From owner-freebsd-stable@freebsd.org Fri Feb 19 18:24:37 2021 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E6603535DBD for ; Fri, 19 Feb 2021 18:24:37 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Dj0NP50jJz4qJm for ; Fri, 19 Feb 2021 18:24:37 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by home.opsec.eu with local (Exim 4.94 (FreeBSD)) (envelope-from ) id 1lDAS0-00022p-In; Fri, 19 Feb 2021 19:24:24 +0100 Date: Fri, 19 Feb 2021 19:24:24 +0100 From: Kurt Jaeger To: Warner Losh Cc: David Marec , freebsd-stable Subject: Re: FreeBSD 13/stable and zpool upgrade Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 4Dj0NP50jJz4qJm X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; ASN(0.00)[asn:12502, ipnet:2001:14f8::/32, country:DE] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Feb 2021 18:24:38 -0000 Hi! > > Unfortunately it contains an old version of the boot loader: [...] > We should be better about upgrading boot blocks, but EFI is kinda new and > kinda different than the other out-of-root-filesystem boot blocks we've had > in the past, so there's still some rough edges. We run many systems at remote sites. If we can't remotely upgrade without drama from 12.x to 13.x, that would be a catastrophe. Any chance this can be fixed before 13.0-REL ? -- pi@opsec.eu +49 171 3101372 Now what ?