Skip to navigation

Bug Fix Advisory cpuspeed bug fix update

Advisory: RHBA-2013:1153-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-08-13
Last updated on: 2013-08-13
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated cpuspeed packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The cpuspeed packages provide a daemon to manage the CPU frequency scaling.

This update fixes the following bug:

* The cpuspeed init script relied on the presence of the
scaling_available_frequencies sysfs file to get the maximum possible scaling
frequency for the system. Certain platforms did not provide the
scaling_available_frequencies sysfs file, which caused the attempt to set the
maximum scaling frequency to fail. With this update, the init script now reads
the frequency from cpuinfo_max_speed, and setting the maximum scaling frequency
now works on all platforms. (BZ#990474)

Users of cpuspeed are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
IA-32:
cpuspeed-1.5-20.el6_4.i686.rpm     MD5: fddf7d631d32a701a44b9bee46d1165d
SHA-256: 6071d3df56a031bab317d1ba434860d37fa64d53a83d2b81439b2a6826409c73
cpuspeed-debuginfo-1.5-20.el6_4.i686.rpm     MD5: 3670d6fe708ca727660f7e1f4fd78460
SHA-256: 529efcc61fe0e584a6429724ba4171029d5e6ff877569a48b065d97b3b8bd9f5
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
IA-32:
cpuspeed-1.5-20.el6_4.i686.rpm     MD5: fddf7d631d32a701a44b9bee46d1165d
SHA-256: 6071d3df56a031bab317d1ba434860d37fa64d53a83d2b81439b2a6826409c73
cpuspeed-debuginfo-1.5-20.el6_4.i686.rpm     MD5: 3670d6fe708ca727660f7e1f4fd78460
SHA-256: 529efcc61fe0e584a6429724ba4171029d5e6ff877569a48b065d97b3b8bd9f5
 
PPC:
cpuspeed-1.5-20.el6_4.ppc64.rpm     MD5: a928fff59b60c37bfb3acc748ff076a9
SHA-256: d9ce8f2363cb0d7e58529aba03c6e66f290426f2625e7805a962edf74e98f1ae
cpuspeed-debuginfo-1.5-20.el6_4.ppc64.rpm     MD5: 3ff4af602a6ee34e8e46248f8b2a7d6f
SHA-256: 1654aa004eca65019f5174be13a114ffc30da404ed236bba3d095246f4517db9
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
IA-32:
cpuspeed-1.5-20.el6_4.i686.rpm     MD5: fddf7d631d32a701a44b9bee46d1165d
SHA-256: 6071d3df56a031bab317d1ba434860d37fa64d53a83d2b81439b2a6826409c73
cpuspeed-debuginfo-1.5-20.el6_4.i686.rpm     MD5: 3670d6fe708ca727660f7e1f4fd78460
SHA-256: 529efcc61fe0e584a6429724ba4171029d5e6ff877569a48b065d97b3b8bd9f5
 
PPC:
cpuspeed-1.5-20.el6_4.ppc64.rpm     MD5: a928fff59b60c37bfb3acc748ff076a9
SHA-256: d9ce8f2363cb0d7e58529aba03c6e66f290426f2625e7805a962edf74e98f1ae
cpuspeed-debuginfo-1.5-20.el6_4.ppc64.rpm     MD5: 3ff4af602a6ee34e8e46248f8b2a7d6f
SHA-256: 1654aa004eca65019f5174be13a114ffc30da404ed236bba3d095246f4517db9
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
cpuspeed-1.5-20.el6_4.src.rpm     MD5: 89f733d5e6899d364b52a3611a163b48
SHA-256: 467675226b2bc3b52f3e8cd9f3563232789ea8e1175054cfb948e34a9ef9091a
 
IA-32:
cpuspeed-1.5-20.el6_4.i686.rpm     MD5: fddf7d631d32a701a44b9bee46d1165d
SHA-256: 6071d3df56a031bab317d1ba434860d37fa64d53a83d2b81439b2a6826409c73
cpuspeed-debuginfo-1.5-20.el6_4.i686.rpm     MD5: 3670d6fe708ca727660f7e1f4fd78460
SHA-256: 529efcc61fe0e584a6429724ba4171029d5e6ff877569a48b065d97b3b8bd9f5
 
x86_64:
cpuspeed-1.5-20.el6_4.x86_64.rpm     MD5: 4c87a3e3b88757b268a01feda0eb90e9
SHA-256: 52f2a18c42ea4f70ed2080b1a7167609db451de060c2041a9e22bc08a8be824d
cpuspeed-debuginfo-1.5-20.el6_4.x86_64.rpm     MD5: a9b203739f0003ec308aecacfa2c2240
SHA-256: a9a43ead548a37e9dc99d06476fd36d09584c379b0da8cfc82ed0dad732b6192
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

cpuinfo_max_freq, cpuspeed, scaling_available_frequencies


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/