Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1670543 Details for
Bug 1813889
osp16.1, rhel8.2: ipmitool commands via vbmc (virtualbmc) take too long and cause overcloud introspection to fail
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
ipmitool vvverbose
ipmitool_vvv.log (text/plain), 16.37 KB, created by
Waldemar Znoinski
on 2020-03-16 13:24:23 UTC
(
hide
)
Description:
ipmitool vvverbose
Filename:
MIME Type:
Creator:
Waldemar Znoinski
Created:
2020-03-16 13:24:23 UTC
Size:
16.37 KB
patch
obsolete
> >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x38 >>> data : 0x8e 0x04 > >BUILDING A v1.5 COMMAND >>> IPMI Request Session Header >>> Authtype : NONE >>> Sequence : 0x00000000 >>> Session ID : 0x00000000 >>> IPMI Request Message Header >>> Rs Addr : 20 >>> NetFn : 06 >>> Rs LUN : 0 >>> Rq Addr : 81 >>> Rq Seq : 00 >>> Rq Lun : 0 >>> Command : 38 ><< IPMI Response Session Header ><< Authtype : NONE ><< Payload type : IPMI (0) ><< Session ID : 0x00000000 ><< Sequence : 0x00000000 ><< IPMI Msg/Payload Length : 16 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 07 ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 00 ><< Rs Lun : 0 ><< Command : 38 ><< Compl Code : 0x00 >IPMI Request Match found > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x54 >>> data : 0x0e 0x00 0x80 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 >Unable to Get Channel Cipher Suites >>> SENDING AN OPEN SESSION REQUEST > >>> Console generated random number (16 bytes) > f7 cb 60 20 04 d4 2c 64 75 5f 2f 19 c1 73 5b 01 >>> SENDING A RAKP 1 MESSAGE > >bmc_rand (16 bytes) > 2a 95 31 93 99 ea 7a 31 b8 26 93 80 68 97 82 b8 >>> rakp2 mac input buffer (63 bytes) > a4 a3 a2 a0 60 48 73 8c f7 cb 60 20 04 d4 2c 64 > 75 5f 2f 19 c1 73 5b 01 2a 95 31 93 99 ea 7a 31 > b8 26 93 80 68 97 82 b8 0a 7a 31 f3 ca 6e 4d 11 > 91 58 d4 62 0c 1a c7 59 14 05 61 64 6d 69 6e >>> rakp2 mac key (20 bytes) > 70 61 73 73 77 6f 72 64 00 00 00 00 00 00 00 00 > 00 00 00 00 >>> rakp2 mac as computed by the remote console (20 bytes) > 46 80 f8 f3 01 40 69 58 b2 db 02 08 af 6e 7c 5f > 9f 51 5a e8 >>> rakp3 mac input buffer (27 bytes) > 2a 95 31 93 99 ea 7a 31 b8 26 93 80 68 97 82 b8 > a4 a3 a2 a0 14 05 61 64 6d 69 6e >>> rakp3 mac key (20 bytes) > 70 61 73 73 77 6f 72 64 00 00 00 00 00 00 00 00 > 00 00 00 00 >generated rakp3 mac (20 bytes) > c7 75 4d e7 07 d0 d1 8f 6b 19 8f 69 ea d1 45 ae > ca 2a 85 ef >session integrity key input (39 bytes) > f7 cb 60 20 04 d4 2c 64 75 5f 2f 19 c1 73 5b 01 > 2a 95 31 93 99 ea 7a 31 b8 26 93 80 68 97 82 b8 > 14 05 61 64 6d 69 6e >Generated session integrity key (20 bytes) > 5f 8c 0b 8e 47 1c 97 65 83 b0 6b a2 35 2c 9b b3 > 1c 10 38 36 >Generated K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Generated K2 (20 bytes) > ee 1a 33 f6 16 2c 05 62 89 11 e6 08 55 48 98 3b > eb bf 61 22 >>> SENDING A RAKP 3 MESSAGE > >>> rakp4 mac input buffer (36 bytes) > f7 cb 60 20 04 d4 2c 64 75 5f 2f 19 c1 73 5b 01 > 60 48 73 8c 0a 7a 31 f3 ca 6e 4d 11 91 58 d4 62 > 0c 1a c7 59 >>> rakp4 mac key (sik) (20 bytes) > 5f 8c 0b 8e 47 1c 97 65 83 b0 6b a2 35 2c 9b b3 > 1c 10 38 36 >>> rakp4 mac as computed by the BMC (20 bytes) > b7 51 ee 95 d0 40 fa 07 79 f0 33 1a 68 97 82 b8 > 0a 7a 31 f3 >>> rakp4 mac as computed by the remote console (20 bytes) > b7 51 ee 95 d0 40 fa 07 79 f0 33 1a 88 70 8b cd > 81 ab 05 7e >IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x3b >>> data : 0x04 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 >>> Initialization vector (16 bytes) > 72 23 1d 8f 06 72 50 c5 f1 dc 00 18 e9 4e 73 cf >authcode input (48 bytes) > 06 c0 60 48 73 8c 0f 00 00 00 20 00 72 23 1d 8f > 06 72 50 c5 f1 dc 00 18 e9 4e 73 cf b5 91 80 28 > e8 26 06 71 58 29 71 d2 d2 16 0d 57 ff ff 02 07 >authcode output (12 bytes) > 91 9a a5 15 75 b3 3e 5d 1f 5f 8f 37 >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 01 00 00 00 20 00 18 31 23 78 > f6 02 df cb 60 66 a2 84 c8 2a 2e 55 c4 fc 2f 3e > 69 f0 96 8d 31 31 78 80 4b 6f 7a 0c ff ff 02 07 >Generated authcode (20 bytes) > 1f 45 f9 9e 1f 67 40 dc 7d f4 0f c5 ba dd 8e bf > 69 b5 02 79 >Expected authcode (12 bytes) > 1f 45 f9 9e 1f 67 40 dc 7d f4 0f c5 ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000001 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 07 ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 02 ><< Rs Lun : 0 ><< Command : 3b ><< Compl Code : 0x00 >IPMI Request Match found >set_session_privlvl (1 bytes) > 04 >Set Session Privilege Level to ADMINISTRATOR > > >>> Sending IPMI command payload >>> netfn : 0x2c >>> command : 0x3e >>> data : 0x00 0x02 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 >>> Initialization vector (16 bytes) > 57 b9 6d 34 dd 8e 2c 03 22 51 05 72 86 7f 8f 0c >authcode input (48 bytes) > 06 c0 60 48 73 8c 10 00 00 00 20 00 57 b9 6d 34 > dd 8e 2c 03 22 51 05 72 86 7f 8f 0c d6 8e 9d ae > 56 e5 9a 69 7f f0 6a 6c 5d 38 3c 1f ff ff 02 07 >authcode output (12 bytes) > 22 92 02 1f 4f d6 0c 5b 2d d8 d0 0d >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 02 00 00 00 20 00 89 40 9a af > a0 fd 50 aa 9f 7d 45 20 0d 04 15 1a 7c 36 bb d9 > 4f 3e d9 85 c0 9a 70 40 c7 ce c7 f7 ff ff 02 07 >Generated authcode (20 bytes) > c4 5b 82 bd e8 df 51 a0 81 bf 6e ce bc 0a a9 d7 > 72 8c 18 d9 >Expected authcode (12 bytes) > c4 5b 82 bd e8 df 51 a0 81 bf 6e ce ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000002 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 2d ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 03 ><< Rs Lun : 0 ><< Command : 3e ><< Compl Code : 0xc1 >IPMI Request Match found >IPM Controller is not HPM.2 compatible > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x01 >>> data : > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 >>> Initialization vector (16 bytes) > 4c 9c ef f1 05 86 fc 72 c0 a9 7c 3d ed e6 cb a8 >authcode input (48 bytes) > 06 c0 60 48 73 8c 11 00 00 00 20 00 4c 9c ef f1 > 05 86 fc 72 c0 a9 7c 3d ed e6 cb a8 e7 21 c9 3a > be 02 9e 17 b6 3b f8 9b b3 4f af 02 ff ff 02 07 >authcode output (12 bytes) > 08 60 7e 72 87 0f 9e 78 b6 de 58 89 >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (64 bytes) > 06 c0 a4 a3 a2 a0 03 00 00 00 30 00 d0 28 e4 35 > 44 48 e2 ca e8 91 91 4b 5f 45 5e d2 e2 41 e0 88 > de 63 b4 d3 c5 28 e7 3d 15 32 23 64 24 dd 54 0b > 01 78 26 7f 2a 00 af 9c 0e a5 7b f0 ff ff 02 07 >Generated authcode (20 bytes) > 0e c2 1d bf 79 c8 2f a3 57 26 14 1e b2 c1 ca b6 > ef 31 64 b6 >Expected authcode (12 bytes) > 0e c2 1d bf 79 c8 2f a3 57 26 14 1e ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000003 ><< IPMI Msg/Payload Length : 48 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 07 ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 04 ><< Rs Lun : 0 ><< Command : 01 ><< Compl Code : 0x00 >IPMI Request Match found >Iana: 0 >Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20 > >>> Sending IPMI command payload >>> netfn : 0x2c >>> command : 0x00 >>> data : 0x00 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 >>> Initialization vector (16 bytes) > 76 65 00 07 ab 66 72 77 c3 6f 92 9f bc 79 b9 26 >authcode input (48 bytes) > 06 c0 60 48 73 8c 12 00 00 00 20 00 76 65 00 07 > ab 66 72 77 c3 6f 92 9f bc 79 b9 26 3d ff 76 ba > 17 70 9b b6 5b 50 74 be 29 b8 59 79 ff ff 02 07 >authcode output (12 bytes) > 69 e0 ce 2a c4 d0 ee 34 34 6e 07 93 >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 04 00 00 00 20 00 13 ec ec 5a > 06 01 bf e5 fb 6c 0d 43 ed 26 9a 23 41 6d 60 69 > 94 b9 ab ec 15 4a 41 f1 ea 75 9c 2b ff ff 02 07 >Generated authcode (20 bytes) > 27 b3 3c 05 22 06 09 96 19 73 ec d8 52 d7 bc 0e > da de c2 c4 >Expected authcode (12 bytes) > 27 b3 3c 05 22 06 09 96 19 73 ec d8 ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000004 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 2d ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 05 ><< Rs Lun : 0 ><< Command : 00 ><< Compl Code : 0xc1 >IPMI Request Match found >Error response 0xc1 from Get PICMG Properities >Running Get VSO Capabilities my_addr 0x20, transit 0, target 0x20 > >>> Sending IPMI command payload >>> netfn : 0x2c >>> command : 0x00 >>> data : 0x03 > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 >>> Initialization vector (16 bytes) > b5 69 b5 e7 22 cb a6 6b 25 75 06 96 0b 70 bc 01 >authcode input (48 bytes) > 06 c0 60 48 73 8c 13 00 00 00 20 00 b5 69 b5 e7 > 22 cb a6 6b 25 75 06 96 0b 70 bc 01 59 80 22 90 > 25 93 45 22 8f 0d 78 03 ad 67 88 ff ff ff 02 07 >authcode output (12 bytes) > 34 2f 47 ec b0 62 9f 5c 4a 85 5b 78 >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 05 00 00 00 20 00 79 e0 4d 91 > 5e 29 d5 50 4b 77 92 28 4d d3 b4 8d 6d 54 f3 94 > 6d 53 00 75 74 d0 d7 16 46 c8 d0 58 ff ff 02 07 >Generated authcode (20 bytes) > 58 ec 35 34 7f f0 43 0e 06 05 fe 16 76 0b 36 22 > e3 ca 93 c3 >Expected authcode (12 bytes) > 58 ec 35 34 7f f0 43 0e 06 05 fe 16 ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000005 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 2d ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 06 ><< Rs Lun : 0 ><< Command : 00 ><< Compl Code : 0xc1 >IPMI Request Match found >Invalid completion code received: Invalid command >Acquire IPMB address >Discovered IPMB address 0x0 >Interface address: my_addr 0x20 transit 0:0 target 0x20:0 ipmb_target 0 > > >>> Sending IPMI command payload >>> netfn : 0x00 >>> command : 0x01 >>> data : > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 >>> Initialization vector (16 bytes) > 76 0d 6a a3 e8 10 58 eb 1c 35 18 35 fe bc f2 0f >authcode input (48 bytes) > 06 c0 60 48 73 8c 14 00 00 00 20 00 76 0d 6a a3 > e8 10 58 eb 1c 35 18 35 fe bc f2 0f 5a 97 16 99 > cd f2 92 d6 92 f9 e4 97 48 3a 7c 34 ff ff 02 07 >authcode output (12 bytes) > ab 09 6b ea ed 1e 15 e8 da ab 49 7e >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 06 00 00 00 20 00 53 0c 21 d4 > 60 4d 03 6c 6f 10 f4 f5 da 66 b5 46 53 b6 fe e6 > 81 51 8b eb 47 ed d5 ae 46 5b fd d2 ff ff 02 07 >Generated authcode (20 bytes) > e7 f4 3e e6 46 a6 f7 3e 7d a9 88 5e bd 99 d7 13 > 57 40 a4 6d >Expected authcode (12 bytes) > e7 f4 3e e6 46 a6 f7 3e 7d a9 88 5e ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000006 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 01 ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 07 ><< Rs Lun : 0 ><< Command : 01 ><< Compl Code : 0x00 >IPMI Request Match found > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x3c >>> data : 0x60 0x48 0x73 0x8c > >BUILDING A v2 COMMAND >Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 >>> Initialization vector (16 bytes) > bd ed 94 e1 8e b1 c1 53 a9 1e 90 b6 b7 a1 21 e0 >authcode input (48 bytes) > 06 c0 60 48 73 8c 15 00 00 00 20 00 bd ed 94 e1 > 8e b1 c1 53 a9 1e 90 b6 b7 a1 21 e0 0a e7 e1 8d > 74 20 6f 47 a3 ac 8c f6 e2 c3 e7 b8 ff ff 02 07 >authcode output (12 bytes) > fa 8c 90 34 74 be a4 43 3b fd 5e e2 >Validating authcode >K1 (20 bytes) > f0 90 ae e9 96 3e 1d 24 ed ce 5e f3 aa 39 2f 8a > 5f 11 b1 94 >Authcode Input Data (48 bytes) > 06 c0 a4 a3 a2 a0 07 00 00 00 20 00 83 4c f2 8d > 28 28 10 d5 ba ae c7 98 aa a5 05 db 0f 0f cb f0 > be 08 22 a6 2f 3f fb e6 0a d4 f9 d9 ff ff 02 07 >Generated authcode (20 bytes) > 74 16 48 99 4a 53 73 31 84 75 85 48 8a 3d 0d c0 > e0 c2 96 2e >Expected authcode (12 bytes) > 74 16 48 99 4a 53 73 31 84 75 85 48 ><< IPMI Response Session Header ><< Authtype : RMCP+ ><< Payload type : IPMI (0) ><< Session ID : 0xa0a2a3a4 ><< Sequence : 0x00000007 ><< IPMI Msg/Payload Length : 32 ><< IPMI Response Message Header ><< Rq Addr : 81 ><< NetFn : 07 ><< Rq LUN : 0 ><< Rs Addr : 20 ><< Rq Seq : 08 ><< Rs Lun : 0 ><< Command : 3c ><< Compl Code : 0x00 >IPMI Request Match found >Closed Session 8c734860 > ><<OPEN SESSION RESPONSE ><< Message tag : 0x00 ><< RMCP+ status : no errors ><< Maximum privilege level : admin ><< Console Session ID : 0xa0a2a3a4 ><< BMC Session ID : 0x8c734860 ><< Negotiated authenticatin algorithm : hmac_sha1 ><< Negotiated integrity algorithm : hmac_sha1_96 ><< Negotiated encryption algorithm : aes_cbc_128 > ><<RAKP 2 MESSAGE ><< Message tag : 0x00 ><< RMCP+ status : no errors ><< Console Session ID : 0xa0a2a3a4 ><< BMC random number : 0x2a95319399ea7a31b8269380689782b8 ><< BMC GUID : 0x0a7a31f3ca6e4d119158d4620c1ac759 ><< Key exchange auth code [sha1] : 0x4680f8f301406958b2db0208af6e7c5f9f515ae8 > ><<RAKP 4 MESSAGE ><< Message tag : 0x00 ><< RMCP+ status : no errors ><< Console Session ID : 0xa0a2a3a4 ><< Key exchange auth code [sha1] : 0xb751ee95d040fa0779f0331a > >System Power : on >Power Overload : false >Power Interlock : inactive >Main Power Fault : false >Power Control Fault : false >Power Restore Policy : always-off >Last Power Event : >Chassis Intrusion : inactive >Front-Panel Lockout : inactive >Drive Fault : false >Cooling/Fan Fault : false
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1813889
:
1670542
| 1670543