1 /*
2  * bios-less APM driver for ARM Linux
3  *  Jamey Hicks <jamey@crl.dec.com>
4  *  adapted from the APM BIOS driver for Linux by Stephen Rothwell (sfr@linuxcare.com)
5  *
6  * APM 1.2 Reference:
7  *   Intel Corporation, Microsoft Corporation. Advanced Power Management
8  *   (APM) BIOS Interface Specification, Revision 1.2, February 1996.
9  *
10  * This document is available from Microsoft at:
11  *    http://www.microsoft.com/whdc/archive/amp_12.mspx
12  */
13 #include <linux/module.h>
14 #include <linux/poll.h>
15 #include <linux/slab.h>
16 #include <linux/mutex.h>
17 #include <linux/proc_fs.h>
18 #include <linux/seq_file.h>
19 #include <linux/miscdevice.h>
20 #include <linux/apm_bios.h>
21 #include <linux/capability.h>
22 #include <linux/sched.h>
23 #include <linux/suspend.h>
24 #include <linux/apm-emulation.h>
25 #include <linux/freezer.h>
26 #include <linux/device.h>
27 #include <linux/kernel.h>
28 #include <linux/list.h>
29 #include <linux/init.h>
30 #include <linux/completion.h>
31 #include <linux/kthread.h>
32 #include <linux/delay.h>
33 
34 #include <asm/system.h>
35 
36 /*
37  * The apm_bios device is one of the misc char devices.
38  * This is its minor number.
39  */
40 #define APM_MINOR_DEV	134
41 
42 /*
43  * See Documentation/Config.help for the configuration options.
44  *
45  * Various options can be changed at boot time as follows:
46  * (We allow underscores for compatibility with the modules code)
47  *	apm=on/off			enable/disable APM
48  */
49 
50 /*
51  * Maximum number of events stored
52  */
53 #define APM_MAX_EVENTS		16
54 
55 struct apm_queue {
56 	unsigned int		event_head;
57 	unsigned int		event_tail;
58 	apm_event_t		events[APM_MAX_EVENTS];
59 };
60 
61 /*
62  * thread states (for threads using a writable /dev/apm_bios fd):
63  *
64  * SUSPEND_NONE:	nothing happening
65  * SUSPEND_PENDING:	suspend event queued for thread and pending to be read
66  * SUSPEND_READ:	suspend event read, pending acknowledgement
67  * SUSPEND_ACKED:	acknowledgement received from thread (via ioctl),
68  *			waiting for resume
69  * SUSPEND_ACKTO:	acknowledgement timeout
70  * SUSPEND_DONE:	thread had acked suspend and is now notified of
71  *			resume
72  *
73  * SUSPEND_WAIT:	this thread invoked suspend and is waiting for resume
74  *
75  * A thread migrates in one of three paths:
76  *	NONE -1-> PENDING -2-> READ -3-> ACKED -4-> DONE -5-> NONE
77  *				    -6-> ACKTO -7-> NONE
78  *	NONE -8-> WAIT -9-> NONE
79  *
80  * While in PENDING or READ, the thread is accounted for in the
81  * suspend_acks_pending counter.
82  *
83  * The transitions are invoked as follows:
84  *	1: suspend event is signalled from the core PM code
85  *	2: the suspend event is read from the fd by the userspace thread
86  *	3: userspace thread issues the APM_IOC_SUSPEND ioctl (as ack)
87  *	4: core PM code signals that we have resumed
88  *	5: APM_IOC_SUSPEND ioctl returns
89  *
90  *	6: the notifier invoked from the core PM code timed out waiting
91  *	   for all relevant threds to enter ACKED state and puts those
92  *	   that haven't into ACKTO
93  *	7: those threads issue APM_IOC_SUSPEND ioctl too late,
94  *	   get an error
95  *
96  *	8: userspace thread issues the APM_IOC_SUSPEND ioctl (to suspend),
97  *	   ioctl code invokes pm_suspend()
98  *	9: pm_suspend() returns indicating resume
99  */
100 enum apm_suspend_state {
101 	SUSPEND_NONE,
102 	SUSPEND_PENDING,
103 	SUSPEND_READ,
104 	SUSPEND_ACKED,
105 	SUSPEND_ACKTO,
106 	SUSPEND_WAIT,
107 	SUSPEND_DONE,
108 };
109 
110 /*
111  * The per-file APM data
112  */
113 struct apm_user {
114 	struct list_head	list;
115 
116 	unsigned int		suser: 1;
117 	unsigned int		writer: 1;
118 	unsigned int		reader: 1;
119 
120 	int			suspend_result;
121 	enum apm_suspend_state	suspend_state;
122 
123 	struct apm_queue	queue;
124 };
125 
126 /*
127  * Local variables
128  */
129 static DEFINE_MUTEX(apm_mutex);
130 static atomic_t suspend_acks_pending = ATOMIC_INIT(0);
131 static atomic_t userspace_notification_inhibit = ATOMIC_INIT(0);
132 static int apm_disabled;
133 static struct task_struct *kapmd_tsk;
134 
135 static DECLARE_WAIT_QUEUE_HEAD(apm_waitqueue);
136 static DECLARE_WAIT_QUEUE_HEAD(apm_suspend_waitqueue);
137 
138 /*
139  * This is a list of everyone who has opened /dev/apm_bios
140  */
141 static DECLARE_RWSEM(user_list_lock);
142 static LIST_HEAD(apm_user_list);
143 
144 /*
145  * kapmd info.  kapmd provides us a process context to handle
146  * "APM" events within - specifically necessary if we're going
147  * to be suspending the system.
148  */
149 static DECLARE_WAIT_QUEUE_HEAD(kapmd_wait);
150 static DEFINE_SPINLOCK(kapmd_queue_lock);
151 static struct apm_queue kapmd_queue;
152 
153 static DEFINE_MUTEX(state_lock);
154 
155 static const char driver_version[] = "1.13";	/* no spaces */
156 
157 
158 
159 /*
160  * Compatibility cruft until the IPAQ people move over to the new
161  * interface.
162  */
__apm_get_power_status(struct apm_power_info * info)163 static void __apm_get_power_status(struct apm_power_info *info)
164 {
165 }
166 
167 /*
168  * This allows machines to provide their own "apm get power status" function.
169  */
170 void (*apm_get_power_status)(struct apm_power_info *) = __apm_get_power_status;
171 EXPORT_SYMBOL(apm_get_power_status);
172 
173 
174 /*
175  * APM event queue management.
176  */
queue_empty(struct apm_queue * q)177 static inline int queue_empty(struct apm_queue *q)
178 {
179 	return q->event_head == q->event_tail;
180 }
181 
queue_get_event(struct apm_queue * q)182 static inline apm_event_t queue_get_event(struct apm_queue *q)
183 {
184 	q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
185 	return q->events[q->event_tail];
186 }
187 
queue_add_event(struct apm_queue * q,apm_event_t event)188 static void queue_add_event(struct apm_queue *q, apm_event_t event)
189 {
190 	q->event_head = (q->event_head + 1) % APM_MAX_EVENTS;
191 	if (q->event_head == q->event_tail) {
192 		static int notified;
193 
194 		if (notified++ == 0)
195 		    printk(KERN_ERR "apm: an event queue overflowed\n");
196 		q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
197 	}
198 	q->events[q->event_head] = event;
199 }
200 
queue_event(apm_event_t event)201 static void queue_event(apm_event_t event)
202 {
203 	struct apm_user *as;
204 
205 	down_read(&user_list_lock);
206 	list_for_each_entry(as, &apm_user_list, list) {
207 		if (as->reader)
208 			queue_add_event(&as->queue, event);
209 	}
210 	up_read(&user_list_lock);
211 	wake_up_interruptible(&apm_waitqueue);
212 }
213 
apm_read(struct file * fp,char __user * buf,size_t count,loff_t * ppos)214 static ssize_t apm_read(struct file *fp, char __user *buf, size_t count, loff_t *ppos)
215 {
216 	struct apm_user *as = fp->private_data;
217 	apm_event_t event;
218 	int i = count, ret = 0;
219 
220 	if (count < sizeof(apm_event_t))
221 		return -EINVAL;
222 
223 	if (queue_empty(&as->queue) && fp->f_flags & O_NONBLOCK)
224 		return -EAGAIN;
225 
226 	wait_event_interruptible(apm_waitqueue, !queue_empty(&as->queue));
227 
228 	while ((i >= sizeof(event)) && !queue_empty(&as->queue)) {
229 		event = queue_get_event(&as->queue);
230 
231 		ret = -EFAULT;
232 		if (copy_to_user(buf, &event, sizeof(event)))
233 			break;
234 
235 		mutex_lock(&state_lock);
236 		if (as->suspend_state == SUSPEND_PENDING &&
237 		    (event == APM_SYS_SUSPEND || event == APM_USER_SUSPEND))
238 			as->suspend_state = SUSPEND_READ;
239 		mutex_unlock(&state_lock);
240 
241 		buf += sizeof(event);
242 		i -= sizeof(event);
243 	}
244 
245 	if (i < count)
246 		ret = count - i;
247 
248 	return ret;
249 }
250 
apm_poll(struct file * fp,poll_table * wait)251 static unsigned int apm_poll(struct file *fp, poll_table * wait)
252 {
253 	struct apm_user *as = fp->private_data;
254 
255 	poll_wait(fp, &apm_waitqueue, wait);
256 	return queue_empty(&as->queue) ? 0 : POLLIN | POLLRDNORM;
257 }
258 
259 /*
260  * apm_ioctl - handle APM ioctl
261  *
262  * APM_IOC_SUSPEND
263  *   This IOCTL is overloaded, and performs two functions.  It is used to:
264  *     - initiate a suspend
265  *     - acknowledge a suspend read from /dev/apm_bios.
266  *   Only when everyone who has opened /dev/apm_bios with write permission
267  *   has acknowledge does the actual suspend happen.
268  */
269 static long
apm_ioctl(struct file * filp,u_int cmd,u_long arg)270 apm_ioctl(struct file *filp, u_int cmd, u_long arg)
271 {
272 	struct apm_user *as = filp->private_data;
273 	int err = -EINVAL;
274 
275 	if (!as->suser || !as->writer)
276 		return -EPERM;
277 
278 	mutex_lock(&apm_mutex);
279 	switch (cmd) {
280 	case APM_IOC_SUSPEND:
281 		mutex_lock(&state_lock);
282 
283 		as->suspend_result = -EINTR;
284 
285 		switch (as->suspend_state) {
286 		case SUSPEND_READ:
287 			/*
288 			 * If we read a suspend command from /dev/apm_bios,
289 			 * then the corresponding APM_IOC_SUSPEND ioctl is
290 			 * interpreted as an acknowledge.
291 			 */
292 			as->suspend_state = SUSPEND_ACKED;
293 			atomic_dec(&suspend_acks_pending);
294 			mutex_unlock(&state_lock);
295 
296 			/*
297 			 * suspend_acks_pending changed, the notifier needs to
298 			 * be woken up for this
299 			 */
300 			wake_up(&apm_suspend_waitqueue);
301 
302 			/*
303 			 * Wait for the suspend/resume to complete.  If there
304 			 * are pending acknowledges, we wait here for them.
305 			 */
306 			freezer_do_not_count();
307 
308 			wait_event(apm_suspend_waitqueue,
309 				   as->suspend_state == SUSPEND_DONE);
310 
311 			/*
312 			 * Since we are waiting until the suspend is done, the
313 			 * try_to_freeze() in freezer_count() will not trigger
314 			 */
315 			freezer_count();
316 			break;
317 		case SUSPEND_ACKTO:
318 			as->suspend_result = -ETIMEDOUT;
319 			mutex_unlock(&state_lock);
320 			break;
321 		default:
322 			as->suspend_state = SUSPEND_WAIT;
323 			mutex_unlock(&state_lock);
324 
325 			/*
326 			 * Otherwise it is a request to suspend the system.
327 			 * Just invoke pm_suspend(), we'll handle it from
328 			 * there via the notifier.
329 			 */
330 			as->suspend_result = pm_suspend(PM_SUSPEND_MEM);
331 		}
332 
333 		mutex_lock(&state_lock);
334 		err = as->suspend_result;
335 		as->suspend_state = SUSPEND_NONE;
336 		mutex_unlock(&state_lock);
337 		break;
338 	}
339 	mutex_unlock(&apm_mutex);
340 
341 	return err;
342 }
343 
apm_release(struct inode * inode,struct file * filp)344 static int apm_release(struct inode * inode, struct file * filp)
345 {
346 	struct apm_user *as = filp->private_data;
347 
348 	filp->private_data = NULL;
349 
350 	down_write(&user_list_lock);
351 	list_del(&as->list);
352 	up_write(&user_list_lock);
353 
354 	/*
355 	 * We are now unhooked from the chain.  As far as new
356 	 * events are concerned, we no longer exist.
357 	 */
358 	mutex_lock(&state_lock);
359 	if (as->suspend_state == SUSPEND_PENDING ||
360 	    as->suspend_state == SUSPEND_READ)
361 		atomic_dec(&suspend_acks_pending);
362 	mutex_unlock(&state_lock);
363 
364 	wake_up(&apm_suspend_waitqueue);
365 
366 	kfree(as);
367 	return 0;
368 }
369 
apm_open(struct inode * inode,struct file * filp)370 static int apm_open(struct inode * inode, struct file * filp)
371 {
372 	struct apm_user *as;
373 
374 	mutex_lock(&apm_mutex);
375 	as = kzalloc(sizeof(*as), GFP_KERNEL);
376 	if (as) {
377 		/*
378 		 * XXX - this is a tiny bit broken, when we consider BSD
379 		 * process accounting. If the device is opened by root, we
380 		 * instantly flag that we used superuser privs. Who knows,
381 		 * we might close the device immediately without doing a
382 		 * privileged operation -- cevans
383 		 */
384 		as->suser = capable(CAP_SYS_ADMIN);
385 		as->writer = (filp->f_mode & FMODE_WRITE) == FMODE_WRITE;
386 		as->reader = (filp->f_mode & FMODE_READ) == FMODE_READ;
387 
388 		down_write(&user_list_lock);
389 		list_add(&as->list, &apm_user_list);
390 		up_write(&user_list_lock);
391 
392 		filp->private_data = as;
393 	}
394 	mutex_unlock(&apm_mutex);
395 
396 	return as ? 0 : -ENOMEM;
397 }
398 
399 static const struct file_operations apm_bios_fops = {
400 	.owner		= THIS_MODULE,
401 	.read		= apm_read,
402 	.poll		= apm_poll,
403 	.unlocked_ioctl	= apm_ioctl,
404 	.open		= apm_open,
405 	.release	= apm_release,
406 	.llseek		= noop_llseek,
407 };
408 
409 static struct miscdevice apm_device = {
410 	.minor		= APM_MINOR_DEV,
411 	.name		= "apm_bios",
412 	.fops		= &apm_bios_fops
413 };
414 
415 
416 #ifdef CONFIG_PROC_FS
417 /*
418  * Arguments, with symbols from linux/apm_bios.h.
419  *
420  *   0) Linux driver version (this will change if format changes)
421  *   1) APM BIOS Version.  Usually 1.0, 1.1 or 1.2.
422  *   2) APM flags from APM Installation Check (0x00):
423  *	bit 0: APM_16_BIT_SUPPORT
424  *	bit 1: APM_32_BIT_SUPPORT
425  *	bit 2: APM_IDLE_SLOWS_CLOCK
426  *	bit 3: APM_BIOS_DISABLED
427  *	bit 4: APM_BIOS_DISENGAGED
428  *   3) AC line status
429  *	0x00: Off-line
430  *	0x01: On-line
431  *	0x02: On backup power (BIOS >= 1.1 only)
432  *	0xff: Unknown
433  *   4) Battery status
434  *	0x00: High
435  *	0x01: Low
436  *	0x02: Critical
437  *	0x03: Charging
438  *	0x04: Selected battery not present (BIOS >= 1.2 only)
439  *	0xff: Unknown
440  *   5) Battery flag
441  *	bit 0: High
442  *	bit 1: Low
443  *	bit 2: Critical
444  *	bit 3: Charging
445  *	bit 7: No system battery
446  *	0xff: Unknown
447  *   6) Remaining battery life (percentage of charge):
448  *	0-100: valid
449  *	-1: Unknown
450  *   7) Remaining battery life (time units):
451  *	Number of remaining minutes or seconds
452  *	-1: Unknown
453  *   8) min = minutes; sec = seconds
454  */
proc_apm_show(struct seq_file * m,void * v)455 static int proc_apm_show(struct seq_file *m, void *v)
456 {
457 	struct apm_power_info info;
458 	char *units;
459 
460 	info.ac_line_status = 0xff;
461 	info.battery_status = 0xff;
462 	info.battery_flag   = 0xff;
463 	info.battery_life   = -1;
464 	info.time	    = -1;
465 	info.units	    = -1;
466 
467 	if (apm_get_power_status)
468 		apm_get_power_status(&info);
469 
470 	switch (info.units) {
471 	default:	units = "?";	break;
472 	case 0: 	units = "min";	break;
473 	case 1: 	units = "sec";	break;
474 	}
475 
476 	seq_printf(m, "%s 1.2 0x%02x 0x%02x 0x%02x 0x%02x %d%% %d %s\n",
477 		     driver_version, APM_32_BIT_SUPPORT,
478 		     info.ac_line_status, info.battery_status,
479 		     info.battery_flag, info.battery_life,
480 		     info.time, units);
481 
482 	return 0;
483 }
484 
proc_apm_open(struct inode * inode,struct file * file)485 static int proc_apm_open(struct inode *inode, struct file *file)
486 {
487 	return single_open(file, proc_apm_show, NULL);
488 }
489 
490 static const struct file_operations apm_proc_fops = {
491 	.owner		= THIS_MODULE,
492 	.open		= proc_apm_open,
493 	.read		= seq_read,
494 	.llseek		= seq_lseek,
495 	.release	= single_release,
496 };
497 #endif
498 
kapmd(void * arg)499 static int kapmd(void *arg)
500 {
501 	do {
502 		apm_event_t event;
503 
504 		wait_event_interruptible(kapmd_wait,
505 				!queue_empty(&kapmd_queue) || kthread_should_stop());
506 
507 		if (kthread_should_stop())
508 			break;
509 
510 		spin_lock_irq(&kapmd_queue_lock);
511 		event = 0;
512 		if (!queue_empty(&kapmd_queue))
513 			event = queue_get_event(&kapmd_queue);
514 		spin_unlock_irq(&kapmd_queue_lock);
515 
516 		switch (event) {
517 		case 0:
518 			break;
519 
520 		case APM_LOW_BATTERY:
521 		case APM_POWER_STATUS_CHANGE:
522 			queue_event(event);
523 			break;
524 
525 		case APM_USER_SUSPEND:
526 		case APM_SYS_SUSPEND:
527 			pm_suspend(PM_SUSPEND_MEM);
528 			break;
529 
530 		case APM_CRITICAL_SUSPEND:
531 			atomic_inc(&userspace_notification_inhibit);
532 			pm_suspend(PM_SUSPEND_MEM);
533 			atomic_dec(&userspace_notification_inhibit);
534 			break;
535 		}
536 	} while (1);
537 
538 	return 0;
539 }
540 
apm_suspend_notifier(struct notifier_block * nb,unsigned long event,void * dummy)541 static int apm_suspend_notifier(struct notifier_block *nb,
542 				unsigned long event,
543 				void *dummy)
544 {
545 	struct apm_user *as;
546 	int err;
547 
548 	/* short-cut emergency suspends */
549 	if (atomic_read(&userspace_notification_inhibit))
550 		return NOTIFY_DONE;
551 
552 	switch (event) {
553 	case PM_SUSPEND_PREPARE:
554 		/*
555 		 * Queue an event to all "writer" users that we want
556 		 * to suspend and need their ack.
557 		 */
558 		mutex_lock(&state_lock);
559 		down_read(&user_list_lock);
560 
561 		list_for_each_entry(as, &apm_user_list, list) {
562 			if (as->suspend_state != SUSPEND_WAIT && as->reader &&
563 			    as->writer && as->suser) {
564 				as->suspend_state = SUSPEND_PENDING;
565 				atomic_inc(&suspend_acks_pending);
566 				queue_add_event(&as->queue, APM_USER_SUSPEND);
567 			}
568 		}
569 
570 		up_read(&user_list_lock);
571 		mutex_unlock(&state_lock);
572 		wake_up_interruptible(&apm_waitqueue);
573 
574 		/*
575 		 * Wait for the the suspend_acks_pending variable to drop to
576 		 * zero, meaning everybody acked the suspend event (or the
577 		 * process was killed.)
578 		 *
579 		 * If the app won't answer within a short while we assume it
580 		 * locked up and ignore it.
581 		 */
582 		err = wait_event_interruptible_timeout(
583 			apm_suspend_waitqueue,
584 			atomic_read(&suspend_acks_pending) == 0,
585 			5*HZ);
586 
587 		/* timed out */
588 		if (err == 0) {
589 			/*
590 			 * Move anybody who timed out to "ack timeout" state.
591 			 *
592 			 * We could time out and the userspace does the ACK
593 			 * right after we time out but before we enter the
594 			 * locked section here, but that's fine.
595 			 */
596 			mutex_lock(&state_lock);
597 			down_read(&user_list_lock);
598 			list_for_each_entry(as, &apm_user_list, list) {
599 				if (as->suspend_state == SUSPEND_PENDING ||
600 				    as->suspend_state == SUSPEND_READ) {
601 					as->suspend_state = SUSPEND_ACKTO;
602 					atomic_dec(&suspend_acks_pending);
603 				}
604 			}
605 			up_read(&user_list_lock);
606 			mutex_unlock(&state_lock);
607 		}
608 
609 		/* let suspend proceed */
610 		if (err >= 0)
611 			return NOTIFY_OK;
612 
613 		/* interrupted by signal */
614 		return NOTIFY_BAD;
615 
616 	case PM_POST_SUSPEND:
617 		/*
618 		 * Anyone on the APM queues will think we're still suspended.
619 		 * Send a message so everyone knows we're now awake again.
620 		 */
621 		queue_event(APM_NORMAL_RESUME);
622 
623 		/*
624 		 * Finally, wake up anyone who is sleeping on the suspend.
625 		 */
626 		mutex_lock(&state_lock);
627 		down_read(&user_list_lock);
628 		list_for_each_entry(as, &apm_user_list, list) {
629 			if (as->suspend_state == SUSPEND_ACKED) {
630 				/*
631 				 * TODO: maybe grab error code, needs core
632 				 * changes to push the error to the notifier
633 				 * chain (could use the second parameter if
634 				 * implemented)
635 				 */
636 				as->suspend_result = 0;
637 				as->suspend_state = SUSPEND_DONE;
638 			}
639 		}
640 		up_read(&user_list_lock);
641 		mutex_unlock(&state_lock);
642 
643 		wake_up(&apm_suspend_waitqueue);
644 		return NOTIFY_OK;
645 
646 	default:
647 		return NOTIFY_DONE;
648 	}
649 }
650 
651 static struct notifier_block apm_notif_block = {
652 	.notifier_call = apm_suspend_notifier,
653 };
654 
apm_init(void)655 static int __init apm_init(void)
656 {
657 	int ret;
658 
659 	if (apm_disabled) {
660 		printk(KERN_NOTICE "apm: disabled on user request.\n");
661 		return -ENODEV;
662 	}
663 
664 	kapmd_tsk = kthread_create(kapmd, NULL, "kapmd");
665 	if (IS_ERR(kapmd_tsk)) {
666 		ret = PTR_ERR(kapmd_tsk);
667 		kapmd_tsk = NULL;
668 		goto out;
669 	}
670 	wake_up_process(kapmd_tsk);
671 
672 #ifdef CONFIG_PROC_FS
673 	proc_create("apm", 0, NULL, &apm_proc_fops);
674 #endif
675 
676 	ret = misc_register(&apm_device);
677 	if (ret)
678 		goto out_stop;
679 
680 	ret = register_pm_notifier(&apm_notif_block);
681 	if (ret)
682 		goto out_unregister;
683 
684 	return 0;
685 
686  out_unregister:
687 	misc_deregister(&apm_device);
688  out_stop:
689 	remove_proc_entry("apm", NULL);
690 	kthread_stop(kapmd_tsk);
691  out:
692 	return ret;
693 }
694 
apm_exit(void)695 static void __exit apm_exit(void)
696 {
697 	unregister_pm_notifier(&apm_notif_block);
698 	misc_deregister(&apm_device);
699 	remove_proc_entry("apm", NULL);
700 
701 	kthread_stop(kapmd_tsk);
702 }
703 
704 module_init(apm_init);
705 module_exit(apm_exit);
706 
707 MODULE_AUTHOR("Stephen Rothwell");
708 MODULE_DESCRIPTION("Advanced Power Management");
709 MODULE_LICENSE("GPL");
710 
711 #ifndef MODULE
apm_setup(char * str)712 static int __init apm_setup(char *str)
713 {
714 	while ((str != NULL) && (*str != '\0')) {
715 		if (strncmp(str, "off", 3) == 0)
716 			apm_disabled = 1;
717 		if (strncmp(str, "on", 2) == 0)
718 			apm_disabled = 0;
719 		str = strchr(str, ',');
720 		if (str != NULL)
721 			str += strspn(str, ", \t");
722 	}
723 	return 1;
724 }
725 
726 __setup("apm=", apm_setup);
727 #endif
728 
729 /**
730  * apm_queue_event - queue an APM event for kapmd
731  * @event: APM event
732  *
733  * Queue an APM event for kapmd to process and ultimately take the
734  * appropriate action.  Only a subset of events are handled:
735  *   %APM_LOW_BATTERY
736  *   %APM_POWER_STATUS_CHANGE
737  *   %APM_USER_SUSPEND
738  *   %APM_SYS_SUSPEND
739  *   %APM_CRITICAL_SUSPEND
740  */
apm_queue_event(apm_event_t event)741 void apm_queue_event(apm_event_t event)
742 {
743 	unsigned long flags;
744 
745 	spin_lock_irqsave(&kapmd_queue_lock, flags);
746 	queue_add_event(&kapmd_queue, event);
747 	spin_unlock_irqrestore(&kapmd_queue_lock, flags);
748 
749 	wake_up_interruptible(&kapmd_wait);
750 }
751 EXPORT_SYMBOL(apm_queue_event);
752