diff options
author | Chen Gong <gong.chen@linux.intel.com> | 2012-03-15 12:53:36 +0400 |
---|---|---|
committer | Len Brown <len.brown@intel.com> | 2012-03-30 11:30:18 +0400 |
commit | ee49089dc7d9fc78db51e18f4fba68e88edc49a4 (patch) | |
tree | 998a8223c8f1457d5d1c9146d6602cb24c810688 /net/appletalk | |
parent | 185210cc754754c2504afcef9d1c9cd4b8761a9c (diff) | |
download | linux-ee49089dc7d9fc78db51e18f4fba68e88edc49a4.tar.xz |
ACPI, APEI, EINJ, new parameter to control trigger action
Some APEI firmware implementation will access injected address
specified in param1 to trigger the error when injecting memory
error, which means if one SRAR error is injected, the crash
always happens because it is executed in kernel context. This
new parameter can disable trigger action and control is taken
over by the user. In this way, an SRAR error can happen in user
context instead of crashing the system. This function is highly
depended on BIOS implementation so please ensure you know the
BIOS trigger procedure before you enable this switch.
v2:
notrigger should be created together with param1/param2
Tested-by: Tony Luck <tony.luck@lintel.com>
Signed-off-by: Chen Gong <gong.chen@linux.intel.com>
Signed-off-by: Len Brown <len.brown@intel.com>
Diffstat (limited to 'net/appletalk')
0 files changed, 0 insertions, 0 deletions