btusb.c 82 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206
  1. /*
  2. *
  3. * Generic Bluetooth USB driver
  4. *
  5. * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
  6. *
  7. *
  8. * This program is free software; you can redistribute it and/or modify
  9. * it under the terms of the GNU General Public License as published by
  10. * the Free Software Foundation; either version 2 of the License, or
  11. * (at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License
  19. * along with this program; if not, write to the Free Software
  20. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  21. *
  22. */
  23. #include <linux/module.h>
  24. #include <linux/usb.h>
  25. #include <linux/firmware.h>
  26. #include <asm/unaligned.h>
  27. #include <net/bluetooth/bluetooth.h>
  28. #include <net/bluetooth/hci_core.h>
  29. #include "btintel.h"
  30. #include "btbcm.h"
  31. #include "btrtl.h"
  32. #define VERSION "0.8"
  33. static bool disable_scofix;
  34. static bool force_scofix;
  35. static bool reset = true;
  36. static struct usb_driver btusb_driver;
  37. #define BTUSB_IGNORE 0x01
  38. #define BTUSB_DIGIANSWER 0x02
  39. #define BTUSB_CSR 0x04
  40. #define BTUSB_SNIFFER 0x08
  41. #define BTUSB_BCM92035 0x10
  42. #define BTUSB_BROKEN_ISOC 0x20
  43. #define BTUSB_WRONG_SCO_MTU 0x40
  44. #define BTUSB_ATH3012 0x80
  45. #define BTUSB_INTEL 0x100
  46. #define BTUSB_INTEL_BOOT 0x200
  47. #define BTUSB_BCM_PATCHRAM 0x400
  48. #define BTUSB_MARVELL 0x800
  49. #define BTUSB_SWAVE 0x1000
  50. #define BTUSB_INTEL_NEW 0x2000
  51. #define BTUSB_AMP 0x4000
  52. #define BTUSB_QCA_ROME 0x8000
  53. #define BTUSB_BCM_APPLE 0x10000
  54. #define BTUSB_REALTEK 0x20000
  55. #define BTUSB_BCM2045 0x40000
  56. #define BTUSB_IFNUM_2 0x80000
  57. #define BTUSB_CW6622 0x100000
  58. static const struct usb_device_id btusb_table[] = {
  59. /* Generic Bluetooth USB device */
  60. { USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
  61. /* Generic Bluetooth AMP device */
  62. { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP },
  63. /* Generic Bluetooth USB interface */
  64. { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) },
  65. /* Apple-specific (Broadcom) devices */
  66. { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
  67. .driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 },
  68. /* MediaTek MT76x0E */
  69. { USB_DEVICE(0x0e8d, 0x763f) },
  70. /* Broadcom SoftSailing reporting vendor specific */
  71. { USB_DEVICE(0x0a5c, 0x21e1) },
  72. /* Apple MacBookPro 7,1 */
  73. { USB_DEVICE(0x05ac, 0x8213) },
  74. /* Apple iMac11,1 */
  75. { USB_DEVICE(0x05ac, 0x8215) },
  76. /* Apple MacBookPro6,2 */
  77. { USB_DEVICE(0x05ac, 0x8218) },
  78. /* Apple MacBookAir3,1, MacBookAir3,2 */
  79. { USB_DEVICE(0x05ac, 0x821b) },
  80. /* Apple MacBookAir4,1 */
  81. { USB_DEVICE(0x05ac, 0x821f) },
  82. /* Apple MacBookPro8,2 */
  83. { USB_DEVICE(0x05ac, 0x821a) },
  84. /* Apple MacMini5,1 */
  85. { USB_DEVICE(0x05ac, 0x8281) },
  86. /* AVM BlueFRITZ! USB v2.0 */
  87. { USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE },
  88. /* Bluetooth Ultraport Module from IBM */
  89. { USB_DEVICE(0x04bf, 0x030a) },
  90. /* ALPS Modules with non-standard id */
  91. { USB_DEVICE(0x044e, 0x3001) },
  92. { USB_DEVICE(0x044e, 0x3002) },
  93. /* Ericsson with non-standard id */
  94. { USB_DEVICE(0x0bdb, 0x1002) },
  95. /* Canyon CN-BTU1 with HID interfaces */
  96. { USB_DEVICE(0x0c10, 0x0000) },
  97. /* Broadcom BCM20702A0 */
  98. { USB_DEVICE(0x413c, 0x8197) },
  99. /* Broadcom BCM20702B0 (Dynex/Insignia) */
  100. { USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM },
  101. /* Broadcom BCM43142A0 (Foxconn/Lenovo) */
  102. { USB_DEVICE(0x105b, 0xe065), .driver_info = BTUSB_BCM_PATCHRAM },
  103. /* Foxconn - Hon Hai */
  104. { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
  105. .driver_info = BTUSB_BCM_PATCHRAM },
  106. /* Lite-On Technology - Broadcom based */
  107. { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
  108. .driver_info = BTUSB_BCM_PATCHRAM },
  109. /* Broadcom devices with vendor specific id */
  110. { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
  111. .driver_info = BTUSB_BCM_PATCHRAM },
  112. /* ASUSTek Computer - Broadcom based */
  113. { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
  114. .driver_info = BTUSB_BCM_PATCHRAM },
  115. /* Belkin F8065bf - Broadcom based */
  116. { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
  117. .driver_info = BTUSB_BCM_PATCHRAM },
  118. /* IMC Networks - Broadcom based */
  119. { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
  120. .driver_info = BTUSB_BCM_PATCHRAM },
  121. /* Toshiba Corp - Broadcom based */
  122. { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01),
  123. .driver_info = BTUSB_BCM_PATCHRAM },
  124. /* Intel Bluetooth USB Bootloader (RAM module) */
  125. { USB_DEVICE(0x8087, 0x0a5a),
  126. .driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC },
  127. { } /* Terminating entry */
  128. };
  129. MODULE_DEVICE_TABLE(usb, btusb_table);
  130. static const struct usb_device_id blacklist_table[] = {
  131. /* CSR BlueCore devices */
  132. { USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR },
  133. /* Broadcom BCM2033 without firmware */
  134. { USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE },
  135. /* Broadcom BCM2045 devices */
  136. { USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 },
  137. /* Atheros 3011 with sflash firmware */
  138. { USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE },
  139. { USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE },
  140. { USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE },
  141. { USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE },
  142. { USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE },
  143. { USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE },
  144. { USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE },
  145. /* Atheros AR9285 Malbec with sflash firmware */
  146. { USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE },
  147. /* Atheros 3012 with sflash firmware */
  148. { USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 },
  149. { USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 },
  150. { USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 },
  151. { USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 },
  152. { USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 },
  153. { USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 },
  154. { USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 },
  155. { USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 },
  156. { USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 },
  157. { USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 },
  158. { USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 },
  159. { USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 },
  160. { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
  161. { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
  162. { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  163. { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
  164. { USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 },
  165. { USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 },
  166. { USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 },
  167. { USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 },
  168. { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
  169. { USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 },
  170. { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
  171. { USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 },
  172. { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },
  173. { USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 },
  174. { USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 },
  175. { USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 },
  176. { USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 },
  177. { USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 },
  178. { USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 },
  179. { USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 },
  180. { USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 },
  181. { USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 },
  182. { USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 },
  183. { USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 },
  184. { USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 },
  185. { USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 },
  186. { USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 },
  187. { USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 },
  188. { USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 },
  189. { USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 },
  190. { USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 },
  191. { USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 },
  192. { USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 },
  193. { USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 },
  194. { USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 },
  195. { USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 },
  196. { USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 },
  197. { USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 },
  198. /* Atheros AR5BBU12 with sflash firmware */
  199. { USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE },
  200. /* Atheros AR5BBU12 with sflash firmware */
  201. { USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 },
  202. { USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 },
  203. /* QCA ROME chipset */
  204. { USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME },
  205. { USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME },
  206. { USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME },
  207. { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME },
  208. { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME },
  209. { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME },
  210. /* Broadcom BCM2035 */
  211. { USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 },
  212. { USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU },
  213. { USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU },
  214. /* Broadcom BCM2045 */
  215. { USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU },
  216. { USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU },
  217. /* IBM/Lenovo ThinkPad with Broadcom chip */
  218. { USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU },
  219. { USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU },
  220. /* HP laptop with Broadcom chip */
  221. { USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU },
  222. /* Dell laptop with Broadcom chip */
  223. { USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU },
  224. /* Dell Wireless 370 and 410 devices */
  225. { USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU },
  226. { USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU },
  227. /* Belkin F8T012 and F8T013 devices */
  228. { USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU },
  229. { USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU },
  230. /* Asus WL-BTD202 device */
  231. { USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU },
  232. /* Kensington Bluetooth USB adapter */
  233. { USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU },
  234. /* RTX Telecom based adapters with buggy SCO support */
  235. { USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC },
  236. { USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC },
  237. /* CONWISE Technology based adapters with buggy SCO support */
  238. { USB_DEVICE(0x0e5e, 0x6622),
  239. .driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622},
  240. /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
  241. { USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE },
  242. /* Digianswer devices */
  243. { USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER },
  244. { USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE },
  245. /* CSR BlueCore Bluetooth Sniffer */
  246. { USB_DEVICE(0x0a12, 0x0002),
  247. .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
  248. /* Frontline ComProbe Bluetooth Sniffer */
  249. { USB_DEVICE(0x16d3, 0x0002),
  250. .driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
  251. /* Marvell Bluetooth devices */
  252. { USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL },
  253. { USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL },
  254. { USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL },
  255. /* Intel Bluetooth devices */
  256. { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
  257. { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL },
  258. { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL },
  259. { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW },
  260. { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL },
  261. /* Other Intel Bluetooth devices */
  262. { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
  263. .driver_info = BTUSB_IGNORE },
  264. /* Realtek Bluetooth devices */
  265. { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
  266. .driver_info = BTUSB_REALTEK },
  267. /* Additional Realtek 8723AE Bluetooth devices */
  268. { USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK },
  269. { USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK },
  270. /* Additional Realtek 8723BE Bluetooth devices */
  271. { USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK },
  272. { USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK },
  273. { USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK },
  274. { USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK },
  275. { USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK },
  276. { USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK },
  277. /* Additional Realtek 8821AE Bluetooth devices */
  278. { USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK },
  279. { USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK },
  280. { USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK },
  281. { USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK },
  282. { USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK },
  283. /* Silicon Wave based devices */
  284. { USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE },
  285. { } /* Terminating entry */
  286. };
  287. #define BTUSB_MAX_ISOC_FRAMES 10
  288. #define BTUSB_INTR_RUNNING 0
  289. #define BTUSB_BULK_RUNNING 1
  290. #define BTUSB_ISOC_RUNNING 2
  291. #define BTUSB_SUSPENDING 3
  292. #define BTUSB_DID_ISO_RESUME 4
  293. #define BTUSB_BOOTLOADER 5
  294. #define BTUSB_DOWNLOADING 6
  295. #define BTUSB_FIRMWARE_LOADED 7
  296. #define BTUSB_FIRMWARE_FAILED 8
  297. #define BTUSB_BOOTING 9
  298. #define BTUSB_RESET_RESUME 10
  299. #define BTUSB_DIAG_RUNNING 11
  300. struct btusb_data {
  301. struct hci_dev *hdev;
  302. struct usb_device *udev;
  303. struct usb_interface *intf;
  304. struct usb_interface *isoc;
  305. struct usb_interface *diag;
  306. unsigned long flags;
  307. struct work_struct work;
  308. struct work_struct waker;
  309. struct usb_anchor deferred;
  310. struct usb_anchor tx_anchor;
  311. int tx_in_flight;
  312. spinlock_t txlock;
  313. struct usb_anchor intr_anchor;
  314. struct usb_anchor bulk_anchor;
  315. struct usb_anchor isoc_anchor;
  316. struct usb_anchor diag_anchor;
  317. spinlock_t rxlock;
  318. struct sk_buff *evt_skb;
  319. struct sk_buff *acl_skb;
  320. struct sk_buff *sco_skb;
  321. struct usb_endpoint_descriptor *intr_ep;
  322. struct usb_endpoint_descriptor *bulk_tx_ep;
  323. struct usb_endpoint_descriptor *bulk_rx_ep;
  324. struct usb_endpoint_descriptor *isoc_tx_ep;
  325. struct usb_endpoint_descriptor *isoc_rx_ep;
  326. struct usb_endpoint_descriptor *diag_tx_ep;
  327. struct usb_endpoint_descriptor *diag_rx_ep;
  328. __u8 cmdreq_type;
  329. __u8 cmdreq;
  330. unsigned int sco_num;
  331. int isoc_altsetting;
  332. int suspend_count;
  333. int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb);
  334. int (*recv_bulk)(struct btusb_data *data, void *buffer, int count);
  335. int (*setup_on_usb)(struct hci_dev *hdev);
  336. };
  337. static inline void btusb_free_frags(struct btusb_data *data)
  338. {
  339. unsigned long flags;
  340. spin_lock_irqsave(&data->rxlock, flags);
  341. kfree_skb(data->evt_skb);
  342. data->evt_skb = NULL;
  343. kfree_skb(data->acl_skb);
  344. data->acl_skb = NULL;
  345. kfree_skb(data->sco_skb);
  346. data->sco_skb = NULL;
  347. spin_unlock_irqrestore(&data->rxlock, flags);
  348. }
  349. static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count)
  350. {
  351. struct sk_buff *skb;
  352. int err = 0;
  353. spin_lock(&data->rxlock);
  354. skb = data->evt_skb;
  355. while (count) {
  356. int len;
  357. if (!skb) {
  358. skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC);
  359. if (!skb) {
  360. err = -ENOMEM;
  361. break;
  362. }
  363. hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
  364. hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE;
  365. }
  366. len = min_t(uint, hci_skb_expect(skb), count);
  367. memcpy(skb_put(skb, len), buffer, len);
  368. count -= len;
  369. buffer += len;
  370. hci_skb_expect(skb) -= len;
  371. if (skb->len == HCI_EVENT_HDR_SIZE) {
  372. /* Complete event header */
  373. hci_skb_expect(skb) = hci_event_hdr(skb)->plen;
  374. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  375. kfree_skb(skb);
  376. skb = NULL;
  377. err = -EILSEQ;
  378. break;
  379. }
  380. }
  381. if (!hci_skb_expect(skb)) {
  382. /* Complete frame */
  383. data->recv_event(data->hdev, skb);
  384. skb = NULL;
  385. }
  386. }
  387. data->evt_skb = skb;
  388. spin_unlock(&data->rxlock);
  389. return err;
  390. }
  391. static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count)
  392. {
  393. struct sk_buff *skb;
  394. int err = 0;
  395. spin_lock(&data->rxlock);
  396. skb = data->acl_skb;
  397. while (count) {
  398. int len;
  399. if (!skb) {
  400. skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC);
  401. if (!skb) {
  402. err = -ENOMEM;
  403. break;
  404. }
  405. hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT;
  406. hci_skb_expect(skb) = HCI_ACL_HDR_SIZE;
  407. }
  408. len = min_t(uint, hci_skb_expect(skb), count);
  409. memcpy(skb_put(skb, len), buffer, len);
  410. count -= len;
  411. buffer += len;
  412. hci_skb_expect(skb) -= len;
  413. if (skb->len == HCI_ACL_HDR_SIZE) {
  414. __le16 dlen = hci_acl_hdr(skb)->dlen;
  415. /* Complete ACL header */
  416. hci_skb_expect(skb) = __le16_to_cpu(dlen);
  417. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  418. kfree_skb(skb);
  419. skb = NULL;
  420. err = -EILSEQ;
  421. break;
  422. }
  423. }
  424. if (!hci_skb_expect(skb)) {
  425. /* Complete frame */
  426. hci_recv_frame(data->hdev, skb);
  427. skb = NULL;
  428. }
  429. }
  430. data->acl_skb = skb;
  431. spin_unlock(&data->rxlock);
  432. return err;
  433. }
  434. static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count)
  435. {
  436. struct sk_buff *skb;
  437. int err = 0;
  438. spin_lock(&data->rxlock);
  439. skb = data->sco_skb;
  440. while (count) {
  441. int len;
  442. if (!skb) {
  443. skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC);
  444. if (!skb) {
  445. err = -ENOMEM;
  446. break;
  447. }
  448. hci_skb_pkt_type(skb) = HCI_SCODATA_PKT;
  449. hci_skb_expect(skb) = HCI_SCO_HDR_SIZE;
  450. }
  451. len = min_t(uint, hci_skb_expect(skb), count);
  452. memcpy(skb_put(skb, len), buffer, len);
  453. count -= len;
  454. buffer += len;
  455. hci_skb_expect(skb) -= len;
  456. if (skb->len == HCI_SCO_HDR_SIZE) {
  457. /* Complete SCO header */
  458. hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen;
  459. if (skb_tailroom(skb) < hci_skb_expect(skb)) {
  460. kfree_skb(skb);
  461. skb = NULL;
  462. err = -EILSEQ;
  463. break;
  464. }
  465. }
  466. if (!hci_skb_expect(skb)) {
  467. /* Complete frame */
  468. hci_recv_frame(data->hdev, skb);
  469. skb = NULL;
  470. }
  471. }
  472. data->sco_skb = skb;
  473. spin_unlock(&data->rxlock);
  474. return err;
  475. }
  476. static void btusb_intr_complete(struct urb *urb)
  477. {
  478. struct hci_dev *hdev = urb->context;
  479. struct btusb_data *data = hci_get_drvdata(hdev);
  480. int err;
  481. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  482. urb->actual_length);
  483. if (!test_bit(HCI_RUNNING, &hdev->flags))
  484. return;
  485. if (urb->status == 0) {
  486. hdev->stat.byte_rx += urb->actual_length;
  487. if (btusb_recv_intr(data, urb->transfer_buffer,
  488. urb->actual_length) < 0) {
  489. BT_ERR("%s corrupted event packet", hdev->name);
  490. hdev->stat.err_rx++;
  491. }
  492. } else if (urb->status == -ENOENT) {
  493. /* Avoid suspend failed when usb_kill_urb */
  494. return;
  495. }
  496. if (!test_bit(BTUSB_INTR_RUNNING, &data->flags))
  497. return;
  498. usb_mark_last_busy(data->udev);
  499. usb_anchor_urb(urb, &data->intr_anchor);
  500. err = usb_submit_urb(urb, GFP_ATOMIC);
  501. if (err < 0) {
  502. /* -EPERM: urb is being killed;
  503. * -ENODEV: device got disconnected */
  504. if (err != -EPERM && err != -ENODEV)
  505. BT_ERR("%s urb %p failed to resubmit (%d)",
  506. hdev->name, urb, -err);
  507. usb_unanchor_urb(urb);
  508. }
  509. }
  510. static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags)
  511. {
  512. struct btusb_data *data = hci_get_drvdata(hdev);
  513. struct urb *urb;
  514. unsigned char *buf;
  515. unsigned int pipe;
  516. int err, size;
  517. BT_DBG("%s", hdev->name);
  518. if (!data->intr_ep)
  519. return -ENODEV;
  520. urb = usb_alloc_urb(0, mem_flags);
  521. if (!urb)
  522. return -ENOMEM;
  523. size = le16_to_cpu(data->intr_ep->wMaxPacketSize);
  524. buf = kmalloc(size, mem_flags);
  525. if (!buf) {
  526. usb_free_urb(urb);
  527. return -ENOMEM;
  528. }
  529. pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress);
  530. usb_fill_int_urb(urb, data->udev, pipe, buf, size,
  531. btusb_intr_complete, hdev, data->intr_ep->bInterval);
  532. urb->transfer_flags |= URB_FREE_BUFFER;
  533. usb_anchor_urb(urb, &data->intr_anchor);
  534. err = usb_submit_urb(urb, mem_flags);
  535. if (err < 0) {
  536. if (err != -EPERM && err != -ENODEV)
  537. BT_ERR("%s urb %p submission failed (%d)",
  538. hdev->name, urb, -err);
  539. usb_unanchor_urb(urb);
  540. }
  541. usb_free_urb(urb);
  542. return err;
  543. }
  544. static void btusb_bulk_complete(struct urb *urb)
  545. {
  546. struct hci_dev *hdev = urb->context;
  547. struct btusb_data *data = hci_get_drvdata(hdev);
  548. int err;
  549. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  550. urb->actual_length);
  551. if (!test_bit(HCI_RUNNING, &hdev->flags))
  552. return;
  553. if (urb->status == 0) {
  554. hdev->stat.byte_rx += urb->actual_length;
  555. if (data->recv_bulk(data, urb->transfer_buffer,
  556. urb->actual_length) < 0) {
  557. BT_ERR("%s corrupted ACL packet", hdev->name);
  558. hdev->stat.err_rx++;
  559. }
  560. } else if (urb->status == -ENOENT) {
  561. /* Avoid suspend failed when usb_kill_urb */
  562. return;
  563. }
  564. if (!test_bit(BTUSB_BULK_RUNNING, &data->flags))
  565. return;
  566. usb_anchor_urb(urb, &data->bulk_anchor);
  567. usb_mark_last_busy(data->udev);
  568. err = usb_submit_urb(urb, GFP_ATOMIC);
  569. if (err < 0) {
  570. /* -EPERM: urb is being killed;
  571. * -ENODEV: device got disconnected */
  572. if (err != -EPERM && err != -ENODEV)
  573. BT_ERR("%s urb %p failed to resubmit (%d)",
  574. hdev->name, urb, -err);
  575. usb_unanchor_urb(urb);
  576. }
  577. }
  578. static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags)
  579. {
  580. struct btusb_data *data = hci_get_drvdata(hdev);
  581. struct urb *urb;
  582. unsigned char *buf;
  583. unsigned int pipe;
  584. int err, size = HCI_MAX_FRAME_SIZE;
  585. BT_DBG("%s", hdev->name);
  586. if (!data->bulk_rx_ep)
  587. return -ENODEV;
  588. urb = usb_alloc_urb(0, mem_flags);
  589. if (!urb)
  590. return -ENOMEM;
  591. buf = kmalloc(size, mem_flags);
  592. if (!buf) {
  593. usb_free_urb(urb);
  594. return -ENOMEM;
  595. }
  596. pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress);
  597. usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
  598. btusb_bulk_complete, hdev);
  599. urb->transfer_flags |= URB_FREE_BUFFER;
  600. usb_mark_last_busy(data->udev);
  601. usb_anchor_urb(urb, &data->bulk_anchor);
  602. err = usb_submit_urb(urb, mem_flags);
  603. if (err < 0) {
  604. if (err != -EPERM && err != -ENODEV)
  605. BT_ERR("%s urb %p submission failed (%d)",
  606. hdev->name, urb, -err);
  607. usb_unanchor_urb(urb);
  608. }
  609. usb_free_urb(urb);
  610. return err;
  611. }
  612. static void btusb_isoc_complete(struct urb *urb)
  613. {
  614. struct hci_dev *hdev = urb->context;
  615. struct btusb_data *data = hci_get_drvdata(hdev);
  616. int i, err;
  617. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  618. urb->actual_length);
  619. if (!test_bit(HCI_RUNNING, &hdev->flags))
  620. return;
  621. if (urb->status == 0) {
  622. for (i = 0; i < urb->number_of_packets; i++) {
  623. unsigned int offset = urb->iso_frame_desc[i].offset;
  624. unsigned int length = urb->iso_frame_desc[i].actual_length;
  625. if (urb->iso_frame_desc[i].status)
  626. continue;
  627. hdev->stat.byte_rx += length;
  628. if (btusb_recv_isoc(data, urb->transfer_buffer + offset,
  629. length) < 0) {
  630. BT_ERR("%s corrupted SCO packet", hdev->name);
  631. hdev->stat.err_rx++;
  632. }
  633. }
  634. } else if (urb->status == -ENOENT) {
  635. /* Avoid suspend failed when usb_kill_urb */
  636. return;
  637. }
  638. if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags))
  639. return;
  640. usb_anchor_urb(urb, &data->isoc_anchor);
  641. err = usb_submit_urb(urb, GFP_ATOMIC);
  642. if (err < 0) {
  643. /* -EPERM: urb is being killed;
  644. * -ENODEV: device got disconnected */
  645. if (err != -EPERM && err != -ENODEV)
  646. BT_ERR("%s urb %p failed to resubmit (%d)",
  647. hdev->name, urb, -err);
  648. usb_unanchor_urb(urb);
  649. }
  650. }
  651. static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu)
  652. {
  653. int i, offset = 0;
  654. BT_DBG("len %d mtu %d", len, mtu);
  655. for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu;
  656. i++, offset += mtu, len -= mtu) {
  657. urb->iso_frame_desc[i].offset = offset;
  658. urb->iso_frame_desc[i].length = mtu;
  659. }
  660. if (len && i < BTUSB_MAX_ISOC_FRAMES) {
  661. urb->iso_frame_desc[i].offset = offset;
  662. urb->iso_frame_desc[i].length = len;
  663. i++;
  664. }
  665. urb->number_of_packets = i;
  666. }
  667. static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags)
  668. {
  669. struct btusb_data *data = hci_get_drvdata(hdev);
  670. struct urb *urb;
  671. unsigned char *buf;
  672. unsigned int pipe;
  673. int err, size;
  674. BT_DBG("%s", hdev->name);
  675. if (!data->isoc_rx_ep)
  676. return -ENODEV;
  677. urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags);
  678. if (!urb)
  679. return -ENOMEM;
  680. size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) *
  681. BTUSB_MAX_ISOC_FRAMES;
  682. buf = kmalloc(size, mem_flags);
  683. if (!buf) {
  684. usb_free_urb(urb);
  685. return -ENOMEM;
  686. }
  687. pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress);
  688. usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete,
  689. hdev, data->isoc_rx_ep->bInterval);
  690. urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP;
  691. __fill_isoc_descriptor(urb, size,
  692. le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize));
  693. usb_anchor_urb(urb, &data->isoc_anchor);
  694. err = usb_submit_urb(urb, mem_flags);
  695. if (err < 0) {
  696. if (err != -EPERM && err != -ENODEV)
  697. BT_ERR("%s urb %p submission failed (%d)",
  698. hdev->name, urb, -err);
  699. usb_unanchor_urb(urb);
  700. }
  701. usb_free_urb(urb);
  702. return err;
  703. }
  704. static void btusb_diag_complete(struct urb *urb)
  705. {
  706. struct hci_dev *hdev = urb->context;
  707. struct btusb_data *data = hci_get_drvdata(hdev);
  708. int err;
  709. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  710. urb->actual_length);
  711. if (urb->status == 0) {
  712. struct sk_buff *skb;
  713. skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC);
  714. if (skb) {
  715. memcpy(skb_put(skb, urb->actual_length),
  716. urb->transfer_buffer, urb->actual_length);
  717. hci_recv_diag(hdev, skb);
  718. }
  719. } else if (urb->status == -ENOENT) {
  720. /* Avoid suspend failed when usb_kill_urb */
  721. return;
  722. }
  723. if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags))
  724. return;
  725. usb_anchor_urb(urb, &data->diag_anchor);
  726. usb_mark_last_busy(data->udev);
  727. err = usb_submit_urb(urb, GFP_ATOMIC);
  728. if (err < 0) {
  729. /* -EPERM: urb is being killed;
  730. * -ENODEV: device got disconnected */
  731. if (err != -EPERM && err != -ENODEV)
  732. BT_ERR("%s urb %p failed to resubmit (%d)",
  733. hdev->name, urb, -err);
  734. usb_unanchor_urb(urb);
  735. }
  736. }
  737. static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags)
  738. {
  739. struct btusb_data *data = hci_get_drvdata(hdev);
  740. struct urb *urb;
  741. unsigned char *buf;
  742. unsigned int pipe;
  743. int err, size = HCI_MAX_FRAME_SIZE;
  744. BT_DBG("%s", hdev->name);
  745. if (!data->diag_rx_ep)
  746. return -ENODEV;
  747. urb = usb_alloc_urb(0, mem_flags);
  748. if (!urb)
  749. return -ENOMEM;
  750. buf = kmalloc(size, mem_flags);
  751. if (!buf) {
  752. usb_free_urb(urb);
  753. return -ENOMEM;
  754. }
  755. pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress);
  756. usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
  757. btusb_diag_complete, hdev);
  758. urb->transfer_flags |= URB_FREE_BUFFER;
  759. usb_mark_last_busy(data->udev);
  760. usb_anchor_urb(urb, &data->diag_anchor);
  761. err = usb_submit_urb(urb, mem_flags);
  762. if (err < 0) {
  763. if (err != -EPERM && err != -ENODEV)
  764. BT_ERR("%s urb %p submission failed (%d)",
  765. hdev->name, urb, -err);
  766. usb_unanchor_urb(urb);
  767. }
  768. usb_free_urb(urb);
  769. return err;
  770. }
  771. static void btusb_tx_complete(struct urb *urb)
  772. {
  773. struct sk_buff *skb = urb->context;
  774. struct hci_dev *hdev = (struct hci_dev *)skb->dev;
  775. struct btusb_data *data = hci_get_drvdata(hdev);
  776. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  777. urb->actual_length);
  778. if (!test_bit(HCI_RUNNING, &hdev->flags))
  779. goto done;
  780. if (!urb->status)
  781. hdev->stat.byte_tx += urb->transfer_buffer_length;
  782. else
  783. hdev->stat.err_tx++;
  784. done:
  785. spin_lock(&data->txlock);
  786. data->tx_in_flight--;
  787. spin_unlock(&data->txlock);
  788. kfree(urb->setup_packet);
  789. kfree_skb(skb);
  790. }
  791. static void btusb_isoc_tx_complete(struct urb *urb)
  792. {
  793. struct sk_buff *skb = urb->context;
  794. struct hci_dev *hdev = (struct hci_dev *)skb->dev;
  795. BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
  796. urb->actual_length);
  797. if (!test_bit(HCI_RUNNING, &hdev->flags))
  798. goto done;
  799. if (!urb->status)
  800. hdev->stat.byte_tx += urb->transfer_buffer_length;
  801. else
  802. hdev->stat.err_tx++;
  803. done:
  804. kfree(urb->setup_packet);
  805. kfree_skb(skb);
  806. }
  807. static int btusb_open(struct hci_dev *hdev)
  808. {
  809. struct btusb_data *data = hci_get_drvdata(hdev);
  810. int err;
  811. BT_DBG("%s", hdev->name);
  812. err = usb_autopm_get_interface(data->intf);
  813. if (err < 0)
  814. return err;
  815. /* Patching USB firmware files prior to starting any URBs of HCI path
  816. * It is more safe to use USB bulk channel for downloading USB patch
  817. */
  818. if (data->setup_on_usb) {
  819. err = data->setup_on_usb(hdev);
  820. if (err < 0)
  821. return err;
  822. }
  823. data->intf->needs_remote_wakeup = 1;
  824. if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
  825. goto done;
  826. err = btusb_submit_intr_urb(hdev, GFP_KERNEL);
  827. if (err < 0)
  828. goto failed;
  829. err = btusb_submit_bulk_urb(hdev, GFP_KERNEL);
  830. if (err < 0) {
  831. usb_kill_anchored_urbs(&data->intr_anchor);
  832. goto failed;
  833. }
  834. set_bit(BTUSB_BULK_RUNNING, &data->flags);
  835. btusb_submit_bulk_urb(hdev, GFP_KERNEL);
  836. if (data->diag) {
  837. if (!btusb_submit_diag_urb(hdev, GFP_KERNEL))
  838. set_bit(BTUSB_DIAG_RUNNING, &data->flags);
  839. }
  840. done:
  841. usb_autopm_put_interface(data->intf);
  842. return 0;
  843. failed:
  844. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  845. usb_autopm_put_interface(data->intf);
  846. return err;
  847. }
  848. static void btusb_stop_traffic(struct btusb_data *data)
  849. {
  850. usb_kill_anchored_urbs(&data->intr_anchor);
  851. usb_kill_anchored_urbs(&data->bulk_anchor);
  852. usb_kill_anchored_urbs(&data->isoc_anchor);
  853. usb_kill_anchored_urbs(&data->diag_anchor);
  854. }
  855. static int btusb_close(struct hci_dev *hdev)
  856. {
  857. struct btusb_data *data = hci_get_drvdata(hdev);
  858. int err;
  859. BT_DBG("%s", hdev->name);
  860. cancel_work_sync(&data->work);
  861. cancel_work_sync(&data->waker);
  862. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  863. clear_bit(BTUSB_BULK_RUNNING, &data->flags);
  864. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  865. clear_bit(BTUSB_DIAG_RUNNING, &data->flags);
  866. btusb_stop_traffic(data);
  867. btusb_free_frags(data);
  868. err = usb_autopm_get_interface(data->intf);
  869. if (err < 0)
  870. goto failed;
  871. data->intf->needs_remote_wakeup = 0;
  872. usb_autopm_put_interface(data->intf);
  873. failed:
  874. usb_scuttle_anchored_urbs(&data->deferred);
  875. return 0;
  876. }
  877. static int btusb_flush(struct hci_dev *hdev)
  878. {
  879. struct btusb_data *data = hci_get_drvdata(hdev);
  880. BT_DBG("%s", hdev->name);
  881. usb_kill_anchored_urbs(&data->tx_anchor);
  882. btusb_free_frags(data);
  883. return 0;
  884. }
  885. static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb)
  886. {
  887. struct btusb_data *data = hci_get_drvdata(hdev);
  888. struct usb_ctrlrequest *dr;
  889. struct urb *urb;
  890. unsigned int pipe;
  891. urb = usb_alloc_urb(0, GFP_KERNEL);
  892. if (!urb)
  893. return ERR_PTR(-ENOMEM);
  894. dr = kmalloc(sizeof(*dr), GFP_KERNEL);
  895. if (!dr) {
  896. usb_free_urb(urb);
  897. return ERR_PTR(-ENOMEM);
  898. }
  899. dr->bRequestType = data->cmdreq_type;
  900. dr->bRequest = data->cmdreq;
  901. dr->wIndex = 0;
  902. dr->wValue = 0;
  903. dr->wLength = __cpu_to_le16(skb->len);
  904. pipe = usb_sndctrlpipe(data->udev, 0x00);
  905. usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
  906. skb->data, skb->len, btusb_tx_complete, skb);
  907. skb->dev = (void *)hdev;
  908. return urb;
  909. }
  910. static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb)
  911. {
  912. struct btusb_data *data = hci_get_drvdata(hdev);
  913. struct urb *urb;
  914. unsigned int pipe;
  915. if (!data->bulk_tx_ep)
  916. return ERR_PTR(-ENODEV);
  917. urb = usb_alloc_urb(0, GFP_KERNEL);
  918. if (!urb)
  919. return ERR_PTR(-ENOMEM);
  920. pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress);
  921. usb_fill_bulk_urb(urb, data->udev, pipe,
  922. skb->data, skb->len, btusb_tx_complete, skb);
  923. skb->dev = (void *)hdev;
  924. return urb;
  925. }
  926. static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb)
  927. {
  928. struct btusb_data *data = hci_get_drvdata(hdev);
  929. struct urb *urb;
  930. unsigned int pipe;
  931. if (!data->isoc_tx_ep)
  932. return ERR_PTR(-ENODEV);
  933. urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL);
  934. if (!urb)
  935. return ERR_PTR(-ENOMEM);
  936. pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress);
  937. usb_fill_int_urb(urb, data->udev, pipe,
  938. skb->data, skb->len, btusb_isoc_tx_complete,
  939. skb, data->isoc_tx_ep->bInterval);
  940. urb->transfer_flags = URB_ISO_ASAP;
  941. __fill_isoc_descriptor(urb, skb->len,
  942. le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize));
  943. skb->dev = (void *)hdev;
  944. return urb;
  945. }
  946. static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb)
  947. {
  948. struct btusb_data *data = hci_get_drvdata(hdev);
  949. int err;
  950. usb_anchor_urb(urb, &data->tx_anchor);
  951. err = usb_submit_urb(urb, GFP_KERNEL);
  952. if (err < 0) {
  953. if (err != -EPERM && err != -ENODEV)
  954. BT_ERR("%s urb %p submission failed (%d)",
  955. hdev->name, urb, -err);
  956. kfree(urb->setup_packet);
  957. usb_unanchor_urb(urb);
  958. } else {
  959. usb_mark_last_busy(data->udev);
  960. }
  961. usb_free_urb(urb);
  962. return err;
  963. }
  964. static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb)
  965. {
  966. struct btusb_data *data = hci_get_drvdata(hdev);
  967. unsigned long flags;
  968. bool suspending;
  969. spin_lock_irqsave(&data->txlock, flags);
  970. suspending = test_bit(BTUSB_SUSPENDING, &data->flags);
  971. if (!suspending)
  972. data->tx_in_flight++;
  973. spin_unlock_irqrestore(&data->txlock, flags);
  974. if (!suspending)
  975. return submit_tx_urb(hdev, urb);
  976. usb_anchor_urb(urb, &data->deferred);
  977. schedule_work(&data->waker);
  978. usb_free_urb(urb);
  979. return 0;
  980. }
  981. static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
  982. {
  983. struct urb *urb;
  984. BT_DBG("%s", hdev->name);
  985. switch (hci_skb_pkt_type(skb)) {
  986. case HCI_COMMAND_PKT:
  987. urb = alloc_ctrl_urb(hdev, skb);
  988. if (IS_ERR(urb))
  989. return PTR_ERR(urb);
  990. hdev->stat.cmd_tx++;
  991. return submit_or_queue_tx_urb(hdev, urb);
  992. case HCI_ACLDATA_PKT:
  993. urb = alloc_bulk_urb(hdev, skb);
  994. if (IS_ERR(urb))
  995. return PTR_ERR(urb);
  996. hdev->stat.acl_tx++;
  997. return submit_or_queue_tx_urb(hdev, urb);
  998. case HCI_SCODATA_PKT:
  999. if (hci_conn_num(hdev, SCO_LINK) < 1)
  1000. return -ENODEV;
  1001. urb = alloc_isoc_urb(hdev, skb);
  1002. if (IS_ERR(urb))
  1003. return PTR_ERR(urb);
  1004. hdev->stat.sco_tx++;
  1005. return submit_tx_urb(hdev, urb);
  1006. }
  1007. return -EILSEQ;
  1008. }
  1009. static void btusb_notify(struct hci_dev *hdev, unsigned int evt)
  1010. {
  1011. struct btusb_data *data = hci_get_drvdata(hdev);
  1012. BT_DBG("%s evt %d", hdev->name, evt);
  1013. if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) {
  1014. data->sco_num = hci_conn_num(hdev, SCO_LINK);
  1015. schedule_work(&data->work);
  1016. }
  1017. }
  1018. static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting)
  1019. {
  1020. struct btusb_data *data = hci_get_drvdata(hdev);
  1021. struct usb_interface *intf = data->isoc;
  1022. struct usb_endpoint_descriptor *ep_desc;
  1023. int i, err;
  1024. if (!data->isoc)
  1025. return -ENODEV;
  1026. err = usb_set_interface(data->udev, 1, altsetting);
  1027. if (err < 0) {
  1028. BT_ERR("%s setting interface failed (%d)", hdev->name, -err);
  1029. return err;
  1030. }
  1031. data->isoc_altsetting = altsetting;
  1032. data->isoc_tx_ep = NULL;
  1033. data->isoc_rx_ep = NULL;
  1034. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  1035. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  1036. if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) {
  1037. data->isoc_tx_ep = ep_desc;
  1038. continue;
  1039. }
  1040. if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) {
  1041. data->isoc_rx_ep = ep_desc;
  1042. continue;
  1043. }
  1044. }
  1045. if (!data->isoc_tx_ep || !data->isoc_rx_ep) {
  1046. BT_ERR("%s invalid SCO descriptors", hdev->name);
  1047. return -ENODEV;
  1048. }
  1049. return 0;
  1050. }
  1051. static void btusb_work(struct work_struct *work)
  1052. {
  1053. struct btusb_data *data = container_of(work, struct btusb_data, work);
  1054. struct hci_dev *hdev = data->hdev;
  1055. int new_alts;
  1056. int err;
  1057. if (data->sco_num > 0) {
  1058. if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) {
  1059. err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf);
  1060. if (err < 0) {
  1061. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1062. usb_kill_anchored_urbs(&data->isoc_anchor);
  1063. return;
  1064. }
  1065. set_bit(BTUSB_DID_ISO_RESUME, &data->flags);
  1066. }
  1067. if (hdev->voice_setting & 0x0020) {
  1068. static const int alts[3] = { 2, 4, 5 };
  1069. new_alts = alts[data->sco_num - 1];
  1070. } else {
  1071. new_alts = data->sco_num;
  1072. }
  1073. if (data->isoc_altsetting != new_alts) {
  1074. unsigned long flags;
  1075. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1076. usb_kill_anchored_urbs(&data->isoc_anchor);
  1077. /* When isochronous alternate setting needs to be
  1078. * changed, because SCO connection has been added
  1079. * or removed, a packet fragment may be left in the
  1080. * reassembling state. This could lead to wrongly
  1081. * assembled fragments.
  1082. *
  1083. * Clear outstanding fragment when selecting a new
  1084. * alternate setting.
  1085. */
  1086. spin_lock_irqsave(&data->rxlock, flags);
  1087. kfree_skb(data->sco_skb);
  1088. data->sco_skb = NULL;
  1089. spin_unlock_irqrestore(&data->rxlock, flags);
  1090. if (__set_isoc_interface(hdev, new_alts) < 0)
  1091. return;
  1092. }
  1093. if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
  1094. if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0)
  1095. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1096. else
  1097. btusb_submit_isoc_urb(hdev, GFP_KERNEL);
  1098. }
  1099. } else {
  1100. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  1101. usb_kill_anchored_urbs(&data->isoc_anchor);
  1102. __set_isoc_interface(hdev, 0);
  1103. if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags))
  1104. usb_autopm_put_interface(data->isoc ? data->isoc : data->intf);
  1105. }
  1106. }
  1107. static void btusb_waker(struct work_struct *work)
  1108. {
  1109. struct btusb_data *data = container_of(work, struct btusb_data, waker);
  1110. int err;
  1111. err = usb_autopm_get_interface(data->intf);
  1112. if (err < 0)
  1113. return;
  1114. usb_autopm_put_interface(data->intf);
  1115. }
  1116. static int btusb_setup_bcm92035(struct hci_dev *hdev)
  1117. {
  1118. struct sk_buff *skb;
  1119. u8 val = 0x00;
  1120. BT_DBG("%s", hdev->name);
  1121. skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT);
  1122. if (IS_ERR(skb))
  1123. BT_ERR("BCM92035 command failed (%ld)", -PTR_ERR(skb));
  1124. else
  1125. kfree_skb(skb);
  1126. return 0;
  1127. }
  1128. static int btusb_setup_csr(struct hci_dev *hdev)
  1129. {
  1130. struct hci_rp_read_local_version *rp;
  1131. struct sk_buff *skb;
  1132. BT_DBG("%s", hdev->name);
  1133. skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
  1134. HCI_INIT_TIMEOUT);
  1135. if (IS_ERR(skb)) {
  1136. int err = PTR_ERR(skb);
  1137. BT_ERR("%s: CSR: Local version failed (%d)", hdev->name, err);
  1138. return err;
  1139. }
  1140. if (skb->len != sizeof(struct hci_rp_read_local_version)) {
  1141. BT_ERR("%s: CSR: Local version length mismatch", hdev->name);
  1142. kfree_skb(skb);
  1143. return -EIO;
  1144. }
  1145. rp = (struct hci_rp_read_local_version *)skb->data;
  1146. /* Detect controllers which aren't real CSR ones. */
  1147. if (le16_to_cpu(rp->manufacturer) != 10 ||
  1148. le16_to_cpu(rp->lmp_subver) == 0x0c5c) {
  1149. /* Clear the reset quirk since this is not an actual
  1150. * early Bluetooth 1.1 device from CSR.
  1151. */
  1152. clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  1153. /* These fake CSR controllers have all a broken
  1154. * stored link key handling and so just disable it.
  1155. */
  1156. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  1157. }
  1158. kfree_skb(skb);
  1159. return 0;
  1160. }
  1161. static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev,
  1162. struct intel_version *ver)
  1163. {
  1164. const struct firmware *fw;
  1165. char fwname[64];
  1166. int ret;
  1167. snprintf(fwname, sizeof(fwname),
  1168. "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
  1169. ver->hw_platform, ver->hw_variant, ver->hw_revision,
  1170. ver->fw_variant, ver->fw_revision, ver->fw_build_num,
  1171. ver->fw_build_ww, ver->fw_build_yy);
  1172. ret = request_firmware(&fw, fwname, &hdev->dev);
  1173. if (ret < 0) {
  1174. if (ret == -EINVAL) {
  1175. BT_ERR("%s Intel firmware file request failed (%d)",
  1176. hdev->name, ret);
  1177. return NULL;
  1178. }
  1179. BT_ERR("%s failed to open Intel firmware file: %s(%d)",
  1180. hdev->name, fwname, ret);
  1181. /* If the correct firmware patch file is not found, use the
  1182. * default firmware patch file instead
  1183. */
  1184. snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq",
  1185. ver->hw_platform, ver->hw_variant);
  1186. if (request_firmware(&fw, fwname, &hdev->dev) < 0) {
  1187. BT_ERR("%s failed to open default Intel fw file: %s",
  1188. hdev->name, fwname);
  1189. return NULL;
  1190. }
  1191. }
  1192. BT_INFO("%s: Intel Bluetooth firmware file: %s", hdev->name, fwname);
  1193. return fw;
  1194. }
  1195. static int btusb_setup_intel_patching(struct hci_dev *hdev,
  1196. const struct firmware *fw,
  1197. const u8 **fw_ptr, int *disable_patch)
  1198. {
  1199. struct sk_buff *skb;
  1200. struct hci_command_hdr *cmd;
  1201. const u8 *cmd_param;
  1202. struct hci_event_hdr *evt = NULL;
  1203. const u8 *evt_param = NULL;
  1204. int remain = fw->size - (*fw_ptr - fw->data);
  1205. /* The first byte indicates the types of the patch command or event.
  1206. * 0x01 means HCI command and 0x02 is HCI event. If the first bytes
  1207. * in the current firmware buffer doesn't start with 0x01 or
  1208. * the size of remain buffer is smaller than HCI command header,
  1209. * the firmware file is corrupted and it should stop the patching
  1210. * process.
  1211. */
  1212. if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) {
  1213. BT_ERR("%s Intel fw corrupted: invalid cmd read", hdev->name);
  1214. return -EINVAL;
  1215. }
  1216. (*fw_ptr)++;
  1217. remain--;
  1218. cmd = (struct hci_command_hdr *)(*fw_ptr);
  1219. *fw_ptr += sizeof(*cmd);
  1220. remain -= sizeof(*cmd);
  1221. /* Ensure that the remain firmware data is long enough than the length
  1222. * of command parameter. If not, the firmware file is corrupted.
  1223. */
  1224. if (remain < cmd->plen) {
  1225. BT_ERR("%s Intel fw corrupted: invalid cmd len", hdev->name);
  1226. return -EFAULT;
  1227. }
  1228. /* If there is a command that loads a patch in the firmware
  1229. * file, then enable the patch upon success, otherwise just
  1230. * disable the manufacturer mode, for example patch activation
  1231. * is not required when the default firmware patch file is used
  1232. * because there are no patch data to load.
  1233. */
  1234. if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e)
  1235. *disable_patch = 0;
  1236. cmd_param = *fw_ptr;
  1237. *fw_ptr += cmd->plen;
  1238. remain -= cmd->plen;
  1239. /* This reads the expected events when the above command is sent to the
  1240. * device. Some vendor commands expects more than one events, for
  1241. * example command status event followed by vendor specific event.
  1242. * For this case, it only keeps the last expected event. so the command
  1243. * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
  1244. * last expected event.
  1245. */
  1246. while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) {
  1247. (*fw_ptr)++;
  1248. remain--;
  1249. evt = (struct hci_event_hdr *)(*fw_ptr);
  1250. *fw_ptr += sizeof(*evt);
  1251. remain -= sizeof(*evt);
  1252. if (remain < evt->plen) {
  1253. BT_ERR("%s Intel fw corrupted: invalid evt len",
  1254. hdev->name);
  1255. return -EFAULT;
  1256. }
  1257. evt_param = *fw_ptr;
  1258. *fw_ptr += evt->plen;
  1259. remain -= evt->plen;
  1260. }
  1261. /* Every HCI commands in the firmware file has its correspond event.
  1262. * If event is not found or remain is smaller than zero, the firmware
  1263. * file is corrupted.
  1264. */
  1265. if (!evt || !evt_param || remain < 0) {
  1266. BT_ERR("%s Intel fw corrupted: invalid evt read", hdev->name);
  1267. return -EFAULT;
  1268. }
  1269. skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen,
  1270. cmd_param, evt->evt, HCI_INIT_TIMEOUT);
  1271. if (IS_ERR(skb)) {
  1272. BT_ERR("%s sending Intel patch command (0x%4.4x) failed (%ld)",
  1273. hdev->name, cmd->opcode, PTR_ERR(skb));
  1274. return PTR_ERR(skb);
  1275. }
  1276. /* It ensures that the returned event matches the event data read from
  1277. * the firmware file. At fist, it checks the length and then
  1278. * the contents of the event.
  1279. */
  1280. if (skb->len != evt->plen) {
  1281. BT_ERR("%s mismatch event length (opcode 0x%4.4x)", hdev->name,
  1282. le16_to_cpu(cmd->opcode));
  1283. kfree_skb(skb);
  1284. return -EFAULT;
  1285. }
  1286. if (memcmp(skb->data, evt_param, evt->plen)) {
  1287. BT_ERR("%s mismatch event parameter (opcode 0x%4.4x)",
  1288. hdev->name, le16_to_cpu(cmd->opcode));
  1289. kfree_skb(skb);
  1290. return -EFAULT;
  1291. }
  1292. kfree_skb(skb);
  1293. return 0;
  1294. }
  1295. static int btusb_setup_intel(struct hci_dev *hdev)
  1296. {
  1297. struct sk_buff *skb;
  1298. const struct firmware *fw;
  1299. const u8 *fw_ptr;
  1300. int disable_patch, err;
  1301. struct intel_version ver;
  1302. BT_DBG("%s", hdev->name);
  1303. /* The controller has a bug with the first HCI command sent to it
  1304. * returning number of completed commands as zero. This would stall the
  1305. * command processing in the Bluetooth core.
  1306. *
  1307. * As a workaround, send HCI Reset command first which will reset the
  1308. * number of completed commands and allow normal command processing
  1309. * from now on.
  1310. */
  1311. skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
  1312. if (IS_ERR(skb)) {
  1313. BT_ERR("%s sending initial HCI reset command failed (%ld)",
  1314. hdev->name, PTR_ERR(skb));
  1315. return PTR_ERR(skb);
  1316. }
  1317. kfree_skb(skb);
  1318. /* Read Intel specific controller version first to allow selection of
  1319. * which firmware file to load.
  1320. *
  1321. * The returned information are hardware variant and revision plus
  1322. * firmware variant, revision and build number.
  1323. */
  1324. err = btintel_read_version(hdev, &ver);
  1325. if (err)
  1326. return err;
  1327. BT_INFO("%s: read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
  1328. hdev->name, ver.hw_platform, ver.hw_variant, ver.hw_revision,
  1329. ver.fw_variant, ver.fw_revision, ver.fw_build_num,
  1330. ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num);
  1331. /* fw_patch_num indicates the version of patch the device currently
  1332. * have. If there is no patch data in the device, it is always 0x00.
  1333. * So, if it is other than 0x00, no need to patch the device again.
  1334. */
  1335. if (ver.fw_patch_num) {
  1336. BT_INFO("%s: Intel device is already patched. patch num: %02x",
  1337. hdev->name, ver.fw_patch_num);
  1338. goto complete;
  1339. }
  1340. /* Opens the firmware patch file based on the firmware version read
  1341. * from the controller. If it fails to open the matching firmware
  1342. * patch file, it tries to open the default firmware patch file.
  1343. * If no patch file is found, allow the device to operate without
  1344. * a patch.
  1345. */
  1346. fw = btusb_setup_intel_get_fw(hdev, &ver);
  1347. if (!fw)
  1348. goto complete;
  1349. fw_ptr = fw->data;
  1350. /* Enable the manufacturer mode of the controller.
  1351. * Only while this mode is enabled, the driver can download the
  1352. * firmware patch data and configuration parameters.
  1353. */
  1354. err = btintel_enter_mfg(hdev);
  1355. if (err) {
  1356. release_firmware(fw);
  1357. return err;
  1358. }
  1359. disable_patch = 1;
  1360. /* The firmware data file consists of list of Intel specific HCI
  1361. * commands and its expected events. The first byte indicates the
  1362. * type of the message, either HCI command or HCI event.
  1363. *
  1364. * It reads the command and its expected event from the firmware file,
  1365. * and send to the controller. Once __hci_cmd_sync_ev() returns,
  1366. * the returned event is compared with the event read from the firmware
  1367. * file and it will continue until all the messages are downloaded to
  1368. * the controller.
  1369. *
  1370. * Once the firmware patching is completed successfully,
  1371. * the manufacturer mode is disabled with reset and activating the
  1372. * downloaded patch.
  1373. *
  1374. * If the firmware patching fails, the manufacturer mode is
  1375. * disabled with reset and deactivating the patch.
  1376. *
  1377. * If the default patch file is used, no reset is done when disabling
  1378. * the manufacturer.
  1379. */
  1380. while (fw->size > fw_ptr - fw->data) {
  1381. int ret;
  1382. ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr,
  1383. &disable_patch);
  1384. if (ret < 0)
  1385. goto exit_mfg_deactivate;
  1386. }
  1387. release_firmware(fw);
  1388. if (disable_patch)
  1389. goto exit_mfg_disable;
  1390. /* Patching completed successfully and disable the manufacturer mode
  1391. * with reset and activate the downloaded firmware patches.
  1392. */
  1393. err = btintel_exit_mfg(hdev, true, true);
  1394. if (err)
  1395. return err;
  1396. BT_INFO("%s: Intel Bluetooth firmware patch completed and activated",
  1397. hdev->name);
  1398. goto complete;
  1399. exit_mfg_disable:
  1400. /* Disable the manufacturer mode without reset */
  1401. err = btintel_exit_mfg(hdev, false, false);
  1402. if (err)
  1403. return err;
  1404. BT_INFO("%s: Intel Bluetooth firmware patch completed", hdev->name);
  1405. goto complete;
  1406. exit_mfg_deactivate:
  1407. release_firmware(fw);
  1408. /* Patching failed. Disable the manufacturer mode with reset and
  1409. * deactivate the downloaded firmware patches.
  1410. */
  1411. err = btintel_exit_mfg(hdev, true, false);
  1412. if (err)
  1413. return err;
  1414. BT_INFO("%s: Intel Bluetooth firmware patch completed and deactivated",
  1415. hdev->name);
  1416. complete:
  1417. /* Set the event mask for Intel specific vendor events. This enables
  1418. * a few extra events that are useful during general operation.
  1419. */
  1420. btintel_set_event_mask_mfg(hdev, false);
  1421. btintel_check_bdaddr(hdev);
  1422. return 0;
  1423. }
  1424. static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode)
  1425. {
  1426. struct sk_buff *skb;
  1427. struct hci_event_hdr *hdr;
  1428. struct hci_ev_cmd_complete *evt;
  1429. skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_ATOMIC);
  1430. if (!skb)
  1431. return -ENOMEM;
  1432. hdr = (struct hci_event_hdr *)skb_put(skb, sizeof(*hdr));
  1433. hdr->evt = HCI_EV_CMD_COMPLETE;
  1434. hdr->plen = sizeof(*evt) + 1;
  1435. evt = (struct hci_ev_cmd_complete *)skb_put(skb, sizeof(*evt));
  1436. evt->ncmd = 0x01;
  1437. evt->opcode = cpu_to_le16(opcode);
  1438. *skb_put(skb, 1) = 0x00;
  1439. hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
  1440. return hci_recv_frame(hdev, skb);
  1441. }
  1442. static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer,
  1443. int count)
  1444. {
  1445. /* When the device is in bootloader mode, then it can send
  1446. * events via the bulk endpoint. These events are treated the
  1447. * same way as the ones received from the interrupt endpoint.
  1448. */
  1449. if (test_bit(BTUSB_BOOTLOADER, &data->flags))
  1450. return btusb_recv_intr(data, buffer, count);
  1451. return btusb_recv_bulk(data, buffer, count);
  1452. }
  1453. static void btusb_intel_bootup(struct btusb_data *data, const void *ptr,
  1454. unsigned int len)
  1455. {
  1456. const struct intel_bootup *evt = ptr;
  1457. if (len != sizeof(*evt))
  1458. return;
  1459. if (test_and_clear_bit(BTUSB_BOOTING, &data->flags)) {
  1460. smp_mb__after_atomic();
  1461. wake_up_bit(&data->flags, BTUSB_BOOTING);
  1462. }
  1463. }
  1464. static void btusb_intel_secure_send_result(struct btusb_data *data,
  1465. const void *ptr, unsigned int len)
  1466. {
  1467. const struct intel_secure_send_result *evt = ptr;
  1468. if (len != sizeof(*evt))
  1469. return;
  1470. if (evt->result)
  1471. set_bit(BTUSB_FIRMWARE_FAILED, &data->flags);
  1472. if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) &&
  1473. test_bit(BTUSB_FIRMWARE_LOADED, &data->flags)) {
  1474. smp_mb__after_atomic();
  1475. wake_up_bit(&data->flags, BTUSB_DOWNLOADING);
  1476. }
  1477. }
  1478. static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb)
  1479. {
  1480. struct btusb_data *data = hci_get_drvdata(hdev);
  1481. if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
  1482. struct hci_event_hdr *hdr = (void *)skb->data;
  1483. if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff &&
  1484. hdr->plen > 0) {
  1485. const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1;
  1486. unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1;
  1487. switch (skb->data[2]) {
  1488. case 0x02:
  1489. /* When switching to the operational firmware
  1490. * the device sends a vendor specific event
  1491. * indicating that the bootup completed.
  1492. */
  1493. btusb_intel_bootup(data, ptr, len);
  1494. break;
  1495. case 0x06:
  1496. /* When the firmware loading completes the
  1497. * device sends out a vendor specific event
  1498. * indicating the result of the firmware
  1499. * loading.
  1500. */
  1501. btusb_intel_secure_send_result(data, ptr, len);
  1502. break;
  1503. }
  1504. }
  1505. }
  1506. return hci_recv_frame(hdev, skb);
  1507. }
  1508. static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb)
  1509. {
  1510. struct btusb_data *data = hci_get_drvdata(hdev);
  1511. struct urb *urb;
  1512. BT_DBG("%s", hdev->name);
  1513. switch (hci_skb_pkt_type(skb)) {
  1514. case HCI_COMMAND_PKT:
  1515. if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
  1516. struct hci_command_hdr *cmd = (void *)skb->data;
  1517. __u16 opcode = le16_to_cpu(cmd->opcode);
  1518. /* When in bootloader mode and the command 0xfc09
  1519. * is received, it needs to be send down the
  1520. * bulk endpoint. So allocate a bulk URB instead.
  1521. */
  1522. if (opcode == 0xfc09)
  1523. urb = alloc_bulk_urb(hdev, skb);
  1524. else
  1525. urb = alloc_ctrl_urb(hdev, skb);
  1526. /* When the 0xfc01 command is issued to boot into
  1527. * the operational firmware, it will actually not
  1528. * send a command complete event. To keep the flow
  1529. * control working inject that event here.
  1530. */
  1531. if (opcode == 0xfc01)
  1532. inject_cmd_complete(hdev, opcode);
  1533. } else {
  1534. urb = alloc_ctrl_urb(hdev, skb);
  1535. }
  1536. if (IS_ERR(urb))
  1537. return PTR_ERR(urb);
  1538. hdev->stat.cmd_tx++;
  1539. return submit_or_queue_tx_urb(hdev, urb);
  1540. case HCI_ACLDATA_PKT:
  1541. urb = alloc_bulk_urb(hdev, skb);
  1542. if (IS_ERR(urb))
  1543. return PTR_ERR(urb);
  1544. hdev->stat.acl_tx++;
  1545. return submit_or_queue_tx_urb(hdev, urb);
  1546. case HCI_SCODATA_PKT:
  1547. if (hci_conn_num(hdev, SCO_LINK) < 1)
  1548. return -ENODEV;
  1549. urb = alloc_isoc_urb(hdev, skb);
  1550. if (IS_ERR(urb))
  1551. return PTR_ERR(urb);
  1552. hdev->stat.sco_tx++;
  1553. return submit_tx_urb(hdev, urb);
  1554. }
  1555. return -EILSEQ;
  1556. }
  1557. static int btusb_setup_intel_new(struct hci_dev *hdev)
  1558. {
  1559. static const u8 reset_param[] = { 0x00, 0x01, 0x00, 0x01,
  1560. 0x00, 0x08, 0x04, 0x00 };
  1561. struct btusb_data *data = hci_get_drvdata(hdev);
  1562. struct sk_buff *skb;
  1563. struct intel_version ver;
  1564. struct intel_boot_params *params;
  1565. const struct firmware *fw;
  1566. const u8 *fw_ptr;
  1567. u32 frag_len;
  1568. char fwname[64];
  1569. ktime_t calltime, delta, rettime;
  1570. unsigned long long duration;
  1571. int err;
  1572. BT_DBG("%s", hdev->name);
  1573. calltime = ktime_get();
  1574. /* Read the Intel version information to determine if the device
  1575. * is in bootloader mode or if it already has operational firmware
  1576. * loaded.
  1577. */
  1578. err = btintel_read_version(hdev, &ver);
  1579. if (err)
  1580. return err;
  1581. /* The hardware platform number has a fixed value of 0x37 and
  1582. * for now only accept this single value.
  1583. */
  1584. if (ver.hw_platform != 0x37) {
  1585. BT_ERR("%s: Unsupported Intel hardware platform (%u)",
  1586. hdev->name, ver.hw_platform);
  1587. return -EINVAL;
  1588. }
  1589. /* At the moment the iBT 3.0 hardware variants 0x0b (LnP/SfP)
  1590. * and 0x0c (WsP) are supported by this firmware loading method.
  1591. *
  1592. * This check has been put in place to ensure correct forward
  1593. * compatibility options when newer hardware variants come along.
  1594. */
  1595. if (ver.hw_variant != 0x0b && ver.hw_variant != 0x0c) {
  1596. BT_ERR("%s: Unsupported Intel hardware variant (%u)",
  1597. hdev->name, ver.hw_variant);
  1598. return -EINVAL;
  1599. }
  1600. btintel_version_info(hdev, &ver);
  1601. /* The firmware variant determines if the device is in bootloader
  1602. * mode or is running operational firmware. The value 0x06 identifies
  1603. * the bootloader and the value 0x23 identifies the operational
  1604. * firmware.
  1605. *
  1606. * When the operational firmware is already present, then only
  1607. * the check for valid Bluetooth device address is needed. This
  1608. * determines if the device will be added as configured or
  1609. * unconfigured controller.
  1610. *
  1611. * It is not possible to use the Secure Boot Parameters in this
  1612. * case since that command is only available in bootloader mode.
  1613. */
  1614. if (ver.fw_variant == 0x23) {
  1615. clear_bit(BTUSB_BOOTLOADER, &data->flags);
  1616. btintel_check_bdaddr(hdev);
  1617. return 0;
  1618. }
  1619. /* If the device is not in bootloader mode, then the only possible
  1620. * choice is to return an error and abort the device initialization.
  1621. */
  1622. if (ver.fw_variant != 0x06) {
  1623. BT_ERR("%s: Unsupported Intel firmware variant (%u)",
  1624. hdev->name, ver.fw_variant);
  1625. return -ENODEV;
  1626. }
  1627. /* Read the secure boot parameters to identify the operating
  1628. * details of the bootloader.
  1629. */
  1630. skb = __hci_cmd_sync(hdev, 0xfc0d, 0, NULL, HCI_INIT_TIMEOUT);
  1631. if (IS_ERR(skb)) {
  1632. BT_ERR("%s: Reading Intel boot parameters failed (%ld)",
  1633. hdev->name, PTR_ERR(skb));
  1634. return PTR_ERR(skb);
  1635. }
  1636. if (skb->len != sizeof(*params)) {
  1637. BT_ERR("%s: Intel boot parameters size mismatch", hdev->name);
  1638. kfree_skb(skb);
  1639. return -EILSEQ;
  1640. }
  1641. params = (struct intel_boot_params *)skb->data;
  1642. BT_INFO("%s: Device revision is %u", hdev->name,
  1643. le16_to_cpu(params->dev_revid));
  1644. BT_INFO("%s: Secure boot is %s", hdev->name,
  1645. params->secure_boot ? "enabled" : "disabled");
  1646. BT_INFO("%s: OTP lock is %s", hdev->name,
  1647. params->otp_lock ? "enabled" : "disabled");
  1648. BT_INFO("%s: API lock is %s", hdev->name,
  1649. params->api_lock ? "enabled" : "disabled");
  1650. BT_INFO("%s: Debug lock is %s", hdev->name,
  1651. params->debug_lock ? "enabled" : "disabled");
  1652. BT_INFO("%s: Minimum firmware build %u week %u %u", hdev->name,
  1653. params->min_fw_build_nn, params->min_fw_build_cw,
  1654. 2000 + params->min_fw_build_yy);
  1655. /* It is required that every single firmware fragment is acknowledged
  1656. * with a command complete event. If the boot parameters indicate
  1657. * that this bootloader does not send them, then abort the setup.
  1658. */
  1659. if (params->limited_cce != 0x00) {
  1660. BT_ERR("%s: Unsupported Intel firmware loading method (%u)",
  1661. hdev->name, params->limited_cce);
  1662. kfree_skb(skb);
  1663. return -EINVAL;
  1664. }
  1665. /* If the OTP has no valid Bluetooth device address, then there will
  1666. * also be no valid address for the operational firmware.
  1667. */
  1668. if (!bacmp(&params->otp_bdaddr, BDADDR_ANY)) {
  1669. BT_INFO("%s: No device address configured", hdev->name);
  1670. set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
  1671. }
  1672. /* With this Intel bootloader only the hardware variant and device
  1673. * revision information are used to select the right firmware.
  1674. *
  1675. * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi.
  1676. *
  1677. * Currently the supported hardware variants are:
  1678. * 11 (0x0b) for iBT3.0 (LnP/SfP)
  1679. * 12 (0x0c) for iBT3.5 (WsP)
  1680. */
  1681. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.sfi",
  1682. le16_to_cpu(ver.hw_variant),
  1683. le16_to_cpu(params->dev_revid));
  1684. err = request_firmware(&fw, fwname, &hdev->dev);
  1685. if (err < 0) {
  1686. BT_ERR("%s: Failed to load Intel firmware file (%d)",
  1687. hdev->name, err);
  1688. kfree_skb(skb);
  1689. return err;
  1690. }
  1691. BT_INFO("%s: Found device firmware: %s", hdev->name, fwname);
  1692. /* Save the DDC file name for later use to apply once the firmware
  1693. * downloading is done.
  1694. */
  1695. snprintf(fwname, sizeof(fwname), "intel/ibt-%u-%u.ddc",
  1696. le16_to_cpu(ver.hw_variant),
  1697. le16_to_cpu(params->dev_revid));
  1698. kfree_skb(skb);
  1699. if (fw->size < 644) {
  1700. BT_ERR("%s: Invalid size of firmware file (%zu)",
  1701. hdev->name, fw->size);
  1702. err = -EBADF;
  1703. goto done;
  1704. }
  1705. set_bit(BTUSB_DOWNLOADING, &data->flags);
  1706. /* Start the firmware download transaction with the Init fragment
  1707. * represented by the 128 bytes of CSS header.
  1708. */
  1709. err = btintel_secure_send(hdev, 0x00, 128, fw->data);
  1710. if (err < 0) {
  1711. BT_ERR("%s: Failed to send firmware header (%d)",
  1712. hdev->name, err);
  1713. goto done;
  1714. }
  1715. /* Send the 256 bytes of public key information from the firmware
  1716. * as the PKey fragment.
  1717. */
  1718. err = btintel_secure_send(hdev, 0x03, 256, fw->data + 128);
  1719. if (err < 0) {
  1720. BT_ERR("%s: Failed to send firmware public key (%d)",
  1721. hdev->name, err);
  1722. goto done;
  1723. }
  1724. /* Send the 256 bytes of signature information from the firmware
  1725. * as the Sign fragment.
  1726. */
  1727. err = btintel_secure_send(hdev, 0x02, 256, fw->data + 388);
  1728. if (err < 0) {
  1729. BT_ERR("%s: Failed to send firmware signature (%d)",
  1730. hdev->name, err);
  1731. goto done;
  1732. }
  1733. fw_ptr = fw->data + 644;
  1734. frag_len = 0;
  1735. while (fw_ptr - fw->data < fw->size) {
  1736. struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len);
  1737. frag_len += sizeof(*cmd) + cmd->plen;
  1738. /* The parameter length of the secure send command requires
  1739. * a 4 byte alignment. It happens so that the firmware file
  1740. * contains proper Intel_NOP commands to align the fragments
  1741. * as needed.
  1742. *
  1743. * Send set of commands with 4 byte alignment from the
  1744. * firmware data buffer as a single Data fragement.
  1745. */
  1746. if (!(frag_len % 4)) {
  1747. err = btintel_secure_send(hdev, 0x01, frag_len, fw_ptr);
  1748. if (err < 0) {
  1749. BT_ERR("%s: Failed to send firmware data (%d)",
  1750. hdev->name, err);
  1751. goto done;
  1752. }
  1753. fw_ptr += frag_len;
  1754. frag_len = 0;
  1755. }
  1756. }
  1757. set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
  1758. BT_INFO("%s: Waiting for firmware download to complete", hdev->name);
  1759. /* Before switching the device into operational mode and with that
  1760. * booting the loaded firmware, wait for the bootloader notification
  1761. * that all fragments have been successfully received.
  1762. *
  1763. * When the event processing receives the notification, then the
  1764. * BTUSB_DOWNLOADING flag will be cleared.
  1765. *
  1766. * The firmware loading should not take longer than 5 seconds
  1767. * and thus just timeout if that happens and fail the setup
  1768. * of this device.
  1769. */
  1770. err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
  1771. TASK_INTERRUPTIBLE,
  1772. msecs_to_jiffies(5000));
  1773. if (err == -EINTR) {
  1774. BT_ERR("%s: Firmware loading interrupted", hdev->name);
  1775. goto done;
  1776. }
  1777. if (err) {
  1778. BT_ERR("%s: Firmware loading timeout", hdev->name);
  1779. err = -ETIMEDOUT;
  1780. goto done;
  1781. }
  1782. if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
  1783. BT_ERR("%s: Firmware loading failed", hdev->name);
  1784. err = -ENOEXEC;
  1785. goto done;
  1786. }
  1787. rettime = ktime_get();
  1788. delta = ktime_sub(rettime, calltime);
  1789. duration = (unsigned long long) ktime_to_ns(delta) >> 10;
  1790. BT_INFO("%s: Firmware loaded in %llu usecs", hdev->name, duration);
  1791. done:
  1792. release_firmware(fw);
  1793. if (err < 0)
  1794. return err;
  1795. calltime = ktime_get();
  1796. set_bit(BTUSB_BOOTING, &data->flags);
  1797. skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(reset_param), reset_param,
  1798. HCI_INIT_TIMEOUT);
  1799. if (IS_ERR(skb))
  1800. return PTR_ERR(skb);
  1801. kfree_skb(skb);
  1802. /* The bootloader will not indicate when the device is ready. This
  1803. * is done by the operational firmware sending bootup notification.
  1804. *
  1805. * Booting into operational firmware should not take longer than
  1806. * 1 second. However if that happens, then just fail the setup
  1807. * since something went wrong.
  1808. */
  1809. BT_INFO("%s: Waiting for device to boot", hdev->name);
  1810. err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
  1811. TASK_INTERRUPTIBLE,
  1812. msecs_to_jiffies(1000));
  1813. if (err == -EINTR) {
  1814. BT_ERR("%s: Device boot interrupted", hdev->name);
  1815. return -EINTR;
  1816. }
  1817. if (err) {
  1818. BT_ERR("%s: Device boot timeout", hdev->name);
  1819. return -ETIMEDOUT;
  1820. }
  1821. rettime = ktime_get();
  1822. delta = ktime_sub(rettime, calltime);
  1823. duration = (unsigned long long) ktime_to_ns(delta) >> 10;
  1824. BT_INFO("%s: Device booted in %llu usecs", hdev->name, duration);
  1825. clear_bit(BTUSB_BOOTLOADER, &data->flags);
  1826. /* Once the device is running in operational mode, it needs to apply
  1827. * the device configuration (DDC) parameters.
  1828. *
  1829. * The device can work without DDC parameters, so even if it fails
  1830. * to load the file, no need to fail the setup.
  1831. */
  1832. btintel_load_ddc_config(hdev, fwname);
  1833. /* Set the event mask for Intel specific vendor events. This enables
  1834. * a few extra events that are useful during general operation. It
  1835. * does not enable any debugging related events.
  1836. *
  1837. * The device will function correctly without these events enabled
  1838. * and thus no need to fail the setup.
  1839. */
  1840. btintel_set_event_mask(hdev, false);
  1841. return 0;
  1842. }
  1843. static int btusb_shutdown_intel(struct hci_dev *hdev)
  1844. {
  1845. struct sk_buff *skb;
  1846. long ret;
  1847. /* Some platforms have an issue with BT LED when the interface is
  1848. * down or BT radio is turned off, which takes 5 seconds to BT LED
  1849. * goes off. This command turns off the BT LED immediately.
  1850. */
  1851. skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT);
  1852. if (IS_ERR(skb)) {
  1853. ret = PTR_ERR(skb);
  1854. BT_ERR("%s: turning off Intel device LED failed (%ld)",
  1855. hdev->name, ret);
  1856. return ret;
  1857. }
  1858. kfree_skb(skb);
  1859. return 0;
  1860. }
  1861. static int btusb_set_bdaddr_marvell(struct hci_dev *hdev,
  1862. const bdaddr_t *bdaddr)
  1863. {
  1864. struct sk_buff *skb;
  1865. u8 buf[8];
  1866. long ret;
  1867. buf[0] = 0xfe;
  1868. buf[1] = sizeof(bdaddr_t);
  1869. memcpy(buf + 2, bdaddr, sizeof(bdaddr_t));
  1870. skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT);
  1871. if (IS_ERR(skb)) {
  1872. ret = PTR_ERR(skb);
  1873. BT_ERR("%s: changing Marvell device address failed (%ld)",
  1874. hdev->name, ret);
  1875. return ret;
  1876. }
  1877. kfree_skb(skb);
  1878. return 0;
  1879. }
  1880. static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev,
  1881. const bdaddr_t *bdaddr)
  1882. {
  1883. struct sk_buff *skb;
  1884. u8 buf[10];
  1885. long ret;
  1886. buf[0] = 0x01;
  1887. buf[1] = 0x01;
  1888. buf[2] = 0x00;
  1889. buf[3] = sizeof(bdaddr_t);
  1890. memcpy(buf + 4, bdaddr, sizeof(bdaddr_t));
  1891. skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT);
  1892. if (IS_ERR(skb)) {
  1893. ret = PTR_ERR(skb);
  1894. BT_ERR("%s: Change address command failed (%ld)",
  1895. hdev->name, ret);
  1896. return ret;
  1897. }
  1898. kfree_skb(skb);
  1899. return 0;
  1900. }
  1901. #define QCA_DFU_PACKET_LEN 4096
  1902. #define QCA_GET_TARGET_VERSION 0x09
  1903. #define QCA_CHECK_STATUS 0x05
  1904. #define QCA_DFU_DOWNLOAD 0x01
  1905. #define QCA_SYSCFG_UPDATED 0x40
  1906. #define QCA_PATCH_UPDATED 0x80
  1907. #define QCA_DFU_TIMEOUT 3000
  1908. struct qca_version {
  1909. __le32 rom_version;
  1910. __le32 patch_version;
  1911. __le32 ram_version;
  1912. __le32 ref_clock;
  1913. __u8 reserved[4];
  1914. } __packed;
  1915. struct qca_rampatch_version {
  1916. __le16 rom_version;
  1917. __le16 patch_version;
  1918. } __packed;
  1919. struct qca_device_info {
  1920. u32 rom_version;
  1921. u8 rampatch_hdr; /* length of header in rampatch */
  1922. u8 nvm_hdr; /* length of header in NVM */
  1923. u8 ver_offset; /* offset of version structure in rampatch */
  1924. };
  1925. static const struct qca_device_info qca_devices_table[] = {
  1926. { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */
  1927. { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */
  1928. { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */
  1929. { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */
  1930. { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */
  1931. { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */
  1932. };
  1933. static int btusb_qca_send_vendor_req(struct hci_dev *hdev, u8 request,
  1934. void *data, u16 size)
  1935. {
  1936. struct btusb_data *btdata = hci_get_drvdata(hdev);
  1937. struct usb_device *udev = btdata->udev;
  1938. int pipe, err;
  1939. u8 *buf;
  1940. buf = kmalloc(size, GFP_KERNEL);
  1941. if (!buf)
  1942. return -ENOMEM;
  1943. /* Found some of USB hosts have IOT issues with ours so that we should
  1944. * not wait until HCI layer is ready.
  1945. */
  1946. pipe = usb_rcvctrlpipe(udev, 0);
  1947. err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN,
  1948. 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
  1949. if (err < 0) {
  1950. BT_ERR("%s: Failed to access otp area (%d)", hdev->name, err);
  1951. goto done;
  1952. }
  1953. memcpy(data, buf, size);
  1954. done:
  1955. kfree(buf);
  1956. return err;
  1957. }
  1958. static int btusb_setup_qca_download_fw(struct hci_dev *hdev,
  1959. const struct firmware *firmware,
  1960. size_t hdr_size)
  1961. {
  1962. struct btusb_data *btdata = hci_get_drvdata(hdev);
  1963. struct usb_device *udev = btdata->udev;
  1964. size_t count, size, sent = 0;
  1965. int pipe, len, err;
  1966. u8 *buf;
  1967. buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL);
  1968. if (!buf)
  1969. return -ENOMEM;
  1970. count = firmware->size;
  1971. size = min_t(size_t, count, hdr_size);
  1972. memcpy(buf, firmware->data, size);
  1973. /* USB patches should go down to controller through USB path
  1974. * because binary format fits to go down through USB channel.
  1975. * USB control path is for patching headers and USB bulk is for
  1976. * patch body.
  1977. */
  1978. pipe = usb_sndctrlpipe(udev, 0);
  1979. err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR,
  1980. 0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
  1981. if (err < 0) {
  1982. BT_ERR("%s: Failed to send headers (%d)", hdev->name, err);
  1983. goto done;
  1984. }
  1985. sent += size;
  1986. count -= size;
  1987. while (count) {
  1988. size = min_t(size_t, count, QCA_DFU_PACKET_LEN);
  1989. memcpy(buf, firmware->data + sent, size);
  1990. pipe = usb_sndbulkpipe(udev, 0x02);
  1991. err = usb_bulk_msg(udev, pipe, buf, size, &len,
  1992. QCA_DFU_TIMEOUT);
  1993. if (err < 0) {
  1994. BT_ERR("%s: Failed to send body at %zd of %zd (%d)",
  1995. hdev->name, sent, firmware->size, err);
  1996. break;
  1997. }
  1998. if (size != len) {
  1999. BT_ERR("%s: Failed to get bulk buffer", hdev->name);
  2000. err = -EILSEQ;
  2001. break;
  2002. }
  2003. sent += size;
  2004. count -= size;
  2005. }
  2006. done:
  2007. kfree(buf);
  2008. return err;
  2009. }
  2010. static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev,
  2011. struct qca_version *ver,
  2012. const struct qca_device_info *info)
  2013. {
  2014. struct qca_rampatch_version *rver;
  2015. const struct firmware *fw;
  2016. u32 ver_rom, ver_patch;
  2017. u16 rver_rom, rver_patch;
  2018. char fwname[64];
  2019. int err;
  2020. ver_rom = le32_to_cpu(ver->rom_version);
  2021. ver_patch = le32_to_cpu(ver->patch_version);
  2022. snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom);
  2023. err = request_firmware(&fw, fwname, &hdev->dev);
  2024. if (err) {
  2025. BT_ERR("%s: failed to request rampatch file: %s (%d)",
  2026. hdev->name, fwname, err);
  2027. return err;
  2028. }
  2029. BT_INFO("%s: using rampatch file: %s", hdev->name, fwname);
  2030. rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset);
  2031. rver_rom = le16_to_cpu(rver->rom_version);
  2032. rver_patch = le16_to_cpu(rver->patch_version);
  2033. BT_INFO("%s: QCA: patch rome 0x%x build 0x%x, firmware rome 0x%x "
  2034. "build 0x%x", hdev->name, rver_rom, rver_patch, ver_rom,
  2035. ver_patch);
  2036. if (rver_rom != ver_rom || rver_patch <= ver_patch) {
  2037. BT_ERR("%s: rampatch file version did not match with firmware",
  2038. hdev->name);
  2039. err = -EINVAL;
  2040. goto done;
  2041. }
  2042. err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr);
  2043. done:
  2044. release_firmware(fw);
  2045. return err;
  2046. }
  2047. static int btusb_setup_qca_load_nvm(struct hci_dev *hdev,
  2048. struct qca_version *ver,
  2049. const struct qca_device_info *info)
  2050. {
  2051. const struct firmware *fw;
  2052. char fwname[64];
  2053. int err;
  2054. snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin",
  2055. le32_to_cpu(ver->rom_version));
  2056. err = request_firmware(&fw, fwname, &hdev->dev);
  2057. if (err) {
  2058. BT_ERR("%s: failed to request NVM file: %s (%d)",
  2059. hdev->name, fwname, err);
  2060. return err;
  2061. }
  2062. BT_INFO("%s: using NVM file: %s", hdev->name, fwname);
  2063. err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr);
  2064. release_firmware(fw);
  2065. return err;
  2066. }
  2067. static int btusb_setup_qca(struct hci_dev *hdev)
  2068. {
  2069. const struct qca_device_info *info = NULL;
  2070. struct qca_version ver;
  2071. u32 ver_rom;
  2072. u8 status;
  2073. int i, err;
  2074. err = btusb_qca_send_vendor_req(hdev, QCA_GET_TARGET_VERSION, &ver,
  2075. sizeof(ver));
  2076. if (err < 0)
  2077. return err;
  2078. ver_rom = le32_to_cpu(ver.rom_version);
  2079. for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) {
  2080. if (ver_rom == qca_devices_table[i].rom_version)
  2081. info = &qca_devices_table[i];
  2082. }
  2083. if (!info) {
  2084. BT_ERR("%s: don't support firmware rome 0x%x", hdev->name,
  2085. ver_rom);
  2086. return -ENODEV;
  2087. }
  2088. err = btusb_qca_send_vendor_req(hdev, QCA_CHECK_STATUS, &status,
  2089. sizeof(status));
  2090. if (err < 0)
  2091. return err;
  2092. if (!(status & QCA_PATCH_UPDATED)) {
  2093. err = btusb_setup_qca_load_rampatch(hdev, &ver, info);
  2094. if (err < 0)
  2095. return err;
  2096. }
  2097. if (!(status & QCA_SYSCFG_UPDATED)) {
  2098. err = btusb_setup_qca_load_nvm(hdev, &ver, info);
  2099. if (err < 0)
  2100. return err;
  2101. }
  2102. return 0;
  2103. }
  2104. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2105. static inline int __set_diag_interface(struct hci_dev *hdev)
  2106. {
  2107. struct btusb_data *data = hci_get_drvdata(hdev);
  2108. struct usb_interface *intf = data->diag;
  2109. int i;
  2110. if (!data->diag)
  2111. return -ENODEV;
  2112. data->diag_tx_ep = NULL;
  2113. data->diag_rx_ep = NULL;
  2114. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  2115. struct usb_endpoint_descriptor *ep_desc;
  2116. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  2117. if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
  2118. data->diag_tx_ep = ep_desc;
  2119. continue;
  2120. }
  2121. if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
  2122. data->diag_rx_ep = ep_desc;
  2123. continue;
  2124. }
  2125. }
  2126. if (!data->diag_tx_ep || !data->diag_rx_ep) {
  2127. BT_ERR("%s invalid diagnostic descriptors", hdev->name);
  2128. return -ENODEV;
  2129. }
  2130. return 0;
  2131. }
  2132. static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable)
  2133. {
  2134. struct btusb_data *data = hci_get_drvdata(hdev);
  2135. struct sk_buff *skb;
  2136. struct urb *urb;
  2137. unsigned int pipe;
  2138. if (!data->diag_tx_ep)
  2139. return ERR_PTR(-ENODEV);
  2140. urb = usb_alloc_urb(0, GFP_KERNEL);
  2141. if (!urb)
  2142. return ERR_PTR(-ENOMEM);
  2143. skb = bt_skb_alloc(2, GFP_KERNEL);
  2144. if (!skb) {
  2145. usb_free_urb(urb);
  2146. return ERR_PTR(-ENOMEM);
  2147. }
  2148. *skb_put(skb, 1) = 0xf0;
  2149. *skb_put(skb, 1) = enable;
  2150. pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress);
  2151. usb_fill_bulk_urb(urb, data->udev, pipe,
  2152. skb->data, skb->len, btusb_tx_complete, skb);
  2153. skb->dev = (void *)hdev;
  2154. return urb;
  2155. }
  2156. static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable)
  2157. {
  2158. struct btusb_data *data = hci_get_drvdata(hdev);
  2159. struct urb *urb;
  2160. if (!data->diag)
  2161. return -ENODEV;
  2162. if (!test_bit(HCI_RUNNING, &hdev->flags))
  2163. return -ENETDOWN;
  2164. urb = alloc_diag_urb(hdev, enable);
  2165. if (IS_ERR(urb))
  2166. return PTR_ERR(urb);
  2167. return submit_or_queue_tx_urb(hdev, urb);
  2168. }
  2169. #endif
  2170. static int btusb_probe(struct usb_interface *intf,
  2171. const struct usb_device_id *id)
  2172. {
  2173. struct usb_endpoint_descriptor *ep_desc;
  2174. struct btusb_data *data;
  2175. struct hci_dev *hdev;
  2176. unsigned ifnum_base;
  2177. int i, err;
  2178. BT_DBG("intf %p id %p", intf, id);
  2179. /* interface numbers are hardcoded in the spec */
  2180. if (intf->cur_altsetting->desc.bInterfaceNumber != 0) {
  2181. if (!(id->driver_info & BTUSB_IFNUM_2))
  2182. return -ENODEV;
  2183. if (intf->cur_altsetting->desc.bInterfaceNumber != 2)
  2184. return -ENODEV;
  2185. }
  2186. ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber;
  2187. if (!id->driver_info) {
  2188. const struct usb_device_id *match;
  2189. match = usb_match_id(intf, blacklist_table);
  2190. if (match)
  2191. id = match;
  2192. }
  2193. if (id->driver_info == BTUSB_IGNORE)
  2194. return -ENODEV;
  2195. if (id->driver_info & BTUSB_ATH3012) {
  2196. struct usb_device *udev = interface_to_usbdev(intf);
  2197. /* Old firmware would otherwise let ath3k driver load
  2198. * patch and sysconfig files */
  2199. if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001)
  2200. return -ENODEV;
  2201. }
  2202. data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL);
  2203. if (!data)
  2204. return -ENOMEM;
  2205. for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
  2206. ep_desc = &intf->cur_altsetting->endpoint[i].desc;
  2207. if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) {
  2208. data->intr_ep = ep_desc;
  2209. continue;
  2210. }
  2211. if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
  2212. data->bulk_tx_ep = ep_desc;
  2213. continue;
  2214. }
  2215. if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
  2216. data->bulk_rx_ep = ep_desc;
  2217. continue;
  2218. }
  2219. }
  2220. if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep)
  2221. return -ENODEV;
  2222. if (id->driver_info & BTUSB_AMP) {
  2223. data->cmdreq_type = USB_TYPE_CLASS | 0x01;
  2224. data->cmdreq = 0x2b;
  2225. } else {
  2226. data->cmdreq_type = USB_TYPE_CLASS;
  2227. data->cmdreq = 0x00;
  2228. }
  2229. data->udev = interface_to_usbdev(intf);
  2230. data->intf = intf;
  2231. INIT_WORK(&data->work, btusb_work);
  2232. INIT_WORK(&data->waker, btusb_waker);
  2233. init_usb_anchor(&data->deferred);
  2234. init_usb_anchor(&data->tx_anchor);
  2235. spin_lock_init(&data->txlock);
  2236. init_usb_anchor(&data->intr_anchor);
  2237. init_usb_anchor(&data->bulk_anchor);
  2238. init_usb_anchor(&data->isoc_anchor);
  2239. init_usb_anchor(&data->diag_anchor);
  2240. spin_lock_init(&data->rxlock);
  2241. if (id->driver_info & BTUSB_INTEL_NEW) {
  2242. data->recv_event = btusb_recv_event_intel;
  2243. data->recv_bulk = btusb_recv_bulk_intel;
  2244. set_bit(BTUSB_BOOTLOADER, &data->flags);
  2245. } else {
  2246. data->recv_event = hci_recv_frame;
  2247. data->recv_bulk = btusb_recv_bulk;
  2248. }
  2249. hdev = hci_alloc_dev();
  2250. if (!hdev)
  2251. return -ENOMEM;
  2252. hdev->bus = HCI_USB;
  2253. hci_set_drvdata(hdev, data);
  2254. if (id->driver_info & BTUSB_AMP)
  2255. hdev->dev_type = HCI_AMP;
  2256. else
  2257. hdev->dev_type = HCI_PRIMARY;
  2258. data->hdev = hdev;
  2259. SET_HCIDEV_DEV(hdev, &intf->dev);
  2260. hdev->open = btusb_open;
  2261. hdev->close = btusb_close;
  2262. hdev->flush = btusb_flush;
  2263. hdev->send = btusb_send_frame;
  2264. hdev->notify = btusb_notify;
  2265. if (id->driver_info & BTUSB_CW6622)
  2266. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  2267. if (id->driver_info & BTUSB_BCM2045)
  2268. set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
  2269. if (id->driver_info & BTUSB_BCM92035)
  2270. hdev->setup = btusb_setup_bcm92035;
  2271. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2272. if (id->driver_info & BTUSB_BCM_PATCHRAM) {
  2273. hdev->manufacturer = 15;
  2274. hdev->setup = btbcm_setup_patchram;
  2275. hdev->set_diag = btusb_bcm_set_diag;
  2276. hdev->set_bdaddr = btbcm_set_bdaddr;
  2277. /* Broadcom LM_DIAG Interface numbers are hardcoded */
  2278. data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
  2279. }
  2280. if (id->driver_info & BTUSB_BCM_APPLE) {
  2281. hdev->manufacturer = 15;
  2282. hdev->setup = btbcm_setup_apple;
  2283. hdev->set_diag = btusb_bcm_set_diag;
  2284. /* Broadcom LM_DIAG Interface numbers are hardcoded */
  2285. data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
  2286. }
  2287. #endif
  2288. if (id->driver_info & BTUSB_INTEL) {
  2289. hdev->manufacturer = 2;
  2290. hdev->setup = btusb_setup_intel;
  2291. hdev->shutdown = btusb_shutdown_intel;
  2292. hdev->set_diag = btintel_set_diag_mfg;
  2293. hdev->set_bdaddr = btintel_set_bdaddr;
  2294. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2295. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2296. set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
  2297. }
  2298. if (id->driver_info & BTUSB_INTEL_NEW) {
  2299. hdev->manufacturer = 2;
  2300. hdev->send = btusb_send_frame_intel;
  2301. hdev->setup = btusb_setup_intel_new;
  2302. hdev->hw_error = btintel_hw_error;
  2303. hdev->set_diag = btintel_set_diag;
  2304. hdev->set_bdaddr = btintel_set_bdaddr;
  2305. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2306. set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
  2307. }
  2308. if (id->driver_info & BTUSB_MARVELL)
  2309. hdev->set_bdaddr = btusb_set_bdaddr_marvell;
  2310. if (id->driver_info & BTUSB_SWAVE) {
  2311. set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks);
  2312. set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks);
  2313. }
  2314. if (id->driver_info & BTUSB_INTEL_BOOT) {
  2315. hdev->manufacturer = 2;
  2316. set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
  2317. }
  2318. if (id->driver_info & BTUSB_ATH3012) {
  2319. hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
  2320. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2321. set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
  2322. }
  2323. if (id->driver_info & BTUSB_QCA_ROME) {
  2324. data->setup_on_usb = btusb_setup_qca;
  2325. hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
  2326. }
  2327. #ifdef CONFIG_BT_HCIBTUSB_RTL
  2328. if (id->driver_info & BTUSB_REALTEK) {
  2329. hdev->setup = btrtl_setup_realtek;
  2330. /* Realtek devices lose their updated firmware over suspend,
  2331. * but the USB hub doesn't notice any status change.
  2332. * Explicitly request a device reset on resume.
  2333. */
  2334. set_bit(BTUSB_RESET_RESUME, &data->flags);
  2335. }
  2336. #endif
  2337. if (id->driver_info & BTUSB_AMP) {
  2338. /* AMP controllers do not support SCO packets */
  2339. data->isoc = NULL;
  2340. } else {
  2341. /* Interface orders are hardcoded in the specification */
  2342. data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1);
  2343. }
  2344. if (!reset)
  2345. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2346. if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) {
  2347. if (!disable_scofix)
  2348. set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks);
  2349. }
  2350. if (id->driver_info & BTUSB_BROKEN_ISOC)
  2351. data->isoc = NULL;
  2352. if (id->driver_info & BTUSB_DIGIANSWER) {
  2353. data->cmdreq_type = USB_TYPE_VENDOR;
  2354. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2355. }
  2356. if (id->driver_info & BTUSB_CSR) {
  2357. struct usb_device *udev = data->udev;
  2358. u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice);
  2359. /* Old firmware would otherwise execute USB reset */
  2360. if (bcdDevice < 0x117)
  2361. set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
  2362. /* Fake CSR devices with broken commands */
  2363. if (bcdDevice <= 0x100 || bcdDevice == 0x134)
  2364. hdev->setup = btusb_setup_csr;
  2365. set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
  2366. }
  2367. if (id->driver_info & BTUSB_SNIFFER) {
  2368. struct usb_device *udev = data->udev;
  2369. /* New sniffer firmware has crippled HCI interface */
  2370. if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997)
  2371. set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
  2372. }
  2373. if (id->driver_info & BTUSB_INTEL_BOOT) {
  2374. /* A bug in the bootloader causes that interrupt interface is
  2375. * only enabled after receiving SetInterface(0, AltSetting=0).
  2376. */
  2377. err = usb_set_interface(data->udev, 0, 0);
  2378. if (err < 0) {
  2379. BT_ERR("failed to set interface 0, alt 0 %d", err);
  2380. hci_free_dev(hdev);
  2381. return err;
  2382. }
  2383. }
  2384. if (data->isoc) {
  2385. err = usb_driver_claim_interface(&btusb_driver,
  2386. data->isoc, data);
  2387. if (err < 0) {
  2388. hci_free_dev(hdev);
  2389. return err;
  2390. }
  2391. }
  2392. #ifdef CONFIG_BT_HCIBTUSB_BCM
  2393. if (data->diag) {
  2394. if (!usb_driver_claim_interface(&btusb_driver,
  2395. data->diag, data))
  2396. __set_diag_interface(hdev);
  2397. else
  2398. data->diag = NULL;
  2399. }
  2400. #endif
  2401. err = hci_register_dev(hdev);
  2402. if (err < 0) {
  2403. hci_free_dev(hdev);
  2404. return err;
  2405. }
  2406. usb_set_intfdata(intf, data);
  2407. return 0;
  2408. }
  2409. static void btusb_disconnect(struct usb_interface *intf)
  2410. {
  2411. struct btusb_data *data = usb_get_intfdata(intf);
  2412. struct hci_dev *hdev;
  2413. BT_DBG("intf %p", intf);
  2414. if (!data)
  2415. return;
  2416. hdev = data->hdev;
  2417. usb_set_intfdata(data->intf, NULL);
  2418. if (data->isoc)
  2419. usb_set_intfdata(data->isoc, NULL);
  2420. if (data->diag)
  2421. usb_set_intfdata(data->diag, NULL);
  2422. hci_unregister_dev(hdev);
  2423. if (intf == data->intf) {
  2424. if (data->isoc)
  2425. usb_driver_release_interface(&btusb_driver, data->isoc);
  2426. if (data->diag)
  2427. usb_driver_release_interface(&btusb_driver, data->diag);
  2428. } else if (intf == data->isoc) {
  2429. if (data->diag)
  2430. usb_driver_release_interface(&btusb_driver, data->diag);
  2431. usb_driver_release_interface(&btusb_driver, data->intf);
  2432. } else if (intf == data->diag) {
  2433. usb_driver_release_interface(&btusb_driver, data->intf);
  2434. if (data->isoc)
  2435. usb_driver_release_interface(&btusb_driver, data->isoc);
  2436. }
  2437. hci_free_dev(hdev);
  2438. }
  2439. #ifdef CONFIG_PM
  2440. static int btusb_suspend(struct usb_interface *intf, pm_message_t message)
  2441. {
  2442. struct btusb_data *data = usb_get_intfdata(intf);
  2443. BT_DBG("intf %p", intf);
  2444. if (data->suspend_count++)
  2445. return 0;
  2446. spin_lock_irq(&data->txlock);
  2447. if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) {
  2448. set_bit(BTUSB_SUSPENDING, &data->flags);
  2449. spin_unlock_irq(&data->txlock);
  2450. } else {
  2451. spin_unlock_irq(&data->txlock);
  2452. data->suspend_count--;
  2453. return -EBUSY;
  2454. }
  2455. cancel_work_sync(&data->work);
  2456. btusb_stop_traffic(data);
  2457. usb_kill_anchored_urbs(&data->tx_anchor);
  2458. /* Optionally request a device reset on resume, but only when
  2459. * wakeups are disabled. If wakeups are enabled we assume the
  2460. * device will stay powered up throughout suspend.
  2461. */
  2462. if (test_bit(BTUSB_RESET_RESUME, &data->flags) &&
  2463. !device_may_wakeup(&data->udev->dev))
  2464. data->udev->reset_resume = 1;
  2465. return 0;
  2466. }
  2467. static void play_deferred(struct btusb_data *data)
  2468. {
  2469. struct urb *urb;
  2470. int err;
  2471. while ((urb = usb_get_from_anchor(&data->deferred))) {
  2472. err = usb_submit_urb(urb, GFP_ATOMIC);
  2473. if (err < 0)
  2474. break;
  2475. data->tx_in_flight++;
  2476. }
  2477. usb_scuttle_anchored_urbs(&data->deferred);
  2478. }
  2479. static int btusb_resume(struct usb_interface *intf)
  2480. {
  2481. struct btusb_data *data = usb_get_intfdata(intf);
  2482. struct hci_dev *hdev = data->hdev;
  2483. int err = 0;
  2484. BT_DBG("intf %p", intf);
  2485. if (--data->suspend_count)
  2486. return 0;
  2487. if (!test_bit(HCI_RUNNING, &hdev->flags))
  2488. goto done;
  2489. if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) {
  2490. err = btusb_submit_intr_urb(hdev, GFP_NOIO);
  2491. if (err < 0) {
  2492. clear_bit(BTUSB_INTR_RUNNING, &data->flags);
  2493. goto failed;
  2494. }
  2495. }
  2496. if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) {
  2497. err = btusb_submit_bulk_urb(hdev, GFP_NOIO);
  2498. if (err < 0) {
  2499. clear_bit(BTUSB_BULK_RUNNING, &data->flags);
  2500. goto failed;
  2501. }
  2502. btusb_submit_bulk_urb(hdev, GFP_NOIO);
  2503. }
  2504. if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
  2505. if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0)
  2506. clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
  2507. else
  2508. btusb_submit_isoc_urb(hdev, GFP_NOIO);
  2509. }
  2510. spin_lock_irq(&data->txlock);
  2511. play_deferred(data);
  2512. clear_bit(BTUSB_SUSPENDING, &data->flags);
  2513. spin_unlock_irq(&data->txlock);
  2514. schedule_work(&data->work);
  2515. return 0;
  2516. failed:
  2517. usb_scuttle_anchored_urbs(&data->deferred);
  2518. done:
  2519. spin_lock_irq(&data->txlock);
  2520. clear_bit(BTUSB_SUSPENDING, &data->flags);
  2521. spin_unlock_irq(&data->txlock);
  2522. return err;
  2523. }
  2524. #endif
  2525. static struct usb_driver btusb_driver = {
  2526. .name = "btusb",
  2527. .probe = btusb_probe,
  2528. .disconnect = btusb_disconnect,
  2529. #ifdef CONFIG_PM
  2530. .suspend = btusb_suspend,
  2531. .resume = btusb_resume,
  2532. #endif
  2533. .id_table = btusb_table,
  2534. .supports_autosuspend = 1,
  2535. .disable_hub_initiated_lpm = 1,
  2536. };
  2537. module_usb_driver(btusb_driver);
  2538. module_param(disable_scofix, bool, 0644);
  2539. MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size");
  2540. module_param(force_scofix, bool, 0644);
  2541. MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size");
  2542. module_param(reset, bool, 0644);
  2543. MODULE_PARM_DESC(reset, "Send HCI reset command on initialization");
  2544. MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
  2545. MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION);
  2546. MODULE_VERSION(VERSION);
  2547. MODULE_LICENSE("GPL");