= 2008-10-31 = * 討論海洋資料庫計畫 * [wiki:jazz/Comet/08-10-31 DRBL + Orbited + Perl Stomp Client 測試] * 11:00 中群電腦教室 DRBL 除錯 {{{ Oct 31 19:48:39 drbl in.tftpd[3837]: RRQ from 192.168.100.4 filename pxelinux.cfg/default Oct 31 19:48:39 drbl in.tftpd[3838]: RRQ from 192.168.100.4 filename vesamenu.c32 Oct 31 19:48:39 drbl in.tftpd[3840]: RRQ from 192.168.100.4 filename pxelinux.cfg/default Oct 31 19:48:39 drbl in.tftpd[3842]: RRQ from 192.168.100.4 filename drblwp.png Oct 31 19:48:46 drbl in.tftpd[3845]: RRQ from 192.168.100.1 filename vmlinuz-pxe Oct 31 19:48:46 drbl in.tftpd[3847]: RRQ from 192.168.100.8 filename vmlinuz-pxe Oct 31 19:48:46 drbl in.tftpd[3848]: RRQ from 192.168.100.3 filename vmlinuz-pxe Oct 31 19:48:46 drbl in.tftpd[3849]: RRQ from 192.168.100.2 filename vmlinuz-pxe Oct 31 19:48:47 drbl in.tftpd[3850]: RRQ from 192.168.100.4 filename vmlinuz-pxe }}} * 此外,一直有 tftp 的警告訊息 {{{ tftp: client does not accept options }}} * 升級到 Lenny 但 Kernel 不是很穩定 {{{ [11017.018427] ------------[ cut here ]------------ [11017.018427] kernel BUG at include/linux/module.h:386! [11017.018427] invalid opcode: 0000 [1] SMP [11017.018427] CPU 3 [11017.018427] Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_filter ip_tables x_tables nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc video output ac battery ipv6 loop i2c_i801 rng_core parport_pc parport i2c_core iTCO_wdt snd_hda_intel pcspkr button snd_pcm snd_timer snd soundcore snd_page_alloc intel_agp evdev usbhid hid ff_memless reiserfs dm_mirror dm_log dm_snapshot dm_mod sg sr_mod cdrom sd_mod ide_pci_generic ide_core ata_piix floppy r8169 ata_generic libata scsi_mod dock ehci_hcd uhci_hcd e1000e thermal processor fan thermal_sys [11017.018427] Pid: 7646, comm: mount Not tainted 2.6.26-1-amd64 #1 [11017.018427] RIP: 0010:[] [] get_filesystem+0x16/0x32 [11017.018427] RSP: 0018:ffff810028097d08 EFLAGS: 00010246 [11017.018427] RAX: 0000000000000000 RBX: ffffffffa02fcb80 RCX: ffffffffa02fc6b0 [11017.018427] RDX: 0000000000001000 RSI: ffffffffa02e908a RDI: ffffffffa02fcb80 [11017.018427] RBP: ffff8100219ba000 R08: ffff8100219ba268 R09: ffff810028097c58 [11017.018427] R10: ffff8100280db000 R11: ffffffff802f1e06 R12: 0000000000000000 [11017.018427] R13: ffffffffa02fc680 R14: 0000000000000000 R15: ffffffff8029bf48 [11017.018427] FS: 00007f7d1581a7c0(0000) GS:ffff81003f2909c0(0000) knlGS:0000000000000000 [11017.018427] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [11017.018427] CR2: 00000000008f5000 CR3: 0000000039df6000 CR4: 00000000000006e0 [11017.018427] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [11017.018427] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [11017.018427] Process mount (pid: 7646, threadinfo ffff810028096000, task ffff81003d37ab50) [11017.018427] Stack: ffff8100219ba000 ffffffff8029c4eb ffffffff8029ce0a ffff81003d9745c0 [11017.018427] 0000000000000000 0000000000000000 0000000000000000 ffffffffa02e2733 [11017.018427] ffff81003d9745c0 ffffffff8029d0b8 ffff81003d9745c0 ffff81003d9745c0 [11017.018427] Call Trace: [11017.018427] [] ? sget+0x37b/0x38a [11017.018427] [] ? set_anon_super+0x0/0xa3 [11017.018427] [] ? :sunrpc:rpc_fill_super+0x0/0x9b [11017.018427] [] ? get_sb_single+0x2f/0xb3 [11017.018427] [] ? vfs_kern_mount+0x93/0x11b [11017.018427] [] ? do_kern_mount+0x43/0xdc [11017.018427] [] ? do_new_mount+0x5b/0x95 [11017.018427] [] ? do_mount+0x1bd/0x1e7 [11017.018427] [] ? __alloc_pages_internal+0xd6/0x3c4 [11017.018427] [] ? sys_mount+0x8a/0xce [11017.018427] [] ? system_call_after_swapgs+0x8a/0x8f [11017.018427] [11017.018427] [11017.018427] Code: ba 77 25 00 eb 05 bb ea ff ff ff 59 5e 48 63 c3 5b 5d 41 5c c3 53 48 8b 5f 20 48 85 db 74 26 48 89 df e8 a6 39 fa ff 85 c0 75 04 <0f> 0b eb fe 65 8b 04 25 24 00 00 00 89 c0 48 c1 e0 07 48 ff 84 [11017.018427] RIP [] get_filesystem+0x16/0x32 [11017.018427] RSP [11017.019879] ---[ end trace 05d7feaf6d33bb59 ]--- }}} {{{ # nmap -v -sP 192.168.100.1-30 Starting Nmap 4.62 ( http://nmap.org ) at 2008-11-01 00:01 CST Initiating ARP Ping Scan at 00:01 Scanning 30 hosts [1 port/host] Completed ARP Ping Scan at 00:01, 0.23s elapsed (30 total hosts) Host pc001 (192.168.100.1) appears to be up. MAC Address: 00:1A:4D:9A:52:FF (Gigabyte Technology Co.) Host pc002 (192.168.100.2) appears to be up. MAC Address: 00:1A:4D:9E:6A:72 (Gigabyte Technology Co.) Host pc003 (192.168.100.3) appears to be up. MAC Address: 00:1A:4D:9F:14:83 (Gigabyte Technology Co.) Host pc004 (192.168.100.4) appears to be up. MAC Address: 00:1A:4D:9F:14:8A (Gigabyte Technology Co.) Host pc005 (192.168.100.5) appears to be up. MAC Address: 00:1A:4D:9F:14:8E (Gigabyte Technology Co.) Host pc006 (192.168.100.6) appears to be up. MAC Address: 00:1A:4D:9F:14:91 (Gigabyte Technology Co.) Host pc007 (192.168.100.7) appears to be up. MAC Address: 00:1A:4D:9F:EA:6D (Gigabyte Technology Co.) Host pc008 (192.168.100.8) appears to be up. MAC Address: 00:1A:4D:9F:EA:F9 (Gigabyte Technology Co.) Host pc009 (192.168.100.9) appears to be up. MAC Address: 00:1A:4D:9F:EA:FB (Gigabyte Technology Co.) Host pc010 (192.168.100.10) appears to be up. MAC Address: 00:1A:4D:9F:EB:0B (Gigabyte Technology Co.) Host pc011 (192.168.100.11) appears to be up. MAC Address: 00:1A:4D:9F:EB:84 (Gigabyte Technology Co.) Host pc012 (192.168.100.12) appears to be up. MAC Address: 00:1A:4D:9F:EB:DC (Gigabyte Technology Co.) Host pc013 (192.168.100.13) appears to be up. MAC Address: 00:1A:4D:9F:EC:25 (Gigabyte Technology Co.) Host pc014 (192.168.100.14) appears to be up. MAC Address: 00:1D:7D:90:A0:A9 (Gigabyte Technology Co.) Host 192.168.100.15 appears to be down. Host pc016 (192.168.100.16) appears to be up. MAC Address: 00:1D:7D:90:A1:28 (Gigabyte Technology Co.) Host pc017 (192.168.100.17) appears to be up. MAC Address: 00:1D:7D:90:A1:52 (Gigabyte Technology Co.) Host pc018 (192.168.100.18) appears to be up. MAC Address: 00:1D:7D:90:A1:84 (Gigabyte Technology Co.) Host pc019 (192.168.100.19) appears to be up. MAC Address: 00:1D:7D:90:A1:C8 (Gigabyte Technology Co.) Host pc020 (192.168.100.20) appears to be up. MAC Address: 00:1D:7D:90:A1:D3 (Gigabyte Technology Co.) Host 192.168.100.21 appears to be down. Host pc022 (192.168.100.22) appears to be up. MAC Address: 00:1D:7D:91:B6:9D (Gigabyte Technology Co.) Host pc023 (192.168.100.23) appears to be up. MAC Address: 00:1D:7D:91:B7:01 (Gigabyte Technology Co.) Host pc024 (192.168.100.24) appears to be up. MAC Address: 00:1D:7D:91:B7:1B (Gigabyte Technology Co.) Host pc025 (192.168.100.25) appears to be up. MAC Address: 00:1D:7D:91:B7:5D (Gigabyte Technology Co.) Host pc026 (192.168.100.26) appears to be up. MAC Address: 00:1D:7D:91:C8:8B (Gigabyte Technology Co.) Host pc027 (192.168.100.27) appears to be up. MAC Address: 00:1D:7D:91:CB:3E (Gigabyte Technology Co.) Host 192.168.100.28 appears to be down. Host 192.168.100.29 appears to be down. Host 192.168.100.30 appears to be down. Read data files from: /usr/share/nmap Nmap done: 30 IP addresses (25 hosts up) scanned in 0.311 seconds Raw packets sent: 35 (1470B) | Rcvd: 25 (1050B) }}} * [備忘] [http://www.libthomas.org/~thomas/wp/?p=348 觀看變動的檔案] posted by Thomas {{{ 有些時候要盯著某些log,有哪些指令可以不斷看檔案的檔尾呢? tail -f file watch ‘tail file’ 最近學到的新招式: less file + + 其中比要好用的應該是 less, 因為他還可以搜尋檔案內容 }}} * 如何關掉 VMWare Server for Linux 網路介面 vmnet1 跟 vmnet8 的 DHCP 服務? * [參考] [http://vmwire.blogspot.com/2008/01/how-to-disable-host-only-networking.html How to disable host only networking dhcp server on Linux hosts] * [解法] 我直接把 /etc/vmware/vmnet1/dhcpd 更名為 /etc/vmware/vmnet1/_dhcpd,再重跑 /usr/lib/vmware/net-services.sh restart 即可。 {{{ $ sudo mv /etc/vmware/vmnet1/dhcpd /etc/vmware/vmnet1/_dhcpd $ sudo /usr/lib/vmware/net-services.sh restart }}} == 多做多錯? == * [http://www.ithome.com.tw/itadm/article.php?c=51392 美好的人生從Debug開始] {{{ 「從未犯錯表示你從未做事」,趙耀東先生的話言猶在耳,Debug本來就是一路犯錯跌跌撞撞的過程,只要在實驗環境中累積足夠的成熟度,自然可以在真實的環境中解決問題。 }}}