Commit 7ad21148 authored by Len Brown's avatar Len Brown Committed by Len Brown

[ACPI] disable printk on AML breakpoint

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=135856Signed-off-by: default avatarLen Brown <len.brown@intel.com>
parent dae4850a
...@@ -229,7 +229,7 @@ acpi_os_predefined_override (const struct acpi_predefined_names *init_val, ...@@ -229,7 +229,7 @@ acpi_os_predefined_override (const struct acpi_predefined_names *init_val,
*new_val = NULL; *new_val = NULL;
if (!memcmp (init_val->name, "_OS_", 4) && strlen(acpi_os_name)) { if (!memcmp (init_val->name, "_OS_", 4) && strlen(acpi_os_name)) {
printk(KERN_INFO PREFIX "Overriding _OS definition %s\n", printk(KERN_INFO PREFIX "Overriding _OS definition to '%s'\n",
acpi_os_name); acpi_os_name);
*new_val = acpi_os_name; *new_val = acpi_os_name;
} }
...@@ -1005,11 +1005,15 @@ acpi_os_signal ( ...@@ -1005,11 +1005,15 @@ acpi_os_signal (
printk(KERN_ERR PREFIX "Fatal opcode executed\n"); printk(KERN_ERR PREFIX "Fatal opcode executed\n");
break; break;
case ACPI_SIGNAL_BREAKPOINT: case ACPI_SIGNAL_BREAKPOINT:
{ /*
char *bp_info = (char*) info; * AML Breakpoint
* ACPI spec. says to treat it as a NOP unless
printk(KERN_ERR "ACPI breakpoint: %s\n", bp_info); * you are debugging. So if/when we integrate
} * AML debugger into the kernel debugger its
* hook will go here. But until then it is
* not useful to print anything on breakpoints.
*/
break;
default: default:
break; break;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment