[Bugs] [Bug 1212676] NetBSD port

bugzilla at redhat.com bugzilla at redhat.com
Fri May 8 03:11:01 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1212676



--- Comment #28 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/10648 committed in release-3.7 by Vijay
Bellur (vbellur at redhat.com) 
------
commit d27ecba4f8b453a6d4f2466a5583a8360a068a14
Author: Emmanuel Dreyfus <manu at netbsd.org>
Date:   Thu May 7 16:45:53 2015 +0200

    Tests: use a portable way to flush kernel cache

    On Linux, kernel cache can be flushed using
    echo 3 > /proc/sys/vm/drop_caches

    This non-portable approach can be replaced by an on-purpose
    failed attempt to unmount: if the mount point is the current
    directory and umount is called, the kernel will flush inodes
    until it realize it cannot complete the operation because
    root of filesystem is busy:
    ( cd $M0 ; umount $M0 )

    Unfortunately this does not flush everything. Entries may
    still be present in the kenrel FUSE cache. Using $GFS to
    mount the filesystem ensure --entry-timeout=0 and clears
    this problem.

    Some stall information may also remain in glusterfs caches,
    and that may have to be adressed by appropriate volume option.
    For instance tests/bugs/rpc/bug-954057.t needs to disable
    performance.stat-prefetch. Qtherwise, root's new credentials
    are not evaluated after root-quash is enabled. The test could
    also be done with performance.stat-prefetch enabled using
    various tricks: copying the file to read, creating a hard link
    on it, or just waiting long enough for metadata cache to expire.

    Backport of: I54929e899d55c04dcd9d947809133549f01fd0e1
    BUG: 1212676
    Signed-off-by: Emmanuel Dreyfus <manu at netbsd.org>

    Change-Id: I2849a27acaa0334ef30aae3b852019b5a6eeb419
    Reviewed-on: http://review.gluster.org/10648
    Reviewed-by: Niels de Vos <ndevos at redhat.com>
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Tested-by: NetBSD Build System

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=oQJPaw8qqA&a=cc_unsubscribe


More information about the Bugs mailing list