I don't know if I'm doing something really stupid but using the latest
IrDA patch with kernel 2.2.14 seems to break APM for me.

I am using an ACER Travelmate 14T

I downloaded the patch-2.2.14-irda1 file from

http://www.cs.uit.no/linux-irda/snapshots/v2.2/patch-2.2.14-irda1.gz

and executed patch -p1 < patch-2.2.14-irda1
from /usr/src/linux

I then did the usual make menuconfig
followed by make-kpkg --rev irda.1 kernel_image
then make-kpkg --rev irda.1 modules_image

The APM options I selected are as follows:

CONFIG_APM=y
CONFIG_APM_DISABLE_BY_DEFAULT=y
# CONFIG_APM_IGNORE_USER_SUSPEND is not set
# CONFIG_APM_DO_ENABLE is not set
# CONFIG_APM_CPU_IDLE is not set
CONFIG_APM_DISPLAY_BLANK=y
CONFIG_APM_POWER_OFF=y
CONFIG_APM_IGNORE_MULTIPLE_SUSPEND=y
CONFIG_APM_IGNORE_SUSPEND_BOUNCE=y
# CONFIG_APM_RTC_IS_GMT is not set
CONFIG_APM_ALLOW_INTS=y

I have tested these setting without the above patch.

Here are my interrupts if this is any use:

cat /proc/interrupts

          CPU0       
  0:     126395          XT-PIC  timer
  1:       3301          XT-PIC  keyboard
  2:          0          XT-PIC  cascade
  3:          1          XT-PIC  serial
  5:          0          XT-PIC  ESS Solo1
  9:          0          XT-PIC  i82365
 11:       1331          XT-PIC  pcnet_cs
 12:     155366          XT-PIC  PS/2 Mouse
 13:          1          XT-PIC  fpu
 14:     223502          XT-PIC  ide0
 15:         13          XT-PIC  ide1
NMI:          0

running apm -s

gives the following oops, and turning off my power adapter crashes the
laptop. Please help me with this!!


Mar 31 12:12:46 jackal kernel: Oops: 0000 
Mar 31 12:12:46 jackal kernel: CPU:    0 
Mar 31 12:12:46 jackal kernel: EIP:    0010:[<c4080000>] 
Mar 31 12:12:46 jackal kernel: EFLAGS: 00010a82 
Mar 31 12:12:46 jackal kernel: eax: c407fe50   ebx: 0000000a   ecx:
c0108180   edx: c364b640 
Mar 31 12:12:46 jackal kernel: esi: c33f4040   edi: 00000003   ebp:
ffffffe7   esp: c1e09f78 
Mar 31 12:12:46 jackal kernel: ds: 0018   es: 0018   ss: 0018 
Mar 31 12:12:46 jackal kernel: Process apm (pid: 338, process nr: 47,
stackpage=c1e09000) 
Mar 31 12:12:46 jackal kernel: Stack: c340a7a0 00004102 00004102
c010822a 0000000a 00000003 c340a7a0 c20e9560  
Mar 31 12:12:46 jackal kernel:        00000000 c012d07f c360e330
c20e9560 00004102 00000000 c1e08000 00000000  
Mar 31 12:12:46 jackal kernel:        bffffb2c bffffa4c c0109c84
00000003 00004102 00000000 00000000 bffffb2c  
Mar 31 12:12:46 jackal kernel: Call Trace: [do_ioctl+170/208]
[sys_ioctl+359/380] [system_call+52/56]  
Mar 31 12:12:46 jackal kernel: Code: <1>Unable to handle kernel paging
request at virtual address c4080000 
Mar 31 12:12:46 jackal kernel: Oops: 0000 
Mar 31 12:12:46 jackal kernel: CPU:    0 
Mar 31 12:12:46 jackal kernel: EIP:    0010:[show_registers+471/520] 
Mar 31 12:12:46 jackal kernel: EFLAGS: 00010092 
Mar 31 12:12:46 jackal kernel: eax: c4080000   ebx: 00000000   ecx:
00000005   edx: c1e09f3c 
Mar 31 12:12:46 jackal kernel: esi: 0000002b   edi: c1e0a000   ebp:
c4000000   esp: c1e09ee8 
Mar 31 12:12:46 jackal kernel: ds: 0018   es: 0018   ss: 0018 
Mar 31 12:12:46 jackal kernel: Process apm (pid: 338, process nr: 47,
stackpage=c1e09000) 
Mar 31 12:12:46 jackal kernel: Stack: c23533d8 c1e08000 c4800000
c010a0d0 c1e09f3c c01bac98 c01bc38e 00000000  
Mar 31 12:12:46 jackal kernel:        00000000 c010f070 c01bc38e
c1e09f3c 00000000 c1e08000 c33f4040 00000003  
Mar 31 12:12:46 jackal kernel:        ffffffe7 c23533d8 c0109d89
c1e09f3c 00000000 0000000a c0108180 c364b640  
Mar 31 12:12:46 jackal kernel: Call Trace: [<c4800000>] [die+48/56]
[error_table+2452/8604] [error_table+8330/8604] [do_page_fault+680/880]
[error_table+8330/8604] [error_code+45/52]  
Mar 31 12:12:46 jackal kernel:        [do_ioctl+0/208] [<c407fe50>]
[<c4080000>] [send_event+34/136] [do_ioctl+170/208] [sys_ioctl+359/380]
[system_call+52/56]  
Mar 31 12:12:46 jackal kernel: Code: 8a 04 03 25 ff 00 00 00 50 68 90 ac
1b c0 e8 52 9a 00 00 83  
Mar 31 12:13:10 jackal kernel: neighbour table overflow 


-- 
Iain Pople
[EMAIL PROTECTED]

_______________________________________________
Linux-IrDA mailing list  -  [EMAIL PROTECTED]
http://www4.pasta.cs.UiT.No/mailman/listinfo/linux-irda

Reply via email to