lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201107232127.34255.toralf.foerster@gmx.de>
Date:	Sat, 23 Jul 2011 21:27:34 +0200
From:	Toralf Förster <toralf.foerster@....de>
To:	linux-kernel@...r.kernel.org
Subject: suspend/resume problems w/ kernel 3.0 and a *docked* ThinkPad T400

The last lines are :
...
2011-07-23T17:57:21.000+02:00 n22 pppd[2324]: Exit.
2011-07-23T17:57:22.896+02:00 n22 kernel: PM: Syncing filesystems ... done.
2011-07-23T17:57:22.896+02:00 n22 kernel: PM: Preparing system for mem sleep
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: Deleting interface #3 ppp0, 
92.224.126.27#123, interface stats: received=269, sent=269, dropped=0, 
active_time=13305 secs
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: 78.47.24.68 interface 
92.224.126.27 -> (none)
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: 213.198.55.2 interface 
92.224.126.27 -> (none)
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: 213.133.112.102 interface 
92.224.126.27 -> (none)
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: 141.40.103.103 interface 
92.224.126.27 -> (none)
2011-07-23T17:57:23.000+02:00 n22 ntpd[9544]: peers refreshed

magic SysRq  keys works .

Anybody else experienced sth similar ?

2.6.39.3 works flawlessly

-- 
MfG/Sincerely
Toralf Förster
pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ