ACK/cmnt: [PATCH v2 0/3][SRU Bionic] Decode ARM CPER records in kernel

Stefan Bader stefan.bader at canonical.com
Mon Jun 4 21:59:22 UTC 2018


On 23.05.2018 17:05, dann frazier wrote:
> Clean cherry-picks from upstream. Tested on a QDF2400 (the only ARM
> system I know of that supports EINJ, needed for simulating errors).
> 
> v2: Explicitly enable CONFIG_UEFI_CPER_ARM
> 
> Tyler Baicar (2):
>   efi: Move ARM CPER code to new file
>   efi: Parse ARM error information value
> 
> dann frazier (1):
>   UBUNTU: [Config] CONFIG_UEFI_CPER_ARM=y
> 
>  debian.master/config/config.common.ubuntu |   1 +
>  drivers/firmware/efi/Kconfig              |   5 +
>  drivers/firmware/efi/Makefile             |   1 +
>  drivers/firmware/efi/cper-arm.c           | 356 ++++++++++++++++++++++
>  drivers/firmware/efi/cper.c               | 122 +-------
>  include/linux/cper.h                      |  48 +++
>  6 files changed, 414 insertions(+), 119 deletions(-)
>  create mode 100644 drivers/firmware/efi/cper-arm.c
> 

Somehow more nice to have than required but ok, limited to specific arch and not
too complex either. So only thing I probably would change is to have the patch
changing the ubuntu config last.

-Stefan
Acked-by: Stefan Bader <stefan.bader at canonical.com>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180604/15bfab9a/attachment.sig>


More information about the kernel-team mailing list