Unix & Linux Stack Exchange
Q&A for users of Linux, FreeBSD and other Unix-like operating systems
Latest Questions
0
votes
0
answers
49
views
Debian-SMC: System is auto rebooting randomly
My server is experiencing random reboots, and I haven't been able to locate any logs explaining the cause. Below are the system details. OS: Debian 12.8 (bookworm) Hardware: SMC (SYS-111E-FWTR) kernel: Linux Dev-test 6.1.0-28-rt-amd64 #1 SMP PREEMPT_RT Debian 6.1.119-1 (2024-11-22) x86_64 GNU/Linux...
My server is experiencing random reboots, and I haven't been able to locate any logs explaining the cause. Below are the system details.
OS: Debian 12.8 (bookworm)
Hardware: SMC (SYS-111E-FWTR)
kernel: Linux Dev-test 6.1.0-28-rt-amd64 #1 SMP PREEMPT_RT Debian 6.1.119-1 (2024-11-22) x86_64 GNU/Linux
Drivers: ice (v1.15.5) iavf(v4.12.6) mlx5_core(24.10-1.1.4)
ipmitool mc watchdog get
Watchdog Timer Use: SMS/OS (0x44)
Watchdog Timer Is: Started/Running
Watchdog Timer Logging: On
Watchdog Timer Action: No action (0x00)
Pre-timeout interrupt: None
Pre-timeout interval: 0 seconds
Timer Expiration Flags: (0x10)
* SMS/OS
Initial Countdown: 300.0 sec
Present Countdown: 249.5 sec
last reboot
reboot system boot 6.1.0-28-rt-amd6 Wed Feb 26 08:46 still running
reboot system boot 6.1.0-28-rt-amd6 Wed Feb 26 07:18 - 08:43 (01:25)
reboot system boot 6.1.0-28-rt-amd6 Tue Feb 25 20:42 - 08:43 (12:01)
~# uptime
10:15:03 up 1:28, 7 users, load average: 7.28, 7.76, 7.75
:~# date
Wed Feb 26 10:15:05 AM EAT 2025
~# HISTTIMEFORMAT='%Y-%m-%d %H:%M:%S ' history | grep reboot
186 2025-02-26 08:47:45 reboot
203 2025-02-26 08:47:45 reboot
250 2025-02-26 08:47:45 reboot
267 2025-02-26 08:47:45 reboot'
I tried disabling watchdog action by suspecting wdt causing reboot. Verified dmesg and journal logs but no clue.
Hari
(1 rep)
Feb 28, 2025, 09:27 AM
• Last activity: Feb 28, 2025, 10:09 AM
0
votes
1
answers
772
views
How to Get All Network Interface IP Address using BMC/IPMI
I have Many server booted up to Debian 12 connected to a common switch. All I know is their BMC Macs and bmc passwords for each unit(all of them not from same manufacturer). Is there a standard way to find out all Eth Interfaces IP address of the corresponding BMC Mac (Unit)? Is the any Ipmitool com...
I have Many server booted up to Debian 12 connected to a common switch.
All I know is their BMC Macs and bmc passwords for each unit(all of them not from same manufacturer).
Is there a standard way to find out all Eth Interfaces IP address of the corresponding BMC Mac (Unit)?
Is the any Ipmitool command to get IP Addresses of all the NICs?
Hint:
1. I Only have IP address of one of those units and I can ssh into it(This is my DHCP server).
2. On the machine mentioned above, I can run arp-scan and get all the ip addresses of those other machines which are connected to the same switch but how do I tell which ip belongs to what corresponding BMC Mac address.
Kaleem Khattak
(3 rep)
Sep 26, 2024, 06:40 PM
• Last activity: Sep 27, 2024, 06:12 AM
0
votes
0
answers
494
views
Almalinux 8.8 Stuck at "Downloading packages"
I am trying to install AlmaLinux 8.8 via use IPMI. I tried several times but installer every time stuck at same step. At first I thought the problem was in the alma iso file so I downloaded the updated version 8.8 from the almalinux official page and tried again. this did not work. I installed the p...
I am trying to install AlmaLinux 8.8 via use IPMI. I tried several times but installer every time stuck at same step. At first I thought the problem was in the alma iso file so I downloaded the updated version 8.8 from the almalinux official page and tried again. this did not work.
I installed the proxmox iso file to see if the problem applies to almalinux 8.8 and it installed successfully. i think the problem applies to almalinux 8.8. when i check the logs i don't see any problem. what do you think is the problem?
logs;




gokhandemir
(1 rep)
Nov 12, 2023, 10:25 AM
2
votes
1
answers
220
views
fancontrol(1) and ipmi
My server supports IPMI, so I can run a script like this: ~~~ fanspeed() { # 0 C => 10, 55 C => 10, 65 C => 100 sensors -j | jq '[.[]["temp1"]["temp1_input"]] | (max-55)*(100/(65-55)) | if . 100 then 100 else .|floor end end'; } autofan() { setspeed() { ipmitool -I lanplus -H drac -U root -P passwor...
My server supports IPMI, so I can run a script like this:
~~~
fanspeed() {
# 0 C => 10, 55 C => 10, 65 C => 100
sensors -j |
jq '[.[]["temp1"]["temp1_input"]] |
(max-55)*(100/(65-55)) |
if . 100 then 100 else .|floor end end';
}
autofan() {
setspeed() {
ipmitool -I lanplus -H drac -U root -P password raw 0x30 0x30 0x02 0xff $@
}
while true; do
fanspeed=
fanspeed
printf "$fanspeed "$(setspeed $fanspeed)
sleep 1
done
}
~~~
This keeps the CPU temp 55 C.
But this sounds like a job for fancontrol
. Can fancontrol
use IPMI to control the fan?
Ole Tange
(37348 rep)
Oct 16, 2020, 04:25 PM
• Last activity: Dec 18, 2022, 04:07 AM
1
votes
2
answers
954
views
IPMI-config cannot set SOL (serial over LAN) baudrate
I have a MSI MS-S0121 Mainboard with an AST2150 BMC controller with IPMI 2.0. I'm using `ipmiconsole` from freeipmi and serial-over-lan (SOL) to access the BIOS. The default baudrate of 19200 is quite slow, so i would like to set it to 115200 baud. But it seems that i can only set it to the value of...
I have a MSI MS-S0121 Mainboard with an AST2150 BMC controller with IPMI 2.0.
I'm using
ipmiconsole
from freeipmi and serial-over-lan (SOL) to access the BIOS. The default baudrate of 19200 is quite slow, so i would like to set it to 115200 baud. But it seems that i can only set it to the value of 19200 it's already on:
[marvin@t5600 ~]$ ipmi-config -h 172.16.0.158 --username=admin --password=admin --commit -e SOL_Conf:Volatile_Bit_Rate=19200
[marvin@t5600 ~]$ ipmi-config -h 172.16.0.158 --username=admin --password=admin --commit -e SOL_Conf:Volatile_Bit_Rate=115200
ERROR: Failed to commit `SOL_Conf:Volatile_Bit_Rate'
[marvin@t5600 ~]$ ipmi-config -h 172.16.0.158 --username=admin --password=admin --checkout > bmc.conf
#
# Section UserX Comments
#
# In the following User sections, users should configure usernames, passwords,
# and access rights for IPMI over LAN communication. Usernames can be set to any
# string with the exception of User1, which is a fixed to the "anonymous"
# username in IPMI.
#
# For IPMI over LAN access for a username, set "Enable_User" to "Yes",
# "Lan_Enable_IPMI_Msgs" to "Yes", and "Lan_Privilege_Limit" to a privilege
# level. The privilege level is used to limit various IPMI operations for
# individual usernames. It is recommended that atleast one username be created
# with a privilege limit "Administrator", so all system functions are available
# to atleast one username via IPMI over LAN. For security reasons, we recommend
# not enabling the "anonymous" User1. For most users, "Lan_Session_Limit" can be
# set to 0 (or ignored) to support an unlimited number of simultaneous IPMI over
# LAN sessions.
#
# If your system supports IPMI 2.0 and Serial-over-LAN (SOL),
# a"SOL_Payload_Access" field may be listed below. Set the "SOL_Payload_Access"
# field to "Yes" or "No" to enable or disable this username's ability to access
# SOL.
#
# Please do not forget to uncomment those fields, such as "Password", that may
# be commented out during the checkout.
#
# Some motherboards may require a "Username" to be configured prior to other
# fields being read/written. If this is the case, those fields will be set to
# .
#
Section User1
## Give Username
## Username NULL
## Give password or blank to clear. MAX 16 chars (20 chars if IPMI 2.0 supported).
## Password
## Possible values: Yes/No or blank to not set
## Enable_User
## Possible values: Yes/No
Lan_Enable_IPMI_Msgs Yes
## Possible values: Yes/No
Lan_Enable_Link_Auth Yes
## Possible values: Yes/No
Lan_Enable_Restricted_to_Callback No
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
Lan_Privilege_Limit Administrator
## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
## Lan_Session_Limit
## Possible values: Yes/No
SOL_Payload_Access Yes
EndSection
Section User2
## Give Username
Username Operator
## Give password or blank to clear. MAX 16 chars (20 chars if IPMI 2.0 supported).
## Password
## Possible values: Yes/No or blank to not set
## Enable_User
## Possible values: Yes/No
Lan_Enable_IPMI_Msgs Yes
## Possible values: Yes/No
Lan_Enable_Link_Auth Yes
## Possible values: Yes/No
Lan_Enable_Restricted_to_Callback No
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
Lan_Privilege_Limit Operator
## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
## Lan_Session_Limit
## Possible values: Yes/No
SOL_Payload_Access Yes
EndSection
Section User3
## Give Username
Username admin
## Give password or blank to clear. MAX 16 chars (20 chars if IPMI 2.0 supported).
## Password
## Possible values: Yes/No or blank to not set
## Enable_User
## Possible values: Yes/No
Lan_Enable_IPMI_Msgs Yes
## Possible values: Yes/No
Lan_Enable_Link_Auth Yes
## Possible values: Yes/No
Lan_Enable_Restricted_to_Callback No
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
Lan_Privilege_Limit Administrator
## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
## Lan_Session_Limit
## Possible values: Yes/No
SOL_Payload_Access Yes
EndSection
Section User4
## Give Username
Username OEM
## Give password or blank to clear. MAX 16 chars (20 chars if IPMI 2.0 supported).
## Password
## Possible values: Yes/No or blank to not set
## Enable_User
## Possible values: Yes/No
Lan_Enable_IPMI_Msgs Yes
## Possible values: Yes/No
Lan_Enable_Link_Auth Yes
## Possible values: Yes/No
Lan_Enable_Restricted_to_Callback No
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
Lan_Privilege_Limit OEM_Proprietary
## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
## Lan_Session_Limit
## Possible values: Yes/No
SOL_Payload_Access Yes
EndSection
#
# Section Lan_Channel Comments
#
# In the Lan_Channel section, general IPMI over LAN can be enabled for disabled.
# In the below, "Volatile" configurations are immediately configured onto the
# BMC and will have immediate effect on the system. "Non_Volatile"
# configurations are only available after the next system reset. Generally, both
# the "Volatile" and "Non_Volatile" equivalent fields should be configured
# identically.
#
# To enable IPMI over LAN, typically "Access_Mode" should be set to
# "Always_Available". "Channel_Privilege_Limit" should be set to the highest
# privilege level any username was configured with. Typically, this is set to
# "Administrator".
#
# "User_Level_Auth" and "Per_Message_Auth" are typically set to "Yes" for
# additional security.
#
Section Lan_Channel
## Possible values: Disabled/Pre_Boot_Only/Always_Available/Shared
Volatile_Access_Mode Always_Available
## Possible values: Yes/No
Volatile_Enable_User_Level_Auth Yes
## Possible values: Yes/No
Volatile_Enable_Per_Message_Auth Yes
## Possible values: Yes/No
Volatile_Enable_Pef_Alerting Yes
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary
Volatile_Channel_Privilege_Limit OEM_Proprietary
## Possible values: Disabled/Pre_Boot_Only/Always_Available/Shared
Non_Volatile_Access_Mode Always_Available
## Possible values: Yes/No
Non_Volatile_Enable_User_Level_Auth Yes
## Possible values: Yes/No
Non_Volatile_Enable_Per_Message_Auth Yes
## Possible values: Yes/No
Non_Volatile_Enable_Pef_Alerting Yes
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary
Non_Volatile_Channel_Privilege_Limit OEM_Proprietary
EndSection
#
# Section Lan_Conf Comments
#
# In the Lan_Conf section, typical networking configuration is setup. Most users
# will choose to set "Static" for the "IP_Address_Source" and set the
# appropriate "IP_Address", "MAC_Address", "Subnet_Mask", etc. for the machine.
#
Section Lan_Conf
## Possible values: Unspecified/Static/Use_DHCP/Use_BIOS/Use_Others
IP_Address_Source Static
## Give valid IP address
IP_Address 172.16.0.158
## Give valid MAC address
MAC_Address AA:AA:AA:AA:AA:AA
## Give valid Subnet Mask
Subnet_Mask 255.255.0.0
## Give valid IP address
Default_Gateway_IP_Address 0.0.0.0
## Give valid MAC address
Default_Gateway_MAC_Address 00:00:00:00:00:00
EndSection
#
# Section Lan_Conf_Auth Comments
#
# In the Lan_Conf_Auth section, allowable authentication mechanisms for IPMI 1.5
# is configured. Most users will want to set all "MD5" authentication to "Yes"
# and the rest to "No". If you have configured a NULL username and a NULL
# password, you will also want to configure some of the "None" fields to "Yes"
# to allow "None" authentication to work. Some motherboards do not allow you to
# enable OEM authentication, so you may wish to set all OEM related fields to
# "No".
#
Section Lan_Conf_Auth
## Possible values: Yes/No
Callback_Enable_Auth_Type_None Yes
## Possible values: Yes/No
Callback_Enable_Auth_Type_MD5 Yes
## Possible values: Yes/No
Callback_Enable_Auth_Type_Straight_Password Yes
## Possible values: Yes/No
User_Enable_Auth_Type_None Yes
## Possible values: Yes/No
User_Enable_Auth_Type_MD5 Yes
## Possible values: Yes/No
User_Enable_Auth_Type_Straight_Password Yes
## Possible values: Yes/No
Operator_Enable_Auth_Type_None Yes
## Possible values: Yes/No
Operator_Enable_Auth_Type_MD5 Yes
## Possible values: Yes/No
Operator_Enable_Auth_Type_Straight_Password Yes
## Possible values: Yes/No
Admin_Enable_Auth_Type_None Yes
## Possible values: Yes/No
Admin_Enable_Auth_Type_MD5 Yes
## Possible values: Yes/No
Admin_Enable_Auth_Type_Straight_Password Yes
## Possible values: Yes/No
OEM_Enable_Auth_Type_None Yes
## Possible values: Yes/No
OEM_Enable_Auth_Type_MD5 Yes
## Possible values: Yes/No
OEM_Enable_Auth_Type_Straight_Password Yes
EndSection
#
# Section Lan_Conf_Security_Keys Comments
#
# If your system supports IPMI 2.0 and Serial-over-LAN (SOL), a K_g BMC key may
# be configurable. The K_g key is an optional key that can be set for two key
# authentication in IPMI 2.0. It is optionally configured. Most users will want
# to set this to zero (or blank).
#
Section Lan_Conf_Security_Keys
## Give string or blank to clear. Max 20 bytes, prefix with 0x to enter hex
K_G 0x0000000000000000000000000000000000000000
EndSection
#
# Section Lan_Conf_User_Security Comments
#
# The following user security configuration options are optionally implemented
# by the vendor. They may not be available your system and may not be visible
# below.
#
# The following configuration supports the ability for the BMC to disable a user
# if a number of bad passwords are entered sequentially.
# "Bad_Password_Threshold" determines the number of bad passwords that must be
# entered sequentially. "Attempt_Count_Reset_Interval" determines the range of
# time the bad passwords must occur in. "User_Lockout_Interval" determines the
# time a user will be locked off if the bad password threshold is reached. If
# set to "Yes", "Enable_Event_Message_When_User_Disabled" will inform the BMC to
# log an event message when a user is disabled.
#
Section Lan_Conf_User_Security
EndSection
#
# Section Lan_Conf_Misc Comments
#
# The following miscellaneous configuration options are optionally implemented
# by the vendor. They may not be available your system and may not be visible
# below.
#
# If set to "Yes", "Enable_Gratuitous_ARPs" will inform the BMC to regularly
# send out Gratuitous ARPs to allow other machines on a network resolve the
# BMC's MAC Address. Many users will want to set this to "Yes" because it offers
# the easiest way to support BMC IP Address resolution. However, it will
# increase traffic on your network. The "Gratuitous_ARP_Interval" can be used to
# set the period a Gratuitous ARP is always sent.
#
# If set to "Yes", "Enable_ARP_Response" will inform the BMC torespond to ARP
# requests from other machines.
#
Section Lan_Conf_Misc
EndSection
#
# Section Rmcpplus_Conf_Privilege Comments
#
# If your system supports IPMI 2.0 and Serial-over-LAN (SOL),cipher suite IDs
# may be configurable below. In the Rmcpplus_Conf_Privilege section, maximum
# user privilege levels allowed for authentication under IPMI 2.0 (including
# Serial-over-LAN) are set for each supported cipher suite ID. Each cipher suite
# ID supports different sets of authentication, integrity, and encryption
# algorithms for IPMI 2.0. Typically, the highest privilege level any username
# configured should set for support under a cipher suite ID. This is typically
# "Administrator".
#
Section Rmcpplus_Conf_Privilege
## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_0 OEM_Proprietary
## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_1 OEM_Proprietary
## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_2 OEM_Proprietary
## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_3 OEM_Proprietary
EndSection
#
# Section SOL_Conf Comments
#
# If your system supports IPMI 2.0 and Serial-over-LAN (SOL), the following
# configuration options will allow SOL configuration.
#
# For most users that want to enable SOL, minimally "Enable_SOL" should be set
# to "Yes" and "SOL_Privilege_Level" should be set to the highest privilege
# level any username configured can authenticate with (typically
# "Administrator"). For security purposes, "Force_SOL_Payload_Authentication"
# and "Force_SOL_Payload_Encryption" should be set to "Yes", however forced
# authentication and/or encryption depends on the cipher suite IDs supported.
# The "Non_Volatile_Bit_Rate" and "Volatile_Bit_Rate" should both be set to the
# appropriate baud rate for your system. This is typically the same baud rate
# configured in the BIOS and/or operating system.
#
Section SOL_Conf
## Possible values: Yes/No
Enable_SOL Yes
## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary
SOL_Privilege_Level Administrator
## Possible values: Yes/No
Force_SOL_Payload_Authentication No
## Possible values: Yes/No
Force_SOL_Payload_Encryption No
## Give a non-zero valid integer. Each unit is 5ms
Character_Accumulate_Interval 20
## Give a valid number
Character_Send_Threshold 80
## Give a valid integer
SOL_Retry_Count 7
## Give a valid integer. Interval unit is 10ms
SOL_Retry_Interval 250
## Possible values: Serial/9600/19200/38400/57600/115200
Non_Volatile_Bit_Rate 19200
## Possible values: Serial/9600/19200/38400/57600/115200
Volatile_Bit_Rate 19200
## Give a valid port number
## SOL_Payload_Port_Number 623
EndSection
Any suggestions?
Marvin Noll
(123 rep)
Aug 20, 2021, 08:24 PM
• Last activity: Aug 29, 2021, 06:49 PM
1
votes
0
answers
1605
views
How do I tell the linux kernel that I don't have IPMI?
I'm trying to clean up known or bogus error messages that shows up in the log when I boot my Debian server, in order to more clearly see actual errors. Now it's come to this: Base address is zero, assuming no IPMI interface Since I know that my system ([Supermicro H8SGL](https://www.supermicro.com/A...
I'm trying to clean up known or bogus error messages that shows up in the log when I boot my Debian server, in order to more clearly see actual errors. Now it's come to this:
Base address is zero, assuming no IPMI interface
Since I know that my system ([Supermicro H8SGL](https://www.supermicro.com/Aplus/motherboard/Opteron6000/SR56x0/H8SGL.cfm)) does _not_ have IPMI (gotta pay extra - I didn't) it appears that the vendor sets the base address to zero to mark a non-existing feature, something that the kernel frowns upon according to the [kernel patch](https://github.com/torvalds/linux/commit/1574608f5f4204440d6d9f52b971aba967664764) introducing the message. From the changelog:
> **ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address**
>
>Looking at logs from systems all over the place, it looks like tons of broken systems exist that set the base address to zero. I can only guess that is some sort of non-standard idea to mark the interface as not being present. It can't be zero, anyway, so just complain and ignore it.
Can I tell the kernel at boot with some kind of flag that I don't even want it to try doing whatever it does in order to end up with this error? I'm not sure if this is a module that is being autoloaded, something built in to the kernel, or something else...
There is a possibly-relevant question here at U&L, https://unix.stackexchange.com/questions/470359/boot-error-ipmidmi-invalid-offset-0 but the answer is basically "just try newer kernels" and a bunch of people in forums who thinks it relates to Windows and SSDs, so it is not very helpful.
pipe
(893 rep)
Jun 25, 2020, 10:31 AM
• Last activity: Jun 25, 2020, 11:30 AM
Showing page 1 of 6 total questions