Hi zigo, According to the upstream temporary fix[1], the ZFS SIMD issue is specific to x86 architecture. It affects the following 3 parts of ZFS:
1. fast fletcher checksum (sse*, avx*) (used for data integrity check) 2. raidz 3. illumos crypto library Some architectures such as ppc64el are not affected at all. Plus, ZFS encryption is a feature introduced since 0.8.0, and 0.7.X doesn't have it. [1] https://github.com/zfsonlinux/zfs/commit/e22bfd814960295029ca41c8e116e8d516d3e730 On 2019-06-09 19:55, Thomas Goirand wrote: > On 6/6/19 5:16 PM, Ondřej Surý wrote: >> If we cannot make the ZoL in Buster safe for our users it needs to be >> removed from the release > > My understanding is that the issue is only affecting the performance of > the encryption part of ZFS, right? If so, I don't see why we should > remove ZFS from Buster, if ZFS continues to work perfectly, as long as > one doesn't use the encryption feature. Some warning lines in the > release notes, explicitly telling we recommend against using ZFS > encryption would IMO be enough. > > Please let me know if I'm wrong. > > Cheers, > > Thomas Goirand (zigo)