]>
Commit | Line | Data |
---|---|---|
5e23b923 MH |
1 | /* |
2 | * | |
3 | * Generic Bluetooth USB driver | |
4 | * | |
9bfa35fe | 5 | * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org> |
5e23b923 MH |
6 | * |
7 | * | |
8 | * This program is free software; you can redistribute it and/or modify | |
9 | * it under the terms of the GNU General Public License as published by | |
10 | * the Free Software Foundation; either version 2 of the License, or | |
11 | * (at your option) any later version. | |
12 | * | |
13 | * This program is distributed in the hope that it will be useful, | |
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 | * GNU General Public License for more details. | |
17 | * | |
18 | * You should have received a copy of the GNU General Public License | |
19 | * along with this program; if not, write to the Free Software | |
20 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
21 | * | |
22 | */ | |
23 | ||
5e23b923 | 24 | #include <linux/module.h> |
5e23b923 | 25 | #include <linux/usb.h> |
dffd30ee | 26 | #include <linux/firmware.h> |
fd913ef7 RJ |
27 | #include <linux/of_device.h> |
28 | #include <linux/of_irq.h> | |
017789f3 | 29 | #include <linux/suspend.h> |
a2698a9b | 30 | #include <asm/unaligned.h> |
5e23b923 MH |
31 | |
32 | #include <net/bluetooth/bluetooth.h> | |
33 | #include <net/bluetooth/hci_core.h> | |
34 | ||
4185a0f5 | 35 | #include "btintel.h" |
1df1f591 | 36 | #include "btbcm.h" |
db33c77d | 37 | #include "btrtl.h" |
1df1f591 | 38 | |
34dced9b | 39 | #define VERSION "0.8" |
cfeb4145 | 40 | |
90ab5ee9 RR |
41 | static bool disable_scofix; |
42 | static bool force_scofix; | |
7a9d4020 | 43 | |
917a3337 | 44 | static bool reset = true; |
cfeb4145 MH |
45 | |
46 | static struct usb_driver btusb_driver; | |
47 | ||
48 | #define BTUSB_IGNORE 0x01 | |
7a9d4020 MH |
49 | #define BTUSB_DIGIANSWER 0x02 |
50 | #define BTUSB_CSR 0x04 | |
51 | #define BTUSB_SNIFFER 0x08 | |
52 | #define BTUSB_BCM92035 0x10 | |
53 | #define BTUSB_BROKEN_ISOC 0x20 | |
54 | #define BTUSB_WRONG_SCO_MTU 0x40 | |
2d25f8b4 | 55 | #define BTUSB_ATH3012 0x80 |
dffd30ee | 56 | #define BTUSB_INTEL 0x100 |
40df783d MH |
57 | #define BTUSB_INTEL_BOOT 0x200 |
58 | #define BTUSB_BCM_PATCHRAM 0x400 | |
ae8df494 | 59 | #define BTUSB_MARVELL 0x800 |
4fcef8ed | 60 | #define BTUSB_SWAVE 0x1000 |
cda0dd78 | 61 | #define BTUSB_INTEL_NEW 0x2000 |
893ba544 | 62 | #define BTUSB_AMP 0x4000 |
3267c884 | 63 | #define BTUSB_QCA_ROME 0x8000 |
17b2772b | 64 | #define BTUSB_BCM_APPLE 0x10000 |
a2698a9b | 65 | #define BTUSB_REALTEK 0x20000 |
6c9d435d | 66 | #define BTUSB_BCM2045 0x40000 |
22f8e9db | 67 | #define BTUSB_IFNUM_2 0x80000 |
418678b0 | 68 | #define BTUSB_CW6622 0x100000 |
5e23b923 | 69 | |
54265202 | 70 | static const struct usb_device_id btusb_table[] = { |
5e23b923 MH |
71 | /* Generic Bluetooth USB device */ |
72 | { USB_DEVICE_INFO(0xe0, 0x01, 0x01) }, | |
73 | ||
893ba544 MH |
74 | /* Generic Bluetooth AMP device */ |
75 | { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP }, | |
76 | ||
d63b2826 DD |
77 | /* Generic Bluetooth USB interface */ |
78 | { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) }, | |
79 | ||
1fa6535f | 80 | /* Apple-specific (Broadcom) devices */ |
17b2772b | 81 | { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01), |
22f8e9db | 82 | .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 }, |
1fa6535f | 83 | |
178c059e CYC |
84 | /* MediaTek MT76x0E */ |
85 | { USB_DEVICE(0x0e8d, 0x763f) }, | |
86 | ||
c510eae3 | 87 | /* Broadcom SoftSailing reporting vendor specific */ |
2e8b5063 | 88 | { USB_DEVICE(0x0a5c, 0x21e1) }, |
c510eae3 | 89 | |
3cd01976 NI |
90 | /* Apple MacBookPro 7,1 */ |
91 | { USB_DEVICE(0x05ac, 0x8213) }, | |
92 | ||
0a79f674 CL |
93 | /* Apple iMac11,1 */ |
94 | { USB_DEVICE(0x05ac, 0x8215) }, | |
95 | ||
9c047157 NI |
96 | /* Apple MacBookPro6,2 */ |
97 | { USB_DEVICE(0x05ac, 0x8218) }, | |
98 | ||
3e3ede7d EH |
99 | /* Apple MacBookAir3,1, MacBookAir3,2 */ |
100 | { USB_DEVICE(0x05ac, 0x821b) }, | |
101 | ||
a63b723d PAVM |
102 | /* Apple MacBookAir4,1 */ |
103 | { USB_DEVICE(0x05ac, 0x821f) }, | |
104 | ||
88d377b6 MAP |
105 | /* Apple MacBookPro8,2 */ |
106 | { USB_DEVICE(0x05ac, 0x821a) }, | |
107 | ||
f78b6826 JK |
108 | /* Apple MacMini5,1 */ |
109 | { USB_DEVICE(0x05ac, 0x8281) }, | |
110 | ||
cfeb4145 | 111 | /* AVM BlueFRITZ! USB v2.0 */ |
4fcef8ed | 112 | { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE }, |
cfeb4145 MH |
113 | |
114 | /* Bluetooth Ultraport Module from IBM */ | |
115 | { USB_DEVICE(0x04bf, 0x030a) }, | |
116 | ||
117 | /* ALPS Modules with non-standard id */ | |
118 | { USB_DEVICE(0x044e, 0x3001) }, | |
119 | { USB_DEVICE(0x044e, 0x3002) }, | |
120 | ||
121 | /* Ericsson with non-standard id */ | |
122 | { USB_DEVICE(0x0bdb, 0x1002) }, | |
123 | ||
124 | /* Canyon CN-BTU1 with HID interfaces */ | |
7a9d4020 | 125 | { USB_DEVICE(0x0c10, 0x0000) }, |
cfeb4145 | 126 | |
d13431ca WJS |
127 | /* Broadcom BCM20702A0 */ |
128 | { USB_DEVICE(0x413c, 0x8197) }, | |
129 | ||
d049f4e5 MH |
130 | /* Broadcom BCM20702B0 (Dynex/Insignia) */ |
131 | { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM }, | |
132 | ||
2faf71ce | 133 | /* Broadcom BCM43142A0 (Foxconn/Lenovo) */ |
628c26b4 DT |
134 | { USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01), |
135 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
2faf71ce | 136 | |
a57bac43 CH |
137 | /* Broadcom BCM920703 (HTC Vive) */ |
138 | { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01), | |
139 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
140 | ||
98514036 | 141 | /* Foxconn - Hon Hai */ |
6029ddc2 HS |
142 | { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01), |
143 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
98514036 | 144 | |
8f0c304c MD |
145 | /* Lite-On Technology - Broadcom based */ |
146 | { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01), | |
147 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
148 | ||
0b880062 | 149 | /* Broadcom devices with vendor specific id */ |
10d4c673 PG |
150 | { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01), |
151 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
92c385f4 | 152 | |
c2aef6e8 | 153 | /* ASUSTek Computer - Broadcom based */ |
9a5abdaa RD |
154 | { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01), |
155 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
c2aef6e8 | 156 | |
5bcecf32 | 157 | /* Belkin F8065bf - Broadcom based */ |
6331c686 MH |
158 | { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01), |
159 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
5bcecf32 | 160 | |
9113bfd8 | 161 | /* IMC Networks - Broadcom based */ |
6331c686 MH |
162 | { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01), |
163 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
9113bfd8 | 164 | |
fdfddc60 WJS |
165 | /* Dell Computer - Broadcom based */ |
166 | { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01), | |
167 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
168 | ||
1623d0bf DT |
169 | /* Toshiba Corp - Broadcom based */ |
170 | { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01), | |
171 | .driver_info = BTUSB_BCM_PATCHRAM }, | |
172 | ||
40df783d | 173 | /* Intel Bluetooth USB Bootloader (RAM module) */ |
d92f2df0 MH |
174 | { USB_DEVICE(0x8087, 0x0a5a), |
175 | .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC }, | |
40df783d | 176 | |
5e23b923 MH |
177 | { } /* Terminating entry */ |
178 | }; | |
179 | ||
180 | MODULE_DEVICE_TABLE(usb, btusb_table); | |
181 | ||
54265202 | 182 | static const struct usb_device_id blacklist_table[] = { |
cfeb4145 MH |
183 | /* CSR BlueCore devices */ |
184 | { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR }, | |
185 | ||
186 | /* Broadcom BCM2033 without firmware */ | |
187 | { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE }, | |
188 | ||
6c9d435d MH |
189 | /* Broadcom BCM2045 devices */ |
190 | { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 }, | |
191 | ||
be93112a | 192 | /* Atheros 3011 with sflash firmware */ |
0b880062 AS |
193 | { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE }, |
194 | { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE }, | |
2eeff0b4 | 195 | { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE }, |
0b880062 | 196 | { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE }, |
be93112a | 197 | { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE }, |
6eda541d | 198 | { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE }, |
2a7bcccc | 199 | { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE }, |
be93112a | 200 | |
509e7861 CYC |
201 | /* Atheros AR9285 Malbec with sflash firmware */ |
202 | { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE }, | |
203 | ||
d9f51b51 | 204 | /* Atheros 3012 with sflash firmware */ |
0b880062 AS |
205 | { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 }, |
206 | { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 }, | |
207 | { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 }, | |
208 | { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 }, | |
209 | { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 }, | |
692c062e | 210 | { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 }, |
4b552bc9 | 211 | { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 }, |
28c971d8 | 212 | { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 }, |
0b880062 AS |
213 | { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 }, |
214 | { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 }, | |
215 | { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 }, | |
216 | { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 }, | |
1fb4e09a | 217 | { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, |
0b880062 AS |
218 | { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, |
219 | { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, | |
7e730c7f | 220 | { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, |
ec0810d2 | 221 | { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 }, |
134d3b35 | 222 | { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 }, |
81d90442 | 223 | { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 }, |
441ad62d | 224 | { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 }, |
0b880062 | 225 | { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, |
cd355ff0 | 226 | { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 }, |
0b880062 | 227 | { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, |
89d2975f | 228 | { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 }, |
a735f9e2 | 229 | { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, |
d66629c1 | 230 | { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 }, |
2d25f8b4 | 231 | { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 }, |
94a32d10 | 232 | { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 }, |
07c0ea87 | 233 | { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 }, |
b131237c | 234 | { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 }, |
1e56f1eb | 235 | { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 }, |
0b880062 | 236 | { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 }, |
ebaf5795 | 237 | { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 }, |
18e0afab | 238 | { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 }, |
0b880062 | 239 | { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 }, |
ac71311e | 240 | { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 }, |
0a3658cc | 241 | { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 }, |
ca79f232 | 242 | { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 }, |
0b880062 AS |
243 | { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 }, |
244 | { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 }, | |
eed307e2 | 245 | { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 }, |
609574eb | 246 | { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 }, |
5b77a1f3 | 247 | { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 }, |
3bb30a7c | 248 | { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 }, |
033efa92 | 249 | { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 }, |
fa2f1394 | 250 | { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 }, |
75c6aca4 | 251 | { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 }, |
0d0cef61 | 252 | { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 }, |
72f9f8b5 | 253 | { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 }, |
12d86896 | 254 | { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 }, |
d9f51b51 | 255 | |
e9036e33 CYC |
256 | /* Atheros AR5BBU12 with sflash firmware */ |
257 | { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE }, | |
258 | ||
85d59726 | 259 | /* Atheros AR5BBU12 with sflash firmware */ |
bc21fde2 | 260 | { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 }, |
0b880062 | 261 | { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 }, |
85d59726 | 262 | |
3267c884 | 263 | /* QCA ROME chipset */ |
2054111b | 264 | { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME }, |
93519934 | 265 | { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME }, |
c9e44474 | 266 | { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME }, |
1eef1c35 | 267 | { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME }, |
c9e44474 | 268 | { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, |
47ca5898 | 269 | { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME }, |
858ff38a | 270 | { USB_DEVICE(0x0489, 0xe09f), .driver_info = BTUSB_QCA_ROME }, |
06e41d8a | 271 | { USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME }, |
1144a4ee | 272 | { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME }, |
d829b9e2 | 273 | { USB_DEVICE(0x04ca, 0x3016), .driver_info = BTUSB_QCA_ROME }, |
3267c884 | 274 | |
cfeb4145 | 275 | /* Broadcom BCM2035 */ |
7a9d4020 | 276 | { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 }, |
0b880062 AS |
277 | { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU }, |
278 | { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
cfeb4145 MH |
279 | |
280 | /* Broadcom BCM2045 */ | |
7a9d4020 MH |
281 | { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU }, |
282 | { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
bdbef3d6 | 283 | |
cfeb4145 | 284 | /* IBM/Lenovo ThinkPad with Broadcom chip */ |
7a9d4020 MH |
285 | { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU }, |
286 | { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
cfeb4145 MH |
287 | |
288 | /* HP laptop with Broadcom chip */ | |
7a9d4020 | 289 | { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU }, |
cfeb4145 MH |
290 | |
291 | /* Dell laptop with Broadcom chip */ | |
7a9d4020 | 292 | { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU }, |
cfeb4145 | 293 | |
5ddd4a60 | 294 | /* Dell Wireless 370 and 410 devices */ |
7a9d4020 | 295 | { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU }, |
5ddd4a60 | 296 | { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU }, |
cfeb4145 | 297 | |
7a9d4020 MH |
298 | /* Belkin F8T012 and F8T013 devices */ |
299 | { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
300 | { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
cfeb4145 | 301 | |
5ddd4a60 MH |
302 | /* Asus WL-BTD202 device */ |
303 | { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
304 | ||
305 | /* Kensington Bluetooth USB adapter */ | |
306 | { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU }, | |
307 | ||
cfeb4145 MH |
308 | /* RTX Telecom based adapters with buggy SCO support */ |
309 | { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC }, | |
310 | { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC }, | |
311 | ||
312 | /* CONWISE Technology based adapters with buggy SCO support */ | |
418678b0 SJ |
313 | { USB_DEVICE(0x0e5e, 0x6622), |
314 | .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622}, | |
cfeb4145 | 315 | |
4fcef8ed | 316 | /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */ |
2eeac871 | 317 | { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE }, |
4fcef8ed | 318 | |
cfeb4145 MH |
319 | /* Digianswer devices */ |
320 | { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER }, | |
321 | { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE }, | |
322 | ||
323 | /* CSR BlueCore Bluetooth Sniffer */ | |
4f64fa80 MH |
324 | { USB_DEVICE(0x0a12, 0x0002), |
325 | .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, | |
cfeb4145 MH |
326 | |
327 | /* Frontline ComProbe Bluetooth Sniffer */ | |
4f64fa80 MH |
328 | { USB_DEVICE(0x16d3, 0x0002), |
329 | .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC }, | |
cfeb4145 | 330 | |
cb1ee89f MH |
331 | /* Marvell Bluetooth devices */ |
332 | { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL }, | |
333 | { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL }, | |
1165df0e | 334 | { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL }, |
cb1ee89f | 335 | |
d0ac9eb7 | 336 | /* Intel Bluetooth devices */ |
de766142 | 337 | { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW }, |
407550fe | 338 | { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, |
dffd30ee | 339 | { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL }, |
ef4e5e4a | 340 | { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL }, |
cda0dd78 | 341 | { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW }, |
439e65d3 | 342 | { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL }, |
86a6129a | 343 | { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_NEW }, |
dffd30ee | 344 | |
d0ac9eb7 MH |
345 | /* Other Intel Bluetooth devices */ |
346 | { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01), | |
347 | .driver_info = BTUSB_IGNORE }, | |
ae8df494 | 348 | |
a2698a9b DD |
349 | /* Realtek Bluetooth devices */ |
350 | { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01), | |
351 | .driver_info = BTUSB_REALTEK }, | |
352 | ||
353 | /* Additional Realtek 8723AE Bluetooth devices */ | |
354 | { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK }, | |
355 | { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK }, | |
356 | ||
357 | /* Additional Realtek 8723BE Bluetooth devices */ | |
358 | { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK }, | |
359 | { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK }, | |
360 | { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK }, | |
361 | { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK }, | |
362 | { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK }, | |
a81d72d2 | 363 | { USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK }, |
a2698a9b DD |
364 | |
365 | /* Additional Realtek 8821AE Bluetooth devices */ | |
366 | { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK }, | |
367 | { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK }, | |
368 | { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK }, | |
369 | { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK }, | |
370 | { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK }, | |
371 | ||
4481c076 PP |
372 | /* Silicon Wave based devices */ |
373 | { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE }, | |
374 | ||
5e23b923 MH |
375 | { } /* Terminating entry */ |
376 | }; | |
377 | ||
9bfa35fe MH |
378 | #define BTUSB_MAX_ISOC_FRAMES 10 |
379 | ||
5e23b923 MH |
380 | #define BTUSB_INTR_RUNNING 0 |
381 | #define BTUSB_BULK_RUNNING 1 | |
9bfa35fe | 382 | #define BTUSB_ISOC_RUNNING 2 |
7bee549e | 383 | #define BTUSB_SUSPENDING 3 |
08b8b6c4 | 384 | #define BTUSB_DID_ISO_RESUME 4 |
cda0dd78 MH |
385 | #define BTUSB_BOOTLOADER 5 |
386 | #define BTUSB_DOWNLOADING 6 | |
ce6bb929 | 387 | #define BTUSB_FIRMWARE_LOADED 7 |
cda0dd78 | 388 | #define BTUSB_FIRMWARE_FAILED 8 |
ce6bb929 | 389 | #define BTUSB_BOOTING 9 |
04b8c814 | 390 | #define BTUSB_RESET_RESUME 10 |
9d08f504 | 391 | #define BTUSB_DIAG_RUNNING 11 |
fd913ef7 | 392 | #define BTUSB_OOB_WAKE_ENABLED 12 |
5e23b923 MH |
393 | |
394 | struct btusb_data { | |
395 | struct hci_dev *hdev; | |
396 | struct usb_device *udev; | |
5fbcd260 | 397 | struct usb_interface *intf; |
9bfa35fe | 398 | struct usb_interface *isoc; |
9d08f504 | 399 | struct usb_interface *diag; |
5e23b923 | 400 | |
5e23b923 MH |
401 | unsigned long flags; |
402 | ||
403 | struct work_struct work; | |
7bee549e | 404 | struct work_struct waker; |
5e23b923 | 405 | |
803b5836 | 406 | struct usb_anchor deferred; |
5e23b923 | 407 | struct usb_anchor tx_anchor; |
803b5836 MH |
408 | int tx_in_flight; |
409 | spinlock_t txlock; | |
410 | ||
5e23b923 MH |
411 | struct usb_anchor intr_anchor; |
412 | struct usb_anchor bulk_anchor; | |
9bfa35fe | 413 | struct usb_anchor isoc_anchor; |
9d08f504 | 414 | struct usb_anchor diag_anchor; |
803b5836 MH |
415 | spinlock_t rxlock; |
416 | ||
417 | struct sk_buff *evt_skb; | |
418 | struct sk_buff *acl_skb; | |
419 | struct sk_buff *sco_skb; | |
5e23b923 MH |
420 | |
421 | struct usb_endpoint_descriptor *intr_ep; | |
422 | struct usb_endpoint_descriptor *bulk_tx_ep; | |
423 | struct usb_endpoint_descriptor *bulk_rx_ep; | |
9bfa35fe MH |
424 | struct usb_endpoint_descriptor *isoc_tx_ep; |
425 | struct usb_endpoint_descriptor *isoc_rx_ep; | |
9d08f504 MH |
426 | struct usb_endpoint_descriptor *diag_tx_ep; |
427 | struct usb_endpoint_descriptor *diag_rx_ep; | |
9bfa35fe | 428 | |
7a9d4020 | 429 | __u8 cmdreq_type; |
893ba544 | 430 | __u8 cmdreq; |
7a9d4020 | 431 | |
43c2e57f | 432 | unsigned int sco_num; |
9bfa35fe | 433 | int isoc_altsetting; |
6a88adf2 | 434 | int suspend_count; |
2cbd3f5c | 435 | |
97307f51 | 436 | int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb); |
2cbd3f5c | 437 | int (*recv_bulk)(struct btusb_data *data, void *buffer, int count); |
ace31982 KBYT |
438 | |
439 | int (*setup_on_usb)(struct hci_dev *hdev); | |
fd913ef7 RJ |
440 | |
441 | int oob_wake_irq; /* irq for out-of-band wake-on-bt */ | |
5e23b923 MH |
442 | }; |
443 | ||
803b5836 MH |
444 | static inline void btusb_free_frags(struct btusb_data *data) |
445 | { | |
446 | unsigned long flags; | |
447 | ||
448 | spin_lock_irqsave(&data->rxlock, flags); | |
449 | ||
450 | kfree_skb(data->evt_skb); | |
451 | data->evt_skb = NULL; | |
452 | ||
453 | kfree_skb(data->acl_skb); | |
454 | data->acl_skb = NULL; | |
455 | ||
456 | kfree_skb(data->sco_skb); | |
457 | data->sco_skb = NULL; | |
458 | ||
459 | spin_unlock_irqrestore(&data->rxlock, flags); | |
460 | } | |
461 | ||
1ffa4ad0 MH |
462 | static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count) |
463 | { | |
803b5836 MH |
464 | struct sk_buff *skb; |
465 | int err = 0; | |
466 | ||
467 | spin_lock(&data->rxlock); | |
468 | skb = data->evt_skb; | |
469 | ||
470 | while (count) { | |
471 | int len; | |
472 | ||
473 | if (!skb) { | |
474 | skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC); | |
475 | if (!skb) { | |
476 | err = -ENOMEM; | |
477 | break; | |
478 | } | |
479 | ||
618e8bc2 MH |
480 | hci_skb_pkt_type(skb) = HCI_EVENT_PKT; |
481 | hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE; | |
803b5836 MH |
482 | } |
483 | ||
618e8bc2 | 484 | len = min_t(uint, hci_skb_expect(skb), count); |
59ae1d12 | 485 | skb_put_data(skb, buffer, len); |
803b5836 MH |
486 | |
487 | count -= len; | |
488 | buffer += len; | |
618e8bc2 | 489 | hci_skb_expect(skb) -= len; |
803b5836 MH |
490 | |
491 | if (skb->len == HCI_EVENT_HDR_SIZE) { | |
492 | /* Complete event header */ | |
618e8bc2 | 493 | hci_skb_expect(skb) = hci_event_hdr(skb)->plen; |
803b5836 | 494 | |
618e8bc2 | 495 | if (skb_tailroom(skb) < hci_skb_expect(skb)) { |
803b5836 MH |
496 | kfree_skb(skb); |
497 | skb = NULL; | |
498 | ||
499 | err = -EILSEQ; | |
500 | break; | |
501 | } | |
502 | } | |
503 | ||
618e8bc2 | 504 | if (!hci_skb_expect(skb)) { |
803b5836 | 505 | /* Complete frame */ |
97307f51 | 506 | data->recv_event(data->hdev, skb); |
803b5836 MH |
507 | skb = NULL; |
508 | } | |
509 | } | |
510 | ||
511 | data->evt_skb = skb; | |
512 | spin_unlock(&data->rxlock); | |
513 | ||
514 | return err; | |
1ffa4ad0 MH |
515 | } |
516 | ||
517 | static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count) | |
518 | { | |
803b5836 MH |
519 | struct sk_buff *skb; |
520 | int err = 0; | |
521 | ||
522 | spin_lock(&data->rxlock); | |
523 | skb = data->acl_skb; | |
524 | ||
525 | while (count) { | |
526 | int len; | |
527 | ||
528 | if (!skb) { | |
529 | skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC); | |
530 | if (!skb) { | |
531 | err = -ENOMEM; | |
532 | break; | |
533 | } | |
534 | ||
618e8bc2 MH |
535 | hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT; |
536 | hci_skb_expect(skb) = HCI_ACL_HDR_SIZE; | |
803b5836 MH |
537 | } |
538 | ||
618e8bc2 | 539 | len = min_t(uint, hci_skb_expect(skb), count); |
59ae1d12 | 540 | skb_put_data(skb, buffer, len); |
803b5836 MH |
541 | |
542 | count -= len; | |
543 | buffer += len; | |
618e8bc2 | 544 | hci_skb_expect(skb) -= len; |
803b5836 MH |
545 | |
546 | if (skb->len == HCI_ACL_HDR_SIZE) { | |
547 | __le16 dlen = hci_acl_hdr(skb)->dlen; | |
548 | ||
549 | /* Complete ACL header */ | |
618e8bc2 | 550 | hci_skb_expect(skb) = __le16_to_cpu(dlen); |
803b5836 | 551 | |
618e8bc2 | 552 | if (skb_tailroom(skb) < hci_skb_expect(skb)) { |
803b5836 MH |
553 | kfree_skb(skb); |
554 | skb = NULL; | |
555 | ||
556 | err = -EILSEQ; | |
557 | break; | |
558 | } | |
559 | } | |
560 | ||
618e8bc2 | 561 | if (!hci_skb_expect(skb)) { |
803b5836 MH |
562 | /* Complete frame */ |
563 | hci_recv_frame(data->hdev, skb); | |
564 | skb = NULL; | |
565 | } | |
566 | } | |
567 | ||
568 | data->acl_skb = skb; | |
569 | spin_unlock(&data->rxlock); | |
570 | ||
571 | return err; | |
1ffa4ad0 MH |
572 | } |
573 | ||
574 | static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count) | |
575 | { | |
803b5836 MH |
576 | struct sk_buff *skb; |
577 | int err = 0; | |
578 | ||
579 | spin_lock(&data->rxlock); | |
580 | skb = data->sco_skb; | |
581 | ||
582 | while (count) { | |
583 | int len; | |
584 | ||
585 | if (!skb) { | |
586 | skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC); | |
587 | if (!skb) { | |
588 | err = -ENOMEM; | |
589 | break; | |
590 | } | |
591 | ||
618e8bc2 MH |
592 | hci_skb_pkt_type(skb) = HCI_SCODATA_PKT; |
593 | hci_skb_expect(skb) = HCI_SCO_HDR_SIZE; | |
803b5836 MH |
594 | } |
595 | ||
618e8bc2 | 596 | len = min_t(uint, hci_skb_expect(skb), count); |
59ae1d12 | 597 | skb_put_data(skb, buffer, len); |
803b5836 MH |
598 | |
599 | count -= len; | |
600 | buffer += len; | |
618e8bc2 | 601 | hci_skb_expect(skb) -= len; |
803b5836 MH |
602 | |
603 | if (skb->len == HCI_SCO_HDR_SIZE) { | |
604 | /* Complete SCO header */ | |
618e8bc2 | 605 | hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen; |
803b5836 | 606 | |
618e8bc2 | 607 | if (skb_tailroom(skb) < hci_skb_expect(skb)) { |
803b5836 MH |
608 | kfree_skb(skb); |
609 | skb = NULL; | |
610 | ||
611 | err = -EILSEQ; | |
612 | break; | |
613 | } | |
614 | } | |
615 | ||
618e8bc2 | 616 | if (!hci_skb_expect(skb)) { |
803b5836 MH |
617 | /* Complete frame */ |
618 | hci_recv_frame(data->hdev, skb); | |
619 | skb = NULL; | |
620 | } | |
621 | } | |
622 | ||
623 | data->sco_skb = skb; | |
624 | spin_unlock(&data->rxlock); | |
625 | ||
626 | return err; | |
1ffa4ad0 MH |
627 | } |
628 | ||
5e23b923 MH |
629 | static void btusb_intr_complete(struct urb *urb) |
630 | { | |
631 | struct hci_dev *hdev = urb->context; | |
155961e8 | 632 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
633 | int err; |
634 | ||
89e7533d MH |
635 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, |
636 | urb->actual_length); | |
5e23b923 MH |
637 | |
638 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
639 | return; | |
640 | ||
641 | if (urb->status == 0) { | |
9bfa35fe MH |
642 | hdev->stat.byte_rx += urb->actual_length; |
643 | ||
1ffa4ad0 MH |
644 | if (btusb_recv_intr(data, urb->transfer_buffer, |
645 | urb->actual_length) < 0) { | |
2064ee33 | 646 | bt_dev_err(hdev, "corrupted event packet"); |
5e23b923 MH |
647 | hdev->stat.err_rx++; |
648 | } | |
85560c4a CC |
649 | } else if (urb->status == -ENOENT) { |
650 | /* Avoid suspend failed when usb_kill_urb */ | |
651 | return; | |
5e23b923 MH |
652 | } |
653 | ||
654 | if (!test_bit(BTUSB_INTR_RUNNING, &data->flags)) | |
655 | return; | |
656 | ||
7bee549e | 657 | usb_mark_last_busy(data->udev); |
5e23b923 MH |
658 | usb_anchor_urb(urb, &data->intr_anchor); |
659 | ||
660 | err = usb_submit_urb(urb, GFP_ATOMIC); | |
661 | if (err < 0) { | |
4935f1c1 | 662 | /* -EPERM: urb is being killed; |
d98422cb DR |
663 | * -ENODEV: device got disconnected |
664 | */ | |
4935f1c1 | 665 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
666 | bt_dev_err(hdev, "urb %p failed to resubmit (%d)", |
667 | urb, -err); | |
5e23b923 MH |
668 | usb_unanchor_urb(urb); |
669 | } | |
670 | } | |
671 | ||
2eda66f4 | 672 | static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags) |
5e23b923 | 673 | { |
155961e8 | 674 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
675 | struct urb *urb; |
676 | unsigned char *buf; | |
677 | unsigned int pipe; | |
678 | int err, size; | |
679 | ||
680 | BT_DBG("%s", hdev->name); | |
681 | ||
9bfa35fe MH |
682 | if (!data->intr_ep) |
683 | return -ENODEV; | |
684 | ||
2eda66f4 | 685 | urb = usb_alloc_urb(0, mem_flags); |
5e23b923 MH |
686 | if (!urb) |
687 | return -ENOMEM; | |
688 | ||
689 | size = le16_to_cpu(data->intr_ep->wMaxPacketSize); | |
690 | ||
2eda66f4 | 691 | buf = kmalloc(size, mem_flags); |
5e23b923 MH |
692 | if (!buf) { |
693 | usb_free_urb(urb); | |
694 | return -ENOMEM; | |
695 | } | |
696 | ||
697 | pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress); | |
698 | ||
699 | usb_fill_int_urb(urb, data->udev, pipe, buf, size, | |
89e7533d | 700 | btusb_intr_complete, hdev, data->intr_ep->bInterval); |
5e23b923 MH |
701 | |
702 | urb->transfer_flags |= URB_FREE_BUFFER; | |
703 | ||
704 | usb_anchor_urb(urb, &data->intr_anchor); | |
705 | ||
2eda66f4 | 706 | err = usb_submit_urb(urb, mem_flags); |
5e23b923 | 707 | if (err < 0) { |
d4b8d1c9 | 708 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
709 | bt_dev_err(hdev, "urb %p submission failed (%d)", |
710 | urb, -err); | |
5e23b923 | 711 | usb_unanchor_urb(urb); |
5e23b923 MH |
712 | } |
713 | ||
714 | usb_free_urb(urb); | |
715 | ||
716 | return err; | |
717 | } | |
718 | ||
719 | static void btusb_bulk_complete(struct urb *urb) | |
720 | { | |
721 | struct hci_dev *hdev = urb->context; | |
155961e8 | 722 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
723 | int err; |
724 | ||
89e7533d MH |
725 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, |
726 | urb->actual_length); | |
5e23b923 MH |
727 | |
728 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
729 | return; | |
730 | ||
731 | if (urb->status == 0) { | |
9bfa35fe MH |
732 | hdev->stat.byte_rx += urb->actual_length; |
733 | ||
2cbd3f5c | 734 | if (data->recv_bulk(data, urb->transfer_buffer, |
1ffa4ad0 | 735 | urb->actual_length) < 0) { |
2064ee33 | 736 | bt_dev_err(hdev, "corrupted ACL packet"); |
5e23b923 MH |
737 | hdev->stat.err_rx++; |
738 | } | |
85560c4a CC |
739 | } else if (urb->status == -ENOENT) { |
740 | /* Avoid suspend failed when usb_kill_urb */ | |
741 | return; | |
5e23b923 MH |
742 | } |
743 | ||
744 | if (!test_bit(BTUSB_BULK_RUNNING, &data->flags)) | |
745 | return; | |
746 | ||
747 | usb_anchor_urb(urb, &data->bulk_anchor); | |
652fd781 | 748 | usb_mark_last_busy(data->udev); |
5e23b923 MH |
749 | |
750 | err = usb_submit_urb(urb, GFP_ATOMIC); | |
751 | if (err < 0) { | |
4935f1c1 | 752 | /* -EPERM: urb is being killed; |
d98422cb DR |
753 | * -ENODEV: device got disconnected |
754 | */ | |
4935f1c1 | 755 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
756 | bt_dev_err(hdev, "urb %p failed to resubmit (%d)", |
757 | urb, -err); | |
5e23b923 MH |
758 | usb_unanchor_urb(urb); |
759 | } | |
760 | } | |
761 | ||
2eda66f4 | 762 | static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags) |
5e23b923 | 763 | { |
155961e8 | 764 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
765 | struct urb *urb; |
766 | unsigned char *buf; | |
767 | unsigned int pipe; | |
290ba200 | 768 | int err, size = HCI_MAX_FRAME_SIZE; |
5e23b923 MH |
769 | |
770 | BT_DBG("%s", hdev->name); | |
771 | ||
9bfa35fe MH |
772 | if (!data->bulk_rx_ep) |
773 | return -ENODEV; | |
774 | ||
2eda66f4 | 775 | urb = usb_alloc_urb(0, mem_flags); |
5e23b923 MH |
776 | if (!urb) |
777 | return -ENOMEM; | |
778 | ||
2eda66f4 | 779 | buf = kmalloc(size, mem_flags); |
5e23b923 MH |
780 | if (!buf) { |
781 | usb_free_urb(urb); | |
782 | return -ENOMEM; | |
783 | } | |
784 | ||
785 | pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress); | |
786 | ||
89e7533d MH |
787 | usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, |
788 | btusb_bulk_complete, hdev); | |
5e23b923 MH |
789 | |
790 | urb->transfer_flags |= URB_FREE_BUFFER; | |
791 | ||
7bee549e | 792 | usb_mark_last_busy(data->udev); |
5e23b923 MH |
793 | usb_anchor_urb(urb, &data->bulk_anchor); |
794 | ||
2eda66f4 | 795 | err = usb_submit_urb(urb, mem_flags); |
5e23b923 | 796 | if (err < 0) { |
d4b8d1c9 | 797 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
798 | bt_dev_err(hdev, "urb %p submission failed (%d)", |
799 | urb, -err); | |
5e23b923 | 800 | usb_unanchor_urb(urb); |
5e23b923 MH |
801 | } |
802 | ||
803 | usb_free_urb(urb); | |
804 | ||
805 | return err; | |
806 | } | |
807 | ||
9bfa35fe MH |
808 | static void btusb_isoc_complete(struct urb *urb) |
809 | { | |
810 | struct hci_dev *hdev = urb->context; | |
155961e8 | 811 | struct btusb_data *data = hci_get_drvdata(hdev); |
9bfa35fe MH |
812 | int i, err; |
813 | ||
89e7533d MH |
814 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, |
815 | urb->actual_length); | |
9bfa35fe MH |
816 | |
817 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
818 | return; | |
819 | ||
820 | if (urb->status == 0) { | |
821 | for (i = 0; i < urb->number_of_packets; i++) { | |
822 | unsigned int offset = urb->iso_frame_desc[i].offset; | |
823 | unsigned int length = urb->iso_frame_desc[i].actual_length; | |
824 | ||
825 | if (urb->iso_frame_desc[i].status) | |
826 | continue; | |
827 | ||
828 | hdev->stat.byte_rx += length; | |
829 | ||
1ffa4ad0 MH |
830 | if (btusb_recv_isoc(data, urb->transfer_buffer + offset, |
831 | length) < 0) { | |
2064ee33 | 832 | bt_dev_err(hdev, "corrupted SCO packet"); |
9bfa35fe MH |
833 | hdev->stat.err_rx++; |
834 | } | |
835 | } | |
85560c4a CC |
836 | } else if (urb->status == -ENOENT) { |
837 | /* Avoid suspend failed when usb_kill_urb */ | |
838 | return; | |
9bfa35fe MH |
839 | } |
840 | ||
841 | if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags)) | |
842 | return; | |
843 | ||
844 | usb_anchor_urb(urb, &data->isoc_anchor); | |
845 | ||
846 | err = usb_submit_urb(urb, GFP_ATOMIC); | |
847 | if (err < 0) { | |
4935f1c1 | 848 | /* -EPERM: urb is being killed; |
d98422cb DR |
849 | * -ENODEV: device got disconnected |
850 | */ | |
4935f1c1 | 851 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
852 | bt_dev_err(hdev, "urb %p failed to resubmit (%d)", |
853 | urb, -err); | |
9bfa35fe MH |
854 | usb_unanchor_urb(urb); |
855 | } | |
856 | } | |
857 | ||
42b16b3f | 858 | static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu) |
9bfa35fe MH |
859 | { |
860 | int i, offset = 0; | |
861 | ||
862 | BT_DBG("len %d mtu %d", len, mtu); | |
863 | ||
864 | for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu; | |
865 | i++, offset += mtu, len -= mtu) { | |
866 | urb->iso_frame_desc[i].offset = offset; | |
867 | urb->iso_frame_desc[i].length = mtu; | |
868 | } | |
869 | ||
870 | if (len && i < BTUSB_MAX_ISOC_FRAMES) { | |
871 | urb->iso_frame_desc[i].offset = offset; | |
872 | urb->iso_frame_desc[i].length = len; | |
873 | i++; | |
874 | } | |
875 | ||
876 | urb->number_of_packets = i; | |
877 | } | |
878 | ||
2eda66f4 | 879 | static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags) |
9bfa35fe | 880 | { |
155961e8 | 881 | struct btusb_data *data = hci_get_drvdata(hdev); |
9bfa35fe MH |
882 | struct urb *urb; |
883 | unsigned char *buf; | |
884 | unsigned int pipe; | |
885 | int err, size; | |
886 | ||
887 | BT_DBG("%s", hdev->name); | |
888 | ||
889 | if (!data->isoc_rx_ep) | |
890 | return -ENODEV; | |
891 | ||
2eda66f4 | 892 | urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags); |
9bfa35fe MH |
893 | if (!urb) |
894 | return -ENOMEM; | |
895 | ||
896 | size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) * | |
897 | BTUSB_MAX_ISOC_FRAMES; | |
898 | ||
2eda66f4 | 899 | buf = kmalloc(size, mem_flags); |
9bfa35fe MH |
900 | if (!buf) { |
901 | usb_free_urb(urb); | |
902 | return -ENOMEM; | |
903 | } | |
904 | ||
905 | pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress); | |
906 | ||
fa0fb93f | 907 | usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete, |
89e7533d | 908 | hdev, data->isoc_rx_ep->bInterval); |
9bfa35fe | 909 | |
89e7533d | 910 | urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP; |
9bfa35fe MH |
911 | |
912 | __fill_isoc_descriptor(urb, size, | |
89e7533d | 913 | le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize)); |
9bfa35fe MH |
914 | |
915 | usb_anchor_urb(urb, &data->isoc_anchor); | |
916 | ||
2eda66f4 | 917 | err = usb_submit_urb(urb, mem_flags); |
9bfa35fe | 918 | if (err < 0) { |
d4b8d1c9 | 919 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
920 | bt_dev_err(hdev, "urb %p submission failed (%d)", |
921 | urb, -err); | |
9bfa35fe | 922 | usb_unanchor_urb(urb); |
9bfa35fe MH |
923 | } |
924 | ||
925 | usb_free_urb(urb); | |
926 | ||
927 | return err; | |
928 | } | |
929 | ||
9d08f504 MH |
930 | static void btusb_diag_complete(struct urb *urb) |
931 | { | |
932 | struct hci_dev *hdev = urb->context; | |
933 | struct btusb_data *data = hci_get_drvdata(hdev); | |
934 | int err; | |
935 | ||
936 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, | |
937 | urb->actual_length); | |
938 | ||
939 | if (urb->status == 0) { | |
940 | struct sk_buff *skb; | |
941 | ||
942 | skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC); | |
943 | if (skb) { | |
59ae1d12 JB |
944 | skb_put_data(skb, urb->transfer_buffer, |
945 | urb->actual_length); | |
9d08f504 MH |
946 | hci_recv_diag(hdev, skb); |
947 | } | |
948 | } else if (urb->status == -ENOENT) { | |
949 | /* Avoid suspend failed when usb_kill_urb */ | |
950 | return; | |
951 | } | |
952 | ||
953 | if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags)) | |
954 | return; | |
955 | ||
956 | usb_anchor_urb(urb, &data->diag_anchor); | |
957 | usb_mark_last_busy(data->udev); | |
958 | ||
959 | err = usb_submit_urb(urb, GFP_ATOMIC); | |
960 | if (err < 0) { | |
961 | /* -EPERM: urb is being killed; | |
d98422cb DR |
962 | * -ENODEV: device got disconnected |
963 | */ | |
9d08f504 | 964 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
965 | bt_dev_err(hdev, "urb %p failed to resubmit (%d)", |
966 | urb, -err); | |
9d08f504 MH |
967 | usb_unanchor_urb(urb); |
968 | } | |
969 | } | |
970 | ||
971 | static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags) | |
972 | { | |
973 | struct btusb_data *data = hci_get_drvdata(hdev); | |
974 | struct urb *urb; | |
975 | unsigned char *buf; | |
976 | unsigned int pipe; | |
977 | int err, size = HCI_MAX_FRAME_SIZE; | |
978 | ||
979 | BT_DBG("%s", hdev->name); | |
980 | ||
981 | if (!data->diag_rx_ep) | |
982 | return -ENODEV; | |
983 | ||
984 | urb = usb_alloc_urb(0, mem_flags); | |
985 | if (!urb) | |
986 | return -ENOMEM; | |
987 | ||
988 | buf = kmalloc(size, mem_flags); | |
989 | if (!buf) { | |
990 | usb_free_urb(urb); | |
991 | return -ENOMEM; | |
992 | } | |
993 | ||
994 | pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress); | |
995 | ||
996 | usb_fill_bulk_urb(urb, data->udev, pipe, buf, size, | |
997 | btusb_diag_complete, hdev); | |
998 | ||
999 | urb->transfer_flags |= URB_FREE_BUFFER; | |
1000 | ||
1001 | usb_mark_last_busy(data->udev); | |
1002 | usb_anchor_urb(urb, &data->diag_anchor); | |
1003 | ||
1004 | err = usb_submit_urb(urb, mem_flags); | |
1005 | if (err < 0) { | |
1006 | if (err != -EPERM && err != -ENODEV) | |
2064ee33 MH |
1007 | bt_dev_err(hdev, "urb %p submission failed (%d)", |
1008 | urb, -err); | |
9d08f504 MH |
1009 | usb_unanchor_urb(urb); |
1010 | } | |
1011 | ||
1012 | usb_free_urb(urb); | |
1013 | ||
1014 | return err; | |
1015 | } | |
1016 | ||
5e23b923 | 1017 | static void btusb_tx_complete(struct urb *urb) |
7bee549e ON |
1018 | { |
1019 | struct sk_buff *skb = urb->context; | |
89e7533d | 1020 | struct hci_dev *hdev = (struct hci_dev *)skb->dev; |
155961e8 | 1021 | struct btusb_data *data = hci_get_drvdata(hdev); |
7bee549e | 1022 | |
89e7533d MH |
1023 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, |
1024 | urb->actual_length); | |
7bee549e ON |
1025 | |
1026 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
1027 | goto done; | |
1028 | ||
1029 | if (!urb->status) | |
1030 | hdev->stat.byte_tx += urb->transfer_buffer_length; | |
1031 | else | |
1032 | hdev->stat.err_tx++; | |
1033 | ||
1034 | done: | |
1035 | spin_lock(&data->txlock); | |
1036 | data->tx_in_flight--; | |
1037 | spin_unlock(&data->txlock); | |
1038 | ||
1039 | kfree(urb->setup_packet); | |
1040 | ||
1041 | kfree_skb(skb); | |
1042 | } | |
1043 | ||
1044 | static void btusb_isoc_tx_complete(struct urb *urb) | |
5e23b923 MH |
1045 | { |
1046 | struct sk_buff *skb = urb->context; | |
89e7533d | 1047 | struct hci_dev *hdev = (struct hci_dev *)skb->dev; |
5e23b923 | 1048 | |
89e7533d MH |
1049 | BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status, |
1050 | urb->actual_length); | |
5e23b923 MH |
1051 | |
1052 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
1053 | goto done; | |
1054 | ||
1055 | if (!urb->status) | |
1056 | hdev->stat.byte_tx += urb->transfer_buffer_length; | |
1057 | else | |
1058 | hdev->stat.err_tx++; | |
1059 | ||
1060 | done: | |
1061 | kfree(urb->setup_packet); | |
1062 | ||
1063 | kfree_skb(skb); | |
1064 | } | |
1065 | ||
1066 | static int btusb_open(struct hci_dev *hdev) | |
1067 | { | |
155961e8 | 1068 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
1069 | int err; |
1070 | ||
1071 | BT_DBG("%s", hdev->name); | |
1072 | ||
c7e163fe EH |
1073 | err = usb_autopm_get_interface(data->intf); |
1074 | if (err < 0) | |
1075 | return err; | |
1076 | ||
ace31982 KBYT |
1077 | /* Patching USB firmware files prior to starting any URBs of HCI path |
1078 | * It is more safe to use USB bulk channel for downloading USB patch | |
1079 | */ | |
1080 | if (data->setup_on_usb) { | |
1081 | err = data->setup_on_usb(hdev); | |
eb50042f | 1082 | if (err < 0) |
ace31982 KBYT |
1083 | return err; |
1084 | } | |
1085 | ||
7bee549e | 1086 | data->intf->needs_remote_wakeup = 1; |
a0085f25 SG |
1087 | /* device specific wakeup source enabled and required for USB |
1088 | * remote wakeup while host is suspended | |
1089 | */ | |
1090 | device_wakeup_enable(&data->udev->dev); | |
7bee549e | 1091 | |
5e23b923 | 1092 | if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags)) |
7bee549e | 1093 | goto done; |
5e23b923 | 1094 | |
2eda66f4 | 1095 | err = btusb_submit_intr_urb(hdev, GFP_KERNEL); |
43c2e57f MH |
1096 | if (err < 0) |
1097 | goto failed; | |
1098 | ||
1099 | err = btusb_submit_bulk_urb(hdev, GFP_KERNEL); | |
5e23b923 | 1100 | if (err < 0) { |
43c2e57f MH |
1101 | usb_kill_anchored_urbs(&data->intr_anchor); |
1102 | goto failed; | |
5e23b923 MH |
1103 | } |
1104 | ||
43c2e57f MH |
1105 | set_bit(BTUSB_BULK_RUNNING, &data->flags); |
1106 | btusb_submit_bulk_urb(hdev, GFP_KERNEL); | |
1107 | ||
9d08f504 MH |
1108 | if (data->diag) { |
1109 | if (!btusb_submit_diag_urb(hdev, GFP_KERNEL)) | |
1110 | set_bit(BTUSB_DIAG_RUNNING, &data->flags); | |
1111 | } | |
1112 | ||
7bee549e ON |
1113 | done: |
1114 | usb_autopm_put_interface(data->intf); | |
43c2e57f MH |
1115 | return 0; |
1116 | ||
1117 | failed: | |
1118 | clear_bit(BTUSB_INTR_RUNNING, &data->flags); | |
7bee549e | 1119 | usb_autopm_put_interface(data->intf); |
5e23b923 MH |
1120 | return err; |
1121 | } | |
1122 | ||
7bee549e ON |
1123 | static void btusb_stop_traffic(struct btusb_data *data) |
1124 | { | |
1125 | usb_kill_anchored_urbs(&data->intr_anchor); | |
1126 | usb_kill_anchored_urbs(&data->bulk_anchor); | |
1127 | usb_kill_anchored_urbs(&data->isoc_anchor); | |
9d08f504 | 1128 | usb_kill_anchored_urbs(&data->diag_anchor); |
7bee549e ON |
1129 | } |
1130 | ||
5e23b923 MH |
1131 | static int btusb_close(struct hci_dev *hdev) |
1132 | { | |
155961e8 | 1133 | struct btusb_data *data = hci_get_drvdata(hdev); |
7bee549e | 1134 | int err; |
5e23b923 MH |
1135 | |
1136 | BT_DBG("%s", hdev->name); | |
1137 | ||
e8c3c3d2 | 1138 | cancel_work_sync(&data->work); |
404291ac | 1139 | cancel_work_sync(&data->waker); |
e8c3c3d2 | 1140 | |
9bfa35fe | 1141 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); |
5e23b923 | 1142 | clear_bit(BTUSB_BULK_RUNNING, &data->flags); |
5e23b923 | 1143 | clear_bit(BTUSB_INTR_RUNNING, &data->flags); |
9d08f504 | 1144 | clear_bit(BTUSB_DIAG_RUNNING, &data->flags); |
7bee549e ON |
1145 | |
1146 | btusb_stop_traffic(data); | |
803b5836 MH |
1147 | btusb_free_frags(data); |
1148 | ||
7bee549e ON |
1149 | err = usb_autopm_get_interface(data->intf); |
1150 | if (err < 0) | |
7b8e2c1d | 1151 | goto failed; |
7bee549e ON |
1152 | |
1153 | data->intf->needs_remote_wakeup = 0; | |
a0085f25 | 1154 | device_wakeup_disable(&data->udev->dev); |
7bee549e | 1155 | usb_autopm_put_interface(data->intf); |
5e23b923 | 1156 | |
7b8e2c1d ON |
1157 | failed: |
1158 | usb_scuttle_anchored_urbs(&data->deferred); | |
5e23b923 MH |
1159 | return 0; |
1160 | } | |
1161 | ||
1162 | static int btusb_flush(struct hci_dev *hdev) | |
1163 | { | |
155961e8 | 1164 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
1165 | |
1166 | BT_DBG("%s", hdev->name); | |
1167 | ||
1168 | usb_kill_anchored_urbs(&data->tx_anchor); | |
803b5836 | 1169 | btusb_free_frags(data); |
5e23b923 MH |
1170 | |
1171 | return 0; | |
1172 | } | |
1173 | ||
047b2ec8 | 1174 | static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb) |
5e23b923 | 1175 | { |
155961e8 | 1176 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
1177 | struct usb_ctrlrequest *dr; |
1178 | struct urb *urb; | |
1179 | unsigned int pipe; | |
5e23b923 | 1180 | |
047b2ec8 MH |
1181 | urb = usb_alloc_urb(0, GFP_KERNEL); |
1182 | if (!urb) | |
1183 | return ERR_PTR(-ENOMEM); | |
5e23b923 | 1184 | |
047b2ec8 MH |
1185 | dr = kmalloc(sizeof(*dr), GFP_KERNEL); |
1186 | if (!dr) { | |
1187 | usb_free_urb(urb); | |
1188 | return ERR_PTR(-ENOMEM); | |
1189 | } | |
5e23b923 | 1190 | |
047b2ec8 | 1191 | dr->bRequestType = data->cmdreq_type; |
893ba544 | 1192 | dr->bRequest = data->cmdreq; |
047b2ec8 MH |
1193 | dr->wIndex = 0; |
1194 | dr->wValue = 0; | |
1195 | dr->wLength = __cpu_to_le16(skb->len); | |
7bd8f09f | 1196 | |
047b2ec8 | 1197 | pipe = usb_sndctrlpipe(data->udev, 0x00); |
5e23b923 | 1198 | |
89e7533d | 1199 | usb_fill_control_urb(urb, data->udev, pipe, (void *)dr, |
047b2ec8 | 1200 | skb->data, skb->len, btusb_tx_complete, skb); |
5e23b923 | 1201 | |
89e7533d | 1202 | skb->dev = (void *)hdev; |
5e23b923 | 1203 | |
047b2ec8 MH |
1204 | return urb; |
1205 | } | |
5e23b923 | 1206 | |
047b2ec8 MH |
1207 | static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb) |
1208 | { | |
1209 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1210 | struct urb *urb; | |
1211 | unsigned int pipe; | |
5e23b923 | 1212 | |
047b2ec8 MH |
1213 | if (!data->bulk_tx_ep) |
1214 | return ERR_PTR(-ENODEV); | |
9bfa35fe | 1215 | |
047b2ec8 MH |
1216 | urb = usb_alloc_urb(0, GFP_KERNEL); |
1217 | if (!urb) | |
1218 | return ERR_PTR(-ENOMEM); | |
5e23b923 | 1219 | |
047b2ec8 | 1220 | pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress); |
5e23b923 | 1221 | |
047b2ec8 MH |
1222 | usb_fill_bulk_urb(urb, data->udev, pipe, |
1223 | skb->data, skb->len, btusb_tx_complete, skb); | |
5e23b923 | 1224 | |
89e7533d | 1225 | skb->dev = (void *)hdev; |
5e23b923 | 1226 | |
047b2ec8 MH |
1227 | return urb; |
1228 | } | |
9bfa35fe | 1229 | |
047b2ec8 MH |
1230 | static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb) |
1231 | { | |
1232 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1233 | struct urb *urb; | |
1234 | unsigned int pipe; | |
9bfa35fe | 1235 | |
047b2ec8 MH |
1236 | if (!data->isoc_tx_ep) |
1237 | return ERR_PTR(-ENODEV); | |
9bfa35fe | 1238 | |
047b2ec8 MH |
1239 | urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL); |
1240 | if (!urb) | |
1241 | return ERR_PTR(-ENOMEM); | |
9bfa35fe | 1242 | |
047b2ec8 | 1243 | pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress); |
9bfa35fe | 1244 | |
047b2ec8 MH |
1245 | usb_fill_int_urb(urb, data->udev, pipe, |
1246 | skb->data, skb->len, btusb_isoc_tx_complete, | |
1247 | skb, data->isoc_tx_ep->bInterval); | |
9bfa35fe | 1248 | |
047b2ec8 | 1249 | urb->transfer_flags = URB_ISO_ASAP; |
5e23b923 | 1250 | |
047b2ec8 MH |
1251 | __fill_isoc_descriptor(urb, skb->len, |
1252 | le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize)); | |
5e23b923 | 1253 | |
89e7533d | 1254 | skb->dev = (void *)hdev; |
047b2ec8 MH |
1255 | |
1256 | return urb; | |
1257 | } | |
1258 | ||
1259 | static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb) | |
1260 | { | |
1261 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1262 | int err; | |
7bee549e | 1263 | |
5e23b923 MH |
1264 | usb_anchor_urb(urb, &data->tx_anchor); |
1265 | ||
e9753eff | 1266 | err = usb_submit_urb(urb, GFP_KERNEL); |
5e23b923 | 1267 | if (err < 0) { |
5a9b80e2 | 1268 | if (err != -EPERM && err != -ENODEV) |
2064ee33 MH |
1269 | bt_dev_err(hdev, "urb %p submission failed (%d)", |
1270 | urb, -err); | |
5e23b923 MH |
1271 | kfree(urb->setup_packet); |
1272 | usb_unanchor_urb(urb); | |
7bee549e ON |
1273 | } else { |
1274 | usb_mark_last_busy(data->udev); | |
5e23b923 MH |
1275 | } |
1276 | ||
54a8a79c | 1277 | usb_free_urb(urb); |
5e23b923 MH |
1278 | return err; |
1279 | } | |
1280 | ||
047b2ec8 MH |
1281 | static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb) |
1282 | { | |
1283 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1284 | unsigned long flags; | |
1285 | bool suspending; | |
1286 | ||
1287 | spin_lock_irqsave(&data->txlock, flags); | |
1288 | suspending = test_bit(BTUSB_SUSPENDING, &data->flags); | |
1289 | if (!suspending) | |
1290 | data->tx_in_flight++; | |
1291 | spin_unlock_irqrestore(&data->txlock, flags); | |
1292 | ||
1293 | if (!suspending) | |
1294 | return submit_tx_urb(hdev, urb); | |
1295 | ||
1296 | usb_anchor_urb(urb, &data->deferred); | |
1297 | schedule_work(&data->waker); | |
1298 | ||
1299 | usb_free_urb(urb); | |
1300 | return 0; | |
1301 | } | |
1302 | ||
1303 | static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb) | |
1304 | { | |
1305 | struct urb *urb; | |
1306 | ||
1307 | BT_DBG("%s", hdev->name); | |
1308 | ||
618e8bc2 | 1309 | switch (hci_skb_pkt_type(skb)) { |
047b2ec8 MH |
1310 | case HCI_COMMAND_PKT: |
1311 | urb = alloc_ctrl_urb(hdev, skb); | |
1312 | if (IS_ERR(urb)) | |
1313 | return PTR_ERR(urb); | |
1314 | ||
1315 | hdev->stat.cmd_tx++; | |
1316 | return submit_or_queue_tx_urb(hdev, urb); | |
1317 | ||
1318 | case HCI_ACLDATA_PKT: | |
1319 | urb = alloc_bulk_urb(hdev, skb); | |
1320 | if (IS_ERR(urb)) | |
1321 | return PTR_ERR(urb); | |
1322 | ||
1323 | hdev->stat.acl_tx++; | |
1324 | return submit_or_queue_tx_urb(hdev, urb); | |
1325 | ||
1326 | case HCI_SCODATA_PKT: | |
1327 | if (hci_conn_num(hdev, SCO_LINK) < 1) | |
1328 | return -ENODEV; | |
1329 | ||
1330 | urb = alloc_isoc_urb(hdev, skb); | |
1331 | if (IS_ERR(urb)) | |
1332 | return PTR_ERR(urb); | |
1333 | ||
1334 | hdev->stat.sco_tx++; | |
1335 | return submit_tx_urb(hdev, urb); | |
1336 | } | |
1337 | ||
1338 | return -EILSEQ; | |
1339 | } | |
1340 | ||
5e23b923 MH |
1341 | static void btusb_notify(struct hci_dev *hdev, unsigned int evt) |
1342 | { | |
155961e8 | 1343 | struct btusb_data *data = hci_get_drvdata(hdev); |
5e23b923 MH |
1344 | |
1345 | BT_DBG("%s evt %d", hdev->name, evt); | |
1346 | ||
014f7bc7 MH |
1347 | if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) { |
1348 | data->sco_num = hci_conn_num(hdev, SCO_LINK); | |
43c2e57f | 1349 | schedule_work(&data->work); |
a780efa8 | 1350 | } |
5e23b923 MH |
1351 | } |
1352 | ||
42b16b3f | 1353 | static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting) |
9bfa35fe | 1354 | { |
155961e8 | 1355 | struct btusb_data *data = hci_get_drvdata(hdev); |
9bfa35fe MH |
1356 | struct usb_interface *intf = data->isoc; |
1357 | struct usb_endpoint_descriptor *ep_desc; | |
1358 | int i, err; | |
1359 | ||
1360 | if (!data->isoc) | |
1361 | return -ENODEV; | |
1362 | ||
1363 | err = usb_set_interface(data->udev, 1, altsetting); | |
1364 | if (err < 0) { | |
2064ee33 | 1365 | bt_dev_err(hdev, "setting interface failed (%d)", -err); |
9bfa35fe MH |
1366 | return err; |
1367 | } | |
1368 | ||
1369 | data->isoc_altsetting = altsetting; | |
1370 | ||
1371 | data->isoc_tx_ep = NULL; | |
1372 | data->isoc_rx_ep = NULL; | |
1373 | ||
1374 | for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { | |
1375 | ep_desc = &intf->cur_altsetting->endpoint[i].desc; | |
1376 | ||
1377 | if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) { | |
1378 | data->isoc_tx_ep = ep_desc; | |
1379 | continue; | |
1380 | } | |
1381 | ||
1382 | if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) { | |
1383 | data->isoc_rx_ep = ep_desc; | |
1384 | continue; | |
1385 | } | |
1386 | } | |
1387 | ||
1388 | if (!data->isoc_tx_ep || !data->isoc_rx_ep) { | |
2064ee33 | 1389 | bt_dev_err(hdev, "invalid SCO descriptors"); |
9bfa35fe MH |
1390 | return -ENODEV; |
1391 | } | |
1392 | ||
1393 | return 0; | |
1394 | } | |
1395 | ||
5e23b923 MH |
1396 | static void btusb_work(struct work_struct *work) |
1397 | { | |
1398 | struct btusb_data *data = container_of(work, struct btusb_data, work); | |
1399 | struct hci_dev *hdev = data->hdev; | |
f4001d28 | 1400 | int new_alts; |
7bee549e | 1401 | int err; |
5e23b923 | 1402 | |
014f7bc7 | 1403 | if (data->sco_num > 0) { |
08b8b6c4 | 1404 | if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) { |
8efdd0cd | 1405 | err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf); |
7bee549e ON |
1406 | if (err < 0) { |
1407 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); | |
1408 | usb_kill_anchored_urbs(&data->isoc_anchor); | |
1409 | return; | |
1410 | } | |
1411 | ||
08b8b6c4 | 1412 | set_bit(BTUSB_DID_ISO_RESUME, &data->flags); |
7bee549e | 1413 | } |
f4001d28 MA |
1414 | |
1415 | if (hdev->voice_setting & 0x0020) { | |
1416 | static const int alts[3] = { 2, 4, 5 }; | |
89e7533d | 1417 | |
014f7bc7 | 1418 | new_alts = alts[data->sco_num - 1]; |
f4001d28 | 1419 | } else { |
014f7bc7 | 1420 | new_alts = data->sco_num; |
f4001d28 MA |
1421 | } |
1422 | ||
1423 | if (data->isoc_altsetting != new_alts) { | |
f6fc86f2 KP |
1424 | unsigned long flags; |
1425 | ||
9bfa35fe MH |
1426 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); |
1427 | usb_kill_anchored_urbs(&data->isoc_anchor); | |
1428 | ||
8f9d02f4 KP |
1429 | /* When isochronous alternate setting needs to be |
1430 | * changed, because SCO connection has been added | |
1431 | * or removed, a packet fragment may be left in the | |
1432 | * reassembling state. This could lead to wrongly | |
1433 | * assembled fragments. | |
1434 | * | |
1435 | * Clear outstanding fragment when selecting a new | |
1436 | * alternate setting. | |
1437 | */ | |
f6fc86f2 | 1438 | spin_lock_irqsave(&data->rxlock, flags); |
8f9d02f4 KP |
1439 | kfree_skb(data->sco_skb); |
1440 | data->sco_skb = NULL; | |
f6fc86f2 | 1441 | spin_unlock_irqrestore(&data->rxlock, flags); |
8f9d02f4 | 1442 | |
f4001d28 | 1443 | if (__set_isoc_interface(hdev, new_alts) < 0) |
9bfa35fe MH |
1444 | return; |
1445 | } | |
1446 | ||
1447 | if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) { | |
2eda66f4 | 1448 | if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0) |
9bfa35fe MH |
1449 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); |
1450 | else | |
2eda66f4 | 1451 | btusb_submit_isoc_urb(hdev, GFP_KERNEL); |
9bfa35fe MH |
1452 | } |
1453 | } else { | |
1454 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); | |
1455 | usb_kill_anchored_urbs(&data->isoc_anchor); | |
1456 | ||
1457 | __set_isoc_interface(hdev, 0); | |
08b8b6c4 | 1458 | if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags)) |
8efdd0cd | 1459 | usb_autopm_put_interface(data->isoc ? data->isoc : data->intf); |
5e23b923 MH |
1460 | } |
1461 | } | |
1462 | ||
7bee549e ON |
1463 | static void btusb_waker(struct work_struct *work) |
1464 | { | |
1465 | struct btusb_data *data = container_of(work, struct btusb_data, waker); | |
1466 | int err; | |
1467 | ||
1468 | err = usb_autopm_get_interface(data->intf); | |
1469 | if (err < 0) | |
1470 | return; | |
1471 | ||
1472 | usb_autopm_put_interface(data->intf); | |
1473 | } | |
1474 | ||
9f8f962c MH |
1475 | static int btusb_setup_bcm92035(struct hci_dev *hdev) |
1476 | { | |
1477 | struct sk_buff *skb; | |
1478 | u8 val = 0x00; | |
1479 | ||
1480 | BT_DBG("%s", hdev->name); | |
1481 | ||
1482 | skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT); | |
1483 | if (IS_ERR(skb)) | |
2064ee33 | 1484 | bt_dev_err(hdev, "BCM92035 command failed (%ld)", PTR_ERR(skb)); |
9f8f962c MH |
1485 | else |
1486 | kfree_skb(skb); | |
1487 | ||
1488 | return 0; | |
1489 | } | |
1490 | ||
81cac64b MH |
1491 | static int btusb_setup_csr(struct hci_dev *hdev) |
1492 | { | |
1493 | struct hci_rp_read_local_version *rp; | |
1494 | struct sk_buff *skb; | |
81cac64b MH |
1495 | |
1496 | BT_DBG("%s", hdev->name); | |
1497 | ||
7cd84d72 MH |
1498 | skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL, |
1499 | HCI_INIT_TIMEOUT); | |
1500 | if (IS_ERR(skb)) { | |
1501 | int err = PTR_ERR(skb); | |
2064ee33 | 1502 | bt_dev_err(hdev, "CSR: Local version failed (%d)", err); |
7cd84d72 MH |
1503 | return err; |
1504 | } | |
1505 | ||
1506 | if (skb->len != sizeof(struct hci_rp_read_local_version)) { | |
2064ee33 | 1507 | bt_dev_err(hdev, "CSR: Local version length mismatch"); |
7cd84d72 MH |
1508 | kfree_skb(skb); |
1509 | return -EIO; | |
1510 | } | |
81cac64b | 1511 | |
89e7533d | 1512 | rp = (struct hci_rp_read_local_version *)skb->data; |
81cac64b | 1513 | |
6cafcd95 JH |
1514 | /* Detect controllers which aren't real CSR ones. */ |
1515 | if (le16_to_cpu(rp->manufacturer) != 10 || | |
1516 | le16_to_cpu(rp->lmp_subver) == 0x0c5c) { | |
9641d343 MH |
1517 | /* Clear the reset quirk since this is not an actual |
1518 | * early Bluetooth 1.1 device from CSR. | |
1519 | */ | |
1520 | clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); | |
81cac64b | 1521 | |
9641d343 MH |
1522 | /* These fake CSR controllers have all a broken |
1523 | * stored link key handling and so just disable it. | |
1524 | */ | |
1525 | set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); | |
1526 | } | |
81cac64b MH |
1527 | |
1528 | kfree_skb(skb); | |
1529 | ||
9641d343 | 1530 | return 0; |
81cac64b MH |
1531 | } |
1532 | ||
dffd30ee | 1533 | static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev, |
89e7533d | 1534 | struct intel_version *ver) |
dffd30ee THJA |
1535 | { |
1536 | const struct firmware *fw; | |
1537 | char fwname[64]; | |
1538 | int ret; | |
1539 | ||
1540 | snprintf(fwname, sizeof(fwname), | |
1541 | "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq", | |
1542 | ver->hw_platform, ver->hw_variant, ver->hw_revision, | |
1543 | ver->fw_variant, ver->fw_revision, ver->fw_build_num, | |
1544 | ver->fw_build_ww, ver->fw_build_yy); | |
1545 | ||
1546 | ret = request_firmware(&fw, fwname, &hdev->dev); | |
1547 | if (ret < 0) { | |
1548 | if (ret == -EINVAL) { | |
1549 | BT_ERR("%s Intel firmware file request failed (%d)", | |
1550 | hdev->name, ret); | |
1551 | return NULL; | |
1552 | } | |
1553 | ||
1554 | BT_ERR("%s failed to open Intel firmware file: %s(%d)", | |
1555 | hdev->name, fwname, ret); | |
1556 | ||
1557 | /* If the correct firmware patch file is not found, use the | |
1558 | * default firmware patch file instead | |
1559 | */ | |
1560 | snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq", | |
1561 | ver->hw_platform, ver->hw_variant); | |
1562 | if (request_firmware(&fw, fwname, &hdev->dev) < 0) { | |
1563 | BT_ERR("%s failed to open default Intel fw file: %s", | |
1564 | hdev->name, fwname); | |
1565 | return NULL; | |
1566 | } | |
1567 | } | |
1568 | ||
2064ee33 | 1569 | bt_dev_info(hdev, "Intel Bluetooth firmware file: %s", fwname); |
dffd30ee THJA |
1570 | |
1571 | return fw; | |
1572 | } | |
1573 | ||
1574 | static int btusb_setup_intel_patching(struct hci_dev *hdev, | |
1575 | const struct firmware *fw, | |
1576 | const u8 **fw_ptr, int *disable_patch) | |
1577 | { | |
1578 | struct sk_buff *skb; | |
1579 | struct hci_command_hdr *cmd; | |
1580 | const u8 *cmd_param; | |
1581 | struct hci_event_hdr *evt = NULL; | |
1582 | const u8 *evt_param = NULL; | |
1583 | int remain = fw->size - (*fw_ptr - fw->data); | |
1584 | ||
1585 | /* The first byte indicates the types of the patch command or event. | |
1586 | * 0x01 means HCI command and 0x02 is HCI event. If the first bytes | |
1587 | * in the current firmware buffer doesn't start with 0x01 or | |
1588 | * the size of remain buffer is smaller than HCI command header, | |
1589 | * the firmware file is corrupted and it should stop the patching | |
1590 | * process. | |
1591 | */ | |
1592 | if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) { | |
1593 | BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name); | |
1594 | return -EINVAL; | |
1595 | } | |
1596 | (*fw_ptr)++; | |
1597 | remain--; | |
1598 | ||
1599 | cmd = (struct hci_command_hdr *)(*fw_ptr); | |
1600 | *fw_ptr += sizeof(*cmd); | |
1601 | remain -= sizeof(*cmd); | |
1602 | ||
1603 | /* Ensure that the remain firmware data is long enough than the length | |
1604 | * of command parameter. If not, the firmware file is corrupted. | |
1605 | */ | |
1606 | if (remain < cmd->plen) { | |
1607 | BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name); | |
1608 | return -EFAULT; | |
1609 | } | |
1610 | ||
1611 | /* If there is a command that loads a patch in the firmware | |
1612 | * file, then enable the patch upon success, otherwise just | |
1613 | * disable the manufacturer mode, for example patch activation | |
1614 | * is not required when the default firmware patch file is used | |
1615 | * because there are no patch data to load. | |
1616 | */ | |
1617 | if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e) | |
1618 | *disable_patch = 0; | |
1619 | ||
1620 | cmd_param = *fw_ptr; | |
1621 | *fw_ptr += cmd->plen; | |
1622 | remain -= cmd->plen; | |
1623 | ||
1624 | /* This reads the expected events when the above command is sent to the | |
1625 | * device. Some vendor commands expects more than one events, for | |
1626 | * example command status event followed by vendor specific event. | |
1627 | * For this case, it only keeps the last expected event. so the command | |
1628 | * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of | |
1629 | * last expected event. | |
1630 | */ | |
1631 | while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) { | |
1632 | (*fw_ptr)++; | |
1633 | remain--; | |
1634 | ||
1635 | evt = (struct hci_event_hdr *)(*fw_ptr); | |
1636 | *fw_ptr += sizeof(*evt); | |
1637 | remain -= sizeof(*evt); | |
1638 | ||
1639 | if (remain < evt->plen) { | |
1640 | BT_ERR("%s Intel fw corrupted: invalid evt len", | |
1641 | hdev->name); | |
1642 | return -EFAULT; | |
1643 | } | |
1644 | ||
1645 | evt_param = *fw_ptr; | |
1646 | *fw_ptr += evt->plen; | |
1647 | remain -= evt->plen; | |
1648 | } | |
1649 | ||
1650 | /* Every HCI commands in the firmware file has its correspond event. | |
1651 | * If event is not found or remain is smaller than zero, the firmware | |
1652 | * file is corrupted. | |
1653 | */ | |
1654 | if (!evt || !evt_param || remain < 0) { | |
1655 | BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name); | |
1656 | return -EFAULT; | |
1657 | } | |
1658 | ||
1659 | skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen, | |
1660 | cmd_param, evt->evt, HCI_INIT_TIMEOUT); | |
1661 | if (IS_ERR(skb)) { | |
1662 | BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)", | |
1663 | hdev->name, cmd->opcode, PTR_ERR(skb)); | |
d9c78e97 | 1664 | return PTR_ERR(skb); |
dffd30ee THJA |
1665 | } |
1666 | ||
1667 | /* It ensures that the returned event matches the event data read from | |
1668 | * the firmware file. At fist, it checks the length and then | |
1669 | * the contents of the event. | |
1670 | */ | |
1671 | if (skb->len != evt->plen) { | |
1672 | BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name, | |
1673 | le16_to_cpu(cmd->opcode)); | |
1674 | kfree_skb(skb); | |
1675 | return -EFAULT; | |
1676 | } | |
1677 | ||
1678 | if (memcmp(skb->data, evt_param, evt->plen)) { | |
1679 | BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)", | |
1680 | hdev->name, le16_to_cpu(cmd->opcode)); | |
1681 | kfree_skb(skb); | |
1682 | return -EFAULT; | |
1683 | } | |
1684 | kfree_skb(skb); | |
1685 | ||
1686 | return 0; | |
1687 | } | |
1688 | ||
1689 | static int btusb_setup_intel(struct hci_dev *hdev) | |
1690 | { | |
1691 | struct sk_buff *skb; | |
1692 | const struct firmware *fw; | |
1693 | const u8 *fw_ptr; | |
28dc4b92 | 1694 | int disable_patch, err; |
6c483de1 | 1695 | struct intel_version ver; |
dffd30ee | 1696 | |
dffd30ee THJA |
1697 | BT_DBG("%s", hdev->name); |
1698 | ||
1699 | /* The controller has a bug with the first HCI command sent to it | |
1700 | * returning number of completed commands as zero. This would stall the | |
1701 | * command processing in the Bluetooth core. | |
1702 | * | |
1703 | * As a workaround, send HCI Reset command first which will reset the | |
1704 | * number of completed commands and allow normal command processing | |
1705 | * from now on. | |
1706 | */ | |
1707 | skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); | |
1708 | if (IS_ERR(skb)) { | |
1709 | BT_ERR("%s sending initial HCI reset command failed (%ld)", | |
1710 | hdev->name, PTR_ERR(skb)); | |
d9c78e97 | 1711 | return PTR_ERR(skb); |
dffd30ee THJA |
1712 | } |
1713 | kfree_skb(skb); | |
1714 | ||
1715 | /* Read Intel specific controller version first to allow selection of | |
1716 | * which firmware file to load. | |
1717 | * | |
1718 | * The returned information are hardware variant and revision plus | |
1719 | * firmware variant, revision and build number. | |
1720 | */ | |
6c483de1 LP |
1721 | err = btintel_read_version(hdev, &ver); |
1722 | if (err) | |
1723 | return err; | |
dffd30ee | 1724 | |
2064ee33 MH |
1725 | bt_dev_info(hdev, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x", |
1726 | ver.hw_platform, ver.hw_variant, ver.hw_revision, | |
1727 | ver.fw_variant, ver.fw_revision, ver.fw_build_num, | |
1728 | ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num); | |
dffd30ee THJA |
1729 | |
1730 | /* fw_patch_num indicates the version of patch the device currently | |
1731 | * have. If there is no patch data in the device, it is always 0x00. | |
5075edae | 1732 | * So, if it is other than 0x00, no need to patch the device again. |
dffd30ee | 1733 | */ |
6c483de1 | 1734 | if (ver.fw_patch_num) { |
2064ee33 MH |
1735 | bt_dev_info(hdev, "Intel device is already patched. " |
1736 | "patch num: %02x", ver.fw_patch_num); | |
213445b2 | 1737 | goto complete; |
dffd30ee THJA |
1738 | } |
1739 | ||
1740 | /* Opens the firmware patch file based on the firmware version read | |
1741 | * from the controller. If it fails to open the matching firmware | |
1742 | * patch file, it tries to open the default firmware patch file. | |
1743 | * If no patch file is found, allow the device to operate without | |
1744 | * a patch. | |
1745 | */ | |
6c483de1 LP |
1746 | fw = btusb_setup_intel_get_fw(hdev, &ver); |
1747 | if (!fw) | |
213445b2 | 1748 | goto complete; |
dffd30ee THJA |
1749 | fw_ptr = fw->data; |
1750 | ||
28dc4b92 | 1751 | /* Enable the manufacturer mode of the controller. |
dffd30ee THJA |
1752 | * Only while this mode is enabled, the driver can download the |
1753 | * firmware patch data and configuration parameters. | |
1754 | */ | |
28dc4b92 LP |
1755 | err = btintel_enter_mfg(hdev); |
1756 | if (err) { | |
dffd30ee | 1757 | release_firmware(fw); |
28dc4b92 | 1758 | return err; |
dffd30ee THJA |
1759 | } |
1760 | ||
dffd30ee THJA |
1761 | disable_patch = 1; |
1762 | ||
1763 | /* The firmware data file consists of list of Intel specific HCI | |
1764 | * commands and its expected events. The first byte indicates the | |
1765 | * type of the message, either HCI command or HCI event. | |
1766 | * | |
1767 | * It reads the command and its expected event from the firmware file, | |
1768 | * and send to the controller. Once __hci_cmd_sync_ev() returns, | |
1769 | * the returned event is compared with the event read from the firmware | |
1770 | * file and it will continue until all the messages are downloaded to | |
1771 | * the controller. | |
1772 | * | |
1773 | * Once the firmware patching is completed successfully, | |
1774 | * the manufacturer mode is disabled with reset and activating the | |
1775 | * downloaded patch. | |
1776 | * | |
1777 | * If the firmware patching fails, the manufacturer mode is | |
1778 | * disabled with reset and deactivating the patch. | |
1779 | * | |
1780 | * If the default patch file is used, no reset is done when disabling | |
1781 | * the manufacturer. | |
1782 | */ | |
1783 | while (fw->size > fw_ptr - fw->data) { | |
1784 | int ret; | |
1785 | ||
1786 | ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr, | |
1787 | &disable_patch); | |
1788 | if (ret < 0) | |
1789 | goto exit_mfg_deactivate; | |
1790 | } | |
1791 | ||
1792 | release_firmware(fw); | |
1793 | ||
1794 | if (disable_patch) | |
1795 | goto exit_mfg_disable; | |
1796 | ||
1797 | /* Patching completed successfully and disable the manufacturer mode | |
1798 | * with reset and activate the downloaded firmware patches. | |
1799 | */ | |
28dc4b92 LP |
1800 | err = btintel_exit_mfg(hdev, true, true); |
1801 | if (err) | |
1802 | return err; | |
dffd30ee | 1803 | |
2064ee33 | 1804 | bt_dev_info(hdev, "Intel firmware patch completed and activated"); |
dffd30ee | 1805 | |
213445b2 | 1806 | goto complete; |
dffd30ee THJA |
1807 | |
1808 | exit_mfg_disable: | |
1809 | /* Disable the manufacturer mode without reset */ | |
28dc4b92 LP |
1810 | err = btintel_exit_mfg(hdev, false, false); |
1811 | if (err) | |
1812 | return err; | |
dffd30ee | 1813 | |
2064ee33 | 1814 | bt_dev_info(hdev, "Intel firmware patch completed"); |
40cb0984 | 1815 | |
213445b2 | 1816 | goto complete; |
dffd30ee THJA |
1817 | |
1818 | exit_mfg_deactivate: | |
1819 | release_firmware(fw); | |
1820 | ||
1821 | /* Patching failed. Disable the manufacturer mode with reset and | |
1822 | * deactivate the downloaded firmware patches. | |
1823 | */ | |
28dc4b92 LP |
1824 | err = btintel_exit_mfg(hdev, true, false); |
1825 | if (err) | |
1826 | return err; | |
dffd30ee | 1827 | |
2064ee33 | 1828 | bt_dev_info(hdev, "Intel firmware patch completed and deactivated"); |
dffd30ee | 1829 | |
213445b2 MH |
1830 | complete: |
1831 | /* Set the event mask for Intel specific vendor events. This enables | |
1832 | * a few extra events that are useful during general operation. | |
1833 | */ | |
1834 | btintel_set_event_mask_mfg(hdev, false); | |
1835 | ||
4185a0f5 | 1836 | btintel_check_bdaddr(hdev); |
dffd30ee THJA |
1837 | return 0; |
1838 | } | |
1839 | ||
cda0dd78 MH |
1840 | static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode) |
1841 | { | |
1842 | struct sk_buff *skb; | |
1843 | struct hci_event_hdr *hdr; | |
1844 | struct hci_ev_cmd_complete *evt; | |
1845 | ||
1846 | skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC); | |
1847 | if (!skb) | |
1848 | return -ENOMEM; | |
1849 | ||
4df864c1 | 1850 | hdr = skb_put(skb, sizeof(*hdr)); |
cda0dd78 MH |
1851 | hdr->evt = HCI_EV_CMD_COMPLETE; |
1852 | hdr->plen = sizeof(*evt) + 1; | |
1853 | ||
4df864c1 | 1854 | evt = skb_put(skb, sizeof(*evt)); |
cda0dd78 MH |
1855 | evt->ncmd = 0x01; |
1856 | evt->opcode = cpu_to_le16(opcode); | |
1857 | ||
634fef61 | 1858 | skb_put_u8(skb, 0x00); |
cda0dd78 | 1859 | |
618e8bc2 | 1860 | hci_skb_pkt_type(skb) = HCI_EVENT_PKT; |
cda0dd78 MH |
1861 | |
1862 | return hci_recv_frame(hdev, skb); | |
1863 | } | |
1864 | ||
1865 | static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer, | |
1866 | int count) | |
1867 | { | |
1868 | /* When the device is in bootloader mode, then it can send | |
1869 | * events via the bulk endpoint. These events are treated the | |
1870 | * same way as the ones received from the interrupt endpoint. | |
1871 | */ | |
1872 | if (test_bit(BTUSB_BOOTLOADER, &data->flags)) | |
1873 | return btusb_recv_intr(data, buffer, count); | |
1874 | ||
1875 | return btusb_recv_bulk(data, buffer, count); | |
1876 | } | |
1877 | ||
ccd6da2a MH |
1878 | static void btusb_intel_bootup(struct btusb_data *data, const void *ptr, |
1879 | unsigned int len) | |
1880 | { | |
1881 | const struct intel_bootup *evt = ptr; | |
1882 | ||
1883 | if (len != sizeof(*evt)) | |
1884 | return; | |
1885 | ||
1886 | if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) { | |
1887 | smp_mb__after_atomic(); | |
1888 | wake_up_bit(&data->flags, BTUSB_BOOTING); | |
1889 | } | |
1890 | } | |
1891 | ||
1892 | static void btusb_intel_secure_send_result(struct btusb_data *data, | |
1893 | const void *ptr, unsigned int len) | |
1894 | { | |
1895 | const struct intel_secure_send_result *evt = ptr; | |
1896 | ||
1897 | if (len != sizeof(*evt)) | |
1898 | return; | |
1899 | ||
1900 | if (evt->result) | |
1901 | set_bit(BTUSB_FIRMWARE_FAILED, &data->flags); | |
1902 | ||
1903 | if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) && | |
1904 | test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) { | |
1905 | smp_mb__after_atomic(); | |
1906 | wake_up_bit(&data->flags, BTUSB_DOWNLOADING); | |
1907 | } | |
1908 | } | |
1909 | ||
cda0dd78 MH |
1910 | static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb) |
1911 | { | |
1912 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1913 | ||
1914 | if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { | |
1915 | struct hci_event_hdr *hdr = (void *)skb->data; | |
1916 | ||
ccd6da2a MH |
1917 | if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff && |
1918 | hdr->plen > 0) { | |
1919 | const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1; | |
1920 | unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1; | |
1921 | ||
1922 | switch (skb->data[2]) { | |
1923 | case 0x02: | |
1924 | /* When switching to the operational firmware | |
1925 | * the device sends a vendor specific event | |
1926 | * indicating that the bootup completed. | |
1927 | */ | |
1928 | btusb_intel_bootup(data, ptr, len); | |
1929 | break; | |
1930 | case 0x06: | |
1931 | /* When the firmware loading completes the | |
1932 | * device sends out a vendor specific event | |
1933 | * indicating the result of the firmware | |
1934 | * loading. | |
1935 | */ | |
1936 | btusb_intel_secure_send_result(data, ptr, len); | |
1937 | break; | |
fad70972 | 1938 | } |
cda0dd78 MH |
1939 | } |
1940 | } | |
1941 | ||
1942 | return hci_recv_frame(hdev, skb); | |
1943 | } | |
1944 | ||
1945 | static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb) | |
1946 | { | |
1947 | struct btusb_data *data = hci_get_drvdata(hdev); | |
1948 | struct urb *urb; | |
1949 | ||
1950 | BT_DBG("%s", hdev->name); | |
1951 | ||
618e8bc2 | 1952 | switch (hci_skb_pkt_type(skb)) { |
cda0dd78 MH |
1953 | case HCI_COMMAND_PKT: |
1954 | if (test_bit(BTUSB_BOOTLOADER, &data->flags)) { | |
1955 | struct hci_command_hdr *cmd = (void *)skb->data; | |
1956 | __u16 opcode = le16_to_cpu(cmd->opcode); | |
1957 | ||
1958 | /* When in bootloader mode and the command 0xfc09 | |
1959 | * is received, it needs to be send down the | |
1960 | * bulk endpoint. So allocate a bulk URB instead. | |
1961 | */ | |
1962 | if (opcode == 0xfc09) | |
1963 | urb = alloc_bulk_urb(hdev, skb); | |
1964 | else | |
1965 | urb = alloc_ctrl_urb(hdev, skb); | |
1966 | ||
1967 | /* When the 0xfc01 command is issued to boot into | |
1968 | * the operational firmware, it will actually not | |
1969 | * send a command complete event. To keep the flow | |
1970 | * control working inject that event here. | |
1971 | */ | |
1972 | if (opcode == 0xfc01) | |
1973 | inject_cmd_complete(hdev, opcode); | |
1974 | } else { | |
1975 | urb = alloc_ctrl_urb(hdev, skb); | |
1976 | } | |
1977 | if (IS_ERR(urb)) | |
1978 | return PTR_ERR(urb); | |
1979 | ||
1980 | hdev->stat.cmd_tx++; | |
1981 | return submit_or_queue_tx_urb(hdev, urb); | |
1982 | ||
1983 | case HCI_ACLDATA_PKT: | |
1984 | urb = alloc_bulk_urb(hdev, skb); | |
1985 | if (IS_ERR(urb)) | |
1986 | return PTR_ERR(urb); | |
1987 | ||
1988 | hdev->stat.acl_tx++; | |
1989 | return submit_or_queue_tx_urb(hdev, urb); | |
1990 | ||
1991 | case HCI_SCODATA_PKT: | |
1992 | if (hci_conn_num(hdev, SCO_LINK) < 1) | |
1993 | return -ENODEV; | |
1994 | ||
1995 | urb = alloc_isoc_urb(hdev, skb); | |
1996 | if (IS_ERR(urb)) | |
1997 | return PTR_ERR(urb); | |
1998 | ||
1999 | hdev->stat.sco_tx++; | |
2000 | return submit_tx_urb(hdev, urb); | |
2001 | } | |
2002 | ||
2003 | return -EILSEQ; | |
2004 | } | |
2005 | ||
cda0dd78 MH |
2006 | static int btusb_setup_intel_new(struct hci_dev *hdev) |
2007 | { | |
2008 | static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01, | |
2009 | 0x00, 0x08, 0x04, 0x00 }; | |
2010 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2011 | struct sk_buff *skb; | |
6c483de1 | 2012 | struct intel_version ver; |
cda0dd78 MH |
2013 | struct intel_boot_params *params; |
2014 | const struct firmware *fw; | |
2015 | const u8 *fw_ptr; | |
e66890a9 | 2016 | u32 frag_len; |
cda0dd78 MH |
2017 | char fwname[64]; |
2018 | ktime_t calltime, delta, rettime; | |
2019 | unsigned long long duration; | |
2020 | int err; | |
2021 | ||
2022 | BT_DBG("%s", hdev->name); | |
2023 | ||
2024 | calltime = ktime_get(); | |
2025 | ||
2026 | /* Read the Intel version information to determine if the device | |
2027 | * is in bootloader mode or if it already has operational firmware | |
2028 | * loaded. | |
2029 | */ | |
6c483de1 LP |
2030 | err = btintel_read_version(hdev, &ver); |
2031 | if (err) | |
2032 | return err; | |
cda0dd78 MH |
2033 | |
2034 | /* The hardware platform number has a fixed value of 0x37 and | |
2035 | * for now only accept this single value. | |
2036 | */ | |
6c483de1 | 2037 | if (ver.hw_platform != 0x37) { |
cda0dd78 | 2038 | BT_ERR("%s: Unsupported Intel hardware platform (%u)", |
6c483de1 | 2039 | hdev->name, ver.hw_platform); |
cda0dd78 MH |
2040 | return -EINVAL; |
2041 | } | |
2042 | ||
9268834b THJA |
2043 | /* Check for supported iBT hardware variants of this firmware |
2044 | * loading method. | |
a0af53b5 THJA |
2045 | * |
2046 | * This check has been put in place to ensure correct forward | |
2047 | * compatibility options when newer hardware variants come along. | |
cda0dd78 | 2048 | */ |
9268834b THJA |
2049 | switch (ver.hw_variant) { |
2050 | case 0x0b: /* SfP */ | |
2051 | case 0x0c: /* WsP */ | |
86a6129a | 2052 | case 0x11: /* JfP */ |
de766142 | 2053 | case 0x12: /* ThP */ |
9268834b THJA |
2054 | break; |
2055 | default: | |
cda0dd78 | 2056 | BT_ERR("%s: Unsupported Intel hardware variant (%u)", |
6c483de1 | 2057 | hdev->name, ver.hw_variant); |
cda0dd78 MH |
2058 | return -EINVAL; |
2059 | } | |
2060 | ||
6c483de1 | 2061 | btintel_version_info(hdev, &ver); |
cda0dd78 MH |
2062 | |
2063 | /* The firmware variant determines if the device is in bootloader | |
2064 | * mode or is running operational firmware. The value 0x06 identifies | |
2065 | * the bootloader and the value 0x23 identifies the operational | |
2066 | * firmware. | |
2067 | * | |
2068 | * When the operational firmware is already present, then only | |
2069 | * the check for valid Bluetooth device address is needed. This | |
2070 | * determines if the device will be added as configured or | |
2071 | * unconfigured controller. | |
2072 | * | |
2073 | * It is not possible to use the Secure Boot Parameters in this | |
2074 | * case since that command is only available in bootloader mode. | |
2075 | */ | |
6c483de1 | 2076 | if (ver.fw_variant == 0x23) { |
cda0dd78 | 2077 | clear_bit(BTUSB_BOOTLOADER, &data->flags); |
4185a0f5 | 2078 | btintel_check_bdaddr(hdev); |
cda0dd78 MH |
2079 | return 0; |
2080 | } | |
2081 | ||
2082 | /* If the device is not in bootloader mode, then the only possible | |
2083 | * choice is to return an error and abort the device initialization. | |
2084 | */ | |
6c483de1 | 2085 | if (ver.fw_variant != 0x06) { |
cda0dd78 | 2086 | BT_ERR("%s: Unsupported Intel firmware variant (%u)", |
6c483de1 | 2087 | hdev->name, ver.fw_variant); |
cda0dd78 MH |
2088 | return -ENODEV; |
2089 | } | |
2090 | ||
cda0dd78 MH |
2091 | /* Read the secure boot parameters to identify the operating |
2092 | * details of the bootloader. | |
2093 | */ | |
2094 | skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT); | |
2095 | if (IS_ERR(skb)) { | |
2096 | BT_ERR("%s: Reading Intel boot parameters failed (%ld)", | |
2097 | hdev->name, PTR_ERR(skb)); | |
2098 | return PTR_ERR(skb); | |
2099 | } | |
2100 | ||
2101 | if (skb->len != sizeof(*params)) { | |
2102 | BT_ERR("%s: Intel boot parameters size mismatch", hdev->name); | |
2103 | kfree_skb(skb); | |
2104 | return -EILSEQ; | |
2105 | } | |
2106 | ||
2107 | params = (struct intel_boot_params *)skb->data; | |
cda0dd78 | 2108 | |
2064ee33 MH |
2109 | bt_dev_info(hdev, "Device revision is %u", |
2110 | le16_to_cpu(params->dev_revid)); | |
cda0dd78 | 2111 | |
2064ee33 MH |
2112 | bt_dev_info(hdev, "Secure boot is %s", |
2113 | params->secure_boot ? "enabled" : "disabled"); | |
cda0dd78 | 2114 | |
2064ee33 MH |
2115 | bt_dev_info(hdev, "OTP lock is %s", |
2116 | params->otp_lock ? "enabled" : "disabled"); | |
2220994e | 2117 | |
2064ee33 MH |
2118 | bt_dev_info(hdev, "API lock is %s", |
2119 | params->api_lock ? "enabled" : "disabled"); | |
2220994e | 2120 | |
2064ee33 MH |
2121 | bt_dev_info(hdev, "Debug lock is %s", |
2122 | params->debug_lock ? "enabled" : "disabled"); | |
2220994e | 2123 | |
2064ee33 MH |
2124 | bt_dev_info(hdev, "Minimum firmware build %u week %u %u", |
2125 | params->min_fw_build_nn, params->min_fw_build_cw, | |
2126 | 2000 + params->min_fw_build_yy); | |
cda0dd78 MH |
2127 | |
2128 | /* It is required that every single firmware fragment is acknowledged | |
2129 | * with a command complete event. If the boot parameters indicate | |
2130 | * that this bootloader does not send them, then abort the setup. | |
2131 | */ | |
2132 | if (params->limited_cce != 0x00) { | |
2133 | BT_ERR("%s: Unsupported Intel firmware loading method (%u)", | |
2134 | hdev->name, params->limited_cce); | |
2135 | kfree_skb(skb); | |
2136 | return -EINVAL; | |
2137 | } | |
2138 | ||
2139 | /* If the OTP has no valid Bluetooth device address, then there will | |
2140 | * also be no valid address for the operational firmware. | |
2141 | */ | |
2142 | if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) { | |
2064ee33 | 2143 | bt_dev_info(hdev, "No device address configured"); |
cda0dd78 MH |
2144 | set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks); |
2145 | } | |
2146 | ||
2147 | /* With this Intel bootloader only the hardware variant and device | |
2148 | * revision information are used to select the right firmware. | |
2149 | * | |
230b04ac THJA |
2150 | * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi. |
2151 | * | |
2152 | * Currently the supported hardware variants are: | |
2153 | * 11 (0x0b) for iBT3.0 (LnP/SfP) | |
2154 | * 12 (0x0c) for iBT3.5 (WsP) | |
86a6129a THJA |
2155 | * 17 (0x11) for iBT3.5 (JfP) |
2156 | * 18 (0x12) for iBT3.5 (ThP) | |
cda0dd78 | 2157 | */ |
230b04ac THJA |
2158 | snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi", |
2159 | le16_to_cpu(ver.hw_variant), | |
cda0dd78 MH |
2160 | le16_to_cpu(params->dev_revid)); |
2161 | ||
2162 | err = request_firmware(&fw, fwname, &hdev->dev); | |
2163 | if (err < 0) { | |
2164 | BT_ERR("%s: Failed to load Intel firmware file (%d)", | |
2165 | hdev->name, err); | |
2166 | kfree_skb(skb); | |
2167 | return err; | |
2168 | } | |
2169 | ||
2064ee33 | 2170 | bt_dev_info(hdev, "Found device firmware: %s", fwname); |
cda0dd78 | 2171 | |
52cc9168 THJA |
2172 | /* Save the DDC file name for later use to apply once the firmware |
2173 | * downloading is done. | |
2174 | */ | |
230b04ac THJA |
2175 | snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc", |
2176 | le16_to_cpu(ver.hw_variant), | |
52cc9168 THJA |
2177 | le16_to_cpu(params->dev_revid)); |
2178 | ||
cda0dd78 MH |
2179 | kfree_skb(skb); |
2180 | ||
2181 | if (fw->size < 644) { | |
2182 | BT_ERR("%s: Invalid size of firmware file (%zu)", | |
2183 | hdev->name, fw->size); | |
2184 | err = -EBADF; | |
2185 | goto done; | |
2186 | } | |
2187 | ||
2188 | set_bit(BTUSB_DOWNLOADING, &data->flags); | |
2189 | ||
2190 | /* Start the firmware download transaction with the Init fragment | |
2191 | * represented by the 128 bytes of CSS header. | |
2192 | */ | |
09df123d | 2193 | err = btintel_secure_send(hdev, 0x00, 128, fw->data); |
cda0dd78 MH |
2194 | if (err < 0) { |
2195 | BT_ERR("%s: Failed to send firmware header (%d)", | |
2196 | hdev->name, err); | |
2197 | goto done; | |
2198 | } | |
2199 | ||
2200 | /* Send the 256 bytes of public key information from the firmware | |
2201 | * as the PKey fragment. | |
2202 | */ | |
09df123d | 2203 | err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128); |
cda0dd78 MH |
2204 | if (err < 0) { |
2205 | BT_ERR("%s: Failed to send firmware public key (%d)", | |
2206 | hdev->name, err); | |
2207 | goto done; | |
2208 | } | |
2209 | ||
2210 | /* Send the 256 bytes of signature information from the firmware | |
2211 | * as the Sign fragment. | |
2212 | */ | |
09df123d | 2213 | err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388); |
cda0dd78 MH |
2214 | if (err < 0) { |
2215 | BT_ERR("%s: Failed to send firmware signature (%d)", | |
2216 | hdev->name, err); | |
2217 | goto done; | |
2218 | } | |
2219 | ||
2220 | fw_ptr = fw->data + 644; | |
e66890a9 | 2221 | frag_len = 0; |
cda0dd78 MH |
2222 | |
2223 | while (fw_ptr - fw->data < fw->size) { | |
e66890a9 | 2224 | struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len); |
cda0dd78 | 2225 | |
e66890a9 | 2226 | frag_len += sizeof(*cmd) + cmd->plen; |
cda0dd78 | 2227 | |
5075edae | 2228 | /* The parameter length of the secure send command requires |
e66890a9 MH |
2229 | * a 4 byte alignment. It happens so that the firmware file |
2230 | * contains proper Intel_NOP commands to align the fragments | |
2231 | * as needed. | |
2232 | * | |
2233 | * Send set of commands with 4 byte alignment from the | |
2234 | * firmware data buffer as a single Data fragement. | |
cda0dd78 | 2235 | */ |
e66890a9 | 2236 | if (!(frag_len % 4)) { |
09df123d | 2237 | err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr); |
e66890a9 MH |
2238 | if (err < 0) { |
2239 | BT_ERR("%s: Failed to send firmware data (%d)", | |
2240 | hdev->name, err); | |
2241 | goto done; | |
2242 | } | |
cda0dd78 | 2243 | |
e66890a9 MH |
2244 | fw_ptr += frag_len; |
2245 | frag_len = 0; | |
2246 | } | |
cda0dd78 MH |
2247 | } |
2248 | ||
ce6bb929 MH |
2249 | set_bit(BTUSB_FIRMWARE_LOADED, &data->flags); |
2250 | ||
2064ee33 | 2251 | bt_dev_info(hdev, "Waiting for firmware download to complete"); |
a087a98e | 2252 | |
cda0dd78 MH |
2253 | /* Before switching the device into operational mode and with that |
2254 | * booting the loaded firmware, wait for the bootloader notification | |
2255 | * that all fragments have been successfully received. | |
2256 | * | |
a087a98e JH |
2257 | * When the event processing receives the notification, then the |
2258 | * BTUSB_DOWNLOADING flag will be cleared. | |
2259 | * | |
2260 | * The firmware loading should not take longer than 5 seconds | |
2261 | * and thus just timeout if that happens and fail the setup | |
2262 | * of this device. | |
cda0dd78 | 2263 | */ |
129a7693 JH |
2264 | err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING, |
2265 | TASK_INTERRUPTIBLE, | |
2266 | msecs_to_jiffies(5000)); | |
f0a70a04 | 2267 | if (err == -EINTR) { |
a087a98e | 2268 | BT_ERR("%s: Firmware loading interrupted", hdev->name); |
a087a98e JH |
2269 | goto done; |
2270 | } | |
cda0dd78 | 2271 | |
a087a98e JH |
2272 | if (err) { |
2273 | BT_ERR("%s: Firmware loading timeout", hdev->name); | |
2274 | err = -ETIMEDOUT; | |
2275 | goto done; | |
cda0dd78 MH |
2276 | } |
2277 | ||
2278 | if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) { | |
2279 | BT_ERR("%s: Firmware loading failed", hdev->name); | |
2280 | err = -ENOEXEC; | |
2281 | goto done; | |
2282 | } | |
2283 | ||
2284 | rettime = ktime_get(); | |
2285 | delta = ktime_sub(rettime, calltime); | |
2286 | duration = (unsigned long long) ktime_to_ns(delta) >> 10; | |
2287 | ||
2064ee33 | 2288 | bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration); |
cda0dd78 MH |
2289 | |
2290 | done: | |
2291 | release_firmware(fw); | |
2292 | ||
2293 | if (err < 0) | |
2294 | return err; | |
2295 | ||
2296 | calltime = ktime_get(); | |
2297 | ||
2298 | set_bit(BTUSB_BOOTING, &data->flags); | |
2299 | ||
2300 | skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param, | |
2301 | HCI_INIT_TIMEOUT); | |
2302 | if (IS_ERR(skb)) | |
2303 | return PTR_ERR(skb); | |
2304 | ||
2305 | kfree_skb(skb); | |
2306 | ||
2307 | /* The bootloader will not indicate when the device is ready. This | |
2308 | * is done by the operational firmware sending bootup notification. | |
fad70972 JH |
2309 | * |
2310 | * Booting into operational firmware should not take longer than | |
2311 | * 1 second. However if that happens, then just fail the setup | |
2312 | * since something went wrong. | |
cda0dd78 | 2313 | */ |
2064ee33 | 2314 | bt_dev_info(hdev, "Waiting for device to boot"); |
cda0dd78 | 2315 | |
129a7693 JH |
2316 | err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING, |
2317 | TASK_INTERRUPTIBLE, | |
2318 | msecs_to_jiffies(1000)); | |
cda0dd78 | 2319 | |
f0a70a04 | 2320 | if (err == -EINTR) { |
fad70972 JH |
2321 | BT_ERR("%s: Device boot interrupted", hdev->name); |
2322 | return -EINTR; | |
2323 | } | |
cda0dd78 | 2324 | |
fad70972 JH |
2325 | if (err) { |
2326 | BT_ERR("%s: Device boot timeout", hdev->name); | |
2327 | return -ETIMEDOUT; | |
cda0dd78 MH |
2328 | } |
2329 | ||
2330 | rettime = ktime_get(); | |
2331 | delta = ktime_sub(rettime, calltime); | |
2332 | duration = (unsigned long long) ktime_to_ns(delta) >> 10; | |
2333 | ||
2064ee33 | 2334 | bt_dev_info(hdev, "Device booted in %llu usecs", duration); |
cda0dd78 MH |
2335 | |
2336 | clear_bit(BTUSB_BOOTLOADER, &data->flags); | |
2337 | ||
52cc9168 THJA |
2338 | /* Once the device is running in operational mode, it needs to apply |
2339 | * the device configuration (DDC) parameters. | |
2340 | * | |
2341 | * The device can work without DDC parameters, so even if it fails | |
2342 | * to load the file, no need to fail the setup. | |
2343 | */ | |
e924d3d6 | 2344 | btintel_load_ddc_config(hdev, fwname); |
52cc9168 | 2345 | |
213445b2 MH |
2346 | /* Set the event mask for Intel specific vendor events. This enables |
2347 | * a few extra events that are useful during general operation. It | |
2348 | * does not enable any debugging related events. | |
2349 | * | |
2350 | * The device will function correctly without these events enabled | |
2351 | * and thus no need to fail the setup. | |
2352 | */ | |
2353 | btintel_set_event_mask(hdev, false); | |
2354 | ||
cda0dd78 MH |
2355 | return 0; |
2356 | } | |
2357 | ||
bfbd45e9 THJA |
2358 | static int btusb_shutdown_intel(struct hci_dev *hdev) |
2359 | { | |
2360 | struct sk_buff *skb; | |
2361 | long ret; | |
2362 | ||
2363 | /* Some platforms have an issue with BT LED when the interface is | |
2364 | * down or BT radio is turned off, which takes 5 seconds to BT LED | |
2365 | * goes off. This command turns off the BT LED immediately. | |
2366 | */ | |
2367 | skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT); | |
2368 | if (IS_ERR(skb)) { | |
2369 | ret = PTR_ERR(skb); | |
2370 | BT_ERR("%s: turning off Intel device LED failed (%ld)", | |
2371 | hdev->name, ret); | |
2372 | return ret; | |
2373 | } | |
2374 | kfree_skb(skb); | |
2375 | ||
2376 | return 0; | |
2377 | } | |
2378 | ||
a4ccc9e3 RJ |
2379 | #ifdef CONFIG_PM |
2380 | /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */ | |
2381 | static int marvell_config_oob_wake(struct hci_dev *hdev) | |
2382 | { | |
2383 | struct sk_buff *skb; | |
2384 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2385 | struct device *dev = &data->udev->dev; | |
2386 | u16 pin, gap, opcode; | |
2387 | int ret; | |
2388 | u8 cmd[5]; | |
2389 | ||
2390 | /* Move on if no wakeup pin specified */ | |
2391 | if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) || | |
2392 | of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap)) | |
2393 | return 0; | |
2394 | ||
2395 | /* Vendor specific command to configure a GPIO as wake-up pin */ | |
2396 | opcode = hci_opcode_pack(0x3F, 0x59); | |
2397 | cmd[0] = opcode & 0xFF; | |
2398 | cmd[1] = opcode >> 8; | |
2399 | cmd[2] = 2; /* length of parameters that follow */ | |
2400 | cmd[3] = pin; | |
2401 | cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */ | |
2402 | ||
2403 | skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL); | |
2404 | if (!skb) { | |
2405 | bt_dev_err(hdev, "%s: No memory\n", __func__); | |
2406 | return -ENOMEM; | |
2407 | } | |
2408 | ||
59ae1d12 | 2409 | skb_put_data(skb, cmd, sizeof(cmd)); |
a4ccc9e3 RJ |
2410 | hci_skb_pkt_type(skb) = HCI_COMMAND_PKT; |
2411 | ||
2412 | ret = btusb_send_frame(hdev, skb); | |
2413 | if (ret) { | |
2414 | bt_dev_err(hdev, "%s: configuration failed\n", __func__); | |
2415 | kfree_skb(skb); | |
2416 | return ret; | |
2417 | } | |
2418 | ||
2419 | return 0; | |
2420 | } | |
2421 | #endif | |
2422 | ||
ae8df494 AK |
2423 | static int btusb_set_bdaddr_marvell(struct hci_dev *hdev, |
2424 | const bdaddr_t *bdaddr) | |
2425 | { | |
2426 | struct sk_buff *skb; | |
2427 | u8 buf[8]; | |
2428 | long ret; | |
2429 | ||
2430 | buf[0] = 0xfe; | |
2431 | buf[1] = sizeof(bdaddr_t); | |
2432 | memcpy(buf + 2, bdaddr, sizeof(bdaddr_t)); | |
2433 | ||
2434 | skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT); | |
2435 | if (IS_ERR(skb)) { | |
2436 | ret = PTR_ERR(skb); | |
2064ee33 MH |
2437 | bt_dev_err(hdev, "changing Marvell device address failed (%ld)", |
2438 | ret); | |
ae8df494 AK |
2439 | return ret; |
2440 | } | |
2441 | kfree_skb(skb); | |
2442 | ||
2443 | return 0; | |
2444 | } | |
2445 | ||
5859223e TK |
2446 | static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev, |
2447 | const bdaddr_t *bdaddr) | |
2448 | { | |
2449 | struct sk_buff *skb; | |
2450 | u8 buf[10]; | |
2451 | long ret; | |
2452 | ||
2453 | buf[0] = 0x01; | |
2454 | buf[1] = 0x01; | |
2455 | buf[2] = 0x00; | |
2456 | buf[3] = sizeof(bdaddr_t); | |
2457 | memcpy(buf + 4, bdaddr, sizeof(bdaddr_t)); | |
2458 | ||
2459 | skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT); | |
2460 | if (IS_ERR(skb)) { | |
2461 | ret = PTR_ERR(skb); | |
2064ee33 | 2462 | bt_dev_err(hdev, "Change address command failed (%ld)", ret); |
5859223e TK |
2463 | return ret; |
2464 | } | |
2465 | kfree_skb(skb); | |
2466 | ||
2467 | return 0; | |
2468 | } | |
2469 | ||
3267c884 KBYT |
2470 | #define QCA_DFU_PACKET_LEN 4096 |
2471 | ||
2472 | #define QCA_GET_TARGET_VERSION 0x09 | |
2473 | #define QCA_CHECK_STATUS 0x05 | |
2474 | #define QCA_DFU_DOWNLOAD 0x01 | |
2475 | ||
2476 | #define QCA_SYSCFG_UPDATED 0x40 | |
2477 | #define QCA_PATCH_UPDATED 0x80 | |
2478 | #define QCA_DFU_TIMEOUT 3000 | |
2479 | ||
2480 | struct qca_version { | |
2481 | __le32 rom_version; | |
2482 | __le32 patch_version; | |
2483 | __le32 ram_version; | |
2484 | __le32 ref_clock; | |
2485 | __u8 reserved[4]; | |
2486 | } __packed; | |
2487 | ||
2488 | struct qca_rampatch_version { | |
2489 | __le16 rom_version; | |
2490 | __le16 patch_version; | |
2491 | } __packed; | |
2492 | ||
2493 | struct qca_device_info { | |
bf906b3d KBYT |
2494 | u32 rom_version; |
2495 | u8 rampatch_hdr; /* length of header in rampatch */ | |
2496 | u8 nvm_hdr; /* length of header in NVM */ | |
2497 | u8 ver_offset; /* offset of version structure in rampatch */ | |
3267c884 KBYT |
2498 | }; |
2499 | ||
2500 | static const struct qca_device_info qca_devices_table[] = { | |
2501 | { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */ | |
2502 | { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */ | |
7f6e6363 | 2503 | { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */ |
3267c884 KBYT |
2504 | { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */ |
2505 | { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */ | |
2506 | { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */ | |
2507 | }; | |
2508 | ||
2509 | static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request, | |
2510 | void *data, u16 size) | |
2511 | { | |
2512 | struct btusb_data *btdata = hci_get_drvdata(hdev); | |
2513 | struct usb_device *udev = btdata->udev; | |
2514 | int pipe, err; | |
2515 | u8 *buf; | |
2516 | ||
2517 | buf = kmalloc(size, GFP_KERNEL); | |
2518 | if (!buf) | |
2519 | return -ENOMEM; | |
2520 | ||
2521 | /* Found some of USB hosts have IOT issues with ours so that we should | |
2522 | * not wait until HCI layer is ready. | |
2523 | */ | |
2524 | pipe = usb_rcvctrlpipe(udev, 0); | |
2525 | err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN, | |
2526 | 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); | |
2527 | if (err < 0) { | |
2064ee33 | 2528 | bt_dev_err(hdev, "Failed to access otp area (%d)", err); |
3267c884 KBYT |
2529 | goto done; |
2530 | } | |
2531 | ||
2532 | memcpy(data, buf, size); | |
2533 | ||
2534 | done: | |
2535 | kfree(buf); | |
2536 | ||
2537 | return err; | |
2538 | } | |
2539 | ||
2540 | static int btusb_setup_qca_download_fw(struct hci_dev *hdev, | |
2541 | const struct firmware *firmware, | |
2542 | size_t hdr_size) | |
2543 | { | |
2544 | struct btusb_data *btdata = hci_get_drvdata(hdev); | |
2545 | struct usb_device *udev = btdata->udev; | |
2546 | size_t count, size, sent = 0; | |
2547 | int pipe, len, err; | |
2548 | u8 *buf; | |
2549 | ||
2550 | buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL); | |
2551 | if (!buf) | |
2552 | return -ENOMEM; | |
2553 | ||
2554 | count = firmware->size; | |
2555 | ||
2556 | size = min_t(size_t, count, hdr_size); | |
2557 | memcpy(buf, firmware->data, size); | |
2558 | ||
2559 | /* USB patches should go down to controller through USB path | |
2560 | * because binary format fits to go down through USB channel. | |
2561 | * USB control path is for patching headers and USB bulk is for | |
2562 | * patch body. | |
2563 | */ | |
2564 | pipe = usb_sndctrlpipe(udev, 0); | |
2565 | err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR, | |
2566 | 0, 0, buf, size, USB_CTRL_SET_TIMEOUT); | |
2567 | if (err < 0) { | |
2064ee33 | 2568 | bt_dev_err(hdev, "Failed to send headers (%d)", err); |
3267c884 KBYT |
2569 | goto done; |
2570 | } | |
2571 | ||
2572 | sent += size; | |
2573 | count -= size; | |
2574 | ||
2575 | while (count) { | |
2576 | size = min_t(size_t, count, QCA_DFU_PACKET_LEN); | |
2577 | ||
2578 | memcpy(buf, firmware->data + sent, size); | |
2579 | ||
2580 | pipe = usb_sndbulkpipe(udev, 0x02); | |
2581 | err = usb_bulk_msg(udev, pipe, buf, size, &len, | |
2582 | QCA_DFU_TIMEOUT); | |
2583 | if (err < 0) { | |
2064ee33 MH |
2584 | bt_dev_err(hdev, "Failed to send body at %zd of %zd (%d)", |
2585 | sent, firmware->size, err); | |
3267c884 KBYT |
2586 | break; |
2587 | } | |
2588 | ||
2589 | if (size != len) { | |
2064ee33 | 2590 | bt_dev_err(hdev, "Failed to get bulk buffer"); |
3267c884 KBYT |
2591 | err = -EILSEQ; |
2592 | break; | |
2593 | } | |
2594 | ||
2595 | sent += size; | |
2596 | count -= size; | |
2597 | } | |
2598 | ||
2599 | done: | |
2600 | kfree(buf); | |
2601 | return err; | |
2602 | } | |
2603 | ||
2604 | static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev, | |
2605 | struct qca_version *ver, | |
2606 | const struct qca_device_info *info) | |
2607 | { | |
2608 | struct qca_rampatch_version *rver; | |
2609 | const struct firmware *fw; | |
bf906b3d KBYT |
2610 | u32 ver_rom, ver_patch; |
2611 | u16 rver_rom, rver_patch; | |
3267c884 KBYT |
2612 | char fwname[64]; |
2613 | int err; | |
2614 | ||
bf906b3d KBYT |
2615 | ver_rom = le32_to_cpu(ver->rom_version); |
2616 | ver_patch = le32_to_cpu(ver->patch_version); | |
2617 | ||
2618 | snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom); | |
3267c884 KBYT |
2619 | |
2620 | err = request_firmware(&fw, fwname, &hdev->dev); | |
2621 | if (err) { | |
2064ee33 MH |
2622 | bt_dev_err(hdev, "failed to request rampatch file: %s (%d)", |
2623 | fwname, err); | |
3267c884 KBYT |
2624 | return err; |
2625 | } | |
2626 | ||
2064ee33 | 2627 | bt_dev_info(hdev, "using rampatch file: %s", fwname); |
bf906b3d | 2628 | |
3267c884 | 2629 | rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset); |
bf906b3d KBYT |
2630 | rver_rom = le16_to_cpu(rver->rom_version); |
2631 | rver_patch = le16_to_cpu(rver->patch_version); | |
2632 | ||
2064ee33 MH |
2633 | bt_dev_info(hdev, "QCA: patch rome 0x%x build 0x%x, " |
2634 | "firmware rome 0x%x build 0x%x", | |
2635 | rver_rom, rver_patch, ver_rom, ver_patch); | |
3267c884 | 2636 | |
bf906b3d | 2637 | if (rver_rom != ver_rom || rver_patch <= ver_patch) { |
2064ee33 | 2638 | bt_dev_err(hdev, "rampatch file version did not match with firmware"); |
3267c884 KBYT |
2639 | err = -EINVAL; |
2640 | goto done; | |
2641 | } | |
2642 | ||
2643 | err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr); | |
2644 | ||
2645 | done: | |
2646 | release_firmware(fw); | |
2647 | ||
2648 | return err; | |
2649 | } | |
2650 | ||
2651 | static int btusb_setup_qca_load_nvm(struct hci_dev *hdev, | |
2652 | struct qca_version *ver, | |
2653 | const struct qca_device_info *info) | |
2654 | { | |
2655 | const struct firmware *fw; | |
2656 | char fwname[64]; | |
2657 | int err; | |
2658 | ||
2659 | snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin", | |
2660 | le32_to_cpu(ver->rom_version)); | |
2661 | ||
2662 | err = request_firmware(&fw, fwname, &hdev->dev); | |
2663 | if (err) { | |
2064ee33 MH |
2664 | bt_dev_err(hdev, "failed to request NVM file: %s (%d)", |
2665 | fwname, err); | |
3267c884 KBYT |
2666 | return err; |
2667 | } | |
2668 | ||
2064ee33 | 2669 | bt_dev_info(hdev, "using NVM file: %s", fwname); |
3267c884 KBYT |
2670 | |
2671 | err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr); | |
2672 | ||
2673 | release_firmware(fw); | |
2674 | ||
2675 | return err; | |
2676 | } | |
2677 | ||
2678 | static int btusb_setup_qca(struct hci_dev *hdev) | |
2679 | { | |
2680 | const struct qca_device_info *info = NULL; | |
2681 | struct qca_version ver; | |
bf906b3d | 2682 | u32 ver_rom; |
3267c884 KBYT |
2683 | u8 status; |
2684 | int i, err; | |
2685 | ||
2686 | err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver, | |
eb50042f | 2687 | sizeof(ver)); |
3267c884 KBYT |
2688 | if (err < 0) |
2689 | return err; | |
2690 | ||
bf906b3d | 2691 | ver_rom = le32_to_cpu(ver.rom_version); |
3267c884 | 2692 | for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) { |
bf906b3d | 2693 | if (ver_rom == qca_devices_table[i].rom_version) |
3267c884 KBYT |
2694 | info = &qca_devices_table[i]; |
2695 | } | |
2696 | if (!info) { | |
2064ee33 | 2697 | bt_dev_err(hdev, "don't support firmware rome 0x%x", ver_rom); |
3267c884 KBYT |
2698 | return -ENODEV; |
2699 | } | |
2700 | ||
2701 | err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status, | |
2702 | sizeof(status)); | |
2703 | if (err < 0) | |
2704 | return err; | |
2705 | ||
2706 | if (!(status & QCA_PATCH_UPDATED)) { | |
2707 | err = btusb_setup_qca_load_rampatch(hdev, &ver, info); | |
2708 | if (err < 0) | |
2709 | return err; | |
2710 | } | |
2711 | ||
2712 | if (!(status & QCA_SYSCFG_UPDATED)) { | |
2713 | err = btusb_setup_qca_load_nvm(hdev, &ver, info); | |
2714 | if (err < 0) | |
2715 | return err; | |
2716 | } | |
2717 | ||
2718 | return 0; | |
2719 | } | |
2720 | ||
9d08f504 MH |
2721 | #ifdef CONFIG_BT_HCIBTUSB_BCM |
2722 | static inline int __set_diag_interface(struct hci_dev *hdev) | |
2723 | { | |
2724 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2725 | struct usb_interface *intf = data->diag; | |
2726 | int i; | |
2727 | ||
2728 | if (!data->diag) | |
2729 | return -ENODEV; | |
2730 | ||
2731 | data->diag_tx_ep = NULL; | |
2732 | data->diag_rx_ep = NULL; | |
2733 | ||
2734 | for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { | |
2735 | struct usb_endpoint_descriptor *ep_desc; | |
2736 | ||
2737 | ep_desc = &intf->cur_altsetting->endpoint[i].desc; | |
2738 | ||
2739 | if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { | |
2740 | data->diag_tx_ep = ep_desc; | |
2741 | continue; | |
2742 | } | |
2743 | ||
2744 | if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { | |
2745 | data->diag_rx_ep = ep_desc; | |
2746 | continue; | |
2747 | } | |
2748 | } | |
2749 | ||
2750 | if (!data->diag_tx_ep || !data->diag_rx_ep) { | |
2064ee33 | 2751 | bt_dev_err(hdev, "invalid diagnostic descriptors"); |
9d08f504 MH |
2752 | return -ENODEV; |
2753 | } | |
2754 | ||
2755 | return 0; | |
2756 | } | |
2757 | ||
2758 | static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable) | |
2759 | { | |
2760 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2761 | struct sk_buff *skb; | |
2762 | struct urb *urb; | |
2763 | unsigned int pipe; | |
2764 | ||
2765 | if (!data->diag_tx_ep) | |
2766 | return ERR_PTR(-ENODEV); | |
2767 | ||
2768 | urb = usb_alloc_urb(0, GFP_KERNEL); | |
2769 | if (!urb) | |
2770 | return ERR_PTR(-ENOMEM); | |
2771 | ||
2772 | skb = bt_skb_alloc(2, GFP_KERNEL); | |
2773 | if (!skb) { | |
2774 | usb_free_urb(urb); | |
2775 | return ERR_PTR(-ENOMEM); | |
2776 | } | |
2777 | ||
634fef61 JB |
2778 | skb_put_u8(skb, 0xf0); |
2779 | skb_put_u8(skb, enable); | |
9d08f504 MH |
2780 | |
2781 | pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress); | |
2782 | ||
2783 | usb_fill_bulk_urb(urb, data->udev, pipe, | |
2784 | skb->data, skb->len, btusb_tx_complete, skb); | |
2785 | ||
2786 | skb->dev = (void *)hdev; | |
2787 | ||
2788 | return urb; | |
2789 | } | |
2790 | ||
2791 | static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable) | |
2792 | { | |
2793 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2794 | struct urb *urb; | |
2795 | ||
2796 | if (!data->diag) | |
2797 | return -ENODEV; | |
2798 | ||
2799 | if (!test_bit(HCI_RUNNING, &hdev->flags)) | |
2800 | return -ENETDOWN; | |
2801 | ||
2802 | urb = alloc_diag_urb(hdev, enable); | |
2803 | if (IS_ERR(urb)) | |
2804 | return PTR_ERR(urb); | |
2805 | ||
2806 | return submit_or_queue_tx_urb(hdev, urb); | |
2807 | } | |
2808 | #endif | |
2809 | ||
fd913ef7 RJ |
2810 | #ifdef CONFIG_PM |
2811 | static irqreturn_t btusb_oob_wake_handler(int irq, void *priv) | |
2812 | { | |
2813 | struct btusb_data *data = priv; | |
2814 | ||
2815 | pm_wakeup_event(&data->udev->dev, 0); | |
017789f3 | 2816 | pm_system_wakeup(); |
fd913ef7 RJ |
2817 | |
2818 | /* Disable only if not already disabled (keep it balanced) */ | |
2819 | if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { | |
2820 | disable_irq_nosync(irq); | |
2821 | disable_irq_wake(irq); | |
2822 | } | |
2823 | return IRQ_HANDLED; | |
2824 | } | |
2825 | ||
2826 | static const struct of_device_id btusb_match_table[] = { | |
2827 | { .compatible = "usb1286,204e" }, | |
2828 | { } | |
2829 | }; | |
2830 | MODULE_DEVICE_TABLE(of, btusb_match_table); | |
2831 | ||
2832 | /* Use an oob wakeup pin? */ | |
2833 | static int btusb_config_oob_wake(struct hci_dev *hdev) | |
2834 | { | |
2835 | struct btusb_data *data = hci_get_drvdata(hdev); | |
2836 | struct device *dev = &data->udev->dev; | |
2837 | int irq, ret; | |
2838 | ||
2839 | clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); | |
2840 | ||
2841 | if (!of_match_device(btusb_match_table, dev)) | |
2842 | return 0; | |
2843 | ||
2844 | /* Move on if no IRQ specified */ | |
2845 | irq = of_irq_get_byname(dev->of_node, "wakeup"); | |
2846 | if (irq <= 0) { | |
2847 | bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__); | |
2848 | return 0; | |
2849 | } | |
2850 | ||
2851 | ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler, | |
2852 | 0, "OOB Wake-on-BT", data); | |
2853 | if (ret) { | |
2854 | bt_dev_err(hdev, "%s: IRQ request failed", __func__); | |
2855 | return ret; | |
2856 | } | |
2857 | ||
2858 | ret = device_init_wakeup(dev, true); | |
2859 | if (ret) { | |
2860 | bt_dev_err(hdev, "%s: failed to init_wakeup", __func__); | |
2861 | return ret; | |
2862 | } | |
2863 | ||
2864 | data->oob_wake_irq = irq; | |
2865 | disable_irq(irq); | |
2866 | bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq); | |
2867 | return 0; | |
2868 | } | |
2869 | #endif | |
2870 | ||
5e23b923 | 2871 | static int btusb_probe(struct usb_interface *intf, |
89e7533d | 2872 | const struct usb_device_id *id) |
5e23b923 MH |
2873 | { |
2874 | struct usb_endpoint_descriptor *ep_desc; | |
2875 | struct btusb_data *data; | |
2876 | struct hci_dev *hdev; | |
22f8e9db | 2877 | unsigned ifnum_base; |
5e23b923 MH |
2878 | int i, err; |
2879 | ||
2880 | BT_DBG("intf %p id %p", intf, id); | |
2881 | ||
cfeb4145 | 2882 | /* interface numbers are hardcoded in the spec */ |
22f8e9db MH |
2883 | if (intf->cur_altsetting->desc.bInterfaceNumber != 0) { |
2884 | if (!(id->driver_info & BTUSB_IFNUM_2)) | |
2885 | return -ENODEV; | |
2886 | if (intf->cur_altsetting->desc.bInterfaceNumber != 2) | |
2887 | return -ENODEV; | |
2888 | } | |
2889 | ||
2890 | ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber; | |
5e23b923 MH |
2891 | |
2892 | if (!id->driver_info) { | |
2893 | const struct usb_device_id *match; | |
89e7533d | 2894 | |
5e23b923 MH |
2895 | match = usb_match_id(intf, blacklist_table); |
2896 | if (match) | |
2897 | id = match; | |
2898 | } | |
2899 | ||
cfeb4145 MH |
2900 | if (id->driver_info == BTUSB_IGNORE) |
2901 | return -ENODEV; | |
2902 | ||
2d25f8b4 SL |
2903 | if (id->driver_info & BTUSB_ATH3012) { |
2904 | struct usb_device *udev = interface_to_usbdev(intf); | |
2905 | ||
2906 | /* Old firmware would otherwise let ath3k driver load | |
d98422cb DR |
2907 | * patch and sysconfig files |
2908 | */ | |
2d25f8b4 SL |
2909 | if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001) |
2910 | return -ENODEV; | |
2911 | } | |
2912 | ||
98921dbd | 2913 | data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL); |
5e23b923 MH |
2914 | if (!data) |
2915 | return -ENOMEM; | |
2916 | ||
2917 | for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) { | |
2918 | ep_desc = &intf->cur_altsetting->endpoint[i].desc; | |
2919 | ||
2920 | if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) { | |
2921 | data->intr_ep = ep_desc; | |
2922 | continue; | |
2923 | } | |
2924 | ||
2925 | if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) { | |
2926 | data->bulk_tx_ep = ep_desc; | |
2927 | continue; | |
2928 | } | |
2929 | ||
2930 | if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) { | |
2931 | data->bulk_rx_ep = ep_desc; | |
2932 | continue; | |
2933 | } | |
2934 | } | |
2935 | ||
98921dbd | 2936 | if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep) |
5e23b923 | 2937 | return -ENODEV; |
5e23b923 | 2938 | |
893ba544 MH |
2939 | if (id->driver_info & BTUSB_AMP) { |
2940 | data->cmdreq_type = USB_TYPE_CLASS | 0x01; | |
2941 | data->cmdreq = 0x2b; | |
2942 | } else { | |
2943 | data->cmdreq_type = USB_TYPE_CLASS; | |
2944 | data->cmdreq = 0x00; | |
2945 | } | |
7a9d4020 | 2946 | |
5e23b923 | 2947 | data->udev = interface_to_usbdev(intf); |
5fbcd260 | 2948 | data->intf = intf; |
5e23b923 | 2949 | |
5e23b923 | 2950 | INIT_WORK(&data->work, btusb_work); |
7bee549e | 2951 | INIT_WORK(&data->waker, btusb_waker); |
803b5836 MH |
2952 | init_usb_anchor(&data->deferred); |
2953 | init_usb_anchor(&data->tx_anchor); | |
7bee549e | 2954 | spin_lock_init(&data->txlock); |
5e23b923 | 2955 | |
5e23b923 MH |
2956 | init_usb_anchor(&data->intr_anchor); |
2957 | init_usb_anchor(&data->bulk_anchor); | |
9bfa35fe | 2958 | init_usb_anchor(&data->isoc_anchor); |
9d08f504 | 2959 | init_usb_anchor(&data->diag_anchor); |
803b5836 | 2960 | spin_lock_init(&data->rxlock); |
5e23b923 | 2961 | |
cda0dd78 MH |
2962 | if (id->driver_info & BTUSB_INTEL_NEW) { |
2963 | data->recv_event = btusb_recv_event_intel; | |
2964 | data->recv_bulk = btusb_recv_bulk_intel; | |
2965 | set_bit(BTUSB_BOOTLOADER, &data->flags); | |
2966 | } else { | |
2967 | data->recv_event = hci_recv_frame; | |
2968 | data->recv_bulk = btusb_recv_bulk; | |
2969 | } | |
2cbd3f5c | 2970 | |
5e23b923 | 2971 | hdev = hci_alloc_dev(); |
98921dbd | 2972 | if (!hdev) |
5e23b923 | 2973 | return -ENOMEM; |
5e23b923 | 2974 | |
c13854ce | 2975 | hdev->bus = HCI_USB; |
155961e8 | 2976 | hci_set_drvdata(hdev, data); |
5e23b923 | 2977 | |
893ba544 MH |
2978 | if (id->driver_info & BTUSB_AMP) |
2979 | hdev->dev_type = HCI_AMP; | |
2980 | else | |
ca8bee5d | 2981 | hdev->dev_type = HCI_PRIMARY; |
893ba544 | 2982 | |
5e23b923 MH |
2983 | data->hdev = hdev; |
2984 | ||
2985 | SET_HCIDEV_DEV(hdev, &intf->dev); | |
2986 | ||
9f8f962c MH |
2987 | hdev->open = btusb_open; |
2988 | hdev->close = btusb_close; | |
2989 | hdev->flush = btusb_flush; | |
2990 | hdev->send = btusb_send_frame; | |
2991 | hdev->notify = btusb_notify; | |
2992 | ||
fd913ef7 RJ |
2993 | #ifdef CONFIG_PM |
2994 | err = btusb_config_oob_wake(hdev); | |
2995 | if (err) | |
2996 | goto out_free_dev; | |
a4ccc9e3 RJ |
2997 | |
2998 | /* Marvell devices may need a specific chip configuration */ | |
2999 | if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) { | |
3000 | err = marvell_config_oob_wake(hdev); | |
3001 | if (err) | |
3002 | goto out_free_dev; | |
3003 | } | |
fd913ef7 | 3004 | #endif |
418678b0 SJ |
3005 | if (id->driver_info & BTUSB_CW6622) |
3006 | set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); | |
3007 | ||
6c9d435d MH |
3008 | if (id->driver_info & BTUSB_BCM2045) |
3009 | set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks); | |
3010 | ||
9f8f962c MH |
3011 | if (id->driver_info & BTUSB_BCM92035) |
3012 | hdev->setup = btusb_setup_bcm92035; | |
5e23b923 | 3013 | |
c2bfb100 | 3014 | #ifdef CONFIG_BT_HCIBTUSB_BCM |
abbaf50e | 3015 | if (id->driver_info & BTUSB_BCM_PATCHRAM) { |
49a5f782 | 3016 | hdev->manufacturer = 15; |
c2bfb100 | 3017 | hdev->setup = btbcm_setup_patchram; |
9d08f504 | 3018 | hdev->set_diag = btusb_bcm_set_diag; |
1df1f591 | 3019 | hdev->set_bdaddr = btbcm_set_bdaddr; |
9d08f504 MH |
3020 | |
3021 | /* Broadcom LM_DIAG Interface numbers are hardcoded */ | |
22f8e9db | 3022 | data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); |
abbaf50e | 3023 | } |
10d4c673 | 3024 | |
9d08f504 | 3025 | if (id->driver_info & BTUSB_BCM_APPLE) { |
49a5f782 | 3026 | hdev->manufacturer = 15; |
c2bfb100 | 3027 | hdev->setup = btbcm_setup_apple; |
9d08f504 MH |
3028 | hdev->set_diag = btusb_bcm_set_diag; |
3029 | ||
3030 | /* Broadcom LM_DIAG Interface numbers are hardcoded */ | |
22f8e9db | 3031 | data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2); |
9d08f504 | 3032 | } |
c2bfb100 | 3033 | #endif |
17b2772b | 3034 | |
cb8d6597 | 3035 | if (id->driver_info & BTUSB_INTEL) { |
49a5f782 | 3036 | hdev->manufacturer = 2; |
dffd30ee | 3037 | hdev->setup = btusb_setup_intel; |
bfbd45e9 | 3038 | hdev->shutdown = btusb_shutdown_intel; |
3e24767b | 3039 | hdev->set_diag = btintel_set_diag_mfg; |
4185a0f5 | 3040 | hdev->set_bdaddr = btintel_set_bdaddr; |
c33fb9b4 | 3041 | set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); |
c1154842 | 3042 | set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); |
3e24767b | 3043 | set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); |
cb8d6597 | 3044 | } |
dffd30ee | 3045 | |
cda0dd78 | 3046 | if (id->driver_info & BTUSB_INTEL_NEW) { |
49a5f782 | 3047 | hdev->manufacturer = 2; |
cda0dd78 MH |
3048 | hdev->send = btusb_send_frame_intel; |
3049 | hdev->setup = btusb_setup_intel_new; | |
eeb6abe9 | 3050 | hdev->hw_error = btintel_hw_error; |
6d2e50d2 | 3051 | hdev->set_diag = btintel_set_diag; |
4185a0f5 | 3052 | hdev->set_bdaddr = btintel_set_bdaddr; |
b970c5ba | 3053 | set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); |
d8270fbb | 3054 | set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); |
cda0dd78 MH |
3055 | } |
3056 | ||
ae8df494 AK |
3057 | if (id->driver_info & BTUSB_MARVELL) |
3058 | hdev->set_bdaddr = btusb_set_bdaddr_marvell; | |
3059 | ||
661cf88a MH |
3060 | if (id->driver_info & BTUSB_SWAVE) { |
3061 | set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks); | |
d57dbe77 | 3062 | set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks); |
661cf88a | 3063 | } |
d57dbe77 | 3064 | |
e4c534bb MH |
3065 | if (id->driver_info & BTUSB_INTEL_BOOT) { |
3066 | hdev->manufacturer = 2; | |
40df783d | 3067 | set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); |
e4c534bb | 3068 | } |
40df783d | 3069 | |
79f0c87d | 3070 | if (id->driver_info & BTUSB_ATH3012) { |
5859223e | 3071 | hdev->set_bdaddr = btusb_set_bdaddr_ath3012; |
3d50d51a | 3072 | set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); |
79f0c87d JP |
3073 | set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks); |
3074 | } | |
5859223e | 3075 | |
3267c884 KBYT |
3076 | if (id->driver_info & BTUSB_QCA_ROME) { |
3077 | data->setup_on_usb = btusb_setup_qca; | |
3078 | hdev->set_bdaddr = btusb_set_bdaddr_ath3012; | |
fd865802 LL |
3079 | |
3080 | /* QCA Rome devices lose their updated firmware over suspend, | |
3081 | * but the USB hub doesn't notice any status change. | |
3082 | * Explicitly request a device reset on resume. | |
3083 | */ | |
3084 | set_bit(BTUSB_RESET_RESUME, &data->flags); | |
3267c884 KBYT |
3085 | } |
3086 | ||
db33c77d | 3087 | #ifdef CONFIG_BT_HCIBTUSB_RTL |
04b8c814 | 3088 | if (id->driver_info & BTUSB_REALTEK) { |
db33c77d | 3089 | hdev->setup = btrtl_setup_realtek; |
04b8c814 DD |
3090 | |
3091 | /* Realtek devices lose their updated firmware over suspend, | |
3092 | * but the USB hub doesn't notice any status change. | |
3093 | * Explicitly request a device reset on resume. | |
3094 | */ | |
3095 | set_bit(BTUSB_RESET_RESUME, &data->flags); | |
3096 | } | |
db33c77d | 3097 | #endif |
a2698a9b | 3098 | |
893ba544 MH |
3099 | if (id->driver_info & BTUSB_AMP) { |
3100 | /* AMP controllers do not support SCO packets */ | |
3101 | data->isoc = NULL; | |
3102 | } else { | |
22f8e9db MH |
3103 | /* Interface orders are hardcoded in the specification */ |
3104 | data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1); | |
893ba544 | 3105 | } |
9bfa35fe | 3106 | |
7a9d4020 | 3107 | if (!reset) |
a6c511c6 | 3108 | set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); |
cfeb4145 MH |
3109 | |
3110 | if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) { | |
3111 | if (!disable_scofix) | |
3112 | set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks); | |
3113 | } | |
3114 | ||
9bfa35fe MH |
3115 | if (id->driver_info & BTUSB_BROKEN_ISOC) |
3116 | data->isoc = NULL; | |
3117 | ||
7a9d4020 MH |
3118 | if (id->driver_info & BTUSB_DIGIANSWER) { |
3119 | data->cmdreq_type = USB_TYPE_VENDOR; | |
a6c511c6 | 3120 | set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); |
7a9d4020 MH |
3121 | } |
3122 | ||
3123 | if (id->driver_info & BTUSB_CSR) { | |
3124 | struct usb_device *udev = data->udev; | |
81cac64b | 3125 | u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice); |
7a9d4020 MH |
3126 | |
3127 | /* Old firmware would otherwise execute USB reset */ | |
81cac64b | 3128 | if (bcdDevice < 0x117) |
a6c511c6 | 3129 | set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks); |
81cac64b MH |
3130 | |
3131 | /* Fake CSR devices with broken commands */ | |
6cafcd95 | 3132 | if (bcdDevice <= 0x100 || bcdDevice == 0x134) |
81cac64b | 3133 | hdev->setup = btusb_setup_csr; |
49c989a0 JP |
3134 | |
3135 | set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); | |
7a9d4020 MH |
3136 | } |
3137 | ||
cfeb4145 | 3138 | if (id->driver_info & BTUSB_SNIFFER) { |
9bfa35fe | 3139 | struct usb_device *udev = data->udev; |
cfeb4145 | 3140 | |
7a9d4020 | 3141 | /* New sniffer firmware has crippled HCI interface */ |
cfeb4145 MH |
3142 | if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997) |
3143 | set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks); | |
3144 | } | |
3145 | ||
3a5ef20c MH |
3146 | if (id->driver_info & BTUSB_INTEL_BOOT) { |
3147 | /* A bug in the bootloader causes that interrupt interface is | |
3148 | * only enabled after receiving SetInterface(0, AltSetting=0). | |
3149 | */ | |
3150 | err = usb_set_interface(data->udev, 0, 0); | |
3151 | if (err < 0) { | |
3152 | BT_ERR("failed to set interface 0, alt 0 %d", err); | |
10ab133b | 3153 | goto out_free_dev; |
3a5ef20c MH |
3154 | } |
3155 | } | |
3156 | ||
9bfa35fe MH |
3157 | if (data->isoc) { |
3158 | err = usb_driver_claim_interface(&btusb_driver, | |
89e7533d | 3159 | data->isoc, data); |
10ab133b RJ |
3160 | if (err < 0) |
3161 | goto out_free_dev; | |
9bfa35fe MH |
3162 | } |
3163 | ||
9d08f504 MH |
3164 | #ifdef CONFIG_BT_HCIBTUSB_BCM |
3165 | if (data->diag) { | |
3166 | if (!usb_driver_claim_interface(&btusb_driver, | |
3167 | data->diag, data)) | |
3168 | __set_diag_interface(hdev); | |
3169 | else | |
3170 | data->diag = NULL; | |
3171 | } | |
3172 | #endif | |
3173 | ||
5e23b923 | 3174 | err = hci_register_dev(hdev); |
10ab133b RJ |
3175 | if (err < 0) |
3176 | goto out_free_dev; | |
5e23b923 MH |
3177 | |
3178 | usb_set_intfdata(intf, data); | |
3179 | ||
3180 | return 0; | |
10ab133b RJ |
3181 | |
3182 | out_free_dev: | |
3183 | hci_free_dev(hdev); | |
3184 | return err; | |
5e23b923 MH |
3185 | } |
3186 | ||
3187 | static void btusb_disconnect(struct usb_interface *intf) | |
3188 | { | |
3189 | struct btusb_data *data = usb_get_intfdata(intf); | |
3190 | struct hci_dev *hdev; | |
3191 | ||
3192 | BT_DBG("intf %p", intf); | |
3193 | ||
3194 | if (!data) | |
3195 | return; | |
3196 | ||
3197 | hdev = data->hdev; | |
5fbcd260 MH |
3198 | usb_set_intfdata(data->intf, NULL); |
3199 | ||
3200 | if (data->isoc) | |
3201 | usb_set_intfdata(data->isoc, NULL); | |
5e23b923 | 3202 | |
9d08f504 MH |
3203 | if (data->diag) |
3204 | usb_set_intfdata(data->diag, NULL); | |
3205 | ||
5e23b923 MH |
3206 | hci_unregister_dev(hdev); |
3207 | ||
9d08f504 MH |
3208 | if (intf == data->intf) { |
3209 | if (data->isoc) | |
3210 | usb_driver_release_interface(&btusb_driver, data->isoc); | |
3211 | if (data->diag) | |
3212 | usb_driver_release_interface(&btusb_driver, data->diag); | |
3213 | } else if (intf == data->isoc) { | |
3214 | if (data->diag) | |
3215 | usb_driver_release_interface(&btusb_driver, data->diag); | |
5fbcd260 | 3216 | usb_driver_release_interface(&btusb_driver, data->intf); |
9d08f504 MH |
3217 | } else if (intf == data->diag) { |
3218 | usb_driver_release_interface(&btusb_driver, data->intf); | |
3219 | if (data->isoc) | |
3220 | usb_driver_release_interface(&btusb_driver, data->isoc); | |
3221 | } | |
5fbcd260 | 3222 | |
fd913ef7 RJ |
3223 | if (data->oob_wake_irq) |
3224 | device_init_wakeup(&data->udev->dev, false); | |
3225 | ||
5e23b923 MH |
3226 | hci_free_dev(hdev); |
3227 | } | |
3228 | ||
7bee549e | 3229 | #ifdef CONFIG_PM |
6a88adf2 MH |
3230 | static int btusb_suspend(struct usb_interface *intf, pm_message_t message) |
3231 | { | |
3232 | struct btusb_data *data = usb_get_intfdata(intf); | |
3233 | ||
3234 | BT_DBG("intf %p", intf); | |
3235 | ||
3236 | if (data->suspend_count++) | |
3237 | return 0; | |
3238 | ||
7bee549e | 3239 | spin_lock_irq(&data->txlock); |
5b1b0b81 | 3240 | if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) { |
7bee549e ON |
3241 | set_bit(BTUSB_SUSPENDING, &data->flags); |
3242 | spin_unlock_irq(&data->txlock); | |
3243 | } else { | |
3244 | spin_unlock_irq(&data->txlock); | |
3245 | data->suspend_count--; | |
3246 | return -EBUSY; | |
3247 | } | |
3248 | ||
6a88adf2 MH |
3249 | cancel_work_sync(&data->work); |
3250 | ||
7bee549e | 3251 | btusb_stop_traffic(data); |
6a88adf2 MH |
3252 | usb_kill_anchored_urbs(&data->tx_anchor); |
3253 | ||
fd913ef7 RJ |
3254 | if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) { |
3255 | set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags); | |
3256 | enable_irq_wake(data->oob_wake_irq); | |
3257 | enable_irq(data->oob_wake_irq); | |
3258 | } | |
3259 | ||
04b8c814 DD |
3260 | /* Optionally request a device reset on resume, but only when |
3261 | * wakeups are disabled. If wakeups are enabled we assume the | |
3262 | * device will stay powered up throughout suspend. | |
3263 | */ | |
3264 | if (test_bit(BTUSB_RESET_RESUME, &data->flags) && | |
3265 | !device_may_wakeup(&data->udev->dev)) | |
3266 | data->udev->reset_resume = 1; | |
3267 | ||
6a88adf2 MH |
3268 | return 0; |
3269 | } | |
3270 | ||
7bee549e ON |
3271 | static void play_deferred(struct btusb_data *data) |
3272 | { | |
3273 | struct urb *urb; | |
3274 | int err; | |
3275 | ||
3276 | while ((urb = usb_get_from_anchor(&data->deferred))) { | |
19cfe912 JC |
3277 | usb_anchor_urb(urb, &data->tx_anchor); |
3278 | ||
7bee549e | 3279 | err = usb_submit_urb(urb, GFP_ATOMIC); |
19cfe912 JC |
3280 | if (err < 0) { |
3281 | if (err != -EPERM && err != -ENODEV) | |
3282 | BT_ERR("%s urb %p submission failed (%d)", | |
3283 | data->hdev->name, urb, -err); | |
3284 | kfree(urb->setup_packet); | |
3285 | usb_unanchor_urb(urb); | |
3286 | usb_free_urb(urb); | |
7bee549e | 3287 | break; |
19cfe912 | 3288 | } |
7bee549e ON |
3289 | |
3290 | data->tx_in_flight++; | |
19cfe912 JC |
3291 | usb_free_urb(urb); |
3292 | } | |
3293 | ||
3294 | /* Cleanup the rest deferred urbs. */ | |
3295 | while ((urb = usb_get_from_anchor(&data->deferred))) { | |
3296 | kfree(urb->setup_packet); | |
3297 | usb_free_urb(urb); | |
7bee549e | 3298 | } |
7bee549e ON |
3299 | } |
3300 | ||
6a88adf2 MH |
3301 | static int btusb_resume(struct usb_interface *intf) |
3302 | { | |
3303 | struct btusb_data *data = usb_get_intfdata(intf); | |
3304 | struct hci_dev *hdev = data->hdev; | |
7bee549e | 3305 | int err = 0; |
6a88adf2 MH |
3306 | |
3307 | BT_DBG("intf %p", intf); | |
3308 | ||
3309 | if (--data->suspend_count) | |
3310 | return 0; | |
3311 | ||
fd913ef7 RJ |
3312 | /* Disable only if not already disabled (keep it balanced) */ |
3313 | if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) { | |
3314 | disable_irq(data->oob_wake_irq); | |
3315 | disable_irq_wake(data->oob_wake_irq); | |
3316 | } | |
3317 | ||
6a88adf2 | 3318 | if (!test_bit(HCI_RUNNING, &hdev->flags)) |
7bee549e | 3319 | goto done; |
6a88adf2 MH |
3320 | |
3321 | if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) { | |
3322 | err = btusb_submit_intr_urb(hdev, GFP_NOIO); | |
3323 | if (err < 0) { | |
3324 | clear_bit(BTUSB_INTR_RUNNING, &data->flags); | |
7bee549e | 3325 | goto failed; |
6a88adf2 MH |
3326 | } |
3327 | } | |
3328 | ||
3329 | if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) { | |
43c2e57f MH |
3330 | err = btusb_submit_bulk_urb(hdev, GFP_NOIO); |
3331 | if (err < 0) { | |
6a88adf2 | 3332 | clear_bit(BTUSB_BULK_RUNNING, &data->flags); |
7bee549e ON |
3333 | goto failed; |
3334 | } | |
3335 | ||
3336 | btusb_submit_bulk_urb(hdev, GFP_NOIO); | |
6a88adf2 MH |
3337 | } |
3338 | ||
3339 | if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) { | |
3340 | if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0) | |
3341 | clear_bit(BTUSB_ISOC_RUNNING, &data->flags); | |
3342 | else | |
3343 | btusb_submit_isoc_urb(hdev, GFP_NOIO); | |
3344 | } | |
3345 | ||
7bee549e ON |
3346 | spin_lock_irq(&data->txlock); |
3347 | play_deferred(data); | |
3348 | clear_bit(BTUSB_SUSPENDING, &data->flags); | |
3349 | spin_unlock_irq(&data->txlock); | |
3350 | schedule_work(&data->work); | |
3351 | ||
6a88adf2 | 3352 | return 0; |
7bee549e ON |
3353 | |
3354 | failed: | |
3355 | usb_scuttle_anchored_urbs(&data->deferred); | |
3356 | done: | |
3357 | spin_lock_irq(&data->txlock); | |
3358 | clear_bit(BTUSB_SUSPENDING, &data->flags); | |
3359 | spin_unlock_irq(&data->txlock); | |
3360 | ||
3361 | return err; | |
6a88adf2 | 3362 | } |
7bee549e | 3363 | #endif |
6a88adf2 | 3364 | |
5e23b923 MH |
3365 | static struct usb_driver btusb_driver = { |
3366 | .name = "btusb", | |
3367 | .probe = btusb_probe, | |
3368 | .disconnect = btusb_disconnect, | |
7bee549e | 3369 | #ifdef CONFIG_PM |
6a88adf2 MH |
3370 | .suspend = btusb_suspend, |
3371 | .resume = btusb_resume, | |
7bee549e | 3372 | #endif |
5e23b923 | 3373 | .id_table = btusb_table, |
7bee549e | 3374 | .supports_autosuspend = 1, |
e1f12eb6 | 3375 | .disable_hub_initiated_lpm = 1, |
5e23b923 MH |
3376 | }; |
3377 | ||
93f1508c | 3378 | module_usb_driver(btusb_driver); |
5e23b923 | 3379 | |
cfeb4145 MH |
3380 | module_param(disable_scofix, bool, 0644); |
3381 | MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size"); | |
3382 | ||
3383 | module_param(force_scofix, bool, 0644); | |
3384 | MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size"); | |
3385 | ||
3386 | module_param(reset, bool, 0644); | |
3387 | MODULE_PARM_DESC(reset, "Send HCI reset command on initialization"); | |
3388 | ||
5e23b923 MH |
3389 | MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); |
3390 | MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION); | |
3391 | MODULE_VERSION(VERSION); | |
3392 | MODULE_LICENSE("GPL"); |