omap_l3_noc.c 8.0 KB
Newer Older
1
/*
2
 * OMAP L3 Interconnect error handling driver
3
 *
4
 * Copyright (C) 2011-2014 Texas Instruments Incorporated - http://www.ti.com/
5 6 7 8
 *	Santosh Shilimkar <santosh.shilimkar@ti.com>
 *	Sricharan <r.sricharan@ti.com>
 *
 * This program is free software; you can redistribute it and/or modify
9 10
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
11
 *
12 13 14
 * This program is distributed "as is" WITHOUT ANY WARRANTY of any
 * kind, whether express or implied; without even the implied warranty
 * of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15 16
 * GNU General Public License for more details.
 */
17 18
#include <linux/init.h>
#include <linux/interrupt.h>
19
#include <linux/io.h>
20
#include <linux/kernel.h>
21 22 23 24
#include <linux/module.h>
#include <linux/of_device.h>
#include <linux/of.h>
#include <linux/platform_device.h>
25 26 27 28
#include <linux/slab.h>

#include "omap_l3_noc.h"

29 30 31 32 33 34
/**
 * l3_handle_target() - Handle Target specific parse and reporting
 * @l3:		pointer to l3 struct
 * @base:	base address of clkdm
 * @flag_mux:	flagmux corresponding to the event
 * @err_src:	error source index of the slave (target)
35
 *
36 37 38 39 40 41 42
 * This does the second part of the error interrupt handling:
 *	3) Parse in the slave information
 *	4) Print the logged information.
 *	5) Add dump stack to provide kernel trace.
 *	6) Clear the source if known.
 *
 * This handles two types of errors:
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
 *	1) Custom errors in L3 :
 *		Target like DMM/FW/EMIF generates SRESP=ERR error
 *	2) Standard L3 error:
 *		- Unsupported CMD.
 *			L3 tries to access target while it is idle
 *		- OCP disconnect.
 *		- Address hole error:
 *			If DSS/ISS/FDIF/USBHOSTFS access a target where they
 *			do not have connectivity, the error is logged in
 *			their default target which is DMM2.
 *
 *	On High Secure devices, firewall errors are possible and those
 *	can be trapped as well. But the trapping is implemented as part
 *	secure software and hence need not be implemented here.
 */
58 59
static int l3_handle_target(struct omap_l3 *l3, void __iomem *base,
			    struct l3_flagmux_data *flag_mux, int err_src)
60
{
61 62 63
	int k;
	u32 std_err_main, clear, masterid;
	void __iomem *l3_targ_base;
64
	void __iomem *l3_targ_stderr, *l3_targ_slvofslsb, *l3_targ_mstaddr;
65
	struct l3_target_data *l3_targ_inst;
66
	struct l3_masters_data *master;
67
	char *target_name, *master_name = "UN IDENTIFIED";
68 69
	char *err_description;
	char err_string[30] = { 0 };
70

71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
	/* We DONOT expect err_src to go out of bounds */
	BUG_ON(err_src > MAX_CLKDM_TARGETS);

	if (err_src < flag_mux->num_targ_data) {
		l3_targ_inst = &flag_mux->l3_targ[err_src];
		target_name = l3_targ_inst->name;
		l3_targ_base = base + l3_targ_inst->offset;
	} else {
		target_name = L3_TARGET_NOT_SUPPORTED;
	}

	if (target_name == L3_TARGET_NOT_SUPPORTED)
		return -ENODEV;

	/* Read the stderrlog_main_source from clk domain */
	l3_targ_stderr = l3_targ_base + L3_TARG_STDERRLOG_MAIN;
	l3_targ_slvofslsb = l3_targ_base + L3_TARG_STDERRLOG_SLVOFSLSB;

	std_err_main = readl_relaxed(l3_targ_stderr);

	switch (std_err_main & CUSTOM_ERROR) {
	case STANDARD_ERROR:
		err_description = "Standard";
		snprintf(err_string, sizeof(err_string),
			 ": At Address: 0x%08X ",
			 readl_relaxed(l3_targ_slvofslsb));

		l3_targ_mstaddr = l3_targ_base + L3_TARG_STDERRLOG_MSTADDR;
		break;

	case CUSTOM_ERROR:
		err_description = "Custom";

		l3_targ_mstaddr = l3_targ_base +
				  L3_TARG_STDERRLOG_CINFO_MSTADDR;
		break;

	default:
		/* Nothing to be handled here as of now */
		return 0;
	}

	/* STDERRLOG_MSTADDR Stores the NTTP master address. */
	masterid = (readl_relaxed(l3_targ_mstaddr) &
		    l3->mst_addr_mask) >> __ffs(l3->mst_addr_mask);

	for (k = 0, master = l3->l3_masters; k < l3->num_masters;
	     k++, master++) {
		if (masterid == master->id) {
			master_name = master->name;
			break;
		}
	}

	WARN(true,
	     "%s:L3 %s Error: MASTER %s TARGET %s%s\n",
	     dev_name(l3->dev),
	     err_description,
	     master_name, target_name,
	     err_string);

	/* clear the std error log*/
	clear = std_err_main | CLEAR_STDERR_LOG;
	writel_relaxed(clear, l3_targ_stderr);

	return 0;
}

/**
 * l3_interrupt_handler() - interrupt handler for l3 events
 * @irq:	irq number
 * @_l3:	pointer to l3 structure
 *
 * Interrupt Handler for L3 error detection.
 *	1) Identify the L3 clockdomain partition to which the error belongs to.
 *	2) Identify the slave where the error information is logged
 *	... handle the slave event..
 *	7) if the slave is unknown, mask out the slave.
 */
static irqreturn_t l3_interrupt_handler(int irq, void *_l3)
{
	struct omap_l3 *l3 = _l3;
	int inttype, i, ret;
	int err_src = 0;
	u32 err_reg, mask_val;
	void __iomem *base, *mask_reg;
	struct l3_flagmux_data *flag_mux;

159
	/* Get the Type of interrupt */
160
	inttype = irq == l3->app_irq ? L3_APPLICATION_ERROR : L3_DEBUG_ERROR;
161

162
	for (i = 0; i < l3->num_modules; i++) {
163 164 165 166
		/*
		 * Read the regerr register of the clock domain
		 * to determine the source
		 */
167
		base = l3->l3_base[i];
168 169
		flag_mux = l3->l3_flagmux[i];
		err_reg = readl_relaxed(base + flag_mux->offset +
170
					L3_FLAGMUX_REGERR0 + (inttype << 3));
171

172 173 174
		err_reg &= ~(inttype ? flag_mux->mask_app_bits :
				flag_mux->mask_dbg_bits);

175 176 177
		/* Get the corresponding error and analyse */
		if (err_reg) {
			/* Identify the source from control status register */
178
			err_src = __ffs(err_reg);
179

180
			ret = l3_handle_target(l3, base, flag_mux, err_src);
181

182
			/*
183 184 185 186
			 * Certain plaforms may have "undocumented" status
			 * pending on boot. So dont generate a severe warning
			 * here. Just mask it off to prevent the error from
			 * reoccuring and locking up the system.
187
			 */
188
			if (ret) {
189 190 191 192 193
				dev_err(l3->dev,
					"L3 %s error: target %d mod:%d %s\n",
					inttype ? "debug" : "application",
					err_src, i, "(unclearable)");

194
				mask_reg = base + flag_mux->offset +
195 196 197 198
					   L3_FLAGMUX_MASK0 + (inttype << 3);
				mask_val = readl_relaxed(mask_reg);
				mask_val &= ~(1 << err_src);
				writel_relaxed(mask_val, mask_reg);
199 200 201 202 203 204

				/* Mark these bits as to be ignored */
				if (inttype)
					flag_mux->mask_app_bits |= 1 << err_src;
				else
					flag_mux->mask_dbg_bits |= 1 << err_src;
205 206
			}

207 208
			/* Error found so break the for loop */
			break;
209 210 211 212 213
		}
	}
	return IRQ_HANDLED;
}

214 215 216 217 218 219
static const struct of_device_id l3_noc_match[] = {
	{.compatible = "ti,omap4-l3-noc", .data = &omap_l3_data},
	{},
};
MODULE_DEVICE_TABLE(of, l3_noc_match);

220
static int omap_l3_probe(struct platform_device *pdev)
221
{
222
	const struct of_device_id *of_id;
223
	static struct omap_l3 *l3;
224
	int ret, i;
225

226 227 228 229 230 231
	of_id = of_match_device(l3_noc_match, &pdev->dev);
	if (!of_id) {
		dev_err(&pdev->dev, "OF data missing\n");
		return -EINVAL;
	}

232
	l3 = devm_kzalloc(&pdev->dev, sizeof(*l3), GFP_KERNEL);
233
	if (!l3)
234
		return -ENOMEM;
235

236
	memcpy(l3, of_id->data, sizeof(*l3));
237
	l3->dev = &pdev->dev;
238 239
	platform_set_drvdata(pdev, l3);

240
	/* Get mem resources */
241
	for (i = 0; i < l3->num_modules; i++) {
242 243
		struct resource	*res = platform_get_resource(pdev,
							     IORESOURCE_MEM, i);
244

245 246
		l3->l3_base[i] = devm_ioremap_resource(&pdev->dev, res);
		if (IS_ERR(l3->l3_base[i])) {
247
			dev_err(l3->dev, "ioremap %d failed\n", i);
248 249
			return PTR_ERR(l3->l3_base[i]);
		}
250 251 252 253 254
	}

	/*
	 * Setup interrupt Handlers
	 */
255
	l3->debug_irq = platform_get_irq(pdev, 0);
256
	ret = devm_request_irq(l3->dev, l3->debug_irq, l3_interrupt_handler,
257
			       IRQF_DISABLED, "l3-dbg-irq", l3);
258
	if (ret) {
259
		dev_err(l3->dev, "request_irq failed for %d\n",
260
			l3->debug_irq);
261
		return ret;
262 263
	}

264
	l3->app_irq = platform_get_irq(pdev, 1);
265
	ret = devm_request_irq(l3->dev, l3->app_irq, l3_interrupt_handler,
266 267
			       IRQF_DISABLED, "l3-app-irq", l3);
	if (ret)
268
		dev_err(l3->dev, "request_irq failed for %d\n", l3->app_irq);
269

270 271 272
	return ret;
}

273 274
static struct platform_driver omap_l3_driver = {
	.probe		= omap_l3_probe,
275 276 277
	.driver		= {
		.name		= "omap_l3_noc",
		.owner		= THIS_MODULE,
278
		.of_match_table = of_match_ptr(l3_noc_match),
279 280 281
	},
};

282
static int __init omap_l3_init(void)
283
{
284
	return platform_driver_register(&omap_l3_driver);
285
}
286
postcore_initcall_sync(omap_l3_init);
287

288
static void __exit omap_l3_exit(void)
289
{
290
	platform_driver_unregister(&omap_l3_driver);
291
}
292
module_exit(omap_l3_exit);