Hi All! имеем # uname -a Linux debian 2.6.16-2-vserver-amd64-k8 #2 SMP Fri Jun 2 17:38:55 UTC 2006 x86_64 GNU/Linux
# cat /etc/debian_version 3.1 cat /etc/apt/sources.list deb http://ftp.ru.debian.org/debian-amd64/ sarge main contrib #deb http://www.backports.org/backports.org/ sarge-backports main contrib non-free deb http://security.debian.org/ stable/updates main contrib ядро взято с http://www.backports.org без него второй проц не опознавался. делаем: mount -t xfs /dev/hdb1 /mnt/hdb1 и получаем: Sep 20 19:52:41 debian kernel: SGI XFS with ACLs, security attributes, realtime, large block/inode numbers, no debug enabled Sep 20 19:52:41 debian kernel: SGI XFS Quota Management subsystem Sep 20 19:52:41 debian kernel: XFS mounting filesystem hdb1 Sep 20 19:52:41 debian kernel: Starting XFS recovery on filesystem: hdb1 (logdev: internal) Sep 20 19:52:41 debian kernel: PGD 1e2bf067 PUD 1ddbb067 PMD 0 Sep 20 19:52:41 debian kernel: CPU 0 Sep 20 19:52:41 debian kernel: Modules linked in: xfs exportfs ipv6 pcspkr uhci_hcd ohci_hcd ehci_hcd shpchp pci_hotplug forcedeth i810_audio ac97_codec snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcmsnd_timer snd soundcore snd_page_alloc i2c_nfo rce2 i2c_core tsdev dm_mod psmouse ide_generic ide_cd cdrom ext3 jbd mbcache ide_disk sata_nv libata scsi_mod amd74xx generic ide_core evdev Sep 20 19:52:41 debian kernel: Pid: 3033, comm: mount Not tainted 2.6.16-2-vserver-amd64-k8 #2 Sep 20 19:52:41 debian kernel: RIP: 0010:[page_to_pfn+0/49] <ffffffff8011fe79>{page_to_pfn+0} Sep 20 19:52:41 debian kernel: RSP: 0018:ffff81001fa258c0 EFLAGS: 00010256 Sep 20 19:52:41 debian kernel: RAX: ffff81001c854cc8 RBX: 0000000000000356 RCX: 0000000000000000 Sep 20 19:52:41 debian kernel: RDX: 0000000000000000 RSI: 0000000000000356 RDI: 0000000000000000 Sep 20 19:52:41 debian kernel: RBP: ffff81001c854b48 R08: 0000000000000000 R09: 0000000000000000 Sep 20 19:52:41 debian kernel: R10: ffff81001c854b48 R11: 0000000000000000 R12: ffff81001cafe200 Sep 20 19:52:41 debian kernel: R13: ffff81001ccb5800 R14: ffff81001f32b3c0 R15: ffff81001eb70840 Sep 20 19:52:41 debian kernel: FS: 00002b3f0436e4a0(0000) GS:ffffffff8042e000 (0000) knlGS:0000000000000000 Sep 20 19:52:41 debian kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b Sep 20 19:52:41 debian kernel: CR2: 0000000000000007 CR3: 000000001fa42000 CR4: 00000000000006e0 Sep 20 19:52:41 debian kernel: Process mount (pid: 3033[#0], threadinfo ffff81001fa24000, task ffff81001f6ac040) Sep 20 19:52:41 debian kernel: Stack: ffffffff88251a5e ffff81001cafe200 ffffffff8823f142 0000000000010000 Sep 20 19:52:41 debian kernel: 0000000000000000 0000001000000000 0000000000000000 0000000003560286 Sep 20 19:52:41 debian kernel: 0000000000000282 0000000000000282 Sep 20 19:52:41 debian kernel: Call Trace: <ffffffff88251a5e>{:xfs:xfs_buf_offset+57} Sep 20 19:52:41 debian kernel: <ffffffff8823f142>{:xfs:xlog_recover_do_inode_trans+295} Sep 20 19:52:41 debian kernel: <ffffffff8823fa30>{:xfs:xlog_recover_do_trans+119} <ffffffff8823fb6a>{:xfs:xlog_recover_commit_trans+40} Sep 20 19:52:41 debian kernel: <ffffffff8823fcba>{:xfs:xlog_recover_process_data+293} Sep 20 19:52:41 debian kernel: <ffffffff882407b8>{:xfs:xlog_do_recovery_pass+604} <ffffffff801f242f>{vsnprintf+746} Sep 20 19:52:41 debian kernel: <ffffffff88240c35>{:xfs:xlog_do_log_recovery+83} <ffffffff88240c69>{:xfs:xlog_do_recover+12} Sep 20 19:52:41 debian kernel: <ffffffff88240dd8>{:xfs:xlog_recover+124} <ffffffff8823a27a>{:xfs:xfs_log_mount+128} Sep 20 19:52:41 debian kernel: <ffffffff88241ff8>{:xfs:xfs_mountfs+1711} <ffffffff801eed3d>{_atomic_dec_and_lock+57} Sep 20 19:52:41 debian kernel: <ffffffff88251d91>{:xfs:xfs_setsize_buftarg_flags+48} Sep 20 19:52:41 debian kernel: <ffffffff8824767d>{:xfs:xfs_mount+781} <ffffffff8825777a>{:xfs:linvfs_fill_super+0} Sep 20 19:52:41 debian kernel: <ffffffff88257972>{:xfs:vfs_mount+34} <ffffffff8825780b>{:xfs:linvfs_fill_super+145} Sep 20 19:52:41 debian kernel: <ffffffff801862f3>{alloc_super+391} <ffffffff80199896>{get_filesystem+18} Sep 20 19:52:41 debian kernel: <ffffffff80186775>{sget+359} <ffffffff8018700e>{get_sb_bdev+246} Sep 20 19:52:41 debian kernel: <ffffffff801872a4>{do_kern_mount+256} <ffffffff8019b6a5>{do_new_mount+160} Sep 20 19:52:41 debian kernel: <ffffffff8019bd90>{do_mount+568} <ffffffff801625f0>{__alloc_pages+81} Sep 20 19:52:41 debian kernel: <ffffffff80162862>{__get_free_pages+33} <ffffffff8019c0e2>{sys_mount+139} Sep 20 19:52:41 debian kernel: <ffffffff8010a90e>{system_call+126} Sep 20 19:52:41 debian kernel: Sep 20 19:52:41 debian kernel: Code: 48 0f b6 47 07 48 8b 14 c5 20 61 43 80 48 b8 b7 6d db b6 6d кто сталкивался ? что делать ? -- emp -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

