[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Freeipmi-users] freeipmi to X4150/X4450
From: |
Al Chu |
Subject: |
Re: [Freeipmi-users] freeipmi to X4150/X4450 |
Date: |
Fri, 23 May 2008 09:06:10 -0400 |
Hey Ihara,
On Sat, 2008-05-24 at 00:31 +0900, Shuichi Ihara wrote:
> Hi Al,
>
> Thanks, I just tried with "authcap" and it worked.
> # ipmipower -h 10.173.69.39 -u root -p changeme -W "authcap" -s
> 10.173.69.39: on
Cool.
> Here is a write paper of X4150/X4450.
> http://www.sun.com/servers/x64/x4150/wp.pdf
I'll add this.
>
> One question:
> If we have a cluster and that consists of Intel and AMD servers, how
> we can use "two"
> workaround word for each servers in /etc/ipmipower.conf?
Dealing with heterogenous clusters with multiple non-compliant IPMI
implementations wasn't something I had in mind early on :-) But I
know its a problem that I already have on my todo list. I wrote about
it here:
http://lists.gnu.org/archive/html/freeipmi-users/2008-03/msg00000.html
PLMK your comments.
>
> BTW, ipmi-fru still failing and can't dump all of fru information. It
seems different issue.
> # ipmi-fru -h 10.173.69.39 -u root -p changeme -W "authcap"
> -snip-
> FRU Get FRU Inventory Area Failure: bad completion code: request
data/parameter invalid
>
> FRU Get FRU Inventory Area Failure: bad completion code: request
data/parameter invalid
> -snip-
>
> Please see attached dump file with "--debug" option.
I'll take a look (will probably not get to this one till next week
though.)
Thanks,
Al
On Sat, 2008-05-24 at 00:31 +0900, Shuichi Ihara wrote:
> Hi Al,
>
> Thanks, I just tried with "authcap" and it worked.
> # ipmipower -h 10.173.69.39 -u root -p changeme -W "authcap" -s
> 10.173.69.39: on
>
> Here is a write paper of X4150/X4450.
> http://www.sun.com/servers/x64/x4150/wp.pdf
>
> One question:
> If we have a cluster and that consists of Intel and AMD servers, how we can
> use "two"
> workaround word for each servers in /etc/ipmipower.conf?
>
> BTW, ipmi-fru still failing and can't dump all of fru information. It seems
> different issue.
> # ipmi-fru -h 10.173.69.39 -u root -p changeme -W "authcap"
> -snip-
> FRU Get FRU Inventory Area Failure: bad completion code: request
> data/parameter invalid
>
> FRU Get FRU Inventory Area Failure: bad completion code: request
> data/parameter invalid
> -snip-
>
> Please see attached dump file with "--debug" option.
>
> Thanks in advance.
>
> -Ihara
>
> Al Chu wrote:
> > Hey Ihara,
> >
> > It seems the return values from the "get authentication capabilities
> > command" indicate a non-null username is invalid.
> >
> > 10.173.69.39: [ 0h] =
> > authentication_status.non_null_username[ 1b]
> >
> > Thus the 'username invalid' error message is output. Maybe this is a
> > bug on the eLOM?
> >
> > Could you confirm by trying out the "authcap" workaround? If it works,
> > can you please tell me the hardware details for that motherboard? I can
> > then add it to the workaround documentation.
> >
> > Thanks,
> > Al
> >
> > On Fri, 2008-05-23 at 23:28 +0900, Shuichi Ihara wrote:
> >> Hi
> >>
> >> I'm attempting to use the freeipmi to X4150/X4450 which are Sun's
> >> new Intel server. Those serves have eLOM (no ILOM which is used to
> >> AMD server). I just tried to run ipmipower below, but it didn't work.
> >> The ipmitool works well.
> >>
> >> # ipmitool -H 10.173.69.39 -U root -P changeme power status
> >> Chassis Power is on
> >> # ipmipower -h 10.173.69.39 -u root -p changeme -s
> >> 10.173.69.39: username invalid
> >> # ipmipower -h 10.173.69.39 -u root -p changeme -W "endianseq" -s
> >> 10.173.69.39: username invalid
> >>
> >> An attached is dump with "--debug". It would be appreciated if someone
> >> could help for this.
> >>
> >> Thanks,
> >>
> >> -Ihara
> >> plain text document attachment (ipmipower_elom.log)
> >> 10.173.69.39: =====================================================
> >> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Request
> >> 10.173.69.39: =====================================================
> >> 10.173.69.39: RMCP Header:
> >> 10.173.69.39: ------------
> >> 10.173.69.39: [ 6h] = version[ 8b]
> >> 10.173.69.39: [ 0h] = reserved[ 8b]
> >> 10.173.69.39: [ FFh] = sequence_number[ 8b]
> >> 10.173.69.39: [ 7h] = message_class.class[ 5b]
> >> 10.173.69.39: [ 0h] = message_class.reserved[ 2b]
> >> 10.173.69.39: [ 0h] = message_class.ack[ 1b]
> >> 10.173.69.39: IPMI Session Header:
> >> 10.173.69.39: --------------------
> >> 10.173.69.39: [ 0h] = authentication_type[ 8b]
> >> 10.173.69.39: [ 0h] = session_sequence_number[32b]
> >> 10.173.69.39: [ 0h] = session_id[32b]
> >> 10.173.69.39: [ 9h] = ipmi_msg_len[ 8b]
> >> 10.173.69.39: IPMI Message Header:
> >> 10.173.69.39: --------------------
> >> 10.173.69.39: [ 20h] = rs_addr[ 8b]
> >> 10.173.69.39: [ 0h] = rs_lun[ 2b]
> >> 10.173.69.39: [ 6h] = net_fn[ 6b]
> >> 10.173.69.39: [ C8h] = checksum1[ 8b]
> >> 10.173.69.39: [ 81h] = rq_addr[ 8b]
> >> 10.173.69.39: [ 0h] = rq_lun[ 2b]
> >> 10.173.69.39: [ 18h] = rq_seq[ 6b]
> >> 10.173.69.39: IPMI Command Data:
> >> 10.173.69.39: ------------------
> >> 10.173.69.39: [ 38h] = cmd[ 8b]
> >> 10.173.69.39: [ Eh] = channel_number[ 4b]
> >> 10.173.69.39: [ 0h] = reserved1[ 3b]
> >> 10.173.69.39: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
> >> 10.173.69.39: [ 2h] = maximum_privilege_level[ 4b]
> >> 10.173.69.39: [ 0h] = reserved2[ 4b]
> >> 10.173.69.39: IPMI Trailer:
> >> 10.173.69.39: --------------
> >> 10.173.69.39: [ 57h] = checksum2[ 8b]
> >> 10.173.69.39: =====================================================
> >> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Response
> >> 10.173.69.39: =====================================================
> >> 10.173.69.39: RMCP Header:
> >> 10.173.69.39: ------------
> >> 10.173.69.39: [ 6h] = version[ 8b]
> >> 10.173.69.39: [ 0h] = reserved[ 8b]
> >> 10.173.69.39: [ FFh] = sequence_number[ 8b]
> >> 10.173.69.39: [ 7h] = message_class.class[ 5b]
> >> 10.173.69.39: [ 0h] = message_class.reserved[ 2b]
> >> 10.173.69.39: [ 0h] = message_class.ack[ 1b]
> >> 10.173.69.39: IPMI Session Header:
> >> 10.173.69.39: --------------------
> >> 10.173.69.39: [ 0h] = authentication_type[ 8b]
> >> 10.173.69.39: [ 0h] = session_sequence_number[32b]
> >> 10.173.69.39: [ 0h] = session_id[32b]
> >> 10.173.69.39: [ 10h] = ipmi_msg_len[ 8b]
> >> 10.173.69.39: IPMI Message Header:
> >> 10.173.69.39: --------------------
> >> 10.173.69.39: [ 81h] = rq_addr[ 8b]
> >> 10.173.69.39: [ 0h] = rq_lun[ 2b]
> >> 10.173.69.39: [ 7h] = net_fn[ 6b]
> >> 10.173.69.39: [ 63h] = checksum1[ 8b]
> >> 10.173.69.39: [ 20h] = rs_addr[ 8b]
> >> 10.173.69.39: [ 0h] = rs_lun[ 2b]
> >> 10.173.69.39: [ 18h] = rq_seq[ 6b]
> >> 10.173.69.39: IPMI Command Data:
> >> 10.173.69.39: ------------------
> >> 10.173.69.39: [ 38h] = cmd[ 8b]
> >> 10.173.69.39: [ 0h] = comp_code[ 8b]
> >> 10.173.69.39: [ 1h] = channel_number[ 8b]
> >> 10.173.69.39: [ 0h] = authentication_type.none[ 1b]
> >> 10.173.69.39: [ 1h] = authentication_type.md2[ 1b]
> >> 10.173.69.39: [ 1h] = authentication_type.md5[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_type.reserved1[ 1b]
> >> 10.173.69.39: [ 1h] =
> >> authentication_type.straight_password_key[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_type.oem_prop[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_type.reserved2[ 1b]
> >> 10.173.69.39: [ 1h] =
> >> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_status.anonymous_login[
> >> 1b]
> >> 10.173.69.39: [ 1h] = authentication_status.null_username[
> >> 1b]
> >> 10.173.69.39: [ 0h] =
> >> authentication_status.non_null_username[ 1b]
> >> 10.173.69.39: [ 0h] =
> >> authentication_status.user_level_authentication[ 1b]
> >> 10.173.69.39: [ 0h] =
> >> authentication_status.per_message_authentication[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_status.k_g[ 1b]
> >> 10.173.69.39: [ 0h] = authentication_status.reserved[ 2b]
> >> 10.173.69.39: [ 1h] =
> >> channel_supports_ipmi_v1.5_connections[ 1b]
> >> 10.173.69.39: [ 1h] =
> >> channel_supports_ipmi_v2.0_connections[ 1b]
> >> 10.173.69.39: [ 0h] = reserved[ 6b]
> >> 10.173.69.39: [ 0h] = oem_id[24b]
> >> 10.173.69.39: [ 0h] = oem_auxiliary_data[ 8b]
> >> 10.173.69.39: IPMI Trailer:
> >> 10.173.69.39: --------------
> >> 10.173.69.39: [ ACh] = checksum2[ 8b]
> >> 10.173.69.39: username invalid
> >> _______________________________________________
> >> Freeipmi-users mailing list
> >> address@hidden
> >> http://lists.gnu.org/mailman/listinfo/freeipmi-users
--
Albert Chu
address@hidden
925-422-5311
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory
- [Freeipmi-users] freeipmi to X4150/X4450, Shuichi Ihara, 2008/05/23
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/23
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/24
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Shuichi Ihara, 2008/05/26
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/26
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Shuichi Ihara, 2008/05/27
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/27
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/27