|
|
|
|
|
|
|
|
|
|
xen-users
Re: [Xen-users] xen on suse 9.3 and software raid
> However the software raid1 (mirror) is still not working with
> kernel-2.6.11.4-20a-xen from the SuSE-9.3 distribution. I guess
> the mkinitrd bug isn't the source of the problem.
Any chance the initrd attempts to load the raid6 module?
If so, can you try to prevent it from doing that? I'm not
sure how the initrd decides which raid modules it should
pick, maybe it's simply listed in /etc/sysconfig/kernel,
in the INITRD_MODULES variable.
Just loading the raid6 module in a xen domain makes my
machine oops, log below. I'd guess it's because the
module attempts to use mmx within the kernel, which is
a bit tricky because you have to save/restore userspace
fp state for that. Could be a corner case which simply
doesn't work with xen.
Gerd
==============================[ cut here ]==============================
raid6: int32x1 114 MB/s
raid6: int32x2 123 MB/s
raid6: int32x4 105 MB/s
raid6: int32x8 108 MB/s
general protection fault: 0000 [#1]
Modules linked in: raid6 raid5 xor raid1 raid0 md autofs4 ipv6 snd_pcm_oss
snd_mixer_oss snd_seq_midi snd_seq_midi_event snd_seq snd_ens1370 gameport
snd_rawmidi snd_seq_device snd_pcm snd_timer snd_page_alloc snd_ak4531_codec
snd af_packet budget_ci tda1004x firmware_class budget_core dvb_core saa7146
ttpci_eeprom stv0299 tda9887 tuner saa7134 video_buf v4l2_common v4l1_compat
soundcore ir_common videodev tun bridge edd evdev joydev sg st sr_mod
nls_iso8859_1 nls_cp437 vfat fat intel_agp uhci_hcd agpgart usbcore tulip
i2c_piix4 i2c_core dm_mod parport_pc lp parport ext3 jbd ide_cd cdrom ide_disk
sym53c8xx scsi_transport_spi piix ide_core sd_mod scsi_mod
CPU: 0
EIP: 0061:[<f0d0463f>] Not tainted VLI
EFLAGS: 00011296 (2.6.11.4-20a-xen)
EIP is at raid6_mmx1_gen_syndrome+0x1f/0xb0 [raid6]
eax: eb3f1000 ebx: eb3dff48 ecx: eb3dff48 edx: 00001000
esi: 0000000f edi: 00000012 ebp: 00001000 esp: eb3dfe9c
ds: 007b es: 007b ss: 0069
Process modprobe (pid: 6457, threadinfo=eb3de000 task=ee0bba80)
Stack: eb3f1000 eb3f0000 0000000a fbfee000 c011e9e2 00000001 00000082 00000000
c011ea97 eb3dfef4 c010e46b 0000001b c011a330 00000000 00000000 c0106203
ffffdd26 fbfee000 00000000 eb3dff48 c010974f eb3dfef4 ffffdd26 f0d151cc
Call Trace:
[<c011e9e2>] __do_softirq+0x52/0xc0
[<c011ea97>] do_softirq+0x47/0x60
[<c010e46b>] do_IRQ+0x3b/0x70
[<c011a330>] __call_console_drivers+0x40/0x60
[<c0106203>] evtchn_do_upcall+0x53/0xa0
[<c010974f>] hypervisor_callback+0x37/0x40
[<f09de0fe>] raid6_select_algo+0xde/0x201 [raid6]
[<f09de005>] raid6_init+0x5/0x20 [raid6]
[<c0131592>] sys_init_module+0x122/0x1b0
[<c0109590>] syscall_call+0x7/0xb
Code: c0 c1 e8 17 83 e0 01 c3 8d 74 26 00 55 89 d5 57 89 c7 56 8d 70 fd 53 83
ec 78 89 cb 8b 44 b1 04 89 44 24 04 8b 44 b1 08 89 04 24 <0f> 20 c0 0f 06 89 44
24 74 9b dd 74 24 08 9b 0f 6f 05 c4 51 d1
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
|
|
|
|