From nobody Sat Jul 30 01:14:30 2022 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4LvmdB5fW5z4XbvZ for ; Sat, 30 Jul 2022 01:14:38 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic314-20.consmr.mail.gq1.yahoo.com (sonic314-20.consmr.mail.gq1.yahoo.com [98.137.69.83]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Lvmd94yzcz3mjQ for ; Sat, 30 Jul 2022 01:14:37 +0000 (UTC) (envelope-from marklmi@yahoo.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1659143674; bh=kuv58Iz0tecUKUV5ShQnTc3fQBhJA10Nx5yBB9GmSBQ=; h=From:Subject:Date:Cc:To:References:From:Subject:Reply-To; b=kwYm+PUoxjk55EKl6Tp/KHx2OCulhUtwzXO8RP/93TpyPWKj0qsZ1kMTV8HXcPQIn2a/VfP3UgsJs0HU3xY5GU3PsA0kCvtT8z8dGrYv/oNEJp/OAl01UPLfkFNwz183g/CcF6KmB/G91/+RkfBxtKL2+m5IQbW3zhJLwwh5jXF81dgA7tlq2dSnweAHCuZ/UdYUduJxZJg2MU3n71p7cZ0xe5JzFCU9z1MidjS/ahH7Z1c0Gkwntz4ZvSDzTsp5vrNj2qYzJPSksQb/POBelCEVDo8PqgPUqDiY43yaJZMrNCDYAVJ/PTsR0ElGIdXviVWtLO9WdHdQta0KvFUUsA== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1659143674; bh=K6f3C6SFssLbEJ3jm7Nt1LOsuhPmR6HBnxbbCD2hT9M=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=dVfERnA9Ji1NaAv9jCYCyFeSgENa5F6DQ03X9ilHvzSvEotI6XcCYcsu6DeKTUvcZI3I9QeyoslQHOU2PcBxG05uUf5rr0LiopnlndxAC7RlD9A4VAxWhsyo9UcfM1v7MrQIZ7HCR6c0FyLAAFTs3895gIaXPVqYOLkwt6fsJbRAjC2ke+EHNN0D3GzO/K6CBituD1FROP7+J2zbGmyPTfR6Uz9zX+H66NW4jT3RZ2nV9jZHdCM8X8WPCivDhFUkXEOpqvfG3+uhDezK6DBmrl0wX9i0O8JQdlRFngXb/RIXNrrbRaVJydofh6Lgbj9nMTGrOBb/z7OtPD7XOUSWxw== X-YMail-OSG: CsYzSMkVM1nGUxpJijIL9GlUo7A9rzENsMWNFkHY8qwRpwTzS9c8TFBf1ZqgwCn yvHCGy68PyDlRP8f5XeHn_2Of1qEHMJOZCK0kNHydMb2_BEorN0ogfrxwyQ3OrxSLg4OPR2puK8z niWnakw1e7qwjH7nKqu9zj_8tcPckmFvszvmp4RDmBLNyQOAMg1NCyAAIfVcJzTUDLAv4ohAUPQH ZgAI0EhyV7CDXuAIgjKhVkKnhTVkEMFO0WPyEMQU63XXbgIOdrjrkdZKlNil_fcQOnk0BuncJkuy XkMSnzdVbMiIiN3yePQtc9S6hgTUI.Igtlp01KZ_fBCso1z3GOKT1Wk.FZC.SEkwhQ0VdV32U2wW FF6Dik5xb6HuE6SrIgSLnmkTh3iSM2EjIumuV17UHpIMppaduAXHm1YTgtRK1vn.yvFT8JJf3TAH vXvzDCO0bZ2P9ez0SQ.g6aZwTvuvF9EMWdxRxMs_YJ5ePwBwwsLpudWsqTW_jpbt4OzO8S_aZUKB nBkW7m2QHN8cncE56B6V.1Ajibh9LKxJCLQEJNyljH9vrzL5xuDKJVWbATxMGA02kekLNYyb5EDp ea3hP2yI_BrZ09wJ.mBAP.YbyEJRFGYq5eweRt_MuZAer0ZHFTVzgzmLDJNQNP_P9K8sK57phG7J UpW9VFXwDRjKyQzIvYBwV2f6di0n4Ct2YfkKSOnQI094ACfxEa..4poMOSF.5v9YiBR6_BZxxfQ3 agXw6m3QwOD0tO2bcHNKUHVcVa2WeHWzPqbVACI4wkKp377_cB99lKk3pTdGjyngmuu4UCg68wcV qZXfZQ9CSbSPeYS7qRVcsNrNidC8Z.lk8UltS3eGoXY3WnPrUIF3gRqQtIw61aU6nv.ys46TVfcz w.loPujtQo7MxtToVFIJrgRccR0KzK4btpG.vJGF7JJt8hNL8rxbQ1LS7CPx3mt5bHGwobZI_vur Kd_C2BSNw4KDDas5_nDxt8K9LATHOkMFyG1ITx5aYyqBY6a8W1uMp3JGRKVYsndvfHYnZV5pUt4U qmcveKpF0TxGcexu2eOIQyFhxMNqdGos0xThlIpoD2ffsGnW7KrUYVPYAOIAW0HUqHMWuhy_I25Y f3JYKGV5ibZwW52NZvyvMb5WgsbH5Nm1ZWSTHvAhk9mgsSk4AmVFhq12BZs8nCo84PORa.HUqbx_ x23.fGerdpj89cKonRUzzwgQtDsCJcwIUMvMgd.A1CiANVD3XVGLMJysdqeZ.DhhIVehYzclodRw F7tojLHiQihK4GlGFCrle44NFbPiYqlbaa2LMzjJuwxJ.RWor1r9GtE.pzDGTuiZ_nbM0yIQN_84 RNlvzgdPV02LWJENZBH6kWmVkC2ns7zRwbt9UwlGx1qFw0HyOxcxBTwShSpBgQgcOJLM7kC.4027 VbP.c6tV3UQd2qR1p16FJaloSFTYb6rm_oZWaIC3nTwEtiDC_oz5zWpvqgkueIXWUj95Easw8AHN 6MG83KNwBpk5We2ZXIu3UXksgfw0IIpwqQS8LYV_mNzzJ2J3LalO1KTFMlt4wPtIFDCGxN1JBN2o qZDcFk48sQhOQXf6M_g0oW_yh3XYDggVmCgqQQW5ZVKGQmdiWZZECTes3AIKTGn7dkgSDy789NsN WLZWFjFHb87dOal0b6aq_UOFgzmCb1LaPyFhGFFK7v4ZezLurvoODV9jqXUfRxLueBQG.q2ELfLH sXpSqKbnz6Wyhj4uuHPNIDJaQ8V2EkApka0Py4FFsynVWjSXbnjJ.hGBjAmw6yGRh9eEoOGj3LLf G.9A9CJzvHCeXhLY9KZyJ7Z56PHtwsEuI_L2b6vR.U.yMx00.HEqJobL41hy0jFdftb9EHgHnKU1 n7ieSSTg0Kvhhy73WDdZ1ELfd6sbZBjkCPjhyPw9jTnqLbT2KRK.8oTzl27TUD9vbWyHaE5ijK8h aVdNJLPJiPFzUy9n8suBa6QQOMoOFmLFXAaJlbtBF_foKm3s4pa3Z7AosKNDLnrU.BbB8ltrsspQ BiYnM2XJRMv9aRG_EQkYHrxIaM0aXXUz8zEkLrSCmydWIAAdNx4fAe6bGhi6PlRjC766EvxPy9nv SeslOUPxSVLBk1ZiqfRADkWeIaaIMAl5IEJKIaDsvEPSLlIvz5g_WZO4xc_E8JpKgcbWIdocWgp3 3E0vum4m.ry0N.750O.DCAah6VJwhQMGJgNylk2CAd5sVh9Y.KPVzrNNkRjBnw84CKXZO61uMict RLsCk1XoZhwchBSwmB2ZhUYDhGAoRSCjgK6BR61dIalgkbZFeyK009jdgWpqrr7qctcY9ixl4Iqy 34neJSrmTAPs- X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic314.consmr.mail.gq1.yahoo.com with HTTP; Sat, 30 Jul 2022 01:14:34 +0000 Received: by hermes--production-gq1-7b45fb68df-d9xbj (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID d286a9e52b6a7445b6a2cb1561e027f0; Sat, 30 Jul 2022 01:14:31 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\)) Subject: RE: UFS checksum error during arm64 VM installation Message-Id: Date: Fri, 29 Jul 2022 18:14:30 -0700 Cc: Ed Maste To: weh@microsoft.com, FreeBSD Hackers X-Mailer: Apple Mail (2.3654.120.0.1.13) References: X-Rspamd-Queue-Id: 4Lvmd94yzcz3mjQ X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=kwYm+PUo; dmarc=pass (policy=reject) header.from=yahoo.com; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.69.83 as permitted sender) smtp.mailfrom=marklmi@yahoo.com X-Spamd-Result: default: False [-3.31 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.99)[-0.992]; NEURAL_HAM_MEDIUM(-0.81)[-0.815]; MV_CASE(0.50)[]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[text/plain]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; RCVD_IN_DNSWL_NONE(0.00)[98.137.69.83:from]; RCVD_COUNT_THREE(0.00)[3]; FREEMAIL_FROM(0.00)[yahoo.com]; TO_DN_SOME(0.00)[]; RCVD_TLS_LAST(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org] X-ThisMailContainsUnwantedMimeParts: N Wei Hu wrote on Date: Fri, 29 Jul 2022 15:32:41 UTC : > > > We are trying to bring up FreeBSD on ARM64 Hyper-V. We are seeing = the iso > > image booted up fine and we can install the root disk with ZFS. = However, > > when choosing to install the root disk with UFS, we are seeing UFS = checksum > > errors as below and the installation just failed. > > > > > > ... > > > UFS /dev/da0p2 (/mnt) cylinder checksum failed: cg 41, cgp: = 0x45721f90 > > > !=3D bp: 0x23b0cc8 > > ... > >=20 > > Hi Wei, I assume you're trying this on relatively recent main? = (There were some > > cylinder checksum issues some time ago, I think related to growfs, = but as far as > > I know they were all fixed long ago.) >=20 > Hi Ed, Yes, we are trying from recent main (June, 2022). I do not know if the following is related or not. But it can suggest avoiding late-May to until fairly recent versions for activity that would read UFS superblocks or create UFS file systems and such: possible rejections could happen that later code would tolerate. There has been a bunch of recent activity about valdiating superblocks and such, starting in late may with: QUOTE author Kirk McKusick 2022-05-27 19:21:11 = +0000 committer Kirk McKusick 2022-05-27 = 19:22:07 +0000 commit 076002f24d35962f0d21f44bfddd34ee4d7f015d (patch) tree 5b6a4cb01a3afaefad15e7e6e9cc4cbcea0ffadf parent eca6e0f7e460bf9a4a6e1bd5198d75168280c88e (diff) download src-076002f24d35962f0d21f44bfddd34ee4d7f015d.tar.gz src-076002f24d35962f0d21f44bfddd34ee4d7f015d.zip Do comprehensive UFS/FFS superblock integrity checks when reading a = superblock. Historically only minimal checks were made of a superblock when it was read in as it was assumed that fsck would have been run to correct any errors before attempting to use the filesystem. Recently several bug reports have been submitted reporting kernel panics that can be triggered by deliberately corrupting filesystem superblocks, see Bug 263979 - [meta] UFS / FFS / GEOM crash (panic) tracking which is tracking the reported corruption bugs. This change upgrades the checks that are performed. These additional checks should prevent panics from a corrupted superblock. Although it appears in only one place, the new code will apply to the kernel modules and (through libufs) user applications that read in superblocks. . . . END QUOTE There have been well over a dozen related updates since then, including some activity in the last couple of weeks. Even growfs got a fix. Some changes were to avoid false rejections from old tool behavior that left behind somewhat odd UFS internal information, leaving file systems in a not-obvious state. Non-dangerous examples of such are now more tolerated. Some of the issues did block (re)booting normally for various folks for a time. These have been being fixed as they showed up. =3D=3D=3D Mark Millard marklmi at yahoo.com