From owner-freebsd-hackers@freebsd.org Sun Apr 29 19:36:33 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 56394FB66C5; Sun, 29 Apr 2018 19:36:33 +0000 (UTC) (envelope-from leres@freebsd.org) Received: from xse.com (xse.com [IPv6:2607:f2f8:abb8::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "xse.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C63427ED82; Sun, 29 Apr 2018 19:36:32 +0000 (UTC) (envelope-from leres@freebsd.org) Received-SPF: pass (dot.xse.com: authenticated connection) receiver=dot.xse.com; client-ip=2001:558:6045:10:9084:9e0:4b6d:eb99; helo=ice.alameda.xse.com; envelope-from=leres@freebsd.org; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10; Received: from ice.alameda.xse.com (ice.xse.com [IPv6:2001:558:6045:10:9084:9e0:4b6d:eb99]) (authenticated bits=0) by dot.xse.com (8.15.2/8.15.2) with ESMTPSA id w3TJa6AS052823 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Sun, 29 Apr 2018 12:36:08 -0700 (PDT) (envelope-from leres@freebsd.org) X-Authentication-Warning: dot.xse.com: Host ice.xse.com [IPv6:2001:558:6045:10:9084:9e0:4b6d:eb99] claimed to be ice.alameda.xse.com Subject: Re: Getting ZFS pools back. To: Warner Losh , Jan Knepper References: <5f836c79-b379-f066-689b-1645e393c5e9@digiware.nl> <1645b168-4133-693c-2dd3-8e0606abb9c3@digiware.nl> <07576f68-f67e-3a22-7a50-ff261c9b3fff@digitaldaemon.com> <5692d3b6-038e-4c4b-c5b6-b0f719b4ac38@digitaldaemon.com> Cc: FreeBSD Filesystems , FreeBSD Hackers , Richard Yao , Willem Jan Withagen , Alan Somers From: Craig Leres Message-ID: Date: Sun, 29 Apr 2018 12:36:05 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Virus-Scanned: clamav-milter 0.100.0 at dot.xse.com X-Virus-Status: Clean X-GBUdb-Analysis: Unknown X-MessageSniffer-Rules: 0-0-0-4746-c X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Apr 2018 19:36:33 -0000 On 04/29/18 11:34, Warner Losh wrote: > If you always install a new kernel and reboot > (especially across major releases) and then install the new binaries, > you're safe. I upgraded 40+ systems from 10.3-RELEASE to 11.1-RELEASE over the last few weeks including 8 or so with zfs partitions (but all boot off of ufs2). The work flow I converged on was: - (I use rcs for configs so) co -l all customized config files - Check /etc/freebsd-update.conf for the desired config - Download the upgrade updates (freebsd-update upgrade -r 11.1-RELEASE) - Check /etc/rc.conf and disable kern_securelevel if enabled - Check/update /etc/resolv.conf if using bind9* - Switch to /usr/bin/sshd if using openssh-portable - Copy and install custom 11.1 kernel from my build server - Stop most services - Save a list of installed packages: pkg info|sed -e 's/-[0-9a-zA-Z._,]* *.*//' > /var/tmp/a - Remove all packages (pkg-static delete -fya) - Reboot - Run "freebsd-update install" three times - Reinstall packages: pkg update -f pkg clean -ay pkg install -y `cat /var/tmp/a` - Check/reset/checkin configs and reboot I had zero^H^H^H^Hno zfs issues. On 04/29/18 11:32, Willem Jan Withagen wrote: > Most of my upgrades went smooth, other than being pestered by > files that are only changed in verssion no and/or comments. I also find this annoying but started manually updating things that were problematic before starting which minimized freebsd-update merging. Craig