I tried to activate with these commands, as well as with znetconf but that was still not successful. After installing the most recent patches, the kernel is now on 2.6.32.59, the ccwgroup device 0.0.efac is activated during boot. Since it's now active we can test the new CCL once again.
The funny thing is we are upgrading, from SLES9 to SLES11, just to have a supported version before we migrate to a new CPU. But indeed, the installed SLES11 level was not the most recent. Since it's an OSN it must be layer2. Even more so, files portname, portno and layer2 are not available in /sys/bus/ccwgroup/drivers/qeth/0.0.efac/. But it looks like that's the same in SLES9. During boot there is no comment about that on SLES9, on SLES11 udev complains about these rules. Thanks to all, Regards, Berry. > Updating the kernel would be the most appropriate way, of course. > Upgrading to a supported version of SLES is another, even better way. :) > > Activating an OSA manually is certainly a choice you can make, but not one I > would recommend. However: > echo 0.0.efac,0.0.efad,0.0.efad > /sys/bus/ccwgroup/drivers/qeth/group > udevadm settle > > If /sys/bus/ccwgroup/drivers/qeth/0.0.efac already exists, those two > commands can be skipped. > > Not having such hardware to test with, I don't know if it needs to be in Layer > 2 mode or Layer 3. > For Layer 2: > echo 1 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/layer2 > For Layer 3: > echo 0 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/layer2 > > Followed by: > echo 1 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/online > Dit bericht is vertrouwelijk en kan geheime informatie bevatten enkel bestemd voor de geadresseerde. Indien dit bericht niet voor u is bestemd, verzoeken wij u dit onmiddellijk aan ons te melden en het bericht te vernietigen. Aangezien de integriteit van het bericht niet veilig gesteld is middels verzending via internet, kan Atos Nederland B.V. niet aansprakelijk worden gehouden voor de inhoud daarvan. Hoewel wij ons inspannen een virusvrij netwerk te hanteren, geven wij geen enkele garantie dat dit bericht virusvrij is, noch aanvaarden wij enige aansprakelijkheid voor de mogelijke aanwezigheid van een virus in dit bericht. Op al onze rechtsverhoudingen, aanbiedingen en overeenkomsten waaronder Atos Nederland B.V. goederen en/of diensten levert zijn met uitsluiting van alle andere voorwaarden de Leveringsvoorwaarden van Atos Nederland B.V. van toepassing. Deze worden u op aanvraag direct kosteloos toegezonden. This e-mail and the documents attached are confidential and intended solely for the addressee; it may also be privileged. If you receive this e-mail in error, please notify the sender immediately and destroy it. As its integrity cannot be secured on the Internet, the Atos Nederland B.V. group liability cannot be triggered for the message content. Although the sender endeavours to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted. On all offers and agreements under which Atos Nederland B.V. supplies goods and/or services of whatever nature, the Terms of Delivery from Atos Nederland B.V. exclusively apply. The Terms of Delivery shall be promptly submitted to you on your request. Atos Nederland B.V. / Utrecht KvK Utrecht 30132762 ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390 ---------------------------------------------------------------------- For more information on Linux on System z, visit http://wiki.linuxvm.org/
