On 1/13/06, Bill Marquette <[EMAIL PROTECTED]> wrote: > I wanted to followup on the network connectivity issue I mentioned > with the DL385. I obviously didn't try hard enough. After moving the > machine to another location and using a crossover cable to connect it > to another OpenBSD box instead of a switch, I'm seeing link activity > and can get online with it. > > The PCI-X issues are still there, but for those that don't care about > that, the machine does work with onboard disk and onboard network.
My definition of work btw is it works and I was able to get a cvs update completed. However a simple SCP to a machine direct connected to it b0rks it - each panic is different (joy). The latest from a cvs update earlier this evening is: # scp /bsd /bsd /bsd 192.168.177.2:/ The authenticity of host '192.168.177.2 (192.168.177.2)' can't be established. RSA key fingerprint is cd:bd:f7:e9:c6:85:5c:e1:17:6f:a6:6c:3f:9b:ad:98. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '192.168.177.2' (RSA) to the list of known hosts. [EMAIL PROTECTED]'s password: bsd 0% 0 0.0KB/s --:-- ETAkernel: machine check trap, code=0 Stopped at microuptime+0x3f: leave ddb{0}> trace microuptime() at microuptime+0x3f mi_switch() at mi_switch+0xa2 preempt() at preempt+0xb2 trap() at trap+0x556 --- trap (number 3) --- end of kernel end trace frame: 0x4000, count: -4 0x41d5331a: ddb{0}> This is running amd64 GENERIC.MP with one (hopefully) minor change setting CONADDR to 0x2f8 so I can use the Compaq iLO from remote to have serial console access (via ssh, neat!) - as the iLO sits on BIOS com2 (boot loader com1). I can panic it with the same command w/a generic kernel too, just can't get the backtrace :) "show all procs" shows ddb{0}> [All procs PID PPID PGRP UID S FLAGS WAIT COMMAND 5263 28221 28221 0 2 0x2004086 ssh *28221 25756 28221 0 2 0x4006 scp 25756 1 25756 0 3 0x2004086 pause ksh 32639 1 1 0 3 0x2004084 ttyopn getty 32710 1 32710 0 3 0x2004086 ttyin getty 22120 1 22120 0 3 0x2004086 ttyin getty 5890 1 5890 0 3 0x2004086 ttyin getty 1667 1 1667 0 3 0x2004086 ttyin getty 21591 1 21591 0 3 0x2004086 ttyin getty 20141 1 20141 0 3 0x2000084 select cron 13916 1 13916 0 3 0x2040184 select sendmail 17527 1 17527 0 3 0x2000084 select sshd 27479 1 27479 0 3 0x2000184 select inetd 29091 24809 24809 73 3 0x2000184 poll syslogd 24809 1 24809 0 3 0x2000084 netio syslogd 11 0 0 0 3 0x2100204 crypto_wa crypto 10 0 0 0 3 0x2100204 aiodoned aiodoned 9 0 0 0 3 0x2100204 syncer update 8 0 0 0 3 0x2100204 cleaner cleaner 7 0 0 0 3 0x100204 reaper reaper 6 0 0 0 3 0x2100204 pgdaemon pagedaemon 5 0 0 0 3 0x2100204 pftm pfpurge 4 0 0 0 3 0x2100204 usbevt usb1 3 0 0 0 3 0x2100204 usbtsk usbtask 2 0 0 0 3 0x2100204 usbevt usb0 1 0 1 0 3 0x2004084 wait init 0 -1 0 0 3 0x2080204 scheduler swapper Until (and even after for some time) one of these shows up in a developers hands (already volunteered), I can provide serial console access and full lights out management access to this box (and to the box that I'm scp'ing too). dmesg from various kernels... AMD64 SMP kernel from 1/7/06 http://www.pfsense.com/~billm/dmesg.amd64.mp.txt AMD64 non-SMP kernel from 1/7/06 http://www.pfsense.com/~billm/dmesg.amd64.uni.txt i386 non-SMP kernel from 1/7/06 (bsd.rd from snapshot cd) http://www.pfsense.com/~billm/dmesg.i386.uni.txt AMD64 SMP kernel w/ console set to com1 from 1/13/06 http://www.pfsense.com/~billm/dmesg.amd64.mp.com1.txt --Bill