Received: by 2002:a05:6358:16cd:b0:dc:6189:e246 with SMTP id r13csp1339047rwl; Fri, 4 Nov 2022 12:42:52 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4L8ETQWz3Wq1EgbfEsLruJtb1OYTlnl2DSQzRjk06QZjWm4gOjlrPgWilNFMW3aH/CzZvd X-Received: by 2002:a17:906:7945:b0:73b:e605:f31 with SMTP id l5-20020a170906794500b0073be6050f31mr36322395ejo.129.1667590972434; Fri, 04 Nov 2022 12:42:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667590972; cv=none; d=google.com; s=arc-20160816; b=KhoPjdGoJ/sEpECTixtE92aWnPk3p2c8LxhFYxqMhelPi2TD2txj+1zIURYfm+P0MT a8d6tRFUIn1KqjHnpV0pPtXAdG/A3B3hIM8ukerO1RdqrmI18Nr3Uij/xkJFdJkH8eTg 9OM5YY4uFxbzDSRiTfNRffDG42Ap8JH0V9EkIvvJCE5IAI2zdb5tAkSeJPvFlaUls4wr Xpn5ujqk94F9j7QEJ31akPNvHEmRgmb3UR8nicd47ZrYX948+EO9nvYoREQmfR+DgC4b 4LZRVvkzjx/aO/WcoLwyLonAkeCC3bHF7z0kN9ak5jNGVeoFxTp6u3xMqXYoMD1jyjhW bPUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :to:from:dkim-signature; bh=8DLWvIgKifK3/WDHlcQAG4K3kstQiRCex2ZOGVAHO2s=; b=e0s4Hv74SwW1kNCH0yf5PUF5YwuPpLkRUenKrNPwr1QBOEuDR6xZnVVEtdFyscN4pQ BdyPJ3Pjq8tHifNE157WQ+bWRGIj/w2dl5vg/sP9B1UVFez/MszIfaEcxWmbFX5sNXs/ CPbs0asvEjJMiNZTPEaGQ0GjDE6El5gPk9p5bO30BGFWOR+OOQQLfEPJBwH7It2GXs6W RD1mwoV+zneJcBHOcWWl6iWcRAAAOzDhX3UJOivINHTDYtuPsXcI5md6tH0lA6SlEnbN ZWj8btEamMU993cqDZq5DQ7IayQmXaM/+QojX6MKMw42sAE6bQz80LA2ttYyW8ZZZGfA Y/CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=m3d4Wvea; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sb19-20020a1709076d9300b007a4feae7ae7si6621345ejc.575.2022.11.04.12.42.28; Fri, 04 Nov 2022 12:42:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=m3d4Wvea; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229866AbiKDTjO (ORCPT + 98 others); Fri, 4 Nov 2022 15:39:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35472 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229763AbiKDTix (ORCPT ); Fri, 4 Nov 2022 15:38:53 -0400 Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 09CDB1100; Fri, 4 Nov 2022 12:38:44 -0700 (PDT) Received: from pps.filterd (m0148663.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 2A4FPDUB030697; Fri, 4 Nov 2022 19:38:11 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : subject : date : message-id : in-reply-to : references; s=pps0720; bh=8DLWvIgKifK3/WDHlcQAG4K3kstQiRCex2ZOGVAHO2s=; b=m3d4WveadfN2vlZ3fAjw0k+NpCagyGfyQDKse6gH+DijkmxrsO53AkI/p2TB9dkSg7hO Fwru55btttFY/1vx5u/0JO7+2ZZ/FuIQrmCFXvl3/0X9pumkfF5CtwRiiNjMjRgjaZC1 3IIGgAoHTvMixoJSSnjLo4XkT63K3qX2g+9peFfHsYojerBSGfWApcVWttk1rmEAzKbk QVs9Wi1dy2FRGBwgtoQuqYMs6xuGn5Hp96KrS1cKXVVOj8B7uVDneqMmFUku/06Wr3dn c3DbC7YNh0AtUdTf5wrgKRoxp4JYV22ncfQudChAseQto1FqGpPgmBAXE0Qm+QmWg3dk yg== Received: from p1lg14880.it.hpe.com (p1lg14880.it.hpe.com [16.230.97.201]) by mx0a-002e3701.pphosted.com (PPS) with ESMTPS id 3kn5bqsurp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 04 Nov 2022 19:38:11 +0000 Received: from p1lg14885.dc01.its.hpecorp.net (unknown [10.119.18.236]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by p1lg14880.it.hpe.com (Postfix) with ESMTPS id 9AEEC8040F3; Fri, 4 Nov 2022 19:38:10 +0000 (UTC) Received: from hpe.com (unknown [16.231.227.36]) by p1lg14885.dc01.its.hpecorp.net (Postfix) with ESMTP id BAC7080353C; Fri, 4 Nov 2022 19:38:09 +0000 (UTC) From: nick.hawkins@hpe.com To: jdelvare@suse.com, linux@roeck-us.net, robh+dt@kernel.org, krzysztof.kozlowski+dt@linaro.org, verdun@hpe.com, nick.hawkins@hpe.com, corbet@lwn.net, linux@armlinux.org.uk, linux-hwmon@vger.kernel.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-doc@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [PATCH v1 2/6] ABI: sysfs-class-hwmon: add a description for fanY_fault Date: Fri, 4 Nov 2022 14:36:53 -0500 Message-Id: <20221104193657.105130-3-nick.hawkins@hpe.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221104193657.105130-1-nick.hawkins@hpe.com> References: <20221104193657.105130-1-nick.hawkins@hpe.com> X-Proofpoint-ORIG-GUID: _blGskLwhQylhmyFRrg7o-YVQoHSEv8V X-Proofpoint-GUID: _blGskLwhQylhmyFRrg7o-YVQoHSEv8V X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-04_11,2022-11-03_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 lowpriorityscore=0 clxscore=1015 spamscore=0 mlxlogscore=999 priorityscore=1501 adultscore=0 phishscore=0 mlxscore=0 impostorscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211040122 X-Spam-Status: No, score=-3.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nick Hawkins The fans are capable of reporting a fault to the CPLD controller which then reports it to the GXP SoC via PLREGS. This patch enables hwmon to be able to report these failures up to the HOST OS. Signed-off-by: Nick Hawkins --- Documentation/ABI/testing/sysfs-class-hwmon | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/Documentation/ABI/testing/sysfs-class-hwmon b/Documentation/ABI/testing/sysfs-class-hwmon index 7271781a23b2..638f4c6d4ec7 100644 --- a/Documentation/ABI/testing/sysfs-class-hwmon +++ b/Documentation/ABI/testing/sysfs-class-hwmon @@ -276,6 +276,15 @@ Description: RW +What: /sys/class/hwmon/hwmonX/fanY_fault +Description: + Reports if a fan has reported failure. + + - 1: Failed + - 0: Ok + + RO + What: /sys/class/hwmon/hwmonX/pwmY Description: Pulse width modulation fan control. -- 2.17.1