[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ic
From: |
Bautista, Devon Thomas |
Subject: |
Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes |
Date: |
Thu, 27 Oct 2022 21:48:39 +0000 |
Hi Al,
Thank you for the quick reply.
Could you try some of the workaround flags in ipmipower. Most notably the "intel20" workaround flag, but perhaps the "opensesspriv" one as well as its been seen on some intel motherboards too.
I passed "intel20", "opensesspriv", and "intel20,opensesspriv" to the
"-W" flag with the same result: BMC busy.
Another thing to try would be to try using the "admin" privilege instead of the "operator" one (which ipmipower defaults to).
I passed "-l ADMIN" to the command line, with and without each of the
workaround combinations aforementioned with the same result: BMC busy.
If that doesn't work, could you send me the full --debug output.
Here is the full debug output for the original command I ran:
$ ipmipower -D LAN_2_0 -h host-bmc -u admin -p $PWORD
ipmipower> stat
host-bmc: BMC busy
ipmipower> debug
debugging is now on
ipmipower> stat
host-bmc: =====================================================
host-bmc: IPMI 2.0 Get Channel Authentication Capabilities Request
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [ 6h] = version[ 8b]
host-bmc: [ 0h] = reserved[ 8b]
host-bmc: [ FFh] = sequence_number[ 8b]
host-bmc: [ 7h] = message_class.class[ 5b]
host-bmc: [ 0h] = message_class.reserved[ 2b]
host-bmc: [ 0h] = message_class.ack[ 1b]
host-bmc: IPMI Session Header:
host-bmc: --------------------
host-bmc: [ 0h] = authentication_type[ 8b]
host-bmc: [ 0h] = session_sequence_number[32b]
host-bmc: [ 0h] = session_id[32b]
host-bmc: [ 9h] = ipmi_msg_len[ 8b]
host-bmc: IPMI Message Header:
host-bmc: --------------------
host-bmc: [ 20h] = rs_addr[ 8b]
host-bmc: [ 0h] = rs_lun[ 2b]
host-bmc: [ 6h] = net_fn[ 6b]
host-bmc: [ C8h] = checksum1[ 8b]
host-bmc: [ 81h] = rq_addr[ 8b]
host-bmc: [ 0h] = rq_lun[ 2b]
host-bmc: [ 3Ah] = rq_seq[ 6b]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [ 38h] = cmd[ 8b]
host-bmc: [ Eh] = channel_number[ 4b]
host-bmc: [ 0h] = reserved1[ 3b]
host-bmc: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
host-bmc: [ 3h] = maximum_privilege_level[ 4b]
host-bmc: [ 0h] = reserved2[ 4b]
host-bmc: IPMI Trailer:
host-bmc: --------------
host-bmc: [ CEh] = checksum2[ 8b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Get Channel Authentication Capabilities Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [ 6h] = version[ 8b]
host-bmc: [ 0h] = reserved[ 8b]
host-bmc: [ FFh] = sequence_number[ 8b]
host-bmc: [ 7h] = message_class.class[ 5b]
host-bmc: [ 0h] = message_class.reserved[ 2b]
host-bmc: [ 0h] = message_class.ack[ 1b]
host-bmc: IPMI Session Header:
host-bmc: --------------------
host-bmc: [ 0h] = authentication_type[ 8b]
host-bmc: [ 0h] = session_sequence_number[32b]
host-bmc: [ 0h] = session_id[32b]
host-bmc: [ 10h] = ipmi_msg_len[ 8b]
host-bmc: IPMI Message Header:
host-bmc: --------------------
host-bmc: [ 81h] = rq_addr[ 8b]
host-bmc: [ 0h] = rq_lun[ 2b]
host-bmc: [ 7h] = net_fn[ 6b]
host-bmc: [ 63h] = checksum1[ 8b]
host-bmc: [ 20h] = rs_addr[ 8b]
host-bmc: [ 0h] = rs_lun[ 2b]
host-bmc: [ 3Ah] = rq_seq[ 6b]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [ 38h] = cmd[ 8b]
host-bmc: [ 0h] = comp_code[ 8b]
host-bmc: [ 1h] = channel_number[ 8b]
host-bmc: [ 0h] = authentication_type.none[ 1b]
host-bmc: [ 0h] = authentication_type.md2[ 1b]
host-bmc: [ 0h] = authentication_type.md5[ 1b]
host-bmc: [ 0h] = authentication_type.reserved1[ 1b]
host-bmc: [ 0h] =
authentication_type.straight_password_key[ 1b]
host-bmc: [ 0h] = authentication_type.oem_prop[ 1b]
host-bmc: [ 0h] = authentication_type.reserved2[ 1b]
host-bmc: [ 1h] =
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
host-bmc: [ 0h] = authentication_status.anonymous_login[ 1b]
host-bmc: [ 0h] = authentication_status.null_username[ 1b]
host-bmc: [ 1h] = authentication_status.non_null_username[ 1b]
host-bmc: [ 0h] =
authentication_status.user_level_authentication[ 1b]
host-bmc: [ 0h] =
authentication_status.per_message_authentication[ 1b]
host-bmc: [ 0h] = authentication_status.k_g[ 1b]
host-bmc: [ 0h] = authentication_status.reserved[ 2b]
host-bmc: [ 1h] = channel_supports_ipmi_v1.5_connections[ 1b]
host-bmc: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
host-bmc: [ 0h] = reserved[ 6b]
host-bmc: [ 0h] = oem_id[24b]
host-bmc: [ 0h] = oem_auxiliary_data[ 8b]
host-bmc: IPMI Trailer:
host-bmc: --------------
host-bmc: [ 38h] = checksum2[ 8b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Request
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [ 6h] = version[ 8b]
host-bmc: [ 0h] = reserved[ 8b]
host-bmc: [ FFh] = sequence_number[ 8b]
host-bmc: [ 7h] = message_class.class[ 5b]
host-bmc: [ 0h] = message_class.reserved[ 2b]
host-bmc: [ 0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [ 6h] = authentication_type[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 10h] = payload_type[ 6b]
host-bmc: [ 0h] = payload_type.authenticated[ 1b]
host-bmc: [ 0h] = payload_type.encrypted[ 1b]
host-bmc: [ 0h] = session_id[32b]
host-bmc: [ 0h] = session_sequence_number[32b]
host-bmc: [ 20h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [ BYTE ARRAY ... ] = payload_data[32B]
host-bmc: [ CAh 00h 00h 00h 43h 43h D7h BEh ]
host-bmc: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [ CAh] = message_tag[ 8b]
host-bmc: [ 0h] = requested_maximum_privilege_level[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 0h] = reserved2[16b]
host-bmc: [ BED74343h] = remote_console_session_id[32b]
host-bmc: [ 0h] = authentication_payload.payload_type[ 8b]
host-bmc: [ 0h] = reserved3[16b]
host-bmc: [ 8h] = authentication_payload.payload_length[ 8b]
host-bmc: [ 1h] =
authentication_payload.authentication_algorithm[ 6b]
host-bmc: [ 0h] = reserved4[ 2b]
host-bmc: [ 0h] = reserved5[24b]
host-bmc: [ 1h] = integrity_payload.payload_type[ 8b]
host-bmc: [ 0h] = reserved6[16b]
host-bmc: [ 8h] = integrity_payload.payload_length[ 8b]
host-bmc: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
host-bmc: [ 0h] = reserved7[ 2b]
host-bmc: [ 0h] = reserved8[24b]
host-bmc: [ 2h] = confidentiality_payload.payload_type[ 8b]
host-bmc: [ 0h] = reserved9[16b]
host-bmc: [ 8h] = confidentiality_payload.payload_length[ 8b]
host-bmc: [ 1h] =
confidentiality_payload.confidentiality_algorithm[ 6b]
host-bmc: [ 0h] = reserved10[ 2b]
host-bmc: [ 0h] = reserved11[24b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [ 6h] = version[ 8b]
host-bmc: [ 0h] = reserved[ 8b]
host-bmc: [ FFh] = sequence_number[ 8b]
host-bmc: [ 7h] = message_class.class[ 5b]
host-bmc: [ 0h] = message_class.reserved[ 2b]
host-bmc: [ 0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [ 6h] = authentication_type[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 11h] = payload_type[ 6b]
host-bmc: [ 0h] = payload_type.authenticated[ 1b]
host-bmc: [ 0h] = payload_type.encrypted[ 1b]
host-bmc: [ 0h] = session_id[32b]
host-bmc: [ 0h] = session_sequence_number[32b]
host-bmc: [ 8h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [ BYTE ARRAY ... ] = payload_data[ 8B]
host-bmc: [ CAh 01h 00h 00h 43h 43h D7h BEh ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [ CAh] = message_tag[ 8b]
host-bmc: [ 1h] = rmcpplus_status_code[ 8b]
host-bmc: [ 0h] = maximum_privilege_level[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 0h] = reserved2[ 8b]
host-bmc: [ BED74343h] = remote_console_session_id[32b]
(ipmipower_check.c, ipmipower_check_rmcpplus_status_code, 713): host =
host-bmc; p = 4; rmcpplus_status_code failed: 1h
host-bmc: BMC busy
Let me know if you would like the debug output of the
workaround/privilege command line variants as well.
Best,
Devon
On 10/27/22 2:58 PM, Al Chu11 wrote:
Hi Devon,
Could you try some of the workaround flags in ipmipower. Most notably
the "intel20" workaround flag, but perhaps the "opensesspriv" one as
well as its been seen on some intel motherboards too.
Another thing to try would be to try using the "admin" privilege instead
of the "operator" one (which ipmipower defaults to). I've seen some
motherboards simply ignore the privilege that the user specifies and
just assume "admin" is used by the user all of the time (ipmitool
defaults to "admin").
If that doesn't work, could you send me the full --debug output. intel
has had a rash of authentication corner cases, so hopefully this is not
a new one or one that was previously missed.
Al
On 10/27/22 13:16, Bautista, Devon Thomas via Freeipmi-users wrote:
Hello,
I have a few Intel M50CYP boards that I can get to work with ipmitool,
but not FreeIPMI.
I can successfully run power commands and activate sol via, e.g:
ipmitool -I lanplus -U admin -P $PWORD -H host-bmc sol activate
However, when I run `ipmipower' or `ipmiconsole', I get "BMC busy".
When I turn on debugging, e.g., and try to stat the power with
`ipmipower', I get an exit code of 0x1 which, according to Table 13 of
the IPMI Specification, means "Insufficient resources to create a
session". This is strange, considering I can use ipmitool to start a
sol session just fine.
The output of the above ipmipower example (trimmed) is as follows:
$ ipmipower -D LAN_2_0 -h host-bmc -u admin -p $PWORD
ipmipower> debug
debugging is now on
ipmipower> stat
[...]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [ 6h] = version[ 8b]
host-bmc: [ 0h] = reserved[ 8b]
host-bmc: [ FFh] = sequence_number[ 8b]
host-bmc: [ 7h] = message_class.class[ 5b]
host-bmc: [ 0h] = message_class.reserved[ 2b]
host-bmc: [ 0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [ 6h] = authentication_type[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 11h] = payload_type[ 6b]
host-bmc: [ 0h] = payload_type.authenticated[ 1b]
host-bmc: [ 0h] = payload_type.encrypted[ 1b]
host-bmc: [ 0h] = session_id[32b]
host-bmc: [ 0h] = session_sequence_number[32b]
host-bmc: [ 8h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [ BYTE ARRAY ... ] = payload_data[ 8B]
host-bmc: [ CAh 01h 00h 00h 43h 43h D7h BEh ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [ CAh] = message_tag[ 8b]
host-bmc: [ 1h] = rmcpplus_status_code[ 8b]
host-bmc: [ 0h] = maximum_privilege_level[ 4b]
host-bmc: [ 0h] = reserved1[ 4b]
host-bmc: [ 0h] = reserved2[ 8b]
host-bmc: [ BED74343h] = remote_console_session_id[32b]
(ipmipower_check.c, ipmipower_check_rmcpplus_status_code, 713): host =
host-bmc; p = 4; rmcpplus_status_code failed: 1h
host-bmc: BMC busy
I have updated the board firmware and BMC firmware to the latest
version provided by Intel with the same result. Is there any further
troubleshooting I could perform? Let me know if you would like the
full debug output.
Regards,
Devon
_______________________________________________
Freeipmi-users mailing list
Freeipmi-users@gnu.org
https://urldefense.com/v3/__https://lists.gnu.org/mailman/listinfo/freeipmi-users__;!!Bt8fGhp8LhKGRg!DT2qkjffOPodKoo1HhFQEJWh2Cq-IYoMnYn09-VB50EE6LY-vnBbvaGry8fvEfMoypOKnpufiUxO-tQ$
smime.p7s
Description: S/MIME Cryptographic Signature
- [Freeipmi-users] "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Bautista, Devon Thomas, 2022/10/27
- Re: [Freeipmi-users] "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Al Chu11, 2022/10/27
- Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes,
Bautista, Devon Thomas <=
- Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Al Chu11, 2022/10/27
- Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Bautista, Devon Thomas, 2022/10/27
- Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Al Chu11, 2022/10/27
- Message not available
- Message not available
- Message not available
- Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes, Bautista, Devon Thomas, 2022/10/28