[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] xen on suse 9.3 and software raid
> However the software raid1 (mirror) is still not working with > kernel-2.6.11.4-20a-xen from the SuSE-9.3 distribution. I guess > the mkinitrd bug isn't the source of the problem. Any chance the initrd attempts to load the raid6 module? If so, can you try to prevent it from doing that? I'm not sure how the initrd decides which raid modules it should pick, maybe it's simply listed in /etc/sysconfig/kernel, in the INITRD_MODULES variable. Just loading the raid6 module in a xen domain makes my machine oops, log below. I'd guess it's because the module attempts to use mmx within the kernel, which is a bit tricky because you have to save/restore userspace fp state for that. Could be a corner case which simply doesn't work with xen. Gerd ==============================[ cut here ]============================== raid6: int32x1 114 MB/s raid6: int32x2 123 MB/s raid6: int32x4 105 MB/s raid6: int32x8 108 MB/s general protection fault: 0000 [#1] Modules linked in: raid6 raid5 xor raid1 raid0 md autofs4 ipv6 snd_pcm_oss snd_mixer_oss snd_seq_midi snd_seq_midi_event snd_seq snd_ens1370 gameport snd_rawmidi snd_seq_device snd_pcm snd_timer snd_page_alloc snd_ak4531_codec snd af_packet budget_ci tda1004x firmware_class budget_core dvb_core saa7146 ttpci_eeprom stv0299 tda9887 tuner saa7134 video_buf v4l2_common v4l1_compat soundcore ir_common videodev tun bridge edd evdev joydev sg st sr_mod nls_iso8859_1 nls_cp437 vfat fat intel_agp uhci_hcd agpgart usbcore tulip i2c_piix4 i2c_core dm_mod parport_pc lp parport ext3 jbd ide_cd cdrom ide_disk sym53c8xx scsi_transport_spi piix ide_core sd_mod scsi_mod CPU: 0 EIP: 0061:[<f0d0463f>] Not tainted VLI EFLAGS: 00011296 (2.6.11.4-20a-xen) EIP is at raid6_mmx1_gen_syndrome+0x1f/0xb0 [raid6] eax: eb3f1000 ebx: eb3dff48 ecx: eb3dff48 edx: 00001000 esi: 0000000f edi: 00000012 ebp: 00001000 esp: eb3dfe9c ds: 007b es: 007b ss: 0069 Process modprobe (pid: 6457, threadinfo=eb3de000 task=ee0bba80) Stack: eb3f1000 eb3f0000 0000000a fbfee000 c011e9e2 00000001 00000082 00000000 c011ea97 eb3dfef4 c010e46b 0000001b c011a330 00000000 00000000 c0106203 ffffdd26 fbfee000 00000000 eb3dff48 c010974f eb3dfef4 ffffdd26 f0d151cc Call Trace: [<c011e9e2>] __do_softirq+0x52/0xc0 [<c011ea97>] do_softirq+0x47/0x60 [<c010e46b>] do_IRQ+0x3b/0x70 [<c011a330>] __call_console_drivers+0x40/0x60 [<c0106203>] evtchn_do_upcall+0x53/0xa0 [<c010974f>] hypervisor_callback+0x37/0x40 [<f09de0fe>] raid6_select_algo+0xde/0x201 [raid6] [<f09de005>] raid6_init+0x5/0x20 [raid6] [<c0131592>] sys_init_module+0x122/0x1b0 [<c0109590>] syscall_call+0x7/0xb Code: c0 c1 e8 17 83 e0 01 c3 8d 74 26 00 55 89 d5 57 89 c7 56 8d 70 fd 53 83 ec 78 89 cb 8b 44 b1 04 89 44 24 04 8b 44 b1 08 89 04 24 <0f> 20 c0 0f 06 89 44 24 74 9b dd 74 24 08 9b 0f 6f 05 c4 51 d1 _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |