- Issued:
- 2013-11-20
- Updated:
- 2013-11-20
RHBA-2013:1658 - Bug Fix Advisory
Synopsis
mcelog bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated mcelog packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.
Description
The mcelog packages contain a daemon that collects and decodes Machine Check
Exception (MCE) data on AMD64 and Intel 64 machines.
This update fixes the following bugs:
- Previously, mcelog packages installed a cron job to report the status of mce
logs, which conflicted with running the mclogd service as default mode.
Consequently, mcelog competed with the cron job and did not collect complete
data. With this update, cron job is not installed in case mcelogd is running,
thus fixing this bug. (BZ#875824)
- Due to a bug in mcelog packages, the AMD Family 15 architecture was not
supported. The bug has been fixed and mcelog now supports AMD Family 15 as
expected. (BZ#919999)
- Previously, support for extended logging was enabled by default in mcelog
packages. Consequently, on systems with processors without support for extended
logging, the mcelog service terminated unexpectedly with the following message:
mcelog: Cannot open /dev/cpu/0/msr to set imc_log: Permission denied
With this update, extended logging is disabled by default in mcelog packages,
and the mcelog service no longer crashes in the aforementioned scenario.
(BZ#996634)
In addition, this update adds the following enhancements:
- With this update, mcelog packags support Intel Xeon Processor E5-XXXX v3,
Intel Xeon Processor E5-XXXX, and Intel Xeon Processor E3-XXXX v3 architectures.
(BZ#881555, BZ#922873, BZ#991079)
Users of mcelog are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm | SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49 |
x86_64 | |
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab |
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm | SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.