Merge branch '3.2-without-smb2' of git://git.samba.org/sfrench/cifs-2.6
[pandora-kernel.git] / drivers / char / apm-emulation.c
1 /*
2  * bios-less APM driver for ARM Linux
3  *  Jamey Hicks <jamey@crl.dec.com>
4  *  adapted from the APM BIOS driver for Linux by Stephen Rothwell (sfr@linuxcare.com)
5  *
6  * APM 1.2 Reference:
7  *   Intel Corporation, Microsoft Corporation. Advanced Power Management
8  *   (APM) BIOS Interface Specification, Revision 1.2, February 1996.
9  *
10  * This document is available from Microsoft at:
11  *    http://www.microsoft.com/whdc/archive/amp_12.mspx
12  */
13 #include <linux/module.h>
14 #include <linux/poll.h>
15 #include <linux/slab.h>
16 #include <linux/mutex.h>
17 #include <linux/proc_fs.h>
18 #include <linux/seq_file.h>
19 #include <linux/miscdevice.h>
20 #include <linux/apm_bios.h>
21 #include <linux/capability.h>
22 #include <linux/sched.h>
23 #include <linux/suspend.h>
24 #include <linux/apm-emulation.h>
25 #include <linux/freezer.h>
26 #include <linux/device.h>
27 #include <linux/kernel.h>
28 #include <linux/list.h>
29 #include <linux/init.h>
30 #include <linux/completion.h>
31 #include <linux/kthread.h>
32 #include <linux/delay.h>
33
34 #include <asm/system.h>
35
36 /*
37  * The apm_bios device is one of the misc char devices.
38  * This is its minor number.
39  */
40 #define APM_MINOR_DEV   134
41
42 /*
43  * One option can be changed at boot time as follows:
44  *      apm=on/off                      enable/disable APM
45  */
46
47 /*
48  * Maximum number of events stored
49  */
50 #define APM_MAX_EVENTS          16
51
52 struct apm_queue {
53         unsigned int            event_head;
54         unsigned int            event_tail;
55         apm_event_t             events[APM_MAX_EVENTS];
56 };
57
58 /*
59  * thread states (for threads using a writable /dev/apm_bios fd):
60  *
61  * SUSPEND_NONE:        nothing happening
62  * SUSPEND_PENDING:     suspend event queued for thread and pending to be read
63  * SUSPEND_READ:        suspend event read, pending acknowledgement
64  * SUSPEND_ACKED:       acknowledgement received from thread (via ioctl),
65  *                      waiting for resume
66  * SUSPEND_ACKTO:       acknowledgement timeout
67  * SUSPEND_DONE:        thread had acked suspend and is now notified of
68  *                      resume
69  *
70  * SUSPEND_WAIT:        this thread invoked suspend and is waiting for resume
71  *
72  * A thread migrates in one of three paths:
73  *      NONE -1-> PENDING -2-> READ -3-> ACKED -4-> DONE -5-> NONE
74  *                                  -6-> ACKTO -7-> NONE
75  *      NONE -8-> WAIT -9-> NONE
76  *
77  * While in PENDING or READ, the thread is accounted for in the
78  * suspend_acks_pending counter.
79  *
80  * The transitions are invoked as follows:
81  *      1: suspend event is signalled from the core PM code
82  *      2: the suspend event is read from the fd by the userspace thread
83  *      3: userspace thread issues the APM_IOC_SUSPEND ioctl (as ack)
84  *      4: core PM code signals that we have resumed
85  *      5: APM_IOC_SUSPEND ioctl returns
86  *
87  *      6: the notifier invoked from the core PM code timed out waiting
88  *         for all relevant threds to enter ACKED state and puts those
89  *         that haven't into ACKTO
90  *      7: those threads issue APM_IOC_SUSPEND ioctl too late,
91  *         get an error
92  *
93  *      8: userspace thread issues the APM_IOC_SUSPEND ioctl (to suspend),
94  *         ioctl code invokes pm_suspend()
95  *      9: pm_suspend() returns indicating resume
96  */
97 enum apm_suspend_state {
98         SUSPEND_NONE,
99         SUSPEND_PENDING,
100         SUSPEND_READ,
101         SUSPEND_ACKED,
102         SUSPEND_ACKTO,
103         SUSPEND_WAIT,
104         SUSPEND_DONE,
105 };
106
107 /*
108  * The per-file APM data
109  */
110 struct apm_user {
111         struct list_head        list;
112
113         unsigned int            suser: 1;
114         unsigned int            writer: 1;
115         unsigned int            reader: 1;
116
117         int                     suspend_result;
118         enum apm_suspend_state  suspend_state;
119
120         struct apm_queue        queue;
121 };
122
123 /*
124  * Local variables
125  */
126 static atomic_t suspend_acks_pending = ATOMIC_INIT(0);
127 static atomic_t userspace_notification_inhibit = ATOMIC_INIT(0);
128 static int apm_disabled;
129 static struct task_struct *kapmd_tsk;
130
131 static DECLARE_WAIT_QUEUE_HEAD(apm_waitqueue);
132 static DECLARE_WAIT_QUEUE_HEAD(apm_suspend_waitqueue);
133
134 /*
135  * This is a list of everyone who has opened /dev/apm_bios
136  */
137 static DECLARE_RWSEM(user_list_lock);
138 static LIST_HEAD(apm_user_list);
139
140 /*
141  * kapmd info.  kapmd provides us a process context to handle
142  * "APM" events within - specifically necessary if we're going
143  * to be suspending the system.
144  */
145 static DECLARE_WAIT_QUEUE_HEAD(kapmd_wait);
146 static DEFINE_SPINLOCK(kapmd_queue_lock);
147 static struct apm_queue kapmd_queue;
148
149 static DEFINE_MUTEX(state_lock);
150
151 static const char driver_version[] = "1.13";    /* no spaces */
152
153
154
155 /*
156  * Compatibility cruft until the IPAQ people move over to the new
157  * interface.
158  */
159 static void __apm_get_power_status(struct apm_power_info *info)
160 {
161 }
162
163 /*
164  * This allows machines to provide their own "apm get power status" function.
165  */
166 void (*apm_get_power_status)(struct apm_power_info *) = __apm_get_power_status;
167 EXPORT_SYMBOL(apm_get_power_status);
168
169
170 /*
171  * APM event queue management.
172  */
173 static inline int queue_empty(struct apm_queue *q)
174 {
175         return q->event_head == q->event_tail;
176 }
177
178 static inline apm_event_t queue_get_event(struct apm_queue *q)
179 {
180         q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
181         return q->events[q->event_tail];
182 }
183
184 static void queue_add_event(struct apm_queue *q, apm_event_t event)
185 {
186         q->event_head = (q->event_head + 1) % APM_MAX_EVENTS;
187         if (q->event_head == q->event_tail) {
188                 static int notified;
189
190                 if (notified++ == 0)
191                     printk(KERN_ERR "apm: an event queue overflowed\n");
192                 q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
193         }
194         q->events[q->event_head] = event;
195 }
196
197 static void queue_event(apm_event_t event)
198 {
199         struct apm_user *as;
200
201         down_read(&user_list_lock);
202         list_for_each_entry(as, &apm_user_list, list) {
203                 if (as->reader)
204                         queue_add_event(&as->queue, event);
205         }
206         up_read(&user_list_lock);
207         wake_up_interruptible(&apm_waitqueue);
208 }
209
210 static ssize_t apm_read(struct file *fp, char __user *buf, size_t count, loff_t *ppos)
211 {
212         struct apm_user *as = fp->private_data;
213         apm_event_t event;
214         int i = count, ret = 0;
215
216         if (count < sizeof(apm_event_t))
217                 return -EINVAL;
218
219         if (queue_empty(&as->queue) && fp->f_flags & O_NONBLOCK)
220                 return -EAGAIN;
221
222         wait_event_interruptible(apm_waitqueue, !queue_empty(&as->queue));
223
224         while ((i >= sizeof(event)) && !queue_empty(&as->queue)) {
225                 event = queue_get_event(&as->queue);
226
227                 ret = -EFAULT;
228                 if (copy_to_user(buf, &event, sizeof(event)))
229                         break;
230
231                 mutex_lock(&state_lock);
232                 if (as->suspend_state == SUSPEND_PENDING &&
233                     (event == APM_SYS_SUSPEND || event == APM_USER_SUSPEND))
234                         as->suspend_state = SUSPEND_READ;
235                 mutex_unlock(&state_lock);
236
237                 buf += sizeof(event);
238                 i -= sizeof(event);
239         }
240
241         if (i < count)
242                 ret = count - i;
243
244         return ret;
245 }
246
247 static unsigned int apm_poll(struct file *fp, poll_table * wait)
248 {
249         struct apm_user *as = fp->private_data;
250
251         poll_wait(fp, &apm_waitqueue, wait);
252         return queue_empty(&as->queue) ? 0 : POLLIN | POLLRDNORM;
253 }
254
255 /*
256  * apm_ioctl - handle APM ioctl
257  *
258  * APM_IOC_SUSPEND
259  *   This IOCTL is overloaded, and performs two functions.  It is used to:
260  *     - initiate a suspend
261  *     - acknowledge a suspend read from /dev/apm_bios.
262  *   Only when everyone who has opened /dev/apm_bios with write permission
263  *   has acknowledge does the actual suspend happen.
264  */
265 static long
266 apm_ioctl(struct file *filp, u_int cmd, u_long arg)
267 {
268         struct apm_user *as = filp->private_data;
269         int err = -EINVAL;
270
271         if (!as->suser || !as->writer)
272                 return -EPERM;
273
274         switch (cmd) {
275         case APM_IOC_SUSPEND:
276                 mutex_lock(&state_lock);
277
278                 as->suspend_result = -EINTR;
279
280                 switch (as->suspend_state) {
281                 case SUSPEND_READ:
282                         /*
283                          * If we read a suspend command from /dev/apm_bios,
284                          * then the corresponding APM_IOC_SUSPEND ioctl is
285                          * interpreted as an acknowledge.
286                          */
287                         as->suspend_state = SUSPEND_ACKED;
288                         atomic_dec(&suspend_acks_pending);
289                         mutex_unlock(&state_lock);
290
291                         /*
292                          * suspend_acks_pending changed, the notifier needs to
293                          * be woken up for this
294                          */
295                         wake_up(&apm_suspend_waitqueue);
296
297                         /*
298                          * Wait for the suspend/resume to complete.  If there
299                          * are pending acknowledges, we wait here for them.
300                          * wait_event_freezable() is interruptible and pending
301                          * signal can cause busy looping.  We aren't doing
302                          * anything critical, chill a bit on each iteration.
303                          */
304                         while (wait_event_freezable(apm_suspend_waitqueue,
305                                         as->suspend_state == SUSPEND_DONE))
306                                 msleep(10);
307                         break;
308                 case SUSPEND_ACKTO:
309                         as->suspend_result = -ETIMEDOUT;
310                         mutex_unlock(&state_lock);
311                         break;
312                 default:
313                         as->suspend_state = SUSPEND_WAIT;
314                         mutex_unlock(&state_lock);
315
316                         /*
317                          * Otherwise it is a request to suspend the system.
318                          * Just invoke pm_suspend(), we'll handle it from
319                          * there via the notifier.
320                          */
321                         as->suspend_result = pm_suspend(PM_SUSPEND_MEM);
322                 }
323
324                 mutex_lock(&state_lock);
325                 err = as->suspend_result;
326                 as->suspend_state = SUSPEND_NONE;
327                 mutex_unlock(&state_lock);
328                 break;
329         }
330
331         return err;
332 }
333
334 static int apm_release(struct inode * inode, struct file * filp)
335 {
336         struct apm_user *as = filp->private_data;
337
338         filp->private_data = NULL;
339
340         down_write(&user_list_lock);
341         list_del(&as->list);
342         up_write(&user_list_lock);
343
344         /*
345          * We are now unhooked from the chain.  As far as new
346          * events are concerned, we no longer exist.
347          */
348         mutex_lock(&state_lock);
349         if (as->suspend_state == SUSPEND_PENDING ||
350             as->suspend_state == SUSPEND_READ)
351                 atomic_dec(&suspend_acks_pending);
352         mutex_unlock(&state_lock);
353
354         wake_up(&apm_suspend_waitqueue);
355
356         kfree(as);
357         return 0;
358 }
359
360 static int apm_open(struct inode * inode, struct file * filp)
361 {
362         struct apm_user *as;
363
364         as = kzalloc(sizeof(*as), GFP_KERNEL);
365         if (as) {
366                 /*
367                  * XXX - this is a tiny bit broken, when we consider BSD
368                  * process accounting. If the device is opened by root, we
369                  * instantly flag that we used superuser privs. Who knows,
370                  * we might close the device immediately without doing a
371                  * privileged operation -- cevans
372                  */
373                 as->suser = capable(CAP_SYS_ADMIN);
374                 as->writer = (filp->f_mode & FMODE_WRITE) == FMODE_WRITE;
375                 as->reader = (filp->f_mode & FMODE_READ) == FMODE_READ;
376
377                 down_write(&user_list_lock);
378                 list_add(&as->list, &apm_user_list);
379                 up_write(&user_list_lock);
380
381                 filp->private_data = as;
382         }
383
384         return as ? 0 : -ENOMEM;
385 }
386
387 static const struct file_operations apm_bios_fops = {
388         .owner          = THIS_MODULE,
389         .read           = apm_read,
390         .poll           = apm_poll,
391         .unlocked_ioctl = apm_ioctl,
392         .open           = apm_open,
393         .release        = apm_release,
394         .llseek         = noop_llseek,
395 };
396
397 static struct miscdevice apm_device = {
398         .minor          = APM_MINOR_DEV,
399         .name           = "apm_bios",
400         .fops           = &apm_bios_fops
401 };
402
403
404 #ifdef CONFIG_PROC_FS
405 /*
406  * Arguments, with symbols from linux/apm_bios.h.
407  *
408  *   0) Linux driver version (this will change if format changes)
409  *   1) APM BIOS Version.  Usually 1.0, 1.1 or 1.2.
410  *   2) APM flags from APM Installation Check (0x00):
411  *      bit 0: APM_16_BIT_SUPPORT
412  *      bit 1: APM_32_BIT_SUPPORT
413  *      bit 2: APM_IDLE_SLOWS_CLOCK
414  *      bit 3: APM_BIOS_DISABLED
415  *      bit 4: APM_BIOS_DISENGAGED
416  *   3) AC line status
417  *      0x00: Off-line
418  *      0x01: On-line
419  *      0x02: On backup power (BIOS >= 1.1 only)
420  *      0xff: Unknown
421  *   4) Battery status
422  *      0x00: High
423  *      0x01: Low
424  *      0x02: Critical
425  *      0x03: Charging
426  *      0x04: Selected battery not present (BIOS >= 1.2 only)
427  *      0xff: Unknown
428  *   5) Battery flag
429  *      bit 0: High
430  *      bit 1: Low
431  *      bit 2: Critical
432  *      bit 3: Charging
433  *      bit 7: No system battery
434  *      0xff: Unknown
435  *   6) Remaining battery life (percentage of charge):
436  *      0-100: valid
437  *      -1: Unknown
438  *   7) Remaining battery life (time units):
439  *      Number of remaining minutes or seconds
440  *      -1: Unknown
441  *   8) min = minutes; sec = seconds
442  */
443 static int proc_apm_show(struct seq_file *m, void *v)
444 {
445         struct apm_power_info info;
446         char *units;
447
448         info.ac_line_status = 0xff;
449         info.battery_status = 0xff;
450         info.battery_flag   = 0xff;
451         info.battery_life   = -1;
452         info.time           = -1;
453         info.units          = -1;
454
455         if (apm_get_power_status)
456                 apm_get_power_status(&info);
457
458         switch (info.units) {
459         default:        units = "?";    break;
460         case 0:         units = "min";  break;
461         case 1:         units = "sec";  break;
462         }
463
464         seq_printf(m, "%s 1.2 0x%02x 0x%02x 0x%02x 0x%02x %d%% %d %s\n",
465                      driver_version, APM_32_BIT_SUPPORT,
466                      info.ac_line_status, info.battery_status,
467                      info.battery_flag, info.battery_life,
468                      info.time, units);
469
470         return 0;
471 }
472
473 static int proc_apm_open(struct inode *inode, struct file *file)
474 {
475         return single_open(file, proc_apm_show, NULL);
476 }
477
478 static const struct file_operations apm_proc_fops = {
479         .owner          = THIS_MODULE,
480         .open           = proc_apm_open,
481         .read           = seq_read,
482         .llseek         = seq_lseek,
483         .release        = single_release,
484 };
485 #endif
486
487 static int kapmd(void *arg)
488 {
489         do {
490                 apm_event_t event;
491
492                 wait_event_interruptible(kapmd_wait,
493                                 !queue_empty(&kapmd_queue) || kthread_should_stop());
494
495                 if (kthread_should_stop())
496                         break;
497
498                 spin_lock_irq(&kapmd_queue_lock);
499                 event = 0;
500                 if (!queue_empty(&kapmd_queue))
501                         event = queue_get_event(&kapmd_queue);
502                 spin_unlock_irq(&kapmd_queue_lock);
503
504                 switch (event) {
505                 case 0:
506                         break;
507
508                 case APM_LOW_BATTERY:
509                 case APM_POWER_STATUS_CHANGE:
510                         queue_event(event);
511                         break;
512
513                 case APM_USER_SUSPEND:
514                 case APM_SYS_SUSPEND:
515                         pm_suspend(PM_SUSPEND_MEM);
516                         break;
517
518                 case APM_CRITICAL_SUSPEND:
519                         atomic_inc(&userspace_notification_inhibit);
520                         pm_suspend(PM_SUSPEND_MEM);
521                         atomic_dec(&userspace_notification_inhibit);
522                         break;
523                 }
524         } while (1);
525
526         return 0;
527 }
528
529 static int apm_suspend_notifier(struct notifier_block *nb,
530                                 unsigned long event,
531                                 void *dummy)
532 {
533         struct apm_user *as;
534         int err;
535
536         /* short-cut emergency suspends */
537         if (atomic_read(&userspace_notification_inhibit))
538                 return NOTIFY_DONE;
539
540         switch (event) {
541         case PM_SUSPEND_PREPARE:
542                 /*
543                  * Queue an event to all "writer" users that we want
544                  * to suspend and need their ack.
545                  */
546                 mutex_lock(&state_lock);
547                 down_read(&user_list_lock);
548
549                 list_for_each_entry(as, &apm_user_list, list) {
550                         if (as->suspend_state != SUSPEND_WAIT && as->reader &&
551                             as->writer && as->suser) {
552                                 as->suspend_state = SUSPEND_PENDING;
553                                 atomic_inc(&suspend_acks_pending);
554                                 queue_add_event(&as->queue, APM_USER_SUSPEND);
555                         }
556                 }
557
558                 up_read(&user_list_lock);
559                 mutex_unlock(&state_lock);
560                 wake_up_interruptible(&apm_waitqueue);
561
562                 /*
563                  * Wait for the the suspend_acks_pending variable to drop to
564                  * zero, meaning everybody acked the suspend event (or the
565                  * process was killed.)
566                  *
567                  * If the app won't answer within a short while we assume it
568                  * locked up and ignore it.
569                  */
570                 err = wait_event_interruptible_timeout(
571                         apm_suspend_waitqueue,
572                         atomic_read(&suspend_acks_pending) == 0,
573                         5*HZ);
574
575                 /* timed out */
576                 if (err == 0) {
577                         /*
578                          * Move anybody who timed out to "ack timeout" state.
579                          *
580                          * We could time out and the userspace does the ACK
581                          * right after we time out but before we enter the
582                          * locked section here, but that's fine.
583                          */
584                         mutex_lock(&state_lock);
585                         down_read(&user_list_lock);
586                         list_for_each_entry(as, &apm_user_list, list) {
587                                 if (as->suspend_state == SUSPEND_PENDING ||
588                                     as->suspend_state == SUSPEND_READ) {
589                                         as->suspend_state = SUSPEND_ACKTO;
590                                         atomic_dec(&suspend_acks_pending);
591                                 }
592                         }
593                         up_read(&user_list_lock);
594                         mutex_unlock(&state_lock);
595                 }
596
597                 /* let suspend proceed */
598                 if (err >= 0)
599                         return NOTIFY_OK;
600
601                 /* interrupted by signal */
602                 return notifier_from_errno(err);
603
604         case PM_POST_SUSPEND:
605                 /*
606                  * Anyone on the APM queues will think we're still suspended.
607                  * Send a message so everyone knows we're now awake again.
608                  */
609                 queue_event(APM_NORMAL_RESUME);
610
611                 /*
612                  * Finally, wake up anyone who is sleeping on the suspend.
613                  */
614                 mutex_lock(&state_lock);
615                 down_read(&user_list_lock);
616                 list_for_each_entry(as, &apm_user_list, list) {
617                         if (as->suspend_state == SUSPEND_ACKED) {
618                                 /*
619                                  * TODO: maybe grab error code, needs core
620                                  * changes to push the error to the notifier
621                                  * chain (could use the second parameter if
622                                  * implemented)
623                                  */
624                                 as->suspend_result = 0;
625                                 as->suspend_state = SUSPEND_DONE;
626                         }
627                 }
628                 up_read(&user_list_lock);
629                 mutex_unlock(&state_lock);
630
631                 wake_up(&apm_suspend_waitqueue);
632                 return NOTIFY_OK;
633
634         default:
635                 return NOTIFY_DONE;
636         }
637 }
638
639 static struct notifier_block apm_notif_block = {
640         .notifier_call = apm_suspend_notifier,
641 };
642
643 static int __init apm_init(void)
644 {
645         int ret;
646
647         if (apm_disabled) {
648                 printk(KERN_NOTICE "apm: disabled on user request.\n");
649                 return -ENODEV;
650         }
651
652         kapmd_tsk = kthread_create(kapmd, NULL, "kapmd");
653         if (IS_ERR(kapmd_tsk)) {
654                 ret = PTR_ERR(kapmd_tsk);
655                 kapmd_tsk = NULL;
656                 goto out;
657         }
658         wake_up_process(kapmd_tsk);
659
660 #ifdef CONFIG_PROC_FS
661         proc_create("apm", 0, NULL, &apm_proc_fops);
662 #endif
663
664         ret = misc_register(&apm_device);
665         if (ret)
666                 goto out_stop;
667
668         ret = register_pm_notifier(&apm_notif_block);
669         if (ret)
670                 goto out_unregister;
671
672         return 0;
673
674  out_unregister:
675         misc_deregister(&apm_device);
676  out_stop:
677         remove_proc_entry("apm", NULL);
678         kthread_stop(kapmd_tsk);
679  out:
680         return ret;
681 }
682
683 static void __exit apm_exit(void)
684 {
685         unregister_pm_notifier(&apm_notif_block);
686         misc_deregister(&apm_device);
687         remove_proc_entry("apm", NULL);
688
689         kthread_stop(kapmd_tsk);
690 }
691
692 module_init(apm_init);
693 module_exit(apm_exit);
694
695 MODULE_AUTHOR("Stephen Rothwell");
696 MODULE_DESCRIPTION("Advanced Power Management");
697 MODULE_LICENSE("GPL");
698
699 #ifndef MODULE
700 static int __init apm_setup(char *str)
701 {
702         while ((str != NULL) && (*str != '\0')) {
703                 if (strncmp(str, "off", 3) == 0)
704                         apm_disabled = 1;
705                 if (strncmp(str, "on", 2) == 0)
706                         apm_disabled = 0;
707                 str = strchr(str, ',');
708                 if (str != NULL)
709                         str += strspn(str, ", \t");
710         }
711         return 1;
712 }
713
714 __setup("apm=", apm_setup);
715 #endif
716
717 /**
718  * apm_queue_event - queue an APM event for kapmd
719  * @event: APM event
720  *
721  * Queue an APM event for kapmd to process and ultimately take the
722  * appropriate action.  Only a subset of events are handled:
723  *   %APM_LOW_BATTERY
724  *   %APM_POWER_STATUS_CHANGE
725  *   %APM_USER_SUSPEND
726  *   %APM_SYS_SUSPEND
727  *   %APM_CRITICAL_SUSPEND
728  */
729 void apm_queue_event(apm_event_t event)
730 {
731         unsigned long flags;
732
733         spin_lock_irqsave(&kapmd_queue_lock, flags);
734         queue_add_event(&kapmd_queue, event);
735         spin_unlock_irqrestore(&kapmd_queue_lock, flags);
736
737         wake_up_interruptible(&kapmd_wait);
738 }
739 EXPORT_SYMBOL(apm_queue_event);