NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/48233: IPMI hack for HP microserver with remote access card
The following reply was made to PR kern/48233; it has been noted by GNATS.
From: Nat Sloss <nathanialsloss%yahoo.com.au@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc:
Subject: Re: kern/48233: IPMI hack for HP microserver with remote access card
Date: Wed, 25 Sep 2013 08:36:11 +1000
Hi,
As suggested by mrg, here is a better patch that does not require a kernel
define. It should work on all G7 ProLiant Microservers with remote access
cards, although I can only test with the n54l.
Index: src/sys/arch/x86/x86/ipmi.c
===================================================================
RCS file: /cvsroot/src/sys/arch/x86/x86/ipmi.c,v
retrieving revision 1.55
diff -u -r1.55 ipmi.c
--- src/sys/arch/x86/x86/ipmi.c 12 Aug 2013 15:40:34 -0000 1.55
+++ src/sys/arch/x86/x86/ipmi.c 24 Sep 2013 22:58:00 -0000
@@ -936,6 +936,14 @@
if (pipmi->smipmi_base_flags & SMIPMI_FLAG_ODDOFFSET)
ia->iaa_if_iobase++;
+ if (strcmp(pmf_get_platform("system-product"),
+ "ProLiant MicroServer") == 0) {
+ ia->iaa_if_iospacing = 1;
+ ia->iaa_if_iobase = pipmi->smipmi_base_address - 7;
+ ia->iaa_if_iotype = 'i';
+ return;
+ }
+
if (pipmi->smipmi_base_flags == 0x7f) {
/* IBM 325 eServer workaround */
ia->iaa_if_iospacing = 1;
Regards,
Nat.
Home |
Main Index |
Thread Index |
Old Index