Sorry, but I'm not sure what you mean by this.
Suppose there's a maximum length. Also suppose that any characters entered beyond that are simply ignored. For illustration purposes, let's say that's 24 chars.
Now, when the system encrypts the drive, it tells you a recovery password, which you should keep in a safe place. A prudent security rule would be "The recovery password is as long as practical", simply to avoid dictionary or brute-force attacks. So the system would generate a random recovery password that was the maximum length, i.e. the aforementioned 24 chars.
So if there's a maximum password length at all, then one could reasonably expect the recovery password to be that length, because that would be the most prudent rule for recovery passwords.
Or put another way, if there's a max password length, and the recovery password generator produces random passwords shorter than that, then it's not using the full available password strength. No rational security developer would do that intentionally.
All of this presupposes there
is a maximum length, beyond which additional password chars are ignored. But your own results in post #4 contradict that, or at least show that any maximum length is greater than the length of the password you used.
As to possible issues, the main one that comes to mind is the possibility of you forgetting it.
I suppose ease of access is another possible issue. As a trivial example, suppose your password was the first 10 paragraphs of "War and Peace", in Russian. That would take a long time to enter, and you'd need perfect accuracy, so it would limit the ease with which you could gain access.