From nobody Tue Apr 26 14:10:51 2022 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id B19051AB7B37 for ; Tue, 26 Apr 2022 14:11:07 +0000 (UTC) (envelope-from eugene@zhegan.in) Received: from elf.hq.norma.perm.ru (mail.norman-retail.ru [128.127.146.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.norma.perm.ru", Issuer "Let's Encrypt Authority X3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4KnkLy0nbxz3HcW for ; Tue, 26 Apr 2022 14:11:05 +0000 (UTC) (envelope-from eugene@zhegan.in) Received: from [192.168.100.79] (net147.234.188-221.ertelecom.ru [188.234.147.221] (may be forged)) by elf.hq.norma.perm.ru (8.16.1/8.15.2) with ESMTPS id 23QEAvVk082281 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Tue, 26 Apr 2022 19:10:58 +0500 (+05) (envelope-from eugene@zhegan.in) Message-ID: <2c2d774c-3677-c3b7-d099-71318743a434@zhegan.in> Date: Tue, 26 Apr 2022 19:10:51 +0500 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 To: freebsd-stable@freebsd.org Content-Language: en-US From: "Eugene M. Zheganin" Subject: FreeBSD boot from root pool larger than 1Tb/cannot read MOS/all block copies unavailable Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Server: elf.hq.norma.perm.ru X-Rspamd-Queue-Id: 4KnkLy0nbxz3HcW X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of eugene@zhegan.in designates 128.127.146.8 as permitted sender) smtp.mailfrom=eugene@zhegan.in X-Spamd-Result: default: False [-1.78 / 15.00]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; DMARC_NA(0.00)[zhegan.in]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_SPAM_LONG(0.52)[0.521]; MLMMJ_DEST(0.00)[freebsd-stable]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:212494, ipnet:128.127.146.0/24, country:RU]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[188.234.147.221:received] X-ThisMailContainsUnwantedMimeParts: N Hello, recently I found another server that was running 12.x and became unbootable because of the famous "cannot read MOS/all block copies unavailable/etc" gptzfsboot message which can be randomly displayed when boot blocks migrate beyond 1st Tb on a large root pool. I managed to boot the server from CD (pointing out the root pool with vfs.root.mountfrom) and then upgraded it to the recent 13.0, where is showed no signs of being able to boot from disks again (so I'm treating this as still not fixed, and probably as won't be fixed issue). Since this issue is like 10 years old and I see no light at the end of the tunnel, could the bsdinstall at least be made aware about this so it won't permit the large root pool creation by default ? Because as far as I remember there's still no option in it to create a pool smaller than the disk, and I have to use the custom installation script in order to do this. I'm asking because unfortunately recently I've found two more of these time bombs among my servers. Thanks. Eugene. P.S. There have been speculations that switching to the UEFI loader may help, because it's more functional and probably can see the migrated over 1Tb boot blocks, can anyone confirm this ?