Hi

So that does look like an older version of tcpborphserver - if my history
is correct, that version doesn't even have a ?progremote command yet,
though it should have an ?upload command which does something similar.

I suppose you could run ?status or ?fpgastatus to confirm that the fpga
hasn't been programmed or try to run ?upload port filename (and a second
netcat connection to that port parameter, like ftp does it) to attempt an
upload by hand, but I suspect it would be easier to find a newer filesystem
image.

Hopefully the wiki's or somebody else can point you at the authoritative
new version of the romfs (or nfs image) - while there are several images in
one of the ska-sa repositories on github, it is probably best to pick the
one the community is using.

regards

marc






On Sat, Apr 1, 2023 at 6:15 PM Austin Dymont <[email protected]> wrote:

> Hi Marc,Thanks for the rapid response. Here's the log-lvl info. Trying
> 192.168.4.20...Connected to 192.168.4.20.Escape character is '^]'.#version
> memcpy-88-g38ad77a-dirty#build-state 2013-04-11T11:50:43?log-level
> debug!log-level ok debug#log info 1133318717282 raw
> new\_client\_co ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
> ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌
>
> <https://za.report.cybergraph.mimecast.com/alert-details/?dep=wyezVTpwtzojBu2qCXQK0g%3D%3DjTazUDg73xU3GUzq9DFKa8wUK5TzvWw855asR5hplkKt7tTxmCHgIcuQM%2BlEfdIgTMgdaE1Ee65xzN0J291tZBnDuUaRIu0Km19uXiqByD4Mq0bvLWYVM5abUXE377l5YJfDmh5Tm4w7VfPfDmibUZ51QQOpLnH0YyxMAyQ4azc%2FTdi6hgjel1wRCljQXTuy9B9n6VMgdYqEGR6uDh75SMLf7FpOf9vb1gapRwKZs2fM8Sopl%2Bh5BMeZlQehjlbmUBbBIlf0BFWt2ub350UIAqNVHajZI1L1HZg3QT8MW5wGXbTcBjxaGQl7gUpaa%2FZbczxqvlrDf09r6tqTeWMri2l6n2sganGy%2FMTHHOWHkIdgim5%2FDdf%2BJDbKNq312qkGPCEtKD8Wmu9umx0rFCkfTosQx%2B%2F%2FIizOe7bslkZLMed3Xqui7XSDNnooksqAfRMYqW8zdvPxRygKu7JIRR4k0qyhGQej1wHlZnQyNQWxzONmsLWErZxKogaLFX4ol13KDizwBM2obKv%2B1qz3Dx5cE62beAX%2B8Dp4WzOrZhgItdoXKtD1eYWmKVy29SF9QNI%2BnKWKluHumD197aGXLrVpNx16h92dNdbrf7hCib4JgCu%2BTWrzFdd7%2F0OgBsrn5XCDsX0Bts3pnhEpY0JAvOuDmYbKNrbuxbKTpaUOtaxmFro%3D>
> Hi Marc,
>
> Thanks for the rapid response. Here's the log-lvl info.
>
> Trying 192.168.4.20...
> Connected to 192.168.4.20.
> Escape character is '^]'.
> #version memcpy-88-g38ad77a-dirty
> #build-state 2013-04-11T11:50:43
> ?log-level debug
> !log-level ok debug
> #log info 1133318717282 raw new\_client\_connection\_192.168.4.1:38120
> #client-connected 192.168.4.1:38120
> #log info 1133318717284 raw received\_end\_of\_file\_from\_
> 192.168.4.1:38120
> #client-disconnected 192.168.4.1:38120
> #log info 1133318717286 raw new\_client\_connection\_192.168.4.1:38128
> #client-connected 192.168.4.1:38128
> #log debug 1133318717287 raw client\_message\_<?watchdog>
> #log debug 1133318717289 raw client\_message\_<?read\_sys_board_id\_0\_4>
> #log error 1133318717289 raw fpga\_not\_programmed
> #log debug 1133318717291 raw client\_message\_<?read\_sys_board_id\_0\_4>
> #log error 1133318717291 raw fpga\_not\_programmed
> #log debug 1133318718295 raw client\_message\_<?progremote\_2477>
> #log info 1133318718356 raw received\_end\_of\_file\_from\_
> 192.168.4.1:38128
> #client-disconnected 192.168.4.1:38128
>
>
> Austin
>
> ------------------------------
> *From:* [email protected] <[email protected]> on behalf
> of Marc <[email protected]>
> *Sent:* Friday, March 31, 2023 2:25 PM
> *To:* [email protected] <[email protected]>
> *Subject:* Re: [casper] Roach2 progremote error & CASPER slack account
>
>
>
> On Fri, Mar 31, 2023 at 6:38 PM Austin Dymont <[email protected]>
> wrote:
>
> Hello,
>
>
> Hi
>
>
> My name is Austin Dymont, a new graduate student at the University of
> Chicago. I'm in need some help regarding the setup of a ROACH2. I'm running
> into an issue with programming the roach with a new .fpg file. I followed
> through with some of the intro tutorial from the toolflow
> <https://urldefense.com/v3/__https://casper-toolflow.readthedocs.io/projects/tutorials/en/latest/tutorials/roach/tut_intro.html__;!!BpyFHLRN4TMTrA!8OYiZDPnURC6x21rOpZx_aDihMamA4soZmByl42UEXnkDB_XfGaMSBHzm-LdlGx7fRtZ8miLhlOICYWTGg$>.
> The tutorial was able to connect to the ROACH2 and begin talking to it,
> checked by pinging and the is_connected() returned true. It errored when it
> tried to run progremote.
>
> INFO:192.168.X.XX:192.168.X.XX: uploading 
> tutorial/roach2/tut_intro/roach2_tut_intro.fpg, programming when done
> <class 'RuntimeError'>
> ('progremote request(Request to client 192.168.X.XX failed.) on host 
> 192.168.X.XX failed',))
>
>
>
>  If you telnet (or nc) to the roach on port 7147 while you do this, there
> might be some messages telling us a bit more. And if you type
>
> ?log-level debug
>
> on that connection, you might get more detailed feedback. Let us know what
> you see and hopefully we can point you in the right direction.
>
> On that connection you could also try to program fpg files by hand, though
> that will involve a second netcat - it works in a similar way to ftp.
>
> Regarding the uboot prompt: There are standalone tftp servers as well as
> one part of dnsmasq, and if you do a printenv at the uboot prompt you can
> see what those run macros expand to, so you could run the tftp get by hand
> too...
>
> I'd put off reflashing uboot until later, if that goes wrong then it
> becomes quite a bit more tricky to recover
>
> regards
>
> marc
>
>
>
> *Disclaimer*
>
> The information contained in this communication from the sender is
> confidential. It is intended solely for use by the recipient and others
> authorized to receive it. If you are not the recipient, you are hereby
> notified that any disclosure, copying, distribution or taking action in
> relation of the contents of this information is strictly prohibited and may
> be unlawful.
>
> This email has been scanned for viruses and malware, and may have been
> automatically archived by Mimecast, a leader in email security and cyber
> resilience. Mimecast integrates email defenses with brand protection,
> security awareness training, web security, compliance and other essential
> capabilities. Mimecast helps protect large and small organizations from
> malicious activity, human error and technology failure; and to lead the
> movement toward building a more resilient world. To find out more, visit
> our website.
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/lists.berkeley.edu/d/msgid/casper/CAGrhWaQwk7K13uhoT%3DTbnuc26%3DjWMZU6Ybe-wcO3zhzhjQ5oyw%40mail.gmail.com
> <https://urldefense.com/v3/__https://groups.google.com/a/lists.berkeley.edu/d/msgid/casper/CAGrhWaQwk7K13uhoT*3DTbnuc26*3DjWMZU6Ybe-wcO3zhzhjQ5oyw*40mail.gmail.com?utm_medium=email&utm_source=footer__;JSUl!!BpyFHLRN4TMTrA!8OYiZDPnURC6x21rOpZx_aDihMamA4soZmByl42UEXnkDB_XfGaMSBHzm-LdlGx7fRtZ8miLhlPQaHR0fw$>
> .
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/lists.berkeley.edu/d/msgid/casper/IA1PR11MB649223A91ACB0955D1A018ABD98C9%40IA1PR11MB6492.namprd11.prod.outlook.com
> <https://groups.google.com/a/lists.berkeley.edu/d/msgid/casper/IA1PR11MB649223A91ACB0955D1A018ABD98C9%40IA1PR11MB6492.namprd11.prod.outlook.com?utm_medium=email&utm_source=footer>
> .
>

Disclaimer

The information contained in this communication from the sender is 
confidential. It is intended solely for use by the recipient and others 
authorized to receive it. If you are not the recipient, you are hereby notified 
that any disclosure, copying, distribution or taking action in relation of the 
contents of this information is strictly prohibited and may be unlawful.

This email has been scanned for viruses and malware, and may have been 
automatically archived by Mimecast, a leader in email security and cyber 
resilience. Mimecast integrates email defenses with brand protection, security 
awareness training, web security, compliance and other essential capabilities. 
Mimecast helps protect large and small organizations from malicious activity, 
human error and technology failure; and to lead the movement toward building a 
more resilient world. To find out more, visit our website.

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/lists.berkeley.edu/d/msgid/casper/CAGrhWaTRgfW6KEm22_vhTUBtoYPavx%3DoE1wC4dRjCeaV4f0u5Q%40mail.gmail.com.

Reply via email to