intel_rapl_common: Add support for ARL and LNL
Bug #2061953 reported by
Timo Aaltonen
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
HWE Next |
Fix Released
|
Undecided
|
Unassigned | ||
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Noble |
Fix Released
|
Undecided
|
Unassigned | ||
linux-oem-6.8 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Noble |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
[Impact]
The installer doesn't work without blacklisting intel_rapl_common (snap mounts fail), unless these commits are added.
Needs a oneliner fix for both platforms:
4add6e841a3e079 powercap: intel_rapl: Add support for Arrow Lake
876ed77fbed4450 powercap: intel_rapl: Add support for Lunar Lake-M paltform
[Test case]
Check that snaps work.
[Regression potential]
Can't regress other platforms, and if these would then fail in other ways, it's still likely better than before.
CVE References
Changed in linux-oem-6.8 (Ubuntu Noble): | |
status: | New → Fix Committed |
tags: | added: intel oem-priority originate-from-2044672 |
tags: | added: originate-from-2044443 |
Changed in linux (Ubuntu Noble): | |
status: | New → Fix Committed |
Changed in hwe-next: | |
status: | New → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-oem-6.8 - 6.8.0-1004.4
---------------
linux-oem-6.8 (6.8.0-1004.4) noble; urgency=medium
* noble/linux- oem-6.8: 6.8.0-1004.4 -proposed tracker (LP: #2062020)
* panel flickering after the i915.psr2 is enabled (LP: #2046315) aux_fw_ sync_len available for PSR code
- drm/i915/alpm: Add ALPM register definitions
- drm/i915/psr: Add alpm_parameters struct
- drm/i915/alpm: Calculate ALPM Entry check
- drm/i915/alpm: Alpm aux wake configuration for lnl
- drm/i915/display: Make intel_dp_
- drm/i915/psr: Improve fast and IO wake lines calculation
- drm/i915/psr: Calculate IO wake and fast wake lines for DISPLAY_VER < 12
- drm/i915/display: Increase number of fast wake precharge pulses
* Packaging resync (LP: #1786013) oem/dkms- versions -- update from kernel-versions (main/d2024.04.04)
- [Packaging] update Ubuntu.md
- [Packaging] update update.conf
- debian.
* intel_rapl_common: Add support for ARL and LNL (LP: #2061953)
- powercap: intel_rapl: Add support for Lunar Lake-M paltform
- powercap: intel_rapl: Add support for Arrow Lake
[ Ubuntu: 6.8.0-28.28 ]
* noble/linux: 6.8.0-28.28 -proposed tracker (LP: #2061867) features (LP: #2061851)
* linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression iwth new apparmor
profiles/
- SAUCE: apparmor4.0.0 [92/90]: fix address mapping for recvfrom
[ Ubuntu: 6.8.0-25.25 ]
* noble/linux: 6.8.0-25.25 -proposed tracker (LP: #2061083) master/ dkms-versions -- update from kernel-versions main/d2024. 04.04) filter_ rule from security_audit_rule audit_rule_ match ipc_getsecid
* Packaging resync (LP: #1786013)
- [Packaging] debian.
(
* Apply mitigations for the native BHI hardware vulnerabilty (LP: #2060909)
- x86/cpufeatures: Add new word for scattered features
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- x86/syscall: Don't force use of indirect calls for system calls
- x86/bhi: Add support for clearing branch history at syscall entry
- x86/bhi: Define SPEC_CTRL_BHI_DIS_S
- x86/bhi: Enumerate Branch History Injection (BHI) bug
- x86/bhi: Add BHI mitigation knob
- x86/bhi: Mitigate KVM by default
- KVM: x86: Add BHI_NO
- x86: set SPECTRE_BHI_ON as default
- [Config] enable spectre_bhi=auto by default
* update apparmor and LSM stacking patch set (LP: #2028253)
- SAUCE: apparmor4.0.0 [01/90]: LSM stacking v39: integrity: disassociate
ima_
- SAUCE: apparmor4.0.0 [02/90]: LSM stacking v39: SM: Infrastructure
management of the sock security
- SAUCE: apparmor4.0.0 [03/90]: LSM stacking v39: LSM: Add the lsmblob data
structure.
- SAUCE: apparmor4.0.0 [04/90]: LSM stacking v39: IMA: avoid label collisions
with stacked LSMs
- SAUCE: apparmor4.0.0 [05/90]: LSM stacking v39: LSM: Use lsmblob in
security_
- SAUCE: apparmor4.0.0 [06/90]: LSM stacking v39: LSM: Add lsmblob_to_secctx
hook
- SAUCE: apparmor4.0.0 [07/90]: LSM stacking v39: Audit: maintain an lsmblob
in audit_context
- SAUCE: apparmor4.0.0 [08/90]: LSM stacking v39: LSM: Use lsmblob in
security_
...