From owner-freebsd-emulation@freebsd.org Sun Jan 10 11:28:16 2021 Return-Path: Delivered-To: freebsd-emulation@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7F1014C86DA for ; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) (envelope-from ml@netfence.it) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4DDF2S29B9z4Vqc for ; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) (envelope-from ml@netfence.it) Received: by mailman.nyi.freebsd.org (Postfix) id 4A53E4C86D9; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) Delivered-To: emulation@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4A1F94C8545 for ; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) (envelope-from ml@netfence.it) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DDF2S0kR1z4VHk for ; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) (envelope-from ml@netfence.it) Received: by freefall.freebsd.org (Postfix) id 055E318BB0; Sun, 10 Jan 2021 11:28:16 +0000 (UTC) Delivered-To: vbox@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id EDA5018B7A for ; Sun, 10 Jan 2021 11:28:15 +0000 (UTC) (envelope-from ml@netfence.it) Received: from soth.netfence.it (mailserver.netfence.it [78.134.96.152]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mailserver.netfence.it", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DDF2Q6G7tz4VNQ; Sun, 10 Jan 2021 11:28:14 +0000 (UTC) (envelope-from ml@netfence.it) Received: from alamar.ventu (alamar.local.netfence.it [10.1.2.18]) (authenticated bits=0) by soth.netfence.it (8.16.1/8.16.1) with ESMTPSA id 10ABSBx0082651 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Sun, 10 Jan 2021 12:28:12 +0100 (CET) (envelope-from ml@netfence.it) X-Authentication-Warning: soth.netfence.it: Host alamar.local.netfence.it [10.1.2.18] claimed to be alamar.ventu Subject: Re: VirtualBox can't read VDI anymore From: Andrea Venturoli To: vbox@FreeBSD.org, freebsd-virtualization@freebsd.org References: <4f894683-d6dc-c878-6e92-fb0832b85a49@netfence.it> Message-ID: <8937b6db-0e68-90cd-da86-084c98c241fc@netfence.it> Date: Sun, 10 Jan 2021 12:28:11 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: <4f894683-d6dc-c878-6e92-fb0832b85a49@netfence.it> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4DDF2Q6G7tz4VNQ X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=netfence.it; spf=pass (mx1.freebsd.org: domain of ml@netfence.it designates 78.134.96.152 as permitted sender) smtp.mailfrom=ml@netfence.it X-Spamd-Result: default: False [-3.80 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[78.134.96.152:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:78.134.96.152]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; HAS_XAW(0.00)[]; SPAMHAUS_ZRD(0.00)[78.134.96.152:from:127.0.2.255]; ARC_NA(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[netfence.it,none]; NEURAL_HAM_SHORT(-1.00)[-0.998]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:35612, ipnet:78.134.0.0/17, country:IT]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-virtualization] X-Mailman-Approved-At: Mon, 11 Jan 2021 08:27:19 +0000 X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 Jan 2021 11:28:16 -0000 On 1/8/21 7:58 PM, Andrea Venturoli wrote: > Hello. > > I'm tracking the quarterly port branches and building my packages with > poudriere. > Today I switched from 2020Q4 to 2021Q1 and upgraded VirtualBox from > 5.2.44_3 to 5.2.44_4. > After that I can no longer start any guest. > What I get: >> VDI: error reading pre-header in '....vdi' (VERR_DEV_IO_ERROR). >> VD: error VERR_VD_VDI_INVALID_HEADER opening image file '....vdi' >> (VERR_VD_VDI_INVALID_HEADER). >> Failed to open image '....vdi' in read-write mode >> (VERR_VD_VDI_INVALID_HEADER). >> AHCI: Failed to attach drive to Port0 (VERR_VD_VDI_INVALID_HEADER). >> >> >> Result Code: NS_ERROR_FAILURE (0x80004005) >> Component: ConsoleWrap >> Interface: IConsole {872da645-4a9b-1727-bee2-5585105b9eed} > > Any hint? > > > > Does this have anything to do with the following: >> emulators/virtualbox-ose: Turn off aio usage and make VirtualBox use >> generic >> Unix implementation. I can confirm reverting this change makes VirtualBox work again for me. (Noted also on #168298). bye av.