Details

Updated cpuspeed packages that fix one bug are now available for Red HatEnterprise Linux 5.

The cpuspeed packages contain a daemon that dynamically changes the speed ofprocessors depending upon their current workload. This package also allows usersto enable CPU frequency scaling using in-kernel CPUfreq governors on IntelCentrino and AMD Athlon64/Opteron platforms.This update fixes the following bug:* Previously, certain AMD processors were not entirely compatible with the CPUfrequency scaling. As a consequence, a kernel panic could occur on someAMD-based Hardware Virtual Machine (HVM) guests when CPU frequency scaling wasenabled. With this patch, the default CPU governor value has been set to”performance”, which prevents this problem. Thus, unless the user changes theCPU governor setting, the kernel now no longer panics when CPU frequency scalingis enabled on HVM guests. (BZ#1078211)Users of cpuspeed are advised to upgrade to these updated packages, which fixthis bug.

Solution
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cpuspeed-1.2.1-11.el5_10.src.rpm
    MD5: 8a77c2c0911bf1c65b99054fb2b5dd28SHA-256: 71d688a28ef9d46805c6148da7ace7706ddfccb413d54bc20b23554e70606bd5
 
IA-32:
cpuspeed-1.2.1-11.el5_10.i386.rpm
    MD5: aa7b6e6c40f4b47e4230f8e9ef0c72ccSHA-256: 85cfa064f22efab1ef512e23fc8caef3a18fa0025339450f9ed1c5aac94c0644
cpuspeed-debuginfo-1.2.1-11.el5_10.i386.rpm
    MD5: beab6905158b2850f9fbd69bf425e7d9SHA-256: aff68bd00affd352ed247056be77f9746df35f25a68aef5f4697782dd78d6217
 
IA-64:
cpuspeed-1.2.1-11.el5_10.ia64.rpm
    MD5: 725c15b35bebb640228198f944bb665bSHA-256: 1a8b67e09ec2631792dcf91ea2bfb223fa48d7b2fd637f38f4a910a340f0fba1
cpuspeed-debuginfo-1.2.1-11.el5_10.ia64.rpm
    MD5: 7ad55270e3b8ffbedf68e340eeb0fe78SHA-256: c8373f28d5dd5290f20ce07daaf9b05d18c5d2a512704665993fd9e582285e86
 
PPC:
cpuspeed-1.2.1-11.el5_10.ppc.rpm
    MD5: d56f5b4cef28a8c6c1489521a9b3f025SHA-256: f6b7ff886e6969d09ad1c7d5f0a44f2957ef6fd262604d81883bc766a75c5c61
cpuspeed-debuginfo-1.2.1-11.el5_10.ppc.rpm
    MD5: 46fc4298abbb7da1ae72e8d666961f49SHA-256: db32e70744c9ede7b0d05f714642671f69d09a50a672ef45c8fb5a3320a18d85
 
x86_64:
cpuspeed-1.2.1-11.el5_10.x86_64.rpm
    MD5: 48c71161fb5dc00ab155aef396f4e4f5SHA-256: db82ace4689d0821cd0b71b6eb8b9579a77709ed87ceeeffa1f8dad8b70afb5c
cpuspeed-debuginfo-1.2.1-11.el5_10.x86_64.rpm
    MD5: c3019140daac23a62f2ae5cad5f1e567SHA-256: 09134f090d3b00c1f13661c9a5a4106f782f8009eda2ba420d698c5476183db0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
cpuspeed-1.2.1-11.el5_10.src.rpm
    MD5: 8a77c2c0911bf1c65b99054fb2b5dd28SHA-256: 71d688a28ef9d46805c6148da7ace7706ddfccb413d54bc20b23554e70606bd5
 
IA-32:
cpuspeed-1.2.1-11.el5_10.i386.rpm
    MD5: aa7b6e6c40f4b47e4230f8e9ef0c72ccSHA-256: 85cfa064f22efab1ef512e23fc8caef3a18fa0025339450f9ed1c5aac94c0644
cpuspeed-debuginfo-1.2.1-11.el5_10.i386.rpm
    MD5: beab6905158b2850f9fbd69bf425e7d9SHA-256: aff68bd00affd352ed247056be77f9746df35f25a68aef5f4697782dd78d6217
 
x86_64:
cpuspeed-1.2.1-11.el5_10.x86_64.rpm
    MD5: 48c71161fb5dc00ab155aef396f4e4f5SHA-256: db82ace4689d0821cd0b71b6eb8b9579a77709ed87ceeeffa1f8dad8b70afb5c
cpuspeed-debuginfo-1.2.1-11.el5_10.x86_64.rpm
    MD5: c3019140daac23a62f2ae5cad5f1e567SHA-256: 09134f090d3b00c1f13661c9a5a4106f782f8009eda2ba420d698c5476183db0
 
(The unlinked packages above are only available from the Red Hat Network)Keywords

AMD, cpuspeed, guest, hvm, initscript, panic, xen

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/

Leave a Reply