From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: from minnie.tuhs.org (minnie.tuhs.org [50.116.15.146]) by inbox.vuxu.org (Postfix) with ESMTP id 63D1B23E39 for ; Fri, 9 Feb 2024 19:11:43 +0100 (CET) Received: from minnie.tuhs.org (localhost [IPv6:::1]) by minnie.tuhs.org (Postfix) with ESMTP id 77E8A415F4; Sat, 10 Feb 2024 04:11:37 +1000 (AEST) Received: from mail.posixcafe.org (mail.posixcafe.org [45.76.19.58]) by minnie.tuhs.org (Postfix) with ESMTPS id A3CF0410EE for ; Sat, 10 Feb 2024 04:11:28 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=posixcafe.org; s=20200506; t=1707502299; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=599pQCB3/DSvFlkIftRbSbJlNA3Gp9DewvhRdZ7qyA4=; b=geCqDnQwyJyEYLJ7sGPDUeF6l5MNWn4tPPBjv5WCiDwRyE7J/VSaU7kYI8InDuWcLRmF5D oJGsvTSbgiSyLDkgu0fduKOnTYv/i4tB8F/2E9XKI54uNztHrJCXsMa/zdbN4IhV1H9sy0 J16h4EVxn1RChR0sK7ig8W68CJPiUQE= Received: from [192.168.168.200] ( [207.45.82.38]) by mail.posixcafe.org (OpenSMTPD) with ESMTPSA id 8aa40c93 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO) for ; Fri, 9 Feb 2024 12:11:37 -0600 (CST) Message-ID: <75dc61d7-9281-47bf-83db-3e58f261f5bb@posixcafe.org> Date: Fri, 9 Feb 2024 12:11:25 -0600 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: tuhs@tuhs.org From: Jacob Moody Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Message-ID-Hash: D7PHT6FIWSDIFFIOSARAEEQUARI2XLOB X-Message-ID-Hash: D7PHT6FIWSDIFFIOSARAEEQUARI2XLOB X-MailFrom: moody@posixcafe.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.6b1 Precedence: list Subject: [TUHS] 32V filesystem images to verify code against. List-Id: The Unix Heritage Society mailing list Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Hello TUHS, I recently have been working on the Plan 9 fs/v6fs and fs/v32fs programs, another member of the community had noticed bugs within them and I wanted to verify that the new code is working as expected. I haven't had an issue verifying v6fs using files from the TUHS archive but v32fs has proved to be a bit more tricky. After a little bit of work we were able to get the 'file2' located at https://www.tuhs.org/Archive/Distributions/USDL/32V/ to mount and read files. But given that all the files here are binaries it was a bit hard to make sure we're getting the correct information. I attempted to cross reference the files I get against the file2.tar also located within that spot in the archive but I am getting tar errors when extracting this file, so its not exactly obvious if what I am checking against is correct. So I would like to ask if someone here knows exactly what the sha1sums of these files are supposed to be and/or has another image with known contents I could test against. I will preface this with the fact that I am not very well versed in old UNIX filesystems so please let me know if I've missed anything. Thank you, Jacob Moody