On Tue, Apr 25, 2017 at 10:05:31AM -0600, Baicar, Tyler wrote: > That seems like something that should be done outside of these patches (if > added to the kernel at all). The decoding for this information would all be > vendor specific, so I'm not sure if we want to pollute the EFI code with > vendor specific error decoding. Currently we are using the RAS Daemon user > space tool for the decoding of this information since vendors can easily > pick up this tool and add an extension for their vendor specific parsing. > These prints will only happen when the firmware supports the vendor specific > error information anyway. The same questions apply here: what do you do if the machine panics because the error is fatal and you can't get it to run any userspace? Wouldn't it be good to decode the whole error? Right now we photograph screens on Intel x86 and feed the typed MCA info by hand to mcelog. Hardly an optimal situation. On AMD, there's a decoder which actually can dump the decoded critical error. (Or could - that's in flux again :-\). So yes, if stuff is too vendor-specific then you probably don't want to decode it (or add a vendor-specific decoding module like edac_mce_amd.ko, for example). But the tables from the UEFI spec, documenting IP-specific error types which should be valid for most if not all ARM64 implementations adhering to the spec, would be useful to decode. In general, the more we can decode the error in the kernel and the less we need an external help to do so, the better. Thanks. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply. -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html