Skip to navigation

Bug Fix Advisory mcelog bug fix and enhancement update

Advisory: RHBA-2009:1374-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2009-09-02
Last updated on: 2009-09-02
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated mcelog package that adds support for newer Intel hardware and
fixes two bugs is now available.

mcelog is a utility that allows the root user to decode machine check
errors (MCE).

This update addresses the following two bugs:

* the code that generates the MCE log contained a typo that appeared in
several places. Consequently, mcelog would ignore a chunk of the data at
the beginning of each record. The chunk of data would be so large that
each record would be empty and therefore, the log itself would be empty.
With this typo corrected, mcelog correctly generates its log of MCE
events. (BZ#501512)

* mcelog is unable to obtain MCE data from paravirtualized Xen guests on
a system. Previously, each time that mcelog tried and failed to obtain
this data, it would generate an error report -- by default, once per
hour. These error reports could mislead users to think that there was a
problem with their system. Now, mcelog does not generate error reports
when it cannot obtain MCE data from paravirtualized Xen guests, and
therefore avoids any potential confusion. (BZ#511126)

As well, this update adds the following enhancement:

* the mcelog package had not been updated in several releases. Therefore,
the existing package could not decode MCE events from newer Intel
processors such as the "Nehalem" and "Dunnington" series. This update adds
support for newer Intel hardware. (BZ#473392)

Users are advised to upgrade to the mcelog-0.9pre-1.24 which fixes these
bugs and adds support for new Intel hardware.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mcelog-0.9pre-1.27.el5.src.rpm
File outdated by:  RHBA-2011:0512
    MD5: 13bcd3871472a8ffc6de6109d9aef669
 
x86_64:
mcelog-0.9pre-1.27.el5.x86_64.rpm
File outdated by:  RHBA-2011:0512
    MD5: ebc678aa88e48ee5422aeddbe2aef729
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
mcelog-0.9pre-1.27.el5.src.rpm
File outdated by:  RHBA-2011:0512
    MD5: 13bcd3871472a8ffc6de6109d9aef669
 
x86_64:
mcelog-0.9pre-1.27.el5.x86_64.rpm
File outdated by:  RHBA-2011:0512
    MD5: ebc678aa88e48ee5422aeddbe2aef729
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

473392 - [Intel 5.4 FEAT] mcelog can not support Nehalem/Dunnington processor error decoding
501512 - mcelog: warning: 18446744073709551600 bytes ignored in each record
511126 - mcelog spits out error email every hour on domU guest



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/