Index: FreeBSD-EN-23:18.zfs =================================================================== --- /dev/null +++ FreeBSD-EN-23:18.zfs @@ -0,0 +1,121 @@ +============================================================================= +FreeBSD-EN-23:18.openzfs Errata Notice + The FreeBSD Project + +Topic: High CPU usage by ZFS kernel threads + +Category: contrib +Module: zfs +Announced: 2023-XX-XX +Affects: FreeBSD 14.0 +Corrected: 2023-XX-XX XX:XX:XX UTC (stable/14, 14.0-STABLE) + 2023-XX-XX XX:XX:XX UTC (releng/14.0, 14.0-RELEASE-pXX) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +Freebsd has included a version of the powerful and feature-rich ZFS file +system beginning with FreeBSD 7.0 released in 2008. In FreeBSD 13 and +later, the ZFS implementation is provided by the OpenZFS project. + +II. Problem Description + +Because ZFS may consume large amounts of RAM to cache various types of +filesystem objects, it continuously monitors system RAM available to +decide whether to shrink its caches. Some caches are shrunk using a +dedicated thread, to which work is dispatched asynchronously. + +In some cases, the cache shrinking logic may dispatch excessive amounts +of work to the "ARC pruning" thread, causing it to continue attempting +to shrink caches even after resource shortages are resolved. + +III. Impact + +The bug manifests as a kernel thread, "arc_prune", consuming 100% of a +CPU core for long periods, even while the system is otherwise idle. +This behavior may impact workloads running on the system, by reducing +available CPU resources and by triggering lock contention in the kernel. + +IV. Workaround + +No workaround is available. Systems not using ZFS are unaffected. + +V. Solution + + + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. +[XX Needs reboot? Mention please] + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platfrom on FreeBSD 13 and earlier, can be updated via +the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +[XX Needs reboot? Mention please] + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 12.4] +# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch +# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch.asc +# gpg --verify XXXX.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +------------------------------------------------------------------------- +stable/14/ f7f5c2419ea7 stable/14-n265783 +releng/14.0/ XXXXXXXXXXXX releng/14.0-nXXXXXX +------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat + +Or visit the following URL, replacing NNNNNN with the hash: + + + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + + + + + +The latest revision of this advisory is available at +