From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8730FC4167B for ; Thu, 30 Nov 2023 19:23:58 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 2787E6B0488; Thu, 30 Nov 2023 14:23:41 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 200FF6B048A; Thu, 30 Nov 2023 14:23:41 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0C8CA6B048C; Thu, 30 Nov 2023 14:23:41 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id EE3126B0488 for ; Thu, 30 Nov 2023 14:23:40 -0500 (EST) Received: from smtpin28.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id BB1C5120205 for ; Thu, 30 Nov 2023 19:23:40 +0000 (UTC) X-FDA: 81515595000.28.DE26996 Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) by imf07.hostedemail.com (Postfix) with ESMTP id 9BC8F40021 for ; Thu, 30 Nov 2023 19:23:38 +0000 (UTC) Authentication-Results: imf07.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf07.hostedemail.com: domain of shiju.jose@huawei.com designates 185.176.79.56 as permitted sender) smtp.mailfrom=shiju.jose@huawei.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1701372218; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Z27BEXRvCJZcO/Tne7qruymc0blLlh2296KWo+kmoQ8=; b=6S3iulw+Hr28XqhGntlGjtaZpFd9xDqOvqqXLBQ8CsGkHmY1NwDBmPcna29mUAj+hWwnzW 4s+vEGfaZ/9KrWbqHDWzSxgl4NN/9kTVf6BYcKCs6nruA8uw1fv0YzblFKh8vXWS+jJAWC m/0zlPOjh4OeLV5k7PgAWwRJTSv7lis= ARC-Authentication-Results: i=1; imf07.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf07.hostedemail.com: domain of shiju.jose@huawei.com designates 185.176.79.56 as permitted sender) smtp.mailfrom=shiju.jose@huawei.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1701372218; a=rsa-sha256; cv=none; b=zZJ547cOOyofyQXoydAcNOw1pJFoVOFlnDxrUzGuTqIuH0EKliCd2l0UIvXxF8ziFr0KMo O/vntKyrtV0kUclXaDxX1gazHyU0s9ahrbWWUxgj6RysWKh7MWasqR1ENnxH86+y0kfOlZ r7yHp/vqZ1oQbKf9gfewM1r5hLI74xk= Received: from mail.maildlp.com (unknown [172.18.186.231]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Sh5h13JSpz6JB68; Fri, 1 Dec 2023 03:23:13 +0800 (CST) Received: from lhrpeml500006.china.huawei.com (unknown [7.191.161.198]) by mail.maildlp.com (Postfix) with ESMTPS id 9A87414058E; Fri, 1 Dec 2023 03:23:36 +0800 (CST) Received: from SecurePC30232.china.huawei.com (10.122.247.234) by lhrpeml500006.china.huawei.com (7.191.161.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 30 Nov 2023 19:23:35 +0000 From: To: , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v4 11/11] cxl: scrub: sysfs: Add Documentation for CXL memory device scrub control attributes Date: Fri, 1 Dec 2023 03:23:13 +0800 Message-ID: <20231130192314.1220-12-shiju.jose@huawei.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20231130192314.1220-1-shiju.jose@huawei.com> References: <20231130192314.1220-1-shiju.jose@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.122.247.234] X-ClientProxiedBy: lhrpeml500004.china.huawei.com (7.191.163.9) To lhrpeml500006.china.huawei.com (7.191.161.198) X-Rspamd-Queue-Id: 9BC8F40021 X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: nnrprturbuz13ts5uiu4b4aog55gwcbg X-HE-Tag: 1701372218-768113 X-HE-Meta: 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 m2JPZJP5 94Yb3WmDB7GunUS6N62lATDXSjQM5rnxQFjCpibHcgCLGXxYBsxr6xdhs18/eIpH5A5pKXXxmoZlnApSebANRltcl9m62y6xuKBmQwOZZo+DV32nq9AiuSws4cjePFaqazdf/IdgLNaiE5lDB7Nsrb8pse3LU9BvR+7ciC5hTIeuV+ezpU/dWJfNxCHJhIeZEY5Ae/4NnSv65UBi0/Dr0bo4wWynR0sHg/bgI X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Shiju Jose Add sysfs documentation for the CXL memory device scrub control attributes those are exposed in /sys/class/scrub/ by the scrub driver. These attributes support user configuring a CXL memory device scrub. Signed-off-by: Shiju Jose --- .../testing/sysfs-class-cxl-scrub-configure | 79 +++++++++++++++++++ 1 file changed, 79 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-class-cxl-scrub-configure diff --git a/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure b/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure new file mode 100644 index 000000000000..3f55522134cd --- /dev/null +++ b/Documentation/ABI/testing/sysfs-class-cxl-scrub-configure @@ -0,0 +1,79 @@ +See `Documentation/ABI/testing/sysfs-class-scrub-configure` for the +documentation of common scrub configure directory layout (/sys/class/scrub/), +including the attributes used for configuring the CXL patrol scrub. +Following are the attributes used for configuring the CXL ECS. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) The log entry type of how the DDR5 ECS log is + reported. + 00b - per DRAM. + 01b - per memory media FRU. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type_per_dram +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current log entry type of DDR5 ECS + region is per DRAM. + +What: /sys/class/scrub/scrubX/regionY/ecs_log_entry_type_per_memory_media +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current log entry type of DDR5 ECS + region is per memory media FRU. + +What: /sys/class/scrub/scrubX/regionY/mode +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) The mode of how the DDR5 ECS counts the errors. + 0 - ECS counts rows with errors. + 1 - ECS counts codewords with errors. + +What: /sys/class/scrub/scrubX/regionY/mode_counts_rows +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current mode of DDR5 ECS region + is counts rows with errors. + +What: /sys/class/scrub/scrubX/regionY/mode_counts_codewords +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Returns true if current mode of DDR5 ECS region + is counts codewords with errors. + +What: /sys/class/scrub/scrubX/regionY/reset_counter +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (WO) DDR5 ECS reset ECC counter. + 0 - normal, ECC counter running actively. + 1 - reset ECC counter to the default value. + +What: /sys/class/scrub/scrubX/regionY/threshold +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RW) DDR5 ECS threshold count per GB of memory cells. + +What: /sys/class/scrub/scrubX/regionY/threshold_available +Date: November 2023 +KernelVersion: 6.8 +Contact: linux-kernel@vger.kernel.org +Description: + (RO) Supported list of DDR5 ECS threshold count per GB of + memory cells. -- 2.34.1