NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/48233: IPMI hack for HP microserver with remote access card



The following reply was made to PR kern/48233; it has been noted by GNATS.

From: Nat Sloss <nathanialsloss%yahoo.com.au@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: kern/48233: IPMI hack for HP microserver with remote access card
Date: Wed, 25 Sep 2013 08:36:11 +1000

 Hi,
 
 As suggested by mrg, here is a better patch that does not require a kernel 
 define.  It should work on all G7 ProLiant Microservers with remote access 
 cards,  although I can only test with the n54l.
 
 Index: src/sys/arch/x86/x86/ipmi.c
 ===================================================================
 RCS file: /cvsroot/src/sys/arch/x86/x86/ipmi.c,v
 retrieving revision 1.55
 diff -u -r1.55 ipmi.c
 --- src/sys/arch/x86/x86/ipmi.c        12 Aug 2013 15:40:34 -0000      1.55
 +++ src/sys/arch/x86/x86/ipmi.c        24 Sep 2013 22:58:00 -0000
 @@ -936,6 +936,14 @@
        if (pipmi->smipmi_base_flags & SMIPMI_FLAG_ODDOFFSET)
                ia->iaa_if_iobase++;
  
 +      if (strcmp(pmf_get_platform("system-product"),
 +            "ProLiant MicroServer") == 0) {
 +                ia->iaa_if_iospacing = 1;
 +                ia->iaa_if_iobase = pipmi->smipmi_base_address - 7;
 +                ia->iaa_if_iotype = 'i';
 +                return;
 +        }
 +
        if (pipmi->smipmi_base_flags == 0x7f) {
                /* IBM 325 eServer workaround */
                ia->iaa_if_iospacing = 1;
 
 Regards,
 
 Nat.
 


Home | Main Index | Thread Index | Old Index