mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-27 14:14:24 +08:00
f3b845e0ae
Some variants of Intel controllers like BlazarI supports downloading of Intermediate bootloader (IML) image. IML gives flexibility to fix issues as its not possible to fix issue in Primary bootloader once flashed to ROM. This patch adds the support to download IML before downloading operational firmware image. dmesg logs: [13.399003] Bluetooth: Core ver 2.22 [13.399006] Bluetooth: Starting self testing [13.401194] Bluetooth: ECDH test passed in 2135 usecs [13.421175] Bluetooth: SMP test passed in 597 usecs [13.421184] Bluetooth: Finished self testing [13.422919] Bluetooth: HCI device and connection manager initialized [13.422923] Bluetooth: HCI socket layer initialized [13.422925] Bluetooth: L2CAP socket layer initialized [13.422930] Bluetooth: SCO socket layer initialized [13.458065] Bluetooth: hci0: Device revision is 0 [13.458071] Bluetooth: hci0: Secure boot is disabled [13.458072] Bluetooth: hci0: OTP lock is disabled [13.458072] Bluetooth: hci0: API lock is enabled [13.458073] Bluetooth: hci0: Debug lock is disabled [13.458073] Bluetooth: hci0: Minimum firmware build 1 week 10 2014 [13.458075] Bluetooth: hci0: Bootloader timestamp 2022.46 buildtype 1 build 26590 [13.458324] Bluetooth: hci0: DSM reset method type: 0x00 [13.460678] Bluetooth: hci0: Found device firmware: intel/ibt-0090-0291-iml.sfi [13.460684] Bluetooth: hci0: Boot Address: 0x30099000 [13.460685] Bluetooth: hci0: Firmware Version: 227-11.24 [13.562554] Bluetooth: hci0: Waiting for firmware download to complete [13.563023] Bluetooth: hci0: Firmware loaded in 99941 usecs [13.563057] Bluetooth: hci0: Waiting for device to boot [13.565029] Bluetooth: hci0: Malformed MSFT vendor event: 0x02 [13.565148] Bluetooth: hci0: Device booted in 2064 usecs [13.567065] Bluetooth: hci0: No device address configured [13.569010] Bluetooth: hci0: Found device firmware: intel/ibt-0090-0291.sfi [13.569061] Bluetooth: hci0: Boot Address: 0x10000800 [13.569062] Bluetooth: hci0: Firmware Version: 227-11.24 [13.788891] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [13.788897] Bluetooth: BNEP filters: protocol multicast [13.788902] Bluetooth: BNEP socket layer initialized [15.435905] Bluetooth: hci0: Waiting for firmware download to complete [15.436016] Bluetooth: hci0: Firmware loaded in 1823233 usecs [15.436258] Bluetooth: hci0: Waiting for device to boot [15.471140] Bluetooth: hci0: Device booted in 34277 usecs [15.471201] Bluetooth: hci0: Malformed MSFT vendor event: 0x02 [15.471487] Bluetooth: hci0: Found Intel DDC parameters: intel/ibt-0090-0291.ddc [15.474353] Bluetooth: hci0: Applying Intel DDC parameters completed [15.474486] Bluetooth: hci0: Found Intel DDC parameters: intel/bdaddress.cfg [15.475299] Bluetooth: hci0: Applying Intel DDC parameters completed [15.479381] Bluetooth: hci0: Firmware timestamp 2024.10 buildtype 3 build 58595 [15.479385] Bluetooth: hci0: Firmware SHA1: 0xb4f3cc46 [15.483243] Bluetooth: hci0: Fseq status: Success (0x00) [15.483246] Bluetooth: hci0: Fseq executed: 00.00.00.00 [15.483247] Bluetooth: hci0: Fseq BT Top: 00.00.00.00 [15.578712] Bluetooth: MGMT ver 1.22 [15.822682] Bluetooth: RFCOMM TTY layer initialized [15.822690] Bluetooth: RFCOMM socket layer initialized [15.822695] Bluetooth: RFCOMM ver 1.11 Signed-off-by: Kiran K <kiran.k@intel.com> Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
334 lines
7.9 KiB
C
334 lines
7.9 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
*
|
|
* Bluetooth support for Intel devices
|
|
*
|
|
* Copyright (C) 2015 Intel Corporation
|
|
*/
|
|
|
|
/* List of tlv type */
|
|
enum {
|
|
INTEL_TLV_CNVI_TOP = 0x10,
|
|
INTEL_TLV_CNVR_TOP,
|
|
INTEL_TLV_CNVI_BT,
|
|
INTEL_TLV_CNVR_BT,
|
|
INTEL_TLV_CNVI_OTP,
|
|
INTEL_TLV_CNVR_OTP,
|
|
INTEL_TLV_DEV_REV_ID,
|
|
INTEL_TLV_USB_VENDOR_ID,
|
|
INTEL_TLV_USB_PRODUCT_ID,
|
|
INTEL_TLV_PCIE_VENDOR_ID,
|
|
INTEL_TLV_PCIE_DEVICE_ID,
|
|
INTEL_TLV_PCIE_SUBSYSTEM_ID,
|
|
INTEL_TLV_IMAGE_TYPE,
|
|
INTEL_TLV_TIME_STAMP,
|
|
INTEL_TLV_BUILD_TYPE,
|
|
INTEL_TLV_BUILD_NUM,
|
|
INTEL_TLV_FW_BUILD_PRODUCT,
|
|
INTEL_TLV_FW_BUILD_HW,
|
|
INTEL_TLV_FW_STEP,
|
|
INTEL_TLV_BT_SPEC,
|
|
INTEL_TLV_MFG_NAME,
|
|
INTEL_TLV_HCI_REV,
|
|
INTEL_TLV_LMP_SUBVER,
|
|
INTEL_TLV_OTP_PATCH_VER,
|
|
INTEL_TLV_SECURE_BOOT,
|
|
INTEL_TLV_KEY_FROM_HDR,
|
|
INTEL_TLV_OTP_LOCK,
|
|
INTEL_TLV_API_LOCK,
|
|
INTEL_TLV_DEBUG_LOCK,
|
|
INTEL_TLV_MIN_FW,
|
|
INTEL_TLV_LIMITED_CCE,
|
|
INTEL_TLV_SBE_TYPE,
|
|
INTEL_TLV_OTP_BDADDR,
|
|
INTEL_TLV_UNLOCKED_STATE,
|
|
INTEL_TLV_GIT_SHA1
|
|
};
|
|
|
|
struct intel_tlv {
|
|
u8 type;
|
|
u8 len;
|
|
u8 val[];
|
|
} __packed;
|
|
|
|
#define BTINTEL_CNVI_BLAZARI 0x900
|
|
|
|
#define BTINTEL_IMG_BOOTLOADER 0x01 /* Bootloader image */
|
|
#define BTINTEL_IMG_IML 0x02 /* Intermediate image */
|
|
#define BTINTEL_IMG_OP 0x03 /* Operational image */
|
|
|
|
struct intel_version_tlv {
|
|
u32 cnvi_top;
|
|
u32 cnvr_top;
|
|
u32 cnvi_bt;
|
|
u32 cnvr_bt;
|
|
u16 dev_rev_id;
|
|
u8 img_type;
|
|
u16 timestamp;
|
|
u8 build_type;
|
|
u32 build_num;
|
|
u8 secure_boot;
|
|
u8 otp_lock;
|
|
u8 api_lock;
|
|
u8 debug_lock;
|
|
u8 min_fw_build_nn;
|
|
u8 min_fw_build_cw;
|
|
u8 min_fw_build_yy;
|
|
u8 limited_cce;
|
|
u8 sbe_type;
|
|
u32 git_sha1;
|
|
bdaddr_t otp_bd_addr;
|
|
};
|
|
|
|
struct intel_version {
|
|
u8 status;
|
|
u8 hw_platform;
|
|
u8 hw_variant;
|
|
u8 hw_revision;
|
|
u8 fw_variant;
|
|
u8 fw_revision;
|
|
u8 fw_build_num;
|
|
u8 fw_build_ww;
|
|
u8 fw_build_yy;
|
|
u8 fw_patch_num;
|
|
} __packed;
|
|
|
|
struct intel_boot_params {
|
|
__u8 status;
|
|
__u8 otp_format;
|
|
__u8 otp_content;
|
|
__u8 otp_patch;
|
|
__le16 dev_revid;
|
|
__u8 secure_boot;
|
|
__u8 key_from_hdr;
|
|
__u8 key_type;
|
|
__u8 otp_lock;
|
|
__u8 api_lock;
|
|
__u8 debug_lock;
|
|
bdaddr_t otp_bdaddr;
|
|
__u8 min_fw_build_nn;
|
|
__u8 min_fw_build_cw;
|
|
__u8 min_fw_build_yy;
|
|
__u8 limited_cce;
|
|
__u8 unlocked_state;
|
|
} __packed;
|
|
|
|
struct intel_bootup {
|
|
__u8 zero;
|
|
__u8 num_cmds;
|
|
__u8 source;
|
|
__u8 reset_type;
|
|
__u8 reset_reason;
|
|
__u8 ddc_status;
|
|
} __packed;
|
|
|
|
struct intel_secure_send_result {
|
|
__u8 result;
|
|
__le16 opcode;
|
|
__u8 status;
|
|
} __packed;
|
|
|
|
struct intel_reset {
|
|
__u8 reset_type;
|
|
__u8 patch_enable;
|
|
__u8 ddc_reload;
|
|
__u8 boot_option;
|
|
__le32 boot_param;
|
|
} __packed;
|
|
|
|
struct intel_debug_features {
|
|
__u8 page1[16];
|
|
} __packed;
|
|
|
|
struct intel_offload_use_cases {
|
|
__u8 status;
|
|
__u8 preset[8];
|
|
} __packed;
|
|
|
|
#define INTEL_OP_PPAG_CMD 0xFE0B
|
|
struct hci_ppag_enable_cmd {
|
|
__le32 ppag_enable_flags;
|
|
} __packed;
|
|
|
|
#define INTEL_TLV_TYPE_ID 0x01
|
|
|
|
#define INTEL_TLV_SYSTEM_EXCEPTION 0x00
|
|
#define INTEL_TLV_FATAL_EXCEPTION 0x01
|
|
#define INTEL_TLV_DEBUG_EXCEPTION 0x02
|
|
#define INTEL_TLV_TEST_EXCEPTION 0xDE
|
|
|
|
#define INTEL_HW_PLATFORM(cnvx_bt) ((u8)(((cnvx_bt) & 0x0000ff00) >> 8))
|
|
#define INTEL_HW_VARIANT(cnvx_bt) ((u8)(((cnvx_bt) & 0x003f0000) >> 16))
|
|
#define INTEL_CNVX_TOP_TYPE(cnvx_top) ((cnvx_top) & 0x00000fff)
|
|
#define INTEL_CNVX_TOP_STEP(cnvx_top) (((cnvx_top) & 0x0f000000) >> 24)
|
|
#define INTEL_CNVX_TOP_PACK_SWAB(t, s) __swab16(((__u16)(((t) << 4) | (s))))
|
|
|
|
enum {
|
|
INTEL_BOOTLOADER,
|
|
INTEL_DOWNLOADING,
|
|
INTEL_FIRMWARE_LOADED,
|
|
INTEL_FIRMWARE_FAILED,
|
|
INTEL_BOOTING,
|
|
INTEL_BROKEN_INITIAL_NCMD,
|
|
INTEL_BROKEN_SHUTDOWN_LED,
|
|
INTEL_ROM_LEGACY,
|
|
INTEL_ROM_LEGACY_NO_WBS_SUPPORT,
|
|
INTEL_ACPI_RESET_ACTIVE,
|
|
|
|
__INTEL_NUM_FLAGS,
|
|
};
|
|
|
|
struct btintel_data {
|
|
DECLARE_BITMAP(flags, __INTEL_NUM_FLAGS);
|
|
int (*acpi_reset_method)(struct hci_dev *hdev);
|
|
};
|
|
|
|
#define btintel_set_flag(hdev, nr) \
|
|
do { \
|
|
struct btintel_data *intel = hci_get_priv((hdev)); \
|
|
set_bit((nr), intel->flags); \
|
|
} while (0)
|
|
|
|
#define btintel_clear_flag(hdev, nr) \
|
|
do { \
|
|
struct btintel_data *intel = hci_get_priv((hdev)); \
|
|
clear_bit((nr), intel->flags); \
|
|
} while (0)
|
|
|
|
#define btintel_wake_up_flag(hdev, nr) \
|
|
do { \
|
|
struct btintel_data *intel = hci_get_priv((hdev)); \
|
|
wake_up_bit(intel->flags, (nr)); \
|
|
} while (0)
|
|
|
|
#define btintel_get_flag(hdev) \
|
|
(((struct btintel_data *)hci_get_priv(hdev))->flags)
|
|
|
|
#define btintel_test_flag(hdev, nr) test_bit((nr), btintel_get_flag(hdev))
|
|
#define btintel_test_and_clear_flag(hdev, nr) test_and_clear_bit((nr), btintel_get_flag(hdev))
|
|
#define btintel_wait_on_flag_timeout(hdev, nr, m, to) \
|
|
wait_on_bit_timeout(btintel_get_flag(hdev), (nr), m, to)
|
|
|
|
#if IS_ENABLED(CONFIG_BT_INTEL)
|
|
|
|
int btintel_check_bdaddr(struct hci_dev *hdev);
|
|
int btintel_enter_mfg(struct hci_dev *hdev);
|
|
int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched);
|
|
int btintel_set_bdaddr(struct hci_dev *hdev, const bdaddr_t *bdaddr);
|
|
int btintel_set_diag(struct hci_dev *hdev, bool enable);
|
|
|
|
int btintel_version_info(struct hci_dev *hdev, struct intel_version *ver);
|
|
int btintel_load_ddc_config(struct hci_dev *hdev, const char *ddc_name);
|
|
int btintel_set_event_mask_mfg(struct hci_dev *hdev, bool debug);
|
|
int btintel_read_version(struct hci_dev *hdev, struct intel_version *ver);
|
|
struct regmap *btintel_regmap_init(struct hci_dev *hdev, u16 opcode_read,
|
|
u16 opcode_write);
|
|
int btintel_send_intel_reset(struct hci_dev *hdev, u32 boot_param);
|
|
int btintel_read_boot_params(struct hci_dev *hdev,
|
|
struct intel_boot_params *params);
|
|
int btintel_download_firmware(struct hci_dev *dev, struct intel_version *ver,
|
|
const struct firmware *fw, u32 *boot_param);
|
|
int btintel_configure_setup(struct hci_dev *hdev, const char *driver_name);
|
|
int btintel_recv_event(struct hci_dev *hdev, struct sk_buff *skb);
|
|
void btintel_bootup(struct hci_dev *hdev, const void *ptr, unsigned int len);
|
|
void btintel_secure_send_result(struct hci_dev *hdev,
|
|
const void *ptr, unsigned int len);
|
|
int btintel_set_quality_report(struct hci_dev *hdev, bool enable);
|
|
#else
|
|
|
|
static inline int btintel_check_bdaddr(struct hci_dev *hdev)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_enter_mfg(struct hci_dev *hdev)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_set_bdaddr(struct hci_dev *hdev, const bdaddr_t *bdaddr)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_set_diag(struct hci_dev *hdev, bool enable)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_version_info(struct hci_dev *hdev,
|
|
struct intel_version *ver)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_load_ddc_config(struct hci_dev *hdev,
|
|
const char *ddc_name)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_set_event_mask_mfg(struct hci_dev *hdev, bool debug)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_read_version(struct hci_dev *hdev,
|
|
struct intel_version *ver)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline struct regmap *btintel_regmap_init(struct hci_dev *hdev,
|
|
u16 opcode_read,
|
|
u16 opcode_write)
|
|
{
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
static inline int btintel_send_intel_reset(struct hci_dev *hdev,
|
|
u32 reset_param)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_read_boot_params(struct hci_dev *hdev,
|
|
struct intel_boot_params *params)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_download_firmware(struct hci_dev *dev,
|
|
const struct firmware *fw,
|
|
u32 *boot_param)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int btintel_configure_setup(struct hci_dev *hdev,
|
|
const char *driver_name)
|
|
{
|
|
return -ENODEV;
|
|
}
|
|
|
|
static inline void btintel_bootup(struct hci_dev *hdev,
|
|
const void *ptr, unsigned int len)
|
|
{
|
|
}
|
|
|
|
static inline void btintel_secure_send_result(struct hci_dev *hdev,
|
|
const void *ptr, unsigned int len)
|
|
{
|
|
}
|
|
|
|
static inline int btintel_set_quality_report(struct hci_dev *hdev, bool enable)
|
|
{
|
|
return -ENODEV;
|
|
}
|
|
#endif
|