7
ipmi
ipmi
beakerlib-1.29.2-1.fc38.noarch
/kernel/ipmi/stress/ipmitool-loop
2022-10-01 09:43:54 EDT
2022-10-01 09:45:19 EDT
Fedora release 38 (Rawhide)
amd-milan-11.khw1.lab.eng.bos.redhat.com
unknown
256 x AMD EPYC 7713 64-Core Processor
257723 MB
238.34 GB
PURPOSE of /kernel/ipmi/stress/ipmitool-loop
Description: IPMItool loop stress test
Author: Rachel Sibley <rasibley@redhat.com>
Execute various IPMItool commands in a loop, verify the ipmi driver does
not get wedged after so many iterations.
Output of 'dmidecode --type 38 > /tmp/dmidecode.log':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSPASSPASSOutput of 'modprobe ipmi_ssif':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSOutput of 'modprobe ipmi_devintf':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSOutput of 'modprobe ipmi_poweroff':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSOutput of 'modprobe ipmi_watchdog':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSOutput of 'modprobe ipmi_si':--------------- OUTPUT START ------------------------------ OUTPUT END ---------------PASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 0 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 1 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 2 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 3 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 4 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 5 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 6 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 7 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 8 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 9 CompletePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSLoop 10 CompletePASSPASSPASSPhases fingerprint: GpTeNtEfAsserts fingerprint: soqEEN4+