Quantcast
Channel: ProLiant Servers (ML,DL,SL) topics
Viewing all articles
Browse latest Browse all 10362

Server reboots during proliant support pack installation

$
0
0

Hello !

I try to install proliant support pack agent on ProLiant DL380 G6  ,  SUSE Linux Enterprise Server 10 (x86_64)  , PATCHLEVEL = 3

This agent provides communication between client and server HP SIM .

After 5 minutes after i run ./hpsum /s  my server gone to reboot

Here /var/log/messages :

 

 

Jan 31 12:35:48 server_name auditLog[23918]: cpqacuxe-9 ====== HP Smart Update Manager Installation Log ======   Preparing...                ##################################################  cpqacuxe                    ##################################################    DOWNGRADE NOTE: To downgrade this application to any version prior to 9.10.x.x, the current RPM must be manually uninstalled using the "rpm -e" command before any prior versions can be installed.    LOCKING NOTE: The locking mechanism starting with versions 9.10.X.X, are not compatible with prior versions of the applications. Therefore, mixing older and newer versions of the various applications (ACU, HPACUCLI, HPACUSCRIPTING) is not recommended.    Component update finished successfully with return code: 0
Jan 31 12:35:50 server_name auditLog[23918]: fibreutils-3 ====== HP Smart Update Manager Installation Log ======   Preparing...                ##################################################  fibreutils                  ##################################################  Component update finished successfully with return code: 0
Jan 31 12:35:50 server_name kernel: ipmi_msghandler: module not supported by Novell, setting U taint flag.
Jan 31 12:35:50 server_name kernel: ipmi message handler version 36.0
Jan 31 12:35:51 server_name auditLog[23918]: hp-OpenIPMI-8 ====== HP Smart Update Manager Installation Log ======   Preparing...                ##################################################  hp-OpenIPMI                 ##################################################  Please read the Licence Agreement for this software at             /opt/hp/hp-OpenIPMI/COPYING                         and           /opt/hp/hp-OpenIPMI/hp-OpenIPMI.license    By not removing this package, you are accepting the terms  of the included licenses.    The man page, hp-OpenIPMI(4), describes how to enable and use  the hp-OpenIPMI device drivers.  Component update finished successfully with return code: 0
Jan 31 12:35:54 server_name automount[25762]: failed to mount /speal/share
Jan 31 12:36:00 server_name auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 auditLog[23918]: 6:00 1452275968ditLog[23918]: 6:00 14522759681452275984tLog[23918]: 6:00 14522759681452275984531000001012620501020g[23918]: 6:00 14522759681452275984531000001012620501020g
Jan 31 12:36:01 server_name sshd[19253]: debug1: Forked child 27355.
Jan 31 12:36:01 server_name sshd[27355]: debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9
Jan 31 12:36:01 server_name sshd[27355]: debug1: inetd sockets after dupping: 3, 3
Jan 31 12:36:01 server_name sshd[27355]: Connection from 12.34.56.78 port 36769
Jan 31 12:36:01 server_name sshd[27355]: debug1: Client protocol version 2.0; client software version OpenSSH_4.2
Jan 31 12:36:01 server_name sshd[27355]: debug1: match: OpenSSH_4.2 pat OpenSSH*
Jan 31 12:36:01 server_name sshd[27355]: debug1: Enabling compatibility mode for protocol 2.0
Jan 31 12:36:01 server_name sshd[27355]: debug1: Local version string SSH-2.0-OpenSSH_4.2
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: initializing for "root"
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: setting PAM_RHOST to "server_name_another"
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: setting PAM_TTY to "ssh"
Jan 31 12:36:01 server_name sshd[27355]: Failed none for root from 12.34.56.78 port 36769 ssh2
Jan 31 12:36:01 server_name sshd[27355]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Jan 31 12:36:01 server_name sshd[27355]: debug1: trying public key file /root/.ssh/authorized_keys
Jan 31 12:36:01 server_name sshd[27355]: debug1: matching key found: file /root/.ssh/authorized_keys, line 2
Jan 31 12:36:01 server_name sshd[27355]: Found matching RSA key: AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA
Jan 31 12:36:01 server_name sshd[27355]: debug1: restore_uid: 0/0
Jan 31 12:36:01 server_name sshd[27355]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Jan 31 12:36:01 server_name sshd[27355]: debug1: trying public key file /root/.ssh/authorized_keys
Jan 31 12:36:01 server_name sshd[27355]: debug1: matching key found: file /root/.ssh/authorized_keys, line 2
Jan 31 12:36:01 server_name sshd[27355]: Found matching RSA key: AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA:AA
Jan 31 12:36:01 server_name sshd[27355]: debug1: restore_uid: 0/0
Jan 31 12:36:01 server_name sshd[27355]: debug1: ssh_rsa_verify: signature correct
Jan 31 12:36:01 server_name sshd[27355]: debug1: do_pam_account: called
Jan 31 12:36:01 server_name sshd[27355]: Accepted publickey for root from 12.34.56.78 port 36769 ssh2
Jan 31 12:36:01 server_name sshd[27355]: debug1: monitor_child_preauth: root has been authenticated by privileged process
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: establishing credentials
Jan 31 12:36:01 server_name sshd[27355]: debug1: Entering interactive session for SSH2.
Jan 31 12:36:01 server_name sshd[27355]: debug1: server_init_dispatch_20
Jan 31 12:36:01 server_name sshd[27355]: debug1: server_input_channel_open: ctype session rchan 0 win 131072 max 32768
Jan 31 12:36:01 server_name sshd[27355]: debug1: input_session_request
Jan 31 12:36:01 server_name sshd[27355]: debug1: channel 0: new [server-session]
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_new: init
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_new: session 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_open: channel 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_open: session 0: link with channel 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: server_input_channel_open: confirm session
Jan 31 12:36:01 server_name sshd[27355]: debug1: server_input_channel_req: channel 0 request exec reply 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_by_channel: session 0 channel 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_input_channel_req: session 0 req exec
Jan 31 12:36:01 server_name sshd[27362]: debug1: PAM: reinitializing credentials
Jan 31 12:36:01 server_name sshd[27362]: debug1: permanently_set_uid: 0/0
Jan 31 12:36:01 server_name sshd[27355]: debug1: Received SIGCHLD.
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_by_pid: pid 27362
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_exit_message: session 0 channel 0 pid 27362
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_exit_message: release channel 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_by_channel: session 0 channel 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_close_by_channel: channel 0 child 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: session_close: session 0 pid 0
Jan 31 12:36:01 server_name sshd[27355]: debug1: channel 0: free: server-session, nchannels 1
Jan 31 12:36:01 server_name sshd[27355]: Connection closed by 12.34.56.78
Jan 31 12:36:01 server_name sshd[27355]: debug1: do_cleanup
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: cleanup
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: deleting credentials
Jan 31 12:36:01 server_name sshd[27355]: debug1: PAM: closing session
Jan 31 12:36:01 server_name sshd[27355]: Closing connection to 10.254.58.195
Jan 31 12:36:02 server_name kernel: ipmi_msghandler: module not supported by Novell, setting U taint flag.
Jan 31 12:36:02 server_name kernel: ipmi message handler version 36.0
Jan 31 12:36:02 server_name kernel: ipmi_msghandler: module not supported by Novell, setting U taint flag.
Jan 31 12:36:02 server_name kernel: ipmi message handler version 36.0
Jan 31 12:36:02 server_name kernel: ipmi_devintf: module not supported by Novell, setting U taint flag.
Jan 31 12:36:02 server_name kernel: ipmi device interface
Jan 31 12:36:02 server_name kernel: ipmi_si: module not supported by Novell, setting U taint flag.
Jan 31 12:36:02 server_name kernel: IPMI System Interface driver.
Jan 31 12:36:02 server_name kernel: ipmi_si: Searching for PCI Vendor 0x103c, Device 0x3302
Jan 31 12:36:02 server_name kernel: ipmi_si: Trying "kcs" at memory address 0xf1ef0000
Jan 31 12:36:02 server_name kernel: GSI 26 sharing vector 0xEA and IRQ 26
Jan 31 12:36:02 server_name kernel: ACPI: PCI Interrupt 0000:01:04.6[A] -> GSI 21 (level, low) -> IRQ 234
Jan 31 12:36:02 server_name kernel: ipmi_si: Found PCI BMC at BAR address 0xf1ef0000
Jan 31 12:36:02 server_name kernel: ipmi_si: Using PCI Plug and Play interrupt 234
Jan 31 12:36:04 server_name kernel:  IPMI kcs interface [0] initialized
Jan 31 12:36:05 server_name hpasmxld[27561]: hpDeferSPDThread: Starting thread to collect DIMM SPD Data.
Jan 31 12:36:05 server_name hpasmxld[27561]: WARNING: System Power Supply: General Failure (Power Supply 2)
Jan 31 12:36:05 server_name hpasmxld[27561]: WARNING: System Power Supplies Not Redundant
Jan 31 12:36:05 server_name hpasmxld[27561]: NOTICE: System Power Supply: General Failure (Power Supply 2) has been repaired
Jan 31 12:36:05 server_name hpasmxld[27561]: NOTICE: System Power Supplies Not Redundant has been repaired
Jan 31 12:36:05 server_name hpasmxld[27561]: WARNING: System Overheating (Temperature Sensor 1, Location Ambient, Temperature 42C)
Jan 31 12:36:05 server_name hpasmxld[27561]: A System Reboot has been requested by the management processor in 60 seconds.
Jan 31 12:36:05 server_name hpasmxld[27561]: A System Reboot has been initiated by the management processor.
Jan 31 12:36:05 server_name shutdown[27582]: shutting down for system reboot
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: disagrees about version of symbol ipmi_create_user
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: Unknown symbol ipmi_create_user
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: disagrees about version of symbol ipmi_destroy_user
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: Unknown symbol ipmi_destroy_user
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: disagrees about version of symbol ipmi_request_supply_msgs
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: Unknown symbol ipmi_request_supply_msgs
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: Unknown symbol ipmi_free_recv_msg
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: disagrees about version of symbol ipmi_get_version
Jan 31 12:36:05 server_name kernel: ipmi_watchdog: Unknown symbol ipmi_get_version
Jan 31 12:36:06 server_name hpasrd[27607]: Starting with poll 1 and timeout 600
Jan 31 12:36:06 server_name hpasrd[27607]: Setting the watchdog timer.
Jan 31 12:36:06 server_name hpasrd[27607]: Found iLO memory at 0xf1fe0000.
Jan 31 12:36:06 server_name hpasrd[27607]: Successfully mapped device.
Jan 31 12:36:07 server_name init: Switching to runlevel: 6
Jan 31 12:36:07 server_name hpasmxld[27561]: NOTICE: System Overheating (Temperature Sensor 1, Location Ambient, Temperature 42C) has been repaired
Jan 31 12:36:07 server_name hpasmxld[27561]: The system shutdown has been cancelled by the management processor.
Jan 31 12:36:07 server_name auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 auditLog[23918]: 6:07 audit12643774400g[23918]: 6:07 audit12643774400
Jan 31 12:36:08 server_name auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 auditLog[23918]: 6:08 aud%Log[23918]: 6:08 aud%
Jan 31 12:36:08 server_name kernel: bootsplash: status on console 0 changed to on
Jan 31 12:36:14 server_name automount[26362]: failed to mount /speal/share
Jan 31 12:36:15 server_name xinetd[19912]: Exiting...
Jan 31 12:36:24 server_name hpasrd[27607]: Stopping the timer.
Jan 31 12:36:26 server_name hpasmxld[27561]: Process has been instructed to stop from the user interface. Stopping hpasmxld process. . .
Jan 31 12:36:33 server_name syslog-ng[27876]: Error connecting to remote host AF_INET(19.144.4.105:514), reattempting in 60 seconds
Jan 31 12:36:34 server_name sshd[19253]: Received signal 15; terminating.
Jan 31 12:36:35 server_name multipathd: mpathh: stop event checker thread
Jan 31 12:36:35 server_name multipathd: mpathg: stop event checker thread
Jan 31 12:36:35 server_name multipathd: --------shut down-------
Jan 31 12:36:36 server_name [CMA]: Received signal to stop CMA
Jan 31 12:36:36 server_name [CMA]: Shutting down cma
Jan 31 12:36:38 server_name shadow[28193]: new group added - group=hpsmh, gid=7011999, by=0
Jan 31 12:36:38 server_name useradd[28194]: new account added - account=hpsmh, uid=7018275, gid=7011999, home=/opt/hp/hpsmh, shell=/sbin/nologin, by=0
Jan 31 12:36:38 server_name useradd[28194]: running USERADD_CMD command - script=/usr/sbin/useradd.local, account=hpsmh, uid=7018275, gid=7011999, home=/opt/hp/hpsmh, by=0
Jan 31 12:36:44 server_name automount[27766]: failed to mount /speal/share
Jan 31 12:36:47 server_name auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 auditLog[23918]: 6:47 aud%Log[23918]: 6:47 aud%
Jan 31 12:36:57 server_name kernel: Kernel logging (proc) stopped.
Jan 31 12:36:57 server_name kernel: Kernel log daemon terminating.
Jan 31 12:36:58 server_name syslog-ng[27876]: syslog-ng version 1.6.8 going down
Jan 31 15:07:22 server_name syslog-ng[4618]: syslog-ng version 1.6.8 starting

 


Viewing all articles
Browse latest Browse all 10362

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>