Jump to content

Panic on boot OC 0.6.3, Big Sur GA

2 posts in this topic

Recommended Posts

Hi, new around here, I used to use clover but migrated recently to open core, which I like much better. Hopefully the right place to post...


I have the following problem:

I have a running coffee lake based system running perfectly 11.0 Beta (20A5384c).


I am trying to update the 11.0.1 (GA).

- I updated opencore to 0.6.3, updated all kexts, etc..

- I checked my config with https://opencore.slowgeek.com, the only yellow I have is "SystemProductName = iMacPro1,1 this is not a suggested SMBIOS for Coffee Lake Desktop systems. See PlatformInfo Docs". This is intentional and again working just fine in the beta version.

- when I try to update, I am getting panic very early in the boot process, exactly as described here.



However, after updating opencore to 0.6.3 and trying both SecureBootModel "Default" (as I have it now) or "Disabled", I am still running into this issue.


Any ideas please? It is also quite painful to debug this, as it panics instantly.



Kernel Panic on Rooting from the live fs

Full error:

> Rooting from the live fs of a sealed volume is not allowed on a RELEASE build
This is due to issues around Secure Boot boot being enabled in Beta 10 with older versions of OpenCore. Simply update to 0.6.3 to resolve

  • Specifically commit ba10b5d or newer is required

Full Panic trace:


panic(cpu 0 caller 0xffffff80108e63c2): "Rooting from the live fs of a sealed volume is not allowed on a RELEASE build\n"@/AppleInternal/BuildRoot/Library/Caches/com.apple.xbs/Sources/apfs/apfs-1677.50.1/kext/apfs_vfsops.c:2011
Backtrace (CPU 0), Frame : Return Address
0xffffffa11248aea0 : 0xffffff800d8bc66d mach_kernel : _handle_debugger_trap + 0x3dd
0xffffffa11248aef0 : 0xffffff800d9ff073 mach_kernel : _kdp_i386_trap + 0x143
0xffffffa11248af30 : 0xffffff800d9ef6aa mach_kernel : _kernel_trap + 0x55a
0xffffffa11248af80 : 0xffffff800d861a2f mach_kernel : _return_from_trap + 0xff
0xffffffa11248afa0 : 0xffffff800d8bbf0d mach_kernel : _DebuggerTrapWithState + 0xad
0xffffffa11248b0c0 : 0xffffff800d8bc1f8 mach_kernel : _panic_trap_to_debugger + 0x268
0xffffffa11248b130 : 0xffffff800e0bee1a mach_kernel : _panic + 0x54
0xffffffa11248b1a0 : 0xffffff80108e63c2 com.apple.filesystems.apfs : _apfs_vfsop_mount + 0x339b
0xffffffa11248b990 : 0xffffff80108efa2a com.apple.filesystems.apfs : _apfs_vfsop_mountroot + 0x3d
0xffffffa11248b9c0 : 0xffffff800db42bd0 mach_kernel : _vfs_mountroot + 0x140
0xffffffa11248bb40 : 0xffffff800ddff853 mach_kernel : _set_rootvnode + 0x3c53
0xffffffa11248be70 : 0xffffff800d8e9f73 mach_kernel : _max_valid_stack_address + 0xdf3
0xffffffa11248bfa0 : 0xffffff800d86113e mach_kernel : _call_continuation + 0x2e
      Kernel Extensions in backtrace:
            dependency: com.apple.driver.AppleEFINVRAM(2.1)[78808055-9D80-3318-8BEE-4C545178A586]@0xffffff800ec55000->0xffffff800ec5efff
            dependency: com.apple.driver.AppleEffaceableStorage(1.0)[D239B6A7-DBDE-304E-B049-A9A5A4FD3C5A]@0xffffff800ec68000->0xffffff800ec6dfff
            dependency: com.apple.iokit.CoreAnalyticsFamily(1)[BD9FAC59-1D74-38B6-95AE-BCD7E56A3A64]@0xffffff800f0a3000->0xffffff800f0a9fff
            dependency: com.apple.iokit.IOStorageFamily(2.1)[3FE3BE82-782C-3D93-8EFA-F06A4594D17C]@0xffffff8010337000->0xffffff8010348fff
            dependency: com.apple.kec.corecrypto(1.0)[42140686-EB80-38BB-8CDD-E6CFECB83A5A]@0xffffff80109fc000->0xffffff8010a88fff
            dependency: com.apple.security.AppleImage4(3.0.0)[018822B1-ADD1-376F-8619-ACA92FA4438C]@0xffffff800ecca000->0xffffff800ecd9fff


Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...