1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * 4 * Generic Bluetooth USB driver 5 * 6 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> 7 */ 8 9 #include <linux/dmi.h> 10 #include <linux/module.h> 11 #include <linux/usb.h> 12 #include <linux/usb/quirks.h> 13 #include <linux/firmware.h> 14 #include <linux/iopoll.h> 15 #include <linux/of_device.h> 16 #include <linux/of_irq.h> 17 #include <linux/suspend.h> 18 #include <linux/gpio/consumer.h> 19 #include <asm/unaligned.h> 20 21 #include <net/bluetooth/bluetooth.h> 22 #include <net/bluetooth/hci_core.h> 23 24 #include "btintel.h" 25 #include "btbcm.h" 26 #include "btrtl.h" 27 28 #define VERSION "0.8" 29 30 static bool disable_scofix; 31 static bool force_scofix; 32 static bool enable_autosuspend = IS_ENABLED(CONFIG_BT_HCIBTUSB_AUTOSUSPEND); 33 34 static bool reset = true; 35 36 static struct usb_driver btusb_driver; 37 38 #define BTUSB_IGNORE 0x01 39 #define BTUSB_DIGIANSWER 0x02 40 #define BTUSB_CSR 0x04 41 #define BTUSB_SNIFFER 0x08 42 #define BTUSB_BCM92035 0x10 43 #define BTUSB_BROKEN_ISOC 0x20 44 #define BTUSB_WRONG_SCO_MTU 0x40 45 #define BTUSB_ATH3012 0x80 46 #define BTUSB_INTEL 0x100 47 #define BTUSB_INTEL_BOOT 0x200 48 #define BTUSB_BCM_PATCHRAM 0x400 49 #define BTUSB_MARVELL 0x800 50 #define BTUSB_SWAVE 0x1000 51 #define BTUSB_INTEL_NEW 0x2000 52 #define BTUSB_AMP 0x4000 53 #define BTUSB_QCA_ROME 0x8000 54 #define BTUSB_BCM_APPLE 0x10000 55 #define BTUSB_REALTEK 0x20000 56 #define BTUSB_BCM2045 0x40000 57 #define BTUSB_IFNUM_2 0x80000 58 #define BTUSB_CW6622 0x100000 59 #define BTUSB_MEDIATEK 0x200000 60 #define BTUSB_WIDEBAND_SPEECH 0x400000 61 #define BTUSB_VALID_LE_STATES 0x800000 62 #define BTUSB_QCA_WCN6855 0x1000000 63 #define BTUSB_INTEL_NEWGEN 0x2000000 64 65 static const struct usb_device_id btusb_table[] = { 66 /* Generic Bluetooth USB device */ 67 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, 68 69 /* Generic Bluetooth AMP device */ 70 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, 71 72 /* Generic Bluetooth USB interface */ 73 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, 74 75 /* Apple-specific (Broadcom) devices */ 76 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), 77 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, 78 79 /* MediaTek MT76x0E */ 80 { USB_DEVICE(0x0e8d, 0x763f) }, 81 82 /* Broadcom SoftSailing reporting vendor specific */ 83 { USB_DEVICE(0x0a5c, 0x21e1) }, 84 85 /* Apple MacBookPro 7,1 */ 86 { USB_DEVICE(0x05ac, 0x8213) }, 87 88 /* Apple iMac11,1 */ 89 { USB_DEVICE(0x05ac, 0x8215) }, 90 91 /* Apple MacBookPro6,2 */ 92 { USB_DEVICE(0x05ac, 0x8218) }, 93 94 /* Apple MacBookAir3,1, MacBookAir3,2 */ 95 { USB_DEVICE(0x05ac, 0x821b) }, 96 97 /* Apple MacBookAir4,1 */ 98 { USB_DEVICE(0x05ac, 0x821f) }, 99 100 /* Apple MacBookPro8,2 */ 101 { USB_DEVICE(0x05ac, 0x821a) }, 102 103 /* Apple MacMini5,1 */ 104 { USB_DEVICE(0x05ac, 0x8281) }, 105 106 /* AVM BlueFRITZ! USB v2.0 */ 107 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, 108 109 /* Bluetooth Ultraport Module from IBM */ 110 { USB_DEVICE(0x04bf, 0x030a) }, 111 112 /* ALPS Modules with non-standard id */ 113 { USB_DEVICE(0x044e, 0x3001) }, 114 { USB_DEVICE(0x044e, 0x3002) }, 115 116 /* Ericsson with non-standard id */ 117 { USB_DEVICE(0x0bdb, 0x1002) }, 118 119 /* Canyon CN-BTU1 with HID interfaces */ 120 { USB_DEVICE(0x0c10, 0x0000) }, 121 122 /* Broadcom BCM20702A0 */ 123 { USB_DEVICE(0x413c, 0x8197) }, 124 125 /* Broadcom BCM20702B0 (Dynex/Insignia) */ 126 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, 127 128 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ 129 { USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01), 130 .driver_info = BTUSB_BCM_PATCHRAM }, 131 132 /* Broadcom BCM920703 (HTC Vive) */ 133 { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01), 134 .driver_info = BTUSB_BCM_PATCHRAM }, 135 136 /* Foxconn - Hon Hai */ 137 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), 138 .driver_info = BTUSB_BCM_PATCHRAM }, 139 140 /* Lite-On Technology - Broadcom based */ 141 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), 142 .driver_info = BTUSB_BCM_PATCHRAM }, 143 144 /* Broadcom devices with vendor specific id */ 145 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), 146 .driver_info = BTUSB_BCM_PATCHRAM }, 147 148 /* ASUSTek Computer - Broadcom based */ 149 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), 150 .driver_info = BTUSB_BCM_PATCHRAM }, 151 152 /* Belkin F8065bf - Broadcom based */ 153 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), 154 .driver_info = BTUSB_BCM_PATCHRAM }, 155 156 /* IMC Networks - Broadcom based */ 157 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), 158 .driver_info = BTUSB_BCM_PATCHRAM }, 159 160 /* Dell Computer - Broadcom based */ 161 { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01), 162 .driver_info = BTUSB_BCM_PATCHRAM }, 163 164 /* Toshiba Corp - Broadcom based */ 165 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), 166 .driver_info = BTUSB_BCM_PATCHRAM }, 167 168 /* Intel Bluetooth USB Bootloader (RAM module) */ 169 { USB_DEVICE(0x8087, 0x0a5a), 170 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, 171 172 { } /* Terminating entry */ 173 }; 174 175 MODULE_DEVICE_TABLE(usb, btusb_table); 176 177 static const struct usb_device_id blacklist_table[] = { 178 /* CSR BlueCore devices */ 179 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, 180 181 /* Broadcom BCM2033 without firmware */ 182 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, 183 184 /* Broadcom BCM2045 devices */ 185 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, 186 187 /* Atheros 3011 with sflash firmware */ 188 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, 189 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, 190 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, 191 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, 192 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, 193 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, 194 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, 195 196 /* Atheros AR9285 Malbec with sflash firmware */ 197 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, 198 199 /* Atheros 3012 with sflash firmware */ 200 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, 201 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, 202 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, 203 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, 204 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, 205 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, 206 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, 207 { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 }, 208 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, 209 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, 210 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, 211 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, 212 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, 213 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, 214 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, 215 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, 216 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, 217 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, 218 { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 }, 219 { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 }, 220 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, 221 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, 222 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, 223 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, 224 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, 225 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, 226 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, 227 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, 228 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, 229 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, 230 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, 231 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, 232 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, 233 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, 234 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, 235 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, 236 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, 237 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, 238 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, 239 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, 240 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, 241 { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 }, 242 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, 243 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, 244 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, 245 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, 246 { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 }, 247 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, 248 { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 }, 249 { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 }, 250 251 /* Atheros AR5BBU12 with sflash firmware */ 252 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, 253 254 /* Atheros AR5BBU12 with sflash firmware */ 255 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, 256 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, 257 258 /* QCA ROME chipset */ 259 { USB_DEVICE(0x0cf3, 0x535b), .driver_info = BTUSB_QCA_ROME | 260 BTUSB_WIDEBAND_SPEECH }, 261 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME | 262 BTUSB_WIDEBAND_SPEECH }, 263 { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME | 264 BTUSB_WIDEBAND_SPEECH }, 265 { USB_DEVICE(0x0cf3, 0xe010), .driver_info = BTUSB_QCA_ROME | 266 BTUSB_WIDEBAND_SPEECH }, 267 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME | 268 BTUSB_WIDEBAND_SPEECH }, 269 { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME | 270 BTUSB_WIDEBAND_SPEECH }, 271 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME | 272 BTUSB_WIDEBAND_SPEECH }, 273 { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME | 274 BTUSB_WIDEBAND_SPEECH }, 275 { USB_DEVICE(0x0489, 0xe09f), .driver_info = BTUSB_QCA_ROME | 276 BTUSB_WIDEBAND_SPEECH }, 277 { USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME | 278 BTUSB_WIDEBAND_SPEECH }, 279 { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME | 280 BTUSB_WIDEBAND_SPEECH }, 281 { USB_DEVICE(0x04ca, 0x3015), .driver_info = BTUSB_QCA_ROME | 282 BTUSB_WIDEBAND_SPEECH }, 283 { USB_DEVICE(0x04ca, 0x3016), .driver_info = BTUSB_QCA_ROME | 284 BTUSB_WIDEBAND_SPEECH }, 285 { USB_DEVICE(0x04ca, 0x301a), .driver_info = BTUSB_QCA_ROME | 286 BTUSB_WIDEBAND_SPEECH }, 287 { USB_DEVICE(0x04ca, 0x3021), .driver_info = BTUSB_QCA_ROME | 288 BTUSB_WIDEBAND_SPEECH }, 289 { USB_DEVICE(0x13d3, 0x3491), .driver_info = BTUSB_QCA_ROME | 290 BTUSB_WIDEBAND_SPEECH }, 291 { USB_DEVICE(0x13d3, 0x3496), .driver_info = BTUSB_QCA_ROME | 292 BTUSB_WIDEBAND_SPEECH }, 293 { USB_DEVICE(0x13d3, 0x3501), .driver_info = BTUSB_QCA_ROME | 294 BTUSB_WIDEBAND_SPEECH }, 295 296 /* QCA WCN6855 chipset */ 297 { USB_DEVICE(0x0cf3, 0xe600), .driver_info = BTUSB_QCA_WCN6855 | 298 BTUSB_WIDEBAND_SPEECH }, 299 300 /* Broadcom BCM2035 */ 301 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, 302 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, 303 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, 304 305 /* Broadcom BCM2045 */ 306 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, 307 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, 308 309 /* IBM/Lenovo ThinkPad with Broadcom chip */ 310 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, 311 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, 312 313 /* HP laptop with Broadcom chip */ 314 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, 315 316 /* Dell laptop with Broadcom chip */ 317 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, 318 319 /* Dell Wireless 370 and 410 devices */ 320 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, 321 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, 322 323 /* Belkin F8T012 and F8T013 devices */ 324 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, 325 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, 326 327 /* Asus WL-BTD202 device */ 328 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, 329 330 /* Kensington Bluetooth USB adapter */ 331 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, 332 333 /* RTX Telecom based adapters with buggy SCO support */ 334 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, 335 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, 336 337 /* CONWISE Technology based adapters with buggy SCO support */ 338 { USB_DEVICE(0x0e5e, 0x6622), 339 .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622}, 340 341 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ 342 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, 343 344 /* Digianswer devices */ 345 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, 346 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, 347 348 /* CSR BlueCore Bluetooth Sniffer */ 349 { USB_DEVICE(0x0a12, 0x0002), 350 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 351 352 /* Frontline ComProbe Bluetooth Sniffer */ 353 { USB_DEVICE(0x16d3, 0x0002), 354 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, 355 356 /* Marvell Bluetooth devices */ 357 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, 358 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, 359 { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL }, 360 361 /* Intel Bluetooth devices */ 362 { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW | 363 BTUSB_WIDEBAND_SPEECH | 364 BTUSB_VALID_LE_STATES }, 365 { USB_DEVICE(0x8087, 0x0026), .driver_info = BTUSB_INTEL_NEW | 366 BTUSB_WIDEBAND_SPEECH }, 367 { USB_DEVICE(0x8087, 0x0029), .driver_info = BTUSB_INTEL_NEW | 368 BTUSB_WIDEBAND_SPEECH }, 369 { USB_DEVICE(0x8087, 0x0032), .driver_info = BTUSB_INTEL_NEWGEN | 370 BTUSB_WIDEBAND_SPEECH}, 371 { USB_DEVICE(0x8087, 0x0033), .driver_info = BTUSB_INTEL_NEWGEN | 372 BTUSB_WIDEBAND_SPEECH}, 373 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, 374 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, 375 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, 376 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW | 377 BTUSB_WIDEBAND_SPEECH }, 378 { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL | 379 BTUSB_WIDEBAND_SPEECH }, 380 { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_NEW | 381 BTUSB_WIDEBAND_SPEECH | 382 BTUSB_VALID_LE_STATES }, 383 384 /* Other Intel Bluetooth devices */ 385 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), 386 .driver_info = BTUSB_IGNORE }, 387 388 /* Realtek 8822CE Bluetooth devices */ 389 { USB_DEVICE(0x0bda, 0xb00c), .driver_info = BTUSB_REALTEK | 390 BTUSB_WIDEBAND_SPEECH }, 391 392 /* Realtek 8852AE Bluetooth devices */ 393 { USB_DEVICE(0x0bda, 0xc852), .driver_info = BTUSB_REALTEK | 394 BTUSB_WIDEBAND_SPEECH }, 395 396 /* Realtek Bluetooth devices */ 397 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), 398 .driver_info = BTUSB_REALTEK }, 399 400 /* MediaTek Bluetooth devices */ 401 { USB_VENDOR_AND_INTERFACE_INFO(0x0e8d, 0xe0, 0x01, 0x01), 402 .driver_info = BTUSB_MEDIATEK | 403 BTUSB_WIDEBAND_SPEECH | 404 BTUSB_VALID_LE_STATES }, 405 406 /* Additional MediaTek MT7615E Bluetooth devices */ 407 { USB_DEVICE(0x13d3, 0x3560), .driver_info = BTUSB_MEDIATEK}, 408 409 /* Additional Realtek 8723AE Bluetooth devices */ 410 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, 411 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, 412 413 /* Additional Realtek 8723BE Bluetooth devices */ 414 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, 415 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, 416 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, 417 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, 418 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, 419 { USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK }, 420 421 /* Additional Realtek 8723BU Bluetooth devices */ 422 { USB_DEVICE(0x7392, 0xa611), .driver_info = BTUSB_REALTEK }, 423 424 /* Additional Realtek 8723DE Bluetooth devices */ 425 { USB_DEVICE(0x0bda, 0xb009), .driver_info = BTUSB_REALTEK }, 426 { USB_DEVICE(0x2ff8, 0xb011), .driver_info = BTUSB_REALTEK }, 427 428 /* Additional Realtek 8821AE Bluetooth devices */ 429 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, 430 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, 431 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, 432 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, 433 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, 434 435 /* Additional Realtek 8822BE Bluetooth devices */ 436 { USB_DEVICE(0x13d3, 0x3526), .driver_info = BTUSB_REALTEK }, 437 { USB_DEVICE(0x0b05, 0x185c), .driver_info = BTUSB_REALTEK }, 438 439 /* Additional Realtek 8822CE Bluetooth devices */ 440 { USB_DEVICE(0x04ca, 0x4005), .driver_info = BTUSB_REALTEK | 441 BTUSB_WIDEBAND_SPEECH }, 442 { USB_DEVICE(0x04c5, 0x161f), .driver_info = BTUSB_REALTEK | 443 BTUSB_WIDEBAND_SPEECH }, 444 { USB_DEVICE(0x0b05, 0x18ef), .driver_info = BTUSB_REALTEK | 445 BTUSB_WIDEBAND_SPEECH }, 446 { USB_DEVICE(0x13d3, 0x3548), .driver_info = BTUSB_REALTEK | 447 BTUSB_WIDEBAND_SPEECH }, 448 { USB_DEVICE(0x13d3, 0x3549), .driver_info = BTUSB_REALTEK | 449 BTUSB_WIDEBAND_SPEECH }, 450 { USB_DEVICE(0x13d3, 0x3553), .driver_info = BTUSB_REALTEK | 451 BTUSB_WIDEBAND_SPEECH }, 452 { USB_DEVICE(0x13d3, 0x3555), .driver_info = BTUSB_REALTEK | 453 BTUSB_WIDEBAND_SPEECH }, 454 { USB_DEVICE(0x2ff8, 0x3051), .driver_info = BTUSB_REALTEK | 455 BTUSB_WIDEBAND_SPEECH }, 456 { USB_DEVICE(0x1358, 0xc123), .driver_info = BTUSB_REALTEK | 457 BTUSB_WIDEBAND_SPEECH }, 458 { USB_DEVICE(0x0bda, 0xc123), .driver_info = BTUSB_REALTEK | 459 BTUSB_WIDEBAND_SPEECH }, 460 { USB_DEVICE(0x0cb5, 0xc547), .driver_info = BTUSB_REALTEK | 461 BTUSB_WIDEBAND_SPEECH }, 462 463 /* Silicon Wave based devices */ 464 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, 465 466 { } /* Terminating entry */ 467 }; 468 469 /* The Bluetooth USB module build into some devices needs to be reset on resume, 470 * this is a problem with the platform (likely shutting off all power) not with 471 * the module itself. So we use a DMI list to match known broken platforms. 472 */ 473 static const struct dmi_system_id btusb_needs_reset_resume_table[] = { 474 { 475 /* Dell OptiPlex 3060 (QCA ROME device 0cf3:e007) */ 476 .matches = { 477 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 478 DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 3060"), 479 }, 480 }, 481 { 482 /* Dell XPS 9360 (QCA ROME device 0cf3:e300) */ 483 .matches = { 484 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 485 DMI_MATCH(DMI_PRODUCT_NAME, "XPS 13 9360"), 486 }, 487 }, 488 { 489 /* Dell Inspiron 5565 (QCA ROME device 0cf3:e009) */ 490 .matches = { 491 DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), 492 DMI_MATCH(DMI_PRODUCT_NAME, "Inspiron 5565"), 493 }, 494 }, 495 {} 496 }; 497 498 #define BTUSB_MAX_ISOC_FRAMES 10 499 500 #define BTUSB_INTR_RUNNING 0 501 #define BTUSB_BULK_RUNNING 1 502 #define BTUSB_ISOC_RUNNING 2 503 #define BTUSB_SUSPENDING 3 504 #define BTUSB_DID_ISO_RESUME 4 505 #define BTUSB_BOOTLOADER 5 506 #define BTUSB_DOWNLOADING 6 507 #define BTUSB_FIRMWARE_LOADED 7 508 #define BTUSB_FIRMWARE_FAILED 8 509 #define BTUSB_BOOTING 9 510 #define BTUSB_DIAG_RUNNING 10 511 #define BTUSB_OOB_WAKE_ENABLED 11 512 #define BTUSB_HW_RESET_ACTIVE 12 513 #define BTUSB_TX_WAIT_VND_EVT 13 514 #define BTUSB_WAKEUP_DISABLE 14 515 516 struct btusb_data { 517 struct hci_dev *hdev; 518 struct usb_device *udev; 519 struct usb_interface *intf; 520 struct usb_interface *isoc; 521 struct usb_interface *diag; 522 unsigned isoc_ifnum; 523 524 unsigned long flags; 525 526 struct work_struct work; 527 struct work_struct waker; 528 529 struct usb_anchor deferred; 530 struct usb_anchor tx_anchor; 531 int tx_in_flight; 532 spinlock_t txlock; 533 534 struct usb_anchor intr_anchor; 535 struct usb_anchor bulk_anchor; 536 struct usb_anchor isoc_anchor; 537 struct usb_anchor diag_anchor; 538 struct usb_anchor ctrl_anchor; 539 spinlock_t rxlock; 540 541 struct sk_buff *evt_skb; 542 struct sk_buff *acl_skb; 543 struct sk_buff *sco_skb; 544 545 struct usb_endpoint_descriptor *intr_ep; 546 struct usb_endpoint_descriptor *bulk_tx_ep; 547 struct usb_endpoint_descriptor *bulk_rx_ep; 548 struct usb_endpoint_descriptor *isoc_tx_ep; 549 struct usb_endpoint_descriptor *isoc_rx_ep; 550 struct usb_endpoint_descriptor *diag_tx_ep; 551 struct usb_endpoint_descriptor *diag_rx_ep; 552 553 struct gpio_desc *reset_gpio; 554 555 __u8 cmdreq_type; 556 __u8 cmdreq; 557 558 unsigned int sco_num; 559 unsigned int air_mode; 560 bool usb_alt6_packet_flow; 561 int isoc_altsetting; 562 int suspend_count; 563 564 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); 565 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); 566 567 int (*setup_on_usb)(struct hci_dev *hdev); 568 569 int oob_wake_irq; /* irq for out-of-band wake-on-bt */ 570 unsigned cmd_timeout_cnt; 571 }; 572 573 static void btusb_intel_cmd_timeout(struct hci_dev *hdev) 574 { 575 struct btusb_data *data = hci_get_drvdata(hdev); 576 struct gpio_desc *reset_gpio = data->reset_gpio; 577 578 if (++data->cmd_timeout_cnt < 5) 579 return; 580 581 if (!reset_gpio) { 582 bt_dev_err(hdev, "No way to reset. Ignoring and continuing"); 583 return; 584 } 585 586 /* 587 * Toggle the hard reset line if the platform provides one. The reset 588 * is going to yank the device off the USB and then replug. So doing 589 * once is enough. The cleanup is handled correctly on the way out 590 * (standard USB disconnect), and the new device is detected cleanly 591 * and bound to the driver again like it should be. 592 */ 593 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) { 594 bt_dev_err(hdev, "last reset failed? Not resetting again"); 595 return; 596 } 597 598 bt_dev_err(hdev, "Initiating HW reset via gpio"); 599 gpiod_set_value_cansleep(reset_gpio, 1); 600 msleep(100); 601 gpiod_set_value_cansleep(reset_gpio, 0); 602 } 603 604 static void btusb_rtl_cmd_timeout(struct hci_dev *hdev) 605 { 606 struct btusb_data *data = hci_get_drvdata(hdev); 607 struct gpio_desc *reset_gpio = data->reset_gpio; 608 609 if (++data->cmd_timeout_cnt < 5) 610 return; 611 612 if (!reset_gpio) { 613 bt_dev_err(hdev, "No gpio to reset Realtek device, ignoring"); 614 return; 615 } 616 617 /* Toggle the hard reset line. The Realtek device is going to 618 * yank itself off the USB and then replug. The cleanup is handled 619 * correctly on the way out (standard USB disconnect), and the new 620 * device is detected cleanly and bound to the driver again like 621 * it should be. 622 */ 623 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) { 624 bt_dev_err(hdev, "last reset failed? Not resetting again"); 625 return; 626 } 627 628 bt_dev_err(hdev, "Reset Realtek device via gpio"); 629 gpiod_set_value_cansleep(reset_gpio, 1); 630 msleep(200); 631 gpiod_set_value_cansleep(reset_gpio, 0); 632 } 633 634 static void btusb_qca_cmd_timeout(struct hci_dev *hdev) 635 { 636 struct btusb_data *data = hci_get_drvdata(hdev); 637 int err; 638 639 if (++data->cmd_timeout_cnt < 5) 640 return; 641 642 bt_dev_err(hdev, "Multiple cmd timeouts seen. Resetting usb device."); 643 /* This is not an unbalanced PM reference since the device will reset */ 644 err = usb_autopm_get_interface(data->intf); 645 if (!err) 646 usb_queue_reset_device(data->intf); 647 else 648 bt_dev_err(hdev, "Failed usb_autopm_get_interface with %d", err); 649 } 650 651 static inline void btusb_free_frags(struct btusb_data *data) 652 { 653 unsigned long flags; 654 655 spin_lock_irqsave(&data->rxlock, flags); 656 657 kfree_skb(data->evt_skb); 658 data->evt_skb = NULL; 659 660 kfree_skb(data->acl_skb); 661 data->acl_skb = NULL; 662 663 kfree_skb(data->sco_skb); 664 data->sco_skb = NULL; 665 666 spin_unlock_irqrestore(&data->rxlock, flags); 667 } 668 669 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) 670 { 671 struct sk_buff *skb; 672 unsigned long flags; 673 int err = 0; 674 675 spin_lock_irqsave(&data->rxlock, flags); 676 skb = data->evt_skb; 677 678 while (count) { 679 int len; 680 681 if (!skb) { 682 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); 683 if (!skb) { 684 err = -ENOMEM; 685 break; 686 } 687 688 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 689 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; 690 } 691 692 len = min_t(uint, hci_skb_expect(skb), count); 693 skb_put_data(skb, buffer, len); 694 695 count -= len; 696 buffer += len; 697 hci_skb_expect(skb) -= len; 698 699 if (skb->len == HCI_EVENT_HDR_SIZE) { 700 /* Complete event header */ 701 hci_skb_expect(skb) = hci_event_hdr(skb)->plen; 702 703 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 704 kfree_skb(skb); 705 skb = NULL; 706 707 err = -EILSEQ; 708 break; 709 } 710 } 711 712 if (!hci_skb_expect(skb)) { 713 /* Complete frame */ 714 data->recv_event(data->hdev, skb); 715 skb = NULL; 716 } 717 } 718 719 data->evt_skb = skb; 720 spin_unlock_irqrestore(&data->rxlock, flags); 721 722 return err; 723 } 724 725 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) 726 { 727 struct sk_buff *skb; 728 unsigned long flags; 729 int err = 0; 730 731 spin_lock_irqsave(&data->rxlock, flags); 732 skb = data->acl_skb; 733 734 while (count) { 735 int len; 736 737 if (!skb) { 738 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); 739 if (!skb) { 740 err = -ENOMEM; 741 break; 742 } 743 744 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; 745 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; 746 } 747 748 len = min_t(uint, hci_skb_expect(skb), count); 749 skb_put_data(skb, buffer, len); 750 751 count -= len; 752 buffer += len; 753 hci_skb_expect(skb) -= len; 754 755 if (skb->len == HCI_ACL_HDR_SIZE) { 756 __le16 dlen = hci_acl_hdr(skb)->dlen; 757 758 /* Complete ACL header */ 759 hci_skb_expect(skb) = __le16_to_cpu(dlen); 760 761 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 762 kfree_skb(skb); 763 skb = NULL; 764 765 err = -EILSEQ; 766 break; 767 } 768 } 769 770 if (!hci_skb_expect(skb)) { 771 /* Complete frame */ 772 hci_recv_frame(data->hdev, skb); 773 skb = NULL; 774 } 775 } 776 777 data->acl_skb = skb; 778 spin_unlock_irqrestore(&data->rxlock, flags); 779 780 return err; 781 } 782 783 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) 784 { 785 struct sk_buff *skb; 786 unsigned long flags; 787 int err = 0; 788 789 spin_lock_irqsave(&data->rxlock, flags); 790 skb = data->sco_skb; 791 792 while (count) { 793 int len; 794 795 if (!skb) { 796 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); 797 if (!skb) { 798 err = -ENOMEM; 799 break; 800 } 801 802 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; 803 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; 804 } 805 806 len = min_t(uint, hci_skb_expect(skb), count); 807 skb_put_data(skb, buffer, len); 808 809 count -= len; 810 buffer += len; 811 hci_skb_expect(skb) -= len; 812 813 if (skb->len == HCI_SCO_HDR_SIZE) { 814 /* Complete SCO header */ 815 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; 816 817 if (skb_tailroom(skb) < hci_skb_expect(skb)) { 818 kfree_skb(skb); 819 skb = NULL; 820 821 err = -EILSEQ; 822 break; 823 } 824 } 825 826 if (!hci_skb_expect(skb)) { 827 /* Complete frame */ 828 hci_recv_frame(data->hdev, skb); 829 skb = NULL; 830 } 831 } 832 833 data->sco_skb = skb; 834 spin_unlock_irqrestore(&data->rxlock, flags); 835 836 return err; 837 } 838 839 static void btusb_intr_complete(struct urb *urb) 840 { 841 struct hci_dev *hdev = urb->context; 842 struct btusb_data *data = hci_get_drvdata(hdev); 843 int err; 844 845 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 846 urb->actual_length); 847 848 if (!test_bit(HCI_RUNNING, &hdev->flags)) 849 return; 850 851 if (urb->status == 0) { 852 hdev->stat.byte_rx += urb->actual_length; 853 854 if (btusb_recv_intr(data, urb->transfer_buffer, 855 urb->actual_length) < 0) { 856 bt_dev_err(hdev, "corrupted event packet"); 857 hdev->stat.err_rx++; 858 } 859 } else if (urb->status == -ENOENT) { 860 /* Avoid suspend failed when usb_kill_urb */ 861 return; 862 } 863 864 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) 865 return; 866 867 usb_mark_last_busy(data->udev); 868 usb_anchor_urb(urb, &data->intr_anchor); 869 870 err = usb_submit_urb(urb, GFP_ATOMIC); 871 if (err < 0) { 872 /* -EPERM: urb is being killed; 873 * -ENODEV: device got disconnected 874 */ 875 if (err != -EPERM && err != -ENODEV) 876 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 877 urb, -err); 878 usb_unanchor_urb(urb); 879 } 880 } 881 882 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) 883 { 884 struct btusb_data *data = hci_get_drvdata(hdev); 885 struct urb *urb; 886 unsigned char *buf; 887 unsigned int pipe; 888 int err, size; 889 890 BT_DBG("%s", hdev->name); 891 892 if (!data->intr_ep) 893 return -ENODEV; 894 895 urb = usb_alloc_urb(0, mem_flags); 896 if (!urb) 897 return -ENOMEM; 898 899 size = le16_to_cpu(data->intr_ep->wMaxPacketSize); 900 901 buf = kmalloc(size, mem_flags); 902 if (!buf) { 903 usb_free_urb(urb); 904 return -ENOMEM; 905 } 906 907 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); 908 909 usb_fill_int_urb(urb, data->udev, pipe, buf, size, 910 btusb_intr_complete, hdev, data->intr_ep->bInterval); 911 912 urb->transfer_flags |= URB_FREE_BUFFER; 913 914 usb_anchor_urb(urb, &data->intr_anchor); 915 916 err = usb_submit_urb(urb, mem_flags); 917 if (err < 0) { 918 if (err != -EPERM && err != -ENODEV) 919 bt_dev_err(hdev, "urb %p submission failed (%d)", 920 urb, -err); 921 usb_unanchor_urb(urb); 922 } 923 924 usb_free_urb(urb); 925 926 return err; 927 } 928 929 static void btusb_bulk_complete(struct urb *urb) 930 { 931 struct hci_dev *hdev = urb->context; 932 struct btusb_data *data = hci_get_drvdata(hdev); 933 int err; 934 935 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 936 urb->actual_length); 937 938 if (!test_bit(HCI_RUNNING, &hdev->flags)) 939 return; 940 941 if (urb->status == 0) { 942 hdev->stat.byte_rx += urb->actual_length; 943 944 if (data->recv_bulk(data, urb->transfer_buffer, 945 urb->actual_length) < 0) { 946 bt_dev_err(hdev, "corrupted ACL packet"); 947 hdev->stat.err_rx++; 948 } 949 } else if (urb->status == -ENOENT) { 950 /* Avoid suspend failed when usb_kill_urb */ 951 return; 952 } 953 954 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) 955 return; 956 957 usb_anchor_urb(urb, &data->bulk_anchor); 958 usb_mark_last_busy(data->udev); 959 960 err = usb_submit_urb(urb, GFP_ATOMIC); 961 if (err < 0) { 962 /* -EPERM: urb is being killed; 963 * -ENODEV: device got disconnected 964 */ 965 if (err != -EPERM && err != -ENODEV) 966 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 967 urb, -err); 968 usb_unanchor_urb(urb); 969 } 970 } 971 972 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) 973 { 974 struct btusb_data *data = hci_get_drvdata(hdev); 975 struct urb *urb; 976 unsigned char *buf; 977 unsigned int pipe; 978 int err, size = HCI_MAX_FRAME_SIZE; 979 980 BT_DBG("%s", hdev->name); 981 982 if (!data->bulk_rx_ep) 983 return -ENODEV; 984 985 urb = usb_alloc_urb(0, mem_flags); 986 if (!urb) 987 return -ENOMEM; 988 989 buf = kmalloc(size, mem_flags); 990 if (!buf) { 991 usb_free_urb(urb); 992 return -ENOMEM; 993 } 994 995 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); 996 997 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 998 btusb_bulk_complete, hdev); 999 1000 urb->transfer_flags |= URB_FREE_BUFFER; 1001 1002 usb_mark_last_busy(data->udev); 1003 usb_anchor_urb(urb, &data->bulk_anchor); 1004 1005 err = usb_submit_urb(urb, mem_flags); 1006 if (err < 0) { 1007 if (err != -EPERM && err != -ENODEV) 1008 bt_dev_err(hdev, "urb %p submission failed (%d)", 1009 urb, -err); 1010 usb_unanchor_urb(urb); 1011 } 1012 1013 usb_free_urb(urb); 1014 1015 return err; 1016 } 1017 1018 static void btusb_isoc_complete(struct urb *urb) 1019 { 1020 struct hci_dev *hdev = urb->context; 1021 struct btusb_data *data = hci_get_drvdata(hdev); 1022 int i, err; 1023 1024 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1025 urb->actual_length); 1026 1027 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1028 return; 1029 1030 if (urb->status == 0) { 1031 for (i = 0; i < urb->number_of_packets; i++) { 1032 unsigned int offset = urb->iso_frame_desc[i].offset; 1033 unsigned int length = urb->iso_frame_desc[i].actual_length; 1034 1035 if (urb->iso_frame_desc[i].status) 1036 continue; 1037 1038 hdev->stat.byte_rx += length; 1039 1040 if (btusb_recv_isoc(data, urb->transfer_buffer + offset, 1041 length) < 0) { 1042 bt_dev_err(hdev, "corrupted SCO packet"); 1043 hdev->stat.err_rx++; 1044 } 1045 } 1046 } else if (urb->status == -ENOENT) { 1047 /* Avoid suspend failed when usb_kill_urb */ 1048 return; 1049 } 1050 1051 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) 1052 return; 1053 1054 usb_anchor_urb(urb, &data->isoc_anchor); 1055 1056 err = usb_submit_urb(urb, GFP_ATOMIC); 1057 if (err < 0) { 1058 /* -EPERM: urb is being killed; 1059 * -ENODEV: device got disconnected 1060 */ 1061 if (err != -EPERM && err != -ENODEV) 1062 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 1063 urb, -err); 1064 usb_unanchor_urb(urb); 1065 } 1066 } 1067 1068 static inline void __fill_isoc_descriptor_msbc(struct urb *urb, int len, 1069 int mtu, struct btusb_data *data) 1070 { 1071 int i, offset = 0; 1072 unsigned int interval; 1073 1074 BT_DBG("len %d mtu %d", len, mtu); 1075 1076 /* For mSBC ALT 6 setting the host will send the packet at continuous 1077 * flow. As per core spec 5, vol 4, part B, table 2.1. For ALT setting 1078 * 6 the HCI PACKET INTERVAL should be 7.5ms for every usb packets. 1079 * To maintain the rate we send 63bytes of usb packets alternatively for 1080 * 7ms and 8ms to maintain the rate as 7.5ms. 1081 */ 1082 if (data->usb_alt6_packet_flow) { 1083 interval = 7; 1084 data->usb_alt6_packet_flow = false; 1085 } else { 1086 interval = 6; 1087 data->usb_alt6_packet_flow = true; 1088 } 1089 1090 for (i = 0; i < interval; i++) { 1091 urb->iso_frame_desc[i].offset = offset; 1092 urb->iso_frame_desc[i].length = offset; 1093 } 1094 1095 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 1096 urb->iso_frame_desc[i].offset = offset; 1097 urb->iso_frame_desc[i].length = len; 1098 i++; 1099 } 1100 1101 urb->number_of_packets = i; 1102 } 1103 1104 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) 1105 { 1106 int i, offset = 0; 1107 1108 BT_DBG("len %d mtu %d", len, mtu); 1109 1110 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; 1111 i++, offset += mtu, len -= mtu) { 1112 urb->iso_frame_desc[i].offset = offset; 1113 urb->iso_frame_desc[i].length = mtu; 1114 } 1115 1116 if (len && i < BTUSB_MAX_ISOC_FRAMES) { 1117 urb->iso_frame_desc[i].offset = offset; 1118 urb->iso_frame_desc[i].length = len; 1119 i++; 1120 } 1121 1122 urb->number_of_packets = i; 1123 } 1124 1125 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) 1126 { 1127 struct btusb_data *data = hci_get_drvdata(hdev); 1128 struct urb *urb; 1129 unsigned char *buf; 1130 unsigned int pipe; 1131 int err, size; 1132 1133 BT_DBG("%s", hdev->name); 1134 1135 if (!data->isoc_rx_ep) 1136 return -ENODEV; 1137 1138 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); 1139 if (!urb) 1140 return -ENOMEM; 1141 1142 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * 1143 BTUSB_MAX_ISOC_FRAMES; 1144 1145 buf = kmalloc(size, mem_flags); 1146 if (!buf) { 1147 usb_free_urb(urb); 1148 return -ENOMEM; 1149 } 1150 1151 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); 1152 1153 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, 1154 hdev, data->isoc_rx_ep->bInterval); 1155 1156 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; 1157 1158 __fill_isoc_descriptor(urb, size, 1159 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); 1160 1161 usb_anchor_urb(urb, &data->isoc_anchor); 1162 1163 err = usb_submit_urb(urb, mem_flags); 1164 if (err < 0) { 1165 if (err != -EPERM && err != -ENODEV) 1166 bt_dev_err(hdev, "urb %p submission failed (%d)", 1167 urb, -err); 1168 usb_unanchor_urb(urb); 1169 } 1170 1171 usb_free_urb(urb); 1172 1173 return err; 1174 } 1175 1176 static void btusb_diag_complete(struct urb *urb) 1177 { 1178 struct hci_dev *hdev = urb->context; 1179 struct btusb_data *data = hci_get_drvdata(hdev); 1180 int err; 1181 1182 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1183 urb->actual_length); 1184 1185 if (urb->status == 0) { 1186 struct sk_buff *skb; 1187 1188 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); 1189 if (skb) { 1190 skb_put_data(skb, urb->transfer_buffer, 1191 urb->actual_length); 1192 hci_recv_diag(hdev, skb); 1193 } 1194 } else if (urb->status == -ENOENT) { 1195 /* Avoid suspend failed when usb_kill_urb */ 1196 return; 1197 } 1198 1199 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) 1200 return; 1201 1202 usb_anchor_urb(urb, &data->diag_anchor); 1203 usb_mark_last_busy(data->udev); 1204 1205 err = usb_submit_urb(urb, GFP_ATOMIC); 1206 if (err < 0) { 1207 /* -EPERM: urb is being killed; 1208 * -ENODEV: device got disconnected 1209 */ 1210 if (err != -EPERM && err != -ENODEV) 1211 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 1212 urb, -err); 1213 usb_unanchor_urb(urb); 1214 } 1215 } 1216 1217 static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) 1218 { 1219 struct btusb_data *data = hci_get_drvdata(hdev); 1220 struct urb *urb; 1221 unsigned char *buf; 1222 unsigned int pipe; 1223 int err, size = HCI_MAX_FRAME_SIZE; 1224 1225 BT_DBG("%s", hdev->name); 1226 1227 if (!data->diag_rx_ep) 1228 return -ENODEV; 1229 1230 urb = usb_alloc_urb(0, mem_flags); 1231 if (!urb) 1232 return -ENOMEM; 1233 1234 buf = kmalloc(size, mem_flags); 1235 if (!buf) { 1236 usb_free_urb(urb); 1237 return -ENOMEM; 1238 } 1239 1240 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); 1241 1242 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, 1243 btusb_diag_complete, hdev); 1244 1245 urb->transfer_flags |= URB_FREE_BUFFER; 1246 1247 usb_mark_last_busy(data->udev); 1248 usb_anchor_urb(urb, &data->diag_anchor); 1249 1250 err = usb_submit_urb(urb, mem_flags); 1251 if (err < 0) { 1252 if (err != -EPERM && err != -ENODEV) 1253 bt_dev_err(hdev, "urb %p submission failed (%d)", 1254 urb, -err); 1255 usb_unanchor_urb(urb); 1256 } 1257 1258 usb_free_urb(urb); 1259 1260 return err; 1261 } 1262 1263 static void btusb_tx_complete(struct urb *urb) 1264 { 1265 struct sk_buff *skb = urb->context; 1266 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1267 struct btusb_data *data = hci_get_drvdata(hdev); 1268 unsigned long flags; 1269 1270 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1271 urb->actual_length); 1272 1273 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1274 goto done; 1275 1276 if (!urb->status) 1277 hdev->stat.byte_tx += urb->transfer_buffer_length; 1278 else 1279 hdev->stat.err_tx++; 1280 1281 done: 1282 spin_lock_irqsave(&data->txlock, flags); 1283 data->tx_in_flight--; 1284 spin_unlock_irqrestore(&data->txlock, flags); 1285 1286 kfree(urb->setup_packet); 1287 1288 kfree_skb(skb); 1289 } 1290 1291 static void btusb_isoc_tx_complete(struct urb *urb) 1292 { 1293 struct sk_buff *skb = urb->context; 1294 struct hci_dev *hdev = (struct hci_dev *)skb->dev; 1295 1296 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, 1297 urb->actual_length); 1298 1299 if (!test_bit(HCI_RUNNING, &hdev->flags)) 1300 goto done; 1301 1302 if (!urb->status) 1303 hdev->stat.byte_tx += urb->transfer_buffer_length; 1304 else 1305 hdev->stat.err_tx++; 1306 1307 done: 1308 kfree(urb->setup_packet); 1309 1310 kfree_skb(skb); 1311 } 1312 1313 static int btusb_open(struct hci_dev *hdev) 1314 { 1315 struct btusb_data *data = hci_get_drvdata(hdev); 1316 int err; 1317 1318 BT_DBG("%s", hdev->name); 1319 1320 err = usb_autopm_get_interface(data->intf); 1321 if (err < 0) 1322 return err; 1323 1324 /* Patching USB firmware files prior to starting any URBs of HCI path 1325 * It is more safe to use USB bulk channel for downloading USB patch 1326 */ 1327 if (data->setup_on_usb) { 1328 err = data->setup_on_usb(hdev); 1329 if (err < 0) 1330 goto setup_fail; 1331 } 1332 1333 data->intf->needs_remote_wakeup = 1; 1334 1335 /* Disable device remote wakeup when host is suspended 1336 * For Realtek chips, global suspend without 1337 * SET_FEATURE (DEVICE_REMOTE_WAKEUP) can save more power in device. 1338 */ 1339 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) 1340 device_wakeup_disable(&data->udev->dev); 1341 1342 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) 1343 goto done; 1344 1345 err = btusb_submit_intr_urb(hdev, GFP_KERNEL); 1346 if (err < 0) 1347 goto failed; 1348 1349 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1350 if (err < 0) { 1351 usb_kill_anchored_urbs(&data->intr_anchor); 1352 goto failed; 1353 } 1354 1355 set_bit(BTUSB_BULK_RUNNING, &data->flags); 1356 btusb_submit_bulk_urb(hdev, GFP_KERNEL); 1357 1358 if (data->diag) { 1359 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) 1360 set_bit(BTUSB_DIAG_RUNNING, &data->flags); 1361 } 1362 1363 done: 1364 usb_autopm_put_interface(data->intf); 1365 return 0; 1366 1367 failed: 1368 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1369 setup_fail: 1370 usb_autopm_put_interface(data->intf); 1371 return err; 1372 } 1373 1374 static void btusb_stop_traffic(struct btusb_data *data) 1375 { 1376 usb_kill_anchored_urbs(&data->intr_anchor); 1377 usb_kill_anchored_urbs(&data->bulk_anchor); 1378 usb_kill_anchored_urbs(&data->isoc_anchor); 1379 usb_kill_anchored_urbs(&data->diag_anchor); 1380 usb_kill_anchored_urbs(&data->ctrl_anchor); 1381 } 1382 1383 static int btusb_close(struct hci_dev *hdev) 1384 { 1385 struct btusb_data *data = hci_get_drvdata(hdev); 1386 int err; 1387 1388 BT_DBG("%s", hdev->name); 1389 1390 cancel_work_sync(&data->work); 1391 cancel_work_sync(&data->waker); 1392 1393 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1394 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 1395 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 1396 clear_bit(BTUSB_DIAG_RUNNING, &data->flags); 1397 1398 btusb_stop_traffic(data); 1399 btusb_free_frags(data); 1400 1401 err = usb_autopm_get_interface(data->intf); 1402 if (err < 0) 1403 goto failed; 1404 1405 data->intf->needs_remote_wakeup = 0; 1406 1407 /* Enable remote wake up for auto-suspend */ 1408 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) 1409 data->intf->needs_remote_wakeup = 1; 1410 1411 usb_autopm_put_interface(data->intf); 1412 1413 failed: 1414 usb_scuttle_anchored_urbs(&data->deferred); 1415 return 0; 1416 } 1417 1418 static int btusb_flush(struct hci_dev *hdev) 1419 { 1420 struct btusb_data *data = hci_get_drvdata(hdev); 1421 1422 BT_DBG("%s", hdev->name); 1423 1424 usb_kill_anchored_urbs(&data->tx_anchor); 1425 btusb_free_frags(data); 1426 1427 return 0; 1428 } 1429 1430 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) 1431 { 1432 struct btusb_data *data = hci_get_drvdata(hdev); 1433 struct usb_ctrlrequest *dr; 1434 struct urb *urb; 1435 unsigned int pipe; 1436 1437 urb = usb_alloc_urb(0, GFP_KERNEL); 1438 if (!urb) 1439 return ERR_PTR(-ENOMEM); 1440 1441 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 1442 if (!dr) { 1443 usb_free_urb(urb); 1444 return ERR_PTR(-ENOMEM); 1445 } 1446 1447 dr->bRequestType = data->cmdreq_type; 1448 dr->bRequest = data->cmdreq; 1449 dr->wIndex = 0; 1450 dr->wValue = 0; 1451 dr->wLength = __cpu_to_le16(skb->len); 1452 1453 pipe = usb_sndctrlpipe(data->udev, 0x00); 1454 1455 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 1456 skb->data, skb->len, btusb_tx_complete, skb); 1457 1458 skb->dev = (void *)hdev; 1459 1460 return urb; 1461 } 1462 1463 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) 1464 { 1465 struct btusb_data *data = hci_get_drvdata(hdev); 1466 struct urb *urb; 1467 unsigned int pipe; 1468 1469 if (!data->bulk_tx_ep) 1470 return ERR_PTR(-ENODEV); 1471 1472 urb = usb_alloc_urb(0, GFP_KERNEL); 1473 if (!urb) 1474 return ERR_PTR(-ENOMEM); 1475 1476 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); 1477 1478 usb_fill_bulk_urb(urb, data->udev, pipe, 1479 skb->data, skb->len, btusb_tx_complete, skb); 1480 1481 skb->dev = (void *)hdev; 1482 1483 return urb; 1484 } 1485 1486 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) 1487 { 1488 struct btusb_data *data = hci_get_drvdata(hdev); 1489 struct urb *urb; 1490 unsigned int pipe; 1491 1492 if (!data->isoc_tx_ep) 1493 return ERR_PTR(-ENODEV); 1494 1495 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); 1496 if (!urb) 1497 return ERR_PTR(-ENOMEM); 1498 1499 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); 1500 1501 usb_fill_int_urb(urb, data->udev, pipe, 1502 skb->data, skb->len, btusb_isoc_tx_complete, 1503 skb, data->isoc_tx_ep->bInterval); 1504 1505 urb->transfer_flags = URB_ISO_ASAP; 1506 1507 if (data->isoc_altsetting == 6) 1508 __fill_isoc_descriptor_msbc(urb, skb->len, 1509 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize), 1510 data); 1511 else 1512 __fill_isoc_descriptor(urb, skb->len, 1513 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); 1514 skb->dev = (void *)hdev; 1515 1516 return urb; 1517 } 1518 1519 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) 1520 { 1521 struct btusb_data *data = hci_get_drvdata(hdev); 1522 int err; 1523 1524 usb_anchor_urb(urb, &data->tx_anchor); 1525 1526 err = usb_submit_urb(urb, GFP_KERNEL); 1527 if (err < 0) { 1528 if (err != -EPERM && err != -ENODEV) 1529 bt_dev_err(hdev, "urb %p submission failed (%d)", 1530 urb, -err); 1531 kfree(urb->setup_packet); 1532 usb_unanchor_urb(urb); 1533 } else { 1534 usb_mark_last_busy(data->udev); 1535 } 1536 1537 usb_free_urb(urb); 1538 return err; 1539 } 1540 1541 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) 1542 { 1543 struct btusb_data *data = hci_get_drvdata(hdev); 1544 unsigned long flags; 1545 bool suspending; 1546 1547 spin_lock_irqsave(&data->txlock, flags); 1548 suspending = test_bit(BTUSB_SUSPENDING, &data->flags); 1549 if (!suspending) 1550 data->tx_in_flight++; 1551 spin_unlock_irqrestore(&data->txlock, flags); 1552 1553 if (!suspending) 1554 return submit_tx_urb(hdev, urb); 1555 1556 usb_anchor_urb(urb, &data->deferred); 1557 schedule_work(&data->waker); 1558 1559 usb_free_urb(urb); 1560 return 0; 1561 } 1562 1563 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) 1564 { 1565 struct urb *urb; 1566 1567 BT_DBG("%s", hdev->name); 1568 1569 switch (hci_skb_pkt_type(skb)) { 1570 case HCI_COMMAND_PKT: 1571 urb = alloc_ctrl_urb(hdev, skb); 1572 if (IS_ERR(urb)) 1573 return PTR_ERR(urb); 1574 1575 hdev->stat.cmd_tx++; 1576 return submit_or_queue_tx_urb(hdev, urb); 1577 1578 case HCI_ACLDATA_PKT: 1579 urb = alloc_bulk_urb(hdev, skb); 1580 if (IS_ERR(urb)) 1581 return PTR_ERR(urb); 1582 1583 hdev->stat.acl_tx++; 1584 return submit_or_queue_tx_urb(hdev, urb); 1585 1586 case HCI_SCODATA_PKT: 1587 if (hci_conn_num(hdev, SCO_LINK) < 1) 1588 return -ENODEV; 1589 1590 urb = alloc_isoc_urb(hdev, skb); 1591 if (IS_ERR(urb)) 1592 return PTR_ERR(urb); 1593 1594 hdev->stat.sco_tx++; 1595 return submit_tx_urb(hdev, urb); 1596 } 1597 1598 return -EILSEQ; 1599 } 1600 1601 static void btusb_notify(struct hci_dev *hdev, unsigned int evt) 1602 { 1603 struct btusb_data *data = hci_get_drvdata(hdev); 1604 1605 BT_DBG("%s evt %d", hdev->name, evt); 1606 1607 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { 1608 data->sco_num = hci_conn_num(hdev, SCO_LINK); 1609 data->air_mode = evt; 1610 schedule_work(&data->work); 1611 } 1612 } 1613 1614 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) 1615 { 1616 struct btusb_data *data = hci_get_drvdata(hdev); 1617 struct usb_interface *intf = data->isoc; 1618 struct usb_endpoint_descriptor *ep_desc; 1619 int i, err; 1620 1621 if (!data->isoc) 1622 return -ENODEV; 1623 1624 err = usb_set_interface(data->udev, data->isoc_ifnum, altsetting); 1625 if (err < 0) { 1626 bt_dev_err(hdev, "setting interface failed (%d)", -err); 1627 return err; 1628 } 1629 1630 data->isoc_altsetting = altsetting; 1631 1632 data->isoc_tx_ep = NULL; 1633 data->isoc_rx_ep = NULL; 1634 1635 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 1636 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 1637 1638 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { 1639 data->isoc_tx_ep = ep_desc; 1640 continue; 1641 } 1642 1643 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { 1644 data->isoc_rx_ep = ep_desc; 1645 continue; 1646 } 1647 } 1648 1649 if (!data->isoc_tx_ep || !data->isoc_rx_ep) { 1650 bt_dev_err(hdev, "invalid SCO descriptors"); 1651 return -ENODEV; 1652 } 1653 1654 return 0; 1655 } 1656 1657 static int btusb_switch_alt_setting(struct hci_dev *hdev, int new_alts) 1658 { 1659 struct btusb_data *data = hci_get_drvdata(hdev); 1660 int err; 1661 1662 if (data->isoc_altsetting != new_alts) { 1663 unsigned long flags; 1664 1665 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1666 usb_kill_anchored_urbs(&data->isoc_anchor); 1667 1668 /* When isochronous alternate setting needs to be 1669 * changed, because SCO connection has been added 1670 * or removed, a packet fragment may be left in the 1671 * reassembling state. This could lead to wrongly 1672 * assembled fragments. 1673 * 1674 * Clear outstanding fragment when selecting a new 1675 * alternate setting. 1676 */ 1677 spin_lock_irqsave(&data->rxlock, flags); 1678 kfree_skb(data->sco_skb); 1679 data->sco_skb = NULL; 1680 spin_unlock_irqrestore(&data->rxlock, flags); 1681 1682 err = __set_isoc_interface(hdev, new_alts); 1683 if (err < 0) 1684 return err; 1685 } 1686 1687 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 1688 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) 1689 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1690 else 1691 btusb_submit_isoc_urb(hdev, GFP_KERNEL); 1692 } 1693 1694 return 0; 1695 } 1696 1697 static struct usb_host_interface *btusb_find_altsetting(struct btusb_data *data, 1698 int alt) 1699 { 1700 struct usb_interface *intf = data->isoc; 1701 int i; 1702 1703 BT_DBG("Looking for Alt no :%d", alt); 1704 1705 if (!intf) 1706 return NULL; 1707 1708 for (i = 0; i < intf->num_altsetting; i++) { 1709 if (intf->altsetting[i].desc.bAlternateSetting == alt) 1710 return &intf->altsetting[i]; 1711 } 1712 1713 return NULL; 1714 } 1715 1716 static void btusb_work(struct work_struct *work) 1717 { 1718 struct btusb_data *data = container_of(work, struct btusb_data, work); 1719 struct hci_dev *hdev = data->hdev; 1720 int new_alts = 0; 1721 int err; 1722 1723 if (data->sco_num > 0) { 1724 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { 1725 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); 1726 if (err < 0) { 1727 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1728 usb_kill_anchored_urbs(&data->isoc_anchor); 1729 return; 1730 } 1731 1732 set_bit(BTUSB_DID_ISO_RESUME, &data->flags); 1733 } 1734 1735 if (data->air_mode == HCI_NOTIFY_ENABLE_SCO_CVSD) { 1736 if (hdev->voice_setting & 0x0020) { 1737 static const int alts[3] = { 2, 4, 5 }; 1738 1739 new_alts = alts[data->sco_num - 1]; 1740 } else { 1741 new_alts = data->sco_num; 1742 } 1743 } else if (data->air_mode == HCI_NOTIFY_ENABLE_SCO_TRANSP) { 1744 /* Bluetooth USB spec recommends alt 6 (63 bytes), but 1745 * many adapters do not support it. Alt 1 appears to 1746 * work for all adapters that do not have alt 6, and 1747 * which work with WBS at all. 1748 */ 1749 new_alts = btusb_find_altsetting(data, 6) ? 6 : 1; 1750 } 1751 1752 if (btusb_switch_alt_setting(hdev, new_alts) < 0) 1753 bt_dev_err(hdev, "set USB alt:(%d) failed!", new_alts); 1754 } else { 1755 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 1756 usb_kill_anchored_urbs(&data->isoc_anchor); 1757 1758 __set_isoc_interface(hdev, 0); 1759 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) 1760 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); 1761 } 1762 } 1763 1764 static void btusb_waker(struct work_struct *work) 1765 { 1766 struct btusb_data *data = container_of(work, struct btusb_data, waker); 1767 int err; 1768 1769 err = usb_autopm_get_interface(data->intf); 1770 if (err < 0) 1771 return; 1772 1773 usb_autopm_put_interface(data->intf); 1774 } 1775 1776 static int btusb_setup_bcm92035(struct hci_dev *hdev) 1777 { 1778 struct sk_buff *skb; 1779 u8 val = 0x00; 1780 1781 BT_DBG("%s", hdev->name); 1782 1783 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); 1784 if (IS_ERR(skb)) 1785 bt_dev_err(hdev, "BCM92035 command failed (%ld)", PTR_ERR(skb)); 1786 else 1787 kfree_skb(skb); 1788 1789 return 0; 1790 } 1791 1792 static int btusb_setup_csr(struct hci_dev *hdev) 1793 { 1794 struct btusb_data *data = hci_get_drvdata(hdev); 1795 u16 bcdDevice = le16_to_cpu(data->udev->descriptor.bcdDevice); 1796 struct hci_rp_read_local_version *rp; 1797 struct sk_buff *skb; 1798 bool is_fake = false; 1799 int ret; 1800 1801 BT_DBG("%s", hdev->name); 1802 1803 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, 1804 HCI_INIT_TIMEOUT); 1805 if (IS_ERR(skb)) { 1806 int err = PTR_ERR(skb); 1807 bt_dev_err(hdev, "CSR: Local version failed (%d)", err); 1808 return err; 1809 } 1810 1811 if (skb->len != sizeof(struct hci_rp_read_local_version)) { 1812 bt_dev_err(hdev, "CSR: Local version length mismatch"); 1813 kfree_skb(skb); 1814 return -EIO; 1815 } 1816 1817 rp = (struct hci_rp_read_local_version *)skb->data; 1818 1819 /* Detect a wide host of Chinese controllers that aren't CSR. 1820 * 1821 * Known fake bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891 1822 * 1823 * The main thing they have in common is that these are really popular low-cost 1824 * options that support newer Bluetooth versions but rely on heavy VID/PID 1825 * squatting of this poor old Bluetooth 1.1 device. Even sold as such. 1826 * 1827 * We detect actual CSR devices by checking that the HCI manufacturer code 1828 * is Cambridge Silicon Radio (10) and ensuring that LMP sub-version and 1829 * HCI rev values always match. As they both store the firmware number. 1830 */ 1831 if (le16_to_cpu(rp->manufacturer) != 10 || 1832 le16_to_cpu(rp->hci_rev) != le16_to_cpu(rp->lmp_subver)) 1833 is_fake = true; 1834 1835 /* Known legit CSR firmware build numbers and their supported BT versions: 1836 * - 1.1 (0x1) -> 0x0073, 0x020d, 0x033c, 0x034e 1837 * - 1.2 (0x2) -> 0x04d9, 0x0529 1838 * - 2.0 (0x3) -> 0x07a6, 0x07ad, 0x0c5c 1839 * - 2.1 (0x4) -> 0x149c, 0x1735, 0x1899 (0x1899 is a BlueCore4-External) 1840 * - 4.0 (0x6) -> 0x1d86, 0x2031, 0x22bb 1841 * 1842 * e.g. Real CSR dongles with LMP subversion 0x73 are old enough that 1843 * support BT 1.1 only; so it's a dead giveaway when some 1844 * third-party BT 4.0 dongle reuses it. 1845 */ 1846 else if (le16_to_cpu(rp->lmp_subver) <= 0x034e && 1847 le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_1_1) 1848 is_fake = true; 1849 1850 else if (le16_to_cpu(rp->lmp_subver) <= 0x0529 && 1851 le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_1_2) 1852 is_fake = true; 1853 1854 else if (le16_to_cpu(rp->lmp_subver) <= 0x0c5c && 1855 le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_2_0) 1856 is_fake = true; 1857 1858 else if (le16_to_cpu(rp->lmp_subver) <= 0x1899 && 1859 le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_2_1) 1860 is_fake = true; 1861 1862 else if (le16_to_cpu(rp->lmp_subver) <= 0x22bb && 1863 le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_4_0) 1864 is_fake = true; 1865 1866 /* Other clones which beat all the above checks */ 1867 else if (bcdDevice == 0x0134 && 1868 le16_to_cpu(rp->lmp_subver) == 0x0c5c && 1869 le16_to_cpu(rp->hci_ver) == BLUETOOTH_VER_2_0) 1870 is_fake = true; 1871 1872 if (is_fake) { 1873 bt_dev_warn(hdev, "CSR: Unbranded CSR clone detected; adding workarounds..."); 1874 1875 /* Generally these clones have big discrepancies between 1876 * advertised features and what's actually supported. 1877 * Probably will need to be expanded in the future; 1878 * without these the controller will lock up. 1879 */ 1880 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 1881 set_bit(HCI_QUIRK_BROKEN_ERR_DATA_REPORTING, &hdev->quirks); 1882 1883 /* Clear the reset quirk since this is not an actual 1884 * early Bluetooth 1.1 device from CSR. 1885 */ 1886 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 1887 clear_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 1888 1889 /* 1890 * Special workaround for clones with a Barrot 8041a02 chip, 1891 * these clones are really messed-up: 1892 * 1. Their bulk rx endpoint will never report any data unless 1893 * the device was suspended at least once (yes really). 1894 * 2. They will not wakeup when autosuspended and receiving data 1895 * on their bulk rx endpoint from e.g. a keyboard or mouse 1896 * (IOW remote-wakeup support is broken for the bulk endpoint). 1897 * 1898 * To fix 1. enable runtime-suspend, force-suspend the 1899 * hci and then wake-it up by disabling runtime-suspend. 1900 * 1901 * To fix 2. clear the hci's can_wake flag, this way the hci 1902 * will still be autosuspended when it is not open. 1903 */ 1904 if (bcdDevice == 0x8891 && 1905 le16_to_cpu(rp->lmp_subver) == 0x1012 && 1906 le16_to_cpu(rp->hci_rev) == 0x0810 && 1907 le16_to_cpu(rp->hci_ver) == BLUETOOTH_VER_4_0) { 1908 bt_dev_warn(hdev, "CSR: detected a fake CSR dongle using a Barrot 8041a02 chip, this chip is very buggy and may have issues"); 1909 1910 pm_runtime_allow(&data->udev->dev); 1911 1912 ret = pm_runtime_suspend(&data->udev->dev); 1913 if (ret >= 0) 1914 msleep(200); 1915 else 1916 bt_dev_err(hdev, "Failed to suspend the device for Barrot 8041a02 receive-issue workaround"); 1917 1918 pm_runtime_forbid(&data->udev->dev); 1919 1920 device_set_wakeup_capable(&data->udev->dev, false); 1921 /* Re-enable autosuspend if this was requested */ 1922 if (enable_autosuspend) 1923 usb_enable_autosuspend(data->udev); 1924 } 1925 } 1926 1927 kfree_skb(skb); 1928 1929 return 0; 1930 } 1931 1932 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, 1933 struct intel_version *ver) 1934 { 1935 const struct firmware *fw; 1936 char fwname[64]; 1937 int ret; 1938 1939 snprintf(fwname, sizeof(fwname), 1940 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", 1941 ver->hw_platform, ver->hw_variant, ver->hw_revision, 1942 ver->fw_variant, ver->fw_revision, ver->fw_build_num, 1943 ver->fw_build_ww, ver->fw_build_yy); 1944 1945 ret = request_firmware(&fw, fwname, &hdev->dev); 1946 if (ret < 0) { 1947 if (ret == -EINVAL) { 1948 bt_dev_err(hdev, "Intel firmware file request failed (%d)", 1949 ret); 1950 return NULL; 1951 } 1952 1953 bt_dev_err(hdev, "failed to open Intel firmware file: %s (%d)", 1954 fwname, ret); 1955 1956 /* If the correct firmware patch file is not found, use the 1957 * default firmware patch file instead 1958 */ 1959 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", 1960 ver->hw_platform, ver->hw_variant); 1961 if (request_firmware(&fw, fwname, &hdev->dev) < 0) { 1962 bt_dev_err(hdev, "failed to open default fw file: %s", 1963 fwname); 1964 return NULL; 1965 } 1966 } 1967 1968 bt_dev_info(hdev, "Intel Bluetooth firmware file: %s", fwname); 1969 1970 return fw; 1971 } 1972 1973 static int btusb_setup_intel_patching(struct hci_dev *hdev, 1974 const struct firmware *fw, 1975 const u8 **fw_ptr, int *disable_patch) 1976 { 1977 struct sk_buff *skb; 1978 struct hci_command_hdr *cmd; 1979 const u8 *cmd_param; 1980 struct hci_event_hdr *evt = NULL; 1981 const u8 *evt_param = NULL; 1982 int remain = fw->size - (*fw_ptr - fw->data); 1983 1984 /* The first byte indicates the types of the patch command or event. 1985 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes 1986 * in the current firmware buffer doesn't start with 0x01 or 1987 * the size of remain buffer is smaller than HCI command header, 1988 * the firmware file is corrupted and it should stop the patching 1989 * process. 1990 */ 1991 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { 1992 bt_dev_err(hdev, "Intel fw corrupted: invalid cmd read"); 1993 return -EINVAL; 1994 } 1995 (*fw_ptr)++; 1996 remain--; 1997 1998 cmd = (struct hci_command_hdr *)(*fw_ptr); 1999 *fw_ptr += sizeof(*cmd); 2000 remain -= sizeof(*cmd); 2001 2002 /* Ensure that the remain firmware data is long enough than the length 2003 * of command parameter. If not, the firmware file is corrupted. 2004 */ 2005 if (remain < cmd->plen) { 2006 bt_dev_err(hdev, "Intel fw corrupted: invalid cmd len"); 2007 return -EFAULT; 2008 } 2009 2010 /* If there is a command that loads a patch in the firmware 2011 * file, then enable the patch upon success, otherwise just 2012 * disable the manufacturer mode, for example patch activation 2013 * is not required when the default firmware patch file is used 2014 * because there are no patch data to load. 2015 */ 2016 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) 2017 *disable_patch = 0; 2018 2019 cmd_param = *fw_ptr; 2020 *fw_ptr += cmd->plen; 2021 remain -= cmd->plen; 2022 2023 /* This reads the expected events when the above command is sent to the 2024 * device. Some vendor commands expects more than one events, for 2025 * example command status event followed by vendor specific event. 2026 * For this case, it only keeps the last expected event. so the command 2027 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of 2028 * last expected event. 2029 */ 2030 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { 2031 (*fw_ptr)++; 2032 remain--; 2033 2034 evt = (struct hci_event_hdr *)(*fw_ptr); 2035 *fw_ptr += sizeof(*evt); 2036 remain -= sizeof(*evt); 2037 2038 if (remain < evt->plen) { 2039 bt_dev_err(hdev, "Intel fw corrupted: invalid evt len"); 2040 return -EFAULT; 2041 } 2042 2043 evt_param = *fw_ptr; 2044 *fw_ptr += evt->plen; 2045 remain -= evt->plen; 2046 } 2047 2048 /* Every HCI commands in the firmware file has its correspond event. 2049 * If event is not found or remain is smaller than zero, the firmware 2050 * file is corrupted. 2051 */ 2052 if (!evt || !evt_param || remain < 0) { 2053 bt_dev_err(hdev, "Intel fw corrupted: invalid evt read"); 2054 return -EFAULT; 2055 } 2056 2057 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, 2058 cmd_param, evt->evt, HCI_INIT_TIMEOUT); 2059 if (IS_ERR(skb)) { 2060 bt_dev_err(hdev, "sending Intel patch command (0x%4.4x) failed (%ld)", 2061 cmd->opcode, PTR_ERR(skb)); 2062 return PTR_ERR(skb); 2063 } 2064 2065 /* It ensures that the returned event matches the event data read from 2066 * the firmware file. At fist, it checks the length and then 2067 * the contents of the event. 2068 */ 2069 if (skb->len != evt->plen) { 2070 bt_dev_err(hdev, "mismatch event length (opcode 0x%4.4x)", 2071 le16_to_cpu(cmd->opcode)); 2072 kfree_skb(skb); 2073 return -EFAULT; 2074 } 2075 2076 if (memcmp(skb->data, evt_param, evt->plen)) { 2077 bt_dev_err(hdev, "mismatch event parameter (opcode 0x%4.4x)", 2078 le16_to_cpu(cmd->opcode)); 2079 kfree_skb(skb); 2080 return -EFAULT; 2081 } 2082 kfree_skb(skb); 2083 2084 return 0; 2085 } 2086 2087 static int btusb_setup_intel(struct hci_dev *hdev) 2088 { 2089 struct sk_buff *skb; 2090 const struct firmware *fw; 2091 const u8 *fw_ptr; 2092 int disable_patch, err; 2093 struct intel_version ver; 2094 2095 BT_DBG("%s", hdev->name); 2096 2097 /* The controller has a bug with the first HCI command sent to it 2098 * returning number of completed commands as zero. This would stall the 2099 * command processing in the Bluetooth core. 2100 * 2101 * As a workaround, send HCI Reset command first which will reset the 2102 * number of completed commands and allow normal command processing 2103 * from now on. 2104 */ 2105 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 2106 if (IS_ERR(skb)) { 2107 bt_dev_err(hdev, "sending initial HCI reset command failed (%ld)", 2108 PTR_ERR(skb)); 2109 return PTR_ERR(skb); 2110 } 2111 kfree_skb(skb); 2112 2113 /* Read Intel specific controller version first to allow selection of 2114 * which firmware file to load. 2115 * 2116 * The returned information are hardware variant and revision plus 2117 * firmware variant, revision and build number. 2118 */ 2119 err = btintel_read_version(hdev, &ver); 2120 if (err) 2121 return err; 2122 2123 bt_dev_info(hdev, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", 2124 ver.hw_platform, ver.hw_variant, ver.hw_revision, 2125 ver.fw_variant, ver.fw_revision, ver.fw_build_num, 2126 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); 2127 2128 /* fw_patch_num indicates the version of patch the device currently 2129 * have. If there is no patch data in the device, it is always 0x00. 2130 * So, if it is other than 0x00, no need to patch the device again. 2131 */ 2132 if (ver.fw_patch_num) { 2133 bt_dev_info(hdev, "Intel device is already patched. " 2134 "patch num: %02x", ver.fw_patch_num); 2135 goto complete; 2136 } 2137 2138 /* Opens the firmware patch file based on the firmware version read 2139 * from the controller. If it fails to open the matching firmware 2140 * patch file, it tries to open the default firmware patch file. 2141 * If no patch file is found, allow the device to operate without 2142 * a patch. 2143 */ 2144 fw = btusb_setup_intel_get_fw(hdev, &ver); 2145 if (!fw) 2146 goto complete; 2147 fw_ptr = fw->data; 2148 2149 /* Enable the manufacturer mode of the controller. 2150 * Only while this mode is enabled, the driver can download the 2151 * firmware patch data and configuration parameters. 2152 */ 2153 err = btintel_enter_mfg(hdev); 2154 if (err) { 2155 release_firmware(fw); 2156 return err; 2157 } 2158 2159 disable_patch = 1; 2160 2161 /* The firmware data file consists of list of Intel specific HCI 2162 * commands and its expected events. The first byte indicates the 2163 * type of the message, either HCI command or HCI event. 2164 * 2165 * It reads the command and its expected event from the firmware file, 2166 * and send to the controller. Once __hci_cmd_sync_ev() returns, 2167 * the returned event is compared with the event read from the firmware 2168 * file and it will continue until all the messages are downloaded to 2169 * the controller. 2170 * 2171 * Once the firmware patching is completed successfully, 2172 * the manufacturer mode is disabled with reset and activating the 2173 * downloaded patch. 2174 * 2175 * If the firmware patching fails, the manufacturer mode is 2176 * disabled with reset and deactivating the patch. 2177 * 2178 * If the default patch file is used, no reset is done when disabling 2179 * the manufacturer. 2180 */ 2181 while (fw->size > fw_ptr - fw->data) { 2182 int ret; 2183 2184 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, 2185 &disable_patch); 2186 if (ret < 0) 2187 goto exit_mfg_deactivate; 2188 } 2189 2190 release_firmware(fw); 2191 2192 if (disable_patch) 2193 goto exit_mfg_disable; 2194 2195 /* Patching completed successfully and disable the manufacturer mode 2196 * with reset and activate the downloaded firmware patches. 2197 */ 2198 err = btintel_exit_mfg(hdev, true, true); 2199 if (err) 2200 return err; 2201 2202 /* Need build number for downloaded fw patches in 2203 * every power-on boot 2204 */ 2205 err = btintel_read_version(hdev, &ver); 2206 if (err) 2207 return err; 2208 bt_dev_info(hdev, "Intel BT fw patch 0x%02x completed & activated", 2209 ver.fw_patch_num); 2210 2211 goto complete; 2212 2213 exit_mfg_disable: 2214 /* Disable the manufacturer mode without reset */ 2215 err = btintel_exit_mfg(hdev, false, false); 2216 if (err) 2217 return err; 2218 2219 bt_dev_info(hdev, "Intel firmware patch completed"); 2220 2221 goto complete; 2222 2223 exit_mfg_deactivate: 2224 release_firmware(fw); 2225 2226 /* Patching failed. Disable the manufacturer mode with reset and 2227 * deactivate the downloaded firmware patches. 2228 */ 2229 err = btintel_exit_mfg(hdev, true, false); 2230 if (err) 2231 return err; 2232 2233 bt_dev_info(hdev, "Intel firmware patch completed and deactivated"); 2234 2235 complete: 2236 /* Set the event mask for Intel specific vendor events. This enables 2237 * a few extra events that are useful during general operation. 2238 */ 2239 btintel_set_event_mask_mfg(hdev, false); 2240 2241 btintel_check_bdaddr(hdev); 2242 return 0; 2243 } 2244 2245 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) 2246 { 2247 struct sk_buff *skb; 2248 struct hci_event_hdr *hdr; 2249 struct hci_ev_cmd_complete *evt; 2250 2251 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_KERNEL); 2252 if (!skb) 2253 return -ENOMEM; 2254 2255 hdr = skb_put(skb, sizeof(*hdr)); 2256 hdr->evt = HCI_EV_CMD_COMPLETE; 2257 hdr->plen = sizeof(*evt) + 1; 2258 2259 evt = skb_put(skb, sizeof(*evt)); 2260 evt->ncmd = 0x01; 2261 evt->opcode = cpu_to_le16(opcode); 2262 2263 skb_put_u8(skb, 0x00); 2264 2265 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 2266 2267 return hci_recv_frame(hdev, skb); 2268 } 2269 2270 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, 2271 int count) 2272 { 2273 /* When the device is in bootloader mode, then it can send 2274 * events via the bulk endpoint. These events are treated the 2275 * same way as the ones received from the interrupt endpoint. 2276 */ 2277 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) 2278 return btusb_recv_intr(data, buffer, count); 2279 2280 return btusb_recv_bulk(data, buffer, count); 2281 } 2282 2283 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, 2284 unsigned int len) 2285 { 2286 const struct intel_bootup *evt = ptr; 2287 2288 if (len != sizeof(*evt)) 2289 return; 2290 2291 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) 2292 wake_up_bit(&data->flags, BTUSB_BOOTING); 2293 } 2294 2295 static void btusb_intel_secure_send_result(struct btusb_data *data, 2296 const void *ptr, unsigned int len) 2297 { 2298 const struct intel_secure_send_result *evt = ptr; 2299 2300 if (len != sizeof(*evt)) 2301 return; 2302 2303 if (evt->result) 2304 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); 2305 2306 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && 2307 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) 2308 wake_up_bit(&data->flags, BTUSB_DOWNLOADING); 2309 } 2310 2311 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) 2312 { 2313 struct btusb_data *data = hci_get_drvdata(hdev); 2314 2315 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2316 struct hci_event_hdr *hdr = (void *)skb->data; 2317 2318 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && 2319 hdr->plen > 0) { 2320 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; 2321 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; 2322 2323 switch (skb->data[2]) { 2324 case 0x02: 2325 /* When switching to the operational firmware 2326 * the device sends a vendor specific event 2327 * indicating that the bootup completed. 2328 */ 2329 btusb_intel_bootup(data, ptr, len); 2330 break; 2331 case 0x06: 2332 /* When the firmware loading completes the 2333 * device sends out a vendor specific event 2334 * indicating the result of the firmware 2335 * loading. 2336 */ 2337 btusb_intel_secure_send_result(data, ptr, len); 2338 break; 2339 } 2340 } 2341 } 2342 2343 return hci_recv_frame(hdev, skb); 2344 } 2345 2346 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) 2347 { 2348 struct btusb_data *data = hci_get_drvdata(hdev); 2349 struct urb *urb; 2350 2351 BT_DBG("%s", hdev->name); 2352 2353 switch (hci_skb_pkt_type(skb)) { 2354 case HCI_COMMAND_PKT: 2355 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2356 struct hci_command_hdr *cmd = (void *)skb->data; 2357 __u16 opcode = le16_to_cpu(cmd->opcode); 2358 2359 /* When in bootloader mode and the command 0xfc09 2360 * is received, it needs to be send down the 2361 * bulk endpoint. So allocate a bulk URB instead. 2362 */ 2363 if (opcode == 0xfc09) 2364 urb = alloc_bulk_urb(hdev, skb); 2365 else 2366 urb = alloc_ctrl_urb(hdev, skb); 2367 2368 /* When the 0xfc01 command is issued to boot into 2369 * the operational firmware, it will actually not 2370 * send a command complete event. To keep the flow 2371 * control working inject that event here. 2372 */ 2373 if (opcode == 0xfc01) 2374 inject_cmd_complete(hdev, opcode); 2375 } else { 2376 urb = alloc_ctrl_urb(hdev, skb); 2377 } 2378 if (IS_ERR(urb)) 2379 return PTR_ERR(urb); 2380 2381 hdev->stat.cmd_tx++; 2382 return submit_or_queue_tx_urb(hdev, urb); 2383 2384 case HCI_ACLDATA_PKT: 2385 urb = alloc_bulk_urb(hdev, skb); 2386 if (IS_ERR(urb)) 2387 return PTR_ERR(urb); 2388 2389 hdev->stat.acl_tx++; 2390 return submit_or_queue_tx_urb(hdev, urb); 2391 2392 case HCI_SCODATA_PKT: 2393 if (hci_conn_num(hdev, SCO_LINK) < 1) 2394 return -ENODEV; 2395 2396 urb = alloc_isoc_urb(hdev, skb); 2397 if (IS_ERR(urb)) 2398 return PTR_ERR(urb); 2399 2400 hdev->stat.sco_tx++; 2401 return submit_tx_urb(hdev, urb); 2402 } 2403 2404 return -EILSEQ; 2405 } 2406 2407 static int btusb_setup_intel_new_get_fw_name(struct intel_version *ver, 2408 struct intel_boot_params *params, 2409 char *fw_name, size_t len, 2410 const char *suffix) 2411 { 2412 switch (ver->hw_variant) { 2413 case 0x0b: /* SfP */ 2414 case 0x0c: /* WsP */ 2415 snprintf(fw_name, len, "intel/ibt-%u-%u.%s", 2416 le16_to_cpu(ver->hw_variant), 2417 le16_to_cpu(params->dev_revid), 2418 suffix); 2419 break; 2420 case 0x11: /* JfP */ 2421 case 0x12: /* ThP */ 2422 case 0x13: /* HrP */ 2423 case 0x14: /* CcP */ 2424 snprintf(fw_name, len, "intel/ibt-%u-%u-%u.%s", 2425 le16_to_cpu(ver->hw_variant), 2426 le16_to_cpu(ver->hw_revision), 2427 le16_to_cpu(ver->fw_revision), 2428 suffix); 2429 break; 2430 default: 2431 return -EINVAL; 2432 } 2433 2434 return 0; 2435 } 2436 2437 static void btusb_setup_intel_newgen_get_fw_name(const struct intel_version_tlv *ver_tlv, 2438 char *fw_name, size_t len, 2439 const char *suffix) 2440 { 2441 /* The firmware file name for new generation controllers will be 2442 * ibt-<cnvi_top type+cnvi_top step>-<cnvr_top type+cnvr_top step> 2443 */ 2444 snprintf(fw_name, len, "intel/ibt-%04x-%04x.%s", 2445 INTEL_CNVX_TOP_PACK_SWAB(INTEL_CNVX_TOP_TYPE(ver_tlv->cnvi_top), 2446 INTEL_CNVX_TOP_STEP(ver_tlv->cnvi_top)), 2447 INTEL_CNVX_TOP_PACK_SWAB(INTEL_CNVX_TOP_TYPE(ver_tlv->cnvr_top), 2448 INTEL_CNVX_TOP_STEP(ver_tlv->cnvr_top)), 2449 suffix); 2450 } 2451 2452 static int btusb_download_wait(struct hci_dev *hdev, ktime_t calltime, int msec) 2453 { 2454 struct btusb_data *data = hci_get_drvdata(hdev); 2455 ktime_t delta, rettime; 2456 unsigned long long duration; 2457 int err; 2458 2459 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2460 2461 bt_dev_info(hdev, "Waiting for firmware download to complete"); 2462 2463 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, 2464 TASK_INTERRUPTIBLE, 2465 msecs_to_jiffies(msec)); 2466 if (err == -EINTR) { 2467 bt_dev_err(hdev, "Firmware loading interrupted"); 2468 return err; 2469 } 2470 2471 if (err) { 2472 bt_dev_err(hdev, "Firmware loading timeout"); 2473 return -ETIMEDOUT; 2474 } 2475 2476 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { 2477 bt_dev_err(hdev, "Firmware loading failed"); 2478 return -ENOEXEC; 2479 } 2480 2481 rettime = ktime_get(); 2482 delta = ktime_sub(rettime, calltime); 2483 duration = (unsigned long long)ktime_to_ns(delta) >> 10; 2484 2485 bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration); 2486 2487 return 0; 2488 } 2489 2490 static int btusb_intel_download_firmware_newgen(struct hci_dev *hdev, 2491 struct intel_version_tlv *ver, 2492 u32 *boot_param) 2493 { 2494 const struct firmware *fw; 2495 char fwname[64]; 2496 int err; 2497 struct btusb_data *data = hci_get_drvdata(hdev); 2498 ktime_t calltime; 2499 2500 if (!ver || !boot_param) 2501 return -EINVAL; 2502 2503 /* The firmware variant determines if the device is in bootloader 2504 * mode or is running operational firmware. The value 0x03 identifies 2505 * the bootloader and the value 0x23 identifies the operational 2506 * firmware. 2507 * 2508 * When the operational firmware is already present, then only 2509 * the check for valid Bluetooth device address is needed. This 2510 * determines if the device will be added as configured or 2511 * unconfigured controller. 2512 * 2513 * It is not possible to use the Secure Boot Parameters in this 2514 * case since that command is only available in bootloader mode. 2515 */ 2516 if (ver->img_type == 0x03) { 2517 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2518 btintel_check_bdaddr(hdev); 2519 } 2520 2521 /* If the OTP has no valid Bluetooth device address, then there will 2522 * also be no valid address for the operational firmware. 2523 */ 2524 if (!bacmp(&ver->otp_bd_addr, BDADDR_ANY)) { 2525 bt_dev_info(hdev, "No device address configured"); 2526 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2527 } 2528 2529 btusb_setup_intel_newgen_get_fw_name(ver, fwname, sizeof(fwname), "sfi"); 2530 err = firmware_request_nowarn(&fw, fwname, &hdev->dev); 2531 if (err < 0) { 2532 if (!test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2533 /* Firmware has already been loaded */ 2534 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2535 return 0; 2536 } 2537 2538 bt_dev_err(hdev, "Failed to load Intel firmware file %s (%d)", 2539 fwname, err); 2540 2541 return err; 2542 } 2543 2544 bt_dev_info(hdev, "Found device firmware: %s", fwname); 2545 2546 if (fw->size < 644) { 2547 bt_dev_err(hdev, "Invalid size of firmware file (%zu)", 2548 fw->size); 2549 err = -EBADF; 2550 goto done; 2551 } 2552 2553 calltime = ktime_get(); 2554 2555 set_bit(BTUSB_DOWNLOADING, &data->flags); 2556 2557 /* Start firmware downloading and get boot parameter */ 2558 err = btintel_download_firmware_newgen(hdev, ver, fw, boot_param, 2559 INTEL_HW_VARIANT(ver->cnvi_bt), 2560 ver->sbe_type); 2561 if (err < 0) { 2562 if (err == -EALREADY) { 2563 /* Firmware has already been loaded */ 2564 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2565 err = 0; 2566 goto done; 2567 } 2568 2569 /* When FW download fails, send Intel Reset to retry 2570 * FW download. 2571 */ 2572 btintel_reset_to_bootloader(hdev); 2573 goto done; 2574 } 2575 2576 /* Before switching the device into operational mode and with that 2577 * booting the loaded firmware, wait for the bootloader notification 2578 * that all fragments have been successfully received. 2579 * 2580 * When the event processing receives the notification, then the 2581 * BTUSB_DOWNLOADING flag will be cleared. 2582 * 2583 * The firmware loading should not take longer than 5 seconds 2584 * and thus just timeout if that happens and fail the setup 2585 * of this device. 2586 */ 2587 err = btusb_download_wait(hdev, calltime, 5000); 2588 if (err == -ETIMEDOUT) 2589 btintel_reset_to_bootloader(hdev); 2590 2591 done: 2592 release_firmware(fw); 2593 return err; 2594 } 2595 2596 static int btusb_intel_download_firmware(struct hci_dev *hdev, 2597 struct intel_version *ver, 2598 struct intel_boot_params *params, 2599 u32 *boot_param) 2600 { 2601 const struct firmware *fw; 2602 char fwname[64]; 2603 int err; 2604 struct btusb_data *data = hci_get_drvdata(hdev); 2605 ktime_t calltime; 2606 2607 if (!ver || !params) 2608 return -EINVAL; 2609 2610 /* The firmware variant determines if the device is in bootloader 2611 * mode or is running operational firmware. The value 0x06 identifies 2612 * the bootloader and the value 0x23 identifies the operational 2613 * firmware. 2614 * 2615 * When the operational firmware is already present, then only 2616 * the check for valid Bluetooth device address is needed. This 2617 * determines if the device will be added as configured or 2618 * unconfigured controller. 2619 * 2620 * It is not possible to use the Secure Boot Parameters in this 2621 * case since that command is only available in bootloader mode. 2622 */ 2623 if (ver->fw_variant == 0x23) { 2624 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2625 btintel_check_bdaddr(hdev); 2626 2627 /* SfP and WsP don't seem to update the firmware version on file 2628 * so version checking is currently possible. 2629 */ 2630 switch (ver->hw_variant) { 2631 case 0x0b: /* SfP */ 2632 case 0x0c: /* WsP */ 2633 return 0; 2634 } 2635 2636 /* Proceed to download to check if the version matches */ 2637 goto download; 2638 } 2639 2640 /* Read the secure boot parameters to identify the operating 2641 * details of the bootloader. 2642 */ 2643 err = btintel_read_boot_params(hdev, params); 2644 if (err) 2645 return err; 2646 2647 /* It is required that every single firmware fragment is acknowledged 2648 * with a command complete event. If the boot parameters indicate 2649 * that this bootloader does not send them, then abort the setup. 2650 */ 2651 if (params->limited_cce != 0x00) { 2652 bt_dev_err(hdev, "Unsupported Intel firmware loading method (%u)", 2653 params->limited_cce); 2654 return -EINVAL; 2655 } 2656 2657 /* If the OTP has no valid Bluetooth device address, then there will 2658 * also be no valid address for the operational firmware. 2659 */ 2660 if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) { 2661 bt_dev_info(hdev, "No device address configured"); 2662 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); 2663 } 2664 2665 download: 2666 /* With this Intel bootloader only the hardware variant and device 2667 * revision information are used to select the right firmware for SfP 2668 * and WsP. 2669 * 2670 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi. 2671 * 2672 * Currently the supported hardware variants are: 2673 * 11 (0x0b) for iBT3.0 (LnP/SfP) 2674 * 12 (0x0c) for iBT3.5 (WsP) 2675 * 2676 * For ThP/JfP and for future SKU's, the FW name varies based on HW 2677 * variant, HW revision and FW revision, as these are dependent on CNVi 2678 * and RF Combination. 2679 * 2680 * 17 (0x11) for iBT3.5 (JfP) 2681 * 18 (0x12) for iBT3.5 (ThP) 2682 * 2683 * The firmware file name for these will be 2684 * ibt-<hw_variant>-<hw_revision>-<fw_revision>.sfi. 2685 * 2686 */ 2687 err = btusb_setup_intel_new_get_fw_name(ver, params, fwname, 2688 sizeof(fwname), "sfi"); 2689 if (err < 0) { 2690 if (!test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2691 /* Firmware has already been loaded */ 2692 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2693 return 0; 2694 } 2695 2696 bt_dev_err(hdev, "Unsupported Intel firmware naming"); 2697 return -EINVAL; 2698 } 2699 2700 err = firmware_request_nowarn(&fw, fwname, &hdev->dev); 2701 if (err < 0) { 2702 if (!test_bit(BTUSB_BOOTLOADER, &data->flags)) { 2703 /* Firmware has already been loaded */ 2704 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2705 return 0; 2706 } 2707 2708 bt_dev_err(hdev, "Failed to load Intel firmware file %s (%d)", 2709 fwname, err); 2710 return err; 2711 } 2712 2713 bt_dev_info(hdev, "Found device firmware: %s", fwname); 2714 2715 if (fw->size < 644) { 2716 bt_dev_err(hdev, "Invalid size of firmware file (%zu)", 2717 fw->size); 2718 err = -EBADF; 2719 goto done; 2720 } 2721 2722 calltime = ktime_get(); 2723 2724 set_bit(BTUSB_DOWNLOADING, &data->flags); 2725 2726 /* Start firmware downloading and get boot parameter */ 2727 err = btintel_download_firmware(hdev, ver, fw, boot_param); 2728 if (err < 0) { 2729 if (err == -EALREADY) { 2730 /* Firmware has already been loaded */ 2731 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); 2732 err = 0; 2733 goto done; 2734 } 2735 2736 /* When FW download fails, send Intel Reset to retry 2737 * FW download. 2738 */ 2739 btintel_reset_to_bootloader(hdev); 2740 goto done; 2741 } 2742 2743 /* Before switching the device into operational mode and with that 2744 * booting the loaded firmware, wait for the bootloader notification 2745 * that all fragments have been successfully received. 2746 * 2747 * When the event processing receives the notification, then the 2748 * BTUSB_DOWNLOADING flag will be cleared. 2749 * 2750 * The firmware loading should not take longer than 5 seconds 2751 * and thus just timeout if that happens and fail the setup 2752 * of this device. 2753 */ 2754 err = btusb_download_wait(hdev, calltime, 5000); 2755 if (err == -ETIMEDOUT) 2756 btintel_reset_to_bootloader(hdev); 2757 2758 done: 2759 release_firmware(fw); 2760 return err; 2761 } 2762 2763 static int btusb_boot_wait(struct hci_dev *hdev, ktime_t calltime, int msec) 2764 { 2765 struct btusb_data *data = hci_get_drvdata(hdev); 2766 ktime_t delta, rettime; 2767 unsigned long long duration; 2768 int err; 2769 2770 bt_dev_info(hdev, "Waiting for device to boot"); 2771 2772 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, 2773 TASK_INTERRUPTIBLE, 2774 msecs_to_jiffies(msec)); 2775 if (err == -EINTR) { 2776 bt_dev_err(hdev, "Device boot interrupted"); 2777 return -EINTR; 2778 } 2779 2780 if (err) { 2781 bt_dev_err(hdev, "Device boot timeout"); 2782 return -ETIMEDOUT; 2783 } 2784 2785 rettime = ktime_get(); 2786 delta = ktime_sub(rettime, calltime); 2787 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 2788 2789 bt_dev_info(hdev, "Device booted in %llu usecs", duration); 2790 2791 return 0; 2792 } 2793 2794 static int btusb_intel_boot(struct hci_dev *hdev, u32 boot_addr) 2795 { 2796 struct btusb_data *data = hci_get_drvdata(hdev); 2797 ktime_t calltime; 2798 int err; 2799 2800 calltime = ktime_get(); 2801 2802 set_bit(BTUSB_BOOTING, &data->flags); 2803 2804 err = btintel_send_intel_reset(hdev, boot_addr); 2805 if (err) { 2806 bt_dev_err(hdev, "Intel Soft Reset failed (%d)", err); 2807 btintel_reset_to_bootloader(hdev); 2808 return err; 2809 } 2810 2811 /* The bootloader will not indicate when the device is ready. This 2812 * is done by the operational firmware sending bootup notification. 2813 * 2814 * Booting into operational firmware should not take longer than 2815 * 1 second. However if that happens, then just fail the setup 2816 * since something went wrong. 2817 */ 2818 err = btusb_boot_wait(hdev, calltime, 1000); 2819 if (err == -ETIMEDOUT) 2820 btintel_reset_to_bootloader(hdev); 2821 2822 return err; 2823 } 2824 2825 static int btusb_setup_intel_new(struct hci_dev *hdev) 2826 { 2827 struct btusb_data *data = hci_get_drvdata(hdev); 2828 struct intel_version ver; 2829 struct intel_boot_params params; 2830 u32 boot_param; 2831 char ddcname[64]; 2832 int err; 2833 struct intel_debug_features features; 2834 2835 BT_DBG("%s", hdev->name); 2836 2837 /* Set the default boot parameter to 0x0 and it is updated to 2838 * SKU specific boot parameter after reading Intel_Write_Boot_Params 2839 * command while downloading the firmware. 2840 */ 2841 boot_param = 0x00000000; 2842 2843 /* Read the Intel version information to determine if the device 2844 * is in bootloader mode or if it already has operational firmware 2845 * loaded. 2846 */ 2847 err = btintel_read_version(hdev, &ver); 2848 if (err) { 2849 bt_dev_err(hdev, "Intel Read version failed (%d)", err); 2850 btintel_reset_to_bootloader(hdev); 2851 return err; 2852 } 2853 2854 err = btintel_version_info(hdev, &ver); 2855 if (err) 2856 return err; 2857 2858 err = btusb_intel_download_firmware(hdev, &ver, ¶ms, &boot_param); 2859 if (err) 2860 return err; 2861 2862 /* controller is already having an operational firmware */ 2863 if (ver.fw_variant == 0x23) 2864 goto finish; 2865 2866 err = btusb_intel_boot(hdev, boot_param); 2867 if (err) 2868 return err; 2869 2870 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2871 2872 err = btusb_setup_intel_new_get_fw_name(&ver, ¶ms, ddcname, 2873 sizeof(ddcname), "ddc"); 2874 2875 if (err < 0) { 2876 bt_dev_err(hdev, "Unsupported Intel firmware naming"); 2877 } else { 2878 /* Once the device is running in operational mode, it needs to 2879 * apply the device configuration (DDC) parameters. 2880 * 2881 * The device can work without DDC parameters, so even if it 2882 * fails to load the file, no need to fail the setup. 2883 */ 2884 btintel_load_ddc_config(hdev, ddcname); 2885 } 2886 2887 /* Read the Intel supported features and if new exception formats 2888 * supported, need to load the additional DDC config to enable. 2889 */ 2890 btintel_read_debug_features(hdev, &features); 2891 2892 /* Set DDC mask for available debug features */ 2893 btintel_set_debug_features(hdev, &features); 2894 2895 /* Read the Intel version information after loading the FW */ 2896 err = btintel_read_version(hdev, &ver); 2897 if (err) 2898 return err; 2899 2900 btintel_version_info(hdev, &ver); 2901 2902 finish: 2903 /* All Intel controllers that support the Microsoft vendor 2904 * extension are using 0xFC1E for VsMsftOpCode. 2905 */ 2906 switch (ver.hw_variant) { 2907 case 0x11: /* JfP */ 2908 case 0x12: /* ThP */ 2909 case 0x13: /* HrP */ 2910 case 0x14: /* CcP */ 2911 hci_set_msft_opcode(hdev, 0xFC1E); 2912 break; 2913 } 2914 2915 /* Set the event mask for Intel specific vendor events. This enables 2916 * a few extra events that are useful during general operation. It 2917 * does not enable any debugging related events. 2918 * 2919 * The device will function correctly without these events enabled 2920 * and thus no need to fail the setup. 2921 */ 2922 btintel_set_event_mask(hdev, false); 2923 2924 return 0; 2925 } 2926 2927 static int btusb_setup_intel_newgen(struct hci_dev *hdev) 2928 { 2929 struct btusb_data *data = hci_get_drvdata(hdev); 2930 u32 boot_param; 2931 char ddcname[64]; 2932 int err; 2933 struct intel_debug_features features; 2934 struct intel_version_tlv version; 2935 2936 bt_dev_dbg(hdev, ""); 2937 2938 /* Set the default boot parameter to 0x0 and it is updated to 2939 * SKU specific boot parameter after reading Intel_Write_Boot_Params 2940 * command while downloading the firmware. 2941 */ 2942 boot_param = 0x00000000; 2943 2944 /* Read the Intel version information to determine if the device 2945 * is in bootloader mode or if it already has operational firmware 2946 * loaded. 2947 */ 2948 err = btintel_read_version_tlv(hdev, &version); 2949 if (err) { 2950 bt_dev_err(hdev, "Intel Read version failed (%d)", err); 2951 btintel_reset_to_bootloader(hdev); 2952 return err; 2953 } 2954 2955 err = btintel_version_info_tlv(hdev, &version); 2956 if (err) 2957 return err; 2958 2959 err = btusb_intel_download_firmware_newgen(hdev, &version, &boot_param); 2960 if (err) 2961 return err; 2962 2963 /* check if controller is already having an operational firmware */ 2964 if (version.img_type == 0x03) 2965 goto finish; 2966 2967 err = btusb_intel_boot(hdev, boot_param); 2968 if (err) 2969 return err; 2970 2971 clear_bit(BTUSB_BOOTLOADER, &data->flags); 2972 2973 btusb_setup_intel_newgen_get_fw_name(&version, ddcname, sizeof(ddcname), 2974 "ddc"); 2975 /* Once the device is running in operational mode, it needs to 2976 * apply the device configuration (DDC) parameters. 2977 * 2978 * The device can work without DDC parameters, so even if it 2979 * fails to load the file, no need to fail the setup. 2980 */ 2981 btintel_load_ddc_config(hdev, ddcname); 2982 2983 /* Read the Intel supported features and if new exception formats 2984 * supported, need to load the additional DDC config to enable. 2985 */ 2986 btintel_read_debug_features(hdev, &features); 2987 2988 /* Set DDC mask for available debug features */ 2989 btintel_set_debug_features(hdev, &features); 2990 2991 /* Read the Intel version information after loading the FW */ 2992 err = btintel_read_version_tlv(hdev, &version); 2993 if (err) 2994 return err; 2995 2996 btintel_version_info_tlv(hdev, &version); 2997 2998 finish: 2999 /* Set the event mask for Intel specific vendor events. This enables 3000 * a few extra events that are useful during general operation. It 3001 * does not enable any debugging related events. 3002 * 3003 * The device will function correctly without these events enabled 3004 * and thus no need to fail the setup. 3005 */ 3006 btintel_set_event_mask(hdev, false); 3007 3008 return 0; 3009 } 3010 static int btusb_shutdown_intel(struct hci_dev *hdev) 3011 { 3012 struct sk_buff *skb; 3013 long ret; 3014 3015 /* In the shutdown sequence where Bluetooth is turned off followed 3016 * by WiFi being turned off, turning WiFi back on causes issue with 3017 * the RF calibration. 3018 * 3019 * To ensure that any RF activity has been stopped, issue HCI Reset 3020 * command to clear all ongoing activity including advertising, 3021 * scanning etc. 3022 */ 3023 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 3024 if (IS_ERR(skb)) { 3025 ret = PTR_ERR(skb); 3026 bt_dev_err(hdev, "HCI reset during shutdown failed"); 3027 return ret; 3028 } 3029 kfree_skb(skb); 3030 3031 /* Some platforms have an issue with BT LED when the interface is 3032 * down or BT radio is turned off, which takes 5 seconds to BT LED 3033 * goes off. This command turns off the BT LED immediately. 3034 */ 3035 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); 3036 if (IS_ERR(skb)) { 3037 ret = PTR_ERR(skb); 3038 bt_dev_err(hdev, "turning off Intel device LED failed"); 3039 return ret; 3040 } 3041 kfree_skb(skb); 3042 3043 return 0; 3044 } 3045 3046 static int btusb_shutdown_intel_new(struct hci_dev *hdev) 3047 { 3048 struct sk_buff *skb; 3049 3050 /* Send HCI Reset to the controller to stop any BT activity which 3051 * were triggered. This will help to save power and maintain the 3052 * sync b/w Host and controller 3053 */ 3054 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 3055 if (IS_ERR(skb)) { 3056 bt_dev_err(hdev, "HCI reset during shutdown failed"); 3057 return PTR_ERR(skb); 3058 } 3059 kfree_skb(skb); 3060 3061 return 0; 3062 } 3063 3064 #define FIRMWARE_MT7663 "mediatek/mt7663pr2h.bin" 3065 #define FIRMWARE_MT7668 "mediatek/mt7668pr2h.bin" 3066 3067 #define HCI_WMT_MAX_EVENT_SIZE 64 3068 /* It is for mt79xx download rom patch*/ 3069 #define MTK_FW_ROM_PATCH_HEADER_SIZE 32 3070 #define MTK_FW_ROM_PATCH_GD_SIZE 64 3071 #define MTK_FW_ROM_PATCH_SEC_MAP_SIZE 64 3072 #define MTK_SEC_MAP_COMMON_SIZE 12 3073 #define MTK_SEC_MAP_NEED_SEND_SIZE 52 3074 3075 enum { 3076 BTMTK_WMT_PATCH_DWNLD = 0x1, 3077 BTMTK_WMT_FUNC_CTRL = 0x6, 3078 BTMTK_WMT_RST = 0x7, 3079 BTMTK_WMT_SEMAPHORE = 0x17, 3080 }; 3081 3082 enum { 3083 BTMTK_WMT_INVALID, 3084 BTMTK_WMT_PATCH_UNDONE, 3085 BTMTK_WMT_PATCH_PROGRESS, 3086 BTMTK_WMT_PATCH_DONE, 3087 BTMTK_WMT_ON_UNDONE, 3088 BTMTK_WMT_ON_DONE, 3089 BTMTK_WMT_ON_PROGRESS, 3090 }; 3091 3092 struct btmtk_wmt_hdr { 3093 u8 dir; 3094 u8 op; 3095 __le16 dlen; 3096 u8 flag; 3097 } __packed; 3098 3099 struct btmtk_hci_wmt_cmd { 3100 struct btmtk_wmt_hdr hdr; 3101 u8 data[]; 3102 } __packed; 3103 3104 struct btmtk_hci_wmt_evt { 3105 struct hci_event_hdr hhdr; 3106 struct btmtk_wmt_hdr whdr; 3107 } __packed; 3108 3109 struct btmtk_hci_wmt_evt_funcc { 3110 struct btmtk_hci_wmt_evt hwhdr; 3111 __be16 status; 3112 } __packed; 3113 3114 struct btmtk_tci_sleep { 3115 u8 mode; 3116 __le16 duration; 3117 __le16 host_duration; 3118 u8 host_wakeup_pin; 3119 u8 time_compensation; 3120 } __packed; 3121 3122 struct btmtk_hci_wmt_params { 3123 u8 op; 3124 u8 flag; 3125 u16 dlen; 3126 const void *data; 3127 u32 *status; 3128 }; 3129 3130 struct btmtk_patch_header { 3131 u8 datetime[16]; 3132 u8 platform[4]; 3133 __le16 hwver; 3134 __le16 swver; 3135 __le32 magicnum; 3136 } __packed; 3137 3138 struct btmtk_global_desc { 3139 __le32 patch_ver; 3140 __le32 sub_sys; 3141 __le32 feature_opt; 3142 __le32 section_num; 3143 } __packed; 3144 3145 struct btmtk_section_map { 3146 __le32 sectype; 3147 __le32 secoffset; 3148 __le32 secsize; 3149 union { 3150 __le32 u4SecSpec[13]; 3151 struct { 3152 __le32 dlAddr; 3153 __le32 dlsize; 3154 __le32 seckeyidx; 3155 __le32 alignlen; 3156 __le32 sectype; 3157 __le32 dlmodecrctype; 3158 __le32 crc; 3159 __le32 reserved[6]; 3160 } bin_info_spec; 3161 }; 3162 } __packed; 3163 3164 static void btusb_mtk_wmt_recv(struct urb *urb) 3165 { 3166 struct hci_dev *hdev = urb->context; 3167 struct btusb_data *data = hci_get_drvdata(hdev); 3168 struct hci_event_hdr *hdr; 3169 struct sk_buff *skb; 3170 int err; 3171 3172 if (urb->status == 0 && urb->actual_length > 0) { 3173 hdev->stat.byte_rx += urb->actual_length; 3174 3175 /* WMT event shouldn't be fragmented and the size should be 3176 * less than HCI_WMT_MAX_EVENT_SIZE. 3177 */ 3178 skb = bt_skb_alloc(HCI_WMT_MAX_EVENT_SIZE, GFP_ATOMIC); 3179 if (!skb) { 3180 hdev->stat.err_rx++; 3181 return; 3182 } 3183 3184 hci_skb_pkt_type(skb) = HCI_EVENT_PKT; 3185 skb_put_data(skb, urb->transfer_buffer, urb->actual_length); 3186 3187 hdr = (void *)skb->data; 3188 /* Fix up the vendor event id with 0xff for vendor specific 3189 * instead of 0xe4 so that event send via monitoring socket can 3190 * be parsed properly. 3191 */ 3192 hdr->evt = 0xff; 3193 3194 /* When someone waits for the WMT event, the skb is being cloned 3195 * and being processed the events from there then. 3196 */ 3197 if (test_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags)) { 3198 data->evt_skb = skb_clone(skb, GFP_ATOMIC); 3199 if (!data->evt_skb) { 3200 kfree_skb(skb); 3201 return; 3202 } 3203 } 3204 3205 err = hci_recv_frame(hdev, skb); 3206 if (err < 0) { 3207 kfree_skb(data->evt_skb); 3208 data->evt_skb = NULL; 3209 return; 3210 } 3211 3212 if (test_and_clear_bit(BTUSB_TX_WAIT_VND_EVT, 3213 &data->flags)) { 3214 /* Barrier to sync with other CPUs */ 3215 smp_mb__after_atomic(); 3216 wake_up_bit(&data->flags, 3217 BTUSB_TX_WAIT_VND_EVT); 3218 } 3219 return; 3220 } else if (urb->status == -ENOENT) { 3221 /* Avoid suspend failed when usb_kill_urb */ 3222 return; 3223 } 3224 3225 usb_mark_last_busy(data->udev); 3226 3227 /* The URB complete handler is still called with urb->actual_length = 0 3228 * when the event is not available, so we should keep re-submitting 3229 * URB until WMT event returns, Also, It's necessary to wait some time 3230 * between the two consecutive control URBs to relax the target device 3231 * to generate the event. Otherwise, the WMT event cannot return from 3232 * the device successfully. 3233 */ 3234 udelay(500); 3235 3236 usb_anchor_urb(urb, &data->ctrl_anchor); 3237 err = usb_submit_urb(urb, GFP_ATOMIC); 3238 if (err < 0) { 3239 /* -EPERM: urb is being killed; 3240 * -ENODEV: device got disconnected 3241 */ 3242 if (err != -EPERM && err != -ENODEV) 3243 bt_dev_err(hdev, "urb %p failed to resubmit (%d)", 3244 urb, -err); 3245 usb_unanchor_urb(urb); 3246 } 3247 } 3248 3249 static int btusb_mtk_submit_wmt_recv_urb(struct hci_dev *hdev) 3250 { 3251 struct btusb_data *data = hci_get_drvdata(hdev); 3252 struct usb_ctrlrequest *dr; 3253 unsigned char *buf; 3254 int err, size = 64; 3255 unsigned int pipe; 3256 struct urb *urb; 3257 3258 urb = usb_alloc_urb(0, GFP_KERNEL); 3259 if (!urb) 3260 return -ENOMEM; 3261 3262 dr = kmalloc(sizeof(*dr), GFP_KERNEL); 3263 if (!dr) { 3264 usb_free_urb(urb); 3265 return -ENOMEM; 3266 } 3267 3268 dr->bRequestType = USB_TYPE_VENDOR | USB_DIR_IN; 3269 dr->bRequest = 1; 3270 dr->wIndex = cpu_to_le16(0); 3271 dr->wValue = cpu_to_le16(48); 3272 dr->wLength = cpu_to_le16(size); 3273 3274 buf = kmalloc(size, GFP_KERNEL); 3275 if (!buf) { 3276 kfree(dr); 3277 usb_free_urb(urb); 3278 return -ENOMEM; 3279 } 3280 3281 pipe = usb_rcvctrlpipe(data->udev, 0); 3282 3283 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, 3284 buf, size, btusb_mtk_wmt_recv, hdev); 3285 3286 urb->transfer_flags |= URB_FREE_BUFFER; 3287 3288 usb_anchor_urb(urb, &data->ctrl_anchor); 3289 err = usb_submit_urb(urb, GFP_KERNEL); 3290 if (err < 0) { 3291 if (err != -EPERM && err != -ENODEV) 3292 bt_dev_err(hdev, "urb %p submission failed (%d)", 3293 urb, -err); 3294 usb_unanchor_urb(urb); 3295 } 3296 3297 usb_free_urb(urb); 3298 3299 return err; 3300 } 3301 3302 static int btusb_mtk_hci_wmt_sync(struct hci_dev *hdev, 3303 struct btmtk_hci_wmt_params *wmt_params) 3304 { 3305 struct btusb_data *data = hci_get_drvdata(hdev); 3306 struct btmtk_hci_wmt_evt_funcc *wmt_evt_funcc; 3307 u32 hlen, status = BTMTK_WMT_INVALID; 3308 struct btmtk_hci_wmt_evt *wmt_evt; 3309 struct btmtk_hci_wmt_cmd *wc; 3310 struct btmtk_wmt_hdr *hdr; 3311 int err; 3312 3313 /* Submit control IN URB on demand to process the WMT event */ 3314 err = btusb_mtk_submit_wmt_recv_urb(hdev); 3315 if (err < 0) 3316 return err; 3317 3318 /* Send the WMT command and wait until the WMT event returns */ 3319 hlen = sizeof(*hdr) + wmt_params->dlen; 3320 if (hlen > 255) 3321 return -EINVAL; 3322 3323 wc = kzalloc(hlen, GFP_KERNEL); 3324 if (!wc) 3325 return -ENOMEM; 3326 3327 hdr = &wc->hdr; 3328 hdr->dir = 1; 3329 hdr->op = wmt_params->op; 3330 hdr->dlen = cpu_to_le16(wmt_params->dlen + 1); 3331 hdr->flag = wmt_params->flag; 3332 memcpy(wc->data, wmt_params->data, wmt_params->dlen); 3333 3334 set_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 3335 3336 err = __hci_cmd_send(hdev, 0xfc6f, hlen, wc); 3337 3338 if (err < 0) { 3339 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 3340 goto err_free_wc; 3341 } 3342 3343 /* The vendor specific WMT commands are all answered by a vendor 3344 * specific event and will have the Command Status or Command 3345 * Complete as with usual HCI command flow control. 3346 * 3347 * After sending the command, wait for BTUSB_TX_WAIT_VND_EVT 3348 * state to be cleared. The driver specific event receive routine 3349 * will clear that state and with that indicate completion of the 3350 * WMT command. 3351 */ 3352 err = wait_on_bit_timeout(&data->flags, BTUSB_TX_WAIT_VND_EVT, 3353 TASK_INTERRUPTIBLE, HCI_INIT_TIMEOUT); 3354 if (err == -EINTR) { 3355 bt_dev_err(hdev, "Execution of wmt command interrupted"); 3356 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 3357 goto err_free_wc; 3358 } 3359 3360 if (err) { 3361 bt_dev_err(hdev, "Execution of wmt command timed out"); 3362 clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags); 3363 err = -ETIMEDOUT; 3364 goto err_free_wc; 3365 } 3366 3367 /* Parse and handle the return WMT event */ 3368 wmt_evt = (struct btmtk_hci_wmt_evt *)data->evt_skb->data; 3369 if (wmt_evt->whdr.op != hdr->op) { 3370 bt_dev_err(hdev, "Wrong op received %d expected %d", 3371 wmt_evt->whdr.op, hdr->op); 3372 err = -EIO; 3373 goto err_free_skb; 3374 } 3375 3376 switch (wmt_evt->whdr.op) { 3377 case BTMTK_WMT_SEMAPHORE: 3378 if (wmt_evt->whdr.flag == 2) 3379 status = BTMTK_WMT_PATCH_UNDONE; 3380 else 3381 status = BTMTK_WMT_PATCH_DONE; 3382 break; 3383 case BTMTK_WMT_FUNC_CTRL: 3384 wmt_evt_funcc = (struct btmtk_hci_wmt_evt_funcc *)wmt_evt; 3385 if (be16_to_cpu(wmt_evt_funcc->status) == 0x404) 3386 status = BTMTK_WMT_ON_DONE; 3387 else if (be16_to_cpu(wmt_evt_funcc->status) == 0x420) 3388 status = BTMTK_WMT_ON_PROGRESS; 3389 else 3390 status = BTMTK_WMT_ON_UNDONE; 3391 break; 3392 case BTMTK_WMT_PATCH_DWNLD: 3393 if (wmt_evt->whdr.flag == 2) 3394 status = BTMTK_WMT_PATCH_DONE; 3395 else if (wmt_evt->whdr.flag == 1) 3396 status = BTMTK_WMT_PATCH_PROGRESS; 3397 else 3398 status = BTMTK_WMT_PATCH_UNDONE; 3399 break; 3400 } 3401 3402 if (wmt_params->status) 3403 *wmt_params->status = status; 3404 3405 err_free_skb: 3406 kfree_skb(data->evt_skb); 3407 data->evt_skb = NULL; 3408 err_free_wc: 3409 kfree(wc); 3410 return err; 3411 } 3412 3413 static int btusb_mtk_setup_firmware_79xx(struct hci_dev *hdev, const char *fwname) 3414 { 3415 struct btmtk_hci_wmt_params wmt_params; 3416 struct btmtk_global_desc *globaldesc = NULL; 3417 struct btmtk_section_map *sectionmap; 3418 const struct firmware *fw; 3419 const u8 *fw_ptr; 3420 const u8 *fw_bin_ptr; 3421 int err, dlen, i, status; 3422 u8 flag, first_block, retry; 3423 u32 section_num, dl_size, section_offset; 3424 u8 cmd[64]; 3425 3426 err = request_firmware(&fw, fwname, &hdev->dev); 3427 if (err < 0) { 3428 bt_dev_err(hdev, "Failed to load firmware file (%d)", err); 3429 return err; 3430 } 3431 3432 fw_ptr = fw->data; 3433 fw_bin_ptr = fw_ptr; 3434 globaldesc = (struct btmtk_global_desc *)(fw_ptr + MTK_FW_ROM_PATCH_HEADER_SIZE); 3435 section_num = le32_to_cpu(globaldesc->section_num); 3436 3437 for (i = 0; i < section_num; i++) { 3438 first_block = 1; 3439 fw_ptr = fw_bin_ptr; 3440 sectionmap = (struct btmtk_section_map *)(fw_ptr + MTK_FW_ROM_PATCH_HEADER_SIZE + 3441 MTK_FW_ROM_PATCH_GD_SIZE + MTK_FW_ROM_PATCH_SEC_MAP_SIZE * i); 3442 3443 section_offset = le32_to_cpu(sectionmap->secoffset); 3444 dl_size = le32_to_cpu(sectionmap->bin_info_spec.dlsize); 3445 3446 if (dl_size > 0) { 3447 retry = 20; 3448 while (retry > 0) { 3449 cmd[0] = 0; /* 0 means legacy dl mode. */ 3450 memcpy(cmd + 1, 3451 fw_ptr + MTK_FW_ROM_PATCH_HEADER_SIZE + 3452 MTK_FW_ROM_PATCH_GD_SIZE + MTK_FW_ROM_PATCH_SEC_MAP_SIZE * i + 3453 MTK_SEC_MAP_COMMON_SIZE, 3454 MTK_SEC_MAP_NEED_SEND_SIZE + 1); 3455 3456 wmt_params.op = BTMTK_WMT_PATCH_DWNLD; 3457 wmt_params.status = &status; 3458 wmt_params.flag = 0; 3459 wmt_params.dlen = MTK_SEC_MAP_NEED_SEND_SIZE + 1; 3460 wmt_params.data = &cmd; 3461 3462 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3463 if (err < 0) { 3464 bt_dev_err(hdev, "Failed to send wmt patch dwnld (%d)", 3465 err); 3466 goto err_release_fw; 3467 } 3468 3469 if (status == BTMTK_WMT_PATCH_UNDONE) { 3470 break; 3471 } else if (status == BTMTK_WMT_PATCH_PROGRESS) { 3472 msleep(100); 3473 retry--; 3474 } else if (status == BTMTK_WMT_PATCH_DONE) { 3475 goto next_section; 3476 } else { 3477 bt_dev_err(hdev, "Failed wmt patch dwnld status (%d)", 3478 status); 3479 goto err_release_fw; 3480 } 3481 } 3482 3483 fw_ptr += section_offset; 3484 wmt_params.op = BTMTK_WMT_PATCH_DWNLD; 3485 wmt_params.status = NULL; 3486 3487 while (dl_size > 0) { 3488 dlen = min_t(int, 250, dl_size); 3489 if (first_block == 1) { 3490 flag = 1; 3491 first_block = 0; 3492 } else if (dl_size - dlen <= 0) { 3493 flag = 3; 3494 } else { 3495 flag = 2; 3496 } 3497 3498 wmt_params.flag = flag; 3499 wmt_params.dlen = dlen; 3500 wmt_params.data = fw_ptr; 3501 3502 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3503 if (err < 0) { 3504 bt_dev_err(hdev, "Failed to send wmt patch dwnld (%d)", 3505 err); 3506 goto err_release_fw; 3507 } 3508 3509 dl_size -= dlen; 3510 fw_ptr += dlen; 3511 } 3512 } 3513 next_section: 3514 continue; 3515 } 3516 /* Wait a few moments for firmware activation done */ 3517 usleep_range(100000, 120000); 3518 3519 err_release_fw: 3520 release_firmware(fw); 3521 3522 return err; 3523 } 3524 3525 static int btusb_mtk_setup_firmware(struct hci_dev *hdev, const char *fwname) 3526 { 3527 struct btmtk_hci_wmt_params wmt_params; 3528 const struct firmware *fw; 3529 const u8 *fw_ptr; 3530 size_t fw_size; 3531 int err, dlen; 3532 u8 flag, param; 3533 3534 err = request_firmware(&fw, fwname, &hdev->dev); 3535 if (err < 0) { 3536 bt_dev_err(hdev, "Failed to load firmware file (%d)", err); 3537 return err; 3538 } 3539 3540 /* Power on data RAM the firmware relies on. */ 3541 param = 1; 3542 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3543 wmt_params.flag = 3; 3544 wmt_params.dlen = sizeof(param); 3545 wmt_params.data = ¶m; 3546 wmt_params.status = NULL; 3547 3548 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3549 if (err < 0) { 3550 bt_dev_err(hdev, "Failed to power on data RAM (%d)", err); 3551 goto err_release_fw; 3552 } 3553 3554 fw_ptr = fw->data; 3555 fw_size = fw->size; 3556 3557 /* The size of patch header is 30 bytes, should be skip */ 3558 if (fw_size < 30) { 3559 err = -EINVAL; 3560 goto err_release_fw; 3561 } 3562 3563 fw_size -= 30; 3564 fw_ptr += 30; 3565 flag = 1; 3566 3567 wmt_params.op = BTMTK_WMT_PATCH_DWNLD; 3568 wmt_params.status = NULL; 3569 3570 while (fw_size > 0) { 3571 dlen = min_t(int, 250, fw_size); 3572 3573 /* Tell device the position in sequence */ 3574 if (fw_size - dlen <= 0) 3575 flag = 3; 3576 else if (fw_size < fw->size - 30) 3577 flag = 2; 3578 3579 wmt_params.flag = flag; 3580 wmt_params.dlen = dlen; 3581 wmt_params.data = fw_ptr; 3582 3583 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3584 if (err < 0) { 3585 bt_dev_err(hdev, "Failed to send wmt patch dwnld (%d)", 3586 err); 3587 goto err_release_fw; 3588 } 3589 3590 fw_size -= dlen; 3591 fw_ptr += dlen; 3592 } 3593 3594 wmt_params.op = BTMTK_WMT_RST; 3595 wmt_params.flag = 4; 3596 wmt_params.dlen = 0; 3597 wmt_params.data = NULL; 3598 wmt_params.status = NULL; 3599 3600 /* Activate funciton the firmware providing to */ 3601 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3602 if (err < 0) { 3603 bt_dev_err(hdev, "Failed to send wmt rst (%d)", err); 3604 goto err_release_fw; 3605 } 3606 3607 /* Wait a few moments for firmware activation done */ 3608 usleep_range(10000, 12000); 3609 3610 err_release_fw: 3611 release_firmware(fw); 3612 3613 return err; 3614 } 3615 3616 static int btusb_mtk_func_query(struct hci_dev *hdev) 3617 { 3618 struct btmtk_hci_wmt_params wmt_params; 3619 int status, err; 3620 u8 param = 0; 3621 3622 /* Query whether the function is enabled */ 3623 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3624 wmt_params.flag = 4; 3625 wmt_params.dlen = sizeof(param); 3626 wmt_params.data = ¶m; 3627 wmt_params.status = &status; 3628 3629 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3630 if (err < 0) { 3631 bt_dev_err(hdev, "Failed to query function status (%d)", err); 3632 return err; 3633 } 3634 3635 return status; 3636 } 3637 3638 static int btusb_mtk_reg_read(struct btusb_data *data, u32 reg, u32 *val) 3639 { 3640 int pipe, err, size = sizeof(u32); 3641 void *buf; 3642 3643 buf = kzalloc(size, GFP_KERNEL); 3644 if (!buf) 3645 return -ENOMEM; 3646 3647 pipe = usb_rcvctrlpipe(data->udev, 0); 3648 err = usb_control_msg(data->udev, pipe, 0x63, 3649 USB_TYPE_VENDOR | USB_DIR_IN, 3650 reg >> 16, reg & 0xffff, 3651 buf, size, USB_CTRL_SET_TIMEOUT); 3652 if (err < 0) 3653 goto err_free_buf; 3654 3655 *val = get_unaligned_le32(buf); 3656 3657 err_free_buf: 3658 kfree(buf); 3659 3660 return err; 3661 } 3662 3663 static int btusb_mtk_id_get(struct btusb_data *data, u32 reg, u32 *id) 3664 { 3665 return btusb_mtk_reg_read(data, reg, id); 3666 } 3667 3668 static int btusb_mtk_setup(struct hci_dev *hdev) 3669 { 3670 struct btusb_data *data = hci_get_drvdata(hdev); 3671 struct btmtk_hci_wmt_params wmt_params; 3672 ktime_t calltime, delta, rettime; 3673 struct btmtk_tci_sleep tci_sleep; 3674 unsigned long long duration; 3675 struct sk_buff *skb; 3676 const char *fwname; 3677 int err, status; 3678 u32 dev_id; 3679 char fw_bin_name[64]; 3680 u32 fw_version = 0; 3681 u8 param; 3682 3683 calltime = ktime_get(); 3684 3685 err = btusb_mtk_id_get(data, 0x80000008, &dev_id); 3686 if (err < 0) { 3687 bt_dev_err(hdev, "Failed to get device id (%d)", err); 3688 return err; 3689 } 3690 3691 if (!dev_id) { 3692 err = btusb_mtk_id_get(data, 0x70010200, &dev_id); 3693 if (err < 0) { 3694 bt_dev_err(hdev, "Failed to get device id (%d)", err); 3695 return err; 3696 } 3697 err = btusb_mtk_id_get(data, 0x80021004, &fw_version); 3698 if (err < 0) { 3699 bt_dev_err(hdev, "Failed to get fw version (%d)", err); 3700 return err; 3701 } 3702 } 3703 3704 switch (dev_id) { 3705 case 0x7663: 3706 fwname = FIRMWARE_MT7663; 3707 break; 3708 case 0x7668: 3709 fwname = FIRMWARE_MT7668; 3710 break; 3711 case 0x7961: 3712 snprintf(fw_bin_name, sizeof(fw_bin_name), 3713 "mediatek/BT_RAM_CODE_MT%04x_1_%x_hdr.bin", 3714 dev_id & 0xffff, (fw_version & 0xff) + 1); 3715 err = btusb_mtk_setup_firmware_79xx(hdev, fw_bin_name); 3716 3717 /* Enable Bluetooth protocol */ 3718 param = 1; 3719 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3720 wmt_params.flag = 0; 3721 wmt_params.dlen = sizeof(param); 3722 wmt_params.data = ¶m; 3723 wmt_params.status = NULL; 3724 3725 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3726 if (err < 0) { 3727 bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err); 3728 return err; 3729 } 3730 goto done; 3731 default: 3732 bt_dev_err(hdev, "Unsupported hardware variant (%08x)", 3733 dev_id); 3734 return -ENODEV; 3735 } 3736 3737 /* Query whether the firmware is already download */ 3738 wmt_params.op = BTMTK_WMT_SEMAPHORE; 3739 wmt_params.flag = 1; 3740 wmt_params.dlen = 0; 3741 wmt_params.data = NULL; 3742 wmt_params.status = &status; 3743 3744 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3745 if (err < 0) { 3746 bt_dev_err(hdev, "Failed to query firmware status (%d)", err); 3747 return err; 3748 } 3749 3750 if (status == BTMTK_WMT_PATCH_DONE) { 3751 bt_dev_info(hdev, "firmware already downloaded"); 3752 goto ignore_setup_fw; 3753 } 3754 3755 /* Setup a firmware which the device definitely requires */ 3756 err = btusb_mtk_setup_firmware(hdev, fwname); 3757 if (err < 0) 3758 return err; 3759 3760 ignore_setup_fw: 3761 err = readx_poll_timeout(btusb_mtk_func_query, hdev, status, 3762 status < 0 || status != BTMTK_WMT_ON_PROGRESS, 3763 2000, 5000000); 3764 /* -ETIMEDOUT happens */ 3765 if (err < 0) 3766 return err; 3767 3768 /* The other errors happen in btusb_mtk_func_query */ 3769 if (status < 0) 3770 return status; 3771 3772 if (status == BTMTK_WMT_ON_DONE) { 3773 bt_dev_info(hdev, "function already on"); 3774 goto ignore_func_on; 3775 } 3776 3777 /* Enable Bluetooth protocol */ 3778 param = 1; 3779 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3780 wmt_params.flag = 0; 3781 wmt_params.dlen = sizeof(param); 3782 wmt_params.data = ¶m; 3783 wmt_params.status = NULL; 3784 3785 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3786 if (err < 0) { 3787 bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err); 3788 return err; 3789 } 3790 3791 ignore_func_on: 3792 /* Apply the low power environment setup */ 3793 tci_sleep.mode = 0x5; 3794 tci_sleep.duration = cpu_to_le16(0x640); 3795 tci_sleep.host_duration = cpu_to_le16(0x640); 3796 tci_sleep.host_wakeup_pin = 0; 3797 tci_sleep.time_compensation = 0; 3798 3799 skb = __hci_cmd_sync(hdev, 0xfc7a, sizeof(tci_sleep), &tci_sleep, 3800 HCI_INIT_TIMEOUT); 3801 if (IS_ERR(skb)) { 3802 err = PTR_ERR(skb); 3803 bt_dev_err(hdev, "Failed to apply low power setting (%d)", err); 3804 return err; 3805 } 3806 kfree_skb(skb); 3807 3808 done: 3809 rettime = ktime_get(); 3810 delta = ktime_sub(rettime, calltime); 3811 duration = (unsigned long long)ktime_to_ns(delta) >> 10; 3812 3813 bt_dev_info(hdev, "Device setup in %llu usecs", duration); 3814 3815 return 0; 3816 } 3817 3818 static int btusb_mtk_shutdown(struct hci_dev *hdev) 3819 { 3820 struct btmtk_hci_wmt_params wmt_params; 3821 u8 param = 0; 3822 int err; 3823 3824 /* Disable the device */ 3825 wmt_params.op = BTMTK_WMT_FUNC_CTRL; 3826 wmt_params.flag = 0; 3827 wmt_params.dlen = sizeof(param); 3828 wmt_params.data = ¶m; 3829 wmt_params.status = NULL; 3830 3831 err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params); 3832 if (err < 0) { 3833 bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err); 3834 return err; 3835 } 3836 3837 return 0; 3838 } 3839 3840 MODULE_FIRMWARE(FIRMWARE_MT7663); 3841 MODULE_FIRMWARE(FIRMWARE_MT7668); 3842 3843 #ifdef CONFIG_PM 3844 /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */ 3845 static int marvell_config_oob_wake(struct hci_dev *hdev) 3846 { 3847 struct sk_buff *skb; 3848 struct btusb_data *data = hci_get_drvdata(hdev); 3849 struct device *dev = &data->udev->dev; 3850 u16 pin, gap, opcode; 3851 int ret; 3852 u8 cmd[5]; 3853 3854 /* Move on if no wakeup pin specified */ 3855 if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) || 3856 of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap)) 3857 return 0; 3858 3859 /* Vendor specific command to configure a GPIO as wake-up pin */ 3860 opcode = hci_opcode_pack(0x3F, 0x59); 3861 cmd[0] = opcode & 0xFF; 3862 cmd[1] = opcode >> 8; 3863 cmd[2] = 2; /* length of parameters that follow */ 3864 cmd[3] = pin; 3865 cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */ 3866 3867 skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL); 3868 if (!skb) { 3869 bt_dev_err(hdev, "%s: No memory", __func__); 3870 return -ENOMEM; 3871 } 3872 3873 skb_put_data(skb, cmd, sizeof(cmd)); 3874 hci_skb_pkt_type(skb) = HCI_COMMAND_PKT; 3875 3876 ret = btusb_send_frame(hdev, skb); 3877 if (ret) { 3878 bt_dev_err(hdev, "%s: configuration failed", __func__); 3879 kfree_skb(skb); 3880 return ret; 3881 } 3882 3883 return 0; 3884 } 3885 #endif 3886 3887 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, 3888 const bdaddr_t *bdaddr) 3889 { 3890 struct sk_buff *skb; 3891 u8 buf[8]; 3892 long ret; 3893 3894 buf[0] = 0xfe; 3895 buf[1] = sizeof(bdaddr_t); 3896 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); 3897 3898 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); 3899 if (IS_ERR(skb)) { 3900 ret = PTR_ERR(skb); 3901 bt_dev_err(hdev, "changing Marvell device address failed (%ld)", 3902 ret); 3903 return ret; 3904 } 3905 kfree_skb(skb); 3906 3907 return 0; 3908 } 3909 3910 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, 3911 const bdaddr_t *bdaddr) 3912 { 3913 struct sk_buff *skb; 3914 u8 buf[10]; 3915 long ret; 3916 3917 buf[0] = 0x01; 3918 buf[1] = 0x01; 3919 buf[2] = 0x00; 3920 buf[3] = sizeof(bdaddr_t); 3921 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); 3922 3923 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); 3924 if (IS_ERR(skb)) { 3925 ret = PTR_ERR(skb); 3926 bt_dev_err(hdev, "Change address command failed (%ld)", ret); 3927 return ret; 3928 } 3929 kfree_skb(skb); 3930 3931 return 0; 3932 } 3933 3934 static int btusb_set_bdaddr_wcn6855(struct hci_dev *hdev, 3935 const bdaddr_t *bdaddr) 3936 { 3937 struct sk_buff *skb; 3938 u8 buf[6]; 3939 long ret; 3940 3941 memcpy(buf, bdaddr, sizeof(bdaddr_t)); 3942 3943 skb = __hci_cmd_sync_ev(hdev, 0xfc14, sizeof(buf), buf, 3944 HCI_EV_CMD_COMPLETE, HCI_INIT_TIMEOUT); 3945 if (IS_ERR(skb)) { 3946 ret = PTR_ERR(skb); 3947 bt_dev_err(hdev, "Change address command failed (%ld)", ret); 3948 return ret; 3949 } 3950 kfree_skb(skb); 3951 3952 return 0; 3953 } 3954 3955 #define QCA_DFU_PACKET_LEN 4096 3956 3957 #define QCA_GET_TARGET_VERSION 0x09 3958 #define QCA_CHECK_STATUS 0x05 3959 #define QCA_DFU_DOWNLOAD 0x01 3960 3961 #define QCA_SYSCFG_UPDATED 0x40 3962 #define QCA_PATCH_UPDATED 0x80 3963 #define QCA_DFU_TIMEOUT 3000 3964 #define QCA_FLAG_MULTI_NVM 0x80 3965 3966 struct qca_version { 3967 __le32 rom_version; 3968 __le32 patch_version; 3969 __le32 ram_version; 3970 __le16 board_id; 3971 __le16 flag; 3972 __u8 reserved[4]; 3973 } __packed; 3974 3975 struct qca_rampatch_version { 3976 __le16 rom_version_high; 3977 __le16 rom_version_low; 3978 __le16 patch_version; 3979 } __packed; 3980 3981 struct qca_device_info { 3982 u32 rom_version; 3983 u8 rampatch_hdr; /* length of header in rampatch */ 3984 u8 nvm_hdr; /* length of header in NVM */ 3985 u8 ver_offset; /* offset of version structure in rampatch */ 3986 }; 3987 3988 static const struct qca_device_info qca_devices_table[] = { 3989 { 0x00000100, 20, 4, 8 }, /* Rome 1.0 */ 3990 { 0x00000101, 20, 4, 8 }, /* Rome 1.1 */ 3991 { 0x00000200, 28, 4, 16 }, /* Rome 2.0 */ 3992 { 0x00000201, 28, 4, 16 }, /* Rome 2.1 */ 3993 { 0x00000300, 28, 4, 16 }, /* Rome 3.0 */ 3994 { 0x00000302, 28, 4, 16 }, /* Rome 3.2 */ 3995 { 0x00130100, 40, 4, 16 }, /* WCN6855 1.0 */ 3996 { 0x00130200, 40, 4, 16 }, /* WCN6855 2.0 */ 3997 }; 3998 3999 static int btusb_qca_send_vendor_req(struct usb_device *udev, u8 request, 4000 void *data, u16 size) 4001 { 4002 int pipe, err; 4003 u8 *buf; 4004 4005 buf = kmalloc(size, GFP_KERNEL); 4006 if (!buf) 4007 return -ENOMEM; 4008 4009 /* Found some of USB hosts have IOT issues with ours so that we should 4010 * not wait until HCI layer is ready. 4011 */ 4012 pipe = usb_rcvctrlpipe(udev, 0); 4013 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, 4014 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 4015 if (err < 0) { 4016 dev_err(&udev->dev, "Failed to access otp area (%d)", err); 4017 goto done; 4018 } 4019 4020 memcpy(data, buf, size); 4021 4022 done: 4023 kfree(buf); 4024 4025 return err; 4026 } 4027 4028 static int btusb_setup_qca_download_fw(struct hci_dev *hdev, 4029 const struct firmware *firmware, 4030 size_t hdr_size) 4031 { 4032 struct btusb_data *btdata = hci_get_drvdata(hdev); 4033 struct usb_device *udev = btdata->udev; 4034 size_t count, size, sent = 0; 4035 int pipe, len, err; 4036 u8 *buf; 4037 4038 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); 4039 if (!buf) 4040 return -ENOMEM; 4041 4042 count = firmware->size; 4043 4044 size = min_t(size_t, count, hdr_size); 4045 memcpy(buf, firmware->data, size); 4046 4047 /* USB patches should go down to controller through USB path 4048 * because binary format fits to go down through USB channel. 4049 * USB control path is for patching headers and USB bulk is for 4050 * patch body. 4051 */ 4052 pipe = usb_sndctrlpipe(udev, 0); 4053 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, 4054 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); 4055 if (err < 0) { 4056 bt_dev_err(hdev, "Failed to send headers (%d)", err); 4057 goto done; 4058 } 4059 4060 sent += size; 4061 count -= size; 4062 4063 while (count) { 4064 size = min_t(size_t, count, QCA_DFU_PACKET_LEN); 4065 4066 memcpy(buf, firmware->data + sent, size); 4067 4068 pipe = usb_sndbulkpipe(udev, 0x02); 4069 err = usb_bulk_msg(udev, pipe, buf, size, &len, 4070 QCA_DFU_TIMEOUT); 4071 if (err < 0) { 4072 bt_dev_err(hdev, "Failed to send body at %zd of %zd (%d)", 4073 sent, firmware->size, err); 4074 break; 4075 } 4076 4077 if (size != len) { 4078 bt_dev_err(hdev, "Failed to get bulk buffer"); 4079 err = -EILSEQ; 4080 break; 4081 } 4082 4083 sent += size; 4084 count -= size; 4085 } 4086 4087 done: 4088 kfree(buf); 4089 return err; 4090 } 4091 4092 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, 4093 struct qca_version *ver, 4094 const struct qca_device_info *info) 4095 { 4096 struct qca_rampatch_version *rver; 4097 const struct firmware *fw; 4098 u32 ver_rom, ver_patch, rver_rom; 4099 u16 rver_rom_low, rver_rom_high, rver_patch; 4100 char fwname[64]; 4101 int err; 4102 4103 ver_rom = le32_to_cpu(ver->rom_version); 4104 ver_patch = le32_to_cpu(ver->patch_version); 4105 4106 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); 4107 4108 err = request_firmware(&fw, fwname, &hdev->dev); 4109 if (err) { 4110 bt_dev_err(hdev, "failed to request rampatch file: %s (%d)", 4111 fwname, err); 4112 return err; 4113 } 4114 4115 bt_dev_info(hdev, "using rampatch file: %s", fwname); 4116 4117 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); 4118 rver_rom_low = le16_to_cpu(rver->rom_version_low); 4119 rver_patch = le16_to_cpu(rver->patch_version); 4120 4121 if (ver_rom & ~0xffffU) { 4122 rver_rom_high = le16_to_cpu(rver->rom_version_high); 4123 rver_rom = le32_to_cpu(rver_rom_high << 16 | rver_rom_low); 4124 } else { 4125 rver_rom = rver_rom_low; 4126 } 4127 4128 bt_dev_info(hdev, "QCA: patch rome 0x%x build 0x%x, " 4129 "firmware rome 0x%x build 0x%x", 4130 rver_rom, rver_patch, ver_rom, ver_patch); 4131 4132 if (rver_rom != ver_rom || rver_patch <= ver_patch) { 4133 bt_dev_err(hdev, "rampatch file version did not match with firmware"); 4134 err = -EINVAL; 4135 goto done; 4136 } 4137 4138 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); 4139 4140 done: 4141 release_firmware(fw); 4142 4143 return err; 4144 } 4145 4146 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, 4147 struct qca_version *ver, 4148 const struct qca_device_info *info) 4149 { 4150 const struct firmware *fw; 4151 char fwname[64]; 4152 int err; 4153 4154 if (((ver->flag >> 8) & 0xff) == QCA_FLAG_MULTI_NVM) { 4155 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x_%04x.bin", 4156 le32_to_cpu(ver->rom_version), 4157 le16_to_cpu(ver->board_id)); 4158 } else { 4159 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", 4160 le32_to_cpu(ver->rom_version)); 4161 } 4162 4163 err = request_firmware(&fw, fwname, &hdev->dev); 4164 if (err) { 4165 bt_dev_err(hdev, "failed to request NVM file: %s (%d)", 4166 fwname, err); 4167 return err; 4168 } 4169 4170 bt_dev_info(hdev, "using NVM file: %s", fwname); 4171 4172 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); 4173 4174 release_firmware(fw); 4175 4176 return err; 4177 } 4178 4179 /* identify the ROM version and check whether patches are needed */ 4180 static bool btusb_qca_need_patch(struct usb_device *udev) 4181 { 4182 struct qca_version ver; 4183 4184 if (btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver, 4185 sizeof(ver)) < 0) 4186 return false; 4187 /* only low ROM versions need patches */ 4188 return !(le32_to_cpu(ver.rom_version) & ~0xffffU); 4189 } 4190 4191 static int btusb_setup_qca(struct hci_dev *hdev) 4192 { 4193 struct btusb_data *btdata = hci_get_drvdata(hdev); 4194 struct usb_device *udev = btdata->udev; 4195 const struct qca_device_info *info = NULL; 4196 struct qca_version ver; 4197 u32 ver_rom; 4198 u8 status; 4199 int i, err; 4200 4201 err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver, 4202 sizeof(ver)); 4203 if (err < 0) 4204 return err; 4205 4206 ver_rom = le32_to_cpu(ver.rom_version); 4207 4208 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { 4209 if (ver_rom == qca_devices_table[i].rom_version) 4210 info = &qca_devices_table[i]; 4211 } 4212 if (!info) { 4213 /* If the rom_version is not matched in the qca_devices_table 4214 * and the high ROM version is not zero, we assume this chip no 4215 * need to load the rampatch and nvm. 4216 */ 4217 if (ver_rom & ~0xffffU) 4218 return 0; 4219 4220 bt_dev_err(hdev, "don't support firmware rome 0x%x", ver_rom); 4221 return -ENODEV; 4222 } 4223 4224 err = btusb_qca_send_vendor_req(udev, QCA_CHECK_STATUS, &status, 4225 sizeof(status)); 4226 if (err < 0) 4227 return err; 4228 4229 if (!(status & QCA_PATCH_UPDATED)) { 4230 err = btusb_setup_qca_load_rampatch(hdev, &ver, info); 4231 if (err < 0) 4232 return err; 4233 } 4234 4235 err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver, 4236 sizeof(ver)); 4237 if (err < 0) 4238 return err; 4239 4240 if (!(status & QCA_SYSCFG_UPDATED)) { 4241 err = btusb_setup_qca_load_nvm(hdev, &ver, info); 4242 if (err < 0) 4243 return err; 4244 } 4245 4246 return 0; 4247 } 4248 4249 static inline int __set_diag_interface(struct hci_dev *hdev) 4250 { 4251 struct btusb_data *data = hci_get_drvdata(hdev); 4252 struct usb_interface *intf = data->diag; 4253 int i; 4254 4255 if (!data->diag) 4256 return -ENODEV; 4257 4258 data->diag_tx_ep = NULL; 4259 data->diag_rx_ep = NULL; 4260 4261 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 4262 struct usb_endpoint_descriptor *ep_desc; 4263 4264 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 4265 4266 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 4267 data->diag_tx_ep = ep_desc; 4268 continue; 4269 } 4270 4271 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 4272 data->diag_rx_ep = ep_desc; 4273 continue; 4274 } 4275 } 4276 4277 if (!data->diag_tx_ep || !data->diag_rx_ep) { 4278 bt_dev_err(hdev, "invalid diagnostic descriptors"); 4279 return -ENODEV; 4280 } 4281 4282 return 0; 4283 } 4284 4285 static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) 4286 { 4287 struct btusb_data *data = hci_get_drvdata(hdev); 4288 struct sk_buff *skb; 4289 struct urb *urb; 4290 unsigned int pipe; 4291 4292 if (!data->diag_tx_ep) 4293 return ERR_PTR(-ENODEV); 4294 4295 urb = usb_alloc_urb(0, GFP_KERNEL); 4296 if (!urb) 4297 return ERR_PTR(-ENOMEM); 4298 4299 skb = bt_skb_alloc(2, GFP_KERNEL); 4300 if (!skb) { 4301 usb_free_urb(urb); 4302 return ERR_PTR(-ENOMEM); 4303 } 4304 4305 skb_put_u8(skb, 0xf0); 4306 skb_put_u8(skb, enable); 4307 4308 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); 4309 4310 usb_fill_bulk_urb(urb, data->udev, pipe, 4311 skb->data, skb->len, btusb_tx_complete, skb); 4312 4313 skb->dev = (void *)hdev; 4314 4315 return urb; 4316 } 4317 4318 static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) 4319 { 4320 struct btusb_data *data = hci_get_drvdata(hdev); 4321 struct urb *urb; 4322 4323 if (!data->diag) 4324 return -ENODEV; 4325 4326 if (!test_bit(HCI_RUNNING, &hdev->flags)) 4327 return -ENETDOWN; 4328 4329 urb = alloc_diag_urb(hdev, enable); 4330 if (IS_ERR(urb)) 4331 return PTR_ERR(urb); 4332 4333 return submit_or_queue_tx_urb(hdev, urb); 4334 } 4335 4336 #ifdef CONFIG_PM 4337 static irqreturn_t btusb_oob_wake_handler(int irq, void *priv) 4338 { 4339 struct btusb_data *data = priv; 4340 4341 pm_wakeup_event(&data->udev->dev, 0); 4342 pm_system_wakeup(); 4343 4344 /* Disable only if not already disabled (keep it balanced) */ 4345 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 4346 disable_irq_nosync(irq); 4347 disable_irq_wake(irq); 4348 } 4349 return IRQ_HANDLED; 4350 } 4351 4352 static const struct of_device_id btusb_match_table[] = { 4353 { .compatible = "usb1286,204e" }, 4354 { .compatible = "usbcf3,e300" }, /* QCA6174A */ 4355 { .compatible = "usb4ca,301a" }, /* QCA6174A (Lite-On) */ 4356 { } 4357 }; 4358 MODULE_DEVICE_TABLE(of, btusb_match_table); 4359 4360 /* Use an oob wakeup pin? */ 4361 static int btusb_config_oob_wake(struct hci_dev *hdev) 4362 { 4363 struct btusb_data *data = hci_get_drvdata(hdev); 4364 struct device *dev = &data->udev->dev; 4365 int irq, ret; 4366 4367 clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 4368 4369 if (!of_match_device(btusb_match_table, dev)) 4370 return 0; 4371 4372 /* Move on if no IRQ specified */ 4373 irq = of_irq_get_byname(dev->of_node, "wakeup"); 4374 if (irq <= 0) { 4375 bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__); 4376 return 0; 4377 } 4378 4379 irq_set_status_flags(irq, IRQ_NOAUTOEN); 4380 ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler, 4381 0, "OOB Wake-on-BT", data); 4382 if (ret) { 4383 bt_dev_err(hdev, "%s: IRQ request failed", __func__); 4384 return ret; 4385 } 4386 4387 ret = device_init_wakeup(dev, true); 4388 if (ret) { 4389 bt_dev_err(hdev, "%s: failed to init_wakeup", __func__); 4390 return ret; 4391 } 4392 4393 data->oob_wake_irq = irq; 4394 bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq); 4395 return 0; 4396 } 4397 #endif 4398 4399 static void btusb_check_needs_reset_resume(struct usb_interface *intf) 4400 { 4401 if (dmi_check_system(btusb_needs_reset_resume_table)) 4402 interface_to_usbdev(intf)->quirks |= USB_QUIRK_RESET_RESUME; 4403 } 4404 4405 static bool btusb_prevent_wake(struct hci_dev *hdev) 4406 { 4407 struct btusb_data *data = hci_get_drvdata(hdev); 4408 4409 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) 4410 return true; 4411 4412 return !device_may_wakeup(&data->udev->dev); 4413 } 4414 4415 static int btusb_shutdown_qca(struct hci_dev *hdev) 4416 { 4417 struct sk_buff *skb; 4418 4419 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); 4420 if (IS_ERR(skb)) { 4421 bt_dev_err(hdev, "HCI reset during shutdown failed"); 4422 return PTR_ERR(skb); 4423 } 4424 kfree_skb(skb); 4425 4426 return 0; 4427 } 4428 4429 static int btusb_probe(struct usb_interface *intf, 4430 const struct usb_device_id *id) 4431 { 4432 struct usb_endpoint_descriptor *ep_desc; 4433 struct gpio_desc *reset_gpio; 4434 struct btusb_data *data; 4435 struct hci_dev *hdev; 4436 unsigned ifnum_base; 4437 int i, err; 4438 4439 BT_DBG("intf %p id %p", intf, id); 4440 4441 /* interface numbers are hardcoded in the spec */ 4442 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { 4443 if (!(id->driver_info & BTUSB_IFNUM_2)) 4444 return -ENODEV; 4445 if (intf->cur_altsetting->desc.bInterfaceNumber != 2) 4446 return -ENODEV; 4447 } 4448 4449 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; 4450 4451 if (!id->driver_info) { 4452 const struct usb_device_id *match; 4453 4454 match = usb_match_id(intf, blacklist_table); 4455 if (match) 4456 id = match; 4457 } 4458 4459 if (id->driver_info == BTUSB_IGNORE) 4460 return -ENODEV; 4461 4462 if (id->driver_info & BTUSB_ATH3012) { 4463 struct usb_device *udev = interface_to_usbdev(intf); 4464 4465 /* Old firmware would otherwise let ath3k driver load 4466 * patch and sysconfig files 4467 */ 4468 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001 && 4469 !btusb_qca_need_patch(udev)) 4470 return -ENODEV; 4471 } 4472 4473 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); 4474 if (!data) 4475 return -ENOMEM; 4476 4477 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { 4478 ep_desc = &intf->cur_altsetting->endpoint[i].desc; 4479 4480 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { 4481 data->intr_ep = ep_desc; 4482 continue; 4483 } 4484 4485 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { 4486 data->bulk_tx_ep = ep_desc; 4487 continue; 4488 } 4489 4490 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { 4491 data->bulk_rx_ep = ep_desc; 4492 continue; 4493 } 4494 } 4495 4496 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) 4497 return -ENODEV; 4498 4499 if (id->driver_info & BTUSB_AMP) { 4500 data->cmdreq_type = USB_TYPE_CLASS | 0x01; 4501 data->cmdreq = 0x2b; 4502 } else { 4503 data->cmdreq_type = USB_TYPE_CLASS; 4504 data->cmdreq = 0x00; 4505 } 4506 4507 data->udev = interface_to_usbdev(intf); 4508 data->intf = intf; 4509 4510 INIT_WORK(&data->work, btusb_work); 4511 INIT_WORK(&data->waker, btusb_waker); 4512 init_usb_anchor(&data->deferred); 4513 init_usb_anchor(&data->tx_anchor); 4514 spin_lock_init(&data->txlock); 4515 4516 init_usb_anchor(&data->intr_anchor); 4517 init_usb_anchor(&data->bulk_anchor); 4518 init_usb_anchor(&data->isoc_anchor); 4519 init_usb_anchor(&data->diag_anchor); 4520 init_usb_anchor(&data->ctrl_anchor); 4521 spin_lock_init(&data->rxlock); 4522 4523 if (id->driver_info & BTUSB_INTEL_NEW) { 4524 data->recv_event = btusb_recv_event_intel; 4525 data->recv_bulk = btusb_recv_bulk_intel; 4526 set_bit(BTUSB_BOOTLOADER, &data->flags); 4527 } else { 4528 data->recv_event = hci_recv_frame; 4529 data->recv_bulk = btusb_recv_bulk; 4530 } 4531 4532 hdev = hci_alloc_dev(); 4533 if (!hdev) 4534 return -ENOMEM; 4535 4536 hdev->bus = HCI_USB; 4537 hci_set_drvdata(hdev, data); 4538 4539 if (id->driver_info & BTUSB_AMP) 4540 hdev->dev_type = HCI_AMP; 4541 else 4542 hdev->dev_type = HCI_PRIMARY; 4543 4544 data->hdev = hdev; 4545 4546 SET_HCIDEV_DEV(hdev, &intf->dev); 4547 4548 reset_gpio = gpiod_get_optional(&data->udev->dev, "reset", 4549 GPIOD_OUT_LOW); 4550 if (IS_ERR(reset_gpio)) { 4551 err = PTR_ERR(reset_gpio); 4552 goto out_free_dev; 4553 } else if (reset_gpio) { 4554 data->reset_gpio = reset_gpio; 4555 } 4556 4557 hdev->open = btusb_open; 4558 hdev->close = btusb_close; 4559 hdev->flush = btusb_flush; 4560 hdev->send = btusb_send_frame; 4561 hdev->notify = btusb_notify; 4562 hdev->prevent_wake = btusb_prevent_wake; 4563 4564 #ifdef CONFIG_PM 4565 err = btusb_config_oob_wake(hdev); 4566 if (err) 4567 goto out_free_dev; 4568 4569 /* Marvell devices may need a specific chip configuration */ 4570 if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) { 4571 err = marvell_config_oob_wake(hdev); 4572 if (err) 4573 goto out_free_dev; 4574 } 4575 #endif 4576 if (id->driver_info & BTUSB_CW6622) 4577 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 4578 4579 if (id->driver_info & BTUSB_BCM2045) 4580 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); 4581 4582 if (id->driver_info & BTUSB_BCM92035) 4583 hdev->setup = btusb_setup_bcm92035; 4584 4585 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) && 4586 (id->driver_info & BTUSB_BCM_PATCHRAM)) { 4587 hdev->manufacturer = 15; 4588 hdev->setup = btbcm_setup_patchram; 4589 hdev->set_diag = btusb_bcm_set_diag; 4590 hdev->set_bdaddr = btbcm_set_bdaddr; 4591 4592 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 4593 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 4594 } 4595 4596 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) && 4597 (id->driver_info & BTUSB_BCM_APPLE)) { 4598 hdev->manufacturer = 15; 4599 hdev->setup = btbcm_setup_apple; 4600 hdev->set_diag = btusb_bcm_set_diag; 4601 4602 /* Broadcom LM_DIAG Interface numbers are hardcoded */ 4603 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); 4604 } 4605 4606 if (id->driver_info & BTUSB_INTEL) { 4607 hdev->manufacturer = 2; 4608 hdev->setup = btusb_setup_intel; 4609 hdev->shutdown = btusb_shutdown_intel; 4610 hdev->set_diag = btintel_set_diag_mfg; 4611 hdev->set_bdaddr = btintel_set_bdaddr; 4612 hdev->cmd_timeout = btusb_intel_cmd_timeout; 4613 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 4614 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4615 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 4616 } 4617 4618 if (id->driver_info & BTUSB_INTEL_NEW) { 4619 hdev->manufacturer = 2; 4620 hdev->send = btusb_send_frame_intel; 4621 hdev->setup = btusb_setup_intel_new; 4622 hdev->shutdown = btusb_shutdown_intel_new; 4623 hdev->hw_error = btintel_hw_error; 4624 hdev->set_diag = btintel_set_diag; 4625 hdev->set_bdaddr = btintel_set_bdaddr; 4626 hdev->cmd_timeout = btusb_intel_cmd_timeout; 4627 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 4628 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4629 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 4630 } 4631 4632 if (id->driver_info & BTUSB_INTEL_NEWGEN) { 4633 hdev->manufacturer = 2; 4634 hdev->send = btusb_send_frame_intel; 4635 hdev->setup = btusb_setup_intel_newgen; 4636 hdev->shutdown = btusb_shutdown_intel_new; 4637 hdev->hw_error = btintel_hw_error; 4638 hdev->set_diag = btintel_set_diag; 4639 hdev->set_bdaddr = btintel_set_bdaddr; 4640 hdev->cmd_timeout = btusb_intel_cmd_timeout; 4641 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 4642 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4643 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); 4644 4645 data->recv_event = btusb_recv_event_intel; 4646 data->recv_bulk = btusb_recv_bulk_intel; 4647 set_bit(BTUSB_BOOTLOADER, &data->flags); 4648 } 4649 4650 if (id->driver_info & BTUSB_MARVELL) 4651 hdev->set_bdaddr = btusb_set_bdaddr_marvell; 4652 4653 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_MTK) && 4654 (id->driver_info & BTUSB_MEDIATEK)) { 4655 hdev->setup = btusb_mtk_setup; 4656 hdev->shutdown = btusb_mtk_shutdown; 4657 hdev->manufacturer = 70; 4658 set_bit(HCI_QUIRK_NON_PERSISTENT_SETUP, &hdev->quirks); 4659 } 4660 4661 if (id->driver_info & BTUSB_SWAVE) { 4662 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); 4663 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); 4664 } 4665 4666 if (id->driver_info & BTUSB_INTEL_BOOT) { 4667 hdev->manufacturer = 2; 4668 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 4669 } 4670 4671 if (id->driver_info & BTUSB_ATH3012) { 4672 data->setup_on_usb = btusb_setup_qca; 4673 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 4674 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4675 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); 4676 } 4677 4678 if (id->driver_info & BTUSB_QCA_ROME) { 4679 data->setup_on_usb = btusb_setup_qca; 4680 hdev->set_bdaddr = btusb_set_bdaddr_ath3012; 4681 hdev->cmd_timeout = btusb_qca_cmd_timeout; 4682 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4683 btusb_check_needs_reset_resume(intf); 4684 } 4685 4686 if (id->driver_info & BTUSB_QCA_WCN6855) { 4687 data->setup_on_usb = btusb_setup_qca; 4688 hdev->shutdown = btusb_shutdown_qca; 4689 hdev->set_bdaddr = btusb_set_bdaddr_wcn6855; 4690 hdev->cmd_timeout = btusb_qca_cmd_timeout; 4691 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4692 } 4693 4694 if (id->driver_info & BTUSB_AMP) { 4695 /* AMP controllers do not support SCO packets */ 4696 data->isoc = NULL; 4697 } else { 4698 /* Interface orders are hardcoded in the specification */ 4699 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); 4700 data->isoc_ifnum = ifnum_base + 1; 4701 } 4702 4703 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_RTL) && 4704 (id->driver_info & BTUSB_REALTEK)) { 4705 hdev->setup = btrtl_setup_realtek; 4706 hdev->shutdown = btrtl_shutdown_realtek; 4707 hdev->cmd_timeout = btusb_rtl_cmd_timeout; 4708 4709 /* Realtek devices lose their updated firmware over global 4710 * suspend that means host doesn't send SET_FEATURE 4711 * (DEVICE_REMOTE_WAKEUP) 4712 */ 4713 set_bit(BTUSB_WAKEUP_DISABLE, &data->flags); 4714 } 4715 4716 if (!reset) 4717 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 4718 4719 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { 4720 if (!disable_scofix) 4721 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); 4722 } 4723 4724 if (id->driver_info & BTUSB_BROKEN_ISOC) 4725 data->isoc = NULL; 4726 4727 if (id->driver_info & BTUSB_WIDEBAND_SPEECH) 4728 set_bit(HCI_QUIRK_WIDEBAND_SPEECH_SUPPORTED, &hdev->quirks); 4729 4730 if (id->driver_info & BTUSB_VALID_LE_STATES) 4731 set_bit(HCI_QUIRK_VALID_LE_STATES, &hdev->quirks); 4732 4733 if (id->driver_info & BTUSB_DIGIANSWER) { 4734 data->cmdreq_type = USB_TYPE_VENDOR; 4735 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 4736 } 4737 4738 if (id->driver_info & BTUSB_CSR) { 4739 struct usb_device *udev = data->udev; 4740 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); 4741 4742 /* Old firmware would otherwise execute USB reset */ 4743 if (bcdDevice < 0x117) 4744 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); 4745 4746 /* This must be set first in case we disable it for fakes */ 4747 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); 4748 4749 /* Fake CSR devices with broken commands */ 4750 if (le16_to_cpu(udev->descriptor.idVendor) == 0x0a12 && 4751 le16_to_cpu(udev->descriptor.idProduct) == 0x0001) 4752 hdev->setup = btusb_setup_csr; 4753 } 4754 4755 if (id->driver_info & BTUSB_SNIFFER) { 4756 struct usb_device *udev = data->udev; 4757 4758 /* New sniffer firmware has crippled HCI interface */ 4759 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) 4760 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); 4761 } 4762 4763 if (id->driver_info & BTUSB_INTEL_BOOT) { 4764 /* A bug in the bootloader causes that interrupt interface is 4765 * only enabled after receiving SetInterface(0, AltSetting=0). 4766 */ 4767 err = usb_set_interface(data->udev, 0, 0); 4768 if (err < 0) { 4769 BT_ERR("failed to set interface 0, alt 0 %d", err); 4770 goto out_free_dev; 4771 } 4772 } 4773 4774 if (data->isoc) { 4775 err = usb_driver_claim_interface(&btusb_driver, 4776 data->isoc, data); 4777 if (err < 0) 4778 goto out_free_dev; 4779 } 4780 4781 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) && data->diag) { 4782 if (!usb_driver_claim_interface(&btusb_driver, 4783 data->diag, data)) 4784 __set_diag_interface(hdev); 4785 else 4786 data->diag = NULL; 4787 } 4788 4789 if (enable_autosuspend) 4790 usb_enable_autosuspend(data->udev); 4791 4792 err = hci_register_dev(hdev); 4793 if (err < 0) 4794 goto out_free_dev; 4795 4796 usb_set_intfdata(intf, data); 4797 4798 return 0; 4799 4800 out_free_dev: 4801 if (data->reset_gpio) 4802 gpiod_put(data->reset_gpio); 4803 hci_free_dev(hdev); 4804 return err; 4805 } 4806 4807 static void btusb_disconnect(struct usb_interface *intf) 4808 { 4809 struct btusb_data *data = usb_get_intfdata(intf); 4810 struct hci_dev *hdev; 4811 4812 BT_DBG("intf %p", intf); 4813 4814 if (!data) 4815 return; 4816 4817 hdev = data->hdev; 4818 usb_set_intfdata(data->intf, NULL); 4819 4820 if (data->isoc) 4821 usb_set_intfdata(data->isoc, NULL); 4822 4823 if (data->diag) 4824 usb_set_intfdata(data->diag, NULL); 4825 4826 hci_unregister_dev(hdev); 4827 4828 if (intf == data->intf) { 4829 if (data->isoc) 4830 usb_driver_release_interface(&btusb_driver, data->isoc); 4831 if (data->diag) 4832 usb_driver_release_interface(&btusb_driver, data->diag); 4833 } else if (intf == data->isoc) { 4834 if (data->diag) 4835 usb_driver_release_interface(&btusb_driver, data->diag); 4836 usb_driver_release_interface(&btusb_driver, data->intf); 4837 } else if (intf == data->diag) { 4838 usb_driver_release_interface(&btusb_driver, data->intf); 4839 if (data->isoc) 4840 usb_driver_release_interface(&btusb_driver, data->isoc); 4841 } 4842 4843 if (data->oob_wake_irq) 4844 device_init_wakeup(&data->udev->dev, false); 4845 4846 if (data->reset_gpio) 4847 gpiod_put(data->reset_gpio); 4848 4849 hci_free_dev(hdev); 4850 } 4851 4852 #ifdef CONFIG_PM 4853 static int btusb_suspend(struct usb_interface *intf, pm_message_t message) 4854 { 4855 struct btusb_data *data = usb_get_intfdata(intf); 4856 4857 BT_DBG("intf %p", intf); 4858 4859 if (data->suspend_count++) 4860 return 0; 4861 4862 spin_lock_irq(&data->txlock); 4863 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { 4864 set_bit(BTUSB_SUSPENDING, &data->flags); 4865 spin_unlock_irq(&data->txlock); 4866 } else { 4867 spin_unlock_irq(&data->txlock); 4868 data->suspend_count--; 4869 return -EBUSY; 4870 } 4871 4872 cancel_work_sync(&data->work); 4873 4874 btusb_stop_traffic(data); 4875 usb_kill_anchored_urbs(&data->tx_anchor); 4876 4877 if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) { 4878 set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); 4879 enable_irq_wake(data->oob_wake_irq); 4880 enable_irq(data->oob_wake_irq); 4881 } 4882 4883 /* For global suspend, Realtek devices lose the loaded fw 4884 * in them. But for autosuspend, firmware should remain. 4885 * Actually, it depends on whether the usb host sends 4886 * set feature (enable wakeup) or not. 4887 */ 4888 if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) { 4889 if (PMSG_IS_AUTO(message) && 4890 device_can_wakeup(&data->udev->dev)) 4891 data->udev->do_remote_wakeup = 1; 4892 else if (!PMSG_IS_AUTO(message)) 4893 data->udev->reset_resume = 1; 4894 } 4895 4896 return 0; 4897 } 4898 4899 static void play_deferred(struct btusb_data *data) 4900 { 4901 struct urb *urb; 4902 int err; 4903 4904 while ((urb = usb_get_from_anchor(&data->deferred))) { 4905 usb_anchor_urb(urb, &data->tx_anchor); 4906 4907 err = usb_submit_urb(urb, GFP_ATOMIC); 4908 if (err < 0) { 4909 if (err != -EPERM && err != -ENODEV) 4910 BT_ERR("%s urb %p submission failed (%d)", 4911 data->hdev->name, urb, -err); 4912 kfree(urb->setup_packet); 4913 usb_unanchor_urb(urb); 4914 usb_free_urb(urb); 4915 break; 4916 } 4917 4918 data->tx_in_flight++; 4919 usb_free_urb(urb); 4920 } 4921 4922 /* Cleanup the rest deferred urbs. */ 4923 while ((urb = usb_get_from_anchor(&data->deferred))) { 4924 kfree(urb->setup_packet); 4925 usb_free_urb(urb); 4926 } 4927 } 4928 4929 static int btusb_resume(struct usb_interface *intf) 4930 { 4931 struct btusb_data *data = usb_get_intfdata(intf); 4932 struct hci_dev *hdev = data->hdev; 4933 int err = 0; 4934 4935 BT_DBG("intf %p", intf); 4936 4937 if (--data->suspend_count) 4938 return 0; 4939 4940 /* Disable only if not already disabled (keep it balanced) */ 4941 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { 4942 disable_irq(data->oob_wake_irq); 4943 disable_irq_wake(data->oob_wake_irq); 4944 } 4945 4946 if (!test_bit(HCI_RUNNING, &hdev->flags)) 4947 goto done; 4948 4949 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { 4950 err = btusb_submit_intr_urb(hdev, GFP_NOIO); 4951 if (err < 0) { 4952 clear_bit(BTUSB_INTR_RUNNING, &data->flags); 4953 goto failed; 4954 } 4955 } 4956 4957 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { 4958 err = btusb_submit_bulk_urb(hdev, GFP_NOIO); 4959 if (err < 0) { 4960 clear_bit(BTUSB_BULK_RUNNING, &data->flags); 4961 goto failed; 4962 } 4963 4964 btusb_submit_bulk_urb(hdev, GFP_NOIO); 4965 } 4966 4967 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { 4968 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) 4969 clear_bit(BTUSB_ISOC_RUNNING, &data->flags); 4970 else 4971 btusb_submit_isoc_urb(hdev, GFP_NOIO); 4972 } 4973 4974 spin_lock_irq(&data->txlock); 4975 play_deferred(data); 4976 clear_bit(BTUSB_SUSPENDING, &data->flags); 4977 spin_unlock_irq(&data->txlock); 4978 schedule_work(&data->work); 4979 4980 return 0; 4981 4982 failed: 4983 usb_scuttle_anchored_urbs(&data->deferred); 4984 done: 4985 spin_lock_irq(&data->txlock); 4986 clear_bit(BTUSB_SUSPENDING, &data->flags); 4987 spin_unlock_irq(&data->txlock); 4988 4989 return err; 4990 } 4991 #endif 4992 4993 static struct usb_driver btusb_driver = { 4994 .name = "btusb", 4995 .probe = btusb_probe, 4996 .disconnect = btusb_disconnect, 4997 #ifdef CONFIG_PM 4998 .suspend = btusb_suspend, 4999 .resume = btusb_resume, 5000 #endif 5001 .id_table = btusb_table, 5002 .supports_autosuspend = 1, 5003 .disable_hub_initiated_lpm = 1, 5004 }; 5005 5006 module_usb_driver(btusb_driver); 5007 5008 module_param(disable_scofix, bool, 0644); 5009 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); 5010 5011 module_param(force_scofix, bool, 0644); 5012 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); 5013 5014 module_param(enable_autosuspend, bool, 0644); 5015 MODULE_PARM_DESC(enable_autosuspend, "Enable USB autosuspend by default"); 5016 5017 module_param(reset, bool, 0644); 5018 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); 5019 5020 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); 5021 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); 5022 MODULE_VERSION(VERSION); 5023 MODULE_LICENSE("GPL"); 5024