1 /* 2 * OMAP2+ common Power & Reset Management (PRM) IP block functions 3 * 4 * Copyright (C) 2011 Texas Instruments, Inc. 5 * Tero Kristo <t-kristo@ti.com> 6 * 7 * This program is free software; you can redistribute it and/or modify 8 * it under the terms of the GNU General Public License version 2 as 9 * published by the Free Software Foundation. 10 * 11 * 12 * For historical purposes, the API used to configure the PRM 13 * interrupt handler refers to it as the "PRCM interrupt." The 14 * underlying registers are located in the PRM on OMAP3/4. 15 * 16 * XXX This code should eventually be moved to a PRM driver. 17 */ 18 19 #include <linux/kernel.h> 20 #include <linux/module.h> 21 #include <linux/init.h> 22 #include <linux/io.h> 23 #include <linux/irq.h> 24 #include <linux/interrupt.h> 25 #include <linux/slab.h> 26 27 #include <plat/common.h> 28 #include <plat/prcm.h> 29 30 #include "prm2xxx_3xxx.h" 31 #include "prm44xx.h" 32 33 /* 34 * OMAP_PRCM_MAX_NR_PENDING_REG: maximum number of PRM_IRQ*_MPU regs 35 * XXX this is technically not needed, since 36 * omap_prcm_register_chain_handler() could allocate this based on the 37 * actual amount of memory needed for the SoC 38 */ 39 #define OMAP_PRCM_MAX_NR_PENDING_REG 2 40 41 /* 42 * prcm_irq_chips: an array of all of the "generic IRQ chips" in use 43 * by the PRCM interrupt handler code. There will be one 'chip' per 44 * PRM_{IRQSTATUS,IRQENABLE}_MPU register pair. (So OMAP3 will have 45 * one "chip" and OMAP4 will have two.) 46 */ 47 static struct irq_chip_generic **prcm_irq_chips; 48 49 /* 50 * prcm_irq_setup: the PRCM IRQ parameters for the hardware the code 51 * is currently running on. Defined and passed by initialization code 52 * that calls omap_prcm_register_chain_handler(). 53 */ 54 static struct omap_prcm_irq_setup *prcm_irq_setup; 55 56 /* Private functions */ 57 58 /* 59 * Move priority events from events to priority_events array 60 */ 61 static void omap_prcm_events_filter_priority(unsigned long *events, 62 unsigned long *priority_events) 63 { 64 int i; 65 66 for (i = 0; i < prcm_irq_setup->nr_regs; i++) { 67 priority_events[i] = 68 events[i] & prcm_irq_setup->priority_mask[i]; 69 events[i] ^= priority_events[i]; 70 } 71 } 72 73 /* 74 * PRCM Interrupt Handler 75 * 76 * This is a common handler for the OMAP PRCM interrupts. Pending 77 * interrupts are detected by a call to prcm_pending_events and 78 * dispatched accordingly. Clearing of the wakeup events should be 79 * done by the SoC specific individual handlers. 80 */ 81 static void omap_prcm_irq_handler(unsigned int irq, struct irq_desc *desc) 82 { 83 unsigned long pending[OMAP_PRCM_MAX_NR_PENDING_REG]; 84 unsigned long priority_pending[OMAP_PRCM_MAX_NR_PENDING_REG]; 85 struct irq_chip *chip = irq_desc_get_chip(desc); 86 unsigned int virtirq; 87 int nr_irq = prcm_irq_setup->nr_regs * 32; 88 89 /* 90 * If we are suspended, mask all interrupts from PRCM level, 91 * this does not ack them, and they will be pending until we 92 * re-enable the interrupts, at which point the 93 * omap_prcm_irq_handler will be executed again. The 94 * _save_and_clear_irqen() function must ensure that the PRM 95 * write to disable all IRQs has reached the PRM before 96 * returning, or spurious PRCM interrupts may occur during 97 * suspend. 98 */ 99 if (prcm_irq_setup->suspended) { 100 prcm_irq_setup->save_and_clear_irqen(prcm_irq_setup->saved_mask); 101 prcm_irq_setup->suspend_save_flag = true; 102 } 103 104 /* 105 * Loop until all pending irqs are handled, since 106 * generic_handle_irq() can cause new irqs to come 107 */ 108 while (!prcm_irq_setup->suspended) { 109 prcm_irq_setup->read_pending_irqs(pending); 110 111 /* No bit set, then all IRQs are handled */ 112 if (find_first_bit(pending, nr_irq) >= nr_irq) 113 break; 114 115 omap_prcm_events_filter_priority(pending, priority_pending); 116 117 /* 118 * Loop on all currently pending irqs so that new irqs 119 * cannot starve previously pending irqs 120 */ 121 122 /* Serve priority events first */ 123 for_each_set_bit(virtirq, priority_pending, nr_irq) 124 generic_handle_irq(prcm_irq_setup->base_irq + virtirq); 125 126 /* Serve normal events next */ 127 for_each_set_bit(virtirq, pending, nr_irq) 128 generic_handle_irq(prcm_irq_setup->base_irq + virtirq); 129 } 130 if (chip->irq_ack) 131 chip->irq_ack(&desc->irq_data); 132 if (chip->irq_eoi) 133 chip->irq_eoi(&desc->irq_data); 134 chip->irq_unmask(&desc->irq_data); 135 136 prcm_irq_setup->ocp_barrier(); /* avoid spurious IRQs */ 137 } 138 139 /* Public functions */ 140 141 /** 142 * omap_prcm_event_to_irq - given a PRCM event name, returns the 143 * corresponding IRQ on which the handler should be registered 144 * @name: name of the PRCM interrupt bit to look up - see struct omap_prcm_irq 145 * 146 * Returns the Linux internal IRQ ID corresponding to @name upon success, 147 * or -ENOENT upon failure. 148 */ 149 int omap_prcm_event_to_irq(const char *name) 150 { 151 int i; 152 153 if (!prcm_irq_setup || !name) 154 return -ENOENT; 155 156 for (i = 0; i < prcm_irq_setup->nr_irqs; i++) 157 if (!strcmp(prcm_irq_setup->irqs[i].name, name)) 158 return prcm_irq_setup->base_irq + 159 prcm_irq_setup->irqs[i].offset; 160 161 return -ENOENT; 162 } 163 164 /** 165 * omap_prcm_irq_cleanup - reverses memory allocated and other steps 166 * done by omap_prcm_register_chain_handler() 167 * 168 * No return value. 169 */ 170 void omap_prcm_irq_cleanup(void) 171 { 172 int i; 173 174 if (!prcm_irq_setup) { 175 pr_err("PRCM: IRQ handler not initialized; cannot cleanup\n"); 176 return; 177 } 178 179 if (prcm_irq_chips) { 180 for (i = 0; i < prcm_irq_setup->nr_regs; i++) { 181 if (prcm_irq_chips[i]) 182 irq_remove_generic_chip(prcm_irq_chips[i], 183 0xffffffff, 0, 0); 184 prcm_irq_chips[i] = NULL; 185 } 186 kfree(prcm_irq_chips); 187 prcm_irq_chips = NULL; 188 } 189 190 kfree(prcm_irq_setup->saved_mask); 191 prcm_irq_setup->saved_mask = NULL; 192 193 kfree(prcm_irq_setup->priority_mask); 194 prcm_irq_setup->priority_mask = NULL; 195 196 irq_set_chained_handler(prcm_irq_setup->irq, NULL); 197 198 if (prcm_irq_setup->base_irq > 0) 199 irq_free_descs(prcm_irq_setup->base_irq, 200 prcm_irq_setup->nr_regs * 32); 201 prcm_irq_setup->base_irq = 0; 202 } 203 204 void omap_prcm_irq_prepare(void) 205 { 206 prcm_irq_setup->suspended = true; 207 } 208 209 void omap_prcm_irq_complete(void) 210 { 211 prcm_irq_setup->suspended = false; 212 213 /* If we have not saved the masks, do not attempt to restore */ 214 if (!prcm_irq_setup->suspend_save_flag) 215 return; 216 217 prcm_irq_setup->suspend_save_flag = false; 218 219 /* 220 * Re-enable all masked PRCM irq sources, this causes the PRCM 221 * interrupt to fire immediately if the events were masked 222 * previously in the chain handler 223 */ 224 prcm_irq_setup->restore_irqen(prcm_irq_setup->saved_mask); 225 } 226 227 /** 228 * omap_prcm_register_chain_handler - initializes the prcm chained interrupt 229 * handler based on provided parameters 230 * @irq_setup: hardware data about the underlying PRM/PRCM 231 * 232 * Set up the PRCM chained interrupt handler on the PRCM IRQ. Sets up 233 * one generic IRQ chip per PRM interrupt status/enable register pair. 234 * Returns 0 upon success, -EINVAL if called twice or if invalid 235 * arguments are passed, or -ENOMEM on any other error. 236 */ 237 int omap_prcm_register_chain_handler(struct omap_prcm_irq_setup *irq_setup) 238 { 239 int nr_regs; 240 u32 mask[OMAP_PRCM_MAX_NR_PENDING_REG]; 241 int offset, i; 242 struct irq_chip_generic *gc; 243 struct irq_chip_type *ct; 244 245 if (!irq_setup) 246 return -EINVAL; 247 248 nr_regs = irq_setup->nr_regs; 249 250 if (prcm_irq_setup) { 251 pr_err("PRCM: already initialized; won't reinitialize\n"); 252 return -EINVAL; 253 } 254 255 if (nr_regs > OMAP_PRCM_MAX_NR_PENDING_REG) { 256 pr_err("PRCM: nr_regs too large\n"); 257 return -EINVAL; 258 } 259 260 prcm_irq_setup = irq_setup; 261 262 prcm_irq_chips = kzalloc(sizeof(void *) * nr_regs, GFP_KERNEL); 263 prcm_irq_setup->saved_mask = kzalloc(sizeof(u32) * nr_regs, GFP_KERNEL); 264 prcm_irq_setup->priority_mask = kzalloc(sizeof(u32) * nr_regs, 265 GFP_KERNEL); 266 267 if (!prcm_irq_chips || !prcm_irq_setup->saved_mask || 268 !prcm_irq_setup->priority_mask) { 269 pr_err("PRCM: kzalloc failed\n"); 270 goto err; 271 } 272 273 memset(mask, 0, sizeof(mask)); 274 275 for (i = 0; i < irq_setup->nr_irqs; i++) { 276 offset = irq_setup->irqs[i].offset; 277 mask[offset >> 5] |= 1 << (offset & 0x1f); 278 if (irq_setup->irqs[i].priority) 279 irq_setup->priority_mask[offset >> 5] |= 280 1 << (offset & 0x1f); 281 } 282 283 irq_set_chained_handler(irq_setup->irq, omap_prcm_irq_handler); 284 285 irq_setup->base_irq = irq_alloc_descs(-1, 0, irq_setup->nr_regs * 32, 286 0); 287 288 if (irq_setup->base_irq < 0) { 289 pr_err("PRCM: failed to allocate irq descs: %d\n", 290 irq_setup->base_irq); 291 goto err; 292 } 293 294 for (i = 0; i < irq_setup->nr_regs; i++) { 295 gc = irq_alloc_generic_chip("PRCM", 1, 296 irq_setup->base_irq + i * 32, prm_base, 297 handle_level_irq); 298 299 if (!gc) { 300 pr_err("PRCM: failed to allocate generic chip\n"); 301 goto err; 302 } 303 ct = gc->chip_types; 304 ct->chip.irq_ack = irq_gc_ack_set_bit; 305 ct->chip.irq_mask = irq_gc_mask_clr_bit; 306 ct->chip.irq_unmask = irq_gc_mask_set_bit; 307 308 ct->regs.ack = irq_setup->ack + i * 4; 309 ct->regs.mask = irq_setup->mask + i * 4; 310 311 irq_setup_generic_chip(gc, mask[i], 0, IRQ_NOREQUEST, 0); 312 prcm_irq_chips[i] = gc; 313 } 314 315 return 0; 316 317 err: 318 omap_prcm_irq_cleanup(); 319 return -ENOMEM; 320 } 321 322 /* 323 * Stubbed functions so that common files continue to build when 324 * custom builds are used 325 * XXX These are temporary and should be removed at the earliest possible 326 * opportunity 327 */ 328 u32 __weak omap2_prm_read_mod_reg(s16 module, u16 idx) 329 { 330 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 331 return 0; 332 } 333 334 void __weak omap2_prm_write_mod_reg(u32 val, s16 module, u16 idx) 335 { 336 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 337 } 338 339 u32 __weak omap2_prm_rmw_mod_reg_bits(u32 mask, u32 bits, 340 s16 module, s16 idx) 341 { 342 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 343 return 0; 344 } 345 346 u32 __weak omap2_prm_set_mod_reg_bits(u32 bits, s16 module, s16 idx) 347 { 348 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 349 return 0; 350 } 351 352 u32 __weak omap2_prm_clear_mod_reg_bits(u32 bits, s16 module, s16 idx) 353 { 354 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 355 return 0; 356 } 357 358 u32 __weak omap2_prm_read_mod_bits_shift(s16 domain, s16 idx, u32 mask) 359 { 360 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 361 return 0; 362 } 363 364 int __weak omap2_prm_is_hardreset_asserted(s16 prm_mod, u8 shift) 365 { 366 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 367 return 0; 368 } 369 370 int __weak omap2_prm_assert_hardreset(s16 prm_mod, u8 shift) 371 { 372 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 373 return 0; 374 } 375 376 int __weak omap2_prm_deassert_hardreset(s16 prm_mod, u8 rst_shift, 377 u8 st_shift) 378 { 379 WARN(1, "prm: omap2xxx/omap3xxx specific function called on non-omap2xxx/3xxx\n"); 380 return 0; 381 } 382 383