lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 8 Aug 2008 12:20:21 +0100
From:	"Simon Arlott" <simon@...e.lp0.eu>
To:	"Pavel Machek" <pavel@...e.cz>
Cc:	linux-pm@...ts.linux-foundation.org,
	"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>
Subject: Re: [linux-pm] Tyan S2923-E suspend to ram fails to resume

On Fri, August 8, 2008 08:14, Pavel Machek wrote:
> On Mon 2008-08-04 22:56:07, Simon Arlott wrote:
>> My system (Tyan S2923-E, dmesg attached) suspends ok in
>> all pm_test modes, but it won't resume with pm_test
>> "none".
>>
>> [    6.423515] mem full: hash matches
>>
>> When I press the power button, the port 80 display shows:
>> FF D0 23 01 D0 ... DE
>> (and again each time I press it)
>>
>> If I force it to turn off, then on again:
>> FF D0 23 01 D0 ... FF D0 23 01 D0 ... (D2?) D3 00 01 D5
>> D6 <normal boot>
>>
>> Any ideas? (onboard SAS is disabled, watchdog is
>> disabled, everything else is enabled, PCI-E graphics
>> card)
>
> Try verifying if it reaches assembly code under realmode/ ...

I was looking at the acpi code last night but I couldn't figure
out where the last code before the actual suspend is or where it
starts executing again.

I'm also not sure how to do it, could you provide a quick patch
that immediately writes something to port 80 before doing
anything else?


-- 
Simon Arlott
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ