Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp691666img; Tue, 26 Feb 2019 07:05:30 -0800 (PST) X-Google-Smtp-Source: AHgI3IbJTftmy1N84208CUMaYFrAUfjq9S8as8m9A4BZjogrPL37uUvXZufrItSF2rXmc/3L6DaG X-Received: by 2002:a17:902:45:: with SMTP id 63mr26862136pla.281.1551193530354; Tue, 26 Feb 2019 07:05:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551193530; cv=none; d=google.com; s=arc-20160816; b=09sYVVi3vHiaeqHVLq1aXA/Ol3auX6dPTd97Q9p+tI+1nlSKgZKQV/b9U6ZCyxDVqA OdsC/6LnLN+OTTv2SmSnMkEbY8lS0wjleIAd91iZHshxnNYxG8grWxdts9jFBZlWq+b6 aNuZtmFqvFhLIC+XmthuJpF2NwhyfWk7uYiJJDp/elPFX9wYnuryfgu0pEvJ2O5fIyF0 BCqx8LoYTQ3uJVztZqZ3EjGIza7tMtvbQbzJXyH8vhlO7CY8EEn54o31evE+f3rPgpDW c58M/Xz6GkFcI0S2nAq406xsLfb5O2CQYLXfrcke4AH6zbG/egODhsyUDIXIW5hCbxx+ +v5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=19TlRFMIWx2eRyu5D7kwFZPNUGu++3nGX/wZeo5NunY=; b=WkO9d3tD8Kcr8yh+z85s/GpdxJsuhjsp0WgAkFy2aiK4Z1f4w7QirM3xKPW+WY1Z0l USE8t+ahaQSnjKf63UGICLQCYzbO6Vn6NPY+Ii1tQJel4xd7JNdbQ903Jdips64NdZLN Kms3o6j5jQPsRZUcYppEci8ePJuMEAx/AXZIMpfe4HHLONgNwYNMlQDSXm+Gc+xNivyv BAKa9dMx32sO4D3bxVpPnLAqcDH+uSv4zBUQ5jDHH0Fxzoudfjq+ZkrBcDNxm3sff4ig Wh7HQiwswAMw2QGTZH05PuqpedavaGKpeAxJ10X8e0XzrV8DazPBchJjIIm6QHF9SAdU 0d7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bF0jMbh1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t63si12597042pgd.367.2019.02.26.07.05.15; Tue, 26 Feb 2019 07:05:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bF0jMbh1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727997AbfBZPEo (ORCPT + 99 others); Tue, 26 Feb 2019 10:04:44 -0500 Received: from mail-qk1-f196.google.com ([209.85.222.196]:40434 "EHLO mail-qk1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726475AbfBZPEn (ORCPT ); Tue, 26 Feb 2019 10:04:43 -0500 Received: by mail-qk1-f196.google.com with SMTP id h28so7735467qkk.7 for ; Tue, 26 Feb 2019 07:04:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=19TlRFMIWx2eRyu5D7kwFZPNUGu++3nGX/wZeo5NunY=; b=bF0jMbh1MV3L/wd4HPp5ZvlnVKAVBrWD6/vQUCAeujD8TJiK2UqcNBejeCNDIRNmZQ 9N8xjTIfK+ggQtdy/QrcXSmtNrsIg4ZFWsQmSLufRN4BvIyahDCGnP5PU8nse9rArjdv aUg2GkeKrp0iX4RN02BbRP6hWsUGqWnx8StpDPSdsuQpdsiw8QQJKv0dLMstWH8KTaKU EnYYfl8OIbB3/AIqLQX4MMgICLn0OumbXbwnpd++k+vIN4uQJcJuJVZhEWnMCESoG7B5 0hsN9P6+G4UD2qffvrjG6e7VwNZeRpBrgtJxyZQftoMofeZiMzLCnQQFLcFkeoJagI/S CSFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=19TlRFMIWx2eRyu5D7kwFZPNUGu++3nGX/wZeo5NunY=; b=AZg/CT8ktqvaQ7Hg/L6GGzcjuaAmp6BQMGl3Mj+38b8ELg34JkNj7obMAD4MVL/ePO D8E6LAbPHtrBflara2i8YnPAccv3QwI45jG4cOZ5uGyvtRc4aD8e+FOj2dCoN3mi6ZxF t+r2Y5aoN/HOgubH+69hMkBAVwiHwGZmcmk4vVEw3iIV0vFUtleaIk6GnFLFQUX/1fLY 3Y8sqFteKiOSjZL3Koxms5eyN6+8hYK2aXOa/ZSzqjAWgkaJpN1QRRlHAB7Sp6ELWe78 +m0wizyWEEniAjAjoBebalQxza/P6penWNrwAUZhOiBQD9avD8yssJ5PQOjXpwzdLl7Y XLZg== X-Gm-Message-State: AHQUAuZKV1I5G0XpAiPfAYbm16vRvrE37cWOUQK7fKnvCTVcifDLuMQd oqWS5z+TuDH8bg9AfCmwyNIWLmQ3SL2Xg/EKYd8= X-Received: by 2002:a37:4801:: with SMTP id v1mr15359542qka.312.1551193481959; Tue, 26 Feb 2019 07:04:41 -0800 (PST) MIME-Version: 1.0 References: <20190225190957.40425-1-ncrews@chromium.org> In-Reply-To: <20190225190957.40425-1-ncrews@chromium.org> From: Enric Balletbo Serra Date: Tue, 26 Feb 2019 16:04:30 +0100 Message-ID: Subject: Re: [PATCH v2] platform/chrome: Add Wilco EC Event Handling To: Nick Crews Cc: Enric Balletbo i Serra , Benson Leung , linux-kernel , dlaurie@chromium.org, lamzin@google.com, bartfab@google.com, derat@google.com, Guenter Roeck , Dmitry Torokhov Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Nick, Missatge de Nick Crews del dia dl., 25 de febr. 2019 a les 20:13: > > This patch is meant to be applied on top of the current > for-next top of tree in the chrome/platform repo, at > https://git.kernel.org/pub/scm/linux/kernel/git/chrome-platform/linux.git/log/?h=for-next > > The Wilco Embedded Controller can return extended events that > are not handled by standard ACPI objects. These events can > contain information about changes in EC controlled features, > such as the charger or battery getting plugged/unplugged. > To understand better this I think would be good to know what kind of events or which specific events do you expect to handle through this interface. Because if these events are like the ones you described above (charger/battery plugged/unplugged) this should go again through the power-supply subsystem and use the standard interface for that. I suspect that what you want here, is different kernel drivers accessing this event interface. E.g a wilco_ec_charger hooked to this event interface that is able to get the event when the battery is charging or not charging or charged. Maybe something similar to MKBP events in cros-ec? Is that what you want? Regards, Enric > These events are triggered with an ACPI Notify(0x90) and the > event data buffer is read through an ACPI method provided by > the BIOS which reads the event buffer from EC RAM. > > These events are put into a queue which can be read by a userspace daemon > via a char device that implements read() and poll(). The char device > will appear at /dev/wilco_event{n}, where n is some integer. > > This patch depends on a coreboot patch which adds the relevant > ACPI device, so this driver can pick it up: > https://review.coreboot.org/c/coreboot/+/31204 > > To test, run the simple python script from > https://gist.github.com/8a55050e353b7027ca3009074eec4200 > to poll() and read() the node. You can generate events > in many ways, the easiest are to press fn+Esc or to > plug/unplug the battery (with the AC in). > > I sent out an initial version of this driver a month ago, > available at https://lkml.org/lkml/2019/1/23/676 > At that point, we were not sure about the requirements of the > driver, and reviewers were not pleased with the abuses of the > sysfs interface. In this version, we are more confident about > the needs of the userspace daemon that will use this driver, > and this driver addresses all of the previous concerns. > > Changes in v2: > - Move sysfs node to /dev/wilco_ec{n} > - Userspace daemon should now use poll() to check for available events > - Userspace daemon should now use read() to pop an event from queue > - Keyboard events are no longer forwarded to the input subsystem > - The driver is a separate module > - There is a new ACPI device GOOG00D that the driver binds to, not the > old GOOG00C used by the core driver > - The actual ACPI command code changed from "^QSET" to "QSET" > > Signed-off-by: Nick Crews > --- > drivers/platform/chrome/wilco_ec/Kconfig | 9 + > drivers/platform/chrome/wilco_ec/Makefile | 2 + > drivers/platform/chrome/wilco_ec/event.c | 511 ++++++++++++++++++++++ > 3 files changed, 522 insertions(+) > create mode 100644 drivers/platform/chrome/wilco_ec/event.c > > diff --git a/drivers/platform/chrome/wilco_ec/Kconfig b/drivers/platform/chrome/wilco_ec/Kconfig > index 4a119ced4d0c..9812242663cd 100644 > --- a/drivers/platform/chrome/wilco_ec/Kconfig > +++ b/drivers/platform/chrome/wilco_ec/Kconfig > @@ -18,3 +18,12 @@ config WILCO_EC_DEBUGFS > manipulation and allow for testing arbitrary commands. This > interface is intended for debug only and will not be present > on production devices. > + > +config WILCO_EC_EVENTS > + tristate "Enable event forwarding from EC to userspace" > + depends on WILCO_EC > + help > + If you say Y here, you get support for the EC to send events > + (such as power state changes) to userspace. The EC sends the events > + over ACPI, and a driver queues up the events to be read by a > + userspace daemon from /dev/wilco_event using read() and poll(). > diff --git a/drivers/platform/chrome/wilco_ec/Makefile b/drivers/platform/chrome/wilco_ec/Makefile > index 063e7fb4ea17..37452ab953de 100644 > --- a/drivers/platform/chrome/wilco_ec/Makefile > +++ b/drivers/platform/chrome/wilco_ec/Makefile > @@ -4,3 +4,5 @@ wilco_ec-objs := core.o mailbox.o > obj-$(CONFIG_WILCO_EC) += wilco_ec.o > wilco_ec_debugfs-objs := debugfs.o > obj-$(CONFIG_WILCO_EC_DEBUGFS) += wilco_ec_debugfs.o > +wilco_ec_events-objs := event.o > +obj-$(CONFIG_WILCO_EC_EVENTS) += wilco_ec_events.o > diff --git a/drivers/platform/chrome/wilco_ec/event.c b/drivers/platform/chrome/wilco_ec/event.c > new file mode 100644 > index 000000000000..48f637336920 > --- /dev/null > +++ b/drivers/platform/chrome/wilco_ec/event.c > @@ -0,0 +1,511 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * ACPI event handling for Wilco Embedded Controller > + * > + * Copyright 2019 Google LLC > + * > + * The Wilco Embedded Controller can return extended events that > + * are not handled by standard ACPI objects. These events can > + * contain information about changes in EC controlled features, > + * such as the charger or battery getting plugged/unplugged. > + * > + * These events are triggered with an ACPI Notify(0x90) and the > + * event data buffer is read through an ACPI method provided by > + * the BIOS which reads the event buffer from EC RAM. > + * > + * These events are put into a queue which can be read by a userspace daemon > + * via a char device that implements read() and poll(). The char device > + * will appear at /dev/wilco_event{n}, where n is some integer. > + * > + * To test, run the simple python script from > + * https://gist.github.com/11fa41edda69aa09e4a27f5f788d45ba > + * to poll() and read() the node. You can generate events > + * in many ways, the easiest are to press fn+Esc or to > + * plug/unplug the battery (with the AC in). > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +/* ACPI Notify event code indicating event data is available. */ > +#define EC_ACPI_NOTIFY_EVENT 0x90 > +/* ACPI Method to execute to retrieve event data buffer from the EC. */ > +#define EC_ACPI_GET_EVENT "QSET" > +/* Maximum number of words in event data returned by the EC. */ > +#define EC_ACPI_MAX_EVENT_DATA 6 > +#define EC_ACPI_MAX_EVENT_SIZE \ > + (sizeof(struct ec_event) + (EC_ACPI_MAX_EVENT_DATA) * sizeof(u16)) > + > +/* Node will appear in /dev/EVENT_DEV_NAME */ > +#define EVENT_DEV_NAME "wilco_event" > +#define EVENT_CLASS_NAME EVENT_DEV_NAME > +#define DRV_NAME EVENT_DEV_NAME > +#define EVENT_DEV_NAME_FMT (EVENT_DEV_NAME "%d") > +static struct class event_class = { > + .owner = THIS_MODULE, > + .name = EVENT_CLASS_NAME, > +}; > + > +/* Keep track of all the device numbers used. */ > +#define EVENT_MAX_DEV 128 > +static int event_major; > +static DEFINE_IDA(event_ida); > + > +/** > + * struct event_device_data - Data for a Wilco EC device that responds to ACPI. > + * @events: Queue of EC events to be provided to userspace. > + * @lock: Mutex to guard the queue. > + * @wq: Wait queue to notify processes when events or available or the > + * device has been removed. > + * @cdev: Char dev that userspace reads() and polls() from. > + * @dev: Device associated with the %cdev. > + * @exist: Has the device been not been removed? Once a device has been removed, > + * writes, reads, and new opens will fail. > + * > + * There will be one of these structs for each ACPI device registered. This data > + * is the queue of events received from ACPI that still need to be read from > + * userspace (plus a supporting lock and wait queue), as well as the device and > + * char device that userspace is using, plus a flag on whether the ACPI device > + * has been removed. > + */ > +struct event_device_data { > + struct list_head events; > + struct mutex lock; > + wait_queue_head_t wq; > + struct device dev; > + struct cdev cdev; > + bool exist; > +}; > + > +/** > + * struct ec_event - Extended event returned by the EC. > + * @size: Number of words in structure after the size word. > + * @type: Extended event type from &enum ec_event_type. > + * @event: Event data words. Max count is %EC_ACPI_MAX_EVENT_DATA. > + */ > +struct ec_event { > + u16 size; > + u16 type; > + u16 event[0]; > +} __packed; > + > +/** > + * struct ec_event_entry - Event queue entry. > + * @list: List node. > + * @size: Number of bytes in event structure. > + * @event: Extended event returned by the EC. This should be the last > + * element because &struct ec_event includes a zero length array. > + */ > +struct ec_event_entry { > + struct list_head list; > + size_t size; > + struct ec_event event; > +}; > + > +/** > + * enqueue_events() - Place EC events in queue to be read by userspace. > + * @adev: Device the events came from. > + * @buf: Buffer of event data. > + * @length: Length of event data buffer. > + * > + * %buf contains a number of ec_event's, packed one after the other. > + * Each ec_event is of variable length. Start with the first event, copy it > + * into a containing ev_event_entry, store that entry in a list, move on > + * to the next ec_event in buf, and repeat. > + * > + * Return: 0 on success or negative error code on failure. > + */ > +static int enqueue_events(struct acpi_device *adev, const u8 *buf, u32 length) > +{ > + struct event_device_data *dev_data = adev->driver_data; > + struct ec_event *event; > + struct ec_event_entry *entry; > + size_t event_size, num_words, word_size; > + u32 offset = 0; > + > + while (offset < length) { > + event = (struct ec_event *)(buf + offset); > + if (!event) > + return -EINVAL; > + > + /* Number of 16bit event data words is size - 1 */ > + num_words = event->size - 1; > + word_size = num_words * sizeof(u16); > + event_size = sizeof(*event) + word_size; > + if (num_words > EC_ACPI_MAX_EVENT_DATA) { > + dev_err(&adev->dev, "Too many event words: %d > %d\n", > + num_words, EC_ACPI_MAX_EVENT_DATA); > + return -EOVERFLOW; > + }; > + > + /* Ensure event does not overflow the available buffer */ > + if ((offset + event_size) > length) { > + dev_err(&adev->dev, "Event exceeds buffer: %d > %d\n", > + offset + event_size, length); > + return -EOVERFLOW; > + } > + > + /* Point to the next event in the buffer */ > + offset += event_size; > + > + /* Create event entry for the queue */ > + entry = kzalloc(sizeof(struct ec_event_entry) + word_size, > + GFP_KERNEL); > + if (!entry) > + return -ENOMEM; > + entry->size = event_size; > + memcpy(&entry->event, event, entry->size); > + > + /* Add this event to the queue */ > + mutex_lock(&dev_data->lock); > + list_add_tail(&entry->list, &dev_data->events); > + mutex_unlock(&dev_data->lock); > + } > + > + return 0; > +} > + > +/** > + * event_device_notify() - Callback when EC generates an event over ACPI. > + * @adev: The device that the event is coming from. > + * @value: Value passed to Notify() in ACPI. > + * > + * This function will read the events from the device and enqueue them. > + */ > +static void event_device_notify(struct acpi_device *adev, u32 value) > +{ > + struct acpi_buffer event_buffer = { ACPI_ALLOCATE_BUFFER, NULL }; > + struct event_device_data *dev_data = adev->driver_data; > + union acpi_object *obj; > + acpi_status status; > + > + if (value != EC_ACPI_NOTIFY_EVENT) { > + dev_err(&adev->dev, "Invalid event: 0x%08x\n", value); > + return; > + } > + > + /* Execute ACPI method to get event data buffer. */ > + status = acpi_evaluate_object(adev->handle, EC_ACPI_GET_EVENT, > + NULL, &event_buffer); > + if (ACPI_FAILURE(status)) { > + dev_err(&adev->dev, "Error executing ACPI method %s()\n", > + EC_ACPI_GET_EVENT); > + return; > + } > + > + obj = (union acpi_object *)event_buffer.pointer; > + if (!obj) { > + dev_err(&adev->dev, "Nothing returned from %s()\n", > + EC_ACPI_GET_EVENT); > + return; > + } > + if (obj->type != ACPI_TYPE_BUFFER) { > + dev_err(&adev->dev, "Invalid object returned from %s()\n", > + EC_ACPI_GET_EVENT); > + kfree(obj); > + return; > + } > + if (obj->buffer.length < sizeof(struct ec_event)) { > + dev_err(&adev->dev, "Invalid buffer length %d from %s()\n", > + obj->buffer.length, EC_ACPI_GET_EVENT); > + kfree(obj); > + return; > + } > + > + enqueue_events(adev, obj->buffer.pointer, obj->buffer.length); > + kfree(obj); > + > + if (!list_empty(&dev_data->events)) > + wake_up_interruptible(&dev_data->wq); > +} > + > +static int event_open(struct inode *inode, struct file *filp) > +{ > + struct event_device_data *dev_data; > + > + dev_data = container_of(inode->i_cdev, struct event_device_data, cdev); > + if (!dev_data->exist) > + return -ENODEV; > + > + /* Increase refcount on device so dev_data is not freed */ > + get_device(&dev_data->dev); > + nonseekable_open(inode, filp); > + filp->private_data = dev_data; > + > + return 0; > +} > + > +static __poll_t event_poll(struct file *filp, poll_table *wait) > +{ > + struct event_device_data *dev_data = filp->private_data; > + __poll_t mask = 0; > + > + poll_wait(filp, &dev_data->wq, wait); > + if (!dev_data->exist) > + return -ENODEV; > + if (!list_empty(&dev_data->events)) > + mask |= EPOLLIN | EPOLLRDNORM | EPOLLPRI; > + return mask; > +} > + > +/** > + * event_read() - Callback for passing event data to userspace via read(). > + * @filp: The file we are reading from. > + * @buf: Pointer to userspace buffer to fill with one event. > + * @count: Number of bytes requested. Must be at least EC_ACPI_MAX_EVENT_SIZE. > + * @pos: File position pointer, irrelevant since we don't support seeking. > + * > + * Fills the passed buffer with the data from the first event in the queue, > + * removes that event from the queue. On error, the event remains in the queue. > + * > + * If there are no events in the the queue, then one of two things happens, > + * depending on if the file was opened in nonblocking mode: If in nonblocking > + * mode, then return -EAGAIN to say there's no data. If in blocking mode, then > + * block until an event is available. > + * > + * Return: Number of bytes placed in buffer, negative error code on failure. > + */ > +static ssize_t event_read(struct file *filp, char __user *buf, size_t count, > + loff_t *pos) > +{ > + struct event_device_data *dev_data = filp->private_data; > + struct ec_event_entry *entry; > + ssize_t n_bytes_written = 0; > + int err; > + > + /* We only will give them the entire event at once */ > + if (count != 0 && count < EC_ACPI_MAX_EVENT_SIZE) > + return -EINVAL; > + > + mutex_lock(&dev_data->lock); > + > + while (list_empty(&dev_data->events)) { > + if (filp->f_flags & O_NONBLOCK) { > + mutex_unlock(&dev_data->lock); > + return -EAGAIN; > + } > + /* Need to unlock so that data can actually get added to the > + * queue, and since we recheck before use and it's just > + * comparing pointers, this is safe unlocked. > + */ > + mutex_unlock(&dev_data->lock); > + err = wait_event_interruptible(dev_data->wq, > + !list_empty(&dev_data->events)); > + if (err) > + return err; > + > + /* Device was removed as we waited? */ > + if (!dev_data->exist) > + return -ENODEV; > + mutex_lock(&dev_data->lock); > + } > + > + entry = list_first_entry(&dev_data->events, > + struct ec_event_entry, list); > + n_bytes_written = entry->size; > + if (copy_to_user(buf, &entry->event, n_bytes_written)) > + return -EFAULT; > + list_del(&entry->list); > + kfree(entry); > + > + mutex_unlock(&dev_data->lock); > + > + return n_bytes_written; > +} > + > +static int event_release(struct inode *inode, struct file *filp) > +{ > + struct event_device_data *dev_data = filp->private_data; > + > + put_device(&dev_data->dev); > + > + return 0; > +} > + > +static const struct file_operations event_fops = { > + .open = event_open, > + .poll = event_poll, > + .read = event_read, > + .release = event_release, > + .llseek = no_llseek, > + .owner = THIS_MODULE, > +}; > + > +/** > + * free_device_data() - Callback to free the event_device_data structure. > + * @d: The device embedded in our device data, which we have been ref counting. > + * > + * This is called only after event_device_remove() has been called and all > + * userspace programs have called event_release() on all the open file > + * descriptors. > + */ > +static void free_device_data(struct device *d) > +{ > + struct event_device_data *dev_data; > + > + dev_data = container_of(d, struct event_device_data, dev); > + kfree(dev_data); > +} > + > +static void hangup_device(struct event_device_data *dev_data) > +{ > + mutex_lock(&dev_data->lock); > + dev_data->exist = false; > + mutex_unlock(&dev_data->lock); > + > + /* Wake up the waiting processes so they can close. */ > + wake_up_interruptible(&dev_data->wq); > + put_device(&dev_data->dev); > +} > + > +/** > + * event_device_add() - Callback when creating a new device. > + * @adev: ACPI device that we will be receiving events from. > + * > + * This finds a free minor number for the device, allocates and initializes > + * some device data, and creates a new device and char dev node. > + * > + * The device data is freed in free_device_data(), which is called when > + * %dev_data->dev is release()ed. This happens after all references to > + * %dev_data->dev are dropped, which happens once both event_device_remove() > + * has been called and every open()ed file descriptor has been release()ed. > + * > + * Return: 0 on success, negative error code on failure. > + */ > +static int event_device_add(struct acpi_device *adev) > +{ > + struct event_device_data *dev_data; > + dev_t dev_num; > + int error, minor; > + > + minor = ida_alloc_max(&event_ida, EVENT_MAX_DEV-1, GFP_KERNEL); > + if (minor < 0) { > + error = minor; > + dev_err(&adev->dev, "Failed to find minor number: %d", error); > + return error; > + } > + > + dev_data = kzalloc(sizeof(*dev_data), GFP_KERNEL); > + if (!dev_data) { > + error = -ENOMEM; > + goto free_minor; > + } > + > + /* Initialize the device data. */ > + adev->driver_data = dev_data; > + INIT_LIST_HEAD(&dev_data->events); > + mutex_init(&dev_data->lock); > + init_waitqueue_head(&dev_data->wq); > + dev_data->exist = true; > + > + /* Initialize the device. */ > + dev_num = MKDEV(event_major, minor); > + dev_data->dev.devt = dev_num; > + dev_data->dev.class = &event_class; > + dev_data->dev.release = free_device_data; > + dev_set_name(&dev_data->dev, EVENT_DEV_NAME_FMT, minor); > + device_initialize(&dev_data->dev); > + > + /* Initialize the character device, and add it to userspace. */ > + cdev_init(&dev_data->cdev, &event_fops); > + error = cdev_device_add(&dev_data->cdev, &dev_data->dev); > + if (error) > + goto free_dev_data; > + > + return 0; > + > +free_dev_data: > + hangup_device(dev_data); > +free_minor: > + ida_simple_remove(&event_ida, minor); > + return error; > +} > + > +static int event_device_remove(struct acpi_device *adev) > +{ > + struct event_device_data *dev_data = adev->driver_data; > + > + cdev_device_del(&dev_data->cdev, &dev_data->dev); > + ida_simple_remove(&event_ida, MINOR(dev_data->dev.devt)); > + hangup_device(dev_data); > + > + return 0; > +} > + > +static const struct acpi_device_id event_acpi_ids[] = { > + { "GOOG000D", 0 }, > + { } > +}; > +MODULE_DEVICE_TABLE(acpi, event_acpi_ids); > + > +static struct acpi_driver event_driver = { > + .name = DRV_NAME, > + .class = DRV_NAME, > + .ids = event_acpi_ids, > + .ops = { > + .add = event_device_add, > + .notify = event_device_notify, > + .remove = event_device_remove, > + }, > + .owner = THIS_MODULE, > +}; > + > +static int __init event_module_init(void) > +{ > + dev_t dev_num = 0; > + int ret; > + > + ret = class_register(&event_class); > + if (ret) { > + pr_warn(DRV_NAME ": Failed registering class: %d", ret); > + return ret; > + } > + > + /* Request device numbers, starting with minor=0. Save the major num. */ > + ret = alloc_chrdev_region(&dev_num, 0, EVENT_MAX_DEV, EVENT_DEV_NAME); > + if (ret) { > + pr_warn(DRV_NAME ": Failed allocating dev numbers: %d", ret); > + goto destroy_class; > + } > + event_major = MAJOR(dev_num); > + > + ret = acpi_bus_register_driver(&event_driver); > + if (ret < 0) { > + pr_warn(DRV_NAME ": Failed registering driver: %d\n", ret); > + goto unregister_region; > + } > + > + return 0; > + > +unregister_region: > + unregister_chrdev_region(MKDEV(event_major, 0), EVENT_MAX_DEV); > +destroy_class: > + class_unregister(&event_class); > + ida_destroy(&event_ida); > + return ret; > +} > + > +static void __exit event_module_exit(void) > +{ > + acpi_bus_unregister_driver(&event_driver); > + unregister_chrdev_region(MKDEV(event_major, 0), EVENT_MAX_DEV); > + class_unregister(&event_class); > + ida_destroy(&event_ida); > +} > + > +module_init(event_module_init); > +module_exit(event_module_exit); > + > +MODULE_AUTHOR("Nick Crews "); > +MODULE_DESCRIPTION("Wilco EC ACPI event driver"); > +MODULE_LICENSE("GPL v2"); > +MODULE_ALIAS("platform:" DRV_NAME); > -- > 2.21.0.rc0.258.g878e2cd30e-goog >