►
From YouTube: January 2023 OpenZFS Leadership Meeting
Description
Agenda: encryption; mmap bug; on-disk format doc
full notes: https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit#
A
All
right,
let's
get
started
happy
New,
Year,
welcome
to
the
January
2023
open,
zip
resolution
meeting
a
couple
things
on
the
agenda
for
today.
A
The
first
one
was
from
Rob
and
I'm,
not
sure
if
you're
on
the
call,
but
he
was
looking
for
reviews
or
feedback
and
his
pull
request
about
Cha-Cha
encryption.
B
I,
don't
see
him
he's
from
Australia,
so
the
time
zone
might
be
difficult.
A
C
A
Yeah
I
I,
don't
really
know,
have
enough
context
to
comment
on
the
material
of
it
we'll
see
if
we
can
find
some
reviewers
anybody
interested
in
encryption.
B
It's
I
think
also
the
default
for
what
open.
C
D
B
And
they're
stumbling
over
some
problems,
although
so
far
I
haven't
been
able
to
isolate
it
down
to
much
specific
and
every
time
it
seems
like
we
do.
The
error
message
changes
to
something
like
the
crash
changes,
something
completely
different.
A
Yeah
I
think
the
next
topic
on
on
the
agenda
actually
is
related
to
that
about
kind
of
stability
of
encryption
in
general.
B
Yeah,
it
looks
like
the
the
gang
block
change
that
I
think
you
made
recently
Matt
helped
with
some
of
that
and.
B
Me
of
a
separate
thing
of
some
number
of
months
ago,
a
change
was
made
so
that
we
don't
try
as
hard
to
avoid
having
gang
blocks,
and
a
few
of
our
customers
have
noticed
that
on
raid
Zed,
two
and
three
pools
getting
a
lot
more
gang
blocks
kind
of
unnecessarily,
and
they
have
to
change
the
tunable
to
make
it
go
back
to
trying
harder
before
resorting
to
getting
blocks.
B
Otherwise,
you
know
really
space
inefficient,
I,
don't
know
it's
not
really
related
to
the
encryption,
but
it
just
reminded
me
when
I
was
thinking.
B
Your
fix
for
the
the
detection
of
encryption
on
gang
blocks
does
seem
to
have
helped
in
some
of
the
cases
we're
seeing
of
people
running
into
panics
from
encryption,
but
I
also
wonder
if
it's
related
to
are
we
making
a
lot
more
game
blocks
than
we
ever
meant
to,
since
that
change,
and
maybe
not
noticing,
do
we
keep
is
it
is
an
easy
way
to
get
any
stats
on
how
often
we
create
a
gang
blocks,
you
just
like
to
have
runtime
counters
for
it
or
anything.
G
A
Yeah
I,
don't
remember
if
I
wanted
to
or
did
add
a
like
runtime
count
of
number
of
gang
blocks.
A
B
I
think
the
the
one
we
were
investigating
the
initial
report
was
null
pointer,
D
references
in
like
lz4
decompress,
but
they
kind
of
when
we
enabled
assertions
and
so
on
that
it
tended
to
panic
in
other
places
much
sooner,
but
it
would
seem
that
the
the
raw
ABD
pointer
would
get
changed
to
null
at
some
point
and
not
contain
the
data
anymore.
When
it,
the
buffer,
was
in
the
the
state
where
it
should
contain
the
the
raw
ABD
still.
B
But
we
haven't
managed
to
track
that
one
down
it
started
hitting
one
where,
when
they
use
a
clone
for
Docker,
the
M
map
isn't
working
properly.
I
think
there's
a
different
PR
about
this
issue.
I,
don't
know
that
it's
necessarily
related
to
encryption,
but
the
an
assertion
fails
about
the
the
M
map
and
ZFS
copies
of
the
data
being
in
sync,
and
it's.
B
But
mostly
so
far,
we
don't
have
a
great
use
case,
for
you
know
triggering
the
encryption
problem
on
demand
and
it
sounds
a
little
related
to
what
some
lumos
people
found
specifically
having
to
do
with
clones.
So
we're
gonna
dig
into
that
direction
of
it
and
see
because
I
think
the
other
place
people
report,
a
lot
of
problems
was
send
receive
and
when
you
do
a
send
receive,
there's
a
clone
that
happens
under
the
hood
right
temporarily
for
the
the
temporary
hidden
data
set
or
whatever.
B
You
received
into
a
clone
and
then
swap
it
later
so
yeah
I
wonder
if
that
might
be
the
the
thread
that
we
need
to
tug
on
and
and
see
if
that
brings
a
bunch
of
these
kind
of
disparate
issues,
all
together.
A
Cool,
oh
yeah,
Michael.
Thanks
for
sharing,
there's
a
spreadsheet
that
lists
the
various
encryption
bugs
it
kind
of
tries
to
categorize
them.
A
A
I,
don't
really
have
a
good
answer
around
that
either
you
know
I,
we
I
don't
use
it.
Day-To-Day
I
haven't
been
following
the
issues
super
closely,
either,
but
definitely
open
to
folks
ideas
or
feedback
on
kind
of
save
encryption
and
how
how
well
it
works
or
does
not.
C
E
Thank
you
similar
to
what
Alan
was
saying.
I
was
trying
to
look
at
a
bug
that
somebody
reported
about
encryption,
where
you
can
end
up
with
an
embedded
block
pointer
record
on
an
encrypted
data
set.
So
that's
good
and
that
works
fine
right
up
until
you
try
to
do
anything
with
it
and
then
the
code
goes.
What
and
I
tried
to
reproduce
that
and
I
accidentally
reproduced
a
different
bug
which
was
about
the
point
at
which
I
thought
I'd
bring
this
up
today
because
it
was
like.
E
Oh,
there
are
sufficiently
many
bugs
that
if
I
try
to
reproduce
one
I
may
accidentally
hit
another
that
seems
problematic,
I
understand
that
a
lot
of
people
are
using
it
fine
and
it
works
great
for
them
and
that's
great.
E
A
Yeah
I
mean
you
know:
data
loss
is
very
bad
right.
So
I
think
that
if,
if
we
have
some
data
loss
problems
with
encryption,
then.
A
You
know
we
should
be
taking
those
very
seriously
and
trying
to
address
them
and
if
that's
not
possible,
then
you
know
putting
some
guardrails
around
the
use
of
that
feature
to
mitigate
the
impact.
G
I,
don't
have
any
statistics,
but
it's
widely
announced
and
we
switch
from
previous
to
Linux.
We
should
migrate
to
Native
encryption
unless
somebody
you
want
to
use
SED
on
this
encryption,
so
numbers
should
grow,
but
I
don't
think
we
have
statistics
on
exact
numbers.
E
G
Oh
yeah,
obviously
I
heard
from
other
from
a
few
developers
that
everything
better
stay
and
terrible,
but
on
other
side
like
I,
don't
have
any
like
huge
Stoppers
reports
or
anything
that
would
tell
that
it's
like
more
broken
than
not
it's
it's
kind
of
working
and
we
are
creating
some
minor
PRS
polished
here.
Is
there
what
I
think
was
just
one
was
just
opened
last
week,
so
it's
mostly
working.
Maybe
there
are
some
corruption
somewhere,
but
again
we
have
no
reproduction
or
specific
reports.
E
At
least
at
least
the
one
that
you're
investigating
Alan
seems
like
a
really
narrow
to
me
race,
so
I'm
not
entirely
surprised.
Something
with
a
very
different
scheduling
system
has
different
properties
for
triggering
it
right
for
that
one
I
could
try
one
of
the
ones
that
I
think
I
know
that
I
have
a
reliable
reproducer
for
which
is
not
a
crash,
but
just
it
screws
up
setting
the
key
and
I
would
bet
that
would
work
on
FreeBSD,
but
okay
I
haven't
tried.
It.
E
B
E
On
the
lumos,
the
same
failure
mode
seems
to
be
happening,
but
it
doesn't
seem
to
reliably
reproduce.
E
B
E
E
You
can
reproduce
it
reliably
doing
that,
because
then
you
can
force
the
ZFS
upgrade
whenever
you
want
right.
It
still
happens.
If
that's
not
true
like
that
is
I
believe
what
happens
with
the
failure.
The
bug
that
you're
investigating
is
when
it
goes
to
trigger
the
recomputation
of
that
it
goes
and
touches
everything
and
that's
how
you
do
the
recalculation
and
when
it
touches,
object,
zero.
E
It
somehow
gets
into
a
state
where
it's
trying
to
do
a
right
at
the
same
time
as
it's
trying
to
access
it
elsewhere
and
part
of
the
right
path
it
takes
is
that
it
sets
the
ABD
to
zero
or
no
the
contents
of
the
ABD
rather
and
then
you
know
if
you
access
it.
While
that's
true
Ben
goes
to
Dynamite.
B
That
sounds
like
one
of
the
panics
we're
seeing
with
debug
enabled
is
during
I.
Think
it's
Arc
release
that
the
ilm
progress
Isn't
false,
and
so
it
sounds
like
like
we
suspected
something
with
the
ref
counting
where
something
is
still
using.
This
buffer
I
was
in
progress,
but
we're
trying
to
free
it.
At
the
same
time,.
E
Yeah,
that
seems
consistent
with
what
my
expectation
is
for
that.
So,
at
least
in
my
experience,
if
you
force
user
counting
off,
you
can't
reproduce
it,
but
that's
not
necessarily
useful
for
everyone
who
wants
to
use
that
right.
E
I
had
a
patch
to
do
that,
but
if
I
recall
the
user
who
tried
it
reported
other
problems.
Okay
with
the
patch
just
forcing
it
off,
doesn't
have
problems
right,
but
that
seems
to
be
what
was
happening
is
that
it
tries
dirtying
it
and
it
thinks
the
ref
count
is
zero
when
it's
not
and
does
something
unfortunate
okay,
but
in
any
case
I,
don't
know
what
I'd
phrase
a
warning
like
for
this
right
like
see.
C
E
E
I
just
wanted
to
possibly
put
something
like
you
know
you
you
may
wish
to
see
if
you're
affected
by
one
of
these
known
issues
with
a
pointer
to
Something
in
the
docs
listing
a
couple
of
the
more
easily
hittable
ones
or
you
know
something
like
around
dedupe
was
the
original
vision
of
like
think
carefully
before
turning
this
on.
G
But
I
think
I
tend
to
disagree
in
case
because
they're
growing
from
design
yeah.
If
we
have
problems
with
encryption,
that's
that's
a
box
that
should
be
fixed
and
just
telling
there
are
bugs
like
there
are
dragons
it
doesn't.
It
won't
help
anybody
with
anything.
It
won't
help
with
debugging.
It
won't
solve
the
problem.
A
Yeah
I
kind
of
agree
with
Alexander
the
the
issues
like
it's
hard
to
write,
something
that
says
like
oh
see,
if
you're
affected
by
these
bugs,
but
then
like
the
bugs,
don't
necessarily
the
bugs
aren't
narrowly
constrained
they
aren't
like.
Oh,
if
you're
you
know
doing
encryption
and
encryption
replication
and
you've
turned
off.
You
know
some
are
some.
You
know
weird
flags
and
you
know.
Okay,
then
don't
do
that,
but
it's
just
like
you
have
you
know
we
only
all
that
we
know
is
like
sometimes
the
machine,
panics
and
they're
using
ZFS
encryption.
A
You
know
we
haven't
really
narrowed
it
down
like
that.
Much
then
it's
not
that
helpful
to
tell
people
unless
we're
just
gonna
say:
don't
use
DFS
encryption
like
we
put
it
behind
some
flag
or
something,
and
it's
not
enabled
by
default
anymore,
which
is
I
mean
it's
tough,
because
you
know
the
cat's
already
out
of
the
bag.
Very
people
are
using
it
yep.
A
So
that
is
not
a
great
solution.
Obviously
the
best
solution
is
fixing
the
bugs,
but
you
know
we
need
people
that
know
enough
about
it
and
care
enough
about
it
and
have
the
time
to
spend
on
it
and
I.
Think,
unfortunately,
like
the
original
authors
and
maybe
also
other
folks,
working
at
that
company
are
not
super
active
anymore
in
the
community,
so
you
know
we
need
to,
like
you
know,
find
some
new
experts
find
people
who
are
willing
to
put
in
the
time
to
learn
about
this
subsystem.
D
G
Where
you
send
the
web
UI
signs,
I,
don't
remember
when,
but
a
couple
years,
probably,
but
again
we
added
it
in
parallel
to
existing
software
on
this
encryption
and
we're
also
in
all
our
Enterprise
systems,
we
asked
by
default.
Cell
full
disk
encryption
drives,
so
it's
not
used
in
100
cases,
but
it's
in
web
UI,
it's
not
behind
any
license
or
anything
like
anybody
installed
through
nuts
at
home
can
start
using
it.
It's
like
I,
don't
know
any
Gates
for
quite
a
while.
G
On
said,
I
don't
know,
I
didn't
dive
so
much.
You
know
to
our
QE
to
say
what
exactly
tested,
but
obviously
there
are
some
basic
things
of
all
the
creation
since
replication
things
there's
also
obviously
tested
but
I
suppose
this
happens
in
some
rare
cases
under
some
workloads
we
are
not
doing
active
a
lot
of
benchmarks
under
encryption
because
for
anybody
who
care
about
performance,
we
just
recommend
the
CD
drives
since
they
cost
the
same,
but
don't
have
performance
problems.
A
So
I
think
you
know
currently
we're
kind
of
at
a
progress
on
this
is
stalled.
A
little
bit
sounds
like
you
know.
Understandably,
you
know
IX
might
be
using
this,
but
they
aren't
experiencing
the
problems.
Maybe
their
customers
are
using
it
in
a
way.
That's
different
than
the
people
who
are
reporting
problems
are
using
it.
A
So
you
know
I
understand
them
not
wanting
to
like
put
a
lot
of
resources
into
something.
That's
not
a
problem
for
their
use
case.
A
B
Clara
is
investigating
one
specific
issue
for
a
specific
customer
related
to
this,
and
hopefully
we'll
have
we'll
find
something,
and
maybe
it'll
solve
everybody's
problem,
but
I'm
not
gonna,
promise
that
but
we're
you
know
looking
at
one
specific
cause
of
this,
although
every
time
we
poke
at
it,
it
moves.
So
we're
not
sure
which
subset
of
the
problems
will
be
solved
by
by
getting
to
the
root
cause
of
this.
The
specific
one
that
we're
investigating
now.
A
Well,
I
mean
that's
that's
better
than
nothing.
Yes,
it's
great
that
you
guys
are
looking
into
something
is:
is
there
a
specific?
Is
there
a
bug,
that's
related
to
that,
or
is
this
just.
B
There's
a
gr
somewhere,
I
forget
it's:
some,
our
customer
joined
an
existing
one
because
they
had
to
vote
the
same
stack
trace
and
then
they
also
got
about
six
different
stack
traces
from
their
Fleet
of
machines
having
to
have
something
like
100
machines,
running
2.0
or
2.1,
and
they
seem
to
get
two
or
three
panics
a
week,
and
so
we're
poking
at
that
trying
to
figure
out
what's
going
on
there,
but
I
find
the
other
one.
B
That's
the
nmap
related
one
is
a
separate
issue
and
is
hampering
us
a
little
bit.
E
To
be
clear,
to
the
best
of
my
knowledge,
the
closest
you
get
to
a
data
loss
bug
with
this
currently
is
that
sometimes
it
will
set
the
key
for
the
data
set
incorrectly,
so
it
will
change
what
key
the
metadata
says
it's
encrypted
with
without
rekeying
it
so,
the
next
time
you
try
to
unlock
it.
It
fails
other
than
any
sort
of
just
general
rep
consequences
of
panicking
in
the
middle
of
doing
something,
I,
don't
recall,
seeing
any
that
actually
caused
data
loss
more
than
what
I
just
described.
A
Okay,
so
it
sounds
like
the
data
loss
may
be
slightly,
the
claim
of
data
loss
may
be
somewhat
overblown
or,
like
maybe
I,
shouldn't.
That's
like
well.
B
E
A
All
right,
and
then
this
one
where
the
metadata
about
the
key
got
changed
incorrectly,
is
that
this
one
issue
number
one
one,
two,
nine
four.
Let
me
just.
E
A
E
There's
I
believe
in
a
couple
reports
that
are
probably
what
I
just
described
with
a
couple
different
ways:
there's
a
very
good
reproducer
for
it,
so
it
should
be
okay,
demonstratable
I.
Also
there
was
another
one
that
sort
of
had
overlap
in
the
failure
mode
that
it
looked
like
where
it
wouldn't
unlock,
but
it
was
a
different
problem
where
it
didn't
update
the
Mac
for
the
user,
accounting
metadata
correctly,
so
I
added
a
patch
that
just
throws
us
out.
If
that
happens,
because
we
can
just
recalculate
it.
Okay,.
E
Right,
that's
correct,
I
think.
E
One
one
two,
nine
four
was
the
one
that
I
just
had
the
pr
for
I
believe
because
it
was
yeah.
E
A
E
I
can
find
this
offline
if
it's
going
to
take
more
than
a
second
or
two,
but
that's
right,
that's
it
12614
I
believe
is
the
one
that
I'm
thinking
of.
E
It
basically,
if
you
change
key
or
child
and
then
receive
it
back,
it
resets
the
parents
key.
A
Fine,
but
this
one
seems
like
it
would
like
it's
kind
of
a
sweet
spot
of
there's
a
reproducer
and
it's
the
severity.
Is
you
know
it
results
in
you
not
being
able
to
access
your
data,
so
that's
very
bad.
Some
fixing
this
one
might
be
both
possible
or
plausible,
and
you
know
high
impact.
E
A
A
That
would
be
kind
of
the
way
out
of
this
yes,
but
is
there
a
way
to
avoid
getting
into
this
to
begin
with.
E
Probably
I
mean
I
would
assume
you
can
just
discard
change
key
operations
from
a
receipt
yeah.
E
Well!
No,
because
if
you're
doing
send-w,
that
does
matter
doesn't
it,
but
it's
probably
just
not
applying
it
at
the
right
level.
Yeah.
A
A
E
A
E
A
E
A
A
E
E
A
I
think:
well,
you
know
if
you
or
anybody
else
wants
to
work
on
this
and
wants
to
like
I'm
I'm
available
to
talk
through,
like
you
know
how
the
encryption
or
sorry
how
the
Center
receive
stuff
works
and
like
how
we
might
need
to
how
we
could
change
the
format
of
that
to
include
additional
information
if
we
need
to
so.
E
E
H
I
am
still
invested
in
the
encryption
and
I
use
it
quite
heavily,
but
and
I'm
willing
to
help.
But
every
time
I
look
at
issue
tickets,
they're,
always
raw
sand
and
not
encryption.
So
I,
don't
every
attack
every
all
the
problems.
You
guys
talk
about
how
encryption
isn't
encryption?
It
seems
to
be
raw,
send
which.
H
Sending
is
you
know,
ugly
Cody,
for
me
be
so
blunt,
whereas
encryption
are
considered
to
be
quite
nice.
H
A
B
B
But
yeah
they
have
I,
think
15
different
stack,
traces
and
that
have
come
up
on
that
one.
It's
a
bit
weird.
E
A
All
right
there's
a
couple
more
items
on
the
agenda.
What
other
folk?
What
other
thoughts
do
folks
have
on
encryption.
A
Right
well,
if,
if
not,
then
we'll
leave
it
there
for
now.
The
next
issue
on
the
agenda
is
an
M
map
issue.
Yes,
that
mark
the
Ubuntu
guy
filed
I,
don't
know
if
he's
yeah.
B
And
it's
a
customer
investigating
the
encryption
problems
for
ran
into
this,
where
I
think
they're,
running
Google,
Chrome
in
a
Docker
container,
so
docker's
doing
a
clone
and
then
firing
up
Google,
Chrome
and
then
Chrome's
panicking
trying
to
read
the
executable
when
it
tries
to
end
map
it
and
the
page.
Up-To-Date
macro
returns
false
and
somehow,
basically,
the
MF
copy
and
ZFS
copy
of
the
data.
Don't
think
they're
the
same.
A
Yeah,
that
sounds
bad.
Obviously,.
H
C
B
A
We're
doing
we're
doing
like
a
read
syscall
is
that
right,
yeah.
We
do
reads
this
call
and
then
it
thinks
that
the
you
know
the
reasons
call
normally.
It
should
be
getting
the
if
the.
If
the
data
is
nmapped,
then
that
might
have
been
modified.
So
it
needs
to
read
the
data
from
there
instead
of
from
like
from
The
Arc.
But
this
assertion
is
is
saying:
like
you
know,
page
up
to
date
is
saying
that
the
page
is
the
same
like
be
you.
A
A
Yeah
got
it,
but
we
had
I,
guess,
presumably
determined
that
it
was
I'm
not
familiar
with
this
code.
We
must
have
already
thought
that
it
we
didn't
need
to
do
this
and
that's
why
we
had
that
verify.
B
Yeah,
it
looks
from
the
initial
report.
It
looks
like
if
debug
wasn't
on,
then
you
could.
It
would
not
detect
this
and
just
return.
The
incorrect
data
yeah.
A
But
with
debug
on
it's
like
the
page
up
to
date
is
out
of
sync
with
something
else.
We're
kind
of
disagree
is
with
something
else,
though
we
made
the
check
based
on
I,
don't
have
the
code
handy.
A
B
And
looks
like
in
update
underscore
Pages,
we
set
page
up
to
date,
flag.
B
A
F
A
E
The
Linux
documentation
seems
to
suggest
it
means
it's
dirty
specifically
that
every
byte
in
the
page
is
at
least
as
up
to
date
or
sorry
when
everybody
in
the
page
is
at
least
as
new
as
the
corresponding
one
on
disk.
So
sorry,
it
specifically
means
that
we.
A
Yeah,
so
it's
not
that
it's
dirty
like
there
have
been
stores
that
haven't
been
written
to
the
file
system,
but
rather
there
might
have
been
like
rights
to
the
file
that
aren't
reflected
in
the
page,
which
shouldn't
normally
be
the
case.
Because,
like
you
were
saying,
when
we
do
the
right,
then
we
always
you
know,
write
to
the
page
as
well
and.
B
A
A
There's
some
more
digging
to
do
here
to
understand
like
what
what
exactly
all
these
terms
mean
and
do
in
terms
of
the
interaction
with
the
Linux
kernel-
and
you
know-
hopefully
this
page
up
to
date
thing
is
that
page,
up-to-date
Panic
is
the
same
as
the
issue
with
returning
the
wrong
data,
since
obviously,
that's
like
the
page
up
to
date.
Thing
is
a
lot
more
of
a
clue
as
to
what's
going
on.
C
A
Yeah
well,
in
any
case,
I
agree.
This
is
a
an
interesting
and
important
bug.
A
The
last
thing
on
the
agenda
is
a
question
about
the
on
disk
format
document.
If
there's
been
any
effort
to
update
it,
I
don't
know
of
any
efforts
to
update
it.
I
posted
it
on
GitHub,
including
the
source,
so
that's
available
for
folks
who
want
to
work
on
updating
it,
but
I
don't
know
if
anyone's
taking
that
up.
I
Okay,
I
think
I,
don't
remember
where
it
came
up.
I,
remember
recall:
there
was
some
effort
or
some
interest
in
updating
it
and
I
was
always
curious
about
the
results
of
that,
because
I've
used
it
to
write
a
little
bit
of
software
to
kind
of
examine.
Zfs
volume
I
had
trouble
with
and
I.
That
document
is
really
useful,
but
I
didn't
know
whether
or
not
it
was
current
or
if
you
know
could
use
some
anyway.
I
B
Yeah
I
imagine
that
might
have
been
useful
when
Mark
Johnson
from
FreeBSD
created
ZFS
support
in
our
makefs
Tool
yeah.
Also
wonder
if
that'd
be
interesting
to
anybody
here,
you
can
take
a
directory
full
of
files
and,
as
a
non-user,
be
able
to
create
a
z-pool
image
where
you
can
lay
out
the
data
sets
and
it'll
copy
all
the
files
and
basically
write
a
whole
ZFS
file
system.
But
you
know
without
the
ZFS
kernel
module
or
anything.
I
I've
done,
maybe
not
something
exactly
like
that,
but
I
was
working
on
something
similar
using
go
to
create
and
read
CFS
volumes,
and
so
that
the
document
is
really
really
helpful.
A
Yeah,
of
course,
the
link
in
the
chat.
It's
on
my
GitHub
yeah
cool
thanks
the
doc
I
mean
it
should
be
accurate,
but
not
complete,
because
it's
you
know
15
plus
years
out
of
date.
So
you
know
it
should
get
you
somewhere.
But
if
you're
using
newer
on
disk
formats,
then
there's
additional
stuff-
that's
not
in
the
doc
in
the
document
is.
A
Yeah
I
mean
I
think
that
this
is
written
very
early
on
so
maybe
like
version
1.
version,
one
or
two
or
three
on
this
format,
so
you
can
look
at
like
what
all
the
changes
were
since
then,
and
you
know
see
kind
of
which
ones
are
relevant
to
whatever
you're
trying
to
do
with
this.
So
you
know
like,
if
you
are
not,
you
know,
some
of
the
stuff
is
like
we
added
d-rade
okay.
Well,
if
you're
not
reading
derayed,
then
you
don't
need
to
worry
about
that.
A
We
added
you
know
a
bunch
of
metadata
that
kind
of
describes
additional
things
if
you're
just
trying
to
get
to
the
user
data.
You
may
not
care
about
that.
A
A
You
could
probably
quickly
go
through
each
of
the
changes
and
see
if
it's
relevant
to
you
know
the
kinds
of
pools
that
you're
trying
to
access,
or
you
know
if
you're
just
doing
read
only
then
there's
a
lot
of
stuff
that
you
wouldn't
care
about.
For
example,
yeah,
okay,.
A
A
A
Yeah
that
was
so
long
ago
that
forgot
about
it
but
yeah
yeah.
So
it's
not
blog
and
other
stuff
and
again
that
that
kind
of
stuff
is
not
necessarily
needed.
If
you
just
want
to
like
read
an
existing
pool,
read
user
data
from
an
existing
pool,
because
that's
kind
of
like
metadata
that
you
would
need
to
understand
to
be
able
to
make
changes
or
if
you
wanted
to
like
kind
of
print
everything
out
for
completeness
sake,.
I
So
my
instinct
is
to
want
to
volunteer
for
such
a
thing,
but
I
think
what
I'd
like
to
do
is
actually
see
if
I
can
do
anything
before
before
I
commit
to
doing
doing
it.
Yeah
so
yeah.
H
A
H
B
Yeah,
it's
very
useful
for
things
like
I
want
to
make
a
bootable
VM
that
has
a
ZFS
root
file
system
or
whatever,
and
be
able
to
just
take
all
these
files
and
check
them
in
a
an
image
file.
B
A
All
right
thanks,
everyone
next
meeting
will
be
in
four
weeks,
which
is
actually
January
31st,
so
we'll
have
two
meetings
this
month
and
it'll
be
at
the
same
time,
1
pm
Pacific
see
y'all
later
all
right.