1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * 4 * Generic Bluetooth USB driver 5 * 6 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> 7 */ 8 9 #include <linux/dmi.h> 10 #include <linux/module.h> 11 #include <linux/usb.h> 12 #include <linux/usb/quirks.h> 13 #include <linux/firmware.h> 14 #include <linux/iopoll.h> 15 #include <linux/of_device.h> 16 #include <linux/of_irq.h> 17 #include <linux/suspend.h> 18 #include <linux/gpio/consumer.h> 19 #include <asm/unaligned.h> 20 21 #include <net/bluetooth/bluetooth.h> 22 #include <net/bluetooth/hci_core.h> 23 24 #include "btintel.h" 25 #include "btbcm.h" 26 #include "btrtl.h" 27 28 #define VERSION "0.8" 29 30 static bool disable_scofix; 31 static bool force_scofix; 32 static bool enable_autosuspend = IS_ENABLED(CONFIG_BT_HCIBTUSB_AUTOSUSPEND); 33 34 static bool reset = true; 35 36 static struct usb_driver btusb_driver; 37 38 #define BTUSB_IGNORE 0x01 39 #define BTUSB_DIGIANSWER 0x02 40 #define BTUSB_CSR 0x04 41 #define BTUSB_SNIFFER 0x08 42 #define BTUSB_BCM92035 0x10 43 #define BTUSB_BROKEN_ISOC 0x20 44 #define BTUSB_WRONG_SCO_MTU 0x40 45 #define BTUSB_ATH3012 0x80 46 #define BTUSB_INTEL 0x100 47 #define BTUSB_INTEL_BOOT 0x200 48 #define BTUSB_BCM_PATCHRAM 0x400 49 #define BTUSB_MARVELL 0x800 50 #define BTUSB_SWAVE 0x1000 51 #define BTUSB_INTEL_NEW 0x2000 52 #define BTUSB_AMP 0x4000 53 #define BTUSB_QCA_ROME 0x8000 54 #define BTUSB_BCM_APPLE 0x10000 55 #define BTUSB_REALTEK 0x20000 56 #define BTUSB_BCM2045 0x40000 57 #define BTUSB_IFNUM_2 0x80000 58 #define BTUSB_CW6622 0x100000 59 #define BTUSB_MEDIATEK 0x200000 60 61 static const struct usb_device_id btusb_table[] = { 62 /* Generic Bluetooth USB device */ 63 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, 64 65 /* Generic Bluetooth AMP device */ 66 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, 67 68 /* Generic Bluetooth USB interface */ 69 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, 70 71 /* Apple-specific (Broadcom) devices */ 72 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), 73 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, 74 75 /* MediaTek MT76x0E */ 76 { USB_DEVICE(0x0e8d, 0x763f) }, 77 78 /* Broadcom SoftSailing reporting vendor specific */ 79 { USB_DEVICE(0x0a5c, 0x21e1) }, 80 81 /* Apple MacBookPro 7,1 */ 82 { USB_DEVICE(0x05ac, 0x8213) }, 83 84 /* Apple iMac11,1 */ 85 { USB_DEVICE(0x05ac, 0x8215) }, 86 87 /* Apple MacBookPro6,2 */ 88 { USB_DEVICE(0x05ac, 0x8218) }, 89 90 /* Apple MacBookAir3,1, MacBookAir3,2 */ 91 { USB_DEVICE(0x05ac, 0x821b) }, 92 93 /* Apple MacBookAir4,1 */ 94 { USB_DEVICE(0x05ac, 0x821f) }, 95 96 /* Apple MacBookPro8,2 */ 97 { USB_DEVICE(0x05ac, 0x821a) }, 98 99 /* Apple MacMini5,1 */ 100 { USB_DEVICE(0x05ac, 0x8281) }, 101 102 /* AVM BlueFRITZ! USB v2.0 */ 103 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, 104 105 /* Bluetooth Ultraport Module from IBM */ 106 { USB_DEVICE(0x04bf, 0x030a) }, 107 108 /* ALPS Modules with non-standard id */ 109 { USB_DEVICE(0x044e, 0x3001) }, 110 { USB_DEVICE(0x044e, 0x3002) }, 111 112 /* Ericsson with non-standard id */ 113 { USB_DEVICE(0x0bdb, 0x1002) }, 114 115 /* Canyon CN-BTU1 with HID interfaces */ 116 { USB_DEVICE(0x0c10, 0x0000) }, 117 118 /* Broadcom BCM20702A0 */ 119 { USB_DEVICE(0x413c, 0x8197) }, 120 121 /* Broadcom BCM20702B0 (Dynex/Insignia) */ 122 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, 123 124 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ 125 { USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01), 126 .driver_info = BTUSB_BCM_PATCHRAM }, 127 128 /* Broadcom BCM920703 (HTC Vive) */ 129 { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01), 130 .driver_info = BTUSB_BCM_PATCHRAM }, 131 132 /* Foxconn - Hon Hai */ 133 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), 134 .driver_info = BTUSB_BCM_PATCHRAM }, 135 136 /* Lite-On Technology - Broadcom based */ 137 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), 138 .driver_info = BTUSB_BCM_PATCHRAM }, 139 140 /* Broadcom devices with vendor specific id */ 141 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), 142 .driver_info = BTUSB_BCM_PATCHRAM }, 143 144 /* ASUSTek Computer - Broadcom based */ 145 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), 146 .driver_info = BTUSB_BCM_PATCHRAM }, 147 148 /* Belkin F8065bf - Broadcom based */ 149 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), 150 .driver_info = BTUSB_BCM_PATCHRAM }, 151 152 /* IMC Networks - Broadcom based */ 153 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), 154 .driver_info = BTUSB_BCM_PATCHRAM }, 155 156 /* Dell Computer - Broadcom based */ 157 { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01), 158 .driver_info = BTUSB_BCM_PATCHRAM }, 159 160 /* Toshiba Corp - Broadcom based */ 161 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), 162 .driver_info = BTUSB_BCM_PATCHRAM }, 163 164 /* Intel Bluetooth USB Bootloader (RAM module) */ 165 { USB_DEVICE(0x8087, 0x0a5a), 166 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, 167 168 { } /* Terminating entry */ 169 }; 170 171 MODULE_DEVICE_TABLE(usb, btusb_table); 172 173 static const struct usb_device_id blacklist_table[] = { 174 /* CSR BlueCore devices */ 175 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, 176 177 /* Broadcom BCM2033 without firmware */ 178 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, 179 180 /* Broadcom BCM2045 devices */ 181 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, 182 183 /* Atheros 3011 with sflash firmware */ 184 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, 185 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, 186 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, 187 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, 188 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, 189 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, 190 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, 191 192 /* Atheros AR9285 Malbec with sflash firmware */ 193 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, 194 195 /* Atheros 3012 with sflash firmware */ 196 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, 197 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, 198 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, 199 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, 200 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, 201 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, 202 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, 203 { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 }, 204 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, 205 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, 206 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, 207 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, 208 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, 209 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, 210 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, 211 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, 212 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, 213 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, 214 { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 }, 215 { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 }, 216 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, 217 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, 218 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, 219 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, 220 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, 221 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, 222 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, 223 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, 224 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, 225 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, 226 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, 227 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, 228 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, 229 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, 230 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, 231 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, 232 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, 233 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, 234 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, 235 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, 236 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, 237 { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 }, 238 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, 239 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, 240 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, 241 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, 242 { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 }, 243 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, 244 { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 }, 245 { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 }, 246 247 /* Atheros AR5BBU12 with sflash firmware */ 248 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, 249 250 /* Atheros AR5BBU12 with sflash firmware */ 251 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, 252 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, 253 254 /* QCA ROME chipset */ 255 { USB_DEVICE(0x0cf3, 0x535b), .driver_info = BTUSB_QCA_ROME }, 256 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME }, 257 { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME }, 258 { USB_DEVICE(0x0cf3, 0xe010), .driver_info = BTUSB_QCA_ROME }, 259 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME }, 260 { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME }, 261 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, 262 { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME }, 263 { USB_DEVICE(0x0489, 0xe09f), .driver_info = BTUSB_QCA_ROME }, 264 { USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME }, 265 { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME }, 266 { USB_DEVICE(0x04ca, 0x3015), .driver_info = BTUSB_QCA_ROME }, 267 { USB_DEVICE(0x04ca, 0x3016), .driver_info = BTUSB_QCA_ROME }, 268 { USB_DEVICE(0x04ca, 0x301a), .driver_info = BTUSB_QCA_ROME }, 269 { USB_DEVICE(0x13d3, 0x3491), .driver_info = BTUSB_QCA_ROME }, 270 { USB_DEVICE(0x13d3, 0x3496), .driver_info = BTUSB_QCA_ROME }, 271 { USB_DEVICE(0x13d3, 0x3501), .driver_info = BTUSB_QCA_ROME }, 272 273 /* Broadcom BCM2035 */ 274 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, 275 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, 276 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, 277 278 /* Broadcom BCM2045 */ 279 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, 280 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, 281 282 /* IBM/Lenovo ThinkPad with Broadcom chip */ 283 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, 284 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, 285 286 /* HP laptop with Broadcom chip */ 287 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, 288 289 /* Dell laptop with Broadcom chip */ 290 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, 291 292 /* Dell Wireless 370 and 410 devices */ 293 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, 294 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, 295 296 /* Belkin F8T012 and F8T013 devices */ 297 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, 298 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, 299 300 /* Asus WL-BTD202 device */ 301 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, 302 303 /* Kensington Bluetooth USB adapter */ 304 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, 305 306 /* RTX Telecom based adapters with buggy SCO support */ 307 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, 308 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, 309 310 /* CONWISE Technology based adapters with buggy SCO support */ 311 { USB_DEVICE(0x0e5e, 0x6622), 312 .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622}, 313 314 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ 315 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, 316 317 /* Digianswer devices */ 318 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, 319 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, 320 321 /* CSR BlueCore Bluetooth Sniffer */ 322 { USB_DEVICE(0x0a12, 0x0002), 323 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 324 325 /* Frontline ComProbe Bluetooth Sniffer */ 326 { USB_DEVICE(0x16d3, 0x0002), 327 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 328 329 /* Marvell Bluetooth devices */ 330 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, 331 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, 332 { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL }, 333 334 /* Intel Bluetooth devices */ 335 { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW }, 336 { USB_DEVICE(0x8087, 0x0026), .driver_info = BTUSB_INTEL_NEW }, 337 { USB_DEVICE(0x8087, 0x0029), .driver_info = BTUSB_INTEL_NEW }, 338 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, 339 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, 340 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, 341 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW }, 342 { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL }, 343 { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_NEW }, 344 345 /* Other Intel Bluetooth devices */ 346 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), 347 .driver_info = BTUSB_IGNORE }, 348 349 /* Realtek Bluetooth devices */ 350 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), 351 .driver_info = BTUSB_REALTEK }, 352 353 /* MediaTek Bluetooth devices */ 354 { USB_VENDOR_AND_INTERFACE_INFO(0x0e8d, 0xe0, 0x01, 0x01), 355 .driver_info = BTUSB_MEDIATEK }, 356 357 /* Additional Realtek 8723AE Bluetooth devices */ 358 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, 359 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, 360 361 /* Additional Realtek 8723BE Bluetooth devices */ 362 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, 363 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, 364 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, 365 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, 366 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, 367 { USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK }, 368 369 /* Additional Realtek 8723BU Bluetooth devices */ 370 { USB_DEVICE(0x7392, 0xa611), .driver_info = BTUSB_REALTEK }, 371 372 /* Additional Realtek 8723DE Bluetooth devices */ 373 { USB_DEVICE(0x0bda, 0xb009), .driver_info = BTUSB_REALTEK }, 374 { USB_DEVICE(0x2ff8, 0xb011), .driver_info = BTUSB_REALTEK }, 375 376 /* Additional Realtek 8821AE Bluetooth devices */ 377 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, 378 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, 379 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, 380 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, 381 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, 382 383 /* Additional Realtek 8822BE Bluetooth devices */ 384 { USB_DEVICE(0x13d3, 0x3526), .driver_info = BTUSB_REALTEK }, 385 { USB_DEVICE(0x0b05, 0x185c), .driver_info = BTUSB_REALTEK }, 386 387 /* Silicon Wave based devices */ 388 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, 389 390 { } /* Terminating entry */ 391 }; 392 393 /* The Bluetooth USB module build into some devices needs to be reset on resume, 394 * this is a problem with the platform (likely shutting off all power) not with 395 * the module itself. So we use a DMI list to match known broken platforms. 396 */ 397 static const struct dmi_system_id btusb_needs_reset_resume_table[] = { 398 { 399 /* Dell OptiPlex 3060 (QCA ROME device 0cf3:e007) */ 400 .matches = { 401 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 402 DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 3060"), 403 }, 404 }, 405 { 406 /* Dell XPS 9360 (QCA ROME device 0cf3:e300) */ 407 .matches = { 408 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 409 DMI_MATCH(DMI_PRODUCT_NAME, "XPS 13 9360"), 410 }, 411 }, 412 { 413 /* Dell Inspiron 5565 (QCA ROME device 0cf3:e009) */ 414 .matches = { 415 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 416 DMI_MATCH(DMI_PRODUCT_NAME, "Inspiron 5565"), 417 }, 418 }, 419 {} 420 }; 421 422 #define BTUSB_MAX_ISOC_FRAMES 10 423 424 #define BTUSB_INTR_RUNNING 0 425 #define BTUSB_BULK_RUNNING 1 426 #define BTUSB_ISOC_RUNNING 2 427 #define BTUSB_SUSPENDING 3 428 #define BTUSB_DID_ISO_RESUME 4 429 #define BTUSB_BOOTLOADER 5 430 #define BTUSB_DOWNLOADING 6 431 #define BTUSB_FIRMWARE_LOADED 7 432 #define BTUSB_FIRMWARE_FAILED 8 433 #define BTUSB_BOOTING 9 434 #define BTUSB_DIAG_RUNNING 10 435 #define BTUSB_OOB_WAKE_ENABLED 11 436 #define BTUSB_HW_RESET_ACTIVE 12 437 #define BTUSB_TX_WAIT_VND_EVT 13 438 #define BTUSB_WAKEUP_DISABLE 14 439 440 struct btusb_data { 441 struct hci_dev *hdev; 442 struct usb_device *udev; 443 struct usb_interface *intf; 444 struct usb_interface *isoc; 445 struct usb_interface *diag; 446 unsigned isoc_ifnum; 447 448 unsigned long flags; 449 450 struct work_struct work; 451 struct work_struct waker; 452 453 struct usb_anchor deferred; 454 struct usb_anchor tx_anchor; 455 int tx_in_flight; 456 spinlock_t txlock; 457 458 struct usb_anchor intr_anchor; 459 struct usb_anchor bulk_anchor; 460 struct usb_anchor isoc_anchor; 461 struct usb_anchor diag_anchor; 462 struct usb_anchor ctrl_anchor; 463 spinlock_t rxlock; 464 465 struct sk_buff *evt_skb; 466 struct sk_buff *acl_skb; 467 struct sk_buff *sco_skb; 468 469 struct usb_endpoint_descriptor *intr_ep; 470 struct usb_endpoint_descriptor *bulk_tx_ep; 471 struct usb_endpoint_descriptor *bulk_rx_ep; 472 struct usb_endpoint_descriptor *isoc_tx_ep; 473 struct usb_endpoint_descriptor *isoc_rx_ep; 474 struct usb_endpoint_descriptor *diag_tx_ep; 475 struct usb_endpoint_descriptor *diag_rx_ep; 476 477 struct gpio_desc *reset_gpio; 478 479 __u8 cmdreq_type; 480 __u8 cmdreq; 481 482 unsigned int sco_num; 483 int isoc_altsetting; 484 int suspend_count; 485 486 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); 487 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); 488 489 int (*setup_on_usb)(struct hci_dev *hdev); 490 491 int oob_wake_irq; /* irq for out-of-band wake-on-bt */ 492 unsigned cmd_timeout_cnt; 493 }; 494 495 496 static void btusb_intel_cmd_timeout(struct hci_dev *hdev) 497 { 498 struct btusb_data *data = hci_get_drvdata(hdev); 499 struct gpio_desc *reset_gpio = data->reset_gpio; 500 501 if (++data->cmd_timeout_cnt < 5) 502 return; 503 504 if (!reset_gpio) { 505 bt_dev_err(hdev, "No way to reset. Ignoring and continuing"); 506 return; 507 } 508 509 /* 510 * Toggle the hard reset line if the platform provides one. The reset 511 * is going to yank the device off the USB and then replug. So doing 512 * once is enough. The cleanup is handled correctly on the way out 513 * (standard USB disconnect), and the new device is detected cleanly 514 * and bound to the driver again like it should be. 515 */ 516 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) { 517 bt_dev_err(hdev, "last reset failed? Not resetting again"); 518 return; 519 } 520 521 bt_dev_err(hdev, "Initiating HW reset via gpio"); 522 gpiod_set_value_cansleep(reset_gpio, 1); 523 msleep(100); 524 gpiod_set_value_cansleep(reset_gpio, 0); 525 } 526 527 static void btusb_rtl_cmd_timeout(struct hci_dev *hdev) 528 { 529 struct btusb_data *data = hci_get_drvdata(hdev); 530 struct gpio_desc *reset_gpio = data->reset_gpio; 531 532 if (++data->cmd_timeout_cnt < 5) 533 return; 534 535 if (!reset_gpio) { 536 bt_dev_err(hdev, "No gpio to reset Realtek device, ignoring"); 537 return; 538 } 539 540 /* Toggle the hard reset line. The Realtek device is going to 541 * yank itself off the USB and then replug. The cleanup is handled 542 * correctly on the way out (standard USB disconnect), and the new 543 * device is detected cleanly and bound to the driver again like 544 * it should be. 545 */ 546 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) { 547 bt_dev_err(hdev, "last reset failed? Not resetting again"); 548 return; 549 } 550 551 bt_dev_err(hdev, "Reset Realtek device via gpio"); 552 gpiod_set_value_cansleep(reset_gpio, 0); 553 msleep(200); 554 gpiod_set_value_cansleep(reset_gpio, 1); 555 } 556 557 static inline void btusb_free_frags(struct btusb_data *data) 558 { 559 unsigned long flags; 560 561 spin_lock_irqsave(&data->rxlock, flags); 562 563 kfree_skb(data->evt_skb); 564 data->evt_skb = NULL; 565 566 kfree_skb(data->acl_skb); 567 data->acl_skb = NULL; 568 569 kfree_skb(data->sco_skb); 570 data->sco_skb = NULL; 571 572 spin_unlock_irqrestore(&data->rxlock, flags); 573 } 574 575 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) 576 { 577 struct sk_buff *skb; 578 unsigned long flags; 579 int err = 0; 580 581 spin_lock_irqsave(&data->rxlock, flags); 582 skb = data->evt_skb; 583 584 while (count) { 585 int len; 586 587 if (!skb) { 588 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); 589 if (!skb) { 590 err = -ENOMEM; 591 break; 592 } 593 594 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 595 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; 596 } 597 598 len = min_t(uint, hci_skb_expect(skb), count); 599 skb_put_data(skb, buffer, len); 600 601 count -= len; 602 buffer += len; 603 hci_skb_expect(skb) -= len; 604 605 if (skb->len == HCI_EVENT_HDR_SIZE) { 606 /* Complete event header */ 607 hci_skb_expect(skb) = hci_event_hdr(skb)->plen; 608 609 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 610 kfree_skb(skb); 611 skb = NULL; 612 613 err = -EILSEQ; 614 break; 615 } 616 } 617 618 if (!hci_skb_expect(skb)) { 619 /* Complete frame */ 620 data->recv_event(data->hdev, skb); 621 skb = NULL; 622 } 623 } 624 625 data->evt_skb = skb; 626 spin_unlock_irqrestore(&data->rxlock, flags); 627 628 return err; 629 } 630 631 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) 632 { 633 struct sk_buff *skb; 634 unsigned long flags; 635 int err = 0; 636 637 spin_lock_irqsave(&data->rxlock, flags); 638 skb = data->acl_skb; 639 640 while (count) { 641 int len; 642 643 if (!skb) { 644 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); 645 if (!skb) { 646 err = -ENOMEM; 647 break; 648 } 649 650 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; 651 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; 652 } 653 654 len = min_t(uint, hci_skb_expect(skb), count); 655 skb_put_data(skb, buffer, len); 656 657 count -= len; 658 buffer += len; 659 hci_skb_expect(skb) -= len; 660 661 if (skb->len == HCI_ACL_HDR_SIZE) { 662 __le16 dlen = hci_acl_hdr(skb)->dlen; 663 664 /* Complete ACL header */ 665 hci_skb_expect(skb) = __le16_to_cpu(dlen); 666 667 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 668 kfree_skb(skb); 669 skb = NULL; 670 671 err = -EILSEQ; 672 break; 673 } 674 } 675 676 if (!hci_skb_expect(skb)) { 677 /* Complete frame */ 678 hci_recv_frame(data->hdev, skb); 679 skb = NULL; 680 } 681 } 682 683 data->acl_skb = skb; 684 spin_unlock_irqrestore(&data->rxlock, flags); 685 686 return err; 687 } 688 689 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) 690 { 691 struct sk_buff *skb; 692 unsigned long flags; 693 int err = 0; 694 695 spin_lock_irqsave(&data->rxlock, flags); 696 skb = data->sco_skb; 697 698 while (count) { 699 int len; 700 701 if (!skb) { 702 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); 703 if (!skb) { 704 err = -ENOMEM; 705 break; 706 } 707 708 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; 709 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; 710 } 711 712 len = min_t(uint, hci_skb_expect(skb), count); 713 skb_put_data(skb, buffer, len); 714 715 count -= len; 716 buffer += len; 717 hci_skb_expect(skb) -= len; 718 719 if (skb->len == HCI_SCO_HDR_SIZE) { 720 /* Complete SCO header */ 721 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; 722 723 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 724 kfree_skb(skb); 725 skb = NULL; 726 727 err = -EILSEQ; 728 break; 729 } 730 } 731 732 if (!hci_skb_expect(skb)) { 733 /* Complete frame */ 734 hci_recv_frame(data->hdev, skb); 735 skb = NULL; 736 } 737 } 738 739 data->sco_skb = skb; 740 spin_unlock_irqrestore(&data->rxlock, flags); 741 742 return err; 743 } 744 745 static void btusb_intr_complete(struct urb *urb) 746 { 747 struct hci_dev *hdev = urb->context; 748 struct btusb_data *data = hci_get_drvdata(hdev); 749 int err; 750 751 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 752 urb->actual_length); 753 754 if (!test_bit(HCI_RUNNING, &hdev->flags)) 755 return; 756 757 if (urb->status == 0) { 758 hdev->stat.byte_rx += urb->actual_length; 759 760 if (btusb_recv_intr(data, urb->transfer_buffer, 761 urb->actual_length) < 0) { 762 bt_dev_err(hdev, "corrupted event packet"); 763 hdev->stat.err_rx++; 764 } 765 } else if (urb->status == -ENOENT) { 766 /* Avoid suspend failed when usb_kill_urb */ 767 return; 768 } 769 770 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) 771 return; 772 773 usb_mark_last_busy(data->udev); 774 usb_anchor_urb(urb, &data->intr_anchor); 775 776 err = usb_submit_urb(urb, GFP_ATOMIC); 777 if (err < 0) { 778 /* -EPERM: urb is being killed; 779 * -ENODEV: device got disconnected 780 */ 781 if (err != -EPERM && err != -ENODEV) 782 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 783 urb, -err); 784 usb_unanchor_urb(urb); 785 } 786 } 787 788 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) 789 { 790 struct btusb_data *data = hci_get_drvdata(hdev); 791 struct urb *urb; 792 unsigned char *buf; 793 unsigned int pipe; 794 int err, size; 795 796 BT_DBG("%s", hdev->name); 797 798 if (!data->intr_ep) 799 return -ENODEV; 800 801 urb = usb_alloc_urb(0, mem_flags); 802 if (!urb) 803 return -ENOMEM; 804 805 size = le16_to_cpu(data->intr_ep->wMaxPacketSize); 806 807 buf = kmalloc(size, mem_flags); 808 if (!buf) { 809 usb_free_urb(urb); 810 return -ENOMEM; 811 } 812 813 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); 814 815 usb_fill_int_urb(urb, data->udev, pipe, buf, size, 816 btusb_intr_complete, hdev, data->intr_ep->bInterval); 817 818 urb->transfer_flags |= URB_FREE_BUFFER; 819 820 usb_anchor_urb(urb, &data->intr_anchor); 821 822 err = usb_submit_urb(urb, mem_flags); 823 if (err < 0) { 824 if (err != -EPERM && err != -ENODEV) 825 bt_dev_err(hdev, "urb %p submission failed (%d)", 826 urb, -err); 827 usb_unanchor_urb(urb); 828 } 829 830 usb_free_urb(urb); 831 832 return err; 833 } 834 835 static void btusb_bulk_complete(struct urb *urb) 836 { 837 struct hci_dev *hdev = urb->context; 838 struct btusb_data *data = hci_get_drvdata(hdev); 839 int err; 840 841 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 842 urb->actual_length); 843 844 if (!test_bit(HCI_RUNNING, &hdev->flags)) 845 return; 846 847 if (urb->status == 0) { 848 hdev->stat.byte_rx += urb->actual_length; 849 850 if (data->recv_bulk(data, urb->transfer_buffer, 851 urb->actual_length) < 0) { 852 bt_dev_err(hdev, "corrupted ACL packet"); 853 hdev->stat.err_rx++; 854 } 855 } else if (urb->status == -ENOENT) { 856 /* Avoid suspend failed when usb_kill_urb */ 857 return; 858 } 859 860 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) 861 return; 862 863 usb_anchor_urb(urb, &data->bulk_anchor); 864 usb_mark_last_busy(data->udev); 865 866 err = usb_submit_urb(urb, GFP_ATOMIC); 867 if (err < 0) { 868 /* -EPERM: urb is being killed; 869 * -ENODEV: device got disconnected 870 */ 871 if (err != -EPERM && err != -ENODEV) 872 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 873 urb, -err); 874 usb_unanchor_urb(urb); 875 } 876 } 877 878 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) 879 { 880 struct btusb_data *data = hci_get_drvdata(hdev); 881 struct urb *urb; 882 unsigned char *buf; 883 unsigned int pipe; 884 int err, size = HCI_MAX_FRAME_SIZE; 885 886 BT_DBG("%s", hdev->name); 887 888 if (!data->bulk_rx_ep) 889 return -ENODEV; 890 891 urb = usb_alloc_urb(0, mem_flags); 892 if (!urb) 893 return -ENOMEM; 894 895 buf = kmalloc(size, mem_flags); 896 if (!buf) { 897 usb_free_urb(urb); 898 return -ENOMEM; 899 } 900 901 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); 902 903 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 904 btusb_bulk_complete, hdev); 905 906 urb->transfer_flags |= URB_FREE_BUFFER; 907 908 usb_mark_last_busy(data->udev); 909 usb_anchor_urb(urb, &data->bulk_anchor); 910 911 err = usb_submit_urb(urb, mem_flags); 912 if (err < 0) { 913 if (err != -EPERM && err != -ENODEV) 914 bt_dev_err(hdev, "urb %p submission failed (%d)", 915 urb, -err); 916 usb_unanchor_urb(urb); 917 } 918 919 usb_free_urb(urb); 920 921 return err; 922 } 923 924 static void btusb_isoc_complete(struct urb *urb) 925 { 926 struct hci_dev *hdev = urb->context; 927 struct btusb_data *data = hci_get_drvdata(hdev); 928 int i, err; 929 930 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 931 urb->actual_length); 932 933 if (!test_bit(HCI_RUNNING, &hdev->flags)) 934 return; 935 936 if (urb->status == 0) { 937 for (i = 0; i < urb->number_of_packets; i++) { 938 unsigned int offset = urb->iso_frame_desc[i].offset; 939 unsigned int length = urb->iso_frame_desc[i].actual_length; 940 941 if (urb->iso_frame_desc[i].status) 942 continue; 943 944 hdev->stat.byte_rx += length; 945 946 if (btusb_recv_isoc(data, urb->transfer_buffer + offset, 947 length) < 0) { 948 bt_dev_err(hdev, "corrupted SCO packet"); 949 hdev->stat.err_rx++; 950 } 951 } 952 } else if (urb->status == -ENOENT) { 953 /* Avoid suspend failed when usb_kill_urb */ 954 return; 955 } 956 957 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) 958 return; 959 960 usb_anchor_urb(urb, &data->isoc_anchor); 961 962 err = usb_submit_urb(urb, GFP_ATOMIC); 963 if (err < 0) { 964 /* -EPERM: urb is being killed; 965 * -ENODEV: device got disconnected 966 */ 967 if (err != -EPERM && err != -ENODEV) 968 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 969 urb, -err); 970 usb_unanchor_urb(urb); 971 } 972 } 973 974 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) 975 { 976 int i, offset = 0; 977 978 BT_DBG("len %d mtu %d", len, mtu); 979 980 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; 981 i++, offset += mtu, len -= mtu) { 982 urb->iso_frame_desc[i].offset = offset; 983 urb->iso_frame_desc[i].length = mtu; 984 } 985 986 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 987 urb->iso_frame_desc[i].offset = offset; 988 urb->iso_frame_desc[i].length = len; 989 i++; 990 } 991 992 urb->number_of_packets = i; 993 } 994 995 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) 996 { 997 struct btusb_data *data = hci_get_drvdata(hdev); 998 struct urb *urb; 999 unsigned char *buf; 1000 unsigned int pipe; 1001 int err, size; 1002 1003 BT_DBG("%s", hdev->name); 1004 1005 if (!data->isoc_rx_ep) 1006 return -ENODEV; 1007 1008 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); 1009 if (!urb) 1010 return -ENOMEM; 1011 1012 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * 1013 BTUSB_MAX_ISOC_FRAMES; 1014 1015 buf = kmalloc(size, mem_flags); 1016 if (!buf) { 1017 usb_free_urb(urb); 1018 return -ENOMEM; 1019 } 1020 1021 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); 1022 1023 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, 1024 hdev, data->isoc_rx_ep->bInterval); 1025 1026 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; 1027 1028 __fill_isoc_descriptor(urb, size, 1029 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); 1030 1031 usb_anchor_urb(urb, &data->isoc_anchor); 1032 1033 err = usb_submit_urb(urb, mem_flags); 1034 if (err < 0) { 1035 if (err != -EPERM && err != -ENODEV) 1036 bt_dev_err(hdev, "urb %p submission failed (%d)", 1037 urb, -err); 1038 usb_unanchor_urb(urb); 1039 } 1040 1041 usb_free_urb(urb); 1042 1043 return err; 1044 } 1045 1046 static void btusb_diag_complete(struct urb *urb) 1047 { 1048 struct hci_dev *hdev = urb->context; 1049 struct btusb_data *data = hci_get_drvdata(hdev); 1050 int err; 1051 1052 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1053 urb->actual_length); 1054 1055 if (urb->status == 0) { 1056 struct sk_buff *skb; 1057 1058 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); 1059 if (skb) { 1060 skb_put_data(skb, urb->transfer_buffer, 1061 urb->actual_length); 1062 hci_recv_diag(hdev, skb); 1063 } 1064 } else if (urb->status == -ENOENT) { 1065 /* Avoid suspend failed when usb_kill_urb */ 1066 return; 1067 } 1068 1069 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) 1070 return; 1071 1072 usb_anchor_urb(urb, &data->diag_anchor); 1073 usb_mark_last_busy(data->udev); 1074 1075 err = usb_submit_urb(urb, GFP_ATOMIC); 1076 if (err < 0) { 1077 /* -EPERM: urb is being killed; 1078 * -ENODEV: device got disconnected 1079 */ 1080 if (err != -EPERM && err != -ENODEV) 1081 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 1082 urb, -err); 1083 usb_unanchor_urb(urb); 1084 } 1085 } 1086 1087 static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) 1088 { 1089 struct btusb_data *data = hci_get_drvdata(hdev); 1090 struct urb *urb; 1091 unsigned char *buf; 1092 unsigned int pipe; 1093 int err, size = HCI_MAX_FRAME_SIZE; 1094 1095 BT_DBG("%s", hdev->name); 1096 1097 if (!data->diag_rx_ep) 1098 return -ENODEV; 1099 1100 urb = usb_alloc_urb(0, mem_flags); 1101 if (!urb) 1102 return -ENOMEM; 1103 1104 buf = kmalloc(size, mem_flags); 1105 if (!buf) { 1106 usb_free_urb(urb); 1107 return -ENOMEM; 1108 } 1109 1110 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); 1111 1112 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 1113 btusb_diag_complete, hdev); 1114 1115 urb->transfer_flags |= URB_FREE_BUFFER; 1116 1117 usb_mark_last_busy(data->udev); 1118 usb_anchor_urb(urb, &data->diag_anchor); 1119 1120 err = usb_submit_urb(urb, mem_flags); 1121 if (err < 0) { 1122 if (err != -EPERM && err != -ENODEV) 1123 bt_dev_err(hdev, "urb %p submission failed (%d)", 1124 urb, -err); 1125 usb_unanchor_urb(urb); 1126 } 1127 1128 usb_free_urb(urb); 1129 1130 return err; 1131 } 1132 1133 static void btusb_tx_complete(struct urb *urb) 1134 { 1135 struct sk_buff *skb = urb->context; 1136 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1137 struct btusb_data *data = hci_get_drvdata(hdev); 1138 unsigned long flags; 1139 1140 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1141 urb->actual_length); 1142 1143 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1144 goto done; 1145 1146 if (!urb->status) 1147 hdev->stat.byte_tx += urb->transfer_buffer_length; 1148 else 1149 hdev->stat.err_tx++; 1150 1151 done: 1152 spin_lock_irqsave(&data->txlock, flags); 1153 data->tx_in_flight--; 1154 spin_unlock_irqrestore(&data->txlock, flags); 1155 1156 kfree(urb->setup_packet); 1157 1158 kfree_skb(skb); 1159 } 1160 1161 static void btusb_isoc_tx_complete(struct urb *urb) 1162 { 1163 struct sk_buff *skb = urb->context; 1164 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1165 1166 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1167 urb->actual_length); 1168 1169 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1170 goto done; 1171 1172 if (!urb->status) 1173 hdev->stat.byte_tx += urb->transfer_buffer_length; 1174 else 1175 hdev->stat.err_tx++; 1176 1177 done: 1178 kfree(urb->setup_packet); 1179 1180 kfree_skb(skb); 1181 } 1182 1183 static int btusb_open(struct hci_dev *hdev) 1184 { 1185 struct btusb_data *data = hci_get_drvdata(hdev); 1186 int err; 1187 1188 BT_DBG("%s", hdev->name); 1189 1190 err = usb_autopm_get_interface(data->intf); 1191 if (err < 0) 1192 return err; 1193 1194 /* Patching USB firmware files prior to starting any URBs of HCI path 1195 * It is more safe to use USB bulk channel for downloading USB patch 1196 */ 1197 if (data->setup_on_usb) { 1198 err = data->setup_on_usb(hdev); 1199 if (err < 0) 1200 return err; 1201 } 1202 1203 data->intf->needs_remote_wakeup = 1; 1204 /* device specific wakeup source enabled and required for USB 1205 * remote wakeup while host is suspended 1206 */ 1207 device_wakeup_enable(&data->udev->dev); 1208 1209 /* Disable device remote wakeup when host is suspended 1210 * For Realtek chips, global suspend without 1211 * SET_FEATURE (DEVICE_REMOTE_WAKEUP) can save more power in device. 1212 */ 1213 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) 1214 device_wakeup_disable(&data->udev->dev); 1215 1216 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) 1217 goto done; 1218 1219 err = btusb_submit_intr_urb(hdev, GFP_KERNEL); 1220 if (err < 0) 1221 goto failed; 1222 1223 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1224 if (err < 0) { 1225 usb_kill_anchored_urbs(&data->intr_anchor); 1226 goto failed; 1227 } 1228 1229 set_bit(BTUSB_BULK_RUNNING, &data->flags); 1230 btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1231 1232 if (data->diag) { 1233 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) 1234 set_bit(BTUSB_DIAG_RUNNING, &data->flags); 1235 } 1236 1237 done: 1238 usb_autopm_put_interface(data->intf); 1239 return 0; 1240 1241 failed: 1242 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1243 usb_autopm_put_interface(data->intf); 1244 return err; 1245 } 1246 1247 static void btusb_stop_traffic(struct btusb_data *data) 1248 { 1249 usb_kill_anchored_urbs(&data->intr_anchor); 1250 usb_kill_anchored_urbs(&data->bulk_anchor); 1251 usb_kill_anchored_urbs(&data->isoc_anchor); 1252 usb_kill_anchored_urbs(&data->diag_anchor); 1253 usb_kill_anchored_urbs(&data->ctrl_anchor); 1254 } 1255 1256 static int btusb_close(struct hci_dev *hdev) 1257 { 1258 struct btusb_data *data = hci_get_drvdata(hdev); 1259 int err; 1260 1261 BT_DBG("%s", hdev->name); 1262 1263 cancel_work_sync(&data->work); 1264 cancel_work_sync(&data->waker); 1265 1266 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1267 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 1268 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1269 clear_bit(BTUSB_DIAG_RUNNING, &data->flags); 1270 1271 btusb_stop_traffic(data); 1272 btusb_free_frags(data); 1273 1274 err = usb_autopm_get_interface(data->intf); 1275 if (err < 0) 1276 goto failed; 1277 1278 data->intf->needs_remote_wakeup = 0; 1279 1280 /* Enable remote wake up for auto-suspend */ 1281 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) 1282 data->intf->needs_remote_wakeup = 1; 1283 1284 device_wakeup_disable(&data->udev->dev); 1285 usb_autopm_put_interface(data->intf); 1286 1287 failed: 1288 usb_scuttle_anchored_urbs(&data->deferred); 1289 return 0; 1290 } 1291 1292 static int btusb_flush(struct hci_dev *hdev) 1293 { 1294 struct btusb_data *data = hci_get_drvdata(hdev); 1295 1296 BT_DBG("%s", hdev->name); 1297 1298 usb_kill_anchored_urbs(&data->tx_anchor); 1299 btusb_free_frags(data); 1300 1301 return 0; 1302 } 1303 1304 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) 1305 { 1306 struct btusb_data *data = hci_get_drvdata(hdev); 1307 struct usb_ctrlrequest *dr; 1308 struct urb *urb; 1309 unsigned int pipe; 1310 1311 urb = usb_alloc_urb(0, GFP_KERNEL); 1312 if (!urb) 1313 return ERR_PTR(-ENOMEM); 1314 1315 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 1316 if (!dr) { 1317 usb_free_urb(urb); 1318 return ERR_PTR(-ENOMEM); 1319 } 1320 1321 dr->bRequestType = data->cmdreq_type; 1322 dr->bRequest = data->cmdreq; 1323 dr->wIndex = 0; 1324 dr->wValue = 0; 1325 dr->wLength = __cpu_to_le16(skb->len); 1326 1327 pipe = usb_sndctrlpipe(data->udev, 0x00); 1328 1329 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 1330 skb->data, skb->len, btusb_tx_complete, skb); 1331 1332 skb->dev = (void *)hdev; 1333 1334 return urb; 1335 } 1336 1337 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) 1338 { 1339 struct btusb_data *data = hci_get_drvdata(hdev); 1340 struct urb *urb; 1341 unsigned int pipe; 1342 1343 if (!data->bulk_tx_ep) 1344 return ERR_PTR(-ENODEV); 1345 1346 urb = usb_alloc_urb(0, GFP_KERNEL); 1347 if (!urb) 1348 return ERR_PTR(-ENOMEM); 1349 1350 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); 1351 1352 usb_fill_bulk_urb(urb, data->udev, pipe, 1353 skb->data, skb->len, btusb_tx_complete, skb); 1354 1355 skb->dev = (void *)hdev; 1356 1357 return urb; 1358 } 1359 1360 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) 1361 { 1362 struct btusb_data *data = hci_get_drvdata(hdev); 1363 struct urb *urb; 1364 unsigned int pipe; 1365 1366 if (!data->isoc_tx_ep) 1367 return ERR_PTR(-ENODEV); 1368 1369 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); 1370 if (!urb) 1371 return ERR_PTR(-ENOMEM); 1372 1373 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); 1374 1375 usb_fill_int_urb(urb, data->udev, pipe, 1376 skb->data, skb->len, btusb_isoc_tx_complete, 1377 skb, data->isoc_tx_ep->bInterval); 1378 1379 urb->transfer_flags = URB_ISO_ASAP; 1380 1381 __fill_isoc_descriptor(urb, skb->len, 1382 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); 1383 1384 skb->dev = (void *)hdev; 1385 1386 return urb; 1387 } 1388 1389 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) 1390 { 1391 struct btusb_data *data = hci_get_drvdata(hdev); 1392 int err; 1393 1394 usb_anchor_urb(urb, &data->tx_anchor); 1395 1396 err = usb_submit_urb(urb, GFP_KERNEL); 1397 if (err < 0) { 1398 if (err != -EPERM && err != -ENODEV) 1399 bt_dev_err(hdev, "urb %p submission failed (%d)", 1400 urb, -err); 1401 kfree(urb->setup_packet); 1402 usb_unanchor_urb(urb); 1403 } else { 1404 usb_mark_last_busy(data->udev); 1405 } 1406 1407 usb_free_urb(urb); 1408 return err; 1409 } 1410 1411 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) 1412 { 1413 struct btusb_data *data = hci_get_drvdata(hdev); 1414 unsigned long flags; 1415 bool suspending; 1416 1417 spin_lock_irqsave(&data->txlock, flags); 1418 suspending = test_bit(BTUSB_SUSPENDING, &data->flags); 1419 if (!suspending) 1420 data->tx_in_flight++; 1421 spin_unlock_irqrestore(&data->txlock, flags); 1422 1423 if (!suspending) 1424 return submit_tx_urb(hdev, urb); 1425 1426 usb_anchor_urb(urb, &data->deferred); 1427 schedule_work(&data->waker); 1428 1429 usb_free_urb(urb); 1430 return 0; 1431 } 1432 1433 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) 1434 { 1435 struct urb *urb; 1436 1437 BT_DBG("%s", hdev->name); 1438 1439 switch (hci_skb_pkt_type(skb)) { 1440 case HCI_COMMAND_PKT: 1441 urb = alloc_ctrl_urb(hdev, skb); 1442 if (IS_ERR(urb)) 1443 return PTR_ERR(urb); 1444 1445 hdev->stat.cmd_tx++; 1446 return submit_or_queue_tx_urb(hdev, urb); 1447 1448 case HCI_ACLDATA_PKT: 1449 urb = alloc_bulk_urb(hdev, skb); 1450 if (IS_ERR(urb)) 1451 return PTR_ERR(urb); 1452 1453 hdev->stat.acl_tx++; 1454 return submit_or_queue_tx_urb(hdev, urb); 1455 1456 case HCI_SCODATA_PKT: 1457 if (hci_conn_num(hdev, SCO_LINK) < 1) 1458 return -ENODEV; 1459 1460 urb = alloc_isoc_urb(hdev, skb); 1461 if (IS_ERR(urb)) 1462 return PTR_ERR(urb); 1463 1464 hdev->stat.sco_tx++; 1465 return submit_tx_urb(hdev, urb); 1466 } 1467 1468 return -EILSEQ; 1469 } 1470 1471 static void btusb_notify(struct hci_dev *hdev, unsigned int evt) 1472 { 1473 struct btusb_data *data = hci_get_drvdata(hdev); 1474 1475 BT_DBG("%s evt %d", hdev->name, evt); 1476 1477 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { 1478 data->sco_num = hci_conn_num(hdev, SCO_LINK); 1479 schedule_work(&data->work); 1480 } 1481 } 1482 1483 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) 1484 { 1485 struct btusb_data *data = hci_get_drvdata(hdev); 1486 struct usb_interface *intf = data->isoc; 1487 struct usb_endpoint_descriptor *ep_desc; 1488 int i, err; 1489 1490 if (!data->isoc) 1491 return -ENODEV; 1492 1493 err = usb_set_interface(data->udev, data->isoc_ifnum, altsetting); 1494 if (err < 0) { 1495 bt_dev_err(hdev, "setting interface failed (%d)", -err); 1496 return err; 1497 } 1498 1499 data->isoc_altsetting = altsetting; 1500 1501 data->isoc_tx_ep = NULL; 1502 data->isoc_rx_ep = NULL; 1503 1504 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 1505 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 1506 1507 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { 1508 data->isoc_tx_ep = ep_desc; 1509 continue; 1510 } 1511 1512 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { 1513 data->isoc_rx_ep = ep_desc; 1514 continue; 1515 } 1516 } 1517 1518 if (!data->isoc_tx_ep || !data->isoc_rx_ep) { 1519 bt_dev_err(hdev, "invalid SCO descriptors"); 1520 return -ENODEV; 1521 } 1522 1523 return 0; 1524 } 1525 1526 static void btusb_work(struct work_struct *work) 1527 { 1528 struct btusb_data *data = container_of(work, struct btusb_data, work); 1529 struct hci_dev *hdev = data->hdev; 1530 int new_alts; 1531 int err; 1532 1533 if (data->sco_num > 0) { 1534 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { 1535 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); 1536 if (err < 0) { 1537 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1538 usb_kill_anchored_urbs(&data->isoc_anchor); 1539 return; 1540 } 1541 1542 set_bit(BTUSB_DID_ISO_RESUME, &data->flags); 1543 } 1544 1545 if (hdev->voice_setting & 0x0020) { 1546 static const int alts[3] = { 2, 4, 5 }; 1547 1548 new_alts = alts[data->sco_num - 1]; 1549 } else { 1550 new_alts = data->sco_num; 1551 } 1552 1553 if (data->isoc_altsetting != new_alts) { 1554 unsigned long flags; 1555 1556 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1557 usb_kill_anchored_urbs(&data->isoc_anchor); 1558 1559 /* When isochronous alternate setting needs to be 1560 * changed, because SCO connection has been added 1561 * or removed, a packet fragment may be left in the 1562 * reassembling state. This could lead to wrongly 1563 * assembled fragments. 1564 * 1565 * Clear outstanding fragment when selecting a new 1566 * alternate setting. 1567 */ 1568 spin_lock_irqsave(&data->rxlock, flags); 1569 kfree_skb(data->sco_skb); 1570 data->sco_skb = NULL; 1571 spin_unlock_irqrestore(&data->rxlock, flags); 1572 1573 if (__set_isoc_interface(hdev, new_alts) < 0) 1574 return; 1575 } 1576 1577 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 1578 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) 1579 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1580 else 1581 btusb_submit_isoc_urb(hdev, GFP_KERNEL); 1582 } 1583 } else { 1584 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1585 usb_kill_anchored_urbs(&data->isoc_anchor); 1586 1587 __set_isoc_interface(hdev, 0); 1588 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) 1589 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); 1590 } 1591 } 1592 1593 static void btusb_waker(struct work_struct *work) 1594 { 1595 struct btusb_data *data = container_of(work, struct btusb_data, waker); 1596 int err; 1597 1598 err = usb_autopm_get_interface(data->intf); 1599 if (err < 0) 1600 return; 1601 1602 usb_autopm_put_interface(data->intf); 1603 } 1604 1605 static int btusb_setup_bcm92035(struct hci_dev *hdev) 1606 { 1607 struct sk_buff *skb; 1608 u8 val = 0x00; 1609 1610 BT_DBG("%s", hdev->name); 1611 1612 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); 1613 if (IS_ERR(skb)) 1614 bt_dev_err(hdev, "BCM92035 command failed (%ld)", PTR_ERR(skb)); 1615 else 1616 kfree_skb(skb); 1617 1618 return 0; 1619 } 1620 1621 static int btusb_setup_csr(struct hci_dev *hdev) 1622 { 1623 struct hci_rp_read_local_version *rp; 1624 struct sk_buff *skb; 1625 1626 BT_DBG("%s", hdev->name); 1627 1628 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, 1629 HCI_INIT_TIMEOUT); 1630 if (IS_ERR(skb)) { 1631 int err = PTR_ERR(skb); 1632 bt_dev_err(hdev, "CSR: Local version failed (%d)", err); 1633 return err; 1634 } 1635 1636 if (skb->len != sizeof(struct hci_rp_read_local_version)) { 1637 bt_dev_err(hdev, "CSR: Local version length mismatch"); 1638 kfree_skb(skb); 1639 return -EIO; 1640 } 1641 1642 rp = (struct hci_rp_read_local_version *)skb->data; 1643 1644 /* Detect controllers which aren't real CSR ones. */ 1645 if (le16_to_cpu(rp->manufacturer) != 10 || 1646 le16_to_cpu(rp->lmp_subver) == 0x0c5c) { 1647 /* Clear the reset quirk since this is not an actual 1648 * early Bluetooth 1.1 device from CSR. 1649 */ 1650 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 1651 1652 /* These fake CSR controllers have all a broken 1653 * stored link key handling and so just disable it. 1654 */ 1655 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 1656 } 1657 1658 kfree_skb(skb); 1659 1660 return 0; 1661 } 1662 1663 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, 1664 struct intel_version *ver) 1665 { 1666 const struct firmware *fw; 1667 char fwname[64]; 1668 int ret; 1669 1670 snprintf(fwname, sizeof(fwname), 1671 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", 1672 ver->hw_platform, ver->hw_variant, ver->hw_revision, 1673 ver->fw_variant, ver->fw_revision, ver->fw_build_num, 1674 ver->fw_build_ww, ver->fw_build_yy); 1675 1676 ret = request_firmware(&fw, fwname, &hdev->dev); 1677 if (ret < 0) { 1678 if (ret == -EINVAL) { 1679 bt_dev_err(hdev, "Intel firmware file request failed (%d)", 1680 ret); 1681 return NULL; 1682 } 1683 1684 bt_dev_err(hdev, "failed to open Intel firmware file: %s (%d)", 1685 fwname, ret); 1686 1687 /* If the correct firmware patch file is not found, use the 1688 * default firmware patch file instead 1689 */ 1690 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", 1691 ver->hw_platform, ver->hw_variant); 1692 if (request_firmware(&fw, fwname, &hdev->dev) < 0) { 1693 bt_dev_err(hdev, "failed to open default fw file: %s", 1694 fwname); 1695 return NULL; 1696 } 1697 } 1698 1699 bt_dev_info(hdev, "Intel Bluetooth firmware file: %s", fwname); 1700 1701 return fw; 1702 } 1703 1704 static int btusb_setup_intel_patching(struct hci_dev *hdev, 1705 const struct firmware *fw, 1706 const u8 **fw_ptr, int *disable_patch) 1707 { 1708 struct sk_buff *skb; 1709 struct hci_command_hdr *cmd; 1710 const u8 *cmd_param; 1711 struct hci_event_hdr *evt = NULL; 1712 const u8 *evt_param = NULL; 1713 int remain = fw->size - (*fw_ptr - fw->data); 1714 1715 /* The first byte indicates the types of the patch command or event. 1716 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes 1717 * in the current firmware buffer doesn't start with 0x01 or 1718 * the size of remain buffer is smaller than HCI command header, 1719 * the firmware file is corrupted and it should stop the patching 1720 * process. 1721 */ 1722 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { 1723 bt_dev_err(hdev, "Intel fw corrupted: invalid cmd read"); 1724 return -EINVAL; 1725 } 1726 (*fw_ptr)++; 1727 remain--; 1728 1729 cmd = (struct hci_command_hdr *)(*fw_ptr); 1730 *fw_ptr += sizeof(*cmd); 1731 remain -= sizeof(*cmd); 1732 1733 /* Ensure that the remain firmware data is long enough than the length 1734 * of command parameter. If not, the firmware file is corrupted. 1735 */ 1736 if (remain < cmd->plen) { 1737 bt_dev_err(hdev, "Intel fw corrupted: invalid cmd len"); 1738 return -EFAULT; 1739 } 1740 1741 /* If there is a command that loads a patch in the firmware 1742 * file, then enable the patch upon success, otherwise just 1743 * disable the manufacturer mode, for example patch activation 1744 * is not required when the default firmware patch file is used 1745 * because there are no patch data to load. 1746 */ 1747 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) 1748 *disable_patch = 0; 1749 1750 cmd_param = *fw_ptr; 1751 *fw_ptr += cmd->plen; 1752 remain -= cmd->plen; 1753 1754 /* This reads the expected events when the above command is sent to the 1755 * device. Some vendor commands expects more than one events, for 1756 * example command status event followed by vendor specific event. 1757 * For this case, it only keeps the last expected event. so the command 1758 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of 1759 * last expected event. 1760 */ 1761 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { 1762 (*fw_ptr)++; 1763 remain--; 1764 1765 evt = (struct hci_event_hdr *)(*fw_ptr); 1766 *fw_ptr += sizeof(*evt); 1767 remain -= sizeof(*evt); 1768 1769 if (remain < evt->plen) { 1770 bt_dev_err(hdev, "Intel fw corrupted: invalid evt len"); 1771 return -EFAULT; 1772 } 1773 1774 evt_param = *fw_ptr; 1775 *fw_ptr += evt->plen; 1776 remain -= evt->plen; 1777 } 1778 1779 /* Every HCI commands in the firmware file has its correspond event. 1780 * If event is not found or remain is smaller than zero, the firmware 1781 * file is corrupted. 1782 */ 1783 if (!evt || !evt_param || remain < 0) { 1784 bt_dev_err(hdev, "Intel fw corrupted: invalid evt read"); 1785 return -EFAULT; 1786 } 1787 1788 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, 1789 cmd_param, evt->evt, HCI_INIT_TIMEOUT); 1790 if (IS_ERR(skb)) { 1791 bt_dev_err(hdev, "sending Intel patch command (0x%4.4x) failed (%ld)", 1792 cmd->opcode, PTR_ERR(skb)); 1793 return PTR_ERR(skb); 1794 } 1795 1796 /* It ensures that the returned event matches the event data read from 1797 * the firmware file. At fist, it checks the length and then 1798 * the contents of the event. 1799 */ 1800 if (skb->len != evt->plen) { 1801 bt_dev_err(hdev, "mismatch event length (opcode 0x%4.4x)", 1802 le16_to_cpu(cmd->opcode)); 1803 kfree_skb(skb); 1804 return -EFAULT; 1805 } 1806 1807 if (memcmp(skb->data, evt_param, evt->plen)) { 1808 bt_dev_err(hdev, "mismatch event parameter (opcode 0x%4.4x)", 1809 le16_to_cpu(cmd->opcode)); 1810 kfree_skb(skb); 1811 return -EFAULT; 1812 } 1813 kfree_skb(skb); 1814 1815 return 0; 1816 } 1817 1818 static int btusb_setup_intel(struct hci_dev *hdev) 1819 { 1820 struct sk_buff *skb; 1821 const struct firmware *fw; 1822 const u8 *fw_ptr; 1823 int disable_patch, err; 1824 struct intel_version ver; 1825 1826 BT_DBG("%s", hdev->name); 1827 1828 /* The controller has a bug with the first HCI command sent to it 1829 * returning number of completed commands as zero. This would stall the 1830 * command processing in the Bluetooth core. 1831 * 1832 * As a workaround, send HCI Reset command first which will reset the 1833 * number of completed commands and allow normal command processing 1834 * from now on. 1835 */ 1836 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 1837 if (IS_ERR(skb)) { 1838 bt_dev_err(hdev, "sending initial HCI reset command failed (%ld)", 1839 PTR_ERR(skb)); 1840 return PTR_ERR(skb); 1841 } 1842 kfree_skb(skb); 1843 1844 /* Read Intel specific controller version first to allow selection of 1845 * which firmware file to load. 1846 * 1847 * The returned information are hardware variant and revision plus 1848 * firmware variant, revision and build number. 1849 */ 1850 err = btintel_read_version(hdev, &ver); 1851 if (err) 1852 return err; 1853 1854 bt_dev_info(hdev, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", 1855 ver.hw_platform, ver.hw_variant, ver.hw_revision, 1856 ver.fw_variant, ver.fw_revision, ver.fw_build_num, 1857 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); 1858 1859 /* fw_patch_num indicates the version of patch the device currently 1860 * have. If there is no patch data in the device, it is always 0x00. 1861 * So, if it is other than 0x00, no need to patch the device again. 1862 */ 1863 if (ver.fw_patch_num) { 1864 bt_dev_info(hdev, "Intel device is already patched. " 1865 "patch num: %02x", ver.fw_patch_num); 1866 goto complete; 1867 } 1868 1869 /* Opens the firmware patch file based on the firmware version read 1870 * from the controller. If it fails to open the matching firmware 1871 * patch file, it tries to open the default firmware patch file. 1872 * If no patch file is found, allow the device to operate without 1873 * a patch. 1874 */ 1875 fw = btusb_setup_intel_get_fw(hdev, &ver); 1876 if (!fw) 1877 goto complete; 1878 fw_ptr = fw->data; 1879 1880 /* Enable the manufacturer mode of the controller. 1881 * Only while this mode is enabled, the driver can download the 1882 * firmware patch data and configuration parameters. 1883 */ 1884 err = btintel_enter_mfg(hdev); 1885 if (err) { 1886 release_firmware(fw); 1887 return err; 1888 } 1889 1890 disable_patch = 1; 1891 1892 /* The firmware data file consists of list of Intel specific HCI 1893 * commands and its expected events. The first byte indicates the 1894 * type of the message, either HCI command or HCI event. 1895 * 1896 * It reads the command and its expected event from the firmware file, 1897 * and send to the controller. Once __hci_cmd_sync_ev() returns, 1898 * the returned event is compared with the event read from the firmware 1899 * file and it will continue until all the messages are downloaded to 1900 * the controller. 1901 * 1902 * Once the firmware patching is completed successfully, 1903 * the manufacturer mode is disabled with reset and activating the 1904 * downloaded patch. 1905 * 1906 * If the firmware patching fails, the manufacturer mode is 1907 * disabled with reset and deactivating the patch. 1908 * 1909 * If the default patch file is used, no reset is done when disabling 1910 * the manufacturer. 1911 */ 1912 while (fw->size > fw_ptr - fw->data) { 1913 int ret; 1914 1915 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, 1916 &disable_patch); 1917 if (ret < 0) 1918 goto exit_mfg_deactivate; 1919 } 1920 1921 release_firmware(fw); 1922 1923 if (disable_patch) 1924 goto exit_mfg_disable; 1925 1926 /* Patching completed successfully and disable the manufacturer mode 1927 * with reset and activate the downloaded firmware patches. 1928 */ 1929 err = btintel_exit_mfg(hdev, true, true); 1930 if (err) 1931 return err; 1932 1933 bt_dev_info(hdev, "Intel firmware patch completed and activated"); 1934 1935 goto complete; 1936 1937 exit_mfg_disable: 1938 /* Disable the manufacturer mode without reset */ 1939 err = btintel_exit_mfg(hdev, false, false); 1940 if (err) 1941 return err; 1942 1943 bt_dev_info(hdev, "Intel firmware patch completed"); 1944 1945 goto complete; 1946 1947 exit_mfg_deactivate: 1948 release_firmware(fw); 1949 1950 /* Patching failed. Disable the manufacturer mode with reset and 1951 * deactivate the downloaded firmware patches. 1952 */ 1953 err = btintel_exit_mfg(hdev, true, false); 1954 if (err) 1955 return err; 1956 1957 bt_dev_info(hdev, "Intel firmware patch completed and deactivated"); 1958 1959 complete: 1960 /* Set the event mask for Intel specific vendor events. This enables 1961 * a few extra events that are useful during general operation. 1962 */ 1963 btintel_set_event_mask_mfg(hdev, false); 1964 1965 btintel_check_bdaddr(hdev); 1966 return 0; 1967 } 1968 1969 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) 1970 { 1971 struct sk_buff *skb; 1972 struct hci_event_hdr *hdr; 1973 struct hci_ev_cmd_complete *evt; 1974 1975 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_KERNEL); 1976 if (!skb) 1977 return -ENOMEM; 1978 1979 hdr = skb_put(skb, sizeof(*hdr)); 1980 hdr->evt = HCI_EV_CMD_COMPLETE; 1981 hdr->plen = sizeof(*evt) + 1; 1982 1983 evt = skb_put(skb, sizeof(*evt)); 1984 evt->ncmd = 0x01; 1985 evt->opcode = cpu_to_le16(opcode); 1986 1987 skb_put_u8(skb, 0x00); 1988 1989 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 1990 1991 return hci_recv_frame(hdev, skb); 1992 } 1993 1994 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, 1995 int count) 1996 { 1997 /* When the device is in bootloader mode, then it can send 1998 * events via the bulk endpoint. These events are treated the 1999 * same way as the ones received from the interrupt endpoint. 2000 */ 2001 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) 2002 return btusb_recv_intr(data, buffer, count); 2003 2004 return btusb_recv_bulk(data, buffer, count); 2005 } 2006 2007 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, 2008 unsigned int len) 2009 { 2010 const struct intel_bootup *evt = ptr; 2011 2012 if (len != sizeof(*evt)) 2013 return; 2014 2015 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) 2016 wake_up_bit(&data->flags, BTUSB_BOOTING); 2017 } 2018 2019 static void btusb_intel_secure_send_result(struct btusb_data *data, 2020 const void *ptr, unsigned int len) 2021 { 2022 const struct intel_secure_send_result *evt = ptr; 2023 2024 if (len != sizeof(*evt)) 2025 return; 2026 2027 if (evt->result) 2028 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); 2029 2030 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && 2031 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) 2032 wake_up_bit(&data->flags, BTUSB_DOWNLOADING); 2033 } 2034 2035 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) 2036 { 2037 struct btusb_data *data = hci_get_drvdata(hdev); 2038 2039 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2040 struct hci_event_hdr *hdr = (void *)skb->data; 2041 2042 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && 2043 hdr->plen > 0) { 2044 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; 2045 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; 2046 2047 switch (skb->data[2]) { 2048 case 0x02: 2049 /* When switching to the operational firmware 2050 * the device sends a vendor specific event 2051 * indicating that the bootup completed. 2052 */ 2053 btusb_intel_bootup(data, ptr, len); 2054 break; 2055 case 0x06: 2056 /* When the firmware loading completes the 2057 * device sends out a vendor specific event 2058 * indicating the result of the firmware 2059 * loading. 2060 */ 2061 btusb_intel_secure_send_result(data, ptr, len); 2062 break; 2063 } 2064 } 2065 } 2066 2067 return hci_recv_frame(hdev, skb); 2068 } 2069 2070 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) 2071 { 2072 struct btusb_data *data = hci_get_drvdata(hdev); 2073 struct urb *urb; 2074 2075 BT_DBG("%s", hdev->name); 2076 2077 switch (hci_skb_pkt_type(skb)) { 2078 case HCI_COMMAND_PKT: 2079 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2080 struct hci_command_hdr *cmd = (void *)skb->data; 2081 __u16 opcode = le16_to_cpu(cmd->opcode); 2082 2083 /* When in bootloader mode and the command 0xfc09 2084 * is received, it needs to be send down the 2085 * bulk endpoint. So allocate a bulk URB instead. 2086 */ 2087 if (opcode == 0xfc09) 2088 urb = alloc_bulk_urb(hdev, skb); 2089 else 2090 urb = alloc_ctrl_urb(hdev, skb); 2091 2092 /* When the 0xfc01 command is issued to boot into 2093 * the operational firmware, it will actually not 2094 * send a command complete event. To keep the flow 2095 * control working inject that event here. 2096 */ 2097 if (opcode == 0xfc01) 2098 inject_cmd_complete(hdev, opcode); 2099 } else { 2100 urb = alloc_ctrl_urb(hdev, skb); 2101 } 2102 if (IS_ERR(urb)) 2103 return PTR_ERR(urb); 2104 2105 hdev->stat.cmd_tx++; 2106 return submit_or_queue_tx_urb(hdev, urb); 2107 2108 case HCI_ACLDATA_PKT: 2109 urb = alloc_bulk_urb(hdev, skb); 2110 if (IS_ERR(urb)) 2111 return PTR_ERR(urb); 2112 2113 hdev->stat.acl_tx++; 2114 return submit_or_queue_tx_urb(hdev, urb); 2115 2116 case HCI_SCODATA_PKT: 2117 if (hci_conn_num(hdev, SCO_LINK) < 1) 2118 return -ENODEV; 2119 2120 urb = alloc_isoc_urb(hdev, skb); 2121 if (IS_ERR(urb)) 2122 return PTR_ERR(urb); 2123 2124 hdev->stat.sco_tx++; 2125 return submit_tx_urb(hdev, urb); 2126 } 2127 2128 return -EILSEQ; 2129 } 2130 2131 static bool btusb_setup_intel_new_get_fw_name(struct intel_version *ver, 2132 struct intel_boot_params *params, 2133 char *fw_name, size_t len, 2134 const char *suffix) 2135 { 2136 switch (ver->hw_variant) { 2137 case 0x0b: /* SfP */ 2138 case 0x0c: /* WsP */ 2139 snprintf(fw_name, len, "intel/ibt-%u-%u.%s", 2140 le16_to_cpu(ver->hw_variant), 2141 le16_to_cpu(params->dev_revid), 2142 suffix); 2143 break; 2144 case 0x11: /* JfP */ 2145 case 0x12: /* ThP */ 2146 case 0x13: /* HrP */ 2147 case 0x14: /* CcP */ 2148 snprintf(fw_name, len, "intel/ibt-%u-%u-%u.%s", 2149 le16_to_cpu(ver->hw_variant), 2150 le16_to_cpu(ver->hw_revision), 2151 le16_to_cpu(ver->fw_revision), 2152 suffix); 2153 break; 2154 default: 2155 return false; 2156 } 2157 return true; 2158 } 2159 2160 static int btusb_setup_intel_new(struct hci_dev *hdev) 2161 { 2162 struct btusb_data *data = hci_get_drvdata(hdev); 2163 struct intel_version ver; 2164 struct intel_boot_params params; 2165 const struct firmware *fw; 2166 u32 boot_param; 2167 char fwname[64]; 2168 ktime_t calltime, delta, rettime; 2169 unsigned long long duration; 2170 int err; 2171 2172 BT_DBG("%s", hdev->name); 2173 2174 /* Set the default boot parameter to 0x0 and it is updated to 2175 * SKU specific boot parameter after reading Intel_Write_Boot_Params 2176 * command while downloading the firmware. 2177 */ 2178 boot_param = 0x00000000; 2179 2180 calltime = ktime_get(); 2181 2182 /* Read the Intel version information to determine if the device 2183 * is in bootloader mode or if it already has operational firmware 2184 * loaded. 2185 */ 2186 err = btintel_read_version(hdev, &ver); 2187 if (err) 2188 return err; 2189 2190 /* The hardware platform number has a fixed value of 0x37 and 2191 * for now only accept this single value. 2192 */ 2193 if (ver.hw_platform != 0x37) { 2194 bt_dev_err(hdev, "Unsupported Intel hardware platform (%u)", 2195 ver.hw_platform); 2196 return -EINVAL; 2197 } 2198 2199 /* Check for supported iBT hardware variants of this firmware 2200 * loading method. 2201 * 2202 * This check has been put in place to ensure correct forward 2203 * compatibility options when newer hardware variants come along. 2204 */ 2205 switch (ver.hw_variant) { 2206 case 0x0b: /* SfP */ 2207 case 0x0c: /* WsP */ 2208 case 0x11: /* JfP */ 2209 case 0x12: /* ThP */ 2210 case 0x13: /* HrP */ 2211 case 0x14: /* CcP */ 2212 break; 2213 default: 2214 bt_dev_err(hdev, "Unsupported Intel hardware variant (%u)", 2215 ver.hw_variant); 2216 return -EINVAL; 2217 } 2218 2219 btintel_version_info(hdev, &ver); 2220 2221 /* The firmware variant determines if the device is in bootloader 2222 * mode or is running operational firmware. The value 0x06 identifies 2223 * the bootloader and the value 0x23 identifies the operational 2224 * firmware. 2225 * 2226 * When the operational firmware is already present, then only 2227 * the check for valid Bluetooth device address is needed. This 2228 * determines if the device will be added as configured or 2229 * unconfigured controller. 2230 * 2231 * It is not possible to use the Secure Boot Parameters in this 2232 * case since that command is only available in bootloader mode. 2233 */ 2234 if (ver.fw_variant == 0x23) { 2235 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2236 btintel_check_bdaddr(hdev); 2237 return 0; 2238 } 2239 2240 /* If the device is not in bootloader mode, then the only possible 2241 * choice is to return an error and abort the device initialization. 2242 */ 2243 if (ver.fw_variant != 0x06) { 2244 bt_dev_err(hdev, "Unsupported Intel firmware variant (%u)", 2245 ver.fw_variant); 2246 return -ENODEV; 2247 } 2248 2249 /* Read the secure boot parameters to identify the operating 2250 * details of the bootloader. 2251 */ 2252 err = btintel_read_boot_params(hdev, ¶ms); 2253 if (err) 2254 return err; 2255 2256 /* It is required that every single firmware fragment is acknowledged 2257 * with a command complete event. If the boot parameters indicate 2258 * that this bootloader does not send them, then abort the setup. 2259 */ 2260 if (params.limited_cce != 0x00) { 2261 bt_dev_err(hdev, "Unsupported Intel firmware loading method (%u)", 2262 params.limited_cce); 2263 return -EINVAL; 2264 } 2265 2266 /* If the OTP has no valid Bluetooth device address, then there will 2267 * also be no valid address for the operational firmware. 2268 */ 2269 if (!bacmp(¶ms.otp_bdaddr, BDADDR_ANY)) { 2270 bt_dev_info(hdev, "No device address configured"); 2271 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2272 } 2273 2274 /* With this Intel bootloader only the hardware variant and device 2275 * revision information are used to select the right firmware for SfP 2276 * and WsP. 2277 * 2278 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi. 2279 * 2280 * Currently the supported hardware variants are: 2281 * 11 (0x0b) for iBT3.0 (LnP/SfP) 2282 * 12 (0x0c) for iBT3.5 (WsP) 2283 * 2284 * For ThP/JfP and for future SKU's, the FW name varies based on HW 2285 * variant, HW revision and FW revision, as these are dependent on CNVi 2286 * and RF Combination. 2287 * 2288 * 17 (0x11) for iBT3.5 (JfP) 2289 * 18 (0x12) for iBT3.5 (ThP) 2290 * 2291 * The firmware file name for these will be 2292 * ibt-<hw_variant>-<hw_revision>-<fw_revision>.sfi. 2293 * 2294 */ 2295 err = btusb_setup_intel_new_get_fw_name(&ver, ¶ms, fwname, 2296 sizeof(fwname), "sfi"); 2297 if (!err) { 2298 bt_dev_err(hdev, "Unsupported Intel firmware naming"); 2299 return -EINVAL; 2300 } 2301 2302 err = request_firmware(&fw, fwname, &hdev->dev); 2303 if (err < 0) { 2304 bt_dev_err(hdev, "Failed to load Intel firmware file (%d)", err); 2305 return err; 2306 } 2307 2308 bt_dev_info(hdev, "Found device firmware: %s", fwname); 2309 2310 /* Save the DDC file name for later use to apply once the firmware 2311 * downloading is done. 2312 */ 2313 err = btusb_setup_intel_new_get_fw_name(&ver, ¶ms, fwname, 2314 sizeof(fwname), "ddc"); 2315 if (!err) { 2316 bt_dev_err(hdev, "Unsupported Intel firmware naming"); 2317 return -EINVAL; 2318 } 2319 2320 if (fw->size < 644) { 2321 bt_dev_err(hdev, "Invalid size of firmware file (%zu)", 2322 fw->size); 2323 err = -EBADF; 2324 goto done; 2325 } 2326 2327 set_bit(BTUSB_DOWNLOADING, &data->flags); 2328 2329 /* Start firmware downloading and get boot parameter */ 2330 err = btintel_download_firmware(hdev, fw, &boot_param); 2331 if (err < 0) 2332 goto done; 2333 2334 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2335 2336 bt_dev_info(hdev, "Waiting for firmware download to complete"); 2337 2338 /* Before switching the device into operational mode and with that 2339 * booting the loaded firmware, wait for the bootloader notification 2340 * that all fragments have been successfully received. 2341 * 2342 * When the event processing receives the notification, then the 2343 * BTUSB_DOWNLOADING flag will be cleared. 2344 * 2345 * The firmware loading should not take longer than 5 seconds 2346 * and thus just timeout if that happens and fail the setup 2347 * of this device. 2348 */ 2349 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, 2350 TASK_INTERRUPTIBLE, 2351 msecs_to_jiffies(5000)); 2352 if (err == -EINTR) { 2353 bt_dev_err(hdev, "Firmware loading interrupted"); 2354 goto done; 2355 } 2356 2357 if (err) { 2358 bt_dev_err(hdev, "Firmware loading timeout"); 2359 err = -ETIMEDOUT; 2360 goto done; 2361 } 2362 2363 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { 2364 bt_dev_err(hdev, "Firmware loading failed"); 2365 err = -ENOEXEC; 2366 goto done; 2367 } 2368 2369 rettime = ktime_get(); 2370 delta = ktime_sub(rettime, calltime); 2371 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2372 2373 bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration); 2374 2375 done: 2376 release_firmware(fw); 2377 2378 if (err < 0) 2379 return err; 2380 2381 calltime = ktime_get(); 2382 2383 set_bit(BTUSB_BOOTING, &data->flags); 2384 2385 err = btintel_send_intel_reset(hdev, boot_param); 2386 if (err) 2387 return err; 2388 2389 /* The bootloader will not indicate when the device is ready. This 2390 * is done by the operational firmware sending bootup notification. 2391 * 2392 * Booting into operational firmware should not take longer than 2393 * 1 second. However if that happens, then just fail the setup 2394 * since something went wrong. 2395 */ 2396 bt_dev_info(hdev, "Waiting for device to boot"); 2397 2398 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, 2399 TASK_INTERRUPTIBLE, 2400 msecs_to_jiffies(1000)); 2401 2402 if (err == -EINTR) { 2403 bt_dev_err(hdev, "Device boot interrupted"); 2404 return -EINTR; 2405 } 2406 2407 if (err) { 2408 bt_dev_err(hdev, "Device boot timeout"); 2409 return -ETIMEDOUT; 2410 } 2411 2412 rettime = ktime_get(); 2413 delta = ktime_sub(rettime, calltime); 2414 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2415 2416 bt_dev_info(hdev, "Device booted in %llu usecs", duration); 2417 2418 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2419 2420 /* Once the device is running in operational mode, it needs to apply 2421 * the device configuration (DDC) parameters. 2422 * 2423 * The device can work without DDC parameters, so even if it fails 2424 * to load the file, no need to fail the setup. 2425 */ 2426 btintel_load_ddc_config(hdev, fwname); 2427 2428 /* Set the event mask for Intel specific vendor events. This enables 2429 * a few extra events that are useful during general operation. It 2430 * does not enable any debugging related events. 2431 * 2432 * The device will function correctly without these events enabled 2433 * and thus no need to fail the setup. 2434 */ 2435 btintel_set_event_mask(hdev, false); 2436 2437 return 0; 2438 } 2439 2440 static int btusb_shutdown_intel(struct hci_dev *hdev) 2441 { 2442 struct sk_buff *skb; 2443 long ret; 2444 2445 /* In the shutdown sequence where Bluetooth is turned off followed 2446 * by WiFi being turned off, turning WiFi back on causes issue with 2447 * the RF calibration. 2448 * 2449 * To ensure that any RF activity has been stopped, issue HCI Reset 2450 * command to clear all ongoing activity including advertising, 2451 * scanning etc. 2452 */ 2453 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 2454 if (IS_ERR(skb)) { 2455 ret = PTR_ERR(skb); 2456 bt_dev_err(hdev, "HCI reset during shutdown failed"); 2457 return ret; 2458 } 2459 kfree_skb(skb); 2460 2461 /* Some platforms have an issue with BT LED when the interface is 2462 * down or BT radio is turned off, which takes 5 seconds to BT LED 2463 * goes off. This command turns off the BT LED immediately. 2464 */ 2465 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); 2466 if (IS_ERR(skb)) { 2467 ret = PTR_ERR(skb); 2468 bt_dev_err(hdev, "turning off Intel device LED failed"); 2469 return ret; 2470 } 2471 kfree_skb(skb); 2472 2473 return 0; 2474 } 2475 2476 static int btusb_shutdown_intel_new(struct hci_dev *hdev) 2477 { 2478 struct sk_buff *skb; 2479 2480 /* Send HCI Reset to the controller to stop any BT activity which 2481 * were triggered. This will help to save power and maintain the 2482 * sync b/w Host and controller 2483 */ 2484 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 2485 if (IS_ERR(skb)) { 2486 bt_dev_err(hdev, "HCI reset during shutdown failed"); 2487 return PTR_ERR(skb); 2488 } 2489 kfree_skb(skb); 2490 2491 return 0; 2492 } 2493 2494 #ifdef CONFIG_BT_HCIBTUSB_MTK 2495 2496 #define FIRMWARE_MT7663 "mediatek/mt7663pr2h.bin" 2497 #define FIRMWARE_MT7668 "mediatek/mt7668pr2h.bin" 2498 2499 #define HCI_WMT_MAX_EVENT_SIZE 64 2500 2501 enum { 2502 BTMTK_WMT_PATCH_DWNLD = 0x1, 2503 BTMTK_WMT_FUNC_CTRL = 0x6, 2504 BTMTK_WMT_RST = 0x7, 2505 BTMTK_WMT_SEMAPHORE = 0x17, 2506 }; 2507 2508 enum { 2509 BTMTK_WMT_INVALID, 2510 BTMTK_WMT_PATCH_UNDONE, 2511 BTMTK_WMT_PATCH_DONE, 2512 BTMTK_WMT_ON_UNDONE, 2513 BTMTK_WMT_ON_DONE, 2514 BTMTK_WMT_ON_PROGRESS, 2515 }; 2516 2517 struct btmtk_wmt_hdr { 2518 u8 dir; 2519 u8 op; 2520 __le16 dlen; 2521 u8 flag; 2522 } __packed; 2523 2524 struct btmtk_hci_wmt_cmd { 2525 struct btmtk_wmt_hdr hdr; 2526 u8 data[256]; 2527 } __packed; 2528 2529 struct btmtk_hci_wmt_evt { 2530 struct hci_event_hdr hhdr; 2531 struct btmtk_wmt_hdr whdr; 2532 } __packed; 2533 2534 struct btmtk_hci_wmt_evt_funcc { 2535 struct btmtk_hci_wmt_evt hwhdr; 2536 __be16 status; 2537 } __packed; 2538 2539 struct btmtk_tci_sleep { 2540 u8 mode; 2541 __le16 duration; 2542 __le16 host_duration; 2543 u8 host_wakeup_pin; 2544 u8 time_compensation; 2545 } __packed; 2546 2547 struct btmtk_hci_wmt_params { 2548 u8 op; 2549 u8 flag; 2550 u16 dlen; 2551 const void *data; 2552 u32 *status; 2553 }; 2554 2555 static void btusb_mtk_wmt_recv(struct urb *urb) 2556 { 2557 struct hci_dev *hdev = urb->context; 2558 struct btusb_data *data = hci_get_drvdata(hdev); 2559 struct hci_event_hdr *hdr; 2560 struct sk_buff *skb; 2561 int err; 2562 2563 if (urb->status == 0 && urb->actual_length > 0) { 2564 hdev->stat.byte_rx += urb->actual_length; 2565 2566 /* WMT event shouldn't be fragmented and the size should be 2567 * less than HCI_WMT_MAX_EVENT_SIZE. 2568 */ 2569 skb = bt_skb_alloc(HCI_WMT_MAX_EVENT_SIZE, GFP_ATOMIC); 2570 if (!skb) { 2571 hdev->stat.err_rx++; 2572 goto err_out; 2573 } 2574 2575 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 2576 skb_put_data(skb, urb->transfer_buffer, urb->actual_length); 2577 2578 hdr = (void *)skb->data; 2579 /* Fix up the vendor event id with 0xff for vendor specific 2580 * instead of 0xe4 so that event send via monitoring socket can 2581 * be parsed properly. 2582 */ 2583 hdr->evt = 0xff; 2584 2585 /* When someone waits for the WMT event, the skb is being cloned 2586 * and being processed the events from there then. 2587 */ 2588 if (test_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags)) { 2589 data->evt_skb = skb_clone(skb, GFP_KERNEL); 2590 if (!data->evt_skb) 2591 goto err_out; 2592 } 2593 2594 err = hci_recv_frame(hdev, skb); 2595 if (err < 0) 2596 goto err_free_skb; 2597 2598 if (test_and_clear_bit(BTUSB_TX_WAIT_VND_EVT, 2599 &data->flags)) { 2600 /* Barrier to sync with other CPUs */ 2601 smp_mb__after_atomic(); 2602 wake_up_bit(&data->flags, 2603 BTUSB_TX_WAIT_VND_EVT); 2604 } 2605 err_out: 2606 return; 2607 err_free_skb: 2608 kfree_skb(data->evt_skb); 2609 data->evt_skb = NULL; 2610 return; 2611 } else if (urb->status == -ENOENT) { 2612 /* Avoid suspend failed when usb_kill_urb */ 2613 return; 2614 } 2615 2616 usb_mark_last_busy(data->udev); 2617 2618 /* The URB complete handler is still called with urb->actual_length = 0 2619 * when the event is not available, so we should keep re-submitting 2620 * URB until WMT event returns, Also, It's necessary to wait some time 2621 * between the two consecutive control URBs to relax the target device 2622 * to generate the event. Otherwise, the WMT event cannot return from 2623 * the device successfully. 2624 */ 2625 udelay(100); 2626 2627 usb_anchor_urb(urb, &data->ctrl_anchor); 2628 err = usb_submit_urb(urb, GFP_ATOMIC); 2629 if (err < 0) { 2630 /* -EPERM: urb is being killed; 2631 * -ENODEV: device got disconnected 2632 */ 2633 if (err != -EPERM && err != -ENODEV) 2634 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 2635 urb, -err); 2636 usb_unanchor_urb(urb); 2637 } 2638 } 2639 2640 static int btusb_mtk_submit_wmt_recv_urb(struct hci_dev *hdev) 2641 { 2642 struct btusb_data *data = hci_get_drvdata(hdev); 2643 struct usb_ctrlrequest *dr; 2644 unsigned char *buf; 2645 int err, size = 64; 2646 unsigned int pipe; 2647 struct urb *urb; 2648 2649 urb = usb_alloc_urb(0, GFP_KERNEL); 2650 if (!urb) 2651 return -ENOMEM; 2652 2653 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 2654 if (!dr) { 2655 usb_free_urb(urb); 2656 return -ENOMEM; 2657 } 2658 2659 dr->bRequestType = USB_TYPE_VENDOR | USB_DIR_IN; 2660 dr->bRequest = 1; 2661 dr->wIndex = cpu_to_le16(0); 2662 dr->wValue = cpu_to_le16(48); 2663 dr->wLength = cpu_to_le16(size); 2664 2665 buf = kmalloc(size, GFP_KERNEL); 2666 if (!buf) { 2667 kfree(dr); 2668 return -ENOMEM; 2669 } 2670 2671 pipe = usb_rcvctrlpipe(data->udev, 0); 2672 2673 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 2674 buf, size, btusb_mtk_wmt_recv, hdev); 2675 2676 urb->transfer_flags |= URB_FREE_BUFFER; 2677 2678 usb_anchor_urb(urb, &data->ctrl_anchor); 2679 err = usb_submit_urb(urb, GFP_KERNEL); 2680 if (err < 0) { 2681 if (err != -EPERM && err != -ENODEV) 2682 bt_dev_err(hdev, "urb %p submission failed (%d)", 2683 urb, -err); 2684 usb_unanchor_urb(urb); 2685 } 2686 2687 usb_free_urb(urb); 2688 2689 return err; 2690 } 2691 2692 static int btusb_mtk_hci_wmt_sync(struct hci_dev *hdev, 2693 struct btmtk_hci_wmt_params *wmt_params) 2694 { 2695 struct btusb_data *data = hci_get_drvdata(hdev); 2696 struct btmtk_hci_wmt_evt_funcc *wmt_evt_funcc; 2697 u32 hlen, status = BTMTK_WMT_INVALID; 2698 struct btmtk_hci_wmt_evt *wmt_evt; 2699 struct btmtk_hci_wmt_cmd wc; 2700 struct btmtk_wmt_hdr *hdr; 2701 int err; 2702 2703 /* Submit control IN URB on demand to process the WMT event */ 2704 err = btusb_mtk_submit_wmt_recv_urb(hdev); 2705 if (err < 0) 2706 return err; 2707 2708 /* Send the WMT command and wait until the WMT event returns */ 2709 hlen = sizeof(*hdr) + wmt_params->dlen; 2710 if (hlen > 255) 2711 return -EINVAL; 2712 2713 hdr = (struct btmtk_wmt_hdr *)&wc; 2714 hdr->dir = 1; 2715 hdr->op = wmt_params->op; 2716 hdr->dlen = cpu_to_le16(wmt_params->dlen + 1); 2717 hdr->flag = wmt_params->flag; 2718 memcpy(wc.data, wmt_params->data, wmt_params->dlen); 2719 2720 set_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 2721 2722 err = __hci_cmd_send(hdev, 0xfc6f, hlen, &wc); 2723 2724 if (err < 0) { 2725 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 2726 return err; 2727 } 2728 2729 /* The vendor specific WMT commands are all answered by a vendor 2730 * specific event and will have the Command Status or Command 2731 * Complete as with usual HCI command flow control. 2732 * 2733 * After sending the command, wait for BTUSB_TX_WAIT_VND_EVT 2734 * state to be cleared. The driver specific event receive routine 2735 * will clear that state and with that indicate completion of the 2736 * WMT command. 2737 */ 2738 err = wait_on_bit_timeout(&data->flags, BTUSB_TX_WAIT_VND_EVT, 2739 TASK_INTERRUPTIBLE, HCI_INIT_TIMEOUT); 2740 if (err == -EINTR) { 2741 bt_dev_err(hdev, "Execution of wmt command interrupted"); 2742 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 2743 return err; 2744 } 2745 2746 if (err) { 2747 bt_dev_err(hdev, "Execution of wmt command timed out"); 2748 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 2749 return -ETIMEDOUT; 2750 } 2751 2752 /* Parse and handle the return WMT event */ 2753 wmt_evt = (struct btmtk_hci_wmt_evt *)data->evt_skb->data; 2754 if (wmt_evt->whdr.op != hdr->op) { 2755 bt_dev_err(hdev, "Wrong op received %d expected %d", 2756 wmt_evt->whdr.op, hdr->op); 2757 err = -EIO; 2758 goto err_free_skb; 2759 } 2760 2761 switch (wmt_evt->whdr.op) { 2762 case BTMTK_WMT_SEMAPHORE: 2763 if (wmt_evt->whdr.flag == 2) 2764 status = BTMTK_WMT_PATCH_UNDONE; 2765 else 2766 status = BTMTK_WMT_PATCH_DONE; 2767 break; 2768 case BTMTK_WMT_FUNC_CTRL: 2769 wmt_evt_funcc = (struct btmtk_hci_wmt_evt_funcc *)wmt_evt; 2770 if (be16_to_cpu(wmt_evt_funcc->status) == 0x404) 2771 status = BTMTK_WMT_ON_DONE; 2772 else if (be16_to_cpu(wmt_evt_funcc->status) == 0x420) 2773 status = BTMTK_WMT_ON_PROGRESS; 2774 else 2775 status = BTMTK_WMT_ON_UNDONE; 2776 break; 2777 } 2778 2779 if (wmt_params->status) 2780 *wmt_params->status = status; 2781 2782 err_free_skb: 2783 kfree_skb(data->evt_skb); 2784 data->evt_skb = NULL; 2785 2786 return err; 2787 } 2788 2789 static int btusb_mtk_setup_firmware(struct hci_dev *hdev, const char *fwname) 2790 { 2791 struct btmtk_hci_wmt_params wmt_params; 2792 const struct firmware *fw; 2793 const u8 *fw_ptr; 2794 size_t fw_size; 2795 int err, dlen; 2796 u8 flag; 2797 2798 err = request_firmware(&fw, fwname, &hdev->dev); 2799 if (err < 0) { 2800 bt_dev_err(hdev, "Failed to load firmware file (%d)", err); 2801 return err; 2802 } 2803 2804 fw_ptr = fw->data; 2805 fw_size = fw->size; 2806 2807 /* The size of patch header is 30 bytes, should be skip */ 2808 if (fw_size < 30) { 2809 err = -EINVAL; 2810 goto err_release_fw; 2811 } 2812 2813 fw_size -= 30; 2814 fw_ptr += 30; 2815 flag = 1; 2816 2817 wmt_params.op = BTMTK_WMT_PATCH_DWNLD; 2818 wmt_params.status = NULL; 2819 2820 while (fw_size > 0) { 2821 dlen = min_t(int, 250, fw_size); 2822 2823 /* Tell deivice the position in sequence */ 2824 if (fw_size - dlen <= 0) 2825 flag = 3; 2826 else if (fw_size < fw->size - 30) 2827 flag = 2; 2828 2829 wmt_params.flag = flag; 2830 wmt_params.dlen = dlen; 2831 wmt_params.data = fw_ptr; 2832 2833 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 2834 if (err < 0) { 2835 bt_dev_err(hdev, "Failed to send wmt patch dwnld (%d)", 2836 err); 2837 goto err_release_fw; 2838 } 2839 2840 fw_size -= dlen; 2841 fw_ptr += dlen; 2842 } 2843 2844 wmt_params.op = BTMTK_WMT_RST; 2845 wmt_params.flag = 4; 2846 wmt_params.dlen = 0; 2847 wmt_params.data = NULL; 2848 wmt_params.status = NULL; 2849 2850 /* Activate funciton the firmware providing to */ 2851 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 2852 if (err < 0) { 2853 bt_dev_err(hdev, "Failed to send wmt rst (%d)", err); 2854 return err; 2855 } 2856 2857 /* Wait a few moments for firmware activation done */ 2858 usleep_range(10000, 12000); 2859 2860 err_release_fw: 2861 release_firmware(fw); 2862 2863 return err; 2864 } 2865 2866 static int btusb_mtk_func_query(struct hci_dev *hdev) 2867 { 2868 struct btmtk_hci_wmt_params wmt_params; 2869 int status, err; 2870 u8 param = 0; 2871 2872 /* Query whether the function is enabled */ 2873 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 2874 wmt_params.flag = 4; 2875 wmt_params.dlen = sizeof(param); 2876 wmt_params.data = ¶m; 2877 wmt_params.status = &status; 2878 2879 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 2880 if (err < 0) { 2881 bt_dev_err(hdev, "Failed to query function status (%d)", err); 2882 return err; 2883 } 2884 2885 return status; 2886 } 2887 2888 static int btusb_mtk_reg_read(struct btusb_data *data, u32 reg, u32 *val) 2889 { 2890 int pipe, err, size = sizeof(u32); 2891 void *buf; 2892 2893 buf = kzalloc(size, GFP_KERNEL); 2894 if (!buf) 2895 return -ENOMEM; 2896 2897 pipe = usb_rcvctrlpipe(data->udev, 0); 2898 err = usb_control_msg(data->udev, pipe, 0x63, 2899 USB_TYPE_VENDOR | USB_DIR_IN, 2900 reg >> 16, reg & 0xffff, 2901 buf, size, USB_CTRL_SET_TIMEOUT); 2902 if (err < 0) 2903 goto err_free_buf; 2904 2905 *val = get_unaligned_le32(buf); 2906 2907 err_free_buf: 2908 kfree(buf); 2909 2910 return err; 2911 } 2912 2913 static int btusb_mtk_id_get(struct btusb_data *data, u32 *id) 2914 { 2915 return btusb_mtk_reg_read(data, 0x80000008, id); 2916 } 2917 2918 static int btusb_mtk_setup(struct hci_dev *hdev) 2919 { 2920 struct btusb_data *data = hci_get_drvdata(hdev); 2921 struct btmtk_hci_wmt_params wmt_params; 2922 ktime_t calltime, delta, rettime; 2923 struct btmtk_tci_sleep tci_sleep; 2924 unsigned long long duration; 2925 struct sk_buff *skb; 2926 const char *fwname; 2927 int err, status; 2928 u32 dev_id; 2929 u8 param; 2930 2931 calltime = ktime_get(); 2932 2933 err = btusb_mtk_id_get(data, &dev_id); 2934 if (err < 0) { 2935 bt_dev_err(hdev, "Failed to get device id (%d)", err); 2936 return err; 2937 } 2938 2939 switch (dev_id) { 2940 case 0x7663: 2941 fwname = FIRMWARE_MT7663; 2942 break; 2943 case 0x7668: 2944 fwname = FIRMWARE_MT7668; 2945 break; 2946 default: 2947 bt_dev_err(hdev, "Unsupported support hardware variant (%08x)", 2948 dev_id); 2949 return -ENODEV; 2950 } 2951 2952 /* Query whether the firmware is already download */ 2953 wmt_params.op = BTMTK_WMT_SEMAPHORE; 2954 wmt_params.flag = 1; 2955 wmt_params.dlen = 0; 2956 wmt_params.data = NULL; 2957 wmt_params.status = &status; 2958 2959 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 2960 if (err < 0) { 2961 bt_dev_err(hdev, "Failed to query firmware status (%d)", err); 2962 return err; 2963 } 2964 2965 if (status == BTMTK_WMT_PATCH_DONE) { 2966 bt_dev_info(hdev, "firmware already downloaded"); 2967 goto ignore_setup_fw; 2968 } 2969 2970 /* Setup a firmware which the device definitely requires */ 2971 err = btusb_mtk_setup_firmware(hdev, fwname); 2972 if (err < 0) 2973 return err; 2974 2975 ignore_setup_fw: 2976 err = readx_poll_timeout(btusb_mtk_func_query, hdev, status, 2977 status < 0 || status != BTMTK_WMT_ON_PROGRESS, 2978 2000, 5000000); 2979 /* -ETIMEDOUT happens */ 2980 if (err < 0) 2981 return err; 2982 2983 /* The other errors happen in btusb_mtk_func_query */ 2984 if (status < 0) 2985 return status; 2986 2987 if (status == BTMTK_WMT_ON_DONE) { 2988 bt_dev_info(hdev, "function already on"); 2989 goto ignore_func_on; 2990 } 2991 2992 /* Enable Bluetooth protocol */ 2993 param = 1; 2994 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 2995 wmt_params.flag = 0; 2996 wmt_params.dlen = sizeof(param); 2997 wmt_params.data = ¶m; 2998 wmt_params.status = NULL; 2999 3000 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3001 if (err < 0) { 3002 bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err); 3003 return err; 3004 } 3005 3006 ignore_func_on: 3007 /* Apply the low power environment setup */ 3008 tci_sleep.mode = 0x5; 3009 tci_sleep.duration = cpu_to_le16(0x640); 3010 tci_sleep.host_duration = cpu_to_le16(0x640); 3011 tci_sleep.host_wakeup_pin = 0; 3012 tci_sleep.time_compensation = 0; 3013 3014 skb = __hci_cmd_sync(hdev, 0xfc7a, sizeof(tci_sleep), &tci_sleep, 3015 HCI_INIT_TIMEOUT); 3016 if (IS_ERR(skb)) { 3017 err = PTR_ERR(skb); 3018 bt_dev_err(hdev, "Failed to apply low power setting (%d)", err); 3019 return err; 3020 } 3021 kfree_skb(skb); 3022 3023 rettime = ktime_get(); 3024 delta = ktime_sub(rettime, calltime); 3025 duration = (unsigned long long)ktime_to_ns(delta) >> 10; 3026 3027 bt_dev_info(hdev, "Device setup in %llu usecs", duration); 3028 3029 return 0; 3030 } 3031 3032 static int btusb_mtk_shutdown(struct hci_dev *hdev) 3033 { 3034 struct btmtk_hci_wmt_params wmt_params; 3035 u8 param = 0; 3036 int err; 3037 3038 /* Disable the device */ 3039 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3040 wmt_params.flag = 0; 3041 wmt_params.dlen = sizeof(param); 3042 wmt_params.data = ¶m; 3043 wmt_params.status = NULL; 3044 3045 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3046 if (err < 0) { 3047 bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err); 3048 return err; 3049 } 3050 3051 return 0; 3052 } 3053 3054 MODULE_FIRMWARE(FIRMWARE_MT7663); 3055 MODULE_FIRMWARE(FIRMWARE_MT7668); 3056 #endif 3057 3058 #ifdef CONFIG_PM 3059 /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */ 3060 static int marvell_config_oob_wake(struct hci_dev *hdev) 3061 { 3062 struct sk_buff *skb; 3063 struct btusb_data *data = hci_get_drvdata(hdev); 3064 struct device *dev = &data->udev->dev; 3065 u16 pin, gap, opcode; 3066 int ret; 3067 u8 cmd[5]; 3068 3069 /* Move on if no wakeup pin specified */ 3070 if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) || 3071 of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap)) 3072 return 0; 3073 3074 /* Vendor specific command to configure a GPIO as wake-up pin */ 3075 opcode = hci_opcode_pack(0x3F, 0x59); 3076 cmd[0] = opcode & 0xFF; 3077 cmd[1] = opcode >> 8; 3078 cmd[2] = 2; /* length of parameters that follow */ 3079 cmd[3] = pin; 3080 cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */ 3081 3082 skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL); 3083 if (!skb) { 3084 bt_dev_err(hdev, "%s: No memory\n", __func__); 3085 return -ENOMEM; 3086 } 3087 3088 skb_put_data(skb, cmd, sizeof(cmd)); 3089 hci_skb_pkt_type(skb) = HCI_COMMAND_PKT; 3090 3091 ret = btusb_send_frame(hdev, skb); 3092 if (ret) { 3093 bt_dev_err(hdev, "%s: configuration failed\n", __func__); 3094 kfree_skb(skb); 3095 return ret; 3096 } 3097 3098 return 0; 3099 } 3100 #endif 3101 3102 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, 3103 const bdaddr_t *bdaddr) 3104 { 3105 struct sk_buff *skb; 3106 u8 buf[8]; 3107 long ret; 3108 3109 buf[0] = 0xfe; 3110 buf[1] = sizeof(bdaddr_t); 3111 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); 3112 3113 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); 3114 if (IS_ERR(skb)) { 3115 ret = PTR_ERR(skb); 3116 bt_dev_err(hdev, "changing Marvell device address failed (%ld)", 3117 ret); 3118 return ret; 3119 } 3120 kfree_skb(skb); 3121 3122 return 0; 3123 } 3124 3125 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, 3126 const bdaddr_t *bdaddr) 3127 { 3128 struct sk_buff *skb; 3129 u8 buf[10]; 3130 long ret; 3131 3132 buf[0] = 0x01; 3133 buf[1] = 0x01; 3134 buf[2] = 0x00; 3135 buf[3] = sizeof(bdaddr_t); 3136 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); 3137 3138 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); 3139 if (IS_ERR(skb)) { 3140 ret = PTR_ERR(skb); 3141 bt_dev_err(hdev, "Change address command failed (%ld)", ret); 3142 return ret; 3143 } 3144 kfree_skb(skb); 3145 3146 return 0; 3147 } 3148 3149 #define QCA_DFU_PACKET_LEN 4096 3150 3151 #define QCA_GET_TARGET_VERSION 0x09 3152 #define QCA_CHECK_STATUS 0x05 3153 #define QCA_DFU_DOWNLOAD 0x01 3154 3155 #define QCA_SYSCFG_UPDATED 0x40 3156 #define QCA_PATCH_UPDATED 0x80 3157 #define QCA_DFU_TIMEOUT 3000 3158 3159 struct qca_version { 3160 __le32 rom_version; 3161 __le32 patch_version; 3162 __le32 ram_version; 3163 __le32 ref_clock; 3164 __u8 reserved[4]; 3165 } __packed; 3166 3167 struct qca_rampatch_version { 3168 __le16 rom_version; 3169 __le16 patch_version; 3170 } __packed; 3171 3172 struct qca_device_info { 3173 u32 rom_version; 3174 u8 rampatch_hdr; /* length of header in rampatch */ 3175 u8 nvm_hdr; /* length of header in NVM */ 3176 u8 ver_offset; /* offset of version structure in rampatch */ 3177 }; 3178 3179 static const struct qca_device_info qca_devices_table[] = { 3180 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */ 3181 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */ 3182 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */ 3183 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */ 3184 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */ 3185 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */ 3186 }; 3187 3188 static int btusb_qca_send_vendor_req(struct usb_device *udev, u8 request, 3189 void *data, u16 size) 3190 { 3191 int pipe, err; 3192 u8 *buf; 3193 3194 buf = kmalloc(size, GFP_KERNEL); 3195 if (!buf) 3196 return -ENOMEM; 3197 3198 /* Found some of USB hosts have IOT issues with ours so that we should 3199 * not wait until HCI layer is ready. 3200 */ 3201 pipe = usb_rcvctrlpipe(udev, 0); 3202 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, 3203 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 3204 if (err < 0) { 3205 dev_err(&udev->dev, "Failed to access otp area (%d)", err); 3206 goto done; 3207 } 3208 3209 memcpy(data, buf, size); 3210 3211 done: 3212 kfree(buf); 3213 3214 return err; 3215 } 3216 3217 static int btusb_setup_qca_download_fw(struct hci_dev *hdev, 3218 const struct firmware *firmware, 3219 size_t hdr_size) 3220 { 3221 struct btusb_data *btdata = hci_get_drvdata(hdev); 3222 struct usb_device *udev = btdata->udev; 3223 size_t count, size, sent = 0; 3224 int pipe, len, err; 3225 u8 *buf; 3226 3227 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); 3228 if (!buf) 3229 return -ENOMEM; 3230 3231 count = firmware->size; 3232 3233 size = min_t(size_t, count, hdr_size); 3234 memcpy(buf, firmware->data, size); 3235 3236 /* USB patches should go down to controller through USB path 3237 * because binary format fits to go down through USB channel. 3238 * USB control path is for patching headers and USB bulk is for 3239 * patch body. 3240 */ 3241 pipe = usb_sndctrlpipe(udev, 0); 3242 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, 3243 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 3244 if (err < 0) { 3245 bt_dev_err(hdev, "Failed to send headers (%d)", err); 3246 goto done; 3247 } 3248 3249 sent += size; 3250 count -= size; 3251 3252 while (count) { 3253 size = min_t(size_t, count, QCA_DFU_PACKET_LEN); 3254 3255 memcpy(buf, firmware->data + sent, size); 3256 3257 pipe = usb_sndbulkpipe(udev, 0x02); 3258 err = usb_bulk_msg(udev, pipe, buf, size, &len, 3259 QCA_DFU_TIMEOUT); 3260 if (err < 0) { 3261 bt_dev_err(hdev, "Failed to send body at %zd of %zd (%d)", 3262 sent, firmware->size, err); 3263 break; 3264 } 3265 3266 if (size != len) { 3267 bt_dev_err(hdev, "Failed to get bulk buffer"); 3268 err = -EILSEQ; 3269 break; 3270 } 3271 3272 sent += size; 3273 count -= size; 3274 } 3275 3276 done: 3277 kfree(buf); 3278 return err; 3279 } 3280 3281 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, 3282 struct qca_version *ver, 3283 const struct qca_device_info *info) 3284 { 3285 struct qca_rampatch_version *rver; 3286 const struct firmware *fw; 3287 u32 ver_rom, ver_patch; 3288 u16 rver_rom, rver_patch; 3289 char fwname[64]; 3290 int err; 3291 3292 ver_rom = le32_to_cpu(ver->rom_version); 3293 ver_patch = le32_to_cpu(ver->patch_version); 3294 3295 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); 3296 3297 err = request_firmware(&fw, fwname, &hdev->dev); 3298 if (err) { 3299 bt_dev_err(hdev, "failed to request rampatch file: %s (%d)", 3300 fwname, err); 3301 return err; 3302 } 3303 3304 bt_dev_info(hdev, "using rampatch file: %s", fwname); 3305 3306 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); 3307 rver_rom = le16_to_cpu(rver->rom_version); 3308 rver_patch = le16_to_cpu(rver->patch_version); 3309 3310 bt_dev_info(hdev, "QCA: patch rome 0x%x build 0x%x, " 3311 "firmware rome 0x%x build 0x%x", 3312 rver_rom, rver_patch, ver_rom, ver_patch); 3313 3314 if (rver_rom != ver_rom || rver_patch <= ver_patch) { 3315 bt_dev_err(hdev, "rampatch file version did not match with firmware"); 3316 err = -EINVAL; 3317 goto done; 3318 } 3319 3320 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); 3321 3322 done: 3323 release_firmware(fw); 3324 3325 return err; 3326 } 3327 3328 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, 3329 struct qca_version *ver, 3330 const struct qca_device_info *info) 3331 { 3332 const struct firmware *fw; 3333 char fwname[64]; 3334 int err; 3335 3336 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", 3337 le32_to_cpu(ver->rom_version)); 3338 3339 err = request_firmware(&fw, fwname, &hdev->dev); 3340 if (err) { 3341 bt_dev_err(hdev, "failed to request NVM file: %s (%d)", 3342 fwname, err); 3343 return err; 3344 } 3345 3346 bt_dev_info(hdev, "using NVM file: %s", fwname); 3347 3348 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); 3349 3350 release_firmware(fw); 3351 3352 return err; 3353 } 3354 3355 /* identify the ROM version and check whether patches are needed */ 3356 static bool btusb_qca_need_patch(struct usb_device *udev) 3357 { 3358 struct qca_version ver; 3359 3360 if (btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver, 3361 sizeof(ver)) < 0) 3362 return false; 3363 /* only low ROM versions need patches */ 3364 return !(le32_to_cpu(ver.rom_version) & ~0xffffU); 3365 } 3366 3367 static int btusb_setup_qca(struct hci_dev *hdev) 3368 { 3369 struct btusb_data *btdata = hci_get_drvdata(hdev); 3370 struct usb_device *udev = btdata->udev; 3371 const struct qca_device_info *info = NULL; 3372 struct qca_version ver; 3373 u32 ver_rom; 3374 u8 status; 3375 int i, err; 3376 3377 err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver, 3378 sizeof(ver)); 3379 if (err < 0) 3380 return err; 3381 3382 ver_rom = le32_to_cpu(ver.rom_version); 3383 /* Don't care about high ROM versions */ 3384 if (ver_rom & ~0xffffU) 3385 return 0; 3386 3387 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { 3388 if (ver_rom == qca_devices_table[i].rom_version) 3389 info = &qca_devices_table[i]; 3390 } 3391 if (!info) { 3392 bt_dev_err(hdev, "don't support firmware rome 0x%x", ver_rom); 3393 return -ENODEV; 3394 } 3395 3396 err = btusb_qca_send_vendor_req(udev, QCA_CHECK_STATUS, &status, 3397 sizeof(status)); 3398 if (err < 0) 3399 return err; 3400 3401 if (!(status & QCA_PATCH_UPDATED)) { 3402 err = btusb_setup_qca_load_rampatch(hdev, &ver, info); 3403 if (err < 0) 3404 return err; 3405 } 3406 3407 if (!(status & QCA_SYSCFG_UPDATED)) { 3408 err = btusb_setup_qca_load_nvm(hdev, &ver, info); 3409 if (err < 0) 3410 return err; 3411 } 3412 3413 return 0; 3414 } 3415 3416 #ifdef CONFIG_BT_HCIBTUSB_BCM 3417 static inline int __set_diag_interface(struct hci_dev *hdev) 3418 { 3419 struct btusb_data *data = hci_get_drvdata(hdev); 3420 struct usb_interface *intf = data->diag; 3421 int i; 3422 3423 if (!data->diag) 3424 return -ENODEV; 3425 3426 data->diag_tx_ep = NULL; 3427 data->diag_rx_ep = NULL; 3428 3429 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 3430 struct usb_endpoint_descriptor *ep_desc; 3431 3432 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 3433 3434 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 3435 data->diag_tx_ep = ep_desc; 3436 continue; 3437 } 3438 3439 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 3440 data->diag_rx_ep = ep_desc; 3441 continue; 3442 } 3443 } 3444 3445 if (!data->diag_tx_ep || !data->diag_rx_ep) { 3446 bt_dev_err(hdev, "invalid diagnostic descriptors"); 3447 return -ENODEV; 3448 } 3449 3450 return 0; 3451 } 3452 3453 static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) 3454 { 3455 struct btusb_data *data = hci_get_drvdata(hdev); 3456 struct sk_buff *skb; 3457 struct urb *urb; 3458 unsigned int pipe; 3459 3460 if (!data->diag_tx_ep) 3461 return ERR_PTR(-ENODEV); 3462 3463 urb = usb_alloc_urb(0, GFP_KERNEL); 3464 if (!urb) 3465 return ERR_PTR(-ENOMEM); 3466 3467 skb = bt_skb_alloc(2, GFP_KERNEL); 3468 if (!skb) { 3469 usb_free_urb(urb); 3470 return ERR_PTR(-ENOMEM); 3471 } 3472 3473 skb_put_u8(skb, 0xf0); 3474 skb_put_u8(skb, enable); 3475 3476 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); 3477 3478 usb_fill_bulk_urb(urb, data->udev, pipe, 3479 skb->data, skb->len, btusb_tx_complete, skb); 3480 3481 skb->dev = (void *)hdev; 3482 3483 return urb; 3484 } 3485 3486 static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) 3487 { 3488 struct btusb_data *data = hci_get_drvdata(hdev); 3489 struct urb *urb; 3490 3491 if (!data->diag) 3492 return -ENODEV; 3493 3494 if (!test_bit(HCI_RUNNING, &hdev->flags)) 3495 return -ENETDOWN; 3496 3497 urb = alloc_diag_urb(hdev, enable); 3498 if (IS_ERR(urb)) 3499 return PTR_ERR(urb); 3500 3501 return submit_or_queue_tx_urb(hdev, urb); 3502 } 3503 #endif 3504 3505 #ifdef CONFIG_PM 3506 static irqreturn_t btusb_oob_wake_handler(int irq, void *priv) 3507 { 3508 struct btusb_data *data = priv; 3509 3510 pm_wakeup_event(&data->udev->dev, 0); 3511 pm_system_wakeup(); 3512 3513 /* Disable only if not already disabled (keep it balanced) */ 3514 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 3515 disable_irq_nosync(irq); 3516 disable_irq_wake(irq); 3517 } 3518 return IRQ_HANDLED; 3519 } 3520 3521 static const struct of_device_id btusb_match_table[] = { 3522 { .compatible = "usb1286,204e" }, 3523 { .compatible = "usbcf3,e300" }, /* QCA6174A */ 3524 { .compatible = "usb4ca,301a" }, /* QCA6174A (Lite-On) */ 3525 { } 3526 }; 3527 MODULE_DEVICE_TABLE(of, btusb_match_table); 3528 3529 /* Use an oob wakeup pin? */ 3530 static int btusb_config_oob_wake(struct hci_dev *hdev) 3531 { 3532 struct btusb_data *data = hci_get_drvdata(hdev); 3533 struct device *dev = &data->udev->dev; 3534 int irq, ret; 3535 3536 clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 3537 3538 if (!of_match_device(btusb_match_table, dev)) 3539 return 0; 3540 3541 /* Move on if no IRQ specified */ 3542 irq = of_irq_get_byname(dev->of_node, "wakeup"); 3543 if (irq <= 0) { 3544 bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__); 3545 return 0; 3546 } 3547 3548 irq_set_status_flags(irq, IRQ_NOAUTOEN); 3549 ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler, 3550 0, "OOB Wake-on-BT", data); 3551 if (ret) { 3552 bt_dev_err(hdev, "%s: IRQ request failed", __func__); 3553 return ret; 3554 } 3555 3556 ret = device_init_wakeup(dev, true); 3557 if (ret) { 3558 bt_dev_err(hdev, "%s: failed to init_wakeup", __func__); 3559 return ret; 3560 } 3561 3562 data->oob_wake_irq = irq; 3563 bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq); 3564 return 0; 3565 } 3566 #endif 3567 3568 static void btusb_check_needs_reset_resume(struct usb_interface *intf) 3569 { 3570 if (dmi_check_system(btusb_needs_reset_resume_table)) 3571 interface_to_usbdev(intf)->quirks |= USB_QUIRK_RESET_RESUME; 3572 } 3573 3574 static int btusb_probe(struct usb_interface *intf, 3575 const struct usb_device_id *id) 3576 { 3577 struct usb_endpoint_descriptor *ep_desc; 3578 struct gpio_desc *reset_gpio; 3579 struct btusb_data *data; 3580 struct hci_dev *hdev; 3581 unsigned ifnum_base; 3582 int i, err; 3583 3584 BT_DBG("intf %p id %p", intf, id); 3585 3586 /* interface numbers are hardcoded in the spec */ 3587 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { 3588 if (!(id->driver_info & BTUSB_IFNUM_2)) 3589 return -ENODEV; 3590 if (intf->cur_altsetting->desc.bInterfaceNumber != 2) 3591 return -ENODEV; 3592 } 3593 3594 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; 3595 3596 if (!id->driver_info) { 3597 const struct usb_device_id *match; 3598 3599 match = usb_match_id(intf, blacklist_table); 3600 if (match) 3601 id = match; 3602 } 3603 3604 if (id->driver_info == BTUSB_IGNORE) 3605 return -ENODEV; 3606 3607 if (id->driver_info & BTUSB_ATH3012) { 3608 struct usb_device *udev = interface_to_usbdev(intf); 3609 3610 /* Old firmware would otherwise let ath3k driver load 3611 * patch and sysconfig files 3612 */ 3613 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001 && 3614 !btusb_qca_need_patch(udev)) 3615 return -ENODEV; 3616 } 3617 3618 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); 3619 if (!data) 3620 return -ENOMEM; 3621 3622 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 3623 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 3624 3625 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { 3626 data->intr_ep = ep_desc; 3627 continue; 3628 } 3629 3630 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 3631 data->bulk_tx_ep = ep_desc; 3632 continue; 3633 } 3634 3635 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 3636 data->bulk_rx_ep = ep_desc; 3637 continue; 3638 } 3639 } 3640 3641 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) 3642 return -ENODEV; 3643 3644 if (id->driver_info & BTUSB_AMP) { 3645 data->cmdreq_type = USB_TYPE_CLASS | 0x01; 3646 data->cmdreq = 0x2b; 3647 } else { 3648 data->cmdreq_type = USB_TYPE_CLASS; 3649 data->cmdreq = 0x00; 3650 } 3651 3652 data->udev = interface_to_usbdev(intf); 3653 data->intf = intf; 3654 3655 INIT_WORK(&data->work, btusb_work); 3656 INIT_WORK(&data->waker, btusb_waker); 3657 init_usb_anchor(&data->deferred); 3658 init_usb_anchor(&data->tx_anchor); 3659 spin_lock_init(&data->txlock); 3660 3661 init_usb_anchor(&data->intr_anchor); 3662 init_usb_anchor(&data->bulk_anchor); 3663 init_usb_anchor(&data->isoc_anchor); 3664 init_usb_anchor(&data->diag_anchor); 3665 init_usb_anchor(&data->ctrl_anchor); 3666 spin_lock_init(&data->rxlock); 3667 3668 if (id->driver_info & BTUSB_INTEL_NEW) { 3669 data->recv_event = btusb_recv_event_intel; 3670 data->recv_bulk = btusb_recv_bulk_intel; 3671 set_bit(BTUSB_BOOTLOADER, &data->flags); 3672 } else { 3673 data->recv_event = hci_recv_frame; 3674 data->recv_bulk = btusb_recv_bulk; 3675 } 3676 3677 hdev = hci_alloc_dev(); 3678 if (!hdev) 3679 return -ENOMEM; 3680 3681 hdev->bus = HCI_USB; 3682 hci_set_drvdata(hdev, data); 3683 3684 if (id->driver_info & BTUSB_AMP) 3685 hdev->dev_type = HCI_AMP; 3686 else 3687 hdev->dev_type = HCI_PRIMARY; 3688 3689 data->hdev = hdev; 3690 3691 SET_HCIDEV_DEV(hdev, &intf->dev); 3692 3693 reset_gpio = gpiod_get_optional(&data->udev->dev, "reset", 3694 GPIOD_OUT_LOW); 3695 if (IS_ERR(reset_gpio)) { 3696 err = PTR_ERR(reset_gpio); 3697 goto out_free_dev; 3698 } else if (reset_gpio) { 3699 data->reset_gpio = reset_gpio; 3700 } 3701 3702 hdev->open = btusb_open; 3703 hdev->close = btusb_close; 3704 hdev->flush = btusb_flush; 3705 hdev->send = btusb_send_frame; 3706 hdev->notify = btusb_notify; 3707 3708 #ifdef CONFIG_PM 3709 err = btusb_config_oob_wake(hdev); 3710 if (err) 3711 goto out_free_dev; 3712 3713 /* Marvell devices may need a specific chip configuration */ 3714 if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) { 3715 err = marvell_config_oob_wake(hdev); 3716 if (err) 3717 goto out_free_dev; 3718 } 3719 #endif 3720 if (id->driver_info & BTUSB_CW6622) 3721 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 3722 3723 if (id->driver_info & BTUSB_BCM2045) 3724 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 3725 3726 if (id->driver_info & BTUSB_BCM92035) 3727 hdev->setup = btusb_setup_bcm92035; 3728 3729 #ifdef CONFIG_BT_HCIBTUSB_BCM 3730 if (id->driver_info & BTUSB_BCM_PATCHRAM) { 3731 hdev->manufacturer = 15; 3732 hdev->setup = btbcm_setup_patchram; 3733 hdev->set_diag = btusb_bcm_set_diag; 3734 hdev->set_bdaddr = btbcm_set_bdaddr; 3735 3736 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 3737 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 3738 } 3739 3740 if (id->driver_info & BTUSB_BCM_APPLE) { 3741 hdev->manufacturer = 15; 3742 hdev->setup = btbcm_setup_apple; 3743 hdev->set_diag = btusb_bcm_set_diag; 3744 3745 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 3746 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 3747 } 3748 #endif 3749 3750 if (id->driver_info & BTUSB_INTEL) { 3751 hdev->manufacturer = 2; 3752 hdev->setup = btusb_setup_intel; 3753 hdev->shutdown = btusb_shutdown_intel; 3754 hdev->set_diag = btintel_set_diag_mfg; 3755 hdev->set_bdaddr = btintel_set_bdaddr; 3756 hdev->cmd_timeout = btusb_intel_cmd_timeout; 3757 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3758 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3759 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 3760 } 3761 3762 if (id->driver_info & BTUSB_INTEL_NEW) { 3763 hdev->manufacturer = 2; 3764 hdev->send = btusb_send_frame_intel; 3765 hdev->setup = btusb_setup_intel_new; 3766 hdev->shutdown = btusb_shutdown_intel_new; 3767 hdev->hw_error = btintel_hw_error; 3768 hdev->set_diag = btintel_set_diag; 3769 hdev->set_bdaddr = btintel_set_bdaddr; 3770 hdev->cmd_timeout = btusb_intel_cmd_timeout; 3771 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3772 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3773 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 3774 } 3775 3776 if (id->driver_info & BTUSB_MARVELL) 3777 hdev->set_bdaddr = btusb_set_bdaddr_marvell; 3778 3779 #ifdef CONFIG_BT_HCIBTUSB_MTK 3780 if (id->driver_info & BTUSB_MEDIATEK) { 3781 hdev->setup = btusb_mtk_setup; 3782 hdev->shutdown = btusb_mtk_shutdown; 3783 hdev->manufacturer = 70; 3784 set_bit(HCI_QUIRK_NON_PERSISTENT_SETUP, &hdev->quirks); 3785 } 3786 #endif 3787 3788 if (id->driver_info & BTUSB_SWAVE) { 3789 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); 3790 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); 3791 } 3792 3793 if (id->driver_info & BTUSB_INTEL_BOOT) { 3794 hdev->manufacturer = 2; 3795 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 3796 } 3797 3798 if (id->driver_info & BTUSB_ATH3012) { 3799 data->setup_on_usb = btusb_setup_qca; 3800 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 3801 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3802 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 3803 } 3804 3805 if (id->driver_info & BTUSB_QCA_ROME) { 3806 data->setup_on_usb = btusb_setup_qca; 3807 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 3808 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3809 btusb_check_needs_reset_resume(intf); 3810 } 3811 3812 #ifdef CONFIG_BT_HCIBTUSB_RTL 3813 if (id->driver_info & BTUSB_REALTEK) { 3814 hdev->setup = btrtl_setup_realtek; 3815 hdev->shutdown = btrtl_shutdown_realtek; 3816 hdev->cmd_timeout = btusb_rtl_cmd_timeout; 3817 3818 /* Realtek devices lose their updated firmware over global 3819 * suspend that means host doesn't send SET_FEATURE 3820 * (DEVICE_REMOTE_WAKEUP) 3821 */ 3822 set_bit(BTUSB_WAKEUP_DISABLE, &data->flags); 3823 } 3824 #endif 3825 3826 if (id->driver_info & BTUSB_AMP) { 3827 /* AMP controllers do not support SCO packets */ 3828 data->isoc = NULL; 3829 } else { 3830 /* Interface orders are hardcoded in the specification */ 3831 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); 3832 data->isoc_ifnum = ifnum_base + 1; 3833 } 3834 3835 if (!reset) 3836 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3837 3838 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { 3839 if (!disable_scofix) 3840 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); 3841 } 3842 3843 if (id->driver_info & BTUSB_BROKEN_ISOC) 3844 data->isoc = NULL; 3845 3846 if (id->driver_info & BTUSB_DIGIANSWER) { 3847 data->cmdreq_type = USB_TYPE_VENDOR; 3848 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3849 } 3850 3851 if (id->driver_info & BTUSB_CSR) { 3852 struct usb_device *udev = data->udev; 3853 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); 3854 3855 /* Old firmware would otherwise execute USB reset */ 3856 if (bcdDevice < 0x117) 3857 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 3858 3859 /* Fake CSR devices with broken commands */ 3860 if (bcdDevice <= 0x100 || bcdDevice == 0x134) 3861 hdev->setup = btusb_setup_csr; 3862 3863 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 3864 } 3865 3866 if (id->driver_info & BTUSB_SNIFFER) { 3867 struct usb_device *udev = data->udev; 3868 3869 /* New sniffer firmware has crippled HCI interface */ 3870 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) 3871 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 3872 } 3873 3874 if (id->driver_info & BTUSB_INTEL_BOOT) { 3875 /* A bug in the bootloader causes that interrupt interface is 3876 * only enabled after receiving SetInterface(0, AltSetting=0). 3877 */ 3878 err = usb_set_interface(data->udev, 0, 0); 3879 if (err < 0) { 3880 BT_ERR("failed to set interface 0, alt 0 %d", err); 3881 goto out_free_dev; 3882 } 3883 } 3884 3885 if (data->isoc) { 3886 err = usb_driver_claim_interface(&btusb_driver, 3887 data->isoc, data); 3888 if (err < 0) 3889 goto out_free_dev; 3890 } 3891 3892 #ifdef CONFIG_BT_HCIBTUSB_BCM 3893 if (data->diag) { 3894 if (!usb_driver_claim_interface(&btusb_driver, 3895 data->diag, data)) 3896 __set_diag_interface(hdev); 3897 else 3898 data->diag = NULL; 3899 } 3900 #endif 3901 3902 if (enable_autosuspend) 3903 usb_enable_autosuspend(data->udev); 3904 3905 err = hci_register_dev(hdev); 3906 if (err < 0) 3907 goto out_free_dev; 3908 3909 usb_set_intfdata(intf, data); 3910 3911 return 0; 3912 3913 out_free_dev: 3914 if (data->reset_gpio) 3915 gpiod_put(data->reset_gpio); 3916 hci_free_dev(hdev); 3917 return err; 3918 } 3919 3920 static void btusb_disconnect(struct usb_interface *intf) 3921 { 3922 struct btusb_data *data = usb_get_intfdata(intf); 3923 struct hci_dev *hdev; 3924 3925 BT_DBG("intf %p", intf); 3926 3927 if (!data) 3928 return; 3929 3930 hdev = data->hdev; 3931 usb_set_intfdata(data->intf, NULL); 3932 3933 if (data->isoc) 3934 usb_set_intfdata(data->isoc, NULL); 3935 3936 if (data->diag) 3937 usb_set_intfdata(data->diag, NULL); 3938 3939 hci_unregister_dev(hdev); 3940 3941 if (intf == data->intf) { 3942 if (data->isoc) 3943 usb_driver_release_interface(&btusb_driver, data->isoc); 3944 if (data->diag) 3945 usb_driver_release_interface(&btusb_driver, data->diag); 3946 } else if (intf == data->isoc) { 3947 if (data->diag) 3948 usb_driver_release_interface(&btusb_driver, data->diag); 3949 usb_driver_release_interface(&btusb_driver, data->intf); 3950 } else if (intf == data->diag) { 3951 usb_driver_release_interface(&btusb_driver, data->intf); 3952 if (data->isoc) 3953 usb_driver_release_interface(&btusb_driver, data->isoc); 3954 } 3955 3956 if (data->oob_wake_irq) 3957 device_init_wakeup(&data->udev->dev, false); 3958 3959 if (data->reset_gpio) 3960 gpiod_put(data->reset_gpio); 3961 3962 hci_free_dev(hdev); 3963 } 3964 3965 #ifdef CONFIG_PM 3966 static int btusb_suspend(struct usb_interface *intf, pm_message_t message) 3967 { 3968 struct btusb_data *data = usb_get_intfdata(intf); 3969 3970 BT_DBG("intf %p", intf); 3971 3972 if (data->suspend_count++) 3973 return 0; 3974 3975 spin_lock_irq(&data->txlock); 3976 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { 3977 set_bit(BTUSB_SUSPENDING, &data->flags); 3978 spin_unlock_irq(&data->txlock); 3979 } else { 3980 spin_unlock_irq(&data->txlock); 3981 data->suspend_count--; 3982 return -EBUSY; 3983 } 3984 3985 cancel_work_sync(&data->work); 3986 3987 btusb_stop_traffic(data); 3988 usb_kill_anchored_urbs(&data->tx_anchor); 3989 3990 if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) { 3991 set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 3992 enable_irq_wake(data->oob_wake_irq); 3993 enable_irq(data->oob_wake_irq); 3994 } 3995 3996 /* For global suspend, Realtek devices lose the loaded fw 3997 * in them. But for autosuspend, firmware should remain. 3998 * Actually, it depends on whether the usb host sends 3999 * set feature (enable wakeup) or not. 4000 */ 4001 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) { 4002 if (PMSG_IS_AUTO(message) && 4003 device_can_wakeup(&data->udev->dev)) 4004 data->udev->do_remote_wakeup = 1; 4005 else if (!PMSG_IS_AUTO(message)) 4006 data->udev->reset_resume = 1; 4007 } 4008 4009 return 0; 4010 } 4011 4012 static void play_deferred(struct btusb_data *data) 4013 { 4014 struct urb *urb; 4015 int err; 4016 4017 while ((urb = usb_get_from_anchor(&data->deferred))) { 4018 usb_anchor_urb(urb, &data->tx_anchor); 4019 4020 err = usb_submit_urb(urb, GFP_ATOMIC); 4021 if (err < 0) { 4022 if (err != -EPERM && err != -ENODEV) 4023 BT_ERR("%s urb %p submission failed (%d)", 4024 data->hdev->name, urb, -err); 4025 kfree(urb->setup_packet); 4026 usb_unanchor_urb(urb); 4027 usb_free_urb(urb); 4028 break; 4029 } 4030 4031 data->tx_in_flight++; 4032 usb_free_urb(urb); 4033 } 4034 4035 /* Cleanup the rest deferred urbs. */ 4036 while ((urb = usb_get_from_anchor(&data->deferred))) { 4037 kfree(urb->setup_packet); 4038 usb_free_urb(urb); 4039 } 4040 } 4041 4042 static int btusb_resume(struct usb_interface *intf) 4043 { 4044 struct btusb_data *data = usb_get_intfdata(intf); 4045 struct hci_dev *hdev = data->hdev; 4046 int err = 0; 4047 4048 BT_DBG("intf %p", intf); 4049 4050 if (--data->suspend_count) 4051 return 0; 4052 4053 /* Disable only if not already disabled (keep it balanced) */ 4054 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 4055 disable_irq(data->oob_wake_irq); 4056 disable_irq_wake(data->oob_wake_irq); 4057 } 4058 4059 if (!test_bit(HCI_RUNNING, &hdev->flags)) 4060 goto done; 4061 4062 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { 4063 err = btusb_submit_intr_urb(hdev, GFP_NOIO); 4064 if (err < 0) { 4065 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 4066 goto failed; 4067 } 4068 } 4069 4070 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { 4071 err = btusb_submit_bulk_urb(hdev, GFP_NOIO); 4072 if (err < 0) { 4073 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 4074 goto failed; 4075 } 4076 4077 btusb_submit_bulk_urb(hdev, GFP_NOIO); 4078 } 4079 4080 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 4081 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) 4082 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 4083 else 4084 btusb_submit_isoc_urb(hdev, GFP_NOIO); 4085 } 4086 4087 spin_lock_irq(&data->txlock); 4088 play_deferred(data); 4089 clear_bit(BTUSB_SUSPENDING, &data->flags); 4090 spin_unlock_irq(&data->txlock); 4091 schedule_work(&data->work); 4092 4093 return 0; 4094 4095 failed: 4096 usb_scuttle_anchored_urbs(&data->deferred); 4097 done: 4098 spin_lock_irq(&data->txlock); 4099 clear_bit(BTUSB_SUSPENDING, &data->flags); 4100 spin_unlock_irq(&data->txlock); 4101 4102 return err; 4103 } 4104 #endif 4105 4106 static struct usb_driver btusb_driver = { 4107 .name = "btusb", 4108 .probe = btusb_probe, 4109 .disconnect = btusb_disconnect, 4110 #ifdef CONFIG_PM 4111 .suspend = btusb_suspend, 4112 .resume = btusb_resume, 4113 #endif 4114 .id_table = btusb_table, 4115 .supports_autosuspend = 1, 4116 .disable_hub_initiated_lpm = 1, 4117 }; 4118 4119 module_usb_driver(btusb_driver); 4120 4121 module_param(disable_scofix, bool, 0644); 4122 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); 4123 4124 module_param(force_scofix, bool, 0644); 4125 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); 4126 4127 module_param(enable_autosuspend, bool, 0644); 4128 MODULE_PARM_DESC(enable_autosuspend, "Enable USB autosuspend by default"); 4129 4130 module_param(reset, bool, 0644); 4131 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); 4132 4133 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); 4134 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); 4135 MODULE_VERSION(VERSION); 4136 MODULE_LICENSE("GPL"); 4137