Error in getting dual image active image configuration

ASUS KRPA-U16 not working with EPYC 7D13 (100-000000322) zedei New Member rootwyrm Member zedei New Member RolloZ170 Well-Known Member RageBone Active Member rootwyrm Member You are correct (I can’t say exactly which, because it does vary by BIOS.) It will also indicate PSB fuse trip if you have the appropriate hookups (Asus board doesn’t […]

Содержание

  1. ASUS KRPA-U16 not working with EPYC 7D13 (100-000000322)
  2. zedei
  3. rootwyrm
  4. zedei
  5. RolloZ170
  6. RageBone
  7. rootwyrm
  8. RageBone
  9. ExecutableFix
  10. NablaSquaredG
  11. ExecutableFix
  12. RageBone
  13. zedei
  14. rootwyrm
  15. zedei
  16. zedei
  17. zedei
  18. RageBone
  19. Docker error pulling image configuration #2167
  20. Comments
  21. Expected behavior
  22. Actual behavior
  23. Information
  24. docker pull failed with error pulling image configuration and X.509 cert #23356
  25. Comments
  26. error pulling image configuration #27911
  27. Comments

ASUS KRPA-U16 not working with EPYC 7D13 (100-000000322)

zedei

New Member

rootwyrm

Member

zedei

New Member

RolloZ170

Well-Known Member

RageBone

Active Member

rootwyrm

Member

You are correct (I can’t say exactly which, because it does vary by BIOS.) It will also indicate PSB fuse trip if you have the appropriate hookups (Asus board doesn’t though.) The 7D13 is, as I said, a low-power contract customer part with a unique SKU and unique microcode. Which is literally all the information I or anyone else has on it to date. This may in fact, be the first sample to be found in the wild at all.

And honestly, even I don’t know that I could get it working based on that. AGESA’s signed, and even attempting to run any variant microcode would require breaking seal. With the right board you could load some special pieces into the BIOS, but that’s no guarantee the CPUIDs even present. And retail boards literally can’t do it — it’s more than just using SPI to write the BIOS, even without PSB enable.

RageBone

Active Member

@rootwyrm i understand what you are saying but some things don’t make sense to from your choice of words.

What Hookups do you mean that the krpa is supposed to not have?

And what do you mean with «seal» and breaking it?

you are specifically mentioning signatures previously so i think you mean something else?

Are you talking about very specific pieces of «something» or are you just generalizing?
And what is «the right board» to you?
Do you mean the Reference Boards?

ExecutableFix

Active Member

I owned a 7D12 for a while and ran it in my home system. It does NOT require a custom microcode (in fact, none of the custom SKUs do because they share the same stepping as retail parts) and it was not vendor locked. A SKU is only vendor locked if it has previously been installed in a Dell or HP system. These SKUs are not meant for HP or Dell, so there’s no factory lock applied to them.

The 7D12 only has 4 memory channels which indicates it was made for a specific board. It will still work on normal boards, but the memory has to be in the right slots, which is why you need to try to boot it with one DIMM first. My guess would be that the same applies to the 7D13.

NablaSquaredG

Well-Known Member

ExecutableFix

Active Member

RageBone

Active Member

I was told HP does it their own undisclosed «proprietary» way.
Lenovo and Dell use PSB to lock CPUs.

Again in case of a PSB Lock, it is expected that Post gets stuck at a code from 78 to 7F.
78 was observed to be the code, as far as the crystal ball states, it should be code 7D, it isn’t, don’t ask me why.

At this point in time, we simply don’t know enough and i can only hope that the OP starts delivering, for example postcodes.

If it is a new stepping compared to retail Milan, i am certain that it needs additional microcode which likely isn’t included.

If one were to have a bios meant for those CPUs, we could look further into it.

zedei

New Member

rootwyrm

Member

Actually, every ODM and OEM has the capability to use PSB fusing. And HP actually does use PSB fusing. Hell, I use PSB fusing. The difference is that HP and everyone who isn’t the giant bag of dicks that is Dell uses a different PSB method which does not lock the CPU to a specific motherboard. There’s a general outline of some of the pieces involved in the AMD public SEV API Specification under the Platform Management section.

Quoth HP: «HPE does not use the same security technique that Dell is using for a BIOS hardware root of trust. HPE does not burn, fuse, or permanently store our public key into AMD processors which ship with our products. HPE uses a unique approach to authenticate our BIOS and BMC firmware: HPE fuses our hardware – or silicon – root of trust into our own BMC silicon to ensure only authenticated firmware is executed. Thus, while we implement a hardware root of trust for our BIOS and BMC firmware, the processors that ship with our servers are not locked to our platforms.«

Translation:
HPE places the fusing on their side of the equation — the BMC — instead of burning their key into the processor and turning it into a fancy paperweight. Since the processor isn’t generally an information sensitive component anyways, so resale carries minimal to zero security risk. (BMC compromise, however, is high risk as it contains passwords, authentication, and network information even when power is removed. And can intercept a hell of a lot on a running system to say the least.)
This is why an HPE sourced CPU works in anything. HPE’s BMC confirms the AMD public key against an HPE managed root of trust. As long as the processor is genuine and hasn’t been tampered with? HPE’s cool with it. CPU side keys aren’t kosher? Board may brick. Tamper with the BMC to alter, say, just the HPE logo on the login screen? Board will brick. Board went and bricked? Take your $16000 of CPUs, move them to a new $800 board, and you’re back in business.

On the OEM/SI side, it’s about the same. Because seriously, bricking a CPU just to screw over customers is nothing but a dick move and par for the course with Dell EMC. And you can hypothetically set the CPU side PSB eFuse without locking it to a specific vendor’s specific model with a specific serial number. But it makes a LOT more sense from not only a cost but a serviceability perspective to brick the much more failure prone system planar when the ARKs don’t line up than it does to brick a CPU because of a BMC firmware flash failure. And it’s a hell of a lot cheaper too.

«Wait, what? Then why doesn’t Dell do that
Because Dell’s ethical standards are basically ‘anything that makes Mikey a few extra bucks might get you not fired.’ There’s a reason Intel has consistently called them the best friend money can buy. That’s exactly the kind of company they are. If they can use deliberate bricking to ‘justify’ charging you three times as much on disservice contracts because «well we have to replace the CPUs every time too»? They’ll try and find some way to make the bricked CPUs your fault at the same time.

Decode should be:

  • Reset of external IDE/SATA (though I wonder if it may be inverted 0x1A which is DXE boot service)
  • Begin CPU transition to normal mode
  • Application processor pre-microcode
  • Memory initialization failure (retry possible)
  • Unrecoverable DXE failure in microcode/firmware load — should be specifically unable to load from the board ROM side
  • Aaaaaaand the board tries to boot with the CPU still in real mode after an unrecoverable DXE failure. Are you serious with this Asus? Sigh.

Note that this assumes Asus didn’t completely mangle Aptio and just decide to make up all their own UEFI->80h status codes with no relation to reality. But the likelihood of that is basically nil. I presume that the system has zero display output, so that puts it into needing a BIOS with debugging PEIMs (probably don’t have space anyway, looks to be a 64Mbit) and a JTAG (no headers present) or AMI Debug.

edit: should clarify, because it’s a 2-digit and not full UEFI code, DE can only be interpreted as a ‘generalized DXE microcode/firmware load failure.’ There isn’t enough information to identify if it is IOD, CCX, or peripheral.

zedei

New Member

zedei

New Member

zedei

New Member

Since this is an endless loop, I didn’t note the starting code. Here are some codes that come before the loop:
15
C2
C8
63
21
dE
Ad
A1
34
02
50
dE etc. etc.

So it seems the last code of the cycle is 50: Memory initialization error and then it begins again with dE (whatever that means).
I have tried with different memory sticks (that work fine when the 7742 CPU is installed).

RageBone

Active Member

As far as i can see, the codes asus provides are bonkers.

Experience for instance shows that without any ram installed, you get stuck at postcode 10 and nothing else.
Expected would be something in the 50s for memory issues, likely 53 or 55 from what i remember from AMI on x99.

Additionally, postcodes on Epyc seem to not be ordered «deterministic», i’d say.
On my H11ssl, code 55 returns multiple times.
According to my crystal ball, it stands for an SMBus Transaction collision.
The crystal ball also seems to mainly contain error codes, which seems weird to me but i have not found anything better yet.

Postcode 15 seems to appear instead of code 10 when you have any memory installed.
till and including code 50, everything looks familiar to me.
I will take a closes look at my board tomorrow.
Crystal Ball interprets 50 as a failure to claim ownership of SMB.
Additionally, the previous 02 can be interpreted as a generic memory error.

What i can say so far is that you don’t appear to have the usual CPU incompatibility issues that we have experienced with for instance ES CPUs of A0 steppings.
Such issues would likely manifest in D0 or D1
Your system also does not quickly jump and stay at 02 which could be serious PSP-BL failure.
So i’m sorry that this isn’t more then a guessing game at this point.

Источник

Docker error pulling image configuration #2167

Expected behavior

The image should be successfully pulled.

Actual behavior

mac_mini4:abcd mac-mini-4$ docker pull node
Using default tag: latest
latest: Pulling from library/node
85b1f47fba49: Pulling fs layer
5409e9a7fa9e: Pulling fs layer
661393707836: Pulling fs layer
1bb98c08d57e: Waiting
f957ac1b6e47: Waiting
166b7c18b759: Waiting
02cb65a8d0f6: Waiting
9052b6207e12: Waiting
error pulling image configuration: Get https://dseasb33srnrn.cloudfront.net/registry-v2/docker/registry/v2/blobs/sha256/ba/badd967af535567f92c04665ccbf4ccf63f58960e38a43f611b1b19ca3a713e7/data?Expires=1508747774&Signature=itXcTt8IGLoxsACN4OJMgmRgUfrEOE3i9J6g8ooOV9AANUAQgXnJb6Rme48DxjzCLTWnKKLQqASNNa2fNuxCCy9X6qVSBZGazxNktOwWe70fjIqR5ojTQG5GtaZUsoL0k6we

gPQXKMIBdZfGu33YeMPD7CymCow4Ww4dwwvPgo_&Key-Pair-Id=APKAJECH5M7VWIS5YZ6Q: dial tcp 192.168.65.1:443: getsockopt: connection refused
mac_mini4:abcd mac-mini-4$

Occurs with other images too..

Information

  • OS : MacOS Seirra 10.12.6
  • Docker Version 17.09.0-ce-mac35 (19611) Channel: stable a98b7c1b7c
  • When I try to pull any images I get the above Behaviour
  • What I have tried?
    a) Added dns under daemon tab of docker . «dns» : [ «8.8.8.8», «8.8.4.4» ]
    b) Added DNS Servers «8.8.8.8» and «8.8.4.4» under Network Preferences -> Advanced -> DNS tab
  • Images: https://ibb.co/n2zCVm and https://ibb.co/g6HcwR

I checked some other posts and saw some users facing this similar issue. But they could resolve it just by setting up the DNS servers to 8.8.8.8, which unfortunately not working for me.
Can anyone please help?

What could be possibly wrong here in my steps? PS*: new to Docker here.
If you think I have not provided enough information, please let me know. I will update accordingly.

The text was updated successfully, but these errors were encountered:

Источник

docker pull failed with error pulling image configuration and X.509 cert #23356

Steps to reproduce the issue:
docker pull cirros

docker pull busybox

The text was updated successfully, but these errors were encountered:

I have a hint for you: possibly you are working under proxy(enterprise environment).
I hit your problem when I worked in corp, but no problem in home.

This is resolved. Steps taken are

  • Obtain a crt from the https://dseasb33srnrn.cloudfront.net with openssl
  • Copy the crt to /etc/share/ca-certificates (Ubuntu)
  • Restart docker

I am facing the same issue, can u please let us know what exactly you have done to solve it .

thanks @jianghaitao fixed for me! Debian 8 Docker 1.12, Docker-compose 1.8.0

@jianghaitao
Could you help to provide the command for how to get the crt from the https://dseasb33srnrn.cloudfront.net with openssl?

@davesliu openssl s_client -connect dseasb33srnrn.cloudfront.net:443

Hello, thanks a lot, I was facing the same issue with docker and finally solved it with your help.
Full command list used is here (note this is for Ubuntu 16.04)

$ proxytunnel -p proxyhost:8080 -P proxyuser:proxypwd -d dseasb33srnrn.cloudfront.net:443 -a 7000 —verbose & echo -n | openssl s_client -connect localhost:7000 | sed -ne ‘/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p’ > ./cloudfront.crt

proxyhost = IP for your corporation proxy server
proxyuser = user used to connect thru proxy
proxypwd = proxyuser password

This command creates a proxytunnel with clean credentials and creates a daemon on port 7000 in your localhost.
After that you run the openssl s_client command to connect on localhost:7000 and finally extract certificate data to a .crt file in your

Finally copy .crt file to certificates store
$ sudo cp cloudfront.crt /usr/local/share/ca-certificates/

And update certificates
$ sudo update-ca-certificates

Источник

error pulling image configuration #27911

I have a fresh new win2K16 with containers enabled as well as hyper-v is turned on. Whenever I tru to issue the tes cmmand as indicated to test (firewal disabled, no proxy. )
docker pull microsoft/windowsservercore:10.0.14393.321
I get
error pulling image configuration: Get https://dseasb33srnrn.cloudfront.net/registry-v2/docker/registry/v2/blobs/sha256/
93/93a9c37b36d03323f7b8fdd7f0302f7e487a0e8b31ccd8e689c40a404d2f1ea9/data?Expires=1477932342&Signature=N2NdygkaXM6YfVCvXm
TpzD1vDn6k-P50sruyKW21-iVgVdMNwwLUGS0vN2E2ocHrBXowghRgtWX214AcQ5TWo7AqfufXTfsMU9s3TLQV8ed9-dFAXjC5QMImgTmC8Ef0NsQ26s6E
tgiWxvm6XJqV8txihfUO46BOuN-n3Lyfs_&Key-Pair-Id=APKAJECH5M7VWIS5YZ6Q: dial tcp 52.85.221.56:443: i/o timeout
Thanks

error pulling image configuration

Steps to reproduce the issue:

  1. docker pull microsoft/windowsservercore:10.0.14393.321

error pulling image configuration: Get https://dseasb33srnrn.cloudfront.net/registry-v2/docker/registry/v2/blobs/sha256/
93/93a9c37b36d03323f7b8fdd7f0302f7e487a0e8b31ccd8e689c40a404d2f1ea9/data?Expires=1477932342&Signature=N2NdygkaXM6YfVCvXm
TpzD1vDn6k-P50sruyKW21-iVgVdMNwwLUGS0vN2E2ocHrBXowghRgtWX214AcQ5TWo7AqfufXTfsMU9s3TLQV8ed9-dFAXjC5QMImgTmC8Ef0NsQ26s6E
tgiWxvm6XJqV8txihfUO46BOuN-n3Lyfs_&Key-Pair-Id=APKAJECH5M7VWIS5YZ6Q: dial tcp 52.85.221.56:443: i/o timeout

I expexted a container to ve created

Additional information you deem important (e.g. issue happens only occasionally):

Output of docker version :

Containers: 0
Running: 0
Paused: 0
Stopped: 0
Images: 0
Server Version: 1.12.2-cs2-ws-beta
Storage Driver: windowsfilter
Windows:
Logging Driver: json-file
Plugins:
Volume: local
Network: nat null overlay
Swarm: inactive
Default Isolation: process
Kernel Version: 10.0 14393 (14393.351.amd64fre.rs1_release_inmarket.161014-1755)
Operating System: Windows Server 2016 Standard
OSType: windows
Architecture: x86_64
CPUs: 1
Total Memory: 2 GiB
Name: ProdWebServer
ID: EAFQ:W3YV:HIXM:GWRN:WFJK:6TCQ:HEKP:AX6O:CESU:BQ2G:QLEP:OL3O
Docker Root Dir: C:ProgramDatadocker
Debug Mode (client): false
Debug Mode (server): false
Registry: https://index.docker.io/v1/
Insecure Registries:
127.0.0.0/8
Live Restore Enabled: false«`

Additional environment details (AWS, VirtualBox, physical, etc.):

The text was updated successfully, but these errors were encountered:

Источник

  • #1

My ASUS KRPA-U16 motherboard is working fine with EPYC ROME 7742. I upgraded the BIOS to both ROME and MILAN latest versions using BMC web ui. Upon installing the EPYC 7D13 processor it does not POST. If I replace the CPU with the original 7742 is works again.
It’s hard to find any info on this 7D13 processor. AMD tech support doesn’t even know what it is. lol.

  • #2

The 7D13 is a low power variant of the 7V13, both of which are contract customer CPUs. Not OEM-only — contract customer only. You would have to extract the signed AGESA including the signature from the source system board. And the 7D13 variant has extremely specific microcode.

  • #4

It’s hard to find any info on this 7D13 processor. AMD tech support doesn’t even know what it is.

7D13 is imho the MILAN pendant of the ROME 7D12. DELL OEM, preinstalled in datacenter servers (replaced by customers need) and vendor locked then.

  • #5

7D13 is imho the MILAN pendant of the ROME 7D12. DELL OEM, preinstalled in datacenter servers (replaced by customers need) and vendor locked then.

PSB Locks cause a Postcode in the 78 to 7F Range if i remember correctly.
Anything else is not caused by a vendor-lock.
Missing microcode is the most reasonable explanation in my opinion.
Especially if those CPU are indeed of a different stepping then retail.

  • #6

PSB Locks cause a Postcode in the 78 to 7F Range if i remember correctly.
Anything else is not caused by a vendor-lock.
Missing microcode is the most reasonable explanation in my opinion.
Especially if those CPU are indeed of a different stepping then retail.

You are correct (I can’t say exactly which, because it does vary by BIOS.) It will also indicate PSB fuse trip if you have the appropriate hookups (Asus board doesn’t though.) The 7D13 is, as I said, a low-power contract customer part with a unique SKU and unique microcode. Which is literally all the information I or anyone else has on it to date. This may in fact, be the first sample to be found in the wild at all.

And honestly, even I don’t know that I could get it working based on that. AGESA’s signed, and even attempting to run any variant microcode would require breaking seal. With the right board you could load some special pieces into the BIOS, but that’s no guarantee the CPUIDs even present. And retail boards literally can’t do it — it’s more than just using SPI to write the BIOS, even without PSB enable.

  • #7

@rootwyrm i understand what you are saying but some things don’t make sense to from your choice of words.

PSB fuse trip if you have the appropriate hookups (Asus board doesn’t though.)

What Hookups do you mean that the krpa is supposed to not have?

And what do you mean with «seal» and breaking it?

AGESA’s signed, and even attempting to run any variant microcode would require breaking seal.

you are specifically mentioning signatures previously so i think you mean something else?

Are you talking about very specific pieces of «something» or are you just generalizing?
And what is «the right board» to you?
Do you mean the Reference Boards?

With the right board you could load some special pieces into the BIOS

I kinda disagree, so far my SM H11ssl and TRX40 boards were most supportive and accepting when ****ing with them.
I guess, here it depends on the the definition of «it». What is it you mean?

And retail boards literally can’t do it

  • #8

I owned a 7D12 for a while and ran it in my home system. It does NOT require a custom microcode (in fact, none of the custom SKUs do because they share the same stepping as retail parts) and it was not vendor locked. A SKU is only vendor locked if it has previously been installed in a Dell or HP system. These SKUs are not meant for HP or Dell, so there’s no factory lock applied to them.

The 7D12 only has 4 memory channels which indicates it was made for a specific board. It will still work on normal boards, but the memory has to be in the right slots, which is why you need to try to boot it with one DIMM first. My guess would be that the same applies to the 7D13.

  • #9

A SKU is only vendor locked if it has previously been installed in a Dell or HP system. These SKUs are not meant for HP or Dell, so there’s no factory lock applied to them.

Hu? I thought HP doesn’t vendor lock. Only Dell + Lenovo?

  • #10

Hu? I thought HP doesn’t vendor lock. Only Dell + Lenovo?

Oh, I might’ve confused HP and Lenovo. I know HP has the ability to if they want

  • #11

Oh, I might’ve confused HP and Lenovo. I know HP has the ability to if they want

I was told HP does it their own undisclosed «proprietary» way.
Lenovo and Dell use PSB to lock CPUs.

Again in case of a PSB Lock, it is expected that Post gets stuck at a code from 78 to 7F.
78 was observed to be the code, as far as the crystal ball states, it should be code 7D, it isn’t, don’t ask me why.

My guess would be that the same applies to the 7D13.

At this point in time, we simply don’t know enough and i can only hope that the OP starts delivering, for example postcodes.

If it is a new stepping compared to retail Milan, i am certain that it needs additional microcode which likely isn’t included.

If one were to have a bios meant for those CPUs, we could look further into it.

  • #12

Here are the POST codes on the ASUS KRPA-U16. They go in a continuous cycle:
A1 34 02 50 dE Ad A1 34 02 50 dE Ad …

Last edited: Oct 25, 2021

  • #13

Oh, I might’ve confused HP and Lenovo. I know HP has the ability to if they want

Actually, every ODM and OEM has the capability to use PSB fusing. And HP actually does use PSB fusing. Hell, I use PSB fusing. The difference is that HP and everyone who isn’t the giant bag of dicks that is Dell uses a different PSB method which does not lock the CPU to a specific motherboard. There’s a general outline of some of the pieces involved in the AMD public SEV API Specification under the Platform Management section.

Quoth HP: «HPE does not use the same security technique that Dell is using for a BIOS hardware root of trust. HPE does not burn, fuse, or permanently store our public key into AMD processors which ship with our products. HPE uses a unique approach to authenticate our BIOS and BMC firmware: HPE fuses our hardware – or silicon – root of trust into our own BMC silicon to ensure only authenticated firmware is executed. Thus, while we implement a hardware root of trust for our BIOS and BMC firmware, the processors that ship with our servers are not locked to our platforms.«

Translation:
HPE places the fusing on their side of the equation — the BMC — instead of burning their key into the processor and turning it into a fancy paperweight. Since the processor isn’t generally an information sensitive component anyways, so resale carries minimal to zero security risk. (BMC compromise, however, is high risk as it contains passwords, authentication, and network information even when power is removed. And can intercept a hell of a lot on a running system to say the least.)
This is why an HPE sourced CPU works in anything. HPE’s BMC confirms the AMD public key against an HPE managed root of trust. As long as the processor is genuine and hasn’t been tampered with? HPE’s cool with it. CPU side keys aren’t kosher? Board may brick. Tamper with the BMC to alter, say, just the HPE logo on the login screen? Board will brick. Board went and bricked? Take your $16000 of CPUs, move them to a new $800 board, and you’re back in business.

On the OEM/SI side, it’s about the same. Because seriously, bricking a CPU just to screw over customers is nothing but a dick move and par for the course with Dell EMC. And you can hypothetically set the CPU side PSB eFuse without locking it to a specific vendor’s specific model with a specific serial number. But it makes a LOT more sense from not only a cost but a serviceability perspective to brick the much more failure prone system planar when the ARKs don’t line up than it does to brick a CPU because of a BMC firmware flash failure. And it’s a hell of a lot cheaper too.

«Wait, what? Then why doesn’t Dell do that
Because Dell’s ethical standards are basically ‘anything that makes Mikey a few extra bucks might get you not fired.’ There’s a reason Intel has consistently called them the best friend money can buy. That’s exactly the kind of company they are. If they can use deliberate bricking to ‘justify’ charging you three times as much on disservice contracts because «well we have to replace the CPUs every time too»? They’ll try and find some way to make the bricked CPUs your fault at the same time.

Here are the POST codes on the ASUS KRPA-U16. They go in a continuous cycle:
A1 34 02 50 dE Ad A1 34 02 50 dE Ad …

Decode should be:

  • Reset of external IDE/SATA (though I wonder if it may be inverted 0x1A which is DXE boot service)
  • Begin CPU transition to normal mode
  • Application processor pre-microcode
  • Memory initialization failure (retry possible)
  • Unrecoverable DXE failure in microcode/firmware load — should be specifically unable to load from the board ROM side
  • Aaaaaaand the board tries to boot with the CPU still in real mode after an unrecoverable DXE failure. Are you serious with this Asus? Sigh.

Note that this assumes Asus didn’t completely mangle Aptio and just decide to make up all their own UEFI->80h status codes with no relation to reality. But the likelihood of that is basically nil. I presume that the system has zero display output, so that puts it into needing a BIOS with debugging PEIMs (probably don’t have space anyway, looks to be a 64Mbit) and a JTAG (no headers present) or AMI Debug.

edit: should clarify, because it’s a 2-digit and not full UEFI code, DE can only be interpreted as a ‘generalized DXE microcode/firmware load failure.’ There isn’t enough information to identify if it is IOD, CCX, or peripheral.

Last edited: Oct 25, 2021

  • #14

Q-codes for this board are in the Appendix of the manual:

  • #15

These are the code meaning as per the manual:
A1: Ide reset
34: CPU post-memory initialization
02: microcode
50: Memory initialization error
dE: not listed
Ad: Ready to Boot event

  • #16

Since this is an endless loop, I didn’t note the starting code. Here are some codes that come before the loop:
15
C2
C8
63
21
dE
Ad
A1
34
02
50
dE etc. etc.

So it seems the last code of the cycle is 50: Memory initialization error and then it begins again with dE (whatever that means).
I have tried with different memory sticks (that work fine when the 7742 CPU is installed).

  • #17

As far as i can see, the codes asus provides are bonkers.

Experience for instance shows that without any ram installed, you get stuck at postcode 10 and nothing else.
Expected would be something in the 50s for memory issues, likely 53 or 55 from what i remember from AMI on x99.

Additionally, postcodes on Epyc seem to not be ordered «deterministic», i’d say.
On my H11ssl, code 55 returns multiple times.
According to my crystal ball, it stands for an SMBus Transaction collision.
The crystal ball also seems to mainly contain error codes, which seems weird to me but i have not found anything better yet.

Postcode 15 seems to appear instead of code 10 when you have any memory installed.
till and including code 50, everything looks familiar to me.
I will take a closes look at my board tomorrow.
Crystal Ball interprets 50 as a failure to claim ownership of SMB.
Additionally, the previous 02 can be interpreted as a generic memory error.

What i can say so far is that you don’t appear to have the usual CPU incompatibility issues that we have experienced with for instance ES CPUs of A0 steppings.
Such issues would likely manifest in D0 or D1
Your system also does not quickly jump and stay at 02 which could be serious PSP-BL failure.
So i’m sorry that this isn’t more then a guessing game at this point.

Does the BMC log anything?

  • #18

System log from BMC:

  • ID: 18 October 25th 2021, 9:54:34 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AMIOEM.c:5987]Unable to get Current Active Image 1c1 —
  • ID: 19 October 25th 2021, 9:54:34 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][misc.c:107]Error in getting dual image active image configuration::449 —
  • ID: 16 October 25th 2021, 9:54:31 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AppDevice.c:764]Got invalid data field for SOl permissions eventhough userr is not disabled..adjust —
  • ID: 17 October 25th 2021, 9:54:31 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AppDevice.c:764]Got invalid data field for SOl permissions eventhough userr is not disabled..adjust —
  • ID: 14 October 25th 2021, 9:54:29 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][rest_default.c:359]ServiceRet 0 —
  • ID: 15 October 25th 2021, 9:54:29 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][rest_default.c:393]channel no wRet 0 —
  • ID: 13 October 25th 2021, 9:53:57 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 12 October 25th 2021, 9:53:56 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 11 October 25th 2021, 9:53:55 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —
  • ID: 9 October 25th 2021, 9:53:49 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:189]DHCP monitor: Releasing eth0 interface for IPv4 —
  • ID: 10 October 25th 2021, 9:53:49 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:205]DHCP monitor: Releasing eth0 interface for IPv6 —
  • ID: 8 October 25th 2021, 9:53:48 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 7 October 25th 2021, 9:53:47 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 6 October 25th 2021, 9:53:46 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —
  • ID: 4 October 25th 2021, 9:53:41 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:189]DHCP monitor: Releasing eth0 interface for IPv4 —
  • ID: 5 October 25th 2021, 9:53:41 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:205]DHCP monitor: Releasing eth0 interface for IPv6 —
  • ID: 2 October 25th 2021, 9:53:40 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 3 October 25th 2021, 9:53:40 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 1 October 25th 2021, 9:53:39 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —

  • #19

Since this is an endless loop, I didn’t note the starting code. Here are some codes that come before the loop:
15
C2
C8
63
21
dE
Ad
A1
34
02
50
dE etc. etc.

So it seems the last code of the cycle is 50: Memory initialization error and then it begins again with dE (whatever that means).
I have tried with different memory sticks (that work fine when the 7742 CPU is installed).

Yep. People who think they know things, like «asus codes are bonkers»?
They’re proving that they know nothing at all.
I have manuals, documents, standards, and NDAs.
So, amazingly, having access to actual unimpeachable and guaranteed correct documentation, I know what I’m interpreting.

The description is exactly as I gave it, no matter what their not identical gamer board manuals say. DE is a reserved UEFI code for DXE microcode load fault. It was unable to get a current active image for a peripheral installed, leading to the DXE failure. I would have to have the CPU on the bench with one of my boards and a full toolkit. I’m quite certain 1A is an inversion of A1 (common defect.) Behavior changes none at all. It hits DXE fault attempting to load microcode or firmware, and says that it can’t find enough to continue DXE.
We don’t even know if this processor is fused because it can’t even exit real mode.

  • #20

@zedei how often have you let it cycle?
Asus Boards love to reset multiple times, might actually be that everything is good and you just got spooked?
Happened to me and others before.

Yep. People who think they know things, like «asus codes are bonkers»?

To me, those lists of codes look exactly like those from previous Aptio 5 Days on for example X99.
If i have to speculate, Scaleable probably still uses those.

AMD on the other hand changed those for certain.
And the only things i have to come to that conclusion are experience on actual Hardware and leaks with juicy contents, hence the crystal ball.

So yes, i know actually pretty little. That does not keep me from using the little i have to try and be productive.
Additionally, i would like to have my questions answered to change the lack of knowledge if possible.

Onto the interpretation of Postcodes.
At this point, all we have are 2 figure Hex Numbers send on Port 0x80 that could be from anything including the PSP and Bios code.
You could take a random list and interpret the codes as a weather forecast and that it will be sunny tomorrow.

Comparing real-world behavior and codes with the expected and documented ones should show some huge discrepancies and issues.
Since i have already mentioned some of those issues, let me add ones about my crystal ball of postcodes.

Dell and Lenovo PSB Burned CPUs get stuck at Code 78 which «should» have something to do with the OEM sig not being found.
Which does not make any real sense to me.
Where as Code 0x7D is clearly labeled a PSB error code that would be way more reasonable.
On the List for the KRPA, 78 is «ACPI Module Init» and 7D is reserved.
What does that tell you?

So, amazingly, having access to actual unimpeachable and guaranteed correct documentation, I know what I’m interpreting.

Does that make any sense to you?

One thing i am certain about is that postcodes today are only of limited use in such matters.

Speed: codes only get visible when its an error and its stuck or the code isn’t changed for a perceivable while.
There are likely hundreds of codes between those few observed.
Some of those might make a lot more sense if we could read them.

There are more then one two digit «Postcode».
Those additional ones could indicate a more general source for the port 80 code.
For instance if its a PSP BL, PEI or DXE Code.

And there is more then one list of interpretations for those codes.
Or at least, for the abbreviated 2 digit codes on just port 80.

Those codes were a good indicator for faults in the past.
I still can’t discern what might be wrong in the OPs case.

System log from BMC:ID: 18 October 25th 2021, 9:54:34 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AMIOEM.c:5987]Unable to get Current Active Image 1c1 —

  • ID: 19 October 25th 2021, 9:54:34 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][misc.c:107]Error in getting dual image active image configuration::449 —
  • ID: 16 October 25th 2021, 9:54:31 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AppDevice.c:764]Got invalid data field for SOl permissions eventhough userr is not disabled..adjust —
  • ID: 17 October 25th 2021, 9:54:31 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][libipmi_AppDevice.c:764]Got invalid data field for SOl permissions eventhough userr is not disabled..adjust —
  • ID: 14 October 25th 2021, 9:54:29 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][rest_default.c:359]ServiceRet 0 —
  • ID: 15 October 25th 2021, 9:54:29 pm AMIF02F7496EBA0 spx_restservice: spx_restservice — — [4067 : 4067 CRITICAL][rest_default.c:393]channel no wRet 0 —
  • ID: 13 October 25th 2021, 9:53:57 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 12 October 25th 2021, 9:53:56 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 11 October 25th 2021, 9:53:55 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —
  • ID: 9 October 25th 2021, 9:53:49 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:189]DHCP monitor: Releasing eth0 interface for IPv4 —
  • ID: 10 October 25th 2021, 9:53:49 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:205]DHCP monitor: Releasing eth0 interface for IPv6 —
  • ID: 8 October 25th 2021, 9:53:48 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 7 October 25th 2021, 9:53:47 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 6 October 25th 2021, 9:53:46 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —
  • ID: 4 October 25th 2021, 9:53:41 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:189]DHCP monitor: Releasing eth0 interface for IPv4 —
  • ID: 5 October 25th 2021, 9:53:41 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:205]DHCP monitor: Releasing eth0 interface for IPv6 —
  • ID: 2 October 25th 2021, 9:53:40 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:200]DHCP monitor: Renewing eth0 interface for IPv6 —
  • ID: 3 October 25th 2021, 9:53:40 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:357]Renewing DNS for eth0 interface. —
  • ID: 1 October 25th 2021, 9:53:39 pm AMIF02F7496EBA0 dhcpmonitor: dhcpmonitor — — [3480 : 3480 CRITICAL][dhcpmonitor.c:160]DHCP monitor: Renewing eth0 interface for IPv4 —

To me, all of those posted look more like BMC events that are unrelated to Platform and CPU Boot issues.
Are there any other Logs or entries?

    • Forums

      • Advancing Life & Work
      • Alliances
      • Around the Storage Block
      • HPE Ezmeral: Uncut
      • OEM Solutions
      • Servers & Systems: The Right Compute
      • Tech Insights
      • The Cloud Experience Everywhere
      • HPE Blog, Austria, Germany & Switzerland
      • Blog HPE, France
      • HPE Blog, Italy
      • HPE Blog, Japan
      • HPE Blog, Latin America
      • HPE Blog, Poland
      • HPE Blog, Hungary
      • HPE Blog, UK, Ireland, Middle East & Africa
    • Blogs

    • Information

  • Forums

  • Blogs

    • Advancing Life & Work
    • Alliances
    • Around the Storage Block
    • HPE Ezmeral: Uncut
    • OEM Solutions
    • Servers & Systems: The Right Compute
    • Tech Insights
    • The Cloud Experience Everywhere
    • HPE Blog, Austria, Germany & Switzerland
    • Blog HPE, France
    • HPE Blog, Italy
    • HPE Blog, Japan
    • HPE Blog, Latin America
    • HPE Blog, UK, Ireland, Middle East & Africa
    • HPE Blog, Poland
    • HPE Blog, Hungary
  • Information

  • English

Figure 48 Password Manager Page

NOTE:

There is no default password. Passwords must be at least 8 characters but no more than

64 characters long. Passwords are case sensitive. There is no default password. Passwords are

up to 64 alpha-numeric and special characters

(~,`,!,@,#,$,%,^,&,*,(,),-,_,+,=,{,[,},],|,,<,,,>,.,?,/»,’ and space) in length, and are case sensitive.

The password needs to be entered again to confirm new password. In case of a forgotten password,

manually reset the switch to its factory defaults.

Enter the old password and the new password twice, and click Apply. At the next log on, use the

new password.

Use the Dual Image Configuration page to name and change the next bootup image. The Dual

Image Configuration allows activating either of the stored images: Image1 or Image2. When one

image is activated, the other image serves as a backup; if Image1 either fails or does not boot,

then the other image can be activated.

To display the Dual Image Configuration page, click Maintenance > Dual Image Configuration.

Figure 49 Dual Image Configuration Page

Table 37 Dual Image Configuration Fields

Field

Image Name

Active Image

Image Description

Image Version

Click Activate to activate the selected image selected in the Image Name field. Be sure to

configure the Image Description field to the version of the image loaded so that users can

easily distinguish between the images.

Click Apply to apply a description to the image selected in the Image Name field.

Click Delete to delete the image selected in the Image Name field.

Description

Select the image you want to perform an action on. You can activate the selected image,

delete it, or configure a description of it. Options are Image1 and Image2.

The currently active image.

Specify a description of the image selected in the Image Name field.

The software version associated with the active image.

Dual Image Configuration

65

Expected behavior

The image should be successfully pulled.

Actual behavior

mac_mini4:abcd mac-mini-4$ docker pull node
Using default tag: latest
latest: Pulling from library/node
85b1f47fba49: Pulling fs layer
5409e9a7fa9e: Pulling fs layer
661393707836: Pulling fs layer
1bb98c08d57e: Waiting
f957ac1b6e47: Waiting
166b7c18b759: Waiting
02cb65a8d0f6: Waiting
9052b6207e12: Waiting
error pulling image configuration: Get https://dseasb33srnrn.cloudfront.net/registry-v2/docker/registry/v2/blobs/sha256/ba/badd967af535567f92c04665ccbf4ccf63f58960e38a43f611b1b19ca3a713e7/data?Expires=1508747774&Signature=itXcTt8IGLoxsACN4OJMgmRgUfrEOE3i9J6g8ooOV9AANUAQgXnJb6Rme48DxjzCLTWnKKLQqASNNa2fNuxCCy9X6qVSBZGazxNktOwWe70fjIqR5ojTQG5GtaZUsoL0k6we~gPQXKMIBdZfGu33YeMPD7CymCow4Ww4dwwvPgo_&Key-Pair-Id=APKAJECH5M7VWIS5YZ6Q: dial tcp 192.168.65.1:443: getsockopt: connection refused
mac_mini4:abcd mac-mini-4$

Occurs with other images too..

Information

  • OS : MacOS Seirra 10.12.6
  • Docker Version 17.09.0-ce-mac35 (19611) Channel: stable a98b7c1b7c
  • When I try to pull any images I get the above Behaviour
  • What I have tried?
    a) Added dns under daemon tab of docker . "dns" : [ "8.8.8.8", "8.8.4.4" ]
    b) Added DNS Servers "8.8.8.8" and "8.8.4.4" under Network Preferences -> Advanced -> DNS tab
  • Images: https://ibb.co/n2zCVm and https://ibb.co/g6HcwR

I checked some other posts and saw some users facing this similar issue. But they could resolve it just by setting up the DNS servers to 8.8.8.8, which unfortunately not working for me.
Can anyone please help?

What could be possibly wrong here in my steps? PS*: new to Docker here.
If you think I have not provided enough information, please let me know. I will update accordingly.

$begingroup$

I followed the guide here: How do I bake a texture using Cycles bake

I unwrapped my UV, created a new image, created an Image Texture node and selected my new image with that, and hit bake. I then receive the error in the title. Here is a screenshot of my view:
enter image description here

I’m definitely doing something wrong, hopefully one of you can point out what that is.

Community's user avatar

asked May 18, 2015 at 21:54

Douglas Gaskell's user avatar

Douglas GaskellDouglas Gaskell

7111 gold badge7 silver badges19 bronze badges

$endgroup$

3

$begingroup$

For baking in cycles each material slot requires image texture in the node setup, and it looks like even if the material slot is empty. To fix the error, remove the empty material slot from the object.

answered May 18, 2015 at 22:09

Denis's user avatar

$endgroup$

6

$begingroup$

For Blender beginners like me, here is a much clearer and more detailed guide:

  • Go to ‘Shading’ view
  • For each material used by your mesh:
    • Inside the side-pane, select the material
    • Inside the Node Editor window, create a new Image Texture node (Add > Texture > Image Texture). You literally don’t have to connect this to any other nodes. Yeah I know, this is a very strange process.
    • In that Image Texture node, select or create a new image where the bake output will go.
      • If you’re using multiple materials, you can re-use the same image inside their Image Texture node.
  • Make sure you have your mesh selected
  • Hit ‘bake’ and voila

answered Mar 18, 2022 at 10:22

Shasaur's user avatar

$endgroup$

1

Hi, I am pretty new to using OpenWRT, and on my current project I am needing to modify the included packages/drivers so that I can enable WiFi (I am building openWRT images which run on our Onion Omega2+’s). On this current configuration, wireless support was originally excluded from the build so there are none of the wireless tools, drivers etc.

First, what would be the best approach for modifying the original config? When I try to include my WiFi drivers / other packages and build, I get the following error:

«WARNING: your configuration is out of sync. Please run make menuconfig, oldconfig or defconfig!»

I’m not quite too sure what this means, as I can only find a couple of posts online regarding this error. I even tried to start a new config, and simply add everything that was added in the original, I still get the same error. We have tried running oldconfig/defconfig but nothing seems to be working, maybe I am overlooking something here, or making a mistake?

If anyone has seen / resolved this issue before, I’d really appreciate your help! We’re getting held back by this at the moment. Thanks in advance!

Понравилась статья? Поделить с друзьями:
  • Error in final launch sequence failed to start gdb server
  • Error in final launch sequence failed to execute mi command
  • Error in file meshname shape name
  • Error in file docker compose yml service must be a mapping not a nonetype
  • Error in fat file system please amend it before retry