https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=208251

            Bug ID: 208251
           Summary: [regression] Bogus passphrase prompts after r296963 on
                    system with slices
           Product: Base System
           Version: 11.0-CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Keywords: regression
          Severity: Affects Some People
          Priority: ---
         Component: bin
          Assignee: freebsd-bugs@FreeBSD.org
          Reporter: f...@fabiankeil.de
          Keywords: regression

After r296963 (tested with a system based on r297146),
I get additional, but bogus password prompts while booting
from a disk with the following layout:

fk@r500 ~ $gpart show
=>       63  488397105  ada0  MBR  (233G)
         63  488397105     1  freebsd  [active]  (233G)

=>        0  488397105  ada0s1  BSD  (233G)
          0         16          - free -  (8.0K)
         16    2097152       1  !0  (1.0G)
    2097168    4194304       2  freebsd-swap  (2.0G)
    6291472  482105633       4  !0  (230G)

ada0s1d is geli-encrypted and contains the system's ZFS pool.

ada0s1a is the unencrypted boot partition (UFS) which also
holds a geli keyfile for ada0s1d.

Instead of asking for the passphrase for ada0s1d, the new
passphrase prompt asks for a passphrase for disk0p1,
presumably because the geli metadata on ada0s1d is
misinterpreted as metadata for ada0s1.

Entering the correct passphrase results in the message
"Bad GELI key: -1" and the prompt is repeated.

After three failed attempts I get the passphrase prompt
from the loader (due to geom_eli_passphrase_prompt="YES")
and the system boots fine.

My other systems use a GPT layout and continue to work
as expected.

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"

Reply via email to