ACPI / tables: Move table override mechanisms to tables.c
[deliverable/linux.git] / drivers / acpi / osl.c
1 /*
2 * acpi_osl.c - OS-dependent functions ($Revision: 83 $)
3 *
4 * Copyright (C) 2000 Andrew Henroid
5 * Copyright (C) 2001, 2002 Andy Grover <andrew.grover@intel.com>
6 * Copyright (C) 2001, 2002 Paul Diefenbaugh <paul.s.diefenbaugh@intel.com>
7 * Copyright (c) 2008 Intel Corporation
8 * Author: Matthew Wilcox <willy@linux.intel.com>
9 *
10 * ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
23 *
24 */
25
26 #include <linux/module.h>
27 #include <linux/kernel.h>
28 #include <linux/slab.h>
29 #include <linux/mm.h>
30 #include <linux/highmem.h>
31 #include <linux/pci.h>
32 #include <linux/interrupt.h>
33 #include <linux/kmod.h>
34 #include <linux/delay.h>
35 #include <linux/workqueue.h>
36 #include <linux/nmi.h>
37 #include <linux/acpi.h>
38 #include <linux/efi.h>
39 #include <linux/ioport.h>
40 #include <linux/list.h>
41 #include <linux/jiffies.h>
42 #include <linux/semaphore.h>
43
44 #include <asm/io.h>
45 #include <asm/uaccess.h>
46 #include <linux/io-64-nonatomic-lo-hi.h>
47
48 #include "internal.h"
49
50 #define _COMPONENT ACPI_OS_SERVICES
51 ACPI_MODULE_NAME("osl");
52
53 struct acpi_os_dpc {
54 acpi_osd_exec_callback function;
55 void *context;
56 struct work_struct work;
57 };
58
59 #ifdef CONFIG_ACPI_CUSTOM_DSDT
60 #include CONFIG_ACPI_CUSTOM_DSDT_FILE
61 #endif
62
63 #ifdef ENABLE_DEBUGGER
64 #include <linux/kdb.h>
65
66 /* stuff for debugger support */
67 int acpi_in_debugger;
68 EXPORT_SYMBOL(acpi_in_debugger);
69 #endif /*ENABLE_DEBUGGER */
70
71 static int (*__acpi_os_prepare_sleep)(u8 sleep_state, u32 pm1a_ctrl,
72 u32 pm1b_ctrl);
73 static int (*__acpi_os_prepare_extended_sleep)(u8 sleep_state, u32 val_a,
74 u32 val_b);
75
76 static acpi_osd_handler acpi_irq_handler;
77 static void *acpi_irq_context;
78 static struct workqueue_struct *kacpid_wq;
79 static struct workqueue_struct *kacpi_notify_wq;
80 static struct workqueue_struct *kacpi_hotplug_wq;
81 static bool acpi_os_initialized;
82 unsigned int acpi_sci_irq = INVALID_ACPI_IRQ;
83
84 /*
85 * This list of permanent mappings is for memory that may be accessed from
86 * interrupt context, where we can't do the ioremap().
87 */
88 struct acpi_ioremap {
89 struct list_head list;
90 void __iomem *virt;
91 acpi_physical_address phys;
92 acpi_size size;
93 unsigned long refcount;
94 };
95
96 static LIST_HEAD(acpi_ioremaps);
97 static DEFINE_MUTEX(acpi_ioremap_lock);
98
99 static void __init acpi_osi_setup_late(void);
100
101 /*
102 * The story of _OSI(Linux)
103 *
104 * From pre-history through Linux-2.6.22,
105 * Linux responded TRUE upon a BIOS OSI(Linux) query.
106 *
107 * Unfortunately, reference BIOS writers got wind of this
108 * and put OSI(Linux) in their example code, quickly exposing
109 * this string as ill-conceived and opening the door to
110 * an un-bounded number of BIOS incompatibilities.
111 *
112 * For example, OSI(Linux) was used on resume to re-POST a
113 * video card on one system, because Linux at that time
114 * could not do a speedy restore in its native driver.
115 * But then upon gaining quick native restore capability,
116 * Linux has no way to tell the BIOS to skip the time-consuming
117 * POST -- putting Linux at a permanent performance disadvantage.
118 * On another system, the BIOS writer used OSI(Linux)
119 * to infer native OS support for IPMI! On other systems,
120 * OSI(Linux) simply got in the way of Linux claiming to
121 * be compatible with other operating systems, exposing
122 * BIOS issues such as skipped device initialization.
123 *
124 * So "Linux" turned out to be a really poor chose of
125 * OSI string, and from Linux-2.6.23 onward we respond FALSE.
126 *
127 * BIOS writers should NOT query _OSI(Linux) on future systems.
128 * Linux will complain on the console when it sees it, and return FALSE.
129 * To get Linux to return TRUE for your system will require
130 * a kernel source update to add a DMI entry,
131 * or boot with "acpi_osi=Linux"
132 */
133
134 static struct osi_linux {
135 unsigned int enable:1;
136 unsigned int dmi:1;
137 unsigned int cmdline:1;
138 unsigned int default_disabling:1;
139 } osi_linux = {0, 0, 0, 0};
140
141 static u32 acpi_osi_handler(acpi_string interface, u32 supported)
142 {
143 if (!strcmp("Linux", interface)) {
144
145 printk_once(KERN_NOTICE FW_BUG PREFIX
146 "BIOS _OSI(Linux) query %s%s\n",
147 osi_linux.enable ? "honored" : "ignored",
148 osi_linux.cmdline ? " via cmdline" :
149 osi_linux.dmi ? " via DMI" : "");
150 }
151
152 if (!strcmp("Darwin", interface)) {
153 /*
154 * Apple firmware will behave poorly if it receives positive
155 * answers to "Darwin" and any other OS. Respond positively
156 * to Darwin and then disable all other vendor strings.
157 */
158 acpi_update_interfaces(ACPI_DISABLE_ALL_VENDOR_STRINGS);
159 supported = ACPI_UINT32_MAX;
160 }
161
162 return supported;
163 }
164
165 static void __init acpi_request_region (struct acpi_generic_address *gas,
166 unsigned int length, char *desc)
167 {
168 u64 addr;
169
170 /* Handle possible alignment issues */
171 memcpy(&addr, &gas->address, sizeof(addr));
172 if (!addr || !length)
173 return;
174
175 /* Resources are never freed */
176 if (gas->space_id == ACPI_ADR_SPACE_SYSTEM_IO)
177 request_region(addr, length, desc);
178 else if (gas->space_id == ACPI_ADR_SPACE_SYSTEM_MEMORY)
179 request_mem_region(addr, length, desc);
180 }
181
182 static int __init acpi_reserve_resources(void)
183 {
184 acpi_request_region(&acpi_gbl_FADT.xpm1a_event_block, acpi_gbl_FADT.pm1_event_length,
185 "ACPI PM1a_EVT_BLK");
186
187 acpi_request_region(&acpi_gbl_FADT.xpm1b_event_block, acpi_gbl_FADT.pm1_event_length,
188 "ACPI PM1b_EVT_BLK");
189
190 acpi_request_region(&acpi_gbl_FADT.xpm1a_control_block, acpi_gbl_FADT.pm1_control_length,
191 "ACPI PM1a_CNT_BLK");
192
193 acpi_request_region(&acpi_gbl_FADT.xpm1b_control_block, acpi_gbl_FADT.pm1_control_length,
194 "ACPI PM1b_CNT_BLK");
195
196 if (acpi_gbl_FADT.pm_timer_length == 4)
197 acpi_request_region(&acpi_gbl_FADT.xpm_timer_block, 4, "ACPI PM_TMR");
198
199 acpi_request_region(&acpi_gbl_FADT.xpm2_control_block, acpi_gbl_FADT.pm2_control_length,
200 "ACPI PM2_CNT_BLK");
201
202 /* Length of GPE blocks must be a non-negative multiple of 2 */
203
204 if (!(acpi_gbl_FADT.gpe0_block_length & 0x1))
205 acpi_request_region(&acpi_gbl_FADT.xgpe0_block,
206 acpi_gbl_FADT.gpe0_block_length, "ACPI GPE0_BLK");
207
208 if (!(acpi_gbl_FADT.gpe1_block_length & 0x1))
209 acpi_request_region(&acpi_gbl_FADT.xgpe1_block,
210 acpi_gbl_FADT.gpe1_block_length, "ACPI GPE1_BLK");
211
212 return 0;
213 }
214 fs_initcall_sync(acpi_reserve_resources);
215
216 void acpi_os_printf(const char *fmt, ...)
217 {
218 va_list args;
219 va_start(args, fmt);
220 acpi_os_vprintf(fmt, args);
221 va_end(args);
222 }
223 EXPORT_SYMBOL(acpi_os_printf);
224
225 void acpi_os_vprintf(const char *fmt, va_list args)
226 {
227 static char buffer[512];
228
229 vsprintf(buffer, fmt, args);
230
231 #ifdef ENABLE_DEBUGGER
232 if (acpi_in_debugger) {
233 kdb_printf("%s", buffer);
234 } else {
235 printk(KERN_CONT "%s", buffer);
236 }
237 #else
238 if (acpi_debugger_write_log(buffer) < 0)
239 printk(KERN_CONT "%s", buffer);
240 #endif
241 }
242
243 #ifdef CONFIG_KEXEC
244 static unsigned long acpi_rsdp;
245 static int __init setup_acpi_rsdp(char *arg)
246 {
247 if (kstrtoul(arg, 16, &acpi_rsdp))
248 return -EINVAL;
249 return 0;
250 }
251 early_param("acpi_rsdp", setup_acpi_rsdp);
252 #endif
253
254 acpi_physical_address __init acpi_os_get_root_pointer(void)
255 {
256 #ifdef CONFIG_KEXEC
257 if (acpi_rsdp)
258 return acpi_rsdp;
259 #endif
260
261 if (efi_enabled(EFI_CONFIG_TABLES)) {
262 if (efi.acpi20 != EFI_INVALID_TABLE_ADDR)
263 return efi.acpi20;
264 else if (efi.acpi != EFI_INVALID_TABLE_ADDR)
265 return efi.acpi;
266 else {
267 printk(KERN_ERR PREFIX
268 "System description tables not found\n");
269 return 0;
270 }
271 } else if (IS_ENABLED(CONFIG_ACPI_LEGACY_TABLES_LOOKUP)) {
272 acpi_physical_address pa = 0;
273
274 acpi_find_root_pointer(&pa);
275 return pa;
276 }
277
278 return 0;
279 }
280
281 /* Must be called with 'acpi_ioremap_lock' or RCU read lock held. */
282 static struct acpi_ioremap *
283 acpi_map_lookup(acpi_physical_address phys, acpi_size size)
284 {
285 struct acpi_ioremap *map;
286
287 list_for_each_entry_rcu(map, &acpi_ioremaps, list)
288 if (map->phys <= phys &&
289 phys + size <= map->phys + map->size)
290 return map;
291
292 return NULL;
293 }
294
295 /* Must be called with 'acpi_ioremap_lock' or RCU read lock held. */
296 static void __iomem *
297 acpi_map_vaddr_lookup(acpi_physical_address phys, unsigned int size)
298 {
299 struct acpi_ioremap *map;
300
301 map = acpi_map_lookup(phys, size);
302 if (map)
303 return map->virt + (phys - map->phys);
304
305 return NULL;
306 }
307
308 void __iomem *acpi_os_get_iomem(acpi_physical_address phys, unsigned int size)
309 {
310 struct acpi_ioremap *map;
311 void __iomem *virt = NULL;
312
313 mutex_lock(&acpi_ioremap_lock);
314 map = acpi_map_lookup(phys, size);
315 if (map) {
316 virt = map->virt + (phys - map->phys);
317 map->refcount++;
318 }
319 mutex_unlock(&acpi_ioremap_lock);
320 return virt;
321 }
322 EXPORT_SYMBOL_GPL(acpi_os_get_iomem);
323
324 /* Must be called with 'acpi_ioremap_lock' or RCU read lock held. */
325 static struct acpi_ioremap *
326 acpi_map_lookup_virt(void __iomem *virt, acpi_size size)
327 {
328 struct acpi_ioremap *map;
329
330 list_for_each_entry_rcu(map, &acpi_ioremaps, list)
331 if (map->virt <= virt &&
332 virt + size <= map->virt + map->size)
333 return map;
334
335 return NULL;
336 }
337
338 #if defined(CONFIG_IA64) || defined(CONFIG_ARM64)
339 /* ioremap will take care of cache attributes */
340 #define should_use_kmap(pfn) 0
341 #else
342 #define should_use_kmap(pfn) page_is_ram(pfn)
343 #endif
344
345 static void __iomem *acpi_map(acpi_physical_address pg_off, unsigned long pg_sz)
346 {
347 unsigned long pfn;
348
349 pfn = pg_off >> PAGE_SHIFT;
350 if (should_use_kmap(pfn)) {
351 if (pg_sz > PAGE_SIZE)
352 return NULL;
353 return (void __iomem __force *)kmap(pfn_to_page(pfn));
354 } else
355 return acpi_os_ioremap(pg_off, pg_sz);
356 }
357
358 static void acpi_unmap(acpi_physical_address pg_off, void __iomem *vaddr)
359 {
360 unsigned long pfn;
361
362 pfn = pg_off >> PAGE_SHIFT;
363 if (should_use_kmap(pfn))
364 kunmap(pfn_to_page(pfn));
365 else
366 iounmap(vaddr);
367 }
368
369 /**
370 * acpi_os_map_iomem - Get a virtual address for a given physical address range.
371 * @phys: Start of the physical address range to map.
372 * @size: Size of the physical address range to map.
373 *
374 * Look up the given physical address range in the list of existing ACPI memory
375 * mappings. If found, get a reference to it and return a pointer to it (its
376 * virtual address). If not found, map it, add it to that list and return a
377 * pointer to it.
378 *
379 * During early init (when acpi_gbl_permanent_mmap has not been set yet) this
380 * routine simply calls __acpi_map_table() to get the job done.
381 */
382 void __iomem *__init_refok
383 acpi_os_map_iomem(acpi_physical_address phys, acpi_size size)
384 {
385 struct acpi_ioremap *map;
386 void __iomem *virt;
387 acpi_physical_address pg_off;
388 acpi_size pg_sz;
389
390 if (phys > ULONG_MAX) {
391 printk(KERN_ERR PREFIX "Cannot map memory that high\n");
392 return NULL;
393 }
394
395 if (!acpi_gbl_permanent_mmap)
396 return __acpi_map_table((unsigned long)phys, size);
397
398 mutex_lock(&acpi_ioremap_lock);
399 /* Check if there's a suitable mapping already. */
400 map = acpi_map_lookup(phys, size);
401 if (map) {
402 map->refcount++;
403 goto out;
404 }
405
406 map = kzalloc(sizeof(*map), GFP_KERNEL);
407 if (!map) {
408 mutex_unlock(&acpi_ioremap_lock);
409 return NULL;
410 }
411
412 pg_off = round_down(phys, PAGE_SIZE);
413 pg_sz = round_up(phys + size, PAGE_SIZE) - pg_off;
414 virt = acpi_map(pg_off, pg_sz);
415 if (!virt) {
416 mutex_unlock(&acpi_ioremap_lock);
417 kfree(map);
418 return NULL;
419 }
420
421 INIT_LIST_HEAD(&map->list);
422 map->virt = virt;
423 map->phys = pg_off;
424 map->size = pg_sz;
425 map->refcount = 1;
426
427 list_add_tail_rcu(&map->list, &acpi_ioremaps);
428
429 out:
430 mutex_unlock(&acpi_ioremap_lock);
431 return map->virt + (phys - map->phys);
432 }
433 EXPORT_SYMBOL_GPL(acpi_os_map_iomem);
434
435 void *__init_refok
436 acpi_os_map_memory(acpi_physical_address phys, acpi_size size)
437 {
438 return (void *)acpi_os_map_iomem(phys, size);
439 }
440 EXPORT_SYMBOL_GPL(acpi_os_map_memory);
441
442 static void acpi_os_drop_map_ref(struct acpi_ioremap *map)
443 {
444 if (!--map->refcount)
445 list_del_rcu(&map->list);
446 }
447
448 static void acpi_os_map_cleanup(struct acpi_ioremap *map)
449 {
450 if (!map->refcount) {
451 synchronize_rcu_expedited();
452 acpi_unmap(map->phys, map->virt);
453 kfree(map);
454 }
455 }
456
457 /**
458 * acpi_os_unmap_iomem - Drop a memory mapping reference.
459 * @virt: Start of the address range to drop a reference to.
460 * @size: Size of the address range to drop a reference to.
461 *
462 * Look up the given virtual address range in the list of existing ACPI memory
463 * mappings, drop a reference to it and unmap it if there are no more active
464 * references to it.
465 *
466 * During early init (when acpi_gbl_permanent_mmap has not been set yet) this
467 * routine simply calls __acpi_unmap_table() to get the job done. Since
468 * __acpi_unmap_table() is an __init function, the __ref annotation is needed
469 * here.
470 */
471 void __ref acpi_os_unmap_iomem(void __iomem *virt, acpi_size size)
472 {
473 struct acpi_ioremap *map;
474
475 if (!acpi_gbl_permanent_mmap) {
476 __acpi_unmap_table(virt, size);
477 return;
478 }
479
480 mutex_lock(&acpi_ioremap_lock);
481 map = acpi_map_lookup_virt(virt, size);
482 if (!map) {
483 mutex_unlock(&acpi_ioremap_lock);
484 WARN(true, PREFIX "%s: bad address %p\n", __func__, virt);
485 return;
486 }
487 acpi_os_drop_map_ref(map);
488 mutex_unlock(&acpi_ioremap_lock);
489
490 acpi_os_map_cleanup(map);
491 }
492 EXPORT_SYMBOL_GPL(acpi_os_unmap_iomem);
493
494 void __ref acpi_os_unmap_memory(void *virt, acpi_size size)
495 {
496 return acpi_os_unmap_iomem((void __iomem *)virt, size);
497 }
498 EXPORT_SYMBOL_GPL(acpi_os_unmap_memory);
499
500 void __init early_acpi_os_unmap_memory(void __iomem *virt, acpi_size size)
501 {
502 if (!acpi_gbl_permanent_mmap)
503 __acpi_unmap_table(virt, size);
504 }
505
506 int acpi_os_map_generic_address(struct acpi_generic_address *gas)
507 {
508 u64 addr;
509 void __iomem *virt;
510
511 if (gas->space_id != ACPI_ADR_SPACE_SYSTEM_MEMORY)
512 return 0;
513
514 /* Handle possible alignment issues */
515 memcpy(&addr, &gas->address, sizeof(addr));
516 if (!addr || !gas->bit_width)
517 return -EINVAL;
518
519 virt = acpi_os_map_iomem(addr, gas->bit_width / 8);
520 if (!virt)
521 return -EIO;
522
523 return 0;
524 }
525 EXPORT_SYMBOL(acpi_os_map_generic_address);
526
527 void acpi_os_unmap_generic_address(struct acpi_generic_address *gas)
528 {
529 u64 addr;
530 struct acpi_ioremap *map;
531
532 if (gas->space_id != ACPI_ADR_SPACE_SYSTEM_MEMORY)
533 return;
534
535 /* Handle possible alignment issues */
536 memcpy(&addr, &gas->address, sizeof(addr));
537 if (!addr || !gas->bit_width)
538 return;
539
540 mutex_lock(&acpi_ioremap_lock);
541 map = acpi_map_lookup(addr, gas->bit_width / 8);
542 if (!map) {
543 mutex_unlock(&acpi_ioremap_lock);
544 return;
545 }
546 acpi_os_drop_map_ref(map);
547 mutex_unlock(&acpi_ioremap_lock);
548
549 acpi_os_map_cleanup(map);
550 }
551 EXPORT_SYMBOL(acpi_os_unmap_generic_address);
552
553 #ifdef ACPI_FUTURE_USAGE
554 acpi_status
555 acpi_os_get_physical_address(void *virt, acpi_physical_address * phys)
556 {
557 if (!phys || !virt)
558 return AE_BAD_PARAMETER;
559
560 *phys = virt_to_phys(virt);
561
562 return AE_OK;
563 }
564 #endif
565
566 #ifdef CONFIG_ACPI_REV_OVERRIDE_POSSIBLE
567 static bool acpi_rev_override;
568
569 int __init acpi_rev_override_setup(char *str)
570 {
571 acpi_rev_override = true;
572 return 1;
573 }
574 __setup("acpi_rev_override", acpi_rev_override_setup);
575 #else
576 #define acpi_rev_override false
577 #endif
578
579 #define ACPI_MAX_OVERRIDE_LEN 100
580
581 static char acpi_os_name[ACPI_MAX_OVERRIDE_LEN];
582
583 acpi_status
584 acpi_os_predefined_override(const struct acpi_predefined_names *init_val,
585 char **new_val)
586 {
587 if (!init_val || !new_val)
588 return AE_BAD_PARAMETER;
589
590 *new_val = NULL;
591 if (!memcmp(init_val->name, "_OS_", 4) && strlen(acpi_os_name)) {
592 printk(KERN_INFO PREFIX "Overriding _OS definition to '%s'\n",
593 acpi_os_name);
594 *new_val = acpi_os_name;
595 }
596
597 if (!memcmp(init_val->name, "_REV", 4) && acpi_rev_override) {
598 printk(KERN_INFO PREFIX "Overriding _REV return value to 5\n");
599 *new_val = (char *)5;
600 }
601
602 return AE_OK;
603 }
604
605 static irqreturn_t acpi_irq(int irq, void *dev_id)
606 {
607 u32 handled;
608
609 handled = (*acpi_irq_handler) (acpi_irq_context);
610
611 if (handled) {
612 acpi_irq_handled++;
613 return IRQ_HANDLED;
614 } else {
615 acpi_irq_not_handled++;
616 return IRQ_NONE;
617 }
618 }
619
620 acpi_status
621 acpi_os_install_interrupt_handler(u32 gsi, acpi_osd_handler handler,
622 void *context)
623 {
624 unsigned int irq;
625
626 acpi_irq_stats_init();
627
628 /*
629 * ACPI interrupts different from the SCI in our copy of the FADT are
630 * not supported.
631 */
632 if (gsi != acpi_gbl_FADT.sci_interrupt)
633 return AE_BAD_PARAMETER;
634
635 if (acpi_irq_handler)
636 return AE_ALREADY_ACQUIRED;
637
638 if (acpi_gsi_to_irq(gsi, &irq) < 0) {
639 printk(KERN_ERR PREFIX "SCI (ACPI GSI %d) not registered\n",
640 gsi);
641 return AE_OK;
642 }
643
644 acpi_irq_handler = handler;
645 acpi_irq_context = context;
646 if (request_irq(irq, acpi_irq, IRQF_SHARED, "acpi", acpi_irq)) {
647 printk(KERN_ERR PREFIX "SCI (IRQ%d) allocation failed\n", irq);
648 acpi_irq_handler = NULL;
649 return AE_NOT_ACQUIRED;
650 }
651 acpi_sci_irq = irq;
652
653 return AE_OK;
654 }
655
656 acpi_status acpi_os_remove_interrupt_handler(u32 gsi, acpi_osd_handler handler)
657 {
658 if (gsi != acpi_gbl_FADT.sci_interrupt || !acpi_sci_irq_valid())
659 return AE_BAD_PARAMETER;
660
661 free_irq(acpi_sci_irq, acpi_irq);
662 acpi_irq_handler = NULL;
663 acpi_sci_irq = INVALID_ACPI_IRQ;
664
665 return AE_OK;
666 }
667
668 /*
669 * Running in interpreter thread context, safe to sleep
670 */
671
672 void acpi_os_sleep(u64 ms)
673 {
674 msleep(ms);
675 }
676
677 void acpi_os_stall(u32 us)
678 {
679 while (us) {
680 u32 delay = 1000;
681
682 if (delay > us)
683 delay = us;
684 udelay(delay);
685 touch_nmi_watchdog();
686 us -= delay;
687 }
688 }
689
690 /*
691 * Support ACPI 3.0 AML Timer operand
692 * Returns 64-bit free-running, monotonically increasing timer
693 * with 100ns granularity
694 */
695 u64 acpi_os_get_timer(void)
696 {
697 u64 time_ns = ktime_to_ns(ktime_get());
698 do_div(time_ns, 100);
699 return time_ns;
700 }
701
702 acpi_status acpi_os_read_port(acpi_io_address port, u32 * value, u32 width)
703 {
704 u32 dummy;
705
706 if (!value)
707 value = &dummy;
708
709 *value = 0;
710 if (width <= 8) {
711 *(u8 *) value = inb(port);
712 } else if (width <= 16) {
713 *(u16 *) value = inw(port);
714 } else if (width <= 32) {
715 *(u32 *) value = inl(port);
716 } else {
717 BUG();
718 }
719
720 return AE_OK;
721 }
722
723 EXPORT_SYMBOL(acpi_os_read_port);
724
725 acpi_status acpi_os_write_port(acpi_io_address port, u32 value, u32 width)
726 {
727 if (width <= 8) {
728 outb(value, port);
729 } else if (width <= 16) {
730 outw(value, port);
731 } else if (width <= 32) {
732 outl(value, port);
733 } else {
734 BUG();
735 }
736
737 return AE_OK;
738 }
739
740 EXPORT_SYMBOL(acpi_os_write_port);
741
742 acpi_status
743 acpi_os_read_memory(acpi_physical_address phys_addr, u64 *value, u32 width)
744 {
745 void __iomem *virt_addr;
746 unsigned int size = width / 8;
747 bool unmap = false;
748 u64 dummy;
749
750 rcu_read_lock();
751 virt_addr = acpi_map_vaddr_lookup(phys_addr, size);
752 if (!virt_addr) {
753 rcu_read_unlock();
754 virt_addr = acpi_os_ioremap(phys_addr, size);
755 if (!virt_addr)
756 return AE_BAD_ADDRESS;
757 unmap = true;
758 }
759
760 if (!value)
761 value = &dummy;
762
763 switch (width) {
764 case 8:
765 *(u8 *) value = readb(virt_addr);
766 break;
767 case 16:
768 *(u16 *) value = readw(virt_addr);
769 break;
770 case 32:
771 *(u32 *) value = readl(virt_addr);
772 break;
773 case 64:
774 *(u64 *) value = readq(virt_addr);
775 break;
776 default:
777 BUG();
778 }
779
780 if (unmap)
781 iounmap(virt_addr);
782 else
783 rcu_read_unlock();
784
785 return AE_OK;
786 }
787
788 acpi_status
789 acpi_os_write_memory(acpi_physical_address phys_addr, u64 value, u32 width)
790 {
791 void __iomem *virt_addr;
792 unsigned int size = width / 8;
793 bool unmap = false;
794
795 rcu_read_lock();
796 virt_addr = acpi_map_vaddr_lookup(phys_addr, size);
797 if (!virt_addr) {
798 rcu_read_unlock();
799 virt_addr = acpi_os_ioremap(phys_addr, size);
800 if (!virt_addr)
801 return AE_BAD_ADDRESS;
802 unmap = true;
803 }
804
805 switch (width) {
806 case 8:
807 writeb(value, virt_addr);
808 break;
809 case 16:
810 writew(value, virt_addr);
811 break;
812 case 32:
813 writel(value, virt_addr);
814 break;
815 case 64:
816 writeq(value, virt_addr);
817 break;
818 default:
819 BUG();
820 }
821
822 if (unmap)
823 iounmap(virt_addr);
824 else
825 rcu_read_unlock();
826
827 return AE_OK;
828 }
829
830 acpi_status
831 acpi_os_read_pci_configuration(struct acpi_pci_id * pci_id, u32 reg,
832 u64 *value, u32 width)
833 {
834 int result, size;
835 u32 value32;
836
837 if (!value)
838 return AE_BAD_PARAMETER;
839
840 switch (width) {
841 case 8:
842 size = 1;
843 break;
844 case 16:
845 size = 2;
846 break;
847 case 32:
848 size = 4;
849 break;
850 default:
851 return AE_ERROR;
852 }
853
854 result = raw_pci_read(pci_id->segment, pci_id->bus,
855 PCI_DEVFN(pci_id->device, pci_id->function),
856 reg, size, &value32);
857 *value = value32;
858
859 return (result ? AE_ERROR : AE_OK);
860 }
861
862 acpi_status
863 acpi_os_write_pci_configuration(struct acpi_pci_id * pci_id, u32 reg,
864 u64 value, u32 width)
865 {
866 int result, size;
867
868 switch (width) {
869 case 8:
870 size = 1;
871 break;
872 case 16:
873 size = 2;
874 break;
875 case 32:
876 size = 4;
877 break;
878 default:
879 return AE_ERROR;
880 }
881
882 result = raw_pci_write(pci_id->segment, pci_id->bus,
883 PCI_DEVFN(pci_id->device, pci_id->function),
884 reg, size, value);
885
886 return (result ? AE_ERROR : AE_OK);
887 }
888
889 static void acpi_os_execute_deferred(struct work_struct *work)
890 {
891 struct acpi_os_dpc *dpc = container_of(work, struct acpi_os_dpc, work);
892
893 dpc->function(dpc->context);
894 kfree(dpc);
895 }
896
897 #ifdef CONFIG_ACPI_DEBUGGER
898 static struct acpi_debugger acpi_debugger;
899 static bool acpi_debugger_initialized;
900
901 int acpi_register_debugger(struct module *owner,
902 const struct acpi_debugger_ops *ops)
903 {
904 int ret = 0;
905
906 mutex_lock(&acpi_debugger.lock);
907 if (acpi_debugger.ops) {
908 ret = -EBUSY;
909 goto err_lock;
910 }
911
912 acpi_debugger.owner = owner;
913 acpi_debugger.ops = ops;
914
915 err_lock:
916 mutex_unlock(&acpi_debugger.lock);
917 return ret;
918 }
919 EXPORT_SYMBOL(acpi_register_debugger);
920
921 void acpi_unregister_debugger(const struct acpi_debugger_ops *ops)
922 {
923 mutex_lock(&acpi_debugger.lock);
924 if (ops == acpi_debugger.ops) {
925 acpi_debugger.ops = NULL;
926 acpi_debugger.owner = NULL;
927 }
928 mutex_unlock(&acpi_debugger.lock);
929 }
930 EXPORT_SYMBOL(acpi_unregister_debugger);
931
932 int acpi_debugger_create_thread(acpi_osd_exec_callback function, void *context)
933 {
934 int ret;
935 int (*func)(acpi_osd_exec_callback, void *);
936 struct module *owner;
937
938 if (!acpi_debugger_initialized)
939 return -ENODEV;
940 mutex_lock(&acpi_debugger.lock);
941 if (!acpi_debugger.ops) {
942 ret = -ENODEV;
943 goto err_lock;
944 }
945 if (!try_module_get(acpi_debugger.owner)) {
946 ret = -ENODEV;
947 goto err_lock;
948 }
949 func = acpi_debugger.ops->create_thread;
950 owner = acpi_debugger.owner;
951 mutex_unlock(&acpi_debugger.lock);
952
953 ret = func(function, context);
954
955 mutex_lock(&acpi_debugger.lock);
956 module_put(owner);
957 err_lock:
958 mutex_unlock(&acpi_debugger.lock);
959 return ret;
960 }
961
962 ssize_t acpi_debugger_write_log(const char *msg)
963 {
964 ssize_t ret;
965 ssize_t (*func)(const char *);
966 struct module *owner;
967
968 if (!acpi_debugger_initialized)
969 return -ENODEV;
970 mutex_lock(&acpi_debugger.lock);
971 if (!acpi_debugger.ops) {
972 ret = -ENODEV;
973 goto err_lock;
974 }
975 if (!try_module_get(acpi_debugger.owner)) {
976 ret = -ENODEV;
977 goto err_lock;
978 }
979 func = acpi_debugger.ops->write_log;
980 owner = acpi_debugger.owner;
981 mutex_unlock(&acpi_debugger.lock);
982
983 ret = func(msg);
984
985 mutex_lock(&acpi_debugger.lock);
986 module_put(owner);
987 err_lock:
988 mutex_unlock(&acpi_debugger.lock);
989 return ret;
990 }
991
992 ssize_t acpi_debugger_read_cmd(char *buffer, size_t buffer_length)
993 {
994 ssize_t ret;
995 ssize_t (*func)(char *, size_t);
996 struct module *owner;
997
998 if (!acpi_debugger_initialized)
999 return -ENODEV;
1000 mutex_lock(&acpi_debugger.lock);
1001 if (!acpi_debugger.ops) {
1002 ret = -ENODEV;
1003 goto err_lock;
1004 }
1005 if (!try_module_get(acpi_debugger.owner)) {
1006 ret = -ENODEV;
1007 goto err_lock;
1008 }
1009 func = acpi_debugger.ops->read_cmd;
1010 owner = acpi_debugger.owner;
1011 mutex_unlock(&acpi_debugger.lock);
1012
1013 ret = func(buffer, buffer_length);
1014
1015 mutex_lock(&acpi_debugger.lock);
1016 module_put(owner);
1017 err_lock:
1018 mutex_unlock(&acpi_debugger.lock);
1019 return ret;
1020 }
1021
1022 int acpi_debugger_wait_command_ready(void)
1023 {
1024 int ret;
1025 int (*func)(bool, char *, size_t);
1026 struct module *owner;
1027
1028 if (!acpi_debugger_initialized)
1029 return -ENODEV;
1030 mutex_lock(&acpi_debugger.lock);
1031 if (!acpi_debugger.ops) {
1032 ret = -ENODEV;
1033 goto err_lock;
1034 }
1035 if (!try_module_get(acpi_debugger.owner)) {
1036 ret = -ENODEV;
1037 goto err_lock;
1038 }
1039 func = acpi_debugger.ops->wait_command_ready;
1040 owner = acpi_debugger.owner;
1041 mutex_unlock(&acpi_debugger.lock);
1042
1043 ret = func(acpi_gbl_method_executing,
1044 acpi_gbl_db_line_buf, ACPI_DB_LINE_BUFFER_SIZE);
1045
1046 mutex_lock(&acpi_debugger.lock);
1047 module_put(owner);
1048 err_lock:
1049 mutex_unlock(&acpi_debugger.lock);
1050 return ret;
1051 }
1052
1053 int acpi_debugger_notify_command_complete(void)
1054 {
1055 int ret;
1056 int (*func)(void);
1057 struct module *owner;
1058
1059 if (!acpi_debugger_initialized)
1060 return -ENODEV;
1061 mutex_lock(&acpi_debugger.lock);
1062 if (!acpi_debugger.ops) {
1063 ret = -ENODEV;
1064 goto err_lock;
1065 }
1066 if (!try_module_get(acpi_debugger.owner)) {
1067 ret = -ENODEV;
1068 goto err_lock;
1069 }
1070 func = acpi_debugger.ops->notify_command_complete;
1071 owner = acpi_debugger.owner;
1072 mutex_unlock(&acpi_debugger.lock);
1073
1074 ret = func();
1075
1076 mutex_lock(&acpi_debugger.lock);
1077 module_put(owner);
1078 err_lock:
1079 mutex_unlock(&acpi_debugger.lock);
1080 return ret;
1081 }
1082
1083 int __init acpi_debugger_init(void)
1084 {
1085 mutex_init(&acpi_debugger.lock);
1086 acpi_debugger_initialized = true;
1087 return 0;
1088 }
1089 #endif
1090
1091 /*******************************************************************************
1092 *
1093 * FUNCTION: acpi_os_execute
1094 *
1095 * PARAMETERS: Type - Type of the callback
1096 * Function - Function to be executed
1097 * Context - Function parameters
1098 *
1099 * RETURN: Status
1100 *
1101 * DESCRIPTION: Depending on type, either queues function for deferred execution or
1102 * immediately executes function on a separate thread.
1103 *
1104 ******************************************************************************/
1105
1106 acpi_status acpi_os_execute(acpi_execute_type type,
1107 acpi_osd_exec_callback function, void *context)
1108 {
1109 acpi_status status = AE_OK;
1110 struct acpi_os_dpc *dpc;
1111 struct workqueue_struct *queue;
1112 int ret;
1113 ACPI_DEBUG_PRINT((ACPI_DB_EXEC,
1114 "Scheduling function [%p(%p)] for deferred execution.\n",
1115 function, context));
1116
1117 if (type == OSL_DEBUGGER_MAIN_THREAD) {
1118 ret = acpi_debugger_create_thread(function, context);
1119 if (ret) {
1120 pr_err("Call to kthread_create() failed.\n");
1121 status = AE_ERROR;
1122 }
1123 goto out_thread;
1124 }
1125
1126 /*
1127 * Allocate/initialize DPC structure. Note that this memory will be
1128 * freed by the callee. The kernel handles the work_struct list in a
1129 * way that allows us to also free its memory inside the callee.
1130 * Because we may want to schedule several tasks with different
1131 * parameters we can't use the approach some kernel code uses of
1132 * having a static work_struct.
1133 */
1134
1135 dpc = kzalloc(sizeof(struct acpi_os_dpc), GFP_ATOMIC);
1136 if (!dpc)
1137 return AE_NO_MEMORY;
1138
1139 dpc->function = function;
1140 dpc->context = context;
1141
1142 /*
1143 * To prevent lockdep from complaining unnecessarily, make sure that
1144 * there is a different static lockdep key for each workqueue by using
1145 * INIT_WORK() for each of them separately.
1146 */
1147 if (type == OSL_NOTIFY_HANDLER) {
1148 queue = kacpi_notify_wq;
1149 INIT_WORK(&dpc->work, acpi_os_execute_deferred);
1150 } else if (type == OSL_GPE_HANDLER) {
1151 queue = kacpid_wq;
1152 INIT_WORK(&dpc->work, acpi_os_execute_deferred);
1153 } else {
1154 pr_err("Unsupported os_execute type %d.\n", type);
1155 status = AE_ERROR;
1156 }
1157
1158 if (ACPI_FAILURE(status))
1159 goto err_workqueue;
1160
1161 /*
1162 * On some machines, a software-initiated SMI causes corruption unless
1163 * the SMI runs on CPU 0. An SMI can be initiated by any AML, but
1164 * typically it's done in GPE-related methods that are run via
1165 * workqueues, so we can avoid the known corruption cases by always
1166 * queueing on CPU 0.
1167 */
1168 ret = queue_work_on(0, queue, &dpc->work);
1169 if (!ret) {
1170 printk(KERN_ERR PREFIX
1171 "Call to queue_work() failed.\n");
1172 status = AE_ERROR;
1173 }
1174 err_workqueue:
1175 if (ACPI_FAILURE(status))
1176 kfree(dpc);
1177 out_thread:
1178 return status;
1179 }
1180 EXPORT_SYMBOL(acpi_os_execute);
1181
1182 void acpi_os_wait_events_complete(void)
1183 {
1184 /*
1185 * Make sure the GPE handler or the fixed event handler is not used
1186 * on another CPU after removal.
1187 */
1188 if (acpi_sci_irq_valid())
1189 synchronize_hardirq(acpi_sci_irq);
1190 flush_workqueue(kacpid_wq);
1191 flush_workqueue(kacpi_notify_wq);
1192 }
1193
1194 struct acpi_hp_work {
1195 struct work_struct work;
1196 struct acpi_device *adev;
1197 u32 src;
1198 };
1199
1200 static void acpi_hotplug_work_fn(struct work_struct *work)
1201 {
1202 struct acpi_hp_work *hpw = container_of(work, struct acpi_hp_work, work);
1203
1204 acpi_os_wait_events_complete();
1205 acpi_device_hotplug(hpw->adev, hpw->src);
1206 kfree(hpw);
1207 }
1208
1209 acpi_status acpi_hotplug_schedule(struct acpi_device *adev, u32 src)
1210 {
1211 struct acpi_hp_work *hpw;
1212
1213 ACPI_DEBUG_PRINT((ACPI_DB_EXEC,
1214 "Scheduling hotplug event (%p, %u) for deferred execution.\n",
1215 adev, src));
1216
1217 hpw = kmalloc(sizeof(*hpw), GFP_KERNEL);
1218 if (!hpw)
1219 return AE_NO_MEMORY;
1220
1221 INIT_WORK(&hpw->work, acpi_hotplug_work_fn);
1222 hpw->adev = adev;
1223 hpw->src = src;
1224 /*
1225 * We can't run hotplug code in kacpid_wq/kacpid_notify_wq etc., because
1226 * the hotplug code may call driver .remove() functions, which may
1227 * invoke flush_scheduled_work()/acpi_os_wait_events_complete() to flush
1228 * these workqueues.
1229 */
1230 if (!queue_work(kacpi_hotplug_wq, &hpw->work)) {
1231 kfree(hpw);
1232 return AE_ERROR;
1233 }
1234 return AE_OK;
1235 }
1236
1237 bool acpi_queue_hotplug_work(struct work_struct *work)
1238 {
1239 return queue_work(kacpi_hotplug_wq, work);
1240 }
1241
1242 acpi_status
1243 acpi_os_create_semaphore(u32 max_units, u32 initial_units, acpi_handle * handle)
1244 {
1245 struct semaphore *sem = NULL;
1246
1247 sem = acpi_os_allocate_zeroed(sizeof(struct semaphore));
1248 if (!sem)
1249 return AE_NO_MEMORY;
1250
1251 sema_init(sem, initial_units);
1252
1253 *handle = (acpi_handle *) sem;
1254
1255 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX, "Creating semaphore[%p|%d].\n",
1256 *handle, initial_units));
1257
1258 return AE_OK;
1259 }
1260
1261 /*
1262 * TODO: A better way to delete semaphores? Linux doesn't have a
1263 * 'delete_semaphore()' function -- may result in an invalid
1264 * pointer dereference for non-synchronized consumers. Should
1265 * we at least check for blocked threads and signal/cancel them?
1266 */
1267
1268 acpi_status acpi_os_delete_semaphore(acpi_handle handle)
1269 {
1270 struct semaphore *sem = (struct semaphore *)handle;
1271
1272 if (!sem)
1273 return AE_BAD_PARAMETER;
1274
1275 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX, "Deleting semaphore[%p].\n", handle));
1276
1277 BUG_ON(!list_empty(&sem->wait_list));
1278 kfree(sem);
1279 sem = NULL;
1280
1281 return AE_OK;
1282 }
1283
1284 /*
1285 * TODO: Support for units > 1?
1286 */
1287 acpi_status acpi_os_wait_semaphore(acpi_handle handle, u32 units, u16 timeout)
1288 {
1289 acpi_status status = AE_OK;
1290 struct semaphore *sem = (struct semaphore *)handle;
1291 long jiffies;
1292 int ret = 0;
1293
1294 if (!acpi_os_initialized)
1295 return AE_OK;
1296
1297 if (!sem || (units < 1))
1298 return AE_BAD_PARAMETER;
1299
1300 if (units > 1)
1301 return AE_SUPPORT;
1302
1303 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX, "Waiting for semaphore[%p|%d|%d]\n",
1304 handle, units, timeout));
1305
1306 if (timeout == ACPI_WAIT_FOREVER)
1307 jiffies = MAX_SCHEDULE_TIMEOUT;
1308 else
1309 jiffies = msecs_to_jiffies(timeout);
1310
1311 ret = down_timeout(sem, jiffies);
1312 if (ret)
1313 status = AE_TIME;
1314
1315 if (ACPI_FAILURE(status)) {
1316 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX,
1317 "Failed to acquire semaphore[%p|%d|%d], %s",
1318 handle, units, timeout,
1319 acpi_format_exception(status)));
1320 } else {
1321 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX,
1322 "Acquired semaphore[%p|%d|%d]", handle,
1323 units, timeout));
1324 }
1325
1326 return status;
1327 }
1328
1329 /*
1330 * TODO: Support for units > 1?
1331 */
1332 acpi_status acpi_os_signal_semaphore(acpi_handle handle, u32 units)
1333 {
1334 struct semaphore *sem = (struct semaphore *)handle;
1335
1336 if (!acpi_os_initialized)
1337 return AE_OK;
1338
1339 if (!sem || (units < 1))
1340 return AE_BAD_PARAMETER;
1341
1342 if (units > 1)
1343 return AE_SUPPORT;
1344
1345 ACPI_DEBUG_PRINT((ACPI_DB_MUTEX, "Signaling semaphore[%p|%d]\n", handle,
1346 units));
1347
1348 up(sem);
1349
1350 return AE_OK;
1351 }
1352
1353 acpi_status acpi_os_get_line(char *buffer, u32 buffer_length, u32 *bytes_read)
1354 {
1355 #ifdef ENABLE_DEBUGGER
1356 if (acpi_in_debugger) {
1357 u32 chars;
1358
1359 kdb_read(buffer, buffer_length);
1360
1361 /* remove the CR kdb includes */
1362 chars = strlen(buffer) - 1;
1363 buffer[chars] = '\0';
1364 }
1365 #else
1366 int ret;
1367
1368 ret = acpi_debugger_read_cmd(buffer, buffer_length);
1369 if (ret < 0)
1370 return AE_ERROR;
1371 if (bytes_read)
1372 *bytes_read = ret;
1373 #endif
1374
1375 return AE_OK;
1376 }
1377 EXPORT_SYMBOL(acpi_os_get_line);
1378
1379 acpi_status acpi_os_wait_command_ready(void)
1380 {
1381 int ret;
1382
1383 ret = acpi_debugger_wait_command_ready();
1384 if (ret < 0)
1385 return AE_ERROR;
1386 return AE_OK;
1387 }
1388
1389 acpi_status acpi_os_notify_command_complete(void)
1390 {
1391 int ret;
1392
1393 ret = acpi_debugger_notify_command_complete();
1394 if (ret < 0)
1395 return AE_ERROR;
1396 return AE_OK;
1397 }
1398
1399 acpi_status acpi_os_signal(u32 function, void *info)
1400 {
1401 switch (function) {
1402 case ACPI_SIGNAL_FATAL:
1403 printk(KERN_ERR PREFIX "Fatal opcode executed\n");
1404 break;
1405 case ACPI_SIGNAL_BREAKPOINT:
1406 /*
1407 * AML Breakpoint
1408 * ACPI spec. says to treat it as a NOP unless
1409 * you are debugging. So if/when we integrate
1410 * AML debugger into the kernel debugger its
1411 * hook will go here. But until then it is
1412 * not useful to print anything on breakpoints.
1413 */
1414 break;
1415 default:
1416 break;
1417 }
1418
1419 return AE_OK;
1420 }
1421
1422 static int __init acpi_os_name_setup(char *str)
1423 {
1424 char *p = acpi_os_name;
1425 int count = ACPI_MAX_OVERRIDE_LEN - 1;
1426
1427 if (!str || !*str)
1428 return 0;
1429
1430 for (; count-- && *str; str++) {
1431 if (isalnum(*str) || *str == ' ' || *str == ':')
1432 *p++ = *str;
1433 else if (*str == '\'' || *str == '"')
1434 continue;
1435 else
1436 break;
1437 }
1438 *p = 0;
1439
1440 return 1;
1441
1442 }
1443
1444 __setup("acpi_os_name=", acpi_os_name_setup);
1445
1446 #define OSI_STRING_LENGTH_MAX 64 /* arbitrary */
1447 #define OSI_STRING_ENTRIES_MAX 16 /* arbitrary */
1448
1449 struct osi_setup_entry {
1450 char string[OSI_STRING_LENGTH_MAX];
1451 bool enable;
1452 };
1453
1454 static struct osi_setup_entry
1455 osi_setup_entries[OSI_STRING_ENTRIES_MAX] __initdata = {
1456 {"Module Device", true},
1457 {"Processor Device", true},
1458 {"3.0 _SCP Extensions", true},
1459 {"Processor Aggregator Device", true},
1460 };
1461
1462 void __init acpi_osi_setup(char *str)
1463 {
1464 struct osi_setup_entry *osi;
1465 bool enable = true;
1466 int i;
1467
1468 if (!acpi_gbl_create_osi_method)
1469 return;
1470
1471 if (str == NULL || *str == '\0') {
1472 printk(KERN_INFO PREFIX "_OSI method disabled\n");
1473 acpi_gbl_create_osi_method = FALSE;
1474 return;
1475 }
1476
1477 if (*str == '!') {
1478 str++;
1479 if (*str == '\0') {
1480 osi_linux.default_disabling = 1;
1481 return;
1482 } else if (*str == '*') {
1483 acpi_update_interfaces(ACPI_DISABLE_ALL_STRINGS);
1484 for (i = 0; i < OSI_STRING_ENTRIES_MAX; i++) {
1485 osi = &osi_setup_entries[i];
1486 osi->enable = false;
1487 }
1488 return;
1489 }
1490 enable = false;
1491 }
1492
1493 for (i = 0; i < OSI_STRING_ENTRIES_MAX; i++) {
1494 osi = &osi_setup_entries[i];
1495 if (!strcmp(osi->string, str)) {
1496 osi->enable = enable;
1497 break;
1498 } else if (osi->string[0] == '\0') {
1499 osi->enable = enable;
1500 strncpy(osi->string, str, OSI_STRING_LENGTH_MAX);
1501 break;
1502 }
1503 }
1504 }
1505
1506 static void __init set_osi_linux(unsigned int enable)
1507 {
1508 if (osi_linux.enable != enable)
1509 osi_linux.enable = enable;
1510
1511 if (osi_linux.enable)
1512 acpi_osi_setup("Linux");
1513 else
1514 acpi_osi_setup("!Linux");
1515
1516 return;
1517 }
1518
1519 static void __init acpi_cmdline_osi_linux(unsigned int enable)
1520 {
1521 osi_linux.cmdline = 1; /* cmdline set the default and override DMI */
1522 osi_linux.dmi = 0;
1523 set_osi_linux(enable);
1524
1525 return;
1526 }
1527
1528 void __init acpi_dmi_osi_linux(int enable, const struct dmi_system_id *d)
1529 {
1530 printk(KERN_NOTICE PREFIX "DMI detected: %s\n", d->ident);
1531
1532 if (enable == -1)
1533 return;
1534
1535 osi_linux.dmi = 1; /* DMI knows that this box asks OSI(Linux) */
1536 set_osi_linux(enable);
1537
1538 return;
1539 }
1540
1541 /*
1542 * Modify the list of "OS Interfaces" reported to BIOS via _OSI
1543 *
1544 * empty string disables _OSI
1545 * string starting with '!' disables that string
1546 * otherwise string is added to list, augmenting built-in strings
1547 */
1548 static void __init acpi_osi_setup_late(void)
1549 {
1550 struct osi_setup_entry *osi;
1551 char *str;
1552 int i;
1553 acpi_status status;
1554
1555 if (osi_linux.default_disabling) {
1556 status = acpi_update_interfaces(ACPI_DISABLE_ALL_VENDOR_STRINGS);
1557
1558 if (ACPI_SUCCESS(status))
1559 printk(KERN_INFO PREFIX "Disabled all _OSI OS vendors\n");
1560 }
1561
1562 for (i = 0; i < OSI_STRING_ENTRIES_MAX; i++) {
1563 osi = &osi_setup_entries[i];
1564 str = osi->string;
1565
1566 if (*str == '\0')
1567 break;
1568 if (osi->enable) {
1569 status = acpi_install_interface(str);
1570
1571 if (ACPI_SUCCESS(status))
1572 printk(KERN_INFO PREFIX "Added _OSI(%s)\n", str);
1573 } else {
1574 status = acpi_remove_interface(str);
1575
1576 if (ACPI_SUCCESS(status))
1577 printk(KERN_INFO PREFIX "Deleted _OSI(%s)\n", str);
1578 }
1579 }
1580 }
1581
1582 static int __init osi_setup(char *str)
1583 {
1584 if (str && !strcmp("Linux", str))
1585 acpi_cmdline_osi_linux(1);
1586 else if (str && !strcmp("!Linux", str))
1587 acpi_cmdline_osi_linux(0);
1588 else
1589 acpi_osi_setup(str);
1590
1591 return 1;
1592 }
1593
1594 __setup("acpi_osi=", osi_setup);
1595
1596 /*
1597 * Disable the auto-serialization of named objects creation methods.
1598 *
1599 * This feature is enabled by default. It marks the AML control methods
1600 * that contain the opcodes to create named objects as "Serialized".
1601 */
1602 static int __init acpi_no_auto_serialize_setup(char *str)
1603 {
1604 acpi_gbl_auto_serialize_methods = FALSE;
1605 pr_info("ACPI: auto-serialization disabled\n");
1606
1607 return 1;
1608 }
1609
1610 __setup("acpi_no_auto_serialize", acpi_no_auto_serialize_setup);
1611
1612 /* Check of resource interference between native drivers and ACPI
1613 * OperationRegions (SystemIO and System Memory only).
1614 * IO ports and memory declared in ACPI might be used by the ACPI subsystem
1615 * in arbitrary AML code and can interfere with legacy drivers.
1616 * acpi_enforce_resources= can be set to:
1617 *
1618 * - strict (default) (2)
1619 * -> further driver trying to access the resources will not load
1620 * - lax (1)
1621 * -> further driver trying to access the resources will load, but you
1622 * get a system message that something might go wrong...
1623 *
1624 * - no (0)
1625 * -> ACPI Operation Region resources will not be registered
1626 *
1627 */
1628 #define ENFORCE_RESOURCES_STRICT 2
1629 #define ENFORCE_RESOURCES_LAX 1
1630 #define ENFORCE_RESOURCES_NO 0
1631
1632 static unsigned int acpi_enforce_resources = ENFORCE_RESOURCES_STRICT;
1633
1634 static int __init acpi_enforce_resources_setup(char *str)
1635 {
1636 if (str == NULL || *str == '\0')
1637 return 0;
1638
1639 if (!strcmp("strict", str))
1640 acpi_enforce_resources = ENFORCE_RESOURCES_STRICT;
1641 else if (!strcmp("lax", str))
1642 acpi_enforce_resources = ENFORCE_RESOURCES_LAX;
1643 else if (!strcmp("no", str))
1644 acpi_enforce_resources = ENFORCE_RESOURCES_NO;
1645
1646 return 1;
1647 }
1648
1649 __setup("acpi_enforce_resources=", acpi_enforce_resources_setup);
1650
1651 /* Check for resource conflicts between ACPI OperationRegions and native
1652 * drivers */
1653 int acpi_check_resource_conflict(const struct resource *res)
1654 {
1655 acpi_adr_space_type space_id;
1656 acpi_size length;
1657 u8 warn = 0;
1658 int clash = 0;
1659
1660 if (acpi_enforce_resources == ENFORCE_RESOURCES_NO)
1661 return 0;
1662 if (!(res->flags & IORESOURCE_IO) && !(res->flags & IORESOURCE_MEM))
1663 return 0;
1664
1665 if (res->flags & IORESOURCE_IO)
1666 space_id = ACPI_ADR_SPACE_SYSTEM_IO;
1667 else
1668 space_id = ACPI_ADR_SPACE_SYSTEM_MEMORY;
1669
1670 length = resource_size(res);
1671 if (acpi_enforce_resources != ENFORCE_RESOURCES_NO)
1672 warn = 1;
1673 clash = acpi_check_address_range(space_id, res->start, length, warn);
1674
1675 if (clash) {
1676 if (acpi_enforce_resources != ENFORCE_RESOURCES_NO) {
1677 if (acpi_enforce_resources == ENFORCE_RESOURCES_LAX)
1678 printk(KERN_NOTICE "ACPI: This conflict may"
1679 " cause random problems and system"
1680 " instability\n");
1681 printk(KERN_INFO "ACPI: If an ACPI driver is available"
1682 " for this device, you should use it instead of"
1683 " the native driver\n");
1684 }
1685 if (acpi_enforce_resources == ENFORCE_RESOURCES_STRICT)
1686 return -EBUSY;
1687 }
1688 return 0;
1689 }
1690 EXPORT_SYMBOL(acpi_check_resource_conflict);
1691
1692 int acpi_check_region(resource_size_t start, resource_size_t n,
1693 const char *name)
1694 {
1695 struct resource res = {
1696 .start = start,
1697 .end = start + n - 1,
1698 .name = name,
1699 .flags = IORESOURCE_IO,
1700 };
1701
1702 return acpi_check_resource_conflict(&res);
1703 }
1704 EXPORT_SYMBOL(acpi_check_region);
1705
1706 /*
1707 * Let drivers know whether the resource checks are effective
1708 */
1709 int acpi_resources_are_enforced(void)
1710 {
1711 return acpi_enforce_resources == ENFORCE_RESOURCES_STRICT;
1712 }
1713 EXPORT_SYMBOL(acpi_resources_are_enforced);
1714
1715 bool acpi_osi_is_win8(void)
1716 {
1717 return acpi_gbl_osi_data >= ACPI_OSI_WIN_8;
1718 }
1719 EXPORT_SYMBOL(acpi_osi_is_win8);
1720
1721 /*
1722 * Deallocate the memory for a spinlock.
1723 */
1724 void acpi_os_delete_lock(acpi_spinlock handle)
1725 {
1726 ACPI_FREE(handle);
1727 }
1728
1729 /*
1730 * Acquire a spinlock.
1731 *
1732 * handle is a pointer to the spinlock_t.
1733 */
1734
1735 acpi_cpu_flags acpi_os_acquire_lock(acpi_spinlock lockp)
1736 {
1737 acpi_cpu_flags flags;
1738 spin_lock_irqsave(lockp, flags);
1739 return flags;
1740 }
1741
1742 /*
1743 * Release a spinlock. See above.
1744 */
1745
1746 void acpi_os_release_lock(acpi_spinlock lockp, acpi_cpu_flags flags)
1747 {
1748 spin_unlock_irqrestore(lockp, flags);
1749 }
1750
1751 #ifndef ACPI_USE_LOCAL_CACHE
1752
1753 /*******************************************************************************
1754 *
1755 * FUNCTION: acpi_os_create_cache
1756 *
1757 * PARAMETERS: name - Ascii name for the cache
1758 * size - Size of each cached object
1759 * depth - Maximum depth of the cache (in objects) <ignored>
1760 * cache - Where the new cache object is returned
1761 *
1762 * RETURN: status
1763 *
1764 * DESCRIPTION: Create a cache object
1765 *
1766 ******************************************************************************/
1767
1768 acpi_status
1769 acpi_os_create_cache(char *name, u16 size, u16 depth, acpi_cache_t ** cache)
1770 {
1771 *cache = kmem_cache_create(name, size, 0, 0, NULL);
1772 if (*cache == NULL)
1773 return AE_ERROR;
1774 else
1775 return AE_OK;
1776 }
1777
1778 /*******************************************************************************
1779 *
1780 * FUNCTION: acpi_os_purge_cache
1781 *
1782 * PARAMETERS: Cache - Handle to cache object
1783 *
1784 * RETURN: Status
1785 *
1786 * DESCRIPTION: Free all objects within the requested cache.
1787 *
1788 ******************************************************************************/
1789
1790 acpi_status acpi_os_purge_cache(acpi_cache_t * cache)
1791 {
1792 kmem_cache_shrink(cache);
1793 return (AE_OK);
1794 }
1795
1796 /*******************************************************************************
1797 *
1798 * FUNCTION: acpi_os_delete_cache
1799 *
1800 * PARAMETERS: Cache - Handle to cache object
1801 *
1802 * RETURN: Status
1803 *
1804 * DESCRIPTION: Free all objects within the requested cache and delete the
1805 * cache object.
1806 *
1807 ******************************************************************************/
1808
1809 acpi_status acpi_os_delete_cache(acpi_cache_t * cache)
1810 {
1811 kmem_cache_destroy(cache);
1812 return (AE_OK);
1813 }
1814
1815 /*******************************************************************************
1816 *
1817 * FUNCTION: acpi_os_release_object
1818 *
1819 * PARAMETERS: Cache - Handle to cache object
1820 * Object - The object to be released
1821 *
1822 * RETURN: None
1823 *
1824 * DESCRIPTION: Release an object to the specified cache. If cache is full,
1825 * the object is deleted.
1826 *
1827 ******************************************************************************/
1828
1829 acpi_status acpi_os_release_object(acpi_cache_t * cache, void *object)
1830 {
1831 kmem_cache_free(cache, object);
1832 return (AE_OK);
1833 }
1834 #endif
1835
1836 static int __init acpi_no_static_ssdt_setup(char *s)
1837 {
1838 acpi_gbl_disable_ssdt_table_install = TRUE;
1839 pr_info("ACPI: static SSDT installation disabled\n");
1840
1841 return 0;
1842 }
1843
1844 early_param("acpi_no_static_ssdt", acpi_no_static_ssdt_setup);
1845
1846 static int __init acpi_disable_return_repair(char *s)
1847 {
1848 printk(KERN_NOTICE PREFIX
1849 "ACPI: Predefined validation mechanism disabled\n");
1850 acpi_gbl_disable_auto_repair = TRUE;
1851
1852 return 1;
1853 }
1854
1855 __setup("acpica_no_return_repair", acpi_disable_return_repair);
1856
1857 acpi_status __init acpi_os_initialize(void)
1858 {
1859 acpi_os_map_generic_address(&acpi_gbl_FADT.xpm1a_event_block);
1860 acpi_os_map_generic_address(&acpi_gbl_FADT.xpm1b_event_block);
1861 acpi_os_map_generic_address(&acpi_gbl_FADT.xgpe0_block);
1862 acpi_os_map_generic_address(&acpi_gbl_FADT.xgpe1_block);
1863 if (acpi_gbl_FADT.flags & ACPI_FADT_RESET_REGISTER) {
1864 /*
1865 * Use acpi_os_map_generic_address to pre-map the reset
1866 * register if it's in system memory.
1867 */
1868 int rv;
1869
1870 rv = acpi_os_map_generic_address(&acpi_gbl_FADT.reset_register);
1871 pr_debug(PREFIX "%s: map reset_reg status %d\n", __func__, rv);
1872 }
1873 acpi_os_initialized = true;
1874
1875 return AE_OK;
1876 }
1877
1878 acpi_status __init acpi_os_initialize1(void)
1879 {
1880 kacpid_wq = alloc_workqueue("kacpid", 0, 1);
1881 kacpi_notify_wq = alloc_workqueue("kacpi_notify", 0, 1);
1882 kacpi_hotplug_wq = alloc_ordered_workqueue("kacpi_hotplug", 0);
1883 BUG_ON(!kacpid_wq);
1884 BUG_ON(!kacpi_notify_wq);
1885 BUG_ON(!kacpi_hotplug_wq);
1886 acpi_install_interface_handler(acpi_osi_handler);
1887 acpi_osi_setup_late();
1888 return AE_OK;
1889 }
1890
1891 acpi_status acpi_os_terminate(void)
1892 {
1893 if (acpi_irq_handler) {
1894 acpi_os_remove_interrupt_handler(acpi_gbl_FADT.sci_interrupt,
1895 acpi_irq_handler);
1896 }
1897
1898 acpi_os_unmap_generic_address(&acpi_gbl_FADT.xgpe1_block);
1899 acpi_os_unmap_generic_address(&acpi_gbl_FADT.xgpe0_block);
1900 acpi_os_unmap_generic_address(&acpi_gbl_FADT.xpm1b_event_block);
1901 acpi_os_unmap_generic_address(&acpi_gbl_FADT.xpm1a_event_block);
1902 if (acpi_gbl_FADT.flags & ACPI_FADT_RESET_REGISTER)
1903 acpi_os_unmap_generic_address(&acpi_gbl_FADT.reset_register);
1904
1905 destroy_workqueue(kacpid_wq);
1906 destroy_workqueue(kacpi_notify_wq);
1907 destroy_workqueue(kacpi_hotplug_wq);
1908
1909 return AE_OK;
1910 }
1911
1912 acpi_status acpi_os_prepare_sleep(u8 sleep_state, u32 pm1a_control,
1913 u32 pm1b_control)
1914 {
1915 int rc = 0;
1916 if (__acpi_os_prepare_sleep)
1917 rc = __acpi_os_prepare_sleep(sleep_state,
1918 pm1a_control, pm1b_control);
1919 if (rc < 0)
1920 return AE_ERROR;
1921 else if (rc > 0)
1922 return AE_CTRL_SKIP;
1923
1924 return AE_OK;
1925 }
1926
1927 void acpi_os_set_prepare_sleep(int (*func)(u8 sleep_state,
1928 u32 pm1a_ctrl, u32 pm1b_ctrl))
1929 {
1930 __acpi_os_prepare_sleep = func;
1931 }
1932
1933 acpi_status acpi_os_prepare_extended_sleep(u8 sleep_state, u32 val_a,
1934 u32 val_b)
1935 {
1936 int rc = 0;
1937 if (__acpi_os_prepare_extended_sleep)
1938 rc = __acpi_os_prepare_extended_sleep(sleep_state,
1939 val_a, val_b);
1940 if (rc < 0)
1941 return AE_ERROR;
1942 else if (rc > 0)
1943 return AE_CTRL_SKIP;
1944
1945 return AE_OK;
1946 }
1947
1948 void acpi_os_set_prepare_extended_sleep(int (*func)(u8 sleep_state,
1949 u32 val_a, u32 val_b))
1950 {
1951 __acpi_os_prepare_extended_sleep = func;
1952 }
This page took 0.090608 seconds and 6 git commands to generate.