qts_core.c 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2022, Qualcomm Innovation Center, Inc. All rights reserved.
  4. */
  5. #define pr_fmt(fmt) "%s: " fmt, __func__
  6. #include <linux/vmalloc.h>
  7. #include <linux/uaccess.h>
  8. #include <linux/delay.h>
  9. #include <linux/input.h>
  10. #include <linux/input/mt.h>
  11. #include <linux/of_gpio.h>
  12. #include <linux/of_graph.h>
  13. #include <linux/of_device.h>
  14. #include <linux/sysfs.h>
  15. #include <linux/sort.h>
  16. #include <linux/atomic.h>
  17. #include <linux/pinctrl/qcom-pinctrl.h>
  18. #include <linux/pm.h>
  19. #include <linux/pm_runtime.h>
  20. #include <linux/component.h>
  21. #include <linux/sched.h>
  22. #include <linux/version.h>
  23. #include <linux/types.h>
  24. #include <linux/regulator/consumer.h>
  25. #include <linux/debugfs.h>
  26. #include <linux/wait.h>
  27. #include <linux/time.h>
  28. #include "qts_core.h"
  29. static struct qts_data_entries *qts_data_entries;
  30. struct drm_panel *active_panel;
  31. static void qts_trusted_touch_abort_handler(struct qts_data *qts_data, int error);
  32. static struct gh_acl_desc *qts_vm_get_acl(enum gh_vm_names vm_name)
  33. {
  34. struct gh_acl_desc *acl_desc;
  35. gh_vmid_t vmid;
  36. gh_rm_get_vmid(vm_name, &vmid);
  37. acl_desc = kzalloc(offsetof(struct gh_acl_desc, acl_entries[1]),
  38. GFP_KERNEL);
  39. if (!acl_desc)
  40. return ERR_PTR(ENOMEM);
  41. acl_desc->n_acl_entries = 1;
  42. acl_desc->acl_entries[0].vmid = vmid;
  43. acl_desc->acl_entries[0].perms = GH_RM_ACL_R | GH_RM_ACL_W;
  44. return acl_desc;
  45. }
  46. static struct gh_sgl_desc *qts_vm_get_sgl(struct trusted_touch_vm_info *vm_info)
  47. {
  48. struct gh_sgl_desc *sgl_desc;
  49. int i;
  50. sgl_desc = kzalloc(offsetof(struct gh_sgl_desc,
  51. sgl_entries[vm_info->iomem_list_size]), GFP_KERNEL);
  52. if (!sgl_desc)
  53. return ERR_PTR(ENOMEM);
  54. sgl_desc->n_sgl_entries = vm_info->iomem_list_size;
  55. for (i = 0; i < vm_info->iomem_list_size; i++) {
  56. sgl_desc->sgl_entries[i].ipa_base = vm_info->iomem_bases[i];
  57. sgl_desc->sgl_entries[i].size = vm_info->iomem_sizes[i];
  58. }
  59. return sgl_desc;
  60. }
  61. static int qts_populate_vm_info_iomem(struct qts_data *qts_data)
  62. {
  63. int i, gpio, rc = 0;
  64. int num_regs, num_sizes, num_gpios, list_size;
  65. struct resource res;
  66. struct device_node *np = qts_data->dev->of_node;
  67. struct trusted_touch_vm_info *vm_info = qts_data->vm_info;
  68. num_regs = of_property_count_u32_elems(np, "qts,trusted-touch-io-bases");
  69. if (num_regs < 0) {
  70. pr_err("Invalid number of IO regions specified\n");
  71. return -EINVAL;
  72. }
  73. num_sizes = of_property_count_u32_elems(np, "qts,trusted-touch-io-sizes");
  74. if (num_sizes < 0) {
  75. pr_err("Invalid number of IO regions specified\n");
  76. return -EINVAL;
  77. }
  78. if (num_regs != num_sizes) {
  79. pr_err("IO bases and sizes array lengths mismatch\n");
  80. return -EINVAL;
  81. }
  82. num_gpios = of_gpio_named_count(np, "qts,trusted-touch-vm-gpio-list");
  83. if (num_gpios < 0) {
  84. pr_warn("Ignoring invalid trusted gpio list: %d\n", num_gpios);
  85. num_gpios = 0;
  86. }
  87. list_size = num_regs + num_gpios;
  88. vm_info->iomem_list_size = list_size;
  89. vm_info->iomem_bases = devm_kcalloc(qts_data->dev, list_size, sizeof(*vm_info->iomem_bases),
  90. GFP_KERNEL);
  91. if (!vm_info->iomem_bases)
  92. return -ENOMEM;
  93. vm_info->iomem_sizes = devm_kcalloc(qts_data->dev, list_size, sizeof(*vm_info->iomem_sizes),
  94. GFP_KERNEL);
  95. if (!vm_info->iomem_sizes)
  96. return -ENOMEM;
  97. for (i = 0; i < num_gpios; ++i) {
  98. gpio = of_get_named_gpio(np, "qts,trusted-touch-vm-gpio-list", i);
  99. if (gpio < 0 || !gpio_is_valid(gpio)) {
  100. pr_err("Invalid gpio %d at position %d\n", gpio, i);
  101. return gpio;
  102. }
  103. if (!msm_gpio_get_pin_address(gpio, &res)) {
  104. pr_err("Failed to retrieve gpio-%d resource\n", gpio);
  105. return -ENODATA;
  106. }
  107. vm_info->iomem_bases[i] = res.start;
  108. vm_info->iomem_sizes[i] = resource_size(&res);
  109. }
  110. rc = of_property_read_u32_array(np, "qts,trusted-touch-io-bases",
  111. &vm_info->iomem_bases[i], list_size - i);
  112. if (rc) {
  113. pr_err("Failed to read trusted touch io bases:%d\n", rc);
  114. return rc;
  115. }
  116. rc = of_property_read_u32_array(np, "qts,trusted-touch-io-sizes",
  117. &vm_info->iomem_sizes[i], list_size - i);
  118. if (rc) {
  119. pr_err("Failed to read trusted touch io sizes:%d\n", rc);
  120. return rc;
  121. }
  122. return 0;
  123. }
  124. static int qts_populate_vm_info(struct qts_data *qts_data)
  125. {
  126. int rc;
  127. struct trusted_touch_vm_info *vm_info;
  128. struct device_node *np = qts_data->dev->of_node;
  129. vm_info = devm_kzalloc(qts_data->dev, sizeof(struct trusted_touch_vm_info), GFP_KERNEL);
  130. if (!vm_info)
  131. return -ENOMEM;
  132. qts_data->vm_info = vm_info;
  133. vm_info->vm_name = GH_TRUSTED_VM;
  134. rc = of_property_read_u32(np, "qts,trusted-touch-spi-irq", &vm_info->hw_irq);
  135. if (rc) {
  136. pr_err("Failed to read trusted touch SPI irq:%d\n", rc);
  137. return rc;
  138. }
  139. rc = qts_populate_vm_info_iomem(qts_data);
  140. if (rc) {
  141. pr_err("Failed to read trusted touch mmio ranges:%d\n", rc);
  142. return rc;
  143. }
  144. rc = of_property_read_string(np, "qts,trusted-touch-type",
  145. &vm_info->trusted_touch_type);
  146. if (rc) {
  147. pr_warn("%s: No trusted touch type selection made\n");
  148. vm_info->mem_tag = GH_MEM_NOTIFIER_TAG_TOUCH_PRIMARY;
  149. vm_info->irq_label = GH_IRQ_LABEL_TRUSTED_TOUCH_PRIMARY;
  150. rc = 0;
  151. } else if (!strcmp(vm_info->trusted_touch_type, "primary")) {
  152. vm_info->mem_tag = GH_MEM_NOTIFIER_TAG_TOUCH_PRIMARY;
  153. vm_info->irq_label = GH_IRQ_LABEL_TRUSTED_TOUCH_PRIMARY;
  154. } else if (!strcmp(vm_info->trusted_touch_type, "secondary")) {
  155. vm_info->mem_tag = GH_MEM_NOTIFIER_TAG_TOUCH_SECONDARY;
  156. vm_info->irq_label = GH_IRQ_LABEL_TRUSTED_TOUCH_SECONDARY;
  157. }
  158. return 0;
  159. }
  160. static void qts_destroy_vm_info(struct qts_data *qts_data)
  161. {
  162. kfree(qts_data->vm_info->iomem_sizes);
  163. kfree(qts_data->vm_info->iomem_bases);
  164. kfree(qts_data->vm_info);
  165. }
  166. static void qts_vm_deinit(struct qts_data *qts_data)
  167. {
  168. if (qts_data->vm_info->mem_cookie)
  169. gh_mem_notifier_unregister(qts_data->vm_info->mem_cookie);
  170. qts_destroy_vm_info(qts_data);
  171. }
  172. static int qts_trusted_touch_get_vm_state(struct qts_data *qts_data)
  173. {
  174. return atomic_read(&qts_data->vm_info->vm_state);
  175. }
  176. static void qts_trusted_touch_set_vm_state(struct qts_data *qts_data,
  177. int state)
  178. {
  179. pr_debug("state %d\n", state);
  180. atomic_set(&qts_data->vm_info->vm_state, state);
  181. }
  182. #ifdef CONFIG_ARCH_QTI_VM
  183. static int qts_vm_mem_release(struct qts_data *qts_data);
  184. static void qts_trusted_touch_tvm_vm_mode_disable(struct qts_data *qts_data);
  185. static void qts_trusted_touch_abort_tvm(struct qts_data *qts_data);
  186. static void qts_trusted_touch_event_notify(struct qts_data *qts_data, int event);
  187. static void qts_irq_enable(struct qts_data *qts_data, bool en)
  188. {
  189. if (en) {
  190. if (qts_data->irq_disabled) {
  191. pr_debug("qts irq enable\n");
  192. enable_irq(qts_data->irq);
  193. qts_data->irq_disabled = false;
  194. }
  195. } else {
  196. if (!qts_data->irq_disabled) {
  197. pr_debug("qts irq disable\n");
  198. disable_irq_nosync(qts_data->irq);
  199. qts_data->irq_disabled = true;
  200. }
  201. }
  202. }
  203. static irqreturn_t qts_irq_handler(int irq, void *data)
  204. {
  205. struct qts_data *qts_data = data;
  206. if (!mutex_trylock(&qts_data->transition_lock))
  207. return IRQ_HANDLED;
  208. qts_data->vendor_ops.irq_handler(irq, qts_data->vendor_data);
  209. mutex_unlock(&qts_data->transition_lock);
  210. return IRQ_HANDLED;
  211. }
  212. static int qts_irq_registration(struct qts_data *qts_data)
  213. {
  214. int ret = 0;
  215. qts_data->irq_gpio_flags = IRQF_TRIGGER_RISING;
  216. pr_debug("irq:%d, flag:%x\n", qts_data->irq, qts_data->irq_gpio_flags);
  217. ret = request_threaded_irq(qts_data->irq, NULL, qts_irq_handler,
  218. qts_data->irq_gpio_flags | IRQF_ONESHOT,
  219. QTS_NAME, qts_data);
  220. if (ret != 0)
  221. pr_err("request_threaded_irq failed\n");
  222. if (ret == 0)
  223. qts_irq_enable(qts_data, false);
  224. return ret;
  225. }
  226. void qts_trusted_touch_tvm_i2c_failure_report(struct qts_data *qts_data)
  227. {
  228. pr_warn("initiating trusted touch abort due to i2c failure\n");
  229. qts_trusted_touch_abort_handler(qts_data, TRUSTED_TOUCH_EVENT_I2C_FAILURE);
  230. }
  231. static void qts_trusted_touch_reset_gpio_toggle(struct qts_data *qts_data)
  232. {
  233. void __iomem *base;
  234. if (qts_data->bus_type != QTS_BUS_TYPE_I2C)
  235. return;
  236. base = ioremap(TOUCH_RESET_GPIO_BASE, TOUCH_RESET_GPIO_SIZE);
  237. writel_relaxed(0x1, base + TOUCH_RESET_GPIO_OFFSET);
  238. /* wait until toggle to finish*/
  239. wmb();
  240. writel_relaxed(0x0, base + TOUCH_RESET_GPIO_OFFSET);
  241. /* wait until toggle to finish*/
  242. wmb();
  243. iounmap(base);
  244. }
  245. static void qts_trusted_touch_intr_gpio_toggle(struct qts_data *qts_data,
  246. bool enable)
  247. {
  248. void __iomem *base;
  249. u32 val;
  250. if (qts_data->bus_type != QTS_BUS_TYPE_I2C)
  251. return;
  252. base = ioremap(TOUCH_INTR_GPIO_BASE, TOUCH_INTR_GPIO_SIZE);
  253. val = readl_relaxed(base + TOUCH_RESET_GPIO_OFFSET);
  254. if (enable) {
  255. val |= BIT(0);
  256. writel_relaxed(val, base + TOUCH_INTR_GPIO_OFFSET);
  257. /* wait until toggle to finish*/
  258. wmb();
  259. } else {
  260. val &= ~BIT(0);
  261. writel_relaxed(val, base + TOUCH_INTR_GPIO_OFFSET);
  262. /* wait until toggle to finish*/
  263. wmb();
  264. }
  265. iounmap(base);
  266. }
  267. static int qts_sgl_cmp(const void *a, const void *b)
  268. {
  269. struct gh_sgl_entry *left = (struct gh_sgl_entry *)a;
  270. struct gh_sgl_entry *right = (struct gh_sgl_entry *)b;
  271. return (left->ipa_base - right->ipa_base);
  272. }
  273. static int qts_vm_compare_sgl_desc(struct gh_sgl_desc *expected,
  274. struct gh_sgl_desc *received)
  275. {
  276. int idx;
  277. if (expected->n_sgl_entries != received->n_sgl_entries)
  278. return -E2BIG;
  279. sort(received->sgl_entries, received->n_sgl_entries,
  280. sizeof(received->sgl_entries[0]), qts_sgl_cmp, NULL);
  281. sort(expected->sgl_entries, expected->n_sgl_entries,
  282. sizeof(expected->sgl_entries[0]), qts_sgl_cmp, NULL);
  283. for (idx = 0; idx < expected->n_sgl_entries; idx++) {
  284. struct gh_sgl_entry *left = &expected->sgl_entries[idx];
  285. struct gh_sgl_entry *right = &received->sgl_entries[idx];
  286. if ((left->ipa_base != right->ipa_base) ||
  287. (left->size != right->size)) {
  288. pr_err("sgl mismatch: left_base:%d right base:%d left size:%d right size:%d\n",
  289. left->ipa_base, right->ipa_base, left->size, right->size);
  290. return -EINVAL;
  291. }
  292. }
  293. return 0;
  294. }
  295. static int qts_vm_handle_vm_hardware(struct qts_data *qts_data)
  296. {
  297. int rc = 0;
  298. if (atomic_read(&qts_data->delayed_tvm_probe_pending)) {
  299. rc = qts_irq_registration(qts_data);
  300. if (rc) {
  301. pr_err("irq registration failure on TVM!\n");
  302. return rc;
  303. }
  304. atomic_set(&qts_data->delayed_tvm_probe_pending, 0);
  305. }
  306. qts_irq_enable(qts_data, true);
  307. qts_trusted_touch_set_vm_state(qts_data, TVM_INTERRUPT_ENABLED);
  308. return rc;
  309. }
  310. static void qts_trusted_touch_tvm_vm_mode_enable(struct qts_data *qts_data)
  311. {
  312. struct gh_sgl_desc *sgl_desc, *expected_sgl_desc;
  313. struct gh_acl_desc *acl_desc;
  314. struct irq_data *irq_data;
  315. int rc = 0;
  316. int irq = 0;
  317. mutex_lock(&qts_data->transition_lock);
  318. if (qts_trusted_touch_get_vm_state(qts_data) != TVM_ALL_RESOURCES_LENT_NOTIFIED) {
  319. pr_info("All lend notifications not received\n");
  320. qts_trusted_touch_event_notify(qts_data,
  321. TRUSTED_TOUCH_EVENT_NOTIFICATIONS_PENDING);
  322. mutex_unlock(&qts_data->transition_lock);
  323. return;
  324. }
  325. if (qts_data->vendor_ops.pre_le_tui_enable)
  326. qts_data->vendor_ops.pre_le_tui_enable(qts_data->vendor_data);
  327. acl_desc = qts_vm_get_acl(GH_TRUSTED_VM);
  328. if (IS_ERR(acl_desc)) {
  329. pr_err("failed to populated acl data:rc=%d\n", PTR_ERR(acl_desc));
  330. goto accept_fail;
  331. }
  332. sgl_desc = gh_rm_mem_accept(qts_data->vm_info->vm_mem_handle,
  333. GH_RM_MEM_TYPE_IO,
  334. GH_RM_TRANS_TYPE_LEND,
  335. GH_RM_MEM_ACCEPT_VALIDATE_ACL_ATTRS |
  336. GH_RM_MEM_ACCEPT_VALIDATE_LABEL |
  337. GH_RM_MEM_ACCEPT_DONE, TRUSTED_TOUCH_MEM_LABEL,
  338. acl_desc, NULL, NULL, 0);
  339. if (IS_ERR_OR_NULL(sgl_desc)) {
  340. pr_err("failed to do mem accept :rc=%d\n", PTR_ERR(sgl_desc));
  341. goto acl_fail;
  342. }
  343. qts_trusted_touch_set_vm_state(qts_data, TVM_IOMEM_ACCEPTED);
  344. /* Initiate session on tvm */
  345. if (qts_data->bus_type == QTS_BUS_TYPE_I2C)
  346. rc = pm_runtime_get_sync(qts_data->client->adapter->dev.parent);
  347. else
  348. rc = pm_runtime_get_sync(qts_data->spi->master->dev.parent);
  349. if (rc < 0) {
  350. pr_err("failed to get sync rc:%d\n", rc);
  351. goto acl_fail;
  352. }
  353. qts_trusted_touch_set_vm_state(qts_data, TVM_I2C_SESSION_ACQUIRED);
  354. expected_sgl_desc = qts_vm_get_sgl(qts_data->vm_info);
  355. if (qts_vm_compare_sgl_desc(expected_sgl_desc, sgl_desc)) {
  356. pr_err("IO sg list does not match\n");
  357. goto sgl_cmp_fail;
  358. }
  359. kfree(expected_sgl_desc);
  360. kfree(acl_desc);
  361. irq = gh_irq_accept(qts_data->vm_info->irq_label, -1, IRQ_TYPE_EDGE_RISING);
  362. qts_trusted_touch_intr_gpio_toggle(qts_data, false);
  363. if (irq < 0) {
  364. pr_err("failed to accept irq\n");
  365. goto accept_fail;
  366. }
  367. qts_trusted_touch_set_vm_state(qts_data, TVM_IRQ_ACCEPTED);
  368. irq_data = irq_get_irq_data(irq);
  369. if (!irq_data) {
  370. pr_err("Invalid irq data for trusted touch\n");
  371. goto accept_fail;
  372. }
  373. if (!irq_data->hwirq) {
  374. pr_err("Invalid irq in irq data\n");
  375. goto accept_fail;
  376. }
  377. if (irq_data->hwirq != qts_data->vm_info->hw_irq) {
  378. pr_err("Invalid irq lent\n");
  379. goto accept_fail;
  380. }
  381. pr_debug("irq:returned from accept:%d\n", irq);
  382. qts_data->irq = irq;
  383. rc = qts_vm_handle_vm_hardware(qts_data);
  384. if (rc) {
  385. pr_err("Delayed probe failure on TVM!\n");
  386. goto accept_fail;
  387. }
  388. atomic_set(&qts_data->trusted_touch_enabled, 1);
  389. if (qts_data->vendor_ops.post_le_tui_enable)
  390. qts_data->vendor_ops.post_le_tui_enable(qts_data->vendor_data);
  391. pr_info("Irq, iomem are accepted and trusted touch enabled\n");
  392. mutex_unlock(&qts_data->transition_lock);
  393. return;
  394. sgl_cmp_fail:
  395. kfree(expected_sgl_desc);
  396. acl_fail:
  397. kfree(acl_desc);
  398. accept_fail:
  399. qts_trusted_touch_abort_handler(qts_data,
  400. TRUSTED_TOUCH_EVENT_ACCEPT_FAILURE);
  401. mutex_unlock(&qts_data->transition_lock);
  402. }
  403. static void qts_vm_irq_on_lend_callback(void *data,
  404. unsigned long notif_type,
  405. enum gh_irq_label label)
  406. {
  407. struct qts_data *qts_data = data;
  408. pr_debug("received irq lend request for label:%d\n", label);
  409. if (qts_trusted_touch_get_vm_state(qts_data) == TVM_IOMEM_LENT_NOTIFIED)
  410. qts_trusted_touch_set_vm_state(qts_data, TVM_ALL_RESOURCES_LENT_NOTIFIED);
  411. else
  412. qts_trusted_touch_set_vm_state(qts_data, TVM_IRQ_LENT_NOTIFIED);
  413. }
  414. static void qts_vm_mem_on_lend_handler(enum gh_mem_notifier_tag tag,
  415. unsigned long notif_type, void *entry_data, void *notif_msg)
  416. {
  417. struct gh_rm_notif_mem_shared_payload *payload;
  418. struct trusted_touch_vm_info *vm_info;
  419. struct qts_data *qts_data;
  420. qts_data = (struct qts_data *)entry_data;
  421. vm_info = qts_data->vm_info;
  422. if (!vm_info) {
  423. pr_err("Invalid vm_info\n");
  424. return;
  425. }
  426. if (notif_type != GH_RM_NOTIF_MEM_SHARED ||
  427. tag != vm_info->mem_tag) {
  428. pr_err("Invalid command passed from rm\n");
  429. return;
  430. }
  431. if (!entry_data || !notif_msg) {
  432. pr_err("Invalid entry data passed from rm\n");
  433. return;
  434. }
  435. payload = (struct gh_rm_notif_mem_shared_payload *)notif_msg;
  436. if (payload->trans_type != GH_RM_TRANS_TYPE_LEND ||
  437. payload->label != TRUSTED_TOUCH_MEM_LABEL) {
  438. pr_err("Invalid label or transaction type\n");
  439. return;
  440. }
  441. vm_info->vm_mem_handle = payload->mem_handle;
  442. pr_debug("received mem lend request with handle:%d\n", vm_info->vm_mem_handle);
  443. if (qts_trusted_touch_get_vm_state(qts_data) == TVM_IRQ_LENT_NOTIFIED)
  444. qts_trusted_touch_set_vm_state(qts_data, TVM_ALL_RESOURCES_LENT_NOTIFIED);
  445. else
  446. qts_trusted_touch_set_vm_state(qts_data, TVM_IOMEM_LENT_NOTIFIED);
  447. }
  448. static int qts_vm_mem_release(struct qts_data *qts_data)
  449. {
  450. int rc = 0;
  451. if (!qts_data->vm_info->vm_mem_handle) {
  452. pr_err("Invalid memory handle\n");
  453. return -EINVAL;
  454. }
  455. rc = gh_rm_mem_release(qts_data->vm_info->vm_mem_handle, 0);
  456. if (rc)
  457. pr_err("VM mem release failed: rc=%d\n", rc);
  458. rc = gh_rm_mem_notify(qts_data->vm_info->vm_mem_handle,
  459. GH_RM_MEM_NOTIFY_OWNER_RELEASED,
  460. qts_data->vm_info->mem_tag, 0);
  461. if (rc)
  462. pr_err("Failed to notify mem release to PVM: rc=%d\n", rc);
  463. pr_debug("vm mem release success\n");
  464. qts_data->vm_info->vm_mem_handle = 0;
  465. return rc;
  466. }
  467. static void qts_trusted_touch_tvm_vm_mode_disable(struct qts_data *qts_data)
  468. {
  469. int rc = 0;
  470. mutex_lock(&qts_data->transition_lock);
  471. if (atomic_read(&qts_data->trusted_touch_abort_status)) {
  472. qts_trusted_touch_abort_tvm(qts_data);
  473. mutex_unlock(&qts_data->transition_lock);
  474. return;
  475. }
  476. if (qts_data->vendor_ops.pre_le_tui_disable)
  477. qts_data->vendor_ops.pre_le_tui_disable(qts_data->vendor_data);
  478. qts_irq_enable(qts_data, false);
  479. qts_trusted_touch_set_vm_state(qts_data, TVM_INTERRUPT_DISABLED);
  480. rc = gh_irq_release(qts_data->vm_info->irq_label);
  481. if (rc) {
  482. pr_err("Failed to release irq rc:%d\n", rc);
  483. goto error;
  484. } else {
  485. qts_trusted_touch_set_vm_state(qts_data, TVM_IRQ_RELEASED);
  486. }
  487. rc = gh_irq_release_notify(qts_data->vm_info->irq_label);
  488. if (rc)
  489. pr_err("Failed to notify release irq rc:%d\n", rc);
  490. pr_debug("vm irq release success\n");
  491. if (qts_data->bus_type == QTS_BUS_TYPE_I2C)
  492. pm_runtime_put_sync(qts_data->client->adapter->dev.parent);
  493. else
  494. pm_runtime_put_sync(qts_data->spi->master->dev.parent);
  495. qts_trusted_touch_set_vm_state(qts_data, TVM_I2C_SESSION_RELEASED);
  496. rc = qts_vm_mem_release(qts_data);
  497. if (rc) {
  498. pr_err("Failed to release mem rc:%d\n", rc);
  499. goto error;
  500. } else {
  501. qts_trusted_touch_set_vm_state(qts_data, TVM_IOMEM_RELEASED);
  502. }
  503. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_TVM_INIT);
  504. atomic_set(&qts_data->trusted_touch_enabled, 0);
  505. if (qts_data->vendor_ops.post_le_tui_disable)
  506. qts_data->vendor_ops.post_le_tui_disable(qts_data->vendor_data);
  507. pr_info("Irq, iomem are released and trusted touch disabled\n");
  508. mutex_unlock(&qts_data->transition_lock);
  509. return;
  510. error:
  511. qts_trusted_touch_abort_handler(qts_data,
  512. TRUSTED_TOUCH_EVENT_RELEASE_FAILURE);
  513. mutex_unlock(&qts_data->transition_lock);
  514. }
  515. static int qts_handle_trusted_touch_tvm(struct qts_data *qts_data, int value)
  516. {
  517. int err = 0;
  518. switch (value) {
  519. case 0:
  520. if ((atomic_read(&qts_data->trusted_touch_enabled) == 0) &&
  521. (atomic_read(&qts_data->trusted_touch_abort_status) == 0)) {
  522. pr_err("Trusted touch is already disabled\n");
  523. break;
  524. }
  525. if (atomic_read(&qts_data->trusted_touch_mode) ==
  526. TRUSTED_TOUCH_VM_MODE) {
  527. qts_trusted_touch_tvm_vm_mode_disable(qts_data);
  528. } else {
  529. pr_err("Unsupported trusted touch mode\n");
  530. }
  531. break;
  532. case 1:
  533. if (atomic_read(&qts_data->trusted_touch_enabled)) {
  534. pr_err("Trusted touch usecase underway\n");
  535. err = -EBUSY;
  536. break;
  537. }
  538. if (atomic_read(&qts_data->trusted_touch_mode) ==
  539. TRUSTED_TOUCH_VM_MODE) {
  540. qts_trusted_touch_tvm_vm_mode_enable(qts_data);
  541. } else {
  542. pr_err("Unsupported trusted touch mode\n");
  543. }
  544. break;
  545. default:
  546. pr_err("unsupported value: %lu\n", value);
  547. err = -EINVAL;
  548. break;
  549. }
  550. return err;
  551. }
  552. static void qts_trusted_touch_abort_tvm(struct qts_data *qts_data)
  553. {
  554. int rc = 0;
  555. int vm_state = qts_trusted_touch_get_vm_state(qts_data);
  556. if (vm_state >= TRUSTED_TOUCH_TVM_STATE_MAX) {
  557. pr_err("invalid tvm driver state: %d\n", vm_state);
  558. return;
  559. }
  560. switch (vm_state) {
  561. case TVM_INTERRUPT_ENABLED:
  562. qts_irq_enable(qts_data, false);
  563. case TVM_IRQ_ACCEPTED:
  564. case TVM_INTERRUPT_DISABLED:
  565. rc = gh_irq_release(qts_data->vm_info->irq_label);
  566. if (rc)
  567. pr_err("Failed to release irq rc:%d\n", rc);
  568. rc = gh_irq_release_notify(qts_data->vm_info->irq_label);
  569. if (rc)
  570. pr_err("Failed to notify irq release rc:%d\n", rc);
  571. case TVM_I2C_SESSION_ACQUIRED:
  572. case TVM_IOMEM_ACCEPTED:
  573. case TVM_IRQ_RELEASED:
  574. if (qts_data->bus_type == QTS_BUS_TYPE_I2C)
  575. pm_runtime_put_sync(qts_data->client->adapter->dev.parent);
  576. else
  577. pm_runtime_put_sync(qts_data->spi->master->dev.parent);
  578. case TVM_I2C_SESSION_RELEASED:
  579. rc = qts_vm_mem_release(qts_data);
  580. if (rc)
  581. pr_err("Failed to release mem rc:%d\n", rc);
  582. case TVM_IOMEM_RELEASED:
  583. case TVM_ALL_RESOURCES_LENT_NOTIFIED:
  584. case TRUSTED_TOUCH_TVM_INIT:
  585. case TVM_IRQ_LENT_NOTIFIED:
  586. case TVM_IOMEM_LENT_NOTIFIED:
  587. atomic_set(&qts_data->trusted_touch_enabled, 0);
  588. }
  589. atomic_set(&qts_data->trusted_touch_abort_status, 0);
  590. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_TVM_INIT);
  591. }
  592. #else
  593. static void qts_bus_put(struct qts_data *qts_data);
  594. static int qts_enable_reg(struct qts_data *qts_data, bool enable);
  595. static void qts_trusted_touch_abort_pvm(struct qts_data *qts_data)
  596. {
  597. int rc = 0;
  598. int vm_state = qts_trusted_touch_get_vm_state(qts_data);
  599. if (vm_state >= TRUSTED_TOUCH_PVM_STATE_MAX) {
  600. pr_err("Invalid driver state: %d\n", vm_state);
  601. return;
  602. }
  603. switch (vm_state) {
  604. case PVM_IRQ_RELEASE_NOTIFIED:
  605. case PVM_ALL_RESOURCES_RELEASE_NOTIFIED:
  606. case PVM_IRQ_LENT:
  607. case PVM_IRQ_LENT_NOTIFIED:
  608. rc = gh_irq_reclaim(qts_data->vm_info->irq_label);
  609. if (rc) {
  610. pr_err("failed to reclaim irq on pvm rc:%d\n", rc);
  611. return;
  612. }
  613. case PVM_IRQ_RECLAIMED:
  614. case PVM_IOMEM_LENT:
  615. case PVM_IOMEM_LENT_NOTIFIED:
  616. case PVM_IOMEM_RELEASE_NOTIFIED:
  617. rc = gh_rm_mem_reclaim(qts_data->vm_info->vm_mem_handle, 0);
  618. if (rc) {
  619. pr_err("failed to reclaim iomem on pvm rc:%d\n", rc);
  620. qts_trusted_touch_set_vm_state(qts_data, PVM_IOMEM_RELEASE_NOTIFIED);
  621. return;
  622. }
  623. qts_data->vm_info->vm_mem_handle = 0;
  624. case PVM_IOMEM_RECLAIMED:
  625. case PVM_INTERRUPT_DISABLED:
  626. if (qts_data->vendor_ops.enable_touch_irq)
  627. qts_data->vendor_ops.enable_touch_irq(qts_data->vendor_data, true);
  628. case PVM_I2C_RESOURCE_ACQUIRED:
  629. case PVM_INTERRUPT_ENABLED:
  630. qts_bus_put(qts_data);
  631. case TRUSTED_TOUCH_PVM_INIT:
  632. case PVM_I2C_RESOURCE_RELEASED:
  633. atomic_set(&qts_data->trusted_touch_enabled, 0);
  634. atomic_set(&qts_data->trusted_touch_transition, 0);
  635. }
  636. atomic_set(&qts_data->trusted_touch_abort_status, 0);
  637. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_PVM_INIT);
  638. }
  639. static int qts_clk_prepare_enable(struct qts_data *qts_data)
  640. {
  641. int ret;
  642. ret = clk_prepare_enable(qts_data->iface_clk);
  643. if (ret) {
  644. pr_err("error on clk_prepare_enable(iface_clk):%d\n", ret);
  645. return ret;
  646. }
  647. ret = clk_prepare_enable(qts_data->core_clk);
  648. if (ret) {
  649. clk_disable_unprepare(qts_data->iface_clk);
  650. pr_err("error clk_prepare_enable(core_clk):%d\n", ret);
  651. }
  652. return ret;
  653. }
  654. static void qts_clk_disable_unprepare(struct qts_data *qts_data)
  655. {
  656. clk_disable_unprepare(qts_data->core_clk);
  657. clk_disable_unprepare(qts_data->iface_clk);
  658. }
  659. static int qts_bus_get(struct qts_data *qts_data)
  660. {
  661. int rc = 0;
  662. struct device *dev = NULL;
  663. if (qts_data->schedule_suspend)
  664. cancel_work_sync(&qts_data->suspend_work);
  665. if (qts_data->schedule_resume)
  666. cancel_work_sync(&qts_data->resume_work);
  667. reinit_completion(&qts_data->trusted_touch_powerdown);
  668. qts_enable_reg(qts_data, true);
  669. if (qts_data->bus_type == QTS_BUS_TYPE_I2C)
  670. dev = qts_data->client->adapter->dev.parent;
  671. else
  672. dev = qts_data->spi->master->dev.parent;
  673. mutex_lock(&qts_data->qts_clk_io_ctrl_mutex);
  674. rc = pm_runtime_get_sync(dev);
  675. if (rc >= 0 && qts_data->core_clk != NULL &&
  676. qts_data->iface_clk != NULL) {
  677. rc = qts_clk_prepare_enable(qts_data);
  678. if (rc)
  679. pm_runtime_put_sync(dev);
  680. }
  681. mutex_unlock(&qts_data->qts_clk_io_ctrl_mutex);
  682. return rc;
  683. }
  684. static void qts_bus_put(struct qts_data *qts_data)
  685. {
  686. struct device *dev = NULL;
  687. if (qts_data->bus_type == QTS_BUS_TYPE_I2C)
  688. dev = qts_data->client->adapter->dev.parent;
  689. else
  690. dev = qts_data->spi->master->dev.parent;
  691. mutex_lock(&qts_data->qts_clk_io_ctrl_mutex);
  692. if (qts_data->core_clk != NULL && qts_data->iface_clk != NULL)
  693. qts_clk_disable_unprepare(qts_data);
  694. pm_runtime_put_sync(dev);
  695. mutex_unlock(&qts_data->qts_clk_io_ctrl_mutex);
  696. complete(&qts_data->trusted_touch_powerdown);
  697. qts_enable_reg(qts_data, false);
  698. }
  699. static struct gh_notify_vmid_desc *qts_vm_get_vmid(gh_vmid_t vmid)
  700. {
  701. struct gh_notify_vmid_desc *vmid_desc;
  702. vmid_desc = kzalloc(offsetof(struct gh_notify_vmid_desc,
  703. vmid_entries[1]), GFP_KERNEL);
  704. if (!vmid_desc)
  705. return ERR_PTR(ENOMEM);
  706. vmid_desc->n_vmid_entries = 1;
  707. vmid_desc->vmid_entries[0].vmid = vmid;
  708. return vmid_desc;
  709. }
  710. static void qts_trusted_touch_pvm_vm_mode_disable(struct qts_data *qts_data)
  711. {
  712. int rc = 0;
  713. atomic_set(&qts_data->trusted_touch_transition, 1);
  714. if (atomic_read(&qts_data->trusted_touch_abort_status)) {
  715. qts_trusted_touch_abort_pvm(qts_data);
  716. return;
  717. }
  718. if (qts_trusted_touch_get_vm_state(qts_data) != PVM_ALL_RESOURCES_RELEASE_NOTIFIED)
  719. pr_info("all release notifications are not received yet\n");
  720. if (qts_data->vendor_ops.pre_la_tui_disable)
  721. qts_data->vendor_ops.pre_la_tui_disable(qts_data->vendor_data);
  722. rc = gh_rm_mem_reclaim(qts_data->vm_info->vm_mem_handle, 0);
  723. if (rc) {
  724. pr_err("Trusted touch VM mem reclaim failed rc:%d\n", rc);
  725. goto error;
  726. }
  727. qts_trusted_touch_set_vm_state(qts_data, PVM_IOMEM_RECLAIMED);
  728. qts_data->vm_info->vm_mem_handle = 0;
  729. pr_debug("vm mem reclaim success!\n");
  730. rc = gh_irq_reclaim(qts_data->vm_info->irq_label);
  731. if (rc) {
  732. pr_err("failed to reclaim irq on pvm rc:%d\n", rc);
  733. goto error;
  734. }
  735. qts_trusted_touch_set_vm_state(qts_data, PVM_IRQ_RECLAIMED);
  736. pr_debug("vm irq reclaim success!\n");
  737. if (qts_data->vendor_ops.enable_touch_irq)
  738. qts_data->vendor_ops.enable_touch_irq(qts_data->vendor_data, true);
  739. qts_trusted_touch_set_vm_state(qts_data, PVM_INTERRUPT_ENABLED);
  740. qts_bus_put(qts_data);
  741. atomic_set(&qts_data->trusted_touch_transition, 0);
  742. qts_trusted_touch_set_vm_state(qts_data, PVM_I2C_RESOURCE_RELEASED);
  743. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_PVM_INIT);
  744. atomic_set(&qts_data->trusted_touch_enabled, 0);
  745. if (qts_data->vendor_ops.post_la_tui_disable)
  746. qts_data->vendor_ops.post_la_tui_disable(qts_data->vendor_data);
  747. pr_info("Irq, iomem are reclaimed and trusted touch disabled\n");
  748. return;
  749. error:
  750. qts_trusted_touch_abort_handler(qts_data,
  751. TRUSTED_TOUCH_EVENT_RECLAIM_FAILURE);
  752. }
  753. static void qts_vm_irq_on_release_callback(void *data,
  754. unsigned long notif_type,
  755. enum gh_irq_label label)
  756. {
  757. struct qts_data *qts_data = data;
  758. if (notif_type != GH_RM_NOTIF_VM_IRQ_RELEASED) {
  759. pr_err("invalid notification type\n");
  760. return;
  761. }
  762. if (qts_trusted_touch_get_vm_state(qts_data) == PVM_IOMEM_RELEASE_NOTIFIED)
  763. qts_trusted_touch_set_vm_state(qts_data, PVM_ALL_RESOURCES_RELEASE_NOTIFIED);
  764. else
  765. qts_trusted_touch_set_vm_state(qts_data, PVM_IRQ_RELEASE_NOTIFIED);
  766. }
  767. static void qts_vm_mem_on_release_handler(enum gh_mem_notifier_tag tag,
  768. unsigned long notif_type, void *entry_data, void *notif_msg)
  769. {
  770. struct gh_rm_notif_mem_released_payload *release_payload;
  771. struct trusted_touch_vm_info *vm_info;
  772. struct qts_data *qts_data;
  773. qts_data = (struct qts_data *)entry_data;
  774. vm_info = qts_data->vm_info;
  775. if (!vm_info) {
  776. pr_err("Invalid vm_info\n");
  777. return;
  778. }
  779. if (notif_type != GH_RM_NOTIF_MEM_RELEASED) {
  780. pr_err("Invalid notification type\n");
  781. return;
  782. }
  783. if (tag != vm_info->mem_tag) {
  784. pr_err("Invalid tag\n");
  785. return;
  786. }
  787. if (!entry_data || !notif_msg) {
  788. pr_err("Invalid data or notification message\n");
  789. return;
  790. }
  791. release_payload = (struct gh_rm_notif_mem_released_payload *)notif_msg;
  792. if (release_payload->mem_handle != vm_info->vm_mem_handle) {
  793. pr_err("Invalid mem handle detected\n");
  794. return;
  795. }
  796. if (qts_trusted_touch_get_vm_state(qts_data) == PVM_IRQ_RELEASE_NOTIFIED)
  797. qts_trusted_touch_set_vm_state(qts_data, PVM_ALL_RESOURCES_RELEASE_NOTIFIED);
  798. else
  799. qts_trusted_touch_set_vm_state(qts_data, PVM_IOMEM_RELEASE_NOTIFIED);
  800. }
  801. static int qts_vm_mem_lend(struct qts_data *qts_data)
  802. {
  803. struct gh_acl_desc *acl_desc;
  804. struct gh_sgl_desc *sgl_desc;
  805. struct gh_notify_vmid_desc *vmid_desc;
  806. gh_memparcel_handle_t mem_handle;
  807. gh_vmid_t trusted_vmid;
  808. int rc = 0;
  809. acl_desc = qts_vm_get_acl(GH_TRUSTED_VM);
  810. if (IS_ERR(acl_desc)) {
  811. pr_err("Failed to get acl of IO memories for Trusted touch\n");
  812. rc = PTR_ERR(acl_desc);
  813. return rc;
  814. }
  815. sgl_desc = qts_vm_get_sgl(qts_data->vm_info);
  816. if (IS_ERR(sgl_desc)) {
  817. pr_err("Failed to get sgl of IO memories for Trusted touch\n");
  818. rc = PTR_ERR(sgl_desc);
  819. goto sgl_error;
  820. }
  821. rc = gh_rm_mem_lend(GH_RM_MEM_TYPE_IO, 0, TRUSTED_TOUCH_MEM_LABEL,
  822. acl_desc, sgl_desc, NULL, &mem_handle);
  823. if (rc) {
  824. pr_err("Failed to lend IO memories for Trusted touch rc:%d\n", rc);
  825. goto error;
  826. }
  827. pr_debug("vm mem lend success\n");
  828. qts_trusted_touch_set_vm_state(qts_data, PVM_IOMEM_LENT);
  829. gh_rm_get_vmid(GH_TRUSTED_VM, &trusted_vmid);
  830. vmid_desc = qts_vm_get_vmid(trusted_vmid);
  831. rc = gh_rm_mem_notify(mem_handle, GH_RM_MEM_NOTIFY_RECIPIENT_SHARED,
  832. qts_data->vm_info->mem_tag, vmid_desc);
  833. if (rc) {
  834. pr_err("Failed to notify mem lend to hypervisor rc:%d\n", rc);
  835. goto vmid_error;
  836. }
  837. qts_trusted_touch_set_vm_state(qts_data, PVM_IOMEM_LENT_NOTIFIED);
  838. qts_data->vm_info->vm_mem_handle = mem_handle;
  839. vmid_error:
  840. kfree(vmid_desc);
  841. error:
  842. kfree(sgl_desc);
  843. sgl_error:
  844. kfree(acl_desc);
  845. return rc;
  846. }
  847. static int qts_trusted_touch_pvm_vm_mode_enable(struct qts_data *qts_data)
  848. {
  849. int rc = 0;
  850. struct trusted_touch_vm_info *vm_info = qts_data->vm_info;
  851. atomic_set(&qts_data->trusted_touch_transition, 1);
  852. mutex_lock(&qts_data->transition_lock);
  853. if (qts_data->suspended) {
  854. pr_err("Invalid power state for operation\n");
  855. atomic_set(&qts_data->trusted_touch_transition, 0);
  856. rc = -EPERM;
  857. goto error;
  858. }
  859. if (qts_data->vendor_ops.pre_la_tui_enable)
  860. qts_data->vendor_ops.pre_la_tui_enable(qts_data->vendor_data);
  861. /* i2c session start and resource acquire */
  862. if (qts_bus_get(qts_data) < 0) {
  863. pr_err("qts_bus_get failed\n");
  864. rc = -EIO;
  865. goto error;
  866. }
  867. qts_trusted_touch_set_vm_state(qts_data, PVM_I2C_RESOURCE_ACQUIRED);
  868. if (qts_data->vendor_ops.enable_touch_irq)
  869. qts_data->vendor_ops.enable_touch_irq(qts_data->vendor_data, false);
  870. qts_trusted_touch_set_vm_state(qts_data, PVM_INTERRUPT_DISABLED);
  871. rc = qts_vm_mem_lend(qts_data);
  872. if (rc) {
  873. pr_err("Failed to lend memory\n");
  874. goto abort_handler;
  875. }
  876. pr_debug("vm mem lend success\n");
  877. if (atomic_read(&qts_data->delayed_pvm_probe_pending)) {
  878. if (qts_data->vendor_ops.get_irq_num)
  879. qts_data->irq = qts_data->vendor_ops.get_irq_num(qts_data->vendor_data);
  880. atomic_set(&qts_data->delayed_tvm_probe_pending, 0);
  881. }
  882. rc = gh_irq_lend_v2(vm_info->irq_label, vm_info->vm_name,
  883. qts_data->irq, &qts_vm_irq_on_release_callback, qts_data);
  884. if (rc) {
  885. pr_err("Failed to lend irq\n");
  886. goto abort_handler;
  887. }
  888. pr_debug("vm irq lend success for irq:%d\n", qts_data->irq);
  889. qts_trusted_touch_set_vm_state(qts_data, PVM_IRQ_LENT);
  890. rc = gh_irq_lend_notify(vm_info->irq_label);
  891. if (rc) {
  892. pr_err("Failed to notify irq\n");
  893. goto abort_handler;
  894. }
  895. qts_trusted_touch_set_vm_state(qts_data, PVM_IRQ_LENT_NOTIFIED);
  896. if (qts_data->vendor_ops.post_la_tui_enable)
  897. qts_data->vendor_ops.post_la_tui_enable(qts_data->vendor_data);
  898. mutex_unlock(&qts_data->transition_lock);
  899. atomic_set(&qts_data->trusted_touch_transition, 0);
  900. atomic_set(&qts_data->trusted_touch_enabled, 1);
  901. pr_info("Irq, iomem are lent and trusted touch enabled\n");
  902. return rc;
  903. abort_handler:
  904. qts_trusted_touch_abort_handler(qts_data, TRUSTED_TOUCH_EVENT_LEND_FAILURE);
  905. error:
  906. mutex_unlock(&qts_data->transition_lock);
  907. return rc;
  908. }
  909. static int qts_handle_trusted_touch_pvm(struct qts_data *qts_data, int value)
  910. {
  911. int err = 0;
  912. switch (value) {
  913. case 0:
  914. if (atomic_read(&qts_data->trusted_touch_enabled) == 0 &&
  915. (atomic_read(&qts_data->trusted_touch_abort_status) == 0)) {
  916. pr_err("Trusted touch is already disabled\n");
  917. break;
  918. }
  919. if (atomic_read(&qts_data->trusted_touch_mode) ==
  920. TRUSTED_TOUCH_VM_MODE) {
  921. qts_trusted_touch_pvm_vm_mode_disable(qts_data);
  922. } else {
  923. pr_err("Unsupported trusted touch mode\n");
  924. }
  925. break;
  926. case 1:
  927. if (atomic_read(&qts_data->trusted_touch_enabled)) {
  928. pr_err("Trusted touch usecase underway\n");
  929. err = -EBUSY;
  930. break;
  931. }
  932. if (atomic_read(&qts_data->trusted_touch_mode) ==
  933. TRUSTED_TOUCH_VM_MODE) {
  934. err = qts_trusted_touch_pvm_vm_mode_enable(qts_data);
  935. } else {
  936. pr_err("Unsupported trusted touch mode\n");
  937. }
  938. break;
  939. default:
  940. pr_err("unsupported value: %lu\n", value);
  941. err = -EINVAL;
  942. break;
  943. }
  944. return err;
  945. }
  946. #endif
  947. static void qts_trusted_touch_event_notify(struct qts_data *qts_data, int event)
  948. {
  949. atomic_set(&qts_data->trusted_touch_event, event);
  950. sysfs_notify(&qts_data->dev->kobj, NULL, "trusted_touch_event");
  951. }
  952. static void qts_trusted_touch_abort_handler(struct qts_data *qts_data, int error)
  953. {
  954. atomic_set(&qts_data->trusted_touch_abort_status, error);
  955. pr_info("TUI session aborted with failure:%d\n", error);
  956. qts_trusted_touch_event_notify(qts_data, error);
  957. #ifdef CONFIG_ARCH_QTI_VM
  958. pr_info("Resetting touch controller\n");
  959. if (qts_trusted_touch_get_vm_state(qts_data) >= TVM_IOMEM_ACCEPTED &&
  960. error == TRUSTED_TOUCH_EVENT_I2C_FAILURE) {
  961. pr_info("Resetting touch controller\n");
  962. qts_trusted_touch_reset_gpio_toggle(qts_data);
  963. }
  964. #endif
  965. }
  966. static int qts_vm_init(struct qts_data *qts_data)
  967. {
  968. int rc = 0;
  969. struct trusted_touch_vm_info *vm_info;
  970. void *mem_cookie;
  971. rc = qts_populate_vm_info(qts_data);
  972. if (rc) {
  973. pr_err("Cannot setup vm pipeline\n");
  974. rc = -EINVAL;
  975. goto fail;
  976. }
  977. vm_info = qts_data->vm_info;
  978. #ifdef CONFIG_ARCH_QTI_VM
  979. mem_cookie = gh_mem_notifier_register(vm_info->mem_tag,
  980. qts_vm_mem_on_lend_handler, qts_data);
  981. if (!mem_cookie) {
  982. pr_err("Failed to register on lend mem notifier\n");
  983. rc = -EINVAL;
  984. goto init_fail;
  985. }
  986. vm_info->mem_cookie = mem_cookie;
  987. rc = gh_irq_wait_for_lend_v2(vm_info->irq_label, GH_PRIMARY_VM,
  988. &qts_vm_irq_on_lend_callback, qts_data);
  989. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_TVM_INIT);
  990. #else
  991. mem_cookie = gh_mem_notifier_register(vm_info->mem_tag,
  992. qts_vm_mem_on_release_handler, qts_data);
  993. if (!mem_cookie) {
  994. pr_err("Failed to register on release mem notifier\n");
  995. rc = -EINVAL;
  996. goto init_fail;
  997. }
  998. vm_info->mem_cookie = mem_cookie;
  999. qts_trusted_touch_set_vm_state(qts_data, TRUSTED_TOUCH_PVM_INIT);
  1000. #endif
  1001. return rc;
  1002. init_fail:
  1003. qts_vm_deinit(qts_data);
  1004. fail:
  1005. return rc;
  1006. }
  1007. static void qts_dt_parse_trusted_touch_info(struct qts_data *qts_data)
  1008. {
  1009. struct device_node *np = qts_data->dev->of_node;
  1010. int rc = 0;
  1011. const char *selection;
  1012. const char *environment;
  1013. rc = of_property_read_string(np, "qts,trusted-touch-mode", &selection);
  1014. if (rc) {
  1015. pr_err("No trusted touch mode selection made\n");
  1016. atomic_set(&qts_data->trusted_touch_mode,
  1017. TRUSTED_TOUCH_MODE_NONE);
  1018. return;
  1019. }
  1020. if (!strcmp(selection, "vm_mode")) {
  1021. atomic_set(&qts_data->trusted_touch_mode,
  1022. TRUSTED_TOUCH_VM_MODE);
  1023. pr_debug("Selected trusted touch mode to VM mode\n");
  1024. } else {
  1025. atomic_set(&qts_data->trusted_touch_mode,
  1026. TRUSTED_TOUCH_MODE_NONE);
  1027. pr_err("Invalid trusted_touch mode\n");
  1028. }
  1029. rc = of_property_read_string(np, "qts,touch-environment",
  1030. &environment);
  1031. if (rc)
  1032. pr_err("No trusted touch mode environment\n");
  1033. qts_data->touch_environment = environment;
  1034. qts_data->tui_supported = true;
  1035. pr_debug("Trusted touch environment:%s\n", qts_data->touch_environment);
  1036. }
  1037. static void qts_trusted_touch_init(struct qts_data *qts_data)
  1038. {
  1039. int rc = 0;
  1040. atomic_set(&qts_data->trusted_touch_initialized, 0);
  1041. qts_dt_parse_trusted_touch_info(qts_data);
  1042. if (atomic_read(&qts_data->trusted_touch_mode) == TRUSTED_TOUCH_MODE_NONE)
  1043. return;
  1044. init_completion(&qts_data->trusted_touch_powerdown);
  1045. /* Get clocks */
  1046. qts_data->core_clk = devm_clk_get(qts_data->dev->parent, "m-ahb");
  1047. if (IS_ERR(qts_data->core_clk)) {
  1048. qts_data->core_clk = NULL;
  1049. pr_err("core_clk is not defined\n");
  1050. }
  1051. qts_data->iface_clk = devm_clk_get(qts_data->dev->parent, "se-clk");
  1052. if (IS_ERR(qts_data->iface_clk)) {
  1053. qts_data->iface_clk = NULL;
  1054. pr_err("iface_clk is not defined\n");
  1055. }
  1056. if (atomic_read(&qts_data->trusted_touch_mode) ==
  1057. TRUSTED_TOUCH_VM_MODE) {
  1058. rc = qts_vm_init(qts_data);
  1059. if (rc)
  1060. pr_err("Failed to init VM\n");
  1061. }
  1062. atomic_set(&qts_data->trusted_touch_initialized, 1);
  1063. }
  1064. static bool qts_ts_is_primary(struct kobject *kobj)
  1065. {
  1066. char *path = NULL;
  1067. if (!kobj)
  1068. return true;
  1069. path = kobject_get_path(kobj, GFP_KERNEL);
  1070. if (strstr(path, "primary"))
  1071. return true;
  1072. else
  1073. return false;
  1074. }
  1075. static ssize_t trusted_touch_enable_show(struct kobject *kobj, struct kobj_attribute *attr,
  1076. char *buf)
  1077. {
  1078. struct qts_data *qts_data;
  1079. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1080. qts_data = &qts_data_entries->info[idx];
  1081. return scnprintf(buf, PAGE_SIZE, "%d",
  1082. atomic_read(&qts_data->trusted_touch_enabled));
  1083. }
  1084. static ssize_t trusted_touch_enable_store(struct kobject *kobj, struct kobj_attribute *attr,
  1085. const char *buf, size_t count)
  1086. {
  1087. struct qts_data *qts_data;
  1088. unsigned long value;
  1089. int err = 0;
  1090. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1091. if (count > 2)
  1092. return -EINVAL;
  1093. err = kstrtoul(buf, 10, &value);
  1094. if (err != 0)
  1095. return err;
  1096. qts_data = &qts_data_entries->info[idx];
  1097. if (!atomic_read(&qts_data->trusted_touch_initialized))
  1098. return -EIO;
  1099. pr_info("TUI trusted_touch_enable:%d\n", value);
  1100. #ifdef CONFIG_ARCH_QTI_VM
  1101. err = qts_handle_trusted_touch_tvm(qts_data, value);
  1102. if (err) {
  1103. pr_err("Failed to handle trusted touch in tvm\n");
  1104. return -EINVAL;
  1105. }
  1106. #else
  1107. err = qts_handle_trusted_touch_pvm(qts_data, value);
  1108. if (err) {
  1109. pr_err("Failed to handle trusted touch in pvm\n");
  1110. return -EINVAL;
  1111. }
  1112. #endif
  1113. err = count;
  1114. return err;
  1115. }
  1116. static ssize_t trusted_touch_event_show(struct kobject *kobj, struct kobj_attribute *attr,
  1117. char *buf)
  1118. {
  1119. struct qts_data *qts_data;
  1120. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1121. qts_data = &qts_data_entries->info[idx];
  1122. return scnprintf(buf, PAGE_SIZE, "%d",
  1123. atomic_read(&qts_data->trusted_touch_event));
  1124. }
  1125. static ssize_t trusted_touch_event_store(struct kobject *kobj, struct kobj_attribute *attr,
  1126. const char *buf, size_t count)
  1127. {
  1128. struct qts_data *qts_data;
  1129. unsigned long value;
  1130. int err = 0;
  1131. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1132. if (count > 2)
  1133. return -EINVAL;
  1134. err = kstrtoul(buf, 10, &value);
  1135. if (err != 0)
  1136. return err;
  1137. qts_data = &qts_data_entries->info[idx];
  1138. if (!atomic_read(&qts_data->trusted_touch_initialized))
  1139. return -EIO;
  1140. if (value)
  1141. return -EIO;
  1142. atomic_set(&qts_data->trusted_touch_event, value);
  1143. return count;
  1144. }
  1145. static ssize_t trusted_touch_type_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf)
  1146. {
  1147. struct qts_data *qts_data;
  1148. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1149. qts_data = &qts_data_entries->info[idx];
  1150. return scnprintf(buf, PAGE_SIZE, "%s", qts_data->vm_info->trusted_touch_type);
  1151. }
  1152. static ssize_t trusted_touch_device_path_show(struct kobject *kobj,
  1153. struct kobj_attribute *attr, char *buf)
  1154. {
  1155. struct qts_data *qts_data;
  1156. char *path = NULL;
  1157. u32 idx = qts_ts_is_primary(kobj) ? 0 : 1;
  1158. qts_data = &qts_data_entries->info[idx];
  1159. if (qts_data && qts_data->dev)
  1160. path = kobject_get_path(&qts_data->dev->kobj, GFP_KERNEL);
  1161. return scnprintf(buf, PAGE_SIZE, "%s", path ? path : "");
  1162. }
  1163. static struct kobj_attribute trusted_touch_enable_attr =
  1164. __ATTR(trusted_touch_enable, 0664, trusted_touch_enable_show, trusted_touch_enable_store);
  1165. static struct kobj_attribute trusted_touch_event_attr =
  1166. __ATTR(trusted_touch_event, 0664, trusted_touch_event_show, trusted_touch_event_store);
  1167. static struct kobj_attribute trusted_touch_type_attr =
  1168. __ATTR(trusted_touch_type, 0664, trusted_touch_type_show, NULL);
  1169. static struct kobj_attribute trusted_touch_device_path_attr =
  1170. __ATTR(trusted_touch_device_path, 0444, trusted_touch_device_path_show, NULL);
  1171. static struct attribute *qts_attributes[] = {
  1172. &trusted_touch_enable_attr.attr,
  1173. &trusted_touch_event_attr.attr,
  1174. &trusted_touch_type_attr.attr,
  1175. &trusted_touch_device_path_attr.attr,
  1176. NULL,
  1177. };
  1178. static struct attribute_group qts_attribute_group = {
  1179. .attrs = qts_attributes,
  1180. };
  1181. static int qts_create_sysfs(struct qts_data *qts_data)
  1182. {
  1183. int ret = 0;
  1184. struct kobject *qts_kobj;
  1185. struct kobject *client_kobj;
  1186. qts_kobj = &qts_data_entries->qts_kset->kobj;
  1187. if (qts_data->client_type == QTS_CLIENT_PRIMARY_TOUCH) {
  1188. client_kobj = kobject_create_and_add("primary", qts_kobj);
  1189. if (!client_kobj) {
  1190. pr_err("primary kobject_create_and_add failed\n");
  1191. return -ENOMEM;
  1192. }
  1193. ret = sysfs_create_group(client_kobj, &qts_attribute_group);
  1194. if (ret) {
  1195. pr_err("[EX]: sysfs_create_group() failed!!\n");
  1196. sysfs_remove_group(client_kobj, &qts_attribute_group);
  1197. return -ENOMEM;
  1198. }
  1199. } else if (qts_data->client_type == QTS_CLIENT_SECONDARY_TOUCH) {
  1200. client_kobj = kobject_create_and_add("secondary", qts_kobj);
  1201. if (!client_kobj) {
  1202. pr_err("secondary kobject_create_and_add failed\n");
  1203. return -ENOMEM;
  1204. }
  1205. ret = sysfs_create_group(client_kobj, &qts_attribute_group);
  1206. if (ret) {
  1207. pr_err("[EX]: sysfs_create_group() failed!!\n");
  1208. sysfs_remove_group(client_kobj, &qts_attribute_group);
  1209. return -ENOMEM;
  1210. }
  1211. }
  1212. pr_debug("sysfs_create_group() succeeded\n");
  1213. return ret;
  1214. }
  1215. static int qts_ts_check_dt(struct device_node *np)
  1216. {
  1217. int i;
  1218. int count;
  1219. struct device_node *node;
  1220. struct drm_panel *panel;
  1221. count = of_count_phandle_with_args(np, "panel", NULL);
  1222. if (count <= 0)
  1223. return 0;
  1224. for (i = 0; i < count; i++) {
  1225. node = of_parse_phandle(np, "panel", i);
  1226. panel = of_drm_find_panel(node);
  1227. of_node_put(node);
  1228. if (!IS_ERR(panel)) {
  1229. active_panel = panel;
  1230. return 0;
  1231. }
  1232. }
  1233. return PTR_ERR(panel);
  1234. }
  1235. static void qts_power_source_init(struct qts_data *qts_data)
  1236. {
  1237. qts_data->vdd = regulator_get(qts_data->dev, "vdd");
  1238. if (IS_ERR_OR_NULL(qts_data->vdd))
  1239. pr_debug("get vdd regulator failed\n");
  1240. qts_data->avdd = regulator_get(qts_data->dev, "avdd");
  1241. if (IS_ERR_OR_NULL(qts_data->avdd))
  1242. pr_debug("get avdd regulator failed\n");
  1243. }
  1244. #ifndef CONFIG_ARCH_QTI_VM
  1245. static int qts_enable_reg(struct qts_data *qts_data, bool enable)
  1246. {
  1247. int ret = 0;
  1248. if (IS_ERR_OR_NULL(qts_data->vdd)) {
  1249. pr_err("vdd is invalid\n");
  1250. return ret;
  1251. }
  1252. if (enable) {
  1253. ret = regulator_enable(qts_data->vdd);
  1254. if (ret) {
  1255. pr_err("enable vdd regulator failed,ret=%d\n", ret);
  1256. goto error;
  1257. }
  1258. if (!IS_ERR_OR_NULL(qts_data->avdd)) {
  1259. ret = regulator_enable(qts_data->avdd);
  1260. if (ret) {
  1261. pr_err("enable avdd regulator failed,ret=%d\n", ret);
  1262. goto error_avdd_en;
  1263. }
  1264. }
  1265. } else {
  1266. ret = regulator_disable(qts_data->vdd);
  1267. if (ret)
  1268. pr_err("disable vdd regulator failed,ret=%d\n", ret);
  1269. if (!IS_ERR_OR_NULL(qts_data->avdd)) {
  1270. ret = regulator_disable(qts_data->avdd);
  1271. if (ret)
  1272. pr_err("disable avdd regulator failed,ret=%d\n", ret);
  1273. }
  1274. }
  1275. pr_debug("enable %d completed\n", enable);
  1276. return ret;
  1277. error_avdd_en:
  1278. (void)regulator_disable(qts_data->vdd);
  1279. error:
  1280. return ret;
  1281. }
  1282. #endif
  1283. static void qts_ts_suspend(struct qts_data *qts_data)
  1284. {
  1285. int rc = 0;
  1286. if (qts_data->suspended) {
  1287. pr_warn("already in suspend state\n");
  1288. return;
  1289. }
  1290. if (qts_data->tui_supported) {
  1291. if (atomic_read(&qts_data->trusted_touch_transition)
  1292. || atomic_read(&qts_data->trusted_touch_enabled))
  1293. wait_for_completion_interruptible(&qts_data->trusted_touch_powerdown);
  1294. }
  1295. mutex_lock(&qts_data->transition_lock);
  1296. rc = qts_data->vendor_ops.suspend(qts_data->vendor_data);
  1297. if (rc)
  1298. pr_err("suspend failed, rc = %d\n", rc);
  1299. qts_data->suspended = true;
  1300. mutex_unlock(&qts_data->transition_lock);
  1301. }
  1302. static void qts_ts_resume(struct qts_data *qts_data)
  1303. {
  1304. int rc = 0;
  1305. if (!qts_data->suspended) {
  1306. pr_warn("Already in awake state\n");
  1307. return;
  1308. }
  1309. if (qts_data->tui_supported)
  1310. if (atomic_read(&qts_data->trusted_touch_transition))
  1311. wait_for_completion_interruptible(&qts_data->trusted_touch_powerdown);
  1312. mutex_lock(&qts_data->transition_lock);
  1313. rc = qts_data->vendor_ops.resume(qts_data->vendor_data);
  1314. if (rc)
  1315. pr_err("resume failed, rc = %d\n", rc);
  1316. qts_data->suspended = false;
  1317. mutex_unlock(&qts_data->transition_lock);
  1318. }
  1319. static void qts_resume_work(struct work_struct *work)
  1320. {
  1321. struct qts_data *qts_data = container_of(work, struct qts_data,
  1322. resume_work);
  1323. qts_ts_resume(qts_data);
  1324. }
  1325. static void qts_suspend_work(struct work_struct *work)
  1326. {
  1327. struct qts_data *qts_data = container_of(work, struct qts_data,
  1328. suspend_work);
  1329. qts_ts_suspend(qts_data);
  1330. }
  1331. static void qts_panel_notifier_callback(enum panel_event_notifier_tag tag,
  1332. struct panel_event_notification *notification, void *client_data)
  1333. {
  1334. struct qts_data *qts_data = client_data;
  1335. if (!notification) {
  1336. pr_err("Invalid notification\n");
  1337. return;
  1338. }
  1339. pr_debug("Notification type:%d, early_trigger:%d\n",
  1340. notification->notif_type, notification->notif_data.early_trigger);
  1341. switch (notification->notif_type) {
  1342. case DRM_PANEL_EVENT_UNBLANK:
  1343. if (notification->notif_data.early_trigger) {
  1344. pr_debug("resume notification pre commit\n");
  1345. } else {
  1346. if (qts_data->schedule_resume)
  1347. queue_work(qts_data->ts_workqueue, &qts_data->resume_work);
  1348. else
  1349. qts_ts_resume(qts_data);
  1350. }
  1351. break;
  1352. case DRM_PANEL_EVENT_BLANK:
  1353. if (notification->notif_data.early_trigger) {
  1354. if (qts_data->schedule_resume)
  1355. cancel_work_sync(&qts_data->resume_work);
  1356. if (qts_data->schedule_suspend)
  1357. queue_work(qts_data->ts_workqueue, &qts_data->suspend_work);
  1358. else
  1359. qts_ts_suspend(qts_data);
  1360. } else {
  1361. pr_debug("suspend notification post commit\n");
  1362. }
  1363. break;
  1364. case DRM_PANEL_EVENT_BLANK_LP:
  1365. pr_debug("received lp event\n");
  1366. break;
  1367. case DRM_PANEL_EVENT_FPS_CHANGE:
  1368. pr_debug("Received fps change old fps:%d new fps:%d\n",
  1369. notification->notif_data.old_fps,
  1370. notification->notif_data.new_fps);
  1371. break;
  1372. default:
  1373. pr_debug("notification serviced :%d\n",
  1374. notification->notif_type);
  1375. break;
  1376. }
  1377. }
  1378. static void qts_ts_register_for_panel_events(struct qts_data *qts_data)
  1379. {
  1380. void *cookie = NULL;
  1381. if (qts_data->client_type != QTS_CLIENT_PRIMARY_TOUCH) {
  1382. pr_err("Invalid touch type\n");
  1383. return;
  1384. }
  1385. cookie = panel_event_notifier_register(PANEL_EVENT_NOTIFICATION_PRIMARY,
  1386. PANEL_EVENT_NOTIFIER_CLIENT_PRIMARY_TOUCH, qts_data->panel,
  1387. &qts_panel_notifier_callback, qts_data);
  1388. if (!cookie) {
  1389. pr_err("Failed to register for panel events\n");
  1390. return;
  1391. }
  1392. pr_debug("registered for panel notifications panel: 0x%x\n", qts_data->panel);
  1393. qts_data->notifier_cookie = cookie;
  1394. }
  1395. int qts_client_register(struct qts_vendor_data qts_vendor_data)
  1396. {
  1397. struct qts_data *qts_data;
  1398. struct device_node *dp;
  1399. int rc = 0;
  1400. if (!qts_data_entries) {
  1401. pr_debug("QTS client register\n");
  1402. qts_data_entries = kzalloc(sizeof(*qts_data_entries), GFP_KERNEL);
  1403. if (!qts_data_entries) {
  1404. pr_err("mem allocation failed\n");
  1405. return -EPROBE_DEFER;
  1406. }
  1407. mutex_init(&qts_data_entries->qts_data_entries_lock);
  1408. qts_data_entries->qts_kset = kset_create_and_add("qts", NULL, kernel_kobj);
  1409. if (!qts_data_entries->qts_kset) {
  1410. pr_err("qts kset create failed\n");
  1411. return -ENOMEM;
  1412. }
  1413. }
  1414. mutex_lock(&qts_data_entries->qts_data_entries_lock);
  1415. if (qts_vendor_data.bus_type == QTS_BUS_TYPE_I2C)
  1416. dp = qts_vendor_data.client->dev.of_node;
  1417. else
  1418. dp = qts_vendor_data.spi->dev.of_node;
  1419. rc = qts_ts_check_dt(dp);
  1420. if (rc) {
  1421. pr_debug("qts_ts_check_dt failed, rc = %d\n", rc);
  1422. goto qts_register_end;
  1423. }
  1424. pr_debug("QTS client register starts\n");
  1425. qts_data = &qts_data_entries->info[qts_vendor_data.client_type];
  1426. qts_data->client = qts_vendor_data.client;
  1427. qts_data->spi = qts_vendor_data.spi;
  1428. if (qts_vendor_data.bus_type == QTS_BUS_TYPE_I2C)
  1429. qts_data->dev = &qts_data->client->dev;
  1430. else
  1431. qts_data->dev = &qts_data->spi->dev;
  1432. qts_data->bus_type = qts_vendor_data.bus_type;
  1433. qts_data->client_type = qts_vendor_data.client_type;
  1434. qts_data->dp = dp;
  1435. qts_data->vendor_data = qts_vendor_data.vendor_data;
  1436. qts_data->panel = active_panel;
  1437. qts_data->vendor_ops = qts_vendor_data.qts_vendor_ops;
  1438. qts_data->schedule_suspend = qts_vendor_data.schedule_suspend;
  1439. qts_data->schedule_resume = qts_vendor_data.schedule_resume;
  1440. qts_trusted_touch_init(qts_data);
  1441. mutex_init(&(qts_data->qts_clk_io_ctrl_mutex));
  1442. if (qts_data->tui_supported)
  1443. qts_create_sysfs(qts_data);
  1444. mutex_init(&qts_data->transition_lock);
  1445. #ifdef CONFIG_ARCH_QTI_VM
  1446. atomic_set(&qts_data->delayed_tvm_probe_pending, 1);
  1447. goto qts_register_end;
  1448. #else
  1449. atomic_set(&qts_data->delayed_pvm_probe_pending, 1);
  1450. #endif
  1451. qts_power_source_init(qts_data);
  1452. qts_data->ts_workqueue = create_singlethread_workqueue("qts_wq");
  1453. if (!qts_data->ts_workqueue)
  1454. pr_err("create qts workqueue fail\n");
  1455. if (qts_data->ts_workqueue && qts_data->schedule_resume)
  1456. INIT_WORK(&qts_data->resume_work, qts_resume_work);
  1457. if (qts_data->ts_workqueue && qts_data->schedule_suspend)
  1458. INIT_WORK(&qts_data->suspend_work, qts_suspend_work);
  1459. qts_ts_register_for_panel_events(qts_data);
  1460. qts_register_end:
  1461. pr_debug("client register end\n");
  1462. mutex_unlock(&qts_data_entries->qts_data_entries_lock);
  1463. return rc;
  1464. }
  1465. EXPORT_SYMBOL(qts_client_register);