Hey Alexey, May not be the case for your systems, but some systems, the redirection should go to serial port B/serial port 2 and TTYS1 etc. It may be worth a shot.
Al On Thu, 2008-10-30 at 00:44 +0300, Alexey Vlasov wrote: > Hi. > > I have a problem with setup of console redirection in server chassis > Intel SR1500 and ipmitool. > > My setup in BIOS: > > console redirections. > * serial port A > * flow control - none > * rate - 38.4K > * terminal type - VT100 > * legacy OS redirection - disabled > > serial port configuration. > * serial A - enable > * address - 3F8 > * IRQ - 4 > > Setup of the boot loader and agetty: > /etc/grub/grub.conf > ========= > serial --unit=0 ---speed=38400 --word=8 --parity=no > terminal --timeout=0 serial console > > kernel /boot/vmlinuz root=/dev/sda1 console=tty0 > console=ttyS0,38400n8 > ========= > /etc/inittab > ========= > s0:2345:repswan:/sbin/agetty -L 57600 vt100 > s1:2345:repswan:/sbin/agetty -L 57600 vt100 > ========= > > # ps ax | grep agetty > 4295 tty1 Ss+ 0:00 /sbin/agetty 38400 tty1 linux > 4296 tty2 Ss+ 0:00 /sbin/agetty 38400 tty2 linux > 4297 tty3 Ss+ 0:00 /sbin/agetty 38400 tty3 linux > 4298 tty4 Ss+ 0:00 /sbin/agetty 38400 tty4 linux > 4299 tty5 Ss+ 0:00 /sbin/agetty 38400 tty5 linux > 4300 tty6 Ss+ 0:00 /sbin/agetty 38400 tty6 linux > 4301 ttyS0 Ss+ 0:00 /sbin/agetty -L 38400 ttyS0 vt100 > 4302 ttyS1 Ss+ 0:00 /sbin/agetty -L 38400 ttyS1 vt100 > > # dmesg | grep tty > Kernel command line: root=/dev/sda1 ro console=tty0 > console=ttyS0,38400n8 > console [tty0] enabled > console [ttyS0] enabled > serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A > serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A > 00:07: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A > > What I'm trying to do: > > ipmitool -I lanplus -H 192.168.0.61 -o intelplus set enabled true > ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol payload enable > ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol activate > IPMI LAN host 192.168.0.61 port 623 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x38 > >> data : 0x8e 0x04 > > BUILDING A v1.5 COMMAND > >> IPMI Request Session Header > >> Authtype : NONE > >> Sequence : 0x00000000 > >> Session ID : 0x00000000 > >> IPMI Request Message Header > >> Rs Addr : 20 > >> NetFn : 06 > >> Rs LUN : 0 > >> Rq Addr : 81 > >> Rq Seq : 00 > >> Rq Lun : 0 > >> Command : 38 > << IPMI Response Session Header > << Authtype : NONE > << Payload type : IPMI (0) > << Session ID : 0x00000000 > << Sequence : 0x00000000 > << IPMI Msg/Payload Length : 16 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 00 > << Rs Lun : 0 > << Command : 38 > << Compl Code : 0x00 > >> SENDING AN OPEN SESSION REQUEST > > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : admin > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x0ee5f2a9 > << Negotiated authenticatin algorithm : hmac_sha1 > << Negotiated integrity algorithm : hmac_sha1_96 > << Negotiated encryption algorithm : aes_cbc_128 > > >> Console generated random number (16 bytes) > 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 > >> SENDING A RAKP 1 MESSAGE > > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0x2f597e510866238ba23b8f032c38d615 > << BMC GUID : 0xebc651dc64c511dcabcd000bab086eb6 > << Key exchange auth code [sha1] : > 0x0b7bc9902873c85d4125d27624a9ab56bac7e56f > > bmc_rand (16 bytes) > 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 > >> rakp2 mac input buffer (58 bytes) > a4 a3 a2 a0 a9 f2 e5 0e 55 1b 88 b2 79 5a 1f 94 > 57 fa a2 a7 56 cb 77 c1 2f 59 7e 51 08 66 23 8b > a2 3b 8f 03 2c 38 d6 15 eb c6 51 dc 64 c5 11 dc > ab cd 00 0b ab 08 6e b6 14 00 > >> rakp2 mac key (20 bytes) > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 > >> rakp2 mac as computed by the remote console (20 bytes) > 0b 7b c9 90 28 73 c8 5d 41 25 d2 76 24 a9 ab 56 > ba c7 e5 6f > >> rakp3 mac input buffer (22 bytes) > 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 > a4 a3 a2 a0 04 00 > >> rakp3 mac key (20 bytes) > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 > generated rakp3 mac (20 bytes) > 48 b1 d9 fb c9 f4 33 0b c5 f3 d1 a4 c1 ca df be > f4 64 6c 22 > session integrity key input (34 bytes) > 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 > 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 > 14 00 > Generated session integrity key (20 bytes) > 14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88 ab 49 > c4 2b 70 f5 > Generated K1 (20 bytes) > 32 8a c5 05 ec 16 31 c6 20 a1 6b 5f a6 5a 32 df > 04 e3 80 98 > Generated K2 (20 bytes) > 7c bd 39 af 23 48 01 e8 dd f5 e3 19 dd f7 4f 3c > 1b 5c fc 3e > >> SENDING A RAKP 3 MESSAGE > > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code [sha1] : > 0x594ac682178bc09c2278cad8 > > >> rakp4 mac input buffer (36 bytes) > 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 > c1 > a9 f2 e5 0e eb c6 51 dc 64 c5 11 dc ab cd 00 > 0b > ab 08 6e b6 > >> rakp4 mac key (sik) (20 bytes) > 14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88 > ab 49 > c4 2b 70 f5 > >> rakp4 mac as computed by the BMC (20 > >> bytes) > 59 4a c6 82 17 8b c0 9c 22 78 ca d8 2c 38 > d6 15 > eb c6 51 dc > >> rakp4 mac as computed by the remote > >> console (20 bytes) > 59 4a c6 82 17 8b c0 9c 22 78 ca d8 4b > 6c 47 a7 > 17 3a 2c f4 > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3b > >> data : 0x04 > > BUILDING A v2 COMMAND > >> Initialization vector (16 bytes) > 80 49 e8 ff 11 bd 65 d7 bf 30 9f a3 > 8b 6b 37 90 > authcode input (48 bytes) > 06 c0 a9 f2 e5 0e 03 00 00 00 20 00 > 80 49 e8 ff > 11 bd 65 d7 bf 30 9f a3 8b 6b 37 90 > 0e b5 84 a5 > 80 1a 9f a2 86 18 be ff a0 19 bf > 1f ff ff 02 07 > authcode output (12 bytes) > 54 6a 89 7e ec 4f a1 cc 39 3d c7 > e2 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000001 > << IPMI Msg/Payload Length : 32 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 01 > << Rs Lun : 0 > << Command : 3b > << Compl Code : 0x00 > set_session_privlvl (1 bytes) > 04 > Set Session Privilege Level to > ADMINISTRATOR > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x48 > >> data : 0x01 0x01 0xc4 > >> 0x00 0x00 0x00 > > BUILDING A v2 COMMAND > >> Initialization vector (16 > >> bytes) > ba a7 a4 3e 00 9b 8b 4d 6e 1c > 05 b7 29 b9 bf 62 > authcode input (48 bytes) > 06 c0 a9 f2 e5 0e 04 00 00 00 > 20 00 ba a7 a4 3e > 00 9b 8b 4d 6e 1c 05 b7 29 b9 > bf 62 de c3 86 89 > 59 02 75 38 15 8d ec 62 aa > 52 22 d8 ff ff 02 07 > authcode output (12 bytes) > 10 3a 42 ea 9f d2 ea 54 a8 > 47 e5 e0 > << IPMI Response Session > Header > << Authtype > : Unknown (0x6) > << Payload type > : IPMI (0) > << Session ID > : 0xa0a2a3a4 > << Sequence > : 0x00000002 > << IPMI Msg/Payload > Length : 48 > << IPMI Response Message > Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 02 > << Rs Lun : 0 > << Command : 48 > << Compl Code : 0x00 > [SOL Session operational. Use ~? for help] > > After sol activate I see only: > ========== > [SOL Session operational. Use ~? for help] > ========== > > Where have I gone wrong? Has anyone ever tried to setup console > redirection on SR1500? > If there's any information more needed I will post it. Thanks in > advance. > > -- > BRGDS. Alexey Vlasov. > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http:// moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Ipmitool-devel mailing list > Ipmitool-devel@lists.sourceforge.net > https:// lists.sourceforge.net/lists/listinfo/ipmitool-devel > -- Albert Chu [EMAIL PROTECTED] Computer Scientist High Performance Systems Division Lawrence Livermore National Laboratory ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel