Bug 1619475 - NetBSD memory detection issue
Summary: NetBSD memory detection issue
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: GlusterFS
Classification: Community
Component: porting
Version: mainline
Hardware: All
OS: NetBSD
unspecified
high
Target Milestone: ---
Assignee: bugs@gluster.org
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-08-21 01:01 UTC by manu@netbsd.org
Modified: 2018-10-23 15:17 UTC (History)
1 user (show)

Fixed In Version: glusterfs-5.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-10-23 15:17:29 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Embargoed:


Attachments (Terms of Use)

Description manu@netbsd.org 2018-08-21 01:01:23 UTC
NetBSD has two sysctl for physical memory detection: hw.physmem and
hw.physmem64. Only the later is 64-bit proof, and it has been
available for years.

glusterfs uses the former, which leads to incorrect zero value detected when there is too much memory. As a result, mount will fail with:
[quick-read.c:838:check_cache_size_ok] 0-gfs-quick-read:
  Cache size 134217728 is greater than the max size of 0

Comment 1 Worker Ant 2018-08-21 01:03:27 UTC
REVIEW: https://review.gluster.org/20870 (Fix physical memory detection on NetBSD) posted (#1) for review on master by Emmanuel Dreyfus

Comment 2 Worker Ant 2018-08-21 16:44:39 UTC
COMMIT: https://review.gluster.org/20870 committed in master by "Amar Tumballi" <amarts> with a commit message- Fix physical memory detection on NetBSD

NetBSD has two sysctl for physical memory detection: hw.physmem and
hw.physmem64. Only the later is 64-bit proof, and it has been
available for years.

That fix is important because it cause recent glusterfs to refuse
mounting fileystems when there is too much RAM, with an error loading
the quick-read xlator
[quick-read.c:838:check_cache_size_ok] 0-gfs-quick-read:
  Cache size 134217728 is greater than the max size of 0

Change-Id: I957a1ff1d7018fe2f9d47384a28708e6cbdf710a
Signed-off-by: Emmanuel Dreyfus <manu>
Fixes: bz#1619475

Comment 3 Shyamsundar 2018-10-23 15:17:29 UTC
This bug is getting closed because a release has been made available that should address the reported issue. In case the problem is still not fixed with glusterfs-5.0, please open a new bug report.

glusterfs-5.0 has been announced on the Gluster mailinglists [1], packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update infrastructure for your distribution.

[1] https://lists.gluster.org/pipermail/announce/2018-October/000115.html
[2] https://www.gluster.org/pipermail/gluster-users/


Note You need to log in before you can comment on or make changes to this bug.