Bug Fix Advisory mcelog bug fix and enhancement update

Advisory: RHBA-2013:1658-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated mcelog packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

The mcelog packages contain a daemon that collects and decodes Machine Check
Exception (MCE) data on AMD64 and Intel 64 machines.

This update fixes the following bugs:

* Previously, mcelog packages installed a cron job to report the status of mce
logs, which conflicted with running the mclogd service as default mode.
Consequently, mcelog competed with the cron job and did not collect complete
data. With this update, cron job is not installed in case mcelogd is running,
thus fixing this bug. (BZ#875824)

* Due to a bug in mcelog packages, the AMD Family 15 architecture was not
supported. The bug has been fixed and mcelog now supports AMD Family 15 as
expected. (BZ#919999)

* Previously, support for extended logging was enabled by default in mcelog
packages. Consequently, on systems with processors without support for extended
logging, the mcelog service terminated unexpectedly with the following message:

mcelog: Cannot open /dev/cpu/0/msr to set imc_log: Permission denied

With this update, extended logging is disabled by default in mcelog packages,
and the mcelog service no longer crashes in the aforementioned scenario.
(BZ#996634)

In addition, this update adds the following enhancements:

* With this update, mcelog packags support Intel Xeon Processor E5-XXXX v3,
Intel Xeon Processor E5-XXXX, and Intel Xeon Processor E3-XXXX v3 architectures.
(BZ#881555, BZ#922873, BZ#991079)

Users of mcelog are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm
File outdated by:  RHBA-2016:0727
    MD5: 387d33ac5574e5f70e089eedbd061522
SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49
 
x86_64:
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: 0c8eacc2c187d65411ca96dcea7d1cda
SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: a8df97eba3eb5ad8836efe2e508fb93b
SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm
File outdated by:  RHBA-2016:0727
    MD5: 387d33ac5574e5f70e089eedbd061522
SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49
 
x86_64:
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: 0c8eacc2c187d65411ca96dcea7d1cda
SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: a8df97eba3eb5ad8836efe2e508fb93b
SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mcelog-1.0pre3_20120814_2-0.13.el6.src.rpm
File outdated by:  RHBA-2016:0727
    MD5: 387d33ac5574e5f70e089eedbd061522
SHA-256: 48ab4ed50368bd44f08be4561bdf5bdfb348051b0ad3d6eec490934130b96d49
 
x86_64:
mcelog-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: 0c8eacc2c187d65411ca96dcea7d1cda
SHA-256: c64719453dd042b63e4a3694a5826aa0b8d65fc388b1abf101ebb807cb5473ab
mcelog-debuginfo-1.0pre3_20120814_2-0.13.el6.x86_64.rpm
File outdated by:  RHBA-2016:0727
    MD5: a8df97eba3eb5ad8836efe2e508fb93b
SHA-256: b36aff487448c6192558c85cb396986bc2778628c780db01219ca524dd7f3a92
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/