From nobody Sun Dec 04 18:49:58 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NQG2G1zs6z4jF18 for ; Sun, 4 Dec 2022 18:49:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NQG2G00khz3PcH for ; Sun, 4 Dec 2022 18:49:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1670179798; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=NhU5+C9o01KgaLUu3zeLDUM2/ykz1lSf6LLCbyzSHIA=; b=GzoNUGKXL49zZ/Wsflz6DAi8WehB21v+ndddXoXlayCQ4GF7Vu0SWPR1bHothPmJE64XOm YRgDW1t8PR2pkuz9zNqcKl5MBXHE29lgXrDtjCAyAEYlkr0Ljwetgc8fv6jMagHmGubHZS 8yi2Habg9G0XI5w9aCThdqrEUBX2uQQM1QpoAKWKFFUNytNjBz9dNSZd5GzcUPmMlXM5oc GpPWkyZSMx94fe1tTU3G3GgGWVswmnTNxjLO5gt8CHPLUkC29aPdgEiBdQa66tcE50K6c5 kVIx1qcp+outIT98VzPad15Cskou7wB0zzY37bRI3GWTAnpzXLcCL491WuTgSw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1670179798; a=rsa-sha256; cv=none; b=PTw+s+7np3l9ZBzFEHY9MTUYk0WlcFU16yhorsDJMwTOGTkjx/Sbv+31KVhpzEIaI0V5qD NXsfIvpxS0dPQnglzPHroPHhmFMa+Kg1dwCdxvVQ27+ylqB5C6JgX5axpqQzrn9/O29IvC Ofn8KF/DRIM/QfjV2ESszx390XyjoXf3gvZ9CxN88d0w4yLkI82v7nzvb90XAkc/LpfbtE SVxH/gGedDACi//F3kO23yhjVu5m+An4u/wO84l47SsbkbR33oZxm0L+27lev1dFIVYlAW QrpDv5mwPSGcCHXvuh2jVcoykTbOQb7q3+hZ1qAtJj3l1HHFeAytHuEjTitdiw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4NQG2F68t3zTcS for ; Sun, 4 Dec 2022 18:49:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 2B4Invlb032082 for ; Sun, 4 Dec 2022 18:49:57 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 2B4Invx2032081 for bugs@FreeBSD.org; Sun, 4 Dec 2022 18:49:57 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 268100] 13.1's loader.efi is not able to find a ZFS pool if it was checkpointed on 12.3 Date: Sun, 04 Dec 2022 18:49:58 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: loader, needs-qa X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: ml@netfence.it X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D268100 --- Comment #2 from ml@netfence.it --- (In reply to Warner Losh from comment #1) First off, there are no "characteristics of the ZFS snapshot": we are talki= ng about "zpool checkpoint", not "zfs snap". I have no idea on why loader.efi can't boot from a checkpointed ZFS pool:=20 I only saw the message above ("can not read checkpoint data"). I don't have the original problematic pool anymore: it was a production ser= ver and I needed to boot it ASAP, so I just issued "zpool checkpoint -d" (that = is, as soon as I relized what the problem was). I guess, in order to recreate the situation, procedure would be: install 12= .3 UEFI+ZFS, checkpoint, upgrade to 13.1 (maybe upgrading boot loader is enoug= h). The only thing I could add is it was a zraid5 pool (3 disks); not sure it matters. Importance is "less than bulk" to me: it would have saved me three hours of spreading panic if I had known; now I'll simply check if a checkpoint exists before upgrading (or, if I forget, boot from an USB key and remove it later= ). My only goal was to let other people know, so maybe they won't be hit so ha= rd by this. --=20 You are receiving this mail because: You are the assignee for the bug.=