From mboxrd@z Thu Jan 1 00:00:00 1970 From: osstest service owner Subject: [xen-unstable-smoke test] 84118: trouble: broken/pass Date: Fri, 26 Feb 2016 14:02:54 +0000 Message-ID: Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============6258775621310388216==" Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" To: xen-devel@lists.xensource.com, osstest-admin@xenproject.org List-Id: xen-devel@lists.xenproject.org --===============6258775621310388216== Content-Type: text/plain flight 84118 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/84118/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 3 host-install(3) broken REGR. vs. 83972 Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass version targeted for testing: xen 2753e07f5e8440cd5751369f5a037a7824e5a29e baseline version: xen abf8824fe530bcf060c757596f68663c87546a6a Last test of basis 83972 2016-02-25 13:01:35 Z 1 days Testing same since 84118 2016-02-26 12:03:38 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper Bob Moore David Vrabel Doug Goldstein Hanjun Guo Jan Beulich Kevin Tian Liang Z Li Parth Dixit Shannon Zhao Tim Deegan Wei Liu jobs: build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-amd64-amd64-xl-qemuu-debianhvm-i386 broken test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386 host-install(3) Not pushing. ------------------------------------------------------------ commit 2753e07f5e8440cd5751369f5a037a7824e5a29e Author: Shannon Zhao Date: Fri Feb 26 12:37:50 2016 +0100 arm/acpi: Initialize serial port from ACPI SPCR table Parse ACPI SPCR (Serial Port Console Redirection table) table and initialize the serial port pl011. Signed-off-by: Parth Dixit Signed-off-by: Shannon Zhao Reviewed-by: Stefano Stabellini Fix build. Acked-by: Jan Beulich commit d5e8732bcad85b4166fba6e54724740a9e973691 Author: Bob Moore Date: Fri Feb 26 12:37:18 2016 +0100 ACPICA / Headers: Add support for CSRT and DBG2 ACPI tables These tables are defined outside of the ACPI specification. Signed-off-by: Bob Moore [Linux commit 4e2f9c278ad84196991fcf6f6646a3e15967fe90] [only port the DBG2 changes] Signed-off-by: Shannon Zhao Acked-by: Jan Beulich commit 89b5aa9bf74ebd4fcec06be05024e127361903a6 Author: Hanjun Guo Date: Fri Feb 26 12:36:46 2016 +0100 ACPI / table: Print GIC information when MADT is parsed When MADT is parsed, print GIC information as debug message: ACPI: GICC (acpi_id[0x0000] address[00000000e112f000] MPIDR[0x0] enabled) ACPI: GICC (acpi_id[0x0001] address[00000000e112f000] MPIDR[0x1] enabled) ... ACPI: GICC (acpi_id[0x0201] address[00000000e112f000] MPIDR[0x201] enabled) This debug information will be very helpful to bring up early systems to see if acpi_id and MPIDR are matched or not as spec defined. Signed-off-by: Hanjun Guo [Linux commit 4c1c8d7a7ebc8b909493a14b21b233e5377b69aa] [Use container_of instead of cast and PRIx64 instead of %llx] Signed-off-by: Shannon Zhao Acked-by: Jan Beulich commit 763076cf5d29b41c98171ac2489e1726f95667ae Author: Doug Goldstein Date: Fri Feb 26 12:35:46 2016 +0100 build: convert HAS_CORE_PARKING to Kconfig Convert HAS_CORE_PARKING to Kconfig as CONFIG_CORE_PARKING. While removing HAS_CORE_PARKING, removed a trailing whitespace on a near by line. Signed-off-by: Doug Goldstein Reviewed-by: Jan Beulich commit 1afea8d3a9b947912e6be587b462a159fc7cd5d2 Author: Doug Goldstein Date: Fri Feb 26 12:33:14 2016 +0100 build: convert HAS_NUMA to Kconfig Convert HAS_NUMA to Kconfig as CONFIG_NUMA and let CONFIG_NUMA be defined by Kconfig. Signed-off-by: Doug Goldstein Reviewed-by: Jan Beulich commit fb1e853c53580c4d9be3519e552141805b75b19c Author: Doug Goldstein Date: Fri Feb 26 12:31:47 2016 +0100 build: consolidate CONFIG_HAS_ACPI and CONFIG_ACPI No real advantage to keeping these separate. The use case of this from Linux is when the platform or target board has support for something but the user wants to be given the option to disable it. Signed-off-by: Doug Goldstein Reviewed-by: Jan Beulich commit 3d26674d088ab0d0f197bbfafaba3767d195986b Author: Andrew Cooper Date: Fri Feb 26 12:31:11 2016 +0100 printk: introduce separator modifiers for the %ph custom format The printk formats %*ph{C,D,N} are chosen to be compatible with their Linux counterparts. Sample: (XEN) buf: 00 01 03 07 78 65 6e 00 (XEN) buf: 00:01:03:07:78:65:6e:00 (XEN) buf: 00-01-03-07-78-65-6e-00 (XEN) buf: 0001030778656e00 Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich commit df5ded9a768893ebf0e479d6e4f51d5d4f31a05e Author: Andrew Cooper Date: Fri Feb 26 12:30:55 2016 +0100 docs: update README to include Clang Xen now builds on x86 with Clang 3.5 and 3.8. Update README to reflect this. Mark Clang as no longer a permitted failure in Travis, to prevent future regressions slipping back in. Signed-off-by: Andrew Cooper Reviewed-by: Doug Goldstein commit 5d768fb1f3f7b011e7b6e75909c7f4841730de60 Author: David Vrabel Date: Fri Feb 26 12:30:11 2016 +0100 x86/hvm: add HVM_PARAM_X87_FIP_WIDTH The HVM parameter HVM_PARAM_X87_FIP_WIDTH to allow tools and the guest to adjust the width of the FIP/FDP registers to be saved/restored by the hypervisor. This is in case the hypervisor hueristics do not do the right thing. Add this parameter to the set saved during domain save/migrate. Signed-off-by: David Vrabel Reviewed-by: Andrew Cooper Acked-by: Wei Liu commit 879b44b041f26de35e4b527bf0f3c361eb52bd82 Author: David Vrabel Date: Fri Feb 26 12:16:13 2016 +0100 x86/fpu: add a per-domain field to set the width of FIP/FDP The x86 architecture allows either: a) the 64-bit FIP/FDP registers to be restored (clearing FCS and FDS); or b) the 32-bit FIP/FDP and FCS/FDS registers to be restored (clearing the upper 32-bits). Add a per-domain field to indicate which of these options a guest needs. The options are: 8, 4 or 0. Where 0 indicates that the hypervisor should automatically guess the FIP width by checking the value of FIP/FDP when saving the state (this is the existing behaviour). The FIP width is initially automatic but is set explicitly in the following cases: - 32-bit PV guest: 4 - Newer CPUs that do not save FCS/FDS: 8 The x87_fip_width field is placed into an existing 1 byte hole in struct arch_domain. Signed-off-by: David Vrabel Fix build. Signed-off-by: Jan Beulich commit 825c6dddf5993ab6b84590026cd7b5454a7d5e94 Author: Jan Beulich Date: Fri Feb 26 12:15:36 2016 +0100 vVMX: use latched VMCS machine address Instead of calling domain_page_map_to_mfn() over and over, latch the guest VMCS machine address unconditionally (i.e. independent of whether VMCS shadowing is supported by the hardware). Since this requires altering the parameters of __[gs]et_vmcs{,_real}() (and hence all their callers) anyway, take the opportunity to also drop the bogus double underscores from their names (and from __[gs]et_vmcs_virtual() as well). Signed-off-by: Jan Beulich Tested-by: Liang Z Li Acked-by: Kevin Tian commit 158ba53323cc0fcdb833798139a2f20a15dad5e2 Author: Jan Beulich Date: Fri Feb 26 12:15:09 2016 +0100 x86emul: simplify IRET logic Since we only handle real mode, we need to consider neither non-ring0 nor IOPL. Also for POPF the mode_iopl() check can really be inside the not-ring-0 body. Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper commit 81d3a0b26c1672c60b2a54dd8780e6f6472d2328 Author: Jan Beulich Date: Fri Feb 26 12:14:39 2016 +0100 x86emul: limit-check branch targets All branches need to #GP when their target violates the segment limit (in 16- and 32-bit modes) or is non-canonical (in 64-bit mode). For near branches facilitate this via a zero-byte instruction fetch from the target address (resulting in address translation and validation without an actual read from memory), while far branches get dealt with by breaking up the segment register loading into a read-and-validate part and a write one. The latter at once allows correcting some ordering issues in how the individual emulation steps get carried out: Before updating machine state, all exceptions unrelated to that state updating should have got raised (i.e. the only ones possibly resulting in partly updated state are faulting memory writes [pushes]). Note that while not immediately needed here, write and distinct read emulation routines get updated to deal with zero byte accesses too, for overall consistency. Reported-by: 刘令 Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper Acked-by: Tim Deegan (qemu changes not included) --===============6258775621310388216== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWRldmVs IG1haWxpbmcgbGlzdApYZW4tZGV2ZWxAbGlzdHMueGVuLm9yZwpodHRwOi8vbGlzdHMueGVuLm9y Zy94ZW4tZGV2ZWwK --===============6258775621310388216==-- From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 119F2C10F11 for ; Wed, 24 Apr 2019 10:33:58 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D9EF621773 for ; Wed, 24 Apr 2019 10:33:57 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D9EF621773 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=xenproject.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hJFDO-0000zy-96; Wed, 24 Apr 2019 10:33:22 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hJFDN-0000zo-NM for xen-devel@lists.xenproject.org; Wed, 24 Apr 2019 10:33:21 +0000 X-Inumbo-ID: 5ef4d5b8-667c-11e9-a567-a3d2954eda38 Received: from SMTP03.CITRIX.COM (unknown [162.221.156.55]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 5ef4d5b8-667c-11e9-a567-a3d2954eda38; Wed, 24 Apr 2019 10:33:17 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.60,389,1549929600"; d="scan'208";a="84278409" To: , Message-ID: MIME-Version: 1.0 X-Osstest-Failures: distros-debian-squeeze:build-armhf-pvops::broken:regression distros-debian-squeeze:build-i386::broken:regression distros-debian-squeeze:build-amd64-pvops::broken:regression distros-debian-squeeze:build-armhf::broken:regression distros-debian-squeeze:build-amd64::broken:regression distros-debian-squeeze:build-i386-pvops::broken:regression distros-debian-squeeze:build-armhf-pvops:syslog-server:running:regression distros-debian-squeeze:build-armhf:syslog-server:running:regression distros-debian-squeeze:test-amd64-i386-i386-squeeze-netboot-pygrub:build-check(1):blocked:nonblocking distros-debian-squeeze:test-amd64-amd64-i386-squeeze-netboot-pygrub:build-check(1):blocked:nonblocking distros-debian-squeeze:test-amd64-i386-amd64-squeeze-netboot-pygrub:build-check(1):blocked:nonblocking distros-debian-squeeze:test-amd64-amd64-amd64-squeeze-netboot-pygrub:build-check(1):blocked:nonblocking distros-debian-squeeze:build-armhf-pvops:host-install(4):broken:nonblocking distros-debian-squeeze:build-armhf:host-install(4):broken:nonblocking distros-debian-squeeze:build-i386-pvops:host-install(4):broken:nonblocking distros-debian-squeeze:build-i386:host-install(4):broken:nonblocking distros-debian-squeeze:build-amd64-pvops:host-install(4):broken:nonblocking distros-debian-squeeze:build-amd64:host-install(4):broken:nonblocking distros-debian-squeeze:build-armhf-pvops:capture-logs:broken:nonblocking distros-debian-squeeze:build-armhf:capture-logs:broken:nonblocking X-Osstest-Versions-That: flight=84005 From: Platform Team regression test user Date: Wed, 24 Apr 2019 11:33:09 +0100 Subject: [Xen-devel] [distros-debian-squeeze test] 84118: trouble: blocked/broken X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: base64 Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Message-ID: <20190424103309.uzPN1zrXF5476K74wUJEwEUUSae-Kt6PK2v_BIwzvdM@z> ZmxpZ2h0IDg0MTE4IGRpc3Ryb3MtZGViaWFuLXNxdWVlemUgcmVhbCBbcmVhbF0KaHR0cDovL29z c3Rlc3QueGVuc291cmNlLmNvbS9vc3N0ZXN0L2xvZ3MvODQxMTgvCgpGYWlsdXJlcyBhbmQgcHJv YmxlbXMgd2l0aCB0ZXN0cyA6LSgKClRlc3RzIHdoaWNoIGRpZCBub3Qgc3VjY2VlZCBhbmQgYXJl IGJsb2NraW5nLAppbmNsdWRpbmcgdGVzdHMgd2hpY2ggY291bGQgbm90IGJlIHJ1bjoKIGJ1aWxk LWFybWhmLXB2b3BzICAgICAgICAgICAgICAgPGpvYiBzdGF0dXM+ICAgICAgICAgICAgICAgICBi cm9rZW4KIGJ1aWxkLWkzODYgICAgICAgICAgICAgICAgICAgICAgPGpvYiBzdGF0dXM+ICAgICAg ICAgICAgICAgICBicm9rZW4KIGJ1aWxkLWFtZDY0LXB2b3BzICAgICAgICAgICAgICAgPGpvYiBz dGF0dXM+ICAgICAgICAgICAgICAgICBicm9rZW4KIGJ1aWxkLWFybWhmICAgICAgICAgICAgICAg ICAgICAgPGpvYiBzdGF0dXM+ICAgICAgICAgICAgICAgICBicm9rZW4KIGJ1aWxkLWFtZDY0ICAg ICAgICAgICAgICAgICAgICAgPGpvYiBzdGF0dXM+ICAgICAgICAgICAgICAgICBicm9rZW4KIGJ1 aWxkLWkzODYtcHZvcHMgICAgICAgICAgICAgICAgPGpvYiBzdGF0dXM+ICAgICAgICAgICAgICAg ICBicm9rZW4KIGJ1aWxkLWFybWhmLXB2b3BzICAgICAgICAgICAgIDMgc3lzbG9nLXNlcnZlciAg ICAgICAgICAgICAgICBydW5uaW5nCiBidWlsZC1hcm1oZiAgICAgICAgICAgICAgICAgICAzIHN5 c2xvZy1zZXJ2ZXIgICAgICAgICAgICAgICAgcnVubmluZwoKVGVzdHMgd2hpY2ggZGlkIG5vdCBz dWNjZWVkLCBidXQgYXJlIG5vdCBibG9ja2luZzoKIHRlc3QtYW1kNjQtaTM4Ni1pMzg2LXNxdWVl emUtbmV0Ym9vdC1weWdydWIgIDEgYnVpbGQtY2hlY2soMSkgICAgICBibG9ja2VkIG4vYQogdGVz dC1hbWQ2NC1hbWQ2NC1pMzg2LXNxdWVlemUtbmV0Ym9vdC1weWdydWIgIDEgYnVpbGQtY2hlY2so MSkgICAgIGJsb2NrZWQgbi9hCiB0ZXN0LWFtZDY0LWkzODYtYW1kNjQtc3F1ZWV6ZS1uZXRib290 LXB5Z3J1YiAgMSBidWlsZC1jaGVjaygxKSAgICAgYmxvY2tlZCBuL2EKIHRlc3QtYW1kNjQtYW1k NjQtYW1kNjQtc3F1ZWV6ZS1uZXRib290LXB5Z3J1YiAgMSBidWlsZC1jaGVjaygxKSAgICBibG9j a2VkIG4vYQogYnVpbGQtYXJtaGYtcHZvcHMgICAgICAgICAgICAgNCBob3N0LWluc3RhbGwoNCkg ICAgICAgICAgICAgIGJyb2tlbiBsaWtlIDg0MDA1CiBidWlsZC1hcm1oZiAgICAgICAgICAgICAg ICAgICA0IGhvc3QtaW5zdGFsbCg0KSAgICAgICAgICAgICAgYnJva2VuIGxpa2UgODQwMDUKIGJ1 aWxkLWkzODYtcHZvcHMgICAgICAgICAgICAgIDQgaG9zdC1pbnN0YWxsKDQpICAgICAgICAgICAg ICBicm9rZW4gbGlrZSA4NDAwNQogYnVpbGQtaTM4NiAgICAgICAgICAgICAgICAgICAgNCBob3N0 LWluc3RhbGwoNCkgICAgICAgICAgICAgIGJyb2tlbiBsaWtlIDg0MDA1CiBidWlsZC1hbWQ2NC1w dm9wcyAgICAgICAgICAgICA0IGhvc3QtaW5zdGFsbCg0KSAgICAgICAgICAgICAgYnJva2VuIGxp a2UgODQwMDUKIGJ1aWxkLWFtZDY0ICAgICAgICAgICAgICAgICAgIDQgaG9zdC1pbnN0YWxsKDQp ICAgICAgICAgICAgICBicm9rZW4gbGlrZSA4NDAwNQogYnVpbGQtYXJtaGYtcHZvcHMgICAgICAg ICAgICAgNSBjYXB0dXJlLWxvZ3MgICAgICAgICAgICAgICAgIGJyb2tlbiBsaWtlIDg0MDA1CiBi dWlsZC1hcm1oZiAgICAgICAgICAgICAgICAgICA1IGNhcHR1cmUtbG9ncyAgICAgICAgICAgICAg ICAgYnJva2VuIGxpa2UgODQwMDUKCmJhc2VsaW5lIHZlcnNpb246CiBmbGlnaHQgICAgICAgICAg ICAgICA4NDAwNQoKam9iczoKIGJ1aWxkLWFtZDY0ICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICBicm9rZW4gIAogYnVpbGQtYXJtaGYgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJyb2tlbiAgCiBidWlsZC1pMzg2 ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYnJva2Vu ICAKIGJ1aWxkLWFtZDY0LXB2b3BzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICBicm9rZW4gIAogYnVpbGQtYXJtaGYtcHZvcHMgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgIGJyb2tlbiAgCiBidWlsZC1pMzg2LXB2b3BzICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYnJva2VuICAKIHRlc3QtYW1kNjQt YW1kNjQtYW1kNjQtc3F1ZWV6ZS1uZXRib290LXB5Z3J1YiAgICAgICAgICAgICAgICBibG9ja2Vk IAogdGVzdC1hbWQ2NC1pMzg2LWFtZDY0LXNxdWVlemUtbmV0Ym9vdC1weWdydWIgICAgICAgICAg ICAgICAgIGJsb2NrZWQgCiB0ZXN0LWFtZDY0LWFtZDY0LWkzODYtc3F1ZWV6ZS1uZXRib290LXB5 Z3J1YiAgICAgICAgICAgICAgICAgYmxvY2tlZCAKIHRlc3QtYW1kNjQtaTM4Ni1pMzg2LXNxdWVl emUtbmV0Ym9vdC1weWdydWIgICAgICAgICAgICAgICAgICBibG9ja2VkIAoKCi0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQpzZy1yZXBv cnQtZmxpZ2h0IG9uIG9zc3Rlc3QueHMuY2l0cml0ZS5uZXQKbG9nczogL2hvbWUvb3NzdGVzdC9s b2dzCmltYWdlczogL2hvbWUvb3NzdGVzdC9pbWFnZXMKCkxvZ3MsIGNvbmZpZyBmaWxlcywgZXRj LiBhcmUgYXZhaWxhYmxlIGF0CiAgICBodHRwOi8vb3NzdGVzdC54ZW5zb3VyY2UuY29tL29zc3Rl c3QvbG9ncwoKVGVzdCBoYXJuZXNzIGNvZGUgY2FuIGJlIGZvdW5kIGF0CiAgICBodHRwOi8veGVu Yml0cy54ZW5zb3VyY2UuY29tL2dpdHdlYj9wPW9zc3Rlc3QuZ2l0O2E9c3VtbWFyeQoKClB1c2gg bm90IGFwcGxpY2FibGUuCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX18KWGVuLWRldmVsIG1haWxpbmcgbGlzdApYZW4tZGV2ZWxAbGlzdHMueGVucHJvamVj dC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi1k ZXZlbA==