https://bugzilla.kernel.org/show_bug.cgi?id=45151





--- Comment #16 from Francesco <trent...@dei.unipd.it>  2012-08-20 15:09:30 ---
Here it is the results but something strange happens. I've check three times
but I think I'm doing something wrong.

The strange behavior is that adding the string of comment #13 ("debug
log_buf_len=8M  cpi.debug_layer=0x1009001F acpi.debug_level=0x082002FF") to
kernel boot parameter,
the acpi subsystem work vice versa as booting without the string. This mean
that the acpi works with the if statement whereas stop working when is comment
out (thus applying the patch of comment #1). On the other hand, when all the
kernels are booted without the previous string the acpi subsystem work as
described in the bug. Therefore, the string seems to invert the behavior of the
acpi subsystem.

Hence, I've reset all the kernel source folder and restart to compile all the
kernel variant before doing the test. All test are done _WITH the boot string
of comment #13 and acpi debug compiling option activated. The dmesg files
included are:

dmesg_c1.txt: in this case _only patch of comment #1 is applied. In that case
acpi_listen doesn't output anything, the acpi subsystem doesn't work.

dmesg_c9-new-gpe.txt: in this case _only patch of comment #9 is applied (called
"new gpe patch"). In that case acpi work correctly.

dmesg_c14-c1.txt: in this case _both patch of comment #1 and comment #14 are
applied. In that case acpi_listen doesn't output anything, the acpi subsystem
doesn't work.

dmesg_c14-c9.txt: in this case _both patch of comment #9 and comment #14 are
applied. In that case acpi work correctly.


I hope that this help.

Thanks,
Francesco

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
acpi-bugzilla mailing list
acpi-bugzilla@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla

Reply via email to