Language Selection

English French German Italian Portuguese Spanish

Linux and Intel: Active State Power Management (ASPM), TPAUSE and More

Filed under
  • Linux Systems Will Save More Power As Kernel Removes Disabled ASPM

    Active State Power Management (ASPM) is an enhancement of Peripheral Component Interconnect Express (PCIe) that saves a lot of power by setting a device in idle state. The Linux kernel has also enabled ASPM support for the PCI Express interface.

    Now it seems like removal of a few lines of code that were ignored for the last 12 years can bring more power saving to some Linux system. Kai-Heng Feng from Canonical reported a bug for disabled ASPM L1 on TI PCIe-to-PCI Bridge. While pushing the patch to Linux, he also stated that disabled ASPM on the device prevents the Intel SoC from entering deeper Package C-State like PC8.

  • Linux 5.8 Prepped To Make Use Of TPAUSE Instruction With New Intel CPUs

    TPAUSE is the new instruction supported by Intel's Tremont microarchitecture and beyond. TPAUSE allows for an optimized state that can provide low wake-up latency compared to existing delay mechanisms. With Linux 5.8, the kernel will begin making use of TPAUSE where supported.

    The Timed Pause instruction already saw patches for enabling new instructions like TPAUSE and UMONITOR/UMWAIT back for Linux 4.19. But now queued in x86/timers ahead of the upcoming Linux 5.8 cycle are the changes for the kernel to actually begin making use of TPAUSE for more power efficient suspension of execution. TPAUSE supports modes of low-latency but with less power savings or aanother state for greater power savings but with longer wake-up latency. That is configurable via an MSR while the default behavior is the greater power savings.

  • Intel Corporation CEO Bob Swan

    After my reinstatement following a won suit, I returned to Intel. Immediately after my return begins a continuous workplace mobbing by my managers towards me.

    With the support of the human resources, which will give me disciplinary measures on the basis of facts built artfully by Intel, with the support of a complacent Intel’s works council.

    Intel proceeds with the systematic falsification of my work results, and the sabotage of all my work activities. it’s a long-term preparation work for my layoff in October 2018.

    My complaints and my requests to stop the workplace mobbing to Intel’s guarantee bodies, the legal department, the personnel department, the general manager of Intel Deutschland GmbH Christin E, have been totally ignored.

    So I decided to write to Intel’s new CEO, Bob Swan.

    The first email receives no reply. The second email within a few months is equally ignored.

    In my emails, I briefly describe workplace bullying and sabotage that I’ve been subjected to for almost a year.

    These are short emails, no excuse for him, the CEO will not have much time to read my emails.

    I offer to provide evidence of what I say. Offer that will not interest Intel CEO Bob Swan, who will never react to my emails.


    What about Intel’s Code of Conduct someone could ask?

    Intel’s code of conduct, is a mere statement of beautiful ethical and moral principles, which serves to advertise externally the image of an Intel company attentive to ethics and morals.

    In reality, the code of conduct is very far from a company (Intel Mobbing Company) that has derailed towards an abyss of immorality, which manages to make a mess of any recognized ethical principle.

    Intel Corporation is a company that denies fairness and legality. Who scoffs at the laws, because he knows only one law, those of the strongest.

    The question remains: does Bob Swan, CEO of Intel Corporation, with his smiling face and friendly bald head, know of this rot inside Intel Corporation?

More in Tux Machines

My Linux story: breaking language barriers with open source

My open source journey started rather late in comparison to many of my peers and colleagues. I was pursuing a post-graduate degree in medicine in 2000 when I managed to fulfill a dream I’d had since high school—to buy my own PC. Before that, my only exposure to computers was through occasional access in libraries or cyber cafés, which charged exorbitant prices for access at that time. So I saved up portions of my grad student stipend and managed to buy a Pentium III 550 Mhz with 128MB RAM, and as came standard in most computers in India at that time, a pirated version of Windows 98. Read more

5 things to look for in an open source alternative to SharePoint

We're entering a collaboration platform renaissance as remote work becomes the norm for enterprises large and small. Microsoft SharePoint—a collaboration platform available on premises or in the cloud—is the de-facto standard for corporations and government agencies. However, SharePoint implementations are infamous for the challenges that prevent their completion. Combine those common speedbumps with shrinking IT budgets and rising collaboration requirements because of remote work, and open source alternatives to SharePoint become well worth a look. Read more

German bill provides network traffic redirection to install state trojans

Preliminary note: This post primarily affects users falling under German jurisdiction, but may apply to other countries as well, where similar laws are already in place or about to be introduced. Unfortunately, some primary sources are German only. According to current status and local knowledge, the German government is about to establish a law that provides the redirection of network traffic through a intelligence agencies' infrastructure in order to exploit security vulnerabilities and, for example, to install a certain type of malware known as Staatstrojaner (state trojans). The bill lists both end-user devices and servers as potential targets, and requires "telecommunication service providers" to establish and maintain infrastructure for transparently redirecting traffic of certain users, households, or IP addresses. "Telecommunication service providers" covers any company providing telecommunication services, thus ranging from cable, DSL or fiber providers to mail, VoIP and messaging vendors. Ultimately, even backbone providers or internet exchanges are covered by this definition. [...] The state trojan was meant to be the ultima ratio when it was introduced in 2009. It could only be used by the Federal Criminal Police Office (Bundeskriminalamt) in case of international terrorism and preventing terrorist attacks. Once such laws were introduced, governments usually get a taste for it. As of today, any police authority may use it even in cases of less severe crimes than terrorism such as counterfeiting money or violations against the Narcotics Act (Betäubungsmittelgesetz, e. g. drug consumption or trafficking). As you can see, compromising devices became increasingly common as a measure at law enforcement agencies. It is probably going to be extended to intelligence agencies within a short amount of time. For obvious historical reasons, the German state only gives certain rights to police and intelligence agencies to avoid too much power being concentrated in one organisation, which could turn it against their people. [...] At IPFire, we fight to protect your network. Frankly, this was complicated enough before governments legalised hacking by intelligence agencies. This German bill will not make anything more secure. Instead, it will turn defense against security vulnerabilities even more into an arms race. This is not an example of "the opposite of good is good intentions". This is beyond dangerous. Imagine, for example, cyber criminals or foreign intelligence agencies (ab)using that redirection infrastructure in order to deploy their malware. Perhaps they will be able to take advantage of some zero day exploits left on some servers in that infrastructure as well (the CIA suffered from a similar breach in 2017). With a blink of an eye, arbitrary malware could be placed on a significant amount of computers compromised that way. Ransomware attacks such as WannaCry or NonPetya come to mind... Imagine compromised machines being vulnerable to other attacks as well, as some security measures have been turned off. Image surveillance abuse. Imagine future governments abusing this feature for persecution of unwanted people or political opponents - with a view at current political events, one may be concerned about personal liberties being restricted. [...] We will start next week by providing advice on whom to trust and how to establish a security-focussed mindset. Afterwards, we focus on specific technical aspects and advise how to configure IPFire machines as secure as possible - as it already implements effective mitigations against those attacks. Read more

today's howtos