Hi Kristen,
At Wed, 1 Feb 2006 15:30:05 -0800,
Kristen Carlson Accardi <[EMAIL PROTECTED]> wrote:
>
>
> From: [EMAIL PROTECTED]
> + /* if this is a device dependent on a dock station,
> + * associate the acpiphp_func to the dependent_device
> + * struct.
> + */
> + if ((dd = get_dependent_device(handle))) {
> + newfunc->flags |= FUNC_IS_DD;
> + dd->func = newfunc;
> + add_pci_dependent_device(dd);
> + }
> +
> /* install notify handler */
> - status = acpi_install_notify_handler(handle,
> + if (!(newfunc->flags & FUNC_HAS_DCK)) {
> + status = acpi_install_notify_handler(handle,
> ACPI_SYSTEM_NOTIFY,
> handle_hotplug_event_func,
> newfunc);
>
> - if (ACPI_FAILURE(status)) {
> - err("failed to register interrupt notify handler\n");
> - return status;
> + if (ACPI_FAILURE(status))
> + err("failed to register interrupt notify handler\n");
> }
>
> - return AE_OK;
> + return status;
> }
I tried 2.6.12-rc2-mm1(includes this patch) on my Tiger box,
I could not insmod the acpiphp module because of the NaT
consumption.
My box does not have any _DCK method, so find_dock() returns
without making any acpiphp_dock_station struct. Therefore,
NaT consumption has occurred at get_dependent_device().
Here is a log.
pci_hotplug: PCI Hot Plug PCI Core version: 0.5
acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
acpiphp_glue: found PCI-to-PCI bridge at PCI 0000:02:1f.0
acpiphp_glue: _HPP parameter = (10, 40, 01, 01)
acpiphp_glue: found ACPI PCI Hotplug slot 1 at PCI 0000:06:01
insmod[5085]: NaT consumption 17179869216 [1]
Modules linked in: acpiphp pci_hotplug sunrpc binfmt_misc thermal processor fan
container button ehci_hcd
Pid: 5085, CPU 1, comm: insmod
psr : 00001010081a6018 ifs : 8000000000000006 ip : [<a000000200112080>] Not
tainted
ip is at get_dependent_device+0x20/0xe0 [acpiphp]
unat: 0000000000000000 pfs : 0000000000000795 rsc : 0000000000000003
rnat: 0000000000000002 bsps: 0000000000000013 pr : 00000000059a1569
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0 : a00000020010dcb0 b6 : a0000001003e99e0 b7 : a0000001003ce860
f6 : 0fffafffffffff0000000 f7 : 0ffdb8000000000000000
f8 : 0ffff8000000000000000 f9 : 100038000000000000000
f10 : 0fffafffffffff0000000 f11 : 1003e0000000000000000
r1 : a0000002001124f8 r2 : 000000000000038b r3 : e0000001040c0f78
r8 : 0000000000000000 r9 : 0000000000000018 r10 : a0000002001189e0
r11 : e0000002ffd34840 r12 : e0000001040c7de0 r13 : e0000001040c0000
r14 : 0000000000000000 r15 : e0000002ffdc69a8 r16 : e0000002ffd35810
r17 : a00000010095af70 r18 : ffffffffffffffff r19 : a00000010095a090
r20 : 0000000000000007 r21 : a00000010095a0a0 r22 : 0000000000000000
r23 : a00000010095af90 r24 : a00000010087f698 r25 : a00000010087f690
r26 : a000000100944248 r27 : 0000000000000000 r28 : a000000100968b8e
r29 : 0000000000003556 r30 : 0000000000000000 r31 : a00000010095a338
Call Trace:
[<a000000100011f50>] show_stack+0x50/0xa0
sp=e0000001040c77f0 bsp=e0000001040c1548
[<a000000100012820>] show_regs+0x820/0x840
sp=e0000001040c79c0 bsp=e0000001040c1500
[<a000000100036a70>] die+0x1d0/0x280
sp=e0000001040c79c0 bsp=e0000001040c14b8
[<a000000100036b60>] die_if_kernel+0x40/0x60
sp=e0000001040c79e0 bsp=e0000001040c1488
[<a0000001000382a0>] ia64_fault+0x1140/0x1180
sp=e0000001040c79e0 bsp=e0000001040c1408
[<a00000010000c3c0>] ia64_leave_kernel+0x0/0x280
sp=e0000001040c7c10 bsp=e0000001040c1408
[<a000000200112080>] get_dependent_device+0x20/0xe0 [acpiphp]
sp=e0000001040c7de0 bsp=e0000001040c13d0
[<a00000020010dcb0>] register_slot+0x710/0x860 [acpiphp]
sp=e0000001040c7de0 bsp=e0000001040c1358
[<a0000001003f3530>] acpi_ns_walk_namespace+0x130/0x2a0
sp=e0000001040c7e00 bsp=e0000001040c12e0
[<a0000001003eed10>] acpi_walk_namespace+0x90/0xe0
sp=e0000001040c7e00 bsp=e0000001040c1290
[<a00000020010e270>] init_bridge_misc+0x70/0x180 [acpiphp]
sp=e0000001040c7e00 bsp=e0000001040c1268
[<a00000020010e6d0>] find_p2p_bridge+0x350/0x400 [acpiphp]
sp=e0000001040c7e00 bsp=e0000001040c1220
[<a0000001003f3530>] acpi_ns_walk_namespace+0x130/0x2a0
sp=e0000001040c7e10 bsp=e0000001040c11a0
[<a0000001003eed10>] acpi_walk_namespace+0x90/0xe0
sp=e0000001040c7e10 bsp=e0000001040c1150
[<a00000020010eb50>] add_bridge+0x3d0/0x440 [acpiphp]
sp=e0000001040c7e10 bsp=e0000001040c1118
[<a00000010040f090>] acpi_pci_register_driver+0x110/0x180
sp=e0000001040c7e20 bsp=e0000001040c10e0
[<a0000002000d88f0>] acpiphp_glue_init+0x90/0xc0 [acpiphp]
sp=e0000001040c7e20 bsp=e0000001040c10c8
[<a0000002000d8260>] acpiphp_init+0x80/0x680 [acpiphp]
sp=e0000001040c7e30 bsp=e0000001040c1078
[<a0000001000cc620>] sys_init_module+0x1c0/0x440
sp=e0000001040c7e30 bsp=e0000001040c1008
[<a00000010000c220>] ia64_ret_from_syscall+0x0/0x20
sp=e0000001040c7e30 bsp=e0000001040c1008
[<a000000000010640>] __kernel_syscall_via_break+0x0/0x20
sp=e0000001040c8000 bsp=e0000001040c1008
Thanks,
MUNE
-
To unsubscribe from this list: send the line "unsubscribe linux-acpi" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html