1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright(C) 2005, Benedikt Spranger <b.spranger@linutronix.de>
6 * Copyright(C) 2005, Thomas Gleixner <tglx@linutronix.de>
7 * Copyright(C) 2006, Hans J. Koch <hjk@hansjkoch.de>
8 * Copyright(C) 2006, Greg Kroah-Hartman <greg@kroah.com>
15 #include <linux/module.h>
16 #include <linux/init.h>
17 #include <linux/poll.h>
18 #include <linux/device.h>
19 #include <linux/slab.h>
21 #include <linux/idr.h>
22 #include <linux/sched/signal.h>
23 #include <linux/string.h>
24 #include <linux/kobject.h>
25 #include <linux/cdev.h>
26 #include <linux/uio_driver.h>
28 #define UIO_MAX_DEVICES (1U << MINORBITS)
31 static struct cdev
*uio_cdev
;
32 static DEFINE_IDR(uio_idr
);
33 static const struct file_operations uio_fops
;
35 /* Protect idr accesses */
36 static DEFINE_MUTEX(minor_lock
);
46 #define to_map(map) container_of(map, struct uio_map, kobj)
48 static ssize_t
map_name_show(struct uio_mem
*mem
, char *buf
)
50 if (unlikely(!mem
->name
))
53 return sprintf(buf
, "%s\n", mem
->name
);
56 static ssize_t
map_addr_show(struct uio_mem
*mem
, char *buf
)
58 return sprintf(buf
, "%pa\n", &mem
->addr
);
61 static ssize_t
map_size_show(struct uio_mem
*mem
, char *buf
)
63 return sprintf(buf
, "%pa\n", &mem
->size
);
66 static ssize_t
map_offset_show(struct uio_mem
*mem
, char *buf
)
68 return sprintf(buf
, "0x%llx\n", (unsigned long long)mem
->offs
);
71 struct map_sysfs_entry
{
72 struct attribute attr
;
73 ssize_t (*show
)(struct uio_mem
*, char *);
74 ssize_t (*store
)(struct uio_mem
*, const char *, size_t);
77 static struct map_sysfs_entry name_attribute
=
78 __ATTR(name
, S_IRUGO
, map_name_show
, NULL
);
79 static struct map_sysfs_entry addr_attribute
=
80 __ATTR(addr
, S_IRUGO
, map_addr_show
, NULL
);
81 static struct map_sysfs_entry size_attribute
=
82 __ATTR(size
, S_IRUGO
, map_size_show
, NULL
);
83 static struct map_sysfs_entry offset_attribute
=
84 __ATTR(offset
, S_IRUGO
, map_offset_show
, NULL
);
86 static struct attribute
*attrs
[] = {
90 &offset_attribute
.attr
,
91 NULL
, /* need to NULL terminate the list of attributes */
94 static void map_release(struct kobject
*kobj
)
96 struct uio_map
*map
= to_map(kobj
);
100 static ssize_t
map_type_show(struct kobject
*kobj
, struct attribute
*attr
,
103 struct uio_map
*map
= to_map(kobj
);
104 struct uio_mem
*mem
= map
->mem
;
105 struct map_sysfs_entry
*entry
;
107 entry
= container_of(attr
, struct map_sysfs_entry
, attr
);
112 return entry
->show(mem
, buf
);
115 static const struct sysfs_ops map_sysfs_ops
= {
116 .show
= map_type_show
,
119 static struct kobj_type map_attr_type
= {
120 .release
= map_release
,
121 .sysfs_ops
= &map_sysfs_ops
,
122 .default_attrs
= attrs
,
127 struct uio_port
*port
;
129 #define to_portio(portio) container_of(portio, struct uio_portio, kobj)
131 static ssize_t
portio_name_show(struct uio_port
*port
, char *buf
)
133 if (unlikely(!port
->name
))
136 return sprintf(buf
, "%s\n", port
->name
);
139 static ssize_t
portio_start_show(struct uio_port
*port
, char *buf
)
141 return sprintf(buf
, "0x%lx\n", port
->start
);
144 static ssize_t
portio_size_show(struct uio_port
*port
, char *buf
)
146 return sprintf(buf
, "0x%lx\n", port
->size
);
149 static ssize_t
portio_porttype_show(struct uio_port
*port
, char *buf
)
151 const char *porttypes
[] = {"none", "x86", "gpio", "other"};
153 if ((port
->porttype
< 0) || (port
->porttype
> UIO_PORT_OTHER
))
156 return sprintf(buf
, "port_%s\n", porttypes
[port
->porttype
]);
159 struct portio_sysfs_entry
{
160 struct attribute attr
;
161 ssize_t (*show
)(struct uio_port
*, char *);
162 ssize_t (*store
)(struct uio_port
*, const char *, size_t);
165 static struct portio_sysfs_entry portio_name_attribute
=
166 __ATTR(name
, S_IRUGO
, portio_name_show
, NULL
);
167 static struct portio_sysfs_entry portio_start_attribute
=
168 __ATTR(start
, S_IRUGO
, portio_start_show
, NULL
);
169 static struct portio_sysfs_entry portio_size_attribute
=
170 __ATTR(size
, S_IRUGO
, portio_size_show
, NULL
);
171 static struct portio_sysfs_entry portio_porttype_attribute
=
172 __ATTR(porttype
, S_IRUGO
, portio_porttype_show
, NULL
);
174 static struct attribute
*portio_attrs
[] = {
175 &portio_name_attribute
.attr
,
176 &portio_start_attribute
.attr
,
177 &portio_size_attribute
.attr
,
178 &portio_porttype_attribute
.attr
,
182 static void portio_release(struct kobject
*kobj
)
184 struct uio_portio
*portio
= to_portio(kobj
);
188 static ssize_t
portio_type_show(struct kobject
*kobj
, struct attribute
*attr
,
191 struct uio_portio
*portio
= to_portio(kobj
);
192 struct uio_port
*port
= portio
->port
;
193 struct portio_sysfs_entry
*entry
;
195 entry
= container_of(attr
, struct portio_sysfs_entry
, attr
);
200 return entry
->show(port
, buf
);
203 static const struct sysfs_ops portio_sysfs_ops
= {
204 .show
= portio_type_show
,
207 static struct kobj_type portio_attr_type
= {
208 .release
= portio_release
,
209 .sysfs_ops
= &portio_sysfs_ops
,
210 .default_attrs
= portio_attrs
,
213 static ssize_t
name_show(struct device
*dev
,
214 struct device_attribute
*attr
, char *buf
)
216 struct uio_device
*idev
= dev_get_drvdata(dev
);
219 mutex_lock(&idev
->info_lock
);
222 dev_err(dev
, "the device has been unregistered\n");
226 ret
= sprintf(buf
, "%s\n", idev
->info
->name
);
229 mutex_unlock(&idev
->info_lock
);
232 static DEVICE_ATTR_RO(name
);
234 static ssize_t
version_show(struct device
*dev
,
235 struct device_attribute
*attr
, char *buf
)
237 struct uio_device
*idev
= dev_get_drvdata(dev
);
240 mutex_lock(&idev
->info_lock
);
243 dev_err(dev
, "the device has been unregistered\n");
247 ret
= sprintf(buf
, "%s\n", idev
->info
->version
);
250 mutex_unlock(&idev
->info_lock
);
253 static DEVICE_ATTR_RO(version
);
255 static ssize_t
event_show(struct device
*dev
,
256 struct device_attribute
*attr
, char *buf
)
258 struct uio_device
*idev
= dev_get_drvdata(dev
);
259 return sprintf(buf
, "%u\n", (unsigned int)atomic_read(&idev
->event
));
261 static DEVICE_ATTR_RO(event
);
263 static struct attribute
*uio_attrs
[] = {
265 &dev_attr_version
.attr
,
266 &dev_attr_event
.attr
,
269 ATTRIBUTE_GROUPS(uio
);
271 /* UIO class infrastructure */
272 static struct class uio_class
= {
274 .dev_groups
= uio_groups
,
277 bool uio_class_registered
;
282 static int uio_dev_add_attributes(struct uio_device
*idev
)
287 int portio_found
= 0;
290 struct uio_port
*port
;
291 struct uio_portio
*portio
;
293 for (mi
= 0; mi
< MAX_UIO_MAPS
; mi
++) {
294 mem
= &idev
->info
->mem
[mi
];
299 idev
->map_dir
= kobject_create_and_add("maps",
301 if (!idev
->map_dir
) {
306 map
= kzalloc(sizeof(*map
), GFP_KERNEL
);
311 kobject_init(&map
->kobj
, &map_attr_type
);
314 ret
= kobject_add(&map
->kobj
, idev
->map_dir
, "map%d", mi
);
317 ret
= kobject_uevent(&map
->kobj
, KOBJ_ADD
);
322 for (pi
= 0; pi
< MAX_UIO_PORT_REGIONS
; pi
++) {
323 port
= &idev
->info
->port
[pi
];
328 idev
->portio_dir
= kobject_create_and_add("portio",
330 if (!idev
->portio_dir
) {
335 portio
= kzalloc(sizeof(*portio
), GFP_KERNEL
);
340 kobject_init(&portio
->kobj
, &portio_attr_type
);
342 port
->portio
= portio
;
343 ret
= kobject_add(&portio
->kobj
, idev
->portio_dir
,
346 goto err_portio_kobj
;
347 ret
= kobject_uevent(&portio
->kobj
, KOBJ_ADD
);
349 goto err_portio_kobj
;
357 for (; pi
>= 0; pi
--) {
358 port
= &idev
->info
->port
[pi
];
359 portio
= port
->portio
;
360 kobject_put(&portio
->kobj
);
362 kobject_put(idev
->portio_dir
);
366 for (; mi
>= 0; mi
--) {
367 mem
= &idev
->info
->mem
[mi
];
369 kobject_put(&map
->kobj
);
371 kobject_put(idev
->map_dir
);
372 dev_err(&idev
->dev
, "error creating sysfs files (%d)\n", ret
);
376 static void uio_dev_del_attributes(struct uio_device
*idev
)
380 struct uio_port
*port
;
382 for (i
= 0; i
< MAX_UIO_MAPS
; i
++) {
383 mem
= &idev
->info
->mem
[i
];
386 kobject_put(&mem
->map
->kobj
);
388 kobject_put(idev
->map_dir
);
390 for (i
= 0; i
< MAX_UIO_PORT_REGIONS
; i
++) {
391 port
= &idev
->info
->port
[i
];
394 kobject_put(&port
->portio
->kobj
);
396 kobject_put(idev
->portio_dir
);
399 static int uio_get_minor(struct uio_device
*idev
)
401 int retval
= -ENOMEM
;
403 mutex_lock(&minor_lock
);
404 retval
= idr_alloc(&uio_idr
, idev
, 0, UIO_MAX_DEVICES
, GFP_KERNEL
);
406 idev
->minor
= retval
;
408 } else if (retval
== -ENOSPC
) {
409 dev_err(&idev
->dev
, "too many uio devices\n");
412 mutex_unlock(&minor_lock
);
416 static void uio_free_minor(struct uio_device
*idev
)
418 mutex_lock(&minor_lock
);
419 idr_remove(&uio_idr
, idev
->minor
);
420 mutex_unlock(&minor_lock
);
424 * uio_event_notify - trigger an interrupt event
425 * @info: UIO device capabilities
427 void uio_event_notify(struct uio_info
*info
)
429 struct uio_device
*idev
= info
->uio_dev
;
431 atomic_inc(&idev
->event
);
432 wake_up_interruptible(&idev
->wait
);
433 kill_fasync(&idev
->async_queue
, SIGIO
, POLL_IN
);
435 EXPORT_SYMBOL_GPL(uio_event_notify
);
438 * uio_interrupt - hardware interrupt handler
439 * @irq: IRQ number, can be UIO_IRQ_CYCLIC for cyclic timer
440 * @dev_id: Pointer to the devices uio_device structure
442 static irqreturn_t
uio_interrupt(int irq
, void *dev_id
)
444 struct uio_device
*idev
= (struct uio_device
*)dev_id
;
447 ret
= idev
->info
->handler(irq
, idev
->info
);
448 if (ret
== IRQ_HANDLED
)
449 uio_event_notify(idev
->info
);
454 struct uio_listener
{
455 struct uio_device
*dev
;
459 static int uio_open(struct inode
*inode
, struct file
*filep
)
461 struct uio_device
*idev
;
462 struct uio_listener
*listener
;
465 mutex_lock(&minor_lock
);
466 idev
= idr_find(&uio_idr
, iminor(inode
));
467 mutex_unlock(&minor_lock
);
473 get_device(&idev
->dev
);
475 if (!try_module_get(idev
->owner
)) {
480 listener
= kmalloc(sizeof(*listener
), GFP_KERNEL
);
483 goto err_alloc_listener
;
486 listener
->dev
= idev
;
487 listener
->event_count
= atomic_read(&idev
->event
);
488 filep
->private_data
= listener
;
490 mutex_lock(&idev
->info_lock
);
492 mutex_unlock(&idev
->info_lock
);
494 goto err_alloc_listener
;
497 if (idev
->info
&& idev
->info
->open
)
498 ret
= idev
->info
->open(idev
->info
, inode
);
499 mutex_unlock(&idev
->info_lock
);
509 module_put(idev
->owner
);
512 put_device(&idev
->dev
);
518 static int uio_fasync(int fd
, struct file
*filep
, int on
)
520 struct uio_listener
*listener
= filep
->private_data
;
521 struct uio_device
*idev
= listener
->dev
;
523 return fasync_helper(fd
, filep
, on
, &idev
->async_queue
);
526 static int uio_release(struct inode
*inode
, struct file
*filep
)
529 struct uio_listener
*listener
= filep
->private_data
;
530 struct uio_device
*idev
= listener
->dev
;
532 mutex_lock(&idev
->info_lock
);
533 if (idev
->info
&& idev
->info
->release
)
534 ret
= idev
->info
->release(idev
->info
, inode
);
535 mutex_unlock(&idev
->info_lock
);
537 module_put(idev
->owner
);
539 put_device(&idev
->dev
);
543 static __poll_t
uio_poll(struct file
*filep
, poll_table
*wait
)
545 struct uio_listener
*listener
= filep
->private_data
;
546 struct uio_device
*idev
= listener
->dev
;
549 mutex_lock(&idev
->info_lock
);
550 if (!idev
->info
|| !idev
->info
->irq
)
552 mutex_unlock(&idev
->info_lock
);
557 poll_wait(filep
, &idev
->wait
, wait
);
558 if (listener
->event_count
!= atomic_read(&idev
->event
))
559 return EPOLLIN
| EPOLLRDNORM
;
563 static ssize_t
uio_read(struct file
*filep
, char __user
*buf
,
564 size_t count
, loff_t
*ppos
)
566 struct uio_listener
*listener
= filep
->private_data
;
567 struct uio_device
*idev
= listener
->dev
;
568 DECLARE_WAITQUEUE(wait
, current
);
572 mutex_lock(&idev
->info_lock
);
573 if (!idev
->info
|| !idev
->info
->irq
)
575 mutex_unlock(&idev
->info_lock
);
580 if (count
!= sizeof(s32
))
583 add_wait_queue(&idev
->wait
, &wait
);
586 set_current_state(TASK_INTERRUPTIBLE
);
588 event_count
= atomic_read(&idev
->event
);
589 if (event_count
!= listener
->event_count
) {
590 __set_current_state(TASK_RUNNING
);
591 if (copy_to_user(buf
, &event_count
, count
))
594 listener
->event_count
= event_count
;
600 if (filep
->f_flags
& O_NONBLOCK
) {
605 if (signal_pending(current
)) {
606 retval
= -ERESTARTSYS
;
612 __set_current_state(TASK_RUNNING
);
613 remove_wait_queue(&idev
->wait
, &wait
);
618 static ssize_t
uio_write(struct file
*filep
, const char __user
*buf
,
619 size_t count
, loff_t
*ppos
)
621 struct uio_listener
*listener
= filep
->private_data
;
622 struct uio_device
*idev
= listener
->dev
;
626 if (count
!= sizeof(s32
))
629 if (copy_from_user(&irq_on
, buf
, count
))
632 mutex_lock(&idev
->info_lock
);
638 if (!idev
->info
|| !idev
->info
->irq
) {
643 if (!idev
->info
->irqcontrol
) {
648 retval
= idev
->info
->irqcontrol(idev
->info
, irq_on
);
651 mutex_unlock(&idev
->info_lock
);
652 return retval
? retval
: sizeof(s32
);
655 static int uio_find_mem_index(struct vm_area_struct
*vma
)
657 struct uio_device
*idev
= vma
->vm_private_data
;
659 if (vma
->vm_pgoff
< MAX_UIO_MAPS
) {
660 if (idev
->info
->mem
[vma
->vm_pgoff
].size
== 0)
662 return (int)vma
->vm_pgoff
;
667 static vm_fault_t
uio_vma_fault(struct vm_fault
*vmf
)
669 struct uio_device
*idev
= vmf
->vma
->vm_private_data
;
671 unsigned long offset
;
676 mutex_lock(&idev
->info_lock
);
678 ret
= VM_FAULT_SIGBUS
;
682 mi
= uio_find_mem_index(vmf
->vma
);
684 ret
= VM_FAULT_SIGBUS
;
689 * We need to subtract mi because userspace uses offset = N*PAGE_SIZE
692 offset
= (vmf
->pgoff
- mi
) << PAGE_SHIFT
;
694 addr
= (void *)(unsigned long)idev
->info
->mem
[mi
].addr
+ offset
;
695 if (idev
->info
->mem
[mi
].memtype
== UIO_MEM_LOGICAL
)
696 page
= virt_to_page(addr
);
698 page
= vmalloc_to_page(addr
);
703 mutex_unlock(&idev
->info_lock
);
708 static const struct vm_operations_struct uio_logical_vm_ops
= {
709 .fault
= uio_vma_fault
,
712 static int uio_mmap_logical(struct vm_area_struct
*vma
)
714 vma
->vm_flags
|= VM_DONTEXPAND
| VM_DONTDUMP
;
715 vma
->vm_ops
= &uio_logical_vm_ops
;
719 static const struct vm_operations_struct uio_physical_vm_ops
= {
720 #ifdef CONFIG_HAVE_IOREMAP_PROT
721 .access
= generic_access_phys
,
725 static int uio_mmap_physical(struct vm_area_struct
*vma
)
727 struct uio_device
*idev
= vma
->vm_private_data
;
728 int mi
= uio_find_mem_index(vma
);
733 mem
= idev
->info
->mem
+ mi
;
735 if (mem
->addr
& ~PAGE_MASK
)
737 if (vma
->vm_end
- vma
->vm_start
> mem
->size
)
740 vma
->vm_ops
= &uio_physical_vm_ops
;
741 vma
->vm_page_prot
= pgprot_noncached(vma
->vm_page_prot
);
744 * We cannot use the vm_iomap_memory() helper here,
745 * because vma->vm_pgoff is the map index we looked
746 * up above in uio_find_mem_index(), rather than an
747 * actual page offset into the mmap.
749 * So we just do the physical mmap without a page
752 return remap_pfn_range(vma
,
754 mem
->addr
>> PAGE_SHIFT
,
755 vma
->vm_end
- vma
->vm_start
,
759 static int uio_mmap(struct file
*filep
, struct vm_area_struct
*vma
)
761 struct uio_listener
*listener
= filep
->private_data
;
762 struct uio_device
*idev
= listener
->dev
;
764 unsigned long requested_pages
, actual_pages
;
767 if (vma
->vm_end
< vma
->vm_start
)
770 vma
->vm_private_data
= idev
;
772 mutex_lock(&idev
->info_lock
);
778 mi
= uio_find_mem_index(vma
);
784 requested_pages
= vma_pages(vma
);
785 actual_pages
= ((idev
->info
->mem
[mi
].addr
& ~PAGE_MASK
)
786 + idev
->info
->mem
[mi
].size
+ PAGE_SIZE
-1) >> PAGE_SHIFT
;
787 if (requested_pages
> actual_pages
) {
792 if (idev
->info
->mmap
) {
793 ret
= idev
->info
->mmap(idev
->info
, vma
);
797 switch (idev
->info
->mem
[mi
].memtype
) {
799 ret
= uio_mmap_physical(vma
);
801 case UIO_MEM_LOGICAL
:
802 case UIO_MEM_VIRTUAL
:
803 ret
= uio_mmap_logical(vma
);
810 mutex_unlock(&idev
->info_lock
);
814 static const struct file_operations uio_fops
= {
815 .owner
= THIS_MODULE
,
817 .release
= uio_release
,
822 .fasync
= uio_fasync
,
823 .llseek
= noop_llseek
,
826 static int uio_major_init(void)
828 static const char name
[] = "uio";
829 struct cdev
*cdev
= NULL
;
833 result
= alloc_chrdev_region(&uio_dev
, 0, UIO_MAX_DEVICES
, name
);
842 cdev
->owner
= THIS_MODULE
;
843 cdev
->ops
= &uio_fops
;
844 kobject_set_name(&cdev
->kobj
, "%s", name
);
846 result
= cdev_add(cdev
, uio_dev
, UIO_MAX_DEVICES
);
850 uio_major
= MAJOR(uio_dev
);
854 kobject_put(&cdev
->kobj
);
856 unregister_chrdev_region(uio_dev
, UIO_MAX_DEVICES
);
861 static void uio_major_cleanup(void)
863 unregister_chrdev_region(MKDEV(uio_major
, 0), UIO_MAX_DEVICES
);
867 static int init_uio_class(void)
871 /* This is the first time in here, set everything up properly */
872 ret
= uio_major_init();
876 ret
= class_register(&uio_class
);
878 printk(KERN_ERR
"class_register failed for uio\n");
879 goto err_class_register
;
882 uio_class_registered
= true;
892 static void release_uio_class(void)
894 uio_class_registered
= false;
895 class_unregister(&uio_class
);
899 static void uio_device_release(struct device
*dev
)
901 struct uio_device
*idev
= dev_get_drvdata(dev
);
907 * uio_register_device - register a new userspace IO device
908 * @owner: module that creates the new device
909 * @parent: parent device
910 * @info: UIO device capabilities
912 * returns zero on success or a negative error code.
914 int __uio_register_device(struct module
*owner
,
915 struct device
*parent
,
916 struct uio_info
*info
)
918 struct uio_device
*idev
;
921 if (!uio_class_registered
)
922 return -EPROBE_DEFER
;
924 if (!parent
|| !info
|| !info
->name
|| !info
->version
)
927 info
->uio_dev
= NULL
;
929 idev
= kzalloc(sizeof(*idev
), GFP_KERNEL
);
936 mutex_init(&idev
->info_lock
);
937 init_waitqueue_head(&idev
->wait
);
938 atomic_set(&idev
->event
, 0);
940 ret
= uio_get_minor(idev
);
946 device_initialize(&idev
->dev
);
947 idev
->dev
.devt
= MKDEV(uio_major
, idev
->minor
);
948 idev
->dev
.class = &uio_class
;
949 idev
->dev
.parent
= parent
;
950 idev
->dev
.release
= uio_device_release
;
951 dev_set_drvdata(&idev
->dev
, idev
);
953 ret
= dev_set_name(&idev
->dev
, "uio%d", idev
->minor
);
955 goto err_device_create
;
957 ret
= device_add(&idev
->dev
);
959 goto err_device_create
;
961 ret
= uio_dev_add_attributes(idev
);
963 goto err_uio_dev_add_attributes
;
965 info
->uio_dev
= idev
;
967 if (info
->irq
&& (info
->irq
!= UIO_IRQ_CUSTOM
)) {
969 * Note that we deliberately don't use devm_request_irq
970 * here. The parent module can unregister the UIO device
971 * and call pci_disable_msi, which requires that this
972 * irq has been freed. However, the device may have open
973 * FDs at the time of unregister and therefore may not be
974 * freed until they are released.
976 ret
= request_irq(info
->irq
, uio_interrupt
,
977 info
->irq_flags
, info
->name
, idev
);
979 info
->uio_dev
= NULL
;
980 goto err_request_irq
;
987 uio_dev_del_attributes(idev
);
988 err_uio_dev_add_attributes
:
989 device_del(&idev
->dev
);
991 uio_free_minor(idev
);
992 put_device(&idev
->dev
);
995 EXPORT_SYMBOL_GPL(__uio_register_device
);
998 * uio_unregister_device - unregister a industrial IO device
999 * @info: UIO device capabilities
1002 void uio_unregister_device(struct uio_info
*info
)
1004 struct uio_device
*idev
;
1006 if (!info
|| !info
->uio_dev
)
1009 idev
= info
->uio_dev
;
1011 uio_free_minor(idev
);
1013 mutex_lock(&idev
->info_lock
);
1014 uio_dev_del_attributes(idev
);
1016 if (info
->irq
&& info
->irq
!= UIO_IRQ_CUSTOM
)
1017 free_irq(info
->irq
, idev
);
1020 mutex_unlock(&idev
->info_lock
);
1022 device_unregister(&idev
->dev
);
1026 EXPORT_SYMBOL_GPL(uio_unregister_device
);
1028 static int __init
uio_init(void)
1030 return init_uio_class();
1033 static void __exit
uio_exit(void)
1035 release_uio_class();
1036 idr_destroy(&uio_idr
);
1039 module_init(uio_init
)
1040 module_exit(uio_exit
)
1041 MODULE_LICENSE("GPL v2");