freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success!


From: Al Chu
Subject: Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success!
Date: Sun, 12 Aug 2012 23:40:50 -0700

Hi Christian,

On Sun, 2012-08-12 at 05:07 -0700, Christian Ruppert wrote:
> # ipmimonitoring -h 10.0.0.177 --config-file /etc/icinga/ipmi.cfg 
> --quiet-cache --sdr-cache-recreate --interpret-oem-data --output-sensor-state 
> --ignore-not-available-sensors --debug
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              1Ch] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              C7h] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              1Dh] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              C3h] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              1Eh] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              BFh] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              1Fh] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              BBh] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              20h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              B7h] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              21h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              B3h] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              22h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              AFh] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              23h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              ABh] = checksum2[ 8b]
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              24h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              A7h] = checksum2[ 8b]
> /usr/sbin/ipmi-sensors: connection timeout
> 
> And there is a IPMI on that address.

It doesn't appear anything is responding.  Does ipmiping or rmcpping
work?  If not, there may be a configuration issue on the HP.  It's
certainly possible IPMI is not enabled but the web interface is.

> The BMC isn't supported by the Kernel though:
> bmc-config --checkout somewhow hangs as well as bmc-info
> It is also not listed via "dmidecode --type 38" but there is one for sure.

If it isn't listed by dmidecode, it's possible the HP board has IPMI at
an unadvertised (and unfortunately non-default) address.  The hang is
likely b/c IPMI is trying to communicate at the default and is just not
getting a response.  Does HP provide any instructions that would allow
you to input addresses to options like --driver-address?

> The web interface works so far and the virtual console (also web interface) 
> works as well.
> 
> I don't know if there is a workaround to get iLO2 working but I would like to 
> be able to use it though.
> 
> It's a ProLiant DL380 G4.

Wouldn't know anything for this particular issue, but the following
workaround was added for other HP machines:

       "assumeio" - This workaround option  will  assume  inband
interfaces
       communicate  with  system  I/O  rather than being memory-mapped.
This
       will work around systems that report invalid  base  addresses.
Those
       hitting  this issue may see "device not supported" or "could not
find
       inband device" errors.  Issue observed on HP ProLiant DL145 G1.

Al

-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory




reply via email to

[Prev in Thread] Current Thread [Next in Thread]