Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Jun 2015 09:18:21 +0200
From:      "OpenIT Customer Support (ISP) via RT" <support@openit.de>
To:        freebsd-stable@freebsd.org
Subject:   [OpenIT #136287] [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:07.zfs
Message-ID:  <rt-4.2.10-4819-1433920700-796.136287-27-0@OpenIT.de>
In-Reply-To: <201506092239.t59MddQF011849@freefall.freebsd.org>
References:  <RT-Ticket-136287@OpenIT.de> <201506092239.t59MddQF011849@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Sehr geehrte Damen und Herren,

diese Nachricht wurde als Antwort auf Ihre Support-Anfrage bezüglich

        "[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:07.zfs"

automatisch erstellt.

Eine Antwort auf diese Nachricht ist nicht notwendig. Ihrer
Support-Anfrage wurde die Bezeichnung [OpenIT #136287] zugeordnet.

Wenn Sie zu dieser Support-Anfrage eine weitere E-Mail senden möchten,
sollte der Betreff den Text [OpenIT #136287] enthalten, damit Ihre
Nachricht korrekt zugeordnet werden kann.

                        Mit freundlichen Grüßen,
                        Ihr OpenIT Support-Team

-------------------------------------------------------------------------

Greetings,

This message has been automatically generated in response to the
creation of a trouble ticket regarding:

        "[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:07.zfs",

a summary of which appears below.

There is no need to reply to this message right now.  Your ticket has
been assigned an ID of [OpenIT #136287].

Please include the string [OpenIT #136287] in the subject line of all
future correspondence about this issue. To do so, you may reply to
this message.

                        Thank you,
                        your OpenIT Support-Team

-------------------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-15:07.zfs                                            Errata Notice
                                                         The FreeBSD Project

Topic:          ZFS Reliability Improvements

Category:       contrib
Module:         zfs
Announced:      2015-06-09
Affects:        FreeBSD 10.1 and later
Corrected:      2014-12-05 00:32:33 UTC (stable/10, 10.1-STABLE)
               2015-06-09 22:13:25 UTC (releng/10.1, 10.1-RELEASE-p11)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.freebsd.org/>.

I.   Background

ZFS is one of several filesystems available on FreeBSD.

ZFS on FreeBSD supports TRIM/UNMAP which helps flash based storage medium to
maintain peek performance.

ZFS uses different layers of disk cache to speed up read and write
operations, and supports second level ARC (L2ARC) which can be used as a
second layer cache, which provides storage for less frequently accessed
data that would not fit into RAM but still accessed often, providing
optimal cost for performance.

ZFS supports compression in L2ARC data which optimizes its space efficiency.

II.  Problem Description

When the ZFS filesystem on a file backed pool is used with TRIM support
enabled, which is the default, ZIO_TYPE_FREE requests where incorrectly
processed as a write request.

When the ZFS filesystem is using L2ARC and when L2ARC compression is used,
the compression buffer are not properly released sometimes.

III. Impact

The first problem will panic the system when it happens.

The second problem will exhibit as a memory leak, which would lead to
performance degradation and eventually a memory overflow, which would
lead to a panic.

IV.  Workaround

The first issue can be mitigated by disabling TRIM for ZFS using
the loader option vfs.zfs.trim.enabled=0.

The second issue can be mitigated by disabling L2ARC.

V.   Solution

Perform one of the following:

1) Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.

2) To update your present system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

3) To update your present system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-15:07/zfs.patch
# fetch https://security.FreeBSD.org/patches/EN-15:07/zfs.patch.asc
# gpg --verify zfs.patch.asc

b) Apply the patch.  Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html>; and reboot the
system.

VI.  Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path                                                      Revision
- -------------------------------------------------------------------------
stable/10/                                                        r275492
releng/10.1/                                                      r284193
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;

VII. References

The latest revision of this Errata Notice is available at
https://security.FreeBSD.org/advisories/FreeBSD-EN-15:07.zfs.asc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.4 (FreeBSD)
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=7KJF
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?rt-4.2.10-4819-1433920700-796.136287-27-0>