lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 6 Mar 2007 10:13:13 +0100
From:	"Rafael J. Wysocki" <rjw@...k.pl>
To:	Pavel Machek <pavel@....cz>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] Kconfig: Update swsusp description

On Tuesday, 6 March 2007 09:32, Pavel Machek wrote:
> Hi!
> 
> > Index: linux-2.6.21-rc2/kernel/power/Kconfig
> > ===================================================================
> > --- linux-2.6.21-rc2.orig/kernel/power/Kconfig	2007-02-28 23:54:45.000000000 +0100
> > +++ linux-2.6.21-rc2/kernel/power/Kconfig	2007-03-04 11:50:48.000000000 +0100
> > @@ -81,30 +81,35 @@ config SOFTWARE_SUSPEND
> >  	bool "Software Suspend"
> >  	depends on PM && SWAP && ((X86 && (!SMP || SUSPEND_SMP)) || ((FRV || PPC32) && !SMP))
> >  	---help---
> > +	  Enable the suspend to disk (STD) functionality.
> >  
> > +	  You can suspend your machine with 'echo disk > /sys/power/state'.
> > +	  Alternatively, you can use the additional userland tools available
> > +	  from <http://suspend.sf.net>.
> > +
> > +	  In principle it does not require ACPI or APM, although for example
> > +	  ACPI will be used if available.
> > +
> > +	  It creates an image which is saved in your active swap. Upon the next
> >  	  boot, pass the 'resume=/dev/swappartition' argument to the kernel to
> 
> Actually, these days resume=... on kernel command line needs to be
> there for suspend, too, IIRC.

I didn't change this line, so?
 
> > +	  Right now you may boot without resuming and resume later but in the
> > +	  meantime you cannot use the swap partition(s)/file(s) involved in
> > +	  suspending.  Also in this case you must not use the
> 
> I'd prefer not to encourage this use. It has too many traps ready for
> people.

But IMHO there should be a warning that if you boot without resuming, make sure
you'll not resume after the next reboot or bad things will happen.

Greetings,
Rafael
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ