Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp350102lqp; Wed, 12 Jun 2024 03:36:36 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX/zBaMfNvETtlYGZyCDSQ1HBDAsGuVrrEwXPvODBZJjQn2OHrEFqkLGWCbhbHT4Yg0zNVHxQ0Cb+6XqZxMk9eli4AGmnkDONBry8ygsA== X-Google-Smtp-Source: AGHT+IE115uUWy3VzxPbKh8SSjBUyh0umUMIv5/DP1fUMcdW2iSp9zgfxBvizYFIxkWHfKfXPbV0 X-Received: by 2002:a17:902:c943:b0:1f7:1ae1:cd7a with SMTP id d9443c01a7336-1f83b706045mr15757495ad.62.1718188596194; Wed, 12 Jun 2024 03:36:36 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718188596; cv=pass; d=google.com; s=arc-20160816; b=T2nQn9gAoIZHTrf2gHwPRq9qwB4YqDDxHhW7QRJyRKFyQdx0z0/rA0YYOZiFWrGOHd LajO3nAiv7OGG2hdYugJVhUvS4ZKVVkc1AgoFojh1UvZRGQQrpBxI0zY76abzA5JbQo3 voLI0AVsSUqJDAZbOrXX4Xgb5OdFjhZk94DrKsXqABCF6HO9K4VUs7Cg7HjO+f0eGIm6 wDuvw4bMvwt71T3SnFEVy0bzJmhCO6VzQ3QraEjQXdcE57lJ/xPiY14vbEEoR4o1wCff foaoyJd5eZXXJhk+xsDp9TduhzkDJgjI3l2Xz9nfTGWjz5UaZPzB0iWIncaZcnbjQcY+ mH/Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=d02wy5v1xc6q7sa77GxblQUsYPTMV6d6FIKeIFTSTQA=; fh=03lTUV3cOXWS0BJ5ABx0VvxhfmKMoC/xXUbSsQ2vys4=; b=AWBC8iuqHDVo1Bt+QjyU//uv32yyPoo9thuElF3pRPdz5jfe3TrFAhKrkqJBkmIvJQ xZdhR1HY1DF8yNSlagh1QI+xFHHdqeBE+Lff7LzpxTyPWxijaDA5aVSIWB5hrN7F8X+E ZiM1sx08zGP4kBx3UZsSeaj1la+BbajTllkW5QqM6OMmqcEy6RCCpZLTDX4FWmU9UlrT 2UU4HjMsaGQIsfqDVPVKBFysGqC+eSeUT29wN7dUhsr9Mpw2kXzBsb+E812tUSK+7XEW YjKsLMNz32qN7yqx+pP6E/mS5Z2SlH2wEdNpXAME13+qMMi+2P/wj2wuflRIorvNh7hf 5/PA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Mjygxd6K; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-211347-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-211347-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id d9443c01a7336-1f6bd760d07si72307885ad.10.2024.06.12.03.36.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Jun 2024 03:36:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-211347-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Mjygxd6K; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-211347-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-211347-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 2238EB20B17 for ; Wed, 12 Jun 2024 10:30:35 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 466271C6AE; Wed, 12 Jun 2024 10:30:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Mjygxd6K" Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 65AC52F50A; Wed, 12 Jun 2024 10:30:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.178 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718188225; cv=none; b=P05ex20fDcg30ySBj9kmcYoMAzMhiBbIZGchUx1ssbVcF77MXpVDEc5ATtugeY1PPhzagLqzAFrgzSXK7jOel0ECb6xB+GG2ZLJ0SiylkFXdQaQ+dZdxBVOCccObBD7yTS9YWv+J5Nu8ZgA6KkQHveph1BzD3xQ+VYmPq5KyRyA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718188225; c=relaxed/simple; bh=+6RMNPEfbepllDW2hPgoTfBjAURy5+wxegSER6D8p6c=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=XMAm5OZ2hLIbZbiIfpH9hCX0Y0lnVTJey+ajAlk4WrrWgsq57XlcV73As5tDoH9BEGTjf2b71Nrj+Ji0P6bYaXkDsY0PseDB8Y6YHJdpH1tdkFXteG+wPBH0EwmCiXblQwE0iyUM+1H//SIyw+2OHK5XHEksVanvvzQ29i7YFD0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Mjygxd6K; arc=none smtp.client-ip=209.85.210.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-7042882e741so3352843b3a.2; Wed, 12 Jun 2024 03:30:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718188223; x=1718793023; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=d02wy5v1xc6q7sa77GxblQUsYPTMV6d6FIKeIFTSTQA=; b=Mjygxd6K53uhdVxaXEpu6m6QlSDtgNfQY34GG1f7ftTuLH7H/JWPciO3WYUZvTxY4O u5v7a5ZkLDPogRSJN3F6tcV6xL1m5MVFG34Q0KamZjMjrdk4hr59fxPISVNvVtYHUdXG Qx+XuiU7qbkSVKWE9BfAWOTOJ3UDsQjRygjRAaysgvpGw7VPhAtumf7fsV4hlVTZSK3m 1sjQsy1m4S+jxD9JAwM69bmgh6BHLwiDW8YhGh3uEs/e/viExuXNWQcoT9PrF+OcEOw9 4ilRpnHXDQaWR3ZU7mrsL+NevyRWNsa2ACg9NhDDy/wZHlPt2gTeisfLNxaZWVYyaalQ 0NgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718188223; x=1718793023; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=d02wy5v1xc6q7sa77GxblQUsYPTMV6d6FIKeIFTSTQA=; b=tmEzvthv5Lci4JJAYhmfuh2Rr1im1BQQl6lu0n8S/dZywgOD5VddJ5shwWjYbT8Mp6 HFe8lVO7BFehEjB87QlwvKmkpQmkrJv9jswmTzXb7KcMg7B0R6SB6NMP+JYc0ru/LN9a kNFj+B923xI56qxjjhz1DEATCnyPuvWmD5FVczOEA6dZydomZq7LOWtoMRHkZOOHV2WO skyiZfBqLogqm+kV2PWBDMSjvyCd690QAyItQIpxjRlE5Q7aapFpVlQ259P0jl70gmkd kYxVPec7ffNQyDh/CK+9Uiki/xCT2Yjx5ZubqHYzhFBwrk6fvnJtawTI2wYit8wJqip2 Jt8A== X-Forwarded-Encrypted: i=1; AJvYcCUMh5sTxRcIwHFloNVNdZ1/cXz//dI4trDLzobtcB6zXcOthyBgmJLEYpPxHNP/sgiBOXtLH0NS8U0f8WUdtbBZEns5uHThswGqjPeQ4Tjvd3f8ujNMqpA4ebT0Eaq+BeiqOEx75oyHqgY= X-Gm-Message-State: AOJu0YzNVH9P2oFtGLYIYRwt3K75X2ef82ZRpmIcdPKlDgrLkEY8ADSG AxLZIdKRUatpw/xEKt7fnXomoHAU64TP1AMUX14dMI80UB5WhAmC X-Received: by 2002:a05:6a20:a11b:b0:1af:cc75:3f79 with SMTP id adf61e73a8af0-1b8ab6ab340mr1613478637.55.1718188222341; Wed, 12 Jun 2024 03:30:22 -0700 (PDT) Received: from ux-UP-WHL01 ([120.237.109.178]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7041a748da2sm8213594b3a.169.2024.06.12.03.30.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Jun 2024 03:30:21 -0700 (PDT) Date: Wed, 12 Jun 2024 18:30:11 +0800 From: Charles Wang To: Dmitry Torokhov Cc: jikos@kernel.org, bentiss@kernel.org, hbarnor@chromium.org, dianders@chromium.org, linux-input@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] HID: hid-goodix: Add Goodix HID-over-SPI driver Message-ID: References: <20240607133709.3518-1-charles.goodix@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Hi Dmitry, Thank you very much for your kind review and advice. On Fri, Jun 07, 2024 at 11:59:06AM -0700, Dmitry Torokhov wrote: > > +struct goodix_ts_data { > > + struct device *dev; > > + struct spi_device *spi; > > + struct hid_device *hid; > > + struct goodix_hid_desc hid_desc; > > + > > + struct gpio_desc *reset_gpio; > > + u32 hid_report_addr; > > + > > + /* lock for hid raw request operation */ > > + struct mutex hid_request_lock; > > + /* lock for reg read write operations */ > > + struct mutex reg_rw_lock; > > + u32 spi_xfer_max_sz; > > + /* buffer used to store hid report event */ > > + u8 event_buf[SZ_4K] ____cacheline_aligned; > > Why does this have to be cacheline aligned? I do not think it is > directly involved in the transfers. > Yes, you are right; sorry for the misuse. > Also, 4K is quite a bit of data. How often does the device send more > than 1 report? Maybe you should do what i2c-hid does and scan reports > for the maximum report size and use it to allocate sufficiently sized > buffer(s)? See drivers/hid/i2c-hid/i2c-hid-core.c::i2c_hid_start(). > The device sends heatmap data along with touch reports whenever there is a touch event. The length of the heatmap data is not fixed; it varies depending on the screen size and the number of touch points. Even though we know the input data length won't exceed 4K bytes, parsing the reports to determine the maximum length seems more reasonable. I will change this to allocate memory accordingly, rather than using the fixed 4K length. > > + /* buffer used to do spi data transfer */ > > + u8 xfer_buf[GOODIX_HID_MAX_PKG_SIZE] ____cacheline_aligned; > > +}; > > + > > +static int goodix_spi_read(struct goodix_ts_data *ts, u32 addr, > > + u8 *data, unsigned int len) > > Maybe make data void * so callers do not need to cast? Also maybe size_t > for len? > Ack. > > +{ > > + struct spi_device *spi = to_spi_device(&ts->spi->dev); > > + struct spi_transfer xfers; > > + struct spi_message spi_msg; > > + int error; > > + > > + if (GOODIX_SPI_READ_PREFIX_LEN + len > ts->spi_xfer_max_sz) { > > + dev_err(ts->dev, "read data len exceed limit %d", > > + ts->spi_xfer_max_sz - GOODIX_SPI_READ_PREFIX_LEN); > > + return -EINVAL; > > + } > > + > > + mutex_lock(&ts->reg_rw_lock); > > This can be written as > > guard(mutex)(&ts->reg_rw_lock); > > and you do not need to explicitly unlock the mutex at the end of the > function. You can also safely return early and the mutex will be > unlocked. > Ack, this is great. > > + /* buffer format: 0xF1 + addr(4bytes) + dummy(3bytes) + data */ > > + ts->xfer_buf[0] = GOODIX_SPI_READ_FLAG; > > + put_unaligned_be32(addr, ts->xfer_buf + GOODIX_SPI_TRANS_PREFIX_LEN); > > + > > + spi_message_init(&spi_msg); > > + memset(&xfers, 0, sizeof(xfers)); > > + xfers.tx_buf = ts->xfer_buf; > > + xfers.rx_buf = ts->xfer_buf; > > + xfers.len = GOODIX_SPI_READ_PREFIX_LEN + len; > > + spi_message_add_tail(&xfers, &spi_msg); > > + > > + error = spi_sync(spi, &spi_msg); > > + if (error) > > + dev_err(ts->dev, "spi transfer error:%d", error); > > "error: %d" > Ack. > > + else > > + memcpy(data, ts->xfer_buf + GOODIX_SPI_READ_PREFIX_LEN, len); > > + > > + mutex_unlock(&ts->reg_rw_lock); > > + return error; > > +} > > + > > +static int goodix_spi_write(struct goodix_ts_data *ts, u32 addr, > > + u8 *data, unsigned int len) > > const void *data > Ack. > > +{ > > + struct spi_device *spi = to_spi_device(&ts->spi->dev); > > + struct spi_transfer xfers; > > + struct spi_message spi_msg; > > + int error; > > + > > + if (GOODIX_SPI_WRITE_PREFIX_LEN + len > ts->spi_xfer_max_sz) { > > + dev_err(ts->dev, "write data len exceed limit %d", > > + ts->spi_xfer_max_sz - GOODIX_SPI_WRITE_PREFIX_LEN); > > + return -EINVAL; > > + } > > + > > + mutex_lock(&ts->reg_rw_lock); > > guard(mutex)(&ts->reg_rw_lock); > Ack. > > + /* buffer format: 0xF0 + addr(4bytes) + data */ > > + ts->xfer_buf[0] = GOODIX_SPI_WRITE_FLAG; > > + put_unaligned_be32(addr, ts->xfer_buf + GOODIX_SPI_TRANS_PREFIX_LEN); > > + memcpy(ts->xfer_buf + GOODIX_SPI_WRITE_PREFIX_LEN, data, len); > > + > > + spi_message_init(&spi_msg); > > + memset(&xfers, 0, sizeof(xfers)); > > + xfers.tx_buf = ts->xfer_buf; > > + xfers.len = GOODIX_SPI_WRITE_PREFIX_LEN + len; > > + spi_message_add_tail(&xfers, &spi_msg); > > + > > + error = spi_sync(spi, &spi_msg); > > + if (error) > > + dev_err(ts->dev, "spi transfer error:%d", error); > > + > > + mutex_unlock(&ts->reg_rw_lock); > > + return error; > > +} > > + > > +static int goodix_dev_confirm(struct goodix_ts_data *ts) > > +{ > > + u8 tx_buf[8], rx_buf[8]; > > + int retry = 3; > > + int error; > > + > > + gpiod_set_value_cansleep(ts->reset_gpio, 0); > > + usleep_range(4000, 4100); > > + > > + memset(tx_buf, GOODIX_DEV_CONFIRM_VAL, sizeof(tx_buf)); > > + while (retry--) { > > + error = goodix_spi_write(ts, GOODIX_DEV_CONFIRM_ADDR, > > + tx_buf, sizeof(tx_buf)); > > + if (error) > > + return error; > > + > > + error = goodix_spi_read(ts, GOODIX_DEV_CONFIRM_ADDR, > > + rx_buf, sizeof(rx_buf)); > > + if (error) > > + return error; > > + > > + if (!memcmp(tx_buf, rx_buf, sizeof(tx_buf))) > > + return 0; > > + > > + usleep_range(5000, 5100); > > + } > > + > > + dev_err(ts->dev, "device confirm failed, rx_buf:%*ph", 8, rx_buf); > > + return -EINVAL; > > +} > > + > > +/** > > + * goodix_hid_parse() - hid-core .parse() callback > > + * @hid: hid device instance > > + * > > + * This function gets called during call to hid_add_device > > + * > > + * Return: 0 on success and non zero on error > > + */ > > +static int goodix_hid_parse(struct hid_device *hid) > > +{ > > + struct goodix_ts_data *ts = hid->driver_data; > > + u8 *rdesc __free(kfree); > > This is not proper use of this. rdesc will contain garbage (not NULL), > so if rsize check below failed we'll get a nasty surprise. > Ack, thanks. > > + u16 rsize; > > + int error; > > + > > + rsize = le16_to_cpu(ts->hid_desc.report_desc_lenght); > > + if (!rsize || rsize > HID_MAX_DESCRIPTOR_SIZE) { > > + dev_err(ts->dev, "invalid report desc size %d", rsize); > > + return -EINVAL; > > + } > > + > > + rdesc = kzalloc(rsize, GFP_KERNEL); > > + if (!rdesc) > > + return -ENOMEM; > > Linus said that for pointers annotated with __free() he prefers > combining declaration with allocation, like this: > > u8 *rdesc __free(kfree) = kzalloc(rsize, GFP_KERNEL); > if (!rdesc) > return -ENOMEM; > Ack. > > + > > + error = goodix_spi_read(ts, GOODIX_HID_REPORT_DESC_ADDR, rdesc, rsize); > > + if (error) { > > + dev_err(ts->dev, "failed get report desc, %d", error); > > + return error; > > + } > > + > > + error = hid_parse_report(hid, rdesc, rsize); > > + if (error) > > + dev_err(ts->dev, "failed parse report, %d", error); > > + > > + return error; > > I am not sure what Benjamin and Jiri prefer, but my preference is to > explicitly return error or 0 instead of returning "error" in both > success and failure cases, especially when there are multiple failure > points in a function. So: > > error = hid_parse_report(hid, rdesc, rsize); > if (error) { > dev_err(ts->dev, "failed parse report, %d", error); > return error; > } > > return 0; > Ack. Return 0 here seems clearer than returning "error". > > +} > > + > > +/* Empty callbacks with success return code */ > > +static int goodix_hid_start(struct hid_device *hid) > > +{ > > + return 0; > > +} > > + > > +static void goodix_hid_stop(struct hid_device *hid) > > +{ > > +} > > + > > +static int goodix_hid_open(struct hid_device *hid) > > +{ > > + return 0; > > +} > > + > > +static void goodix_hid_close(struct hid_device *hid) > > +{ > > +} > > + > > +/* Return date length of response data */ > > +static int goodix_hid_check_ack_status(struct goodix_ts_data *ts) > > +{ > > + struct goodix_hid_report_header hdr; > > + int retry = 20; > > + int error; > > + > > + while (retry--) { > > + /* > > + * 3 bytes of hid request response data > > + * - byte 0: Ack flag, value of 1 for data ready > > + * - bytes 1-2: Response data length > > + */ > > + error = goodix_spi_read(ts, ts->hid_report_addr, > > + (u8 *)&hdr, sizeof(hdr)); > > + if (!error && (hdr.flag & GOODIX_HID_ACK_READY_FLAG)) > > + return le16_to_cpu(hdr.size); > > + > > + /* Wait 10ms for another try */ > > + usleep_range(10000, 11000); > > + } > > + > > + return -EINVAL; > > +} > > + > > +/** > > + * goodix_hid_get_raw_report() - Process hidraw GET REPORT operation > > + * @hid: hid device instance > > + * @reportnum: Report ID > > + * @buf: Buffer for store the reprot date > > + * @len: Length fo reprot data > > + * @report_type: Report type > > + * > > + * The function for hid_ll_driver.get_raw_report to handle the HIDRAW ioctl > > + * get report request. The transmitted data follows the standard i2c-hid > > + * protocol with a specified header. > > + * > > + * Return: The length of the data in the buf on success, negative error code > > + */ > > +static int goodix_hid_get_raw_report(struct hid_device *hid, > > + unsigned char reportnum, > > + __u8 *buf, size_t len, > > + unsigned char report_type) > > I think u8 for report type is better. It is not a character but a > number. > Ack. > > +{ > > + struct goodix_ts_data *ts = hid->driver_data; > > + u16 data_register = le16_to_cpu(ts->hid_desc.data_register); > > + u16 cmd_register = le16_to_cpu(ts->hid_desc.cmd_register); > > + u8 tmp_buf[GOODIX_HID_MAX_INBUF_SIZE]; > > + int tx_len = 0, args_len = 0; > > + int response_data_len; > > + u8 args[3]; > > + int error; > > + > > + if (report_type == HID_OUTPUT_REPORT) > > + return -EINVAL; > > + > > + if (reportnum == 3) { > > + /* Get win8 signature data */ > > + error = goodix_spi_read(ts, GOODIX_HID_SIGN_ADDR, buf, len); > > + if (error) { > > + dev_err(ts->dev, "failed get win8 sign:%d", error); > > + return -EINVAL; > > + } > > + return len; > > + } > > + > > + if (reportnum >= 0x0F) > > + args[args_len++] = reportnum; > > + > > + put_unaligned_le16(data_register, args + args_len); > > + args_len += sizeof(data_register); > > + > > + /* Clean 3 bytes of hid ack header data */ > > + memset(tmp_buf, 0, GOODIX_HID_ACK_HEADER_SIZE); > > + tx_len += GOODIX_HID_ACK_HEADER_SIZE; > > + > > + put_unaligned_le16(cmd_register, tmp_buf + tx_len); > > + tx_len += sizeof(cmd_register); > > + > > + tmp_buf[tx_len] = (report_type == HID_FEATURE_REPORT ? 0x03 : 0x01) << 4; > > + tmp_buf[tx_len] |= reportnum >= 0x0F ? 0x0F : reportnum; > > + tx_len++; > > + > > + tmp_buf[tx_len++] = GOODIX_HID_GET_REPORT_CMD; > > + > > + memcpy(tmp_buf + tx_len, args, args_len); > > + tx_len += args_len; > > + > > + /* Step1: write report request info */ > > + error = goodix_spi_write(ts, ts->hid_report_addr, tmp_buf, tx_len); > > + if (error) { > > + dev_err(ts->dev, "failed send read feature cmd, %d", error); > > + return error; > > + } > > + > > + /* No need read response data */ > > + if (!len) > > + return 0; > > + > > + /* Step2: check response data status */ > > + response_data_len = goodix_hid_check_ack_status(ts); > > + if (response_data_len <= GOODIX_HID_PKG_LEN_SIZE) > > + return -EINVAL; > > + > > + len = min(len, response_data_len - GOODIX_HID_PKG_LEN_SIZE); > > + /* Step3: read response data(skip 2bytes of hid pkg length) */ > > + error = goodix_spi_read(ts, ts->hid_report_addr + > > + GOODIX_HID_ACK_HEADER_SIZE + > > + GOODIX_HID_PKG_LEN_SIZE, buf, len); > > + if (error) { > > + dev_err(ts->dev, "failed read hid response data, %d", error); > > + return error; > > + } > > + > > + if (buf[0] != reportnum) { > > + dev_err(ts->dev, "incorrect reprot (%d vs %d expected)", > > s/reprot/report/ > Ack. > > + buf[0], reportnum); > > + return -EINVAL; > > + } > > + return len; > > +} > > + > > +/** > > + * goodix_hid_set_raw_report() - process hidraw SET REPORT operation > > + * @hid: HID device > > + * @reportnum: Report ID > > + * @buf: Buffer for communication > > + * @len: Length of data in the buffer > > + * @report_type: Report type > > + * > > + * The function for hid_ll_driver.get_raw_report to handle the HIDRAW ioctl > > + * set report request. The transmitted data follows the standard i2c-hid > > + * protocol with a specified header. > > + * > > + * Return: The length of the data sent, negative error code on failure > > + */ > > +static int goodix_hid_set_raw_report(struct hid_device *hid, > > + unsigned char reportnum, > > + __u8 *buf, size_t len, > > + unsigned char report_type) > > +{ > > + struct goodix_ts_data *ts = hid->driver_data; > > + u16 data_register = le16_to_cpu(ts->hid_desc.data_register); > > + u16 cmd_register = le16_to_cpu(ts->hid_desc.cmd_register); > > + int tx_len = 0, args_len = 0; > > + u8 tmp_buf[GOODIX_HID_MAX_INBUF_SIZE]; > > + u8 args[5]; > > + int error; > > + > > + if (reportnum >= 0x0F) { > > + args[args_len++] = reportnum; > > + reportnum = 0x0F; > > + } > > + > > + put_unaligned_le16(data_register, args + args_len); > > + args_len += sizeof(data_register); > > + > > + put_unaligned_le16(GOODIX_HID_PKG_LEN_SIZE + len, args + args_len); > > + args_len += GOODIX_HID_PKG_LEN_SIZE; > > + > > + /* Clean 3 bytes of hid ack header data */ > > + memset(tmp_buf, 0, GOODIX_HID_ACK_HEADER_SIZE); > > + tx_len += GOODIX_HID_ACK_HEADER_SIZE; > > + > > + put_unaligned_le16(cmd_register, tmp_buf + tx_len); > > + tx_len += sizeof(cmd_register); > > + > > + tmp_buf[tx_len++] = ((report_type == HID_FEATURE_REPORT ? 0x03 : 0x02) << 4) | reportnum; > > + tmp_buf[tx_len++] = GOODIX_HID_SET_REPORT_CMD; > > + > > + memcpy(tmp_buf + tx_len, args, args_len); > > + tx_len += args_len; > > + > > + memcpy(tmp_buf + tx_len, buf, len); > > + tx_len += len; > > + > > + error = goodix_spi_write(ts, ts->hid_report_addr, tmp_buf, tx_len); > > + if (error) { > > + dev_err(ts->dev, "failed send report %*ph", tx_len, tmp_buf); > > + return error; > > + } > > + return len; > > +} > > + > > +static int goodix_hid_raw_request(struct hid_device *hid, > > + unsigned char reportnum, > > + __u8 *buf, size_t len, > > + unsigned char rtype, int reqtype) > > +{ > > + struct goodix_ts_data *ts = hid->driver_data; > > + int error = -EINVAL; > > + > > + mutex_lock(&ts->hid_request_lock); > > guard(mutex)(&ts->hid_request_lock); > Ack. > > + switch (reqtype) { > > + case HID_REQ_GET_REPORT: > > + error = goodix_hid_get_raw_report(hid, reportnum, buf, > > + len, rtype); > > + break; > > + case HID_REQ_SET_REPORT: > > + if (buf[0] == reportnum) > > + error = goodix_hid_set_raw_report(hid, reportnum, > > + buf, len, rtype); > > + break; > > + default: > > + break; > > + } > > + mutex_unlock(&ts->hid_request_lock); > > + > > + return error; > > +} > > + > > +static struct hid_ll_driver goodix_hid_ll_driver = { > > + .parse = goodix_hid_parse, > > + .start = goodix_hid_start, > > + .stop = goodix_hid_stop, > > + .open = goodix_hid_open, > > + .close = goodix_hid_close, > > + .raw_request = goodix_hid_raw_request > > +}; > > + > > +static irqreturn_t goodix_hid_irq(int irq, void *data) > > +{ > > + struct goodix_ts_data *ts = data; > > + struct goodix_hid_report_event event; > > + struct goodix_hid_report_package *pkg; > > + u16 report_size; > > + int error; > > + > > + /* > > + * First, read buffer with space for header and coordinate package: > > + * - event header = 3 bytes > > + * - coordinate event = GOODIX_HID_COOR_PKG_LEN bytes > > + * > > + * If the data size info in the event header exceeds > > + * GOODIX_HID_COOR_PKG_LEN, it means that there are other packages > > + * besides the coordinate package. > > + */ > > + error = goodix_spi_read(ts, ts->hid_report_addr, (u8 *)&event, > > Drop cast. > Ack. > > + sizeof(event)); > > + if (error) { > > + dev_err(ts->dev, "failed get coordinate data, %d", error); > > + return IRQ_HANDLED; > > + } > > + > > + /* Check coordinate data valid falg */ > > + if (event.hdr.flag != GOODIX_HID_REPORT_READY_FLAG) { > > + dev_err(ts->dev, "invalid event flag 0x%x", event.hdr.flag); > > + return IRQ_HANDLED; > > + } > > + > > + pkg = (struct goodix_hid_report_package *)event.data; > > + hid_input_report(ts->hid, HID_INPUT_REPORT, pkg->data, > > + le16_to_cpu(pkg->size) - GOODIX_HID_PKG_LEN_SIZE, 1); > > + > > + report_size = le16_to_cpu(event.hdr.size); > > + /* Check if there are other packages */ > > + if (report_size <= GOODIX_HID_COOR_PKG_LEN) > > + return IRQ_HANDLED; > > + > > + if (report_size - GOODIX_HID_COOR_PKG_LEN > sizeof(ts->event_buf)) { > > + dev_err(ts->dev, "invalid package size, %d", report_size); > > + return IRQ_HANDLED; > > + } > > + > > + /* Read the package behind the coordinate data */ > > + error = goodix_spi_read(ts, ts->hid_report_addr + sizeof(event), > > + ts->event_buf, > > + report_size - GOODIX_HID_COOR_PKG_LEN); > > + if (error) { > > + dev_err(ts->dev, "failed read data, %d", error); > > + return IRQ_HANDLED; > > + } > > + > > + pkg = (struct goodix_hid_report_package *)ts->event_buf; > > + hid_input_report(ts->hid, HID_INPUT_REPORT, pkg->data, > > + le16_to_cpu(pkg->size) - GOODIX_HID_PKG_LEN_SIZE, 1); > > + > > + return IRQ_HANDLED; > > +} > > + > > +static int goodix_hid_init(struct goodix_ts_data *ts) > > +{ > > + struct hid_device *hid; > > + int error; > > + > > + /* Get hid descriptor */ > > + error = goodix_spi_read(ts, GOODIX_HID_DESC_ADDR, (u8 *)&ts->hid_desc, > > Drop cast. > Ack. > > + sizeof(ts->hid_desc)); > > + if (error) { > > + dev_err(ts->dev, "failed get hid desc, %d", error); > > + return error; > > + } > > + > > + hid = hid_allocate_device(); > > + if (IS_ERR(hid)) > > + return PTR_ERR(hid); > > + > > + hid->driver_data = ts; > > + hid->ll_driver = &goodix_hid_ll_driver; > > + hid->bus = BUS_SPI; > > + hid->dev.parent = &ts->spi->dev; > > + > > + hid->version = le16_to_cpu(ts->hid_desc.bcd_version); > > + hid->vendor = le16_to_cpu(ts->hid_desc.vendor_id); > > + hid->product = le16_to_cpu(ts->hid_desc.product_id); > > + snprintf(hid->name, sizeof(hid->name), "%s %04X:%04X", "hid-gdix", > > + hid->vendor, hid->product); > > + > > + error = hid_add_device(hid); > > + if (error) { > > + dev_err(ts->dev, "failed add hid device, %d", error); > > + hid_destroy_device(hid); > > + return error; > > + } > > + > > + ts->hid = hid; > > + return 0; > > +} > > + > > +static int goodix_spi_probe(struct spi_device *spi) > > +{ > > + struct device *dev = &spi->dev; > > + struct goodix_ts_data *ts; > > + int error; > > + > > + /* init spi_device */ > > + spi->mode = SPI_MODE_0; > > + spi->bits_per_word = 8; > > + error = spi_setup(spi); > > + if (error) > > + return error; > > + > > + ts = devm_kzalloc(dev, sizeof(*ts), GFP_KERNEL); > > + if (!ts) > > + return -ENOMEM; > > + > > + mutex_init(&ts->hid_request_lock); > > + mutex_init(&ts->reg_rw_lock); > > + spi_set_drvdata(spi, ts); > > + if (spi->controller->max_transfer_size) > > + ts->spi_xfer_max_sz = spi->controller->max_transfer_size(spi); > > + else > > + ts->spi_xfer_max_sz = GOODIX_HID_MAX_PKG_SIZE; > > + > > + ts->spi_xfer_max_sz = min(GOODIX_HID_MAX_PKG_SIZE, ts->spi_xfer_max_sz); > > + ts->spi = spi; > > + ts->dev = dev; > > + ts->reset_gpio = devm_gpiod_get_optional(dev, "reset", GPIOD_OUT_HIGH); > > + if (IS_ERR(ts->reset_gpio)) > > + return dev_err_probe(dev, PTR_ERR(ts->reset_gpio), > > + "failed to request reset gpio\n"); > > + > > + error = device_property_read_u32(dev, "hid-report-addr", > > + &ts->hid_report_addr); > > This will require device binding document. Well, we needed it anyway to > describe the reset GPIO. You should add regulator handling as well. > Ack. I will add the reset GPIO and "hid-report-addr" to the device binding document. However, regarding the regulator handling, on my x86 platform, the device regulator is controlled through ACPI. I think we can address the regulator information in the future when it becomes necessary to control it within the driver. > > + if (error) > > + return dev_err_probe(dev, error, > > + "failed get hid report addr\n"); > > + > > + error = goodix_dev_confirm(ts); > > + if (error) > > + return error; > > + > > + /* Waits 150ms for firmware to fully boot */ > > + msleep(GOODIX_NORMAL_RESET_DELAY_MS); > > + > > + error = goodix_hid_init(ts); > > + if (error) { > > + dev_err(dev, "failed init hid device"); > > + return error; > > + } > > + > > + error = devm_request_threaded_irq(&ts->spi->dev, ts->spi->irq, > > + NULL, goodix_hid_irq, IRQF_ONESHOT, > > + "goodix_spi_hid", ts); > > I think we still have an issue. The hid device is "added" to hid bus in > goodix_hid_init(). Immediately HID bus will attempt to match the HID > device and HID driver, start the low level transport (i.e. us), and try > to interrogate and initiate the device. That means that interrupts need > to be working already. However we only request IRQ after returning from > goodix_hid_init(), which is too late. > > Please take a look at how i2c-hid driver allocates HID device, requests > IRQ, and then calls to hid_add_device(). Also see how it checks for > I2C_HID_STARTED flags in the interrupt routine to see of the data needs > to be reported to the HID subsystem. > After re-checking the i2c-hid driver, I found that there is only one scenario where interrupts need to be functional already, which is while waiting for the hardware reset done event. In our case, this confirmation mechanism is not necessary. Once the GOODIX_NORMAL_RESET_DELAY_MS delay is complete, the device is fully ready without requiring an additional hardware reset to confirm its status. Therefore, enabling the IRQ service after hid_add_device() should be safe. > > + if (error < 0) { > > if (error) > Ack. > > + dev_err(ts->dev, "could not register interrupt, irq = %d, %d", > > + ts->spi->irq, error); > > + goto err_destroy_hid; > > + } > > + > > + return 0; > > + > > +err_destroy_hid: > > + hid_destroy_device(ts->hid); > > + return error; > > +} > > + > > +static void goodix_spi_remove(struct spi_device *spi) > > +{ > > + struct goodix_ts_data *ts = spi_get_drvdata(spi); > > + > > + disable_irq(spi->irq); > > + hid_destroy_device(ts->hid); > > Here we again need to make sure interrupts are working while the device > is being used but the HID subsystem, but make sure we are not trying to > service interrupts once device is fully gone. > Same as above. I think keeping the interrupts working is unnecessary in this case. > > +} > > + > > +static void goodix_spi_shutdown(struct spi_device *spi) > > +{ > > + struct goodix_ts_data *ts = spi_get_drvdata(spi); > > + > > + disable_irq(spi->irq); > > + hid_destroy_device(ts->hid); > > Same as above. > Same as above. > > +} > > + > > +#ifdef CONFIG_ACPI > > +static const struct acpi_device_id goodix_spi_acpi_match[] = { > > + { "GXTS7986" }, > > + { }, > > +}; > > +MODULE_DEVICE_TABLE(acpi, goodix_spi_acpi_match); > > +#endif > > + > > +static struct spi_driver goodix_spi_driver = { > > + .driver = { > > + .name = "goodix-spi-hid", > > + .acpi_match_table = ACPI_PTR(goodix_spi_acpi_match), > > + }, > > + .probe = goodix_spi_probe, > > + .remove = goodix_spi_remove, > > + .shutdown = goodix_spi_shutdown, > > +}; > > +module_spi_driver(goodix_spi_driver); > > + > > +MODULE_DESCRIPTION("Goodix SPI driver for HID touchscreen"); > > +MODULE_AUTHOR("Goodix, Inc."); > > +MODULE_LICENSE("GPL"); > > -- > > 2.43.0 > > > Thanks Charles