Bluetooth: btusb: fix Realtek suspend/resume
[deliverable/linux.git] / drivers / bluetooth / btusb.c
1 /*
2 *
3 * Generic Bluetooth USB driver
4 *
5 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
6 *
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 *
22 */
23
24 #include <linux/module.h>
25 #include <linux/usb.h>
26 #include <linux/firmware.h>
27 #include <asm/unaligned.h>
28
29 #include <net/bluetooth/bluetooth.h>
30 #include <net/bluetooth/hci_core.h>
31
32 #include "btintel.h"
33 #include "btbcm.h"
34 #include "btrtl.h"
35
36 #define VERSION "0.8"
37
38 static bool disable_scofix;
39 static bool force_scofix;
40
41 static bool reset = true;
42
43 static struct usb_driver btusb_driver;
44
45 #define BTUSB_IGNORE 0x01
46 #define BTUSB_DIGIANSWER 0x02
47 #define BTUSB_CSR 0x04
48 #define BTUSB_SNIFFER 0x08
49 #define BTUSB_BCM92035 0x10
50 #define BTUSB_BROKEN_ISOC 0x20
51 #define BTUSB_WRONG_SCO_MTU 0x40
52 #define BTUSB_ATH3012 0x80
53 #define BTUSB_INTEL 0x100
54 #define BTUSB_INTEL_BOOT 0x200
55 #define BTUSB_BCM_PATCHRAM 0x400
56 #define BTUSB_MARVELL 0x800
57 #define BTUSB_SWAVE 0x1000
58 #define BTUSB_INTEL_NEW 0x2000
59 #define BTUSB_AMP 0x4000
60 #define BTUSB_QCA_ROME 0x8000
61 #define BTUSB_BCM_APPLE 0x10000
62 #define BTUSB_REALTEK 0x20000
63
64 static const struct usb_device_id btusb_table[] = {
65 /* Generic Bluetooth USB device */
66 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
67
68 /* Generic Bluetooth AMP device */
69 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP },
70
71 /* Apple-specific (Broadcom) devices */
72 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
73 .driver_info = BTUSB_BCM_APPLE },
74
75 /* MediaTek MT76x0E */
76 { USB_DEVICE(0x0e8d, 0x763f) },
77
78 /* Broadcom SoftSailing reporting vendor specific */
79 { USB_DEVICE(0x0a5c, 0x21e1) },
80
81 /* Apple MacBookPro 7,1 */
82 { USB_DEVICE(0x05ac, 0x8213) },
83
84 /* Apple iMac11,1 */
85 { USB_DEVICE(0x05ac, 0x8215) },
86
87 /* Apple MacBookPro6,2 */
88 { USB_DEVICE(0x05ac, 0x8218) },
89
90 /* Apple MacBookAir3,1, MacBookAir3,2 */
91 { USB_DEVICE(0x05ac, 0x821b) },
92
93 /* Apple MacBookAir4,1 */
94 { USB_DEVICE(0x05ac, 0x821f) },
95
96 /* Apple MacBookPro8,2 */
97 { USB_DEVICE(0x05ac, 0x821a) },
98
99 /* Apple MacMini5,1 */
100 { USB_DEVICE(0x05ac, 0x8281) },
101
102 /* AVM BlueFRITZ! USB v2.0 */
103 { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE },
104
105 /* Bluetooth Ultraport Module from IBM */
106 { USB_DEVICE(0x04bf, 0x030a) },
107
108 /* ALPS Modules with non-standard id */
109 { USB_DEVICE(0x044e, 0x3001) },
110 { USB_DEVICE(0x044e, 0x3002) },
111
112 /* Ericsson with non-standard id */
113 { USB_DEVICE(0x0bdb, 0x1002) },
114
115 /* Canyon CN-BTU1 with HID interfaces */
116 { USB_DEVICE(0x0c10, 0x0000) },
117
118 /* Broadcom BCM20702A0 */
119 { USB_DEVICE(0x413c, 0x8197) },
120
121 /* Broadcom BCM20702B0 (Dynex/Insignia) */
122 { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM },
123
124 /* Foxconn - Hon Hai */
125 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
126 .driver_info = BTUSB_BCM_PATCHRAM },
127
128 /* Lite-On Technology - Broadcom based */
129 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
130 .driver_info = BTUSB_BCM_PATCHRAM },
131
132 /* Broadcom devices with vendor specific id */
133 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
134 .driver_info = BTUSB_BCM_PATCHRAM },
135
136 /* ASUSTek Computer - Broadcom based */
137 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
138 .driver_info = BTUSB_BCM_PATCHRAM },
139
140 /* Belkin F8065bf - Broadcom based */
141 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
142 .driver_info = BTUSB_BCM_PATCHRAM },
143
144 /* IMC Networks - Broadcom based */
145 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
146 .driver_info = BTUSB_BCM_PATCHRAM },
147
148 /* Intel Bluetooth USB Bootloader (RAM module) */
149 { USB_DEVICE(0x8087, 0x0a5a),
150 .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC },
151
152 { } /* Terminating entry */
153 };
154
155 MODULE_DEVICE_TABLE(usb, btusb_table);
156
157 static const struct usb_device_id blacklist_table[] = {
158 /* CSR BlueCore devices */
159 { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR },
160
161 /* Broadcom BCM2033 without firmware */
162 { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE },
163
164 /* Atheros 3011 with sflash firmware */
165 { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE },
166 { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE },
167 { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE },
168 { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE },
169 { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE },
170 { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE },
171 { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE },
172
173 /* Atheros AR9285 Malbec with sflash firmware */
174 { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE },
175
176 /* Atheros 3012 with sflash firmware */
177 { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 },
178 { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 },
179 { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 },
180 { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 },
181 { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 },
182 { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 },
183 { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 },
184 { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 },
185 { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 },
186 { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 },
187 { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
188 { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
189 { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
190 { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 },
191 { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
192 { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
193 { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 },
194 { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },
195 { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 },
196 { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 },
197 { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 },
198 { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 },
199 { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 },
200 { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 },
201 { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 },
202 { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 },
203 { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 },
204 { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 },
205 { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 },
206 { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 },
207 { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 },
208 { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 },
209 { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 },
210 { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 },
211 { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 },
212 { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 },
213
214 /* Atheros AR5BBU12 with sflash firmware */
215 { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE },
216
217 /* Atheros AR5BBU12 with sflash firmware */
218 { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 },
219 { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 },
220
221 /* QCA ROME chipset */
222 { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME },
223 { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME },
224
225 /* Broadcom BCM2035 */
226 { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 },
227 { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU },
228 { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU },
229
230 /* Broadcom BCM2045 */
231 { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU },
232 { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU },
233
234 /* IBM/Lenovo ThinkPad with Broadcom chip */
235 { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU },
236 { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU },
237
238 /* HP laptop with Broadcom chip */
239 { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU },
240
241 /* Dell laptop with Broadcom chip */
242 { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU },
243
244 /* Dell Wireless 370 and 410 devices */
245 { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU },
246 { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU },
247
248 /* Belkin F8T012 and F8T013 devices */
249 { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU },
250 { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU },
251
252 /* Asus WL-BTD202 device */
253 { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU },
254
255 /* Kensington Bluetooth USB adapter */
256 { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU },
257
258 /* RTX Telecom based adapters with buggy SCO support */
259 { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC },
260 { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC },
261
262 /* CONWISE Technology based adapters with buggy SCO support */
263 { USB_DEVICE(0x0e5e, 0x6622), .driver_info = BTUSB_BROKEN_ISOC },
264
265 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
266 { USB_DEVICE(0x1300, 0x0001), .driver_info = BTUSB_SWAVE },
267
268 /* Digianswer devices */
269 { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER },
270 { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE },
271
272 /* CSR BlueCore Bluetooth Sniffer */
273 { USB_DEVICE(0x0a12, 0x0002),
274 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
275
276 /* Frontline ComProbe Bluetooth Sniffer */
277 { USB_DEVICE(0x16d3, 0x0002),
278 .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
279
280 /* Marvell Bluetooth devices */
281 { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL },
282 { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL },
283
284 /* Intel Bluetooth devices */
285 { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
286 { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL },
287 { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL },
288 { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW },
289
290 /* Other Intel Bluetooth devices */
291 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
292 .driver_info = BTUSB_IGNORE },
293
294 /* Realtek Bluetooth devices */
295 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
296 .driver_info = BTUSB_REALTEK },
297
298 /* Additional Realtek 8723AE Bluetooth devices */
299 { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK },
300 { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK },
301
302 /* Additional Realtek 8723BE Bluetooth devices */
303 { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK },
304 { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK },
305 { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK },
306 { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK },
307 { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK },
308
309 /* Additional Realtek 8821AE Bluetooth devices */
310 { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK },
311 { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK },
312 { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK },
313 { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK },
314 { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK },
315
316 { } /* Terminating entry */
317 };
318
319 #define BTUSB_MAX_ISOC_FRAMES 10
320
321 #define BTUSB_INTR_RUNNING 0
322 #define BTUSB_BULK_RUNNING 1
323 #define BTUSB_ISOC_RUNNING 2
324 #define BTUSB_SUSPENDING 3
325 #define BTUSB_DID_ISO_RESUME 4
326 #define BTUSB_BOOTLOADER 5
327 #define BTUSB_DOWNLOADING 6
328 #define BTUSB_FIRMWARE_LOADED 7
329 #define BTUSB_FIRMWARE_FAILED 8
330 #define BTUSB_BOOTING 9
331 #define BTUSB_RESET_RESUME 10
332
333 struct btusb_data {
334 struct hci_dev *hdev;
335 struct usb_device *udev;
336 struct usb_interface *intf;
337 struct usb_interface *isoc;
338
339 unsigned long flags;
340
341 struct work_struct work;
342 struct work_struct waker;
343
344 struct usb_anchor deferred;
345 struct usb_anchor tx_anchor;
346 int tx_in_flight;
347 spinlock_t txlock;
348
349 struct usb_anchor intr_anchor;
350 struct usb_anchor bulk_anchor;
351 struct usb_anchor isoc_anchor;
352 spinlock_t rxlock;
353
354 struct sk_buff *evt_skb;
355 struct sk_buff *acl_skb;
356 struct sk_buff *sco_skb;
357
358 struct usb_endpoint_descriptor *intr_ep;
359 struct usb_endpoint_descriptor *bulk_tx_ep;
360 struct usb_endpoint_descriptor *bulk_rx_ep;
361 struct usb_endpoint_descriptor *isoc_tx_ep;
362 struct usb_endpoint_descriptor *isoc_rx_ep;
363
364 __u8 cmdreq_type;
365 __u8 cmdreq;
366
367 unsigned int sco_num;
368 int isoc_altsetting;
369 int suspend_count;
370
371 int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb);
372 int (*recv_bulk)(struct btusb_data *data, void *buffer, int count);
373
374 int (*setup_on_usb)(struct hci_dev *hdev);
375 };
376
377 static inline void btusb_free_frags(struct btusb_data *data)
378 {
379 unsigned long flags;
380
381 spin_lock_irqsave(&data->rxlock, flags);
382
383 kfree_skb(data->evt_skb);
384 data->evt_skb = NULL;
385
386 kfree_skb(data->acl_skb);
387 data->acl_skb = NULL;
388
389 kfree_skb(data->sco_skb);
390 data->sco_skb = NULL;
391
392 spin_unlock_irqrestore(&data->rxlock, flags);
393 }
394
395 static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count)
396 {
397 struct sk_buff *skb;
398 int err = 0;
399
400 spin_lock(&data->rxlock);
401 skb = data->evt_skb;
402
403 while (count) {
404 int len;
405
406 if (!skb) {
407 skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC);
408 if (!skb) {
409 err = -ENOMEM;
410 break;
411 }
412
413 bt_cb(skb)->pkt_type = HCI_EVENT_PKT;
414 bt_cb(skb)->expect = HCI_EVENT_HDR_SIZE;
415 }
416
417 len = min_t(uint, bt_cb(skb)->expect, count);
418 memcpy(skb_put(skb, len), buffer, len);
419
420 count -= len;
421 buffer += len;
422 bt_cb(skb)->expect -= len;
423
424 if (skb->len == HCI_EVENT_HDR_SIZE) {
425 /* Complete event header */
426 bt_cb(skb)->expect = hci_event_hdr(skb)->plen;
427
428 if (skb_tailroom(skb) < bt_cb(skb)->expect) {
429 kfree_skb(skb);
430 skb = NULL;
431
432 err = -EILSEQ;
433 break;
434 }
435 }
436
437 if (bt_cb(skb)->expect == 0) {
438 /* Complete frame */
439 data->recv_event(data->hdev, skb);
440 skb = NULL;
441 }
442 }
443
444 data->evt_skb = skb;
445 spin_unlock(&data->rxlock);
446
447 return err;
448 }
449
450 static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count)
451 {
452 struct sk_buff *skb;
453 int err = 0;
454
455 spin_lock(&data->rxlock);
456 skb = data->acl_skb;
457
458 while (count) {
459 int len;
460
461 if (!skb) {
462 skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC);
463 if (!skb) {
464 err = -ENOMEM;
465 break;
466 }
467
468 bt_cb(skb)->pkt_type = HCI_ACLDATA_PKT;
469 bt_cb(skb)->expect = HCI_ACL_HDR_SIZE;
470 }
471
472 len = min_t(uint, bt_cb(skb)->expect, count);
473 memcpy(skb_put(skb, len), buffer, len);
474
475 count -= len;
476 buffer += len;
477 bt_cb(skb)->expect -= len;
478
479 if (skb->len == HCI_ACL_HDR_SIZE) {
480 __le16 dlen = hci_acl_hdr(skb)->dlen;
481
482 /* Complete ACL header */
483 bt_cb(skb)->expect = __le16_to_cpu(dlen);
484
485 if (skb_tailroom(skb) < bt_cb(skb)->expect) {
486 kfree_skb(skb);
487 skb = NULL;
488
489 err = -EILSEQ;
490 break;
491 }
492 }
493
494 if (bt_cb(skb)->expect == 0) {
495 /* Complete frame */
496 hci_recv_frame(data->hdev, skb);
497 skb = NULL;
498 }
499 }
500
501 data->acl_skb = skb;
502 spin_unlock(&data->rxlock);
503
504 return err;
505 }
506
507 static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count)
508 {
509 struct sk_buff *skb;
510 int err = 0;
511
512 spin_lock(&data->rxlock);
513 skb = data->sco_skb;
514
515 while (count) {
516 int len;
517
518 if (!skb) {
519 skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC);
520 if (!skb) {
521 err = -ENOMEM;
522 break;
523 }
524
525 bt_cb(skb)->pkt_type = HCI_SCODATA_PKT;
526 bt_cb(skb)->expect = HCI_SCO_HDR_SIZE;
527 }
528
529 len = min_t(uint, bt_cb(skb)->expect, count);
530 memcpy(skb_put(skb, len), buffer, len);
531
532 count -= len;
533 buffer += len;
534 bt_cb(skb)->expect -= len;
535
536 if (skb->len == HCI_SCO_HDR_SIZE) {
537 /* Complete SCO header */
538 bt_cb(skb)->expect = hci_sco_hdr(skb)->dlen;
539
540 if (skb_tailroom(skb) < bt_cb(skb)->expect) {
541 kfree_skb(skb);
542 skb = NULL;
543
544 err = -EILSEQ;
545 break;
546 }
547 }
548
549 if (bt_cb(skb)->expect == 0) {
550 /* Complete frame */
551 hci_recv_frame(data->hdev, skb);
552 skb = NULL;
553 }
554 }
555
556 data->sco_skb = skb;
557 spin_unlock(&data->rxlock);
558
559 return err;
560 }
561
562 static void btusb_intr_complete(struct urb *urb)
563 {
564 struct hci_dev *hdev = urb->context;
565 struct btusb_data *data = hci_get_drvdata(hdev);
566 int err;
567
568 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
569 urb->actual_length);
570
571 if (!test_bit(HCI_RUNNING, &hdev->flags))
572 return;
573
574 if (urb->status == 0) {
575 hdev->stat.byte_rx += urb->actual_length;
576
577 if (btusb_recv_intr(data, urb->transfer_buffer,
578 urb->actual_length) < 0) {
579 BT_ERR("%s corrupted event packet", hdev->name);
580 hdev->stat.err_rx++;
581 }
582 } else if (urb->status == -ENOENT) {
583 /* Avoid suspend failed when usb_kill_urb */
584 return;
585 }
586
587 if (!test_bit(BTUSB_INTR_RUNNING, &data->flags))
588 return;
589
590 usb_mark_last_busy(data->udev);
591 usb_anchor_urb(urb, &data->intr_anchor);
592
593 err = usb_submit_urb(urb, GFP_ATOMIC);
594 if (err < 0) {
595 /* -EPERM: urb is being killed;
596 * -ENODEV: device got disconnected */
597 if (err != -EPERM && err != -ENODEV)
598 BT_ERR("%s urb %p failed to resubmit (%d)",
599 hdev->name, urb, -err);
600 usb_unanchor_urb(urb);
601 }
602 }
603
604 static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags)
605 {
606 struct btusb_data *data = hci_get_drvdata(hdev);
607 struct urb *urb;
608 unsigned char *buf;
609 unsigned int pipe;
610 int err, size;
611
612 BT_DBG("%s", hdev->name);
613
614 if (!data->intr_ep)
615 return -ENODEV;
616
617 urb = usb_alloc_urb(0, mem_flags);
618 if (!urb)
619 return -ENOMEM;
620
621 size = le16_to_cpu(data->intr_ep->wMaxPacketSize);
622
623 buf = kmalloc(size, mem_flags);
624 if (!buf) {
625 usb_free_urb(urb);
626 return -ENOMEM;
627 }
628
629 pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress);
630
631 usb_fill_int_urb(urb, data->udev, pipe, buf, size,
632 btusb_intr_complete, hdev, data->intr_ep->bInterval);
633
634 urb->transfer_flags |= URB_FREE_BUFFER;
635
636 usb_anchor_urb(urb, &data->intr_anchor);
637
638 err = usb_submit_urb(urb, mem_flags);
639 if (err < 0) {
640 if (err != -EPERM && err != -ENODEV)
641 BT_ERR("%s urb %p submission failed (%d)",
642 hdev->name, urb, -err);
643 usb_unanchor_urb(urb);
644 }
645
646 usb_free_urb(urb);
647
648 return err;
649 }
650
651 static void btusb_bulk_complete(struct urb *urb)
652 {
653 struct hci_dev *hdev = urb->context;
654 struct btusb_data *data = hci_get_drvdata(hdev);
655 int err;
656
657 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
658 urb->actual_length);
659
660 if (!test_bit(HCI_RUNNING, &hdev->flags))
661 return;
662
663 if (urb->status == 0) {
664 hdev->stat.byte_rx += urb->actual_length;
665
666 if (data->recv_bulk(data, urb->transfer_buffer,
667 urb->actual_length) < 0) {
668 BT_ERR("%s corrupted ACL packet", hdev->name);
669 hdev->stat.err_rx++;
670 }
671 } else if (urb->status == -ENOENT) {
672 /* Avoid suspend failed when usb_kill_urb */
673 return;
674 }
675
676 if (!test_bit(BTUSB_BULK_RUNNING, &data->flags))
677 return;
678
679 usb_anchor_urb(urb, &data->bulk_anchor);
680 usb_mark_last_busy(data->udev);
681
682 err = usb_submit_urb(urb, GFP_ATOMIC);
683 if (err < 0) {
684 /* -EPERM: urb is being killed;
685 * -ENODEV: device got disconnected */
686 if (err != -EPERM && err != -ENODEV)
687 BT_ERR("%s urb %p failed to resubmit (%d)",
688 hdev->name, urb, -err);
689 usb_unanchor_urb(urb);
690 }
691 }
692
693 static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags)
694 {
695 struct btusb_data *data = hci_get_drvdata(hdev);
696 struct urb *urb;
697 unsigned char *buf;
698 unsigned int pipe;
699 int err, size = HCI_MAX_FRAME_SIZE;
700
701 BT_DBG("%s", hdev->name);
702
703 if (!data->bulk_rx_ep)
704 return -ENODEV;
705
706 urb = usb_alloc_urb(0, mem_flags);
707 if (!urb)
708 return -ENOMEM;
709
710 buf = kmalloc(size, mem_flags);
711 if (!buf) {
712 usb_free_urb(urb);
713 return -ENOMEM;
714 }
715
716 pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress);
717
718 usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
719 btusb_bulk_complete, hdev);
720
721 urb->transfer_flags |= URB_FREE_BUFFER;
722
723 usb_mark_last_busy(data->udev);
724 usb_anchor_urb(urb, &data->bulk_anchor);
725
726 err = usb_submit_urb(urb, mem_flags);
727 if (err < 0) {
728 if (err != -EPERM && err != -ENODEV)
729 BT_ERR("%s urb %p submission failed (%d)",
730 hdev->name, urb, -err);
731 usb_unanchor_urb(urb);
732 }
733
734 usb_free_urb(urb);
735
736 return err;
737 }
738
739 static void btusb_isoc_complete(struct urb *urb)
740 {
741 struct hci_dev *hdev = urb->context;
742 struct btusb_data *data = hci_get_drvdata(hdev);
743 int i, err;
744
745 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
746 urb->actual_length);
747
748 if (!test_bit(HCI_RUNNING, &hdev->flags))
749 return;
750
751 if (urb->status == 0) {
752 for (i = 0; i < urb->number_of_packets; i++) {
753 unsigned int offset = urb->iso_frame_desc[i].offset;
754 unsigned int length = urb->iso_frame_desc[i].actual_length;
755
756 if (urb->iso_frame_desc[i].status)
757 continue;
758
759 hdev->stat.byte_rx += length;
760
761 if (btusb_recv_isoc(data, urb->transfer_buffer + offset,
762 length) < 0) {
763 BT_ERR("%s corrupted SCO packet", hdev->name);
764 hdev->stat.err_rx++;
765 }
766 }
767 } else if (urb->status == -ENOENT) {
768 /* Avoid suspend failed when usb_kill_urb */
769 return;
770 }
771
772 if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags))
773 return;
774
775 usb_anchor_urb(urb, &data->isoc_anchor);
776
777 err = usb_submit_urb(urb, GFP_ATOMIC);
778 if (err < 0) {
779 /* -EPERM: urb is being killed;
780 * -ENODEV: device got disconnected */
781 if (err != -EPERM && err != -ENODEV)
782 BT_ERR("%s urb %p failed to resubmit (%d)",
783 hdev->name, urb, -err);
784 usb_unanchor_urb(urb);
785 }
786 }
787
788 static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu)
789 {
790 int i, offset = 0;
791
792 BT_DBG("len %d mtu %d", len, mtu);
793
794 for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu;
795 i++, offset += mtu, len -= mtu) {
796 urb->iso_frame_desc[i].offset = offset;
797 urb->iso_frame_desc[i].length = mtu;
798 }
799
800 if (len && i < BTUSB_MAX_ISOC_FRAMES) {
801 urb->iso_frame_desc[i].offset = offset;
802 urb->iso_frame_desc[i].length = len;
803 i++;
804 }
805
806 urb->number_of_packets = i;
807 }
808
809 static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags)
810 {
811 struct btusb_data *data = hci_get_drvdata(hdev);
812 struct urb *urb;
813 unsigned char *buf;
814 unsigned int pipe;
815 int err, size;
816
817 BT_DBG("%s", hdev->name);
818
819 if (!data->isoc_rx_ep)
820 return -ENODEV;
821
822 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags);
823 if (!urb)
824 return -ENOMEM;
825
826 size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) *
827 BTUSB_MAX_ISOC_FRAMES;
828
829 buf = kmalloc(size, mem_flags);
830 if (!buf) {
831 usb_free_urb(urb);
832 return -ENOMEM;
833 }
834
835 pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress);
836
837 usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete,
838 hdev, data->isoc_rx_ep->bInterval);
839
840 urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP;
841
842 __fill_isoc_descriptor(urb, size,
843 le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize));
844
845 usb_anchor_urb(urb, &data->isoc_anchor);
846
847 err = usb_submit_urb(urb, mem_flags);
848 if (err < 0) {
849 if (err != -EPERM && err != -ENODEV)
850 BT_ERR("%s urb %p submission failed (%d)",
851 hdev->name, urb, -err);
852 usb_unanchor_urb(urb);
853 }
854
855 usb_free_urb(urb);
856
857 return err;
858 }
859
860 static void btusb_tx_complete(struct urb *urb)
861 {
862 struct sk_buff *skb = urb->context;
863 struct hci_dev *hdev = (struct hci_dev *)skb->dev;
864 struct btusb_data *data = hci_get_drvdata(hdev);
865
866 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
867 urb->actual_length);
868
869 if (!test_bit(HCI_RUNNING, &hdev->flags))
870 goto done;
871
872 if (!urb->status)
873 hdev->stat.byte_tx += urb->transfer_buffer_length;
874 else
875 hdev->stat.err_tx++;
876
877 done:
878 spin_lock(&data->txlock);
879 data->tx_in_flight--;
880 spin_unlock(&data->txlock);
881
882 kfree(urb->setup_packet);
883
884 kfree_skb(skb);
885 }
886
887 static void btusb_isoc_tx_complete(struct urb *urb)
888 {
889 struct sk_buff *skb = urb->context;
890 struct hci_dev *hdev = (struct hci_dev *)skb->dev;
891
892 BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
893 urb->actual_length);
894
895 if (!test_bit(HCI_RUNNING, &hdev->flags))
896 goto done;
897
898 if (!urb->status)
899 hdev->stat.byte_tx += urb->transfer_buffer_length;
900 else
901 hdev->stat.err_tx++;
902
903 done:
904 kfree(urb->setup_packet);
905
906 kfree_skb(skb);
907 }
908
909 static int btusb_open(struct hci_dev *hdev)
910 {
911 struct btusb_data *data = hci_get_drvdata(hdev);
912 int err;
913
914 BT_DBG("%s", hdev->name);
915
916 /* Patching USB firmware files prior to starting any URBs of HCI path
917 * It is more safe to use USB bulk channel for downloading USB patch
918 */
919 if (data->setup_on_usb) {
920 err = data->setup_on_usb(hdev);
921 if (err < 0)
922 return err;
923 }
924
925 err = usb_autopm_get_interface(data->intf);
926 if (err < 0)
927 return err;
928
929 data->intf->needs_remote_wakeup = 1;
930
931 if (test_and_set_bit(HCI_RUNNING, &hdev->flags))
932 goto done;
933
934 if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
935 goto done;
936
937 err = btusb_submit_intr_urb(hdev, GFP_KERNEL);
938 if (err < 0)
939 goto failed;
940
941 err = btusb_submit_bulk_urb(hdev, GFP_KERNEL);
942 if (err < 0) {
943 usb_kill_anchored_urbs(&data->intr_anchor);
944 goto failed;
945 }
946
947 set_bit(BTUSB_BULK_RUNNING, &data->flags);
948 btusb_submit_bulk_urb(hdev, GFP_KERNEL);
949
950 done:
951 usb_autopm_put_interface(data->intf);
952 return 0;
953
954 failed:
955 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
956 clear_bit(HCI_RUNNING, &hdev->flags);
957 usb_autopm_put_interface(data->intf);
958 return err;
959 }
960
961 static void btusb_stop_traffic(struct btusb_data *data)
962 {
963 usb_kill_anchored_urbs(&data->intr_anchor);
964 usb_kill_anchored_urbs(&data->bulk_anchor);
965 usb_kill_anchored_urbs(&data->isoc_anchor);
966 }
967
968 static int btusb_close(struct hci_dev *hdev)
969 {
970 struct btusb_data *data = hci_get_drvdata(hdev);
971 int err;
972
973 BT_DBG("%s", hdev->name);
974
975 if (!test_and_clear_bit(HCI_RUNNING, &hdev->flags))
976 return 0;
977
978 cancel_work_sync(&data->work);
979 cancel_work_sync(&data->waker);
980
981 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
982 clear_bit(BTUSB_BULK_RUNNING, &data->flags);
983 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
984
985 btusb_stop_traffic(data);
986 btusb_free_frags(data);
987
988 err = usb_autopm_get_interface(data->intf);
989 if (err < 0)
990 goto failed;
991
992 data->intf->needs_remote_wakeup = 0;
993 usb_autopm_put_interface(data->intf);
994
995 failed:
996 usb_scuttle_anchored_urbs(&data->deferred);
997 return 0;
998 }
999
1000 static int btusb_flush(struct hci_dev *hdev)
1001 {
1002 struct btusb_data *data = hci_get_drvdata(hdev);
1003
1004 BT_DBG("%s", hdev->name);
1005
1006 usb_kill_anchored_urbs(&data->tx_anchor);
1007 btusb_free_frags(data);
1008
1009 return 0;
1010 }
1011
1012 static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb)
1013 {
1014 struct btusb_data *data = hci_get_drvdata(hdev);
1015 struct usb_ctrlrequest *dr;
1016 struct urb *urb;
1017 unsigned int pipe;
1018
1019 urb = usb_alloc_urb(0, GFP_KERNEL);
1020 if (!urb)
1021 return ERR_PTR(-ENOMEM);
1022
1023 dr = kmalloc(sizeof(*dr), GFP_KERNEL);
1024 if (!dr) {
1025 usb_free_urb(urb);
1026 return ERR_PTR(-ENOMEM);
1027 }
1028
1029 dr->bRequestType = data->cmdreq_type;
1030 dr->bRequest = data->cmdreq;
1031 dr->wIndex = 0;
1032 dr->wValue = 0;
1033 dr->wLength = __cpu_to_le16(skb->len);
1034
1035 pipe = usb_sndctrlpipe(data->udev, 0x00);
1036
1037 usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
1038 skb->data, skb->len, btusb_tx_complete, skb);
1039
1040 skb->dev = (void *)hdev;
1041
1042 return urb;
1043 }
1044
1045 static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb)
1046 {
1047 struct btusb_data *data = hci_get_drvdata(hdev);
1048 struct urb *urb;
1049 unsigned int pipe;
1050
1051 if (!data->bulk_tx_ep)
1052 return ERR_PTR(-ENODEV);
1053
1054 urb = usb_alloc_urb(0, GFP_KERNEL);
1055 if (!urb)
1056 return ERR_PTR(-ENOMEM);
1057
1058 pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress);
1059
1060 usb_fill_bulk_urb(urb, data->udev, pipe,
1061 skb->data, skb->len, btusb_tx_complete, skb);
1062
1063 skb->dev = (void *)hdev;
1064
1065 return urb;
1066 }
1067
1068 static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb)
1069 {
1070 struct btusb_data *data = hci_get_drvdata(hdev);
1071 struct urb *urb;
1072 unsigned int pipe;
1073
1074 if (!data->isoc_tx_ep)
1075 return ERR_PTR(-ENODEV);
1076
1077 urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL);
1078 if (!urb)
1079 return ERR_PTR(-ENOMEM);
1080
1081 pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress);
1082
1083 usb_fill_int_urb(urb, data->udev, pipe,
1084 skb->data, skb->len, btusb_isoc_tx_complete,
1085 skb, data->isoc_tx_ep->bInterval);
1086
1087 urb->transfer_flags = URB_ISO_ASAP;
1088
1089 __fill_isoc_descriptor(urb, skb->len,
1090 le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize));
1091
1092 skb->dev = (void *)hdev;
1093
1094 return urb;
1095 }
1096
1097 static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb)
1098 {
1099 struct btusb_data *data = hci_get_drvdata(hdev);
1100 int err;
1101
1102 usb_anchor_urb(urb, &data->tx_anchor);
1103
1104 err = usb_submit_urb(urb, GFP_KERNEL);
1105 if (err < 0) {
1106 if (err != -EPERM && err != -ENODEV)
1107 BT_ERR("%s urb %p submission failed (%d)",
1108 hdev->name, urb, -err);
1109 kfree(urb->setup_packet);
1110 usb_unanchor_urb(urb);
1111 } else {
1112 usb_mark_last_busy(data->udev);
1113 }
1114
1115 usb_free_urb(urb);
1116 return err;
1117 }
1118
1119 static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb)
1120 {
1121 struct btusb_data *data = hci_get_drvdata(hdev);
1122 unsigned long flags;
1123 bool suspending;
1124
1125 spin_lock_irqsave(&data->txlock, flags);
1126 suspending = test_bit(BTUSB_SUSPENDING, &data->flags);
1127 if (!suspending)
1128 data->tx_in_flight++;
1129 spin_unlock_irqrestore(&data->txlock, flags);
1130
1131 if (!suspending)
1132 return submit_tx_urb(hdev, urb);
1133
1134 usb_anchor_urb(urb, &data->deferred);
1135 schedule_work(&data->waker);
1136
1137 usb_free_urb(urb);
1138 return 0;
1139 }
1140
1141 static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
1142 {
1143 struct urb *urb;
1144
1145 BT_DBG("%s", hdev->name);
1146
1147 if (!test_bit(HCI_RUNNING, &hdev->flags))
1148 return -EBUSY;
1149
1150 switch (bt_cb(skb)->pkt_type) {
1151 case HCI_COMMAND_PKT:
1152 urb = alloc_ctrl_urb(hdev, skb);
1153 if (IS_ERR(urb))
1154 return PTR_ERR(urb);
1155
1156 hdev->stat.cmd_tx++;
1157 return submit_or_queue_tx_urb(hdev, urb);
1158
1159 case HCI_ACLDATA_PKT:
1160 urb = alloc_bulk_urb(hdev, skb);
1161 if (IS_ERR(urb))
1162 return PTR_ERR(urb);
1163
1164 hdev->stat.acl_tx++;
1165 return submit_or_queue_tx_urb(hdev, urb);
1166
1167 case HCI_SCODATA_PKT:
1168 if (hci_conn_num(hdev, SCO_LINK) < 1)
1169 return -ENODEV;
1170
1171 urb = alloc_isoc_urb(hdev, skb);
1172 if (IS_ERR(urb))
1173 return PTR_ERR(urb);
1174
1175 hdev->stat.sco_tx++;
1176 return submit_tx_urb(hdev, urb);
1177 }
1178
1179 return -EILSEQ;
1180 }
1181
1182 static void btusb_notify(struct hci_dev *hdev, unsigned int evt)
1183 {
1184 struct btusb_data *data = hci_get_drvdata(hdev);
1185
1186 BT_DBG("%s evt %d", hdev->name, evt);
1187
1188 if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) {
1189 data->sco_num = hci_conn_num(hdev, SCO_LINK);
1190 schedule_work(&data->work);
1191 }
1192 }
1193
1194 static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting)
1195 {
1196 struct btusb_data *data = hci_get_drvdata(hdev);
1197 struct usb_interface *intf = data->isoc;
1198 struct usb_endpoint_descriptor *ep_desc;
1199 int i, err;
1200
1201 if (!data->isoc)
1202 return -ENODEV;
1203
1204 err = usb_set_interface(data->udev, 1, altsetting);
1205 if (err < 0) {
1206 BT_ERR("%s setting interface failed (%d)", hdev->name, -err);
1207 return err;
1208 }
1209
1210 data->isoc_altsetting = altsetting;
1211
1212 data->isoc_tx_ep = NULL;
1213 data->isoc_rx_ep = NULL;
1214
1215 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
1216 ep_desc = &intf->cur_altsetting->endpoint[i].desc;
1217
1218 if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) {
1219 data->isoc_tx_ep = ep_desc;
1220 continue;
1221 }
1222
1223 if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) {
1224 data->isoc_rx_ep = ep_desc;
1225 continue;
1226 }
1227 }
1228
1229 if (!data->isoc_tx_ep || !data->isoc_rx_ep) {
1230 BT_ERR("%s invalid SCO descriptors", hdev->name);
1231 return -ENODEV;
1232 }
1233
1234 return 0;
1235 }
1236
1237 static void btusb_work(struct work_struct *work)
1238 {
1239 struct btusb_data *data = container_of(work, struct btusb_data, work);
1240 struct hci_dev *hdev = data->hdev;
1241 int new_alts;
1242 int err;
1243
1244 if (data->sco_num > 0) {
1245 if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) {
1246 err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf);
1247 if (err < 0) {
1248 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1249 usb_kill_anchored_urbs(&data->isoc_anchor);
1250 return;
1251 }
1252
1253 set_bit(BTUSB_DID_ISO_RESUME, &data->flags);
1254 }
1255
1256 if (hdev->voice_setting & 0x0020) {
1257 static const int alts[3] = { 2, 4, 5 };
1258
1259 new_alts = alts[data->sco_num - 1];
1260 } else {
1261 new_alts = data->sco_num;
1262 }
1263
1264 if (data->isoc_altsetting != new_alts) {
1265 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1266 usb_kill_anchored_urbs(&data->isoc_anchor);
1267
1268 if (__set_isoc_interface(hdev, new_alts) < 0)
1269 return;
1270 }
1271
1272 if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
1273 if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0)
1274 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1275 else
1276 btusb_submit_isoc_urb(hdev, GFP_KERNEL);
1277 }
1278 } else {
1279 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
1280 usb_kill_anchored_urbs(&data->isoc_anchor);
1281
1282 __set_isoc_interface(hdev, 0);
1283 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags))
1284 usb_autopm_put_interface(data->isoc ? data->isoc : data->intf);
1285 }
1286 }
1287
1288 static void btusb_waker(struct work_struct *work)
1289 {
1290 struct btusb_data *data = container_of(work, struct btusb_data, waker);
1291 int err;
1292
1293 err = usb_autopm_get_interface(data->intf);
1294 if (err < 0)
1295 return;
1296
1297 usb_autopm_put_interface(data->intf);
1298 }
1299
1300 static struct sk_buff *btusb_read_local_version(struct hci_dev *hdev)
1301 {
1302 struct sk_buff *skb;
1303
1304 skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
1305 HCI_INIT_TIMEOUT);
1306 if (IS_ERR(skb)) {
1307 BT_ERR("%s: HCI_OP_READ_LOCAL_VERSION failed (%ld)",
1308 hdev->name, PTR_ERR(skb));
1309 return skb;
1310 }
1311
1312 if (skb->len != sizeof(struct hci_rp_read_local_version)) {
1313 BT_ERR("%s: HCI_OP_READ_LOCAL_VERSION event length mismatch",
1314 hdev->name);
1315 kfree_skb(skb);
1316 return ERR_PTR(-EIO);
1317 }
1318
1319 return skb;
1320 }
1321
1322 static int btusb_setup_bcm92035(struct hci_dev *hdev)
1323 {
1324 struct sk_buff *skb;
1325 u8 val = 0x00;
1326
1327 BT_DBG("%s", hdev->name);
1328
1329 skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT);
1330 if (IS_ERR(skb))
1331 BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb));
1332 else
1333 kfree_skb(skb);
1334
1335 return 0;
1336 }
1337
1338 static int btusb_setup_csr(struct hci_dev *hdev)
1339 {
1340 struct hci_rp_read_local_version *rp;
1341 struct sk_buff *skb;
1342 int ret;
1343
1344 BT_DBG("%s", hdev->name);
1345
1346 skb = btusb_read_local_version(hdev);
1347 if (IS_ERR(skb))
1348 return -PTR_ERR(skb);
1349
1350 rp = (struct hci_rp_read_local_version *)skb->data;
1351
1352 if (!rp->status) {
1353 if (le16_to_cpu(rp->manufacturer) != 10) {
1354 /* Clear the reset quirk since this is not an actual
1355 * early Bluetooth 1.1 device from CSR.
1356 */
1357 clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
1358
1359 /* These fake CSR controllers have all a broken
1360 * stored link key handling and so just disable it.
1361 */
1362 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY,
1363 &hdev->quirks);
1364 }
1365 }
1366
1367 ret = -bt_to_errno(rp->status);
1368
1369 kfree_skb(skb);
1370
1371 return ret;
1372 }
1373
1374 static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev,
1375 struct intel_version *ver)
1376 {
1377 const struct firmware *fw;
1378 char fwname[64];
1379 int ret;
1380
1381 snprintf(fwname, sizeof(fwname),
1382 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
1383 ver->hw_platform, ver->hw_variant, ver->hw_revision,
1384 ver->fw_variant, ver->fw_revision, ver->fw_build_num,
1385 ver->fw_build_ww, ver->fw_build_yy);
1386
1387 ret = request_firmware(&fw, fwname, &hdev->dev);
1388 if (ret < 0) {
1389 if (ret == -EINVAL) {
1390 BT_ERR("%s Intel firmware file request failed (%d)",
1391 hdev->name, ret);
1392 return NULL;
1393 }
1394
1395 BT_ERR("%s failed to open Intel firmware file: %s(%d)",
1396 hdev->name, fwname, ret);
1397
1398 /* If the correct firmware patch file is not found, use the
1399 * default firmware patch file instead
1400 */
1401 snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq",
1402 ver->hw_platform, ver->hw_variant);
1403 if (request_firmware(&fw, fwname, &hdev->dev) < 0) {
1404 BT_ERR("%s failed to open default Intel fw file: %s",
1405 hdev->name, fwname);
1406 return NULL;
1407 }
1408 }
1409
1410 BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname);
1411
1412 return fw;
1413 }
1414
1415 static int btusb_setup_intel_patching(struct hci_dev *hdev,
1416 const struct firmware *fw,
1417 const u8 **fw_ptr, int *disable_patch)
1418 {
1419 struct sk_buff *skb;
1420 struct hci_command_hdr *cmd;
1421 const u8 *cmd_param;
1422 struct hci_event_hdr *evt = NULL;
1423 const u8 *evt_param = NULL;
1424 int remain = fw->size - (*fw_ptr - fw->data);
1425
1426 /* The first byte indicates the types of the patch command or event.
1427 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes
1428 * in the current firmware buffer doesn't start with 0x01 or
1429 * the size of remain buffer is smaller than HCI command header,
1430 * the firmware file is corrupted and it should stop the patching
1431 * process.
1432 */
1433 if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) {
1434 BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name);
1435 return -EINVAL;
1436 }
1437 (*fw_ptr)++;
1438 remain--;
1439
1440 cmd = (struct hci_command_hdr *)(*fw_ptr);
1441 *fw_ptr += sizeof(*cmd);
1442 remain -= sizeof(*cmd);
1443
1444 /* Ensure that the remain firmware data is long enough than the length
1445 * of command parameter. If not, the firmware file is corrupted.
1446 */
1447 if (remain < cmd->plen) {
1448 BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name);
1449 return -EFAULT;
1450 }
1451
1452 /* If there is a command that loads a patch in the firmware
1453 * file, then enable the patch upon success, otherwise just
1454 * disable the manufacturer mode, for example patch activation
1455 * is not required when the default firmware patch file is used
1456 * because there are no patch data to load.
1457 */
1458 if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e)
1459 *disable_patch = 0;
1460
1461 cmd_param = *fw_ptr;
1462 *fw_ptr += cmd->plen;
1463 remain -= cmd->plen;
1464
1465 /* This reads the expected events when the above command is sent to the
1466 * device. Some vendor commands expects more than one events, for
1467 * example command status event followed by vendor specific event.
1468 * For this case, it only keeps the last expected event. so the command
1469 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
1470 * last expected event.
1471 */
1472 while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) {
1473 (*fw_ptr)++;
1474 remain--;
1475
1476 evt = (struct hci_event_hdr *)(*fw_ptr);
1477 *fw_ptr += sizeof(*evt);
1478 remain -= sizeof(*evt);
1479
1480 if (remain < evt->plen) {
1481 BT_ERR("%s Intel fw corrupted: invalid evt len",
1482 hdev->name);
1483 return -EFAULT;
1484 }
1485
1486 evt_param = *fw_ptr;
1487 *fw_ptr += evt->plen;
1488 remain -= evt->plen;
1489 }
1490
1491 /* Every HCI commands in the firmware file has its correspond event.
1492 * If event is not found or remain is smaller than zero, the firmware
1493 * file is corrupted.
1494 */
1495 if (!evt || !evt_param || remain < 0) {
1496 BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name);
1497 return -EFAULT;
1498 }
1499
1500 skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen,
1501 cmd_param, evt->evt, HCI_INIT_TIMEOUT);
1502 if (IS_ERR(skb)) {
1503 BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)",
1504 hdev->name, cmd->opcode, PTR_ERR(skb));
1505 return PTR_ERR(skb);
1506 }
1507
1508 /* It ensures that the returned event matches the event data read from
1509 * the firmware file. At fist, it checks the length and then
1510 * the contents of the event.
1511 */
1512 if (skb->len != evt->plen) {
1513 BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name,
1514 le16_to_cpu(cmd->opcode));
1515 kfree_skb(skb);
1516 return -EFAULT;
1517 }
1518
1519 if (memcmp(skb->data, evt_param, evt->plen)) {
1520 BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)",
1521 hdev->name, le16_to_cpu(cmd->opcode));
1522 kfree_skb(skb);
1523 return -EFAULT;
1524 }
1525 kfree_skb(skb);
1526
1527 return 0;
1528 }
1529
1530 static int btusb_setup_intel(struct hci_dev *hdev)
1531 {
1532 struct sk_buff *skb;
1533 const struct firmware *fw;
1534 const u8 *fw_ptr;
1535 int disable_patch;
1536 struct intel_version *ver;
1537
1538 const u8 mfg_enable[] = { 0x01, 0x00 };
1539 const u8 mfg_disable[] = { 0x00, 0x00 };
1540 const u8 mfg_reset_deactivate[] = { 0x00, 0x01 };
1541 const u8 mfg_reset_activate[] = { 0x00, 0x02 };
1542
1543 BT_DBG("%s", hdev->name);
1544
1545 /* The controller has a bug with the first HCI command sent to it
1546 * returning number of completed commands as zero. This would stall the
1547 * command processing in the Bluetooth core.
1548 *
1549 * As a workaround, send HCI Reset command first which will reset the
1550 * number of completed commands and allow normal command processing
1551 * from now on.
1552 */
1553 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
1554 if (IS_ERR(skb)) {
1555 BT_ERR("%s sending initial HCI reset command failed (%ld)",
1556 hdev->name, PTR_ERR(skb));
1557 return PTR_ERR(skb);
1558 }
1559 kfree_skb(skb);
1560
1561 /* Read Intel specific controller version first to allow selection of
1562 * which firmware file to load.
1563 *
1564 * The returned information are hardware variant and revision plus
1565 * firmware variant, revision and build number.
1566 */
1567 skb = __hci_cmd_sync(hdev, 0xfc05, 0, NULL, HCI_INIT_TIMEOUT);
1568 if (IS_ERR(skb)) {
1569 BT_ERR("%s reading Intel fw version command failed (%ld)",
1570 hdev->name, PTR_ERR(skb));
1571 return PTR_ERR(skb);
1572 }
1573
1574 if (skb->len != sizeof(*ver)) {
1575 BT_ERR("%s Intel version event length mismatch", hdev->name);
1576 kfree_skb(skb);
1577 return -EIO;
1578 }
1579
1580 ver = (struct intel_version *)skb->data;
1581
1582 BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
1583 hdev->name, ver->hw_platform, ver->hw_variant,
1584 ver->hw_revision, ver->fw_variant, ver->fw_revision,
1585 ver->fw_build_num, ver->fw_build_ww, ver->fw_build_yy,
1586 ver->fw_patch_num);
1587
1588 /* fw_patch_num indicates the version of patch the device currently
1589 * have. If there is no patch data in the device, it is always 0x00.
1590 * So, if it is other than 0x00, no need to patch the deivce again.
1591 */
1592 if (ver->fw_patch_num) {
1593 BT_INFO("%s: Intel device is already patched. patch num: %02x",
1594 hdev->name, ver->fw_patch_num);
1595 kfree_skb(skb);
1596 btintel_check_bdaddr(hdev);
1597 return 0;
1598 }
1599
1600 /* Opens the firmware patch file based on the firmware version read
1601 * from the controller. If it fails to open the matching firmware
1602 * patch file, it tries to open the default firmware patch file.
1603 * If no patch file is found, allow the device to operate without
1604 * a patch.
1605 */
1606 fw = btusb_setup_intel_get_fw(hdev, ver);
1607 if (!fw) {
1608 kfree_skb(skb);
1609 btintel_check_bdaddr(hdev);
1610 return 0;
1611 }
1612 fw_ptr = fw->data;
1613
1614 /* This Intel specific command enables the manufacturer mode of the
1615 * controller.
1616 *
1617 * Only while this mode is enabled, the driver can download the
1618 * firmware patch data and configuration parameters.
1619 */
1620 skb = __hci_cmd_sync(hdev, 0xfc11, 2, mfg_enable, HCI_INIT_TIMEOUT);
1621 if (IS_ERR(skb)) {
1622 BT_ERR("%s entering Intel manufacturer mode failed (%ld)",
1623 hdev->name, PTR_ERR(skb));
1624 release_firmware(fw);
1625 return PTR_ERR(skb);
1626 }
1627
1628 kfree_skb(skb);
1629
1630 disable_patch = 1;
1631
1632 /* The firmware data file consists of list of Intel specific HCI
1633 * commands and its expected events. The first byte indicates the
1634 * type of the message, either HCI command or HCI event.
1635 *
1636 * It reads the command and its expected event from the firmware file,
1637 * and send to the controller. Once __hci_cmd_sync_ev() returns,
1638 * the returned event is compared with the event read from the firmware
1639 * file and it will continue until all the messages are downloaded to
1640 * the controller.
1641 *
1642 * Once the firmware patching is completed successfully,
1643 * the manufacturer mode is disabled with reset and activating the
1644 * downloaded patch.
1645 *
1646 * If the firmware patching fails, the manufacturer mode is
1647 * disabled with reset and deactivating the patch.
1648 *
1649 * If the default patch file is used, no reset is done when disabling
1650 * the manufacturer.
1651 */
1652 while (fw->size > fw_ptr - fw->data) {
1653 int ret;
1654
1655 ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr,
1656 &disable_patch);
1657 if (ret < 0)
1658 goto exit_mfg_deactivate;
1659 }
1660
1661 release_firmware(fw);
1662
1663 if (disable_patch)
1664 goto exit_mfg_disable;
1665
1666 /* Patching completed successfully and disable the manufacturer mode
1667 * with reset and activate the downloaded firmware patches.
1668 */
1669 skb = __hci_cmd_sync(hdev, 0xfc11, sizeof(mfg_reset_activate),
1670 mfg_reset_activate, HCI_INIT_TIMEOUT);
1671 if (IS_ERR(skb)) {
1672 BT_ERR("%s exiting Intel manufacturer mode failed (%ld)",
1673 hdev->name, PTR_ERR(skb));
1674 return PTR_ERR(skb);
1675 }
1676 kfree_skb(skb);
1677
1678 BT_INFO("%s: Intel Bluetooth firmware patch completed and activated",
1679 hdev->name);
1680
1681 btintel_check_bdaddr(hdev);
1682 return 0;
1683
1684 exit_mfg_disable:
1685 /* Disable the manufacturer mode without reset */
1686 skb = __hci_cmd_sync(hdev, 0xfc11, sizeof(mfg_disable), mfg_disable,
1687 HCI_INIT_TIMEOUT);
1688 if (IS_ERR(skb)) {
1689 BT_ERR("%s exiting Intel manufacturer mode failed (%ld)",
1690 hdev->name, PTR_ERR(skb));
1691 return PTR_ERR(skb);
1692 }
1693 kfree_skb(skb);
1694
1695 BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name);
1696
1697 btintel_check_bdaddr(hdev);
1698 return 0;
1699
1700 exit_mfg_deactivate:
1701 release_firmware(fw);
1702
1703 /* Patching failed. Disable the manufacturer mode with reset and
1704 * deactivate the downloaded firmware patches.
1705 */
1706 skb = __hci_cmd_sync(hdev, 0xfc11, sizeof(mfg_reset_deactivate),
1707 mfg_reset_deactivate, HCI_INIT_TIMEOUT);
1708 if (IS_ERR(skb)) {
1709 BT_ERR("%s exiting Intel manufacturer mode failed (%ld)",
1710 hdev->name, PTR_ERR(skb));
1711 return PTR_ERR(skb);
1712 }
1713 kfree_skb(skb);
1714
1715 BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated",
1716 hdev->name);
1717
1718 btintel_check_bdaddr(hdev);
1719 return 0;
1720 }
1721
1722 static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode)
1723 {
1724 struct sk_buff *skb;
1725 struct hci_event_hdr *hdr;
1726 struct hci_ev_cmd_complete *evt;
1727
1728 skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC);
1729 if (!skb)
1730 return -ENOMEM;
1731
1732 hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr));
1733 hdr->evt = HCI_EV_CMD_COMPLETE;
1734 hdr->plen = sizeof(*evt) + 1;
1735
1736 evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt));
1737 evt->ncmd = 0x01;
1738 evt->opcode = cpu_to_le16(opcode);
1739
1740 *skb_put(skb, 1) = 0x00;
1741
1742 bt_cb(skb)->pkt_type = HCI_EVENT_PKT;
1743
1744 return hci_recv_frame(hdev, skb);
1745 }
1746
1747 static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer,
1748 int count)
1749 {
1750 /* When the device is in bootloader mode, then it can send
1751 * events via the bulk endpoint. These events are treated the
1752 * same way as the ones received from the interrupt endpoint.
1753 */
1754 if (test_bit(BTUSB_BOOTLOADER, &data->flags))
1755 return btusb_recv_intr(data, buffer, count);
1756
1757 return btusb_recv_bulk(data, buffer, count);
1758 }
1759
1760 static void btusb_intel_bootup(struct btusb_data *data, const void *ptr,
1761 unsigned int len)
1762 {
1763 const struct intel_bootup *evt = ptr;
1764
1765 if (len != sizeof(*evt))
1766 return;
1767
1768 if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) {
1769 smp_mb__after_atomic();
1770 wake_up_bit(&data->flags, BTUSB_BOOTING);
1771 }
1772 }
1773
1774 static void btusb_intel_secure_send_result(struct btusb_data *data,
1775 const void *ptr, unsigned int len)
1776 {
1777 const struct intel_secure_send_result *evt = ptr;
1778
1779 if (len != sizeof(*evt))
1780 return;
1781
1782 if (evt->result)
1783 set_bit(BTUSB_FIRMWARE_FAILED, &data->flags);
1784
1785 if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) &&
1786 test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) {
1787 smp_mb__after_atomic();
1788 wake_up_bit(&data->flags, BTUSB_DOWNLOADING);
1789 }
1790 }
1791
1792 static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb)
1793 {
1794 struct btusb_data *data = hci_get_drvdata(hdev);
1795
1796 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
1797 struct hci_event_hdr *hdr = (void *)skb->data;
1798
1799 if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff &&
1800 hdr->plen > 0) {
1801 const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1;
1802 unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1;
1803
1804 switch (skb->data[2]) {
1805 case 0x02:
1806 /* When switching to the operational firmware
1807 * the device sends a vendor specific event
1808 * indicating that the bootup completed.
1809 */
1810 btusb_intel_bootup(data, ptr, len);
1811 break;
1812 case 0x06:
1813 /* When the firmware loading completes the
1814 * device sends out a vendor specific event
1815 * indicating the result of the firmware
1816 * loading.
1817 */
1818 btusb_intel_secure_send_result(data, ptr, len);
1819 break;
1820 }
1821 }
1822 }
1823
1824 return hci_recv_frame(hdev, skb);
1825 }
1826
1827 static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb)
1828 {
1829 struct btusb_data *data = hci_get_drvdata(hdev);
1830 struct urb *urb;
1831
1832 BT_DBG("%s", hdev->name);
1833
1834 if (!test_bit(HCI_RUNNING, &hdev->flags))
1835 return -EBUSY;
1836
1837 switch (bt_cb(skb)->pkt_type) {
1838 case HCI_COMMAND_PKT:
1839 if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
1840 struct hci_command_hdr *cmd = (void *)skb->data;
1841 __u16 opcode = le16_to_cpu(cmd->opcode);
1842
1843 /* When in bootloader mode and the command 0xfc09
1844 * is received, it needs to be send down the
1845 * bulk endpoint. So allocate a bulk URB instead.
1846 */
1847 if (opcode == 0xfc09)
1848 urb = alloc_bulk_urb(hdev, skb);
1849 else
1850 urb = alloc_ctrl_urb(hdev, skb);
1851
1852 /* When the 0xfc01 command is issued to boot into
1853 * the operational firmware, it will actually not
1854 * send a command complete event. To keep the flow
1855 * control working inject that event here.
1856 */
1857 if (opcode == 0xfc01)
1858 inject_cmd_complete(hdev, opcode);
1859 } else {
1860 urb = alloc_ctrl_urb(hdev, skb);
1861 }
1862 if (IS_ERR(urb))
1863 return PTR_ERR(urb);
1864
1865 hdev->stat.cmd_tx++;
1866 return submit_or_queue_tx_urb(hdev, urb);
1867
1868 case HCI_ACLDATA_PKT:
1869 urb = alloc_bulk_urb(hdev, skb);
1870 if (IS_ERR(urb))
1871 return PTR_ERR(urb);
1872
1873 hdev->stat.acl_tx++;
1874 return submit_or_queue_tx_urb(hdev, urb);
1875
1876 case HCI_SCODATA_PKT:
1877 if (hci_conn_num(hdev, SCO_LINK) < 1)
1878 return -ENODEV;
1879
1880 urb = alloc_isoc_urb(hdev, skb);
1881 if (IS_ERR(urb))
1882 return PTR_ERR(urb);
1883
1884 hdev->stat.sco_tx++;
1885 return submit_tx_urb(hdev, urb);
1886 }
1887
1888 return -EILSEQ;
1889 }
1890
1891 static int btusb_intel_secure_send(struct hci_dev *hdev, u8 fragment_type,
1892 u32 plen, const void *param)
1893 {
1894 while (plen > 0) {
1895 struct sk_buff *skb;
1896 u8 cmd_param[253], fragment_len = (plen > 252) ? 252 : plen;
1897
1898 cmd_param[0] = fragment_type;
1899 memcpy(cmd_param + 1, param, fragment_len);
1900
1901 skb = __hci_cmd_sync(hdev, 0xfc09, fragment_len + 1,
1902 cmd_param, HCI_INIT_TIMEOUT);
1903 if (IS_ERR(skb))
1904 return PTR_ERR(skb);
1905
1906 kfree_skb(skb);
1907
1908 plen -= fragment_len;
1909 param += fragment_len;
1910 }
1911
1912 return 0;
1913 }
1914
1915 static void btusb_intel_version_info(struct hci_dev *hdev,
1916 struct intel_version *ver)
1917 {
1918 const char *variant;
1919
1920 switch (ver->fw_variant) {
1921 case 0x06:
1922 variant = "Bootloader";
1923 break;
1924 case 0x23:
1925 variant = "Firmware";
1926 break;
1927 default:
1928 return;
1929 }
1930
1931 BT_INFO("%s: %s revision %u.%u build %u week %u %u", hdev->name,
1932 variant, ver->fw_revision >> 4, ver->fw_revision & 0x0f,
1933 ver->fw_build_num, ver->fw_build_ww, 2000 + ver->fw_build_yy);
1934 }
1935
1936 static int btusb_setup_intel_new(struct hci_dev *hdev)
1937 {
1938 static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01,
1939 0x00, 0x08, 0x04, 0x00 };
1940 struct btusb_data *data = hci_get_drvdata(hdev);
1941 struct sk_buff *skb;
1942 struct intel_version *ver;
1943 struct intel_boot_params *params;
1944 const struct firmware *fw;
1945 const u8 *fw_ptr;
1946 char fwname[64];
1947 ktime_t calltime, delta, rettime;
1948 unsigned long long duration;
1949 int err;
1950
1951 BT_DBG("%s", hdev->name);
1952
1953 calltime = ktime_get();
1954
1955 /* Read the Intel version information to determine if the device
1956 * is in bootloader mode or if it already has operational firmware
1957 * loaded.
1958 */
1959 skb = __hci_cmd_sync(hdev, 0xfc05, 0, NULL, HCI_INIT_TIMEOUT);
1960 if (IS_ERR(skb)) {
1961 BT_ERR("%s: Reading Intel version information failed (%ld)",
1962 hdev->name, PTR_ERR(skb));
1963 return PTR_ERR(skb);
1964 }
1965
1966 if (skb->len != sizeof(*ver)) {
1967 BT_ERR("%s: Intel version event size mismatch", hdev->name);
1968 kfree_skb(skb);
1969 return -EILSEQ;
1970 }
1971
1972 ver = (struct intel_version *)skb->data;
1973
1974 /* The hardware platform number has a fixed value of 0x37 and
1975 * for now only accept this single value.
1976 */
1977 if (ver->hw_platform != 0x37) {
1978 BT_ERR("%s: Unsupported Intel hardware platform (%u)",
1979 hdev->name, ver->hw_platform);
1980 kfree_skb(skb);
1981 return -EINVAL;
1982 }
1983
1984 /* At the moment only the hardware variant iBT 3.0 (LnP/SfP) is
1985 * supported by this firmware loading method. This check has been
1986 * put in place to ensure correct forward compatibility options
1987 * when newer hardware variants come along.
1988 */
1989 if (ver->hw_variant != 0x0b) {
1990 BT_ERR("%s: Unsupported Intel hardware variant (%u)",
1991 hdev->name, ver->hw_variant);
1992 kfree_skb(skb);
1993 return -EINVAL;
1994 }
1995
1996 btusb_intel_version_info(hdev, ver);
1997
1998 /* The firmware variant determines if the device is in bootloader
1999 * mode or is running operational firmware. The value 0x06 identifies
2000 * the bootloader and the value 0x23 identifies the operational
2001 * firmware.
2002 *
2003 * When the operational firmware is already present, then only
2004 * the check for valid Bluetooth device address is needed. This
2005 * determines if the device will be added as configured or
2006 * unconfigured controller.
2007 *
2008 * It is not possible to use the Secure Boot Parameters in this
2009 * case since that command is only available in bootloader mode.
2010 */
2011 if (ver->fw_variant == 0x23) {
2012 kfree_skb(skb);
2013 clear_bit(BTUSB_BOOTLOADER, &data->flags);
2014 btintel_check_bdaddr(hdev);
2015 return 0;
2016 }
2017
2018 /* If the device is not in bootloader mode, then the only possible
2019 * choice is to return an error and abort the device initialization.
2020 */
2021 if (ver->fw_variant != 0x06) {
2022 BT_ERR("%s: Unsupported Intel firmware variant (%u)",
2023 hdev->name, ver->fw_variant);
2024 kfree_skb(skb);
2025 return -ENODEV;
2026 }
2027
2028 kfree_skb(skb);
2029
2030 /* Read the secure boot parameters to identify the operating
2031 * details of the bootloader.
2032 */
2033 skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT);
2034 if (IS_ERR(skb)) {
2035 BT_ERR("%s: Reading Intel boot parameters failed (%ld)",
2036 hdev->name, PTR_ERR(skb));
2037 return PTR_ERR(skb);
2038 }
2039
2040 if (skb->len != sizeof(*params)) {
2041 BT_ERR("%s: Intel boot parameters size mismatch", hdev->name);
2042 kfree_skb(skb);
2043 return -EILSEQ;
2044 }
2045
2046 params = (struct intel_boot_params *)skb->data;
2047
2048 BT_INFO("%s: Device revision is %u", hdev->name,
2049 le16_to_cpu(params->dev_revid));
2050
2051 BT_INFO("%s: Secure boot is %s", hdev->name,
2052 params->secure_boot ? "enabled" : "disabled");
2053
2054 BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name,
2055 params->min_fw_build_nn, params->min_fw_build_cw,
2056 2000 + params->min_fw_build_yy);
2057
2058 /* It is required that every single firmware fragment is acknowledged
2059 * with a command complete event. If the boot parameters indicate
2060 * that this bootloader does not send them, then abort the setup.
2061 */
2062 if (params->limited_cce != 0x00) {
2063 BT_ERR("%s: Unsupported Intel firmware loading method (%u)",
2064 hdev->name, params->limited_cce);
2065 kfree_skb(skb);
2066 return -EINVAL;
2067 }
2068
2069 /* If the OTP has no valid Bluetooth device address, then there will
2070 * also be no valid address for the operational firmware.
2071 */
2072 if (!bacmp(&params->otp_bdaddr, BDADDR_ANY)) {
2073 BT_INFO("%s: No device address configured", hdev->name);
2074 set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
2075 }
2076
2077 /* With this Intel bootloader only the hardware variant and device
2078 * revision information are used to select the right firmware.
2079 *
2080 * Currently this bootloader support is limited to hardware variant
2081 * iBT 3.0 (LnP/SfP) which is identified by the value 11 (0x0b).
2082 */
2083 snprintf(fwname, sizeof(fwname), "intel/ibt-11-%u.sfi",
2084 le16_to_cpu(params->dev_revid));
2085
2086 err = request_firmware(&fw, fwname, &hdev->dev);
2087 if (err < 0) {
2088 BT_ERR("%s: Failed to load Intel firmware file (%d)",
2089 hdev->name, err);
2090 kfree_skb(skb);
2091 return err;
2092 }
2093
2094 BT_INFO("%s: Found device firmware: %s", hdev->name, fwname);
2095
2096 kfree_skb(skb);
2097
2098 if (fw->size < 644) {
2099 BT_ERR("%s: Invalid size of firmware file (%zu)",
2100 hdev->name, fw->size);
2101 err = -EBADF;
2102 goto done;
2103 }
2104
2105 set_bit(BTUSB_DOWNLOADING, &data->flags);
2106
2107 /* Start the firmware download transaction with the Init fragment
2108 * represented by the 128 bytes of CSS header.
2109 */
2110 err = btusb_intel_secure_send(hdev, 0x00, 128, fw->data);
2111 if (err < 0) {
2112 BT_ERR("%s: Failed to send firmware header (%d)",
2113 hdev->name, err);
2114 goto done;
2115 }
2116
2117 /* Send the 256 bytes of public key information from the firmware
2118 * as the PKey fragment.
2119 */
2120 err = btusb_intel_secure_send(hdev, 0x03, 256, fw->data + 128);
2121 if (err < 0) {
2122 BT_ERR("%s: Failed to send firmware public key (%d)",
2123 hdev->name, err);
2124 goto done;
2125 }
2126
2127 /* Send the 256 bytes of signature information from the firmware
2128 * as the Sign fragment.
2129 */
2130 err = btusb_intel_secure_send(hdev, 0x02, 256, fw->data + 388);
2131 if (err < 0) {
2132 BT_ERR("%s: Failed to send firmware signature (%d)",
2133 hdev->name, err);
2134 goto done;
2135 }
2136
2137 fw_ptr = fw->data + 644;
2138
2139 while (fw_ptr - fw->data < fw->size) {
2140 struct hci_command_hdr *cmd = (void *)fw_ptr;
2141 u8 cmd_len;
2142
2143 cmd_len = sizeof(*cmd) + cmd->plen;
2144
2145 /* Send each command from the firmware data buffer as
2146 * a single Data fragment.
2147 */
2148 err = btusb_intel_secure_send(hdev, 0x01, cmd_len, fw_ptr);
2149 if (err < 0) {
2150 BT_ERR("%s: Failed to send firmware data (%d)",
2151 hdev->name, err);
2152 goto done;
2153 }
2154
2155 fw_ptr += cmd_len;
2156 }
2157
2158 set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
2159
2160 BT_INFO("%s: Waiting for firmware download to complete", hdev->name);
2161
2162 /* Before switching the device into operational mode and with that
2163 * booting the loaded firmware, wait for the bootloader notification
2164 * that all fragments have been successfully received.
2165 *
2166 * When the event processing receives the notification, then the
2167 * BTUSB_DOWNLOADING flag will be cleared.
2168 *
2169 * The firmware loading should not take longer than 5 seconds
2170 * and thus just timeout if that happens and fail the setup
2171 * of this device.
2172 */
2173 err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
2174 TASK_INTERRUPTIBLE,
2175 msecs_to_jiffies(5000));
2176 if (err == 1) {
2177 BT_ERR("%s: Firmware loading interrupted", hdev->name);
2178 err = -EINTR;
2179 goto done;
2180 }
2181
2182 if (err) {
2183 BT_ERR("%s: Firmware loading timeout", hdev->name);
2184 err = -ETIMEDOUT;
2185 goto done;
2186 }
2187
2188 if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
2189 BT_ERR("%s: Firmware loading failed", hdev->name);
2190 err = -ENOEXEC;
2191 goto done;
2192 }
2193
2194 rettime = ktime_get();
2195 delta = ktime_sub(rettime, calltime);
2196 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
2197
2198 BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration);
2199
2200 done:
2201 release_firmware(fw);
2202
2203 if (err < 0)
2204 return err;
2205
2206 calltime = ktime_get();
2207
2208 set_bit(BTUSB_BOOTING, &data->flags);
2209
2210 skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param,
2211 HCI_INIT_TIMEOUT);
2212 if (IS_ERR(skb))
2213 return PTR_ERR(skb);
2214
2215 kfree_skb(skb);
2216
2217 /* The bootloader will not indicate when the device is ready. This
2218 * is done by the operational firmware sending bootup notification.
2219 *
2220 * Booting into operational firmware should not take longer than
2221 * 1 second. However if that happens, then just fail the setup
2222 * since something went wrong.
2223 */
2224 BT_INFO("%s: Waiting for device to boot", hdev->name);
2225
2226 err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
2227 TASK_INTERRUPTIBLE,
2228 msecs_to_jiffies(1000));
2229
2230 if (err == 1) {
2231 BT_ERR("%s: Device boot interrupted", hdev->name);
2232 return -EINTR;
2233 }
2234
2235 if (err) {
2236 BT_ERR("%s: Device boot timeout", hdev->name);
2237 return -ETIMEDOUT;
2238 }
2239
2240 rettime = ktime_get();
2241 delta = ktime_sub(rettime, calltime);
2242 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
2243
2244 BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration);
2245
2246 clear_bit(BTUSB_BOOTLOADER, &data->flags);
2247
2248 return 0;
2249 }
2250
2251 static void btusb_hw_error_intel(struct hci_dev *hdev, u8 code)
2252 {
2253 struct sk_buff *skb;
2254 u8 type = 0x00;
2255
2256 BT_ERR("%s: Hardware error 0x%2.2x", hdev->name, code);
2257
2258 skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
2259 if (IS_ERR(skb)) {
2260 BT_ERR("%s: Reset after hardware error failed (%ld)",
2261 hdev->name, PTR_ERR(skb));
2262 return;
2263 }
2264 kfree_skb(skb);
2265
2266 skb = __hci_cmd_sync(hdev, 0xfc22, 1, &type, HCI_INIT_TIMEOUT);
2267 if (IS_ERR(skb)) {
2268 BT_ERR("%s: Retrieving Intel exception info failed (%ld)",
2269 hdev->name, PTR_ERR(skb));
2270 return;
2271 }
2272
2273 if (skb->len != 13) {
2274 BT_ERR("%s: Exception info size mismatch", hdev->name);
2275 kfree_skb(skb);
2276 return;
2277 }
2278
2279 BT_ERR("%s: Exception info %s", hdev->name, (char *)(skb->data + 1));
2280
2281 kfree_skb(skb);
2282 }
2283
2284 static int btusb_shutdown_intel(struct hci_dev *hdev)
2285 {
2286 struct sk_buff *skb;
2287 long ret;
2288
2289 /* Some platforms have an issue with BT LED when the interface is
2290 * down or BT radio is turned off, which takes 5 seconds to BT LED
2291 * goes off. This command turns off the BT LED immediately.
2292 */
2293 skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT);
2294 if (IS_ERR(skb)) {
2295 ret = PTR_ERR(skb);
2296 BT_ERR("%s: turning off Intel device LED failed (%ld)",
2297 hdev->name, ret);
2298 return ret;
2299 }
2300 kfree_skb(skb);
2301
2302 return 0;
2303 }
2304
2305 static int btusb_set_bdaddr_marvell(struct hci_dev *hdev,
2306 const bdaddr_t *bdaddr)
2307 {
2308 struct sk_buff *skb;
2309 u8 buf[8];
2310 long ret;
2311
2312 buf[0] = 0xfe;
2313 buf[1] = sizeof(bdaddr_t);
2314 memcpy(buf + 2, bdaddr, sizeof(bdaddr_t));
2315
2316 skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT);
2317 if (IS_ERR(skb)) {
2318 ret = PTR_ERR(skb);
2319 BT_ERR("%s: changing Marvell device address failed (%ld)",
2320 hdev->name, ret);
2321 return ret;
2322 }
2323 kfree_skb(skb);
2324
2325 return 0;
2326 }
2327
2328 static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev,
2329 const bdaddr_t *bdaddr)
2330 {
2331 struct sk_buff *skb;
2332 u8 buf[10];
2333 long ret;
2334
2335 buf[0] = 0x01;
2336 buf[1] = 0x01;
2337 buf[2] = 0x00;
2338 buf[3] = sizeof(bdaddr_t);
2339 memcpy(buf + 4, bdaddr, sizeof(bdaddr_t));
2340
2341 skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT);
2342 if (IS_ERR(skb)) {
2343 ret = PTR_ERR(skb);
2344 BT_ERR("%s: Change address command failed (%ld)",
2345 hdev->name, ret);
2346 return ret;
2347 }
2348 kfree_skb(skb);
2349
2350 return 0;
2351 }
2352
2353 #define QCA_DFU_PACKET_LEN 4096
2354
2355 #define QCA_GET_TARGET_VERSION 0x09
2356 #define QCA_CHECK_STATUS 0x05
2357 #define QCA_DFU_DOWNLOAD 0x01
2358
2359 #define QCA_SYSCFG_UPDATED 0x40
2360 #define QCA_PATCH_UPDATED 0x80
2361 #define QCA_DFU_TIMEOUT 3000
2362
2363 struct qca_version {
2364 __le32 rom_version;
2365 __le32 patch_version;
2366 __le32 ram_version;
2367 __le32 ref_clock;
2368 __u8 reserved[4];
2369 } __packed;
2370
2371 struct qca_rampatch_version {
2372 __le16 rom_version;
2373 __le16 patch_version;
2374 } __packed;
2375
2376 struct qca_device_info {
2377 u32 rom_version;
2378 u8 rampatch_hdr; /* length of header in rampatch */
2379 u8 nvm_hdr; /* length of header in NVM */
2380 u8 ver_offset; /* offset of version structure in rampatch */
2381 };
2382
2383 static const struct qca_device_info qca_devices_table[] = {
2384 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */
2385 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */
2386 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */
2387 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */
2388 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */
2389 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */
2390 };
2391
2392 static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request,
2393 void *data, u16 size)
2394 {
2395 struct btusb_data *btdata = hci_get_drvdata(hdev);
2396 struct usb_device *udev = btdata->udev;
2397 int pipe, err;
2398 u8 *buf;
2399
2400 buf = kmalloc(size, GFP_KERNEL);
2401 if (!buf)
2402 return -ENOMEM;
2403
2404 /* Found some of USB hosts have IOT issues with ours so that we should
2405 * not wait until HCI layer is ready.
2406 */
2407 pipe = usb_rcvctrlpipe(udev, 0);
2408 err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN,
2409 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
2410 if (err < 0) {
2411 BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err);
2412 goto done;
2413 }
2414
2415 memcpy(data, buf, size);
2416
2417 done:
2418 kfree(buf);
2419
2420 return err;
2421 }
2422
2423 static int btusb_setup_qca_download_fw(struct hci_dev *hdev,
2424 const struct firmware *firmware,
2425 size_t hdr_size)
2426 {
2427 struct btusb_data *btdata = hci_get_drvdata(hdev);
2428 struct usb_device *udev = btdata->udev;
2429 size_t count, size, sent = 0;
2430 int pipe, len, err;
2431 u8 *buf;
2432
2433 buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL);
2434 if (!buf)
2435 return -ENOMEM;
2436
2437 count = firmware->size;
2438
2439 size = min_t(size_t, count, hdr_size);
2440 memcpy(buf, firmware->data, size);
2441
2442 /* USB patches should go down to controller through USB path
2443 * because binary format fits to go down through USB channel.
2444 * USB control path is for patching headers and USB bulk is for
2445 * patch body.
2446 */
2447 pipe = usb_sndctrlpipe(udev, 0);
2448 err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR,
2449 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
2450 if (err < 0) {
2451 BT_ERR("%s: Failed to send headers (%d)", hdev->name, err);
2452 goto done;
2453 }
2454
2455 sent += size;
2456 count -= size;
2457
2458 while (count) {
2459 size = min_t(size_t, count, QCA_DFU_PACKET_LEN);
2460
2461 memcpy(buf, firmware->data + sent, size);
2462
2463 pipe = usb_sndbulkpipe(udev, 0x02);
2464 err = usb_bulk_msg(udev, pipe, buf, size, &len,
2465 QCA_DFU_TIMEOUT);
2466 if (err < 0) {
2467 BT_ERR("%s: Failed to send body at %zd of %zd (%d)",
2468 hdev->name, sent, firmware->size, err);
2469 break;
2470 }
2471
2472 if (size != len) {
2473 BT_ERR("%s: Failed to get bulk buffer", hdev->name);
2474 err = -EILSEQ;
2475 break;
2476 }
2477
2478 sent += size;
2479 count -= size;
2480 }
2481
2482 done:
2483 kfree(buf);
2484 return err;
2485 }
2486
2487 static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev,
2488 struct qca_version *ver,
2489 const struct qca_device_info *info)
2490 {
2491 struct qca_rampatch_version *rver;
2492 const struct firmware *fw;
2493 u32 ver_rom, ver_patch;
2494 u16 rver_rom, rver_patch;
2495 char fwname[64];
2496 int err;
2497
2498 ver_rom = le32_to_cpu(ver->rom_version);
2499 ver_patch = le32_to_cpu(ver->patch_version);
2500
2501 snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom);
2502
2503 err = request_firmware(&fw, fwname, &hdev->dev);
2504 if (err) {
2505 BT_ERR("%s: failed to request rampatch file: %s (%d)",
2506 hdev->name, fwname, err);
2507 return err;
2508 }
2509
2510 BT_INFO("%s: using rampatch file: %s", hdev->name, fwname);
2511
2512 rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset);
2513 rver_rom = le16_to_cpu(rver->rom_version);
2514 rver_patch = le16_to_cpu(rver->patch_version);
2515
2516 BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x "
2517 "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom,
2518 ver_patch);
2519
2520 if (rver_rom != ver_rom || rver_patch <= ver_patch) {
2521 BT_ERR("%s: rampatch file version did not match with firmware",
2522 hdev->name);
2523 err = -EINVAL;
2524 goto done;
2525 }
2526
2527 err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr);
2528
2529 done:
2530 release_firmware(fw);
2531
2532 return err;
2533 }
2534
2535 static int btusb_setup_qca_load_nvm(struct hci_dev *hdev,
2536 struct qca_version *ver,
2537 const struct qca_device_info *info)
2538 {
2539 const struct firmware *fw;
2540 char fwname[64];
2541 int err;
2542
2543 snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin",
2544 le32_to_cpu(ver->rom_version));
2545
2546 err = request_firmware(&fw, fwname, &hdev->dev);
2547 if (err) {
2548 BT_ERR("%s: failed to request NVM file: %s (%d)",
2549 hdev->name, fwname, err);
2550 return err;
2551 }
2552
2553 BT_INFO("%s: using NVM file: %s", hdev->name, fwname);
2554
2555 err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr);
2556
2557 release_firmware(fw);
2558
2559 return err;
2560 }
2561
2562 static int btusb_setup_qca(struct hci_dev *hdev)
2563 {
2564 const struct qca_device_info *info = NULL;
2565 struct qca_version ver;
2566 u32 ver_rom;
2567 u8 status;
2568 int i, err;
2569
2570 err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver,
2571 sizeof(ver));
2572 if (err < 0)
2573 return err;
2574
2575 ver_rom = le32_to_cpu(ver.rom_version);
2576 for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) {
2577 if (ver_rom == qca_devices_table[i].rom_version)
2578 info = &qca_devices_table[i];
2579 }
2580 if (!info) {
2581 BT_ERR("%s: don't support firmware rome 0x%x", hdev->name,
2582 ver_rom);
2583 return -ENODEV;
2584 }
2585
2586 err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status,
2587 sizeof(status));
2588 if (err < 0)
2589 return err;
2590
2591 if (!(status & QCA_PATCH_UPDATED)) {
2592 err = btusb_setup_qca_load_rampatch(hdev, &ver, info);
2593 if (err < 0)
2594 return err;
2595 }
2596
2597 if (!(status & QCA_SYSCFG_UPDATED)) {
2598 err = btusb_setup_qca_load_nvm(hdev, &ver, info);
2599 if (err < 0)
2600 return err;
2601 }
2602
2603 return 0;
2604 }
2605
2606 static int btusb_probe(struct usb_interface *intf,
2607 const struct usb_device_id *id)
2608 {
2609 struct usb_endpoint_descriptor *ep_desc;
2610 struct btusb_data *data;
2611 struct hci_dev *hdev;
2612 int i, err;
2613
2614 BT_DBG("intf %p id %p", intf, id);
2615
2616 /* interface numbers are hardcoded in the spec */
2617 if (intf->cur_altsetting->desc.bInterfaceNumber != 0)
2618 return -ENODEV;
2619
2620 if (!id->driver_info) {
2621 const struct usb_device_id *match;
2622
2623 match = usb_match_id(intf, blacklist_table);
2624 if (match)
2625 id = match;
2626 }
2627
2628 if (id->driver_info == BTUSB_IGNORE)
2629 return -ENODEV;
2630
2631 if (id->driver_info & BTUSB_ATH3012) {
2632 struct usb_device *udev = interface_to_usbdev(intf);
2633
2634 /* Old firmware would otherwise let ath3k driver load
2635 * patch and sysconfig files */
2636 if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001)
2637 return -ENODEV;
2638 }
2639
2640 data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL);
2641 if (!data)
2642 return -ENOMEM;
2643
2644 for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
2645 ep_desc = &intf->cur_altsetting->endpoint[i].desc;
2646
2647 if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) {
2648 data->intr_ep = ep_desc;
2649 continue;
2650 }
2651
2652 if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
2653 data->bulk_tx_ep = ep_desc;
2654 continue;
2655 }
2656
2657 if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
2658 data->bulk_rx_ep = ep_desc;
2659 continue;
2660 }
2661 }
2662
2663 if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep)
2664 return -ENODEV;
2665
2666 if (id->driver_info & BTUSB_AMP) {
2667 data->cmdreq_type = USB_TYPE_CLASS | 0x01;
2668 data->cmdreq = 0x2b;
2669 } else {
2670 data->cmdreq_type = USB_TYPE_CLASS;
2671 data->cmdreq = 0x00;
2672 }
2673
2674 data->udev = interface_to_usbdev(intf);
2675 data->intf = intf;
2676
2677 INIT_WORK(&data->work, btusb_work);
2678 INIT_WORK(&data->waker, btusb_waker);
2679 init_usb_anchor(&data->deferred);
2680 init_usb_anchor(&data->tx_anchor);
2681 spin_lock_init(&data->txlock);
2682
2683 init_usb_anchor(&data->intr_anchor);
2684 init_usb_anchor(&data->bulk_anchor);
2685 init_usb_anchor(&data->isoc_anchor);
2686 spin_lock_init(&data->rxlock);
2687
2688 if (id->driver_info & BTUSB_INTEL_NEW) {
2689 data->recv_event = btusb_recv_event_intel;
2690 data->recv_bulk = btusb_recv_bulk_intel;
2691 set_bit(BTUSB_BOOTLOADER, &data->flags);
2692 } else {
2693 data->recv_event = hci_recv_frame;
2694 data->recv_bulk = btusb_recv_bulk;
2695 }
2696
2697 hdev = hci_alloc_dev();
2698 if (!hdev)
2699 return -ENOMEM;
2700
2701 hdev->bus = HCI_USB;
2702 hci_set_drvdata(hdev, data);
2703
2704 if (id->driver_info & BTUSB_AMP)
2705 hdev->dev_type = HCI_AMP;
2706 else
2707 hdev->dev_type = HCI_BREDR;
2708
2709 data->hdev = hdev;
2710
2711 SET_HCIDEV_DEV(hdev, &intf->dev);
2712
2713 hdev->open = btusb_open;
2714 hdev->close = btusb_close;
2715 hdev->flush = btusb_flush;
2716 hdev->send = btusb_send_frame;
2717 hdev->notify = btusb_notify;
2718
2719 if (id->driver_info & BTUSB_BCM92035)
2720 hdev->setup = btusb_setup_bcm92035;
2721
2722 #ifdef CONFIG_BT_HCIBTUSB_BCM
2723 if (id->driver_info & BTUSB_BCM_PATCHRAM) {
2724 hdev->setup = btbcm_setup_patchram;
2725 hdev->set_bdaddr = btbcm_set_bdaddr;
2726 }
2727
2728 if (id->driver_info & BTUSB_BCM_APPLE)
2729 hdev->setup = btbcm_setup_apple;
2730 #endif
2731
2732 if (id->driver_info & BTUSB_INTEL) {
2733 hdev->setup = btusb_setup_intel;
2734 hdev->shutdown = btusb_shutdown_intel;
2735 hdev->set_bdaddr = btintel_set_bdaddr;
2736 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
2737 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
2738 }
2739
2740 if (id->driver_info & BTUSB_INTEL_NEW) {
2741 hdev->send = btusb_send_frame_intel;
2742 hdev->setup = btusb_setup_intel_new;
2743 hdev->hw_error = btusb_hw_error_intel;
2744 hdev->set_bdaddr = btintel_set_bdaddr;
2745 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
2746 }
2747
2748 if (id->driver_info & BTUSB_MARVELL)
2749 hdev->set_bdaddr = btusb_set_bdaddr_marvell;
2750
2751 if (id->driver_info & BTUSB_SWAVE) {
2752 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks);
2753 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks);
2754 }
2755
2756 if (id->driver_info & BTUSB_INTEL_BOOT)
2757 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
2758
2759 if (id->driver_info & BTUSB_ATH3012) {
2760 hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
2761 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
2762 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
2763 }
2764
2765 if (id->driver_info & BTUSB_QCA_ROME) {
2766 data->setup_on_usb = btusb_setup_qca;
2767 hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
2768 }
2769
2770 #ifdef CONFIG_BT_HCIBTUSB_RTL
2771 if (id->driver_info & BTUSB_REALTEK) {
2772 hdev->setup = btrtl_setup_realtek;
2773
2774 /* Realtek devices lose their updated firmware over suspend,
2775 * but the USB hub doesn't notice any status change.
2776 * Explicitly request a device reset on resume.
2777 */
2778 set_bit(BTUSB_RESET_RESUME, &data->flags);
2779 }
2780 #endif
2781
2782 if (id->driver_info & BTUSB_AMP) {
2783 /* AMP controllers do not support SCO packets */
2784 data->isoc = NULL;
2785 } else {
2786 /* Interface numbers are hardcoded in the specification */
2787 data->isoc = usb_ifnum_to_if(data->udev, 1);
2788 }
2789
2790 if (!reset)
2791 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
2792
2793 if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) {
2794 if (!disable_scofix)
2795 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks);
2796 }
2797
2798 if (id->driver_info & BTUSB_BROKEN_ISOC)
2799 data->isoc = NULL;
2800
2801 if (id->driver_info & BTUSB_DIGIANSWER) {
2802 data->cmdreq_type = USB_TYPE_VENDOR;
2803 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
2804 }
2805
2806 if (id->driver_info & BTUSB_CSR) {
2807 struct usb_device *udev = data->udev;
2808 u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice);
2809
2810 /* Old firmware would otherwise execute USB reset */
2811 if (bcdDevice < 0x117)
2812 set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
2813
2814 /* Fake CSR devices with broken commands */
2815 if (bcdDevice <= 0x100)
2816 hdev->setup = btusb_setup_csr;
2817
2818 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
2819 }
2820
2821 if (id->driver_info & BTUSB_SNIFFER) {
2822 struct usb_device *udev = data->udev;
2823
2824 /* New sniffer firmware has crippled HCI interface */
2825 if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997)
2826 set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
2827 }
2828
2829 if (id->driver_info & BTUSB_INTEL_BOOT) {
2830 /* A bug in the bootloader causes that interrupt interface is
2831 * only enabled after receiving SetInterface(0, AltSetting=0).
2832 */
2833 err = usb_set_interface(data->udev, 0, 0);
2834 if (err < 0) {
2835 BT_ERR("failed to set interface 0, alt 0 %d", err);
2836 hci_free_dev(hdev);
2837 return err;
2838 }
2839 }
2840
2841 if (data->isoc) {
2842 err = usb_driver_claim_interface(&btusb_driver,
2843 data->isoc, data);
2844 if (err < 0) {
2845 hci_free_dev(hdev);
2846 return err;
2847 }
2848 }
2849
2850 err = hci_register_dev(hdev);
2851 if (err < 0) {
2852 hci_free_dev(hdev);
2853 return err;
2854 }
2855
2856 usb_set_intfdata(intf, data);
2857
2858 return 0;
2859 }
2860
2861 static void btusb_disconnect(struct usb_interface *intf)
2862 {
2863 struct btusb_data *data = usb_get_intfdata(intf);
2864 struct hci_dev *hdev;
2865
2866 BT_DBG("intf %p", intf);
2867
2868 if (!data)
2869 return;
2870
2871 hdev = data->hdev;
2872 usb_set_intfdata(data->intf, NULL);
2873
2874 if (data->isoc)
2875 usb_set_intfdata(data->isoc, NULL);
2876
2877 hci_unregister_dev(hdev);
2878
2879 if (intf == data->isoc)
2880 usb_driver_release_interface(&btusb_driver, data->intf);
2881 else if (data->isoc)
2882 usb_driver_release_interface(&btusb_driver, data->isoc);
2883
2884 hci_free_dev(hdev);
2885 }
2886
2887 #ifdef CONFIG_PM
2888 static int btusb_suspend(struct usb_interface *intf, pm_message_t message)
2889 {
2890 struct btusb_data *data = usb_get_intfdata(intf);
2891
2892 BT_DBG("intf %p", intf);
2893
2894 if (data->suspend_count++)
2895 return 0;
2896
2897 spin_lock_irq(&data->txlock);
2898 if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) {
2899 set_bit(BTUSB_SUSPENDING, &data->flags);
2900 spin_unlock_irq(&data->txlock);
2901 } else {
2902 spin_unlock_irq(&data->txlock);
2903 data->suspend_count--;
2904 return -EBUSY;
2905 }
2906
2907 cancel_work_sync(&data->work);
2908
2909 btusb_stop_traffic(data);
2910 usb_kill_anchored_urbs(&data->tx_anchor);
2911
2912 /* Optionally request a device reset on resume, but only when
2913 * wakeups are disabled. If wakeups are enabled we assume the
2914 * device will stay powered up throughout suspend.
2915 */
2916 if (test_bit(BTUSB_RESET_RESUME, &data->flags) &&
2917 !device_may_wakeup(&data->udev->dev))
2918 data->udev->reset_resume = 1;
2919
2920 return 0;
2921 }
2922
2923 static void play_deferred(struct btusb_data *data)
2924 {
2925 struct urb *urb;
2926 int err;
2927
2928 while ((urb = usb_get_from_anchor(&data->deferred))) {
2929 err = usb_submit_urb(urb, GFP_ATOMIC);
2930 if (err < 0)
2931 break;
2932
2933 data->tx_in_flight++;
2934 }
2935 usb_scuttle_anchored_urbs(&data->deferred);
2936 }
2937
2938 static int btusb_resume(struct usb_interface *intf)
2939 {
2940 struct btusb_data *data = usb_get_intfdata(intf);
2941 struct hci_dev *hdev = data->hdev;
2942 int err = 0;
2943
2944 BT_DBG("intf %p", intf);
2945
2946 if (--data->suspend_count)
2947 return 0;
2948
2949 if (!test_bit(HCI_RUNNING, &hdev->flags))
2950 goto done;
2951
2952 if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) {
2953 err = btusb_submit_intr_urb(hdev, GFP_NOIO);
2954 if (err < 0) {
2955 clear_bit(BTUSB_INTR_RUNNING, &data->flags);
2956 goto failed;
2957 }
2958 }
2959
2960 if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) {
2961 err = btusb_submit_bulk_urb(hdev, GFP_NOIO);
2962 if (err < 0) {
2963 clear_bit(BTUSB_BULK_RUNNING, &data->flags);
2964 goto failed;
2965 }
2966
2967 btusb_submit_bulk_urb(hdev, GFP_NOIO);
2968 }
2969
2970 if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
2971 if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0)
2972 clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
2973 else
2974 btusb_submit_isoc_urb(hdev, GFP_NOIO);
2975 }
2976
2977 spin_lock_irq(&data->txlock);
2978 play_deferred(data);
2979 clear_bit(BTUSB_SUSPENDING, &data->flags);
2980 spin_unlock_irq(&data->txlock);
2981 schedule_work(&data->work);
2982
2983 return 0;
2984
2985 failed:
2986 usb_scuttle_anchored_urbs(&data->deferred);
2987 done:
2988 spin_lock_irq(&data->txlock);
2989 clear_bit(BTUSB_SUSPENDING, &data->flags);
2990 spin_unlock_irq(&data->txlock);
2991
2992 return err;
2993 }
2994 #endif
2995
2996 static struct usb_driver btusb_driver = {
2997 .name = "btusb",
2998 .probe = btusb_probe,
2999 .disconnect = btusb_disconnect,
3000 #ifdef CONFIG_PM
3001 .suspend = btusb_suspend,
3002 .resume = btusb_resume,
3003 #endif
3004 .id_table = btusb_table,
3005 .supports_autosuspend = 1,
3006 .disable_hub_initiated_lpm = 1,
3007 };
3008
3009 module_usb_driver(btusb_driver);
3010
3011 module_param(disable_scofix, bool, 0644);
3012 MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size");
3013
3014 module_param(force_scofix, bool, 0644);
3015 MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size");
3016
3017 module_param(reset, bool, 0644);
3018 MODULE_PARM_DESC(reset, "Send HCI reset command on initialization");
3019
3020 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
3021 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION);
3022 MODULE_VERSION(VERSION);
3023 MODULE_LICENSE("GPL");
This page took 0.10014 seconds and 6 git commands to generate.