btusb.c 88 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415
  1. /*
  2. *
  3. * Generic Bluetooth USB driver
  4. *
  5. * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
  6. *
  7. *
  8. * This program is free software; you can redistribute it and/or modify
  9. * it under the terms of the GNU General Public License as published by
  10. * the Free Software Foundation; either version 2 of the License, or
  11. * (at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License
  19. * along with this program; if not, write to the Free Software
  20. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  21. *
  22. */
  23. #include <linux/dmi.h>
  24. #include <linux/module.h>
  25. #include <linux/usb.h>
  26. #include <linux/usb/quirks.h>
  27. #include <linux/firmware.h>
  28. #include <linux/of_device.h>
  29. #include <linux/of_irq.h>
  30. #include <linux/suspend.h>
  31. #include <asm/unaligned.h>
  32. #include <net/bluetooth/bluetooth.h>
  33. #include <net/bluetooth/hci_core.h>
  34. #include "btintel.h"
  35. #include "btbcm.h"
  36. #include "btrtl.h"
  37. #define VERSION "0.8"
  38. static bool disable_scofix;
  39. static bool force_scofix;
  40. static bool enable_autosuspend = IS_ENABLED(CONFIG_BT_HCIBTUSB_AUTOSUSPEND);
  41. static bool reset = true;
  42. static struct usb_driver btusb_driver;
  43. #define BTUSB_IGNORE 0x01
  44. #define BTUSB_DIGIANSWER 0x02
  45. #define BTUSB_CSR 0x04
  46. #define BTUSB_SNIFFER 0x08
  47. #define BTUSB_BCM92035 0x10
  48. #define BTUSB_BROKEN_ISOC 0x20
  49. #define BTUSB_WRONG_SCO_MTU 0x40
  50. #define BTUSB_ATH3012 0x80
  51. #define BTUSB_INTEL 0x100
  52. #define BTUSB_INTEL_BOOT 0x200
  53. #define BTUSB_BCM_PATCHRAM 0x400
  54. #define BTUSB_MARVELL 0x800
  55. #define BTUSB_SWAVE 0x1000
  56. #define BTUSB_INTEL_NEW 0x2000
  57. #define BTUSB_AMP 0x4000
  58. #define BTUSB_QCA_ROME 0x8000
  59. #define BTUSB_BCM_APPLE 0x10000
  60. #define BTUSB_REALTEK 0x20000
  61. #define BTUSB_BCM2045 0x40000
  62. #define BTUSB_IFNUM_2 0x80000
  63. #define BTUSB_CW6622 0x100000
  64. static const struct usb_device_id btusb_table[] = {
  65. /* Generic Bluetooth USB device */
  66. { USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
  67. /* Generic Bluetooth AMP device */
  68. { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP },
  69. /* Generic Bluetooth USB interface */
  70. { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) },
  71. /* Apple-specific (Broadcom) devices */
  72. { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
  73. .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 },
  74. /* MediaTek MT76x0E */
  75. { USB_DEVICE(0x0e8d, 0x763f) },
  76. /* Broadcom SoftSailing reporting vendor specific */
  77. { USB_DEVICE(0x0a5c, 0x21e1) },
  78. /* Apple MacBookPro 7,1 */
  79. { USB_DEVICE(0x05ac, 0x8213) },
  80. /* Apple iMac11,1 */
  81. { USB_DEVICE(0x05ac, 0x8215) },
  82. /* Apple MacBookPro6,2 */
  83. { USB_DEVICE(0x05ac, 0x8218) },
  84. /* Apple MacBookAir3,1, MacBookAir3,2 */
  85. { USB_DEVICE(0x05ac, 0x821b) },
  86. /* Apple MacBookAir4,1 */
  87. { USB_DEVICE(0x05ac, 0x821f) },
  88. /* Apple MacBookPro8,2 */
  89. { USB_DEVICE(0x05ac, 0x821a) },
  90. /* Apple MacMini5,1 */
  91. { USB_DEVICE(0x05ac, 0x8281) },
  92. /* AVM BlueFRITZ! USB v2.0 */
  93. { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE },
  94. /* Bluetooth Ultraport Module from IBM */
  95. { USB_DEVICE(0x04bf, 0x030a) },
  96. /* ALPS Modules with non-standard id */
  97. { USB_DEVICE(0x044e, 0x3001) },
  98. { USB_DEVICE(0x044e, 0x3002) },
  99. /* Ericsson with non-standard id */
  100. { USB_DEVICE(0x0bdb, 0x1002) },
  101. /* Canyon CN-BTU1 with HID interfaces */
  102. { USB_DEVICE(0x0c10, 0x0000) },
  103. /* Broadcom BCM20702A0 */
  104. { USB_DEVICE(0x413c, 0x8197) },
  105. /* Broadcom BCM20702B0 (Dynex/Insignia) */
  106. { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM },
  107. /* Broadcom BCM43142A0 (Foxconn/Lenovo) */
  108. { USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01),
  109. .driver_info = BTUSB_BCM_PATCHRAM },
  110. /* Broadcom BCM920703 (HTC Vive) */
  111. { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01),
  112. .driver_info = BTUSB_BCM_PATCHRAM },
  113. /* Foxconn - Hon Hai */
  114. { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
  115. .driver_info = BTUSB_BCM_PATCHRAM },
  116. /* Lite-On Technology - Broadcom based */
  117. { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
  118. .driver_info = BTUSB_BCM_PATCHRAM },
  119. /* Broadcom devices with vendor specific id */
  120. { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
  121. .driver_info = BTUSB_BCM_PATCHRAM },
  122. /* ASUSTek Computer - Broadcom based */
  123. { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
  124. .driver_info = BTUSB_BCM_PATCHRAM },
  125. /* Belkin F8065bf - Broadcom based */
  126. { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
  127. .driver_info = BTUSB_BCM_PATCHRAM },
  128. /* IMC Networks - Broadcom based */
  129. { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
  130. .driver_info = BTUSB_BCM_PATCHRAM },
  131. /* Dell Computer - Broadcom based */
  132. { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01),
  133. .driver_info = BTUSB_BCM_PATCHRAM },
  134. /* Toshiba Corp - Broadcom based */
  135. { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01),
  136. .driver_info = BTUSB_BCM_PATCHRAM },
  137. /* Intel Bluetooth USB Bootloader (RAM module) */
  138. { USB_DEVICE(0x8087, 0x0a5a),
  139. .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC },
  140. { } /* Terminating entry */
  141. };
  142. MODULE_DEVICE_TABLE(usb, btusb_table);
  143. static const struct usb_device_id blacklist_table[] = {
  144. /* CSR BlueCore devices */
  145. { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR },
  146. /* Broadcom BCM2033 without firmware */
  147. { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE },
  148. /* Broadcom BCM2045 devices */
  149. { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 },
  150. /* Atheros 3011 with sflash firmware */
  151. { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE },
  152. { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE },
  153. { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE },
  154. { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE },
  155. { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE },
  156. { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE },
  157. { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE },
  158. /* Atheros AR9285 Malbec with sflash firmware */
  159. { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE },
  160. /* Atheros 3012 with sflash firmware */
  161. { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 },
  162. { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 },
  163. { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 },
  164. { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 },
  165. { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 },
  166. { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 },
  167. { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 },
  168. { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 },
  169. { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 },
  170. { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 },
  171. { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 },
  172. { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 },
  173. { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
  174. { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
  175. { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  176. { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
  177. { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 },
  178. { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 },
  179. { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 },
  180. { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 },
  181. { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
  182. { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 },
  183. { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
  184. { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 },
  185. { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },
  186. { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 },
  187. { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 },
  188. { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 },
  189. { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 },
  190. { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 },
  191. { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 },
  192. { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 },
  193. { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 },
  194. { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 },
  195. { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 },
  196. { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 },
  197. { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 },
  198. { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 },
  199. { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 },
  200. { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 },
  201. { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 },
  202. { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 },
  203. { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 },
  204. { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 },
  205. { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 },
  206. { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 },
  207. { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 },
  208. { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 },
  209. { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 },
  210. { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 },
  211. /* Atheros AR5BBU12 with sflash firmware */
  212. { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE },
  213. /* Atheros AR5BBU12 with sflash firmware */
  214. { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 },
  215. { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 },
  216. /* QCA ROME chipset */
  217. { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME },
  218. { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME },
  219. { USB_DEVICE(0x0cf3, 0xe010), .driver_info = BTUSB_QCA_ROME },
  220. { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME },
  221. { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME },
  222. { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME },
  223. { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME },
  224. { USB_DEVICE(0x0489, 0xe09f), .driver_info = BTUSB_QCA_ROME },
  225. { USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME },
  226. { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME },
  227. { USB_DEVICE(0x04ca, 0x3015), .driver_info = BTUSB_QCA_ROME },
  228. { USB_DEVICE(0x04ca, 0x3016), .driver_info = BTUSB_QCA_ROME },
  229. { USB_DEVICE(0x04ca, 0x301a), .driver_info = BTUSB_QCA_ROME },
  230. { USB_DEVICE(0x13d3, 0x3496), .driver_info = BTUSB_QCA_ROME },
  231. /* Broadcom BCM2035 */
  232. { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 },
  233. { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU },
  234. { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU },
  235. /* Broadcom BCM2045 */
  236. { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU },
  237. { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU },
  238. /* IBM/Lenovo ThinkPad with Broadcom chip */
  239. { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU },
  240. { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU },
  241. /* HP laptop with Broadcom chip */
  242. { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU },
  243. /* Dell laptop with Broadcom chip */
  244. { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU },
  245. /* Dell Wireless 370 and 410 devices */
  246. { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU },
  247. { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU },
  248. /* Belkin F8T012 and F8T013 devices */
  249. { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU },
  250. { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU },
  251. /* Asus WL-BTD202 device */
  252. { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU },
  253. /* Kensington Bluetooth USB adapter */
  254. { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU },
  255. /* RTX Telecom based adapters with buggy SCO support */
  256. { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC },
  257. { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC },
  258. /* CONWISE Technology based adapters with buggy SCO support */
  259. { USB_DEVICE(0x0e5e, 0x6622),
  260. .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622},
  261. /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
  262. { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE },
  263. /* Digianswer devices */
  264. { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER },
  265. { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE },
  266. /* CSR BlueCore Bluetooth Sniffer */
  267. { USB_DEVICE(0x0a12, 0x0002),
  268. .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
  269. /* Frontline ComProbe Bluetooth Sniffer */
  270. { USB_DEVICE(0x16d3, 0x0002),
  271. .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
  272. /* Marvell Bluetooth devices */
  273. { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL },
  274. { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL },
  275. { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL },
  276. /* Intel Bluetooth devices */
  277. { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW },
  278. { USB_DEVICE(0x8087, 0x0026), .driver_info = BTUSB_INTEL_NEW },
  279. { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
  280. { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL },
  281. { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL },
  282. { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW },
  283. { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL },
  284. { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_NEW },
  285. /* Other Intel Bluetooth devices */
  286. { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
  287. .driver_info = BTUSB_IGNORE },
  288. /* Realtek Bluetooth devices */
  289. { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
  290. .driver_info = BTUSB_REALTEK },
  291. /* Additional Realtek 8723AE Bluetooth devices */
  292. { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK },
  293. { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK },
  294. /* Additional Realtek 8723BE Bluetooth devices */
  295. { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK },
  296. { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK },
  297. { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK },
  298. { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK },
  299. { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK },
  300. { USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK },
  301. /* Additional Realtek 8723BU Bluetooth devices */
  302. { USB_DEVICE(0x7392, 0xa611), .driver_info = BTUSB_REALTEK },
  303. /* Additional Realtek 8723DE Bluetooth devices */
  304. { USB_DEVICE(0x2ff8, 0xb011), .driver_info = BTUSB_REALTEK },
  305. /* Additional Realtek 8821AE Bluetooth devices */
  306. { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK },
  307. { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK },
  308. { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK },
  309. { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK },
  310. { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK },
  311. /* Additional Realtek 8822BE Bluetooth devices */
  312. { USB_DEVICE(0x13d3, 0x3526), .driver_info = BTUSB_REALTEK },
  313. { USB_DEVICE(0x0b05, 0x185c), .driver_info = BTUSB_REALTEK },
  314. /* Silicon Wave based devices */
  315. { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE },
  316. { } /* Terminating entry */
  317. };
  318. /* The Bluetooth USB module build into some devices needs to be reset on resume,
  319. * this is a problem with the platform (likely shutting off all power) not with
  320. * the module itself. So we use a DMI list to match known broken platforms.
  321. */
  322. static const struct dmi_system_id btusb_needs_reset_resume_table[] = {
  323. {
  324. /* Dell OptiPlex 3060 (QCA ROME device 0cf3:e007) */
  325. .matches = {
  326. DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
  327. DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 3060"),
  328. },
  329. },
  330. {
  331. /* Dell XPS 9360 (QCA ROME device 0cf3:e300) */
  332. .matches = {
  333. DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
  334. DMI_MATCH(DMI_PRODUCT_NAME, "XPS 13 9360"),
  335. },
  336. },
  337. {
  338. /* Dell Inspiron 5565 (QCA ROME device 0cf3:e009) */
  339. .matches = {
  340. DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
  341. DMI_MATCH(DMI_PRODUCT_NAME, "Inspiron 5565"),
  342. },
  343. },
  344. {}
  345. };
  346. #define BTUSB_MAX_ISOC_FRAMES 10
  347. #define BTUSB_INTR_RUNNING 0
  348. #define BTUSB_BULK_RUNNING 1
  349. #define BTUSB_ISOC_RUNNING 2
  350. #define BTUSB_SUSPENDING 3
  351. #define BTUSB_DID_ISO_RESUME 4
  352. #define BTUSB_BOOTLOADER 5
  353. #define BTUSB_DOWNLOADING 6
  354. #define BTUSB_FIRMWARE_LOADED 7
  355. #define BTUSB_FIRMWARE_FAILED 8
  356. #define BTUSB_BOOTING 9
  357. #define BTUSB_DIAG_RUNNING 10
  358. #define BTUSB_OOB_WAKE_ENABLED 11
  359. struct btusb_data {
  360. struct hci_dev *hdev;
  361. struct usb_device *udev;
  362. struct usb_interface *intf;
  363. struct usb_interface *isoc;
  364. struct usb_interface *diag;
  365. unsigned isoc_ifnum;
  366. unsigned long flags;
  367. struct work_struct work;
  368. struct work_struct waker;
  369. struct usb_anchor deferred;
  370. struct usb_anchor tx_anchor;
  371. int tx_in_flight;
  372. spinlock_t txlock;
  373. struct usb_anchor intr_anchor;
  374. struct usb_anchor bulk_anchor;
  375. struct usb_anchor isoc_anchor;
  376. struct usb_anchor diag_anchor;
  377. spinlock_t rxlock;
  378. struct sk_buff *evt_skb;
  379. struct sk_buff *acl_skb;
  380. struct sk_buff *sco_skb;
  381. struct usb_endpoint_descriptor *intr_ep;
  382. struct usb_endpoint_descriptor *bulk_tx_ep;
  383. struct usb_endpoint_descriptor *bulk_rx_ep;
  384. struct usb_endpoint_descriptor *isoc_tx_ep;
  385. struct usb_endpoint_descriptor *isoc_rx_ep;
  386. struct usb_endpoint_descriptor *diag_tx_ep;
  387. struct usb_endpoint_descriptor *diag_rx_ep;
  388. __u8 cmdreq_type;
  389. __u8 cmdreq;
  390. unsigned int sco_num;
  391. int isoc_altsetting;
  392. int suspend_count;
  393. int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb);
  394. int (*recv_bulk)(struct btusb_data *data, void *buffer, int count);
  395. int (*setup_on_usb)(struct hci_dev *hdev);
  396. int oob_wake_irq; /* irq for out-of-band wake-on-bt */
  397. };
  398. static inline void btusb_free_frags(struct btusb_data *data)
  399. {
  400. unsigned long flags;
  401. spin_lock_irqsave(&data->rxlock, flags);
  402. kfree_skb(data->evt_skb);
  403. data->evt_skb = NULL;
  404. kfree_skb(data->acl_skb);
  405. data->acl_skb = NULL;
  406. kfree_skb(data->sco_skb);
  407. data->sco_skb = NULL;
  408. spin_unlock_irqrestore(&data->rxlock, flags);
  409. }
  410. static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count)
  411. {
  412. struct sk_buff *skb;
  413. int err = 0;
  414. spin_lock(&data->rxlock);
  415. skb = data->evt_skb;
  416. while (count) {
  417. int len;
  418. if (!skb) {
  419. skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC);
  420. if (!skb) {
  421. err = -ENOMEM;
  422. break;
  423. }
  424. hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
  425. hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE;
  426. }
  427. len = min_t(uint, hci_skb_expect(skb), count);
  428. skb_put_data(skb, buffer, len);
  429. count -= len;
  430. buffer += len;
  431. hci_skb_expect(skb) -= len;
  432. if (skb->len == HCI_EVENT_HDR_SIZE) {
  433. /* Complete event header */
  434. hci_skb_expect(skb) = hci_event_hdr(skb)->plen;
  435. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  436. kfree_skb(skb);
  437. skb = NULL;
  438. err = -EILSEQ;
  439. break;
  440. }
  441. }
  442. if (!hci_skb_expect(skb)) {
  443. /* Complete frame */
  444. data->recv_event(data->hdev, skb);
  445. skb = NULL;
  446. }
  447. }
  448. data->evt_skb = skb;
  449. spin_unlock(&data->rxlock);
  450. return err;
  451. }
  452. static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count)
  453. {
  454. struct sk_buff *skb;
  455. int err = 0;
  456. spin_lock(&data->rxlock);
  457. skb = data->acl_skb;
  458. while (count) {
  459. int len;
  460. if (!skb) {
  461. skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC);
  462. if (!skb) {
  463. err = -ENOMEM;
  464. break;
  465. }
  466. hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT;
  467. hci_skb_expect(skb) = HCI_ACL_HDR_SIZE;
  468. }
  469. len = min_t(uint, hci_skb_expect(skb), count);
  470. skb_put_data(skb, buffer, len);
  471. count -= len;
  472. buffer += len;
  473. hci_skb_expect(skb) -= len;
  474. if (skb->len == HCI_ACL_HDR_SIZE) {
  475. __le16 dlen = hci_acl_hdr(skb)->dlen;
  476. /* Complete ACL header */
  477. hci_skb_expect(skb) = __le16_to_cpu(dlen);
  478. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  479. kfree_skb(skb);
  480. skb = NULL;
  481. err = -EILSEQ;
  482. break;
  483. }
  484. }
  485. if (!hci_skb_expect(skb)) {
  486. /* Complete frame */
  487. hci_recv_frame(data->hdev, skb);
  488. skb = NULL;
  489. }
  490. }
  491. data->acl_skb = skb;
  492. spin_unlock(&data->rxlock);
  493. return err;
  494. }
  495. static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count)
  496. {
  497. struct sk_buff *skb;
  498. int err = 0;
  499. spin_lock(&data->rxlock);
  500. skb = data->sco_skb;
  501. while (count) {
  502. int len;
  503. if (!skb) {
  504. skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC);
  505. if (!skb) {
  506. err = -ENOMEM;
  507. break;
  508. }
  509. hci_skb_pkt_type(skb) = HCI_SCODATA_PKT;
  510. hci_skb_expect(skb) = HCI_SCO_HDR_SIZE;
  511. }
  512. len = min_t(uint, hci_skb_expect(skb), count);
  513. skb_put_data(skb, buffer, len);
  514. count -= len;
  515. buffer += len;
  516. hci_skb_expect(skb) -= len;
  517. if (skb->len == HCI_SCO_HDR_SIZE) {
  518. /* Complete SCO header */
  519. hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen;
  520. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  521. kfree_skb(skb);
  522. skb = NULL;
  523. err = -EILSEQ;
  524. break;
  525. }
  526. }
  527. if (!hci_skb_expect(skb)) {
  528. /* Complete frame */
  529. hci_recv_frame(data->hdev, skb);
  530. skb = NULL;
  531. }
  532. }
  533. data->sco_skb = skb;
  534. spin_unlock(&data->rxlock);
  535. return err;
  536. }
  537. static void btusb_intr_complete(struct urb *urb)
  538. {
  539. struct hci_dev *hdev = urb->context;
  540. struct btusb_data *data = hci_get_drvdata(hdev);
  541. int err;
  542. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  543. urb->actual_length);
  544. if (!test_bit(HCI_RUNNING, &hdev->flags))
  545. return;
  546. if (urb->status == 0) {
  547. hdev->stat.byte_rx += urb->actual_length;
  548. if (btusb_recv_intr(data, urb->transfer_buffer,
  549. urb->actual_length) < 0) {
  550. bt_dev_err(hdev, "corrupted event packet");
  551. hdev->stat.err_rx++;
  552. }
  553. } else if (urb->status == -ENOENT) {
  554. /* Avoid suspend failed when usb_kill_urb */
  555. return;
  556. }
  557. if (!test_bit(BTUSB_INTR_RUNNING, &data->flags))
  558. return;
  559. usb_mark_last_busy(data->udev);
  560. usb_anchor_urb(urb, &data->intr_anchor);
  561. err = usb_submit_urb(urb, GFP_ATOMIC);
  562. if (err < 0) {
  563. /* -EPERM: urb is being killed;
  564. * -ENODEV: device got disconnected
  565. */
  566. if (err != -EPERM && err != -ENODEV)
  567. bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
  568. urb, -err);
  569. usb_unanchor_urb(urb);
  570. }
  571. }
  572. static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags)
  573. {
  574. struct btusb_data *data = hci_get_drvdata(hdev);
  575. struct urb *urb;
  576. unsigned char *buf;
  577. unsigned int pipe;
  578. int err, size;
  579. BT_DBG("%s", hdev->name);
  580. if (!data->intr_ep)
  581. return -ENODEV;
  582. urb = usb_alloc_urb(0, mem_flags);
  583. if (!urb)
  584. return -ENOMEM;
  585. size = le16_to_cpu(data->intr_ep->wMaxPacketSize);
  586. buf = kmalloc(size, mem_flags);
  587. if (!buf) {
  588. usb_free_urb(urb);
  589. return -ENOMEM;
  590. }
  591. pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress);
  592. usb_fill_int_urb(urb, data->udev, pipe, buf, size,
  593. btusb_intr_complete, hdev, data->intr_ep->bInterval);
  594. urb->transfer_flags |= URB_FREE_BUFFER;
  595. usb_anchor_urb(urb, &data->intr_anchor);
  596. err = usb_submit_urb(urb, mem_flags);
  597. if (err < 0) {
  598. if (err != -EPERM && err != -ENODEV)
  599. bt_dev_err(hdev, "urb %p submission failed (%d)",
  600. urb, -err);
  601. usb_unanchor_urb(urb);
  602. }
  603. usb_free_urb(urb);
  604. return err;
  605. }
  606. static void btusb_bulk_complete(struct urb *urb)
  607. {
  608. struct hci_dev *hdev = urb->context;
  609. struct btusb_data *data = hci_get_drvdata(hdev);
  610. int err;
  611. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  612. urb->actual_length);
  613. if (!test_bit(HCI_RUNNING, &hdev->flags))
  614. return;
  615. if (urb->status == 0) {
  616. hdev->stat.byte_rx += urb->actual_length;
  617. if (data->recv_bulk(data, urb->transfer_buffer,
  618. urb->actual_length) < 0) {
  619. bt_dev_err(hdev, "corrupted ACL packet");
  620. hdev->stat.err_rx++;
  621. }
  622. } else if (urb->status == -ENOENT) {
  623. /* Avoid suspend failed when usb_kill_urb */
  624. return;
  625. }
  626. if (!test_bit(BTUSB_BULK_RUNNING, &data->flags))
  627. return;
  628. usb_anchor_urb(urb, &data->bulk_anchor);
  629. usb_mark_last_busy(data->udev);
  630. err = usb_submit_urb(urb, GFP_ATOMIC);
  631. if (err < 0) {
  632. /* -EPERM: urb is being killed;
  633. * -ENODEV: device got disconnected
  634. */
  635. if (err != -EPERM && err != -ENODEV)
  636. bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
  637. urb, -err);
  638. usb_unanchor_urb(urb);
  639. }
  640. }
  641. static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags)
  642. {
  643. struct btusb_data *data = hci_get_drvdata(hdev);
  644. struct urb *urb;
  645. unsigned char *buf;
  646. unsigned int pipe;
  647. int err, size = HCI_MAX_FRAME_SIZE;
  648. BT_DBG("%s", hdev->name);
  649. if (!data->bulk_rx_ep)
  650. return -ENODEV;
  651. urb = usb_alloc_urb(0, mem_flags);
  652. if (!urb)
  653. return -ENOMEM;
  654. buf = kmalloc(size, mem_flags);
  655. if (!buf) {
  656. usb_free_urb(urb);
  657. return -ENOMEM;
  658. }
  659. pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress);
  660. usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
  661. btusb_bulk_complete, hdev);
  662. urb->transfer_flags |= URB_FREE_BUFFER;
  663. usb_mark_last_busy(data->udev);
  664. usb_anchor_urb(urb, &data->bulk_anchor);
  665. err = usb_submit_urb(urb, mem_flags);
  666. if (err < 0) {
  667. if (err != -EPERM && err != -ENODEV)
  668. bt_dev_err(hdev, "urb %p submission failed (%d)",
  669. urb, -err);
  670. usb_unanchor_urb(urb);
  671. }
  672. usb_free_urb(urb);
  673. return err;
  674. }
  675. static void btusb_isoc_complete(struct urb *urb)
  676. {
  677. struct hci_dev *hdev = urb->context;
  678. struct btusb_data *data = hci_get_drvdata(hdev);
  679. int i, err;
  680. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  681. urb->actual_length);
  682. if (!test_bit(HCI_RUNNING, &hdev->flags))
  683. return;
  684. if (urb->status == 0) {
  685. for (i = 0; i < urb->number_of_packets; i++) {
  686. unsigned int offset = urb->iso_frame_desc[i].offset;
  687. unsigned int length = urb->iso_frame_desc[i].actual_length;
  688. if (urb->iso_frame_desc[i].status)
  689. continue;
  690. hdev->stat.byte_rx += length;
  691. if (btusb_recv_isoc(data, urb->transfer_buffer + offset,
  692. length) < 0) {
  693. bt_dev_err(hdev, "corrupted SCO packet");
  694. hdev->stat.err_rx++;
  695. }
  696. }
  697. } else if (urb->status == -ENOENT) {
  698. /* Avoid suspend failed when usb_kill_urb */
  699. return;
  700. }
  701. if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags))
  702. return;
  703. usb_anchor_urb(urb, &data->isoc_anchor);
  704. err = usb_submit_urb(urb, GFP_ATOMIC);
  705. if (err < 0) {
  706. /* -EPERM: urb is being killed;
  707. * -ENODEV: device got disconnected
  708. */
  709. if (err != -EPERM && err != -ENODEV)
  710. bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
  711. urb, -err);
  712. usb_unanchor_urb(urb);
  713. }
  714. }
  715. static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu)
  716. {
  717. int i, offset = 0;
  718. BT_DBG("len %d mtu %d", len, mtu);
  719. for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu;
  720. i++, offset += mtu, len -= mtu) {
  721. urb->iso_frame_desc[i].offset = offset;
  722. urb->iso_frame_desc[i].length = mtu;
  723. }
  724. if (len && i < BTUSB_MAX_ISOC_FRAMES) {
  725. urb->iso_frame_desc[i].offset = offset;
  726. urb->iso_frame_desc[i].length = len;
  727. i++;
  728. }
  729. urb->number_of_packets = i;
  730. }
  731. static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags)
  732. {
  733. struct btusb_data *data = hci_get_drvdata(hdev);
  734. struct urb *urb;
  735. unsigned char *buf;
  736. unsigned int pipe;
  737. int err, size;
  738. BT_DBG("%s", hdev->name);
  739. if (!data->isoc_rx_ep)
  740. return -ENODEV;
  741. urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags);
  742. if (!urb)
  743. return -ENOMEM;
  744. size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) *
  745. BTUSB_MAX_ISOC_FRAMES;
  746. buf = kmalloc(size, mem_flags);
  747. if (!buf) {
  748. usb_free_urb(urb);
  749. return -ENOMEM;
  750. }
  751. pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress);
  752. usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete,
  753. hdev, data->isoc_rx_ep->bInterval);
  754. urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP;
  755. __fill_isoc_descriptor(urb, size,
  756. le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize));
  757. usb_anchor_urb(urb, &data->isoc_anchor);
  758. err = usb_submit_urb(urb, mem_flags);
  759. if (err < 0) {
  760. if (err != -EPERM && err != -ENODEV)
  761. bt_dev_err(hdev, "urb %p submission failed (%d)",
  762. urb, -err);
  763. usb_unanchor_urb(urb);
  764. }
  765. usb_free_urb(urb);
  766. return err;
  767. }
  768. static void btusb_diag_complete(struct urb *urb)
  769. {
  770. struct hci_dev *hdev = urb->context;
  771. struct btusb_data *data = hci_get_drvdata(hdev);
  772. int err;
  773. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  774. urb->actual_length);
  775. if (urb->status == 0) {
  776. struct sk_buff *skb;
  777. skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC);
  778. if (skb) {
  779. skb_put_data(skb, urb->transfer_buffer,
  780. urb->actual_length);
  781. hci_recv_diag(hdev, skb);
  782. }
  783. } else if (urb->status == -ENOENT) {
  784. /* Avoid suspend failed when usb_kill_urb */
  785. return;
  786. }
  787. if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags))
  788. return;
  789. usb_anchor_urb(urb, &data->diag_anchor);
  790. usb_mark_last_busy(data->udev);
  791. err = usb_submit_urb(urb, GFP_ATOMIC);
  792. if (err < 0) {
  793. /* -EPERM: urb is being killed;
  794. * -ENODEV: device got disconnected
  795. */
  796. if (err != -EPERM && err != -ENODEV)
  797. bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
  798. urb, -err);
  799. usb_unanchor_urb(urb);
  800. }
  801. }
  802. static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags)
  803. {
  804. struct btusb_data *data = hci_get_drvdata(hdev);
  805. struct urb *urb;
  806. unsigned char *buf;
  807. unsigned int pipe;
  808. int err, size = HCI_MAX_FRAME_SIZE;
  809. BT_DBG("%s", hdev->name);
  810. if (!data->diag_rx_ep)
  811. return -ENODEV;
  812. urb = usb_alloc_urb(0, mem_flags);
  813. if (!urb)
  814. return -ENOMEM;
  815. buf = kmalloc(size, mem_flags);
  816. if (!buf) {
  817. usb_free_urb(urb);
  818. return -ENOMEM;
  819. }
  820. pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress);
  821. usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
  822. btusb_diag_complete, hdev);
  823. urb->transfer_flags |= URB_FREE_BUFFER;
  824. usb_mark_last_busy(data->udev);
  825. usb_anchor_urb(urb, &data->diag_anchor);
  826. err = usb_submit_urb(urb, mem_flags);
  827. if (err < 0) {
  828. if (err != -EPERM && err != -ENODEV)
  829. bt_dev_err(hdev, "urb %p submission failed (%d)",
  830. urb, -err);
  831. usb_unanchor_urb(urb);
  832. }
  833. usb_free_urb(urb);
  834. return err;
  835. }
  836. static void btusb_tx_complete(struct urb *urb)
  837. {
  838. struct sk_buff *skb = urb->context;
  839. struct hci_dev *hdev = (struct hci_dev *)skb->dev;
  840. struct btusb_data *data = hci_get_drvdata(hdev);
  841. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  842. urb->actual_length);
  843. if (!test_bit(HCI_RUNNING, &hdev->flags))
  844. goto done;
  845. if (!urb->status)
  846. hdev->stat.byte_tx += urb->transfer_buffer_length;
  847. else
  848. hdev->stat.err_tx++;
  849. done:
  850. spin_lock(&data->txlock);
  851. data->tx_in_flight--;
  852. spin_unlock(&data->txlock);
  853. kfree(urb->setup_packet);
  854. kfree_skb(skb);
  855. }
  856. static void btusb_isoc_tx_complete(struct urb *urb)
  857. {
  858. struct sk_buff *skb = urb->context;
  859. struct hci_dev *hdev = (struct hci_dev *)skb->dev;
  860. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  861. urb->actual_length);
  862. if (!test_bit(HCI_RUNNING, &hdev->flags))
  863. goto done;
  864. if (!urb->status)
  865. hdev->stat.byte_tx += urb->transfer_buffer_length;
  866. else
  867. hdev->stat.err_tx++;
  868. done:
  869. kfree(urb->setup_packet);
  870. kfree_skb(skb);
  871. }
  872. static int btusb_open(struct hci_dev *hdev)
  873. {
  874. struct btusb_data *data = hci_get_drvdata(hdev);
  875. int err;
  876. BT_DBG("%s", hdev->name);
  877. err = usb_autopm_get_interface(data->intf);
  878. if (err < 0)
  879. return err;
  880. /* Patching USB firmware files prior to starting any URBs of HCI path
  881. * It is more safe to use USB bulk channel for downloading USB patch
  882. */
  883. if (data->setup_on_usb) {
  884. err = data->setup_on_usb(hdev);
  885. if (err < 0)
  886. return err;
  887. }
  888. data->intf->needs_remote_wakeup = 1;
  889. /* device specific wakeup source enabled and required for USB
  890. * remote wakeup while host is suspended
  891. */
  892. device_wakeup_enable(&data->udev->dev);
  893. if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
  894. goto done;
  895. err = btusb_submit_intr_urb(hdev, GFP_KERNEL);
  896. if (err < 0)
  897. goto failed;
  898. err = btusb_submit_bulk_urb(hdev, GFP_KERNEL);
  899. if (err < 0) {
  900. usb_kill_anchored_urbs(&data->intr_anchor);
  901. goto failed;
  902. }
  903. set_bit(BTUSB_BULK_RUNNING, &data->flags);
  904. btusb_submit_bulk_urb(hdev, GFP_KERNEL);
  905. if (data->diag) {
  906. if (!btusb_submit_diag_urb(hdev, GFP_KERNEL))
  907. set_bit(BTUSB_DIAG_RUNNING, &data->flags);
  908. }
  909. done:
  910. usb_autopm_put_interface(data->intf);
  911. return 0;
  912. failed:
  913. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  914. usb_autopm_put_interface(data->intf);
  915. return err;
  916. }
  917. static void btusb_stop_traffic(struct btusb_data *data)
  918. {
  919. usb_kill_anchored_urbs(&data->intr_anchor);
  920. usb_kill_anchored_urbs(&data->bulk_anchor);
  921. usb_kill_anchored_urbs(&data->isoc_anchor);
  922. usb_kill_anchored_urbs(&data->diag_anchor);
  923. }
  924. static int btusb_close(struct hci_dev *hdev)
  925. {
  926. struct btusb_data *data = hci_get_drvdata(hdev);
  927. int err;
  928. BT_DBG("%s", hdev->name);
  929. cancel_work_sync(&data->work);
  930. cancel_work_sync(&data->waker);
  931. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  932. clear_bit(BTUSB_BULK_RUNNING, &data->flags);
  933. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  934. clear_bit(BTUSB_DIAG_RUNNING, &data->flags);
  935. btusb_stop_traffic(data);
  936. btusb_free_frags(data);
  937. err = usb_autopm_get_interface(data->intf);
  938. if (err < 0)
  939. goto failed;
  940. data->intf->needs_remote_wakeup = 0;
  941. device_wakeup_disable(&data->udev->dev);
  942. usb_autopm_put_interface(data->intf);
  943. failed:
  944. usb_scuttle_anchored_urbs(&data->deferred);
  945. return 0;
  946. }
  947. static int btusb_flush(struct hci_dev *hdev)
  948. {
  949. struct btusb_data *data = hci_get_drvdata(hdev);
  950. BT_DBG("%s", hdev->name);
  951. usb_kill_anchored_urbs(&data->tx_anchor);
  952. btusb_free_frags(data);
  953. return 0;
  954. }
  955. static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb)
  956. {
  957. struct btusb_data *data = hci_get_drvdata(hdev);
  958. struct usb_ctrlrequest *dr;
  959. struct urb *urb;
  960. unsigned int pipe;
  961. urb = usb_alloc_urb(0, GFP_KERNEL);
  962. if (!urb)
  963. return ERR_PTR(-ENOMEM);
  964. dr = kmalloc(sizeof(*dr), GFP_KERNEL);
  965. if (!dr) {
  966. usb_free_urb(urb);
  967. return ERR_PTR(-ENOMEM);
  968. }
  969. dr->bRequestType = data->cmdreq_type;
  970. dr->bRequest = data->cmdreq;
  971. dr->wIndex = 0;
  972. dr->wValue = 0;
  973. dr->wLength = __cpu_to_le16(skb->len);
  974. pipe = usb_sndctrlpipe(data->udev, 0x00);
  975. usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
  976. skb->data, skb->len, btusb_tx_complete, skb);
  977. skb->dev = (void *)hdev;
  978. return urb;
  979. }
  980. static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb)
  981. {
  982. struct btusb_data *data = hci_get_drvdata(hdev);
  983. struct urb *urb;
  984. unsigned int pipe;
  985. if (!data->bulk_tx_ep)
  986. return ERR_PTR(-ENODEV);
  987. urb = usb_alloc_urb(0, GFP_KERNEL);
  988. if (!urb)
  989. return ERR_PTR(-ENOMEM);
  990. pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress);
  991. usb_fill_bulk_urb(urb, data->udev, pipe,
  992. skb->data, skb->len, btusb_tx_complete, skb);
  993. skb->dev = (void *)hdev;
  994. return urb;
  995. }
  996. static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb)
  997. {
  998. struct btusb_data *data = hci_get_drvdata(hdev);
  999. struct urb *urb;
  1000. unsigned int pipe;
  1001. if (!data->isoc_tx_ep)
  1002. return ERR_PTR(-ENODEV);
  1003. urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL);
  1004. if (!urb)
  1005. return ERR_PTR(-ENOMEM);
  1006. pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress);
  1007. usb_fill_int_urb(urb, data->udev, pipe,
  1008. skb->data, skb->len, btusb_isoc_tx_complete,
  1009. skb, data->isoc_tx_ep->bInterval);
  1010. urb->transfer_flags = URB_ISO_ASAP;
  1011. __fill_isoc_descriptor(urb, skb->len,
  1012. le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize));
  1013. skb->dev = (void *)hdev;
  1014. return urb;
  1015. }
  1016. static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb)
  1017. {
  1018. struct btusb_data *data = hci_get_drvdata(hdev);
  1019. int err;
  1020. usb_anchor_urb(urb, &data->tx_anchor);
  1021. err = usb_submit_urb(urb, GFP_KERNEL);
  1022. if (err < 0) {
  1023. if (err != -EPERM && err != -ENODEV)
  1024. bt_dev_err(hdev, "urb %p submission failed (%d)",
  1025. urb, -err);
  1026. kfree(urb->setup_packet);
  1027. usb_unanchor_urb(urb);
  1028. } else {
  1029. usb_mark_last_busy(data->udev);
  1030. }
  1031. usb_free_urb(urb);
  1032. return err;
  1033. }
  1034. static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb)
  1035. {
  1036. struct btusb_data *data = hci_get_drvdata(hdev);
  1037. unsigned long flags;
  1038. bool suspending;
  1039. spin_lock_irqsave(&data->txlock, flags);
  1040. suspending = test_bit(BTUSB_SUSPENDING, &data->flags);
  1041. if (!suspending)
  1042. data->tx_in_flight++;
  1043. spin_unlock_irqrestore(&data->txlock, flags);
  1044. if (!suspending)
  1045. return submit_tx_urb(hdev, urb);
  1046. usb_anchor_urb(urb, &data->deferred);
  1047. schedule_work(&data->waker);
  1048. usb_free_urb(urb);
  1049. return 0;
  1050. }
  1051. static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
  1052. {
  1053. struct urb *urb;
  1054. BT_DBG("%s", hdev->name);
  1055. switch (hci_skb_pkt_type(skb)) {
  1056. case HCI_COMMAND_PKT:
  1057. urb = alloc_ctrl_urb(hdev, skb);
  1058. if (IS_ERR(urb))
  1059. return PTR_ERR(urb);
  1060. hdev->stat.cmd_tx++;
  1061. return submit_or_queue_tx_urb(hdev, urb);
  1062. case HCI_ACLDATA_PKT:
  1063. urb = alloc_bulk_urb(hdev, skb);
  1064. if (IS_ERR(urb))
  1065. return PTR_ERR(urb);
  1066. hdev->stat.acl_tx++;
  1067. return submit_or_queue_tx_urb(hdev, urb);
  1068. case HCI_SCODATA_PKT:
  1069. if (hci_conn_num(hdev, SCO_LINK) < 1)
  1070. return -ENODEV;
  1071. urb = alloc_isoc_urb(hdev, skb);
  1072. if (IS_ERR(urb))
  1073. return PTR_ERR(urb);
  1074. hdev->stat.sco_tx++;
  1075. return submit_tx_urb(hdev, urb);
  1076. }
  1077. return -EILSEQ;
  1078. }
  1079. static void btusb_notify(struct hci_dev *hdev, unsigned int evt)
  1080. {
  1081. struct btusb_data *data = hci_get_drvdata(hdev);
  1082. BT_DBG("%s evt %d", hdev->name, evt);
  1083. if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) {
  1084. data->sco_num = hci_conn_num(hdev, SCO_LINK);
  1085. schedule_work(&data->work);
  1086. }
  1087. }
  1088. static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting)
  1089. {
  1090. struct btusb_data *data = hci_get_drvdata(hdev);
  1091. struct usb_interface *intf = data->isoc;
  1092. struct usb_endpoint_descriptor *ep_desc;
  1093. int i, err;
  1094. if (!data->isoc)
  1095. return -ENODEV;
  1096. err = usb_set_interface(data->udev, data->isoc_ifnum, altsetting);
  1097. if (err < 0) {
  1098. bt_dev_err(hdev, "setting interface failed (%d)", -err);
  1099. return err;
  1100. }
  1101. data->isoc_altsetting = altsetting;
  1102. data->isoc_tx_ep = NULL;
  1103. data->isoc_rx_ep = NULL;
  1104. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  1105. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  1106. if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) {
  1107. data->isoc_tx_ep = ep_desc;
  1108. continue;
  1109. }
  1110. if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) {
  1111. data->isoc_rx_ep = ep_desc;
  1112. continue;
  1113. }
  1114. }
  1115. if (!data->isoc_tx_ep || !data->isoc_rx_ep) {
  1116. bt_dev_err(hdev, "invalid SCO descriptors");
  1117. return -ENODEV;
  1118. }
  1119. return 0;
  1120. }
  1121. static void btusb_work(struct work_struct *work)
  1122. {
  1123. struct btusb_data *data = container_of(work, struct btusb_data, work);
  1124. struct hci_dev *hdev = data->hdev;
  1125. int new_alts;
  1126. int err;
  1127. if (data->sco_num > 0) {
  1128. if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) {
  1129. err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf);
  1130. if (err < 0) {
  1131. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1132. usb_kill_anchored_urbs(&data->isoc_anchor);
  1133. return;
  1134. }
  1135. set_bit(BTUSB_DID_ISO_RESUME, &data->flags);
  1136. }
  1137. if (hdev->voice_setting & 0x0020) {
  1138. static const int alts[3] = { 2, 4, 5 };
  1139. new_alts = alts[data->sco_num - 1];
  1140. } else {
  1141. new_alts = data->sco_num;
  1142. }
  1143. if (data->isoc_altsetting != new_alts) {
  1144. unsigned long flags;
  1145. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1146. usb_kill_anchored_urbs(&data->isoc_anchor);
  1147. /* When isochronous alternate setting needs to be
  1148. * changed, because SCO connection has been added
  1149. * or removed, a packet fragment may be left in the
  1150. * reassembling state. This could lead to wrongly
  1151. * assembled fragments.
  1152. *
  1153. * Clear outstanding fragment when selecting a new
  1154. * alternate setting.
  1155. */
  1156. spin_lock_irqsave(&data->rxlock, flags);
  1157. kfree_skb(data->sco_skb);
  1158. data->sco_skb = NULL;
  1159. spin_unlock_irqrestore(&data->rxlock, flags);
  1160. if (__set_isoc_interface(hdev, new_alts) < 0)
  1161. return;
  1162. }
  1163. if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
  1164. if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0)
  1165. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1166. else
  1167. btusb_submit_isoc_urb(hdev, GFP_KERNEL);
  1168. }
  1169. } else {
  1170. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1171. usb_kill_anchored_urbs(&data->isoc_anchor);
  1172. __set_isoc_interface(hdev, 0);
  1173. if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags))
  1174. usb_autopm_put_interface(data->isoc ? data->isoc : data->intf);
  1175. }
  1176. }
  1177. static void btusb_waker(struct work_struct *work)
  1178. {
  1179. struct btusb_data *data = container_of(work, struct btusb_data, waker);
  1180. int err;
  1181. err = usb_autopm_get_interface(data->intf);
  1182. if (err < 0)
  1183. return;
  1184. usb_autopm_put_interface(data->intf);
  1185. }
  1186. static int btusb_setup_bcm92035(struct hci_dev *hdev)
  1187. {
  1188. struct sk_buff *skb;
  1189. u8 val = 0x00;
  1190. BT_DBG("%s", hdev->name);
  1191. skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT);
  1192. if (IS_ERR(skb))
  1193. bt_dev_err(hdev, "BCM92035 command failed (%ld)", PTR_ERR(skb));
  1194. else
  1195. kfree_skb(skb);
  1196. return 0;
  1197. }
  1198. static int btusb_setup_csr(struct hci_dev *hdev)
  1199. {
  1200. struct hci_rp_read_local_version *rp;
  1201. struct sk_buff *skb;
  1202. BT_DBG("%s", hdev->name);
  1203. skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
  1204. HCI_INIT_TIMEOUT);
  1205. if (IS_ERR(skb)) {
  1206. int err = PTR_ERR(skb);
  1207. bt_dev_err(hdev, "CSR: Local version failed (%d)", err);
  1208. return err;
  1209. }
  1210. if (skb->len != sizeof(struct hci_rp_read_local_version)) {
  1211. bt_dev_err(hdev, "CSR: Local version length mismatch");
  1212. kfree_skb(skb);
  1213. return -EIO;
  1214. }
  1215. rp = (struct hci_rp_read_local_version *)skb->data;
  1216. /* Detect controllers which aren't real CSR ones. */
  1217. if (le16_to_cpu(rp->manufacturer) != 10 ||
  1218. le16_to_cpu(rp->lmp_subver) == 0x0c5c) {
  1219. /* Clear the reset quirk since this is not an actual
  1220. * early Bluetooth 1.1 device from CSR.
  1221. */
  1222. clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  1223. /* These fake CSR controllers have all a broken
  1224. * stored link key handling and so just disable it.
  1225. */
  1226. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  1227. }
  1228. kfree_skb(skb);
  1229. return 0;
  1230. }
  1231. static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev,
  1232. struct intel_version *ver)
  1233. {
  1234. const struct firmware *fw;
  1235. char fwname[64];
  1236. int ret;
  1237. snprintf(fwname, sizeof(fwname),
  1238. "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
  1239. ver->hw_platform, ver->hw_variant, ver->hw_revision,
  1240. ver->fw_variant, ver->fw_revision, ver->fw_build_num,
  1241. ver->fw_build_ww, ver->fw_build_yy);
  1242. ret = request_firmware(&fw, fwname, &hdev->dev);
  1243. if (ret < 0) {
  1244. if (ret == -EINVAL) {
  1245. BT_ERR("%s Intel firmware file request failed (%d)",
  1246. hdev->name, ret);
  1247. return NULL;
  1248. }
  1249. BT_ERR("%s failed to open Intel firmware file: %s(%d)",
  1250. hdev->name, fwname, ret);
  1251. /* If the correct firmware patch file is not found, use the
  1252. * default firmware patch file instead
  1253. */
  1254. snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq",
  1255. ver->hw_platform, ver->hw_variant);
  1256. if (request_firmware(&fw, fwname, &hdev->dev) < 0) {
  1257. BT_ERR("%s failed to open default Intel fw file: %s",
  1258. hdev->name, fwname);
  1259. return NULL;
  1260. }
  1261. }
  1262. bt_dev_info(hdev, "Intel Bluetooth firmware file: %s", fwname);
  1263. return fw;
  1264. }
  1265. static int btusb_setup_intel_patching(struct hci_dev *hdev,
  1266. const struct firmware *fw,
  1267. const u8 **fw_ptr, int *disable_patch)
  1268. {
  1269. struct sk_buff *skb;
  1270. struct hci_command_hdr *cmd;
  1271. const u8 *cmd_param;
  1272. struct hci_event_hdr *evt = NULL;
  1273. const u8 *evt_param = NULL;
  1274. int remain = fw->size - (*fw_ptr - fw->data);
  1275. /* The first byte indicates the types of the patch command or event.
  1276. * 0x01 means HCI command and 0x02 is HCI event. If the first bytes
  1277. * in the current firmware buffer doesn't start with 0x01 or
  1278. * the size of remain buffer is smaller than HCI command header,
  1279. * the firmware file is corrupted and it should stop the patching
  1280. * process.
  1281. */
  1282. if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) {
  1283. BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name);
  1284. return -EINVAL;
  1285. }
  1286. (*fw_ptr)++;
  1287. remain--;
  1288. cmd = (struct hci_command_hdr *)(*fw_ptr);
  1289. *fw_ptr += sizeof(*cmd);
  1290. remain -= sizeof(*cmd);
  1291. /* Ensure that the remain firmware data is long enough than the length
  1292. * of command parameter. If not, the firmware file is corrupted.
  1293. */
  1294. if (remain < cmd->plen) {
  1295. BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name);
  1296. return -EFAULT;
  1297. }
  1298. /* If there is a command that loads a patch in the firmware
  1299. * file, then enable the patch upon success, otherwise just
  1300. * disable the manufacturer mode, for example patch activation
  1301. * is not required when the default firmware patch file is used
  1302. * because there are no patch data to load.
  1303. */
  1304. if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e)
  1305. *disable_patch = 0;
  1306. cmd_param = *fw_ptr;
  1307. *fw_ptr += cmd->plen;
  1308. remain -= cmd->plen;
  1309. /* This reads the expected events when the above command is sent to the
  1310. * device. Some vendor commands expects more than one events, for
  1311. * example command status event followed by vendor specific event.
  1312. * For this case, it only keeps the last expected event. so the command
  1313. * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
  1314. * last expected event.
  1315. */
  1316. while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) {
  1317. (*fw_ptr)++;
  1318. remain--;
  1319. evt = (struct hci_event_hdr *)(*fw_ptr);
  1320. *fw_ptr += sizeof(*evt);
  1321. remain -= sizeof(*evt);
  1322. if (remain < evt->plen) {
  1323. BT_ERR("%s Intel fw corrupted: invalid evt len",
  1324. hdev->name);
  1325. return -EFAULT;
  1326. }
  1327. evt_param = *fw_ptr;
  1328. *fw_ptr += evt->plen;
  1329. remain -= evt->plen;
  1330. }
  1331. /* Every HCI commands in the firmware file has its correspond event.
  1332. * If event is not found or remain is smaller than zero, the firmware
  1333. * file is corrupted.
  1334. */
  1335. if (!evt || !evt_param || remain < 0) {
  1336. BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name);
  1337. return -EFAULT;
  1338. }
  1339. skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen,
  1340. cmd_param, evt->evt, HCI_INIT_TIMEOUT);
  1341. if (IS_ERR(skb)) {
  1342. BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)",
  1343. hdev->name, cmd->opcode, PTR_ERR(skb));
  1344. return PTR_ERR(skb);
  1345. }
  1346. /* It ensures that the returned event matches the event data read from
  1347. * the firmware file. At fist, it checks the length and then
  1348. * the contents of the event.
  1349. */
  1350. if (skb->len != evt->plen) {
  1351. BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name,
  1352. le16_to_cpu(cmd->opcode));
  1353. kfree_skb(skb);
  1354. return -EFAULT;
  1355. }
  1356. if (memcmp(skb->data, evt_param, evt->plen)) {
  1357. BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)",
  1358. hdev->name, le16_to_cpu(cmd->opcode));
  1359. kfree_skb(skb);
  1360. return -EFAULT;
  1361. }
  1362. kfree_skb(skb);
  1363. return 0;
  1364. }
  1365. static int btusb_setup_intel(struct hci_dev *hdev)
  1366. {
  1367. struct sk_buff *skb;
  1368. const struct firmware *fw;
  1369. const u8 *fw_ptr;
  1370. int disable_patch, err;
  1371. struct intel_version ver;
  1372. BT_DBG("%s", hdev->name);
  1373. /* The controller has a bug with the first HCI command sent to it
  1374. * returning number of completed commands as zero. This would stall the
  1375. * command processing in the Bluetooth core.
  1376. *
  1377. * As a workaround, send HCI Reset command first which will reset the
  1378. * number of completed commands and allow normal command processing
  1379. * from now on.
  1380. */
  1381. skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
  1382. if (IS_ERR(skb)) {
  1383. BT_ERR("%s sending initial HCI reset command failed (%ld)",
  1384. hdev->name, PTR_ERR(skb));
  1385. return PTR_ERR(skb);
  1386. }
  1387. kfree_skb(skb);
  1388. /* Read Intel specific controller version first to allow selection of
  1389. * which firmware file to load.
  1390. *
  1391. * The returned information are hardware variant and revision plus
  1392. * firmware variant, revision and build number.
  1393. */
  1394. err = btintel_read_version(hdev, &ver);
  1395. if (err)
  1396. return err;
  1397. bt_dev_info(hdev, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
  1398. ver.hw_platform, ver.hw_variant, ver.hw_revision,
  1399. ver.fw_variant, ver.fw_revision, ver.fw_build_num,
  1400. ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num);
  1401. /* fw_patch_num indicates the version of patch the device currently
  1402. * have. If there is no patch data in the device, it is always 0x00.
  1403. * So, if it is other than 0x00, no need to patch the device again.
  1404. */
  1405. if (ver.fw_patch_num) {
  1406. bt_dev_info(hdev, "Intel device is already patched. "
  1407. "patch num: %02x", ver.fw_patch_num);
  1408. goto complete;
  1409. }
  1410. /* Opens the firmware patch file based on the firmware version read
  1411. * from the controller. If it fails to open the matching firmware
  1412. * patch file, it tries to open the default firmware patch file.
  1413. * If no patch file is found, allow the device to operate without
  1414. * a patch.
  1415. */
  1416. fw = btusb_setup_intel_get_fw(hdev, &ver);
  1417. if (!fw)
  1418. goto complete;
  1419. fw_ptr = fw->data;
  1420. /* Enable the manufacturer mode of the controller.
  1421. * Only while this mode is enabled, the driver can download the
  1422. * firmware patch data and configuration parameters.
  1423. */
  1424. err = btintel_enter_mfg(hdev);
  1425. if (err) {
  1426. release_firmware(fw);
  1427. return err;
  1428. }
  1429. disable_patch = 1;
  1430. /* The firmware data file consists of list of Intel specific HCI
  1431. * commands and its expected events. The first byte indicates the
  1432. * type of the message, either HCI command or HCI event.
  1433. *
  1434. * It reads the command and its expected event from the firmware file,
  1435. * and send to the controller. Once __hci_cmd_sync_ev() returns,
  1436. * the returned event is compared with the event read from the firmware
  1437. * file and it will continue until all the messages are downloaded to
  1438. * the controller.
  1439. *
  1440. * Once the firmware patching is completed successfully,
  1441. * the manufacturer mode is disabled with reset and activating the
  1442. * downloaded patch.
  1443. *
  1444. * If the firmware patching fails, the manufacturer mode is
  1445. * disabled with reset and deactivating the patch.
  1446. *
  1447. * If the default patch file is used, no reset is done when disabling
  1448. * the manufacturer.
  1449. */
  1450. while (fw->size > fw_ptr - fw->data) {
  1451. int ret;
  1452. ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr,
  1453. &disable_patch);
  1454. if (ret < 0)
  1455. goto exit_mfg_deactivate;
  1456. }
  1457. release_firmware(fw);
  1458. if (disable_patch)
  1459. goto exit_mfg_disable;
  1460. /* Patching completed successfully and disable the manufacturer mode
  1461. * with reset and activate the downloaded firmware patches.
  1462. */
  1463. err = btintel_exit_mfg(hdev, true, true);
  1464. if (err)
  1465. return err;
  1466. bt_dev_info(hdev, "Intel firmware patch completed and activated");
  1467. goto complete;
  1468. exit_mfg_disable:
  1469. /* Disable the manufacturer mode without reset */
  1470. err = btintel_exit_mfg(hdev, false, false);
  1471. if (err)
  1472. return err;
  1473. bt_dev_info(hdev, "Intel firmware patch completed");
  1474. goto complete;
  1475. exit_mfg_deactivate:
  1476. release_firmware(fw);
  1477. /* Patching failed. Disable the manufacturer mode with reset and
  1478. * deactivate the downloaded firmware patches.
  1479. */
  1480. err = btintel_exit_mfg(hdev, true, false);
  1481. if (err)
  1482. return err;
  1483. bt_dev_info(hdev, "Intel firmware patch completed and deactivated");
  1484. complete:
  1485. /* Set the event mask for Intel specific vendor events. This enables
  1486. * a few extra events that are useful during general operation.
  1487. */
  1488. btintel_set_event_mask_mfg(hdev, false);
  1489. btintel_check_bdaddr(hdev);
  1490. return 0;
  1491. }
  1492. static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode)
  1493. {
  1494. struct sk_buff *skb;
  1495. struct hci_event_hdr *hdr;
  1496. struct hci_ev_cmd_complete *evt;
  1497. skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC);
  1498. if (!skb)
  1499. return -ENOMEM;
  1500. hdr = skb_put(skb, sizeof(*hdr));
  1501. hdr->evt = HCI_EV_CMD_COMPLETE;
  1502. hdr->plen = sizeof(*evt) + 1;
  1503. evt = skb_put(skb, sizeof(*evt));
  1504. evt->ncmd = 0x01;
  1505. evt->opcode = cpu_to_le16(opcode);
  1506. skb_put_u8(skb, 0x00);
  1507. hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
  1508. return hci_recv_frame(hdev, skb);
  1509. }
  1510. static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer,
  1511. int count)
  1512. {
  1513. /* When the device is in bootloader mode, then it can send
  1514. * events via the bulk endpoint. These events are treated the
  1515. * same way as the ones received from the interrupt endpoint.
  1516. */
  1517. if (test_bit(BTUSB_BOOTLOADER, &data->flags))
  1518. return btusb_recv_intr(data, buffer, count);
  1519. return btusb_recv_bulk(data, buffer, count);
  1520. }
  1521. static void btusb_intel_bootup(struct btusb_data *data, const void *ptr,
  1522. unsigned int len)
  1523. {
  1524. const struct intel_bootup *evt = ptr;
  1525. if (len != sizeof(*evt))
  1526. return;
  1527. if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) {
  1528. smp_mb__after_atomic();
  1529. wake_up_bit(&data->flags, BTUSB_BOOTING);
  1530. }
  1531. }
  1532. static void btusb_intel_secure_send_result(struct btusb_data *data,
  1533. const void *ptr, unsigned int len)
  1534. {
  1535. const struct intel_secure_send_result *evt = ptr;
  1536. if (len != sizeof(*evt))
  1537. return;
  1538. if (evt->result)
  1539. set_bit(BTUSB_FIRMWARE_FAILED, &data->flags);
  1540. if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) &&
  1541. test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) {
  1542. smp_mb__after_atomic();
  1543. wake_up_bit(&data->flags, BTUSB_DOWNLOADING);
  1544. }
  1545. }
  1546. static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb)
  1547. {
  1548. struct btusb_data *data = hci_get_drvdata(hdev);
  1549. if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
  1550. struct hci_event_hdr *hdr = (void *)skb->data;
  1551. if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff &&
  1552. hdr->plen > 0) {
  1553. const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1;
  1554. unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1;
  1555. switch (skb->data[2]) {
  1556. case 0x02:
  1557. /* When switching to the operational firmware
  1558. * the device sends a vendor specific event
  1559. * indicating that the bootup completed.
  1560. */
  1561. btusb_intel_bootup(data, ptr, len);
  1562. break;
  1563. case 0x06:
  1564. /* When the firmware loading completes the
  1565. * device sends out a vendor specific event
  1566. * indicating the result of the firmware
  1567. * loading.
  1568. */
  1569. btusb_intel_secure_send_result(data, ptr, len);
  1570. break;
  1571. }
  1572. }
  1573. }
  1574. return hci_recv_frame(hdev, skb);
  1575. }
  1576. static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb)
  1577. {
  1578. struct btusb_data *data = hci_get_drvdata(hdev);
  1579. struct urb *urb;
  1580. BT_DBG("%s", hdev->name);
  1581. switch (hci_skb_pkt_type(skb)) {
  1582. case HCI_COMMAND_PKT:
  1583. if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
  1584. struct hci_command_hdr *cmd = (void *)skb->data;
  1585. __u16 opcode = le16_to_cpu(cmd->opcode);
  1586. /* When in bootloader mode and the command 0xfc09
  1587. * is received, it needs to be send down the
  1588. * bulk endpoint. So allocate a bulk URB instead.
  1589. */
  1590. if (opcode == 0xfc09)
  1591. urb = alloc_bulk_urb(hdev, skb);
  1592. else
  1593. urb = alloc_ctrl_urb(hdev, skb);
  1594. /* When the 0xfc01 command is issued to boot into
  1595. * the operational firmware, it will actually not
  1596. * send a command complete event. To keep the flow
  1597. * control working inject that event here.
  1598. */
  1599. if (opcode == 0xfc01)
  1600. inject_cmd_complete(hdev, opcode);
  1601. } else {
  1602. urb = alloc_ctrl_urb(hdev, skb);
  1603. }
  1604. if (IS_ERR(urb))
  1605. return PTR_ERR(urb);
  1606. hdev->stat.cmd_tx++;
  1607. return submit_or_queue_tx_urb(hdev, urb);
  1608. case HCI_ACLDATA_PKT:
  1609. urb = alloc_bulk_urb(hdev, skb);
  1610. if (IS_ERR(urb))
  1611. return PTR_ERR(urb);
  1612. hdev->stat.acl_tx++;
  1613. return submit_or_queue_tx_urb(hdev, urb);
  1614. case HCI_SCODATA_PKT:
  1615. if (hci_conn_num(hdev, SCO_LINK) < 1)
  1616. return -ENODEV;
  1617. urb = alloc_isoc_urb(hdev, skb);
  1618. if (IS_ERR(urb))
  1619. return PTR_ERR(urb);
  1620. hdev->stat.sco_tx++;
  1621. return submit_tx_urb(hdev, urb);
  1622. }
  1623. return -EILSEQ;
  1624. }
  1625. static int btusb_setup_intel_new(struct hci_dev *hdev)
  1626. {
  1627. struct btusb_data *data = hci_get_drvdata(hdev);
  1628. struct intel_version ver;
  1629. struct intel_boot_params params;
  1630. const struct firmware *fw;
  1631. u32 boot_param;
  1632. char fwname[64];
  1633. ktime_t calltime, delta, rettime;
  1634. unsigned long long duration;
  1635. int err;
  1636. BT_DBG("%s", hdev->name);
  1637. /* Set the default boot parameter to 0x0 and it is updated to
  1638. * SKU specific boot parameter after reading Intel_Write_Boot_Params
  1639. * command while downloading the firmware.
  1640. */
  1641. boot_param = 0x00000000;
  1642. calltime = ktime_get();
  1643. /* Read the Intel version information to determine if the device
  1644. * is in bootloader mode or if it already has operational firmware
  1645. * loaded.
  1646. */
  1647. err = btintel_read_version(hdev, &ver);
  1648. if (err)
  1649. return err;
  1650. /* The hardware platform number has a fixed value of 0x37 and
  1651. * for now only accept this single value.
  1652. */
  1653. if (ver.hw_platform != 0x37) {
  1654. BT_ERR("%s: Unsupported Intel hardware platform (%u)",
  1655. hdev->name, ver.hw_platform);
  1656. return -EINVAL;
  1657. }
  1658. /* Check for supported iBT hardware variants of this firmware
  1659. * loading method.
  1660. *
  1661. * This check has been put in place to ensure correct forward
  1662. * compatibility options when newer hardware variants come along.
  1663. */
  1664. switch (ver.hw_variant) {
  1665. case 0x0b: /* SfP */
  1666. case 0x0c: /* WsP */
  1667. case 0x11: /* JfP */
  1668. case 0x12: /* ThP */
  1669. case 0x13: /* HrP */
  1670. case 0x14: /* QnJ, IcP */
  1671. break;
  1672. default:
  1673. BT_ERR("%s: Unsupported Intel hardware variant (%u)",
  1674. hdev->name, ver.hw_variant);
  1675. return -EINVAL;
  1676. }
  1677. btintel_version_info(hdev, &ver);
  1678. /* The firmware variant determines if the device is in bootloader
  1679. * mode or is running operational firmware. The value 0x06 identifies
  1680. * the bootloader and the value 0x23 identifies the operational
  1681. * firmware.
  1682. *
  1683. * When the operational firmware is already present, then only
  1684. * the check for valid Bluetooth device address is needed. This
  1685. * determines if the device will be added as configured or
  1686. * unconfigured controller.
  1687. *
  1688. * It is not possible to use the Secure Boot Parameters in this
  1689. * case since that command is only available in bootloader mode.
  1690. */
  1691. if (ver.fw_variant == 0x23) {
  1692. clear_bit(BTUSB_BOOTLOADER, &data->flags);
  1693. btintel_check_bdaddr(hdev);
  1694. return 0;
  1695. }
  1696. /* If the device is not in bootloader mode, then the only possible
  1697. * choice is to return an error and abort the device initialization.
  1698. */
  1699. if (ver.fw_variant != 0x06) {
  1700. BT_ERR("%s: Unsupported Intel firmware variant (%u)",
  1701. hdev->name, ver.fw_variant);
  1702. return -ENODEV;
  1703. }
  1704. /* Read the secure boot parameters to identify the operating
  1705. * details of the bootloader.
  1706. */
  1707. err = btintel_read_boot_params(hdev, &params);
  1708. if (err)
  1709. return err;
  1710. /* It is required that every single firmware fragment is acknowledged
  1711. * with a command complete event. If the boot parameters indicate
  1712. * that this bootloader does not send them, then abort the setup.
  1713. */
  1714. if (params.limited_cce != 0x00) {
  1715. BT_ERR("%s: Unsupported Intel firmware loading method (%u)",
  1716. hdev->name, params.limited_cce);
  1717. return -EINVAL;
  1718. }
  1719. /* If the OTP has no valid Bluetooth device address, then there will
  1720. * also be no valid address for the operational firmware.
  1721. */
  1722. if (!bacmp(&params.otp_bdaddr, BDADDR_ANY)) {
  1723. bt_dev_info(hdev, "No device address configured");
  1724. set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
  1725. }
  1726. /* With this Intel bootloader only the hardware variant and device
  1727. * revision information are used to select the right firmware for SfP
  1728. * and WsP.
  1729. *
  1730. * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi.
  1731. *
  1732. * Currently the supported hardware variants are:
  1733. * 11 (0x0b) for iBT3.0 (LnP/SfP)
  1734. * 12 (0x0c) for iBT3.5 (WsP)
  1735. *
  1736. * For ThP/JfP and for future SKU's, the FW name varies based on HW
  1737. * variant, HW revision and FW revision, as these are dependent on CNVi
  1738. * and RF Combination.
  1739. *
  1740. * 17 (0x11) for iBT3.5 (JfP)
  1741. * 18 (0x12) for iBT3.5 (ThP)
  1742. *
  1743. * The firmware file name for these will be
  1744. * ibt-<hw_variant>-<hw_revision>-<fw_revision>.sfi.
  1745. *
  1746. */
  1747. switch (ver.hw_variant) {
  1748. case 0x0b: /* SfP */
  1749. case 0x0c: /* WsP */
  1750. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi",
  1751. le16_to_cpu(ver.hw_variant),
  1752. le16_to_cpu(params.dev_revid));
  1753. break;
  1754. case 0x11: /* JfP */
  1755. case 0x12: /* ThP */
  1756. case 0x13: /* HrP */
  1757. case 0x14: /* QnJ, IcP */
  1758. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u-%u.sfi",
  1759. le16_to_cpu(ver.hw_variant),
  1760. le16_to_cpu(ver.hw_revision),
  1761. le16_to_cpu(ver.fw_revision));
  1762. break;
  1763. default:
  1764. BT_ERR("%s: Unsupported Intel firmware naming", hdev->name);
  1765. return -EINVAL;
  1766. }
  1767. err = request_firmware(&fw, fwname, &hdev->dev);
  1768. if (err < 0) {
  1769. BT_ERR("%s: Failed to load Intel firmware file (%d)",
  1770. hdev->name, err);
  1771. return err;
  1772. }
  1773. bt_dev_info(hdev, "Found device firmware: %s", fwname);
  1774. /* Save the DDC file name for later use to apply once the firmware
  1775. * downloading is done.
  1776. */
  1777. switch (ver.hw_variant) {
  1778. case 0x0b: /* SfP */
  1779. case 0x0c: /* WsP */
  1780. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc",
  1781. le16_to_cpu(ver.hw_variant),
  1782. le16_to_cpu(params.dev_revid));
  1783. break;
  1784. case 0x11: /* JfP */
  1785. case 0x12: /* ThP */
  1786. case 0x13: /* HrP */
  1787. case 0x14: /* QnJ, IcP */
  1788. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u-%u.ddc",
  1789. le16_to_cpu(ver.hw_variant),
  1790. le16_to_cpu(ver.hw_revision),
  1791. le16_to_cpu(ver.fw_revision));
  1792. break;
  1793. default:
  1794. BT_ERR("%s: Unsupported Intel firmware naming", hdev->name);
  1795. return -EINVAL;
  1796. }
  1797. if (fw->size < 644) {
  1798. BT_ERR("%s: Invalid size of firmware file (%zu)",
  1799. hdev->name, fw->size);
  1800. err = -EBADF;
  1801. goto done;
  1802. }
  1803. set_bit(BTUSB_DOWNLOADING, &data->flags);
  1804. /* Start firmware downloading and get boot parameter */
  1805. err = btintel_download_firmware(hdev, fw, &boot_param);
  1806. if (err < 0)
  1807. goto done;
  1808. set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
  1809. bt_dev_info(hdev, "Waiting for firmware download to complete");
  1810. /* Before switching the device into operational mode and with that
  1811. * booting the loaded firmware, wait for the bootloader notification
  1812. * that all fragments have been successfully received.
  1813. *
  1814. * When the event processing receives the notification, then the
  1815. * BTUSB_DOWNLOADING flag will be cleared.
  1816. *
  1817. * The firmware loading should not take longer than 5 seconds
  1818. * and thus just timeout if that happens and fail the setup
  1819. * of this device.
  1820. */
  1821. err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
  1822. TASK_INTERRUPTIBLE,
  1823. msecs_to_jiffies(5000));
  1824. if (err == -EINTR) {
  1825. BT_ERR("%s: Firmware loading interrupted", hdev->name);
  1826. goto done;
  1827. }
  1828. if (err) {
  1829. BT_ERR("%s: Firmware loading timeout", hdev->name);
  1830. err = -ETIMEDOUT;
  1831. goto done;
  1832. }
  1833. if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
  1834. BT_ERR("%s: Firmware loading failed", hdev->name);
  1835. err = -ENOEXEC;
  1836. goto done;
  1837. }
  1838. rettime = ktime_get();
  1839. delta = ktime_sub(rettime, calltime);
  1840. duration = (unsigned long long) ktime_to_ns(delta) >> 10;
  1841. bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration);
  1842. done:
  1843. release_firmware(fw);
  1844. if (err < 0)
  1845. return err;
  1846. calltime = ktime_get();
  1847. set_bit(BTUSB_BOOTING, &data->flags);
  1848. err = btintel_send_intel_reset(hdev, boot_param);
  1849. if (err)
  1850. return err;
  1851. /* The bootloader will not indicate when the device is ready. This
  1852. * is done by the operational firmware sending bootup notification.
  1853. *
  1854. * Booting into operational firmware should not take longer than
  1855. * 1 second. However if that happens, then just fail the setup
  1856. * since something went wrong.
  1857. */
  1858. bt_dev_info(hdev, "Waiting for device to boot");
  1859. err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
  1860. TASK_INTERRUPTIBLE,
  1861. msecs_to_jiffies(1000));
  1862. if (err == -EINTR) {
  1863. BT_ERR("%s: Device boot interrupted", hdev->name);
  1864. return -EINTR;
  1865. }
  1866. if (err) {
  1867. BT_ERR("%s: Device boot timeout", hdev->name);
  1868. return -ETIMEDOUT;
  1869. }
  1870. rettime = ktime_get();
  1871. delta = ktime_sub(rettime, calltime);
  1872. duration = (unsigned long long) ktime_to_ns(delta) >> 10;
  1873. bt_dev_info(hdev, "Device booted in %llu usecs", duration);
  1874. clear_bit(BTUSB_BOOTLOADER, &data->flags);
  1875. /* Once the device is running in operational mode, it needs to apply
  1876. * the device configuration (DDC) parameters.
  1877. *
  1878. * The device can work without DDC parameters, so even if it fails
  1879. * to load the file, no need to fail the setup.
  1880. */
  1881. btintel_load_ddc_config(hdev, fwname);
  1882. /* Set the event mask for Intel specific vendor events. This enables
  1883. * a few extra events that are useful during general operation. It
  1884. * does not enable any debugging related events.
  1885. *
  1886. * The device will function correctly without these events enabled
  1887. * and thus no need to fail the setup.
  1888. */
  1889. btintel_set_event_mask(hdev, false);
  1890. return 0;
  1891. }
  1892. static int btusb_shutdown_intel(struct hci_dev *hdev)
  1893. {
  1894. struct sk_buff *skb;
  1895. long ret;
  1896. /* Some platforms have an issue with BT LED when the interface is
  1897. * down or BT radio is turned off, which takes 5 seconds to BT LED
  1898. * goes off. This command turns off the BT LED immediately.
  1899. */
  1900. skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT);
  1901. if (IS_ERR(skb)) {
  1902. ret = PTR_ERR(skb);
  1903. BT_ERR("%s: turning off Intel device LED failed (%ld)",
  1904. hdev->name, ret);
  1905. return ret;
  1906. }
  1907. kfree_skb(skb);
  1908. return 0;
  1909. }
  1910. #ifdef CONFIG_PM
  1911. /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */
  1912. static int marvell_config_oob_wake(struct hci_dev *hdev)
  1913. {
  1914. struct sk_buff *skb;
  1915. struct btusb_data *data = hci_get_drvdata(hdev);
  1916. struct device *dev = &data->udev->dev;
  1917. u16 pin, gap, opcode;
  1918. int ret;
  1919. u8 cmd[5];
  1920. /* Move on if no wakeup pin specified */
  1921. if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) ||
  1922. of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap))
  1923. return 0;
  1924. /* Vendor specific command to configure a GPIO as wake-up pin */
  1925. opcode = hci_opcode_pack(0x3F, 0x59);
  1926. cmd[0] = opcode & 0xFF;
  1927. cmd[1] = opcode >> 8;
  1928. cmd[2] = 2; /* length of parameters that follow */
  1929. cmd[3] = pin;
  1930. cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */
  1931. skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL);
  1932. if (!skb) {
  1933. bt_dev_err(hdev, "%s: No memory\n", __func__);
  1934. return -ENOMEM;
  1935. }
  1936. skb_put_data(skb, cmd, sizeof(cmd));
  1937. hci_skb_pkt_type(skb) = HCI_COMMAND_PKT;
  1938. ret = btusb_send_frame(hdev, skb);
  1939. if (ret) {
  1940. bt_dev_err(hdev, "%s: configuration failed\n", __func__);
  1941. kfree_skb(skb);
  1942. return ret;
  1943. }
  1944. return 0;
  1945. }
  1946. #endif
  1947. static int btusb_set_bdaddr_marvell(struct hci_dev *hdev,
  1948. const bdaddr_t *bdaddr)
  1949. {
  1950. struct sk_buff *skb;
  1951. u8 buf[8];
  1952. long ret;
  1953. buf[0] = 0xfe;
  1954. buf[1] = sizeof(bdaddr_t);
  1955. memcpy(buf + 2, bdaddr, sizeof(bdaddr_t));
  1956. skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT);
  1957. if (IS_ERR(skb)) {
  1958. ret = PTR_ERR(skb);
  1959. bt_dev_err(hdev, "changing Marvell device address failed (%ld)",
  1960. ret);
  1961. return ret;
  1962. }
  1963. kfree_skb(skb);
  1964. return 0;
  1965. }
  1966. static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev,
  1967. const bdaddr_t *bdaddr)
  1968. {
  1969. struct sk_buff *skb;
  1970. u8 buf[10];
  1971. long ret;
  1972. buf[0] = 0x01;
  1973. buf[1] = 0x01;
  1974. buf[2] = 0x00;
  1975. buf[3] = sizeof(bdaddr_t);
  1976. memcpy(buf + 4, bdaddr, sizeof(bdaddr_t));
  1977. skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT);
  1978. if (IS_ERR(skb)) {
  1979. ret = PTR_ERR(skb);
  1980. bt_dev_err(hdev, "Change address command failed (%ld)", ret);
  1981. return ret;
  1982. }
  1983. kfree_skb(skb);
  1984. return 0;
  1985. }
  1986. #define QCA_DFU_PACKET_LEN 4096
  1987. #define QCA_GET_TARGET_VERSION 0x09
  1988. #define QCA_CHECK_STATUS 0x05
  1989. #define QCA_DFU_DOWNLOAD 0x01
  1990. #define QCA_SYSCFG_UPDATED 0x40
  1991. #define QCA_PATCH_UPDATED 0x80
  1992. #define QCA_DFU_TIMEOUT 3000
  1993. struct qca_version {
  1994. __le32 rom_version;
  1995. __le32 patch_version;
  1996. __le32 ram_version;
  1997. __le32 ref_clock;
  1998. __u8 reserved[4];
  1999. } __packed;
  2000. struct qca_rampatch_version {
  2001. __le16 rom_version;
  2002. __le16 patch_version;
  2003. } __packed;
  2004. struct qca_device_info {
  2005. u32 rom_version;
  2006. u8 rampatch_hdr; /* length of header in rampatch */
  2007. u8 nvm_hdr; /* length of header in NVM */
  2008. u8 ver_offset; /* offset of version structure in rampatch */
  2009. };
  2010. static const struct qca_device_info qca_devices_table[] = {
  2011. { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */
  2012. { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */
  2013. { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */
  2014. { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */
  2015. { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */
  2016. { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */
  2017. };
  2018. static int btusb_qca_send_vendor_req(struct usb_device *udev, u8 request,
  2019. void *data, u16 size)
  2020. {
  2021. int pipe, err;
  2022. u8 *buf;
  2023. buf = kmalloc(size, GFP_KERNEL);
  2024. if (!buf)
  2025. return -ENOMEM;
  2026. /* Found some of USB hosts have IOT issues with ours so that we should
  2027. * not wait until HCI layer is ready.
  2028. */
  2029. pipe = usb_rcvctrlpipe(udev, 0);
  2030. err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN,
  2031. 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
  2032. if (err < 0) {
  2033. dev_err(&udev->dev, "Failed to access otp area (%d)", err);
  2034. goto done;
  2035. }
  2036. memcpy(data, buf, size);
  2037. done:
  2038. kfree(buf);
  2039. return err;
  2040. }
  2041. static int btusb_setup_qca_download_fw(struct hci_dev *hdev,
  2042. const struct firmware *firmware,
  2043. size_t hdr_size)
  2044. {
  2045. struct btusb_data *btdata = hci_get_drvdata(hdev);
  2046. struct usb_device *udev = btdata->udev;
  2047. size_t count, size, sent = 0;
  2048. int pipe, len, err;
  2049. u8 *buf;
  2050. buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL);
  2051. if (!buf)
  2052. return -ENOMEM;
  2053. count = firmware->size;
  2054. size = min_t(size_t, count, hdr_size);
  2055. memcpy(buf, firmware->data, size);
  2056. /* USB patches should go down to controller through USB path
  2057. * because binary format fits to go down through USB channel.
  2058. * USB control path is for patching headers and USB bulk is for
  2059. * patch body.
  2060. */
  2061. pipe = usb_sndctrlpipe(udev, 0);
  2062. err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR,
  2063. 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
  2064. if (err < 0) {
  2065. bt_dev_err(hdev, "Failed to send headers (%d)", err);
  2066. goto done;
  2067. }
  2068. sent += size;
  2069. count -= size;
  2070. while (count) {
  2071. size = min_t(size_t, count, QCA_DFU_PACKET_LEN);
  2072. memcpy(buf, firmware->data + sent, size);
  2073. pipe = usb_sndbulkpipe(udev, 0x02);
  2074. err = usb_bulk_msg(udev, pipe, buf, size, &len,
  2075. QCA_DFU_TIMEOUT);
  2076. if (err < 0) {
  2077. bt_dev_err(hdev, "Failed to send body at %zd of %zd (%d)",
  2078. sent, firmware->size, err);
  2079. break;
  2080. }
  2081. if (size != len) {
  2082. bt_dev_err(hdev, "Failed to get bulk buffer");
  2083. err = -EILSEQ;
  2084. break;
  2085. }
  2086. sent += size;
  2087. count -= size;
  2088. }
  2089. done:
  2090. kfree(buf);
  2091. return err;
  2092. }
  2093. static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev,
  2094. struct qca_version *ver,
  2095. const struct qca_device_info *info)
  2096. {
  2097. struct qca_rampatch_version *rver;
  2098. const struct firmware *fw;
  2099. u32 ver_rom, ver_patch;
  2100. u16 rver_rom, rver_patch;
  2101. char fwname[64];
  2102. int err;
  2103. ver_rom = le32_to_cpu(ver->rom_version);
  2104. ver_patch = le32_to_cpu(ver->patch_version);
  2105. snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom);
  2106. err = request_firmware(&fw, fwname, &hdev->dev);
  2107. if (err) {
  2108. bt_dev_err(hdev, "failed to request rampatch file: %s (%d)",
  2109. fwname, err);
  2110. return err;
  2111. }
  2112. bt_dev_info(hdev, "using rampatch file: %s", fwname);
  2113. rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset);
  2114. rver_rom = le16_to_cpu(rver->rom_version);
  2115. rver_patch = le16_to_cpu(rver->patch_version);
  2116. bt_dev_info(hdev, "QCA: patch rome 0x%x build 0x%x, "
  2117. "firmware rome 0x%x build 0x%x",
  2118. rver_rom, rver_patch, ver_rom, ver_patch);
  2119. if (rver_rom != ver_rom || rver_patch <= ver_patch) {
  2120. bt_dev_err(hdev, "rampatch file version did not match with firmware");
  2121. err = -EINVAL;
  2122. goto done;
  2123. }
  2124. err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr);
  2125. done:
  2126. release_firmware(fw);
  2127. return err;
  2128. }
  2129. static int btusb_setup_qca_load_nvm(struct hci_dev *hdev,
  2130. struct qca_version *ver,
  2131. const struct qca_device_info *info)
  2132. {
  2133. const struct firmware *fw;
  2134. char fwname[64];
  2135. int err;
  2136. snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin",
  2137. le32_to_cpu(ver->rom_version));
  2138. err = request_firmware(&fw, fwname, &hdev->dev);
  2139. if (err) {
  2140. bt_dev_err(hdev, "failed to request NVM file: %s (%d)",
  2141. fwname, err);
  2142. return err;
  2143. }
  2144. bt_dev_info(hdev, "using NVM file: %s", fwname);
  2145. err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr);
  2146. release_firmware(fw);
  2147. return err;
  2148. }
  2149. /* identify the ROM version and check whether patches are needed */
  2150. static bool btusb_qca_need_patch(struct usb_device *udev)
  2151. {
  2152. struct qca_version ver;
  2153. if (btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver,
  2154. sizeof(ver)) < 0)
  2155. return false;
  2156. /* only low ROM versions need patches */
  2157. return !(le32_to_cpu(ver.rom_version) & ~0xffffU);
  2158. }
  2159. static int btusb_setup_qca(struct hci_dev *hdev)
  2160. {
  2161. struct btusb_data *btdata = hci_get_drvdata(hdev);
  2162. struct usb_device *udev = btdata->udev;
  2163. const struct qca_device_info *info = NULL;
  2164. struct qca_version ver;
  2165. u32 ver_rom;
  2166. u8 status;
  2167. int i, err;
  2168. err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver,
  2169. sizeof(ver));
  2170. if (err < 0)
  2171. return err;
  2172. ver_rom = le32_to_cpu(ver.rom_version);
  2173. /* Don't care about high ROM versions */
  2174. if (ver_rom & ~0xffffU)
  2175. return 0;
  2176. for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) {
  2177. if (ver_rom == qca_devices_table[i].rom_version)
  2178. info = &qca_devices_table[i];
  2179. }
  2180. if (!info) {
  2181. bt_dev_err(hdev, "don't support firmware rome 0x%x", ver_rom);
  2182. return -ENODEV;
  2183. }
  2184. err = btusb_qca_send_vendor_req(udev, QCA_CHECK_STATUS, &status,
  2185. sizeof(status));
  2186. if (err < 0)
  2187. return err;
  2188. if (!(status & QCA_PATCH_UPDATED)) {
  2189. err = btusb_setup_qca_load_rampatch(hdev, &ver, info);
  2190. if (err < 0)
  2191. return err;
  2192. }
  2193. if (!(status & QCA_SYSCFG_UPDATED)) {
  2194. err = btusb_setup_qca_load_nvm(hdev, &ver, info);
  2195. if (err < 0)
  2196. return err;
  2197. }
  2198. return 0;
  2199. }
  2200. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2201. static inline int __set_diag_interface(struct hci_dev *hdev)
  2202. {
  2203. struct btusb_data *data = hci_get_drvdata(hdev);
  2204. struct usb_interface *intf = data->diag;
  2205. int i;
  2206. if (!data->diag)
  2207. return -ENODEV;
  2208. data->diag_tx_ep = NULL;
  2209. data->diag_rx_ep = NULL;
  2210. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  2211. struct usb_endpoint_descriptor *ep_desc;
  2212. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  2213. if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
  2214. data->diag_tx_ep = ep_desc;
  2215. continue;
  2216. }
  2217. if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
  2218. data->diag_rx_ep = ep_desc;
  2219. continue;
  2220. }
  2221. }
  2222. if (!data->diag_tx_ep || !data->diag_rx_ep) {
  2223. bt_dev_err(hdev, "invalid diagnostic descriptors");
  2224. return -ENODEV;
  2225. }
  2226. return 0;
  2227. }
  2228. static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable)
  2229. {
  2230. struct btusb_data *data = hci_get_drvdata(hdev);
  2231. struct sk_buff *skb;
  2232. struct urb *urb;
  2233. unsigned int pipe;
  2234. if (!data->diag_tx_ep)
  2235. return ERR_PTR(-ENODEV);
  2236. urb = usb_alloc_urb(0, GFP_KERNEL);
  2237. if (!urb)
  2238. return ERR_PTR(-ENOMEM);
  2239. skb = bt_skb_alloc(2, GFP_KERNEL);
  2240. if (!skb) {
  2241. usb_free_urb(urb);
  2242. return ERR_PTR(-ENOMEM);
  2243. }
  2244. skb_put_u8(skb, 0xf0);
  2245. skb_put_u8(skb, enable);
  2246. pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress);
  2247. usb_fill_bulk_urb(urb, data->udev, pipe,
  2248. skb->data, skb->len, btusb_tx_complete, skb);
  2249. skb->dev = (void *)hdev;
  2250. return urb;
  2251. }
  2252. static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable)
  2253. {
  2254. struct btusb_data *data = hci_get_drvdata(hdev);
  2255. struct urb *urb;
  2256. if (!data->diag)
  2257. return -ENODEV;
  2258. if (!test_bit(HCI_RUNNING, &hdev->flags))
  2259. return -ENETDOWN;
  2260. urb = alloc_diag_urb(hdev, enable);
  2261. if (IS_ERR(urb))
  2262. return PTR_ERR(urb);
  2263. return submit_or_queue_tx_urb(hdev, urb);
  2264. }
  2265. #endif
  2266. #ifdef CONFIG_PM
  2267. static irqreturn_t btusb_oob_wake_handler(int irq, void *priv)
  2268. {
  2269. struct btusb_data *data = priv;
  2270. pm_wakeup_event(&data->udev->dev, 0);
  2271. pm_system_wakeup();
  2272. /* Disable only if not already disabled (keep it balanced) */
  2273. if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
  2274. disable_irq_nosync(irq);
  2275. disable_irq_wake(irq);
  2276. }
  2277. return IRQ_HANDLED;
  2278. }
  2279. static const struct of_device_id btusb_match_table[] = {
  2280. { .compatible = "usb1286,204e" },
  2281. { }
  2282. };
  2283. MODULE_DEVICE_TABLE(of, btusb_match_table);
  2284. /* Use an oob wakeup pin? */
  2285. static int btusb_config_oob_wake(struct hci_dev *hdev)
  2286. {
  2287. struct btusb_data *data = hci_get_drvdata(hdev);
  2288. struct device *dev = &data->udev->dev;
  2289. int irq, ret;
  2290. clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
  2291. if (!of_match_device(btusb_match_table, dev))
  2292. return 0;
  2293. /* Move on if no IRQ specified */
  2294. irq = of_irq_get_byname(dev->of_node, "wakeup");
  2295. if (irq <= 0) {
  2296. bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__);
  2297. return 0;
  2298. }
  2299. ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler,
  2300. 0, "OOB Wake-on-BT", data);
  2301. if (ret) {
  2302. bt_dev_err(hdev, "%s: IRQ request failed", __func__);
  2303. return ret;
  2304. }
  2305. ret = device_init_wakeup(dev, true);
  2306. if (ret) {
  2307. bt_dev_err(hdev, "%s: failed to init_wakeup", __func__);
  2308. return ret;
  2309. }
  2310. data->oob_wake_irq = irq;
  2311. disable_irq(irq);
  2312. bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq);
  2313. return 0;
  2314. }
  2315. #endif
  2316. static void btusb_check_needs_reset_resume(struct usb_interface *intf)
  2317. {
  2318. if (dmi_check_system(btusb_needs_reset_resume_table))
  2319. interface_to_usbdev(intf)->quirks |= USB_QUIRK_RESET_RESUME;
  2320. }
  2321. static int btusb_probe(struct usb_interface *intf,
  2322. const struct usb_device_id *id)
  2323. {
  2324. struct usb_endpoint_descriptor *ep_desc;
  2325. struct btusb_data *data;
  2326. struct hci_dev *hdev;
  2327. unsigned ifnum_base;
  2328. int i, err;
  2329. BT_DBG("intf %p id %p", intf, id);
  2330. /* interface numbers are hardcoded in the spec */
  2331. if (intf->cur_altsetting->desc.bInterfaceNumber != 0) {
  2332. if (!(id->driver_info & BTUSB_IFNUM_2))
  2333. return -ENODEV;
  2334. if (intf->cur_altsetting->desc.bInterfaceNumber != 2)
  2335. return -ENODEV;
  2336. }
  2337. ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber;
  2338. if (!id->driver_info) {
  2339. const struct usb_device_id *match;
  2340. match = usb_match_id(intf, blacklist_table);
  2341. if (match)
  2342. id = match;
  2343. }
  2344. if (id->driver_info == BTUSB_IGNORE)
  2345. return -ENODEV;
  2346. if (id->driver_info & BTUSB_ATH3012) {
  2347. struct usb_device *udev = interface_to_usbdev(intf);
  2348. /* Old firmware would otherwise let ath3k driver load
  2349. * patch and sysconfig files
  2350. */
  2351. if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001 &&
  2352. !btusb_qca_need_patch(udev))
  2353. return -ENODEV;
  2354. }
  2355. data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL);
  2356. if (!data)
  2357. return -ENOMEM;
  2358. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  2359. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  2360. if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) {
  2361. data->intr_ep = ep_desc;
  2362. continue;
  2363. }
  2364. if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
  2365. data->bulk_tx_ep = ep_desc;
  2366. continue;
  2367. }
  2368. if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
  2369. data->bulk_rx_ep = ep_desc;
  2370. continue;
  2371. }
  2372. }
  2373. if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep)
  2374. return -ENODEV;
  2375. if (id->driver_info & BTUSB_AMP) {
  2376. data->cmdreq_type = USB_TYPE_CLASS | 0x01;
  2377. data->cmdreq = 0x2b;
  2378. } else {
  2379. data->cmdreq_type = USB_TYPE_CLASS;
  2380. data->cmdreq = 0x00;
  2381. }
  2382. data->udev = interface_to_usbdev(intf);
  2383. data->intf = intf;
  2384. INIT_WORK(&data->work, btusb_work);
  2385. INIT_WORK(&data->waker, btusb_waker);
  2386. init_usb_anchor(&data->deferred);
  2387. init_usb_anchor(&data->tx_anchor);
  2388. spin_lock_init(&data->txlock);
  2389. init_usb_anchor(&data->intr_anchor);
  2390. init_usb_anchor(&data->bulk_anchor);
  2391. init_usb_anchor(&data->isoc_anchor);
  2392. init_usb_anchor(&data->diag_anchor);
  2393. spin_lock_init(&data->rxlock);
  2394. if (id->driver_info & BTUSB_INTEL_NEW) {
  2395. data->recv_event = btusb_recv_event_intel;
  2396. data->recv_bulk = btusb_recv_bulk_intel;
  2397. set_bit(BTUSB_BOOTLOADER, &data->flags);
  2398. } else {
  2399. data->recv_event = hci_recv_frame;
  2400. data->recv_bulk = btusb_recv_bulk;
  2401. }
  2402. hdev = hci_alloc_dev();
  2403. if (!hdev)
  2404. return -ENOMEM;
  2405. hdev->bus = HCI_USB;
  2406. hci_set_drvdata(hdev, data);
  2407. if (id->driver_info & BTUSB_AMP)
  2408. hdev->dev_type = HCI_AMP;
  2409. else
  2410. hdev->dev_type = HCI_PRIMARY;
  2411. data->hdev = hdev;
  2412. SET_HCIDEV_DEV(hdev, &intf->dev);
  2413. hdev->open = btusb_open;
  2414. hdev->close = btusb_close;
  2415. hdev->flush = btusb_flush;
  2416. hdev->send = btusb_send_frame;
  2417. hdev->notify = btusb_notify;
  2418. #ifdef CONFIG_PM
  2419. err = btusb_config_oob_wake(hdev);
  2420. if (err)
  2421. goto out_free_dev;
  2422. /* Marvell devices may need a specific chip configuration */
  2423. if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) {
  2424. err = marvell_config_oob_wake(hdev);
  2425. if (err)
  2426. goto out_free_dev;
  2427. }
  2428. #endif
  2429. if (id->driver_info & BTUSB_CW6622)
  2430. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  2431. if (id->driver_info & BTUSB_BCM2045)
  2432. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  2433. if (id->driver_info & BTUSB_BCM92035)
  2434. hdev->setup = btusb_setup_bcm92035;
  2435. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2436. if (id->driver_info & BTUSB_BCM_PATCHRAM) {
  2437. hdev->manufacturer = 15;
  2438. hdev->setup = btbcm_setup_patchram;
  2439. hdev->set_diag = btusb_bcm_set_diag;
  2440. hdev->set_bdaddr = btbcm_set_bdaddr;
  2441. /* Broadcom LM_DIAG Interface numbers are hardcoded */
  2442. data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
  2443. }
  2444. if (id->driver_info & BTUSB_BCM_APPLE) {
  2445. hdev->manufacturer = 15;
  2446. hdev->setup = btbcm_setup_apple;
  2447. hdev->set_diag = btusb_bcm_set_diag;
  2448. /* Broadcom LM_DIAG Interface numbers are hardcoded */
  2449. data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
  2450. }
  2451. #endif
  2452. if (id->driver_info & BTUSB_INTEL) {
  2453. hdev->manufacturer = 2;
  2454. hdev->setup = btusb_setup_intel;
  2455. hdev->shutdown = btusb_shutdown_intel;
  2456. hdev->set_diag = btintel_set_diag_mfg;
  2457. hdev->set_bdaddr = btintel_set_bdaddr;
  2458. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2459. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2460. set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
  2461. }
  2462. if (id->driver_info & BTUSB_INTEL_NEW) {
  2463. hdev->manufacturer = 2;
  2464. hdev->send = btusb_send_frame_intel;
  2465. hdev->setup = btusb_setup_intel_new;
  2466. hdev->hw_error = btintel_hw_error;
  2467. hdev->set_diag = btintel_set_diag;
  2468. hdev->set_bdaddr = btintel_set_bdaddr;
  2469. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2470. set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
  2471. }
  2472. if (id->driver_info & BTUSB_MARVELL)
  2473. hdev->set_bdaddr = btusb_set_bdaddr_marvell;
  2474. if (id->driver_info & BTUSB_SWAVE) {
  2475. set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks);
  2476. set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks);
  2477. }
  2478. if (id->driver_info & BTUSB_INTEL_BOOT) {
  2479. hdev->manufacturer = 2;
  2480. set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
  2481. }
  2482. if (id->driver_info & BTUSB_ATH3012) {
  2483. data->setup_on_usb = btusb_setup_qca;
  2484. hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
  2485. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2486. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2487. }
  2488. if (id->driver_info & BTUSB_QCA_ROME) {
  2489. data->setup_on_usb = btusb_setup_qca;
  2490. hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
  2491. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2492. btusb_check_needs_reset_resume(intf);
  2493. }
  2494. #ifdef CONFIG_BT_HCIBTUSB_RTL
  2495. if (id->driver_info & BTUSB_REALTEK) {
  2496. hdev->setup = btrtl_setup_realtek;
  2497. /* Realtek devices lose their updated firmware over suspend,
  2498. * but the USB hub doesn't notice any status change.
  2499. * Explicitly request a device reset on resume.
  2500. */
  2501. interface_to_usbdev(intf)->quirks |= USB_QUIRK_RESET_RESUME;
  2502. }
  2503. #endif
  2504. if (id->driver_info & BTUSB_AMP) {
  2505. /* AMP controllers do not support SCO packets */
  2506. data->isoc = NULL;
  2507. } else {
  2508. /* Interface orders are hardcoded in the specification */
  2509. data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1);
  2510. data->isoc_ifnum = ifnum_base + 1;
  2511. }
  2512. if (!reset)
  2513. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2514. if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) {
  2515. if (!disable_scofix)
  2516. set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks);
  2517. }
  2518. if (id->driver_info & BTUSB_BROKEN_ISOC)
  2519. data->isoc = NULL;
  2520. if (id->driver_info & BTUSB_DIGIANSWER) {
  2521. data->cmdreq_type = USB_TYPE_VENDOR;
  2522. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2523. }
  2524. if (id->driver_info & BTUSB_CSR) {
  2525. struct usb_device *udev = data->udev;
  2526. u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice);
  2527. /* Old firmware would otherwise execute USB reset */
  2528. if (bcdDevice < 0x117)
  2529. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2530. /* Fake CSR devices with broken commands */
  2531. if (bcdDevice <= 0x100 || bcdDevice == 0x134)
  2532. hdev->setup = btusb_setup_csr;
  2533. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2534. }
  2535. if (id->driver_info & BTUSB_SNIFFER) {
  2536. struct usb_device *udev = data->udev;
  2537. /* New sniffer firmware has crippled HCI interface */
  2538. if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997)
  2539. set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
  2540. }
  2541. if (id->driver_info & BTUSB_INTEL_BOOT) {
  2542. /* A bug in the bootloader causes that interrupt interface is
  2543. * only enabled after receiving SetInterface(0, AltSetting=0).
  2544. */
  2545. err = usb_set_interface(data->udev, 0, 0);
  2546. if (err < 0) {
  2547. BT_ERR("failed to set interface 0, alt 0 %d", err);
  2548. goto out_free_dev;
  2549. }
  2550. }
  2551. if (data->isoc) {
  2552. err = usb_driver_claim_interface(&btusb_driver,
  2553. data->isoc, data);
  2554. if (err < 0)
  2555. goto out_free_dev;
  2556. }
  2557. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2558. if (data->diag) {
  2559. if (!usb_driver_claim_interface(&btusb_driver,
  2560. data->diag, data))
  2561. __set_diag_interface(hdev);
  2562. else
  2563. data->diag = NULL;
  2564. }
  2565. #endif
  2566. if (enable_autosuspend)
  2567. usb_enable_autosuspend(data->udev);
  2568. err = hci_register_dev(hdev);
  2569. if (err < 0)
  2570. goto out_free_dev;
  2571. usb_set_intfdata(intf, data);
  2572. return 0;
  2573. out_free_dev:
  2574. hci_free_dev(hdev);
  2575. return err;
  2576. }
  2577. static void btusb_disconnect(struct usb_interface *intf)
  2578. {
  2579. struct btusb_data *data = usb_get_intfdata(intf);
  2580. struct hci_dev *hdev;
  2581. BT_DBG("intf %p", intf);
  2582. if (!data)
  2583. return;
  2584. hdev = data->hdev;
  2585. usb_set_intfdata(data->intf, NULL);
  2586. if (data->isoc)
  2587. usb_set_intfdata(data->isoc, NULL);
  2588. if (data->diag)
  2589. usb_set_intfdata(data->diag, NULL);
  2590. hci_unregister_dev(hdev);
  2591. if (intf == data->intf) {
  2592. if (data->isoc)
  2593. usb_driver_release_interface(&btusb_driver, data->isoc);
  2594. if (data->diag)
  2595. usb_driver_release_interface(&btusb_driver, data->diag);
  2596. } else if (intf == data->isoc) {
  2597. if (data->diag)
  2598. usb_driver_release_interface(&btusb_driver, data->diag);
  2599. usb_driver_release_interface(&btusb_driver, data->intf);
  2600. } else if (intf == data->diag) {
  2601. usb_driver_release_interface(&btusb_driver, data->intf);
  2602. if (data->isoc)
  2603. usb_driver_release_interface(&btusb_driver, data->isoc);
  2604. }
  2605. if (data->oob_wake_irq)
  2606. device_init_wakeup(&data->udev->dev, false);
  2607. hci_free_dev(hdev);
  2608. }
  2609. #ifdef CONFIG_PM
  2610. static int btusb_suspend(struct usb_interface *intf, pm_message_t message)
  2611. {
  2612. struct btusb_data *data = usb_get_intfdata(intf);
  2613. BT_DBG("intf %p", intf);
  2614. if (data->suspend_count++)
  2615. return 0;
  2616. spin_lock_irq(&data->txlock);
  2617. if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) {
  2618. set_bit(BTUSB_SUSPENDING, &data->flags);
  2619. spin_unlock_irq(&data->txlock);
  2620. } else {
  2621. spin_unlock_irq(&data->txlock);
  2622. data->suspend_count--;
  2623. return -EBUSY;
  2624. }
  2625. cancel_work_sync(&data->work);
  2626. btusb_stop_traffic(data);
  2627. usb_kill_anchored_urbs(&data->tx_anchor);
  2628. if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) {
  2629. set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
  2630. enable_irq_wake(data->oob_wake_irq);
  2631. enable_irq(data->oob_wake_irq);
  2632. }
  2633. return 0;
  2634. }
  2635. static void play_deferred(struct btusb_data *data)
  2636. {
  2637. struct urb *urb;
  2638. int err;
  2639. while ((urb = usb_get_from_anchor(&data->deferred))) {
  2640. usb_anchor_urb(urb, &data->tx_anchor);
  2641. err = usb_submit_urb(urb, GFP_ATOMIC);
  2642. if (err < 0) {
  2643. if (err != -EPERM && err != -ENODEV)
  2644. BT_ERR("%s urb %p submission failed (%d)",
  2645. data->hdev->name, urb, -err);
  2646. kfree(urb->setup_packet);
  2647. usb_unanchor_urb(urb);
  2648. usb_free_urb(urb);
  2649. break;
  2650. }
  2651. data->tx_in_flight++;
  2652. usb_free_urb(urb);
  2653. }
  2654. /* Cleanup the rest deferred urbs. */
  2655. while ((urb = usb_get_from_anchor(&data->deferred))) {
  2656. kfree(urb->setup_packet);
  2657. usb_free_urb(urb);
  2658. }
  2659. }
  2660. static int btusb_resume(struct usb_interface *intf)
  2661. {
  2662. struct btusb_data *data = usb_get_intfdata(intf);
  2663. struct hci_dev *hdev = data->hdev;
  2664. int err = 0;
  2665. BT_DBG("intf %p", intf);
  2666. if (--data->suspend_count)
  2667. return 0;
  2668. /* Disable only if not already disabled (keep it balanced) */
  2669. if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
  2670. disable_irq(data->oob_wake_irq);
  2671. disable_irq_wake(data->oob_wake_irq);
  2672. }
  2673. if (!test_bit(HCI_RUNNING, &hdev->flags))
  2674. goto done;
  2675. if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) {
  2676. err = btusb_submit_intr_urb(hdev, GFP_NOIO);
  2677. if (err < 0) {
  2678. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  2679. goto failed;
  2680. }
  2681. }
  2682. if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) {
  2683. err = btusb_submit_bulk_urb(hdev, GFP_NOIO);
  2684. if (err < 0) {
  2685. clear_bit(BTUSB_BULK_RUNNING, &data->flags);
  2686. goto failed;
  2687. }
  2688. btusb_submit_bulk_urb(hdev, GFP_NOIO);
  2689. }
  2690. if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
  2691. if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0)
  2692. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  2693. else
  2694. btusb_submit_isoc_urb(hdev, GFP_NOIO);
  2695. }
  2696. spin_lock_irq(&data->txlock);
  2697. play_deferred(data);
  2698. clear_bit(BTUSB_SUSPENDING, &data->flags);
  2699. spin_unlock_irq(&data->txlock);
  2700. schedule_work(&data->work);
  2701. return 0;
  2702. failed:
  2703. usb_scuttle_anchored_urbs(&data->deferred);
  2704. done:
  2705. spin_lock_irq(&data->txlock);
  2706. clear_bit(BTUSB_SUSPENDING, &data->flags);
  2707. spin_unlock_irq(&data->txlock);
  2708. return err;
  2709. }
  2710. #endif
  2711. static struct usb_driver btusb_driver = {
  2712. .name = "btusb",
  2713. .probe = btusb_probe,
  2714. .disconnect = btusb_disconnect,
  2715. #ifdef CONFIG_PM
  2716. .suspend = btusb_suspend,
  2717. .resume = btusb_resume,
  2718. #endif
  2719. .id_table = btusb_table,
  2720. .supports_autosuspend = 1,
  2721. .disable_hub_initiated_lpm = 1,
  2722. };
  2723. module_usb_driver(btusb_driver);
  2724. module_param(disable_scofix, bool, 0644);
  2725. MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size");
  2726. module_param(force_scofix, bool, 0644);
  2727. MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size");
  2728. module_param(enable_autosuspend, bool, 0644);
  2729. MODULE_PARM_DESC(enable_autosuspend, "Enable USB autosuspend by default");
  2730. module_param(reset, bool, 0644);
  2731. MODULE_PARM_DESC(reset, "Send HCI reset command on initialization");
  2732. MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
  2733. MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION);
  2734. MODULE_VERSION(VERSION);
  2735. MODULE_LICENSE("GPL");