No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Failed to Access the X6800 BMC over IPMI

Publication Date:  2019-04-10 Views:  235 Downloads:  0

Issue Description

A customer reports that IPMItool cannot access an XH628 V3 server node. The command and error message are as follows:

Command: IPMITOOL -I lanplus -H <ip_addr> -U <uname> -P <password> chassis power status

Error message: Unable to establish IPMI v2 / RMCP+ session.

Handling Process

According to the ipmi_mass_operate_log file, two IP addresses 10.X.X.3 and 10.X.X.11 attempt to log in as the root user over IPMI, and the root user is locked due to incorrect passwords

10.X.X.3 attempts to log in to the BMC by using invalid usernames.

The preceding information shows that incorrect root user passwords entered by 10.X.X.3 cause the root user to be locked.

2. Memory leak occurs on the BMC frudata module.

In normal situations, the memory usage of the frudata process is about 6 MB. However, the memory usage of the onsite frudata process is 16 MB. 10 MB memory is leaked.

In the customer's environment, the BMC periodically queries the FRU information. Memory leak occurs each time the BMC queries the FRU information. As a result, IPMI connection fails. The memory leak problem of the frudata module has been resolved in BMC 2.18.

Root Cause

In the following situations, the IPMI cannot connect to the BMC:

1. The root user is locked.

2. The frudata module has a memory leak problem. If the leaked memory is accumulated to a certain amount during periodic FRU information query, IPMItool cannot access the BMC.


Solutions for different situations are as follows:

1. For the first situation, restart the BMC on iMana or iBMC, or hold down the UID button for 5s to 10s to reset the BMC.

2. For the second situation, upgrade the BMC software version to 2.18 or later.