lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 11 Feb 2020 17:51:36 +0100
From:   "Rafael J. Wysocki" <rjw@...ysocki.net>
To:     Linux ACPI <linux-acpi@...r.kernel.org>
Cc:     Linux PM <linux-pm@...r.kernel.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Zhang Rui <rui.zhang@...el.com>,
        David Box <david.e.box@...ux.intel.com>,
        Chen Yu <yu.c.chen@...el.com>,
        "Rafael J. Wysocki" <rafael@...nel.org>,
        Tsuchiya Yuto <kitakar@...il.com>,
        Bob Moore <robert.moore@...el.com>,
        Erik Kaneda <erik.kaneda@...el.com>
Subject: [PATCH 0/2] ACPI: PM: s2idle: Prevent spurious SCIs from waking up the system

Hi All,

On some systems the platform generates spurious SCIs while the system is
suspended to idle and those SCIs are treated as genuine system events after
the rework of the main suspend-to-idle control flow in 5.4.  The patches
here address this problem by adding a mechanism to check whether or not
SCIs generated while the system is suspended to idle are spurious and to
discard the spurious ones.

Patch [1/2] updates ACPICA to provide a way to examine the status bits of
all GPEs enabled at the moment in one go.

Patch [2/2] uses that mechanism to implement the check mentioned above.

This series is on top of https://patchwork.kernel.org/patch/11373185/ which
should appear in linux-next tomorrow.

Thanks!



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ