1 /* 2 * 3 * Generic Bluetooth USB driver 4 * 5 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> 6 * 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 21 * 22 */ 23 24 #include <linux/module.h> 25 #include <linux/usb.h> 26 #include <linux/firmware.h> 27 #include <asm/unaligned.h> 28 29 #include <net/bluetooth/bluetooth.h> 30 #include <net/bluetooth/hci_core.h> 31 32 #include "btintel.h" 33 #include "btbcm.h" 34 #include "btrtl.h" 35 36 #define VERSION "0.8" 37 38 static bool disable_scofix; 39 static bool force_scofix; 40 41 static bool reset = true; 42 43 static struct usb_driver btusb_driver; 44 45 #define BTUSB_IGNORE 0x01 46 #define BTUSB_DIGIANSWER 0x02 47 #define BTUSB_CSR 0x04 48 #define BTUSB_SNIFFER 0x08 49 #define BTUSB_BCM92035 0x10 50 #define BTUSB_BROKEN_ISOC 0x20 51 #define BTUSB_WRONG_SCO_MTU 0x40 52 #define BTUSB_ATH3012 0x80 53 #define BTUSB_INTEL 0x100 54 #define BTUSB_INTEL_BOOT 0x200 55 #define BTUSB_BCM_PATCHRAM 0x400 56 #define BTUSB_MARVELL 0x800 57 #define BTUSB_SWAVE 0x1000 58 #define BTUSB_INTEL_NEW 0x2000 59 #define BTUSB_AMP 0x4000 60 #define BTUSB_QCA_ROME 0x8000 61 #define BTUSB_BCM_APPLE 0x10000 62 #define BTUSB_REALTEK 0x20000 63 #define BTUSB_BCM2045 0x40000 64 #define BTUSB_IFNUM_2 0x80000 65 66 static const struct usb_device_id btusb_table[] = { 67 /* Generic Bluetooth USB device */ 68 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, 69 70 /* Generic Bluetooth AMP device */ 71 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, 72 73 /* Generic Bluetooth USB interface */ 74 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, 75 76 /* Apple-specific (Broadcom) devices */ 77 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), 78 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, 79 80 /* MediaTek MT76x0E */ 81 { USB_DEVICE(0x0e8d, 0x763f) }, 82 83 /* Broadcom SoftSailing reporting vendor specific */ 84 { USB_DEVICE(0x0a5c, 0x21e1) }, 85 86 /* Apple MacBookPro 7,1 */ 87 { USB_DEVICE(0x05ac, 0x8213) }, 88 89 /* Apple iMac11,1 */ 90 { USB_DEVICE(0x05ac, 0x8215) }, 91 92 /* Apple MacBookPro6,2 */ 93 { USB_DEVICE(0x05ac, 0x8218) }, 94 95 /* Apple MacBookAir3,1, MacBookAir3,2 */ 96 { USB_DEVICE(0x05ac, 0x821b) }, 97 98 /* Apple MacBookAir4,1 */ 99 { USB_DEVICE(0x05ac, 0x821f) }, 100 101 /* Apple MacBookPro8,2 */ 102 { USB_DEVICE(0x05ac, 0x821a) }, 103 104 /* Apple MacMini5,1 */ 105 { USB_DEVICE(0x05ac, 0x8281) }, 106 107 /* AVM BlueFRITZ! USB v2.0 */ 108 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, 109 110 /* Bluetooth Ultraport Module from IBM */ 111 { USB_DEVICE(0x04bf, 0x030a) }, 112 113 /* ALPS Modules with non-standard id */ 114 { USB_DEVICE(0x044e, 0x3001) }, 115 { USB_DEVICE(0x044e, 0x3002) }, 116 117 /* Ericsson with non-standard id */ 118 { USB_DEVICE(0x0bdb, 0x1002) }, 119 120 /* Canyon CN-BTU1 with HID interfaces */ 121 { USB_DEVICE(0x0c10, 0x0000) }, 122 123 /* Broadcom BCM20702A0 */ 124 { USB_DEVICE(0x413c, 0x8197) }, 125 126 /* Broadcom BCM20702B0 (Dynex/Insignia) */ 127 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, 128 129 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ 130 { USB_DEVICE(0x105b, 0xe065), .driver_info = BTUSB_BCM_PATCHRAM }, 131 132 /* Foxconn - Hon Hai */ 133 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), 134 .driver_info = BTUSB_BCM_PATCHRAM }, 135 136 /* Lite-On Technology - Broadcom based */ 137 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), 138 .driver_info = BTUSB_BCM_PATCHRAM }, 139 140 /* Broadcom devices with vendor specific id */ 141 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), 142 .driver_info = BTUSB_BCM_PATCHRAM }, 143 144 /* ASUSTek Computer - Broadcom based */ 145 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), 146 .driver_info = BTUSB_BCM_PATCHRAM }, 147 148 /* Belkin F8065bf - Broadcom based */ 149 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), 150 .driver_info = BTUSB_BCM_PATCHRAM }, 151 152 /* IMC Networks - Broadcom based */ 153 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), 154 .driver_info = BTUSB_BCM_PATCHRAM }, 155 156 /* Toshiba Corp - Broadcom based */ 157 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), 158 .driver_info = BTUSB_BCM_PATCHRAM }, 159 160 /* Intel Bluetooth USB Bootloader (RAM module) */ 161 { USB_DEVICE(0x8087, 0x0a5a), 162 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, 163 164 { } /* Terminating entry */ 165 }; 166 167 MODULE_DEVICE_TABLE(usb, btusb_table); 168 169 static const struct usb_device_id blacklist_table[] = { 170 /* CSR BlueCore devices */ 171 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, 172 173 /* Broadcom BCM2033 without firmware */ 174 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, 175 176 /* Broadcom BCM2045 devices */ 177 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, 178 179 /* Atheros 3011 with sflash firmware */ 180 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, 181 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, 182 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, 183 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, 184 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, 185 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, 186 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, 187 188 /* Atheros AR9285 Malbec with sflash firmware */ 189 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, 190 191 /* Atheros 3012 with sflash firmware */ 192 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, 193 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, 194 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, 195 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, 196 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, 197 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, 198 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, 199 { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 }, 200 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, 201 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, 202 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, 203 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, 204 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, 205 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, 206 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, 207 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, 208 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, 209 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, 210 { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 }, 211 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, 212 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, 213 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, 214 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, 215 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, 216 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, 217 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, 218 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, 219 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, 220 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, 221 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, 222 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, 223 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, 224 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, 225 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, 226 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, 227 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, 228 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, 229 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, 230 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, 231 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, 232 { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 }, 233 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, 234 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, 235 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, 236 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, 237 { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 }, 238 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, 239 { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 }, 240 { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 }, 241 242 /* Atheros AR5BBU12 with sflash firmware */ 243 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, 244 245 /* Atheros AR5BBU12 with sflash firmware */ 246 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, 247 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, 248 249 /* QCA ROME chipset */ 250 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME }, 251 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME }, 252 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, 253 { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME }, 254 255 /* Broadcom BCM2035 */ 256 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, 257 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, 258 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, 259 260 /* Broadcom BCM2045 */ 261 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, 262 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, 263 264 /* IBM/Lenovo ThinkPad with Broadcom chip */ 265 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, 266 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, 267 268 /* HP laptop with Broadcom chip */ 269 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, 270 271 /* Dell laptop with Broadcom chip */ 272 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, 273 274 /* Dell Wireless 370 and 410 devices */ 275 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, 276 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, 277 278 /* Belkin F8T012 and F8T013 devices */ 279 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, 280 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, 281 282 /* Asus WL-BTD202 device */ 283 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, 284 285 /* Kensington Bluetooth USB adapter */ 286 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, 287 288 /* RTX Telecom based adapters with buggy SCO support */ 289 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, 290 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, 291 292 /* CONWISE Technology based adapters with buggy SCO support */ 293 { USB_DEVICE(0x0e5e, 0x6622), .driver_info = BTUSB_BROKEN_ISOC }, 294 295 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ 296 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, 297 298 /* Digianswer devices */ 299 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, 300 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, 301 302 /* CSR BlueCore Bluetooth Sniffer */ 303 { USB_DEVICE(0x0a12, 0x0002), 304 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 305 306 /* Frontline ComProbe Bluetooth Sniffer */ 307 { USB_DEVICE(0x16d3, 0x0002), 308 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 309 310 /* Marvell Bluetooth devices */ 311 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, 312 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, 313 314 /* Intel Bluetooth devices */ 315 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, 316 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, 317 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, 318 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW }, 319 { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL }, 320 321 /* Other Intel Bluetooth devices */ 322 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), 323 .driver_info = BTUSB_IGNORE }, 324 325 /* Realtek Bluetooth devices */ 326 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), 327 .driver_info = BTUSB_REALTEK }, 328 329 /* Additional Realtek 8723AE Bluetooth devices */ 330 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, 331 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, 332 333 /* Additional Realtek 8723BE Bluetooth devices */ 334 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, 335 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, 336 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, 337 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, 338 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, 339 340 /* Additional Realtek 8821AE Bluetooth devices */ 341 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, 342 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, 343 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, 344 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, 345 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, 346 347 /* Silicon Wave based devices */ 348 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, 349 350 { } /* Terminating entry */ 351 }; 352 353 #define BTUSB_MAX_ISOC_FRAMES 10 354 355 #define BTUSB_INTR_RUNNING 0 356 #define BTUSB_BULK_RUNNING 1 357 #define BTUSB_ISOC_RUNNING 2 358 #define BTUSB_SUSPENDING 3 359 #define BTUSB_DID_ISO_RESUME 4 360 #define BTUSB_BOOTLOADER 5 361 #define BTUSB_DOWNLOADING 6 362 #define BTUSB_FIRMWARE_LOADED 7 363 #define BTUSB_FIRMWARE_FAILED 8 364 #define BTUSB_BOOTING 9 365 #define BTUSB_RESET_RESUME 10 366 #define BTUSB_DIAG_RUNNING 11 367 368 struct btusb_data { 369 struct hci_dev *hdev; 370 struct usb_device *udev; 371 struct usb_interface *intf; 372 struct usb_interface *isoc; 373 struct usb_interface *diag; 374 375 unsigned long flags; 376 377 struct work_struct work; 378 struct work_struct waker; 379 380 struct usb_anchor deferred; 381 struct usb_anchor tx_anchor; 382 int tx_in_flight; 383 spinlock_t txlock; 384 385 struct usb_anchor intr_anchor; 386 struct usb_anchor bulk_anchor; 387 struct usb_anchor isoc_anchor; 388 struct usb_anchor diag_anchor; 389 spinlock_t rxlock; 390 391 struct sk_buff *evt_skb; 392 struct sk_buff *acl_skb; 393 struct sk_buff *sco_skb; 394 395 struct usb_endpoint_descriptor *intr_ep; 396 struct usb_endpoint_descriptor *bulk_tx_ep; 397 struct usb_endpoint_descriptor *bulk_rx_ep; 398 struct usb_endpoint_descriptor *isoc_tx_ep; 399 struct usb_endpoint_descriptor *isoc_rx_ep; 400 struct usb_endpoint_descriptor *diag_tx_ep; 401 struct usb_endpoint_descriptor *diag_rx_ep; 402 403 __u8 cmdreq_type; 404 __u8 cmdreq; 405 406 unsigned int sco_num; 407 int isoc_altsetting; 408 int suspend_count; 409 410 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); 411 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); 412 413 int (*setup_on_usb)(struct hci_dev *hdev); 414 }; 415 416 static inline void btusb_free_frags(struct btusb_data *data) 417 { 418 unsigned long flags; 419 420 spin_lock_irqsave(&data->rxlock, flags); 421 422 kfree_skb(data->evt_skb); 423 data->evt_skb = NULL; 424 425 kfree_skb(data->acl_skb); 426 data->acl_skb = NULL; 427 428 kfree_skb(data->sco_skb); 429 data->sco_skb = NULL; 430 431 spin_unlock_irqrestore(&data->rxlock, flags); 432 } 433 434 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) 435 { 436 struct sk_buff *skb; 437 int err = 0; 438 439 spin_lock(&data->rxlock); 440 skb = data->evt_skb; 441 442 while (count) { 443 int len; 444 445 if (!skb) { 446 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); 447 if (!skb) { 448 err = -ENOMEM; 449 break; 450 } 451 452 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 453 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; 454 } 455 456 len = min_t(uint, hci_skb_expect(skb), count); 457 memcpy(skb_put(skb, len), buffer, len); 458 459 count -= len; 460 buffer += len; 461 hci_skb_expect(skb) -= len; 462 463 if (skb->len == HCI_EVENT_HDR_SIZE) { 464 /* Complete event header */ 465 hci_skb_expect(skb) = hci_event_hdr(skb)->plen; 466 467 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 468 kfree_skb(skb); 469 skb = NULL; 470 471 err = -EILSEQ; 472 break; 473 } 474 } 475 476 if (!hci_skb_expect(skb)) { 477 /* Complete frame */ 478 data->recv_event(data->hdev, skb); 479 skb = NULL; 480 } 481 } 482 483 data->evt_skb = skb; 484 spin_unlock(&data->rxlock); 485 486 return err; 487 } 488 489 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) 490 { 491 struct sk_buff *skb; 492 int err = 0; 493 494 spin_lock(&data->rxlock); 495 skb = data->acl_skb; 496 497 while (count) { 498 int len; 499 500 if (!skb) { 501 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); 502 if (!skb) { 503 err = -ENOMEM; 504 break; 505 } 506 507 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; 508 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; 509 } 510 511 len = min_t(uint, hci_skb_expect(skb), count); 512 memcpy(skb_put(skb, len), buffer, len); 513 514 count -= len; 515 buffer += len; 516 hci_skb_expect(skb) -= len; 517 518 if (skb->len == HCI_ACL_HDR_SIZE) { 519 __le16 dlen = hci_acl_hdr(skb)->dlen; 520 521 /* Complete ACL header */ 522 hci_skb_expect(skb) = __le16_to_cpu(dlen); 523 524 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 525 kfree_skb(skb); 526 skb = NULL; 527 528 err = -EILSEQ; 529 break; 530 } 531 } 532 533 if (!hci_skb_expect(skb)) { 534 /* Complete frame */ 535 hci_recv_frame(data->hdev, skb); 536 skb = NULL; 537 } 538 } 539 540 data->acl_skb = skb; 541 spin_unlock(&data->rxlock); 542 543 return err; 544 } 545 546 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) 547 { 548 struct sk_buff *skb; 549 int err = 0; 550 551 spin_lock(&data->rxlock); 552 skb = data->sco_skb; 553 554 while (count) { 555 int len; 556 557 if (!skb) { 558 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); 559 if (!skb) { 560 err = -ENOMEM; 561 break; 562 } 563 564 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; 565 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; 566 } 567 568 len = min_t(uint, hci_skb_expect(skb), count); 569 memcpy(skb_put(skb, len), buffer, len); 570 571 count -= len; 572 buffer += len; 573 hci_skb_expect(skb) -= len; 574 575 if (skb->len == HCI_SCO_HDR_SIZE) { 576 /* Complete SCO header */ 577 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; 578 579 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 580 kfree_skb(skb); 581 skb = NULL; 582 583 err = -EILSEQ; 584 break; 585 } 586 } 587 588 if (!hci_skb_expect(skb)) { 589 /* Complete frame */ 590 hci_recv_frame(data->hdev, skb); 591 skb = NULL; 592 } 593 } 594 595 data->sco_skb = skb; 596 spin_unlock(&data->rxlock); 597 598 return err; 599 } 600 601 static void btusb_intr_complete(struct urb *urb) 602 { 603 struct hci_dev *hdev = urb->context; 604 struct btusb_data *data = hci_get_drvdata(hdev); 605 int err; 606 607 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 608 urb->actual_length); 609 610 if (!test_bit(HCI_RUNNING, &hdev->flags)) 611 return; 612 613 if (urb->status == 0) { 614 hdev->stat.byte_rx += urb->actual_length; 615 616 if (btusb_recv_intr(data, urb->transfer_buffer, 617 urb->actual_length) < 0) { 618 BT_ERR("%s corrupted event packet", hdev->name); 619 hdev->stat.err_rx++; 620 } 621 } else if (urb->status == -ENOENT) { 622 /* Avoid suspend failed when usb_kill_urb */ 623 return; 624 } 625 626 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) 627 return; 628 629 usb_mark_last_busy(data->udev); 630 usb_anchor_urb(urb, &data->intr_anchor); 631 632 err = usb_submit_urb(urb, GFP_ATOMIC); 633 if (err < 0) { 634 /* -EPERM: urb is being killed; 635 * -ENODEV: device got disconnected */ 636 if (err != -EPERM && err != -ENODEV) 637 BT_ERR("%s urb %p failed to resubmit (%d)", 638 hdev->name, urb, -err); 639 usb_unanchor_urb(urb); 640 } 641 } 642 643 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) 644 { 645 struct btusb_data *data = hci_get_drvdata(hdev); 646 struct urb *urb; 647 unsigned char *buf; 648 unsigned int pipe; 649 int err, size; 650 651 BT_DBG("%s", hdev->name); 652 653 if (!data->intr_ep) 654 return -ENODEV; 655 656 urb = usb_alloc_urb(0, mem_flags); 657 if (!urb) 658 return -ENOMEM; 659 660 size = le16_to_cpu(data->intr_ep->wMaxPacketSize); 661 662 buf = kmalloc(size, mem_flags); 663 if (!buf) { 664 usb_free_urb(urb); 665 return -ENOMEM; 666 } 667 668 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); 669 670 usb_fill_int_urb(urb, data->udev, pipe, buf, size, 671 btusb_intr_complete, hdev, data->intr_ep->bInterval); 672 673 urb->transfer_flags |= URB_FREE_BUFFER; 674 675 usb_anchor_urb(urb, &data->intr_anchor); 676 677 err = usb_submit_urb(urb, mem_flags); 678 if (err < 0) { 679 if (err != -EPERM && err != -ENODEV) 680 BT_ERR("%s urb %p submission failed (%d)", 681 hdev->name, urb, -err); 682 usb_unanchor_urb(urb); 683 } 684 685 usb_free_urb(urb); 686 687 return err; 688 } 689 690 static void btusb_bulk_complete(struct urb *urb) 691 { 692 struct hci_dev *hdev = urb->context; 693 struct btusb_data *data = hci_get_drvdata(hdev); 694 int err; 695 696 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 697 urb->actual_length); 698 699 if (!test_bit(HCI_RUNNING, &hdev->flags)) 700 return; 701 702 if (urb->status == 0) { 703 hdev->stat.byte_rx += urb->actual_length; 704 705 if (data->recv_bulk(data, urb->transfer_buffer, 706 urb->actual_length) < 0) { 707 BT_ERR("%s corrupted ACL packet", hdev->name); 708 hdev->stat.err_rx++; 709 } 710 } else if (urb->status == -ENOENT) { 711 /* Avoid suspend failed when usb_kill_urb */ 712 return; 713 } 714 715 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) 716 return; 717 718 usb_anchor_urb(urb, &data->bulk_anchor); 719 usb_mark_last_busy(data->udev); 720 721 err = usb_submit_urb(urb, GFP_ATOMIC); 722 if (err < 0) { 723 /* -EPERM: urb is being killed; 724 * -ENODEV: device got disconnected */ 725 if (err != -EPERM && err != -ENODEV) 726 BT_ERR("%s urb %p failed to resubmit (%d)", 727 hdev->name, urb, -err); 728 usb_unanchor_urb(urb); 729 } 730 } 731 732 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) 733 { 734 struct btusb_data *data = hci_get_drvdata(hdev); 735 struct urb *urb; 736 unsigned char *buf; 737 unsigned int pipe; 738 int err, size = HCI_MAX_FRAME_SIZE; 739 740 BT_DBG("%s", hdev->name); 741 742 if (!data->bulk_rx_ep) 743 return -ENODEV; 744 745 urb = usb_alloc_urb(0, mem_flags); 746 if (!urb) 747 return -ENOMEM; 748 749 buf = kmalloc(size, mem_flags); 750 if (!buf) { 751 usb_free_urb(urb); 752 return -ENOMEM; 753 } 754 755 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); 756 757 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 758 btusb_bulk_complete, hdev); 759 760 urb->transfer_flags |= URB_FREE_BUFFER; 761 762 usb_mark_last_busy(data->udev); 763 usb_anchor_urb(urb, &data->bulk_anchor); 764 765 err = usb_submit_urb(urb, mem_flags); 766 if (err < 0) { 767 if (err != -EPERM && err != -ENODEV) 768 BT_ERR("%s urb %p submission failed (%d)", 769 hdev->name, urb, -err); 770 usb_unanchor_urb(urb); 771 } 772 773 usb_free_urb(urb); 774 775 return err; 776 } 777 778 static void btusb_isoc_complete(struct urb *urb) 779 { 780 struct hci_dev *hdev = urb->context; 781 struct btusb_data *data = hci_get_drvdata(hdev); 782 int i, err; 783 784 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 785 urb->actual_length); 786 787 if (!test_bit(HCI_RUNNING, &hdev->flags)) 788 return; 789 790 if (urb->status == 0) { 791 for (i = 0; i < urb->number_of_packets; i++) { 792 unsigned int offset = urb->iso_frame_desc[i].offset; 793 unsigned int length = urb->iso_frame_desc[i].actual_length; 794 795 if (urb->iso_frame_desc[i].status) 796 continue; 797 798 hdev->stat.byte_rx += length; 799 800 if (btusb_recv_isoc(data, urb->transfer_buffer + offset, 801 length) < 0) { 802 BT_ERR("%s corrupted SCO packet", hdev->name); 803 hdev->stat.err_rx++; 804 } 805 } 806 } else if (urb->status == -ENOENT) { 807 /* Avoid suspend failed when usb_kill_urb */ 808 return; 809 } 810 811 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) 812 return; 813 814 usb_anchor_urb(urb, &data->isoc_anchor); 815 816 err = usb_submit_urb(urb, GFP_ATOMIC); 817 if (err < 0) { 818 /* -EPERM: urb is being killed; 819 * -ENODEV: device got disconnected */ 820 if (err != -EPERM && err != -ENODEV) 821 BT_ERR("%s urb %p failed to resubmit (%d)", 822 hdev->name, urb, -err); 823 usb_unanchor_urb(urb); 824 } 825 } 826 827 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) 828 { 829 int i, offset = 0; 830 831 BT_DBG("len %d mtu %d", len, mtu); 832 833 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; 834 i++, offset += mtu, len -= mtu) { 835 urb->iso_frame_desc[i].offset = offset; 836 urb->iso_frame_desc[i].length = mtu; 837 } 838 839 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 840 urb->iso_frame_desc[i].offset = offset; 841 urb->iso_frame_desc[i].length = len; 842 i++; 843 } 844 845 urb->number_of_packets = i; 846 } 847 848 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) 849 { 850 struct btusb_data *data = hci_get_drvdata(hdev); 851 struct urb *urb; 852 unsigned char *buf; 853 unsigned int pipe; 854 int err, size; 855 856 BT_DBG("%s", hdev->name); 857 858 if (!data->isoc_rx_ep) 859 return -ENODEV; 860 861 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); 862 if (!urb) 863 return -ENOMEM; 864 865 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * 866 BTUSB_MAX_ISOC_FRAMES; 867 868 buf = kmalloc(size, mem_flags); 869 if (!buf) { 870 usb_free_urb(urb); 871 return -ENOMEM; 872 } 873 874 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); 875 876 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, 877 hdev, data->isoc_rx_ep->bInterval); 878 879 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; 880 881 __fill_isoc_descriptor(urb, size, 882 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); 883 884 usb_anchor_urb(urb, &data->isoc_anchor); 885 886 err = usb_submit_urb(urb, mem_flags); 887 if (err < 0) { 888 if (err != -EPERM && err != -ENODEV) 889 BT_ERR("%s urb %p submission failed (%d)", 890 hdev->name, urb, -err); 891 usb_unanchor_urb(urb); 892 } 893 894 usb_free_urb(urb); 895 896 return err; 897 } 898 899 static void btusb_diag_complete(struct urb *urb) 900 { 901 struct hci_dev *hdev = urb->context; 902 struct btusb_data *data = hci_get_drvdata(hdev); 903 int err; 904 905 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 906 urb->actual_length); 907 908 if (urb->status == 0) { 909 struct sk_buff *skb; 910 911 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); 912 if (skb) { 913 memcpy(skb_put(skb, urb->actual_length), 914 urb->transfer_buffer, urb->actual_length); 915 hci_recv_diag(hdev, skb); 916 } 917 } else if (urb->status == -ENOENT) { 918 /* Avoid suspend failed when usb_kill_urb */ 919 return; 920 } 921 922 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) 923 return; 924 925 usb_anchor_urb(urb, &data->diag_anchor); 926 usb_mark_last_busy(data->udev); 927 928 err = usb_submit_urb(urb, GFP_ATOMIC); 929 if (err < 0) { 930 /* -EPERM: urb is being killed; 931 * -ENODEV: device got disconnected */ 932 if (err != -EPERM && err != -ENODEV) 933 BT_ERR("%s urb %p failed to resubmit (%d)", 934 hdev->name, urb, -err); 935 usb_unanchor_urb(urb); 936 } 937 } 938 939 static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) 940 { 941 struct btusb_data *data = hci_get_drvdata(hdev); 942 struct urb *urb; 943 unsigned char *buf; 944 unsigned int pipe; 945 int err, size = HCI_MAX_FRAME_SIZE; 946 947 BT_DBG("%s", hdev->name); 948 949 if (!data->diag_rx_ep) 950 return -ENODEV; 951 952 urb = usb_alloc_urb(0, mem_flags); 953 if (!urb) 954 return -ENOMEM; 955 956 buf = kmalloc(size, mem_flags); 957 if (!buf) { 958 usb_free_urb(urb); 959 return -ENOMEM; 960 } 961 962 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); 963 964 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 965 btusb_diag_complete, hdev); 966 967 urb->transfer_flags |= URB_FREE_BUFFER; 968 969 usb_mark_last_busy(data->udev); 970 usb_anchor_urb(urb, &data->diag_anchor); 971 972 err = usb_submit_urb(urb, mem_flags); 973 if (err < 0) { 974 if (err != -EPERM && err != -ENODEV) 975 BT_ERR("%s urb %p submission failed (%d)", 976 hdev->name, urb, -err); 977 usb_unanchor_urb(urb); 978 } 979 980 usb_free_urb(urb); 981 982 return err; 983 } 984 985 static void btusb_tx_complete(struct urb *urb) 986 { 987 struct sk_buff *skb = urb->context; 988 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 989 struct btusb_data *data = hci_get_drvdata(hdev); 990 991 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 992 urb->actual_length); 993 994 if (!test_bit(HCI_RUNNING, &hdev->flags)) 995 goto done; 996 997 if (!urb->status) 998 hdev->stat.byte_tx += urb->transfer_buffer_length; 999 else 1000 hdev->stat.err_tx++; 1001 1002 done: 1003 spin_lock(&data->txlock); 1004 data->tx_in_flight--; 1005 spin_unlock(&data->txlock); 1006 1007 kfree(urb->setup_packet); 1008 1009 kfree_skb(skb); 1010 } 1011 1012 static void btusb_isoc_tx_complete(struct urb *urb) 1013 { 1014 struct sk_buff *skb = urb->context; 1015 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1016 1017 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1018 urb->actual_length); 1019 1020 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1021 goto done; 1022 1023 if (!urb->status) 1024 hdev->stat.byte_tx += urb->transfer_buffer_length; 1025 else 1026 hdev->stat.err_tx++; 1027 1028 done: 1029 kfree(urb->setup_packet); 1030 1031 kfree_skb(skb); 1032 } 1033 1034 static int btusb_open(struct hci_dev *hdev) 1035 { 1036 struct btusb_data *data = hci_get_drvdata(hdev); 1037 int err; 1038 1039 BT_DBG("%s", hdev->name); 1040 1041 /* Patching USB firmware files prior to starting any URBs of HCI path 1042 * It is more safe to use USB bulk channel for downloading USB patch 1043 */ 1044 if (data->setup_on_usb) { 1045 err = data->setup_on_usb(hdev); 1046 if (err < 0) 1047 return err; 1048 } 1049 1050 err = usb_autopm_get_interface(data->intf); 1051 if (err < 0) 1052 return err; 1053 1054 data->intf->needs_remote_wakeup = 1; 1055 1056 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) 1057 goto done; 1058 1059 err = btusb_submit_intr_urb(hdev, GFP_KERNEL); 1060 if (err < 0) 1061 goto failed; 1062 1063 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1064 if (err < 0) { 1065 usb_kill_anchored_urbs(&data->intr_anchor); 1066 goto failed; 1067 } 1068 1069 set_bit(BTUSB_BULK_RUNNING, &data->flags); 1070 btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1071 1072 if (data->diag) { 1073 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) 1074 set_bit(BTUSB_DIAG_RUNNING, &data->flags); 1075 } 1076 1077 done: 1078 usb_autopm_put_interface(data->intf); 1079 return 0; 1080 1081 failed: 1082 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1083 usb_autopm_put_interface(data->intf); 1084 return err; 1085 } 1086 1087 static void btusb_stop_traffic(struct btusb_data *data) 1088 { 1089 usb_kill_anchored_urbs(&data->intr_anchor); 1090 usb_kill_anchored_urbs(&data->bulk_anchor); 1091 usb_kill_anchored_urbs(&data->isoc_anchor); 1092 usb_kill_anchored_urbs(&data->diag_anchor); 1093 } 1094 1095 static int btusb_close(struct hci_dev *hdev) 1096 { 1097 struct btusb_data *data = hci_get_drvdata(hdev); 1098 int err; 1099 1100 BT_DBG("%s", hdev->name); 1101 1102 cancel_work_sync(&data->work); 1103 cancel_work_sync(&data->waker); 1104 1105 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1106 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 1107 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1108 clear_bit(BTUSB_DIAG_RUNNING, &data->flags); 1109 1110 btusb_stop_traffic(data); 1111 btusb_free_frags(data); 1112 1113 err = usb_autopm_get_interface(data->intf); 1114 if (err < 0) 1115 goto failed; 1116 1117 data->intf->needs_remote_wakeup = 0; 1118 usb_autopm_put_interface(data->intf); 1119 1120 failed: 1121 usb_scuttle_anchored_urbs(&data->deferred); 1122 return 0; 1123 } 1124 1125 static int btusb_flush(struct hci_dev *hdev) 1126 { 1127 struct btusb_data *data = hci_get_drvdata(hdev); 1128 1129 BT_DBG("%s", hdev->name); 1130 1131 usb_kill_anchored_urbs(&data->tx_anchor); 1132 btusb_free_frags(data); 1133 1134 return 0; 1135 } 1136 1137 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) 1138 { 1139 struct btusb_data *data = hci_get_drvdata(hdev); 1140 struct usb_ctrlrequest *dr; 1141 struct urb *urb; 1142 unsigned int pipe; 1143 1144 urb = usb_alloc_urb(0, GFP_KERNEL); 1145 if (!urb) 1146 return ERR_PTR(-ENOMEM); 1147 1148 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 1149 if (!dr) { 1150 usb_free_urb(urb); 1151 return ERR_PTR(-ENOMEM); 1152 } 1153 1154 dr->bRequestType = data->cmdreq_type; 1155 dr->bRequest = data->cmdreq; 1156 dr->wIndex = 0; 1157 dr->wValue = 0; 1158 dr->wLength = __cpu_to_le16(skb->len); 1159 1160 pipe = usb_sndctrlpipe(data->udev, 0x00); 1161 1162 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 1163 skb->data, skb->len, btusb_tx_complete, skb); 1164 1165 skb->dev = (void *)hdev; 1166 1167 return urb; 1168 } 1169 1170 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) 1171 { 1172 struct btusb_data *data = hci_get_drvdata(hdev); 1173 struct urb *urb; 1174 unsigned int pipe; 1175 1176 if (!data->bulk_tx_ep) 1177 return ERR_PTR(-ENODEV); 1178 1179 urb = usb_alloc_urb(0, GFP_KERNEL); 1180 if (!urb) 1181 return ERR_PTR(-ENOMEM); 1182 1183 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); 1184 1185 usb_fill_bulk_urb(urb, data->udev, pipe, 1186 skb->data, skb->len, btusb_tx_complete, skb); 1187 1188 skb->dev = (void *)hdev; 1189 1190 return urb; 1191 } 1192 1193 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) 1194 { 1195 struct btusb_data *data = hci_get_drvdata(hdev); 1196 struct urb *urb; 1197 unsigned int pipe; 1198 1199 if (!data->isoc_tx_ep) 1200 return ERR_PTR(-ENODEV); 1201 1202 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); 1203 if (!urb) 1204 return ERR_PTR(-ENOMEM); 1205 1206 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); 1207 1208 usb_fill_int_urb(urb, data->udev, pipe, 1209 skb->data, skb->len, btusb_isoc_tx_complete, 1210 skb, data->isoc_tx_ep->bInterval); 1211 1212 urb->transfer_flags = URB_ISO_ASAP; 1213 1214 __fill_isoc_descriptor(urb, skb->len, 1215 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); 1216 1217 skb->dev = (void *)hdev; 1218 1219 return urb; 1220 } 1221 1222 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) 1223 { 1224 struct btusb_data *data = hci_get_drvdata(hdev); 1225 int err; 1226 1227 usb_anchor_urb(urb, &data->tx_anchor); 1228 1229 err = usb_submit_urb(urb, GFP_KERNEL); 1230 if (err < 0) { 1231 if (err != -EPERM && err != -ENODEV) 1232 BT_ERR("%s urb %p submission failed (%d)", 1233 hdev->name, urb, -err); 1234 kfree(urb->setup_packet); 1235 usb_unanchor_urb(urb); 1236 } else { 1237 usb_mark_last_busy(data->udev); 1238 } 1239 1240 usb_free_urb(urb); 1241 return err; 1242 } 1243 1244 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) 1245 { 1246 struct btusb_data *data = hci_get_drvdata(hdev); 1247 unsigned long flags; 1248 bool suspending; 1249 1250 spin_lock_irqsave(&data->txlock, flags); 1251 suspending = test_bit(BTUSB_SUSPENDING, &data->flags); 1252 if (!suspending) 1253 data->tx_in_flight++; 1254 spin_unlock_irqrestore(&data->txlock, flags); 1255 1256 if (!suspending) 1257 return submit_tx_urb(hdev, urb); 1258 1259 usb_anchor_urb(urb, &data->deferred); 1260 schedule_work(&data->waker); 1261 1262 usb_free_urb(urb); 1263 return 0; 1264 } 1265 1266 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) 1267 { 1268 struct urb *urb; 1269 1270 BT_DBG("%s", hdev->name); 1271 1272 switch (hci_skb_pkt_type(skb)) { 1273 case HCI_COMMAND_PKT: 1274 urb = alloc_ctrl_urb(hdev, skb); 1275 if (IS_ERR(urb)) 1276 return PTR_ERR(urb); 1277 1278 hdev->stat.cmd_tx++; 1279 return submit_or_queue_tx_urb(hdev, urb); 1280 1281 case HCI_ACLDATA_PKT: 1282 urb = alloc_bulk_urb(hdev, skb); 1283 if (IS_ERR(urb)) 1284 return PTR_ERR(urb); 1285 1286 hdev->stat.acl_tx++; 1287 return submit_or_queue_tx_urb(hdev, urb); 1288 1289 case HCI_SCODATA_PKT: 1290 if (hci_conn_num(hdev, SCO_LINK) < 1) 1291 return -ENODEV; 1292 1293 urb = alloc_isoc_urb(hdev, skb); 1294 if (IS_ERR(urb)) 1295 return PTR_ERR(urb); 1296 1297 hdev->stat.sco_tx++; 1298 return submit_tx_urb(hdev, urb); 1299 } 1300 1301 return -EILSEQ; 1302 } 1303 1304 static void btusb_notify(struct hci_dev *hdev, unsigned int evt) 1305 { 1306 struct btusb_data *data = hci_get_drvdata(hdev); 1307 1308 BT_DBG("%s evt %d", hdev->name, evt); 1309 1310 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { 1311 data->sco_num = hci_conn_num(hdev, SCO_LINK); 1312 schedule_work(&data->work); 1313 } 1314 } 1315 1316 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) 1317 { 1318 struct btusb_data *data = hci_get_drvdata(hdev); 1319 struct usb_interface *intf = data->isoc; 1320 struct usb_endpoint_descriptor *ep_desc; 1321 int i, err; 1322 1323 if (!data->isoc) 1324 return -ENODEV; 1325 1326 err = usb_set_interface(data->udev, 1, altsetting); 1327 if (err < 0) { 1328 BT_ERR("%s setting interface failed (%d)", hdev->name, -err); 1329 return err; 1330 } 1331 1332 data->isoc_altsetting = altsetting; 1333 1334 data->isoc_tx_ep = NULL; 1335 data->isoc_rx_ep = NULL; 1336 1337 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 1338 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 1339 1340 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { 1341 data->isoc_tx_ep = ep_desc; 1342 continue; 1343 } 1344 1345 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { 1346 data->isoc_rx_ep = ep_desc; 1347 continue; 1348 } 1349 } 1350 1351 if (!data->isoc_tx_ep || !data->isoc_rx_ep) { 1352 BT_ERR("%s invalid SCO descriptors", hdev->name); 1353 return -ENODEV; 1354 } 1355 1356 return 0; 1357 } 1358 1359 static void btusb_work(struct work_struct *work) 1360 { 1361 struct btusb_data *data = container_of(work, struct btusb_data, work); 1362 struct hci_dev *hdev = data->hdev; 1363 int new_alts; 1364 int err; 1365 1366 if (data->sco_num > 0) { 1367 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { 1368 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); 1369 if (err < 0) { 1370 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1371 usb_kill_anchored_urbs(&data->isoc_anchor); 1372 return; 1373 } 1374 1375 set_bit(BTUSB_DID_ISO_RESUME, &data->flags); 1376 } 1377 1378 if (hdev->voice_setting & 0x0020) { 1379 static const int alts[3] = { 2, 4, 5 }; 1380 1381 new_alts = alts[data->sco_num - 1]; 1382 } else { 1383 new_alts = data->sco_num; 1384 } 1385 1386 if (data->isoc_altsetting != new_alts) { 1387 unsigned long flags; 1388 1389 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1390 usb_kill_anchored_urbs(&data->isoc_anchor); 1391 1392 /* When isochronous alternate setting needs to be 1393 * changed, because SCO connection has been added 1394 * or removed, a packet fragment may be left in the 1395 * reassembling state. This could lead to wrongly 1396 * assembled fragments. 1397 * 1398 * Clear outstanding fragment when selecting a new 1399 * alternate setting. 1400 */ 1401 spin_lock_irqsave(&data->rxlock, flags); 1402 kfree_skb(data->sco_skb); 1403 data->sco_skb = NULL; 1404 spin_unlock_irqrestore(&data->rxlock, flags); 1405 1406 if (__set_isoc_interface(hdev, new_alts) < 0) 1407 return; 1408 } 1409 1410 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 1411 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) 1412 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1413 else 1414 btusb_submit_isoc_urb(hdev, GFP_KERNEL); 1415 } 1416 } else { 1417 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1418 usb_kill_anchored_urbs(&data->isoc_anchor); 1419 1420 __set_isoc_interface(hdev, 0); 1421 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) 1422 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); 1423 } 1424 } 1425 1426 static void btusb_waker(struct work_struct *work) 1427 { 1428 struct btusb_data *data = container_of(work, struct btusb_data, waker); 1429 int err; 1430 1431 err = usb_autopm_get_interface(data->intf); 1432 if (err < 0) 1433 return; 1434 1435 usb_autopm_put_interface(data->intf); 1436 } 1437 1438 static int btusb_setup_bcm92035(struct hci_dev *hdev) 1439 { 1440 struct sk_buff *skb; 1441 u8 val = 0x00; 1442 1443 BT_DBG("%s", hdev->name); 1444 1445 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); 1446 if (IS_ERR(skb)) 1447 BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb)); 1448 else 1449 kfree_skb(skb); 1450 1451 return 0; 1452 } 1453 1454 static int btusb_setup_csr(struct hci_dev *hdev) 1455 { 1456 struct hci_rp_read_local_version *rp; 1457 struct sk_buff *skb; 1458 1459 BT_DBG("%s", hdev->name); 1460 1461 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, 1462 HCI_INIT_TIMEOUT); 1463 if (IS_ERR(skb)) { 1464 int err = PTR_ERR(skb); 1465 BT_ERR("%s: CSR: Local version failed (%d)", hdev->name, err); 1466 return err; 1467 } 1468 1469 if (skb->len != sizeof(struct hci_rp_read_local_version)) { 1470 BT_ERR("%s: CSR: Local version length mismatch", hdev->name); 1471 kfree_skb(skb); 1472 return -EIO; 1473 } 1474 1475 rp = (struct hci_rp_read_local_version *)skb->data; 1476 1477 /* Detect controllers which aren't real CSR ones. */ 1478 if (le16_to_cpu(rp->manufacturer) != 10 || 1479 le16_to_cpu(rp->lmp_subver) == 0x0c5c) { 1480 /* Clear the reset quirk since this is not an actual 1481 * early Bluetooth 1.1 device from CSR. 1482 */ 1483 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 1484 1485 /* These fake CSR controllers have all a broken 1486 * stored link key handling and so just disable it. 1487 */ 1488 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 1489 } 1490 1491 kfree_skb(skb); 1492 1493 return 0; 1494 } 1495 1496 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, 1497 struct intel_version *ver) 1498 { 1499 const struct firmware *fw; 1500 char fwname[64]; 1501 int ret; 1502 1503 snprintf(fwname, sizeof(fwname), 1504 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", 1505 ver->hw_platform, ver->hw_variant, ver->hw_revision, 1506 ver->fw_variant, ver->fw_revision, ver->fw_build_num, 1507 ver->fw_build_ww, ver->fw_build_yy); 1508 1509 ret = request_firmware(&fw, fwname, &hdev->dev); 1510 if (ret < 0) { 1511 if (ret == -EINVAL) { 1512 BT_ERR("%s Intel firmware file request failed (%d)", 1513 hdev->name, ret); 1514 return NULL; 1515 } 1516 1517 BT_ERR("%s failed to open Intel firmware file: %s(%d)", 1518 hdev->name, fwname, ret); 1519 1520 /* If the correct firmware patch file is not found, use the 1521 * default firmware patch file instead 1522 */ 1523 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", 1524 ver->hw_platform, ver->hw_variant); 1525 if (request_firmware(&fw, fwname, &hdev->dev) < 0) { 1526 BT_ERR("%s failed to open default Intel fw file: %s", 1527 hdev->name, fwname); 1528 return NULL; 1529 } 1530 } 1531 1532 BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname); 1533 1534 return fw; 1535 } 1536 1537 static int btusb_setup_intel_patching(struct hci_dev *hdev, 1538 const struct firmware *fw, 1539 const u8 **fw_ptr, int *disable_patch) 1540 { 1541 struct sk_buff *skb; 1542 struct hci_command_hdr *cmd; 1543 const u8 *cmd_param; 1544 struct hci_event_hdr *evt = NULL; 1545 const u8 *evt_param = NULL; 1546 int remain = fw->size - (*fw_ptr - fw->data); 1547 1548 /* The first byte indicates the types of the patch command or event. 1549 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes 1550 * in the current firmware buffer doesn't start with 0x01 or 1551 * the size of remain buffer is smaller than HCI command header, 1552 * the firmware file is corrupted and it should stop the patching 1553 * process. 1554 */ 1555 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { 1556 BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name); 1557 return -EINVAL; 1558 } 1559 (*fw_ptr)++; 1560 remain--; 1561 1562 cmd = (struct hci_command_hdr *)(*fw_ptr); 1563 *fw_ptr += sizeof(*cmd); 1564 remain -= sizeof(*cmd); 1565 1566 /* Ensure that the remain firmware data is long enough than the length 1567 * of command parameter. If not, the firmware file is corrupted. 1568 */ 1569 if (remain < cmd->plen) { 1570 BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name); 1571 return -EFAULT; 1572 } 1573 1574 /* If there is a command that loads a patch in the firmware 1575 * file, then enable the patch upon success, otherwise just 1576 * disable the manufacturer mode, for example patch activation 1577 * is not required when the default firmware patch file is used 1578 * because there are no patch data to load. 1579 */ 1580 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) 1581 *disable_patch = 0; 1582 1583 cmd_param = *fw_ptr; 1584 *fw_ptr += cmd->plen; 1585 remain -= cmd->plen; 1586 1587 /* This reads the expected events when the above command is sent to the 1588 * device. Some vendor commands expects more than one events, for 1589 * example command status event followed by vendor specific event. 1590 * For this case, it only keeps the last expected event. so the command 1591 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of 1592 * last expected event. 1593 */ 1594 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { 1595 (*fw_ptr)++; 1596 remain--; 1597 1598 evt = (struct hci_event_hdr *)(*fw_ptr); 1599 *fw_ptr += sizeof(*evt); 1600 remain -= sizeof(*evt); 1601 1602 if (remain < evt->plen) { 1603 BT_ERR("%s Intel fw corrupted: invalid evt len", 1604 hdev->name); 1605 return -EFAULT; 1606 } 1607 1608 evt_param = *fw_ptr; 1609 *fw_ptr += evt->plen; 1610 remain -= evt->plen; 1611 } 1612 1613 /* Every HCI commands in the firmware file has its correspond event. 1614 * If event is not found or remain is smaller than zero, the firmware 1615 * file is corrupted. 1616 */ 1617 if (!evt || !evt_param || remain < 0) { 1618 BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name); 1619 return -EFAULT; 1620 } 1621 1622 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, 1623 cmd_param, evt->evt, HCI_INIT_TIMEOUT); 1624 if (IS_ERR(skb)) { 1625 BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)", 1626 hdev->name, cmd->opcode, PTR_ERR(skb)); 1627 return PTR_ERR(skb); 1628 } 1629 1630 /* It ensures that the returned event matches the event data read from 1631 * the firmware file. At fist, it checks the length and then 1632 * the contents of the event. 1633 */ 1634 if (skb->len != evt->plen) { 1635 BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name, 1636 le16_to_cpu(cmd->opcode)); 1637 kfree_skb(skb); 1638 return -EFAULT; 1639 } 1640 1641 if (memcmp(skb->data, evt_param, evt->plen)) { 1642 BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)", 1643 hdev->name, le16_to_cpu(cmd->opcode)); 1644 kfree_skb(skb); 1645 return -EFAULT; 1646 } 1647 kfree_skb(skb); 1648 1649 return 0; 1650 } 1651 1652 static int btusb_setup_intel(struct hci_dev *hdev) 1653 { 1654 struct sk_buff *skb; 1655 const struct firmware *fw; 1656 const u8 *fw_ptr; 1657 int disable_patch, err; 1658 struct intel_version ver; 1659 1660 BT_DBG("%s", hdev->name); 1661 1662 /* The controller has a bug with the first HCI command sent to it 1663 * returning number of completed commands as zero. This would stall the 1664 * command processing in the Bluetooth core. 1665 * 1666 * As a workaround, send HCI Reset command first which will reset the 1667 * number of completed commands and allow normal command processing 1668 * from now on. 1669 */ 1670 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 1671 if (IS_ERR(skb)) { 1672 BT_ERR("%s sending initial HCI reset command failed (%ld)", 1673 hdev->name, PTR_ERR(skb)); 1674 return PTR_ERR(skb); 1675 } 1676 kfree_skb(skb); 1677 1678 /* Read Intel specific controller version first to allow selection of 1679 * which firmware file to load. 1680 * 1681 * The returned information are hardware variant and revision plus 1682 * firmware variant, revision and build number. 1683 */ 1684 err = btintel_read_version(hdev, &ver); 1685 if (err) 1686 return err; 1687 1688 BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", 1689 hdev->name, ver.hw_platform, ver.hw_variant, ver.hw_revision, 1690 ver.fw_variant, ver.fw_revision, ver.fw_build_num, 1691 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); 1692 1693 /* fw_patch_num indicates the version of patch the device currently 1694 * have. If there is no patch data in the device, it is always 0x00. 1695 * So, if it is other than 0x00, no need to patch the device again. 1696 */ 1697 if (ver.fw_patch_num) { 1698 BT_INFO("%s: Intel device is already patched. patch num: %02x", 1699 hdev->name, ver.fw_patch_num); 1700 goto complete; 1701 } 1702 1703 /* Opens the firmware patch file based on the firmware version read 1704 * from the controller. If it fails to open the matching firmware 1705 * patch file, it tries to open the default firmware patch file. 1706 * If no patch file is found, allow the device to operate without 1707 * a patch. 1708 */ 1709 fw = btusb_setup_intel_get_fw(hdev, &ver); 1710 if (!fw) 1711 goto complete; 1712 fw_ptr = fw->data; 1713 1714 /* Enable the manufacturer mode of the controller. 1715 * Only while this mode is enabled, the driver can download the 1716 * firmware patch data and configuration parameters. 1717 */ 1718 err = btintel_enter_mfg(hdev); 1719 if (err) { 1720 release_firmware(fw); 1721 return err; 1722 } 1723 1724 disable_patch = 1; 1725 1726 /* The firmware data file consists of list of Intel specific HCI 1727 * commands and its expected events. The first byte indicates the 1728 * type of the message, either HCI command or HCI event. 1729 * 1730 * It reads the command and its expected event from the firmware file, 1731 * and send to the controller. Once __hci_cmd_sync_ev() returns, 1732 * the returned event is compared with the event read from the firmware 1733 * file and it will continue until all the messages are downloaded to 1734 * the controller. 1735 * 1736 * Once the firmware patching is completed successfully, 1737 * the manufacturer mode is disabled with reset and activating the 1738 * downloaded patch. 1739 * 1740 * If the firmware patching fails, the manufacturer mode is 1741 * disabled with reset and deactivating the patch. 1742 * 1743 * If the default patch file is used, no reset is done when disabling 1744 * the manufacturer. 1745 */ 1746 while (fw->size > fw_ptr - fw->data) { 1747 int ret; 1748 1749 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, 1750 &disable_patch); 1751 if (ret < 0) 1752 goto exit_mfg_deactivate; 1753 } 1754 1755 release_firmware(fw); 1756 1757 if (disable_patch) 1758 goto exit_mfg_disable; 1759 1760 /* Patching completed successfully and disable the manufacturer mode 1761 * with reset and activate the downloaded firmware patches. 1762 */ 1763 err = btintel_exit_mfg(hdev, true, true); 1764 if (err) 1765 return err; 1766 1767 BT_INFO("%s: Intel Bluetooth firmware patch completed and activated", 1768 hdev->name); 1769 1770 goto complete; 1771 1772 exit_mfg_disable: 1773 /* Disable the manufacturer mode without reset */ 1774 err = btintel_exit_mfg(hdev, false, false); 1775 if (err) 1776 return err; 1777 1778 BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name); 1779 1780 goto complete; 1781 1782 exit_mfg_deactivate: 1783 release_firmware(fw); 1784 1785 /* Patching failed. Disable the manufacturer mode with reset and 1786 * deactivate the downloaded firmware patches. 1787 */ 1788 err = btintel_exit_mfg(hdev, true, false); 1789 if (err) 1790 return err; 1791 1792 BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated", 1793 hdev->name); 1794 1795 complete: 1796 /* Set the event mask for Intel specific vendor events. This enables 1797 * a few extra events that are useful during general operation. 1798 */ 1799 btintel_set_event_mask_mfg(hdev, false); 1800 1801 btintel_check_bdaddr(hdev); 1802 return 0; 1803 } 1804 1805 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) 1806 { 1807 struct sk_buff *skb; 1808 struct hci_event_hdr *hdr; 1809 struct hci_ev_cmd_complete *evt; 1810 1811 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC); 1812 if (!skb) 1813 return -ENOMEM; 1814 1815 hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr)); 1816 hdr->evt = HCI_EV_CMD_COMPLETE; 1817 hdr->plen = sizeof(*evt) + 1; 1818 1819 evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt)); 1820 evt->ncmd = 0x01; 1821 evt->opcode = cpu_to_le16(opcode); 1822 1823 *skb_put(skb, 1) = 0x00; 1824 1825 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 1826 1827 return hci_recv_frame(hdev, skb); 1828 } 1829 1830 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, 1831 int count) 1832 { 1833 /* When the device is in bootloader mode, then it can send 1834 * events via the bulk endpoint. These events are treated the 1835 * same way as the ones received from the interrupt endpoint. 1836 */ 1837 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) 1838 return btusb_recv_intr(data, buffer, count); 1839 1840 return btusb_recv_bulk(data, buffer, count); 1841 } 1842 1843 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, 1844 unsigned int len) 1845 { 1846 const struct intel_bootup *evt = ptr; 1847 1848 if (len != sizeof(*evt)) 1849 return; 1850 1851 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) { 1852 smp_mb__after_atomic(); 1853 wake_up_bit(&data->flags, BTUSB_BOOTING); 1854 } 1855 } 1856 1857 static void btusb_intel_secure_send_result(struct btusb_data *data, 1858 const void *ptr, unsigned int len) 1859 { 1860 const struct intel_secure_send_result *evt = ptr; 1861 1862 if (len != sizeof(*evt)) 1863 return; 1864 1865 if (evt->result) 1866 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); 1867 1868 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && 1869 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) { 1870 smp_mb__after_atomic(); 1871 wake_up_bit(&data->flags, BTUSB_DOWNLOADING); 1872 } 1873 } 1874 1875 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) 1876 { 1877 struct btusb_data *data = hci_get_drvdata(hdev); 1878 1879 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1880 struct hci_event_hdr *hdr = (void *)skb->data; 1881 1882 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && 1883 hdr->plen > 0) { 1884 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; 1885 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; 1886 1887 switch (skb->data[2]) { 1888 case 0x02: 1889 /* When switching to the operational firmware 1890 * the device sends a vendor specific event 1891 * indicating that the bootup completed. 1892 */ 1893 btusb_intel_bootup(data, ptr, len); 1894 break; 1895 case 0x06: 1896 /* When the firmware loading completes the 1897 * device sends out a vendor specific event 1898 * indicating the result of the firmware 1899 * loading. 1900 */ 1901 btusb_intel_secure_send_result(data, ptr, len); 1902 break; 1903 } 1904 } 1905 } 1906 1907 return hci_recv_frame(hdev, skb); 1908 } 1909 1910 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) 1911 { 1912 struct btusb_data *data = hci_get_drvdata(hdev); 1913 struct urb *urb; 1914 1915 BT_DBG("%s", hdev->name); 1916 1917 switch (hci_skb_pkt_type(skb)) { 1918 case HCI_COMMAND_PKT: 1919 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 1920 struct hci_command_hdr *cmd = (void *)skb->data; 1921 __u16 opcode = le16_to_cpu(cmd->opcode); 1922 1923 /* When in bootloader mode and the command 0xfc09 1924 * is received, it needs to be send down the 1925 * bulk endpoint. So allocate a bulk URB instead. 1926 */ 1927 if (opcode == 0xfc09) 1928 urb = alloc_bulk_urb(hdev, skb); 1929 else 1930 urb = alloc_ctrl_urb(hdev, skb); 1931 1932 /* When the 0xfc01 command is issued to boot into 1933 * the operational firmware, it will actually not 1934 * send a command complete event. To keep the flow 1935 * control working inject that event here. 1936 */ 1937 if (opcode == 0xfc01) 1938 inject_cmd_complete(hdev, opcode); 1939 } else { 1940 urb = alloc_ctrl_urb(hdev, skb); 1941 } 1942 if (IS_ERR(urb)) 1943 return PTR_ERR(urb); 1944 1945 hdev->stat.cmd_tx++; 1946 return submit_or_queue_tx_urb(hdev, urb); 1947 1948 case HCI_ACLDATA_PKT: 1949 urb = alloc_bulk_urb(hdev, skb); 1950 if (IS_ERR(urb)) 1951 return PTR_ERR(urb); 1952 1953 hdev->stat.acl_tx++; 1954 return submit_or_queue_tx_urb(hdev, urb); 1955 1956 case HCI_SCODATA_PKT: 1957 if (hci_conn_num(hdev, SCO_LINK) < 1) 1958 return -ENODEV; 1959 1960 urb = alloc_isoc_urb(hdev, skb); 1961 if (IS_ERR(urb)) 1962 return PTR_ERR(urb); 1963 1964 hdev->stat.sco_tx++; 1965 return submit_tx_urb(hdev, urb); 1966 } 1967 1968 return -EILSEQ; 1969 } 1970 1971 static int btusb_setup_intel_new(struct hci_dev *hdev) 1972 { 1973 static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01, 1974 0x00, 0x08, 0x04, 0x00 }; 1975 struct btusb_data *data = hci_get_drvdata(hdev); 1976 struct sk_buff *skb; 1977 struct intel_version ver; 1978 struct intel_boot_params *params; 1979 const struct firmware *fw; 1980 const u8 *fw_ptr; 1981 u32 frag_len; 1982 char fwname[64]; 1983 ktime_t calltime, delta, rettime; 1984 unsigned long long duration; 1985 int err; 1986 1987 BT_DBG("%s", hdev->name); 1988 1989 calltime = ktime_get(); 1990 1991 /* Read the Intel version information to determine if the device 1992 * is in bootloader mode or if it already has operational firmware 1993 * loaded. 1994 */ 1995 err = btintel_read_version(hdev, &ver); 1996 if (err) 1997 return err; 1998 1999 /* The hardware platform number has a fixed value of 0x37 and 2000 * for now only accept this single value. 2001 */ 2002 if (ver.hw_platform != 0x37) { 2003 BT_ERR("%s: Unsupported Intel hardware platform (%u)", 2004 hdev->name, ver.hw_platform); 2005 return -EINVAL; 2006 } 2007 2008 /* At the moment the iBT 3.0 hardware variants 0x0b (LnP/SfP) 2009 * and 0x0c (WsP) are supported by this firmware loading method. 2010 * 2011 * This check has been put in place to ensure correct forward 2012 * compatibility options when newer hardware variants come along. 2013 */ 2014 if (ver.hw_variant != 0x0b && ver.hw_variant != 0x0c) { 2015 BT_ERR("%s: Unsupported Intel hardware variant (%u)", 2016 hdev->name, ver.hw_variant); 2017 return -EINVAL; 2018 } 2019 2020 btintel_version_info(hdev, &ver); 2021 2022 /* The firmware variant determines if the device is in bootloader 2023 * mode or is running operational firmware. The value 0x06 identifies 2024 * the bootloader and the value 0x23 identifies the operational 2025 * firmware. 2026 * 2027 * When the operational firmware is already present, then only 2028 * the check for valid Bluetooth device address is needed. This 2029 * determines if the device will be added as configured or 2030 * unconfigured controller. 2031 * 2032 * It is not possible to use the Secure Boot Parameters in this 2033 * case since that command is only available in bootloader mode. 2034 */ 2035 if (ver.fw_variant == 0x23) { 2036 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2037 btintel_check_bdaddr(hdev); 2038 return 0; 2039 } 2040 2041 /* If the device is not in bootloader mode, then the only possible 2042 * choice is to return an error and abort the device initialization. 2043 */ 2044 if (ver.fw_variant != 0x06) { 2045 BT_ERR("%s: Unsupported Intel firmware variant (%u)", 2046 hdev->name, ver.fw_variant); 2047 return -ENODEV; 2048 } 2049 2050 /* Read the secure boot parameters to identify the operating 2051 * details of the bootloader. 2052 */ 2053 skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT); 2054 if (IS_ERR(skb)) { 2055 BT_ERR("%s: Reading Intel boot parameters failed (%ld)", 2056 hdev->name, PTR_ERR(skb)); 2057 return PTR_ERR(skb); 2058 } 2059 2060 if (skb->len != sizeof(*params)) { 2061 BT_ERR("%s: Intel boot parameters size mismatch", hdev->name); 2062 kfree_skb(skb); 2063 return -EILSEQ; 2064 } 2065 2066 params = (struct intel_boot_params *)skb->data; 2067 2068 BT_INFO("%s: Device revision is %u", hdev->name, 2069 le16_to_cpu(params->dev_revid)); 2070 2071 BT_INFO("%s: Secure boot is %s", hdev->name, 2072 params->secure_boot ? "enabled" : "disabled"); 2073 2074 BT_INFO("%s: OTP lock is %s", hdev->name, 2075 params->otp_lock ? "enabled" : "disabled"); 2076 2077 BT_INFO("%s: API lock is %s", hdev->name, 2078 params->api_lock ? "enabled" : "disabled"); 2079 2080 BT_INFO("%s: Debug lock is %s", hdev->name, 2081 params->debug_lock ? "enabled" : "disabled"); 2082 2083 BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name, 2084 params->min_fw_build_nn, params->min_fw_build_cw, 2085 2000 + params->min_fw_build_yy); 2086 2087 /* It is required that every single firmware fragment is acknowledged 2088 * with a command complete event. If the boot parameters indicate 2089 * that this bootloader does not send them, then abort the setup. 2090 */ 2091 if (params->limited_cce != 0x00) { 2092 BT_ERR("%s: Unsupported Intel firmware loading method (%u)", 2093 hdev->name, params->limited_cce); 2094 kfree_skb(skb); 2095 return -EINVAL; 2096 } 2097 2098 /* If the OTP has no valid Bluetooth device address, then there will 2099 * also be no valid address for the operational firmware. 2100 */ 2101 if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) { 2102 BT_INFO("%s: No device address configured", hdev->name); 2103 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2104 } 2105 2106 /* With this Intel bootloader only the hardware variant and device 2107 * revision information are used to select the right firmware. 2108 * 2109 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi. 2110 * 2111 * Currently the supported hardware variants are: 2112 * 11 (0x0b) for iBT3.0 (LnP/SfP) 2113 * 12 (0x0c) for iBT3.5 (WsP) 2114 */ 2115 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi", 2116 le16_to_cpu(ver.hw_variant), 2117 le16_to_cpu(params->dev_revid)); 2118 2119 err = request_firmware(&fw, fwname, &hdev->dev); 2120 if (err < 0) { 2121 BT_ERR("%s: Failed to load Intel firmware file (%d)", 2122 hdev->name, err); 2123 kfree_skb(skb); 2124 return err; 2125 } 2126 2127 BT_INFO("%s: Found device firmware: %s", hdev->name, fwname); 2128 2129 /* Save the DDC file name for later use to apply once the firmware 2130 * downloading is done. 2131 */ 2132 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc", 2133 le16_to_cpu(ver.hw_variant), 2134 le16_to_cpu(params->dev_revid)); 2135 2136 kfree_skb(skb); 2137 2138 if (fw->size < 644) { 2139 BT_ERR("%s: Invalid size of firmware file (%zu)", 2140 hdev->name, fw->size); 2141 err = -EBADF; 2142 goto done; 2143 } 2144 2145 set_bit(BTUSB_DOWNLOADING, &data->flags); 2146 2147 /* Start the firmware download transaction with the Init fragment 2148 * represented by the 128 bytes of CSS header. 2149 */ 2150 err = btintel_secure_send(hdev, 0x00, 128, fw->data); 2151 if (err < 0) { 2152 BT_ERR("%s: Failed to send firmware header (%d)", 2153 hdev->name, err); 2154 goto done; 2155 } 2156 2157 /* Send the 256 bytes of public key information from the firmware 2158 * as the PKey fragment. 2159 */ 2160 err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128); 2161 if (err < 0) { 2162 BT_ERR("%s: Failed to send firmware public key (%d)", 2163 hdev->name, err); 2164 goto done; 2165 } 2166 2167 /* Send the 256 bytes of signature information from the firmware 2168 * as the Sign fragment. 2169 */ 2170 err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388); 2171 if (err < 0) { 2172 BT_ERR("%s: Failed to send firmware signature (%d)", 2173 hdev->name, err); 2174 goto done; 2175 } 2176 2177 fw_ptr = fw->data + 644; 2178 frag_len = 0; 2179 2180 while (fw_ptr - fw->data < fw->size) { 2181 struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len); 2182 2183 frag_len += sizeof(*cmd) + cmd->plen; 2184 2185 /* The parameter length of the secure send command requires 2186 * a 4 byte alignment. It happens so that the firmware file 2187 * contains proper Intel_NOP commands to align the fragments 2188 * as needed. 2189 * 2190 * Send set of commands with 4 byte alignment from the 2191 * firmware data buffer as a single Data fragement. 2192 */ 2193 if (!(frag_len % 4)) { 2194 err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr); 2195 if (err < 0) { 2196 BT_ERR("%s: Failed to send firmware data (%d)", 2197 hdev->name, err); 2198 goto done; 2199 } 2200 2201 fw_ptr += frag_len; 2202 frag_len = 0; 2203 } 2204 } 2205 2206 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2207 2208 BT_INFO("%s: Waiting for firmware download to complete", hdev->name); 2209 2210 /* Before switching the device into operational mode and with that 2211 * booting the loaded firmware, wait for the bootloader notification 2212 * that all fragments have been successfully received. 2213 * 2214 * When the event processing receives the notification, then the 2215 * BTUSB_DOWNLOADING flag will be cleared. 2216 * 2217 * The firmware loading should not take longer than 5 seconds 2218 * and thus just timeout if that happens and fail the setup 2219 * of this device. 2220 */ 2221 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, 2222 TASK_INTERRUPTIBLE, 2223 msecs_to_jiffies(5000)); 2224 if (err == 1) { 2225 BT_ERR("%s: Firmware loading interrupted", hdev->name); 2226 err = -EINTR; 2227 goto done; 2228 } 2229 2230 if (err) { 2231 BT_ERR("%s: Firmware loading timeout", hdev->name); 2232 err = -ETIMEDOUT; 2233 goto done; 2234 } 2235 2236 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { 2237 BT_ERR("%s: Firmware loading failed", hdev->name); 2238 err = -ENOEXEC; 2239 goto done; 2240 } 2241 2242 rettime = ktime_get(); 2243 delta = ktime_sub(rettime, calltime); 2244 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2245 2246 BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration); 2247 2248 done: 2249 release_firmware(fw); 2250 2251 if (err < 0) 2252 return err; 2253 2254 calltime = ktime_get(); 2255 2256 set_bit(BTUSB_BOOTING, &data->flags); 2257 2258 skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param, 2259 HCI_INIT_TIMEOUT); 2260 if (IS_ERR(skb)) 2261 return PTR_ERR(skb); 2262 2263 kfree_skb(skb); 2264 2265 /* The bootloader will not indicate when the device is ready. This 2266 * is done by the operational firmware sending bootup notification. 2267 * 2268 * Booting into operational firmware should not take longer than 2269 * 1 second. However if that happens, then just fail the setup 2270 * since something went wrong. 2271 */ 2272 BT_INFO("%s: Waiting for device to boot", hdev->name); 2273 2274 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, 2275 TASK_INTERRUPTIBLE, 2276 msecs_to_jiffies(1000)); 2277 2278 if (err == 1) { 2279 BT_ERR("%s: Device boot interrupted", hdev->name); 2280 return -EINTR; 2281 } 2282 2283 if (err) { 2284 BT_ERR("%s: Device boot timeout", hdev->name); 2285 return -ETIMEDOUT; 2286 } 2287 2288 rettime = ktime_get(); 2289 delta = ktime_sub(rettime, calltime); 2290 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2291 2292 BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration); 2293 2294 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2295 2296 /* Once the device is running in operational mode, it needs to apply 2297 * the device configuration (DDC) parameters. 2298 * 2299 * The device can work without DDC parameters, so even if it fails 2300 * to load the file, no need to fail the setup. 2301 */ 2302 btintel_load_ddc_config(hdev, fwname); 2303 2304 /* Set the event mask for Intel specific vendor events. This enables 2305 * a few extra events that are useful during general operation. It 2306 * does not enable any debugging related events. 2307 * 2308 * The device will function correctly without these events enabled 2309 * and thus no need to fail the setup. 2310 */ 2311 btintel_set_event_mask(hdev, false); 2312 2313 return 0; 2314 } 2315 2316 static int btusb_shutdown_intel(struct hci_dev *hdev) 2317 { 2318 struct sk_buff *skb; 2319 long ret; 2320 2321 /* Some platforms have an issue with BT LED when the interface is 2322 * down or BT radio is turned off, which takes 5 seconds to BT LED 2323 * goes off. This command turns off the BT LED immediately. 2324 */ 2325 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); 2326 if (IS_ERR(skb)) { 2327 ret = PTR_ERR(skb); 2328 BT_ERR("%s: turning off Intel device LED failed (%ld)", 2329 hdev->name, ret); 2330 return ret; 2331 } 2332 kfree_skb(skb); 2333 2334 return 0; 2335 } 2336 2337 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, 2338 const bdaddr_t *bdaddr) 2339 { 2340 struct sk_buff *skb; 2341 u8 buf[8]; 2342 long ret; 2343 2344 buf[0] = 0xfe; 2345 buf[1] = sizeof(bdaddr_t); 2346 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); 2347 2348 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2349 if (IS_ERR(skb)) { 2350 ret = PTR_ERR(skb); 2351 BT_ERR("%s: changing Marvell device address failed (%ld)", 2352 hdev->name, ret); 2353 return ret; 2354 } 2355 kfree_skb(skb); 2356 2357 return 0; 2358 } 2359 2360 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, 2361 const bdaddr_t *bdaddr) 2362 { 2363 struct sk_buff *skb; 2364 u8 buf[10]; 2365 long ret; 2366 2367 buf[0] = 0x01; 2368 buf[1] = 0x01; 2369 buf[2] = 0x00; 2370 buf[3] = sizeof(bdaddr_t); 2371 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); 2372 2373 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); 2374 if (IS_ERR(skb)) { 2375 ret = PTR_ERR(skb); 2376 BT_ERR("%s: Change address command failed (%ld)", 2377 hdev->name, ret); 2378 return ret; 2379 } 2380 kfree_skb(skb); 2381 2382 return 0; 2383 } 2384 2385 #define QCA_DFU_PACKET_LEN 4096 2386 2387 #define QCA_GET_TARGET_VERSION 0x09 2388 #define QCA_CHECK_STATUS 0x05 2389 #define QCA_DFU_DOWNLOAD 0x01 2390 2391 #define QCA_SYSCFG_UPDATED 0x40 2392 #define QCA_PATCH_UPDATED 0x80 2393 #define QCA_DFU_TIMEOUT 3000 2394 2395 struct qca_version { 2396 __le32 rom_version; 2397 __le32 patch_version; 2398 __le32 ram_version; 2399 __le32 ref_clock; 2400 __u8 reserved[4]; 2401 } __packed; 2402 2403 struct qca_rampatch_version { 2404 __le16 rom_version; 2405 __le16 patch_version; 2406 } __packed; 2407 2408 struct qca_device_info { 2409 u32 rom_version; 2410 u8 rampatch_hdr; /* length of header in rampatch */ 2411 u8 nvm_hdr; /* length of header in NVM */ 2412 u8 ver_offset; /* offset of version structure in rampatch */ 2413 }; 2414 2415 static const struct qca_device_info qca_devices_table[] = { 2416 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */ 2417 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */ 2418 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */ 2419 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */ 2420 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */ 2421 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */ 2422 }; 2423 2424 static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request, 2425 void *data, u16 size) 2426 { 2427 struct btusb_data *btdata = hci_get_drvdata(hdev); 2428 struct usb_device *udev = btdata->udev; 2429 int pipe, err; 2430 u8 *buf; 2431 2432 buf = kmalloc(size, GFP_KERNEL); 2433 if (!buf) 2434 return -ENOMEM; 2435 2436 /* Found some of USB hosts have IOT issues with ours so that we should 2437 * not wait until HCI layer is ready. 2438 */ 2439 pipe = usb_rcvctrlpipe(udev, 0); 2440 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, 2441 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2442 if (err < 0) { 2443 BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err); 2444 goto done; 2445 } 2446 2447 memcpy(data, buf, size); 2448 2449 done: 2450 kfree(buf); 2451 2452 return err; 2453 } 2454 2455 static int btusb_setup_qca_download_fw(struct hci_dev *hdev, 2456 const struct firmware *firmware, 2457 size_t hdr_size) 2458 { 2459 struct btusb_data *btdata = hci_get_drvdata(hdev); 2460 struct usb_device *udev = btdata->udev; 2461 size_t count, size, sent = 0; 2462 int pipe, len, err; 2463 u8 *buf; 2464 2465 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); 2466 if (!buf) 2467 return -ENOMEM; 2468 2469 count = firmware->size; 2470 2471 size = min_t(size_t, count, hdr_size); 2472 memcpy(buf, firmware->data, size); 2473 2474 /* USB patches should go down to controller through USB path 2475 * because binary format fits to go down through USB channel. 2476 * USB control path is for patching headers and USB bulk is for 2477 * patch body. 2478 */ 2479 pipe = usb_sndctrlpipe(udev, 0); 2480 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, 2481 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 2482 if (err < 0) { 2483 BT_ERR("%s: Failed to send headers (%d)", hdev->name, err); 2484 goto done; 2485 } 2486 2487 sent += size; 2488 count -= size; 2489 2490 while (count) { 2491 size = min_t(size_t, count, QCA_DFU_PACKET_LEN); 2492 2493 memcpy(buf, firmware->data + sent, size); 2494 2495 pipe = usb_sndbulkpipe(udev, 0x02); 2496 err = usb_bulk_msg(udev, pipe, buf, size, &len, 2497 QCA_DFU_TIMEOUT); 2498 if (err < 0) { 2499 BT_ERR("%s: Failed to send body at %zd of %zd (%d)", 2500 hdev->name, sent, firmware->size, err); 2501 break; 2502 } 2503 2504 if (size != len) { 2505 BT_ERR("%s: Failed to get bulk buffer", hdev->name); 2506 err = -EILSEQ; 2507 break; 2508 } 2509 2510 sent += size; 2511 count -= size; 2512 } 2513 2514 done: 2515 kfree(buf); 2516 return err; 2517 } 2518 2519 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, 2520 struct qca_version *ver, 2521 const struct qca_device_info *info) 2522 { 2523 struct qca_rampatch_version *rver; 2524 const struct firmware *fw; 2525 u32 ver_rom, ver_patch; 2526 u16 rver_rom, rver_patch; 2527 char fwname[64]; 2528 int err; 2529 2530 ver_rom = le32_to_cpu(ver->rom_version); 2531 ver_patch = le32_to_cpu(ver->patch_version); 2532 2533 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); 2534 2535 err = request_firmware(&fw, fwname, &hdev->dev); 2536 if (err) { 2537 BT_ERR("%s: failed to request rampatch file: %s (%d)", 2538 hdev->name, fwname, err); 2539 return err; 2540 } 2541 2542 BT_INFO("%s: using rampatch file: %s", hdev->name, fwname); 2543 2544 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); 2545 rver_rom = le16_to_cpu(rver->rom_version); 2546 rver_patch = le16_to_cpu(rver->patch_version); 2547 2548 BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x " 2549 "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom, 2550 ver_patch); 2551 2552 if (rver_rom != ver_rom || rver_patch <= ver_patch) { 2553 BT_ERR("%s: rampatch file version did not match with firmware", 2554 hdev->name); 2555 err = -EINVAL; 2556 goto done; 2557 } 2558 2559 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); 2560 2561 done: 2562 release_firmware(fw); 2563 2564 return err; 2565 } 2566 2567 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, 2568 struct qca_version *ver, 2569 const struct qca_device_info *info) 2570 { 2571 const struct firmware *fw; 2572 char fwname[64]; 2573 int err; 2574 2575 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", 2576 le32_to_cpu(ver->rom_version)); 2577 2578 err = request_firmware(&fw, fwname, &hdev->dev); 2579 if (err) { 2580 BT_ERR("%s: failed to request NVM file: %s (%d)", 2581 hdev->name, fwname, err); 2582 return err; 2583 } 2584 2585 BT_INFO("%s: using NVM file: %s", hdev->name, fwname); 2586 2587 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); 2588 2589 release_firmware(fw); 2590 2591 return err; 2592 } 2593 2594 static int btusb_setup_qca(struct hci_dev *hdev) 2595 { 2596 const struct qca_device_info *info = NULL; 2597 struct qca_version ver; 2598 u32 ver_rom; 2599 u8 status; 2600 int i, err; 2601 2602 err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver, 2603 sizeof(ver)); 2604 if (err < 0) 2605 return err; 2606 2607 ver_rom = le32_to_cpu(ver.rom_version); 2608 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { 2609 if (ver_rom == qca_devices_table[i].rom_version) 2610 info = &qca_devices_table[i]; 2611 } 2612 if (!info) { 2613 BT_ERR("%s: don't support firmware rome 0x%x", hdev->name, 2614 ver_rom); 2615 return -ENODEV; 2616 } 2617 2618 err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status, 2619 sizeof(status)); 2620 if (err < 0) 2621 return err; 2622 2623 if (!(status & QCA_PATCH_UPDATED)) { 2624 err = btusb_setup_qca_load_rampatch(hdev, &ver, info); 2625 if (err < 0) 2626 return err; 2627 } 2628 2629 if (!(status & QCA_SYSCFG_UPDATED)) { 2630 err = btusb_setup_qca_load_nvm(hdev, &ver, info); 2631 if (err < 0) 2632 return err; 2633 } 2634 2635 return 0; 2636 } 2637 2638 #ifdef CONFIG_BT_HCIBTUSB_BCM 2639 static inline int __set_diag_interface(struct hci_dev *hdev) 2640 { 2641 struct btusb_data *data = hci_get_drvdata(hdev); 2642 struct usb_interface *intf = data->diag; 2643 int i; 2644 2645 if (!data->diag) 2646 return -ENODEV; 2647 2648 data->diag_tx_ep = NULL; 2649 data->diag_rx_ep = NULL; 2650 2651 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2652 struct usb_endpoint_descriptor *ep_desc; 2653 2654 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2655 2656 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2657 data->diag_tx_ep = ep_desc; 2658 continue; 2659 } 2660 2661 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2662 data->diag_rx_ep = ep_desc; 2663 continue; 2664 } 2665 } 2666 2667 if (!data->diag_tx_ep || !data->diag_rx_ep) { 2668 BT_ERR("%s invalid diagnostic descriptors", hdev->name); 2669 return -ENODEV; 2670 } 2671 2672 return 0; 2673 } 2674 2675 static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) 2676 { 2677 struct btusb_data *data = hci_get_drvdata(hdev); 2678 struct sk_buff *skb; 2679 struct urb *urb; 2680 unsigned int pipe; 2681 2682 if (!data->diag_tx_ep) 2683 return ERR_PTR(-ENODEV); 2684 2685 urb = usb_alloc_urb(0, GFP_KERNEL); 2686 if (!urb) 2687 return ERR_PTR(-ENOMEM); 2688 2689 skb = bt_skb_alloc(2, GFP_KERNEL); 2690 if (!skb) { 2691 usb_free_urb(urb); 2692 return ERR_PTR(-ENOMEM); 2693 } 2694 2695 *skb_put(skb, 1) = 0xf0; 2696 *skb_put(skb, 1) = enable; 2697 2698 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); 2699 2700 usb_fill_bulk_urb(urb, data->udev, pipe, 2701 skb->data, skb->len, btusb_tx_complete, skb); 2702 2703 skb->dev = (void *)hdev; 2704 2705 return urb; 2706 } 2707 2708 static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) 2709 { 2710 struct btusb_data *data = hci_get_drvdata(hdev); 2711 struct urb *urb; 2712 2713 if (!data->diag) 2714 return -ENODEV; 2715 2716 if (!test_bit(HCI_RUNNING, &hdev->flags)) 2717 return -ENETDOWN; 2718 2719 urb = alloc_diag_urb(hdev, enable); 2720 if (IS_ERR(urb)) 2721 return PTR_ERR(urb); 2722 2723 return submit_or_queue_tx_urb(hdev, urb); 2724 } 2725 #endif 2726 2727 static int btusb_probe(struct usb_interface *intf, 2728 const struct usb_device_id *id) 2729 { 2730 struct usb_endpoint_descriptor *ep_desc; 2731 struct btusb_data *data; 2732 struct hci_dev *hdev; 2733 unsigned ifnum_base; 2734 int i, err; 2735 2736 BT_DBG("intf %p id %p", intf, id); 2737 2738 /* interface numbers are hardcoded in the spec */ 2739 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { 2740 if (!(id->driver_info & BTUSB_IFNUM_2)) 2741 return -ENODEV; 2742 if (intf->cur_altsetting->desc.bInterfaceNumber != 2) 2743 return -ENODEV; 2744 } 2745 2746 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; 2747 2748 if (!id->driver_info) { 2749 const struct usb_device_id *match; 2750 2751 match = usb_match_id(intf, blacklist_table); 2752 if (match) 2753 id = match; 2754 } 2755 2756 if (id->driver_info == BTUSB_IGNORE) 2757 return -ENODEV; 2758 2759 if (id->driver_info & BTUSB_ATH3012) { 2760 struct usb_device *udev = interface_to_usbdev(intf); 2761 2762 /* Old firmware would otherwise let ath3k driver load 2763 * patch and sysconfig files */ 2764 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001) 2765 return -ENODEV; 2766 } 2767 2768 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); 2769 if (!data) 2770 return -ENOMEM; 2771 2772 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 2773 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 2774 2775 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { 2776 data->intr_ep = ep_desc; 2777 continue; 2778 } 2779 2780 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 2781 data->bulk_tx_ep = ep_desc; 2782 continue; 2783 } 2784 2785 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 2786 data->bulk_rx_ep = ep_desc; 2787 continue; 2788 } 2789 } 2790 2791 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) 2792 return -ENODEV; 2793 2794 if (id->driver_info & BTUSB_AMP) { 2795 data->cmdreq_type = USB_TYPE_CLASS | 0x01; 2796 data->cmdreq = 0x2b; 2797 } else { 2798 data->cmdreq_type = USB_TYPE_CLASS; 2799 data->cmdreq = 0x00; 2800 } 2801 2802 data->udev = interface_to_usbdev(intf); 2803 data->intf = intf; 2804 2805 INIT_WORK(&data->work, btusb_work); 2806 INIT_WORK(&data->waker, btusb_waker); 2807 init_usb_anchor(&data->deferred); 2808 init_usb_anchor(&data->tx_anchor); 2809 spin_lock_init(&data->txlock); 2810 2811 init_usb_anchor(&data->intr_anchor); 2812 init_usb_anchor(&data->bulk_anchor); 2813 init_usb_anchor(&data->isoc_anchor); 2814 init_usb_anchor(&data->diag_anchor); 2815 spin_lock_init(&data->rxlock); 2816 2817 if (id->driver_info & BTUSB_INTEL_NEW) { 2818 data->recv_event = btusb_recv_event_intel; 2819 data->recv_bulk = btusb_recv_bulk_intel; 2820 set_bit(BTUSB_BOOTLOADER, &data->flags); 2821 } else { 2822 data->recv_event = hci_recv_frame; 2823 data->recv_bulk = btusb_recv_bulk; 2824 } 2825 2826 hdev = hci_alloc_dev(); 2827 if (!hdev) 2828 return -ENOMEM; 2829 2830 hdev->bus = HCI_USB; 2831 hci_set_drvdata(hdev, data); 2832 2833 if (id->driver_info & BTUSB_AMP) 2834 hdev->dev_type = HCI_AMP; 2835 else 2836 hdev->dev_type = HCI_PRIMARY; 2837 2838 data->hdev = hdev; 2839 2840 SET_HCIDEV_DEV(hdev, &intf->dev); 2841 2842 hdev->open = btusb_open; 2843 hdev->close = btusb_close; 2844 hdev->flush = btusb_flush; 2845 hdev->send = btusb_send_frame; 2846 hdev->notify = btusb_notify; 2847 2848 if (id->driver_info & BTUSB_BCM2045) 2849 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 2850 2851 if (id->driver_info & BTUSB_BCM92035) 2852 hdev->setup = btusb_setup_bcm92035; 2853 2854 #ifdef CONFIG_BT_HCIBTUSB_BCM 2855 if (id->driver_info & BTUSB_BCM_PATCHRAM) { 2856 hdev->manufacturer = 15; 2857 hdev->setup = btbcm_setup_patchram; 2858 hdev->set_diag = btusb_bcm_set_diag; 2859 hdev->set_bdaddr = btbcm_set_bdaddr; 2860 2861 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 2862 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 2863 } 2864 2865 if (id->driver_info & BTUSB_BCM_APPLE) { 2866 hdev->manufacturer = 15; 2867 hdev->setup = btbcm_setup_apple; 2868 hdev->set_diag = btusb_bcm_set_diag; 2869 2870 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 2871 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 2872 } 2873 #endif 2874 2875 if (id->driver_info & BTUSB_INTEL) { 2876 hdev->manufacturer = 2; 2877 hdev->setup = btusb_setup_intel; 2878 hdev->shutdown = btusb_shutdown_intel; 2879 hdev->set_diag = btintel_set_diag_mfg; 2880 hdev->set_bdaddr = btintel_set_bdaddr; 2881 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2882 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2883 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 2884 } 2885 2886 if (id->driver_info & BTUSB_INTEL_NEW) { 2887 hdev->manufacturer = 2; 2888 hdev->send = btusb_send_frame_intel; 2889 hdev->setup = btusb_setup_intel_new; 2890 hdev->hw_error = btintel_hw_error; 2891 hdev->set_diag = btintel_set_diag; 2892 hdev->set_bdaddr = btintel_set_bdaddr; 2893 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2894 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 2895 } 2896 2897 if (id->driver_info & BTUSB_MARVELL) 2898 hdev->set_bdaddr = btusb_set_bdaddr_marvell; 2899 2900 if (id->driver_info & BTUSB_SWAVE) { 2901 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); 2902 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); 2903 } 2904 2905 if (id->driver_info & BTUSB_INTEL_BOOT) { 2906 hdev->manufacturer = 2; 2907 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 2908 } 2909 2910 if (id->driver_info & BTUSB_ATH3012) { 2911 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 2912 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2913 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 2914 } 2915 2916 if (id->driver_info & BTUSB_QCA_ROME) { 2917 data->setup_on_usb = btusb_setup_qca; 2918 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 2919 } 2920 2921 #ifdef CONFIG_BT_HCIBTUSB_RTL 2922 if (id->driver_info & BTUSB_REALTEK) { 2923 hdev->setup = btrtl_setup_realtek; 2924 2925 /* Realtek devices lose their updated firmware over suspend, 2926 * but the USB hub doesn't notice any status change. 2927 * Explicitly request a device reset on resume. 2928 */ 2929 set_bit(BTUSB_RESET_RESUME, &data->flags); 2930 } 2931 #endif 2932 2933 if (id->driver_info & BTUSB_AMP) { 2934 /* AMP controllers do not support SCO packets */ 2935 data->isoc = NULL; 2936 } else { 2937 /* Interface orders are hardcoded in the specification */ 2938 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); 2939 } 2940 2941 if (!reset) 2942 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2943 2944 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { 2945 if (!disable_scofix) 2946 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); 2947 } 2948 2949 if (id->driver_info & BTUSB_BROKEN_ISOC) 2950 data->isoc = NULL; 2951 2952 if (id->driver_info & BTUSB_DIGIANSWER) { 2953 data->cmdreq_type = USB_TYPE_VENDOR; 2954 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2955 } 2956 2957 if (id->driver_info & BTUSB_CSR) { 2958 struct usb_device *udev = data->udev; 2959 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); 2960 2961 /* Old firmware would otherwise execute USB reset */ 2962 if (bcdDevice < 0x117) 2963 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 2964 2965 /* Fake CSR devices with broken commands */ 2966 if (bcdDevice <= 0x100 || bcdDevice == 0x134) 2967 hdev->setup = btusb_setup_csr; 2968 2969 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 2970 } 2971 2972 if (id->driver_info & BTUSB_SNIFFER) { 2973 struct usb_device *udev = data->udev; 2974 2975 /* New sniffer firmware has crippled HCI interface */ 2976 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) 2977 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 2978 } 2979 2980 if (id->driver_info & BTUSB_INTEL_BOOT) { 2981 /* A bug in the bootloader causes that interrupt interface is 2982 * only enabled after receiving SetInterface(0, AltSetting=0). 2983 */ 2984 err = usb_set_interface(data->udev, 0, 0); 2985 if (err < 0) { 2986 BT_ERR("failed to set interface 0, alt 0 %d", err); 2987 hci_free_dev(hdev); 2988 return err; 2989 } 2990 } 2991 2992 if (data->isoc) { 2993 err = usb_driver_claim_interface(&btusb_driver, 2994 data->isoc, data); 2995 if (err < 0) { 2996 hci_free_dev(hdev); 2997 return err; 2998 } 2999 } 3000 3001 #ifdef CONFIG_BT_HCIBTUSB_BCM 3002 if (data->diag) { 3003 if (!usb_driver_claim_interface(&btusb_driver, 3004 data->diag, data)) 3005 __set_diag_interface(hdev); 3006 else 3007 data->diag = NULL; 3008 } 3009 #endif 3010 3011 err = hci_register_dev(hdev); 3012 if (err < 0) { 3013 hci_free_dev(hdev); 3014 return err; 3015 } 3016 3017 usb_set_intfdata(intf, data); 3018 3019 return 0; 3020 } 3021 3022 static void btusb_disconnect(struct usb_interface *intf) 3023 { 3024 struct btusb_data *data = usb_get_intfdata(intf); 3025 struct hci_dev *hdev; 3026 3027 BT_DBG("intf %p", intf); 3028 3029 if (!data) 3030 return; 3031 3032 hdev = data->hdev; 3033 usb_set_intfdata(data->intf, NULL); 3034 3035 if (data->isoc) 3036 usb_set_intfdata(data->isoc, NULL); 3037 3038 if (data->diag) 3039 usb_set_intfdata(data->diag, NULL); 3040 3041 hci_unregister_dev(hdev); 3042 3043 if (intf == data->intf) { 3044 if (data->isoc) 3045 usb_driver_release_interface(&btusb_driver, data->isoc); 3046 if (data->diag) 3047 usb_driver_release_interface(&btusb_driver, data->diag); 3048 } else if (intf == data->isoc) { 3049 if (data->diag) 3050 usb_driver_release_interface(&btusb_driver, data->diag); 3051 usb_driver_release_interface(&btusb_driver, data->intf); 3052 } else if (intf == data->diag) { 3053 usb_driver_release_interface(&btusb_driver, data->intf); 3054 if (data->isoc) 3055 usb_driver_release_interface(&btusb_driver, data->isoc); 3056 } 3057 3058 hci_free_dev(hdev); 3059 } 3060 3061 #ifdef CONFIG_PM 3062 static int btusb_suspend(struct usb_interface *intf, pm_message_t message) 3063 { 3064 struct btusb_data *data = usb_get_intfdata(intf); 3065 3066 BT_DBG("intf %p", intf); 3067 3068 if (data->suspend_count++) 3069 return 0; 3070 3071 spin_lock_irq(&data->txlock); 3072 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { 3073 set_bit(BTUSB_SUSPENDING, &data->flags); 3074 spin_unlock_irq(&data->txlock); 3075 } else { 3076 spin_unlock_irq(&data->txlock); 3077 data->suspend_count--; 3078 return -EBUSY; 3079 } 3080 3081 cancel_work_sync(&data->work); 3082 3083 btusb_stop_traffic(data); 3084 usb_kill_anchored_urbs(&data->tx_anchor); 3085 3086 /* Optionally request a device reset on resume, but only when 3087 * wakeups are disabled. If wakeups are enabled we assume the 3088 * device will stay powered up throughout suspend. 3089 */ 3090 if (test_bit(BTUSB_RESET_RESUME, &data->flags) && 3091 !device_may_wakeup(&data->udev->dev)) 3092 data->udev->reset_resume = 1; 3093 3094 return 0; 3095 } 3096 3097 static void play_deferred(struct btusb_data *data) 3098 { 3099 struct urb *urb; 3100 int err; 3101 3102 while ((urb = usb_get_from_anchor(&data->deferred))) { 3103 err = usb_submit_urb(urb, GFP_ATOMIC); 3104 if (err < 0) 3105 break; 3106 3107 data->tx_in_flight++; 3108 } 3109 usb_scuttle_anchored_urbs(&data->deferred); 3110 } 3111 3112 static int btusb_resume(struct usb_interface *intf) 3113 { 3114 struct btusb_data *data = usb_get_intfdata(intf); 3115 struct hci_dev *hdev = data->hdev; 3116 int err = 0; 3117 3118 BT_DBG("intf %p", intf); 3119 3120 if (--data->suspend_count) 3121 return 0; 3122 3123 if (!test_bit(HCI_RUNNING, &hdev->flags)) 3124 goto done; 3125 3126 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { 3127 err = btusb_submit_intr_urb(hdev, GFP_NOIO); 3128 if (err < 0) { 3129 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 3130 goto failed; 3131 } 3132 } 3133 3134 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { 3135 err = btusb_submit_bulk_urb(hdev, GFP_NOIO); 3136 if (err < 0) { 3137 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 3138 goto failed; 3139 } 3140 3141 btusb_submit_bulk_urb(hdev, GFP_NOIO); 3142 } 3143 3144 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 3145 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) 3146 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 3147 else 3148 btusb_submit_isoc_urb(hdev, GFP_NOIO); 3149 } 3150 3151 spin_lock_irq(&data->txlock); 3152 play_deferred(data); 3153 clear_bit(BTUSB_SUSPENDING, &data->flags); 3154 spin_unlock_irq(&data->txlock); 3155 schedule_work(&data->work); 3156 3157 return 0; 3158 3159 failed: 3160 usb_scuttle_anchored_urbs(&data->deferred); 3161 done: 3162 spin_lock_irq(&data->txlock); 3163 clear_bit(BTUSB_SUSPENDING, &data->flags); 3164 spin_unlock_irq(&data->txlock); 3165 3166 return err; 3167 } 3168 #endif 3169 3170 static struct usb_driver btusb_driver = { 3171 .name = "btusb", 3172 .probe = btusb_probe, 3173 .disconnect = btusb_disconnect, 3174 #ifdef CONFIG_PM 3175 .suspend = btusb_suspend, 3176 .resume = btusb_resume, 3177 #endif 3178 .id_table = btusb_table, 3179 .supports_autosuspend = 1, 3180 .disable_hub_initiated_lpm = 1, 3181 }; 3182 3183 module_usb_driver(btusb_driver); 3184 3185 module_param(disable_scofix, bool, 0644); 3186 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); 3187 3188 module_param(force_scofix, bool, 0644); 3189 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); 3190 3191 module_param(reset, bool, 0644); 3192 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); 3193 3194 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); 3195 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); 3196 MODULE_VERSION(VERSION); 3197 MODULE_LICENSE("GPL"); 3198