Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp3138800rwe; Mon, 29 Aug 2022 06:32:45 -0700 (PDT) X-Google-Smtp-Source: AA6agR7oglPsJoSDV0171tgMLRYB1SDfpo8etECc/VzdNBsCw3s1aTIJdAR9zKu/sWUVQ+jk/Bnn X-Received: by 2002:a63:e352:0:b0:42b:dc03:cc38 with SMTP id o18-20020a63e352000000b0042bdc03cc38mr6252327pgj.545.1661779965664; Mon, 29 Aug 2022 06:32:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661779965; cv=none; d=google.com; s=arc-20160816; b=RS4tvuO7p5FEby2P2SsTMvw3nCvJJINonNJSkG3t1vwzEC1GBsXihrVwn66L3Sy9eD OuXlZ1Wq9GQXWL+nIvORum8l+9S6U7HC9zZPTYE/r2Afu6cfl51mLM+uf9fBjwESy4V8 o8ReEGkq+Mtv2kHCpRU2J6fl66tv9paB4ktszHwT1eerCEjcOA8HIC3IerfCjk4Y6cTL CsKirjdUdGOcv+K6sA1zPOvPMOk98GqzuANLy4v75JTAmSOpV/7ZR+yFLZDYlrSKAP4G c6PtU9n0vjcq3AfdBfcVd9Q5hf5BWfWZe2he+P3NMl5WEQLhDR9frM3S8FJ77nZ8KBCF d1bA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=5eZ7mkfq6j+q1a7mdrin220/wQX9Go8LzAbqIxrAOQM=; b=lviUV6OO5ibfIK79QxtEornLeLq964zMfHVUwL3247uu0gkQpwqVtgAKrN4LH9gg8P q7G+BF8VD/MGs0j5Tw8832uic8c8Xg/c4O6njL2xSIRqjWCqMuP027SXpCQY3wpuD+gp fRkS/OYqa/Jja3F9jpjrA8/t+SMrR+uJ+pl36JIUuR6zFbKorJVFiFwCGBLvz4qKImtz 2uCCj3UGtAfH9Nt/fLRdAda4/KTy95H/bJgNHIHYkkgdSBItm4M5xeq+SsetpmF/SNvp TYGdYvUMRBmN5fhEVDQ7Ag2PnZawWNR+MdyMROs5EdFG3UfxV5vyCyB1qEciLYVA5AMo jBxg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=analog.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n16-20020a170902e55000b00174d8e0b0fesi2276595plf.128.2022.08.29.06.32.34; Mon, 29 Aug 2022 06:32:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=analog.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229645AbiH2NR5 (ORCPT + 99 others); Mon, 29 Aug 2022 09:17:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229996AbiH2NRJ (ORCPT ); Mon, 29 Aug 2022 09:17:09 -0400 Received: from mx0a-00128a01.pphosted.com (mx0a-00128a01.pphosted.com [148.163.135.77]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5E611760D5; Mon, 29 Aug 2022 06:16:39 -0700 (PDT) Received: from pps.filterd (m0167089.ppops.net [127.0.0.1]) by mx0a-00128a01.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 27TDCjKr025947; Mon, 29 Aug 2022 09:15:16 -0400 Received: from nwd2mta4.analog.com ([137.71.173.58]) by mx0a-00128a01.pphosted.com (PPS) with ESMTPS id 3j7g673cex-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 29 Aug 2022 09:15:16 -0400 Received: from ASHBMBX9.ad.analog.com (ASHBMBX9.ad.analog.com [10.64.17.10]) by nwd2mta4.analog.com (8.14.7/8.14.7) with ESMTP id 27TDFEYo019143 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 29 Aug 2022 09:15:14 -0400 Received: from ASHBMBX9.ad.analog.com (10.64.17.10) by ASHBMBX9.ad.analog.com (10.64.17.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 29 Aug 2022 09:15:13 -0400 Received: from zeus.spd.analog.com (10.66.68.11) by ashbmbx9.ad.analog.com (10.64.17.10) with Microsoft SMTP Server id 15.2.986.14 via Frontend Transport; Mon, 29 Aug 2022 09:15:13 -0400 Received: from nsa.ad.analog.com ([10.44.3.68]) by zeus.spd.analog.com (8.15.1/8.15.1) with ESMTP id 27TDEeiT026449; Mon, 29 Aug 2022 09:15:07 -0400 From: =?UTF-8?q?Nuno=20S=C3=A1?= To: , Bartosz Golaszewski , Dmitry Torokhov , , , Linus Walleij , , =?UTF-8?q?Nuno=20S=C3=A1?= CC: Andy Shevchenko , Rob Herring , Krzysztof Kozlowski , Michael Hennerich Subject: [PATCH v4 09/10] input: keyboard: adp5588-keys: add regulator support Date: Mon, 29 Aug 2022 15:15:52 +0200 Message-ID: <20220829131553.690063-10-nuno.sa@analog.com> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220829131553.690063-1-nuno.sa@analog.com> References: <20220829131553.690063-1-nuno.sa@analog.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-ADIRuleOP-NewSCL: Rule Triggered X-Proofpoint-ORIG-GUID: clsoeNKjQ21THGFVUMapKnKaSDBEQI4m X-Proofpoint-GUID: clsoeNKjQ21THGFVUMapKnKaSDBEQI4m X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-08-29_07,2022-08-25_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 lowpriorityscore=0 spamscore=0 phishscore=0 mlxlogscore=999 malwarescore=0 impostorscore=0 mlxscore=0 adultscore=0 bulkscore=0 suspectscore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2207270000 definitions=main-2208290061 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Support feeding VCC through a regulator. Signed-off-by: Nuno Sá Reviewed-by: Andy Shevchenko --- drivers/input/keyboard/adp5588-keys.c | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/drivers/input/keyboard/adp5588-keys.c b/drivers/input/keyboard/adp5588-keys.c index b2bb7c6702e1..0e6f4a47bb9c 100644 --- a/drivers/input/keyboard/adp5588-keys.c +++ b/drivers/input/keyboard/adp5588-keys.c @@ -24,6 +24,7 @@ #include #include #include +#include #include #include @@ -711,12 +712,18 @@ static int adp5588_fw_parse(struct adp5588_kpad *kpad) return 0; } +static void adp5588_disable_regulator(void *reg) +{ + regulator_disable(reg); +} + static int adp5588_probe(struct i2c_client *client, const struct i2c_device_id *id) { struct adp5588_kpad *kpad; struct input_dev *input; struct gpio_desc *gpio; + struct regulator *vcc; unsigned int revid; int ret; int error; @@ -742,6 +749,18 @@ static int adp5588_probe(struct i2c_client *client, if (error) return error; + vcc = devm_regulator_get(&client->dev, "vcc"); + if (IS_ERR(vcc)) + return PTR_ERR(vcc); + + ret = regulator_enable(vcc); + if (ret) + return ret; + + ret = devm_add_action_or_reset(&client->dev, adp5588_disable_regulator, vcc); + if (ret) + return ret; + gpio = devm_gpiod_get_optional(&client->dev, "reset", GPIOD_OUT_HIGH); if (IS_ERR(gpio)) return PTR_ERR(gpio); -- 2.37.2