Received: by 2002:a05:7412:98c1:b0:fa:551:50a7 with SMTP id kc1csp1278820rdb; Sun, 7 Jan 2024 11:54:06 -0800 (PST) X-Google-Smtp-Source: AGHT+IHvGkkkE0yl7SNgeoqmwiCVnmKSNBFFd+Bqafrt4rsMuEU1qCh4f1xwoFunBCDMi5ULwInb X-Received: by 2002:a05:6a20:9195:b0:197:4aac:cfb7 with SMTP id v21-20020a056a20919500b001974aaccfb7mr3648960pzd.90.1704657246005; Sun, 07 Jan 2024 11:54:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704657245; cv=none; d=google.com; s=arc-20160816; b=doSENmUTwOq8hHCrGB1lFqYeMDZdkqOvgszB32K7lv5AdmZoS/6Bw88cn4aldvKZvM AAKCcEUnT+84wFItg/W8LX2s+fG8djbLttqJmDLlUy+LeAS3H9aidaGNk3zFAuNRVC/l PGa8u1815nBb3UA0e0Pqx3vhpvQpAMTbQNffQ3x0XaEOYysoRs6u3VrHqUZV/7i7smMo jj2Xik7YWzz2N42wv5r1RHMxhZeb5o88NwnN9Kmua+XvZBhPMFKvMUWprvzpYkQPVHpl fygMd+gYdhimpNWqApTEIcM363bgHmJFaQX3Gu8SpyeUkIKJIRzmVoxg9T9Osvlo2mlW NkPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=ylXoSR1ZHIzb3pGZ6LV82DlJNRfOCTzvn1qzuSH2iEQ=; fh=/qIgQuw4cckYrnPRw0PUT2fUvOSwKO7iorZeYpSLMYY=; b=hoeJ+pqmdVdxp+1UBjYq1IXeRsG+1NATRd0vRWIxnOPf4BTkU3sRQK26YuQZXovQ9p uCUULow0MZN1xkhSEEh262kJpXh8qN780Yvw2s/1PWpJcPMBie1JqGOS66pj4f4EFG4C rTziS2ELxgskQxbXhLZA9XmOdthWpvWjxTiq244xl9CND24QRKHeCjGbQ0HMTHAarQwH V3R6huucpnilL33Wbm9J4hH+qQrSOIVd5tXDYuIWy1Cfr8CQhHj/cruZ6ZYRAInNBSmC U1VX/ogitpcEoVBYzaI+NU0/ArogoEhl3Ga37rwoTWdrEbtI4WpaAKzSrS5sor5YQbFE P3ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=QZpHUCI9; spf=pass (google.com: domain of linux-kernel+bounces-18972-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-18972-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id c23-20020a6566d7000000b005cdfa6ec016si4732834pgw.535.2024.01.07.11.54.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 07 Jan 2024 11:54:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-18972-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=QZpHUCI9; spf=pass (google.com: domain of linux-kernel+bounces-18972-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-18972-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id BD175B21293 for ; Sun, 7 Jan 2024 19:54:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A27671170B; Sun, 7 Jan 2024 19:53:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="QZpHUCI9" X-Original-To: linux-kernel@vger.kernel.org Received: from mail-lf1-f53.google.com (mail-lf1-f53.google.com [209.85.167.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DF5091119B; Sun, 7 Jan 2024 19:53:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-lf1-f53.google.com with SMTP id 2adb3069b0e04-50e80d40a41so1349492e87.1; Sun, 07 Jan 2024 11:53:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704657227; x=1705262027; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=ylXoSR1ZHIzb3pGZ6LV82DlJNRfOCTzvn1qzuSH2iEQ=; b=QZpHUCI9b3v69Mwnfiyslyh2O3KuPl/zO9dzfbr2OQ5f/FgdexF0IKIg8/6A94sZum tEIkjuoifBUDRhJ5sXdr3+4bco8H/2JcVarX+WcukE8gTCR1phHgSDashv7H2G337bn4 rQC0Fer7uFRCw5Mii7QA7EI0Ifnrni6DsD39YeAe6y9OUBEtUiOqXFNt/FB3da6ZAAfC Ja2/vpEPmJSSsPmhF16r6XBmRGs9kuM3LmE0OZElegeeGdkS9KK1g4rGPGliRSDlaqxI Nr026t/ZDFKQ2r1aWB9fdciscDNNuCfOzWjghmOPWtSZrAyru1e31RL3M7/I8PCVdDzI +6lg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704657227; x=1705262027; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ylXoSR1ZHIzb3pGZ6LV82DlJNRfOCTzvn1qzuSH2iEQ=; b=SNlbY+Qa61WyTXmjHt7iPjMfIx66CLWjhhBdmqS+554xkOGyj0zRY4T2p3yRabiBfs acxQYktZCn7i1JQLlDp8Mgj62hiTXpjO2tHV0RXCfV8qu+wEiWVhjZ30htVlHhTDeRRa df+A+7zwUQZpGEvhJTxBSnWM67mrShYli/iNuZtgVq1WAnyw+YGHYrpV2pgNyg0BwTzF zuZX+xFG7Oe3n3c8SPdZmvuBbrhXmwd+s++Y3tBrDEp8bTQDpsJD0Y7DY26luc82VJ3C F+EKsxC/DCX+sS8g0ZRWZlaqhOCUcVFuMLZoPJvgSdcIjI3cKAfixocPUIfcmAV1Sbco sx8w== X-Gm-Message-State: AOJu0Yzj+cF5rqnwPN42DiLkP4nbLPe2jgF+ixSXEeQIwulgTQRid2Ub Kr0WYdSZvO5JPsqyHV1w3IA= X-Received: by 2002:a05:6512:36d2:b0:50e:2551:c8ce with SMTP id e18-20020a05651236d200b0050e2551c8cemr888553lfs.119.1704657226469; Sun, 07 Jan 2024 11:53:46 -0800 (PST) Received: from mobilestation ([95.79.203.166]) by smtp.gmail.com with ESMTPSA id o22-20020ac24bd6000000b0050e76978865sm925011lfq.178.2024.01.07.11.53.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 07 Jan 2024 11:53:45 -0800 (PST) Date: Sun, 7 Jan 2024 22:53:43 +0300 From: Serge Semin To: Suraj Jaiswal Cc: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Vinod Koul , Bhupesh Sharma , Andy Gross , Bjorn Andersson , Konrad Dybcio , Rob Herring , Krzysztof Kozlowski , Conor Dooley , Alexandre Torgue , Jose Abreu , Maxime Coquelin , netdev@vger.kernel.org, linux-arm-msm@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, Prasad Sodagudi , Andrew Halaney , Rob Herring , kernel@quicinc.com Subject: Re: [PATCH net-next v8 3/3] net: stmmac: Add driver support for DWMAC5 common safety IRQ Message-ID: <6tog5feuvgsfootirmbidgl7gakort7tax2gponudo3l574dam@jzdavh4wmkc4> References: <20231221073620.232619-1-quic_jsuraj@quicinc.com> <20231221073620.232619-4-quic_jsuraj@quicinc.com> <2685432c-a086-4730-9dd6-8b8da1070697@quicinc.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Wed, Dec 27, 2023 at 04:33:33PM +0530, Suraj Jaiswal wrote: > Hi Seren, > please find the updated comment . > > Thanks > Suraj > > On 12/26/2023 4:40 PM, Suraj Jaiswal wrote: > > Hi seren > > let me check below on test setup once & get back > > > > Thanks > > Suraj > > > > On 12/22/2023 8:05 PM, Serge Semin wrote: > >> On Fri, Dec 22, 2023 at 02:13:49PM +0530, Suraj Jaiswal wrote: > >>> HI Serge, > >>> please find commnet inline. > >>> > >>> Thanks > >>> Suraj > >>> > >>> On 12/21/2023 6:19 PM, Serge Semin wrote: > >>>> Hi Suraj > >>>> > >>>> On Thu, Dec 21, 2023 at 01:06:20PM +0530, Suraj Jaiswal wrote: > >>>>> Add support to listen HW safety IRQ like ECC(error > >>>>> correction code), DPP(data path parity), FSM(finite state > >>>>> machine) fault in common IRQ line. > >>>>> > >>>>> Signed-off-by: Suraj Jaiswal > >>>> > >>>> Thanks for taking my notes into account. One more comment is further > >>>> below. > >>>> > >>>>> --- > >>>>> drivers/net/ethernet/stmicro/stmmac/common.h | 1 + > >>>>> drivers/net/ethernet/stmicro/stmmac/stmmac.h | 3 ++ > >>>>> .../net/ethernet/stmicro/stmmac/stmmac_main.c | 37 +++++++++++++++++++ > >>>>> .../ethernet/stmicro/stmmac/stmmac_platform.c | 8 ++++ > >>>>> 4 files changed, 49 insertions(+) > >>>>> > >>>>> diff --git a/drivers/net/ethernet/stmicro/stmmac/common.h b/drivers/net/ethernet/stmicro/stmmac/common.h > >>>>> index 721c1f8e892f..b9233b09b80f 100644 > >>>>> --- a/drivers/net/ethernet/stmicro/stmmac/common.h > >>>>> +++ b/drivers/net/ethernet/stmicro/stmmac/common.h > >>>>> @@ -344,6 +344,7 @@ enum request_irq_err { > >>>>> REQ_IRQ_ERR_ALL, > >>>>> REQ_IRQ_ERR_TX, > >>>>> REQ_IRQ_ERR_RX, > >>>>> + REQ_IRQ_ERR_SFTY, > >>>>> REQ_IRQ_ERR_SFTY_UE, > >>>>> REQ_IRQ_ERR_SFTY_CE, > >>>>> REQ_IRQ_ERR_LPI, > >>>>> diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac.h b/drivers/net/ethernet/stmicro/stmmac/stmmac.h > >>>>> index 9f89acf31050..ca3d93851bed 100644 > >>>>> --- a/drivers/net/ethernet/stmicro/stmmac/stmmac.h > >>>>> +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac.h > >>>>> @@ -31,6 +31,7 @@ struct stmmac_resources { > >>>>> int wol_irq; > >>>>> int lpi_irq; > >>>>> int irq; > >>>>> + int sfty_irq; > >>>>> int sfty_ce_irq; > >>>>> int sfty_ue_irq; > >>>>> int rx_irq[MTL_MAX_RX_QUEUES]; > >>>>> @@ -297,6 +298,7 @@ struct stmmac_priv { > >>>>> void __iomem *ptpaddr; > >>>>> void __iomem *estaddr; > >>>>> unsigned long active_vlans[BITS_TO_LONGS(VLAN_N_VID)]; > >>>>> + int sfty_irq; > >>>>> int sfty_ce_irq; > >>>>> int sfty_ue_irq; > >>>>> int rx_irq[MTL_MAX_RX_QUEUES]; > >>>>> @@ -305,6 +307,7 @@ struct stmmac_priv { > >>>>> char int_name_mac[IFNAMSIZ + 9]; > >>>>> char int_name_wol[IFNAMSIZ + 9]; > >>>>> char int_name_lpi[IFNAMSIZ + 9]; > >>>>> + char int_name_sfty[IFNAMSIZ + 10]; > >>>>> char int_name_sfty_ce[IFNAMSIZ + 10]; > >>>>> char int_name_sfty_ue[IFNAMSIZ + 10]; > >>>>> char int_name_rx_irq[MTL_MAX_TX_QUEUES][IFNAMSIZ + 14]; > >>>>> diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c > >>>>> index 47de466e432c..7d4e827dfeab 100644 > >>>>> --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c > >>>>> +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c > >>>>> @@ -3592,6 +3592,10 @@ static void stmmac_free_irq(struct net_device *dev, > >>>>> if (priv->wol_irq > 0 && priv->wol_irq != dev->irq) > >>>>> free_irq(priv->wol_irq, dev); > >>>>> fallthrough; > >>>>> + case REQ_IRQ_ERR_SFTY: > >>>>> + if (priv->sfty_irq > 0 && priv->sfty_irq != dev->irq) > >>>>> + free_irq(priv->sfty_irq, dev); > >>>>> + fallthrough; > >>>>> case REQ_IRQ_ERR_WOL: > >>>>> free_irq(dev->irq, dev); > >>>>> fallthrough; > >>>>> @@ -3661,6 +3665,23 @@ static int stmmac_request_irq_multi_msi(struct net_device *dev) > >>>>> } > >>>>> } > >>>>> > >>>>> + /* Request the common Safety Feature Correctible/Uncorrectible > >>>>> + * Error line in case of another line is used > >>>>> + */ > >>>>> + if (priv->sfty_irq > 0 && priv->sfty_irq != dev->irq) { > >>>>> + int_name = priv->int_name_sfty; > >>>>> + sprintf(int_name, "%s:%s", dev->name, "safety"); > >>>>> + ret = request_irq(priv->sfty_irq, stmmac_safety_interrupt, > >>>>> + 0, int_name, dev); > >>>>> + if (unlikely(ret < 0)) { > >>>>> + netdev_err(priv->dev, > >>>>> + "%s: alloc sfty MSI %d (error: %d)\n", > >>>>> + __func__, priv->sfty_irq, ret); > >>>>> + irq_err = REQ_IRQ_ERR_SFTY; > >>>>> + goto irq_error; > >>>>> + } > >>>>> + } > >>>>> + > >>>>> /* Request the Safety Feature Correctible Error line in > >>>>> * case of another line is used > >>>>> */ > >>>>> @@ -3798,6 +3819,21 @@ static int stmmac_request_irq_single(struct net_device *dev) > >>>>> } > >>>>> } > >>>>> > >>>>> + /* Request the common Safety Feature Correctible/Uncorrectible > >>>>> + * Error line in case of another line is used > >>>>> + */ > >>>>> + if (priv->sfty_irq > 0 && priv->sfty_irq != dev->irq) { > >>>> > >>>>> + ret = request_irq(priv->sfty_irq, stmmac_safety_interrupt, > >>>>> + IRQF_SHARED, dev->name, dev); > >>>> > >>>> Just noticed yesterday that stmmac_safety_interrupt() is also called > >>>> from the stmmac_interrupt() handler which is supposed to be registered > >>>> on the generic "mac" IRQ. Won't it cause races around the CSRs > >>>> (doubtfully but still worth to note) and the errors handling > >>>> (stmmac_global_err()) in case if both IRQs are raised simultaneously? > >>>> At the very least it looks suspicious and worth double-checking. > >>>> > >>>> I also found out that nobody seemed to care that the same handler is > >>>> registered on MAC, WoL and LPI IRQ lines. Hmm, no race-related > >>>> problems have been reported so far for the platforms with separate > >>>> WoL/LPI IRQs. It's either a lucky coincident or the IRQs are always > >>>> assigned to the same CPU or the IRQs handle is indeed free of races. > >>>> In anyway it looks suspicious too. At the very least AFAICS the DMA > >>>> IRQ-handler is indeed racy on the status CSR access. It isn't > >>>> cleared-on-read, but write-one-to-clear. So the statistics might be > >>>> calculated more than once for the same CSR state. There might be some > >>>> other problems I failed to spot on the first glance. > >>>> > >>>> David, Eric, Jacub, Paolo, your opinion about the note above? > >>>> > >>>> -Serge(y) > >>>> > >> > >>> We are adding common IRQ similar to already present code for correcteable/uncorrecable https://elixir.bootlin.com/linux/latest/source/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c#L3592. > >> > >> From that perspective your change in stmmac_request_irq_multi_msi() is > >> correct, but stmmac_request_irq_single() is another story. The first > >> one method implies assigning the individual IRQ handlers to all > >> available lines. The later method assigns the _common_ handler to all > >> the lines. The common handler already calls the Safety IRQ handler - > >> stmmac_safety_feat_interrupt(). So should the safety IRQ line is > >> separately available it's possible to have the Safety IRQ handlers > >> executed concurrently - in framework of the common IRQ events handling > >> (if safety IRQ is raised during the common IRQ being handled) and > >> individual Safety IRQ. It's prune to the race condition I pointed out > >> to in my message above. Did you consider that problem? > >> > >>> Also, we need the sfty IRQ handling as soon as the fault occured & that can only be handled if we have handler attached with sfty IRQ. > >>> stmmac_interrupt() will only be triggerd when interrupt triggered for rx/tx packet . > >>> while registerting with sfty IRQ will get triggered as soon as emac HW detect the fault. > >> > >> Please read my comment more carefully. The safety IRQ can be raised > >> during the common IRQ handling, thus the > >> stmmac_safety_feat_interrupt() method might get to be concurrently > >> executed. > >> > >> -Serge(y) > >> > Have testing this on device . We have added print in the both the places stmmac_interrupt() as well as sfty interrupt handler. > We can see that sfty interrupt handler is getting triggred first & stmmac_safety_feat_interrupt () code added in stmmac_intterupt() is not getting triggred because looks like interrupt status bit register is already getting cleared as part of sfty interrupt handler. So it looks good . Please let us know if any further comment. > > Please find the log below . > > > / # [ 1505.602173] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1505.607274] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > [ 1505.617395] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1505.622494] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'TXCES: MTL TX Memory Error' > [ 1505.888913] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1505.894010] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > [ 1506.605821] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1506.610919] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > [ 1506.621034] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1506.626131] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'TXCES: MTL TX Memory Error' > [ 1507.613036] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1507.618133] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > [ 1507.628249] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1507.633346] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'TXCES: MTL TX Memory Error' > [ 1508.619034] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1508.624132] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > [ 1508.634245] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1508.639343] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'TXCES: MTL TX Memory Error' > [ 1509.631151] sj: stmmac_safety_interrupt from sfty IRQ handler > [ 1509.636249] qcom-ethqos 23040000.ethernet eth1: Found correctable error in MTL: 'RXCES: MTL RX Memory Error' > The log and the way you were trying to model out the problem don't prove that the race condition doesn't exist. They just indicate that your test-case doesn't catch the simultaneous MAC and Safety IRQs handling. Moreover AFAICS from the way the stmmac_ops->safety_feat_irq_status() callbacks are defined in DW QoS Eth and DW XGMAC modules, the race is there. Both dwmac5_safety_feat_irq_status() and dwxgmac3_safety_feat_irq_status() get to read the MTL and DMA Safety Interrupts Status register in order to check whether the Correctable/Uncorrectable errors have actually happened. After that the respective MAC, MTL or DMA error handlers are called, which get to clear the IRQs statue by reading and then writing the respective MAC DPP FRM, MTL/DMA ECC IRQ status registers. So if the stmmac_safety_feat_interrupt() method is concurrently called the driver at the very least may end up with printing the errors twice. -Serge(y) > >>> > >>>>> + if (unlikely(ret < 0)) { > >>>>> + netdev_err(priv->dev, > >>>>> + "%s: ERROR: allocating the sfty IRQ %d (%d)\n", > >>>>> + __func__, priv->sfty_irq, ret); > >>>>> + irq_err = REQ_IRQ_ERR_SFTY; > >>>>> + goto irq_error; > >>>>> + } > >>>>> + } > >>>>> + > >>>>> return 0; > >>>>> > >>>>> irq_error: > >>>>> @@ -7462,6 +7498,7 @@ int stmmac_dvr_probe(struct device *device, > >>>>> priv->dev->irq = res->irq; > >>>>> priv->wol_irq = res->wol_irq; > >>>>> priv->lpi_irq = res->lpi_irq; > >>>>> + priv->sfty_irq = res->sfty_irq; > >>>>> priv->sfty_ce_irq = res->sfty_ce_irq; > >>>>> priv->sfty_ue_irq = res->sfty_ue_irq; > >>>>> for (i = 0; i < MTL_MAX_RX_QUEUES; i++) > >>>>> diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_platform.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_platform.c > >>>>> index 70eadc83ca68..ab250161fd79 100644 > >>>>> --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_platform.c > >>>>> +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_platform.c > >>>>> @@ -743,6 +743,14 @@ int stmmac_get_platform_resources(struct platform_device *pdev, > >>>>> dev_info(&pdev->dev, "IRQ eth_lpi not found\n"); > >>>>> } > >>>>> > >>>>> + stmmac_res->sfty_irq = > >>>>> + platform_get_irq_byname_optional(pdev, "sfty"); > >>>>> + if (stmmac_res->sfty_irq < 0) { > >>>>> + if (stmmac_res->sfty_irq == -EPROBE_DEFER) > >>>>> + return -EPROBE_DEFER; > >>>>> + dev_info(&pdev->dev, "IRQ safety IRQ not found\n"); > >>>>> + } > >>>>> + > >>>>> stmmac_res->addr = devm_platform_ioremap_resource(pdev, 0); > >>>>> > >>>>> return PTR_ERR_OR_ZERO(stmmac_res->addr); > >>>>> -- > >>>>> 2.25.1 > >>>>> > >>>>> > >