNDQzNTE5ODk3NiAoMHg4MDQ3ZjcwMDApCm1tYXAoMHg4MDQ3ZjkwMDAsNDA5 NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZB VUxUX1JFQUQsMywweDI5MDAwKSA9IDM0NDM1MjA3MTY4ICgweDgwNDdmOTAwMCkKbXVubWFw KDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpj bG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGlibmdodHRwMi5zby4xNCIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1 Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGlibmdodHRwMi5zby4xNCIsT19S RE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYm5naHR0cDIuc28uMTQiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNo IGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9jb21wYXQvbGlibmdodHRwMi5z by4xNCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIg J05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYm5n aHR0cDIuc28uMTQiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDAp ID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnd4ci14ci14ICxpbm9kZT03MjE5NDksc2l6 ZT0xODI5ODQsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1 OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTg0MzIwLFBST1RfTk9ORSxNQVBfR1VBUkQs LTEsMHgwKSAgICAgID0gMzQ0NTYwNjQwMDAgKDB4ODA1YmRkMDAwKQptbWFwKDB4ODA1YmRk MDAwLDczNzI4LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1NjA2NDAwMCAoMHg4MDViZGQwMDApCm1t YXAoMHg4MDViZWYwMDAsOTQyMDgsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTIwMDApID0gMzQ0 NTYxMzc3MjggKDB4ODA1YmVmMDAwKQptbWFwKDB4ODA1YzA2MDAwLDEyMjg4LFBST1RfUkVB RHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwz LDB4MjkwMDApID0gMzQ0NTYyMzE5MzYgKDB4ODA1YzA2MDAwKQptbWFwKDB4ODA1YzA5MDAw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9Q UkVGQVVMVF9SRUFELDMsMHgyYzAwMCkgPSAzNDQ1NjI0NDIyNCAoMHg4MDVjMDkwMDApCm11 bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4 MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0g MCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmhlaW1udGxtLnNv LjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAn Tm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJoZWltbnRsbS5zby4x MSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05v IHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmhlaW1udGxtLnNv LjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSA9IDMgKDB4 MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEyNjY0MyxzaXplPTI3Njg4 LGJsa3NpemU9MjgxNjAgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1B UF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgw MGVlMDAwMCkKbW1hcCgweDAsNDA5NjAsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAg ICAgID0gMzQ0NTYyNDgzMjAgKDB4ODA1YzBhMDAwKQptbWFwKDB4ODA1YzBhMDAwLDEyMjg4 LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MCkgPSAzNDQ1NjI0ODMyMCAoMHg4MDVjMGEwMDApCm1tYXAoMHg4MDVj MGQwMDAsMTYzODQsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDQ1NjI2MDYwOCAo MHg4MDVjMGQwMDApCm1tYXAoMHg4MDVjMTEwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDUwMDApID0g MzQ0NTYyNzY5OTIgKDB4ODA1YzExMDAwKQptbWFwKDB4ODA1YzEyMDAwLDgxOTIsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFE LDMsMHg1MDAwKSA9IDM0NDU2MjgxMDg4ICgweDgwNWMxMjAwMCkKbXVubWFwKDB4ODAwZWUw MDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4o Ii91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGliaHg1MDkuc28uMTEiLE9fUkRPTkxZfE9f Q0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3Ig ZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmh4NTA5LnNvLjExIixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVj dG9yeScKb3BlbigiL3Vzci9saWIvbGliaHg1MDkuc28uMTEiLE9fUkRPTkxZfE9fQ0xPRVhF Q3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0t ci0tci0tICxpbm9kZT0xMTI2OTIwLHNpemU9MzIwMjAwLGJsa3NpemU9MTMxMDcyIH0pID0g MCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDMz MTc3NixQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICA9IDM0NDU2Mjg5MjgwICgw eDgwNWMxNDAwMCkKbW1hcCgweDgwNWMxNDAwMCwxMzUxNjgsUFJPVF9SRUFELE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0 NDU2Mjg5MjgwICgweDgwNWMxNDAwMCkKbW1hcCgweDgwNWMzNTAwMCwxNzYxMjgsUFJPVF9S RUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJF RkFVTFRfUkVBRCwzLDB4MjAwMDApID0gMzQ0NTY0MjQ0NDggKDB4ODA1YzM1MDAwKQptbWFw KDB4ODA1YzYwMDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg0YTAwMCkgPSAzNDQ1NjYwMDU3NiAoMHg4 MDVjNjAwMDApCm1tYXAoMHg4MDVjNjIwMDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg0YjAwMCkgPSAz NDQ1NjYwODc2OCAoMHg4MDVjNjIwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAg ICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xp Yi92aXJ0dWFsYm94L2xpYmNvbV9lcnIuc28uNSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9w ZW4oIi9saWIvbGliY29tX2Vyci5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Blbigi L3Vzci9saWIvbGliY29tX2Vyci5zby41IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDE0MjMyMjY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5v ZGU9MTEyNTQwOCxzaXplPTgzNjgsYmxrc2l6ZT04NzA0IH0pID0gMCAoMHgwKQptbWFwKDB4 MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkg PSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDIwNDgwLFBST1RfTk9ORSxN QVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0NDEyMTQ2Njg4ICgweDgwMzFmYjAwMCkKbW1h cCgweDgwMzFmYjAwMCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQ X05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQxMjE0NjY4OCAoMHg4MDMx ZmIwMDApCm1tYXAoMHg4MDMxZmMwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9 IDM0NDEyMTUwNzg0ICgweDgwMzFmYzAwMCkKbW1hcCgweDgwMzFmZTAwMCw0MDk2LFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVB RCwzLDB4MTAwMCkgPSAzNDQxMjE1ODk3NiAoMHg4MDMxZmUwMDApCm1tYXAoMHg4MDMxZmYw MDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDEwMDApID0gMzQ0MTIxNjMwNzIgKDB4ODAzMWZmMDAwKQpt dW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9 IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJhc24xLnNvLjEx IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8g c3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJhc24xLnNvLjExIixPX1JE T05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGliYXNuMS5zby4xMSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMs eyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTExMjY0Mzgsc2l6ZT02Njk0ODgsYmxrc2l6ZT0x MzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRF fE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkK bW1hcCgweDAsNjc5OTM2LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0 NTY2MjEwNTYgKDB4ODA1YzY1MDAwKQptbWFwKDB4ODA1YzY1MDAwLDIwMDcwNCxQUk9UX1JF QUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQs MywweDApID0gMzQ0NTY2MjEwNTYgKDB4ODA1YzY1MDAwKQptbWFwKDB4ODA1Yzk2MDAwLDQ1 ODc1MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9D T1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgzMDAwMCkgPSAzNDQ1NjgyMTc2MCAoMHg4MDVj OTYwMDApCm1tYXAoMHg4MDVkMDYwMDAsODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDlmMDAwKSA9IDM0NDU3 MjgwNTEyICgweDgwNWQwNjAwMCkKbW1hcCgweDgwNWQwODAwMCwxMjI4OCxQUk9UX1JFQUR8 UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMyww eGEwMDAwKSA9IDM0NDU3Mjg4NzA0ICgweDgwNWQwODAwMCkKbXVubWFwKDB4ODAwZWUwMDAw LDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91 c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGlid2luZC5zby4xMSIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL2xpYi9saWJ3aW5kLnNvLjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDAp IEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJ3 aW5kLnNvLjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApID0gMyAoMHgzKQpm c3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTI4MzEwLHNpemU9MTY0MjE2LGJs a3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBf UFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBl ZTAwMDApCm1tYXAoMHgwLDE3NjEyOCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAg ICA9IDM0NDU3MzAwOTkyICgweDgwNWQwYjAwMCkKbW1hcCgweDgwNWQwYjAwMCwxNTU2NDgs UFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgwKSA9IDM0NDU3MzAwOTkyICgweDgwNWQwYjAwMCkKbW1hcCgweDgwNWQz MTAwMCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgyNTAwMCkgPSAzNDQ1NzQ1NjY0MCAo MHg4MDVkMzEwMDApCm1tYXAoMHg4MDVkMzQwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDI3MDAwKSA9 IDM0NDU3NDY4OTI4ICgweDgwNWQzNDAwMCkKbW1hcCgweDgwNWQzNTAwMCw0MDk2LFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVB RCwzLDB4MjcwMDApID0gMzQ0NTc0NzMwMjQgKDB4ODA1ZDM1MDAwKQptdW5tYXAoMHg4MDBl ZTAwMDAsNDA5NikgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMp ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3Bl bigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJveC9saWJoZWltYmFzZS5zby4xMSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliaGVpbWJhc2Uuc28uMTEiLE9fUkRPTkxZ fE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUg b3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9saWJoZWltYmFzZS5zby4xMSIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMs eyBtb2RlPS1yLS1yLS1yLS0gLGlub2RlPTExMjgzMTksc2l6ZT0xNjYwOCxibGtzaXplPTE2 ODk2IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1t YXAoMHgwLDI4NjcyLFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0NDU3 NDc3MTIwICgweDgwNWQzNjAwMCkKbW1hcCgweDgwNWQzNjAwMCw4MTkyLFBST1RfUkVBRCxN QVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4 MCkgPSAzNDQ1NzQ3NzEyMCAoMHg4MDVkMzYwMDApCm1tYXAoMHg4MDVkMzgwMDAsMTIyODgs UFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MTAwMCkgPSAzNDQ1NzQ4NTMxMiAoMHg4MDVkMzgwMDAp Cm1tYXAoMHg4MDVkM2IwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDMwMDApID0gMzQ0NTc0OTc2MDAg KDB4ODA1ZDNiMDAwKQptbWFwKDB4ODA1ZDNjMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgzMDAwKSA9 IDM0NDU3NTAxNjk2ICgweDgwNWQzYzAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwv bGliL3ZpcnR1YWxib3gvbGlicm9rZW4uc28uMTEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZF UklGWSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvbGliL2xpYnJva2VuLnNvLjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Blbigi L3Vzci9saWIvbGlicm9rZW4uc28uMTEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSww MTQyMzIyNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9k ZT0xMTI3ODEzLHNpemU9NzgyODAsYmxrc2l6ZT03ODMzNiB9KSA9IDAgKDB4MCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw5MDExMixQUk9UX05PTkUs TUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQ1NzUwNTc5MiAoMHg4MDVkM2QwMDApCm1t YXAoMHg4MDVkM2QwMDAsMzI3NjgsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxN QVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDU3NTA1NzkyICgweDgw NWQzZDAwMCkKbW1hcCgweDgwNWQ0NTAwMCw0NTA1NixQUk9UX1JFQUR8UFJPVF9FWEVDLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHg3 MDAwKSA9IDM0NDU3NTM4NTYwICgweDgwNWQ0NTAwMCkKbW1hcCgweDgwNWQ1MDAwMCw4MTky LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFV TFRfUkVBRCwzLDB4MTEwMDApID0gMzQ0NTc1ODM2MTYgKDB4ODA1ZDUwMDAwKQptbWFwKDB4 ODA1ZDUyMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJ WEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMjAwMCkgPSAzNDQ1NzU5MTgwOCAoMHg4MDVk NTIwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAg ICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmNy eXB0LnNvLjUiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdO byBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmNyeXB0LnNvLjUiLE9f UkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwNjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsg bW9kZT0tci0tci0tci0tICxpbm9kZT0xMTIzNzI4LHNpemU9NTM2NDAsYmxrc2l6ZT01Mzc2 MCB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFw KDB4MCwxMzUxNjgsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgPSAzNDQ1NzU5 NTkwNCAoMHg4MDVkNTMwMDApCm1tYXAoMHg4MDVkNTMwMDAsMTYzODQsUFJPVF9SRUFELE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgw KSA9IDM0NDU3NTk1OTA0ICgweDgwNWQ1MzAwMCkKbW1hcCgweDgwNWQ1NzAwMCwzNjg2NCxQ Uk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHgzMDAwKSA9IDM0NDU3NjEyMjg4ICgweDgwNWQ1NzAwMCkK bW1hcCgweDgwNWQ2MDAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4YjAwMCkgPSAzNDQ1NzY0OTE1MiAo MHg4MDVkNjAwMDApCm1tYXAoMHg4MDVkNjIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweGMwMDApID0g MzQ0NTc2NTczNDQgKDB4ODA1ZDYyMDAwKQptbWFwKDB4ODA1ZDYzMDAwLDY5NjMyLFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSwweDAp ID0gMzQ0NTc2NjE0NDAgKDB4ODA1ZDYzMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5Nikg ICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2Nh bC9saWIvdmlydHVhbGJveC9saWJrcmI1LnNvLjExIixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScK b3BlbigiL2xpYi9saWJrcmI1LnNvLjExIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Blbigi L3Vzci9saWIvbGlia3JiNS5zby4xMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAx NDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yLS1yLS1yLS0gLGlub2Rl PTExMjcyMTUsc2l6ZT01MTk1NjAsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAo MHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgw KSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsNTMyNDgwLFBST1RfTk9O RSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0NTc3MzEwNzIgKDB4ODA1ZDc0MDAwKQpt bWFwKDB4ODA1ZDc0MDAwLDIxMjk5MixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0NTc3MzEwNzIgKDB4 ODA1ZDc0MDAwKQptbWFwKDB4ODA1ZGE4MDAwLDI5MDgxNixQUk9UX1JFQUR8UFJPVF9FWEVD LE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMs MHgzMzAwMCkgPSAzNDQ1Nzk0NDA2NCAoMHg4MDVkYTgwMDApCm1tYXAoMHg4MDVkZWYwMDAs ODE5MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BS RUZBVUxUX1JFQUQsMywweDc5MDAwKSA9IDM0NDU4MjM0ODgwICgweDgwNWRlZjAwMCkKbW1h cCgweDgwNWRmMTAwMCwyMDQ4MCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDdhMDAwKSA9IDM0NDU4MjQzMDcyICgw eDgwNWRmMTAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAg ICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gv bGliZ3NzYXBpLnNvLjEwIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMy ICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmdzc2FwaS5zby4x MCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxl IG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGliZ3NzYXBpLnNvLjEwIixPX1JET05M WXxPX0NMT0VYRUN8T19WRVJJRlksMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tci0t ci0tci0tICxpbm9kZT0xMTI1MTE1LHNpemU9NDA2ODAsYmxrc2l6ZT00MDk2MCB9KSA9IDAg KDB4MCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxU X1JFQUQsMywweDApID0gMzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw1MzI0 OCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQ1ODI2MzU1MiAoMHg4 MDVkZjYwMDApCm1tYXAoMHg4MDVkZjYwMDAsMTYzODQsUFJPVF9SRUFELE1BUF9QUklWQVRF fE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDU4 MjYzNTUyICgweDgwNWRmNjAwMCkKbW1hcCgweDgwNWRmYTAwMCwyNDU3NixQUk9UX1JFQUR8 UFJPVF9FWEVDLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgzMDAwKSA9IDM0NDU4Mjc5OTM2ICgweDgwNWRmYTAwMCkKbW1hcCgweDgw NWUwMDAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhF RHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4ODAwMCkgPSAzNDQ1ODMwNDUxMiAoMHg4MDVlMDAw MDApCm1tYXAoMHg4MDVlMDIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDkwMDApID0gMzQ0NTgzMTI3 MDQgKDB4ODA1ZTAyMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAg ICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVh bGJveC9saWJnc3NhcGlfa3JiNS5zby4xMCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4o Ii9saWIvbGliZ3NzYXBpX2tyYjUuc28uMTAiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklG WSwwMTQyMzIyNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVu KCIvdXNyL2xpYi9saWJnc3NhcGlfa3JiNS5zby4xMCIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yLS1yLS1y LS0gLGlub2RlPTExMjg0MDIsc2l6ZT0xMjgxMjgsYmxrc2l6ZT0xMjg1MTIgfSkgPSAwICgw eDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9S RUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsMTM5MjY0 LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0NTgzMTY4MDAgKDB4ODA1 ZTAzMDAwKQptbWFwKDB4ODA1ZTAzMDAwLDU3MzQ0LFBST1RfUkVBRCxNQVBfUFJJVkFURXxN QVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1ODMx NjgwMCAoMHg4MDVlMDMwMDApCm1tYXAoMHg4MDVlMTEwMDAsNjk2MzIsUFJPVF9SRUFEfFBS T1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4ZDAwMCkgPSAzNDQ1ODM3NDE0NCAoMHg4MDVlMTEwMDApCm1tYXAoMHg4MDVl MjIwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8 TUFQX1BSRUZBVUxUX1JFQUQsMywweDFkMDAwKSA9IDM0NDU4NDQzNzc2ICgweDgwNWUyMjAw MCkKbW1hcCgweDgwNWUyMzAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MWQwMDApID0gMzQ0NTg0NDc4 NzIgKDB4ODA1ZTIzMDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAg ICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVh bGJveC9saWJlbGYuc28uMiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDI1MTAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliZWxm LnNvLjIiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyNTEwMDApID0gMyAoMHgz KQpmc3RhdCgzLHsgbW9kZT0tci0tci0tci0tICxpbm9kZT0xMTIyNTQwLHNpemU9MTA0MzUy LGJsa3NpemU9MTA0NDQ4IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxN QVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4 MDBlZTAwMDApCm1tYXAoMHgwLDExNDY4OCxQUk9UX05PTkUsTUFQX0dVQVJELC0xLDB4MCkg ICAgICA9IDM0NDU4NDU2MDY0ICgweDgwNWUyNTAwMCkKbW1hcCgweDgwNWUyNTAwMCwyODY3 MixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZB VUxUX1JFQUQsMywweDApID0gMzQ0NTg0NTYwNjQgKDB4ODA1ZTI1MDAwKQptbWFwKDB4ODA1 ZTJjMDAwLDczNzI4LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDYwMDApID0gMzQ0NTg0ODQ3MzYg KDB4ODA1ZTJjMDAwKQptbWFwKDB4ODA1ZTNlMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxNzAwMCkg PSAzNDQ1ODU1ODQ2NCAoMHg4MDVlM2UwMDApCm1tYXAoMHg4MDVlM2YwMDAsODE5MixQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JF QUQsMywweDE3MDAwKSA9IDM0NDU4NTYyNTYwICgweDgwNWUzZjAwMCkKbXVubWFwKDB4ODAw ZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgz KSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCm9w ZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGlidXRpbC5zby45IixPX1JET05MWXxP X0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5 JwpvcGVuKCIvbGliL2xpYnV0aWwuc28uOSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZ LDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEyNDMx NCxzaXplPTgwMzg0LGJsa3NpemU9ODAzODQgfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYs UFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1 MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsOTgzMDQsUFJPVF9OT05FLE1BUF9HVUFS RCwtMSwweDApICAgICAgID0gMzQ0NTg1NzA3NTIgKDB4ODA1ZTQxMDAwKQptbWFwKDB4ODA1 ZTQxMDAwLDMyNzY4LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09S RXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1ODU3MDc1MiAoMHg4MDVlNDEwMDAp Cm1tYXAoMHg4MDVlNDkwMDAsNDUwNTYsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4NzAwMCkgPSAz NDQ1ODYwMzUyMCAoMHg4MDVlNDkwMDApCm1tYXAoMHg4MDVlNTQwMDAsODE5MixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQs MywweDExMDAwKSA9IDM0NDU4NjQ4NTc2ICgweDgwNWU1NDAwMCkKbW1hcCgweDgwNWU1NjAw MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MTIwMDApID0gMzQ0NTg2NTY3NjggKDB4ODA1ZTU2MDAwKQpt bWFwKDB4ODA1ZTU3MDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQ1ODY2MDg2NCAoMHg4MDVlNTcwMDAp Cm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAg KDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmljdWRhdGEu c28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2gg ZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliaWN1ZGF0YS5zby42NiIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVj dG9yeScKb3BlbigiL3Vzci9saWIvbGliaWN1ZGF0YS5zby42NiIsT19SRE9OTFl8T19DTE9F WEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3Bl bigiL3Vzci9saWIvY29tcGF0L2xpYmljdWRhdGEuc28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhF Q3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4o Ii91c3IvbG9jYWwvbGliL2xpYmljdWRhdGEuc28uNjYiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xP X1ZFUklGWSwwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yLXhyLXhyLXggLGlub2Rl PTExODE2MDEsc2l6ZT0xNjg4LGJsa3NpemU9NDA5NiB9KSA9IDAgKDB4MCkKbW1hcCgweDAs NDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0g MzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwxMjI4OCxQUk9UX05PTkUsTUFQ X0dVQVJELC0xLDB4MCkgICAgICAgPSAzNDQyMjY0MDY0MCAoMHg4MDNiZmQwMDApCm1tYXAo MHg4MDNiZmQwMDAsNDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9O T0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0MjI2NDA2NDAgKDB4ODAzYmZk MDAwKQptbWFwKDB4ODAzYmZmMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDIyNjQ4ODMy ICgweDgwM2JmZjAwMCkKbXVubWFwKDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAg ICAgICAgICAgID0gMCAoMHgwKQpjbG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgPSAwICgweDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxi b3gvbGliaWNvbnYuc28uMiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2 NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGli aWNvbnYuc28uMiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkg RVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmlj b252LnNvLjIiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIyNjYwMDApIEVS UiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNyL2xpYi9jb21wYXQv bGliaWNvbnYuc28uMiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAw MCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwv bGliL2xpYmljb252LnNvLjIiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMTQyMzIy NjYwMDApID0gMyAoMHgzKQpmc3RhdCgzLHsgbW9kZT0tcnctci0tci0tICxpbm9kZT0yMTM5 NDcsc2l6ZT0xMDkxMDQwLGJsa3NpemU9MTMxMDcyIH0pID0gMCAoMHgwKQptbWFwKDB4MCw0 MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAz NDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgwLDEwNDQ0ODAsUFJPVF9OT05FLE1B UF9HVUFSRCwtMSwweDApICAgICA9IDM0NDU4NjY5MDU2ICgweDgwNWU1OTAwMCkKbW1hcCgw eDgwNWU1OTAwMCw5Mjk3OTIsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf Tk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDU4NjY5MDU2ICgweDgwNWU1 OTAwMCkKbW1hcCgweDgwNWYzYzAwMCw5ODMwNCxQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhlMzAw MCkgPSAzNDQ1OTU5ODg0OCAoMHg4MDVmM2MwMDApCm1tYXAoMHg4MDVmNTQwMDAsMTIyODgs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHhmYjAwMCkgPSAzNDQ1OTY5NzE1MiAoMHg4MDVmNTQwMDApCm1tYXAoMHg4 MDVmNTcwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfRklY RUR8TUFQX0FOT04sLTEsMHgwKSA9IDM0NDU5NzA5NDQwICgweDgwNWY1NzAwMCkKbXVubWFw KDB4ODAwZWUwMDAwLDQwOTYpICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpj bG9zZSgzKSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgw eDApCm9wZW4oIi91c3IvbG9jYWwvbGliL3ZpcnR1YWxib3gvbGlicGNyZS5zby4xIixPX1JE T05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9y IGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJwY3JlLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhF Q3xPX1ZFUklGWSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvdXNyL2xpYi9saWJwY3JlLnNvLjEiLE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklG WSwwNjYwMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNy L2xpYi9jb21wYXQvbGlicGNyZS5zby4xIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlks MDY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9s b2NhbC9saWIvbGlicGNyZS5zby4xIixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2 MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTY1Mzg3 NCxzaXplPTY2MjkzNixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAsNDA5 NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQz NzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCw2Njc2NDgsUFJPVF9OT05FLE1BUF9H VUFSRCwtMSwweDApICAgICAgPSAzNDQ1OTcxMzUzNiAoMHg4MDVmNTgwMDApCm1tYXAoMHg4 MDVmNTgwMDAsMTI2OTc2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05P Q09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDQ1OTcxMzUzNiAoMHg4MDVmNTgw MDApCm1tYXAoMHg4MDVmNzcwMDAsNTI4Mzg0LFBST1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BS SVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDFmMDAw KSA9IDM0NDU5ODQwNTEyICgweDgwNWY3NzAwMCkKbW1hcCgweDgwNWZmODAwMCw4MTkyLFBS T1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRf UkVBRCwzLDB4YTAwMDApID0gMzQ0NjAzNjg4OTYgKDB4ODA1ZmY4MDAwKQptbWFwKDB4ODA1 ZmZhMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVE fE1BUF9BTk9OLC0xLDB4MCkgPSAzNDQ2MDM3NzA4OCAoMHg4MDVmZmEwMDApCm11bm1hcCgw eDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xv c2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmludGwuc28uOCIsT19SRE9O TFl8T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmls ZSBvciBkaXJlY3RvcnknCm9wZW4oIi9saWIvbGliaW50bC5zby44IixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRp cmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGliaW50bC5zby44IixPX1JET05MWXxPX0NMT0VY RUN8T19WRVJJRlksMDE0MjMyMjY2MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVj dG9yeScKb3BlbigiL3Vzci9saWIvY29tcGF0L2xpYmludGwuc28uOCIsT19SRE9OTFl8T19D TE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBvciBk aXJlY3RvcnknCm9wZW4oIi91c3IvbG9jYWwvbGliL2xpYmludGwuc28uOCIsT19SRE9OTFl8 T19DTE9FWEVDfE9fVkVSSUZZLDAxNDIzMjI2NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBt b2RlPS1ydy1yLS1yLS0gLGlub2RlPTExODE4OTMsc2l6ZT02MTM5MixibGtzaXplPTYxNDQw IH0pID0gMCAoMHgwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRCxNQVBfUFJJVkFURXxNQVBf UFJFRkFVTFRfUkVBRCwzLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAo MHgwLDUzMjQ4LFBST1RfTk9ORSxNQVBfR1VBUkQsLTEsMHgwKSAgICAgICA9IDM0NDYwMzgx MTg0ICgweDgwNWZmYjAwMCkKbW1hcCgweDgwNWZmYjAwMCwxNjM4NCxQUk9UX1JFQUQsTUFQ X1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDAp ID0gMzQ0NjAzODExODQgKDB4ODA1ZmZiMDAwKQptbWFwKDB4ODA1ZmZmMDAwLDI0NTc2LFBS T1RfUkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQ X1BSRUZBVUxUX1JFQUQsMywweDQwMDApID0gMzQ0NjAzOTc1NjggKDB4ODA1ZmZmMDAwKQpt bWFwKDB4ODA2MDA1MDAwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHhhMDAwKSA9IDM0NDYwNDIyMTQ0ICgw eDgwNjAwNTAwMCkKbW1hcCgweDgwNjAwNzAwMCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRF LE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfQU5PTiwtMSwweDApID0gMzQ0NjA0MzAzMzYg KDB4ODA2MDA3MDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5NikgICAgICAgICAgICAgICAg ICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICA9IDAgKDB4MCkKb3BlbigiL3Vzci9sb2NhbC9saWIvdmlydHVhbGJv eC9saWJmcmVldHlwZS5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2 MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJm cmVldHlwZS5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAwKSBF UlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9saWIvbGliZnJl ZXR5cGUuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2NjAwMCkgRVJS IzIgJ05vIHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2NvbXBhdC9s aWJmcmVldHlwZS5zby42IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDMyMjY2MDAw KSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vzci9sb2NhbC9s aWIvbGliZnJlZXR5cGUuc28uNiIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAzMjI2 NjAwMCkgPSAzICgweDMpCmZzdGF0KDMseyBtb2RlPS1yd3hyLXhyLXggLGlub2RlPTE2NTQx Mjgsc2l6ZT03OTIxMjgsYmxrc2l6ZT0xMzEwNzIgfSkgPSAwICgweDApCm1tYXAoMHgwLDQw OTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0 Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgweDAsNzkwNTI4LFBST1RfTk9ORSxNQVBf R1VBUkQsLTEsMHgwKSAgICAgID0gMzQ0NjA0MzQ0MzIgKDB4ODA2MDA4MDAwKQptbWFwKDB4 ODA2MDA4MDAwLDIwMDcwNCxQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9O T0NPUkV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0gMzQ0NjA0MzQ0MzIgKDB4ODA2MDA4 MDAwKQptbWFwKDB4ODA2MDM5MDAwLDU2MTE1MixQUk9UX1JFQUR8UFJPVF9FWEVDLE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgzMTAw MCkgPSAzNDQ2MDYzNTEzNiAoMHg4MDYwMzkwMDApCm1tYXAoMHg4MDYwYzIwMDAsMjg2NzIs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHhiYTAwMCkgPSAzNDQ2MTE5NjI4OCAoMHg4MDYwYzIwMDApCm11bm1hcCgw eDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xv c2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYmdyYXBoaXRlMi5zby4zIixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3Ig ZGlyZWN0b3J5JwpvcGVuKCIvbGliL2xpYmdyYXBoaXRlMi5zby4zIixPX1JET05MWXxPX0NM T0VYRUN8T19WRVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5Jwpv cGVuKCIvdXNyL2xpYi9saWJncmFwaGl0ZTIuc28uMyIsT19SRE9OTFl8T19DTE9FWEVDfE9f VkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL3Vz ci9saWIvY29tcGF0L2xpYmdyYXBoaXRlMi5zby4zIixPX1JET05MWXxPX0NMT0VYRUN8T19W RVJJRlksMDApIEVSUiMyICdObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5JwpvcGVuKCIvdXNy L2xvY2FsL2xpYi9saWJncmFwaGl0ZTIuc28uMyIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVS SUZZLDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1vZGU9LXJ3eHIteHIteCAsaW5vZGU9MTY1 NTQ3OSxzaXplPTE3OTI3MixibGtzaXplPTEzMTA3MiB9KSA9IDAgKDB4MCkKbW1hcCgweDAs NDA5NixQUk9UX1JFQUQsTUFQX1BSSVZBVEV8TUFQX1BSRUZBVUxUX1JFQUQsMywweDApID0g MzQzNzUzMzU5MzYgKDB4ODAwZWUwMDAwKQptbWFwKDB4MCwxODAyMjQsUFJPVF9OT05FLE1B UF9HVUFSRCwtMSwweDApICAgICAgPSAzNDQ2MTIyNDk2MCAoMHg4MDYwYzkwMDApCm1tYXAo MHg4MDYwYzkwMDAsNTczNDQsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBf Tk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0NDYxMjI0OTYwICgweDgwNjBj OTAwMCkKbW1hcCgweDgwNjBkNzAwMCwxMTA1OTIsUFJPVF9SRUFEfFBST1RfRVhFQyxNQVBf UFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4ZTAw MCkgPSAzNDQ2MTI4MjMwNCAoMHg4MDYwZDcwMDApCm1tYXAoMHg4MDYwZjIwMDAsMTIyODgs UFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9QUkVGQVVM VF9SRUFELDMsMHgyOTAwMCkgPSAzNDQ2MTM5Mjg5NiAoMHg4MDYwZjIwMDApCm11bm1hcCgw eDgwMGVlMDAwMCw0MDk2KSAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xv c2UoMykgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgw KQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92aXJ0dWFsYm94L2xpYnByaXZhdGVoZWltaXBjYy5z by4xMSIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSBFUlIjMiAnTm8gc3VjaCBm aWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJwcml2YXRlaGVpbWlwY2Muc28uMTEi LE9fUkRPTkxZfE9fQ0xPRVhFQ3xPX1ZFUklGWSwwMCkgRVJSIzIgJ05vIHN1Y2ggZmlsZSBv ciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYnByaXZhdGVoZWltaXBjYy5zby4xMSIs T19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7IG1v ZGU9LXItLXItLXItLSAsaW5vZGU9MTEyODM1OSxzaXplPTEwOTQ0LGJsa3NpemU9MTEyNjQg fSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1BUF9Q UkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1hcCgw eDAsMjQ1NzYsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQ0MzUyMTEy NjQgKDB4ODA0N2ZhMDAwKQptbWFwKDB4ODA0N2ZhMDAwLDgxOTIsUFJPVF9SRUFELE1BUF9Q UklWQVRFfE1BUF9GSVhFRHxNQVBfTk9DT1JFfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9 IDM0NDM1MjExMjY0ICgweDgwNDdmYTAwMCkKbW1hcCgweDgwNDdmYzAwMCw0MDk2LFBST1Rf UkVBRHxQUk9UX0VYRUMsTUFQX1BSSVZBVEV8TUFQX0ZJWEVEfE1BUF9OT0NPUkV8TUFQX1BS RUZBVUxUX1JFQUQsMywweDEwMDApID0gMzQ0MzUyMTk0NTYgKDB4ODA0N2ZjMDAwKQptbWFw KDB4ODA0N2ZkMDAwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQ X0ZJWEVEfE1BUF9QUkVGQVVMVF9SRUFELDMsMHgxMDAwKSA9IDM0NDM1MjIzNTUyICgweDgw NDdmZDAwMCkKbW1hcCgweDgwNDdmZTAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTAwMCkgPSAzNDQz NTIyNzY0OCAoMHg4MDQ3ZmUwMDApCm11bm1hcCgweDgwMGVlMDAwMCw0MDk2KSAgICAgICAg ICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKY2xvc2UoMykgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgID0gMCAoMHgwKQpvcGVuKCIvdXNyL2xvY2FsL2xpYi92 aXJ0dWFsYm94L2xpYmJ6Mi5zby40IixPX1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2 MDAwKSBFUlIjMiAnTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeScKb3BlbigiL2xpYi9saWJi ejIuc28uNCIsT19SRE9OTFl8T19DTE9FWEVDfE9fVkVSSUZZLDA2NjAwMCkgRVJSIzIgJ05v IHN1Y2ggZmlsZSBvciBkaXJlY3RvcnknCm9wZW4oIi91c3IvbGliL2xpYmJ6Mi5zby40IixP X1JET05MWXxPX0NMT0VYRUN8T19WRVJJRlksMDY2MDAwKSA9IDMgKDB4MykKZnN0YXQoMyx7 IG1vZGU9LXItLXItLXItLSAsaW5vZGU9MTEyMzQ5OSxzaXplPTc4Njg4LGJsa3NpemU9Nzg4 NDggfSkgPSAwICgweDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFELE1BUF9QUklWQVRFfE1B UF9QUkVGQVVMVF9SRUFELDMsMHgwKSA9IDM0Mzc1MzM1OTM2ICgweDgwMGVlMDAwMCkKbW1h cCgweDAsOTAxMTIsUFJPVF9OT05FLE1BUF9HVUFSRCwtMSwweDApICAgICAgID0gMzQ0NjE0 MDUxODQgKDB4ODA2MGY1MDAwKQptbWFwKDB4ODA2MGY1MDAwLDEyMjg4LFBST1RfUkVBRCxN QVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4 MCkgPSAzNDQ2MTQwNTE4NCAoMHg4MDYwZjUwMDApCm1tYXAoMHg4MDYwZjgwMDAsNjU1MzYs UFJPVF9SRUFEfFBST1RfRVhFQyxNQVBfUFJJVkFURXxNQVBfRklYRUR8TUFQX05PQ09SRXxN QVBfUFJFRkFVTFRfUkVBRCwzLDB4MjAwMCkgPSAzNDQ2MTQxNzQ3MiAoMHg4MDYwZjgwMDAp Cm1tYXAoMHg4MDYxMDgwMDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfRklYRUR8TUFQX1BSRUZBVUxUX1JFQUQsMywweDExMDAwKSA9IDM0NDYxNDgzMDA4 ICgweDgwNjEwODAwMCkKbW1hcCgweDgwNjEwOTAwMCw4MTkyLFBST1RfUkVBRHxQUk9UX1dS SVRFLE1BUF9QUklWQVRFfE1BUF9GSVhFRHxNQVBfUFJFRkFVTFRfUkVBRCwzLDB4MTEwMDAp ID0gMzQ0NjE0ODcxMDQgKDB4ODA2MTA5MDAwKQptdW5tYXAoMHg4MDBlZTAwMDAsNDA5Nikg ICAgICAgICAgICAgICAgICAgICAgICAgPSAwICgweDApCmNsb3NlKDMpICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDBl ZTQwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgw eDgwMGYwZTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90 ZWN0KDB4ODAwZmEwMDAwLDEyMjg4LFBST1RfUkVBRCkgICAgICAgICAgICA9IDAgKDB4MCkK bXByb3RlY3QoMHg4MDBmYjEwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAo MHgwKQptcHJvdGVjdCgweDgwMGZjNjAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAg PSAwICgweDApCm1wcm90ZWN0KDB4ODAyOTQ4MDAwLDgxOTIsUFJPVF9SRUFEKSAgICAgICAg ICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDBmY2MwMDAsNDA5NixQUk9UX1JFQUQpICAg ICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNDEwMDAwMCw0OTE1MixQUk9UX1JF QUQpICAgICAgICAgICAgPSAwICgweDApCm1tYXAoMHgwLDM5MzIxNixQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTiwtMSwweDApID0gMzQ0NjE0OTUyOTYgKDB4 ODA2MTBiMDAwKQptcHJvdGVjdCgweDgwNDY5MjAwMCw2NTUzNixQUk9UX1JFQUQpICAgICAg ICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA0ZTUwMDAwLDE4NDMyMCxQUk9UX1JFQUQp ICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDI5YmEwMDAsMTYzODQsUFJPVF9S RUFEKSAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwM2FjODAwMCw4MTkyLFBS T1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAwZmQxMDAwLDQw OTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDBmZGEw MDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgw MGZmNTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0 KDB4ODAyOWVjMDAwLDgxOTIsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXBy b3RlY3QoMHg4MDBmZmIwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgw KQptcHJvdGVjdCgweDgwMjlmNTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAw ICgweDApCm1wcm90ZWN0KDB4ODAyOWZhMDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAg ICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDMxZTgwMDAsNDA5NixQUk9UX1JFQUQpICAgICAg ICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwMGZmZjAwMCw0MDk2LFBST1RfUkVBRCkg ICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAzYjIyMDAwLDI4NjcyLFBST1Rf UkVBRCkgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDI5ZmUwMDAsNDA5NixQ Uk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwMzFlZjAwMCw0 MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODAzMWYz MDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4 MDNiNDUwMDAsODE5MixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVj dCgweDgwMzFmYTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1w cm90ZWN0KDB4ODAzYjRkMDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4 MCkKbXByb3RlY3QoMHg4MDNiNjQwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0g MCAoMHgwKQptcHJvdGVjdCgweDgwM2I2YzAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAg ICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1MDMyMDAwLDM2ODY0LFBST1RfUkVBRCkgICAg ICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDNiZjMwMDAsODE5MixQUk9UX1JFQUQp ICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNDc0YzAwMCwzNjg2NCxQUk9U X1JFQUQpICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1MmQ4MDAwLDE3MjAz MixQUk9UX1JFQUQpICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDQ3NjUwMDAs NDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNDc3 OTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4 ODA0Nzg2MDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3Rl Y3QoMHg4MDNiZmIwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQpt cHJvdGVjdCgweDgwNTYxODAwMCw2MTQ0MCxQUk9UX1JFQUQpICAgICAgICAgICAgPSAwICgw eDApCm1wcm90ZWN0KDB4ODA1ODEzMDAwLDczNzI4LFBST1RfUkVBRCkgICAgICAgICAgICA9 IDAgKDB4MCkKbXByb3RlY3QoMHg4MDU4Y2MwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAg ICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNTllYjAwMCw0MDk2LFBST1RfUkVBRCkgICAg ICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1YWIxMDAwLDIwNDgwLFBST1RfUkVB RCkgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDQ3YzUwMDAsNDA5NixQUk9U X1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNWFmOTAwMCw0MDk2 LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1YmRhMDAw LDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDQ3 ZjcwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgw eDgwNWMwNjAwMCwxMjI4OCxQUk9UX1JFQUQpICAgICAgICAgICAgPSAwICgweDApCm1wcm90 ZWN0KDB4ODA1YzExMDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkK bXByb3RlY3QoMHg4MDVjNjAwMDAsODE5MixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAo MHgwKQptcHJvdGVjdCgweDgwMzFmZTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAg PSAwICgweDApCm1wcm90ZWN0KDB4ODA1ZDA2MDAwLDgxOTIsUFJPVF9SRUFEKSAgICAgICAg ICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDVkMzQwMDAsNDA5NixQUk9UX1JFQUQpICAg ICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNWQzYjAwMCw0MDk2LFBST1RfUkVB RCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1ZDUwMDAwLDQwOTYsUFJP VF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDVkNjAwMDAsNDA5 NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNWRlZjAw MCw4MTkyLFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1 ZTAwMDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3Qo MHg4MDVlMjIwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJv dGVjdCgweDgwNWUzZTAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDAp Cm1wcm90ZWN0KDB4ODA1ZTU0MDAwLDQwOTYsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAg KDB4MCkKbXByb3RlY3QoMHg4MDNiZmYwMDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAg ID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNWY1NTAwMCw4MTkyLFBST1RfUkVBRCkgICAgICAg ICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA1ZmY5MDAwLDQwOTYsUFJPVF9SRUFEKSAg ICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDYwMDYwMDAsNDA5NixQUk9UX1JF QUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgwNjBjMzAwMCwyNDU3NixQ Uk9UX1JFQUQpICAgICAgICAgICAgPSAwICgweDApCm1wcm90ZWN0KDB4ODA2MGYzMDAwLDgx OTIsUFJPVF9SRUFEKSAgICAgICAgICAgICA9IDAgKDB4MCkKbXByb3RlY3QoMHg4MDQ3ZmQw MDAsNDA5NixQUk9UX1JFQUQpICAgICAgICAgICAgID0gMCAoMHgwKQptcHJvdGVjdCgweDgw NjEwODAwMCw0MDk2LFBST1RfUkVBRCkgICAgICAgICAgICAgPSAwICgweDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDM3NTMzNTkzNiAoMHg4MDBlZTAwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTg4ODUxMiAoMHg4MDYxNmIwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTg5MjYwOCAoMHg4MDYxNmMwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTg5NjcwNCAoMHg4MDYxNmQwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkwMDgwMCAoMHg4MDYxNmUwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkwNDg5NiAoMHg4MDYxNmYwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkwODk5MiAoMHg4MDYxNzAwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkxMzA4OCAoMHg4MDYxNzEwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkxNzE4NCAoMHg4MDYxNzIwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkyMTI4MCAoMHg4MDYxNzMwMDApCm1tYXAoMHgw LDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FM SUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTkyNTM3NiAoMHg4MDYxNzQwMDApCm1tYXAoMHgw LDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9B TElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjE5Mjk0NzIgKDB4ODA2MTc1MDAwKQptbWFwKDB4 MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBf QUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYxOTQ5OTUyICgweDgwNjE3YTAwMCkKbW1hcCgw eDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBf QUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYxOTYyMjQwICgweDgwNjE3ZDAwMCkKbW1hcCgw eDAsMjg2NzIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQ X0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTk2NjMzNiAoMHg4MDYxN2UwMDApCm1tYXAo MHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQ X0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MTk5NTAwOCAoMHg4MDYxODUwMDApCm1tYXAo MHgwLDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1B UF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjE5OTkxMDQgKDB4ODA2MTg2MDAwKQptbWFw KDB4MCwyODY3MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxN QVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMDE5NTg0ICgweDgwNjE4YjAwMCkKbW1h cCgweDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058 TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjA0ODI1NiAoMHg4MDYxOTIwMDApCm1t YXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9O fE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIwNjg3MzYgKDB4ODA2MTk3MDAwKQpt bWFwKDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5P TnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMDg5MjE2ICgweDgwNjE5YzAwMCkK bW1hcCgweDAsMjg2NzIsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FO T058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjEwMTUwNCAoMHg4MDYxOWYwMDAp Cm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIxMzAxNzYgKDB4ODA2MWE2MDAw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIxNDI0NjQgKDB4ODA2MWE5MDAw KQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9B Tk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIxNDY1NjAgKDB4ODA2MWFhMDAw KQptbWFwKDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBf QU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMTUwNjU2ICgweDgwNjFhYjAw MCkKbW1hcCgweDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQ X0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjE2Mjk0NCAoMHg4MDYxYWUw MDApCm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1B UF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIxNzUyMzIgKDB4ODA2MWIx MDAwKQptbWFwKDB4MCwyODY3MixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxN QVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMTg3NTIwICgweDgwNjFi NDAwMCkKbW1hcCgweDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjIxNjE5MiAoMHg4MDYx YmIwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjIzNjY3MiAoMHg4MDYx YzAwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjI0MDc2OCAoMHg4MDYx YzEwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjI0NDg2NCAoMHg4MDYx YzIwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8 TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjI0ODk2MCAoMHg4MDYx YzMwMDApCm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIyNTMwNTYgKDB4ODA2 MWM0MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIyNjUzNDQgKDB4ODA2 MWM3MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIyNjk0NDAgKDB4ODA2 MWM4MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRF fE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIyNzM1MzYgKDB4ODA2 MWM5MDAwKQptbWFwKDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFU RXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMjc3NjMyICgweDgw NjFjYTAwMCkKbW1hcCgweDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZB VEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjI4OTkyMCAoMHg4 MDYxY2QwMDApCm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMDIyMDggKDB4 ODA2MWQwMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMTQ0OTYgKDB4 ODA2MWQzMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMTg1OTIgKDB4 ODA2MWQ0MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMjI2ODggKDB4 ODA2MWQ1MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMjY3ODQgKDB4 ODA2MWQ2MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMzA4ODAgKDB4 ODA2MWQ3MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMzQ5NzYgKDB4 ODA2MWQ4MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzMzkwNzIgKDB4 ODA2MWQ5MDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNDMxNjggKDB4 ODA2MWRhMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNDcyNjQgKDB4 ODA2MWRiMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNTEzNjAgKDB4 ODA2MWRjMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNTU0NTYgKDB4 ODA2MWRkMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNTk1NTIgKDB4 ODA2MWRlMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNjM2NDggKDB4 ODA2MWRmMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNjc3NDQgKDB4 ODA2MWUwMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNzE4NDAgKDB4 ODA2MWUxMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzNzU5MzYgKDB4 ODA2MWUyMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzODAwMzIgKDB4 ODA2MWUzMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9QUklW QVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjIzODQxMjggKDB4 ODA2MWU0MDAwKQptbWFwKDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyMzg4MjI0ICgw eDgwNjFlNTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDAwNTEyICgw eDgwNjFlODAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDA0NjA4ICgw eDgwNjFlOTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDA4NzA0ICgw eDgwNjFlYTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDEyODAwICgw eDgwNjFlYjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDE2ODk2ICgw eDgwNjFlYzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDIwOTkyICgw eDgwNjFlZDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDI1MDg4ICgw eDgwNjFlZTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDI5MTg0ICgw eDgwNjFlZjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDMzMjgwICgw eDgwNjFmMDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDM3Mzc2ICgw eDgwNjFmMTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDQxNDcyICgw eDgwNjFmMjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDQ1NTY4ICgw eDgwNjFmMzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDQ5NjY0ICgw eDgwNjFmNDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDUzNzYwICgw eDgwNjFmNTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDU3ODU2ICgw eDgwNjFmNjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDYxOTUyICgw eDgwNjFmNzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDY2MDQ4ICgw eDgwNjFmODAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDcwMTQ0ICgw eDgwNjFmOTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDc0MjQwICgw eDgwNjFmYTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDc4MzM2ICgw eDgwNjFmYjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDgyNDMyICgw eDgwNjFmYzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDg2NTI4ICgw eDgwNjFmZDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBfUFJJ VkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNDkwNjI0ICgw eDgwNjFmZTAwMCkKbW1hcCgweDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQX1BS SVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjQ5NDcyMCAo MHg4MDYxZmYwMDApCm1tYXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1BUF9Q UklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjI1MTUyMDAg KDB4ODA2MjA0MDAwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTM1Njgw ICgweDgwNjIwOTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTU2MTYw ICgweDgwNjIwZTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTYwMjU2 ICgweDgwNjIwZjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTY0MzUy ICgweDgwNjIxMDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTY4NDQ4 ICgweDgwNjIxMTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTcyNTQ0 ICgweDgwNjIxMjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTc2NjQw ICgweDgwNjIxMzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTgwNzM2 ICgweDgwNjIxNDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTg0ODMy ICgweDgwNjIxNTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTg4OTI4 ICgweDgwNjIxNjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTkzMDI0 ICgweDgwNjIxNzAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNTk3MTIw ICgweDgwNjIxODAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklURSxNQVBf UFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNjAxMjE2 ICgweDgwNjIxOTAwMCkKbW1hcCgweDAsMTIyODgsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYwNTMx MiAoMHg4MDYyMWEwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYxNzYw MCAoMHg4MDYyMWQwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYyMTY5 NiAoMHg4MDYyMWUwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYyNTc5 MiAoMHg4MDYyMWYwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYyOTg4 OCAoMHg4MDYyMjAwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYzMzk4 NCAoMHg4MDYyMjEwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUsTUFQ X1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjYzODA4 MCAoMHg4MDYyMjIwMDApCm1tYXAoMHgwLDI4NjcyLFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjI2NDIx NzYgKDB4ODA2MjIzMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVBRHxQUk9UX1dSSVRFLE1B UF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjI2NzA4 NDggKDB4ODA2MjJhMDAwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8UFJPVF9XUklURSxN QVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYyNjc0 OTQ0ICgweDgwNjIyYjAwMCkKbW1hcCgweDAsMjA0ODAsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2MjY5 NTQyNCAoMHg4MDYyMzAwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2Mjcx NTkwNCAoMHg4MDYyMzUwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2Mjcy MDAwMCAoMHg4MDYyMzYwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2Mjcy NDA5NiAoMHg4MDYyMzcwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2Mjcy ODE5MiAoMHg4MDYyMzgwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJVEUs TUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2Mjcz MjI4OCAoMHg4MDYyMzkwMDApCm1tYXAoMHgwLDEyMjg4LFBST1RfUkVBRHxQUk9UX1dSSVRF LE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0NjI3 MzYzODQgKDB4ODA2MjNhMDAwKQptbWFwKDB4MCw1MzI0OCxQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYy NzQ4NjcyICgweDgwNjIzZDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYy ODAxOTIwICgweDgwNjI0YTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JFQUR8UFJPVF9XUklU RSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0NDYy ODA2MDE2ICgweDgwNjI0YjAwMCkKbW1hcCgweDAsNTMyNDgsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjgxMDExMiAoMHg4MDYyNGMwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjg2MzM2MCAoMHg4MDYyNTkwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjg2NzQ1NiAoMHg4MDYyNWEwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjg3NTY0OCAoMHg4MDYyNWMwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjg4Mzg0MCAoMHg4MDYyNWUwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjg5MjAzMiAoMHg4MDYyNjAwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjkwMDIyNCAoMHg4MDYyNjIwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjkwODQxNiAoMHg4MDYyNjQwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjkxNjYwOCAoMHg4MDYyNjYwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjkyNDgwMCAoMHg4MDYyNjgwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 MjkzMjk5MiAoMHg4MDYyNmEwMDApCm1tYXAoMHgwLDgxOTIsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjk0MTE4NCAoMHg4MDYyNmMwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFEfFBST1RfV1JJ VEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAzNDQ2 Mjk0OTM3NiAoMHg4MDYyNmUwMDApCm1tYXAoMHgwLDYxNDQwLFBST1RfUkVBRHxQUk9UX1dS SVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0gMzQ0 NjI5NTM0NzIgKDB4ODA2MjZmMDAwKQptbWFwKDB4MCwxMjI4OCxQUk9UX1JFQUR8UFJPVF9X UklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9IDM0 NDYzMDE0OTEyICgweDgwNjI3ZTAwMCkKbW1hcCgweDAsNjE0NDAsUFJPVF9SRUFEfFBST1Rf V1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkgPSAz NDQ2MzAyNzIwMCAoMHg4MDYyODEwMDApCm1tYXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQUk9U X1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDApID0g MzQ0NjMwODg2NDAgKDB4ODA2MjkwMDAwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8UFJP VF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgwKSA9 IDM0NDYzMTA5MTIwICgweDgwNjI5NTAwMCkKbW1hcCgweDAsMjA0ODAsUFJPVF9SRUFEfFBS T1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4MCkg PSAzNDQ2MzEyOTYwMCAoMHg4MDYyOWEwMDApCm1tYXAoMHgwLDIwNDgwLFBST1RfUkVBRHxQ Uk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSwweDAp ID0gMzQ0NjMxNTAwODAgKDB4ODA2MjlmMDAwKQptbWFwKDB4MCwyMDQ4MCxQUk9UX1JFQUR8 UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEsMHgw KSA9IDM0NDYzMTcwNTYwICgweDgwNjJhNDAwMCkKbW1hcCgweDAsMTIyODgsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4 MCkgPSAzNDQ2MzE5MTA0MCAoMHg4MDYyYTkwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4 MCkgPSAzNDQ2MzIwMzMyOCAoMHg4MDYyYWMwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4 MCkgPSAzNDQ2MzIwNzQyNCAoMHg4MDYyYWQwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4 MCkgPSAzNDQ2MzIxMTUyMCAoMHg4MDYyYWUwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9SRUFE fFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0xLDB4 MCkgPSAzNDQ2MzIxNTYxNiAoMHg4MDYyYWYwMDApCm1tYXAoMHgwLDI4NjcyLFBST1RfUkVB RHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSww eDApID0gMzQ0NjMyMTk3MTIgKDB4ODA2MmIwMDAwKQptbWFwKDB4MCw0MDk2LFBST1RfUkVB RHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwtMSww eDApID0gMzQ0NjMyNDgzODQgKDB4ODA2MmI3MDAwKQptbWFwKDB4MCwyODY3MixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjUyNDgwICgweDgwNjJiODAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjgxMTUyICgweDgwNjJiZjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjg1MjQ4ICgweDgwNjJjMDAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjg5MzQ0ICgweDgwNjJjMTAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjkzNDQwICgweDgwNjJjMjAwMCkKbW1hcCgweDAsNDA5NixQUk9UX1JF QUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiksLTEs MHgwKSA9IDM0NDYzMjk3NTM2ICgweDgwNjJjMzAwMCkKbW1hcCgweDAsMTIyODgsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMwMTYzMiAoMHg4MDYyYzQwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMxMzkyMCAoMHg4MDYyYzcwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMxODAxNiAoMHg4MDYyYzgwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMyMjExMiAoMHg4MDYyYzkwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMyNjIwOCAoMHg4MDYyY2EwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMzMDMwNCAoMHg4MDYyY2IwMDApCm1tYXAoMHgwLDQwOTYsUFJPVF9S RUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIpLC0x LDB4MCkgPSAzNDQ2MzMzNDQwMCAoMHg4MDYyY2MwMDApCm1tYXAoMHgwLDIwNDgwLFBST1Rf UkVBRHxQUk9UX1dSSVRFLE1BUF9QUklWQVRFfE1BUF9BTk9OfE1BUF9BTElHTkVEKDEyKSwt MSwweDApID0gMzQ0NjMzMzg0OTYgKDB4ODA2MmNkMDAwKQptbWFwKDB4MCwxMjI4OCxQUk9U X1JFQUR8UFJPVF9XUklURSxNQVBfUFJJVkFURXxNQVBfQU5PTnxNQVBfQUxJR05FRCgxMiks LTEsMHgwKSA9IDM0NDYzMzU4OTc2ICgweDgwNjJkMjAwMCkKbW1hcCgweDAsMTIyODgsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIp LC0xLDB4MCkgPSAzNDQ2MzM3MTI2NCAoMHg4MDYyZDUwMDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIp LC0xLDB4MCkgPSAzNDQ2MzM4MzU1MiAoMHg4MDYyZDgwMDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIp LC0xLDB4MCkgPSAzNDQ2MzM4NzY0OCAoMHg4MDYyZDkwMDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIp LC0xLDB4MCkgPSAzNDQ2MzM5MTc0NCAoMHg4MDYyZGEwMDApCm1tYXAoMHgwLDQwOTYsUFJP VF9SRUFEfFBST1RfV1JJVEUsTUFQX1BSSVZBVEV8TUFQX0FOT058TUFQX0FMSUdORUQoMTIp LC0xLDB4MCkgPSAzNDQ2MzM5NTg0MCAoMHg4MDYyZGIwMDApCmZvcmsoKSAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9IDM4MTQ0ICgweDk1MDApCmV4aXQo MHgxKQpwcm9jZXNzIGV4aXQsIHJ2YWwgPSAxCmdyYWhhbXBlcnJpbkBtb21oMTY3LWdqcDQt ODU3MHA6fiAlIFFTZXR0aW5nczo6dmFsdWU6IEVtcHR5IGtleSBwYXNzZWQKUVNldHRpbmdz Ojp2YWx1ZTogRW1wdHkga2V5IHBhc3NlZAoKZ3JhaGFtcGVycmluQG1vbWgxNjctZ2pwNC04 NTcwcDp+ICUgCg== --------------C69341C75F28E9208C1CA33C-- From owner-freebsd-current@freebsd.org Thu Mar 19 17:17:00 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6CF6F264F51 for ; Thu, 19 Mar 2020 17:17:00 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic305-20.consmr.mail.gq1.yahoo.com (sonic305-20.consmr.mail.gq1.yahoo.com [98.137.64.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48jtqs6lRrz3HLm for ; Thu, 19 Mar 2020 17:16:57 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: VIaGObcVM1l1Nm7_9lNg.uOKYGsWKimkOamXvn_Sryqg6DZWhgPt__AOQoAT0pT lCQrKU_bLxzPZiJWT0Hx1rxACwWAjHBHLly9QDRM5xokVDW7tsE8qRAdcRBkv3KWed_eU8rww6aQ H35PmGlx8Mn5_I47omSZhKMjKEkeZz2YEcktkYbJSPb1.aAO5iQMfhMs6jiMRzYDCIfvAdNH5G.Y W4yazQu0oDicHQ19qAWvYz6F3bVCQg5sWR7lvve2F10twVWOmXtaUkyYc8vh0n118MXk3fnvnimK YfZNLChqF5Xcx.kybyoZt9GZPD6dq0MPj8DVwJ4KjcAdqhDwBdAQDsAkZDJ5ctNltxk5MrPO3FkO kzGnyKLRes5XW8fUQObVUYycBKdGQMjptscRwGlz2gO1kZvN3HCRfZQIV88YCDxNeCcPseOTs3dV xDQgiZxeRojJs7IJPbHw1K65KL4Pu0ofRWhAVMZx6NeK1wQ..s4.H6vQI.nExnOG3ZC4c1sxwjX_ NoNMi1FT2QUmpdwhPMgqv8nG1v18u7hU7mHbB4V5nRvgay6zwIodDusdynnIYkTxMpi6xT2vgLMG MvrBdoMiUG6mK9SN7MeTTn2bZkVLxMjU5lvM.LmedIr9FukTlv8HGX86I125IVTXMACxRQ4IxRjD vC.EIfiaiKMzB.8Twk6nr51oxxImFj7a6sGME6MVf4VvA5gxReCUuEZUzusUY_nYOzJpjpOvUMmB Br6ACHz9Updde4ui9SKmwL1pykTCDTbvY63ecuaMjAPBvcChW90P.T7tC7yikeCBrrxDB1J8gyCE XFq37NK1_4IYs_mLD7cql1A.yQmmdeGYz2SNwivSoGI1ra.qetSUg2N7M4c26IPBR.NDRZN8njVA scEUC60f_uSY5RxTWNwDNwRCxBJF.U6OBpLrw4EjNv8d6ca28vTtrn44uX60Yj9Bw.HS1rP2gy_k gm_925ZB.6JLUXj7o.ytKbvhCS9f7WDbjMvl12agfhe7dWR5Cc9z5pVdA1rjmywZCta6CIT3.V5b hVy6iwy5RKNuGKNRw10bXZeoEAgUhOJcT4Vzegc08ZagIQ8FIyPoDLFoZUi9Bs.TjtVmfsreRBJP crzRdlT3BeeL8uzPyDV7XgMTCU3PkFC1lFR.daH4izcfYoskjI8qUa2vZNk7.C32BTDZ8vQgV5kF DRQOq18fQUK_A6.Zal107SAPLknyscVyNZPwKd8Pjrl0p437qbxn9zfEROEiREpapt3aWlO3uOfR pIOeKJxu8p0U795JRFT.r_ckyeLVTa9b1Z6JoNm4A8JhpxoTjNYn4Yx5LYgV8lx4o9ksHy66feuO .4WS4XCYqDk_okFV846qPNb6XVaoOIVk7BESeLYaAVvNpBYE6utOz.X1kAzccWp1.POnYRO1VwvE AHx11Mjj1LFDduqU1 Received: from sonic.gate.mail.ne1.yahoo.com by sonic305.consmr.mail.gq1.yahoo.com with HTTP; Thu, 19 Mar 2020 17:16:56 +0000 Received: by smtp425.mail.ne1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 38d148599b4eddb4724b91d274060591; Thu, 19 Mar 2020 17:16:51 +0000 (UTC) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: head -r538966 on OrangePi+ 2ed: boot loader crashes when USB drive is present at power-on/boot: its a misaligned access by code from -r354746 From: Mark Millard In-Reply-To: <26DEEA3C-C880-410C-BCB4-CE1314EAFA02@me.com> Date: Thu, 19 Mar 2020 10:16:49 -0700 Cc: freebsd-arm , FreeBSD Current Content-Transfer-Encoding: quoted-printable Message-Id: <541CAE86-B6DA-4BCA-B6B2-D0B0A13DBE1A@yahoo.com> References: <863312E1-4216-49BA-A623-CAC85F123655@yahoo.com> <30A666F0-8773-41B7-AD37-7E319AA510CA@yahoo.com> <26DEEA3C-C880-410C-BCB4-CE1314EAFA02@me.com> To: Toomas Soome X-Mailer: Apple Mail (2.3608.60.0.2.5) X-Rspamd-Queue-Id: 48jtqs6lRrz3HLm X-Spamd-Bar: + X-Spamd-Result: default: False [1.06 / 15.00]; FREEMAIL_FROM(0.00)[yahoo.com]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MV_CASE(0.50)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; FREEMAIL_TO(0.00)[me.com]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/21, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(0.00)[ip: (2.11), ipnet: 98.137.64.0/21(0.83), asn: 36647(0.66), country: US(-0.05)]; NEURAL_SPAM_MEDIUM(0.79)[0.788,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(0.77)[0.773,0]; RCVD_IN_DNSWL_NONE(0.00)[83.64.137.98.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 17:17:00 -0000 On 2020-Mar-19, at 02:00, Toomas Soome wrote: > I think this should fix it. We need to create copy of dos partition = array, so we will get proper alignment.=20 >=20 >=20 > tsoome@freebsd-2:/usr/src % svn diff stand/common/part.c > Index: stand/common/part.c > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > --- stand/common/part.c (revision 359099) > +++ stand/common/part.c (working copy) > @@ -654,6 +654,7 @@ > int has_ext; > #endif > table =3D NULL; > + dp =3D NULL; > buf =3D malloc(sectorsize); > if (buf =3D=3D NULL) > return (NULL); > @@ -708,7 +709,11 @@ > goto out; > } > /* Check that we have PMBR. Also do some validation. */ > - dp =3D (struct dos_partition *)(buf + DOSPARTOFF); > + dp =3D malloc(NDOSPART * sizeof(struct dos_partition)); > + if (dp =3D=3D NULL) > + goto out; > + bcopy(buf + DOSPARTOFF, dp, NDOSPART * sizeof(struct = dos_partition)); > + > /* > * In mac we can have PMBR partition in hybrid MBR; > * that is, MBR partition which has DOSPTYP_PMBR entry defined = as > @@ -770,6 +775,7 @@ > #endif /* LOADER_MBR_SUPPORT */ > #endif /* LOADER_MBR_SUPPORT || LOADER_GPT_SUPPORT */ > out: > + free(dp); > free(buf); > return (table); > } > tsoome@freebsd-2:/usr/src % That is working for me: the OPi+2e now boots with the USB drive plugged in ahead of time, without manual intervention to assign loaderdev : FreeBSD/armv7 U-Boot loader, Revision 1.3 DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. Found U-Boot device: disk Probing all devices... Checking unit=3D0 slice=3D partition=3D... good. Booting from disk0p1: Loading /boot/defaults/loader.conf Loading /boot/device.hints Loading /boot/loader.conf Loading /boot/loader.conf.local Loading kernel... /boot/kernel/kernel text=3D0x90b3fc data=3D0xa85a8 data=3D0x0+0x200000 = syms=3D[0x4+0xa1660+0x4+0x113e7c] Loading configured modules... /boot/kernel/umodem.ko text=3D0x1520 text=3D0xf10 data=3D0x234+0x4 = syms=3D[0x4+0xe70+0x4+0xa74] loading required module 'ucom' /boot/kernel/ucom.ko text=3D0x1714 text=3D0x2c7c data=3D0x484+0x838 = syms=3D[0x4+0x13e0+0x4+0xbac] /boot/entropy size=3D0x1000 Hit [Enter] to boot immediately, or any other key for command prompt. . . . Thanks! > . . . =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-current@freebsd.org Thu Mar 19 19:16:15 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5399526E962 for ; Thu, 19 Mar 2020 19:16:15 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48jxTT5bpYz47yV for ; Thu, 19 Mar 2020 19:16:13 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 02JJG5kv078872 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 19 Mar 2020 12:16:05 -0700 (PDT) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 02JJG5dN078871; Thu, 19 Mar 2020 12:16:05 -0700 (PDT) (envelope-from jmg) Date: Thu, 19 Mar 2020 12:16:05 -0700 From: John-Mark Gurney To: Rick Macklem Cc: "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Message-ID: <20200319191605.GJ4213@funkthat.com> Mail-Followup-To: Rick Macklem , "freebsd-current@FreeBSD.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Thu, 19 Mar 2020 12:16:05 -0700 (PDT) X-Rspamd-Queue-Id: 48jxTT5bpYz47yV X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [1.89 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(-0.44)[ip: (-1.13), ipnet: 208.87.216.0/21(-0.57), asn: 32354(-0.45), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.23)[0.233,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.90)[0.901,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 19:16:15 -0000 Rick Macklem wrote this message on Wed, Mar 04, 2020 at 03:15 +0000: > I am slowly trying to understand TLS certificates and am trying to figure > out how to do the following: > -> For an /etc/exports file with... > /home -tls -network 192.168.1.0 -mask 255.255.255.0 > /home -tlscert Are you looking at implementing draft-cel-nfsv4-rpc-tls? > This syntax isn't implemented yet, but the thinking is that clients on the > 192.168.1 subnet would use TLS, but would not require a certificate. > For access from anywhere else, the client(s) would be required to have a > certificate. > > A typical client mounting from outside of the subnet might be my laptop, > which is using wifi and has no fixed IP/DNS name. > --> How do you create a certificate that the laptop can use, which the NFS > server can trust enough to allow the mount? > My thinking is that a "secret" value can be put in the certificate that the NFS > server can check for. > The simplest way would be a fairly long list of random characters in the > organizationName and/or organizationUnitName field(s) of the subject name. > Alternately, it could be a newly defined extension for X509v3, I think? > > Now, I'm not sure, but I don't think this certificate can be created via > a trust authority such that it would "verify". However, the server can > look for the "secret" in the certificate and allow the mount based on that. > > Does this sound reasonable? Without a problem statement or what you're trying to accomplish, it's hard to say if it is. > Also, even if the NFS client/server have fixed IP addresses with well known > DNS names, it isn't obvious to me how signed certificates can be acquired > for them? > (Lets Encrypt expects the Acme protocol to work and that seems to be > web site/http specific?) There is DNS challenges that can be used. I use them to obtain certs for SMTP and SIP servers... using nsupdate, this is relatively easy to automate pushing the challenges to a DNS server, and I now use DNS challenges for everything, including https. > Thanks for any help with this, rick Let me know if you'd like to hop on a call about this. -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." From owner-freebsd-current@freebsd.org Thu Mar 19 22:04:21 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 52484271F10 for ; Thu, 19 Mar 2020 22:04:21 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48k1CT0R9Lz49QR for ; Thu, 19 Mar 2020 22:04:21 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id 0E381271F0C; Thu, 19 Mar 2020 22:04:21 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0DA36271F0B; Thu, 19 Mar 2020 22:04:21 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48k1CR6Wtkz49Q2; Thu, 19 Mar 2020 22:04:19 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mail-wr1-f46.google.com with SMTP id a25so5222769wrd.0; Thu, 19 Mar 2020 15:04:19 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=Tpu+dIk1S9r5n+TUPesIoPw2PhFjdS9GNRSBrzXUovY=; b=SRCFYKCVpg/YlPNJ9RCOSxnMfSvo3hV91VNfIT0AD9eh4kgXdHOivUe2k82lU3oYGI Bdm+mAMpPUyujzzWYI4QvBTPKlSMAzXGepI5jYKV5LSwOY+BLIhzvUp8dlBGFUDpXws9 rezq0pQJTkGQeoUce46cGcOftWumiL2fxK1nHiWJMZUU98okGPGhrwydKZ8mSJT7FCaP sLu8zK0vD31vYMOB5sRZu9LeT1xj2Rkg3TTN60TcfOy9zgtdr1IQLEZHGR2EpnStewLA MCNDLNsWleZc7Gc/nAdenwSmkhCWX4B4zN73Pj5ccRYqwfu6rWHev2KkGPRS5hwvey37 E6qQ== X-Gm-Message-State: ANhLgQ33J6cVE/dr6ouRgq0krwnyEylPWRYxg9Dq065/keg84fNEjWpp Dx9VD0lGZQk3mfibd08sryNyr3HBgbQ= X-Google-Smtp-Source: ADFU+vvtHR/biWY44Vr3taGFlRXt+gCVSaD8XJwEJNheQT+HACZ3Zcw1y+887l4lnMlsB3pUOfISKA== X-Received: by 2002:adf:8341:: with SMTP id 59mr6771218wrd.314.1584655458033; Thu, 19 Mar 2020 15:04:18 -0700 (PDT) Received: from ?IPv6:2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8? ([2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8]) by smtp.gmail.com with ESMTPSA id v26sm5515166wra.7.2020.03.19.15.04.16 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 19 Mar 2020 15:04:16 -0700 (PDT) Subject: Re: HOWTO donate CPU to the fight against the Corona-virus To: Alexander Leidinger , current@freebsd.org, stable@freebsd.org References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> From: Mateusz Piotrowski <0mp@FreeBSD.org> Message-ID: <4f51b3d8-1a04-a18b-9e99-8abefd5c76c3@FreeBSD.org> Date: Thu, 19 Mar 2020 23:04:44 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 48k1CR6Wtkz49Q2 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of mpp302@gmail.com designates 209.85.221.46 as permitted sender) smtp.mailfrom=mpp302@gmail.com X-Spamd-Result: default: False [-2.93 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; RCVD_TLS_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[FreeBSD.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[46.221.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; IP_SCORE(-0.93)[ipnet: 209.85.128.0/17(-2.97), asn: 15169(-1.64), country: US(-0.05)]; FORGED_SENDER(0.30)[0mp@FreeBSD.org,mpp302@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[46.221.85.209.rep.mailspike.net : 127.0.0.17]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[0mp@FreeBSD.org,mpp302@gmail.com] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 22:04:21 -0000 Hi, On 3/19/20 8:57 AM, Alexander Leidinger via freebsd-stable wrote: > Hi, > > if someone wants to donate some FreeBSD based CPU resources to the > fight against the Corona-virus, here is a quick HOWTO in terms of > installing the Folding@Home client on FreeBSD: > > https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/ > > > I tested this on a recent -current. > > If you are interested in how this helps in the fight against the > virus, please refer to the https://foldingathome.org/ website. In > short and over-simplified: they search for vaccines. > > Bye, > Alexander. > I've got an almost finished port of this software. I'll post a patch soonish. Thanks so much for your blog post! Cheers! Mateusz From owner-freebsd-current@freebsd.org Thu Mar 19 23:13:18 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 75453273732 for ; Thu, 19 Mar 2020 23:13:18 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48k2l016Vxz4XG0 for ; Thu, 19 Mar 2020 23:13:16 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id 25D0E27372D; Thu, 19 Mar 2020 23:13:16 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2575827372C; Thu, 19 Mar 2020 23:13:16 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48k2ky2XQtz4XCs; Thu, 19 Mar 2020 23:13:14 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mail-wm1-f41.google.com with SMTP id m3so4451148wmi.0; Thu, 19 Mar 2020 16:13:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:from:to:references:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=F79C7aI6z74jkvacg0mIu94pnS1w/nPGOsyFDJ3BgKs=; b=LYoGjLg1gON83IUOOxB/bM6rD9k3BiNGovhOIbYREdxUuNQ2k43U7azMPu247UsGO5 k9eMZhe8vXJVYcTu/NIZzMSo7TP5T0jj9fhciHsIHWRJ6qd9kOlXTQHP0oH9LJCBGZ+k YjAdITvx5RZ98psYFddohD23R3KJMYT6Cbf2uu3m66XCbI1ONkUlS7uGhpGumufYvfDa 9z7AftOE0PDU1xdnkjkU2SX03BgPqKRYdRbO85bUNQ+5OiEyxuFCSPR9cnsXONfNHRRt /HhgPik+j0iz7EF8oof8ZDlzRc1Zqj+zyqnYd4dECtYPUjUGMcVeSEEztK8mnCI7hgF6 7qnA== X-Gm-Message-State: ANhLgQ1ay3lv2VThS1ZDotscp/Le0FSG9XYW8tS26qEhGfHvD/IjjD1k RfnDtyXuKU5wfi6EjBGzHf8eyg2HRqI= X-Google-Smtp-Source: ADFU+vvS8/wXYNeIebh2toiruKLbbAYhy0gC+oZJJyOKaGKdfiGFL2kvT6ogZ1TL8Hn20puuIWchxQ== X-Received: by 2002:a1c:7c18:: with SMTP id x24mr6642698wmc.82.1584659591127; Thu, 19 Mar 2020 16:13:11 -0700 (PDT) Received: from ?IPv6:2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8? ([2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8]) by smtp.gmail.com with ESMTPSA id w204sm5453815wma.1.2020.03.19.16.13.09 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 19 Mar 2020 16:13:10 -0700 (PDT) Subject: Re: HOWTO donate CPU to the fight against the Corona-virus From: Mateusz Piotrowski <0mp@FreeBSD.org> To: Alexander Leidinger , current@freebsd.org, stable@freebsd.org References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> <4f51b3d8-1a04-a18b-9e99-8abefd5c76c3@FreeBSD.org> Message-ID: Date: Fri, 20 Mar 2020 00:13:37 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <4f51b3d8-1a04-a18b-9e99-8abefd5c76c3@FreeBSD.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 48k2ky2XQtz4XCs X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of mpp302@gmail.com designates 209.85.128.41 as permitted sender) smtp.mailfrom=mpp302@gmail.com X-Spamd-Result: default: False [-3.24 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; RCVD_TLS_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[FreeBSD.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[41.128.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; IP_SCORE(-1.24)[ip: (-1.53), ipnet: 209.85.128.0/17(-2.97), asn: 15169(-1.64), country: US(-0.05)]; FORGED_SENDER(0.30)[0mp@FreeBSD.org,mpp302@gmail.com]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[0mp@FreeBSD.org,mpp302@gmail.com] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 23:13:18 -0000 Hi! On 3/19/20 11:04 PM, Mateusz Piotrowski wrote: > On 3/19/20 8:57 AM, Alexander Leidinger via freebsd-stable wrote: >> if someone wants to donate some FreeBSD based CPU resources to the >> fight against the Corona-virus, here is a quick HOWTO in terms of >> installing the Folding@Home client on FreeBSD: >> >> https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/ >> >> >> I tested this on a recent -current. >> >> If you are interested in how this helps in the fight against the >> virus, please refer to the https://foldingathome.org/ website. In >> short and over-simplified: they search for vaccines. >> > I've got an almost finished port of this software. I'll post a patch > soonish. The patch is now on Phabricator open to reviews & ready to be tested: https://reviews.freebsd.org/D24127 Cheers, Mateusz From owner-freebsd-current@freebsd.org Thu Mar 19 23:41:32 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2D7482740EF for ; Thu, 19 Mar 2020 23:41:32 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660082.outbound.protection.outlook.com [40.107.66.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48k3MZ1Yc5z4fLZ for ; Thu, 19 Mar 2020 23:41:29 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lGl3AB8ipWhddQFr1uOWbTbbQCA+f2T0FYwl6Z1Ux0YqtkHKUBKu+8WN0/Dn5iLgwFfJh9CQ8jfAl9s27GhGW57Ltq3xtqzxo8rFINRjMeVB4GuTVZeXMQcWk4v/M63ieFhqqKKL9mVASZgpvfcaojZySYDyFyrbrro/oIGIGIeXIrN7OOJ3f/9bYxcb0qIzIDaBDtyNq22HN5X03aUNe/DbG+8JvfX38+U6XYOhW1qnX5nf6+fyHJ76bltSc3xa5V9lgpAginJPK41uC5fyILbg08476Q067jLQM0NdLp0sy26RgxstuUb3lnFONcrlH8lUyaQqF+HzbNbGFpN/wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jCk7VhQ0W7dPm71xAIAAc8lNWBZs14mmPRhp4vJ/uDE=; b=kt2JvPs73DOyTECoAB42Yx7Zxv+yoBw+5ROmDcpgsRNuurMJS1xSHb/ZRHGgS9kxUkbQkSUHzNe1ZMpEXhNu+a7UqKa/XFoIJMqPVSNnd9bxPLYHNcmsGrSU8PW5ZNg3wPuAV7rHfAC0OlPJvN95gs7+IsMy4pMVdS94umwxojKTzhg1uQxDjKYP6bXGoMp/AFKu0r3jtQ3K1BBuYiGiNg3rQrfJv2PPqIuY2bko1JFr+zZrxsZtilrIsYVufL/PY3I5vLDNhFvmiWJhdMzSfjlzbFIQr4I2xCuZRc/LMvqqvHqEZsmuomeEOYlnIaM8WBeGqHVrs3BWiefKo6KCAQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM (10.255.46.82) by YTBPR01MB3279.CANPRD01.PROD.OUTLOOK.COM (10.255.46.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.19; Thu, 19 Mar 2020 23:41:28 +0000 Received: from YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4]) by YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM ([fe80::a50d:6237:4074:f9c4%6]) with mapi id 15.20.2814.025; Thu, 19 Mar 2020 23:41:28 +0000 From: Rick Macklem To: John-Mark Gurney CC: "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Thread-Topic: TLS certificates for NFS-over-TLS floating client Thread-Index: AQHV8dDjD29GK4BL2kGnxfg+gW2rAahQYgqAgABFwt4= Date: Thu, 19 Mar 2020 23:41:28 +0000 Message-ID: References: , <20200319191605.GJ4213@funkthat.com> In-Reply-To: <20200319191605.GJ4213@funkthat.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: fcfe13f3-ca3a-402d-52bb-08d7cc5f0b64 x-ms-traffictypediagnostic: YTBPR01MB3279: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7219; x-forefront-prvs: 0347410860 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(396003)(346002)(376002)(366004)(136003)(199004)(316002)(2906002)(186003)(786003)(52536014)(33656002)(66446008)(66476007)(66556008)(64756008)(5660300002)(478600001)(8936002)(86362001)(8676002)(81156014)(66946007)(76116006)(6506007)(7696005)(81166006)(4326008)(71200400001)(55016002)(66574012)(9686003)(6916009); DIR:OUT; SFP:1101; SCL:1; SRVR:YTBPR01MB3279; H:YTBPR01MB3374.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: y1jsAAuPvZJoGF1By9KssB4DcOdM5xae/eSVIJ97VvpiC8290BnkNAZ/kzfv9tFwGx3PkXgGcoeJ2c7k3GibYJ8EUaCoxutsfpU79kpt96OOZrvqxKEa4V0nDl74wSVc0YQtl4sX+0noqyljLO9hnyjCanntUDKnBw4ugx2wGPRLMAWwb+pNVgfCpZg87MpJGmOHvSngoSNlZyx+Gll3q1Fjp8BKspjxCIrFEuUY6PiHazq7KWHa34UtwLYi7zwby1Nn8L/aCyxuMfXwG1CH5gm0bvO4QgjGtErGr98BzSjZpQlKTwxlKPnT3rp5NiZswnHNiVx3Iu2+J6VicGSMNPz0BhD2SIvpiwWteDuaV6EnpMzjrej73ITpKb8twNcaV4rdTrb0GcxSPz6fudxzP2u4Wx7ob0uL+0KTlcEwqGOv40vK8twQxw9FoHxYFe4M x-ms-exchange-antispam-messagedata: TrOWcGmzLoOoQZ2/zu2eTFlk13OZRXG5Cq465FIgmYSj0PpypDkFU6NDRUCfGyDU1MIvMNH11bFosAycJN1tk0WNTHzVUsXaO6vfVRyi6/XVHnu/CwgSN5LGyP8p5mGbL48uoEDEAGvB4jn+HcCpgX4/RxSl2rFR/7bam+SURO5H5zOwH/8kh7OdpiJ2t6OpCOYu3p9Wg1U0BhS9KbNoSw== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: fcfe13f3-ca3a-402d-52bb-08d7cc5f0b64 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Mar 2020 23:41:28.0618 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: mc2r/gA4aAAkAV+x9G+tHa1uN4q5n+m/JlqUjTqsoXFqcxF++Iqs3LOf/y++FnwoKxWtJ7oHPmZa2wA1SRaa+g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTBPR01MB3279 X-Rspamd-Queue-Id: 48k3MZ1Yc5z4fLZ X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.66.82 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-4.67 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.990,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[82.66.107.40.list.dnswl.org : 127.0.3.0]; IP_SCORE(-1.38)[ipnet: 40.64.0.0/10(-3.76), asn: 8075(-3.11), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8075, ipnet:40.64.0.0/10, country:US]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Mar 2020 23:41:32 -0000 John-Mark Gurney wrote:=0A= >Rick Macklem wrote this message on Wed, Mar 04, 2020 at 03:15 +0000:=0A= >> I am slowly trying to understand TLS certificates and am trying to figur= e=0A= >> out how to do the following:=0A= >> -> For an /etc/exports file with...=0A= >> /home -tls -network 192.168.1.0 -mask 255.255.255.0=0A= >> /home -tlscert=0A= >=0A= >Are you looking at implementing draft-cel-nfsv4-rpc-tls?=0A= Yes. The 2 week out of date (I can only do commits once in a while these da= ys) can=0A= be found in FreeBSD's subversion under base/projects/nfs-over-tls.=0A= =0A= >> This syntax isn't implemented yet, but the thinking is that clients on t= he=0A= >> 192.168.1 subnet would use TLS, but would not require a certificate.=0A= >> For access from anywhere else, the client(s) would be required to have a= =0A= >> certificate.=0A= >>=0A= >> A typical client mounting from outside of the subnet might be my laptop,= =0A= >> which is using wifi and has no fixed IP/DNS name.=0A= >> --> How do you create a certificate that the laptop can use, which the N= FS=0A= >> server can trust enough to allow the mount?=0A= >> My thinking is that a "secret" value can be put in the certificate that = the NFS=0A= >> server can check for.=0A= >> The simplest way would be a fairly long list of random characters in the= =0A= >> organizationName and/or organizationUnitName field(s) of the subject nam= e.=0A= >> Alternately, it could be a newly defined extension for X509v3, I think?= =0A= >>=0A= >> Now, I'm not sure, but I don't think this certificate can be created via= =0A= >> a trust authority such that it would "verify". However, the server can= =0A= >> look for the "secret" in the certificate and allow the mount based on th= at.=0A= >>=0A= >> Does this sound reasonable?=0A= >=0A= >Without a problem statement or what you're trying to accomplish, it's=0A= >hard to say if it is.=0A= The problem I was/am trying to solve was a way for NFS clients without a=0A= fixed IP/DNS name could have a certificate to allow access to the NFS serve= r.=0A= As suggested by others, having a site local CA created by the NFS admin. se= emed=0A= to be the best solution. The server can verify that the certificate was iss= ued by=0A= the local CA. Unfortunately, if the client is compromised and the certifica= te is copied=0A= to another client, that client would gain access.=0A= --> I've thought of having the client keep the certificate encrypted in a f= ile and=0A= require the "user" of the client type in a passphrase to unencrypt t= he certificate=0A= so that it can be used by the daemon in the client that handles the = client side=0A= of the TLS handshake, but I have not implemented this.=0A= --> This would at least subvert the simple case of the certificate f= ile being copied=0A= to a different client and being used to mount the NFS server,= but if the=0A= client is compromised, then the passphrase could be captured = and...=0A= =0A= >> Also, even if the NFS client/server have fixed IP addresses with well kn= own=0A= >> DNS names, it isn't obvious to me how signed certificates can be acquire= d=0A= >> for them?=0A= >> (Lets Encrypt expects the Acme protocol to work and that seems to be=0A= >> web site/http specific?)=0A= >=0A= >There is DNS challenges that can be used. I use them to obtain certs=0A= >for SMTP and SIP servers... using nsupdate, this is relatively easy to=0A= >automate pushing the challenges to a DNS server, and I now use DNS=0A= >challenges for everything, including https.=0A= Since my internet connection is a single dynamically assigned IP from the p= hone=0A= company, I doubt this would work for me (which I why I say I don't know how= =0A= to do this). I suspect there are ways and it would be nice if you could doc= ument=0A= this, so I can put it in a howto document.=0A= - An actual example using the nsupdate command would be nice.=0A= Thanks, rick=0A= =0A= > Thanks for any help with this, rick=0A= =0A= Let me know if you'd like to hop on a call about this.=0A= =0A= --=0A= John-Mark Gurney Voice: +1 415 225 5579=0A= =0A= "All that I will do, has been done, All that I have, has not."=0A= From owner-freebsd-current@freebsd.org Fri Mar 20 01:24:58 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 60D16276420 for ; Fri, 20 Mar 2020 01:24:58 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48k5fy0NXvz42sB for ; Fri, 20 Mar 2020 01:24:58 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-qt1-f181.google.com (mail-qt1-f181.google.com [209.85.160.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id EBFCA1D6E8 for ; Fri, 20 Mar 2020 01:24:57 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-qt1-f181.google.com with SMTP id i26so3681627qtq.8 for ; Thu, 19 Mar 2020 18:24:57 -0700 (PDT) X-Gm-Message-State: ANhLgQ1D7a/c2LNSYv8ew2U+l3uCHq0I2l5++cTd9dA51jdXPoSUzAhA U5TyuJSoGTuasGooQHKFbxTzRqypg+oMNIBHY8A= X-Google-Smtp-Source: ADFU+vt1xibqojRSVOIPwzrKBpFi6rfKp42DtUMbl3Ic3BC21S2TLNIeyX+bcf2tu78jdhdxQKqLD1ZuGsvXzz0v8rA= X-Received: by 2002:aed:2fe7:: with SMTP id m94mr5680440qtd.211.1584667497558; Thu, 19 Mar 2020 18:24:57 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Kyle Evans Date: Thu, 19 Mar 2020 20:24:46 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: VirtualBox segmentation fault, FreeBSD-CURRENT r359068 To: Graham Perrin Cc: FreeBSD Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 01:24:58 -0000 On Thu, Mar 19, 2020 at 12:11 PM Graham Perrin wrote: > > Is this maybe related to > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244847 or should I > make a separate bug report? > Please throw a tentative "Me too" on that PR; I'm investigating it, then we'll see if they're related or requires yet another PR. From owner-freebsd-current@freebsd.org Fri Mar 20 01:44:45 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B5527276ED8 for ; Fri, 20 Mar 2020 01:44:45 +0000 (UTC) (envelope-from rcarter@pinyon.org) Received: from h2.pinyon.org (h2.pinyon.org [65.101.20.170]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48k65l6kqmz4Q7D for ; Fri, 20 Mar 2020 01:44:43 +0000 (UTC) (envelope-from rcarter@pinyon.org) Received: by h2.pinyon.org (Postfix, from userid 58) id 12C3119C2; Thu, 19 Mar 2020 18:44:40 -0700 (MST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=pinyon.org; s=DKIM; t=1584668680; bh=8cwhEnEEMegmxEQs9YAKUzL0iB2bLeuZhF+T4d28050=; h=Subject:To:References:From:Date:In-Reply-To; b=lo8bIgVs/RtSHGYRgczwaOdBsrBDTSAfLmRIUfOAJM3yfuyUW3oV2fd1eAk3VlFsV 9tfmsPwYkZeWL5fAF2Dw6pO0VoXBE5ZsltVU0nJ1NVuZuPE99twSW148xZdE+dwlW7 aTMiakKLmUyDAgp5Hpj8fs2hoL8USIAKi3pca2O8= X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on h2.n1.pinyon.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU shortcircuit=no autolearn=ham autolearn_force=no version=3.4.4 Received: from [10.0.10.15] (unknown [10.0.10.15]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by h2.pinyon.org (Postfix) with ESMTPSA id 06DFC19B3 for ; Thu, 19 Mar 2020 18:44:38 -0700 (MST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=pinyon.org; s=DKIM; t=1584668678; bh=8cwhEnEEMegmxEQs9YAKUzL0iB2bLeuZhF+T4d28050=; h=Subject:To:References:From:Date:In-Reply-To; b=W2+Os81o5GkqJiyWxqF3eCMXKxIckOEP6CzB+E/Dh7IMX9T+/KmUlQ8uKyPIvKFw9 SRspxlhEdh72XuoNZRRWeO65Wd7tUSHVxTTPMVIGkRISVXEy8VJsafg0LvxsAscciN 6Iy+wFoK8GcyLvMjaXg7h8K9N7TmjRkhBZ9bg+wY= Subject: Re: TLS certificates for NFS-over-TLS floating client To: freebsd-current@freebsd.org References: <20200319191605.GJ4213@funkthat.com> From: "Russell L. Carter" Message-ID: Date: Thu, 19 Mar 2020 18:44:37 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48k65l6kqmz4Q7D X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=pinyon.org header.s=DKIM header.b=lo8bIgVs; dkim=pass header.d=pinyon.org header.s=DKIM header.b=W2+Os81o; dmarc=none; spf=pass (mx1.freebsd.org: domain of rcarter@pinyon.org designates 65.101.20.170 as permitted sender) smtp.mailfrom=rcarter@pinyon.org X-Spamd-Result: default: False [-5.12 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[pinyon.org:s=DKIM]; NEURAL_HAM_MEDIUM(-0.93)[-0.934,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.997,0]; DMARC_NA(0.00)[pinyon.org]; DKIM_TRACE(0.00)[pinyon.org:+]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-2.69)[ip: (-9.27), ipnet: 65.101.0.0/18(-4.00), asn: 209(-0.10), country: US(-0.05)]; ASN(0.00)[asn:209, ipnet:65.101.0.0/18, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 01:44:45 -0000 So ok, it's good to code to RFCs. OTOH, state actors are a thing now. Alice & Bob's protocols need to be perfect. State actors watch for mistakes. Here I commit heresy, by A) top posting, and B) by just saying, why not make it easy, first, to tunnel NFSv4 sessions through e.g. net/wireguard or sysutils/spiped? NFS is point to point. Security infrastructure that actually works understands the shared secret model. Not going to argue further. I'm a grateful letsencrypt consumer. Rick is a hero for his NFS work. I use his code every day. Best, Russell On 2020-03-19 16:41, Rick Macklem wrote: > John-Mark Gurney wrote: >> Rick Macklem wrote this message on Wed, Mar 04, 2020 at 03:15 >> +0000: >>> I am slowly trying to understand TLS certificates and am trying >>> to figure >>> out how to do the following: -> For an /etc/exports file with... >>> /home -tls -network 192.168.1.0 -mask 255.255.255.0 /home >>> -tlscert >> >> Are you looking at implementing draft-cel-nfsv4-rpc-tls? > Yes. The 2 week out of date (I can only do commits once in a while these days) can > be found in FreeBSD's subversion under base/projects/nfs-over-tls. > >>> This syntax isn't implemented yet, but the thinking is that >>> clients on the >>> 192.168.1 subnet would use TLS, but would not require a >>> certificate. For access from anywhere else, the client(s) would >>> be required to have a certificate. >>> >>> A typical client mounting from outside of the subnet might be my >>> laptop, which is using wifi and has no fixed IP/DNS name. --> How >>> do you create a certificate that the laptop can use, which the NFS >>> server can trust enough to allow the mount? My thinking is that a >>> "secret" value can be put in the certificate that the NFS >>> server can check for. The simplest way would be a fairly long >>> list of random characters in the organizationName and/or >>> organizationUnitName field(s) of the subject name. >>> Alternately, it could be a newly defined extension for X509v3, I >>> think? >>> >>> Now, I'm not sure, but I don't think this certificate can be >>> created via a trust authority such that it would "verify". >>> However, the server can look for the "secret" in the certificate >>> and allow the mount based on that. >>> >>> Does this sound reasonable? >> >> Without a problem statement or what you're trying to accomplish, >> it's hard to say if it is. > The problem I was/am trying to solve was a way for NFS clients > without a fixed IP/DNS name could have a certificate to allow access > to the NFS server. > As suggested by others, having a site local CA created by the NFS admin. seemed > to be the best solution. The server can verify that the certificate was issued by > the local CA. Unfortunately, if the client is compromised and the certificate is copied > to another client, that client would gain access. --> I've thought of > having the client keep the certificate encrypted in a file and > require the "user" of the client type in a passphrase to unencrypt the certificate > so that it can be used by the daemon in the client that handles the client side > of the TLS handshake, but I have not implemented this. --> This would > at least subvert the simple case of the certificate file being copied > to a different client and being used to mount the NFS server, but if the > client is compromised, then the passphrase could be captured and... > >>> Also, even if the NFS client/server have fixed IP addresses with well known >>> DNS names, it isn't obvious to me how signed certificates can be acquired >>> for them? (Lets Encrypt expects the Acme protocol to work and >>> that seems to be web site/http specific?) >> >> There is DNS challenges that can be used. I use them to obtain >> certs for SMTP and SIP servers... using nsupdate, this is >> relatively easy to automate pushing the challenges to a DNS server, >> and I now use DNS challenges for everything, including https. > Since my internet connection is a single dynamically assigned IP > from the phone > company, I doubt this would work for me (which I why I say I don't know how > to do this). I suspect there are ways and it would be nice if you could document > this, so I can put it in a howto document. - An actual example using > the nsupdate command would be nice. Thanks, rick > >> Thanks for any help with this, rick > > Let me know if you'd like to hop on a call about this. > > -- John-Mark Gurney Voice: +1 415 225 > 5579 > > "All that I will do, has been done, All that I have, has not." > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current To > unsubscribe, send any mail to > "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-current@freebsd.org Fri Mar 20 07:01:21 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F3A5125D1FE for ; Fri, 20 Mar 2020 07:01:21 +0000 (UTC) (envelope-from guru@unixarea.de) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48kF752qXNz49Qs for ; Fri, 20 Mar 2020 07:01:21 +0000 (UTC) (envelope-from guru@unixarea.de) Received: by mailman.nyi.freebsd.org (Postfix) id 5EC3C25D1F9; Fri, 20 Mar 2020 07:01:21 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5E76E25D1F8 for ; Fri, 20 Mar 2020 07:01:21 +0000 (UTC) (envelope-from guru@unixarea.de) Received: from ms-10.1blu.de (ms-10.1blu.de [178.254.4.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kF7411NLz49QF for ; Fri, 20 Mar 2020 07:01:19 +0000 (UTC) (envelope-from guru@unixarea.de) Received: from [188.174.60.228] (helo=localhost.unixarea.de) by ms-10.1blu.de with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.86_2) (envelope-from ) id 1jFBed-0001XN-Bz; Fri, 20 Mar 2020 08:01:15 +0100 Received: from localhost.my.domain (localhost [127.0.0.1]) by localhost.unixarea.de (8.15.2/8.14.9) with ESMTPS id 02K71CJD002743 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Fri, 20 Mar 2020 08:01:12 +0100 (CET) (envelope-from guru@unixarea.de) Received: (from guru@localhost) by localhost.my.domain (8.15.2/8.14.9/Submit) id 02K71ChE002742; Fri, 20 Mar 2020 08:01:12 +0100 (CET) (envelope-from guru@unixarea.de) X-Authentication-Warning: localhost.my.domain: guru set sender to guru@unixarea.de using -f Date: Fri, 20 Mar 2020 08:01:12 +0100 From: Matthias Apitz To: Alexander Leidinger Cc: current@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus Message-ID: <20200320070112.GA2704@c720-r342378> Reply-To: Matthias Apitz References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> X-Operating-System: FreeBSD 13.0-CURRENT r342378 (amd64) X-message-flag: Mails containing HTML will not be read! Please send only plain text. User-Agent: Mutt/1.11.1 (2018-12-01) X-Con-Id: 51246 X-Con-U: 0-guru X-Originating-IP: 188.174.60.228 X-Rspamd-Queue-Id: 48kF7411NLz49QF X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of guru@unixarea.de has no SPF policy when checking 178.254.4.101) smtp.mailfrom=guru@unixarea.de X-Spamd-Result: default: False [-1.23 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[guru@unixarea.de]; HAS_XOIP(0.00)[]; TO_DN_SOME(0.00)[]; HAS_XAW(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; RCPT_COUNT_TWO(0.00)[2]; RECEIVED_SPAMHAUS_PBL(0.00)[228.60.174.188.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; IP_SCORE(-1.25)[ip: (-8.19), ipnet: 178.254.0.0/19(1.02), asn: 42730(0.95), country: DE(-0.02)]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:42730, ipnet:178.254.0.0/19, country:DE]; RCVD_IN_DNSWL_LOW(-0.10)[101.4.254.178.list.dnswl.org : 127.0.5.1]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.49)[-0.491,0]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-0.80)[-0.795,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[unixarea.de]; AUTH_NA(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MIME_TRACE(0.00)[0:+]; R_SPF_NA(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 07:01:22 -0000 El día jueves, marzo 19, 2020 a las 08:57:45a. m. +0100, Alexander Leidinger escribió: > Hi, > > if someone wants to donate some FreeBSD based CPU resources to the > fight against the Corona-virus, here is a quick HOWTO in terms of > installing the Folding@Home client on FreeBSD: > > https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/ > > I tested this on a recent -current. Alexander, As far as I understand, the binary(!) tool pulls tasks from the net and communicates the results back over net, correct? What about the security aspect of this? Thanks matthias -- Matthias Apitz, ✉ guru@unixarea.de, http://www.unixarea.de/ +49-176-38902045 Public GnuPG key: http://www.unixarea.de/key.pub From owner-freebsd-current@freebsd.org Fri Mar 20 07:24:16 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 975D225DC6A for ; Fri, 20 Mar 2020 07:24:16 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48kFdX1d7Cz4dm9 for ; Fri, 20 Mar 2020 07:24:16 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: by mailman.nyi.freebsd.org (Postfix) id 35ED125DC68; Fri, 20 Mar 2020 07:24:16 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3582D25DC65; Fri, 20 Mar 2020 07:24:16 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (mailgate.leidinger.net [IPv6:2a00:1828:2000:313::1:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kFdV6yNnz4dlt; Fri, 20 Mar 2020 07:24:14 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165AA3.dip0.t-ipconnect.de [91.22.90.163]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 36995123C; Fri, 20 Mar 2020 08:24:06 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 9CBF112028; Fri, 20 Mar 2020 08:23:33 +0100 (CET) Date: Fri, 20 Mar 2020 08:23:32 +0100 Message-ID: <20200320082332.Horde.6GvrI_eFv7Lwen1slUeIYCM@webmail.leidinger.net> From: Alexander Leidinger To: "Kevin P. Neal" Cc: Mateusz Piotrowski <0mp@freebsd.org>, current@freebsd.org, stable@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> <4f51b3d8-1a04-a18b-9e99-8abefd5c76c3@FreeBSD.org> <20200320005128.GA25055@neutralgood.org> In-Reply-To: <20200320005128.GA25055@neutralgood.org> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_XuqNROI8eP1d_FoKdQsHmOJ"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48kFdV6yNnz4dlt X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.83 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; IP_SCORE(-3.73)[ip: (-9.83), ipnet: 2a00:1828::/32(-4.91), asn: 34240(-3.91), country: DE(-0.02)]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[163.90.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:2a00:1828::/32, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 07:24:16 -0000 This message is in MIME format and has been PGP signed. --=_XuqNROI8eP1d_FoKdQsHmOJ Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting "Kevin P. Neal" (from Thu, 19 Mar 2020=20=20 20:51:28=20-0400): > On Fri, Mar 20, 2020 at 12:13:37AM +0100, Mateusz Piotrowski wrote: >> The patch is now on Phabricator open to reviews & ready to be tested: >> >> https://reviews.freebsd.org/D24127 > > No source is available? They must not be serious, then. It's answered on the website. As they have stats for each user,=20=20 cheaters=20may modify the code to get better stats while the result may=20= =20 then=20not be useable for the project (false positives could be resolved=20= =20 by=20a verification step, but false negatives not, and giving the same=20= =20 WU=20to multiple people to have a statistical confidence would slow down=20= =20 the=20progress a lot). A lot of the code is actually open source, but=20=20 not=20all. They refer to projects which they use. Also think about the fact that this project comes from a medical=20=20 background=20where you have a lot of closedness, intelectual property,=20= =20 regulation=20and liabilities. Personally I consider the fact that this=20= =20 project=20(started in the year 2000) is producing open source code at=20=20 all=20already as a start of an evolition in the medical business (yes,=20= =20 there=20are other more open source projects in this field too). Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_XuqNROI8eP1d_FoKdQsHmOJ Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJedG90AAoJEBINsJsD+NiG2qsP+gIVhIhYazh5JhQdPfM11h+W 6VUpozsbsDR7gib+7FB/e/II9p22InIxY+XTFdTM8h4fLBrMDKzXfRp5pJ1y0KRQ 9JDxFHt1VvAJp44rorranlMyda7BUhw7iCpT61ySOZ7YC04f6i1HKnC+FeVqRVh0 SUR8tRvFl70ewnDM9D4yHIWl0gxsZ0EVg2dbcqPAZGOu/NC92e1hklFNDYDpkFzH Krtg1Iq385gOo5Stw2htuq9TNNwNDHCSoS7ZrVR5m9z+F6kh1/LRno+U5/1Dteut ULzcYY46MvwicZY2UqUMOwbGoDg47l2raj+ahQntl4d5oucEddwvPHubhbOJdq/m RZxXilIzWaMQxbLqmfwK4riWWqKt5D8jfLOwu7jDKyfvomn3/ZKM8MJICs2tPj9Q bbYp7g/F+8CVGZt1lmom5A6jonl5DcoQDlk37xQeJUjO0tQ1u40Pnw5Wv6sdHRwe wqvzQsH2vzEGvWdqmqkHvAlISVsTiENPfBGLleoW2PB/DGL0CGBv03t76TfwVv3d eAWyyB7l9COsXx6V9y6i7jX1gHNpaU55YaI4Ml/SoU+FCCbgbCYTtMIom4BXJOGA bsHMlV5D8e9gtXNJK8RZ/z/MrWY9p21/G/e0y8lUjBrAy9bBC8jx7H1UYFhj7HQB 0zbMAncLW9QkcCQLIrro =EThA -----END PGP SIGNATURE----- --=_XuqNROI8eP1d_FoKdQsHmOJ-- From owner-freebsd-current@freebsd.org Fri Mar 20 07:38:02 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D706125E2E6 for ; Fri, 20 Mar 2020 07:38:02 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kFxQ0vHJz3PTg for ; Fri, 20 Mar 2020 07:38:02 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: by mailman.nyi.freebsd.org (Postfix) id 1CD4525E2E5; Fri, 20 Mar 2020 07:38:02 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1B6B925E2E3 for ; Fri, 20 Mar 2020 07:38:02 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kFxN6m5Zz3PTZ for ; Fri, 20 Mar 2020 07:38:00 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165AA3.dip0.t-ipconnect.de [91.22.90.163]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 930081247; Fri, 20 Mar 2020 08:37:57 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 0D3D2117D8; Fri, 20 Mar 2020 08:37:25 +0100 (CET) Date: Fri, 20 Mar 2020 08:37:24 +0100 Message-ID: <20200320083724.Horde.mJP7Uiof0Nh1J0qOg9dHt-v@webmail.leidinger.net> From: Alexander Leidinger To: Matthias Apitz Cc: current@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> <20200320070112.GA2704@c720-r342378> In-Reply-To: <20200320070112.GA2704@c720-r342378> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_zLykYi0vdp3jyDS_weq4cWh"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48kFxN6m5Zz3PTZ X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.80 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-0.99)[-0.995,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-3.71)[ip: (-9.75), ipnet: 89.238.64.0/18(-4.87), asn: 34240(-3.91), country: DE(-0.02)]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[163.90.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 07:38:02 -0000 This message is in MIME format and has been PGP signed. --=_zLykYi0vdp3jyDS_weq4cWh Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Matthias Apitz (from Fri, 20 Mar 2020=20=20 08:01:12=20+0100): > El d=C3=ADa jueves, marzo 19, 2020 a las 08:57:45a. m. +0100, Alexander= =20=20 >=20Leidinger escribi=C3=B3: > >> Hi, >> >> if someone wants to donate some FreeBSD based CPU resources to the >> fight against the Corona-virus, here is a quick HOWTO in terms of >> installing the Folding@Home client on FreeBSD: >> >> https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-= freebsd-foldinghome/ >> >> I tested this on a recent -current. > > Alexander, > > As far as I understand, the binary(!) tool pulls tasks from the net and > communicates the results back over net, correct? > > What about the security aspect of this? This is correct. And a malicious person may distribute malware to you.=20= =20 If=20e.g. the group behind emotet would be able to infiltrate the=20=20 servers=20of the project and inject their malicious payload somehow, it=20= =20 would=20be a big disaster (as there are even science organisations /=20=20 universities=20/ ... participating as far as I understand it). Personally I have this binary running on FreeBSD in a jail, but also=20=20 on=20a Windows laptop. This is something were everyone needs to do their=20= =20 risk-management=20on their own. Currently with the Corona-virus I=20=20 consider=20for myself the benefit of participating with a lot resources=20= =20 more=20important than the risk (on the laptop). When the current=20=20 situation=20normalizes, I probably stop the client on the laptop, but=20=20 will=20let it run in the jail (with less resources donated to it). YMMV. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_zLykYi0vdp3jyDS_weq4cWh Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJedHK0AAoJEBINsJsD+NiGGM0P/R7TGi1yf90lsnUk9bUDGbHm BI/VHKM+xS3aoucm7tgLrmY+T1nuPjZ1pUhKFZeIrNmMV1xWvOH9WwdWaWWTbt6P pF2orDVXz7vtYQXjbBm90774fR7lCSXDBlNFpm1+1Gri3rnncDAt/Vfij1Kne7NQ d50q2MNMFJFzmLWBbRfr96gfgFa52ZnbaPZLzoKlQ/9LXERseFXW7ZxKhkz2TajA rz/iMrkMAyTCe40Y6fou698eK2An3w47gvfOpvBKf5BMAfQiF2DOiySFaule7fM1 +ieaL192qtbqSqbnenPRiJdi6+SB0oCa9afDLMpzAlntYN7IPB8NiiJ2nZfPd3qC +dCWXBhf0QwjdjycAKK2o6A2SA3ZmWsPDtlW7UU7/jvB728BTboWQOvggUsVmbUB Eck58pdIFptyd/bwi3qYGNwA8+RxKDD8f7lfUhlNU/ixybqJgbCyafV4RwjfAUAb Qyq2KUArKHNY6s5pkiZoPPmuNrQph8Tfqa3yAIQP5MJCTpfJmdL2YH8IB6O50UCl HdNHg8RakhxMJEagHpmTbCcBMNHjPSLL6jFZrvY3GrziuStK/Jxe8JxtyTOZoxL+ tlQ08g2bDZpZPcgbNZ/sJ2ZRfPpM3BsNs1Yo/DLX3rXOVjTi8hAxTaxEtWZCN6LY ozwFwn8wDiVyjND+z7N1 =anKX -----END PGP SIGNATURE----- --=_zLykYi0vdp3jyDS_weq4cWh-- From owner-freebsd-current@freebsd.org Fri Mar 20 09:55:54 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 828FA2619E0 for ; Fri, 20 Mar 2020 09:55:54 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: from mail-wm1-x32d.google.com (mail-wm1-x32d.google.com [IPv6:2a00:1450:4864:20::32d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kK0T6B5Bz4WP6 for ; Fri, 20 Mar 2020 09:55:53 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: by mail-wm1-x32d.google.com with SMTP id d198so56402wmd.0 for ; Fri, 20 Mar 2020 02:55:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:from:autocrypt:subject:message-id:date:user-agent:mime-version :content-transfer-encoding:content-language; bh=11nMAOSCXaPHQ2do2GNtfJVndSGqpk4i2RsK5LexjqA=; b=Pat1StPxcNfmbIgchSzw6k9QSPjlyl4Jv5sTGZJiay5rLv0ZJPAuX3skPbMlcqyez/ DGe7pOHt055o6f5qjTM5g5yB8Q25JxrGTnW7IIPKTBmnl4wEIvRKLZR0VXNg68P67++e 6J4ZgNlbLYUiY/uLHyWhDLFpC6pXXwEWard54Iv68BwO9GeJqndBCGTYqvsv/volOr2N FlJwp+Rq3uuX89d9q16od5FCtHkH8+r5UWY+w3vzSfHmwKvDDaXbPVJi4BjJjf2L537Q ox6L8Ms50/ROLtY9XvJE9PGOMQArDzNz/vdKc4H3oz5WbQpUCtDxg3KxqrXbBidLuSxZ W99Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:autocrypt:subject:message-id:date :user-agent:mime-version:content-transfer-encoding:content-language; bh=11nMAOSCXaPHQ2do2GNtfJVndSGqpk4i2RsK5LexjqA=; b=VuTQ0HS2KDBcDZMNFU3ZURF1U48cCbknsM3nbYc/G1xLinKm83RUSiRrQVuCc1k3Gd AwqsNU+7sIBjGukxfRluS+DMV7cfIX1DyegpBbBO1E3LCFSJpyf2iwCQBNe1WlgOS7Xl aFrtwL0NyyXCkVqqDk/BcrWXCFWyI/2qkIV4b78EsiB7JK6zWQOhLnNZHSKlneaHVS9U XkMRAc6/gnTyi64326KHU/1779kfA7qPt0+VIH/Wzt14XZ4r9/2CKGNEqbvETmWyzxR7 QryCBKGW7qtA3ELzJYWqjqAQ8UwjuZTzJXeJKsjBg7TvPEdPQlMgGQrTnq7gOcjo4x3x b3dg== X-Gm-Message-State: ANhLgQ3xUOPuxLPV1Ck6dbnKDD4tQHaHjhZFgsKpgb7sPNee2rTO/qbo LDSfNJdFF5ru+w453+RbGIwP387xDT4= X-Google-Smtp-Source: ADFU+vvL2q8sksDSsjkznImrOYLvwWXlszTJqtxQf6IFDyxpng9326glVnuNQhfsG9aOQ/TeBZfumQ== X-Received: by 2002:a1c:4e01:: with SMTP id g1mr1809200wmh.77.1584698151596; Fri, 20 Mar 2020 02:55:51 -0700 (PDT) Received: from ?IPv6:2003:c3:4f46:d207:e54:15ff:fe22:27b1? (p200300C34F46D2070E5415FFFE2227B1.dip0.t-ipconnect.de. [2003:c3:4f46:d207:e54:15ff:fe22:27b1]) by smtp.gmail.com with ESMTPSA id f15sm7593516wru.83.2020.03.20.02.55.50 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 20 Mar 2020 02:55:51 -0700 (PDT) To: freebsd-current@freebsd.org From: h v Autocrypt: addr=henry.vogt@gmail.com; prefer-encrypt=mutual; keydata= mQGiBD85EtkRBADHyFu5eTEtFCd10Z25l1ryaWN6bcfyrGuD06OBsaUHIO3kg45NPbEGXcT4 s4klWZFcWmXWVKkSt6sCCqmjZYb0CLYAJ1rhOC8UBT5ULIts+dVIM9vDEujMk49IsugtEqUW CJFE5wNDpAeH0uXSvv6zn3ZeMiYw3C/yUErYEc7yXwCgvW1hhYg3iCHXrw7T3pwl1JVj5uUD /jpxqMRvnSl923wI+u6XW+uBX93isTErwlCmQecSIDX1d9vWY+LVXrHT2GkCeTtZfAM4HHqy 01y+047gaKRG3PLtTxmI5MgFB3U8jpvd8R/XGpVW+jLljnoiVDEu9LZtsSZtiVtNTZLbYlwc ICa56u8vBnmX3mVhBgSsjUVH1FrhA/93/Ht30cSSpTkPwKipw2Ad4ObBi+fQGIpn74As2+7q Yty6BoAec9Xp+02FyA/uCHZL70LPdZLeeipTAeNMhRhWlzxLVGsjSzbkRjG5uQB1yYtJEoi5 UMGKanxfcGu9ReZZ1lLV10w0muhu7k/JQRk0tEJY/71ywpRTITuixhgHsbQgSGVucnkgVm9n dCA8aHZAdHVlYmluZ2VuLm1wZy5kZT6IXAQTEQIAHAQLBwMCAxUCAwMWAgECHgECF4AFAkWL yzACGQEACgkQiF3PvXvQ0FAtSgCeLRcArT2zPk/zLZUyjOq/U7sakFYAn3PCCCbBa03798LN XRhxCjInjTx6uQENBD85EukQBADXBHQcJeBdnmiBCoCpfTVwhf66orSqBHfnrnrS8qDzfo3p Q6YsL225StuNwt9PNouMAA06IXV3IW8DodGL7j4RT2d2wnpsk3giRN7tqs3EYHuV1eCDEvi2 PLh8PMRoXO7NsYRG4bQ14cp5U6g8FI+ASQF8Yv/1fpYn+X5S2v+/iwADBQQApTJUNcKREGXR dTE1FCt96FC7QDaQwBgEIHKdsIvvFIkI5Of6eP3qbkOXehAtf6GStgjADhDeb9xDLj2fMbPe U/zVPuCHe+e3wECQun+6UhSUdxIIql3cdMBieIaa4Y/DcV0drdXr2bOiSTnR/E4GJqxaZEoC 2ocQfZQj4Bkw9CKIRgQYEQIABgUCPzkS6QAKCRCIXc+9e9DQUBftAJ4iJKziUBZwvQp3Q8Do sH8qz/pPugCfSBs4RUrAJURi5fZ0sDAJQgE+8jc= Subject: cannot build 12.1-RELEASE on latest current-snapshot Message-ID: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> Date: Fri, 20 Mar 2020 10:55:47 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-US X-Rspamd-Queue-Id: 48kK0T6B5Bz4WP6 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=Pat1StPx; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of henryvogt@gmail.com designates 2a00:1450:4864:20::32d as permitted sender) smtp.mailfrom=henryvogt@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.08), ipnet: 2a00:1450::/32(-2.39), asn: 15169(-1.34), country: US(-0.05)]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_NONE(0.00)[d.2.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 09:55:54 -0000 Dear List, buildworld for 12.1-RELEASE fails on recent current.. in stage 3: cross tools (see below) Did i miss=C2=A0 newer Options/ Parameters (i checked UPDATING without relevant changes) i'm also not attemting a cross build, simply compiling on amd64 for amd64= =2E --- C U T --- -------------------------------------------------------------- >>> stage 3: cross tools -------------------------------------------------------------- cd /usr/src/12.1; INSTALL=3D"sh /usr/src/12.1/tools/install.sh"=C2=A0 TOOLS_PREFIX=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp=C2=A0 PATH=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/usr= /src/12.1/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/12.1/amd64.amd6= 4/tmp/legacy/bin:/sbin:/bin:/usr/sbin:/usr/bin=C2=A0 WORLDTMP=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp=C2=A0 MAKEFLAGS=3D"-m /usr/src/12.1/tools/build/mk=C2=A0 -m /usr/src/12.1/share/mk" make=C2=A0 = -f Makefile.inc1=C2=A0 DESTDIR=3D=C2=A0 OBJTOP=3D'/usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools'=C2=A0 OBJROOT=3D'${OBJTOP}/'=C2=A0 MAKEOBJDIRPREFIX=3D=C2=A0 BOOTSTRAPPING=3D13= 00084=C2=A0 BWPHASE=3Dcross-tools=C2=A0 SSP_CFLAGS=3D=C2=A0 MK_HTML=3Dno NO_LINT=3Dye= s MK_MAN=3Dno=C2=A0 -DNO_PIC MK_PROFILE=3Dno -DNO_SHARED=C2=A0 -DNO_CPU_CFLAGS MK_WARNS=3Dno MK_CTF=3Dno=C2=A0 MK_CLANG_EXTRAS=3Dno MK_CLANG_FULL=3Dno=C2=A0 MK_LLDB=3D= no MK_RETPOLINE=3Dno MK_TESTS=3Dno=C2=A0 MK_INCLUDES=3Dyes MK_LLVM_TARGET_AL= L=3Dno=C2=A0 TARGET=3Damd64 TARGET_ARCH=3Damd64=C2=A0 MK_GDB=3Dno MK_TESTS=3Dno cross-= tools =3D=3D=3D> lib/clang (obj,all,install) =3D=3D=3D> lib/clang/libllvm (all) [Creating objdir /usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools/lib/clang/libllvm...] make[4]: "/usr/src/12.1/lib/clang/libllvm/Makefile" line 18: Please enable at least one of: MK_LLVM_TARGET_AARCH64, MK_LLVM_TARGET_ARM, MK_LLVM_TARGET_BPF, MK_LLVM_TARGET_MIPS,=C2=A0 MK_LLVM_TARGET_POWERPC, MK_LLVM_TARGET_RISCV, MK_LLVM_TARGET_SPARC,=C2=A0 or MK_LLVM_TARGET_X86 *** Error code 1 Stop. make[3]: stopped in /usr/src/12.1/lib/clang *** Error code 1 Stop. make[2]: stopped in /usr/src/12.1 *** Error code 1 Stop. make[1]: stopped in /usr/src/12.1 *** Error code 1 Stop. make: stopped in /usr/src/12.1 ---C U=C2=A0 T --- Best Henry From owner-freebsd-current@freebsd.org Fri Mar 20 11:07:19 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5A3B1262F8E for ; Fri, 20 Mar 2020 11:07:19 +0000 (UTC) (envelope-from rb@gid.co.uk) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kLZt5sn6z3P9w for ; Fri, 20 Mar 2020 11:07:18 +0000 (UTC) (envelope-from rb@gid.co.uk) Received: by mailman.nyi.freebsd.org (Postfix) id 94E5F262F8D; Fri, 20 Mar 2020 11:07:18 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 93BE3262F8B; Fri, 20 Mar 2020 11:07:18 +0000 (UTC) (envelope-from rb@gid.co.uk) Received: from mx0.gid.co.uk (mx0.gid.co.uk [194.32.164.250]) by mx1.freebsd.org (Postfix) with ESMTP id 48kLZr4MNTz3P68; Fri, 20 Mar 2020 11:07:16 +0000 (UTC) (envelope-from rb@gid.co.uk) Received: from [194.32.164.27] ([194.32.164.27]) by mx0.gid.co.uk (8.14.2/8.14.2) with ESMTP id 02KAnPHt034398; Fri, 20 Mar 2020 10:49:25 GMT (envelope-from rb@gid.co.uk) From: Bob Bishop Message-Id: Content-Type: multipart/signed; boundary="Apple-Mail=_B2901AB3-0F33-4AE7-8A14-9D6707DDFBAB"; protocol="application/pgp-signature"; micalg=pgp-sha1 Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Re: HOWTO donate CPU to the fight against the Corona-virus Date: Fri, 20 Mar 2020 10:49:23 +0000 In-Reply-To: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> Cc: current@freebsd.org, stable@freebsd.org To: Alexander Leidinger References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> X-Mailer: Apple Mail (2.3273) X-Rspamd-Queue-Id: 48kLZr4MNTz3P68 X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rb@gid.co.uk designates 194.32.164.250 as permitted sender) smtp.mailfrom=rb@gid.co.uk X-Spamd-Result: default: False [2.53 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.995,0]; GREYLIST(0.00)[pass,body]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(0.00)[+mx:c]; MV_CASE(0.50)[]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[gid.co.uk]; TO_DN_SOME(0.00)[]; BAD_REP_POLICIES(0.10)[]; NEURAL_HAM_LONG(-0.96)[-0.964,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(-0.51)[ip: (-1.85), ipnet: 194.32.164.0/24(-0.93), asn: 42831(0.29), country: GB(-0.07)]; RCVD_IN_DNSWL_NONE(0.00)[250.164.32.194.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:42831, ipnet:194.32.164.0/24, country:GB]; MID_RHS_MATCH_FROM(0.00)[]; URIBL_SBL_CSS(6.50)[foldingathome.org]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 11:07:19 -0000 --Apple-Mail=_B2901AB3-0F33-4AE7-8A14-9D6707DDFBAB Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi, Just a note that the client can grow its logfile at the rate of ~1GB a = day. You=E2=80=99ll probably want to take avoiding action. > On 19 Mar 2020, at 07:57, Alexander Leidinger via freebsd-stable = wrote: >=20 > Hi, >=20 > if someone wants to donate some FreeBSD based CPU resources to the = fight against the Corona-virus, here is a quick HOWTO in terms of = installing the Folding@Home client on FreeBSD: >=20 > = https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-fr= eebsd-foldinghome/ >=20 > I tested this on a recent -current. >=20 > If you are interested in how this helps in the fight against the = virus, please refer to the https://foldingathome.org/ website. In short = and over-simplified: they search for vaccines. >=20 > Bye, > Alexander. >=20 > -- > http://www.Leidinger.net Alexander@Leidinger.net: PGP = 0x8F31830F9F2772BF > http://www.FreeBSD.org netchild@FreeBSD.org : PGP = 0x8F31830F9F2772BF -- Bob Bishop rb@gid.co.uk --Apple-Mail=_B2901AB3-0F33-4AE7-8A14-9D6707DDFBAB Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQR+a6Wh87I/iYwcbE+8xpPppLfFvwUCXnSfswAKCRC8xpPppLfF v/qMAKCzbWKhBhEFZskMR3Jucd+dVCHa+wCdEEyTH3cTzMM10mt/MPSxFnbQk/8= =SEmD -----END PGP SIGNATURE----- --Apple-Mail=_B2901AB3-0F33-4AE7-8A14-9D6707DDFBAB-- From owner-freebsd-current@freebsd.org Fri Mar 20 12:51:23 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E68592665FC for ; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) (envelope-from jonathan@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kNtz5sqfz41lg for ; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) (envelope-from jonathan@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C7A272665FA; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C744E2665F8; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) (envelope-from jonathan@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kNtz4yfRz41lf; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) (envelope-from jonathan@freebsd.org) Received: from mail-ua1-f53.google.com (mail-ua1-f53.google.com [209.85.222.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: jonathan/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 9018A2A893; Fri, 20 Mar 2020 12:51:23 +0000 (UTC) (envelope-from jonathan@freebsd.org) Received: by mail-ua1-f53.google.com with SMTP id o16so2119756uap.6; Fri, 20 Mar 2020 05:51:23 -0700 (PDT) X-Gm-Message-State: ANhLgQ0nH/ZMCUR19nIX7jIxQtU52nASxZfoVCJvehKioYt9XloUMVVi kLIBBeb94bf9BxJwwqrJRpqzS3/EUvgzi01iMA== X-Google-Smtp-Source: ADFU+vvJV8IFFXvg+J9Cwc8Uq92G8GoCr7Z3hhL+fEAfMcyakWf1OG1rMZQTuK4lS9r5o+p8Kf7ipL/UG54DjN2x4kE= X-Received: by 2002:ab0:73cc:: with SMTP id m12mr5505185uaq.52.1584708683089; Fri, 20 Mar 2020 05:51:23 -0700 (PDT) MIME-Version: 1.0 References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> In-Reply-To: From: Jonathan Anderson Date: Fri, 20 Mar 2020 10:21:11 -0230 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: HOWTO donate CPU to the fight against the Corona-virus To: Bob Bishop Cc: Alexander Leidinger , current@freebsd.org, stable@freebsd.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 12:51:24 -0000 Hi all, Running this on a 12.1-STABLE system, I see a whole lot of this in /var/log/messages: fahclient[53019]: ^[[91m12:15:25:ERROR:WU00:FS00:Exception: Could not get an assignment^[[0m Is this because there temporarily isn't enough work to go around, or because more FreeBSD support is required on the work distribution end as well? Jon On Fri, 20 Mar 2020 at 08:37, Bob Bishop wrote: > Hi, > > Just a note that the client can grow its logfile at the rate of ~1GB a > day. You=E2=80=99ll probably want to take avoiding action. > > > On 19 Mar 2020, at 07:57, Alexander Leidinger via freebsd-stable < > freebsd-stable@freebsd.org> wrote: > > > > Hi, > > > > if someone wants to donate some FreeBSD based CPU resources to the figh= t > against the Corona-virus, here is a quick HOWTO in terms of installing th= e > Folding@Home client on FreeBSD: > > > > > https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-f= reebsd-foldinghome/ > > > > I tested this on a recent -current. > > > > If you are interested in how this helps in the fight against the virus, > please refer to the https://foldingathome.org/ website. In short and > over-simplified: they search for vaccines. > > > > Bye, > > Alexander. > > > > -- > > http://www.Leidinger.net Alexander@Leidinger.net: PGP 0x8F31830F9F2772B= F > > http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772B= F > > -- > Bob Bishop > rb@gid.co.uk > > > > > --=20 jonathan@FreeBSD.org http://freebsd.org/~jonathan/ From owner-freebsd-current@freebsd.org Fri Mar 20 13:25:04 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 53FE92674F9 for ; Fri, 20 Mar 2020 13:25:04 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kPdq5Gd2z3CQX for ; Fri, 20 Mar 2020 13:25:03 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: by mailman.nyi.freebsd.org (Postfix) id 965682674F7; Fri, 20 Mar 2020 13:25:03 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 95F562674F5; Fri, 20 Mar 2020 13:25:03 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kPdn5R5mz3CKP; Fri, 20 Mar 2020 13:25:01 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165AA3.dip0.t-ipconnect.de [91.22.90.163]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id AA2E5180B; Fri, 20 Mar 2020 14:24:53 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 9C14D11EDF; Fri, 20 Mar 2020 14:24:50 +0100 (CET) Date: Fri, 20 Mar 2020 14:24:50 +0100 Message-ID: <20200320142450.Horde.rrZhP9194YfSX_xYTlQN9Yq@webmail.leidinger.net> From: Alexander Leidinger To: Jonathan Anderson Cc: Bob Bishop , current@freebsd.org, stable@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> In-Reply-To: Accept-Language: de,en Content-Type: multipart/signed; boundary="=_R0k5bPBvbyWB-LW8lTR-3r4"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48kPdn5R5mz3CKP X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.81 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; IP_SCORE(-3.72)[ip: (-9.77), ipnet: 89.238.64.0/18(-4.88), asn: 34240(-3.92), country: DE(-0.02)]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[163.90.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 13:25:04 -0000 This message is in MIME format and has been PGP signed. --=_R0k5bPBvbyWB-LW8lTR-3r4 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Jonathan Anderson (from Fri, 20 Mar=20=20 2020=2010:21:11 -0230): > Hi all, > > Running this on a 12.1-STABLE system, I see a whole lot of this in > /var/log/messages: > fahclient[53019]: ^[[91m12:15:25:ERROR:WU00:FS00:Exception: Could not get > an assignment^[[0m > > Is this because there temporarily isn't enough work to go around, or > because more FreeBSD support is required on the work distribution end as > well? This means he was not able to download a work unit. This can either be=20= =20 a=20network problem, or that the pool of WUs is depleted. At the WE when=20= =20 I=20tried to get this working even my Windows Laptop didn't receive WUs.=20= =20 Yesterday=20to today I got WUs non-stop (but it takes some hours to=20=20 process=20a WU... my dual-socket Xeon system processes a WU since=20=20 yesterday=2011pm and is currently at 50% of the WU). Be patient, they are adding WUs as fast as they can. You can check in the forum for more info about this: https://foldingforum.org/viewforum.php?f=3D18&sid=3D64ecf0e5c256f1bdbb767fc= c8a2661c2 Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_R0k5bPBvbyWB-LW8lTR-3r4 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJedMQiAAoJEBINsJsD+NiGZ3IP/jI6hLOVc/kWF0ZNaa46eWMw gSt+RPlFHQ9goY393v3+sMtPsiasWxMkvBrKxV47shBvtRT/rgRJ9+ejdnhJXFOZ prhoMnbGnqyCXp4WHLR4uUDarg9IPIB9Djxx3+Q0DL3L3c54EaRK+Le1znIRuNpf 2Suq/J5xJy3QiWSJi8bBTfzeoe/A1yRNg68lb/2NeDK7HbiqVtQS2dXQPwe7c8py WaK2dEGCBl4JBy+yziF0a3jtX3WPxUoabx9tmlumsmVHhv0UYEkx1lYf/6n7uoF7 XM5HNkeuZPjDmrpMUlr4tXdG8bZ5ZgpTYFaPGWLZQu2BEks3Ovkkfs98BfiKpXLN 46080LxaW6rJBQd9l+9pK9YjmQ+FLYt4J+a2M42iroyxXms8OElQ8qCmgr7Nr73v WobwRR4d+4HfLIEcmXyEoRBDhr8dlwxE6YupL4pIbicQ74sfyUpMPbEWpUoOClaf NYKhrzChxfm3y9xUbvWNmBQHzX++GpkLC6lv2iEVqp6USrq0kZ4/MpOWIbsW36FG Tb9Cb85y4Y9JgvPCWhVjfIwgqgzFO/t2M6X4yILPaOFdVVaXF5oV1bub/xQkq4BX i/IT14d3ATd4AcXZZDr7dlOEn0XGoYeV20LmJwko+V2Q76QsKyqPrxFAb2NyxgYl pr3A7nFGW3Xtt5bj56UT =SFbb -----END PGP SIGNATURE----- --=_R0k5bPBvbyWB-LW8lTR-3r4-- From owner-freebsd-current@freebsd.org Fri Mar 20 13:25:35 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 104A626761E for ; Fri, 20 Mar 2020 13:25:35 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48kPfQ4JMMz3DS8 for ; Fri, 20 Mar 2020 13:25:34 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id 71700267610; Fri, 20 Mar 2020 13:25:34 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7108726760F; Fri, 20 Mar 2020 13:25:34 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kPfN74zBz3DPD; Fri, 20 Mar 2020 13:25:32 +0000 (UTC) (envelope-from mpp302@gmail.com) Received: by mail-wr1-f41.google.com with SMTP id w10so7467633wrm.4; Fri, 20 Mar 2020 06:25:32 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=1eLFtRWB7LDEC40iaHsCAloRchVHE8ky+WiZWa5ha+I=; b=tDqs4bjyrWqWZ6bJK7C+SSJrJFBYw+41+wdeptbulC1UzcVH3w8J2QgKQIi/YtQBNN rTEFoVNlcpiUFn4mB2CLiT9ibgRJAvI/QO9lx5oVZBPKdU6pWS4hBTtY1kOE918sr5sd 8mgIX7PYk+tYUvxsW2GGpZBP3hyJV2FbW0OR4BU6vhgyCfKQSHF3vKUNXw9iZ4xAps/e LBRSq9IOgJC0yvMc8e/upg08FfeOz9OdvQu2HUCBaj/otD5+Hfm3GGewUFmHty0DmSMc YsxnhBJkoLOzCBBbDiHfL6xz4r7KDV97Tn7kWXnG9c3ikoySgxhfAykTJL0R1SIGvhvP owSA== X-Gm-Message-State: ANhLgQ1Tff95tg/As4sCwQWpktOqyGlks+o7qkVyIE0vqnGRi/P1+uDi JnpOu3ZqXLS0uSo25Yv1ERsXEdDH X-Google-Smtp-Source: ADFU+vuUCc3zaNt0uRl0MJ843cS9NoLz2xqNIjEW/Cq9LuDEbB1nyba2rJbgNi8lZmOeDE1CpkP7rQ== X-Received: by 2002:adf:d0cf:: with SMTP id z15mr11592690wrh.357.1584710730566; Fri, 20 Mar 2020 06:25:30 -0700 (PDT) Received: from ?IPv6:2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8? ([2a02:8109:98c0:1bc0:5e5f:67ff:fef4:ffd8]) by smtp.gmail.com with ESMTPSA id z22sm7795666wmi.1.2020.03.20.06.25.29 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 20 Mar 2020 06:25:29 -0700 (PDT) Subject: Re: HOWTO donate CPU to the fight against the Corona-virus To: Jonathan Anderson , Bob Bishop Cc: Alexander Leidinger , current@freebsd.org, stable@freebsd.org References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> From: Mateusz Piotrowski <0mp@FreeBSD.org> Message-ID: Date: Fri, 20 Mar 2020 14:25:57 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 48kPfN74zBz3DPD X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of mpp302@gmail.com designates 209.85.221.41 as permitted sender) smtp.mailfrom=mpp302@gmail.com X-Spamd-Result: default: False [-3.18 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17:c]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[FreeBSD.org]; RCPT_COUNT_FIVE(0.00)[5]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[41.221.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; IP_SCORE(-1.18)[ip: (-1.69), ipnet: 209.85.128.0/17(-2.90), asn: 15169(-1.26), country: US(-0.05)]; FORGED_SENDER(0.30)[0mp@FreeBSD.org,mpp302@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[41.221.85.209.rep.mailspike.net : 127.0.0.17]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[0mp@FreeBSD.org,mpp302@gmail.com]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 13:25:35 -0000 On 3/20/20 1:51 PM, Jonathan Anderson wrote: > Hi all, > > Running this on a 12.1-STABLE system, I see a whole lot of this in > /var/log/messages: > fahclient[53019]: ^[[91m12:15:25:ERROR:WU00:FS00:Exception: Could not get > an assignment^[[0m > > Is this because there temporarily isn't enough work to go around, or > because more FreeBSD support is required on the work distribution end as > well? Either there is no work or you have to change the user name in the config file. I am not sure however if the username change is really a solution. Cheers, Mateusz From owner-freebsd-current@freebsd.org Fri Mar 20 17:12:04 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7A7F326D0A2 for ; Fri, 20 Mar 2020 17:12:04 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kVgm2lxHz3MZL; Fri, 20 Mar 2020 17:12:04 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 3E9AD2C732; Fri, 20 Mar 2020 17:12:04 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from [IPv6:2001:470:7a58::7c3b:a82:304:fc27] (unknown [IPv6:2001:470:7a58:0:7c3b:a82:304:fc27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 61B6D2D6DD; Fri, 20 Mar 2020 18:12:02 +0100 (CET) From: Dimitry Andric Message-Id: <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> Content-Type: multipart/signed; boundary="Apple-Mail=_EB366FAE-D0BD-49A0-A6B3-2A9CCEA05EA0"; protocol="application/pgp-signature"; micalg=pgp-sha1 Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: cannot build 12.1-RELEASE on latest current-snapshot Date: Fri, 20 Mar 2020 18:11:54 +0100 In-Reply-To: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> Cc: freebsd-current@freebsd.org To: h v References: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> X-Mailer: Apple Mail (2.3445.104.11) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 17:12:04 -0000 --Apple-Mail=_EB366FAE-D0BD-49A0-A6B3-2A9CCEA05EA0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 20 Mar 2020, at 10:55, h v wrote: >=20 > buildworld for 12.1-RELEASE fails on recent current.. in stage 3: = cross > tools (see below) >=20 > Did i miss newer Options/ Parameters (i checked UPDATING without > relevant changes) >=20 > i'm also not attemting a cross build, simply compiling on amd64 for = amd64. >=20 > --- C U T --- >=20 > -------------------------------------------------------------- >>>> stage 3: cross tools > -------------------------------------------------------------- > cd /usr/src/12.1; INSTALL=3D"sh /usr/src/12.1/tools/install.sh" > TOOLS_PREFIX=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp > = PATH=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/usr/= src/12.1/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/12.1/amd64.amd64/= tmp/legacy/bin:/sbin:/bin:/usr/sbin:/usr/bin > WORLDTMP=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp MAKEFLAGS=3D"-m > /usr/src/12.1/tools/build/mk -m /usr/src/12.1/share/mk" make -f > Makefile.inc1 DESTDIR=3D > OBJTOP=3D'/usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools' > OBJROOT=3D'${OBJTOP}/' MAKEOBJDIRPREFIX=3D BOOTSTRAPPING=3D1300084 > BWPHASE=3Dcross-tools SSP_CFLAGS=3D MK_HTML=3Dno NO_LINT=3Dyes = MK_MAN=3Dno > -DNO_PIC MK_PROFILE=3Dno -DNO_SHARED -DNO_CPU_CFLAGS MK_WARNS=3Dno > MK_CTF=3Dno MK_CLANG_EXTRAS=3Dno MK_CLANG_FULL=3Dno MK_LLDB=3Dno > MK_RETPOLINE=3Dno MK_TESTS=3Dno MK_INCLUDES=3Dyes = MK_LLVM_TARGET_ALL=3Dno > TARGET=3Damd64 TARGET_ARCH=3Damd64 MK_GDB=3Dno MK_TESTS=3Dno = cross-tools > =3D=3D=3D> lib/clang (obj,all,install) > =3D=3D=3D> lib/clang/libllvm (all) > [Creating objdir > /usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools/lib/clang/libllvm...] > make[4]: "/usr/src/12.1/lib/clang/libllvm/Makefile" line 18: Please > enable at least one of: MK_LLVM_TARGET_AARCH64, MK_LLVM_TARGET_ARM, > MK_LLVM_TARGET_BPF, MK_LLVM_TARGET_MIPS, MK_LLVM_TARGET_POWERPC, > MK_LLVM_TARGET_RISCV, MK_LLVM_TARGET_SPARC, or MK_LLVM_TARGET_X86 > *** Error code 1 Looks like you have MK_LLVM_TARGET_ALL=3Dno in your src.conf? Try = removing it. Can you also post your make.conf and src.conf? -Dimitry --Apple-Mail=_EB366FAE-D0BD-49A0-A6B3-2A9CCEA05EA0 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.2 iF0EARECAB0WIQR6tGLSzjX8bUI5T82wXqMKLiCWowUCXnT5WgAKCRCwXqMKLiCW owICAJ950Sg4zdLasR8ePcIxAD2TSRGAGQCeIJ24Timb8tDu+LJ+SuxJm+I/XE8= =70x0 -----END PGP SIGNATURE----- --Apple-Mail=_EB366FAE-D0BD-49A0-A6B3-2A9CCEA05EA0-- From owner-freebsd-current@freebsd.org Fri Mar 20 17:20:20 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B589126D542 for ; Fri, 20 Mar 2020 17:20:20 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x72a.google.com (mail-qk1-x72a.google.com [IPv6:2607:f8b0:4864:20::72a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kVsG5J9wz44dw for ; Fri, 20 Mar 2020 17:20:17 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x72a.google.com with SMTP id f3so7701951qkh.1 for ; Fri, 20 Mar 2020 10:20:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pTxCdpS+iw85p5yTk39iwwn7RsK23mJG2cR0jEXOThk=; b=dA5JTdoN3hLXyo7nzy2VHXwYc6qkVT6nBsv8PRYW0EjjOTuQ5K2OHyhMeMo3napA5t 93+VXqkAzmJWGxo6oHsNu9dMGwtLbLt6Ddv6aQNexbhNf/IChZiD/JTO0F2D7h19zCo9 1U471qN1FgjyANdHOmDrv13LuKQYpk3Wr0cw/gGuZwUFf7JehFDQnmTikBxTOu+AdCny H8wYqbRq6HidZq8s9O3I1pew82BTbOS3w0g/Lb2b08SZ9mr5aL55kkYt1fIJ4HZGYUxL g78e4iBNex/oQeSC2FWD33HIJ/14/S0LNkyl+syMqXtTBgy3JwKt7qqIW9cH1ueOQ0XG gHCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pTxCdpS+iw85p5yTk39iwwn7RsK23mJG2cR0jEXOThk=; b=fLHPmoAqAR6RkYzbQJiwYp4OpQXev9OHtm0yXTyNd7A03m6VA+8XlsYCtuufVUn527 nW/ILMbtHs4KtCwrBRDOHL5b88rHVqsRn74IrPp894OqW31vWD8av1sp3QcK8FgL+O1F oLSkYlpSsbyGDBVNMV0L6nYycHDBHqUVaE4+XFBri/kFRHg6zNXDwfaigZX4xBVhXIox qd3be3KsLFNWvuwopJ0TBDtHc0asC2N6ds2Ifh63IOzkN3WbJa1w1RYyOL0VmE+ZhQVC 9zZXsK51lXcyab8MrsqJ0t5gy+Cjwqy+EIxjBM2ccjy0dm7nfLdkTH14HwFsEzY6iLhn HlSg== X-Gm-Message-State: ANhLgQ1rdt8FoUrOalfkn4qJPJSm49AgzI3V465AZNG1j07xgctUi8/8 9KnJukBeT737tx6kSB1+wuAG3ZAJwQC/qMgUZuxdoA== X-Google-Smtp-Source: ADFU+vvpqKmNrzJUX6Sbx5ug0IFC3u/XKOEqo/vvyS512RWbMWx0LznN58FuLXmCXDeYd/Xt18hru2EcWPHUYNA1It8= X-Received: by 2002:a37:a746:: with SMTP id q67mr9458888qke.215.1584724816373; Fri, 20 Mar 2020 10:20:16 -0700 (PDT) MIME-Version: 1.0 References: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> In-Reply-To: <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> From: Warner Losh Date: Fri, 20 Mar 2020 11:20:04 -0600 Message-ID: Subject: Re: cannot build 12.1-RELEASE on latest current-snapshot To: Dimitry Andric Cc: h v , FreeBSD Current X-Rspamd-Queue-Id: 48kVsG5J9wz44dw X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=dA5JTdoN; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::72a) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-4.32 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; RCVD_COUNT_TWO(0.00)[2]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; RCVD_IN_DNSWL_NONE(0.00)[a.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.32)[ip: (-9.23), ipnet: 2607:f8b0::/32(-1.14), asn: 15169(-1.19), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 17:20:20 -0000 On Fri, Mar 20, 2020, 11:12 AM Dimitry Andric wrote: > On 20 Mar 2020, at 10:55, h v wrote: > > > > buildworld for 12.1-RELEASE fails on recent current.. in stage 3: cross > > tools (see below) > > > > Did i miss newer Options/ Parameters (i checked UPDATING without > > relevant changes) > > > > i'm also not attemting a cross build, simply compiling on amd64 for > amd64. > > > > --- C U T --- > > > > -------------------------------------------------------------- > >>>> stage 3: cross tools > > -------------------------------------------------------------- > > cd /usr/src/12.1; INSTALL="sh /usr/src/12.1/tools/install.sh" > > TOOLS_PREFIX=/usr/obj/usr/src/12.1/amd64.amd64/tmp > > > PATH=/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/bin:/sbin:/bin:/usr/sbin:/usr/bin > > WORLDTMP=/usr/obj/usr/src/12.1/amd64.amd64/tmp MAKEFLAGS="-m > > /usr/src/12.1/tools/build/mk -m /usr/src/12.1/share/mk" make -f > > Makefile.inc1 DESTDIR= > > OBJTOP='/usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools' > > OBJROOT='${OBJTOP}/' MAKEOBJDIRPREFIX= BOOTSTRAPPING=1300084 > > BWPHASE=cross-tools SSP_CFLAGS= MK_HTML=no NO_LINT=yes MK_MAN=no > > -DNO_PIC MK_PROFILE=no -DNO_SHARED -DNO_CPU_CFLAGS MK_WARNS=no > > MK_CTF=no MK_CLANG_EXTRAS=no MK_CLANG_FULL=no MK_LLDB=no > > MK_RETPOLINE=no MK_TESTS=no MK_INCLUDES=yes MK_LLVM_TARGET_ALL=no > > TARGET=amd64 TARGET_ARCH=amd64 MK_GDB=no MK_TESTS=no cross-tools > > ===> lib/clang (obj,all,install) > > ===> lib/clang/libllvm (all) > > [Creating objdir > > /usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools/lib/clang/libllvm...] > > make[4]: "/usr/src/12.1/lib/clang/libllvm/Makefile" line 18: Please > > enable at least one of: MK_LLVM_TARGET_AARCH64, MK_LLVM_TARGET_ARM, > > MK_LLVM_TARGET_BPF, MK_LLVM_TARGET_MIPS, MK_LLVM_TARGET_POWERPC, > > MK_LLVM_TARGET_RISCV, MK_LLVM_TARGET_SPARC, or MK_LLVM_TARGET_X86 > > *** Error code 1 > > Looks like you have MK_LLVM_TARGET_ALL=no in your src.conf? Try removing > it. Can you also post your make.conf and src.conf? > No. This was an error I committed. Update and try again. I had one too many changes in the tree I pushed this morning. Warner -Dimitry > > From owner-freebsd-current@freebsd.org Fri Mar 20 17:51:20 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9630F26E4BA for ; Fri, 20 Mar 2020 17:51:20 +0000 (UTC) (envelope-from crest@rlwinm.de) Received: from mail.rlwinm.de (mail.rlwinm.de [IPv6:2a01:4f8:171:f902::5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kWY302myz4cMN for ; Fri, 20 Mar 2020 17:51:18 +0000 (UTC) (envelope-from crest@rlwinm.de) Received: from hexe.rlwinm.de (200116b864664c00feaa14fffe7af214.dip.versatel-1u1.de [IPv6:2001:16b8:6466:4c00:feaa:14ff:fe7a:f214]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits)) (No client certificate requested) by mail.rlwinm.de (Postfix) with ESMTPSA id 9B71223826 for ; Fri, 20 Mar 2020 17:51:10 +0000 (UTC) Subject: Re: TLS certificates for NFS-over-TLS floating client To: freebsd-current@freebsd.org References: <20200319191605.GJ4213@funkthat.com> From: Jan Bramkamp Message-ID: <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> Date: Fri, 20 Mar 2020 18:51:10 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 48kWY302myz4cMN X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of crest@rlwinm.de designates 2a01:4f8:171:f902::5 as permitted sender) smtp.mailfrom=crest@rlwinm.de X-Spamd-Result: default: False [-4.93 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[4.1.2.f.a.7.e.f.f.f.4.1.a.a.e.f.0.0.c.4.6.6.4.6.8.b.6.1.1.0.0.2.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.96)[-0.964,0]; DMARC_NA(0.00)[rlwinm.de]; NEURAL_HAM_MEDIUM(-0.96)[-0.964,0]; IP_SCORE(-2.70)[ip: (-9.36), ipnet: 2a01:4f8::/29(-2.57), asn: 24940(-1.54), country: DE(-0.02)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 17:51:20 -0000 On 20.03.20 02:44, Russell L. Carter wrote: > Here I commit heresy, by A) top posting, and B) by just saying, why > not make it easy, first, to tunnel NFSv4 sessions through > e.g. net/wireguard or sysutils/spiped?  NFS is point to point. > Security infrastructure that actually works understands the shared > secret model. Why not use IPsec in transport mode instead of a tunnel? It avoids unnecessary overhead and is already implemented in the kernel. It should be enough to "just" require IPsec for TCP port 2049 and run a suitable key exchange daemon. From owner-freebsd-current@freebsd.org Fri Mar 20 19:29:33 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CFD4A270932 for ; Fri, 20 Mar 2020 19:29:33 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kYkN4ZYxz4Yjy for ; Fri, 20 Mar 2020 19:29:32 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 02KJTNSB064565 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 20 Mar 2020 12:29:23 -0700 (PDT) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 02KJTNJ8064564; Fri, 20 Mar 2020 12:29:23 -0700 (PDT) (envelope-from jmg) Date: Fri, 20 Mar 2020 12:29:23 -0700 From: John-Mark Gurney To: Rick Macklem Cc: "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Message-ID: <20200320192923.GK4213@funkthat.com> Mail-Followup-To: Rick Macklem , "freebsd-current@FreeBSD.org" References: <20200319191605.GJ4213@funkthat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Fri, 20 Mar 2020 12:29:24 -0700 (PDT) X-Rspamd-Queue-Id: 48kYkN4ZYxz4Yjy X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [1.77 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(-0.43)[ip: (-1.11), ipnet: 208.87.216.0/21(-0.55), asn: 32354(-0.44), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.66)[0.660,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.34)[0.343,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 19:29:33 -0000 Rick Macklem wrote this message on Thu, Mar 19, 2020 at 23:41 +0000: > John-Mark Gurney wrote: > >Rick Macklem wrote this message on Wed, Mar 04, 2020 at 03:15 +0000: > >> I am slowly trying to understand TLS certificates and am trying to figure > >> out how to do the following: > >> -> For an /etc/exports file with... > >> /home -tls -network 192.168.1.0 -mask 255.255.255.0 > >> /home -tlscert > > > >Are you looking at implementing draft-cel-nfsv4-rpc-tls? > Yes. The 2 week out of date (I can only do commits once in a while these days) can > be found in FreeBSD's subversion under base/projects/nfs-over-tls. Nifty. And looks like you know about the ktls stuff, nice... > >> This syntax isn't implemented yet, but the thinking is that clients on the > >> 192.168.1 subnet would use TLS, but would not require a certificate. > >> For access from anywhere else, the client(s) would be required to have a > >> certificate. > >> > >> A typical client mounting from outside of the subnet might be my laptop, > >> which is using wifi and has no fixed IP/DNS name. > >> --> How do you create a certificate that the laptop can use, which the NFS > >> server can trust enough to allow the mount? > >> My thinking is that a "secret" value can be put in the certificate that the NFS > >> server can check for. > >> The simplest way would be a fairly long list of random characters in the > >> organizationName and/or organizationUnitName field(s) of the subject name. > >> Alternately, it could be a newly defined extension for X509v3, I think? > >> > >> Now, I'm not sure, but I don't think this certificate can be created via > >> a trust authority such that it would "verify". However, the server can > >> look for the "secret" in the certificate and allow the mount based on that. > >> > >> Does this sound reasonable? > > > >Without a problem statement or what you're trying to accomplish, it's > >hard to say if it is. > The problem I was/am trying to solve was a way for NFS clients without a > fixed IP/DNS name could have a certificate to allow access to the NFS server. > As suggested by others, having a site local CA created by the NFS admin. seemed Yes, I totally agree w/ this as the best solution. It also allows private hostnames to be used w/o leaking outside the org.. It'd be nice to have better tooling around the CA though. I still haven't found any good tools that make a CA simple to use for small installs... (and by simple, I mean single init command, and single command to issue a cert or generate a key/cert pair, all of them are like, make all thesse directories, edit these files, and run these comlicated commands) Another option is to just use self sign certs and manually add each one for a host, not sure how difficult this would be in code... This would probably be easiest w/ a small number of clients, eliminates the difficulty of doing a CRL/OSCP, as if a client gets compromised, you just delete their cert till a new one is issued... > to be the best solution. The server can verify that the certificate was issued by > the local CA. Unfortunately, if the client is compromised and the certificate is copied > to another client, that client would gain access. This is why CRLs/OSCP is necessary, but there isn't anything you can do to prevent that. This is both a better situation than what we have today (no auth/confidentiality), and if you tie the cert to an IP, it's of limited use, and better than today... > --> I've thought of having the client keep the certificate encrypted in a file and > require the "user" of the client type in a passphrase to unencrypt the certificate > so that it can be used by the daemon in the client that handles the client side > of the TLS handshake, but I have not implemented this. > --> This would at least subvert the simple case of the certificate file being copied > to a different client and being used to mount the NFS server, but if the > client is compromised, then the passphrase could be captured and... Exactly. Just make sure that it's clear how to handle a revoked certificate when this happens, and you're good... > >> Also, even if the NFS client/server have fixed IP addresses with well known > >> DNS names, it isn't obvious to me how signed certificates can be acquired > >> for them? > >> (Lets Encrypt expects the Acme protocol to work and that seems to be > >> web site/http specific?) > > > >There is DNS challenges that can be used. I use them to obtain certs > >for SMTP and SIP servers... using nsupdate, this is relatively easy to > >automate pushing the challenges to a DNS server, and I now use DNS > >challenges for everything, including https. > Since my internet connection is a single dynamically assigned IP from the phone > company, I doubt this would work for me (which I why I say I don't know how > to do this). I suspect there are ways and it would be nice if you could document > this, so I can put it in a howto document. > - An actual example using the nsupdate command would be nice. > Thanks, rick This partly depends upon how you host your DNS for your domain. Many DNS providers allow dynamic update, though not everyone uses the standard TSIG nsupdate method. If they do, you can deploy updates via: (echo add "_acme-challenge.${DOMAIN}" 100 TXT "${TOKEN_VALUE}"; echo send) | nsupdate -v -l -k "${keyfile}" and remove them via: (echo del "_acme-challenge.${DOMAIN}" 100 TXT "${TOKEN_VALUE}"; echo send) | nsupdate -v -l -k "${keyfile}" The above lines are the ones that I use in my hook.sh that I use w/ dehydrate. There might be a few additional options to nsupdate required, but I use this method to provide priv sep for my updates, so that the the acme client can run entirely as it's own user w/o sudo privs or anythingelse. As I run my own DNS via bind, I wanted to limit what records that key could update, so I also had to add the following to my master zone entry: update-policy { grant acme.key. name _acme-challenge.example.com TXT; grant acme.key. name _acme-challenge.www.example.com TXT; grant acme.key. name _acme-challenge.sip.example.com TXT; }; Even with a dynamic IP, you could run a "hidden master" locally, and use TSIG to push updates to your provider for public view. > > Thanks for any help with this, rick -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." From owner-freebsd-current@freebsd.org Fri Mar 20 19:45:16 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 19BFF27133E for ; Fri, 20 Mar 2020 19:45:16 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kZ4T3GFGz3QCW for ; Fri, 20 Mar 2020 19:45:12 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 02KJj7rj065647 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 20 Mar 2020 12:45:07 -0700 (PDT) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 02KJj7i7065646; Fri, 20 Mar 2020 12:45:07 -0700 (PDT) (envelope-from jmg) Date: Fri, 20 Mar 2020 12:45:07 -0700 From: John-Mark Gurney To: Jan Bramkamp Cc: freebsd-current@freebsd.org Subject: Re: TLS certificates for NFS-over-TLS floating client Message-ID: <20200320194507.GM4213@funkthat.com> Mail-Followup-To: Jan Bramkamp , freebsd-current@freebsd.org References: <20200319191605.GJ4213@funkthat.com> <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Fri, 20 Mar 2020 12:45:07 -0700 (PDT) X-Rspamd-Queue-Id: 48kZ4T3GFGz3QCW X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [1.98 / 15.00]; ARC_NA(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(-0.42)[ip: (-1.07), ipnet: 208.87.216.0/21(-0.53), asn: 32354(-0.43), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.28)[0.282,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.92)[0.915,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 19:45:16 -0000 Jan Bramkamp wrote this message on Fri, Mar 20, 2020 at 18:51 +0100: > On 20.03.20 02:44, Russell L. Carter wrote: > > Here I commit heresy, by A) top posting, and B) by just saying, why > > not make it easy, first, to tunnel NFSv4 sessions through > > e.g. net/wireguard or sysutils/spiped?  NFS is point to point. > > Security infrastructure that actually works understands the shared > > secret model. VPN tunneling doesn't provide the security that most people thinks it does... It requires complicated configuration, and often doesn't provide e2e protections. > Why not use IPsec in transport mode instead of a tunnel? It avoids > unnecessary overhead and is already implemented in the kernel. It should > be enough to "just" require IPsec for TCP port 2049 and run a suitable > key exchange daemon. Because IPsec is a PITA to configure and work, and lots of consumer OSes don't make it at all easy. Also, you forget that FreeBSD has ktls, which usees the same crypto offload engine that IPsec does, so it will effectively have similar overhead, and might actually perform better due to TLS having a 16k record encryption size vs IPsec limiting itself to packet size, usually 1500, though possibly 9k if you're using jumbo frames... I fully support doing NFS over TLS. -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." From owner-freebsd-current@freebsd.org Fri Mar 20 21:03:16 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8CD28273043 for ; Fri, 20 Mar 2020 21:03:16 +0000 (UTC) (envelope-from SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kbpW46D3z4R6y for ; Fri, 20 Mar 2020 21:03:15 +0000 (UTC) (envelope-from SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 16BEB28422; Fri, 20 Mar 2020 22:03:13 +0100 (CET) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 135F428417; Fri, 20 Mar 2020 22:03:12 +0100 (CET) Subject: Re: TLS certificates for NFS-over-TLS floating client To: Rick Macklem , "freebsd-current@FreeBSD.org" References: <20200319191605.GJ4213@funkthat.com> <20200320192923.GK4213@funkthat.com> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <5c77aeed-568f-b85c-286e-8b7f3207c952@quip.cz> Date: Fri, 20 Mar 2020 22:03:12 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.3 MIME-Version: 1.0 In-Reply-To: <20200320192923.GK4213@funkthat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48kbpW46D3z4R6y X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz has no SPF policy when checking 94.124.105.4) smtp.mailfrom=SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz X-Spamd-Result: default: False [4.03 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(0.83)[ip: (0.30), ipnet: 94.124.104.0/21(0.15), asn: 42000(3.63), country: CZ(0.09)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[quip.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(1.00)[0.998,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[4.105.124.94.list.dnswl.org : 127.0.10.0]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[000.fbsd@quip.cz,SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42000, ipnet:94.124.104.0/21, country:CZ]; FROM_NEQ_ENVFROM(0.00)[000.fbsd@quip.cz,SRS0=mxbq=5F=quip.cz=000.fbsd@elsa.codelab.cz]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 21:03:16 -0000 John-Mark Gurney wrote on 2020/03/20 20:29: > Rick Macklem wrote this message on Thu, Mar 19, 2020 at 23:41 +0000: [...] >>> Without a problem statement or what you're trying to accomplish, it's >>> hard to say if it is. >> The problem I was/am trying to solve was a way for NFS clients without a >> fixed IP/DNS name could have a certificate to allow access to the NFS server. >> As suggested by others, having a site local CA created by the NFS admin. seemed > > Yes, I totally agree w/ this as the best solution. It also allows > private hostnames to be used w/o leaking outside the org.. > > It'd be nice to have better tooling around the CA though. I still > haven't found any good tools that make a CA simple to use for small > installs... (and by simple, I mean single init command, and single > command to issue a cert or generate a key/cert pair, all of them are > like, make all thesse directories, edit these files, and run these > comlicated commands) security/easy-rsa is very close to this. # easyrsa init-pki # easyrsa build-ca # easyrsa build-server-full # easyrsa build-client-full # easyrsa build-client-full # easyrsa build-client-full or # easyrsa build-client-full nopass And usually # easyrsa gen-dh With "build-ca" you will create key and certificate for you private CA With "build-server-full" you will create key and certificate for your server With "build-client-full" you will create key and certificate for clients It also supports "revoke" and "gen-crl" to revoke compromised certificate and update CRL. Yes, it could be made a bit simpler and run init-pki in the background if build-ca is run for the first time so you can save one step. I don't say easy-rsa is the best choice. I am able to use full openssl commands or write my own tools / scripts around it I choose easy-rsa on machines where somebody else needs to work with certs. [...] Kind regards Miroslav Lachman From owner-freebsd-current@freebsd.org Fri Mar 20 23:41:56 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 82A3527612E for ; Fri, 20 Mar 2020 23:41:56 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kgKc2vrPz4LFy for ; Fri, 20 Mar 2020 23:41:56 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 61E30276129; Fri, 20 Mar 2020 23:41:56 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 61522276127; Fri, 20 Mar 2020 23:41:56 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kgKb4t6Rz4LFh; Fri, 20 Mar 2020 23:41:55 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 48kgKR4kvMz3m0D; Fri, 20 Mar 2020 23:41:47 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id Zv4qqwdcFmQ0; Fri, 20 Mar 2020 23:41:47 +0000 (UTC) Received: from garnet.daemonic.se (84-216-103-136.customers.ownit.se [84.216.103.136]) by mail.daemonic.se (Postfix) with ESMTPSA id 48kgKR0fvzz3lcX; Fri, 20 Mar 2020 23:41:47 +0000 (UTC) To: x11@FreeBSD.org, stable@FreeBSD.org, ports@FreeBSD.org, current@FreeBSD.org Reply-To: x11@FreeBSD.org From: Niclas Zeising Subject: users of xorg, in particular on FreeBSD 11.3 Message-ID: Date: Sat, 21 Mar 2020 00:41:46 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48kgKb4t6Rz4LFh X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [1.38 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.94)[0.940,0]; NEURAL_SPAM_MEDIUM(0.44)[0.435,0]; ASN(0.00)[asn:36236, ipnet:2607:f740:d::/48, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 23:41:56 -0000 [ This is cross-posted across several mailing lists for maximum visibility. Please respect reply-to and keep replies to x11@FreeBSD.org . Thank you! ] In order to improve support when using evdev to manage input devices, in particular keyboards, we have switched the default in x11/libxkbcommon to the evdev instead of the legacy ruleset. This was done in ports r528813 . On FreeBSD 11.3, the default configuration still requires the legacy ruleset. If you are using FreeBSD 11.3, or if you are using xf86-input-keyboard on FreeBSD 12 or later, you need to change the ruleset used by x11/libxkbcommon. If you have issues with your keyboard, most notably arrow keys, and if /var/log/Xorg.*.log shows that the "kbd" or "keyboard" driver is being used, you need to switch to legacy rules by setting the environment variable XKB_DEFAULT_RULES to xorg. The easiest way to accomplish this is by adding it to your shell startup file. As an example, for users of [t]csh, put setenv XKB_DEFAULT_RULES xorg in ~/.login For users of bourne type shells (sh, bash, ksh, zsh, ...) instead put export XKB_DEFAULT_RULES=xorg in ~/.profile Regards -- Niclas Zeising FreeBSD Graphics Team From owner-freebsd-current@freebsd.org Fri Mar 20 23:56:26 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 057AC2769A9 for ; Fri, 20 Mar 2020 23:56:26 +0000 (UTC) (envelope-from crest@rlwinm.de) Received: from mail.rlwinm.de (mail.rlwinm.de [138.201.35.217]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kgfJ5cVBz4cXj for ; Fri, 20 Mar 2020 23:56:24 +0000 (UTC) (envelope-from crest@rlwinm.de) Received: from hexe.rlwinm.de (200116b864664c00feaa14fffe7af214.dip.versatel-1u1.de [IPv6:2001:16b8:6466:4c00:feaa:14ff:fe7a:f214]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.rlwinm.de (Postfix) with ESMTPSA id 02A6A23E74 for ; Fri, 20 Mar 2020 23:56:21 +0000 (UTC) Subject: Re: TLS certificates for NFS-over-TLS floating client To: freebsd-current@freebsd.org References: <20200319191605.GJ4213@funkthat.com> <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> <20200320194507.GM4213@funkthat.com> From: Jan Bramkamp Message-ID: Date: Sat, 21 Mar 2020 00:56:21 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200320194507.GM4213@funkthat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 48kgfJ5cVBz4cXj X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of crest@rlwinm.de designates 138.201.35.217 as permitted sender) smtp.mailfrom=crest@rlwinm.de X-Spamd-Result: default: False [-4.12 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[4.1.2.f.a.7.e.f.f.f.4.1.a.a.e.f.0.0.c.4.6.6.4.6.8.b.6.1.1.0.0.2.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.96)[-0.959,0]; DMARC_NA(0.00)[rlwinm.de]; NEURAL_HAM_MEDIUM(-0.96)[-0.963,0]; IP_SCORE(-1.90)[ip: (-8.95), ipnet: 138.201.0.0/16(1.01), asn: 24940(-1.54), country: DE(-0.02)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:138.201.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Mar 2020 23:56:26 -0000 On 20.03.20 20:45, John-Mark Gurney wrote: > Jan Bramkamp wrote this message on Fri, Mar 20, 2020 at 18:51 +0100: >> On 20.03.20 02:44, Russell L. Carter wrote: >>> Here I commit heresy, by A) top posting, and B) by just saying, why >>> not make it easy, first, to tunnel NFSv4 sessions through >>> e.g. net/wireguard or sysutils/spiped?  NFS is point to point. >>> Security infrastructure that actually works understands the shared >>> secret model. > VPN tunneling doesn't provide the security that most people thinks it > does... It requires complicated configuration, and often doesn't > provide e2e protections. I fully agree that IPsec is a bitch to configure, but IPsec tranport mode between NFSv4 client and server would provide end to end encryption. >> Why not use IPsec in transport mode instead of a tunnel? It avoids >> unnecessary overhead and is already implemented in the kernel. It should >> be enough to "just" require IPsec for TCP port 2049 and run a suitable >> key exchange daemon. > Because IPsec is a PITA to configure and work, and lots of consumer OSes > don't make it at all easy. Does any consumer OS support NFSv4 over TLS? > Also, you forget that FreeBSD has ktls, which usees the same crypto > offload engine that IPsec does, so it will effectively have similar > overhead, and might actually perform better due to TLS having a 16k > record encryption size vs IPsec limiting itself to packet size, usually > 1500, though possibly 9k if you're using jumbo frames... I compared IPsec to userspace tunnels like spiped or wireguard-go not kTLS. If kTLS can use LRO/TSO etc. it would avoid even more overhead. > I fully support doing NFS over TLS. I would love to run NFS over TLS, but it isn't implemented yet and afaik kTLS only accelerates TLS sending and would require a userspace proxy to receive TLS at the moment while IPsec transport mode is just a nasty fight with strongSwan away. From owner-freebsd-current@freebsd.org Sat Mar 21 01:34:05 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DC862279156 for ; Sat, 21 Mar 2020 01:34:05 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-qb1can01on062b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5c::62b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kjq03xW8z4cvS for ; Sat, 21 Mar 2020 01:34:03 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BaefSsTs6IAIina+jXwgtFbOEyixzQu1uQlXh8v6TM83X7c7ViauiRvFAXJrHTG5927eiXnbbh7xePrW11UN4Q41C/5OTVmUjY57nExB/Zr+io6BeWXamX0NV1dCMQxAI8TZ+KY5Um35v+cd+LDNQhaG4UQAOMFx+pEGifwMfmEPUAjdJVK3VknAA0bDrzQtRlpG8C7kF16AHj7Azgnp0VCjngpztKCTfnSHBbP5HvmYMqq/iLtTYYFStw/gfDG3WRvB/iBI7GNdJmOoSiIAbiMT0UCC7lL+mX3S4QFV9m+2I3ZW1lFHR/jBgTVSZlhhGuBICDbBjFkPBOzuU3r0/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2tsURHKgXolmbtyTFQemU/cwWKWiXxLRgSzKS5CzgIk=; b=GLIpNqLImYWAsqRzBoOVERnsvBxUJfwA4EOvNLwAydpwFewJYqAFmDJwbomVnBn12i7t4bL7QaI7bmGE1ZZR45IyV0VNJfGn+nbSTDNlFxr2q3jhsCPowkwtJX+AA/yX0Hnh32acFLH77nO6/fmJXgtPs5MFO8E0M5YmAAypYAhFAuKxjFSG9a2NHmXJMUQBfasK/99UP1hp2bgX2NXZM+q6qiRV9zLscASmlj2MQZSiIB1RyrfDED4RjHS5hi8dNJxCHtBpAs1ldH0E58kFugHQq4F5izntF2jQYn/NwytSjG/z/zwf90p2plh3emlzAYqb4gqlspHlHhv+BmWg/w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM (52.132.86.26) by QB1PR01MB2451.CANPRD01.PROD.OUTLOOK.COM (52.132.84.221) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.18; Sat, 21 Mar 2020 01:34:01 +0000 Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::ed8c:7662:79ba:5f9f]) by QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::ed8c:7662:79ba:5f9f%5]) with mapi id 15.20.2835.017; Sat, 21 Mar 2020 01:33:53 +0000 From: Rick Macklem To: Jan Bramkamp , "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Thread-Topic: TLS certificates for NFS-over-TLS floating client Thread-Index: AQHV8dDjD29GK4BL2kGnxfg+gW2rAahQYgqAgABFwt6AACbMgIABDg0AgAB/rIo= Date: Sat, 21 Mar 2020 01:33:53 +0000 Message-ID: References: <20200319191605.GJ4213@funkthat.com> , <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> In-Reply-To: <33810a31-50f0-94ee-444a-51cf85a7b6fe@rlwinm.de> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 1b981344-4927-410a-d9e1-08d7cd37ea61 x-ms-traffictypediagnostic: QB1PR01MB2451: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:2887; x-forefront-prvs: 034902F5BC x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(376002)(346002)(366004)(136003)(396003)(199004)(81156014)(81166006)(64756008)(66446008)(76116006)(478600001)(86362001)(5660300002)(52536014)(55016002)(33656002)(7696005)(66946007)(66476007)(8676002)(66556008)(9686003)(6506007)(316002)(2906002)(8936002)(786003)(71200400001)(110136005)(966005)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:QB1PR01MB2451; H:QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: OyY2aNrNP4+RXIz0llGVpSDRhoCL+haaEn3qulP/cV8/N6AZXvRmyhbRwKlgcpg5hRBHPrqdRNiy43aVsVCUSyoLCXESXXhs3ZUS0NDZLRvSFewEFP6ZHAkTkMOoqgRDQVy0OnM4UvxwAqWal+ozHG3oa86VjoU5dfD+3mAZ/I1ikCeqsx+HJVot5TCq85x3YwYcCZNldjyE449yL3iyzQ== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 1b981344-4927-410a-d9e1-08d7cd37ea61 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Mar 2020 01:33:53.4721 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: SCHa6wyXduLm0Y3H+aUJBwuBUEGh8gnvlYLh9UygvZJhc5AVK2AJJ0STK6fD0/XcV5JaaYKY/di117krMdGXqw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: QB1PR01MB2451 X-Rspamd-Queue-Id: 48kjq03xW8z4cvS X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 2a01:111:f400:fe5c::62b as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-4.71 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.98)[-0.975,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; IP_SCORE(-1.44)[ipnet: 2a01:111:f000::/36(-4.01), asn: 8075(-3.12), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 01:34:05 -0000 Jan Bramkamp wrote:=0A= >On 20.03.20 02:44, Russell L. Carter wrote:=0A= >> Here I commit heresy, by A) top posting, and B) by just saying, why=0A= >> not make it easy, first, to tunnel NFSv4 sessions through=0A= >> e.g. net/wireguard or sysutils/spiped? NFS is point to point.=0A= >> Security infrastructure that actually works understands the shared=0A= >> secret model.=0A= >=0A= >Why not use IPsec in transport mode instead of a tunnel? It avoids=0A= >unnecessary overhead and is already implemented in the kernel. It should= =0A= >be enough to "just" require IPsec for TCP port 2049 and run a suitable=0A= >key exchange daemon.=0A= I think the problem with these suggestions is interoperability.=0A= The draft (that should soon become an RFC) describes use of RPC-over-TLS=0A= and since the authors are both Linux NFS developers, I expect Linux to=0A= implement this someday.=0A= Once the Linux client can do it, the NFS server vendors will implement it.= =0A= =0A= NFS isn't great, but it is supported by a variety of vendors/systems and I= =0A= see that as one of its main features.=0A= =0A= rick=0A= =0A= _______________________________________________=0A= freebsd-current@freebsd.org mailing list=0A= https://lists.freebsd.org/mailman/listinfo/freebsd-current=0A= To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org"= =0A= From owner-freebsd-current@freebsd.org Sat Mar 21 01:54:00 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BC540279D7C for ; Sat, 21 Mar 2020 01:54:00 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-to1can01on060c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5d::60c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kkFy6v94z3yDW; Sat, 21 Mar 2020 01:53:58 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Jl+MtYZLRAVcbzncZEkBSHXd6BXAtVTyhB49MGKqtgGW2b3UmejKpOQ2E9J3huIg8MAnisNfaWdkkwHe1rgWFHGqaaJ2RKKaWDKU1ayTqJdxRzd7BO3o7bfVeudAIzwHaGeFygAgiGd926aIaWwv1KZcSNPRWRZz34xII0tWF5QJs2d5qPYPugulBRtXm4bfEbjZDNU154YX1oMDqg9JZihpH82UFb6UpfSF8weTC2OZeWkuxofU14zTwyRWogiTLqRQUXqknJrarimi87Q2GN/TRKloGftFjlo8no2FGmC5a2XJDMqcslzZ8O7S2orVwIZCuur4nuKjN6yzsAZY1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BEpDjwRyXcFTi7iheIHFD92kXt3Djfqp/oEcKWIvZWs=; b=fR9VkwcAsb/kjqLQrC3xGybpsY0QJOTYIjg1uXM26ddBjqV1mbiqQRhbv2hDRdpyj9BTjRdipU2bpdgW//13PmbB++z1YGHyR2qCgsXoM9pHWqT7yiVhXHk6yagUg51XQW5k/CDelCMl8VaZuT/f1ozWZi0podW/Uecmv9FBQj/Vxqsj1xFao6Zfk4id3aUDAbzSDibLAF8jxAP4P+1dNfR5IPsDAtfahcXUOGtlj7vCV9HAW6VFQlqpy6TQvHjyJyLUYRnoY9438nrVpA8+35Bk08m2pgkihZx4Avpaf8DRFIsvcS9JlKcdIgYK2lJYidHXxhyYZlAccHQq+xcQzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM (52.132.86.26) by QB1PR01MB4003.CANPRD01.PROD.OUTLOOK.COM (52.132.89.80) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20; Sat, 21 Mar 2020 01:53:56 +0000 Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::ed8c:7662:79ba:5f9f]) by QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::ed8c:7662:79ba:5f9f%5]) with mapi id 15.20.2835.017; Sat, 21 Mar 2020 01:53:56 +0000 From: Rick Macklem To: Miroslav Lachman <000.fbsd@quip.cz>, Hiroki Sato CC: "freebsd-current@FreeBSD.org" Subject: Re: TLS certificates for NFS-over-TLS floating client Thread-Topic: TLS certificates for NFS-over-TLS floating client Thread-Index: AQHV8dDjD29GK4BL2kGnxfg+gW2rAag32PeAgABluQCAFwCY9oAAlCgAgAKLNW8= Date: Sat, 21 Mar 2020 01:53:56 +0000 Message-ID: References: <20200304.133515.520383339344620673.hrs@FreeBSD.org> , <4865c166-33de-475f-1ddd-8ab8c5612683@quip.cz> In-Reply-To: <4865c166-33de-475f-1ddd-8ab8c5612683@quip.cz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 48d02aa3-2882-4633-2efd-08d7cd3ab786 x-ms-traffictypediagnostic: QB1PR01MB4003: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-forefront-prvs: 034902F5BC x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(346002)(136003)(376002)(366004)(396003)(199004)(316002)(786003)(81156014)(8676002)(4326008)(66476007)(66556008)(81166006)(8936002)(33656002)(110136005)(478600001)(66446008)(64756008)(52536014)(7696005)(86362001)(71200400001)(76116006)(5660300002)(6506007)(186003)(9686003)(55016002)(2906002)(66946007); DIR:OUT; SFP:1101; SCL:1; SRVR:QB1PR01MB4003; H:QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: A4fd/Lxc3l/Oj0tAG33w6dJdZPQFCiOtLy8jzJLDldIqYErPTrJWGeucLxHa04rN61ODjqwJFQLXO1yJHdK0+bLYpeV7ln2naNAbs7eDJtmtD3UkKz7fH7OI7C5pQAq1XrDmLVXklysf/Xx6tbo/2M/yfT2qrJB3bTgO2+Ixig1VZcBTASA8i/IZaPaAHQuH5tDKaMAsBJtC24/TGR9q3w== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 48d02aa3-2882-4633-2efd-08d7cd3ab786 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Mar 2020 01:53:56.5906 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: KmRw/kdU/ptZ5XWpFIXYzPotx7qHkxaeJt2rog5pivgBGlG0YlJNJRFAguNZq7HPE8erQHZO5qJ37c+iYBm8zA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: QB1PR01MB4003 X-Rspamd-Queue-Id: 48kkFy6v94z3yDW X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 2a01:111:f400:fe5d::60c as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-4.73 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.995,0]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; FROM_HAS_DN(0.00)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[uoguelph.ca]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(-1.44)[ipnet: 2a01:111:f000::/36(-4.01), asn: 8075(-3.12), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; ARC_ALLOW(-1.00)[i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 01:54:00 -0000 Miroslav Lachman wrote:=0A= >Rick Macklem wrote on 2020/03/19 03:09:=0A= >> Miroslav Lachman wrote:=0A= >>>=0A= >> [...]=0A= >=0A= >>> NFS (or any other server) should check list of revoked certificates too= .=0A= >>> Otherwise you will not be able to deny access to user which you no=0A= >>> longer want to have an access.=0A= >> Yes, good point.=0A= >> I won't claim to understand this stuff, but from what I can see, all tha= t is=0A= >> done is the CRL is appended to the CAfile (the one with the CA certifica= tes=0A= >> are in being used for certificate verification via SSL__CTX_load_verify_= locations().=0A= >> >(https://raymii.org/s/articles/OpenSSL_manually_verify_a_certificate_ag= ainst_a_CRL.html=0A= >> shows a CAfile and CRLfile being concatenated and then used to verify a = certificate.)=0A= >>=0A= >> There is code in sendmail that loads a CRL file separately, but it seems= to=0A= >> just put it in the X509 store returned by SSL_CTX_get_cert_store(), whic= h=0A= >> is the one where the CAfile certificates are stored via SSL_CTX_load_ver= ify_locations(),=0A= >> I think?=0A= >> (It just seems easier to append it to CAfile than do this. The sendmail = code uses=0A= >> poorly documented functions where the man page says=0A= >> "SSL_CTX_load_verify_locations()" normally takes care of this.)=0A= >>=0A= >> Does this sound right? rick=0A= >=0A= >I think it would be better to have it in a separate file as Apache does=0A= >https://httpd.apache.org/docs/current/mod/mod_ssl.html#sslcarevocationfile= =0A= >=0A= >Seems more convenient to have CA file write protected (read only) and=0A= >then separate file for list of revoked client certificates, maybe=0A= >somewhere else than CA certificate.=0A= Done. (Actually, the SSL_CTX_load_verify_locations() failed when the CRL wa= s=0A= appended to the CAfile, so I needed to use a separate file to get it workin= g.)=0A= =0A= I found X509_load_crl_file(), which does all the glop in sendmail's tls.c f= ile=0A= to do it. (And it looks like the sendmail code only handles a CRL file=0A= with a single entry in it.)=0A= =0A= Thanks for the comments, rick=0A= =0A= Kind regards=0A= Miroslav Lachman=0A= From owner-freebsd-current@freebsd.org Sat Mar 21 10:11:17 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4B50C25CAE5 for ; Sat, 21 Mar 2020 10:11:17 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kxHm1J0wz4dfy for ; Sat, 21 Mar 2020 10:11:15 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165828.dip0.t-ipconnect.de [91.22.88.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 400C9247D; Sat, 21 Mar 2020 11:11:12 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id D086411F2B; Sat, 21 Mar 2020 11:10:39 +0100 (CET) Date: Sat, 21 Mar 2020 11:10:38 +0100 Message-ID: <20200321111038.Horde.rgAGgZxVa9iVtXMBf4CIY2q@webmail.leidinger.net> From: Alexander Leidinger To: John-Mark Gurney Cc: Rick Macklem , freebsd-current@freebsd.org Subject: Re: TLS certificates for NFS-over-TLS floating client References: <20200319191605.GJ4213@funkthat.com> <20200320192923.GK4213@funkthat.com> In-Reply-To: <20200320192923.GK4213@funkthat.com> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_M8_tNGFnqA8wLMuMfTFM8H6"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48kxHm1J0wz4dfy X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.81 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; URIBL_BLOCKED(0.00)[leidinger.net.multi.uribl.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; IP_SCORE(-3.72)[ip: (-9.77), ipnet: 89.238.64.0/18(-4.88), asn: 34240(-3.92), country: DE(-0.02)]; NEURAL_HAM_MEDIUM(-0.99)[-0.995,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[40.88.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 10:11:17 -0000 This message is in MIME format and has been PGP signed. --=_M8_tNGFnqA8wLMuMfTFM8H6 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting John-Mark Gurney (from Fri, 20 Mar 2020=20=20 12:29:23=20-0700): >> to be the best solution. The server can verify that the certificate=20= =20 >>=20was issued by >> the local CA. Unfortunately, if the client is compromised and the=20=20 >>=20certificate is copied >> to another client, that client would gain access. > > This is why CRLs/OSCP is necessary, but there isn't anything you can do > to prevent that. This is both a better situation than what we have > today (no auth/confidentiality), and if you tie the cert to an IP, it's > of limited use, and better than today... There are multiple ways to handle that: - First of all, you can just validate based upon "cert is signed by=20=20 trusted=20CA". - Then you can require that the CN matches the hostname and the=20=20 reverse=20lookup matches. - Or (similar to browsers today) you can ignore the CN and require=20=20 that=20the hostnames of the client matches one of the subject=20=20 alternative=20name (SAN) entries (requires reverse DNS lookup to work=20=20 and=20match). At this point you prevent simple cert theft as additionally you=20=20 require=20that someone also has to be able to modify the DNS (or NFS=20=20 server=20hosts file, but then he probably can already add an additional=20= =20 cert=20to the truststore of nfsd). Additional protection is possible by also adding the IP to the SAN. I=20=20 haven't=20put an effort into evaluating if either IP or DNS is enough=20=20 from=20a security point of view, or if it makes a difference if the "IP=20= =20 in=20SAN" case has an additional benefit in terms of security if it is=20= =20 in=20addition to the reverse DNS requirement. Yes this makes it more inconvenient to change the IP of a host, but if=20= =20 all=20the policy possibilities are up to the admin to configure (e.g.=20=20 "cert=20is signed by trusted CA" as a default, and all the other=20=20 possibilities=20as an option for nfsd), it is up to the admin and the=20=20 security=20requirement. In general, all the possibilities are can either be distinct, or=20=20 accumulative.=20There is also the possibility that you do not go with=20=20 any=20CA but configure X self-signed certs for X clients as being=20=20 trusted=20and the cert of the client needs to be an exact match with one=20= =20 of=20the X self-signed certs in the truststore. Whatever the policy(/ies) is/are in nfsd, I suggest to make it=20=20 explicit=20in the docs what is required and what is checked for each=20=20 policy.=20And even if it may be obvious for you Rick, please also print=20= =20 out=20why a client was rejected. Unfortunately I've seen a lot of cases=20= =20 where=20the error is a simple/frustrating "certificate rejected", but no=20= =20 info=20which part of the certificate check failed. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_M8_tNGFnqA8wLMuMfTFM8H6 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJedegeAAoJEBINsJsD+NiGFrMP/0bCJo3ptWPWlm5Nl0Ci+m5O d4LGTmgyZ2DNPW5nkuT6fc5R5rNGZb+WF1YzhZnlvHoZWa3FZ6Q7aUHNCMe5ptJu 4UMUzMlBf4czn1ndC4B9lyilANTKKNBKY3MIDu0JtE8QAtu4vbZ6VfHSlSN1A4dI vVEGSTqOrgJQ87LpIY+aI6AEfVbORQ20StoQqzUKTVPYP0ipEjYWRcWT8QNleNOM 9fdbnIXd5OWjL1hq7tsrXq1AjFqLR0Ddyov4EXSHZuR2zPUc1sj8OwDCB9AUkgv4 VSAtsKAFIe5GMtDe0lG4/Qymly+CfUH7ynyGwwjtLjR6IEpN3bnP1YkuiRkFN1Hl eEBqVdZNduDZipgmNDGwM+qjkipYWlhzOo19CpjXbyr0VnQ3gBgKxWEBHm9es8EI Mtzhk/kwpQelAGgu6qkc+60fv3BfPbJp+GLtcaUtRWBH6K0hH/tF83ehiF1cRI1G GasbJmR7EQtopkUq4UiIVKsxXDxLs8RFDR5fBEfWLAoatjxsEMEIZOlKKfjkc7bU 5ytBmXkg48whQyqT2xRFegGSioKH7FRznkAlgWhkcnSSAwmfLUaAiDNev+3J2eQ6 5AiOh31d/seGss5FnQ87mcmqWEPfqBDNFl3KMDTXMcKg3zbl0MUNnFGkWDL34Yik D3Oo9GS8mfqCRfFycyW0 =t33c -----END PGP SIGNATURE----- --=_M8_tNGFnqA8wLMuMfTFM8H6-- From owner-freebsd-current@freebsd.org Sat Mar 21 10:38:37 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1FEE725D712 for ; Sat, 21 Mar 2020 10:38:37 +0000 (UTC) (envelope-from shoesoft@gmx.net) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48kxvJ4XPgz4D5m for ; Sat, 21 Mar 2020 10:38:36 +0000 (UTC) (envelope-from shoesoft@gmx.net) Received: by mailman.nyi.freebsd.org (Postfix) id 9B64D25D707; Sat, 21 Mar 2020 10:38:36 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9B09E25D704; Sat, 21 Mar 2020 10:38:36 +0000 (UTC) (envelope-from shoesoft@gmx.net) Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kxvG6fnhz4D5k; Sat, 21 Mar 2020 10:38:34 +0000 (UTC) (envelope-from shoesoft@gmx.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1584787107; bh=3pReyg+InLT43uQefdmMkA11vCmepm0SBWR5YuxND5Q=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To:References; b=BATO+Ts9GGZ+o7bnuD7OCcMGqMCrSuNtRRjo6Xn5YZ1ms06+xXJl5KeZUjg+FtuVt zXdN/v2FwmEaHrI2sLd/YOUBICy2whq1WfQVJadF7ZrHjC3h4nq2R70WGgu1wjHiYE eNkLXGX6yfzoOHM24gJCW2PJ3Y+3463YhVsZzSWU= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from walrus.pepperland ([81.217.71.61]) by mail.gmx.com (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1M5fMe-1jDxdJ1kh0-007DMj; Sat, 21 Mar 2020 11:38:27 +0100 From: Stefan Ehmann To: current@freebsd.org, freebsd-stable@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus Date: Sat, 21 Mar 2020 11:38:26 +0100 Message-ID: <2005523.RhTPgMbj8J@walrus.pepperland> In-Reply-To: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="us-ascii" X-Provags-ID: V03:K1:HkfZIdBAgDJiFXQH2Bszhu8wYLhgOmKLq2E8ERTrXfAoDdems+A TWCIb+oexv6a7YHg6d9muInypMlFfXgtELWSKwHuRPW25oY2ezD3QFro7yswcvvda41QaSR b9wsIzAUzIpknBR1lj3ozJqHFhw+KUroIO7GEUJ6hBvn1Y3vRnhSic9+wrU+KKk1D7KV+zf e2vBMp3tYaE9u0wCo2PEw== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:nghALmyccpg=:o0Gw2hE/EgxKfJjKXr1W61 sLkXTE67zrUPLmaCwseNeffpPN5DW3VXBJ7sF8EU527CCm7cGCKbqJWKpc/SWbY80IqvWhBAL 6J6Samro+p3sWCv9lgS4452Fjv6ehEB8hw35410n/UpAs09k4AOWXNtyP35vV7VBCD9oUT+gY U+YLUCoOAxTuEvDXVVsMaFntJ+a5AYsizxNDQiigIs3dOh9ZWce/+FmLpFhxD99mCM+ato+bJ SaLHmMW4MoIkP5Zu6LKO/+T3A8Scf30eMJhH8xiStZhHn86Q+bwvjdZI4J0JllCHQlfXawW2d ZJBWkcOs/OGHnLaMRPKkkjvCGm7dXhNkbEOLLIYRLDj/1XWrIv46p4G/W5gzjCeGlIHj9wHM/ 4QohBmTd4tiwBU1nwNW+PiSQjLnsud3O/LxYWbBCYxqLvoHEKi7mT6Y+DoJprNo9BE/fP+yOr Xr1FLlUhoaS77HULPVZ5/G3Nn7YuA+UgeyUP4o+xevj3qlLegBVgrUGPRMtTit8TU1g6sjiDq wg5xERIt2dKS6qRO4hX1P1IJSgDDGaExu1MFEx7+rPHsemUd2nqRxtz4JVQci9RcpUaFfC99s 3KoYIYsj6hsW3dOkd9iZL5pISrxB2yw28svdcorZicGyKteACXQTTrAnjSCMCl/UYGJ1FvGFR ZI5v9NfzZicT3AAX+YAImrspJ4PVYNPonF4F5nOZ0WTXu+UdKKcP19QhTZfop3l8NQ+RFbVXG xYW8pgHCQlzzsEffzB3bbdkA3fytLn86ZJTmVOM4b6F+zvAHTCbJYIUFQ1w4PcPIQ0lTQ2Wm0 omWQ3sfKYsn3ihzXmKhZC6WqAdRAzfe1/tYJdMYIXx3Um3auuNMI81TvyqThf9zM8Gs/zVu0g BkmcVXVaJ9oyTJbCPDBsO7CR8rgZ7zglA3cAf/LSZ6BZPDN/5gBXQMGOa1aPKNwvI2aMxzpTm L+R5mvmwoieWUthYlSsDE4EVp6+93vMMddIonk3nx2gCRavWGmjlD1oG0RzAjLULaRlDQyksX WR7QFvcdSAoh+ItdxYtGCwnh+aMYbkdPgmAOYDP5HLwefA/1z7v8essoPHilZx8odw7Z5LvJl PF1n3FxbFoj0xvJhMx7uGb06Olsdd6s0aeBW47+98Gdh9j5SEmThvPTfOa7UTqq+XDxdySUmz cpIxKQWRd/Upf+Cw0z/dWp/94k1stwqUwbnEAIR5Bqei3xcm2QLstJobIAIdXd4uYcIWu/XRW h4ybHhHbqupdi2DK6 X-Rspamd-Queue-Id: 48kxvG6fnhz4D5k X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=BATO+Ts9; dmarc=none; spf=pass (mx1.freebsd.org: domain of shoesoft@gmx.net designates 212.227.15.18 as permitted sender) smtp.mailfrom=shoesoft@gmx.net X-Spamd-Result: default: False [-2.59 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:212.227.15.0/25]; FREEMAIL_FROM(0.00)[gmx.net]; DKIM_TRACE(0.00)[gmx.net:+]; RECEIVED_SPAMHAUS_PBL(0.00)[61.71.217.81.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; RCVD_IN_DNSWL_LOW(-0.10)[18.15.227.212.list.dnswl.org : 127.0.3.1]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; FREEMAIL_ENVFROM(0.00)[gmx.net]; DWL_DNSWL_NONE(0.00)[gmx.net.dwl.dnswl.org : 127.0.3.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.987,0]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; URIBL_BLOCKED(0.00)[leidinger.net.multi.uribl.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[gmx.net]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(0.00)[ip: (-7.45), ipnet: 212.227.0.0/16(-1.11), asn: 8560(2.18), country: DE(-0.02)]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 10:38:37 -0000 On Thursday, March 19, 2020 8:57:45 AM CET Alexander Leidinger via freebsd= - stable wrote: > Hi, > > if someone wants to donate some FreeBSD based CPU resources to the > fight against the Corona-virus, here is a quick HOWTO in terms of > installing the Folding@Home client on FreeBSD: > > https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-= free > bsd-foldinghome/ > Unfortunately, (using a CPU slot for the same work unit) TPF is 2-3 times slower than on Ubuntu for me. Much of the speed difference seems to be rel= ated to libOpenCL. If remove libOpenCL on Ubuntu, it's still 20-30% faster than= on FreeBSD. Don't know how stable the TPF numbers are, so numbers may be bogus. Will a CPU slot also use the GPU with libOpenCL or is it just using better optimized code? I tried to install libOpenCL but all I get is: OpenCL: Not detected: clGetPlatformIDs() returned -1001 Since there's no CUDA support for FreeBSD, I guess there is no point in tr= ying getting GPU slots to work. From owner-freebsd-current@freebsd.org Sat Mar 21 11:07:53 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F3C8B25E848 for ; Sat, 21 Mar 2020 11:07:52 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48kyY13sSlz3GbB; Sat, 21 Mar 2020 11:07:49 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: by mail-wr1-x42e.google.com with SMTP id m17so1521512wrw.11; Sat, 21 Mar 2020 04:07:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:cc:references:from:autocrypt:subject:message-id:date:user-agent :mime-version:in-reply-to:content-language; bh=5aySpVskbNEAF8Ias0EkLUWo0nndIr/BAWRCez+4I1k=; b=oIQY2VRASanvNRyp1wiYAwSf2M0np/NwhzxZAmrWG75K/WA71uv8OrkZdl+DvbcToO 0PcEnNHhuoaXmcN/qTAS0I+iW0ll5uw1ScIUpTpha3ndNsc1haFjHO95ITneD9qCfyrt bz6sDkNGs3irsHyduVvuVfGha4SE0uEDNTrgDvjsJTK+4Y2Mzai8jdigGEa+fbZrRsBx czyf8D9KCzZVgRLQRQnNt3iFEfKkO7gwGwnUtw6htc/FmDu7f6kgPaOyNaPRzxM0Ys8l B8EyR8cDBGFlu4iXSPK8RbfyaWOM9hVboF6v+kbjpfnENyoCG8l3Hl9Fnsyy59uSzKhp LdFw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:references:from:autocrypt:subject :message-id:date:user-agent:mime-version:in-reply-to :content-language; bh=5aySpVskbNEAF8Ias0EkLUWo0nndIr/BAWRCez+4I1k=; b=eiCCQqmhXTV0UiNXgkXMnop6KWb1kgXAIml5pBGE1fNdkmnCk3YFf4jcc9/bDF3chA iAPRK8eF6/Vl0bHdOvSLYEk7DWjiGAf9Lm8yPvOlIO3N81faCsh9StrdQzdPHDD8k47y dBuEB/MZY9CU9Y04ZZsxZD2/3vHi/wDviHlhbdSilkUZWk0DdXGg3sE/4D8QbE1Be9tD /b6yi16kMWSml0OSKEZfxBin8qThLnc9+IdxD6mQIMLbmuWEGotDFAa7Qm38Xqbk1w9B NOkY2g5HKha/W+nYwysZkVsT4O3mW+c/BcTEGw6CXs6l//TgUEDbCeK5q6bJmsxNT1WB pYUA== X-Gm-Message-State: ANhLgQ2Sqhel5+rkC5oe7+1u0A+jytR3//fGeQKR9WcmB7dy7/GpFIie JmGrgX7Dq7B+IeO0LBQ1v+GfFXHHVMqiEQ== X-Google-Smtp-Source: ADFU+vvmwqQZt3zRrrzjPNA7+kISmRijNrRPZ7Az0FV/zHkyBtCDggV9XD2UrfqqCk+shndX40K8fg== X-Received: by 2002:adf:a3db:: with SMTP id m27mr17301185wrb.350.1584788866354; Sat, 21 Mar 2020 04:07:46 -0700 (PDT) Received: from ?IPv6:2003:c3:4f46:d213:e54:15ff:fe22:27b1? (p200300C34F46D2130E5415FFFE2227B1.dip0.t-ipconnect.de. [2003:c3:4f46:d213:e54:15ff:fe22:27b1]) by smtp.gmail.com with ESMTPSA id a192sm12534043wme.5.2020.03.21.04.07.37 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 21 Mar 2020 04:07:40 -0700 (PDT) To: Warner Losh , Dimitry Andric Cc: FreeBSD Current References: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> From: h v Autocrypt: addr=henry.vogt@gmail.com; prefer-encrypt=mutual; keydata= mQGiBD85EtkRBADHyFu5eTEtFCd10Z25l1ryaWN6bcfyrGuD06OBsaUHIO3kg45NPbEGXcT4 s4klWZFcWmXWVKkSt6sCCqmjZYb0CLYAJ1rhOC8UBT5ULIts+dVIM9vDEujMk49IsugtEqUW CJFE5wNDpAeH0uXSvv6zn3ZeMiYw3C/yUErYEc7yXwCgvW1hhYg3iCHXrw7T3pwl1JVj5uUD /jpxqMRvnSl923wI+u6XW+uBX93isTErwlCmQecSIDX1d9vWY+LVXrHT2GkCeTtZfAM4HHqy 01y+047gaKRG3PLtTxmI5MgFB3U8jpvd8R/XGpVW+jLljnoiVDEu9LZtsSZtiVtNTZLbYlwc ICa56u8vBnmX3mVhBgSsjUVH1FrhA/93/Ht30cSSpTkPwKipw2Ad4ObBi+fQGIpn74As2+7q Yty6BoAec9Xp+02FyA/uCHZL70LPdZLeeipTAeNMhRhWlzxLVGsjSzbkRjG5uQB1yYtJEoi5 UMGKanxfcGu9ReZZ1lLV10w0muhu7k/JQRk0tEJY/71ywpRTITuixhgHsbQgSGVucnkgVm9n dCA8aHZAdHVlYmluZ2VuLm1wZy5kZT6IXAQTEQIAHAQLBwMCAxUCAwMWAgECHgECF4AFAkWL yzACGQEACgkQiF3PvXvQ0FAtSgCeLRcArT2zPk/zLZUyjOq/U7sakFYAn3PCCCbBa03798LN XRhxCjInjTx6uQENBD85EukQBADXBHQcJeBdnmiBCoCpfTVwhf66orSqBHfnrnrS8qDzfo3p Q6YsL225StuNwt9PNouMAA06IXV3IW8DodGL7j4RT2d2wnpsk3giRN7tqs3EYHuV1eCDEvi2 PLh8PMRoXO7NsYRG4bQ14cp5U6g8FI+ASQF8Yv/1fpYn+X5S2v+/iwADBQQApTJUNcKREGXR dTE1FCt96FC7QDaQwBgEIHKdsIvvFIkI5Of6eP3qbkOXehAtf6GStgjADhDeb9xDLj2fMbPe U/zVPuCHe+e3wECQun+6UhSUdxIIql3cdMBieIaa4Y/DcV0drdXr2bOiSTnR/E4GJqxaZEoC 2ocQfZQj4Bkw9CKIRgQYEQIABgUCPzkS6QAKCRCIXc+9e9DQUBftAJ4iJKziUBZwvQp3Q8Do sH8qz/pPugCfSBs4RUrAJURi5fZ0sDAJQgE+8jc= Subject: Re: cannot build 12.1-RELEASE on latest current-snapshot Message-ID: <284096b0-20b4-e022-bebb-eb0470a0c2e3@gmail.com> Date: Sat, 21 Mar 2020 12:07:33 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US X-Rspamd-Queue-Id: 48kyY13sSlz3GbB X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=oIQY2VRA; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of henryvogt@gmail.com designates 2a00:1450:4864:20::42e as permitted sender) smtp.mailfrom=henryvogt@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.06), ipnet: 2a00:1450::/32(-2.39), asn: 15169(-0.91), country: US(-0.05)]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[e.2.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 11:07:53 -0000 Hi, --- C U T --- On 20.03.20 18:20, Warner Losh wrote: > > > On Fri, Mar 20, 2020, 11:12 AM Dimitry Andric > wrote: > > On 20 Mar 2020, at 10:55, h v > wrote: > > > > buildworld for 12.1-RELEASE fails on recent current.. in stage > 3: cross > > tools (see below) > > > > Did i miss=C2=A0 newer Options/ Parameters (i checked UPDATING wi= thout > > relevant changes) > > > > i'm also not attemting a cross build, simply compiling on amd64 > for amd64. > > > > --- C U T --- > > > > -------------------------------------------------------------- > >>>> stage 3: cross tools > > -------------------------------------------------------------- > > cd /usr/src/12.1; INSTALL=3D"sh /usr/src/12.1/tools/install.sh" > > TOOLS_PREFIX=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp > > > PATH=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/sbin:/usr/o= bj/usr/src/12.1/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/12.1/amd6= 4.amd64/tmp/legacy/bin:/sbin:/bin:/usr/sbin:/usr/bin > > WORLDTMP=3D/usr/obj/usr/src/12.1/amd64.amd64/tmp=C2=A0 MAKEFLAGS=3D= "-m > > /usr/src/12.1/tools/build/mk=C2=A0 -m /usr/src/12.1/share/mk" mak= e=C2=A0 -f > > Makefile.inc1=C2=A0 DESTDIR=3D > > OBJTOP=3D'/usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools' > > OBJROOT=3D'${OBJTOP}/'=C2=A0 MAKEOBJDIRPREFIX=3D=C2=A0 BOOTSTRAPP= ING=3D1300084 > > BWPHASE=3Dcross-tools=C2=A0 SSP_CFLAGS=3D=C2=A0 MK_HTML=3Dno NO_L= INT=3Dyes MK_MAN=3Dno > > -DNO_PIC MK_PROFILE=3Dno -DNO_SHARED=C2=A0 -DNO_CPU_CFLAGS MK_WAR= NS=3Dno > > MK_CTF=3Dno=C2=A0 MK_CLANG_EXTRAS=3Dno MK_CLANG_FULL=3Dno=C2=A0 M= K_LLDB=3Dno > > MK_RETPOLINE=3Dno MK_TESTS=3Dno=C2=A0 MK_INCLUDES=3Dyes MK_LLVM_T= ARGET_ALL=3Dno > > TARGET=3Damd64 TARGET_ARCH=3Damd64=C2=A0 MK_GDB=3Dno MK_TESTS=3Dn= o cross-tools > > =3D=3D=3D> lib/clang (obj,all,install) > > =3D=3D=3D> lib/clang/libllvm (all) > > [Creating objdir > > > /usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools/lib/clang/libllvm..= =2E] > > make[4]: "/usr/src/12.1/lib/clang/libllvm/Makefile" line 18: Plea= se > > enable at least one of: MK_LLVM_TARGET_AARCH64, MK_LLVM_TARGET_AR= M, > > MK_LLVM_TARGET_BPF, MK_LLVM_TARGET_MIPS,=C2=A0 MK_LLVM_TARGET_POW= ERPC, > > MK_LLVM_TARGET_RISCV, MK_LLVM_TARGET_SPARC,=C2=A0 or MK_LLVM_TARG= ET_X86 > > *** Error code 1 > > Looks like you have MK_LLVM_TARGET_ALL=3Dno in your src.conf? Try > removing > it.=C2=A0 Can you also post your make.conf and src.conf? > > > > No. This was an error I committed. Update and try again. I had one too > many changes in the tree I pushed this morning.=C2=A0 > > Warner Unfortunately not.. im now @13.0-CURRENT r359179 - still bailing out (after make cleanworld for src=3D12.1-RELEASE-p3) - btw. 12-STABLE can be compiled , as well as 11.3 and 11-STABLE (this is a build machine;-) it's only 12.1-RELEASE (trying to compile -p3) Normally i compile with=C2=A0 -j 8 and WITH_META_MODE=3Dyes, now compilin= g manually without them.. Regarding /etc/{src,src-env,make}.conf - not using any of these on this tests atm. ---C U T--- --- cross-tools --- =3D=3D=3D> lib/clang (obj,all,install) --- all_subdir_lib/clang/libllvm --- =3D=3D=3D> lib/clang/libllvm (all) [Creating objdir /usr/obj/usr/src/12.1/amd64.amd64/tmp/obj-tools/lib/clang/libllvm...] make[4]: "/usr/src/12.1/lib/clang/libllvm/Makefile" line 18: Please enable at least one of: MK_LLVM_TARGET_AARCH64, MK_LLVM_TARGET_ARM, MK_LLVM_TARGET_BPF, MK_LLVM_TARGET_MIPS,=C2=A0 MK_LLVM_TARGET_POWERPC, MK_LLVM_TARGET_RISCV, MK_LLVM_TARGET_SPARC,=C2=A0 or MK_LLVM_TARGET_X86 *** [all_subdir_lib/clang/libllvm] Error code 1 make[3]: stopped in /usr/src/12.1/lib/clang =2E... ---C U T --- any other ideas ? Best Henry From owner-freebsd-current@freebsd.org Sat Mar 21 11:08:08 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6505F25E89D for ; Sat, 21 Mar 2020 11:08:08 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 48kyYK4Rylz3H3Z for ; Sat, 21 Mar 2020 11:08:05 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: by mailman.nyi.freebsd.org (Postfix) id 2DEF425E866; Sat, 21 Mar 2020 11:08:04 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E901F25E862; Sat, 21 Mar 2020 11:08:03 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48kyYG1L7Tz3Gww; Sat, 21 Mar 2020 11:08:01 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B165828.dip0.t-ipconnect.de [91.22.88.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id A635426FB; Sat, 21 Mar 2020 12:07:58 +0100 (CET) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 1C988116FC; Sat, 21 Mar 2020 12:07:56 +0100 (CET) Date: Sat, 21 Mar 2020 12:07:55 +0100 Message-ID: <20200321120755.Horde.zo0-HJ_AnsKmqqmFSb98-e8@webmail.leidinger.net> From: Alexander Leidinger To: Stefan Ehmann Cc: current@freebsd.org, freebsd-stable@freebsd.org Subject: Re: HOWTO donate CPU to the fight against the Corona-virus References: <20200319085745.Horde.yAf5603LMT07oVm8NR1Abs6@webmail.leidinger.net> <2005523.RhTPgMbj8J@walrus.pepperland> In-Reply-To: <2005523.RhTPgMbj8J@walrus.pepperland> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_ClfmenlmAABLeGcw7Zxopr7"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 48kyYG1L7Tz3Gww X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.81 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; URIBL_BLOCKED(0.00)[leidinger.net.multi.uribl.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-0.996,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; IP_SCORE(-3.72)[ip: (-9.78), ipnet: 89.238.64.0/18(-4.89), asn: 34240(-3.92), country: DE(-0.02)]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; SIGNED_PGP(-2.00)[]; FREEMAIL_TO(0.00)[gmx.net]; RECEIVED_SPAMHAUS_PBL(0.00)[40.88.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 11:08:08 -0000 This message is in MIME format and has been PGP signed. --=_ClfmenlmAABLeGcw7Zxopr7 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Stefan Ehmann (from Sat, 21 Mar 2020=20=20 11:38:26=20+0100): > On Thursday, March 19, 2020 8:57:45 AM CET Alexander Leidinger via freebs= d- > stable wrote: >> Hi, >> >> if someone wants to donate some FreeBSD based CPU resources to the >> fight against the Corona-virus, here is a quick HOWTO in terms of >> installing the Folding@Home client on FreeBSD: >> >> https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-= free >> bsd-foldinghome/ >> > > Unfortunately, (using a CPU slot for the same work unit) TPF is 2-3 times > slower than on Ubuntu for me. Much of the speed difference seems to=20=20 >=20be related > to libOpenCL. If remove libOpenCL on Ubuntu, it's still 20-30% faster tha= n on > FreeBSD. The pure CPU based code should be the same. Someone would have to=20=20 trace=20/ reverse engineer what is going on. > Don't know how stable the TPF numbers are, so numbers may be bogus. > > Will a CPU slot also use the GPU with libOpenCL or is it just using bette= r > optimized code? I tried to install libOpenCL but all I get is: No idea. Just an assumption: either full CPU or full GPU. > OpenCL: Not detected: clGetPlatformIDs() returned -1001 Depending on what clGetPlatformIDs is doing and if it is not=20=20 using/requesting=20some GPU support, it may be worth to check the code=20= =20 of=20it so see if we can improve something. > Since there's no CUDA support for FreeBSD, I guess there is no point=20= =20 >=20in trying > getting GPU slots to work. I assume the same. First step would be to get CUDA support in FreeBSD.=20= =20 I=20think I remember somewhere on the X11 mailinglist someone told that=20= =20 he=20got some NVidia GPU compute part working... not really sure about=20= =20 that=20part. It would help to get a big player to request it from=20=20 NVidia.=20As Netflix seems to go the "encode videos on CPU" (assumption=20= =20 based=20upon their Intel av1 codec support/benchmarks) way, and other=20=20 players=20in the video / graphics business more oriented towards linux,=20= =20 I=20do not have much hope in this regard ATM. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_ClfmenlmAABLeGcw7Zxopr7 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJedfWLAAoJEBINsJsD+NiGJHEP/3zpzXxXQeZSdx10m9MQnJks 9AXLUbwH4LO6iAfnpSXRP8HxDp3HO8hRS4slzWxPokja8vxXSqWSlrX3Ze1RWaSU JGwta4hx8khuE7l5gUEZVFkso7y6Qp+WnSlyzJIwY1NDyxIIm4MlIzGPoR8z+iIc kUhuCeauagm/bqdIiYMeNUrNuxS/IPtA+Dwd02teS08IxN7l6xk8YQ0Sa59iGlmq PX7UsoICtqCih/kRon0y7a8HWqGgYfN+25DLeTJXffG+6y0OxyqgBSBrjLA3BIXS CiM32qBRs76HM3kgveqd6kfycsNN7Xgds2qeWaGPJbifts+ba1lPCD1qlILebQLh 4JcI2DmvdCLiucVxZWUF8LG1Ea54WCQCiCi6676mv+8ILOoZW17a3lJZH7t/vegH JIfx5PbzPRV+DOjnTQIJYu+pd4yxrrT6eKJm2Wm/dCfmIJXnIWA49Aae6zi3aNG5 bkW7WrBy2DANdGHl7jArOSDv8hcn1MPzsZ/6VMcMAb+HHKSP9K/iS23Y7k+RiixZ zJhG4crzdNKIIc0yIaXvptcMM59Tk4znG9LsRuBTCduLhtqPN7JYWxUth7A3INcB QqOetB56A9gvyn+PNNrq8zunpWxnOJjNnhrzDJuPk1NRzUSvEA/f48KQsrV3T8zn tXC9HuY7BwjBgaCeiG28 =G/qe -----END PGP SIGNATURE----- --=_ClfmenlmAABLeGcw7Zxopr7-- From owner-freebsd-current@freebsd.org Sat Mar 21 15:52:38 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B755D2659BA for ; Sat, 21 Mar 2020 15:52:38 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48l4sf0RBHz4LNn; Sat, 21 Mar 2020 15:52:37 +0000 (UTC) (envelope-from henry.vogt@gmail.com) Received: by mail-wr1-x434.google.com with SMTP id j17so7745353wru.13; Sat, 21 Mar 2020 08:52:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:autocrypt:subject:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=aBAZXnsjg7iQoOLxoSFHpHfABYrLAPhvV5i7MaWbZuE=; b=msTCR+5V3GIMysZdMBwQ+/KnnGkAWixR3Ad7GKq+nUjdUTY0JrCQW8VLO44L3vvMg/ 4EOcLUImudZBivT8uoeqVDKXFB/hnU1XPdpL2S/a9amGGESjcpH5G3Xx7Wql5JmxbasI 8TdPdQ0F7sZdvJIfF2MBxAejVapIQ/DUxjHPinKRuYtVKYzgDKfzHbgRJZ24/244kIpn 5nM6c/ES8SPF2+ch6E9x7psqpyRTeI9Id1vVS2F9r/SAQU8plFpWnmVO74cnCAtm8Tqd uNb7zuQ/IdNdlQI3zj2nkfW04PHrx0eKjZeHospWxur9dpOPQyxwu9GwzZZaeXLA91gV jo9w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:autocrypt:subject :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding:content-language; bh=aBAZXnsjg7iQoOLxoSFHpHfABYrLAPhvV5i7MaWbZuE=; b=qq44cyzop+jqhNW8j6b01f4V9BoGEmUnndW2vTFHQ95zLRtOJpwoVEL7ljxeo/zwJh yg/LjYQQFLnE47H9KIGbUOz+Z2Bby0jB7PmXeT1kcIgGJMGBN2wFtu6+kgs+qwtJAJ+Z +B2WsumRMr3R4UnRFUeqqwryJ1mKC6iGrX8cSAKOl3G+3DV8PmK9ZV/Ii/oA3Sx5RgG8 1DWRYcNBrO7e4mLBZZbKz/5pqjDDYcnOlEAzdj45+/GwSQ5OX112Mw7Tf8y8edk17Vy6 axRcQRI8TAcpinNDVNHlToAZeNmyLVUG1ZbFu/xTHckravXAK5bnwVlZa+fkGcOfs0Ol P0aQ== X-Gm-Message-State: ANhLgQ0Usxp/rGqJKFpaa9J7/+cUVz0ROEo/yCX0LAxV6yMtgECKsxZt pq73eI6H+V+bcYryBHpJclDd88qIwYkDMA== X-Google-Smtp-Source: ADFU+vugDyzSvllqb1hj86DIOzsJyeyIRPatWIo3He38ieAQzBdoO851NWk3SK895L0UeA6IYSK6Bw== X-Received: by 2002:adf:83c4:: with SMTP id 62mr19207539wre.105.1584805955941; Sat, 21 Mar 2020 08:52:35 -0700 (PDT) Received: from ?IPv6:2003:c3:4f46:d213:e54:15ff:fe22:27b1? (p200300C34F46D2130E5415FFFE2227B1.dip0.t-ipconnect.de. [2003:c3:4f46:d213:e54:15ff:fe22:27b1]) by smtp.gmail.com with ESMTPSA id q4sm15805299wmj.1.2020.03.21.08.52.34 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 21 Mar 2020 08:52:35 -0700 (PDT) From: h v To: Warner Losh , Dimitry Andric Cc: FreeBSD Current References: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> Autocrypt: addr=henry.vogt@gmail.com; prefer-encrypt=mutual; keydata= mQGiBD85EtkRBADHyFu5eTEtFCd10Z25l1ryaWN6bcfyrGuD06OBsaUHIO3kg45NPbEGXcT4 s4klWZFcWmXWVKkSt6sCCqmjZYb0CLYAJ1rhOC8UBT5ULIts+dVIM9vDEujMk49IsugtEqUW CJFE5wNDpAeH0uXSvv6zn3ZeMiYw3C/yUErYEc7yXwCgvW1hhYg3iCHXrw7T3pwl1JVj5uUD /jpxqMRvnSl923wI+u6XW+uBX93isTErwlCmQecSIDX1d9vWY+LVXrHT2GkCeTtZfAM4HHqy 01y+047gaKRG3PLtTxmI5MgFB3U8jpvd8R/XGpVW+jLljnoiVDEu9LZtsSZtiVtNTZLbYlwc ICa56u8vBnmX3mVhBgSsjUVH1FrhA/93/Ht30cSSpTkPwKipw2Ad4ObBi+fQGIpn74As2+7q Yty6BoAec9Xp+02FyA/uCHZL70LPdZLeeipTAeNMhRhWlzxLVGsjSzbkRjG5uQB1yYtJEoi5 UMGKanxfcGu9ReZZ1lLV10w0muhu7k/JQRk0tEJY/71ywpRTITuixhgHsbQgSGVucnkgVm9n dCA8aHZAdHVlYmluZ2VuLm1wZy5kZT6IXAQTEQIAHAQLBwMCAxUCAwMWAgECHgECF4AFAkWL yzACGQEACgkQiF3PvXvQ0FAtSgCeLRcArT2zPk/zLZUyjOq/U7sakFYAn3PCCCbBa03798LN XRhxCjInjTx6uQENBD85EukQBADXBHQcJeBdnmiBCoCpfTVwhf66orSqBHfnrnrS8qDzfo3p Q6YsL225StuNwt9PNouMAA06IXV3IW8DodGL7j4RT2d2wnpsk3giRN7tqs3EYHuV1eCDEvi2 PLh8PMRoXO7NsYRG4bQ14cp5U6g8FI+ASQF8Yv/1fpYn+X5S2v+/iwADBQQApTJUNcKREGXR dTE1FCt96FC7QDaQwBgEIHKdsIvvFIkI5Of6eP3qbkOXehAtf6GStgjADhDeb9xDLj2fMbPe U/zVPuCHe+e3wECQun+6UhSUdxIIql3cdMBieIaa4Y/DcV0drdXr2bOiSTnR/E4GJqxaZEoC 2ocQfZQj4Bkw9CKIRgQYEQIABgUCPzkS6QAKCRCIXc+9e9DQUBftAJ4iJKziUBZwvQp3Q8Do sH8qz/pPugCfSBs4RUrAJURi5fZ0sDAJQgE+8jc= Subject: Re: cannot build 12.1-RELEASE on latest current-snapshot Message-ID: <0db3dd22-1b7f-0480-1768-46e0e376c3a9@gmail.com> Date: Sat, 21 Mar 2020 16:52:31 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-US X-Rspamd-Queue-Id: 48l4sf0RBHz4LNn X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=msTCR+5V; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of henryvogt@gmail.com designates 2a00:1450:4864:20::434 as permitted sender) smtp.mailfrom=henryvogt@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.39), ipnet: 2a00:1450::/32(-2.39), asn: 15169(-0.86), country: US(-0.05)]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[4.3.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 15:52:38 -0000 Hi, > On 20.03.20 18:20, Warner Losh wrote: >> >> ... >> No. This was an error I committed. Update and try again. I had one >> too many changes in the tree I pushed this morning.=C2=A0 >> >> Warner > > > Unfortunately not.. im now @13.0-CURRENT r359179 - still bailing out > (after make cleanworld for src=3D12.1-RELEASE-p3) -.... > > Normally i compile with=C2=A0 -j 8 and WITH_META_MODE=3Dyes, now compil= ing > manually without them.. > > ... > for the sake of completeness.. compiling w/out -j 8 and=C2=A0 META_MODE didn't help, of course. so compiling 12.1-RELEASE(-p3) on 13-CURRENT still broken .. clang10 issu= e ? Best Henry From owner-freebsd-current@freebsd.org Sat Mar 21 16:54:50 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BC772266E5B; Sat, 21 Mar 2020 16:54:50 +0000 (UTC) (envelope-from grarpamp@gmail.com) Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48l6FP57MLz4W3s; Sat, 21 Mar 2020 16:54:49 +0000 (UTC) (envelope-from grarpamp@gmail.com) Received: by mail-io1-xd43.google.com with SMTP id n21so9504622ioo.10; Sat, 21 Mar 2020 09:54:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=l20Ddb/fmvFUohzhjPjts66byUH1AwmfTyQuJ7mCtIo=; b=bJx100UIffPrvb1klBzDzxjDspcwLd+bLZY8z0VIIMVwOKaPcjA5Ek3MONFXdXeK61 aK0vc1s9yf5iQr4WQ/bdyWHtnhKwxLJfe0gQILLFWtTa6lWrMOCFgK2TeURdY7rVsj0G h9HvhIyJJ2+gbCoxdyYk+2P2w26t9I/09zKB41qdYq4Ljd8A/jetlngjXQkpij6E2F7R 0qGclmubXyGqtk4cbgqeWwHKlG1fyHZ7+uVGaIzDoxYB0sXHK8CiVBf87NFT4mgoVspQ rvWzoM/Vf2B0JD92yJFBHsYlTMn0koiyKUaNlAYBkWMM4sotDgzmrbCQb+cOXgeFHegA 849Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=l20Ddb/fmvFUohzhjPjts66byUH1AwmfTyQuJ7mCtIo=; b=ppHxMXHVL9NcDomSD9CJNJKnOGA0b/Q7Wl+sDeKImX8qiWHZPkRx7ogWzOVK70FF4i erKKVjLg+BoXhNh2asYp4wwrR5MTzS6q4D++kwdYkohMfSrE4R8aB2P97A1DXA2r9Rw5 Yy3mgkuXOpDjeyWfS4Ldjc5ucEwrV7fkHyUv5Dj6XgEpxGMIL+8jdSAdWTP0iG83UHIZ 6tfhjrBWFLIaBbqhbVHr0YKgXmq/pAtTA5tFBUp1o/9Mt4VU6eazf54xb/lJx6O/gU95 MdgGjKP0wOorVo0+q94tvAHGRVmFdcUa2OAqb0M0MleOFD+eDotEDwq+bYQ66UbfOP8v eqHg== X-Gm-Message-State: ANhLgQ3VOttI5RW0BbHx8n9RNqmMS8XTaCQ8mwKKDv6HShvY/qXNrce6 gyHnkMO11G3cp76wJZliZoH0K+9RqP2uEzadHZtycXw3 X-Google-Smtp-Source: ADFU+vvtP2iZrqaDpvSbQehx3wkbX++K0o7qxXAA4UoH8itaMN56TQVa7dZoy6esGZkE9Cc6KqIiKq7VPiqrr3vPaSY= X-Received: by 2002:a02:9183:: with SMTP id p3mr13075144jag.55.1584809688408; Sat, 21 Mar 2020 09:54:48 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:6638:210:0:0:0:0 with HTTP; Sat, 21 Mar 2020 09:54:48 -0700 (PDT) From: grarpamp Date: Sat, 21 Mar 2020 12:54:48 -0400 Message-ID: Subject: TLS Fingerprint Pinning Needed [ex: for NFS-over-TLS client] To: freebsd-current@freebsd.org Cc: freebsd-security@freebsd.org, freebsd-questions@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 48l6FP57MLz4W3s X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=bJx100UI; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of grarpamp@gmail.com designates 2607:f8b0:4864:20::d43 as permitted sender) smtp.mailfrom=grarpamp@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; IP_SCORE(0.00)[ip: (0.98), ipnet: 2607:f8b0::/32(-0.74), asn: 15169(-0.85), country: US(-0.05)]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[3.4.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 16:54:50 -0000 People appear to be talking about using and "authenticating / verifying" TLS certs now with at least perhaps this NFS, and certainly with other apps. If so, it's required critical thing for the admins and users to have the option to pin the certificate pubkey fingerprints in four ways... - Ignore the CA chain / expiry / etc, validate only the fingerprint. - Validate the CA chain / expiry / etc, and validate the fingerprint. - Validate the CA chain / expiry / etc, ignore the fingeprint. - A TOFU mode. No application that uses TLS should be considered completely featured and security capable without fingerprint pinning functions. For some background reasons on why --pinnedpublickey implementations are now showing up in softwares that speak TLS, and for sample code, and related infos, see the links... https://owasp.org/www-community/controls/Certificate_and_Public_Key_Pinning https://cheatsheetseries.owasp.org/cheatsheets/Pinning_Cheat_Sheet.html https://curl.haxx.se/libcurl/c/CURLOPT_PINNEDPUBLICKEY.html --pinnedpubkey Tells curl to use the specified public key file (or hashes) to verify the peer. This can be a path to a file which contains a single public key in PEM or DER format, or any number of base64 encoded sha256 hashes preceded by 'sha256//' and separated by ';' When negotiating a TLS or SSL connection, the server sends a certificate indicating its identity. A public key is extracted from this certificate and if it does not exactly match the public key provided to this option, curl will abort the connection before sending or receiving any data. Please note this option is rightly more specific covering only the isolated pubkey, not the DER form of the entire "CA signed" cert (ie: not the typically referenced coverage of "openssl x509 -fingerprint"). When fully implemented, this enables a local admin and user environment of more flexible certificate validation service cababilities and security model hardening when subject to various third party things and adversaries like... - Environment of rogue / forced / spy MITM CA's, TLS termination / proxy cloud MITM, VPN / overlay / WiFi networks MITM, etc. - Annoying "expired" certs awaiting tax revenue from their captured audience. - Assigning pinned trust to intermediate CA's such as Lets Encrypt, Google, and corporate schemes, to let edge server certs they sign be freely rotated and or freshly signed without need to update pin. - Avoid need to update pin every "expiry" period. - Avoid CA's by using cert owners publicly available and out of band self certification attestations found on keybase, social, observatories, PGP, etc. - As mentioned above, optionally in combination with other CA / expiry / etc checks, or ignoring the CA altogether. - CRL checks are a massive metadata privacy and user monetization leak that some users might not want exposed to. - Pinning one or both of: pubkey (herein) and or CA (openssl x509 -fingerprint) Another very useful security feature to have is a trust on first use TOFU mode that stores, pins, and subsequently validates against those fingerprints, similar to SSH model. This is useful for both known comms partners such as client-server model, and in more distributed group or even p2p applications to help keep things a bit more locked down by default. Defense (like this pubkey pinning) in depth... you can use it :) References (obviously TLS_1.3 is todays version to use)... https://www.netcraft.com/internet-data-mining/ssl-survey/ https://www.ssllabs.com/ssl-pulse/ https://arstechnica.com/gadgets/2018/10/browser-vendors-unite-to-end-support-for-20-year-old-tls-1-0/ https://www.bleepingcomputer.com/news/security/ietf-approves-tls-13-as-internet-standard/ https://en.wikipedia.org/wiki/Transport_Layer_Security https://tools.ietf.org/html/rfc8446 https://github.com/OWASP/www-community/blob/master/pages/controls/Certificate_and_Public_Key_Pinning.md https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Pinning_Cheat_Sheet.md https://github.com/curl/curl/blob/master/docs/cmdline-opts/pinnedpubkey.d https://github.com/curl/curl/blob/deb9462ff2de8e955c67ed441f5f48619a31198d/docs/libcurl/opts/CURLOPT_PINNEDPUBLICKEY.3 https://github.com/curl/curl/blob/51fde337471c9125e7bf425e7ce0a0bf53691992/docs/TODO#L728 From owner-freebsd-current@freebsd.org Sat Mar 21 20:52:29 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8DEDE26C0D9 for ; Sat, 21 Mar 2020 20:52:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48lCWd3J1rz3y1K; Sat, 21 Mar 2020 20:52:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from tensor.andric.com (tensor.andric.com [IPv6:2001:470:7a58:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 57D25925E; Sat, 21 Mar 2020 20:52:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from [IPv6:2001:470:7a58::cfa:8634:513e:af21] (unknown [IPv6:2001:470:7a58:0:cfa:8634:513e:af21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 1B6574059; Sat, 21 Mar 2020 21:52:28 +0100 (CET) From: Dimitry Andric Message-Id: <2B12E7DF-1A72-4BFA-BF39-0EEC63C3D119@FreeBSD.org> Content-Type: multipart/signed; boundary="Apple-Mail=_223E4A1D-815B-4A2A-9165-644B744117E5"; protocol="application/pgp-signature"; micalg=pgp-sha1 Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: cannot build 12.1-RELEASE on latest current-snapshot Date: Sat, 21 Mar 2020 21:52:19 +0100 In-Reply-To: <0db3dd22-1b7f-0480-1768-46e0e376c3a9@gmail.com> Cc: Warner Losh , FreeBSD Current , Bryan Drewery To: h v References: <6d70f98f-dd49-a5f9-e7bb-86d6853aa20a@gmail.com> <586FD874-A5AB-4C2B-817B-1F7C53809E9E@FreeBSD.org> <0db3dd22-1b7f-0480-1768-46e0e376c3a9@gmail.com> X-Mailer: Apple Mail (2.3445.104.11) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2020 20:52:29 -0000 --Apple-Mail=_223E4A1D-815B-4A2A-9165-644B744117E5 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 21 Mar 2020, at 16:52, h v wrote: >=20 >> On 20.03.20 18:20, Warner Losh wrote: >>>=20 >>> ... >>> No. This was an error I committed. Update and try again. I had one >>> too many changes in the tree I pushed this morning. >>>=20 >>> Warner >>=20 >>=20 >> Unfortunately not.. im now @13.0-CURRENT r359179 - still bailing out >> (after make cleanworld for src=3D12.1-RELEASE-p3) -.... >>=20 >> Normally i compile with -j 8 and WITH_META_MODE=3Dyes, now compiling >> manually without them.. >>=20 >> ... >>=20 > for the sake of completeness.. compiling w/out -j 8 and META_MODE > didn't help, of course. >=20 > so compiling 12.1-RELEASE(-p3) on 13-CURRENT still broken .. clang10 = issue ? It needs a merge of r355588 ("Fix WITHOUT_CLANG build"), actually. For some reason, the logic in 12.1-R's version of src.opts.mk does not work correctly. I tried setting MK_SYSTEM_COMPILER=3Dno, but even that does not work as it should. If you can, I would use 12-STABLE instead. -Dimitry --Apple-Mail=_223E4A1D-815B-4A2A-9165-644B744117E5 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.2 iF0EARECAB0WIQR6tGLSzjX8bUI5T82wXqMKLiCWowUCXnZ+gwAKCRCwXqMKLiCW o7S3AJ0Ttkit7Umw64+gVAQRJCU9kngWJgCgl02rhbr/LoK4urqj6gBm4UQfCjY= =PNIZ -----END PGP SIGNATURE----- --Apple-Mail=_223E4A1D-815B-4A2A-9165-644B744117E5--