Bug#1007799: Backport to bullseye

2022-04-02 Thread David Schiller
Hi!

Any chance we can get this into the bullseye kernel?

Best regards,
David


signature.asc
Description: This is a digitally signed message part


Bug#970699: linux: Enable amd_energy driver

2020-11-17 Thread David Schiller
On Fri, 2020-11-13 at 14:56 +0100, Salvatore Bonaccorso wrote:
> If we are going to enable this for our builds, then we might need to
> check that https://bugzilla.redhat.com/show_bug.cgi?id=1897402 is not
> opened accordingly.
> 
> This relates to
> 
> https://support.lenovo.com/lu/uk/product_security/LEN-50481
> 
> and probably the reason for
> 
> https://lore.kernel.org/stable/238e3cf7-582f-a265-5300-9b4494810...@roeck-us.net/T/#m11dee15be8c238d8858aafdf1a57e9ad7e0b9670

Thanks for the response!

I skimmed through the paper covering the CVE and they mostly focused on Intel
SGX and only touched upon AMD briefly. They did there measurements with disabled
boost and fixed frequency, a configuration that no system in the wild actually
uses. Moreover the energy counters are exposed as an MSR, so in my opinion this
is more of a CPU-level bug. 

Personally I feel like recent security efforts are often crippling usability for
negligible gains.
 
Just my two cents!



signature.asc
Description: This is a digitally signed message part


Bug#970699: linux: Enable amd_energy driver

2020-09-21 Thread David Schiller
Source: linux
Severity: wishlist
X-Debbugs-Cc: david.schil...@gmx.at

Hi!

Could you please enable CONFIG_SENSORS_AMD_ENERGY as a module. This
provides RAPL energy monitoring on AMD Zen processors and has been
available since kernel 5.8.

Thanks in advance!

Dave


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.8.0-1-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled