From patchwork Wed Nov 2 07:06:54 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sai Krishna Potthuri X-Patchwork-Id: 14046 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp3455833wru; Wed, 2 Nov 2022 00:17:45 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4i3Xl4MFHTDGz7r+Rmwbj7JgyH62A/Ls42Y1D5QxYkIf8KXB+JcfUcrgo2tJm+6X45ERbX X-Received: by 2002:a17:906:dac9:b0:780:ab6f:591f with SMTP id xi9-20020a170906dac900b00780ab6f591fmr22379227ejb.77.1667373465293; Wed, 02 Nov 2022 00:17:45 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1667373465; cv=pass; d=google.com; s=arc-20160816; b=Tl7ACWRS07f7hQNHFpT22ZRbZkiOMz2OdIT3SrhwbLkOIPB+Do2/0YIWfkW9x9UBsG wvIEG60C1OD3MbtELDnB7AlCvt9G8HXmVho5pK+AHHh690qXIIT8l8NygIuC5xp5w6LC 5f9IZnJTegRwYxKozdB0mtLoiq1Ibko2QyCD83Gfy7mN0WsLXZrBNtOJUpOYwlzOTr+S 98zE2OhdOa6L6oH/YFrBcUuimSQml5QX7TfBFnB006+KvfnQnbUZ/Yn1Y5qn9yTLuoA/ /G5k+K3hvKETybDewvP9iAMGTuzePQjXjlhMUqR/vtK2Y0zfyr6i/qRofDo0OxspUgGr /TvQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+cQZZHGFdUxQAb3p5W87JKk65WI76ShWMAeOXr06COc=; b=OA0J9u2ELIl7nzz6VxOLW2egadQCEj0k5hZg5jhITzA92M4RVa17H/ZuJP/U+g1MBG BluL9MMksAiD9RlU+uUh/11RvBB6ucKC2tGQLHhdksYZWlAj7m+VzWpPIMsEDNpbkpIF k3AyzHf6UaUF1DgbPCQ+Wp4nb0cYDTTcMy4RjtGX5ZB4iH6OFqFeRdxaafnCTr5u3EW9 HBzaQQKgPH2rLioMa6LlaZbcrVxDUiPpXOyqnr52rTBQ0YolXurZsWwLFPhfvNnen+BD GFh8ac7GVWbkoJ7eAD5gImIKpl07DU8XV8mGyMl9PGM5DKkQ/LEYTtX1fU7IgUJQPLq3 BNEQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=wiC31a6g; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id la14-20020a170907780e00b007aa493b067asi12417053ejc.396.2022.11.02.00.17.21; Wed, 02 Nov 2022 00:17:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=wiC31a6g; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230256AbiKBHHk (ORCPT + 99 others); Wed, 2 Nov 2022 03:07:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230224AbiKBHHb (ORCPT ); Wed, 2 Nov 2022 03:07:31 -0400 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2057.outbound.protection.outlook.com [40.107.243.57]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 901C2201B6; Wed, 2 Nov 2022 00:07:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FcSUqMvPioOxoNdb+w++u/gr4A7XqQi0NapV/E12v10Tb+rvdRt+7Tg22V73KRDWnId86y+N1/ABrXWDsOT/fYnBYlDIByM2NKToH/+cNmOLTi7w/V5dwcdZy20ieQDMrSuMi8GyQvFwt9vHls2yP2mrbnToqtUW57YyMbs18p2SmzX9CwMTijmeoMEmkLqTWmdSqKd4bQ0ZX5mwBJiYVpzljr6w/Y3XD/9IoZJTOtsDGlsKIDa/VxPvfVHBs1NGx+gj/n/rvdMoV4tYCLJATXyXkiQq6sUhykVnea3+dlAceb+Mt/bn69XE+QgoTUi8jY1oF/5yh3yCjteY+zwO7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+cQZZHGFdUxQAb3p5W87JKk65WI76ShWMAeOXr06COc=; b=hf8URk7hg4N4GHe93ou75Vxht+c+tOWJIDnQnr2zhIj84gJrtt4tb0jjStOoUx8VlYWmHdIoVcl+aTPNbfmXPU+lNDBYX4GId/OZf+m/mM5QvNhHQMKEdsLv7KUGTi9+pqwT/Tz2MJvCXvyXsP91ACEyKYs1dfa2L1MwLbOOFOhCc81iUAkZYNAQic2PKfgupUHtYpSGLTbwYz17zCnx1M7vNHDr9ZRkXSy47qnglE+S9j+EvMvP2qwYho/ekVx3ZiyMz2icLJno7B5C9KY6wpxoKaKm4dOZQ8gKgt+AsGxm9U+iVC3ojHYzKZu5TKH6/ANSNwO5ppK0hbXUp/+KQw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+cQZZHGFdUxQAb3p5W87JKk65WI76ShWMAeOXr06COc=; b=wiC31a6gAZwZXkUAcdhhEiq9dR1Vq6xFW++jM0nY8Vbl090mdxSZCksSj6L74ZXa3OLiV129Cr1lUzsEuIvo0aS2Ek2z/fuu/Kh1pN2QGJC1vy0jhnebdbms3zZg58ViMhctx8+B6ylaqsEboc3ZFrP9kebVqeJMCM5U/DRTRXI= Received: from DM6PR11CA0004.namprd11.prod.outlook.com (2603:10b6:5:190::17) by BL1PR12MB5159.namprd12.prod.outlook.com (2603:10b6:208:318::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5791.20; Wed, 2 Nov 2022 07:07:21 +0000 Received: from DM6NAM11FT100.eop-nam11.prod.protection.outlook.com (2603:10b6:5:190:cafe::76) by DM6PR11CA0004.outlook.office365.com (2603:10b6:5:190::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.21 via Frontend Transport; Wed, 2 Nov 2022 07:07:21 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT100.mail.protection.outlook.com (10.13.172.247) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5791.20 via Frontend Transport; Wed, 2 Nov 2022 07:07:21 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 2 Nov 2022 02:07:20 -0500 Received: from xhdlakshmis40.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.31 via Frontend Transport; Wed, 2 Nov 2022 02:07:16 -0500 From: Sai Krishna Potthuri To: Rob Herring , Krzysztof Kozlowski , Michal Simek , Borislav Petkov , Mauro Carvalho Chehab , Tony Luck , James Morse , "Robert Richter" CC: , , , , , , Shubhrajyoti Datta , Sai Krishna Potthuri , Krzysztof Kozlowski Subject: [PATCH v6 1/2] dt-bindings: edac: Add bindings for Xilinx ZynqMP OCM Date: Wed, 2 Nov 2022 12:36:54 +0530 Message-ID: <20221102070655.247511-2-sai.krishna.potthuri@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221102070655.247511-1-sai.krishna.potthuri@amd.com> References: <20221102070655.247511-1-sai.krishna.potthuri@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT100:EE_|BL1PR12MB5159:EE_ X-MS-Office365-Filtering-Correlation-Id: ba35b177-0288-4a8f-7c53-08dabca0e2c2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(376002)(136003)(396003)(346002)(39860400002)(451199015)(40470700004)(46966006)(36840700001)(7416002)(8936002)(4326008)(5660300002)(8676002)(70586007)(70206006)(2906002)(966005)(54906003)(41300700001)(110136005)(40480700001)(103116003)(316002)(81166007)(83380400001)(356005)(478600001)(36860700001)(82740400003)(6666004)(86362001)(186003)(336012)(1076003)(426003)(47076005)(26005)(2616005)(40460700003)(82310400005)(36756003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Nov 2022 07:07:21.0751 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ba35b177-0288-4a8f-7c53-08dabca0e2c2 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT100.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR12MB5159 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748367798729437173?= X-GMAIL-MSGID: =?utf-8?q?1748367798729437173?= From: Shubhrajyoti Datta Add bindings for Xilinx ZynqMP OCM controller. Signed-off-by: Shubhrajyoti Datta Co-developed-by: Sai Krishna Potthuri Signed-off-by: Sai Krishna Potthuri Reviewed-by: Krzysztof Kozlowski --- .../xlnx,zynqmp-ocmc-1.0.yaml | 45 +++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 Documentation/devicetree/bindings/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml diff --git a/Documentation/devicetree/bindings/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml b/Documentation/devicetree/bindings/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml new file mode 100644 index 000000000000..ca9fc747bf4f --- /dev/null +++ b/Documentation/devicetree/bindings/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml @@ -0,0 +1,45 @@ +# SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Xilinx Zynqmp OCM(On-Chip Memory) Controller + +maintainers: + - Shubhrajyoti Datta + - Sai Krishna Potthuri + +description: | + The OCM supports 64-bit wide ECC functionality to detect multi-bit errors + and recover from a single-bit memory fault.On a write, if all bytes are + being written, the ECC is generated and written into the ECC RAM along with + the write-data that is written into the data RAM. If one or more bytes are + not written, then the read operation results in an correctable error or + uncorrectable error. + +properties: + compatible: + const: xlnx,zynqmp-ocmc-1.0 + + reg: + maxItems: 1 + + interrupts: + maxItems: 1 + +required: + - compatible + - reg + - interrupts + +additionalProperties: false + +examples: + - | + #include + memory-controller@ff960000 { + compatible = "xlnx,zynqmp-ocmc-1.0"; + reg = <0xff960000 0x1000>; + interrupts = ; + }; From patchwork Wed Nov 2 07:06:55 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sai Krishna Potthuri X-Patchwork-Id: 14051 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp3468518wru; Wed, 2 Nov 2022 00:49:26 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4NygD/k8gB91UgBQ3ugp/RRrR56Da8SY+NxCx4Mp501bb/MgiPORFnabik3u0PwZop6nAj X-Received: by 2002:a17:906:c08c:b0:78d:b8ce:c28f with SMTP id f12-20020a170906c08c00b0078db8cec28fmr21861588ejz.437.1667375365931; Wed, 02 Nov 2022 00:49:25 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1667375365; cv=pass; d=google.com; s=arc-20160816; b=PoehWfORqBFYVeWEQCo1CDjHArWycSo/TAWdvE3mObLP07i/TNyLbx9pfoH7ZhijcU 9QGJL9GJe+s4YiOO8S0LM4bwhUPVWGvMt6IgsR0RZbSG/Y/r+hVB/Y7JXjXiUcBupgB9 YoSlCSqdrCPTk6ThdGXxYf0w38ZtP6g0tiro+Wh7QFeuaGOZvLEbWobp6xQ/z2PYLaIZ s+sGiTR4rndivyJIbkoFuE3ekEbMciERW1Agd4MIQLxnxVNpsWCCs86JfVL4H+sOWFyx uGVpP68OfsxjUh7+EbJ9RHzOMZO4QrGgIjX7KvjZTLGHmMWDBHX0HhNJGB78Fesr2gAR zdoQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=LrjsBwb9Xy1XwKgKiZP8f3hI5pXtVyhWJHMHCzSWytk=; b=P90LSdLkumC6sc9Uny/asMC7opznWrdMfznb9Bs4xSD1RUUc297gzZoxu0UAbRl0ek i9vzdLZ4iGQttxAmZinylHla5YEuX2p+Hvs9gzQLd59TXQQNq/FbOewSCclK7m24YRCp 8a38xMO//APAMAb8A5trsuWW98dsGY6ku3nuSSz0PnYSNXOsL3u5SuF+EweHca1uOfe+ SawegUbPRVnm7yOzIbU6VC9i8CPIHut8GiW/Fl6e5CrgwxUVP1EmAz0O8YrRWtfvo+nw e4c8bafwk0V+nq/l4lMMCOUFXWkWc0cDCZ6aetUljYz4eKpDVV7BlppYVsnzzFYWQ0Fx kHWQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=xqufzR8Q; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l10-20020a170906794a00b0078849a014e9si17595316ejo.196.2022.11.02.00.49.02; Wed, 02 Nov 2022 00:49:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=xqufzR8Q; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230186AbiKBHIE (ORCPT + 99 others); Wed, 2 Nov 2022 03:08:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230210AbiKBHH6 (ORCPT ); Wed, 2 Nov 2022 03:07:58 -0400 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2082.outbound.protection.outlook.com [40.107.220.82]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0EC87205C4; Wed, 2 Nov 2022 00:07:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jm6S6ZoEfSYaiolhaXdo26tQjNu2uv+RZuGo0tpdbcdWu7NPZNKHIaCmyOrCum9nwJsP0O/+SK0bkL17/rjz48R67krMAbJ6w8VdmLwz17TsdC3ebDHuwXhidxBrkXnbdeaWfvQ4kJlmpY1fANJOAItBt2EyxN9LCQbMG7w7sTtp2AZHaLAl249XdU5XxN2VGk2tbA7S5hU5GjD76/AaAgYSSXPau01C/MWjzS0TBie4/zFnR0TZNhlqh0WlTcgDXOFRaVMXPgP2SnE1NB+xbWb6PrECjp/F5Gubm8UcW757qG1nDNFwf5f4EKDsBZ8aDL8hmN6r0qkRpHdTvkdyjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LrjsBwb9Xy1XwKgKiZP8f3hI5pXtVyhWJHMHCzSWytk=; b=QiMEY5YWsQhiplTKcYaA9mB1un/ONr+9ZSDWimgBAdeiNHqSYrtbJkStEN5XC1cagU3E6UQlQ44o/IB0Phx8MAys8GkDqWpCKAHDhUJSAR8+Nkasi59u1lRuYKfaAH72rOWogaN4aG46CAvvBK7jOd2Zt5hQbmPbRl1o3hxSyPSV3skBFLAcig50qerD0uoHaYAmEVN/R/q+GW3x2Vc8hmtAr4PfVlXiSWVIAYgTPaDJNV6iiuTeBd4qWudccZ5njuOIbSYrKZVehheszicGTgwp5DbxJ+nPC/KWdnXAd7+p4SoeM1ewOkwNL+XJWddMzlWezBxhrXrMw5kzsu//Ow== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LrjsBwb9Xy1XwKgKiZP8f3hI5pXtVyhWJHMHCzSWytk=; b=xqufzR8QVJ6CeUiAMQn5QX/8Ez/fedmUp0fOufrNxFnajWBfrL1mXFD/52pqbS9NkAYV3LF4B76rL/FamgIPnLQNbaMZBp2gn97J2/xOA6ZvJTJWtxGbj5qosVpOZcGTc4qZeJgTS4BZxGat3TKZH3DVMBzFuYIntwoTMj+zxbg= Received: from DS7PR03CA0006.namprd03.prod.outlook.com (2603:10b6:5:3b8::11) by CY5PR12MB6057.namprd12.prod.outlook.com (2603:10b6:930:2e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.21; Wed, 2 Nov 2022 07:07:50 +0000 Received: from DM6NAM11FT054.eop-nam11.prod.protection.outlook.com (2603:10b6:5:3b8:cafe::53) by DS7PR03CA0006.outlook.office365.com (2603:10b6:5:3b8::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.21 via Frontend Transport; Wed, 2 Nov 2022 07:07:50 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT054.mail.protection.outlook.com (10.13.173.95) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5791.20 via Frontend Transport; Wed, 2 Nov 2022 07:07:50 +0000 Received: from SATLEXMB08.amd.com (10.181.40.132) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 2 Nov 2022 02:07:50 -0500 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB08.amd.com (10.181.40.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 2 Nov 2022 00:07:24 -0700 Received: from xhdlakshmis40.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.31 via Frontend Transport; Wed, 2 Nov 2022 02:07:20 -0500 From: Sai Krishna Potthuri To: Rob Herring , Krzysztof Kozlowski , Michal Simek , Borislav Petkov , Mauro Carvalho Chehab , Tony Luck , James Morse , "Robert Richter" CC: , , , , , , Sai Krishna Potthuri , Shubhrajyoti Datta , kernel test robot Subject: [PATCH v6 2/2] EDAC/zynqmp: Add EDAC support for Xilinx ZynqMP OCM Date: Wed, 2 Nov 2022 12:36:55 +0530 Message-ID: <20221102070655.247511-3-sai.krishna.potthuri@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221102070655.247511-1-sai.krishna.potthuri@amd.com> References: <20221102070655.247511-1-sai.krishna.potthuri@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT054:EE_|CY5PR12MB6057:EE_ X-MS-Office365-Filtering-Correlation-Id: 1b748474-1be3-4b28-452b-08dabca0f429 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(39860400002)(346002)(376002)(396003)(136003)(451199015)(36840700001)(46966006)(40470700004)(7416002)(70206006)(6666004)(70586007)(110136005)(316002)(54906003)(8676002)(2616005)(4326008)(41300700001)(26005)(30864003)(5660300002)(1076003)(186003)(8936002)(2906002)(336012)(82310400005)(36756003)(426003)(47076005)(82740400003)(81166007)(356005)(478600001)(83380400001)(40460700003)(40480700001)(103116003)(86362001)(36860700001)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Nov 2022 07:07:50.2699 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1b748474-1be3-4b28-452b-08dabca0f429 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT054.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR12MB6057 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748369791452281760?= X-GMAIL-MSGID: =?utf-8?q?1748369791452281760?= Add EDAC support for Xilinx ZynqMP OCM Controller, this driver reports CE and UE errors upon interrupt generation, and also creates UE/CE debugfs entries for error injection when EDAC_DEBUG config is enabled. Co-developed-by: Shubhrajyoti Datta Signed-off-by: Shubhrajyoti Datta Signed-off-by: Sai Krishna Potthuri Reported-by: kernel test robot --- MAINTAINERS | 7 + drivers/edac/Kconfig | 9 + drivers/edac/Makefile | 1 + drivers/edac/zynqmp_ocm_edac.c | 485 +++++++++++++++++++++++++++++++++ 4 files changed, 502 insertions(+) create mode 100644 drivers/edac/zynqmp_ocm_edac.c diff --git a/MAINTAINERS b/MAINTAINERS index edc96cdb85e8..7a40caf536c2 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -21692,6 +21692,13 @@ F: Documentation/devicetree/bindings/dma/xilinx/xlnx,zynqmp-dpdma.yaml F: drivers/dma/xilinx/xilinx_dpdma.c F: include/dt-bindings/dma/xlnx-zynqmp-dpdma.h +XILINX ZYNQMP OCM EDAC DRIVER +M: Shubhrajyoti Datta +M: Sai Krishna Potthuri +S: Maintained +F: Documentation/devicetree/bindings/memory-controllers/xlnx,zynqmp-ocmc-1.0.yaml +F: drivers/edac/zynqmp_ocm_edac.c + XILINX ZYNQMP PSGTR PHY DRIVER M: Anurag Kumar Vulisha M: Laurent Pinchart diff --git a/drivers/edac/Kconfig b/drivers/edac/Kconfig index 58ab63642e72..bc30b7d02062 100644 --- a/drivers/edac/Kconfig +++ b/drivers/edac/Kconfig @@ -539,4 +539,13 @@ config EDAC_DMC520 Support for error detection and correction on the SoCs with ARM DMC-520 DRAM controller. +config EDAC_ZYNQMP_OCM + tristate "Xilinx ZynqMP OCM Controller" + depends on ARCH_ZYNQMP || COMPILE_TEST + help + This driver is targeted for Xilinx ZynqMP OCM (On Chip Memory) + controller to support for error detection and correction. + This driver can also be built as a module. If so, the module + will be called zynqmp_ocm_edac. + endif # EDAC diff --git a/drivers/edac/Makefile b/drivers/edac/Makefile index 2d1641a27a28..634c1cec1588 100644 --- a/drivers/edac/Makefile +++ b/drivers/edac/Makefile @@ -84,3 +84,4 @@ obj-$(CONFIG_EDAC_QCOM) += qcom_edac.o obj-$(CONFIG_EDAC_ASPEED) += aspeed_edac.o obj-$(CONFIG_EDAC_BLUEFIELD) += bluefield_edac.o obj-$(CONFIG_EDAC_DMC520) += dmc520_edac.o +obj-$(CONFIG_EDAC_ZYNQMP_OCM) += zynqmp_ocm_edac.o diff --git a/drivers/edac/zynqmp_ocm_edac.c b/drivers/edac/zynqmp_ocm_edac.c new file mode 100644 index 000000000000..32f025b72380 --- /dev/null +++ b/drivers/edac/zynqmp_ocm_edac.c @@ -0,0 +1,485 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Xilinx ZynqMP OCM ECC Driver + * + * Copyright (C) 2022 Advanced Micro Devices, Inc. + */ + +#include +#include +#include +#include +#include +#include + +#include "edac_module.h" + +#define ZYNQMP_OCM_EDAC_MSG_SIZE 256 + +#define ZYNQMP_OCM_EDAC_STRING "zynqmp_ocm" + +/* Controller registers */ +#define CTRL_OFST 0x0 +#define OCM_ISR_OFST 0x04 +#define OCM_IMR_OFST 0x08 +#define OCM_IEN_OFST 0x0C +#define OCM_IDS_OFST 0x10 + +/* ECC control register */ +#define ECC_CTRL_OFST 0x14 + +/* Correctable error info registers */ +#define CE_FFA_OFST 0x1C +#define CE_FFD0_OFST 0x20 +#define CE_FFD1_OFST 0x24 +#define CE_FFD2_OFST 0x28 +#define CE_FFD3_OFST 0x2C +#define CE_FFE_OFST 0x30 + +/* Uncorrectable error info registers */ +#define UE_FFA_OFST 0x34 +#define UE_FFD0_OFST 0x38 +#define UE_FFD1_OFST 0x3C +#define UE_FFD2_OFST 0x40 +#define UE_FFD3_OFST 0x44 +#define UE_FFE_OFST 0x48 + +/* ECC control register bit field definitions */ +#define ECC_CTRL_CLR_CE_ERR 0x40 +#define ECC_CTRL_CLR_UE_ERR 0x80 + +/* Fault injection data and count registers */ +#define OCM_FID0_OFST 0x4C +#define OCM_FID1_OFST 0x50 +#define OCM_FID2_OFST 0x54 +#define OCM_FID3_OFST 0x58 +#define OCM_FIC_OFST 0x74 + +#define UE_MAX_BITPOS_LOWER 31 +#define UE_MIN_BITPOS_UPPER 32 +#define UE_MAX_BITPOS_UPPER 63 + +/* Interrupt masks */ +#define OCM_CEINTR_MASK BIT(6) +#define OCM_UEINTR_MASK BIT(7) +#define OCM_ECC_ENABLE_MASK BIT(0) +#define OCM_CEUE_MASK GENMASK(7, 6) + +#define OCM_FICOUNT_MASK GENMASK(23, 0) +#define OCM_NUM_UE_BITPOS 2 +#define OCM_BASEVAL 0xFFFC0000 +#define EDAC_DEVICE "ZynqMP-OCM" + +/** + * struct ecc_error_info - ECC error log information + * @addr: Fault generated at this address + * @data0: Generated fault data (lower 32-bit) + * @data1: Generated fault data (upper 32-bit) + */ +struct ecc_error_info { + u32 addr; + u32 data0; + u32 data1; +}; + +/** + * struct ecc_status - ECC status information to report + * @ce_cnt: Correctable error count + * @ue_cnt: Uncorrectable error count + * @ceinfo: Correctable error log information + * @ueinfo: Uncorrectable error log information + */ +struct ecc_status { + u32 ce_cnt; + u32 ue_cnt; + struct ecc_error_info ceinfo; + struct ecc_error_info ueinfo; +}; + +/** + * struct edac_priv - OCM controller private instance data + * @baseaddr: Base address of the OCM controller + * @message: Buffer for framing the event specific info + * @stat: ECC status information + * @ce_cnt: Correctable Error count + * @ue_cnt: Uncorrectable Error count + * @debugfs_dir: Directory entry for debugfs + * @ce_bitpos: Bit position for Correctable Error + * @ue_bitpos: Array to store UnCorrectable Error bit positions + * @fault_injection_cnt: Fault Injection Counter value + */ +struct edac_priv { + void __iomem *baseaddr; + char message[ZYNQMP_OCM_EDAC_MSG_SIZE]; + struct ecc_status stat; + u32 ce_cnt; + u32 ue_cnt; +#ifdef CONFIG_EDAC_DEBUG + struct dentry *debugfs_dir; + u8 ce_bitpos; + u8 ue_bitpos[OCM_NUM_UE_BITPOS]; + u32 fault_injection_cnt; +#endif +}; + +/** + * get_error_info - Get the current ECC error info + * @base: Pointer to the base address of the OCM memory controller + * @p: Pointer to the OCM ECC status structure + * @mask: Status register mask value + * + * Determines there is any ECC error or not + * + */ +static void get_error_info(void __iomem *base, struct ecc_status *p, int mask) +{ + if (mask & OCM_CEINTR_MASK) { + p->ce_cnt++; + p->ceinfo.data0 = readl(base + CE_FFD0_OFST); + p->ceinfo.data1 = readl(base + CE_FFD1_OFST); + p->ceinfo.addr = (OCM_BASEVAL | readl(base + CE_FFA_OFST)); + writel(ECC_CTRL_CLR_CE_ERR, base + OCM_ISR_OFST); + } else { + p->ue_cnt++; + p->ueinfo.data0 = readl(base + UE_FFD0_OFST); + p->ueinfo.data1 = readl(base + UE_FFD1_OFST); + p->ueinfo.addr = (OCM_BASEVAL | readl(base + UE_FFA_OFST)); + writel(ECC_CTRL_CLR_UE_ERR, base + OCM_ISR_OFST); + } +} + +/** + * handle_error - Handle controller error types CE and UE + * @dci: Pointer to the EDAC device controller instance + * @p: Pointer to the OCM ECC status structure + * + * Handles the controller ECC correctable and uncorrectable error. + */ +static void handle_error(struct edac_device_ctl_info *dci, struct ecc_status *p) +{ + struct edac_priv *priv = dci->pvt_info; + struct ecc_error_info *pinf; + + if (p->ce_cnt) { + pinf = &p->ceinfo; + snprintf(priv->message, ZYNQMP_OCM_EDAC_MSG_SIZE, + "\nOCM ECC error type :%s\nAddr: [0x%x]\nFault Data[0x%08x%08x]", + "CE", pinf->addr, pinf->data1, pinf->data0); + edac_device_handle_ce(dci, 0, 0, priv->message); + } + + if (p->ue_cnt) { + pinf = &p->ueinfo; + snprintf(priv->message, ZYNQMP_OCM_EDAC_MSG_SIZE, + "\nOCM ECC error type :%s\nAddr: [0x%x]\nFault Data[0x%08x%08x]", + "UE", pinf->addr, pinf->data1, pinf->data0); + edac_device_handle_ue(dci, 0, 0, priv->message); + } + + memset(p, 0, sizeof(*p)); +} + +/** + * intr_handler - ISR routine + * @irq: irq number + * @dev_id: device id pointer + * + * Return: IRQ_NONE, if interrupt not set or IRQ_HANDLED otherwise + */ +static irqreturn_t intr_handler(int irq, void *dev_id) +{ + struct edac_device_ctl_info *dci = dev_id; + struct edac_priv *priv = dci->pvt_info; + int regval; + + regval = readl(priv->baseaddr + OCM_ISR_OFST); + if (!(regval & OCM_CEUE_MASK)) + return IRQ_NONE; + + get_error_info(priv->baseaddr, &priv->stat, regval); + + priv->ce_cnt += priv->stat.ce_cnt; + priv->ue_cnt += priv->stat.ue_cnt; + handle_error(dci, &priv->stat); + + return IRQ_HANDLED; +} + +/** + * get_eccstate - Return the controller ECC status + * @base: Pointer to the OCM memory controller base address + * + * Get the ECC enable/disable status for the controller + * + * Return: ECC status 0/1. + */ +static bool get_eccstate(void __iomem *base) +{ + return readl(base + ECC_CTRL_OFST) & OCM_ECC_ENABLE_MASK; +} + +#ifdef CONFIG_EDAC_DEBUG +/** + * inject_fault_count - write fault injection count + * @priv: Pointer to the EDAC private struct + * + * Update the fault injection count register, once the counter reaches + * zero, it injects errors + */ +static void inject_fault_count(struct edac_priv *priv) +{ + u32 ficount = priv->fault_injection_cnt; + + ficount &= OCM_FICOUNT_MASK; + if (ficount != priv->fault_injection_cnt) + edac_printk(KERN_INFO, EDAC_DEVICE, + "Value truncated to 24-bits\n"); + + writel(ficount, priv->baseaddr + OCM_FIC_OFST); +} + +/** + * inject_cebitpos - Set CE bit position + * @priv: Pointer to the EDAC private struct + * + * Set any one bit to inject CE error + */ +static void inject_cebitpos(struct edac_priv *priv) +{ + if (priv->ce_bitpos <= UE_MAX_BITPOS_LOWER) { + writel(BIT(priv->ce_bitpos), priv->baseaddr + OCM_FID0_OFST); + writel(0, priv->baseaddr + OCM_FID1_OFST); + } else { + writel(BIT(priv->ce_bitpos - UE_MIN_BITPOS_UPPER), + priv->baseaddr + OCM_FID1_OFST); + writel(0, priv->baseaddr + OCM_FID0_OFST); + } +} + +/** + * inject_uebitpos - set UE bit position0 + * @priv: Pointer to the EDAC private struct + * + * Set the first and second bit positions for UE Error generation + * Return: 0 on success else error code. + */ +static ssize_t inject_uebitpos(struct edac_priv *priv) +{ + u64 ue_bitpos = BIT(priv->ue_bitpos[0]) | BIT(priv->ue_bitpos[1]); + + if (priv->ue_bitpos[0] == priv->ue_bitpos[1]) { + edac_printk(KERN_ERR, EDAC_DEVICE, + "Bit positions should not be equal\n"); + return -EINVAL; + } + + if (priv->ue_bitpos[0] > UE_MAX_BITPOS_UPPER || + priv->ue_bitpos[1] > UE_MAX_BITPOS_UPPER) + return -EINVAL; + + writel((u32)ue_bitpos, priv->baseaddr + OCM_FID0_OFST); + writel((u32)(ue_bitpos >> 32), priv->baseaddr + OCM_FID1_OFST); + + return 0; +} + +static ssize_t inject_ce_write(struct file *file, const char __user *data, + size_t count, loff_t *ppos) +{ + struct edac_device_ctl_info *edac_dev = file->private_data; + struct edac_priv *priv = edac_dev->pvt_info; + int ret; + + if (!data) + return -EFAULT; + + ret = kstrtou8_from_user(data, count, 0, &priv->ce_bitpos); + if (ret) + return ret; + + if (priv->ce_bitpos > UE_MAX_BITPOS_UPPER) + return -EINVAL; + + inject_fault_count(priv); + inject_cebitpos(priv); + + return count; +} + +static const struct file_operations inject_ce_fops = { + .open = simple_open, + .write = inject_ce_write, + .llseek = generic_file_llseek, +}; + +static ssize_t inject_ue_write(struct file *file, const char __user *data, + size_t count, loff_t *ppos) +{ + struct edac_device_ctl_info *edac_dev = file->private_data; + struct edac_priv *priv = edac_dev->pvt_info; + char buf[6]; + u8 pos0, pos1, len; + int ret; + + if (!data) + return -EFAULT; + + len = min_t(size_t, count, sizeof(buf)); + if (copy_from_user(buf, data, len)) + return -EFAULT; + + for (pos0 = 0; buf[pos0] != ' ' && pos0 <= len; pos0++) + ; + + if (pos0 > len) + return -EINVAL; + + ret = kstrtou8_from_user(data, pos0, 0, &priv->ue_bitpos[0]); + if (ret) + return ret; + + for (pos1 = pos0 + 1; buf[pos1] != '\n' && pos1 <= len; pos1++) + ; + + if (pos1 > count) + return -EINVAL; + + ret = kstrtou8_from_user(&data[pos0 + 1], pos1 - pos0 - 1, 0, + &priv->ue_bitpos[1]); + if (ret) + return ret; + + inject_fault_count(priv); + ret = inject_uebitpos(priv); + if (ret) + return ret; + + return count; +} + +static const struct file_operations inject_ue_fops = { + .open = simple_open, + .write = inject_ue_write, + .llseek = generic_file_llseek, +}; + +static void setup_debugfs(struct edac_device_ctl_info *edac_dev) +{ + struct edac_priv *priv = edac_dev->pvt_info; + + priv->debugfs_dir = edac_debugfs_create_dir(edac_dev->dev_name); + if (!priv->debugfs_dir) + return; + + edac_debugfs_create_x32("inject_fault_count", 0644, priv->debugfs_dir, + &priv->fault_injection_cnt); + edac_debugfs_create_file("inject_ue_bitpos", 0644, priv->debugfs_dir, + edac_dev, &inject_ue_fops); + edac_debugfs_create_file("inject_ce_bitpos", 0644, priv->debugfs_dir, + edac_dev, &inject_ce_fops); +} +#endif + +static int edac_probe(struct platform_device *pdev) +{ + struct edac_priv *priv; + struct edac_device_ctl_info *dci; + void __iomem *baseaddr; + struct resource *res; + int irq, ret; + + baseaddr = devm_platform_get_and_ioremap_resource(pdev, 0, &res); + if (IS_ERR(baseaddr)) + return PTR_ERR(baseaddr); + + if (!get_eccstate(baseaddr)) { + edac_printk(KERN_INFO, EDAC_DEVICE, + "ECC not enabled\n"); + return -ENXIO; + } + + dci = edac_device_alloc_ctl_info(sizeof(*priv), ZYNQMP_OCM_EDAC_STRING, + 1, ZYNQMP_OCM_EDAC_STRING, 1, 0, NULL, 0, + edac_device_alloc_index()); + if (!dci) + return -ENOMEM; + + priv = dci->pvt_info; + platform_set_drvdata(pdev, dci); + dci->dev = &pdev->dev; + priv->baseaddr = baseaddr; + dci->mod_name = pdev->dev.driver->name; + dci->ctl_name = ZYNQMP_OCM_EDAC_STRING; + dci->dev_name = dev_name(&pdev->dev); + + irq = platform_get_irq(pdev, 0); + if (irq < 0) { + ret = irq; + goto free_dev_ctl; + } + + ret = devm_request_irq(&pdev->dev, irq, intr_handler, 0, + dev_name(&pdev->dev), dci); + if (ret) { + edac_printk(KERN_ERR, EDAC_DEVICE, "Failed to request Irq\n"); + goto free_dev_ctl; + } + + /* Enable UE, CE interrupts */ + writel(OCM_CEUE_MASK, priv->baseaddr + OCM_IEN_OFST); + +#ifdef CONFIG_EDAC_DEBUG + setup_debugfs(dci); +#endif + + ret = edac_device_add_device(dci); + if (ret) + goto free_dev_ctl; + + return 0; + +free_dev_ctl: + edac_device_free_ctl_info(dci); + + return ret; +} + +static int edac_remove(struct platform_device *pdev) +{ + struct edac_device_ctl_info *dci = platform_get_drvdata(pdev); + struct edac_priv *priv = dci->pvt_info; + + /* Disable UE, CE interrupts */ + writel(OCM_CEUE_MASK, priv->baseaddr + OCM_IDS_OFST); + +#ifdef CONFIG_EDAC_DEBUG + debugfs_remove_recursive(priv->debugfs_dir); +#endif + + edac_device_del_device(&pdev->dev); + edac_device_free_ctl_info(dci); + + return 0; +} + +static const struct of_device_id zynqmp_ocm_edac_match[] = { + { .compatible = "xlnx,zynqmp-ocmc-1.0"}, + { /* end of table */ } +}; + +MODULE_DEVICE_TABLE(of, zynqmp_ocm_edac_match); + +static struct platform_driver zynqmp_ocm_edac_driver = { + .driver = { + .name = "zynqmp-ocm-edac", + .of_match_table = zynqmp_ocm_edac_match, + }, + .probe = edac_probe, + .remove = edac_remove, +}; + +module_platform_driver(zynqmp_ocm_edac_driver); + +MODULE_AUTHOR("Advanced Micro Devices, Inc"); +MODULE_DESCRIPTION("Xilinx ZynqMP OCM ECC driver"); +MODULE_LICENSE("GPL");