From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933083AbXBLHx7 (ORCPT ); Mon, 12 Feb 2007 02:53:59 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S933088AbXBLHx7 (ORCPT ); Mon, 12 Feb 2007 02:53:59 -0500 Received: from mail.suse.de ([195.135.220.2]:39143 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933076AbXBLHx6 (ORCPT ); Mon, 12 Feb 2007 02:53:58 -0500 From: Oliver Neukum Organization: Novell To: Andi Kleen Subject: Re: [PATCH x86 for review II] [18/39] x86_64: Allow to run a program when a machine check event is detected Date: Mon, 12 Feb 2007 08:54:15 +0100 User-Agent: KMail/1.9.1 Cc: patches@x86-64.org, linux-kernel@vger.kernel.org References: <20070212837.963446000@suse.de> <20070212073805.89FEE13D7F@wotan.suse.de> In-Reply-To: <20070212073805.89FEE13D7F@wotan.suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200702120854.15814.oneukum@suse.de> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Am Montag, 12. Februar 2007 08:38 schrieb Andi Kleen: > When a machine check event is detected (including a AMD RevF threshold > overflow event) allow to run a "trigger" program. This allows user space > to react to such events sooner. Could this not be merged with other reporting mechanisms? This looks like a new incarnation of the /etc/hotplug code. Regards Oliver