Bug 134461 - Machine check handling code is not detailed and is deadlock prone
Summary: Machine check handling code is not detailed and is deadlock prone
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: kernel
Version: 3.0
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Brian Maly
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-10-03 00:42 UTC by Manpreet Singh
Modified: 2007-11-30 22:07 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-04-19 19:43:43 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
The patch mentioned in the description (19.37 KB, patch)
2004-10-03 00:44 UTC, Manpreet Singh
no flags Details | Diff

Description Manpreet Singh 2004-10-03 00:42:46 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.1)
Gecko/20020903

Description of problem:
The machine check code in the Redhat update3 kernel, which is based on
the 2.4.21 stock kernel code has several shortcomings. The stock
kernel through 2.4.27 has undergone several changes that fixes several
problems including:

- Detailed decoding for the error status reported during machine checks.
- Proper handling of printks to report unrecoverable errors. (allowing
printks to get to the console etc.)

Attached is a patch against the RHAS3 update3 kernel that backports
the 2.4.27 machine check code.

Version-Release number of selected component (if applicable):
linux kernel version 2.4.21-20.ELsmp

How reproducible:
Sometimes

Steps to Reproduce:
1. Run on a machine that produces machine check exceptions.
2.
3.
    

Additional info:

Comment 1 Manpreet Singh 2004-10-03 00:44:53 UTC
Created attachment 104673 [details]
The patch mentioned in the description

Comment 2 Red Hat Bugzilla 2007-03-18 22:26:17 UTC
User jparadis's account has been closed


Note You need to log in before you can comment on or make changes to this bug.