xref: /linux/drivers/char/apm-emulation.c (revision c26f4fbd58375bd6ef74f95eb73d61762ad97c59)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * bios-less APM driver for ARM Linux
4  *  Jamey Hicks <jamey@crl.dec.com>
5  *  adapted from the APM BIOS driver for Linux by Stephen Rothwell (sfr@linuxcare.com)
6  *
7  * APM 1.2 Reference:
8  *   Intel Corporation, Microsoft Corporation. Advanced Power Management
9  *   (APM) BIOS Interface Specification, Revision 1.2, February 1996.
10  *
11  * This document is available from Microsoft at:
12  *    http://www.microsoft.com/whdc/archive/amp_12.mspx
13  */
14 #include <linux/module.h>
15 #include <linux/poll.h>
16 #include <linux/slab.h>
17 #include <linux/mutex.h>
18 #include <linux/proc_fs.h>
19 #include <linux/seq_file.h>
20 #include <linux/miscdevice.h>
21 #include <linux/apm_bios.h>
22 #include <linux/capability.h>
23 #include <linux/sched.h>
24 #include <linux/suspend.h>
25 #include <linux/apm-emulation.h>
26 #include <linux/freezer.h>
27 #include <linux/device.h>
28 #include <linux/kernel.h>
29 #include <linux/list.h>
30 #include <linux/init.h>
31 #include <linux/completion.h>
32 #include <linux/kthread.h>
33 #include <linux/delay.h>
34 
35 /*
36  * One option can be changed at boot time as follows:
37  *	apm=on/off			enable/disable APM
38  */
39 
40 /*
41  * Maximum number of events stored
42  */
43 #define APM_MAX_EVENTS		16
44 
45 struct apm_queue {
46 	unsigned int		event_head;
47 	unsigned int		event_tail;
48 	apm_event_t		events[APM_MAX_EVENTS];
49 };
50 
51 /*
52  * thread states (for threads using a writable /dev/apm_bios fd):
53  *
54  * SUSPEND_NONE:	nothing happening
55  * SUSPEND_PENDING:	suspend event queued for thread and pending to be read
56  * SUSPEND_READ:	suspend event read, pending acknowledgement
57  * SUSPEND_ACKED:	acknowledgement received from thread (via ioctl),
58  *			waiting for resume
59  * SUSPEND_ACKTO:	acknowledgement timeout
60  * SUSPEND_DONE:	thread had acked suspend and is now notified of
61  *			resume
62  *
63  * SUSPEND_WAIT:	this thread invoked suspend and is waiting for resume
64  *
65  * A thread migrates in one of three paths:
66  *	NONE -1-> PENDING -2-> READ -3-> ACKED -4-> DONE -5-> NONE
67  *				    -6-> ACKTO -7-> NONE
68  *	NONE -8-> WAIT -9-> NONE
69  *
70  * While in PENDING or READ, the thread is accounted for in the
71  * suspend_acks_pending counter.
72  *
73  * The transitions are invoked as follows:
74  *	1: suspend event is signalled from the core PM code
75  *	2: the suspend event is read from the fd by the userspace thread
76  *	3: userspace thread issues the APM_IOC_SUSPEND ioctl (as ack)
77  *	4: core PM code signals that we have resumed
78  *	5: APM_IOC_SUSPEND ioctl returns
79  *
80  *	6: the notifier invoked from the core PM code timed out waiting
81  *	   for all relevant threds to enter ACKED state and puts those
82  *	   that haven't into ACKTO
83  *	7: those threads issue APM_IOC_SUSPEND ioctl too late,
84  *	   get an error
85  *
86  *	8: userspace thread issues the APM_IOC_SUSPEND ioctl (to suspend),
87  *	   ioctl code invokes pm_suspend()
88  *	9: pm_suspend() returns indicating resume
89  */
90 enum apm_suspend_state {
91 	SUSPEND_NONE,
92 	SUSPEND_PENDING,
93 	SUSPEND_READ,
94 	SUSPEND_ACKED,
95 	SUSPEND_ACKTO,
96 	SUSPEND_WAIT,
97 	SUSPEND_DONE,
98 };
99 
100 /*
101  * The per-file APM data
102  */
103 struct apm_user {
104 	struct list_head	list;
105 
106 	unsigned int		suser: 1;
107 	unsigned int		writer: 1;
108 	unsigned int		reader: 1;
109 
110 	int			suspend_result;
111 	enum apm_suspend_state	suspend_state;
112 
113 	struct apm_queue	queue;
114 };
115 
116 /*
117  * Local variables
118  */
119 static atomic_t suspend_acks_pending = ATOMIC_INIT(0);
120 static atomic_t userspace_notification_inhibit = ATOMIC_INIT(0);
121 static int apm_disabled;
122 static struct task_struct *kapmd_tsk;
123 
124 static DECLARE_WAIT_QUEUE_HEAD(apm_waitqueue);
125 static DECLARE_WAIT_QUEUE_HEAD(apm_suspend_waitqueue);
126 
127 /*
128  * This is a list of everyone who has opened /dev/apm_bios
129  */
130 static DECLARE_RWSEM(user_list_lock);
131 static LIST_HEAD(apm_user_list);
132 
133 /*
134  * kapmd info.  kapmd provides us a process context to handle
135  * "APM" events within - specifically necessary if we're going
136  * to be suspending the system.
137  */
138 static DECLARE_WAIT_QUEUE_HEAD(kapmd_wait);
139 static DEFINE_SPINLOCK(kapmd_queue_lock);
140 static struct apm_queue kapmd_queue;
141 
142 static DEFINE_MUTEX(state_lock);
143 
144 
145 /*
146  * Compatibility cruft until the IPAQ people move over to the new
147  * interface.
148  */
__apm_get_power_status(struct apm_power_info * info)149 static void __apm_get_power_status(struct apm_power_info *info)
150 {
151 }
152 
153 /*
154  * This allows machines to provide their own "apm get power status" function.
155  */
156 void (*apm_get_power_status)(struct apm_power_info *) = __apm_get_power_status;
157 EXPORT_SYMBOL(apm_get_power_status);
158 
159 
160 /*
161  * APM event queue management.
162  */
queue_empty(struct apm_queue * q)163 static inline int queue_empty(struct apm_queue *q)
164 {
165 	return q->event_head == q->event_tail;
166 }
167 
queue_get_event(struct apm_queue * q)168 static inline apm_event_t queue_get_event(struct apm_queue *q)
169 {
170 	q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
171 	return q->events[q->event_tail];
172 }
173 
queue_add_event(struct apm_queue * q,apm_event_t event)174 static void queue_add_event(struct apm_queue *q, apm_event_t event)
175 {
176 	q->event_head = (q->event_head + 1) % APM_MAX_EVENTS;
177 	if (q->event_head == q->event_tail) {
178 		static int notified;
179 
180 		if (notified++ == 0)
181 		    printk(KERN_ERR "apm: an event queue overflowed\n");
182 		q->event_tail = (q->event_tail + 1) % APM_MAX_EVENTS;
183 	}
184 	q->events[q->event_head] = event;
185 }
186 
queue_event(apm_event_t event)187 static void queue_event(apm_event_t event)
188 {
189 	struct apm_user *as;
190 
191 	down_read(&user_list_lock);
192 	list_for_each_entry(as, &apm_user_list, list) {
193 		if (as->reader)
194 			queue_add_event(&as->queue, event);
195 	}
196 	up_read(&user_list_lock);
197 	wake_up_interruptible(&apm_waitqueue);
198 }
199 
apm_read(struct file * fp,char __user * buf,size_t count,loff_t * ppos)200 static ssize_t apm_read(struct file *fp, char __user *buf, size_t count, loff_t *ppos)
201 {
202 	struct apm_user *as = fp->private_data;
203 	apm_event_t event;
204 	int i = count, ret = 0;
205 
206 	if (count < sizeof(apm_event_t))
207 		return -EINVAL;
208 
209 	if (queue_empty(&as->queue) && fp->f_flags & O_NONBLOCK)
210 		return -EAGAIN;
211 
212 	wait_event_interruptible(apm_waitqueue, !queue_empty(&as->queue));
213 
214 	while ((i >= sizeof(event)) && !queue_empty(&as->queue)) {
215 		event = queue_get_event(&as->queue);
216 
217 		ret = -EFAULT;
218 		if (copy_to_user(buf, &event, sizeof(event)))
219 			break;
220 
221 		mutex_lock(&state_lock);
222 		if (as->suspend_state == SUSPEND_PENDING &&
223 		    (event == APM_SYS_SUSPEND || event == APM_USER_SUSPEND))
224 			as->suspend_state = SUSPEND_READ;
225 		mutex_unlock(&state_lock);
226 
227 		buf += sizeof(event);
228 		i -= sizeof(event);
229 	}
230 
231 	if (i < count)
232 		ret = count - i;
233 
234 	return ret;
235 }
236 
apm_poll(struct file * fp,poll_table * wait)237 static __poll_t apm_poll(struct file *fp, poll_table * wait)
238 {
239 	struct apm_user *as = fp->private_data;
240 
241 	poll_wait(fp, &apm_waitqueue, wait);
242 	return queue_empty(&as->queue) ? 0 : EPOLLIN | EPOLLRDNORM;
243 }
244 
245 /*
246  * apm_ioctl - handle APM ioctl
247  *
248  * APM_IOC_SUSPEND
249  *   This IOCTL is overloaded, and performs two functions.  It is used to:
250  *     - initiate a suspend
251  *     - acknowledge a suspend read from /dev/apm_bios.
252  *   Only when everyone who has opened /dev/apm_bios with write permission
253  *   has acknowledge does the actual suspend happen.
254  */
255 static long
apm_ioctl(struct file * filp,u_int cmd,u_long arg)256 apm_ioctl(struct file *filp, u_int cmd, u_long arg)
257 {
258 	struct apm_user *as = filp->private_data;
259 	int err = -EINVAL;
260 
261 	if (!as->suser || !as->writer)
262 		return -EPERM;
263 
264 	switch (cmd) {
265 	case APM_IOC_SUSPEND:
266 		mutex_lock(&state_lock);
267 
268 		as->suspend_result = -EINTR;
269 
270 		switch (as->suspend_state) {
271 		case SUSPEND_READ:
272 			/*
273 			 * If we read a suspend command from /dev/apm_bios,
274 			 * then the corresponding APM_IOC_SUSPEND ioctl is
275 			 * interpreted as an acknowledge.
276 			 */
277 			as->suspend_state = SUSPEND_ACKED;
278 			atomic_dec(&suspend_acks_pending);
279 			mutex_unlock(&state_lock);
280 
281 			/*
282 			 * suspend_acks_pending changed, the notifier needs to
283 			 * be woken up for this
284 			 */
285 			wake_up(&apm_suspend_waitqueue);
286 
287 			/*
288 			 * Wait for the suspend/resume to complete.  If there
289 			 * are pending acknowledges, we wait here for them.
290 			 * wait_event_freezable() is interruptible and pending
291 			 * signal can cause busy looping.  We aren't doing
292 			 * anything critical, chill a bit on each iteration.
293 			 */
294 			while (wait_event_freezable(apm_suspend_waitqueue,
295 					as->suspend_state != SUSPEND_ACKED))
296 				msleep(10);
297 			break;
298 		case SUSPEND_ACKTO:
299 			as->suspend_result = -ETIMEDOUT;
300 			mutex_unlock(&state_lock);
301 			break;
302 		default:
303 			as->suspend_state = SUSPEND_WAIT;
304 			mutex_unlock(&state_lock);
305 
306 			/*
307 			 * Otherwise it is a request to suspend the system.
308 			 * Just invoke pm_suspend(), we'll handle it from
309 			 * there via the notifier.
310 			 */
311 			as->suspend_result = pm_suspend(PM_SUSPEND_MEM);
312 		}
313 
314 		mutex_lock(&state_lock);
315 		err = as->suspend_result;
316 		as->suspend_state = SUSPEND_NONE;
317 		mutex_unlock(&state_lock);
318 		break;
319 	}
320 
321 	return err;
322 }
323 
apm_release(struct inode * inode,struct file * filp)324 static int apm_release(struct inode * inode, struct file * filp)
325 {
326 	struct apm_user *as = filp->private_data;
327 
328 	filp->private_data = NULL;
329 
330 	down_write(&user_list_lock);
331 	list_del(&as->list);
332 	up_write(&user_list_lock);
333 
334 	/*
335 	 * We are now unhooked from the chain.  As far as new
336 	 * events are concerned, we no longer exist.
337 	 */
338 	mutex_lock(&state_lock);
339 	if (as->suspend_state == SUSPEND_PENDING ||
340 	    as->suspend_state == SUSPEND_READ)
341 		atomic_dec(&suspend_acks_pending);
342 	mutex_unlock(&state_lock);
343 
344 	wake_up(&apm_suspend_waitqueue);
345 
346 	kfree(as);
347 	return 0;
348 }
349 
apm_open(struct inode * inode,struct file * filp)350 static int apm_open(struct inode * inode, struct file * filp)
351 {
352 	struct apm_user *as;
353 
354 	as = kzalloc(sizeof(*as), GFP_KERNEL);
355 	if (as) {
356 		/*
357 		 * XXX - this is a tiny bit broken, when we consider BSD
358 		 * process accounting. If the device is opened by root, we
359 		 * instantly flag that we used superuser privs. Who knows,
360 		 * we might close the device immediately without doing a
361 		 * privileged operation -- cevans
362 		 */
363 		as->suser = capable(CAP_SYS_ADMIN);
364 		as->writer = (filp->f_mode & FMODE_WRITE) == FMODE_WRITE;
365 		as->reader = (filp->f_mode & FMODE_READ) == FMODE_READ;
366 
367 		down_write(&user_list_lock);
368 		list_add(&as->list, &apm_user_list);
369 		up_write(&user_list_lock);
370 
371 		filp->private_data = as;
372 	}
373 
374 	return as ? 0 : -ENOMEM;
375 }
376 
377 static const struct file_operations apm_bios_fops = {
378 	.owner		= THIS_MODULE,
379 	.read		= apm_read,
380 	.poll		= apm_poll,
381 	.unlocked_ioctl	= apm_ioctl,
382 	.open		= apm_open,
383 	.release	= apm_release,
384 	.llseek		= noop_llseek,
385 };
386 
387 static struct miscdevice apm_device = {
388 	.minor		= APM_MINOR_DEV,
389 	.name		= "apm_bios",
390 	.fops		= &apm_bios_fops
391 };
392 
393 
394 #ifdef CONFIG_PROC_FS
395 /*
396  * Arguments, with symbols from linux/apm_bios.h.
397  *
398  *   0) Linux driver version (this will change if format changes)
399  *   1) APM BIOS Version.  Usually 1.0, 1.1 or 1.2.
400  *   2) APM flags from APM Installation Check (0x00):
401  *	bit 0: APM_16_BIT_SUPPORT
402  *	bit 1: APM_32_BIT_SUPPORT
403  *	bit 2: APM_IDLE_SLOWS_CLOCK
404  *	bit 3: APM_BIOS_DISABLED
405  *	bit 4: APM_BIOS_DISENGAGED
406  *   3) AC line status
407  *	0x00: Off-line
408  *	0x01: On-line
409  *	0x02: On backup power (BIOS >= 1.1 only)
410  *	0xff: Unknown
411  *   4) Battery status
412  *	0x00: High
413  *	0x01: Low
414  *	0x02: Critical
415  *	0x03: Charging
416  *	0x04: Selected battery not present (BIOS >= 1.2 only)
417  *	0xff: Unknown
418  *   5) Battery flag
419  *	bit 0: High
420  *	bit 1: Low
421  *	bit 2: Critical
422  *	bit 3: Charging
423  *	bit 7: No system battery
424  *	0xff: Unknown
425  *   6) Remaining battery life (percentage of charge):
426  *	0-100: valid
427  *	-1: Unknown
428  *   7) Remaining battery life (time units):
429  *	Number of remaining minutes or seconds
430  *	-1: Unknown
431  *   8) min = minutes; sec = seconds
432  */
proc_apm_show(struct seq_file * m,void * v)433 static int proc_apm_show(struct seq_file *m, void *v)
434 {
435 	static const char driver_version[] = "1.13";	/* no spaces */
436 
437 	struct apm_power_info info;
438 	char *units;
439 
440 	info.ac_line_status = 0xff;
441 	info.battery_status = 0xff;
442 	info.battery_flag   = 0xff;
443 	info.battery_life   = -1;
444 	info.time	    = -1;
445 	info.units	    = -1;
446 
447 	if (apm_get_power_status)
448 		apm_get_power_status(&info);
449 
450 	switch (info.units) {
451 	default:	units = "?";	break;
452 	case 0: 	units = "min";	break;
453 	case 1: 	units = "sec";	break;
454 	}
455 
456 	seq_printf(m, "%s 1.2 0x%02x 0x%02x 0x%02x 0x%02x %d%% %d %s\n",
457 		     driver_version, APM_32_BIT_SUPPORT,
458 		     info.ac_line_status, info.battery_status,
459 		     info.battery_flag, info.battery_life,
460 		     info.time, units);
461 
462 	return 0;
463 }
464 #endif
465 
kapmd(void * arg)466 static int kapmd(void *arg)
467 {
468 	do {
469 		apm_event_t event;
470 
471 		wait_event_interruptible(kapmd_wait,
472 				!queue_empty(&kapmd_queue) || kthread_should_stop());
473 
474 		if (kthread_should_stop())
475 			break;
476 
477 		spin_lock_irq(&kapmd_queue_lock);
478 		event = 0;
479 		if (!queue_empty(&kapmd_queue))
480 			event = queue_get_event(&kapmd_queue);
481 		spin_unlock_irq(&kapmd_queue_lock);
482 
483 		switch (event) {
484 		case 0:
485 			break;
486 
487 		case APM_LOW_BATTERY:
488 		case APM_POWER_STATUS_CHANGE:
489 			queue_event(event);
490 			break;
491 
492 		case APM_USER_SUSPEND:
493 		case APM_SYS_SUSPEND:
494 			pm_suspend(PM_SUSPEND_MEM);
495 			break;
496 
497 		case APM_CRITICAL_SUSPEND:
498 			atomic_inc(&userspace_notification_inhibit);
499 			pm_suspend(PM_SUSPEND_MEM);
500 			atomic_dec(&userspace_notification_inhibit);
501 			break;
502 		}
503 	} while (1);
504 
505 	return 0;
506 }
507 
apm_suspend_notifier(struct notifier_block * nb,unsigned long event,void * dummy)508 static int apm_suspend_notifier(struct notifier_block *nb,
509 				unsigned long event,
510 				void *dummy)
511 {
512 	struct apm_user *as;
513 	int err;
514 	unsigned long apm_event;
515 
516 	/* short-cut emergency suspends */
517 	if (atomic_read(&userspace_notification_inhibit))
518 		return NOTIFY_DONE;
519 
520 	switch (event) {
521 	case PM_SUSPEND_PREPARE:
522 	case PM_HIBERNATION_PREPARE:
523 		apm_event = (event == PM_SUSPEND_PREPARE) ?
524 			APM_USER_SUSPEND : APM_USER_HIBERNATION;
525 		/*
526 		 * Queue an event to all "writer" users that we want
527 		 * to suspend and need their ack.
528 		 */
529 		mutex_lock(&state_lock);
530 		down_read(&user_list_lock);
531 
532 		list_for_each_entry(as, &apm_user_list, list) {
533 			if (as->suspend_state != SUSPEND_WAIT && as->reader &&
534 			    as->writer && as->suser) {
535 				as->suspend_state = SUSPEND_PENDING;
536 				atomic_inc(&suspend_acks_pending);
537 				queue_add_event(&as->queue, apm_event);
538 			}
539 		}
540 
541 		up_read(&user_list_lock);
542 		mutex_unlock(&state_lock);
543 		wake_up_interruptible(&apm_waitqueue);
544 
545 		/*
546 		 * Wait for the suspend_acks_pending variable to drop to
547 		 * zero, meaning everybody acked the suspend event (or the
548 		 * process was killed.)
549 		 *
550 		 * If the app won't answer within a short while we assume it
551 		 * locked up and ignore it.
552 		 */
553 		err = wait_event_interruptible_timeout(
554 			apm_suspend_waitqueue,
555 			atomic_read(&suspend_acks_pending) == 0,
556 			5*HZ);
557 
558 		/* timed out */
559 		if (err == 0) {
560 			/*
561 			 * Move anybody who timed out to "ack timeout" state.
562 			 *
563 			 * We could time out and the userspace does the ACK
564 			 * right after we time out but before we enter the
565 			 * locked section here, but that's fine.
566 			 */
567 			mutex_lock(&state_lock);
568 			down_read(&user_list_lock);
569 			list_for_each_entry(as, &apm_user_list, list) {
570 				if (as->suspend_state == SUSPEND_PENDING ||
571 				    as->suspend_state == SUSPEND_READ) {
572 					as->suspend_state = SUSPEND_ACKTO;
573 					atomic_dec(&suspend_acks_pending);
574 				}
575 			}
576 			up_read(&user_list_lock);
577 			mutex_unlock(&state_lock);
578 		}
579 
580 		/* let suspend proceed */
581 		if (err >= 0)
582 			return NOTIFY_OK;
583 
584 		/* interrupted by signal */
585 		return notifier_from_errno(err);
586 
587 	case PM_POST_SUSPEND:
588 	case PM_POST_HIBERNATION:
589 		apm_event = (event == PM_POST_SUSPEND) ?
590 			APM_NORMAL_RESUME : APM_HIBERNATION_RESUME;
591 		/*
592 		 * Anyone on the APM queues will think we're still suspended.
593 		 * Send a message so everyone knows we're now awake again.
594 		 */
595 		queue_event(apm_event);
596 
597 		/*
598 		 * Finally, wake up anyone who is sleeping on the suspend.
599 		 */
600 		mutex_lock(&state_lock);
601 		down_read(&user_list_lock);
602 		list_for_each_entry(as, &apm_user_list, list) {
603 			if (as->suspend_state == SUSPEND_ACKED) {
604 				/*
605 				 * TODO: maybe grab error code, needs core
606 				 * changes to push the error to the notifier
607 				 * chain (could use the second parameter if
608 				 * implemented)
609 				 */
610 				as->suspend_result = 0;
611 				as->suspend_state = SUSPEND_DONE;
612 			}
613 		}
614 		up_read(&user_list_lock);
615 		mutex_unlock(&state_lock);
616 
617 		wake_up(&apm_suspend_waitqueue);
618 		return NOTIFY_OK;
619 
620 	default:
621 		return NOTIFY_DONE;
622 	}
623 }
624 
625 static struct notifier_block apm_notif_block = {
626 	.notifier_call = apm_suspend_notifier,
627 };
628 
apm_init(void)629 static int __init apm_init(void)
630 {
631 	int ret;
632 
633 	if (apm_disabled) {
634 		printk(KERN_NOTICE "apm: disabled on user request.\n");
635 		return -ENODEV;
636 	}
637 
638 	kapmd_tsk = kthread_create(kapmd, NULL, "kapmd");
639 	if (IS_ERR(kapmd_tsk)) {
640 		ret = PTR_ERR(kapmd_tsk);
641 		kapmd_tsk = NULL;
642 		goto out;
643 	}
644 	wake_up_process(kapmd_tsk);
645 
646 #ifdef CONFIG_PROC_FS
647 	proc_create_single("apm", 0, NULL, proc_apm_show);
648 #endif
649 
650 	ret = misc_register(&apm_device);
651 	if (ret)
652 		goto out_stop;
653 
654 	ret = register_pm_notifier(&apm_notif_block);
655 	if (ret)
656 		goto out_unregister;
657 
658 	return 0;
659 
660  out_unregister:
661 	misc_deregister(&apm_device);
662  out_stop:
663 	remove_proc_entry("apm", NULL);
664 	kthread_stop(kapmd_tsk);
665  out:
666 	return ret;
667 }
668 
apm_exit(void)669 static void __exit apm_exit(void)
670 {
671 	unregister_pm_notifier(&apm_notif_block);
672 	misc_deregister(&apm_device);
673 	remove_proc_entry("apm", NULL);
674 
675 	kthread_stop(kapmd_tsk);
676 }
677 
678 module_init(apm_init);
679 module_exit(apm_exit);
680 
681 MODULE_AUTHOR("Stephen Rothwell");
682 MODULE_DESCRIPTION("Advanced Power Management");
683 MODULE_LICENSE("GPL");
684 
685 #ifndef MODULE
apm_setup(char * str)686 static int __init apm_setup(char *str)
687 {
688 	while ((str != NULL) && (*str != '\0')) {
689 		if (strncmp(str, "off", 3) == 0)
690 			apm_disabled = 1;
691 		if (strncmp(str, "on", 2) == 0)
692 			apm_disabled = 0;
693 		str = strchr(str, ',');
694 		if (str != NULL)
695 			str += strspn(str, ", \t");
696 	}
697 	return 1;
698 }
699 
700 __setup("apm=", apm_setup);
701 #endif
702 
703 /**
704  * apm_queue_event - queue an APM event for kapmd
705  * @event: APM event
706  *
707  * Queue an APM event for kapmd to process and ultimately take the
708  * appropriate action.  Only a subset of events are handled:
709  *   %APM_LOW_BATTERY
710  *   %APM_POWER_STATUS_CHANGE
711  *   %APM_USER_SUSPEND
712  *   %APM_SYS_SUSPEND
713  *   %APM_CRITICAL_SUSPEND
714  */
apm_queue_event(apm_event_t event)715 void apm_queue_event(apm_event_t event)
716 {
717 	unsigned long flags;
718 
719 	spin_lock_irqsave(&kapmd_queue_lock, flags);
720 	queue_add_event(&kapmd_queue, event);
721 	spin_unlock_irqrestore(&kapmd_queue_lock, flags);
722 
723 	wake_up_interruptible(&kapmd_wait);
724 }
725 EXPORT_SYMBOL(apm_queue_event);
726