From nobody Sun Sep 03 03:30:28 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RdcjY4KSRz4s019 for ; Sun, 3 Sep 2023 03:30:41 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from www121.sakura.ne.jp (www121.sakura.ne.jp [153.125.133.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4RdcjW2qSLz3bsg for ; Sun, 3 Sep 2023 03:30:38 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Authentication-Results: mx1.freebsd.org; dkim=none; spf=none (mx1.freebsd.org: domain of junchoon@dec.sakura.ne.jp has no SPF policy when checking 153.125.133.21) smtp.mailfrom=junchoon@dec.sakura.ne.jp; dmarc=none Received: from kalamity.joker.local (123-1-88-210.area1b.commufa.jp [123.1.88.210]) (authenticated bits=0) by www121.sakura.ne.jp (8.16.1/8.16.1/[SAKURA-WEB]/20201212) with ESMTPA id 3833USV8053825 for ; Sun, 3 Sep 2023 12:30:28 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Sun, 3 Sep 2023 12:30:28 +0900 From: Tomoaki AOKI To: freebsd-stable@freebsd.org Subject: Is there any plan for ZFS and timerfd updates on stable/14? Message-Id: <20230903123028.4ffceb705824f86d2efc21e3@dec.sakura.ne.jp> Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; amd64-portbld-freebsd14.0) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spamd-Bar: / X-Spamd-Result: default: False [0.56 / 15.00]; SUBJECT_ENDS_QUESTION(1.00)[]; AUTH_NA(1.00)[]; NEURAL_HAM_LONG(-0.99)[-0.990]; MV_CASE(0.50)[]; NEURAL_HAM_MEDIUM(-0.48)[-0.480]; NEURAL_HAM_SHORT(-0.47)[-0.473]; MIME_GOOD(-0.10)[text/plain]; ONCE_RECEIVED(0.10)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[sakura.ne.jp]; RCPT_COUNT_ONE(0.00)[1]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_NA(0.00)[no SPF record]; RCVD_COUNT_ONE(0.00)[1]; HAS_ORG_HEADER(0.00)[]; TO_DN_NONE(0.00)[]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:7684, ipnet:153.125.128.0/18, country:JP]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org] X-Rspamd-Queue-Id: 4RdcjW2qSLz3bsg Hi. There are discussions about deadlocks issue of ZFS on freebsd-current ML, starting from [1] last month. IIRC, at least some fixes (candidates?) are merged to main, but not yet to stable/14. Upcoming (aleready released? or still rc3?) OpenZFS 2.2-release seems to have most of them. So my 1st question is "Is there any plan to import vendor/openzfs/zfs-2.2-release into stable/14 BEFORE BRANCHING releng/14? And one more. timerfd is added at last-minutes BEFORE stable/14 is branched, and already have not-yet-MFC'ed fixes [2], [3], [4] and Differential revision D41600 on Phablicator [5] related to memory leaks and locks. Additionally, splitting out lib32 part to proper place is proposed as D41640 [6]. Both [5] and [6] are accepted but not yet landed. Also, D41641 [7] proposes namespace pollution adjustments. This can be optional? Memory leaks and improper locks can lead system to security issues or deadlocks, so it would be benefical if landed and MFC'ed BEFORE releng/14 branches. Is there any plan to do so? At least, existing deadlocks should be considered as SHOW-STOPPER and resolved. I myself am bitten by several deadlocks on poudriere full builds after upgrading base from stable/13 to stable/14, finally finished with increasing kern.maxvnodes after powercycle on each deadlock and continue. Thanks in advance! [1] https://lists.freebsd.org/archives/freebsd-current/2023-August/004162.html [2] https://cgit.freebsd.org/src/commit/?id=02f534b57f84d6f4f97c337b05b383c8b3aaf18c [3] https://cgit.freebsd.org/src/commit/?id=5eab523053db79b4bd4f926c7d7ac04444d9c1da [4] https://cgit.freebsd.org/src/commit/?id=f4296cfb409a48de00bfa60e76f686c2b031876f [5] https://reviews.freebsd.org/D41600 [6] https://reviews.freebsd.org/D41640 [7] https://reviews.freebsd.org/D41641 -- Tomoaki AOKI