2019-05-27 14:55:05 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2007-10-20 20:12:34 +08:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Generic Bluetooth USB driver
|
|
|
|
*
|
2008-08-18 19:23:52 +08:00
|
|
|
* Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
|
2007-10-20 20:12:34 +08:00
|
|
|
*/
|
|
|
|
|
2018-02-20 16:06:18 +08:00
|
|
|
#include <linux/dmi.h>
|
2007-10-20 20:12:34 +08:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/usb.h>
|
2018-01-08 17:44:16 +08:00
|
|
|
#include <linux/usb/quirks.h>
|
2013-04-20 00:57:43 +08:00
|
|
|
#include <linux/firmware.h>
|
2019-06-02 08:02:48 +08:00
|
|
|
#include <linux/iopoll.h>
|
2017-02-02 06:24:09 +08:00
|
|
|
#include <linux/of_device.h>
|
|
|
|
#include <linux/of_irq.h>
|
2017-02-24 14:24:29 +08:00
|
|
|
#include <linux/suspend.h>
|
2019-01-25 07:28:14 +08:00
|
|
|
#include <linux/gpio/consumer.h>
|
2015-04-17 04:09:55 +08:00
|
|
|
#include <asm/unaligned.h>
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
|
|
#include <net/bluetooth/hci_core.h>
|
|
|
|
|
2015-04-06 15:52:12 +08:00
|
|
|
#include "btintel.h"
|
2015-04-06 13:52:11 +08:00
|
|
|
#include "btbcm.h"
|
2015-05-14 16:49:09 +08:00
|
|
|
#include "btrtl.h"
|
2015-04-06 13:52:11 +08:00
|
|
|
|
2015-04-06 13:52:16 +08:00
|
|
|
#define VERSION "0.8"
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2012-01-13 07:02:20 +08:00
|
|
|
static bool disable_scofix;
|
|
|
|
static bool force_scofix;
|
2017-11-13 21:44:16 +08:00
|
|
|
static bool enable_autosuspend = IS_ENABLED(CONFIG_BT_HCIBTUSB_AUTOSUSPEND);
|
2008-11-30 19:17:26 +08:00
|
|
|
|
2015-05-26 02:23:40 +08:00
|
|
|
static bool reset = true;
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
static struct usb_driver btusb_driver;
|
|
|
|
|
|
|
|
#define BTUSB_IGNORE 0x01
|
2008-11-30 19:17:26 +08:00
|
|
|
#define BTUSB_DIGIANSWER 0x02
|
|
|
|
#define BTUSB_CSR 0x04
|
|
|
|
#define BTUSB_SNIFFER 0x08
|
|
|
|
#define BTUSB_BCM92035 0x10
|
|
|
|
#define BTUSB_BROKEN_ISOC 0x20
|
|
|
|
#define BTUSB_WRONG_SCO_MTU 0x40
|
2011-07-01 14:02:36 +08:00
|
|
|
#define BTUSB_ATH3012 0x80
|
2013-04-20 00:57:43 +08:00
|
|
|
#define BTUSB_INTEL 0x100
|
2014-07-06 19:29:58 +08:00
|
|
|
#define BTUSB_INTEL_BOOT 0x200
|
|
|
|
#define BTUSB_BCM_PATCHRAM 0x400
|
2014-07-19 05:47:06 +08:00
|
|
|
#define BTUSB_MARVELL 0x800
|
2015-01-02 09:34:37 +08:00
|
|
|
#define BTUSB_SWAVE 0x1000
|
2015-01-27 13:33:48 +08:00
|
|
|
#define BTUSB_INTEL_NEW 0x2000
|
2015-01-29 12:27:34 +08:00
|
|
|
#define BTUSB_AMP 0x4000
|
2015-02-16 07:07:33 +08:00
|
|
|
#define BTUSB_QCA_ROME 0x8000
|
2015-03-22 22:52:38 +08:00
|
|
|
#define BTUSB_BCM_APPLE 0x10000
|
2015-04-17 04:09:55 +08:00
|
|
|
#define BTUSB_REALTEK 0x20000
|
2015-10-17 20:39:27 +08:00
|
|
|
#define BTUSB_BCM2045 0x40000
|
2015-10-20 06:53:33 +08:00
|
|
|
#define BTUSB_IFNUM_2 0x80000
|
2016-09-01 23:22:37 +08:00
|
|
|
#define BTUSB_CW6622 0x100000
|
2019-06-02 08:02:48 +08:00
|
|
|
#define BTUSB_MEDIATEK 0x200000
|
2020-02-28 02:29:37 +08:00
|
|
|
#define BTUSB_WIDEBAND_SPEECH 0x400000
|
2020-04-23 22:43:27 +08:00
|
|
|
#define BTUSB_VALID_LE_STATES 0x800000
|
2020-09-29 12:23:51 +08:00
|
|
|
#define BTUSB_QCA_WCN6855 0x1000000
|
2020-11-19 19:39:40 +08:00
|
|
|
#define BTUSB_INTEL_NEWGEN 0x2000000
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2013-10-11 22:46:18 +08:00
|
|
|
static const struct usb_device_id btusb_table[] = {
|
2007-10-20 20:12:34 +08:00
|
|
|
/* Generic Bluetooth USB device */
|
|
|
|
{ USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
|
|
|
|
|
2015-01-29 12:27:34 +08:00
|
|
|
/* Generic Bluetooth AMP device */
|
|
|
|
{ USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info = BTUSB_AMP },
|
|
|
|
|
2015-07-18 01:12:25 +08:00
|
|
|
/* Generic Bluetooth USB interface */
|
|
|
|
{ USB_INTERFACE_INFO(0xe0, 0x01, 0x01) },
|
|
|
|
|
2012-08-26 01:28:06 +08:00
|
|
|
/* Apple-specific (Broadcom) devices */
|
2015-03-22 22:52:38 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
|
2015-10-20 06:53:33 +08:00
|
|
|
.driver_info = BTUSB_BCM_APPLE | BTUSB_IFNUM_2 },
|
2012-08-26 01:28:06 +08:00
|
|
|
|
2013-06-04 21:40:26 +08:00
|
|
|
/* MediaTek MT76x0E */
|
|
|
|
{ USB_DEVICE(0x0e8d, 0x763f) },
|
|
|
|
|
2011-09-21 17:41:45 +08:00
|
|
|
/* Broadcom SoftSailing reporting vendor specific */
|
2012-03-29 04:41:11 +08:00
|
|
|
{ USB_DEVICE(0x0a5c, 0x21e1) },
|
2011-09-21 17:41:45 +08:00
|
|
|
|
2010-08-20 15:24:07 +08:00
|
|
|
/* Apple MacBookPro 7,1 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x8213) },
|
|
|
|
|
2010-07-14 14:29:27 +08:00
|
|
|
/* Apple iMac11,1 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x8215) },
|
|
|
|
|
2010-08-20 15:24:06 +08:00
|
|
|
/* Apple MacBookPro6,2 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x8218) },
|
|
|
|
|
2010-11-04 15:04:33 +08:00
|
|
|
/* Apple MacBookAir3,1, MacBookAir3,2 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x821b) },
|
|
|
|
|
2011-09-07 14:28:10 +08:00
|
|
|
/* Apple MacBookAir4,1 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x821f) },
|
|
|
|
|
2011-03-25 01:51:21 +08:00
|
|
|
/* Apple MacBookPro8,2 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x821a) },
|
|
|
|
|
2011-09-05 00:01:42 +08:00
|
|
|
/* Apple MacMini5,1 */
|
|
|
|
{ USB_DEVICE(0x05ac, 0x8281) },
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* AVM BlueFRITZ! USB v2.0 */
|
2015-01-02 09:34:37 +08:00
|
|
|
{ USB_DEVICE(0x057c, 0x3800), .driver_info = BTUSB_SWAVE },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
/* Bluetooth Ultraport Module from IBM */
|
|
|
|
{ USB_DEVICE(0x04bf, 0x030a) },
|
|
|
|
|
|
|
|
/* ALPS Modules with non-standard id */
|
|
|
|
{ USB_DEVICE(0x044e, 0x3001) },
|
|
|
|
{ USB_DEVICE(0x044e, 0x3002) },
|
|
|
|
|
|
|
|
/* Ericsson with non-standard id */
|
|
|
|
{ USB_DEVICE(0x0bdb, 0x1002) },
|
|
|
|
|
|
|
|
/* Canyon CN-BTU1 with HID interfaces */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x0c10, 0x0000) },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2011-11-08 14:30:22 +08:00
|
|
|
/* Broadcom BCM20702A0 */
|
|
|
|
{ USB_DEVICE(0x413c, 0x8197) },
|
|
|
|
|
2015-01-27 12:35:32 +08:00
|
|
|
/* Broadcom BCM20702B0 (Dynex/Insignia) */
|
|
|
|
{ USB_DEVICE(0x19ff, 0x0239), .driver_info = BTUSB_BCM_PATCHRAM },
|
|
|
|
|
Bluetooth: btusb: Add support for Foxconn/Lenovo BCM43142A0 (105b:e065)
Recently salvaged this 'BCM43142A0' WiFi/Bluetooth module from a Lenovo laptop
and noticed it doesn't work automatically, because the USB IDs are missing
from btusb.c.
Plugging in the adapter on Linux 4.1 (dmesg):
usb 3-3.3.3: new full-speed USB device number 90 using xhci_hcd
usb 3-3.3.3: New USB device found, idVendor=105b, idProduct=e065
usb 3-3.3.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 3-3.3.3: Product: BCM43142A0
usb 3-3.3.3: Manufacturer: Broadcom Corp
usb 3-3.3.3: SerialNumber: 0090A286559E
/sys/kernel/debug/usb/devices:
T: Bus=03 Lev=03 Prnt=22 Port=02 Cnt=02 Dev#= 90 Spd=12 MxCh= 0
D: Ver= 2.00 Cls=ff(vend.) Sub=01 Prot=01 MxPS=64 #Cfgs= 1
P: Vendor=105b ProdID=e065 Rev= 1.12
S: Manufacturer=Broadcom Corp
S: Product=BCM43142A0
S: SerialNumber=0090A286559E
C:* #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr= 0mA
I:* If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms
E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms
E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms
I:* If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms
I: If#= 1 Alt= 1 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms
I: If#= 1 Alt= 2 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms
I: If#= 1 Alt= 3 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms
I: If#= 1 Alt= 4 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms
I: If#= 1 Alt= 5 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms
I:* If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)
E: Ad=84(I) Atr=02(Bulk) MxPS= 32 Ivl=0ms
E: Ad=04(O) Atr=02(Bulk) MxPS= 32 Ivl=0ms
I:* If#= 3 Alt= 0 #EPs= 0 Cls=fe(app. ) Sub=01 Prot=01 Driver=(none)
Support for the chipset was added in commit 88f9b65 and a similar BCM43142
based device was added in commit 8f0c304.
To work around the issue, I got the firmware
(BCM43142A0_001.001.011.0122.0153) off a Windows installation of Broadcom
bluetooth driver and converted it to a .hcd -file via. hex2hcd and placed it
in /lib/firmware/brcm/BCM.hcd. After that:
$ echo "105b e065 0 19ff 0239" > /sys/bus/usb/drivers/btusb/new_id
...(plug in the adapter)
usb 3-3.3.3: new full-speed USB device number 91 using xhci_hcd
usb 3-3.3.3: New USB device found, idVendor=105b, idProduct=e065
usb 3-3.3.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 3-3.3.3: Product: BCM43142A0
usb 3-3.3.3: Manufacturer: Broadcom Corp
usb 3-3.3.3: SerialNumber: 0090A286559E
Bluetooth: hci0: BCM: chip id 70
Bluetooth: hci0: BCM (001.001.011) build 0000
bluetooth hci0: firmware: direct-loading firmware brcm/BCM.hcd
Bluetooth: hci0: BCM (001.001.011) build 0154
Bam, now it works for me!
/sys/kernel/debug/usb/devices:
T: Bus=03 Lev=03 Prnt=22 Port=02 Cnt=02 Dev#= 92 Spd=12 MxCh= 0
D: Ver= 2.00 Cls=ff(vend.) Sub=01 Prot=01 MxPS=64 #Cfgs= 1
P: Vendor=105b ProdID=e065 Rev= 1.12
S: Manufacturer=Broadcom Corp
S: Product=BCM43142A0
S: SerialNumber=0090A286559E
C:* #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr= 0mA
I:* If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms
E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms
E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms
I:* If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms
I: If#= 1 Alt= 1 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms
I: If#= 1 Alt= 2 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms
I: If#= 1 Alt= 3 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms
I: If#= 1 Alt= 4 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms
I: If#= 1 Alt= 5 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms
I:* If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)
E: Ad=84(I) Atr=02(Bulk) MxPS= 32 Ivl=0ms
E: Ad=04(O) Atr=02(Bulk) MxPS= 32 Ivl=0ms
I:* If#= 3 Alt= 0 #EPs= 0 Cls=fe(app. ) Sub=01 Prot=01 Driver=(none)
Signed-off-by: Santtu Rekilä <sare@r00t3d.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2015-10-05 20:45:27 +08:00
|
|
|
/* Broadcom BCM43142A0 (Foxconn/Lenovo) */
|
2017-07-06 19:41:13 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
Bluetooth: btusb: Add support for Foxconn/Lenovo BCM43142A0 (105b:e065)
Recently salvaged this 'BCM43142A0' WiFi/Bluetooth module from a Lenovo laptop
and noticed it doesn't work automatically, because the USB IDs are missing
from btusb.c.
Plugging in the adapter on Linux 4.1 (dmesg):
usb 3-3.3.3: new full-speed USB device number 90 using xhci_hcd
usb 3-3.3.3: New USB device found, idVendor=105b, idProduct=e065
usb 3-3.3.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 3-3.3.3: Product: BCM43142A0
usb 3-3.3.3: Manufacturer: Broadcom Corp
usb 3-3.3.3: SerialNumber: 0090A286559E
/sys/kernel/debug/usb/devices:
T: Bus=03 Lev=03 Prnt=22 Port=02 Cnt=02 Dev#= 90 Spd=12 MxCh= 0
D: Ver= 2.00 Cls=ff(vend.) Sub=01 Prot=01 MxPS=64 #Cfgs= 1
P: Vendor=105b ProdID=e065 Rev= 1.12
S: Manufacturer=Broadcom Corp
S: Product=BCM43142A0
S: SerialNumber=0090A286559E
C:* #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr= 0mA
I:* If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms
E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms
E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms
I:* If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms
I: If#= 1 Alt= 1 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms
I: If#= 1 Alt= 2 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms
I: If#= 1 Alt= 3 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms
I: If#= 1 Alt= 4 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms
I: If#= 1 Alt= 5 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms
I:* If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)
E: Ad=84(I) Atr=02(Bulk) MxPS= 32 Ivl=0ms
E: Ad=04(O) Atr=02(Bulk) MxPS= 32 Ivl=0ms
I:* If#= 3 Alt= 0 #EPs= 0 Cls=fe(app. ) Sub=01 Prot=01 Driver=(none)
Support for the chipset was added in commit 88f9b65 and a similar BCM43142
based device was added in commit 8f0c304.
To work around the issue, I got the firmware
(BCM43142A0_001.001.011.0122.0153) off a Windows installation of Broadcom
bluetooth driver and converted it to a .hcd -file via. hex2hcd and placed it
in /lib/firmware/brcm/BCM.hcd. After that:
$ echo "105b e065 0 19ff 0239" > /sys/bus/usb/drivers/btusb/new_id
...(plug in the adapter)
usb 3-3.3.3: new full-speed USB device number 91 using xhci_hcd
usb 3-3.3.3: New USB device found, idVendor=105b, idProduct=e065
usb 3-3.3.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 3-3.3.3: Product: BCM43142A0
usb 3-3.3.3: Manufacturer: Broadcom Corp
usb 3-3.3.3: SerialNumber: 0090A286559E
Bluetooth: hci0: BCM: chip id 70
Bluetooth: hci0: BCM (001.001.011) build 0000
bluetooth hci0: firmware: direct-loading firmware brcm/BCM.hcd
Bluetooth: hci0: BCM (001.001.011) build 0154
Bam, now it works for me!
/sys/kernel/debug/usb/devices:
T: Bus=03 Lev=03 Prnt=22 Port=02 Cnt=02 Dev#= 92 Spd=12 MxCh= 0
D: Ver= 2.00 Cls=ff(vend.) Sub=01 Prot=01 MxPS=64 #Cfgs= 1
P: Vendor=105b ProdID=e065 Rev= 1.12
S: Manufacturer=Broadcom Corp
S: Product=BCM43142A0
S: SerialNumber=0090A286559E
C:* #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr= 0mA
I:* If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms
E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms
E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms
I:* If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms
I: If#= 1 Alt= 1 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms
I: If#= 1 Alt= 2 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms
I: If#= 1 Alt= 3 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms
I: If#= 1 Alt= 4 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms
I: If#= 1 Alt= 5 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=btusb
E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms
E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms
I:* If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)
E: Ad=84(I) Atr=02(Bulk) MxPS= 32 Ivl=0ms
E: Ad=04(O) Atr=02(Bulk) MxPS= 32 Ivl=0ms
I:* If#= 3 Alt= 0 #EPs= 0 Cls=fe(app. ) Sub=01 Prot=01 Driver=(none)
Signed-off-by: Santtu Rekilä <sare@r00t3d.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2015-10-05 20:45:27 +08:00
|
|
|
|
2017-02-10 21:02:45 +08:00
|
|
|
/* Broadcom BCM920703 (HTC Vive) */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
|
|
|
|
2012-04-14 02:45:55 +08:00
|
|
|
/* Foxconn - Hon Hai */
|
2014-12-04 02:32:22 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
2012-04-14 02:45:55 +08:00
|
|
|
|
2015-02-03 01:50:14 +08:00
|
|
|
/* Lite-On Technology - Broadcom based */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
|
|
|
|
2014-02-19 00:26:19 +08:00
|
|
|
/* Broadcom devices with vendor specific id */
|
2014-05-09 06:50:01 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
2012-08-07 02:36:49 +08:00
|
|
|
|
2014-07-21 20:02:33 +08:00
|
|
|
/* ASUSTek Computer - Broadcom based */
|
2015-01-17 12:29:12 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
2014-07-21 20:02:33 +08:00
|
|
|
|
2013-09-22 02:14:43 +08:00
|
|
|
/* Belkin F8065bf - Broadcom based */
|
2015-03-28 06:11:41 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
2013-09-22 02:14:43 +08:00
|
|
|
|
2014-02-15 19:01:09 +08:00
|
|
|
/* IMC Networks - Broadcom based */
|
2015-03-28 06:11:41 +08:00
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
2014-02-15 19:01:09 +08:00
|
|
|
|
2017-01-10 15:41:13 +08:00
|
|
|
/* Dell Computer - Broadcom based */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
|
|
|
|
2015-12-05 19:09:36 +08:00
|
|
|
/* Toshiba Corp - Broadcom based */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_BCM_PATCHRAM },
|
|
|
|
|
2014-07-06 19:29:58 +08:00
|
|
|
/* Intel Bluetooth USB Bootloader (RAM module) */
|
2014-07-06 20:53:55 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0a5a),
|
|
|
|
.driver_info = BTUSB_INTEL_BOOT | BTUSB_BROKEN_ISOC },
|
2014-07-06 19:29:58 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
{ } /* Terminating entry */
|
|
|
|
};
|
|
|
|
|
|
|
|
MODULE_DEVICE_TABLE(usb, btusb_table);
|
|
|
|
|
2013-10-11 22:46:18 +08:00
|
|
|
static const struct usb_device_id blacklist_table[] = {
|
2008-08-08 04:26:56 +08:00
|
|
|
/* CSR BlueCore devices */
|
|
|
|
{ USB_DEVICE(0x0a12, 0x0001), .driver_info = BTUSB_CSR },
|
|
|
|
|
|
|
|
/* Broadcom BCM2033 without firmware */
|
|
|
|
{ USB_DEVICE(0x0a5c, 0x2033), .driver_info = BTUSB_IGNORE },
|
|
|
|
|
2015-10-17 20:39:27 +08:00
|
|
|
/* Broadcom BCM2045 devices */
|
|
|
|
{ USB_DEVICE(0x0a5c, 0x2045), .driver_info = BTUSB_BCM2045 },
|
|
|
|
|
2010-11-26 20:05:46 +08:00
|
|
|
/* Atheros 3011 with sflash firmware */
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe027), .driver_info = BTUSB_IGNORE },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe03d), .driver_info = BTUSB_IGNORE },
|
2015-02-14 03:05:11 +08:00
|
|
|
{ USB_DEVICE(0x04f2, 0xaff1), .driver_info = BTUSB_IGNORE },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0930, 0x0215), .driver_info = BTUSB_IGNORE },
|
2010-11-26 20:05:46 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x3002), .driver_info = BTUSB_IGNORE },
|
2012-06-08 20:32:50 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0xe019), .driver_info = BTUSB_IGNORE },
|
2011-05-10 07:11:16 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3304), .driver_info = BTUSB_IGNORE },
|
2010-11-26 20:05:46 +08:00
|
|
|
|
2011-01-26 17:10:59 +08:00
|
|
|
/* Atheros AR9285 Malbec with sflash firmware */
|
|
|
|
{ USB_DEVICE(0x03f0, 0x311d), .driver_info = BTUSB_IGNORE },
|
|
|
|
|
2011-02-11 18:08:53 +08:00
|
|
|
/* Atheros 3012 with sflash firmware */
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe04d), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe04e), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe056), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe057), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe05f), .driver_info = BTUSB_ATH3012 },
|
2015-06-07 01:25:40 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe076), .driver_info = BTUSB_ATH3012 },
|
2014-10-06 19:01:49 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe078), .driver_info = BTUSB_ATH3012 },
|
2016-02-10 05:49:11 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe095), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x04c5, 0x1330), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3004), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3005), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3006), .driver_info = BTUSB_ATH3012 },
|
2014-04-18 02:37:13 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
|
2015-06-19 01:41:51 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
|
2015-05-02 18:36:58 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x300f), .driver_info = BTUSB_ATH3012 },
|
2014-12-09 13:44:51 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x3010), .driver_info = BTUSB_ATH3012 },
|
2016-02-28 16:04:06 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x3014), .driver_info = BTUSB_ATH3012 },
|
2017-01-05 18:19:53 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x3018), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
|
2015-10-06 00:29:33 +08:00
|
|
|
{ USB_DEVICE(0x0930, 0x021c), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
|
2014-08-08 19:33:56 +08:00
|
|
|
{ USB_DEVICE(0x0930, 0x0227), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:20 +08:00
|
|
|
{ USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },
|
2013-03-15 11:00:39 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x0036), .driver_info = BTUSB_ATH3012 },
|
2018-04-26 20:18:19 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x3004), .driver_info = BTUSB_ATH3012 },
|
2013-03-12 03:41:58 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x3008), .driver_info = BTUSB_ATH3012 },
|
2012-03-15 04:01:21 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x311d), .driver_info = BTUSB_ATH3012 },
|
2014-01-16 22:37:11 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x311e), .driver_info = BTUSB_ATH3012 },
|
2014-01-16 23:02:58 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x311f), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x3121), .driver_info = BTUSB_ATH3012 },
|
2013-03-18 23:45:11 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x817a), .driver_info = BTUSB_ATH3012 },
|
2015-10-16 16:45:26 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x817b), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0xe003), .driver_info = BTUSB_ATH3012 },
|
2012-04-19 14:53:45 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0xe004), .driver_info = BTUSB_ATH3012 },
|
2013-08-30 17:41:40 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0xe005), .driver_info = BTUSB_ATH3012 },
|
2015-05-13 11:39:24 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0xe006), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3362), .driver_info = BTUSB_ATH3012 },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3375), .driver_info = BTUSB_ATH3012 },
|
2012-12-11 11:41:20 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3393), .driver_info = BTUSB_ATH3012 },
|
2016-02-10 20:33:17 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3395), .driver_info = BTUSB_ATH3012 },
|
2013-07-15 11:59:03 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3402), .driver_info = BTUSB_ATH3012 },
|
2014-11-26 01:19:52 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3408), .driver_info = BTUSB_ATH3012 },
|
2015-01-18 05:16:51 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3423), .driver_info = BTUSB_ATH3012 },
|
2014-07-08 21:55:08 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3432), .driver_info = BTUSB_ATH3012 },
|
2016-03-04 06:32:19 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3472), .driver_info = BTUSB_ATH3012 },
|
2015-06-07 01:29:25 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3474), .driver_info = BTUSB_ATH3012 },
|
2016-05-10 04:36:11 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3487), .driver_info = BTUSB_ATH3012 },
|
2016-07-12 06:35:18 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3490), .driver_info = BTUSB_ATH3012 },
|
2011-02-11 18:08:53 +08:00
|
|
|
|
2011-02-15 10:20:07 +08:00
|
|
|
/* Atheros AR5BBU12 with sflash firmware */
|
|
|
|
{ USB_DEVICE(0x0489, 0xe02c), .driver_info = BTUSB_IGNORE },
|
|
|
|
|
2012-05-03 04:33:40 +08:00
|
|
|
/* Atheros AR5BBU12 with sflash firmware */
|
2012-08-07 22:18:10 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe036), .driver_info = BTUSB_ATH3012 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0489, 0xe03c), .driver_info = BTUSB_ATH3012 },
|
2012-05-03 04:33:40 +08:00
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
/* QCA ROME chipset */
|
2020-09-17 21:09:23 +08:00
|
|
|
{ USB_DEVICE(0x0cf3, 0x535b), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe007), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe009), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe010), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe300), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe09f), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3015), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3016), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x301a), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04ca, 0x3021), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3491), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3496), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3501), .driver_info = BTUSB_QCA_ROME |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
2015-02-16 07:07:33 +08:00
|
|
|
|
2020-09-29 12:23:51 +08:00
|
|
|
/* QCA WCN6855 chipset */
|
|
|
|
{ USB_DEVICE(0x0cf3, 0xe600), .driver_info = BTUSB_QCA_WCN6855 |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* Broadcom BCM2035 */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x0a5c, 0x2009), .driver_info = BTUSB_BCM92035 },
|
2014-02-19 00:26:19 +08:00
|
|
|
{ USB_DEVICE(0x0a5c, 0x200a), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
{ USB_DEVICE(0x0a5c, 0x2035), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
/* Broadcom BCM2045 */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x0a5c, 0x2039), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
{ USB_DEVICE(0x0a5c, 0x2101), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-09-23 06:16:35 +08:00
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* IBM/Lenovo ThinkPad with Broadcom chip */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x0a5c, 0x201e), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
{ USB_DEVICE(0x0a5c, 0x2110), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
/* HP laptop with Broadcom chip */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x03f0, 0x171d), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
/* Dell laptop with Broadcom chip */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x413c, 0x8126), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2008-11-30 19:17:27 +08:00
|
|
|
/* Dell Wireless 370 and 410 devices */
|
2008-11-30 19:17:26 +08:00
|
|
|
{ USB_DEVICE(0x413c, 0x8152), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-11-30 19:17:27 +08:00
|
|
|
{ USB_DEVICE(0x413c, 0x8156), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2008-11-30 19:17:26 +08:00
|
|
|
/* Belkin F8T012 and F8T013 devices */
|
|
|
|
{ USB_DEVICE(0x050d, 0x0012), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
{ USB_DEVICE(0x050d, 0x0013), .driver_info = BTUSB_WRONG_SCO_MTU },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2008-11-30 19:17:27 +08:00
|
|
|
/* Asus WL-BTD202 device */
|
|
|
|
{ USB_DEVICE(0x0b05, 0x1715), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
|
|
|
|
/* Kensington Bluetooth USB adapter */
|
|
|
|
{ USB_DEVICE(0x047d, 0x105e), .driver_info = BTUSB_WRONG_SCO_MTU },
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* RTX Telecom based adapters with buggy SCO support */
|
|
|
|
{ USB_DEVICE(0x0400, 0x0807), .driver_info = BTUSB_BROKEN_ISOC },
|
|
|
|
{ USB_DEVICE(0x0400, 0x080a), .driver_info = BTUSB_BROKEN_ISOC },
|
|
|
|
|
|
|
|
/* CONWISE Technology based adapters with buggy SCO support */
|
2016-09-01 23:22:37 +08:00
|
|
|
{ USB_DEVICE(0x0e5e, 0x6622),
|
|
|
|
.driver_info = BTUSB_BROKEN_ISOC | BTUSB_CW6622},
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2015-01-02 09:34:37 +08:00
|
|
|
/* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
|
2015-06-08 17:02:10 +08:00
|
|
|
{ USB_DEVICE(0x1310, 0x0001), .driver_info = BTUSB_SWAVE },
|
2015-01-02 09:34:37 +08:00
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* Digianswer devices */
|
|
|
|
{ USB_DEVICE(0x08fd, 0x0001), .driver_info = BTUSB_DIGIANSWER },
|
|
|
|
{ USB_DEVICE(0x08fd, 0x0002), .driver_info = BTUSB_IGNORE },
|
|
|
|
|
|
|
|
/* CSR BlueCore Bluetooth Sniffer */
|
2014-07-07 06:12:04 +08:00
|
|
|
{ USB_DEVICE(0x0a12, 0x0002),
|
|
|
|
.driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
/* Frontline ComProbe Bluetooth Sniffer */
|
2014-07-07 06:12:04 +08:00
|
|
|
{ USB_DEVICE(0x16d3, 0x0002),
|
|
|
|
.driver_info = BTUSB_SNIFFER | BTUSB_BROKEN_ISOC },
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2015-01-29 11:41:42 +08:00
|
|
|
/* Marvell Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x1286, 0x2044), .driver_info = BTUSB_MARVELL },
|
|
|
|
{ USB_DEVICE(0x1286, 0x2046), .driver_info = BTUSB_MARVELL },
|
2016-09-28 18:48:35 +08:00
|
|
|
{ USB_DEVICE(0x1286, 0x204e), .driver_info = BTUSB_MARVELL },
|
2015-01-29 11:41:42 +08:00
|
|
|
|
2015-01-29 11:41:43 +08:00
|
|
|
/* Intel Bluetooth devices */
|
2020-02-28 02:29:37 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0025), .driver_info = BTUSB_INTEL_NEW |
|
2020-04-23 22:43:31 +08:00
|
|
|
BTUSB_WIDEBAND_SPEECH |
|
|
|
|
BTUSB_VALID_LE_STATES },
|
2020-02-28 02:29:37 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0026), .driver_info = BTUSB_INTEL_NEW |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x8087, 0x0029), .driver_info = BTUSB_INTEL_NEW |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
2020-11-19 19:39:43 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0032), .driver_info = BTUSB_INTEL_NEWGEN |
|
2020-05-11 19:10:40 +08:00
|
|
|
BTUSB_WIDEBAND_SPEECH},
|
2021-01-05 11:02:29 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0033), .driver_info = BTUSB_INTEL_NEWGEN |
|
|
|
|
BTUSB_WIDEBAND_SPEECH},
|
2015-02-23 07:41:18 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
|
2013-04-20 00:57:43 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL },
|
2013-11-13 05:10:58 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL },
|
2020-02-28 02:29:37 +08:00
|
|
|
{ USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_NEW |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_NEW |
|
2020-04-23 22:43:31 +08:00
|
|
|
BTUSB_WIDEBAND_SPEECH |
|
|
|
|
BTUSB_VALID_LE_STATES },
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2015-01-29 11:41:43 +08:00
|
|
|
/* Other Intel Bluetooth devices */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_IGNORE },
|
2014-07-19 05:47:06 +08:00
|
|
|
|
2020-07-13 15:45:29 +08:00
|
|
|
/* Realtek 8822CE Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x0bda, 0xb00c), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
|
2020-11-10 11:38:37 +08:00
|
|
|
/* Realtek 8852AE Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x0bda, 0xc852), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
|
2015-04-17 04:09:55 +08:00
|
|
|
/* Realtek Bluetooth devices */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_REALTEK },
|
|
|
|
|
2019-06-02 08:02:48 +08:00
|
|
|
/* MediaTek Bluetooth devices */
|
|
|
|
{ USB_VENDOR_AND_INTERFACE_INFO(0x0e8d, 0xe0, 0x01, 0x01),
|
|
|
|
.driver_info = BTUSB_MEDIATEK },
|
|
|
|
|
2020-11-10 11:40:10 +08:00
|
|
|
/* Additional MediaTek MT7615E Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3560), .driver_info = BTUSB_MEDIATEK},
|
|
|
|
|
2015-04-17 04:09:55 +08:00
|
|
|
/* Additional Realtek 8723AE Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x0930, 0x021d), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3394), .driver_info = BTUSB_REALTEK },
|
|
|
|
|
|
|
|
/* Additional Realtek 8723BE Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x0489, 0xe085), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x0489, 0xe08b), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3410), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3416), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3459), .driver_info = BTUSB_REALTEK },
|
2017-08-08 19:09:02 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3494), .driver_info = BTUSB_REALTEK },
|
2015-04-17 04:09:55 +08:00
|
|
|
|
2018-03-21 02:41:10 +08:00
|
|
|
/* Additional Realtek 8723BU Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x7392, 0xa611), .driver_info = BTUSB_REALTEK },
|
|
|
|
|
2018-05-21 18:09:20 +08:00
|
|
|
/* Additional Realtek 8723DE Bluetooth devices */
|
2018-05-25 17:54:52 +08:00
|
|
|
{ USB_DEVICE(0x0bda, 0xb009), .driver_info = BTUSB_REALTEK },
|
2018-05-21 18:09:20 +08:00
|
|
|
{ USB_DEVICE(0x2ff8, 0xb011), .driver_info = BTUSB_REALTEK },
|
|
|
|
|
2015-04-17 04:09:55 +08:00
|
|
|
/* Additional Realtek 8821AE Bluetooth devices */
|
|
|
|
{ USB_DEVICE(0x0b05, 0x17dc), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3414), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3458), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3461), .driver_info = BTUSB_REALTEK },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3462), .driver_info = BTUSB_REALTEK },
|
|
|
|
|
2018-02-12 02:24:32 +08:00
|
|
|
/* Additional Realtek 8822BE Bluetooth devices */
|
2018-05-30 16:23:00 +08:00
|
|
|
{ USB_DEVICE(0x13d3, 0x3526), .driver_info = BTUSB_REALTEK },
|
2018-02-12 02:24:32 +08:00
|
|
|
{ USB_DEVICE(0x0b05, 0x185c), .driver_info = BTUSB_REALTEK },
|
|
|
|
|
2019-09-03 17:10:42 +08:00
|
|
|
/* Additional Realtek 8822CE Bluetooth devices */
|
2020-11-05 18:54:48 +08:00
|
|
|
{ USB_DEVICE(0x04ca, 0x4005), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x04c5, 0x161f), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x0b05, 0x18ef), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3548), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3549), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3553), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x13d3, 0x3555), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
|
|
|
{ USB_DEVICE(0x2ff8, 0x3051), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
2020-11-10 00:47:22 +08:00
|
|
|
{ USB_DEVICE(0x1358, 0xc123), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
2020-11-19 13:16:25 +08:00
|
|
|
{ USB_DEVICE(0x0bda, 0xc123), .driver_info = BTUSB_REALTEK |
|
|
|
|
BTUSB_WIDEBAND_SPEECH },
|
2019-09-03 17:10:42 +08:00
|
|
|
|
2015-08-16 02:47:09 +08:00
|
|
|
/* Silicon Wave based devices */
|
|
|
|
{ USB_DEVICE(0x0c10, 0x0000), .driver_info = BTUSB_SWAVE },
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
{ } /* Terminating entry */
|
|
|
|
};
|
|
|
|
|
2018-02-20 16:06:18 +08:00
|
|
|
/* The Bluetooth USB module build into some devices needs to be reset on resume,
|
|
|
|
* this is a problem with the platform (likely shutting off all power) not with
|
|
|
|
* the module itself. So we use a DMI list to match known broken platforms.
|
|
|
|
*/
|
|
|
|
static const struct dmi_system_id btusb_needs_reset_resume_table[] = {
|
|
|
|
{
|
2018-03-01 13:42:52 +08:00
|
|
|
/* Dell OptiPlex 3060 (QCA ROME device 0cf3:e007) */
|
2018-02-20 16:06:18 +08:00
|
|
|
.matches = {
|
2018-03-01 13:42:52 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 3060"),
|
2018-02-20 16:06:18 +08:00
|
|
|
},
|
|
|
|
},
|
2018-04-27 02:52:06 +08:00
|
|
|
{
|
|
|
|
/* Dell XPS 9360 (QCA ROME device 0cf3:e300) */
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "XPS 13 9360"),
|
|
|
|
},
|
|
|
|
},
|
2018-05-22 15:34:10 +08:00
|
|
|
{
|
|
|
|
/* Dell Inspiron 5565 (QCA ROME device 0cf3:e009) */
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Inspiron 5565"),
|
|
|
|
},
|
|
|
|
},
|
2018-02-20 16:06:18 +08:00
|
|
|
{}
|
|
|
|
};
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
#define BTUSB_MAX_ISOC_FRAMES 10
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
#define BTUSB_INTR_RUNNING 0
|
|
|
|
#define BTUSB_BULK_RUNNING 1
|
2008-08-18 19:23:52 +08:00
|
|
|
#define BTUSB_ISOC_RUNNING 2
|
2009-08-25 05:44:59 +08:00
|
|
|
#define BTUSB_SUSPENDING 3
|
2010-07-17 04:20:33 +08:00
|
|
|
#define BTUSB_DID_ISO_RESUME 4
|
2015-01-27 13:33:48 +08:00
|
|
|
#define BTUSB_BOOTLOADER 5
|
|
|
|
#define BTUSB_DOWNLOADING 6
|
2015-01-28 17:58:40 +08:00
|
|
|
#define BTUSB_FIRMWARE_LOADED 7
|
2015-01-27 13:33:48 +08:00
|
|
|
#define BTUSB_FIRMWARE_FAILED 8
|
2015-01-28 17:58:40 +08:00
|
|
|
#define BTUSB_BOOTING 9
|
2018-01-08 17:44:16 +08:00
|
|
|
#define BTUSB_DIAG_RUNNING 10
|
|
|
|
#define BTUSB_OOB_WAKE_ENABLED 11
|
2019-01-25 07:28:14 +08:00
|
|
|
#define BTUSB_HW_RESET_ACTIVE 12
|
2019-06-02 08:02:48 +08:00
|
|
|
#define BTUSB_TX_WAIT_VND_EVT 13
|
2019-08-14 20:02:52 +08:00
|
|
|
#define BTUSB_WAKEUP_DISABLE 14
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
struct btusb_data {
|
|
|
|
struct hci_dev *hdev;
|
|
|
|
struct usb_device *udev;
|
2008-09-23 06:16:36 +08:00
|
|
|
struct usb_interface *intf;
|
2008-08-18 19:23:52 +08:00
|
|
|
struct usb_interface *isoc;
|
2015-10-09 02:23:08 +08:00
|
|
|
struct usb_interface *diag;
|
2017-10-25 01:42:45 +08:00
|
|
|
unsigned isoc_ifnum;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
struct work_struct work;
|
2009-08-25 05:44:59 +08:00
|
|
|
struct work_struct waker;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-16 14:00:29 +08:00
|
|
|
struct usb_anchor deferred;
|
2007-10-20 20:12:34 +08:00
|
|
|
struct usb_anchor tx_anchor;
|
2014-09-16 14:00:29 +08:00
|
|
|
int tx_in_flight;
|
|
|
|
spinlock_t txlock;
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
struct usb_anchor intr_anchor;
|
|
|
|
struct usb_anchor bulk_anchor;
|
2008-08-18 19:23:52 +08:00
|
|
|
struct usb_anchor isoc_anchor;
|
2015-10-09 02:23:08 +08:00
|
|
|
struct usb_anchor diag_anchor;
|
2019-06-02 08:02:48 +08:00
|
|
|
struct usb_anchor ctrl_anchor;
|
2014-09-16 14:00:29 +08:00
|
|
|
spinlock_t rxlock;
|
|
|
|
|
|
|
|
struct sk_buff *evt_skb;
|
|
|
|
struct sk_buff *acl_skb;
|
|
|
|
struct sk_buff *sco_skb;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
struct usb_endpoint_descriptor *intr_ep;
|
|
|
|
struct usb_endpoint_descriptor *bulk_tx_ep;
|
|
|
|
struct usb_endpoint_descriptor *bulk_rx_ep;
|
2008-08-18 19:23:52 +08:00
|
|
|
struct usb_endpoint_descriptor *isoc_tx_ep;
|
|
|
|
struct usb_endpoint_descriptor *isoc_rx_ep;
|
2015-10-09 02:23:08 +08:00
|
|
|
struct usb_endpoint_descriptor *diag_tx_ep;
|
|
|
|
struct usb_endpoint_descriptor *diag_rx_ep;
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2019-01-25 07:28:14 +08:00
|
|
|
struct gpio_desc *reset_gpio;
|
|
|
|
|
2008-11-30 19:17:26 +08:00
|
|
|
__u8 cmdreq_type;
|
2015-01-29 12:27:34 +08:00
|
|
|
__u8 cmdreq;
|
2008-11-30 19:17:26 +08:00
|
|
|
|
2009-02-05 00:41:38 +08:00
|
|
|
unsigned int sco_num;
|
2020-04-04 03:43:59 +08:00
|
|
|
unsigned int air_mode;
|
|
|
|
bool usb_alt6_packet_flow;
|
2008-08-18 19:23:52 +08:00
|
|
|
int isoc_altsetting;
|
2008-11-30 19:17:14 +08:00
|
|
|
int suspend_count;
|
2014-11-03 12:16:07 +08:00
|
|
|
|
2015-01-13 05:51:10 +08:00
|
|
|
int (*recv_event)(struct hci_dev *hdev, struct sk_buff *skb);
|
2014-11-03 12:16:07 +08:00
|
|
|
int (*recv_bulk)(struct btusb_data *data, void *buffer, int count);
|
2015-02-16 07:06:14 +08:00
|
|
|
|
|
|
|
int (*setup_on_usb)(struct hci_dev *hdev);
|
2017-02-02 06:24:09 +08:00
|
|
|
|
|
|
|
int oob_wake_irq; /* irq for out-of-band wake-on-bt */
|
2019-01-25 07:28:14 +08:00
|
|
|
unsigned cmd_timeout_cnt;
|
2007-10-20 20:12:34 +08:00
|
|
|
};
|
|
|
|
|
2019-01-25 07:28:14 +08:00
|
|
|
static void btusb_intel_cmd_timeout(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct gpio_desc *reset_gpio = data->reset_gpio;
|
|
|
|
|
|
|
|
if (++data->cmd_timeout_cnt < 5)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!reset_gpio) {
|
|
|
|
bt_dev_err(hdev, "No way to reset. Ignoring and continuing");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Toggle the hard reset line if the platform provides one. The reset
|
|
|
|
* is going to yank the device off the USB and then replug. So doing
|
|
|
|
* once is enough. The cleanup is handled correctly on the way out
|
|
|
|
* (standard USB disconnect), and the new device is detected cleanly
|
|
|
|
* and bound to the driver again like it should be.
|
|
|
|
*/
|
|
|
|
if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) {
|
|
|
|
bt_dev_err(hdev, "last reset failed? Not resetting again");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bt_dev_err(hdev, "Initiating HW reset via gpio");
|
2019-01-29 07:08:09 +08:00
|
|
|
gpiod_set_value_cansleep(reset_gpio, 1);
|
|
|
|
msleep(100);
|
|
|
|
gpiod_set_value_cansleep(reset_gpio, 0);
|
2019-01-25 07:28:14 +08:00
|
|
|
}
|
|
|
|
|
2019-09-05 10:36:31 +08:00
|
|
|
static void btusb_rtl_cmd_timeout(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct gpio_desc *reset_gpio = data->reset_gpio;
|
|
|
|
|
|
|
|
if (++data->cmd_timeout_cnt < 5)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!reset_gpio) {
|
|
|
|
bt_dev_err(hdev, "No gpio to reset Realtek device, ignoring");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Toggle the hard reset line. The Realtek device is going to
|
|
|
|
* yank itself off the USB and then replug. The cleanup is handled
|
|
|
|
* correctly on the way out (standard USB disconnect), and the new
|
|
|
|
* device is detected cleanly and bound to the driver again like
|
|
|
|
* it should be.
|
|
|
|
*/
|
|
|
|
if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE, &data->flags)) {
|
|
|
|
bt_dev_err(hdev, "last reset failed? Not resetting again");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bt_dev_err(hdev, "Reset Realtek device via gpio");
|
|
|
|
gpiod_set_value_cansleep(reset_gpio, 1);
|
2019-11-27 11:01:07 +08:00
|
|
|
msleep(200);
|
|
|
|
gpiod_set_value_cansleep(reset_gpio, 0);
|
2019-09-05 10:36:31 +08:00
|
|
|
}
|
|
|
|
|
2020-06-25 02:11:44 +08:00
|
|
|
static void btusb_qca_cmd_timeout(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (++data->cmd_timeout_cnt < 5)
|
|
|
|
return;
|
|
|
|
|
|
|
|
bt_dev_err(hdev, "Multiple cmd timeouts seen. Resetting usb device.");
|
2020-06-26 07:26:27 +08:00
|
|
|
/* This is not an unbalanced PM reference since the device will reset */
|
2020-06-25 02:11:44 +08:00
|
|
|
err = usb_autopm_get_interface(data->intf);
|
|
|
|
if (!err)
|
|
|
|
usb_queue_reset_device(data->intf);
|
|
|
|
else
|
|
|
|
bt_dev_err(hdev, "Failed usb_autopm_get_interface with %d", err);
|
|
|
|
}
|
|
|
|
|
2014-09-16 14:00:29 +08:00
|
|
|
static inline void btusb_free_frags(struct btusb_data *data)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&data->rxlock, flags);
|
|
|
|
|
|
|
|
kfree_skb(data->evt_skb);
|
|
|
|
data->evt_skb = NULL;
|
|
|
|
|
|
|
|
kfree_skb(data->acl_skb);
|
|
|
|
data->acl_skb = NULL;
|
|
|
|
|
|
|
|
kfree_skb(data->sco_skb);
|
|
|
|
data->sco_skb = NULL;
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&data->rxlock, flags);
|
|
|
|
}
|
|
|
|
|
2014-09-16 11:33:33 +08:00
|
|
|
static int btusb_recv_intr(struct btusb_data *data, void *buffer, int count)
|
|
|
|
{
|
2014-09-16 14:00:29 +08:00
|
|
|
struct sk_buff *skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
unsigned long flags;
|
2014-09-16 14:00:29 +08:00
|
|
|
int err = 0;
|
|
|
|
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_lock_irqsave(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
skb = data->evt_skb;
|
|
|
|
|
|
|
|
while (count) {
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (!skb) {
|
|
|
|
skb = bt_skb_alloc(HCI_MAX_EVENT_SIZE, GFP_ATOMIC);
|
|
|
|
if (!skb) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
|
|
|
|
hci_skb_expect(skb) = HCI_EVENT_HDR_SIZE;
|
2014-09-16 14:00:29 +08:00
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
len = min_t(uint, hci_skb_expect(skb), count);
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
skb_put_data(skb, buffer, len);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
count -= len;
|
|
|
|
buffer += len;
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) -= len;
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
if (skb->len == HCI_EVENT_HDR_SIZE) {
|
|
|
|
/* Complete event header */
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) = hci_event_hdr(skb)->plen;
|
2014-09-16 14:00:29 +08:00
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (skb_tailroom(skb) < hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
skb = NULL;
|
|
|
|
|
|
|
|
err = -EILSEQ;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (!hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
/* Complete frame */
|
2015-01-13 05:51:10 +08:00
|
|
|
data->recv_event(data->hdev, skb);
|
2014-09-16 14:00:29 +08:00
|
|
|
skb = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data->evt_skb = skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_unlock_irqrestore(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
return err;
|
2014-09-16 11:33:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_recv_bulk(struct btusb_data *data, void *buffer, int count)
|
|
|
|
{
|
2014-09-16 14:00:29 +08:00
|
|
|
struct sk_buff *skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
unsigned long flags;
|
2014-09-16 14:00:29 +08:00
|
|
|
int err = 0;
|
|
|
|
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_lock_irqsave(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
skb = data->acl_skb;
|
|
|
|
|
|
|
|
while (count) {
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (!skb) {
|
|
|
|
skb = bt_skb_alloc(HCI_MAX_FRAME_SIZE, GFP_ATOMIC);
|
|
|
|
if (!skb) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_pkt_type(skb) = HCI_ACLDATA_PKT;
|
|
|
|
hci_skb_expect(skb) = HCI_ACL_HDR_SIZE;
|
2014-09-16 14:00:29 +08:00
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
len = min_t(uint, hci_skb_expect(skb), count);
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
skb_put_data(skb, buffer, len);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
count -= len;
|
|
|
|
buffer += len;
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) -= len;
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
if (skb->len == HCI_ACL_HDR_SIZE) {
|
|
|
|
__le16 dlen = hci_acl_hdr(skb)->dlen;
|
|
|
|
|
|
|
|
/* Complete ACL header */
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) = __le16_to_cpu(dlen);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (skb_tailroom(skb) < hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
skb = NULL;
|
|
|
|
|
|
|
|
err = -EILSEQ;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (!hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
/* Complete frame */
|
|
|
|
hci_recv_frame(data->hdev, skb);
|
|
|
|
skb = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data->acl_skb = skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_unlock_irqrestore(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
return err;
|
2014-09-16 11:33:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_recv_isoc(struct btusb_data *data, void *buffer, int count)
|
|
|
|
{
|
2014-09-16 14:00:29 +08:00
|
|
|
struct sk_buff *skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
unsigned long flags;
|
2014-09-16 14:00:29 +08:00
|
|
|
int err = 0;
|
|
|
|
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_lock_irqsave(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
skb = data->sco_skb;
|
|
|
|
|
|
|
|
while (count) {
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (!skb) {
|
|
|
|
skb = bt_skb_alloc(HCI_MAX_SCO_SIZE, GFP_ATOMIC);
|
|
|
|
if (!skb) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_pkt_type(skb) = HCI_SCODATA_PKT;
|
|
|
|
hci_skb_expect(skb) = HCI_SCO_HDR_SIZE;
|
2014-09-16 14:00:29 +08:00
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
len = min_t(uint, hci_skb_expect(skb), count);
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
skb_put_data(skb, buffer, len);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
count -= len;
|
|
|
|
buffer += len;
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) -= len;
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
if (skb->len == HCI_SCO_HDR_SIZE) {
|
|
|
|
/* Complete SCO header */
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_expect(skb) = hci_sco_hdr(skb)->dlen;
|
2014-09-16 14:00:29 +08:00
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (skb_tailroom(skb) < hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
skb = NULL;
|
|
|
|
|
|
|
|
err = -EILSEQ;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
if (!hci_skb_expect(skb)) {
|
2014-09-16 14:00:29 +08:00
|
|
|
/* Complete frame */
|
|
|
|
hci_recv_frame(data->hdev, skb);
|
|
|
|
skb = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data->sco_skb = skb;
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_unlock_irqrestore(&data->rxlock, flags);
|
2014-09-16 14:00:29 +08:00
|
|
|
|
|
|
|
return err;
|
2014-09-16 11:33:33 +08:00
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static void btusb_intr_complete(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = urb->context;
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
int err;
|
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (urb->status == 0) {
|
2008-08-18 19:23:52 +08:00
|
|
|
hdev->stat.byte_rx += urb->actual_length;
|
|
|
|
|
2014-09-16 11:33:33 +08:00
|
|
|
if (btusb_recv_intr(data, urb->transfer_buffer,
|
|
|
|
urb->actual_length) < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "corrupted event packet");
|
2007-10-20 20:12:34 +08:00
|
|
|
hdev->stat.err_rx++;
|
|
|
|
}
|
2014-09-07 03:06:08 +08:00
|
|
|
} else if (urb->status == -ENOENT) {
|
|
|
|
/* Avoid suspend failed when usb_kill_urb */
|
|
|
|
return;
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_bit(BTUSB_INTR_RUNNING, &data->flags))
|
|
|
|
return;
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
usb_mark_last_busy(data->udev);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_anchor_urb(urb, &data->intr_anchor);
|
|
|
|
|
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
|
|
|
if (err < 0) {
|
2011-08-09 23:16:28 +08:00
|
|
|
/* -EPERM: urb is being killed;
|
2017-07-22 09:47:07 +08:00
|
|
|
* -ENODEV: device got disconnected
|
|
|
|
*/
|
2011-08-09 23:16:28 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
|
|
|
|
urb, -err);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
static int btusb_submit_intr_urb(struct hci_dev *hdev, gfp_t mem_flags)
|
2007-10-20 20:12:34 +08:00
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
struct urb *urb;
|
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int pipe;
|
|
|
|
int err, size;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
if (!data->intr_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
urb = usb_alloc_urb(0, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (!urb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
size = le16_to_cpu(data->intr_ep->wMaxPacketSize);
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
buf = kmalloc(size, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (!buf) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
pipe = usb_rcvintpipe(data->udev, data->intr_ep->bEndpointAddress);
|
|
|
|
|
|
|
|
usb_fill_int_urb(urb, data->udev, pipe, buf, size,
|
2014-09-16 10:44:50 +08:00
|
|
|
btusb_intr_complete, hdev, data->intr_ep->bInterval);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
urb->transfer_flags |= URB_FREE_BUFFER;
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->intr_anchor);
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
err = usb_submit_urb(urb, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (err < 0) {
|
2011-10-09 18:12:22 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void btusb_bulk_complete(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = urb->context;
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
int err;
|
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (urb->status == 0) {
|
2008-08-18 19:23:52 +08:00
|
|
|
hdev->stat.byte_rx += urb->actual_length;
|
|
|
|
|
2014-11-03 12:16:07 +08:00
|
|
|
if (data->recv_bulk(data, urb->transfer_buffer,
|
2014-09-16 11:33:33 +08:00
|
|
|
urb->actual_length) < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "corrupted ACL packet");
|
2007-10-20 20:12:34 +08:00
|
|
|
hdev->stat.err_rx++;
|
|
|
|
}
|
2014-09-07 03:06:08 +08:00
|
|
|
} else if (urb->status == -ENOENT) {
|
|
|
|
/* Avoid suspend failed when usb_kill_urb */
|
|
|
|
return;
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_bit(BTUSB_BULK_RUNNING, &data->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->bulk_anchor);
|
2009-12-17 02:23:43 +08:00
|
|
|
usb_mark_last_busy(data->udev);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
|
|
|
if (err < 0) {
|
2011-08-09 23:16:28 +08:00
|
|
|
/* -EPERM: urb is being killed;
|
2017-07-22 09:47:07 +08:00
|
|
|
* -ENODEV: device got disconnected
|
|
|
|
*/
|
2011-08-09 23:16:28 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
|
|
|
|
urb, -err);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
static int btusb_submit_bulk_urb(struct hci_dev *hdev, gfp_t mem_flags)
|
2007-10-20 20:12:34 +08:00
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
struct urb *urb;
|
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int pipe;
|
2009-07-02 17:01:59 +08:00
|
|
|
int err, size = HCI_MAX_FRAME_SIZE;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
if (!data->bulk_rx_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
urb = usb_alloc_urb(0, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (!urb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
buf = kmalloc(size, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (!buf) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
pipe = usb_rcvbulkpipe(data->udev, data->bulk_rx_ep->bEndpointAddress);
|
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
|
|
|
|
btusb_bulk_complete, hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
urb->transfer_flags |= URB_FREE_BUFFER;
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
usb_mark_last_busy(data->udev);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_anchor_urb(urb, &data->bulk_anchor);
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
err = usb_submit_urb(urb, mem_flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (err < 0) {
|
2011-10-09 18:12:22 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
static void btusb_isoc_complete(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = urb->context;
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2008-08-18 19:23:52 +08:00
|
|
|
int i, err;
|
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (urb->status == 0) {
|
|
|
|
for (i = 0; i < urb->number_of_packets; i++) {
|
|
|
|
unsigned int offset = urb->iso_frame_desc[i].offset;
|
|
|
|
unsigned int length = urb->iso_frame_desc[i].actual_length;
|
|
|
|
|
|
|
|
if (urb->iso_frame_desc[i].status)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
hdev->stat.byte_rx += length;
|
|
|
|
|
2014-09-16 11:33:33 +08:00
|
|
|
if (btusb_recv_isoc(data, urb->transfer_buffer + offset,
|
|
|
|
length) < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "corrupted SCO packet");
|
2008-08-18 19:23:52 +08:00
|
|
|
hdev->stat.err_rx++;
|
|
|
|
}
|
|
|
|
}
|
2014-09-07 03:06:08 +08:00
|
|
|
} else if (urb->status == -ENOENT) {
|
|
|
|
/* Avoid suspend failed when usb_kill_urb */
|
|
|
|
return;
|
2008-08-18 19:23:52 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_bit(BTUSB_ISOC_RUNNING, &data->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->isoc_anchor);
|
|
|
|
|
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
|
|
|
if (err < 0) {
|
2011-08-09 23:16:28 +08:00
|
|
|
/* -EPERM: urb is being killed;
|
2017-07-22 09:47:07 +08:00
|
|
|
* -ENODEV: device got disconnected
|
|
|
|
*/
|
2011-08-09 23:16:28 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
|
|
|
|
urb, -err);
|
2008-08-18 19:23:52 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
static inline void __fill_isoc_descriptor_msbc(struct urb *urb, int len,
|
|
|
|
int mtu, struct btusb_data *data)
|
|
|
|
{
|
|
|
|
int i, offset = 0;
|
|
|
|
unsigned int interval;
|
|
|
|
|
|
|
|
BT_DBG("len %d mtu %d", len, mtu);
|
|
|
|
|
|
|
|
/* For mSBC ALT 6 setting the host will send the packet at continuous
|
|
|
|
* flow. As per core spec 5, vol 4, part B, table 2.1. For ALT setting
|
|
|
|
* 6 the HCI PACKET INTERVAL should be 7.5ms for every usb packets.
|
|
|
|
* To maintain the rate we send 63bytes of usb packets alternatively for
|
|
|
|
* 7ms and 8ms to maintain the rate as 7.5ms.
|
|
|
|
*/
|
|
|
|
if (data->usb_alt6_packet_flow) {
|
|
|
|
interval = 7;
|
|
|
|
data->usb_alt6_packet_flow = false;
|
|
|
|
} else {
|
|
|
|
interval = 6;
|
|
|
|
data->usb_alt6_packet_flow = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < interval; i++) {
|
|
|
|
urb->iso_frame_desc[i].offset = offset;
|
|
|
|
urb->iso_frame_desc[i].length = offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len && i < BTUSB_MAX_ISOC_FRAMES) {
|
|
|
|
urb->iso_frame_desc[i].offset = offset;
|
|
|
|
urb->iso_frame_desc[i].length = len;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
urb->number_of_packets = i;
|
|
|
|
}
|
|
|
|
|
2011-01-17 07:09:38 +08:00
|
|
|
static inline void __fill_isoc_descriptor(struct urb *urb, int len, int mtu)
|
2008-08-18 19:23:52 +08:00
|
|
|
{
|
|
|
|
int i, offset = 0;
|
|
|
|
|
|
|
|
BT_DBG("len %d mtu %d", len, mtu);
|
|
|
|
|
|
|
|
for (i = 0; i < BTUSB_MAX_ISOC_FRAMES && len >= mtu;
|
|
|
|
i++, offset += mtu, len -= mtu) {
|
|
|
|
urb->iso_frame_desc[i].offset = offset;
|
|
|
|
urb->iso_frame_desc[i].length = mtu;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len && i < BTUSB_MAX_ISOC_FRAMES) {
|
|
|
|
urb->iso_frame_desc[i].offset = offset;
|
|
|
|
urb->iso_frame_desc[i].length = len;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
urb->number_of_packets = i;
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
static int btusb_submit_isoc_urb(struct hci_dev *hdev, gfp_t mem_flags)
|
2008-08-18 19:23:52 +08:00
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2008-08-18 19:23:52 +08:00
|
|
|
struct urb *urb;
|
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int pipe;
|
|
|
|
int err, size;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
if (!data->isoc_rx_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, mem_flags);
|
2008-08-18 19:23:52 +08:00
|
|
|
if (!urb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
size = le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize) *
|
|
|
|
BTUSB_MAX_ISOC_FRAMES;
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
buf = kmalloc(size, mem_flags);
|
2008-08-18 19:23:52 +08:00
|
|
|
if (!buf) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
pipe = usb_rcvisocpipe(data->udev, data->isoc_rx_ep->bEndpointAddress);
|
|
|
|
|
2011-12-21 10:19:00 +08:00
|
|
|
usb_fill_int_urb(urb, data->udev, pipe, buf, size, btusb_isoc_complete,
|
2014-09-16 10:44:50 +08:00
|
|
|
hdev, data->isoc_rx_ep->bInterval);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
urb->transfer_flags = URB_FREE_BUFFER | URB_ISO_ASAP;
|
2008-08-18 19:23:52 +08:00
|
|
|
|
|
|
|
__fill_isoc_descriptor(urb, size,
|
2014-09-16 10:44:50 +08:00
|
|
|
le16_to_cpu(data->isoc_rx_ep->wMaxPacketSize));
|
2008-08-18 19:23:52 +08:00
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->isoc_anchor);
|
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
err = usb_submit_urb(urb, mem_flags);
|
2008-08-18 19:23:52 +08:00
|
|
|
if (err < 0) {
|
2011-10-09 18:12:22 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
2008-08-18 19:23:52 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2015-10-09 02:23:08 +08:00
|
|
|
static void btusb_diag_complete(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = urb->context;
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
|
|
|
|
|
|
|
if (urb->status == 0) {
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
skb = bt_skb_alloc(urb->actual_length, GFP_ATOMIC);
|
|
|
|
if (skb) {
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
skb_put_data(skb, urb->transfer_buffer,
|
|
|
|
urb->actual_length);
|
2015-10-09 02:23:08 +08:00
|
|
|
hci_recv_diag(hdev, skb);
|
|
|
|
}
|
|
|
|
} else if (urb->status == -ENOENT) {
|
|
|
|
/* Avoid suspend failed when usb_kill_urb */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_bit(BTUSB_DIAG_RUNNING, &data->flags))
|
|
|
|
return;
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->diag_anchor);
|
|
|
|
usb_mark_last_busy(data->udev);
|
|
|
|
|
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
|
|
|
if (err < 0) {
|
|
|
|
/* -EPERM: urb is being killed;
|
2017-07-22 09:47:07 +08:00
|
|
|
* -ENODEV: device got disconnected
|
|
|
|
*/
|
2015-10-09 02:23:08 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
|
|
|
|
urb, -err);
|
2015-10-09 02:23:08 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_submit_diag_urb(struct hci_dev *hdev, gfp_t mem_flags)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct urb *urb;
|
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int pipe;
|
|
|
|
int err, size = HCI_MAX_FRAME_SIZE;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
if (!data->diag_rx_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
urb = usb_alloc_urb(0, mem_flags);
|
|
|
|
if (!urb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
buf = kmalloc(size, mem_flags);
|
|
|
|
if (!buf) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
pipe = usb_rcvbulkpipe(data->udev, data->diag_rx_ep->bEndpointAddress);
|
|
|
|
|
|
|
|
usb_fill_bulk_urb(urb, data->udev, pipe, buf, size,
|
|
|
|
btusb_diag_complete, hdev);
|
|
|
|
|
|
|
|
urb->transfer_flags |= URB_FREE_BUFFER;
|
|
|
|
|
|
|
|
usb_mark_last_busy(data->udev);
|
|
|
|
usb_anchor_urb(urb, &data->diag_anchor);
|
|
|
|
|
|
|
|
err = usb_submit_urb(urb, mem_flags);
|
|
|
|
if (err < 0) {
|
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
2015-10-09 02:23:08 +08:00
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static void btusb_tx_complete(struct urb *urb)
|
2009-08-25 05:44:59 +08:00
|
|
|
{
|
|
|
|
struct sk_buff *skb = urb->context;
|
2014-09-16 10:44:50 +08:00
|
|
|
struct hci_dev *hdev = (struct hci_dev *)skb->dev;
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2018-06-20 05:56:57 +08:00
|
|
|
unsigned long flags;
|
2009-08-25 05:44:59 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
if (!urb->status)
|
|
|
|
hdev->stat.byte_tx += urb->transfer_buffer_length;
|
|
|
|
else
|
|
|
|
hdev->stat.err_tx++;
|
|
|
|
|
|
|
|
done:
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_lock_irqsave(&data->txlock, flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
data->tx_in_flight--;
|
2018-06-20 05:56:57 +08:00
|
|
|
spin_unlock_irqrestore(&data->txlock, flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
kfree(urb->setup_packet);
|
|
|
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void btusb_isoc_tx_complete(struct urb *urb)
|
2007-10-20 20:12:34 +08:00
|
|
|
{
|
|
|
|
struct sk_buff *skb = urb->context;
|
2014-09-16 10:44:50 +08:00
|
|
|
struct hci_dev *hdev = (struct hci_dev *)skb->dev;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
BT_DBG("%s urb %p status %d count %d", hdev->name, urb, urb->status,
|
|
|
|
urb->actual_length);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
if (!urb->status)
|
|
|
|
hdev->stat.byte_tx += urb->transfer_buffer_length;
|
|
|
|
else
|
|
|
|
hdev->stat.err_tx++;
|
|
|
|
|
|
|
|
done:
|
|
|
|
kfree(urb->setup_packet);
|
|
|
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_open(struct hci_dev *hdev)
|
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2016-10-07 12:06:42 +08:00
|
|
|
err = usb_autopm_get_interface(data->intf);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
2015-02-16 07:06:14 +08:00
|
|
|
/* Patching USB firmware files prior to starting any URBs of HCI path
|
|
|
|
* It is more safe to use USB bulk channel for downloading USB patch
|
|
|
|
*/
|
|
|
|
if (data->setup_on_usb) {
|
|
|
|
err = data->setup_on_usb(hdev);
|
2015-04-17 05:15:50 +08:00
|
|
|
if (err < 0)
|
2019-11-14 23:01:18 +08:00
|
|
|
goto setup_fail;
|
2015-02-16 07:06:14 +08:00
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
data->intf->needs_remote_wakeup = 1;
|
|
|
|
|
2019-08-14 20:02:52 +08:00
|
|
|
/* Disable device remote wakeup when host is suspended
|
|
|
|
* For Realtek chips, global suspend without
|
|
|
|
* SET_FEATURE (DEVICE_REMOTE_WAKEUP) can save more power in device.
|
|
|
|
*/
|
|
|
|
if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags))
|
|
|
|
device_wakeup_disable(&data->udev->dev);
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
|
2009-08-25 05:44:59 +08:00
|
|
|
goto done;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2008-11-30 19:17:10 +08:00
|
|
|
err = btusb_submit_intr_urb(hdev, GFP_KERNEL);
|
2009-02-05 00:41:38 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto failed;
|
|
|
|
|
|
|
|
err = btusb_submit_bulk_urb(hdev, GFP_KERNEL);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (err < 0) {
|
2009-02-05 00:41:38 +08:00
|
|
|
usb_kill_anchored_urbs(&data->intr_anchor);
|
|
|
|
goto failed;
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
2009-02-05 00:41:38 +08:00
|
|
|
set_bit(BTUSB_BULK_RUNNING, &data->flags);
|
|
|
|
btusb_submit_bulk_urb(hdev, GFP_KERNEL);
|
|
|
|
|
2015-10-09 02:23:08 +08:00
|
|
|
if (data->diag) {
|
|
|
|
if (!btusb_submit_diag_urb(hdev, GFP_KERNEL))
|
|
|
|
set_bit(BTUSB_DIAG_RUNNING, &data->flags);
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
done:
|
|
|
|
usb_autopm_put_interface(data->intf);
|
2009-02-05 00:41:38 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
failed:
|
|
|
|
clear_bit(BTUSB_INTR_RUNNING, &data->flags);
|
2019-11-14 23:01:18 +08:00
|
|
|
setup_fail:
|
2009-08-25 05:44:59 +08:00
|
|
|
usb_autopm_put_interface(data->intf);
|
2007-10-20 20:12:34 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
static void btusb_stop_traffic(struct btusb_data *data)
|
|
|
|
{
|
|
|
|
usb_kill_anchored_urbs(&data->intr_anchor);
|
|
|
|
usb_kill_anchored_urbs(&data->bulk_anchor);
|
|
|
|
usb_kill_anchored_urbs(&data->isoc_anchor);
|
2015-10-09 02:23:08 +08:00
|
|
|
usb_kill_anchored_urbs(&data->diag_anchor);
|
2019-06-02 08:02:48 +08:00
|
|
|
usb_kill_anchored_urbs(&data->ctrl_anchor);
|
2009-08-25 05:44:59 +08:00
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static int btusb_close(struct hci_dev *hdev)
|
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2009-08-25 05:44:59 +08:00
|
|
|
int err;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2008-09-23 06:16:36 +08:00
|
|
|
cancel_work_sync(&data->work);
|
2009-11-12 05:32:29 +08:00
|
|
|
cancel_work_sync(&data->waker);
|
2008-09-23 06:16:36 +08:00
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
2007-10-20 20:12:34 +08:00
|
|
|
clear_bit(BTUSB_BULK_RUNNING, &data->flags);
|
|
|
|
clear_bit(BTUSB_INTR_RUNNING, &data->flags);
|
2015-10-09 02:23:08 +08:00
|
|
|
clear_bit(BTUSB_DIAG_RUNNING, &data->flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
btusb_stop_traffic(data);
|
2014-09-16 14:00:29 +08:00
|
|
|
btusb_free_frags(data);
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
err = usb_autopm_get_interface(data->intf);
|
|
|
|
if (err < 0)
|
2009-11-13 21:26:23 +08:00
|
|
|
goto failed;
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
data->intf->needs_remote_wakeup = 0;
|
2019-08-14 20:02:52 +08:00
|
|
|
|
|
|
|
/* Enable remote wake up for auto-suspend */
|
|
|
|
if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags))
|
|
|
|
data->intf->needs_remote_wakeup = 1;
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
usb_autopm_put_interface(data->intf);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2009-11-13 21:26:23 +08:00
|
|
|
failed:
|
|
|
|
usb_scuttle_anchored_urbs(&data->deferred);
|
2007-10-20 20:12:34 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_flush(struct hci_dev *hdev)
|
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
usb_kill_anchored_urbs(&data->tx_anchor);
|
2014-09-16 14:00:29 +08:00
|
|
|
btusb_free_frags(data);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
static struct urb *alloc_ctrl_urb(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 20:12:34 +08:00
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
struct usb_ctrlrequest *dr;
|
|
|
|
struct urb *urb;
|
|
|
|
unsigned int pipe;
|
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
urb = usb_alloc_urb(0, GFP_KERNEL);
|
|
|
|
if (!urb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
dr = kmalloc(sizeof(*dr), GFP_KERNEL);
|
|
|
|
if (!dr) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
dr->bRequestType = data->cmdreq_type;
|
2015-01-29 12:27:34 +08:00
|
|
|
dr->bRequest = data->cmdreq;
|
2014-09-14 15:11:06 +08:00
|
|
|
dr->wIndex = 0;
|
|
|
|
dr->wValue = 0;
|
|
|
|
dr->wLength = __cpu_to_le16(skb->len);
|
2013-10-11 21:19:18 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
pipe = usb_sndctrlpipe(data->udev, 0x00);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
|
2014-09-14 15:11:06 +08:00
|
|
|
skb->data, skb->len, btusb_tx_complete, skb);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
skb->dev = (void *)hdev;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
return urb;
|
|
|
|
}
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
static struct urb *alloc_bulk_urb(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct urb *urb;
|
|
|
|
unsigned int pipe;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
if (!data->bulk_tx_ep)
|
|
|
|
return ERR_PTR(-ENODEV);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
urb = usb_alloc_urb(0, GFP_KERNEL);
|
|
|
|
if (!urb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
pipe = usb_sndbulkpipe(data->udev, data->bulk_tx_ep->bEndpointAddress);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
usb_fill_bulk_urb(urb, data->udev, pipe,
|
|
|
|
skb->data, skb->len, btusb_tx_complete, skb);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
skb->dev = (void *)hdev;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
return urb;
|
|
|
|
}
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
static struct urb *alloc_isoc_urb(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct urb *urb;
|
|
|
|
unsigned int pipe;
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
if (!data->isoc_tx_ep)
|
|
|
|
return ERR_PTR(-ENODEV);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
urb = usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES, GFP_KERNEL);
|
|
|
|
if (!urb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
pipe = usb_sndisocpipe(data->udev, data->isoc_tx_ep->bEndpointAddress);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
usb_fill_int_urb(urb, data->udev, pipe,
|
|
|
|
skb->data, skb->len, btusb_isoc_tx_complete,
|
|
|
|
skb, data->isoc_tx_ep->bInterval);
|
2008-08-18 19:23:52 +08:00
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
urb->transfer_flags = URB_ISO_ASAP;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
if (data->isoc_altsetting == 6)
|
|
|
|
__fill_isoc_descriptor_msbc(urb, skb->len,
|
|
|
|
le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize),
|
|
|
|
data);
|
|
|
|
else
|
|
|
|
__fill_isoc_descriptor(urb, skb->len,
|
|
|
|
le16_to_cpu(data->isoc_tx_ep->wMaxPacketSize));
|
2014-09-16 10:44:50 +08:00
|
|
|
skb->dev = (void *)hdev;
|
2014-09-14 15:11:06 +08:00
|
|
|
|
|
|
|
return urb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int submit_tx_urb(struct hci_dev *hdev, struct urb *urb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
int err;
|
2009-08-25 05:44:59 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
usb_anchor_urb(urb, &data->tx_anchor);
|
|
|
|
|
2014-09-14 13:49:34 +08:00
|
|
|
err = usb_submit_urb(urb, GFP_KERNEL);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (err < 0) {
|
2011-10-09 18:12:16 +08:00
|
|
|
if (err != -EPERM && err != -ENODEV)
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
2007-10-20 20:12:34 +08:00
|
|
|
kfree(urb->setup_packet);
|
|
|
|
usb_unanchor_urb(urb);
|
2009-08-25 05:44:59 +08:00
|
|
|
} else {
|
|
|
|
usb_mark_last_busy(data->udev);
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
2011-11-22 09:32:57 +08:00
|
|
|
usb_free_urb(urb);
|
2007-10-20 20:12:34 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2014-09-14 15:11:06 +08:00
|
|
|
static int submit_or_queue_tx_urb(struct hci_dev *hdev, struct urb *urb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
unsigned long flags;
|
|
|
|
bool suspending;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&data->txlock, flags);
|
|
|
|
suspending = test_bit(BTUSB_SUSPENDING, &data->flags);
|
|
|
|
if (!suspending)
|
|
|
|
data->tx_in_flight++;
|
|
|
|
spin_unlock_irqrestore(&data->txlock, flags);
|
|
|
|
|
|
|
|
if (!suspending)
|
|
|
|
return submit_tx_urb(hdev, urb);
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->deferred);
|
|
|
|
schedule_work(&data->waker);
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct urb *urb;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
switch (hci_skb_pkt_type(skb)) {
|
2014-09-14 15:11:06 +08:00
|
|
|
case HCI_COMMAND_PKT:
|
|
|
|
urb = alloc_ctrl_urb(hdev, skb);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.cmd_tx++;
|
|
|
|
return submit_or_queue_tx_urb(hdev, urb);
|
|
|
|
|
|
|
|
case HCI_ACLDATA_PKT:
|
|
|
|
urb = alloc_bulk_urb(hdev, skb);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.acl_tx++;
|
|
|
|
return submit_or_queue_tx_urb(hdev, urb);
|
|
|
|
|
|
|
|
case HCI_SCODATA_PKT:
|
|
|
|
if (hci_conn_num(hdev, SCO_LINK) < 1)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
urb = alloc_isoc_urb(hdev, skb);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.sco_tx++;
|
|
|
|
return submit_tx_urb(hdev, urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -EILSEQ;
|
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static void btusb_notify(struct hci_dev *hdev, unsigned int evt)
|
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
BT_DBG("%s evt %d", hdev->name, evt);
|
|
|
|
|
2013-10-11 00:47:55 +08:00
|
|
|
if (hci_conn_num(hdev, SCO_LINK) != data->sco_num) {
|
|
|
|
data->sco_num = hci_conn_num(hdev, SCO_LINK);
|
2020-04-04 03:43:59 +08:00
|
|
|
data->air_mode = evt;
|
2009-02-05 00:41:38 +08:00
|
|
|
schedule_work(&data->work);
|
2008-11-30 19:17:12 +08:00
|
|
|
}
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
2011-01-17 07:09:38 +08:00
|
|
|
static inline int __set_isoc_interface(struct hci_dev *hdev, int altsetting)
|
2008-08-18 19:23:52 +08:00
|
|
|
{
|
2012-02-10 04:58:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2008-08-18 19:23:52 +08:00
|
|
|
struct usb_interface *intf = data->isoc;
|
|
|
|
struct usb_endpoint_descriptor *ep_desc;
|
|
|
|
int i, err;
|
|
|
|
|
|
|
|
if (!data->isoc)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2017-10-25 01:42:45 +08:00
|
|
|
err = usb_set_interface(data->udev, data->isoc_ifnum, altsetting);
|
2008-08-18 19:23:52 +08:00
|
|
|
if (err < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "setting interface failed (%d)", -err);
|
2008-08-18 19:23:52 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
data->isoc_altsetting = altsetting;
|
|
|
|
|
|
|
|
data->isoc_tx_ep = NULL;
|
|
|
|
data->isoc_rx_ep = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
|
|
|
|
ep_desc = &intf->cur_altsetting->endpoint[i].desc;
|
|
|
|
|
|
|
|
if (!data->isoc_tx_ep && usb_endpoint_is_isoc_out(ep_desc)) {
|
|
|
|
data->isoc_tx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->isoc_rx_ep && usb_endpoint_is_isoc_in(ep_desc)) {
|
|
|
|
data->isoc_rx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->isoc_tx_ep || !data->isoc_rx_ep) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "invalid SCO descriptors");
|
2008-08-18 19:23:52 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
static int btusb_switch_alt_setting(struct hci_dev *hdev, int new_alts)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (data->isoc_altsetting != new_alts) {
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
|
|
|
usb_kill_anchored_urbs(&data->isoc_anchor);
|
|
|
|
|
|
|
|
/* When isochronous alternate setting needs to be
|
|
|
|
* changed, because SCO connection has been added
|
|
|
|
* or removed, a packet fragment may be left in the
|
|
|
|
* reassembling state. This could lead to wrongly
|
|
|
|
* assembled fragments.
|
|
|
|
*
|
|
|
|
* Clear outstanding fragment when selecting a new
|
|
|
|
* alternate setting.
|
|
|
|
*/
|
|
|
|
spin_lock_irqsave(&data->rxlock, flags);
|
|
|
|
kfree_skb(data->sco_skb);
|
|
|
|
data->sco_skb = NULL;
|
|
|
|
spin_unlock_irqrestore(&data->rxlock, flags);
|
|
|
|
|
|
|
|
err = __set_isoc_interface(hdev, new_alts);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_and_set_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
|
|
|
|
if (btusb_submit_isoc_urb(hdev, GFP_KERNEL) < 0)
|
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
|
|
|
else
|
|
|
|
btusb_submit_isoc_urb(hdev, GFP_KERNEL);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct usb_host_interface *btusb_find_altsetting(struct btusb_data *data,
|
|
|
|
int alt)
|
|
|
|
{
|
|
|
|
struct usb_interface *intf = data->isoc;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
BT_DBG("Looking for Alt no :%d", alt);
|
|
|
|
|
2020-04-08 13:27:03 +08:00
|
|
|
if (!intf)
|
|
|
|
return NULL;
|
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
for (i = 0; i < intf->num_altsetting; i++) {
|
|
|
|
if (intf->altsetting[i].desc.bAlternateSetting == alt)
|
|
|
|
return &intf->altsetting[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static void btusb_work(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = container_of(work, struct btusb_data, work);
|
|
|
|
struct hci_dev *hdev = data->hdev;
|
2020-04-04 03:43:59 +08:00
|
|
|
int new_alts = 0;
|
2009-08-25 05:44:59 +08:00
|
|
|
int err;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2013-10-11 00:47:55 +08:00
|
|
|
if (data->sco_num > 0) {
|
2010-07-17 04:20:33 +08:00
|
|
|
if (!test_bit(BTUSB_DID_ISO_RESUME, &data->flags)) {
|
2011-02-11 20:00:06 +08:00
|
|
|
err = usb_autopm_get_interface(data->isoc ? data->isoc : data->intf);
|
2009-08-25 05:44:59 +08:00
|
|
|
if (err < 0) {
|
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
|
|
|
usb_kill_anchored_urbs(&data->isoc_anchor);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-07-17 04:20:33 +08:00
|
|
|
set_bit(BTUSB_DID_ISO_RESUME, &data->flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
}
|
2012-04-11 14:48:51 +08:00
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
if (data->air_mode == HCI_NOTIFY_ENABLE_SCO_CVSD) {
|
|
|
|
if (hdev->voice_setting & 0x0020) {
|
|
|
|
static const int alts[3] = { 2, 4, 5 };
|
2012-04-11 14:48:51 +08:00
|
|
|
|
2020-04-04 03:43:59 +08:00
|
|
|
new_alts = alts[data->sco_num - 1];
|
|
|
|
} else {
|
|
|
|
new_alts = data->sco_num;
|
|
|
|
}
|
|
|
|
} else if (data->air_mode == HCI_NOTIFY_ENABLE_SCO_TRANSP) {
|
Bluetooth: btusb: Always fallback to alt 1 for WBS
When alt mode 6 is not available, fallback to the kernel <= 5.7 behavior
of always using alt mode 1.
Prior to kernel 5.8, btusb would always use alt mode 1 for WBS (Wide
Band Speech aka mSBC aka transparent SCO). In commit baac6276c0a9
("Bluetooth: btusb: handle mSBC audio over USB Endpoints") this
was changed to use alt mode 6, which is the recommended mode in the
Bluetooth spec (Specifications of the Bluetooth System, v5.0, Vol 4.B
§2.2.1). However, many if not most BT USB adapters do not support alt
mode 6. In fact, I have been unable to find any which do.
In kernel 5.8, this was changed to use alt mode 6, and if not available,
use alt mode 0. But mode 0 has a zero byte max packet length and can
not possibly work. It is just there as a zero-bandwidth dummy mode to
work around a USB flaw that would prevent device enumeration if
insufficient bandwidth were available for the lowest isoc mode
supported.
In effect, WBS was broken for all USB-BT adapters that do not support
alt 6, which appears to nearly all of them.
Then in commit 461f95f04f19 ("Bluetooth: btusb: USB alternate setting 1 for
WBS") the 5.7 behavior was restored, but only for Realtek adapters.
I've tested a Broadcom BRCM20702A and CSR 8510 adapter, both work with
the 5.7 behavior and do not with the 5.8.
So get rid of the Realtek specific flag and use the 5.7 behavior for all
adapters as a fallback when alt 6 is not available. This was the
kernel's behavior prior to 5.8 and I can find no adapters for which it
is not correct. And even if there is an adapter for which this does not
work, the current behavior would be to fall back to alt 0, which can not
possibly work either, and so is no better.
Signed-off-by: Trent Piepho <tpiepho@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-12-10 09:20:03 +08:00
|
|
|
/* Bluetooth USB spec recommends alt 6 (63 bytes), but
|
|
|
|
* many adapters do not support it. Alt 1 appears to
|
|
|
|
* work for all adapters that do not have alt 6, and
|
|
|
|
* which work with WBS at all.
|
|
|
|
*/
|
|
|
|
new_alts = btusb_find_altsetting(data, 6) ? 6 : 1;
|
2008-08-18 19:23:52 +08:00
|
|
|
}
|
2020-04-04 03:43:59 +08:00
|
|
|
|
|
|
|
if (btusb_switch_alt_setting(hdev, new_alts) < 0)
|
|
|
|
bt_dev_err(hdev, "set USB alt:(%d) failed!", new_alts);
|
2008-08-18 19:23:52 +08:00
|
|
|
} else {
|
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
|
|
|
usb_kill_anchored_urbs(&data->isoc_anchor);
|
|
|
|
|
|
|
|
__set_isoc_interface(hdev, 0);
|
2010-07-17 04:20:33 +08:00
|
|
|
if (test_and_clear_bit(BTUSB_DID_ISO_RESUME, &data->flags))
|
2011-02-11 20:00:06 +08:00
|
|
|
usb_autopm_put_interface(data->isoc ? data->isoc : data->intf);
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
static void btusb_waker(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = container_of(work, struct btusb_data, waker);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = usb_autopm_get_interface(data->intf);
|
|
|
|
if (err < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
usb_autopm_put_interface(data->intf);
|
|
|
|
}
|
|
|
|
|
2013-04-10 23:11:35 +08:00
|
|
|
static int btusb_setup_bcm92035(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
u8 val = 0x00;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc3b, 1, &val, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb))
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "BCM92035 command failed (%ld)", PTR_ERR(skb));
|
2013-04-10 23:11:35 +08:00
|
|
|
else
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-03 19:02:36 +08:00
|
|
|
static int btusb_setup_csr(struct hci_dev *hdev)
|
|
|
|
{
|
2020-12-05 23:02:00 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
u16 bcdDevice = le16_to_cpu(data->udev->descriptor.bcdDevice);
|
2014-01-03 19:02:36 +08:00
|
|
|
struct hci_rp_read_local_version *rp;
|
|
|
|
struct sk_buff *skb;
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
bool is_fake = false;
|
Bluetooth: btusb: Add workaround for remote-wakeup issues with Barrot 8041a02 fake CSR controllers
With the recent btusb change to detect and deal with more fake CSR
controllers, I decided to see if fake CSR controllers with Barrot
8041a02 chips would now work.
After much experimentation I came to the conclusion that it works, if I
have autosuspend enabled initially and then disable it after the device
has suspended at least once. Yes this is very weird, but I've tried many
things, like manually clearing the remote-wakeup feature. Doing a
runtime-resume + runtime suspend is the only way to get the receiver
to actually report received data (and/or pairing info) through its
bulk rx endpoint.
But the funkyness of the bulk-endpoint does not stop there, I mainly
found out about this problem, because with autosuspend enabled
(which usually ensures the suspend at least once condition is met),
the receiver stops reporting received data through its bulk rx endpoint
as soon as autosuspend kicks in. So I initially just disabled
autosuspend, but then the receiver does not work at all.
This was with a fake CSR receiver with a Barrot 8041a02 chip with a
bcdDevice value of 0x8891, a lmp_subver of 0x1012, a hci_rev of 0x0810
and a hci_ver of BLUETOOTH_VER_4_0.
Summarizing this specific fake CSR receiver has the following 2 issues:
1. The bulk rx endpoint will never report any data unless
the device was suspended at least once.
2. They will not wakeup when autosuspended and receiving data on their
bulk rx endpoint from e.g. a keyboard or mouse (IOW remote-wakeup support
is broken for the bulk endpoint).
Add a workaround for 1. which enables runtime-suspend, force-suspends
the hci and then wakes-it up by disabling runtime-suspend again.
Add a workaround for 2. which clears the hci's can_wake flag, this way
the hci will still be autosuspended when it is not open.
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
2020-12-05 23:02:01 +08:00
|
|
|
int ret;
|
2014-01-03 19:02:36 +08:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2015-06-07 16:01:02 +08:00
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
|
|
|
|
HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
int err = PTR_ERR(skb);
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "CSR: Local version failed (%d)", err);
|
2015-06-07 16:01:02 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (skb->len != sizeof(struct hci_rp_read_local_version)) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "CSR: Local version length mismatch");
|
2015-06-07 16:01:02 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
return -EIO;
|
|
|
|
}
|
2014-01-03 19:02:36 +08:00
|
|
|
|
2014-09-16 10:44:50 +08:00
|
|
|
rp = (struct hci_rp_read_local_version *)skb->data;
|
2014-01-03 19:02:36 +08:00
|
|
|
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
/* Detect a wide host of Chinese controllers that aren't CSR.
|
|
|
|
*
|
|
|
|
* Known fake bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
|
|
|
|
*
|
|
|
|
* The main thing they have in common is that these are really popular low-cost
|
|
|
|
* options that support newer Bluetooth versions but rely on heavy VID/PID
|
|
|
|
* squatting of this poor old Bluetooth 1.1 device. Even sold as such.
|
|
|
|
*
|
|
|
|
* We detect actual CSR devices by checking that the HCI manufacturer code
|
|
|
|
* is Cambridge Silicon Radio (10) and ensuring that LMP sub-version and
|
|
|
|
* HCI rev values always match. As they both store the firmware number.
|
|
|
|
*/
|
2015-08-31 02:47:21 +08:00
|
|
|
if (le16_to_cpu(rp->manufacturer) != 10 ||
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
le16_to_cpu(rp->hci_rev) != le16_to_cpu(rp->lmp_subver))
|
|
|
|
is_fake = true;
|
|
|
|
|
|
|
|
/* Known legit CSR firmware build numbers and their supported BT versions:
|
|
|
|
* - 1.1 (0x1) -> 0x0073, 0x020d, 0x033c, 0x034e
|
|
|
|
* - 1.2 (0x2) -> 0x04d9, 0x0529
|
|
|
|
* - 2.0 (0x3) -> 0x07a6, 0x07ad, 0x0c5c
|
|
|
|
* - 2.1 (0x4) -> 0x149c, 0x1735, 0x1899 (0x1899 is a BlueCore4-External)
|
|
|
|
* - 4.0 (0x6) -> 0x1d86, 0x2031, 0x22bb
|
|
|
|
*
|
|
|
|
* e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
|
|
|
|
* support BT 1.1 only; so it's a dead giveaway when some
|
|
|
|
* third-party BT 4.0 dongle reuses it.
|
|
|
|
*/
|
|
|
|
else if (le16_to_cpu(rp->lmp_subver) <= 0x034e &&
|
|
|
|
le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_1_1)
|
|
|
|
is_fake = true;
|
|
|
|
|
|
|
|
else if (le16_to_cpu(rp->lmp_subver) <= 0x0529 &&
|
|
|
|
le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_1_2)
|
|
|
|
is_fake = true;
|
|
|
|
|
|
|
|
else if (le16_to_cpu(rp->lmp_subver) <= 0x0c5c &&
|
|
|
|
le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_2_0)
|
|
|
|
is_fake = true;
|
|
|
|
|
|
|
|
else if (le16_to_cpu(rp->lmp_subver) <= 0x1899 &&
|
|
|
|
le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_2_1)
|
|
|
|
is_fake = true;
|
|
|
|
|
|
|
|
else if (le16_to_cpu(rp->lmp_subver) <= 0x22bb &&
|
|
|
|
le16_to_cpu(rp->hci_ver) > BLUETOOTH_VER_4_0)
|
|
|
|
is_fake = true;
|
|
|
|
|
2020-12-05 23:02:00 +08:00
|
|
|
/* Other clones which beat all the above checks */
|
|
|
|
else if (bcdDevice == 0x0134 &&
|
|
|
|
le16_to_cpu(rp->lmp_subver) == 0x0c5c &&
|
|
|
|
le16_to_cpu(rp->hci_ver) == BLUETOOTH_VER_2_0)
|
|
|
|
is_fake = true;
|
|
|
|
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
if (is_fake) {
|
|
|
|
bt_dev_warn(hdev, "CSR: Unbranded CSR clone detected; adding workarounds...");
|
|
|
|
|
|
|
|
/* Generally these clones have big discrepancies between
|
|
|
|
* advertised features and what's actually supported.
|
|
|
|
* Probably will need to be expanded in the future;
|
|
|
|
* without these the controller will lock up.
|
|
|
|
*/
|
|
|
|
set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
|
|
|
|
set_bit(HCI_QUIRK_BROKEN_ERR_DATA_REPORTING, &hdev->quirks);
|
|
|
|
|
2015-06-07 16:01:01 +08:00
|
|
|
/* Clear the reset quirk since this is not an actual
|
|
|
|
* early Bluetooth 1.1 device from CSR.
|
|
|
|
*/
|
|
|
|
clear_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
clear_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
Bluetooth: btusb: Add workaround for remote-wakeup issues with Barrot 8041a02 fake CSR controllers
With the recent btusb change to detect and deal with more fake CSR
controllers, I decided to see if fake CSR controllers with Barrot
8041a02 chips would now work.
After much experimentation I came to the conclusion that it works, if I
have autosuspend enabled initially and then disable it after the device
has suspended at least once. Yes this is very weird, but I've tried many
things, like manually clearing the remote-wakeup feature. Doing a
runtime-resume + runtime suspend is the only way to get the receiver
to actually report received data (and/or pairing info) through its
bulk rx endpoint.
But the funkyness of the bulk-endpoint does not stop there, I mainly
found out about this problem, because with autosuspend enabled
(which usually ensures the suspend at least once condition is met),
the receiver stops reporting received data through its bulk rx endpoint
as soon as autosuspend kicks in. So I initially just disabled
autosuspend, but then the receiver does not work at all.
This was with a fake CSR receiver with a Barrot 8041a02 chip with a
bcdDevice value of 0x8891, a lmp_subver of 0x1012, a hci_rev of 0x0810
and a hci_ver of BLUETOOTH_VER_4_0.
Summarizing this specific fake CSR receiver has the following 2 issues:
1. The bulk rx endpoint will never report any data unless
the device was suspended at least once.
2. They will not wakeup when autosuspended and receiving data on their
bulk rx endpoint from e.g. a keyboard or mouse (IOW remote-wakeup support
is broken for the bulk endpoint).
Add a workaround for 1. which enables runtime-suspend, force-suspends
the hci and then wakes-it up by disabling runtime-suspend again.
Add a workaround for 2. which clears the hci's can_wake flag, this way
the hci will still be autosuspended when it is not open.
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
2020-12-05 23:02:01 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Special workaround for clones with a Barrot 8041a02 chip,
|
|
|
|
* these clones are really messed-up:
|
|
|
|
* 1. Their bulk rx endpoint will never report any data unless
|
|
|
|
* the device was suspended at least once (yes really).
|
|
|
|
* 2. They will not wakeup when autosuspended and receiving data
|
|
|
|
* on their bulk rx endpoint from e.g. a keyboard or mouse
|
|
|
|
* (IOW remote-wakeup support is broken for the bulk endpoint).
|
|
|
|
*
|
|
|
|
* To fix 1. enable runtime-suspend, force-suspend the
|
|
|
|
* hci and then wake-it up by disabling runtime-suspend.
|
|
|
|
*
|
|
|
|
* To fix 2. clear the hci's can_wake flag, this way the hci
|
|
|
|
* will still be autosuspended when it is not open.
|
|
|
|
*/
|
|
|
|
if (bcdDevice == 0x8891 &&
|
|
|
|
le16_to_cpu(rp->lmp_subver) == 0x1012 &&
|
|
|
|
le16_to_cpu(rp->hci_rev) == 0x0810 &&
|
|
|
|
le16_to_cpu(rp->hci_ver) == BLUETOOTH_VER_4_0) {
|
2020-12-22 18:31:49 +08:00
|
|
|
bt_dev_warn(hdev, "CSR: detected a fake CSR dongle using a Barrot 8041a02 chip, this chip is very buggy and may have issues");
|
Bluetooth: btusb: Add workaround for remote-wakeup issues with Barrot 8041a02 fake CSR controllers
With the recent btusb change to detect and deal with more fake CSR
controllers, I decided to see if fake CSR controllers with Barrot
8041a02 chips would now work.
After much experimentation I came to the conclusion that it works, if I
have autosuspend enabled initially and then disable it after the device
has suspended at least once. Yes this is very weird, but I've tried many
things, like manually clearing the remote-wakeup feature. Doing a
runtime-resume + runtime suspend is the only way to get the receiver
to actually report received data (and/or pairing info) through its
bulk rx endpoint.
But the funkyness of the bulk-endpoint does not stop there, I mainly
found out about this problem, because with autosuspend enabled
(which usually ensures the suspend at least once condition is met),
the receiver stops reporting received data through its bulk rx endpoint
as soon as autosuspend kicks in. So I initially just disabled
autosuspend, but then the receiver does not work at all.
This was with a fake CSR receiver with a Barrot 8041a02 chip with a
bcdDevice value of 0x8891, a lmp_subver of 0x1012, a hci_rev of 0x0810
and a hci_ver of BLUETOOTH_VER_4_0.
Summarizing this specific fake CSR receiver has the following 2 issues:
1. The bulk rx endpoint will never report any data unless
the device was suspended at least once.
2. They will not wakeup when autosuspended and receiving data on their
bulk rx endpoint from e.g. a keyboard or mouse (IOW remote-wakeup support
is broken for the bulk endpoint).
Add a workaround for 1. which enables runtime-suspend, force-suspends
the hci and then wakes-it up by disabling runtime-suspend again.
Add a workaround for 2. which clears the hci's can_wake flag, this way
the hci will still be autosuspended when it is not open.
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
2020-12-05 23:02:01 +08:00
|
|
|
|
|
|
|
pm_runtime_allow(&data->udev->dev);
|
|
|
|
|
|
|
|
ret = pm_runtime_suspend(&data->udev->dev);
|
|
|
|
if (ret >= 0)
|
|
|
|
msleep(200);
|
|
|
|
else
|
2020-12-22 18:31:49 +08:00
|
|
|
bt_dev_err(hdev, "Failed to suspend the device for Barrot 8041a02 receive-issue workaround");
|
Bluetooth: btusb: Add workaround for remote-wakeup issues with Barrot 8041a02 fake CSR controllers
With the recent btusb change to detect and deal with more fake CSR
controllers, I decided to see if fake CSR controllers with Barrot
8041a02 chips would now work.
After much experimentation I came to the conclusion that it works, if I
have autosuspend enabled initially and then disable it after the device
has suspended at least once. Yes this is very weird, but I've tried many
things, like manually clearing the remote-wakeup feature. Doing a
runtime-resume + runtime suspend is the only way to get the receiver
to actually report received data (and/or pairing info) through its
bulk rx endpoint.
But the funkyness of the bulk-endpoint does not stop there, I mainly
found out about this problem, because with autosuspend enabled
(which usually ensures the suspend at least once condition is met),
the receiver stops reporting received data through its bulk rx endpoint
as soon as autosuspend kicks in. So I initially just disabled
autosuspend, but then the receiver does not work at all.
This was with a fake CSR receiver with a Barrot 8041a02 chip with a
bcdDevice value of 0x8891, a lmp_subver of 0x1012, a hci_rev of 0x0810
and a hci_ver of BLUETOOTH_VER_4_0.
Summarizing this specific fake CSR receiver has the following 2 issues:
1. The bulk rx endpoint will never report any data unless
the device was suspended at least once.
2. They will not wakeup when autosuspended and receiving data on their
bulk rx endpoint from e.g. a keyboard or mouse (IOW remote-wakeup support
is broken for the bulk endpoint).
Add a workaround for 1. which enables runtime-suspend, force-suspends
the hci and then wakes-it up by disabling runtime-suspend again.
Add a workaround for 2. which clears the hci's can_wake flag, this way
the hci will still be autosuspended when it is not open.
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
2020-12-05 23:02:01 +08:00
|
|
|
|
|
|
|
pm_runtime_forbid(&data->udev->dev);
|
|
|
|
|
|
|
|
device_set_wakeup_capable(&data->udev->dev, false);
|
|
|
|
/* Re-enable autosuspend if this was requested */
|
|
|
|
if (enable_autosuspend)
|
|
|
|
usb_enable_autosuspend(data->udev);
|
|
|
|
}
|
2015-06-07 16:01:01 +08:00
|
|
|
}
|
2014-01-03 19:02:36 +08:00
|
|
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
2015-06-07 16:01:01 +08:00
|
|
|
return 0;
|
2014-01-03 19:02:36 +08:00
|
|
|
}
|
|
|
|
|
2013-04-20 00:57:43 +08:00
|
|
|
static const struct firmware *btusb_setup_intel_get_fw(struct hci_dev *hdev,
|
2014-09-16 10:44:50 +08:00
|
|
|
struct intel_version *ver)
|
2013-04-20 00:57:43 +08:00
|
|
|
{
|
|
|
|
const struct firmware *fw;
|
|
|
|
char fwname[64];
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
snprintf(fwname, sizeof(fwname),
|
|
|
|
"intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
|
|
|
|
ver->hw_platform, ver->hw_variant, ver->hw_revision,
|
|
|
|
ver->fw_variant, ver->fw_revision, ver->fw_build_num,
|
|
|
|
ver->fw_build_ww, ver->fw_build_yy);
|
|
|
|
|
|
|
|
ret = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (ret < 0) {
|
|
|
|
if (ret == -EINVAL) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Intel firmware file request failed (%d)",
|
|
|
|
ret);
|
2013-04-20 00:57:43 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "failed to open Intel firmware file: %s (%d)",
|
|
|
|
fwname, ret);
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
/* If the correct firmware patch file is not found, use the
|
|
|
|
* default firmware patch file instead
|
|
|
|
*/
|
|
|
|
snprintf(fwname, sizeof(fwname), "intel/ibt-hw-%x.%x.bseq",
|
|
|
|
ver->hw_platform, ver->hw_variant);
|
|
|
|
if (request_firmware(&fw, fwname, &hdev->dev) < 0) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "failed to open default fw file: %s",
|
|
|
|
fwname);
|
2013-04-20 00:57:43 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Intel Bluetooth firmware file: %s", fwname);
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
return fw;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_intel_patching(struct hci_dev *hdev,
|
|
|
|
const struct firmware *fw,
|
|
|
|
const u8 **fw_ptr, int *disable_patch)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct hci_command_hdr *cmd;
|
|
|
|
const u8 *cmd_param;
|
|
|
|
struct hci_event_hdr *evt = NULL;
|
|
|
|
const u8 *evt_param = NULL;
|
|
|
|
int remain = fw->size - (*fw_ptr - fw->data);
|
|
|
|
|
|
|
|
/* The first byte indicates the types of the patch command or event.
|
|
|
|
* 0x01 means HCI command and 0x02 is HCI event. If the first bytes
|
|
|
|
* in the current firmware buffer doesn't start with 0x01 or
|
|
|
|
* the size of remain buffer is smaller than HCI command header,
|
|
|
|
* the firmware file is corrupted and it should stop the patching
|
|
|
|
* process.
|
|
|
|
*/
|
|
|
|
if (remain > HCI_COMMAND_HDR_SIZE && *fw_ptr[0] != 0x01) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Intel fw corrupted: invalid cmd read");
|
2013-04-20 00:57:43 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
(*fw_ptr)++;
|
|
|
|
remain--;
|
|
|
|
|
|
|
|
cmd = (struct hci_command_hdr *)(*fw_ptr);
|
|
|
|
*fw_ptr += sizeof(*cmd);
|
|
|
|
remain -= sizeof(*cmd);
|
|
|
|
|
|
|
|
/* Ensure that the remain firmware data is long enough than the length
|
|
|
|
* of command parameter. If not, the firmware file is corrupted.
|
|
|
|
*/
|
|
|
|
if (remain < cmd->plen) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Intel fw corrupted: invalid cmd len");
|
2013-04-20 00:57:43 +08:00
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If there is a command that loads a patch in the firmware
|
|
|
|
* file, then enable the patch upon success, otherwise just
|
|
|
|
* disable the manufacturer mode, for example patch activation
|
|
|
|
* is not required when the default firmware patch file is used
|
|
|
|
* because there are no patch data to load.
|
|
|
|
*/
|
|
|
|
if (*disable_patch && le16_to_cpu(cmd->opcode) == 0xfc8e)
|
|
|
|
*disable_patch = 0;
|
|
|
|
|
|
|
|
cmd_param = *fw_ptr;
|
|
|
|
*fw_ptr += cmd->plen;
|
|
|
|
remain -= cmd->plen;
|
|
|
|
|
|
|
|
/* This reads the expected events when the above command is sent to the
|
|
|
|
* device. Some vendor commands expects more than one events, for
|
|
|
|
* example command status event followed by vendor specific event.
|
|
|
|
* For this case, it only keeps the last expected event. so the command
|
|
|
|
* can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
|
|
|
|
* last expected event.
|
|
|
|
*/
|
|
|
|
while (remain > HCI_EVENT_HDR_SIZE && *fw_ptr[0] == 0x02) {
|
|
|
|
(*fw_ptr)++;
|
|
|
|
remain--;
|
|
|
|
|
|
|
|
evt = (struct hci_event_hdr *)(*fw_ptr);
|
|
|
|
*fw_ptr += sizeof(*evt);
|
|
|
|
remain -= sizeof(*evt);
|
|
|
|
|
|
|
|
if (remain < evt->plen) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Intel fw corrupted: invalid evt len");
|
2013-04-20 00:57:43 +08:00
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
evt_param = *fw_ptr;
|
|
|
|
*fw_ptr += evt->plen;
|
|
|
|
remain -= evt->plen;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Every HCI commands in the firmware file has its correspond event.
|
|
|
|
* If event is not found or remain is smaller than zero, the firmware
|
|
|
|
* file is corrupted.
|
|
|
|
*/
|
|
|
|
if (!evt || !evt_param || remain < 0) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Intel fw corrupted: invalid evt read");
|
2013-04-20 00:57:43 +08:00
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync_ev(hdev, le16_to_cpu(cmd->opcode), cmd->plen,
|
|
|
|
cmd_param, evt->evt, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "sending Intel patch command (0x%4.4x) failed (%ld)",
|
|
|
|
cmd->opcode, PTR_ERR(skb));
|
2013-07-10 10:02:12 +08:00
|
|
|
return PTR_ERR(skb);
|
2013-04-20 00:57:43 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* It ensures that the returned event matches the event data read from
|
|
|
|
* the firmware file. At fist, it checks the length and then
|
|
|
|
* the contents of the event.
|
|
|
|
*/
|
|
|
|
if (skb->len != evt->plen) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "mismatch event length (opcode 0x%4.4x)",
|
|
|
|
le16_to_cpu(cmd->opcode));
|
2013-04-20 00:57:43 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(skb->data, evt_param, evt->plen)) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "mismatch event parameter (opcode 0x%4.4x)",
|
|
|
|
le16_to_cpu(cmd->opcode));
|
2013-04-20 00:57:43 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_intel(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
const struct firmware *fw;
|
|
|
|
const u8 *fw_ptr;
|
2015-12-03 23:10:22 +08:00
|
|
|
int disable_patch, err;
|
2015-12-06 23:18:34 +08:00
|
|
|
struct intel_version ver;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
/* The controller has a bug with the first HCI command sent to it
|
|
|
|
* returning number of completed commands as zero. This would stall the
|
|
|
|
* command processing in the Bluetooth core.
|
|
|
|
*
|
|
|
|
* As a workaround, send HCI Reset command first which will reset the
|
|
|
|
* number of completed commands and allow normal command processing
|
|
|
|
* from now on.
|
|
|
|
*/
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "sending initial HCI reset command failed (%ld)",
|
|
|
|
PTR_ERR(skb));
|
2013-07-10 10:02:12 +08:00
|
|
|
return PTR_ERR(skb);
|
2013-04-20 00:57:43 +08:00
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
/* Read Intel specific controller version first to allow selection of
|
|
|
|
* which firmware file to load.
|
|
|
|
*
|
|
|
|
* The returned information are hardware variant and revision plus
|
|
|
|
* firmware variant, revision and build number.
|
|
|
|
*/
|
2015-12-06 23:18:34 +08:00
|
|
|
err = btintel_read_version(hdev, &ver);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
|
ver.hw_platform, ver.hw_variant, ver.hw_revision,
|
|
|
|
ver.fw_variant, ver.fw_revision, ver.fw_build_num,
|
|
|
|
ver.fw_build_ww, ver.fw_build_yy, ver.fw_patch_num);
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
/* fw_patch_num indicates the version of patch the device currently
|
|
|
|
* have. If there is no patch data in the device, it is always 0x00.
|
2015-08-27 12:21:52 +08:00
|
|
|
* So, if it is other than 0x00, no need to patch the device again.
|
2013-04-20 00:57:43 +08:00
|
|
|
*/
|
2015-12-06 23:18:34 +08:00
|
|
|
if (ver.fw_patch_num) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Intel device is already patched. "
|
|
|
|
"patch num: %02x", ver.fw_patch_num);
|
2015-10-21 08:45:19 +08:00
|
|
|
goto complete;
|
2013-04-20 00:57:43 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Opens the firmware patch file based on the firmware version read
|
|
|
|
* from the controller. If it fails to open the matching firmware
|
|
|
|
* patch file, it tries to open the default firmware patch file.
|
|
|
|
* If no patch file is found, allow the device to operate without
|
|
|
|
* a patch.
|
|
|
|
*/
|
2015-12-06 23:18:34 +08:00
|
|
|
fw = btusb_setup_intel_get_fw(hdev, &ver);
|
|
|
|
if (!fw)
|
2015-10-21 08:45:19 +08:00
|
|
|
goto complete;
|
2013-04-20 00:57:43 +08:00
|
|
|
fw_ptr = fw->data;
|
|
|
|
|
2015-12-03 23:10:22 +08:00
|
|
|
/* Enable the manufacturer mode of the controller.
|
2013-04-20 00:57:43 +08:00
|
|
|
* Only while this mode is enabled, the driver can download the
|
|
|
|
* firmware patch data and configuration parameters.
|
|
|
|
*/
|
2015-12-03 23:10:22 +08:00
|
|
|
err = btintel_enter_mfg(hdev);
|
|
|
|
if (err) {
|
2013-04-20 00:57:43 +08:00
|
|
|
release_firmware(fw);
|
2015-12-03 23:10:22 +08:00
|
|
|
return err;
|
2013-04-20 00:57:43 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
disable_patch = 1;
|
|
|
|
|
|
|
|
/* The firmware data file consists of list of Intel specific HCI
|
|
|
|
* commands and its expected events. The first byte indicates the
|
|
|
|
* type of the message, either HCI command or HCI event.
|
|
|
|
*
|
|
|
|
* It reads the command and its expected event from the firmware file,
|
|
|
|
* and send to the controller. Once __hci_cmd_sync_ev() returns,
|
|
|
|
* the returned event is compared with the event read from the firmware
|
|
|
|
* file and it will continue until all the messages are downloaded to
|
|
|
|
* the controller.
|
|
|
|
*
|
|
|
|
* Once the firmware patching is completed successfully,
|
|
|
|
* the manufacturer mode is disabled with reset and activating the
|
|
|
|
* downloaded patch.
|
|
|
|
*
|
|
|
|
* If the firmware patching fails, the manufacturer mode is
|
|
|
|
* disabled with reset and deactivating the patch.
|
|
|
|
*
|
|
|
|
* If the default patch file is used, no reset is done when disabling
|
|
|
|
* the manufacturer.
|
|
|
|
*/
|
|
|
|
while (fw->size > fw_ptr - fw->data) {
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = btusb_setup_intel_patching(hdev, fw, &fw_ptr,
|
|
|
|
&disable_patch);
|
|
|
|
if (ret < 0)
|
|
|
|
goto exit_mfg_deactivate;
|
|
|
|
}
|
|
|
|
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
if (disable_patch)
|
|
|
|
goto exit_mfg_disable;
|
|
|
|
|
|
|
|
/* Patching completed successfully and disable the manufacturer mode
|
|
|
|
* with reset and activate the downloaded firmware patches.
|
|
|
|
*/
|
2015-12-03 23:10:22 +08:00
|
|
|
err = btintel_exit_mfg(hdev, true, true);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2020-03-16 14:07:18 +08:00
|
|
|
/* Need build number for downloaded fw patches in
|
|
|
|
* every power-on boot
|
|
|
|
*/
|
|
|
|
err = btintel_read_version(hdev, &ver);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
bt_dev_info(hdev, "Intel BT fw patch 0x%02x completed & activated",
|
|
|
|
ver.fw_patch_num);
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2015-10-21 08:45:19 +08:00
|
|
|
goto complete;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
exit_mfg_disable:
|
|
|
|
/* Disable the manufacturer mode without reset */
|
2015-12-03 23:10:22 +08:00
|
|
|
err = btintel_exit_mfg(hdev, false, false);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Intel firmware patch completed");
|
2014-07-02 18:06:45 +08:00
|
|
|
|
2015-10-21 08:45:19 +08:00
|
|
|
goto complete;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
|
|
|
exit_mfg_deactivate:
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
/* Patching failed. Disable the manufacturer mode with reset and
|
|
|
|
* deactivate the downloaded firmware patches.
|
|
|
|
*/
|
2015-12-03 23:10:22 +08:00
|
|
|
err = btintel_exit_mfg(hdev, true, false);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Intel firmware patch completed and deactivated");
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2015-10-21 08:45:19 +08:00
|
|
|
complete:
|
|
|
|
/* Set the event mask for Intel specific vendor events. This enables
|
|
|
|
* a few extra events that are useful during general operation.
|
|
|
|
*/
|
|
|
|
btintel_set_event_mask_mfg(hdev, false);
|
|
|
|
|
2015-04-06 15:52:12 +08:00
|
|
|
btintel_check_bdaddr(hdev);
|
2013-04-20 00:57:43 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
static int inject_cmd_complete(struct hci_dev *hdev, __u16 opcode)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct hci_event_hdr *hdr;
|
|
|
|
struct hci_ev_cmd_complete *evt;
|
|
|
|
|
2018-07-23 11:38:51 +08:00
|
|
|
skb = bt_skb_alloc(sizeof(*hdr) + sizeof(*evt) + 1, GFP_KERNEL);
|
2015-01-27 13:33:48 +08:00
|
|
|
if (!skb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:21 +08:00
|
|
|
hdr = skb_put(skb, sizeof(*hdr));
|
2015-01-27 13:33:48 +08:00
|
|
|
hdr->evt = HCI_EV_CMD_COMPLETE;
|
|
|
|
hdr->plen = sizeof(*evt) + 1;
|
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:21 +08:00
|
|
|
evt = skb_put(skb, sizeof(*evt));
|
2015-01-27 13:33:48 +08:00
|
|
|
evt->ncmd = 0x01;
|
|
|
|
evt->opcode = cpu_to_le16(opcode);
|
|
|
|
|
networking: add and use skb_put_u8()
Joe and Bjørn suggested that it'd be nicer to not have the
cast in the fairly common case of doing
*(u8 *)skb_put(skb, 1) = c;
Add skb_put_u8() for this case, and use it across the code,
using the following spatch:
@@
expression SKB, C, S;
typedef u8;
identifier fn = {skb_put};
fresh identifier fn2 = fn ## "_u8";
@@
- *(u8 *)fn(SKB, S) = C;
+ fn2(SKB, C);
Note that due to the "S", the spatch isn't perfect, it should
have checked that S is 1, but there's also places that use a
sizeof expression like sizeof(var) or sizeof(u8) etc. Turns
out that nobody ever did something like
*(u8 *)skb_put(skb, 2) = c;
which would be wrong anyway since the second byte wouldn't be
initialized.
Suggested-by: Joe Perches <joe@perches.com>
Suggested-by: Bjørn Mork <bjorn@mork.no>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:24 +08:00
|
|
|
skb_put_u8(skb, 0x00);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
return hci_recv_frame(hdev, skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_recv_bulk_intel(struct btusb_data *data, void *buffer,
|
|
|
|
int count)
|
|
|
|
{
|
|
|
|
/* When the device is in bootloader mode, then it can send
|
|
|
|
* events via the bulk endpoint. These events are treated the
|
|
|
|
* same way as the ones received from the interrupt endpoint.
|
|
|
|
*/
|
|
|
|
if (test_bit(BTUSB_BOOTLOADER, &data->flags))
|
|
|
|
return btusb_recv_intr(data, buffer, count);
|
|
|
|
|
|
|
|
return btusb_recv_bulk(data, buffer, count);
|
|
|
|
}
|
|
|
|
|
2015-04-09 15:35:19 +08:00
|
|
|
static void btusb_intel_bootup(struct btusb_data *data, const void *ptr,
|
|
|
|
unsigned int len)
|
|
|
|
{
|
|
|
|
const struct intel_bootup *evt = ptr;
|
|
|
|
|
|
|
|
if (len != sizeof(*evt))
|
|
|
|
return;
|
|
|
|
|
2018-11-27 19:22:25 +08:00
|
|
|
if (test_and_clear_bit(BTUSB_BOOTING, &data->flags))
|
2015-04-09 15:35:19 +08:00
|
|
|
wake_up_bit(&data->flags, BTUSB_BOOTING);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void btusb_intel_secure_send_result(struct btusb_data *data,
|
|
|
|
const void *ptr, unsigned int len)
|
|
|
|
{
|
|
|
|
const struct intel_secure_send_result *evt = ptr;
|
|
|
|
|
|
|
|
if (len != sizeof(*evt))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (evt->result)
|
|
|
|
set_bit(BTUSB_FIRMWARE_FAILED, &data->flags);
|
|
|
|
|
|
|
|
if (test_and_clear_bit(BTUSB_DOWNLOADING, &data->flags) &&
|
2018-11-27 19:22:25 +08:00
|
|
|
test_bit(BTUSB_FIRMWARE_LOADED, &data->flags))
|
2015-04-09 15:35:19 +08:00
|
|
|
wake_up_bit(&data->flags, BTUSB_DOWNLOADING);
|
|
|
|
}
|
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
static int btusb_recv_event_intel(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
|
|
|
|
if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
|
|
|
|
struct hci_event_hdr *hdr = (void *)skb->data;
|
|
|
|
|
2015-04-09 15:35:19 +08:00
|
|
|
if (skb->len > HCI_EVENT_HDR_SIZE && hdr->evt == 0xff &&
|
|
|
|
hdr->plen > 0) {
|
|
|
|
const void *ptr = skb->data + HCI_EVENT_HDR_SIZE + 1;
|
|
|
|
unsigned int len = skb->len - HCI_EVENT_HDR_SIZE - 1;
|
|
|
|
|
|
|
|
switch (skb->data[2]) {
|
|
|
|
case 0x02:
|
|
|
|
/* When switching to the operational firmware
|
|
|
|
* the device sends a vendor specific event
|
|
|
|
* indicating that the bootup completed.
|
|
|
|
*/
|
|
|
|
btusb_intel_bootup(data, ptr, len);
|
|
|
|
break;
|
|
|
|
case 0x06:
|
|
|
|
/* When the firmware loading completes the
|
|
|
|
* device sends out a vendor specific event
|
|
|
|
* indicating the result of the firmware
|
|
|
|
* loading.
|
|
|
|
*/
|
|
|
|
btusb_intel_secure_send_result(data, ptr, len);
|
|
|
|
break;
|
2015-01-30 16:58:55 +08:00
|
|
|
}
|
2015-01-27 13:33:48 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return hci_recv_frame(hdev, skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_send_frame_intel(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct urb *urb;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2015-11-05 14:33:56 +08:00
|
|
|
switch (hci_skb_pkt_type(skb)) {
|
2015-01-27 13:33:48 +08:00
|
|
|
case HCI_COMMAND_PKT:
|
|
|
|
if (test_bit(BTUSB_BOOTLOADER, &data->flags)) {
|
|
|
|
struct hci_command_hdr *cmd = (void *)skb->data;
|
|
|
|
__u16 opcode = le16_to_cpu(cmd->opcode);
|
|
|
|
|
|
|
|
/* When in bootloader mode and the command 0xfc09
|
|
|
|
* is received, it needs to be send down the
|
|
|
|
* bulk endpoint. So allocate a bulk URB instead.
|
|
|
|
*/
|
|
|
|
if (opcode == 0xfc09)
|
|
|
|
urb = alloc_bulk_urb(hdev, skb);
|
|
|
|
else
|
|
|
|
urb = alloc_ctrl_urb(hdev, skb);
|
|
|
|
|
|
|
|
/* When the 0xfc01 command is issued to boot into
|
|
|
|
* the operational firmware, it will actually not
|
|
|
|
* send a command complete event. To keep the flow
|
|
|
|
* control working inject that event here.
|
|
|
|
*/
|
|
|
|
if (opcode == 0xfc01)
|
|
|
|
inject_cmd_complete(hdev, opcode);
|
|
|
|
} else {
|
|
|
|
urb = alloc_ctrl_urb(hdev, skb);
|
|
|
|
}
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.cmd_tx++;
|
|
|
|
return submit_or_queue_tx_urb(hdev, urb);
|
|
|
|
|
|
|
|
case HCI_ACLDATA_PKT:
|
|
|
|
urb = alloc_bulk_urb(hdev, skb);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.acl_tx++;
|
|
|
|
return submit_or_queue_tx_urb(hdev, urb);
|
|
|
|
|
|
|
|
case HCI_SCODATA_PKT:
|
|
|
|
if (hci_conn_num(hdev, SCO_LINK) < 1)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
urb = alloc_isoc_urb(hdev, skb);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
hdev->stat.sco_tx++;
|
|
|
|
return submit_tx_urb(hdev, urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -EILSEQ;
|
|
|
|
}
|
|
|
|
|
2018-12-19 14:12:18 +08:00
|
|
|
static bool btusb_setup_intel_new_get_fw_name(struct intel_version *ver,
|
|
|
|
struct intel_boot_params *params,
|
|
|
|
char *fw_name, size_t len,
|
|
|
|
const char *suffix)
|
|
|
|
{
|
|
|
|
switch (ver->hw_variant) {
|
|
|
|
case 0x0b: /* SfP */
|
|
|
|
case 0x0c: /* WsP */
|
|
|
|
snprintf(fw_name, len, "intel/ibt-%u-%u.%s",
|
|
|
|
le16_to_cpu(ver->hw_variant),
|
|
|
|
le16_to_cpu(params->dev_revid),
|
|
|
|
suffix);
|
|
|
|
break;
|
|
|
|
case 0x11: /* JfP */
|
|
|
|
case 0x12: /* ThP */
|
|
|
|
case 0x13: /* HrP */
|
|
|
|
case 0x14: /* CcP */
|
|
|
|
snprintf(fw_name, len, "intel/ibt-%u-%u-%u.%s",
|
|
|
|
le16_to_cpu(ver->hw_variant),
|
|
|
|
le16_to_cpu(ver->hw_revision),
|
|
|
|
le16_to_cpu(ver->fw_revision),
|
|
|
|
suffix);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-11-19 19:39:41 +08:00
|
|
|
static void btusb_setup_intel_newgen_get_fw_name(const struct intel_version_tlv *ver_tlv,
|
|
|
|
char *fw_name, size_t len,
|
|
|
|
const char *suffix)
|
|
|
|
{
|
|
|
|
/* The firmware file name for new generation controllers will be
|
|
|
|
* ibt-<cnvi_top type+cnvi_top step>-<cnvr_top type+cnvr_top step>
|
|
|
|
*/
|
|
|
|
snprintf(fw_name, len, "intel/ibt-%04x-%04x.%s",
|
|
|
|
INTEL_CNVX_TOP_PACK_SWAB(INTEL_CNVX_TOP_TYPE(ver_tlv->cnvi_top),
|
|
|
|
INTEL_CNVX_TOP_STEP(ver_tlv->cnvi_top)),
|
|
|
|
INTEL_CNVX_TOP_PACK_SWAB(INTEL_CNVX_TOP_TYPE(ver_tlv->cnvr_top),
|
|
|
|
INTEL_CNVX_TOP_STEP(ver_tlv->cnvr_top)),
|
|
|
|
suffix);
|
|
|
|
}
|
|
|
|
|
2020-11-19 19:39:42 +08:00
|
|
|
static int btusb_intel_download_firmware_newgen(struct hci_dev *hdev,
|
|
|
|
struct intel_version_tlv *ver,
|
|
|
|
u32 *boot_param)
|
|
|
|
{
|
|
|
|
const struct firmware *fw;
|
|
|
|
char fwname[64];
|
|
|
|
int err;
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
|
|
|
|
if (!ver || !boot_param)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* The hardware platform number has a fixed value of 0x37 and
|
|
|
|
* for now only accept this single value.
|
|
|
|
*/
|
|
|
|
if (INTEL_HW_PLATFORM(ver->cnvi_bt) != 0x37) {
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel hardware platform (0x%2x)",
|
|
|
|
INTEL_HW_PLATFORM(ver->cnvi_bt));
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The firmware variant determines if the device is in bootloader
|
|
|
|
* mode or is running operational firmware. The value 0x03 identifies
|
|
|
|
* the bootloader and the value 0x23 identifies the operational
|
|
|
|
* firmware.
|
|
|
|
*
|
|
|
|
* When the operational firmware is already present, then only
|
|
|
|
* the check for valid Bluetooth device address is needed. This
|
|
|
|
* determines if the device will be added as configured or
|
|
|
|
* unconfigured controller.
|
|
|
|
*
|
|
|
|
* It is not possible to use the Secure Boot Parameters in this
|
|
|
|
* case since that command is only available in bootloader mode.
|
|
|
|
*/
|
|
|
|
if (ver->img_type == 0x03) {
|
|
|
|
clear_bit(BTUSB_BOOTLOADER, &data->flags);
|
|
|
|
btintel_check_bdaddr(hdev);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for supported iBT hardware variants of this firmware
|
|
|
|
* loading method.
|
|
|
|
*
|
|
|
|
* This check has been put in place to ensure correct forward
|
|
|
|
* compatibility options when newer hardware variants come along.
|
|
|
|
*/
|
|
|
|
switch (INTEL_HW_VARIANT(ver->cnvi_bt)) {
|
|
|
|
case 0x17: /* TyP */
|
|
|
|
case 0x18: /* Slr */
|
|
|
|
case 0x19: /* Slr-F */
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel hardware variant (0x%x)",
|
|
|
|
INTEL_HW_VARIANT(ver->cnvi_bt));
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the device is not in bootloader mode, then the only possible
|
|
|
|
* choice is to return an error and abort the device initialization.
|
|
|
|
*/
|
|
|
|
if (ver->img_type != 0x01) {
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware variant (0x%x)",
|
|
|
|
ver->img_type);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It is required that every single firmware fragment is acknowledged
|
|
|
|
* with a command complete event. If the boot parameters indicate
|
|
|
|
* that this bootloader does not send them, then abort the setup.
|
|
|
|
*/
|
|
|
|
if (ver->limited_cce != 0x00) {
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware loading method (0x%x)",
|
|
|
|
ver->limited_cce);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Secure boot engine type should be either 1 (ECDSA) or 0 (RSA) */
|
|
|
|
if (ver->sbe_type > 0x01) {
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel secure boot engine type (0x%x)",
|
|
|
|
ver->sbe_type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the OTP has no valid Bluetooth device address, then there will
|
|
|
|
* also be no valid address for the operational firmware.
|
|
|
|
*/
|
|
|
|
if (!bacmp(&ver->otp_bd_addr, BDADDR_ANY)) {
|
|
|
|
bt_dev_info(hdev, "No device address configured");
|
|
|
|
set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
|
|
|
btusb_setup_intel_newgen_get_fw_name(ver, fwname, sizeof(fwname), "sfi");
|
|
|
|
err = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to load Intel firmware file (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
bt_dev_info(hdev, "Found device firmware: %s", fwname);
|
|
|
|
|
|
|
|
if (fw->size < 644) {
|
|
|
|
bt_dev_err(hdev, "Invalid size of firmware file (%zu)",
|
|
|
|
fw->size);
|
|
|
|
err = -EBADF;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
set_bit(BTUSB_DOWNLOADING, &data->flags);
|
|
|
|
|
|
|
|
/* Start firmware downloading and get boot parameter */
|
|
|
|
err = btintel_download_firmware_newgen(hdev, fw, boot_param,
|
|
|
|
INTEL_HW_VARIANT(ver->cnvi_bt),
|
|
|
|
ver->sbe_type);
|
|
|
|
if (err < 0) {
|
|
|
|
/* When FW download fails, send Intel Reset to retry
|
|
|
|
* FW download.
|
|
|
|
*/
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
|
|
|
|
|
|
|
|
bt_dev_info(hdev, "Waiting for firmware download to complete");
|
|
|
|
|
|
|
|
/* Before switching the device into operational mode and with that
|
|
|
|
* booting the loaded firmware, wait for the bootloader notification
|
|
|
|
* that all fragments have been successfully received.
|
|
|
|
*
|
|
|
|
* When the event processing receives the notification, then the
|
|
|
|
* BTUSB_DOWNLOADING flag will be cleared.
|
|
|
|
*
|
|
|
|
* The firmware loading should not take longer than 5 seconds
|
|
|
|
* and thus just timeout if that happens and fail the setup
|
|
|
|
* of this device.
|
|
|
|
*/
|
|
|
|
err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
|
|
|
|
TASK_INTERRUPTIBLE,
|
|
|
|
msecs_to_jiffies(5000));
|
|
|
|
if (err == -EINTR) {
|
|
|
|
bt_dev_err(hdev, "Firmware loading interrupted");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Firmware loading timeout");
|
|
|
|
err = -ETIMEDOUT;
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
|
|
|
|
bt_dev_err(hdev, "Firmware loading failed");
|
|
|
|
err = -ENOEXEC;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
release_firmware(fw);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-25 02:34:32 +08:00
|
|
|
static int btusb_intel_download_firmware(struct hci_dev *hdev,
|
|
|
|
struct intel_version *ver,
|
2020-08-26 17:54:32 +08:00
|
|
|
struct intel_boot_params *params,
|
|
|
|
u32 *boot_param)
|
2015-01-27 13:33:48 +08:00
|
|
|
{
|
|
|
|
const struct firmware *fw;
|
|
|
|
char fwname[64];
|
|
|
|
int err;
|
2020-06-25 02:34:32 +08:00
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2020-06-25 02:34:32 +08:00
|
|
|
if (!ver || !params)
|
|
|
|
return -EINVAL;
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
/* The hardware platform number has a fixed value of 0x37 and
|
|
|
|
* for now only accept this single value.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
if (ver->hw_platform != 0x37) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Unsupported Intel hardware platform (%u)",
|
2020-06-25 02:34:32 +08:00
|
|
|
ver->hw_platform);
|
2015-01-27 13:33:48 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2017-03-07 07:38:26 +08:00
|
|
|
/* Check for supported iBT hardware variants of this firmware
|
|
|
|
* loading method.
|
2016-05-07 02:53:46 +08:00
|
|
|
*
|
|
|
|
* This check has been put in place to ensure correct forward
|
|
|
|
* compatibility options when newer hardware variants come along.
|
2015-01-27 13:33:48 +08:00
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
switch (ver->hw_variant) {
|
2017-03-07 07:38:26 +08:00
|
|
|
case 0x0b: /* SfP */
|
|
|
|
case 0x0c: /* WsP */
|
2017-05-02 04:35:12 +08:00
|
|
|
case 0x11: /* JfP */
|
2017-03-07 07:38:28 +08:00
|
|
|
case 0x12: /* ThP */
|
2018-02-06 06:20:36 +08:00
|
|
|
case 0x13: /* HrP */
|
2018-12-19 14:12:18 +08:00
|
|
|
case 0x14: /* CcP */
|
2017-03-07 07:38:26 +08:00
|
|
|
break;
|
|
|
|
default:
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Unsupported Intel hardware variant (%u)",
|
2020-06-25 02:34:32 +08:00
|
|
|
ver->hw_variant);
|
2015-01-27 13:33:48 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-06-25 02:34:32 +08:00
|
|
|
btintel_version_info(hdev, ver);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
/* The firmware variant determines if the device is in bootloader
|
|
|
|
* mode or is running operational firmware. The value 0x06 identifies
|
|
|
|
* the bootloader and the value 0x23 identifies the operational
|
|
|
|
* firmware.
|
|
|
|
*
|
|
|
|
* When the operational firmware is already present, then only
|
|
|
|
* the check for valid Bluetooth device address is needed. This
|
|
|
|
* determines if the device will be added as configured or
|
|
|
|
* unconfigured controller.
|
|
|
|
*
|
|
|
|
* It is not possible to use the Secure Boot Parameters in this
|
|
|
|
* case since that command is only available in bootloader mode.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
if (ver->fw_variant == 0x23) {
|
2015-01-27 13:33:48 +08:00
|
|
|
clear_bit(BTUSB_BOOTLOADER, &data->flags);
|
2015-04-06 15:52:12 +08:00
|
|
|
btintel_check_bdaddr(hdev);
|
2020-06-25 02:34:32 +08:00
|
|
|
return 0;
|
2015-01-27 13:33:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* If the device is not in bootloader mode, then the only possible
|
|
|
|
* choice is to return an error and abort the device initialization.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
if (ver->fw_variant != 0x06) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware variant (%u)",
|
2020-06-25 02:34:32 +08:00
|
|
|
ver->fw_variant);
|
2015-01-27 13:33:48 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read the secure boot parameters to identify the operating
|
|
|
|
* details of the bootloader.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
err = btintel_read_boot_params(hdev, params);
|
2018-01-25 01:19:20 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
/* It is required that every single firmware fragment is acknowledged
|
|
|
|
* with a command complete event. If the boot parameters indicate
|
|
|
|
* that this bootloader does not send them, then abort the setup.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
if (params->limited_cce != 0x00) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware loading method (%u)",
|
2020-06-25 02:34:32 +08:00
|
|
|
params->limited_cce);
|
2015-01-27 13:33:48 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the OTP has no valid Bluetooth device address, then there will
|
|
|
|
* also be no valid address for the operational firmware.
|
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
if (!bacmp(¶ms->otp_bdaddr, BDADDR_ANY)) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "No device address configured");
|
2015-01-27 13:33:48 +08:00
|
|
|
set_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* With this Intel bootloader only the hardware variant and device
|
2017-10-30 18:01:22 +08:00
|
|
|
* revision information are used to select the right firmware for SfP
|
|
|
|
* and WsP.
|
2015-01-27 13:33:48 +08:00
|
|
|
*
|
2016-06-28 23:56:39 +08:00
|
|
|
* The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi.
|
|
|
|
*
|
|
|
|
* Currently the supported hardware variants are:
|
|
|
|
* 11 (0x0b) for iBT3.0 (LnP/SfP)
|
|
|
|
* 12 (0x0c) for iBT3.5 (WsP)
|
2017-10-30 18:01:22 +08:00
|
|
|
*
|
|
|
|
* For ThP/JfP and for future SKU's, the FW name varies based on HW
|
|
|
|
* variant, HW revision and FW revision, as these are dependent on CNVi
|
|
|
|
* and RF Combination.
|
|
|
|
*
|
2017-05-02 04:35:12 +08:00
|
|
|
* 17 (0x11) for iBT3.5 (JfP)
|
|
|
|
* 18 (0x12) for iBT3.5 (ThP)
|
2017-10-30 18:01:22 +08:00
|
|
|
*
|
|
|
|
* The firmware file name for these will be
|
|
|
|
* ibt-<hw_variant>-<hw_revision>-<fw_revision>.sfi.
|
|
|
|
*
|
2015-01-27 13:33:48 +08:00
|
|
|
*/
|
2020-06-25 02:34:32 +08:00
|
|
|
err = btusb_setup_intel_new_get_fw_name(ver, params, fwname,
|
2018-12-19 14:12:18 +08:00
|
|
|
sizeof(fwname), "sfi");
|
|
|
|
if (!err) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware naming");
|
2017-10-30 18:01:22 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
err = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (err < 0) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Failed to load Intel firmware file (%d)", err);
|
2015-01-27 13:33:48 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Found device firmware: %s", fwname);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
if (fw->size < 644) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Invalid size of firmware file (%zu)",
|
|
|
|
fw->size);
|
2015-01-27 13:33:48 +08:00
|
|
|
err = -EBADF;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
set_bit(BTUSB_DOWNLOADING, &data->flags);
|
|
|
|
|
2018-01-25 01:19:21 +08:00
|
|
|
/* Start firmware downloading and get boot parameter */
|
2020-08-26 17:54:32 +08:00
|
|
|
err = btintel_download_firmware(hdev, fw, boot_param);
|
2019-10-17 16:22:29 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* When FW download fails, send Intel Reset to retry
|
|
|
|
* FW download.
|
|
|
|
*/
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
2015-01-27 13:33:48 +08:00
|
|
|
goto done;
|
2019-10-17 16:22:29 +08:00
|
|
|
}
|
2015-01-28 17:58:40 +08:00
|
|
|
set_bit(BTUSB_FIRMWARE_LOADED, &data->flags);
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Waiting for firmware download to complete");
|
2015-01-30 16:58:54 +08:00
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
/* Before switching the device into operational mode and with that
|
|
|
|
* booting the loaded firmware, wait for the bootloader notification
|
|
|
|
* that all fragments have been successfully received.
|
|
|
|
*
|
2015-01-30 16:58:54 +08:00
|
|
|
* When the event processing receives the notification, then the
|
|
|
|
* BTUSB_DOWNLOADING flag will be cleared.
|
|
|
|
*
|
|
|
|
* The firmware loading should not take longer than 5 seconds
|
|
|
|
* and thus just timeout if that happens and fail the setup
|
|
|
|
* of this device.
|
2015-01-27 13:33:48 +08:00
|
|
|
*/
|
2015-02-14 15:33:35 +08:00
|
|
|
err = wait_on_bit_timeout(&data->flags, BTUSB_DOWNLOADING,
|
|
|
|
TASK_INTERRUPTIBLE,
|
|
|
|
msecs_to_jiffies(5000));
|
2016-08-12 07:02:44 +08:00
|
|
|
if (err == -EINTR) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Firmware loading interrupted");
|
2015-01-30 16:58:54 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2015-01-30 16:58:54 +08:00
|
|
|
if (err) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Firmware loading timeout");
|
2015-01-30 16:58:54 +08:00
|
|
|
err = -ETIMEDOUT;
|
2019-10-17 16:22:29 +08:00
|
|
|
btintel_reset_to_bootloader(hdev);
|
2015-01-30 16:58:54 +08:00
|
|
|
goto done;
|
2015-01-27 13:33:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(BTUSB_FIRMWARE_FAILED, &data->flags)) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Firmware loading failed");
|
2015-01-27 13:33:48 +08:00
|
|
|
err = -ENOEXEC;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2020-06-25 02:34:32 +08:00
|
|
|
done:
|
|
|
|
release_firmware(fw);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_intel_new(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct intel_version ver;
|
|
|
|
struct intel_boot_params params;
|
|
|
|
u32 boot_param;
|
|
|
|
char ddcname[64];
|
|
|
|
ktime_t calltime, delta, rettime;
|
|
|
|
unsigned long long duration;
|
|
|
|
int err;
|
|
|
|
struct intel_debug_features features;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
/* Set the default boot parameter to 0x0 and it is updated to
|
|
|
|
* SKU specific boot parameter after reading Intel_Write_Boot_Params
|
|
|
|
* command while downloading the firmware.
|
|
|
|
*/
|
|
|
|
boot_param = 0x00000000;
|
|
|
|
|
|
|
|
calltime = ktime_get();
|
|
|
|
|
|
|
|
/* Read the Intel version information to determine if the device
|
|
|
|
* is in bootloader mode or if it already has operational firmware
|
|
|
|
* loaded.
|
|
|
|
*/
|
|
|
|
err = btintel_read_version(hdev, &ver);
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Intel Read version failed (%d)", err);
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-08-26 17:54:32 +08:00
|
|
|
err = btusb_intel_download_firmware(hdev, &ver, ¶ms, &boot_param);
|
2020-06-25 02:34:32 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* controller is already having an operational firmware */
|
|
|
|
if (ver.fw_variant == 0x23)
|
|
|
|
goto finish;
|
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
rettime = ktime_get();
|
|
|
|
delta = ktime_sub(rettime, calltime);
|
|
|
|
duration = (unsigned long long) ktime_to_ns(delta) >> 10;
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
calltime = ktime_get();
|
|
|
|
|
|
|
|
set_bit(BTUSB_BOOTING, &data->flags);
|
|
|
|
|
2018-01-25 01:19:18 +08:00
|
|
|
err = btintel_send_intel_reset(hdev, boot_param);
|
2019-10-17 16:22:29 +08:00
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Intel Soft Reset failed (%d)", err);
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
2018-01-25 01:19:18 +08:00
|
|
|
return err;
|
2019-10-17 16:22:29 +08:00
|
|
|
}
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
/* The bootloader will not indicate when the device is ready. This
|
|
|
|
* is done by the operational firmware sending bootup notification.
|
2015-01-30 16:58:55 +08:00
|
|
|
*
|
|
|
|
* Booting into operational firmware should not take longer than
|
|
|
|
* 1 second. However if that happens, then just fail the setup
|
|
|
|
* since something went wrong.
|
2015-01-27 13:33:48 +08:00
|
|
|
*/
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Waiting for device to boot");
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2015-02-14 15:33:35 +08:00
|
|
|
err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
|
|
|
|
TASK_INTERRUPTIBLE,
|
|
|
|
msecs_to_jiffies(1000));
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2016-08-12 07:02:44 +08:00
|
|
|
if (err == -EINTR) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Device boot interrupted");
|
2015-01-30 16:58:55 +08:00
|
|
|
return -EINTR;
|
|
|
|
}
|
2015-01-27 13:33:48 +08:00
|
|
|
|
2015-01-30 16:58:55 +08:00
|
|
|
if (err) {
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "Device boot timeout");
|
2019-10-17 16:22:29 +08:00
|
|
|
btintel_reset_to_bootloader(hdev);
|
2015-01-30 16:58:55 +08:00
|
|
|
return -ETIMEDOUT;
|
2015-01-27 13:33:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
rettime = ktime_get();
|
|
|
|
delta = ktime_sub(rettime, calltime);
|
|
|
|
duration = (unsigned long long) ktime_to_ns(delta) >> 10;
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "Device booted in %llu usecs", duration);
|
2015-01-27 13:33:48 +08:00
|
|
|
|
|
|
|
clear_bit(BTUSB_BOOTLOADER, &data->flags);
|
|
|
|
|
2020-06-25 02:34:32 +08:00
|
|
|
err = btusb_setup_intel_new_get_fw_name(&ver, ¶ms, ddcname,
|
|
|
|
sizeof(ddcname), "ddc");
|
|
|
|
|
|
|
|
if (!err) {
|
|
|
|
bt_dev_err(hdev, "Unsupported Intel firmware naming");
|
|
|
|
} else {
|
|
|
|
/* Once the device is running in operational mode, it needs to
|
|
|
|
* apply the device configuration (DDC) parameters.
|
|
|
|
*
|
|
|
|
* The device can work without DDC parameters, so even if it
|
|
|
|
* fails to load the file, no need to fail the setup.
|
|
|
|
*/
|
|
|
|
btintel_load_ddc_config(hdev, ddcname);
|
|
|
|
}
|
2015-06-13 07:20:05 +08:00
|
|
|
|
2020-06-08 20:27:46 +08:00
|
|
|
/* Read the Intel supported features and if new exception formats
|
|
|
|
* supported, need to load the additional DDC config to enable.
|
|
|
|
*/
|
|
|
|
btintel_read_debug_features(hdev, &features);
|
|
|
|
|
2020-06-08 20:27:47 +08:00
|
|
|
/* Set DDC mask for available debug features */
|
|
|
|
btintel_set_debug_features(hdev, &features);
|
|
|
|
|
2020-04-04 03:44:02 +08:00
|
|
|
/* Read the Intel version information after loading the FW */
|
|
|
|
err = btintel_read_version(hdev, &ver);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
btintel_version_info(hdev, &ver);
|
|
|
|
|
|
|
|
finish:
|
2020-04-04 03:44:03 +08:00
|
|
|
/* All Intel controllers that support the Microsoft vendor
|
|
|
|
* extension are using 0xFC1E for VsMsftOpCode.
|
|
|
|
*/
|
|
|
|
switch (ver.hw_variant) {
|
2020-12-18 06:53:19 +08:00
|
|
|
case 0x11: /* JfP */
|
2020-04-04 03:44:03 +08:00
|
|
|
case 0x12: /* ThP */
|
2020-12-18 06:53:19 +08:00
|
|
|
case 0x13: /* HrP */
|
|
|
|
case 0x14: /* CcP */
|
2020-04-04 03:44:03 +08:00
|
|
|
hci_set_msft_opcode(hdev, 0xFC1E);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-10-21 08:45:19 +08:00
|
|
|
/* Set the event mask for Intel specific vendor events. This enables
|
|
|
|
* a few extra events that are useful during general operation. It
|
|
|
|
* does not enable any debugging related events.
|
|
|
|
*
|
|
|
|
* The device will function correctly without these events enabled
|
|
|
|
* and thus no need to fail the setup.
|
|
|
|
*/
|
|
|
|
btintel_set_event_mask(hdev, false);
|
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-11-19 19:39:40 +08:00
|
|
|
static int btusb_setup_intel_newgen(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
u32 boot_param;
|
|
|
|
char ddcname[64];
|
|
|
|
ktime_t calltime, delta, rettime;
|
|
|
|
unsigned long long duration;
|
|
|
|
int err;
|
|
|
|
struct intel_debug_features features;
|
|
|
|
struct intel_version_tlv version;
|
|
|
|
|
|
|
|
bt_dev_dbg(hdev, "");
|
|
|
|
|
|
|
|
/* Set the default boot parameter to 0x0 and it is updated to
|
|
|
|
* SKU specific boot parameter after reading Intel_Write_Boot_Params
|
|
|
|
* command while downloading the firmware.
|
|
|
|
*/
|
|
|
|
boot_param = 0x00000000;
|
|
|
|
|
|
|
|
calltime = ktime_get();
|
|
|
|
|
|
|
|
/* Read the Intel version information to determine if the device
|
|
|
|
* is in bootloader mode or if it already has operational firmware
|
|
|
|
* loaded.
|
|
|
|
*/
|
|
|
|
err = btintel_read_version_tlv(hdev, &version);
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Intel Read version failed (%d)", err);
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
btintel_version_info_tlv(hdev, &version);
|
|
|
|
|
2020-11-19 19:39:42 +08:00
|
|
|
err = btusb_intel_download_firmware_newgen(hdev, &version, &boot_param);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2020-11-19 19:39:40 +08:00
|
|
|
/* check if controller is already having an operational firmware */
|
|
|
|
if (version.img_type == 0x03)
|
|
|
|
goto finish;
|
|
|
|
|
|
|
|
rettime = ktime_get();
|
|
|
|
delta = ktime_sub(rettime, calltime);
|
|
|
|
duration = (unsigned long long)ktime_to_ns(delta) >> 10;
|
|
|
|
|
|
|
|
bt_dev_info(hdev, "Firmware loaded in %llu usecs", duration);
|
|
|
|
|
|
|
|
calltime = ktime_get();
|
|
|
|
|
|
|
|
set_bit(BTUSB_BOOTING, &data->flags);
|
|
|
|
|
|
|
|
err = btintel_send_intel_reset(hdev, boot_param);
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Intel Soft Reset failed (%d)", err);
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The bootloader will not indicate when the device is ready. This
|
|
|
|
* is done by the operational firmware sending bootup notification.
|
|
|
|
*
|
|
|
|
* Booting into operational firmware should not take longer than
|
|
|
|
* 1 second. However if that happens, then just fail the setup
|
|
|
|
* since something went wrong.
|
|
|
|
*/
|
|
|
|
bt_dev_info(hdev, "Waiting for device to boot");
|
|
|
|
|
|
|
|
err = wait_on_bit_timeout(&data->flags, BTUSB_BOOTING,
|
|
|
|
TASK_INTERRUPTIBLE,
|
|
|
|
msecs_to_jiffies(1000));
|
|
|
|
|
|
|
|
if (err == -EINTR) {
|
|
|
|
bt_dev_err(hdev, "Device boot interrupted");
|
|
|
|
return -EINTR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Device boot timeout");
|
|
|
|
btintel_reset_to_bootloader(hdev);
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
rettime = ktime_get();
|
|
|
|
delta = ktime_sub(rettime, calltime);
|
|
|
|
duration = (unsigned long long)ktime_to_ns(delta) >> 10;
|
|
|
|
|
|
|
|
bt_dev_info(hdev, "Device booted in %llu usecs", duration);
|
|
|
|
|
|
|
|
clear_bit(BTUSB_BOOTLOADER, &data->flags);
|
|
|
|
|
2020-11-19 19:39:41 +08:00
|
|
|
btusb_setup_intel_newgen_get_fw_name(&version, ddcname, sizeof(ddcname),
|
|
|
|
"ddc");
|
2020-11-19 19:39:40 +08:00
|
|
|
/* Once the device is running in operational mode, it needs to
|
|
|
|
* apply the device configuration (DDC) parameters.
|
|
|
|
*
|
|
|
|
* The device can work without DDC parameters, so even if it
|
|
|
|
* fails to load the file, no need to fail the setup.
|
|
|
|
*/
|
|
|
|
btintel_load_ddc_config(hdev, ddcname);
|
|
|
|
|
|
|
|
/* Read the Intel supported features and if new exception formats
|
|
|
|
* supported, need to load the additional DDC config to enable.
|
|
|
|
*/
|
|
|
|
btintel_read_debug_features(hdev, &features);
|
|
|
|
|
|
|
|
/* Set DDC mask for available debug features */
|
|
|
|
btintel_set_debug_features(hdev, &features);
|
|
|
|
|
|
|
|
/* Read the Intel version information after loading the FW */
|
|
|
|
err = btintel_read_version_tlv(hdev, &version);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
btintel_version_info_tlv(hdev, &version);
|
|
|
|
|
|
|
|
finish:
|
|
|
|
/* Set the event mask for Intel specific vendor events. This enables
|
|
|
|
* a few extra events that are useful during general operation. It
|
|
|
|
* does not enable any debugging related events.
|
|
|
|
*
|
|
|
|
* The device will function correctly without these events enabled
|
|
|
|
* and thus no need to fail the setup.
|
|
|
|
*/
|
|
|
|
btintel_set_event_mask(hdev, false);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2015-02-14 01:20:52 +08:00
|
|
|
static int btusb_shutdown_intel(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
long ret;
|
|
|
|
|
2018-08-03 15:13:20 +08:00
|
|
|
/* In the shutdown sequence where Bluetooth is turned off followed
|
|
|
|
* by WiFi being turned off, turning WiFi back on causes issue with
|
|
|
|
* the RF calibration.
|
|
|
|
*
|
|
|
|
* To ensure that any RF activity has been stopped, issue HCI Reset
|
|
|
|
* command to clear all ongoing activity including advertising,
|
|
|
|
* scanning etc.
|
|
|
|
*/
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
bt_dev_err(hdev, "HCI reset during shutdown failed");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
2015-02-14 01:20:52 +08:00
|
|
|
/* Some platforms have an issue with BT LED when the interface is
|
|
|
|
* down or BT radio is turned off, which takes 5 seconds to BT LED
|
|
|
|
* goes off. This command turns off the BT LED immediately.
|
|
|
|
*/
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc3f, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
2018-08-03 17:20:49 +08:00
|
|
|
bt_dev_err(hdev, "turning off Intel device LED failed");
|
2015-02-14 01:20:52 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-01-29 20:24:48 +08:00
|
|
|
static int btusb_shutdown_intel_new(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
/* Send HCI Reset to the controller to stop any BT activity which
|
|
|
|
* were triggered. This will help to save power and maintain the
|
|
|
|
* sync b/w Host and controller
|
|
|
|
*/
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
bt_dev_err(hdev, "HCI reset during shutdown failed");
|
|
|
|
return PTR_ERR(skb);
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-06-02 08:02:49 +08:00
|
|
|
#define FIRMWARE_MT7663 "mediatek/mt7663pr2h.bin"
|
2019-06-02 08:02:48 +08:00
|
|
|
#define FIRMWARE_MT7668 "mediatek/mt7668pr2h.bin"
|
|
|
|
|
|
|
|
#define HCI_WMT_MAX_EVENT_SIZE 64
|
|
|
|
|
|
|
|
enum {
|
|
|
|
BTMTK_WMT_PATCH_DWNLD = 0x1,
|
|
|
|
BTMTK_WMT_FUNC_CTRL = 0x6,
|
|
|
|
BTMTK_WMT_RST = 0x7,
|
|
|
|
BTMTK_WMT_SEMAPHORE = 0x17,
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
BTMTK_WMT_INVALID,
|
|
|
|
BTMTK_WMT_PATCH_UNDONE,
|
2021-02-02 18:26:17 +08:00
|
|
|
BTMTK_WMT_PATCH_PROGRESS,
|
2019-06-02 08:02:48 +08:00
|
|
|
BTMTK_WMT_PATCH_DONE,
|
|
|
|
BTMTK_WMT_ON_UNDONE,
|
|
|
|
BTMTK_WMT_ON_DONE,
|
|
|
|
BTMTK_WMT_ON_PROGRESS,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct btmtk_wmt_hdr {
|
|
|
|
u8 dir;
|
|
|
|
u8 op;
|
|
|
|
__le16 dlen;
|
|
|
|
u8 flag;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct btmtk_hci_wmt_cmd {
|
|
|
|
struct btmtk_wmt_hdr hdr;
|
2021-02-02 18:26:17 +08:00
|
|
|
u8 data[1000];
|
2019-06-02 08:02:48 +08:00
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct btmtk_hci_wmt_evt {
|
|
|
|
struct hci_event_hdr hhdr;
|
|
|
|
struct btmtk_wmt_hdr whdr;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct btmtk_hci_wmt_evt_funcc {
|
|
|
|
struct btmtk_hci_wmt_evt hwhdr;
|
|
|
|
__be16 status;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct btmtk_tci_sleep {
|
|
|
|
u8 mode;
|
|
|
|
__le16 duration;
|
|
|
|
__le16 host_duration;
|
|
|
|
u8 host_wakeup_pin;
|
|
|
|
u8 time_compensation;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct btmtk_hci_wmt_params {
|
|
|
|
u8 op;
|
|
|
|
u8 flag;
|
|
|
|
u16 dlen;
|
|
|
|
const void *data;
|
|
|
|
u32 *status;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void btusb_mtk_wmt_recv(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = urb->context;
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct hci_event_hdr *hdr;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (urb->status == 0 && urb->actual_length > 0) {
|
|
|
|
hdev->stat.byte_rx += urb->actual_length;
|
|
|
|
|
|
|
|
/* WMT event shouldn't be fragmented and the size should be
|
|
|
|
* less than HCI_WMT_MAX_EVENT_SIZE.
|
|
|
|
*/
|
|
|
|
skb = bt_skb_alloc(HCI_WMT_MAX_EVENT_SIZE, GFP_ATOMIC);
|
|
|
|
if (!skb) {
|
|
|
|
hdev->stat.err_rx++;
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_skb_pkt_type(skb) = HCI_EVENT_PKT;
|
|
|
|
skb_put_data(skb, urb->transfer_buffer, urb->actual_length);
|
|
|
|
|
|
|
|
hdr = (void *)skb->data;
|
|
|
|
/* Fix up the vendor event id with 0xff for vendor specific
|
|
|
|
* instead of 0xe4 so that event send via monitoring socket can
|
|
|
|
* be parsed properly.
|
|
|
|
*/
|
|
|
|
hdr->evt = 0xff;
|
|
|
|
|
|
|
|
/* When someone waits for the WMT event, the skb is being cloned
|
|
|
|
* and being processed the events from there then.
|
|
|
|
*/
|
|
|
|
if (test_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags)) {
|
2019-11-29 02:24:27 +08:00
|
|
|
data->evt_skb = skb_clone(skb, GFP_ATOMIC);
|
2019-06-02 08:02:48 +08:00
|
|
|
if (!data->evt_skb)
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = hci_recv_frame(hdev, skb);
|
|
|
|
if (err < 0)
|
|
|
|
goto err_free_skb;
|
|
|
|
|
|
|
|
if (test_and_clear_bit(BTUSB_TX_WAIT_VND_EVT,
|
|
|
|
&data->flags)) {
|
|
|
|
/* Barrier to sync with other CPUs */
|
|
|
|
smp_mb__after_atomic();
|
|
|
|
wake_up_bit(&data->flags,
|
|
|
|
BTUSB_TX_WAIT_VND_EVT);
|
|
|
|
}
|
|
|
|
err_out:
|
|
|
|
return;
|
|
|
|
err_free_skb:
|
|
|
|
kfree_skb(data->evt_skb);
|
|
|
|
data->evt_skb = NULL;
|
|
|
|
return;
|
|
|
|
} else if (urb->status == -ENOENT) {
|
|
|
|
/* Avoid suspend failed when usb_kill_urb */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_mark_last_busy(data->udev);
|
|
|
|
|
|
|
|
/* The URB complete handler is still called with urb->actual_length = 0
|
|
|
|
* when the event is not available, so we should keep re-submitting
|
|
|
|
* URB until WMT event returns, Also, It's necessary to wait some time
|
|
|
|
* between the two consecutive control URBs to relax the target device
|
|
|
|
* to generate the event. Otherwise, the WMT event cannot return from
|
|
|
|
* the device successfully.
|
|
|
|
*/
|
2021-02-02 18:26:17 +08:00
|
|
|
udelay(500);
|
2019-06-02 08:02:48 +08:00
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->ctrl_anchor);
|
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
|
|
|
if (err < 0) {
|
|
|
|
/* -EPERM: urb is being killed;
|
|
|
|
* -ENODEV: device got disconnected
|
|
|
|
*/
|
|
|
|
if (err != -EPERM && err != -ENODEV)
|
|
|
|
bt_dev_err(hdev, "urb %p failed to resubmit (%d)",
|
|
|
|
urb, -err);
|
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_submit_wmt_recv_urb(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct usb_ctrlrequest *dr;
|
|
|
|
unsigned char *buf;
|
|
|
|
int err, size = 64;
|
|
|
|
unsigned int pipe;
|
|
|
|
struct urb *urb;
|
|
|
|
|
|
|
|
urb = usb_alloc_urb(0, GFP_KERNEL);
|
|
|
|
if (!urb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
dr = kmalloc(sizeof(*dr), GFP_KERNEL);
|
|
|
|
if (!dr) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
dr->bRequestType = USB_TYPE_VENDOR | USB_DIR_IN;
|
|
|
|
dr->bRequest = 1;
|
|
|
|
dr->wIndex = cpu_to_le16(0);
|
|
|
|
dr->wValue = cpu_to_le16(48);
|
|
|
|
dr->wLength = cpu_to_le16(size);
|
|
|
|
|
|
|
|
buf = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!buf) {
|
|
|
|
kfree(dr);
|
2020-08-23 15:44:21 +08:00
|
|
|
usb_free_urb(urb);
|
2019-06-02 08:02:48 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
pipe = usb_rcvctrlpipe(data->udev, 0);
|
|
|
|
|
|
|
|
usb_fill_control_urb(urb, data->udev, pipe, (void *)dr,
|
|
|
|
buf, size, btusb_mtk_wmt_recv, hdev);
|
|
|
|
|
|
|
|
urb->transfer_flags |= URB_FREE_BUFFER;
|
|
|
|
|
|
|
|
usb_anchor_urb(urb, &data->ctrl_anchor);
|
|
|
|
err = usb_submit_urb(urb, GFP_KERNEL);
|
|
|
|
if (err < 0) {
|
|
|
|
if (err != -EPERM && err != -ENODEV)
|
|
|
|
bt_dev_err(hdev, "urb %p submission failed (%d)",
|
|
|
|
urb, -err);
|
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_free_urb(urb);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_hci_wmt_sync(struct hci_dev *hdev,
|
|
|
|
struct btmtk_hci_wmt_params *wmt_params)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct btmtk_hci_wmt_evt_funcc *wmt_evt_funcc;
|
|
|
|
u32 hlen, status = BTMTK_WMT_INVALID;
|
|
|
|
struct btmtk_hci_wmt_evt *wmt_evt;
|
|
|
|
struct btmtk_hci_wmt_cmd wc;
|
|
|
|
struct btmtk_wmt_hdr *hdr;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* Submit control IN URB on demand to process the WMT event */
|
|
|
|
err = btusb_mtk_submit_wmt_recv_urb(hdev);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* Send the WMT command and wait until the WMT event returns */
|
|
|
|
hlen = sizeof(*hdr) + wmt_params->dlen;
|
|
|
|
if (hlen > 255)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
hdr = (struct btmtk_wmt_hdr *)&wc;
|
|
|
|
hdr->dir = 1;
|
|
|
|
hdr->op = wmt_params->op;
|
|
|
|
hdr->dlen = cpu_to_le16(wmt_params->dlen + 1);
|
|
|
|
hdr->flag = wmt_params->flag;
|
|
|
|
memcpy(wc.data, wmt_params->data, wmt_params->dlen);
|
|
|
|
|
|
|
|
set_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags);
|
|
|
|
|
|
|
|
err = __hci_cmd_send(hdev, 0xfc6f, hlen, &wc);
|
|
|
|
|
|
|
|
if (err < 0) {
|
|
|
|
clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The vendor specific WMT commands are all answered by a vendor
|
|
|
|
* specific event and will have the Command Status or Command
|
|
|
|
* Complete as with usual HCI command flow control.
|
|
|
|
*
|
|
|
|
* After sending the command, wait for BTUSB_TX_WAIT_VND_EVT
|
|
|
|
* state to be cleared. The driver specific event receive routine
|
|
|
|
* will clear that state and with that indicate completion of the
|
|
|
|
* WMT command.
|
|
|
|
*/
|
|
|
|
err = wait_on_bit_timeout(&data->flags, BTUSB_TX_WAIT_VND_EVT,
|
|
|
|
TASK_INTERRUPTIBLE, HCI_INIT_TIMEOUT);
|
|
|
|
if (err == -EINTR) {
|
|
|
|
bt_dev_err(hdev, "Execution of wmt command interrupted");
|
|
|
|
clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
bt_dev_err(hdev, "Execution of wmt command timed out");
|
|
|
|
clear_bit(BTUSB_TX_WAIT_VND_EVT, &data->flags);
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parse and handle the return WMT event */
|
|
|
|
wmt_evt = (struct btmtk_hci_wmt_evt *)data->evt_skb->data;
|
|
|
|
if (wmt_evt->whdr.op != hdr->op) {
|
|
|
|
bt_dev_err(hdev, "Wrong op received %d expected %d",
|
|
|
|
wmt_evt->whdr.op, hdr->op);
|
|
|
|
err = -EIO;
|
|
|
|
goto err_free_skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (wmt_evt->whdr.op) {
|
|
|
|
case BTMTK_WMT_SEMAPHORE:
|
|
|
|
if (wmt_evt->whdr.flag == 2)
|
|
|
|
status = BTMTK_WMT_PATCH_UNDONE;
|
|
|
|
else
|
|
|
|
status = BTMTK_WMT_PATCH_DONE;
|
|
|
|
break;
|
|
|
|
case BTMTK_WMT_FUNC_CTRL:
|
|
|
|
wmt_evt_funcc = (struct btmtk_hci_wmt_evt_funcc *)wmt_evt;
|
|
|
|
if (be16_to_cpu(wmt_evt_funcc->status) == 0x404)
|
|
|
|
status = BTMTK_WMT_ON_DONE;
|
|
|
|
else if (be16_to_cpu(wmt_evt_funcc->status) == 0x420)
|
|
|
|
status = BTMTK_WMT_ON_PROGRESS;
|
|
|
|
else
|
|
|
|
status = BTMTK_WMT_ON_UNDONE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wmt_params->status)
|
|
|
|
*wmt_params->status = status;
|
|
|
|
|
|
|
|
err_free_skb:
|
|
|
|
kfree_skb(data->evt_skb);
|
|
|
|
data->evt_skb = NULL;
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_setup_firmware(struct hci_dev *hdev, const char *fwname)
|
|
|
|
{
|
|
|
|
struct btmtk_hci_wmt_params wmt_params;
|
|
|
|
const struct firmware *fw;
|
|
|
|
const u8 *fw_ptr;
|
|
|
|
size_t fw_size;
|
|
|
|
int err, dlen;
|
2020-06-20 03:52:01 +08:00
|
|
|
u8 flag, param;
|
2019-06-02 08:02:48 +08:00
|
|
|
|
|
|
|
err = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to load firmware file (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-20 03:52:01 +08:00
|
|
|
/* Power on data RAM the firmware relies on. */
|
|
|
|
param = 1;
|
|
|
|
wmt_params.op = BTMTK_WMT_FUNC_CTRL;
|
|
|
|
wmt_params.flag = 3;
|
|
|
|
wmt_params.dlen = sizeof(param);
|
|
|
|
wmt_params.data = ¶m;
|
|
|
|
wmt_params.status = NULL;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to power on data RAM (%d)", err);
|
2020-11-17 10:59:17 +08:00
|
|
|
goto err_release_fw;
|
2020-06-20 03:52:01 +08:00
|
|
|
}
|
|
|
|
|
2019-06-02 08:02:48 +08:00
|
|
|
fw_ptr = fw->data;
|
|
|
|
fw_size = fw->size;
|
|
|
|
|
|
|
|
/* The size of patch header is 30 bytes, should be skip */
|
2019-07-10 14:12:22 +08:00
|
|
|
if (fw_size < 30) {
|
|
|
|
err = -EINVAL;
|
2019-06-02 08:02:48 +08:00
|
|
|
goto err_release_fw;
|
2019-07-10 14:12:22 +08:00
|
|
|
}
|
2019-06-02 08:02:48 +08:00
|
|
|
|
|
|
|
fw_size -= 30;
|
|
|
|
fw_ptr += 30;
|
|
|
|
flag = 1;
|
|
|
|
|
|
|
|
wmt_params.op = BTMTK_WMT_PATCH_DWNLD;
|
|
|
|
wmt_params.status = NULL;
|
|
|
|
|
|
|
|
while (fw_size > 0) {
|
|
|
|
dlen = min_t(int, 250, fw_size);
|
|
|
|
|
|
|
|
/* Tell deivice the position in sequence */
|
|
|
|
if (fw_size - dlen <= 0)
|
|
|
|
flag = 3;
|
|
|
|
else if (fw_size < fw->size - 30)
|
|
|
|
flag = 2;
|
|
|
|
|
|
|
|
wmt_params.flag = flag;
|
|
|
|
wmt_params.dlen = dlen;
|
|
|
|
wmt_params.data = fw_ptr;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to send wmt patch dwnld (%d)",
|
|
|
|
err);
|
|
|
|
goto err_release_fw;
|
|
|
|
}
|
|
|
|
|
|
|
|
fw_size -= dlen;
|
|
|
|
fw_ptr += dlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
wmt_params.op = BTMTK_WMT_RST;
|
|
|
|
wmt_params.flag = 4;
|
|
|
|
wmt_params.dlen = 0;
|
|
|
|
wmt_params.data = NULL;
|
|
|
|
wmt_params.status = NULL;
|
|
|
|
|
|
|
|
/* Activate funciton the firmware providing to */
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to send wmt rst (%d)", err);
|
2019-11-30 01:36:35 +08:00
|
|
|
goto err_release_fw;
|
2019-06-02 08:02:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Wait a few moments for firmware activation done */
|
|
|
|
usleep_range(10000, 12000);
|
|
|
|
|
|
|
|
err_release_fw:
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_func_query(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btmtk_hci_wmt_params wmt_params;
|
|
|
|
int status, err;
|
|
|
|
u8 param = 0;
|
|
|
|
|
|
|
|
/* Query whether the function is enabled */
|
|
|
|
wmt_params.op = BTMTK_WMT_FUNC_CTRL;
|
|
|
|
wmt_params.flag = 4;
|
|
|
|
wmt_params.dlen = sizeof(param);
|
|
|
|
wmt_params.data = ¶m;
|
|
|
|
wmt_params.status = &status;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to query function status (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_reg_read(struct btusb_data *data, u32 reg, u32 *val)
|
|
|
|
{
|
|
|
|
int pipe, err, size = sizeof(u32);
|
|
|
|
void *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(size, GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pipe = usb_rcvctrlpipe(data->udev, 0);
|
|
|
|
err = usb_control_msg(data->udev, pipe, 0x63,
|
|
|
|
USB_TYPE_VENDOR | USB_DIR_IN,
|
|
|
|
reg >> 16, reg & 0xffff,
|
|
|
|
buf, size, USB_CTRL_SET_TIMEOUT);
|
|
|
|
if (err < 0)
|
|
|
|
goto err_free_buf;
|
|
|
|
|
|
|
|
*val = get_unaligned_le32(buf);
|
|
|
|
|
|
|
|
err_free_buf:
|
|
|
|
kfree(buf);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2021-02-02 18:26:17 +08:00
|
|
|
static int btusb_mtk_id_get(struct btusb_data *data, u32 reg, u32 *id)
|
2019-06-02 08:02:48 +08:00
|
|
|
{
|
2021-02-02 18:26:17 +08:00
|
|
|
return btusb_mtk_reg_read(data, reg, id);
|
2019-06-02 08:02:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_setup(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct btmtk_hci_wmt_params wmt_params;
|
|
|
|
ktime_t calltime, delta, rettime;
|
|
|
|
struct btmtk_tci_sleep tci_sleep;
|
|
|
|
unsigned long long duration;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
const char *fwname;
|
|
|
|
int err, status;
|
|
|
|
u32 dev_id;
|
|
|
|
u8 param;
|
|
|
|
|
|
|
|
calltime = ktime_get();
|
|
|
|
|
2021-02-02 18:26:17 +08:00
|
|
|
err = btusb_mtk_id_get(data, 0x80000008, &dev_id);
|
2019-06-02 08:02:48 +08:00
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to get device id (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (dev_id) {
|
2019-06-02 08:02:49 +08:00
|
|
|
case 0x7663:
|
|
|
|
fwname = FIRMWARE_MT7663;
|
|
|
|
break;
|
2019-06-02 08:02:48 +08:00
|
|
|
case 0x7668:
|
|
|
|
fwname = FIRMWARE_MT7668;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bt_dev_err(hdev, "Unsupported support hardware variant (%08x)",
|
|
|
|
dev_id);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Query whether the firmware is already download */
|
|
|
|
wmt_params.op = BTMTK_WMT_SEMAPHORE;
|
|
|
|
wmt_params.flag = 1;
|
|
|
|
wmt_params.dlen = 0;
|
|
|
|
wmt_params.data = NULL;
|
|
|
|
wmt_params.status = &status;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to query firmware status (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status == BTMTK_WMT_PATCH_DONE) {
|
|
|
|
bt_dev_info(hdev, "firmware already downloaded");
|
|
|
|
goto ignore_setup_fw;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup a firmware which the device definitely requires */
|
|
|
|
err = btusb_mtk_setup_firmware(hdev, fwname);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
ignore_setup_fw:
|
|
|
|
err = readx_poll_timeout(btusb_mtk_func_query, hdev, status,
|
|
|
|
status < 0 || status != BTMTK_WMT_ON_PROGRESS,
|
|
|
|
2000, 5000000);
|
|
|
|
/* -ETIMEDOUT happens */
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* The other errors happen in btusb_mtk_func_query */
|
|
|
|
if (status < 0)
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (status == BTMTK_WMT_ON_DONE) {
|
|
|
|
bt_dev_info(hdev, "function already on");
|
|
|
|
goto ignore_func_on;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Enable Bluetooth protocol */
|
|
|
|
param = 1;
|
|
|
|
wmt_params.op = BTMTK_WMT_FUNC_CTRL;
|
|
|
|
wmt_params.flag = 0;
|
|
|
|
wmt_params.dlen = sizeof(param);
|
|
|
|
wmt_params.data = ¶m;
|
|
|
|
wmt_params.status = NULL;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
ignore_func_on:
|
|
|
|
/* Apply the low power environment setup */
|
|
|
|
tci_sleep.mode = 0x5;
|
|
|
|
tci_sleep.duration = cpu_to_le16(0x640);
|
|
|
|
tci_sleep.host_duration = cpu_to_le16(0x640);
|
|
|
|
tci_sleep.host_wakeup_pin = 0;
|
|
|
|
tci_sleep.time_compensation = 0;
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc7a, sizeof(tci_sleep), &tci_sleep,
|
|
|
|
HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
err = PTR_ERR(skb);
|
|
|
|
bt_dev_err(hdev, "Failed to apply low power setting (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
rettime = ktime_get();
|
|
|
|
delta = ktime_sub(rettime, calltime);
|
|
|
|
duration = (unsigned long long)ktime_to_ns(delta) >> 10;
|
|
|
|
|
|
|
|
bt_dev_info(hdev, "Device setup in %llu usecs", duration);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_mtk_shutdown(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btmtk_hci_wmt_params wmt_params;
|
|
|
|
u8 param = 0;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* Disable the device */
|
|
|
|
wmt_params.op = BTMTK_WMT_FUNC_CTRL;
|
|
|
|
wmt_params.flag = 0;
|
|
|
|
wmt_params.dlen = sizeof(param);
|
|
|
|
wmt_params.data = ¶m;
|
|
|
|
wmt_params.status = NULL;
|
|
|
|
|
|
|
|
err = btusb_mtk_hci_wmt_sync(hdev, &wmt_params);
|
|
|
|
if (err < 0) {
|
|
|
|
bt_dev_err(hdev, "Failed to send wmt func ctrl (%d)", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-06-02 08:02:49 +08:00
|
|
|
MODULE_FIRMWARE(FIRMWARE_MT7663);
|
2019-06-02 08:02:48 +08:00
|
|
|
MODULE_FIRMWARE(FIRMWARE_MT7668);
|
|
|
|
|
2017-02-02 06:24:10 +08:00
|
|
|
#ifdef CONFIG_PM
|
|
|
|
/* Configure an out-of-band gpio as wake-up pin, if specified in device tree */
|
|
|
|
static int marvell_config_oob_wake(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct device *dev = &data->udev->dev;
|
|
|
|
u16 pin, gap, opcode;
|
|
|
|
int ret;
|
|
|
|
u8 cmd[5];
|
|
|
|
|
|
|
|
/* Move on if no wakeup pin specified */
|
|
|
|
if (of_property_read_u16(dev->of_node, "marvell,wakeup-pin", &pin) ||
|
|
|
|
of_property_read_u16(dev->of_node, "marvell,wakeup-gap-ms", &gap))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Vendor specific command to configure a GPIO as wake-up pin */
|
|
|
|
opcode = hci_opcode_pack(0x3F, 0x59);
|
|
|
|
cmd[0] = opcode & 0xFF;
|
|
|
|
cmd[1] = opcode >> 8;
|
|
|
|
cmd[2] = 2; /* length of parameters that follow */
|
|
|
|
cmd[3] = pin;
|
|
|
|
cmd[4] = gap; /* time in ms, for which wakeup pin should be asserted */
|
|
|
|
|
|
|
|
skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL);
|
|
|
|
if (!skb) {
|
2020-12-22 18:31:49 +08:00
|
|
|
bt_dev_err(hdev, "%s: No memory", __func__);
|
2017-02-02 06:24:10 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
skb_put_data(skb, cmd, sizeof(cmd));
|
2017-02-02 06:24:10 +08:00
|
|
|
hci_skb_pkt_type(skb) = HCI_COMMAND_PKT;
|
|
|
|
|
|
|
|
ret = btusb_send_frame(hdev, skb);
|
|
|
|
if (ret) {
|
2020-12-22 18:31:49 +08:00
|
|
|
bt_dev_err(hdev, "%s: configuration failed", __func__);
|
2017-02-02 06:24:10 +08:00
|
|
|
kfree_skb(skb);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-07-19 05:47:06 +08:00
|
|
|
static int btusb_set_bdaddr_marvell(struct hci_dev *hdev,
|
|
|
|
const bdaddr_t *bdaddr)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
u8 buf[8];
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
buf[0] = 0xfe;
|
|
|
|
buf[1] = sizeof(bdaddr_t);
|
|
|
|
memcpy(buf + 2, bdaddr, sizeof(bdaddr_t));
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc22, sizeof(buf), buf, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "changing Marvell device address failed (%ld)",
|
|
|
|
ret);
|
2014-07-19 05:47:06 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-12-13 02:58:05 +08:00
|
|
|
static int btusb_set_bdaddr_ath3012(struct hci_dev *hdev,
|
|
|
|
const bdaddr_t *bdaddr)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
u8 buf[10];
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
buf[0] = 0x01;
|
|
|
|
buf[1] = 0x01;
|
|
|
|
buf[2] = 0x00;
|
|
|
|
buf[3] = sizeof(bdaddr_t);
|
|
|
|
memcpy(buf + 4, bdaddr, sizeof(bdaddr_t));
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc0b, sizeof(buf), buf, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "Change address command failed (%ld)", ret);
|
2014-12-13 02:58:05 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-29 12:23:51 +08:00
|
|
|
static int btusb_set_bdaddr_wcn6855(struct hci_dev *hdev,
|
|
|
|
const bdaddr_t *bdaddr)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
u8 buf[6];
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
memcpy(buf, bdaddr, sizeof(bdaddr_t));
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync_ev(hdev, 0xfc14, sizeof(buf), buf,
|
|
|
|
HCI_EV_CMD_COMPLETE, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
bt_dev_err(hdev, "Change address command failed (%ld)", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
#define QCA_DFU_PACKET_LEN 4096
|
|
|
|
|
|
|
|
#define QCA_GET_TARGET_VERSION 0x09
|
|
|
|
#define QCA_CHECK_STATUS 0x05
|
|
|
|
#define QCA_DFU_DOWNLOAD 0x01
|
|
|
|
|
|
|
|
#define QCA_SYSCFG_UPDATED 0x40
|
|
|
|
#define QCA_PATCH_UPDATED 0x80
|
|
|
|
#define QCA_DFU_TIMEOUT 3000
|
2020-12-03 12:57:14 +08:00
|
|
|
#define QCA_FLAG_MULTI_NVM 0x80
|
2015-02-16 07:07:33 +08:00
|
|
|
|
|
|
|
struct qca_version {
|
|
|
|
__le32 rom_version;
|
|
|
|
__le32 patch_version;
|
|
|
|
__le32 ram_version;
|
2020-12-03 12:57:14 +08:00
|
|
|
__le16 board_id;
|
|
|
|
__le16 flag;
|
2015-02-16 07:07:33 +08:00
|
|
|
__u8 reserved[4];
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct qca_rampatch_version {
|
2020-09-29 12:23:51 +08:00
|
|
|
__le16 rom_version_high;
|
|
|
|
__le16 rom_version_low;
|
2015-02-16 07:07:33 +08:00
|
|
|
__le16 patch_version;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct qca_device_info {
|
2015-03-11 07:34:58 +08:00
|
|
|
u32 rom_version;
|
|
|
|
u8 rampatch_hdr; /* length of header in rampatch */
|
|
|
|
u8 nvm_hdr; /* length of header in NVM */
|
|
|
|
u8 ver_offset; /* offset of version structure in rampatch */
|
2015-02-16 07:07:33 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct qca_device_info qca_devices_table[] = {
|
2020-09-29 12:23:51 +08:00
|
|
|
{ 0x00000100, 20, 4, 8 }, /* Rome 1.0 */
|
|
|
|
{ 0x00000101, 20, 4, 8 }, /* Rome 1.1 */
|
|
|
|
{ 0x00000200, 28, 4, 16 }, /* Rome 2.0 */
|
|
|
|
{ 0x00000201, 28, 4, 16 }, /* Rome 2.1 */
|
|
|
|
{ 0x00000300, 28, 4, 16 }, /* Rome 3.0 */
|
|
|
|
{ 0x00000302, 28, 4, 16 }, /* Rome 3.2 */
|
|
|
|
{ 0x00130100, 40, 4, 16 }, /* WCN6855 1.0 */
|
|
|
|
{ 0x00130200, 40, 4, 16 }, /* WCN6855 2.0 */
|
2015-02-16 07:07:33 +08:00
|
|
|
};
|
|
|
|
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
static int btusb_qca_send_vendor_req(struct usb_device *udev, u8 request,
|
2015-02-16 07:07:33 +08:00
|
|
|
void *data, u16 size)
|
|
|
|
{
|
|
|
|
int pipe, err;
|
|
|
|
u8 *buf;
|
|
|
|
|
|
|
|
buf = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/* Found some of USB hosts have IOT issues with ours so that we should
|
|
|
|
* not wait until HCI layer is ready.
|
|
|
|
*/
|
|
|
|
pipe = usb_rcvctrlpipe(udev, 0);
|
|
|
|
err = usb_control_msg(udev, pipe, request, USB_TYPE_VENDOR | USB_DIR_IN,
|
|
|
|
0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
|
|
|
|
if (err < 0) {
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
dev_err(&udev->dev, "Failed to access otp area (%d)", err);
|
2015-02-16 07:07:33 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(data, buf, size);
|
|
|
|
|
|
|
|
done:
|
|
|
|
kfree(buf);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_qca_download_fw(struct hci_dev *hdev,
|
|
|
|
const struct firmware *firmware,
|
|
|
|
size_t hdr_size)
|
|
|
|
{
|
|
|
|
struct btusb_data *btdata = hci_get_drvdata(hdev);
|
|
|
|
struct usb_device *udev = btdata->udev;
|
|
|
|
size_t count, size, sent = 0;
|
|
|
|
int pipe, len, err;
|
|
|
|
u8 *buf;
|
|
|
|
|
|
|
|
buf = kmalloc(QCA_DFU_PACKET_LEN, GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
count = firmware->size;
|
|
|
|
|
|
|
|
size = min_t(size_t, count, hdr_size);
|
|
|
|
memcpy(buf, firmware->data, size);
|
|
|
|
|
|
|
|
/* USB patches should go down to controller through USB path
|
|
|
|
* because binary format fits to go down through USB channel.
|
|
|
|
* USB control path is for patching headers and USB bulk is for
|
|
|
|
* patch body.
|
|
|
|
*/
|
|
|
|
pipe = usb_sndctrlpipe(udev, 0);
|
|
|
|
err = usb_control_msg(udev, pipe, QCA_DFU_DOWNLOAD, USB_TYPE_VENDOR,
|
|
|
|
0, 0, buf, size, USB_CTRL_SET_TIMEOUT);
|
|
|
|
if (err < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "Failed to send headers (%d)", err);
|
2015-02-16 07:07:33 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
sent += size;
|
|
|
|
count -= size;
|
|
|
|
|
|
|
|
while (count) {
|
|
|
|
size = min_t(size_t, count, QCA_DFU_PACKET_LEN);
|
|
|
|
|
|
|
|
memcpy(buf, firmware->data + sent, size);
|
|
|
|
|
|
|
|
pipe = usb_sndbulkpipe(udev, 0x02);
|
|
|
|
err = usb_bulk_msg(udev, pipe, buf, size, &len,
|
|
|
|
QCA_DFU_TIMEOUT);
|
|
|
|
if (err < 0) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "Failed to send body at %zd of %zd (%d)",
|
|
|
|
sent, firmware->size, err);
|
2015-02-16 07:07:33 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size != len) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "Failed to get bulk buffer");
|
2015-02-16 07:07:33 +08:00
|
|
|
err = -EILSEQ;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
sent += size;
|
|
|
|
count -= size;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
kfree(buf);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_qca_load_rampatch(struct hci_dev *hdev,
|
|
|
|
struct qca_version *ver,
|
|
|
|
const struct qca_device_info *info)
|
|
|
|
{
|
|
|
|
struct qca_rampatch_version *rver;
|
|
|
|
const struct firmware *fw;
|
2020-09-29 12:23:51 +08:00
|
|
|
u32 ver_rom, ver_patch, rver_rom;
|
|
|
|
u16 rver_rom_low, rver_rom_high, rver_patch;
|
2015-02-16 07:07:33 +08:00
|
|
|
char fwname[64];
|
|
|
|
int err;
|
|
|
|
|
2015-03-11 07:34:58 +08:00
|
|
|
ver_rom = le32_to_cpu(ver->rom_version);
|
|
|
|
ver_patch = le32_to_cpu(ver->patch_version);
|
|
|
|
|
|
|
|
snprintf(fwname, sizeof(fwname), "qca/rampatch_usb_%08x.bin", ver_rom);
|
2015-02-16 07:07:33 +08:00
|
|
|
|
|
|
|
err = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (err) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "failed to request rampatch file: %s (%d)",
|
|
|
|
fwname, err);
|
2015-02-16 07:07:33 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "using rampatch file: %s", fwname);
|
2015-03-11 07:34:58 +08:00
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
rver = (struct qca_rampatch_version *)(fw->data + info->ver_offset);
|
2020-09-29 12:23:51 +08:00
|
|
|
rver_rom_low = le16_to_cpu(rver->rom_version_low);
|
2015-03-11 07:34:58 +08:00
|
|
|
rver_patch = le16_to_cpu(rver->patch_version);
|
|
|
|
|
2020-09-29 12:23:51 +08:00
|
|
|
if (ver_rom & ~0xffffU) {
|
|
|
|
rver_rom_high = le16_to_cpu(rver->rom_version_high);
|
|
|
|
rver_rom = le32_to_cpu(rver_rom_high << 16 | rver_rom_low);
|
|
|
|
} else {
|
|
|
|
rver_rom = rver_rom_low;
|
|
|
|
}
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "QCA: patch rome 0x%x build 0x%x, "
|
|
|
|
"firmware rome 0x%x build 0x%x",
|
|
|
|
rver_rom, rver_patch, ver_rom, ver_patch);
|
2015-02-16 07:07:33 +08:00
|
|
|
|
2015-03-11 07:34:58 +08:00
|
|
|
if (rver_rom != ver_rom || rver_patch <= ver_patch) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "rampatch file version did not match with firmware");
|
2015-02-16 07:07:33 +08:00
|
|
|
err = -EINVAL;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = btusb_setup_qca_download_fw(hdev, fw, info->rampatch_hdr);
|
|
|
|
|
|
|
|
done:
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_setup_qca_load_nvm(struct hci_dev *hdev,
|
|
|
|
struct qca_version *ver,
|
|
|
|
const struct qca_device_info *info)
|
|
|
|
{
|
|
|
|
const struct firmware *fw;
|
|
|
|
char fwname[64];
|
|
|
|
int err;
|
|
|
|
|
2020-12-03 12:57:14 +08:00
|
|
|
if (((ver->flag >> 8) & 0xff) == QCA_FLAG_MULTI_NVM) {
|
|
|
|
snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x_%04x.bin",
|
|
|
|
le32_to_cpu(ver->rom_version),
|
|
|
|
le16_to_cpu(ver->board_id));
|
|
|
|
} else {
|
|
|
|
snprintf(fwname, sizeof(fwname), "qca/nvm_usb_%08x.bin",
|
|
|
|
le32_to_cpu(ver->rom_version));
|
|
|
|
}
|
2015-02-16 07:07:33 +08:00
|
|
|
|
|
|
|
err = request_firmware(&fw, fwname, &hdev->dev);
|
|
|
|
if (err) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "failed to request NVM file: %s (%d)",
|
|
|
|
fwname, err);
|
2015-02-16 07:07:33 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_info(hdev, "using NVM file: %s", fwname);
|
2015-02-16 07:07:33 +08:00
|
|
|
|
|
|
|
err = btusb_setup_qca_download_fw(hdev, fw, info->nvm_hdr);
|
|
|
|
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
/* identify the ROM version and check whether patches are needed */
|
|
|
|
static bool btusb_qca_need_patch(struct usb_device *udev)
|
|
|
|
{
|
|
|
|
struct qca_version ver;
|
|
|
|
|
|
|
|
if (btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver,
|
|
|
|
sizeof(ver)) < 0)
|
|
|
|
return false;
|
|
|
|
/* only low ROM versions need patches */
|
|
|
|
return !(le32_to_cpu(ver.rom_version) & ~0xffffU);
|
|
|
|
}
|
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
static int btusb_setup_qca(struct hci_dev *hdev)
|
|
|
|
{
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
struct btusb_data *btdata = hci_get_drvdata(hdev);
|
|
|
|
struct usb_device *udev = btdata->udev;
|
2015-02-16 07:07:33 +08:00
|
|
|
const struct qca_device_info *info = NULL;
|
|
|
|
struct qca_version ver;
|
2015-03-11 07:34:58 +08:00
|
|
|
u32 ver_rom;
|
2015-02-16 07:07:33 +08:00
|
|
|
u8 status;
|
|
|
|
int i, err;
|
|
|
|
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver,
|
2015-04-17 05:15:50 +08:00
|
|
|
sizeof(ver));
|
2015-02-16 07:07:33 +08:00
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
2015-03-11 07:34:58 +08:00
|
|
|
ver_rom = le32_to_cpu(ver.rom_version);
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
for (i = 0; i < ARRAY_SIZE(qca_devices_table); i++) {
|
2015-03-11 07:34:58 +08:00
|
|
|
if (ver_rom == qca_devices_table[i].rom_version)
|
2015-02-16 07:07:33 +08:00
|
|
|
info = &qca_devices_table[i];
|
|
|
|
}
|
|
|
|
if (!info) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "don't support firmware rome 0x%x", ver_rom);
|
2015-02-16 07:07:33 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
err = btusb_qca_send_vendor_req(udev, QCA_CHECK_STATUS, &status,
|
2015-02-16 07:07:33 +08:00
|
|
|
sizeof(status));
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (!(status & QCA_PATCH_UPDATED)) {
|
|
|
|
err = btusb_setup_qca_load_rampatch(hdev, &ver, info);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-12-03 12:57:14 +08:00
|
|
|
err = btusb_qca_send_vendor_req(udev, QCA_GET_TARGET_VERSION, &ver,
|
|
|
|
sizeof(ver));
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
if (!(status & QCA_SYSCFG_UPDATED)) {
|
|
|
|
err = btusb_setup_qca_load_nvm(hdev, &ver, info);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-09 02:23:08 +08:00
|
|
|
static inline int __set_diag_interface(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct usb_interface *intf = data->diag;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!data->diag)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
data->diag_tx_ep = NULL;
|
|
|
|
data->diag_rx_ep = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
|
|
|
|
struct usb_endpoint_descriptor *ep_desc;
|
|
|
|
|
|
|
|
ep_desc = &intf->cur_altsetting->endpoint[i].desc;
|
|
|
|
|
|
|
|
if (!data->diag_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
|
|
|
|
data->diag_tx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->diag_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
|
|
|
|
data->diag_rx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->diag_tx_ep || !data->diag_rx_ep) {
|
2017-10-30 17:42:59 +08:00
|
|
|
bt_dev_err(hdev, "invalid diagnostic descriptors");
|
2015-10-09 02:23:08 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct urb *alloc_diag_urb(struct hci_dev *hdev, bool enable)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct urb *urb;
|
|
|
|
unsigned int pipe;
|
|
|
|
|
|
|
|
if (!data->diag_tx_ep)
|
|
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
|
|
|
|
urb = usb_alloc_urb(0, GFP_KERNEL);
|
|
|
|
if (!urb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
skb = bt_skb_alloc(2, GFP_KERNEL);
|
|
|
|
if (!skb) {
|
|
|
|
usb_free_urb(urb);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
networking: add and use skb_put_u8()
Joe and Bjørn suggested that it'd be nicer to not have the
cast in the fairly common case of doing
*(u8 *)skb_put(skb, 1) = c;
Add skb_put_u8() for this case, and use it across the code,
using the following spatch:
@@
expression SKB, C, S;
typedef u8;
identifier fn = {skb_put};
fresh identifier fn2 = fn ## "_u8";
@@
- *(u8 *)fn(SKB, S) = C;
+ fn2(SKB, C);
Note that due to the "S", the spatch isn't perfect, it should
have checked that S is 1, but there's also places that use a
sizeof expression like sizeof(var) or sizeof(u8) etc. Turns
out that nobody ever did something like
*(u8 *)skb_put(skb, 2) = c;
which would be wrong anyway since the second byte wouldn't be
initialized.
Suggested-by: Joe Perches <joe@perches.com>
Suggested-by: Bjørn Mork <bjorn@mork.no>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:24 +08:00
|
|
|
skb_put_u8(skb, 0xf0);
|
|
|
|
skb_put_u8(skb, enable);
|
2015-10-09 02:23:08 +08:00
|
|
|
|
|
|
|
pipe = usb_sndbulkpipe(data->udev, data->diag_tx_ep->bEndpointAddress);
|
|
|
|
|
|
|
|
usb_fill_bulk_urb(urb, data->udev, pipe,
|
|
|
|
skb->data, skb->len, btusb_tx_complete, skb);
|
|
|
|
|
|
|
|
skb->dev = (void *)hdev;
|
|
|
|
|
|
|
|
return urb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int btusb_bcm_set_diag(struct hci_dev *hdev, bool enable)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct urb *urb;
|
|
|
|
|
|
|
|
if (!data->diag)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
|
|
|
return -ENETDOWN;
|
|
|
|
|
|
|
|
urb = alloc_diag_urb(hdev, enable);
|
|
|
|
if (IS_ERR(urb))
|
|
|
|
return PTR_ERR(urb);
|
|
|
|
|
|
|
|
return submit_or_queue_tx_urb(hdev, urb);
|
|
|
|
}
|
|
|
|
|
2017-02-02 06:24:09 +08:00
|
|
|
#ifdef CONFIG_PM
|
|
|
|
static irqreturn_t btusb_oob_wake_handler(int irq, void *priv)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = priv;
|
|
|
|
|
|
|
|
pm_wakeup_event(&data->udev->dev, 0);
|
2017-02-24 14:24:29 +08:00
|
|
|
pm_system_wakeup();
|
2017-02-02 06:24:09 +08:00
|
|
|
|
|
|
|
/* Disable only if not already disabled (keep it balanced) */
|
|
|
|
if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
|
|
|
|
disable_irq_nosync(irq);
|
|
|
|
disable_irq_wake(irq);
|
|
|
|
}
|
|
|
|
return IRQ_HANDLED;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct of_device_id btusb_match_table[] = {
|
|
|
|
{ .compatible = "usb1286,204e" },
|
2019-02-23 06:53:43 +08:00
|
|
|
{ .compatible = "usbcf3,e300" }, /* QCA6174A */
|
|
|
|
{ .compatible = "usb4ca,301a" }, /* QCA6174A (Lite-On) */
|
2017-02-02 06:24:09 +08:00
|
|
|
{ }
|
|
|
|
};
|
|
|
|
MODULE_DEVICE_TABLE(of, btusb_match_table);
|
|
|
|
|
|
|
|
/* Use an oob wakeup pin? */
|
|
|
|
static int btusb_config_oob_wake(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
struct device *dev = &data->udev->dev;
|
|
|
|
int irq, ret;
|
|
|
|
|
|
|
|
clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
|
|
|
|
|
|
|
|
if (!of_match_device(btusb_match_table, dev))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Move on if no IRQ specified */
|
|
|
|
irq = of_irq_get_byname(dev->of_node, "wakeup");
|
|
|
|
if (irq <= 0) {
|
|
|
|
bt_dev_dbg(hdev, "%s: no OOB Wakeup IRQ in DT", __func__);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-10 02:49:17 +08:00
|
|
|
irq_set_status_flags(irq, IRQ_NOAUTOEN);
|
2017-02-02 06:24:09 +08:00
|
|
|
ret = devm_request_irq(&hdev->dev, irq, btusb_oob_wake_handler,
|
|
|
|
0, "OOB Wake-on-BT", data);
|
|
|
|
if (ret) {
|
|
|
|
bt_dev_err(hdev, "%s: IRQ request failed", __func__);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = device_init_wakeup(dev, true);
|
|
|
|
if (ret) {
|
|
|
|
bt_dev_err(hdev, "%s: failed to init_wakeup", __func__);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
data->oob_wake_irq = irq;
|
|
|
|
bt_dev_info(hdev, "OOB Wake-on-BT configured at IRQ %u", irq);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-04-27 17:26:43 +08:00
|
|
|
static void btusb_check_needs_reset_resume(struct usb_interface *intf)
|
|
|
|
{
|
|
|
|
if (dmi_check_system(btusb_needs_reset_resume_table))
|
|
|
|
interface_to_usbdev(intf)->quirks |= USB_QUIRK_RESET_RESUME;
|
|
|
|
}
|
|
|
|
|
2020-05-13 10:19:27 +08:00
|
|
|
static bool btusb_prevent_wake(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = hci_get_drvdata(hdev);
|
|
|
|
|
2020-06-25 02:24:30 +08:00
|
|
|
if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags))
|
|
|
|
return true;
|
|
|
|
|
2020-05-13 10:19:27 +08:00
|
|
|
return !device_may_wakeup(&data->udev->dev);
|
|
|
|
}
|
|
|
|
|
2020-12-18 18:12:11 +08:00
|
|
|
static int btusb_shutdown_qca(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
bt_dev_err(hdev, "HCI reset during shutdown failed");
|
|
|
|
return PTR_ERR(skb);
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static int btusb_probe(struct usb_interface *intf,
|
2014-09-16 10:44:50 +08:00
|
|
|
const struct usb_device_id *id)
|
2007-10-20 20:12:34 +08:00
|
|
|
{
|
|
|
|
struct usb_endpoint_descriptor *ep_desc;
|
2019-01-25 07:28:14 +08:00
|
|
|
struct gpio_desc *reset_gpio;
|
2007-10-20 20:12:34 +08:00
|
|
|
struct btusb_data *data;
|
|
|
|
struct hci_dev *hdev;
|
2015-10-20 06:53:33 +08:00
|
|
|
unsigned ifnum_base;
|
2007-10-20 20:12:34 +08:00
|
|
|
int i, err;
|
|
|
|
|
|
|
|
BT_DBG("intf %p id %p", intf, id);
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
/* interface numbers are hardcoded in the spec */
|
2015-10-20 06:53:33 +08:00
|
|
|
if (intf->cur_altsetting->desc.bInterfaceNumber != 0) {
|
|
|
|
if (!(id->driver_info & BTUSB_IFNUM_2))
|
|
|
|
return -ENODEV;
|
|
|
|
if (intf->cur_altsetting->desc.bInterfaceNumber != 2)
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
ifnum_base = intf->cur_altsetting->desc.bInterfaceNumber;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
if (!id->driver_info) {
|
|
|
|
const struct usb_device_id *match;
|
2014-09-16 10:44:50 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
match = usb_match_id(intf, blacklist_table);
|
|
|
|
if (match)
|
|
|
|
id = match;
|
|
|
|
}
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
if (id->driver_info == BTUSB_IGNORE)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2011-07-01 14:02:36 +08:00
|
|
|
if (id->driver_info & BTUSB_ATH3012) {
|
|
|
|
struct usb_device *udev = interface_to_usbdev(intf);
|
|
|
|
|
|
|
|
/* Old firmware would otherwise let ath3k driver load
|
2017-07-22 09:47:07 +08:00
|
|
|
* patch and sysconfig files
|
|
|
|
*/
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
if (le16_to_cpu(udev->descriptor.bcdDevice) <= 0x0001 &&
|
|
|
|
!btusb_qca_need_patch(udev))
|
2011-07-01 14:02:36 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
2012-07-27 15:08:39 +08:00
|
|
|
data = devm_kzalloc(&intf->dev, sizeof(*data), GFP_KERNEL);
|
2007-10-20 20:12:34 +08:00
|
|
|
if (!data)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
for (i = 0; i < intf->cur_altsetting->desc.bNumEndpoints; i++) {
|
|
|
|
ep_desc = &intf->cur_altsetting->endpoint[i].desc;
|
|
|
|
|
|
|
|
if (!data->intr_ep && usb_endpoint_is_int_in(ep_desc)) {
|
|
|
|
data->intr_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->bulk_tx_ep && usb_endpoint_is_bulk_out(ep_desc)) {
|
|
|
|
data->bulk_tx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data->bulk_rx_ep && usb_endpoint_is_bulk_in(ep_desc)) {
|
|
|
|
data->bulk_rx_ep = ep_desc;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-27 15:08:39 +08:00
|
|
|
if (!data->intr_ep || !data->bulk_tx_ep || !data->bulk_rx_ep)
|
2007-10-20 20:12:34 +08:00
|
|
|
return -ENODEV;
|
|
|
|
|
2015-01-29 12:27:34 +08:00
|
|
|
if (id->driver_info & BTUSB_AMP) {
|
|
|
|
data->cmdreq_type = USB_TYPE_CLASS | 0x01;
|
|
|
|
data->cmdreq = 0x2b;
|
|
|
|
} else {
|
|
|
|
data->cmdreq_type = USB_TYPE_CLASS;
|
|
|
|
data->cmdreq = 0x00;
|
|
|
|
}
|
2008-11-30 19:17:26 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
data->udev = interface_to_usbdev(intf);
|
2008-09-23 06:16:36 +08:00
|
|
|
data->intf = intf;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
INIT_WORK(&data->work, btusb_work);
|
2009-08-25 05:44:59 +08:00
|
|
|
INIT_WORK(&data->waker, btusb_waker);
|
2014-09-16 14:00:29 +08:00
|
|
|
init_usb_anchor(&data->deferred);
|
|
|
|
init_usb_anchor(&data->tx_anchor);
|
2009-08-25 05:44:59 +08:00
|
|
|
spin_lock_init(&data->txlock);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
init_usb_anchor(&data->intr_anchor);
|
|
|
|
init_usb_anchor(&data->bulk_anchor);
|
2008-08-18 19:23:52 +08:00
|
|
|
init_usb_anchor(&data->isoc_anchor);
|
2015-10-09 02:23:08 +08:00
|
|
|
init_usb_anchor(&data->diag_anchor);
|
2019-06-02 08:02:48 +08:00
|
|
|
init_usb_anchor(&data->ctrl_anchor);
|
2014-09-16 14:00:29 +08:00
|
|
|
spin_lock_init(&data->rxlock);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL_NEW) {
|
|
|
|
data->recv_event = btusb_recv_event_intel;
|
|
|
|
data->recv_bulk = btusb_recv_bulk_intel;
|
|
|
|
set_bit(BTUSB_BOOTLOADER, &data->flags);
|
|
|
|
} else {
|
|
|
|
data->recv_event = hci_recv_frame;
|
|
|
|
data->recv_bulk = btusb_recv_bulk;
|
|
|
|
}
|
2014-11-03 12:16:07 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
hdev = hci_alloc_dev();
|
2012-07-27 15:08:39 +08:00
|
|
|
if (!hdev)
|
2007-10-20 20:12:34 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
|
2010-02-08 22:27:07 +08:00
|
|
|
hdev->bus = HCI_USB;
|
2012-02-10 04:58:32 +08:00
|
|
|
hci_set_drvdata(hdev, data);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2015-01-29 12:27:34 +08:00
|
|
|
if (id->driver_info & BTUSB_AMP)
|
|
|
|
hdev->dev_type = HCI_AMP;
|
|
|
|
else
|
2016-07-05 20:30:14 +08:00
|
|
|
hdev->dev_type = HCI_PRIMARY;
|
2015-01-29 12:27:34 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
data->hdev = hdev;
|
|
|
|
|
|
|
|
SET_HCIDEV_DEV(hdev, &intf->dev);
|
|
|
|
|
2019-01-25 07:28:14 +08:00
|
|
|
reset_gpio = gpiod_get_optional(&data->udev->dev, "reset",
|
|
|
|
GPIOD_OUT_LOW);
|
|
|
|
if (IS_ERR(reset_gpio)) {
|
|
|
|
err = PTR_ERR(reset_gpio);
|
|
|
|
goto out_free_dev;
|
|
|
|
} else if (reset_gpio) {
|
|
|
|
data->reset_gpio = reset_gpio;
|
|
|
|
}
|
|
|
|
|
2013-04-10 23:11:35 +08:00
|
|
|
hdev->open = btusb_open;
|
|
|
|
hdev->close = btusb_close;
|
|
|
|
hdev->flush = btusb_flush;
|
|
|
|
hdev->send = btusb_send_frame;
|
|
|
|
hdev->notify = btusb_notify;
|
2020-05-13 10:19:27 +08:00
|
|
|
hdev->prevent_wake = btusb_prevent_wake;
|
2013-04-10 23:11:35 +08:00
|
|
|
|
2017-02-02 06:24:09 +08:00
|
|
|
#ifdef CONFIG_PM
|
|
|
|
err = btusb_config_oob_wake(hdev);
|
|
|
|
if (err)
|
|
|
|
goto out_free_dev;
|
2017-02-02 06:24:10 +08:00
|
|
|
|
|
|
|
/* Marvell devices may need a specific chip configuration */
|
|
|
|
if (id->driver_info & BTUSB_MARVELL && data->oob_wake_irq) {
|
|
|
|
err = marvell_config_oob_wake(hdev);
|
|
|
|
if (err)
|
|
|
|
goto out_free_dev;
|
|
|
|
}
|
2017-02-02 06:24:09 +08:00
|
|
|
#endif
|
2016-09-01 23:22:37 +08:00
|
|
|
if (id->driver_info & BTUSB_CW6622)
|
|
|
|
set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
|
|
|
|
|
2015-10-17 20:39:27 +08:00
|
|
|
if (id->driver_info & BTUSB_BCM2045)
|
|
|
|
set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY, &hdev->quirks);
|
|
|
|
|
2013-04-10 23:11:35 +08:00
|
|
|
if (id->driver_info & BTUSB_BCM92035)
|
|
|
|
hdev->setup = btusb_setup_bcm92035;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2019-09-27 14:48:58 +08:00
|
|
|
if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) &&
|
|
|
|
(id->driver_info & BTUSB_BCM_PATCHRAM)) {
|
2015-10-20 08:30:48 +08:00
|
|
|
hdev->manufacturer = 15;
|
2015-04-06 13:52:14 +08:00
|
|
|
hdev->setup = btbcm_setup_patchram;
|
2015-10-09 02:23:08 +08:00
|
|
|
hdev->set_diag = btusb_bcm_set_diag;
|
2015-04-06 13:52:11 +08:00
|
|
|
hdev->set_bdaddr = btbcm_set_bdaddr;
|
2015-10-09 02:23:08 +08:00
|
|
|
|
|
|
|
/* Broadcom LM_DIAG Interface numbers are hardcoded */
|
2015-10-20 06:53:33 +08:00
|
|
|
data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
|
2014-07-02 06:53:48 +08:00
|
|
|
}
|
2014-05-09 06:50:01 +08:00
|
|
|
|
2019-09-27 14:48:58 +08:00
|
|
|
if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) &&
|
|
|
|
(id->driver_info & BTUSB_BCM_APPLE)) {
|
2015-10-20 08:30:48 +08:00
|
|
|
hdev->manufacturer = 15;
|
2015-04-06 13:52:14 +08:00
|
|
|
hdev->setup = btbcm_setup_apple;
|
2015-10-09 02:23:08 +08:00
|
|
|
hdev->set_diag = btusb_bcm_set_diag;
|
|
|
|
|
|
|
|
/* Broadcom LM_DIAG Interface numbers are hardcoded */
|
2015-10-20 06:53:33 +08:00
|
|
|
data->diag = usb_ifnum_to_if(data->udev, ifnum_base + 2);
|
2015-10-09 02:23:08 +08:00
|
|
|
}
|
2015-03-22 22:52:38 +08:00
|
|
|
|
2014-07-02 17:25:25 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL) {
|
2015-10-20 08:30:48 +08:00
|
|
|
hdev->manufacturer = 2;
|
2013-04-20 00:57:43 +08:00
|
|
|
hdev->setup = btusb_setup_intel;
|
2015-02-14 01:20:52 +08:00
|
|
|
hdev->shutdown = btusb_shutdown_intel;
|
2015-10-17 22:00:28 +08:00
|
|
|
hdev->set_diag = btintel_set_diag_mfg;
|
2015-04-06 15:52:12 +08:00
|
|
|
hdev->set_bdaddr = btintel_set_bdaddr;
|
2019-01-25 07:28:14 +08:00
|
|
|
hdev->cmd_timeout = btusb_intel_cmd_timeout;
|
2015-01-31 10:55:58 +08:00
|
|
|
set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
|
2015-03-18 00:04:16 +08:00
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
2015-10-17 22:00:28 +08:00
|
|
|
set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
|
2014-07-02 17:25:25 +08:00
|
|
|
}
|
2013-04-20 00:57:43 +08:00
|
|
|
|
2015-01-27 13:33:48 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL_NEW) {
|
2015-10-20 08:30:48 +08:00
|
|
|
hdev->manufacturer = 2;
|
2015-01-27 13:33:48 +08:00
|
|
|
hdev->send = btusb_send_frame_intel;
|
|
|
|
hdev->setup = btusb_setup_intel_new;
|
2019-01-29 20:24:48 +08:00
|
|
|
hdev->shutdown = btusb_shutdown_intel_new;
|
2015-07-05 20:37:39 +08:00
|
|
|
hdev->hw_error = btintel_hw_error;
|
2015-10-09 20:42:08 +08:00
|
|
|
hdev->set_diag = btintel_set_diag;
|
2015-04-06 15:52:12 +08:00
|
|
|
hdev->set_bdaddr = btintel_set_bdaddr;
|
2019-01-25 07:28:14 +08:00
|
|
|
hdev->cmd_timeout = btusb_intel_cmd_timeout;
|
2015-02-02 15:57:18 +08:00
|
|
|
set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
|
2018-09-26 01:04:57 +08:00
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
2015-10-17 22:00:27 +08:00
|
|
|
set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
|
2015-01-27 13:33:48 +08:00
|
|
|
}
|
|
|
|
|
2020-11-19 19:39:40 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL_NEWGEN) {
|
|
|
|
hdev->manufacturer = 2;
|
|
|
|
hdev->send = btusb_send_frame_intel;
|
|
|
|
hdev->setup = btusb_setup_intel_newgen;
|
|
|
|
hdev->shutdown = btusb_shutdown_intel_new;
|
|
|
|
hdev->hw_error = btintel_hw_error;
|
|
|
|
hdev->set_diag = btintel_set_diag;
|
|
|
|
hdev->set_bdaddr = btintel_set_bdaddr;
|
|
|
|
hdev->cmd_timeout = btusb_intel_cmd_timeout;
|
|
|
|
set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
|
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
|
|
|
set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks);
|
|
|
|
|
|
|
|
data->recv_event = btusb_recv_event_intel;
|
|
|
|
data->recv_bulk = btusb_recv_bulk_intel;
|
|
|
|
set_bit(BTUSB_BOOTLOADER, &data->flags);
|
|
|
|
}
|
|
|
|
|
2014-07-19 05:47:06 +08:00
|
|
|
if (id->driver_info & BTUSB_MARVELL)
|
|
|
|
hdev->set_bdaddr = btusb_set_bdaddr_marvell;
|
|
|
|
|
2019-09-27 14:48:58 +08:00
|
|
|
if (IS_ENABLED(CONFIG_BT_HCIBTUSB_MTK) &&
|
|
|
|
(id->driver_info & BTUSB_MEDIATEK)) {
|
2019-06-02 08:02:48 +08:00
|
|
|
hdev->setup = btusb_mtk_setup;
|
|
|
|
hdev->shutdown = btusb_mtk_shutdown;
|
|
|
|
hdev->manufacturer = 70;
|
|
|
|
set_bit(HCI_QUIRK_NON_PERSISTENT_SETUP, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
2015-01-03 15:35:20 +08:00
|
|
|
if (id->driver_info & BTUSB_SWAVE) {
|
|
|
|
set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE, &hdev->quirks);
|
2014-12-26 11:42:33 +08:00
|
|
|
set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS, &hdev->quirks);
|
2015-01-03 15:35:20 +08:00
|
|
|
}
|
2014-12-26 11:42:33 +08:00
|
|
|
|
2015-10-21 07:31:45 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL_BOOT) {
|
|
|
|
hdev->manufacturer = 2;
|
2014-07-06 19:29:58 +08:00
|
|
|
set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
|
2015-10-21 07:31:45 +08:00
|
|
|
}
|
2014-07-06 19:29:58 +08:00
|
|
|
|
2015-01-30 02:38:34 +08:00
|
|
|
if (id->driver_info & BTUSB_ATH3012) {
|
Bluetooth: btusb: Apply QCA Rome patches for some ATH3012 models
In commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros
1525/QCA6174") we tried to address the non-working Atheros BT devices
by changing the quirk from BTUSB_ATH3012 to BTUSB_QCA_ROME. This made
such devices working while it turned out to break other existing chips
with the very same USB ID, hence it was reverted afterwards.
This is another attempt to tackle the issue. The essential point to
use BTUSB_QCA_ROME is to apply the btusb_setup_qca() and do RAM-
patching. And the previous attempt failed because btusb_setup_qca()
returns -ENODEV if the ROM version doesn't match with the expected
ones. For some devices that have already the "correct" ROM versions,
we may just skip the setup procedure and continue the rest.
So, the first fix we'll need is to add a check of the ROM version in
the function to skip the setup if the ROM version looks already sane,
so that it can be applied for all ath devices.
However, the world is a bit more complex than that simple solution.
Since BTUSB_ATH3012 quirk checks the bcdDevice and bails out when it's
0x0001 at the beginning of probing, so the device probe always aborts
here.
In this patch, we add another check of ROM version again, and if the
device needs patching, the probe continues. For that, a slight
refactoring of btusb_qca_send_vendor_req() was required so that the
probe function can pass usb_device pointer directly before allocating
hci_dev stuff.
Fixes: commit f44cb4b19ed4 ("Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174")
Bugzilla: http://bugzilla.opensuse.org/show_bug.cgi?id=1082504
Tested-by: Ivan Levshin <ivan.levshin@microfocus.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2018-05-22 04:34:52 +08:00
|
|
|
data->setup_on_usb = btusb_setup_qca;
|
2014-12-13 02:58:05 +08:00
|
|
|
hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
|
2015-03-18 00:04:15 +08:00
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
2015-01-30 02:38:34 +08:00
|
|
|
set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks);
|
|
|
|
}
|
2014-12-13 02:58:05 +08:00
|
|
|
|
2015-02-16 07:07:33 +08:00
|
|
|
if (id->driver_info & BTUSB_QCA_ROME) {
|
|
|
|
data->setup_on_usb = btusb_setup_qca;
|
|
|
|
hdev->set_bdaddr = btusb_set_bdaddr_ath3012;
|
2020-06-25 02:11:44 +08:00
|
|
|
hdev->cmd_timeout = btusb_qca_cmd_timeout;
|
2018-03-28 23:28:47 +08:00
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
2018-04-27 17:26:43 +08:00
|
|
|
btusb_check_needs_reset_resume(intf);
|
2015-02-16 07:07:33 +08:00
|
|
|
}
|
|
|
|
|
2020-09-29 12:23:51 +08:00
|
|
|
if (id->driver_info & BTUSB_QCA_WCN6855) {
|
|
|
|
data->setup_on_usb = btusb_setup_qca;
|
2020-12-18 18:12:11 +08:00
|
|
|
hdev->shutdown = btusb_shutdown_qca;
|
2020-09-29 12:23:51 +08:00
|
|
|
hdev->set_bdaddr = btusb_set_bdaddr_wcn6855;
|
|
|
|
hdev->cmd_timeout = btusb_qca_cmd_timeout;
|
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
2020-06-30 21:09:40 +08:00
|
|
|
if (id->driver_info & BTUSB_AMP) {
|
|
|
|
/* AMP controllers do not support SCO packets */
|
|
|
|
data->isoc = NULL;
|
|
|
|
} else {
|
|
|
|
/* Interface orders are hardcoded in the specification */
|
|
|
|
data->isoc = usb_ifnum_to_if(data->udev, ifnum_base + 1);
|
|
|
|
data->isoc_ifnum = ifnum_base + 1;
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:59:02 +08:00
|
|
|
if (IS_ENABLED(CONFIG_BT_HCIBTUSB_RTL) &&
|
|
|
|
(id->driver_info & BTUSB_REALTEK)) {
|
2015-05-14 16:49:09 +08:00
|
|
|
hdev->setup = btrtl_setup_realtek;
|
2019-06-25 16:30:51 +08:00
|
|
|
hdev->shutdown = btrtl_shutdown_realtek;
|
2019-09-05 10:36:31 +08:00
|
|
|
hdev->cmd_timeout = btusb_rtl_cmd_timeout;
|
2015-05-21 22:23:50 +08:00
|
|
|
|
2019-08-14 20:02:52 +08:00
|
|
|
/* Realtek devices lose their updated firmware over global
|
|
|
|
* suspend that means host doesn't send SET_FEATURE
|
|
|
|
* (DEVICE_REMOTE_WAKEUP)
|
2015-05-21 22:23:50 +08:00
|
|
|
*/
|
2019-08-14 20:02:52 +08:00
|
|
|
set_bit(BTUSB_WAKEUP_DISABLE, &data->flags);
|
2015-05-21 22:23:50 +08:00
|
|
|
}
|
2015-04-17 04:09:55 +08:00
|
|
|
|
2008-11-30 19:17:26 +08:00
|
|
|
if (!reset)
|
2012-05-23 18:35:46 +08:00
|
|
|
set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
|
2008-08-08 04:26:56 +08:00
|
|
|
|
|
|
|
if (force_scofix || id->driver_info & BTUSB_WRONG_SCO_MTU) {
|
|
|
|
if (!disable_scofix)
|
|
|
|
set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
if (id->driver_info & BTUSB_BROKEN_ISOC)
|
|
|
|
data->isoc = NULL;
|
|
|
|
|
2020-02-28 02:29:39 +08:00
|
|
|
if (id->driver_info & BTUSB_WIDEBAND_SPEECH)
|
2020-03-06 00:14:59 +08:00
|
|
|
set_bit(HCI_QUIRK_WIDEBAND_SPEECH_SUPPORTED, &hdev->quirks);
|
2020-02-28 02:29:39 +08:00
|
|
|
|
2020-04-23 22:43:31 +08:00
|
|
|
if (id->driver_info & BTUSB_VALID_LE_STATES)
|
|
|
|
set_bit(HCI_QUIRK_VALID_LE_STATES, &hdev->quirks);
|
|
|
|
|
2008-11-30 19:17:26 +08:00
|
|
|
if (id->driver_info & BTUSB_DIGIANSWER) {
|
|
|
|
data->cmdreq_type = USB_TYPE_VENDOR;
|
2012-05-23 18:35:46 +08:00
|
|
|
set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
|
2008-11-30 19:17:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (id->driver_info & BTUSB_CSR) {
|
|
|
|
struct usb_device *udev = data->udev;
|
2014-01-03 19:02:36 +08:00
|
|
|
u16 bcdDevice = le16_to_cpu(udev->descriptor.bcdDevice);
|
2008-11-30 19:17:26 +08:00
|
|
|
|
|
|
|
/* Old firmware would otherwise execute USB reset */
|
2014-01-03 19:02:36 +08:00
|
|
|
if (bcdDevice < 0x117)
|
2012-05-23 18:35:46 +08:00
|
|
|
set_bit(HCI_QUIRK_RESET_ON_CLOSE, &hdev->quirks);
|
2014-01-03 19:02:36 +08:00
|
|
|
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
/* This must be set first in case we disable it for fakes */
|
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
|
|
|
|
2014-01-03 19:02:36 +08:00
|
|
|
/* Fake CSR devices with broken commands */
|
Bluetooth: btusb: Fix and detect most of the Chinese Bluetooth controllers
For some reason they tend to squat on the very first CSR/
Cambridge Silicon Radio VID/PID instead of paying fees.
This is an extremely common problem; the issue goes as back as 2013
and these devices are only getting more popular, even rebranded by
reputable vendors and sold by retailers everywhere.
So, at this point in time there are hundreds of modern dongles reusing
the ID of what originally was an early Bluetooth 1.1 controller.
Linux is the only place where they don't work due to spotty checks
in our detection code. It only covered a minimum subset.
So what's the big idea? Take advantage of the fact that all CSR
chips report the same internal version as both the LMP sub-version and
HCI revision number. It always matches, couple that with the manufacturer
code, that rarely lies, and we now have a good idea of who is who.
Additionally, by compiling a list of user-reported HCI/lsusb dumps, and
searching around for legit CSR dongles in similar product ranges we can
find what CSR BlueCore firmware supported which Bluetooth versions.
That way we can narrow down ranges of fakes for each of them.
e.g. Real CSR dongles with LMP subversion 0x73 are old enough that
support BT 1.1 only; so it's a dead giveaway when some
third-party BT 4.0 dongle reuses it.
So, to sum things up; there are multiple classes of fake controllers
reusing the same 0A12:0001 VID/PID. This has been broken for a while.
Known 'fake' bcdDevices: 0x0100, 0x0134, 0x1915, 0x2520, 0x7558, 0x8891
IC markings on 0x7558: FR3191AHAL 749H15143 (???)
https://bugzilla.kernel.org/show_bug.cgi?id=60824
Fixes: 81cac64ba258ae (Deal with USB devices that are faking CSR vendor)
Reported-by: Michał Wiśniewski <brylozketrzyn@gmail.com>
Tested-by: Mike Johnson <yuyuyak@gmail.com>
Tested-by: Ricardo Rodrigues <ekatonb@gmail.com>
Tested-by: M.Hanny Sabbagh <mhsabbagh@outlook.com>
Tested-by: Oussama BEN BRAHIM <b.brahim.oussama@gmail.com>
Tested-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Ismael Ferreras Morezuelas <swyterzone@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-07-27 05:12:28 +08:00
|
|
|
if (le16_to_cpu(udev->descriptor.idVendor) == 0x0a12 &&
|
|
|
|
le16_to_cpu(udev->descriptor.idProduct) == 0x0001)
|
2014-01-03 19:02:36 +08:00
|
|
|
hdev->setup = btusb_setup_csr;
|
2008-11-30 19:17:26 +08:00
|
|
|
}
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
if (id->driver_info & BTUSB_SNIFFER) {
|
2008-08-18 19:23:52 +08:00
|
|
|
struct usb_device *udev = data->udev;
|
2008-08-08 04:26:56 +08:00
|
|
|
|
2008-11-30 19:17:26 +08:00
|
|
|
/* New sniffer firmware has crippled HCI interface */
|
2008-08-08 04:26:56 +08:00
|
|
|
if (le16_to_cpu(udev->descriptor.bcdDevice) > 0x997)
|
|
|
|
set_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks);
|
|
|
|
}
|
|
|
|
|
2014-07-06 20:53:54 +08:00
|
|
|
if (id->driver_info & BTUSB_INTEL_BOOT) {
|
|
|
|
/* A bug in the bootloader causes that interrupt interface is
|
|
|
|
* only enabled after receiving SetInterface(0, AltSetting=0).
|
|
|
|
*/
|
|
|
|
err = usb_set_interface(data->udev, 0, 0);
|
|
|
|
if (err < 0) {
|
|
|
|
BT_ERR("failed to set interface 0, alt 0 %d", err);
|
2017-02-02 06:24:08 +08:00
|
|
|
goto out_free_dev;
|
2014-07-06 20:53:54 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-08-18 19:23:52 +08:00
|
|
|
if (data->isoc) {
|
|
|
|
err = usb_driver_claim_interface(&btusb_driver,
|
2014-09-16 10:44:50 +08:00
|
|
|
data->isoc, data);
|
2017-02-02 06:24:08 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto out_free_dev;
|
2008-08-18 19:23:52 +08:00
|
|
|
}
|
|
|
|
|
2019-09-27 14:48:58 +08:00
|
|
|
if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM) && data->diag) {
|
2015-10-09 02:23:08 +08:00
|
|
|
if (!usb_driver_claim_interface(&btusb_driver,
|
|
|
|
data->diag, data))
|
|
|
|
__set_diag_interface(hdev);
|
|
|
|
else
|
|
|
|
data->diag = NULL;
|
|
|
|
}
|
|
|
|
|
2017-11-13 21:44:16 +08:00
|
|
|
if (enable_autosuspend)
|
|
|
|
usb_enable_autosuspend(data->udev);
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
err = hci_register_dev(hdev);
|
2017-02-02 06:24:08 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto out_free_dev;
|
2007-10-20 20:12:34 +08:00
|
|
|
|
|
|
|
usb_set_intfdata(intf, data);
|
|
|
|
|
|
|
|
return 0;
|
2017-02-02 06:24:08 +08:00
|
|
|
|
|
|
|
out_free_dev:
|
2019-01-25 07:28:14 +08:00
|
|
|
if (data->reset_gpio)
|
|
|
|
gpiod_put(data->reset_gpio);
|
2017-02-02 06:24:08 +08:00
|
|
|
hci_free_dev(hdev);
|
|
|
|
return err;
|
2007-10-20 20:12:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void btusb_disconnect(struct usb_interface *intf)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = usb_get_intfdata(intf);
|
|
|
|
struct hci_dev *hdev;
|
|
|
|
|
|
|
|
BT_DBG("intf %p", intf);
|
|
|
|
|
|
|
|
if (!data)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev = data->hdev;
|
2008-09-23 06:16:36 +08:00
|
|
|
usb_set_intfdata(data->intf, NULL);
|
|
|
|
|
|
|
|
if (data->isoc)
|
|
|
|
usb_set_intfdata(data->isoc, NULL);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2015-10-09 02:23:08 +08:00
|
|
|
if (data->diag)
|
|
|
|
usb_set_intfdata(data->diag, NULL);
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
hci_unregister_dev(hdev);
|
|
|
|
|
2015-10-09 02:23:08 +08:00
|
|
|
if (intf == data->intf) {
|
|
|
|
if (data->isoc)
|
|
|
|
usb_driver_release_interface(&btusb_driver, data->isoc);
|
|
|
|
if (data->diag)
|
|
|
|
usb_driver_release_interface(&btusb_driver, data->diag);
|
|
|
|
} else if (intf == data->isoc) {
|
|
|
|
if (data->diag)
|
|
|
|
usb_driver_release_interface(&btusb_driver, data->diag);
|
2008-09-23 06:16:36 +08:00
|
|
|
usb_driver_release_interface(&btusb_driver, data->intf);
|
2015-10-09 02:23:08 +08:00
|
|
|
} else if (intf == data->diag) {
|
|
|
|
usb_driver_release_interface(&btusb_driver, data->intf);
|
|
|
|
if (data->isoc)
|
|
|
|
usb_driver_release_interface(&btusb_driver, data->isoc);
|
|
|
|
}
|
2008-09-23 06:16:36 +08:00
|
|
|
|
2017-02-02 06:24:09 +08:00
|
|
|
if (data->oob_wake_irq)
|
|
|
|
device_init_wakeup(&data->udev->dev, false);
|
|
|
|
|
2019-01-25 07:28:14 +08:00
|
|
|
if (data->reset_gpio)
|
|
|
|
gpiod_put(data->reset_gpio);
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
hci_free_dev(hdev);
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
#ifdef CONFIG_PM
|
2008-11-30 19:17:14 +08:00
|
|
|
static int btusb_suspend(struct usb_interface *intf, pm_message_t message)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = usb_get_intfdata(intf);
|
|
|
|
|
|
|
|
BT_DBG("intf %p", intf);
|
|
|
|
|
|
|
|
if (data->suspend_count++)
|
|
|
|
return 0;
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
spin_lock_irq(&data->txlock);
|
2011-08-20 05:49:48 +08:00
|
|
|
if (!(PMSG_IS_AUTO(message) && data->tx_in_flight)) {
|
2009-08-25 05:44:59 +08:00
|
|
|
set_bit(BTUSB_SUSPENDING, &data->flags);
|
|
|
|
spin_unlock_irq(&data->txlock);
|
|
|
|
} else {
|
|
|
|
spin_unlock_irq(&data->txlock);
|
|
|
|
data->suspend_count--;
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:14 +08:00
|
|
|
cancel_work_sync(&data->work);
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
btusb_stop_traffic(data);
|
2008-11-30 19:17:14 +08:00
|
|
|
usb_kill_anchored_urbs(&data->tx_anchor);
|
|
|
|
|
2017-02-02 06:24:09 +08:00
|
|
|
if (data->oob_wake_irq && device_may_wakeup(&data->udev->dev)) {
|
|
|
|
set_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags);
|
|
|
|
enable_irq_wake(data->oob_wake_irq);
|
|
|
|
enable_irq(data->oob_wake_irq);
|
|
|
|
}
|
|
|
|
|
2019-08-14 20:02:52 +08:00
|
|
|
/* For global suspend, Realtek devices lose the loaded fw
|
|
|
|
* in them. But for autosuspend, firmware should remain.
|
|
|
|
* Actually, it depends on whether the usb host sends
|
|
|
|
* set feature (enable wakeup) or not.
|
|
|
|
*/
|
|
|
|
if (test_bit(BTUSB_WAKEUP_DISABLE, &data->flags)) {
|
|
|
|
if (PMSG_IS_AUTO(message) &&
|
|
|
|
device_can_wakeup(&data->udev->dev))
|
|
|
|
data->udev->do_remote_wakeup = 1;
|
|
|
|
else if (!PMSG_IS_AUTO(message))
|
|
|
|
data->udev->reset_resume = 1;
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:14 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
static void play_deferred(struct btusb_data *data)
|
|
|
|
{
|
|
|
|
struct urb *urb;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
while ((urb = usb_get_from_anchor(&data->deferred))) {
|
2017-07-20 18:53:50 +08:00
|
|
|
usb_anchor_urb(urb, &data->tx_anchor);
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
err = usb_submit_urb(urb, GFP_ATOMIC);
|
2017-07-20 18:53:50 +08:00
|
|
|
if (err < 0) {
|
|
|
|
if (err != -EPERM && err != -ENODEV)
|
|
|
|
BT_ERR("%s urb %p submission failed (%d)",
|
|
|
|
data->hdev->name, urb, -err);
|
|
|
|
kfree(urb->setup_packet);
|
|
|
|
usb_unanchor_urb(urb);
|
|
|
|
usb_free_urb(urb);
|
2009-08-25 05:44:59 +08:00
|
|
|
break;
|
2017-07-20 18:53:50 +08:00
|
|
|
}
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
data->tx_in_flight++;
|
2017-07-20 18:53:50 +08:00
|
|
|
usb_free_urb(urb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Cleanup the rest deferred urbs. */
|
|
|
|
while ((urb = usb_get_from_anchor(&data->deferred))) {
|
|
|
|
kfree(urb->setup_packet);
|
|
|
|
usb_free_urb(urb);
|
2009-08-25 05:44:59 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:14 +08:00
|
|
|
static int btusb_resume(struct usb_interface *intf)
|
|
|
|
{
|
|
|
|
struct btusb_data *data = usb_get_intfdata(intf);
|
|
|
|
struct hci_dev *hdev = data->hdev;
|
2009-08-25 05:44:59 +08:00
|
|
|
int err = 0;
|
2008-11-30 19:17:14 +08:00
|
|
|
|
|
|
|
BT_DBG("intf %p", intf);
|
|
|
|
|
|
|
|
if (--data->suspend_count)
|
|
|
|
return 0;
|
|
|
|
|
2017-02-02 06:24:09 +08:00
|
|
|
/* Disable only if not already disabled (keep it balanced) */
|
|
|
|
if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED, &data->flags)) {
|
|
|
|
disable_irq(data->oob_wake_irq);
|
|
|
|
disable_irq_wake(data->oob_wake_irq);
|
|
|
|
}
|
|
|
|
|
2008-11-30 19:17:14 +08:00
|
|
|
if (!test_bit(HCI_RUNNING, &hdev->flags))
|
2009-08-25 05:44:59 +08:00
|
|
|
goto done;
|
2008-11-30 19:17:14 +08:00
|
|
|
|
|
|
|
if (test_bit(BTUSB_INTR_RUNNING, &data->flags)) {
|
|
|
|
err = btusb_submit_intr_urb(hdev, GFP_NOIO);
|
|
|
|
if (err < 0) {
|
|
|
|
clear_bit(BTUSB_INTR_RUNNING, &data->flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
goto failed;
|
2008-11-30 19:17:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(BTUSB_BULK_RUNNING, &data->flags)) {
|
2009-02-05 00:41:38 +08:00
|
|
|
err = btusb_submit_bulk_urb(hdev, GFP_NOIO);
|
|
|
|
if (err < 0) {
|
2008-11-30 19:17:14 +08:00
|
|
|
clear_bit(BTUSB_BULK_RUNNING, &data->flags);
|
2009-08-25 05:44:59 +08:00
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
btusb_submit_bulk_urb(hdev, GFP_NOIO);
|
2008-11-30 19:17:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(BTUSB_ISOC_RUNNING, &data->flags)) {
|
|
|
|
if (btusb_submit_isoc_urb(hdev, GFP_NOIO) < 0)
|
|
|
|
clear_bit(BTUSB_ISOC_RUNNING, &data->flags);
|
|
|
|
else
|
|
|
|
btusb_submit_isoc_urb(hdev, GFP_NOIO);
|
|
|
|
}
|
|
|
|
|
2009-08-25 05:44:59 +08:00
|
|
|
spin_lock_irq(&data->txlock);
|
|
|
|
play_deferred(data);
|
|
|
|
clear_bit(BTUSB_SUSPENDING, &data->flags);
|
|
|
|
spin_unlock_irq(&data->txlock);
|
|
|
|
schedule_work(&data->work);
|
|
|
|
|
2008-11-30 19:17:14 +08:00
|
|
|
return 0;
|
2009-08-25 05:44:59 +08:00
|
|
|
|
|
|
|
failed:
|
|
|
|
usb_scuttle_anchored_urbs(&data->deferred);
|
|
|
|
done:
|
|
|
|
spin_lock_irq(&data->txlock);
|
|
|
|
clear_bit(BTUSB_SUSPENDING, &data->flags);
|
|
|
|
spin_unlock_irq(&data->txlock);
|
|
|
|
|
|
|
|
return err;
|
2008-11-30 19:17:14 +08:00
|
|
|
}
|
2009-08-25 05:44:59 +08:00
|
|
|
#endif
|
2008-11-30 19:17:14 +08:00
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
static struct usb_driver btusb_driver = {
|
|
|
|
.name = "btusb",
|
|
|
|
.probe = btusb_probe,
|
|
|
|
.disconnect = btusb_disconnect,
|
2009-08-25 05:44:59 +08:00
|
|
|
#ifdef CONFIG_PM
|
2008-11-30 19:17:14 +08:00
|
|
|
.suspend = btusb_suspend,
|
|
|
|
.resume = btusb_resume,
|
2009-08-25 05:44:59 +08:00
|
|
|
#endif
|
2007-10-20 20:12:34 +08:00
|
|
|
.id_table = btusb_table,
|
2009-08-25 05:44:59 +08:00
|
|
|
.supports_autosuspend = 1,
|
2012-04-24 01:08:51 +08:00
|
|
|
.disable_hub_initiated_lpm = 1,
|
2007-10-20 20:12:34 +08:00
|
|
|
};
|
|
|
|
|
2011-11-19 01:47:34 +08:00
|
|
|
module_usb_driver(btusb_driver);
|
2007-10-20 20:12:34 +08:00
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
module_param(disable_scofix, bool, 0644);
|
|
|
|
MODULE_PARM_DESC(disable_scofix, "Disable fixup of wrong SCO buffer size");
|
|
|
|
|
|
|
|
module_param(force_scofix, bool, 0644);
|
|
|
|
MODULE_PARM_DESC(force_scofix, "Force fixup of wrong SCO buffers size");
|
|
|
|
|
2017-11-13 21:44:16 +08:00
|
|
|
module_param(enable_autosuspend, bool, 0644);
|
|
|
|
MODULE_PARM_DESC(enable_autosuspend, "Enable USB autosuspend by default");
|
|
|
|
|
2008-08-08 04:26:56 +08:00
|
|
|
module_param(reset, bool, 0644);
|
|
|
|
MODULE_PARM_DESC(reset, "Send HCI reset command on initialization");
|
|
|
|
|
2007-10-20 20:12:34 +08:00
|
|
|
MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
|
|
|
|
MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION);
|
|
|
|
MODULE_VERSION(VERSION);
|
|
|
|
MODULE_LICENSE("GPL");
|