lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 12 May 2007 23:44:13 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Lukas Hejtmanek <xhejtman@....muni.cz>
Cc:	linux-kernel@...r.kernel.org, linux-acpi@...r.kernel.org
Subject: Re: Reboot PATCH (ACPI related)

On Sat, 12 May 2007 22:10:07 +0200 Lukas Hejtmanek <xhejtman@....muni.cz> wrote:

> why the attached patch is still not included in mainline kernel? It fixes boot
> problems after suspend to RAM.
> 
> -- 
> Lukáš Hejtmánek
> 
> 
> [reboot.patch  text/x-diff (564B)]
> --- arch/i386/kernel/reboot.c.old	2006-06-18 03:49:35.000000000 +0200
> +++ arch/i386/kernel/reboot.c	2006-07-01 17:29:23.000000000 +0200
> @@ -31,6 +31,12 @@
>  #ifdef CONFIG_SMP
>  static int reboot_cpu = -1;
>  #endif
> +#ifdef CONFIG_ACPI
> +extern u32 acpi_disable(void);
> +#else
> +static u32 acpi_disable(void){};
> +#endif
> +
>  static int __init reboot_setup(char *str)
>  {
>  	while(1) {
> @@ -322,6 +328,7 @@
>  
>  void machine_emergency_restart(void)
>  {
> +	acpi_disable();
>  	if (!reboot_thru_bios) {
>  		if (efi_enabled) {
>  			efi.reset_system(EFI_RESET_COLD, EFI_SUCCESS, 0, NULL);

We'd prefer to fix the problem, whatever it is, rather than just turning
APCI off.

Please ensure that a full bug report has been entered at bugzilla.kernel.org,
thanks.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ