Hi zigo,

According to the upstream temporary fix[1], the ZFS SIMD issue is
specific to x86 architecture. It affects the following 3 parts of
ZFS:

1. fast fletcher checksum (sse*, avx*) (used for data integrity check)
2. raidz
3. illumos crypto library

Some architectures such as ppc64el are not affected at all.
Plus, ZFS encryption is a feature introduced since 0.8.0,
and 0.7.X doesn't have it.

[1]
https://github.com/zfsonlinux/zfs/commit/e22bfd814960295029ca41c8e116e8d516d3e730

On 2019-06-09 19:55, Thomas Goirand wrote:
> On 6/6/19 5:16 PM, Ondřej Surý wrote:
>> If we cannot make the ZoL in Buster safe for our users it needs to be 
>> removed from the release
> 
> My understanding is that the issue is only affecting the performance of
> the encryption part of ZFS, right? If so, I don't see why we should
> remove ZFS from Buster, if ZFS continues to work perfectly, as long as
> one doesn't use the encryption feature. Some warning lines in the
> release notes, explicitly telling we recommend against using ZFS
> encryption would IMO be enough.
> 
> Please let me know if I'm wrong.
> 
> Cheers,
> 
> Thomas Goirand (zigo)

Reply via email to