Bug ID: 189431
           Summary: s3 second suspend - "Warning boot script table is
                    modified!!! Please contact your vendor." - Cold boot.
           Product: ACPI
           Version: 2.5
    Kernel Version: from 3.17 up to current 4.8.11
          Hardware: x86-64
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: Power-Sleep-Wake
        Regression: No

Created attachment 246551
second suspend log (after cold boot journalctl -b -1)

Suspending the laptop into ram on second attempt cousing hard reset (cold boot)
with the message from uefi firmwre : Warning!!! Boot script table is
modified!!! Please contact your vendor."

Arch Linux installed on Lenovo G50-45 (AMD A6 6310 APU with R4 Beema/Mullins)
Booting in UEFI mode (but trying boot in Legacy with UEFI and Secure Boot
turned off and there is the same reaction - cold boot on second attempt to
suspend with warning from BIOS).

I tried many Linux disrtibutions with kernels below 3.16 and above (Debian,
Slackware, Fedora, OpenSUSE). Probem occurs if you try to use kernel from 3.17
up to current -> 4.8.10.

Now I'am using 3.16lts from AUR and suspend to ram works.

Problem was posted on Arch Linux Forum : 
and is affecting not only Lenovo laptops as you may think) :

Sometimes other laptops just hangs or there is no message from UEFI firmware -
just cold boot.

>From information I have found in internet it is related to security fix issue
of S3 mode :

Vulnerability Note VU#976132
UEFI implementations do not properly secure the EFI S3 Resume Boot Path boot

>From dmidecode:
BIOS Information
Vendor: LENOVO
Version: A2CN40WW(V2.08)
Release Date: 08/21/2015

Attached log fom second suspend.

Steps to reproduce:

Install Arch Linux (or any other distro I've tried) with kernel above 3.16 on
Lenovo G50-45 (or other Laptop affected by bios S3 security issue fix) and
suspend to ram twice time in a row.

You are receiving this mail because:
You are watching the assignee of the bug.

acpi-bugzilla mailing list

Reply via email to