Changes in 4.9.199 dm snapshot: use mutex instead of rw_semaphore dm snapshot: introduce account_start_copy() and account_end_copy() dm snapshot: rework COW throttling to fix deadlock dm: Use kzalloc for all structs with embedded biosets/mempools sc16is7xx: Fix for "Unexpected interrupt: 8" HID: i2c-hid: add Direkt-Tek DTLAPY133-1 to descriptor override x86/cpu: Add Atom Tremont (Jacobsville) HID: i2c-hid: Add Odys Winbook 13 to descriptor override scripts/setlocalversion: Improve -dirty check with git-status --no-optional-locks usb: handle warm-reset port requests on hub resume rtc: pcf8523: set xtal load capacitance from DT exec: load_script: Do not exec truncated interpreter path iio: fix center temperature of bmc150-accel-core perf map: Fix overlapped map handling perf jevents: Fix period for Intel fixed counters staging: rtl8188eu: fix null dereference when kzalloc fails RDMA/iwcm: Fix a lock inversion issue gpio: max77620: Use correct unit for debounce times fs: cifs: mute -Wunused-const-variable message serial: mctrl_gpio: Check for NULL pointer efi/cper: Fix endianness of PCIe class code efi/x86: Do not clean dummy variable in kexec path ocfs2: clear zero in unaligned direct IO fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry() fs: ocfs2: fix a possible null-pointer dereference in ocfs2_write_end_nolock() fs: ocfs2: fix a possible null-pointer dereference in ocfs2_info_scan_inode_alloc() MIPS: fw: sni: Fix out of bounds init of o32 stack NFSv4: Fix leak of clp->cl_acceptor string s390/uaccess: avoid (false positive) compiler warnings tracing: Initialize iter->seq after zeroing in tracing_read_pipe() USB: legousbtower: fix a signedness bug in tower_probe() thunderbolt: Use 32-bit writes when writing ring producer/consumer ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe() fuse: flush dirty data/metadata before non-truncate setattr fuse: truncate pending writes on O_TRUNC ALSA: bebob: Fix prototype of helper function to return negative value UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather segments") USB: gadget: Reject endpoints with 0 maxpacket value usb-storage: Revert commit 747668dbc061 ("usb-storage: Set virt_boundary_mask to avoid SG overflows") USB: ldusb: fix ring-buffer locking USB: ldusb: fix control-message timeout USB: serial: whiteheat: fix potential slab corruption USB: serial: whiteheat: fix line-speed endianness HID: i2c-hid: add Trekstor Primebook C11B to descriptor override HID: Fix assumption that devices have inputs HID: fix error message in hid_open_report() nl80211: fix validation of mesh path nexthop s390/cmm: fix information leak in cmm_timeout_handler() rtlwifi: Fix potential overflow on P2P code dmaengine: cppi41: Fix cppi41_dma_prep_slave_sg() when idle llc: fix sk_buff leak in llc_sap_state_process() llc: fix sk_buff leak in llc_conn_service() bonding: fix potential NULL deref in bond_update_slave_arr net: usb: sr9800: fix uninitialized local variable sch_netem: fix rcu splat in netem_enqueue() sctp: fix the issue that flags are ignored when using kernel_connect sctp: not bind the socket in sctp_connect xfs: Correctly invert xfs_buftarg LRU isolation logic ALSA: timer: Follow standard EXPORT_SYMBOL() declarations ALSA: timer: Limit max instances per timer ALSA: timer: Simplify error path in snd_timer_open() ALSA: timer: Fix mutex deadlock at releasing card Revert "ALSA: hda: Flush interrupts on disabling" Linux 4.9.199 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
154 lines
3.7 KiB
C
154 lines
3.7 KiB
C
/*
|
|
* Force feedback support for Zeroplus based devices
|
|
*
|
|
* Copyright (c) 2005, 2006 Anssi Hannula <anssi.hannula@gmail.com>
|
|
*/
|
|
|
|
/*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
|
|
#include <linux/hid.h>
|
|
#include <linux/input.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/module.h>
|
|
|
|
#include "hid-ids.h"
|
|
|
|
#ifdef CONFIG_ZEROPLUS_FF
|
|
|
|
struct zpff_device {
|
|
struct hid_report *report;
|
|
};
|
|
|
|
static int zpff_play(struct input_dev *dev, void *data,
|
|
struct ff_effect *effect)
|
|
{
|
|
struct hid_device *hid = input_get_drvdata(dev);
|
|
struct zpff_device *zpff = data;
|
|
int left, right;
|
|
|
|
/*
|
|
* The following is specified the other way around in the Zeroplus
|
|
* datasheet but the order below is correct for the XFX Executioner;
|
|
* however it is possible that the XFX Executioner is an exception
|
|
*/
|
|
|
|
left = effect->u.rumble.strong_magnitude;
|
|
right = effect->u.rumble.weak_magnitude;
|
|
dbg_hid("called with 0x%04x 0x%04x\n", left, right);
|
|
|
|
left = left * 0x7f / 0xffff;
|
|
right = right * 0x7f / 0xffff;
|
|
|
|
zpff->report->field[2]->value[0] = left;
|
|
zpff->report->field[3]->value[0] = right;
|
|
dbg_hid("running with 0x%02x 0x%02x\n", left, right);
|
|
hid_hw_request(hid, zpff->report, HID_REQ_SET_REPORT);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int zpff_init(struct hid_device *hid)
|
|
{
|
|
struct zpff_device *zpff;
|
|
struct hid_report *report;
|
|
struct hid_input *hidinput;
|
|
struct input_dev *dev;
|
|
int i, error;
|
|
|
|
if (list_empty(&hid->inputs)) {
|
|
hid_err(hid, "no inputs found\n");
|
|
return -ENODEV;
|
|
}
|
|
hidinput = list_entry(hid->inputs.next, struct hid_input, list);
|
|
dev = hidinput->input;
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
report = hid_validate_values(hid, HID_OUTPUT_REPORT, 0, i, 1);
|
|
if (!report)
|
|
return -ENODEV;
|
|
}
|
|
|
|
zpff = kzalloc(sizeof(struct zpff_device), GFP_KERNEL);
|
|
if (!zpff)
|
|
return -ENOMEM;
|
|
|
|
set_bit(FF_RUMBLE, dev->ffbit);
|
|
|
|
error = input_ff_create_memless(dev, zpff, zpff_play);
|
|
if (error) {
|
|
kfree(zpff);
|
|
return error;
|
|
}
|
|
|
|
zpff->report = report;
|
|
zpff->report->field[0]->value[0] = 0x00;
|
|
zpff->report->field[1]->value[0] = 0x02;
|
|
zpff->report->field[2]->value[0] = 0x00;
|
|
zpff->report->field[3]->value[0] = 0x00;
|
|
hid_hw_request(hid, zpff->report, HID_REQ_SET_REPORT);
|
|
|
|
hid_info(hid, "force feedback for Zeroplus based devices by Anssi Hannula <anssi.hannula@gmail.com>\n");
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
static inline int zpff_init(struct hid_device *hid)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static int zp_probe(struct hid_device *hdev, const struct hid_device_id *id)
|
|
{
|
|
int ret;
|
|
|
|
ret = hid_parse(hdev);
|
|
if (ret) {
|
|
hid_err(hdev, "parse failed\n");
|
|
goto err;
|
|
}
|
|
|
|
ret = hid_hw_start(hdev, HID_CONNECT_DEFAULT & ~HID_CONNECT_FF);
|
|
if (ret) {
|
|
hid_err(hdev, "hw start failed\n");
|
|
goto err;
|
|
}
|
|
|
|
zpff_init(hdev);
|
|
|
|
return 0;
|
|
err:
|
|
return ret;
|
|
}
|
|
|
|
static const struct hid_device_id zp_devices[] = {
|
|
{ HID_USB_DEVICE(USB_VENDOR_ID_ZEROPLUS, 0x0005) },
|
|
{ HID_USB_DEVICE(USB_VENDOR_ID_ZEROPLUS, 0x0030) },
|
|
{ }
|
|
};
|
|
MODULE_DEVICE_TABLE(hid, zp_devices);
|
|
|
|
static struct hid_driver zp_driver = {
|
|
.name = "zeroplus",
|
|
.id_table = zp_devices,
|
|
.probe = zp_probe,
|
|
};
|
|
module_hid_driver(zp_driver);
|
|
|
|
MODULE_LICENSE("GPL");
|