crime.c revision 1.17 1 1.17 sekiya /* $NetBSD: crime.c,v 1.17 2004/01/18 00:54:55 sekiya Exp $ */
2 1.1 soren
3 1.1 soren /*
4 1.17 sekiya * Copyright (c) 2004 Christopher SEKIYA
5 1.1 soren * Copyright (c) 2000 Soren S. Jorvang
6 1.1 soren * All rights reserved.
7 1.5 simonb *
8 1.1 soren * Redistribution and use in source and binary forms, with or without
9 1.1 soren * modification, are permitted provided that the following conditions
10 1.1 soren * are met:
11 1.1 soren * 1. Redistributions of source code must retain the above copyright
12 1.1 soren * notice, this list of conditions and the following disclaimer.
13 1.1 soren * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 soren * notice, this list of conditions and the following disclaimer in the
15 1.1 soren * documentation and/or other materials provided with the distribution.
16 1.1 soren * 3. All advertising materials mentioning features or use of this software
17 1.1 soren * must display the following acknowledgement:
18 1.1 soren * This product includes software developed for the
19 1.14 keihan * NetBSD Project. See http://www.NetBSD.org/ for
20 1.1 soren * information about NetBSD.
21 1.1 soren * 4. The name of the author may not be used to endorse or promote products
22 1.1 soren * derived from this software without specific prior written permission.
23 1.5 simonb *
24 1.1 soren * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
25 1.1 soren * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
26 1.1 soren * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
27 1.1 soren * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
28 1.1 soren * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
29 1.1 soren * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
30 1.1 soren * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
31 1.1 soren * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32 1.1 soren * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
33 1.1 soren * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 1.1 soren */
35 1.1 soren
36 1.1 soren /*
37 1.1 soren * O2 CRIME
38 1.1 soren */
39 1.12 lukem
40 1.12 lukem #include <sys/cdefs.h>
41 1.17 sekiya __KERNEL_RCSID(0, "$NetBSD: crime.c,v 1.17 2004/01/18 00:54:55 sekiya Exp $");
42 1.1 soren
43 1.1 soren #include <sys/param.h>
44 1.1 soren #include <sys/device.h>
45 1.1 soren #include <sys/systm.h>
46 1.17 sekiya #include <sys/kernel.h>
47 1.1 soren
48 1.1 soren #include <machine/cpu.h>
49 1.1 soren #include <machine/locore.h>
50 1.1 soren #include <machine/autoconf.h>
51 1.1 soren #include <machine/bus.h>
52 1.2 soren #include <machine/intr.h>
53 1.4 thorpej #include <machine/machtype.h>
54 1.16 sekiya #include <machine/sysconf.h>
55 1.1 soren
56 1.13 tsutsui #include <sgimips/dev/crimevar.h>
57 1.1 soren #include <sgimips/dev/crimereg.h>
58 1.1 soren
59 1.1 soren #include "locators.h"
60 1.1 soren
61 1.1 soren static int crime_match(struct device *, struct cfdata *, void *);
62 1.1 soren static void crime_attach(struct device *, struct device *, void *);
63 1.17 sekiya void crime_bus_reset(void);
64 1.17 sekiya void crime_watchdog_reset(void);
65 1.17 sekiya void crime_watchdog_disable(void);
66 1.17 sekiya void crime_intr(u_int32_t, u_int32_t, u_int32_t, u_int32_t);
67 1.17 sekiya void *crime_intr_establish(int, int, int (*)(void *), void *);
68 1.17 sekiya extern void mace_intr(int); /* XXX */
69 1.1 soren
70 1.17 sekiya static bus_space_tag_t crm_iot;
71 1.17 sekiya static bus_space_handle_t crm_ioh;
72 1.13 tsutsui
73 1.13 tsutsui CFATTACH_DECL(crime, sizeof(struct crime_softc),
74 1.8 thorpej crime_match, crime_attach, NULL, NULL);
75 1.1 soren
76 1.10 rafal #define CRIME_NINTR 32 /* XXX */
77 1.10 rafal
78 1.10 rafal struct {
79 1.10 rafal int (*func)(void *);
80 1.10 rafal void *arg;
81 1.10 rafal } crime[CRIME_NINTR];
82 1.10 rafal
83 1.1 soren static int
84 1.17 sekiya crime_match(struct device *parent, struct cfdata *match, void *aux)
85 1.1 soren {
86 1.1 soren
87 1.1 soren /*
88 1.1 soren * The CRIME is in the O2.
89 1.1 soren */
90 1.4 thorpej if (mach_type == MACH_SGI_IP32)
91 1.4 thorpej return (1);
92 1.4 thorpej
93 1.4 thorpej return (0);
94 1.1 soren }
95 1.1 soren
96 1.1 soren static void
97 1.17 sekiya crime_attach(struct device *parent, struct device *self, void *aux)
98 1.1 soren {
99 1.1 soren struct mainbus_attach_args *ma = aux;
100 1.9 rafal u_int64_t crm_id;
101 1.17 sekiya u_int64_t baseline;
102 1.17 sekiya u_int32_t cps;
103 1.1 soren
104 1.17 sekiya crm_iot = SGIMIPS_BUS_SPACE_CRIME;
105 1.13 tsutsui
106 1.17 sekiya if (bus_space_map(crm_iot, ma->ma_addr, 0 /* XXX */,
107 1.17 sekiya BUS_SPACE_MAP_LINEAR, &crm_ioh))
108 1.13 tsutsui panic("crime_attach: can't map I/O space");
109 1.13 tsutsui
110 1.17 sekiya crm_id = bus_space_read_8(crm_iot, crm_ioh, CRIME_REV);
111 1.1 soren
112 1.10 rafal aprint_naive(": system ASIC");
113 1.10 rafal
114 1.11 rafal switch ((crm_id & CRIME_ID_IDBITS) >> CRIME_ID_IDSHIFT) {
115 1.9 rafal case 0x0b:
116 1.9 rafal aprint_normal(": rev 1.5");
117 1.9 rafal break;
118 1.1 soren
119 1.9 rafal case 0x0a:
120 1.9 rafal if ((crm_id >> 32) == 0)
121 1.9 rafal aprint_normal(": rev 1.1");
122 1.9 rafal else if ((crm_id >> 32) == 1)
123 1.9 rafal aprint_normal(": rev 1.3");
124 1.9 rafal else
125 1.9 rafal aprint_normal(": rev 1.4");
126 1.9 rafal break;
127 1.9 rafal
128 1.9 rafal case 0x00:
129 1.9 rafal aprint_normal(": Petty CRIME");
130 1.9 rafal break;
131 1.1 soren
132 1.9 rafal default:
133 1.9 rafal aprint_normal(": Unknown CRIME");
134 1.9 rafal break;
135 1.9 rafal }
136 1.9 rafal
137 1.9 rafal aprint_normal(" (CRIME_ID: %llx)\n", crm_id);
138 1.10 rafal
139 1.17 sekiya /* reset CRIME CPU & memory error registers */
140 1.17 sekiya crime_bus_reset();
141 1.17 sekiya
142 1.17 sekiya baseline = bus_space_read_8(crm_iot, crm_ioh, CRIME_TIME) & CRIME_TIME_MASK;
143 1.17 sekiya cps = mips3_cp0_count_read();
144 1.17 sekiya
145 1.17 sekiya while (((bus_space_read_8(crm_iot, crm_ioh, CRIME_TIME) & CRIME_TIME_MASK)
146 1.17 sekiya - baseline) < 50 * 1000000 / 15)
147 1.17 sekiya continue;
148 1.17 sekiya cps = mips3_cp0_count_read() - cps;
149 1.17 sekiya cps = cps / 5;
150 1.17 sekiya
151 1.17 sekiya /* Counter on R4k/R4400/R4600/R5k counts at half the CPU frequency */
152 1.17 sekiya curcpu()->ci_cpu_freq = cps * 2 * hz;
153 1.17 sekiya curcpu()->ci_cycles_per_hz = curcpu()->ci_cpu_freq / (2 * hz);
154 1.17 sekiya curcpu()->ci_divisor_delay = curcpu()->ci_cpu_freq / (2 * 1000000);
155 1.17 sekiya MIPS_SET_CI_RECIPRICAL(curcpu());
156 1.17 sekiya
157 1.13 tsutsui /* Turn on memory error and crime error interrupts.
158 1.13 tsutsui All others turned on as devices are registered. */
159 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_INTMASK,
160 1.13 tsutsui CRIME_INT_MEMERR |
161 1.13 tsutsui CRIME_INT_CRMERR |
162 1.13 tsutsui CRIME_INT_VICE |
163 1.13 tsutsui CRIME_INT_VID_OUT |
164 1.13 tsutsui CRIME_INT_VID_IN2 |
165 1.13 tsutsui CRIME_INT_VID_IN1);
166 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_INTSTAT, 0);
167 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_SOFTINT, 0);
168 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_HARDINT, 0);
169 1.17 sekiya
170 1.17 sekiya platform.bus_reset = crime_bus_reset;
171 1.17 sekiya platform.watchdog_reset = crime_watchdog_reset;
172 1.17 sekiya platform.watchdog_disable = crime_watchdog_disable;
173 1.17 sekiya platform.watchdog_enable = crime_watchdog_reset;
174 1.17 sekiya platform.intr_establish = crime_intr_establish;
175 1.17 sekiya platform.intr0 = crime_intr;
176 1.2 soren }
177 1.2 soren
178 1.2 soren /*
179 1.10 rafal * XXX: sharing interrupts?
180 1.2 soren */
181 1.2 soren
182 1.5 simonb void *
183 1.17 sekiya crime_intr_establish(int irq, int level, int (*func)(void *), void *arg)
184 1.2 soren {
185 1.10 rafal if (crime[irq].func != NULL)
186 1.10 rafal return NULL; /* panic("Cannot share CRIME interrupts!"); */
187 1.2 soren
188 1.10 rafal crime[irq].func = func;
189 1.10 rafal crime[irq].arg = arg;
190 1.2 soren
191 1.13 tsutsui crime_intr_mask(irq);
192 1.13 tsutsui
193 1.10 rafal return (void *)&crime[irq];
194 1.2 soren }
195 1.2 soren
196 1.9 rafal void
197 1.17 sekiya crime_intr(u_int32_t status, u_int32_t cause, u_int32_t pc, u_int32_t ipending)
198 1.2 soren {
199 1.17 sekiya u_int64_t crime_intmask;
200 1.17 sekiya u_int64_t crime_intstat;
201 1.17 sekiya u_int64_t crime_ipending;
202 1.2 soren int i;
203 1.2 soren
204 1.17 sekiya crime_intmask = bus_space_read_8(crm_iot, crm_ioh, CRIME_INTMASK);
205 1.17 sekiya crime_intstat = bus_space_read_8(crm_iot, crm_ioh, CRIME_INTSTAT);
206 1.17 sekiya crime_ipending = (crime_intstat & crime_intmask);
207 1.17 sekiya
208 1.17 sekiya if (crime_ipending & 0xff)
209 1.17 sekiya mace_intr(crime_ipending & 0xff);
210 1.17 sekiya
211 1.17 sekiya if (crime_ipending & 0xffff0000) {
212 1.17 sekiya /*
213 1.17 sekiya * CRIME interrupts for CPU and memory errors
214 1.17 sekiya */
215 1.17 sekiya if (crime_ipending & CRIME_INT_MEMERR) {
216 1.17 sekiya u_int64_t address =
217 1.17 sekiya bus_space_read_8(crm_iot, crm_ioh, CRIME_MEM_ERROR_ADDR);
218 1.17 sekiya u_int64_t status =
219 1.17 sekiya bus_space_read_8(crm_iot, crm_ioh, CRIME_MEM_ERROR_STAT);
220 1.17 sekiya printf("crime: memory error address %llx"
221 1.17 sekiya " status %llx\n", address << 2, status);
222 1.17 sekiya crime_bus_reset();
223 1.17 sekiya }
224 1.17 sekiya
225 1.17 sekiya if (crime_ipending & CRIME_INT_CRMERR) {
226 1.17 sekiya u_int64_t stat =
227 1.17 sekiya bus_space_read_8(crm_iot, crm_ioh, CRIME_CPU_ERROR_STAT);
228 1.17 sekiya printf("crime: cpu error %llx at"
229 1.17 sekiya " address %llx\n", stat,
230 1.17 sekiya bus_space_read_8(crm_iot, crm_ioh, CRIME_CPU_ERROR_ADDR));
231 1.17 sekiya crime_bus_reset();
232 1.17 sekiya }
233 1.2 soren }
234 1.17 sekiya
235 1.17 sekiya crime_ipending &= 0xff00;
236 1.17 sekiya
237 1.17 sekiya if (crime_ipending)
238 1.17 sekiya for (i = 0; i < CRIME_NINTR; i++) {
239 1.17 sekiya if ((crime_ipending & (1 << i)) && crime[i].func != NULL)
240 1.17 sekiya (*crime[i].func)(crime[i].arg);
241 1.17 sekiya }
242 1.9 rafal }
243 1.2 soren
244 1.13 tsutsui void
245 1.13 tsutsui crime_intr_mask(unsigned int intr)
246 1.13 tsutsui {
247 1.13 tsutsui u_int64_t mask;
248 1.13 tsutsui
249 1.17 sekiya mask = bus_space_read_8(crm_iot, crm_ioh, CRIME_INTMASK);
250 1.13 tsutsui mask |= (1 << intr);
251 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_INTMASK, mask);
252 1.17 sekiya }
253 1.17 sekiya
254 1.17 sekiya void
255 1.17 sekiya crime_bus_reset(void)
256 1.17 sekiya {
257 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_CPU_ERROR_STAT, 0);
258 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_MEM_ERROR_STAT, 0);
259 1.13 tsutsui }
260 1.16 sekiya
261 1.16 sekiya void
262 1.17 sekiya crime_watchdog_reset(void)
263 1.16 sekiya {
264 1.16 sekiya /* enable watchdog timer, clear it */
265 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh,
266 1.16 sekiya CRIME_CONTROL, CRIME_CONTROL_DOG_ENABLE);
267 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_WATCHDOG, 0);
268 1.16 sekiya }
269 1.16 sekiya
270 1.17 sekiya void
271 1.17 sekiya crime_watchdog_disable(void)
272 1.17 sekiya {
273 1.17 sekiya u_int64_t reg;
274 1.17 sekiya
275 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_WATCHDOG, 0);
276 1.17 sekiya reg = bus_space_read_8(crm_iot, crm_ioh, CRIME_CONTROL)
277 1.17 sekiya & ~CRIME_CONTROL_DOG_ENABLE;
278 1.17 sekiya bus_space_write_8(crm_iot, crm_ioh, CRIME_CONTROL, reg);
279 1.17 sekiya }
280