All of lore.kernel.org
 help / color / mirror / Atom feed
From: "H. Peter Anvin" <hpa@zytor.com>
To: Holger Kiehl <Holger.Kiehl@dwd.de>
Cc: Linux RAID Mailing List <linux-raid@vger.kernel.org>
Subject: Re: RAID corruption with kernel 3.2?
Date: Sun, 12 Feb 2012 10:00:07 -0800	[thread overview]
Message-ID: <4F37FE27.9050309@zytor.com> (raw)
In-Reply-To: <alpine.LRH.2.02.1202121551560.8312@diagnostix.dwd.de>

On 02/12/2012 08:06 AM, Holger Kiehl wrote:
>>
>> The current suspicion -- but we don't know yet -- is that this is a
>> problem on Sandy Bridge and some Penryn CPUs which have the XSAVE
>> instruction, but we might very well be completely wrong on that.
>>
> I have NOT seen any corruptions. Have a dual CPU (8 cores) system with
> the following CPU:
> 
>    cat /proc/cpuinfo
>    processor       : 0
>    vendor_id       : GenuineIntel
>    cpu family      : 6
>    model           : 23
>    model name      : Intel(R) Xeon(R) CPU           X5460  @ 3.16GHz
>    stepping        : 10
>    microcode       : 0xa07
>    cpu MHz         : 1999.000
>    cache size      : 6144 KB
>    physical id     : 0
>    siblings        : 4
>    core id         : 0
>    cpu cores       : 4
>    apicid          : 0
>    initial apicid  : 0
>    fpu             : yes
>    fpu_exception   : yes
>    cpuid level     : 13
>    wp              : yes
>    flags           : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
> pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe
> syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl
> aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm
> dca sse4_1 xsave lahf_lm dts tpr_shadow vnmi flexpriority
>    bogomips        : 6317.90
>    clflush size    : 64
>    cache_alignment : 64
>    address sizes   : 38 bits physical, 48 bits virtual
>    power management:
> 

Okay, so that's Penryn, it has XSAVE but not XSAVEOPT.  Very interesting
data point, I appreciate the info!

	-hpa

-- 
H. Peter Anvin, Intel Open Source Technology Center
I work for Intel.  I don't speak on their behalf.


      reply	other threads:[~2012-02-12 18:00 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-02-12  2:47 RAID corruption with kernel 3.2? H. Peter Anvin
2012-02-12  4:14 ` Mathias Burén
2012-02-12  4:43   ` H. Peter Anvin
2012-02-12  4:53     ` Mathias Burén
2012-02-12 16:06     ` Holger Kiehl
2012-02-12 18:00       ` H. Peter Anvin [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4F37FE27.9050309@zytor.com \
    --to=hpa@zytor.com \
    --cc=Holger.Kiehl@dwd.de \
    --cc=linux-raid@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.