WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] mysql & xen - is anyone using this combinationsuccessful

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: Re: [Xen-users] mysql & xen - is anyone using this combinationsuccessfully?
From: Mark Williamson <mark.williamson@xxxxxxxxxxxx>
Date: Wed, 25 May 2005 10:54:44 +0100
Cc: Ian Pratt <m+Ian.Pratt@xxxxxxxxxxxx>, Paul Laws <paul.laws@xxxxxxxxxxxxxxxxxxxxx>
Delivery-date: Wed, 25 May 2005 10:44:22 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <429448C9.6010306@xxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <A95E2296287EAD4EB592B5DEEFCE0E9D1E41D7@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <429448C9.6010306@xxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.8
> I'm using gentoo, and have specifically excluded the "nptl" USE flag to
> prevent the new thread handling. I have no tls directory under /lib, so I
> guess this is working (?)

There's also a gcc flag for emitting direct TLS references directly in the 
code (the TLS library does this, which is why we disable it).  The gcc flag 
is "-mno-tls-direct-seg-refs".  Could this be your problem?  Does 
recompiling, with no-tls-direct-seg-refs help?

Cheers,
Mark

> > The best soloution is to install a 'xen friendly' glibc for your
> > installation. What distro are you running?
> >
> > The othe ralternative is to not disable tls by mv'ing the directory out
> > the way, but to leave it active. You'll get some loss of performance,
> > but it should be executed correctly.
> >
> > Another interesting datapoint would be to try the unstable.bk tree. It's
> > still a bit 'raw', but providing you're just using the features present
> > in 2.x its actually pretty stable.
> >
> > If anyone has a simple recipe for deterministically provoking this issue
> > it would be good to know.
>
> FWIW, my setup here has involved several machines a couple of "live" ones
> basically used to hold transient data in a queue, a development box and a
> reporting server containing large volumes of log records - mostly used for
> queries.
>
> It's the reporting server which had the data corruption, and the two queue
> handlers which have experienced the segvs.
>
> The queue handlers are running on identical boxes (IBM e325s over scsi),
> and the reporting server on a generic system over SATA, if this helps.
>
> The queue handlers have both had the segv, but at different times. They're
> in a round-robin carrying much the same traffic. I guess this means the
> problem is going to be difficult to reproduce :-(
>
> > Best,
> > Ian
>
> Hope this helps,
> Paul.

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users