summaryrefslogtreecommitdiff
path: root/Documentation/acpi
diff options
context:
space:
mode:
authorChen Gong <gong.chen@linux.intel.com>2012-03-15 16:53:36 +0800
committerLen Brown <len.brown@intel.com>2012-03-30 03:30:18 -0400
commitee49089dc7d9fc78db51e18f4fba68e88edc49a4 (patch)
tree998a8223c8f1457d5d1c9146d6602cb24c810688 /Documentation/acpi
parent185210cc754754c2504afcef9d1c9cd4b8761a9c (diff)
downloadkernel-ee49089dc7d9fc78db51e18f4fba68e88edc49a4.tar.gz
ACPI, APEI, EINJ, new parameter to control trigger action
Some APEI firmware implementation will access injected address specified in param1 to trigger the error when injecting memory error, which means if one SRAR error is injected, the crash always happens because it is executed in kernel context. This new parameter can disable trigger action and control is taken over by the user. In this way, an SRAR error can happen in user context instead of crashing the system. This function is highly depended on BIOS implementation so please ensure you know the BIOS trigger procedure before you enable this switch. v2: notrigger should be created together with param1/param2 Tested-by: Tony Luck <tony.luck@lintel.com> Signed-off-by: Chen Gong <gong.chen@linux.intel.com> Signed-off-by: Len Brown <len.brown@intel.com>
Diffstat (limited to 'Documentation/acpi')
0 files changed, 0 insertions, 0 deletions