freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success!


From: Albert Chu
Subject: Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success!
Date: Mon, 13 Aug 2012 11:47:25 -0700

Hi Christian,

I'm really questioning if that system has IPMI.  It's always possible,
but it's current configuration is certainly not allowing it.  You'd have
to ping HP on that kind of setup.  Sorry, but I don't think much more
can be done from the FreeIPMI side.

Al

On Mon, 2012-08-13 at 11:41 -0700, Christian Ruppert wrote:
> Hi Albert,
> 
> On 08/12/12 at 11:40PM -0700, Al Chu wrote:
> > Hi Christian,
> > 
> > On Sun, 2012-08-12 at 05:07 -0700, Christian Ruppert wrote:
> > > # ipmimonitoring -h 10.0.0.177 --config-file /etc/icinga/ipmi.cfg 
> > > --quiet-cache --sdr-cache-recreate --interpret-oem-data 
> > > --output-sensor-state --ignore-not-available-sensors --debug
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              1Ch] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              C7h] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              1Dh] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              C3h] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              1Eh] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              BFh] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              1Fh] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              BBh] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              20h] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              B7h] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              21h] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              B3h] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              22h] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              AFh] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              23h] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              ABh] = checksum2[ 8b]
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 10.0.0.177: =====================================================
> > > 10.0.0.177: RMCP Header:
> > > 10.0.0.177: ------------
> > > 10.0.0.177: [               6h] = version[ 8b]
> > > 10.0.0.177: [               0h] = reserved[ 8b]
> > > 10.0.0.177: [              FFh] = sequence_number[ 8b]
> > > 10.0.0.177: [               7h] = message_class.class[ 5b]
> > > 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> > > 10.0.0.177: [               0h] = message_class.ack[ 1b]
> > > 10.0.0.177: IPMI Session Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [               0h] = authentication_type[ 8b]
> > > 10.0.0.177: [               0h] = session_sequence_number[32b]
> > > 10.0.0.177: [               0h] = session_id[32b]
> > > 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> > > 10.0.0.177: IPMI Message Header:
> > > 10.0.0.177: --------------------
> > > 10.0.0.177: [              20h] = rs_addr[ 8b]
> > > 10.0.0.177: [               0h] = rs_lun[ 2b]
> > > 10.0.0.177: [               6h] = net_fn[ 6b]
> > > 10.0.0.177: [              C8h] = checksum1[ 8b]
> > > 10.0.0.177: [              81h] = rq_addr[ 8b]
> > > 10.0.0.177: [               0h] = rq_lun[ 2b]
> > > 10.0.0.177: [              24h] = rq_seq[ 6b]
> > > 10.0.0.177: IPMI Command Data:
> > > 10.0.0.177: ------------------
> > > 10.0.0.177: [              38h] = cmd[ 8b]
> > > 10.0.0.177: [               Eh] = channel_number[ 4b]
> > > 10.0.0.177: [               0h] = reserved1[ 3b]
> > > 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> > > 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> > > 10.0.0.177: [               0h] = reserved2[ 4b]
> > > 10.0.0.177: IPMI Trailer:
> > > 10.0.0.177: --------------
> > > 10.0.0.177: [              A7h] = checksum2[ 8b]
> > > /usr/sbin/ipmi-sensors: connection timeout
> > > 
> > > And there is a IPMI on that address.
> > 
> > It doesn't appear anything is responding.  Does ipmiping or rmcpping
> > work?  If not, there may be a configuration issue on the HP.  It's
> > certainly possible IPMI is not enabled but the web interface is.
> > 
> 
> # ipmiping -v 10.0.0.177 -d
> ipmiping 10.0.0.177 (10.0.0.177)
> 10.0.0.177: =====================================================
> 10.0.0.177: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               7h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: IPMI Session Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [               0h] = authentication_type[ 8b]
> 10.0.0.177: [               0h] = session_sequence_number[32b]
> 10.0.0.177: [               0h] = session_id[32b]
> 10.0.0.177: [               9h] = ipmi_msg_len[ 8b]
> 10.0.0.177: IPMI Message Header:
> 10.0.0.177: --------------------
> 10.0.0.177: [              20h] = rs_addr[ 8b]
> 10.0.0.177: [               0h] = rs_lun[ 2b]
> 10.0.0.177: [               6h] = net_fn[ 6b]
> 10.0.0.177: [              C8h] = checksum1[ 8b]
> 10.0.0.177: [              81h] = rq_addr[ 8b]
> 10.0.0.177: [               0h] = rq_lun[ 2b]
> 10.0.0.177: [              12h] = rq_seq[ 6b]
> 10.0.0.177: IPMI Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [              38h] = cmd[ 8b]
> 10.0.0.177: [               Eh] = channel_number[ 4b]
> 10.0.0.177: [               0h] = reserved1[ 3b]
> 10.0.0.177: [               0h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.0.0.177: [               2h] = maximum_privilege_level[ 4b]
> 10.0.0.177: [               0h] = reserved2[ 4b]
> 10.0.0.177: IPMI Trailer:
> 10.0.0.177: --------------
> 10.0.0.177: [              EFh] = checksum2[ 8b]
> response timed out: rq_seq=18
> 
> # rmcpping -v 10.0.0.177 -d
> rmcpping 10.0.0.177 (10.0.0.177)
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Ping 
> 10.0.0.177: =====================================================
> 10.0.0.177: RMCP Header:
> 10.0.0.177: ------------
> 10.0.0.177: [               6h] = version[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [              FFh] = sequence_number[ 8b]
> 10.0.0.177: [               6h] = message_class.class[ 5b]
> 10.0.0.177: [               0h] = message_class.reserved[ 2b]
> 10.0.0.177: [               0h] = message_class.ack[ 1b]
> 10.0.0.177: RMCP Command Data:
> 10.0.0.177: ------------------
> 10.0.0.177: [        BE110000h] = iana_enterprise_number[32b]
> 10.0.0.177: [              80h] = message_type[ 8b]
> 10.0.0.177: [              BFh] = message_tag[ 8b]
> 10.0.0.177: [               0h] = reserved[ 8b]
> 10.0.0.177: [               0h] = data_length[ 8b]
> pong timed out: message_tag=191
> 
> :/
> 
> > > The BMC isn't supported by the Kernel though:
> > > bmc-config --checkout somewhow hangs as well as bmc-info
> > > It is also not listed via "dmidecode --type 38" but there is one for sure.
> > 
> > If it isn't listed by dmidecode, it's possible the HP board has IPMI at
> > an unadvertised (and unfortunately non-default) address.  The hang is
> > likely b/c IPMI is trying to communicate at the default and is just not
> > getting a response.  Does HP provide any instructions that would allow
> > you to input addresses to options like --driver-address?
> > 
> 
> It's a very old System so I don't think there's anything.
> 
> > > The web interface works so far and the virtual console (also web 
> > > interface) works as well.
> > > 
> > > I don't know if there is a workaround to get iLO2 working but I would 
> > > like to be able to use it though.
> > > 
> > > It's a ProLiant DL380 G4.
> > 
> > Wouldn't know anything for this particular issue, but the following
> > workaround was added for other HP machines:
> > 
> >        "assumeio" - This workaround option  will  assume  inband
> > interfaces
> >        communicate  with  system  I/O  rather than being memory-mapped.
> > This
> >        will work around systems that report invalid  base  addresses.
> > Those
> >        hitting  this issue may see "device not supported" or "could not
> > find
> >        inband device" errors.  Issue observed on HP ProLiant DL145 G1.
> > 
> 
> I just tried "bmc-info -W assumeio" but it doesn't work either :/
> 
> > Al
> > 
> > -- 
> > Albert Chu
> > address@hidden
> > Computer Scientist
> > High Performance Systems Division
> > Lawrence Livermore National Laboratory
> > 
> > 
> > _______________________________________________
> > Freeipmi-users mailing list
> > address@hidden
> > https://lists.gnu.org/mailman/listinfo/freeipmi-users
> 
-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]