1// SPDX-License-Identifier: GPL-2.0+
2/*
3 * VMEbus User access driver
4 *
5 * Author: Martyn Welch <martyn.welch@ge.com>
6 * Copyright 2008 GE Intelligent Platforms Embedded Systems, Inc.
7 *
8 * Based on work by:
9 *   Tom Armistead and Ajit Prem
10 *     Copyright 2004 Motorola Inc.
11 */
12
13#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
14
15#include <linux/refcount.h>
16#include <linux/cdev.h>
17#include <linux/delay.h>
18#include <linux/device.h>
19#include <linux/dma-mapping.h>
20#include <linux/errno.h>
21#include <linux/init.h>
22#include <linux/ioctl.h>
23#include <linux/kernel.h>
24#include <linux/mm.h>
25#include <linux/module.h>
26#include <linux/pagemap.h>
27#include <linux/pci.h>
28#include <linux/mutex.h>
29#include <linux/slab.h>
30#include <linux/spinlock.h>
31#include <linux/syscalls.h>
32#include <linux/types.h>
33
34#include <linux/io.h>
35#include <linux/uaccess.h>
36
37#include "vme.h"
38#include "vme_user.h"
39
40#define DRIVER_NAME "vme_user"
41
42static int bus[VME_USER_BUS_MAX];
43static unsigned int bus_num;
44
45/* Currently Documentation/admin-guide/devices.rst defines the
46 * following for VME:
47 *
48 * 221 char	VME bus
49 *		  0 = /dev/bus/vme/m0		First master image
50 *		  1 = /dev/bus/vme/m1		Second master image
51 *		  2 = /dev/bus/vme/m2		Third master image
52 *		  3 = /dev/bus/vme/m3		Fourth master image
53 *		  4 = /dev/bus/vme/s0		First slave image
54 *		  5 = /dev/bus/vme/s1		Second slave image
55 *		  6 = /dev/bus/vme/s2		Third slave image
56 *		  7 = /dev/bus/vme/s3		Fourth slave image
57 *		  8 = /dev/bus/vme/ctl		Control
58 *
59 *		It is expected that all VME bus drivers will use the
60 *		same interface.  For interface documentation see
61 *		http://www.vmelinux.org/.
62 *
63 * However the VME driver at http://www.vmelinux.org/ is rather old and doesn't
64 * even support the tsi148 chipset (which has 8 master and 8 slave windows).
65 * We'll run with this for now as far as possible, however it probably makes
66 * sense to get rid of the old mappings and just do everything dynamically.
67 *
68 * So for now, we'll restrict the driver to providing 4 masters and 4 slaves as
69 * defined above and try to support at least some of the interface from
70 * http://www.vmelinux.org/ as an alternative the driver can be written
71 * providing a saner interface later.
72 *
73 * The vmelinux.org driver never supported slave images, the devices reserved
74 * for slaves were repurposed to support all 8 master images on the UniverseII!
75 * We shall support 4 masters and 4 slaves with this driver.
76 */
77#define VME_MAJOR	221	/* VME Major Device Number */
78#define VME_DEVS	9	/* Number of dev entries */
79
80#define MASTER_MINOR	0
81#define MASTER_MAX	3
82#define SLAVE_MINOR	4
83#define SLAVE_MAX	7
84#define CONTROL_MINOR	8
85
86#define PCI_BUF_SIZE  0x20000	/* Size of one slave image buffer */
87
88/*
89 * Structure to handle image related parameters.
90 */
91struct image_desc {
92	void *kern_buf;	/* Buffer address in kernel space */
93	dma_addr_t pci_buf;	/* Buffer address in PCI address space */
94	unsigned long long size_buf;	/* Buffer size */
95	struct mutex mutex;	/* Mutex for locking image */
96	struct device *device;	/* Sysfs device */
97	struct vme_resource *resource;	/* VME resource */
98	int mmap_count;		/* Number of current mmap's */
99};
100
101static struct image_desc image[VME_DEVS];
102
103static struct cdev *vme_user_cdev;		/* Character device */
104static struct vme_dev *vme_user_bridge;		/* Pointer to user device */
105
106static const struct class vme_user_sysfs_class = {
107	.name = DRIVER_NAME,
108};
109static const int type[VME_DEVS] = {	MASTER_MINOR,	MASTER_MINOR,
110					MASTER_MINOR,	MASTER_MINOR,
111					SLAVE_MINOR,	SLAVE_MINOR,
112					SLAVE_MINOR,	SLAVE_MINOR,
113					CONTROL_MINOR
114				};
115
116struct vme_user_vma_priv {
117	unsigned int minor;
118	refcount_t refcnt;
119};
120
121static ssize_t resource_to_user(int minor, char __user *buf, size_t count,
122				loff_t *ppos)
123{
124	ssize_t copied = 0;
125
126	if (count > image[minor].size_buf)
127		count = image[minor].size_buf;
128
129	copied = vme_master_read(image[minor].resource, image[minor].kern_buf,
130				 count, *ppos);
131	if (copied < 0)
132		return (int)copied;
133
134	if (copy_to_user(buf, image[minor].kern_buf, (unsigned long)copied))
135		return -EFAULT;
136
137	return copied;
138}
139
140static ssize_t resource_from_user(unsigned int minor, const char __user *buf,
141				  size_t count, loff_t *ppos)
142{
143	if (count > image[minor].size_buf)
144		count = image[minor].size_buf;
145
146	if (copy_from_user(image[minor].kern_buf, buf, (unsigned long)count))
147		return -EFAULT;
148
149	return vme_master_write(image[minor].resource, image[minor].kern_buf,
150				count, *ppos);
151}
152
153static ssize_t buffer_to_user(unsigned int minor, char __user *buf,
154			      size_t count, loff_t *ppos)
155{
156	void *image_ptr;
157
158	image_ptr = image[minor].kern_buf + *ppos;
159	if (copy_to_user(buf, image_ptr, (unsigned long)count))
160		return -EFAULT;
161
162	return count;
163}
164
165static ssize_t buffer_from_user(unsigned int minor, const char __user *buf,
166				size_t count, loff_t *ppos)
167{
168	void *image_ptr;
169
170	image_ptr = image[minor].kern_buf + *ppos;
171	if (copy_from_user(image_ptr, buf, (unsigned long)count))
172		return -EFAULT;
173
174	return count;
175}
176
177static ssize_t vme_user_read(struct file *file, char __user *buf, size_t count,
178			     loff_t *ppos)
179{
180	unsigned int minor = iminor(file_inode(file));
181	ssize_t retval;
182	size_t image_size;
183
184	if (minor == CONTROL_MINOR)
185		return 0;
186
187	mutex_lock(&image[minor].mutex);
188
189	/* XXX Do we *really* want this helper - we can use vme_*_get ? */
190	image_size = vme_get_size(image[minor].resource);
191
192	/* Ensure we are starting at a valid location */
193	if ((*ppos < 0) || (*ppos > (image_size - 1))) {
194		mutex_unlock(&image[minor].mutex);
195		return 0;
196	}
197
198	/* Ensure not reading past end of the image */
199	if (*ppos + count > image_size)
200		count = image_size - *ppos;
201
202	switch (type[minor]) {
203	case MASTER_MINOR:
204		retval = resource_to_user(minor, buf, count, ppos);
205		break;
206	case SLAVE_MINOR:
207		retval = buffer_to_user(minor, buf, count, ppos);
208		break;
209	default:
210		retval = -EINVAL;
211	}
212
213	mutex_unlock(&image[minor].mutex);
214	if (retval > 0)
215		*ppos += retval;
216
217	return retval;
218}
219
220static ssize_t vme_user_write(struct file *file, const char __user *buf,
221			      size_t count, loff_t *ppos)
222{
223	unsigned int minor = iminor(file_inode(file));
224	ssize_t retval;
225	size_t image_size;
226
227	if (minor == CONTROL_MINOR)
228		return 0;
229
230	mutex_lock(&image[minor].mutex);
231
232	image_size = vme_get_size(image[minor].resource);
233
234	/* Ensure we are starting at a valid location */
235	if ((*ppos < 0) || (*ppos > (image_size - 1))) {
236		mutex_unlock(&image[minor].mutex);
237		return 0;
238	}
239
240	/* Ensure not reading past end of the image */
241	if (*ppos + count > image_size)
242		count = image_size - *ppos;
243
244	switch (type[minor]) {
245	case MASTER_MINOR:
246		retval = resource_from_user(minor, buf, count, ppos);
247		break;
248	case SLAVE_MINOR:
249		retval = buffer_from_user(minor, buf, count, ppos);
250		break;
251	default:
252		retval = -EINVAL;
253	}
254
255	mutex_unlock(&image[minor].mutex);
256
257	if (retval > 0)
258		*ppos += retval;
259
260	return retval;
261}
262
263static loff_t vme_user_llseek(struct file *file, loff_t off, int whence)
264{
265	unsigned int minor = iminor(file_inode(file));
266	size_t image_size;
267	loff_t res;
268
269	switch (type[minor]) {
270	case MASTER_MINOR:
271	case SLAVE_MINOR:
272		mutex_lock(&image[minor].mutex);
273		image_size = vme_get_size(image[minor].resource);
274		res = fixed_size_llseek(file, off, whence, image_size);
275		mutex_unlock(&image[minor].mutex);
276		return res;
277	}
278
279	return -EINVAL;
280}
281
282/*
283 * The ioctls provided by the old VME access method (the one at vmelinux.org)
284 * are most certainly wrong as the effectively push the registers layout
285 * through to user space. Given that the VME core can handle multiple bridges,
286 * with different register layouts this is most certainly not the way to go.
287 *
288 * We aren't using the structures defined in the Motorola driver either - these
289 * are also quite low level, however we should use the definitions that have
290 * already been defined.
291 */
292static int vme_user_ioctl(struct inode *inode, struct file *file,
293			  unsigned int cmd, unsigned long arg)
294{
295	struct vme_master master;
296	struct vme_slave slave;
297	struct vme_irq_id irq_req;
298	unsigned long copied;
299	unsigned int minor = iminor(inode);
300	int retval;
301	dma_addr_t pci_addr;
302	void __user *argp = (void __user *)arg;
303
304	switch (type[minor]) {
305	case CONTROL_MINOR:
306		switch (cmd) {
307		case VME_IRQ_GEN:
308			copied = copy_from_user(&irq_req, argp,
309						sizeof(irq_req));
310			if (copied) {
311				pr_warn("Partial copy from userspace\n");
312				return -EFAULT;
313			}
314
315			return vme_irq_generate(vme_user_bridge,
316						  irq_req.level,
317						  irq_req.statid);
318		}
319		break;
320	case MASTER_MINOR:
321		switch (cmd) {
322		case VME_GET_MASTER:
323			memset(&master, 0, sizeof(master));
324
325			/* XXX	We do not want to push aspace, cycle and width
326			 *	to userspace as they are
327			 */
328			retval = vme_master_get(image[minor].resource,
329						&master.enable,
330						&master.vme_addr,
331						&master.size, &master.aspace,
332						&master.cycle, &master.dwidth);
333
334			copied = copy_to_user(argp, &master,
335					      sizeof(master));
336			if (copied) {
337				pr_warn("Partial copy to userspace\n");
338				return -EFAULT;
339			}
340
341			return retval;
342
343		case VME_SET_MASTER:
344
345			if (image[minor].mmap_count != 0) {
346				pr_warn("Can't adjust mapped window\n");
347				return -EPERM;
348			}
349
350			copied = copy_from_user(&master, argp, sizeof(master));
351			if (copied) {
352				pr_warn("Partial copy from userspace\n");
353				return -EFAULT;
354			}
355
356			/* XXX	We do not want to push aspace, cycle and width
357			 *	to userspace as they are
358			 */
359			return vme_master_set(image[minor].resource,
360				master.enable, master.vme_addr, master.size,
361				master.aspace, master.cycle, master.dwidth);
362
363			break;
364		}
365		break;
366	case SLAVE_MINOR:
367		switch (cmd) {
368		case VME_GET_SLAVE:
369			memset(&slave, 0, sizeof(slave));
370
371			/* XXX	We do not want to push aspace, cycle and width
372			 *	to userspace as they are
373			 */
374			retval = vme_slave_get(image[minor].resource,
375					       &slave.enable, &slave.vme_addr,
376					       &slave.size, &pci_addr,
377					       &slave.aspace, &slave.cycle);
378
379			copied = copy_to_user(argp, &slave,
380					      sizeof(slave));
381			if (copied) {
382				pr_warn("Partial copy to userspace\n");
383				return -EFAULT;
384			}
385
386			return retval;
387
388		case VME_SET_SLAVE:
389
390			copied = copy_from_user(&slave, argp, sizeof(slave));
391			if (copied) {
392				pr_warn("Partial copy from userspace\n");
393				return -EFAULT;
394			}
395
396			/* XXX	We do not want to push aspace, cycle and width
397			 *	to userspace as they are
398			 */
399			return vme_slave_set(image[minor].resource,
400				slave.enable, slave.vme_addr, slave.size,
401				image[minor].pci_buf, slave.aspace,
402				slave.cycle);
403
404			break;
405		}
406		break;
407	}
408
409	return -EINVAL;
410}
411
412static long
413vme_user_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
414{
415	int ret;
416	struct inode *inode = file_inode(file);
417	unsigned int minor = iminor(inode);
418
419	mutex_lock(&image[minor].mutex);
420	ret = vme_user_ioctl(inode, file, cmd, arg);
421	mutex_unlock(&image[minor].mutex);
422
423	return ret;
424}
425
426static void vme_user_vm_open(struct vm_area_struct *vma)
427{
428	struct vme_user_vma_priv *vma_priv = vma->vm_private_data;
429
430	refcount_inc(&vma_priv->refcnt);
431}
432
433static void vme_user_vm_close(struct vm_area_struct *vma)
434{
435	struct vme_user_vma_priv *vma_priv = vma->vm_private_data;
436	unsigned int minor = vma_priv->minor;
437
438	if (!refcount_dec_and_test(&vma_priv->refcnt))
439		return;
440
441	mutex_lock(&image[minor].mutex);
442	image[minor].mmap_count--;
443	mutex_unlock(&image[minor].mutex);
444
445	kfree(vma_priv);
446}
447
448static const struct vm_operations_struct vme_user_vm_ops = {
449	.open = vme_user_vm_open,
450	.close = vme_user_vm_close,
451};
452
453static int vme_user_master_mmap(unsigned int minor, struct vm_area_struct *vma)
454{
455	int err;
456	struct vme_user_vma_priv *vma_priv;
457
458	mutex_lock(&image[minor].mutex);
459
460	err = vme_master_mmap(image[minor].resource, vma);
461	if (err) {
462		mutex_unlock(&image[minor].mutex);
463		return err;
464	}
465
466	vma_priv = kmalloc(sizeof(*vma_priv), GFP_KERNEL);
467	if (!vma_priv) {
468		mutex_unlock(&image[minor].mutex);
469		return -ENOMEM;
470	}
471
472	vma_priv->minor = minor;
473	refcount_set(&vma_priv->refcnt, 1);
474	vma->vm_ops = &vme_user_vm_ops;
475	vma->vm_private_data = vma_priv;
476
477	image[minor].mmap_count++;
478
479	mutex_unlock(&image[minor].mutex);
480
481	return 0;
482}
483
484static int vme_user_mmap(struct file *file, struct vm_area_struct *vma)
485{
486	unsigned int minor = iminor(file_inode(file));
487
488	if (type[minor] == MASTER_MINOR)
489		return vme_user_master_mmap(minor, vma);
490
491	return -ENODEV;
492}
493
494static const struct file_operations vme_user_fops = {
495	.read = vme_user_read,
496	.write = vme_user_write,
497	.llseek = vme_user_llseek,
498	.unlocked_ioctl = vme_user_unlocked_ioctl,
499	.compat_ioctl = compat_ptr_ioctl,
500	.mmap = vme_user_mmap,
501};
502
503static int vme_user_match(struct vme_dev *vdev)
504{
505	int i;
506
507	int cur_bus = vme_bus_num(vdev);
508	int cur_slot = vme_slot_num(vdev);
509
510	for (i = 0; i < bus_num; i++)
511		if ((cur_bus == bus[i]) && (cur_slot == vdev->num))
512			return 1;
513
514	return 0;
515}
516
517/*
518 * In this simple access driver, the old behaviour is being preserved as much
519 * as practical. We will therefore reserve the buffers and request the images
520 * here so that we don't have to do it later.
521 */
522static int vme_user_probe(struct vme_dev *vdev)
523{
524	int i, err;
525	char *name;
526
527	/* Save pointer to the bridge device */
528	if (vme_user_bridge) {
529		dev_err(&vdev->dev, "Driver can only be loaded for 1 device\n");
530		err = -EINVAL;
531		goto err_dev;
532	}
533	vme_user_bridge = vdev;
534
535	/* Initialise descriptors */
536	for (i = 0; i < VME_DEVS; i++) {
537		image[i].kern_buf = NULL;
538		image[i].pci_buf = 0;
539		mutex_init(&image[i].mutex);
540		image[i].device = NULL;
541		image[i].resource = NULL;
542	}
543
544	/* Assign major and minor numbers for the driver */
545	err = register_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS, DRIVER_NAME);
546	if (err) {
547		dev_warn(&vdev->dev, "Error getting Major Number %d for driver.\n",
548			 VME_MAJOR);
549		goto err_region;
550	}
551
552	/* Register the driver as a char device */
553	vme_user_cdev = cdev_alloc();
554	if (!vme_user_cdev) {
555		err = -ENOMEM;
556		goto err_char;
557	}
558	vme_user_cdev->ops = &vme_user_fops;
559	vme_user_cdev->owner = THIS_MODULE;
560	err = cdev_add(vme_user_cdev, MKDEV(VME_MAJOR, 0), VME_DEVS);
561	if (err)
562		goto err_class;
563
564	/* Request slave resources and allocate buffers (128kB wide) */
565	for (i = SLAVE_MINOR; i < (SLAVE_MAX + 1); i++) {
566		/* XXX Need to properly request attributes */
567		/* For ca91cx42 bridge there are only two slave windows
568		 * supporting A16 addressing, so we request A24 supported
569		 * by all windows.
570		 */
571		image[i].resource = vme_slave_request(vme_user_bridge,
572						      VME_A24, VME_SCT);
573		if (!image[i].resource) {
574			dev_warn(&vdev->dev,
575				 "Unable to allocate slave resource\n");
576			err = -ENOMEM;
577			goto err_slave;
578		}
579		image[i].size_buf = PCI_BUF_SIZE;
580		image[i].kern_buf = vme_alloc_consistent(image[i].resource,
581							 image[i].size_buf,
582							 &image[i].pci_buf);
583		if (!image[i].kern_buf) {
584			dev_warn(&vdev->dev,
585				 "Unable to allocate memory for buffer\n");
586			image[i].pci_buf = 0;
587			vme_slave_free(image[i].resource);
588			err = -ENOMEM;
589			goto err_slave;
590		}
591	}
592
593	/*
594	 * Request master resources allocate page sized buffers for small
595	 * reads and writes
596	 */
597	for (i = MASTER_MINOR; i < (MASTER_MAX + 1); i++) {
598		/* XXX Need to properly request attributes */
599		image[i].resource = vme_master_request(vme_user_bridge,
600						       VME_A32, VME_SCT,
601						       VME_D32);
602		if (!image[i].resource) {
603			dev_warn(&vdev->dev,
604				 "Unable to allocate master resource\n");
605			err = -ENOMEM;
606			goto err_master;
607		}
608		image[i].size_buf = PCI_BUF_SIZE;
609		image[i].kern_buf = kmalloc(image[i].size_buf, GFP_KERNEL);
610		if (!image[i].kern_buf) {
611			err = -ENOMEM;
612			vme_master_free(image[i].resource);
613			goto err_master;
614		}
615	}
616
617	/* Create sysfs entries - on udev systems this creates the dev files */
618	err = class_register(&vme_user_sysfs_class);
619	if (err) {
620		dev_err(&vdev->dev, "Error creating vme_user class.\n");
621		goto err_master;
622	}
623
624	/* Add sysfs Entries */
625	for (i = 0; i < VME_DEVS; i++) {
626		int num;
627
628		switch (type[i]) {
629		case MASTER_MINOR:
630			name = "bus/vme/m%d";
631			break;
632		case CONTROL_MINOR:
633			name = "bus/vme/ctl";
634			break;
635		case SLAVE_MINOR:
636			name = "bus/vme/s%d";
637			break;
638		default:
639			err = -EINVAL;
640			goto err_sysfs;
641		}
642
643		num = (type[i] == SLAVE_MINOR) ? i - (MASTER_MAX + 1) : i;
644		image[i].device = device_create(&vme_user_sysfs_class, NULL,
645						MKDEV(VME_MAJOR, i), NULL,
646						name, num);
647		if (IS_ERR(image[i].device)) {
648			dev_info(&vdev->dev, "Error creating sysfs device\n");
649			err = PTR_ERR(image[i].device);
650			goto err_sysfs;
651		}
652	}
653
654	return 0;
655
656err_sysfs:
657	while (i > 0) {
658		i--;
659		device_destroy(&vme_user_sysfs_class, MKDEV(VME_MAJOR, i));
660	}
661	class_unregister(&vme_user_sysfs_class);
662
663	/* Ensure counter set correctly to unalloc all master windows */
664	i = MASTER_MAX + 1;
665err_master:
666	while (i > MASTER_MINOR) {
667		i--;
668		kfree(image[i].kern_buf);
669		vme_master_free(image[i].resource);
670	}
671
672	/*
673	 * Ensure counter set correctly to unalloc all slave windows and buffers
674	 */
675	i = SLAVE_MAX + 1;
676err_slave:
677	while (i > SLAVE_MINOR) {
678		i--;
679		vme_free_consistent(image[i].resource, image[i].size_buf,
680				    image[i].kern_buf, image[i].pci_buf);
681		vme_slave_free(image[i].resource);
682	}
683err_class:
684	cdev_del(vme_user_cdev);
685err_char:
686	unregister_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS);
687err_region:
688err_dev:
689	return err;
690}
691
692static void vme_user_remove(struct vme_dev *dev)
693{
694	int i;
695
696	/* Remove sysfs Entries */
697	for (i = 0; i < VME_DEVS; i++) {
698		mutex_destroy(&image[i].mutex);
699		device_destroy(&vme_user_sysfs_class, MKDEV(VME_MAJOR, i));
700	}
701	class_unregister(&vme_user_sysfs_class);
702
703	for (i = MASTER_MINOR; i < (MASTER_MAX + 1); i++) {
704		kfree(image[i].kern_buf);
705		vme_master_free(image[i].resource);
706	}
707
708	for (i = SLAVE_MINOR; i < (SLAVE_MAX + 1); i++) {
709		vme_slave_set(image[i].resource, 0, 0, 0, 0, VME_A32, 0);
710		vme_free_consistent(image[i].resource, image[i].size_buf,
711				    image[i].kern_buf, image[i].pci_buf);
712		vme_slave_free(image[i].resource);
713	}
714
715	/* Unregister device driver */
716	cdev_del(vme_user_cdev);
717
718	/* Unregister the major and minor device numbers */
719	unregister_chrdev_region(MKDEV(VME_MAJOR, 0), VME_DEVS);
720}
721
722static struct vme_driver vme_user_driver = {
723	.name = DRIVER_NAME,
724	.match = vme_user_match,
725	.probe = vme_user_probe,
726	.remove = vme_user_remove,
727};
728
729static int __init vme_user_init(void)
730{
731	int retval = 0;
732
733	pr_info("VME User Space Access Driver\n");
734
735	if (bus_num == 0) {
736		pr_err("No cards, skipping registration\n");
737		retval = -ENODEV;
738		goto err_nocard;
739	}
740
741	/* Let's start by supporting one bus, we can support more than one
742	 * in future revisions if that ever becomes necessary.
743	 */
744	if (bus_num > VME_USER_BUS_MAX) {
745		pr_err("Driver only able to handle %d buses\n",
746		       VME_USER_BUS_MAX);
747		bus_num = VME_USER_BUS_MAX;
748	}
749
750	/*
751	 * Here we just register the maximum number of devices we can and
752	 * leave vme_user_match() to allow only 1 to go through to probe().
753	 * This way, if we later want to allow multiple user access devices,
754	 * we just change the code in vme_user_match().
755	 */
756	retval = vme_register_driver(&vme_user_driver, VME_MAX_SLOTS);
757	if (retval)
758		goto err_reg;
759
760	return retval;
761
762err_reg:
763err_nocard:
764	return retval;
765}
766
767static void __exit vme_user_exit(void)
768{
769	vme_unregister_driver(&vme_user_driver);
770}
771
772MODULE_PARM_DESC(bus, "Enumeration of VMEbus to which the driver is connected");
773module_param_array(bus, int, &bus_num, 0000);
774
775MODULE_DESCRIPTION("VME User Space Access Driver");
776MODULE_AUTHOR("Martyn Welch <martyn.welch@ge.com>");
777MODULE_LICENSE("GPL");
778
779module_init(vme_user_init);
780module_exit(vme_user_exit);
781