lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 16 Oct 2008 17:01:24 +0000
From:	"Brown, John M (WGBU R&D)" <john.brown3@...com>
To:	"Rafael J. Wysocki" <rjw@...k.pl>, Len Brown <lenb@...nel.org>
CC:	Matthew Garrett <mjg59@...f.ucam.org>,
	ACPI Devel Maling List <linux-acpi@...r.kernel.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>,
	"Brown, John M (WGBU R&D)" <john.brown3@...com>
Subject: RE: [PATCH] ACPI suspend: Blacklist HP xw4600 Workstation for old
 code ordering

Hi folks -

Attached is a txt file with output of acpidump for the xw4600.

I also noted that acpidump printed this message to stderr:
Wrong checksum for FADT!

Can any of you tell me what that message implies?

Thanks,
John

-----Original Message-----
From: Rafael J. Wysocki [mailto:rjw@...k.pl]
Sent: Wednesday, October 15, 2008 4:01 PM
To: Len Brown
Cc: Brown, John M (WGBU R&D); Matthew Garrett; ACPI Devel Maling List; Andrew Morton; LKML
Subject: Re: [PATCH] ACPI suspend: Blacklist HP xw4600 Workstation for old code ordering

On Wednesday, 15 of October 2008, Len Brown wrote:
> Matthew,
> You are right, of course, we're not doing something right if a new
> machine needs this workaround.

Isn't that possible, however, that the BIOS of this new machine is based on an older one that used to have this problem?

> However, we don't yet know what we're not doing right:-)

Well, John, can you please post the output of acpidump from this machine?

Thanks,
Rafael

View attachment "xw4600-acpidump.txt" of type "text/plain" (189869 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ