Hi Al, after an update of the IPMI firmware (from v3.15 to 3.40) on four systems with Supermicro X9DR7-LN4F mainboard, IPMI queries with ipmi-sel or ipmi-sensors via LAN fail with the following error:
ipmi_ctx_open_outofband_2_0: bad completion code We have already tried to upload the firmware again (without preserving configuration), but this did not help. We are using this command (ipmi.cfg has username/password): /usr/sbin/ipmi-sel -h [IP] --config-file /etc/ipmi/ipmi.cfg --driver-type=LAN_2_0 --output-event-state --interpret-oem-data --entity-sensor-names --sensor-types=all We also executed the command with --debug. I've attached the output (partially, because I'm not sure whether there may be sensitive data in it as RAKP can be brute-force attacked). Of course we could try to remove power down the servers and pull power chords, and test again. But as these are production systems I'd want to ask whether you have any idea or if there is a workaround. PS: with firmware v3.15 we had no issues. I have tested the firmware 3.40 on another system with X9SCM-F, but I do not get any errors there. Thanks for your help, best regards, Werner
10.10.5.6: ===================================================== 10.10.5.6: IPMI 1.5 Get Channel Authentication Capabilities Request 10.10.5.6: ===================================================== 10.10.5.6: RMCP Header: 10.10.5.6: ------------ 10.10.5.6: [ 6h] = version[ 8b] 10.10.5.6: [ 0h] = reserved[ 8b] 10.10.5.6: [ FFh] = sequence_number[ 8b] 10.10.5.6: [ 7h] = message_class.class[ 5b] 10.10.5.6: [ 0h] = message_class.reserved[ 2b] 10.10.5.6: [ 0h] = message_class.ack[ 1b] [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 Open Session Request 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 Open Session Response 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 RAKP Message 1 Request 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 RAKP Message 2 Response 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 RAKP Message 3 Request 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 RAKP Message 4 Response 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 Set Session Privilege Level Request 10.10.5.6: ===================================================== [...] 10.10.5.6: ===================================================== 10.10.5.6: IPMI 2.0 Set Session Privilege Level Response 10.10.5.6: ===================================================== 10.10.5.6: RMCP Header: 10.10.5.6: ------------ 10.10.5.6: [ 6h] = version[ 8b] 10.10.5.6: [ 0h] = reserved[ 8b] 10.10.5.6: [ FFh] = sequence_number[ 8b] 10.10.5.6: [ 7h] = message_class.class[ 5b] 10.10.5.6: [ 0h] = message_class.reserved[ 2b] 10.10.5.6: [ 0h] = message_class.ack[ 1b] 10.10.5.6: IPMI RMCPPLUS Session Header: 10.10.5.6: ----------------------------- 10.10.5.6: [ 6h] = authentication_type[ 4b] 10.10.5.6: [ 0h] = reserved1[ 4b] 10.10.5.6: [ 0h] = payload_type[ 6b] 10.10.5.6: [ 1h] = payload_type.authenticated[ 1b] 10.10.5.6: [ 1h] = payload_type.encrypted[ 1b] 10.10.5.6: [ 6D356EB4h] = session_id[32b] 10.10.5.6: [ 1h] = session_sequence_number[32b] 10.10.5.6: [ 20h] = ipmi_payload_len[16b] 10.10.5.6: IPMI RMCPPLUS Payload: 10.10.5.6: ---------------------- 10.10.5.6: [ BYTE ARRAY ... ] = confidentiality_header[16B] [...] 10.10.5.6: [ 707060504030201h] = confidentiality_trailer[64b] 10.10.5.6: IPMI Message Header: 10.10.5.6: -------------------- 10.10.5.6: [ 81h] = rq_addr[ 8b] 10.10.5.6: [ 0h] = rq_lun[ 2b] 10.10.5.6: [ 7h] = net_fn[ 6b] 10.10.5.6: [ 63h] = checksum1[ 8b] 10.10.5.6: [ 20h] = rs_addr[ 8b] 10.10.5.6: [ 0h] = rs_lun[ 2b] 10.10.5.6: [ 16h] = rq_seq[ 6b] 10.10.5.6: IPMI Command Data: 10.10.5.6: ------------------ 10.10.5.6: [ 3Bh] = cmd[ 8b] 10.10.5.6: [ 80h] = comp_code[ 8b] 10.10.5.6: IPMI Trailer: 10.10.5.6: ------------- 10.10.5.6: [ CDh] = checksum2[ 8b] 10.10.5.6: IPMI RMCPPLUS Session Trailer: 10.10.5.6: ------------------------------ 10.10.5.6: [ FFFFh] = integrity_pad[16b] 10.10.5.6: [ 2h] = pad_length[ 8b] 10.10.5.6: [ 7h] = next_header[ 8b] 10.10.5.6: [ BYTE ARRAY ... ] = authentication_code[12B] 10.10.5.6: [ F7h C9h 4Fh 1Ch 27h E0h F0h CDh ] 10.10.5.6: [ A9h 3Fh 7Eh 43h ] ipmi_ctx_open_outofband_2_0: bad completion code
_______________________________________________ Freeipmi-users mailing list Freeipmi-users@gnu.org https://lists.gnu.org/mailman/listinfo/freeipmi-users