From owner-freebsd-bugs@freebsd.org Fri Mar 25 17:22:41 2016 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 393C8ADD90A for ; Fri, 25 Mar 2016 17:22:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 29A58121A for ; Fri, 25 Mar 2016 17:22:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u2PHMf68070976 for ; Fri, 25 Mar 2016 17:22:41 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 208251] [regression] Bogus geli passphrase prompts after r296963 on system with slices Date: Fri, 25 Mar 2016 17:22:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: fk@fabiankeil.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Mar 2016 17:22:41 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208251 --- Comment #2 from Fabian Keil --- I just noticed that I was wrong about my GPT-using systems being unaffected, they were just not actually using the affected boot code yet. Most of my systems use the cloudiatr layout: [fk@elektrobier ~]$ gpart show ada0 =3D> 34 976773101 ada0 GPT (466G) 34 128 1 freebsd-boot (64K) 162 1886 - free - (943K) 2048 409600 2 freebsd-zfs (200M) 411648 16777216 3 freebsd-zfs (8.0G) 17188864 8388608 4 freebsd-swap (4.0G) 25577472 951195648 5 freebsd-zfs (454G) 976773120 15 - free - (7.5K) ada0p2 is the unencrypted boot pool that can be deleted after the system is up. It contains parts of the kernel and a keyfile that is required to geli-attach ada0p3 which contains the root pool. On systems that have to be rebooted unattended no passphrase is being used. After r296963 the systems can no longer be booted unattended as there's nobody to skip the bogus passphrase prompts. On the bright side, the partition with the metadata is detected correctly ... --=20 You are receiving this mail because: You are the assignee for the bug.=