freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ic


From: Bautista, Devon Thomas
Subject: Re: [Freeipmi-users] [EXTERNAL] Re: "BMC busy" with FreeIPMI on Intel Ice Lake Nodes
Date: Thu, 27 Oct 2022 22:17:28 +0000

Hi Al,

Sure. It is as follows:

$ ipmitool -I lanplus -U admin -P $PWORD -H host-bmc -vvv chassis status

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x54
>>    data    : 0x0e 0x00 0x80

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 25
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 54
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x54
>>    data    : 0x0e 0x00 0x81

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 25
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 54
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x54
>>    data    : 0x0e 0x00 0x82

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 25
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 03
<<   Rs Lun     : 0
<<   Command    : 54
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x54
>>    data    : 0x0e 0x00 0x83

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 04
<<   Rs Lun     : 0
<<   Command    : 54
<<   Compl Code : 0x00
Using best available cipher suite 17

>> SENDING AN OPEN SESSION REQUEST

<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : admin
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x091dbf5f
<<  Negotiated authenticatin algorithm : hmac_sha256
<<  Negotiated integrity algorithm     : sha256_128
<<  Negotiated encryption algorithm    : aes_cbc_128

>> Console generated random number (16 bytes)
 da cc 4c 4a 35 dd 6d d6 85 cd 2e 30 cf a8 24 e1
>> SENDING A RAKP 1 MESSAGE

<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0xc4b2fed83f37e5f2d39e5c6ec07164bd
<<  BMC GUID                      : 0x99f51f80dd5111eb9bc7a4bf01893d12
<< Key exchange auth code [sha256]: 0x897d172e2af7b83741ce609274b3e9ddcdfd99f33a37fd68af9ce35bf80aa656

bmc_rand (16 bytes)
 c4 b2 fe d8 3f 37 e5 f2 d3 9e 5c 6e c0 71 64 bd
>> rakp2 mac input buffer (63 bytes)
 a4 a3 a2 a0 5f bf 1d 09 da cc 4c 4a 35 dd 6d d6
 85 cd 2e 30 cf a8 24 e1 c4 b2 fe d8 3f 37 e5 f2
 d3 9e 5c 6e c0 71 64 bd 99 f5 1f 80 dd 51 11 eb
 9b c7 a4 bf 01 89 3d 12 14 05 61 64 6d 69 6e
>> rakp2 mac key (20 bytes)
 50 61 73 73 77 6f 72 64 40 62 66 37 62 6d 63 00
 00 00 00 00
>> rakp2 mac as computed by the remote console (32 bytes)
 89 7d 17 2e 2a f7 b8 37 41 ce 60 92 74 b3 e9 dd
 cd fd 99 f3 3a 37 fd 68 af 9c e3 5b f8 0a a6 56
>> rakp3 mac input buffer (27 bytes)
 c4 b2 fe d8 3f 37 e5 f2 d3 9e 5c 6e c0 71 64 bd
 a4 a3 a2 a0 14 05 61 64 6d 69 6e
>> rakp3 mac key (20 bytes)
 50 61 73 73 77 6f 72 64 40 62 66 37 62 6d 63 00
 00 00 00 00
generated rakp3 mac (32 bytes)
 ad 41 13 43 0b 56 e8 1a 9c e1 21 df db f7 61 51
 1b 52 ed 06 ac d5 8e 38 ff c7 f0 29 a7 7f 25 18
session integrity key input (39 bytes)
 da cc 4c 4a 35 dd 6d d6 85 cd 2e 30 cf a8 24 e1
 c4 b2 fe d8 3f 37 e5 f2 d3 9e 5c 6e c0 71 64 bd
 14 05 61 64 6d 69 6e
Generated session integrity key (32 bytes)
 05 79 bd d4 9f 70 eb d8 61 dd dd 26 b6 11 03 07
 2f ad 6e 6a 1d 2a 8d e5 2c 10 0a 59 2b 89 33 bd
Generated K1 (32 bytes)
 99 81 12 93 47 73 e6 f4 eb cf 8e 21 55 d0 1a e1
 d0 0e f6 3e ec 42 46 17 e5 c7 3a 7d 65 70 24 b5
Generated K2 (32 bytes)
 c0 c0 13 2a 47 91 f5 5f be 83 cc bf 8a db f7 4f
 09 3c 2f 66 40 6d fb c9 6d f6 97 bd 9f ef eb ed
>> SENDING A RAKP 3 MESSAGE

<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code [sha256]: 0x3d85b6e0e94484e85af6b925cc8da07b

>> rakp4 mac input buffer (36 bytes)
 da cc 4c 4a 35 dd 6d d6 85 cd 2e 30 cf a8 24 e1
 5f bf 1d 09 99 f5 1f 80 dd 51 11 eb 9b c7 a4 bf
 01 89 3d 12
>> rakp4 mac key (sik) (32 bytes)
 05 79 bd d4 9f 70 eb d8 61 dd dd 26 b6 11 03 07
 2f ad 6e 6a 1d 2a 8d e5 2c 10 0a 59 2b 89 33 bd
>> rakp4 mac as computed by the BMC (32 bytes)
 3d 85 b6 e0 e9 44 84 e8 5a f6 b9 25 cc 8d a0 7b
 99 f5 1f 80 dd 51 11 eb 9b c7 a4 bf 01 89 3d 12
>> rakp4 mac as computed by the remote console (32 bytes)
 3d 85 b6 e0 e9 44 84 e8 5a f6 b9 25 cc 8d a0 7b
 ac 7d e2 c9 f4 1b 56 49 26 58 b2 65 06 c0 49 9d
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x04

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
 c7 2b 27 9a 95 8c 39 0e ba 73 03 a6 2c d7 e5 3b
authcode input (48 bytes)
 06 c0 5f bf 1d 09 07 00 00 00 20 00 c7 2b 27 9a
 95 8c 39 0e ba 73 03 a6 2c d7 e5 3b 8a d5 80 c1
 3b 50 36 17 cd cc e5 dc c1 0c ff 0d ff ff 02 07
authcode output (16 bytes)
 b2 2d 2b 41 61 77 c4 f1 cb 60 6a b8 b8 70 70 ab
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 05
<<   Rs Lun     : 0
<<   Command    : 3b
<<   Compl Code : 0x00
set_session_privlvl (1 bytes)
 04
Set Session Privilege Level to ADMINISTRATOR


>> Sending IPMI command payload
>>    netfn   : 0x2c
>>    command : 0x3e
>>    data    : 0x00 0x02

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
 08 7b 5f 32 97 92 56 f1 f0 0d 33 ad 94 40 39 95
authcode input (48 bytes)
 06 c0 5f bf 1d 09 08 00 00 00 20 00 08 7b 5f 32
 97 92 56 f1 f0 0d 33 ad 94 40 39 95 f9 ee 17 8b
 67 04 ef d4 0d ae 0b bb bc 9e 78 e3 ff ff 02 07
authcode output (16 bytes)
 4b 93 76 40 42 38 ac 80 f0 5f 12 f4 74 97 f3 35
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 2d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 06
<<   Rs Lun     : 0
<<   Command    : 3e
<<   Compl Code : 0xc1
IPM Controller is not HPM.2 compatible

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x01
>>    data    :

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
 20 76 c4 e1 87 88 8e 92 c6 5b 1e 45 67 0e 11 98
authcode input (48 bytes)
 06 c0 5f bf 1d 09 09 00 00 00 20 00 20 76 c4 e1
 87 88 8e 92 c6 5b 1e 45 67 0e 11 98 63 11 f5 59
 92 4d f0 5b a6 ca 16 0c 91 49 19 2f ff ff 02 07
authcode output (16 bytes)
 00 89 ae eb 7b f6 8d 2c 11 ab b1 29 1f 2f 68 6f
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000003
<<   IPMI Msg/Payload Length : 48
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 07
<<   Rs Lun     : 0
<<   Command    : 01
<<   Compl Code : 0x00
Iana: 343
Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20

>> Sending IPMI command payload
>>    netfn   : 0x2c
>>    command : 0x00
>>    data    : 0x00

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
 c1 49 da 98 c8 2d 63 20 f1 36 40 3b cf b2 6c 3c
authcode input (48 bytes)
 06 c0 5f bf 1d 09 0a 00 00 00 20 00 c1 49 da 98
 c8 2d 63 20 f1 36 40 3b cf b2 6c 3c e1 c4 40 67
 0c 7a d9 8f 19 fa 31 0d e8 4e 7f ae ff ff 02 07
authcode output (16 bytes)
 4c ca 73 98 4b a0 c6 29 22 82 33 a4 07 2d 46 18
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000004
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 2d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 08
<<   Rs Lun     : 0
<<   Command    : 00
<<   Compl Code : 0xc1
Error response 0xc1 from Get PICMG Properities
Running Get VSO Capabilities my_addr 0x20, transit 0, target 0x20

>> Sending IPMI command payload
>>    netfn   : 0x2c
>>    command : 0x00
>>    data    : 0x03

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
 0d 04 a9 8b 89 05 09 4a 8a 4c a7 b7 8a 5f f2 0a
authcode input (48 bytes)
 06 c0 5f bf 1d 09 0b 00 00 00 20 00 0d 04 a9 8b
 89 05 09 4a 8a 4c a7 b7 8a 5f f2 0a 85 75 8d 16
 63 80 1c 39 e3 57 12 2d fe 74 e5 2f ff ff 02 07
authcode output (16 bytes)
 d6 73 32 85 ed 11 29 f9 30 44 64 9e eb 9c 77 2f
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000005
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 2d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 09
<<   Rs Lun     : 0
<<   Command    : 00
<<   Compl Code : 0xc1
Invalid completion code received: Invalid command
Acquire IPMB address
Discovered IPMB address 0x0
Interface address: my_addr 0x20 transit 0:0 target 0x20:0 ipmb_target 0


>> Sending IPMI command payload
>>    netfn   : 0x00
>>    command : 0x01
>>    data    :

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
 f6 1e 36 d6 42 e6 f3 aa e4 d5 35 52 92 53 26 f9
authcode input (48 bytes)
 06 c0 5f bf 1d 09 0c 00 00 00 20 00 f6 1e 36 d6
 42 e6 f3 aa e4 d5 35 52 92 53 26 f9 60 60 1e ff
 8f 37 ea 8f 63 2e a7 ac 9d fa 41 30 ff ff 02 07
authcode output (16 bytes)
 bd 20 2c 5e 92 5a 3b ac 21 bc 09 2c 0f 2f 20 0e
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000006
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 01
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 0a
<<   Rs Lun     : 0
<<   Command    : 01
<<   Compl Code : 0x00
System Power         : on
Power Overload       : false
Power Interlock      : inactive
Main Power Fault     : false
Power Control Fault  : false
Power Restore Policy : always-off
Last Power Event     :
Chassis Intrusion    : inactive
Front-Panel Lockout  : inactive
Drive Fault          : false
Cooling/Fan Fault    : false
Sleep Button Disable : not allowed
Diag Button Disable  : allowed
Reset Button Disable : allowed
Power Button Disable : allowed
Sleep Button Disabled: false
Diag Button Disabled : false
Reset Button Disabled: false
Power Button Disabled: false

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0x5f 0xbf 0x1d 0x09

BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
 d7 26 e3 db 6e 17 47 86 dc 27 23 f8 3a cf 7e 18
authcode input (48 bytes)
 06 c0 5f bf 1d 09 0d 00 00 00 20 00 d7 26 e3 db
 6e 17 47 86 dc 27 23 f8 3a cf 7e 18 20 97 76 12
 32 34 ce 88 f2 b6 7d a4 34 33 95 32 ff ff 02 07
authcode output (16 bytes)
 86 91 9b 31 53 f5 bf d7 b4 9a 32 34 49 37 08 5b
<< IPMI Response Session Header
<<   Authtype                : RMCP+
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000007
<<   IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 0b
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0x00
Closed Session 091dbf5f

Best,
Devon

On 10/27/22 4:10 PM, Al Chu11 wrote:
Hi Devon,

Thanks,  Could you also send me the ipmitool debug output equivalent as well?  I think its

ipmitool -I lanplus -U admin -P $PWORD -H host-bmc -vvv chassis status

wondering if there's some tiny subtlety i'm forgetting.


Al

On 10/27/22 14:48, Bautista, Devon Thomas wrote:

Hi Al,

Thank you for the quick reply.

Could you try some of the workaround flags in ipmipower.  Most notably the "intel20" workaround flag, but perhaps the "opensesspriv" one as well as its been seen on some intel motherboards too.

I passed "intel20", "opensesspriv", and "intel20,opensesspriv" to the "-W" flag with the same result: BMC busy.

Another thing to try would be to try using the "admin" privilege instead of the "operator" one (which ipmipower defaults to).

I passed "-l ADMIN" to the command line, with and without each of the workaround combinations aforementioned with the same result: BMC busy.

If that doesn't work, could you send me the full --debug output.

Here is the full debug output for the original command I ran:

$ ipmipower -D LAN_2_0 -h host-bmc -u admin -p $PWORD
ipmipower> stat
host-bmc: BMC busy
ipmipower> debug
debugging is now on
ipmipower> stat
host-bmc: =====================================================
host-bmc: IPMI 2.0 Get Channel Authentication Capabilities Request
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [               6h] = version[ 8b]
host-bmc: [               0h] = reserved[ 8b]
host-bmc: [              FFh] = sequence_number[ 8b]
host-bmc: [               7h] = message_class.class[ 5b]
host-bmc: [               0h] = message_class.reserved[ 2b]
host-bmc: [               0h] = message_class.ack[ 1b]
host-bmc: IPMI Session Header:
host-bmc: --------------------
host-bmc: [               0h] = authentication_type[ 8b]
host-bmc: [               0h] = session_sequence_number[32b]
host-bmc: [               0h] = session_id[32b]
host-bmc: [               9h] = ipmi_msg_len[ 8b]
host-bmc: IPMI Message Header:
host-bmc: --------------------
host-bmc: [              20h] = rs_addr[ 8b]
host-bmc: [               0h] = rs_lun[ 2b]
host-bmc: [               6h] = net_fn[ 6b]
host-bmc: [              C8h] = checksum1[ 8b]
host-bmc: [              81h] = rq_addr[ 8b]
host-bmc: [               0h] = rq_lun[ 2b]
host-bmc: [              3Ah] = rq_seq[ 6b]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [              38h] = cmd[ 8b]
host-bmc: [               Eh] = channel_number[ 4b]
host-bmc: [               0h] = reserved1[ 3b]
host-bmc: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
host-bmc: [               3h] = maximum_privilege_level[ 4b]
host-bmc: [               0h] = reserved2[ 4b]
host-bmc: IPMI Trailer:
host-bmc: --------------
host-bmc: [              CEh] = checksum2[ 8b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Get Channel Authentication Capabilities Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [               6h] = version[ 8b]
host-bmc: [               0h] = reserved[ 8b]
host-bmc: [              FFh] = sequence_number[ 8b]
host-bmc: [               7h] = message_class.class[ 5b]
host-bmc: [               0h] = message_class.reserved[ 2b]
host-bmc: [               0h] = message_class.ack[ 1b]
host-bmc: IPMI Session Header:
host-bmc: --------------------
host-bmc: [               0h] = authentication_type[ 8b]
host-bmc: [               0h] = session_sequence_number[32b]
host-bmc: [               0h] = session_id[32b]
host-bmc: [              10h] = ipmi_msg_len[ 8b]
host-bmc: IPMI Message Header:
host-bmc: --------------------
host-bmc: [              81h] = rq_addr[ 8b]
host-bmc: [               0h] = rq_lun[ 2b]
host-bmc: [               7h] = net_fn[ 6b]
host-bmc: [              63h] = checksum1[ 8b]
host-bmc: [              20h] = rs_addr[ 8b]
host-bmc: [               0h] = rs_lun[ 2b]
host-bmc: [              3Ah] = rq_seq[ 6b]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [              38h] = cmd[ 8b]
host-bmc: [               0h] = comp_code[ 8b]
host-bmc: [               1h] = channel_number[ 8b]
host-bmc: [               0h] = authentication_type.none[ 1b]
host-bmc: [               0h] = authentication_type.md2[ 1b]
host-bmc: [               0h] = authentication_type.md5[ 1b]
host-bmc: [               0h] = authentication_type.reserved1[ 1b]
host-bmc: [               0h] = authentication_type.straight_password_key[ 1b]
host-bmc: [               0h] = authentication_type.oem_prop[ 1b]
host-bmc: [               0h] = authentication_type.reserved2[ 1b]
host-bmc: [               1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] host-bmc: [               0h] = authentication_status.anonymous_login[ 1b]
host-bmc: [               0h] = authentication_status.null_username[ 1b]
host-bmc: [               1h] = authentication_status.non_null_username[ 1b] host-bmc: [               0h] = authentication_status.user_level_authentication[ 1b] host-bmc: [               0h] = authentication_status.per_message_authentication[ 1b]
host-bmc: [               0h] = authentication_status.k_g[ 1b]
host-bmc: [               0h] = authentication_status.reserved[ 2b]
host-bmc: [               1h] = channel_supports_ipmi_v1.5_connections[ 1b] host-bmc: [               1h] = channel_supports_ipmi_v2.0_connections[ 1b]
host-bmc: [               0h] = reserved[ 6b]
host-bmc: [               0h] = oem_id[24b]
host-bmc: [               0h] = oem_auxiliary_data[ 8b]
host-bmc: IPMI Trailer:
host-bmc: --------------
host-bmc: [              38h] = checksum2[ 8b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Request
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [               6h] = version[ 8b]
host-bmc: [               0h] = reserved[ 8b]
host-bmc: [              FFh] = sequence_number[ 8b]
host-bmc: [               7h] = message_class.class[ 5b]
host-bmc: [               0h] = message_class.reserved[ 2b]
host-bmc: [               0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [               6h] = authentication_type[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [              10h] = payload_type[ 6b]
host-bmc: [               0h] = payload_type.authenticated[ 1b]
host-bmc: [               0h] = payload_type.encrypted[ 1b]
host-bmc: [               0h] = session_id[32b]
host-bmc: [               0h] = session_sequence_number[32b]
host-bmc: [              20h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [  BYTE ARRAY ... ] = payload_data[32B]
host-bmc: [ CAh 00h 00h 00h 43h 43h D7h BEh ]
host-bmc: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [              CAh] = message_tag[ 8b]
host-bmc: [               0h] = requested_maximum_privilege_level[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [               0h] = reserved2[16b]
host-bmc: [        BED74343h] = remote_console_session_id[32b]
host-bmc: [               0h] = authentication_payload.payload_type[ 8b]
host-bmc: [               0h] = reserved3[16b]
host-bmc: [               8h] = authentication_payload.payload_length[ 8b] host-bmc: [               1h] = authentication_payload.authentication_algorithm[ 6b]
host-bmc: [               0h] = reserved4[ 2b]
host-bmc: [               0h] = reserved5[24b]
host-bmc: [               1h] = integrity_payload.payload_type[ 8b]
host-bmc: [               0h] = reserved6[16b]
host-bmc: [               8h] = integrity_payload.payload_length[ 8b]
host-bmc: [               1h] = integrity_payload.integrity_algorithm[ 6b]
host-bmc: [               0h] = reserved7[ 2b]
host-bmc: [               0h] = reserved8[24b]
host-bmc: [               2h] = confidentiality_payload.payload_type[ 8b]
host-bmc: [               0h] = reserved9[16b]
host-bmc: [               8h] = confidentiality_payload.payload_length[ 8b] host-bmc: [               1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
host-bmc: [               0h] = reserved10[ 2b]
host-bmc: [               0h] = reserved11[24b]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [               6h] = version[ 8b]
host-bmc: [               0h] = reserved[ 8b]
host-bmc: [              FFh] = sequence_number[ 8b]
host-bmc: [               7h] = message_class.class[ 5b]
host-bmc: [               0h] = message_class.reserved[ 2b]
host-bmc: [               0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [               6h] = authentication_type[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [              11h] = payload_type[ 6b]
host-bmc: [               0h] = payload_type.authenticated[ 1b]
host-bmc: [               0h] = payload_type.encrypted[ 1b]
host-bmc: [               0h] = session_id[32b]
host-bmc: [               0h] = session_sequence_number[32b]
host-bmc: [               8h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [  BYTE ARRAY ... ] = payload_data[ 8B]
host-bmc: [ CAh 01h 00h 00h 43h 43h D7h BEh ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [              CAh] = message_tag[ 8b]
host-bmc: [               1h] = rmcpplus_status_code[ 8b]
host-bmc: [               0h] = maximum_privilege_level[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [               0h] = reserved2[ 8b]
host-bmc: [        BED74343h] = remote_console_session_id[32b]
(ipmipower_check.c, ipmipower_check_rmcpplus_status_code, 713): host = host-bmc; p = 4; rmcpplus_status_code failed: 1h
host-bmc: BMC busy

Let me know if you would like the debug output of the workaround/privilege command line variants as well.

Best,
Devon

On 10/27/22 2:58 PM, Al Chu11 wrote:
Hi Devon,

Could you try some of the workaround flags in ipmipower.  Most notably the "intel20" workaround flag, but perhaps the "opensesspriv" one as well as its been seen on some intel motherboards too.

Another thing to try would be to try using the "admin" privilege instead of the "operator" one (which ipmipower defaults to). I've seen some motherboards simply ignore the privilege that the user specifies and just assume "admin" is used by the user all of the time (ipmitool defaults to "admin").

If that doesn't work, could you send me the full --debug output. intel has had a rash of authentication corner cases, so hopefully this is not a new one or one that was previously missed.

Al

On 10/27/22 13:16, Bautista, Devon Thomas via Freeipmi-users wrote:
Hello,

I have a few Intel M50CYP boards that I can get to work with ipmitool, but not FreeIPMI.

I can successfully run power commands and activate sol via, e.g:

ipmitool -I lanplus -U admin -P $PWORD -H host-bmc sol activate

However, when I run `ipmipower' or `ipmiconsole', I get "BMC busy". When I turn on debugging, e.g., and try to stat the power with `ipmipower', I get an exit code of 0x1 which, according to Table 13 of the IPMI Specification, means "Insufficient resources to create a session". This is strange, considering I can use ipmitool to start a sol session just fine.

The output of the above ipmipower example (trimmed) is as follows:

$ ipmipower -D LAN_2_0 -h host-bmc -u admin -p $PWORD
ipmipower> debug
debugging is now on
ipmipower> stat
[...]
host-bmc: =====================================================
host-bmc: IPMI 2.0 Open Session Response
host-bmc: =====================================================
host-bmc: RMCP Header:
host-bmc: ------------
host-bmc: [               6h] = version[ 8b]
host-bmc: [               0h] = reserved[ 8b]
host-bmc: [              FFh] = sequence_number[ 8b]
host-bmc: [               7h] = message_class.class[ 5b]
host-bmc: [               0h] = message_class.reserved[ 2b]
host-bmc: [               0h] = message_class.ack[ 1b]
host-bmc: IPMI RMCPPLUS Session Header:
host-bmc: -----------------------------
host-bmc: [               6h] = authentication_type[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [              11h] = payload_type[ 6b]
host-bmc: [               0h] = payload_type.authenticated[ 1b]
host-bmc: [               0h] = payload_type.encrypted[ 1b]
host-bmc: [               0h] = session_id[32b]
host-bmc: [               0h] = session_sequence_number[32b]
host-bmc: [               8h] = ipmi_payload_len[16b]
host-bmc: IPMI RMCPPLUS Payload:
host-bmc: ----------------------
host-bmc: [  BYTE ARRAY ... ] = payload_data[ 8B]
host-bmc: [ CAh 01h 00h 00h 43h 43h D7h BEh ]
host-bmc: IPMI Command Data:
host-bmc: ------------------
host-bmc: [              CAh] = message_tag[ 8b]
host-bmc: [               1h] = rmcpplus_status_code[ 8b]
host-bmc: [               0h] = maximum_privilege_level[ 4b]
host-bmc: [               0h] = reserved1[ 4b]
host-bmc: [               0h] = reserved2[ 8b]
host-bmc: [        BED74343h] = remote_console_session_id[32b]
(ipmipower_check.c, ipmipower_check_rmcpplus_status_code, 713): host = host-bmc; p = 4; rmcpplus_status_code failed: 1h
host-bmc: BMC busy

I have updated the board firmware and BMC firmware to the latest version provided by Intel with the same result. Is there any further troubleshooting I could perform? Let me know if you would like the full debug output.

Regards,
Devon


_______________________________________________
Freeipmi-users mailing list
Freeipmi-users@gnu.org
https://urldefense.com/v3/__https://lists.gnu.org/mailman/listinfo/freeipmi-users__;!!Bt8fGhp8LhKGRg!DT2qkjffOPodKoo1HhFQEJWh2Cq-IYoMnYn09-VB50EE6LY-vnBbvaGry8fvEfMoypOKnpufiUxO-tQ$






Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]