1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Generic Bluetooth USB driver
6 * Copyright (C) 2005-2008 Marcel Holtmann <marcel@holtmann.org>
10 #include <linux/module.h>
11 #include <linux/usb.h>
12 #include <linux/usb/quirks.h>
13 #include <linux/firmware.h>
14 #include <linux/iopoll.h>
15 #include <linux/of_device.h>
16 #include <linux/of_irq.h>
17 #include <linux/suspend.h>
18 #include <linux/gpio/consumer.h>
19 #include <asm/unaligned.h>
21 #include <net/bluetooth/bluetooth.h>
22 #include <net/bluetooth/hci_core.h>
30 static bool disable_scofix
;
31 static bool force_scofix
;
32 static bool enable_autosuspend
= IS_ENABLED(CONFIG_BT_HCIBTUSB_AUTOSUSPEND
);
34 static bool reset
= true;
36 static struct usb_driver btusb_driver
;
38 #define BTUSB_IGNORE 0x01
39 #define BTUSB_DIGIANSWER 0x02
40 #define BTUSB_CSR 0x04
41 #define BTUSB_SNIFFER 0x08
42 #define BTUSB_BCM92035 0x10
43 #define BTUSB_BROKEN_ISOC 0x20
44 #define BTUSB_WRONG_SCO_MTU 0x40
45 #define BTUSB_ATH3012 0x80
46 #define BTUSB_INTEL 0x100
47 #define BTUSB_INTEL_BOOT 0x200
48 #define BTUSB_BCM_PATCHRAM 0x400
49 #define BTUSB_MARVELL 0x800
50 #define BTUSB_SWAVE 0x1000
51 #define BTUSB_INTEL_NEW 0x2000
52 #define BTUSB_AMP 0x4000
53 #define BTUSB_QCA_ROME 0x8000
54 #define BTUSB_BCM_APPLE 0x10000
55 #define BTUSB_REALTEK 0x20000
56 #define BTUSB_BCM2045 0x40000
57 #define BTUSB_IFNUM_2 0x80000
58 #define BTUSB_CW6622 0x100000
59 #define BTUSB_MEDIATEK 0x200000
61 static const struct usb_device_id btusb_table
[] = {
62 /* Generic Bluetooth USB device */
63 { USB_DEVICE_INFO(0xe0, 0x01, 0x01) },
65 /* Generic Bluetooth AMP device */
66 { USB_DEVICE_INFO(0xe0, 0x01, 0x04), .driver_info
= BTUSB_AMP
},
68 /* Generic Bluetooth USB interface */
69 { USB_INTERFACE_INFO(0xe0, 0x01, 0x01) },
71 /* Apple-specific (Broadcom) devices */
72 { USB_VENDOR_AND_INTERFACE_INFO(0x05ac, 0xff, 0x01, 0x01),
73 .driver_info
= BTUSB_BCM_APPLE
| BTUSB_IFNUM_2
},
75 /* MediaTek MT76x0E */
76 { USB_DEVICE(0x0e8d, 0x763f) },
78 /* Broadcom SoftSailing reporting vendor specific */
79 { USB_DEVICE(0x0a5c, 0x21e1) },
81 /* Apple MacBookPro 7,1 */
82 { USB_DEVICE(0x05ac, 0x8213) },
85 { USB_DEVICE(0x05ac, 0x8215) },
87 /* Apple MacBookPro6,2 */
88 { USB_DEVICE(0x05ac, 0x8218) },
90 /* Apple MacBookAir3,1, MacBookAir3,2 */
91 { USB_DEVICE(0x05ac, 0x821b) },
93 /* Apple MacBookAir4,1 */
94 { USB_DEVICE(0x05ac, 0x821f) },
96 /* Apple MacBookPro8,2 */
97 { USB_DEVICE(0x05ac, 0x821a) },
99 /* Apple MacMini5,1 */
100 { USB_DEVICE(0x05ac, 0x8281) },
102 /* AVM BlueFRITZ! USB v2.0 */
103 { USB_DEVICE(0x057c, 0x3800), .driver_info
= BTUSB_SWAVE
},
105 /* Bluetooth Ultraport Module from IBM */
106 { USB_DEVICE(0x04bf, 0x030a) },
108 /* ALPS Modules with non-standard id */
109 { USB_DEVICE(0x044e, 0x3001) },
110 { USB_DEVICE(0x044e, 0x3002) },
112 /* Ericsson with non-standard id */
113 { USB_DEVICE(0x0bdb, 0x1002) },
115 /* Canyon CN-BTU1 with HID interfaces */
116 { USB_DEVICE(0x0c10, 0x0000) },
118 /* Broadcom BCM20702A0 */
119 { USB_DEVICE(0x413c, 0x8197) },
121 /* Broadcom BCM20702B0 (Dynex/Insignia) */
122 { USB_DEVICE(0x19ff, 0x0239), .driver_info
= BTUSB_BCM_PATCHRAM
},
124 /* Broadcom BCM43142A0 (Foxconn/Lenovo) */
125 { USB_VENDOR_AND_INTERFACE_INFO(0x105b, 0xff, 0x01, 0x01),
126 .driver_info
= BTUSB_BCM_PATCHRAM
},
128 /* Broadcom BCM920703 (HTC Vive) */
129 { USB_VENDOR_AND_INTERFACE_INFO(0x0bb4, 0xff, 0x01, 0x01),
130 .driver_info
= BTUSB_BCM_PATCHRAM
},
132 /* Foxconn - Hon Hai */
133 { USB_VENDOR_AND_INTERFACE_INFO(0x0489, 0xff, 0x01, 0x01),
134 .driver_info
= BTUSB_BCM_PATCHRAM
},
136 /* Lite-On Technology - Broadcom based */
137 { USB_VENDOR_AND_INTERFACE_INFO(0x04ca, 0xff, 0x01, 0x01),
138 .driver_info
= BTUSB_BCM_PATCHRAM
},
140 /* Broadcom devices with vendor specific id */
141 { USB_VENDOR_AND_INTERFACE_INFO(0x0a5c, 0xff, 0x01, 0x01),
142 .driver_info
= BTUSB_BCM_PATCHRAM
},
144 /* ASUSTek Computer - Broadcom based */
145 { USB_VENDOR_AND_INTERFACE_INFO(0x0b05, 0xff, 0x01, 0x01),
146 .driver_info
= BTUSB_BCM_PATCHRAM
},
148 /* Belkin F8065bf - Broadcom based */
149 { USB_VENDOR_AND_INTERFACE_INFO(0x050d, 0xff, 0x01, 0x01),
150 .driver_info
= BTUSB_BCM_PATCHRAM
},
152 /* IMC Networks - Broadcom based */
153 { USB_VENDOR_AND_INTERFACE_INFO(0x13d3, 0xff, 0x01, 0x01),
154 .driver_info
= BTUSB_BCM_PATCHRAM
},
156 /* Dell Computer - Broadcom based */
157 { USB_VENDOR_AND_INTERFACE_INFO(0x413c, 0xff, 0x01, 0x01),
158 .driver_info
= BTUSB_BCM_PATCHRAM
},
160 /* Toshiba Corp - Broadcom based */
161 { USB_VENDOR_AND_INTERFACE_INFO(0x0930, 0xff, 0x01, 0x01),
162 .driver_info
= BTUSB_BCM_PATCHRAM
},
164 /* Intel Bluetooth USB Bootloader (RAM module) */
165 { USB_DEVICE(0x8087, 0x0a5a),
166 .driver_info
= BTUSB_INTEL_BOOT
| BTUSB_BROKEN_ISOC
},
168 { } /* Terminating entry */
171 MODULE_DEVICE_TABLE(usb
, btusb_table
);
173 static const struct usb_device_id blacklist_table
[] = {
174 /* CSR BlueCore devices */
175 { USB_DEVICE(0x0a12, 0x0001), .driver_info
= BTUSB_CSR
},
177 /* Broadcom BCM2033 without firmware */
178 { USB_DEVICE(0x0a5c, 0x2033), .driver_info
= BTUSB_IGNORE
},
180 /* Broadcom BCM2045 devices */
181 { USB_DEVICE(0x0a5c, 0x2045), .driver_info
= BTUSB_BCM2045
},
183 /* Atheros 3011 with sflash firmware */
184 { USB_DEVICE(0x0489, 0xe027), .driver_info
= BTUSB_IGNORE
},
185 { USB_DEVICE(0x0489, 0xe03d), .driver_info
= BTUSB_IGNORE
},
186 { USB_DEVICE(0x04f2, 0xaff1), .driver_info
= BTUSB_IGNORE
},
187 { USB_DEVICE(0x0930, 0x0215), .driver_info
= BTUSB_IGNORE
},
188 { USB_DEVICE(0x0cf3, 0x3002), .driver_info
= BTUSB_IGNORE
},
189 { USB_DEVICE(0x0cf3, 0xe019), .driver_info
= BTUSB_IGNORE
},
190 { USB_DEVICE(0x13d3, 0x3304), .driver_info
= BTUSB_IGNORE
},
192 /* Atheros AR9285 Malbec with sflash firmware */
193 { USB_DEVICE(0x03f0, 0x311d), .driver_info
= BTUSB_IGNORE
},
195 /* Atheros 3012 with sflash firmware */
196 { USB_DEVICE(0x0489, 0xe04d), .driver_info
= BTUSB_ATH3012
},
197 { USB_DEVICE(0x0489, 0xe04e), .driver_info
= BTUSB_ATH3012
},
198 { USB_DEVICE(0x0489, 0xe056), .driver_info
= BTUSB_ATH3012
},
199 { USB_DEVICE(0x0489, 0xe057), .driver_info
= BTUSB_ATH3012
},
200 { USB_DEVICE(0x0489, 0xe05f), .driver_info
= BTUSB_ATH3012
},
201 { USB_DEVICE(0x0489, 0xe076), .driver_info
= BTUSB_ATH3012
},
202 { USB_DEVICE(0x0489, 0xe078), .driver_info
= BTUSB_ATH3012
},
203 { USB_DEVICE(0x0489, 0xe095), .driver_info
= BTUSB_ATH3012
},
204 { USB_DEVICE(0x04c5, 0x1330), .driver_info
= BTUSB_ATH3012
},
205 { USB_DEVICE(0x04ca, 0x3004), .driver_info
= BTUSB_ATH3012
},
206 { USB_DEVICE(0x04ca, 0x3005), .driver_info
= BTUSB_ATH3012
},
207 { USB_DEVICE(0x04ca, 0x3006), .driver_info
= BTUSB_ATH3012
},
208 { USB_DEVICE(0x04ca, 0x3007), .driver_info
= BTUSB_ATH3012
},
209 { USB_DEVICE(0x04ca, 0x3008), .driver_info
= BTUSB_ATH3012
},
210 { USB_DEVICE(0x04ca, 0x300b), .driver_info
= BTUSB_ATH3012
},
211 { USB_DEVICE(0x04ca, 0x300d), .driver_info
= BTUSB_ATH3012
},
212 { USB_DEVICE(0x04ca, 0x300f), .driver_info
= BTUSB_ATH3012
},
213 { USB_DEVICE(0x04ca, 0x3010), .driver_info
= BTUSB_ATH3012
},
214 { USB_DEVICE(0x04ca, 0x3014), .driver_info
= BTUSB_ATH3012
},
215 { USB_DEVICE(0x04ca, 0x3018), .driver_info
= BTUSB_ATH3012
},
216 { USB_DEVICE(0x0930, 0x0219), .driver_info
= BTUSB_ATH3012
},
217 { USB_DEVICE(0x0930, 0x021c), .driver_info
= BTUSB_ATH3012
},
218 { USB_DEVICE(0x0930, 0x0220), .driver_info
= BTUSB_ATH3012
},
219 { USB_DEVICE(0x0930, 0x0227), .driver_info
= BTUSB_ATH3012
},
220 { USB_DEVICE(0x0b05, 0x17d0), .driver_info
= BTUSB_ATH3012
},
221 { USB_DEVICE(0x0cf3, 0x0036), .driver_info
= BTUSB_ATH3012
},
222 { USB_DEVICE(0x0cf3, 0x3004), .driver_info
= BTUSB_ATH3012
},
223 { USB_DEVICE(0x0cf3, 0x3008), .driver_info
= BTUSB_ATH3012
},
224 { USB_DEVICE(0x0cf3, 0x311d), .driver_info
= BTUSB_ATH3012
},
225 { USB_DEVICE(0x0cf3, 0x311e), .driver_info
= BTUSB_ATH3012
},
226 { USB_DEVICE(0x0cf3, 0x311f), .driver_info
= BTUSB_ATH3012
},
227 { USB_DEVICE(0x0cf3, 0x3121), .driver_info
= BTUSB_ATH3012
},
228 { USB_DEVICE(0x0cf3, 0x817a), .driver_info
= BTUSB_ATH3012
},
229 { USB_DEVICE(0x0cf3, 0x817b), .driver_info
= BTUSB_ATH3012
},
230 { USB_DEVICE(0x0cf3, 0xe003), .driver_info
= BTUSB_ATH3012
},
231 { USB_DEVICE(0x0cf3, 0xe004), .driver_info
= BTUSB_ATH3012
},
232 { USB_DEVICE(0x0cf3, 0xe005), .driver_info
= BTUSB_ATH3012
},
233 { USB_DEVICE(0x0cf3, 0xe006), .driver_info
= BTUSB_ATH3012
},
234 { USB_DEVICE(0x13d3, 0x3362), .driver_info
= BTUSB_ATH3012
},
235 { USB_DEVICE(0x13d3, 0x3375), .driver_info
= BTUSB_ATH3012
},
236 { USB_DEVICE(0x13d3, 0x3393), .driver_info
= BTUSB_ATH3012
},
237 { USB_DEVICE(0x13d3, 0x3395), .driver_info
= BTUSB_ATH3012
},
238 { USB_DEVICE(0x13d3, 0x3402), .driver_info
= BTUSB_ATH3012
},
239 { USB_DEVICE(0x13d3, 0x3408), .driver_info
= BTUSB_ATH3012
},
240 { USB_DEVICE(0x13d3, 0x3423), .driver_info
= BTUSB_ATH3012
},
241 { USB_DEVICE(0x13d3, 0x3432), .driver_info
= BTUSB_ATH3012
},
242 { USB_DEVICE(0x13d3, 0x3472), .driver_info
= BTUSB_ATH3012
},
243 { USB_DEVICE(0x13d3, 0x3474), .driver_info
= BTUSB_ATH3012
},
244 { USB_DEVICE(0x13d3, 0x3487), .driver_info
= BTUSB_ATH3012
},
245 { USB_DEVICE(0x13d3, 0x3490), .driver_info
= BTUSB_ATH3012
},
247 /* Atheros AR5BBU12 with sflash firmware */
248 { USB_DEVICE(0x0489, 0xe02c), .driver_info
= BTUSB_IGNORE
},
250 /* Atheros AR5BBU12 with sflash firmware */
251 { USB_DEVICE(0x0489, 0xe036), .driver_info
= BTUSB_ATH3012
},
252 { USB_DEVICE(0x0489, 0xe03c), .driver_info
= BTUSB_ATH3012
},
254 /* QCA ROME chipset */
255 { USB_DEVICE(0x0cf3, 0x535b), .driver_info
= BTUSB_QCA_ROME
},
256 { USB_DEVICE(0x0cf3, 0xe007), .driver_info
= BTUSB_QCA_ROME
},
257 { USB_DEVICE(0x0cf3, 0xe009), .driver_info
= BTUSB_QCA_ROME
},
258 { USB_DEVICE(0x0cf3, 0xe010), .driver_info
= BTUSB_QCA_ROME
},
259 { USB_DEVICE(0x0cf3, 0xe300), .driver_info
= BTUSB_QCA_ROME
},
260 { USB_DEVICE(0x0cf3, 0xe301), .driver_info
= BTUSB_QCA_ROME
},
261 { USB_DEVICE(0x0cf3, 0xe360), .driver_info
= BTUSB_QCA_ROME
},
262 { USB_DEVICE(0x0489, 0xe092), .driver_info
= BTUSB_QCA_ROME
},
263 { USB_DEVICE(0x0489, 0xe09f), .driver_info
= BTUSB_QCA_ROME
},
264 { USB_DEVICE(0x0489, 0xe0a2), .driver_info
= BTUSB_QCA_ROME
},
265 { USB_DEVICE(0x04ca, 0x3011), .driver_info
= BTUSB_QCA_ROME
},
266 { USB_DEVICE(0x04ca, 0x3015), .driver_info
= BTUSB_QCA_ROME
},
267 { USB_DEVICE(0x04ca, 0x3016), .driver_info
= BTUSB_QCA_ROME
},
268 { USB_DEVICE(0x04ca, 0x301a), .driver_info
= BTUSB_QCA_ROME
},
269 { USB_DEVICE(0x13d3, 0x3491), .driver_info
= BTUSB_QCA_ROME
},
270 { USB_DEVICE(0x13d3, 0x3496), .driver_info
= BTUSB_QCA_ROME
},
271 { USB_DEVICE(0x13d3, 0x3501), .driver_info
= BTUSB_QCA_ROME
},
273 /* Broadcom BCM2035 */
274 { USB_DEVICE(0x0a5c, 0x2009), .driver_info
= BTUSB_BCM92035
},
275 { USB_DEVICE(0x0a5c, 0x200a), .driver_info
= BTUSB_WRONG_SCO_MTU
},
276 { USB_DEVICE(0x0a5c, 0x2035), .driver_info
= BTUSB_WRONG_SCO_MTU
},
278 /* Broadcom BCM2045 */
279 { USB_DEVICE(0x0a5c, 0x2039), .driver_info
= BTUSB_WRONG_SCO_MTU
},
280 { USB_DEVICE(0x0a5c, 0x2101), .driver_info
= BTUSB_WRONG_SCO_MTU
},
282 /* IBM/Lenovo ThinkPad with Broadcom chip */
283 { USB_DEVICE(0x0a5c, 0x201e), .driver_info
= BTUSB_WRONG_SCO_MTU
},
284 { USB_DEVICE(0x0a5c, 0x2110), .driver_info
= BTUSB_WRONG_SCO_MTU
},
286 /* HP laptop with Broadcom chip */
287 { USB_DEVICE(0x03f0, 0x171d), .driver_info
= BTUSB_WRONG_SCO_MTU
},
289 /* Dell laptop with Broadcom chip */
290 { USB_DEVICE(0x413c, 0x8126), .driver_info
= BTUSB_WRONG_SCO_MTU
},
292 /* Dell Wireless 370 and 410 devices */
293 { USB_DEVICE(0x413c, 0x8152), .driver_info
= BTUSB_WRONG_SCO_MTU
},
294 { USB_DEVICE(0x413c, 0x8156), .driver_info
= BTUSB_WRONG_SCO_MTU
},
296 /* Belkin F8T012 and F8T013 devices */
297 { USB_DEVICE(0x050d, 0x0012), .driver_info
= BTUSB_WRONG_SCO_MTU
},
298 { USB_DEVICE(0x050d, 0x0013), .driver_info
= BTUSB_WRONG_SCO_MTU
},
300 /* Asus WL-BTD202 device */
301 { USB_DEVICE(0x0b05, 0x1715), .driver_info
= BTUSB_WRONG_SCO_MTU
},
303 /* Kensington Bluetooth USB adapter */
304 { USB_DEVICE(0x047d, 0x105e), .driver_info
= BTUSB_WRONG_SCO_MTU
},
306 /* RTX Telecom based adapters with buggy SCO support */
307 { USB_DEVICE(0x0400, 0x0807), .driver_info
= BTUSB_BROKEN_ISOC
},
308 { USB_DEVICE(0x0400, 0x080a), .driver_info
= BTUSB_BROKEN_ISOC
},
310 /* CONWISE Technology based adapters with buggy SCO support */
311 { USB_DEVICE(0x0e5e, 0x6622),
312 .driver_info
= BTUSB_BROKEN_ISOC
| BTUSB_CW6622
},
314 /* Roper Class 1 Bluetooth Dongle (Silicon Wave based) */
315 { USB_DEVICE(0x1310, 0x0001), .driver_info
= BTUSB_SWAVE
},
317 /* Digianswer devices */
318 { USB_DEVICE(0x08fd, 0x0001), .driver_info
= BTUSB_DIGIANSWER
},
319 { USB_DEVICE(0x08fd, 0x0002), .driver_info
= BTUSB_IGNORE
},
321 /* CSR BlueCore Bluetooth Sniffer */
322 { USB_DEVICE(0x0a12, 0x0002),
323 .driver_info
= BTUSB_SNIFFER
| BTUSB_BROKEN_ISOC
},
325 /* Frontline ComProbe Bluetooth Sniffer */
326 { USB_DEVICE(0x16d3, 0x0002),
327 .driver_info
= BTUSB_SNIFFER
| BTUSB_BROKEN_ISOC
},
329 /* Marvell Bluetooth devices */
330 { USB_DEVICE(0x1286, 0x2044), .driver_info
= BTUSB_MARVELL
},
331 { USB_DEVICE(0x1286, 0x2046), .driver_info
= BTUSB_MARVELL
},
332 { USB_DEVICE(0x1286, 0x204e), .driver_info
= BTUSB_MARVELL
},
334 /* Intel Bluetooth devices */
335 { USB_DEVICE(0x8087, 0x0025), .driver_info
= BTUSB_INTEL_NEW
},
336 { USB_DEVICE(0x8087, 0x0026), .driver_info
= BTUSB_INTEL_NEW
},
337 { USB_DEVICE(0x8087, 0x0029), .driver_info
= BTUSB_INTEL_NEW
},
338 { USB_DEVICE(0x8087, 0x07da), .driver_info
= BTUSB_CSR
},
339 { USB_DEVICE(0x8087, 0x07dc), .driver_info
= BTUSB_INTEL
},
340 { USB_DEVICE(0x8087, 0x0a2a), .driver_info
= BTUSB_INTEL
},
341 { USB_DEVICE(0x8087, 0x0a2b), .driver_info
= BTUSB_INTEL_NEW
},
342 { USB_DEVICE(0x8087, 0x0aa7), .driver_info
= BTUSB_INTEL
},
343 { USB_DEVICE(0x8087, 0x0aaa), .driver_info
= BTUSB_INTEL_NEW
},
345 /* Other Intel Bluetooth devices */
346 { USB_VENDOR_AND_INTERFACE_INFO(0x8087, 0xe0, 0x01, 0x01),
347 .driver_info
= BTUSB_IGNORE
},
349 /* Realtek Bluetooth devices */
350 { USB_VENDOR_AND_INTERFACE_INFO(0x0bda, 0xe0, 0x01, 0x01),
351 .driver_info
= BTUSB_REALTEK
},
353 /* MediaTek Bluetooth devices */
354 { USB_VENDOR_AND_INTERFACE_INFO(0x0e8d, 0xe0, 0x01, 0x01),
355 .driver_info
= BTUSB_MEDIATEK
},
357 /* Additional Realtek 8723AE Bluetooth devices */
358 { USB_DEVICE(0x0930, 0x021d), .driver_info
= BTUSB_REALTEK
},
359 { USB_DEVICE(0x13d3, 0x3394), .driver_info
= BTUSB_REALTEK
},
361 /* Additional Realtek 8723BE Bluetooth devices */
362 { USB_DEVICE(0x0489, 0xe085), .driver_info
= BTUSB_REALTEK
},
363 { USB_DEVICE(0x0489, 0xe08b), .driver_info
= BTUSB_REALTEK
},
364 { USB_DEVICE(0x13d3, 0x3410), .driver_info
= BTUSB_REALTEK
},
365 { USB_DEVICE(0x13d3, 0x3416), .driver_info
= BTUSB_REALTEK
},
366 { USB_DEVICE(0x13d3, 0x3459), .driver_info
= BTUSB_REALTEK
},
367 { USB_DEVICE(0x13d3, 0x3494), .driver_info
= BTUSB_REALTEK
},
369 /* Additional Realtek 8723BU Bluetooth devices */
370 { USB_DEVICE(0x7392, 0xa611), .driver_info
= BTUSB_REALTEK
},
372 /* Additional Realtek 8723DE Bluetooth devices */
373 { USB_DEVICE(0x0bda, 0xb009), .driver_info
= BTUSB_REALTEK
},
374 { USB_DEVICE(0x2ff8, 0xb011), .driver_info
= BTUSB_REALTEK
},
376 /* Additional Realtek 8821AE Bluetooth devices */
377 { USB_DEVICE(0x0b05, 0x17dc), .driver_info
= BTUSB_REALTEK
},
378 { USB_DEVICE(0x13d3, 0x3414), .driver_info
= BTUSB_REALTEK
},
379 { USB_DEVICE(0x13d3, 0x3458), .driver_info
= BTUSB_REALTEK
},
380 { USB_DEVICE(0x13d3, 0x3461), .driver_info
= BTUSB_REALTEK
},
381 { USB_DEVICE(0x13d3, 0x3462), .driver_info
= BTUSB_REALTEK
},
383 /* Additional Realtek 8822BE Bluetooth devices */
384 { USB_DEVICE(0x13d3, 0x3526), .driver_info
= BTUSB_REALTEK
},
385 { USB_DEVICE(0x0b05, 0x185c), .driver_info
= BTUSB_REALTEK
},
387 /* Additional Realtek 8822CE Bluetooth devices */
388 { USB_DEVICE(0x04ca, 0x4005), .driver_info
= BTUSB_REALTEK
},
390 /* Silicon Wave based devices */
391 { USB_DEVICE(0x0c10, 0x0000), .driver_info
= BTUSB_SWAVE
},
393 { } /* Terminating entry */
396 /* The Bluetooth USB module build into some devices needs to be reset on resume,
397 * this is a problem with the platform (likely shutting off all power) not with
398 * the module itself. So we use a DMI list to match known broken platforms.
400 static const struct dmi_system_id btusb_needs_reset_resume_table
[] = {
402 /* Dell OptiPlex 3060 (QCA ROME device 0cf3:e007) */
404 DMI_MATCH(DMI_SYS_VENDOR
, "Dell Inc."),
405 DMI_MATCH(DMI_PRODUCT_NAME
, "OptiPlex 3060"),
409 /* Dell XPS 9360 (QCA ROME device 0cf3:e300) */
411 DMI_MATCH(DMI_SYS_VENDOR
, "Dell Inc."),
412 DMI_MATCH(DMI_PRODUCT_NAME
, "XPS 13 9360"),
416 /* Dell Inspiron 5565 (QCA ROME device 0cf3:e009) */
418 DMI_MATCH(DMI_SYS_VENDOR
, "Dell Inc."),
419 DMI_MATCH(DMI_PRODUCT_NAME
, "Inspiron 5565"),
425 #define BTUSB_MAX_ISOC_FRAMES 10
427 #define BTUSB_INTR_RUNNING 0
428 #define BTUSB_BULK_RUNNING 1
429 #define BTUSB_ISOC_RUNNING 2
430 #define BTUSB_SUSPENDING 3
431 #define BTUSB_DID_ISO_RESUME 4
432 #define BTUSB_BOOTLOADER 5
433 #define BTUSB_DOWNLOADING 6
434 #define BTUSB_FIRMWARE_LOADED 7
435 #define BTUSB_FIRMWARE_FAILED 8
436 #define BTUSB_BOOTING 9
437 #define BTUSB_DIAG_RUNNING 10
438 #define BTUSB_OOB_WAKE_ENABLED 11
439 #define BTUSB_HW_RESET_ACTIVE 12
440 #define BTUSB_TX_WAIT_VND_EVT 13
441 #define BTUSB_WAKEUP_DISABLE 14
444 struct hci_dev
*hdev
;
445 struct usb_device
*udev
;
446 struct usb_interface
*intf
;
447 struct usb_interface
*isoc
;
448 struct usb_interface
*diag
;
453 struct work_struct work
;
454 struct work_struct waker
;
456 struct usb_anchor deferred
;
457 struct usb_anchor tx_anchor
;
461 struct usb_anchor intr_anchor
;
462 struct usb_anchor bulk_anchor
;
463 struct usb_anchor isoc_anchor
;
464 struct usb_anchor diag_anchor
;
465 struct usb_anchor ctrl_anchor
;
468 struct sk_buff
*evt_skb
;
469 struct sk_buff
*acl_skb
;
470 struct sk_buff
*sco_skb
;
472 struct usb_endpoint_descriptor
*intr_ep
;
473 struct usb_endpoint_descriptor
*bulk_tx_ep
;
474 struct usb_endpoint_descriptor
*bulk_rx_ep
;
475 struct usb_endpoint_descriptor
*isoc_tx_ep
;
476 struct usb_endpoint_descriptor
*isoc_rx_ep
;
477 struct usb_endpoint_descriptor
*diag_tx_ep
;
478 struct usb_endpoint_descriptor
*diag_rx_ep
;
480 struct gpio_desc
*reset_gpio
;
485 unsigned int sco_num
;
489 int (*recv_event
)(struct hci_dev
*hdev
, struct sk_buff
*skb
);
490 int (*recv_bulk
)(struct btusb_data
*data
, void *buffer
, int count
);
492 int (*setup_on_usb
)(struct hci_dev
*hdev
);
494 int oob_wake_irq
; /* irq for out-of-band wake-on-bt */
495 unsigned cmd_timeout_cnt
;
499 static void btusb_intel_cmd_timeout(struct hci_dev
*hdev
)
501 struct btusb_data
*data
= hci_get_drvdata(hdev
);
502 struct gpio_desc
*reset_gpio
= data
->reset_gpio
;
504 if (++data
->cmd_timeout_cnt
< 5)
508 bt_dev_err(hdev
, "No way to reset. Ignoring and continuing");
513 * Toggle the hard reset line if the platform provides one. The reset
514 * is going to yank the device off the USB and then replug. So doing
515 * once is enough. The cleanup is handled correctly on the way out
516 * (standard USB disconnect), and the new device is detected cleanly
517 * and bound to the driver again like it should be.
519 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE
, &data
->flags
)) {
520 bt_dev_err(hdev
, "last reset failed? Not resetting again");
524 bt_dev_err(hdev
, "Initiating HW reset via gpio");
525 gpiod_set_value_cansleep(reset_gpio
, 1);
527 gpiod_set_value_cansleep(reset_gpio
, 0);
530 static void btusb_rtl_cmd_timeout(struct hci_dev
*hdev
)
532 struct btusb_data
*data
= hci_get_drvdata(hdev
);
533 struct gpio_desc
*reset_gpio
= data
->reset_gpio
;
535 if (++data
->cmd_timeout_cnt
< 5)
539 bt_dev_err(hdev
, "No gpio to reset Realtek device, ignoring");
543 /* Toggle the hard reset line. The Realtek device is going to
544 * yank itself off the USB and then replug. The cleanup is handled
545 * correctly on the way out (standard USB disconnect), and the new
546 * device is detected cleanly and bound to the driver again like
549 if (test_and_set_bit(BTUSB_HW_RESET_ACTIVE
, &data
->flags
)) {
550 bt_dev_err(hdev
, "last reset failed? Not resetting again");
554 bt_dev_err(hdev
, "Reset Realtek device via gpio");
555 gpiod_set_value_cansleep(reset_gpio
, 0);
557 gpiod_set_value_cansleep(reset_gpio
, 1);
560 static inline void btusb_free_frags(struct btusb_data
*data
)
564 spin_lock_irqsave(&data
->rxlock
, flags
);
566 kfree_skb(data
->evt_skb
);
567 data
->evt_skb
= NULL
;
569 kfree_skb(data
->acl_skb
);
570 data
->acl_skb
= NULL
;
572 kfree_skb(data
->sco_skb
);
573 data
->sco_skb
= NULL
;
575 spin_unlock_irqrestore(&data
->rxlock
, flags
);
578 static int btusb_recv_intr(struct btusb_data
*data
, void *buffer
, int count
)
584 spin_lock_irqsave(&data
->rxlock
, flags
);
591 skb
= bt_skb_alloc(HCI_MAX_EVENT_SIZE
, GFP_ATOMIC
);
597 hci_skb_pkt_type(skb
) = HCI_EVENT_PKT
;
598 hci_skb_expect(skb
) = HCI_EVENT_HDR_SIZE
;
601 len
= min_t(uint
, hci_skb_expect(skb
), count
);
602 skb_put_data(skb
, buffer
, len
);
606 hci_skb_expect(skb
) -= len
;
608 if (skb
->len
== HCI_EVENT_HDR_SIZE
) {
609 /* Complete event header */
610 hci_skb_expect(skb
) = hci_event_hdr(skb
)->plen
;
612 if (skb_tailroom(skb
) < hci_skb_expect(skb
)) {
621 if (!hci_skb_expect(skb
)) {
623 data
->recv_event(data
->hdev
, skb
);
629 spin_unlock_irqrestore(&data
->rxlock
, flags
);
634 static int btusb_recv_bulk(struct btusb_data
*data
, void *buffer
, int count
)
640 spin_lock_irqsave(&data
->rxlock
, flags
);
647 skb
= bt_skb_alloc(HCI_MAX_FRAME_SIZE
, GFP_ATOMIC
);
653 hci_skb_pkt_type(skb
) = HCI_ACLDATA_PKT
;
654 hci_skb_expect(skb
) = HCI_ACL_HDR_SIZE
;
657 len
= min_t(uint
, hci_skb_expect(skb
), count
);
658 skb_put_data(skb
, buffer
, len
);
662 hci_skb_expect(skb
) -= len
;
664 if (skb
->len
== HCI_ACL_HDR_SIZE
) {
665 __le16 dlen
= hci_acl_hdr(skb
)->dlen
;
667 /* Complete ACL header */
668 hci_skb_expect(skb
) = __le16_to_cpu(dlen
);
670 if (skb_tailroom(skb
) < hci_skb_expect(skb
)) {
679 if (!hci_skb_expect(skb
)) {
681 hci_recv_frame(data
->hdev
, skb
);
687 spin_unlock_irqrestore(&data
->rxlock
, flags
);
692 static int btusb_recv_isoc(struct btusb_data
*data
, void *buffer
, int count
)
698 spin_lock_irqsave(&data
->rxlock
, flags
);
705 skb
= bt_skb_alloc(HCI_MAX_SCO_SIZE
, GFP_ATOMIC
);
711 hci_skb_pkt_type(skb
) = HCI_SCODATA_PKT
;
712 hci_skb_expect(skb
) = HCI_SCO_HDR_SIZE
;
715 len
= min_t(uint
, hci_skb_expect(skb
), count
);
716 skb_put_data(skb
, buffer
, len
);
720 hci_skb_expect(skb
) -= len
;
722 if (skb
->len
== HCI_SCO_HDR_SIZE
) {
723 /* Complete SCO header */
724 hci_skb_expect(skb
) = hci_sco_hdr(skb
)->dlen
;
726 if (skb_tailroom(skb
) < hci_skb_expect(skb
)) {
735 if (!hci_skb_expect(skb
)) {
737 hci_recv_frame(data
->hdev
, skb
);
743 spin_unlock_irqrestore(&data
->rxlock
, flags
);
748 static void btusb_intr_complete(struct urb
*urb
)
750 struct hci_dev
*hdev
= urb
->context
;
751 struct btusb_data
*data
= hci_get_drvdata(hdev
);
754 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
757 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
760 if (urb
->status
== 0) {
761 hdev
->stat
.byte_rx
+= urb
->actual_length
;
763 if (btusb_recv_intr(data
, urb
->transfer_buffer
,
764 urb
->actual_length
) < 0) {
765 bt_dev_err(hdev
, "corrupted event packet");
768 } else if (urb
->status
== -ENOENT
) {
769 /* Avoid suspend failed when usb_kill_urb */
773 if (!test_bit(BTUSB_INTR_RUNNING
, &data
->flags
))
776 usb_mark_last_busy(data
->udev
);
777 usb_anchor_urb(urb
, &data
->intr_anchor
);
779 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
781 /* -EPERM: urb is being killed;
782 * -ENODEV: device got disconnected
784 if (err
!= -EPERM
&& err
!= -ENODEV
)
785 bt_dev_err(hdev
, "urb %p failed to resubmit (%d)",
787 usb_unanchor_urb(urb
);
791 static int btusb_submit_intr_urb(struct hci_dev
*hdev
, gfp_t mem_flags
)
793 struct btusb_data
*data
= hci_get_drvdata(hdev
);
799 BT_DBG("%s", hdev
->name
);
804 urb
= usb_alloc_urb(0, mem_flags
);
808 size
= le16_to_cpu(data
->intr_ep
->wMaxPacketSize
);
810 buf
= kmalloc(size
, mem_flags
);
816 pipe
= usb_rcvintpipe(data
->udev
, data
->intr_ep
->bEndpointAddress
);
818 usb_fill_int_urb(urb
, data
->udev
, pipe
, buf
, size
,
819 btusb_intr_complete
, hdev
, data
->intr_ep
->bInterval
);
821 urb
->transfer_flags
|= URB_FREE_BUFFER
;
823 usb_anchor_urb(urb
, &data
->intr_anchor
);
825 err
= usb_submit_urb(urb
, mem_flags
);
827 if (err
!= -EPERM
&& err
!= -ENODEV
)
828 bt_dev_err(hdev
, "urb %p submission failed (%d)",
830 usb_unanchor_urb(urb
);
838 static void btusb_bulk_complete(struct urb
*urb
)
840 struct hci_dev
*hdev
= urb
->context
;
841 struct btusb_data
*data
= hci_get_drvdata(hdev
);
844 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
847 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
850 if (urb
->status
== 0) {
851 hdev
->stat
.byte_rx
+= urb
->actual_length
;
853 if (data
->recv_bulk(data
, urb
->transfer_buffer
,
854 urb
->actual_length
) < 0) {
855 bt_dev_err(hdev
, "corrupted ACL packet");
858 } else if (urb
->status
== -ENOENT
) {
859 /* Avoid suspend failed when usb_kill_urb */
863 if (!test_bit(BTUSB_BULK_RUNNING
, &data
->flags
))
866 usb_anchor_urb(urb
, &data
->bulk_anchor
);
867 usb_mark_last_busy(data
->udev
);
869 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
871 /* -EPERM: urb is being killed;
872 * -ENODEV: device got disconnected
874 if (err
!= -EPERM
&& err
!= -ENODEV
)
875 bt_dev_err(hdev
, "urb %p failed to resubmit (%d)",
877 usb_unanchor_urb(urb
);
881 static int btusb_submit_bulk_urb(struct hci_dev
*hdev
, gfp_t mem_flags
)
883 struct btusb_data
*data
= hci_get_drvdata(hdev
);
887 int err
, size
= HCI_MAX_FRAME_SIZE
;
889 BT_DBG("%s", hdev
->name
);
891 if (!data
->bulk_rx_ep
)
894 urb
= usb_alloc_urb(0, mem_flags
);
898 buf
= kmalloc(size
, mem_flags
);
904 pipe
= usb_rcvbulkpipe(data
->udev
, data
->bulk_rx_ep
->bEndpointAddress
);
906 usb_fill_bulk_urb(urb
, data
->udev
, pipe
, buf
, size
,
907 btusb_bulk_complete
, hdev
);
909 urb
->transfer_flags
|= URB_FREE_BUFFER
;
911 usb_mark_last_busy(data
->udev
);
912 usb_anchor_urb(urb
, &data
->bulk_anchor
);
914 err
= usb_submit_urb(urb
, mem_flags
);
916 if (err
!= -EPERM
&& err
!= -ENODEV
)
917 bt_dev_err(hdev
, "urb %p submission failed (%d)",
919 usb_unanchor_urb(urb
);
927 static void btusb_isoc_complete(struct urb
*urb
)
929 struct hci_dev
*hdev
= urb
->context
;
930 struct btusb_data
*data
= hci_get_drvdata(hdev
);
933 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
936 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
939 if (urb
->status
== 0) {
940 for (i
= 0; i
< urb
->number_of_packets
; i
++) {
941 unsigned int offset
= urb
->iso_frame_desc
[i
].offset
;
942 unsigned int length
= urb
->iso_frame_desc
[i
].actual_length
;
944 if (urb
->iso_frame_desc
[i
].status
)
947 hdev
->stat
.byte_rx
+= length
;
949 if (btusb_recv_isoc(data
, urb
->transfer_buffer
+ offset
,
951 bt_dev_err(hdev
, "corrupted SCO packet");
955 } else if (urb
->status
== -ENOENT
) {
956 /* Avoid suspend failed when usb_kill_urb */
960 if (!test_bit(BTUSB_ISOC_RUNNING
, &data
->flags
))
963 usb_anchor_urb(urb
, &data
->isoc_anchor
);
965 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
967 /* -EPERM: urb is being killed;
968 * -ENODEV: device got disconnected
970 if (err
!= -EPERM
&& err
!= -ENODEV
)
971 bt_dev_err(hdev
, "urb %p failed to resubmit (%d)",
973 usb_unanchor_urb(urb
);
977 static inline void __fill_isoc_descriptor(struct urb
*urb
, int len
, int mtu
)
981 BT_DBG("len %d mtu %d", len
, mtu
);
983 for (i
= 0; i
< BTUSB_MAX_ISOC_FRAMES
&& len
>= mtu
;
984 i
++, offset
+= mtu
, len
-= mtu
) {
985 urb
->iso_frame_desc
[i
].offset
= offset
;
986 urb
->iso_frame_desc
[i
].length
= mtu
;
989 if (len
&& i
< BTUSB_MAX_ISOC_FRAMES
) {
990 urb
->iso_frame_desc
[i
].offset
= offset
;
991 urb
->iso_frame_desc
[i
].length
= len
;
995 urb
->number_of_packets
= i
;
998 static int btusb_submit_isoc_urb(struct hci_dev
*hdev
, gfp_t mem_flags
)
1000 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1006 BT_DBG("%s", hdev
->name
);
1008 if (!data
->isoc_rx_ep
)
1011 urb
= usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES
, mem_flags
);
1015 size
= le16_to_cpu(data
->isoc_rx_ep
->wMaxPacketSize
) *
1016 BTUSB_MAX_ISOC_FRAMES
;
1018 buf
= kmalloc(size
, mem_flags
);
1024 pipe
= usb_rcvisocpipe(data
->udev
, data
->isoc_rx_ep
->bEndpointAddress
);
1026 usb_fill_int_urb(urb
, data
->udev
, pipe
, buf
, size
, btusb_isoc_complete
,
1027 hdev
, data
->isoc_rx_ep
->bInterval
);
1029 urb
->transfer_flags
= URB_FREE_BUFFER
| URB_ISO_ASAP
;
1031 __fill_isoc_descriptor(urb
, size
,
1032 le16_to_cpu(data
->isoc_rx_ep
->wMaxPacketSize
));
1034 usb_anchor_urb(urb
, &data
->isoc_anchor
);
1036 err
= usb_submit_urb(urb
, mem_flags
);
1038 if (err
!= -EPERM
&& err
!= -ENODEV
)
1039 bt_dev_err(hdev
, "urb %p submission failed (%d)",
1041 usb_unanchor_urb(urb
);
1049 static void btusb_diag_complete(struct urb
*urb
)
1051 struct hci_dev
*hdev
= urb
->context
;
1052 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1055 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
1056 urb
->actual_length
);
1058 if (urb
->status
== 0) {
1059 struct sk_buff
*skb
;
1061 skb
= bt_skb_alloc(urb
->actual_length
, GFP_ATOMIC
);
1063 skb_put_data(skb
, urb
->transfer_buffer
,
1064 urb
->actual_length
);
1065 hci_recv_diag(hdev
, skb
);
1067 } else if (urb
->status
== -ENOENT
) {
1068 /* Avoid suspend failed when usb_kill_urb */
1072 if (!test_bit(BTUSB_DIAG_RUNNING
, &data
->flags
))
1075 usb_anchor_urb(urb
, &data
->diag_anchor
);
1076 usb_mark_last_busy(data
->udev
);
1078 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
1080 /* -EPERM: urb is being killed;
1081 * -ENODEV: device got disconnected
1083 if (err
!= -EPERM
&& err
!= -ENODEV
)
1084 bt_dev_err(hdev
, "urb %p failed to resubmit (%d)",
1086 usb_unanchor_urb(urb
);
1090 static int btusb_submit_diag_urb(struct hci_dev
*hdev
, gfp_t mem_flags
)
1092 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1096 int err
, size
= HCI_MAX_FRAME_SIZE
;
1098 BT_DBG("%s", hdev
->name
);
1100 if (!data
->diag_rx_ep
)
1103 urb
= usb_alloc_urb(0, mem_flags
);
1107 buf
= kmalloc(size
, mem_flags
);
1113 pipe
= usb_rcvbulkpipe(data
->udev
, data
->diag_rx_ep
->bEndpointAddress
);
1115 usb_fill_bulk_urb(urb
, data
->udev
, pipe
, buf
, size
,
1116 btusb_diag_complete
, hdev
);
1118 urb
->transfer_flags
|= URB_FREE_BUFFER
;
1120 usb_mark_last_busy(data
->udev
);
1121 usb_anchor_urb(urb
, &data
->diag_anchor
);
1123 err
= usb_submit_urb(urb
, mem_flags
);
1125 if (err
!= -EPERM
&& err
!= -ENODEV
)
1126 bt_dev_err(hdev
, "urb %p submission failed (%d)",
1128 usb_unanchor_urb(urb
);
1136 static void btusb_tx_complete(struct urb
*urb
)
1138 struct sk_buff
*skb
= urb
->context
;
1139 struct hci_dev
*hdev
= (struct hci_dev
*)skb
->dev
;
1140 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1141 unsigned long flags
;
1143 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
1144 urb
->actual_length
);
1146 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
1150 hdev
->stat
.byte_tx
+= urb
->transfer_buffer_length
;
1152 hdev
->stat
.err_tx
++;
1155 spin_lock_irqsave(&data
->txlock
, flags
);
1156 data
->tx_in_flight
--;
1157 spin_unlock_irqrestore(&data
->txlock
, flags
);
1159 kfree(urb
->setup_packet
);
1164 static void btusb_isoc_tx_complete(struct urb
*urb
)
1166 struct sk_buff
*skb
= urb
->context
;
1167 struct hci_dev
*hdev
= (struct hci_dev
*)skb
->dev
;
1169 BT_DBG("%s urb %p status %d count %d", hdev
->name
, urb
, urb
->status
,
1170 urb
->actual_length
);
1172 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
1176 hdev
->stat
.byte_tx
+= urb
->transfer_buffer_length
;
1178 hdev
->stat
.err_tx
++;
1181 kfree(urb
->setup_packet
);
1186 static int btusb_open(struct hci_dev
*hdev
)
1188 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1191 BT_DBG("%s", hdev
->name
);
1193 err
= usb_autopm_get_interface(data
->intf
);
1197 /* Patching USB firmware files prior to starting any URBs of HCI path
1198 * It is more safe to use USB bulk channel for downloading USB patch
1200 if (data
->setup_on_usb
) {
1201 err
= data
->setup_on_usb(hdev
);
1206 data
->intf
->needs_remote_wakeup
= 1;
1208 /* Disable device remote wakeup when host is suspended
1209 * For Realtek chips, global suspend without
1210 * SET_FEATURE (DEVICE_REMOTE_WAKEUP) can save more power in device.
1212 if (test_bit(BTUSB_WAKEUP_DISABLE
, &data
->flags
))
1213 device_wakeup_disable(&data
->udev
->dev
);
1215 if (test_and_set_bit(BTUSB_INTR_RUNNING
, &data
->flags
))
1218 err
= btusb_submit_intr_urb(hdev
, GFP_KERNEL
);
1222 err
= btusb_submit_bulk_urb(hdev
, GFP_KERNEL
);
1224 usb_kill_anchored_urbs(&data
->intr_anchor
);
1228 set_bit(BTUSB_BULK_RUNNING
, &data
->flags
);
1229 btusb_submit_bulk_urb(hdev
, GFP_KERNEL
);
1232 if (!btusb_submit_diag_urb(hdev
, GFP_KERNEL
))
1233 set_bit(BTUSB_DIAG_RUNNING
, &data
->flags
);
1237 usb_autopm_put_interface(data
->intf
);
1241 clear_bit(BTUSB_INTR_RUNNING
, &data
->flags
);
1243 usb_autopm_put_interface(data
->intf
);
1247 static void btusb_stop_traffic(struct btusb_data
*data
)
1249 usb_kill_anchored_urbs(&data
->intr_anchor
);
1250 usb_kill_anchored_urbs(&data
->bulk_anchor
);
1251 usb_kill_anchored_urbs(&data
->isoc_anchor
);
1252 usb_kill_anchored_urbs(&data
->diag_anchor
);
1253 usb_kill_anchored_urbs(&data
->ctrl_anchor
);
1256 static int btusb_close(struct hci_dev
*hdev
)
1258 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1261 BT_DBG("%s", hdev
->name
);
1263 cancel_work_sync(&data
->work
);
1264 cancel_work_sync(&data
->waker
);
1266 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
1267 clear_bit(BTUSB_BULK_RUNNING
, &data
->flags
);
1268 clear_bit(BTUSB_INTR_RUNNING
, &data
->flags
);
1269 clear_bit(BTUSB_DIAG_RUNNING
, &data
->flags
);
1271 btusb_stop_traffic(data
);
1272 btusb_free_frags(data
);
1274 err
= usb_autopm_get_interface(data
->intf
);
1278 data
->intf
->needs_remote_wakeup
= 0;
1280 /* Enable remote wake up for auto-suspend */
1281 if (test_bit(BTUSB_WAKEUP_DISABLE
, &data
->flags
))
1282 data
->intf
->needs_remote_wakeup
= 1;
1284 usb_autopm_put_interface(data
->intf
);
1287 usb_scuttle_anchored_urbs(&data
->deferred
);
1291 static int btusb_flush(struct hci_dev
*hdev
)
1293 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1295 BT_DBG("%s", hdev
->name
);
1297 usb_kill_anchored_urbs(&data
->tx_anchor
);
1298 btusb_free_frags(data
);
1303 static struct urb
*alloc_ctrl_urb(struct hci_dev
*hdev
, struct sk_buff
*skb
)
1305 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1306 struct usb_ctrlrequest
*dr
;
1310 urb
= usb_alloc_urb(0, GFP_KERNEL
);
1312 return ERR_PTR(-ENOMEM
);
1314 dr
= kmalloc(sizeof(*dr
), GFP_KERNEL
);
1317 return ERR_PTR(-ENOMEM
);
1320 dr
->bRequestType
= data
->cmdreq_type
;
1321 dr
->bRequest
= data
->cmdreq
;
1324 dr
->wLength
= __cpu_to_le16(skb
->len
);
1326 pipe
= usb_sndctrlpipe(data
->udev
, 0x00);
1328 usb_fill_control_urb(urb
, data
->udev
, pipe
, (void *)dr
,
1329 skb
->data
, skb
->len
, btusb_tx_complete
, skb
);
1331 skb
->dev
= (void *)hdev
;
1336 static struct urb
*alloc_bulk_urb(struct hci_dev
*hdev
, struct sk_buff
*skb
)
1338 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1342 if (!data
->bulk_tx_ep
)
1343 return ERR_PTR(-ENODEV
);
1345 urb
= usb_alloc_urb(0, GFP_KERNEL
);
1347 return ERR_PTR(-ENOMEM
);
1349 pipe
= usb_sndbulkpipe(data
->udev
, data
->bulk_tx_ep
->bEndpointAddress
);
1351 usb_fill_bulk_urb(urb
, data
->udev
, pipe
,
1352 skb
->data
, skb
->len
, btusb_tx_complete
, skb
);
1354 skb
->dev
= (void *)hdev
;
1359 static struct urb
*alloc_isoc_urb(struct hci_dev
*hdev
, struct sk_buff
*skb
)
1361 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1365 if (!data
->isoc_tx_ep
)
1366 return ERR_PTR(-ENODEV
);
1368 urb
= usb_alloc_urb(BTUSB_MAX_ISOC_FRAMES
, GFP_KERNEL
);
1370 return ERR_PTR(-ENOMEM
);
1372 pipe
= usb_sndisocpipe(data
->udev
, data
->isoc_tx_ep
->bEndpointAddress
);
1374 usb_fill_int_urb(urb
, data
->udev
, pipe
,
1375 skb
->data
, skb
->len
, btusb_isoc_tx_complete
,
1376 skb
, data
->isoc_tx_ep
->bInterval
);
1378 urb
->transfer_flags
= URB_ISO_ASAP
;
1380 __fill_isoc_descriptor(urb
, skb
->len
,
1381 le16_to_cpu(data
->isoc_tx_ep
->wMaxPacketSize
));
1383 skb
->dev
= (void *)hdev
;
1388 static int submit_tx_urb(struct hci_dev
*hdev
, struct urb
*urb
)
1390 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1393 usb_anchor_urb(urb
, &data
->tx_anchor
);
1395 err
= usb_submit_urb(urb
, GFP_KERNEL
);
1397 if (err
!= -EPERM
&& err
!= -ENODEV
)
1398 bt_dev_err(hdev
, "urb %p submission failed (%d)",
1400 kfree(urb
->setup_packet
);
1401 usb_unanchor_urb(urb
);
1403 usb_mark_last_busy(data
->udev
);
1410 static int submit_or_queue_tx_urb(struct hci_dev
*hdev
, struct urb
*urb
)
1412 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1413 unsigned long flags
;
1416 spin_lock_irqsave(&data
->txlock
, flags
);
1417 suspending
= test_bit(BTUSB_SUSPENDING
, &data
->flags
);
1419 data
->tx_in_flight
++;
1420 spin_unlock_irqrestore(&data
->txlock
, flags
);
1423 return submit_tx_urb(hdev
, urb
);
1425 usb_anchor_urb(urb
, &data
->deferred
);
1426 schedule_work(&data
->waker
);
1432 static int btusb_send_frame(struct hci_dev
*hdev
, struct sk_buff
*skb
)
1436 BT_DBG("%s", hdev
->name
);
1438 switch (hci_skb_pkt_type(skb
)) {
1439 case HCI_COMMAND_PKT
:
1440 urb
= alloc_ctrl_urb(hdev
, skb
);
1442 return PTR_ERR(urb
);
1444 hdev
->stat
.cmd_tx
++;
1445 return submit_or_queue_tx_urb(hdev
, urb
);
1447 case HCI_ACLDATA_PKT
:
1448 urb
= alloc_bulk_urb(hdev
, skb
);
1450 return PTR_ERR(urb
);
1452 hdev
->stat
.acl_tx
++;
1453 return submit_or_queue_tx_urb(hdev
, urb
);
1455 case HCI_SCODATA_PKT
:
1456 if (hci_conn_num(hdev
, SCO_LINK
) < 1)
1459 urb
= alloc_isoc_urb(hdev
, skb
);
1461 return PTR_ERR(urb
);
1463 hdev
->stat
.sco_tx
++;
1464 return submit_tx_urb(hdev
, urb
);
1470 static void btusb_notify(struct hci_dev
*hdev
, unsigned int evt
)
1472 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1474 BT_DBG("%s evt %d", hdev
->name
, evt
);
1476 if (hci_conn_num(hdev
, SCO_LINK
) != data
->sco_num
) {
1477 data
->sco_num
= hci_conn_num(hdev
, SCO_LINK
);
1478 schedule_work(&data
->work
);
1482 static inline int __set_isoc_interface(struct hci_dev
*hdev
, int altsetting
)
1484 struct btusb_data
*data
= hci_get_drvdata(hdev
);
1485 struct usb_interface
*intf
= data
->isoc
;
1486 struct usb_endpoint_descriptor
*ep_desc
;
1492 err
= usb_set_interface(data
->udev
, data
->isoc_ifnum
, altsetting
);
1494 bt_dev_err(hdev
, "setting interface failed (%d)", -err
);
1498 data
->isoc_altsetting
= altsetting
;
1500 data
->isoc_tx_ep
= NULL
;
1501 data
->isoc_rx_ep
= NULL
;
1503 for (i
= 0; i
< intf
->cur_altsetting
->desc
.bNumEndpoints
; i
++) {
1504 ep_desc
= &intf
->cur_altsetting
->endpoint
[i
].desc
;
1506 if (!data
->isoc_tx_ep
&& usb_endpoint_is_isoc_out(ep_desc
)) {
1507 data
->isoc_tx_ep
= ep_desc
;
1511 if (!data
->isoc_rx_ep
&& usb_endpoint_is_isoc_in(ep_desc
)) {
1512 data
->isoc_rx_ep
= ep_desc
;
1517 if (!data
->isoc_tx_ep
|| !data
->isoc_rx_ep
) {
1518 bt_dev_err(hdev
, "invalid SCO descriptors");
1525 static void btusb_work(struct work_struct
*work
)
1527 struct btusb_data
*data
= container_of(work
, struct btusb_data
, work
);
1528 struct hci_dev
*hdev
= data
->hdev
;
1532 if (data
->sco_num
> 0) {
1533 if (!test_bit(BTUSB_DID_ISO_RESUME
, &data
->flags
)) {
1534 err
= usb_autopm_get_interface(data
->isoc
? data
->isoc
: data
->intf
);
1536 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
1537 usb_kill_anchored_urbs(&data
->isoc_anchor
);
1541 set_bit(BTUSB_DID_ISO_RESUME
, &data
->flags
);
1544 if (hdev
->voice_setting
& 0x0020) {
1545 static const int alts
[3] = { 2, 4, 5 };
1547 new_alts
= alts
[data
->sco_num
- 1];
1549 new_alts
= data
->sco_num
;
1552 if (data
->isoc_altsetting
!= new_alts
) {
1553 unsigned long flags
;
1555 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
1556 usb_kill_anchored_urbs(&data
->isoc_anchor
);
1558 /* When isochronous alternate setting needs to be
1559 * changed, because SCO connection has been added
1560 * or removed, a packet fragment may be left in the
1561 * reassembling state. This could lead to wrongly
1562 * assembled fragments.
1564 * Clear outstanding fragment when selecting a new
1565 * alternate setting.
1567 spin_lock_irqsave(&data
->rxlock
, flags
);
1568 kfree_skb(data
->sco_skb
);
1569 data
->sco_skb
= NULL
;
1570 spin_unlock_irqrestore(&data
->rxlock
, flags
);
1572 if (__set_isoc_interface(hdev
, new_alts
) < 0)
1576 if (!test_and_set_bit(BTUSB_ISOC_RUNNING
, &data
->flags
)) {
1577 if (btusb_submit_isoc_urb(hdev
, GFP_KERNEL
) < 0)
1578 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
1580 btusb_submit_isoc_urb(hdev
, GFP_KERNEL
);
1583 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
1584 usb_kill_anchored_urbs(&data
->isoc_anchor
);
1586 __set_isoc_interface(hdev
, 0);
1587 if (test_and_clear_bit(BTUSB_DID_ISO_RESUME
, &data
->flags
))
1588 usb_autopm_put_interface(data
->isoc
? data
->isoc
: data
->intf
);
1592 static void btusb_waker(struct work_struct
*work
)
1594 struct btusb_data
*data
= container_of(work
, struct btusb_data
, waker
);
1597 err
= usb_autopm_get_interface(data
->intf
);
1601 usb_autopm_put_interface(data
->intf
);
1604 static int btusb_setup_bcm92035(struct hci_dev
*hdev
)
1606 struct sk_buff
*skb
;
1609 BT_DBG("%s", hdev
->name
);
1611 skb
= __hci_cmd_sync(hdev
, 0xfc3b, 1, &val
, HCI_INIT_TIMEOUT
);
1613 bt_dev_err(hdev
, "BCM92035 command failed (%ld)", PTR_ERR(skb
));
1620 static int btusb_setup_csr(struct hci_dev
*hdev
)
1622 struct hci_rp_read_local_version
*rp
;
1623 struct sk_buff
*skb
;
1625 BT_DBG("%s", hdev
->name
);
1627 skb
= __hci_cmd_sync(hdev
, HCI_OP_READ_LOCAL_VERSION
, 0, NULL
,
1630 int err
= PTR_ERR(skb
);
1631 bt_dev_err(hdev
, "CSR: Local version failed (%d)", err
);
1635 if (skb
->len
!= sizeof(struct hci_rp_read_local_version
)) {
1636 bt_dev_err(hdev
, "CSR: Local version length mismatch");
1641 rp
= (struct hci_rp_read_local_version
*)skb
->data
;
1643 /* Detect controllers which aren't real CSR ones. */
1644 if (le16_to_cpu(rp
->manufacturer
) != 10 ||
1645 le16_to_cpu(rp
->lmp_subver
) == 0x0c5c) {
1646 /* Clear the reset quirk since this is not an actual
1647 * early Bluetooth 1.1 device from CSR.
1649 clear_bit(HCI_QUIRK_RESET_ON_CLOSE
, &hdev
->quirks
);
1651 /* These fake CSR controllers have all a broken
1652 * stored link key handling and so just disable it.
1654 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY
, &hdev
->quirks
);
1662 static const struct firmware
*btusb_setup_intel_get_fw(struct hci_dev
*hdev
,
1663 struct intel_version
*ver
)
1665 const struct firmware
*fw
;
1669 snprintf(fwname
, sizeof(fwname
),
1670 "intel/ibt-hw-%x.%x.%x-fw-%x.%x.%x.%x.%x.bseq",
1671 ver
->hw_platform
, ver
->hw_variant
, ver
->hw_revision
,
1672 ver
->fw_variant
, ver
->fw_revision
, ver
->fw_build_num
,
1673 ver
->fw_build_ww
, ver
->fw_build_yy
);
1675 ret
= request_firmware(&fw
, fwname
, &hdev
->dev
);
1677 if (ret
== -EINVAL
) {
1678 bt_dev_err(hdev
, "Intel firmware file request failed (%d)",
1683 bt_dev_err(hdev
, "failed to open Intel firmware file: %s (%d)",
1686 /* If the correct firmware patch file is not found, use the
1687 * default firmware patch file instead
1689 snprintf(fwname
, sizeof(fwname
), "intel/ibt-hw-%x.%x.bseq",
1690 ver
->hw_platform
, ver
->hw_variant
);
1691 if (request_firmware(&fw
, fwname
, &hdev
->dev
) < 0) {
1692 bt_dev_err(hdev
, "failed to open default fw file: %s",
1698 bt_dev_info(hdev
, "Intel Bluetooth firmware file: %s", fwname
);
1703 static int btusb_setup_intel_patching(struct hci_dev
*hdev
,
1704 const struct firmware
*fw
,
1705 const u8
**fw_ptr
, int *disable_patch
)
1707 struct sk_buff
*skb
;
1708 struct hci_command_hdr
*cmd
;
1709 const u8
*cmd_param
;
1710 struct hci_event_hdr
*evt
= NULL
;
1711 const u8
*evt_param
= NULL
;
1712 int remain
= fw
->size
- (*fw_ptr
- fw
->data
);
1714 /* The first byte indicates the types of the patch command or event.
1715 * 0x01 means HCI command and 0x02 is HCI event. If the first bytes
1716 * in the current firmware buffer doesn't start with 0x01 or
1717 * the size of remain buffer is smaller than HCI command header,
1718 * the firmware file is corrupted and it should stop the patching
1721 if (remain
> HCI_COMMAND_HDR_SIZE
&& *fw_ptr
[0] != 0x01) {
1722 bt_dev_err(hdev
, "Intel fw corrupted: invalid cmd read");
1728 cmd
= (struct hci_command_hdr
*)(*fw_ptr
);
1729 *fw_ptr
+= sizeof(*cmd
);
1730 remain
-= sizeof(*cmd
);
1732 /* Ensure that the remain firmware data is long enough than the length
1733 * of command parameter. If not, the firmware file is corrupted.
1735 if (remain
< cmd
->plen
) {
1736 bt_dev_err(hdev
, "Intel fw corrupted: invalid cmd len");
1740 /* If there is a command that loads a patch in the firmware
1741 * file, then enable the patch upon success, otherwise just
1742 * disable the manufacturer mode, for example patch activation
1743 * is not required when the default firmware patch file is used
1744 * because there are no patch data to load.
1746 if (*disable_patch
&& le16_to_cpu(cmd
->opcode
) == 0xfc8e)
1749 cmd_param
= *fw_ptr
;
1750 *fw_ptr
+= cmd
->plen
;
1751 remain
-= cmd
->plen
;
1753 /* This reads the expected events when the above command is sent to the
1754 * device. Some vendor commands expects more than one events, for
1755 * example command status event followed by vendor specific event.
1756 * For this case, it only keeps the last expected event. so the command
1757 * can be sent with __hci_cmd_sync_ev() which returns the sk_buff of
1758 * last expected event.
1760 while (remain
> HCI_EVENT_HDR_SIZE
&& *fw_ptr
[0] == 0x02) {
1764 evt
= (struct hci_event_hdr
*)(*fw_ptr
);
1765 *fw_ptr
+= sizeof(*evt
);
1766 remain
-= sizeof(*evt
);
1768 if (remain
< evt
->plen
) {
1769 bt_dev_err(hdev
, "Intel fw corrupted: invalid evt len");
1773 evt_param
= *fw_ptr
;
1774 *fw_ptr
+= evt
->plen
;
1775 remain
-= evt
->plen
;
1778 /* Every HCI commands in the firmware file has its correspond event.
1779 * If event is not found or remain is smaller than zero, the firmware
1780 * file is corrupted.
1782 if (!evt
|| !evt_param
|| remain
< 0) {
1783 bt_dev_err(hdev
, "Intel fw corrupted: invalid evt read");
1787 skb
= __hci_cmd_sync_ev(hdev
, le16_to_cpu(cmd
->opcode
), cmd
->plen
,
1788 cmd_param
, evt
->evt
, HCI_INIT_TIMEOUT
);
1790 bt_dev_err(hdev
, "sending Intel patch command (0x%4.4x) failed (%ld)",
1791 cmd
->opcode
, PTR_ERR(skb
));
1792 return PTR_ERR(skb
);
1795 /* It ensures that the returned event matches the event data read from
1796 * the firmware file. At fist, it checks the length and then
1797 * the contents of the event.
1799 if (skb
->len
!= evt
->plen
) {
1800 bt_dev_err(hdev
, "mismatch event length (opcode 0x%4.4x)",
1801 le16_to_cpu(cmd
->opcode
));
1806 if (memcmp(skb
->data
, evt_param
, evt
->plen
)) {
1807 bt_dev_err(hdev
, "mismatch event parameter (opcode 0x%4.4x)",
1808 le16_to_cpu(cmd
->opcode
));
1817 static int btusb_setup_intel(struct hci_dev
*hdev
)
1819 struct sk_buff
*skb
;
1820 const struct firmware
*fw
;
1822 int disable_patch
, err
;
1823 struct intel_version ver
;
1825 BT_DBG("%s", hdev
->name
);
1827 /* The controller has a bug with the first HCI command sent to it
1828 * returning number of completed commands as zero. This would stall the
1829 * command processing in the Bluetooth core.
1831 * As a workaround, send HCI Reset command first which will reset the
1832 * number of completed commands and allow normal command processing
1835 skb
= __hci_cmd_sync(hdev
, HCI_OP_RESET
, 0, NULL
, HCI_INIT_TIMEOUT
);
1837 bt_dev_err(hdev
, "sending initial HCI reset command failed (%ld)",
1839 return PTR_ERR(skb
);
1843 /* Read Intel specific controller version first to allow selection of
1844 * which firmware file to load.
1846 * The returned information are hardware variant and revision plus
1847 * firmware variant, revision and build number.
1849 err
= btintel_read_version(hdev
, &ver
);
1853 bt_dev_info(hdev
, "read Intel version: %02x%02x%02x%02x%02x%02x%02x%02x%02x",
1854 ver
.hw_platform
, ver
.hw_variant
, ver
.hw_revision
,
1855 ver
.fw_variant
, ver
.fw_revision
, ver
.fw_build_num
,
1856 ver
.fw_build_ww
, ver
.fw_build_yy
, ver
.fw_patch_num
);
1858 /* fw_patch_num indicates the version of patch the device currently
1859 * have. If there is no patch data in the device, it is always 0x00.
1860 * So, if it is other than 0x00, no need to patch the device again.
1862 if (ver
.fw_patch_num
) {
1863 bt_dev_info(hdev
, "Intel device is already patched. "
1864 "patch num: %02x", ver
.fw_patch_num
);
1868 /* Opens the firmware patch file based on the firmware version read
1869 * from the controller. If it fails to open the matching firmware
1870 * patch file, it tries to open the default firmware patch file.
1871 * If no patch file is found, allow the device to operate without
1874 fw
= btusb_setup_intel_get_fw(hdev
, &ver
);
1879 /* Enable the manufacturer mode of the controller.
1880 * Only while this mode is enabled, the driver can download the
1881 * firmware patch data and configuration parameters.
1883 err
= btintel_enter_mfg(hdev
);
1885 release_firmware(fw
);
1891 /* The firmware data file consists of list of Intel specific HCI
1892 * commands and its expected events. The first byte indicates the
1893 * type of the message, either HCI command or HCI event.
1895 * It reads the command and its expected event from the firmware file,
1896 * and send to the controller. Once __hci_cmd_sync_ev() returns,
1897 * the returned event is compared with the event read from the firmware
1898 * file and it will continue until all the messages are downloaded to
1901 * Once the firmware patching is completed successfully,
1902 * the manufacturer mode is disabled with reset and activating the
1905 * If the firmware patching fails, the manufacturer mode is
1906 * disabled with reset and deactivating the patch.
1908 * If the default patch file is used, no reset is done when disabling
1911 while (fw
->size
> fw_ptr
- fw
->data
) {
1914 ret
= btusb_setup_intel_patching(hdev
, fw
, &fw_ptr
,
1917 goto exit_mfg_deactivate
;
1920 release_firmware(fw
);
1923 goto exit_mfg_disable
;
1925 /* Patching completed successfully and disable the manufacturer mode
1926 * with reset and activate the downloaded firmware patches.
1928 err
= btintel_exit_mfg(hdev
, true, true);
1932 bt_dev_info(hdev
, "Intel firmware patch completed and activated");
1937 /* Disable the manufacturer mode without reset */
1938 err
= btintel_exit_mfg(hdev
, false, false);
1942 bt_dev_info(hdev
, "Intel firmware patch completed");
1946 exit_mfg_deactivate
:
1947 release_firmware(fw
);
1949 /* Patching failed. Disable the manufacturer mode with reset and
1950 * deactivate the downloaded firmware patches.
1952 err
= btintel_exit_mfg(hdev
, true, false);
1956 bt_dev_info(hdev
, "Intel firmware patch completed and deactivated");
1959 /* Set the event mask for Intel specific vendor events. This enables
1960 * a few extra events that are useful during general operation.
1962 btintel_set_event_mask_mfg(hdev
, false);
1964 btintel_check_bdaddr(hdev
);
1968 static int inject_cmd_complete(struct hci_dev
*hdev
, __u16 opcode
)
1970 struct sk_buff
*skb
;
1971 struct hci_event_hdr
*hdr
;
1972 struct hci_ev_cmd_complete
*evt
;
1974 skb
= bt_skb_alloc(sizeof(*hdr
) + sizeof(*evt
) + 1, GFP_KERNEL
);
1978 hdr
= skb_put(skb
, sizeof(*hdr
));
1979 hdr
->evt
= HCI_EV_CMD_COMPLETE
;
1980 hdr
->plen
= sizeof(*evt
) + 1;
1982 evt
= skb_put(skb
, sizeof(*evt
));
1984 evt
->opcode
= cpu_to_le16(opcode
);
1986 skb_put_u8(skb
, 0x00);
1988 hci_skb_pkt_type(skb
) = HCI_EVENT_PKT
;
1990 return hci_recv_frame(hdev
, skb
);
1993 static int btusb_recv_bulk_intel(struct btusb_data
*data
, void *buffer
,
1996 /* When the device is in bootloader mode, then it can send
1997 * events via the bulk endpoint. These events are treated the
1998 * same way as the ones received from the interrupt endpoint.
2000 if (test_bit(BTUSB_BOOTLOADER
, &data
->flags
))
2001 return btusb_recv_intr(data
, buffer
, count
);
2003 return btusb_recv_bulk(data
, buffer
, count
);
2006 static void btusb_intel_bootup(struct btusb_data
*data
, const void *ptr
,
2009 const struct intel_bootup
*evt
= ptr
;
2011 if (len
!= sizeof(*evt
))
2014 if (test_and_clear_bit(BTUSB_BOOTING
, &data
->flags
))
2015 wake_up_bit(&data
->flags
, BTUSB_BOOTING
);
2018 static void btusb_intel_secure_send_result(struct btusb_data
*data
,
2019 const void *ptr
, unsigned int len
)
2021 const struct intel_secure_send_result
*evt
= ptr
;
2023 if (len
!= sizeof(*evt
))
2027 set_bit(BTUSB_FIRMWARE_FAILED
, &data
->flags
);
2029 if (test_and_clear_bit(BTUSB_DOWNLOADING
, &data
->flags
) &&
2030 test_bit(BTUSB_FIRMWARE_LOADED
, &data
->flags
))
2031 wake_up_bit(&data
->flags
, BTUSB_DOWNLOADING
);
2034 static int btusb_recv_event_intel(struct hci_dev
*hdev
, struct sk_buff
*skb
)
2036 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2038 if (test_bit(BTUSB_BOOTLOADER
, &data
->flags
)) {
2039 struct hci_event_hdr
*hdr
= (void *)skb
->data
;
2041 if (skb
->len
> HCI_EVENT_HDR_SIZE
&& hdr
->evt
== 0xff &&
2043 const void *ptr
= skb
->data
+ HCI_EVENT_HDR_SIZE
+ 1;
2044 unsigned int len
= skb
->len
- HCI_EVENT_HDR_SIZE
- 1;
2046 switch (skb
->data
[2]) {
2048 /* When switching to the operational firmware
2049 * the device sends a vendor specific event
2050 * indicating that the bootup completed.
2052 btusb_intel_bootup(data
, ptr
, len
);
2055 /* When the firmware loading completes the
2056 * device sends out a vendor specific event
2057 * indicating the result of the firmware
2060 btusb_intel_secure_send_result(data
, ptr
, len
);
2066 return hci_recv_frame(hdev
, skb
);
2069 static int btusb_send_frame_intel(struct hci_dev
*hdev
, struct sk_buff
*skb
)
2071 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2074 BT_DBG("%s", hdev
->name
);
2076 switch (hci_skb_pkt_type(skb
)) {
2077 case HCI_COMMAND_PKT
:
2078 if (test_bit(BTUSB_BOOTLOADER
, &data
->flags
)) {
2079 struct hci_command_hdr
*cmd
= (void *)skb
->data
;
2080 __u16 opcode
= le16_to_cpu(cmd
->opcode
);
2082 /* When in bootloader mode and the command 0xfc09
2083 * is received, it needs to be send down the
2084 * bulk endpoint. So allocate a bulk URB instead.
2086 if (opcode
== 0xfc09)
2087 urb
= alloc_bulk_urb(hdev
, skb
);
2089 urb
= alloc_ctrl_urb(hdev
, skb
);
2091 /* When the 0xfc01 command is issued to boot into
2092 * the operational firmware, it will actually not
2093 * send a command complete event. To keep the flow
2094 * control working inject that event here.
2096 if (opcode
== 0xfc01)
2097 inject_cmd_complete(hdev
, opcode
);
2099 urb
= alloc_ctrl_urb(hdev
, skb
);
2102 return PTR_ERR(urb
);
2104 hdev
->stat
.cmd_tx
++;
2105 return submit_or_queue_tx_urb(hdev
, urb
);
2107 case HCI_ACLDATA_PKT
:
2108 urb
= alloc_bulk_urb(hdev
, skb
);
2110 return PTR_ERR(urb
);
2112 hdev
->stat
.acl_tx
++;
2113 return submit_or_queue_tx_urb(hdev
, urb
);
2115 case HCI_SCODATA_PKT
:
2116 if (hci_conn_num(hdev
, SCO_LINK
) < 1)
2119 urb
= alloc_isoc_urb(hdev
, skb
);
2121 return PTR_ERR(urb
);
2123 hdev
->stat
.sco_tx
++;
2124 return submit_tx_urb(hdev
, urb
);
2130 static bool btusb_setup_intel_new_get_fw_name(struct intel_version
*ver
,
2131 struct intel_boot_params
*params
,
2132 char *fw_name
, size_t len
,
2135 switch (ver
->hw_variant
) {
2136 case 0x0b: /* SfP */
2137 case 0x0c: /* WsP */
2138 snprintf(fw_name
, len
, "intel/ibt-%u-%u.%s",
2139 le16_to_cpu(ver
->hw_variant
),
2140 le16_to_cpu(params
->dev_revid
),
2143 case 0x11: /* JfP */
2144 case 0x12: /* ThP */
2145 case 0x13: /* HrP */
2146 case 0x14: /* CcP */
2147 snprintf(fw_name
, len
, "intel/ibt-%u-%u-%u.%s",
2148 le16_to_cpu(ver
->hw_variant
),
2149 le16_to_cpu(ver
->hw_revision
),
2150 le16_to_cpu(ver
->fw_revision
),
2159 static int btusb_setup_intel_new(struct hci_dev
*hdev
)
2161 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2162 struct intel_version ver
;
2163 struct intel_boot_params params
;
2164 const struct firmware
*fw
;
2167 ktime_t calltime
, delta
, rettime
;
2168 unsigned long long duration
;
2171 BT_DBG("%s", hdev
->name
);
2173 /* Set the default boot parameter to 0x0 and it is updated to
2174 * SKU specific boot parameter after reading Intel_Write_Boot_Params
2175 * command while downloading the firmware.
2177 boot_param
= 0x00000000;
2179 calltime
= ktime_get();
2181 /* Read the Intel version information to determine if the device
2182 * is in bootloader mode or if it already has operational firmware
2185 err
= btintel_read_version(hdev
, &ver
);
2187 bt_dev_err(hdev
, "Intel Read version failed (%d)", err
);
2188 btintel_reset_to_bootloader(hdev
);
2192 /* The hardware platform number has a fixed value of 0x37 and
2193 * for now only accept this single value.
2195 if (ver
.hw_platform
!= 0x37) {
2196 bt_dev_err(hdev
, "Unsupported Intel hardware platform (%u)",
2201 /* Check for supported iBT hardware variants of this firmware
2204 * This check has been put in place to ensure correct forward
2205 * compatibility options when newer hardware variants come along.
2207 switch (ver
.hw_variant
) {
2208 case 0x0b: /* SfP */
2209 case 0x0c: /* WsP */
2210 case 0x11: /* JfP */
2211 case 0x12: /* ThP */
2212 case 0x13: /* HrP */
2213 case 0x14: /* CcP */
2216 bt_dev_err(hdev
, "Unsupported Intel hardware variant (%u)",
2221 btintel_version_info(hdev
, &ver
);
2223 /* The firmware variant determines if the device is in bootloader
2224 * mode or is running operational firmware. The value 0x06 identifies
2225 * the bootloader and the value 0x23 identifies the operational
2228 * When the operational firmware is already present, then only
2229 * the check for valid Bluetooth device address is needed. This
2230 * determines if the device will be added as configured or
2231 * unconfigured controller.
2233 * It is not possible to use the Secure Boot Parameters in this
2234 * case since that command is only available in bootloader mode.
2236 if (ver
.fw_variant
== 0x23) {
2237 clear_bit(BTUSB_BOOTLOADER
, &data
->flags
);
2238 btintel_check_bdaddr(hdev
);
2242 /* If the device is not in bootloader mode, then the only possible
2243 * choice is to return an error and abort the device initialization.
2245 if (ver
.fw_variant
!= 0x06) {
2246 bt_dev_err(hdev
, "Unsupported Intel firmware variant (%u)",
2251 /* Read the secure boot parameters to identify the operating
2252 * details of the bootloader.
2254 err
= btintel_read_boot_params(hdev
, ¶ms
);
2258 /* It is required that every single firmware fragment is acknowledged
2259 * with a command complete event. If the boot parameters indicate
2260 * that this bootloader does not send them, then abort the setup.
2262 if (params
.limited_cce
!= 0x00) {
2263 bt_dev_err(hdev
, "Unsupported Intel firmware loading method (%u)",
2264 params
.limited_cce
);
2268 /* If the OTP has no valid Bluetooth device address, then there will
2269 * also be no valid address for the operational firmware.
2271 if (!bacmp(¶ms
.otp_bdaddr
, BDADDR_ANY
)) {
2272 bt_dev_info(hdev
, "No device address configured");
2273 set_bit(HCI_QUIRK_INVALID_BDADDR
, &hdev
->quirks
);
2276 /* With this Intel bootloader only the hardware variant and device
2277 * revision information are used to select the right firmware for SfP
2280 * The firmware filename is ibt-<hw_variant>-<dev_revid>.sfi.
2282 * Currently the supported hardware variants are:
2283 * 11 (0x0b) for iBT3.0 (LnP/SfP)
2284 * 12 (0x0c) for iBT3.5 (WsP)
2286 * For ThP/JfP and for future SKU's, the FW name varies based on HW
2287 * variant, HW revision and FW revision, as these are dependent on CNVi
2288 * and RF Combination.
2290 * 17 (0x11) for iBT3.5 (JfP)
2291 * 18 (0x12) for iBT3.5 (ThP)
2293 * The firmware file name for these will be
2294 * ibt-<hw_variant>-<hw_revision>-<fw_revision>.sfi.
2297 err
= btusb_setup_intel_new_get_fw_name(&ver
, ¶ms
, fwname
,
2298 sizeof(fwname
), "sfi");
2300 bt_dev_err(hdev
, "Unsupported Intel firmware naming");
2304 err
= request_firmware(&fw
, fwname
, &hdev
->dev
);
2306 bt_dev_err(hdev
, "Failed to load Intel firmware file (%d)", err
);
2310 bt_dev_info(hdev
, "Found device firmware: %s", fwname
);
2312 /* Save the DDC file name for later use to apply once the firmware
2313 * downloading is done.
2315 err
= btusb_setup_intel_new_get_fw_name(&ver
, ¶ms
, fwname
,
2316 sizeof(fwname
), "ddc");
2318 bt_dev_err(hdev
, "Unsupported Intel firmware naming");
2322 if (fw
->size
< 644) {
2323 bt_dev_err(hdev
, "Invalid size of firmware file (%zu)",
2329 set_bit(BTUSB_DOWNLOADING
, &data
->flags
);
2331 /* Start firmware downloading and get boot parameter */
2332 err
= btintel_download_firmware(hdev
, fw
, &boot_param
);
2334 /* When FW download fails, send Intel Reset to retry
2337 btintel_reset_to_bootloader(hdev
);
2340 set_bit(BTUSB_FIRMWARE_LOADED
, &data
->flags
);
2342 bt_dev_info(hdev
, "Waiting for firmware download to complete");
2344 /* Before switching the device into operational mode and with that
2345 * booting the loaded firmware, wait for the bootloader notification
2346 * that all fragments have been successfully received.
2348 * When the event processing receives the notification, then the
2349 * BTUSB_DOWNLOADING flag will be cleared.
2351 * The firmware loading should not take longer than 5 seconds
2352 * and thus just timeout if that happens and fail the setup
2355 err
= wait_on_bit_timeout(&data
->flags
, BTUSB_DOWNLOADING
,
2357 msecs_to_jiffies(5000));
2358 if (err
== -EINTR
) {
2359 bt_dev_err(hdev
, "Firmware loading interrupted");
2364 bt_dev_err(hdev
, "Firmware loading timeout");
2366 btintel_reset_to_bootloader(hdev
);
2370 if (test_bit(BTUSB_FIRMWARE_FAILED
, &data
->flags
)) {
2371 bt_dev_err(hdev
, "Firmware loading failed");
2376 rettime
= ktime_get();
2377 delta
= ktime_sub(rettime
, calltime
);
2378 duration
= (unsigned long long) ktime_to_ns(delta
) >> 10;
2380 bt_dev_info(hdev
, "Firmware loaded in %llu usecs", duration
);
2383 release_firmware(fw
);
2388 calltime
= ktime_get();
2390 set_bit(BTUSB_BOOTING
, &data
->flags
);
2392 err
= btintel_send_intel_reset(hdev
, boot_param
);
2394 bt_dev_err(hdev
, "Intel Soft Reset failed (%d)", err
);
2395 btintel_reset_to_bootloader(hdev
);
2399 /* The bootloader will not indicate when the device is ready. This
2400 * is done by the operational firmware sending bootup notification.
2402 * Booting into operational firmware should not take longer than
2403 * 1 second. However if that happens, then just fail the setup
2404 * since something went wrong.
2406 bt_dev_info(hdev
, "Waiting for device to boot");
2408 err
= wait_on_bit_timeout(&data
->flags
, BTUSB_BOOTING
,
2410 msecs_to_jiffies(1000));
2412 if (err
== -EINTR
) {
2413 bt_dev_err(hdev
, "Device boot interrupted");
2418 bt_dev_err(hdev
, "Device boot timeout");
2419 btintel_reset_to_bootloader(hdev
);
2423 rettime
= ktime_get();
2424 delta
= ktime_sub(rettime
, calltime
);
2425 duration
= (unsigned long long) ktime_to_ns(delta
) >> 10;
2427 bt_dev_info(hdev
, "Device booted in %llu usecs", duration
);
2429 clear_bit(BTUSB_BOOTLOADER
, &data
->flags
);
2431 /* Once the device is running in operational mode, it needs to apply
2432 * the device configuration (DDC) parameters.
2434 * The device can work without DDC parameters, so even if it fails
2435 * to load the file, no need to fail the setup.
2437 btintel_load_ddc_config(hdev
, fwname
);
2439 /* Set the event mask for Intel specific vendor events. This enables
2440 * a few extra events that are useful during general operation. It
2441 * does not enable any debugging related events.
2443 * The device will function correctly without these events enabled
2444 * and thus no need to fail the setup.
2446 btintel_set_event_mask(hdev
, false);
2448 /* Read the Intel version information after loading the FW */
2449 err
= btintel_read_version(hdev
, &ver
);
2453 btintel_version_info(hdev
, &ver
);
2458 static int btusb_shutdown_intel(struct hci_dev
*hdev
)
2460 struct sk_buff
*skb
;
2463 /* In the shutdown sequence where Bluetooth is turned off followed
2464 * by WiFi being turned off, turning WiFi back on causes issue with
2465 * the RF calibration.
2467 * To ensure that any RF activity has been stopped, issue HCI Reset
2468 * command to clear all ongoing activity including advertising,
2471 skb
= __hci_cmd_sync(hdev
, HCI_OP_RESET
, 0, NULL
, HCI_INIT_TIMEOUT
);
2474 bt_dev_err(hdev
, "HCI reset during shutdown failed");
2479 /* Some platforms have an issue with BT LED when the interface is
2480 * down or BT radio is turned off, which takes 5 seconds to BT LED
2481 * goes off. This command turns off the BT LED immediately.
2483 skb
= __hci_cmd_sync(hdev
, 0xfc3f, 0, NULL
, HCI_INIT_TIMEOUT
);
2486 bt_dev_err(hdev
, "turning off Intel device LED failed");
2494 static int btusb_shutdown_intel_new(struct hci_dev
*hdev
)
2496 struct sk_buff
*skb
;
2498 /* Send HCI Reset to the controller to stop any BT activity which
2499 * were triggered. This will help to save power and maintain the
2500 * sync b/w Host and controller
2502 skb
= __hci_cmd_sync(hdev
, HCI_OP_RESET
, 0, NULL
, HCI_INIT_TIMEOUT
);
2504 bt_dev_err(hdev
, "HCI reset during shutdown failed");
2505 return PTR_ERR(skb
);
2512 #define FIRMWARE_MT7663 "mediatek/mt7663pr2h.bin"
2513 #define FIRMWARE_MT7668 "mediatek/mt7668pr2h.bin"
2515 #define HCI_WMT_MAX_EVENT_SIZE 64
2518 BTMTK_WMT_PATCH_DWNLD
= 0x1,
2519 BTMTK_WMT_FUNC_CTRL
= 0x6,
2520 BTMTK_WMT_RST
= 0x7,
2521 BTMTK_WMT_SEMAPHORE
= 0x17,
2526 BTMTK_WMT_PATCH_UNDONE
,
2527 BTMTK_WMT_PATCH_DONE
,
2528 BTMTK_WMT_ON_UNDONE
,
2530 BTMTK_WMT_ON_PROGRESS
,
2533 struct btmtk_wmt_hdr
{
2540 struct btmtk_hci_wmt_cmd
{
2541 struct btmtk_wmt_hdr hdr
;
2545 struct btmtk_hci_wmt_evt
{
2546 struct hci_event_hdr hhdr
;
2547 struct btmtk_wmt_hdr whdr
;
2550 struct btmtk_hci_wmt_evt_funcc
{
2551 struct btmtk_hci_wmt_evt hwhdr
;
2555 struct btmtk_tci_sleep
{
2558 __le16 host_duration
;
2560 u8 time_compensation
;
2563 struct btmtk_hci_wmt_params
{
2571 static void btusb_mtk_wmt_recv(struct urb
*urb
)
2573 struct hci_dev
*hdev
= urb
->context
;
2574 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2575 struct hci_event_hdr
*hdr
;
2576 struct sk_buff
*skb
;
2579 if (urb
->status
== 0 && urb
->actual_length
> 0) {
2580 hdev
->stat
.byte_rx
+= urb
->actual_length
;
2582 /* WMT event shouldn't be fragmented and the size should be
2583 * less than HCI_WMT_MAX_EVENT_SIZE.
2585 skb
= bt_skb_alloc(HCI_WMT_MAX_EVENT_SIZE
, GFP_ATOMIC
);
2587 hdev
->stat
.err_rx
++;
2591 hci_skb_pkt_type(skb
) = HCI_EVENT_PKT
;
2592 skb_put_data(skb
, urb
->transfer_buffer
, urb
->actual_length
);
2594 hdr
= (void *)skb
->data
;
2595 /* Fix up the vendor event id with 0xff for vendor specific
2596 * instead of 0xe4 so that event send via monitoring socket can
2597 * be parsed properly.
2601 /* When someone waits for the WMT event, the skb is being cloned
2602 * and being processed the events from there then.
2604 if (test_bit(BTUSB_TX_WAIT_VND_EVT
, &data
->flags
)) {
2605 data
->evt_skb
= skb_clone(skb
, GFP_KERNEL
);
2610 err
= hci_recv_frame(hdev
, skb
);
2614 if (test_and_clear_bit(BTUSB_TX_WAIT_VND_EVT
,
2616 /* Barrier to sync with other CPUs */
2617 smp_mb__after_atomic();
2618 wake_up_bit(&data
->flags
,
2619 BTUSB_TX_WAIT_VND_EVT
);
2624 kfree_skb(data
->evt_skb
);
2625 data
->evt_skb
= NULL
;
2627 } else if (urb
->status
== -ENOENT
) {
2628 /* Avoid suspend failed when usb_kill_urb */
2632 usb_mark_last_busy(data
->udev
);
2634 /* The URB complete handler is still called with urb->actual_length = 0
2635 * when the event is not available, so we should keep re-submitting
2636 * URB until WMT event returns, Also, It's necessary to wait some time
2637 * between the two consecutive control URBs to relax the target device
2638 * to generate the event. Otherwise, the WMT event cannot return from
2639 * the device successfully.
2643 usb_anchor_urb(urb
, &data
->ctrl_anchor
);
2644 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
2646 /* -EPERM: urb is being killed;
2647 * -ENODEV: device got disconnected
2649 if (err
!= -EPERM
&& err
!= -ENODEV
)
2650 bt_dev_err(hdev
, "urb %p failed to resubmit (%d)",
2652 usb_unanchor_urb(urb
);
2656 static int btusb_mtk_submit_wmt_recv_urb(struct hci_dev
*hdev
)
2658 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2659 struct usb_ctrlrequest
*dr
;
2665 urb
= usb_alloc_urb(0, GFP_KERNEL
);
2669 dr
= kmalloc(sizeof(*dr
), GFP_KERNEL
);
2675 dr
->bRequestType
= USB_TYPE_VENDOR
| USB_DIR_IN
;
2677 dr
->wIndex
= cpu_to_le16(0);
2678 dr
->wValue
= cpu_to_le16(48);
2679 dr
->wLength
= cpu_to_le16(size
);
2681 buf
= kmalloc(size
, GFP_KERNEL
);
2687 pipe
= usb_rcvctrlpipe(data
->udev
, 0);
2689 usb_fill_control_urb(urb
, data
->udev
, pipe
, (void *)dr
,
2690 buf
, size
, btusb_mtk_wmt_recv
, hdev
);
2692 urb
->transfer_flags
|= URB_FREE_BUFFER
;
2694 usb_anchor_urb(urb
, &data
->ctrl_anchor
);
2695 err
= usb_submit_urb(urb
, GFP_KERNEL
);
2697 if (err
!= -EPERM
&& err
!= -ENODEV
)
2698 bt_dev_err(hdev
, "urb %p submission failed (%d)",
2700 usb_unanchor_urb(urb
);
2708 static int btusb_mtk_hci_wmt_sync(struct hci_dev
*hdev
,
2709 struct btmtk_hci_wmt_params
*wmt_params
)
2711 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2712 struct btmtk_hci_wmt_evt_funcc
*wmt_evt_funcc
;
2713 u32 hlen
, status
= BTMTK_WMT_INVALID
;
2714 struct btmtk_hci_wmt_evt
*wmt_evt
;
2715 struct btmtk_hci_wmt_cmd wc
;
2716 struct btmtk_wmt_hdr
*hdr
;
2719 /* Submit control IN URB on demand to process the WMT event */
2720 err
= btusb_mtk_submit_wmt_recv_urb(hdev
);
2724 /* Send the WMT command and wait until the WMT event returns */
2725 hlen
= sizeof(*hdr
) + wmt_params
->dlen
;
2729 hdr
= (struct btmtk_wmt_hdr
*)&wc
;
2731 hdr
->op
= wmt_params
->op
;
2732 hdr
->dlen
= cpu_to_le16(wmt_params
->dlen
+ 1);
2733 hdr
->flag
= wmt_params
->flag
;
2734 memcpy(wc
.data
, wmt_params
->data
, wmt_params
->dlen
);
2736 set_bit(BTUSB_TX_WAIT_VND_EVT
, &data
->flags
);
2738 err
= __hci_cmd_send(hdev
, 0xfc6f, hlen
, &wc
);
2741 clear_bit(BTUSB_TX_WAIT_VND_EVT
, &data
->flags
);
2745 /* The vendor specific WMT commands are all answered by a vendor
2746 * specific event and will have the Command Status or Command
2747 * Complete as with usual HCI command flow control.
2749 * After sending the command, wait for BTUSB_TX_WAIT_VND_EVT
2750 * state to be cleared. The driver specific event receive routine
2751 * will clear that state and with that indicate completion of the
2754 err
= wait_on_bit_timeout(&data
->flags
, BTUSB_TX_WAIT_VND_EVT
,
2755 TASK_INTERRUPTIBLE
, HCI_INIT_TIMEOUT
);
2756 if (err
== -EINTR
) {
2757 bt_dev_err(hdev
, "Execution of wmt command interrupted");
2758 clear_bit(BTUSB_TX_WAIT_VND_EVT
, &data
->flags
);
2763 bt_dev_err(hdev
, "Execution of wmt command timed out");
2764 clear_bit(BTUSB_TX_WAIT_VND_EVT
, &data
->flags
);
2768 /* Parse and handle the return WMT event */
2769 wmt_evt
= (struct btmtk_hci_wmt_evt
*)data
->evt_skb
->data
;
2770 if (wmt_evt
->whdr
.op
!= hdr
->op
) {
2771 bt_dev_err(hdev
, "Wrong op received %d expected %d",
2772 wmt_evt
->whdr
.op
, hdr
->op
);
2777 switch (wmt_evt
->whdr
.op
) {
2778 case BTMTK_WMT_SEMAPHORE
:
2779 if (wmt_evt
->whdr
.flag
== 2)
2780 status
= BTMTK_WMT_PATCH_UNDONE
;
2782 status
= BTMTK_WMT_PATCH_DONE
;
2784 case BTMTK_WMT_FUNC_CTRL
:
2785 wmt_evt_funcc
= (struct btmtk_hci_wmt_evt_funcc
*)wmt_evt
;
2786 if (be16_to_cpu(wmt_evt_funcc
->status
) == 0x404)
2787 status
= BTMTK_WMT_ON_DONE
;
2788 else if (be16_to_cpu(wmt_evt_funcc
->status
) == 0x420)
2789 status
= BTMTK_WMT_ON_PROGRESS
;
2791 status
= BTMTK_WMT_ON_UNDONE
;
2795 if (wmt_params
->status
)
2796 *wmt_params
->status
= status
;
2799 kfree_skb(data
->evt_skb
);
2800 data
->evt_skb
= NULL
;
2805 static int btusb_mtk_setup_firmware(struct hci_dev
*hdev
, const char *fwname
)
2807 struct btmtk_hci_wmt_params wmt_params
;
2808 const struct firmware
*fw
;
2814 err
= request_firmware(&fw
, fwname
, &hdev
->dev
);
2816 bt_dev_err(hdev
, "Failed to load firmware file (%d)", err
);
2823 /* The size of patch header is 30 bytes, should be skip */
2826 goto err_release_fw
;
2833 wmt_params
.op
= BTMTK_WMT_PATCH_DWNLD
;
2834 wmt_params
.status
= NULL
;
2836 while (fw_size
> 0) {
2837 dlen
= min_t(int, 250, fw_size
);
2839 /* Tell deivice the position in sequence */
2840 if (fw_size
- dlen
<= 0)
2842 else if (fw_size
< fw
->size
- 30)
2845 wmt_params
.flag
= flag
;
2846 wmt_params
.dlen
= dlen
;
2847 wmt_params
.data
= fw_ptr
;
2849 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
2851 bt_dev_err(hdev
, "Failed to send wmt patch dwnld (%d)",
2853 goto err_release_fw
;
2860 wmt_params
.op
= BTMTK_WMT_RST
;
2861 wmt_params
.flag
= 4;
2862 wmt_params
.dlen
= 0;
2863 wmt_params
.data
= NULL
;
2864 wmt_params
.status
= NULL
;
2866 /* Activate funciton the firmware providing to */
2867 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
2869 bt_dev_err(hdev
, "Failed to send wmt rst (%d)", err
);
2873 /* Wait a few moments for firmware activation done */
2874 usleep_range(10000, 12000);
2877 release_firmware(fw
);
2882 static int btusb_mtk_func_query(struct hci_dev
*hdev
)
2884 struct btmtk_hci_wmt_params wmt_params
;
2888 /* Query whether the function is enabled */
2889 wmt_params
.op
= BTMTK_WMT_FUNC_CTRL
;
2890 wmt_params
.flag
= 4;
2891 wmt_params
.dlen
= sizeof(param
);
2892 wmt_params
.data
= ¶m
;
2893 wmt_params
.status
= &status
;
2895 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
2897 bt_dev_err(hdev
, "Failed to query function status (%d)", err
);
2904 static int btusb_mtk_reg_read(struct btusb_data
*data
, u32 reg
, u32
*val
)
2906 int pipe
, err
, size
= sizeof(u32
);
2909 buf
= kzalloc(size
, GFP_KERNEL
);
2913 pipe
= usb_rcvctrlpipe(data
->udev
, 0);
2914 err
= usb_control_msg(data
->udev
, pipe
, 0x63,
2915 USB_TYPE_VENDOR
| USB_DIR_IN
,
2916 reg
>> 16, reg
& 0xffff,
2917 buf
, size
, USB_CTRL_SET_TIMEOUT
);
2921 *val
= get_unaligned_le32(buf
);
2929 static int btusb_mtk_id_get(struct btusb_data
*data
, u32
*id
)
2931 return btusb_mtk_reg_read(data
, 0x80000008, id
);
2934 static int btusb_mtk_setup(struct hci_dev
*hdev
)
2936 struct btusb_data
*data
= hci_get_drvdata(hdev
);
2937 struct btmtk_hci_wmt_params wmt_params
;
2938 ktime_t calltime
, delta
, rettime
;
2939 struct btmtk_tci_sleep tci_sleep
;
2940 unsigned long long duration
;
2941 struct sk_buff
*skb
;
2947 calltime
= ktime_get();
2949 err
= btusb_mtk_id_get(data
, &dev_id
);
2951 bt_dev_err(hdev
, "Failed to get device id (%d)", err
);
2957 fwname
= FIRMWARE_MT7663
;
2960 fwname
= FIRMWARE_MT7668
;
2963 bt_dev_err(hdev
, "Unsupported support hardware variant (%08x)",
2968 /* Query whether the firmware is already download */
2969 wmt_params
.op
= BTMTK_WMT_SEMAPHORE
;
2970 wmt_params
.flag
= 1;
2971 wmt_params
.dlen
= 0;
2972 wmt_params
.data
= NULL
;
2973 wmt_params
.status
= &status
;
2975 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
2977 bt_dev_err(hdev
, "Failed to query firmware status (%d)", err
);
2981 if (status
== BTMTK_WMT_PATCH_DONE
) {
2982 bt_dev_info(hdev
, "firmware already downloaded");
2983 goto ignore_setup_fw
;
2986 /* Setup a firmware which the device definitely requires */
2987 err
= btusb_mtk_setup_firmware(hdev
, fwname
);
2992 err
= readx_poll_timeout(btusb_mtk_func_query
, hdev
, status
,
2993 status
< 0 || status
!= BTMTK_WMT_ON_PROGRESS
,
2995 /* -ETIMEDOUT happens */
2999 /* The other errors happen in btusb_mtk_func_query */
3003 if (status
== BTMTK_WMT_ON_DONE
) {
3004 bt_dev_info(hdev
, "function already on");
3005 goto ignore_func_on
;
3008 /* Enable Bluetooth protocol */
3010 wmt_params
.op
= BTMTK_WMT_FUNC_CTRL
;
3011 wmt_params
.flag
= 0;
3012 wmt_params
.dlen
= sizeof(param
);
3013 wmt_params
.data
= ¶m
;
3014 wmt_params
.status
= NULL
;
3016 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
3018 bt_dev_err(hdev
, "Failed to send wmt func ctrl (%d)", err
);
3023 /* Apply the low power environment setup */
3024 tci_sleep
.mode
= 0x5;
3025 tci_sleep
.duration
= cpu_to_le16(0x640);
3026 tci_sleep
.host_duration
= cpu_to_le16(0x640);
3027 tci_sleep
.host_wakeup_pin
= 0;
3028 tci_sleep
.time_compensation
= 0;
3030 skb
= __hci_cmd_sync(hdev
, 0xfc7a, sizeof(tci_sleep
), &tci_sleep
,
3034 bt_dev_err(hdev
, "Failed to apply low power setting (%d)", err
);
3039 rettime
= ktime_get();
3040 delta
= ktime_sub(rettime
, calltime
);
3041 duration
= (unsigned long long)ktime_to_ns(delta
) >> 10;
3043 bt_dev_info(hdev
, "Device setup in %llu usecs", duration
);
3048 static int btusb_mtk_shutdown(struct hci_dev
*hdev
)
3050 struct btmtk_hci_wmt_params wmt_params
;
3054 /* Disable the device */
3055 wmt_params
.op
= BTMTK_WMT_FUNC_CTRL
;
3056 wmt_params
.flag
= 0;
3057 wmt_params
.dlen
= sizeof(param
);
3058 wmt_params
.data
= ¶m
;
3059 wmt_params
.status
= NULL
;
3061 err
= btusb_mtk_hci_wmt_sync(hdev
, &wmt_params
);
3063 bt_dev_err(hdev
, "Failed to send wmt func ctrl (%d)", err
);
3070 MODULE_FIRMWARE(FIRMWARE_MT7663
);
3071 MODULE_FIRMWARE(FIRMWARE_MT7668
);
3074 /* Configure an out-of-band gpio as wake-up pin, if specified in device tree */
3075 static int marvell_config_oob_wake(struct hci_dev
*hdev
)
3077 struct sk_buff
*skb
;
3078 struct btusb_data
*data
= hci_get_drvdata(hdev
);
3079 struct device
*dev
= &data
->udev
->dev
;
3080 u16 pin
, gap
, opcode
;
3084 /* Move on if no wakeup pin specified */
3085 if (of_property_read_u16(dev
->of_node
, "marvell,wakeup-pin", &pin
) ||
3086 of_property_read_u16(dev
->of_node
, "marvell,wakeup-gap-ms", &gap
))
3089 /* Vendor specific command to configure a GPIO as wake-up pin */
3090 opcode
= hci_opcode_pack(0x3F, 0x59);
3091 cmd
[0] = opcode
& 0xFF;
3092 cmd
[1] = opcode
>> 8;
3093 cmd
[2] = 2; /* length of parameters that follow */
3095 cmd
[4] = gap
; /* time in ms, for which wakeup pin should be asserted */
3097 skb
= bt_skb_alloc(sizeof(cmd
), GFP_KERNEL
);
3099 bt_dev_err(hdev
, "%s: No memory\n", __func__
);
3103 skb_put_data(skb
, cmd
, sizeof(cmd
));
3104 hci_skb_pkt_type(skb
) = HCI_COMMAND_PKT
;
3106 ret
= btusb_send_frame(hdev
, skb
);
3108 bt_dev_err(hdev
, "%s: configuration failed\n", __func__
);
3117 static int btusb_set_bdaddr_marvell(struct hci_dev
*hdev
,
3118 const bdaddr_t
*bdaddr
)
3120 struct sk_buff
*skb
;
3125 buf
[1] = sizeof(bdaddr_t
);
3126 memcpy(buf
+ 2, bdaddr
, sizeof(bdaddr_t
));
3128 skb
= __hci_cmd_sync(hdev
, 0xfc22, sizeof(buf
), buf
, HCI_INIT_TIMEOUT
);
3131 bt_dev_err(hdev
, "changing Marvell device address failed (%ld)",
3140 static int btusb_set_bdaddr_ath3012(struct hci_dev
*hdev
,
3141 const bdaddr_t
*bdaddr
)
3143 struct sk_buff
*skb
;
3150 buf
[3] = sizeof(bdaddr_t
);
3151 memcpy(buf
+ 4, bdaddr
, sizeof(bdaddr_t
));
3153 skb
= __hci_cmd_sync(hdev
, 0xfc0b, sizeof(buf
), buf
, HCI_INIT_TIMEOUT
);
3156 bt_dev_err(hdev
, "Change address command failed (%ld)", ret
);
3164 #define QCA_DFU_PACKET_LEN 4096
3166 #define QCA_GET_TARGET_VERSION 0x09
3167 #define QCA_CHECK_STATUS 0x05
3168 #define QCA_DFU_DOWNLOAD 0x01
3170 #define QCA_SYSCFG_UPDATED 0x40
3171 #define QCA_PATCH_UPDATED 0x80
3172 #define QCA_DFU_TIMEOUT 3000
3174 struct qca_version
{
3176 __le32 patch_version
;
3182 struct qca_rampatch_version
{
3184 __le16 patch_version
;
3187 struct qca_device_info
{
3189 u8 rampatch_hdr
; /* length of header in rampatch */
3190 u8 nvm_hdr
; /* length of header in NVM */
3191 u8 ver_offset
; /* offset of version structure in rampatch */
3194 static const struct qca_device_info qca_devices_table
[] = {
3195 { 0x00000100, 20, 4, 10 }, /* Rome 1.0 */
3196 { 0x00000101, 20, 4, 10 }, /* Rome 1.1 */
3197 { 0x00000200, 28, 4, 18 }, /* Rome 2.0 */
3198 { 0x00000201, 28, 4, 18 }, /* Rome 2.1 */
3199 { 0x00000300, 28, 4, 18 }, /* Rome 3.0 */
3200 { 0x00000302, 28, 4, 18 }, /* Rome 3.2 */
3203 static int btusb_qca_send_vendor_req(struct usb_device
*udev
, u8 request
,
3204 void *data
, u16 size
)
3209 buf
= kmalloc(size
, GFP_KERNEL
);
3213 /* Found some of USB hosts have IOT issues with ours so that we should
3214 * not wait until HCI layer is ready.
3216 pipe
= usb_rcvctrlpipe(udev
, 0);
3217 err
= usb_control_msg(udev
, pipe
, request
, USB_TYPE_VENDOR
| USB_DIR_IN
,
3218 0, 0, buf
, size
, USB_CTRL_SET_TIMEOUT
);
3220 dev_err(&udev
->dev
, "Failed to access otp area (%d)", err
);
3224 memcpy(data
, buf
, size
);
3232 static int btusb_setup_qca_download_fw(struct hci_dev
*hdev
,
3233 const struct firmware
*firmware
,
3236 struct btusb_data
*btdata
= hci_get_drvdata(hdev
);
3237 struct usb_device
*udev
= btdata
->udev
;
3238 size_t count
, size
, sent
= 0;
3242 buf
= kmalloc(QCA_DFU_PACKET_LEN
, GFP_KERNEL
);
3246 count
= firmware
->size
;
3248 size
= min_t(size_t, count
, hdr_size
);
3249 memcpy(buf
, firmware
->data
, size
);
3251 /* USB patches should go down to controller through USB path
3252 * because binary format fits to go down through USB channel.
3253 * USB control path is for patching headers and USB bulk is for
3256 pipe
= usb_sndctrlpipe(udev
, 0);
3257 err
= usb_control_msg(udev
, pipe
, QCA_DFU_DOWNLOAD
, USB_TYPE_VENDOR
,
3258 0, 0, buf
, size
, USB_CTRL_SET_TIMEOUT
);
3260 bt_dev_err(hdev
, "Failed to send headers (%d)", err
);
3268 size
= min_t(size_t, count
, QCA_DFU_PACKET_LEN
);
3270 memcpy(buf
, firmware
->data
+ sent
, size
);
3272 pipe
= usb_sndbulkpipe(udev
, 0x02);
3273 err
= usb_bulk_msg(udev
, pipe
, buf
, size
, &len
,
3276 bt_dev_err(hdev
, "Failed to send body at %zd of %zd (%d)",
3277 sent
, firmware
->size
, err
);
3282 bt_dev_err(hdev
, "Failed to get bulk buffer");
3296 static int btusb_setup_qca_load_rampatch(struct hci_dev
*hdev
,
3297 struct qca_version
*ver
,
3298 const struct qca_device_info
*info
)
3300 struct qca_rampatch_version
*rver
;
3301 const struct firmware
*fw
;
3302 u32 ver_rom
, ver_patch
;
3303 u16 rver_rom
, rver_patch
;
3307 ver_rom
= le32_to_cpu(ver
->rom_version
);
3308 ver_patch
= le32_to_cpu(ver
->patch_version
);
3310 snprintf(fwname
, sizeof(fwname
), "qca/rampatch_usb_%08x.bin", ver_rom
);
3312 err
= request_firmware(&fw
, fwname
, &hdev
->dev
);
3314 bt_dev_err(hdev
, "failed to request rampatch file: %s (%d)",
3319 bt_dev_info(hdev
, "using rampatch file: %s", fwname
);
3321 rver
= (struct qca_rampatch_version
*)(fw
->data
+ info
->ver_offset
);
3322 rver_rom
= le16_to_cpu(rver
->rom_version
);
3323 rver_patch
= le16_to_cpu(rver
->patch_version
);
3325 bt_dev_info(hdev
, "QCA: patch rome 0x%x build 0x%x, "
3326 "firmware rome 0x%x build 0x%x",
3327 rver_rom
, rver_patch
, ver_rom
, ver_patch
);
3329 if (rver_rom
!= ver_rom
|| rver_patch
<= ver_patch
) {
3330 bt_dev_err(hdev
, "rampatch file version did not match with firmware");
3335 err
= btusb_setup_qca_download_fw(hdev
, fw
, info
->rampatch_hdr
);
3338 release_firmware(fw
);
3343 static int btusb_setup_qca_load_nvm(struct hci_dev
*hdev
,
3344 struct qca_version
*ver
,
3345 const struct qca_device_info
*info
)
3347 const struct firmware
*fw
;
3351 snprintf(fwname
, sizeof(fwname
), "qca/nvm_usb_%08x.bin",
3352 le32_to_cpu(ver
->rom_version
));
3354 err
= request_firmware(&fw
, fwname
, &hdev
->dev
);
3356 bt_dev_err(hdev
, "failed to request NVM file: %s (%d)",
3361 bt_dev_info(hdev
, "using NVM file: %s", fwname
);
3363 err
= btusb_setup_qca_download_fw(hdev
, fw
, info
->nvm_hdr
);
3365 release_firmware(fw
);
3370 /* identify the ROM version and check whether patches are needed */
3371 static bool btusb_qca_need_patch(struct usb_device
*udev
)
3373 struct qca_version ver
;
3375 if (btusb_qca_send_vendor_req(udev
, QCA_GET_TARGET_VERSION
, &ver
,
3378 /* only low ROM versions need patches */
3379 return !(le32_to_cpu(ver
.rom_version
) & ~0xffffU
);
3382 static int btusb_setup_qca(struct hci_dev
*hdev
)
3384 struct btusb_data
*btdata
= hci_get_drvdata(hdev
);
3385 struct usb_device
*udev
= btdata
->udev
;
3386 const struct qca_device_info
*info
= NULL
;
3387 struct qca_version ver
;
3392 err
= btusb_qca_send_vendor_req(udev
, QCA_GET_TARGET_VERSION
, &ver
,
3397 ver_rom
= le32_to_cpu(ver
.rom_version
);
3398 /* Don't care about high ROM versions */
3399 if (ver_rom
& ~0xffffU
)
3402 for (i
= 0; i
< ARRAY_SIZE(qca_devices_table
); i
++) {
3403 if (ver_rom
== qca_devices_table
[i
].rom_version
)
3404 info
= &qca_devices_table
[i
];
3407 bt_dev_err(hdev
, "don't support firmware rome 0x%x", ver_rom
);
3411 err
= btusb_qca_send_vendor_req(udev
, QCA_CHECK_STATUS
, &status
,
3416 if (!(status
& QCA_PATCH_UPDATED
)) {
3417 err
= btusb_setup_qca_load_rampatch(hdev
, &ver
, info
);
3422 if (!(status
& QCA_SYSCFG_UPDATED
)) {
3423 err
= btusb_setup_qca_load_nvm(hdev
, &ver
, info
);
3431 static inline int __set_diag_interface(struct hci_dev
*hdev
)
3433 struct btusb_data
*data
= hci_get_drvdata(hdev
);
3434 struct usb_interface
*intf
= data
->diag
;
3440 data
->diag_tx_ep
= NULL
;
3441 data
->diag_rx_ep
= NULL
;
3443 for (i
= 0; i
< intf
->cur_altsetting
->desc
.bNumEndpoints
; i
++) {
3444 struct usb_endpoint_descriptor
*ep_desc
;
3446 ep_desc
= &intf
->cur_altsetting
->endpoint
[i
].desc
;
3448 if (!data
->diag_tx_ep
&& usb_endpoint_is_bulk_out(ep_desc
)) {
3449 data
->diag_tx_ep
= ep_desc
;
3453 if (!data
->diag_rx_ep
&& usb_endpoint_is_bulk_in(ep_desc
)) {
3454 data
->diag_rx_ep
= ep_desc
;
3459 if (!data
->diag_tx_ep
|| !data
->diag_rx_ep
) {
3460 bt_dev_err(hdev
, "invalid diagnostic descriptors");
3467 static struct urb
*alloc_diag_urb(struct hci_dev
*hdev
, bool enable
)
3469 struct btusb_data
*data
= hci_get_drvdata(hdev
);
3470 struct sk_buff
*skb
;
3474 if (!data
->diag_tx_ep
)
3475 return ERR_PTR(-ENODEV
);
3477 urb
= usb_alloc_urb(0, GFP_KERNEL
);
3479 return ERR_PTR(-ENOMEM
);
3481 skb
= bt_skb_alloc(2, GFP_KERNEL
);
3484 return ERR_PTR(-ENOMEM
);
3487 skb_put_u8(skb
, 0xf0);
3488 skb_put_u8(skb
, enable
);
3490 pipe
= usb_sndbulkpipe(data
->udev
, data
->diag_tx_ep
->bEndpointAddress
);
3492 usb_fill_bulk_urb(urb
, data
->udev
, pipe
,
3493 skb
->data
, skb
->len
, btusb_tx_complete
, skb
);
3495 skb
->dev
= (void *)hdev
;
3500 static int btusb_bcm_set_diag(struct hci_dev
*hdev
, bool enable
)
3502 struct btusb_data
*data
= hci_get_drvdata(hdev
);
3508 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
3511 urb
= alloc_diag_urb(hdev
, enable
);
3513 return PTR_ERR(urb
);
3515 return submit_or_queue_tx_urb(hdev
, urb
);
3519 static irqreturn_t
btusb_oob_wake_handler(int irq
, void *priv
)
3521 struct btusb_data
*data
= priv
;
3523 pm_wakeup_event(&data
->udev
->dev
, 0);
3526 /* Disable only if not already disabled (keep it balanced) */
3527 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED
, &data
->flags
)) {
3528 disable_irq_nosync(irq
);
3529 disable_irq_wake(irq
);
3534 static const struct of_device_id btusb_match_table
[] = {
3535 { .compatible
= "usb1286,204e" },
3536 { .compatible
= "usbcf3,e300" }, /* QCA6174A */
3537 { .compatible
= "usb4ca,301a" }, /* QCA6174A (Lite-On) */
3540 MODULE_DEVICE_TABLE(of
, btusb_match_table
);
3542 /* Use an oob wakeup pin? */
3543 static int btusb_config_oob_wake(struct hci_dev
*hdev
)
3545 struct btusb_data
*data
= hci_get_drvdata(hdev
);
3546 struct device
*dev
= &data
->udev
->dev
;
3549 clear_bit(BTUSB_OOB_WAKE_ENABLED
, &data
->flags
);
3551 if (!of_match_device(btusb_match_table
, dev
))
3554 /* Move on if no IRQ specified */
3555 irq
= of_irq_get_byname(dev
->of_node
, "wakeup");
3557 bt_dev_dbg(hdev
, "%s: no OOB Wakeup IRQ in DT", __func__
);
3561 irq_set_status_flags(irq
, IRQ_NOAUTOEN
);
3562 ret
= devm_request_irq(&hdev
->dev
, irq
, btusb_oob_wake_handler
,
3563 0, "OOB Wake-on-BT", data
);
3565 bt_dev_err(hdev
, "%s: IRQ request failed", __func__
);
3569 ret
= device_init_wakeup(dev
, true);
3571 bt_dev_err(hdev
, "%s: failed to init_wakeup", __func__
);
3575 data
->oob_wake_irq
= irq
;
3576 bt_dev_info(hdev
, "OOB Wake-on-BT configured at IRQ %u", irq
);
3581 static void btusb_check_needs_reset_resume(struct usb_interface
*intf
)
3583 if (dmi_check_system(btusb_needs_reset_resume_table
))
3584 interface_to_usbdev(intf
)->quirks
|= USB_QUIRK_RESET_RESUME
;
3587 static int btusb_probe(struct usb_interface
*intf
,
3588 const struct usb_device_id
*id
)
3590 struct usb_endpoint_descriptor
*ep_desc
;
3591 struct gpio_desc
*reset_gpio
;
3592 struct btusb_data
*data
;
3593 struct hci_dev
*hdev
;
3594 unsigned ifnum_base
;
3597 BT_DBG("intf %p id %p", intf
, id
);
3599 /* interface numbers are hardcoded in the spec */
3600 if (intf
->cur_altsetting
->desc
.bInterfaceNumber
!= 0) {
3601 if (!(id
->driver_info
& BTUSB_IFNUM_2
))
3603 if (intf
->cur_altsetting
->desc
.bInterfaceNumber
!= 2)
3607 ifnum_base
= intf
->cur_altsetting
->desc
.bInterfaceNumber
;
3609 if (!id
->driver_info
) {
3610 const struct usb_device_id
*match
;
3612 match
= usb_match_id(intf
, blacklist_table
);
3617 if (id
->driver_info
== BTUSB_IGNORE
)
3620 if (id
->driver_info
& BTUSB_ATH3012
) {
3621 struct usb_device
*udev
= interface_to_usbdev(intf
);
3623 /* Old firmware would otherwise let ath3k driver load
3624 * patch and sysconfig files
3626 if (le16_to_cpu(udev
->descriptor
.bcdDevice
) <= 0x0001 &&
3627 !btusb_qca_need_patch(udev
))
3631 data
= devm_kzalloc(&intf
->dev
, sizeof(*data
), GFP_KERNEL
);
3635 for (i
= 0; i
< intf
->cur_altsetting
->desc
.bNumEndpoints
; i
++) {
3636 ep_desc
= &intf
->cur_altsetting
->endpoint
[i
].desc
;
3638 if (!data
->intr_ep
&& usb_endpoint_is_int_in(ep_desc
)) {
3639 data
->intr_ep
= ep_desc
;
3643 if (!data
->bulk_tx_ep
&& usb_endpoint_is_bulk_out(ep_desc
)) {
3644 data
->bulk_tx_ep
= ep_desc
;
3648 if (!data
->bulk_rx_ep
&& usb_endpoint_is_bulk_in(ep_desc
)) {
3649 data
->bulk_rx_ep
= ep_desc
;
3654 if (!data
->intr_ep
|| !data
->bulk_tx_ep
|| !data
->bulk_rx_ep
)
3657 if (id
->driver_info
& BTUSB_AMP
) {
3658 data
->cmdreq_type
= USB_TYPE_CLASS
| 0x01;
3659 data
->cmdreq
= 0x2b;
3661 data
->cmdreq_type
= USB_TYPE_CLASS
;
3662 data
->cmdreq
= 0x00;
3665 data
->udev
= interface_to_usbdev(intf
);
3668 INIT_WORK(&data
->work
, btusb_work
);
3669 INIT_WORK(&data
->waker
, btusb_waker
);
3670 init_usb_anchor(&data
->deferred
);
3671 init_usb_anchor(&data
->tx_anchor
);
3672 spin_lock_init(&data
->txlock
);
3674 init_usb_anchor(&data
->intr_anchor
);
3675 init_usb_anchor(&data
->bulk_anchor
);
3676 init_usb_anchor(&data
->isoc_anchor
);
3677 init_usb_anchor(&data
->diag_anchor
);
3678 init_usb_anchor(&data
->ctrl_anchor
);
3679 spin_lock_init(&data
->rxlock
);
3681 if (id
->driver_info
& BTUSB_INTEL_NEW
) {
3682 data
->recv_event
= btusb_recv_event_intel
;
3683 data
->recv_bulk
= btusb_recv_bulk_intel
;
3684 set_bit(BTUSB_BOOTLOADER
, &data
->flags
);
3686 data
->recv_event
= hci_recv_frame
;
3687 data
->recv_bulk
= btusb_recv_bulk
;
3690 hdev
= hci_alloc_dev();
3694 hdev
->bus
= HCI_USB
;
3695 hci_set_drvdata(hdev
, data
);
3697 if (id
->driver_info
& BTUSB_AMP
)
3698 hdev
->dev_type
= HCI_AMP
;
3700 hdev
->dev_type
= HCI_PRIMARY
;
3704 SET_HCIDEV_DEV(hdev
, &intf
->dev
);
3706 reset_gpio
= gpiod_get_optional(&data
->udev
->dev
, "reset",
3708 if (IS_ERR(reset_gpio
)) {
3709 err
= PTR_ERR(reset_gpio
);
3711 } else if (reset_gpio
) {
3712 data
->reset_gpio
= reset_gpio
;
3715 hdev
->open
= btusb_open
;
3716 hdev
->close
= btusb_close
;
3717 hdev
->flush
= btusb_flush
;
3718 hdev
->send
= btusb_send_frame
;
3719 hdev
->notify
= btusb_notify
;
3722 err
= btusb_config_oob_wake(hdev
);
3726 /* Marvell devices may need a specific chip configuration */
3727 if (id
->driver_info
& BTUSB_MARVELL
&& data
->oob_wake_irq
) {
3728 err
= marvell_config_oob_wake(hdev
);
3733 if (id
->driver_info
& BTUSB_CW6622
)
3734 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY
, &hdev
->quirks
);
3736 if (id
->driver_info
& BTUSB_BCM2045
)
3737 set_bit(HCI_QUIRK_BROKEN_STORED_LINK_KEY
, &hdev
->quirks
);
3739 if (id
->driver_info
& BTUSB_BCM92035
)
3740 hdev
->setup
= btusb_setup_bcm92035
;
3742 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM
) &&
3743 (id
->driver_info
& BTUSB_BCM_PATCHRAM
)) {
3744 hdev
->manufacturer
= 15;
3745 hdev
->setup
= btbcm_setup_patchram
;
3746 hdev
->set_diag
= btusb_bcm_set_diag
;
3747 hdev
->set_bdaddr
= btbcm_set_bdaddr
;
3749 /* Broadcom LM_DIAG Interface numbers are hardcoded */
3750 data
->diag
= usb_ifnum_to_if(data
->udev
, ifnum_base
+ 2);
3753 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM
) &&
3754 (id
->driver_info
& BTUSB_BCM_APPLE
)) {
3755 hdev
->manufacturer
= 15;
3756 hdev
->setup
= btbcm_setup_apple
;
3757 hdev
->set_diag
= btusb_bcm_set_diag
;
3759 /* Broadcom LM_DIAG Interface numbers are hardcoded */
3760 data
->diag
= usb_ifnum_to_if(data
->udev
, ifnum_base
+ 2);
3763 if (id
->driver_info
& BTUSB_INTEL
) {
3764 hdev
->manufacturer
= 2;
3765 hdev
->setup
= btusb_setup_intel
;
3766 hdev
->shutdown
= btusb_shutdown_intel
;
3767 hdev
->set_diag
= btintel_set_diag_mfg
;
3768 hdev
->set_bdaddr
= btintel_set_bdaddr
;
3769 hdev
->cmd_timeout
= btusb_intel_cmd_timeout
;
3770 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER
, &hdev
->quirks
);
3771 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY
, &hdev
->quirks
);
3772 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG
, &hdev
->quirks
);
3775 if (id
->driver_info
& BTUSB_INTEL_NEW
) {
3776 hdev
->manufacturer
= 2;
3777 hdev
->send
= btusb_send_frame_intel
;
3778 hdev
->setup
= btusb_setup_intel_new
;
3779 hdev
->shutdown
= btusb_shutdown_intel_new
;
3780 hdev
->hw_error
= btintel_hw_error
;
3781 hdev
->set_diag
= btintel_set_diag
;
3782 hdev
->set_bdaddr
= btintel_set_bdaddr
;
3783 hdev
->cmd_timeout
= btusb_intel_cmd_timeout
;
3784 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER
, &hdev
->quirks
);
3785 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY
, &hdev
->quirks
);
3786 set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG
, &hdev
->quirks
);
3789 if (id
->driver_info
& BTUSB_MARVELL
)
3790 hdev
->set_bdaddr
= btusb_set_bdaddr_marvell
;
3792 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_MTK
) &&
3793 (id
->driver_info
& BTUSB_MEDIATEK
)) {
3794 hdev
->setup
= btusb_mtk_setup
;
3795 hdev
->shutdown
= btusb_mtk_shutdown
;
3796 hdev
->manufacturer
= 70;
3797 set_bit(HCI_QUIRK_NON_PERSISTENT_SETUP
, &hdev
->quirks
);
3800 if (id
->driver_info
& BTUSB_SWAVE
) {
3801 set_bit(HCI_QUIRK_FIXUP_INQUIRY_MODE
, &hdev
->quirks
);
3802 set_bit(HCI_QUIRK_BROKEN_LOCAL_COMMANDS
, &hdev
->quirks
);
3805 if (id
->driver_info
& BTUSB_INTEL_BOOT
) {
3806 hdev
->manufacturer
= 2;
3807 set_bit(HCI_QUIRK_RAW_DEVICE
, &hdev
->quirks
);
3810 if (id
->driver_info
& BTUSB_ATH3012
) {
3811 data
->setup_on_usb
= btusb_setup_qca
;
3812 hdev
->set_bdaddr
= btusb_set_bdaddr_ath3012
;
3813 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY
, &hdev
->quirks
);
3814 set_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER
, &hdev
->quirks
);
3817 if (id
->driver_info
& BTUSB_QCA_ROME
) {
3818 data
->setup_on_usb
= btusb_setup_qca
;
3819 hdev
->set_bdaddr
= btusb_set_bdaddr_ath3012
;
3820 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY
, &hdev
->quirks
);
3821 btusb_check_needs_reset_resume(intf
);
3824 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_RTL
) &&
3825 (id
->driver_info
& BTUSB_REALTEK
)) {
3826 hdev
->setup
= btrtl_setup_realtek
;
3827 hdev
->shutdown
= btrtl_shutdown_realtek
;
3828 hdev
->cmd_timeout
= btusb_rtl_cmd_timeout
;
3830 /* Realtek devices lose their updated firmware over global
3831 * suspend that means host doesn't send SET_FEATURE
3832 * (DEVICE_REMOTE_WAKEUP)
3834 set_bit(BTUSB_WAKEUP_DISABLE
, &data
->flags
);
3837 if (id
->driver_info
& BTUSB_AMP
) {
3838 /* AMP controllers do not support SCO packets */
3841 /* Interface orders are hardcoded in the specification */
3842 data
->isoc
= usb_ifnum_to_if(data
->udev
, ifnum_base
+ 1);
3843 data
->isoc_ifnum
= ifnum_base
+ 1;
3847 set_bit(HCI_QUIRK_RESET_ON_CLOSE
, &hdev
->quirks
);
3849 if (force_scofix
|| id
->driver_info
& BTUSB_WRONG_SCO_MTU
) {
3850 if (!disable_scofix
)
3851 set_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE
, &hdev
->quirks
);
3854 if (id
->driver_info
& BTUSB_BROKEN_ISOC
)
3857 if (id
->driver_info
& BTUSB_DIGIANSWER
) {
3858 data
->cmdreq_type
= USB_TYPE_VENDOR
;
3859 set_bit(HCI_QUIRK_RESET_ON_CLOSE
, &hdev
->quirks
);
3862 if (id
->driver_info
& BTUSB_CSR
) {
3863 struct usb_device
*udev
= data
->udev
;
3864 u16 bcdDevice
= le16_to_cpu(udev
->descriptor
.bcdDevice
);
3866 /* Old firmware would otherwise execute USB reset */
3867 if (bcdDevice
< 0x117)
3868 set_bit(HCI_QUIRK_RESET_ON_CLOSE
, &hdev
->quirks
);
3870 /* Fake CSR devices with broken commands */
3871 if (bcdDevice
<= 0x100 || bcdDevice
== 0x134)
3872 hdev
->setup
= btusb_setup_csr
;
3874 set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY
, &hdev
->quirks
);
3877 if (id
->driver_info
& BTUSB_SNIFFER
) {
3878 struct usb_device
*udev
= data
->udev
;
3880 /* New sniffer firmware has crippled HCI interface */
3881 if (le16_to_cpu(udev
->descriptor
.bcdDevice
) > 0x997)
3882 set_bit(HCI_QUIRK_RAW_DEVICE
, &hdev
->quirks
);
3885 if (id
->driver_info
& BTUSB_INTEL_BOOT
) {
3886 /* A bug in the bootloader causes that interrupt interface is
3887 * only enabled after receiving SetInterface(0, AltSetting=0).
3889 err
= usb_set_interface(data
->udev
, 0, 0);
3891 BT_ERR("failed to set interface 0, alt 0 %d", err
);
3897 err
= usb_driver_claim_interface(&btusb_driver
,
3903 if (IS_ENABLED(CONFIG_BT_HCIBTUSB_BCM
) && data
->diag
) {
3904 if (!usb_driver_claim_interface(&btusb_driver
,
3906 __set_diag_interface(hdev
);
3911 if (enable_autosuspend
)
3912 usb_enable_autosuspend(data
->udev
);
3914 err
= hci_register_dev(hdev
);
3918 usb_set_intfdata(intf
, data
);
3923 if (data
->reset_gpio
)
3924 gpiod_put(data
->reset_gpio
);
3929 static void btusb_disconnect(struct usb_interface
*intf
)
3931 struct btusb_data
*data
= usb_get_intfdata(intf
);
3932 struct hci_dev
*hdev
;
3934 BT_DBG("intf %p", intf
);
3940 usb_set_intfdata(data
->intf
, NULL
);
3943 usb_set_intfdata(data
->isoc
, NULL
);
3946 usb_set_intfdata(data
->diag
, NULL
);
3948 hci_unregister_dev(hdev
);
3950 if (intf
== data
->intf
) {
3952 usb_driver_release_interface(&btusb_driver
, data
->isoc
);
3954 usb_driver_release_interface(&btusb_driver
, data
->diag
);
3955 } else if (intf
== data
->isoc
) {
3957 usb_driver_release_interface(&btusb_driver
, data
->diag
);
3958 usb_driver_release_interface(&btusb_driver
, data
->intf
);
3959 } else if (intf
== data
->diag
) {
3960 usb_driver_release_interface(&btusb_driver
, data
->intf
);
3962 usb_driver_release_interface(&btusb_driver
, data
->isoc
);
3965 if (data
->oob_wake_irq
)
3966 device_init_wakeup(&data
->udev
->dev
, false);
3968 if (data
->reset_gpio
)
3969 gpiod_put(data
->reset_gpio
);
3975 static int btusb_suspend(struct usb_interface
*intf
, pm_message_t message
)
3977 struct btusb_data
*data
= usb_get_intfdata(intf
);
3979 BT_DBG("intf %p", intf
);
3981 if (data
->suspend_count
++)
3984 spin_lock_irq(&data
->txlock
);
3985 if (!(PMSG_IS_AUTO(message
) && data
->tx_in_flight
)) {
3986 set_bit(BTUSB_SUSPENDING
, &data
->flags
);
3987 spin_unlock_irq(&data
->txlock
);
3989 spin_unlock_irq(&data
->txlock
);
3990 data
->suspend_count
--;
3994 cancel_work_sync(&data
->work
);
3996 btusb_stop_traffic(data
);
3997 usb_kill_anchored_urbs(&data
->tx_anchor
);
3999 if (data
->oob_wake_irq
&& device_may_wakeup(&data
->udev
->dev
)) {
4000 set_bit(BTUSB_OOB_WAKE_ENABLED
, &data
->flags
);
4001 enable_irq_wake(data
->oob_wake_irq
);
4002 enable_irq(data
->oob_wake_irq
);
4005 /* For global suspend, Realtek devices lose the loaded fw
4006 * in them. But for autosuspend, firmware should remain.
4007 * Actually, it depends on whether the usb host sends
4008 * set feature (enable wakeup) or not.
4010 if (test_bit(BTUSB_WAKEUP_DISABLE
, &data
->flags
)) {
4011 if (PMSG_IS_AUTO(message
) &&
4012 device_can_wakeup(&data
->udev
->dev
))
4013 data
->udev
->do_remote_wakeup
= 1;
4014 else if (!PMSG_IS_AUTO(message
))
4015 data
->udev
->reset_resume
= 1;
4021 static void play_deferred(struct btusb_data
*data
)
4026 while ((urb
= usb_get_from_anchor(&data
->deferred
))) {
4027 usb_anchor_urb(urb
, &data
->tx_anchor
);
4029 err
= usb_submit_urb(urb
, GFP_ATOMIC
);
4031 if (err
!= -EPERM
&& err
!= -ENODEV
)
4032 BT_ERR("%s urb %p submission failed (%d)",
4033 data
->hdev
->name
, urb
, -err
);
4034 kfree(urb
->setup_packet
);
4035 usb_unanchor_urb(urb
);
4040 data
->tx_in_flight
++;
4044 /* Cleanup the rest deferred urbs. */
4045 while ((urb
= usb_get_from_anchor(&data
->deferred
))) {
4046 kfree(urb
->setup_packet
);
4051 static int btusb_resume(struct usb_interface
*intf
)
4053 struct btusb_data
*data
= usb_get_intfdata(intf
);
4054 struct hci_dev
*hdev
= data
->hdev
;
4057 BT_DBG("intf %p", intf
);
4059 if (--data
->suspend_count
)
4062 /* Disable only if not already disabled (keep it balanced) */
4063 if (test_and_clear_bit(BTUSB_OOB_WAKE_ENABLED
, &data
->flags
)) {
4064 disable_irq(data
->oob_wake_irq
);
4065 disable_irq_wake(data
->oob_wake_irq
);
4068 if (!test_bit(HCI_RUNNING
, &hdev
->flags
))
4071 if (test_bit(BTUSB_INTR_RUNNING
, &data
->flags
)) {
4072 err
= btusb_submit_intr_urb(hdev
, GFP_NOIO
);
4074 clear_bit(BTUSB_INTR_RUNNING
, &data
->flags
);
4079 if (test_bit(BTUSB_BULK_RUNNING
, &data
->flags
)) {
4080 err
= btusb_submit_bulk_urb(hdev
, GFP_NOIO
);
4082 clear_bit(BTUSB_BULK_RUNNING
, &data
->flags
);
4086 btusb_submit_bulk_urb(hdev
, GFP_NOIO
);
4089 if (test_bit(BTUSB_ISOC_RUNNING
, &data
->flags
)) {
4090 if (btusb_submit_isoc_urb(hdev
, GFP_NOIO
) < 0)
4091 clear_bit(BTUSB_ISOC_RUNNING
, &data
->flags
);
4093 btusb_submit_isoc_urb(hdev
, GFP_NOIO
);
4096 spin_lock_irq(&data
->txlock
);
4097 play_deferred(data
);
4098 clear_bit(BTUSB_SUSPENDING
, &data
->flags
);
4099 spin_unlock_irq(&data
->txlock
);
4100 schedule_work(&data
->work
);
4105 usb_scuttle_anchored_urbs(&data
->deferred
);
4107 spin_lock_irq(&data
->txlock
);
4108 clear_bit(BTUSB_SUSPENDING
, &data
->flags
);
4109 spin_unlock_irq(&data
->txlock
);
4115 static struct usb_driver btusb_driver
= {
4117 .probe
= btusb_probe
,
4118 .disconnect
= btusb_disconnect
,
4120 .suspend
= btusb_suspend
,
4121 .resume
= btusb_resume
,
4123 .id_table
= btusb_table
,
4124 .supports_autosuspend
= 1,
4125 .disable_hub_initiated_lpm
= 1,
4128 module_usb_driver(btusb_driver
);
4130 module_param(disable_scofix
, bool, 0644);
4131 MODULE_PARM_DESC(disable_scofix
, "Disable fixup of wrong SCO buffer size");
4133 module_param(force_scofix
, bool, 0644);
4134 MODULE_PARM_DESC(force_scofix
, "Force fixup of wrong SCO buffers size");
4136 module_param(enable_autosuspend
, bool, 0644);
4137 MODULE_PARM_DESC(enable_autosuspend
, "Enable USB autosuspend by default");
4139 module_param(reset
, bool, 0644);
4140 MODULE_PARM_DESC(reset
, "Send HCI reset command on initialization");
4142 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
4143 MODULE_DESCRIPTION("Generic Bluetooth USB driver ver " VERSION
);
4144 MODULE_VERSION(VERSION
);
4145 MODULE_LICENSE("GPL");