Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp408454rwb; Sat, 14 Jan 2023 02:27:10 -0800 (PST) X-Google-Smtp-Source: AMrXdXs7CPYoT3+nqw4CdH++0meaFaUobitaMQ/MCWOS+w9q/TATBuBYRr63/Ky684jbHly5TQGC X-Received: by 2002:a05:6402:4518:b0:46c:b2a7:1e03 with SMTP id ez24-20020a056402451800b0046cb2a71e03mr65750634edb.36.1673692030579; Sat, 14 Jan 2023 02:27:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673692030; cv=none; d=google.com; s=arc-20160816; b=oGLHs6c55E+OjI3wJ36lPyL8B5rO9x2bnnIRILhpeT4K04L8l/Mq3ZN92HHDGQm3xa LZDXLXxFBT0QLjd+LCmqDj0nNudhHgP6AlJA71tSG7HH3GnrcT0g229ERm2QXFbq+aZE 7hpexQYlFmy0zxiPtYz8951cvVJCuyWLlgL16Xp2+VhoklHE3sVe87HXt5mde4AXA0YP CgPqRf84YqUDVFmxshxTyD9UDmz8XR88ZqCl96t1gCarDxYMhkQmhM5JOYPaIkWqkN9w YClCmWHnmrg8wGKhhZHTlcGzv1qTb6Gs6p3nfreD7r9e1U/9QeCBttdc4lPLTlOGcXUU 4I/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=Wht8S1tiS6ErGYffBA+FLaploIN0PjL9TJxJ3obSUDA=; b=KkF3JYniE6UpqUVWVuHEEEvnVS4rJDif9JFtFSIy/pECub5uMYfhQRq5PxEY1LsGzE bOTuvRej9roLOLBBYiCgwWNICFqlzkuZMW1bncSKgk3bG+eaU5cP/ohiChChCwXFDF3G l0IC+nT86T2TaH/N1zrnSjsAY6wcexyA6ooQ/e41xI2zHCSu5/XgNZU/0x9lonq4XdXS CE142LiTdgCDLKBadjp7gFLuOjDpVo2dH1oIGaVfZmG7yn7XHqDHBNxPxzhSeL2R6xlF Jmr8CUP+frwoYqHwfD7I7W4dCC/ew9rhiFvcuZGbeobNSDUPhO/vO7hR191UzFsUxXo3 zcnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="Z/8q2PzU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u21-20020a05640207d500b00499b335829bsi17199386edy.447.2023.01.14.02.26.57; Sat, 14 Jan 2023 02:27:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="Z/8q2PzU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229935AbjANJdB (ORCPT + 51 others); Sat, 14 Jan 2023 04:33:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229954AbjANJcz (ORCPT ); Sat, 14 Jan 2023 04:32:55 -0500 Received: from mail-yw1-x1149.google.com (mail-yw1-x1149.google.com [IPv6:2607:f8b0:4864:20::1149]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 83711659E for ; Sat, 14 Jan 2023 01:32:53 -0800 (PST) Received: by mail-yw1-x1149.google.com with SMTP id 00721157ae682-4ce566db73eso183129077b3.11 for ; Sat, 14 Jan 2023 01:32:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=Wht8S1tiS6ErGYffBA+FLaploIN0PjL9TJxJ3obSUDA=; b=Z/8q2PzUfv9PKvdmJmcLjsg8n4iQHcKVOk6G3Ddl89b5u0C4uEcKPoZcQtFWPfIIdH u5f03xp2lY+Ip0mFFmXlfTc7Pif5hbcQWn1tvvYh7/igqsDYUCzKNjZ2TvDAOMLAsltd gEfqkT0lfSqWCP8708YA4KW+IBKJ3JAYA2P31Rxe4YWrKCUfnInlq0d8+K4fsRQ6/3RX +xNL97CW2qJ14y5NlrQu4NzSREdRjnPv4Bjlot9tDaUcdGLMPL2HmSnG365NBr+SjQHR Dv6JCWljLibe2siOw3gktwitNWQ6Ju/T6wuyc3eOJIiL+8Gj1vrbnMdo2qTuDc7Acadq bCQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Wht8S1tiS6ErGYffBA+FLaploIN0PjL9TJxJ3obSUDA=; b=Vco3+A04jmTdWgvYxR6SCs0AlK+OvjdfMm3R7lnjDg2hSIsWcb00QD897Mbwb6C8RB rMZKgMhU9zEnbIKVtOpfqLhICEdU7mXZqA8bgoi56eotXMsaObQ0eEmE0hvncjVGZ85u rPX75GUkfHQwRGE/jXe+Im4WycqnIfJs/whhZySEu0zpsy7HVxaO8AxgIChPpXFKG5Me ZcwVWpyIiryMGP2jz4hygs7b4htWF3+2qaq7y7QFMQs3mmTMVzPLGIPOSk2/SDHJa2hB 0aPpt9G6HTwumPNYZeAt2LPac2fzIzy/Tto1Stpr3BGnE5OXLV2Xi3rJMbSY9jv5DdfA KRfQ== X-Gm-Message-State: AFqh2krn/KguanCh21CTDxZ5+cLmaG2+gLvel2FEEhiXO8aSuVD0+g8X d34diU9R3eCaavv5ni+wsxpFSrJwv18= X-Received: from badhri.mtv.corp.google.com ([2620:15c:211:201:d726:232e:7cc0:6434]) (user=badhri job=sendgmr) by 2002:a05:690c:857:b0:38b:17c4:4297 with SMTP id bz23-20020a05690c085700b0038b17c44297mr3608057ywb.446.1673688772790; Sat, 14 Jan 2023 01:32:52 -0800 (PST) Date: Sat, 14 Jan 2023 01:32:45 -0800 In-Reply-To: <20230114093246.1933321-1-badhri@google.com> Mime-Version: 1.0 References: <20230114093246.1933321-1-badhri@google.com> X-Mailer: git-send-email 2.39.0.314.g84b9a713c41-goog Message-ID: <20230114093246.1933321-2-badhri@google.com> Subject: [PATCH v13 2/3] usb: typec: tcpci: Add callback for evaluating contaminant presence From: Badhri Jagan Sridharan To: Guenter Roeck , Heikki Krogerus , Greg Kroah-Hartman Cc: linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, Kyle Tso , Badhri Jagan Sridharan Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This change adds callback to evaluate presence of contaminant in the TCPCI layer. Signed-off-by: Badhri Jagan Sridharan --- Changes since v12: * None Changes since v11: * None Changes since v10: * None Changes since v9: * Check for presence of low level check_contaminant before installing tcpc.check_contaminant. Changes since v7: * None. Skipped versions by mistake. Changes since v6: * Removed is_potential_contaminant callback Changes since v5: * None Changes since v4: * None Changes since v3: * None Changes since v2: * Added tcpci_is_potential_contaminant to offload * disconnect_while_debounce logic --- drivers/usb/typec/tcpm/tcpci.c | 11 +++++++++++ include/linux/usb/tcpci.h | 7 +++++++ 2 files changed, 18 insertions(+) diff --git a/drivers/usb/typec/tcpm/tcpci.c b/drivers/usb/typec/tcpm/tcpci.c index fe781a38dc82..699539e1be06 100644 --- a/drivers/usb/typec/tcpm/tcpci.c +++ b/drivers/usb/typec/tcpm/tcpci.c @@ -403,6 +403,14 @@ static void tcpci_frs_sourcing_vbus(struct tcpc_dev *dev) tcpci->data->frs_sourcing_vbus(tcpci, tcpci->data); } +static void tcpci_check_contaminant(struct tcpc_dev *dev) +{ + struct tcpci *tcpci = tcpc_to_tcpci(dev); + + if (tcpci->data->check_contaminant) + tcpci->data->check_contaminant(tcpci, tcpci->data); +} + static int tcpci_set_bist_data(struct tcpc_dev *tcpc, bool enable) { struct tcpci *tcpci = tcpc_to_tcpci(tcpc); @@ -778,6 +786,9 @@ struct tcpci *tcpci_register_port(struct device *dev, struct tcpci_data *data) tcpci->tcpc.frs_sourcing_vbus = tcpci_frs_sourcing_vbus; tcpci->tcpc.set_partner_usb_comm_capable = tcpci_set_partner_usb_comm_capable; + if (tcpci->data->check_contaminant) + tcpci->tcpc.check_contaminant = tcpci_check_contaminant; + if (tcpci->data->auto_discharge_disconnect) { tcpci->tcpc.enable_auto_vbus_discharge = tcpci_enable_auto_vbus_discharge; tcpci->tcpc.set_auto_vbus_discharge_threshold = diff --git a/include/linux/usb/tcpci.h b/include/linux/usb/tcpci.h index 17657451c762..85e95a3251d3 100644 --- a/include/linux/usb/tcpci.h +++ b/include/linux/usb/tcpci.h @@ -188,6 +188,12 @@ struct tcpci; * Optional; The USB Communications Capable bit indicates if port * partner is capable of communication over the USB data lines * (e.g. D+/- or SS Tx/Rx). Called to notify the status of the bit. + * @check_contaminant: + * Optional; The callback is invoked when chiplevel drivers indicated + * that the USB port needs to be checked for contaminant presence. + * Chip level drivers are expected to check for contaminant and call + * tcpm_clean_port when the port is clean to put the port back into + * toggling state. */ struct tcpci_data { struct regmap *regmap; @@ -204,6 +210,7 @@ struct tcpci_data { void (*frs_sourcing_vbus)(struct tcpci *tcpci, struct tcpci_data *data); void (*set_partner_usb_comm_capable)(struct tcpci *tcpci, struct tcpci_data *data, bool capable); + void (*check_contaminant)(struct tcpci *tcpci, struct tcpci_data *data); }; struct tcpci *tcpci_register_port(struct device *dev, struct tcpci_data *data); -- 2.39.0.314.g84b9a713c41-goog