From owner-freebsd-questions@FreeBSD.ORG Mon Jan 12 22:12:52 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4889EE14 for ; Mon, 12 Jan 2015 22:12:52 +0000 (UTC) Received: from wonkity.com (wonkity.com [67.158.26.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "wonkity.com", Issuer "wonkity.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id E7FEF6CB for ; Mon, 12 Jan 2015 22:12:51 +0000 (UTC) Received: from wonkity.com (localhost [127.0.0.1]) by wonkity.com (8.14.9/8.14.9) with ESMTP id t0CMCnoV045678 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 12 Jan 2015 15:12:49 -0700 (MST) (envelope-from wblock@wonkity.com) Received: from localhost (wblock@localhost) by wonkity.com (8.14.9/8.14.9/Submit) with ESMTP id t0CMCnZD045675; Mon, 12 Jan 2015 15:12:49 -0700 (MST) (envelope-from wblock@wonkity.com) Date: Mon, 12 Jan 2015 15:12:49 -0700 (MST) From: Warren Block To: Adam Vande More Subject: Re: FreeBSD 10.1 i386 encrypted mirrored ZFS root on USB flash drives In-Reply-To: Message-ID: References: <54B04F50.3040905@holgerdanske.com> <54B42DDF.8020706@holgerdanske.com> User-Agent: Alpine 2.11 (BSF 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (wonkity.com [127.0.0.1]); Mon, 12 Jan 2015 15:12:49 -0700 (MST) Cc: David Christensen , FreeBSD Questions X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Jan 2015 22:12:52 -0000 On Mon, 12 Jan 2015, Adam Vande More wrote: > On Mon, Jan 12, 2015 at 2:26 PM, David Christensen < > dpchrist@holgerdanske.com> wrote: > >> freebsd-questions: >> >> I did another install, set the protective MBR boot flag on the USB drives >> using Linux fdisk, booted the machine, entered the encryption passphrase, >> and it crashes: >> >> Enter passphrase for da0p4: GEOM_MIRROR: Force device swap start >> due to timeout. >> >> GEOM_ELI: Device da0p4.eli created >> GEOM_ELI: Encryption: AES-XTS 256 >> GEOM_ELI: Crypto: software >> GEOM_MIRROR: Cancelling unmapped because of da0p3. >> GEOM_MIRROR: Device mirror/swap launched (1/2). >> GEOM_ELI: Device da1p4.eli created. >> GEOM_ELI: Encryption: AES-XTS 256 >> GEOM_ELI: Crypto: software >> Trying to mount root from zfs:cd2533/ROOT/default []... >> >> Fatal double fault: >> eip = 0xc186ad2e >> esp = 0xea4f2000 >> ebp = 0xea4f2360 >> cpuid = 0; apic id = 00 >> panic: double fault >> cpuid = 0 >> KDB: stack backtrace: >> #0 0xc0b53ed2 at kdb_backtrace+0x52 >> #1 0xc0b1688f at panic+0x11f >> #2 0xc101bedb at dblfault_handler+0xab >> >> >> Any ideas? >> > > A guess would be that it's USB related. I think your boot flag stuff is a > red herring. Maybe STABLE or USB mailing lists could shed more detail. As I (possibly incorrectly) understand it, using the boot flag in a PMBR depends on the BIOS. BIOS sees the PMBR as an MBR, and a strict BIOS might not boot a drive without any MBR partitions set to boot. I've been told that most should boot without it. The GPT spec says that the boot flag in the PMBR should not be set, so a strict UEFI will *not* boot with it. I know this has been seen, but I can't recall on which types of systems. Maybe Lenovo, or possibly Asus.