1 /* 2 * 3 * Generic Bluetooth USB driver 4 * 5 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> 6 * 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 21 * 22 */ 23 24 #include <linux/module.h> 25 #include <linux/usb.h> 26 #include <linux/firmware.h> 27 #include <linux/of_device.h> 28 #include <linux/of_irq.h> 29 #include <linux/suspend.h> 30 #include <asm/unaligned.h> 31 32 #include <net/bluetooth/bluetooth.h> 33 #include <net/bluetooth/hci_core.h> 34 35 #include "btintel.h" 36 #include "btbcm.h" 37 #include "btrtl.h" 38 39 #define VERSION "0.8" 40 41 static bool disable_scofix; 42 static bool force_scofix; 43 44 static bool reset = true; 45 46 static struct usb_driver btusb_driver; 47 48 #define BTUSB_IGNORE 0x01 49 #define BTUSB_DIGIANSWER 0x02 50 #define BTUSB_CSR 0x04 51 #define BTUSB_SNIFFER 0x08 52 #define BTUSB_BCM92035 0x10 53 #define BTUSB_BROKEN_ISOC 0x20 54 #define BTUSB_WRONG_SCO_MTU 0x40 55 #define BTUSB_ATH3012 0x80 56 #define BTUSB_INTEL 0x100 57 #define BTUSB_INTEL_BOOT 0x200 58 #define BTUSB_BCM_PATCHRAM 0x400 59 #define BTUSB_MARVELL 0x800 60 #define BTUSB_SWAVE 0x1000 61 #define BTUSB_INTEL_NEW 0x2000 62 #define BTUSB_AMP 0x4000 63 #define BTUSB_QCA_ROME 0x8000 64 #define BTUSB_BCM_APPLE 0x10000 65 #define BTUSB_REALTEK 0x20000 66 #define BTUSB_BCM2045 0x40000 67 #define BTUSB_IFNUM_2 0x80000 68 #define BTUSB_CW6622 0x100000 69 70 static const struct usb_device_id btusb_table[] = { 71 /* Generic Bluetooth USB device */ 72 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, 73 74 /* Generic Bluetooth AMP device */ 75 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, 76 77 /* Generic Bluetooth USB interface */ 78 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, 79 80 /* Apple-specific (Broadcom) devices */ 81 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), 82 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, 83 84 /* MediaTek MT76x0E */ 85 { USB_DEVICE(0x0e8d, 0x763f) }, 86 87 /* Broadcom SoftSailing reporting vendor specific */ 88 { USB_DEVICE(0x0a5c, 0x21e1) }, 89 90 /* Apple MacBookPro 7,1 */ 91 { USB_DEVICE(0x05ac, 0x8213) }, 92 93 /* Apple iMac11,1 */ 94 { USB_DEVICE(0x05ac, 0x8215) }, 95 96 /* Apple MacBookPro6,2 */ 97 { USB_DEVICE(0x05ac, 0x8218) }, 98 99 /* Apple MacBookAir3,1, MacBookAir3,2 */ 100 { USB_DEVICE(0x05ac, 0x821b) }, 101 102 /* Apple MacBookAir4,1 */ 103 { USB_DEVICE(0x05ac, 0x821f) }, 104 105 /* Apple MacBookPro8,2 */ 106 { USB_DEVICE(0x05ac, 0x821a) }, 107 108 /* Apple MacMini5,1 */ 109 { USB_DEVICE(0x05ac, 0x8281) }, 110 111 /* AVM BlueFRITZ! USB v2.0 */ 112 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, 113 114 /* Bluetooth Ultraport Module from IBM */ 115 { USB_DEVICE(0x04bf, 0x030a) }, 116 117 /* ALPS Modules with non-standard id */ 118 { USB_DEVICE(0x044e, 0x3001) }, 119 { USB_DEVICE(0x044e, 0x3002) }, 120 121 /* Ericsson with non-standard id */ 122 { USB_DEVICE(0x0bdb, 0x1002) }, 123 124 /* Canyon CN-BTU1 with HID interfaces */ 125 { USB_DEVICE(0x0c10, 0x0000) }, 126 127 /* Broadcom BCM20702A0 */ 128 { USB_DEVICE(0x413c, 0x8197) }, 129 130 /* Broadcom BCM20702B0 (Dynex/Insignia) */ 131 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, 132 133 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ 134 { USB_DEVICE(0x105b, 0xe065), .driver_info = BTUSB_BCM_PATCHRAM }, 135 136 /* Broadcom BCM920703 (HTC Vive) */ 137 { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01), 138 .driver_info = BTUSB_BCM_PATCHRAM }, 139 140 /* Foxconn - Hon Hai */ 141 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), 142 .driver_info = BTUSB_BCM_PATCHRAM }, 143 144 /* Lite-On Technology - Broadcom based */ 145 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), 146 .driver_info = BTUSB_BCM_PATCHRAM }, 147 148 /* Broadcom devices with vendor specific id */ 149 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), 150 .driver_info = BTUSB_BCM_PATCHRAM }, 151 152 /* ASUSTek Computer - Broadcom based */ 153 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), 154 .driver_info = BTUSB_BCM_PATCHRAM }, 155 156 /* Belkin F8065bf - Broadcom based */ 157 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), 158 .driver_info = BTUSB_BCM_PATCHRAM }, 159 160 /* IMC Networks - Broadcom based */ 161 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), 162 .driver_info = BTUSB_BCM_PATCHRAM }, 163 164 /* Dell Computer - Broadcom based */ 165 { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01), 166 .driver_info = BTUSB_BCM_PATCHRAM }, 167 168 /* Toshiba Corp - Broadcom based */ 169 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), 170 .driver_info = BTUSB_BCM_PATCHRAM }, 171 172 /* Intel Bluetooth USB Bootloader (RAM module) */ 173 { USB_DEVICE(0x8087, 0x0a5a), 174 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, 175 176 { } /* Terminating entry */ 177 }; 178 179 MODULE_DEVICE_TABLE(usb, btusb_table); 180 181 static const struct usb_device_id blacklist_table[] = { 182 /* CSR BlueCore devices */ 183 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, 184 185 /* Broadcom BCM2033 without firmware */ 186 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, 187 188 /* Broadcom BCM2045 devices */ 189 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, 190 191 /* Atheros 3011 with sflash firmware */ 192 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, 193 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, 194 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, 195 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, 196 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, 197 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, 198 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, 199 200 /* Atheros AR9285 Malbec with sflash firmware */ 201 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, 202 203 /* Atheros 3012 with sflash firmware */ 204 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, 205 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, 206 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, 207 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, 208 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, 209 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, 210 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, 211 { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 }, 212 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, 213 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, 214 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, 215 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, 216 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, 217 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, 218 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, 219 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, 220 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, 221 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, 222 { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 }, 223 { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 }, 224 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, 225 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, 226 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, 227 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, 228 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, 229 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, 230 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, 231 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, 232 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, 233 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, 234 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, 235 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, 236 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, 237 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, 238 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, 239 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, 240 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, 241 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, 242 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, 243 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, 244 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, 245 { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 }, 246 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, 247 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, 248 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, 249 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, 250 { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 }, 251 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, 252 { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 }, 253 { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 }, 254 255 /* Atheros AR5BBU12 with sflash firmware */ 256 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, 257 258 /* Atheros AR5BBU12 with sflash firmware */ 259 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, 260 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, 261 262 /* QCA ROME chipset */ 263 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME }, 264 { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME }, 265 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME }, 266 { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME }, 267 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, 268 { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME }, 269 { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME }, 270 271 /* Broadcom BCM2035 */ 272 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, 273 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, 274 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, 275 276 /* Broadcom BCM2045 */ 277 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, 278 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, 279 280 /* IBM/Lenovo ThinkPad with Broadcom chip */ 281 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, 282 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, 283 284 /* HP laptop with Broadcom chip */ 285 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, 286 287 /* Dell laptop with Broadcom chip */ 288 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, 289 290 /* Dell Wireless 370 and 410 devices */ 291 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, 292 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, 293 294 /* Belkin F8T012 and F8T013 devices */ 295 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, 296 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, 297 298 /* Asus WL-BTD202 device */ 299 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, 300 301 /* Kensington Bluetooth USB adapter */ 302 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, 303 304 /* RTX Telecom based adapters with buggy SCO support */ 305 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, 306 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, 307 308 /* CONWISE Technology based adapters with buggy SCO support */ 309 { USB_DEVICE(0x0e5e, 0x6622), 310 .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622}, 311 312 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ 313 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, 314 315 /* Digianswer devices */ 316 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, 317 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, 318 319 /* CSR BlueCore Bluetooth Sniffer */ 320 { USB_DEVICE(0x0a12, 0x0002), 321 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 322 323 /* Frontline ComProbe Bluetooth Sniffer */ 324 { USB_DEVICE(0x16d3, 0x0002), 325 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 326 327 /* Marvell Bluetooth devices */ 328 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, 329 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, 330 { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL }, 331 332 /* Intel Bluetooth devices */ 333 { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW }, 334 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, 335 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, 336 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, 337 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW }, 338 { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL }, 339 340 /* Other Intel Bluetooth devices */ 341 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), 342 .driver_info = BTUSB_IGNORE }, 343 344 /* Realtek Bluetooth devices */ 345 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), 346 .driver_info = BTUSB_REALTEK }, 347 348 /* Additional Realtek 8723AE Bluetooth devices */ 349 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, 350 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, 351 352 /* Additional Realtek 8723BE Bluetooth devices */ 353 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, 354 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, 355 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, 356 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, 357 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, 358 359 /* Additional Realtek 8821AE Bluetooth devices */ 360 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, 361 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, 362 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, 363 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, 364 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, 365 366 /* Silicon Wave based devices */ 367 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, 368 369 { } /* Terminating entry */ 370 }; 371 372 #define BTUSB_MAX_ISOC_FRAMES 10 373 374 #define BTUSB_INTR_RUNNING 0 375 #define BTUSB_BULK_RUNNING 1 376 #define BTUSB_ISOC_RUNNING 2 377 #define BTUSB_SUSPENDING 3 378 #define BTUSB_DID_ISO_RESUME 4 379 #define BTUSB_BOOTLOADER 5 380 #define BTUSB_DOWNLOADING 6 381 #define BTUSB_FIRMWARE_LOADED 7 382 #define BTUSB_FIRMWARE_FAILED 8 383 #define BTUSB_BOOTING 9 384 #define BTUSB_RESET_RESUME 10 385 #define BTUSB_DIAG_RUNNING 11 386 #define BTUSB_OOB_WAKE_ENABLED 12 387 388 struct btusb_data { 389 struct hci_dev *hdev; 390 struct usb_device *udev; 391 struct usb_interface *intf; 392 struct usb_interface *isoc; 393 struct usb_interface *diag; 394 395 unsigned long flags; 396 397 struct work_struct work; 398 struct work_struct waker; 399 400 struct usb_anchor deferred; 401 struct usb_anchor tx_anchor; 402 int tx_in_flight; 403 spinlock_t txlock; 404 405 struct usb_anchor intr_anchor; 406 struct usb_anchor bulk_anchor; 407 struct usb_anchor isoc_anchor; 408 struct usb_anchor diag_anchor; 409 spinlock_t rxlock; 410 411 struct sk_buff *evt_skb; 412 struct sk_buff *acl_skb; 413 struct sk_buff *sco_skb; 414 415 struct usb_endpoint_descriptor *intr_ep; 416 struct usb_endpoint_descriptor *bulk_tx_ep; 417 struct usb_endpoint_descriptor *bulk_rx_ep; 418 struct usb_endpoint_descriptor *isoc_tx_ep; 419 struct usb_endpoint_descriptor *isoc_rx_ep; 420 struct usb_endpoint_descriptor *diag_tx_ep; 421 struct usb_endpoint_descriptor *diag_rx_ep; 422 423 __u8 cmdreq_type; 424 __u8 cmdreq; 425 426 unsigned int sco_num; 427 int isoc_altsetting; 428 int suspend_count; 429 430 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); 431 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); 432 433 int (*setup_on_usb)(struct hci_dev *hdev); 434 435 int oob_wake_irq; /* irq for out-of-band wake-on-bt */ 436 }; 437 438 static inline void btusb_free_frags(struct btusb_data *data) 439 { 440 unsigned long flags; 441 442 spin_lock_irqsave(&data->rxlock, flags); 443 444 kfree_skb(data->evt_skb); 445 data->evt_skb = NULL; 446 447 kfree_skb(data->acl_skb); 448 data->acl_skb = NULL; 449 450 kfree_skb(data->sco_skb); 451 data->sco_skb = NULL; 452 453 spin_unlock_irqrestore(&data->rxlock, flags); 454 } 455 456 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) 457 { 458 struct sk_buff *skb; 459 int err = 0; 460 461 spin_lock(&data->rxlock); 462 skb = data->evt_skb; 463 464 while (count) { 465 int len; 466 467 if (!skb) { 468 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); 469 if (!skb) { 470 err = -ENOMEM; 471 break; 472 } 473 474 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 475 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; 476 } 477 478 len = min_t(uint, hci_skb_expect(skb), count); 479 memcpy(skb_put(skb, len), buffer, len); 480 481 count -= len; 482 buffer += len; 483 hci_skb_expect(skb) -= len; 484 485 if (skb->len == HCI_EVENT_HDR_SIZE) { 486 /* Complete event header */ 487 hci_skb_expect(skb) = hci_event_hdr(skb)->plen; 488 489 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 490 kfree_skb(skb); 491 skb = NULL; 492 493 err = -EILSEQ; 494 break; 495 } 496 } 497 498 if (!hci_skb_expect(skb)) { 499 /* Complete frame */ 500 data->recv_event(data->hdev, skb); 501 skb = NULL; 502 } 503 } 504 505 data->evt_skb = skb; 506 spin_unlock(&data->rxlock); 507 508 return err; 509 } 510 511 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) 512 { 513 struct sk_buff *skb; 514 int err = 0; 515 516 spin_lock(&data->rxlock); 517 skb = data->acl_skb; 518 519 while (count) { 520 int len; 521 522 if (!skb) { 523 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); 524 if (!skb) { 525 err = -ENOMEM; 526 break; 527 } 528 529 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; 530 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; 531 } 532 533 len = min_t(uint, hci_skb_expect(skb), count); 534 memcpy(skb_put(skb, len), buffer, len); 535 536 count -= len; 537 buffer += len; 538 hci_skb_expect(skb) -= len; 539 540 if (skb->len == HCI_ACL_HDR_SIZE) { 541 __le16 dlen = hci_acl_hdr(skb)->dlen; 542 543 /* Complete ACL header */ 544 hci_skb_expect(skb) = __le16_to_cpu(dlen); 545 546 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 547 kfree_skb(skb); 548 skb = NULL; 549 550 err = -EILSEQ; 551 break; 552 } 553 } 554 555 if (!hci_skb_expect(skb)) { 556 /* Complete frame */ 557 hci_recv_frame(data->hdev, skb); 558 skb = NULL; 559 } 560 } 561 562 data->acl_skb = skb; 563 spin_unlock(&data->rxlock); 564 565 return err; 566 } 567 568 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) 569 { 570 struct sk_buff *skb; 571 int err = 0; 572 573 spin_lock(&data->rxlock); 574 skb = data->sco_skb; 575 576 while (count) { 577 int len; 578 579 if (!skb) { 580 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); 581 if (!skb) { 582 err = -ENOMEM; 583 break; 584 } 585 586 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; 587 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; 588 } 589 590 len = min_t(uint, hci_skb_expect(skb), count); 591 memcpy(skb_put(skb, len), buffer, len); 592 593 count -= len; 594 buffer += len; 595 hci_skb_expect(skb) -= len; 596 597 if (skb->len == HCI_SCO_HDR_SIZE) { 598 /* Complete SCO header */ 599 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; 600 601 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 602 kfree_skb(skb); 603 skb = NULL; 604 605 err = -EILSEQ; 606 break; 607 } 608 } 609 610 if (!hci_skb_expect(skb)) { 611 /* Complete frame */ 612 hci_recv_frame(data->hdev, skb); 613 skb = NULL; 614 } 615 } 616 617 data->sco_skb = skb; 618 spin_unlock(&data->rxlock); 619 620 return err; 621 } 622 623 static void btusb_intr_complete(struct urb *urb) 624 { 625 struct hci_dev *hdev = urb->context; 626 struct btusb_data *data = hci_get_drvdata(hdev); 627 int err; 628 629 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 630 urb->actual_length); 631 632 if (!test_bit(HCI_RUNNING, &hdev->flags)) 633 return; 634 635 if (urb->status == 0) { 636 hdev->stat.byte_rx += urb->actual_length; 637 638 if (btusb_recv_intr(data, urb->transfer_buffer, 639 urb->actual_length) < 0) { 640 BT_ERR("%s corrupted event packet", hdev->name); 641 hdev->stat.err_rx++; 642 } 643 } else if (urb->status == -ENOENT) { 644 /* Avoid suspend failed when usb_kill_urb */ 645 return; 646 } 647 648 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) 649 return; 650 651 usb_mark_last_busy(data->udev); 652 usb_anchor_urb(urb, &data->intr_anchor); 653 654 err = usb_submit_urb(urb, GFP_ATOMIC); 655 if (err < 0) { 656 /* -EPERM: urb is being killed; 657 * -ENODEV: device got disconnected */ 658 if (err != -EPERM && err != -ENODEV) 659 BT_ERR("%s urb %p failed to resubmit (%d)", 660 hdev->name, urb, -err); 661 usb_unanchor_urb(urb); 662 } 663 } 664 665 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) 666 { 667 struct btusb_data *data = hci_get_drvdata(hdev); 668 struct urb *urb; 669 unsigned char *buf; 670 unsigned int pipe; 671 int err, size; 672 673 BT_DBG("%s", hdev->name); 674 675 if (!data->intr_ep) 676 return -ENODEV; 677 678 urb = usb_alloc_urb(0, mem_flags); 679 if (!urb) 680 return -ENOMEM; 681 682 size = le16_to_cpu(data->intr_ep->wMaxPacketSize); 683 684 buf = kmalloc(size, mem_flags); 685 if (!buf) { 686 usb_free_urb(urb); 687 return -ENOMEM; 688 } 689 690 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); 691 692 usb_fill_int_urb(urb, data->udev, pipe, buf, size, 693 btusb_intr_complete, hdev, data->intr_ep->bInterval); 694 695 urb->transfer_flags |= URB_FREE_BUFFER; 696 697 usb_anchor_urb(urb, &data->intr_anchor); 698 699 err = usb_submit_urb(urb, mem_flags); 700 if (err < 0) { 701 if (err != -EPERM && err != -ENODEV) 702 BT_ERR("%s urb %p submission failed (%d)", 703 hdev->name, urb, -err); 704 usb_unanchor_urb(urb); 705 } 706 707 usb_free_urb(urb); 708 709 return err; 710 } 711 712 static void btusb_bulk_complete(struct urb *urb) 713 { 714 struct hci_dev *hdev = urb->context; 715 struct btusb_data *data = hci_get_drvdata(hdev); 716 int err; 717 718 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 719 urb->actual_length); 720 721 if (!test_bit(HCI_RUNNING, &hdev->flags)) 722 return; 723 724 if (urb->status == 0) { 725 hdev->stat.byte_rx += urb->actual_length; 726 727 if (data->recv_bulk(data, urb->transfer_buffer, 728 urb->actual_length) < 0) { 729 BT_ERR("%s corrupted ACL packet", hdev->name); 730 hdev->stat.err_rx++; 731 } 732 } else if (urb->status == -ENOENT) { 733 /* Avoid suspend failed when usb_kill_urb */ 734 return; 735 } 736 737 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) 738 return; 739 740 usb_anchor_urb(urb, &data->bulk_anchor); 741 usb_mark_last_busy(data->udev); 742 743 err = usb_submit_urb(urb, GFP_ATOMIC); 744 if (err < 0) { 745 /* -EPERM: urb is being killed; 746 * -ENODEV: device got disconnected */ 747 if (err != -EPERM && err != -ENODEV) 748 BT_ERR("%s urb %p failed to resubmit (%d)", 749 hdev->name, urb, -err); 750 usb_unanchor_urb(urb); 751 } 752 } 753 754 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) 755 { 756 struct btusb_data *data = hci_get_drvdata(hdev); 757 struct urb *urb; 758 unsigned char *buf; 759 unsigned int pipe; 760 int err, size = HCI_MAX_FRAME_SIZE; 761 762 BT_DBG("%s", hdev->name); 763 764 if (!data->bulk_rx_ep) 765 return -ENODEV; 766 767 urb = usb_alloc_urb(0, mem_flags); 768 if (!urb) 769 return -ENOMEM; 770 771 buf = kmalloc(size, mem_flags); 772 if (!buf) { 773 usb_free_urb(urb); 774 return -ENOMEM; 775 } 776 777 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); 778 779 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 780 btusb_bulk_complete, hdev); 781 782 urb->transfer_flags |= URB_FREE_BUFFER; 783 784 usb_mark_last_busy(data->udev); 785 usb_anchor_urb(urb, &data->bulk_anchor); 786 787 err = usb_submit_urb(urb, mem_flags); 788 if (err < 0) { 789 if (err != -EPERM && err != -ENODEV) 790 BT_ERR("%s urb %p submission failed (%d)", 791 hdev->name, urb, -err); 792 usb_unanchor_urb(urb); 793 } 794 795 usb_free_urb(urb); 796 797 return err; 798 } 799 800 static void btusb_isoc_complete(struct urb *urb) 801 { 802 struct hci_dev *hdev = urb->context; 803 struct btusb_data *data = hci_get_drvdata(hdev); 804 int i, err; 805 806 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 807 urb->actual_length); 808 809 if (!test_bit(HCI_RUNNING, &hdev->flags)) 810 return; 811 812 if (urb->status == 0) { 813 for (i = 0; i < urb->number_of_packets; i++) { 814 unsigned int offset = urb->iso_frame_desc[i].offset; 815 unsigned int length = urb->iso_frame_desc[i].actual_length; 816 817 if (urb->iso_frame_desc[i].status) 818 continue; 819 820 hdev->stat.byte_rx += length; 821 822 if (btusb_recv_isoc(data, urb->transfer_buffer + offset, 823 length) < 0) { 824 BT_ERR("%s corrupted SCO packet", hdev->name); 825 hdev->stat.err_rx++; 826 } 827 } 828 } else if (urb->status == -ENOENT) { 829 /* Avoid suspend failed when usb_kill_urb */ 830 return; 831 } 832 833 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) 834 return; 835 836 usb_anchor_urb(urb, &data->isoc_anchor); 837 838 err = usb_submit_urb(urb, GFP_ATOMIC); 839 if (err < 0) { 840 /* -EPERM: urb is being killed; 841 * -ENODEV: device got disconnected */ 842 if (err != -EPERM && err != -ENODEV) 843 BT_ERR("%s urb %p failed to resubmit (%d)", 844 hdev->name, urb, -err); 845 usb_unanchor_urb(urb); 846 } 847 } 848 849 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) 850 { 851 int i, offset = 0; 852 853 BT_DBG("len %d mtu %d", len, mtu); 854 855 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; 856 i++, offset += mtu, len -= mtu) { 857 urb->iso_frame_desc[i].offset = offset; 858 urb->iso_frame_desc[i].length = mtu; 859 } 860 861 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 862 urb->iso_frame_desc[i].offset = offset; 863 urb->iso_frame_desc[i].length = len; 864 i++; 865 } 866 867 urb->number_of_packets = i; 868 } 869 870 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) 871 { 872 struct btusb_data *data = hci_get_drvdata(hdev); 873 struct urb *urb; 874 unsigned char *buf; 875 unsigned int pipe; 876 int err, size; 877 878 BT_DBG("%s", hdev->name); 879 880 if (!data->isoc_rx_ep) 881 return -ENODEV; 882 883 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); 884 if (!urb) 885 return -ENOMEM; 886 887 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * 888 BTUSB_MAX_ISOC_FRAMES; 889 890 buf = kmalloc(size, mem_flags); 891 if (!buf) { 892 usb_free_urb(urb); 893 return -ENOMEM; 894 } 895 896 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); 897 898 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, 899 hdev, data->isoc_rx_ep->bInterval); 900 901 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; 902 903 __fill_isoc_descriptor(urb, size, 904 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); 905 906 usb_anchor_urb(urb, &data->isoc_anchor); 907 908 err = usb_submit_urb(urb, mem_flags); 909 if (err < 0) { 910 if (err != -EPERM && err != -ENODEV) 911 BT_ERR("%s urb %p submission failed (%d)", 912 hdev->name, urb, -err); 913 usb_unanchor_urb(urb); 914 } 915 916 usb_free_urb(urb); 917 918 return err; 919 } 920 921 static void btusb_diag_complete(struct urb *urb) 922 { 923 struct hci_dev *hdev = urb->context; 924 struct btusb_data *data = hci_get_drvdata(hdev); 925 int err; 926 927 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 928 urb->actual_length); 929 930 if (urb->status == 0) { 931 struct sk_buff *skb; 932 933 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); 934 if (skb) { 935 memcpy(skb_put(skb, urb->actual_length), 936 urb->transfer_buffer, urb->actual_length); 937 hci_recv_diag(hdev, skb); 938 } 939 } else if (urb->status == -ENOENT) { 940 /* Avoid suspend failed when usb_kill_urb */ 941 return; 942 } 943 944 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) 945 return; 946 947 usb_anchor_urb(urb, &data->diag_anchor); 948 usb_mark_last_busy(data->udev); 949 950 err = usb_submit_urb(urb, GFP_ATOMIC); 951 if (err < 0) { 952 /* -EPERM: urb is being killed; 953 * -ENODEV: device got disconnected */ 954 if (err != -EPERM && err != -ENODEV) 955 BT_ERR("%s urb %p failed to resubmit (%d)", 956 hdev->name, urb, -err); 957 usb_unanchor_urb(urb); 958 } 959 } 960 961 static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) 962 { 963 struct btusb_data *data = hci_get_drvdata(hdev); 964 struct urb *urb; 965 unsigned char *buf; 966 unsigned int pipe; 967 int err, size = HCI_MAX_FRAME_SIZE; 968 969 BT_DBG("%s", hdev->name); 970 971 if (!data->diag_rx_ep) 972 return -ENODEV; 973 974 urb = usb_alloc_urb(0, mem_flags); 975 if (!urb) 976 return -ENOMEM; 977 978 buf = kmalloc(size, mem_flags); 979 if (!buf) { 980 usb_free_urb(urb); 981 return -ENOMEM; 982 } 983 984 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); 985 986 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 987 btusb_diag_complete, hdev); 988 989 urb->transfer_flags |= URB_FREE_BUFFER; 990 991 usb_mark_last_busy(data->udev); 992 usb_anchor_urb(urb, &data->diag_anchor); 993 994 err = usb_submit_urb(urb, mem_flags); 995 if (err < 0) { 996 if (err != -EPERM && err != -ENODEV) 997 BT_ERR("%s urb %p submission failed (%d)", 998 hdev->name, urb, -err); 999 usb_unanchor_urb(urb); 1000 } 1001 1002 usb_free_urb(urb); 1003 1004 return err; 1005 } 1006 1007 static void btusb_tx_complete(struct urb *urb) 1008 { 1009 struct sk_buff *skb = urb->context; 1010 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1011 struct btusb_data *data = hci_get_drvdata(hdev); 1012 1013 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1014 urb->actual_length); 1015 1016 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1017 goto done; 1018 1019 if (!urb->status) 1020 hdev->stat.byte_tx += urb->transfer_buffer_length; 1021 else 1022 hdev->stat.err_tx++; 1023 1024 done: 1025 spin_lock(&data->txlock); 1026 data->tx_in_flight--; 1027 spin_unlock(&data->txlock); 1028 1029 kfree(urb->setup_packet); 1030 1031 kfree_skb(skb); 1032 } 1033 1034 static void btusb_isoc_tx_complete(struct urb *urb) 1035 { 1036 struct sk_buff *skb = urb->context; 1037 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1038 1039 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1040 urb->actual_length); 1041 1042 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1043 goto done; 1044 1045 if (!urb->status) 1046 hdev->stat.byte_tx += urb->transfer_buffer_length; 1047 else 1048 hdev->stat.err_tx++; 1049 1050 done: 1051 kfree(urb->setup_packet); 1052 1053 kfree_skb(skb); 1054 } 1055 1056 static int btusb_open(struct hci_dev *hdev) 1057 { 1058 struct btusb_data *data = hci_get_drvdata(hdev); 1059 int err; 1060 1061 BT_DBG("%s", hdev->name); 1062 1063 err = usb_autopm_get_interface(data->intf); 1064 if (err < 0) 1065 return err; 1066 1067 /* Patching USB firmware files prior to starting any URBs of HCI path 1068 * It is more safe to use USB bulk channel for downloading USB patch 1069 */ 1070 if (data->setup_on_usb) { 1071 err = data->setup_on_usb(hdev); 1072 if (err < 0) 1073 return err; 1074 } 1075 1076 data->intf->needs_remote_wakeup = 1; 1077 1078 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) 1079 goto done; 1080 1081 err = btusb_submit_intr_urb(hdev, GFP_KERNEL); 1082 if (err < 0) 1083 goto failed; 1084 1085 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1086 if (err < 0) { 1087 usb_kill_anchored_urbs(&data->intr_anchor); 1088 goto failed; 1089 } 1090 1091 set_bit(BTUSB_BULK_RUNNING, &data->flags); 1092 btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1093 1094 if (data->diag) { 1095 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) 1096 set_bit(BTUSB_DIAG_RUNNING, &data->flags); 1097 } 1098 1099 done: 1100 usb_autopm_put_interface(data->intf); 1101 return 0; 1102 1103 failed: 1104 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1105 usb_autopm_put_interface(data->intf); 1106 return err; 1107 } 1108 1109 static void btusb_stop_traffic(struct btusb_data *data) 1110 { 1111 usb_kill_anchored_urbs(&data->intr_anchor); 1112 usb_kill_anchored_urbs(&data->bulk_anchor); 1113 usb_kill_anchored_urbs(&data->isoc_anchor); 1114 usb_kill_anchored_urbs(&data->diag_anchor); 1115 } 1116 1117 static int btusb_close(struct hci_dev *hdev) 1118 { 1119 struct btusb_data *data = hci_get_drvdata(hdev); 1120 int err; 1121 1122 BT_DBG("%s", hdev->name); 1123 1124 cancel_work_sync(&data->work); 1125 cancel_work_sync(&data->waker); 1126 1127 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1128 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 1129 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1130 clear_bit(BTUSB_DIAG_RUNNING, &data->flags); 1131 1132 btusb_stop_traffic(data); 1133 btusb_free_frags(data); 1134 1135 err = usb_autopm_get_interface(data->intf); 1136 if (err < 0) 1137 goto failed; 1138 1139 data->intf->needs_remote_wakeup = 0; 1140 usb_autopm_put_interface(data->intf); 1141 1142 failed: 1143 usb_scuttle_anchored_urbs(&data->deferred); 1144 return 0; 1145 } 1146 1147 static int btusb_flush(struct hci_dev *hdev) 1148 { 1149 struct btusb_data *data = hci_get_drvdata(hdev); 1150 1151 BT_DBG("%s", hdev->name); 1152 1153 usb_kill_anchored_urbs(&data->tx_anchor); 1154 btusb_free_frags(data); 1155 1156 return 0; 1157 } 1158 1159 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) 1160 { 1161 struct btusb_data *data = hci_get_drvdata(hdev); 1162 struct usb_ctrlrequest *dr; 1163 struct urb *urb; 1164 unsigned int pipe; 1165 1166 urb = usb_alloc_urb(0, GFP_KERNEL); 1167 if (!urb) 1168 return ERR_PTR(-ENOMEM); 1169 1170 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 1171 if (!dr) { 1172 usb_free_urb(urb); 1173 return ERR_PTR(-ENOMEM); 1174 } 1175 1176 dr->bRequestType = data->cmdreq_type; 1177 dr->bRequest = data->cmdreq; 1178 dr->wIndex = 0; 1179 dr->wValue = 0; 1180 dr->wLength = __cpu_to_le16(skb->len); 1181 1182 pipe = usb_sndctrlpipe(data->udev, 0x00); 1183 1184 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 1185 skb->data, skb->len, btusb_tx_complete, skb); 1186 1187 skb->dev = (void *)hdev; 1188 1189 return urb; 1190 } 1191 1192 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) 1193 { 1194 struct btusb_data *data = hci_get_drvdata(hdev); 1195 struct urb *urb; 1196 unsigned int pipe; 1197 1198 if (!data->bulk_tx_ep) 1199 return ERR_PTR(-ENODEV); 1200 1201 urb = usb_alloc_urb(0, GFP_KERNEL); 1202 if (!urb) 1203 return ERR_PTR(-ENOMEM); 1204 1205 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); 1206 1207 usb_fill_bulk_urb(urb, data->udev, pipe, 1208 skb->data, skb->len, btusb_tx_complete, skb); 1209 1210 skb->dev = (void *)hdev; 1211 1212 return urb; 1213 } 1214 1215 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) 1216 { 1217 struct btusb_data *data = hci_get_drvdata(hdev); 1218 struct urb *urb; 1219 unsigned int pipe; 1220 1221 if (!data->isoc_tx_ep) 1222 return ERR_PTR(-ENODEV); 1223 1224 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); 1225 if (!urb) 1226 return ERR_PTR(-ENOMEM); 1227 1228 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); 1229 1230 usb_fill_int_urb(urb, data->udev, pipe, 1231 skb->data, skb->len, btusb_isoc_tx_complete, 1232 skb, data->isoc_tx_ep->bInterval); 1233 1234 urb->transfer_flags = URB_ISO_ASAP; 1235 1236 __fill_isoc_descriptor(urb, skb->len, 1237 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); 1238 1239 skb->dev = (void *)hdev; 1240 1241 return urb; 1242 } 1243 1244 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) 1245 { 1246 struct btusb_data *data = hci_get_drvdata(hdev); 1247 int err; 1248 1249 usb_anchor_urb(urb, &data->tx_anchor); 1250 1251 err = usb_submit_urb(urb, GFP_KERNEL); 1252 if (err < 0) { 1253 if (err != -EPERM && err != -ENODEV) 1254 BT_ERR("%s urb %p submission failed (%d)", 1255 hdev->name, urb, -err); 1256 kfree(urb->setup_packet); 1257 usb_unanchor_urb(urb); 1258 } else { 1259 usb_mark_last_busy(data->udev); 1260 } 1261 1262 usb_free_urb(urb); 1263 return err; 1264 } 1265 1266 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) 1267 { 1268 struct btusb_data *data = hci_get_drvdata(hdev); 1269 unsigned long flags; 1270 bool suspending; 1271 1272 spin_lock_irqsave(&data->txlock, flags); 1273 suspending = test_bit(BTUSB_SUSPENDING, &data->flags); 1274 if (!suspending) 1275 data->tx_in_flight++; 1276 spin_unlock_irqrestore(&data->txlock, flags); 1277 1278 if (!suspending) 1279 return submit_tx_urb(hdev, urb); 1280 1281 usb_anchor_urb(urb, &data->deferred); 1282 schedule_work(&data->waker); 1283 1284 usb_free_urb(urb); 1285 return 0; 1286 } 1287 1288 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) 1289 { 1290 struct urb *urb; 1291 1292 BT_DBG("%s", hdev->name); 1293 1294 switch (hci_skb_pkt_type(skb)) { 1295 case HCI_COMMAND_PKT: 1296 urb = alloc_ctrl_urb(hdev, skb); 1297 if (IS_ERR(urb)) 1298 return PTR_ERR(urb); 1299 1300 hdev->stat.cmd_tx++; 1301 return submit_or_queue_tx_urb(hdev, urb); 1302 1303 case HCI_ACLDATA_PKT: 1304 urb = alloc_bulk_urb(hdev, skb); 1305 if (IS_ERR(urb)) 1306 return PTR_ERR(urb); 1307 1308 hdev->stat.acl_tx++; 1309 return submit_or_queue_tx_urb(hdev, urb); 1310 1311 case HCI_SCODATA_PKT: 1312 if (hci_conn_num(hdev, SCO_LINK) < 1) 1313 return -ENODEV; 1314 1315 urb = alloc_isoc_urb(hdev, skb); 1316 if (IS_ERR(urb)) 1317 return PTR_ERR(urb); 1318 1319 hdev->stat.sco_tx++; 1320 return submit_tx_urb(hdev, urb); 1321 } 1322 1323 return -EILSEQ; 1324 } 1325 1326 static void btusb_notify(struct hci_dev *hdev, unsigned int evt) 1327 { 1328 struct btusb_data *data = hci_get_drvdata(hdev); 1329 1330 BT_DBG("%s evt %d", hdev->name, evt); 1331 1332 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { 1333 data->sco_num = hci_conn_num(hdev, SCO_LINK); 1334 schedule_work(&data->work); 1335 } 1336 } 1337 1338 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) 1339 { 1340 struct btusb_data *data = hci_get_drvdata(hdev); 1341 struct usb_interface *intf = data->isoc; 1342 struct usb_endpoint_descriptor *ep_desc; 1343 int i, err; 1344 1345 if (!data->isoc) 1346 return -ENODEV; 1347 1348 err = usb_set_interface(data->udev, 1, altsetting); 1349 if (err < 0) { 1350 BT_ERR("%s setting interface failed (%d)", hdev->name, -err); 1351 return err; 1352 } 1353 1354 data->isoc_altsetting = altsetting; 1355 1356 data->isoc_tx_ep = NULL; 1357 data->isoc_rx_ep = NULL; 1358 1359 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 1360 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 1361 1362 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { 1363 data->isoc_tx_ep = ep_desc; 1364 continue; 1365 } 1366 1367 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { 1368 data->isoc_rx_ep = ep_desc; 1369 continue; 1370 } 1371 } 1372 1373 if (!data->isoc_tx_ep || !data->isoc_rx_ep) { 1374 BT_ERR("%s invalid SCO descriptors", hdev->name); 1375 return -ENODEV; 1376 } 1377 1378 return 0; 1379 } 1380 1381 static void btusb_work(struct work_struct *work) 1382 { 1383 struct btusb_data *data = container_of(work, struct btusb_data, work); 1384 struct hci_dev *hdev = data->hdev; 1385 int new_alts; 1386 int err; 1387 1388 if (data->sco_num > 0) { 1389 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { 1390 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); 1391 if (err < 0) { 1392 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1393 usb_kill_anchored_urbs(&data->isoc_anchor); 1394 return; 1395 } 1396 1397 set_bit(BTUSB_DID_ISO_RESUME, &data->flags); 1398 } 1399 1400 if (hdev->voice_setting & 0x0020) { 1401 static const int alts[3] = { 2, 4, 5 }; 1402 1403 new_alts = alts[data->sco_num - 1]; 1404 } else { 1405 new_alts = data->sco_num; 1406 } 1407 1408 if (data->isoc_altsetting != new_alts) { 1409 unsigned long flags; 1410 1411 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1412 usb_kill_anchored_urbs(&data->isoc_anchor); 1413 1414 /* When isochronous alternate setting needs to be 1415 * changed, because SCO connection has been added 1416 * or removed, a packet fragment may be left in the 1417 * reassembling state. This could lead to wrongly 1418 * assembled fragments. 1419 * 1420 * Clear outstanding fragment when selecting a new 1421 * alternate setting. 1422 */ 1423 spin_lock_irqsave(&data->rxlock, flags); 1424 kfree_skb(data->sco_skb); 1425 data->sco_skb = NULL; 1426 spin_unlock_irqrestore(&data->rxlock, flags); 1427 1428 if (__set_isoc_interface(hdev, new_alts) < 0) 1429 return; 1430 } 1431 1432 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 1433 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) 1434 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1435 else 1436 btusb_submit_isoc_urb(hdev, GFP_KERNEL); 1437 } 1438 } else { 1439 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1440 usb_kill_anchored_urbs(&data->isoc_anchor); 1441 1442 __set_isoc_interface(hdev, 0); 1443 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) 1444 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); 1445 } 1446 } 1447 1448 static void btusb_waker(struct work_struct *work) 1449 { 1450 struct btusb_data *data = container_of(work, struct btusb_data, waker); 1451 int err; 1452 1453 err = usb_autopm_get_interface(data->intf); 1454 if (err < 0) 1455 return; 1456 1457 usb_autopm_put_interface(data->intf); 1458 } 1459 1460 static int btusb_setup_bcm92035(struct hci_dev *hdev) 1461 { 1462 struct sk_buff *skb; 1463 u8 val = 0x00; 1464 1465 BT_DBG("%s", hdev->name); 1466 1467 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); 1468 if (IS_ERR(skb)) 1469 BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb)); 1470 else 1471 kfree_skb(skb); 1472 1473 return 0; 1474 } 1475 1476 static int btusb_setup_csr(struct hci_dev *hdev) 1477 { 1478 struct hci_rp_read_local_version *rp; 1479 struct sk_buff *skb; 1480 1481 BT_DBG("%s", hdev->name); 1482 1483 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, 1484 HCI_INIT_TIMEOUT); 1485 if (IS_ERR(skb)) { 1486 int err = PTR_ERR(skb); 1487 BT_ERR("%s: CSR: Local version failed (%d)", hdev->name, err); 1488 return err; 1489 } 1490 1491 if (skb->len != sizeof(struct hci_rp_read_local_version)) { 1492 BT_ERR("%s: CSR: Local version length mismatch", hdev->name); 1493 kfree_skb(skb); 1494 return -EIO; 1495 } 1496 1497 rp = (struct hci_rp_read_local_version *)skb->data; 1498 1499 /* Detect controllers which aren't real CSR ones. */ 1500 if (le16_to_cpu(rp->manufacturer) != 10 || 1501 le16_to_cpu(rp->lmp_subver) == 0x0c5c) { 1502 /* Clear the reset quirk since this is not an actual 1503 * early Bluetooth 1.1 device from CSR. 1504 */ 1505 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 1506 1507 /* These fake CSR controllers have all a broken 1508 * stored link key handling and so just disable it. 1509 */ 1510 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 1511 } 1512 1513 kfree_skb(skb); 1514 1515 return 0; 1516 } 1517 1518 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, 1519 struct intel_version *ver) 1520 { 1521 const struct firmware *fw; 1522 char fwname[64]; 1523 int ret; 1524 1525 snprintf(fwname, sizeof(fwname), 1526 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", 1527 ver->hw_platform, ver->hw_variant, ver->hw_revision, 1528 ver->fw_variant, ver->fw_revision, ver->fw_build_num, 1529 ver->fw_build_ww, ver->fw_build_yy); 1530 1531 ret = request_firmware(&fw, fwname, &hdev->dev); 1532 if (ret < 0) { 1533 if (ret == -EINVAL) { 1534 BT_ERR("%s Intel firmware file request failed (%d)", 1535 hdev->name, ret); 1536 return NULL; 1537 } 1538 1539 BT_ERR("%s failed to open Intel firmware file: %s(%d)", 1540 hdev->name, fwname, ret); 1541 1542 /* If the correct firmware patch file is not found, use the 1543 * default firmware patch file instead 1544 */ 1545 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", 1546 ver->hw_platform, ver->hw_variant); 1547 if (request_firmware(&fw, fwname, &hdev->dev) < 0) { 1548 BT_ERR("%s failed to open default Intel fw file: %s", 1549 hdev->name, fwname); 1550 return NULL; 1551 } 1552 } 1553 1554 BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname); 1555 1556 return fw; 1557 } 1558 1559 static int btusb_setup_intel_patching(struct hci_dev *hdev, 1560 const struct firmware *fw, 1561 const u8 **fw_ptr, int *disable_patch) 1562 { 1563 struct sk_buff *skb; 1564 struct hci_command_hdr *cmd; 1565 const u8 *cmd_param; 1566 struct hci_event_hdr *evt = NULL; 1567 const u8 *evt_param = NULL; 1568 int remain = fw->size - (*fw_ptr - fw->data); 1569 1570 /* The first byte indicates the types of the patch command or event. 1571 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes 1572 * in the current firmware buffer doesn't start with 0x01 or 1573 * the size of remain buffer is smaller than HCI command header, 1574 * the firmware file is corrupted and it should stop the patching 1575 * process. 1576 */ 1577 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { 1578 BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name); 1579 return -EINVAL; 1580 } 1581 (*fw_ptr)++; 1582 remain--; 1583 1584 cmd = (struct hci_command_hdr *)(*fw_ptr); 1585 *fw_ptr += sizeof(*cmd); 1586 remain -= sizeof(*cmd); 1587 1588 /* Ensure that the remain firmware data is long enough than the length 1589 * of command parameter. If not, the firmware file is corrupted. 1590 */ 1591 if (remain < cmd->plen) { 1592 BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name); 1593 return -EFAULT; 1594 } 1595 1596 /* If there is a command that loads a patch in the firmware 1597 * file, then enable the patch upon success, otherwise just 1598 * disable the manufacturer mode, for example patch activation 1599 * is not required when the default firmware patch file is used 1600 * because there are no patch data to load. 1601 */ 1602 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) 1603 *disable_patch = 0; 1604 1605 cmd_param = *fw_ptr; 1606 *fw_ptr += cmd->plen; 1607 remain -= cmd->plen; 1608 1609 /* This reads the expected events when the above command is sent to the 1610 * device. Some vendor commands expects more than one events, for 1611 * example command status event followed by vendor specific event. 1612 * For this case, it only keeps the last expected event. so the command 1613 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of 1614 * last expected event. 1615 */ 1616 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { 1617 (*fw_ptr)++; 1618 remain--; 1619 1620 evt = (struct hci_event_hdr *)(*fw_ptr); 1621 *fw_ptr += sizeof(*evt); 1622 remain -= sizeof(*evt); 1623 1624 if (remain < evt->plen) { 1625 BT_ERR("%s Intel fw corrupted: invalid evt len", 1626 hdev->name); 1627 return -EFAULT; 1628 } 1629 1630 evt_param = *fw_ptr; 1631 *fw_ptr += evt->plen; 1632 remain -= evt->plen; 1633 } 1634 1635 /* Every HCI commands in the firmware file has its correspond event. 1636 * If event is not found or remain is smaller than zero, the firmware 1637 * file is corrupted. 1638 */ 1639 if (!evt || !evt_param || remain < 0) { 1640 BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name); 1641 return -EFAULT; 1642 } 1643 1644 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, 1645 cmd_param, evt->evt, HCI_INIT_TIMEOUT); 1646 if (IS_ERR(skb)) { 1647 BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)", 1648 hdev->name, cmd->opcode, PTR_ERR(skb)); 1649 return PTR_ERR(skb); 1650 } 1651 1652 /* It ensures that the returned event matches the event data read from 1653 * the firmware file. At fist, it checks the length and then 1654 * the contents of the event. 1655 */ 1656 if (skb->len != evt->plen) { 1657 BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name, 1658 le16_to_cpu(cmd->opcode)); 1659 kfree_skb(skb); 1660 return -EFAULT; 1661 } 1662 1663 if (memcmp(skb->data, evt_param, evt->plen)) { 1664 BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)", 1665 hdev->name, le16_to_cpu(cmd->opcode)); 1666 kfree_skb(skb); 1667 return -EFAULT; 1668 } 1669 kfree_skb(skb); 1670 1671 return 0; 1672 } 1673 1674 static int btusb_setup_intel(struct hci_dev *hdev) 1675 { 1676 struct sk_buff *skb; 1677 const struct firmware *fw; 1678 const u8 *fw_ptr; 1679 int disable_patch, err; 1680 struct intel_version ver; 1681 1682 BT_DBG("%s", hdev->name); 1683 1684 /* The controller has a bug with the first HCI command sent to it 1685 * returning number of completed commands as zero. This would stall the 1686 * command processing in the Bluetooth core. 1687 * 1688 * As a workaround, send HCI Reset command first which will reset the 1689 * number of completed commands and allow normal command processing 1690 * from now on. 1691 */ 1692 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 1693 if (IS_ERR(skb)) { 1694 BT_ERR("%s sending initial HCI reset command failed (%ld)", 1695 hdev->name, PTR_ERR(skb)); 1696 return PTR_ERR(skb); 1697 } 1698 kfree_skb(skb); 1699 1700 /* Read Intel specific controller version first to allow selection of 1701 * which firmware file to load. 1702 * 1703 * The returned information are hardware variant and revision plus 1704 * firmware variant, revision and build number. 1705 */ 1706 err = btintel_read_version(hdev, &ver); 1707 if (err) 1708 return err; 1709 1710 BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", 1711 hdev->name, ver.hw_platform, ver.hw_variant, ver.hw_revision, 1712 ver.fw_variant, ver.fw_revision, ver.fw_build_num, 1713 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); 1714 1715 /* fw_patch_num indicates the version of patch the device currently 1716 * have. If there is no patch data in the device, it is always 0x00. 1717 * So, if it is other than 0x00, no need to patch the device again. 1718 */ 1719 if (ver.fw_patch_num) { 1720 BT_INFO("%s: Intel device is already patched. patch num: %02x", 1721 hdev->name, ver.fw_patch_num); 1722 goto complete; 1723 } 1724 1725 /* Opens the firmware patch file based on the firmware version read 1726 * from the controller. If it fails to open the matching firmware 1727 * patch file, it tries to open the default firmware patch file. 1728 * If no patch file is found, allow the device to operate without 1729 * a patch. 1730 */ 1731 fw = btusb_setup_intel_get_fw(hdev, &ver); 1732 if (!fw) 1733 goto complete; 1734 fw_ptr = fw->data; 1735 1736 /* Enable the manufacturer mode of the controller. 1737 * Only while this mode is enabled, the driver can download the 1738 * firmware patch data and configuration parameters. 1739 */ 1740 err = btintel_enter_mfg(hdev); 1741 if (err) { 1742 release_firmware(fw); 1743 return err; 1744 } 1745 1746 disable_patch = 1; 1747 1748 /* The firmware data file consists of list of Intel specific HCI 1749 * commands and its expected events. The first byte indicates the 1750 * type of the message, either HCI command or HCI event. 1751 * 1752 * It reads the command and its expected event from the firmware file, 1753 * and send to the controller. Once __hci_cmd_sync_ev() returns, 1754 * the returned event is compared with the event read from the firmware 1755 * file and it will continue until all the messages are downloaded to 1756 * the controller. 1757 * 1758 * Once the firmware patching is completed successfully, 1759 * the manufacturer mode is disabled with reset and activating the 1760 * downloaded patch. 1761 * 1762 * If the firmware patching fails, the manufacturer mode is 1763 * disabled with reset and deactivating the patch. 1764 * 1765 * If the default patch file is used, no reset is done when disabling 1766 * the manufacturer. 1767 */ 1768 while (fw->size > fw_ptr - fw->data) { 1769 int ret; 1770 1771 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, 1772 &disable_patch); 1773 if (ret < 0) 1774 goto exit_mfg_deactivate; 1775 } 1776 1777 release_firmware(fw); 1778 1779 if (disable_patch) 1780 goto exit_mfg_disable; 1781 1782 /* Patching completed successfully and disable the manufacturer mode 1783 * with reset and activate the downloaded firmware patches. 1784 */ 1785 err = btintel_exit_mfg(hdev, true, true); 1786 if (err) 1787 return err; 1788 1789 BT_INFO("%s: Intel Bluetooth firmware patch completed and activated", 1790 hdev->name); 1791 1792 goto complete; 1793 1794 exit_mfg_disable: 1795 /* Disable the manufacturer mode without reset */ 1796 err = btintel_exit_mfg(hdev, false, false); 1797 if (err) 1798 return err; 1799 1800 BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name); 1801 1802 goto complete; 1803 1804 exit_mfg_deactivate: 1805 release_firmware(fw); 1806 1807 /* Patching failed. Disable the manufacturer mode with reset and 1808 * deactivate the downloaded firmware patches. 1809 */ 1810 err = btintel_exit_mfg(hdev, true, false); 1811 if (err) 1812 return err; 1813 1814 BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated", 1815 hdev->name); 1816 1817 complete: 1818 /* Set the event mask for Intel specific vendor events. This enables 1819 * a few extra events that are useful during general operation. 1820 */ 1821 btintel_set_event_mask_mfg(hdev, false); 1822 1823 btintel_check_bdaddr(hdev); 1824 return 0; 1825 } 1826 1827 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) 1828 { 1829 struct sk_buff *skb; 1830 struct hci_event_hdr *hdr; 1831 struct hci_ev_cmd_complete *evt; 1832 1833 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC); 1834 if (!skb) 1835 return -ENOMEM; 1836 1837 hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr)); 1838 hdr->evt = HCI_EV_CMD_COMPLETE; 1839 hdr->plen = sizeof(*evt) + 1; 1840 1841 evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt)); 1842 evt->ncmd = 0x01; 1843 evt->opcode = cpu_to_le16(opcode); 1844 1845 *skb_put(skb, 1) = 0x00; 1846 1847 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 1848 1849 return hci_recv_frame(hdev, skb); 1850 } 1851 1852 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, 1853 int count) 1854 { 1855 /* When the device is in bootloader mode, then it can send 1856 * events via the bulk endpoint. These events are treated the 1857 * same way as the ones received from the interrupt endpoint. 1858 */ 1859 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) 1860 return btusb_recv_intr(data, buffer, count); 1861 1862 return btusb_recv_bulk(data, buffer, count); 1863 } 1864 1865 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, 1866 unsigned int len) 1867 { 1868 const struct intel_bootup *evt = ptr; 1869 1870 if (len != sizeof(*evt)) 1871 return; 1872 1873 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) { 1874 smp_mb__after_atomic(); 1875 wake_up_bit(&data->flags, BTUSB_BOOTING); 1876 } 1877 } 1878 1879 static void btusb_intel_secure_send_result(struct btusb_data *data, 1880 const void *ptr, unsigned int len) 1881 { 1882 const struct intel_secure_send_result *evt = ptr; 1883 1884 if (len != sizeof(*evt)) 1885 return; 1886 1887 if (evt->result) 1888 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); 1889 1890 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && 1891 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) { 1892 smp_mb__after_atomic(); 1893 wake_up_bit(&data->flags, BTUSB_DOWNLOADING); 1894 } 1895 } 1896 1897 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) 1898 { 1899 struct btusb_data *data = hci_get_drvdata(hdev); 1900 1901 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1902 struct hci_event_hdr *hdr = (void *)skb->data; 1903 1904 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && 1905 hdr->plen > 0) { 1906 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; 1907 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; 1908 1909 switch (skb->data[2]) { 1910 case 0x02: 1911 /* When switching to the operational firmware 1912 * the device sends a vendor specific event 1913 * indicating that the bootup completed. 1914 */ 1915 btusb_intel_bootup(data, ptr, len); 1916 break; 1917 case 0x06: 1918 /* When the firmware loading completes the 1919 * device sends out a vendor specific event 1920 * indicating the result of the firmware 1921 * loading. 1922 */ 1923 btusb_intel_secure_send_result(data, ptr, len); 1924 break; 1925 } 1926 } 1927 } 1928 1929 return hci_recv_frame(hdev, skb); 1930 } 1931 1932 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) 1933 { 1934 struct btusb_data *data = hci_get_drvdata(hdev); 1935 struct urb *urb; 1936 1937 BT_DBG("%s", hdev->name); 1938 1939 switch (hci_skb_pkt_type(skb)) { 1940 case HCI_COMMAND_PKT: 1941 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1942 struct hci_command_hdr *cmd = (void *)skb->data; 1943 __u16 opcode = le16_to_cpu(cmd->opcode); 1944 1945 /* When in bootloader mode and the command 0xfc09 1946 * is received, it needs to be send down the 1947 * bulk endpoint. So allocate a bulk URB instead. 1948 */ 1949 if (opcode == 0xfc09) 1950 urb = alloc_bulk_urb(hdev, skb); 1951 else 1952 urb = alloc_ctrl_urb(hdev, skb); 1953 1954 /* When the 0xfc01 command is issued to boot into 1955 * the operational firmware, it will actually not 1956 * send a command complete event. To keep the flow 1957 * control working inject that event here. 1958 */ 1959 if (opcode == 0xfc01) 1960 inject_cmd_complete(hdev, opcode); 1961 } else { 1962 urb = alloc_ctrl_urb(hdev, skb); 1963 } 1964 if (IS_ERR(urb)) 1965 return PTR_ERR(urb); 1966 1967 hdev->stat.cmd_tx++; 1968 return submit_or_queue_tx_urb(hdev, urb); 1969 1970 case HCI_ACLDATA_PKT: 1971 urb = alloc_bulk_urb(hdev, skb); 1972 if (IS_ERR(urb)) 1973 return PTR_ERR(urb); 1974 1975 hdev->stat.acl_tx++; 1976 return submit_or_queue_tx_urb(hdev, urb); 1977 1978 case HCI_SCODATA_PKT: 1979 if (hci_conn_num(hdev, SCO_LINK) < 1) 1980 return -ENODEV; 1981 1982 urb = alloc_isoc_urb(hdev, skb); 1983 if (IS_ERR(urb)) 1984 return PTR_ERR(urb); 1985 1986 hdev->stat.sco_tx++; 1987 return submit_tx_urb(hdev, urb); 1988 } 1989 1990 return -EILSEQ; 1991 } 1992 1993 static int btusb_setup_intel_new(struct hci_dev *hdev) 1994 { 1995 static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01, 1996 0x00, 0x08, 0x04, 0x00 }; 1997 struct btusb_data *data = hci_get_drvdata(hdev); 1998 struct sk_buff *skb; 1999 struct intel_version ver; 2000 struct intel_boot_params *params; 2001 const struct firmware *fw; 2002 const u8 *fw_ptr; 2003 u32 frag_len; 2004 char fwname[64]; 2005 ktime_t calltime, delta, rettime; 2006 unsigned long long duration; 2007 int err; 2008 2009 BT_DBG("%s", hdev->name); 2010 2011 calltime = ktime_get(); 2012 2013 /* Read the Intel version information to determine if the device 2014 * is in bootloader mode or if it already has operational firmware 2015 * loaded. 2016 */ 2017 err = btintel_read_version(hdev, &ver); 2018 if (err) 2019 return err; 2020 2021 /* The hardware platform number has a fixed value of 0x37 and 2022 * for now only accept this single value. 2023 */ 2024 if (ver.hw_platform != 0x37) { 2025 BT_ERR("%s: Unsupported Intel hardware platform (%u)", 2026 hdev->name, ver.hw_platform); 2027 return -EINVAL; 2028 } 2029 2030 /* Check for supported iBT hardware variants of this firmware 2031 * loading method. 2032 * 2033 * This check has been put in place to ensure correct forward 2034 * compatibility options when newer hardware variants come along. 2035 */ 2036 switch (ver.hw_variant) { 2037 case 0x0b: /* SfP */ 2038 case 0x0c: /* WsP */ 2039 case 0x12: /* ThP */ 2040 break; 2041 default: 2042 BT_ERR("%s: Unsupported Intel hardware variant (%u)", 2043 hdev->name, ver.hw_variant); 2044 return -EINVAL; 2045 } 2046 2047 btintel_version_info(hdev, &ver); 2048 2049 /* The firmware variant determines if the device is in bootloader 2050 * mode or is running operational firmware. The value 0x06 identifies 2051 * the bootloader and the value 0x23 identifies the operational 2052 * firmware. 2053 * 2054 * When the operational firmware is already present, then only 2055 * the check for valid Bluetooth device address is needed. This 2056 * determines if the device will be added as configured or 2057 * unconfigured controller. 2058 * 2059 * It is not possible to use the Secure Boot Parameters in this 2060 * case since that command is only available in bootloader mode. 2061 */ 2062 if (ver.fw_variant == 0x23) { 2063 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2064 btintel_check_bdaddr(hdev); 2065 return 0; 2066 } 2067 2068 /* If the device is not in bootloader mode, then the only possible 2069 * choice is to return an error and abort the device initialization. 2070 */ 2071 if (ver.fw_variant != 0x06) { 2072 BT_ERR("%s: Unsupported Intel firmware variant (%u)", 2073 hdev->name, ver.fw_variant); 2074 return -ENODEV; 2075 } 2076 2077 /* Read the secure boot parameters to identify the operating 2078 * details of the bootloader. 2079 */ 2080 skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT); 2081 if (IS_ERR(skb)) { 2082 BT_ERR("%s: Reading Intel boot parameters failed (%ld)", 2083 hdev->name, PTR_ERR(skb)); 2084 return PTR_ERR(skb); 2085 } 2086 2087 if (skb->len != sizeof(*params)) { 2088 BT_ERR("%s: Intel boot parameters size mismatch", hdev->name); 2089 kfree_skb(skb); 2090 return -EILSEQ; 2091 } 2092 2093 params = (struct intel_boot_params *)skb->data; 2094 2095 BT_INFO("%s: Device revision is %u", hdev->name, 2096 le16_to_cpu(params->dev_revid)); 2097 2098 BT_INFO("%s: Secure boot is %s", hdev->name, 2099 params->secure_boot ? "enabled" : "disabled"); 2100 2101 BT_INFO("%s: OTP lock is %s", hdev->name, 2102 params->otp_lock ? "enabled" : "disabled"); 2103 2104 BT_INFO("%s: API lock is %s", hdev->name, 2105 params->api_lock ? "enabled" : "disabled"); 2106 2107 BT_INFO("%s: Debug lock is %s", hdev->name, 2108 params->debug_lock ? "enabled" : "disabled"); 2109 2110 BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name, 2111 params->min_fw_build_nn, params->min_fw_build_cw, 2112 2000 + params->min_fw_build_yy); 2113 2114 /* It is required that every single firmware fragment is acknowledged 2115 * with a command complete event. If the boot parameters indicate 2116 * that this bootloader does not send them, then abort the setup. 2117 */ 2118 if (params->limited_cce != 0x00) { 2119 BT_ERR("%s: Unsupported Intel firmware loading method (%u)", 2120 hdev->name, params->limited_cce); 2121 kfree_skb(skb); 2122 return -EINVAL; 2123 } 2124 2125 /* If the OTP has no valid Bluetooth device address, then there will 2126 * also be no valid address for the operational firmware. 2127 */ 2128 if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) { 2129 BT_INFO("%s: No device address configured", hdev->name); 2130 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2131 } 2132 2133 /* With this Intel bootloader only the hardware variant and device 2134 * revision information are used to select the right firmware. 2135 * 2136 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi. 2137 * 2138 * Currently the supported hardware variants are: 2139 * 11 (0x0b) for iBT3.0 (LnP/SfP) 2140 * 12 (0x0c) for iBT3.5 (WsP) 2141 */ 2142 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi", 2143 le16_to_cpu(ver.hw_variant), 2144 le16_to_cpu(params->dev_revid)); 2145 2146 err = request_firmware(&fw, fwname, &hdev->dev); 2147 if (err < 0) { 2148 BT_ERR("%s: Failed to load Intel firmware file (%d)", 2149 hdev->name, err); 2150 kfree_skb(skb); 2151 return err; 2152 } 2153 2154 BT_INFO("%s: Found device firmware: %s", hdev->name, fwname); 2155 2156 /* Save the DDC file name for later use to apply once the firmware 2157 * downloading is done. 2158 */ 2159 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc", 2160 le16_to_cpu(ver.hw_variant), 2161 le16_to_cpu(params->dev_revid)); 2162 2163 kfree_skb(skb); 2164 2165 if (fw->size < 644) { 2166 BT_ERR("%s: Invalid size of firmware file (%zu)", 2167 hdev->name, fw->size); 2168 err = -EBADF; 2169 goto done; 2170 } 2171 2172 set_bit(BTUSB_DOWNLOADING, &data->flags); 2173 2174 /* Start the firmware download transaction with the Init fragment 2175 * represented by the 128 bytes of CSS header. 2176 */ 2177 err = btintel_secure_send(hdev, 0x00, 128, fw->data); 2178 if (err < 0) { 2179 BT_ERR("%s: Failed to send firmware header (%d)", 2180 hdev->name, err); 2181 goto done; 2182 } 2183 2184 /* Send the 256 bytes of public key information from the firmware 2185 * as the PKey fragment. 2186 */ 2187 err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128); 2188 if (err < 0) { 2189 BT_ERR("%s: Failed to send firmware public key (%d)", 2190 hdev->name, err); 2191 goto done; 2192 } 2193 2194 /* Send the 256 bytes of signature information from the firmware 2195 * as the Sign fragment. 2196 */ 2197 err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388); 2198 if (err < 0) { 2199 BT_ERR("%s: Failed to send firmware signature (%d)", 2200 hdev->name, err); 2201 goto done; 2202 } 2203 2204 fw_ptr = fw->data + 644; 2205 frag_len = 0; 2206 2207 while (fw_ptr - fw->data < fw->size) { 2208 struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len); 2209 2210 frag_len += sizeof(*cmd) + cmd->plen; 2211 2212 /* The parameter length of the secure send command requires 2213 * a 4 byte alignment. It happens so that the firmware file 2214 * contains proper Intel_NOP commands to align the fragments 2215 * as needed. 2216 * 2217 * Send set of commands with 4 byte alignment from the 2218 * firmware data buffer as a single Data fragement. 2219 */ 2220 if (!(frag_len % 4)) { 2221 err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr); 2222 if (err < 0) { 2223 BT_ERR("%s: Failed to send firmware data (%d)", 2224 hdev->name, err); 2225 goto done; 2226 } 2227 2228 fw_ptr += frag_len; 2229 frag_len = 0; 2230 } 2231 } 2232 2233 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2234 2235 BT_INFO("%s: Waiting for firmware download to complete", hdev->name); 2236 2237 /* Before switching the device into operational mode and with that 2238 * booting the loaded firmware, wait for the bootloader notification 2239 * that all fragments have been successfully received. 2240 * 2241 * When the event processing receives the notification, then the 2242 * BTUSB_DOWNLOADING flag will be cleared. 2243 * 2244 * The firmware loading should not take longer than 5 seconds 2245 * and thus just timeout if that happens and fail the setup 2246 * of this device. 2247 */ 2248 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, 2249 TASK_INTERRUPTIBLE, 2250 msecs_to_jiffies(5000)); 2251 if (err == -EINTR) { 2252 BT_ERR("%s: Firmware loading interrupted", hdev->name); 2253 goto done; 2254 } 2255 2256 if (err) { 2257 BT_ERR("%s: Firmware loading timeout", hdev->name); 2258 err = -ETIMEDOUT; 2259 goto done; 2260 } 2261 2262 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { 2263 BT_ERR("%s: Firmware loading failed", hdev->name); 2264 err = -ENOEXEC; 2265 goto done; 2266 } 2267 2268 rettime = ktime_get(); 2269 delta = ktime_sub(rettime, calltime); 2270 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2271 2272 BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration); 2273 2274 done: 2275 release_firmware(fw); 2276 2277 if (err < 0) 2278 return err; 2279 2280 calltime = ktime_get(); 2281 2282 set_bit(BTUSB_BOOTING, &data->flags); 2283 2284 skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param, 2285 HCI_INIT_TIMEOUT); 2286 if (IS_ERR(skb)) 2287 return PTR_ERR(skb); 2288 2289 kfree_skb(skb); 2290 2291 /* The bootloader will not indicate when the device is ready. This 2292 * is done by the operational firmware sending bootup notification. 2293 * 2294 * Booting into operational firmware should not take longer than 2295 * 1 second. However if that happens, then just fail the setup 2296 * since something went wrong. 2297 */ 2298 BT_INFO("%s: Waiting for device to boot", hdev->name); 2299 2300 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, 2301 TASK_INTERRUPTIBLE, 2302 msecs_to_jiffies(1000)); 2303 2304 if (err == -EINTR) { 2305 BT_ERR("%s: Device boot interrupted", hdev->name); 2306 return -EINTR; 2307 } 2308 2309 if (err) { 2310 BT_ERR("%s: Device boot timeout", hdev->name); 2311 return -ETIMEDOUT; 2312 } 2313 2314 rettime = ktime_get(); 2315 delta = ktime_sub(rettime, calltime); 2316 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2317 2318 BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration); 2319 2320 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2321 2322 /* Once the device is running in operational mode, it needs to apply 2323 * the device configuration (DDC) parameters. 2324 * 2325 * The device can work without DDC parameters, so even if it fails 2326 * to load the file, no need to fail the setup. 2327 */ 2328 btintel_load_ddc_config(hdev, fwname); 2329 2330 /* Set the event mask for Intel specific vendor events. This enables 2331 * a few extra events that are useful during general operation. It 2332 * does not enable any debugging related events. 2333 * 2334 * The device will function correctly without these events enabled 2335 * and thus no need to fail the setup. 2336 */ 2337 btintel_set_event_mask(hdev, false); 2338 2339 return 0; 2340 } 2341 2342 static int btusb_shutdown_intel(struct hci_dev *hdev) 2343 { 2344 struct sk_buff *skb; 2345 long ret; 2346 2347 /* Some platforms have an issue with BT LED when the interface is 2348 * down or BT radio is turned off, which takes 5 seconds to BT LED 2349 * goes off. This command turns off the BT LED immediately. 2350 */ 2351 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); 2352 if (IS_ERR(skb)) { 2353 ret = PTR_ERR(skb); 2354 BT_ERR("%s: turning off Intel device LED failed (%ld)", 2355 hdev->name, ret); 2356 return ret; 2357 } 2358 kfree_skb(skb); 2359 2360 return 0; 2361 } 2362 2363 #ifdef CONFIG_PM 2364 /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */ 2365 static int marvell_config_oob_wake(struct hci_dev *hdev) 2366 { 2367 struct sk_buff *skb; 2368 struct btusb_data *data = hci_get_drvdata(hdev); 2369 struct device *dev = &data->udev->dev; 2370 u16 pin, gap, opcode; 2371 int ret; 2372 u8 cmd[5]; 2373 2374 /* Move on if no wakeup pin specified */ 2375 if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) || 2376 of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap)) 2377 return 0; 2378 2379 /* Vendor specific command to configure a GPIO as wake-up pin */ 2380 opcode = hci_opcode_pack(0x3F, 0x59); 2381 cmd[0] = opcode & 0xFF; 2382 cmd[1] = opcode >> 8; 2383 cmd[2] = 2; /* length of parameters that follow */ 2384 cmd[3] = pin; 2385 cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */ 2386 2387 skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL); 2388 if (!skb) { 2389 bt_dev_err(hdev, "%s: No memory\n", __func__); 2390 return -ENOMEM; 2391 } 2392 2393 memcpy(skb_put(skb, sizeof(cmd)), cmd, sizeof(cmd)); 2394 hci_skb_pkt_type(skb) = HCI_COMMAND_PKT; 2395 2396 ret = btusb_send_frame(hdev, skb); 2397 if (ret) { 2398 bt_dev_err(hdev, "%s: configuration failed\n", __func__); 2399 kfree_skb(skb); 2400 return ret; 2401 } 2402 2403 return 0; 2404 } 2405 #endif 2406 2407 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, 2408 const bdaddr_t *bdaddr) 2409 { 2410 struct sk_buff *skb; 2411 u8 buf[8]; 2412 long ret; 2413 2414 buf[0] = 0xfe; 2415 buf[1] = sizeof(bdaddr_t); 2416 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); 2417 2418 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2419 if (IS_ERR(skb)) { 2420 ret = PTR_ERR(skb); 2421 BT_ERR("%s: changing Marvell device address failed (%ld)", 2422 hdev->name, ret); 2423 return ret; 2424 } 2425 kfree_skb(skb); 2426 2427 return 0; 2428 } 2429 2430 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, 2431 const bdaddr_t *bdaddr) 2432 { 2433 struct sk_buff *skb; 2434 u8 buf[10]; 2435 long ret; 2436 2437 buf[0] = 0x01; 2438 buf[1] = 0x01; 2439 buf[2] = 0x00; 2440 buf[3] = sizeof(bdaddr_t); 2441 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); 2442 2443 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2444 if (IS_ERR(skb)) { 2445 ret = PTR_ERR(skb); 2446 BT_ERR("%s: Change address command failed (%ld)", 2447 hdev->name, ret); 2448 return ret; 2449 } 2450 kfree_skb(skb); 2451 2452 return 0; 2453 } 2454 2455 #define QCA_DFU_PACKET_LEN 4096 2456 2457 #define QCA_GET_TARGET_VERSION 0x09 2458 #define QCA_CHECK_STATUS 0x05 2459 #define QCA_DFU_DOWNLOAD 0x01 2460 2461 #define QCA_SYSCFG_UPDATED 0x40 2462 #define QCA_PATCH_UPDATED 0x80 2463 #define QCA_DFU_TIMEOUT 3000 2464 2465 struct qca_version { 2466 __le32 rom_version; 2467 __le32 patch_version; 2468 __le32 ram_version; 2469 __le32 ref_clock; 2470 __u8 reserved[4]; 2471 } __packed; 2472 2473 struct qca_rampatch_version { 2474 __le16 rom_version; 2475 __le16 patch_version; 2476 } __packed; 2477 2478 struct qca_device_info { 2479 u32 rom_version; 2480 u8 rampatch_hdr; /* length of header in rampatch */ 2481 u8 nvm_hdr; /* length of header in NVM */ 2482 u8 ver_offset; /* offset of version structure in rampatch */ 2483 }; 2484 2485 static const struct qca_device_info qca_devices_table[] = { 2486 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */ 2487 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */ 2488 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */ 2489 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */ 2490 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */ 2491 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */ 2492 }; 2493 2494 static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request, 2495 void *data, u16 size) 2496 { 2497 struct btusb_data *btdata = hci_get_drvdata(hdev); 2498 struct usb_device *udev = btdata->udev; 2499 int pipe, err; 2500 u8 *buf; 2501 2502 buf = kmalloc(size, GFP_KERNEL); 2503 if (!buf) 2504 return -ENOMEM; 2505 2506 /* Found some of USB hosts have IOT issues with ours so that we should 2507 * not wait until HCI layer is ready. 2508 */ 2509 pipe = usb_rcvctrlpipe(udev, 0); 2510 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, 2511 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2512 if (err < 0) { 2513 BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err); 2514 goto done; 2515 } 2516 2517 memcpy(data, buf, size); 2518 2519 done: 2520 kfree(buf); 2521 2522 return err; 2523 } 2524 2525 static int btusb_setup_qca_download_fw(struct hci_dev *hdev, 2526 const struct firmware *firmware, 2527 size_t hdr_size) 2528 { 2529 struct btusb_data *btdata = hci_get_drvdata(hdev); 2530 struct usb_device *udev = btdata->udev; 2531 size_t count, size, sent = 0; 2532 int pipe, len, err; 2533 u8 *buf; 2534 2535 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); 2536 if (!buf) 2537 return -ENOMEM; 2538 2539 count = firmware->size; 2540 2541 size = min_t(size_t, count, hdr_size); 2542 memcpy(buf, firmware->data, size); 2543 2544 /* USB patches should go down to controller through USB path 2545 * because binary format fits to go down through USB channel. 2546 * USB control path is for patching headers and USB bulk is for 2547 * patch body. 2548 */ 2549 pipe = usb_sndctrlpipe(udev, 0); 2550 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, 2551 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2552 if (err < 0) { 2553 BT_ERR("%s: Failed to send headers (%d)", hdev->name, err); 2554 goto done; 2555 } 2556 2557 sent += size; 2558 count -= size; 2559 2560 while (count) { 2561 size = min_t(size_t, count, QCA_DFU_PACKET_LEN); 2562 2563 memcpy(buf, firmware->data + sent, size); 2564 2565 pipe = usb_sndbulkpipe(udev, 0x02); 2566 err = usb_bulk_msg(udev, pipe, buf, size, &len, 2567 QCA_DFU_TIMEOUT); 2568 if (err < 0) { 2569 BT_ERR("%s: Failed to send body at %zd of %zd (%d)", 2570 hdev->name, sent, firmware->size, err); 2571 break; 2572 } 2573 2574 if (size != len) { 2575 BT_ERR("%s: Failed to get bulk buffer", hdev->name); 2576 err = -EILSEQ; 2577 break; 2578 } 2579 2580 sent += size; 2581 count -= size; 2582 } 2583 2584 done: 2585 kfree(buf); 2586 return err; 2587 } 2588 2589 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, 2590 struct qca_version *ver, 2591 const struct qca_device_info *info) 2592 { 2593 struct qca_rampatch_version *rver; 2594 const struct firmware *fw; 2595 u32 ver_rom, ver_patch; 2596 u16 rver_rom, rver_patch; 2597 char fwname[64]; 2598 int err; 2599 2600 ver_rom = le32_to_cpu(ver->rom_version); 2601 ver_patch = le32_to_cpu(ver->patch_version); 2602 2603 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); 2604 2605 err = request_firmware(&fw, fwname, &hdev->dev); 2606 if (err) { 2607 BT_ERR("%s: failed to request rampatch file: %s (%d)", 2608 hdev->name, fwname, err); 2609 return err; 2610 } 2611 2612 BT_INFO("%s: using rampatch file: %s", hdev->name, fwname); 2613 2614 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); 2615 rver_rom = le16_to_cpu(rver->rom_version); 2616 rver_patch = le16_to_cpu(rver->patch_version); 2617 2618 BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x " 2619 "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom, 2620 ver_patch); 2621 2622 if (rver_rom != ver_rom || rver_patch <= ver_patch) { 2623 BT_ERR("%s: rampatch file version did not match with firmware", 2624 hdev->name); 2625 err = -EINVAL; 2626 goto done; 2627 } 2628 2629 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); 2630 2631 done: 2632 release_firmware(fw); 2633 2634 return err; 2635 } 2636 2637 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, 2638 struct qca_version *ver, 2639 const struct qca_device_info *info) 2640 { 2641 const struct firmware *fw; 2642 char fwname[64]; 2643 int err; 2644 2645 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", 2646 le32_to_cpu(ver->rom_version)); 2647 2648 err = request_firmware(&fw, fwname, &hdev->dev); 2649 if (err) { 2650 BT_ERR("%s: failed to request NVM file: %s (%d)", 2651 hdev->name, fwname, err); 2652 return err; 2653 } 2654 2655 BT_INFO("%s: using NVM file: %s", hdev->name, fwname); 2656 2657 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); 2658 2659 release_firmware(fw); 2660 2661 return err; 2662 } 2663 2664 static int btusb_setup_qca(struct hci_dev *hdev) 2665 { 2666 const struct qca_device_info *info = NULL; 2667 struct qca_version ver; 2668 u32 ver_rom; 2669 u8 status; 2670 int i, err; 2671 2672 err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver, 2673 sizeof(ver)); 2674 if (err < 0) 2675 return err; 2676 2677 ver_rom = le32_to_cpu(ver.rom_version); 2678 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { 2679 if (ver_rom == qca_devices_table[i].rom_version) 2680 info = &qca_devices_table[i]; 2681 } 2682 if (!info) { 2683 BT_ERR("%s: don't support firmware rome 0x%x", hdev->name, 2684 ver_rom); 2685 return -ENODEV; 2686 } 2687 2688 err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status, 2689 sizeof(status)); 2690 if (err < 0) 2691 return err; 2692 2693 if (!(status & QCA_PATCH_UPDATED)) { 2694 err = btusb_setup_qca_load_rampatch(hdev, &ver, info); 2695 if (err < 0) 2696 return err; 2697 } 2698 2699 if (!(status & QCA_SYSCFG_UPDATED)) { 2700 err = btusb_setup_qca_load_nvm(hdev, &ver, info); 2701 if (err < 0) 2702 return err; 2703 } 2704 2705 return 0; 2706 } 2707 2708 #ifdef CONFIG_BT_HCIBTUSB_BCM 2709 static inline int __set_diag_interface(struct hci_dev *hdev) 2710 { 2711 struct btusb_data *data = hci_get_drvdata(hdev); 2712 struct usb_interface *intf = data->diag; 2713 int i; 2714 2715 if (!data->diag) 2716 return -ENODEV; 2717 2718 data->diag_tx_ep = NULL; 2719 data->diag_rx_ep = NULL; 2720 2721 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2722 struct usb_endpoint_descriptor *ep_desc; 2723 2724 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2725 2726 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2727 data->diag_tx_ep = ep_desc; 2728 continue; 2729 } 2730 2731 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2732 data->diag_rx_ep = ep_desc; 2733 continue; 2734 } 2735 } 2736 2737 if (!data->diag_tx_ep || !data->diag_rx_ep) { 2738 BT_ERR("%s invalid diagnostic descriptors", hdev->name); 2739 return -ENODEV; 2740 } 2741 2742 return 0; 2743 } 2744 2745 static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) 2746 { 2747 struct btusb_data *data = hci_get_drvdata(hdev); 2748 struct sk_buff *skb; 2749 struct urb *urb; 2750 unsigned int pipe; 2751 2752 if (!data->diag_tx_ep) 2753 return ERR_PTR(-ENODEV); 2754 2755 urb = usb_alloc_urb(0, GFP_KERNEL); 2756 if (!urb) 2757 return ERR_PTR(-ENOMEM); 2758 2759 skb = bt_skb_alloc(2, GFP_KERNEL); 2760 if (!skb) { 2761 usb_free_urb(urb); 2762 return ERR_PTR(-ENOMEM); 2763 } 2764 2765 *skb_put(skb, 1) = 0xf0; 2766 *skb_put(skb, 1) = enable; 2767 2768 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); 2769 2770 usb_fill_bulk_urb(urb, data->udev, pipe, 2771 skb->data, skb->len, btusb_tx_complete, skb); 2772 2773 skb->dev = (void *)hdev; 2774 2775 return urb; 2776 } 2777 2778 static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) 2779 { 2780 struct btusb_data *data = hci_get_drvdata(hdev); 2781 struct urb *urb; 2782 2783 if (!data->diag) 2784 return -ENODEV; 2785 2786 if (!test_bit(HCI_RUNNING, &hdev->flags)) 2787 return -ENETDOWN; 2788 2789 urb = alloc_diag_urb(hdev, enable); 2790 if (IS_ERR(urb)) 2791 return PTR_ERR(urb); 2792 2793 return submit_or_queue_tx_urb(hdev, urb); 2794 } 2795 #endif 2796 2797 #ifdef CONFIG_PM 2798 static irqreturn_t btusb_oob_wake_handler(int irq, void *priv) 2799 { 2800 struct btusb_data *data = priv; 2801 2802 pm_wakeup_event(&data->udev->dev, 0); 2803 pm_system_wakeup(); 2804 2805 /* Disable only if not already disabled (keep it balanced) */ 2806 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 2807 disable_irq_nosync(irq); 2808 disable_irq_wake(irq); 2809 } 2810 return IRQ_HANDLED; 2811 } 2812 2813 static const struct of_device_id btusb_match_table[] = { 2814 { .compatible = "usb1286,204e" }, 2815 { } 2816 }; 2817 MODULE_DEVICE_TABLE(of, btusb_match_table); 2818 2819 /* Use an oob wakeup pin? */ 2820 static int btusb_config_oob_wake(struct hci_dev *hdev) 2821 { 2822 struct btusb_data *data = hci_get_drvdata(hdev); 2823 struct device *dev = &data->udev->dev; 2824 int irq, ret; 2825 2826 clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 2827 2828 if (!of_match_device(btusb_match_table, dev)) 2829 return 0; 2830 2831 /* Move on if no IRQ specified */ 2832 irq = of_irq_get_byname(dev->of_node, "wakeup"); 2833 if (irq <= 0) { 2834 bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__); 2835 return 0; 2836 } 2837 2838 ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler, 2839 0, "OOB Wake-on-BT", data); 2840 if (ret) { 2841 bt_dev_err(hdev, "%s: IRQ request failed", __func__); 2842 return ret; 2843 } 2844 2845 ret = device_init_wakeup(dev, true); 2846 if (ret) { 2847 bt_dev_err(hdev, "%s: failed to init_wakeup", __func__); 2848 return ret; 2849 } 2850 2851 data->oob_wake_irq = irq; 2852 disable_irq(irq); 2853 bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq); 2854 return 0; 2855 } 2856 #endif 2857 2858 static int btusb_probe(struct usb_interface *intf, 2859 const struct usb_device_id *id) 2860 { 2861 struct usb_endpoint_descriptor *ep_desc; 2862 struct btusb_data *data; 2863 struct hci_dev *hdev; 2864 unsigned ifnum_base; 2865 int i, err; 2866 2867 BT_DBG("intf %p id %p", intf, id); 2868 2869 /* interface numbers are hardcoded in the spec */ 2870 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { 2871 if (!(id->driver_info & BTUSB_IFNUM_2)) 2872 return -ENODEV; 2873 if (intf->cur_altsetting->desc.bInterfaceNumber != 2) 2874 return -ENODEV; 2875 } 2876 2877 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; 2878 2879 if (!id->driver_info) { 2880 const struct usb_device_id *match; 2881 2882 match = usb_match_id(intf, blacklist_table); 2883 if (match) 2884 id = match; 2885 } 2886 2887 if (id->driver_info == BTUSB_IGNORE) 2888 return -ENODEV; 2889 2890 if (id->driver_info & BTUSB_ATH3012) { 2891 struct usb_device *udev = interface_to_usbdev(intf); 2892 2893 /* Old firmware would otherwise let ath3k driver load 2894 * patch and sysconfig files */ 2895 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001) 2896 return -ENODEV; 2897 } 2898 2899 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); 2900 if (!data) 2901 return -ENOMEM; 2902 2903 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2904 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2905 2906 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { 2907 data->intr_ep = ep_desc; 2908 continue; 2909 } 2910 2911 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2912 data->bulk_tx_ep = ep_desc; 2913 continue; 2914 } 2915 2916 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2917 data->bulk_rx_ep = ep_desc; 2918 continue; 2919 } 2920 } 2921 2922 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) 2923 return -ENODEV; 2924 2925 if (id->driver_info & BTUSB_AMP) { 2926 data->cmdreq_type = USB_TYPE_CLASS | 0x01; 2927 data->cmdreq = 0x2b; 2928 } else { 2929 data->cmdreq_type = USB_TYPE_CLASS; 2930 data->cmdreq = 0x00; 2931 } 2932 2933 data->udev = interface_to_usbdev(intf); 2934 data->intf = intf; 2935 2936 INIT_WORK(&data->work, btusb_work); 2937 INIT_WORK(&data->waker, btusb_waker); 2938 init_usb_anchor(&data->deferred); 2939 init_usb_anchor(&data->tx_anchor); 2940 spin_lock_init(&data->txlock); 2941 2942 init_usb_anchor(&data->intr_anchor); 2943 init_usb_anchor(&data->bulk_anchor); 2944 init_usb_anchor(&data->isoc_anchor); 2945 init_usb_anchor(&data->diag_anchor); 2946 spin_lock_init(&data->rxlock); 2947 2948 if (id->driver_info & BTUSB_INTEL_NEW) { 2949 data->recv_event = btusb_recv_event_intel; 2950 data->recv_bulk = btusb_recv_bulk_intel; 2951 set_bit(BTUSB_BOOTLOADER, &data->flags); 2952 } else { 2953 data->recv_event = hci_recv_frame; 2954 data->recv_bulk = btusb_recv_bulk; 2955 } 2956 2957 hdev = hci_alloc_dev(); 2958 if (!hdev) 2959 return -ENOMEM; 2960 2961 hdev->bus = HCI_USB; 2962 hci_set_drvdata(hdev, data); 2963 2964 if (id->driver_info & BTUSB_AMP) 2965 hdev->dev_type = HCI_AMP; 2966 else 2967 hdev->dev_type = HCI_PRIMARY; 2968 2969 data->hdev = hdev; 2970 2971 SET_HCIDEV_DEV(hdev, &intf->dev); 2972 2973 hdev->open = btusb_open; 2974 hdev->close = btusb_close; 2975 hdev->flush = btusb_flush; 2976 hdev->send = btusb_send_frame; 2977 hdev->notify = btusb_notify; 2978 2979 #ifdef CONFIG_PM 2980 err = btusb_config_oob_wake(hdev); 2981 if (err) 2982 goto out_free_dev; 2983 2984 /* Marvell devices may need a specific chip configuration */ 2985 if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) { 2986 err = marvell_config_oob_wake(hdev); 2987 if (err) 2988 goto out_free_dev; 2989 } 2990 #endif 2991 if (id->driver_info & BTUSB_CW6622) 2992 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 2993 2994 if (id->driver_info & BTUSB_BCM2045) 2995 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 2996 2997 if (id->driver_info & BTUSB_BCM92035) 2998 hdev->setup = btusb_setup_bcm92035; 2999 3000 #ifdef CONFIG_BT_HCIBTUSB_BCM 3001 if (id->driver_info & BTUSB_BCM_PATCHRAM) { 3002 hdev->manufacturer = 15; 3003 hdev->setup = btbcm_setup_patchram; 3004 hdev->set_diag = btusb_bcm_set_diag; 3005 hdev->set_bdaddr = btbcm_set_bdaddr; 3006 3007 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 3008 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 3009 } 3010 3011 if (id->driver_info & BTUSB_BCM_APPLE) { 3012 hdev->manufacturer = 15; 3013 hdev->setup = btbcm_setup_apple; 3014 hdev->set_diag = btusb_bcm_set_diag; 3015 3016 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 3017 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 3018 } 3019 #endif 3020 3021 if (id->driver_info & BTUSB_INTEL) { 3022 hdev->manufacturer = 2; 3023 hdev->setup = btusb_setup_intel; 3024 hdev->shutdown = btusb_shutdown_intel; 3025 hdev->set_diag = btintel_set_diag_mfg; 3026 hdev->set_bdaddr = btintel_set_bdaddr; 3027 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3028 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3029 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 3030 } 3031 3032 if (id->driver_info & BTUSB_INTEL_NEW) { 3033 hdev->manufacturer = 2; 3034 hdev->send = btusb_send_frame_intel; 3035 hdev->setup = btusb_setup_intel_new; 3036 hdev->hw_error = btintel_hw_error; 3037 hdev->set_diag = btintel_set_diag; 3038 hdev->set_bdaddr = btintel_set_bdaddr; 3039 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3040 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 3041 } 3042 3043 if (id->driver_info & BTUSB_MARVELL) 3044 hdev->set_bdaddr = btusb_set_bdaddr_marvell; 3045 3046 if (id->driver_info & BTUSB_SWAVE) { 3047 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); 3048 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); 3049 } 3050 3051 if (id->driver_info & BTUSB_INTEL_BOOT) { 3052 hdev->manufacturer = 2; 3053 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 3054 } 3055 3056 if (id->driver_info & BTUSB_ATH3012) { 3057 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 3058 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3059 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3060 } 3061 3062 if (id->driver_info & BTUSB_QCA_ROME) { 3063 data->setup_on_usb = btusb_setup_qca; 3064 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 3065 } 3066 3067 #ifdef CONFIG_BT_HCIBTUSB_RTL 3068 if (id->driver_info & BTUSB_REALTEK) { 3069 hdev->setup = btrtl_setup_realtek; 3070 3071 /* Realtek devices lose their updated firmware over suspend, 3072 * but the USB hub doesn't notice any status change. 3073 * Explicitly request a device reset on resume. 3074 */ 3075 set_bit(BTUSB_RESET_RESUME, &data->flags); 3076 } 3077 #endif 3078 3079 if (id->driver_info & BTUSB_AMP) { 3080 /* AMP controllers do not support SCO packets */ 3081 data->isoc = NULL; 3082 } else { 3083 /* Interface orders are hardcoded in the specification */ 3084 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); 3085 } 3086 3087 if (!reset) 3088 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3089 3090 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { 3091 if (!disable_scofix) 3092 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); 3093 } 3094 3095 if (id->driver_info & BTUSB_BROKEN_ISOC) 3096 data->isoc = NULL; 3097 3098 if (id->driver_info & BTUSB_DIGIANSWER) { 3099 data->cmdreq_type = USB_TYPE_VENDOR; 3100 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3101 } 3102 3103 if (id->driver_info & BTUSB_CSR) { 3104 struct usb_device *udev = data->udev; 3105 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); 3106 3107 /* Old firmware would otherwise execute USB reset */ 3108 if (bcdDevice < 0x117) 3109 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3110 3111 /* Fake CSR devices with broken commands */ 3112 if (bcdDevice <= 0x100 || bcdDevice == 0x134) 3113 hdev->setup = btusb_setup_csr; 3114 3115 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3116 } 3117 3118 if (id->driver_info & BTUSB_SNIFFER) { 3119 struct usb_device *udev = data->udev; 3120 3121 /* New sniffer firmware has crippled HCI interface */ 3122 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) 3123 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 3124 } 3125 3126 if (id->driver_info & BTUSB_INTEL_BOOT) { 3127 /* A bug in the bootloader causes that interrupt interface is 3128 * only enabled after receiving SetInterface(0, AltSetting=0). 3129 */ 3130 err = usb_set_interface(data->udev, 0, 0); 3131 if (err < 0) { 3132 BT_ERR("failed to set interface 0, alt 0 %d", err); 3133 goto out_free_dev; 3134 } 3135 } 3136 3137 if (data->isoc) { 3138 err = usb_driver_claim_interface(&btusb_driver, 3139 data->isoc, data); 3140 if (err < 0) 3141 goto out_free_dev; 3142 } 3143 3144 #ifdef CONFIG_BT_HCIBTUSB_BCM 3145 if (data->diag) { 3146 if (!usb_driver_claim_interface(&btusb_driver, 3147 data->diag, data)) 3148 __set_diag_interface(hdev); 3149 else 3150 data->diag = NULL; 3151 } 3152 #endif 3153 3154 err = hci_register_dev(hdev); 3155 if (err < 0) 3156 goto out_free_dev; 3157 3158 usb_set_intfdata(intf, data); 3159 3160 return 0; 3161 3162 out_free_dev: 3163 hci_free_dev(hdev); 3164 return err; 3165 } 3166 3167 static void btusb_disconnect(struct usb_interface *intf) 3168 { 3169 struct btusb_data *data = usb_get_intfdata(intf); 3170 struct hci_dev *hdev; 3171 3172 BT_DBG("intf %p", intf); 3173 3174 if (!data) 3175 return; 3176 3177 hdev = data->hdev; 3178 usb_set_intfdata(data->intf, NULL); 3179 3180 if (data->isoc) 3181 usb_set_intfdata(data->isoc, NULL); 3182 3183 if (data->diag) 3184 usb_set_intfdata(data->diag, NULL); 3185 3186 hci_unregister_dev(hdev); 3187 3188 if (intf == data->intf) { 3189 if (data->isoc) 3190 usb_driver_release_interface(&btusb_driver, data->isoc); 3191 if (data->diag) 3192 usb_driver_release_interface(&btusb_driver, data->diag); 3193 } else if (intf == data->isoc) { 3194 if (data->diag) 3195 usb_driver_release_interface(&btusb_driver, data->diag); 3196 usb_driver_release_interface(&btusb_driver, data->intf); 3197 } else if (intf == data->diag) { 3198 usb_driver_release_interface(&btusb_driver, data->intf); 3199 if (data->isoc) 3200 usb_driver_release_interface(&btusb_driver, data->isoc); 3201 } 3202 3203 if (data->oob_wake_irq) 3204 device_init_wakeup(&data->udev->dev, false); 3205 3206 hci_free_dev(hdev); 3207 } 3208 3209 #ifdef CONFIG_PM 3210 static int btusb_suspend(struct usb_interface *intf, pm_message_t message) 3211 { 3212 struct btusb_data *data = usb_get_intfdata(intf); 3213 3214 BT_DBG("intf %p", intf); 3215 3216 if (data->suspend_count++) 3217 return 0; 3218 3219 spin_lock_irq(&data->txlock); 3220 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { 3221 set_bit(BTUSB_SUSPENDING, &data->flags); 3222 spin_unlock_irq(&data->txlock); 3223 } else { 3224 spin_unlock_irq(&data->txlock); 3225 data->suspend_count--; 3226 return -EBUSY; 3227 } 3228 3229 cancel_work_sync(&data->work); 3230 3231 btusb_stop_traffic(data); 3232 usb_kill_anchored_urbs(&data->tx_anchor); 3233 3234 if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) { 3235 set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 3236 enable_irq_wake(data->oob_wake_irq); 3237 enable_irq(data->oob_wake_irq); 3238 } 3239 3240 /* Optionally request a device reset on resume, but only when 3241 * wakeups are disabled. If wakeups are enabled we assume the 3242 * device will stay powered up throughout suspend. 3243 */ 3244 if (test_bit(BTUSB_RESET_RESUME, &data->flags) && 3245 !device_may_wakeup(&data->udev->dev)) 3246 data->udev->reset_resume = 1; 3247 3248 return 0; 3249 } 3250 3251 static void play_deferred(struct btusb_data *data) 3252 { 3253 struct urb *urb; 3254 int err; 3255 3256 while ((urb = usb_get_from_anchor(&data->deferred))) { 3257 err = usb_submit_urb(urb, GFP_ATOMIC); 3258 if (err < 0) 3259 break; 3260 3261 data->tx_in_flight++; 3262 } 3263 usb_scuttle_anchored_urbs(&data->deferred); 3264 } 3265 3266 static int btusb_resume(struct usb_interface *intf) 3267 { 3268 struct btusb_data *data = usb_get_intfdata(intf); 3269 struct hci_dev *hdev = data->hdev; 3270 int err = 0; 3271 3272 BT_DBG("intf %p", intf); 3273 3274 if (--data->suspend_count) 3275 return 0; 3276 3277 /* Disable only if not already disabled (keep it balanced) */ 3278 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 3279 disable_irq(data->oob_wake_irq); 3280 disable_irq_wake(data->oob_wake_irq); 3281 } 3282 3283 if (!test_bit(HCI_RUNNING, &hdev->flags)) 3284 goto done; 3285 3286 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { 3287 err = btusb_submit_intr_urb(hdev, GFP_NOIO); 3288 if (err < 0) { 3289 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 3290 goto failed; 3291 } 3292 } 3293 3294 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { 3295 err = btusb_submit_bulk_urb(hdev, GFP_NOIO); 3296 if (err < 0) { 3297 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 3298 goto failed; 3299 } 3300 3301 btusb_submit_bulk_urb(hdev, GFP_NOIO); 3302 } 3303 3304 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 3305 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) 3306 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 3307 else 3308 btusb_submit_isoc_urb(hdev, GFP_NOIO); 3309 } 3310 3311 spin_lock_irq(&data->txlock); 3312 play_deferred(data); 3313 clear_bit(BTUSB_SUSPENDING, &data->flags); 3314 spin_unlock_irq(&data->txlock); 3315 schedule_work(&data->work); 3316 3317 return 0; 3318 3319 failed: 3320 usb_scuttle_anchored_urbs(&data->deferred); 3321 done: 3322 spin_lock_irq(&data->txlock); 3323 clear_bit(BTUSB_SUSPENDING, &data->flags); 3324 spin_unlock_irq(&data->txlock); 3325 3326 return err; 3327 } 3328 #endif 3329 3330 static struct usb_driver btusb_driver = { 3331 .name = "btusb", 3332 .probe = btusb_probe, 3333 .disconnect = btusb_disconnect, 3334 #ifdef CONFIG_PM 3335 .suspend = btusb_suspend, 3336 .resume = btusb_resume, 3337 #endif 3338 .id_table = btusb_table, 3339 .supports_autosuspend = 1, 3340 .disable_hub_initiated_lpm = 1, 3341 }; 3342 3343 module_usb_driver(btusb_driver); 3344 3345 module_param(disable_scofix, bool, 0644); 3346 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); 3347 3348 module_param(force_scofix, bool, 0644); 3349 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); 3350 3351 module_param(reset, bool, 0644); 3352 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); 3353 3354 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); 3355 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); 3356 MODULE_VERSION(VERSION); 3357 MODULE_LICENSE("GPL"); 3358