Bug Fix Advisory cpuspeed bug fix update

Advisory: RHBA-2014:0394-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2014-04-10
Last updated on: 2014-04-10
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated cpuspeed packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The cpuspeed packages contain a daemon that dynamically changes the speed of
processors depending upon their current workload. This package also allows users
to enable CPU frequency scaling using in-kernel CPUfreq governors on Intel
Centrino and AMD Athlon64/Opteron platforms.

This update fixes the following bug:

* Previously, certain AMD processors were not entirely compatible with the CPU
frequency scaling. As a consequence, a kernel panic could occur on some
AMD-based Hardware Virtual Machine (HVM) guests when CPU frequency scaling was
enabled. With this patch, the default CPU governor value has been set to
"performance", which prevents this problem. Thus, unless the user changes the
CPU governor setting, the kernel now no longer panics when CPU frequency scaling
is enabled on HVM guests. (BZ#1078211)

Users of cpuspeed are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cpuspeed-1.2.1-11.el5_10.src.rpm     MD5: 8a77c2c0911bf1c65b99054fb2b5dd28
SHA-256: 71d688a28ef9d46805c6148da7ace7706ddfccb413d54bc20b23554e70606bd5
 
IA-32:
cpuspeed-1.2.1-11.el5_10.i386.rpm     MD5: aa7b6e6c40f4b47e4230f8e9ef0c72cc
SHA-256: 85cfa064f22efab1ef512e23fc8caef3a18fa0025339450f9ed1c5aac94c0644
cpuspeed-debuginfo-1.2.1-11.el5_10.i386.rpm     MD5: beab6905158b2850f9fbd69bf425e7d9
SHA-256: aff68bd00affd352ed247056be77f9746df35f25a68aef5f4697782dd78d6217
 
IA-64:
cpuspeed-1.2.1-11.el5_10.ia64.rpm     MD5: 725c15b35bebb640228198f944bb665b
SHA-256: 1a8b67e09ec2631792dcf91ea2bfb223fa48d7b2fd637f38f4a910a340f0fba1
cpuspeed-debuginfo-1.2.1-11.el5_10.ia64.rpm     MD5: 7ad55270e3b8ffbedf68e340eeb0fe78
SHA-256: c8373f28d5dd5290f20ce07daaf9b05d18c5d2a512704665993fd9e582285e86
 
PPC:
cpuspeed-1.2.1-11.el5_10.ppc.rpm     MD5: d56f5b4cef28a8c6c1489521a9b3f025
SHA-256: f6b7ff886e6969d09ad1c7d5f0a44f2957ef6fd262604d81883bc766a75c5c61
cpuspeed-debuginfo-1.2.1-11.el5_10.ppc.rpm     MD5: 46fc4298abbb7da1ae72e8d666961f49
SHA-256: db32e70744c9ede7b0d05f714642671f69d09a50a672ef45c8fb5a3320a18d85
 
x86_64:
cpuspeed-1.2.1-11.el5_10.x86_64.rpm     MD5: 48c71161fb5dc00ab155aef396f4e4f5
SHA-256: db82ace4689d0821cd0b71b6eb8b9579a77709ed87ceeeffa1f8dad8b70afb5c
cpuspeed-debuginfo-1.2.1-11.el5_10.x86_64.rpm     MD5: c3019140daac23a62f2ae5cad5f1e567
SHA-256: 09134f090d3b00c1f13661c9a5a4106f782f8009eda2ba420d698c5476183db0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
cpuspeed-1.2.1-11.el5_10.src.rpm     MD5: 8a77c2c0911bf1c65b99054fb2b5dd28
SHA-256: 71d688a28ef9d46805c6148da7ace7706ddfccb413d54bc20b23554e70606bd5
 
IA-32:
cpuspeed-1.2.1-11.el5_10.i386.rpm     MD5: aa7b6e6c40f4b47e4230f8e9ef0c72cc
SHA-256: 85cfa064f22efab1ef512e23fc8caef3a18fa0025339450f9ed1c5aac94c0644
cpuspeed-debuginfo-1.2.1-11.el5_10.i386.rpm     MD5: beab6905158b2850f9fbd69bf425e7d9
SHA-256: aff68bd00affd352ed247056be77f9746df35f25a68aef5f4697782dd78d6217
 
x86_64:
cpuspeed-1.2.1-11.el5_10.x86_64.rpm     MD5: 48c71161fb5dc00ab155aef396f4e4f5
SHA-256: db82ace4689d0821cd0b71b6eb8b9579a77709ed87ceeeffa1f8dad8b70afb5c
cpuspeed-debuginfo-1.2.1-11.el5_10.x86_64.rpm     MD5: c3019140daac23a62f2ae5cad5f1e567
SHA-256: 09134f090d3b00c1f13661c9a5a4106f782f8009eda2ba420d698c5476183db0
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

AMD, cpuspeed, guest, hvm, initscript, panic, xen


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/