From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id A7AB8C64EC4 for ; Thu, 9 Mar 2023 17:07:04 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4PXbFf2tW7z3cht for ; Fri, 10 Mar 2023 04:07:02 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.a=rsa-sha256 header.s=korg header.b=et4WE6hm; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linuxfoundation.org (client-ip=2604:1380:4641:c500::1; helo=dfw.source.kernel.org; envelope-from=gregkh@linuxfoundation.org; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.a=rsa-sha256 header.s=korg header.b=et4WE6hm; dkim-atps=neutral Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4PXbDX0FLpz3cLs for ; Fri, 10 Mar 2023 04:06:02 +1100 (AEDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1D16561C63; Thu, 9 Mar 2023 17:06:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 16C99C433D2; Thu, 9 Mar 2023 17:05:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1678381559; bh=RSAcqfw4DMiJLx3ImYjFMzMWkPOStE1x/RPh9faErv8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=et4WE6hm2isC5kXMdE+ecn3CDmiqVOOnkljYx1MXTIqaakWdZ4hwV1MXy5gmLRHLB cNno5cB/DxyAraiUtPwPo02Km5mxNUFNVuQB2UsM94wnYuHHbke28mgOtyBgJE1Ya7 +zotgLElptdLwreqs5LcYmcuVKoi5tl8O7VUSINo= Date: Thu, 9 Mar 2023 18:05:56 +0100 From: Greg Kroah-Hartman To: Quan Nguyen Subject: Re: [PATCH v2 2/2] misc: smpro-errmon: Add dimm training failure syndrome Message-ID: References: <20230228092010.1863419-1-quan@os.amperecomputing.com> <20230228092010.1863419-3-quan@os.amperecomputing.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230228092010.1863419-3-quan@os.amperecomputing.com> X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Paul Menzel , Arnd Bergmann , Andrew Jeffery , openbmc@lists.ozlabs.org, Thang Nguyen , linux-kernel@vger.kernel.org, Phong Vo , Joel Stanley , Open Source Submission Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" On Tue, Feb 28, 2023 at 04:20:10PM +0700, Quan Nguyen wrote: > Adds event_dimm[0-15]_syndrome sysfs to report the failure syndrome > to BMC when DIMM training failed. > > Signed-off-by: Quan Nguyen > --- > v2: > + Change "to initialized" to "to initialize" [Paul] > + Corrected kernel version to 6.3 [Greg,Paul] Sorry, but this is going to have to be 6.4 now. thanks, greg k-h