- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0690 - Bug Fix Advisory
Synopsis
kernel-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated kernel-utils package that fixes various bugs and adds
enhancements is now available.
Description
The kernel-utils package provides kernel-related support utilities, such as
CPU frequency scaling support, and processor microcode updates.
This updated package fixes the following bugs:
- the "cpuspeed" daemon process was not aware of multi-core processors
sharing the same clock. One or more cores could end up without all
available frequency steppings, due to another core altering the frequency
during stepping detection.
- the irqbalance init script returned incorrect error codes, which may have
caused the wrong status to be returned. In this updated package, the init
script has been updated to more closely conform to distribution-wide
guidelines.
- in certain situations, using the "smartctl" command to enable S.M.A.R.T.
automatic offline data collection, failed with a "HSM violation" error in
"/var/log/messages", and the following errors on the console:
Error SMART Enable Automatic Offline failed: Input/output error
Smartctl: SMART Enable Automatic Offline Failed.
- the new microcode requires changes that are not in earlier kernels. When
running an older kernel and using a newer kernel-utils package, starting
the "microcode_ctl" service may have caused a "microcode: not enough data"
error. In this updated package, two microcode images are shipped: one for
older kernels, and the other for newer kernels, allowing users running
older kernels, or both new and old kernels, to obtain microcode updates.
As well, this updated package adds the following enhancements:
- processor frequency scaling support (powersave), using modular (rather
than built-in) powernow-k8 drivers, for AMD 64-bit-capable processors that
support AMD PowerNow!™, has been enabled.
- support for S.M.A.R.T. monitoring for 3ware RAID controllers, that have
more than 16 ports, has been added.
- to support the latest processors, the Intel microcode has been updated to
version 20080401.
Users of kernel-utils are advised to upgrade to this updated package, which
resolves these issues and adds these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 183403 - powersave governor should be a builtin for powernow-k8
- BZ - 242478 - Wrong init script
- BZ - 431570 - [RHEL 4.7] update microcode to 20080401 version
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
kernel-utils-2.4-14.1.117.src.rpm | SHA-256: 02192eba968a8f04f4b6fc97bced916c3d1d1510fcbd1c78c70e71bebcd7a0cc |
x86_64 | |
kernel-utils-2.4-14.1.117.x86_64.rpm | SHA-256: 5a4e500903736fe95982741324c9a889cc1ee17c89be466bea96b2d36c86b091 |
kernel-utils-2.4-14.1.117.x86_64.rpm | SHA-256: 5a4e500903736fe95982741324c9a889cc1ee17c89be466bea96b2d36c86b091 |
ia64 | |
kernel-utils-2.4-14.1.117.ia64.rpm | SHA-256: 950ac28b0f4bfd842567b38da027e1b33b04a72eb742337fbdb4aceee7943af1 |
kernel-utils-2.4-14.1.117.ia64.rpm | SHA-256: 950ac28b0f4bfd842567b38da027e1b33b04a72eb742337fbdb4aceee7943af1 |
i386 | |
kernel-utils-2.4-14.1.117.i386.rpm | SHA-256: 220e1b98263f1e8876ad113fe14862e3a95c3918c984d0bf01027af8cd74dc72 |
kernel-utils-2.4-14.1.117.i386.rpm | SHA-256: 220e1b98263f1e8876ad113fe14862e3a95c3918c984d0bf01027af8cd74dc72 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
kernel-utils-2.4-14.1.117.src.rpm | SHA-256: 02192eba968a8f04f4b6fc97bced916c3d1d1510fcbd1c78c70e71bebcd7a0cc |
x86_64 | |
kernel-utils-2.4-14.1.117.x86_64.rpm | SHA-256: 5a4e500903736fe95982741324c9a889cc1ee17c89be466bea96b2d36c86b091 |
ia64 | |
kernel-utils-2.4-14.1.117.ia64.rpm | SHA-256: 950ac28b0f4bfd842567b38da027e1b33b04a72eb742337fbdb4aceee7943af1 |
i386 | |
kernel-utils-2.4-14.1.117.i386.rpm | SHA-256: 220e1b98263f1e8876ad113fe14862e3a95c3918c984d0bf01027af8cd74dc72 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
kernel-utils-2.4-14.1.117.src.rpm | SHA-256: 02192eba968a8f04f4b6fc97bced916c3d1d1510fcbd1c78c70e71bebcd7a0cc |
x86_64 | |
kernel-utils-2.4-14.1.117.x86_64.rpm | SHA-256: 5a4e500903736fe95982741324c9a889cc1ee17c89be466bea96b2d36c86b091 |
i386 | |
kernel-utils-2.4-14.1.117.i386.rpm | SHA-256: 220e1b98263f1e8876ad113fe14862e3a95c3918c984d0bf01027af8cd74dc72 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
kernel-utils-2.4-14.1.117.src.rpm | SHA-256: 02192eba968a8f04f4b6fc97bced916c3d1d1510fcbd1c78c70e71bebcd7a0cc |
s390x | |
kernel-utils-2.4-14.1.117.s390x.rpm | SHA-256: 9429ae2fbf74e62cecd367c9d49604e71a5db966495332d6cf06ec441dca2a89 |
s390 | |
kernel-utils-2.4-14.1.117.s390.rpm | SHA-256: 416de8e3cce9d438720a1152db1e96747846cda1a8019f2e1fbd52a7d5b3d121 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
kernel-utils-2.4-14.1.117.src.rpm | SHA-256: 02192eba968a8f04f4b6fc97bced916c3d1d1510fcbd1c78c70e71bebcd7a0cc |
ppc | |
kernel-utils-2.4-14.1.117.ppc.rpm | SHA-256: 4afbfe333d45c353582bb111a89c6fe0d159a1358794a0200f2e6765b3f3a85f |
kernel-utils-2.4-14.1.117.ppc64.rpm | SHA-256: 48938664c0034b5f8dea178c197adb780eb1b3db09a29564486b91730371b7f6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.