blob: 949d1b5c5c41cc86c01c7b0ca623fa4e67ec3e89 [file] [log] [blame]
Oded Gabbayc4d66342019-02-16 00:39:11 +02001// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright 2016-2019 HabanaLabs, Ltd.
5 * All Rights Reserved.
6 *
7 */
8
Tomer Tayare00dac32019-04-10 15:18:46 +03009#define pr_fmt(fmt) "habanalabs: " fmt
10
Oded Gabbayc4d66342019-02-16 00:39:11 +020011#include "habanalabs.h"
12
13#include <linux/pci.h>
Ofir Bitton2e5eda42020-05-20 16:35:08 +030014#include <linux/aer.h>
Oded Gabbayc4d66342019-02-16 00:39:11 +020015#include <linux/module.h>
16
17#define HL_DRIVER_AUTHOR "HabanaLabs Kernel Driver Team"
18
19#define HL_DRIVER_DESC "Driver for HabanaLabs's AI Accelerators"
20
21MODULE_AUTHOR(HL_DRIVER_AUTHOR);
22MODULE_DESCRIPTION(HL_DRIVER_DESC);
23MODULE_LICENSE("GPL v2");
24
25static int hl_major;
26static struct class *hl_class;
Oded Gabbay5e6e0232019-02-27 12:15:16 +020027static DEFINE_IDR(hl_devs_idr);
28static DEFINE_MUTEX(hl_devs_idr_lock);
Oded Gabbayc4d66342019-02-16 00:39:11 +020029
Oded Gabbay17b59dd2021-02-17 13:34:44 +020030static int timeout_locked = 30;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020031static int reset_on_lockup = 1;
Oded Gabbay7fb2a1f2021-05-12 20:46:12 +030032static int memory_scrub;
Oded Gabbay27a9e352021-04-12 09:52:05 +030033static ulong boot_error_status_mask = ULONG_MAX;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020034
35module_param(timeout_locked, int, 0444);
36MODULE_PARM_DESC(timeout_locked,
Oded Gabbay17b59dd2021-02-17 13:34:44 +020037 "Device lockup timeout in seconds (0 = disabled, default 30s)");
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020038
39module_param(reset_on_lockup, int, 0444);
40MODULE_PARM_DESC(reset_on_lockup,
41 "Do device reset on lockup (0 = no, 1 = yes, default yes)");
42
farah kassabri03df1362020-05-06 11:17:38 +030043module_param(memory_scrub, int, 0444);
44MODULE_PARM_DESC(memory_scrub,
Oded Gabbay7fb2a1f2021-05-12 20:46:12 +030045 "Scrub device memory in various states (0 = no, 1 = yes, default no)");
farah kassabri03df1362020-05-06 11:17:38 +030046
Oded Gabbay27a9e352021-04-12 09:52:05 +030047module_param(boot_error_status_mask, ulong, 0444);
48MODULE_PARM_DESC(boot_error_status_mask,
49 "Mask of the error status during device CPU boot (If bitX is cleared then error X is masked. Default all 1's)");
50
Oded Gabbayc4d66342019-02-16 00:39:11 +020051#define PCI_VENDOR_ID_HABANALABS 0x1da3
52
53#define PCI_IDS_GOYA 0x0001
Oded Gabbay6966d9e2020-03-21 10:58:32 +020054#define PCI_IDS_GAUDI 0x1000
Ofir Bittone5042a62021-04-01 13:43:40 +030055#define PCI_IDS_GAUDI_SEC 0x1010
Oded Gabbayc4d66342019-02-16 00:39:11 +020056
57static const struct pci_device_id ids[] = {
58 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GOYA), },
Oded Gabbay6966d9e2020-03-21 10:58:32 +020059 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GAUDI), },
Ofir Bittone5042a62021-04-01 13:43:40 +030060 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GAUDI_SEC), },
Oded Gabbayc4d66342019-02-16 00:39:11 +020061 { 0, }
62};
Oded Gabbay824b4572020-05-03 15:30:55 +030063MODULE_DEVICE_TABLE(pci, ids);
Oded Gabbayc4d66342019-02-16 00:39:11 +020064
65/*
66 * get_asic_type - translate device id to asic type
67 *
68 * @device: id of the PCI device
69 *
70 * Translate device id to asic type.
71 * In case of unidentified device, return -1
72 */
73static enum hl_asic_type get_asic_type(u16 device)
74{
75 enum hl_asic_type asic_type;
76
77 switch (device) {
78 case PCI_IDS_GOYA:
79 asic_type = ASIC_GOYA;
80 break;
Oded Gabbay6966d9e2020-03-21 10:58:32 +020081 case PCI_IDS_GAUDI:
82 asic_type = ASIC_GAUDI;
83 break;
Ofir Bittone5042a62021-04-01 13:43:40 +030084 case PCI_IDS_GAUDI_SEC:
85 asic_type = ASIC_GAUDI_SEC;
86 break;
Oded Gabbayc4d66342019-02-16 00:39:11 +020087 default:
88 asic_type = ASIC_INVALID;
89 break;
90 }
91
92 return asic_type;
93}
94
Ofir Bittone5042a62021-04-01 13:43:40 +030095static bool is_asic_secured(enum hl_asic_type asic_type)
96{
97 switch (asic_type) {
98 case ASIC_GAUDI_SEC:
99 return true;
100 default:
101 return false;
102 }
103}
104
Oded Gabbayc4d66342019-02-16 00:39:11 +0200105/*
106 * hl_device_open - open function for habanalabs device
107 *
108 * @inode: pointer to inode structure
109 * @filp: pointer to file structure
110 *
111 * Called when process opens an habanalabs device.
112 */
113int hl_device_open(struct inode *inode, struct file *filp)
114{
Ofir Bitton66a76402020-10-05 14:40:10 +0300115 enum hl_device_status status;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200116 struct hl_device *hdev;
117 struct hl_fpriv *hpriv;
Oded Gabbay0861e412019-02-16 00:39:14 +0200118 int rc;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200119
120 mutex_lock(&hl_devs_idr_lock);
121 hdev = idr_find(&hl_devs_idr, iminor(inode));
122 mutex_unlock(&hl_devs_idr_lock);
123
124 if (!hdev) {
125 pr_err("Couldn't find device %d:%d\n",
126 imajor(inode), iminor(inode));
127 return -ENXIO;
128 }
129
130 hpriv = kzalloc(sizeof(*hpriv), GFP_KERNEL);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300131 if (!hpriv)
132 return -ENOMEM;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200133
134 hpriv->hdev = hdev;
135 filp->private_data = hpriv;
136 hpriv->filp = filp;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +0200137 mutex_init(&hpriv->restore_phase_mutex);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200138 kref_init(&hpriv->refcount);
139 nonseekable_open(inode, filp);
140
Oded Gabbaybe5d9262019-02-16 00:39:15 +0200141 hl_cb_mgr_init(&hpriv->cb_mgr);
Oded Gabbay0861e412019-02-16 00:39:14 +0200142 hl_ctx_mgr_init(&hpriv->ctx_mgr);
143
Oded Gabbaye79e7452021-07-03 11:50:32 +0300144 hpriv->taskpid = get_task_pid(current, PIDTYPE_PID);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300145
146 mutex_lock(&hdev->fpriv_list_lock);
147
Ofir Bitton66a76402020-10-05 14:40:10 +0300148 if (!hl_device_operational(hdev, &status)) {
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300149 dev_err_ratelimited(hdev->dev,
Ofir Bitton66a76402020-10-05 14:40:10 +0300150 "Can't open %s because it is %s\n",
151 dev_name(hdev->dev), hdev->status[status]);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300152 rc = -EPERM;
Oded Gabbay0861e412019-02-16 00:39:14 +0200153 goto out_err;
154 }
155
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300156 if (hdev->in_debug) {
157 dev_err_ratelimited(hdev->dev,
158 "Can't open %s because it is being debugged by another user\n",
159 dev_name(hdev->dev));
160 rc = -EPERM;
161 goto out_err;
162 }
Oded Gabbayc4d66342019-02-16 00:39:11 +0200163
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300164 if (hdev->compute_ctx) {
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300165 dev_dbg_ratelimited(hdev->dev,
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300166 "Can't open %s because another user is working on it\n",
167 dev_name(hdev->dev));
168 rc = -EBUSY;
169 goto out_err;
170 }
171
172 rc = hl_ctx_create(hdev, hpriv);
173 if (rc) {
174 dev_err(hdev->dev, "Failed to create context %d\n", rc);
175 goto out_err;
176 }
177
178 /* Device is IDLE at this point so it is legal to change PLLs.
179 * There is no need to check anything because if the PLL is
180 * already HIGH, the set function will return without doing
181 * anything
Oded Gabbayd91389b2019-02-16 00:39:19 +0200182 */
183 hl_device_set_frequency(hdev, PLL_HIGH);
184
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300185 list_add(&hpriv->dev_node, &hdev->fpriv_list);
186 mutex_unlock(&hdev->fpriv_list_lock);
187
Oded Gabbayc2164772019-02-16 00:39:24 +0200188 hl_debugfs_add_file(hpriv);
189
Yuri Nudelmane307b302021-05-24 11:25:21 +0300190 hdev->open_counter++;
191 hdev->last_successful_open_jif = jiffies;
192
Oded Gabbayc4d66342019-02-16 00:39:11 +0200193 return 0;
Oded Gabbay0861e412019-02-16 00:39:14 +0200194
195out_err:
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300196 mutex_unlock(&hdev->fpriv_list_lock);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300197 hl_cb_mgr_fini(hpriv->hdev, &hpriv->cb_mgr);
198 hl_ctx_mgr_fini(hpriv->hdev, &hpriv->ctx_mgr);
199 filp->private_data = NULL;
200 mutex_destroy(&hpriv->restore_phase_mutex);
201 put_pid(hpriv->taskpid);
202
203 kfree(hpriv);
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300204
Oded Gabbay0861e412019-02-16 00:39:14 +0200205 return rc;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200206}
207
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300208int hl_device_open_ctrl(struct inode *inode, struct file *filp)
209{
210 struct hl_device *hdev;
211 struct hl_fpriv *hpriv;
212 int rc;
213
214 mutex_lock(&hl_devs_idr_lock);
215 hdev = idr_find(&hl_devs_idr, iminor(inode));
216 mutex_unlock(&hl_devs_idr_lock);
217
218 if (!hdev) {
219 pr_err("Couldn't find device %d:%d\n",
220 imajor(inode), iminor(inode));
221 return -ENXIO;
222 }
223
224 hpriv = kzalloc(sizeof(*hpriv), GFP_KERNEL);
225 if (!hpriv)
226 return -ENOMEM;
227
Moti Haimovski4a18dde2021-08-16 14:39:46 +0300228 /* Prevent other routines from reading partial hpriv data by
229 * initializing hpriv fields before inserting it to the list
230 */
231 hpriv->hdev = hdev;
232 filp->private_data = hpriv;
233 hpriv->filp = filp;
234 hpriv->is_control = true;
235 nonseekable_open(inode, filp);
236
237 hpriv->taskpid = find_get_pid(current->pid);
238
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300239 mutex_lock(&hdev->fpriv_list_lock);
240
Ofir Bitton66a76402020-10-05 14:40:10 +0300241 if (!hl_device_operational(hdev, NULL)) {
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300242 dev_err_ratelimited(hdev->dev_ctrl,
243 "Can't open %s because it is disabled or in reset\n",
244 dev_name(hdev->dev_ctrl));
245 rc = -EPERM;
246 goto out_err;
247 }
248
249 list_add(&hpriv->dev_node, &hdev->fpriv_list);
250 mutex_unlock(&hdev->fpriv_list_lock);
251
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300252 return 0;
253
254out_err:
255 mutex_unlock(&hdev->fpriv_list_lock);
Moti Haimovski4a18dde2021-08-16 14:39:46 +0300256 filp->private_data = NULL;
257 put_pid(hpriv->taskpid);
258
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300259 kfree(hpriv);
Moti Haimovski4a18dde2021-08-16 14:39:46 +0300260
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300261 return rc;
262}
263
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300264static void set_driver_behavior_per_device(struct hl_device *hdev)
265{
Ofir Bitton6a2f5d72021-02-15 13:23:04 +0200266 hdev->fw_components = FW_TYPE_ALL_TYPES;
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300267 hdev->cpu_queues_enable = 1;
268 hdev->heartbeat = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300269 hdev->mmu_enable = 1;
Oded Gabbaye38bfd32020-07-03 20:46:12 +0300270 hdev->clock_gating_mask = ULONG_MAX;
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300271 hdev->sram_scrambler_enable = 1;
272 hdev->dram_scrambler_enable = 1;
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300273 hdev->bmc_enable = 1;
274 hdev->hard_reset_on_fw_events = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300275 hdev->reset_on_preboot_fail = 1;
Ofir Bitton84586de2021-05-20 13:30:31 +0300276 hdev->reset_if_device_not_idle = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300277
278 hdev->reset_pcilink = 0;
279 hdev->axi_drain = 0;
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300280}
281
Oded Gabbayc4d66342019-02-16 00:39:11 +0200282/*
283 * create_hdev - create habanalabs device instance
284 *
285 * @dev: will hold the pointer to the new habanalabs device structure
286 * @pdev: pointer to the pci device
287 * @asic_type: in case of simulator device, which device is it
288 * @minor: in case of simulator device, the minor of the device
289 *
290 * Allocate memory for habanalabs device and initialize basic fields
291 * Identify the ASIC type
292 * Allocate ID (minor) for the device (only for real devices)
293 */
294int create_hdev(struct hl_device **dev, struct pci_dev *pdev,
295 enum hl_asic_type asic_type, int minor)
296{
297 struct hl_device *hdev;
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300298 int rc, main_id, ctrl_id = 0;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200299
300 *dev = NULL;
301
302 hdev = kzalloc(sizeof(*hdev), GFP_KERNEL);
303 if (!hdev)
304 return -ENOMEM;
305
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300306 /* First, we must find out which ASIC are we handling. This is needed
307 * to configure the behavior of the driver (kernel parameters)
308 */
Oded Gabbay29593842019-04-04 14:33:34 +0300309 if (pdev) {
Oded Gabbayc4d66342019-02-16 00:39:11 +0200310 hdev->asic_type = get_asic_type(pdev->device);
311 if (hdev->asic_type == ASIC_INVALID) {
312 dev_err(&pdev->dev, "Unsupported ASIC\n");
313 rc = -ENODEV;
314 goto free_hdev;
315 }
316 } else {
317 hdev->asic_type = asic_type;
318 }
319
Ofir Bittone5042a62021-04-01 13:43:40 +0300320 if (pdev)
Ohad Sharabi4cb45082021-05-20 09:09:03 +0300321 hdev->asic_prop.fw_security_enabled =
322 is_asic_secured(hdev->asic_type);
Ofir Bittone5042a62021-04-01 13:43:40 +0300323 else
Ohad Sharabi4cb45082021-05-20 09:09:03 +0300324 hdev->asic_prop.fw_security_enabled = false;
Ofir Bittone5042a62021-04-01 13:43:40 +0300325
Ofir Bitton66a76402020-10-05 14:40:10 +0300326 /* Assign status description string */
Omer Shpigelman71731092021-08-16 13:27:12 +0300327 strncpy(hdev->status[HL_DEVICE_STATUS_OPERATIONAL],
328 "operational", HL_STR_MAX);
Ofir Bitton66a76402020-10-05 14:40:10 +0300329 strncpy(hdev->status[HL_DEVICE_STATUS_IN_RESET],
330 "in reset", HL_STR_MAX);
Omer Shpigelman71731092021-08-16 13:27:12 +0300331 strncpy(hdev->status[HL_DEVICE_STATUS_MALFUNCTION],
332 "disabled", HL_STR_MAX);
Ofir Bitton66a76402020-10-05 14:40:10 +0300333 strncpy(hdev->status[HL_DEVICE_STATUS_NEEDS_RESET],
334 "needs reset", HL_STR_MAX);
Omer Shpigelman71731092021-08-16 13:27:12 +0300335 strncpy(hdev->status[HL_DEVICE_STATUS_IN_DEVICE_CREATION],
336 "in device creation", HL_STR_MAX);
Ofir Bitton66a76402020-10-05 14:40:10 +0300337
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300338 hdev->major = hl_major;
339 hdev->reset_on_lockup = reset_on_lockup;
farah kassabri03df1362020-05-06 11:17:38 +0300340 hdev->memory_scrub = memory_scrub;
Oded Gabbay27a9e352021-04-12 09:52:05 +0300341 hdev->boot_error_status_mask = boot_error_status_mask;
Ofir Bitton358526be2021-02-11 11:09:12 +0200342 hdev->stop_on_err = true;
Oded Gabbay27a9e352021-04-12 09:52:05 +0300343
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300344 hdev->pldm = 0;
345
346 set_driver_behavior_per_device(hdev);
347
Koby Elbaz3e0ca9f2021-05-04 20:10:47 +0300348 hdev->curr_reset_cause = HL_RESET_CAUSE_UNKNOWN;
Bharat Jauhari10cab812021-06-21 09:57:19 +0300349 hdev->prev_reset_trigger = HL_RESET_TRIGGER_DEFAULT;
Koby Elbaz3e0ca9f2021-05-04 20:10:47 +0300350
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300351 if (timeout_locked)
352 hdev->timeout_jiffies = msecs_to_jiffies(timeout_locked * 1000);
353 else
354 hdev->timeout_jiffies = MAX_SCHEDULE_TIMEOUT;
355
356 hdev->disabled = true;
357 hdev->pdev = pdev; /* can be NULL in case of simulator device */
358
Oded Gabbayd9973872019-03-07 18:03:23 +0200359 /* Set default DMA mask to 32 bits */
360 hdev->dma_mask = 32;
361
Oded Gabbayc4d66342019-02-16 00:39:11 +0200362 mutex_lock(&hl_devs_idr_lock);
363
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300364 /* Always save 2 numbers, 1 for main device and 1 for control.
365 * They must be consecutive
366 */
367 main_id = idr_alloc(&hl_devs_idr, hdev, 0, HL_MAX_MINORS,
Oded Gabbayc4d66342019-02-16 00:39:11 +0200368 GFP_KERNEL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200369
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300370 if (main_id >= 0)
371 ctrl_id = idr_alloc(&hl_devs_idr, hdev, main_id + 1,
372 main_id + 2, GFP_KERNEL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200373
374 mutex_unlock(&hl_devs_idr_lock);
375
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300376 if ((main_id < 0) || (ctrl_id < 0)) {
377 if ((main_id == -ENOSPC) || (ctrl_id == -ENOSPC))
Oded Gabbayc4d66342019-02-16 00:39:11 +0200378 pr_err("too many devices in the system\n");
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300379
380 if (main_id >= 0) {
381 mutex_lock(&hl_devs_idr_lock);
382 idr_remove(&hl_devs_idr, main_id);
383 mutex_unlock(&hl_devs_idr_lock);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200384 }
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300385
386 rc = -EBUSY;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200387 goto free_hdev;
388 }
389
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300390 hdev->id = main_id;
391 hdev->id_control = ctrl_id;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200392
393 *dev = hdev;
394
395 return 0;
396
397free_hdev:
398 kfree(hdev);
399 return rc;
400}
401
402/*
403 * destroy_hdev - destroy habanalabs device instance
404 *
405 * @dev: pointer to the habanalabs device structure
406 *
407 */
408void destroy_hdev(struct hl_device *hdev)
409{
410 /* Remove device from the device list */
411 mutex_lock(&hl_devs_idr_lock);
412 idr_remove(&hl_devs_idr, hdev->id);
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300413 idr_remove(&hl_devs_idr, hdev->id_control);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200414 mutex_unlock(&hl_devs_idr_lock);
415
416 kfree(hdev);
417}
418
419static int hl_pmops_suspend(struct device *dev)
420{
Chuhong Yuan30f27322019-07-23 20:46:08 +0800421 struct hl_device *hdev = dev_get_drvdata(dev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200422
423 pr_debug("Going to suspend PCI device\n");
424
425 if (!hdev) {
426 pr_err("device pointer is NULL in suspend\n");
427 return 0;
428 }
429
430 return hl_device_suspend(hdev);
431}
432
433static int hl_pmops_resume(struct device *dev)
434{
Chuhong Yuan30f27322019-07-23 20:46:08 +0800435 struct hl_device *hdev = dev_get_drvdata(dev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200436
437 pr_debug("Going to resume PCI device\n");
438
439 if (!hdev) {
440 pr_err("device pointer is NULL in resume\n");
441 return 0;
442 }
443
444 return hl_device_resume(hdev);
445}
446
447/*
448 * hl_pci_probe - probe PCI habanalabs devices
449 *
450 * @pdev: pointer to pci device
451 * @id: pointer to pci device id structure
452 *
453 * Standard PCI probe function for habanalabs device.
454 * Create a new habanalabs device and initialize it according to the
455 * device's type
456 */
457static int hl_pci_probe(struct pci_dev *pdev,
458 const struct pci_device_id *id)
459{
460 struct hl_device *hdev;
461 int rc;
462
463 dev_info(&pdev->dev, HL_NAME
464 " device found [%04x:%04x] (rev %x)\n",
465 (int)pdev->vendor, (int)pdev->device, (int)pdev->revision);
466
Oded Gabbay29593842019-04-04 14:33:34 +0300467 rc = create_hdev(&hdev, pdev, ASIC_INVALID, -1);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200468 if (rc)
469 return rc;
470
471 pci_set_drvdata(pdev, hdev);
472
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300473 pci_enable_pcie_error_reporting(pdev);
474
Oded Gabbayc4d66342019-02-16 00:39:11 +0200475 rc = hl_device_init(hdev, hl_class);
476 if (rc) {
477 dev_err(&pdev->dev, "Fatal error during habanalabs device init\n");
478 rc = -ENODEV;
479 goto disable_device;
480 }
481
482 return 0;
483
484disable_device:
Christophe JAILLET3002f462021-06-12 07:39:51 +0200485 pci_disable_pcie_error_reporting(pdev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200486 pci_set_drvdata(pdev, NULL);
487 destroy_hdev(hdev);
488
489 return rc;
490}
491
492/*
493 * hl_pci_remove - remove PCI habanalabs devices
494 *
495 * @pdev: pointer to pci device
496 *
497 * Standard PCI remove function for habanalabs device
498 */
499static void hl_pci_remove(struct pci_dev *pdev)
500{
501 struct hl_device *hdev;
502
503 hdev = pci_get_drvdata(pdev);
504 if (!hdev)
505 return;
506
507 hl_device_fini(hdev);
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300508 pci_disable_pcie_error_reporting(pdev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200509 pci_set_drvdata(pdev, NULL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200510 destroy_hdev(hdev);
511}
512
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300513/**
514 * hl_pci_err_detected - a PCI bus error detected on this device
515 *
516 * @pdev: pointer to pci device
517 * @state: PCI error type
518 *
519 * Called by the PCI subsystem whenever a non-correctable
520 * PCI bus error is detected
521 */
522static pci_ers_result_t
523hl_pci_err_detected(struct pci_dev *pdev, pci_channel_state_t state)
524{
525 struct hl_device *hdev = pci_get_drvdata(pdev);
526 enum pci_ers_result result;
527
528 switch (state) {
529 case pci_channel_io_normal:
530 return PCI_ERS_RESULT_CAN_RECOVER;
531
532 case pci_channel_io_frozen:
533 dev_warn(hdev->dev, "frozen state error detected\n");
534 result = PCI_ERS_RESULT_NEED_RESET;
535 break;
536
537 case pci_channel_io_perm_failure:
538 dev_warn(hdev->dev, "failure state error detected\n");
539 result = PCI_ERS_RESULT_DISCONNECT;
540 break;
541
542 default:
543 result = PCI_ERS_RESULT_NONE;
544 }
545
Oded Gabbay8d9aa982021-08-09 22:43:37 +0300546 hdev->asic_funcs->halt_engines(hdev, true, false);
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300547
548 return result;
549}
550
551/**
552 * hl_pci_err_resume - resume after a PCI slot reset
553 *
554 * @pdev: pointer to pci device
555 *
556 */
557static void hl_pci_err_resume(struct pci_dev *pdev)
558{
559 struct hl_device *hdev = pci_get_drvdata(pdev);
560
561 dev_warn(hdev->dev, "Resuming device after PCI slot reset\n");
562 hl_device_resume(hdev);
563}
564
565/**
566 * hl_pci_err_slot_reset - a PCI slot reset has just happened
567 *
568 * @pdev: pointer to pci device
569 *
570 * Determine if the driver can recover from the PCI slot reset
571 */
572static pci_ers_result_t hl_pci_err_slot_reset(struct pci_dev *pdev)
573{
574 return PCI_ERS_RESULT_RECOVERED;
575}
576
Oded Gabbayc4d66342019-02-16 00:39:11 +0200577static const struct dev_pm_ops hl_pm_ops = {
578 .suspend = hl_pmops_suspend,
579 .resume = hl_pmops_resume,
580};
581
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300582static const struct pci_error_handlers hl_pci_err_handler = {
583 .error_detected = hl_pci_err_detected,
584 .slot_reset = hl_pci_err_slot_reset,
585 .resume = hl_pci_err_resume,
586};
587
Oded Gabbayc4d66342019-02-16 00:39:11 +0200588static struct pci_driver hl_pci_driver = {
589 .name = HL_NAME,
590 .id_table = ids,
591 .probe = hl_pci_probe,
592 .remove = hl_pci_remove,
Oded Gabbayfcaebc72020-12-14 12:52:06 +0200593 .shutdown = hl_pci_remove,
Oded Gabbay135ade02021-05-26 11:14:21 +0300594 .driver = {
595 .name = HL_NAME,
596 .pm = &hl_pm_ops,
597 .probe_type = PROBE_PREFER_ASYNCHRONOUS,
598 },
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300599 .err_handler = &hl_pci_err_handler,
Oded Gabbayc4d66342019-02-16 00:39:11 +0200600};
601
602/*
603 * hl_init - Initialize the habanalabs kernel driver
604 */
605static int __init hl_init(void)
606{
607 int rc;
608 dev_t dev;
609
610 pr_info("loading driver\n");
611
612 rc = alloc_chrdev_region(&dev, 0, HL_MAX_MINORS, HL_NAME);
613 if (rc < 0) {
614 pr_err("unable to get major\n");
615 return rc;
616 }
617
618 hl_major = MAJOR(dev);
619
620 hl_class = class_create(THIS_MODULE, HL_NAME);
621 if (IS_ERR(hl_class)) {
622 pr_err("failed to allocate class\n");
623 rc = PTR_ERR(hl_class);
624 goto remove_major;
625 }
626
Oded Gabbayc2164772019-02-16 00:39:24 +0200627 hl_debugfs_init();
628
Oded Gabbayc4d66342019-02-16 00:39:11 +0200629 rc = pci_register_driver(&hl_pci_driver);
630 if (rc) {
631 pr_err("failed to register pci device\n");
Oded Gabbayc2164772019-02-16 00:39:24 +0200632 goto remove_debugfs;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200633 }
634
635 pr_debug("driver loaded\n");
636
637 return 0;
638
Oded Gabbayc2164772019-02-16 00:39:24 +0200639remove_debugfs:
640 hl_debugfs_fini();
Oded Gabbayc4d66342019-02-16 00:39:11 +0200641 class_destroy(hl_class);
642remove_major:
643 unregister_chrdev_region(MKDEV(hl_major, 0), HL_MAX_MINORS);
644 return rc;
645}
646
647/*
648 * hl_exit - Release all resources of the habanalabs kernel driver
649 */
650static void __exit hl_exit(void)
651{
652 pci_unregister_driver(&hl_pci_driver);
653
Oded Gabbayc2164772019-02-16 00:39:24 +0200654 /*
655 * Removing debugfs must be after all devices or simulator devices
656 * have been removed because otherwise we get a bug in the
657 * debugfs module for referencing NULL objects
658 */
659 hl_debugfs_fini();
660
Oded Gabbayc4d66342019-02-16 00:39:11 +0200661 class_destroy(hl_class);
662 unregister_chrdev_region(MKDEV(hl_major, 0), HL_MAX_MINORS);
663
664 idr_destroy(&hl_devs_idr);
665
666 pr_debug("driver removed\n");
667}
668
669module_init(hl_init);
670module_exit(hl_exit);