Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4797621imc; Mon, 25 Feb 2019 11:11:29 -0800 (PST) X-Google-Smtp-Source: AHgI3IaDzakX42KJRv7InRYhkRNXHNRD2HC8g0xMyWirAvGTM4nnzggfsci9emUtasA2KNdBcMhm X-Received: by 2002:a63:2f47:: with SMTP id v68mr20157510pgv.144.1551121889487; Mon, 25 Feb 2019 11:11:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551121889; cv=none; d=google.com; s=arc-20160816; b=j9hnBwBJc+0igFvU06yM7c+VNIX2frGb0BEAfvi2m2hynh6iUuGtJyTOkqTF05AzK+ xiOz5L2ytYvN7vvtgxShy5WFQ5CN0N05YpTMV7FxRu+xF6jw7/IQVwia1u+83XVADAXF FFxX3koqURiHkA6xk8ryLTAuU+5kZwLDj4+9QRM4YzoC5IVN+1RzIKITsNmf4YdSZ0d/ RASLoDIYnyurZdyhUzN4RclJaS6v4Bi7wirLT9KLtA/qjsu/FBFMQH+F4Z7Pl4vbkMpb Hnu1Li5JEXv2dm05ydjm4aSBJMgf6e/zlfMLyXbfVAg7sgQZJW9S27l86Sr1NgeBt9Qu ReWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=lpXR3d621BGoGyxaixubc56UdUhNVoXPrqwQJnegiys=; b=ffWrZ+3Akxc/hG3+fpNpqxWHoLtPoNTcLKIADC9i7lAyMB3RSJs/yMpg13clg9yaFn iOaCwW3meF55+JQ1uShxfk05gnpd9msYKMS0MWwwtCl6yfjGHp1XDHxofnvSOe2b5xj0 tZYiFCy+Ed1yG6km274vXEN6VEjuPaWjFEuQYj8dOgp+qbcFY+PQfCV5MSy0qYBr6Zzb 8YZwg1g5Uckp6MfecwKUzVl1bocPty/84bHwn0aplUZimcoxvTrvFbGxs3PX7LxJY8Nl ddnU4cq/AcCjQ1HqcdUphGgNDyPThmEbnispGE21SM2pcVDgKsWmqZ2/MBQmrU6Gtn6u WCmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=a18kkTC8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h8si9976288pls.365.2019.02.25.11.11.13; Mon, 25 Feb 2019 11:11:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=a18kkTC8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727228AbfBYTKm (ORCPT + 99 others); Mon, 25 Feb 2019 14:10:42 -0500 Received: from mail-io1-f65.google.com ([209.85.166.65]:44051 "EHLO mail-io1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726950AbfBYTKl (ORCPT ); Mon, 25 Feb 2019 14:10:41 -0500 Received: by mail-io1-f65.google.com with SMTP id y13so8388424iop.11 for ; Mon, 25 Feb 2019 11:10:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=lpXR3d621BGoGyxaixubc56UdUhNVoXPrqwQJnegiys=; b=a18kkTC8VYz9/zjMObPvA2Tyw6B6Z3me/9zoExJqInwsZw2A4Bsa/dkw9QeHuhih5q QAaBK5Is2DJBfP8pkZmy3HfONcUy5zRO1VgAMQS2UJ4+yo4YXur8TU8DgJNJO36GffHI XVxDRXm7T7TX8U+sXM/OtryRUKGUAAn4gd2Kw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=lpXR3d621BGoGyxaixubc56UdUhNVoXPrqwQJnegiys=; b=VVOaNFGTjqE3YljPAZuPFzWlcBsNoyFF3ovIhoroAgNeoyXa8a+OHJ4jEbe9GvfWQp yHi2ROGflxHVuJWl1N/qshHp3PtWV96D/fEEhtvI0lwNMoMqxVOxyDbRccWGScVM6mEM NrhJb+qsME+JNAUv4d2QjZHKsSNNYGX5ffcv/FyPZ+KIJjuUzqpN63KYvLNMXuZ9tWXd 9zL8cyZsTzriOtG1a7g7AFVaPWiS54WdvbU/FXm5kW1tYVq/Ie6EnJ5o6nm1slBYSeEn cu036V0wwOjEVrE4aQo70ClqpvXwkWj0apEac4pdwxryL/rYLBtk78MtCmZsugZuR9BL QnxQ== X-Gm-Message-State: AHQUAubU1YBJOnJkLckJv6d4uGYrq/pOncZPswM0ZB+XDrlUfBL5hM4v WN7/yRXeZd3/2T0bw4sU3pb2jw== X-Received: by 2002:a6b:8d81:: with SMTP id p123mr10664916iod.104.1551121839306; Mon, 25 Feb 2019 11:10:39 -0800 (PST) Received: from ncrews2.bld.corp.google.com ([2620:15c:183:200:3338:94cc:1814:b147]) by smtp.gmail.com with ESMTPSA id l134sm5375922itb.12.2019.02.25.11.10.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 25 Feb 2019 11:10:38 -0800 (PST) From: Nick Crews To: enric.balletbo@collabora.com, bleung@chromium.org Cc: linux-kernel@vger.kernel.org, dlaurie@chromium.org, lamzin@google.com, bartfab@google.com, derat@google.com, groeck@google.com, dtor@google.com, Nick Crews Subject: [PATCH v2] platform/chrome: Add Wilco EC Event Handling Date: Mon, 25 Feb 2019 12:09:58 -0700 Message-Id: <20190225190957.40425-1-ncrews@chromium.org> X-Mailer: git-send-email 2.21.0.rc0.258.g878e2cd30e-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch is meant to be applied on top of the current for-next top of tree in the chrome/platform repo, at https://git.kernel.org/pub/scm/linux/kernel/git/chrome-platform/linux.git/log/?h=for-next The Wilco Embedded Controller can return extended events that are not handled by standard ACPI objects. These events can contain information about changes in EC controlled features, such as the charger or battery getting plugged/unplugged. These events are triggered with an ACPI Notify(0x90) and the event data buffer is read through an ACPI method provided by the BIOS which reads the event buffer from EC RAM. These events are put into a queue which can be read by a userspace daemon via a char device that implements read() and poll(). The char device will appear at /dev/wilco_event{n}, where n is some integer. This patch depends on a coreboot patch which adds the relevant ACPI device, so this driver can pick it up: https://review.coreboot.org/c/coreboot/+/31204 To test, run the simple python script from https://gist.github.com/8a55050e353b7027ca3009074eec4200 to poll() and read() the node. You can generate events in many ways, the easiest are to press fn+Esc or to plug/unplug the battery (with the AC in). I sent out an initial version of this driver a month ago, available at https://lkml.org/lkml/2019/1/23/676 At that point, we were not sure about the requirements of the driver, and reviewers were not pleased with the abuses of the sysfs interface. In this version, we are more confident about the needs of the userspace daemon that will use this driver, and this driver addresses all of the previous concerns. Changes in v2: - Move sysfs node to /dev/wilco_ec{n} - Userspace daemon should now use poll() to check for available events - Userspace daemon should now use read() to pop an event from queue - Keyboard events are no longer forwarded to the input subsystem - The driver is a separate module - There is a new ACPI device GOOG00D that the driver binds to, not the old GOOG00C used by the core driver - The actual ACPI command code changed from "^QSET" to "QSET" Signed-off-by: Nick Crews --- drivers/platform/chrome/wilco_ec/Kconfig | 9 + drivers/platform/chrome/wilco_ec/Makefile | 2 + drivers/platform/chrome/wilco_ec/event.c | 511 ++++++++++++++++++++++ 3 files changed, 522 insertions(+) create mode 100644 drivers/platform/chrome/wilco_ec/event.c diff --git a/drivers/platform/chrome/wilco_ec/Kconfig b/drivers/platform/chrome/wilco_ec/Kconfig index 4a119ced4d0c..9812242663cd 100644 --- a/drivers/platform/chrome/wilco_ec/Kconfig +++ b/drivers/platform/chrome/wilco_ec/Kconfig @@ -18,3 +18,12 @@ config WILCO_EC_DEBUGFS manipulation and allow for testing arbitrary commands. This interface is intended for debug only and will not be present on production devices. + +config WILCO_EC_EVENTS + tristate "Enable event forwarding from EC to userspace" + depends on WILCO_EC + help + If you say Y here, you get support for the EC to send events + (such as power state changes) to userspace. The EC sends the events + over ACPI, and a driver queues up the events to be read by a + userspace daemon from /dev/wilco_event using read() and poll(). diff --git a/drivers/platform/chrome/wilco_ec/Makefile b/drivers/platform/chrome/wilco_ec/Makefile index 063e7fb4ea17..37452ab953de 100644 --- a/drivers/platform/chrome/wilco_ec/Makefile +++ b/drivers/platform/chrome/wilco_ec/Makefile @@ -4,3 +4,5 @@ wilco_ec-objs := core.o mailbox.o obj-$(CONFIG_WILCO_EC) += wilco_ec.o wilco_ec_debugfs-objs := debugfs.o obj-$(CONFIG_WILCO_EC_DEBUGFS) += wilco_ec_debugfs.o +wilco_ec_events-objs := event.o +obj-$(CONFIG_WILCO_EC_EVENTS) += wilco_ec_events.o diff --git a/drivers/platform/chrome/wilco_ec/event.c b/drivers/platform/chrome/wilco_ec/event.c new file mode 100644 index 000000000000..48f637336920 --- /dev/null +++ b/drivers/platform/chrome/wilco_ec/event.c @@ -0,0 +1,511 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ACPI event handling for Wilco Embedded Controller + * + * Copyright 2019 Google LLC + * + * The Wilco Embedded Controller can return extended events that + * are not handled by standard ACPI objects. These events can + * contain information about changes in EC controlled features, + * such as the charger or battery getting plugged/unplugged. + * + * These events are triggered with an ACPI Notify(0x90) and the + * event data buffer is read through an ACPI method provided by + * the BIOS which reads the event buffer from EC RAM. + * + * These events are put into a queue which can be read by a userspace daemon + * via a char device that implements read() and poll(). The char device + * will appear at /dev/wilco_event{n}, where n is some integer. + * + * To test, run the simple python script from + * https://gist.github.com/11fa41edda69aa09e4a27f5f788d45ba + * to poll() and read() the node. You can generate events + * in many ways, the easiest are to press fn+Esc or to + * plug/unplug the battery (with the AC in). + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +/* ACPI Notify event code indicating event data is available. */ +#define EC_ACPI_NOTIFY_EVENT 0x90 +/* ACPI Method to execute to retrieve event data buffer from the EC. */ +#define EC_ACPI_GET_EVENT "QSET" +/* Maximum number of words in event data returned by the EC. */ +#define EC_ACPI_MAX_EVENT_DATA 6 +#define EC_ACPI_MAX_EVENT_SIZE \ + (sizeof(struct ec_event) + (EC_ACPI_MAX_EVENT_DATA) * sizeof(u16)) + +/* Node will appear in /dev/EVENT_DEV_NAME */ +#define EVENT_DEV_NAME "wilco_event" +#define EVENT_CLASS_NAME EVENT_DEV_NAME +#define DRV_NAME EVENT_DEV_NAME +#define EVENT_DEV_NAME_FMT (EVENT_DEV_NAME "%d") +static struct class event_class = { + .owner = THIS_MODULE, + .name = EVENT_CLASS_NAME, +}; + +/* Keep track of all the device numbers used. */ +#define EVENT_MAX_DEV 128 +static int event_major; +static DEFINE_IDA(event_ida); + +/** + * struct event_device_data - Data for a Wilco EC device that responds to ACPI. + * @events: Queue of EC events to be provided to userspace. + * @lock: Mutex to guard the queue. + * @wq: Wait queue to notify processes when events or available or the + * device has been removed. + * @cdev: Char dev that userspace reads() and polls() from. + * @dev: Device associated with the %cdev. + * @exist: Has the device been not been removed? Once a device has been removed, + * writes, reads, and new opens will fail. + * + * There will be one of these structs for each ACPI device registered. This data + * is the queue of events received from ACPI that still need to be read from + * userspace (plus a supporting lock and wait queue), as well as the device and + * char device that userspace is using, plus a flag on whether the ACPI device + * has been removed. + */ +struct event_device_data { + struct list_head events; + struct mutex lock; + wait_queue_head_t wq; + struct device dev; + struct cdev cdev; + bool exist; +}; + +/** + * struct ec_event - Extended event returned by the EC. + * @size: Number of words in structure after the size word. + * @type: Extended event type from &enum ec_event_type. + * @event: Event data words. Max count is %EC_ACPI_MAX_EVENT_DATA. + */ +struct ec_event { + u16 size; + u16 type; + u16 event[0]; +} __packed; + +/** + * struct ec_event_entry - Event queue entry. + * @list: List node. + * @size: Number of bytes in event structure. + * @event: Extended event returned by the EC. This should be the last + * element because &struct ec_event includes a zero length array. + */ +struct ec_event_entry { + struct list_head list; + size_t size; + struct ec_event event; +}; + +/** + * enqueue_events() - Place EC events in queue to be read by userspace. + * @adev: Device the events came from. + * @buf: Buffer of event data. + * @length: Length of event data buffer. + * + * %buf contains a number of ec_event's, packed one after the other. + * Each ec_event is of variable length. Start with the first event, copy it + * into a containing ev_event_entry, store that entry in a list, move on + * to the next ec_event in buf, and repeat. + * + * Return: 0 on success or negative error code on failure. + */ +static int enqueue_events(struct acpi_device *adev, const u8 *buf, u32 length) +{ + struct event_device_data *dev_data = adev->driver_data; + struct ec_event *event; + struct ec_event_entry *entry; + size_t event_size, num_words, word_size; + u32 offset = 0; + + while (offset < length) { + event = (struct ec_event *)(buf + offset); + if (!event) + return -EINVAL; + + /* Number of 16bit event data words is size - 1 */ + num_words = event->size - 1; + word_size = num_words * sizeof(u16); + event_size = sizeof(*event) + word_size; + if (num_words > EC_ACPI_MAX_EVENT_DATA) { + dev_err(&adev->dev, "Too many event words: %d > %d\n", + num_words, EC_ACPI_MAX_EVENT_DATA); + return -EOVERFLOW; + }; + + /* Ensure event does not overflow the available buffer */ + if ((offset + event_size) > length) { + dev_err(&adev->dev, "Event exceeds buffer: %d > %d\n", + offset + event_size, length); + return -EOVERFLOW; + } + + /* Point to the next event in the buffer */ + offset += event_size; + + /* Create event entry for the queue */ + entry = kzalloc(sizeof(struct ec_event_entry) + word_size, + GFP_KERNEL); + if (!entry) + return -ENOMEM; + entry->size = event_size; + memcpy(&entry->event, event, entry->size); + + /* Add this event to the queue */ + mutex_lock(&dev_data->lock); + list_add_tail(&entry->list, &dev_data->events); + mutex_unlock(&dev_data->lock); + } + + return 0; +} + +/** + * event_device_notify() - Callback when EC generates an event over ACPI. + * @adev: The device that the event is coming from. + * @value: Value passed to Notify() in ACPI. + * + * This function will read the events from the device and enqueue them. + */ +static void event_device_notify(struct acpi_device *adev, u32 value) +{ + struct acpi_buffer event_buffer = { ACPI_ALLOCATE_BUFFER, NULL }; + struct event_device_data *dev_data = adev->driver_data; + union acpi_object *obj; + acpi_status status; + + if (value != EC_ACPI_NOTIFY_EVENT) { + dev_err(&adev->dev, "Invalid event: 0x%08x\n", value); + return; + } + + /* Execute ACPI method to get event data buffer. */ + status = acpi_evaluate_object(adev->handle, EC_ACPI_GET_EVENT, + NULL, &event_buffer); + if (ACPI_FAILURE(status)) { + dev_err(&adev->dev, "Error executing ACPI method %s()\n", + EC_ACPI_GET_EVENT); + return; + } + + obj = (union acpi_object *)event_buffer.pointer; + if (!obj) { + dev_err(&adev->dev, "Nothing returned from %s()\n", + EC_ACPI_GET_EVENT); + return; + } + if (obj->type != ACPI_TYPE_BUFFER) { + dev_err(&adev->dev, "Invalid object returned from %s()\n", + EC_ACPI_GET_EVENT); + kfree(obj); + return; + } + if (obj->buffer.length < sizeof(struct ec_event)) { + dev_err(&adev->dev, "Invalid buffer length %d from %s()\n", + obj->buffer.length, EC_ACPI_GET_EVENT); + kfree(obj); + return; + } + + enqueue_events(adev, obj->buffer.pointer, obj->buffer.length); + kfree(obj); + + if (!list_empty(&dev_data->events)) + wake_up_interruptible(&dev_data->wq); +} + +static int event_open(struct inode *inode, struct file *filp) +{ + struct event_device_data *dev_data; + + dev_data = container_of(inode->i_cdev, struct event_device_data, cdev); + if (!dev_data->exist) + return -ENODEV; + + /* Increase refcount on device so dev_data is not freed */ + get_device(&dev_data->dev); + nonseekable_open(inode, filp); + filp->private_data = dev_data; + + return 0; +} + +static __poll_t event_poll(struct file *filp, poll_table *wait) +{ + struct event_device_data *dev_data = filp->private_data; + __poll_t mask = 0; + + poll_wait(filp, &dev_data->wq, wait); + if (!dev_data->exist) + return -ENODEV; + if (!list_empty(&dev_data->events)) + mask |= EPOLLIN | EPOLLRDNORM | EPOLLPRI; + return mask; +} + +/** + * event_read() - Callback for passing event data to userspace via read(). + * @filp: The file we are reading from. + * @buf: Pointer to userspace buffer to fill with one event. + * @count: Number of bytes requested. Must be at least EC_ACPI_MAX_EVENT_SIZE. + * @pos: File position pointer, irrelevant since we don't support seeking. + * + * Fills the passed buffer with the data from the first event in the queue, + * removes that event from the queue. On error, the event remains in the queue. + * + * If there are no events in the the queue, then one of two things happens, + * depending on if the file was opened in nonblocking mode: If in nonblocking + * mode, then return -EAGAIN to say there's no data. If in blocking mode, then + * block until an event is available. + * + * Return: Number of bytes placed in buffer, negative error code on failure. + */ +static ssize_t event_read(struct file *filp, char __user *buf, size_t count, + loff_t *pos) +{ + struct event_device_data *dev_data = filp->private_data; + struct ec_event_entry *entry; + ssize_t n_bytes_written = 0; + int err; + + /* We only will give them the entire event at once */ + if (count != 0 && count < EC_ACPI_MAX_EVENT_SIZE) + return -EINVAL; + + mutex_lock(&dev_data->lock); + + while (list_empty(&dev_data->events)) { + if (filp->f_flags & O_NONBLOCK) { + mutex_unlock(&dev_data->lock); + return -EAGAIN; + } + /* Need to unlock so that data can actually get added to the + * queue, and since we recheck before use and it's just + * comparing pointers, this is safe unlocked. + */ + mutex_unlock(&dev_data->lock); + err = wait_event_interruptible(dev_data->wq, + !list_empty(&dev_data->events)); + if (err) + return err; + + /* Device was removed as we waited? */ + if (!dev_data->exist) + return -ENODEV; + mutex_lock(&dev_data->lock); + } + + entry = list_first_entry(&dev_data->events, + struct ec_event_entry, list); + n_bytes_written = entry->size; + if (copy_to_user(buf, &entry->event, n_bytes_written)) + return -EFAULT; + list_del(&entry->list); + kfree(entry); + + mutex_unlock(&dev_data->lock); + + return n_bytes_written; +} + +static int event_release(struct inode *inode, struct file *filp) +{ + struct event_device_data *dev_data = filp->private_data; + + put_device(&dev_data->dev); + + return 0; +} + +static const struct file_operations event_fops = { + .open = event_open, + .poll = event_poll, + .read = event_read, + .release = event_release, + .llseek = no_llseek, + .owner = THIS_MODULE, +}; + +/** + * free_device_data() - Callback to free the event_device_data structure. + * @d: The device embedded in our device data, which we have been ref counting. + * + * This is called only after event_device_remove() has been called and all + * userspace programs have called event_release() on all the open file + * descriptors. + */ +static void free_device_data(struct device *d) +{ + struct event_device_data *dev_data; + + dev_data = container_of(d, struct event_device_data, dev); + kfree(dev_data); +} + +static void hangup_device(struct event_device_data *dev_data) +{ + mutex_lock(&dev_data->lock); + dev_data->exist = false; + mutex_unlock(&dev_data->lock); + + /* Wake up the waiting processes so they can close. */ + wake_up_interruptible(&dev_data->wq); + put_device(&dev_data->dev); +} + +/** + * event_device_add() - Callback when creating a new device. + * @adev: ACPI device that we will be receiving events from. + * + * This finds a free minor number for the device, allocates and initializes + * some device data, and creates a new device and char dev node. + * + * The device data is freed in free_device_data(), which is called when + * %dev_data->dev is release()ed. This happens after all references to + * %dev_data->dev are dropped, which happens once both event_device_remove() + * has been called and every open()ed file descriptor has been release()ed. + * + * Return: 0 on success, negative error code on failure. + */ +static int event_device_add(struct acpi_device *adev) +{ + struct event_device_data *dev_data; + dev_t dev_num; + int error, minor; + + minor = ida_alloc_max(&event_ida, EVENT_MAX_DEV-1, GFP_KERNEL); + if (minor < 0) { + error = minor; + dev_err(&adev->dev, "Failed to find minor number: %d", error); + return error; + } + + dev_data = kzalloc(sizeof(*dev_data), GFP_KERNEL); + if (!dev_data) { + error = -ENOMEM; + goto free_minor; + } + + /* Initialize the device data. */ + adev->driver_data = dev_data; + INIT_LIST_HEAD(&dev_data->events); + mutex_init(&dev_data->lock); + init_waitqueue_head(&dev_data->wq); + dev_data->exist = true; + + /* Initialize the device. */ + dev_num = MKDEV(event_major, minor); + dev_data->dev.devt = dev_num; + dev_data->dev.class = &event_class; + dev_data->dev.release = free_device_data; + dev_set_name(&dev_data->dev, EVENT_DEV_NAME_FMT, minor); + device_initialize(&dev_data->dev); + + /* Initialize the character device, and add it to userspace. */ + cdev_init(&dev_data->cdev, &event_fops); + error = cdev_device_add(&dev_data->cdev, &dev_data->dev); + if (error) + goto free_dev_data; + + return 0; + +free_dev_data: + hangup_device(dev_data); +free_minor: + ida_simple_remove(&event_ida, minor); + return error; +} + +static int event_device_remove(struct acpi_device *adev) +{ + struct event_device_data *dev_data = adev->driver_data; + + cdev_device_del(&dev_data->cdev, &dev_data->dev); + ida_simple_remove(&event_ida, MINOR(dev_data->dev.devt)); + hangup_device(dev_data); + + return 0; +} + +static const struct acpi_device_id event_acpi_ids[] = { + { "GOOG000D", 0 }, + { } +}; +MODULE_DEVICE_TABLE(acpi, event_acpi_ids); + +static struct acpi_driver event_driver = { + .name = DRV_NAME, + .class = DRV_NAME, + .ids = event_acpi_ids, + .ops = { + .add = event_device_add, + .notify = event_device_notify, + .remove = event_device_remove, + }, + .owner = THIS_MODULE, +}; + +static int __init event_module_init(void) +{ + dev_t dev_num = 0; + int ret; + + ret = class_register(&event_class); + if (ret) { + pr_warn(DRV_NAME ": Failed registering class: %d", ret); + return ret; + } + + /* Request device numbers, starting with minor=0. Save the major num. */ + ret = alloc_chrdev_region(&dev_num, 0, EVENT_MAX_DEV, EVENT_DEV_NAME); + if (ret) { + pr_warn(DRV_NAME ": Failed allocating dev numbers: %d", ret); + goto destroy_class; + } + event_major = MAJOR(dev_num); + + ret = acpi_bus_register_driver(&event_driver); + if (ret < 0) { + pr_warn(DRV_NAME ": Failed registering driver: %d\n", ret); + goto unregister_region; + } + + return 0; + +unregister_region: + unregister_chrdev_region(MKDEV(event_major, 0), EVENT_MAX_DEV); +destroy_class: + class_unregister(&event_class); + ida_destroy(&event_ida); + return ret; +} + +static void __exit event_module_exit(void) +{ + acpi_bus_unregister_driver(&event_driver); + unregister_chrdev_region(MKDEV(event_major, 0), EVENT_MAX_DEV); + class_unregister(&event_class); + ida_destroy(&event_ida); +} + +module_init(event_module_init); +module_exit(event_module_exit); + +MODULE_AUTHOR("Nick Crews "); +MODULE_DESCRIPTION("Wilco EC ACPI event driver"); +MODULE_LICENSE("GPL v2"); +MODULE_ALIAS("platform:" DRV_NAME); -- 2.21.0.rc0.258.g878e2cd30e-goog