On Tue, Jan 03, 2017 at 07:37:10AM +0100, Andreas Bartelt wrote:
> One of my amd64 machines does not boot anymore after updating to current
> (attached dmesg was obtained after booting a build of current from today but
> with a boot block from December, 22nd). Interestingly, the same disk (with a
> boot block from today's build) still boots fine with another amd64 machine
> (an old x61s thinkpad).
> 
> The disk image makes use of a softraid(4) encrypted root partition. On the
> affected machine, it triggers a reboot directly after the password has been
> entered.
> 
> I could narrow the problem down to the use of installboot(8), i.e., booting
> current still works on the affected machine with a boot block based on my
> previous build from December, 22nd.

I ran into the same problem on my thinkpad x130e and tracked it down to
this part of the changes committed in softraid_amd64.c r1.3:

@@ -433,7 +435,7 @@
        const char               openbsd_uuid_code[] = GPT_UUID_OPENBSD;
        struct gpt_partition     gp;
        static struct uuid      *openbsd_uuid = NULL, openbsd_uuid_space;
-       static u_char            buf[DEV_BSIZE];
+       static u_char            buf[4096];


So the problem seems to be that boot uses too much stack memory.

The diff below fixes the problem for me. As far as I can tell this
should work on both 512 and 4k disks. But I cannot test with a 4k disk.

Index: softraid_amd64.c
===================================================================
RCS file: /cvs/src/sys/arch/amd64/stand/libsa/softraid_amd64.c,v
retrieving revision 1.3
diff -u -p -r1.3 softraid_amd64.c
--- softraid_amd64.c    24 Dec 2016 22:49:38 -0000      1.3
+++ softraid_amd64.c    4 Jan 2017 18:14:16 -0000
@@ -435,7 +435,7 @@ findopenbsd_gpt(struct sr_boot_volume *b
        const char               openbsd_uuid_code[] = GPT_UUID_OPENBSD;
        struct gpt_partition     gp;
        static struct uuid      *openbsd_uuid = NULL, openbsd_uuid_space;
-       static u_char            buf[4096];
+       u_char                  *buf;
 
        /* Prepare OpenBSD UUID */
        if (openbsd_uuid == NULL) {
@@ -456,6 +456,8 @@ findopenbsd_gpt(struct sr_boot_volume *b
                *err = "disk sector > 4096 bytes\n";
                return (-1);
        }
+       buf = alloc(bv->sbv_secsize);
+       bzero(buf, bv->sbv_secsize);
 
        /* LBA1: GPT Header */
        lba = 1;
@@ -466,17 +468,20 @@ findopenbsd_gpt(struct sr_boot_volume *b
        /* Check signature */
        if (letoh64(gh.gh_sig) != GPTSIGNATURE) {
                *err = "bad GPT signature\n";
+               free(buf, bv->sbv_secsize);
                return (-1);
        }
 
        if (letoh32(gh.gh_rev) != GPTREVISION) {
                *err = "bad GPT revision\n";
+               free(buf, bv->sbv_secsize);
                return (-1);
        }
 
        ghsize = letoh32(gh.gh_size);
        if (ghsize < GPTMINHDRSIZE || ghsize > sizeof(struct gpt_header)) {
                *err = "bad GPT header size\n";
+               free(buf, bv->sbv_secsize);
                return (-1);
        }
 
@@ -487,6 +492,7 @@ findopenbsd_gpt(struct sr_boot_volume *b
        gh.gh_csum = orig_csum;
        if (letoh32(orig_csum) != new_csum) {
                *err = "bad GPT header checksum\n";
+               free(buf, bv->sbv_secsize);
                return (-1);
        }
 
@@ -514,6 +520,9 @@ findopenbsd_gpt(struct sr_boot_volume *b
                                found = 1;
                }
        }
+
+       free(buf, bv->sbv_secsize);
+
        if (new_csum != letoh32(gh.gh_part_csum)) {
                *err = "bad GPT entries checksum\n";
                return (-1);

Reply via email to