Hello,

I'm facing a problem when trying to send a bridged request to a shelf 
manager MC. The request is correctly sent to the right address 
(specified with the -t option), but it seems there's a mess with the 
response data.

I guess that some message header is not removed when interpreting the 
response data. From your point of view, is it the ShMC that should not 
include this header, or a bug in ipmitool? The spec is not clear whether 
such a header should be present or not.

The example below shows the behaviour: I try to send a bridged "Get FRU 
inventory area info" command followed by a bridged "Read FRU data" 
command to address 0xbe. I've hacked the code to dump the FRU info data. 
In fact the first 6 bytes are not the payload data response, but rather 
some message header of the form (rqAddr, netFn/LUN, chksum, rqAddr, 
rqSeq, cmd). There's the same thing for the FRU raw data response.

Thanks for any hint (even to explain what the spec actually says about 
those headers).


ipmitool -vvv -P "" -H shelfman -t 0xbe fru
...
ipmi_lan_send_cmd:opened=[1], open=[134687428]
 >> IPMI Request Session Header
 >>   Authtype   : MD5
 >>   Sequence   : 0x00000002
 >>   Session ID : 0x00000001
 >> IPMI Request Message Header
 >>   Rs Addr    : be
 >>   NetFn      : 0a
 >>   Rs LUN     : 0
 >>   Rq Addr    : 81
 >>   Rq Seq     : 04
 >>   Rq Lun     : 0
 >>   Command    : 10
send_packet (46 bytes)
 06 00 ff 07 02 02 00 00 00 01 00 00 00 57 df 86
 e1 83 1d fb 58 6a 1d fc 4e 49 d6 c6 20 10 20 18
 c8 81 10 34 40 be 28 1a 20 10 10 00 c0 fb
ipmi message header (49 bytes)
 06 00 ff 07 02 27 0e 68 1e 01 00 00 00 e8 f9 e8
 a1 ce d0 19 39 3b a1 5f 31 ca 9b 9b 4e 13 81 1c
 63 20 10 34 00 20 2c b4 be c0 10 00 00 08 00 6a
 9c
<< IPMI Response Session Header
<<   Authtype   : MD5
<<   Sequence   : 0x1e680e27
<<   Session ID : 0x00000001
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 04
<<   Rs Lun     : 0
<<   Command    : 34
<<   Compl Code : 0x00
FRU INFO (10 bytes)
 20 2c b4 be c0 10 00 00 08 00
fru.size = 11296 bytes (accessed by bytes)
ipmi_lan_send_cmd:opened=[1], open=[134687428]
 >> IPMI Request Session Header
 >>   Authtype   : MD5
 >>   Sequence   : 0x00000003
 >>   Session ID : 0x00000001
 >> IPMI Request Message Header
 >>   Rs Addr    : be
 >>   NetFn      : 0a
 >>   Rs LUN     : 0
 >>   Rq Addr    : 81
 >>   Rq Seq     : 05
 >>   Rq Lun     : 0
 >>   Command    : 11
send_packet (49 bytes)
 06 00 ff 07 02 03 00 00 00 01 00 00 00 47 b6 48
 1b 9a 84 e9 8a f6 ee ab 59 66 56 12 b7 13 20 18
 c8 81 14 34 40 be 28 1a 20 14 11 00 00 00 08 b3
 f7
ipmi message header (55 bytes)
 06 00 ff 07 02 28 0e 68 1e 01 00 00 00 8c c5 fa
 7f 01 96 d0 0f ab a7 29 13 f8 10 4d f1 19 81 1c
 63 20 14 34 00 20 2c b4 be c4 11 00 08 01 01 00
 0a 14 00 00 e0 65 98
<< IPMI Response Session Header
<<   Authtype   : MD5
<<   Sequence   : 0x1e680e28
<<   Session ID : 0x00000001
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 05
<<   Rs Lun     : 0
<<   Command    : 34
<<   Compl Code : 0x00
FRU DATA (17 bytes)
 20 2c b4 be c4 11 00 08 01 01 00 0a 14 00 00 e0
 65
 Unknown FRU header version 0x2c
...


Regards,

-- 
BenoƮt Guillon                [EMAIL PROTECTED]
TCT/3S                        tel. : 33 (0)4 98 16 33 90
 
THALES COMPUTERS


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier.
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to