omap_l3_noc.c 9.0 KB
Newer Older
1
/*
2
 * OMAP L3 Interconnect error handling driver
3
 *
4
 * Copyright (C) 2011-2014 Texas Instruments Incorporated - http://www.ti.com/
5 6 7 8
 *	Santosh Shilimkar <santosh.shilimkar@ti.com>
 *	Sricharan <r.sricharan@ti.com>
 *
 * This program is free software; you can redistribute it and/or modify
9 10
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
11
 *
12 13 14
 * This program is distributed "as is" WITHOUT ANY WARRANTY of any
 * kind, whether express or implied; without even the implied warranty
 * of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15 16
 * GNU General Public License for more details.
 */
17 18
#include <linux/init.h>
#include <linux/interrupt.h>
19
#include <linux/io.h>
20
#include <linux/kernel.h>
21 22 23 24
#include <linux/module.h>
#include <linux/of_device.h>
#include <linux/of.h>
#include <linux/platform_device.h>
25 26 27 28
#include <linux/slab.h>

#include "omap_l3_noc.h"

29 30 31 32 33 34
/**
 * l3_handle_target() - Handle Target specific parse and reporting
 * @l3:		pointer to l3 struct
 * @base:	base address of clkdm
 * @flag_mux:	flagmux corresponding to the event
 * @err_src:	error source index of the slave (target)
35
 *
36 37 38 39 40 41 42
 * This does the second part of the error interrupt handling:
 *	3) Parse in the slave information
 *	4) Print the logged information.
 *	5) Add dump stack to provide kernel trace.
 *	6) Clear the source if known.
 *
 * This handles two types of errors:
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
 *	1) Custom errors in L3 :
 *		Target like DMM/FW/EMIF generates SRESP=ERR error
 *	2) Standard L3 error:
 *		- Unsupported CMD.
 *			L3 tries to access target while it is idle
 *		- OCP disconnect.
 *		- Address hole error:
 *			If DSS/ISS/FDIF/USBHOSTFS access a target where they
 *			do not have connectivity, the error is logged in
 *			their default target which is DMM2.
 *
 *	On High Secure devices, firewall errors are possible and those
 *	can be trapped as well. But the trapping is implemented as part
 *	secure software and hence need not be implemented here.
 */
58 59
static int l3_handle_target(struct omap_l3 *l3, void __iomem *base,
			    struct l3_flagmux_data *flag_mux, int err_src)
60
{
61 62
	int k;
	u32 std_err_main, clear, masterid;
63
	u8 op_code, m_req_info;
64
	void __iomem *l3_targ_base;
65
	void __iomem *l3_targ_stderr, *l3_targ_slvofslsb, *l3_targ_mstaddr;
66
	void __iomem *l3_targ_hdr, *l3_targ_info;
67
	struct l3_target_data *l3_targ_inst;
68
	struct l3_masters_data *master;
69
	char *target_name, *master_name = "UN IDENTIFIED";
70 71
	char *err_description;
	char err_string[30] = { 0 };
72
	char info_string[60] = { 0 };
73

74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
	/* We DONOT expect err_src to go out of bounds */
	BUG_ON(err_src > MAX_CLKDM_TARGETS);

	if (err_src < flag_mux->num_targ_data) {
		l3_targ_inst = &flag_mux->l3_targ[err_src];
		target_name = l3_targ_inst->name;
		l3_targ_base = base + l3_targ_inst->offset;
	} else {
		target_name = L3_TARGET_NOT_SUPPORTED;
	}

	if (target_name == L3_TARGET_NOT_SUPPORTED)
		return -ENODEV;

	/* Read the stderrlog_main_source from clk domain */
	l3_targ_stderr = l3_targ_base + L3_TARG_STDERRLOG_MAIN;
	l3_targ_slvofslsb = l3_targ_base + L3_TARG_STDERRLOG_SLVOFSLSB;

	std_err_main = readl_relaxed(l3_targ_stderr);

	switch (std_err_main & CUSTOM_ERROR) {
	case STANDARD_ERROR:
		err_description = "Standard";
		snprintf(err_string, sizeof(err_string),
			 ": At Address: 0x%08X ",
			 readl_relaxed(l3_targ_slvofslsb));

		l3_targ_mstaddr = l3_targ_base + L3_TARG_STDERRLOG_MSTADDR;
102
		l3_targ_hdr = l3_targ_base + L3_TARG_STDERRLOG_HDR;
103
		l3_targ_info = l3_targ_base + L3_TARG_STDERRLOG_INFO;
104 105 106 107 108 109 110
		break;

	case CUSTOM_ERROR:
		err_description = "Custom";

		l3_targ_mstaddr = l3_targ_base +
				  L3_TARG_STDERRLOG_CINFO_MSTADDR;
111
		l3_targ_hdr = l3_targ_base + L3_TARG_STDERRLOG_CINFO_OPCODE;
112
		l3_targ_info = l3_targ_base + L3_TARG_STDERRLOG_CINFO_INFO;
113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131
		break;

	default:
		/* Nothing to be handled here as of now */
		return 0;
	}

	/* STDERRLOG_MSTADDR Stores the NTTP master address. */
	masterid = (readl_relaxed(l3_targ_mstaddr) &
		    l3->mst_addr_mask) >> __ffs(l3->mst_addr_mask);

	for (k = 0, master = l3->l3_masters; k < l3->num_masters;
	     k++, master++) {
		if (masterid == master->id) {
			master_name = master->name;
			break;
		}
	}

132 133
	op_code = readl_relaxed(l3_targ_hdr) & 0x7;

134 135 136 137 138 139 140
	m_req_info = readl_relaxed(l3_targ_info) & 0xF;
	snprintf(info_string, sizeof(info_string),
		 ": %s in %s mode during %s access",
		 (m_req_info & BIT(0)) ? "Opcode Fetch" : "Data Access",
		 (m_req_info & BIT(1)) ? "Supervisor" : "User",
		 (m_req_info & BIT(3)) ? "Debug" : "Functional");

141
	WARN(true,
142
	     "%s:L3 %s Error: MASTER %s TARGET %s (%s)%s%s\n",
143 144 145
	     dev_name(l3->dev),
	     err_description,
	     master_name, target_name,
146
	     l3_transaction_type[op_code],
147
	     err_string, info_string);
148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175

	/* clear the std error log*/
	clear = std_err_main | CLEAR_STDERR_LOG;
	writel_relaxed(clear, l3_targ_stderr);

	return 0;
}

/**
 * l3_interrupt_handler() - interrupt handler for l3 events
 * @irq:	irq number
 * @_l3:	pointer to l3 structure
 *
 * Interrupt Handler for L3 error detection.
 *	1) Identify the L3 clockdomain partition to which the error belongs to.
 *	2) Identify the slave where the error information is logged
 *	... handle the slave event..
 *	7) if the slave is unknown, mask out the slave.
 */
static irqreturn_t l3_interrupt_handler(int irq, void *_l3)
{
	struct omap_l3 *l3 = _l3;
	int inttype, i, ret;
	int err_src = 0;
	u32 err_reg, mask_val;
	void __iomem *base, *mask_reg;
	struct l3_flagmux_data *flag_mux;

176
	/* Get the Type of interrupt */
177
	inttype = irq == l3->app_irq ? L3_APPLICATION_ERROR : L3_DEBUG_ERROR;
178

179
	for (i = 0; i < l3->num_modules; i++) {
180 181 182 183
		/*
		 * Read the regerr register of the clock domain
		 * to determine the source
		 */
184
		base = l3->l3_base[i];
185 186
		flag_mux = l3->l3_flagmux[i];
		err_reg = readl_relaxed(base + flag_mux->offset +
187
					L3_FLAGMUX_REGERR0 + (inttype << 3));
188

189 190 191
		err_reg &= ~(inttype ? flag_mux->mask_app_bits :
				flag_mux->mask_dbg_bits);

192 193 194
		/* Get the corresponding error and analyse */
		if (err_reg) {
			/* Identify the source from control status register */
195
			err_src = __ffs(err_reg);
196

197
			ret = l3_handle_target(l3, base, flag_mux, err_src);
198

199
			/*
200 201 202 203
			 * Certain plaforms may have "undocumented" status
			 * pending on boot. So dont generate a severe warning
			 * here. Just mask it off to prevent the error from
			 * reoccuring and locking up the system.
204
			 */
205
			if (ret) {
206 207 208 209 210
				dev_err(l3->dev,
					"L3 %s error: target %d mod:%d %s\n",
					inttype ? "debug" : "application",
					err_src, i, "(unclearable)");

211
				mask_reg = base + flag_mux->offset +
212 213 214 215
					   L3_FLAGMUX_MASK0 + (inttype << 3);
				mask_val = readl_relaxed(mask_reg);
				mask_val &= ~(1 << err_src);
				writel_relaxed(mask_val, mask_reg);
216 217 218 219 220 221

				/* Mark these bits as to be ignored */
				if (inttype)
					flag_mux->mask_app_bits |= 1 << err_src;
				else
					flag_mux->mask_dbg_bits |= 1 << err_src;
222 223
			}

224 225
			/* Error found so break the for loop */
			break;
226 227 228 229 230
		}
	}
	return IRQ_HANDLED;
}

231 232
static const struct of_device_id l3_noc_match[] = {
	{.compatible = "ti,omap4-l3-noc", .data = &omap_l3_data},
233
	{.compatible = "ti,dra7-l3-noc", .data = &dra_l3_data},
234 235 236 237
	{},
};
MODULE_DEVICE_TABLE(of, l3_noc_match);

238
static int omap_l3_probe(struct platform_device *pdev)
239
{
240
	const struct of_device_id *of_id;
241
	static struct omap_l3 *l3;
242
	int ret, i, res_idx;
243

244 245 246 247 248 249
	of_id = of_match_device(l3_noc_match, &pdev->dev);
	if (!of_id) {
		dev_err(&pdev->dev, "OF data missing\n");
		return -EINVAL;
	}

250
	l3 = devm_kzalloc(&pdev->dev, sizeof(*l3), GFP_KERNEL);
251
	if (!l3)
252
		return -ENOMEM;
253

254
	memcpy(l3, of_id->data, sizeof(*l3));
255
	l3->dev = &pdev->dev;
256 257
	platform_set_drvdata(pdev, l3);

258
	/* Get mem resources */
259 260 261 262 263 264 265 266 267 268
	for (i = 0, res_idx = 0; i < l3->num_modules; i++) {
		struct resource	*res;

		if (l3->l3_base[i] == L3_BASE_IS_SUBMODULE) {
			/* First entry cannot be submodule */
			BUG_ON(i == 0);
			l3->l3_base[i] = l3->l3_base[i - 1];
			continue;
		}
		res = platform_get_resource(pdev, IORESOURCE_MEM, res_idx);
269 270
		l3->l3_base[i] = devm_ioremap_resource(&pdev->dev, res);
		if (IS_ERR(l3->l3_base[i])) {
271
			dev_err(l3->dev, "ioremap %d failed\n", i);
272 273
			return PTR_ERR(l3->l3_base[i]);
		}
274
		res_idx++;
275 276 277 278 279
	}

	/*
	 * Setup interrupt Handlers
	 */
280
	l3->debug_irq = platform_get_irq(pdev, 0);
281
	ret = devm_request_irq(l3->dev, l3->debug_irq, l3_interrupt_handler,
282
			       IRQF_DISABLED, "l3-dbg-irq", l3);
283
	if (ret) {
284
		dev_err(l3->dev, "request_irq failed for %d\n",
285
			l3->debug_irq);
286
		return ret;
287 288
	}

289
	l3->app_irq = platform_get_irq(pdev, 1);
290
	ret = devm_request_irq(l3->dev, l3->app_irq, l3_interrupt_handler,
291 292
			       IRQF_DISABLED, "l3-app-irq", l3);
	if (ret)
293
		dev_err(l3->dev, "request_irq failed for %d\n", l3->app_irq);
294

295 296 297
	return ret;
}

298 299
static struct platform_driver omap_l3_driver = {
	.probe		= omap_l3_probe,
300 301 302
	.driver		= {
		.name		= "omap_l3_noc",
		.owner		= THIS_MODULE,
303
		.of_match_table = of_match_ptr(l3_noc_match),
304 305 306
	},
};

307
static int __init omap_l3_init(void)
308
{
309
	return platform_driver_register(&omap_l3_driver);
310
}
311
postcore_initcall_sync(omap_l3_init);
312

313
static void __exit omap_l3_exit(void)
314
{
315
	platform_driver_unregister(&omap_l3_driver);
316
}
317
module_exit(omap_l3_exit);