https://bugzilla.kernel.org/show_bug.cgi?id=43169
Summary: SV266A with VIA KT266A: suspend to RAM not available
Product: ACPI
Version: 2.5
Kernel Version: 2.6.32
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: Power-Sleep-Wake
AssignedTo: [email protected]
ReportedBy: [email protected]
Regression: No
Created an attachment (id=73114)
--> (https://bugzilla.kernel.org/attachment.cgi?id=73114)
Output of dmidecode
The option suspend to RAM is not available on the motherboard Syntax SV266A
with a VIA KT266A(?) chipset [1]. Debian Squeeze/stable running Linux kernel
2.6.32-41squeeze2 is used.
$ echo mem | sudo tee /sys/power/state
mem
tee: /sys/power/state: No such device
$ ls /sys/power/
disk image_size pm_test resume state
$ ls /sys/power/state
/sys/power/state
$ sudo su
# echo mem > /sys/power/state
bash: echo: Schreibfehler: Kein passendes Gerät gefunden.
I looked around in the BIOS and the option *ACPI functions* is set to
*Enabled*. There is also an option *Suspend Mode* which I can set to
*Disable* or to a number of minutes. But I guess I do not want the BIOS
to suspend my system but using the operating system for that task.
Is Linux looking at the ACPI tables and they are wrong in this case? Can
I force suspend to RAM somehow to test it?
Please tell me if I can provide more information.
There is also a report for this issue in the Debian BTS [2].
[1] http://lists.freedesktop.org/archives/pm-utils/2010-June/002176.html
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670634
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
acpi-bugzilla mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla