Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp3525686pxb; Mon, 4 Oct 2021 04:21:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzB4cdaU6jBTaD6/5o1llTPH4tAns/HoYZZsH6EslwDqsQWEbhJc3Tetb1xceRjRvsqs4Am X-Received: by 2002:a05:6402:203:: with SMTP id t3mr17844806edv.69.1633346470569; Mon, 04 Oct 2021 04:21:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633346470; cv=none; d=google.com; s=arc-20160816; b=CMDwa/dbom/SG+J50oCGjUCxdnLZ4ZWZvos7UMaKhgmCV5scuonVCiiEdgTcOKqGus anNAJCxiiktfEKYyZkNliRc/j/wynhlKDJDclypSYY4soeg1swrdM5OpbTNaF8ITnW8P XinlKsUEBTC/SQiMbB8W6SCJw0ptFApC/eYR4wT4s/vHX+9C/hrTXl3z1S9mpcaKlsE3 z4FAobM7ivKiO/zVAEUfvllVGesxJXBgWcM8DBo/YR8jSQCL0S/VobvQGBmpPJv9PAad XOwR9p2CRvXH77GycaBvtNmgjt2XcqBfHfRawJuqBpPifJkF9sHBJx2w5PHwc6BCnvk/ XR/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:references:in-reply-to :message-id:date:subject:cc:to:from:dmarc-filter:sender :dkim-signature; bh=0RAe+3S3JeUWw2zt5cNOBuJKBWv0d+4nYdbQ5SstmLI=; b=ebXzkO7UYbw3XAM4Ry8cWeqUdnFMIjwyWTIwjVRU9sZ6q1NwjXbo1DQJeg2mKeSZct /M/aCznguYm1VZ76g3IO8HX5eXFn2cTuWsOdtBtZgqySy5saE25X7G3cMDYjFcmbroGp k5X6CPEwG3//vOae2U1EU33WKRYKW49YE/TJjBDmnFE1GP862oe+/rjcseVArX8LQSEl HIjQ61yBRHN6mKRRa+54fKc4LPmqH52ZhmvOzToRDKVWc1PRXIgmLxhHFzHDKz2FHbSB Vac3imJOzxWxDCQGbTy01K/vX7AXtXuTKscxmIWhU/69Bv5bsmPmyHdX232YAxWb6jsm YXsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b="rUJS/5Lk"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 10si17461977ejt.595.2021.10.04.04.20.47; Mon, 04 Oct 2021 04:21:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b="rUJS/5Lk"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233101AbhJDLT2 (ORCPT + 99 others); Mon, 4 Oct 2021 07:19:28 -0400 Received: from so254-9.mailgun.net ([198.61.254.9]:30903 "EHLO so254-9.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233034AbhJDLTS (ORCPT ); Mon, 4 Oct 2021 07:19:18 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1633346249; h=References: In-Reply-To: References: In-Reply-To: Message-Id: Date: Subject: Cc: To: From: Sender; bh=0RAe+3S3JeUWw2zt5cNOBuJKBWv0d+4nYdbQ5SstmLI=; b=rUJS/5Lk4Xu6yUu077JFvNGQ9PIPywVRZFgeHk4UeMDvUqmzbJ2+qk6hIQfWNMnu72XADWEZ 0cqrfbG9tkPBazyZAlJTsfBL6e4Drd+UQ29FY37d6+LHJexuKn//PxhDN8Z3P1NLFgmuoIvE 4DiRxzjIzdqRbBWhfavMZd1c5XQ= X-Mailgun-Sending-Ip: 198.61.254.9 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n02.prod.us-east-1.postgun.com with SMTP id 615ae2b48578ef11ed7dad12 (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Mon, 04 Oct 2021 11:17:08 GMT Sender: schowdhu=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 94E90C4361A; Mon, 4 Oct 2021 11:17:07 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00,SPF_FAIL, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from blr-ubuntu-525.qualcomm.com (blr-bdr-fw-01_GlobalNAT_AllZones-Outside.qualcomm.com [103.229.18.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: schowdhu) by smtp.codeaurora.org (Postfix) with ESMTPSA id 0879AC4361B; Mon, 4 Oct 2021 11:17:00 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 smtp.codeaurora.org 0879AC4361B Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=fail smtp.mailfrom=codeaurora.org From: Souradeep Chowdhury To: linux-arm-msm@vger.kernel.org, linux-usb@vger.kernel.org, devicetree@vger.kernel.org, Bryan O'Donoghue , Bjorn Andersson , Greg KH Cc: linux-kernel@vger.kernel.org, ckadabi@codeaurora.org, tsoni@codeaurora.org, bryanh@codeaurora.org, psodagud@codeaurora.org, satyap@codeaurora.org, pheragu@codeaurora.org, Rajendra Nayak , Sibi Sankar , Sai Prakash Ranjan , Souradeep Chowdhury Subject: [PATCH V0 4/7] usb: common: eud: Added the driver support for Embedded USB Debugger(EUD) Date: Mon, 4 Oct 2021 16:46:22 +0530 Message-Id: X-Mailer: git-send-email 2.7.4 In-Reply-To: References: In-Reply-To: References: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add support for control peripheral of EUD (Embedded USB Debugger) to listen to events such as USB attach/detach, pet EUD to indicate software is functional.Reusing the platform device kobj, sysfs entry 'enable' is created to enable or disable EUD. To enable the eud the following needs to be done echo 1 > /sys/bus/platform/.../enable To disable eud, following is the command echo 0 > /sys/bus/platform/.../enable Signed-off-by: Souradeep Chowdhury --- Documentation/ABI/testing/sysfs-driver-eud | 7 + drivers/usb/common/Kconfig | 9 + drivers/usb/common/Makefile | 1 + drivers/usb/common/qcom_eud.c | 256 +++++++++++++++++++++++++++++ 4 files changed, 273 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-driver-eud create mode 100644 drivers/usb/common/qcom_eud.c diff --git a/Documentation/ABI/testing/sysfs-driver-eud b/Documentation/ABI/testing/sysfs-driver-eud new file mode 100644 index 0000000..14a02da --- /dev/null +++ b/Documentation/ABI/testing/sysfs-driver-eud @@ -0,0 +1,7 @@ +What: /sys/bus/platform/.../enable +Date: October 2021 +Contact: Souradeep Chowdhury +Description: + The Enable/Disable sysfs interface for Embedded + USB Debugger(EUD).This enables and disables the + EUD based on a 1 or a 0 value. diff --git a/drivers/usb/common/Kconfig b/drivers/usb/common/Kconfig index 5e8a04e..669b3fe 100644 --- a/drivers/usb/common/Kconfig +++ b/drivers/usb/common/Kconfig @@ -50,3 +50,12 @@ config USB_CONN_GPIO To compile the driver as a module, choose M here: the module will be called usb-conn-gpio.ko + +config USB_QCOM_EUD + tristate "USB EUD Driver" + select USB_ROLE_SWITCH + help + This module enables support for Qualcomm Technologies, Inc. + Embedded USB Debugger (EUD). The EUD is a control peripheral + which reports VBUS attach/detach events and has USB-based + debug and trace capabilities. diff --git a/drivers/usb/common/Makefile b/drivers/usb/common/Makefile index 8ac4d21..eb66045 100644 --- a/drivers/usb/common/Makefile +++ b/drivers/usb/common/Makefile @@ -11,3 +11,4 @@ usb-common-$(CONFIG_USB_LED_TRIG) += led.o obj-$(CONFIG_USB_CONN_GPIO) += usb-conn-gpio.o obj-$(CONFIG_USB_OTG_FSM) += usb-otg-fsm.o obj-$(CONFIG_USB_ULPI_BUS) += ulpi.o +obj-$(CONFIG_USB_QCOM_EUD) += qcom_eud.o diff --git a/drivers/usb/common/qcom_eud.c b/drivers/usb/common/qcom_eud.c new file mode 100644 index 0000000..7a92fff --- /dev/null +++ b/drivers/usb/common/qcom_eud.c @@ -0,0 +1,256 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (c) 2015-2021, The Linux Foundation. All rights reserved. + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#define EUD_REG_INT1_EN_MASK 0x0024 +#define EUD_REG_INT_STATUS_1 0x0044 +#define EUD_REG_CTL_OUT_1 0x0074 +#define EUD_REG_VBUS_INT_CLR 0x0080 +#define EUD_REG_CSR_EUD_EN 0x1014 +#define EUD_REG_SW_ATTACH_DET 0x1018 +#define EUD_REG_EUD_EN2 0x0000 + +#define EUD_ENABLE BIT(0) +#define EUD_INT_PET_EUD BIT(0) +#define EUD_INT_VBUS BIT(2) +#define EUD_INT_SAFE_MODE BIT(4) +#define EUD_INT_ALL (EUD_INT_VBUS|EUD_INT_SAFE_MODE) + +struct eud_chip { + struct device *dev; + struct usb_role_switch *role_sw; + void __iomem *eud_reg_base; + void __iomem *eud_mode_mgr2_phys_base; + unsigned int int_status; + int enable; + int eud_irq; + bool usb_attach; + +}; + +static int enable_eud(struct eud_chip *priv) +{ + writel(EUD_ENABLE, priv->eud_reg_base + EUD_REG_CSR_EUD_EN); + writel(EUD_INT_VBUS | EUD_INT_SAFE_MODE, + priv->eud_reg_base + EUD_REG_INT1_EN_MASK); + writel(1, priv->eud_mode_mgr2_phys_base + EUD_REG_EUD_EN2); + + return usb_role_switch_set_role(priv->role_sw, USB_ROLE_DEVICE); +} + +static void disable_eud(struct eud_chip *priv) +{ + writel(0, priv->eud_reg_base + EUD_REG_CSR_EUD_EN); + writel(0, priv->eud_mode_mgr2_phys_base + EUD_REG_EUD_EN2); +} + +static ssize_t enable_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct eud_chip *chip = dev_get_drvdata(dev); + + return sprintf(buf, "%d", chip->enable); +} + +static ssize_t enable_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t count) +{ + struct eud_chip *chip = dev_get_drvdata(dev); + unsigned long enable; + int ret; + + if (kstrtoul(buf, 16, &enable)) + return -EINVAL; + + if (enable == 1) { + ret = enable_eud(chip); + if (!ret) + chip->enable = enable; + } else if (enable == 0) { + disable_eud(chip); + } else { + return -EINVAL; + } + + return count; +} + +static DEVICE_ATTR_RW(enable); + +static const struct device_attribute *eud_attrs[] = { + &dev_attr_enable, + NULL, +}; + +static void usb_attach_detach(struct eud_chip *chip) +{ + u32 reg; + + /* read ctl_out_1[4] to find USB attach or detach event */ + reg = readl(chip->eud_reg_base + EUD_REG_CTL_OUT_1); + if (reg & EUD_INT_SAFE_MODE) + chip->usb_attach = true; + else + chip->usb_attach = false; + + /* set and clear vbus_int_clr[0] to clear interrupt */ + writel(BIT(0), chip->eud_reg_base + EUD_REG_VBUS_INT_CLR); + writel(0, chip->eud_reg_base + EUD_REG_VBUS_INT_CLR); +} + +static void pet_eud(struct eud_chip *chip) +{ + u32 reg; + int ret; + + /* read sw_attach_det[0] to find attach/detach event */ + reg = readl(chip->eud_reg_base + EUD_REG_SW_ATTACH_DET); + if (reg & EUD_INT_PET_EUD) { + /* Detach & Attach pet for EUD */ + writel(0, chip->eud_reg_base + EUD_REG_SW_ATTACH_DET); + /* Delay to make sure detach pet is done before attach pet */ + ret = readl_poll_timeout(chip->eud_reg_base + EUD_REG_SW_ATTACH_DET, + reg, (reg == 0), 1, 100); + if (ret) { + dev_err(chip->dev, "Detach pet failed\n"); + return; + } + + writel(EUD_INT_PET_EUD, chip->eud_reg_base + + EUD_REG_SW_ATTACH_DET); + } else { + /* Attach pet for EUD */ + writel(EUD_INT_PET_EUD, chip->eud_reg_base + + EUD_REG_SW_ATTACH_DET); + } +} + +static irqreturn_t handle_eud_irq(int irq, void *data) +{ + struct eud_chip *chip = data; + u32 reg; + + /* read status register and find out which interrupt triggered */ + reg = readl(chip->eud_reg_base + EUD_REG_INT_STATUS_1); + switch (reg & EUD_INT_ALL) { + case EUD_INT_VBUS: + chip->int_status = EUD_INT_VBUS; + usb_attach_detach(chip); + return IRQ_WAKE_THREAD; + case EUD_INT_SAFE_MODE: + pet_eud(chip); + break; + default: + return IRQ_NONE; + } + return IRQ_HANDLED; +} + +static irqreturn_t handle_eud_irq_thread(int irq, void *data) +{ + struct eud_chip *chip = data; + int ret; + + if (chip->int_status == EUD_INT_VBUS) { + if (chip->usb_attach) + ret = usb_role_switch_set_role(chip->role_sw, USB_ROLE_DEVICE); + else + ret = usb_role_switch_set_role(chip->role_sw, USB_ROLE_HOST); + if (ret) + dev_err(chip->dev, "failed to set role switch\n"); + } + + return IRQ_HANDLED; +} + +static int eud_probe(struct platform_device *pdev) +{ + struct eud_chip *chip; + int ret; + + chip = devm_kzalloc(&pdev->dev, sizeof(*chip), GFP_KERNEL); + if (!chip) + return -ENOMEM; + + chip->dev = &pdev->dev; + + chip->role_sw = usb_role_switch_get(chip->dev); + if (IS_ERR(chip->role_sw)) { + if (PTR_ERR(chip->role_sw) != -EPROBE_DEFER) + dev_err(chip->dev, "failed to get role switch\n"); + + return PTR_ERR(chip->role_sw); + } + + chip->eud_reg_base = devm_platform_ioremap_resource(pdev, 0); + if (IS_ERR(chip->eud_reg_base)) + return PTR_ERR(chip->eud_reg_base); + + chip->eud_mode_mgr2_phys_base = devm_platform_ioremap_resource(pdev, 1); + if (IS_ERR(chip->eud_mode_mgr2_phys_base)) + return PTR_ERR(chip->eud_mode_mgr2_phys_base); + + chip->eud_irq = platform_get_irq(pdev, 0); + ret = devm_request_threaded_irq(&pdev->dev, chip->eud_irq, handle_eud_irq, + handle_eud_irq_thread, IRQF_ONESHOT, NULL, chip); + if (ret) + return ret; + + device_init_wakeup(&pdev->dev, true); + enable_irq_wake(chip->eud_irq); + + platform_set_drvdata(pdev, chip); + + ret = device_create_file(&pdev->dev, eud_attrs[0]); + + return ret; +} + +static int eud_remove(struct platform_device *pdev) +{ + struct eud_chip *chip = platform_get_drvdata(pdev); + + if (chip->enable) + disable_eud(chip); + + device_remove_file(&pdev->dev, eud_attrs[0]); + device_init_wakeup(&pdev->dev, false); + disable_irq_wake(chip->eud_irq); + + return 0; +} + +static const struct of_device_id eud_dt_match[] = { + { .compatible = "qcom,usb-connector-eud" }, + { } +}; +MODULE_DEVICE_TABLE(of, eud_dt_match); + +static struct platform_driver eud_driver = { + .probe = eud_probe, + .remove = eud_remove, + .driver = { + .name = "eud", + .of_match_table = eud_dt_match, + }, +}; +module_platform_driver(eud_driver); + +MODULE_DESCRIPTION("QTI EUD driver"); +MODULE_LICENSE("GPL v2"); -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation