►
From YouTube: October 2022 OpenZFS Leadership Meeting
Description
Agenda: releases; docker overlays; hackathon ideas
full notes: https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit#
A
B
A
Start
with
that,
then
we're
two
minutes
after
so
we
can
get
started.
C
Okay,
oh
I,
just
dived
into
this
area
pretty
recently,
but
problem
series
exists
around
for
three
years
or
about
the
problem.
Is
that
original
Docker
driver
or
native
one
for
ZFS
written
in
goal
and
written
pretty
terribly?
It
runs
the
forks,
separate
processes
to
do
things
like
ZFS
list
that
takes
forever
and
practically
burns
down
the
system,
science.
We
have
now
go
developers
and
nobody
else
dive
into
this.
C
Oh
it's!
It's
not
terribly
specific
to
GFS
just
couple
requirements
that
there
are
two
PRS
I
mentioned:
the
first
9600.
It's
practically
changes
how
ZFS
handles
a
rollback,
I
think
right
or
a
rollback
yeah
that
how
it
wipe
Direct
locations
in
in
the
Linux
kernel
seems
pretty
straightforward.
You
just
need
somebody
who
is
good,
Linux,
VFS
understanding
to
say
yet.
Yes,
that's
that's
correct.
That's
the
right
way
to
go,
so
there
are
one
cosmetic
thing
that
you'll
be
able
to
fix.
C
Just
probably
that's
the
right
way
to
do
sync:
instead
of
making
a
directory
cash
regularly
go
to
ZFS,
this
is
fully
disability.
This
is
valid
for
interesting.
Jcfs
in
case
of
rollback,
can
just
go
and
wipe
all
the
directory
cache
in
one
go.
That
would
be
probably
also
more
efficient,
so
I
think
it's
just
a
good
push
to
go.
It's
just
my
qualification
in
that
area
is
not
enough,
just
to
say
how
would
I
deserve.
We
need
somebody
to
take
a
look
and
just
push
the
final
button.
C
There's
a
patch
yeah,
okay.
Well,
there
were
some
comments
from
Matt
and
Brian,
but
they
were
a
while
ago.
So
some
some
more
comments
from
them
or
somebody
would
be
good.
The
other
patch
is
more
complicated.
It's
odds,
support
for
couple,
Linux,
specific
flux
to
rename
apps
to
which
allows
some
fancy
things
such
as
swapping
two
files,
atomically
within
one
operation
and
seems
like
rename
and
create
placeholder.
Instead,
most
of
things
are
used
by
our
layoffs,
but
again
not
specific
to
Overlay
fs
and
one
of
problems.
C
There
is
that
it
requires
couple
more
transaction
types
to
handle
those
operations
in
zeal
and
right
now
it's
implemented
only
for
Linux
and
it
reduces
couple
more
features
which
are
implemented
only
for
Linux,
which
means
once
you
do
this
operation.
One
of
those
operations
pool
can
never
be
imported
in
anywhere
else.
C
So
a
couple
Solutions
I
see
one
is
easy:
Implement
those
things
for
other
operating
systems,
which
is
not
very
useful.
They
require
work.
Otherwise
I
think
it
would
be
just
easier
for
everybody
to
just
to
drop
those
additional
feature:
flags
and
just
replay
Zeal
as
good
as
gun.
Up
to
the
point,
it's
supported,
I
think
switch
of
operating
system
is
not
doesn't
happen
so
often
to
bother
so
much.
Okay,
we'll
lose
couple
seconds
of
activity
on
previous
OS
of
activities
that
only
applicable
to
that
OS
and
nothing
else
and
I
think
it
would
be
easier.
A
Yeah
I
was
looking
at
the
rename
at
to
one
as
well
for
my
presentation
at
the
staff
Summit
coming
up,
because
it's
again
something
that
relates
to
the
container
support
that
Clara
added
the
Linux
namespace
delegation,
stuff
for
and
yeah,
especially
the
case
where
you're
doing
a
rename,
where
you're
also
creating
a
whiteout
for
the
old
version
of
the
file,
so
that
on
the
overlay
app,
that's
the
other
lower
file
doesn't
show
through.
A
In
that
case,
it's
interesting
that
Linux
implements
the
whiteout
by
making
it
a
character
device
with
a
specific
ID
or
something.
Oh.
A
Yeah,
whereas
yeah
I
was
looking
at
something
similar
on
FreeBSD,
where
we
would
possibly
add
whiteout
as
an
actual
like
V,
node
type
or
whatever,
but
that
would
require
income
implementing
or
incrementing
the
version
number
of
the
the
Z
of
s
posix
layer,
the
SPL
so
like
the
ZFS
version,
as
opposed
to
zpl
version
or
ZFS
upgrade
versus
Z4
upgrade.
A
Yeah
and
I
think
there's
another
PR
somewhere
that
talks
a
bit
about
the
idea
of
having
feet.
Sorry,
it
was
on
the
wiki.
There
was
a
an
idea,
a
project
proposal
for
the
hackathon
of
implementing
feature
flags
for
the
the
zpl
part
of
it
as
well.
I,
don't
know
what
the
right
thing
to
do.
There
is
the
Linux
specific
way
of
doing
whiteouts
seems
slightly
sub-optimal,
but
I
don't
know
if
it's
worth
the
pain
of
you
know
bumping
the
version
number
of
the
zetiel.
C
A
C
A
C
Oh
yeah,
but
both
probably
are
supported
already.
You
know
a
check
character
device
should
not
be
a
problem
anyway
and
I.
Guess
that
different
type
on
freebies
I
guess
it
works,
but
I
never
used.
I
have
no
idea
yeah,
but
just
or
you
meant
some
something
more
unified
that
would
translate
on
different
toys.
Different
things,
Yeah.
C
C
Yeah
at
this
point,
it
just
got
quickly
Burning
from
a
Docker
site
on
Linux.
We
never
used
it
on
freebies,
G
and
honestly.
I
would
prefer
maybe
to
implement
the
native
ZFS
way.
We
have
proper
Docker
driver
implementing
it
properly
from
whatever
language,
just
through
GFS
native
calls,
without
parsing
the
fs
list,
outputs
and
maybe
then
it
would
be
nicer,
but
just
we
have
no
gold
developers
to
do
that.
Stuff.
C
So
I'd
like
to
just
attract
people
to
those
too
no
and
the
first
just
needs
to
review
the
second.
So
we
need
to
decide
whether
we
need
features
to
handle
those
things.
What
people's
opinion
about
maybe
just
drop
the
features
and,
as
I've
told
in
my
last
comment
and
just
replace
Zeal
as
much
as
as
good
as
gun.
Otherwise,
we'll
get
a
quote.
We
can
never
test
cross
platform,
so
it's
but
it's
theoretical.
It
would
be
better,
but
practically
it's
spend
of
time
and
inability
to
test
and
just
difficult.
A
A
B
Yeah
I
think
some
kind.
C
No,
like
I'm,
not
sure
it's
keepable,
I
think
it's
we
just
can't.
We
don't
know
what
happened
with
next
operation.
Next
operation
May
depends
on
the
separation,
so
it's.
C
A
Stopped
replacing
yeah,
we
started
playing
the
Zill
and
you
know
most
times
when
you're
importing
there
isn't
a
zild
replay
anyway,
like
if
you're
switching
os's.
You
normally
do
that
with
the
nice
export
and
so
there's
nothing
to
replay.
But
if
you
crashed
on
Linux
and
then
imported
on
FreeBSD,
you
would
get
a
little
warning
and
at
least
you'd
be
able
to
import
the
pool.
Oh.
A
A
All
we
hit,
but
yeah
I
know
the
the
second
PR
you're
talking
about
there.
I
was
hoping
to
get
people
to
to
look
at
as
well
as
part
of
my
talk,
so
I'll
I'll
push
on
that
for
you.
D
Oh
yes,
so
this
actually
came
up
the
day
when
I
was
testing
the
stop
playing
and
wanted
to
populate
L2
orc
from
a
file
system
that
was
already
populated
as
I
just
reloaded
to
Kernel
modules.
D
So
I
I
had
ordered
kernel
modules
built
from
master
and
then
ran
this
command,
which
basically
finds
all
the
files
that
are
in
a
directory
in
any
of
its
children
and
then
cats,
and
to
Dev
no
with
256
CAD
operations
in
parallel
and
all
the
cat
processes
ended
up
deadlocked
and
the
killer
triggered
and
ZFS
Swiss
also
deadlocked.
The
issue
appears
to
be
one
of
the
locks
that
we're
taking
Arc
buff
access.
D
Well,
I.
Don't
have
more
information
right
now,
so
I
remember
seeing
on
the
agenda.
There
was
something
regarding
tagging
version
2.2,
which
would
be
awesome,
but
until
this
bug
is
fixed,
we
can't
tag
for
master,
as
this
is
well,
it's
not
present
in
the
current
state
of
Maurice,
but
it
is
present
in
master
and
we
just
can't
release
this
sort
of
progression.
D
Yes,
I
do
suspect
it's
that
debuff
has
arrays.
There
were
some
similar
complaints
about
that
patch
when
it
was
proposed
for
2.1.6
and
it
ended
up
being
dropped
from
that,
so
that
that's
the
main
candidate
at
the
moment,
I'm
not
sure
why
maybe
there's
something
about
how
Linux
might
not
like
having
its
locks
in
a
virtual
mem
in
kernel,
virtual
memory,
I'm,
not
sure.
A
A
Yeah
it'd
be
great
if
we
could
get
a
a
smaller
reproduction
case
so
that
we
could
rank
a
test
that
will
fail
for
it
so
that
we
can
track
it
easier.
D
Yeah
I
was
thinking
it
would
be
great
to
have
this
in
other
DFS
test
Suite,
but
it
I
need
to
do
more
digging.
D
Maybe
I
I
haven't
tried
yet
I
haven't
had
time.
Okay,.
A
And
then
yeah
my
question
was
about:
are
we
still
planning
to
do
a
2.2
release
soon,
but
without
Matt
or
Brian?
Here,
I,
don't
know
if
anybody
else
knows
anything
about
that.
A
C
Oh
yeah,
we
are
oh
we're
already
working
on
a
new
release
of
tuna
scale,
which
is
now
based
on
2.1
still
so,
but
it's
it's
so
we
are
right
now
releasing
beta
2.
It
should
be
rc1
soon
so
like
would
it
be
released
right
now
or
we
could
switch
on
it
before
the
rc1?
If,
if
we
don't,
then
we
have
to
stick
for
2.1
for
longer
and
backboard
thing.
There
right
now
would
be
the
most
convenient
time
like
months
after
maybe
already
less
convenient
or
late.
So.
A
Yeah
I,
don't
know
I'm,
don't
I
didn't
look
last
time
to
see
like
how
many
release
candidates
and
how
long
between,
when
we
started
tagging
a
release
and
we
actually
pushed
it
out
like
when
we
did
2.1
what
that
time.
Scale
was
like,
but
I
expect
that
getting
2.2
out
in
less
than
a
month
is
probably
no.
C
A
B
A
B
E
B
Did
have
a
quick
question,
let's,
regardless
of
the
upcoming
Summit,
did
we
talk
at
all
on
one
of
these
calls
about
the
hackathon
or
any
goals
for
that,
or
is
there
like
a
spreadsheet
for
ideas.
A
On
it,
as
it
turns
out,
yeah
don't
have.
A
The
latest
spreadsheet,
for
that.
A
Public
facing
doc
service
account
is
where
it
looks
like.
There's,
yeah
I
got
the
one
from
2021
and
2020
and
a
couple
other
times,
but
it
doesn't
look
like
there's
a
new
one.
Yet.
D
So
we're
going
to
talk
about,
there
is
one
thing
that
occurs
to
me,
which
is
some
people
might
have
noticed
that
I've
been
doing
a
lot
of
static
analysis
stuff
lately,
I
know,
I've
been
somewhat
subtle
on
the
YouTube
tracker,
but
so
I've
actually
been
researching.
Defense
attack,
analyzers
and
I
was
like
I
want
one
that
has
X
Y
and
Z,
and
it's
Brian
mentioned
to
me.
He
would
love
it.
D
If
so,
we
could
have
every
pull
request,
static,
analyzed
and
after
searching
through
what's
available,
I
finally
found
one
that
seems
to
check
all
the
boxes.
I
mentioned
this
to
you
all
in
the
other
day,
so
it's
called
sonor
Cloud,
it's
free
for
open
source
projects.
It
can
integrate
with
GitHub
to
run
on
POS
and
even
branches.
It
allows
you
to
dismiss
false
positives.
You
can
second
custom
rules
and
they
have
one
who
saying
that
go
to
is
bad
and
that
that
needs
to
go
and
it
can
also
check
multiple
languages.
D
So
the
Python
scripts
can
get
some
attention
too.
So
I'd
like
to
set
that
up
in
the
near
future,
so
our
pull
request
will
be
static,
analyzed
and
any
regressions
can
be
caught
sooner
rather
than
later.
D
D
B
D
Now,
if
you
were
to
run
scan
build
to
get
Crane's
results,
you
just
get
inundated
with
a
bunch
of
reports
with
over
100
reports
and
it's
not
very
clear
to
tell
whether
or
not
anything
is
new.
Aside
from
the
issue
account
going
up,
so
it's
just
not
useful
for
local
use,
otherwise,
you're
accessibility
looking
for
issues,
but
that's
something
I'd
like
to
find
out
in
the
near
future.
B
D
They
have
some
tools
like
that:
spot.
Stick
commercial,
but.
B
B
Know
all
right,
Brian's,
probably
the
right
person
to
ask.
B
No,
not
in
the
test
Suite
just
like
on
the
commit
itself,
you
can
say
like
I,
don't
want
you
to
run
this
test
and
ignore
all
these
other
tests.
So.
B
Okay,
that'd
be
something
I
would
I
would
advocate
for
because
yeah,
if
you
do
get
when
it
does
fail
like,
then
how
do
you
know
you
fixed
it
other
than
writing
all
the
tests?
You
know
that
seems
like
yeah.
D
Well,
it
should
be
very
quick
in
terms
of
getting
feedback,
but
anyway,
this
is
something
that
I'm
planning
to
look
into
in
the
near
future.
I
hope
we
will
have
that
maybe
around
the
time
of
a
summit,
and
then
we
can
iterate
on
that.
D
Know
that's
why
I
said
I
was
being
subtle.
That
was
a
joke
as
well.
Well
what
in
particular
static
analysis,
stuff
or
yeah.
B
D
Yes
and
then
we
actually
can
see
a
few
commits
and
the
histories
where
I
said
yeah
I
meant
to
solve
that,
but
the
other
commit
but
I
miss
these
cases.
But
yeah.
D
There
are
quite
a
few
things
that
have
been
fixed
and
actually,
if
you
were
to
go
on
or
there's
a
comedy
link
on
the
main
page
for
the
GitHub
repository
and
if
you
click
on
it,
you
can
actually
see
some
information
watch,
a
defect
density
and
if
you
scroll
down,
you
can
see
defect
density
over
a
period
of
time.
So
you
can
see
we
were
at.
It
was
actually
a
little
higher
than
0.65
when
I
started,
but
the
day
I
started.
D
I,
basically
just
made
a
bunch
of
improvements
and
that
actually
lowered
the
defect
density
from
any
0.71
and
then
over
time.
You
see
it
drop
to
0.57
to
0.3
to
0.22,
and
it's
been
stuck
there
for
the
past
week
as
some
of
my
pull
requests,
which
fixed
into
a
number
one
I
needed,
I'm
a
business
which
I
did
on
a
week
last
weekend
and
the
other
one
is
a
bit
scary
because
I'm
touching
Lua,
so
it
might
take
some
time
before
I
can
be
committed,
but
there
I
think.
D
Okay,
there
are
106
outstanding
issues,
I
think
the
pull
requests
I
have
opened,
solve
23
of
them
so
and
then
there
are
many
other
ones
that
not
necessarily
bugs
sometimes
it's
a
false
positive
but
I'm
like
oh,
is
this
an
opportunity
for
some
cleanup
and
other
times
I'm
still
trying
to
decide
on
and
so
on
and
so
forth,
but
yeah
a
lot
of
these
things
have
been
analyzed
and
something
that
actually
surprised
me
was
that
I
actually
had
expected
coverty
to
catch
quite
a
few
issues
that
without
some
things
with
false
negatives,
and
there
are
certain
things
that
it
should
have
bought
because
it
caught
other
things
like
them:
yeah,
I,
just
didn't
and
others
said:
I
can
analyzers
quote
them.
D
For
example,
Klein
and
gcc's
based
in
static
analyzer,
which
actually
surprised
me,
but
I
thought
that
was
somewhat
interesting
and
I'm
actually
of
the
opinion.
I've
actually
made
two
observations.
Well,
I
guess
conjectures
one
is
at
about
half
of
the
reports
are
all
false
positives.
D
A
Alexander,
just
looking
through
the
old
hackathon
ideas,
I
saw
one
here
that
relates
to
another
docker-ish
thing,
which
is
support
for
ID
mapped
mounts
or
basically,
if
you
clone
a
data
set
being
able
to
override
the
user
IDs
that
own
all
the
files,
so
that
you
could,
you
know,
clone
a
data
set
and
give
it
to
a
different
user
or
a
different
container
without
having
to
actually
you
know,
recursively,
Cho
and
all
the
files
and
just
handle
that
at
the
file
system,
level
kind
of
like
how
you
know
if
you
mount
a
MS-DOS
FS,
you
can
just
say
instead
of
root,
all
these
files
are
owned
by
this
user.
C
C
A
A
Everybody's
out
of
things
to
talk
about,
then
I
guess
obviously
see
most
of
you
at
the
developer,
Summit
and
then
the
rest
of
you
in
four
weeks.
E
A
D
E
E
Was
mostly
I
ported
some
some
code,
some
internal
code
and
was
wondering
okay?
What
are
what
are
the
rules
about
this
CR
hold
and
why
are
we
doing
it
in
some
places,
but
not
in
others
where
it
would
actually
be
more
appropriate?
According
to
my
understanding,
so.
A
D
Basically,
we
inherited
Prudential
infrastructure
from
open,
Solaris
and
just
hook
the
links
infrastructure
into
it
and
I
I
don't
really
well.
D
My
guess
is
that
people
have
just
done
whatever
worked
since
then,
even
if
it's
not
necessarily
according
to
whatever
the
rules
were
in
open,
Solaris
and
in
Linux,
and
it
just
happened
to
work
and
as
far
as
I
know,
we
don't
really
know
much
about
it.
E
Yeah,
the
weird
thing
is,
as
far
as
I
can
tell
in
sudaris:
we
actually
don't
do
the
Sierra
holds,
because
that
is
done
by
the
EFS
code.
I
mean
I,
don't
really
know
open
sonares,
but
that's
what
I
gathered
from
from
looking
at
the
code
on
GitHub,
so
yeah
yeah
I,
tried
to
reach
Brian
and
talk.
This
through
would
be
worth
a
cleanup,
I
think
yeah.
A
Yeah
I'll
poke
Matt
about
getting
the
hackathon
idea.
Spreadsheet
started
because
there's
a
bunch
of
good
ideas
from
previous
years
and
I
think
I
have
a
couple
of
new
ideas
as
well,
and
hopefully
we
can
get
some
interesting
stuff
out
of
the
hackathon.