Hey Alexey,

May not be the case for your systems, but some systems, the redirection
should go to serial port B/serial port 2 and TTYS1 etc.  It may be worth
a shot.

Al

On Thu, 2008-10-30 at 00:44 +0300, Alexey Vlasov wrote:
> Hi.
> 
> I have a problem with setup of console redirection in server chassis
> Intel SR1500 and ipmitool.
> 
> My setup in BIOS:
> 
> console redirections.
> * serial port A
> * flow control - none
> * rate - 38.4K
> * terminal type - VT100
> * legacy OS redirection - disabled
> 
> serial port configuration.
> * serial A - enable
> * address - 3F8
> * IRQ - 4
> 
> Setup of the boot loader and agetty:
> /etc/grub/grub.conf
> =========
> serial --unit=0 ---speed=38400 --word=8 --parity=no
> terminal --timeout=0 serial console
> 
> kernel /boot/vmlinuz root=/dev/sda1 console=tty0
> console=ttyS0,38400n8
> =========
> /etc/inittab
> =========
> s0:2345:repswan:/sbin/agetty -L 57600 vt100
> s1:2345:repswan:/sbin/agetty -L 57600 vt100
> =========
> 
> # ps ax | grep agetty
> 4295 tty1     Ss+    0:00 /sbin/agetty 38400 tty1 linux
> 4296 tty2     Ss+    0:00 /sbin/agetty 38400 tty2 linux
> 4297 tty3     Ss+    0:00 /sbin/agetty 38400 tty3 linux
> 4298 tty4     Ss+    0:00 /sbin/agetty 38400 tty4 linux
> 4299 tty5     Ss+    0:00 /sbin/agetty 38400 tty5 linux
> 4300 tty6     Ss+    0:00 /sbin/agetty 38400 tty6 linux
> 4301 ttyS0    Ss+    0:00 /sbin/agetty -L 38400 ttyS0 vt100
> 4302 ttyS1    Ss+    0:00 /sbin/agetty -L 38400 ttyS1 vt100
> 
> # dmesg | grep tty
> Kernel command line: root=/dev/sda1 ro console=tty0
> console=ttyS0,38400n8
> console [tty0] enabled
> console [ttyS0] enabled
> serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
> serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A
> 00:07: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
> 
> What I'm trying to do:
> 
> ipmitool -I lanplus -H 192.168.0.61 -o intelplus set enabled true
> ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol payload enable
> ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol activate
> IPMI LAN host 192.168.0.61 port 623
> 
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x38
> >>    data    : 0x8e 0x04
> 
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >>   Authtype   : NONE
> >>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
> >> IPMI Request Message Header
> >>   Rs Addr    : 20
> >>   NetFn      : 06
> >>   Rs LUN     : 0
> >>   Rq Addr    : 81
> >>   Rq Seq     : 00
> >>   Rq Lun     : 0
> >>   Command    : 38
> << IPMI Response Session Header
> <<   Authtype                : NONE
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0x00000000
> <<   Sequence                : 0x00000000
> <<   IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 00
> <<   Rs Lun     : 0
> <<   Command    : 38
> <<   Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
> 
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : admin
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x0ee5f2a9
> <<  Negotiated authenticatin algorithm : hmac_sha1
> <<  Negotiated integrity algorithm     : hmac_sha1_96
> <<  Negotiated encryption algorithm    : aes_cbc_128
> 
> >> Console generated random number (16 bytes)
>  55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1
> >> SENDING A RAKP 1 MESSAGE
> 
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0x2f597e510866238ba23b8f032c38d615
> <<  BMC GUID                      : 0xebc651dc64c511dcabcd000bab086eb6
> <<  Key exchange auth code [sha1] :
>  0x0b7bc9902873c85d4125d27624a9ab56bac7e56f
> 
> bmc_rand (16 bytes)
>  2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15
> >> rakp2 mac input buffer (58 bytes)
>  a4 a3 a2 a0 a9 f2 e5 0e 55 1b 88 b2 79 5a 1f 94
>  57 fa a2 a7 56 cb 77 c1 2f 59 7e 51 08 66 23 8b
>  a2 3b 8f 03 2c 38 d6 15 eb c6 51 dc 64 c5 11 dc
>  ab cd 00 0b ab 08 6e b6 14 00
> >> rakp2 mac key (20 bytes)
>  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>  00 00 00 00
> >> rakp2 mac as computed by the remote console (20 bytes)
>  0b 7b c9 90 28 73 c8 5d 41 25 d2 76 24 a9 ab 56
>  ba c7 e5 6f
> >> rakp3 mac input buffer (22 bytes)
>  2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15
>  a4 a3 a2 a0 04 00
> >> rakp3 mac key (20 bytes)
>  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>  00 00 00 00
>  generated rakp3 mac (20 bytes)
>  48 b1 d9 fb c9 f4 33 0b c5 f3 d1 a4 c1 ca df be
>  f4 64 6c 22
>  session integrity key input (34 bytes)
>  55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1
>  2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15
>  14 00
>  Generated session integrity key (20 bytes)
>  14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88 ab 49
>  c4 2b 70 f5
>  Generated K1 (20 bytes)
>  32 8a c5 05 ec 16 31 c6 20 a1 6b 5f a6 5a 32 df
>  04 e3 80 98
>  Generated K2 (20 bytes)
>  7c bd 39 af 23 48 01 e8 dd f5 e3 19 dd f7 4f 3c
>  1b 5c fc 3e
>  >> SENDING A RAKP 3 MESSAGE
> 
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code [sha1] :
>  0x594ac682178bc09c2278cad8
> 
> >> rakp4 mac input buffer (36 bytes)
>  55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77
>  c1
>  a9 f2 e5 0e eb c6 51 dc 64 c5 11 dc ab cd 00
>  0b
>  ab 08 6e b6
> >> rakp4 mac key (sik) (20 bytes)
>  14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88
>  ab 49
>  c4 2b 70 f5
> >> rakp4 mac as computed by the BMC (20
> >> bytes)
>  59 4a c6 82 17 8b c0 9c 22 78 ca d8 2c 38
>  d6 15
>  eb c6 51 dc
> >> rakp4 mac as computed by the remote
> >> console (20 bytes)
>  59 4a c6 82 17 8b c0 9c 22 78 ca d8 4b
>  6c 47 a7
>  17 3a 2c f4
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>                                   
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3b
> >>    data    : 0x04
> 
> BUILDING A v2 COMMAND
> >> Initialization vector (16 bytes)
>  80 49 e8 ff 11 bd 65 d7 bf 30 9f a3
>  8b 6b 37 90
>  authcode input (48 bytes)
>  06 c0 a9 f2 e5 0e 03 00 00 00 20 00
>  80 49 e8 ff
>  11 bd 65 d7 bf 30 9f a3 8b 6b 37 90
>  0e b5 84 a5
>  80 1a 9f a2 86 18 be ff a0 19 bf
>  1f ff ff 02 07
>  authcode output (12 bytes)
>  54 6a 89 7e ec 4f a1 cc 39 3d c7
>  e2
> << IPMI Response Session Header
> <<   Authtype     : Unknown (0x6)
> <<   Payload type : IPMI (0)
> <<   Session ID   : 0xa0a2a3a4
> <<   Sequence     : 0x00000001
> <<   IPMI Msg/Payload Length : 32
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 01
> <<   Rs Lun     : 0
> <<   Command    : 3b
> <<   Compl Code : 0x00
> set_session_privlvl (1 bytes)
> 04
> Set Session Privilege Level to
> ADMINISTRATOR
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x48
> >>    data    : 0x01 0x01 0xc4
> >>    0x00 0x00 0x00
> 
> BUILDING A v2 COMMAND
> >> Initialization vector (16
> >> bytes)
>  ba a7 a4 3e 00 9b 8b 4d 6e 1c
>  05 b7 29 b9 bf 62
>  authcode input (48 bytes)
>  06 c0 a9 f2 e5 0e 04 00 00 00
>  20 00 ba a7 a4 3e
>  00 9b 8b 4d 6e 1c 05 b7 29 b9
>  bf 62 de c3 86 89
>  59 02 75 38 15 8d ec 62 aa
>  52 22 d8 ff ff 02 07
>  authcode output (12 bytes)
>  10 3a 42 ea 9f d2 ea 54 a8
>  47 e5 e0
> << IPMI Response Session
>  Header
>  <<   Authtype
>  : Unknown (0x6)
>  <<   Payload type
>  : IPMI (0)
>  <<   Session ID
>  : 0xa0a2a3a4
>  <<   Sequence
>  : 0x00000002
>  <<   IPMI Msg/Payload
>  Length : 48
>  << IPMI Response Message
>  Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 02
> <<   Rs Lun     : 0
> <<   Command    : 48
> <<   Compl Code : 0x00
> [SOL Session operational. Use ~? for help]
> 
> After sol activate I see only:
> ==========
> [SOL Session operational.  Use ~? for help]
> ==========
> 
> Where have I gone wrong? Has anyone ever tried to setup console
> redirection on SR1500?
> If there's any information more needed I will post it. Thanks in
> advance.
> 
> -- 
> BRGDS. Alexey Vlasov.
> 
> -------------------------------------------------------------------------
> This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
> Build the coolest Linux based applications with Moblin SDK & win great prizes
> Grand prize is a trip for two to an Open Source event anywhere in the world
> http:// moblin-contest.org/redirect.php?banner_id=100&url=/
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https:// lists.sourceforge.net/lists/listinfo/ipmitool-devel
> 
-- 
Albert Chu
[EMAIL PROTECTED]
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory


-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to