prm_common.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. /*
  2. * OMAP2+ common Power & Reset Management (PRM) IP block functions
  3. *
  4. * Copyright (C) 2011 Texas Instruments, Inc.
  5. * Tero Kristo <t-kristo@ti.com>
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License version 2 as
  9. * published by the Free Software Foundation.
  10. *
  11. *
  12. * For historical purposes, the API used to configure the PRM
  13. * interrupt handler refers to it as the "PRCM interrupt." The
  14. * underlying registers are located in the PRM on OMAP3/4.
  15. *
  16. * XXX This code should eventually be moved to a PRM driver.
  17. */
  18. #include <linux/kernel.h>
  19. #include <linux/module.h>
  20. #include <linux/init.h>
  21. #include <linux/io.h>
  22. #include <linux/irq.h>
  23. #include <linux/interrupt.h>
  24. #include <linux/slab.h>
  25. #include <plat/common.h>
  26. #include <plat/prcm.h>
  27. #include <plat/irqs.h>
  28. #include "prm2xxx_3xxx.h"
  29. #include "prm44xx.h"
  30. /*
  31. * OMAP_PRCM_MAX_NR_PENDING_REG: maximum number of PRM_IRQ*_MPU regs
  32. * XXX this is technically not needed, since
  33. * omap_prcm_register_chain_handler() could allocate this based on the
  34. * actual amount of memory needed for the SoC
  35. */
  36. #define OMAP_PRCM_MAX_NR_PENDING_REG 2
  37. /*
  38. * prcm_irq_chips: an array of all of the "generic IRQ chips" in use
  39. * by the PRCM interrupt handler code. There will be one 'chip' per
  40. * PRM_{IRQSTATUS,IRQENABLE}_MPU register pair. (So OMAP3 will have
  41. * one "chip" and OMAP4 will have two.)
  42. */
  43. static struct irq_chip_generic **prcm_irq_chips;
  44. /*
  45. * prcm_irq_setup: the PRCM IRQ parameters for the hardware the code
  46. * is currently running on. Defined and passed by initialization code
  47. * that calls omap_prcm_register_chain_handler().
  48. */
  49. static struct omap_prcm_irq_setup *prcm_irq_setup;
  50. /* Private functions */
  51. /*
  52. * Move priority events from events to priority_events array
  53. */
  54. static void omap_prcm_events_filter_priority(unsigned long *events,
  55. unsigned long *priority_events)
  56. {
  57. int i;
  58. for (i = 0; i < prcm_irq_setup->nr_regs; i++) {
  59. priority_events[i] =
  60. events[i] & prcm_irq_setup->priority_mask[i];
  61. events[i] ^= priority_events[i];
  62. }
  63. }
  64. /*
  65. * PRCM Interrupt Handler
  66. *
  67. * This is a common handler for the OMAP PRCM interrupts. Pending
  68. * interrupts are detected by a call to prcm_pending_events and
  69. * dispatched accordingly. Clearing of the wakeup events should be
  70. * done by the SoC specific individual handlers.
  71. */
  72. static void omap_prcm_irq_handler(unsigned int irq, struct irq_desc *desc)
  73. {
  74. unsigned long pending[OMAP_PRCM_MAX_NR_PENDING_REG];
  75. unsigned long priority_pending[OMAP_PRCM_MAX_NR_PENDING_REG];
  76. struct irq_chip *chip = irq_desc_get_chip(desc);
  77. unsigned int virtirq;
  78. int nr_irq = prcm_irq_setup->nr_regs * 32;
  79. /*
  80. * If we are suspended, mask all interrupts from PRCM level,
  81. * this does not ack them, and they will be pending until we
  82. * re-enable the interrupts, at which point the
  83. * omap_prcm_irq_handler will be executed again. The
  84. * _save_and_clear_irqen() function must ensure that the PRM
  85. * write to disable all IRQs has reached the PRM before
  86. * returning, or spurious PRCM interrupts may occur during
  87. * suspend.
  88. */
  89. if (prcm_irq_setup->suspended) {
  90. prcm_irq_setup->save_and_clear_irqen(prcm_irq_setup->saved_mask);
  91. prcm_irq_setup->suspend_save_flag = true;
  92. }
  93. /*
  94. * Loop until all pending irqs are handled, since
  95. * generic_handle_irq() can cause new irqs to come
  96. */
  97. while (!prcm_irq_setup->suspended) {
  98. prcm_irq_setup->read_pending_irqs(pending);
  99. /* No bit set, then all IRQs are handled */
  100. if (find_first_bit(pending, nr_irq) >= nr_irq)
  101. break;
  102. omap_prcm_events_filter_priority(pending, priority_pending);
  103. /*
  104. * Loop on all currently pending irqs so that new irqs
  105. * cannot starve previously pending irqs
  106. */
  107. /* Serve priority events first */
  108. for_each_set_bit(virtirq, priority_pending, nr_irq)
  109. generic_handle_irq(prcm_irq_setup->base_irq + virtirq);
  110. /* Serve normal events next */
  111. for_each_set_bit(virtirq, pending, nr_irq)
  112. generic_handle_irq(prcm_irq_setup->base_irq + virtirq);
  113. }
  114. if (chip->irq_ack)
  115. chip->irq_ack(&desc->irq_data);
  116. if (chip->irq_eoi)
  117. chip->irq_eoi(&desc->irq_data);
  118. chip->irq_unmask(&desc->irq_data);
  119. prcm_irq_setup->ocp_barrier(); /* avoid spurious IRQs */
  120. }
  121. /* Public functions */
  122. /**
  123. * omap_prcm_event_to_irq - given a PRCM event name, returns the
  124. * corresponding IRQ on which the handler should be registered
  125. * @name: name of the PRCM interrupt bit to look up - see struct omap_prcm_irq
  126. *
  127. * Returns the Linux internal IRQ ID corresponding to @name upon success,
  128. * or -ENOENT upon failure.
  129. */
  130. int omap_prcm_event_to_irq(const char *name)
  131. {
  132. int i;
  133. if (!prcm_irq_setup || !name)
  134. return -ENOENT;
  135. for (i = 0; i < prcm_irq_setup->nr_irqs; i++)
  136. if (!strcmp(prcm_irq_setup->irqs[i].name, name))
  137. return prcm_irq_setup->base_irq +
  138. prcm_irq_setup->irqs[i].offset;
  139. return -ENOENT;
  140. }
  141. /**
  142. * omap_prcm_irq_cleanup - reverses memory allocated and other steps
  143. * done by omap_prcm_register_chain_handler()
  144. *
  145. * No return value.
  146. */
  147. void omap_prcm_irq_cleanup(void)
  148. {
  149. int i;
  150. if (!prcm_irq_setup) {
  151. pr_err("PRCM: IRQ handler not initialized; cannot cleanup\n");
  152. return;
  153. }
  154. if (prcm_irq_chips) {
  155. for (i = 0; i < prcm_irq_setup->nr_regs; i++) {
  156. if (prcm_irq_chips[i])
  157. irq_remove_generic_chip(prcm_irq_chips[i],
  158. 0xffffffff, 0, 0);
  159. prcm_irq_chips[i] = NULL;
  160. }
  161. kfree(prcm_irq_chips);
  162. prcm_irq_chips = NULL;
  163. }
  164. kfree(prcm_irq_setup->saved_mask);
  165. prcm_irq_setup->saved_mask = NULL;
  166. kfree(prcm_irq_setup->priority_mask);
  167. prcm_irq_setup->priority_mask = NULL;
  168. irq_set_chained_handler(prcm_irq_setup->irq, NULL);
  169. if (prcm_irq_setup->base_irq > 0)
  170. irq_free_descs(prcm_irq_setup->base_irq,
  171. prcm_irq_setup->nr_regs * 32);
  172. prcm_irq_setup->base_irq = 0;
  173. }
  174. void omap_prcm_irq_prepare(void)
  175. {
  176. prcm_irq_setup->suspended = true;
  177. }
  178. void omap_prcm_irq_complete(void)
  179. {
  180. prcm_irq_setup->suspended = false;
  181. /* If we have not saved the masks, do not attempt to restore */
  182. if (!prcm_irq_setup->suspend_save_flag)
  183. return;
  184. prcm_irq_setup->suspend_save_flag = false;
  185. /*
  186. * Re-enable all masked PRCM irq sources, this causes the PRCM
  187. * interrupt to fire immediately if the events were masked
  188. * previously in the chain handler
  189. */
  190. prcm_irq_setup->restore_irqen(prcm_irq_setup->saved_mask);
  191. }
  192. /**
  193. * omap_prcm_register_chain_handler - initializes the prcm chained interrupt
  194. * handler based on provided parameters
  195. * @irq_setup: hardware data about the underlying PRM/PRCM
  196. *
  197. * Set up the PRCM chained interrupt handler on the PRCM IRQ. Sets up
  198. * one generic IRQ chip per PRM interrupt status/enable register pair.
  199. * Returns 0 upon success, -EINVAL if called twice or if invalid
  200. * arguments are passed, or -ENOMEM on any other error.
  201. */
  202. int omap_prcm_register_chain_handler(struct omap_prcm_irq_setup *irq_setup)
  203. {
  204. int nr_regs;
  205. u32 mask[OMAP_PRCM_MAX_NR_PENDING_REG];
  206. int offset, i;
  207. struct irq_chip_generic *gc;
  208. struct irq_chip_type *ct;
  209. if (!irq_setup)
  210. return -EINVAL;
  211. nr_regs = irq_setup->nr_regs;
  212. if (prcm_irq_setup) {
  213. pr_err("PRCM: already initialized; won't reinitialize\n");
  214. return -EINVAL;
  215. }
  216. if (nr_regs > OMAP_PRCM_MAX_NR_PENDING_REG) {
  217. pr_err("PRCM: nr_regs too large\n");
  218. return -EINVAL;
  219. }
  220. prcm_irq_setup = irq_setup;
  221. prcm_irq_chips = kzalloc(sizeof(void *) * nr_regs, GFP_KERNEL);
  222. prcm_irq_setup->saved_mask = kzalloc(sizeof(u32) * nr_regs, GFP_KERNEL);
  223. prcm_irq_setup->priority_mask = kzalloc(sizeof(u32) * nr_regs,
  224. GFP_KERNEL);
  225. if (!prcm_irq_chips || !prcm_irq_setup->saved_mask ||
  226. !prcm_irq_setup->priority_mask) {
  227. pr_err("PRCM: kzalloc failed\n");
  228. goto err;
  229. }
  230. memset(mask, 0, sizeof(mask));
  231. for (i = 0; i < irq_setup->nr_irqs; i++) {
  232. offset = irq_setup->irqs[i].offset;
  233. mask[offset >> 5] |= 1 << (offset & 0x1f);
  234. if (irq_setup->irqs[i].priority)
  235. irq_setup->priority_mask[offset >> 5] |=
  236. 1 << (offset & 0x1f);
  237. }
  238. irq_set_chained_handler(irq_setup->irq, omap_prcm_irq_handler);
  239. irq_setup->base_irq = irq_alloc_descs(-1, 0, irq_setup->nr_regs * 32,
  240. 0);
  241. if (irq_setup->base_irq < 0) {
  242. pr_err("PRCM: failed to allocate irq descs: %d\n",
  243. irq_setup->base_irq);
  244. goto err;
  245. }
  246. for (i = 0; i < irq_setup->nr_regs; i++) {
  247. gc = irq_alloc_generic_chip("PRCM", 1,
  248. irq_setup->base_irq + i * 32, prm_base,
  249. handle_level_irq);
  250. if (!gc) {
  251. pr_err("PRCM: failed to allocate generic chip\n");
  252. goto err;
  253. }
  254. ct = gc->chip_types;
  255. ct->chip.irq_ack = irq_gc_ack_set_bit;
  256. ct->chip.irq_mask = irq_gc_mask_clr_bit;
  257. ct->chip.irq_unmask = irq_gc_mask_set_bit;
  258. ct->regs.ack = irq_setup->ack + i * 4;
  259. ct->regs.mask = irq_setup->mask + i * 4;
  260. irq_setup_generic_chip(gc, mask[i], 0, IRQ_NOREQUEST, 0);
  261. prcm_irq_chips[i] = gc;
  262. }
  263. return 0;
  264. err:
  265. omap_prcm_irq_cleanup();
  266. return -ENOMEM;
  267. }
  268. /*
  269. * Stubbed functions so that common files continue to build when
  270. * custom builds are used
  271. * XXX These are temporary and should be removed at the earliest possible
  272. * opportunity
  273. */
  274. u32 __weak omap2_prm_read_mod_reg(s16 module, u16 idx)
  275. {
  276. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  277. return 0;
  278. }
  279. void __weak omap2_prm_write_mod_reg(u32 val, s16 module, u16 idx)
  280. {
  281. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  282. }
  283. u32 __weak omap2_prm_rmw_mod_reg_bits(u32 mask, u32 bits,
  284. s16 module, s16 idx)
  285. {
  286. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  287. return 0;
  288. }
  289. u32 __weak omap2_prm_set_mod_reg_bits(u32 bits, s16 module, s16 idx)
  290. {
  291. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  292. return 0;
  293. }
  294. u32 __weak omap2_prm_clear_mod_reg_bits(u32 bits, s16 module, s16 idx)
  295. {
  296. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  297. return 0;
  298. }
  299. u32 __weak omap2_prm_read_mod_bits_shift(s16 domain, s16 idx, u32 mask)
  300. {
  301. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  302. return 0;
  303. }
  304. int __weak omap2_prm_is_hardreset_asserted(s16 prm_mod, u8 shift)
  305. {
  306. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  307. return 0;
  308. }
  309. int __weak omap2_prm_assert_hardreset(s16 prm_mod, u8 shift)
  310. {
  311. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  312. return 0;
  313. }
  314. int __weak omap2_prm_deassert_hardreset(s16 prm_mod, u8 rst_shift,
  315. u8 st_shift)
  316. {
  317. WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n");
  318. return 0;
  319. }