- Issued:
- 2012-06-20
- Updated:
- 2012-06-20
RHBA-2012:0779 - Bug Fix Advisory
Synopsis
mcelog bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated mcelog packages that fix three bugs and add two enhancements are now
available for Red Hat Enterprise Linux 6.
Description
The mcelog packages provide the mcelog daemon to collect and decode Machine
Check Exception data on AMD64 and Intel 64 platforms.
This update fixes the following bugs:
- Prior to this update, the mcelog README file contained references to
nonexistent directories. This update removes these references and updates the
file. (BZ#728265)
- Prior to this update, the mcelog daemon wrongly displayed an error that a
certain microarchitecture was not supported even if the CPU was supported if
mcelog was run on Intel CPUs only with architectural decoding enabled. This
update removes this message. (BZ#769363)
- Prior to this update, a cron job tried to install regardless whether a system
was supported or not. As a result, the mcelog daemon displayed the message "No
such device" if mcelog was installed on unsupported systems. This update
prevents the cron job from installing on unsupported processors. (BZ#784091)
This update also adds the following enhancements:
- Prior to this update, the mcelog daemon displayed the error "mcelog read: No
such device" when running the unsupported AMD Family 16 microarchitecture or
higher. This update adds a check to mcelog to determine what AMD processor
family is used. If needed, the new message "CPU is unsupported" is displayed.
(BZ#746785)
- Prior to this update, The cron file for mcelog did not use the "--supported"
option. As a consequence, the "--supported" option did not correctly check
whether the mcelog daemon worked. This update adds the "--supported" option to
the crontab file and removes two redundant strings. (BZ#795508)
All users of mcelog are advised to upgrade to these updated mcelog packages,
which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
mcelog-1.0pre3_20110718-0.14.el6.src.rpm | SHA-256: d03877d549821404d82cbd3b8ecff543f46221d147331f6092be4a8aed908807 |
x86_64 | |
mcelog-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 39a1ee7af5dc91bdcb2fa23e92459205109903a9483739acf9a53bc91b46d7eb |
mcelog-debuginfo-1.0pre3_20110718-0.14.el6.x86_64.rpm | SHA-256: 423cc58112ca37d8909ee05fa73f53d3ab200d5f7250e6d327b261b31bfb0fea |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.