I tried to activate with these commands, as well as with znetconf but that was 
still not successful. After installing the most recent patches, the kernel is 
now on 2.6.32.59, the ccwgroup device 0.0.efac is activated during boot. Since 
it's now active we can test the new CCL once again.

The funny thing is we are upgrading, from SLES9 to SLES11, just to have a 
supported version before we migrate to a new CPU. But indeed, the installed 
SLES11 level was not the most recent.

Since it's an OSN it must be layer2. Even more so, files portname, portno and 
layer2 are not available in /sys/bus/ccwgroup/drivers/qeth/0.0.efac/. But it 
looks like that's the same in SLES9. During boot there is no comment about that 
on SLES9, on SLES11 udev complains about these rules.

Thanks to all,
Regards, Berry.

> Updating the kernel would be the most appropriate way, of course.
> Upgrading to a supported version of SLES is another, even better way.  :)
>
> Activating an OSA manually is certainly a choice you can make, but not one I
> would recommend.  However:
> echo 0.0.efac,0.0.efad,0.0.efad > /sys/bus/ccwgroup/drivers/qeth/group
> udevadm settle
>
> If /sys/bus/ccwgroup/drivers/qeth/0.0.efac already exists, those two
> commands can be skipped.
>
> Not having such hardware to test with, I don't know if it needs to be in Layer
> 2 mode or Layer 3.
> For Layer 2:
> echo 1 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/layer2
> For Layer 3:
> echo 0 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/layer2
>
> Followed by:
> echo 1 > /sys/bus/ccwgroup/drivers/qeth/0.0.efac/online
>





Dit bericht is vertrouwelijk en kan geheime informatie bevatten enkel bestemd 
voor de geadresseerde. Indien dit bericht niet voor u is bestemd, verzoeken wij 
u dit onmiddellijk aan ons te melden en het bericht te vernietigen. Aangezien 
de integriteit van het bericht niet veilig gesteld is middels verzending via 
internet, kan Atos Nederland B.V. niet aansprakelijk worden gehouden voor de 
inhoud daarvan. Hoewel wij ons inspannen een virusvrij netwerk te hanteren, 
geven wij geen enkele garantie dat dit bericht virusvrij is, noch aanvaarden 
wij enige aansprakelijkheid voor de mogelijke aanwezigheid van een virus in dit 
bericht. Op al onze rechtsverhoudingen, aanbiedingen en overeenkomsten 
waaronder Atos Nederland B.V. goederen en/of diensten levert zijn met 
uitsluiting van alle andere voorwaarden de Leveringsvoorwaarden van Atos 
Nederland B.V. van toepassing. Deze worden u op aanvraag direct kosteloos 
toegezonden.

This e-mail and the documents attached are confidential and intended solely for 
the addressee; it may also be privileged. If you receive this e-mail in error, 
please notify the sender immediately and destroy it. As its integrity cannot be 
secured on the Internet, the Atos Nederland B.V. group liability cannot be 
triggered for the message content. Although the sender endeavours to maintain a 
computer virus-free network, the sender does not warrant that this transmission 
is virus-free and will not be liable for any damages resulting from any virus 
transmitted. On all offers and agreements under which Atos Nederland B.V. 
supplies goods and/or services of whatever nature, the Terms of Delivery from 
Atos Nederland B.V. exclusively apply. The Terms of Delivery shall be promptly 
submitted to you on your request.

Atos Nederland B.V. / Utrecht
KvK Utrecht 30132762

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to