uio: uio_fsl_elbc_gpcm: Fix module autoload for OF platform driver
[linux-2.6-block.git] / drivers / uio / uio.c
CommitLineData
beafc54c
HK
1/*
2 * drivers/uio/uio.c
3 *
4 * Copyright(C) 2005, Benedikt Spranger <b.spranger@linutronix.de>
5 * Copyright(C) 2005, Thomas Gleixner <tglx@linutronix.de>
318af55d 6 * Copyright(C) 2006, Hans J. Koch <hjk@hansjkoch.de>
beafc54c
HK
7 * Copyright(C) 2006, Greg Kroah-Hartman <greg@kroah.com>
8 *
9 * Userspace IO
10 *
11 * Base Functions
12 *
13 * Licensed under the GPLv2 only.
14 */
15
16#include <linux/module.h>
17#include <linux/init.h>
18#include <linux/poll.h>
19#include <linux/device.h>
5a0e3ad6 20#include <linux/slab.h>
beafc54c
HK
21#include <linux/mm.h>
22#include <linux/idr.h>
d43c36dc 23#include <linux/sched.h>
beafc54c
HK
24#include <linux/string.h>
25#include <linux/kobject.h>
91960a46 26#include <linux/cdev.h>
beafc54c
HK
27#include <linux/uio_driver.h>
28
91960a46 29#define UIO_MAX_DEVICES (1U << MINORBITS)
beafc54c 30
beafc54c 31static int uio_major;
91960a46 32static struct cdev *uio_cdev;
beafc54c 33static DEFINE_IDR(uio_idr);
4f014691 34static const struct file_operations uio_fops;
beafc54c 35
0d4a7bc1
JC
36/* Protect idr accesses */
37static DEFINE_MUTEX(minor_lock);
38
beafc54c
HK
39/*
40 * attributes
41 */
42
81e7c6a6
GKH
43struct uio_map {
44 struct kobject kobj;
45 struct uio_mem *mem;
beafc54c 46};
81e7c6a6 47#define to_map(map) container_of(map, struct uio_map, kobj)
beafc54c 48
82057791
HK
49static ssize_t map_name_show(struct uio_mem *mem, char *buf)
50{
51 if (unlikely(!mem->name))
52 mem->name = "";
53
54 return sprintf(buf, "%s\n", mem->name);
55}
56
4f808bcd 57static ssize_t map_addr_show(struct uio_mem *mem, char *buf)
beafc54c 58{
e0f1147c 59 return sprintf(buf, "%pa\n", &mem->addr);
4f808bcd 60}
beafc54c 61
4f808bcd
BP
62static ssize_t map_size_show(struct uio_mem *mem, char *buf)
63{
e0f1147c 64 return sprintf(buf, "%pa\n", &mem->size);
beafc54c
HK
65}
66
e2b39df1
HK
67static ssize_t map_offset_show(struct uio_mem *mem, char *buf)
68{
27a90700 69 return sprintf(buf, "0x%llx\n", (unsigned long long)mem->addr & ~PAGE_MASK);
e2b39df1
HK
70}
71
e70c412e 72struct map_sysfs_entry {
4f808bcd
BP
73 struct attribute attr;
74 ssize_t (*show)(struct uio_mem *, char *);
75 ssize_t (*store)(struct uio_mem *, const char *, size_t);
76};
77
82057791
HK
78static struct map_sysfs_entry name_attribute =
79 __ATTR(name, S_IRUGO, map_name_show, NULL);
e70c412e 80static struct map_sysfs_entry addr_attribute =
4f808bcd 81 __ATTR(addr, S_IRUGO, map_addr_show, NULL);
e70c412e 82static struct map_sysfs_entry size_attribute =
4f808bcd 83 __ATTR(size, S_IRUGO, map_size_show, NULL);
e70c412e 84static struct map_sysfs_entry offset_attribute =
e2b39df1 85 __ATTR(offset, S_IRUGO, map_offset_show, NULL);
beafc54c 86
81e7c6a6 87static struct attribute *attrs[] = {
82057791 88 &name_attribute.attr,
4f808bcd 89 &addr_attribute.attr,
81e7c6a6 90 &size_attribute.attr,
e2b39df1 91 &offset_attribute.attr,
81e7c6a6 92 NULL, /* need to NULL terminate the list of attributes */
beafc54c
HK
93};
94
81e7c6a6
GKH
95static void map_release(struct kobject *kobj)
96{
97 struct uio_map *map = to_map(kobj);
98 kfree(map);
99}
100
4f808bcd
BP
101static ssize_t map_type_show(struct kobject *kobj, struct attribute *attr,
102 char *buf)
103{
104 struct uio_map *map = to_map(kobj);
105 struct uio_mem *mem = map->mem;
e70c412e 106 struct map_sysfs_entry *entry;
4f808bcd 107
e70c412e 108 entry = container_of(attr, struct map_sysfs_entry, attr);
4f808bcd
BP
109
110 if (!entry->show)
111 return -EIO;
112
113 return entry->show(mem, buf);
114}
115
52cf25d0 116static const struct sysfs_ops map_sysfs_ops = {
4f808bcd
BP
117 .show = map_type_show,
118};
119
beafc54c 120static struct kobj_type map_attr_type = {
81e7c6a6 121 .release = map_release,
e70c412e 122 .sysfs_ops = &map_sysfs_ops,
81e7c6a6 123 .default_attrs = attrs,
beafc54c
HK
124};
125
e70c412e
HK
126struct uio_portio {
127 struct kobject kobj;
128 struct uio_port *port;
129};
130#define to_portio(portio) container_of(portio, struct uio_portio, kobj)
131
82057791
HK
132static ssize_t portio_name_show(struct uio_port *port, char *buf)
133{
134 if (unlikely(!port->name))
135 port->name = "";
136
137 return sprintf(buf, "%s\n", port->name);
138}
139
e70c412e
HK
140static ssize_t portio_start_show(struct uio_port *port, char *buf)
141{
142 return sprintf(buf, "0x%lx\n", port->start);
143}
144
145static ssize_t portio_size_show(struct uio_port *port, char *buf)
146{
147 return sprintf(buf, "0x%lx\n", port->size);
148}
149
150static ssize_t portio_porttype_show(struct uio_port *port, char *buf)
151{
152 const char *porttypes[] = {"none", "x86", "gpio", "other"};
153
154 if ((port->porttype < 0) || (port->porttype > UIO_PORT_OTHER))
155 return -EINVAL;
156
157 return sprintf(buf, "port_%s\n", porttypes[port->porttype]);
158}
159
160struct portio_sysfs_entry {
161 struct attribute attr;
162 ssize_t (*show)(struct uio_port *, char *);
163 ssize_t (*store)(struct uio_port *, const char *, size_t);
164};
165
82057791
HK
166static struct portio_sysfs_entry portio_name_attribute =
167 __ATTR(name, S_IRUGO, portio_name_show, NULL);
e70c412e
HK
168static struct portio_sysfs_entry portio_start_attribute =
169 __ATTR(start, S_IRUGO, portio_start_show, NULL);
170static struct portio_sysfs_entry portio_size_attribute =
171 __ATTR(size, S_IRUGO, portio_size_show, NULL);
172static struct portio_sysfs_entry portio_porttype_attribute =
173 __ATTR(porttype, S_IRUGO, portio_porttype_show, NULL);
174
175static struct attribute *portio_attrs[] = {
82057791 176 &portio_name_attribute.attr,
e70c412e
HK
177 &portio_start_attribute.attr,
178 &portio_size_attribute.attr,
179 &portio_porttype_attribute.attr,
180 NULL,
181};
182
183static void portio_release(struct kobject *kobj)
184{
185 struct uio_portio *portio = to_portio(kobj);
186 kfree(portio);
187}
188
189static ssize_t portio_type_show(struct kobject *kobj, struct attribute *attr,
190 char *buf)
191{
192 struct uio_portio *portio = to_portio(kobj);
193 struct uio_port *port = portio->port;
194 struct portio_sysfs_entry *entry;
195
196 entry = container_of(attr, struct portio_sysfs_entry, attr);
197
198 if (!entry->show)
199 return -EIO;
200
201 return entry->show(port, buf);
202}
203
52cf25d0 204static const struct sysfs_ops portio_sysfs_ops = {
e70c412e
HK
205 .show = portio_type_show,
206};
207
208static struct kobj_type portio_attr_type = {
209 .release = portio_release,
210 .sysfs_ops = &portio_sysfs_ops,
211 .default_attrs = portio_attrs,
212};
213
c9dce927 214static ssize_t name_show(struct device *dev,
beafc54c
HK
215 struct device_attribute *attr, char *buf)
216{
217 struct uio_device *idev = dev_get_drvdata(dev);
70a9156b 218 return sprintf(buf, "%s\n", idev->info->name);
beafc54c 219}
c9dce927 220static DEVICE_ATTR_RO(name);
beafc54c 221
c9dce927 222static ssize_t version_show(struct device *dev,
beafc54c
HK
223 struct device_attribute *attr, char *buf)
224{
225 struct uio_device *idev = dev_get_drvdata(dev);
70a9156b 226 return sprintf(buf, "%s\n", idev->info->version);
beafc54c 227}
c9dce927 228static DEVICE_ATTR_RO(version);
beafc54c 229
c9dce927 230static ssize_t event_show(struct device *dev,
beafc54c
HK
231 struct device_attribute *attr, char *buf)
232{
233 struct uio_device *idev = dev_get_drvdata(dev);
70a9156b 234 return sprintf(buf, "%u\n", (unsigned int)atomic_read(&idev->event));
beafc54c 235}
c9dce927 236static DEVICE_ATTR_RO(event);
beafc54c 237
c9dce927
GKH
238static struct attribute *uio_attrs[] = {
239 &dev_attr_name.attr,
240 &dev_attr_version.attr,
241 &dev_attr_event.attr,
242 NULL,
beafc54c 243};
c9dce927 244ATTRIBUTE_GROUPS(uio);
beafc54c 245
c66fdab6
EB
246/* UIO class infrastructure */
247static struct class uio_class = {
248 .name = "uio",
c9dce927 249 .dev_groups = uio_groups,
beafc54c
HK
250};
251
252/*
253 * device functions
254 */
255static int uio_dev_add_attributes(struct uio_device *idev)
256{
257 int ret;
e70c412e 258 int mi, pi;
beafc54c 259 int map_found = 0;
e70c412e 260 int portio_found = 0;
beafc54c 261 struct uio_mem *mem;
81e7c6a6 262 struct uio_map *map;
e70c412e
HK
263 struct uio_port *port;
264 struct uio_portio *portio;
beafc54c 265
beafc54c
HK
266 for (mi = 0; mi < MAX_UIO_MAPS; mi++) {
267 mem = &idev->info->mem[mi];
268 if (mem->size == 0)
269 break;
270 if (!map_found) {
271 map_found = 1;
81e7c6a6
GKH
272 idev->map_dir = kobject_create_and_add("maps",
273 &idev->dev->kobj);
274 if (!idev->map_dir)
e70c412e 275 goto err_map;
beafc54c 276 }
81e7c6a6
GKH
277 map = kzalloc(sizeof(*map), GFP_KERNEL);
278 if (!map)
75f0aef6 279 goto err_map_kobj;
f9cb074b 280 kobject_init(&map->kobj, &map_attr_type);
81e7c6a6
GKH
281 map->mem = mem;
282 mem->map = map;
b2d6db58 283 ret = kobject_add(&map->kobj, idev->map_dir, "map%d", mi);
81e7c6a6 284 if (ret)
75f0aef6 285 goto err_map_kobj;
81e7c6a6 286 ret = kobject_uevent(&map->kobj, KOBJ_ADD);
beafc54c 287 if (ret)
e70c412e
HK
288 goto err_map;
289 }
290
291 for (pi = 0; pi < MAX_UIO_PORT_REGIONS; pi++) {
292 port = &idev->info->port[pi];
293 if (port->size == 0)
294 break;
295 if (!portio_found) {
296 portio_found = 1;
297 idev->portio_dir = kobject_create_and_add("portio",
298 &idev->dev->kobj);
299 if (!idev->portio_dir)
300 goto err_portio;
301 }
302 portio = kzalloc(sizeof(*portio), GFP_KERNEL);
303 if (!portio)
75f0aef6 304 goto err_portio_kobj;
e70c412e
HK
305 kobject_init(&portio->kobj, &portio_attr_type);
306 portio->port = port;
307 port->portio = portio;
308 ret = kobject_add(&portio->kobj, idev->portio_dir,
309 "port%d", pi);
310 if (ret)
75f0aef6 311 goto err_portio_kobj;
e70c412e
HK
312 ret = kobject_uevent(&portio->kobj, KOBJ_ADD);
313 if (ret)
314 goto err_portio;
beafc54c
HK
315 }
316
317 return 0;
318
e70c412e 319err_portio:
75f0aef6
CD
320 pi--;
321err_portio_kobj:
322 for (; pi >= 0; pi--) {
e70c412e
HK
323 port = &idev->info->port[pi];
324 portio = port->portio;
325 kobject_put(&portio->kobj);
326 }
327 kobject_put(idev->portio_dir);
328err_map:
75f0aef6
CD
329 mi--;
330err_map_kobj:
331 for (; mi >= 0; mi--) {
beafc54c 332 mem = &idev->info->mem[mi];
81e7c6a6 333 map = mem->map;
c10997f6 334 kobject_put(&map->kobj);
beafc54c 335 }
c10997f6 336 kobject_put(idev->map_dir);
beafc54c
HK
337 dev_err(idev->dev, "error creating sysfs files (%d)\n", ret);
338 return ret;
339}
340
341static void uio_dev_del_attributes(struct uio_device *idev)
342{
e70c412e 343 int i;
beafc54c 344 struct uio_mem *mem;
e70c412e
HK
345 struct uio_port *port;
346
347 for (i = 0; i < MAX_UIO_MAPS; i++) {
348 mem = &idev->info->mem[i];
beafc54c
HK
349 if (mem->size == 0)
350 break;
c10997f6 351 kobject_put(&mem->map->kobj);
beafc54c 352 }
c10997f6 353 kobject_put(idev->map_dir);
e70c412e
HK
354
355 for (i = 0; i < MAX_UIO_PORT_REGIONS; i++) {
356 port = &idev->info->port[i];
357 if (port->size == 0)
358 break;
359 kobject_put(&port->portio->kobj);
360 }
361 kobject_put(idev->portio_dir);
beafc54c
HK
362}
363
364static int uio_get_minor(struct uio_device *idev)
365{
beafc54c 366 int retval = -ENOMEM;
beafc54c
HK
367
368 mutex_lock(&minor_lock);
6d770931
TH
369 retval = idr_alloc(&uio_idr, idev, 0, UIO_MAX_DEVICES, GFP_KERNEL);
370 if (retval >= 0) {
371 idev->minor = retval;
5ed0505c 372 retval = 0;
6d770931 373 } else if (retval == -ENOSPC) {
c6edc42f
HD
374 dev_err(idev->dev, "too many uio devices\n");
375 retval = -EINVAL;
c6edc42f 376 }
beafc54c
HK
377 mutex_unlock(&minor_lock);
378 return retval;
379}
380
381static void uio_free_minor(struct uio_device *idev)
382{
0d4a7bc1 383 mutex_lock(&minor_lock);
beafc54c 384 idr_remove(&uio_idr, idev->minor);
0d4a7bc1 385 mutex_unlock(&minor_lock);
beafc54c
HK
386}
387
388/**
389 * uio_event_notify - trigger an interrupt event
390 * @info: UIO device capabilities
391 */
392void uio_event_notify(struct uio_info *info)
393{
394 struct uio_device *idev = info->uio_dev;
395
396 atomic_inc(&idev->event);
397 wake_up_interruptible(&idev->wait);
398 kill_fasync(&idev->async_queue, SIGIO, POLL_IN);
399}
400EXPORT_SYMBOL_GPL(uio_event_notify);
401
402/**
403 * uio_interrupt - hardware interrupt handler
404 * @irq: IRQ number, can be UIO_IRQ_CYCLIC for cyclic timer
405 * @dev_id: Pointer to the devices uio_device structure
406 */
407static irqreturn_t uio_interrupt(int irq, void *dev_id)
408{
409 struct uio_device *idev = (struct uio_device *)dev_id;
410 irqreturn_t ret = idev->info->handler(irq, idev->info);
411
412 if (ret == IRQ_HANDLED)
413 uio_event_notify(idev->info);
414
415 return ret;
416}
417
418struct uio_listener {
419 struct uio_device *dev;
420 s32 event_count;
421};
422
423static int uio_open(struct inode *inode, struct file *filep)
424{
425 struct uio_device *idev;
426 struct uio_listener *listener;
427 int ret = 0;
428
0d4a7bc1 429 mutex_lock(&minor_lock);
beafc54c 430 idev = idr_find(&uio_idr, iminor(inode));
0d4a7bc1 431 mutex_unlock(&minor_lock);
fbc8a81d
JC
432 if (!idev) {
433 ret = -ENODEV;
434 goto out;
435 }
beafc54c 436
fbc8a81d
JC
437 if (!try_module_get(idev->owner)) {
438 ret = -ENODEV;
439 goto out;
440 }
610ad506 441
beafc54c 442 listener = kmalloc(sizeof(*listener), GFP_KERNEL);
610ad506
UKK
443 if (!listener) {
444 ret = -ENOMEM;
445 goto err_alloc_listener;
446 }
beafc54c
HK
447
448 listener->dev = idev;
449 listener->event_count = atomic_read(&idev->event);
450 filep->private_data = listener;
451
452 if (idev->info->open) {
beafc54c 453 ret = idev->info->open(idev->info, inode);
610ad506
UKK
454 if (ret)
455 goto err_infoopen;
beafc54c 456 }
610ad506
UKK
457 return 0;
458
459err_infoopen:
610ad506 460 kfree(listener);
610ad506 461
0d4a7bc1 462err_alloc_listener:
610ad506 463 module_put(idev->owner);
beafc54c 464
fbc8a81d 465out:
beafc54c
HK
466 return ret;
467}
468
469static int uio_fasync(int fd, struct file *filep, int on)
470{
471 struct uio_listener *listener = filep->private_data;
472 struct uio_device *idev = listener->dev;
473
474 return fasync_helper(fd, filep, on, &idev->async_queue);
475}
476
477static int uio_release(struct inode *inode, struct file *filep)
478{
479 int ret = 0;
480 struct uio_listener *listener = filep->private_data;
481 struct uio_device *idev = listener->dev;
482
610ad506 483 if (idev->info->release)
beafc54c 484 ret = idev->info->release(idev->info, inode);
610ad506
UKK
485
486 module_put(idev->owner);
beafc54c
HK
487 kfree(listener);
488 return ret;
489}
490
491static unsigned int uio_poll(struct file *filep, poll_table *wait)
492{
493 struct uio_listener *listener = filep->private_data;
494 struct uio_device *idev = listener->dev;
495
6427a765 496 if (!idev->info->irq)
beafc54c
HK
497 return -EIO;
498
499 poll_wait(filep, &idev->wait, wait);
500 if (listener->event_count != atomic_read(&idev->event))
501 return POLLIN | POLLRDNORM;
502 return 0;
503}
504
505static ssize_t uio_read(struct file *filep, char __user *buf,
506 size_t count, loff_t *ppos)
507{
508 struct uio_listener *listener = filep->private_data;
509 struct uio_device *idev = listener->dev;
510 DECLARE_WAITQUEUE(wait, current);
511 ssize_t retval;
512 s32 event_count;
513
6427a765 514 if (!idev->info->irq)
beafc54c
HK
515 return -EIO;
516
517 if (count != sizeof(s32))
518 return -EINVAL;
519
520 add_wait_queue(&idev->wait, &wait);
521
522 do {
523 set_current_state(TASK_INTERRUPTIBLE);
524
525 event_count = atomic_read(&idev->event);
526 if (event_count != listener->event_count) {
527 if (copy_to_user(buf, &event_count, count))
528 retval = -EFAULT;
529 else {
530 listener->event_count = event_count;
531 retval = count;
532 }
533 break;
534 }
535
536 if (filep->f_flags & O_NONBLOCK) {
537 retval = -EAGAIN;
538 break;
539 }
540
541 if (signal_pending(current)) {
542 retval = -ERESTARTSYS;
543 break;
544 }
545 schedule();
546 } while (1);
547
548 __set_current_state(TASK_RUNNING);
549 remove_wait_queue(&idev->wait, &wait);
550
551 return retval;
552}
553
328a14e7
HK
554static ssize_t uio_write(struct file *filep, const char __user *buf,
555 size_t count, loff_t *ppos)
556{
557 struct uio_listener *listener = filep->private_data;
558 struct uio_device *idev = listener->dev;
559 ssize_t retval;
560 s32 irq_on;
561
6427a765 562 if (!idev->info->irq)
328a14e7
HK
563 return -EIO;
564
565 if (count != sizeof(s32))
566 return -EINVAL;
567
568 if (!idev->info->irqcontrol)
569 return -ENOSYS;
570
571 if (copy_from_user(&irq_on, buf, count))
572 return -EFAULT;
573
574 retval = idev->info->irqcontrol(idev->info, irq_on);
575
576 return retval ? retval : sizeof(s32);
577}
578
beafc54c
HK
579static int uio_find_mem_index(struct vm_area_struct *vma)
580{
beafc54c
HK
581 struct uio_device *idev = vma->vm_private_data;
582
f0c554fd
HD
583 if (vma->vm_pgoff < MAX_UIO_MAPS) {
584 if (idev->info->mem[vma->vm_pgoff].size == 0)
beafc54c 585 return -1;
f0c554fd 586 return (int)vma->vm_pgoff;
beafc54c
HK
587 }
588 return -1;
589}
590
a18b630d 591static int uio_vma_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
beafc54c
HK
592{
593 struct uio_device *idev = vma->vm_private_data;
a18b630d 594 struct page *page;
02683ffd 595 unsigned long offset;
e6418fcc 596 void *addr;
beafc54c
HK
597
598 int mi = uio_find_mem_index(vma);
599 if (mi < 0)
a18b630d 600 return VM_FAULT_SIGBUS;
beafc54c 601
02683ffd
AH
602 /*
603 * We need to subtract mi because userspace uses offset = N*PAGE_SIZE
604 * to use mem[N].
605 */
606 offset = (vmf->pgoff - mi) << PAGE_SHIFT;
607
e6418fcc 608 addr = (void *)(unsigned long)idev->info->mem[mi].addr + offset;
beafc54c 609 if (idev->info->mem[mi].memtype == UIO_MEM_LOGICAL)
e6418fcc 610 page = virt_to_page(addr);
beafc54c 611 else
e6418fcc 612 page = vmalloc_to_page(addr);
beafc54c 613 get_page(page);
a18b630d
NP
614 vmf->page = page;
615 return 0;
beafc54c
HK
616}
617
7294151d 618static const struct vm_operations_struct uio_logical_vm_ops = {
a18b630d 619 .fault = uio_vma_fault,
beafc54c
HK
620};
621
7294151d
UKK
622static int uio_mmap_logical(struct vm_area_struct *vma)
623{
624 vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP;
625 vma->vm_ops = &uio_logical_vm_ops;
7294151d
UKK
626 return 0;
627}
628
629static const struct vm_operations_struct uio_physical_vm_ops = {
630#ifdef CONFIG_HAVE_IOREMAP_PROT
631 .access = generic_access_phys,
632#endif
633};
634
beafc54c
HK
635static int uio_mmap_physical(struct vm_area_struct *vma)
636{
637 struct uio_device *idev = vma->vm_private_data;
638 int mi = uio_find_mem_index(vma);
7314e613 639 struct uio_mem *mem;
beafc54c
HK
640 if (mi < 0)
641 return -EINVAL;
7314e613 642 mem = idev->info->mem + mi;
beafc54c 643
b6550287
LT
644 if (mem->addr & ~PAGE_MASK)
645 return -ENODEV;
b29f680c 646 if (vma->vm_end - vma->vm_start > mem->size)
7314e613 647 return -EINVAL;
7294151d 648
7314e613 649 vma->vm_ops = &uio_physical_vm_ops;
c9698d6b 650 vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
beafc54c 651
7314e613
LT
652 /*
653 * We cannot use the vm_iomap_memory() helper here,
654 * because vma->vm_pgoff is the map index we looked
655 * up above in uio_find_mem_index(), rather than an
656 * actual page offset into the mmap.
657 *
658 * So we just do the physical mmap without a page
659 * offset.
660 */
beafc54c
HK
661 return remap_pfn_range(vma,
662 vma->vm_start,
7314e613 663 mem->addr >> PAGE_SHIFT,
beafc54c
HK
664 vma->vm_end - vma->vm_start,
665 vma->vm_page_prot);
666}
667
beafc54c
HK
668static int uio_mmap(struct file *filep, struct vm_area_struct *vma)
669{
670 struct uio_listener *listener = filep->private_data;
671 struct uio_device *idev = listener->dev;
672 int mi;
673 unsigned long requested_pages, actual_pages;
674 int ret = 0;
675
676 if (vma->vm_end < vma->vm_start)
677 return -EINVAL;
678
679 vma->vm_private_data = idev;
680
681 mi = uio_find_mem_index(vma);
682 if (mi < 0)
683 return -EINVAL;
684
52c2dad9 685 requested_pages = vma_pages(vma);
6da2d377
IA
686 actual_pages = ((idev->info->mem[mi].addr & ~PAGE_MASK)
687 + idev->info->mem[mi].size + PAGE_SIZE -1) >> PAGE_SHIFT;
beafc54c
HK
688 if (requested_pages > actual_pages)
689 return -EINVAL;
690
691 if (idev->info->mmap) {
beafc54c 692 ret = idev->info->mmap(idev->info, vma);
beafc54c
HK
693 return ret;
694 }
695
696 switch (idev->info->mem[mi].memtype) {
697 case UIO_MEM_PHYS:
698 return uio_mmap_physical(vma);
699 case UIO_MEM_LOGICAL:
700 case UIO_MEM_VIRTUAL:
701 return uio_mmap_logical(vma);
702 default:
703 return -EINVAL;
704 }
705}
706
4f014691 707static const struct file_operations uio_fops = {
beafc54c
HK
708 .owner = THIS_MODULE,
709 .open = uio_open,
710 .release = uio_release,
711 .read = uio_read,
328a14e7 712 .write = uio_write,
beafc54c
HK
713 .mmap = uio_mmap,
714 .poll = uio_poll,
715 .fasync = uio_fasync,
6038f373 716 .llseek = noop_llseek,
beafc54c
HK
717};
718
719static int uio_major_init(void)
720{
91960a46
EB
721 static const char name[] = "uio";
722 struct cdev *cdev = NULL;
723 dev_t uio_dev = 0;
724 int result;
725
726 result = alloc_chrdev_region(&uio_dev, 0, UIO_MAX_DEVICES, name);
727 if (result)
728 goto out;
729
730 result = -ENOMEM;
731 cdev = cdev_alloc();
732 if (!cdev)
733 goto out_unregister;
734
735 cdev->owner = THIS_MODULE;
736 cdev->ops = &uio_fops;
737 kobject_set_name(&cdev->kobj, "%s", name);
738
739 result = cdev_add(cdev, uio_dev, UIO_MAX_DEVICES);
740 if (result)
741 goto out_put;
742
743 uio_major = MAJOR(uio_dev);
744 uio_cdev = cdev;
d80df1ce 745 return 0;
91960a46
EB
746out_put:
747 kobject_put(&cdev->kobj);
748out_unregister:
749 unregister_chrdev_region(uio_dev, UIO_MAX_DEVICES);
d80df1ce
WG
750out:
751 return result;
beafc54c
HK
752}
753
754static void uio_major_cleanup(void)
755{
91960a46
EB
756 unregister_chrdev_region(MKDEV(uio_major, 0), UIO_MAX_DEVICES);
757 cdev_del(uio_cdev);
beafc54c
HK
758}
759
760static int init_uio_class(void)
761{
3d4f9d76 762 int ret;
beafc54c
HK
763
764 /* This is the first time in here, set everything up properly */
765 ret = uio_major_init();
766 if (ret)
767 goto exit;
768
c66fdab6
EB
769 ret = class_register(&uio_class);
770 if (ret) {
771 printk(KERN_ERR "class_register failed for uio\n");
772 goto err_class_register;
beafc54c
HK
773 }
774 return 0;
775
c66fdab6 776err_class_register:
beafc54c
HK
777 uio_major_cleanup();
778exit:
779 return ret;
780}
781
3d4f9d76 782static void release_uio_class(void)
beafc54c 783{
c66fdab6 784 class_unregister(&uio_class);
beafc54c 785 uio_major_cleanup();
beafc54c
HK
786}
787
788/**
789 * uio_register_device - register a new userspace IO device
790 * @owner: module that creates the new device
791 * @parent: parent device
792 * @info: UIO device capabilities
793 *
794 * returns zero on success or a negative error code.
795 */
796int __uio_register_device(struct module *owner,
797 struct device *parent,
798 struct uio_info *info)
799{
800 struct uio_device *idev;
801 int ret = 0;
802
803 if (!parent || !info || !info->name || !info->version)
804 return -EINVAL;
805
806 info->uio_dev = NULL;
807
e6789cd3 808 idev = devm_kzalloc(parent, sizeof(*idev), GFP_KERNEL);
beafc54c 809 if (!idev) {
e6789cd3 810 return -ENOMEM;
beafc54c
HK
811 }
812
813 idev->owner = owner;
814 idev->info = info;
815 init_waitqueue_head(&idev->wait);
816 atomic_set(&idev->event, 0);
817
818 ret = uio_get_minor(idev);
819 if (ret)
e6789cd3 820 return ret;
beafc54c 821
c66fdab6 822 idev->dev = device_create(&uio_class, parent,
a9b12619
GKH
823 MKDEV(uio_major, idev->minor), idev,
824 "uio%d", idev->minor);
beafc54c
HK
825 if (IS_ERR(idev->dev)) {
826 printk(KERN_ERR "UIO: device register failed\n");
827 ret = PTR_ERR(idev->dev);
828 goto err_device_create;
829 }
beafc54c
HK
830
831 ret = uio_dev_add_attributes(idev);
832 if (ret)
833 goto err_uio_dev_add_attributes;
834
835 info->uio_dev = idev;
836
6427a765 837 if (info->irq && (info->irq != UIO_IRQ_CUSTOM)) {
a087146c
BR
838 /*
839 * Note that we deliberately don't use devm_request_irq
840 * here. The parent module can unregister the UIO device
841 * and call pci_disable_msi, which requires that this
842 * irq has been freed. However, the device may have open
843 * FDs at the time of unregister and therefore may not be
844 * freed until they are released.
845 */
846 ret = request_irq(info->irq, uio_interrupt,
6427a765 847 info->irq_flags, info->name, idev);
beafc54c
HK
848 if (ret)
849 goto err_request_irq;
850 }
851
852 return 0;
853
854err_request_irq:
855 uio_dev_del_attributes(idev);
856err_uio_dev_add_attributes:
c66fdab6 857 device_destroy(&uio_class, MKDEV(uio_major, idev->minor));
beafc54c
HK
858err_device_create:
859 uio_free_minor(idev);
beafc54c
HK
860 return ret;
861}
862EXPORT_SYMBOL_GPL(__uio_register_device);
863
864/**
865 * uio_unregister_device - unregister a industrial IO device
866 * @info: UIO device capabilities
867 *
868 */
869void uio_unregister_device(struct uio_info *info)
870{
871 struct uio_device *idev;
872
873 if (!info || !info->uio_dev)
874 return;
875
876 idev = info->uio_dev;
877
878 uio_free_minor(idev);
879
beafc54c
HK
880 uio_dev_del_attributes(idev);
881
9ff2c132
SH
882 if (info->irq && info->irq != UIO_IRQ_CUSTOM)
883 free_irq(info->irq, idev);
a087146c 884
c66fdab6 885 device_destroy(&uio_class, MKDEV(uio_major, idev->minor));
beafc54c
HK
886
887 return;
888}
889EXPORT_SYMBOL_GPL(uio_unregister_device);
890
891static int __init uio_init(void)
892{
3d4f9d76 893 return init_uio_class();
beafc54c
HK
894}
895
896static void __exit uio_exit(void)
897{
3d4f9d76 898 release_uio_class();
e2ef9393 899 idr_destroy(&uio_idr);
beafc54c
HK
900}
901
902module_init(uio_init)
903module_exit(uio_exit)
904MODULE_LICENSE("GPL v2");