wiki:jazz/08-10-31

Version 11 (modified by jazz, 16 years ago) (diff)

--

2008-10-31

  • 討論海洋資料庫計畫
  • DRBL + Orbited + Perl Stomp Client 測試
  • 11:00 中群電腦教室 DRBL 除錯
    Oct 31 19:48:39 drbl in.tftpd[3837]: RRQ from 192.168.100.4 filename pxelinux.cfg/default
    Oct 31 19:48:39 drbl in.tftpd[3838]: RRQ from 192.168.100.4 filename vesamenu.c32
    Oct 31 19:48:39 drbl in.tftpd[3840]: RRQ from 192.168.100.4 filename pxelinux.cfg/default
    Oct 31 19:48:39 drbl in.tftpd[3842]: RRQ from 192.168.100.4 filename drblwp.png
    Oct 31 19:48:46 drbl in.tftpd[3845]: RRQ from 192.168.100.1 filename vmlinuz-pxe
    Oct 31 19:48:46 drbl in.tftpd[3847]: RRQ from 192.168.100.8 filename vmlinuz-pxe
    Oct 31 19:48:46 drbl in.tftpd[3848]: RRQ from 192.168.100.3 filename vmlinuz-pxe
    Oct 31 19:48:46 drbl in.tftpd[3849]: RRQ from 192.168.100.2 filename vmlinuz-pxe
    Oct 31 19:48:47 drbl in.tftpd[3850]: RRQ from 192.168.100.4 filename vmlinuz-pxe
    
    • 此外,一直有 tftp 的警告訊息
      tftp: client does not accept options
      
    • 升級到 Lenny 但 Kernel 不是很穩定
      [11017.018427] ------------[ cut here ]------------
      [11017.018427] kernel BUG at include/linux/module.h:386!
      [11017.018427] invalid opcode: 0000 [1] SMP
      [11017.018427] CPU 3
      [11017.018427] Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_filter ip_tables x_tables nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc video output ac battery ipv6 loop i2c_i801 rng_core parport_pc parport i2c_core iTCO_wdt snd_hda_intel pcspkr button snd_pcm snd_timer snd soundcore snd_page_alloc intel_agp evdev usbhid hid ff_memless reiserfs dm_mirror dm_log dm_snapshot dm_mod sg sr_mod cdrom sd_mod ide_pci_generic ide_core ata_piix floppy r8169 ata_generic libata scsi_mod dock ehci_hcd uhci_hcd e1000e thermal processor fan thermal_sys
      [11017.018427] Pid: 7646, comm: mount Not tainted 2.6.26-1-amd64 #1
      [11017.018427] RIP: 0010:[<ffffffff802ae76d>]  [<ffffffff802ae76d>] get_filesystem+0x16/0x32
      [11017.018427] RSP: 0018:ffff810028097d08  EFLAGS: 00010246
      [11017.018427] RAX: 0000000000000000 RBX: ffffffffa02fcb80 RCX: ffffffffa02fc6b0
      [11017.018427] RDX: 0000000000001000 RSI: ffffffffa02e908a RDI: ffffffffa02fcb80
      [11017.018427] RBP: ffff8100219ba000 R08: ffff8100219ba268 R09: ffff810028097c58
      [11017.018427] R10: ffff8100280db000 R11: ffffffff802f1e06 R12: 0000000000000000
      [11017.018427] R13: ffffffffa02fc680 R14: 0000000000000000 R15: ffffffff8029bf48
      [11017.018427] FS:  00007f7d1581a7c0(0000) GS:ffff81003f2909c0(0000) knlGS:0000000000000000
      [11017.018427] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
      [11017.018427] CR2: 00000000008f5000 CR3: 0000000039df6000 CR4: 00000000000006e0
      [11017.018427] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      [11017.018427] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
      [11017.018427] Process mount (pid: 7646, threadinfo ffff810028096000, task ffff81003d37ab50)
      [11017.018427] Stack:  ffff8100219ba000 ffffffff8029c4eb ffffffff8029ce0a ffff81003d9745c0
      [11017.018427]  0000000000000000 0000000000000000 0000000000000000 ffffffffa02e2733
      [11017.018427]  ffff81003d9745c0 ffffffff8029d0b8 ffff81003d9745c0 ffff81003d9745c0
      [11017.018427] Call Trace:
      [11017.018427]  [<ffffffff8029c4eb>] ? sget+0x37b/0x38a
      [11017.018427]  [<ffffffff8029ce0a>] ? set_anon_super+0x0/0xa3
      [11017.018427]  [<ffffffffa02e2733>] ? :sunrpc:rpc_fill_super+0x0/0x9b
      [11017.018427]  [<ffffffff8029d0b8>] ? get_sb_single+0x2f/0xb3
      [11017.018427]  [<ffffffff8029c9d0>] ? vfs_kern_mount+0x93/0x11b
      [11017.018427]  [<ffffffff8029caab>] ? do_kern_mount+0x43/0xdc
      [11017.018427]  [<ffffffff802b14f5>] ? do_new_mount+0x5b/0x95
      [11017.018427]  [<ffffffff802b16ec>] ? do_mount+0x1bd/0x1e7
      [11017.018427]  [<ffffffff80276682>] ? __alloc_pages_internal+0xd6/0x3c4
      [11017.018427]  [<ffffffff802b17a0>] ? sys_mount+0x8a/0xce
      [11017.018427]  [<ffffffff8020be9a>] ? system_call_after_swapgs+0x8a/0x8f
      [11017.018427]
      [11017.018427]
      [11017.018427] Code: ba 77 25 00 eb 05 bb ea ff ff ff 59 5e 48 63 c3 5b 5d 41 5c c3 53 48 8b 5f 20 48 85 db 74 26 48 89 df e8 a6 39 fa ff 85 c0 75 04 <0f> 0b eb fe 65 8b 04 25 24 00 00 00 89 c0 48 c1 e0 07 48 ff 84
      [11017.018427] RIP  [<ffffffff802ae76d>] get_filesystem+0x16/0x32
      [11017.018427]  RSP <ffff810028097d08>
      [11017.019879] ---[ end trace 05d7feaf6d33bb59 ]---
      
      # nmap -v -sP 192.168.100.1-30
      
      Starting Nmap 4.62 ( http://nmap.org ) at 2008-11-01 00:01 CST
      Initiating ARP Ping Scan at 00:01
      Scanning 30 hosts [1 port/host]
      Completed ARP Ping Scan at 00:01, 0.23s elapsed (30 total hosts)
      Host pc001 (192.168.100.1) appears to be up.
      MAC Address: 00:1A:4D:9A:52:FF (Gigabyte Technology Co.)
      Host pc002 (192.168.100.2) appears to be up.
      MAC Address: 00:1A:4D:9E:6A:72 (Gigabyte Technology Co.)
      Host pc003 (192.168.100.3) appears to be up.
      MAC Address: 00:1A:4D:9F:14:83 (Gigabyte Technology Co.)
      Host pc004 (192.168.100.4) appears to be up.
      MAC Address: 00:1A:4D:9F:14:8A (Gigabyte Technology Co.)
      Host pc005 (192.168.100.5) appears to be up.
      MAC Address: 00:1A:4D:9F:14:8E (Gigabyte Technology Co.)
      Host pc006 (192.168.100.6) appears to be up.
      MAC Address: 00:1A:4D:9F:14:91 (Gigabyte Technology Co.)
      Host pc007 (192.168.100.7) appears to be up.
      MAC Address: 00:1A:4D:9F:EA:6D (Gigabyte Technology Co.)
      Host pc008 (192.168.100.8) appears to be up.
      MAC Address: 00:1A:4D:9F:EA:F9 (Gigabyte Technology Co.)
      Host pc009 (192.168.100.9) appears to be up.
      MAC Address: 00:1A:4D:9F:EA:FB (Gigabyte Technology Co.)
      Host pc010 (192.168.100.10) appears to be up.
      MAC Address: 00:1A:4D:9F:EB:0B (Gigabyte Technology Co.)
      Host pc011 (192.168.100.11) appears to be up.
      MAC Address: 00:1A:4D:9F:EB:84 (Gigabyte Technology Co.)
      Host pc012 (192.168.100.12) appears to be up.
      MAC Address: 00:1A:4D:9F:EB:DC (Gigabyte Technology Co.)
      Host pc013 (192.168.100.13) appears to be up.
      MAC Address: 00:1A:4D:9F:EC:25 (Gigabyte Technology Co.)
      Host pc014 (192.168.100.14) appears to be up.
      MAC Address: 00:1D:7D:90:A0:A9 (Gigabyte Technology Co.)
      Host 192.168.100.15 appears to be down.
      Host pc016 (192.168.100.16) appears to be up.
      MAC Address: 00:1D:7D:90:A1:28 (Gigabyte Technology Co.)
      Host pc017 (192.168.100.17) appears to be up.
      MAC Address: 00:1D:7D:90:A1:52 (Gigabyte Technology Co.)
      Host pc018 (192.168.100.18) appears to be up.
      MAC Address: 00:1D:7D:90:A1:84 (Gigabyte Technology Co.)
      Host pc019 (192.168.100.19) appears to be up.
      MAC Address: 00:1D:7D:90:A1:C8 (Gigabyte Technology Co.)
      Host pc020 (192.168.100.20) appears to be up.
      MAC Address: 00:1D:7D:90:A1:D3 (Gigabyte Technology Co.)
      Host 192.168.100.21 appears to be down.
      Host pc022 (192.168.100.22) appears to be up.
      MAC Address: 00:1D:7D:91:B6:9D (Gigabyte Technology Co.)
      Host pc023 (192.168.100.23) appears to be up.
      MAC Address: 00:1D:7D:91:B7:01 (Gigabyte Technology Co.)
      Host pc024 (192.168.100.24) appears to be up.
      MAC Address: 00:1D:7D:91:B7:1B (Gigabyte Technology Co.)
      Host pc025 (192.168.100.25) appears to be up.
      MAC Address: 00:1D:7D:91:B7:5D (Gigabyte Technology Co.)
      Host pc026 (192.168.100.26) appears to be up.
      MAC Address: 00:1D:7D:91:C8:8B (Gigabyte Technology Co.)
      Host pc027 (192.168.100.27) appears to be up.
      MAC Address: 00:1D:7D:91:CB:3E (Gigabyte Technology Co.)
      Host 192.168.100.28 appears to be down.
      Host 192.168.100.29 appears to be down.
      Host 192.168.100.30 appears to be down.
      Read data files from: /usr/share/nmap
      Nmap done: 30 IP addresses (25 hosts up) scanned in 0.311 seconds
                 Raw packets sent: 35 (1470B) | Rcvd: 25 (1050B)
      
  • [備忘] 觀看變動的檔案 posted by Thomas
    有些時候要盯著某些log,有哪些指令可以不斷看檔案的檔尾呢?
    
    tail -f file
    watch ‘tail file’
    
    最近學到的新招式:
    
    less file + <End> + <F>
    
    其中比要好用的應該是 less, 因為他還可以搜尋檔案內容
    
  • 如何關掉 VMWare Server for Linux 網路介面 vmnet1 跟 vmnet8 的 DHCP 服務?
    • [參考] How to disable host only networking dhcp server on Linux hosts
    • [解法] 我直接把 /etc/vmware/vmnet1/dhcpd 更名為 /etc/vmware/vmnet1/_dhcpd,再重跑 /usr/lib/vmware/net-services.sh restart 即可。
      $ sudo mv /etc/vmware/vmnet1/dhcpd /etc/vmware/vmnet1/_dhcpd
      $ sudo /usr/lib/vmware/net-services.sh restart
      

  • 美好的人生從Debug開始
    「從未犯錯表示你從未做事」,趙耀東先生的話言猶在耳,Debug本來就是一路犯錯跌跌撞撞的過程,只要在實驗環境中累積足夠的成熟度,自然可以在真實的環境中解決問題。 
    

Attachments (4)