summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorAlexey Starikovskiy <astarikovskiy@suse.de>2008-03-21 19:36:02 +0300
committerLen Brown <len.brown@intel.com>2008-03-24 20:50:59 -0400
commitfa95ba04e6ba11d71e1b87becd054b38faf546c8 (patch)
tree42bd9c980d4ef6b4c509daa4bf01ebb761ab119d /security
parent223883b7aafa02410ed2e571d6032c876d0b23b8 (diff)
downloadkernel-crypto-fa95ba04e6ba11d71e1b87becd054b38faf546c8.tar.gz
kernel-crypto-fa95ba04e6ba11d71e1b87becd054b38faf546c8.tar.xz
kernel-crypto-fa95ba04e6ba11d71e1b87becd054b38faf546c8.zip
ACPI: EC: Detect irq storm
Problem seems to be that hw fails to clear GPE after we service it and write 1 into corresponding bit. Thus, as soon as we get interrupts enabled again, we receive a new one. Google gives too many results for "acer interrupt storm" for this being one-broken-machine case. Reference: http://bugzilla.kernel.org/show_bug.cgi?id=9998 Signed-off-by: Alexey Starikovskiy <astarikovskiy@suse.de> Signed-off-by: Len Brown <len.brown@intel.com>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions