Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Find "[deep]" string from /sys/power/mem_sleep #5

Open
kkamagui opened this issue Jul 28, 2020 · 1 comment
Open

Find "[deep]" string from /sys/power/mem_sleep #5

kkamagui opened this issue Jul 28, 2020 · 1 comment
Labels
enhancement New feature or request

Comments

@kkamagui
Copy link
Owner

For checking the S3 sleep feature of the system, it's needed to find "[deep]" string from /sys/power/mem_sleep like below.

$> cat /sys/power/mem_sleep
s2idle [deep]

Thank you for @roboknight.

@roboknight
Copy link

Just leaving a note here that the above is just a quick check to make sure your device ACTUALLY supports the required sleep state S3. If it doesn't, then bitleaker isn't likely to work. This is also one way that vulnerable TPMs might escape bitleaker in actual systems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants