omap_l3_noc.c 7.8 KB
Newer Older
1
/*
2
 * OMAP L3 Interconnect error handling driver
3
 *
4
 * Copyright (C) 2011-2014 Texas Instruments Incorporated - http://www.ti.com/
5 6 7 8
 *	Santosh Shilimkar <santosh.shilimkar@ti.com>
 *	Sricharan <r.sricharan@ti.com>
 *
 * This program is free software; you can redistribute it and/or modify
9 10
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
11
 *
12 13 14
 * This program is distributed "as is" WITHOUT ANY WARRANTY of any
 * kind, whether express or implied; without even the implied warranty
 * of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15 16
 * GNU General Public License for more details.
 */
17 18
#include <linux/init.h>
#include <linux/interrupt.h>
19
#include <linux/io.h>
20
#include <linux/kernel.h>
21 22 23 24
#include <linux/module.h>
#include <linux/of_device.h>
#include <linux/of.h>
#include <linux/platform_device.h>
25 26 27 28
#include <linux/slab.h>

#include "omap_l3_noc.h"

29 30 31 32 33 34
/**
 * l3_handle_target() - Handle Target specific parse and reporting
 * @l3:		pointer to l3 struct
 * @base:	base address of clkdm
 * @flag_mux:	flagmux corresponding to the event
 * @err_src:	error source index of the slave (target)
35
 *
36 37 38 39 40 41 42
 * This does the second part of the error interrupt handling:
 *	3) Parse in the slave information
 *	4) Print the logged information.
 *	5) Add dump stack to provide kernel trace.
 *	6) Clear the source if known.
 *
 * This handles two types of errors:
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
 *	1) Custom errors in L3 :
 *		Target like DMM/FW/EMIF generates SRESP=ERR error
 *	2) Standard L3 error:
 *		- Unsupported CMD.
 *			L3 tries to access target while it is idle
 *		- OCP disconnect.
 *		- Address hole error:
 *			If DSS/ISS/FDIF/USBHOSTFS access a target where they
 *			do not have connectivity, the error is logged in
 *			their default target which is DMM2.
 *
 *	On High Secure devices, firewall errors are possible and those
 *	can be trapped as well. But the trapping is implemented as part
 *	secure software and hence need not be implemented here.
 */
58 59
static int l3_handle_target(struct omap_l3 *l3, void __iomem *base,
			    struct l3_flagmux_data *flag_mux, int err_src)
60
{
61 62 63
	int k;
	u32 std_err_main, clear, masterid;
	void __iomem *l3_targ_base;
64
	void __iomem *l3_targ_stderr, *l3_targ_slvofslsb, *l3_targ_mstaddr;
65
	struct l3_target_data *l3_targ_inst;
66
	struct l3_masters_data *master;
67
	char *target_name, *master_name = "UN IDENTIFIED";
68 69
	char *err_description;
	char err_string[30] = { 0 };
70

71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
	/* We DONOT expect err_src to go out of bounds */
	BUG_ON(err_src > MAX_CLKDM_TARGETS);

	if (err_src < flag_mux->num_targ_data) {
		l3_targ_inst = &flag_mux->l3_targ[err_src];
		target_name = l3_targ_inst->name;
		l3_targ_base = base + l3_targ_inst->offset;
	} else {
		target_name = L3_TARGET_NOT_SUPPORTED;
	}

	if (target_name == L3_TARGET_NOT_SUPPORTED)
		return -ENODEV;

	/* Read the stderrlog_main_source from clk domain */
	l3_targ_stderr = l3_targ_base + L3_TARG_STDERRLOG_MAIN;
	l3_targ_slvofslsb = l3_targ_base + L3_TARG_STDERRLOG_SLVOFSLSB;

	std_err_main = readl_relaxed(l3_targ_stderr);

	switch (std_err_main & CUSTOM_ERROR) {
	case STANDARD_ERROR:
		err_description = "Standard";
		snprintf(err_string, sizeof(err_string),
			 ": At Address: 0x%08X ",
			 readl_relaxed(l3_targ_slvofslsb));

		l3_targ_mstaddr = l3_targ_base + L3_TARG_STDERRLOG_MSTADDR;
		break;

	case CUSTOM_ERROR:
		err_description = "Custom";

		l3_targ_mstaddr = l3_targ_base +
				  L3_TARG_STDERRLOG_CINFO_MSTADDR;
		break;

	default:
		/* Nothing to be handled here as of now */
		return 0;
	}

	/* STDERRLOG_MSTADDR Stores the NTTP master address. */
	masterid = (readl_relaxed(l3_targ_mstaddr) &
		    l3->mst_addr_mask) >> __ffs(l3->mst_addr_mask);

	for (k = 0, master = l3->l3_masters; k < l3->num_masters;
	     k++, master++) {
		if (masterid == master->id) {
			master_name = master->name;
			break;
		}
	}

	WARN(true,
	     "%s:L3 %s Error: MASTER %s TARGET %s%s\n",
	     dev_name(l3->dev),
	     err_description,
	     master_name, target_name,
	     err_string);

	/* clear the std error log*/
	clear = std_err_main | CLEAR_STDERR_LOG;
	writel_relaxed(clear, l3_targ_stderr);

	return 0;
}

/**
 * l3_interrupt_handler() - interrupt handler for l3 events
 * @irq:	irq number
 * @_l3:	pointer to l3 structure
 *
 * Interrupt Handler for L3 error detection.
 *	1) Identify the L3 clockdomain partition to which the error belongs to.
 *	2) Identify the slave where the error information is logged
 *	... handle the slave event..
 *	7) if the slave is unknown, mask out the slave.
 */
static irqreturn_t l3_interrupt_handler(int irq, void *_l3)
{
	struct omap_l3 *l3 = _l3;
	int inttype, i, ret;
	int err_src = 0;
	u32 err_reg, mask_val;
	void __iomem *base, *mask_reg;
	struct l3_flagmux_data *flag_mux;

159
	/* Get the Type of interrupt */
160
	inttype = irq == l3->app_irq ? L3_APPLICATION_ERROR : L3_DEBUG_ERROR;
161

162
	for (i = 0; i < l3->num_modules; i++) {
163 164 165 166
		/*
		 * Read the regerr register of the clock domain
		 * to determine the source
		 */
167
		base = l3->l3_base[i];
168 169
		flag_mux = l3->l3_flagmux[i];
		err_reg = readl_relaxed(base + flag_mux->offset +
170
					L3_FLAGMUX_REGERR0 + (inttype << 3));
171 172 173 174

		/* Get the corresponding error and analyse */
		if (err_reg) {
			/* Identify the source from control status register */
175
			err_src = __ffs(err_reg);
176

177
			ret = l3_handle_target(l3, base, flag_mux, err_src);
178

179
			/*
180 181 182 183
			 * Certain plaforms may have "undocumented" status
			 * pending on boot. So dont generate a severe warning
			 * here. Just mask it off to prevent the error from
			 * reoccuring and locking up the system.
184
			 */
185
			if (ret) {
186 187 188 189 190
				dev_err(l3->dev,
					"L3 %s error: target %d mod:%d %s\n",
					inttype ? "debug" : "application",
					err_src, i, "(unclearable)");

191
				mask_reg = base + flag_mux->offset +
192 193 194 195 196 197
					   L3_FLAGMUX_MASK0 + (inttype << 3);
				mask_val = readl_relaxed(mask_reg);
				mask_val &= ~(1 << err_src);
				writel_relaxed(mask_val, mask_reg);
			}

198 199
			/* Error found so break the for loop */
			break;
200 201 202 203 204
		}
	}
	return IRQ_HANDLED;
}

205 206 207 208 209 210
static const struct of_device_id l3_noc_match[] = {
	{.compatible = "ti,omap4-l3-noc", .data = &omap_l3_data},
	{},
};
MODULE_DEVICE_TABLE(of, l3_noc_match);

211
static int omap_l3_probe(struct platform_device *pdev)
212
{
213
	const struct of_device_id *of_id;
214
	static struct omap_l3 *l3;
215
	int ret, i;
216

217 218 219 220 221 222
	of_id = of_match_device(l3_noc_match, &pdev->dev);
	if (!of_id) {
		dev_err(&pdev->dev, "OF data missing\n");
		return -EINVAL;
	}

223
	l3 = devm_kzalloc(&pdev->dev, sizeof(*l3), GFP_KERNEL);
224
	if (!l3)
225
		return -ENOMEM;
226

227
	memcpy(l3, of_id->data, sizeof(*l3));
228
	l3->dev = &pdev->dev;
229 230
	platform_set_drvdata(pdev, l3);

231
	/* Get mem resources */
232
	for (i = 0; i < l3->num_modules; i++) {
233 234
		struct resource	*res = platform_get_resource(pdev,
							     IORESOURCE_MEM, i);
235

236 237
		l3->l3_base[i] = devm_ioremap_resource(&pdev->dev, res);
		if (IS_ERR(l3->l3_base[i])) {
238
			dev_err(l3->dev, "ioremap %d failed\n", i);
239 240
			return PTR_ERR(l3->l3_base[i]);
		}
241 242 243 244 245
	}

	/*
	 * Setup interrupt Handlers
	 */
246
	l3->debug_irq = platform_get_irq(pdev, 0);
247
	ret = devm_request_irq(l3->dev, l3->debug_irq, l3_interrupt_handler,
248
			       IRQF_DISABLED, "l3-dbg-irq", l3);
249
	if (ret) {
250
		dev_err(l3->dev, "request_irq failed for %d\n",
251
			l3->debug_irq);
252
		return ret;
253 254
	}

255
	l3->app_irq = platform_get_irq(pdev, 1);
256
	ret = devm_request_irq(l3->dev, l3->app_irq, l3_interrupt_handler,
257 258
			       IRQF_DISABLED, "l3-app-irq", l3);
	if (ret)
259
		dev_err(l3->dev, "request_irq failed for %d\n", l3->app_irq);
260

261 262 263
	return ret;
}

264 265
static struct platform_driver omap_l3_driver = {
	.probe		= omap_l3_probe,
266 267 268
	.driver		= {
		.name		= "omap_l3_noc",
		.owner		= THIS_MODULE,
269
		.of_match_table = of_match_ptr(l3_noc_match),
270 271 272
	},
};

273
static int __init omap_l3_init(void)
274
{
275
	return platform_driver_register(&omap_l3_driver);
276
}
277
postcore_initcall_sync(omap_l3_init);
278

279
static void __exit omap_l3_exit(void)
280
{
281
	platform_driver_unregister(&omap_l3_driver);
282
}
283
module_exit(omap_l3_exit);