From owner-freebsd-stable@freebsd.org Fri Feb 22 09:09:15 2019 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0411D14E1E1F for ; Fri, 22 Feb 2019 09:09:15 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mx0.gentlemail.de (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E32898AEE8 for ; Fri, 22 Feb 2019 09:09:13 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mh0.gentlemail.de (mh0.gentlemail.de [78.138.80.135]) by mx0.gentlemail.de (8.14.5/8.14.5) with ESMTP id x1M99CEv010674; Fri, 22 Feb 2019 10:09:12 +0100 (CET) (envelope-from freebsd@omnilan.de) Received: from titan.inop.mo1.omnilan.net (s1.omnilan.de [217.91.127.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mh0.gentlemail.de (Postfix) with ESMTPSA id 34DE8929; Fri, 22 Feb 2019 10:09:12 +0100 (CET) Subject: Re: libcrypto.so.111 linked binaries SIGSEGV (in bhyve guest) To: Eugene Grosbein , Konstantin Belousov Cc: freebsd-stable References: <335630bc-a558-9e31-5e2d-aee6237e83b0@omnilan.de> <596d1486-e2af-43f7-6f3f-65881e91819d@omnilan.de> <20190221085432.GR2420@kib.kiev.ua> <20190221093645.GS2420@kib.kiev.ua> <7b8b7a29-d956-c1b1-ea16-21896c683aca@grosbein.net> From: Harry Schmalzbauer Organization: OmniLAN Message-ID: <9bb73bcb-ecf6-7fc0-cd34-4bf9fc0864bd@omnilan.de> Date: Fri, 22 Feb 2019 10:09:11 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <7b8b7a29-d956-c1b1-ea16-21896c683aca@grosbein.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Greylist: ACL 130 matched, not delayed by milter-greylist-4.2.7 (mx0.gentlemail.de [78.138.80.130]); Fri, 22 Feb 2019 10:09:12 +0100 (CET) X-Milter: Spamilter (Reciever: mx0.gentlemail.de; Sender-ip: 78.138.80.135; Sender-helo: mh0.gentlemail.de; ) X-Rspamd-Queue-Id: E32898AEE8 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of freebsd@omnilan.de designates 2a00:e10:2800::a130 as permitted sender) smtp.mailfrom=freebsd@omnilan.de X-Spamd-Result: default: False [-6.77 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[omnilan.de]; HAS_ORG_HEADER(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[cached: mx0.gentlemail.de]; NEURAL_HAM_SHORT(-0.94)[-0.938,0]; IP_SCORE(-3.52)[ip: (-9.21), ipnet: 2a00:e10:2800::/64(-4.70), asn: 25074(-3.68), country: DE(-0.01)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:25074, ipnet:2a00:e10:2800::/64, country:DE]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Feb 2019 09:09:15 -0000 Am 22.02.2019 um 04:51 schrieb Eugene Grosbein: > 21.02.2019 22:27, Harry Schmalzbauer wrote: > >>> The object is clearly corrupted. >> >> Thanks to your hint to readelf, I found out that it gets corrupted during dump(8) (or resotore, not yet analyzed). >> The obj tree contains the good version, the dump archive not. >> The dump archive is used as source for the ISO, hence the described errors. >> Now I have to dig in 10 years old deployment scripts to track down and reproduce the corruption. No explanation so far, but for sure no rtld-elf problem :-) >> And also not a problem in the FreeBSD make chain, building stable/12 on stable/11 works as intended and doesn't produce the mutilated libcrypto.so.111! > > You may find useful reading trail of this PR https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=228174 > > Long story short: dump(8) will read inconsistent data (or even garbage) from mounted file system > unless used with -L to make and dump a snapshot. And UFS snapshots are not compatible with SU+J UFS > created with installer by default in some versions of FreeBSD. Thanks a lot for that additional relevant information. I'm aware about the -L & SU+J problem. And I'm not conviced, the default installer settings handle this situation correctly, at least not for the root filesystem! My issue was unrelated though. I dump(8)ed a unmounted md(4), but restore(8) hasn't had enough space (only view bytes, so size of the corrupted file wasn't obviously wrong) and the deployment script hasn't checked the return status at all. Fixed the script and now the restore(8)ed libcrypto.so.111 works. Thanks, -harry