From owner-freebsd-current@freebsd.org Sun Sep 27 02:52:43 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 87F593E950A; Sun, 27 Sep 2020 02:52:43 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-to1can01on060e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5d::60e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BzVZ22sGgz4P45; Sun, 27 Sep 2020 02:52:42 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=idMrZ7BhPcxqBzhupRWkRUSzXVLP/7V6tg5z52J0ZTvk1WZORdylEQ0cTGkg5dgoqyrxZqQycVyPs4AdmhQFIY8PK46fgz3M1XE1sHm90v70CKhexC3IQJIlX6/oW83m1qNkeCDRAtO7bZwt0neA0WJTWusxSuYIJ22cnnaJ+AunsnebJQJSWZJZg6vayg42ky2wDt7XgJXiQOKtfrWKTF248KbudVdfsOwSAuOoGad3ZMuiJl5SVVBnQsDfGwWXg2GaB6JmYWossQb3IZN3fORWyYKWClZi9PDaV0glu2Cv/7jWHcidfZLNy0fYgHsEmnGUiQhleMLRjxqVvumFQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uLKZ5VntpkUNMq5oLZ4rXndQpmPBCnBSfZBkvH+HxxY=; b=DyGO6Shfi4ujsIA+0l65HvVz0rm2AnXV0Na79Fp2a7/hvlMPBMLE0IgQdd6ZdEmI1EJWc9KdgC0DwcUxQ7EtYCtt6mm2foVMZGPV4nzdUVPlyrVTNoOActEed8NLoESXgui2WPXM3tvKhInnx+lgGmPjstIwCtf06BF2VleQ6dQ/EeYDKmdGRCSo98Et2v0D9jz6qvTmEjrry+j0yaNAwAl1qTJf4yHJk8gMBdFNfGPdG1e5kltYOZ5f9qaarGw58nR5+Yxf8TO7oMHKNkZ1x//velF1aGyDWAHq6yhLU3/ZuhaNBk6RjbLMZDKnMV1FKlMD5AdnNOt4ChJeAQyehA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:24::27) by YT1PR01MB3530.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:1::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.25; Sun, 27 Sep 2020 02:52:40 +0000 Received: from YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM ([fe80::687f:d85a:a0a3:bd20]) by YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM ([fe80::687f:d85a:a0a3:bd20%6]) with mapi id 15.20.3412.028; Sun, 27 Sep 2020 02:52:40 +0000 From: Rick Macklem To: "Wall, Stephen" , FreeBSD Hackers , "freebsd-current@freebsd.org" Subject: Re: RFC: should copy_file_range(2) remain Linux compatible or support special files? Thread-Topic: RFC: should copy_file_range(2) remain Linux compatible or support special files? Thread-Index: AQHWlFwtm/+ImGEdKkCaptKgpElFK6l7nDvmgAAr7eA= Date: Sun, 27 Sep 2020 02:52:40 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: e5caed86-9789-40df-4ff6-08d862906656 x-ms-traffictypediagnostic: YT1PR01MB3530: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:6108; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: klj14eU0iQnxb3lAXDgyjvHaghbH67ObAGC0JrZFju2/MeADtMyJUWU7fLP59hmp4x7i/WvXz5WyNbRCHP8yoyzwd0WiS0AmzoRANNio+QxJ4LlVKg9srEkoKs6tIFFMUYflnCMDc3wwSUBba/e3wBc7cEbMBEV7kBKKKJeb5ynwM/+ErB4WxL1R0EqCXECweYfGeuPlrYq4ptYSquXWZFMI2C5teFGrxttCuArGm7HicMLv9uImjTVJQqMBXIA++VipmKwOPUVp6RJw/71q5kT0hUaRE+MuX0wcTABcRlsYz6H4Kd2tQ1UJa3zFeJqW3b8HRUoMrCtqJmBlPSca6gPbOtx38qvONeUeZgXFJ1dNn6S9JXDW4mECyVdcgp+q x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(376002)(346002)(366004)(396003)(39850400004)(136003)(71200400001)(4744005)(52536014)(86362001)(66946007)(66446008)(64756008)(66556008)(2906002)(66476007)(76116006)(91956017)(5660300002)(33656002)(6506007)(186003)(55016002)(9686003)(478600001)(8936002)(7696005)(786003)(316002)(110136005)(8676002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: 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 x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: e5caed86-9789-40df-4ff6-08d862906656 X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Sep 2020 02:52:40.3920 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: xSnZah9QMMRD44amruuxIGbhalRdpdLxINYmv4hL7bmZvbnMtprFBCktJgwPHkdOWtyAM5hZX317GOfPlB+04w== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YT1PR01MB3530 X-Rspamd-Queue-Id: 4BzVZ22sGgz4P45 X-Spamd-Bar: ----- X-Spamd-Result: default: False [-5.16 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.991]; R_DKIM_ALLOW(-0.20)[uoguelph.ca:s=selector1]; FREEFALL_USER(0.00)[rmacklem]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM_LONG(-1.01)[-1.012]; DWL_DNSWL_LOW(-1.00)[uoguelph.ca:dkim]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[uoguelph.ca:+]; DMARC_POLICY_ALLOW(-0.50)[uoguelph.ca,none]; NEURAL_HAM_SHORT(-1.15)[-1.153]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; RCVD_TLS_LAST(0.00)[]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-current]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 02:52:43 -0000 Wall, Stephen wrote:=0A= > Could the as yet unused options param have a bit assigned to trigger the = new =0A= > behavior? Inform the linux community of the addition and let them decide= if they=0A= > would like to adopt it as well.=0A= I'll assume you are referring to the "flags" argument when you say "param" = above.=0A= =0A= You could. However, since the Linux man page says it will return EINVAL if= =0A= the "flags" argument is non-zero, you've still introduced an incompatibilit= y=0A= w.r.t. the Linux behaviour.=0A= It does make it clear that copy_file_range(2) will have the non-Linux behav= iour=0A= when the flag is specified, which I think is a good idea.=0A= =0A= rick=0A= =0A= =0A= From owner-freebsd-current@freebsd.org Sun Sep 27 02:55:55 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 284323E9D7D; Sun, 27 Sep 2020 02:55:55 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-oi1-f178.google.com (mail-oi1-f178.google.com [209.85.167.178]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BzVdk16Rfz4Pv2; Sun, 27 Sep 2020 02:55:53 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by mail-oi1-f178.google.com with SMTP id t76so7449027oif.7; Sat, 26 Sep 2020 19:55:53 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MSNJCzZoy1fgm/a8nqe243dFVDzmnq/D3cnvhiAAhcQ=; b=VTqrTZ6mSFwtxdHuHhYIs6AH+QdFmPnqoLSAgUNqHgqcbAERP5OcDxDTMPiGFWv1+U Hn5xffL3eqlIEPaHckXBTrXxuJEmnnub8Reo5UIuNi9gzLj8to7bBBQzS2bQKpXTAKW2 1xDWWkgZyDxbYt4UTbrniFaLZ2w8k7gsTqc0rI+Iv72691azNeS/B5+CwO9lCJ28vdv4 0nZF9Rlv5WbGvTV3EUZvdZN1w0iHxQJvuKnnHPkrW/cWWadU/7X3CF8nQh31+3Da3kSt 7VLPypcnJhwVUlHbTLaaHyp0v/8Z4N6OKQ45huw7pkeN6T5BtgtLdOzrRHedbPtoh2Aa zckQ== X-Gm-Message-State: AOAM533LWv/JCzR9icGF/2MVeZgUElk3oO5Ds5typCIprkrISbpcuEY5 aLBmqXXMdAkCctIt6WjzBOQGV7LABh7TTsCO2WE= X-Google-Smtp-Source: ABdhPJwh6GoKfjO40kUJVFVk09DjoR9YkDVAsrtRLaxcz/Z1dIqIL5M2dEqy94gZ1/26/+vdRUBtMqJ2lBmPI8qImqI= X-Received: by 2002:a05:6808:555:: with SMTP id i21mr2491746oig.55.1601175352478; Sat, 26 Sep 2020 19:55:52 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Alan Somers Date: Sat, 26 Sep 2020 20:55:41 -0600 Message-ID: Subject: Re: RFC: should copy_file_range(2) remain Linux compatible or support special files? To: Rick Macklem Cc: "Wall, Stephen" , FreeBSD Hackers , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 4BzVdk16Rfz4Pv2 X-Spamd-Bar: - X-Spamd-Result: default: False [-1.69 / 15.00]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FREEFALL_USER(0.00)[asomers]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; ARC_NA(0.00)[]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.01)[-1.013]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.70)[-0.698]; RCVD_IN_DNSWL_NONE(0.00)[209.85.167.178:from]; NEURAL_HAM_MEDIUM(-0.98)[-0.978]; FORGED_SENDER(0.30)[asomers@freebsd.org,asomers@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.167.178:from]; SUBJECT_ENDS_QUESTION(1.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; R_DKIM_NA(0.00)[]; FROM_NEQ_ENVFROM(0.00)[asomers@freebsd.org,asomers@gmail.com]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-current] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 02:55:55 -0000 On Sat, Sep 26, 2020 at 8:52 PM Rick Macklem wrote: > Wall, Stephen wrote: > > Could the as yet unused options param have a bit assigned to trigger the > new > > behavior? Inform the linux community of the addition and let them > decide if they > > would like to adopt it as well. > I'll assume you are referring to the "flags" argument when you say "param" > above. > > You could. However, since the Linux man page says it will return EINVAL if > the "flags" argument is non-zero, you've still introduced an > incompatibility > w.r.t. the Linux behaviour. > It does make it clear that copy_file_range(2) will have the non-Linux > behaviour > when the flag is specified, which I think is a good idea. > I think it's just syntactic salt. Why require extra work for so little purpose? My opinion is that if we can make it work for character devices, we should. From owner-freebsd-current@freebsd.org Sun Sep 27 09:32:36 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A636C3F44E0 for ; Sun, 27 Sep 2020 09:32:36 +0000 (UTC) (envelope-from shuriku@shurik.kiev.ua) Received: from mail.flex-it.com.ua (mail.flex-it.com.ua [193.239.74.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BzgRR1ZnSz4m3l for ; Sun, 27 Sep 2020 09:32:34 +0000 (UTC) (envelope-from shuriku@shurik.kiev.ua) Received: from [93.183.208.50] (helo=thinkpad.flex-it.com.ua) by mail.flex-it.com.ua with esmtpsa (TLS1.3) tls TLS_AES_128_GCM_SHA256 (Exim 4.94 (FreeBSD)) (envelope-from ) id 1kMSPF-000OZ0-L0 for freebsd-current@freebsd.org; Sun, 27 Sep 2020 11:51:41 +0300 Subject: Re: DRM Report 2020-08-31 To: freebsd-current@freebsd.org References: <20200906160244.04782224fc19ad47c0252b3d@bidouilliste.com> From: Oleksandr Kryvulia Message-ID: <6c860e3e-f417-d784-67eb-9c5eabf88d83@shurik.kiev.ua> Date: Sun, 27 Sep 2020 11:51:41 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.3.0 MIME-Version: 1.0 In-Reply-To: <20200906160244.04782224fc19ad47c0252b3d@bidouilliste.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: ru X-Rspamd-Queue-Id: 4BzgRR1ZnSz4m3l X-Spamd-Bar: +++++++++++ X-Spamd-Result: default: False [11.30 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_XBL(5.00)[93.183.208.50:received]; RECEIVED_SPAMHAUS_CSS(4.00)[93.183.208.50:received]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(0.00)[+mx]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; ARC_NA(0.00)[]; NEURAL_SPAM_MEDIUM(0.82)[0.823]; RCPT_COUNT_ONE(0.00)[1]; BAD_REP_POLICIES(0.10)[]; DMARC_NA(0.00)[shurik.kiev.ua]; NEURAL_SPAM_SHORT(0.49)[0.490]; GREYLIST(0.00)[pass,body]; NEURAL_SPAM_LONG(0.99)[0.989]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:35297, ipnet:193.239.72.0/22, country:UA]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RCVD_COUNT_TWO(0.00)[2] X-Spam: Yes X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 09:32:36 -0000 On 06.09.20 17:02, Emmanuel Vadot wrote: > The second one contains modification to the base tree and the > drm-devel-ports to have the backlight subsystem built > (https://reviews.freebsd.org/D26250 and child revisions). > The TLDR on backlight is that you don't need acpi_video or > intel-backlight to control your screen backlight anymore, simply use > backlight(8). This should work on all Intel or AMD laptops while other > ways (acpi_video or intel-backlight) don't always works. I intend to > commit this next week. Hi! When will this be added to the base system? From owner-freebsd-current@freebsd.org Sun Sep 27 14:20:50 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B7F443FCC48; Sun, 27 Sep 2020 14:20:50 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-ot1-f41.google.com (mail-ot1-f41.google.com [209.85.210.41]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bznr15ZM2z3Z1L; Sun, 27 Sep 2020 14:20:49 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by mail-ot1-f41.google.com with SMTP id o8so7056007otl.4; Sun, 27 Sep 2020 07:20:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HSgDPQJ/DVFSle5/qEn+0pp2/+CBLxzl8FleFedPxuE=; b=JNcktGBxpQD0iKsj/FZOcSBLawxn57cet2Y6HC3vnmN7LCqp8/e57QTLyh+3o5r8+w VPEeSDZx6srqAhJ9cU14We8LrM13z5Rwdj4WCSed5uN39p1VUbN7iKQRC6cKfcF8UBU+ dRUz7kISGbo8t2DEioC6P3/0VVLkIzE+FK7nEIKxbZM6gc+V3kN5U6vyJoQfA3D5C0Gd pKW4dI8JNqWgjbdljCENemDzzD0HughhmvsYYOoskXoN+HHJo2iROfTzG1ybki0yM2Kr dzK5M5AJmXBCegBOeG6IZr5wrvAXSc9NCzAzA/WQ+4ljmtZAR1XqlGv52xPq2EJ5ltom R2iw== X-Gm-Message-State: AOAM533QnM9+CYJoU+iEHV6eCRpVZgsJ5vl9jiQO4IbOijGT9TnaH+65 x0awEeVU/kJi/9acryZrFHF7TWFt9V2Edldy34c= X-Google-Smtp-Source: ABdhPJwTgQPY2NBamRDshrvXK6WiPpC1LeceDUAH/1vEOPzZn8j2NaZYaWhFXItDPkvpem9mRIFkTxNU4znxI2Y1sjg= X-Received: by 2002:a05:6830:1286:: with SMTP id z6mr5893487otp.291.1601216448720; Sun, 27 Sep 2020 07:20:48 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Alan Somers Date: Sun, 27 Sep 2020 08:20:37 -0600 Message-ID: Subject: Re: RFC: should copy_file_range(2) remain Linux compatible or support special files? To: "Wall, Stephen" Cc: Rick Macklem , FreeBSD Hackers , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 4Bznr15ZM2z3Z1L X-Spamd-Bar: - X-Spamd-Result: default: False [-1.37 / 15.00]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FREEFALL_USER(0.00)[asomers]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; ARC_NA(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[209.85.210.41:from]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.01)[-1.014]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.38)[-0.379]; RCVD_IN_DNSWL_NONE(0.00)[209.85.210.41:from]; NEURAL_HAM_MEDIUM(-0.98)[-0.981]; FORGED_SENDER(0.30)[asomers@freebsd.org,asomers@gmail.com]; SUBJECT_ENDS_QUESTION(1.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; R_DKIM_NA(0.00)[]; FROM_NEQ_ENVFROM(0.00)[asomers@freebsd.org,asomers@gmail.com]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-current] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 14:20:50 -0000 On Sun, Sep 27, 2020 at 7:49 AM Wall, Stephen wrote: > > > I'll assume you are referring to the "flags" argument when you say > "param" above. > > Correct, I was misremembering the man page. > > > However, since the Linux man page says it will return EINVAL if > > the "flags" argument is non-zero, you've still introduced an > incompatibility > > w.r.t. the Linux behaviour. > > This would be a one-way incompatibility, i.e. code written on linux will > run unaltered on FreeBSD. > If the flag were along the lines of `FREEBSD_COPY_DEVICES` (or whatever, > important part is `FREEBSD`) it will be quite obvious that this code needs > to be adapted to other platforms: > ``` > #ifndef FREEBSD_COPY_DEVICES > #define FREEBSD_COPY_DEVICES 0 > #endif > ``` > > > Why require extra work for so little purpose? > > I'm sorry, I'm not sure what extra work you are referring to. Specifying > a flag on copy_file_range(2)? That's trivial. > It's easy to leave out, which could cause a lot of pain for users who don't understand why their application isn't working. > > > My opinion is that if we can make it work for character devices, we > should. > > Well, collecting opinions was the point, no? :) > > What's going to use this function besides system commands? I think I saw > `cp` and `dd` mentioned - I think it unlikely you need to be concerned > about their portability. > Userspace RAID-like applications could use it for rebuilds, and they'll need it to work on device nodes. Userspace NFS servers and iSCSI servers could obviously use it. And since the FUSE protocol includes a COPY_FILE_RANGE operation, many FUSE daemons could implement that with copy_file_range(2). -Alan From owner-freebsd-current@freebsd.org Sun Sep 27 15:16:50 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8F17D3FE0A2; Sun, 27 Sep 2020 15:16:50 +0000 (UTC) (envelope-from mjguzik@gmail.com) Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bzq4d3nmWz3cFP; Sun, 27 Sep 2020 15:16:49 +0000 (UTC) (envelope-from mjguzik@gmail.com) Received: by mail-wr1-x441.google.com with SMTP id k15so8944103wrn.10; Sun, 27 Sep 2020 08:16:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=nYAWEbKSLZu/2ZxBG1Do56H/lS5xBsAeuocCuW1wpc4=; b=kRarqAcd7w/4ZppqxzJUXX4u0umjuOc/RSXxyF20E/nUT2kmCvajOkoNJzou3sMfC8 9XXvdPR4Z8N0ZYBY/XZqKW/SN0QvDGvpyCAmXrs77hPz6W1f6FCqykD8/O0PWabTE0UP eQUmKSzkQbs9j1ImfQUWZxHO91GQ97wEttcQhlO10MaiAJWQTeD4FouKS8agyuqnI1mi eUZBv9E9KI7Dxjua5hqgakGyy6DhwmIDR2sytXWwJBXFm4wcV170NJ/Y9+eDvojPAQiu 78+wFQ3ZI4oZ7kLX3KbVEA3SgYSfospONFZ6q4IrzaNpKxSx/6RJFFQ+GRuNB4X/jICH 0mpA== X-Gm-Message-State: AOAM530I16Q5ABs3Z+lih0KtK7IhqPR14UotWXpEaJQBqkImb7UQp3S/ mZcpkpxgAHgTVW/O6gSKlFZKKlrt5exNjnU0qFp0lf3zNOw= X-Google-Smtp-Source: ABdhPJxqID61zylEJYpBYeaQ3JHLbpBDsDgNQgK+wHcKtt22kvnTZVIMVbzAksfgpIVfpVdSFuVHmrznruJyusFuiZg= X-Received: by 2002:adf:e84a:: with SMTP id d10mr15369002wrn.66.1601219807770; Sun, 27 Sep 2020 08:16:47 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:6000:187:0:0:0:0 with HTTP; Sun, 27 Sep 2020 08:16:46 -0700 (PDT) In-Reply-To: References: From: Mateusz Guzik Date: Sun, 27 Sep 2020 17:16:46 +0200 Message-ID: Subject: Re: RFC: should copy_file_range(2) remain Linux compatible or support special files? To: Alan Somers Cc: "Wall, Stephen" , Rick Macklem , FreeBSD Hackers , "freebsd-current@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 4Bzq4d3nmWz3cFP X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.57 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.10)[text/plain]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; NEURAL_HAM_LONG(-1.02)[-1.019]; RCPT_COUNT_FIVE(0.00)[5]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::441:from]; NEURAL_HAM_SHORT(-0.56)[-0.560]; NEURAL_HAM_MEDIUM(-0.99)[-0.989]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; SUBJECT_ENDS_QUESTION(1.00)[]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-current]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 15:16:50 -0000 On 9/27/20, Alan Somers wrote: > On Sun, Sep 27, 2020 at 7:49 AM Wall, Stephen > wrote: > >> >> > I'll assume you are referring to the "flags" argument when you say >> "param" above. >> >> Correct, I was misremembering the man page. >> >> > However, since the Linux man page says it will return EINVAL if >> > the "flags" argument is non-zero, you've still introduced an >> incompatibility >> > w.r.t. the Linux behaviour. >> >> This would be a one-way incompatibility, i.e. code written on linux will >> run unaltered on FreeBSD. >> If the flag were along the lines of `FREEBSD_COPY_DEVICES` (or whatever, >> important part is `FREEBSD`) it will be quite obvious that this code >> needs >> to be adapted to other platforms: >> ``` >> #ifndef FREEBSD_COPY_DEVICES >> #define FREEBSD_COPY_DEVICES 0 >> #endif >> ``` >> >> > Why require extra work for so little purpose? >> >> I'm sorry, I'm not sure what extra work you are referring to. Specifying >> a flag on copy_file_range(2)? That's trivial. >> > > It's easy to leave out, which could cause a lot of pain for users who don't > understand why their application isn't working. > A FreeBSD-specific flag to a Linux-alike syscall is bound to run into a conflict at some point, making it a non-starter. > >> >> > My opinion is that if we can make it work for character devices, we >> should. >> >> Well, collecting opinions was the point, no? :) >> >> What's going to use this function besides system commands? I think I saw >> `cp` and `dd` mentioned - I think it unlikely you need to be concerned >> about their portability. >> > > Userspace RAID-like applications could use it for rebuilds, and they'll > need it to work on device nodes. Userspace NFS servers and iSCSI servers > could obviously use it. And since the FUSE protocol includes a > COPY_FILE_RANGE operation, many FUSE daemons could implement that with > copy_file_range(2). I think the first thing to do is check what Linux is doing here, most notably they may have other primitives to take care of it and in that case would be best to implement equivalents. I don't have a strong opinion on VCHR support. I will note there may be Linux code expecting to fail with such argument. If Linux-compatible approach mentioned above is not going to work out, I think the best thing to do is to add another syscall (copy_file_range_np?) which can be tweaked however we see fit. -- Mateusz Guzik From owner-freebsd-current@freebsd.org Sun Sep 27 15:51:35 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C10AB3FEE37 for ; Sun, 27 Sep 2020 15:51:35 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bzqrl4mlPz3dmZ; Sun, 27 Sep 2020 15:51:35 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id 72BDF12CAD; Sun, 27 Sep 2020 15:51:35 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id 83855326EA; Sun, 27 Sep 2020 17:51:33 +0200 (CEST) From: "Kristof Provost" To: "Shawn Webb" Cc: "FreeBSD Current" , "Alexander Leidinger" Subject: Re: iflib/bridge kernel panic Date: Sun, 27 Sep 2020 17:51:32 +0200 X-Mailer: MailMate (1.13.2r5673) Message-ID: <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> In-Reply-To: <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed; markup=markdown Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Sep 2020 15:51:35 -0000 On 21 Sep 2020, at 14:16, Shawn Webb wrote: > On Mon, Sep 21, 2020 at 09:57:40AM +0200, Kristof Provost wrote: >> On 21 Sep 2020, at 2:52, Shawn Webb wrote: >>>> From latest HEAD on a Dell Precision 7550 laptop: >>> >>> https://gist.github.com/lattera/a0803f31f58bcf8ead51ac1ebbc447e2 >>> >>> The last working boot environment was 14 Aug 2020. If I get some >>> time to >>> bisect commits, I'll try to figure out the culprit. >>> >> Try https://reviews.freebsd.org/D26418 > > That seems to fix the kernel panic. dmesg gets spammed with a freak > ton of these LOR messages now: > Here’s an early version of a task queue based approach: http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-sleep.patch That still needs to be cleaned up, but this should resolve the sleep issue and the LOR. Best regards, Kristof From owner-freebsd-current@freebsd.org Mon Sep 28 08:59:57 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 24CE43FB62A for ; Mon, 28 Sep 2020 08:59:57 +0000 (UTC) (envelope-from agapon@gmail.com) Received: from mail-lj1-f172.google.com (mail-lj1-f172.google.com [209.85.208.172]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0GgJ0lx1z45Fb; Mon, 28 Sep 2020 08:59:55 +0000 (UTC) (envelope-from agapon@gmail.com) Received: by mail-lj1-f172.google.com with SMTP id v23so383946ljd.1; Mon, 28 Sep 2020 01:59:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=NUiC4I1eRly+yKzMs+r50EWn09XrSzH65D5zWAwXlCo=; b=Z1loM1YI6DFgWuhoAAsdZh7pJmQBzXto+s1JJVNJqLH/R1JC7hxmRzhnr8dgM8nQ5t X9hPcW4EluUQd8nNtsH2hWEiXd8Btb1oGAU8ihLB4imrftsV4G13kyyU8+dgRPb1QKiJ p5juxVXbean6wdCO5B2JEWiCP7BFdbTCLtuZhL71Fje6yA7di9oANvZrDbdvUzNcsIVH lhVqZV6tWe8+1m8tlERfDxtSWIr2241WSrQFQdU+24Sr3KGd6mdhJMBNMVbXJUU2Qtti 8M3VmxSJmIpXjZgV8NCjo74VkaGICH4Uuwwd3IcTM+gpexbIxbXIspJw7X6UMPlS2fB1 I0Uw== X-Gm-Message-State: AOAM530HuMd6zEAVIz4lAH95qpN2AltblrXEiGlys5kjY1PZoItnIgdM sSvyikbNmjyBGHBTd9gL1foX88vclBs= X-Google-Smtp-Source: ABdhPJxmtz/83fdjFtY8P3TBCr/E7QIuOxoefI5xTWWZLabc6yxMBsLjm7SFRPrZk2XCUSksQpTQBA== X-Received: by 2002:a2e:8017:: with SMTP id j23mr127263ljg.108.1601283593193; Mon, 28 Sep 2020 01:59:53 -0700 (PDT) Received: from [192.168.0.88] (east.meadow.volia.net. [93.72.151.96]) by smtp.googlemail.com with ESMTPSA id m1sm2775805lfh.99.2020.09.28.01.59.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 28 Sep 2020 01:59:52 -0700 (PDT) Subject: Re: clang build buggy code with certain CPUTYPE setting To: Marek Zarychta , Dimitry Andric Cc: freebsd-current@freebsd.org References: <20200926114045.GA31128@plan-b.pwste.edu.pl> <6AA016B6-EEAC-4580-B7F0-9D274ADA9E73@FreeBSD.org> <20200926195533.GA16596@plan-b.pwste.edu.pl> From: Andriy Gapon Openpgp: preference=signencrypt Autocrypt: addr=avg@FreeBSD.org; prefer-encrypt=mutual; keydata= mDMEX1iFDhYJKwYBBAHaRw8BAQdAiu8JG/oLFkVkOAJqJc7Dx5KI/Q6C3SBI20EQm+DXnAu0 HkFuZHJpeSBHYXBvbiA8YXZnQEZyZWVCU0Qub3JnPoiWBBMWCAA+FiEEyCHHZM09l0OE3Ir/ 1A1+Gq8+L1EFAl9YhQ4CGwMFCQeEzgAFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQ1A1+ Gq8+L1Fc0wD/ZjmhHfbCJywZU3aOxXIPjcz73FYEGMvqMCCLAWyLbSABALFL+1ZNrjV3BGjq 889cOYFuboA/Yn3eWezS+tfqYBsGuDgEX1iFDhIKKwYBBAGXVQEFAQEHQL6B20Xi600TrkpG P9fWjl7JtHNxqrHKhX6Kg7kgb4ILAwEIB4h+BBgWCAAmFiEEyCHHZM09l0OE3Ir/1A1+Gq8+ L1EFAl9YhQ4CGwwFCQeEzgAACgkQ1A1+Gq8+L1F3cgEAktp4h+IJUJxL1vn6zMOt//znni/J TanKfQuA8wGXcGkBAKpZJhqMkg+pKk7MGvJhgJ6nCpTZ+rMK6vZVZLUWc3QF Message-ID: Date: Mon, 28 Sep 2020 11:59:51 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Firefox/60.0 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20200926195533.GA16596@plan-b.pwste.edu.pl> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4C0GgJ0lx1z45Fb X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.09 / 15.00]; ARC_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17:c]; MID_RHS_MATCH_FROM(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[FreeBSD.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-0.97)[-0.970]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.17)[-0.166]; RCVD_IN_DNSWL_NONE(0.00)[209.85.208.172:from]; NEURAL_HAM_MEDIUM(-0.95)[-0.952]; FORGED_SENDER(0.30)[avg@FreeBSD.org,agapon@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.208.172:from]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[avg@FreeBSD.org,agapon@gmail.com]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[93.72.151.96:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Sep 2020 08:59:57 -0000 On 26/09/2020 22:55, Marek Zarychta wrote: > Thank you for the information and for the fix. Sadly I must admit it > doesn't work for me. I have tried two builds with fresh sources today to > be certain and it looks like the bug is still present on FreeBSD > 13-CURRENT r366186. Either the upstream fixed it only partially or it is > another bug. As a workaround, I will build worlds without > CPUTYPE?=amdfam10 for a while. I hope the problem will be resolved > before clang 11 is MFCed to 12-STABLE. Can you disassemble the faulting instruction in the core dump? Can you provide full CPU ID / features information from dmesg? -- Andriy Gapon From owner-freebsd-current@freebsd.org Mon Sep 28 10:46:02 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CD12F3FE710 for ; Mon, 28 Sep 2020 10:46:02 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0K1j37Nyz4DW5; Mon, 28 Sep 2020 10:46:01 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p508d5e19.dip0.t-ipconnect.de [80.141.94.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 891352877; Mon, 28 Sep 2020 12:45:51 +0200 (CEST) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 3170A741D; Mon, 28 Sep 2020 12:45:32 +0200 (CEST) Date: Mon, 28 Sep 2020 12:45:31 +0200 Message-ID: <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> From: Alexander Leidinger To: Kristof Provost Cc: Shawn Webb , FreeBSD Current Subject: Re: iflib/bridge kernel panic References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> In-Reply-To: <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_AlNd5GpmbppfrEuapeqAelO"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 4C0K1j37Nyz4DW5 X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.23 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-0.99)[-0.993]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.004]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; NEURAL_HAM_SHORT(-0.13)[-0.133]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[80.141.94.25:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Sep 2020 10:46:02 -0000 This message is in MIME format and has been PGP signed. --=_AlNd5GpmbppfrEuapeqAelO Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Kristof Provost (from Sun, 27 Sep 2020=20=20 17:51:32=20+0200): > On 21 Sep 2020, at 14:16, Shawn Webb wrote: >> On Mon, Sep 21, 2020 at 09:57:40AM +0200, Kristof Provost wrote: >>> On 21 Sep 2020, at 2:52, Shawn Webb wrote: >>>>> From latest HEAD on a Dell Precision 7550 laptop: >>>> >>>> https://gist.github.com/lattera/a0803f31f58bcf8ead51ac1ebbc447e2 >>>> >>>> The last working boot environment was 14 Aug 2020. If I get some time = to >>>> bisect commits, I'll try to figure out the culprit. >>>> >>> Try https://reviews.freebsd.org/D26418 >> >> That seems to fix the kernel panic. dmesg gets spammed with a freak >> ton of these LOR messages now: >> > Here=E2=80=99s an early version of a task queue based approach:=20=20 >=20http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-sle= ep.patch > > That still needs to be cleaned up, but this should resolve the sleep=20= =20 >=20issue and the LOR. There are some issues... seems like inside a jail I can't ping systems=20= =20 outside=20of the hardware. Bridge setup: - member jail A - member jail B - member external_if of host If I ping the router from the host, it works. If I ping from one jail=20=20 to=20another, it works. If I ping from the jail to the IP of the=20=20 external_if,=20it works. If I ping from a jail to the router, I do not=20= =20 get=20a response. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_AlNd5GpmbppfrEuapeqAelO Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJfcb7LAAoJEBINsJsD+NiGOL8P/jx46nnsDZMiX0zHw/oCeO6s r/pbz0x+uTJfAjCye9zEQN9cWhswR2BsEEtTyit/O64CjX/aBWNHw2M2TzCdkgcB tNHXU2TlPtrvd/Ta8aY0fbo+n9kWvmzkNqzky12F+Oc0GxGdGZ2KK2VCTP4yxtLb 5/JWbziHneDtzh+3VVztHhuzmvPa6qX5tGcKhYS8bly0E9GrQTaFwOv6f5PRTmJ9 G5cdZvwDx0wXYcdHIO5ag1w/hP5B1sre5B9PT6Ov10wxbPLp5UugyrOECiBemL3+ X2Xv8KbAtvzP9nq2bisjTYGK214D8dWbzzHWHJIBAz304Cq5EaF9oxWCN7CL801+ D95wly27eRMlJrZcN2OSFW3w5hM+Hypko+ld5AbPN7wbrSaBO5lYrkh/JPOlPRNQ SB1JT7yOnvR0zR8HZrg/dLOUNRPdw2oYrmJQNNvnsLq+xhwLvW6Fj28ovViAPYQR UZlYgJNwNjyrZCaWLn91ul39nDV45DFt7my/ekfiUgdKvWdA/xB09ZGTpxhMB+1t iw2xVszFLLXqx0x6LWlTx3d3G5tyIsuFur5rQIc4tynznA5RoBgofKbXOKUzPLBc rPGvOHrL1ikBaT6/GIEtEiZaPArxygNUriEeEwFbrT3t35Wtw3v1V6n3j0Kg2oTO qsxvH80a9lnDrJiVdHRB =f3mM -----END PGP SIGNATURE----- --=_AlNd5GpmbppfrEuapeqAelO-- From owner-freebsd-current@freebsd.org Mon Sep 28 11:53:19 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 225EA3FF6F6 for ; Mon, 28 Sep 2020 11:53:19 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0LWM07f9z4J1B; Mon, 28 Sep 2020 11:53:19 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id C2F811BB6B; Mon, 28 Sep 2020 11:53:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id 4B6B837421; Mon, 28 Sep 2020 13:53:17 +0200 (CEST) From: "Kristof Provost" To: "Alexander Leidinger" Cc: "Shawn Webb" , "FreeBSD Current" Subject: Re: iflib/bridge kernel panic Date: Mon, 28 Sep 2020 13:53:16 +0200 X-Mailer: MailMate (1.13.2r5673) Message-ID: <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> In-Reply-To: <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed; markup=markdown Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Sep 2020 11:53:19 -0000 On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: > Quoting Kristof Provost (from Sun, 27 Sep 2020 = > 17:51:32 +0200): >> Here=E2=80=99s an early version of a task queue based approach: = >> http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-sl= eep.patch >> >> That still needs to be cleaned up, but this should resolve the sleep = >> issue and the LOR. > > There are some issues... seems like inside a jail I can't ping systems = > outside of the hardware. > > Bridge setup: > - member jail A > - member jail B > - member external_if of host > > If I ping the router from the host, it works. If I ping from one jail = > to another, it works. If I ping from the jail to the IP of the = > external_if, it works. If I ping from a jail to the router, I do not = > get a response. > Can you check for 'failed ifpromisc' error messages in dmesg? And verify = that all bridge member interfaces are in promiscuous mode? Kristof From owner-freebsd-current@freebsd.org Mon Sep 28 14:44:18 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5D9D9424732 for ; Mon, 28 Sep 2020 14:44:18 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0QJd2J57z4S1S; Mon, 28 Sep 2020 14:44:16 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p508d5e19.dip0.t-ipconnect.de [80.141.94.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id E12DC42A; Mon, 28 Sep 2020 16:44:13 +0200 (CEST) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 2164B7502; Mon, 28 Sep 2020 16:44:11 +0200 (CEST) Date: Mon, 28 Sep 2020 16:44:10 +0200 Message-ID: <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> From: Alexander Leidinger To: Kristof Provost Cc: Shawn Webb , FreeBSD Current Subject: Re: iflib/bridge kernel panic References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> In-Reply-To: <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_KKml1e9vaMIag8B9t2o7S-T"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 4C0QJd2J57z4S1S X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.21 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-0.95)[-0.949]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.002]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; NEURAL_HAM_SHORT(-0.16)[-0.162]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[80.141.94.25:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Sep 2020 14:44:18 -0000 This message is in MIME format and has been PGP signed. --=_KKml1e9vaMIag8B9t2o7S-T Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Kristof Provost (from Mon, 28 Sep 2020=20=20 13:53:16=20+0200): > On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: >> Quoting Kristof Provost (from Sun, 27 Sep 2020=20=20 >>=2017:51:32 +0200): >>> Here=E2=80=99s an early version of a task queue based approach:=20=20 >>>=20http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-s= leep.patch >>> >>> That still needs to be cleaned up, but this should resolve the=20=20 >>>=20sleep issue and the LOR. >> >> There are some issues... seems like inside a jail I can't ping=20=20 >>=20systems outside of the hardware. >> >> Bridge setup: >> - member jail A >> - member jail B >> - member external_if of host >> >> If I ping the router from the host, it works. If I ping from one=20=20 >>=20jail to another, it works. If I ping from the jail to the IP of the=20= =20 >>=20external_if, it works. If I ping from a jail to the router, I do=20=20 >>=20not get a response. >> > Can you check for 'failed ifpromisc' error messages in dmesg? And=20=20 >=20verify that all bridge member interfaces are in promiscuous mode? I have a panic for you...: - startup still in progress =3D 22 jails in startup, somewhere after a=20= =20 few=20jails started the panic happened - tcpdump was running on the external interface - a ping to a jail IP from another system was running, the first=20=20 ping=20went through, then it paniced First regarding your questions about promisc mode: no error, but the=20=20 promisc=20mode is directly disabled again on all interfaces. Data (external_if =3D igb0, jail epairs are j_X_Yif with X the ID of the=20= =20 jail=20and Y either h like host-side or j like jail-side): ---snip--- Host: # ifconfig -a igb0: flags=3D8863 metric 0 mtu 150= 0 =20=20=20=20=20=20=20=20=20=20 options=3D4a520b9 ether [...]:a4 inet 192.168.1.x netmask 0xffffff00 broadcast 192.168.1.255 inet6 fe80::[...]a4%igb0 prefixlen 64 scopeid 0x1 inet6 fd73:[...] prefixlen 64 inet6 2003:[...] prefixlen 64 autoconf inet6 fd73:[...] prefixlen 64 autoconf media: Ethernet autoselect (1000baseT ) status: active nd6 options=3D23 igb1: flags=3D8822 metric 0 mtu 1500 =20=20=20=20=20=20=20=20=20=20 options=3D4e527bb ether [...]:a5 media: Ethernet autoselect status: no carrier nd6 options=3D29 lo0: flags=3D8049 metric 0 mtu 16384 options=3D680003 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 inet 127.0.0.1 netmask 0xff000000 groups: lo nd6 options=3D21 vswitch0: flags=3D8843 metric 0 mtu= 1500 ether [...]:a3 id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15 maxage 20 holdcnt 6 proto stp-rstp maxaddr 2000 timeout 1200 root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0 member: j_weather_hif flags=3D143 ifmaxaddr 0 port 9 priority 128 path cost 2000 member: j_web_hif flags=3D143 ifmaxaddr 0 port 8 priority 128 path cost 2000 member: j_commit_hif flags=3D143 ifmaxaddr 0 port 7 priority 128 path cost 2000 member: j_video_hif flags=3D143 ifmaxaddr 0 port 6 priority 128 path cost 2000 member: j_dns_hif flags=3D143 ifmaxaddr 0 port 5 priority 128 path cost 2000 member: igb0 flags=3D143 ifmaxaddr 0 port 1 priority 128 path cost 20000 groups: bridge nd6 options=3D9 j_dns_hif: flags=3D8843 metric 0=20= =20 mtu=201500 options=3D8 ether [...]:0a hwaddr [...]:0a inet6 fe80::[...]0a%j_dns_hif prefixlen 64 scopeid 0x5 groups: epair media: Ethernet 10Gbase-T (10Gbase-T ) status: active nd6 options=3D21 [... some more jail interfaces ...] # dmesg | grep promis igb0: promiscuous mode enabled igb0: promiscuous mode disabled j_dns_hif: promiscuous mode enabled j_dns_hif: promiscuous mode disabled [... some more like this ...] # jexec 2 ifconfig -a lo0: flags=3D8049 metric 0 mtu 16384 options=3D680003 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 inet 127.0.0.1 netmask 0xff000000 groups: lo nd6 options=3D21 j_dns_jif: flags=3D8843 metric 0=20= =20 mtu=201500 options=3D8 ether [...]:0b hwaddr [...]:0b inet 192.168.1.y netmask 0xffffff00 broadcast 192.168.1.255 inet6 fe80::[...]0b%j_dns_jif prefixlen 64 scopeid 0x2 inet6 fd73:[...]:y prefixlen 64 groups: epair media: Ethernet 10Gbase-T (10Gbase-T ) status: active nd6 options=3D21 ---snip--- And here the backtrace of the panic: ---snip--- panic: if_setflag: decrement non-positive refcount 0 for flag 256 cpuid =3D 4 time =3D 1601300532 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0378ea3= 920 vpanic() at vpanic+0x182/frame 0xfffffe0378ea3970 panic() at panic+0x43/frame 0xfffffe0378ea39d0 if_setflag() at if_setflag+0x137/frame 0xfffffe0378ea3a30 ifpromisc() at ifpromisc+0x2a/frame 0xfffffe0378ea3a60 bpf_detachd_locked() at bpf_detachd_locked+0x280/frame 0xfffffe0378ea3ab0 bpf_dtor() at bpf_dtor+0x87/frame 0xfffffe0378ea3ad0 devfs_destroy_cdevpriv() at devfs_destroy_cdevpriv+0xa1/frame=20=20 0xfffffe0378ea3af0 devfs_close_f()=20at devfs_close_f+0x6a/frame 0xfffffe0378ea3b20 _fdrop() at _fdrop+0x20/frame 0xfffffe0378ea3b40 closef() at closef+0x1ea/frame 0xfffffe0378ea3bd0 closefp() at closefp+0x90/frame 0xfffffe0378ea3c10 amd64_syscall() at amd64_syscall+0x13e/frame 0xfffffe0378ea3d30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0378ea3d30 __curthread () at /space/system/usr_src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n"=20=20 (offsetof(struct=20pcpu, (kgdb) #0 __curthread () at=20=20 /space/system/usr_src/sys/amd64/include/pcpu_aux.h:55 #1=20 doadump (textdump=3D1) at /space/system/usr_src/sys/kern/kern_shutdow= n.c:394 #2 0xffffffff8051fb46 in kern_reboot (howto=3D260) at /space/system/usr_src/sys/kern/kern_shutdown.c:481 #3 0xffffffff8051ff8a in vpanic (fmt=3D, ap=3D) at /space/system/usr_src/sys/kern/kern_shutdown.c:913 #4 0xffffffff8051fcf3 in panic (fmt=3D) at /space/system/usr_src/sys/kern/kern_shutdown.c:839 #5 0xffffffff806321f7 in if_setflag (ifp=3D0xfffff800036cc000, flag=3D, pflag=3D, refcount=3D0xfffff80003= 6cc3a8, onswitch=3D) at /space/system/usr_src/sys/net/if.c:3135 #6 0xffffffff8063206a in ifpromisc (ifp=3D0xfffff800036cc000, pswitch=3D) at /space/system/usr_src/sys/net/if.c:3196 #7 0xffffffff80626450 in bpf_detachd_locked (d=3D, detached_ifp=3D) at /space/system/usr_src/sys/net/bpf.c= :882 #8 0xffffffff80629277 in bpf_detachd (d=3D0xfffff8074cf42800) at /space/system/usr_src/sys/net/bpf.c:836 #9 bpf_dtor (data=3D0xfffff8074cf42800) at /space/system/usr_src/sys/net/bpf.c:913 #10 0xffffffff80487531 in devfs_destroy_cdevpriv (p=3D0xfffff8074cf29c40) at /space/system/usr_src/sys/fs/devfs/devfs_vnops.c:197 #11 0xffffffff8048b16a in devfs_fpdrop (fp=3D0xfffff8074cebaaf0) at /space/system/usr_src/sys/fs/devfs/devfs_vnops.c:211 #12 devfs_close_f (fp=3D0xfffff8074cebaaf0, td=3D) at /space/system/usr_src/sys/fs/devfs/devfs_vnops.c:787 #13 0xffffffff804c4d70 in fo_close (fp=3D0xfffff8074cebaaf0, td=3D) at /space/system/usr_src/sys/sys/file.h:364 #14 _fdrop (fp=3D0xfffff8074cebaaf0, td=3D) at /space/system/usr_src/sys/kern/kern_descrip.c:3120 #15 0xffffffff804c7eca in closef (fp=3D0xfffff8074cebaaf0,=20=20 td=3D0xfffffe0382567500) at /space/system/usr_src/sys/kern/kern_descrip.c:2606 #16 0xffffffff804c51e0 in closefp (fdp=3D0xfffffe0307cbd950, fd=3D3, fp=3D0xfffff8074cebaaf0, td=3D0xfffffe0382567500, holdleaders=3D) at /space/system/usr_src/sys/kern/kern_descrip.c:1263 #17 0xffffffff808000ae in syscallenter (td=3D) at /space/system/usr_src/sys/amd64/amd64/../../kern/subr_syscall.c:162 ---snip--- Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_KKml1e9vaMIag8B9t2o7S-T Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJfcfa6AAoJEBINsJsD+NiGwCIQAJE4+mpH6cnHJ8DwfwWy4l/L X+0JqGPuNN9SJcJzPBD7gTebykJBmHHcTse3sTgHPNHugOx7NnBsolv1xlw1qoVk oQCaDVZtsYpac2Z3hgeOyP5uQg5ecIngXHWgTEY+sLCr6/1mx6sYI59cDjr9k/jv gzN/RMAGs8YVkyOpYP9hg3IF9IryKHPdTxX6APCLgJNBFypK/a6J8eTdDNxrhcCQ XpNEyEziNeSeD+VjMgHEdFa9UvQzpMPTWgAf75YNwunKJoLNPkO3XnXvYcW3vK5b WlTHcT9/1VCZ/LZlXcPlEqgjdOiEcto1gxSx/AIYl68GtA+EFRORLfw7Xa5RasiP AyL96l84fy2peM7wShGPeASOGmAWLPrY1SENztEz+7zlOf9T0+SyEDS4zaA6eHJn BNz2qB1/MrkvFSi+QWRJI20zHCXqm1x5kdqAyoeB6rWvNkWxxhWCMCWysOj8ToyM ner1HMPMBUI1AFnDxMntMsXXgFiLau+NbKvz+8IjAyfRQ4cXbffRrL2TFtPQUa6n DHxM/YP5TMcUeWoR3ZlApcNb6ZNbNdxkMaD8TIfibAQS1qnveCZ7hsOZYDI6tUIC DhdGOvVrmbShlrn0L6hdt6lU5AKlaFcJLzqmi61D0JZjcfVzJOoVBl7BXvDytb+y V2tbEJ8Hia8GRZGvpEna =/Z8p -----END PGP SIGNATURE----- --=_KKml1e9vaMIag8B9t2o7S-T-- From owner-freebsd-current@freebsd.org Tue Sep 29 10:45:14 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 443193FD4D9 for ; Tue, 29 Sep 2020 10:45:14 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Received: from plan-b.pwste.edu.pl (plan-b.pwste.edu.pl [IPv6:2001:678:618::40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "plan-b.pwste.edu.pl", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0wyK1vkHz4bw3; Tue, 29 Sep 2020 10:45:12 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Received: from fomalhaut.potoki.eu ([IPv6:2001:470:71:d47:65e3:7b4a:25c7:3481]) (authenticated bits=0) by plan-b.pwste.edu.pl (8.16.1/8.16.1) with ESMTPSA id 08TAj3G6082586 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 29 Sep 2020 12:45:03 +0200 (CEST) (envelope-from zarychtam@plan-b.pwste.edu.pl) X-Authentication-Warning: plan-b.pwste.edu.pl: Host [IPv6:2001:470:71:d47:65e3:7b4a:25c7:3481] claimed to be fomalhaut.potoki.eu Subject: Re: clang build buggy code with certain CPUTYPE setting To: Andriy Gapon , Dimitry Andric Cc: freebsd-current@freebsd.org References: <20200926114045.GA31128@plan-b.pwste.edu.pl> <6AA016B6-EEAC-4580-B7F0-9D274ADA9E73@FreeBSD.org> <20200926195533.GA16596@plan-b.pwste.edu.pl> From: Marek Zarychta Message-ID: Date: Tue, 29 Sep 2020 12:45:01 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="MRa5t4fDszALhyIra57qiBVeamyoFX1zt" X-Rspamd-Queue-Id: 4C0wyK1vkHz4bw3 X-Spamd-Bar: ------- X-Spamd-Result: default: False [-7.38 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[plan-b.pwste.edu.pl:s=plan-b-mailer]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; HAS_ATTACHMENT(0.00)[]; HAS_XAW(0.00)[]; DWL_DNSWL_MED(-2.00)[pwste.edu.pl:dkim]; NEURAL_HAM_LONG(-1.00)[-1.001]; ARC_NA(0.00)[]; DKIM_TRACE(0.00)[plan-b.pwste.edu.pl:+]; DMARC_POLICY_ALLOW(-0.50)[plan-b.pwste.edu.pl,none]; NEURAL_HAM_SHORT(-0.49)[-0.491]; NEURAL_HAM_MEDIUM(-0.99)[-0.989]; SIGNED_PGP(-2.00)[]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~]; ASN(0.00)[asn:206006, ipnet:2001:678:618::/48, country:PL]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-current] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 10:45:14 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --MRa5t4fDszALhyIra57qiBVeamyoFX1zt Content-Type: multipart/mixed; boundary="mPui4jCPApopk6ZdSJO9ali9rlBdviYHj"; protected-headers="v1" From: Marek Zarychta To: Andriy Gapon , Dimitry Andric Cc: freebsd-current@freebsd.org Message-ID: Subject: Re: clang build buggy code with certain CPUTYPE setting References: <20200926114045.GA31128@plan-b.pwste.edu.pl> <6AA016B6-EEAC-4580-B7F0-9D274ADA9E73@FreeBSD.org> <20200926195533.GA16596@plan-b.pwste.edu.pl> In-Reply-To: --mPui4jCPApopk6ZdSJO9ali9rlBdviYHj Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Content-Language: en-US On 28.09.2020 10:59, Andriy Gapon wrote: > On 26/09/2020 22:55, Marek Zarychta wrote: >> Thank you for the information and for the fix. Sadly I must admit it >> doesn't work for me. I have tried two builds with fresh sources today = to >> be certain and it looks like the bug is still present on FreeBSD >> 13-CURRENT r366186. Either the upstream fixed it only partially or it = is >> another bug. As a workaround, I will build worlds without >> CPUTYPE?=3Damdfam10 for a while. I hope the problem will be resolved >> before clang 11 is MFCed to 12-STABLE. > Can you disassemble the faulting instruction in the core dump? > Can you provide full CPU ID / features information from dmesg? > I tried to reproduce this for debugging purposes, but I am not able to.=20 Either my builds were somehow polluted, though obj directory was cleaned = before each build, or not patched LLVM was bootstrapping itself in a=20 wrong way despite updated sources. Anyway the issue has gone and it is=20 possible to run world built with CPUTYPE?=3Damdfam10 using r366241 as=20 starting point. Thank you guys for your assistance, patience and work which gives us the = ability to use well maintained, rock-stable and modern OS. --=20 Marek Zarychta --mPui4jCPApopk6ZdSJO9ali9rlBdviYHj-- --MRa5t4fDszALhyIra57qiBVeamyoFX1zt Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature" -----BEGIN PGP SIGNATURE----- wsB5BAABCAAjFiEEnjwyTmqn2oNX6C8qHZW8vIFppoIFAl9zEC0FAwAAAAAACgkQHZW8vIFppoIy zAf9GZxo9g62wTlfFZzsGHz9GF4a6vPPof9CEJtR8Amt6Yy+6ko+8NX4gnVlidXtruv4LT6xEQ+2 FhCTUtc6EDTbluwMW0nyLcKFJj89ecmay1B72NA5CCqHSqfe6doszfaGCo81kFdod78bhKMJ3rY5 xfEZTU1tZxdDiyzxKvx590yDIsuPgZySg7aWtO+qMVtEHw3PyiU3TcPT+gmKQ6t9aD+fudy8gEQo Zy023A3sniKeMwJLLXs/rnYYkzipVVsobN0bhESzvVYgzsDGhGpzvNfO6ecJRKYNEqY26vSq5raM Las8RnOmydY4BqFplV1pUfneZIvPtsZhK+HBWyYPLw== =Jrfa -----END PGP SIGNATURE----- --MRa5t4fDszALhyIra57qiBVeamyoFX1zt-- From owner-freebsd-current@freebsd.org Tue Sep 29 11:59:58 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6E5203FFB8D for ; Tue, 29 Sep 2020 11:59:58 +0000 (UTC) (envelope-from zhilin.ms@phystech.edu) Received: from mail-vk1-f196.google.com (mail-vk1-f196.google.com [209.85.221.196]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C0ycY4Gf3z4glY for ; Tue, 29 Sep 2020 11:59:57 +0000 (UTC) (envelope-from zhilin.ms@phystech.edu) Received: by mail-vk1-f196.google.com with SMTP id c63so2348243vkb.7 for ; Tue, 29 Sep 2020 04:59:57 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=oTgz3LAtaM0ESz3iYU/5GbsVFa1isxnxoIdZo0Zjfu0=; b=gLCDSGzfmTSO667QoqMgS/SdfgjoCLtgQEyPlji21kG2+xqlbrq7aeFHM7WovCr4Qv qC77NDehIDxGe+1+1ZzCwb1lY+86vg4h+4vhylBDZHl5N+6oJRV5s8hESH2n/JONQ/wV Ef6gd/4eGcJn8QhdMlAgvgEar65W773OCR95FWqAwP5GO6sF57sJHiB4Qms8ntRYk9d3 W/fz4uvOgdsFOMCaJT1oGgwkwF3G4gFW0C9H7kNfhRCT60Du4C41hAYfJH1Q4AFJIOFb EP1GvON382sy2Xg0DIOJqRk5mygFp/T6ICoU8/xaLThoJ1PPqe7CGTTTtNLSXRczUhGG x2HA== X-Gm-Message-State: AOAM5302ZqEGLiLxzp1ZZEID85MlhHqx+OEpjjO3ZZbOBxcFJiLN8x3E d/pK2No4r1iAOFCl8RHq5xadWEvbT6DXAJZdvY0= X-Google-Smtp-Source: ABdhPJx8/GDqIosplq6MfFdEPdqnPRyaXLrluhrZiRSjJiF54mDEst3V+Pq7baQW6Z6/eDWZ8gXG1g== X-Received: by 2002:a1f:7882:: with SMTP id t124mr2261796vkc.22.1601380795536; Tue, 29 Sep 2020 04:59:55 -0700 (PDT) Received: from mail-vs1-f42.google.com (mail-vs1-f42.google.com. [209.85.217.42]) by smtp.gmail.com with ESMTPSA id r17sm596762vsf.25.2020.09.29.04.59.55 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 29 Sep 2020 04:59:55 -0700 (PDT) Received: by mail-vs1-f42.google.com with SMTP id j185so2762720vsc.3 for ; Tue, 29 Sep 2020 04:59:55 -0700 (PDT) X-Received: by 2002:a67:ff97:: with SMTP id v23mr2448850vsq.11.1601380795010; Tue, 29 Sep 2020 04:59:55 -0700 (PDT) MIME-Version: 1.0 From: Michael Zhilin Date: Tue, 29 Sep 2020 14:59:43 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Possible deadlock on IO / page fault To: freebsd-current@freebsd.org X-Rspamd-Queue-Id: 4C0ycY4Gf3z4glY X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.29 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.01)[-1.006]; RCVD_COUNT_THREE(0.00)[4]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_SHORT(-0.29)[-0.290]; RCVD_IN_DNSWL_NONE(0.00)[209.85.221.196:from]; NEURAL_HAM_MEDIUM(-0.99)[-0.994]; FORGED_SENDER(0.30)[mizhka@freebsd.org,zhilin.ms@phystech.edu]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.221.196:from]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[mizhka@freebsd.org,zhilin.ms@phystech.edu]; MAILMAN_DEST(0.00)[freebsd-current]; TO_DOM_EQ_FROM_DOM(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 11:59:58 -0000 Hi, I'm using FreeBSD 13-CURRENT (pre-ZoF, r359724) on my laptop with installed Gnome. Sometimes (once a week/month) gnome hangs and the system may be still responsible (may be not). This week it happened again and I've gathered information via ddb/textdump and rebooted laptop. gnome-shell is trying to get exclusive lock on some directory according to information from "show alllocks" and "bt": Process 2355 (gnome-shell) thread 0xfffffe00b03d4700 (100483) exclusive lockmgr zfs (zfs) r = 0 (0xfffff802112fe808) locked @ /usr/src/sys/kern/vfs_subr.c:2930 Tracing command gnome-shell pid 2355 tid 100483 td 0xfffffe00b03d4700 sched_switch() at sched_switch+0x5b2/frame 0xfffffe00aeff7220 mi_switch() at mi_switch+0x155/frame 0xfffffe00aeff7240 sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00aeff7280 sleeplk() at sleeplk+0x106/frame 0xfffffe00aeff72e0 lockmgr_xlock_hard() at lockmgr_xlock_hard+0x21f/frame 0xfffffe00aeff7380 _vn_lock() at _vn_lock+0x54/frame 0xfffffe00aeff73e0 zfs_lookup() at zfs_lookup+0x5f7/frame 0xfffffe00aeff74c0 zfs_freebsd_cachedlookup() at zfs_freebsd_cachedlookup+0x8e/frame 0xfffffe00aeff7600 vfs_cache_lookup() at vfs_cache_lookup+0xa8/frame 0xfffffe00aeff7650 lookup() at lookup+0x5e1/frame 0xfffffe00aeff76f0 namei() at namei+0x524/frame 0xfffffe00aeff77e0 vn_open_cred() at vn_open_cred+0x10b/frame 0xfffffe00aeff7930 kern_openat() at kern_openat+0x1fa/frame 0xfffffe00aeff7aa0 filemon_wrapper_openat() at filemon_wrapper_openat+0x15/frame 0xfffffe00aeff7ad0 amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00aeff7bf0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00aeff7bf0 --- syscall (499, FreeBSD ELF64, filemon_wrapper_openat), rip = 0x80148dbca, rsp = 0x7fffffffe248, rbp = 0x7fffffffe2c0 --- Line vfs_subr.c:2930 mentioned by lockmgr is part of vget_finish. I've found blocked stack with shared lock request: Tracing command gsd-color pid 2422 tid 100784 td 0xfffffe00b08e0700 sched_switch() at sched_switch+0x5b2/frame 0xfffffe00b07084f0 mi_switch() at mi_switch+0x155/frame 0xfffffe00b0708510 sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00b0708550 sleeplk() at sleeplk+0x106/frame 0xfffffe00b07085b0 lockmgr_slock_hard() at lockmgr_slock_hard+0x1ce/frame 0xfffffe00b0708640 _vn_lock() at _vn_lock+0x54/frame 0xfffffe00b07086a0 vget_finish() at vget_finish+0x42/frame 0xfffffe00b07086d0 cache_lookup() at cache_lookup+0x57c/frame 0xfffffe00b0708790 vfs_cache_lookup() at vfs_cache_lookup+0x7d/frame 0xfffffe00b07087e0 lookup() at lookup+0x5e1/frame 0xfffffe00b0708880 namei() at namei+0x524/frame 0xfffffe00b0708970 kern_accessat() at kern_accessat+0x106/frame 0xfffffe00b0708ad0 amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00b0708bf0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00b0708bf0 --- syscall (33, FreeBSD ELF64, sys_access), rip = 0x800fd0eba, rsp = 0x7fffffffe268, rbp = 0x7fffffffe380 --- All other locked threads look more interesting. Thread 100747 is trying to write into file and waiting for page, but thread 101436 is trying to handle page fault and waiting for a shared lock of locked_range due to present writer. I suppose it's deadlock caused all troubles. Tracing command dconf-service pid 2384 tid 100747 td 0xfffffe00b08cc000 sched_switch() at sched_switch+0x5b2/frame 0xfffffe00b0d762e0 mi_switch() at mi_switch+0x155/frame 0xfffffe00b0d76300 sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00b0d76340 _vm_page_busy_sleep() at _vm_page_busy_sleep+0x110/frame 0xfffffe00b0d76390 vm_page_acquire_unlocked() at vm_page_acquire_unlocked+0x177/frame 0xfffffe00b0d763f0 vm_page_grab_valid_unlocked() at vm_page_grab_valid_unlocked+0x51/frame 0xfffffe00b0d76430 zfs_freebsd_write() at zfs_freebsd_write+0x9b6/frame 0xfffffe00b0d76640 VOP_WRITE_APV() at VOP_WRITE_APV+0xa7/frame 0xfffffe00b0d76750 vn_write() at vn_write+0x2a4/frame 0xfffffe00b0d767d0 vn_io_fault_doio() at vn_io_fault_doio+0x43/frame 0xfffffe00b0d76830 vn_io_fault1() at vn_io_fault1+0x16c/frame 0xfffffe00b0d76980 vn_io_fault() at vn_io_fault+0x182/frame 0xfffffe00b0d769f0 dofilewrite() at dofilewrite+0x81/frame 0xfffffe00b0d76a40 kern_pwritev() at kern_pwritev+0x62/frame 0xfffffe00b0d76a80 sys_pwrite() at sys_pwrite+0x8a/frame 0xfffffe00b0d76ad0 amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00b0d76bf0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00b0d76bf0 --- syscall (476, FreeBSD ELF64, sys_pwrite), rip = 0x8007428ca, rsp = 0x7fffffffdf08, rbp = 0x7fffffffdf20 --- Tracing command evolution pid 4536 tid 101436 td 0xfffffe00bf484c00 sched_switch() at sched_switch+0x5b2/frame 0xfffffe00bfd446e0 mi_switch() at mi_switch+0x155/frame 0xfffffe00bfd44700 sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00bfd44740 _cv_wait() at _cv_wait+0x15a/frame 0xfffffe00bfd447a0 rangelock_enter() at rangelock_enter+0x306/frame 0xfffffe00bfd447f0 zfs_freebsd_getpages() at zfs_freebsd_getpages+0x14f/frame 0xfffffe00bfd448a0 vnode_pager_getpages() at vnode_pager_getpages+0x37/frame 0xfffffe00bfd448e0 vm_pager_get_pages() at vm_pager_get_pages+0x4f/frame 0xfffffe00bfd44930 vm_fault() at vm_fault+0x780/frame 0xfffffe00bfd44a40 vm_fault_trap() at vm_fault_trap+0x6e/frame 0xfffffe00bfd44a80 trap_pfault() at trap_pfault+0x1ee/frame 0xfffffe00bfd44ae0 trap() at trap+0x44c/frame 0xfffffe00bfd44bf0 calltrap() at calltrap+0x8/frame 0xfffffe00bfd44bf0 --- trap 0xc, rip = 0x80a55de3f, rsp = 0x7fffffffcc60, rbp = 0x7fffffffcc60 --- If it happens again, I will try to gather more information about locks, corresponding files and directories. For a while I wonder how to reproduce this case. For instance, one program has mmapped huge file and reads it infinitely, another program write random data in the middle of the file. But it's unclear how to trigger page fault manually. As I understand, kernel provides "vm_page_set_invalid" to mark it invalid. Is there any way to invalidate a page of backed object from userland? I will appreciate any advice on how to troubleshoot this issue. The full output of ddb is here: https://people.freebsd.org/~mizhka/ddb.txt Thanks! From owner-freebsd-current@freebsd.org Tue Sep 29 13:20:43 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 418FF422E4D for ; Tue, 29 Sep 2020 13:20:43 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C10Pk1mmGz4mJJ; Tue, 29 Sep 2020 13:20:41 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.16.1/8.16.1) with ESMTPS id 08TDKQJw050144 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 29 Sep 2020 16:20:29 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua 08TDKQJw050144 Received: (from kostik@localhost) by tom.home (8.16.1/8.16.1/Submit) id 08TDKQw2050140; Tue, 29 Sep 2020 16:20:26 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Tue, 29 Sep 2020 16:20:26 +0300 From: Konstantin Belousov To: Michael Zhilin Cc: freebsd-current@freebsd.org Subject: Re: Possible deadlock on IO / page fault Message-ID: <20200929132026.GS2643@kib.kiev.ua> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on tom.home X-Rspamd-Queue-Id: 4C10Pk1mmGz4mJJ X-Spamd-Bar: + X-Spamd-Result: default: False [1.71 / 15.00]; ARC_NA(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all:c]; NEURAL_SPAM_MEDIUM(0.83)[0.831]; NEURAL_SPAM_SHORT(0.64)[0.638]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.24)[0.241]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; MIME_TRACE(0.00)[0:+]; MAILMAN_DEST(0.00)[freebsd-current]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 13:20:43 -0000 On Tue, Sep 29, 2020 at 02:59:43PM +0300, Michael Zhilin wrote: > Hi, > > I'm using FreeBSD 13-CURRENT (pre-ZoF, r359724) on my laptop with installed > Gnome. Sometimes > (once a week/month) gnome hangs and the system may be still responsible > (may be not). > This week it happened again and I've gathered information via ddb/textdump > and rebooted laptop. > > gnome-shell is trying to get exclusive lock on some directory according to > information > from "show alllocks" and "bt": > > Process 2355 (gnome-shell) thread 0xfffffe00b03d4700 (100483) > exclusive lockmgr zfs (zfs) r = 0 (0xfffff802112fe808) locked @ > /usr/src/sys/kern/vfs_subr.c:2930 > > Tracing command gnome-shell pid 2355 tid 100483 td 0xfffffe00b03d4700 > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00aeff7220 > mi_switch() at mi_switch+0x155/frame 0xfffffe00aeff7240 > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00aeff7280 > sleeplk() at sleeplk+0x106/frame 0xfffffe00aeff72e0 > lockmgr_xlock_hard() at lockmgr_xlock_hard+0x21f/frame > 0xfffffe00aeff7380 > _vn_lock() at _vn_lock+0x54/frame 0xfffffe00aeff73e0 > zfs_lookup() at zfs_lookup+0x5f7/frame 0xfffffe00aeff74c0 > zfs_freebsd_cachedlookup() at zfs_freebsd_cachedlookup+0x8e/frame > 0xfffffe00aeff7600 > vfs_cache_lookup() at vfs_cache_lookup+0xa8/frame 0xfffffe00aeff7650 > lookup() at lookup+0x5e1/frame 0xfffffe00aeff76f0 > namei() at namei+0x524/frame 0xfffffe00aeff77e0 > vn_open_cred() at vn_open_cred+0x10b/frame 0xfffffe00aeff7930 > kern_openat() at kern_openat+0x1fa/frame 0xfffffe00aeff7aa0 > filemon_wrapper_openat() at filemon_wrapper_openat+0x15/frame > 0xfffffe00aeff7ad0 > amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00aeff7bf0 > fast_syscall_common() at fast_syscall_common+0x101/frame > 0xfffffe00aeff7bf0 > --- syscall (499, FreeBSD ELF64, filemon_wrapper_openat), rip = > 0x80148dbca, rsp = 0x7fffffffe248, rbp = 0x7fffffffe2c0 --- > > Line vfs_subr.c:2930 mentioned by lockmgr is part of vget_finish. I've > found blocked stack > with shared lock request: > > Tracing command gsd-color pid 2422 tid 100784 td 0xfffffe00b08e0700 > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00b07084f0 > mi_switch() at mi_switch+0x155/frame 0xfffffe00b0708510 > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00b0708550 > sleeplk() at sleeplk+0x106/frame 0xfffffe00b07085b0 > lockmgr_slock_hard() at lockmgr_slock_hard+0x1ce/frame > 0xfffffe00b0708640 > _vn_lock() at _vn_lock+0x54/frame 0xfffffe00b07086a0 > vget_finish() at vget_finish+0x42/frame 0xfffffe00b07086d0 > cache_lookup() at cache_lookup+0x57c/frame 0xfffffe00b0708790 > vfs_cache_lookup() at vfs_cache_lookup+0x7d/frame 0xfffffe00b07087e0 > lookup() at lookup+0x5e1/frame 0xfffffe00b0708880 > namei() at namei+0x524/frame 0xfffffe00b0708970 > kern_accessat() at kern_accessat+0x106/frame 0xfffffe00b0708ad0 > amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00b0708bf0 > fast_syscall_common() at fast_syscall_common+0x101/frame > 0xfffffe00b0708bf0 > --- syscall (33, FreeBSD ELF64, sys_access), rip = 0x800fd0eba, rsp = > 0x7fffffffe268, rbp = 0x7fffffffe380 --- > > All other locked threads look more interesting. Thread 100747 is trying to > write > into file and waiting for page, but thread 101436 is trying to handle page > fault > and waiting for a shared lock of locked_range due to present writer. I > suppose it's > deadlock caused all troubles. > > Tracing command dconf-service pid 2384 tid 100747 td 0xfffffe00b08cc000 > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00b0d762e0 > mi_switch() at mi_switch+0x155/frame 0xfffffe00b0d76300 > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00b0d76340 > _vm_page_busy_sleep() at _vm_page_busy_sleep+0x110/frame > 0xfffffe00b0d76390 > vm_page_acquire_unlocked() at vm_page_acquire_unlocked+0x177/frame > 0xfffffe00b0d763f0 > vm_page_grab_valid_unlocked() at vm_page_grab_valid_unlocked+0x51/frame > 0xfffffe00b0d76430 > zfs_freebsd_write() at zfs_freebsd_write+0x9b6/frame 0xfffffe00b0d76640 > VOP_WRITE_APV() at VOP_WRITE_APV+0xa7/frame 0xfffffe00b0d76750 > vn_write() at vn_write+0x2a4/frame 0xfffffe00b0d767d0 > vn_io_fault_doio() at vn_io_fault_doio+0x43/frame 0xfffffe00b0d76830 > vn_io_fault1() at vn_io_fault1+0x16c/frame 0xfffffe00b0d76980 > vn_io_fault() at vn_io_fault+0x182/frame 0xfffffe00b0d769f0 > dofilewrite() at dofilewrite+0x81/frame 0xfffffe00b0d76a40 > kern_pwritev() at kern_pwritev+0x62/frame 0xfffffe00b0d76a80 > sys_pwrite() at sys_pwrite+0x8a/frame 0xfffffe00b0d76ad0 > amd64_syscall() at amd64_syscall+0x140/frame 0xfffffe00b0d76bf0 > fast_syscall_common() at fast_syscall_common+0x101/frame > 0xfffffe00b0d76bf0 > --- syscall (476, FreeBSD ELF64, sys_pwrite), rip = 0x8007428ca, rsp = > 0x7fffffffdf08, rbp = 0x7fffffffdf20 --- > > Tracing command evolution pid 4536 tid 101436 td 0xfffffe00bf484c00 > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00bfd446e0 > mi_switch() at mi_switch+0x155/frame 0xfffffe00bfd44700 > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00bfd44740 > _cv_wait() at _cv_wait+0x15a/frame 0xfffffe00bfd447a0 > rangelock_enter() at rangelock_enter+0x306/frame 0xfffffe00bfd447f0 This call to rangelock_enter() looks suspicious. This is a call to ZFS own rangelocks, not our rangelocks. Still, if write took rangelock on the same range, we get a deadlock due to LoR between rangelock and page busy. > zfs_freebsd_getpages() at zfs_freebsd_getpages+0x14f/frame > 0xfffffe00bfd448a0 > vnode_pager_getpages() at vnode_pager_getpages+0x37/frame > 0xfffffe00bfd448e0 > vm_pager_get_pages() at vm_pager_get_pages+0x4f/frame 0xfffffe00bfd44930 > vm_fault() at vm_fault+0x780/frame 0xfffffe00bfd44a40 > vm_fault_trap() at vm_fault_trap+0x6e/frame 0xfffffe00bfd44a80 > trap_pfault() at trap_pfault+0x1ee/frame 0xfffffe00bfd44ae0 > trap() at trap+0x44c/frame 0xfffffe00bfd44bf0 > calltrap() at calltrap+0x8/frame 0xfffffe00bfd44bf0 > --- trap 0xc, rip = 0x80a55de3f, rsp = 0x7fffffffcc60, rbp = > 0x7fffffffcc60 --- > > If it happens again, I will try to gather more information about locks, > corresponding > files and directories. For a while I wonder how to reproduce this case. For > instance, > one program has mmapped huge file and reads it infinitely, another program > write random > data in the middle of the file. But it's unclear how to trigger page fault > manually. > As I understand, kernel provides "vm_page_set_invalid" to mark it invalid. > Is there > any way to invalidate a page of backed object from userland? > > I will appreciate any advice on how to troubleshoot this issue. > > The full output of ddb is here: https://people.freebsd.org/~mizhka/ddb.txt > Thanks! > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Tue Sep 29 13:32:07 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 118DB4231F2 for ; Tue, 29 Sep 2020 13:32:07 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com [IPv6:2607:f8b0:4864:20::831]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C10fs6TRJz4n9k; Tue, 29 Sep 2020 13:32:05 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qt1-x831.google.com with SMTP id y11so3498579qtn.9; Tue, 29 Sep 2020 06:32:05 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=GPyfonuuWwT+qIzCLryAx6GU5WPvx9+JgWOXINYO4ag=; b=Nf8GKT4Jevtlx/SsJiqYzTeBStrwC28swFMcyfkPm8aFQGyMtFBNLcpqfhNNbOH2tC oZ6p89dhxc3/bNINW1dISmLlZTUj8lm2eKk9agPaoKq5FO40W33r8ZYU38WItIDuCP35 GDX3iJZkOR29hbNHA4k2SsOuzkWQcqR5TUWtA7sO+Md/gv3IouZhRrOynuXOYfrJmj9P 43UOCi/KAVPziX7plV/B3S9RPn7bLlXb7RIPZ70ipeY1rjNgl48EN1OA3AMANP1ipd5t 0tMSU0TqrWU0kqQazr1rb5fTZ/ooSncXsifPUMDGADret5mX+swoeRoQ0MzEBhTGyKe0 g28A== X-Gm-Message-State: AOAM530vwEQQaqSi1lP6h0pNoGCGCjNhx4/I/oHtGxz6QVIsPmMQyoDl jxXkYJZElrnuOd78wDARMLA= X-Google-Smtp-Source: ABdhPJzIb7sze7hW2RC/T4ZERv3CqlTPxf09pUYvGd+E/REd65pWK4Oy5dhBVAKo5sycI4GTsC1sJg== X-Received: by 2002:ac8:544f:: with SMTP id d15mr3385293qtq.378.1601386324674; Tue, 29 Sep 2020 06:32:04 -0700 (PDT) Received: from raichu (toroon0560w-lp130-01-174-88-77-103.dsl.bell.ca. [174.88.77.103]) by smtp.gmail.com with ESMTPSA id i5sm4217263qko.86.2020.09.29.06.32.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Sep 2020 06:32:03 -0700 (PDT) Sender: Mark Johnston Date: Tue, 29 Sep 2020 09:31:59 -0400 From: Mark Johnston To: Konstantin Belousov Cc: Michael Zhilin , freebsd-current@freebsd.org Subject: Re: Possible deadlock on IO / page fault Message-ID: <20200929133159.GA26914@raichu> References: <20200929132026.GS2643@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200929132026.GS2643@kib.kiev.ua> X-Rspamd-Queue-Id: 4C10fs6TRJz4n9k X-Spamd-Bar: - X-Spamd-Result: default: False [-1.94 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; NEURAL_HAM_LONG(-1.02)[-1.022]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_NA(0.00)[freebsd.org]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.21)[-0.205]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::831:from]; NEURAL_HAM_MEDIUM(-1.02)[-1.016]; FREEMAIL_TO(0.00)[gmail.com]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; MAILMAN_DEST(0.00)[freebsd-current] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 13:32:07 -0000 On Tue, Sep 29, 2020 at 04:20:26PM +0300, Konstantin Belousov wrote: > On Tue, Sep 29, 2020 at 02:59:43PM +0300, Michael Zhilin wrote: > > Hi, > > > > I'm using FreeBSD 13-CURRENT (pre-ZoF, r359724) on my laptop with installed > > Gnome. Sometimes > > (once a week/month) gnome hangs and the system may be still responsible > > (may be not). > > This week it happened again and I've gathered information via ddb/textdump > > and rebooted laptop. > > > > gnome-shell is trying to get exclusive lock on some directory according to > > information > > from "show alllocks" and "bt": > > > > [...] > > Tracing command evolution pid 4536 tid 101436 td 0xfffffe00bf484c00 > > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00bfd446e0 > > mi_switch() at mi_switch+0x155/frame 0xfffffe00bfd44700 > > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00bfd44740 > > _cv_wait() at _cv_wait+0x15a/frame 0xfffffe00bfd447a0 > > rangelock_enter() at rangelock_enter+0x306/frame 0xfffffe00bfd447f0 > This call to rangelock_enter() looks suspicious. This is a call to ZFS > own rangelocks, not our rangelocks. Still, if write took rangelock on the > same range, we get a deadlock due to LoR between rangelock and page busy. This was fixed by r361287. In particular zfs_getpages() will no longer block on the ZFS range lock, exactly because of this deadlock. So I would suggest updating to that revision or later. > > zfs_freebsd_getpages() at zfs_freebsd_getpages+0x14f/frame > > 0xfffffe00bfd448a0 > > vnode_pager_getpages() at vnode_pager_getpages+0x37/frame > > 0xfffffe00bfd448e0 > > vm_pager_get_pages() at vm_pager_get_pages+0x4f/frame 0xfffffe00bfd44930 > > vm_fault() at vm_fault+0x780/frame 0xfffffe00bfd44a40 > > vm_fault_trap() at vm_fault_trap+0x6e/frame 0xfffffe00bfd44a80 > > trap_pfault() at trap_pfault+0x1ee/frame 0xfffffe00bfd44ae0 > > trap() at trap+0x44c/frame 0xfffffe00bfd44bf0 > > calltrap() at calltrap+0x8/frame 0xfffffe00bfd44bf0 > > --- trap 0xc, rip = 0x80a55de3f, rsp = 0x7fffffffcc60, rbp = > > 0x7fffffffcc60 --- From owner-freebsd-current@freebsd.org Tue Sep 29 13:36:03 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EDA904239C1 for ; Tue, 29 Sep 2020 13:36:03 +0000 (UTC) (envelope-from zhilin.ms@phystech.edu) Received: from mail-vk1-f172.google.com (mail-vk1-f172.google.com [209.85.221.172]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C10lQ2nr8z4nhY for ; Tue, 29 Sep 2020 13:36:02 +0000 (UTC) (envelope-from zhilin.ms@phystech.edu) Received: by mail-vk1-f172.google.com with SMTP id a16so2430724vke.3 for ; Tue, 29 Sep 2020 06:36:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fMC+lN/ygxaqTTMETLH21qNyhaSrZ+KCDFu9LPrvD1A=; b=sjtl+UBCM5Vp/XPGfhOZI76k0N0BoLxpDdzbj1OnG3OhMQ115EZbrzF4QpAczKoI2N euGSQdZN5DH/e166eBTokStyNF7m7IoFmY8ngsrTHMEjCZKlOIGnh7RkCX2iRP5i7pik Gl55UJOJbKITWegJc42cNKFsNH020RjbWwR58Sw8tr9FhH1ZpbPT6nVuDG6HatLLMmhe dbLyLyDRQ52nKA8cayA0laoLvrjqa6FxT+5zatZAahJmys9EEzQYOQCBv3AMNjtFLtBn +kdhk6RrOee2rrk2FZ9nHcHFLPkdfGuRMC8cf3VDKQ/7UA+C3voXNWSJeuXNEfs8XSgi TLNQ== X-Gm-Message-State: AOAM5318IYYm3az1Fqlebwkt0qiWPhfMVUMVK8Qd0hDOQRqcruKyMWkX anaMwarZYdaqsB/vhaIBdIzxJcGIFdUTdokf8XGJ/Q== X-Google-Smtp-Source: ABdhPJyyr9sbyRJKg4Hdn+q1dS8S7pkpvXX8eQJmq9Rfo5qz2Q/ylzub2Ol5+tihtuvZGPGE3h004Q== X-Received: by 2002:a1f:6ec4:: with SMTP id j187mr2516115vkc.15.1601386560934; Tue, 29 Sep 2020 06:36:00 -0700 (PDT) Received: from mail-ua1-f42.google.com (mail-ua1-f42.google.com. [209.85.222.42]) by smtp.gmail.com with ESMTPSA id l5sm1008745vkl.1.2020.09.29.06.36.00 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 29 Sep 2020 06:36:00 -0700 (PDT) Received: by mail-ua1-f42.google.com with SMTP id n2so3428905uaw.11 for ; Tue, 29 Sep 2020 06:36:00 -0700 (PDT) X-Received: by 2002:ab0:441:: with SMTP id 59mr882401uav.50.1601386560195; Tue, 29 Sep 2020 06:36:00 -0700 (PDT) MIME-Version: 1.0 References: <20200929132026.GS2643@kib.kiev.ua> <20200929133159.GA26914@raichu> In-Reply-To: <20200929133159.GA26914@raichu> From: Michael Zhilin Date: Tue, 29 Sep 2020 16:35:47 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Possible deadlock on IO / page fault To: Mark Johnston Cc: Konstantin Belousov , freebsd-current@freebsd.org X-Rspamd-Queue-Id: 4C10lQ2nr8z4nhY X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.61 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.02)[-1.020]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.56)[-0.560]; RCVD_IN_DNSWL_NONE(0.00)[209.85.221.172:from]; NEURAL_HAM_MEDIUM(-1.03)[-1.028]; FORGED_SENDER(0.30)[mizhka@freebsd.org,zhilin.ms@phystech.edu]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.221.172:from]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[mizhka@freebsd.org,zhilin.ms@phystech.edu]; MAILMAN_DEST(0.00)[freebsd-current]; FREEMAIL_CC(0.00)[gmail.com,freebsd.org] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 13:36:04 -0000 Thank you, Kostya and Mark! I will update to head. :) On Tue, Sep 29, 2020 at 4:32 PM Mark Johnston wrote: > On Tue, Sep 29, 2020 at 04:20:26PM +0300, Konstantin Belousov wrote: > > On Tue, Sep 29, 2020 at 02:59:43PM +0300, Michael Zhilin wrote: > > > Hi, > > > > > > I'm using FreeBSD 13-CURRENT (pre-ZoF, r359724) on my laptop with > installed > > > Gnome. Sometimes > > > (once a week/month) gnome hangs and the system may be still responsible > > > (may be not). > > > This week it happened again and I've gathered information via > ddb/textdump > > > and rebooted laptop. > > > > > > gnome-shell is trying to get exclusive lock on some directory > according to > > > information > > > from "show alllocks" and "bt": > > > > > > [...] > > > Tracing command evolution pid 4536 tid 101436 td 0xfffffe00bf484c00 > > > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00bfd446e0 > > > mi_switch() at mi_switch+0x155/frame 0xfffffe00bfd44700 > > > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00bfd44740 > > > _cv_wait() at _cv_wait+0x15a/frame 0xfffffe00bfd447a0 > > > rangelock_enter() at rangelock_enter+0x306/frame 0xfffffe00bfd447f0 > > This call to rangelock_enter() looks suspicious. This is a call to ZFS > > own rangelocks, not our rangelocks. Still, if write took rangelock on > the > > same range, we get a deadlock due to LoR between rangelock and page busy. > > This was fixed by r361287. In particular zfs_getpages() will no longer > block on the ZFS range lock, exactly because of this deadlock. So I > would suggest updating to that revision or later. > > > > zfs_freebsd_getpages() at zfs_freebsd_getpages+0x14f/frame > > > 0xfffffe00bfd448a0 > > > vnode_pager_getpages() at vnode_pager_getpages+0x37/frame > > > 0xfffffe00bfd448e0 > > > vm_pager_get_pages() at vm_pager_get_pages+0x4f/frame > 0xfffffe00bfd44930 > > > vm_fault() at vm_fault+0x780/frame 0xfffffe00bfd44a40 > > > vm_fault_trap() at vm_fault_trap+0x6e/frame 0xfffffe00bfd44a80 > > > trap_pfault() at trap_pfault+0x1ee/frame 0xfffffe00bfd44ae0 > > > trap() at trap+0x44c/frame 0xfffffe00bfd44bf0 > > > calltrap() at calltrap+0x8/frame 0xfffffe00bfd44bf0 > > > --- trap 0xc, rip = 0x80a55de3f, rsp = 0x7fffffffcc60, rbp = > > > 0x7fffffffcc60 --- > From owner-freebsd-current@freebsd.org Tue Sep 29 13:42:48 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6F084424191 for ; Tue, 29 Sep 2020 13:42:48 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C10vD0p4gz4p7b; Tue, 29 Sep 2020 13:42:47 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qt1-x82f.google.com with SMTP id 19so3542946qtp.1; Tue, 29 Sep 2020 06:42:47 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=T8ADC5HZfx5BEKxWsA5f0ozV174bMAve6fIJsWs3xRE=; b=in2bdwRIUTNIkMMfE3MFNaxzDhagjwFZa81G/jvNZrTopZapDJfQRq18E4CDgUMdXK cvnPEDdbiV6EnwvIwpVhH5zKt7z5IuYSQJ1QEmDff6kxAkbXrw8GrII9/OHQqpKO6C15 0DFa1R/jBhjlo8ReGZMCrrBUilXTMkHpU+rRk5Qz0cALI4/IHYzfOAJv0l/adi1Lnwzz 60OHM6jxPuWX5GVCWaD7DSglZOH9KU7fNas/+MW73un5tKk/P2LkIgzzHi1iPM2HG3c8 MjLIAYvJW9Rn/B6xJM+bU31NXL0uATtiv2wVFVRekJM8cl5WiP504oybbcFNA0u8eE2v is2g== X-Gm-Message-State: AOAM533IUcETDH9A5pnbLDZc6WqShAPP2vHYtrxFMlOHR0ZQ2bEc9bPj DwyJJVicXKvInxsA2J7BtWNLsvR0cn09XQ== X-Google-Smtp-Source: ABdhPJxGAz+3UAvoUmguCrUXb7fv5OZj03pCpyilIjszlm+1g2TWSa6+GZIyZzFVR64RxIpaBZ6RBA== X-Received: by 2002:ac8:3261:: with SMTP id y30mr3419039qta.242.1601386966895; Tue, 29 Sep 2020 06:42:46 -0700 (PDT) Received: from raichu (toroon0560w-lp130-01-174-88-77-103.dsl.bell.ca. [174.88.77.103]) by smtp.gmail.com with ESMTPSA id f3sm5238133qtg.71.2020.09.29.06.42.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Sep 2020 06:42:46 -0700 (PDT) Sender: Mark Johnston Date: Tue, 29 Sep 2020 09:42:44 -0400 From: Mark Johnston To: Michael Zhilin Cc: Konstantin Belousov , freebsd-current@freebsd.org Subject: Re: Possible deadlock on IO / page fault Message-ID: <20200929134244.GB26914@raichu> References: <20200929132026.GS2643@kib.kiev.ua> <20200929133159.GA26914@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 4C10vD0p4gz4p7b X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 13:42:48 -0000 On Tue, Sep 29, 2020 at 04:35:47PM +0300, Michael Zhilin wrote: > Thank you, Kostya and Mark! > I will update to head. :) Be sure to pick up r366252 or later: there is a related bug in the initial OpenZFS import that is fixed by that revision. > On Tue, Sep 29, 2020 at 4:32 PM Mark Johnston wrote: > > > On Tue, Sep 29, 2020 at 04:20:26PM +0300, Konstantin Belousov wrote: > > > On Tue, Sep 29, 2020 at 02:59:43PM +0300, Michael Zhilin wrote: > > > > Hi, > > > > > > > > I'm using FreeBSD 13-CURRENT (pre-ZoF, r359724) on my laptop with > > installed > > > > Gnome. Sometimes > > > > (once a week/month) gnome hangs and the system may be still responsible > > > > (may be not). > > > > This week it happened again and I've gathered information via > > ddb/textdump > > > > and rebooted laptop. > > > > > > > > gnome-shell is trying to get exclusive lock on some directory > > according to > > > > information > > > > from "show alllocks" and "bt": > > > > > > > > [...] > > > > Tracing command evolution pid 4536 tid 101436 td 0xfffffe00bf484c00 > > > > sched_switch() at sched_switch+0x5b2/frame 0xfffffe00bfd446e0 > > > > mi_switch() at mi_switch+0x155/frame 0xfffffe00bfd44700 > > > > sleepq_switch() at sleepq_switch+0x11a/frame 0xfffffe00bfd44740 > > > > _cv_wait() at _cv_wait+0x15a/frame 0xfffffe00bfd447a0 > > > > rangelock_enter() at rangelock_enter+0x306/frame 0xfffffe00bfd447f0 > > > This call to rangelock_enter() looks suspicious. This is a call to ZFS > > > own rangelocks, not our rangelocks. Still, if write took rangelock on > > the > > > same range, we get a deadlock due to LoR between rangelock and page busy. > > > > This was fixed by r361287. In particular zfs_getpages() will no longer > > block on the ZFS range lock, exactly because of this deadlock. So I > > would suggest updating to that revision or later. > > > > > > zfs_freebsd_getpages() at zfs_freebsd_getpages+0x14f/frame > > > > 0xfffffe00bfd448a0 > > > > vnode_pager_getpages() at vnode_pager_getpages+0x37/frame > > > > 0xfffffe00bfd448e0 > > > > vm_pager_get_pages() at vm_pager_get_pages+0x4f/frame > > 0xfffffe00bfd44930 > > > > vm_fault() at vm_fault+0x780/frame 0xfffffe00bfd44a40 > > > > vm_fault_trap() at vm_fault_trap+0x6e/frame 0xfffffe00bfd44a80 > > > > trap_pfault() at trap_pfault+0x1ee/frame 0xfffffe00bfd44ae0 > > > > trap() at trap+0x44c/frame 0xfffffe00bfd44bf0 > > > > calltrap() at calltrap+0x8/frame 0xfffffe00bfd44bf0 > > > > --- trap 0xc, rip = 0x80a55de3f, rsp = 0x7fffffffcc60, rbp = > > > > 0x7fffffffcc60 --- > > From owner-freebsd-current@freebsd.org Tue Sep 29 20:38:29 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CAF7242F8DD for ; Tue, 29 Sep 2020 20:38:29 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from mail.nomadlogic.org (mail.nomadlogic.org [174.136.98.114]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.nomadlogic.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1B6r49Vqz4F2c for ; Tue, 29 Sep 2020 20:38:28 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from [192.168.1.160] (cpe-23-243-161-111.socal.res.rr.com [23.243.161.111]) by mail.nomadlogic.org (OpenSMTPD) with ESMTPSA id 8dd78818 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO) for ; Tue, 29 Sep 2020 20:38:21 +0000 (UTC) To: FreeBSD Current From: Pete Wright Subject: second ZFS pool no longer auto-imports Message-ID: <8350a33a-12ff-366d-8eab-d82b891e6291@nomadlogic.org> Date: Tue, 29 Sep 2020 13:38:20 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.3.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 4C1B6r49Vqz4F2c X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.61 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; ARC_NA(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.01)[-1.011]; DMARC_NA(0.00)[nomadlogic.org]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.77)[-0.767]; NEURAL_HAM_MEDIUM(-0.53)[-0.532]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:25795, ipnet:174.136.96.0/20, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[23.243.161.111:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 20:38:29 -0000 Hello, I have a workstation with two ZFS pools (zroot and tank0).  After upgrading CURRENT post the OpenZFS merge I have found that my tank0 pool no longer auto-imports on boot.  After the system has booted I am able to import it via "zpool import tank0" then mount all of its filesystems without issues or errors.  I've also run a scrub on the pool and no issues were identified their either. I've also been careful to *not* run "zpool upgrade" on this system as my zroot is geli encrypted, and have been waiting for the all clear to do that. Has anyone else noticed this behavior?  Perhaps I'm missing an option or something - kinda confused here as to what may have changed to cause this to happen. Thanks! -pete -- Pete Wright pete@nomadlogic.org @nomadlogicLA From owner-freebsd-current@freebsd.org Tue Sep 29 20:53:09 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4E5A542FF4E for ; Tue, 29 Sep 2020 20:53:09 +0000 (UTC) (envelope-from xtouqh@hotmail.com) Received: from EUR06-VI1-obe.outbound.protection.outlook.com (mail-vi1eur06olkn2043.outbound.protection.outlook.com [40.92.17.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1BRm0Jf4z4G2P for ; Tue, 29 Sep 2020 20:53:07 +0000 (UTC) (envelope-from xtouqh@hotmail.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nrbxWdr74YgWhyYiCb1mpyt/t4gUchVzjl2O6fo/SH8ykQyX6CJ5KS0/E5oapEc0CMbI1M8ODCkFvlS3zjpNckbA/Qwob9D/m9nLW8EdbQ7TCvP5W9MeDlROdjRQl8dO1UJ6o4Voin8hh5JsqZPH3SN19w0/qdRGQRtvRPIgtEBC5aCt2614rHgd+kZskpSHAPDm6KMw2lTbTGShmA/mnHpZ2MEp5g8g1z70usSjmVadNpPpXjNb3bfUfnKL8uO/MxKwmeIyXVDX2rky3zXBj4EUKpimxgQ8J552d4usR5y7maNEs78Am+GoOuVOLNeOeBRZ8srmUYNa5IJD0mD6KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Tf8rB+rztOVHqaMEj98CEKZv3up1Xq8R4RmebErlDTo=; b=Owr73iMCU5nrkWzp7OSXC65tUQIha0EPYJM8JVpUjsp0oZigh8zM3mZNZZKbRtnPdK9EAClDJyTxQdz7Q204vVXMlLPHgg+AJNzNmwnFXrRQ99OBm3JsGfy7J5mqgMkDos3xztGXUBEfP92N233JYmBh6SKs+PduEMuSLKQ76cpHI0QXB6ajpzmaxmsDi/pe3hiOZuuwhu7hiKfN33JNZGRnM5RAp+nzT9ZpfAbVu3+MO67BArKN4cfbmbbVjc63e2I572xkes+4HxI+jYoysZ2weYLW/Er932HuSfq7VVAL3HLMDj1LjBvP5w8QKZzRAgLLg4OuqdIVPh5lSGW6Tw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from AM7EUR06FT033.eop-eur06.prod.protection.outlook.com (2a01:111:e400:fc36::51) by AM7EUR06HT180.eop-eur06.prod.protection.outlook.com (2a01:111:e400:fc36::319) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.34; Tue, 29 Sep 2020 20:53:06 +0000 Received: from AM0PR06MB3986.eurprd06.prod.outlook.com (2a01:111:e400:fc36::52) by AM7EUR06FT033.mail.protection.outlook.com (2a01:111:e400:fc36::361) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.34 via Frontend Transport; Tue, 29 Sep 2020 20:53:06 +0000 X-IncomingTopHeaderMarker: OriginalChecksum:900E5DD9FC3D9E546EB3970804D03BA073ADC391F3568A78C0F48A05149426D0; UpperCasedChecksum:BD15B0A603F1B641EBDF798A4E24321F2FC7A174D76297AACF6417A37399FC9D; SizeAsReceived:8724; Count:48 Received: from AM0PR06MB3986.eurprd06.prod.outlook.com ([fe80::759a:af46:6f2:8fb8]) by AM0PR06MB3986.eurprd06.prod.outlook.com ([fe80::759a:af46:6f2:8fb8%7]) with mapi id 15.20.3412.028; Tue, 29 Sep 2020 20:53:06 +0000 Subject: Re: second ZFS pool no longer auto-imports To: Pete Wright , FreeBSD Current References: <8350a33a-12ff-366d-8eab-d82b891e6291@nomadlogic.org> From: xtouqh@hotmail.com Message-ID: Date: Tue, 29 Sep 2020 23:53:03 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.3.1 In-Reply-To: <8350a33a-12ff-366d-8eab-d82b891e6291@nomadlogic.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: AM4PR0302CA0001.eurprd03.prod.outlook.com (2603:10a6:205:2::14) To AM0PR06MB3986.eurprd06.prod.outlook.com (2603:10a6:208:b6::28) X-Microsoft-Original-Message-ID: <3f9c28a0-8c70-1e2e-6fcd-23ee3f258a8d@hotmail.com> MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [192.168.1.6] (91.240.124.157) by AM4PR0302CA0001.eurprd03.prod.outlook.com (2603:10a6:205:2::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.32 via Frontend Transport; Tue, 29 Sep 2020 20:53:05 +0000 X-Microsoft-Original-Message-ID: <3f9c28a0-8c70-1e2e-6fcd-23ee3f258a8d@hotmail.com> X-TMN: [8sQaeAXevZU3o0qLEcLj2PWY4yMXNwBr] X-MS-PublicTrafficType: Email X-IncomingHeaderCount: 48 X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-Correlation-Id: e58cca56-f253-4fd8-1ef6-08d864b9a9c6 X-MS-TrafficTypeDiagnostic: AM7EUR06HT180: X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: RjDd0dzJOhbH7lwGoawdJKxHTTXcCn8xqkYgTvdeXbawILJX8kvDE4W7rL4VkYhX9jEXXOaj8mpVbsEBn1Llnzqrx2O9k2OCMUsaTPbM1W8SY5Thu0NT+wm8egXRQhXVCKjdRE0TTSDgxUSb5GixOLUjG3bEF5TMQSs2qTBNuokbW/QHkDeOcFX/Adcxa48fn5pXCMEDTMX1yTqmne8m8w== X-MS-Exchange-AntiSpam-MessageData: FThtWPtw7kYTPUmDgxxB/Z0lI5XTaP3hAogpnTxwFNORUWzwBHQtBWqsmJE2QSFTN9CBUgc4yCYwyqHXEGxRxhBeZRycZvvmpsxKlntKRHgCmAIJ5UWixhFcENki8Iimh6vlA+fTwma5jxbHO+8vvw== X-OriginatorOrg: hotmail.com X-MS-Exchange-CrossTenant-Network-Message-Id: e58cca56-f253-4fd8-1ef6-08d864b9a9c6 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Sep 2020 20:53:06.2520 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-AuthSource: AM7EUR06FT033.eop-eur06.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: Internet X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7EUR06HT180 X-Rspamd-Queue-Id: 4C1BRm0Jf4z4G2P X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.31 / 15.00]; RCVD_TLS_LAST(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.998]; R_DKIM_ALLOW(-0.20)[hotmail.com:s=selector1]; RCVD_COUNT_FIVE(0.00)[5]; FREEMAIL_FROM(0.00)[hotmail.com]; R_SPF_ALLOW(-0.20)[+ip4:40.92.0.0/15]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM_LONG(-0.99)[-0.993]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1]; RWL_MAILSPIKE_POSSIBLE(0.00)[40.92.17.43:from]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[hotmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; FROM_NO_DN(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[40.92.17.43:from]; DMARC_POLICY_ALLOW(-0.50)[hotmail.com,none]; NEURAL_HAM_SHORT(-0.82)[-0.817]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[hotmail.com]; ASN(0.00)[asn:8075, ipnet:40.80.0.0/12, country:US]; FORGED_MUA_THUNDERBIRD_MSGID_UNKNOWN(2.50)[]; MAILMAN_DEST(0.00)[freebsd-current]; DWL_DNSWL_NONE(0.00)[hotmail.com:dkim] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 20:53:09 -0000 Pete Wright wrote: > Hello, > I have a workstation with two ZFS pools (zroot and tank0).  After > upgrading CURRENT post the OpenZFS merge I have found that my tank0 pool > no longer auto-imports on boot.  After the system has booted I am able > to import it via "zpool import tank0" then mount all of its filesystems > without issues or errors.  I've also run a scrub on the pool and no > issues were identified their either. > > I've also been careful to *not* run "zpool upgrade" on this system as my > zroot is geli encrypted, and have been waiting for the all clear to do > that. > > Has anyone else noticed this behavior?  Perhaps I'm missing an option or > something - kinda confused here as to what may have changed to cause > this to happen. Check /usr/src/UPDATING, 20200824 entry. From owner-freebsd-current@freebsd.org Tue Sep 29 21:20:50 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 63DAD3F0C21 for ; Tue, 29 Sep 2020 21:20:50 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1C3k245zz4Hh6; Tue, 29 Sep 2020 21:20:50 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id 10B082A271; Tue, 29 Sep 2020 21:20:50 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id E58F53D950; Tue, 29 Sep 2020 23:20:47 +0200 (CEST) From: "Kristof Provost" To: "Alexander Leidinger" Cc: "Shawn Webb" , "FreeBSD Current" Subject: Re: iflib/bridge kernel panic Date: Tue, 29 Sep 2020 23:20:44 +0200 X-Mailer: MailMate (1.13.2r5673) Message-ID: <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> In-Reply-To: <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 21:20:50 -0000 On 28 Sep 2020, at 16:44, Alexander Leidinger wrote: > Quoting Kristof Provost (from Mon, 28 Sep 2020 = > 13:53:16 +0200): > >> On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: >>> Quoting Kristof Provost (from Sun, 27 Sep 2020 = >>> 17:51:32 +0200): >>>> Here=E2=80=99s an early version of a task queue based approach: = >>>> http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-= sleep.patch >>>> >>>> That still needs to be cleaned up, but this should resolve the = >>>> sleep issue and the LOR. >>> >>> There are some issues... seems like inside a jail I can't ping = >>> systems outside of the hardware. >>> >>> Bridge setup: >>> - member jail A >>> - member jail B >>> - member external_if of host >>> >>> If I ping the router from the host, it works. If I ping from one = >>> jail to another, it works. If I ping from the jail to the IP of the = >>> external_if, it works. If I ping from a jail to the router, I do not = >>> get a response. >>> >> Can you check for 'failed ifpromisc' error messages in dmesg? And = >> verify that all bridge member interfaces are in promiscuous mode? > > I have a panic for you...: > - startup still in progress =3D 22 jails in startup, somewhere after a= = > few jails started the panic happened > - tcpdump was running on the external interface > - a ping to a jail IP from another system was running, the first ping = > went through, then it paniced > > First regarding your questions about promisc mode: no error, but the = > promisc mode is directly disabled again on all interfaces. > I think I see why you had issues with the promiscuous setting. I=E2=80=99= ve = updated the patch to be even more horrific than it was before. I can=E2=80=99t explain the panic, and the backtrace also doesn=E2=80=99t= appear to = be directly related to this patch. Not sure what=E2=80=99s going on with = that. Krsitof From owner-freebsd-current@freebsd.org Tue Sep 29 21:36:19 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 949FC3F1288 for ; Tue, 29 Sep 2020 21:36:19 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1CPZ2tpzz4JPy for ; Tue, 29 Sep 2020 21:36:18 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-qk1-x733.google.com with SMTP id w12so6006781qki.6 for ; Tue, 29 Sep 2020 14:36:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=91r0gpIYrhz6v2L9FwevLnM6xw7Ue+AmXm77eQ+ce0c=; b=mF0QITUzW0xRWEFrg4/W49jYwuRGghfA/yGhZekMi05gwKz+jWLkUzhl5u39ZQQJf7 GoDpo2Dt/QcjQfDRh9hmVHR3dCUSuySFZM3b/adfhrZY6TQu8GsgWtcUheOn4ZEkV0Gu oG2R8Nb3OV1zB9bNFIzXO+yU415gIzVxIk0rmciRQpnmofF6KulyXV7pMgBG01bBJv8i b2Z3Krc2DHOEhRQxaTgT06jaHmZsLLLL/DQZpvbtiQ2XqqViawF8T3hbXKWxmz+f6xjs aAPpyC2DnAkSizFDqeMp0H2QyoXteY1Y91JPZT9zAFEEJZ9EuoklOpRxHeFJ1bq3Pf0i u5EA== X-Gm-Message-State: AOAM5335jKIfLyCXbg816sY3Js4uzvr+6H/LLEp35HNDLnw5ep+asHgR 3+hCkHOKiEH5CaV0VlPc7x72Sw== X-Google-Smtp-Source: ABdhPJwB5gv1TUxTO6361fGche3hvMrvjFN3u7IfXOzyYqRzser9jP4gNTcf1BtQ6hwwX/ln6gZNWw== X-Received: by 2002:a05:620a:2055:: with SMTP id d21mr6710905qka.202.1601415377215; Tue, 29 Sep 2020 14:36:17 -0700 (PDT) Received: from mutt-hbsd (pool-100-16-222-53.bltmmd.fios.verizon.net. [100.16.222.53]) by smtp.gmail.com with ESMTPSA id q6sm6007853qkc.85.2020.09.29.14.36.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Sep 2020 14:36:16 -0700 (PDT) Date: Tue, 29 Sep 2020 17:36:15 -0400 From: Shawn Webb To: Kristof Provost Cc: Alexander Leidinger , FreeBSD Current Subject: Re: iflib/bridge kernel panic Message-ID: <20200929213615.5gpupobj2ylgv2yr@mutt-hbsd> X-Operating-System: FreeBSD mutt-hbsd 13.0-CURRENT-HBSD FreeBSD 13.0-CURRENT-HBSD X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0xFF2E67A277F8E1FA References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="z6mdqzawej7d7qnq" Content-Disposition: inline In-Reply-To: <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> X-Rspamd-Queue-Id: 4C1CPZ2tpzz4JPy X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.60 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[hardenedbsd.org:s=google]; NEURAL_HAM_MEDIUM(-1.02)[-1.025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; NEURAL_HAM_LONG(-1.02)[-1.025]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[hardenedbsd.org]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[hardenedbsd.org:+]; NEURAL_HAM_SHORT(-0.45)[-0.454]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::733:from]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[100.16.222.53:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 21:36:19 -0000 --z6mdqzawej7d7qnq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Sep 29, 2020 at 11:20:44PM +0200, Kristof Provost wrote: >=20 >=20 > On 28 Sep 2020, at 16:44, Alexander Leidinger wrote: >=20 > > Quoting Kristof Provost (from Mon, 28 Sep 2020 13:53:16 > > +0200): > >=20 > > > On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: > > > > Quoting Kristof Provost (from Sun, 27 Sep 2020 > > > > 17:51:32 +0200): > > > > > Here???s an early version of a task queue based approach: http://= people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-sleep.patch > > > > >=20 > > > > > That still needs to be cleaned up, but this should resolve > > > > > the sleep issue and the LOR. > > > >=20 > > > > There are some issues... seems like inside a jail I can't ping > > > > systems outside of the hardware. > > > >=20 > > > > Bridge setup: > > > > - member jail A > > > > - member jail B > > > > - member external_if of host > > > >=20 > > > > If I ping the router from the host, it works. If I ping from one > > > > jail to another, it works. If I ping from the jail to the IP of > > > > the external_if, it works. If I ping from a jail to the router, > > > > I do not get a response. > > > >=20 > > > Can you check for 'failed ifpromisc' error messages in dmesg? And > > > verify that all bridge member interfaces are in promiscuous mode? > >=20 > > I have a panic for you...: > > - startup still in progress =3D 22 jails in startup, somewhere after a > > few jails started the panic happened > > - tcpdump was running on the external interface > > - a ping to a jail IP from another system was running, the first ping > > went through, then it paniced > >=20 > > First regarding your questions about promisc mode: no error, but the > > promisc mode is directly disabled again on all interfaces. > >=20 > I think I see why you had issues with the promiscuous setting. I???ve > updated the patch to be even more horrific than it was before. >=20 > I can???t explain the panic, and the backtrace also doesn???t appear to be > directly related to this patch. Not sure what???s going on with that. I should have time to test the new patch this weekend. ${LIFE} is keeping me busy the past few weeks. I'm gonna add an event in my calendar to remind me to test the patch. heh. Thanks, --=20 Shawn Webb Cofounder / Security Engineer HardenedBSD GPG Key ID: 0xFF2E67A277F8E1FA GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9 3633 C85B 0AF8 AB23 0FB2 https://git-01.md.hardenedbsd.org/HardenedBSD/pubkeys/src/branch/master/Sha= wn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc --z6mdqzawej7d7qnq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEA6TL67gupaZ9nzhT/y5nonf44foFAl9zqM0ACgkQ/y5nonf4 4fq5zg/+JM3ycYLRr82nQEaG1ihREiR6hVuXfuq3mpTIOqPVbqQ6r58lJK4+1DaI SkXMtJ92hS3rxS0mn6ORD782YHBTI6RAi0UPpGpj7OkVjj/nFgag4rP4+1Z4qF0X vFr7s0v/DffZFr1nJRJ6d5Yg9zXz5hp/VPIY6yDetfjxNQ38TVH7Kbaxtst7QgRZ XvCVtBAxOXZBRrkBK5ABdNHc1HszPLJYbR1BwNQp4PNXSWDRFVX04GOA1t/LHXEA s00d35Bw2Xw2boW+gy+zSZqrA3N/5vMO8fCtooswoZIi104+JJckUAtDgmwo9gL0 0YguM0sUcjWcj9zg8Q4RThdckqA6diHgDwHLHPOI+z7y+PY6Zy6SHIatKKfZORw2 wLmpr8BNQdF+5XqqsGZBW6QQBXZuY6F652LG//Li1oGVKAizhdIWfOOxFDP0YSzg lE0IVKiN5uMXqHwllDSmwQFWPGT9sBh8C0/lW9oXj9j1KqCDsZ84caOfnb16oDMx fnpl4akctu88JSWSPzQFD72wmiOyiAfvtsYpSKjPvJQMOiCurlnRAh8rRmmIbFhA J8ylgE8e9+PxPk3Tb6o0nhMYu3wTQoV0MthInSX8BC7t7bs2UpVrH1eie39s0xgf zJu+DTwuUMgXfIRo3q0FbVywBIH5FE3bHR2tg4/qK3YjfenBEQE= =iXps -----END PGP SIGNATURE----- --z6mdqzawej7d7qnq-- From owner-freebsd-current@freebsd.org Tue Sep 29 23:49:37 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 135593F48CF for ; Tue, 29 Sep 2020 23:49:37 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from mail.nomadlogic.org (mail.nomadlogic.org [174.136.98.114]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.nomadlogic.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1GMM5jyvz4R1b for ; Tue, 29 Sep 2020 23:49:35 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from [192.168.1.160] (cpe-23-243-161-111.socal.res.rr.com [23.243.161.111]) by mail.nomadlogic.org (OpenSMTPD) with ESMTPSA id 057fb097 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO); Tue, 29 Sep 2020 23:49:33 +0000 (UTC) Subject: Re: second ZFS pool no longer auto-imports To: xtouqh@hotmail.com, FreeBSD Current References: <8350a33a-12ff-366d-8eab-d82b891e6291@nomadlogic.org> From: Pete Wright Message-ID: <8cbd92d3-d85c-967b-62e9-eee6c340ea37@nomadlogic.org> Date: Tue, 29 Sep 2020 16:49:32 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.3.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 4C1GMM5jyvz4R1b X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.30 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.01)[-1.005]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[nomadlogic.org]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.12)[-0.118]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_MEDIUM(-0.87)[-0.873]; FREEMAIL_TO(0.00)[hotmail.com,freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:25795, ipnet:174.136.96.0/20, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[23.243.161.111:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Sep 2020 23:49:37 -0000 On 9/29/20 1:53 PM, xtouqh@hotmail.com wrote: > Pete Wright wrote: >> Hello, >> I have a workstation with two ZFS pools (zroot and tank0). After >> upgrading CURRENT post the OpenZFS merge I have found that my tank0 >> pool no longer auto-imports on boot.  After the system has booted I >> am able to import it via "zpool import tank0" then mount all of its >> filesystems without issues or errors.  I've also run a scrub on the >> pool and no issues were identified their either. >> >> I've also been careful to *not* run "zpool upgrade" on this system as >> my zroot is geli encrypted, and have been waiting for the all clear >> to do that. >> >> Has anyone else noticed this behavior?  Perhaps I'm missing an option >> or something - kinda confused here as to what may have changed to >> cause this to happen. > > Check /usr/src/UPDATING, 20200824 entry. thank-you!  I had read that entry but obviously skipped over the last paragraph, sorry for the noise. cheers, -pete -- Pete Wright pete@nomadlogic.org @nomadlogicLA From owner-freebsd-current@freebsd.org Wed Sep 30 09:56:23 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 45C06422D0A; Wed, 30 Sep 2020 09:56:23 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1WqW17k9z42Nn; Wed, 30 Sep 2020 09:56:23 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1129) id 0EC3EBC6F; Wed, 30 Sep 2020 09:56:23 +0000 (UTC) Date: Wed, 30 Sep 2020 09:56:22 +0000 From: Li-Wen Hsu To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD CI Weekly Report 2020-09-20 Message-ID: <20200930095622.GA64665@freefall.freebsd.org> Reply-To: freebsd-testing@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1601459783; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type; bh=d4WKb1y2v4MiYufCwhsTIlqIRXTGRK//NJEKm2vv91c=; b=jXdll9czSxovdFzjM3ENC03gBRkPQLetx71wCDP+U2wnNmYD9IqpP1ZNLlD3mJnnRdH2EU ST8yXE+2EU4EKA/1M/OgniCEfnTkAtKQlTUt12LHkxN6HZ/VeBvCMuzwCww808DLnBgPfm oWGx9XFCt5mvJ+D+zirwrnMIEHSBlQl2r0wEyH9ZFbRVIEy5qEmsHkFMRFoCR7VbZyKfSf qfXnKn25QbFqKC0HvirEr0iBrJ+W9EXBKCi2Q6mAzW9cd4xs1qxWEc8/MY3IPKLXgrbrhR Ht8H8O7j/3SRvJXn8f5S0TboGiBurTO81FVJcsmfDWxw46LlnxaM8Cx6D+J1kw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1601459783; a=rsa-sha256; cv=none; b=tfS+Fk12rTJNAeKIxBXzQy/hk+22J6IYQ8m5P6FY8SNpWLWXVj901sQcPoHX/+5kPQTbfQ DHm5kgcQ3UZwt0IvtheS1ZuIZouEujPRqRIJ8VHNM0cutqk+QzMTgkX4k2oOrq4BijJPui bTpYH5pBs1IPlKL7UWHPMVEOc09h93FH1C2D6XnYYp49GwnQUbagFBpW4LXpRu0vDneqTX 3uyx71Rfra21ZxXFyI1Vt3pqfSWqPYmKeB8ymzllEI5FlQMCMWpcit6vSVgWaeBaJhTPCD myWBLoKq86rjEH6Bcsvaj/eUCFh3oH/k6UWNA7Kv+WkIE2/YEnpMnduCMbhEZg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2020 09:56:23 -0000 FreeBSD CI Weekly Report 2020-09-20 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2020-09-14 to 2020-09-20. During this period, we have: * 2056 builds (95.5% (+1.5) passed, 4.5% (-1.5) failed) of buildworld and buildkernel (GENERIC and LINT) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 246 test runs (62.6% (-25.2) passed, 37.0% (+27.2) unstable, 0.4% (-2.0) exception) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 50 doc and www builds (100% passed) Test case status (on 2020-09-20 23:59): | Branch/Architecture | Total | Pass | Fail | Skipped | | ------------------- | ---------- | --------- | ------ | --------- | | head/amd64 | 7894 (+13) | 7789 (-2) | 6 (+6) | 99 (+9) | | head/i386 | 7892 (+13) | 7767 (-4) | 6 (+6) | 119 (+11) | | 12-STABLE/amd64 | 7628 (+2) | 7570 (+1) | 1 (+1) | 57 (0) | | 12-STABLE/i386 | 7626 (+2) | 7560 (+4) | 1 (+1) | 65 (-3) | | 11-STABLE/amd64 | 6912 (0) | 6861 (0) | 0 (0) | 51 (0) | | 11-STABLE/i386 | 6910 (0) | 6857 (0) | 0 (0) | 53 (0) | (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/@FreeBSD-CI/report-20200920 and archive is available at https://hackmd.io/@FreeBSD-CI/ , any help is welcomed. ## Failed and fixed test cases * sys.fs.tmpfs.times_test.{empty,non_empty} https://bugs.freebsd.org/249362 * sys.posixshm.posixshm_test.* https://bugs.freebsd.org/249417 ## Failing test cases ### HEAD * sys.kern.coredump_phnum_test.coredump_phnum * usr.bin.procstat.procstat_test.binary_info * usr.bin.procstat.procstat_test.command_line_arguments * usr.bin.procstat.procstat_test.environment * usr.bin.procstat.procstat_test.file_descriptor * usr.bin.procstat.procstat_test.kernel_stacks (Fixed in https://svnweb.freebsd.org/changeset/base/366237 on 2020-09-29) ### 12-STABLE * sys.opencrypto.runtests.main Not fully migrated to python3 https://bugs.freebsd.org/237403 ## Failing jobs * https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc6_build/ There are still mutiple errors when building with gcc6, error log available at https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc6_build/lastCompletedBuild/console See also: https://lists.freebsd.org/pipermail/svn-src-all/2020-September/202307.html ## Regressions * lib.libexecinfo.backtrace_test.backtrace_fmt_basic starts failing on amd64 after r360915 https://bugs.freebsd.org/246537 * lib.msun.ctrig_test.test_inf_inputs starts failing after llvm10 import https://bugs.freebsd.org/244732 Needs to check if llvm11 import fixes this. * Lock-order reversals triggered by tests under sys.net.if_lagg_test.* on i386 https://bugs.freebsd.org/244163 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) * sys.net.if_lagg_test.lacp_linkstate_destroy_stress panics i386 kernel https://bugs.freebsd.org/244168 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) Fix committed as https://svnweb.freebsd.org/changeset/base/364220 , needs more verification. * lib.libbe.be_create.* and sbin.bectl.bectl_test.* https://bugs.freebsd.org/249055 & https://bugs.freebsd.org/249229 OpenZFS' zfs.ko can't be loaded in non-64bit platforms ## Failing and Flaky tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * cddl.usr.sbin.dtrace.common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237641 * common.ip.t_dtrace_contrib.tst_ipv4localsctp_ksh * common.ip.t_dtrace_contrib.tst_localsctpstate_ksh * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * Total 681 tests, 524 success, 47 failures, 110 skipped, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_ltp/ * Total 3749 tests, 2289 success, 647 failures, 813 skipped ## Disabled Tests * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * sys.kern.ptrace_test.ptrace__PT_KILL_competing_stop https://bugs.freebsd.org/220841 * lib.libc.regex.exhaust_test.regcomp_too_big (i386 only) https://bugs.freebsd.org/237450 * sys.netinet.socket_afinet.socket_afinet_bind_zero https://bugs.freebsd.org/238781 * sys.netpfil.pf.names.names * sys.netpfil.pf.synproxy.synproxy https://bugs.freebsd.org/238870 Workaround committed and need to verify. * sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger https://bugs.freebsd.org/239292 * sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger https://bugs.freebsd.org/239397 * sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger https://bugs.freebsd.org/239399 * sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger https://bugs.freebsd.org/239425 * sys.sys.qmath_test.qdivq_s64q https://bugs.freebsd.org/240219 * sys.kern.ptrace_test.ptrace__getppid https://bugs.freebsd.org/240510 * lib.libc.sys.stat_test.stat_socket https://bugs.freebsd.org/240621 * lib.libarchive.functional_test.test_write_filter_zstd https://bugs.freebsd.org/240683 * lib.libcasper.services.cap_dns.dns_test.main lib.libcasper.services.cap_net.net_test.* https://bugs.freebsd.org/241435 * local.kyua.* (31 cases) & local.lutok.* (3 cases) on 11-i386 https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/2278/testReport/ * sys.kern.ptrace_test.ptrace__procdesc_reparent_wait_child https://bugs.freebsd.org/243605 * sys.kern.ptrace_test.ptrace__parent_wait_after_attach https://bugs.freebsd.org/244055 * sys.kern.ptrace_test.ptrace__parent_exits_before_child https://bugs.freebsd.org/244056 * sys.net.if_lagg_test.witness (i386) https://bugs.freebsd.org/244163 * PipePdfork.WildcardWait in sys.capsicum.capsicum-test.main https://bugs.freebsd.org/244165 * sys.net.if_lagg_test.lacp_linkstate_destroy_stress (i386) https://bugs.freebsd.org/244168 * sys.netinet6.frag6.frag6_07.frag6_07 https://bugs.freebsd.org/244170 * sys.netinet.fibs_test.udp_dontroute6 https://bugs.freebsd.org/244172 * sys.netpfil.pf.nat.exhaust https://bugs.freebsd.org/244703 Workaround committed and need to verify. * sys.geom.class.gate.ggate_test.ggated (i386) https://bugs.freebsd.org/244737 * sys.kern.sysv_test.msg https://bugs.freebsd.org/233649 ## Issues ### Cause build fails * https://bugs.freebsd.org/233769 Possible build race: ld: error: unable to find library -lgcc_s ### Cause kernel panics * https://bugs.freebsd.org/238870 sys.netpfil.pf.names.names and sys.netpfil.pf.synproxy.synproxy cause panic ### Open * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/238781 sys.netinet.socket_afinet.socket_afinet_bind_zero does not work when mac_portacl(4) loaded * https://bugs.freebsd.org/239292 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger * https://bugs.freebsd.org/239397 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger * https://bugs.freebsd.org/239399 Flakey test case: sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger * https://bugs.freebsd.org/239425 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger * https://bugs.freebsd.org/241662 Flakey test case: lib.libarchive.functional_test.test_fuzz_iso9660 * https://bugs.freebsd.org/246443 sys.net.if_clone_test.epair_stress sometimes exceeds timeout limit but not caught by kyua * https://bugs.freebsd.org/247510 sys.net.if_lagg_test.status_stress panics kernel on i386 ### Others * [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) From owner-freebsd-current@freebsd.org Wed Sep 30 09:57:26 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AF9C4423030; Wed, 30 Sep 2020 09:57:26 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1Wrk4FWHz42hd; Wed, 30 Sep 2020 09:57:26 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1129) id 79DD4C08C; Wed, 30 Sep 2020 09:57:26 +0000 (UTC) Date: Wed, 30 Sep 2020 09:57:26 +0000 From: Li-Wen Hsu To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD CI Weekly Report 2020-09-27 Message-ID: <20200930095726.GB64665@freefall.freebsd.org> Reply-To: freebsd-testing@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1601459846; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type; bh=1Xl3rha4O1noqImrPu9fMkJVfstb45OmjaGfAiqrDWE=; b=FD24EF5Im/aR6WtYMxcZGac/wBmkUbu3PijEw0Ih+yCrTv0c8xxLbE0NQxDzTJDxNvTR1E 3mhbpKhdGdmgivTsIKfyaVWrnIvwDv7JPd63HScaB8BKU1BDBp7z+VjXCws1w/wciLsEf/ o6TJUpDweYqZT8OMcnXfyiaAoxzBGIHUMQlGRMVpRRueN0p54JRZapF2XvIdUrCf0wIYX4 Kyrs+7yxLzI3E4d8HcefFEi/39iLNGC4N0cgo4WvhZCQmUrMg7Z1UnTopNIZUO9HMEjbBT NUxiDMT5dU+Xe4ugtgHGGRZFg4GlgcXrq/9pUHchRU/AOKu5P5vyirYChUPa8g== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1601459846; a=rsa-sha256; cv=none; b=v8Ftx+hzQZsVZp814mKc3bzQirUdIlztucqbqWUcHI0J6t1kAaUnk/z6+jBm+xK4YJNvF/ Pe51xz4wy9wPuKXLR1/qjtMBVAERknQwHiNrZXJZQBtLOASxgemT2uujxQk9tTbwTdDjvV CN/bt8NienIonRSsN1j1f/W9dwb0sazTK/Fxlc6STKQ+RjLM/wUBhi+v/kQYk5s7OHmQp7 2koYdBbWHBHExrpyjql+4WrrvqZt7lgeVd6mtXV4OXe+d0PmrVSvwkVIdEMUzQkd7ZBs0K +pQ5AJVphUuGPZqWSkRK7F3kER1ZvsOVwbGyUG2SPAVwBarIjb2WLzIuhfw/Xw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2020 09:57:26 -0000 FreeBSD CI Weekly Report 2020-09-27 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2020-09-21 to 2020-09-27. During this period, we have: * 2211 builds (93.7% (-1.8) passed, 6.3% (+1.8) failed) of buildworld and buildkernel (GENERIC and LINT) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 268 test runs (20.1% (-42.5) passed, 78.8% (+41.8) unstable, 1.1% (+0.7) exception) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 50 doc and www builds (100% passed) Test case status (on 2020-09-27 23:59): | Branch/Architecture | Total | Pass | Fail | Skipped | | ------------------- | --------- | --------- | ------ | -------- | | head/amd64 | 7896 (+2) | 7787 (-2) | 7 (+1) | 102 (+3) | | head/i386 | 7894 (+2) | 7768 (+1) | 7 (+1) | 119 (0) | | 12-STABLE/amd64 | 7628 (0) | 7562 (-8) | 6 (+5) | 60 (+3) | | 12-STABLE/i386 | 7626 (0) | 7555 (-5) | 6 (+5) | 65 (0) | | 11-STABLE/amd64 | 6912 (0) | 6858 (-3) | 0 (0) | 54 (+3) | | 11-STABLE/i386 | 6910 (0) | 6857 (0) | 0 (0) | 53 (0) | (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/@FreeBSD-CI/report-20200927 and archive is available at https://hackmd.io/@FreeBSD-CI/ , any help is welcomed. ## News * !x86 tests running in QEMU are configured to run once a day: * https://ci.freebsd.org/job/FreeBSD-head-aarch64-test/ * https://ci.freebsd.org/job/FreeBSD-head-armv7-test/ * https://ci.freebsd.org/job/FreeBSD-head-mips64-test/ * https://ci.freebsd.org/job/FreeBSD-head-powerpc64-test/ * https://ci.freebsd.org/job/FreeBSD-head-riscv64-test/ ## Fixed test cases ### 12-STABLE * sys.opencrypto.runtests.main Fixed in r366010 and r366073 https://bugs.freebsd.org/237403 ## Failing test cases ### HEAD * sys.capsicum.capsicum-test.main https://bugs.freebsd.org/249960 * OpenatTest.WithFlag * ForkedOpenatTest_WithFlagInCapabilityMode._ ### HEAD / 12-STABLE * sys.kern.coredump_phnum_test.coredump_phnum * usr.bin.procstat.procstat_test.binary_info * usr.bin.procstat.procstat_test.command_line_arguments * usr.bin.procstat.procstat_test.environment * usr.bin.procstat.procstat_test.file_descriptor * usr.bin.procstat.procstat_test.kernel_stacks (Fixed in https://svnweb.freebsd.org/changeset/base/366237 on 2020-09-29) ## Failing jobs * https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc6_build/ There are still mutiple errors when building with gcc6, error log available at https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc6_build/lastCompletedBuild/console See also: https://lists.freebsd.org/pipermail/svn-src-all/2020-September/202307.html ## Regressions * lib.libexecinfo.backtrace_test.backtrace_fmt_basic starts failing on amd64 after r360915 https://bugs.freebsd.org/246537 * lib.msun.ctrig_test.test_inf_inputs starts failing after llvm10 import https://bugs.freebsd.org/244732 Needs to check if llvm11 import fixes this. * Lock-order reversals triggered by tests under sys.net.if_lagg_test.* on i386 https://bugs.freebsd.org/244163 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) * sys.net.if_lagg_test.lacp_linkstate_destroy_stress panics i386 kernel https://bugs.freebsd.org/244168 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) Fix committed as https://svnweb.freebsd.org/changeset/base/364220 , needs more verification. * lib.libbe.be_create.* and sbin.bectl.bectl_test.* https://bugs.freebsd.org/249055 & https://bugs.freebsd.org/249229 OpenZFS' zfs.ko can't be loaded in non-64bit platforms ## Failing and Flaky tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * cddl.usr.sbin.dtrace.common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237641 * common.ip.t_dtrace_contrib.tst_ipv4localsctp_ksh * common.ip.t_dtrace_contrib.tst_localsctpstate_ksh * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * Total 681 tests, 524 success, 47 failures, 110 skipped, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_ltp/ * Total 3749 tests, 2289 success, 647 failures, 813 skipped ## Disabled Tests * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * sys.kern.ptrace_test.ptrace__PT_KILL_competing_stop https://bugs.freebsd.org/220841 * lib.libc.regex.exhaust_test.regcomp_too_big (i386 only) https://bugs.freebsd.org/237450 * sys.netinet.socket_afinet.socket_afinet_bind_zero https://bugs.freebsd.org/238781 * sys.netpfil.pf.names.names * sys.netpfil.pf.synproxy.synproxy https://bugs.freebsd.org/238870 Workaround committed and need to verify. * sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger https://bugs.freebsd.org/239292 * sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger https://bugs.freebsd.org/239397 * sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger https://bugs.freebsd.org/239399 * sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger https://bugs.freebsd.org/239425 * sys.sys.qmath_test.qdivq_s64q https://bugs.freebsd.org/240219 * sys.kern.ptrace_test.ptrace__getppid https://bugs.freebsd.org/240510 * lib.libc.sys.stat_test.stat_socket https://bugs.freebsd.org/240621 * lib.libarchive.functional_test.test_write_filter_zstd https://bugs.freebsd.org/240683 * lib.libcasper.services.cap_dns.dns_test.main lib.libcasper.services.cap_net.net_test.* https://bugs.freebsd.org/241435 * local.kyua.* (31 cases) & local.lutok.* (3 cases) on 11-i386 https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/2278/testReport/ * sys.kern.ptrace_test.ptrace__procdesc_reparent_wait_child https://bugs.freebsd.org/243605 * sys.kern.ptrace_test.ptrace__parent_wait_after_attach https://bugs.freebsd.org/244055 * sys.kern.ptrace_test.ptrace__parent_exits_before_child https://bugs.freebsd.org/244056 * sys.net.if_lagg_test.witness (i386) https://bugs.freebsd.org/244163 * PipePdfork.WildcardWait in sys.capsicum.capsicum-test.main https://bugs.freebsd.org/244165 * sys.net.if_lagg_test.lacp_linkstate_destroy_stress (i386) https://bugs.freebsd.org/244168 * sys.netinet6.frag6.frag6_07.frag6_07 https://bugs.freebsd.org/244170 * sys.netinet.fibs_test.udp_dontroute6 https://bugs.freebsd.org/244172 * sys.netpfil.pf.nat.exhaust https://bugs.freebsd.org/244703 Workaround committed and need to verify. * sys.geom.class.gate.ggate_test.ggated (i386) https://bugs.freebsd.org/244737 * sys.kern.sysv_test.msg https://bugs.freebsd.org/233649 ## Issues ### Cause build fails * https://bugs.freebsd.org/233769 Possible build race: ld: error: unable to find library -lgcc_s ### Cause kernel panics * https://bugs.freebsd.org/238870 sys.netpfil.pf.names.names and sys.netpfil.pf.synproxy.synproxy cause panic ### Open * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/238781 sys.netinet.socket_afinet.socket_afinet_bind_zero does not work when mac_portacl(4) loaded * https://bugs.freebsd.org/239292 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger * https://bugs.freebsd.org/239397 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger * https://bugs.freebsd.org/239399 Flakey test case: sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger * https://bugs.freebsd.org/239425 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger * https://bugs.freebsd.org/241662 Flakey test case: lib.libarchive.functional_test.test_fuzz_iso9660 * https://bugs.freebsd.org/246443 sys.net.if_clone_test.epair_stress sometimes exceeds timeout limit but not caught by kyua * https://bugs.freebsd.org/247510 sys.net.if_lagg_test.status_stress panics kernel on i386 ### Others * [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) From owner-freebsd-current@freebsd.org Wed Sep 30 11:52:56 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 320C1425B75 for ; Wed, 30 Sep 2020 11:52:56 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (mailgate.leidinger.net [IPv6:2a00:1828:2000:313::1:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1ZPz068qz4Bfn; Wed, 30 Sep 2020 11:52:54 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5b165146.dip0.t-ipconnect.de [91.22.81.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 1396829A6; Wed, 30 Sep 2020 13:52:45 +0200 (CEST) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 4F7377482; Wed, 30 Sep 2020 13:52:26 +0200 (CEST) Date: Wed, 30 Sep 2020 13:52:25 +0200 Message-ID: <20200930135225.Horde.nVCxwqfnkoJfolbDU0hqqXf@webmail.leidinger.net> From: Alexander Leidinger To: Kristof Provost Cc: Shawn Webb , FreeBSD Current Subject: Re: iflib/bridge kernel panic References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> In-Reply-To: <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> Accept-Language: de,en Content-Type: multipart/signed; boundary="=_1uAUeyzQyrPQ04N48YH6bX_"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 4C1ZPz068qz4Bfn X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.09 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-1.01)[-1.015]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-0.98)[-0.980]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; NEURAL_SPAM_SHORT(0.01)[0.007]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:2a00:1828::/32, country:DE]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[91.22.81.70:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2020 11:52:56 -0000 This message is in MIME format and has been PGP signed. --=_1uAUeyzQyrPQ04N48YH6bX_ Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Kristof Provost (from Tue, 29 Sep 2020=20=20 23:20:44=20+0200): > On 28 Sep 2020, at 16:44, Alexander Leidinger wrote: > >> Quoting Kristof Provost (from Mon, 28 Sep 2020=20=20 >>=2013:53:16 +0200): >> >>> On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: >>>> Quoting Kristof Provost (from Sun, 27 Sep 2020=20=20 >>>>=2017:51:32 +0200): >>>>> Here=E2=80=99s an early version of a task queue based approach:=20=20 >>>>>=20http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that= -sleep.patch >>>>> >>>>> That still needs to be cleaned up, but this should resolve the=20=20 >>>>>=20sleep issue and the LOR. >>>> >>>> There are some issues... seems like inside a jail I can't ping=20=20 >>>>=20systems outside of the hardware. >>>> >>>> Bridge setup: >>>> - member jail A >>>> - member jail B >>>> - member external_if of host >>>> >>>> If I ping the router from the host, it works. If I ping from one=20=20 >>>>=20jail to another, it works. If I ping from the jail to the IP of=20= =20 >>>>=20the external_if, it works. If I ping from a jail to the router, I=20= =20 >>>>=20do not get a response. >>>> >>> Can you check for 'failed ifpromisc' error messages in dmesg? And=20=20 >>>=20verify that all bridge member interfaces are in promiscuous mode? >> >> I have a panic for you...: >> - startup still in progress =3D 22 jails in startup, somewhere after=20= =20 >>=20a few jails started the panic happened >> - tcpdump was running on the external interface >> - a ping to a jail IP from another system was running, the first=20=20 >>=20ping went through, then it paniced >> >> First regarding your questions about promisc mode: no error, but=20=20 >>=20the promisc mode is directly disabled again on all interfaces. >> > I think I see why you had issues with the promiscuous setting. I=E2=80=99= ve=20=20 >=20updated the patch to be even more horrific than it was before. Hmmm.... same behavior as before. I haven't kept the old version of the patch, so I can't compare if I=20=20 somehow=20downloaded the old version again, or if I got the updated one... # md5 0001-bridge-Cope-with-if_ioctl-s-that-sleep.patch MD5 (0001-bridge-Cope-with-if_ioctl-s-that-sleep.patch) =3D=20=20 9f107739e29fad5c9bb5e75e2dae7bcc >=20I can=E2=80=99t explain the panic, and the backtrace also doesn=E2=80= =99t appear to=20=20 >=20be directly related to this patch. Not sure what=E2=80=99s going on wit= h that. Then let's hope for now it is some kind of defect which is not showing=20= =20 up=20when it works as it should... we can have a look at it again in=20=20 case=20it reproduces with the final patch. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_1uAUeyzQyrPQ04N48YH6bX_ Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJfdHF5AAoJEBINsJsD+NiGBQsP/2K1tZOhSU+WVhVE+HHINFjx 4LCV6Ee8leUtPG4oMpWcSB22rO8sgGqidG8VAl0zpM2NPBDUTV6+DFtJC7lLgy5h WIl3W9vLE9andH5qDXKf1qFiFLW4FvyfPI0Z9HGhXboIOqd1ANAMC9ompwQvGZSi LIAlDp9fss7vWTk7nmXCQ9HnblROue4UYsKQP+Q4YmZfTfL1ByULuGuATC4GbEfb hPamlMuioKbOWxpvzMdZ321AU5IuPoDEpu3AneAZ+UmbwTtlDnGWG1gbM4F3VKgx uy4WjHE672lcPdzWRFNYUmR5lmIVOLZ9KCf2Wfk1D9ojJwU4+2CCZJfZGGEyubdo tGkxy4bUx2/mCbwR2SizAnevYpSFwkLXWGMLQMa6oFPstHEb+Bir1rO8bDgaqu7n GuujmbMUnl468snxWc/BZiuNwB3jGcmqr37StIi/5igl4RuFTzkEQYojCm+F+txs inI2Ir3A1wjeOCwR2ISN4hnhuOwIVvFrjeEwnTP1R0mnPH49rlijQjVzynojfXjZ GIDrRmCLRsivKzpHCyqK9gABcqlkD8tPlyvroeBpX5/J4Yt85kvDDxFiY+llvFY8 sj2uQHsxNMZh/JCoJ2LwCMpxwoIFp1yEOrX7RIX3SjCC3NcWwGJLlWfhodKe8vLV mu1Uu4AGjP1CMALDH0JD =zDy6 -----END PGP SIGNATURE----- --=_1uAUeyzQyrPQ04N48YH6bX_-- From owner-freebsd-current@freebsd.org Wed Sep 30 20:43:46 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D48764303EB for ; Wed, 30 Sep 2020 20:43:46 +0000 (UTC) (envelope-from admin@freebsd.org) Received: from serve0.tzeng-shying.com (ns1.tzeng-shying.com [192.129.175.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C1pBV3VVhz3Wrl for ; Wed, 30 Sep 2020 20:43:46 +0000 (UTC) (envelope-from admin@freebsd.org) From: Email Gateway Security To: freebsd-current@freebsd.org Subject: Subject: Important update for freebsd-current@freebsd.org: Please see transcript for details. Date: 30 Sep 2020 16:42:12 -0400 Message-ID: <20200930164212.82CD402DF7C7AB2D@freebsd.org> X-Rspamd-Queue-Id: 4C1pBV3VVhz3Wrl X-Spamd-Bar: / X-Spamd-Result: default: False [0.00 / 15.00]; ASN(0.00)[asn:54290, ipnet:192.129.175.0/24, country:US]; local_wl_from(0.00)[freebsd.org] MIME-Version: 1.0 Content-Type: text/plain X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2020 20:43:46 -0000 From owner-freebsd-current@freebsd.org Fri Oct 2 04:25:15 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 973743F54F1; Fri, 2 Oct 2020 04:25:15 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-qb1can01on0616.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5c::616]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C2cNV2cwTz46lM; Fri, 2 Oct 2020 04:25:13 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=l07uyznkvUjREQ7PYIne+S16X2pQnG0HK/4WyRyTQhVEXBMWmdeUyTe/jjHSWkh335g6DvEurKCEqo4LKH5Ey5zyfUgNUgL4zuM7eZioynUS0nQb8pXZ4vsB5zuwLo9K6rdn6NzldCBDFuxMAKn/GXXSef2eB5t/VZkjZWdTLnT8P+4E5N6eep6AYifjNdcBhLkUCbd3czZSoIjEVUlFwLAqCuYHYYhlNQBkfaPSJ+TbmvvqxmexWb2Jo/kuDiSiA+0AnHBMqsZXZ4SRado38bbehpwK6gluo1RUQ4H/NlDfhSuzSJqU4XEaqRuh8aKCh98RDBcSkorrUyvlgs43hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jg4YNQMy554FWRZJQma1s496zGXbeUsGCi5dTZyESFM=; b=gATcj4ldM1WNcH5vh2VfWLy2MnQdDWJKbPUeiExV3+nmcCjYDvtLq2ldhpCvd2BxJFEiWJALHXWckGcyFfIoTginDt+yadWlJIBVyORu2neNniM9J9EciMRgMP7ITCvahexD5YkDYHEtZT2OAArkDbqMEFyCQTNuVg6vIK4uM18YggwbLBCObvR2cNJ41oRE02TCiboqglAxd4B/f4ZA+CpI+anzey4F8KFVV15h415f2neOqKZi8ouQlHswk9gYUBl1ZO+hs1/UzWuz7pCwLnw0qF9FUemfTQX8hxfjEvLHathLVTLPkHHZasyAF93gQ0eFXnngPIRHQXRfaI410g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none Received: from YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:24::27) by YT1PR01MB2426.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:3::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.38; Fri, 2 Oct 2020 04:25:10 +0000 Received: from YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM ([fe80::687f:d85a:a0a3:bd20]) by YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM ([fe80::687f:d85a:a0a3:bd20%6]) with mapi id 15.20.3433.034; Fri, 2 Oct 2020 04:25:10 +0000 From: Rick Macklem To: Mateusz Guzik , Alan Somers CC: "Wall, Stephen" , FreeBSD Hackers , "freebsd-current@freebsd.org" Subject: Re: RFC: should copy_file_range(2) remain Linux compatible or support special files? Thread-Topic: RFC: should copy_file_range(2) remain Linux compatible or support special files? Thread-Index: AQHWlFwtm/+ImGEdKkCaptKgpElFK6l7nDvmgAAr7eCAALVoToAADHSAgAAPsQCAByNZ/w== Date: Fri, 2 Oct 2020 04:25:10 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6f8cfe24-4071-4626-6b0f-08d8668b26a6 x-ms-traffictypediagnostic: YT1PR01MB2426: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: wnEijiPQNmKWL/w6bf6UwXF9jO/LEF8pHl9ASoio1k14KrrI7Q5VN63myyqrOFs9S4qtNgpqGet+QBuhncWtMdTLh/U4+oHQU9ieyFTrhIKPe4JyW1VIgYKxfkNTtU/g8IQC6ycmEICqgd/EIGBJCnZ24PWBPmuR+NY2A5sC1tCUdFUWpjJgO2HVACQKAmyZWntwfZ2D4JwxB++j4HKQf8P2zDOtRTSjPczGKe8rxsUEDLWZRjoUadTWgc2xpdMfM9sb8v20gG/OB11H10+3bR98mOCQvSV5UpXDsDyIxkxt42jXqJQ1iyUjE4xGoWEI1w+CBHaUKzHyHL/shy1ajg== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(376002)(346002)(136003)(396003)(39860400002)(366004)(8676002)(316002)(478600001)(786003)(8936002)(71200400001)(86362001)(55016002)(9686003)(33656002)(4326008)(66476007)(64756008)(186003)(53546011)(5660300002)(52536014)(6506007)(91956017)(66556008)(66446008)(7696005)(76116006)(66946007)(110136005)(54906003)(2906002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: 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 x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: YTBPR01MB3966.CANPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 6f8cfe24-4071-4626-6b0f-08d8668b26a6 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Oct 2020 04:25:10.7243 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: MOijainVIaVzHok/RiYQxAqsrmFx4U7uripkRG0JSLWqbfG2PkDUMO6Nby0ESp2RQW+io/GxqZfMO0CGg07evQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: YT1PR01MB2426 X-Rspamd-Queue-Id: 4C2cNV2cwTz46lM X-Spamd-Bar: ----- X-Spamd-Result: default: False [-5.07 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-1.03)[-1.026]; R_DKIM_ALLOW(-0.20)[uoguelph.ca:s=selector1]; FREEFALL_USER(0.00)[rmacklem]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; NEURAL_HAM_LONG(-0.94)[-0.937]; MIME_GOOD(-0.10)[text/plain]; RCPT_COUNT_FIVE(0.00)[5]; DWL_DNSWL_LOW(-1.00)[uoguelph.ca:dkim]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[uoguelph.ca:+]; DMARC_POLICY_ALLOW(-0.50)[uoguelph.ca,none]; NEURAL_HAM_SHORT(-1.10)[-1.103]; FREEMAIL_TO(0.00)[gmail.com,freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; RCVD_TLS_LAST(0.00)[]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-current]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2020 04:25:15 -0000 Mateusz Guzik wrote:=0A= >On 9/27/20, Alan Somers wrote:=0A= >> On Sun, Sep 27, 2020 at 7:49 AM Wall, Stephen = =0A= >> wrote:=0A= >>=0A= >>>=0A= >>> > I'll assume you are referring to the "flags" argument when you say=0A= >>> "param" above.=0A= >>>=0A= >>> Correct, I was misremembering the man page.=0A= >>>=0A= >>> > However, since the Linux man page says it will return EINVAL if=0A= >>> > the "flags" argument is non-zero, you've still introduced an=0A= >>> incompatibility=0A= >>> > w.r.t. the Linux behaviour.=0A= >>>=0A= >>> This would be a one-way incompatibility, i.e. code written on linux wil= l=0A= >>> run unaltered on FreeBSD.=0A= >>> If the flag were along the lines of `FREEBSD_COPY_DEVICES` (or whatever= ,=0A= >>> important part is `FREEBSD`) it will be quite obvious that this code=0A= >>> needs=0A= >>> to be adapted to other platforms:=0A= >>> ```=0A= >>> #ifndef FREEBSD_COPY_DEVICES=0A= >>> #define FREEBSD_COPY_DEVICES 0=0A= >>> #endif=0A= >>> ```=0A= >>>=0A= >>> > Why require extra work for so little purpose?=0A= >>>=0A= >>> I'm sorry, I'm not sure what extra work you are referring to. Specifyi= ng=0A= >>> a flag on copy_file_range(2)? That's trivial.=0A= >>>=0A= >>=0A= >> It's easy to leave out, which could cause a lot of pain for users who do= n't=0A= >> understand why their application isn't working.=0A= >>=0A= >=0A= >A FreeBSD-specific flag to a Linux-alike syscall is bound to run into=0A= >a conflict at some point, making it a non-starter.=0A= >=0A= >>=0A= >>>=0A= >>> > My opinion is that if we can make it work for character devices, we= =0A= >>> should.=0A= This turns out to be a lot messier than I thought it would be.=0A= For example: /dev/zero cannot be read via VOP_READ() on the vnode.=0A= To read it, you must us dofileread() on the file descriptor.=0A= --> This implies a separate copy loop from the one implemented by=0A= vn_generic_copy_file_range(), which works on vnodes. (And that needs to= =0A= remain, because the NFS server only has vnodes and no open file descrip= tors.=0A= =0A= At least that appears to be the case when I tried it and then looked in=0A= sys/fs/devfs and sys/dev/null when it didn't work.=0A= =0A= rick=0A= =0A= >>=0A= >> Well, collecting opinions was the point, no? :)=0A= >>=0A= >> What's going to use this function besides system commands? I think I sa= w=0A= >> `cp` and `dd` mentioned - I think it unlikely you need to be concerned= =0A= >> about their portability.=0A= >>=0A= >=0A= > Userspace RAID-like applications could use it for rebuilds, and they'll= =0A= > need it to work on device nodes. Userspace NFS servers and iSCSI servers= =0A= > could obviously use it. And since the FUSE protocol includes a=0A= > COPY_FILE_RANGE operation, many FUSE daemons could implement that with=0A= > copy_file_range(2).=0A= =0A= I think the first thing to do is check what Linux is doing here, most=0A= notably they may have other primitives to take care of it and in that=0A= case would be best to implement equivalents.=0A= =0A= I don't have a strong opinion on VCHR support. I will note there may=0A= be Linux code expecting to fail with such argument.=0A= =0A= If Linux-compatible approach mentioned above is not going to work out,=0A= I think the best thing to do is to add another syscall=0A= (copy_file_range_np?) which can be tweaked however we see fit.=0A= =0A= --=0A= Mateusz Guzik =0A= From owner-freebsd-current@freebsd.org Fri Oct 2 07:00:29 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 35D113F8A7B for ; Fri, 2 Oct 2020 07:00:29 +0000 (UTC) (envelope-from dmarquess@gmail.com) Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C2gqb5J61z4Gdt; Fri, 2 Oct 2020 07:00:27 +0000 (UTC) (envelope-from dmarquess@gmail.com) Received: by mail-ed1-x52d.google.com with SMTP id g3so573414edu.6; Fri, 02 Oct 2020 00:00:27 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=zqbDJDPr2G/u9larUXiTwlmvEFncRUsFii+2KhO56UQ=; b=YfNERfwfGJNZEIWnGwFYFWaGcBiv24oOytsmw+f35K59C9mQ2gvxssX+CE/h+yurLz YE7/hpUl4Xjkfm6TT1iPng0mw2sKCIao9CVTzphow6uC9F57w8NX/NVxhUx9Jr8B+JbP /Bn3dFTrWAx85fP1St/YeP5bh8V2aC1rP60PnYSzvzJhLnlNDzhEOlNaNeXtidSh8j2v 5UKnM8Xbin9HOM29/s4c3lGZ+nb/Xcn8xl6ynNpbRjKXEJbTUayidDDC0FDcm00mYkFu 0l4xKsn1PpxBcWZe8VCY9GfTD1zIR+uZGhMTO7CWdKsXNApm2M05l/p8NopoFceVeZZd NRXQ== X-Gm-Message-State: AOAM531CMSVZ0XB6PvH1/gR+TBxnCYSAAoXLg3HsSKlFoTF03A82iQMG nRwuPGV6NJMtNcjXWTKw/11pmHJSx7beAcYfEsTP0475k/No5w== X-Google-Smtp-Source: ABdhPJykr22JCFM+RMTMglhQF44m2D9zL+Q0M0oKp31Id5SE2Gi+6777Kagt/tf3yM05vXXKbIUREdrvU5JAmaqogxo= X-Received: by 2002:aa7:c444:: with SMTP id n4mr859596edr.200.1601622025169; Fri, 02 Oct 2020 00:00:25 -0700 (PDT) MIME-Version: 1.0 References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> In-Reply-To: <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> From: Dustin Marquess Date: Fri, 2 Oct 2020 02:00:14 -0500 Message-ID: Subject: Re: iflib/bridge kernel panic To: Kristof Provost Cc: Alexander Leidinger , Shawn Webb , FreeBSD Current Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4C2gqb5J61z4Gdt X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.50 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM_LONG(-1.00)[-0.998]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::52d:from]; NEURAL_HAM_SHORT(-0.50)[-0.504]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-current]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2020 07:00:29 -0000 On Tue, Sep 29, 2020 at 4:21 PM Kristof Provost wrote: > > On 28 Sep 2020, at 16:44, Alexander Leidinger wrote: > > > Quoting Kristof Provost (from Mon, 28 Sep 2020 > > 13:53:16 +0200): > > > >> On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: > >>> Quoting Kristof Provost (from Sun, 27 Sep 2020 > >>> 17:51:32 +0200): > >>>> Here=E2=80=99s an early version of a task queue based approach: > >>>> http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-= sleep.patch > >>>> > >>>> That still needs to be cleaned up, but this should resolve the > >>>> sleep issue and the LOR. > >>> > >>> There are some issues... seems like inside a jail I can't ping > >>> systems outside of the hardware. So similar to the others, kind of. Using the original https://reviews.freebsd.org/D26418 patch, everything seems to work fine. Using the newer http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-that-sleep.p= atch patch, byhve VMs on the bridge attached to the igb/em(5) interfaces don't pass traffic. The bhyve VMs on the bridge attached to the cxgbe(4) interfaces, however, work fine. -Dustin From owner-freebsd-current@freebsd.org Sat Oct 3 00:53:59 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3A40C3F39AF for ; Sat, 3 Oct 2020 00:53:59 +0000 (UTC) (envelope-from doctorwhoguy@gmail.com) Received: from mail-ej1-x635.google.com (mail-ej1-x635.google.com [IPv6:2a00:1450:4864:20::635]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C37fF6V06z4qml for ; Sat, 3 Oct 2020 00:53:57 +0000 (UTC) (envelope-from doctorwhoguy@gmail.com) Received: by mail-ej1-x635.google.com with SMTP id a3so4185536ejy.11 for ; Fri, 02 Oct 2020 17:53:57 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=6Icg6lbSfcTLPlIHIOho/a51ffwc6o2lm8ZNzzHh+go=; b=KP9mjPNsG9z63sknya6uUy9LJzrC/07ASAEu1utxIIQqwX4K652HG1B2sNWnlRhy7U d99of/5NK9JwPNdZgyRfQKL5MCDfhFfByCldj4u4O/+l3aDZdDd4IAOzPt05AclROBib p9vOqvJmH9cxvBoXWtoryYvTm4VLicrjuiMrcCwfkii/vQKNGhEIJAkWyGqhf4QNJcYH ukIDGXVL6BnCxbj3sEYusyQpFI6STQrGfPuGEdxoahvOREJxVJeeTGLsvcD931K4G+Bi jQ0H42u38V31UJ7UEU1y1HaRTLSk3iEKnQXXMLPfPudPeed4OXWesEK9y9IYbjjyd4C7 Qing== X-Gm-Message-State: AOAM532eCJsCmeCNcGbXs6XXp2gfY93InFNJHYSfq/67cYlx0FUj3shJ tTpYkTRbCS2Emra4LPyQNrAzIaoxrlIcxcw+aCeQKLKD X-Google-Smtp-Source: ABdhPJx5zfkaintFMc5ReRKeG5jXXJEjQEinjNL5hzNy55/3kBCZugmqMs/HYEOZ93AY/N7+w+4HO72ZdhZsMZEqhys= X-Received: by 2002:a17:907:2506:: with SMTP id y6mr4447081ejl.265.1601686435710; Fri, 02 Oct 2020 17:53:55 -0700 (PDT) MIME-Version: 1.0 From: Patrick McMunn Date: Fri, 2 Oct 2020 19:53:44 -0500 Message-ID: Subject: Build failure To: freebsd-current@freebsd.org Content-Type: multipart/mixed; boundary="0000000000000af21505b0b9afa8" X-Rspamd-Queue-Id: 4C37fF6V06z4qml X-Spamd-Bar: / X-Spamd-Result: default: False [-0.24 / 15.00]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; TO_DN_NONE(0.00)[]; MIME_BASE64_TEXT_BOGUS(1.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; MIME_BASE64_TEXT(0.10)[]; CTYPE_MIXED_BOGUS(1.00)[]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.77)[-0.773]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.98)[-0.982]; MIME_GOOD(-0.10)[multipart/mixed,multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_SPAM_SHORT(0.41)[0.412]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::635:from]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current] X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 00:53:59 -0000 --0000000000000af21505b0b9afa8 Content-Type: text/plain; charset="UTF-8" I update the sources today and ran "make -j24 buildworld buildkernel KERNCONF=GENERIC-NODEBUG", and the build failed. I made sure to "make clean" and "make cleanworld" and try again, and I got the same result. -- Patrick McMunn - Learn more about the Catholic Faith: http://www.catholic.com/ - Pray with the Church: http://www.universalis.com/ --0000000000000af21505b0b9afa8 Content-Type: text/plain; charset="US-ASCII"; name="buildfail.txt" Content-Disposition: attachment; filename="buildfail.txt" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_kfsyqnqf0 ICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9pMmMuYzo5MjoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5o OjQ0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6Cklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjQ6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS91YXBpL2xpbnV4L2ZiLmg6NToKL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MTY2OjE2OiBl cnJvcjogZmllbGQgaGFzIGluY29tcGxldGUgdHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBz dHJ1Y3QgZGV2aWNlIGRldjsgICAgICAgICAgICAgIC8qIHRoZSBkZXZpY2Ugc3RydWN0dXJlICAg ICAgICAgKi8KICAgICAgICAgICAgICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5o OjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlw ZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51 eF9ub3RpZmllci5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9ub3RpZmllci5j OjE1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTI6MTogZXJyb3I6IHN0 YXRpYyBkZWNsYXJhdGlvbiBvZiAnZGV2X2dldF9kcnZkYXRhJyBmb2xsb3dzIG5vbi1zdGF0aWMg ZGVjbGFyYXRpb24KZGV2X2dldF9kcnZkYXRhKGNvbnN0IHN0cnVjdCBkZXZpY2UgKmRldikKXgov dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9pMmMuaDoyNDM6OTogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRp b24gaXMgaGVyZQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJmRldi0+ZGV2KTsKICAg ICAgICAgICAgICAgXgotLS0gbGludXhfaTJjLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3Jj L2xpbnV4X2kyYy5jOjkyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5o OjI2OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1 ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9i YWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6NDoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL3VhcGkvbGludXgvZmIuaDo1OgovdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9pMmMuaDoyMDE6MjM6IGVycm9yOiBmaWVsZCBoYXMgaW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3Qg ZGV2aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2aWNlX2RyaXZlciBkcml2ZXI7CiAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgXgotLS0gbGludXhfbm90aWZpZXIubyAtLS0KSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9zcmMvbGludXhfbm90aWZpZXIuYzoxNToKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1 ZGUvbGludXgvZGV2aWNlLmg6MjE5OjE6IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRpb24gb2YgJ2Rl dl9zZXRfZHJ2ZGF0YScgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCi0tLSBsaW51eF9p MmMubyAtLS0KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjAxOjk6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRp b24gb2YgJ3N0cnVjdCBkZXZpY2VfZHJpdmVyJwogICAgICAgIHN0cnVjdCBkZXZpY2VfZHJpdmVy IGRyaXZlcjsKICAgICAgICAgICAgICAgXgotLS0gbGludXhfbm90aWZpZXIubyAtLS0KZGV2X3Nl dF9kcnZkYXRhKHN0cnVjdCBkZXZpY2UgKmRldiwgdm9pZCAqZGF0YSkKXgovdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9p MmMuaDoyNDk6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24gaXMgaGVyZQog ICAgICAgIGRldl9zZXRfZHJ2ZGF0YSgmZGV2LT5kZXYsIGRhdGEpOwogICAgICAgIF4KLS0tIGxp bnV4X2kyYy5vIC0tLQovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyMzc6MjogZXJyb3I6IGltcGxpY2l0IGRl Y2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZpY2VfdW5yZWdpc3RlcicgaXMgaW52YWxpZCBpbiBD OTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZp Y2VfdW5yZWdpc3RlcigmY2xpZW50LT5kZXYpOwogICAgICAgIF4KLS0tIGxpbnV4X25vdGlmaWVy Lm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X25vdGlmaWVyLmM6MTU6CkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3Bp L2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQzODoxOiBlcnJvcjogc3RhdGljIGRlY2xh cmF0aW9uIG9mICdkZXZpY2VfdW5yZWdpc3RlcicgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0 aW9uCmRldmljZV91bnJlZ2lzdGVyKHN0cnVjdCBkZXZpY2UgKmRldikKXgovdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9p MmMuaDoyMzc6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24gaXMgaGVyZQog ICAgICAgIGRldmljZV91bnJlZ2lzdGVyKCZjbGllbnQtPmRldik7CiAgICAgICAgXgotLS0gbGlu dXhfY29tcGF0Lm8gLS0tCjEyIGVycm9ycyBnZW5lcmF0ZWQuCioqKiBbbGludXhfY29tcGF0Lm9d IEVycm9yIGNvZGUgMQoKbWFrZVs0XTogc3RvcHBlZCBpbiAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkKLS0tIGxpbnV4X2kyYy5vIC0tLQovdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9pMmMuaDoyNDM6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdk ZXZfZ2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVu Y3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmZGV2LT5k ZXYpOwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF92aWRlby5vIC0tLQoxNiBlcnJvcnMgZ2Vu ZXJhdGVkLgoqKiogW2xpbnV4X3ZpZGVvLm9dIEVycm9yIGNvZGUgMQoKbWFrZVs0XTogc3RvcHBl ZCBpbiAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkKLS0t IGxpbnV4X2kyYy5vIC0tLQovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyNDk6MjogZXJyb3I6IGltcGxpY2l0 IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfc2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4g Qzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgZGV2 X3NldF9kcnZkYXRhKCZkZXYtPmRldiwgZGF0YSk7CiAgICAgICAgXgotLS0gbGludXhfYmFja2xp Z2h0Lm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2JhY2tsaWdodC5jOjEyOgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGlu dXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGln aHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6MTA6CkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvcGNp Lmg6NTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjQ6 Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZG1hLW1h cHBpbmcuaDoxMTY6MTA6IGVycm9yOiBpbmNvbXBsZXRlIGRlZmluaXRpb24gb2YgdHlwZSAnc3Ry dWN0IGRldmljZScKICAgICAgICBpZiAoIWRldi0+ZG1hX3ByaXYgfHwgIWRtYV9zdXBwb3J0ZWQo ZGV2LCBkbWFfbWFzaykpCiAgICAgICAgICAgICB+fn5eCi91c3Ivc3JjL3N5cy9zeXMvdHlwZXMu aDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2UnCnR5 cGVkZWYgc3RydWN0IGRldmljZSAgICpkZXZpY2VfdDsKICAgICAgICAgICAgICAgXgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL3NyYy9saW51eF9iYWNrbGlnaHQuYzoxMjoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvcGNpLmg6MjAzOjI0OiBlcnJvcjogZmllbGQgaGFzIGluY29tcGxldGUg dHlwZSAnc3RydWN0IGRldmljZV9kcml2ZXInCiAgICAgICAgc3RydWN0IGRldmljZV9kcml2ZXIg ICAgICAgICAgICBkcml2ZXI7CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICBeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjIwMTo5OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9m ICdzdHJ1Y3QgZGV2aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2aWNlX2RyaXZlciBkcml2 ZXI7CiAgICAgICAgICAgICAgIF4KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYmFja2xp Z2h0LmM6MTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24v aW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIu aDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgovdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjIzMzoxNzog ZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2UnCiAgICAgICAg c3RydWN0IGRldmljZSAgICAgICAgICAgZGV2OwogICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNs YXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmlj ZV90OwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2JhY2ts aWdodC5jOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9k cm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xv Y2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9s aW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2Zi Lmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9z cmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDozMzE6OTog ZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfZ2V0X2RydmRhdGEn IGlzIGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRp b25dCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmcGRldi0+ZGV2KTsKICAgICAgICAg ICAgICAgXgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4 L3BjaS5oOjMzODoyOiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24gb2YgZnVuY3Rpb24gJ2Rl dl9zZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5j dGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZfc2V0X2RydmRhdGEoJnBkZXYtPmRldiwgZGF0 YSk7CiAgICAgICAgXgotLS0gZG1hLWJ1Zi5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vz ci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1hLWJ1Zi8vZG1h LWJ1Zi5jOjUzOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9k cm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLWJ1Zi5oOjMy OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDo0OgpJbiBm aWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5j bHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUv bGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21w YXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL3VhcGkv bGludXgvZmIuaDo1OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoxNDA6MTY6IGVycm9yOiBmaWVsZCBoYXMg aW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVjdCBkZXZpY2UgZGV2 OyAgICAgICAgICAgICAgLyogdGhlIGFkYXB0ZXIgZGV2aWNlICovCiAgICAgICAgICAgICAgICAg ICAgICBeCi91c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVj bGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2UnCnR5cGVkZWYgc3RydWN0IGRldmljZSAgICpkZXZp Y2VfdDsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9z eXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1hLWJ1Zi8vZG1hLWJ1Zi5jOjUz OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLWJ1Zi5oOjMyOgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDo0OgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51 eC9kbWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhr cGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRl L2xpbnV4L2ZiLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL3VhcGkvbGludXgvZmIu aDo1OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9pMmMuaDoxNjY6MTY6IGVycm9yOiBmaWVsZCBoYXMgaW5jb21wbGV0 ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVjdCBkZXZpY2UgZGV2OyAgICAgICAg ICAgICAgLyogdGhlIGRldmljZSBzdHJ1Y3R1cmUgICAgICAgICAqLwogICAgICAgICAgICAgICAg ICAgICAgXgovdXNyL3NyYy9zeXMvc3lzL3R5cGVzLmg6Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRl Y2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2aWNlJwp0eXBlZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2 aWNlX3Q7CiAgICAgICAgICAgICAgIF4KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9kcml2ZXJzL2RtYS1idWYvL2RtYS1idWYuYzo1 MzoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1idWYuaDozMjoKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6NDoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGlu dXgvZG1hLW1hcHBpbmcuaDozNToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2Rl dmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4 a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVk ZS9saW51eC9mYi5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS91YXBpL2xpbnV4L2Zi Lmg6NToKL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dw bHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjAxOjIzOiBlcnJvcjogZmllbGQgaGFzIGluY29tcGxl dGUgdHlwZSAnc3RydWN0IGRldmljZV9kcml2ZXInCiAgICAgICAgc3RydWN0IGRldmljZV9kcml2 ZXIgZHJpdmVyOwogICAgICAgICAgICAgICAgICAgICAgICAgICAgIF4KL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJj Lmg6MjAxOjk6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2VfZHJp dmVyJwogICAgICAgIHN0cnVjdCBkZXZpY2VfZHJpdmVyIGRyaXZlcjsKICAgICAgICAgICAgICAg XgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9pMmMuaDoyMzc6MjogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9m IGZ1bmN0aW9uICdkZXZpY2VfdW5yZWdpc3RlcicgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3Is LVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZpY2VfdW5yZWdpc3Rl cigmY2xpZW50LT5kZXYpOwogICAgICAgIF4KLS0tIGxpbnV4X2dlbmFsbG9jLm8gLS0tCkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2dlbmFsbG9jLmM6MzU6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2lu dGVycnVwdC5oOjM0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6 NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29t bW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVk ZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4 L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2lu Y2x1ZGUvbGludXgvcGNpLmg6NTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9k bWEtbWFwcGluZy5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1 ZGUvbGludXgvZG1hLW1hcHBpbmcuaDoxMTY6MTA6IGVycm9yOiBpbmNvbXBsZXRlIGRlZmluaXRp b24gb2YgdHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBpZiAoIWRldi0+ZG1hX3ByaXYgfHwg IWRtYV9zdXBwb3J0ZWQoZGV2LCBkbWFfbWFzaykpCiAgICAgICAgICAgICB+fn5eCi91c3Ivc3Jj L3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0 cnVjdCBkZXZpY2UnCnR5cGVkZWYgc3RydWN0IGRldmljZSAgICpkZXZpY2VfdDsKICAgICAgICAg ICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9nZW5hbGxvYy5jOjM1OgpJbiBm aWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5j bHVkZS9saW51eC9pbnRlcnJ1cHQuaDozNDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0 L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9z eXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgv cGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGlu dXgvcGNpLmg6MjAzOjI0OiBlcnJvcjogZmllbGQgaGFzIGluY29tcGxldGUgdHlwZSAnc3RydWN0 IGRldmljZV9kcml2ZXInCiAgICAgICAgc3RydWN0IGRldmljZV9kcml2ZXIgICAgICAgICAgICBk cml2ZXI7CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBeCi91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2kyYy5oOjIwMTo5OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2 aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2aWNlX2RyaXZlciBkcml2ZXI7CiAgICAgICAg ICAgICAgIF4KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfZ2VuYWxsb2MuYzozNToKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2lu Y2x1ZGUvbGludXgvaW50ZXJydXB0Lmg6MzQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xv Y2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9s aW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4 L3BjaS5oOjEwOgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xp bnV4L3BjaS5oOjIzMzoxNzogZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVj dCBkZXZpY2UnCiAgICAgICAgc3RydWN0IGRldmljZSAgICAgICAgICAgZGV2OwogICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjog bm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1 Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9iYWNrbGln aHQubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYmFja2xpZ2h0LmM6MTI6Cklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51 eC9kZXZpY2UuaDo0NDoKL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTEyOjE2OiBlcnJvcjogZmll bGQgaGFzIGluY29tcGxldGUgdHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBzdHJ1Y3QgZGV2 aWNlIGRldjsKICAgICAgICAgICAgICAgICAgICAgIF4KLS0tIGRtYS1idWYubyAtLS0KL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUv bGludXgvaTJjLmg6MjQzOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlvbiBvZiBmdW5jdGlv biAnZGV2X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJvciwtV2ltcGxpY2l0 LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQotLS0gbGludXhfYmFja2xpZ2h0Lm8gLS0tCi91c3Ivc3Jj L3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0 cnVjdCBkZXZpY2UnCi0tLSBkbWEtYnVmLm8gLS0tCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2 ZGF0YSgmZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9iYWNrbGlnaHQubyAt LS0KdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCi0t LSBsaW51eF9nZW5hbGxvYy5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9z eXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9nZW5h bGxvYy5jOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51 eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9pbnRlcnJ1cHQuaDozNDoKSW4gZmlsZSBpbmNsdWRl ZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9n cGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0 OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29t bW9uL2luY2x1ZGUvbGludXgvcGNpLmg6MzMxOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlv biBvZiBmdW5jdGlvbiAnZGV2X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJv ciwtV2ltcGxpY2l0LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBkZXZfZ2V0 X2RydmRhdGEoJnBkZXYtPmRldik7CiAgICAgICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDozMzg6MjogZXJyb3I6IGltcGxp Y2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfc2V0X2RydmRhdGEnIGlzIGludmFsaWQg aW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAg ZGV2X3NldF9kcnZkYXRhKCZwZGV2LT5kZXYsIGRhdGEpOwogICAgICAgIF4KLS0tIGxpbnV4X2Fj cGkubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYWNwaS5jOjE6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMv c3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91 c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNs dWRlL2xpbnV4L3BjaS5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2Nv bXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDo1MjoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjExNjoxMDogZXJy b3I6IGluY29tcGxldGUgZGVmaW5pdGlvbiBvZiB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAg IGlmICghZGV2LT5kbWFfcHJpdiB8fCAhZG1hX3N1cHBvcnRlZChkZXYsIGRtYV9tYXNrKSkKICAg ICAgICAgICAgIH5+fl4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9y d2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNl ICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9iYWNrbGlnaHQubyAtLS0K SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYmFja2xpZ2h0LmM6MTI6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2Uu aDo0NDoKL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dw bHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTUyOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNs YXJhdGlvbiBvZiBmdW5jdGlvbiAnZGV2X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBb LVdlcnJvciwtV2ltcGxpY2l0LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBk ZXZfZ2V0X2RydmRhdGEoJmJsX2Rldi0+ZGV2KTsKICAgICAgICAgICAgICAgXgotLS0gbGludXhf YWNwaS5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9k cm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9hY3BpLmM6MToKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvcGNpLmg6MjAzOjI0OiBlcnJvcjogZmllbGQgaGFzIGluY29tcGxldGUg dHlwZSAnc3RydWN0IGRldmljZV9kcml2ZXInCiAgICAgICAgc3RydWN0IGRldmljZV9kcml2ZXIg ICAgICAgICAgICBkcml2ZXI7CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICBeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjIwMTo5OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9m ICdzdHJ1Y3QgZGV2aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2aWNlX2RyaXZlciBkcml2 ZXI7CiAgICAgICAgICAgICAgIF4KLS0tIGxpbnV4X2JhY2tsaWdodC5vIC0tLQpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL3NyYy9saW51eF9iYWNrbGlnaHQuYzoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9p bmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29t bW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6MjEyOjE6IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRp b24gb2YgJ2Rldl9nZXRfZHJ2ZGF0YScgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCmRl dl9nZXRfZHJ2ZGF0YShjb25zdCBzdHJ1Y3QgZGV2aWNlICpkZXYpCl4KL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJj Lmg6MjQzOjk6IG5vdGU6IHByZXZpb3VzIGltcGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhlcmUKLS0t IGxpbnV4X2FjcGkubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21v ZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYWNwaS5jOjE6 CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50 LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2Uu aDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgot LS0gbGludXhfYmFja2xpZ2h0Lm8gLS0tCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgm ZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9hY3BpLm8gLS0tCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvcGNpLmg6MjMzOjE3OiBlcnJvcjogZmllbGQgaGFzIGluY29tcGxldGUg dHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBzdHJ1Y3QgZGV2aWNlICAgICAgICAgICBkZXY7 CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvc3lzL3R5cGVz Lmg6Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2aWNlJwp0 eXBlZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2aWNlX3Q7CiAgICAgICAgICAgICAgIF4KLS0tIGxp bnV4X2JhY2tsaWdodC5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9iYWNrbGln aHQuYzoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91 c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6 MjE5OjE6IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRpb24gb2YgJ2Rldl9zZXRfZHJ2ZGF0YScgZm9s bG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCmRldl9zZXRfZHJ2ZGF0YShzdHJ1Y3QgZGV2aWNl ICpkZXYsIHZvaWQgKmRhdGEpCl4KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjQ5OjI6IG5vdGU6IHByZXZp b3VzIGltcGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhlcmUKICAgICAgICBkZXZfc2V0X2RydmRhdGEo JmRldi0+ZGV2LCBkYXRhKTsKICAgICAgICBeCi0tLSBsaW51eF9hY3BpLm8gLS0tCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2FjcGkuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vz ci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1 ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhr cGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRl L2xpbnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDox MDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2ku aDozMzE6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfZ2V0 X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24t ZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmcGRldi0+ZGV2KTsK ICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNs dWRlL2xpbnV4L3BjaS5oOjMzODoyOiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24gb2YgZnVu Y3Rpb24gJ2Rldl9zZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBs aWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZfc2V0X2RydmRhdGEoJnBkZXYt PmRldiwgZGF0YSk7CiAgICAgICAgXgotLS0gbGludXhfYmFja2xpZ2h0Lm8gLS0tCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2JhY2tsaWdodC5jOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0Mzg6MTogZXJyb3I6IHN0YXRpYyBkZWNsYXJh dGlvbiBvZiAnZGV2aWNlX3VucmVnaXN0ZXInIGZvbGxvd3Mgbm9uLXN0YXRpYyBkZWNsYXJhdGlv bgpkZXZpY2VfdW5yZWdpc3RlcihzdHJ1Y3QgZGV2aWNlICpkZXYpCl4KL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJj Lmg6MjM3OjI6IG5vdGU6IHByZXZpb3VzIGltcGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhlcmUKICAg ICAgICBkZXZpY2VfdW5yZWdpc3RlcigmY2xpZW50LT5kZXYpOwogICAgICAgIF4KLS0tIGRtYS1i dWYubyAtLS0KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjQ5OjI6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJh dGlvbiBvZiBmdW5jdGlvbiAnZGV2X3NldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdl cnJvciwtV2ltcGxpY2l0LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIGRldl9zZXRfZHJ2 ZGF0YSgmZGV2LT5kZXYsIGRhdGEpOwogICAgICAgIF4KLS0tIGxpbnV4X2dlbmFsbG9jLm8gLS0t CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50 LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2dlbmFsbG9jLmM6MzU6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xp bnV4L2ludGVycnVwdC5oOjM0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhr cGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6Ci91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdo dC5oOjExMjoxNjogZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZp Y2UnCiAgICAgICAgc3RydWN0IGRldmljZSBkZXY7CiAgICAgICAgICAgICAgICAgICAgICBeCi91 c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24g b2YgJ3N0cnVjdCBkZXZpY2UnCnR5cGVkZWYgc3RydWN0IGRldmljZSAgICpkZXZpY2VfdDsKICAg ICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9nZW5hbGxvYy5jOjM1 OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21t b24vaW5jbHVkZS9saW51eC9pbnRlcnJ1cHQuaDozNDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91 c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNs dWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMv Y29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgovdXNyL2xv Y2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9s aW51eC9iYWNrbGlnaHQuaDoxNTI6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1 bmN0aW9uICdkZXZfZ2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1w bGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0 YSgmYmxfZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3Jj L2xpbnV4X2dlbmFsbG9jLmM6MzU6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMv Y29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVycnVwdC5oOjM0OgpJbiBm aWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9k L2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2Nv bXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTI6MTogZXJyb3I6 IHN0YXRpYyBkZWNsYXJhdGlvbiBvZiAnZGV2X2dldF9kcnZkYXRhJyBmb2xsb3dzIG5vbi1zdGF0 aWMgZGVjbGFyYXRpb24KZGV2X2dldF9kcnZkYXRhKGNvbnN0IHN0cnVjdCBkZXZpY2UgKmRldikK XgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9pMmMuaDoyNDM6OTogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFy YXRpb24gaXMgaGVyZQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJmRldi0+ZGV2KTsK ICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9nZW5hbGxvYy5j OjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9pbnRlcnJ1cHQuaDozNDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9p bmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29t bW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6MjE5OjE6IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRp b24gb2YgJ2Rldl9zZXRfZHJ2ZGF0YScgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCmRl dl9zZXRfZHJ2ZGF0YShzdHJ1Y3QgZGV2aWNlICpkZXYsIHZvaWQgKmRhdGEpCl4KL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGlu dXgvaTJjLmg6MjQ5OjI6IG5vdGU6IHByZXZpb3VzIGltcGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhl cmUKICAgICAgICBkZXZfc2V0X2RydmRhdGEoJmRldi0+ZGV2LCBkYXRhKTsKICAgICAgICBeCi0t LSBsaW51eF9kZXZpY2UubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfZGV2aWNl LmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNs dWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9z eXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgv YmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEw OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvcGNpLmg6MTA6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xp bnV4L3BjaS5oOjUyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBp bmcuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4 L2RtYS1tYXBwaW5nLmg6MTE2OjEwOiBlcnJvcjogaW5jb21wbGV0ZSBkZWZpbml0aW9uIG9mIHR5 cGUgJ3N0cnVjdCBkZXZpY2UnCiAgICAgICAgaWYgKCFkZXYtPmRtYV9wcml2IHx8ICFkbWFfc3Vw cG9ydGVkKGRldiwgZG1hX21hc2spKQogICAgICAgICAgICAgfn5+XgovdXNyL3NyYy9zeXMvc3lz L3R5cGVzLmg6Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2 aWNlJwp0eXBlZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2aWNlX3Q7CiAgICAgICAgICAgICAgIF4K LS0tIGxpbnV4X2NvbXBvbmVudC5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9j b21wb25lbnQuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvY29tcG9uZW50 Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBm aWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5j bHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4 L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIuaDox MDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9s aW51eC9wY2kuaDo1MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBw aW5nLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51 eC9kbWEtbWFwcGluZy5oOjExNjoxMDogZXJyb3I6IGluY29tcGxldGUgZGVmaW5pdGlvbiBvZiB0 eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIGlmICghZGV2LT5kbWFfcHJpdiB8fCAhZG1hX3N1 cHBvcnRlZChkZXYsIGRtYV9tYXNrKSkKICAgICAgICAgICAgIH5+fl4KL3Vzci9zcmMvc3lzL3N5 cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRl dmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBe Ci0tLSBsaW51eF9hY3BpLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2FjcGku YzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDQ6Ci91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjExMjoxNjogZXJyb3I6IGZpZWxkIGhh cyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2UnCiAgICAgICAgc3RydWN0IGRldmljZSBk ZXY7CiAgICAgICAgICAgICAgICAgICAgICBeCi91c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6 MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2UnCnR5cGVkZWYg c3RydWN0IGRldmljZSAgICpkZXZpY2VfdDsKICAgICAgICAgICAgICAgXgotLS0gbGludXhfZ2Vu YWxsb2MubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfZ2VuYWxsb2MuYzozNToK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvaW50ZXJydXB0Lmg6MzQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVk ZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9p bmNsdWRlL2xpbnV4L2RldmljZS5oOjQzODoxOiBlcnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9m ICdkZXZpY2VfdW5yZWdpc3RlcicgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCmRldmlj ZV91bnJlZ2lzdGVyKHN0cnVjdCBkZXZpY2UgKmRldikKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyMzc6 Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24gaXMgaGVyZQogICAgICAgIGRl dmljZV91bnJlZ2lzdGVyKCZjbGllbnQtPmRldik7CiAgICAgICAgXgotLS0gbGludXhfZGV2aWNl Lm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2RldmljZS5jOjE6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZp Y2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEy OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4 a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjIwMzoyNDogZXJyb3I6IGZpZWxkIGhhcyBp bmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2VfZHJpdmVyJwogICAgICAgIHN0cnVjdCBkZXZp Y2VfZHJpdmVyICAgICAgICAgICAgZHJpdmVyOwogICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyMDE6OTogbm90ZTogZm9yd2FyZCBkZWNs YXJhdGlvbiBvZiAnc3RydWN0IGRldmljZV9kcml2ZXInCiAgICAgICAgc3RydWN0IGRldmljZV9k cml2ZXIgZHJpdmVyOwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xp bnV4X2RldmljZS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2Uu aDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91 c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNs dWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGlu dXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgov dXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjIz MzoxNzogZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2UnCiAg ICAgICAgc3RydWN0IGRldmljZSAgICAgICAgICAgZGV2OwogICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9yd2Fy ZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAg KmRldmljZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9hY3BpLm8gLS0tCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2FjcGkuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vz ci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1 ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhr cGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6Ci91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdo dC5oOjE1Mjo5OiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24gb2YgZnVuY3Rpb24gJ2Rldl9n ZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5jdGlv bi1kZWNsYXJhdGlvbl0KICAgICAgICByZXR1cm4gZGV2X2dldF9kcnZkYXRhKCZibF9kZXYtPmRl dik7CiAgICAgICAgICAgICAgIF4KLS0tIGxpbnV4X2NvbXBvbmVudC5vIC0tLQpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL3NyYy9saW51eF9jb21wb25lbnQuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvY29tcG9uZW50Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xv Y2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9s aW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwv c3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4 L3BjaS5oOjEwOgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xp bnV4L3BjaS5oOjIwMzoyNDogZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVj dCBkZXZpY2VfZHJpdmVyJwogICAgICAgIHN0cnVjdCBkZXZpY2VfZHJpdmVyICAgICAgICAgICAg ZHJpdmVyOwogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXgotLS0gbGlu dXhfYWNwaS5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9hY3BpLmM6MToKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoKSW4gZmlsZSBpbmNsdWRl ZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9n cGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhr cGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6MjEyOjE6IGVycm9yOiBzdGF0aWMgZGVj bGFyYXRpb24gb2YgJ2Rldl9nZXRfZHJ2ZGF0YScgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0 aW9uCi0tLSBsaW51eF9jb21wb25lbnQubyAtLS0KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjAxOjk6IG5v dGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2VfZHJpdmVyJwogICAgICAg IHN0cnVjdCBkZXZpY2VfZHJpdmVyIGRyaXZlcjsKICAgICAgICAgICAgICAgXgotLS0gbGludXhf YWNwaS5vIC0tLQpkZXZfZ2V0X2RydmRhdGEoY29uc3Qgc3RydWN0IGRldmljZSAqZGV2KQpeCi91 c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNs dWRlL2xpbnV4L2kyYy5oOjI0Mzo5OiBub3RlOiBwcmV2aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlv biBpcyBoZXJlCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmZGV2LT5kZXYpOwogICAg ICAgICAgICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2FjcGkuYzoxOgpJbiBm aWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9k L2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxlIGluY2x1ZGVk IGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dw bHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtw aS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTk6MTogZXJyb3I6IHN0YXRpYyBkZWNs YXJhdGlvbiBvZiAnZGV2X3NldF9kcnZkYXRhJyBmb2xsb3dzIG5vbi1zdGF0aWMgZGVjbGFyYXRp b24KZGV2X3NldF9kcnZkYXRhKHN0cnVjdCBkZXZpY2UgKmRldiwgdm9pZCAqZGF0YSkKXgovdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVk ZS9saW51eC9pMmMuaDoyNDk6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24g aXMgaGVyZQogICAgICAgIGRldl9zZXRfZHJ2ZGF0YSgmZGV2LT5kZXYsIGRhdGEpOwogICAgICAg IF4KLS0tIGxpbnV4X2NvbXBvbmVudC5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51 eF9jb21wb25lbnQuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvY29tcG9u ZW50Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24v aW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIu aDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgovdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjIzMzoxNzog ZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2UnCiAgICAgICAg c3RydWN0IGRldmljZSAgICAgICAgICAgZGV2OwogICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNs YXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmlj ZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9kZXZpY2UubyAtLS0KSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9zcmMvbGludXhfZGV2aWNlLmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRl L2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29t cGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0OgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTI6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGlu dXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUv bGludXgvcGNpLmg6MzMxOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlvbiBvZiBmdW5jdGlv biAnZGV2X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJvciwtV2ltcGxpY2l0 LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJnBk ZXYtPmRldik7CiAgICAgICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9wY2kuaDozMzg6MjogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0 aW9uIG9mIGZ1bmN0aW9uICdkZXZfc2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vy cm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgZGV2X3NldF9kcnZk YXRhKCZwZGV2LT5kZXYsIGRhdGEpOwogICAgICAgIF4KLS0tIGxpbnV4X2NvbXBvbmVudC5vIC0t LQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9jb21wb25lbnQuYzoxOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvY29tcG9uZW50Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9z cmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9p bmNsdWRlL2xpbnV4L3BjaS5oOjEwOgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1v bi9pbmNsdWRlL2xpbnV4L3BjaS5oOjMzMTo5OiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24g b2YgZnVuY3Rpb24gJ2Rldl9nZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3Is LVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICByZXR1cm4gZGV2X2dldF9k cnZkYXRhKCZwZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCi91c3Ivc3JjL3N5cy9jb21wYXQv bGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvcGNpLmg6MzM4OjI6IGVycm9yOiBpbXBsaWNp dCBkZWNsYXJhdGlvbiBvZiBmdW5jdGlvbiAnZGV2X3NldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGlu IEM5OSBbLVdlcnJvciwtV2ltcGxpY2l0LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIGRl dl9zZXRfZHJ2ZGF0YSgmcGRldi0+ZGV2LCBkYXRhKTsKICAgICAgICBeCi0tLSBsaW51eF9hY3Bp Lm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2FjcGkuYzoxOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21t b24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0Mzg6MTogZXJyb3I6IHN0YXRpYyBkZWNsYXJhdGlv biBvZiAnZGV2aWNlX3VucmVnaXN0ZXInIGZvbGxvd3Mgbm9uLXN0YXRpYyBkZWNsYXJhdGlvbgpk ZXZpY2VfdW5yZWdpc3RlcihzdHJ1Y3QgZGV2aWNlICpkZXYpCl4KL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6 MjM3OjI6IG5vdGU6IHByZXZpb3VzIGltcGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhlcmUKICAgICAg ICBkZXZpY2VfdW5yZWdpc3RlcigmY2xpZW50LT5kZXYpOwogICAgICAgIF4KLS0tIGxpbnV4X25v dGlmaWVyLm8gLS0tCjE2IGVycm9ycyBnZW5lcmF0ZWQuCi0tLSBsaW51eF9pMmMubyAtLS0KSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfaTJjLmM6OTI6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9s aW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRl ZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9n cGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3Bj aS5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtw aS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDo1MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91 c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNs dWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjExNjoxMDogZXJyb3I6IGluY29tcGxl dGUgZGVmaW5pdGlvbiBvZiB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIGlmICghZGV2LT5k bWFfcHJpdiB8fCAhZG1hX3N1cHBvcnRlZChkZXYsIGRtYV9tYXNrKSkKICAgICAgICAgICAgIH5+ fl4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNsYXJh dGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90 OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9pcnEubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2 Mi9zcmMvbGludXhfaXJxLmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9j b21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvaW50ZXJydXB0Lmg6MzQ6CkluIGZp bGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVk IGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9k ZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5o OjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIuaDoxMDoKSW4gZmlsZSBp bmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51 eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20g L3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDo1 MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6NDoKL3Vz ci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kbWEtbWFwcGlu Zy5oOjExNjoxMDogZXJyb3I6IGluY29tcGxldGUgZGVmaW5pdGlvbiBvZiB0eXBlICdzdHJ1Y3Qg ZGV2aWNlJwogICAgICAgIGlmICghZGV2LT5kbWFfcHJpdiB8fCAhZG1hX3N1cHBvcnRlZChkZXYs IGRtYV9tYXNrKSkKICAgICAgICAgICAgIH5+fl4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5oOjI3 NToxNjogbm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlwZWRl ZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCi0tLSBsaW51eF9i YWNrbGlnaHQubyAtLS0KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL3NyYy9saW51eF9iYWNrbGlnaHQuYzoxMjk6Mjc6IGVycm9yOiBpbml0aWFs aXppbmcgJ3N0cnVjdCBiYWNrbGlnaHRfZGV2aWNlIConIHdpdGggYW4gZXhwcmVzc2lvbiBvZiBp bmNvbXBhdGlibGUgdHlwZSAndm9pZCcKICAgICAgICBzdHJ1Y3QgYmFja2xpZ2h0X2RldmljZSAq YmQgPSB0b19iYWNrbGlnaHRfZGV2aWNlKGRldik7CiAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIF4gICAgfn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+Ci91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfYmFja2xpZ2h0LmM6 MTM4OjI3OiBlcnJvcjogaW5pdGlhbGl6aW5nICdzdHJ1Y3QgYmFja2xpZ2h0X2RldmljZSAqJyB3 aXRoIGFuIGV4cHJlc3Npb24gb2YgaW5jb21wYXRpYmxlIHR5cGUgJ3ZvaWQnCiAgICAgICAgc3Ry dWN0IGJhY2tsaWdodF9kZXZpY2UgKmJkID0gdG9fYmFja2xpZ2h0X2RldmljZShkZXYpOwogICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICBeICAgIH5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+ fgotLS0gbGludXhfaTJjLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2kyYy5j OjkyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNwaS5oOjI2OgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBm cm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2 aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDox MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51 eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDoyMDM6MjQ6IGVycm9yOiBmaWVsZCBoYXMg aW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2 aWNlX2RyaXZlciAgICAgICAgICAgIGRyaXZlcjsKICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgIF4KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjAxOjk6IG5vdGU6IGZvcndhcmQgZGVj bGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2VfZHJpdmVyJwogICAgICAgIHN0cnVjdCBkZXZpY2Vf ZHJpdmVyIGRyaXZlcjsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vz ci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9s aW51eF9pMmMuYzo5MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoy NjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRl L2xpbnV4L2RldmljZS5oOjQ0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFj a2xpZ2h0Lmg6MTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9mYi5oOjEwOgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvcGNpLmg6MTA6Ci91c3Ivc3JjL3N5cy9j b21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvcGNpLmg6MjMzOjE3OiBlcnJvcjog ZmllbGQgaGFzIGluY29tcGxldGUgdHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBzdHJ1Y3Qg ZGV2aWNlICAgICAgICAgICBkZXY7CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXgov dXNyL3NyYy9zeXMvc3lzL3R5cGVzLmg6Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9u IG9mICdzdHJ1Y3QgZGV2aWNlJwp0eXBlZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2aWNlX3Q7CiAg ICAgICAgICAgICAgIF4KLS0tIGxpbnV4X2JhY2tsaWdodC5vIC0tLQovdXNyL2xvY2FsL3N5cy9t b2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2JhY2tsaWdo dC5jOjE2NDoyNzogZXJyb3I6IGluaXRpYWxpemluZyAnc3RydWN0IGJhY2tsaWdodF9kZXZpY2Ug Kicgd2l0aCBhbiBleHByZXNzaW9uIG9mIGluY29tcGF0aWJsZSB0eXBlICd2b2lkJwogICAgICAg IHN0cnVjdCBiYWNrbGlnaHRfZGV2aWNlICpiZCA9IHRvX2JhY2tsaWdodF9kZXZpY2UoZGV2KTsK ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXiAgICB+fn5+fn5+fn5+fn5+fn5+fn5+ fn5+fn4KZmF0YWwgZXJyb3I6IHRvbyBtYW55IGVycm9ycyBlbWl0dGVkLCBzdG9wcGluZyBub3cg Wy1mZXJyb3ItbGltaXQ9XQotLS0gbGludXhfbm90aWZpZXIubyAtLS0KKioqIFtsaW51eF9ub3Rp Zmllci5vXSBFcnJvciBjb2RlIDEKCm1ha2VbNF06IHN0b3BwZWQgaW4gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpCi0tLSBsaW51eF9pcnEubyAtLS0KSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfaXJxLmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvaW50ZXJy dXB0Lmg6MzQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24v aW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2JhY2tsaWdodC5oOjEyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZmIu aDoxMDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjEwOgovdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjIwMzoyNDog ZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVjdCBkZXZpY2VfZHJpdmVyJwog ICAgICAgIHN0cnVjdCBkZXZpY2VfZHJpdmVyICAgICAgICAgICAgZHJpdmVyOwogICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyMDE6OTog bm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZV9kcml2ZXInCiAgICAg ICAgc3RydWN0IGRldmljZV9kcml2ZXIgZHJpdmVyOwogICAgICAgICAgICAgICBeCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2lycS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVycnVwdC5o OjM0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3Vy cmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1 ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9i YWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6MTA6 CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50 LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9zcmMvc3lz L2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDoyMzM6MTc6IGVycm9y OiBmaWVsZCBoYXMgaW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVj dCBkZXZpY2UgICAgICAgICAgIGRldjsKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBe Ci91c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRp b24gb2YgJ3N0cnVjdCBkZXZpY2UnCnR5cGVkZWYgc3RydWN0IGRldmljZSAgICpkZXZpY2VfdDsK ICAgICAgICAgICAgICAgXgotLS0gbGludXhfaTJjLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv c3JjL2xpbnV4X2kyYy5jOjkyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYWNw aS5oOjI2OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2lu Y2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21v ZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6 MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJy ZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9zcmMv c3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDozMzE6OTogZXJy b3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfZ2V0X2RydmRhdGEnIGlz IGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25d CiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmcGRldi0+ZGV2KTsKICAgICAgICAgICAg ICAgXgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3Bj aS5oOjMzODoyOiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24gb2YgZnVuY3Rpb24gJ2Rldl9z ZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5jdGlv bi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZfc2V0X2RydmRhdGEoJnBkZXYtPmRldiwgZGF0YSk7 CiAgICAgICAgXgotLS0gbGludXhfaXJxLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xp bnV4X2lycS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xp bnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVycnVwdC5oOjM0OgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91 c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6 NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJy ZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQg ZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9wY2kuaDozMzE6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0 aW9uIG9mIGZ1bmN0aW9uICdkZXZfZ2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vy cm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRldl9n ZXRfZHJ2ZGF0YSgmcGRldi0+ZGV2KTsKICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvY29t cGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L3BjaS5oOjMzODoyOiBlcnJvcjogaW1w bGljaXQgZGVjbGFyYXRpb24gb2YgZnVuY3Rpb24gJ2Rldl9zZXRfZHJ2ZGF0YScgaXMgaW52YWxp ZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAg ICBkZXZfc2V0X2RydmRhdGEoJnBkZXYtPmRldiwgZGF0YSk7CiAgICAgICAgXgotLS0gbGludXhf ZGV2aWNlLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2RldmljZS5jOjE6Cklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51 eC9kZXZpY2UuaDo0NDoKL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0Lmg6MTEyOjE2OiBlcnJvcjogZmll bGQgaGFzIGluY29tcGxldGUgdHlwZSAnc3RydWN0IGRldmljZScKICAgICAgICBzdHJ1Y3QgZGV2 aWNlIGRldjsKICAgICAgICAgICAgICAgICAgICAgIF4KL3Vzci9zcmMvc3lzL3N5cy90eXBlcy5o OjI3NToxNjogbm90ZTogZm9yd2FyZCBkZWNsYXJhdGlvbiBvZiAnc3RydWN0IGRldmljZScKdHlw ZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2RldmljZS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9kZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lz L2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUv bGludXgvYmFja2xpZ2h0Lmg6MTUyOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlvbiBvZiBm dW5jdGlvbiAnZGV2X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJvciwtV2lt cGxpY2l0LWZ1bmN0aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRh dGEoJmJsX2Rldi0+ZGV2KTsKICAgICAgICAgICAgICAgXgotLS0gbGludXhfY29tcG9uZW50Lm8g LS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJy ZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2NvbXBvbmVudC5jOjE6CkluIGZpbGUg aW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9jb21wb25lbnQuaDoxODoKSW4gZmlsZSBpbmNsdWRl ZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9n cGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNy L3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ0 OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMTI6MTY6IGVycm9yOiBmaWVsZCBoYXMgaW5jb21w bGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVjdCBkZXZpY2UgZGV2OwogICAg ICAgICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvc3lzL3R5cGVzLmg6Mjc1OjE2OiBub3Rl OiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2aWNlJwp0eXBlZGVmIHN0cnVjdCBk ZXZpY2UgICAqZGV2aWNlX3Q7CiAgICAgICAgICAgICAgIF4KLS0tIGxpbnV4X2RldmljZS5vIC0t LQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9kZXZpY2UuYzoxOgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51 eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTI6MTogZXJyb3I6IHN0YXRpYyBk ZWNsYXJhdGlvbiBvZiAnZGV2X2dldF9kcnZkYXRhJyBmb2xsb3dzIG5vbi1zdGF0aWMgZGVjbGFy YXRpb24KZGV2X2dldF9kcnZkYXRhKGNvbnN0IHN0cnVjdCBkZXZpY2UgKmRldikKXgovdXNyL2xv Y2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9s aW51eC9pMmMuaDoyNDM6OTogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24gaXMg aGVyZQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJmRldi0+ZGV2KTsKICAgICAgICAg ICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9kZXZpY2UuYzoxOgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMvc3lzL2NvbXBh dC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTk6MTogZXJyb3I6IHN0 YXRpYyBkZWNsYXJhdGlvbiBvZiAnZGV2X3NldF9kcnZkYXRhJyBmb2xsb3dzIG5vbi1zdGF0aWMg ZGVjbGFyYXRpb24KZGV2X3NldF9kcnZkYXRhKHN0cnVjdCBkZXZpY2UgKmRldiwgdm9pZCAqZGF0 YSkKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9pMmMuaDoyNDk6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVj bGFyYXRpb24gaXMgaGVyZQogICAgICAgIGRldl9zZXRfZHJ2ZGF0YSgmZGV2LT5kZXYsIGRhdGEp OwogICAgICAgIF4KLS0tIGxpbnV4X2NvbXBvbmVudC5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L3NyYy9saW51eF9jb21wb25lbnQuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGlu dXgvY29tcG9uZW50Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9t b2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZp Y2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtw aS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xpZ2h0 Lmg6MTUyOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlvbiBvZiBmdW5jdGlvbiAnZGV2X2dl dF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJvciwtV2ltcGxpY2l0LWZ1bmN0aW9u LWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJmJsX2Rldi0+ZGV2 KTsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9jb21wb25l bnQuYzoxOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvY29tcG9uZW50Lmg6MTg6 CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50 LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9z eXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjIxMjoxOiBl cnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9mICdkZXZfZ2V0X2RydmRhdGEnIGZvbGxvd3Mgbm9u LXN0YXRpYyBkZWNsYXJhdGlvbgpkZXZfZ2V0X2RydmRhdGEoY29uc3Qgc3RydWN0IGRldmljZSAq ZGV2KQpeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9n cGx2Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjI0Mzo5OiBub3RlOiBwcmV2aW91cyBpbXBsaWNpdCBk ZWNsYXJhdGlvbiBpcyBoZXJlCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmZGV2LT5k ZXYpOwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2NvbXBv bmVudC5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2Ry bS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9jb21wb25lbnQuaDox ODoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJl bnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3Jj L3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6MjE5OjE6 IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRpb24gb2YgJ2Rldl9zZXRfZHJ2ZGF0YScgZm9sbG93cyBu b24tc3RhdGljIGRlY2xhcmF0aW9uCmRldl9zZXRfZHJ2ZGF0YShzdHJ1Y3QgZGV2aWNlICpkZXYs IHZvaWQgKmRhdGEpCl4KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xp bnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvaTJjLmg6MjQ5OjI6IG5vdGU6IHByZXZpb3VzIGlt cGxpY2l0IGRlY2xhcmF0aW9uIGlzIGhlcmUKICAgICAgICBkZXZfc2V0X2RydmRhdGEoJmRldi0+ ZGV2LCBkYXRhKTsKICAgICAgICBeCi0tLSBsaW51eF9kZXZpY2UubyAtLS0KSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9zcmMvbGludXhfZGV2aWNlLmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRl L2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2lu Y2x1ZGUvbGludXgvZGV2aWNlLmg6NDM4OjE6IGVycm9yOiBzdGF0aWMgZGVjbGFyYXRpb24gb2Yg J2RldmljZV91bnJlZ2lzdGVyJyBmb2xsb3dzIG5vbi1zdGF0aWMgZGVjbGFyYXRpb24KZGV2aWNl X3VucmVnaXN0ZXIoc3RydWN0IGRldmljZSAqZGV2KQpeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjIzNzoy OiBub3RlOiBwcmV2aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBoZXJlCiAgICAgICAgZGV2 aWNlX3VucmVnaXN0ZXIoJmNsaWVudC0+ZGV2KTsKICAgICAgICBeCi0tLSBsaW51eF9iYWNrbGln aHQubyAtLS0KMjAgZXJyb3JzIGdlbmVyYXRlZC4KLS0tIGxpbnV4X2NvbXBvbmVudC5vIC0tLQpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9jb21wb25lbnQuYzoxOgpJbiBmaWxlIGluY2x1 ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3Bp L2dwbHYyL2luY2x1ZGUvbGludXgvY29tcG9uZW50Lmg6MTg6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIv aW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2Nv bW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQzODoxOiBlcnJvcjogc3RhdGljIGRlY2xhcmF0 aW9uIG9mICdkZXZpY2VfdW5yZWdpc3RlcicgZm9sbG93cyBub24tc3RhdGljIGRlY2xhcmF0aW9u CmRldmljZV91bnJlZ2lzdGVyKHN0cnVjdCBkZXZpY2UgKmRldikKXgovdXNyL2xvY2FsL3N5cy9t b2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMu aDoyMzc6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVjbGFyYXRpb24gaXMgaGVyZQogICAg ICAgIGRldmljZV91bnJlZ2lzdGVyKCZjbGllbnQtPmRldik7CiAgICAgICAgXgotLS0gbGludXhf YmFja2xpZ2h0Lm8gLS0tCioqKiBbbGludXhfYmFja2xpZ2h0Lm9dIEVycm9yIGNvZGUgMQoKbWFr ZVs0XTogc3RvcHBlZCBpbiAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkKLS0tIGxpbnV4X2kyYy5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51 eF9pMmMuYzo5MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xp bnV4L2RldmljZS5oOjQ0OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2Qv bGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMTI6MTY6IGVycm9yOiBm aWVsZCBoYXMgaW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVjdCBk ZXZpY2UgZGV2OwogICAgICAgICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvc3lzL3R5cGVz Lmg6Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2aWNlJwp0 eXBlZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2aWNlX3Q7CiAgICAgICAgICAgICAgIF4KSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9zcmMvbGludXhfaTJjLmM6OTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9k ZXZpY2UuaDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51 eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0NDoKL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvYmFja2xp Z2h0Lmg6MTUyOjk6IGVycm9yOiBpbXBsaWNpdCBkZWNsYXJhdGlvbiBvZiBmdW5jdGlvbiAnZGV2 X2dldF9kcnZkYXRhJyBpcyBpbnZhbGlkIGluIEM5OSBbLVdlcnJvciwtV2ltcGxpY2l0LWZ1bmN0 aW9uLWRlY2xhcmF0aW9uXQogICAgICAgIHJldHVybiBkZXZfZ2V0X2RydmRhdGEoJmJsX2Rldi0+ ZGV2KTsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9z eXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL3NyYy9saW51eF9pMmMu Yzo5MjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2FjcGkuaDoyNjoKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21w YXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6MjEyOjE6IGVycm9yOiBz dGF0aWMgZGVjbGFyYXRpb24gb2YgJ2Rldl9nZXRfZHJ2ZGF0YScgZm9sbG93cyBub24tc3RhdGlj IGRlY2xhcmF0aW9uCmRldl9nZXRfZHJ2ZGF0YShjb25zdCBzdHJ1Y3QgZGV2aWNlICpkZXYpCl4K L3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2lu Y2x1ZGUvbGludXgvaTJjLmg6MjQzOjk6IG5vdGU6IHByZXZpb3VzIGltcGxpY2l0IGRlY2xhcmF0 aW9uIGlzIGhlcmUKICAgICAgICByZXR1cm4gZGV2X2dldF9kcnZkYXRhKCZkZXYtPmRldik7CiAg ICAgICAgICAgICAgIF4KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVs ZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfaTJjLmM6OTI6Cklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9hY3BpLmg6MjY6CkluIGZpbGUgaW5jbHVk ZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkv Z3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4 a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjIxOToxOiBlcnJvcjogc3RhdGljIGRl Y2xhcmF0aW9uIG9mICdkZXZfc2V0X2RydmRhdGEnIGZvbGxvd3Mgbm9uLXN0YXRpYyBkZWNsYXJh dGlvbgotLS0gbGludXhfaXJxLm8gLS0tCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2ly cS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3Bp L2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVycnVwdC5oOjM0OgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3Jj L3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6Ci0t LSBsaW51eF9pMmMubyAtLS0KZGV2X3NldF9kcnZkYXRhKHN0cnVjdCBkZXZpY2UgKmRldiwgdm9p ZCAqZGF0YSkKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyNDk6Mjogbm90ZTogcHJldmlvdXMgaW1wbGlj aXQgZGVjbGFyYXRpb24gaXMgaGVyZQotLS0gbGludXhfaXJxLm8gLS0tCi91c3IvbG9jYWwvc3lz L21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2Jh Y2tsaWdodC5oOjExMjoxNjogZXJyb3I6IGZpZWxkIGhhcyBpbmNvbXBsZXRlIHR5cGUgJ3N0cnVj dCBkZXZpY2UnCiAgICAgICAgc3RydWN0IGRldmljZSBkZXY7CiAgICAgICAgICAgICAgICAgICAg ICBeCi91c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndhcmQgZGVjbGFy YXRpb24gb2YgJ3N0cnVjdCBkZXZpY2UnCi0tLSBsaW51eF9pMmMubyAtLS0KICAgICAgICBkZXZf c2V0X2RydmRhdGEoJmRldi0+ZGV2LCBkYXRhKTsKICAgICAgICBeCi0tLSBsaW51eF9pcnEubyAt LS0KdHlwZWRlZiBzdHJ1Y3QgZGV2aWNlICAgKmRldmljZV90OwogICAgICAgICAgICAgICBeCklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvc3JjL2xpbnV4X2lycS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJv bSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVy cnVwdC5oOjM0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9k cm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoK SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9u L2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6Ci91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1 cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2JhY2tsaWdodC5oOjE1Mjo5 OiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24gb2YgZnVuY3Rpb24gJ2Rldl9nZXRfZHJ2ZGF0 YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3IsLVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJh dGlvbl0KICAgICAgICByZXR1cm4gZGV2X2dldF9kcnZkYXRhKCZibF9kZXYtPmRldik7CiAgICAg ICAgICAgICAgIF4KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMv ZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGludXhfaXJxLmM6MToKSW4gZmls ZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1 ZGUvbGludXgvaW50ZXJydXB0Lmg6MzQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRl L2xpbnV4L2RldmljZS5oOjIxMjoxOiBlcnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9mICdkZXZf Z2V0X2RydmRhdGEnIGZvbGxvd3Mgbm9uLXN0YXRpYyBkZWNsYXJhdGlvbgpkZXZfZ2V0X2RydmRh dGEoY29uc3Qgc3RydWN0IGRldmljZSAqZGV2KQpeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjI0Mzo5OiBu b3RlOiBwcmV2aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBoZXJlCiAgICAgICAgcmV0dXJu IGRldl9nZXRfZHJ2ZGF0YSgmZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhr cGkvZ3BsdjIvc3JjL2xpbnV4X2lycS5jOjE6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2ludGVycnVwdC5oOjM0 OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVu dC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKL3Vzci9zcmMv c3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9kZXZpY2UuaDoyMTk6MTog ZXJyb3I6IHN0YXRpYyBkZWNsYXJhdGlvbiBvZiAnZGV2X3NldF9kcnZkYXRhJyBmb2xsb3dzIG5v bi1zdGF0aWMgZGVjbGFyYXRpb24KZGV2X3NldF9kcnZkYXRhKHN0cnVjdCBkZXZpY2UgKmRldiwg dm9pZCAqZGF0YSkKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyNDk6Mjogbm90ZTogcHJldmlvdXMgaW1w bGljaXQgZGVjbGFyYXRpb24gaXMgaGVyZQogICAgICAgIGRldl9zZXRfZHJ2ZGF0YSgmZGV2LT5k ZXYsIGRhdGEpOwogICAgICAgIF4KLS0tIGxpbnV4X2dlbmFsbG9jLm8gLS0tCjE2IGVycm9ycyBn ZW5lcmF0ZWQuCi0tLSBsaW51eF9pMmMubyAtLS0KSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9zcmMvbGlu dXhfaTJjLmM6OTI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9hY3BpLmg6MjY6 CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50 LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9z eXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQzODoxOiBl cnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9mICdkZXZpY2VfdW5yZWdpc3RlcicgZm9sbG93cyBu b24tc3RhdGljIGRlY2xhcmF0aW9uCmRldmljZV91bnJlZ2lzdGVyKHN0cnVjdCBkZXZpY2UgKmRl dikKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9pMmMuaDoyMzc6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQgZGVj bGFyYXRpb24gaXMgaGVyZQogICAgICAgIGRldmljZV91bnJlZ2lzdGVyKCZjbGllbnQtPmRldik7 CiAgICAgICAgXgotLS0gbGludXhfZ2VuYWxsb2MubyAtLS0KKioqIFtsaW51eF9nZW5hbGxvYy5v XSBFcnJvciBjb2RlIDEKCm1ha2VbNF06IHN0b3BwZWQgaW4gL3Vzci9sb2NhbC9zeXMvbW9kdWxl cy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpCi0tLSBsaW51eF9pcnEubyAtLS0KSW4gZmlsZSBp bmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51 eGtwaS9ncGx2Mi9zcmMvbGludXhfaXJxLmM6MToKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Iv c3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvaW50ZXJydXB0Lmg6 MzQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJy ZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQzODox OiBlcnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9mICdkZXZpY2VfdW5yZWdpc3RlcicgZm9sbG93 cyBub24tc3RhdGljIGRlY2xhcmF0aW9uCmRldmljZV91bnJlZ2lzdGVyKHN0cnVjdCBkZXZpY2Ug KmRldikKXgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkv Z3BsdjIvaW5jbHVkZS9saW51eC9pMmMuaDoyMzc6Mjogbm90ZTogcHJldmlvdXMgaW1wbGljaXQg ZGVjbGFyYXRpb24gaXMgaGVyZQogICAgICAgIGRldmljZV91bnJlZ2lzdGVyKCZjbGllbnQtPmRl dik7CiAgICAgICAgXgotLS0gbGludXhfZGV2aWNlLm8gLS0tCjE2IGVycm9ycyBnZW5lcmF0ZWQu Ci0tLSBsaW51eF9jb21wb25lbnQubyAtLS0KMTYgZXJyb3JzIGdlbmVyYXRlZC4KLS0tIGxpbnV4 X2RldmljZS5vIC0tLQoqKiogW2xpbnV4X2RldmljZS5vXSBFcnJvciBjb2RlIDEKCm1ha2VbNF06 IHN0b3BwZWQgaW4gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpCi0tLSBsaW51eF9jb21wb25lbnQubyAtLS0KKioqIFtsaW51eF9jb21wb25lbnQub10gRXJy b3IgY29kZSAxCgptYWtlWzRdOiBzdG9wcGVkIGluIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJt LWN1cnJlbnQta21vZC9saW51eGtwaQotLS0gZG1hLWJ1Zi5vIC0tLQpJbiBmaWxlIGluY2x1ZGVk IGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1h LWJ1Zi8vZG1hLWJ1Zi5jOjUzOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1h LWJ1Zi5oOjMyOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9k cm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcu aDo0OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9j b21tb24vaW5jbHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZy b20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3Jj L3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6Cklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBp bmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51 eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9wY2kuaDoxMDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24v aW5jbHVkZS9saW51eC9wY2kuaDoyMDM6MjQ6IGVycm9yOiBmaWVsZCBoYXMgaW5jb21wbGV0ZSB0 eXBlICdzdHJ1Y3QgZGV2aWNlX2RyaXZlcicKICAgICAgICBzdHJ1Y3QgZGV2aWNlX2RyaXZlciAg ICAgICAgICAgIGRyaXZlcjsKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg IF4KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYy L2luY2x1ZGUvbGludXgvaTJjLmg6MjAxOjk6IG5vdGU6IGZvcndhcmQgZGVjbGFyYXRpb24gb2Yg J3N0cnVjdCBkZXZpY2VfZHJpdmVyJwogICAgICAgIHN0cnVjdCBkZXZpY2VfZHJpdmVyIGRyaXZl cjsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1hLWJ1Zi8vZG1hLWJ1Zi5jOjUzOgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLWJ1Zi5oOjMyOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDo0OgpJbiBmaWxlIGluY2x1ZGVk IGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9k bWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNl Lmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkv Y29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVz L2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9wY2kuaDoxMDoK L3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9wY2kuaDoy MzM6MTc6IGVycm9yOiBmaWVsZCBoYXMgaW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwog ICAgICAgIHN0cnVjdCBkZXZpY2UgICAgICAgICAgIGRldjsKICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICBeCi91c3Ivc3JjL3N5cy9zeXMvdHlwZXMuaDoyNzU6MTY6IG5vdGU6IGZvcndh cmQgZGVjbGFyYXRpb24gb2YgJ3N0cnVjdCBkZXZpY2UnCnR5cGVkZWYgc3RydWN0IGRldmljZSAg ICpkZXZpY2VfdDsKICAgICAgICAgICAgICAgXgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9s b2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1hLWJ1Zi8vZG1hLWJ1 Zi5jOjUzOgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0t Y3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLWJ1Zi5oOjMyOgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDo0OgpJbiBmaWxl IGluY2x1ZGVkIGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVk ZS9saW51eC9kbWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2Nh bC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGlu dXgvZGV2aWNlLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQv bGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVk ZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkv Z3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9p bmNsdWRlL2xpbnV4L2ZiLmg6MTA6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5 cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9w Y2kuaDoxMDoKL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51 eC9wY2kuaDozMzE6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdk ZXZfZ2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVu Y3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmcGRldi0+ ZGV2KTsKICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1v bi9pbmNsdWRlL2xpbnV4L3BjaS5oOjMzODoyOiBlcnJvcjogaW1wbGljaXQgZGVjbGFyYXRpb24g b2YgZnVuY3Rpb24gJ2Rldl9zZXRfZHJ2ZGF0YScgaXMgaW52YWxpZCBpbiBDOTkgWy1XZXJyb3Is LVdpbXBsaWNpdC1mdW5jdGlvbi1kZWNsYXJhdGlvbl0KICAgICAgICBkZXZfc2V0X2RydmRhdGEo JnBkZXYtPmRldiwgZGF0YSk7CiAgICAgICAgXgotLS0gbGludXhfYWNwaS5vIC0tLQoxNiBlcnJv cnMgZ2VuZXJhdGVkLgoqKiogW2xpbnV4X2FjcGkub10gRXJyb3IgY29kZSAxCgptYWtlWzRdOiBz dG9wcGVkIGluIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aQotLS0gZG1hLWJ1Zi5vIC0tLQpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMv bW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2RyaXZlcnMvZG1hLWJ1Zi8vZG1hLWJ1Zi5jOjUzOgpJ biBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLWJ1Zi5oOjMyOgpJbiBmaWxlIGlu Y2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4 a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDo0OgpJbiBmaWxlIGluY2x1ZGVk IGZyb20gL3Vzci9zcmMvc3lzL2NvbXBhdC9saW51eGtwaS9jb21tb24vaW5jbHVkZS9saW51eC9k bWEtbWFwcGluZy5oOjM1OgpJbiBmaWxlIGluY2x1ZGVkIGZyb20gL3Vzci9sb2NhbC9zeXMvbW9k dWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvZGV2aWNl Lmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkv Y29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2ZiLmg6MTA6Ci91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51 eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L3BjaS5oOjE3NDoxMDogZXJyb3I6IGltcGxpY2l0IGRl Y2xhcmF0aW9uIG9mIGZ1bmN0aW9uICdkbWFfYWxsb2NfY29oZXJlbnQnIGlzIGludmFsaWQgaW4g Qzk5IFstV2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0 dXJuIChkbWFfYWxsb2NfY29oZXJlbnQoaHdkZXYgPT0gTlVMTCA/IE5VTEwgOiAmaHdkZXYtPmRl diwgc2l6ZSwKICAgICAgICAgICAgICAgIF4KLS0tIGxpbnV4X2lycS5vIC0tLQoxNiBlcnJvcnMg Z2VuZXJhdGVkLgoqKiogW2xpbnV4X2lycS5vXSBFcnJvciBjb2RlIDEKCm1ha2VbNF06IHN0b3Bw ZWQgaW4gL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1rbW9kL2xpbnV4a3BpCi0t LSBsaW51eF9pMmMubyAtLS0KMTYgZXJyb3JzIGdlbmVyYXRlZC4KLS0tIGRtYS1idWYubyAtLS0K SW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQt a21vZC9kcml2ZXJzL2RtYS1idWYvL2RtYS1idWYuYzo1MzoKSW4gZmlsZSBpbmNsdWRlZCBmcm9t IC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9p bmNsdWRlL2xpbnV4L2RtYS1idWYuaDozMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2RtYS1tYXBwaW5nLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9j b21wYXQvbGludXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDozNToKSW4g ZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21v ZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVk ZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4 L2RldmljZS5oOjQ0OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGlu dXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxMTI6MTY6IGVycm9yOiBmaWVs ZCBoYXMgaW5jb21wbGV0ZSB0eXBlICdzdHJ1Y3QgZGV2aWNlJwogICAgICAgIHN0cnVjdCBkZXZp Y2UgZGV2OwogICAgICAgICAgICAgICAgICAgICAgXgovdXNyL3NyYy9zeXMvc3lzL3R5cGVzLmg6 Mjc1OjE2OiBub3RlOiBmb3J3YXJkIGRlY2xhcmF0aW9uIG9mICdzdHJ1Y3QgZGV2aWNlJwp0eXBl ZGVmIHN0cnVjdCBkZXZpY2UgICAqZGV2aWNlX3Q7CiAgICAgICAgICAgICAgIF4KSW4gZmlsZSBp bmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9kcml2 ZXJzL2RtYS1idWYvL2RtYS1idWYuYzo1MzoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2RtYS1idWYuaDozMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21v ZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1t YXBwaW5nLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGlu dXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDozNToKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5o OjQ0OgovdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3Bs djIvaW5jbHVkZS9saW51eC9iYWNrbGlnaHQuaDoxNTI6OTogZXJyb3I6IGltcGxpY2l0IGRlY2xh cmF0aW9uIG9mIGZ1bmN0aW9uICdkZXZfZ2V0X2RydmRhdGEnIGlzIGludmFsaWQgaW4gQzk5IFst V2Vycm9yLC1XaW1wbGljaXQtZnVuY3Rpb24tZGVjbGFyYXRpb25dCiAgICAgICAgcmV0dXJuIGRl dl9nZXRfZHJ2ZGF0YSgmYmxfZGV2LT5kZXYpOwogICAgICAgICAgICAgICBeCkluIGZpbGUgaW5j bHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvZHJpdmVy cy9kbWEtYnVmLy9kbWEtYnVmLmM6NTM6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9kbWEtYnVmLmg6MzI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kbWEtbWFw cGluZy5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4 a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6MzU6CkluIGZpbGUgaW5jbHVk ZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkv Z3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3NyYy9zeXMvY29tcGF0L2xpbnV4 a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjIxMjoxOiBlcnJvcjogc3RhdGljIGRl Y2xhcmF0aW9uIG9mICdkZXZfZ2V0X2RydmRhdGEnIGZvbGxvd3Mgbm9uLXN0YXRpYyBkZWNsYXJh dGlvbgpkZXZfZ2V0X2RydmRhdGEoY29uc3Qgc3RydWN0IGRldmljZSAqZGV2KQpeCi91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2kyYy5oOjI0Mzo5OiBub3RlOiBwcmV2aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBo ZXJlCiAgICAgICAgcmV0dXJuIGRldl9nZXRfZHJ2ZGF0YSgmZGV2LT5kZXYpOwogICAgICAgICAg ICAgICBeCkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvZHJpdmVycy9kbWEtYnVmLy9kbWEtYnVmLmM6NTM6CkluIGZpbGUgaW5jbHVk ZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkv Z3BsdjIvaW5jbHVkZS9saW51eC9kbWEtYnVmLmg6MzI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9kbWEtbWFwcGluZy5oOjQ6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RtYS1tYXBwaW5nLmg6 MzU6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJy ZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51eC9kZXZpY2UuaDo0OgovdXNyL3Ny Yy9zeXMvY29tcGF0L2xpbnV4a3BpL2NvbW1vbi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjIxOTox OiBlcnJvcjogc3RhdGljIGRlY2xhcmF0aW9uIG9mICdkZXZfc2V0X2RydmRhdGEnIGZvbGxvd3Mg bm9uLXN0YXRpYyBkZWNsYXJhdGlvbgpkZXZfc2V0X2RydmRhdGEoc3RydWN0IGRldmljZSAqZGV2 LCB2b2lkICpkYXRhKQpeCi91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9s aW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2kyYy5oOjI0OToyOiBub3RlOiBwcmV2aW91cyBp bXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBoZXJlCiAgICAgICAgZGV2X3NldF9kcnZkYXRhKCZkZXYt PmRldiwgZGF0YSk7CiAgICAgICAgXgotLS0gbGludXhfaTJjLm8gLS0tCioqKiBbbGludXhfaTJj Lm9dIEVycm9yIGNvZGUgMQoKbWFrZVs0XTogc3RvcHBlZCBpbiAvdXNyL2xvY2FsL3N5cy9tb2R1 bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkKLS0tIGRtYS1idWYubyAtLS0KSW4gZmlsZSBp bmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9kcml2 ZXJzL2RtYS1idWYvL2RtYS1idWYuYzo1MzoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2RtYS1idWYuaDozMjoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21v ZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RtYS1t YXBwaW5nLmg6NDoKSW4gZmlsZSBpbmNsdWRlZCBmcm9tIC91c3Ivc3JjL3N5cy9jb21wYXQvbGlu dXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDozNToKSW4gZmlsZSBpbmNs dWRlZCBmcm9tIC91c3IvbG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtw aS9ncGx2Mi9pbmNsdWRlL2xpbnV4L2RldmljZS5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGlu dXhrcGkvY29tbW9uL2luY2x1ZGUvbGludXgvZGV2aWNlLmg6NDM4OjE6IGVycm9yOiBzdGF0aWMg ZGVjbGFyYXRpb24gb2YgJ2RldmljZV91bnJlZ2lzdGVyJyBmb2xsb3dzIG5vbi1zdGF0aWMgZGVj bGFyYXRpb24KZGV2aWNlX3VucmVnaXN0ZXIoc3RydWN0IGRldmljZSAqZGV2KQpeCi91c3IvbG9j YWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaS9ncGx2Mi9pbmNsdWRlL2xp bnV4L2kyYy5oOjIzNzoyOiBub3RlOiBwcmV2aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBo ZXJlCiAgICAgICAgZGV2aWNlX3VucmVnaXN0ZXIoJmNsaWVudC0+ZGV2KTsKICAgICAgICBeCklu IGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWtt b2QvZHJpdmVycy9kbWEtYnVmLy9kbWEtYnVmLmM6NTM6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAv dXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5j bHVkZS9saW51eC9kbWEtYnVmLmg6MzI6CkluIGZpbGUgaW5jbHVkZWQgZnJvbSAvdXNyL2xvY2Fs L3N5cy9tb2R1bGVzL2RybS1jdXJyZW50LWttb2QvbGludXhrcGkvZ3BsdjIvaW5jbHVkZS9saW51 eC9kbWEtbWFwcGluZy5oOjQ6Ci91c3Ivc3JjL3N5cy9jb21wYXQvbGludXhrcGkvY29tbW9uL2lu Y2x1ZGUvbGludXgvZG1hLW1hcHBpbmcuaDoxNDQ6MTogZXJyb3I6IHN0YXRpYyBkZWNsYXJhdGlv biBvZiAnZG1hX2FsbG9jX2NvaGVyZW50JyBmb2xsb3dzIG5vbi1zdGF0aWMgZGVjbGFyYXRpb24K ZG1hX2FsbG9jX2NvaGVyZW50KHN0cnVjdCBkZXZpY2UgKmRldiwgc2l6ZV90IHNpemUsIGRtYV9h ZGRyX3QgKmRtYV9oYW5kbGUsCl4KL3Vzci9sb2NhbC9zeXMvbW9kdWxlcy9kcm0tY3VycmVudC1r bW9kL2xpbnV4a3BpL2dwbHYyL2luY2x1ZGUvbGludXgvcGNpLmg6MTc0OjEwOiBub3RlOiBwcmV2 aW91cyBpbXBsaWNpdCBkZWNsYXJhdGlvbiBpcyBoZXJlCiAgICAgICAgcmV0dXJuIChkbWFfYWxs b2NfY29oZXJlbnQoaHdkZXYgPT0gTlVMTCA/IE5VTEwgOiAmaHdkZXYtPmRldiwgc2l6ZSwKICAg ICAgICAgICAgICAgIF4KMTcgZXJyb3JzIGdlbmVyYXRlZC4KKioqIFtkbWEtYnVmLm9dIEVycm9y IGNvZGUgMQoKbWFrZVs0XTogc3RvcHBlZCBpbiAvdXNyL2xvY2FsL3N5cy9tb2R1bGVzL2RybS1j dXJyZW50LWttb2QvbGludXhrcGkKMTIgZXJyb3JzCgptYWtlWzRdOiBzdG9wcGVkIGluIC91c3Iv bG9jYWwvc3lzL21vZHVsZXMvZHJtLWN1cnJlbnQta21vZC9saW51eGtwaQoqKiogW21vZHVsZXMt YWxsXSBFcnJvciBjb2RlIDIKCm1ha2VbMl06IHN0b3BwZWQgaW4gL3Vzci9vYmovdXNyL3NyYy9h bWQ2NC5hbWQ2NC9zeXMvR0VORVJJQy1OT0RFQlVHCi0tLSBrZXJuZWwuZnVsbCAtLS0KICAgICAg dGV4dCAgICAgIGRhdGEgICAgICAgYnNzICAgICAgICBkZWMgICAgICAgICBoZXggICBmaWxlbmFt ZQogIDIyMDM5MDIzICAgMTc2MDQ0NiAgIDQ1MjQ5MjggICAyODMyNDM5NyAgIDB4MWIwMzIyZCAg IGtlcm5lbC5mdWxsCjEgZXJyb3IKCm1ha2VbMl06IHN0b3BwZWQgaW4gL3Vzci9vYmovdXNyL3Ny Yy9hbWQ2NC5hbWQ2NC9zeXMvR0VORVJJQy1OT0RFQlVHCg== --0000000000000af21505b0b9afa8-- From owner-freebsd-current@freebsd.org Sat Oct 3 08:36:33 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9778D3FF8BD for ; Sat, 3 Oct 2020 08:36:33 +0000 (UTC) (envelope-from manu@bidouilliste.com) Received: from mx.blih.net (mx.blih.net [212.83.155.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mx.blih.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3Kw068SZz42Ks for ; Sat, 3 Oct 2020 08:36:32 +0000 (UTC) (envelope-from manu@bidouilliste.com) Received: from amy.home (lfbn-idf2-1-288-247.w82-123.abo.wanadoo.fr [82.123.126.247]) by mx.blih.net (OpenSMTPD) with ESMTPSA id b3cde687 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO); Sat, 3 Oct 2020 08:36:30 +0000 (UTC) Date: Sat, 3 Oct 2020 10:36:30 +0200 From: Emmanuel Vadot To: Patrick McMunn Cc: freebsd-current@freebsd.org Subject: Re: Build failure Message-Id: <20201003103630.b93bcef3cf5ea163cbd4b03d@bidouilliste.com> In-Reply-To: References: X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd13.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4C3Kw068SZz42Ks X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.38 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[bidouilliste.com:s=mx]; FREEFALL_USER(0.00)[manu]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx:c]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; NEURAL_HAM_LONG(-1.03)[-1.028]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[bidouilliste.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[bidouilliste.com,none]; NEURAL_HAM_SHORT(-0.83)[-0.826]; NEURAL_HAM_MEDIUM(-1.03)[-1.030]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:12876, ipnet:212.83.128.0/19, country:FR]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-current] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 08:36:33 -0000 On Fri, 2 Oct 2020 19:53:44 -0500 Patrick McMunn wrote: > I update the sources today and ran "make -j24 buildworld buildkernel > KERNCONF=GENERIC-NODEBUG", and the build failed. I made sure to "make > clean" and "make cleanworld" and try again, and I got the same result. > > -- > Patrick McMunn > > - Learn more about the Catholic Faith: http://www.catholic.com/ > - Pray with the Church: http://www.universalis.com/ Hi, You need to update your ports tree. the drm-current-kmod ports install it's sources so the module will be rebuilt when you build a kernel. This works as long as no changes in base need changes in those sources too. If there is needed changes in drm-kmod sources this unfortunatelly fails to compile, not much we can do here. Cheers, -- Emmanuel Vadot From owner-freebsd-current@freebsd.org Sat Oct 3 14:06:46 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D0E4542F8C3 for ; Sat, 3 Oct 2020 14:06:46 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3TF255hNz4P3t; Sat, 3 Oct 2020 14:06:46 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id 78E202AE6C; Sat, 3 Oct 2020 14:06:46 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id 6B7384AF96; Sat, 3 Oct 2020 16:06:44 +0200 (CEST) From: "Kristof Provost" To: "Alexander Leidinger" Cc: "Shawn Webb" , "FreeBSD Current" Subject: Re: iflib/bridge kernel panic Date: Sat, 03 Oct 2020 16:06:43 +0200 X-Mailer: MailMate (1.13.2r5673) Message-ID: In-Reply-To: <20200930135225.Horde.nVCxwqfnkoJfolbDU0hqqXf@webmail.leidinger.net> References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> <20200930135225.Horde.nVCxwqfnkoJfolbDU0hqqXf@webmail.leidinger.net> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 14:06:46 -0000 On 30 Sep 2020, at 13:52, Alexander Leidinger wrote: > Quoting Kristof Provost (from Tue, 29 Sep 2020 = > 23:20:44 +0200): > >> On 28 Sep 2020, at 16:44, Alexander Leidinger wrote: >> >>> Quoting Kristof Provost (from Mon, 28 Sep 2020 = >>> 13:53:16 +0200): >>> >>>> On 28 Sep 2020, at 12:45, Alexander Leidinger wrote: >>>>> Quoting Kristof Provost (from Sun, 27 Sep 2020 = >>>>> 17:51:32 +0200): >>>>>> Here=E2=80=99s an early version of a task queue based approach: = >>>>>> http://people.freebsd.org/~kp/0001-bridge-Cope-with-if_ioctl-s-tha= t-sleep.patch >>>>>> >>>>>> That still needs to be cleaned up, but this should resolve the = >>>>>> sleep issue and the LOR. >>>>> >>>>> There are some issues... seems like inside a jail I can't ping = >>>>> systems outside of the hardware. >>>>> >>>>> Bridge setup: >>>>> - member jail A >>>>> - member jail B >>>>> - member external_if of host >>>>> >>>>> If I ping the router from the host, it works. If I ping from one = >>>>> jail to another, it works. If I ping from the jail to the IP of = >>>>> the external_if, it works. If I ping from a jail to the router, I = >>>>> do not get a response. >>>>> >>>> Can you check for 'failed ifpromisc' error messages in dmesg? And = >>>> verify that all bridge member interfaces are in promiscuous mode? >>> >>> I have a panic for you...: >>> - startup still in progress =3D 22 jails in startup, somewhere after = a = >>> few jails started the panic happened >>> - tcpdump was running on the external interface >>> - a ping to a jail IP from another system was running, the first = >>> ping went through, then it paniced >>> >>> First regarding your questions about promisc mode: no error, but the = >>> promisc mode is directly disabled again on all interfaces. >>> >> I think I see why you had issues with the promiscuous setting. I=E2=80= =99ve = >> updated the patch to be even more horrific than it was before. > > Hmmm.... same behavior as before. > I haven't kept the old version of the patch, so I can't compare if I = > somehow downloaded the old version again, or if I got the updated = > one... > Okay, let=E2=80=99s abandon that patch. It=E2=80=99s ugly and it doesn=E2= =80=99t work. Here=E2=80=99s a different approach that I=E2=80=99m much happier with. https://people.freebsd.org/~kp/0001-bridge-Call-member-interface-ioctl-wi= thout-NET_EPOCH.patch It passes the regression tests with WITNESS and INVARIANTS enabled, and = a hack in the epair ioctl() handler to make it sleep (to look a bit like = the Intel ioctl() handler that currently trips up if_bridge). Best, Kristof From owner-freebsd-current@freebsd.org Sat Oct 3 15:37:42 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E404E4314D3 for ; Sat, 3 Oct 2020 15:37:42 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (mailgate.leidinger.net [IPv6:2a00:1828:2000:313::1:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3WFx3lpHz4TXG; Sat, 3 Oct 2020 15:37:41 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p508d42e7.dip0.t-ipconnect.de [80.141.66.231]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 412266DF; Sat, 3 Oct 2020 17:37:38 +0200 (CEST) Received: from webmail.leidinger.net (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 50F6B7482; Sat, 3 Oct 2020 17:37:18 +0200 (CEST) Date: Sat, 03 Oct 2020 17:37:16 +0200 Message-ID: <20201003173716.Horde.Fjm6kXI836h4ZCLH5SwQkST@webmail.leidinger.net> From: Alexander Leidinger To: Kristof Provost Cc: Shawn Webb , FreeBSD Current Subject: Re: iflib/bridge kernel panic References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> <20200930135225.Horde.nVCxwqfnkoJfolbDU0hqqXf@webmail.leidinger.net> In-Reply-To: Accept-Language: de,en Content-Type: multipart/signed; boundary="=_KztO-z1lELf1v4cDVqtaBWx"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 X-Rspamd-Queue-Id: 4C3WFx3lpHz4TXG X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.35 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; NEURAL_HAM_MEDIUM(-1.02)[-1.019]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.03)[-1.034]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; NEURAL_HAM_SHORT(-0.20)[-0.202]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:2a00:1828::/32, country:DE]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RECEIVED_SPAMHAUS_PBL(0.00)[80.141.66.231:received] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 15:37:42 -0000 This message is in MIME format and has been PGP signed. --=_KztO-z1lELf1v4cDVqtaBWx Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting Kristof Provost (from Sat, 03 Oct 2020=20=20 16:06:43=20+0200): > Okay, let=E2=80=99s abandon that patch. It=E2=80=99s ugly and it doesn=E2= =80=99t work. > > Here=E2=80=99s a different approach that I=E2=80=99m much happier with. > https://people.freebsd.org/~kp/0001-bridge-Call-member-interface-ioctl-wi= thout-NET_EPOCH.patch > > It passes the regression tests with WITNESS and INVARIANTS enabled,=20=20 >=20and a hack in the epair ioctl() handler to make it sleep (to look a=20= =20 >=20bit like the Intel ioctl() handler that currently trips up if_bridge). Works for me. No crash, no LOR, promisc-mode stays enabled, jails are reachable. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_KztO-z1lELf1v4cDVqtaBWx Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJfeJqsAAoJEBINsJsD+NiGdHwP/3ClGTg9sSCB8duFcZx9cXg3 Tufy1EPUxcVafZOMWIuyL6VMP/q/Viq7jlJ2+WS5P9oc/SDkG7O0Qup1AU4ODL++ cQM4xduBuOphHeeVk1A/I1zHRCqDNXDRytQfCSqClFrP3I9pLj0twOgzNblv2t8E AmqtxhEI1kJVD2iPEzpTUlNXiqFJ4QKbqrUgXx7WOyUiAVy3flpr+UWxnE9Rxe6k dvwlrJMgMAI7KOpqR9MK4MM82t9jlSLtDqZNMnKGbLsQfEI9md/s9c++KbLHfNjO jjMvG97C0CE4qIbeQOeAh+Th6XubzeKfqWfWNJmU8RAXFW2hHbVuJXXxp13KCRQB WzCPpYU3WRXdaeFz3aYHRHRq75tC1nxlI1ZyXmGUkEdvsdOLQ9pRiDOgpzVlAePI /WFgmNvxobaJWuNX/3+JAiDtxCTkeFLfyb99On0aZP6pAIyvMjPrj9m8K6mM1SW3 YnMMq2fcjcyt2UZyXYWKYuhIa6AK+uRvGunkQcqIw9DNpqPAp8JV46BqjpV/NZNx IfHSv2p2VlvdBMme9NCW15s23bYU6ZFFdW8fSD3lgDGd7Ko7GSnOMb4/KW+8kSu2 CtlXr+G+EI/70DiaLwrv2rB0A8y0iLPqJLIP/4dZr3pLoshztAjGPQYgJEHati1L 74hNQBIgBBYJGx0R+FV5 =xk1s -----END PGP SIGNATURE----- --=_KztO-z1lELf1v4cDVqtaBWx-- From owner-freebsd-current@freebsd.org Sat Oct 3 19:53:47 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 00F3B436B19 for ; Sat, 3 Oct 2020 19:53:47 +0000 (UTC) (envelope-from fkr@hazardous.org) Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3cxP1QG2z3Vwm; Sat, 3 Oct 2020 19:53:44 +0000 (UTC) (envelope-from fkr@hazardous.org) Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 427835C007E; Sat, 3 Oct 2020 15:53:42 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sat, 03 Oct 2020 15:53:42 -0400 X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrfeekgddugeefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepuffvfhfhkffffgggjggtgfesthekredttdefjeenucfhrhhomhephfgvlhhi gicumfhrohhnlhgrghgvqdffrghmmhgvrhhsuceofhhkrheshhgriigrrhguohhushdroh hrgheqnecuggftrfgrthhtvghrnhepkeeihfefudelgfdutddutefffeevudejteetkedt ledtffduvedttdefvdejgfefnecuffhomhgrihhnpehfrhgvvggsshgurdhorhhgpdhhrg iirghrughouhhsrdhorhhgnecukfhppeejjedrvddvrddtrddvgeegnecuvehluhhsthgv rhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepfhhkrheshhgriigrrhguoh hushdrohhrgh X-ME-Proxy: Received: from badwater.local (ip4d1600f4.dynamic.kabel-deutschland.de [77.22.0.244]) by mail.messagingengine.com (Postfix) with ESMTPA id 4A4F03280059; Sat, 3 Oct 2020 15:53:41 -0400 (EDT) Subject: Re: iflib/bridge kernel panic To: Alexander Leidinger Cc: Kristof Provost , FreeBSD Current References: <58CADEBB-64FD-414E-AB19-E4F8D3CABCA5@FreeBSD.org> <20200921121627.3dovpumnl6xub3kn@mutt-hbsd> <7FE1F106-2CEE-4692-95D0-14C5229ED768@FreeBSD.org> <20200928124531.Horde.0EjsBzIG5ktLzby_tFcoPPS@webmail.leidinger.net> <33903BFF-4158-4CD9-AD79-360BCD81F1C9@FreeBSD.org> <20200928164410.Horde.mYBkuEeD_Q6xgnKnwNomv7P@webmail.leidinger.net> <6A5EFCFA-C0DC-4DEF-834B-2F9E4FCC8812@FreeBSD.org> <20200930135225.Horde.nVCxwqfnkoJfolbDU0hqqXf@webmail.leidinger.net> <20201003173716.Horde.Fjm6kXI836h4ZCLH5SwQkST@webmail.leidinger.net> From: Felix Kronlage-Dammers Autocrypt: addr=fkr@hazardous.org; keydata= mQINBF1zTf8BEADapIdKl74k6S+5eJCEcfbOqeAa1MTnWdZyTq46oC9X0TbxEoSA1CLSqyv4 ukLQbWzfE+2FIYb30dNUrp6iZ+4mo5s7KQpJ3L2sqiLJ9sdwJZePKnyw2JokRxsdsX78/aLF AJgaLKu946k9fHeudMaTt2WxYaf3y1GSBbsg3NF7n4jT3rrfUESCs0nfFo7PEl00IiRGWOn1 n8oHlK3nengBQrMJBs+ilA1CzJPebIeIu8FxbuBOoaOC9bkxyENwUJrETrNGQqWJz2MWL04+ 7kBhxyWVaKbpD9dzaAznLOmWStVH8cP2Ik08s5LsaCfxclZ4l/Dhx6Z0M3gmfGK8tMmFMTOl pSKIi4CcYnnwS4K/bmNoU0jFMJx1bGwFFFjvDg86wmHDcINj5fi5eFgSudja2vw/Keski1YV Jz8bk/adu5+faZxIdBIaVMDDJWEyw9OnzguFq4aQMQnwcQuinrfBAM4EMguAMZeyjCM89Y2w UeRgDGwkN09AGlH1XZhyOJHsbOEicKz5xDNlYJn6Vq1nuz4TEEoOIMRaFA5dUO2j4aHp5Gnu x4FZD+IlyifYoaNOleZitNVtoCm9tpmvEWjqDYzsNUEcIMgHLonetxmfLmFbgnuRTN298LZC 5l3Ry5uCWc9MzZ2hJj99npVX0FxgiQNYt/YxANa0e+AvZAIzdQARAQABtCpGZWxpeCBLcm9u bGFnZS1EYW1tZXJzIDxma3JAaGF6YXJkb3VzLm9yZz6JAlcEEwEKAEECGwMFCQeGH4AFCwkI BwMFFQoJCAsFFgIDAQACHgECF4AWIQQggmUeUQT5iU0Yuy4LJmc4gkzg8AUCXXNOMwIZAQAK CRALJmc4gkzg8CqeEAC7Q4pjqkFl1sl0KeQMcndnm1ywPUk2Np4eKyb5z14jwquv1/ZwGLz8 Qal8Kmx6TBaiTc0wrKuLLqt01IYK5WgzZgEPkvPHpOwYuXdgC/YJPFnhMeGkvu5YbBRIXzCO 7jqWPOL2gqLi0VZi3dGcnPwJjf4KbK1crHpkIW0/UnhBRwxaCY64/EhhBaONgYme4YbPGeN2 kDntc2/XJDt/fElVV6UW8CsH2tkhOzBwgi0R8sBjOKog3ZKfSZjQpv+UicqagVgvbLsWzDf6 jeKStyYq68wmOXWW11yZQRkxayblFSrescGyzcHZp46sDJHAY9Zw2DncrahSJy2GXN1ZteSV mf/WgFxFQIaZ/7UcajGKeHofSFI03RPIFPTcO6Q2tGO4S/XX6liOqt/rn3vmOHPFQ7raOWl5 xIC6FYky4Zm2eHhZs02V4ZOek2sfuS7U04+oRaulwe1HiLKNeYsycs+rSd7mb4z/2qNSuaSj Mb3OIsvNhxO9OvZQR5SFBL33cUMYokLf3zgCwA18Iw/DkOoP7/CYG6vOBy9Oko+7qIsONuLJ I02OGaMMXff1FG3dKN9TWsGxh4mFVM5kGmqyWaMnZ5ZCjSFTCr3p5kHqX8gRA38y02hkGMB6 HmZN+UZD7y2qN94y8espHuC342HxNDm5cjQ7PvTT7mqRq0SfWqkIL7kCDQRdc03/ARAAp8+L KCaEyJAjcCPYXte7nbIEDNVG+kqM6xE6zRc/X3FgUkxFguhTe7+qtmWSkaH9j3CGoXu0FqzF XtWk2CX+049fZKadhsHj9T2qnCLz7dwIM3AKiS9oUAMC/ZDlKja8XFccCPz5NEj3uYqGCyEw beiZtzNakku++tLp3vRL4kjMgNjDHVBXREzpGCm57ICKIp1eHf8ZT/ovzlvgtpsrA6gMxhdL GS4ggL2cwZo2QBHVrR2f3B09Ow0zRaoUiMuM893FLrEHN6PxWBBGkMxCOmhukB0UAVfW6Rsr ANBJuLzY2lZIDLc6xnEToAwfLBJmWT4RGfjKZ/P+8VOEftYwEbNWC2locgsw7cZyDmugjzSg X0j/YpnfBoL4STdA9uxaRc62PqOEpkcGvrP2Tsh6uV0Wq4feUK+msAB0iKUdwckGkmVYhDGC cG0VxoPwCY2TNf/1uIpu38X96R2ejA62Jd5Z9hh19SBzldRB4ppVA5Q3J28Q7YtBzNsw++nY b9enukCZkUVujyedaCPl0/ZHlJoxZ5IDQ30uaQvGgEGHVLvRiuxyP7cqgFzVKHJLjCrCsjOk EIfVOQCuLj3iMt8smSc8h0W5DegBBl9pJ39Gp4fQzCwiU4YZV1UQ2wdOLiNPPtWK+Q8jtds0 ZhWKRc5BLdOYDsqPdGHx1L66X06o2KcAEQEAAYkCPAQYAQoAJhYhBCCCZR5RBPmJTRi7Lgsm ZziCTODwBQJdc03/AhsMBQkHhh+AAAoJEAsmZziCTODwrrsP/jvlYjGa5JSKpZbkIbLiHw4M RId9ZKjiP9FL1AyCSCaxeYXIJ996krAvcXKRjlBOsgcIjG3oAPq0V3tjFGRQPJ821cgCTaWW xIrGk1ULafW/qWGzYS6rAUgh+KvsXgrdPq99l/yFIgkOF2ysr4f2gc2+JF0UKjIDggM1bShD veuvRVLyXZCK+Qi+8/Mq/HoOxDJES2oxxhpdIEn9eleb0j0n6iCMBRq2oF9HhMyaH2OEq7ri xGggKTRAFq0Oh0IOQSp1EqeoVPyUMQC8QSzxFCoQ/bPUpGIQcS//6owzhinkvrS3Dfc7sBau H1it6LqKO6wnRpJazO13GqD2ireYH1Qw4Ct7l3SnuMNHUL7/48Qurv2jz0OdA+eHwSoKRnoe U1AckNXqPhXtntsj1XhQ+pn0S+Pha/1+e90klgd8ZtG2k9Ew7JIVTK4KAtFsJGCtbK46sqnM yOqw1TzjMova0pyO79jLs3Jv3e1ZA6kCxY5q58oYPvDUoAUiZ8rQZBOtv+Fyjz+6aAoPCfta O9VC4rxK4ZyaXkyEQVSQCXrAtXSYeBwK6AcPJ0lTWi2M5/y3fCN9OkBa2y76JZ64SJAqglOj X+VJP1fL86dsUIHd9clxZ6Vf2zSZQst5bOQxe2pn8n+BreLhD7H4ot7rc9QBZ5gcEg3ntgbF oMxGDkI6Rlp6 Message-ID: <62f034f8-e008-6b0f-dee0-396a3bd75f39@hazardous.org> Date: Sat, 3 Oct 2020 21:53:38 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:52.0) Gecko/20100101 PostboxApp/7.0.30 MIME-Version: 1.0 In-Reply-To: <20201003173716.Horde.Fjm6kXI836h4ZCLH5SwQkST@webmail.leidinger.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 4C3cxP1QG2z3Vwm X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.30 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[hazardous.org:s=fm3,messagingengine.com:s=fm3]; RECEIVED_SPAMHAUS_PBL(0.00)[77.22.0.244:received]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:66.111.4.28]; NEURAL_HAM_LONG(-1.05)[-1.047]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[hazardous.org]; NEURAL_HAM_MEDIUM(-1.05)[-1.049]; RWL_MAILSPIKE_GOOD(0.00)[66.111.4.28:from]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[hazardous.org:+,messagingengine.com:+]; NEURAL_HAM_SHORT(-0.61)[-0.608]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:11403, ipnet:66.111.4.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current]; RCVD_IN_DNSWL_LOW(-0.10)[66.111.4.28:from] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 19:53:47 -0000 Alexander Leidinger wrote on 03.10.20 17:37: > Quoting Kristof Provost (from Sat, 03 Oct 2020 16:06:43 > +0200): >> Okay, let’s abandon that patch. It’s ugly and it doesn’t work. >> >> Here’s a different approach that I’m much happier with. >> https://people.freebsd.org/~kp/0001-bridge-Call-member-interface-ioctl-without-NET_EPOCH.patch >> >> >> It passes the regression tests with WITNESS and INVARIANTS enabled, >> and a hack in the epair ioctl() handler to make it sleep (to look a >> bit like the Intel ioctl() handler that currently trips up if_bridge). > Works for me. > No crash, no LOR, promisc-mode stays enabled, jails are reachable. indeed! I can second that. Works nicely, my machine does not panic anymore and machines (bhyve vms) behind the bridge are reachable. felix -- GPG/PGP: 7A0B612C / 5F4D 9B06 C240 3250 35BF 66ED 1AD3 A9B8 7A0B 612C https://hazardous.org/ - fkr@hazardous.org - fkr@irc - @felixkronlage From owner-freebsd-current@freebsd.org Sat Oct 3 20:36:03 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 175424374EA; Sat, 3 Oct 2020 20:36:03 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: from mail-qk1-f180.google.com (mail-qk1-f180.google.com [209.85.222.180]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3dt96mtRz3YFd; Sat, 3 Oct 2020 20:36:01 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: by mail-qk1-f180.google.com with SMTP id q5so7336966qkc.2; Sat, 03 Oct 2020 13:36:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=M7bhWzKW2ug18zFrbqVYORCzQAf21V1hm5ZcanNTjbQ=; b=LcX68c4LpFf2ITE64V0SJzdMcO3SZEU6yfptd+pyvvONcX8CiFeQiPZe4UPcQx/bNb FQVVKIffJyTYWorK2mWGEuXI1jxHUfwQTwjyks+NbNWgy/7O3cpKqXF8pj8ZzcVmGpnP 5jzYjoDViG4hoGdJGUb552HjGFy4g5fVIT/WJ65/lHHZVC7N5/xWBkzAiMQcp+g95JZj AI04PPlV4XTIzDraD122nXuJmKLl866HngCEEe6R7U06hwwfMsQbznZh0znQe2UKMcdn z1kg0ynxcVZ/IW0KOSoBNxz89RRSXsFF4T5yH8WIu/nEDfhuI9xWgRSfUQC8+o45Ge6m mGfA== X-Gm-Message-State: AOAM531Gky8ubr82p8Z6h/Db0bpeibnUvaKnbKv9KimZmBz8b8V6NFlw k2Ht4iR+4MwsL0gccCzf3FBBd+EdaNOWjrBYoymhnKbd X-Google-Smtp-Source: ABdhPJxgfprLQs+rLXxs+OKaKhyNaCo8dpOne6ZHpnr5/9AGMAbLf/CQ2GjPLhLov8x1j6o+4oWogPCYDfb6HC8kG/Q= X-Received: by 2002:a37:67d2:: with SMTP id b201mr7914909qkc.96.1601757360113; Sat, 03 Oct 2020 13:36:00 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Adrian Chadd Date: Sat, 3 Oct 2020 13:35:47 -0700 Message-ID: Subject: Re: mips32 + gcc9 -- still broken To: Alexander Richardson Cc: freebsd-current , "freebsd-mips@freebsd.org" X-Rspamd-Queue-Id: 4C3dt96mtRz3YFd X-Spamd-Bar: - X-Spamd-Result: default: False [-1.52 / 15.00]; FROM_NEQ_ENVFROM(0.00)[adrian@freebsd.org,adrianchadd@gmail.com]; MAILMAN_DEST(0.00)[freebsd-current,freebsd-mips]; TO_DN_EQ_ADDR_SOME(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; ARC_NA(0.00)[]; RCVD_TLS_ALL(0.00)[]; NEURAL_HAM_LONG(-0.99)[-0.986]; DMARC_NA(0.00)[freebsd.org]; NEURAL_SPAM_SHORT(0.33)[0.334]; RCVD_IN_DNSWL_NONE(0.00)[209.85.222.180:from]; NEURAL_HAM_MEDIUM(-0.87)[-0.869]; FORGED_SENDER(0.30)[adrian@freebsd.org,adrianchadd@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.222.180:from]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TAGGED_FROM(0.00)[]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 20:36:03 -0000 On Mon, 21 Sep 2020 at 00:43, Alexander Richardson wrote: > > On Mon, 21 Sep 2020, 07:38 Adrian Chadd, wrote: > >> So, the big list of unknown symbols was my fault! Whoops. >> >> i've gotten further using gcc-6.4 by fixing some of the warnings/issues >> that have crept up. >> >> Here's a review for one of them: >> >> https://reviews.freebsd.org/D26504 >> >> However, now I've hit: >> >> /usr/local/bin/mips-unknown-freebsd13.0-ld: >> >> /usr/home/adrian/work/freebsd/head-embedded/obj/mips_ap/usr/home/adrian/work/freebsd/head-embedded/src/mips.mips/tmp/usr/lib/libc++.so.1: >> undefined reference to `__atomic_fetch_sub_8' >> /usr/local/bin/mips-unknown-freebsd13.0-ld: >> >> /usr/home/adrian/work/freebsd/head-embedded/obj/mips_ap/usr/home/adrian/work/freebsd/head-embedded/src/mips.mips/tmp/usr/lib/libc++.so.1: >> undefined reference to `__atomic_load_8' >> /usr/local/bin/mips-unknown-freebsd13.0-ld: >> >> /usr/home/adrian/work/freebsd/head-embedded/obj/mips_ap/usr/home/adrian/work/freebsd/head-embedded/src/mips.mips/tmp/usr/lib/libc++.so.1: >> undefined reference to `__atomic_fetch_add_8' >> >> .. looks like we need some 64 bit atomics now in mips32 for libc++ / devd >> > > Those are now provided by compiler-rt when using clang. With GCC you'll > have to link libatomic. I had a quick look at the code in libc++ that uses > the 64-bit atomics a few weeks ago and I believe it's the futex fallback > code. The best solution would probably be to port it to use umtx but for > MIPS32 it might be fine to use a 32 bit atomic instead. > It compiled fine with a 32 bit atomic. Why's it 64 bit for everything but Linux? Can we make it a 32 bit atomic for all FreeBSD platforms? Are there ABI concerns? -adrian > > Alex > >> From owner-freebsd-current@freebsd.org Sat Oct 3 22:14:17 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5D6453F0DCD for ; Sat, 3 Oct 2020 22:14:17 +0000 (UTC) (envelope-from steffen@sdaoden.eu) Received: from sdaoden.eu (sdaoden.eu [217.144.132.164]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3h3X1v1xz3d2L for ; Sat, 3 Oct 2020 22:14:16 +0000 (UTC) (envelope-from steffen@sdaoden.eu) Received: by sdaoden.eu (Postfix, from userid 1000) id A7A5616057; Sun, 4 Oct 2020 00:14:07 +0200 (CEST) Date: Sun, 04 Oct 2020 00:14:07 +0200 From: Steffen Nurpmeso To: FreeBSD Current Subject: Re: Please check the current beta git conversions Message-ID: <20201003221407.ZnssQ%steffen@sdaoden.eu> In-Reply-To: <20200926195056.1QqEB%steffen@sdaoden.eu> References: <20200903191410.sgjUQ%steffen@sdaoden.eu> <20200926195056.1QqEB%steffen@sdaoden.eu> Mail-Followup-To: FreeBSD Current User-Agent: s-nail v14.9.19 OpenPGP: id=EE19E1C1F2F7054F8D3954D8308964B51883A0DD; url=https://ftp.sdaoden.eu/steffen.asc; preference=signencrypt BlahBlahBlah: Any stupid boy can crush a beetle. But all the professors in the world can make no bugs. X-Rspamd-Queue-Id: 4C3h3X1v1xz3d2L X-Spamd-Bar: - X-Spamd-Result: default: False [-1.12 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.95)[-0.952]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[sdaoden.eu]; NEURAL_HAM_LONG(-0.96)[-0.962]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_ALL(0.00)[]; MID_CONTAINS_FROM(1.00)[]; NEURAL_SPAM_SHORT(0.09)[0.092]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15987, ipnet:217.144.128.0/20, country:DE]; MAILMAN_DEST(0.00)[freebsd-current] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 22:14:17 -0000 ... Steffen Nurpmeso wrote in ... ||||> I tried simply updating my github clone by switching ||||> ||||> url = https://cgit-beta.freebsd.org/src.git ||||> #url = https://github.com/freebsd/freebsd.git ... |It fails again, repeatedly [.] | | POST git-upload-pack (chunked) | error: RPC failed; curl 18 transfer closed with outstanding read \ | data remaining | fatal: the remote end hung up unexpectedly And still "git fetch" fails with POST git-upload-pack (chunked) error: RPC failed; curl 55 OpenSSL SSL_write: Broken pipe, errno 32 fatal: the remote end hung up unexpectedly My config file is [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://cgit-beta.freebsd.org/src.git #url = https://github.com/freebsd/freebsd.git fetch = +refs/heads/releng/5.5:refs/remotes/origin/releng/5.5 fetch = +refs/heads/releng/6.4:refs/remotes/origin/releng/6.4 fetch = +refs/heads/releng/7.4:refs/remotes/origin/releng/7.4 fetch = +refs/heads/releng/8.4:refs/remotes/origin/releng/8.4 fetch = +refs/heads/releng/9.3:refs/remotes/origin/releng/9.3 fetch = +refs/heads/releng/10.3:refs/remotes/origin/releng/10.4 fetch = +refs/heads/releng/11.4:refs/remotes/origin/releng/11.4 fetch = +refs/heads/releng/12.1:refs/remotes/origin/releng/12.1 fetch = +refs/heads/stable/12:refs/remotes/origin/stable/12 fetch = +refs/heads/main:refs/remotes/origin/main fetch = +refs/notes/*:refs/notes/* And i am somewhat behind due to the update failures (not that it matters, of course) #?141|kent:free-src.git$ git sr d7ad7208f47d37aae16d55f5dcb743b25dcd0288 refs/heads/arena-manager-null ef7e23176ea6dcda108f4e19b9c1852b7fa5fb55 refs/notes/commits 88fc88f775381ab664fc2ca52ab143b94315743d refs/remotes/origin/main c032bc8ca5d4618ad349a53392fd692afef9fe4e refs/remotes/origin/releng/10.4 24e863807ab509af9c38e84b4e5df34ff4fdf9e2 refs/remotes/origin/releng/11.2 889f726543f5202c54ad14b81d5d16a85379ffe5 refs/remotes/origin/releng/11.4 6fb517db6dea0333c4b0bef3098abb87656a6d34 refs/remotes/origin/releng/12.1 101374bc1b346a37aa46393599b0969a03c8ca46 refs/remotes/origin/releng/5.5 385a94b8751c71f178bba86c13f083895dbe006d refs/remotes/origin/releng/6.4 f864cd1bca002396fa92715878379bc2fdad8af0 refs/remotes/origin/releng/7.4 b4323ad1fd9f310a36e595a031d77fe0f0e38472 refs/remotes/origin/releng/8.4 6845fb3a03394a42484e36d5f9e07e0cf14fec0d refs/remotes/origin/releng/9.3 ae4ea149fd21ae30fb0faa7104f5e4ee51e3147c refs/remotes/origin/stable/11 6a26cffb54271f343520a1731cf5c8f2c909194b refs/remotes/origin/stable/12 77a8b861086dccc41c08ce7d0c795a0bd2f7a1fb refs/tags/release/10.3.0 6025619ef8af561f9d8f3dff13c7802a1d447b7a refs/tags/release/11.4.0 4b3b0f6c1e9d013d6cff6dfd9459f5dc4d9ece08 refs/tags/release/12.1.0 2326bdbbcad4640f22d387060c7d3b363fff3b39 refs/tags/release/5.5.0 b9083afc65e8ac36f65d52d7859d31a11da05aef refs/tags/release/6.4.0 c6788c2a1bd371b64a299c6f98fe753f9a610de2 refs/tags/release/7.4.0 acbed3693070aed8e250cd993b4d4975dd12efb1 refs/tags/release/8.1.0 98566c7da1c45611953885e902507c562388660b refs/tags/release/8.4.0 87d65461806585dcf89d3c80f46135117a055140 refs/tags/release/9.3.0 #?0|kent:free-src.git$ git log -1 origin/main commit 88fc88f775381ab664fc2ca52ab143b94315743d (refs/remotes/origin/main) Author: Andrew Turner AuthorDate: 2020-09-03 10:11:12 +0000 Commit: Andrew Turner CommitDate: 2020-09-03 10:11:12 +0000 Switch to an empty ttbr0 pagetable when the MMU is enabled We don't need these pagetables after the early boot. Remove the chance we write to memory we didn't expect to and remove architectural undefined behaviour. Reviewed by: alc (earlier version), mmel Sponsored by: Innovate UK Differential Revision: https://reviews.freebsd.org/D22606 Notes: svn path=/head/; revision=365296 Somewhat eagerly waiting for cgit-beta. becoming cgit., Thanks and an affordable Sunday and (uff) Ciao, --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt) From owner-freebsd-current@freebsd.org Sat Oct 3 23:53:28 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9BFE13F3AC3 for ; Sat, 3 Oct 2020 23:53:28 +0000 (UTC) (envelope-from bakul@iitbombay.org) Received: from mail-pg1-x544.google.com (mail-pg1-x544.google.com [IPv6:2607:f8b0:4864:20::544]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3kFz2NNrz406J for ; Sat, 3 Oct 2020 23:53:27 +0000 (UTC) (envelope-from bakul@iitbombay.org) Received: by mail-pg1-x544.google.com with SMTP id y14so3345410pgf.12 for ; Sat, 03 Oct 2020 16:53:27 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8TNyJFM2U1iKJmCwNG5dd2pHeJl2e9P4WsVtoAlTdqs=; b=b59Qz0uquILCp3cVLkgT8DuYyVTq9TEomcYHh8c9Nyt6lLuR47M/d/XdIjBfTnTl27 BtLSF6QvKv2QcIORoDMGR/iFUEJytZfO/gh6EfEMky15bIaH6U0dV0jBb0Yy1VU3B6r3 oLtVrQAscXN4gPGnJ9zAHVaAPcfJ4ZiBQeADqScw0neplQ5b8oauINsbu9jKwZrfO7cK Ov06C2fEWepZLEhezLmZS9Zy8ZZwOsaaKeEweaDo9N+14RKKafWmvhy4qv3pnNm/Gkzv 724AxoJO+bS0aBy3FzLyEriOWN/rfupi8Ux2VNyf7iusc6CSvxL0mNpbEVEVCL59yFdn RD/A== X-Gm-Message-State: AOAM530S3P8LHjz9GfLuVs+t5jP39dNKQx+sQWl53/4cpDSQD6qBX5un Wv9Ob15V7wQms8B7vk30hLTQ8zxFWudSCbot X-Google-Smtp-Source: ABdhPJyHy8R9/wSn+n1QY4+xMspQ+fWGoUVom9vvDf8Ii0SFTlxSKz7e3/rMtlK6c2wJ+Zmw6BA12Q== X-Received: by 2002:aa7:8dc7:0:b029:151:2237:52c5 with SMTP id j7-20020aa78dc70000b0290151223752c5mr9568405pfr.32.1601769206104; Sat, 03 Oct 2020 16:53:26 -0700 (PDT) Received: from [192.168.1.113] (172-125-77-130.lightspeed.sntcca.sbcglobal.net. [172.125.77.130]) by smtp.gmail.com with ESMTPSA id f6sm6942555pfq.82.2020.10.03.16.53.24 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 03 Oct 2020 16:53:25 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\)) Subject: Re: Please check the current beta git conversions From: Bakul Shah In-Reply-To: <20201003221407.ZnssQ%steffen@sdaoden.eu> Date: Sat, 3 Oct 2020 16:53:24 -0700 Cc: FreeBSD Current Content-Transfer-Encoding: quoted-printable Message-Id: References: <20200903191410.sgjUQ%steffen@sdaoden.eu> <20200926195056.1QqEB%steffen@sdaoden.eu> <20201003221407.ZnssQ%steffen@sdaoden.eu> To: Steffen Nurpmeso X-Mailer: Apple Mail (2.3608.120.23.2.4) X-Rspamd-Queue-Id: 4C3kFz2NNrz406J X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.15 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[iitbombay-org.20150623.gappssmtp.com:s=20150623]; FREEFALL_USER(0.00)[bakul]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; MID_RHS_MATCH_FROM(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[iitbombay.org]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; NEURAL_HAM_LONG(-1.04)[-1.038]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[iitbombay-org.20150623.gappssmtp.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::544:from]; NEURAL_HAM_SHORT(-0.09)[-0.092]; NEURAL_HAM_MEDIUM(-1.02)[-1.017]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-current] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Oct 2020 23:53:28 -0000 On Oct 3, 2020, at 3:14 PM, Steffen Nurpmeso wrote: >=20 > And still "git fetch" fails with >=20 > POST git-upload-pack (chunked) > error: RPC failed; curl 55 OpenSSL SSL_write: Broken pipe, errno 32 > fatal: the remote end hung up unexpectedly >=20 > My config file is >=20 > [core] > repositoryformatversion =3D 0 > filemode =3D true > bare =3D false > logallrefupdates =3D true > [remote "origin"] > url =3D https://cgit-beta.freebsd.org/src.git > #url =3D https://github.com/freebsd/freebsd.git > fetch =3D +refs/heads/releng/5.5:refs/remotes/origin/releng/5.5 > fetch =3D +refs/heads/releng/6.4:refs/remotes/origin/releng/6.4 > fetch =3D +refs/heads/releng/7.4:refs/remotes/origin/releng/7.4 > fetch =3D +refs/heads/releng/8.4:refs/remotes/origin/releng/8.4 > fetch =3D +refs/heads/releng/9.3:refs/remotes/origin/releng/9.3 > fetch =3D +refs/heads/releng/10.3:refs/remotes/origin/releng/10.4 > fetch =3D +refs/heads/releng/11.4:refs/remotes/origin/releng/11.4 > fetch =3D +refs/heads/releng/12.1:refs/remotes/origin/releng/12.1 > fetch =3D +refs/heads/stable/12:refs/remotes/origin/stable/12 > fetch =3D +refs/heads/main:refs/remotes/origin/main > fetch =3D +refs/notes/*:refs/notes/* FWIW, I have a bare repo with the following config file [core] repositoryformatversion =3D 0 filemode =3D true bare =3D true logallrefupdates =3D true [remote "origin"] url =3D https://cgit-beta.freebsd.org/src.git fetch =3D +refs/heads/*:refs/remotes/origin/* fetch =3D +refs/notes/*:refs/notes/* [branch "main"] remote =3D origin merge =3D refs/heads/main /usr/src is a worktree and everything seems to be working fine. I manually converted to a bare repo (first testing this with a much smaller repo) and fixed up various refs. But probably safer to just start from scratch: git clone --bare https://cgit-beta.freebsd.org/src.git cd src.git git fetch origin 'refs/notes/*:refs/notes/origin/*' # <<< not sure about = this.... # don't recall if I manually added the second fetch line in the = config file. # but notes get fetched fine; though I don't understand why = 100MB+ get # downloaded every time even though only a few files change. git worktree add main git worktree add stable/12 etc.=