IPMI Maintainer Call Notes - 1/16/2018
Emily Shaffer
emilyshaffer at google.com
Thu Jan 18 10:17:45 AEDT 2018
Meeting: 1/16/2018
Attendees: Emily, Tom, Vernon
Agenda:
-
Discuss how to share IPMI stack review practices with community: 48 hour
minimum review soak, ⅔ maintainer approvals, how and when to initiate
design discussions
-
Add README to cover communication channels
-
README should include testing guidelines. (Do we need a Tested: line,
or do we need new unit tests included with commit, or…?)
-
Net-ipmid has infrastructure for unit tests
-
Host-ipmid maybe works with make check - Emily will look into it
-
Robot test cases for new commands - ideally, committers adding new
commands should also add robot cases.
-
New command: parse input, dbus calls, response. All via ipmitool
-
Robot test is run nightly(ish) vs master. And is run against internal
IBM releases. Exercises REST and IPMI. Stored [
https://github.com/openbmc/openbmc-test-automation]
-
If we could already have an easy howto for writing new commands, or
example test, then it’s easy to require that as a part of commit.
-
As maintainers, we should try to find time to add sample tests.
-
Decision: *New commands should have written test included (robot or
unit), maintainers should make time to add test suite for people
to use as
example*
-
Cover goals for 2018 (what needs to be implemented)
-
IBM: Entire standard by end of Q1. DCMI spec - all mandatory commands
(or close). SDR support needs to be expanded - virtual, hardware sensors;
FRU records (fru print, sdr list, sensor list). Planning to build on
existing SDR work. IBM also interested in IPMI user management (but lower
priority) - IPMI password instead of default account/default pw; user
should be able to change pw. Mostly missing mandatory commands.
-
Intel: Sensor/fru/sdr needs - already written, pushing soon!
Interface changes to support min/max/etc - sensors automatically probed
based on FRU API… SDRs automatically generated from sensor config over
dbus. Works with ipmitool sensor list. FRU API on DBus that everyone will
conform with. Chassis probe, json load, expansion probe, ….
Possible it’ll
go to Intel fork so we can see it. Working on networking IPMI commands,
get/set network parameters (LAN config), trying to fill out as
much of the
spec as possible. Either refactoring or adding more functionality. Also
have effort on user management [doc change here]. Very interested in
refactor effort. Firmware update work (eventually) - figuring out which
standard to use. Both in-band and out-of-band - let’s get
everyone on same
page
-
Google: FRUs. Entity association record (p536) - SDR. Voltage
regulator (08h). (Possibly talk to James Feist about whether
he’s done it
already.)
-
Discuss existing design flaws and potential refactor efforts
-
SDR infrastructure. Vernon had mentioned autogenerated SDR @ Intel.
Based on probing FRU to find which groups of sensors exist.
Based on that,
there’s a JSON file with those sensors’ configs. Systems are in
configuration groups based on card that’s present or not. A device tree
overlay call happens for hwmon sensors and a scanning daemon is
started for
each group (on first boot). Vernon, get Ed & James to put this
into Intel
public fork so we can look at it. FRUs detected by BMC. Base FRU in
flash, other FRUs discovered over DBus? Write own FRU parser as necessary
for own FRU format. IBM gets FRU location info from hostboot pushed over
IPMI. BMC can store FRU format info if it ever shows up from
hostboot, so
it will work with hostboot as source of truth or BMC as source of truth.
Maybe James F can talk about it on community telecom.
-
Getting rid of sdbus -> move to sdbusplus (inline with OpenBMC effort
project-wide)
-
Split network ipmid into network daemon to network & dbus (similar to
btbridged) - do we want to then keep both IPMI daemons, or note which
bridge sourced the request and handle it based on that. Security
concern -
network is attack vector, minimize how much network comm can touch.
Running network daemon as user with few permissions/access is safer - if
it’s compromised, still no risk. Inline with effort to make all daemons
nonroot (except systemd). Inline with SELinux talk from
hackathon - maybe
we can get some guidance from Dell. Separating daemons into users is
orthogonal but still helpful
-
Determine best way for asynchronous communication between the three of
us.
-
Email good for people during work hours, or for extended
conversations. Riot good for pings, high-priority small things. No
frivolous communication on Riot (since we get notifications)
-
Do we want to communicate result of these maintainer meetings??
-
Send an email with the governance info for commits etc. Emily will
ping Brad and find out how much information to share
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/openbmc/attachments/20180117/81d6832f/attachment-0001.html>
More information about the openbmc
mailing list