Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp15699010rwb; Mon, 28 Nov 2022 15:07:02 -0800 (PST) X-Google-Smtp-Source: AA0mqf4sOjZH6r8yepk+cbAQM1r/PdAfMB4mDhXDtfD4MJuo8CdWySe8S67Q0hTs8yjdMm0AcUuh X-Received: by 2002:a63:225d:0:b0:477:beb8:70f8 with SMTP id t29-20020a63225d000000b00477beb870f8mr23633844pgm.281.1669676822582; Mon, 28 Nov 2022 15:07:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669676822; cv=none; d=google.com; s=arc-20160816; b=dg5e5DhFmKpzQXb+axvA6FBtK8WE6bXY9rPNE1hqKGKslGWLDIrj2+eDPoXVEWrD5A ez8bdNKL1VtIBe5oHVyS97LZmpkpIDrPqAuCo0gQXYygr7yPfVxbex9p4t2dsbxxk1yI WNqkwk1cU/F4TtvA/JdaqvaAIHhVavano2DyTHmlF1PqBks+vvWNsnOBvxKXEYbLf5Sn Hnpl1Bte8ZM6jY4zH2ELi2vmC1TmeJGcx3K/k2r3hwDvZvP5eyMTuyNCtAHhjly+gCf1 BhQzkXFkR/KKwsVnvAeE0oRD3+R6cAe3/Tk0JZ/JtzyWpIMA/XDj2srmli7dEb4U6tPT 2lbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :to:from:dkim-signature; bh=qzkABfP+g0Wxt+cG6aV52+3v2poBBCO9AJCGAzw3bXg=; b=m8RWIfzUrNzSWIhNuZ7nyh4T9tSXDX1uMvLohWlkgCfVUMxilQY0ehnFOL9U0CDrlK TQ7JBYWy7tLIWfaVvkkZJiJJdhH3DEXXL6Eit2evT0pMlZxiTB1PKSYgkfiOlJRrtuur DKpsCEn3Lef/48tL3Y0nclVqLjzauFf7A0obt+ZqNrt9vKJpoYJZlmwvQ/KiC2SpqSnc IS+Y7GzSRbF6aeC4/mzBHmhJILdju1ASMpYaeyt/FHXeYXmvQUqoh7H8Nc+50F7ceFsq wafoiepePwfs5wa4S8tqGUJd8bBsp0AGELMox/vgHReQjEJON8BCw1/KUegc/TRIrFEL 5LXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=m7FesLKn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d188-20020a6336c5000000b00477cead7cd1si13687407pga.644.2022.11.28.15.06.51; Mon, 28 Nov 2022 15:07:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=m7FesLKn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234502AbiK1XEg (ORCPT + 83 others); Mon, 28 Nov 2022 18:04:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56452 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229667AbiK1XEZ (ORCPT ); Mon, 28 Nov 2022 18:04:25 -0500 Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D64632B26B; Mon, 28 Nov 2022 15:04:24 -0800 (PST) Received: from pps.filterd (m0134420.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2ASM1tJI001979; Mon, 28 Nov 2022 23:03:49 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : subject : date : message-id : in-reply-to : references; s=pps0720; bh=qzkABfP+g0Wxt+cG6aV52+3v2poBBCO9AJCGAzw3bXg=; b=m7FesLKn/jPrFzZ9Bkm6LPMADgBPlywEWo8+OTqmRJ/LPqyPXQoTm5FQs3HFew8tM/mC L8nJDZCgCHbmbZ1yB6DHiX3wrjAyAF8NQEdq3QJcTlAaXcpsp69oNp0xro7Jc6Bph4XO gkkMuKogMn/JTGtOXyJZmS/DLmgVAFhCn4PpDm2CFmrBbPCSVo4GQkkQIcwd+/2L6lVp Vk113zV45dgYMXYZKdmuGfcfOS/mCDqRYhQogIfvxy0EWZCVKDV4I12+G8NVor6rUxXw eab9eHu8+SH2YPiJGRL2N08mef774IS/EqrRw4+3mi3B4hjca1HFEEt91ogjdrA8xXW/ xQ== Received: from p1lg14881.it.hpe.com (p1lg14881.it.hpe.com [16.230.97.202]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 3m50bd2smb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 28 Nov 2022 23:03:49 +0000 Received: from p1lg14886.dc01.its.hpecorp.net (unknown [10.119.18.237]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by p1lg14881.it.hpe.com (Postfix) with ESMTPS id DE1A1801ACA; Mon, 28 Nov 2022 23:03:48 +0000 (UTC) Received: from hpe.com (unknown [16.231.227.36]) by p1lg14886.dc01.its.hpecorp.net (Postfix) with ESMTP id 501C280B37B; Mon, 28 Nov 2022 23:03:48 +0000 (UTC) From: nick.hawkins@hpe.com To: jdelvare@suse.com, linux@roeck-us.net, robh+dt@kernel.org, krzysztof.kozlowski+dt@linaro.org, verdun@hpe.com, nick.hawkins@hpe.com, corbet@lwn.net, linux@armlinux.org.uk, linux-hwmon@vger.kernel.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-doc@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [PATCH v2 2/6] ABI: sysfs-class-hwmon: add a description for fanY_fault Date: Mon, 28 Nov 2022 17:02:15 -0600 Message-Id: <20221128230219.39537-3-nick.hawkins@hpe.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221128230219.39537-1-nick.hawkins@hpe.com> References: <20221128230219.39537-1-nick.hawkins@hpe.com> X-Proofpoint-GUID: jBNy7-NfQBYFiY9H8tmybTqFfHqOlnyW X-Proofpoint-ORIG-GUID: jBNy7-NfQBYFiY9H8tmybTqFfHqOlnyW X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-28_17,2022-11-28_02,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxlogscore=999 malwarescore=0 adultscore=0 mlxscore=0 clxscore=1015 lowpriorityscore=0 priorityscore=1501 suspectscore=0 spamscore=0 phishscore=0 bulkscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211280166 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nick Hawkins The fans are capable of reporting a fault to the CPLD controller which then reports it to the GXP SoC via PLREGS. This patch enables hwmon to be able to report these failures up to the HOST OS. Signed-off-by: Nick Hawkins --- v2: *No change --- Documentation/ABI/testing/sysfs-class-hwmon | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/Documentation/ABI/testing/sysfs-class-hwmon b/Documentation/ABI/testing/sysfs-class-hwmon index 7271781a23b2..638f4c6d4ec7 100644 --- a/Documentation/ABI/testing/sysfs-class-hwmon +++ b/Documentation/ABI/testing/sysfs-class-hwmon @@ -276,6 +276,15 @@ Description: RW +What: /sys/class/hwmon/hwmonX/fanY_fault +Description: + Reports if a fan has reported failure. + + - 1: Failed + - 0: Ok + + RO + What: /sys/class/hwmon/hwmonX/pwmY Description: Pulse width modulation fan control. -- 2.17.1