1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright(C) 2005, Benedikt Spranger <b.spranger@linutronix.de>
6 * Copyright(C) 2005, Thomas Gleixner <tglx@linutronix.de>
7 * Copyright(C) 2006, Hans J. Koch <hjk@hansjkoch.de>
8 * Copyright(C) 2006, Greg Kroah-Hartman <greg@kroah.com>
15 #include <linux/module.h>
16 #include <linux/init.h>
17 #include <linux/poll.h>
18 #include <linux/device.h>
19 #include <linux/slab.h>
21 #include <linux/idr.h>
22 #include <linux/sched/signal.h>
23 #include <linux/string.h>
24 #include <linux/kobject.h>
25 #include <linux/cdev.h>
26 #include <linux/uio_driver.h>
27 #include <linux/dma-mapping.h>
29 #define UIO_MAX_DEVICES (1U << MINORBITS)
32 static struct cdev
*uio_cdev
;
33 static DEFINE_IDR(uio_idr
);
34 static const struct file_operations uio_fops
;
36 /* Protect idr accesses */
37 static DEFINE_MUTEX(minor_lock
);
47 #define to_map(map) container_of(map, struct uio_map, kobj)
49 static ssize_t
map_name_show(struct uio_mem
*mem
, char *buf
)
51 if (unlikely(!mem
->name
))
54 return sprintf(buf
, "%s\n", mem
->name
);
57 static ssize_t
map_addr_show(struct uio_mem
*mem
, char *buf
)
59 return sprintf(buf
, "%pa\n", &mem
->addr
);
62 static ssize_t
map_size_show(struct uio_mem
*mem
, char *buf
)
64 return sprintf(buf
, "%pa\n", &mem
->size
);
67 static ssize_t
map_offset_show(struct uio_mem
*mem
, char *buf
)
69 return sprintf(buf
, "0x%llx\n", (unsigned long long)mem
->offs
);
72 struct map_sysfs_entry
{
73 struct attribute attr
;
74 ssize_t (*show
)(struct uio_mem
*, char *);
75 ssize_t (*store
)(struct uio_mem
*, const char *, size_t);
78 static struct map_sysfs_entry name_attribute
=
79 __ATTR(name
, S_IRUGO
, map_name_show
, NULL
);
80 static struct map_sysfs_entry addr_attribute
=
81 __ATTR(addr
, S_IRUGO
, map_addr_show
, NULL
);
82 static struct map_sysfs_entry size_attribute
=
83 __ATTR(size
, S_IRUGO
, map_size_show
, NULL
);
84 static struct map_sysfs_entry offset_attribute
=
85 __ATTR(offset
, S_IRUGO
, map_offset_show
, NULL
);
87 static struct attribute
*map_attrs
[] = {
91 &offset_attribute
.attr
,
92 NULL
, /* need to NULL terminate the list of attributes */
94 ATTRIBUTE_GROUPS(map
);
96 static void map_release(struct kobject
*kobj
)
98 struct uio_map
*map
= to_map(kobj
);
102 static ssize_t
map_type_show(struct kobject
*kobj
, struct attribute
*attr
,
105 struct uio_map
*map
= to_map(kobj
);
106 struct uio_mem
*mem
= map
->mem
;
107 struct map_sysfs_entry
*entry
;
109 entry
= container_of(attr
, struct map_sysfs_entry
, attr
);
114 return entry
->show(mem
, buf
);
117 static const struct sysfs_ops map_sysfs_ops
= {
118 .show
= map_type_show
,
121 static const struct kobj_type map_attr_type
= {
122 .release
= map_release
,
123 .sysfs_ops
= &map_sysfs_ops
,
124 .default_groups
= map_groups
,
129 struct uio_port
*port
;
131 #define to_portio(portio) container_of(portio, struct uio_portio, kobj)
133 static ssize_t
portio_name_show(struct uio_port
*port
, char *buf
)
135 if (unlikely(!port
->name
))
138 return sprintf(buf
, "%s\n", port
->name
);
141 static ssize_t
portio_start_show(struct uio_port
*port
, char *buf
)
143 return sprintf(buf
, "0x%lx\n", port
->start
);
146 static ssize_t
portio_size_show(struct uio_port
*port
, char *buf
)
148 return sprintf(buf
, "0x%lx\n", port
->size
);
151 static ssize_t
portio_porttype_show(struct uio_port
*port
, char *buf
)
153 const char *porttypes
[] = {"none", "x86", "gpio", "other"};
155 if ((port
->porttype
< 0) || (port
->porttype
> UIO_PORT_OTHER
))
158 return sprintf(buf
, "port_%s\n", porttypes
[port
->porttype
]);
161 struct portio_sysfs_entry
{
162 struct attribute attr
;
163 ssize_t (*show
)(struct uio_port
*, char *);
164 ssize_t (*store
)(struct uio_port
*, const char *, size_t);
167 static struct portio_sysfs_entry portio_name_attribute
=
168 __ATTR(name
, S_IRUGO
, portio_name_show
, NULL
);
169 static struct portio_sysfs_entry portio_start_attribute
=
170 __ATTR(start
, S_IRUGO
, portio_start_show
, NULL
);
171 static struct portio_sysfs_entry portio_size_attribute
=
172 __ATTR(size
, S_IRUGO
, portio_size_show
, NULL
);
173 static struct portio_sysfs_entry portio_porttype_attribute
=
174 __ATTR(porttype
, S_IRUGO
, portio_porttype_show
, NULL
);
176 static struct attribute
*portio_attrs
[] = {
177 &portio_name_attribute
.attr
,
178 &portio_start_attribute
.attr
,
179 &portio_size_attribute
.attr
,
180 &portio_porttype_attribute
.attr
,
183 ATTRIBUTE_GROUPS(portio
);
185 static void portio_release(struct kobject
*kobj
)
187 struct uio_portio
*portio
= to_portio(kobj
);
191 static ssize_t
portio_type_show(struct kobject
*kobj
, struct attribute
*attr
,
194 struct uio_portio
*portio
= to_portio(kobj
);
195 struct uio_port
*port
= portio
->port
;
196 struct portio_sysfs_entry
*entry
;
198 entry
= container_of(attr
, struct portio_sysfs_entry
, attr
);
203 return entry
->show(port
, buf
);
206 static const struct sysfs_ops portio_sysfs_ops
= {
207 .show
= portio_type_show
,
210 static const struct kobj_type portio_attr_type
= {
211 .release
= portio_release
,
212 .sysfs_ops
= &portio_sysfs_ops
,
213 .default_groups
= portio_groups
,
216 static ssize_t
name_show(struct device
*dev
,
217 struct device_attribute
*attr
, char *buf
)
219 struct uio_device
*idev
= dev_get_drvdata(dev
);
222 mutex_lock(&idev
->info_lock
);
225 dev_err(dev
, "the device has been unregistered\n");
229 ret
= sprintf(buf
, "%s\n", idev
->info
->name
);
232 mutex_unlock(&idev
->info_lock
);
235 static DEVICE_ATTR_RO(name
);
237 static ssize_t
version_show(struct device
*dev
,
238 struct device_attribute
*attr
, char *buf
)
240 struct uio_device
*idev
= dev_get_drvdata(dev
);
243 mutex_lock(&idev
->info_lock
);
246 dev_err(dev
, "the device has been unregistered\n");
250 ret
= sprintf(buf
, "%s\n", idev
->info
->version
);
253 mutex_unlock(&idev
->info_lock
);
256 static DEVICE_ATTR_RO(version
);
258 static ssize_t
event_show(struct device
*dev
,
259 struct device_attribute
*attr
, char *buf
)
261 struct uio_device
*idev
= dev_get_drvdata(dev
);
262 return sprintf(buf
, "%u\n", (unsigned int)atomic_read(&idev
->event
));
264 static DEVICE_ATTR_RO(event
);
266 static struct attribute
*uio_attrs
[] = {
268 &dev_attr_version
.attr
,
269 &dev_attr_event
.attr
,
272 ATTRIBUTE_GROUPS(uio
);
274 /* UIO class infrastructure */
275 static struct class uio_class
= {
277 .dev_groups
= uio_groups
,
280 static bool uio_class_registered
;
285 static int uio_dev_add_attributes(struct uio_device
*idev
)
290 int portio_found
= 0;
293 struct uio_port
*port
;
294 struct uio_portio
*portio
;
296 for (mi
= 0; mi
< MAX_UIO_MAPS
; mi
++) {
297 mem
= &idev
->info
->mem
[mi
];
302 idev
->map_dir
= kobject_create_and_add("maps",
304 if (!idev
->map_dir
) {
309 map
= kzalloc(sizeof(*map
), GFP_KERNEL
);
314 kobject_init(&map
->kobj
, &map_attr_type
);
317 ret
= kobject_add(&map
->kobj
, idev
->map_dir
, "map%d", mi
);
320 ret
= kobject_uevent(&map
->kobj
, KOBJ_ADD
);
325 for (pi
= 0; pi
< MAX_UIO_PORT_REGIONS
; pi
++) {
326 port
= &idev
->info
->port
[pi
];
331 idev
->portio_dir
= kobject_create_and_add("portio",
333 if (!idev
->portio_dir
) {
338 portio
= kzalloc(sizeof(*portio
), GFP_KERNEL
);
343 kobject_init(&portio
->kobj
, &portio_attr_type
);
345 port
->portio
= portio
;
346 ret
= kobject_add(&portio
->kobj
, idev
->portio_dir
,
349 goto err_portio_kobj
;
350 ret
= kobject_uevent(&portio
->kobj
, KOBJ_ADD
);
352 goto err_portio_kobj
;
360 for (; pi
>= 0; pi
--) {
361 port
= &idev
->info
->port
[pi
];
362 portio
= port
->portio
;
363 kobject_put(&portio
->kobj
);
365 kobject_put(idev
->portio_dir
);
369 for (; mi
>= 0; mi
--) {
370 mem
= &idev
->info
->mem
[mi
];
372 kobject_put(&map
->kobj
);
374 kobject_put(idev
->map_dir
);
375 dev_err(&idev
->dev
, "error creating sysfs files (%d)\n", ret
);
379 static void uio_dev_del_attributes(struct uio_device
*idev
)
383 struct uio_port
*port
;
385 for (i
= 0; i
< MAX_UIO_MAPS
; i
++) {
386 mem
= &idev
->info
->mem
[i
];
389 kobject_put(&mem
->map
->kobj
);
391 kobject_put(idev
->map_dir
);
393 for (i
= 0; i
< MAX_UIO_PORT_REGIONS
; i
++) {
394 port
= &idev
->info
->port
[i
];
397 kobject_put(&port
->portio
->kobj
);
399 kobject_put(idev
->portio_dir
);
402 static int uio_get_minor(struct uio_device
*idev
)
406 mutex_lock(&minor_lock
);
407 retval
= idr_alloc(&uio_idr
, idev
, 0, UIO_MAX_DEVICES
, GFP_KERNEL
);
409 idev
->minor
= retval
;
411 } else if (retval
== -ENOSPC
) {
412 dev_err(&idev
->dev
, "too many uio devices\n");
415 mutex_unlock(&minor_lock
);
419 static void uio_free_minor(unsigned long minor
)
421 mutex_lock(&minor_lock
);
422 idr_remove(&uio_idr
, minor
);
423 mutex_unlock(&minor_lock
);
427 * uio_event_notify - trigger an interrupt event
428 * @info: UIO device capabilities
430 void uio_event_notify(struct uio_info
*info
)
432 struct uio_device
*idev
= info
->uio_dev
;
434 atomic_inc(&idev
->event
);
435 wake_up_interruptible(&idev
->wait
);
436 kill_fasync(&idev
->async_queue
, SIGIO
, POLL_IN
);
438 EXPORT_SYMBOL_GPL(uio_event_notify
);
441 * uio_interrupt_handler - hardware interrupt handler
442 * @irq: IRQ number, can be UIO_IRQ_CYCLIC for cyclic timer
443 * @dev_id: Pointer to the devices uio_device structure
445 static irqreturn_t
uio_interrupt_handler(int irq
, void *dev_id
)
447 struct uio_device
*idev
= (struct uio_device
*)dev_id
;
450 ret
= idev
->info
->handler(irq
, idev
->info
);
451 if (ret
== IRQ_HANDLED
)
452 ret
= IRQ_WAKE_THREAD
;
458 * uio_interrupt_thread - irq thread handler
460 * @dev_id: Pointer to the devices uio_device structure
462 static irqreturn_t
uio_interrupt_thread(int irq
, void *dev_id
)
464 struct uio_device
*idev
= (struct uio_device
*)dev_id
;
466 uio_event_notify(idev
->info
);
471 struct uio_listener
{
472 struct uio_device
*dev
;
476 static int uio_open(struct inode
*inode
, struct file
*filep
)
478 struct uio_device
*idev
;
479 struct uio_listener
*listener
;
482 mutex_lock(&minor_lock
);
483 idev
= idr_find(&uio_idr
, iminor(inode
));
486 mutex_unlock(&minor_lock
);
489 get_device(&idev
->dev
);
490 mutex_unlock(&minor_lock
);
492 if (!try_module_get(idev
->owner
)) {
497 listener
= kmalloc(sizeof(*listener
), GFP_KERNEL
);
500 goto err_alloc_listener
;
503 listener
->dev
= idev
;
504 listener
->event_count
= atomic_read(&idev
->event
);
505 filep
->private_data
= listener
;
507 mutex_lock(&idev
->info_lock
);
509 mutex_unlock(&idev
->info_lock
);
514 if (idev
->info
->open
)
515 ret
= idev
->info
->open(idev
->info
, inode
);
516 mutex_unlock(&idev
->info_lock
);
526 module_put(idev
->owner
);
529 put_device(&idev
->dev
);
535 static int uio_fasync(int fd
, struct file
*filep
, int on
)
537 struct uio_listener
*listener
= filep
->private_data
;
538 struct uio_device
*idev
= listener
->dev
;
540 return fasync_helper(fd
, filep
, on
, &idev
->async_queue
);
543 static int uio_release(struct inode
*inode
, struct file
*filep
)
546 struct uio_listener
*listener
= filep
->private_data
;
547 struct uio_device
*idev
= listener
->dev
;
549 mutex_lock(&idev
->info_lock
);
550 if (idev
->info
&& idev
->info
->release
)
551 ret
= idev
->info
->release(idev
->info
, inode
);
552 mutex_unlock(&idev
->info_lock
);
554 module_put(idev
->owner
);
556 put_device(&idev
->dev
);
560 static __poll_t
uio_poll(struct file
*filep
, poll_table
*wait
)
562 struct uio_listener
*listener
= filep
->private_data
;
563 struct uio_device
*idev
= listener
->dev
;
566 mutex_lock(&idev
->info_lock
);
567 if (!idev
->info
|| !idev
->info
->irq
)
569 mutex_unlock(&idev
->info_lock
);
574 poll_wait(filep
, &idev
->wait
, wait
);
575 if (listener
->event_count
!= atomic_read(&idev
->event
))
576 return EPOLLIN
| EPOLLRDNORM
;
580 static ssize_t
uio_read(struct file
*filep
, char __user
*buf
,
581 size_t count
, loff_t
*ppos
)
583 struct uio_listener
*listener
= filep
->private_data
;
584 struct uio_device
*idev
= listener
->dev
;
585 DECLARE_WAITQUEUE(wait
, current
);
589 if (count
!= sizeof(s32
))
592 add_wait_queue(&idev
->wait
, &wait
);
595 mutex_lock(&idev
->info_lock
);
596 if (!idev
->info
|| !idev
->info
->irq
) {
598 mutex_unlock(&idev
->info_lock
);
601 mutex_unlock(&idev
->info_lock
);
603 set_current_state(TASK_INTERRUPTIBLE
);
605 event_count
= atomic_read(&idev
->event
);
606 if (event_count
!= listener
->event_count
) {
607 __set_current_state(TASK_RUNNING
);
608 if (copy_to_user(buf
, &event_count
, count
))
611 listener
->event_count
= event_count
;
617 if (filep
->f_flags
& O_NONBLOCK
) {
622 if (signal_pending(current
)) {
623 retval
= -ERESTARTSYS
;
629 __set_current_state(TASK_RUNNING
);
630 remove_wait_queue(&idev
->wait
, &wait
);
635 static ssize_t
uio_write(struct file
*filep
, const char __user
*buf
,
636 size_t count
, loff_t
*ppos
)
638 struct uio_listener
*listener
= filep
->private_data
;
639 struct uio_device
*idev
= listener
->dev
;
643 if (count
!= sizeof(s32
))
646 if (copy_from_user(&irq_on
, buf
, count
))
649 mutex_lock(&idev
->info_lock
);
655 if (!idev
->info
->irq
) {
660 if (!idev
->info
->irqcontrol
) {
665 retval
= idev
->info
->irqcontrol(idev
->info
, irq_on
);
668 mutex_unlock(&idev
->info_lock
);
669 return retval
? retval
: sizeof(s32
);
672 static int uio_find_mem_index(struct vm_area_struct
*vma
)
674 struct uio_device
*idev
= vma
->vm_private_data
;
676 if (vma
->vm_pgoff
< MAX_UIO_MAPS
) {
677 if (idev
->info
->mem
[vma
->vm_pgoff
].size
== 0)
679 return (int)vma
->vm_pgoff
;
684 static vm_fault_t
uio_vma_fault(struct vm_fault
*vmf
)
686 struct uio_device
*idev
= vmf
->vma
->vm_private_data
;
688 unsigned long offset
;
693 mutex_lock(&idev
->info_lock
);
695 ret
= VM_FAULT_SIGBUS
;
699 mi
= uio_find_mem_index(vmf
->vma
);
701 ret
= VM_FAULT_SIGBUS
;
706 * We need to subtract mi because userspace uses offset = N*PAGE_SIZE
709 offset
= (vmf
->pgoff
- mi
) << PAGE_SHIFT
;
711 addr
= (void *)(unsigned long)idev
->info
->mem
[mi
].addr
+ offset
;
712 if (idev
->info
->mem
[mi
].memtype
== UIO_MEM_LOGICAL
)
713 page
= virt_to_page(addr
);
715 page
= vmalloc_to_page(addr
);
720 mutex_unlock(&idev
->info_lock
);
725 static const struct vm_operations_struct uio_logical_vm_ops
= {
726 .fault
= uio_vma_fault
,
729 static int uio_mmap_logical(struct vm_area_struct
*vma
)
731 vm_flags_set(vma
, VM_DONTEXPAND
| VM_DONTDUMP
);
732 vma
->vm_ops
= &uio_logical_vm_ops
;
736 static const struct vm_operations_struct uio_physical_vm_ops
= {
737 #ifdef CONFIG_HAVE_IOREMAP_PROT
738 .access
= generic_access_phys
,
742 static int uio_mmap_physical(struct vm_area_struct
*vma
)
744 struct uio_device
*idev
= vma
->vm_private_data
;
745 int mi
= uio_find_mem_index(vma
);
750 mem
= idev
->info
->mem
+ mi
;
752 if (mem
->addr
& ~PAGE_MASK
)
754 if (vma
->vm_end
- vma
->vm_start
> mem
->size
)
757 vma
->vm_ops
= &uio_physical_vm_ops
;
758 if (idev
->info
->mem
[mi
].memtype
== UIO_MEM_PHYS
)
759 vma
->vm_page_prot
= pgprot_noncached(vma
->vm_page_prot
);
762 * We cannot use the vm_iomap_memory() helper here,
763 * because vma->vm_pgoff is the map index we looked
764 * up above in uio_find_mem_index(), rather than an
765 * actual page offset into the mmap.
767 * So we just do the physical mmap without a page
770 return remap_pfn_range(vma
,
772 mem
->addr
>> PAGE_SHIFT
,
773 vma
->vm_end
- vma
->vm_start
,
777 static int uio_mmap_dma_coherent(struct vm_area_struct
*vma
)
779 struct uio_device
*idev
= vma
->vm_private_data
;
785 mi
= uio_find_mem_index(vma
);
789 mem
= idev
->info
->mem
+ mi
;
791 if (mem
->addr
& ~PAGE_MASK
)
793 if (mem
->dma_addr
& ~PAGE_MASK
)
795 if (!mem
->dma_device
)
797 if (vma
->vm_end
- vma
->vm_start
> mem
->size
)
800 dev_warn(mem
->dma_device
,
801 "use of UIO_MEM_DMA_COHERENT is highly discouraged");
804 * UIO uses offset to index into the maps for a device.
805 * We need to clear vm_pgoff for dma_mmap_coherent.
809 addr
= (void *)(uintptr_t)mem
->addr
;
810 ret
= dma_mmap_coherent(mem
->dma_device
,
814 vma
->vm_end
- vma
->vm_start
);
820 static int uio_mmap(struct file
*filep
, struct vm_area_struct
*vma
)
822 struct uio_listener
*listener
= filep
->private_data
;
823 struct uio_device
*idev
= listener
->dev
;
825 unsigned long requested_pages
, actual_pages
;
828 if (vma
->vm_end
< vma
->vm_start
)
831 vma
->vm_private_data
= idev
;
833 mutex_lock(&idev
->info_lock
);
839 mi
= uio_find_mem_index(vma
);
845 requested_pages
= vma_pages(vma
);
846 actual_pages
= ((idev
->info
->mem
[mi
].addr
& ~PAGE_MASK
)
847 + idev
->info
->mem
[mi
].size
+ PAGE_SIZE
-1) >> PAGE_SHIFT
;
848 if (requested_pages
> actual_pages
) {
853 if (idev
->info
->mmap
) {
854 ret
= idev
->info
->mmap(idev
->info
, vma
);
858 switch (idev
->info
->mem
[mi
].memtype
) {
861 ret
= uio_mmap_physical(vma
);
863 case UIO_MEM_LOGICAL
:
864 case UIO_MEM_VIRTUAL
:
865 ret
= uio_mmap_logical(vma
);
867 case UIO_MEM_DMA_COHERENT
:
868 ret
= uio_mmap_dma_coherent(vma
);
875 mutex_unlock(&idev
->info_lock
);
879 static const struct file_operations uio_fops
= {
880 .owner
= THIS_MODULE
,
882 .release
= uio_release
,
887 .fasync
= uio_fasync
,
888 .llseek
= noop_llseek
,
891 static int uio_major_init(void)
893 static const char name
[] = "uio";
894 struct cdev
*cdev
= NULL
;
898 result
= alloc_chrdev_region(&uio_dev
, 0, UIO_MAX_DEVICES
, name
);
907 cdev
->owner
= THIS_MODULE
;
908 cdev
->ops
= &uio_fops
;
909 kobject_set_name(&cdev
->kobj
, "%s", name
);
911 result
= cdev_add(cdev
, uio_dev
, UIO_MAX_DEVICES
);
915 uio_major
= MAJOR(uio_dev
);
919 kobject_put(&cdev
->kobj
);
921 unregister_chrdev_region(uio_dev
, UIO_MAX_DEVICES
);
926 static void uio_major_cleanup(void)
928 unregister_chrdev_region(MKDEV(uio_major
, 0), UIO_MAX_DEVICES
);
932 static int init_uio_class(void)
936 /* This is the first time in here, set everything up properly */
937 ret
= uio_major_init();
941 ret
= class_register(&uio_class
);
943 printk(KERN_ERR
"class_register failed for uio\n");
944 goto err_class_register
;
947 uio_class_registered
= true;
957 static void release_uio_class(void)
959 uio_class_registered
= false;
960 class_unregister(&uio_class
);
964 static void uio_device_release(struct device
*dev
)
966 struct uio_device
*idev
= dev_get_drvdata(dev
);
972 * __uio_register_device - register a new userspace IO device
973 * @owner: module that creates the new device
974 * @parent: parent device
975 * @info: UIO device capabilities
977 * returns zero on success or a negative error code.
979 int __uio_register_device(struct module
*owner
,
980 struct device
*parent
,
981 struct uio_info
*info
)
983 struct uio_device
*idev
;
986 if (!uio_class_registered
)
987 return -EPROBE_DEFER
;
989 if (!parent
|| !info
|| !info
->name
|| !info
->version
)
992 info
->uio_dev
= NULL
;
994 idev
= kzalloc(sizeof(*idev
), GFP_KERNEL
);
1001 mutex_init(&idev
->info_lock
);
1002 init_waitqueue_head(&idev
->wait
);
1003 atomic_set(&idev
->event
, 0);
1005 ret
= uio_get_minor(idev
);
1011 device_initialize(&idev
->dev
);
1012 idev
->dev
.devt
= MKDEV(uio_major
, idev
->minor
);
1013 idev
->dev
.class = &uio_class
;
1014 idev
->dev
.parent
= parent
;
1015 idev
->dev
.release
= uio_device_release
;
1016 dev_set_drvdata(&idev
->dev
, idev
);
1018 ret
= dev_set_name(&idev
->dev
, "uio%d", idev
->minor
);
1020 goto err_device_create
;
1022 ret
= device_add(&idev
->dev
);
1024 goto err_device_create
;
1026 ret
= uio_dev_add_attributes(idev
);
1028 goto err_uio_dev_add_attributes
;
1030 info
->uio_dev
= idev
;
1032 if (info
->irq
&& (info
->irq
!= UIO_IRQ_CUSTOM
)) {
1034 * Note that we deliberately don't use devm_request_irq
1035 * here. The parent module can unregister the UIO device
1036 * and call pci_disable_msi, which requires that this
1037 * irq has been freed. However, the device may have open
1038 * FDs at the time of unregister and therefore may not be
1039 * freed until they are released.
1041 ret
= request_threaded_irq(info
->irq
, uio_interrupt_handler
, uio_interrupt_thread
,
1042 info
->irq_flags
, info
->name
, idev
);
1044 info
->uio_dev
= NULL
;
1045 goto err_request_irq
;
1052 uio_dev_del_attributes(idev
);
1053 err_uio_dev_add_attributes
:
1054 device_del(&idev
->dev
);
1056 uio_free_minor(idev
->minor
);
1057 put_device(&idev
->dev
);
1060 EXPORT_SYMBOL_GPL(__uio_register_device
);
1062 static void devm_uio_unregister_device(struct device
*dev
, void *res
)
1064 uio_unregister_device(*(struct uio_info
**)res
);
1068 * __devm_uio_register_device - Resource managed uio_register_device()
1069 * @owner: module that creates the new device
1070 * @parent: parent device
1071 * @info: UIO device capabilities
1073 * returns zero on success or a negative error code.
1075 int __devm_uio_register_device(struct module
*owner
,
1076 struct device
*parent
,
1077 struct uio_info
*info
)
1079 struct uio_info
**ptr
;
1082 ptr
= devres_alloc(devm_uio_unregister_device
, sizeof(*ptr
),
1088 ret
= __uio_register_device(owner
, parent
, info
);
1094 devres_add(parent
, ptr
);
1098 EXPORT_SYMBOL_GPL(__devm_uio_register_device
);
1101 * uio_unregister_device - unregister a industrial IO device
1102 * @info: UIO device capabilities
1105 void uio_unregister_device(struct uio_info
*info
)
1107 struct uio_device
*idev
;
1108 unsigned long minor
;
1110 if (!info
|| !info
->uio_dev
)
1113 idev
= info
->uio_dev
;
1114 minor
= idev
->minor
;
1116 mutex_lock(&idev
->info_lock
);
1117 uio_dev_del_attributes(idev
);
1119 if (info
->irq
&& info
->irq
!= UIO_IRQ_CUSTOM
)
1120 free_irq(info
->irq
, idev
);
1123 mutex_unlock(&idev
->info_lock
);
1125 wake_up_interruptible(&idev
->wait
);
1126 kill_fasync(&idev
->async_queue
, SIGIO
, POLL_HUP
);
1128 uio_free_minor(minor
);
1129 device_unregister(&idev
->dev
);
1133 EXPORT_SYMBOL_GPL(uio_unregister_device
);
1135 static int __init
uio_init(void)
1137 return init_uio_class();
1140 static void __exit
uio_exit(void)
1142 release_uio_class();
1143 idr_destroy(&uio_idr
);
1146 module_init(uio_init
)
1147 module_exit(uio_exit
)
1148 MODULE_DESCRIPTION("Userspace IO core module");
1149 MODULE_LICENSE("GPL v2");