[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230920195720.32047-6-fancer.lancer@gmail.com>
Date: Wed, 20 Sep 2023 22:56:36 +0300
From: Serge Semin <fancer.lancer@...il.com>
To: Michal Simek <michal.simek@....com>,
Alexander Stein <alexander.stein@...tq-group.com>,
Borislav Petkov <bp@...en8.de>,
Tony Luck <tony.luck@...el.com>,
James Morse <james.morse@....com>,
Mauro Carvalho Chehab <mchehab@...nel.org>,
Robert Richter <rric@...nel.org>,
Rob Herring <robh+dt@...nel.org>,
Krzysztof Kozlowski <krzysztof.kozlowski+dt@...aro.org>
Cc: Serge Semin <fancer.lancer@...il.com>,
Punnaiah Choudary Kalluri
<punnaiah.choudary.kalluri@...inx.com>,
Dinh Nguyen <dinguyen@...nel.org>,
Arnd Bergmann <arnd@...db.de>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Rob Herring <robh@...nel.org>,
Krzysztof Kozlowski <krzysztof.kozlowski@...aro.org>,
devicetree@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
linux-edac@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH v4 05/13] EDAC/synopsys: Drop ECC poison address from private data
Since the driver now has the generic Sys/SDRAM address translation
interface there is no need in preserving the poisonous address in the
driver private data especially seeing it is used in the framework of the
DebugFS node anyway. So drop the snps_edac_priv.poison_addr field
and just perform Sys/SDRAM back and forth address translation right in
place of the "inject_data_error" node accessors.
It causes a bit more modifications than a simple field removal. Since the
poisonous address is not preserved now there is no point in having the
snps_data_poison_setup() method so its content can be moved right into the
"inject_data_error" write operation. For the same reason there is no point
in printing the ECCPOISONADDR{0,1} registers content in the
"inject_data_error" read operation. Since the CSRs content is now parsed
anyway print the SDRAM address instead.
Signed-off-by: Serge Semin <fancer.lancer@...il.com>
---
Changelog v4:
- Fix inject_data_error string printing "Rank" word where "Col" is
supposed to be.
---
drivers/edac/synopsys_edac.c | 68 +++++++++++++++++-------------------
1 file changed, 32 insertions(+), 36 deletions(-)
diff --git a/drivers/edac/synopsys_edac.c b/drivers/edac/synopsys_edac.c
index 4ee39d6809cc..90640b2f877a 100644
--- a/drivers/edac/synopsys_edac.c
+++ b/drivers/edac/synopsys_edac.c
@@ -411,7 +411,6 @@ struct snps_ecc_status {
* @reglock: Concurrent CSRs access lock.
* @message: Buffer for framing the event specific info.
* @stat: ECC status information.
- * @poison_addr: Data poison address.
*/
struct snps_edac_priv {
struct snps_ddrc_info info;
@@ -422,9 +421,6 @@ struct snps_edac_priv {
spinlock_t reglock;
char message[SNPS_EDAC_MSG_SIZE];
struct snps_ecc_status stat;
-#ifdef CONFIG_EDAC_DEBUG
- ulong poison_addr;
-#endif
};
/**
@@ -1719,44 +1715,32 @@ static int snps_hif_sdram_map_show(struct seq_file *s, void *data)
DEFINE_SHOW_ATTRIBUTE(snps_hif_sdram_map);
-/**
- * snps_data_poison_setup - Update poison registers.
- * @priv: DDR memory controller private instance data.
- *
- * Update poison registers as per DDR mapping.
- * Return: none.
- */
-static void snps_data_poison_setup(struct snps_edac_priv *priv)
-{
- struct snps_sdram_addr sdram;
- u32 regval;
-
- snps_map_sys_to_sdram(priv, priv->poison_addr, &sdram);
-
- regval = FIELD_PREP(ECC_POISON0_RANK_MASK, sdram.rank) |
- FIELD_PREP(ECC_POISON0_COL_MASK, sdram.col);
- writel(regval, priv->baseaddr + ECC_POISON0_OFST);
-
- regval = FIELD_PREP(ECC_POISON1_BANKGRP_MASK, sdram.bankgrp) |
- FIELD_PREP(ECC_POISON1_BANK_MASK, sdram.bank) |
- FIELD_PREP(ECC_POISON1_ROW_MASK, sdram.row);
- writel(regval, priv->baseaddr + ECC_POISON1_OFST);
-}
-
static ssize_t snps_inject_data_error_read(struct file *filep, char __user *ubuf,
size_t size, loff_t *offp)
{
struct mem_ctl_info *mci = filep->private_data;
struct snps_edac_priv *priv = mci->pvt_info;
+ struct snps_sdram_addr sdram;
char buf[SNPS_DBGFS_BUF_LEN];
+ dma_addr_t sys;
+ u32 regval;
int pos;
- pos = scnprintf(buf, sizeof(buf), "Poison0 Addr: 0x%08x\n\r",
- readl(priv->baseaddr + ECC_POISON0_OFST));
- pos += scnprintf(buf + pos, sizeof(buf) - pos, "Poison1 Addr: 0x%08x\n\r",
- readl(priv->baseaddr + ECC_POISON1_OFST));
- pos += scnprintf(buf + pos, sizeof(buf) - pos, "Error injection Address: 0x%lx\n\r",
- priv->poison_addr);
+ regval = readl(priv->baseaddr + ECC_POISON0_OFST);
+ sdram.rank = FIELD_GET(ECC_POISON0_RANK_MASK, regval);
+ sdram.col = FIELD_GET(ECC_POISON0_COL_MASK, regval);
+
+ regval = readl(priv->baseaddr + ECC_POISON1_OFST);
+ sdram.bankgrp = FIELD_PREP(ECC_POISON1_BANKGRP_MASK, regval);
+ sdram.bank = FIELD_PREP(ECC_POISON1_BANK_MASK, regval);
+ sdram.row = FIELD_PREP(ECC_POISON1_ROW_MASK, regval);
+
+ snps_map_sdram_to_sys(priv, &sdram, &sys);
+
+ pos = scnprintf(buf, sizeof(buf),
+ "%pad: Row %hu Col %hu Bank %hhu Bank Group %hhu Rank %hhu\n",
+ &sys, sdram.row, sdram.col, sdram.bank, sdram.bankgrp,
+ sdram.rank);
return simple_read_from_buffer(ubuf, size, offp, buf, pos);
}
@@ -1766,13 +1750,25 @@ static ssize_t snps_inject_data_error_write(struct file *filep, const char __use
{
struct mem_ctl_info *mci = filep->private_data;
struct snps_edac_priv *priv = mci->pvt_info;
+ struct snps_sdram_addr sdram;
+ u32 regval;
+ u64 sys;
int rc;
- rc = kstrtoul_from_user(ubuf, size, 0, &priv->poison_addr);
+ rc = kstrtou64_from_user(ubuf, size, 0, &sys);
if (rc)
return rc;
- snps_data_poison_setup(priv);
+ snps_map_sys_to_sdram(priv, sys, &sdram);
+
+ regval = FIELD_PREP(ECC_POISON0_RANK_MASK, sdram.rank) |
+ FIELD_PREP(ECC_POISON0_COL_MASK, sdram.col);
+ writel(regval, priv->baseaddr + ECC_POISON0_OFST);
+
+ regval = FIELD_PREP(ECC_POISON1_BANKGRP_MASK, sdram.bankgrp) |
+ FIELD_PREP(ECC_POISON1_BANK_MASK, sdram.bank) |
+ FIELD_PREP(ECC_POISON1_ROW_MASK, sdram.row);
+ writel(regval, priv->baseaddr + ECC_POISON1_OFST);
return size;
}
--
2.41.0
Powered by blists - more mailing lists