Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp547353rdb; Thu, 30 Nov 2023 11:24:47 -0800 (PST) X-Google-Smtp-Source: AGHT+IHH2Dy1LaTiQgoGQkHgSS+NpsquTg4oMV9PsOTE1X85pRwH0NUwxb2ENb9O91sdYXNIi+h0 X-Received: by 2002:a05:6a00:9384:b0:6cd:dfae:1b44 with SMTP id ka4-20020a056a00938400b006cddfae1b44mr5138024pfb.34.1701372287520; Thu, 30 Nov 2023 11:24:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701372287; cv=none; d=google.com; s=arc-20160816; b=dgNSxCjlsx/wyFbnomL0gAvHPg5cMDlxNI+mT8DoV8RevdUIYPLAdMcL4cUh3S0AHY oGFcCD9YAD9EXktfiKab4VEetpIelPkMq5Sivv8zoLOcZQj1nOJdJhxwBhJ4852/Gl4u pu7ksP+H/z4Hzx0pkrYcLD7n3/CFEFw3RGPkXOYd/KeCb8LnSgI3HMFTwmDdemNqqB2f b98+JUmuAMD/ciQz3zUQvafa4BxXp1Af6HGZSb4/fv3REEwVgVIyeTNjkIr0llNYgclr 0vr03OM4etZY3MrsVQJpQ3DLbWnAJHvth7qRjMUYPO+OhcfwJSuYZcO2AC+eJz42mWfa 27Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Z27BEXRvCJZcO/Tne7qruymc0blLlh2296KWo+kmoQ8=; fh=qThSIRufdAcTXHIWmo+/3LGhqx2rE7BOIGxpM+Tyyp8=; b=Yvw9nsgKxXdrRxN5xaS0RuISPzJtqcXRU/2HWP1XPtiPBCaiezR6rSOgub7qnoFO/r EcWsN9ypAyPOEm53ZhLQLyN8n4j099hBbX155ndrdOl+WB1VszaNH3YgcXegoD0Pf0JG 5tjPcelAWX1uDwppk/EEzx2KMmcfMINfChig7KfG6gq0XS8dxHnGTlv2dblAos3WmxQZ ZrQ6ahvo7N7x0lyT4YONznai+mvF/VP5mVPQ1RHRho7WAsPuOhD+Fj5WB2ydF5tuHCBY QtdejVu8hg7CL+P1q91L0uMwGrxxTZdk1/0u70Ubfl2Z6x+MtVzg+vQlSexeKYpZaOdw qe1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id k79-20020a628452000000b006cbed8d05e9si1779775pfd.357.2023.11.30.11.24.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 11:24:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id C6BB082CD6F7; Thu, 30 Nov 2023 11:24:38 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376422AbjK3TX4 (ORCPT + 99 others); Thu, 30 Nov 2023 14:23:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376407AbjK3TXc (ORCPT ); Thu, 30 Nov 2023 14:23:32 -0500 Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6147D48; Thu, 30 Nov 2023 11:23:38 -0800 (PST) Received: from mail.maildlp.com (unknown [172.18.186.231]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Sh5h13JSpz6JB68; Fri, 1 Dec 2023 03:23:13 +0800 (CST) Received: from lhrpeml500006.china.huawei.com (unknown [7.191.161.198]) by mail.maildlp.com (Postfix) with ESMTPS id 9A87414058E; Fri, 1 Dec 2023 03:23:36 +0800 (CST) Received: from SecurePC30232.china.huawei.com (10.122.247.234) by lhrpeml500006.china.huawei.com (7.191.161.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 30 Nov 2023 19:23:35 +0000 From: To: , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v4 11/11] cxl: scrub: sysfs: Add Documentation for CXL memory device scrub control attributes Date: Fri, 1 Dec 2023 03:23:13 +0800 Message-ID: <20231130192314.1220-12-shiju.jose@huawei.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20231130192314.1220-1-shiju.jose@huawei.com> References: <20231130192314.1220-1-shiju.jose@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.122.247.234] X-ClientProxiedBy: lhrpeml500004.china.huawei.com (7.191.163.9) To lhrpeml500006.china.huawei.com (7.191.161.198) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Thu, 30 Nov 2023 11:24:39 -0800 (PST) From: Shiju Jose Add sysfs documentation for the CXL memory device scrub control attributes those are exposed in /sys/class/scrub/ by the scrub driver. These attributes support user configuring a CXL memory device scrub. Signed-off-by: Shiju Jose --- .../testing/sysfs-class-cxl-scrub-configure | 79 +++++++++++++++++++ 1 file changed, 79 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-class-cxl-scrub-configure diff --git a/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure b/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure new file mode 100644 index 000000000000..3f55522134cd --- /dev/null +++ b/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure @@ -0,0 +1,79 @@ +See `Documentation/ABI/testing/sysfs-class-scrub-configure` for the +documentation of common scrub configure directory layout (/sys/class/scrub/), +including the attributes used for configuring the CXL patrol scrub. +Following are the attributes used for configuring the CXL ECS. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) The log entry type of how the DDR5 ECS log is + reported. + 00b - per DRAM. + 01b - per memory media FRU. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type_per_dram +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current log entry type of DDR5 ECS + region is per DRAM. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type_per_memory_media +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current log entry type of DDR5 ECS + region is per memory media FRU. + +What: /sys/class/scrub/scrubX/regionY/mode +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) The mode of how the DDR5 ECS counts the errors. + 0 - ECS counts rows with errors. + 1 - ECS counts codewords with errors. + +What: /sys/class/scrub/scrubX/regionY/mode_counts_rows +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current mode of DDR5 ECS region + is counts rows with errors. + +What: /sys/class/scrub/scrubX/regionY/mode_counts_codewords +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current mode of DDR5 ECS region + is counts codewords with errors. + +What: /sys/class/scrub/scrubX/regionY/reset_counter +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (WO) DDR5 ECS reset ECC counter. + 0 - normal, ECC counter running actively. + 1 - reset ECC counter to the default value. + +What: /sys/class/scrub/scrubX/regionY/threshold +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) DDR5 ECS threshold count per GB of memory cells. + +What: /sys/class/scrub/scrubX/regionY/threshold_available +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Supported list of DDR5 ECS threshold count per GB of + memory cells. -- 2.34.1