2018-03-19 18:44 GMT+01:00 James Bottomley
<james.bottom...@hansenpartnership.com>:
> On Mon, 2018-03-19 at 17:30 +0100, Jack Wang wrote:
>> >
>> >
>> > >
>> > > And I think either mpt2sas and/or mpt3sas HBAs (I don't have my
>> > > hardware
>> > > nearby) have a SMP target hidden away somewhere. Perhaps someone
>> > > from
>> > > LSI/Avago/Broadcom could supply more information about that.
>>
>> Indeed, mpt3sas has internal enclosure some how.
>> snip from  "sas3ircu 0 display" output:
>> Device is a Hard disk
>>   Enclosure #                             : 1
>>   Slot #                                  : 4
>>   SAS Address                             : 4433221-1-0400-0000
>>   State                                   : Ready (RDY)
>>
>> And it's possible to locate it using "sas3ircu 0 locate 1:4 ON" to
>> locate the drive.
>
> The fat firmware eats pretty much all trace of the enclosure.  I think
> it could be exposed as a device, but that would disrupt the mpt3sas
> internal handling if our Linux enclosure service also binds to it.
>
> James
>
Agree, they're doing a lot in FW.

Regards,
Jack

Reply via email to