Port-hp300 archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Difficulty with netbooting - le0: lost carrier when bringingdownthenetbsd kernel
Hi,
> With the holidays in the rear view, I picked this project again
> last night. I have not yet been successful.
>
> To recap - I'm trying to netboot NetBSD 10 an 360 using a
> raspberry pi using the native OS.
>
> This is my status:
>
> Bootstrap loader to the HP: Success
> bootp sending bootfile name to HP: Success
> bootparamd sending filesystem info: Failure
> tftp serving kernel, and then the rest of the fie system: Not there yet.
The current NetBSD/hp300 bootloader doesn't use bootparamd or tftp
to get a kernel (only Sun's firmware requires them to get a bootloader).
Once the NetBSD bootloader is loaded, it just try to
- get IP address and root file system info via BOOTP/DHCP (by default)
- then tries to mount the specified root directory via NFS
- then tries to load the specified kernel from the mounted NFS directory.
> Question for the experts - is this the expected order? I'm
> pretty sure it is, but sometimes I get the impression that tftp is step 3.
>
> Using tcpdump I can see inbound traffic on port 111, but nothing outbound:
>
> 00:38:54.842747 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 104) 192.168.2.123.1023 > 192.168.2.23.111: [no cksum] UDP, length 76
> 00:38:54.842990 IP (tos 0x0, ttl 64, id 44675, offset 0, flags [DF], proto UDP (17), length 56) 192.168.2.23.111 > 192.168.2.123.1023: [bad udp cksum 0x8618 -> 0xf3b4!] UDP, length 28
I guess these sunrpc (on port 111) requests are for NFS mount.
On my HP9000/425t boot,
"tcpdump -i re0 -n ether host 08:00:09:27:86:a7"
("re0" is on my host's NIC and the Ethernet address is my 425t one)
on my server shows:
```
01:14:12.860400 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 50
0x0000: f8f8 0300 0000 0608 0609 0100 ffcb 802b ...............+
0x0010: 0000 0002 4850 5333 3030 2020 2020 2020 ....HPS300......
0x0020: 2020 2020 2020 2020 0953 5953 5f55 424f .........SYS_UBO
0x0030: 4f54 OT
01:14:12.860534 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 30
0x0000: f8f8 0300 0000 0609 0608 8100 ffcb 802b ...............+
0x0010: 0003 0002 0953 5953 5f55 424f 4f54 .....SYS_UBOOT
01:14:12.863347 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 46
0x0000: f8f8 0300 0000 0608 0609 0200 0000 0000 ................
0x0010: 0003 0100 4850 5333 3030 2020 2020 2020 ....HPS300......
0x0020: 2020 2020 2020 2020 0953 5953 5f55 .........SYS_U
01:14:12.863396 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 274
0x0000: f8f8 0300 0000 0609 0608 8200 0000 0000 ................
0x0010: 0003 8000 424f 4f54 3433 0000 0002 1000 ....BOOT43......
0x0020: 0000 0000 0001 0001 0000 0000 0000 0000 ................
0x0030: 0000 0000 013d 0000 0000 0000 0000 0000 .....=..........
0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0060: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0070: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0080: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0090: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00b0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00c0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00d0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00e0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x00f0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0100: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0110: 0000 ..
==> HP LIF directory info is xfered, and then the HP firmware tries to
load specified SYS_UBOOT (actually "BOOT43" in LIF) is transfered
from host's rbootd(8) to hp425t firmware
[..snip..]
01:14:13.282431 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 1478
0x0000: f8f8 0300 0000 0609 0608 8200 0001 36e0 ..............6.
0x0010: 0003 0000 0000 0000 0000 0000 0000 0000 ................
0x0020: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0030: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0060: 007b 007d 0000 0000 0000 0000 0000 0000 .{.}............
0x0070: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0080: 005b 005d 0000 ffff ffff ffff ffff ffff .[.]............
0x0090: ffff ffff ffff ffff ffff ffff ffff ffff ................
0x00a0: ffff ffff ffff ffff ffff ffff ffff ffff ................
0x00b0: ffff ffff ffff ffff ffff ffff ffff ffff ................
0x00c0: ffff ffff ffff ffff ffff ffff ffff 5c7c ..............\|
0x00d0: 090a 2fff ffff ffff ffff ffff ffff ffff ../.............
0x00e0: ffff 3fff 08ff ffff ffff ffff ffff ffff ..?.............
0x00f0: ffff ffff ffff ffff ffff ffff ffff ffff ................
0x0100: ffff ffff ffff 0060 3c1b 007f 0000 0a09 .......`<.......
0x0110: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x0120: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0130: 0000 0000 0800 0000 0000 0000 0000 1b0d ................
0x0140: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x0150: 392f 4528 291e 3132 3334 3536 3738 3930 9/E().1234567890
0x0160: 2b27 1b1d 2a1c 2c2e 2f20 0f10 0b0c 1117 +'..*.,./.......
0x0170: 0512 1419 1509 0113 0406 0708 0a0d 1a18 ................
0x0180: 0316 020e 0000 007e 3e7f 007f 0000 0a09 .......~>.......
0x0190: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x01a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x01b0: 0000 0000 7f00 0000 0000 0000 0000 1b0d ................
0x01c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x01d0: 392f 607c 5c7e 2122 2324 2526 5e28 293d 9/`|\~!"#$%&^()=
0x01e0: 3f2f 7b7d 407c 3b3a 5f20 4f50 4b4c 5157 ?/{}@|;:_.OPKLQW
0x01f0: 4552 5459 5549 4153 4446 4748 4a4d 5a58 ERTYUIASDFGHJMZX
0x0200: 4356 424e 0000 0060 3c1b 007f 0000 0a09 CVBN...`<.......
0x0210: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x0220: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0230: 0000 0000 0800 0000 0000 0000 0000 1b0d ................
0x0240: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x0250: 392f 4528 295e 3132 3334 3536 3738 3930 9/E()^1234567890
0x0260: 2b27 5b5d 2a5c 2c2e 2d20 6f70 6b6c 7177 +'[]*\,.-.opklqw
0x0270: 6572 7479 7569 6173 6466 6768 6a6d 7a78 ertyuiasdfghjmzx
0x0280: 6376 626e 0000 0060 1c1b 007f 0000 0a09 cvbn...`........
0x0290: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x02a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x02b0: 0000 0000 0800 0000 0000 0000 0000 1b0d ................
0x02c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x02d0: 392f 4528 291e 3132 3334 3536 3738 3930 9/E().1234567890
0x02e0: 2d3d 1b1d 3b27 2c2e 2f20 0f10 0b0c 1117 -=..;',./.......
0x02f0: 0512 1419 1509 0113 0406 0708 0a0d 1a18 ................
0x0300: 0316 020e 0000 007e 7c7f 007f 0000 0a09 .......~|.......
0x0310: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x0320: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0330: 0000 0000 7f00 0000 0000 0000 0000 1b0d ................
0x0340: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x0350: 392f 607c 5c7e 2140 2324 255e 262a 2829 9/`|\~!@#$%^&*()
0x0360: 5f2b 7b7d 3a22 3c3e 3f20 4f50 4b4c 5157 _+{}:"<>?.OPKLQW
0x0370: 4552 5459 5549 4153 4446 4748 4a4d 5a58 ERTYUIASDFGHJMZX
0x0380: 4356 424e 0000 0060 5c1b 007f 0000 0a09 CVBN...`\.......
0x0390: 0000 0000 0000 000a 0000 0000 0000 0009 ................
0x03a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x03b0: 0000 0000 0800 0000 0000 0000 0000 1b0d ................
0x03c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78
0x03d0: 392f 4528 295e 3132 3334 3536 3738 3930 9/E()^1234567890
0x03e0: 2d3d 5b5d 3b27 2c2e 2f20 6f70 6b6c 7177 -=[];',./.opklqw
0x03f0: 6572 7479 7569 6173 6466 6768 6a6d 7a78 ertyuiasdfghjmzx
0x0400: 6376 626e 0000 fff1 194c fff1 19cc fff1 cvbn.....L......
0x0410: 1a4c 0000 001f fff0 f517 fff1 1a4c fff1 .L...........L..
0x0420: 19cc fff1 194c 0000 0000 0000 0000 0000 .....L..........
0x0430: 0017 fff0 f517 fff1 18cc fff1 184c fff1 .............L..
0x0440: 17cc 0000 0000 0000 0000 0000 0000 fff0 ................
0x0450: f517 0000 0000 0000 0000 0000 0000 0000 ................
0x0460: 0000 0000 0000 0047 8000 0000 0000 0000 .......G........
0x0470: 4000 0000 8000 0000 c008 0000 0001 0000 @...............
0x0480: 000a fff0 fb9c fff0 2dd4 fff0 2d98 fff0 ........-...-...
0x0490: 2ef0 fff0 3106 fff0 32c6 fff0 2d9c fff1 ....1...2...-...
0x04a0: 1b6c 0000 0001 0000 0000 0000 0001 fff1 .l..............
0x04b0: 1dac fff1 1b30 0000 0000 ffff ffff fff0 .....0..........
0x04c0: 27ec fff0 285a fff0 2890 fff0 2374 fff0 '...(Z..(...#t..
0x04d0: 23ce fff0 23d0 0000 0000 0000 0000 0000 #...#...........
0x04e0: 0000 1200 0000 0000 2500 0000 0000 0000 ........%.......
0x04f0: 0000 0300 0000 0000 0000 0000 c350 0000 .............P..
0x0500: c350 fff0 fa15 fff0 fa1d fff0 f9e2 fff0 .P..............
0x0510: f9ed fff0 f9fb fff0 fa06 fff0 fa14 fff0 ................
0x0520: fa1c 0000 0000 6382 5363 0000 0400 6469 ......c.Sc....di
0x0530: 736b 206c 6162 656c 2063 6f72 7275 7074 sk.label.corrupt
0x0540: 6564 006e 6f20 6469 736b 206c 6162 656c ed.no.disk.label
0x0550: 0000 0000 0001 ffff ffff ffff ffff ffff ................
0x0560: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0570: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0580: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0590: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x05a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x05b0: 0000 0000 0000 ffff ff00 ffff ffff ffff ................
0x05c0: 0000 fff4 34d0 ....4.
01:14:13.290966 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 46
0x0000: f8f8 0300 0000 0608 0609 0300 0000 0000 ................
0x0010: 0003 05b4 4850 5333 3030 2020 2020 2020 ....HPS300......
0x0020: 2020 2020 2020 2020 0953 5953 5f55 .........SYS_U
==> SYS_UBOOT has been xfered, and then the loaded bootloader starts here
01:14:19.693754 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 08:00:09:27:86:a7, length 300
01:14:19.694144 IP 192.168.20.1.67 > 192.168.20.29.68: BOOTP/DHCP, Reply, length 300
==> The loaded NetBSD/hp300 bootloader gets its IP address via BOOTP/DHCP
01:14:19.797818 ARP, Request who-has 192.168.20.1 tell 192.168.20.29, length 50
01:14:19.797829 ARP, Reply 192.168.20.1 is-at 00:e0:4c:68:02:38, length 28
01:14:19.799021 IP 192.168.20.29.1023 > 192.168.20.1.111: UDP, length 76
01:14:19.799088 IP 192.168.20.1.111 > 192.168.20.29.1023: UDP, length 28
01:14:19.800629 IP 192.168.20.29.1023 > 192.168.20.1.1008: UDP, length 92
01:14:19.800795 IP 192.168.20.1.1008 > 192.168.20.29.1023: UDP, length 68
01:14:19.803201 IP 192.168.20.29.1023 > 192.168.20.1.111: UDP, length 76
01:14:19.803249 IP 192.168.20.1.111 > 192.168.20.29.1023: UDP, length 28
==> The bootloader tries to mount the server's directory via NFS
01:14:19.804862 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 4 104 lookup fh 18,0/74402693 "netbsd"
01:14:19.804908 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 4 reply ok 236 lookup fh 18,0/74394689
==> The bootloader looks up "netbsd" as a kernel to be loaded
01:14:19.809743 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 5 104 read fh 18,0/74394689 1024 bytes @ 0
01:14:19.809810 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 5 reply ok 1152 read
01:14:19.820229 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 6 104 read fh 18,0/74394689 1024 bytes @ 1024
01:14:19.820274 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 6 reply ok 1152 read
:
==> The bootloader loads the "netbsd" kernel file
I should update netboot descriptions in www.NetBSD.org page,
but maybe you have to check the following settings on your Pi server:
BTW, it would be nice to try Ebihara-san's NetBSD/evbarm image on your Pi
(so that I don't have to investigate Linux specific server settings :-)
https://mail-index.netbsd.org/port-arm/2025/12/02/msg009481.html
1) /etc/exports file to specify NFS root dir to be exported like:
```
/nfsroot -maproot=root:wheel
```
(the directory name should be replaced per your settings)
2) /etc/rc.conf file to start necessary daemons:
```
rpcbind=YES rpcbind_flags="-l" # -l logs libwrap
mountd=YES mountd_flags="" # NFS mount requests daemon
nfs_server=YES # enable server daemons
dhcpd=YES dhcpd_flags=""
```
3) /etc/dhcpd.conf to start dhcpd (maybe your settings are ok):
```
ddns-update-style none;
default-lease-time 600;
max-lease-time 28000;
subnet 192.168.20.0 netmask 255.255.255.0 {
server-name="192.168.20.1";
next-server 192.168.20.1;
range dynamic-bootp 192.168.20.200 192.168.20.220;
option broadcast-address 192.168.20.255;
option routers 192.168.20.1;
}
host hp425t {
use-host-decl-names off;
hardware ethernet 08:00:09:27:86:a7;
fixed-address 192.168.20.29;
server-name "server-name";
option root-path "/nfsroot";
}
```
or so.
You can also check NFS export settings on your Pi server by
"showmount -e" command (at least on NetBSD) like:
```
# showmount -e
Exports list on local host:
/nfsroot hp425t
```
Thanks,
---
Izumi Tsutsui
Home |
Main Index |
Thread Index |
Old Index