]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/bluetooth/btusb.c
Bluetooth: btrtl: Change message for missing config file
[mirror_ubuntu-bionic-kernel.git] / drivers / bluetooth / btusb.c
CommitLineData
5e23b923
MH
1/*
2 *
3 * Generic Bluetooth USB driver
4 *
9bfa35fe 5 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
5e23b923
MH
6 *
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 *
22 */
23
5e23b923 24#include <linux/module.h>
5e23b923 25#include <linux/usb.h>
dffd30ee 26#include <linux/firmware.h>
fd913ef7
RJ
27#include <linux/of_device.h>
28#include <linux/of_irq.h>
a2698a9b 29#include <asm/unaligned.h>
5e23b923
MH
30
31#include <net/bluetooth/bluetooth.h>
32#include <net/bluetooth/hci_core.h>
33
4185a0f5 34#include "btintel.h"
1df1f591 35#include "btbcm.h"
db33c77d 36#include "btrtl.h"
1df1f591 37
34dced9b 38#define VERSION "0.8"
cfeb4145 39
90ab5ee9
RR
40static bool disable_scofix;
41static bool force_scofix;
7a9d4020 42
917a3337 43static bool reset = true;
cfeb4145
MH
44
45static struct usb_driver btusb_driver;
46
47#define BTUSB_IGNORE 0x01
7a9d4020
MH
48#define BTUSB_DIGIANSWER 0x02
49#define BTUSB_CSR 0x04
50#define BTUSB_SNIFFER 0x08
51#define BTUSB_BCM92035 0x10
52#define BTUSB_BROKEN_ISOC 0x20
53#define BTUSB_WRONG_SCO_MTU 0x40
2d25f8b4 54#define BTUSB_ATH3012 0x80
dffd30ee 55#define BTUSB_INTEL 0x100
40df783d
MH
56#define BTUSB_INTEL_BOOT 0x200
57#define BTUSB_BCM_PATCHRAM 0x400
ae8df494 58#define BTUSB_MARVELL 0x800
4fcef8ed 59#define BTUSB_SWAVE 0x1000
cda0dd78 60#define BTUSB_INTEL_NEW 0x2000
893ba544 61#define BTUSB_AMP 0x4000
3267c884 62#define BTUSB_QCA_ROME 0x8000
17b2772b 63#define BTUSB_BCM_APPLE 0x10000
a2698a9b 64#define BTUSB_REALTEK 0x20000
6c9d435d 65#define BTUSB_BCM2045 0x40000
22f8e9db 66#define BTUSB_IFNUM_2 0x80000
418678b0 67#define BTUSB_CW6622 0x100000
5e23b923 68
54265202 69static const struct usb_device_id btusb_table[] = {
5e23b923
MH
70 /* Generic Bluetooth USB device */
71 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
72
893ba544
MH
73 /* Generic Bluetooth AMP device */
74 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP },
75
d63b2826
DD
76 /* Generic Bluetooth USB interface */
77 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) },
78
1fa6535f 79 /* Apple-specific (Broadcom) devices */
17b2772b 80 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
22f8e9db 81 .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 },
1fa6535f 82
178c059e
CYC
83 /* MediaTek MT76x0E */
84 { USB_DEVICE(0x0e8d, 0x763f) },
85
c510eae3 86 /* Broadcom SoftSailing reporting vendor specific */
2e8b5063 87 { USB_DEVICE(0x0a5c, 0x21e1) },
c510eae3 88
3cd01976
NI
89 /* Apple MacBookPro 7,1 */
90 { USB_DEVICE(0x05ac, 0x8213) },
91
0a79f674
CL
92 /* Apple iMac11,1 */
93 { USB_DEVICE(0x05ac, 0x8215) },
94
9c047157
NI
95 /* Apple MacBookPro6,2 */
96 { USB_DEVICE(0x05ac, 0x8218) },
97
3e3ede7d
EH
98 /* Apple MacBookAir3,1, MacBookAir3,2 */
99 { USB_DEVICE(0x05ac, 0x821b) },
100
a63b723d
PAVM
101 /* Apple MacBookAir4,1 */
102 { USB_DEVICE(0x05ac, 0x821f) },
103
88d377b6
MAP
104 /* Apple MacBookPro8,2 */
105 { USB_DEVICE(0x05ac, 0x821a) },
106
f78b6826
JK
107 /* Apple MacMini5,1 */
108 { USB_DEVICE(0x05ac, 0x8281) },
109
cfeb4145 110 /* AVM BlueFRITZ! USB v2.0 */
4fcef8ed 111 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE },
cfeb4145
MH
112
113 /* Bluetooth Ultraport Module from IBM */
114 { USB_DEVICE(0x04bf, 0x030a) },
115
116 /* ALPS Modules with non-standard id */
117 { USB_DEVICE(0x044e, 0x3001) },
118 { USB_DEVICE(0x044e, 0x3002) },
119
120 /* Ericsson with non-standard id */
121 { USB_DEVICE(0x0bdb, 0x1002) },
122
123 /* Canyon CN-BTU1 with HID interfaces */
7a9d4020 124 { USB_DEVICE(0x0c10, 0x0000) },
cfeb4145 125
d13431ca
WJS
126 /* Broadcom BCM20702A0 */
127 { USB_DEVICE(0x413c, 0x8197) },
128
d049f4e5
MH
129 /* Broadcom BCM20702B0 (Dynex/Insignia) */
130 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM },
131
2faf71ce
SR
132 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */
133 { USB_DEVICE(0x105b, 0xe065), .driver_info = BTUSB_BCM_PATCHRAM },
134
a57bac43
CH
135 /* Broadcom BCM920703 (HTC Vive) */
136 { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01),
137 .driver_info = BTUSB_BCM_PATCHRAM },
138
98514036 139 /* Foxconn - Hon Hai */
6029ddc2
HS
140 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
141 .driver_info = BTUSB_BCM_PATCHRAM },
98514036 142
8f0c304c
MD
143 /* Lite-On Technology - Broadcom based */
144 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
145 .driver_info = BTUSB_BCM_PATCHRAM },
146
0b880062 147 /* Broadcom devices with vendor specific id */
10d4c673
PG
148 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
149 .driver_info = BTUSB_BCM_PATCHRAM },
92c385f4 150
c2aef6e8 151 /* ASUSTek Computer - Broadcom based */
9a5abdaa
RD
152 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
153 .driver_info = BTUSB_BCM_PATCHRAM },
c2aef6e8 154
5bcecf32 155 /* Belkin F8065bf - Broadcom based */
6331c686
MH
156 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
157 .driver_info = BTUSB_BCM_PATCHRAM },
5bcecf32 158
9113bfd8 159 /* IMC Networks - Broadcom based */
6331c686
MH
160 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
161 .driver_info = BTUSB_BCM_PATCHRAM },
9113bfd8 162
fdfddc60
WJS
163 /* Dell Computer - Broadcom based */
164 { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01),
165 .driver_info = BTUSB_BCM_PATCHRAM },
166
1623d0bf
DT
167 /* Toshiba Corp - Broadcom based */
168 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01),
169 .driver_info = BTUSB_BCM_PATCHRAM },
170
40df783d 171 /* Intel Bluetooth USB Bootloader (RAM module) */
d92f2df0
MH
172 { USB_DEVICE(0x8087, 0x0a5a),
173 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC },
40df783d 174
5e23b923
MH
175 { } /* Terminating entry */
176};
177
178MODULE_DEVICE_TABLE(usb, btusb_table);
179
54265202 180static const struct usb_device_id blacklist_table[] = {
cfeb4145
MH
181 /* CSR BlueCore devices */
182 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR },
183
184 /* Broadcom BCM2033 without firmware */
185 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE },
186
6c9d435d
MH
187 /* Broadcom BCM2045 devices */
188 { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 },
189
be93112a 190 /* Atheros 3011 with sflash firmware */
0b880062
AS
191 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE },
192 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE },
2eeff0b4 193 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE },
0b880062 194 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE },
be93112a 195 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE },
6eda541d 196 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE },
2a7bcccc 197 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE },
be93112a 198
509e7861
CYC
199 /* Atheros AR9285 Malbec with sflash firmware */
200 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE },
201
d9f51b51 202 /* Atheros 3012 with sflash firmware */
0b880062
AS
203 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 },
204 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 },
205 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 },
206 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 },
207 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 },
692c062e 208 { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 },
4b552bc9 209 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 },
28c971d8 210 { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 },
0b880062
AS
211 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 },
212 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 },
213 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 },
214 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 },
1fb4e09a 215 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
0b880062
AS
216 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
217 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
7e730c7f 218 { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
ec0810d2 219 { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 },
134d3b35 220 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 },
81d90442 221 { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 },
441ad62d 222 { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 },
0b880062 223 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
cd355ff0 224 { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 },
0b880062 225 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
89d2975f 226 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 },
a735f9e2 227 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },
d66629c1 228 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 },
2d25f8b4 229 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 },
94a32d10 230 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 },
07c0ea87 231 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 },
b131237c 232 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 },
1e56f1eb 233 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 },
0b880062 234 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 },
ebaf5795 235 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 },
18e0afab 236 { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 },
0b880062 237 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 },
ac71311e 238 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 },
0a3658cc 239 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 },
ca79f232 240 { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 },
0b880062
AS
241 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 },
242 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 },
eed307e2 243 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 },
609574eb 244 { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 },
5b77a1f3 245 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 },
3bb30a7c 246 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 },
033efa92 247 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 },
fa2f1394 248 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 },
75c6aca4 249 { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 },
0d0cef61 250 { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 },
72f9f8b5 251 { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 },
12d86896 252 { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 },
d9f51b51 253
e9036e33
CYC
254 /* Atheros AR5BBU12 with sflash firmware */
255 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE },
256
85d59726 257 /* Atheros AR5BBU12 with sflash firmware */
bc21fde2 258 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 },
0b880062 259 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 },
85d59726 260
3267c884 261 /* QCA ROME chipset */
2054111b 262 { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME },
93519934 263 { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME },
c9e44474 264 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME },
1eef1c35 265 { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME },
c9e44474 266 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME },
47ca5898 267 { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME },
1144a4ee 268 { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME },
3267c884 269
cfeb4145 270 /* Broadcom BCM2035 */
7a9d4020 271 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 },
0b880062
AS
272 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU },
273 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145
MH
274
275 /* Broadcom BCM2045 */
7a9d4020
MH
276 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU },
277 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU },
bdbef3d6 278
cfeb4145 279 /* IBM/Lenovo ThinkPad with Broadcom chip */
7a9d4020
MH
280 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU },
281 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145
MH
282
283 /* HP laptop with Broadcom chip */
7a9d4020 284 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145
MH
285
286 /* Dell laptop with Broadcom chip */
7a9d4020 287 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145 288
5ddd4a60 289 /* Dell Wireless 370 and 410 devices */
7a9d4020 290 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU },
5ddd4a60 291 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145 292
7a9d4020
MH
293 /* Belkin F8T012 and F8T013 devices */
294 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU },
295 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU },
cfeb4145 296
5ddd4a60
MH
297 /* Asus WL-BTD202 device */
298 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU },
299
300 /* Kensington Bluetooth USB adapter */
301 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU },
302
cfeb4145
MH
303 /* RTX Telecom based adapters with buggy SCO support */
304 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC },
305 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC },
306
307 /* CONWISE Technology based adapters with buggy SCO support */
418678b0
SJ
308 { USB_DEVICE(0x0e5e, 0x6622),
309 .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622},
cfeb4145 310
4fcef8ed 311 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
2eeac871 312 { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE },
4fcef8ed 313
cfeb4145
MH
314 /* Digianswer devices */
315 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER },
316 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE },
317
318 /* CSR BlueCore Bluetooth Sniffer */
4f64fa80
MH
319 { USB_DEVICE(0x0a12, 0x0002),
320 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
cfeb4145
MH
321
322 /* Frontline ComProbe Bluetooth Sniffer */
4f64fa80
MH
323 { USB_DEVICE(0x16d3, 0x0002),
324 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
cfeb4145 325
cb1ee89f
MH
326 /* Marvell Bluetooth devices */
327 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL },
328 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL },
1165df0e 329 { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL },
cb1ee89f 330
d0ac9eb7 331 /* Intel Bluetooth devices */
de766142 332 { USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW },
407550fe 333 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
dffd30ee 334 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL },
ef4e5e4a 335 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL },
cda0dd78 336 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW },
439e65d3 337 { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL },
dffd30ee 338
d0ac9eb7
MH
339 /* Other Intel Bluetooth devices */
340 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
341 .driver_info = BTUSB_IGNORE },
ae8df494 342
a2698a9b
DD
343 /* Realtek Bluetooth devices */
344 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
345 .driver_info = BTUSB_REALTEK },
346
347 /* Additional Realtek 8723AE Bluetooth devices */
348 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK },
349 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK },
350
351 /* Additional Realtek 8723BE Bluetooth devices */
352 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK },
353 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK },
354 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK },
355 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK },
356 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK },
357
358 /* Additional Realtek 8821AE Bluetooth devices */
359 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK },
360 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK },
361 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK },
362 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK },
363 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK },
364
4481c076
PP
365 /* Silicon Wave based devices */
366 { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE },
367
5e23b923
MH
368 { } /* Terminating entry */
369};
370
9bfa35fe
MH
371#define BTUSB_MAX_ISOC_FRAMES 10
372
5e23b923
MH
373#define BTUSB_INTR_RUNNING 0
374#define BTUSB_BULK_RUNNING 1
9bfa35fe 375#define BTUSB_ISOC_RUNNING 2
7bee549e 376#define BTUSB_SUSPENDING 3
08b8b6c4 377#define BTUSB_DID_ISO_RESUME 4
cda0dd78
MH
378#define BTUSB_BOOTLOADER 5
379#define BTUSB_DOWNLOADING 6
ce6bb929 380#define BTUSB_FIRMWARE_LOADED 7
cda0dd78 381#define BTUSB_FIRMWARE_FAILED 8
ce6bb929 382#define BTUSB_BOOTING 9
04b8c814 383#define BTUSB_RESET_RESUME 10
9d08f504 384#define BTUSB_DIAG_RUNNING 11
fd913ef7 385#define BTUSB_OOB_WAKE_ENABLED 12
5e23b923
MH
386
387struct btusb_data {
388 struct hci_dev *hdev;
389 struct usb_device *udev;
5fbcd260 390 struct usb_interface *intf;
9bfa35fe 391 struct usb_interface *isoc;
9d08f504 392 struct usb_interface *diag;
5e23b923 393
5e23b923
MH
394 unsigned long flags;
395
396 struct work_struct work;
7bee549e 397 struct work_struct waker;
5e23b923 398
803b5836 399 struct usb_anchor deferred;
5e23b923 400 struct usb_anchor tx_anchor;
803b5836
MH
401 int tx_in_flight;
402 spinlock_t txlock;
403
5e23b923
MH
404 struct usb_anchor intr_anchor;
405 struct usb_anchor bulk_anchor;
9bfa35fe 406 struct usb_anchor isoc_anchor;
9d08f504 407 struct usb_anchor diag_anchor;
803b5836
MH
408 spinlock_t rxlock;
409
410 struct sk_buff *evt_skb;
411 struct sk_buff *acl_skb;
412 struct sk_buff *sco_skb;
5e23b923
MH
413
414 struct usb_endpoint_descriptor *intr_ep;
415 struct usb_endpoint_descriptor *bulk_tx_ep;
416 struct usb_endpoint_descriptor *bulk_rx_ep;
9bfa35fe
MH
417 struct usb_endpoint_descriptor *isoc_tx_ep;
418 struct usb_endpoint_descriptor *isoc_rx_ep;
9d08f504
MH
419 struct usb_endpoint_descriptor *diag_tx_ep;
420 struct usb_endpoint_descriptor *diag_rx_ep;
9bfa35fe 421
7a9d4020 422 __u8 cmdreq_type;
893ba544 423 __u8 cmdreq;
7a9d4020 424
43c2e57f 425 unsigned int sco_num;
9bfa35fe 426 int isoc_altsetting;
6a88adf2 427 int suspend_count;
2cbd3f5c 428
97307f51 429 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb);
2cbd3f5c 430 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count);
ace31982
KBYT
431
432 int (*setup_on_usb)(struct hci_dev *hdev);
fd913ef7
RJ
433
434 int oob_wake_irq; /* irq for out-of-band wake-on-bt */
5e23b923
MH
435};
436
803b5836
MH
437static inline void btusb_free_frags(struct btusb_data *data)
438{
439 unsigned long flags;
440
441 spin_lock_irqsave(&data->rxlock, flags);
442
443 kfree_skb(data->evt_skb);
444 data->evt_skb = NULL;
445
446 kfree_skb(data->acl_skb);
447 data->acl_skb = NULL;
448
449 kfree_skb(data->sco_skb);
450 data->sco_skb = NULL;
451
452 spin_unlock_irqrestore(&data->rxlock, flags);
453}
454
1ffa4ad0
MH
455static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count)
456{
803b5836
MH
457 struct sk_buff *skb;
458 int err = 0;
459
460 spin_lock(&data->rxlock);
461 skb = data->evt_skb;
462
463 while (count) {
464 int len;
465
466 if (!skb) {
467 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC);
468 if (!skb) {
469 err = -ENOMEM;
470 break;
471 }
472
618e8bc2
MH
473 hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
474 hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE;
803b5836
MH
475 }
476
618e8bc2 477 len = min_t(uint, hci_skb_expect(skb), count);
803b5836
MH
478 memcpy(skb_put(skb, len), buffer, len);
479
480 count -= len;
481 buffer += len;
618e8bc2 482 hci_skb_expect(skb) -= len;
803b5836
MH
483
484 if (skb->len == HCI_EVENT_HDR_SIZE) {
485 /* Complete event header */
618e8bc2 486 hci_skb_expect(skb) = hci_event_hdr(skb)->plen;
803b5836 487
618e8bc2 488 if (skb_tailroom(skb) < hci_skb_expect(skb)) {
803b5836
MH
489 kfree_skb(skb);
490 skb = NULL;
491
492 err = -EILSEQ;
493 break;
494 }
495 }
496
618e8bc2 497 if (!hci_skb_expect(skb)) {
803b5836 498 /* Complete frame */
97307f51 499 data->recv_event(data->hdev, skb);
803b5836
MH
500 skb = NULL;
501 }
502 }
503
504 data->evt_skb = skb;
505 spin_unlock(&data->rxlock);
506
507 return err;
1ffa4ad0
MH
508}
509
510static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count)
511{
803b5836
MH
512 struct sk_buff *skb;
513 int err = 0;
514
515 spin_lock(&data->rxlock);
516 skb = data->acl_skb;
517
518 while (count) {
519 int len;
520
521 if (!skb) {
522 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC);
523 if (!skb) {
524 err = -ENOMEM;
525 break;
526 }
527
618e8bc2
MH
528 hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT;
529 hci_skb_expect(skb) = HCI_ACL_HDR_SIZE;
803b5836
MH
530 }
531
618e8bc2 532 len = min_t(uint, hci_skb_expect(skb), count);
803b5836
MH
533 memcpy(skb_put(skb, len), buffer, len);
534
535 count -= len;
536 buffer += len;
618e8bc2 537 hci_skb_expect(skb) -= len;
803b5836
MH
538
539 if (skb->len == HCI_ACL_HDR_SIZE) {
540 __le16 dlen = hci_acl_hdr(skb)->dlen;
541
542 /* Complete ACL header */
618e8bc2 543 hci_skb_expect(skb) = __le16_to_cpu(dlen);
803b5836 544
618e8bc2 545 if (skb_tailroom(skb) < hci_skb_expect(skb)) {
803b5836
MH
546 kfree_skb(skb);
547 skb = NULL;
548
549 err = -EILSEQ;
550 break;
551 }
552 }
553
618e8bc2 554 if (!hci_skb_expect(skb)) {
803b5836
MH
555 /* Complete frame */
556 hci_recv_frame(data->hdev, skb);
557 skb = NULL;
558 }
559 }
560
561 data->acl_skb = skb;
562 spin_unlock(&data->rxlock);
563
564 return err;
1ffa4ad0
MH
565}
566
567static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count)
568{
803b5836
MH
569 struct sk_buff *skb;
570 int err = 0;
571
572 spin_lock(&data->rxlock);
573 skb = data->sco_skb;
574
575 while (count) {
576 int len;
577
578 if (!skb) {
579 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC);
580 if (!skb) {
581 err = -ENOMEM;
582 break;
583 }
584
618e8bc2
MH
585 hci_skb_pkt_type(skb) = HCI_SCODATA_PKT;
586 hci_skb_expect(skb) = HCI_SCO_HDR_SIZE;
803b5836
MH
587 }
588
618e8bc2 589 len = min_t(uint, hci_skb_expect(skb), count);
803b5836
MH
590 memcpy(skb_put(skb, len), buffer, len);
591
592 count -= len;
593 buffer += len;
618e8bc2 594 hci_skb_expect(skb) -= len;
803b5836
MH
595
596 if (skb->len == HCI_SCO_HDR_SIZE) {
597 /* Complete SCO header */
618e8bc2 598 hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen;
803b5836 599
618e8bc2 600 if (skb_tailroom(skb) < hci_skb_expect(skb)) {
803b5836
MH
601 kfree_skb(skb);
602 skb = NULL;
603
604 err = -EILSEQ;
605 break;
606 }
607 }
608
618e8bc2 609 if (!hci_skb_expect(skb)) {
803b5836
MH
610 /* Complete frame */
611 hci_recv_frame(data->hdev, skb);
612 skb = NULL;
613 }
614 }
615
616 data->sco_skb = skb;
617 spin_unlock(&data->rxlock);
618
619 return err;
1ffa4ad0
MH
620}
621
5e23b923
MH
622static void btusb_intr_complete(struct urb *urb)
623{
624 struct hci_dev *hdev = urb->context;
155961e8 625 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
626 int err;
627
89e7533d
MH
628 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
629 urb->actual_length);
5e23b923
MH
630
631 if (!test_bit(HCI_RUNNING, &hdev->flags))
632 return;
633
634 if (urb->status == 0) {
9bfa35fe
MH
635 hdev->stat.byte_rx += urb->actual_length;
636
1ffa4ad0
MH
637 if (btusb_recv_intr(data, urb->transfer_buffer,
638 urb->actual_length) < 0) {
5e23b923
MH
639 BT_ERR("%s corrupted event packet", hdev->name);
640 hdev->stat.err_rx++;
641 }
85560c4a
CC
642 } else if (urb->status == -ENOENT) {
643 /* Avoid suspend failed when usb_kill_urb */
644 return;
5e23b923
MH
645 }
646
647 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags))
648 return;
649
7bee549e 650 usb_mark_last_busy(data->udev);
5e23b923
MH
651 usb_anchor_urb(urb, &data->intr_anchor);
652
653 err = usb_submit_urb(urb, GFP_ATOMIC);
654 if (err < 0) {
4935f1c1
PB
655 /* -EPERM: urb is being killed;
656 * -ENODEV: device got disconnected */
657 if (err != -EPERM && err != -ENODEV)
61faddf6 658 BT_ERR("%s urb %p failed to resubmit (%d)",
89e7533d 659 hdev->name, urb, -err);
5e23b923
MH
660 usb_unanchor_urb(urb);
661 }
662}
663
2eda66f4 664static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags)
5e23b923 665{
155961e8 666 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
667 struct urb *urb;
668 unsigned char *buf;
669 unsigned int pipe;
670 int err, size;
671
672 BT_DBG("%s", hdev->name);
673
9bfa35fe
MH
674 if (!data->intr_ep)
675 return -ENODEV;
676
2eda66f4 677 urb = usb_alloc_urb(0, mem_flags);
5e23b923
MH
678 if (!urb)
679 return -ENOMEM;
680
681 size = le16_to_cpu(data->intr_ep->wMaxPacketSize);
682
2eda66f4 683 buf = kmalloc(size, mem_flags);
5e23b923
MH
684 if (!buf) {
685 usb_free_urb(urb);
686 return -ENOMEM;
687 }
688
689 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress);
690
691 usb_fill_int_urb(urb, data->udev, pipe, buf, size,
89e7533d 692 btusb_intr_complete, hdev, data->intr_ep->bInterval);
5e23b923
MH
693
694 urb->transfer_flags |= URB_FREE_BUFFER;
695
696 usb_anchor_urb(urb, &data->intr_anchor);
697
2eda66f4 698 err = usb_submit_urb(urb, mem_flags);
5e23b923 699 if (err < 0) {
d4b8d1c9
PB
700 if (err != -EPERM && err != -ENODEV)
701 BT_ERR("%s urb %p submission failed (%d)",
89e7533d 702 hdev->name, urb, -err);
5e23b923 703 usb_unanchor_urb(urb);
5e23b923
MH
704 }
705
706 usb_free_urb(urb);
707
708 return err;
709}
710
711static void btusb_bulk_complete(struct urb *urb)
712{
713 struct hci_dev *hdev = urb->context;
155961e8 714 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
715 int err;
716
89e7533d
MH
717 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
718 urb->actual_length);
5e23b923
MH
719
720 if (!test_bit(HCI_RUNNING, &hdev->flags))
721 return;
722
723 if (urb->status == 0) {
9bfa35fe
MH
724 hdev->stat.byte_rx += urb->actual_length;
725
2cbd3f5c 726 if (data->recv_bulk(data, urb->transfer_buffer,
1ffa4ad0 727 urb->actual_length) < 0) {
5e23b923
MH
728 BT_ERR("%s corrupted ACL packet", hdev->name);
729 hdev->stat.err_rx++;
730 }
85560c4a
CC
731 } else if (urb->status == -ENOENT) {
732 /* Avoid suspend failed when usb_kill_urb */
733 return;
5e23b923
MH
734 }
735
736 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags))
737 return;
738
739 usb_anchor_urb(urb, &data->bulk_anchor);
652fd781 740 usb_mark_last_busy(data->udev);
5e23b923
MH
741
742 err = usb_submit_urb(urb, GFP_ATOMIC);
743 if (err < 0) {
4935f1c1
PB
744 /* -EPERM: urb is being killed;
745 * -ENODEV: device got disconnected */
746 if (err != -EPERM && err != -ENODEV)
61faddf6 747 BT_ERR("%s urb %p failed to resubmit (%d)",
89e7533d 748 hdev->name, urb, -err);
5e23b923
MH
749 usb_unanchor_urb(urb);
750 }
751}
752
2eda66f4 753static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags)
5e23b923 754{
155961e8 755 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
756 struct urb *urb;
757 unsigned char *buf;
758 unsigned int pipe;
290ba200 759 int err, size = HCI_MAX_FRAME_SIZE;
5e23b923
MH
760
761 BT_DBG("%s", hdev->name);
762
9bfa35fe
MH
763 if (!data->bulk_rx_ep)
764 return -ENODEV;
765
2eda66f4 766 urb = usb_alloc_urb(0, mem_flags);
5e23b923
MH
767 if (!urb)
768 return -ENOMEM;
769
2eda66f4 770 buf = kmalloc(size, mem_flags);
5e23b923
MH
771 if (!buf) {
772 usb_free_urb(urb);
773 return -ENOMEM;
774 }
775
776 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress);
777
89e7533d
MH
778 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
779 btusb_bulk_complete, hdev);
5e23b923
MH
780
781 urb->transfer_flags |= URB_FREE_BUFFER;
782
7bee549e 783 usb_mark_last_busy(data->udev);
5e23b923
MH
784 usb_anchor_urb(urb, &data->bulk_anchor);
785
2eda66f4 786 err = usb_submit_urb(urb, mem_flags);
5e23b923 787 if (err < 0) {
d4b8d1c9
PB
788 if (err != -EPERM && err != -ENODEV)
789 BT_ERR("%s urb %p submission failed (%d)",
89e7533d 790 hdev->name, urb, -err);
5e23b923 791 usb_unanchor_urb(urb);
5e23b923
MH
792 }
793
794 usb_free_urb(urb);
795
796 return err;
797}
798
9bfa35fe
MH
799static void btusb_isoc_complete(struct urb *urb)
800{
801 struct hci_dev *hdev = urb->context;
155961e8 802 struct btusb_data *data = hci_get_drvdata(hdev);
9bfa35fe
MH
803 int i, err;
804
89e7533d
MH
805 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
806 urb->actual_length);
9bfa35fe
MH
807
808 if (!test_bit(HCI_RUNNING, &hdev->flags))
809 return;
810
811 if (urb->status == 0) {
812 for (i = 0; i < urb->number_of_packets; i++) {
813 unsigned int offset = urb->iso_frame_desc[i].offset;
814 unsigned int length = urb->iso_frame_desc[i].actual_length;
815
816 if (urb->iso_frame_desc[i].status)
817 continue;
818
819 hdev->stat.byte_rx += length;
820
1ffa4ad0
MH
821 if (btusb_recv_isoc(data, urb->transfer_buffer + offset,
822 length) < 0) {
9bfa35fe
MH
823 BT_ERR("%s corrupted SCO packet", hdev->name);
824 hdev->stat.err_rx++;
825 }
826 }
85560c4a
CC
827 } else if (urb->status == -ENOENT) {
828 /* Avoid suspend failed when usb_kill_urb */
829 return;
9bfa35fe
MH
830 }
831
832 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags))
833 return;
834
835 usb_anchor_urb(urb, &data->isoc_anchor);
836
837 err = usb_submit_urb(urb, GFP_ATOMIC);
838 if (err < 0) {
4935f1c1
PB
839 /* -EPERM: urb is being killed;
840 * -ENODEV: device got disconnected */
841 if (err != -EPERM && err != -ENODEV)
61faddf6 842 BT_ERR("%s urb %p failed to resubmit (%d)",
89e7533d 843 hdev->name, urb, -err);
9bfa35fe
MH
844 usb_unanchor_urb(urb);
845 }
846}
847
42b16b3f 848static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu)
9bfa35fe
MH
849{
850 int i, offset = 0;
851
852 BT_DBG("len %d mtu %d", len, mtu);
853
854 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu;
855 i++, offset += mtu, len -= mtu) {
856 urb->iso_frame_desc[i].offset = offset;
857 urb->iso_frame_desc[i].length = mtu;
858 }
859
860 if (len && i < BTUSB_MAX_ISOC_FRAMES) {
861 urb->iso_frame_desc[i].offset = offset;
862 urb->iso_frame_desc[i].length = len;
863 i++;
864 }
865
866 urb->number_of_packets = i;
867}
868
2eda66f4 869static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags)
9bfa35fe 870{
155961e8 871 struct btusb_data *data = hci_get_drvdata(hdev);
9bfa35fe
MH
872 struct urb *urb;
873 unsigned char *buf;
874 unsigned int pipe;
875 int err, size;
876
877 BT_DBG("%s", hdev->name);
878
879 if (!data->isoc_rx_ep)
880 return -ENODEV;
881
2eda66f4 882 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags);
9bfa35fe
MH
883 if (!urb)
884 return -ENOMEM;
885
886 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) *
887 BTUSB_MAX_ISOC_FRAMES;
888
2eda66f4 889 buf = kmalloc(size, mem_flags);
9bfa35fe
MH
890 if (!buf) {
891 usb_free_urb(urb);
892 return -ENOMEM;
893 }
894
895 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress);
896
fa0fb93f 897 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete,
89e7533d 898 hdev, data->isoc_rx_ep->bInterval);
9bfa35fe 899
89e7533d 900 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP;
9bfa35fe
MH
901
902 __fill_isoc_descriptor(urb, size,
89e7533d 903 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize));
9bfa35fe
MH
904
905 usb_anchor_urb(urb, &data->isoc_anchor);
906
2eda66f4 907 err = usb_submit_urb(urb, mem_flags);
9bfa35fe 908 if (err < 0) {
d4b8d1c9
PB
909 if (err != -EPERM && err != -ENODEV)
910 BT_ERR("%s urb %p submission failed (%d)",
89e7533d 911 hdev->name, urb, -err);
9bfa35fe 912 usb_unanchor_urb(urb);
9bfa35fe
MH
913 }
914
915 usb_free_urb(urb);
916
917 return err;
918}
919
9d08f504
MH
920static void btusb_diag_complete(struct urb *urb)
921{
922 struct hci_dev *hdev = urb->context;
923 struct btusb_data *data = hci_get_drvdata(hdev);
924 int err;
925
926 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
927 urb->actual_length);
928
929 if (urb->status == 0) {
930 struct sk_buff *skb;
931
932 skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC);
933 if (skb) {
934 memcpy(skb_put(skb, urb->actual_length),
935 urb->transfer_buffer, urb->actual_length);
936 hci_recv_diag(hdev, skb);
937 }
938 } else if (urb->status == -ENOENT) {
939 /* Avoid suspend failed when usb_kill_urb */
940 return;
941 }
942
943 if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags))
944 return;
945
946 usb_anchor_urb(urb, &data->diag_anchor);
947 usb_mark_last_busy(data->udev);
948
949 err = usb_submit_urb(urb, GFP_ATOMIC);
950 if (err < 0) {
951 /* -EPERM: urb is being killed;
952 * -ENODEV: device got disconnected */
953 if (err != -EPERM && err != -ENODEV)
954 BT_ERR("%s urb %p failed to resubmit (%d)",
955 hdev->name, urb, -err);
956 usb_unanchor_urb(urb);
957 }
958}
959
960static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags)
961{
962 struct btusb_data *data = hci_get_drvdata(hdev);
963 struct urb *urb;
964 unsigned char *buf;
965 unsigned int pipe;
966 int err, size = HCI_MAX_FRAME_SIZE;
967
968 BT_DBG("%s", hdev->name);
969
970 if (!data->diag_rx_ep)
971 return -ENODEV;
972
973 urb = usb_alloc_urb(0, mem_flags);
974 if (!urb)
975 return -ENOMEM;
976
977 buf = kmalloc(size, mem_flags);
978 if (!buf) {
979 usb_free_urb(urb);
980 return -ENOMEM;
981 }
982
983 pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress);
984
985 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
986 btusb_diag_complete, hdev);
987
988 urb->transfer_flags |= URB_FREE_BUFFER;
989
990 usb_mark_last_busy(data->udev);
991 usb_anchor_urb(urb, &data->diag_anchor);
992
993 err = usb_submit_urb(urb, mem_flags);
994 if (err < 0) {
995 if (err != -EPERM && err != -ENODEV)
996 BT_ERR("%s urb %p submission failed (%d)",
997 hdev->name, urb, -err);
998 usb_unanchor_urb(urb);
999 }
1000
1001 usb_free_urb(urb);
1002
1003 return err;
1004}
1005
5e23b923 1006static void btusb_tx_complete(struct urb *urb)
7bee549e
ON
1007{
1008 struct sk_buff *skb = urb->context;
89e7533d 1009 struct hci_dev *hdev = (struct hci_dev *)skb->dev;
155961e8 1010 struct btusb_data *data = hci_get_drvdata(hdev);
7bee549e 1011
89e7533d
MH
1012 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
1013 urb->actual_length);
7bee549e
ON
1014
1015 if (!test_bit(HCI_RUNNING, &hdev->flags))
1016 goto done;
1017
1018 if (!urb->status)
1019 hdev->stat.byte_tx += urb->transfer_buffer_length;
1020 else
1021 hdev->stat.err_tx++;
1022
1023done:
1024 spin_lock(&data->txlock);
1025 data->tx_in_flight--;
1026 spin_unlock(&data->txlock);
1027
1028 kfree(urb->setup_packet);
1029
1030 kfree_skb(skb);
1031}
1032
1033static void btusb_isoc_tx_complete(struct urb *urb)
5e23b923
MH
1034{
1035 struct sk_buff *skb = urb->context;
89e7533d 1036 struct hci_dev *hdev = (struct hci_dev *)skb->dev;
5e23b923 1037
89e7533d
MH
1038 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
1039 urb->actual_length);
5e23b923
MH
1040
1041 if (!test_bit(HCI_RUNNING, &hdev->flags))
1042 goto done;
1043
1044 if (!urb->status)
1045 hdev->stat.byte_tx += urb->transfer_buffer_length;
1046 else
1047 hdev->stat.err_tx++;
1048
1049done:
1050 kfree(urb->setup_packet);
1051
1052 kfree_skb(skb);
1053}
1054
1055static int btusb_open(struct hci_dev *hdev)
1056{
155961e8 1057 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
1058 int err;
1059
1060 BT_DBG("%s", hdev->name);
1061
c7e163fe
EH
1062 err = usb_autopm_get_interface(data->intf);
1063 if (err < 0)
1064 return err;
1065
ace31982
KBYT
1066 /* Patching USB firmware files prior to starting any URBs of HCI path
1067 * It is more safe to use USB bulk channel for downloading USB patch
1068 */
1069 if (data->setup_on_usb) {
1070 err = data->setup_on_usb(hdev);
eb50042f 1071 if (err < 0)
ace31982
KBYT
1072 return err;
1073 }
1074
7bee549e
ON
1075 data->intf->needs_remote_wakeup = 1;
1076
5e23b923 1077 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
7bee549e 1078 goto done;
5e23b923 1079
2eda66f4 1080 err = btusb_submit_intr_urb(hdev, GFP_KERNEL);
43c2e57f
MH
1081 if (err < 0)
1082 goto failed;
1083
1084 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL);
5e23b923 1085 if (err < 0) {
43c2e57f
MH
1086 usb_kill_anchored_urbs(&data->intr_anchor);
1087 goto failed;
5e23b923
MH
1088 }
1089
43c2e57f
MH
1090 set_bit(BTUSB_BULK_RUNNING, &data->flags);
1091 btusb_submit_bulk_urb(hdev, GFP_KERNEL);
1092
9d08f504
MH
1093 if (data->diag) {
1094 if (!btusb_submit_diag_urb(hdev, GFP_KERNEL))
1095 set_bit(BTUSB_DIAG_RUNNING, &data->flags);
1096 }
1097
7bee549e
ON
1098done:
1099 usb_autopm_put_interface(data->intf);
43c2e57f
MH
1100 return 0;
1101
1102failed:
1103 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
7bee549e 1104 usb_autopm_put_interface(data->intf);
5e23b923
MH
1105 return err;
1106}
1107
7bee549e
ON
1108static void btusb_stop_traffic(struct btusb_data *data)
1109{
1110 usb_kill_anchored_urbs(&data->intr_anchor);
1111 usb_kill_anchored_urbs(&data->bulk_anchor);
1112 usb_kill_anchored_urbs(&data->isoc_anchor);
9d08f504 1113 usb_kill_anchored_urbs(&data->diag_anchor);
7bee549e
ON
1114}
1115
5e23b923
MH
1116static int btusb_close(struct hci_dev *hdev)
1117{
155961e8 1118 struct btusb_data *data = hci_get_drvdata(hdev);
7bee549e 1119 int err;
5e23b923
MH
1120
1121 BT_DBG("%s", hdev->name);
1122
e8c3c3d2 1123 cancel_work_sync(&data->work);
404291ac 1124 cancel_work_sync(&data->waker);
e8c3c3d2 1125
9bfa35fe 1126 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
5e23b923 1127 clear_bit(BTUSB_BULK_RUNNING, &data->flags);
5e23b923 1128 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
9d08f504 1129 clear_bit(BTUSB_DIAG_RUNNING, &data->flags);
7bee549e
ON
1130
1131 btusb_stop_traffic(data);
803b5836
MH
1132 btusb_free_frags(data);
1133
7bee549e
ON
1134 err = usb_autopm_get_interface(data->intf);
1135 if (err < 0)
7b8e2c1d 1136 goto failed;
7bee549e
ON
1137
1138 data->intf->needs_remote_wakeup = 0;
1139 usb_autopm_put_interface(data->intf);
5e23b923 1140
7b8e2c1d
ON
1141failed:
1142 usb_scuttle_anchored_urbs(&data->deferred);
5e23b923
MH
1143 return 0;
1144}
1145
1146static int btusb_flush(struct hci_dev *hdev)
1147{
155961e8 1148 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
1149
1150 BT_DBG("%s", hdev->name);
1151
1152 usb_kill_anchored_urbs(&data->tx_anchor);
803b5836 1153 btusb_free_frags(data);
5e23b923
MH
1154
1155 return 0;
1156}
1157
047b2ec8 1158static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb)
5e23b923 1159{
155961e8 1160 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
1161 struct usb_ctrlrequest *dr;
1162 struct urb *urb;
1163 unsigned int pipe;
5e23b923 1164
047b2ec8
MH
1165 urb = usb_alloc_urb(0, GFP_KERNEL);
1166 if (!urb)
1167 return ERR_PTR(-ENOMEM);
5e23b923 1168
047b2ec8
MH
1169 dr = kmalloc(sizeof(*dr), GFP_KERNEL);
1170 if (!dr) {
1171 usb_free_urb(urb);
1172 return ERR_PTR(-ENOMEM);
1173 }
5e23b923 1174
047b2ec8 1175 dr->bRequestType = data->cmdreq_type;
893ba544 1176 dr->bRequest = data->cmdreq;
047b2ec8
MH
1177 dr->wIndex = 0;
1178 dr->wValue = 0;
1179 dr->wLength = __cpu_to_le16(skb->len);
7bd8f09f 1180
047b2ec8 1181 pipe = usb_sndctrlpipe(data->udev, 0x00);
5e23b923 1182
89e7533d 1183 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
047b2ec8 1184 skb->data, skb->len, btusb_tx_complete, skb);
5e23b923 1185
89e7533d 1186 skb->dev = (void *)hdev;
5e23b923 1187
047b2ec8
MH
1188 return urb;
1189}
5e23b923 1190
047b2ec8
MH
1191static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb)
1192{
1193 struct btusb_data *data = hci_get_drvdata(hdev);
1194 struct urb *urb;
1195 unsigned int pipe;
5e23b923 1196
047b2ec8
MH
1197 if (!data->bulk_tx_ep)
1198 return ERR_PTR(-ENODEV);
9bfa35fe 1199
047b2ec8
MH
1200 urb = usb_alloc_urb(0, GFP_KERNEL);
1201 if (!urb)
1202 return ERR_PTR(-ENOMEM);
5e23b923 1203
047b2ec8 1204 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress);
5e23b923 1205
047b2ec8
MH
1206 usb_fill_bulk_urb(urb, data->udev, pipe,
1207 skb->data, skb->len, btusb_tx_complete, skb);
5e23b923 1208
89e7533d 1209 skb->dev = (void *)hdev;
5e23b923 1210
047b2ec8
MH
1211 return urb;
1212}
9bfa35fe 1213
047b2ec8
MH
1214static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb)
1215{
1216 struct btusb_data *data = hci_get_drvdata(hdev);
1217 struct urb *urb;
1218 unsigned int pipe;
9bfa35fe 1219
047b2ec8
MH
1220 if (!data->isoc_tx_ep)
1221 return ERR_PTR(-ENODEV);
9bfa35fe 1222
047b2ec8
MH
1223 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL);
1224 if (!urb)
1225 return ERR_PTR(-ENOMEM);
9bfa35fe 1226
047b2ec8 1227 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress);
9bfa35fe 1228
047b2ec8
MH
1229 usb_fill_int_urb(urb, data->udev, pipe,
1230 skb->data, skb->len, btusb_isoc_tx_complete,
1231 skb, data->isoc_tx_ep->bInterval);
9bfa35fe 1232
047b2ec8 1233 urb->transfer_flags = URB_ISO_ASAP;
5e23b923 1234
047b2ec8
MH
1235 __fill_isoc_descriptor(urb, skb->len,
1236 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize));
5e23b923 1237
89e7533d 1238 skb->dev = (void *)hdev;
047b2ec8
MH
1239
1240 return urb;
1241}
1242
1243static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb)
1244{
1245 struct btusb_data *data = hci_get_drvdata(hdev);
1246 int err;
7bee549e 1247
5e23b923
MH
1248 usb_anchor_urb(urb, &data->tx_anchor);
1249
e9753eff 1250 err = usb_submit_urb(urb, GFP_KERNEL);
5e23b923 1251 if (err < 0) {
5a9b80e2
PB
1252 if (err != -EPERM && err != -ENODEV)
1253 BT_ERR("%s urb %p submission failed (%d)",
89e7533d 1254 hdev->name, urb, -err);
5e23b923
MH
1255 kfree(urb->setup_packet);
1256 usb_unanchor_urb(urb);
7bee549e
ON
1257 } else {
1258 usb_mark_last_busy(data->udev);
5e23b923
MH
1259 }
1260
54a8a79c 1261 usb_free_urb(urb);
5e23b923
MH
1262 return err;
1263}
1264
047b2ec8
MH
1265static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb)
1266{
1267 struct btusb_data *data = hci_get_drvdata(hdev);
1268 unsigned long flags;
1269 bool suspending;
1270
1271 spin_lock_irqsave(&data->txlock, flags);
1272 suspending = test_bit(BTUSB_SUSPENDING, &data->flags);
1273 if (!suspending)
1274 data->tx_in_flight++;
1275 spin_unlock_irqrestore(&data->txlock, flags);
1276
1277 if (!suspending)
1278 return submit_tx_urb(hdev, urb);
1279
1280 usb_anchor_urb(urb, &data->deferred);
1281 schedule_work(&data->waker);
1282
1283 usb_free_urb(urb);
1284 return 0;
1285}
1286
1287static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
1288{
1289 struct urb *urb;
1290
1291 BT_DBG("%s", hdev->name);
1292
618e8bc2 1293 switch (hci_skb_pkt_type(skb)) {
047b2ec8
MH
1294 case HCI_COMMAND_PKT:
1295 urb = alloc_ctrl_urb(hdev, skb);
1296 if (IS_ERR(urb))
1297 return PTR_ERR(urb);
1298
1299 hdev->stat.cmd_tx++;
1300 return submit_or_queue_tx_urb(hdev, urb);
1301
1302 case HCI_ACLDATA_PKT:
1303 urb = alloc_bulk_urb(hdev, skb);
1304 if (IS_ERR(urb))
1305 return PTR_ERR(urb);
1306
1307 hdev->stat.acl_tx++;
1308 return submit_or_queue_tx_urb(hdev, urb);
1309
1310 case HCI_SCODATA_PKT:
1311 if (hci_conn_num(hdev, SCO_LINK) < 1)
1312 return -ENODEV;
1313
1314 urb = alloc_isoc_urb(hdev, skb);
1315 if (IS_ERR(urb))
1316 return PTR_ERR(urb);
1317
1318 hdev->stat.sco_tx++;
1319 return submit_tx_urb(hdev, urb);
1320 }
1321
1322 return -EILSEQ;
1323}
1324
5e23b923
MH
1325static void btusb_notify(struct hci_dev *hdev, unsigned int evt)
1326{
155961e8 1327 struct btusb_data *data = hci_get_drvdata(hdev);
5e23b923
MH
1328
1329 BT_DBG("%s evt %d", hdev->name, evt);
1330
014f7bc7
MH
1331 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) {
1332 data->sco_num = hci_conn_num(hdev, SCO_LINK);
43c2e57f 1333 schedule_work(&data->work);
a780efa8 1334 }
5e23b923
MH
1335}
1336
42b16b3f 1337static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting)
9bfa35fe 1338{
155961e8 1339 struct btusb_data *data = hci_get_drvdata(hdev);
9bfa35fe
MH
1340 struct usb_interface *intf = data->isoc;
1341 struct usb_endpoint_descriptor *ep_desc;
1342 int i, err;
1343
1344 if (!data->isoc)
1345 return -ENODEV;
1346
1347 err = usb_set_interface(data->udev, 1, altsetting);
1348 if (err < 0) {
1349 BT_ERR("%s setting interface failed (%d)", hdev->name, -err);
1350 return err;
1351 }
1352
1353 data->isoc_altsetting = altsetting;
1354
1355 data->isoc_tx_ep = NULL;
1356 data->isoc_rx_ep = NULL;
1357
1358 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
1359 ep_desc = &intf->cur_altsetting->endpoint[i].desc;
1360
1361 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) {
1362 data->isoc_tx_ep = ep_desc;
1363 continue;
1364 }
1365
1366 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) {
1367 data->isoc_rx_ep = ep_desc;
1368 continue;
1369 }
1370 }
1371
1372 if (!data->isoc_tx_ep || !data->isoc_rx_ep) {
1373 BT_ERR("%s invalid SCO descriptors", hdev->name);
1374 return -ENODEV;
1375 }
1376
1377 return 0;
1378}
1379
5e23b923
MH
1380static void btusb_work(struct work_struct *work)
1381{
1382 struct btusb_data *data = container_of(work, struct btusb_data, work);
1383 struct hci_dev *hdev = data->hdev;
f4001d28 1384 int new_alts;
7bee549e 1385 int err;
5e23b923 1386
014f7bc7 1387 if (data->sco_num > 0) {
08b8b6c4 1388 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) {
8efdd0cd 1389 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf);
7bee549e
ON
1390 if (err < 0) {
1391 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1392 usb_kill_anchored_urbs(&data->isoc_anchor);
1393 return;
1394 }
1395
08b8b6c4 1396 set_bit(BTUSB_DID_ISO_RESUME, &data->flags);
7bee549e 1397 }
f4001d28
MA
1398
1399 if (hdev->voice_setting & 0x0020) {
1400 static const int alts[3] = { 2, 4, 5 };
89e7533d 1401
014f7bc7 1402 new_alts = alts[data->sco_num - 1];
f4001d28 1403 } else {
014f7bc7 1404 new_alts = data->sco_num;
f4001d28
MA
1405 }
1406
1407 if (data->isoc_altsetting != new_alts) {
f6fc86f2
KP
1408 unsigned long flags;
1409
9bfa35fe
MH
1410 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1411 usb_kill_anchored_urbs(&data->isoc_anchor);
1412
8f9d02f4
KP
1413 /* When isochronous alternate setting needs to be
1414 * changed, because SCO connection has been added
1415 * or removed, a packet fragment may be left in the
1416 * reassembling state. This could lead to wrongly
1417 * assembled fragments.
1418 *
1419 * Clear outstanding fragment when selecting a new
1420 * alternate setting.
1421 */
f6fc86f2 1422 spin_lock_irqsave(&data->rxlock, flags);
8f9d02f4
KP
1423 kfree_skb(data->sco_skb);
1424 data->sco_skb = NULL;
f6fc86f2 1425 spin_unlock_irqrestore(&data->rxlock, flags);
8f9d02f4 1426
f4001d28 1427 if (__set_isoc_interface(hdev, new_alts) < 0)
9bfa35fe
MH
1428 return;
1429 }
1430
1431 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
2eda66f4 1432 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0)
9bfa35fe
MH
1433 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1434 else
2eda66f4 1435 btusb_submit_isoc_urb(hdev, GFP_KERNEL);
9bfa35fe
MH
1436 }
1437 } else {
1438 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1439 usb_kill_anchored_urbs(&data->isoc_anchor);
1440
1441 __set_isoc_interface(hdev, 0);
08b8b6c4 1442 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags))
8efdd0cd 1443 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf);
5e23b923
MH
1444 }
1445}
1446
7bee549e
ON
1447static void btusb_waker(struct work_struct *work)
1448{
1449 struct btusb_data *data = container_of(work, struct btusb_data, waker);
1450 int err;
1451
1452 err = usb_autopm_get_interface(data->intf);
1453 if (err < 0)
1454 return;
1455
1456 usb_autopm_put_interface(data->intf);
1457}
1458
9f8f962c
MH
1459static int btusb_setup_bcm92035(struct hci_dev *hdev)
1460{
1461 struct sk_buff *skb;
1462 u8 val = 0x00;
1463
1464 BT_DBG("%s", hdev->name);
1465
1466 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT);
1467 if (IS_ERR(skb))
1468 BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb));
1469 else
1470 kfree_skb(skb);
1471
1472 return 0;
1473}
1474
81cac64b
MH
1475static int btusb_setup_csr(struct hci_dev *hdev)
1476{
1477 struct hci_rp_read_local_version *rp;
1478 struct sk_buff *skb;
81cac64b
MH
1479
1480 BT_DBG("%s", hdev->name);
1481
7cd84d72
MH
1482 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
1483 HCI_INIT_TIMEOUT);
1484 if (IS_ERR(skb)) {
1485 int err = PTR_ERR(skb);
1486 BT_ERR("%s: CSR: Local version failed (%d)", hdev->name, err);
1487 return err;
1488 }
1489
1490 if (skb->len != sizeof(struct hci_rp_read_local_version)) {
1491 BT_ERR("%s: CSR: Local version length mismatch", hdev->name);
1492 kfree_skb(skb);
1493 return -EIO;
1494 }
81cac64b 1495
89e7533d 1496 rp = (struct hci_rp_read_local_version *)skb->data;
81cac64b 1497
6cafcd95
JH
1498 /* Detect controllers which aren't real CSR ones. */
1499 if (le16_to_cpu(rp->manufacturer) != 10 ||
1500 le16_to_cpu(rp->lmp_subver) == 0x0c5c) {
9641d343
MH
1501 /* Clear the reset quirk since this is not an actual
1502 * early Bluetooth 1.1 device from CSR.
1503 */
1504 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
81cac64b 1505
9641d343
MH
1506 /* These fake CSR controllers have all a broken
1507 * stored link key handling and so just disable it.
1508 */
1509 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
1510 }
81cac64b
MH
1511
1512 kfree_skb(skb);
1513
9641d343 1514 return 0;
81cac64b
MH
1515}
1516
dffd30ee 1517static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev,
89e7533d 1518 struct intel_version *ver)
dffd30ee
THJA
1519{
1520 const struct firmware *fw;
1521 char fwname[64];
1522 int ret;
1523
1524 snprintf(fwname, sizeof(fwname),
1525 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
1526 ver->hw_platform, ver->hw_variant, ver->hw_revision,
1527 ver->fw_variant, ver->fw_revision, ver->fw_build_num,
1528 ver->fw_build_ww, ver->fw_build_yy);
1529
1530 ret = request_firmware(&fw, fwname, &hdev->dev);
1531 if (ret < 0) {
1532 if (ret == -EINVAL) {
1533 BT_ERR("%s Intel firmware file request failed (%d)",
1534 hdev->name, ret);
1535 return NULL;
1536 }
1537
1538 BT_ERR("%s failed to open Intel firmware file: %s(%d)",
1539 hdev->name, fwname, ret);
1540
1541 /* If the correct firmware patch file is not found, use the
1542 * default firmware patch file instead
1543 */
1544 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq",
1545 ver->hw_platform, ver->hw_variant);
1546 if (request_firmware(&fw, fwname, &hdev->dev) < 0) {
1547 BT_ERR("%s failed to open default Intel fw file: %s",
1548 hdev->name, fwname);
1549 return NULL;
1550 }
1551 }
1552
1553 BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname);
1554
1555 return fw;
1556}
1557
1558static int btusb_setup_intel_patching(struct hci_dev *hdev,
1559 const struct firmware *fw,
1560 const u8 **fw_ptr, int *disable_patch)
1561{
1562 struct sk_buff *skb;
1563 struct hci_command_hdr *cmd;
1564 const u8 *cmd_param;
1565 struct hci_event_hdr *evt = NULL;
1566 const u8 *evt_param = NULL;
1567 int remain = fw->size - (*fw_ptr - fw->data);
1568
1569 /* The first byte indicates the types of the patch command or event.
1570 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes
1571 * in the current firmware buffer doesn't start with 0x01 or
1572 * the size of remain buffer is smaller than HCI command header,
1573 * the firmware file is corrupted and it should stop the patching
1574 * process.
1575 */
1576 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) {
1577 BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name);
1578 return -EINVAL;
1579 }
1580 (*fw_ptr)++;
1581 remain--;
1582
1583 cmd = (struct hci_command_hdr *)(*fw_ptr);
1584 *fw_ptr += sizeof(*cmd);
1585 remain -= sizeof(*cmd);
1586
1587 /* Ensure that the remain firmware data is long enough than the length
1588 * of command parameter. If not, the firmware file is corrupted.
1589 */
1590 if (remain < cmd->plen) {
1591 BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name);
1592 return -EFAULT;
1593 }
1594
1595 /* If there is a command that loads a patch in the firmware
1596 * file, then enable the patch upon success, otherwise just
1597 * disable the manufacturer mode, for example patch activation
1598 * is not required when the default firmware patch file is used
1599 * because there are no patch data to load.
1600 */
1601 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e)
1602 *disable_patch = 0;
1603
1604 cmd_param = *fw_ptr;
1605 *fw_ptr += cmd->plen;
1606 remain -= cmd->plen;
1607
1608 /* This reads the expected events when the above command is sent to the
1609 * device. Some vendor commands expects more than one events, for
1610 * example command status event followed by vendor specific event.
1611 * For this case, it only keeps the last expected event. so the command
1612 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
1613 * last expected event.
1614 */
1615 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) {
1616 (*fw_ptr)++;
1617 remain--;
1618
1619 evt = (struct hci_event_hdr *)(*fw_ptr);
1620 *fw_ptr += sizeof(*evt);
1621 remain -= sizeof(*evt);
1622
1623 if (remain < evt->plen) {
1624 BT_ERR("%s Intel fw corrupted: invalid evt len",
1625 hdev->name);
1626 return -EFAULT;
1627 }
1628
1629 evt_param = *fw_ptr;
1630 *fw_ptr += evt->plen;
1631 remain -= evt->plen;
1632 }
1633
1634 /* Every HCI commands in the firmware file has its correspond event.
1635 * If event is not found or remain is smaller than zero, the firmware
1636 * file is corrupted.
1637 */
1638 if (!evt || !evt_param || remain < 0) {
1639 BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name);
1640 return -EFAULT;
1641 }
1642
1643 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen,
1644 cmd_param, evt->evt, HCI_INIT_TIMEOUT);
1645 if (IS_ERR(skb)) {
1646 BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)",
1647 hdev->name, cmd->opcode, PTR_ERR(skb));
d9c78e97 1648 return PTR_ERR(skb);
dffd30ee
THJA
1649 }
1650
1651 /* It ensures that the returned event matches the event data read from
1652 * the firmware file. At fist, it checks the length and then
1653 * the contents of the event.
1654 */
1655 if (skb->len != evt->plen) {
1656 BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name,
1657 le16_to_cpu(cmd->opcode));
1658 kfree_skb(skb);
1659 return -EFAULT;
1660 }
1661
1662 if (memcmp(skb->data, evt_param, evt->plen)) {
1663 BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)",
1664 hdev->name, le16_to_cpu(cmd->opcode));
1665 kfree_skb(skb);
1666 return -EFAULT;
1667 }
1668 kfree_skb(skb);
1669
1670 return 0;
1671}
1672
1673static int btusb_setup_intel(struct hci_dev *hdev)
1674{
1675 struct sk_buff *skb;
1676 const struct firmware *fw;
1677 const u8 *fw_ptr;
28dc4b92 1678 int disable_patch, err;
6c483de1 1679 struct intel_version ver;
dffd30ee 1680
dffd30ee
THJA
1681 BT_DBG("%s", hdev->name);
1682
1683 /* The controller has a bug with the first HCI command sent to it
1684 * returning number of completed commands as zero. This would stall the
1685 * command processing in the Bluetooth core.
1686 *
1687 * As a workaround, send HCI Reset command first which will reset the
1688 * number of completed commands and allow normal command processing
1689 * from now on.
1690 */
1691 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
1692 if (IS_ERR(skb)) {
1693 BT_ERR("%s sending initial HCI reset command failed (%ld)",
1694 hdev->name, PTR_ERR(skb));
d9c78e97 1695 return PTR_ERR(skb);
dffd30ee
THJA
1696 }
1697 kfree_skb(skb);
1698
1699 /* Read Intel specific controller version first to allow selection of
1700 * which firmware file to load.
1701 *
1702 * The returned information are hardware variant and revision plus
1703 * firmware variant, revision and build number.
1704 */
6c483de1
LP
1705 err = btintel_read_version(hdev, &ver);
1706 if (err)
1707 return err;
dffd30ee
THJA
1708
1709 BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
6c483de1
LP
1710 hdev->name, ver.hw_platform, ver.hw_variant, ver.hw_revision,
1711 ver.fw_variant, ver.fw_revision, ver.fw_build_num,
1712 ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num);
dffd30ee
THJA
1713
1714 /* fw_patch_num indicates the version of patch the device currently
1715 * have. If there is no patch data in the device, it is always 0x00.
5075edae 1716 * So, if it is other than 0x00, no need to patch the device again.
dffd30ee 1717 */
6c483de1 1718 if (ver.fw_patch_num) {
dffd30ee 1719 BT_INFO("%s: Intel device is already patched. patch num: %02x",
6c483de1 1720 hdev->name, ver.fw_patch_num);
213445b2 1721 goto complete;
dffd30ee
THJA
1722 }
1723
1724 /* Opens the firmware patch file based on the firmware version read
1725 * from the controller. If it fails to open the matching firmware
1726 * patch file, it tries to open the default firmware patch file.
1727 * If no patch file is found, allow the device to operate without
1728 * a patch.
1729 */
6c483de1
LP
1730 fw = btusb_setup_intel_get_fw(hdev, &ver);
1731 if (!fw)
213445b2 1732 goto complete;
dffd30ee
THJA
1733 fw_ptr = fw->data;
1734
28dc4b92 1735 /* Enable the manufacturer mode of the controller.
dffd30ee
THJA
1736 * Only while this mode is enabled, the driver can download the
1737 * firmware patch data and configuration parameters.
1738 */
28dc4b92
LP
1739 err = btintel_enter_mfg(hdev);
1740 if (err) {
dffd30ee 1741 release_firmware(fw);
28dc4b92 1742 return err;
dffd30ee
THJA
1743 }
1744
dffd30ee
THJA
1745 disable_patch = 1;
1746
1747 /* The firmware data file consists of list of Intel specific HCI
1748 * commands and its expected events. The first byte indicates the
1749 * type of the message, either HCI command or HCI event.
1750 *
1751 * It reads the command and its expected event from the firmware file,
1752 * and send to the controller. Once __hci_cmd_sync_ev() returns,
1753 * the returned event is compared with the event read from the firmware
1754 * file and it will continue until all the messages are downloaded to
1755 * the controller.
1756 *
1757 * Once the firmware patching is completed successfully,
1758 * the manufacturer mode is disabled with reset and activating the
1759 * downloaded patch.
1760 *
1761 * If the firmware patching fails, the manufacturer mode is
1762 * disabled with reset and deactivating the patch.
1763 *
1764 * If the default patch file is used, no reset is done when disabling
1765 * the manufacturer.
1766 */
1767 while (fw->size > fw_ptr - fw->data) {
1768 int ret;
1769
1770 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr,
1771 &disable_patch);
1772 if (ret < 0)
1773 goto exit_mfg_deactivate;
1774 }
1775
1776 release_firmware(fw);
1777
1778 if (disable_patch)
1779 goto exit_mfg_disable;
1780
1781 /* Patching completed successfully and disable the manufacturer mode
1782 * with reset and activate the downloaded firmware patches.
1783 */
28dc4b92
LP
1784 err = btintel_exit_mfg(hdev, true, true);
1785 if (err)
1786 return err;
dffd30ee
THJA
1787
1788 BT_INFO("%s: Intel Bluetooth firmware patch completed and activated",
1789 hdev->name);
1790
213445b2 1791 goto complete;
dffd30ee
THJA
1792
1793exit_mfg_disable:
1794 /* Disable the manufacturer mode without reset */
28dc4b92
LP
1795 err = btintel_exit_mfg(hdev, false, false);
1796 if (err)
1797 return err;
dffd30ee
THJA
1798
1799 BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name);
40cb0984 1800
213445b2 1801 goto complete;
dffd30ee
THJA
1802
1803exit_mfg_deactivate:
1804 release_firmware(fw);
1805
1806 /* Patching failed. Disable the manufacturer mode with reset and
1807 * deactivate the downloaded firmware patches.
1808 */
28dc4b92
LP
1809 err = btintel_exit_mfg(hdev, true, false);
1810 if (err)
1811 return err;
dffd30ee
THJA
1812
1813 BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated",
1814 hdev->name);
1815
213445b2
MH
1816complete:
1817 /* Set the event mask for Intel specific vendor events. This enables
1818 * a few extra events that are useful during general operation.
1819 */
1820 btintel_set_event_mask_mfg(hdev, false);
1821
4185a0f5 1822 btintel_check_bdaddr(hdev);
dffd30ee
THJA
1823 return 0;
1824}
1825
cda0dd78
MH
1826static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode)
1827{
1828 struct sk_buff *skb;
1829 struct hci_event_hdr *hdr;
1830 struct hci_ev_cmd_complete *evt;
1831
1832 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC);
1833 if (!skb)
1834 return -ENOMEM;
1835
1836 hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr));
1837 hdr->evt = HCI_EV_CMD_COMPLETE;
1838 hdr->plen = sizeof(*evt) + 1;
1839
1840 evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt));
1841 evt->ncmd = 0x01;
1842 evt->opcode = cpu_to_le16(opcode);
1843
1844 *skb_put(skb, 1) = 0x00;
1845
618e8bc2 1846 hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
cda0dd78
MH
1847
1848 return hci_recv_frame(hdev, skb);
1849}
1850
1851static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer,
1852 int count)
1853{
1854 /* When the device is in bootloader mode, then it can send
1855 * events via the bulk endpoint. These events are treated the
1856 * same way as the ones received from the interrupt endpoint.
1857 */
1858 if (test_bit(BTUSB_BOOTLOADER, &data->flags))
1859 return btusb_recv_intr(data, buffer, count);
1860
1861 return btusb_recv_bulk(data, buffer, count);
1862}
1863
ccd6da2a
MH
1864static void btusb_intel_bootup(struct btusb_data *data, const void *ptr,
1865 unsigned int len)
1866{
1867 const struct intel_bootup *evt = ptr;
1868
1869 if (len != sizeof(*evt))
1870 return;
1871
1872 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) {
1873 smp_mb__after_atomic();
1874 wake_up_bit(&data->flags, BTUSB_BOOTING);
1875 }
1876}
1877
1878static void btusb_intel_secure_send_result(struct btusb_data *data,
1879 const void *ptr, unsigned int len)
1880{
1881 const struct intel_secure_send_result *evt = ptr;
1882
1883 if (len != sizeof(*evt))
1884 return;
1885
1886 if (evt->result)
1887 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags);
1888
1889 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) &&
1890 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) {
1891 smp_mb__after_atomic();
1892 wake_up_bit(&data->flags, BTUSB_DOWNLOADING);
1893 }
1894}
1895
cda0dd78
MH
1896static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb)
1897{
1898 struct btusb_data *data = hci_get_drvdata(hdev);
1899
1900 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
1901 struct hci_event_hdr *hdr = (void *)skb->data;
1902
ccd6da2a
MH
1903 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff &&
1904 hdr->plen > 0) {
1905 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1;
1906 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1;
1907
1908 switch (skb->data[2]) {
1909 case 0x02:
1910 /* When switching to the operational firmware
1911 * the device sends a vendor specific event
1912 * indicating that the bootup completed.
1913 */
1914 btusb_intel_bootup(data, ptr, len);
1915 break;
1916 case 0x06:
1917 /* When the firmware loading completes the
1918 * device sends out a vendor specific event
1919 * indicating the result of the firmware
1920 * loading.
1921 */
1922 btusb_intel_secure_send_result(data, ptr, len);
1923 break;
fad70972 1924 }
cda0dd78
MH
1925 }
1926 }
1927
1928 return hci_recv_frame(hdev, skb);
1929}
1930
1931static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb)
1932{
1933 struct btusb_data *data = hci_get_drvdata(hdev);
1934 struct urb *urb;
1935
1936 BT_DBG("%s", hdev->name);
1937
618e8bc2 1938 switch (hci_skb_pkt_type(skb)) {
cda0dd78
MH
1939 case HCI_COMMAND_PKT:
1940 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
1941 struct hci_command_hdr *cmd = (void *)skb->data;
1942 __u16 opcode = le16_to_cpu(cmd->opcode);
1943
1944 /* When in bootloader mode and the command 0xfc09
1945 * is received, it needs to be send down the
1946 * bulk endpoint. So allocate a bulk URB instead.
1947 */
1948 if (opcode == 0xfc09)
1949 urb = alloc_bulk_urb(hdev, skb);
1950 else
1951 urb = alloc_ctrl_urb(hdev, skb);
1952
1953 /* When the 0xfc01 command is issued to boot into
1954 * the operational firmware, it will actually not
1955 * send a command complete event. To keep the flow
1956 * control working inject that event here.
1957 */
1958 if (opcode == 0xfc01)
1959 inject_cmd_complete(hdev, opcode);
1960 } else {
1961 urb = alloc_ctrl_urb(hdev, skb);
1962 }
1963 if (IS_ERR(urb))
1964 return PTR_ERR(urb);
1965
1966 hdev->stat.cmd_tx++;
1967 return submit_or_queue_tx_urb(hdev, urb);
1968
1969 case HCI_ACLDATA_PKT:
1970 urb = alloc_bulk_urb(hdev, skb);
1971 if (IS_ERR(urb))
1972 return PTR_ERR(urb);
1973
1974 hdev->stat.acl_tx++;
1975 return submit_or_queue_tx_urb(hdev, urb);
1976
1977 case HCI_SCODATA_PKT:
1978 if (hci_conn_num(hdev, SCO_LINK) < 1)
1979 return -ENODEV;
1980
1981 urb = alloc_isoc_urb(hdev, skb);
1982 if (IS_ERR(urb))
1983 return PTR_ERR(urb);
1984
1985 hdev->stat.sco_tx++;
1986 return submit_tx_urb(hdev, urb);
1987 }
1988
1989 return -EILSEQ;
1990}
1991
cda0dd78
MH
1992static int btusb_setup_intel_new(struct hci_dev *hdev)
1993{
1994 static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01,
1995 0x00, 0x08, 0x04, 0x00 };
1996 struct btusb_data *data = hci_get_drvdata(hdev);
1997 struct sk_buff *skb;
6c483de1 1998 struct intel_version ver;
cda0dd78
MH
1999 struct intel_boot_params *params;
2000 const struct firmware *fw;
2001 const u8 *fw_ptr;
e66890a9 2002 u32 frag_len;
cda0dd78
MH
2003 char fwname[64];
2004 ktime_t calltime, delta, rettime;
2005 unsigned long long duration;
2006 int err;
2007
2008 BT_DBG("%s", hdev->name);
2009
2010 calltime = ktime_get();
2011
2012 /* Read the Intel version information to determine if the device
2013 * is in bootloader mode or if it already has operational firmware
2014 * loaded.
2015 */
6c483de1
LP
2016 err = btintel_read_version(hdev, &ver);
2017 if (err)
2018 return err;
cda0dd78
MH
2019
2020 /* The hardware platform number has a fixed value of 0x37 and
2021 * for now only accept this single value.
2022 */
6c483de1 2023 if (ver.hw_platform != 0x37) {
cda0dd78 2024 BT_ERR("%s: Unsupported Intel hardware platform (%u)",
6c483de1 2025 hdev->name, ver.hw_platform);
cda0dd78
MH
2026 return -EINVAL;
2027 }
2028
9268834b
THJA
2029 /* Check for supported iBT hardware variants of this firmware
2030 * loading method.
a0af53b5
THJA
2031 *
2032 * This check has been put in place to ensure correct forward
2033 * compatibility options when newer hardware variants come along.
cda0dd78 2034 */
9268834b
THJA
2035 switch (ver.hw_variant) {
2036 case 0x0b: /* SfP */
2037 case 0x0c: /* WsP */
de766142 2038 case 0x12: /* ThP */
9268834b
THJA
2039 break;
2040 default:
cda0dd78 2041 BT_ERR("%s: Unsupported Intel hardware variant (%u)",
6c483de1 2042 hdev->name, ver.hw_variant);
cda0dd78
MH
2043 return -EINVAL;
2044 }
2045
6c483de1 2046 btintel_version_info(hdev, &ver);
cda0dd78
MH
2047
2048 /* The firmware variant determines if the device is in bootloader
2049 * mode or is running operational firmware. The value 0x06 identifies
2050 * the bootloader and the value 0x23 identifies the operational
2051 * firmware.
2052 *
2053 * When the operational firmware is already present, then only
2054 * the check for valid Bluetooth device address is needed. This
2055 * determines if the device will be added as configured or
2056 * unconfigured controller.
2057 *
2058 * It is not possible to use the Secure Boot Parameters in this
2059 * case since that command is only available in bootloader mode.
2060 */
6c483de1 2061 if (ver.fw_variant == 0x23) {
cda0dd78 2062 clear_bit(BTUSB_BOOTLOADER, &data->flags);
4185a0f5 2063 btintel_check_bdaddr(hdev);
cda0dd78
MH
2064 return 0;
2065 }
2066
2067 /* If the device is not in bootloader mode, then the only possible
2068 * choice is to return an error and abort the device initialization.
2069 */
6c483de1 2070 if (ver.fw_variant != 0x06) {
cda0dd78 2071 BT_ERR("%s: Unsupported Intel firmware variant (%u)",
6c483de1 2072 hdev->name, ver.fw_variant);
cda0dd78
MH
2073 return -ENODEV;
2074 }
2075
cda0dd78
MH
2076 /* Read the secure boot parameters to identify the operating
2077 * details of the bootloader.
2078 */
2079 skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT);
2080 if (IS_ERR(skb)) {
2081 BT_ERR("%s: Reading Intel boot parameters failed (%ld)",
2082 hdev->name, PTR_ERR(skb));
2083 return PTR_ERR(skb);
2084 }
2085
2086 if (skb->len != sizeof(*params)) {
2087 BT_ERR("%s: Intel boot parameters size mismatch", hdev->name);
2088 kfree_skb(skb);
2089 return -EILSEQ;
2090 }
2091
2092 params = (struct intel_boot_params *)skb->data;
cda0dd78
MH
2093
2094 BT_INFO("%s: Device revision is %u", hdev->name,
2095 le16_to_cpu(params->dev_revid));
2096
2097 BT_INFO("%s: Secure boot is %s", hdev->name,
2098 params->secure_boot ? "enabled" : "disabled");
2099
2220994e
MH
2100 BT_INFO("%s: OTP lock is %s", hdev->name,
2101 params->otp_lock ? "enabled" : "disabled");
2102
2103 BT_INFO("%s: API lock is %s", hdev->name,
2104 params->api_lock ? "enabled" : "disabled");
2105
2106 BT_INFO("%s: Debug lock is %s", hdev->name,
2107 params->debug_lock ? "enabled" : "disabled");
2108
cda0dd78
MH
2109 BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name,
2110 params->min_fw_build_nn, params->min_fw_build_cw,
2111 2000 + params->min_fw_build_yy);
2112
2113 /* It is required that every single firmware fragment is acknowledged
2114 * with a command complete event. If the boot parameters indicate
2115 * that this bootloader does not send them, then abort the setup.
2116 */
2117 if (params->limited_cce != 0x00) {
2118 BT_ERR("%s: Unsupported Intel firmware loading method (%u)",
2119 hdev->name, params->limited_cce);
2120 kfree_skb(skb);
2121 return -EINVAL;
2122 }
2123
2124 /* If the OTP has no valid Bluetooth device address, then there will
2125 * also be no valid address for the operational firmware.
2126 */
2127 if (!bacmp(&params->otp_bdaddr, BDADDR_ANY)) {
2128 BT_INFO("%s: No device address configured", hdev->name);
2129 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
2130 }
2131
2132 /* With this Intel bootloader only the hardware variant and device
2133 * revision information are used to select the right firmware.
2134 *
230b04ac
THJA
2135 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi.
2136 *
2137 * Currently the supported hardware variants are:
2138 * 11 (0x0b) for iBT3.0 (LnP/SfP)
2139 * 12 (0x0c) for iBT3.5 (WsP)
cda0dd78 2140 */
230b04ac
THJA
2141 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi",
2142 le16_to_cpu(ver.hw_variant),
cda0dd78
MH
2143 le16_to_cpu(params->dev_revid));
2144
2145 err = request_firmware(&fw, fwname, &hdev->dev);
2146 if (err < 0) {
2147 BT_ERR("%s: Failed to load Intel firmware file (%d)",
2148 hdev->name, err);
2149 kfree_skb(skb);
2150 return err;
2151 }
2152
2153 BT_INFO("%s: Found device firmware: %s", hdev->name, fwname);
2154
52cc9168
THJA
2155 /* Save the DDC file name for later use to apply once the firmware
2156 * downloading is done.
2157 */
230b04ac
THJA
2158 snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc",
2159 le16_to_cpu(ver.hw_variant),
52cc9168
THJA
2160 le16_to_cpu(params->dev_revid));
2161
cda0dd78
MH
2162 kfree_skb(skb);
2163
2164 if (fw->size < 644) {
2165 BT_ERR("%s: Invalid size of firmware file (%zu)",
2166 hdev->name, fw->size);
2167 err = -EBADF;
2168 goto done;
2169 }
2170
2171 set_bit(BTUSB_DOWNLOADING, &data->flags);
2172
2173 /* Start the firmware download transaction with the Init fragment
2174 * represented by the 128 bytes of CSS header.
2175 */
09df123d 2176 err = btintel_secure_send(hdev, 0x00, 128, fw->data);
cda0dd78
MH
2177 if (err < 0) {
2178 BT_ERR("%s: Failed to send firmware header (%d)",
2179 hdev->name, err);
2180 goto done;
2181 }
2182
2183 /* Send the 256 bytes of public key information from the firmware
2184 * as the PKey fragment.
2185 */
09df123d 2186 err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128);
cda0dd78
MH
2187 if (err < 0) {
2188 BT_ERR("%s: Failed to send firmware public key (%d)",
2189 hdev->name, err);
2190 goto done;
2191 }
2192
2193 /* Send the 256 bytes of signature information from the firmware
2194 * as the Sign fragment.
2195 */
09df123d 2196 err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388);
cda0dd78
MH
2197 if (err < 0) {
2198 BT_ERR("%s: Failed to send firmware signature (%d)",
2199 hdev->name, err);
2200 goto done;
2201 }
2202
2203 fw_ptr = fw->data + 644;
e66890a9 2204 frag_len = 0;
cda0dd78
MH
2205
2206 while (fw_ptr - fw->data < fw->size) {
e66890a9 2207 struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len);
cda0dd78 2208
e66890a9 2209 frag_len += sizeof(*cmd) + cmd->plen;
cda0dd78 2210
5075edae 2211 /* The parameter length of the secure send command requires
e66890a9
MH
2212 * a 4 byte alignment. It happens so that the firmware file
2213 * contains proper Intel_NOP commands to align the fragments
2214 * as needed.
2215 *
2216 * Send set of commands with 4 byte alignment from the
2217 * firmware data buffer as a single Data fragement.
cda0dd78 2218 */
e66890a9 2219 if (!(frag_len % 4)) {
09df123d 2220 err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr);
e66890a9
MH
2221 if (err < 0) {
2222 BT_ERR("%s: Failed to send firmware data (%d)",
2223 hdev->name, err);
2224 goto done;
2225 }
cda0dd78 2226
e66890a9
MH
2227 fw_ptr += frag_len;
2228 frag_len = 0;
2229 }
cda0dd78
MH
2230 }
2231
ce6bb929
MH
2232 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
2233
a087a98e
JH
2234 BT_INFO("%s: Waiting for firmware download to complete", hdev->name);
2235
cda0dd78
MH
2236 /* Before switching the device into operational mode and with that
2237 * booting the loaded firmware, wait for the bootloader notification
2238 * that all fragments have been successfully received.
2239 *
a087a98e
JH
2240 * When the event processing receives the notification, then the
2241 * BTUSB_DOWNLOADING flag will be cleared.
2242 *
2243 * The firmware loading should not take longer than 5 seconds
2244 * and thus just timeout if that happens and fail the setup
2245 * of this device.
cda0dd78 2246 */
129a7693
JH
2247 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
2248 TASK_INTERRUPTIBLE,
2249 msecs_to_jiffies(5000));
f0a70a04 2250 if (err == -EINTR) {
a087a98e 2251 BT_ERR("%s: Firmware loading interrupted", hdev->name);
a087a98e
JH
2252 goto done;
2253 }
cda0dd78 2254
a087a98e
JH
2255 if (err) {
2256 BT_ERR("%s: Firmware loading timeout", hdev->name);
2257 err = -ETIMEDOUT;
2258 goto done;
cda0dd78
MH
2259 }
2260
2261 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
2262 BT_ERR("%s: Firmware loading failed", hdev->name);
2263 err = -ENOEXEC;
2264 goto done;
2265 }
2266
2267 rettime = ktime_get();
2268 delta = ktime_sub(rettime, calltime);
2269 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
2270
2271 BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration);
2272
2273done:
2274 release_firmware(fw);
2275
2276 if (err < 0)
2277 return err;
2278
2279 calltime = ktime_get();
2280
2281 set_bit(BTUSB_BOOTING, &data->flags);
2282
2283 skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param,
2284 HCI_INIT_TIMEOUT);
2285 if (IS_ERR(skb))
2286 return PTR_ERR(skb);
2287
2288 kfree_skb(skb);
2289
2290 /* The bootloader will not indicate when the device is ready. This
2291 * is done by the operational firmware sending bootup notification.
fad70972
JH
2292 *
2293 * Booting into operational firmware should not take longer than
2294 * 1 second. However if that happens, then just fail the setup
2295 * since something went wrong.
cda0dd78 2296 */
fad70972 2297 BT_INFO("%s: Waiting for device to boot", hdev->name);
cda0dd78 2298
129a7693
JH
2299 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
2300 TASK_INTERRUPTIBLE,
2301 msecs_to_jiffies(1000));
cda0dd78 2302
f0a70a04 2303 if (err == -EINTR) {
fad70972
JH
2304 BT_ERR("%s: Device boot interrupted", hdev->name);
2305 return -EINTR;
2306 }
cda0dd78 2307
fad70972
JH
2308 if (err) {
2309 BT_ERR("%s: Device boot timeout", hdev->name);
2310 return -ETIMEDOUT;
cda0dd78
MH
2311 }
2312
2313 rettime = ktime_get();
2314 delta = ktime_sub(rettime, calltime);
2315 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
2316
2317 BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration);
2318
2319 clear_bit(BTUSB_BOOTLOADER, &data->flags);
2320
52cc9168
THJA
2321 /* Once the device is running in operational mode, it needs to apply
2322 * the device configuration (DDC) parameters.
2323 *
2324 * The device can work without DDC parameters, so even if it fails
2325 * to load the file, no need to fail the setup.
2326 */
e924d3d6 2327 btintel_load_ddc_config(hdev, fwname);
52cc9168 2328
213445b2
MH
2329 /* Set the event mask for Intel specific vendor events. This enables
2330 * a few extra events that are useful during general operation. It
2331 * does not enable any debugging related events.
2332 *
2333 * The device will function correctly without these events enabled
2334 * and thus no need to fail the setup.
2335 */
2336 btintel_set_event_mask(hdev, false);
2337
cda0dd78
MH
2338 return 0;
2339}
2340
bfbd45e9
THJA
2341static int btusb_shutdown_intel(struct hci_dev *hdev)
2342{
2343 struct sk_buff *skb;
2344 long ret;
2345
2346 /* Some platforms have an issue with BT LED when the interface is
2347 * down or BT radio is turned off, which takes 5 seconds to BT LED
2348 * goes off. This command turns off the BT LED immediately.
2349 */
2350 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT);
2351 if (IS_ERR(skb)) {
2352 ret = PTR_ERR(skb);
2353 BT_ERR("%s: turning off Intel device LED failed (%ld)",
2354 hdev->name, ret);
2355 return ret;
2356 }
2357 kfree_skb(skb);
2358
2359 return 0;
2360}
2361
a4ccc9e3
RJ
2362#ifdef CONFIG_PM
2363/* Configure an out-of-band gpio as wake-up pin, if specified in device tree */
2364static int marvell_config_oob_wake(struct hci_dev *hdev)
2365{
2366 struct sk_buff *skb;
2367 struct btusb_data *data = hci_get_drvdata(hdev);
2368 struct device *dev = &data->udev->dev;
2369 u16 pin, gap, opcode;
2370 int ret;
2371 u8 cmd[5];
2372
2373 /* Move on if no wakeup pin specified */
2374 if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) ||
2375 of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap))
2376 return 0;
2377
2378 /* Vendor specific command to configure a GPIO as wake-up pin */
2379 opcode = hci_opcode_pack(0x3F, 0x59);
2380 cmd[0] = opcode & 0xFF;
2381 cmd[1] = opcode >> 8;
2382 cmd[2] = 2; /* length of parameters that follow */
2383 cmd[3] = pin;
2384 cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */
2385
2386 skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL);
2387 if (!skb) {
2388 bt_dev_err(hdev, "%s: No memory\n", __func__);
2389 return -ENOMEM;
2390 }
2391
2392 memcpy(skb_put(skb, sizeof(cmd)), cmd, sizeof(cmd));
2393 hci_skb_pkt_type(skb) = HCI_COMMAND_PKT;
2394
2395 ret = btusb_send_frame(hdev, skb);
2396 if (ret) {
2397 bt_dev_err(hdev, "%s: configuration failed\n", __func__);
2398 kfree_skb(skb);
2399 return ret;
2400 }
2401
2402 return 0;
2403}
2404#endif
2405
ae8df494
AK
2406static int btusb_set_bdaddr_marvell(struct hci_dev *hdev,
2407 const bdaddr_t *bdaddr)
2408{
2409 struct sk_buff *skb;
2410 u8 buf[8];
2411 long ret;
2412
2413 buf[0] = 0xfe;
2414 buf[1] = sizeof(bdaddr_t);
2415 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t));
2416
2417 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT);
2418 if (IS_ERR(skb)) {
2419 ret = PTR_ERR(skb);
2420 BT_ERR("%s: changing Marvell device address failed (%ld)",
2421 hdev->name, ret);
2422 return ret;
2423 }
2424 kfree_skb(skb);
2425
2426 return 0;
2427}
2428
5859223e
TK
2429static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev,
2430 const bdaddr_t *bdaddr)
2431{
2432 struct sk_buff *skb;
2433 u8 buf[10];
2434 long ret;
2435
2436 buf[0] = 0x01;
2437 buf[1] = 0x01;
2438 buf[2] = 0x00;
2439 buf[3] = sizeof(bdaddr_t);
2440 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t));
2441
2442 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT);
2443 if (IS_ERR(skb)) {
2444 ret = PTR_ERR(skb);
2445 BT_ERR("%s: Change address command failed (%ld)",
2446 hdev->name, ret);
2447 return ret;
2448 }
2449 kfree_skb(skb);
2450
2451 return 0;
2452}
2453
3267c884
KBYT
2454#define QCA_DFU_PACKET_LEN 4096
2455
2456#define QCA_GET_TARGET_VERSION 0x09
2457#define QCA_CHECK_STATUS 0x05
2458#define QCA_DFU_DOWNLOAD 0x01
2459
2460#define QCA_SYSCFG_UPDATED 0x40
2461#define QCA_PATCH_UPDATED 0x80
2462#define QCA_DFU_TIMEOUT 3000
2463
2464struct qca_version {
2465 __le32 rom_version;
2466 __le32 patch_version;
2467 __le32 ram_version;
2468 __le32 ref_clock;
2469 __u8 reserved[4];
2470} __packed;
2471
2472struct qca_rampatch_version {
2473 __le16 rom_version;
2474 __le16 patch_version;
2475} __packed;
2476
2477struct qca_device_info {
bf906b3d
KBYT
2478 u32 rom_version;
2479 u8 rampatch_hdr; /* length of header in rampatch */
2480 u8 nvm_hdr; /* length of header in NVM */
2481 u8 ver_offset; /* offset of version structure in rampatch */
3267c884
KBYT
2482};
2483
2484static const struct qca_device_info qca_devices_table[] = {
2485 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */
2486 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */
7f6e6363 2487 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */
3267c884
KBYT
2488 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */
2489 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */
2490 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */
2491};
2492
2493static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request,
2494 void *data, u16 size)
2495{
2496 struct btusb_data *btdata = hci_get_drvdata(hdev);
2497 struct usb_device *udev = btdata->udev;
2498 int pipe, err;
2499 u8 *buf;
2500
2501 buf = kmalloc(size, GFP_KERNEL);
2502 if (!buf)
2503 return -ENOMEM;
2504
2505 /* Found some of USB hosts have IOT issues with ours so that we should
2506 * not wait until HCI layer is ready.
2507 */
2508 pipe = usb_rcvctrlpipe(udev, 0);
2509 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN,
2510 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
2511 if (err < 0) {
2512 BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err);
2513 goto done;
2514 }
2515
2516 memcpy(data, buf, size);
2517
2518done:
2519 kfree(buf);
2520
2521 return err;
2522}
2523
2524static int btusb_setup_qca_download_fw(struct hci_dev *hdev,
2525 const struct firmware *firmware,
2526 size_t hdr_size)
2527{
2528 struct btusb_data *btdata = hci_get_drvdata(hdev);
2529 struct usb_device *udev = btdata->udev;
2530 size_t count, size, sent = 0;
2531 int pipe, len, err;
2532 u8 *buf;
2533
2534 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL);
2535 if (!buf)
2536 return -ENOMEM;
2537
2538 count = firmware->size;
2539
2540 size = min_t(size_t, count, hdr_size);
2541 memcpy(buf, firmware->data, size);
2542
2543 /* USB patches should go down to controller through USB path
2544 * because binary format fits to go down through USB channel.
2545 * USB control path is for patching headers and USB bulk is for
2546 * patch body.
2547 */
2548 pipe = usb_sndctrlpipe(udev, 0);
2549 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR,
2550 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
2551 if (err < 0) {
2552 BT_ERR("%s: Failed to send headers (%d)", hdev->name, err);
2553 goto done;
2554 }
2555
2556 sent += size;
2557 count -= size;
2558
2559 while (count) {
2560 size = min_t(size_t, count, QCA_DFU_PACKET_LEN);
2561
2562 memcpy(buf, firmware->data + sent, size);
2563
2564 pipe = usb_sndbulkpipe(udev, 0x02);
2565 err = usb_bulk_msg(udev, pipe, buf, size, &len,
2566 QCA_DFU_TIMEOUT);
2567 if (err < 0) {
2568 BT_ERR("%s: Failed to send body at %zd of %zd (%d)",
2569 hdev->name, sent, firmware->size, err);
2570 break;
2571 }
2572
2573 if (size != len) {
2574 BT_ERR("%s: Failed to get bulk buffer", hdev->name);
2575 err = -EILSEQ;
2576 break;
2577 }
2578
2579 sent += size;
2580 count -= size;
2581 }
2582
2583done:
2584 kfree(buf);
2585 return err;
2586}
2587
2588static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev,
2589 struct qca_version *ver,
2590 const struct qca_device_info *info)
2591{
2592 struct qca_rampatch_version *rver;
2593 const struct firmware *fw;
bf906b3d
KBYT
2594 u32 ver_rom, ver_patch;
2595 u16 rver_rom, rver_patch;
3267c884
KBYT
2596 char fwname[64];
2597 int err;
2598
bf906b3d
KBYT
2599 ver_rom = le32_to_cpu(ver->rom_version);
2600 ver_patch = le32_to_cpu(ver->patch_version);
2601
2602 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom);
3267c884
KBYT
2603
2604 err = request_firmware(&fw, fwname, &hdev->dev);
2605 if (err) {
2606 BT_ERR("%s: failed to request rampatch file: %s (%d)",
2607 hdev->name, fwname, err);
2608 return err;
2609 }
2610
2611 BT_INFO("%s: using rampatch file: %s", hdev->name, fwname);
bf906b3d 2612
3267c884 2613 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset);
bf906b3d
KBYT
2614 rver_rom = le16_to_cpu(rver->rom_version);
2615 rver_patch = le16_to_cpu(rver->patch_version);
2616
3267c884 2617 BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x "
bf906b3d
KBYT
2618 "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom,
2619 ver_patch);
3267c884 2620
bf906b3d 2621 if (rver_rom != ver_rom || rver_patch <= ver_patch) {
3267c884
KBYT
2622 BT_ERR("%s: rampatch file version did not match with firmware",
2623 hdev->name);
2624 err = -EINVAL;
2625 goto done;
2626 }
2627
2628 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr);
2629
2630done:
2631 release_firmware(fw);
2632
2633 return err;
2634}
2635
2636static int btusb_setup_qca_load_nvm(struct hci_dev *hdev,
2637 struct qca_version *ver,
2638 const struct qca_device_info *info)
2639{
2640 const struct firmware *fw;
2641 char fwname[64];
2642 int err;
2643
2644 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin",
2645 le32_to_cpu(ver->rom_version));
2646
2647 err = request_firmware(&fw, fwname, &hdev->dev);
2648 if (err) {
2649 BT_ERR("%s: failed to request NVM file: %s (%d)",
2650 hdev->name, fwname, err);
2651 return err;
2652 }
2653
2654 BT_INFO("%s: using NVM file: %s", hdev->name, fwname);
2655
2656 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr);
2657
2658 release_firmware(fw);
2659
2660 return err;
2661}
2662
2663static int btusb_setup_qca(struct hci_dev *hdev)
2664{
2665 const struct qca_device_info *info = NULL;
2666 struct qca_version ver;
bf906b3d 2667 u32 ver_rom;
3267c884
KBYT
2668 u8 status;
2669 int i, err;
2670
2671 err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver,
eb50042f 2672 sizeof(ver));
3267c884
KBYT
2673 if (err < 0)
2674 return err;
2675
bf906b3d 2676 ver_rom = le32_to_cpu(ver.rom_version);
3267c884 2677 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) {
bf906b3d 2678 if (ver_rom == qca_devices_table[i].rom_version)
3267c884
KBYT
2679 info = &qca_devices_table[i];
2680 }
2681 if (!info) {
2682 BT_ERR("%s: don't support firmware rome 0x%x", hdev->name,
bf906b3d 2683 ver_rom);
3267c884
KBYT
2684 return -ENODEV;
2685 }
2686
2687 err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status,
2688 sizeof(status));
2689 if (err < 0)
2690 return err;
2691
2692 if (!(status & QCA_PATCH_UPDATED)) {
2693 err = btusb_setup_qca_load_rampatch(hdev, &ver, info);
2694 if (err < 0)
2695 return err;
2696 }
2697
2698 if (!(status & QCA_SYSCFG_UPDATED)) {
2699 err = btusb_setup_qca_load_nvm(hdev, &ver, info);
2700 if (err < 0)
2701 return err;
2702 }
2703
2704 return 0;
2705}
2706
9d08f504
MH
2707#ifdef CONFIG_BT_HCIBTUSB_BCM
2708static inline int __set_diag_interface(struct hci_dev *hdev)
2709{
2710 struct btusb_data *data = hci_get_drvdata(hdev);
2711 struct usb_interface *intf = data->diag;
2712 int i;
2713
2714 if (!data->diag)
2715 return -ENODEV;
2716
2717 data->diag_tx_ep = NULL;
2718 data->diag_rx_ep = NULL;
2719
2720 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
2721 struct usb_endpoint_descriptor *ep_desc;
2722
2723 ep_desc = &intf->cur_altsetting->endpoint[i].desc;
2724
2725 if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
2726 data->diag_tx_ep = ep_desc;
2727 continue;
2728 }
2729
2730 if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
2731 data->diag_rx_ep = ep_desc;
2732 continue;
2733 }
2734 }
2735
2736 if (!data->diag_tx_ep || !data->diag_rx_ep) {
2737 BT_ERR("%s invalid diagnostic descriptors", hdev->name);
2738 return -ENODEV;
2739 }
2740
2741 return 0;
2742}
2743
2744static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable)
2745{
2746 struct btusb_data *data = hci_get_drvdata(hdev);
2747 struct sk_buff *skb;
2748 struct urb *urb;
2749 unsigned int pipe;
2750
2751 if (!data->diag_tx_ep)
2752 return ERR_PTR(-ENODEV);
2753
2754 urb = usb_alloc_urb(0, GFP_KERNEL);
2755 if (!urb)
2756 return ERR_PTR(-ENOMEM);
2757
2758 skb = bt_skb_alloc(2, GFP_KERNEL);
2759 if (!skb) {
2760 usb_free_urb(urb);
2761 return ERR_PTR(-ENOMEM);
2762 }
2763
2764 *skb_put(skb, 1) = 0xf0;
2765 *skb_put(skb, 1) = enable;
2766
2767 pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress);
2768
2769 usb_fill_bulk_urb(urb, data->udev, pipe,
2770 skb->data, skb->len, btusb_tx_complete, skb);
2771
2772 skb->dev = (void *)hdev;
2773
2774 return urb;
2775}
2776
2777static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable)
2778{
2779 struct btusb_data *data = hci_get_drvdata(hdev);
2780 struct urb *urb;
2781
2782 if (!data->diag)
2783 return -ENODEV;
2784
2785 if (!test_bit(HCI_RUNNING, &hdev->flags))
2786 return -ENETDOWN;
2787
2788 urb = alloc_diag_urb(hdev, enable);
2789 if (IS_ERR(urb))
2790 return PTR_ERR(urb);
2791
2792 return submit_or_queue_tx_urb(hdev, urb);
2793}
2794#endif
2795
fd913ef7
RJ
2796#ifdef CONFIG_PM
2797static irqreturn_t btusb_oob_wake_handler(int irq, void *priv)
2798{
2799 struct btusb_data *data = priv;
2800
2801 pm_wakeup_event(&data->udev->dev, 0);
2802
2803 /* Disable only if not already disabled (keep it balanced) */
2804 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
2805 disable_irq_nosync(irq);
2806 disable_irq_wake(irq);
2807 }
2808 return IRQ_HANDLED;
2809}
2810
2811static const struct of_device_id btusb_match_table[] = {
2812 { .compatible = "usb1286,204e" },
2813 { }
2814};
2815MODULE_DEVICE_TABLE(of, btusb_match_table);
2816
2817/* Use an oob wakeup pin? */
2818static int btusb_config_oob_wake(struct hci_dev *hdev)
2819{
2820 struct btusb_data *data = hci_get_drvdata(hdev);
2821 struct device *dev = &data->udev->dev;
2822 int irq, ret;
2823
2824 clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
2825
2826 if (!of_match_device(btusb_match_table, dev))
2827 return 0;
2828
2829 /* Move on if no IRQ specified */
2830 irq = of_irq_get_byname(dev->of_node, "wakeup");
2831 if (irq <= 0) {
2832 bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__);
2833 return 0;
2834 }
2835
2836 ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler,
2837 0, "OOB Wake-on-BT", data);
2838 if (ret) {
2839 bt_dev_err(hdev, "%s: IRQ request failed", __func__);
2840 return ret;
2841 }
2842
2843 ret = device_init_wakeup(dev, true);
2844 if (ret) {
2845 bt_dev_err(hdev, "%s: failed to init_wakeup", __func__);
2846 return ret;
2847 }
2848
2849 data->oob_wake_irq = irq;
2850 disable_irq(irq);
2851 bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq);
2852 return 0;
2853}
2854#endif
2855
5e23b923 2856static int btusb_probe(struct usb_interface *intf,
89e7533d 2857 const struct usb_device_id *id)
5e23b923
MH
2858{
2859 struct usb_endpoint_descriptor *ep_desc;
2860 struct btusb_data *data;
2861 struct hci_dev *hdev;
22f8e9db 2862 unsigned ifnum_base;
5e23b923
MH
2863 int i, err;
2864
2865 BT_DBG("intf %p id %p", intf, id);
2866
cfeb4145 2867 /* interface numbers are hardcoded in the spec */
22f8e9db
MH
2868 if (intf->cur_altsetting->desc.bInterfaceNumber != 0) {
2869 if (!(id->driver_info & BTUSB_IFNUM_2))
2870 return -ENODEV;
2871 if (intf->cur_altsetting->desc.bInterfaceNumber != 2)
2872 return -ENODEV;
2873 }
2874
2875 ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber;
5e23b923
MH
2876
2877 if (!id->driver_info) {
2878 const struct usb_device_id *match;
89e7533d 2879
5e23b923
MH
2880 match = usb_match_id(intf, blacklist_table);
2881 if (match)
2882 id = match;
2883 }
2884
cfeb4145
MH
2885 if (id->driver_info == BTUSB_IGNORE)
2886 return -ENODEV;
2887
2d25f8b4
SL
2888 if (id->driver_info & BTUSB_ATH3012) {
2889 struct usb_device *udev = interface_to_usbdev(intf);
2890
2891 /* Old firmware would otherwise let ath3k driver load
2892 * patch and sysconfig files */
2893 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001)
2894 return -ENODEV;
2895 }
2896
98921dbd 2897 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL);
5e23b923
MH
2898 if (!data)
2899 return -ENOMEM;
2900
2901 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
2902 ep_desc = &intf->cur_altsetting->endpoint[i].desc;
2903
2904 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) {
2905 data->intr_ep = ep_desc;
2906 continue;
2907 }
2908
2909 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
2910 data->bulk_tx_ep = ep_desc;
2911 continue;
2912 }
2913
2914 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
2915 data->bulk_rx_ep = ep_desc;
2916 continue;
2917 }
2918 }
2919
98921dbd 2920 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep)
5e23b923 2921 return -ENODEV;
5e23b923 2922
893ba544
MH
2923 if (id->driver_info & BTUSB_AMP) {
2924 data->cmdreq_type = USB_TYPE_CLASS | 0x01;
2925 data->cmdreq = 0x2b;
2926 } else {
2927 data->cmdreq_type = USB_TYPE_CLASS;
2928 data->cmdreq = 0x00;
2929 }
7a9d4020 2930
5e23b923 2931 data->udev = interface_to_usbdev(intf);
5fbcd260 2932 data->intf = intf;
5e23b923 2933
5e23b923 2934 INIT_WORK(&data->work, btusb_work);
7bee549e 2935 INIT_WORK(&data->waker, btusb_waker);
803b5836
MH
2936 init_usb_anchor(&data->deferred);
2937 init_usb_anchor(&data->tx_anchor);
7bee549e 2938 spin_lock_init(&data->txlock);
5e23b923 2939
5e23b923
MH
2940 init_usb_anchor(&data->intr_anchor);
2941 init_usb_anchor(&data->bulk_anchor);
9bfa35fe 2942 init_usb_anchor(&data->isoc_anchor);
9d08f504 2943 init_usb_anchor(&data->diag_anchor);
803b5836 2944 spin_lock_init(&data->rxlock);
5e23b923 2945
cda0dd78
MH
2946 if (id->driver_info & BTUSB_INTEL_NEW) {
2947 data->recv_event = btusb_recv_event_intel;
2948 data->recv_bulk = btusb_recv_bulk_intel;
2949 set_bit(BTUSB_BOOTLOADER, &data->flags);
2950 } else {
2951 data->recv_event = hci_recv_frame;
2952 data->recv_bulk = btusb_recv_bulk;
2953 }
2cbd3f5c 2954
5e23b923 2955 hdev = hci_alloc_dev();
98921dbd 2956 if (!hdev)
5e23b923 2957 return -ENOMEM;
5e23b923 2958
c13854ce 2959 hdev->bus = HCI_USB;
155961e8 2960 hci_set_drvdata(hdev, data);
5e23b923 2961
893ba544
MH
2962 if (id->driver_info & BTUSB_AMP)
2963 hdev->dev_type = HCI_AMP;
2964 else
ca8bee5d 2965 hdev->dev_type = HCI_PRIMARY;
893ba544 2966
5e23b923
MH
2967 data->hdev = hdev;
2968
2969 SET_HCIDEV_DEV(hdev, &intf->dev);
2970
9f8f962c
MH
2971 hdev->open = btusb_open;
2972 hdev->close = btusb_close;
2973 hdev->flush = btusb_flush;
2974 hdev->send = btusb_send_frame;
2975 hdev->notify = btusb_notify;
2976
fd913ef7
RJ
2977#ifdef CONFIG_PM
2978 err = btusb_config_oob_wake(hdev);
2979 if (err)
2980 goto out_free_dev;
a4ccc9e3
RJ
2981
2982 /* Marvell devices may need a specific chip configuration */
2983 if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) {
2984 err = marvell_config_oob_wake(hdev);
2985 if (err)
2986 goto out_free_dev;
2987 }
fd913ef7 2988#endif
418678b0
SJ
2989 if (id->driver_info & BTUSB_CW6622)
2990 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
2991
6c9d435d
MH
2992 if (id->driver_info & BTUSB_BCM2045)
2993 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
2994
9f8f962c
MH
2995 if (id->driver_info & BTUSB_BCM92035)
2996 hdev->setup = btusb_setup_bcm92035;
5e23b923 2997
c2bfb100 2998#ifdef CONFIG_BT_HCIBTUSB_BCM
abbaf50e 2999 if (id->driver_info & BTUSB_BCM_PATCHRAM) {
49a5f782 3000 hdev->manufacturer = 15;
c2bfb100 3001 hdev->setup = btbcm_setup_patchram;
9d08f504 3002 hdev->set_diag = btusb_bcm_set_diag;
1df1f591 3003 hdev->set_bdaddr = btbcm_set_bdaddr;
9d08f504
MH
3004
3005 /* Broadcom LM_DIAG Interface numbers are hardcoded */
22f8e9db 3006 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
abbaf50e 3007 }
10d4c673 3008
9d08f504 3009 if (id->driver_info & BTUSB_BCM_APPLE) {
49a5f782 3010 hdev->manufacturer = 15;
c2bfb100 3011 hdev->setup = btbcm_setup_apple;
9d08f504
MH
3012 hdev->set_diag = btusb_bcm_set_diag;
3013
3014 /* Broadcom LM_DIAG Interface numbers are hardcoded */
22f8e9db 3015 data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
9d08f504 3016 }
c2bfb100 3017#endif
17b2772b 3018
cb8d6597 3019 if (id->driver_info & BTUSB_INTEL) {
49a5f782 3020 hdev->manufacturer = 2;
dffd30ee 3021 hdev->setup = btusb_setup_intel;
bfbd45e9 3022 hdev->shutdown = btusb_shutdown_intel;
3e24767b 3023 hdev->set_diag = btintel_set_diag_mfg;
4185a0f5 3024 hdev->set_bdaddr = btintel_set_bdaddr;
c33fb9b4 3025 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
c1154842 3026 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
3e24767b 3027 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
cb8d6597 3028 }
dffd30ee 3029
cda0dd78 3030 if (id->driver_info & BTUSB_INTEL_NEW) {
49a5f782 3031 hdev->manufacturer = 2;
cda0dd78
MH
3032 hdev->send = btusb_send_frame_intel;
3033 hdev->setup = btusb_setup_intel_new;
eeb6abe9 3034 hdev->hw_error = btintel_hw_error;
6d2e50d2 3035 hdev->set_diag = btintel_set_diag;
4185a0f5 3036 hdev->set_bdaddr = btintel_set_bdaddr;
b970c5ba 3037 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
d8270fbb 3038 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
cda0dd78
MH
3039 }
3040
ae8df494
AK
3041 if (id->driver_info & BTUSB_MARVELL)
3042 hdev->set_bdaddr = btusb_set_bdaddr_marvell;
3043
661cf88a
MH
3044 if (id->driver_info & BTUSB_SWAVE) {
3045 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks);
d57dbe77 3046 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks);
661cf88a 3047 }
d57dbe77 3048
e4c534bb
MH
3049 if (id->driver_info & BTUSB_INTEL_BOOT) {
3050 hdev->manufacturer = 2;
40df783d 3051 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
e4c534bb 3052 }
40df783d 3053
79f0c87d 3054 if (id->driver_info & BTUSB_ATH3012) {
5859223e 3055 hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
3d50d51a 3056 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
79f0c87d
JP
3057 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
3058 }
5859223e 3059
3267c884
KBYT
3060 if (id->driver_info & BTUSB_QCA_ROME) {
3061 data->setup_on_usb = btusb_setup_qca;
3062 hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
3063 }
3064
db33c77d 3065#ifdef CONFIG_BT_HCIBTUSB_RTL
04b8c814 3066 if (id->driver_info & BTUSB_REALTEK) {
db33c77d 3067 hdev->setup = btrtl_setup_realtek;
04b8c814
DD
3068
3069 /* Realtek devices lose their updated firmware over suspend,
3070 * but the USB hub doesn't notice any status change.
3071 * Explicitly request a device reset on resume.
3072 */
3073 set_bit(BTUSB_RESET_RESUME, &data->flags);
3074 }
db33c77d 3075#endif
a2698a9b 3076
893ba544
MH
3077 if (id->driver_info & BTUSB_AMP) {
3078 /* AMP controllers do not support SCO packets */
3079 data->isoc = NULL;
3080 } else {
22f8e9db
MH
3081 /* Interface orders are hardcoded in the specification */
3082 data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1);
893ba544 3083 }
9bfa35fe 3084
7a9d4020 3085 if (!reset)
a6c511c6 3086 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
cfeb4145
MH
3087
3088 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) {
3089 if (!disable_scofix)
3090 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks);
3091 }
3092
9bfa35fe
MH
3093 if (id->driver_info & BTUSB_BROKEN_ISOC)
3094 data->isoc = NULL;
3095
7a9d4020
MH
3096 if (id->driver_info & BTUSB_DIGIANSWER) {
3097 data->cmdreq_type = USB_TYPE_VENDOR;
a6c511c6 3098 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
7a9d4020
MH
3099 }
3100
3101 if (id->driver_info & BTUSB_CSR) {
3102 struct usb_device *udev = data->udev;
81cac64b 3103 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice);
7a9d4020
MH
3104
3105 /* Old firmware would otherwise execute USB reset */
81cac64b 3106 if (bcdDevice < 0x117)
a6c511c6 3107 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
81cac64b
MH
3108
3109 /* Fake CSR devices with broken commands */
6cafcd95 3110 if (bcdDevice <= 0x100 || bcdDevice == 0x134)
81cac64b 3111 hdev->setup = btusb_setup_csr;
49c989a0
JP
3112
3113 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
7a9d4020
MH
3114 }
3115
cfeb4145 3116 if (id->driver_info & BTUSB_SNIFFER) {
9bfa35fe 3117 struct usb_device *udev = data->udev;
cfeb4145 3118
7a9d4020 3119 /* New sniffer firmware has crippled HCI interface */
cfeb4145
MH
3120 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997)
3121 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
3122 }
3123
3a5ef20c
MH
3124 if (id->driver_info & BTUSB_INTEL_BOOT) {
3125 /* A bug in the bootloader causes that interrupt interface is
3126 * only enabled after receiving SetInterface(0, AltSetting=0).
3127 */
3128 err = usb_set_interface(data->udev, 0, 0);
3129 if (err < 0) {
3130 BT_ERR("failed to set interface 0, alt 0 %d", err);
10ab133b 3131 goto out_free_dev;
3a5ef20c
MH
3132 }
3133 }
3134
9bfa35fe
MH
3135 if (data->isoc) {
3136 err = usb_driver_claim_interface(&btusb_driver,
89e7533d 3137 data->isoc, data);
10ab133b
RJ
3138 if (err < 0)
3139 goto out_free_dev;
9bfa35fe
MH
3140 }
3141
9d08f504
MH
3142#ifdef CONFIG_BT_HCIBTUSB_BCM
3143 if (data->diag) {
3144 if (!usb_driver_claim_interface(&btusb_driver,
3145 data->diag, data))
3146 __set_diag_interface(hdev);
3147 else
3148 data->diag = NULL;
3149 }
3150#endif
3151
5e23b923 3152 err = hci_register_dev(hdev);
10ab133b
RJ
3153 if (err < 0)
3154 goto out_free_dev;
5e23b923
MH
3155
3156 usb_set_intfdata(intf, data);
3157
3158 return 0;
10ab133b
RJ
3159
3160out_free_dev:
3161 hci_free_dev(hdev);
3162 return err;
5e23b923
MH
3163}
3164
3165static void btusb_disconnect(struct usb_interface *intf)
3166{
3167 struct btusb_data *data = usb_get_intfdata(intf);
3168 struct hci_dev *hdev;
3169
3170 BT_DBG("intf %p", intf);
3171
3172 if (!data)
3173 return;
3174
3175 hdev = data->hdev;
5fbcd260
MH
3176 usb_set_intfdata(data->intf, NULL);
3177
3178 if (data->isoc)
3179 usb_set_intfdata(data->isoc, NULL);
5e23b923 3180
9d08f504
MH
3181 if (data->diag)
3182 usb_set_intfdata(data->diag, NULL);
3183
5e23b923
MH
3184 hci_unregister_dev(hdev);
3185
9d08f504
MH
3186 if (intf == data->intf) {
3187 if (data->isoc)
3188 usb_driver_release_interface(&btusb_driver, data->isoc);
3189 if (data->diag)
3190 usb_driver_release_interface(&btusb_driver, data->diag);
3191 } else if (intf == data->isoc) {
3192 if (data->diag)
3193 usb_driver_release_interface(&btusb_driver, data->diag);
5fbcd260 3194 usb_driver_release_interface(&btusb_driver, data->intf);
9d08f504
MH
3195 } else if (intf == data->diag) {
3196 usb_driver_release_interface(&btusb_driver, data->intf);
3197 if (data->isoc)
3198 usb_driver_release_interface(&btusb_driver, data->isoc);
3199 }
5fbcd260 3200
fd913ef7
RJ
3201 if (data->oob_wake_irq)
3202 device_init_wakeup(&data->udev->dev, false);
3203
5e23b923
MH
3204 hci_free_dev(hdev);
3205}
3206
7bee549e 3207#ifdef CONFIG_PM
6a88adf2
MH
3208static int btusb_suspend(struct usb_interface *intf, pm_message_t message)
3209{
3210 struct btusb_data *data = usb_get_intfdata(intf);
3211
3212 BT_DBG("intf %p", intf);
3213
3214 if (data->suspend_count++)
3215 return 0;
3216
7bee549e 3217 spin_lock_irq(&data->txlock);
5b1b0b81 3218 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) {
7bee549e
ON
3219 set_bit(BTUSB_SUSPENDING, &data->flags);
3220 spin_unlock_irq(&data->txlock);
3221 } else {
3222 spin_unlock_irq(&data->txlock);
3223 data->suspend_count--;
3224 return -EBUSY;
3225 }
3226
6a88adf2
MH
3227 cancel_work_sync(&data->work);
3228
7bee549e 3229 btusb_stop_traffic(data);
6a88adf2
MH
3230 usb_kill_anchored_urbs(&data->tx_anchor);
3231
fd913ef7
RJ
3232 if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) {
3233 set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
3234 enable_irq_wake(data->oob_wake_irq);
3235 enable_irq(data->oob_wake_irq);
3236 }
3237
04b8c814
DD
3238 /* Optionally request a device reset on resume, but only when
3239 * wakeups are disabled. If wakeups are enabled we assume the
3240 * device will stay powered up throughout suspend.
3241 */
3242 if (test_bit(BTUSB_RESET_RESUME, &data->flags) &&
3243 !device_may_wakeup(&data->udev->dev))
3244 data->udev->reset_resume = 1;
3245
6a88adf2
MH
3246 return 0;
3247}
3248
7bee549e
ON
3249static void play_deferred(struct btusb_data *data)
3250{
3251 struct urb *urb;
3252 int err;
3253
3254 while ((urb = usb_get_from_anchor(&data->deferred))) {
3255 err = usb_submit_urb(urb, GFP_ATOMIC);
3256 if (err < 0)
3257 break;
3258
3259 data->tx_in_flight++;
3260 }
3261 usb_scuttle_anchored_urbs(&data->deferred);
3262}
3263
6a88adf2
MH
3264static int btusb_resume(struct usb_interface *intf)
3265{
3266 struct btusb_data *data = usb_get_intfdata(intf);
3267 struct hci_dev *hdev = data->hdev;
7bee549e 3268 int err = 0;
6a88adf2
MH
3269
3270 BT_DBG("intf %p", intf);
3271
3272 if (--data->suspend_count)
3273 return 0;
3274
fd913ef7
RJ
3275 /* Disable only if not already disabled (keep it balanced) */
3276 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
3277 disable_irq(data->oob_wake_irq);
3278 disable_irq_wake(data->oob_wake_irq);
3279 }
3280
6a88adf2 3281 if (!test_bit(HCI_RUNNING, &hdev->flags))
7bee549e 3282 goto done;
6a88adf2
MH
3283
3284 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) {
3285 err = btusb_submit_intr_urb(hdev, GFP_NOIO);
3286 if (err < 0) {
3287 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
7bee549e 3288 goto failed;
6a88adf2
MH
3289 }
3290 }
3291
3292 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) {
43c2e57f
MH
3293 err = btusb_submit_bulk_urb(hdev, GFP_NOIO);
3294 if (err < 0) {
6a88adf2 3295 clear_bit(BTUSB_BULK_RUNNING, &data->flags);
7bee549e
ON
3296 goto failed;
3297 }
3298
3299 btusb_submit_bulk_urb(hdev, GFP_NOIO);
6a88adf2
MH
3300 }
3301
3302 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
3303 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0)
3304 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
3305 else
3306 btusb_submit_isoc_urb(hdev, GFP_NOIO);
3307 }
3308
7bee549e
ON
3309 spin_lock_irq(&data->txlock);
3310 play_deferred(data);
3311 clear_bit(BTUSB_SUSPENDING, &data->flags);
3312 spin_unlock_irq(&data->txlock);
3313 schedule_work(&data->work);
3314
6a88adf2 3315 return 0;
7bee549e
ON
3316
3317failed:
3318 usb_scuttle_anchored_urbs(&data->deferred);
3319done:
3320 spin_lock_irq(&data->txlock);
3321 clear_bit(BTUSB_SUSPENDING, &data->flags);
3322 spin_unlock_irq(&data->txlock);
3323
3324 return err;
6a88adf2 3325}
7bee549e 3326#endif
6a88adf2 3327
5e23b923
MH
3328static struct usb_driver btusb_driver = {
3329 .name = "btusb",
3330 .probe = btusb_probe,
3331 .disconnect = btusb_disconnect,
7bee549e 3332#ifdef CONFIG_PM
6a88adf2
MH
3333 .suspend = btusb_suspend,
3334 .resume = btusb_resume,
7bee549e 3335#endif
5e23b923 3336 .id_table = btusb_table,
7bee549e 3337 .supports_autosuspend = 1,
e1f12eb6 3338 .disable_hub_initiated_lpm = 1,
5e23b923
MH
3339};
3340
93f1508c 3341module_usb_driver(btusb_driver);
5e23b923 3342
cfeb4145
MH
3343module_param(disable_scofix, bool, 0644);
3344MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size");
3345
3346module_param(force_scofix, bool, 0644);
3347MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size");
3348
3349module_param(reset, bool, 0644);
3350MODULE_PARM_DESC(reset, "Send HCI reset command on initialization");
3351
5e23b923
MH
3352MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
3353MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION);
3354MODULE_VERSION(VERSION);
3355MODULE_LICENSE("GPL");