xref: /openbmc/u-boot/drivers/remoteproc/k3_system_controller.c (revision 1ad190bf5936ad87d0bd80ecf55a1ce09e9d3ae9)
1*1ad190bfSLokesh Vutla // SPDX-License-Identifier: GPL-2.0+
2*1ad190bfSLokesh Vutla /*
3*1ad190bfSLokesh Vutla  * Texas Instruments' K3 System Controller Driver
4*1ad190bfSLokesh Vutla  *
5*1ad190bfSLokesh Vutla  * Copyright (C) 2017-2018 Texas Instruments Incorporated - http://www.ti.com/
6*1ad190bfSLokesh Vutla  *	Lokesh Vutla <lokeshvutla@ti.com>
7*1ad190bfSLokesh Vutla  */
8*1ad190bfSLokesh Vutla 
9*1ad190bfSLokesh Vutla #include <common.h>
10*1ad190bfSLokesh Vutla #include <dm.h>
11*1ad190bfSLokesh Vutla #include <remoteproc.h>
12*1ad190bfSLokesh Vutla #include <errno.h>
13*1ad190bfSLokesh Vutla #include <mailbox.h>
14*1ad190bfSLokesh Vutla #include <linux/soc/ti/k3-sec-proxy.h>
15*1ad190bfSLokesh Vutla 
16*1ad190bfSLokesh Vutla #define K3_MSG_R5_TO_M3_M3FW			0x8105
17*1ad190bfSLokesh Vutla #define K3_MSG_M3_TO_R5_CERT_RESULT		0x8805
18*1ad190bfSLokesh Vutla #define K3_MSG_M3_TO_R5_BOOT_NOTIFICATION	0x000A
19*1ad190bfSLokesh Vutla 
20*1ad190bfSLokesh Vutla #define K3_FLAGS_MSG_CERT_AUTH_PASS		0x555555
21*1ad190bfSLokesh Vutla #define K3_FLAGS_MSG_CERT_AUTH_FAIL		0xffffff
22*1ad190bfSLokesh Vutla 
23*1ad190bfSLokesh Vutla /**
24*1ad190bfSLokesh Vutla  * struct k3_sysctrler_msg_hdr - Generic Header for Messages and responses.
25*1ad190bfSLokesh Vutla  * @cmd_id:	Message ID. One of K3_MSG_*
26*1ad190bfSLokesh Vutla  * @host_id:	Host ID of the message
27*1ad190bfSLokesh Vutla  * @seq_ne:	Message identifier indicating a transfer sequence.
28*1ad190bfSLokesh Vutla  * @flags:	Flags for the message.
29*1ad190bfSLokesh Vutla  */
30*1ad190bfSLokesh Vutla struct k3_sysctrler_msg_hdr {
31*1ad190bfSLokesh Vutla 	u16 cmd_id;
32*1ad190bfSLokesh Vutla 	u8 host_id;
33*1ad190bfSLokesh Vutla 	u8 seq_nr;
34*1ad190bfSLokesh Vutla 	u32 flags;
35*1ad190bfSLokesh Vutla } __packed;
36*1ad190bfSLokesh Vutla 
37*1ad190bfSLokesh Vutla /**
38*1ad190bfSLokesh Vutla  * struct k3_sysctrler_load_msg - Message format for Firmware loading
39*1ad190bfSLokesh Vutla  * @hdr:		Generic message hdr
40*1ad190bfSLokesh Vutla  * @buffer_address:	Address at which firmware is located.
41*1ad190bfSLokesh Vutla  * @buffer_size:	Size of the firmware.
42*1ad190bfSLokesh Vutla  */
43*1ad190bfSLokesh Vutla struct k3_sysctrler_load_msg {
44*1ad190bfSLokesh Vutla 	struct k3_sysctrler_msg_hdr hdr;
45*1ad190bfSLokesh Vutla 	u32 buffer_address;
46*1ad190bfSLokesh Vutla 	u32 buffer_size;
47*1ad190bfSLokesh Vutla } __packed;
48*1ad190bfSLokesh Vutla 
49*1ad190bfSLokesh Vutla /**
50*1ad190bfSLokesh Vutla  * struct k3_sysctrler_boot_notification_msg - Message format for boot
51*1ad190bfSLokesh Vutla  *					       notification
52*1ad190bfSLokesh Vutla  * @checksum:		Checksum for the entire message
53*1ad190bfSLokesh Vutla  * @reserved:		Reserved for future use.
54*1ad190bfSLokesh Vutla  * @hdr:		Generic message hdr
55*1ad190bfSLokesh Vutla  */
56*1ad190bfSLokesh Vutla struct k3_sysctrler_boot_notification_msg {
57*1ad190bfSLokesh Vutla 	u16 checksum;
58*1ad190bfSLokesh Vutla 	u16 reserved;
59*1ad190bfSLokesh Vutla 	struct k3_sysctrler_msg_hdr hdr;
60*1ad190bfSLokesh Vutla } __packed;
61*1ad190bfSLokesh Vutla 
62*1ad190bfSLokesh Vutla /**
63*1ad190bfSLokesh Vutla  * struct k3_sysctrler_desc - Description of SoC integration.
64*1ad190bfSLokesh Vutla  * @host_id:	Host identifier representing the compute entity
65*1ad190bfSLokesh Vutla  * @max_rx_timeout_ms:	Timeout for communication with SoC (in Milliseconds)
66*1ad190bfSLokesh Vutla  * @max_msg_size: Maximum size of data per message that can be handled.
67*1ad190bfSLokesh Vutla  */
68*1ad190bfSLokesh Vutla struct k3_sysctrler_desc {
69*1ad190bfSLokesh Vutla 	u8 host_id;
70*1ad190bfSLokesh Vutla 	int max_rx_timeout_us;
71*1ad190bfSLokesh Vutla 	int max_msg_size;
72*1ad190bfSLokesh Vutla };
73*1ad190bfSLokesh Vutla 
74*1ad190bfSLokesh Vutla /**
75*1ad190bfSLokesh Vutla  * struct k3_sysctrler_privdata - Structure representing System Controller data.
76*1ad190bfSLokesh Vutla  * @chan_tx:	Transmit mailbox channel
77*1ad190bfSLokesh Vutla  * @chan_rx:	Receive mailbox channel
78*1ad190bfSLokesh Vutla  * @desc:	SoC description for this instance
79*1ad190bfSLokesh Vutla  * @seq_nr:	Counter for number of messages sent.
80*1ad190bfSLokesh Vutla  */
81*1ad190bfSLokesh Vutla struct k3_sysctrler_privdata {
82*1ad190bfSLokesh Vutla 	struct mbox_chan chan_tx;
83*1ad190bfSLokesh Vutla 	struct mbox_chan chan_rx;
84*1ad190bfSLokesh Vutla 	struct k3_sysctrler_desc *desc;
85*1ad190bfSLokesh Vutla 	u32 seq_nr;
86*1ad190bfSLokesh Vutla };
87*1ad190bfSLokesh Vutla 
88*1ad190bfSLokesh Vutla static inline
k3_sysctrler_load_msg_setup(struct k3_sysctrler_load_msg * fw,struct k3_sysctrler_privdata * priv,ulong addr,ulong size)89*1ad190bfSLokesh Vutla void k3_sysctrler_load_msg_setup(struct k3_sysctrler_load_msg *fw,
90*1ad190bfSLokesh Vutla 				 struct k3_sysctrler_privdata *priv,
91*1ad190bfSLokesh Vutla 				 ulong addr, ulong size)
92*1ad190bfSLokesh Vutla {
93*1ad190bfSLokesh Vutla 	fw->hdr.cmd_id = K3_MSG_R5_TO_M3_M3FW;
94*1ad190bfSLokesh Vutla 	fw->hdr.host_id = priv->desc->host_id;
95*1ad190bfSLokesh Vutla 	fw->hdr.seq_nr = priv->seq_nr++;
96*1ad190bfSLokesh Vutla 	fw->hdr.flags = 0x0;
97*1ad190bfSLokesh Vutla 	fw->buffer_address = addr;
98*1ad190bfSLokesh Vutla 	fw->buffer_size = size;
99*1ad190bfSLokesh Vutla }
100*1ad190bfSLokesh Vutla 
k3_sysctrler_load_response(u32 * buf)101*1ad190bfSLokesh Vutla static int k3_sysctrler_load_response(u32 *buf)
102*1ad190bfSLokesh Vutla {
103*1ad190bfSLokesh Vutla 	struct k3_sysctrler_load_msg *fw;
104*1ad190bfSLokesh Vutla 
105*1ad190bfSLokesh Vutla 	fw = (struct k3_sysctrler_load_msg *)buf;
106*1ad190bfSLokesh Vutla 
107*1ad190bfSLokesh Vutla 	/* Check for proper response ID */
108*1ad190bfSLokesh Vutla 	if (fw->hdr.cmd_id != K3_MSG_M3_TO_R5_CERT_RESULT) {
109*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Command expected 0x%x, but received 0x%x\n",
110*1ad190bfSLokesh Vutla 			__func__, K3_MSG_M3_TO_R5_CERT_RESULT, fw->hdr.cmd_id);
111*1ad190bfSLokesh Vutla 		return -EINVAL;
112*1ad190bfSLokesh Vutla 	}
113*1ad190bfSLokesh Vutla 
114*1ad190bfSLokesh Vutla 	/* Check for certificate authentication result */
115*1ad190bfSLokesh Vutla 	if (fw->hdr.flags == K3_FLAGS_MSG_CERT_AUTH_FAIL) {
116*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Firmware certificate authentication failed\n",
117*1ad190bfSLokesh Vutla 			__func__);
118*1ad190bfSLokesh Vutla 		return -EINVAL;
119*1ad190bfSLokesh Vutla 	} else if (fw->hdr.flags != K3_FLAGS_MSG_CERT_AUTH_PASS) {
120*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Firmware Load response Invalid %d\n",
121*1ad190bfSLokesh Vutla 			__func__, fw->hdr.flags);
122*1ad190bfSLokesh Vutla 		return -EINVAL;
123*1ad190bfSLokesh Vutla 	}
124*1ad190bfSLokesh Vutla 
125*1ad190bfSLokesh Vutla 	debug("%s: Firmware authentication passed\n", __func__);
126*1ad190bfSLokesh Vutla 
127*1ad190bfSLokesh Vutla 	return 0;
128*1ad190bfSLokesh Vutla }
129*1ad190bfSLokesh Vutla 
k3_sysctrler_boot_notification_response(u32 * buf)130*1ad190bfSLokesh Vutla static int k3_sysctrler_boot_notification_response(u32 *buf)
131*1ad190bfSLokesh Vutla {
132*1ad190bfSLokesh Vutla 	struct k3_sysctrler_boot_notification_msg *boot;
133*1ad190bfSLokesh Vutla 
134*1ad190bfSLokesh Vutla 	boot = (struct k3_sysctrler_boot_notification_msg *)buf;
135*1ad190bfSLokesh Vutla 
136*1ad190bfSLokesh Vutla 	/* ToDo: Verify checksum */
137*1ad190bfSLokesh Vutla 
138*1ad190bfSLokesh Vutla 	/* Check for proper response ID */
139*1ad190bfSLokesh Vutla 	if (boot->hdr.cmd_id != K3_MSG_M3_TO_R5_BOOT_NOTIFICATION) {
140*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Command expected 0x%x, but received 0x%x\n",
141*1ad190bfSLokesh Vutla 			__func__, K3_MSG_M3_TO_R5_BOOT_NOTIFICATION,
142*1ad190bfSLokesh Vutla 			boot->hdr.cmd_id);
143*1ad190bfSLokesh Vutla 		return -EINVAL;
144*1ad190bfSLokesh Vutla 	}
145*1ad190bfSLokesh Vutla 
146*1ad190bfSLokesh Vutla 	debug("%s: Boot notification received\n", __func__);
147*1ad190bfSLokesh Vutla 
148*1ad190bfSLokesh Vutla 	return 0;
149*1ad190bfSLokesh Vutla }
150*1ad190bfSLokesh Vutla 
151*1ad190bfSLokesh Vutla /**
152*1ad190bfSLokesh Vutla  * k3_sysctrler_load() - Loadup the K3 remote processor
153*1ad190bfSLokesh Vutla  * @dev:	corresponding K3 remote processor device
154*1ad190bfSLokesh Vutla  * @addr:	Address in memory where image binary is stored
155*1ad190bfSLokesh Vutla  * @size:	Size in bytes of the image binary
156*1ad190bfSLokesh Vutla  *
157*1ad190bfSLokesh Vutla  * Return: 0 if all goes good, else appropriate error message.
158*1ad190bfSLokesh Vutla  */
k3_sysctrler_load(struct udevice * dev,ulong addr,ulong size)159*1ad190bfSLokesh Vutla static int k3_sysctrler_load(struct udevice *dev, ulong addr, ulong size)
160*1ad190bfSLokesh Vutla {
161*1ad190bfSLokesh Vutla 	struct k3_sysctrler_privdata *priv = dev_get_priv(dev);
162*1ad190bfSLokesh Vutla 	struct k3_sysctrler_load_msg firmware;
163*1ad190bfSLokesh Vutla 	struct k3_sec_proxy_msg msg;
164*1ad190bfSLokesh Vutla 	int ret;
165*1ad190bfSLokesh Vutla 
166*1ad190bfSLokesh Vutla 	debug("%s: Loading binary from 0x%08lX, size 0x%08lX\n",
167*1ad190bfSLokesh Vutla 	      __func__, addr, size);
168*1ad190bfSLokesh Vutla 
169*1ad190bfSLokesh Vutla 	memset(&firmware, 0, sizeof(firmware));
170*1ad190bfSLokesh Vutla 	memset(&msg, 0, sizeof(msg));
171*1ad190bfSLokesh Vutla 
172*1ad190bfSLokesh Vutla 	/* Setup the message */
173*1ad190bfSLokesh Vutla 	k3_sysctrler_load_msg_setup(&firmware, priv, addr, size);
174*1ad190bfSLokesh Vutla 	msg.len = sizeof(firmware);
175*1ad190bfSLokesh Vutla 	msg.buf = (u32 *)&firmware;
176*1ad190bfSLokesh Vutla 
177*1ad190bfSLokesh Vutla 	/* Send the message */
178*1ad190bfSLokesh Vutla 	ret = mbox_send(&priv->chan_tx, &msg);
179*1ad190bfSLokesh Vutla 	if (ret) {
180*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Firmware Loading failed. ret = %d\n",
181*1ad190bfSLokesh Vutla 			__func__, ret);
182*1ad190bfSLokesh Vutla 		return ret;
183*1ad190bfSLokesh Vutla 	}
184*1ad190bfSLokesh Vutla 
185*1ad190bfSLokesh Vutla 	/* Receive the response */
186*1ad190bfSLokesh Vutla 	ret = mbox_recv(&priv->chan_rx, &msg, priv->desc->max_rx_timeout_us);
187*1ad190bfSLokesh Vutla 	if (ret) {
188*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Firmware Load response failed. ret = %d\n",
189*1ad190bfSLokesh Vutla 			__func__, ret);
190*1ad190bfSLokesh Vutla 		return ret;
191*1ad190bfSLokesh Vutla 	}
192*1ad190bfSLokesh Vutla 
193*1ad190bfSLokesh Vutla 	/* Process the response */
194*1ad190bfSLokesh Vutla 	ret = k3_sysctrler_load_response(msg.buf);
195*1ad190bfSLokesh Vutla 	if (ret)
196*1ad190bfSLokesh Vutla 		return ret;
197*1ad190bfSLokesh Vutla 
198*1ad190bfSLokesh Vutla 	debug("%s: Firmware Loaded successfully on dev %s\n",
199*1ad190bfSLokesh Vutla 	      __func__, dev->name);
200*1ad190bfSLokesh Vutla 
201*1ad190bfSLokesh Vutla 	return 0;
202*1ad190bfSLokesh Vutla }
203*1ad190bfSLokesh Vutla 
204*1ad190bfSLokesh Vutla /**
205*1ad190bfSLokesh Vutla  * k3_sysctrler_start() - Start the remote processor
206*1ad190bfSLokesh Vutla  *		Note that while technically the K3 system controller starts up
207*1ad190bfSLokesh Vutla  *		automatically after its firmware got loaded we still want to
208*1ad190bfSLokesh Vutla  *		utilize the rproc start operation for other startup-related
209*1ad190bfSLokesh Vutla  *		tasks.
210*1ad190bfSLokesh Vutla  * @dev:	device to operate upon
211*1ad190bfSLokesh Vutla  *
212*1ad190bfSLokesh Vutla  * Return: 0 if all went ok, else return appropriate error
213*1ad190bfSLokesh Vutla  */
k3_sysctrler_start(struct udevice * dev)214*1ad190bfSLokesh Vutla static int k3_sysctrler_start(struct udevice *dev)
215*1ad190bfSLokesh Vutla {
216*1ad190bfSLokesh Vutla 	struct k3_sysctrler_privdata *priv = dev_get_priv(dev);
217*1ad190bfSLokesh Vutla 	struct k3_sec_proxy_msg msg;
218*1ad190bfSLokesh Vutla 	int ret;
219*1ad190bfSLokesh Vutla 
220*1ad190bfSLokesh Vutla 	debug("%s(dev=%p)\n", __func__, dev);
221*1ad190bfSLokesh Vutla 
222*1ad190bfSLokesh Vutla 	/* Receive the boot notification. Note that it is sent only once. */
223*1ad190bfSLokesh Vutla 	ret = mbox_recv(&priv->chan_rx, &msg, priv->desc->max_rx_timeout_us);
224*1ad190bfSLokesh Vutla 	if (ret) {
225*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Boot Notification response failed. ret = %d\n",
226*1ad190bfSLokesh Vutla 			__func__, ret);
227*1ad190bfSLokesh Vutla 		return ret;
228*1ad190bfSLokesh Vutla 	}
229*1ad190bfSLokesh Vutla 
230*1ad190bfSLokesh Vutla 	/* Process the response */
231*1ad190bfSLokesh Vutla 	ret = k3_sysctrler_boot_notification_response(msg.buf);
232*1ad190bfSLokesh Vutla 	if (ret)
233*1ad190bfSLokesh Vutla 		return ret;
234*1ad190bfSLokesh Vutla 
235*1ad190bfSLokesh Vutla 	debug("%s: Boot notification received successfully on dev %s\n",
236*1ad190bfSLokesh Vutla 	      __func__, dev->name);
237*1ad190bfSLokesh Vutla 
238*1ad190bfSLokesh Vutla 	return 0;
239*1ad190bfSLokesh Vutla }
240*1ad190bfSLokesh Vutla 
241*1ad190bfSLokesh Vutla static const struct dm_rproc_ops k3_sysctrler_ops = {
242*1ad190bfSLokesh Vutla 	.load = k3_sysctrler_load,
243*1ad190bfSLokesh Vutla 	.start = k3_sysctrler_start,
244*1ad190bfSLokesh Vutla };
245*1ad190bfSLokesh Vutla 
246*1ad190bfSLokesh Vutla /**
247*1ad190bfSLokesh Vutla  * k3_of_to_priv() - generate private data from device tree
248*1ad190bfSLokesh Vutla  * @dev:	corresponding k3 remote processor device
249*1ad190bfSLokesh Vutla  * @priv:	pointer to driver specific private data
250*1ad190bfSLokesh Vutla  *
251*1ad190bfSLokesh Vutla  * Return: 0 if all goes good, else appropriate error message.
252*1ad190bfSLokesh Vutla  */
k3_of_to_priv(struct udevice * dev,struct k3_sysctrler_privdata * priv)253*1ad190bfSLokesh Vutla static int k3_of_to_priv(struct udevice *dev,
254*1ad190bfSLokesh Vutla 			 struct k3_sysctrler_privdata *priv)
255*1ad190bfSLokesh Vutla {
256*1ad190bfSLokesh Vutla 	int ret;
257*1ad190bfSLokesh Vutla 
258*1ad190bfSLokesh Vutla 	ret = mbox_get_by_name(dev, "tx", &priv->chan_tx);
259*1ad190bfSLokesh Vutla 	if (ret) {
260*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Acquiring Tx channel failed. ret = %d\n",
261*1ad190bfSLokesh Vutla 			__func__, ret);
262*1ad190bfSLokesh Vutla 		return ret;
263*1ad190bfSLokesh Vutla 	}
264*1ad190bfSLokesh Vutla 
265*1ad190bfSLokesh Vutla 	ret = mbox_get_by_name(dev, "rx", &priv->chan_rx);
266*1ad190bfSLokesh Vutla 	if (ret) {
267*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Acquiring Rx channel failed. ret = %d\n",
268*1ad190bfSLokesh Vutla 			__func__, ret);
269*1ad190bfSLokesh Vutla 		return ret;
270*1ad190bfSLokesh Vutla 	}
271*1ad190bfSLokesh Vutla 
272*1ad190bfSLokesh Vutla 	return 0;
273*1ad190bfSLokesh Vutla }
274*1ad190bfSLokesh Vutla 
275*1ad190bfSLokesh Vutla /**
276*1ad190bfSLokesh Vutla  * k3_sysctrler_probe() - Basic probe
277*1ad190bfSLokesh Vutla  * @dev:	corresponding k3 remote processor device
278*1ad190bfSLokesh Vutla  *
279*1ad190bfSLokesh Vutla  * Return: 0 if all goes good, else appropriate error message.
280*1ad190bfSLokesh Vutla  */
k3_sysctrler_probe(struct udevice * dev)281*1ad190bfSLokesh Vutla static int k3_sysctrler_probe(struct udevice *dev)
282*1ad190bfSLokesh Vutla {
283*1ad190bfSLokesh Vutla 	struct k3_sysctrler_privdata *priv;
284*1ad190bfSLokesh Vutla 	int ret;
285*1ad190bfSLokesh Vutla 
286*1ad190bfSLokesh Vutla 	debug("%s(dev=%p)\n", __func__, dev);
287*1ad190bfSLokesh Vutla 
288*1ad190bfSLokesh Vutla 	priv = dev_get_priv(dev);
289*1ad190bfSLokesh Vutla 
290*1ad190bfSLokesh Vutla 	ret = k3_of_to_priv(dev, priv);
291*1ad190bfSLokesh Vutla 	if (ret) {
292*1ad190bfSLokesh Vutla 		dev_err(dev, "%s: Probe failed with error %d\n", __func__, ret);
293*1ad190bfSLokesh Vutla 		return ret;
294*1ad190bfSLokesh Vutla 	}
295*1ad190bfSLokesh Vutla 
296*1ad190bfSLokesh Vutla 	priv->desc = (void *)dev_get_driver_data(dev);
297*1ad190bfSLokesh Vutla 	priv->seq_nr = 0;
298*1ad190bfSLokesh Vutla 
299*1ad190bfSLokesh Vutla 	return 0;
300*1ad190bfSLokesh Vutla }
301*1ad190bfSLokesh Vutla 
302*1ad190bfSLokesh Vutla static const struct k3_sysctrler_desc k3_sysctrler_am654_desc = {
303*1ad190bfSLokesh Vutla 	.host_id = 4,				/* HOST_ID_R5_1 */
304*1ad190bfSLokesh Vutla 	.max_rx_timeout_us = 400000,
305*1ad190bfSLokesh Vutla 	.max_msg_size = 60,
306*1ad190bfSLokesh Vutla };
307*1ad190bfSLokesh Vutla 
308*1ad190bfSLokesh Vutla static const struct udevice_id k3_sysctrler_ids[] = {
309*1ad190bfSLokesh Vutla 	{
310*1ad190bfSLokesh Vutla 		.compatible = "ti,am654-system-controller",
311*1ad190bfSLokesh Vutla 		.data = (ulong)&k3_sysctrler_am654_desc,
312*1ad190bfSLokesh Vutla 	},
313*1ad190bfSLokesh Vutla 	{}
314*1ad190bfSLokesh Vutla };
315*1ad190bfSLokesh Vutla 
316*1ad190bfSLokesh Vutla U_BOOT_DRIVER(k3_sysctrler) = {
317*1ad190bfSLokesh Vutla 	.name = "k3_system_controller",
318*1ad190bfSLokesh Vutla 	.of_match = k3_sysctrler_ids,
319*1ad190bfSLokesh Vutla 	.id = UCLASS_REMOTEPROC,
320*1ad190bfSLokesh Vutla 	.ops = &k3_sysctrler_ops,
321*1ad190bfSLokesh Vutla 	.probe = k3_sysctrler_probe,
322*1ad190bfSLokesh Vutla 	.priv_auto_alloc_size = sizeof(struct k3_sysctrler_privdata),
323*1ad190bfSLokesh Vutla };
324