From nobody Sun Dec 3 23:32:24 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Sk34P3cdqz51mVd for ; Sun, 3 Dec 2023 23:32:37 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-lf1-f47.google.com (mail-lf1-f47.google.com [209.85.167.47]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Sk34P1dKgz4LRj for ; Sun, 3 Dec 2023 23:32:37 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-lf1-f47.google.com with SMTP id 2adb3069b0e04-50be3611794so1922430e87.0 for ; Sun, 03 Dec 2023 15:32:37 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701646355; x=1702251155; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=pkyWM/q0vS5wkwgFEzRfh2RVRiacoSLGIBOeqWkuksU=; b=H4/v69fNgOBRtsVvg3LrQlJ+TUmvojPXKCQVXTBDd2ch6SA/QCItwyBN/cvB8scf7s gxhPGQ4TsMl1RAePGqnzV1EDEgBPdVnfogK5WspV636DXdWhAHrpQuV31kVzZXLO9Qm9 ybPTUOtj98/EsU6dkRPdcWJMSdf93ypzkAz4HYOQYSBToEclCOqEB58SgiTe1fM0R14v 1x1v4aH7EPxSbUuMCBtkOR5p3gW25iD5Hiv6pl8/87laDmJ4dLm9Mvt4ejaFmdV6Ichz /tlqlQyASruKqCUqUEqVl9cgcRbQHho+Bjpd1O65o6jEjwGZS9a6P1MaRXlELKpPU/so ZuRg== X-Gm-Message-State: AOJu0YyB6FytvK8vpyAm0sShshwMBv92QscpOqCzJPuF12sv3DNcbSso ApQcOg/+m2Pm3NGRcw4b9kQMX+EgaJFUk0tuU2xzk1Dj X-Google-Smtp-Source: AGHT+IGWl75xhk3DlCt5/p8w3WPzuvuoD0Ry4ecGo9Www1TimnO7YAa6b8wYL50ovZjK/zkhvs/A2SK0BbhHP+4/qsc= X-Received: by 2002:a05:6512:3704:b0:50b:f2fc:3a7e with SMTP id z4-20020a056512370400b0050bf2fc3a7emr397233lfr.65.1701646354709; Sun, 03 Dec 2023 15:32:34 -0800 (PST) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 References: <20231201031737.DF0231B942@freefall.freebsd.org> In-Reply-To: From: Ed Maste Date: Sun, 3 Dec 2023 18:32:24 -0500 Message-ID: Subject: Re: FreeBSD Errata Notice FreeBSD-EN-23:16.openzfs To: mem@schmem.com Cc: freebsd-stable@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US] X-Rspamd-Queue-Id: 4Sk34P1dKgz4LRj On Sat, 2 Dec 2023 at 19:11, Mark E. Mallett wrote:> > Second, it gives workaround of "vfs.zfs.dmu_offset_next_sync sysctl to 0" > But on my 12.4 systems there is no such sysctl variable. Oh, yes - the workaround is only applicable to 13.2 and later. For 12.4 there is no workaround. Note that it is much harder to encounter accidentally on 12.4, as 12.4 does not support copy_file_range(2). Applications that explicitly seek holes can encounter this issue (and it is reproducible on 12.4 via the test scripts) but it won't occur when using cp to copy on 12.4.