1 /* 2 * 3 * Generic Bluetooth USB driver 4 * 5 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> 6 * 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 21 * 22 */ 23 24 #include <linux/module.h> 25 #include <linux/usb.h> 26 #include <linux/firmware.h> 27 #include <asm/unaligned.h> 28 29 #include <net/bluetooth/bluetooth.h> 30 #include <net/bluetooth/hci_core.h> 31 32 #include "btintel.h" 33 #include "btbcm.h" 34 #include "btrtl.h" 35 36 #define VERSION "0.8" 37 38 static bool disable_scofix; 39 static bool force_scofix; 40 41 static bool reset = true; 42 43 static struct usb_driver btusb_driver; 44 45 #define BTUSB_IGNORE 0x01 46 #define BTUSB_DIGIANSWER 0x02 47 #define BTUSB_CSR 0x04 48 #define BTUSB_SNIFFER 0x08 49 #define BTUSB_BCM92035 0x10 50 #define BTUSB_BROKEN_ISOC 0x20 51 #define BTUSB_WRONG_SCO_MTU 0x40 52 #define BTUSB_ATH3012 0x80 53 #define BTUSB_INTEL 0x100 54 #define BTUSB_INTEL_BOOT 0x200 55 #define BTUSB_BCM_PATCHRAM 0x400 56 #define BTUSB_MARVELL 0x800 57 #define BTUSB_SWAVE 0x1000 58 #define BTUSB_INTEL_NEW 0x2000 59 #define BTUSB_AMP 0x4000 60 #define BTUSB_QCA_ROME 0x8000 61 #define BTUSB_BCM_APPLE 0x10000 62 #define BTUSB_REALTEK 0x20000 63 #define BTUSB_BCM2045 0x40000 64 #define BTUSB_IFNUM_2 0x80000 65 66 static const struct usb_device_id btusb_table[] = { 67 /* Generic Bluetooth USB device */ 68 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, 69 70 /* Generic Bluetooth AMP device */ 71 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, 72 73 /* Generic Bluetooth USB interface */ 74 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, 75 76 /* Apple-specific (Broadcom) devices */ 77 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), 78 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, 79 80 /* MediaTek MT76x0E */ 81 { USB_DEVICE(0x0e8d, 0x763f) }, 82 83 /* Broadcom SoftSailing reporting vendor specific */ 84 { USB_DEVICE(0x0a5c, 0x21e1) }, 85 86 /* Apple MacBookPro 7,1 */ 87 { USB_DEVICE(0x05ac, 0x8213) }, 88 89 /* Apple iMac11,1 */ 90 { USB_DEVICE(0x05ac, 0x8215) }, 91 92 /* Apple MacBookPro6,2 */ 93 { USB_DEVICE(0x05ac, 0x8218) }, 94 95 /* Apple MacBookAir3,1, MacBookAir3,2 */ 96 { USB_DEVICE(0x05ac, 0x821b) }, 97 98 /* Apple MacBookAir4,1 */ 99 { USB_DEVICE(0x05ac, 0x821f) }, 100 101 /* Apple MacBookPro8,2 */ 102 { USB_DEVICE(0x05ac, 0x821a) }, 103 104 /* Apple MacMini5,1 */ 105 { USB_DEVICE(0x05ac, 0x8281) }, 106 107 /* AVM BlueFRITZ! USB v2.0 */ 108 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, 109 110 /* Bluetooth Ultraport Module from IBM */ 111 { USB_DEVICE(0x04bf, 0x030a) }, 112 113 /* ALPS Modules with non-standard id */ 114 { USB_DEVICE(0x044e, 0x3001) }, 115 { USB_DEVICE(0x044e, 0x3002) }, 116 117 /* Ericsson with non-standard id */ 118 { USB_DEVICE(0x0bdb, 0x1002) }, 119 120 /* Canyon CN-BTU1 with HID interfaces */ 121 { USB_DEVICE(0x0c10, 0x0000) }, 122 123 /* Broadcom BCM20702A0 */ 124 { USB_DEVICE(0x413c, 0x8197) }, 125 126 /* Broadcom BCM20702B0 (Dynex/Insignia) */ 127 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, 128 129 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ 130 { USB_DEVICE(0x105b, 0xe065), .driver_info = BTUSB_BCM_PATCHRAM }, 131 132 /* Foxconn - Hon Hai */ 133 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), 134 .driver_info = BTUSB_BCM_PATCHRAM }, 135 136 /* Lite-On Technology - Broadcom based */ 137 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), 138 .driver_info = BTUSB_BCM_PATCHRAM }, 139 140 /* Broadcom devices with vendor specific id */ 141 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), 142 .driver_info = BTUSB_BCM_PATCHRAM }, 143 144 /* ASUSTek Computer - Broadcom based */ 145 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), 146 .driver_info = BTUSB_BCM_PATCHRAM }, 147 148 /* Belkin F8065bf - Broadcom based */ 149 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), 150 .driver_info = BTUSB_BCM_PATCHRAM }, 151 152 /* IMC Networks - Broadcom based */ 153 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), 154 .driver_info = BTUSB_BCM_PATCHRAM }, 155 156 /* Toshiba Corp - Broadcom based */ 157 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), 158 .driver_info = BTUSB_BCM_PATCHRAM }, 159 160 /* Intel Bluetooth USB Bootloader (RAM module) */ 161 { USB_DEVICE(0x8087, 0x0a5a), 162 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, 163 164 { } /* Terminating entry */ 165 }; 166 167 MODULE_DEVICE_TABLE(usb, btusb_table); 168 169 static const struct usb_device_id blacklist_table[] = { 170 /* CSR BlueCore devices */ 171 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, 172 173 /* Broadcom BCM2033 without firmware */ 174 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, 175 176 /* Broadcom BCM2045 devices */ 177 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, 178 179 /* Atheros 3011 with sflash firmware */ 180 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, 181 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, 182 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, 183 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, 184 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, 185 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, 186 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, 187 188 /* Atheros AR9285 Malbec with sflash firmware */ 189 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, 190 191 /* Atheros 3012 with sflash firmware */ 192 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, 193 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, 194 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, 195 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, 196 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, 197 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, 198 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, 199 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, 200 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, 201 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, 202 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, 203 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, 204 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, 205 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, 206 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, 207 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, 208 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, 209 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, 210 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, 211 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, 212 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, 213 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, 214 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, 215 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, 216 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, 217 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, 218 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, 219 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, 220 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, 221 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, 222 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, 223 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, 224 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, 225 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, 226 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, 227 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, 228 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, 229 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, 230 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, 231 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, 232 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, 233 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, 234 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, 235 236 /* Atheros AR5BBU12 with sflash firmware */ 237 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, 238 239 /* Atheros AR5BBU12 with sflash firmware */ 240 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, 241 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, 242 243 /* QCA ROME chipset */ 244 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME }, 245 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME }, 246 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, 247 248 /* Broadcom BCM2035 */ 249 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, 250 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, 251 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, 252 253 /* Broadcom BCM2045 */ 254 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, 255 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, 256 257 /* IBM/Lenovo ThinkPad with Broadcom chip */ 258 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, 259 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, 260 261 /* HP laptop with Broadcom chip */ 262 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, 263 264 /* Dell laptop with Broadcom chip */ 265 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, 266 267 /* Dell Wireless 370 and 410 devices */ 268 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, 269 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, 270 271 /* Belkin F8T012 and F8T013 devices */ 272 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, 273 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, 274 275 /* Asus WL-BTD202 device */ 276 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, 277 278 /* Kensington Bluetooth USB adapter */ 279 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, 280 281 /* RTX Telecom based adapters with buggy SCO support */ 282 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, 283 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, 284 285 /* CONWISE Technology based adapters with buggy SCO support */ 286 { USB_DEVICE(0x0e5e, 0x6622), .driver_info = BTUSB_BROKEN_ISOC }, 287 288 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ 289 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, 290 291 /* Digianswer devices */ 292 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, 293 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, 294 295 /* CSR BlueCore Bluetooth Sniffer */ 296 { USB_DEVICE(0x0a12, 0x0002), 297 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 298 299 /* Frontline ComProbe Bluetooth Sniffer */ 300 { USB_DEVICE(0x16d3, 0x0002), 301 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 302 303 /* Marvell Bluetooth devices */ 304 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, 305 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, 306 307 /* Intel Bluetooth devices */ 308 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, 309 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, 310 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, 311 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW }, 312 313 /* Other Intel Bluetooth devices */ 314 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), 315 .driver_info = BTUSB_IGNORE }, 316 317 /* Realtek Bluetooth devices */ 318 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), 319 .driver_info = BTUSB_REALTEK }, 320 321 /* Additional Realtek 8723AE Bluetooth devices */ 322 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, 323 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, 324 325 /* Additional Realtek 8723BE Bluetooth devices */ 326 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, 327 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, 328 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, 329 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, 330 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, 331 332 /* Additional Realtek 8821AE Bluetooth devices */ 333 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, 334 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, 335 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, 336 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, 337 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, 338 339 /* Silicon Wave based devices */ 340 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, 341 342 { } /* Terminating entry */ 343 }; 344 345 #define BTUSB_MAX_ISOC_FRAMES 10 346 347 #define BTUSB_INTR_RUNNING 0 348 #define BTUSB_BULK_RUNNING 1 349 #define BTUSB_ISOC_RUNNING 2 350 #define BTUSB_SUSPENDING 3 351 #define BTUSB_DID_ISO_RESUME 4 352 #define BTUSB_BOOTLOADER 5 353 #define BTUSB_DOWNLOADING 6 354 #define BTUSB_FIRMWARE_LOADED 7 355 #define BTUSB_FIRMWARE_FAILED 8 356 #define BTUSB_BOOTING 9 357 #define BTUSB_RESET_RESUME 10 358 #define BTUSB_DIAG_RUNNING 11 359 360 struct btusb_data { 361 struct hci_dev *hdev; 362 struct usb_device *udev; 363 struct usb_interface *intf; 364 struct usb_interface *isoc; 365 struct usb_interface *diag; 366 367 unsigned long flags; 368 369 struct work_struct work; 370 struct work_struct waker; 371 372 struct usb_anchor deferred; 373 struct usb_anchor tx_anchor; 374 int tx_in_flight; 375 spinlock_t txlock; 376 377 struct usb_anchor intr_anchor; 378 struct usb_anchor bulk_anchor; 379 struct usb_anchor isoc_anchor; 380 struct usb_anchor diag_anchor; 381 spinlock_t rxlock; 382 383 struct sk_buff *evt_skb; 384 struct sk_buff *acl_skb; 385 struct sk_buff *sco_skb; 386 387 struct usb_endpoint_descriptor *intr_ep; 388 struct usb_endpoint_descriptor *bulk_tx_ep; 389 struct usb_endpoint_descriptor *bulk_rx_ep; 390 struct usb_endpoint_descriptor *isoc_tx_ep; 391 struct usb_endpoint_descriptor *isoc_rx_ep; 392 struct usb_endpoint_descriptor *diag_tx_ep; 393 struct usb_endpoint_descriptor *diag_rx_ep; 394 395 __u8 cmdreq_type; 396 __u8 cmdreq; 397 398 unsigned int sco_num; 399 int isoc_altsetting; 400 int suspend_count; 401 402 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); 403 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); 404 405 int (*setup_on_usb)(struct hci_dev *hdev); 406 }; 407 408 static inline void btusb_free_frags(struct btusb_data *data) 409 { 410 unsigned long flags; 411 412 spin_lock_irqsave(&data->rxlock, flags); 413 414 kfree_skb(data->evt_skb); 415 data->evt_skb = NULL; 416 417 kfree_skb(data->acl_skb); 418 data->acl_skb = NULL; 419 420 kfree_skb(data->sco_skb); 421 data->sco_skb = NULL; 422 423 spin_unlock_irqrestore(&data->rxlock, flags); 424 } 425 426 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) 427 { 428 struct sk_buff *skb; 429 int err = 0; 430 431 spin_lock(&data->rxlock); 432 skb = data->evt_skb; 433 434 while (count) { 435 int len; 436 437 if (!skb) { 438 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); 439 if (!skb) { 440 err = -ENOMEM; 441 break; 442 } 443 444 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 445 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; 446 } 447 448 len = min_t(uint, hci_skb_expect(skb), count); 449 memcpy(skb_put(skb, len), buffer, len); 450 451 count -= len; 452 buffer += len; 453 hci_skb_expect(skb) -= len; 454 455 if (skb->len == HCI_EVENT_HDR_SIZE) { 456 /* Complete event header */ 457 hci_skb_expect(skb) = hci_event_hdr(skb)->plen; 458 459 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 460 kfree_skb(skb); 461 skb = NULL; 462 463 err = -EILSEQ; 464 break; 465 } 466 } 467 468 if (!hci_skb_expect(skb)) { 469 /* Complete frame */ 470 data->recv_event(data->hdev, skb); 471 skb = NULL; 472 } 473 } 474 475 data->evt_skb = skb; 476 spin_unlock(&data->rxlock); 477 478 return err; 479 } 480 481 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) 482 { 483 struct sk_buff *skb; 484 int err = 0; 485 486 spin_lock(&data->rxlock); 487 skb = data->acl_skb; 488 489 while (count) { 490 int len; 491 492 if (!skb) { 493 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); 494 if (!skb) { 495 err = -ENOMEM; 496 break; 497 } 498 499 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; 500 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; 501 } 502 503 len = min_t(uint, hci_skb_expect(skb), count); 504 memcpy(skb_put(skb, len), buffer, len); 505 506 count -= len; 507 buffer += len; 508 hci_skb_expect(skb) -= len; 509 510 if (skb->len == HCI_ACL_HDR_SIZE) { 511 __le16 dlen = hci_acl_hdr(skb)->dlen; 512 513 /* Complete ACL header */ 514 hci_skb_expect(skb) = __le16_to_cpu(dlen); 515 516 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 517 kfree_skb(skb); 518 skb = NULL; 519 520 err = -EILSEQ; 521 break; 522 } 523 } 524 525 if (!hci_skb_expect(skb)) { 526 /* Complete frame */ 527 hci_recv_frame(data->hdev, skb); 528 skb = NULL; 529 } 530 } 531 532 data->acl_skb = skb; 533 spin_unlock(&data->rxlock); 534 535 return err; 536 } 537 538 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) 539 { 540 struct sk_buff *skb; 541 int err = 0; 542 543 spin_lock(&data->rxlock); 544 skb = data->sco_skb; 545 546 while (count) { 547 int len; 548 549 if (!skb) { 550 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); 551 if (!skb) { 552 err = -ENOMEM; 553 break; 554 } 555 556 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; 557 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; 558 } 559 560 len = min_t(uint, hci_skb_expect(skb), count); 561 memcpy(skb_put(skb, len), buffer, len); 562 563 count -= len; 564 buffer += len; 565 hci_skb_expect(skb) -= len; 566 567 if (skb->len == HCI_SCO_HDR_SIZE) { 568 /* Complete SCO header */ 569 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; 570 571 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 572 kfree_skb(skb); 573 skb = NULL; 574 575 err = -EILSEQ; 576 break; 577 } 578 } 579 580 if (!hci_skb_expect(skb)) { 581 /* Complete frame */ 582 hci_recv_frame(data->hdev, skb); 583 skb = NULL; 584 } 585 } 586 587 data->sco_skb = skb; 588 spin_unlock(&data->rxlock); 589 590 return err; 591 } 592 593 static void btusb_intr_complete(struct urb *urb) 594 { 595 struct hci_dev *hdev = urb->context; 596 struct btusb_data *data = hci_get_drvdata(hdev); 597 int err; 598 599 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 600 urb->actual_length); 601 602 if (!test_bit(HCI_RUNNING, &hdev->flags)) 603 return; 604 605 if (urb->status == 0) { 606 hdev->stat.byte_rx += urb->actual_length; 607 608 if (btusb_recv_intr(data, urb->transfer_buffer, 609 urb->actual_length) < 0) { 610 BT_ERR("%s corrupted event packet", hdev->name); 611 hdev->stat.err_rx++; 612 } 613 } else if (urb->status == -ENOENT) { 614 /* Avoid suspend failed when usb_kill_urb */ 615 return; 616 } 617 618 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) 619 return; 620 621 usb_mark_last_busy(data->udev); 622 usb_anchor_urb(urb, &data->intr_anchor); 623 624 err = usb_submit_urb(urb, GFP_ATOMIC); 625 if (err < 0) { 626 /* -EPERM: urb is being killed; 627 * -ENODEV: device got disconnected */ 628 if (err != -EPERM && err != -ENODEV) 629 BT_ERR("%s urb %p failed to resubmit (%d)", 630 hdev->name, urb, -err); 631 usb_unanchor_urb(urb); 632 } 633 } 634 635 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) 636 { 637 struct btusb_data *data = hci_get_drvdata(hdev); 638 struct urb *urb; 639 unsigned char *buf; 640 unsigned int pipe; 641 int err, size; 642 643 BT_DBG("%s", hdev->name); 644 645 if (!data->intr_ep) 646 return -ENODEV; 647 648 urb = usb_alloc_urb(0, mem_flags); 649 if (!urb) 650 return -ENOMEM; 651 652 size = le16_to_cpu(data->intr_ep->wMaxPacketSize); 653 654 buf = kmalloc(size, mem_flags); 655 if (!buf) { 656 usb_free_urb(urb); 657 return -ENOMEM; 658 } 659 660 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); 661 662 usb_fill_int_urb(urb, data->udev, pipe, buf, size, 663 btusb_intr_complete, hdev, data->intr_ep->bInterval); 664 665 urb->transfer_flags |= URB_FREE_BUFFER; 666 667 usb_anchor_urb(urb, &data->intr_anchor); 668 669 err = usb_submit_urb(urb, mem_flags); 670 if (err < 0) { 671 if (err != -EPERM && err != -ENODEV) 672 BT_ERR("%s urb %p submission failed (%d)", 673 hdev->name, urb, -err); 674 usb_unanchor_urb(urb); 675 } 676 677 usb_free_urb(urb); 678 679 return err; 680 } 681 682 static void btusb_bulk_complete(struct urb *urb) 683 { 684 struct hci_dev *hdev = urb->context; 685 struct btusb_data *data = hci_get_drvdata(hdev); 686 int err; 687 688 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 689 urb->actual_length); 690 691 if (!test_bit(HCI_RUNNING, &hdev->flags)) 692 return; 693 694 if (urb->status == 0) { 695 hdev->stat.byte_rx += urb->actual_length; 696 697 if (data->recv_bulk(data, urb->transfer_buffer, 698 urb->actual_length) < 0) { 699 BT_ERR("%s corrupted ACL packet", hdev->name); 700 hdev->stat.err_rx++; 701 } 702 } else if (urb->status == -ENOENT) { 703 /* Avoid suspend failed when usb_kill_urb */ 704 return; 705 } 706 707 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) 708 return; 709 710 usb_anchor_urb(urb, &data->bulk_anchor); 711 usb_mark_last_busy(data->udev); 712 713 err = usb_submit_urb(urb, GFP_ATOMIC); 714 if (err < 0) { 715 /* -EPERM: urb is being killed; 716 * -ENODEV: device got disconnected */ 717 if (err != -EPERM && err != -ENODEV) 718 BT_ERR("%s urb %p failed to resubmit (%d)", 719 hdev->name, urb, -err); 720 usb_unanchor_urb(urb); 721 } 722 } 723 724 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) 725 { 726 struct btusb_data *data = hci_get_drvdata(hdev); 727 struct urb *urb; 728 unsigned char *buf; 729 unsigned int pipe; 730 int err, size = HCI_MAX_FRAME_SIZE; 731 732 BT_DBG("%s", hdev->name); 733 734 if (!data->bulk_rx_ep) 735 return -ENODEV; 736 737 urb = usb_alloc_urb(0, mem_flags); 738 if (!urb) 739 return -ENOMEM; 740 741 buf = kmalloc(size, mem_flags); 742 if (!buf) { 743 usb_free_urb(urb); 744 return -ENOMEM; 745 } 746 747 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); 748 749 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 750 btusb_bulk_complete, hdev); 751 752 urb->transfer_flags |= URB_FREE_BUFFER; 753 754 usb_mark_last_busy(data->udev); 755 usb_anchor_urb(urb, &data->bulk_anchor); 756 757 err = usb_submit_urb(urb, mem_flags); 758 if (err < 0) { 759 if (err != -EPERM && err != -ENODEV) 760 BT_ERR("%s urb %p submission failed (%d)", 761 hdev->name, urb, -err); 762 usb_unanchor_urb(urb); 763 } 764 765 usb_free_urb(urb); 766 767 return err; 768 } 769 770 static void btusb_isoc_complete(struct urb *urb) 771 { 772 struct hci_dev *hdev = urb->context; 773 struct btusb_data *data = hci_get_drvdata(hdev); 774 int i, err; 775 776 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 777 urb->actual_length); 778 779 if (!test_bit(HCI_RUNNING, &hdev->flags)) 780 return; 781 782 if (urb->status == 0) { 783 for (i = 0; i < urb->number_of_packets; i++) { 784 unsigned int offset = urb->iso_frame_desc[i].offset; 785 unsigned int length = urb->iso_frame_desc[i].actual_length; 786 787 if (urb->iso_frame_desc[i].status) 788 continue; 789 790 hdev->stat.byte_rx += length; 791 792 if (btusb_recv_isoc(data, urb->transfer_buffer + offset, 793 length) < 0) { 794 BT_ERR("%s corrupted SCO packet", hdev->name); 795 hdev->stat.err_rx++; 796 } 797 } 798 } else if (urb->status == -ENOENT) { 799 /* Avoid suspend failed when usb_kill_urb */ 800 return; 801 } 802 803 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) 804 return; 805 806 usb_anchor_urb(urb, &data->isoc_anchor); 807 808 err = usb_submit_urb(urb, GFP_ATOMIC); 809 if (err < 0) { 810 /* -EPERM: urb is being killed; 811 * -ENODEV: device got disconnected */ 812 if (err != -EPERM && err != -ENODEV) 813 BT_ERR("%s urb %p failed to resubmit (%d)", 814 hdev->name, urb, -err); 815 usb_unanchor_urb(urb); 816 } 817 } 818 819 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) 820 { 821 int i, offset = 0; 822 823 BT_DBG("len %d mtu %d", len, mtu); 824 825 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; 826 i++, offset += mtu, len -= mtu) { 827 urb->iso_frame_desc[i].offset = offset; 828 urb->iso_frame_desc[i].length = mtu; 829 } 830 831 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 832 urb->iso_frame_desc[i].offset = offset; 833 urb->iso_frame_desc[i].length = len; 834 i++; 835 } 836 837 urb->number_of_packets = i; 838 } 839 840 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) 841 { 842 struct btusb_data *data = hci_get_drvdata(hdev); 843 struct urb *urb; 844 unsigned char *buf; 845 unsigned int pipe; 846 int err, size; 847 848 BT_DBG("%s", hdev->name); 849 850 if (!data->isoc_rx_ep) 851 return -ENODEV; 852 853 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); 854 if (!urb) 855 return -ENOMEM; 856 857 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * 858 BTUSB_MAX_ISOC_FRAMES; 859 860 buf = kmalloc(size, mem_flags); 861 if (!buf) { 862 usb_free_urb(urb); 863 return -ENOMEM; 864 } 865 866 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); 867 868 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, 869 hdev, data->isoc_rx_ep->bInterval); 870 871 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; 872 873 __fill_isoc_descriptor(urb, size, 874 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); 875 876 usb_anchor_urb(urb, &data->isoc_anchor); 877 878 err = usb_submit_urb(urb, mem_flags); 879 if (err < 0) { 880 if (err != -EPERM && err != -ENODEV) 881 BT_ERR("%s urb %p submission failed (%d)", 882 hdev->name, urb, -err); 883 usb_unanchor_urb(urb); 884 } 885 886 usb_free_urb(urb); 887 888 return err; 889 } 890 891 static void btusb_diag_complete(struct urb *urb) 892 { 893 struct hci_dev *hdev = urb->context; 894 struct btusb_data *data = hci_get_drvdata(hdev); 895 int err; 896 897 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 898 urb->actual_length); 899 900 if (urb->status == 0) { 901 struct sk_buff *skb; 902 903 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); 904 if (skb) { 905 memcpy(skb_put(skb, urb->actual_length), 906 urb->transfer_buffer, urb->actual_length); 907 hci_recv_diag(hdev, skb); 908 } 909 } else if (urb->status == -ENOENT) { 910 /* Avoid suspend failed when usb_kill_urb */ 911 return; 912 } 913 914 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) 915 return; 916 917 usb_anchor_urb(urb, &data->diag_anchor); 918 usb_mark_last_busy(data->udev); 919 920 err = usb_submit_urb(urb, GFP_ATOMIC); 921 if (err < 0) { 922 /* -EPERM: urb is being killed; 923 * -ENODEV: device got disconnected */ 924 if (err != -EPERM && err != -ENODEV) 925 BT_ERR("%s urb %p failed to resubmit (%d)", 926 hdev->name, urb, -err); 927 usb_unanchor_urb(urb); 928 } 929 } 930 931 static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) 932 { 933 struct btusb_data *data = hci_get_drvdata(hdev); 934 struct urb *urb; 935 unsigned char *buf; 936 unsigned int pipe; 937 int err, size = HCI_MAX_FRAME_SIZE; 938 939 BT_DBG("%s", hdev->name); 940 941 if (!data->diag_rx_ep) 942 return -ENODEV; 943 944 urb = usb_alloc_urb(0, mem_flags); 945 if (!urb) 946 return -ENOMEM; 947 948 buf = kmalloc(size, mem_flags); 949 if (!buf) { 950 usb_free_urb(urb); 951 return -ENOMEM; 952 } 953 954 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); 955 956 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 957 btusb_diag_complete, hdev); 958 959 urb->transfer_flags |= URB_FREE_BUFFER; 960 961 usb_mark_last_busy(data->udev); 962 usb_anchor_urb(urb, &data->diag_anchor); 963 964 err = usb_submit_urb(urb, mem_flags); 965 if (err < 0) { 966 if (err != -EPERM && err != -ENODEV) 967 BT_ERR("%s urb %p submission failed (%d)", 968 hdev->name, urb, -err); 969 usb_unanchor_urb(urb); 970 } 971 972 usb_free_urb(urb); 973 974 return err; 975 } 976 977 static void btusb_tx_complete(struct urb *urb) 978 { 979 struct sk_buff *skb = urb->context; 980 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 981 struct btusb_data *data = hci_get_drvdata(hdev); 982 983 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 984 urb->actual_length); 985 986 if (!test_bit(HCI_RUNNING, &hdev->flags)) 987 goto done; 988 989 if (!urb->status) 990 hdev->stat.byte_tx += urb->transfer_buffer_length; 991 else 992 hdev->stat.err_tx++; 993 994 done: 995 spin_lock(&data->txlock); 996 data->tx_in_flight--; 997 spin_unlock(&data->txlock); 998 999 kfree(urb->setup_packet); 1000 1001 kfree_skb(skb); 1002 } 1003 1004 static void btusb_isoc_tx_complete(struct urb *urb) 1005 { 1006 struct sk_buff *skb = urb->context; 1007 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1008 1009 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1010 urb->actual_length); 1011 1012 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1013 goto done; 1014 1015 if (!urb->status) 1016 hdev->stat.byte_tx += urb->transfer_buffer_length; 1017 else 1018 hdev->stat.err_tx++; 1019 1020 done: 1021 kfree(urb->setup_packet); 1022 1023 kfree_skb(skb); 1024 } 1025 1026 static int btusb_open(struct hci_dev *hdev) 1027 { 1028 struct btusb_data *data = hci_get_drvdata(hdev); 1029 int err; 1030 1031 BT_DBG("%s", hdev->name); 1032 1033 /* Patching USB firmware files prior to starting any URBs of HCI path 1034 * It is more safe to use USB bulk channel for downloading USB patch 1035 */ 1036 if (data->setup_on_usb) { 1037 err = data->setup_on_usb(hdev); 1038 if (err < 0) 1039 return err; 1040 } 1041 1042 err = usb_autopm_get_interface(data->intf); 1043 if (err < 0) 1044 return err; 1045 1046 data->intf->needs_remote_wakeup = 1; 1047 1048 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) 1049 goto done; 1050 1051 err = btusb_submit_intr_urb(hdev, GFP_KERNEL); 1052 if (err < 0) 1053 goto failed; 1054 1055 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1056 if (err < 0) { 1057 usb_kill_anchored_urbs(&data->intr_anchor); 1058 goto failed; 1059 } 1060 1061 set_bit(BTUSB_BULK_RUNNING, &data->flags); 1062 btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1063 1064 if (data->diag) { 1065 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) 1066 set_bit(BTUSB_DIAG_RUNNING, &data->flags); 1067 } 1068 1069 done: 1070 usb_autopm_put_interface(data->intf); 1071 return 0; 1072 1073 failed: 1074 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1075 usb_autopm_put_interface(data->intf); 1076 return err; 1077 } 1078 1079 static void btusb_stop_traffic(struct btusb_data *data) 1080 { 1081 usb_kill_anchored_urbs(&data->intr_anchor); 1082 usb_kill_anchored_urbs(&data->bulk_anchor); 1083 usb_kill_anchored_urbs(&data->isoc_anchor); 1084 usb_kill_anchored_urbs(&data->diag_anchor); 1085 } 1086 1087 static int btusb_close(struct hci_dev *hdev) 1088 { 1089 struct btusb_data *data = hci_get_drvdata(hdev); 1090 int err; 1091 1092 BT_DBG("%s", hdev->name); 1093 1094 cancel_work_sync(&data->work); 1095 cancel_work_sync(&data->waker); 1096 1097 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1098 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 1099 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1100 clear_bit(BTUSB_DIAG_RUNNING, &data->flags); 1101 1102 btusb_stop_traffic(data); 1103 btusb_free_frags(data); 1104 1105 err = usb_autopm_get_interface(data->intf); 1106 if (err < 0) 1107 goto failed; 1108 1109 data->intf->needs_remote_wakeup = 0; 1110 usb_autopm_put_interface(data->intf); 1111 1112 failed: 1113 usb_scuttle_anchored_urbs(&data->deferred); 1114 return 0; 1115 } 1116 1117 static int btusb_flush(struct hci_dev *hdev) 1118 { 1119 struct btusb_data *data = hci_get_drvdata(hdev); 1120 1121 BT_DBG("%s", hdev->name); 1122 1123 usb_kill_anchored_urbs(&data->tx_anchor); 1124 btusb_free_frags(data); 1125 1126 return 0; 1127 } 1128 1129 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) 1130 { 1131 struct btusb_data *data = hci_get_drvdata(hdev); 1132 struct usb_ctrlrequest *dr; 1133 struct urb *urb; 1134 unsigned int pipe; 1135 1136 urb = usb_alloc_urb(0, GFP_KERNEL); 1137 if (!urb) 1138 return ERR_PTR(-ENOMEM); 1139 1140 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 1141 if (!dr) { 1142 usb_free_urb(urb); 1143 return ERR_PTR(-ENOMEM); 1144 } 1145 1146 dr->bRequestType = data->cmdreq_type; 1147 dr->bRequest = data->cmdreq; 1148 dr->wIndex = 0; 1149 dr->wValue = 0; 1150 dr->wLength = __cpu_to_le16(skb->len); 1151 1152 pipe = usb_sndctrlpipe(data->udev, 0x00); 1153 1154 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 1155 skb->data, skb->len, btusb_tx_complete, skb); 1156 1157 skb->dev = (void *)hdev; 1158 1159 return urb; 1160 } 1161 1162 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) 1163 { 1164 struct btusb_data *data = hci_get_drvdata(hdev); 1165 struct urb *urb; 1166 unsigned int pipe; 1167 1168 if (!data->bulk_tx_ep) 1169 return ERR_PTR(-ENODEV); 1170 1171 urb = usb_alloc_urb(0, GFP_KERNEL); 1172 if (!urb) 1173 return ERR_PTR(-ENOMEM); 1174 1175 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); 1176 1177 usb_fill_bulk_urb(urb, data->udev, pipe, 1178 skb->data, skb->len, btusb_tx_complete, skb); 1179 1180 skb->dev = (void *)hdev; 1181 1182 return urb; 1183 } 1184 1185 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) 1186 { 1187 struct btusb_data *data = hci_get_drvdata(hdev); 1188 struct urb *urb; 1189 unsigned int pipe; 1190 1191 if (!data->isoc_tx_ep) 1192 return ERR_PTR(-ENODEV); 1193 1194 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); 1195 if (!urb) 1196 return ERR_PTR(-ENOMEM); 1197 1198 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); 1199 1200 usb_fill_int_urb(urb, data->udev, pipe, 1201 skb->data, skb->len, btusb_isoc_tx_complete, 1202 skb, data->isoc_tx_ep->bInterval); 1203 1204 urb->transfer_flags = URB_ISO_ASAP; 1205 1206 __fill_isoc_descriptor(urb, skb->len, 1207 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); 1208 1209 skb->dev = (void *)hdev; 1210 1211 return urb; 1212 } 1213 1214 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) 1215 { 1216 struct btusb_data *data = hci_get_drvdata(hdev); 1217 int err; 1218 1219 usb_anchor_urb(urb, &data->tx_anchor); 1220 1221 err = usb_submit_urb(urb, GFP_KERNEL); 1222 if (err < 0) { 1223 if (err != -EPERM && err != -ENODEV) 1224 BT_ERR("%s urb %p submission failed (%d)", 1225 hdev->name, urb, -err); 1226 kfree(urb->setup_packet); 1227 usb_unanchor_urb(urb); 1228 } else { 1229 usb_mark_last_busy(data->udev); 1230 } 1231 1232 usb_free_urb(urb); 1233 return err; 1234 } 1235 1236 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) 1237 { 1238 struct btusb_data *data = hci_get_drvdata(hdev); 1239 unsigned long flags; 1240 bool suspending; 1241 1242 spin_lock_irqsave(&data->txlock, flags); 1243 suspending = test_bit(BTUSB_SUSPENDING, &data->flags); 1244 if (!suspending) 1245 data->tx_in_flight++; 1246 spin_unlock_irqrestore(&data->txlock, flags); 1247 1248 if (!suspending) 1249 return submit_tx_urb(hdev, urb); 1250 1251 usb_anchor_urb(urb, &data->deferred); 1252 schedule_work(&data->waker); 1253 1254 usb_free_urb(urb); 1255 return 0; 1256 } 1257 1258 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) 1259 { 1260 struct urb *urb; 1261 1262 BT_DBG("%s", hdev->name); 1263 1264 switch (hci_skb_pkt_type(skb)) { 1265 case HCI_COMMAND_PKT: 1266 urb = alloc_ctrl_urb(hdev, skb); 1267 if (IS_ERR(urb)) 1268 return PTR_ERR(urb); 1269 1270 hdev->stat.cmd_tx++; 1271 return submit_or_queue_tx_urb(hdev, urb); 1272 1273 case HCI_ACLDATA_PKT: 1274 urb = alloc_bulk_urb(hdev, skb); 1275 if (IS_ERR(urb)) 1276 return PTR_ERR(urb); 1277 1278 hdev->stat.acl_tx++; 1279 return submit_or_queue_tx_urb(hdev, urb); 1280 1281 case HCI_SCODATA_PKT: 1282 if (hci_conn_num(hdev, SCO_LINK) < 1) 1283 return -ENODEV; 1284 1285 urb = alloc_isoc_urb(hdev, skb); 1286 if (IS_ERR(urb)) 1287 return PTR_ERR(urb); 1288 1289 hdev->stat.sco_tx++; 1290 return submit_tx_urb(hdev, urb); 1291 } 1292 1293 return -EILSEQ; 1294 } 1295 1296 static void btusb_notify(struct hci_dev *hdev, unsigned int evt) 1297 { 1298 struct btusb_data *data = hci_get_drvdata(hdev); 1299 1300 BT_DBG("%s evt %d", hdev->name, evt); 1301 1302 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { 1303 data->sco_num = hci_conn_num(hdev, SCO_LINK); 1304 schedule_work(&data->work); 1305 } 1306 } 1307 1308 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) 1309 { 1310 struct btusb_data *data = hci_get_drvdata(hdev); 1311 struct usb_interface *intf = data->isoc; 1312 struct usb_endpoint_descriptor *ep_desc; 1313 int i, err; 1314 1315 if (!data->isoc) 1316 return -ENODEV; 1317 1318 err = usb_set_interface(data->udev, 1, altsetting); 1319 if (err < 0) { 1320 BT_ERR("%s setting interface failed (%d)", hdev->name, -err); 1321 return err; 1322 } 1323 1324 data->isoc_altsetting = altsetting; 1325 1326 data->isoc_tx_ep = NULL; 1327 data->isoc_rx_ep = NULL; 1328 1329 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 1330 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 1331 1332 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { 1333 data->isoc_tx_ep = ep_desc; 1334 continue; 1335 } 1336 1337 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { 1338 data->isoc_rx_ep = ep_desc; 1339 continue; 1340 } 1341 } 1342 1343 if (!data->isoc_tx_ep || !data->isoc_rx_ep) { 1344 BT_ERR("%s invalid SCO descriptors", hdev->name); 1345 return -ENODEV; 1346 } 1347 1348 return 0; 1349 } 1350 1351 static void btusb_work(struct work_struct *work) 1352 { 1353 struct btusb_data *data = container_of(work, struct btusb_data, work); 1354 struct hci_dev *hdev = data->hdev; 1355 int new_alts; 1356 int err; 1357 1358 if (data->sco_num > 0) { 1359 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { 1360 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); 1361 if (err < 0) { 1362 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1363 usb_kill_anchored_urbs(&data->isoc_anchor); 1364 return; 1365 } 1366 1367 set_bit(BTUSB_DID_ISO_RESUME, &data->flags); 1368 } 1369 1370 if (hdev->voice_setting & 0x0020) { 1371 static const int alts[3] = { 2, 4, 5 }; 1372 1373 new_alts = alts[data->sco_num - 1]; 1374 } else { 1375 new_alts = data->sco_num; 1376 } 1377 1378 if (data->isoc_altsetting != new_alts) { 1379 unsigned long flags; 1380 1381 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1382 usb_kill_anchored_urbs(&data->isoc_anchor); 1383 1384 /* When isochronous alternate setting needs to be 1385 * changed, because SCO connection has been added 1386 * or removed, a packet fragment may be left in the 1387 * reassembling state. This could lead to wrongly 1388 * assembled fragments. 1389 * 1390 * Clear outstanding fragment when selecting a new 1391 * alternate setting. 1392 */ 1393 spin_lock_irqsave(&data->rxlock, flags); 1394 kfree_skb(data->sco_skb); 1395 data->sco_skb = NULL; 1396 spin_unlock_irqrestore(&data->rxlock, flags); 1397 1398 if (__set_isoc_interface(hdev, new_alts) < 0) 1399 return; 1400 } 1401 1402 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 1403 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) 1404 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1405 else 1406 btusb_submit_isoc_urb(hdev, GFP_KERNEL); 1407 } 1408 } else { 1409 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1410 usb_kill_anchored_urbs(&data->isoc_anchor); 1411 1412 __set_isoc_interface(hdev, 0); 1413 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) 1414 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); 1415 } 1416 } 1417 1418 static void btusb_waker(struct work_struct *work) 1419 { 1420 struct btusb_data *data = container_of(work, struct btusb_data, waker); 1421 int err; 1422 1423 err = usb_autopm_get_interface(data->intf); 1424 if (err < 0) 1425 return; 1426 1427 usb_autopm_put_interface(data->intf); 1428 } 1429 1430 static int btusb_setup_bcm92035(struct hci_dev *hdev) 1431 { 1432 struct sk_buff *skb; 1433 u8 val = 0x00; 1434 1435 BT_DBG("%s", hdev->name); 1436 1437 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); 1438 if (IS_ERR(skb)) 1439 BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb)); 1440 else 1441 kfree_skb(skb); 1442 1443 return 0; 1444 } 1445 1446 static int btusb_setup_csr(struct hci_dev *hdev) 1447 { 1448 struct hci_rp_read_local_version *rp; 1449 struct sk_buff *skb; 1450 1451 BT_DBG("%s", hdev->name); 1452 1453 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, 1454 HCI_INIT_TIMEOUT); 1455 if (IS_ERR(skb)) { 1456 int err = PTR_ERR(skb); 1457 BT_ERR("%s: CSR: Local version failed (%d)", hdev->name, err); 1458 return err; 1459 } 1460 1461 if (skb->len != sizeof(struct hci_rp_read_local_version)) { 1462 BT_ERR("%s: CSR: Local version length mismatch", hdev->name); 1463 kfree_skb(skb); 1464 return -EIO; 1465 } 1466 1467 rp = (struct hci_rp_read_local_version *)skb->data; 1468 1469 /* Detect controllers which aren't real CSR ones. */ 1470 if (le16_to_cpu(rp->manufacturer) != 10 || 1471 le16_to_cpu(rp->lmp_subver) == 0x0c5c) { 1472 /* Clear the reset quirk since this is not an actual 1473 * early Bluetooth 1.1 device from CSR. 1474 */ 1475 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 1476 1477 /* These fake CSR controllers have all a broken 1478 * stored link key handling and so just disable it. 1479 */ 1480 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 1481 } 1482 1483 kfree_skb(skb); 1484 1485 return 0; 1486 } 1487 1488 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, 1489 struct intel_version *ver) 1490 { 1491 const struct firmware *fw; 1492 char fwname[64]; 1493 int ret; 1494 1495 snprintf(fwname, sizeof(fwname), 1496 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", 1497 ver->hw_platform, ver->hw_variant, ver->hw_revision, 1498 ver->fw_variant, ver->fw_revision, ver->fw_build_num, 1499 ver->fw_build_ww, ver->fw_build_yy); 1500 1501 ret = request_firmware(&fw, fwname, &hdev->dev); 1502 if (ret < 0) { 1503 if (ret == -EINVAL) { 1504 BT_ERR("%s Intel firmware file request failed (%d)", 1505 hdev->name, ret); 1506 return NULL; 1507 } 1508 1509 BT_ERR("%s failed to open Intel firmware file: %s(%d)", 1510 hdev->name, fwname, ret); 1511 1512 /* If the correct firmware patch file is not found, use the 1513 * default firmware patch file instead 1514 */ 1515 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", 1516 ver->hw_platform, ver->hw_variant); 1517 if (request_firmware(&fw, fwname, &hdev->dev) < 0) { 1518 BT_ERR("%s failed to open default Intel fw file: %s", 1519 hdev->name, fwname); 1520 return NULL; 1521 } 1522 } 1523 1524 BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname); 1525 1526 return fw; 1527 } 1528 1529 static int btusb_setup_intel_patching(struct hci_dev *hdev, 1530 const struct firmware *fw, 1531 const u8 **fw_ptr, int *disable_patch) 1532 { 1533 struct sk_buff *skb; 1534 struct hci_command_hdr *cmd; 1535 const u8 *cmd_param; 1536 struct hci_event_hdr *evt = NULL; 1537 const u8 *evt_param = NULL; 1538 int remain = fw->size - (*fw_ptr - fw->data); 1539 1540 /* The first byte indicates the types of the patch command or event. 1541 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes 1542 * in the current firmware buffer doesn't start with 0x01 or 1543 * the size of remain buffer is smaller than HCI command header, 1544 * the firmware file is corrupted and it should stop the patching 1545 * process. 1546 */ 1547 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { 1548 BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name); 1549 return -EINVAL; 1550 } 1551 (*fw_ptr)++; 1552 remain--; 1553 1554 cmd = (struct hci_command_hdr *)(*fw_ptr); 1555 *fw_ptr += sizeof(*cmd); 1556 remain -= sizeof(*cmd); 1557 1558 /* Ensure that the remain firmware data is long enough than the length 1559 * of command parameter. If not, the firmware file is corrupted. 1560 */ 1561 if (remain < cmd->plen) { 1562 BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name); 1563 return -EFAULT; 1564 } 1565 1566 /* If there is a command that loads a patch in the firmware 1567 * file, then enable the patch upon success, otherwise just 1568 * disable the manufacturer mode, for example patch activation 1569 * is not required when the default firmware patch file is used 1570 * because there are no patch data to load. 1571 */ 1572 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) 1573 *disable_patch = 0; 1574 1575 cmd_param = *fw_ptr; 1576 *fw_ptr += cmd->plen; 1577 remain -= cmd->plen; 1578 1579 /* This reads the expected events when the above command is sent to the 1580 * device. Some vendor commands expects more than one events, for 1581 * example command status event followed by vendor specific event. 1582 * For this case, it only keeps the last expected event. so the command 1583 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of 1584 * last expected event. 1585 */ 1586 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { 1587 (*fw_ptr)++; 1588 remain--; 1589 1590 evt = (struct hci_event_hdr *)(*fw_ptr); 1591 *fw_ptr += sizeof(*evt); 1592 remain -= sizeof(*evt); 1593 1594 if (remain < evt->plen) { 1595 BT_ERR("%s Intel fw corrupted: invalid evt len", 1596 hdev->name); 1597 return -EFAULT; 1598 } 1599 1600 evt_param = *fw_ptr; 1601 *fw_ptr += evt->plen; 1602 remain -= evt->plen; 1603 } 1604 1605 /* Every HCI commands in the firmware file has its correspond event. 1606 * If event is not found or remain is smaller than zero, the firmware 1607 * file is corrupted. 1608 */ 1609 if (!evt || !evt_param || remain < 0) { 1610 BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name); 1611 return -EFAULT; 1612 } 1613 1614 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, 1615 cmd_param, evt->evt, HCI_INIT_TIMEOUT); 1616 if (IS_ERR(skb)) { 1617 BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)", 1618 hdev->name, cmd->opcode, PTR_ERR(skb)); 1619 return PTR_ERR(skb); 1620 } 1621 1622 /* It ensures that the returned event matches the event data read from 1623 * the firmware file. At fist, it checks the length and then 1624 * the contents of the event. 1625 */ 1626 if (skb->len != evt->plen) { 1627 BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name, 1628 le16_to_cpu(cmd->opcode)); 1629 kfree_skb(skb); 1630 return -EFAULT; 1631 } 1632 1633 if (memcmp(skb->data, evt_param, evt->plen)) { 1634 BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)", 1635 hdev->name, le16_to_cpu(cmd->opcode)); 1636 kfree_skb(skb); 1637 return -EFAULT; 1638 } 1639 kfree_skb(skb); 1640 1641 return 0; 1642 } 1643 1644 static int btusb_setup_intel(struct hci_dev *hdev) 1645 { 1646 struct sk_buff *skb; 1647 const struct firmware *fw; 1648 const u8 *fw_ptr; 1649 int disable_patch, err; 1650 struct intel_version ver; 1651 1652 BT_DBG("%s", hdev->name); 1653 1654 /* The controller has a bug with the first HCI command sent to it 1655 * returning number of completed commands as zero. This would stall the 1656 * command processing in the Bluetooth core. 1657 * 1658 * As a workaround, send HCI Reset command first which will reset the 1659 * number of completed commands and allow normal command processing 1660 * from now on. 1661 */ 1662 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 1663 if (IS_ERR(skb)) { 1664 BT_ERR("%s sending initial HCI reset command failed (%ld)", 1665 hdev->name, PTR_ERR(skb)); 1666 return PTR_ERR(skb); 1667 } 1668 kfree_skb(skb); 1669 1670 /* Read Intel specific controller version first to allow selection of 1671 * which firmware file to load. 1672 * 1673 * The returned information are hardware variant and revision plus 1674 * firmware variant, revision and build number. 1675 */ 1676 err = btintel_read_version(hdev, &ver); 1677 if (err) 1678 return err; 1679 1680 BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", 1681 hdev->name, ver.hw_platform, ver.hw_variant, ver.hw_revision, 1682 ver.fw_variant, ver.fw_revision, ver.fw_build_num, 1683 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); 1684 1685 /* fw_patch_num indicates the version of patch the device currently 1686 * have. If there is no patch data in the device, it is always 0x00. 1687 * So, if it is other than 0x00, no need to patch the device again. 1688 */ 1689 if (ver.fw_patch_num) { 1690 BT_INFO("%s: Intel device is already patched. patch num: %02x", 1691 hdev->name, ver.fw_patch_num); 1692 goto complete; 1693 } 1694 1695 /* Opens the firmware patch file based on the firmware version read 1696 * from the controller. If it fails to open the matching firmware 1697 * patch file, it tries to open the default firmware patch file. 1698 * If no patch file is found, allow the device to operate without 1699 * a patch. 1700 */ 1701 fw = btusb_setup_intel_get_fw(hdev, &ver); 1702 if (!fw) 1703 goto complete; 1704 fw_ptr = fw->data; 1705 1706 /* Enable the manufacturer mode of the controller. 1707 * Only while this mode is enabled, the driver can download the 1708 * firmware patch data and configuration parameters. 1709 */ 1710 err = btintel_enter_mfg(hdev); 1711 if (err) { 1712 release_firmware(fw); 1713 return err; 1714 } 1715 1716 disable_patch = 1; 1717 1718 /* The firmware data file consists of list of Intel specific HCI 1719 * commands and its expected events. The first byte indicates the 1720 * type of the message, either HCI command or HCI event. 1721 * 1722 * It reads the command and its expected event from the firmware file, 1723 * and send to the controller. Once __hci_cmd_sync_ev() returns, 1724 * the returned event is compared with the event read from the firmware 1725 * file and it will continue until all the messages are downloaded to 1726 * the controller. 1727 * 1728 * Once the firmware patching is completed successfully, 1729 * the manufacturer mode is disabled with reset and activating the 1730 * downloaded patch. 1731 * 1732 * If the firmware patching fails, the manufacturer mode is 1733 * disabled with reset and deactivating the patch. 1734 * 1735 * If the default patch file is used, no reset is done when disabling 1736 * the manufacturer. 1737 */ 1738 while (fw->size > fw_ptr - fw->data) { 1739 int ret; 1740 1741 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, 1742 &disable_patch); 1743 if (ret < 0) 1744 goto exit_mfg_deactivate; 1745 } 1746 1747 release_firmware(fw); 1748 1749 if (disable_patch) 1750 goto exit_mfg_disable; 1751 1752 /* Patching completed successfully and disable the manufacturer mode 1753 * with reset and activate the downloaded firmware patches. 1754 */ 1755 err = btintel_exit_mfg(hdev, true, true); 1756 if (err) 1757 return err; 1758 1759 BT_INFO("%s: Intel Bluetooth firmware patch completed and activated", 1760 hdev->name); 1761 1762 goto complete; 1763 1764 exit_mfg_disable: 1765 /* Disable the manufacturer mode without reset */ 1766 err = btintel_exit_mfg(hdev, false, false); 1767 if (err) 1768 return err; 1769 1770 BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name); 1771 1772 goto complete; 1773 1774 exit_mfg_deactivate: 1775 release_firmware(fw); 1776 1777 /* Patching failed. Disable the manufacturer mode with reset and 1778 * deactivate the downloaded firmware patches. 1779 */ 1780 err = btintel_exit_mfg(hdev, true, false); 1781 if (err) 1782 return err; 1783 1784 BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated", 1785 hdev->name); 1786 1787 complete: 1788 /* Set the event mask for Intel specific vendor events. This enables 1789 * a few extra events that are useful during general operation. 1790 */ 1791 btintel_set_event_mask_mfg(hdev, false); 1792 1793 btintel_check_bdaddr(hdev); 1794 return 0; 1795 } 1796 1797 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) 1798 { 1799 struct sk_buff *skb; 1800 struct hci_event_hdr *hdr; 1801 struct hci_ev_cmd_complete *evt; 1802 1803 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC); 1804 if (!skb) 1805 return -ENOMEM; 1806 1807 hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr)); 1808 hdr->evt = HCI_EV_CMD_COMPLETE; 1809 hdr->plen = sizeof(*evt) + 1; 1810 1811 evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt)); 1812 evt->ncmd = 0x01; 1813 evt->opcode = cpu_to_le16(opcode); 1814 1815 *skb_put(skb, 1) = 0x00; 1816 1817 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 1818 1819 return hci_recv_frame(hdev, skb); 1820 } 1821 1822 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, 1823 int count) 1824 { 1825 /* When the device is in bootloader mode, then it can send 1826 * events via the bulk endpoint. These events are treated the 1827 * same way as the ones received from the interrupt endpoint. 1828 */ 1829 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) 1830 return btusb_recv_intr(data, buffer, count); 1831 1832 return btusb_recv_bulk(data, buffer, count); 1833 } 1834 1835 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, 1836 unsigned int len) 1837 { 1838 const struct intel_bootup *evt = ptr; 1839 1840 if (len != sizeof(*evt)) 1841 return; 1842 1843 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) { 1844 smp_mb__after_atomic(); 1845 wake_up_bit(&data->flags, BTUSB_BOOTING); 1846 } 1847 } 1848 1849 static void btusb_intel_secure_send_result(struct btusb_data *data, 1850 const void *ptr, unsigned int len) 1851 { 1852 const struct intel_secure_send_result *evt = ptr; 1853 1854 if (len != sizeof(*evt)) 1855 return; 1856 1857 if (evt->result) 1858 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); 1859 1860 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && 1861 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) { 1862 smp_mb__after_atomic(); 1863 wake_up_bit(&data->flags, BTUSB_DOWNLOADING); 1864 } 1865 } 1866 1867 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) 1868 { 1869 struct btusb_data *data = hci_get_drvdata(hdev); 1870 1871 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1872 struct hci_event_hdr *hdr = (void *)skb->data; 1873 1874 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && 1875 hdr->plen > 0) { 1876 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; 1877 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; 1878 1879 switch (skb->data[2]) { 1880 case 0x02: 1881 /* When switching to the operational firmware 1882 * the device sends a vendor specific event 1883 * indicating that the bootup completed. 1884 */ 1885 btusb_intel_bootup(data, ptr, len); 1886 break; 1887 case 0x06: 1888 /* When the firmware loading completes the 1889 * device sends out a vendor specific event 1890 * indicating the result of the firmware 1891 * loading. 1892 */ 1893 btusb_intel_secure_send_result(data, ptr, len); 1894 break; 1895 } 1896 } 1897 } 1898 1899 return hci_recv_frame(hdev, skb); 1900 } 1901 1902 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) 1903 { 1904 struct btusb_data *data = hci_get_drvdata(hdev); 1905 struct urb *urb; 1906 1907 BT_DBG("%s", hdev->name); 1908 1909 switch (hci_skb_pkt_type(skb)) { 1910 case HCI_COMMAND_PKT: 1911 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1912 struct hci_command_hdr *cmd = (void *)skb->data; 1913 __u16 opcode = le16_to_cpu(cmd->opcode); 1914 1915 /* When in bootloader mode and the command 0xfc09 1916 * is received, it needs to be send down the 1917 * bulk endpoint. So allocate a bulk URB instead. 1918 */ 1919 if (opcode == 0xfc09) 1920 urb = alloc_bulk_urb(hdev, skb); 1921 else 1922 urb = alloc_ctrl_urb(hdev, skb); 1923 1924 /* When the 0xfc01 command is issued to boot into 1925 * the operational firmware, it will actually not 1926 * send a command complete event. To keep the flow 1927 * control working inject that event here. 1928 */ 1929 if (opcode == 0xfc01) 1930 inject_cmd_complete(hdev, opcode); 1931 } else { 1932 urb = alloc_ctrl_urb(hdev, skb); 1933 } 1934 if (IS_ERR(urb)) 1935 return PTR_ERR(urb); 1936 1937 hdev->stat.cmd_tx++; 1938 return submit_or_queue_tx_urb(hdev, urb); 1939 1940 case HCI_ACLDATA_PKT: 1941 urb = alloc_bulk_urb(hdev, skb); 1942 if (IS_ERR(urb)) 1943 return PTR_ERR(urb); 1944 1945 hdev->stat.acl_tx++; 1946 return submit_or_queue_tx_urb(hdev, urb); 1947 1948 case HCI_SCODATA_PKT: 1949 if (hci_conn_num(hdev, SCO_LINK) < 1) 1950 return -ENODEV; 1951 1952 urb = alloc_isoc_urb(hdev, skb); 1953 if (IS_ERR(urb)) 1954 return PTR_ERR(urb); 1955 1956 hdev->stat.sco_tx++; 1957 return submit_tx_urb(hdev, urb); 1958 } 1959 1960 return -EILSEQ; 1961 } 1962 1963 static int btusb_setup_intel_new(struct hci_dev *hdev) 1964 { 1965 static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01, 1966 0x00, 0x08, 0x04, 0x00 }; 1967 struct btusb_data *data = hci_get_drvdata(hdev); 1968 struct sk_buff *skb; 1969 struct intel_version ver; 1970 struct intel_boot_params *params; 1971 const struct firmware *fw; 1972 const u8 *fw_ptr; 1973 u32 frag_len; 1974 char fwname[64]; 1975 ktime_t calltime, delta, rettime; 1976 unsigned long long duration; 1977 int err; 1978 1979 BT_DBG("%s", hdev->name); 1980 1981 calltime = ktime_get(); 1982 1983 /* Read the Intel version information to determine if the device 1984 * is in bootloader mode or if it already has operational firmware 1985 * loaded. 1986 */ 1987 err = btintel_read_version(hdev, &ver); 1988 if (err) 1989 return err; 1990 1991 /* The hardware platform number has a fixed value of 0x37 and 1992 * for now only accept this single value. 1993 */ 1994 if (ver.hw_platform != 0x37) { 1995 BT_ERR("%s: Unsupported Intel hardware platform (%u)", 1996 hdev->name, ver.hw_platform); 1997 return -EINVAL; 1998 } 1999 2000 /* At the moment only the hardware variant iBT 3.0 (LnP/SfP) is 2001 * supported by this firmware loading method. This check has been 2002 * put in place to ensure correct forward compatibility options 2003 * when newer hardware variants come along. 2004 */ 2005 if (ver.hw_variant != 0x0b) { 2006 BT_ERR("%s: Unsupported Intel hardware variant (%u)", 2007 hdev->name, ver.hw_variant); 2008 return -EINVAL; 2009 } 2010 2011 btintel_version_info(hdev, &ver); 2012 2013 /* The firmware variant determines if the device is in bootloader 2014 * mode or is running operational firmware. The value 0x06 identifies 2015 * the bootloader and the value 0x23 identifies the operational 2016 * firmware. 2017 * 2018 * When the operational firmware is already present, then only 2019 * the check for valid Bluetooth device address is needed. This 2020 * determines if the device will be added as configured or 2021 * unconfigured controller. 2022 * 2023 * It is not possible to use the Secure Boot Parameters in this 2024 * case since that command is only available in bootloader mode. 2025 */ 2026 if (ver.fw_variant == 0x23) { 2027 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2028 btintel_check_bdaddr(hdev); 2029 return 0; 2030 } 2031 2032 /* If the device is not in bootloader mode, then the only possible 2033 * choice is to return an error and abort the device initialization. 2034 */ 2035 if (ver.fw_variant != 0x06) { 2036 BT_ERR("%s: Unsupported Intel firmware variant (%u)", 2037 hdev->name, ver.fw_variant); 2038 return -ENODEV; 2039 } 2040 2041 /* Read the secure boot parameters to identify the operating 2042 * details of the bootloader. 2043 */ 2044 skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT); 2045 if (IS_ERR(skb)) { 2046 BT_ERR("%s: Reading Intel boot parameters failed (%ld)", 2047 hdev->name, PTR_ERR(skb)); 2048 return PTR_ERR(skb); 2049 } 2050 2051 if (skb->len != sizeof(*params)) { 2052 BT_ERR("%s: Intel boot parameters size mismatch", hdev->name); 2053 kfree_skb(skb); 2054 return -EILSEQ; 2055 } 2056 2057 params = (struct intel_boot_params *)skb->data; 2058 2059 BT_INFO("%s: Device revision is %u", hdev->name, 2060 le16_to_cpu(params->dev_revid)); 2061 2062 BT_INFO("%s: Secure boot is %s", hdev->name, 2063 params->secure_boot ? "enabled" : "disabled"); 2064 2065 BT_INFO("%s: OTP lock is %s", hdev->name, 2066 params->otp_lock ? "enabled" : "disabled"); 2067 2068 BT_INFO("%s: API lock is %s", hdev->name, 2069 params->api_lock ? "enabled" : "disabled"); 2070 2071 BT_INFO("%s: Debug lock is %s", hdev->name, 2072 params->debug_lock ? "enabled" : "disabled"); 2073 2074 BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name, 2075 params->min_fw_build_nn, params->min_fw_build_cw, 2076 2000 + params->min_fw_build_yy); 2077 2078 /* It is required that every single firmware fragment is acknowledged 2079 * with a command complete event. If the boot parameters indicate 2080 * that this bootloader does not send them, then abort the setup. 2081 */ 2082 if (params->limited_cce != 0x00) { 2083 BT_ERR("%s: Unsupported Intel firmware loading method (%u)", 2084 hdev->name, params->limited_cce); 2085 kfree_skb(skb); 2086 return -EINVAL; 2087 } 2088 2089 /* If the OTP has no valid Bluetooth device address, then there will 2090 * also be no valid address for the operational firmware. 2091 */ 2092 if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) { 2093 BT_INFO("%s: No device address configured", hdev->name); 2094 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2095 } 2096 2097 /* With this Intel bootloader only the hardware variant and device 2098 * revision information are used to select the right firmware. 2099 * 2100 * Currently this bootloader support is limited to hardware variant 2101 * iBT 3.0 (LnP/SfP) which is identified by the value 11 (0x0b). 2102 */ 2103 snprintf(fwname, sizeof(fwname), "intel/ibt-11-%u.sfi", 2104 le16_to_cpu(params->dev_revid)); 2105 2106 err = request_firmware(&fw, fwname, &hdev->dev); 2107 if (err < 0) { 2108 BT_ERR("%s: Failed to load Intel firmware file (%d)", 2109 hdev->name, err); 2110 kfree_skb(skb); 2111 return err; 2112 } 2113 2114 BT_INFO("%s: Found device firmware: %s", hdev->name, fwname); 2115 2116 /* Save the DDC file name for later use to apply once the firmware 2117 * downloading is done. 2118 */ 2119 snprintf(fwname, sizeof(fwname), "intel/ibt-11-%u.ddc", 2120 le16_to_cpu(params->dev_revid)); 2121 2122 kfree_skb(skb); 2123 2124 if (fw->size < 644) { 2125 BT_ERR("%s: Invalid size of firmware file (%zu)", 2126 hdev->name, fw->size); 2127 err = -EBADF; 2128 goto done; 2129 } 2130 2131 set_bit(BTUSB_DOWNLOADING, &data->flags); 2132 2133 /* Start the firmware download transaction with the Init fragment 2134 * represented by the 128 bytes of CSS header. 2135 */ 2136 err = btintel_secure_send(hdev, 0x00, 128, fw->data); 2137 if (err < 0) { 2138 BT_ERR("%s: Failed to send firmware header (%d)", 2139 hdev->name, err); 2140 goto done; 2141 } 2142 2143 /* Send the 256 bytes of public key information from the firmware 2144 * as the PKey fragment. 2145 */ 2146 err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128); 2147 if (err < 0) { 2148 BT_ERR("%s: Failed to send firmware public key (%d)", 2149 hdev->name, err); 2150 goto done; 2151 } 2152 2153 /* Send the 256 bytes of signature information from the firmware 2154 * as the Sign fragment. 2155 */ 2156 err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388); 2157 if (err < 0) { 2158 BT_ERR("%s: Failed to send firmware signature (%d)", 2159 hdev->name, err); 2160 goto done; 2161 } 2162 2163 fw_ptr = fw->data + 644; 2164 frag_len = 0; 2165 2166 while (fw_ptr - fw->data < fw->size) { 2167 struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len); 2168 2169 frag_len += sizeof(*cmd) + cmd->plen; 2170 2171 /* The parameter length of the secure send command requires 2172 * a 4 byte alignment. It happens so that the firmware file 2173 * contains proper Intel_NOP commands to align the fragments 2174 * as needed. 2175 * 2176 * Send set of commands with 4 byte alignment from the 2177 * firmware data buffer as a single Data fragement. 2178 */ 2179 if (!(frag_len % 4)) { 2180 err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr); 2181 if (err < 0) { 2182 BT_ERR("%s: Failed to send firmware data (%d)", 2183 hdev->name, err); 2184 goto done; 2185 } 2186 2187 fw_ptr += frag_len; 2188 frag_len = 0; 2189 } 2190 } 2191 2192 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2193 2194 BT_INFO("%s: Waiting for firmware download to complete", hdev->name); 2195 2196 /* Before switching the device into operational mode and with that 2197 * booting the loaded firmware, wait for the bootloader notification 2198 * that all fragments have been successfully received. 2199 * 2200 * When the event processing receives the notification, then the 2201 * BTUSB_DOWNLOADING flag will be cleared. 2202 * 2203 * The firmware loading should not take longer than 5 seconds 2204 * and thus just timeout if that happens and fail the setup 2205 * of this device. 2206 */ 2207 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, 2208 TASK_INTERRUPTIBLE, 2209 msecs_to_jiffies(5000)); 2210 if (err == 1) { 2211 BT_ERR("%s: Firmware loading interrupted", hdev->name); 2212 err = -EINTR; 2213 goto done; 2214 } 2215 2216 if (err) { 2217 BT_ERR("%s: Firmware loading timeout", hdev->name); 2218 err = -ETIMEDOUT; 2219 goto done; 2220 } 2221 2222 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { 2223 BT_ERR("%s: Firmware loading failed", hdev->name); 2224 err = -ENOEXEC; 2225 goto done; 2226 } 2227 2228 rettime = ktime_get(); 2229 delta = ktime_sub(rettime, calltime); 2230 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2231 2232 BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration); 2233 2234 done: 2235 release_firmware(fw); 2236 2237 if (err < 0) 2238 return err; 2239 2240 calltime = ktime_get(); 2241 2242 set_bit(BTUSB_BOOTING, &data->flags); 2243 2244 skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param, 2245 HCI_INIT_TIMEOUT); 2246 if (IS_ERR(skb)) 2247 return PTR_ERR(skb); 2248 2249 kfree_skb(skb); 2250 2251 /* The bootloader will not indicate when the device is ready. This 2252 * is done by the operational firmware sending bootup notification. 2253 * 2254 * Booting into operational firmware should not take longer than 2255 * 1 second. However if that happens, then just fail the setup 2256 * since something went wrong. 2257 */ 2258 BT_INFO("%s: Waiting for device to boot", hdev->name); 2259 2260 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, 2261 TASK_INTERRUPTIBLE, 2262 msecs_to_jiffies(1000)); 2263 2264 if (err == 1) { 2265 BT_ERR("%s: Device boot interrupted", hdev->name); 2266 return -EINTR; 2267 } 2268 2269 if (err) { 2270 BT_ERR("%s: Device boot timeout", hdev->name); 2271 return -ETIMEDOUT; 2272 } 2273 2274 rettime = ktime_get(); 2275 delta = ktime_sub(rettime, calltime); 2276 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2277 2278 BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration); 2279 2280 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2281 2282 /* Once the device is running in operational mode, it needs to apply 2283 * the device configuration (DDC) parameters. 2284 * 2285 * The device can work without DDC parameters, so even if it fails 2286 * to load the file, no need to fail the setup. 2287 */ 2288 btintel_load_ddc_config(hdev, fwname); 2289 2290 /* Set the event mask for Intel specific vendor events. This enables 2291 * a few extra events that are useful during general operation. It 2292 * does not enable any debugging related events. 2293 * 2294 * The device will function correctly without these events enabled 2295 * and thus no need to fail the setup. 2296 */ 2297 btintel_set_event_mask(hdev, false); 2298 2299 return 0; 2300 } 2301 2302 static int btusb_shutdown_intel(struct hci_dev *hdev) 2303 { 2304 struct sk_buff *skb; 2305 long ret; 2306 2307 /* Some platforms have an issue with BT LED when the interface is 2308 * down or BT radio is turned off, which takes 5 seconds to BT LED 2309 * goes off. This command turns off the BT LED immediately. 2310 */ 2311 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); 2312 if (IS_ERR(skb)) { 2313 ret = PTR_ERR(skb); 2314 BT_ERR("%s: turning off Intel device LED failed (%ld)", 2315 hdev->name, ret); 2316 return ret; 2317 } 2318 kfree_skb(skb); 2319 2320 return 0; 2321 } 2322 2323 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, 2324 const bdaddr_t *bdaddr) 2325 { 2326 struct sk_buff *skb; 2327 u8 buf[8]; 2328 long ret; 2329 2330 buf[0] = 0xfe; 2331 buf[1] = sizeof(bdaddr_t); 2332 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); 2333 2334 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2335 if (IS_ERR(skb)) { 2336 ret = PTR_ERR(skb); 2337 BT_ERR("%s: changing Marvell device address failed (%ld)", 2338 hdev->name, ret); 2339 return ret; 2340 } 2341 kfree_skb(skb); 2342 2343 return 0; 2344 } 2345 2346 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, 2347 const bdaddr_t *bdaddr) 2348 { 2349 struct sk_buff *skb; 2350 u8 buf[10]; 2351 long ret; 2352 2353 buf[0] = 0x01; 2354 buf[1] = 0x01; 2355 buf[2] = 0x00; 2356 buf[3] = sizeof(bdaddr_t); 2357 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); 2358 2359 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2360 if (IS_ERR(skb)) { 2361 ret = PTR_ERR(skb); 2362 BT_ERR("%s: Change address command failed (%ld)", 2363 hdev->name, ret); 2364 return ret; 2365 } 2366 kfree_skb(skb); 2367 2368 return 0; 2369 } 2370 2371 #define QCA_DFU_PACKET_LEN 4096 2372 2373 #define QCA_GET_TARGET_VERSION 0x09 2374 #define QCA_CHECK_STATUS 0x05 2375 #define QCA_DFU_DOWNLOAD 0x01 2376 2377 #define QCA_SYSCFG_UPDATED 0x40 2378 #define QCA_PATCH_UPDATED 0x80 2379 #define QCA_DFU_TIMEOUT 3000 2380 2381 struct qca_version { 2382 __le32 rom_version; 2383 __le32 patch_version; 2384 __le32 ram_version; 2385 __le32 ref_clock; 2386 __u8 reserved[4]; 2387 } __packed; 2388 2389 struct qca_rampatch_version { 2390 __le16 rom_version; 2391 __le16 patch_version; 2392 } __packed; 2393 2394 struct qca_device_info { 2395 u32 rom_version; 2396 u8 rampatch_hdr; /* length of header in rampatch */ 2397 u8 nvm_hdr; /* length of header in NVM */ 2398 u8 ver_offset; /* offset of version structure in rampatch */ 2399 }; 2400 2401 static const struct qca_device_info qca_devices_table[] = { 2402 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */ 2403 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */ 2404 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */ 2405 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */ 2406 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */ 2407 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */ 2408 }; 2409 2410 static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request, 2411 void *data, u16 size) 2412 { 2413 struct btusb_data *btdata = hci_get_drvdata(hdev); 2414 struct usb_device *udev = btdata->udev; 2415 int pipe, err; 2416 u8 *buf; 2417 2418 buf = kmalloc(size, GFP_KERNEL); 2419 if (!buf) 2420 return -ENOMEM; 2421 2422 /* Found some of USB hosts have IOT issues with ours so that we should 2423 * not wait until HCI layer is ready. 2424 */ 2425 pipe = usb_rcvctrlpipe(udev, 0); 2426 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, 2427 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2428 if (err < 0) { 2429 BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err); 2430 goto done; 2431 } 2432 2433 memcpy(data, buf, size); 2434 2435 done: 2436 kfree(buf); 2437 2438 return err; 2439 } 2440 2441 static int btusb_setup_qca_download_fw(struct hci_dev *hdev, 2442 const struct firmware *firmware, 2443 size_t hdr_size) 2444 { 2445 struct btusb_data *btdata = hci_get_drvdata(hdev); 2446 struct usb_device *udev = btdata->udev; 2447 size_t count, size, sent = 0; 2448 int pipe, len, err; 2449 u8 *buf; 2450 2451 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); 2452 if (!buf) 2453 return -ENOMEM; 2454 2455 count = firmware->size; 2456 2457 size = min_t(size_t, count, hdr_size); 2458 memcpy(buf, firmware->data, size); 2459 2460 /* USB patches should go down to controller through USB path 2461 * because binary format fits to go down through USB channel. 2462 * USB control path is for patching headers and USB bulk is for 2463 * patch body. 2464 */ 2465 pipe = usb_sndctrlpipe(udev, 0); 2466 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, 2467 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2468 if (err < 0) { 2469 BT_ERR("%s: Failed to send headers (%d)", hdev->name, err); 2470 goto done; 2471 } 2472 2473 sent += size; 2474 count -= size; 2475 2476 while (count) { 2477 size = min_t(size_t, count, QCA_DFU_PACKET_LEN); 2478 2479 memcpy(buf, firmware->data + sent, size); 2480 2481 pipe = usb_sndbulkpipe(udev, 0x02); 2482 err = usb_bulk_msg(udev, pipe, buf, size, &len, 2483 QCA_DFU_TIMEOUT); 2484 if (err < 0) { 2485 BT_ERR("%s: Failed to send body at %zd of %zd (%d)", 2486 hdev->name, sent, firmware->size, err); 2487 break; 2488 } 2489 2490 if (size != len) { 2491 BT_ERR("%s: Failed to get bulk buffer", hdev->name); 2492 err = -EILSEQ; 2493 break; 2494 } 2495 2496 sent += size; 2497 count -= size; 2498 } 2499 2500 done: 2501 kfree(buf); 2502 return err; 2503 } 2504 2505 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, 2506 struct qca_version *ver, 2507 const struct qca_device_info *info) 2508 { 2509 struct qca_rampatch_version *rver; 2510 const struct firmware *fw; 2511 u32 ver_rom, ver_patch; 2512 u16 rver_rom, rver_patch; 2513 char fwname[64]; 2514 int err; 2515 2516 ver_rom = le32_to_cpu(ver->rom_version); 2517 ver_patch = le32_to_cpu(ver->patch_version); 2518 2519 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); 2520 2521 err = request_firmware(&fw, fwname, &hdev->dev); 2522 if (err) { 2523 BT_ERR("%s: failed to request rampatch file: %s (%d)", 2524 hdev->name, fwname, err); 2525 return err; 2526 } 2527 2528 BT_INFO("%s: using rampatch file: %s", hdev->name, fwname); 2529 2530 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); 2531 rver_rom = le16_to_cpu(rver->rom_version); 2532 rver_patch = le16_to_cpu(rver->patch_version); 2533 2534 BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x " 2535 "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom, 2536 ver_patch); 2537 2538 if (rver_rom != ver_rom || rver_patch <= ver_patch) { 2539 BT_ERR("%s: rampatch file version did not match with firmware", 2540 hdev->name); 2541 err = -EINVAL; 2542 goto done; 2543 } 2544 2545 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); 2546 2547 done: 2548 release_firmware(fw); 2549 2550 return err; 2551 } 2552 2553 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, 2554 struct qca_version *ver, 2555 const struct qca_device_info *info) 2556 { 2557 const struct firmware *fw; 2558 char fwname[64]; 2559 int err; 2560 2561 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", 2562 le32_to_cpu(ver->rom_version)); 2563 2564 err = request_firmware(&fw, fwname, &hdev->dev); 2565 if (err) { 2566 BT_ERR("%s: failed to request NVM file: %s (%d)", 2567 hdev->name, fwname, err); 2568 return err; 2569 } 2570 2571 BT_INFO("%s: using NVM file: %s", hdev->name, fwname); 2572 2573 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); 2574 2575 release_firmware(fw); 2576 2577 return err; 2578 } 2579 2580 static int btusb_setup_qca(struct hci_dev *hdev) 2581 { 2582 const struct qca_device_info *info = NULL; 2583 struct qca_version ver; 2584 u32 ver_rom; 2585 u8 status; 2586 int i, err; 2587 2588 err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver, 2589 sizeof(ver)); 2590 if (err < 0) 2591 return err; 2592 2593 ver_rom = le32_to_cpu(ver.rom_version); 2594 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { 2595 if (ver_rom == qca_devices_table[i].rom_version) 2596 info = &qca_devices_table[i]; 2597 } 2598 if (!info) { 2599 BT_ERR("%s: don't support firmware rome 0x%x", hdev->name, 2600 ver_rom); 2601 return -ENODEV; 2602 } 2603 2604 err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status, 2605 sizeof(status)); 2606 if (err < 0) 2607 return err; 2608 2609 if (!(status & QCA_PATCH_UPDATED)) { 2610 err = btusb_setup_qca_load_rampatch(hdev, &ver, info); 2611 if (err < 0) 2612 return err; 2613 } 2614 2615 if (!(status & QCA_SYSCFG_UPDATED)) { 2616 err = btusb_setup_qca_load_nvm(hdev, &ver, info); 2617 if (err < 0) 2618 return err; 2619 } 2620 2621 return 0; 2622 } 2623 2624 #ifdef CONFIG_BT_HCIBTUSB_BCM 2625 static inline int __set_diag_interface(struct hci_dev *hdev) 2626 { 2627 struct btusb_data *data = hci_get_drvdata(hdev); 2628 struct usb_interface *intf = data->diag; 2629 int i; 2630 2631 if (!data->diag) 2632 return -ENODEV; 2633 2634 data->diag_tx_ep = NULL; 2635 data->diag_rx_ep = NULL; 2636 2637 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2638 struct usb_endpoint_descriptor *ep_desc; 2639 2640 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2641 2642 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2643 data->diag_tx_ep = ep_desc; 2644 continue; 2645 } 2646 2647 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2648 data->diag_rx_ep = ep_desc; 2649 continue; 2650 } 2651 } 2652 2653 if (!data->diag_tx_ep || !data->diag_rx_ep) { 2654 BT_ERR("%s invalid diagnostic descriptors", hdev->name); 2655 return -ENODEV; 2656 } 2657 2658 return 0; 2659 } 2660 2661 static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) 2662 { 2663 struct btusb_data *data = hci_get_drvdata(hdev); 2664 struct sk_buff *skb; 2665 struct urb *urb; 2666 unsigned int pipe; 2667 2668 if (!data->diag_tx_ep) 2669 return ERR_PTR(-ENODEV); 2670 2671 urb = usb_alloc_urb(0, GFP_KERNEL); 2672 if (!urb) 2673 return ERR_PTR(-ENOMEM); 2674 2675 skb = bt_skb_alloc(2, GFP_KERNEL); 2676 if (!skb) { 2677 usb_free_urb(urb); 2678 return ERR_PTR(-ENOMEM); 2679 } 2680 2681 *skb_put(skb, 1) = 0xf0; 2682 *skb_put(skb, 1) = enable; 2683 2684 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); 2685 2686 usb_fill_bulk_urb(urb, data->udev, pipe, 2687 skb->data, skb->len, btusb_tx_complete, skb); 2688 2689 skb->dev = (void *)hdev; 2690 2691 return urb; 2692 } 2693 2694 static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) 2695 { 2696 struct btusb_data *data = hci_get_drvdata(hdev); 2697 struct urb *urb; 2698 2699 if (!data->diag) 2700 return -ENODEV; 2701 2702 if (!test_bit(HCI_RUNNING, &hdev->flags)) 2703 return -ENETDOWN; 2704 2705 urb = alloc_diag_urb(hdev, enable); 2706 if (IS_ERR(urb)) 2707 return PTR_ERR(urb); 2708 2709 return submit_or_queue_tx_urb(hdev, urb); 2710 } 2711 #endif 2712 2713 static int btusb_probe(struct usb_interface *intf, 2714 const struct usb_device_id *id) 2715 { 2716 struct usb_endpoint_descriptor *ep_desc; 2717 struct btusb_data *data; 2718 struct hci_dev *hdev; 2719 unsigned ifnum_base; 2720 int i, err; 2721 2722 BT_DBG("intf %p id %p", intf, id); 2723 2724 /* interface numbers are hardcoded in the spec */ 2725 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { 2726 if (!(id->driver_info & BTUSB_IFNUM_2)) 2727 return -ENODEV; 2728 if (intf->cur_altsetting->desc.bInterfaceNumber != 2) 2729 return -ENODEV; 2730 } 2731 2732 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; 2733 2734 if (!id->driver_info) { 2735 const struct usb_device_id *match; 2736 2737 match = usb_match_id(intf, blacklist_table); 2738 if (match) 2739 id = match; 2740 } 2741 2742 if (id->driver_info == BTUSB_IGNORE) 2743 return -ENODEV; 2744 2745 if (id->driver_info & BTUSB_ATH3012) { 2746 struct usb_device *udev = interface_to_usbdev(intf); 2747 2748 /* Old firmware would otherwise let ath3k driver load 2749 * patch and sysconfig files */ 2750 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001) 2751 return -ENODEV; 2752 } 2753 2754 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); 2755 if (!data) 2756 return -ENOMEM; 2757 2758 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2759 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2760 2761 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { 2762 data->intr_ep = ep_desc; 2763 continue; 2764 } 2765 2766 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2767 data->bulk_tx_ep = ep_desc; 2768 continue; 2769 } 2770 2771 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2772 data->bulk_rx_ep = ep_desc; 2773 continue; 2774 } 2775 } 2776 2777 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) 2778 return -ENODEV; 2779 2780 if (id->driver_info & BTUSB_AMP) { 2781 data->cmdreq_type = USB_TYPE_CLASS | 0x01; 2782 data->cmdreq = 0x2b; 2783 } else { 2784 data->cmdreq_type = USB_TYPE_CLASS; 2785 data->cmdreq = 0x00; 2786 } 2787 2788 data->udev = interface_to_usbdev(intf); 2789 data->intf = intf; 2790 2791 INIT_WORK(&data->work, btusb_work); 2792 INIT_WORK(&data->waker, btusb_waker); 2793 init_usb_anchor(&data->deferred); 2794 init_usb_anchor(&data->tx_anchor); 2795 spin_lock_init(&data->txlock); 2796 2797 init_usb_anchor(&data->intr_anchor); 2798 init_usb_anchor(&data->bulk_anchor); 2799 init_usb_anchor(&data->isoc_anchor); 2800 init_usb_anchor(&data->diag_anchor); 2801 spin_lock_init(&data->rxlock); 2802 2803 if (id->driver_info & BTUSB_INTEL_NEW) { 2804 data->recv_event = btusb_recv_event_intel; 2805 data->recv_bulk = btusb_recv_bulk_intel; 2806 set_bit(BTUSB_BOOTLOADER, &data->flags); 2807 } else { 2808 data->recv_event = hci_recv_frame; 2809 data->recv_bulk = btusb_recv_bulk; 2810 } 2811 2812 hdev = hci_alloc_dev(); 2813 if (!hdev) 2814 return -ENOMEM; 2815 2816 hdev->bus = HCI_USB; 2817 hci_set_drvdata(hdev, data); 2818 2819 if (id->driver_info & BTUSB_AMP) 2820 hdev->dev_type = HCI_AMP; 2821 else 2822 hdev->dev_type = HCI_BREDR; 2823 2824 data->hdev = hdev; 2825 2826 SET_HCIDEV_DEV(hdev, &intf->dev); 2827 2828 hdev->open = btusb_open; 2829 hdev->close = btusb_close; 2830 hdev->flush = btusb_flush; 2831 hdev->send = btusb_send_frame; 2832 hdev->notify = btusb_notify; 2833 2834 if (id->driver_info & BTUSB_BCM2045) 2835 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 2836 2837 if (id->driver_info & BTUSB_BCM92035) 2838 hdev->setup = btusb_setup_bcm92035; 2839 2840 #ifdef CONFIG_BT_HCIBTUSB_BCM 2841 if (id->driver_info & BTUSB_BCM_PATCHRAM) { 2842 hdev->manufacturer = 15; 2843 hdev->setup = btbcm_setup_patchram; 2844 hdev->set_diag = btusb_bcm_set_diag; 2845 hdev->set_bdaddr = btbcm_set_bdaddr; 2846 2847 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 2848 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 2849 } 2850 2851 if (id->driver_info & BTUSB_BCM_APPLE) { 2852 hdev->manufacturer = 15; 2853 hdev->setup = btbcm_setup_apple; 2854 hdev->set_diag = btusb_bcm_set_diag; 2855 2856 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 2857 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 2858 } 2859 #endif 2860 2861 if (id->driver_info & BTUSB_INTEL) { 2862 hdev->manufacturer = 2; 2863 hdev->setup = btusb_setup_intel; 2864 hdev->shutdown = btusb_shutdown_intel; 2865 hdev->set_diag = btintel_set_diag_mfg; 2866 hdev->set_bdaddr = btintel_set_bdaddr; 2867 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2868 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2869 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 2870 } 2871 2872 if (id->driver_info & BTUSB_INTEL_NEW) { 2873 hdev->manufacturer = 2; 2874 hdev->send = btusb_send_frame_intel; 2875 hdev->setup = btusb_setup_intel_new; 2876 hdev->hw_error = btintel_hw_error; 2877 hdev->set_diag = btintel_set_diag; 2878 hdev->set_bdaddr = btintel_set_bdaddr; 2879 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2880 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 2881 } 2882 2883 if (id->driver_info & BTUSB_MARVELL) 2884 hdev->set_bdaddr = btusb_set_bdaddr_marvell; 2885 2886 if (id->driver_info & BTUSB_SWAVE) { 2887 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); 2888 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); 2889 } 2890 2891 if (id->driver_info & BTUSB_INTEL_BOOT) { 2892 hdev->manufacturer = 2; 2893 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 2894 } 2895 2896 if (id->driver_info & BTUSB_ATH3012) { 2897 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 2898 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2899 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2900 } 2901 2902 if (id->driver_info & BTUSB_QCA_ROME) { 2903 data->setup_on_usb = btusb_setup_qca; 2904 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 2905 } 2906 2907 #ifdef CONFIG_BT_HCIBTUSB_RTL 2908 if (id->driver_info & BTUSB_REALTEK) { 2909 hdev->setup = btrtl_setup_realtek; 2910 2911 /* Realtek devices lose their updated firmware over suspend, 2912 * but the USB hub doesn't notice any status change. 2913 * Explicitly request a device reset on resume. 2914 */ 2915 set_bit(BTUSB_RESET_RESUME, &data->flags); 2916 } 2917 #endif 2918 2919 if (id->driver_info & BTUSB_AMP) { 2920 /* AMP controllers do not support SCO packets */ 2921 data->isoc = NULL; 2922 } else { 2923 /* Interface orders are hardcoded in the specification */ 2924 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); 2925 } 2926 2927 if (!reset) 2928 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2929 2930 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { 2931 if (!disable_scofix) 2932 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); 2933 } 2934 2935 if (id->driver_info & BTUSB_BROKEN_ISOC) 2936 data->isoc = NULL; 2937 2938 if (id->driver_info & BTUSB_DIGIANSWER) { 2939 data->cmdreq_type = USB_TYPE_VENDOR; 2940 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2941 } 2942 2943 if (id->driver_info & BTUSB_CSR) { 2944 struct usb_device *udev = data->udev; 2945 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); 2946 2947 /* Old firmware would otherwise execute USB reset */ 2948 if (bcdDevice < 0x117) 2949 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2950 2951 /* Fake CSR devices with broken commands */ 2952 if (bcdDevice <= 0x100 || bcdDevice == 0x134) 2953 hdev->setup = btusb_setup_csr; 2954 2955 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2956 } 2957 2958 if (id->driver_info & BTUSB_SNIFFER) { 2959 struct usb_device *udev = data->udev; 2960 2961 /* New sniffer firmware has crippled HCI interface */ 2962 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) 2963 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 2964 } 2965 2966 if (id->driver_info & BTUSB_INTEL_BOOT) { 2967 /* A bug in the bootloader causes that interrupt interface is 2968 * only enabled after receiving SetInterface(0, AltSetting=0). 2969 */ 2970 err = usb_set_interface(data->udev, 0, 0); 2971 if (err < 0) { 2972 BT_ERR("failed to set interface 0, alt 0 %d", err); 2973 hci_free_dev(hdev); 2974 return err; 2975 } 2976 } 2977 2978 if (data->isoc) { 2979 err = usb_driver_claim_interface(&btusb_driver, 2980 data->isoc, data); 2981 if (err < 0) { 2982 hci_free_dev(hdev); 2983 return err; 2984 } 2985 } 2986 2987 #ifdef CONFIG_BT_HCIBTUSB_BCM 2988 if (data->diag) { 2989 if (!usb_driver_claim_interface(&btusb_driver, 2990 data->diag, data)) 2991 __set_diag_interface(hdev); 2992 else 2993 data->diag = NULL; 2994 } 2995 #endif 2996 2997 err = hci_register_dev(hdev); 2998 if (err < 0) { 2999 hci_free_dev(hdev); 3000 return err; 3001 } 3002 3003 usb_set_intfdata(intf, data); 3004 3005 return 0; 3006 } 3007 3008 static void btusb_disconnect(struct usb_interface *intf) 3009 { 3010 struct btusb_data *data = usb_get_intfdata(intf); 3011 struct hci_dev *hdev; 3012 3013 BT_DBG("intf %p", intf); 3014 3015 if (!data) 3016 return; 3017 3018 hdev = data->hdev; 3019 usb_set_intfdata(data->intf, NULL); 3020 3021 if (data->isoc) 3022 usb_set_intfdata(data->isoc, NULL); 3023 3024 if (data->diag) 3025 usb_set_intfdata(data->diag, NULL); 3026 3027 hci_unregister_dev(hdev); 3028 3029 if (intf == data->intf) { 3030 if (data->isoc) 3031 usb_driver_release_interface(&btusb_driver, data->isoc); 3032 if (data->diag) 3033 usb_driver_release_interface(&btusb_driver, data->diag); 3034 } else if (intf == data->isoc) { 3035 if (data->diag) 3036 usb_driver_release_interface(&btusb_driver, data->diag); 3037 usb_driver_release_interface(&btusb_driver, data->intf); 3038 } else if (intf == data->diag) { 3039 usb_driver_release_interface(&btusb_driver, data->intf); 3040 if (data->isoc) 3041 usb_driver_release_interface(&btusb_driver, data->isoc); 3042 } 3043 3044 hci_free_dev(hdev); 3045 } 3046 3047 #ifdef CONFIG_PM 3048 static int btusb_suspend(struct usb_interface *intf, pm_message_t message) 3049 { 3050 struct btusb_data *data = usb_get_intfdata(intf); 3051 3052 BT_DBG("intf %p", intf); 3053 3054 if (data->suspend_count++) 3055 return 0; 3056 3057 spin_lock_irq(&data->txlock); 3058 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { 3059 set_bit(BTUSB_SUSPENDING, &data->flags); 3060 spin_unlock_irq(&data->txlock); 3061 } else { 3062 spin_unlock_irq(&data->txlock); 3063 data->suspend_count--; 3064 return -EBUSY; 3065 } 3066 3067 cancel_work_sync(&data->work); 3068 3069 btusb_stop_traffic(data); 3070 usb_kill_anchored_urbs(&data->tx_anchor); 3071 3072 /* Optionally request a device reset on resume, but only when 3073 * wakeups are disabled. If wakeups are enabled we assume the 3074 * device will stay powered up throughout suspend. 3075 */ 3076 if (test_bit(BTUSB_RESET_RESUME, &data->flags) && 3077 !device_may_wakeup(&data->udev->dev)) 3078 data->udev->reset_resume = 1; 3079 3080 return 0; 3081 } 3082 3083 static void play_deferred(struct btusb_data *data) 3084 { 3085 struct urb *urb; 3086 int err; 3087 3088 while ((urb = usb_get_from_anchor(&data->deferred))) { 3089 err = usb_submit_urb(urb, GFP_ATOMIC); 3090 if (err < 0) 3091 break; 3092 3093 data->tx_in_flight++; 3094 } 3095 usb_scuttle_anchored_urbs(&data->deferred); 3096 } 3097 3098 static int btusb_resume(struct usb_interface *intf) 3099 { 3100 struct btusb_data *data = usb_get_intfdata(intf); 3101 struct hci_dev *hdev = data->hdev; 3102 int err = 0; 3103 3104 BT_DBG("intf %p", intf); 3105 3106 if (--data->suspend_count) 3107 return 0; 3108 3109 if (!test_bit(HCI_RUNNING, &hdev->flags)) 3110 goto done; 3111 3112 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { 3113 err = btusb_submit_intr_urb(hdev, GFP_NOIO); 3114 if (err < 0) { 3115 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 3116 goto failed; 3117 } 3118 } 3119 3120 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { 3121 err = btusb_submit_bulk_urb(hdev, GFP_NOIO); 3122 if (err < 0) { 3123 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 3124 goto failed; 3125 } 3126 3127 btusb_submit_bulk_urb(hdev, GFP_NOIO); 3128 } 3129 3130 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 3131 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) 3132 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 3133 else 3134 btusb_submit_isoc_urb(hdev, GFP_NOIO); 3135 } 3136 3137 spin_lock_irq(&data->txlock); 3138 play_deferred(data); 3139 clear_bit(BTUSB_SUSPENDING, &data->flags); 3140 spin_unlock_irq(&data->txlock); 3141 schedule_work(&data->work); 3142 3143 return 0; 3144 3145 failed: 3146 usb_scuttle_anchored_urbs(&data->deferred); 3147 done: 3148 spin_lock_irq(&data->txlock); 3149 clear_bit(BTUSB_SUSPENDING, &data->flags); 3150 spin_unlock_irq(&data->txlock); 3151 3152 return err; 3153 } 3154 #endif 3155 3156 static struct usb_driver btusb_driver = { 3157 .name = "btusb", 3158 .probe = btusb_probe, 3159 .disconnect = btusb_disconnect, 3160 #ifdef CONFIG_PM 3161 .suspend = btusb_suspend, 3162 .resume = btusb_resume, 3163 #endif 3164 .id_table = btusb_table, 3165 .supports_autosuspend = 1, 3166 .disable_hub_initiated_lpm = 1, 3167 }; 3168 3169 module_usb_driver(btusb_driver); 3170 3171 module_param(disable_scofix, bool, 0644); 3172 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); 3173 3174 module_param(force_scofix, bool, 0644); 3175 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); 3176 3177 module_param(reset, bool, 0644); 3178 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); 3179 3180 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); 3181 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); 3182 MODULE_VERSION(VERSION); 3183 MODULE_LICENSE("GPL"); 3184