On 1/13/06, Bill Marquette <[EMAIL PROTECTED]> wrote:
> I wanted to followup on the network connectivity issue I mentioned
> with the DL385.  I obviously didn't try hard enough.  After moving the
> machine to another location and using a crossover cable to connect it
> to another OpenBSD box instead of a switch, I'm seeing link activity
> and can get online with it.
>
> The PCI-X issues are still there, but for those that don't care about
> that, the machine does work with onboard disk and onboard network.

My definition of work btw is it works and I was able to get a cvs
update completed.  However a simple SCP to a machine direct connected
to it b0rks it - each panic is different (joy).  The latest from a cvs
update earlier this evening is:

# scp /bsd /bsd /bsd 192.168.177.2:/
The authenticity of host '192.168.177.2 (192.168.177.2)' can't be established.
RSA key fingerprint is cd:bd:f7:e9:c6:85:5c:e1:17:6f:a6:6c:3f:9b:ad:98.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.177.2' (RSA) to the list of known hosts.
[EMAIL PROTECTED]'s password:
bsd                                             0%    0     0.0KB/s  
--:-- ETAkernel: machine check trap, code=0
Stopped at      microuptime+0x3f:       leave
ddb{0}> trace
microuptime() at microuptime+0x3f
mi_switch() at mi_switch+0xa2
preempt() at preempt+0xb2
trap() at trap+0x556
--- trap (number 3) ---
end of kernel
end trace frame: 0x4000, count: -4
0x41d5331a:
ddb{0}>

This is running amd64 GENERIC.MP with one (hopefully) minor change
setting CONADDR to 0x2f8 so I can use the Compaq iLO from remote to
have serial console access (via ssh, neat!) - as the iLO sits on BIOS
com2 (boot loader com1).  I can panic it with the same command w/a
generic kernel too, just can't get the backtrace :)

"show all procs" shows
ddb{0}> [All procs
   PID   PPID   PGRP    UID  S       FLAGS  WAIT       COMMAND
  5263  28221  28221      0  2   0x2004086             ssh
*28221  25756  28221      0  2      0x4006             scp
 25756      1  25756      0  3   0x2004086  pause      ksh
 32639      1      1      0  3   0x2004084  ttyopn     getty
 32710      1  32710      0  3   0x2004086  ttyin      getty
 22120      1  22120      0  3   0x2004086  ttyin      getty
  5890      1   5890      0  3   0x2004086  ttyin      getty
  1667      1   1667      0  3   0x2004086  ttyin      getty
 21591      1  21591      0  3   0x2004086  ttyin      getty
 20141      1  20141      0  3   0x2000084  select     cron
 13916      1  13916      0  3   0x2040184  select     sendmail
 17527      1  17527      0  3   0x2000084  select     sshd
 27479      1  27479      0  3   0x2000184  select     inetd
 29091  24809  24809     73  3   0x2000184  poll       syslogd
 24809      1  24809      0  3   0x2000084  netio      syslogd
    11      0      0      0  3   0x2100204  crypto_wa  crypto
    10      0      0      0  3   0x2100204  aiodoned   aiodoned
     9      0      0      0  3   0x2100204  syncer     update
     8      0      0      0  3   0x2100204  cleaner    cleaner
     7      0      0      0  3    0x100204  reaper     reaper
     6      0      0      0  3   0x2100204  pgdaemon   pagedaemon
     5      0      0      0  3   0x2100204  pftm       pfpurge
     4      0      0      0  3   0x2100204  usbevt     usb1
     3      0      0      0  3   0x2100204  usbtsk     usbtask
     2      0      0      0  3   0x2100204  usbevt     usb0
     1      0      1      0  3   0x2004084  wait       init
     0     -1      0      0  3   0x2080204  scheduler  swapper


Until (and even after for some time) one of these shows up in a
developers hands (already volunteered), I can provide serial console
access and full lights out management access to this box (and to the
box that I'm scp'ing too).

dmesg from various kernels...
AMD64 SMP kernel from 1/7/06
http://www.pfsense.com/~billm/dmesg.amd64.mp.txt
AMD64 non-SMP kernel from 1/7/06
http://www.pfsense.com/~billm/dmesg.amd64.uni.txt
i386 non-SMP kernel from 1/7/06 (bsd.rd from snapshot cd)
http://www.pfsense.com/~billm/dmesg.i386.uni.txt
AMD64 SMP kernel w/ console set to com1 from 1/13/06
http://www.pfsense.com/~billm/dmesg.amd64.mp.com1.txt

--Bill

Reply via email to