lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 8 Nov 2006 17:20:22 +0100
From:	martin f krafft <madduck@...duck.net>
To:	linux kernel mailing list <linux-kernel@...r.kernel.org>
Subject: How to interpret MCE messages?

Thanks to mcelog, I am now regularly seeing messages like this on an
amd64 machine:

  kernel: Machine check events logged
        bit46 = corrected ecc error
    Data cache ECC error (syndrome 5b)
    memory/cache error 'data read mem transaction, data transaction, level 2'
  ADDR 38ed9200
  CPU 0 0 data cache TSC fe4f9128ade
  MCE 0
  STATUS 942dc00000000136 MCGSTATUS 0

The RAM modules are *not* ECC modules, nor does the Asus K8V Deluxe
motherboard support ECC to my knowledge. I've turned ECC support on
and off in the Bios without any effect.

I've already run memtest86+ for hours without finding any problems,
and I've removed each of the two memory modules for a while, but
I still saw these errors appearing.

Before I go out and buy a new motherboard (as I assume that it's
a L1/L2 cache problem), I'd like to know how I am to interpret these
MCE dumps and how I could use them to actually pinpoint the source
of the problem.

Cheers,

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@...duck
 
spamtraps: madduck.bogus@...duck.net
 
"america may be unique in being a country which has leapt
 from barbarism to decadence without touching civilization."
                                                        -- john o'hara

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ