Re: sis900 : sis0 attach returned 6
Matt, > It looks like the 8201L PHY was first supported in 4.6-RELEASE, but the PR > wasn't updated to reflect this. > > Guido, if possible, could you try with 4.6.2-RELEASE and see if your card > gets detected? I am running 'FreeBSD 4.6.2-RELEASE #0: Wed Aug 14 21:23:26 GMT 2002 [EMAIL PROTECTED]:/usr/src/sys/compile/GENERIC' This is the only version I tried up to now. -- Guido Van Hoecke <[EMAIL PROTECTED]> To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: sis900 : sis0 attach returned 6
> > From: "Matthew Emmerton" <[EMAIL PROTECTED]> > > Subject: Re: sis900: sis0 attach returned 6 > > > > Guido, > > > > I did some more digging and it appears the bigger problem is that the > > RTL8201 external PHY isn't supported (yet) in FreeBSD. Patches to support > > this PHY, along with reports of successful testing in numerous > > configurations, are reported in PR kern/30836 (and kern/35691). > > > > This PR has been sitting in GNATS since March - does anyone want to step > > and > > commit it? It seems that this chipset is frequently used on motherboards > > with embedded ethernet, so it would be nice to have this supported RSN. > > It works for me... is the RTL8201L different? > > This happens to be on 4.7 RC2, but it has worked since 4.6, or shortly > thereafter, if I recall correctly. (This machine also has a realtek card > in it...) > > > sis0: port 0xd000-0xd0ff mem 0xcfffc000-0xcfffcfff > irq 12 > at device 3.0 on pci0 > sis0: Ethernet address: 00:d0:09:de:34:ee > miibus0: on sis0 > rlphy0: on miibus0 > rlphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto > rl0: port 0xcc00-0xccff mem > 0xcfffbf00-0xcfffbfff ir > q 15 at device 11.0 on pci0 > rl0: Ethernet address: 00:50:bf:77:6f:44 > miibus1: on rl0 > rlphy1: on miibus1 > rlphy1: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto > > Jim Rowan > [EMAIL PROTECTED] It looks like the 8201L PHY was first supported in 4.6-RELEASE, but the PR wasn't updated to reflect this. Guido, if possible, could you try with 4.6.2-RELEASE and see if your card gets detected? -- Matt Emmerton To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: sis0 - phy problem
> hi, > i also encounter problem with sis0 nic onboard. here is an > extract from dmesg: > > FreeBSD 4.6.2-RELEASE > > sis0: port 0xd400-0xd4ff mem 0xe780-0xe7800fff irq \ > at device 1.1 on pci0 > sis0: Ethernet address: 00:00:00:00:00:00 > miibus0: on sis0 > ukphy0: on miibus0 > ukphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto > ohci0: mem 0xe700-0xe7000fff irq 5 at device 1.2 on pci0 > usb0: OHCI version 1.0, legacy support > usb0: on ohci0 > [...] > rl0: Ethernet address: 00:50:22:9b:c7:24 > miibus1: on rl0 > rlphy0: on miibus1 > rlphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto > > i tried to force and hard code a mac address for the sis0, but > it really seems that PHY isn't well recognized. Well, it's recognized, it's just "unknown". I'm assuming that you can't actually use your sis0 NIC in this configuration. Is this correct? -- Matt Emmerton To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: ACPI programming under FreeBSD?
On Wed, 2002-10-02 at 20:14, Socketd wrote: > > I'm not an ACPI developer, but I really like the sysctl > > interface, because it enables you to retrieve information > > from within scripts easily. For ioctls you would have to > > write a separate tool to be able to access it. > > I think the list of sysctl entries is pretty long as it is. sysctl is suited toward the type of information ACPI provides though - ie it's tree structure. I don't think it's going to be any better to have an enormous number of ioctls for ACPI :) -- Daniel O'Connor software and network engineer for Genesis Software - http://www.gsoft.com.au "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum GPG Fingerprint - 9A8C 569F 685A D928 5140 AE4B 319B 41F4 5D17 FDD5 To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: vmware reads disk on non-sector boundary
At 7:52 PM +0200 9/25/02, Mark Santcroos wrote: >On Wed, Sep 25, 2002, Mark Santcroos wrote: > > A fact is that vmware did work up until a few months. I didn't do > > a binary search yet. That is last resort... > >Anyone running a -current of several months old and using vmware2? >If so, can you please ktrace it and send me the trace. > >Thanks alot. Hi. What's the status on this? I have a multi-boot setup on PC which has two 650 MHz Pentium 3's. One system is freebsd-current as of Apr 23rd, and vmware2 works fine on that. (for ports it has vmware2-2.0.4.1142 , rtc-2001.09.16.1 , and linux_base-7.1_2). I also have a partition with freebsd-current from two or three days ago, and all the latest versions of the ports. Every time I try to start vmware2 on the newer system, the hardware dies. Sometimes it automatically reboots, other times it freezes up and I have to force-reboot it (sometimes by unplugging it from the wall). If you're still looking for a ktrace from an earlier -current, let me know how to get what you're looking for and I'll try to help. -- Garance Alistair Drosehn= [EMAIL PROTECTED] Senior Systems Programmer or [EMAIL PROTECTED] Rensselaer Polytechnic Instituteor [EMAIL PROTECTED] To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: Getfsstat(2), statfs(2) and fstatfs(2) jailed.
On Wed, Oct 02, 2002 at 12:45:36PM +0200, Oliver Fromme wrote: +> Pawel Jakub Dawidek <[EMAIL PROTECTED]> wrote: +> > With this kernel module for FreeBSD 4.x process in jail can see only +> > file systems that are mounted in jail's chroot directory. +> > +> > For example if we have mounted: +> > [...] +> +> Also see PR 26740: +> http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/26740 +> +> BTW, does your patch work if the process that created the jail +> was already chrooted (possibly with a root different from the +> root of the process that mounted the filesystem)? There are +> a lot of non-trivial cases ... +> +> Another issue might be the degraded efficiency if there are a +> lot of mounts (I mean _really_ many). My way is very simple. I get chroot directory from p->p_fd->fd_jdir. We have for example "/ch/root". Now in getfsstat() I'm checking for file systems begins with "/ch/root". If it doesn't begin with this string I don't add it. I add also file system where chroot directory is mounted on with path "/". -- Pawel Jakub Dawidek UNIX Systems Administrator http://garage.freebsd.pl Am I Evil? Yes, I Am. msg37198/pgp0.pgp Description: PGP signature
Crash dump in attach
It looks like i've finally achieved my first crash dump: see it in attach thanks -- Paolo Italian FreeBSD User Group: http://www.gufi.org To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Crash dump with attach =P
sorry... =P -- Paolo Italian FreeBSD User Group: http://www.gufi.org Script started on Wed Oct 2 14:42:26 2002 GNU gdb 4.18 (FreeBSD) Copyright 1998 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i386-unknown-freebsd"...Deprecated bfd_read called at /usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c line 2627 in elfstab_build_psymtabs Deprecated bfd_read called at /usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c line 933 in fill_symbuf IdlePTD at phsyical address 0x00429000 initial pcb at physical address 0x00351700 panicstr: from debugger panic messages: --- Fatal trap 12: page fault while in kernel mode fault virtual address = 0xbfc0 fault code = supervisor read, page not present instruction pointer = 0x8:0xc02a4543 stack pointer = 0x10:0xd1b86d0c frame pointer = 0x10:0xd1b86d1c code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 331 (local) interrupt mask = net bio cam panic: from debugger Fatal trap 3: breakpoint instruction fault while in kernel mode instruction pointer = 0x8:0xc0299021 stack pointer = 0x10:0xd1b86b20 frame pointer = 0x10:0xd1b86b28 code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags= interrupt enabled, IOPL = 0 current process = 331 (local) interrupt mask = net bio cam Fatal trap 12: page fault while in kernel mode fault virtual address = 0xbfc0 fault code = supervisor read, page not present instruction pointer = 0x8:0xc02a4543 stack pointer = 0x10:0xd1b86d0c frame pointer = 0x10:0xd1b86d1c code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 331 (local) interrupt mask = net bio cam panic: from debugger Uptime: 1m57s dumping to dev #ad/0x40002, offset 7781477 dump ata0: resetting devices .. done 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 --- #0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487 487 if (dumping++) { (kgdb) where #0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487 #1 0xc0176708 in boot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:316 #2 0xc0176b55 in panic (fmt=0xc02c7f84 "from debugger") at /usr/src/sys/kern/kern_shutdown.c:595 #3 0xc0132b61 in db_panic (addr=-1070971581, have_addr=0, count=-1, modif=0xd1b86b9c "") at /usr/src/sys/ddb/db_command.c:435 #4 0xc0132aff in db_command (last_cmdp=0xc0307044, cmd_table=0xc0306e84, aux_cmd_tablep=0xc0342858) at /usr/src/sys/ddb/db_command.c:333 #5 0xc0132bc6 in db_command_loop () at /usr/src/sys/ddb/db_command.c:457 #6 0xc0134d7f in db_trap (type=12, code=0) at /usr/src/sys/ddb/db_trap.c:71 #7 0xc0298dc0 in kdb_trap (type=12, code=0, regs=0xd1b86ccc) at /usr/src/sys/i386/i386/db_interface.c:158 #8 0xc02a6684 in trap_fatal (frame=0xd1b86ccc, eva=3217031168) at /usr/src/sys/i386/i386/trap.c:969 #9 0xc02a6066 in trap (frame={tf_fs = 16, tf_es = 16, tf_ds = 16, tf_edi = -776544532, tf_esi = -1059388900, tf_ebp = -776442596, tf_isp = -776442632, tf_ebx = -1059388900, tf_edx = -1077936128, tf_ecx = -1064021720, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip = -1070971581, tf_cs = 8, tf_eflags = 66118, tf_esp = -776544640, tf_ss = -776442324}) at /usr/src/sys/i386/i386/trap.c:636 #10 0xc02a4543 in pmap_remove_pages (pmap=0xd1b6deec, sva=0, eva=3217031168) at /usr/src/sys/i386/i386/pmap.c:2946 #11 0xc0
PRNG not seeded - error in non-root ssh inside 4.6.2 jails...
Hello, I have found that if you create a jail in FreeBSD 4.6.2, and then log into that jail ... if you are root you can scp and ssh just fine. However if you are not root and you attempt to ssh or scp, you get this error: PRNG is not seeded A few details - first, I created my jail by simply using the dump command to dump my / filesystem, and then restoring that inside the jail. Not elegant, but it works - so the jail in question has a full /dev and everything. Second, I used the exact same method in 4.6.1 and did not have problems. I saw a usenet post that recommended solving the problem with this: "chmod a+r /dev/*rand*" however I tried that, and now when I try to ssh or scp from a non root user inside the jail, I get: "Host key verification failed" Does anyone know why this happens, why it didn't happen prior to 4.6.2, and how I can fix it ? thanks! _ MSN Photos is the easiest way to share and print your photos: http://photos.msn.com/support/worldwide.aspx To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
sis0 - phy problem
hi, i also encounter problem with sis0 nic onboard. here is an extract from dmesg: FreeBSD 4.6.2-RELEASE sis0: port 0xd400-0xd4ff mem 0xe780-0xe7800fff irq \ at device 1.1 on pci0 sis0: Ethernet address: 00:00:00:00:00:00 miibus0: on sis0 ukphy0: on miibus0 ukphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto ohci0: mem 0xe700-0xe7000fff irq 5 at device 1.2 on pci0 usb0: OHCI version 1.0, legacy support usb0: on ohci0 [...] rl0: Ethernet address: 00:50:22:9b:c7:24 miibus1: on rl0 rlphy0: on miibus1 rlphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto i tried to force and hard code a mac address for the sis0, but it really seems that PHY isn't well recognized. well, i will see if 4.7RC2 it works, but i'd like to hear from anyone experiencing the same, or if anyone has a clue, he is wellcome Key fingerprint = D34A 577C 869B 28A2 3886 4298 50CB DC18 31A4 ACAD To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: sis900 : sis0 attach returned 6
> From: "Matthew Emmerton" <[EMAIL PROTECTED]> > Subject: Re: sis900: sis0 attach returned 6 > > Guido, > > I did some more digging and it appears the bigger problem is that the > RTL8201 external PHY isn't supported (yet) in FreeBSD. Patches to support > this PHY, along with reports of successful testing in numerous > configurations, are reported in PR kern/30836 (and kern/35691). > > This PR has been sitting in GNATS since March - does anyone want to step > and > commit it? It seems that this chipset is frequently used on motherboards > with embedded ethernet, so it would be nice to have this supported RSN. It works for me... is the RTL8201L different? This happens to be on 4.7 RC2, but it has worked since 4.6, or shortly thereafter, if I recall correctly. (This machine also has a realtek card in it...) sis0: port 0xd000-0xd0ff mem 0xcfffc000-0xcfffcfff irq 12 at device 3.0 on pci0 sis0: Ethernet address: 00:d0:09:de:34:ee miibus0: on sis0 rlphy0: on miibus0 rlphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto rl0: port 0xcc00-0xccff mem 0xcfffbf00-0xcfffbfff ir q 15 at device 11.0 on pci0 rl0: Ethernet address: 00:50:bf:77:6f:44 miibus1: on rl0 rlphy1: on miibus1 rlphy1: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto Jim Rowan [EMAIL PROTECTED] To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: Getfsstat(2), statfs(2) and fstatfs(2) jailed.
Pawel Jakub Dawidek <[EMAIL PROTECTED]> wrote: > With this kernel module for FreeBSD 4.x process in jail can see only > file systems that are mounted in jail's chroot directory. > > For example if we have mounted: > [...] Also see PR 26740: http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/26740 BTW, does your patch work if the process that created the jail was already chrooted (possibly with a root different from the root of the process that mounted the filesystem)? There are a lot of non-trivial cases ... Another issue might be the degraded efficiency if there are a lot of mounts (I mean _really_ many). Regards Oliver -- Oliver Fromme, secnetix GmbH & Co KG, Oettingenstr. 2, 80538 München Any opinions expressed in this message may be personal to the author and may not necessarily reflect the opinions of secnetix in any way. "All that we see or seem is just a dream within a dream" (E. A. Poe) To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: ACPI programming under FreeBSD?
>> Original Message << On 10/2/02, 12:34:49 PM, Oliver Fromme <[EMAIL PROTECTED]> wrote regarding Re: ACPI programming under FreeBSD?: > Mark Santcroos <[EMAIL PROTECTED]> wrote: > > ACPI developers, there is alot more information available in the kernel about > > ACPI that we don't export to userland yet. > > Do you think we should do that using more sysctl's or should we implement > > some ioctl's on /dev/acpi to retrieve the information? > I'm not an ACPI developer, but I really like the sysctl > interface, because it enables you to retrieve information > from within scripts easily. For ioctls you would have to > write a separate tool to be able to access it. I think the list of sysctl entries is pretty long as it is. > Just my 0.02 Euro. Just my 25 øre (or 0.25 kroner). Br socketd To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Re: ACPI programming under FreeBSD?
Mark Santcroos <[EMAIL PROTECTED]> wrote: > ACPI developers, there is alot more information available in the kernel about > ACPI that we don't export to userland yet. > Do you think we should do that using more sysctl's or should we implement > some ioctl's on /dev/acpi to retrieve the information? I'm not an ACPI developer, but I really like the sysctl interface, because it enables you to retrieve information from within scripts easily. For ioctls you would have to write a separate tool to be able to access it. Just my 0.02 Euro. Regards Oliver -- Oliver Fromme, secnetix GmbH & Co KG, Oettingenstr. 2, 80538 München Any opinions expressed in this message may be personal to the author and may not necessarily reflect the opinions of secnetix in any way. "All that we see or seem is just a dream within a dream" (E. A. Poe) To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
Bug in nullfs?
Hello hackers. I have found something like this, but I'm not sure of this is a bug in nullfs: # cd # mkdir dir1 # mkdir dir1/dir2 # mkdir dir3 # mount_null dir1 dir3 Now simple proram "test": -[ start ]- #include #include #include #include #include #include int main(int argc, char *argv[]) { charbuf[MAXPATHLEN]; /* I just want to be sure that I'm calling syscall directly. */ if (syscall(SYS___getcwd, buf, sizeof buf) != 0) { fprintf(stderr, "%s: %s\n", argv[0], strerror(errno)); exit(1); } printf("out: [%s]\n", buf); exit(0); } -[ end ]- And now: # cd ~/dir3/dir1 # /path/to/test /path/to/test: Not a directory Problem is here (line 571 in /sys/kern/vfs_cache.c): if (vp->v_dd->v_id != vp->v_ddid) { numcwdfail1++; free(buf, M_TEMP); return (ENOTDIR); } If "dir3" is for example NFS mount-point there are no problems. Any ideas? -- Pawel Jakub Dawidek UNIX Systems Administrator http://garage.freebsd.pl Am I Evil? Yes, I Am. msg37189/pgp0.pgp Description: PGP signature
Re: ACPI programming under FreeBSD?
Hi, I have a very simple program that does exactly this using sysctl's. Find it attached. ACPI developers, there is alot more information available in the kernel about ACPI that we don't export to userland yet. Do you think we should do that using more sysctl's or should we implement some ioctl's on /dev/acpi to retrieve the information? Mark On Tue, Oct 01, 2002 at 04:23:00PM -0400, Craig Rodrigues wrote: > Hi, > > I am interested in retrieving power statistics type of information from a > system running FreeBSD. I am interested in information such as: > power consumed, temperature, percentage of battery available, etc. > > Is it possible to do this with ACPI, and if so, are there any > examples of how to gather this information at the user-level? > > How stable is ACPI support in -STABLE and -CURRENT for this > kind of work? > > Thanks. > -- > Craig Rodrigues > http://www.gis.net/~craigr > [EMAIL PROTECTED] > > To Unsubscribe: send mail to [EMAIL PROTECTED] > with "unsubscribe freebsd-hackers" in the body of the message -- Mark SantcroosRIPE Network Coordination Centre http://www.ripe.net/home/mark/New Projects Group/TTM #define KELVIN_TO_CELSIUS(t)((t-2732+5)/10) #include int main() { int ret; int intbuf; size_t len; ret=sysctlbyname("hw.acpi.thermal.tz0.temperature",&intbuf,&len,NULL,0); if(ret==0) printf("tz0 temperarture: %d C\n",KELVIN_TO_CELSIUS(intbuf)); ret=sysctlbyname("hw.acpi.thermal.tz0._CRT",&intbuf,&len,NULL,0); if(ret==0) printf("tz0 crit temperarture: %d C\n",KELVIN_TO_CELSIUS(intbuf)); ret=sysctlbyname("hw.acpi.acline",&intbuf,&len,NULL,0); if(ret==0) printf("AC Line status: %s\n",intbuf?"online":"offline"); ret=sysctlbyname("hw.acpi.battery.units",&intbuf,&len,NULL,0); if(ret==0) printf("Number of battery units: %d\n",intbuf); ret=sysctlbyname("hw.acpi.battery.state",&intbuf,&len,NULL,0); if(ret==0) printf("Battery state: %d\n",intbuf); ret=sysctlbyname("hw.acpi.battery.life",&intbuf,&len,NULL,0); if(ret==0) printf("Remaining battery life: %d%%\n",intbuf); ret=sysctlbyname("hw.acpi.battery.time",&intbuf,&len,NULL,0); if(ret==0) printf("Remaining battery time: %d:%d\n",intbuf/60,intbuf%60); printf("crit: %d\n",KELVIN_TO_CELSIUS(3732)); return(0); }
Urgent Assistance & Investment
STRICTLY CONFIDENTIAL & URGENT. I am a native of Cape Town in South Africa and I am an Executive Accountant with the South Africa MINISTRY OF MINERAL AND ENERGY First and foremost, I apologized using this medium to reach you for a transaction/business of this magnitude, but this is due to Confidentiality and prompt access reposed on this medium. I have decided to seek a confidential co-operation with you in the execution of the deal described Hereunder for the benefit of all parties and hope you will keep it as a top secret because of the nature of this transaction. Within the Department of Mining & Natural Resources where I work as an Executive Accountant and with the cooperation of four other top officials, we have in our possession as overdue payment bills totaling Fifteen Million, Five Hundred Thousand U. S. Dollars ($15,500,000.) which we want to transfer abroad with the assistance and cooperation of a foreign company/individual to receive the said fund on our behalf or a reliable foreign non-company account to receive such funds. More so, we are handicapped in the circumstances, as the South Africa Civil Service Code of Conduct does not allow us to operate offshore account hence your importance in the whole transaction. This amount $15.5m represents the balance of the total contract value executed on behalf of my Department by a foreign contracting firm, which we the officials over-invoiced deliberately. Though the actual contract cost have been paid to the original contractor, leaving the balance in the Tune of the said amount which we have in principles gotten approval to remit by Key tested Telegraphic Transfer (K.T.T) to any foreign bank account you will provide by filing in an application through the Justice Ministry here in South Africa for the transfer of rights and privileges of the former contractor to you. I have the authority of my partners involved to propose that should you be willing to assist us in the transaction, your share of the sum will be 25% of the $15.5 million, 70% for us and 5% for taxation and miscellaneous expenses. The business itself is 100% safe, on your part provided you treat it with utmost secrecy and confidentiality. Also your area of specialization is not a hindrance to the successful execution of this transaction. I have reposed my confidence in you and hope that you will not disappoint me. Endeavor to contact me immediately my e-mail address whether or not you are interested in this deal. If you are not, it will enable me scout for another foreign partner to carry out this deal I want to assure you that my partners and myself are in a position to make the payment of this claim possible provided you can give us a very strong Assurance and guarantee that our share will be secured and please remember to treat this matter as very confidential matter, because we will not comprehend with any form of exposure as we are still in active Government Service and remember once again that time is of the essence in this business. I wait in anticipation of your fullest co-operation. Yours faithfully, DANJUMA YUSUF Please, direct all resopnd to Email: danyusuf700@spinfinder To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message