staging: vme_user: fix kmalloc style
[linux-block.git] / drivers / staging / vme / devices / vme_user.c
CommitLineData
f00a86d9
MW
1/*
2 * VMEbus User access driver
3 *
66bd8db5
MW
4 * Author: Martyn Welch <martyn.welch@ge.com>
5 * Copyright 2008 GE Intelligent Platforms Embedded Systems, Inc.
f00a86d9
MW
6 *
7 * Based on work by:
8 * Tom Armistead and Ajit Prem
9 * Copyright 2004 Motorola Inc.
10 *
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version.
16 */
17
0093e5f8
YT
18#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
19
c74a804f 20#include <linux/atomic.h>
f00a86d9
MW
21#include <linux/cdev.h>
22#include <linux/delay.h>
23#include <linux/device.h>
24#include <linux/dma-mapping.h>
25#include <linux/errno.h>
26#include <linux/init.h>
27#include <linux/ioctl.h>
28#include <linux/kernel.h>
29#include <linux/mm.h>
30#include <linux/module.h>
31#include <linux/pagemap.h>
32#include <linux/pci.h>
ecb3b80f 33#include <linux/mutex.h>
5a0e3ad6 34#include <linux/slab.h>
f00a86d9
MW
35#include <linux/spinlock.h>
36#include <linux/syscalls.h>
37#include <linux/types.h>
f00a86d9 38
45f9f018
NC
39#include <linux/io.h>
40#include <linux/uaccess.h>
db3b9e99 41#include <linux/vme.h>
f00a86d9 42
f00a86d9
MW
43#include "vme_user.h"
44
584721ca 45static const char driver_name[] = "vme_user";
238add52 46
0a4b6b02 47static int bus[VME_USER_BUS_MAX];
c9492318 48static unsigned int bus_num;
238add52 49
f00a86d9
MW
50/* Currently Documentation/devices.txt defines the following for VME:
51 *
52 * 221 char VME bus
45f9f018
NC
53 * 0 = /dev/bus/vme/m0 First master image
54 * 1 = /dev/bus/vme/m1 Second master image
55 * 2 = /dev/bus/vme/m2 Third master image
56 * 3 = /dev/bus/vme/m3 Fourth master image
57 * 4 = /dev/bus/vme/s0 First slave image
58 * 5 = /dev/bus/vme/s1 Second slave image
59 * 6 = /dev/bus/vme/s2 Third slave image
60 * 7 = /dev/bus/vme/s3 Fourth slave image
61 * 8 = /dev/bus/vme/ctl Control
f00a86d9 62 *
45f9f018
NC
63 * It is expected that all VME bus drivers will use the
64 * same interface. For interface documentation see
65 * http://www.vmelinux.org/.
f00a86d9
MW
66 *
67 * However the VME driver at http://www.vmelinux.org/ is rather old and doesn't
68 * even support the tsi148 chipset (which has 8 master and 8 slave windows).
95605332 69 * We'll run with this for now as far as possible, however it probably makes
f00a86d9
MW
70 * sense to get rid of the old mappings and just do everything dynamically.
71 *
72 * So for now, we'll restrict the driver to providing 4 masters and 4 slaves as
73 * defined above and try to support at least some of the interface from
95605332
JM
74 * http://www.vmelinux.org/ as an alternative the driver can be written
75 * providing a saner interface later.
238add52
MW
76 *
77 * The vmelinux.org driver never supported slave images, the devices reserved
78 * for slaves were repurposed to support all 8 master images on the UniverseII!
79 * We shall support 4 masters and 4 slaves with this driver.
f00a86d9
MW
80 */
81#define VME_MAJOR 221 /* VME Major Device Number */
82#define VME_DEVS 9 /* Number of dev entries */
83
84#define MASTER_MINOR 0
85#define MASTER_MAX 3
86#define SLAVE_MINOR 4
87#define SLAVE_MAX 7
88#define CONTROL_MINOR 8
89
90#define PCI_BUF_SIZE 0x20000 /* Size of one slave image buffer */
91
92/*
93 * Structure to handle image related parameters.
94 */
584721ca 95struct image_desc {
0a81a0f7 96 void *kern_buf; /* Buffer address in kernel space */
f00a86d9
MW
97 dma_addr_t pci_buf; /* Buffer address in PCI address space */
98 unsigned long long size_buf; /* Buffer size */
ecb3b80f 99 struct mutex mutex; /* Mutex for locking image */
f00a86d9
MW
100 struct device *device; /* Sysfs device */
101 struct vme_resource *resource; /* VME resource */
c74a804f 102 int mmap_count; /* Number of current mmap's */
584721ca 103};
cd974d35 104
584721ca 105static struct image_desc image[VME_DEVS];
f00a86d9 106
b9cc2934
EC
107static struct cdev *vme_user_cdev; /* Character device */
108static struct class *vme_user_sysfs_class; /* Sysfs class */
8f966dc4 109static struct vme_dev *vme_user_bridge; /* Pointer to user device */
f00a86d9 110
f00a86d9
MW
111static const int type[VME_DEVS] = { MASTER_MINOR, MASTER_MINOR,
112 MASTER_MINOR, MASTER_MINOR,
113 SLAVE_MINOR, SLAVE_MINOR,
114 SLAVE_MINOR, SLAVE_MINOR,
115 CONTROL_MINOR
116 };
117
c74a804f
DK
118struct vme_user_vma_priv {
119 unsigned int minor;
120 atomic_t refcnt;
121};
122
f00a86d9
MW
123/*
124 * We are going ot alloc a page during init per window for small transfers.
125 * Small transfers will go VME -> buffer -> user space. Larger (more than a
126 * page) transfers will lock the user space buffer into memory and then
127 * transfer the data directly into the user space buffers.
128 */
129static ssize_t resource_to_user(int minor, char __user *buf, size_t count,
86eadace 130 loff_t *ppos)
f00a86d9
MW
131{
132 ssize_t retval;
133 ssize_t copied = 0;
134
135 if (count <= image[minor].size_buf) {
136 /* We copy to kernel buffer */
137 copied = vme_master_read(image[minor].resource,
138 image[minor].kern_buf, count, *ppos);
45f9f018 139 if (copied < 0)
f00a86d9 140 return (int)copied;
f00a86d9
MW
141
142 retval = __copy_to_user(buf, image[minor].kern_buf,
143 (unsigned long)copied);
144 if (retval != 0) {
145 copied = (copied - retval);
0093e5f8 146 pr_info("User copy failed\n");
f00a86d9
MW
147 return -EINVAL;
148 }
149
150 } else {
151 /* XXX Need to write this */
0093e5f8 152 pr_info("Currently don't support large transfers\n");
f00a86d9
MW
153 /* Map in pages from userspace */
154
155 /* Call vme_master_read to do the transfer */
156 return -EINVAL;
157 }
158
159 return copied;
160}
161
162/*
95605332 163 * We are going to alloc a page during init per window for small transfers.
f00a86d9
MW
164 * Small transfers will go user space -> buffer -> VME. Larger (more than a
165 * page) transfers will lock the user space buffer into memory and then
166 * transfer the data directly from the user space buffers out to VME.
167 */
1a85f207 168static ssize_t resource_from_user(unsigned int minor, const char __user *buf,
86eadace 169 size_t count, loff_t *ppos)
f00a86d9
MW
170{
171 ssize_t retval;
172 ssize_t copied = 0;
173
174 if (count <= image[minor].size_buf) {
175 retval = __copy_from_user(image[minor].kern_buf, buf,
176 (unsigned long)count);
177 if (retval != 0)
178 copied = (copied - retval);
179 else
180 copied = count;
181
182 copied = vme_master_write(image[minor].resource,
183 image[minor].kern_buf, copied, *ppos);
184 } else {
185 /* XXX Need to write this */
0093e5f8 186 pr_info("Currently don't support large transfers\n");
f00a86d9
MW
187 /* Map in pages from userspace */
188
189 /* Call vme_master_write to do the transfer */
190 return -EINVAL;
191 }
192
193 return copied;
194}
195
196static ssize_t buffer_to_user(unsigned int minor, char __user *buf,
86eadace 197 size_t count, loff_t *ppos)
f00a86d9 198{
0a81a0f7 199 void *image_ptr;
f00a86d9
MW
200 ssize_t retval;
201
202 image_ptr = image[minor].kern_buf + *ppos;
203
204 retval = __copy_to_user(buf, image_ptr, (unsigned long)count);
205 if (retval != 0) {
206 retval = (count - retval);
0093e5f8 207 pr_warn("Partial copy to userspace\n");
f00a86d9
MW
208 } else
209 retval = count;
210
211 /* Return number of bytes successfully read */
212 return retval;
213}
214
1a85f207 215static ssize_t buffer_from_user(unsigned int minor, const char __user *buf,
86eadace 216 size_t count, loff_t *ppos)
f00a86d9 217{
0a81a0f7 218 void *image_ptr;
f00a86d9
MW
219 size_t retval;
220
221 image_ptr = image[minor].kern_buf + *ppos;
222
223 retval = __copy_from_user(image_ptr, buf, (unsigned long)count);
224 if (retval != 0) {
225 retval = (count - retval);
0093e5f8 226 pr_warn("Partial copy to userspace\n");
f00a86d9
MW
227 } else
228 retval = count;
229
230 /* Return number of bytes successfully read */
231 return retval;
232}
233
1a85f207 234static ssize_t vme_user_read(struct file *file, char __user *buf, size_t count,
86eadace 235 loff_t *ppos)
f00a86d9 236{
496ad9aa 237 unsigned int minor = MINOR(file_inode(file)->i_rdev);
f00a86d9
MW
238 ssize_t retval;
239 size_t image_size;
240 size_t okcount;
241
05614fbf
VB
242 if (minor == CONTROL_MINOR)
243 return 0;
244
ecb3b80f 245 mutex_lock(&image[minor].mutex);
f00a86d9
MW
246
247 /* XXX Do we *really* want this helper - we can use vme_*_get ? */
248 image_size = vme_get_size(image[minor].resource);
249
250 /* Ensure we are starting at a valid location */
251 if ((*ppos < 0) || (*ppos > (image_size - 1))) {
ecb3b80f 252 mutex_unlock(&image[minor].mutex);
f00a86d9
MW
253 return 0;
254 }
255
256 /* Ensure not reading past end of the image */
257 if (*ppos + count > image_size)
258 okcount = image_size - *ppos;
259 else
260 okcount = count;
261
45f9f018 262 switch (type[minor]) {
f00a86d9
MW
263 case MASTER_MINOR:
264 retval = resource_to_user(minor, buf, okcount, ppos);
265 break;
266 case SLAVE_MINOR:
267 retval = buffer_to_user(minor, buf, okcount, ppos);
268 break;
269 default:
270 retval = -EINVAL;
271 }
272
ecb3b80f 273 mutex_unlock(&image[minor].mutex);
f00a86d9
MW
274 if (retval > 0)
275 *ppos += retval;
276
277 return retval;
278}
279
1a85f207 280static ssize_t vme_user_write(struct file *file, const char __user *buf,
86eadace 281 size_t count, loff_t *ppos)
f00a86d9 282{
496ad9aa 283 unsigned int minor = MINOR(file_inode(file)->i_rdev);
f00a86d9
MW
284 ssize_t retval;
285 size_t image_size;
286 size_t okcount;
287
05614fbf
VB
288 if (minor == CONTROL_MINOR)
289 return 0;
290
ecb3b80f 291 mutex_lock(&image[minor].mutex);
f00a86d9
MW
292
293 image_size = vme_get_size(image[minor].resource);
294
295 /* Ensure we are starting at a valid location */
296 if ((*ppos < 0) || (*ppos > (image_size - 1))) {
ecb3b80f 297 mutex_unlock(&image[minor].mutex);
f00a86d9
MW
298 return 0;
299 }
300
301 /* Ensure not reading past end of the image */
302 if (*ppos + count > image_size)
303 okcount = image_size - *ppos;
304 else
305 okcount = count;
306
45f9f018 307 switch (type[minor]) {
f00a86d9
MW
308 case MASTER_MINOR:
309 retval = resource_from_user(minor, buf, okcount, ppos);
310 break;
311 case SLAVE_MINOR:
312 retval = buffer_from_user(minor, buf, okcount, ppos);
313 break;
314 default:
315 retval = -EINVAL;
316 }
538a697a 317
ecb3b80f 318 mutex_unlock(&image[minor].mutex);
f00a86d9
MW
319
320 if (retval > 0)
321 *ppos += retval;
322
323 return retval;
324}
325
326static loff_t vme_user_llseek(struct file *file, loff_t off, int whence)
327{
496ad9aa 328 unsigned int minor = MINOR(file_inode(file)->i_rdev);
877de4b4 329 size_t image_size;
59482291 330 loff_t res;
877de4b4 331
615c40dd
DK
332 switch (type[minor]) {
333 case MASTER_MINOR:
334 case SLAVE_MINOR:
335 mutex_lock(&image[minor].mutex);
336 image_size = vme_get_size(image[minor].resource);
337 res = fixed_size_llseek(file, off, whence, image_size);
338 mutex_unlock(&image[minor].mutex);
339 return res;
340 }
877de4b4 341
615c40dd 342 return -EINVAL;
f00a86d9
MW
343}
344
238add52
MW
345/*
346 * The ioctls provided by the old VME access method (the one at vmelinux.org)
347 * are most certainly wrong as the effectively push the registers layout
348 * through to user space. Given that the VME core can handle multiple bridges,
349 * with different register layouts this is most certainly not the way to go.
350 *
351 * We aren't using the structures defined in the Motorola driver either - these
352 * are also quite low level, however we should use the definitions that have
353 * already been defined.
354 */
f00a86d9 355static int vme_user_ioctl(struct inode *inode, struct file *file,
86eadace 356 unsigned int cmd, unsigned long arg)
f00a86d9 357{
238add52
MW
358 struct vme_master master;
359 struct vme_slave slave;
dca22184 360 struct vme_irq_id irq_req;
238add52 361 unsigned long copied;
f00a86d9 362 unsigned int minor = MINOR(inode->i_rdev);
238add52
MW
363 int retval;
364 dma_addr_t pci_addr;
1a85f207 365 void __user *argp = (void __user *)arg;
f00a86d9 366
f00a86d9
MW
367 switch (type[minor]) {
368 case CONTROL_MINOR:
dca22184
VB
369 switch (cmd) {
370 case VME_IRQ_GEN:
a7f3943c 371 copied = copy_from_user(&irq_req, argp,
dca22184
VB
372 sizeof(struct vme_irq_id));
373 if (copied != 0) {
0093e5f8 374 pr_warn("Partial copy from userspace\n");
dca22184
VB
375 return -EFAULT;
376 }
377
fc489a52 378 return vme_irq_generate(vme_user_bridge,
dca22184
VB
379 irq_req.level,
380 irq_req.statid);
dca22184 381 }
f00a86d9
MW
382 break;
383 case MASTER_MINOR:
f00a86d9 384 switch (cmd) {
238add52
MW
385 case VME_GET_MASTER:
386 memset(&master, 0, sizeof(struct vme_master));
387
388 /* XXX We do not want to push aspace, cycle and width
389 * to userspace as they are
390 */
391 retval = vme_master_get(image[minor].resource,
86eadace
DK
392 &master.enable,
393 &master.vme_addr,
394 &master.size, &master.aspace,
395 &master.cycle, &master.dwidth);
238add52 396
1a85f207 397 copied = copy_to_user(argp, &master,
86eadace 398 sizeof(struct vme_master));
238add52 399 if (copied != 0) {
0093e5f8 400 pr_warn("Partial copy to userspace\n");
238add52
MW
401 return -EFAULT;
402 }
f00a86d9 403
238add52 404 return retval;
238add52
MW
405
406 case VME_SET_MASTER:
407
c74a804f
DK
408 if (image[minor].mmap_count != 0) {
409 pr_warn("Can't adjust mapped window\n");
410 return -EPERM;
411 }
412
1a85f207 413 copied = copy_from_user(&master, argp, sizeof(master));
238add52 414 if (copied != 0) {
0093e5f8 415 pr_warn("Partial copy from userspace\n");
f00a86d9
MW
416 return -EFAULT;
417 }
418
238add52
MW
419 /* XXX We do not want to push aspace, cycle and width
420 * to userspace as they are
421 */
422 return vme_master_set(image[minor].resource,
423 master.enable, master.vme_addr, master.size,
424 master.aspace, master.cycle, master.dwidth);
f00a86d9
MW
425
426 break;
238add52
MW
427 }
428 break;
429 case SLAVE_MINOR:
430 switch (cmd) {
f00a86d9 431 case VME_GET_SLAVE:
238add52
MW
432 memset(&slave, 0, sizeof(struct vme_slave));
433
434 /* XXX We do not want to push aspace, cycle and width
435 * to userspace as they are
436 */
437 retval = vme_slave_get(image[minor].resource,
86eadace
DK
438 &slave.enable, &slave.vme_addr,
439 &slave.size, &pci_addr,
440 &slave.aspace, &slave.cycle);
238add52 441
1a85f207 442 copied = copy_to_user(argp, &slave,
86eadace 443 sizeof(struct vme_slave));
238add52 444 if (copied != 0) {
0093e5f8 445 pr_warn("Partial copy to userspace\n");
238add52
MW
446 return -EFAULT;
447 }
448
449 return retval;
f00a86d9 450
238add52 451 case VME_SET_SLAVE:
f00a86d9 452
1a85f207 453 copied = copy_from_user(&slave, argp, sizeof(slave));
238add52 454 if (copied != 0) {
0093e5f8 455 pr_warn("Partial copy from userspace\n");
f00a86d9
MW
456 return -EFAULT;
457 }
458
238add52
MW
459 /* XXX We do not want to push aspace, cycle and width
460 * to userspace as they are
461 */
462 return vme_slave_set(image[minor].resource,
463 slave.enable, slave.vme_addr, slave.size,
464 image[minor].pci_buf, slave.aspace,
465 slave.cycle);
466
f00a86d9 467 break;
f00a86d9
MW
468 }
469 break;
470 }
471
472 return -EINVAL;
473}
474
b1f2ac07
AB
475static long
476vme_user_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
477{
478 int ret;
0cd189a4
DK
479 struct inode *inode = file_inode(file);
480 unsigned int minor = MINOR(inode->i_rdev);
b1f2ac07 481
0cd189a4
DK
482 mutex_lock(&image[minor].mutex);
483 ret = vme_user_ioctl(inode, file, cmd, arg);
484 mutex_unlock(&image[minor].mutex);
b1f2ac07
AB
485
486 return ret;
487}
488
c74a804f
DK
489static void vme_user_vm_open(struct vm_area_struct *vma)
490{
491 struct vme_user_vma_priv *vma_priv = vma->vm_private_data;
492
493 atomic_inc(&vma_priv->refcnt);
494}
495
496static void vme_user_vm_close(struct vm_area_struct *vma)
497{
498 struct vme_user_vma_priv *vma_priv = vma->vm_private_data;
499 unsigned int minor = vma_priv->minor;
500
501 if (!atomic_dec_and_test(&vma_priv->refcnt))
502 return;
503
504 mutex_lock(&image[minor].mutex);
505 image[minor].mmap_count--;
506 mutex_unlock(&image[minor].mutex);
507
508 kfree(vma_priv);
509}
510
e4aea6aa
DK
511static const struct vm_operations_struct vme_user_vm_ops = {
512 .open = vme_user_vm_open,
513 .close = vme_user_vm_close,
514};
515
c74a804f
DK
516static int vme_user_master_mmap(unsigned int minor, struct vm_area_struct *vma)
517{
518 int err;
519 struct vme_user_vma_priv *vma_priv;
520
521 mutex_lock(&image[minor].mutex);
522
523 err = vme_master_mmap(image[minor].resource, vma);
524 if (err) {
525 mutex_unlock(&image[minor].mutex);
526 return err;
527 }
528
1f0622de 529 vma_priv = kmalloc(sizeof(*vma_priv), GFP_KERNEL);
f99b71be 530 if (!vma_priv) {
c74a804f
DK
531 mutex_unlock(&image[minor].mutex);
532 return -ENOMEM;
533 }
534
535 vma_priv->minor = minor;
536 atomic_set(&vma_priv->refcnt, 1);
537 vma->vm_ops = &vme_user_vm_ops;
538 vma->vm_private_data = vma_priv;
539
540 image[minor].mmap_count++;
541
542 mutex_unlock(&image[minor].mutex);
543
544 return 0;
545}
546
547static int vme_user_mmap(struct file *file, struct vm_area_struct *vma)
548{
549 unsigned int minor = MINOR(file_inode(file)->i_rdev);
550
551 if (type[minor] == MASTER_MINOR)
552 return vme_user_master_mmap(minor, vma);
553
554 return -ENODEV;
555}
556
e4aea6aa 557static const struct file_operations vme_user_fops = {
e4aea6aa
DK
558 .read = vme_user_read,
559 .write = vme_user_write,
560 .llseek = vme_user_llseek,
561 .unlocked_ioctl = vme_user_unlocked_ioctl,
562 .compat_ioctl = vme_user_unlocked_ioctl,
563 .mmap = vme_user_mmap,
564};
f00a86d9 565
5d6abf37
MV
566static int vme_user_match(struct vme_dev *vdev)
567{
978f47d6
MW
568 int i;
569
570 int cur_bus = vme_bus_num(vdev);
d7729f0f 571 int cur_slot = vme_slot_num(vdev);
978f47d6
MW
572
573 for (i = 0; i < bus_num; i++)
574 if ((cur_bus == bus[i]) && (cur_slot == vdev->num))
575 return 1;
576
577 return 0;
5d6abf37
MV
578}
579
f00a86d9 580/*
238add52
MW
581 * In this simple access driver, the old behaviour is being preserved as much
582 * as practical. We will therefore reserve the buffers and request the images
583 * here so that we don't have to do it later.
f00a86d9 584 */
d7e530d2 585static int vme_user_probe(struct vme_dev *vdev)
f00a86d9
MW
586{
587 int i, err;
f1552cbd 588 char *name;
f00a86d9 589
238add52 590 /* Save pointer to the bridge device */
f99b71be 591 if (vme_user_bridge) {
0093e5f8 592 dev_err(&vdev->dev, "Driver can only be loaded for 1 device\n");
238add52
MW
593 err = -EINVAL;
594 goto err_dev;
595 }
8f966dc4 596 vme_user_bridge = vdev;
f00a86d9
MW
597
598 /* Initialise descriptors */
599 for (i = 0; i < VME_DEVS; i++) {
600 image[i].kern_buf = NULL;
601 image[i].pci_buf = 0;
ecb3b80f 602 mutex_init(&image[i].mutex);
f00a86d9
MW
603 image[i].device = NULL;
604 image[i].resource = NULL;
f00a86d9
MW
605 }
606
f00a86d9
MW
607 /* Assign major and minor numbers for the driver */
608 err = register_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS,
86eadace 609 driver_name);
f00a86d9 610 if (err) {
0093e5f8
YT
611 dev_warn(&vdev->dev, "Error getting Major Number %d for driver.\n",
612 VME_MAJOR);
f00a86d9
MW
613 goto err_region;
614 }
615
616 /* Register the driver as a char device */
617 vme_user_cdev = cdev_alloc();
d4113a69
KAM
618 if (!vme_user_cdev) {
619 err = -ENOMEM;
620 goto err_char;
621 }
f00a86d9
MW
622 vme_user_cdev->ops = &vme_user_fops;
623 vme_user_cdev->owner = THIS_MODULE;
624 err = cdev_add(vme_user_cdev, MKDEV(VME_MAJOR, 0), VME_DEVS);
625 if (err) {
0093e5f8 626 dev_warn(&vdev->dev, "cdev_all failed\n");
f00a86d9
MW
627 goto err_char;
628 }
629
630 /* Request slave resources and allocate buffers (128kB wide) */
631 for (i = SLAVE_MINOR; i < (SLAVE_MAX + 1); i++) {
632 /* XXX Need to properly request attributes */
5188d74c
AB
633 /* For ca91cx42 bridge there are only two slave windows
634 * supporting A16 addressing, so we request A24 supported
635 * by all windows.
636 */
f00a86d9 637 image[i].resource = vme_slave_request(vme_user_bridge,
5188d74c 638 VME_A24, VME_SCT);
f99b71be 639 if (!image[i].resource) {
0093e5f8
YT
640 dev_warn(&vdev->dev,
641 "Unable to allocate slave resource\n");
465ff28d 642 err = -ENOMEM;
238add52 643 goto err_slave;
f00a86d9
MW
644 }
645 image[i].size_buf = PCI_BUF_SIZE;
646 image[i].kern_buf = vme_alloc_consistent(image[i].resource,
886953e9 647 image[i].size_buf, &image[i].pci_buf);
f99b71be 648 if (!image[i].kern_buf) {
0093e5f8
YT
649 dev_warn(&vdev->dev,
650 "Unable to allocate memory for buffer\n");
f00a86d9
MW
651 image[i].pci_buf = 0;
652 vme_slave_free(image[i].resource);
653 err = -ENOMEM;
238add52 654 goto err_slave;
f00a86d9
MW
655 }
656 }
657
658 /*
659 * Request master resources allocate page sized buffers for small
660 * reads and writes
661 */
662 for (i = MASTER_MINOR; i < (MASTER_MAX + 1); i++) {
663 /* XXX Need to properly request attributes */
664 image[i].resource = vme_master_request(vme_user_bridge,
665 VME_A32, VME_SCT, VME_D32);
f99b71be 666 if (!image[i].resource) {
0093e5f8
YT
667 dev_warn(&vdev->dev,
668 "Unable to allocate master resource\n");
465ff28d 669 err = -ENOMEM;
238add52 670 goto err_master;
f00a86d9 671 }
33e920d9
AB
672 image[i].size_buf = PCI_BUF_SIZE;
673 image[i].kern_buf = kmalloc(image[i].size_buf, GFP_KERNEL);
f99b71be 674 if (!image[i].kern_buf) {
33e920d9 675 err = -ENOMEM;
1a524893
DY
676 vme_master_free(image[i].resource);
677 goto err_master;
33e920d9 678 }
f00a86d9
MW
679 }
680
681 /* Create sysfs entries - on udev systems this creates the dev files */
682 vme_user_sysfs_class = class_create(THIS_MODULE, driver_name);
683 if (IS_ERR(vme_user_sysfs_class)) {
0093e5f8 684 dev_err(&vdev->dev, "Error creating vme_user class.\n");
f00a86d9
MW
685 err = PTR_ERR(vme_user_sysfs_class);
686 goto err_class;
687 }
688
689 /* Add sysfs Entries */
45f9f018 690 for (i = 0; i < VME_DEVS; i++) {
584721ca 691 int num;
938acb99 692
f00a86d9
MW
693 switch (type[i]) {
694 case MASTER_MINOR:
f1552cbd 695 name = "bus/vme/m%d";
f00a86d9
MW
696 break;
697 case CONTROL_MINOR:
f1552cbd 698 name = "bus/vme/ctl";
f00a86d9
MW
699 break;
700 case SLAVE_MINOR:
f1552cbd 701 name = "bus/vme/s%d";
f00a86d9
MW
702 break;
703 default:
704 err = -EINVAL;
705 goto err_sysfs;
f00a86d9
MW
706 }
707
584721ca
VB
708 num = (type[i] == SLAVE_MINOR) ? i - (MASTER_MAX + 1) : i;
709 image[i].device = device_create(vme_user_sysfs_class, NULL,
710 MKDEV(VME_MAJOR, i), NULL, name, num);
f00a86d9 711 if (IS_ERR(image[i].device)) {
0093e5f8 712 dev_info(&vdev->dev, "Error creating sysfs device\n");
f00a86d9
MW
713 err = PTR_ERR(image[i].device);
714 goto err_sysfs;
715 }
716 }
717
f00a86d9
MW
718 return 0;
719
f00a86d9 720err_sysfs:
45f9f018 721 while (i > 0) {
f00a86d9
MW
722 i--;
723 device_destroy(vme_user_sysfs_class, MKDEV(VME_MAJOR, i));
724 }
725 class_destroy(vme_user_sysfs_class);
726
238add52
MW
727 /* Ensure counter set correcty to unalloc all master windows */
728 i = MASTER_MAX + 1;
729err_master:
730 while (i > MASTER_MINOR) {
731 i--;
1a524893 732 kfree(image[i].kern_buf);
238add52
MW
733 vme_master_free(image[i].resource);
734 }
735
736 /*
737 * Ensure counter set correcty to unalloc all slave windows and buffers
738 */
f00a86d9 739 i = SLAVE_MAX + 1;
238add52
MW
740err_slave:
741 while (i > SLAVE_MINOR) {
f00a86d9 742 i--;
625a9e01
DK
743 vme_free_consistent(image[i].resource, image[i].size_buf,
744 image[i].kern_buf, image[i].pci_buf);
1daa38d3 745 vme_slave_free(image[i].resource);
f00a86d9
MW
746 }
747err_class:
748 cdev_del(vme_user_cdev);
749err_char:
750 unregister_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS);
751err_region:
238add52 752err_dev:
f00a86d9
MW
753 return err;
754}
755
f21a8247 756static int vme_user_remove(struct vme_dev *dev)
f00a86d9
MW
757{
758 int i;
759
760 /* Remove sysfs Entries */
ecb3b80f
SN
761 for (i = 0; i < VME_DEVS; i++) {
762 mutex_destroy(&image[i].mutex);
f00a86d9 763 device_destroy(vme_user_sysfs_class, MKDEV(VME_MAJOR, i));
ecb3b80f 764 }
f00a86d9
MW
765 class_destroy(vme_user_sysfs_class);
766
b62c99b1 767 for (i = MASTER_MINOR; i < (MASTER_MAX + 1); i++) {
33e920d9 768 kfree(image[i].kern_buf);
b62c99b1
EC
769 vme_master_free(image[i].resource);
770 }
33e920d9 771
f00a86d9 772 for (i = SLAVE_MINOR; i < (SLAVE_MAX + 1); i++) {
238add52 773 vme_slave_set(image[i].resource, 0, 0, 0, 0, VME_A32, 0);
625a9e01
DK
774 vme_free_consistent(image[i].resource, image[i].size_buf,
775 image[i].kern_buf, image[i].pci_buf);
1daa38d3 776 vme_slave_free(image[i].resource);
f00a86d9
MW
777 }
778
779 /* Unregister device driver */
780 cdev_del(vme_user_cdev);
781
782 /* Unregiser the major and minor device numbers */
783 unregister_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS);
238add52
MW
784
785 return 0;
f00a86d9
MW
786}
787
e4aea6aa
DK
788static struct vme_driver vme_user_driver = {
789 .name = driver_name,
790 .match = vme_user_match,
791 .probe = vme_user_probe,
792 .remove = vme_user_remove,
793};
794
795static int __init vme_user_init(void)
796{
797 int retval = 0;
798
799 pr_info("VME User Space Access Driver\n");
800
801 if (bus_num == 0) {
802 pr_err("No cards, skipping registration\n");
803 retval = -ENODEV;
804 goto err_nocard;
805 }
806
807 /* Let's start by supporting one bus, we can support more than one
808 * in future revisions if that ever becomes necessary.
809 */
810 if (bus_num > VME_USER_BUS_MAX) {
811 pr_err("Driver only able to handle %d buses\n",
812 VME_USER_BUS_MAX);
813 bus_num = VME_USER_BUS_MAX;
814 }
815
816 /*
817 * Here we just register the maximum number of devices we can and
818 * leave vme_user_match() to allow only 1 to go through to probe().
819 * This way, if we later want to allow multiple user access devices,
820 * we just change the code in vme_user_match().
821 */
822 retval = vme_register_driver(&vme_user_driver, VME_MAX_SLOTS);
823 if (retval != 0)
824 goto err_reg;
825
826 return retval;
827
828err_reg:
829err_nocard:
830 return retval;
831}
832
238add52
MW
833static void __exit vme_user_exit(void)
834{
835 vme_unregister_driver(&vme_user_driver);
238add52
MW
836}
837
238add52
MW
838MODULE_PARM_DESC(bus, "Enumeration of VMEbus to which the driver is connected");
839module_param_array(bus, int, &bus_num, 0);
840
f00a86d9 841MODULE_DESCRIPTION("VME User Space Access Driver");
66bd8db5 842MODULE_AUTHOR("Martyn Welch <martyn.welch@ge.com");
f00a86d9
MW
843MODULE_LICENSE("GPL");
844
238add52
MW
845module_init(vme_user_init);
846module_exit(vme_user_exit);