JavaScript must be enabled in order for you to see "WP Copy Data Protect" effect. However, it seems JavaScript is either disabled or not supported by your browser. To see full result of "WP Copy Data Protector", enable JavaScript by changing your browser options, then try again.

How to query the commands about the type of raw w/ IPMI 2.0 SPEC


Keker, it’s time to renew the rubbish. I want to record how to query the some commands about the type of raw about the IPMI 2.0 SPEC due to the requirement for analyzing the meaning for each HEXs, and you can access the related document from here. BTW, there are another SPECs for the function of extension, so you also capture the related document from Internet or google it directly like DCMI or etc. Let’s keep reading:
1) Know the NetFn codes about the commands of raw (Can ref the page 67)


2) Know the IPMB LUNs about the BMC (Can ref the page 97)

3) Know the format about request message the related response about SMIC-BMC (Can ref the page 105)


4) Know the summary about the command assignments for each NetFns (Can ref the page 612)

5) Query the detail explanation about the each commands of raw via the chapter from above summary (Ex:raw 0×06 0×01 -> Can ref the page 269)

6) There are usual commands of raw type for the example
#ipmitool raw 0x06 0x01 -> NetFn is App and ref the chapter 20.1(Get Device ID 0x01)
#ipmitool raw 0x06 0x02 -> NetFn is App and ref the chapter 20.2(Code reset 0x02)
#ipmitool raw 0x06 0x04 -> NetFn is App and ref the chapter 20.4(Get selftest results 0x04)
#ipmitool raw 0x06 0x08 -> NetFn is App and ref the chapter 20.8(Get selftest results 0x08)
#ipmitool raw 0x06 0x37 -> NetFn is App and ref the chapter 22.14(Get system GUID[dmidecode's UUID] 0x37)
#ipmitool raw 0x06 0x2f -> NetFn is App and ref the chapter 22.2(Get BMC Global Enables GUID 0x2f)
#ipmitool raw 0x06 0x58 0x01 0x00 0x00 0x0b 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x41 0x42 0x00 0x00 0x00 -> NetFn is App and ref the chapter 22.14a(Set Sysyem Info parameters 0x58)
#ipmitool raw 0x06 0x59 0x01 0x01 0x00 0x00 -> NetFn is App and ref the chapter 22.14b(Get Sysyem Info parameters[Diff from ori-ASCII table and be setup] 0x59)
#ipmitool raw 0x2c 0x04 0xdc 0x00 0x00 0x00 0x00 0x3c 0x00 0x70 0x17 0x00 0x00 0x00 0x00 0x01 0x00 -> NetFn is DCMI and ref IPMI SPEC page 42 and DCMI SPEC 1.5 chapter 6.6.2(Set Watt w/ 0x3c[60])6.6.4
#ipmitool raw 0x2c 0x03 0xdc 0x00 0x00 -> NetFn is DCMI and ref IPMI SPEC page 42 and DCMI SPEC 1.5 chapter 6.6.3(Get Watt w/ 0x3c[60])
#ipmitool raw 0x2c 0x05 0xdc 0x01 0x00 0x00 -> NetFn is DCMI and ref IPMI SPEC page 42 and DCMI SPEC 1.5 chapter 6.6.4(Acitvate the func of power limit and can stress UUT for reaching the power limit you set[Query the related info via sdr)
#ipmitool raw 0x2c 0x05 0xdc 0x00 0x00 0x00 -> NetFn is DCMI and ref IPMI SPEC page 42 and DCMI SPEC 1.5 chapter 6.6.4(Deacitvate the func of power limit and can stress UUT for reaching the power limit you set[Query the related info via sdr)
#ipmitool raw 0x0a 0x40 -> NetFn is storage and ref the chapter 31.2(Get GEL Info 0x40)
#ipmitool raw 0x0a 0x42 -> NetFn is storage and ref the chapter 31.4(Reserve SEL 0x42)
#ipmitool raw 0x0a 0x43 0x01 0x00 0x01 0x00 0x00 0xff -> NetFn is storage and ref the chapter 31.5(Get SEL[Item2 is Reserve ID] 0x43)
#ipmitool raw 0x0a 0x44 0x00 0x00 0x00 -> NetFn is storage and ref the chapter 31.6(Add SEL 0x44)
#ipmitool raw 0x0a 0x47 0x03 0x00 0x43 0x4c 0x52 0xaa -> NetFn is storage and ref the chapter 31.6(Clear[Item2&3 is Reserve ID/C(0x43)L(0x4c)R(0x52)] SEL 0x47)
#ipmitool raw 0x0a 0x48 -> NetFn is storage and ref the chapter 31.10(Get SEL Time[EX:fc 5c af 57=57af5cfc(hex)-1471110396(dec)&date -d@1471110396] 0x48)
#ipmitool raw 0x0a 0x5c -> NetFn is storage and ref the chapter 31.11a(Get SEL UTC offset[Range from -1440 to 1440] 0x5c)
#ipmitool raw 0x3[0-h] ... -> NetFn is OEM and ref the related OEM SPECs(Like querying IANA ID and etc)
#ipmitool raw 0xc 0x2 0x1 0x3 0x0 0x0 -> NetFn is transport and ref the chapter 23.2(Get BMC IPv4 address[Byte1-Channel Num/Byte2-IPv4 address])
#ipmitool raw 0xc 0x2 0x1 0xc5 0x0 0x0 -> NetFn is transport and ref the chapter 23.2(Get BMC IPv6 address)

◎、Above context is about the brief introduction how to query the commands about the type of raw w/ IPMI 2.0 SPEC, and you can query the IPMI 2.0 or the related another SPEC directly for more detail info. That’s all for today, and hope this article is helpful for you. See you next time!

Leave a Comment


NOTE - You can use these HTML tags and attributes:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

 
This site is protected by WP-CopyRightPro