ACK/cmnt: [PATCH v2 0/3][SRU Bionic] Decode ARM CPER records in kernel
Stefan Bader
stefan.bader at canonical.com
Mon Jun 4 21:59:22 UTC 2018
On 23.05.2018 17:05, dann frazier wrote:
> Clean cherry-picks from upstream. Tested on a QDF2400 (the only ARM
> system I know of that supports EINJ, needed for simulating errors).
>
> v2: Explicitly enable CONFIG_UEFI_CPER_ARM
>
> Tyler Baicar (2):
> efi: Move ARM CPER code to new file
> efi: Parse ARM error information value
>
> dann frazier (1):
> UBUNTU: [Config] CONFIG_UEFI_CPER_ARM=y
>
> debian.master/config/config.common.ubuntu | 1 +
> drivers/firmware/efi/Kconfig | 5 +
> drivers/firmware/efi/Makefile | 1 +
> drivers/firmware/efi/cper-arm.c | 356 ++++++++++++++++++++++
> drivers/firmware/efi/cper.c | 122 +-------
> include/linux/cper.h | 48 +++
> 6 files changed, 414 insertions(+), 119 deletions(-)
> create mode 100644 drivers/firmware/efi/cper-arm.c
>
Somehow more nice to have than required but ok, limited to specific arch and not
too complex either. So only thing I probably would change is to have the patch
changing the ubuntu config last.
-Stefan
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180604/15bfab9a/attachment.sig>
More information about the kernel-team
mailing list