![Yoga-Slim-7-cannot-enter-deep-sleep-S3-state-aka-Suspend-to-RAM-on-Linux - English Community - LENOVO COMMUNITY Yoga-Slim-7-cannot-enter-deep-sleep-S3-state-aka-Suspend-to-RAM-on-Linux - English Community - LENOVO COMMUNITY](https://forums.lenovo.com/uploads/topic/202107/1625379869294.jpeg?aid=256262)
Yoga-Slim-7-cannot-enter-deep-sleep-S3-state-aka-Suspend-to-RAM-on-Linux - English Community - LENOVO COMMUNITY
IV. Suspend to RAM Installation A.1 Introduce STR function: A.2 STR function Installation There are two ways to accomplish this:
![PDF] Linux Kernel Drivers , ACPICA Core ACPI Registers , ACPI Tables & BIOS Platform Hardware Platform BIOS & firmware Applications , System Util i t ies User Space Kernel Space ACPI PDF] Linux Kernel Drivers , ACPICA Core ACPI Registers , ACPI Tables & BIOS Platform Hardware Platform BIOS & firmware Applications , System Util i t ies User Space Kernel Space ACPI](https://d3i71xaburhd42.cloudfront.net/ac62c2bac893773e39172dff2681603a4600a8c0/1-Figure1-1.png)
PDF] Linux Kernel Drivers , ACPICA Core ACPI Registers , ACPI Tables & BIOS Platform Hardware Platform BIOS & firmware Applications , System Util i t ies User Space Kernel Space ACPI
![Security level is not determined, even tough the level 1 and level 2 requirements are met. Also, why would suspend to RAM/disk would be considered a security feature? It actually opens up Security level is not determined, even tough the level 1 and level 2 requirements are met. Also, why would suspend to RAM/disk would be considered a security feature? It actually opens up](https://preview.redd.it/security-level-is-not-determined-even-tough-the-level-1-and-v0-xj9b0tkqqcx91.png?width=544&format=png&auto=webp&s=656ce62bb6da09329ce80da8bc291f09db04996b)
Security level is not determined, even tough the level 1 and level 2 requirements are met. Also, why would suspend to RAM/disk would be considered a security feature? It actually opens up
![Proposed state machine to mitigate the attack-clear the stored memory... | Download Scientific Diagram Proposed state machine to mitigate the attack-clear the stored memory... | Download Scientific Diagram](https://www.researchgate.net/publication/364134024/figure/fig6/AS:11431281087865338@1664888249755/Proposed-state-machine-to-mitigate-the-attack-clear-the-stored-memory-upon-Bluetooth.png)