lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 19 Aug 2010 18:23:57 +0200 From: Stephan Diestelhorst <stephan.diestelhorst@....com> To: Tejun Heo <htejun@...il.com> CC: "Rafael J. Wysocki" <rjw@...k.pl>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "linux-ide@...r.kernel.org" <linux-ide@...r.kernel.org>, "linux-pm@...ts.osdl.org" <linux-pm@...ts.osdl.org>, Stephan Diestelhorst <stephan.diestelhorst@...il.com> Subject: Re: [PATCH] SATA / AHCI: Do not play with the link PM during suspend to RAM Hi Tejun, On Wednesday 18 August 2010, 08:12:24 Tejun Heo wrote: > On 08/17/2010 11:28 PM, Stephan Diestelhorst wrote: > > 2010/8/17 Tejun Heo <htejun@...il.com>: > >> On 08/17/2010 12:51 PM, Stephan Diestelhorst wrote: > >>> I've also confirmed that the "XXX ahci_set_ipm" is present in > >>> libahci.ko. So either I've screwed up badly when compiling the initrd, > >>> the code is not executed or the printout does not make it into any > >>> logfile anymore. > >> > >> Yeah, that's weird. You're enabling IPM, right? > > You can check whether it's enabled by > > $ cat /sys/class/scsi_host/host0/link_power_management_policy > > If it says max_performance, it's disabled. If it says anything else, > it's enabled. It says "max_performance", I have not touched anyhting. So it has been like that all the time. Would this explain why your patch did not show the debug printout? Thanks, Stephan -- Stephan Diestelhorst, AMD Operating System Research Center stephan.diestelhorst@....com, Tel. +49 (0)351 448 356 719 Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach General Managers: Alberto Bozzo, Andrew Bowd Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists