summaryrefslogtreecommitdiffstats
path: root/Documentation/acpi
diff options
context:
space:
mode:
authorChen Gong <gong.chen@linux.intel.com>2012-03-15 09:53:36 +0100
committerLen Brown <len.brown@intel.com>2012-03-30 09:30:18 +0200
commitee49089dc7d9fc78db51e18f4fba68e88edc49a4 (patch)
tree998a8223c8f1457d5d1c9146d6602cb24c810688 /Documentation/acpi
parentACPI, APEI, EINJ, limit the range of einj_param (diff)
downloadlinux-ee49089dc7d9fc78db51e18f4fba68e88edc49a4.tar.xz
linux-ee49089dc7d9fc78db51e18f4fba68e88edc49a4.zip
ACPI, APEI, EINJ, new parameter to control trigger action
Some APEI firmware implementation will access injected address specified in param1 to trigger the error when injecting memory error, which means if one SRAR error is injected, the crash always happens because it is executed in kernel context. This new parameter can disable trigger action and control is taken over by the user. In this way, an SRAR error can happen in user context instead of crashing the system. This function is highly depended on BIOS implementation so please ensure you know the BIOS trigger procedure before you enable this switch. v2: notrigger should be created together with param1/param2 Tested-by: Tony Luck <tony.luck@lintel.com> Signed-off-by: Chen Gong <gong.chen@linux.intel.com> Signed-off-by: Len Brown <len.brown@intel.com>
Diffstat (limited to 'Documentation/acpi')
0 files changed, 0 insertions, 0 deletions