1 // SPDX-License-Identifier: GPL-2.0-only 2 3 /* Copyright (c) 2019-2021, The Linux Foundation. All rights reserved. */ 4 /* Copyright (c) 2021-2023 Qualcomm Innovation Center, Inc. All rights reserved. */ 5 6 #include <linux/delay.h> 7 #include <linux/dma-mapping.h> 8 #include <linux/idr.h> 9 #include <linux/interrupt.h> 10 #include <linux/list.h> 11 #include <linux/kobject.h> 12 #include <linux/kref.h> 13 #include <linux/mhi.h> 14 #include <linux/module.h> 15 #include <linux/msi.h> 16 #include <linux/mutex.h> 17 #include <linux/pci.h> 18 #include <linux/spinlock.h> 19 #include <linux/workqueue.h> 20 #include <linux/wait.h> 21 #include <drm/drm_accel.h> 22 #include <drm/drm_drv.h> 23 #include <drm/drm_file.h> 24 #include <drm/drm_gem.h> 25 #include <drm/drm_ioctl.h> 26 #include <drm/drm_managed.h> 27 #include <uapi/drm/qaic_accel.h> 28 29 #include "mhi_controller.h" 30 #include "qaic.h" 31 #include "qaic_debugfs.h" 32 #include "qaic_timesync.h" 33 #include "sahara.h" 34 35 MODULE_IMPORT_NS("DMA_BUF"); 36 37 #define PCI_DEV_AIC080 0xa080 38 #define PCI_DEV_AIC100 0xa100 39 #define QAIC_NAME "qaic" 40 #define QAIC_DESC "Qualcomm Cloud AI Accelerators" 41 #define CNTL_MAJOR 5 42 #define CNTL_MINOR 0 43 44 bool datapath_polling; 45 module_param(datapath_polling, bool, 0400); 46 MODULE_PARM_DESC(datapath_polling, "Operate the datapath in polling mode"); 47 static bool link_up; 48 static DEFINE_IDA(qaic_usrs); 49 50 static void qaicm_wq_release(struct drm_device *dev, void *res) 51 { 52 struct workqueue_struct *wq = res; 53 54 destroy_workqueue(wq); 55 } 56 57 static struct workqueue_struct *qaicm_wq_init(struct drm_device *dev, const char *name) 58 { 59 struct workqueue_struct *wq; 60 int ret; 61 62 wq = alloc_workqueue("%s", WQ_UNBOUND, 0, name); 63 if (!wq) 64 return ERR_PTR(-ENOMEM); 65 ret = drmm_add_action_or_reset(dev, qaicm_wq_release, wq); 66 if (ret) 67 return ERR_PTR(ret); 68 69 return wq; 70 } 71 72 static void qaicm_srcu_release(struct drm_device *dev, void *res) 73 { 74 struct srcu_struct *lock = res; 75 76 cleanup_srcu_struct(lock); 77 } 78 79 static int qaicm_srcu_init(struct drm_device *dev, struct srcu_struct *lock) 80 { 81 int ret; 82 83 ret = init_srcu_struct(lock); 84 if (ret) 85 return ret; 86 87 return drmm_add_action_or_reset(dev, qaicm_srcu_release, lock); 88 } 89 90 static void qaicm_pci_release(struct drm_device *dev, void *res) 91 { 92 struct qaic_device *qdev = to_qaic_device(dev); 93 94 pci_set_drvdata(qdev->pdev, NULL); 95 } 96 97 static void free_usr(struct kref *kref) 98 { 99 struct qaic_user *usr = container_of(kref, struct qaic_user, ref_count); 100 101 cleanup_srcu_struct(&usr->qddev_lock); 102 ida_free(&qaic_usrs, usr->handle); 103 kfree(usr); 104 } 105 106 static int qaic_open(struct drm_device *dev, struct drm_file *file) 107 { 108 struct qaic_drm_device *qddev = to_qaic_drm_device(dev); 109 struct qaic_device *qdev = qddev->qdev; 110 struct qaic_user *usr; 111 int rcu_id; 112 int ret; 113 114 rcu_id = srcu_read_lock(&qdev->dev_lock); 115 if (qdev->dev_state != QAIC_ONLINE) { 116 ret = -ENODEV; 117 goto dev_unlock; 118 } 119 120 usr = kmalloc(sizeof(*usr), GFP_KERNEL); 121 if (!usr) { 122 ret = -ENOMEM; 123 goto dev_unlock; 124 } 125 126 usr->handle = ida_alloc(&qaic_usrs, GFP_KERNEL); 127 if (usr->handle < 0) { 128 ret = usr->handle; 129 goto free_usr; 130 } 131 usr->qddev = qddev; 132 atomic_set(&usr->chunk_id, 0); 133 init_srcu_struct(&usr->qddev_lock); 134 kref_init(&usr->ref_count); 135 136 ret = mutex_lock_interruptible(&qddev->users_mutex); 137 if (ret) 138 goto cleanup_usr; 139 140 list_add(&usr->node, &qddev->users); 141 mutex_unlock(&qddev->users_mutex); 142 143 file->driver_priv = usr; 144 145 srcu_read_unlock(&qdev->dev_lock, rcu_id); 146 return 0; 147 148 cleanup_usr: 149 cleanup_srcu_struct(&usr->qddev_lock); 150 ida_free(&qaic_usrs, usr->handle); 151 free_usr: 152 kfree(usr); 153 dev_unlock: 154 srcu_read_unlock(&qdev->dev_lock, rcu_id); 155 return ret; 156 } 157 158 static void qaic_postclose(struct drm_device *dev, struct drm_file *file) 159 { 160 struct qaic_user *usr = file->driver_priv; 161 struct qaic_drm_device *qddev; 162 struct qaic_device *qdev; 163 int qdev_rcu_id; 164 int usr_rcu_id; 165 int i; 166 167 qddev = usr->qddev; 168 usr_rcu_id = srcu_read_lock(&usr->qddev_lock); 169 if (qddev) { 170 qdev = qddev->qdev; 171 qdev_rcu_id = srcu_read_lock(&qdev->dev_lock); 172 if (qdev->dev_state == QAIC_ONLINE) { 173 qaic_release_usr(qdev, usr); 174 for (i = 0; i < qdev->num_dbc; ++i) 175 if (qdev->dbc[i].usr && qdev->dbc[i].usr->handle == usr->handle) 176 release_dbc(qdev, i); 177 } 178 srcu_read_unlock(&qdev->dev_lock, qdev_rcu_id); 179 180 mutex_lock(&qddev->users_mutex); 181 if (!list_empty(&usr->node)) 182 list_del_init(&usr->node); 183 mutex_unlock(&qddev->users_mutex); 184 } 185 186 srcu_read_unlock(&usr->qddev_lock, usr_rcu_id); 187 kref_put(&usr->ref_count, free_usr); 188 189 file->driver_priv = NULL; 190 } 191 192 DEFINE_DRM_ACCEL_FOPS(qaic_accel_fops); 193 194 static const struct drm_ioctl_desc qaic_drm_ioctls[] = { 195 DRM_IOCTL_DEF_DRV(QAIC_MANAGE, qaic_manage_ioctl, 0), 196 DRM_IOCTL_DEF_DRV(QAIC_CREATE_BO, qaic_create_bo_ioctl, 0), 197 DRM_IOCTL_DEF_DRV(QAIC_MMAP_BO, qaic_mmap_bo_ioctl, 0), 198 DRM_IOCTL_DEF_DRV(QAIC_ATTACH_SLICE_BO, qaic_attach_slice_bo_ioctl, 0), 199 DRM_IOCTL_DEF_DRV(QAIC_EXECUTE_BO, qaic_execute_bo_ioctl, 0), 200 DRM_IOCTL_DEF_DRV(QAIC_PARTIAL_EXECUTE_BO, qaic_partial_execute_bo_ioctl, 0), 201 DRM_IOCTL_DEF_DRV(QAIC_WAIT_BO, qaic_wait_bo_ioctl, 0), 202 DRM_IOCTL_DEF_DRV(QAIC_PERF_STATS_BO, qaic_perf_stats_bo_ioctl, 0), 203 DRM_IOCTL_DEF_DRV(QAIC_DETACH_SLICE_BO, qaic_detach_slice_bo_ioctl, 0), 204 }; 205 206 static const struct drm_driver qaic_accel_driver = { 207 .driver_features = DRIVER_GEM | DRIVER_COMPUTE_ACCEL, 208 209 .name = QAIC_NAME, 210 .desc = QAIC_DESC, 211 212 .fops = &qaic_accel_fops, 213 .open = qaic_open, 214 .postclose = qaic_postclose, 215 216 .ioctls = qaic_drm_ioctls, 217 .num_ioctls = ARRAY_SIZE(qaic_drm_ioctls), 218 .gem_prime_import = qaic_gem_prime_import, 219 }; 220 221 static int qaic_create_drm_device(struct qaic_device *qdev, s32 partition_id) 222 { 223 struct qaic_drm_device *qddev = qdev->qddev; 224 struct drm_device *drm = to_drm(qddev); 225 int ret; 226 227 /* Hold off implementing partitions until the uapi is determined */ 228 if (partition_id != QAIC_NO_PARTITION) 229 return -EINVAL; 230 231 qddev->partition_id = partition_id; 232 233 ret = drm_dev_register(drm, 0); 234 if (ret) { 235 pci_dbg(qdev->pdev, "drm_dev_register failed %d\n", ret); 236 return ret; 237 } 238 239 qaic_debugfs_init(qddev); 240 241 return ret; 242 } 243 244 static void qaic_destroy_drm_device(struct qaic_device *qdev, s32 partition_id) 245 { 246 struct qaic_drm_device *qddev = qdev->qddev; 247 struct drm_device *drm = to_drm(qddev); 248 struct qaic_user *usr; 249 250 drm_dev_unregister(drm); 251 qddev->partition_id = 0; 252 /* 253 * Existing users get unresolvable errors till they close FDs. 254 * Need to sync carefully with users calling close(). The 255 * list of users can be modified elsewhere when the lock isn't 256 * held here, but the sync'ing the srcu with the mutex held 257 * could deadlock. Grab the mutex so that the list will be 258 * unmodified. The user we get will exist as long as the 259 * lock is held. Signal that the qcdev is going away, and 260 * grab a reference to the user so they don't go away for 261 * synchronize_srcu(). Then release the mutex to avoid 262 * deadlock and make sure the user has observed the signal. 263 * With the lock released, we cannot maintain any state of the 264 * user list. 265 */ 266 mutex_lock(&qddev->users_mutex); 267 while (!list_empty(&qddev->users)) { 268 usr = list_first_entry(&qddev->users, struct qaic_user, node); 269 list_del_init(&usr->node); 270 kref_get(&usr->ref_count); 271 usr->qddev = NULL; 272 mutex_unlock(&qddev->users_mutex); 273 synchronize_srcu(&usr->qddev_lock); 274 kref_put(&usr->ref_count, free_usr); 275 mutex_lock(&qddev->users_mutex); 276 } 277 mutex_unlock(&qddev->users_mutex); 278 } 279 280 static int qaic_mhi_probe(struct mhi_device *mhi_dev, const struct mhi_device_id *id) 281 { 282 u16 major = -1, minor = -1; 283 struct qaic_device *qdev; 284 int ret; 285 286 /* 287 * Invoking this function indicates that the control channel to the 288 * device is available. We use that as a signal to indicate that 289 * the device side firmware has booted. The device side firmware 290 * manages the device resources, so we need to communicate with it 291 * via the control channel in order to utilize the device. Therefore 292 * we wait until this signal to create the drm dev that userspace will 293 * use to control the device, because without the device side firmware, 294 * userspace can't do anything useful. 295 */ 296 297 qdev = pci_get_drvdata(to_pci_dev(mhi_dev->mhi_cntrl->cntrl_dev)); 298 299 dev_set_drvdata(&mhi_dev->dev, qdev); 300 qdev->cntl_ch = mhi_dev; 301 302 ret = qaic_control_open(qdev); 303 if (ret) { 304 pci_dbg(qdev->pdev, "%s: control_open failed %d\n", __func__, ret); 305 return ret; 306 } 307 308 qdev->dev_state = QAIC_BOOT; 309 ret = get_cntl_version(qdev, NULL, &major, &minor); 310 if (ret || major != CNTL_MAJOR || minor > CNTL_MINOR) { 311 pci_err(qdev->pdev, "%s: Control protocol version (%d.%d) not supported. Supported version is (%d.%d). Ret: %d\n", 312 __func__, major, minor, CNTL_MAJOR, CNTL_MINOR, ret); 313 ret = -EINVAL; 314 goto close_control; 315 } 316 qdev->dev_state = QAIC_ONLINE; 317 kobject_uevent(&(to_accel_kdev(qdev->qddev))->kobj, KOBJ_ONLINE); 318 319 return ret; 320 321 close_control: 322 qaic_control_close(qdev); 323 return ret; 324 } 325 326 static void qaic_mhi_remove(struct mhi_device *mhi_dev) 327 { 328 /* This is redundant since we have already observed the device crash */ 329 } 330 331 static void qaic_notify_reset(struct qaic_device *qdev) 332 { 333 int i; 334 335 kobject_uevent(&(to_accel_kdev(qdev->qddev))->kobj, KOBJ_OFFLINE); 336 qdev->dev_state = QAIC_OFFLINE; 337 /* wake up any waiters to avoid waiting for timeouts at sync */ 338 wake_all_cntl(qdev); 339 for (i = 0; i < qdev->num_dbc; ++i) 340 wakeup_dbc(qdev, i); 341 synchronize_srcu(&qdev->dev_lock); 342 } 343 344 void qaic_dev_reset_clean_local_state(struct qaic_device *qdev) 345 { 346 int i; 347 348 qaic_notify_reset(qdev); 349 350 /* start tearing things down */ 351 for (i = 0; i < qdev->num_dbc; ++i) 352 release_dbc(qdev, i); 353 } 354 355 static struct qaic_device *create_qdev(struct pci_dev *pdev, const struct pci_device_id *id) 356 { 357 struct device *dev = &pdev->dev; 358 struct qaic_drm_device *qddev; 359 struct qaic_device *qdev; 360 struct drm_device *drm; 361 int i, ret; 362 363 qdev = devm_kzalloc(dev, sizeof(*qdev), GFP_KERNEL); 364 if (!qdev) 365 return NULL; 366 367 qdev->dev_state = QAIC_OFFLINE; 368 if (id->device == PCI_DEV_AIC080 || id->device == PCI_DEV_AIC100) { 369 qdev->num_dbc = 16; 370 qdev->dbc = devm_kcalloc(dev, qdev->num_dbc, sizeof(*qdev->dbc), GFP_KERNEL); 371 if (!qdev->dbc) 372 return NULL; 373 } 374 375 qddev = devm_drm_dev_alloc(&pdev->dev, &qaic_accel_driver, struct qaic_drm_device, drm); 376 if (IS_ERR(qddev)) 377 return NULL; 378 379 drm = to_drm(qddev); 380 pci_set_drvdata(pdev, qdev); 381 382 ret = drmm_mutex_init(drm, &qddev->users_mutex); 383 if (ret) 384 return NULL; 385 ret = drmm_add_action_or_reset(drm, qaicm_pci_release, NULL); 386 if (ret) 387 return NULL; 388 ret = drmm_mutex_init(drm, &qdev->cntl_mutex); 389 if (ret) 390 return NULL; 391 ret = drmm_mutex_init(drm, &qdev->bootlog_mutex); 392 if (ret) 393 return NULL; 394 395 qdev->cntl_wq = qaicm_wq_init(drm, "qaic_cntl"); 396 if (IS_ERR(qdev->cntl_wq)) 397 return NULL; 398 qdev->qts_wq = qaicm_wq_init(drm, "qaic_ts"); 399 if (IS_ERR(qdev->qts_wq)) 400 return NULL; 401 402 ret = qaicm_srcu_init(drm, &qdev->dev_lock); 403 if (ret) 404 return NULL; 405 406 qdev->qddev = qddev; 407 qdev->pdev = pdev; 408 qddev->qdev = qdev; 409 410 INIT_LIST_HEAD(&qdev->cntl_xfer_list); 411 INIT_LIST_HEAD(&qdev->bootlog); 412 INIT_LIST_HEAD(&qddev->users); 413 414 for (i = 0; i < qdev->num_dbc; ++i) { 415 spin_lock_init(&qdev->dbc[i].xfer_lock); 416 qdev->dbc[i].qdev = qdev; 417 qdev->dbc[i].id = i; 418 INIT_LIST_HEAD(&qdev->dbc[i].xfer_list); 419 ret = qaicm_srcu_init(drm, &qdev->dbc[i].ch_lock); 420 if (ret) 421 return NULL; 422 init_waitqueue_head(&qdev->dbc[i].dbc_release); 423 INIT_LIST_HEAD(&qdev->dbc[i].bo_lists); 424 } 425 426 return qdev; 427 } 428 429 static int init_pci(struct qaic_device *qdev, struct pci_dev *pdev) 430 { 431 int bars; 432 int ret; 433 434 bars = pci_select_bars(pdev, IORESOURCE_MEM); 435 436 /* make sure the device has the expected BARs */ 437 if (bars != (BIT(0) | BIT(2) | BIT(4))) { 438 pci_dbg(pdev, "%s: expected BARs 0, 2, and 4 not found in device. Found 0x%x\n", 439 __func__, bars); 440 return -EINVAL; 441 } 442 443 ret = pcim_enable_device(pdev); 444 if (ret) 445 return ret; 446 447 ret = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64)); 448 if (ret) 449 return ret; 450 dma_set_max_seg_size(&pdev->dev, UINT_MAX); 451 452 qdev->bar_0 = devm_ioremap_resource(&pdev->dev, &pdev->resource[0]); 453 if (IS_ERR(qdev->bar_0)) 454 return PTR_ERR(qdev->bar_0); 455 456 qdev->bar_2 = devm_ioremap_resource(&pdev->dev, &pdev->resource[2]); 457 if (IS_ERR(qdev->bar_2)) 458 return PTR_ERR(qdev->bar_2); 459 460 /* Managed release since we use pcim_enable_device above */ 461 pci_set_master(pdev); 462 463 return 0; 464 } 465 466 static int init_msi(struct qaic_device *qdev, struct pci_dev *pdev) 467 { 468 int mhi_irq; 469 int ret; 470 int i; 471 472 /* Managed release since we use pcim_enable_device */ 473 ret = pci_alloc_irq_vectors(pdev, 32, 32, PCI_IRQ_MSI); 474 if (ret == -ENOSPC) { 475 ret = pci_alloc_irq_vectors(pdev, 1, 1, PCI_IRQ_MSI); 476 if (ret < 0) 477 return ret; 478 479 /* 480 * Operate in one MSI mode. All interrupts will be directed to 481 * MSI0; every interrupt will wake up all the interrupt handlers 482 * (MHI and DBC[0-15]). Since the interrupt is now shared, it is 483 * not disabled during DBC threaded handler, but only one thread 484 * will be allowed to run per DBC, so while it can be 485 * interrupted, it shouldn't race with itself. 486 */ 487 qdev->single_msi = true; 488 pci_info(pdev, "Allocating 32 MSIs failed, operating in 1 MSI mode. Performance may be impacted.\n"); 489 } else if (ret < 0) { 490 return ret; 491 } 492 493 mhi_irq = pci_irq_vector(pdev, 0); 494 if (mhi_irq < 0) 495 return mhi_irq; 496 497 for (i = 0; i < qdev->num_dbc; ++i) { 498 ret = devm_request_threaded_irq(&pdev->dev, 499 pci_irq_vector(pdev, qdev->single_msi ? 0 : i + 1), 500 dbc_irq_handler, dbc_irq_threaded_fn, IRQF_SHARED, 501 "qaic_dbc", &qdev->dbc[i]); 502 if (ret) 503 return ret; 504 505 if (datapath_polling) { 506 qdev->dbc[i].irq = pci_irq_vector(pdev, qdev->single_msi ? 0 : i + 1); 507 if (!qdev->single_msi) 508 disable_irq_nosync(qdev->dbc[i].irq); 509 INIT_WORK(&qdev->dbc[i].poll_work, irq_polling_work); 510 } 511 } 512 513 return mhi_irq; 514 } 515 516 static int qaic_pci_probe(struct pci_dev *pdev, const struct pci_device_id *id) 517 { 518 struct qaic_device *qdev; 519 int mhi_irq; 520 int ret; 521 int i; 522 523 qdev = create_qdev(pdev, id); 524 if (!qdev) 525 return -ENOMEM; 526 527 ret = init_pci(qdev, pdev); 528 if (ret) 529 return ret; 530 531 for (i = 0; i < qdev->num_dbc; ++i) 532 qdev->dbc[i].dbc_base = qdev->bar_2 + QAIC_DBC_OFF(i); 533 534 mhi_irq = init_msi(qdev, pdev); 535 if (mhi_irq < 0) 536 return mhi_irq; 537 538 ret = qaic_create_drm_device(qdev, QAIC_NO_PARTITION); 539 if (ret) 540 return ret; 541 542 qdev->mhi_cntrl = qaic_mhi_register_controller(pdev, qdev->bar_0, mhi_irq, 543 qdev->single_msi); 544 if (IS_ERR(qdev->mhi_cntrl)) { 545 ret = PTR_ERR(qdev->mhi_cntrl); 546 qaic_destroy_drm_device(qdev, QAIC_NO_PARTITION); 547 return ret; 548 } 549 550 return 0; 551 } 552 553 static void qaic_pci_remove(struct pci_dev *pdev) 554 { 555 struct qaic_device *qdev = pci_get_drvdata(pdev); 556 557 if (!qdev) 558 return; 559 560 qaic_dev_reset_clean_local_state(qdev); 561 qaic_mhi_free_controller(qdev->mhi_cntrl, link_up); 562 qaic_destroy_drm_device(qdev, QAIC_NO_PARTITION); 563 } 564 565 static void qaic_pci_shutdown(struct pci_dev *pdev) 566 { 567 /* see qaic_exit for what link_up is doing */ 568 link_up = true; 569 qaic_pci_remove(pdev); 570 } 571 572 static pci_ers_result_t qaic_pci_error_detected(struct pci_dev *pdev, pci_channel_state_t error) 573 { 574 return PCI_ERS_RESULT_NEED_RESET; 575 } 576 577 static void qaic_pci_reset_prepare(struct pci_dev *pdev) 578 { 579 struct qaic_device *qdev = pci_get_drvdata(pdev); 580 581 qaic_notify_reset(qdev); 582 qaic_mhi_start_reset(qdev->mhi_cntrl); 583 qaic_dev_reset_clean_local_state(qdev); 584 } 585 586 static void qaic_pci_reset_done(struct pci_dev *pdev) 587 { 588 struct qaic_device *qdev = pci_get_drvdata(pdev); 589 590 qaic_mhi_reset_done(qdev->mhi_cntrl); 591 } 592 593 static const struct mhi_device_id qaic_mhi_match_table[] = { 594 { .chan = "QAIC_CONTROL", }, 595 {}, 596 }; 597 598 static struct mhi_driver qaic_mhi_driver = { 599 .id_table = qaic_mhi_match_table, 600 .remove = qaic_mhi_remove, 601 .probe = qaic_mhi_probe, 602 .ul_xfer_cb = qaic_mhi_ul_xfer_cb, 603 .dl_xfer_cb = qaic_mhi_dl_xfer_cb, 604 .driver = { 605 .name = "qaic_mhi", 606 }, 607 }; 608 609 static const struct pci_device_id qaic_ids[] = { 610 { PCI_DEVICE(PCI_VENDOR_ID_QCOM, PCI_DEV_AIC080), }, 611 { PCI_DEVICE(PCI_VENDOR_ID_QCOM, PCI_DEV_AIC100), }, 612 { } 613 }; 614 MODULE_DEVICE_TABLE(pci, qaic_ids); 615 616 static const struct pci_error_handlers qaic_pci_err_handler = { 617 .error_detected = qaic_pci_error_detected, 618 .reset_prepare = qaic_pci_reset_prepare, 619 .reset_done = qaic_pci_reset_done, 620 }; 621 622 static struct pci_driver qaic_pci_driver = { 623 .name = QAIC_NAME, 624 .id_table = qaic_ids, 625 .probe = qaic_pci_probe, 626 .remove = qaic_pci_remove, 627 .shutdown = qaic_pci_shutdown, 628 .err_handler = &qaic_pci_err_handler, 629 }; 630 631 static int __init qaic_init(void) 632 { 633 int ret; 634 635 ret = pci_register_driver(&qaic_pci_driver); 636 if (ret) { 637 pr_debug("qaic: pci_register_driver failed %d\n", ret); 638 return ret; 639 } 640 641 ret = mhi_driver_register(&qaic_mhi_driver); 642 if (ret) { 643 pr_debug("qaic: mhi_driver_register failed %d\n", ret); 644 goto free_pci; 645 } 646 647 ret = sahara_register(); 648 if (ret) { 649 pr_debug("qaic: sahara_register failed %d\n", ret); 650 goto free_mhi; 651 } 652 653 ret = qaic_timesync_init(); 654 if (ret) 655 pr_debug("qaic: qaic_timesync_init failed %d\n", ret); 656 657 ret = qaic_bootlog_register(); 658 if (ret) 659 pr_debug("qaic: qaic_bootlog_register failed %d\n", ret); 660 661 return 0; 662 663 free_mhi: 664 mhi_driver_unregister(&qaic_mhi_driver); 665 free_pci: 666 pci_unregister_driver(&qaic_pci_driver); 667 return ret; 668 } 669 670 static void __exit qaic_exit(void) 671 { 672 /* 673 * We assume that qaic_pci_remove() is called due to a hotplug event 674 * which would mean that the link is down, and thus 675 * qaic_mhi_free_controller() should not try to access the device during 676 * cleanup. 677 * We call pci_unregister_driver() below, which also triggers 678 * qaic_pci_remove(), but since this is module exit, we expect the link 679 * to the device to be up, in which case qaic_mhi_free_controller() 680 * should try to access the device during cleanup to put the device in 681 * a sane state. 682 * For that reason, we set link_up here to let qaic_mhi_free_controller 683 * know the expected link state. Since the module is going to be 684 * removed at the end of this, we don't need to worry about 685 * reinitializing the link_up state after the cleanup is done. 686 */ 687 link_up = true; 688 qaic_bootlog_unregister(); 689 qaic_timesync_deinit(); 690 sahara_unregister(); 691 mhi_driver_unregister(&qaic_mhi_driver); 692 pci_unregister_driver(&qaic_pci_driver); 693 } 694 695 module_init(qaic_init); 696 module_exit(qaic_exit); 697 698 MODULE_AUTHOR(QAIC_DESC " Kernel Driver Team"); 699 MODULE_DESCRIPTION(QAIC_DESC " Accel Driver"); 700 MODULE_LICENSE("GPL"); 701