Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 2035662

Summary: Error reading system DMI information: # SMBIOS implementations newer than version 2.7 are not
Product: Red Hat Enterprise Linux 9 Reporter: John Sefler <jsefler>
Component: subscription-managerAssignee: Pino Toscano <ptoscano>
Status: CLOSED ERRATA QA Contact: Red Hat subscription-manager QE Team <rhsm-qe>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0CC: jhnidek, ptoscano
Target Milestone: rcKeywords: Triaged
Target Release: 9.0Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: subscription-manager-1.29.25-1.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-17 15:58:31 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description John Sefler 2021-12-26 16:07:42 UTC
Description of problem:

There is a WARNING written to the rhsm.log when reading system facts on OpenStack instances of RHEL. This bug is reminiscent of older bug 1458159 and may be better assigned to component python-dmidecode.

This warning is logged on both RHEL9 and RHEL8 when OpenStack is used.  I have not see this warning when reserving systems from Beaker.


Version-Release number of selected component (if applicable):
[root@rhsm-auto90-client1 ~]# rpm -q subscription-manager python3-dmidecode
subscription-manager-1.29.21-1.git.71.2c658b9.el9.x86_64
python3-dmidecode-3.12.2-27.el9.x86_64


How reproducible:


Steps to Reproduce:
1. Provision a RHEL system on OpenStack

[root@rhsm-auto90-client1 ~]# subscription-manager config --logging.default_log_level=DEBUG
[root@rhsm-auto90-client1 ~]# subscription-manager facts --list > /tmp/facts
[root@rhsm-auto90-client1 ~]# tail -50 /var/log/rhsm/rhsm.log | grep WARNING -B1
2021-12-26 10:48:16,904 [DEBUG] subscription-manager:6824:MainThread @dmiinfo.py:73 - Using dmidecode dump file: /dev/mem
2021-12-26 10:48:16,921 [WARNING] subscription-manager:6824:MainThread @dmiinfo.py:128 - Error reading system DMI information: # SMBIOS implementations newer than version 2.7 are not


[root@rhsm-auto90-client1 ~]# dmidecode | head -6
# dmidecode 3.3
Getting SMBIOS data from sysfs.
SMBIOS 2.8 present.        <================= LOOK HERE: 2.8 IS NEWER THAN 2.7
9 structures occupying 367 bytes.
Table at 0x000F5B20.


Actual results:
  [WARNING] subscription-manager:2008:MainThread @dmiinfo.py:128 - Error reading system DMI information: # SMBIOS implementations newer than version 2.7 are not


Expected results:
  Either this warning is acceptable, or more likely a python3-dmidecode is needed.


Additional info:

[root@rhsm-auto90-client1 ~]# subscription-manager facts --list
cpu.core(s)_per_socket: 1
cpu.cpu(s): 1
cpu.cpu_socket(s): 1
cpu.thread(s)_per_core: 1
cpu.topology_source: kernel /sys cpu sibling lists
distribution.id: Plow
distribution.name: Red Hat Enterprise Linux
distribution.version: 9.0
distribution.version.modifier: Unknown
dmi.bios.address: 0xe8000
dmi.bios.bios_revision: 0.0
dmi.bios.release_date: 04/01/2014
dmi.bios.rom_size: 64 KB
dmi.bios.runtime_size: 96 KB
dmi.bios.vendor: SeaBIOS
dmi.bios.version: 1.14.0-4.fc34
dmi.chassis.asset_tag: Unknown
dmi.chassis.boot-up_state: Safe
dmi.chassis.lock: Not Present
dmi.chassis.manufacturer: QEMU
dmi.chassis.power_supply_state: Safe
dmi.chassis.security_status: Unknown
dmi.chassis.serial_number: Unknown
dmi.chassis.thermal_state: Safe
dmi.chassis.type: Other
dmi.chassis.version: pc-q35-3.0
dmi.memory.array_handle: 0x1000
dmi.memory.assettag: Unknown
dmi.memory.bank_locator: Unknown
dmi.memory.data_width: Unknown
dmi.memory.error_correction_type: Multi-bit ECC
dmi.memory.error_information_handle: Not Provided
dmi.memory.form_factor: DIMM
dmi.memory.location: Other
dmi.memory.locator: DIMM 0
dmi.memory.manufacturer: QEMU
dmi.memory.maximum_capacity: 1954 MB
dmi.memory.part_number: Unknown
dmi.memory.serial_number: Unknown
dmi.memory.size: 1954 MB
dmi.memory.speed:   (ns)
dmi.memory.total_width: Unknown
dmi.memory.type: RAM
dmi.memory.use: System Memory
dmi.meta.cpu_socket_count: 1
dmi.processor.asset_tag: Unknown
dmi.processor.family: Other
dmi.processor.part_number: Unknown
dmi.processor.serial_number: Unknown
dmi.processor.socket_designation: CPU 0
dmi.processor.status: Populated:Enabled
dmi.processor.type: Central Processor
dmi.processor.upgrade: Other
dmi.processor.version: pc-q35-3.0
dmi.processor.voltage: Unknown
dmi.system.family: Unknown
dmi.system.manufacturer: QEMU
dmi.system.product_name: Standard PC (Q35 + ICH9, 2009)
dmi.system.serial_number: Unknown
dmi.system.sku_number: Unknown
dmi.system.status: No errors detected
dmi.system.uuid: 75AA708C-DC8D-4B82-BA5F-187A5C2915AA
dmi.system.version: pc-q35-3.0
dmi.system.wake-up_type: Power Switch
insights_id: 80b6cac3-3e79-492c-9aca-d4f03a1a2537
last_boot: 2021-12-26 15:05:31 UTC
lscpu.address_sizes: 40 bits physical, 48 bits virtual
lscpu.architecture: x86_64
lscpu.bios_model_name: pc-q35-3.0
lscpu.bios_vendor_id: QEMU
lscpu.bogomips: 3999.99
lscpu.byte_order: Little Endian
lscpu.core(s)_per_socket: 1
lscpu.cpu(s): 1
lscpu.cpu_family: 6
lscpu.cpu_op-mode(s): 32-bit, 64-bit
lscpu.flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq vmx ssse3 cx16 pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx hypervisor lahf_lm cpuid_fault pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid tsc_adjust xsaveopt arat umip arch_capabilities
lscpu.hypervisor_vendor: KVM
lscpu.l1d_cache: 32 KiB (1 instance)
lscpu.l1i_cache: 32 KiB (1 instance)
lscpu.l2_cache: 4 MiB (1 instance)
lscpu.l3_cache: 16 MiB (1 instance)
lscpu.model: 42
lscpu.model_name: Intel Xeon E312xx (Sandy Bridge, IBRS update)
lscpu.numa_node(s): 1
lscpu.numa_node0_cpu(s): 0
lscpu.on-line_cpu(s)_list: 0
lscpu.socket(s): 1
lscpu.stepping: 1
lscpu.thread(s)_per_core: 1
lscpu.vendor_id: GenuineIntel
lscpu.virtualization: VT-x
lscpu.virtualization_type: full
lscpu.vulnerability_itlb_multihit: Not affected
lscpu.vulnerability_l1tf: Mitigation; PTE Inversion; VMX flush not necessary, SMT disabled
lscpu.vulnerability_mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
lscpu.vulnerability_meltdown: Mitigation; PTI
lscpu.vulnerability_spec_store_bypass: Mitigation; Speculative Store Bypass disabled via prctl
lscpu.vulnerability_spectre_v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
lscpu.vulnerability_spectre_v2: Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling
lscpu.vulnerability_srbds: Not affected
lscpu.vulnerability_tsx_async_abort: Not affected
memory.memtotal: 1720504
memory.swaptotal: 0
net.interface.eth0.ipv4_address: 10.8.29.27
net.interface.eth0.ipv4_address_list: 10.8.29.27
net.interface.eth0.ipv4_broadcast: 10.8.31.255
net.interface.eth0.ipv4_broadcast_list: 10.8.31.255
net.interface.eth0.ipv4_netmask: 19
net.interface.eth0.ipv4_netmask_list: 19
net.interface.eth0.ipv6_address.global: 2620:52:0:800:5054:ff:fe82:f803
net.interface.eth0.ipv6_address.global_list: 2620:52:0:800:5054:ff:fe82:f803
net.interface.eth0.ipv6_address.link: fe80::5054:ff:fe82:f803
net.interface.eth0.ipv6_address.link_list: fe80::5054:ff:fe82:f803
net.interface.eth0.ipv6_netmask.global: 64
net.interface.eth0.ipv6_netmask.global_list: 64
net.interface.eth0.ipv6_netmask.link: 64
net.interface.eth0.ipv6_netmask.link_list: 64
net.interface.eth0.mac_address: 52:54:00:82:f8:03
net.interface.lo.ipv4_address: 127.0.0.1
net.interface.lo.ipv4_address_list: 127.0.0.1
net.interface.lo.ipv4_broadcast: Unknown
net.interface.lo.ipv4_broadcast_list: Unknown
net.interface.lo.ipv4_netmask: 8
net.interface.lo.ipv4_netmask_list: 8
net.interface.lo.ipv6_address.host: ::1
net.interface.lo.ipv6_address.host_list: ::1
net.interface.lo.ipv6_netmask.host: 128
net.interface.lo.ipv6_netmask.host_list: 128
network.fqdn: rhsm-auto90-client1.usersys.redhat.com
network.hostname: rhsm-auto90-client1.usersys.redhat.com
network.ipv4_address: 10.8.29.27
network.ipv6_address: fe80::5054:ff:fe82:f803, 2620:52:0:800:5054:ff:fe82:f803
proc_cpuinfo.common.address_sizes: 40 bits physical, 48 bits virtual
proc_cpuinfo.common.apicid: 0
proc_cpuinfo.common.bogomips: 3999.99
proc_cpuinfo.common.bugs: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds swapgs
proc_cpuinfo.common.cache_alignment: 64
proc_cpuinfo.common.cache_size: 16384 KB
proc_cpuinfo.common.clflush_size: 64
proc_cpuinfo.common.core_id: 0
proc_cpuinfo.common.cpu_cores: 1
proc_cpuinfo.common.cpu_family: 6
proc_cpuinfo.common.cpu_mhz: 1999.999
proc_cpuinfo.common.cpuid_level: 13
proc_cpuinfo.common.flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq vmx ssse3 cx16 pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx hypervisor lahf_lm cpuid_fault pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid tsc_adjust xsaveopt arat umip arch_capabilities
proc_cpuinfo.common.fpu: yes
proc_cpuinfo.common.fpu_exception: yes
proc_cpuinfo.common.initial_apicid: 0
proc_cpuinfo.common.microcode: 0x1
proc_cpuinfo.common.model: 42
proc_cpuinfo.common.model_name: Intel Xeon E312xx (Sandy Bridge, IBRS update)
proc_cpuinfo.common.physical_id: 0
proc_cpuinfo.common.power_management: Unknown
proc_cpuinfo.common.processor: 0
proc_cpuinfo.common.siblings: 1
proc_cpuinfo.common.stepping: 1
proc_cpuinfo.common.vendor_id: GenuineIntel
proc_cpuinfo.common.vmx_flags: vnmi preemption_timer invvpid ept_x_only ept_1gb flexpriority tsc_offset vtpr mtf vapic ept vpid unrestricted_guest
proc_cpuinfo.common.wp: yes
proc_stat.btime: 1640531131
system.certificate_version: 3.2
system.default_locale: en_US.UTF-8
uname.machine: x86_64
uname.nodename: rhsm-auto90-client1.usersys.redhat.com
uname.release: 5.14.0-39.el9.x86_64
uname.sysname: Linux
uname.version: #1 SMP PREEMPT Fri Dec 24 00:07:58 EST 2021
virt.host_type: kvm
virt.is_guest: True
virt.uuid: 75AA708C-DC8D-4B82-BA5F-187A5C2915AA

Comment 1 John Sefler 2022-01-06 15:47:19 UTC
During subscription-manager triage, there was some question whether or not the warning message logged to rhsm.log was truncated.  It was not truncated.  It spans multiple lines as shown here...

[root@rhsm-auto9-client1 ~]# subscription-manager facts --list > /tmp/facts && tail -20 /var/log/rhsm/rhsm.log | grep WARNING -B1 -A4
2022-01-06 10:44:44,221 [DEBUG] subscription-manager:2922470:MainThread @dmiinfo.py:73 - Using dmidecode dump file: /dev/mem
2022-01-06 10:44:44,229 [WARNING] subscription-manager:2922470:MainThread @dmiinfo.py:128 - Error reading system DMI information: # SMBIOS implementations newer than version 2.7 are not
# fully supported by this version of dmidecode.

NoneType: None
2022-01-06 10:44:44,320 [DEBUG] subscription-manager:2922470:MainThread @hwprobe.py:656 - Parsing lscpu JSON: b'{\n   "lscpu": [\n      {\n         "field": "Architecture:",\n         "data": "x86_64"\n      },{\n         "field": "CPU op-mode(s):",\n         "data": "32-bit, 64-bit"\n      },{\n         "field": "Address sizes:",\n         "data": "40 bits physical, 48 bits virtual"\n      },{\n         "field": "Byte Order:",\n         "data": "Little Endian"\n      },{\n         "field": "CPU(s):",\n         "data": "1"\n      },{\n         "field": "On-line CPU(s) list:",\n         "data": "0"\n      },{\n         "field": "Vendor ID:",\n         "data": "GenuineIntel"\n      },{\n         "field": "BIOS Vendor ID:",\n         "data": "QEMU"\n      },{\n         "field": "Model name:",\n         "data": "Intel Xeon E312xx (Sandy Bridge, IBRS update)"\n      },{\n         "field": "BIOS Model name:",\n         "data": "pc-q35-3.0"\n      },{\n         "field": "CPU family:",\n         "data": "6"\n      },{\n         "field": "Model:",\n         "data": "42"\n      },{\n         "field": "Thread(s) per core:",\n         "data": "1"\n      },{\n         "field": "Core(s) per socket:",\n         "data": "1"\n      },{\n         "field": "Socket(s):",\n         "data": "1"\n      },{\n         "field": "Stepping:",\n         "data": "1"\n      },{\n         "field": "BogoMIPS:",\n         "data": "3999.99"\n      },{\n         "field": "Flags:",\n         "data": "fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq vmx ssse3 cx16 pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx hypervisor lahf_lm cpuid_fault pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid tsc_adjust xsaveopt arat umip arch_capabilities"\n      },{\n         "field": "Virtualization:",\n         "data": "VT-x"\n      },{\n         "field": "Hypervisor vendor:",\n         "data": "KVM"\n      },{\n         "field": "Virtualization type:",\n         "data": "full"\n      },{\n         "field": "L1d cache:",\n         "data": "32 KiB (1 instance)"\n      },{\n         "field": "L1i cache:",\n         "data": "32 KiB (1 instance)"\n      },{\n         "field": "L2 cache:",\n         "data": "4 MiB (1 instance)"\n      },{\n         "field": "L3 cache:",\n         "data": "16 MiB (1 instance)"\n      },{\n         "field": "NUMA node(s):",\n         "data": "1"\n      },{\n         "field": "NUMA node0 CPU(s):",\n         "data": "0"\n      },{\n         "field": "Vulnerability Itlb multihit:",\n         "data": "Not affected"\n      },{\n         "field": "Vulnerability L1tf:",\n         "data": "Mitigation; PTE Inversion; VMX flush not necessary, SMT disabled"\n      },{\n         "field": "Vulnerability Mds:",\n         "data": "Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown"\n      },{\n         "field": "Vulnerability Meltdown:",\n         "data": "Mitigation; PTI"\n      },{\n         "field": "Vulnerability Spec store bypass:",\n         "data": "Mitigation; Speculative Store Bypass disabled via prctl and seccomp"\n      },{\n         "field": "Vulnerability Spectre v1:",\n         "data": "Mitigation; usercopy/swapgs barriers and __user pointer sanitization"\n      },{\n         "field": "Vulnerability Spectre v2:",\n         "data": "Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling"\n      },{\n         "field": "Vulnerability Srbds:",\n         "data": "Not affected"\n      },{\n         "field": "Vulnerability Tsx async abort:",\n         "data": "Not affected"\n      }\n   ]\n}\n'
[root@rhsm-auto9-client1 ~]#

Comment 2 Pino Toscano 2022-01-10 14:37:58 UTC
This is a warning of dmidecode and not an hard error: the "dmi" facts are properly created.

This behaviour depends on the actual DMI bits on the machine: on my P1 Gen3, I get the same warnings:
  # SMBIOS implementations newer than version 2.7 are not
  # fully supported by this version of dmidecode.
... because the system has:
  SMBIOS 3.2.0 present.

The code triggering this is the following in dmiinfo.py:

    def log_warnings(self, dmidecode):
        dmiwarnings = dmidecode.get_warnings()
        if dmiwarnings:
            log.warning(_("Error reading system DMI information: {dmiwarnings}").format(dmiwarnings=dmiwarnings), exc_info=True)
            dmidecode.clear_warnings()

I think there are two possible steps here:
a) definitely improve the wording for the dmidecode warnings: they are logged as sub-man warnings, so the text "error reading" seems a bit odd; this wording was introduced years ago with commit 1d53970848bf4412234f6d93d6a2e2a62f75e59e
b) maybe downgrade the sub-man logging priority from warning to info? after all, it is not something too actionable, IMHO...

Comment 3 Pino Toscano 2022-01-11 16:21:39 UTC
The DMI information are extracted using python-dmidecode: https://github.com/nima/python-dmidecode
Unfortunately, it does not have an active development at the time of this writing, and thus newer DMI versions are not supported -- e.g. https://github.com/nima/python-dmidecode/issues/2

We discussed this bug in a recent triaging meeting, and we agreed that the only actionable thing to do is to soften the wording of the message with dmidecode warnings to not mention "error". We agreed that it was still a good idea to log the dmidecode warnings with a "warning" priority.

Comment 4 John Sefler 2022-02-10 19:33:04 UTC
Pre-verifying version...

[root@rhsm-auto90-client2 ~]# rpm -q subscription-manager
subscription-manager-1.29.24-1.git.0.db28224.el9.x86_64
[root@rhsm-auto90-client2 ~]# rpm -q subscription-manager --changelog | grep 2035662 
- 2035662: facts: tweak message for dmidecode warnings (ptoscano)
[root@rhsm-auto90-client2 ~]# 
[root@rhsm-auto90-client2 ~]# 
[root@rhsm-auto90-client2 ~]# 
[root@rhsm-auto90-client2 ~]# subscription-manager config --logging.default_log_level=DEBUG
[root@rhsm-auto90-client2 ~]# dmidecode | head -6
# dmidecode 3.3
Getting SMBIOS data from sysfs.
SMBIOS 2.8 present.
9 structures occupying 367 bytes.
Table at 0x000F59C0.

[root@rhsm-auto90-client2 ~]# subscription-manager facts --list > /tmp/facts && tail -20 /var/log/rhsm/rhsm.log | grep WARNING -B1 -A4
2022-02-10 14:15:57,488 [DEBUG] subscription-manager:1440055:MainThread @dmiinfo.py:71 - Using dmidecode dump file: /dev/mem
2022-02-10 14:15:57,497 [WARNING] subscription-manager:1440055:MainThread @dmiinfo.py:125 - Warnings while reading system DMI information:
# SMBIOS implementations newer than version 2.7 are not
# fully supported by this version of dmidecode.


[root@rhsm-auto90-client2 ~]# 

VERIFIED: As shown above on a system with SMBIOS 2.8 (or newer) present, the wording in the rhsm.log WARNING has been softened from an "Error reading system DMI information:" to a "Warnings while reading system DMI information:" and the former NoneType: None formatting from logging the warning has been corrected.

Comment 7 John Sefler 2022-02-21 14:04:16 UTC
Verifying subscription-manager-1.29.26-1.el9 which has landed in compose RHEL-9.0.0-20220221.2 ...

[root@rhsm-auto90-client1 ~]# rpm -q subscription-manager
subscription-manager-1.29.26-1.el9.x86_64
[root@rhsm-auto90-client1 ~]# rpm -q subscription-manager --changelog | grep 2035662
- 2035662: facts: tweak message for dmidecode warnings (ptoscano)
[root@rhsm-auto90-client1 ~]# 
[root@rhsm-auto90-client1 ~]# 
[root@rhsm-auto90-client1 ~]# subscription-manager config --logging.default_log_level=DEBUG
[root@rhsm-auto90-client1 ~]# dmidecode | head -6
# dmidecode 3.3
Getting SMBIOS data from sysfs.
SMBIOS 2.8 present.
9 structures occupying 367 bytes.
Table at 0x000F59C0.

[root@rhsm-auto90-client1 ~]# subscription-manager facts --list > /tmp/facts && tail -20 /var/log/rhsm/rhsm.log | grep WARNING -B1 -A4
2022-02-21 08:58:06,257 [DEBUG] subscription-manager:612659:MainThread @dmiinfo.py:71 - Using dmidecode dump file: /dev/mem
2022-02-21 08:58:06,267 [WARNING] subscription-manager:612659:MainThread @dmiinfo.py:125 - Warnings while reading system DMI information:
# SMBIOS implementations newer than version 2.7 are not
# fully supported by this version of dmidecode.


[root@rhsm-auto90-client1 ~]# 


VERIFIED: As shown above on a system with SMBIOS 2.8 (or newer), the wording in the rhsm.log WARNING has been softened from an "Error reading system DMI information:" to "Warnings while reading system DMI information:" and the former NoneType: None formatting (as encountered in comment 1) from logging the warning has been corrected.

Comment 9 errata-xmlrpc 2022-05-17 15:58:31 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (new packages: subscription-manager), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:3984