2019-05-27 06:55:06 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2015-05-14 08:49:09 +00:00
|
|
|
/*
|
|
|
|
* Bluetooth support for Realtek devices
|
|
|
|
*
|
|
|
|
* Copyright (C) 2015 Endless Mobile, Inc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/firmware.h>
|
|
|
|
#include <asm/unaligned.h>
|
|
|
|
#include <linux/usb.h>
|
|
|
|
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
|
|
#include <net/bluetooth/hci_core.h>
|
|
|
|
|
|
|
|
#include "btrtl.h"
|
|
|
|
|
|
|
|
#define VERSION "0.1"
|
|
|
|
|
|
|
|
#define RTL_EPATCH_SIGNATURE "Realtech"
|
|
|
|
#define RTL_ROM_LMP_8723A 0x1200
|
|
|
|
#define RTL_ROM_LMP_8723B 0x8723
|
|
|
|
#define RTL_ROM_LMP_8821A 0x8821
|
|
|
|
#define RTL_ROM_LMP_8761A 0x8761
|
2016-09-09 15:02:05 +00:00
|
|
|
#define RTL_ROM_LMP_8822B 0x8822
|
2020-11-10 03:38:37 +00:00
|
|
|
#define RTL_ROM_LMP_8852A 0x8852
|
2018-08-02 14:57:15 +00:00
|
|
|
#define RTL_CONFIG_MAGIC 0x8723ab55
|
2015-05-14 08:49:09 +00:00
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
#define IC_MATCH_FL_LMPSUBV (1 << 0)
|
|
|
|
#define IC_MATCH_FL_HCIREV (1 << 1)
|
2018-08-02 14:57:16 +00:00
|
|
|
#define IC_MATCH_FL_HCIVER (1 << 2)
|
|
|
|
#define IC_MATCH_FL_HCIBUS (1 << 3)
|
2020-11-04 12:04:14 +00:00
|
|
|
#define IC_INFO(lmps, hcir, hciv, bus) \
|
|
|
|
.match_flags = IC_MATCH_FL_LMPSUBV | IC_MATCH_FL_HCIREV | \
|
|
|
|
IC_MATCH_FL_HCIVER | IC_MATCH_FL_HCIBUS, \
|
2018-02-11 18:24:33 +00:00
|
|
|
.lmp_subver = (lmps), \
|
2020-11-04 12:04:14 +00:00
|
|
|
.hci_rev = (hcir), \
|
|
|
|
.hci_ver = (hciv), \
|
|
|
|
.hci_bus = (bus)
|
2018-02-11 18:24:33 +00:00
|
|
|
|
2021-01-27 03:01:52 +00:00
|
|
|
enum btrtl_chip_id {
|
|
|
|
CHIP_ID_8723A,
|
|
|
|
CHIP_ID_8723B,
|
|
|
|
CHIP_ID_8821A,
|
|
|
|
CHIP_ID_8761A,
|
|
|
|
CHIP_ID_8822B = 8,
|
|
|
|
CHIP_ID_8723D,
|
|
|
|
CHIP_ID_8821C,
|
|
|
|
CHIP_ID_8822C = 13,
|
|
|
|
CHIP_ID_8761B,
|
|
|
|
CHIP_ID_8852A = 18,
|
2022-03-14 06:54:22 +00:00
|
|
|
CHIP_ID_8852B = 20,
|
2021-01-27 03:01:52 +00:00
|
|
|
};
|
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
struct id_table {
|
|
|
|
__u16 match_flags;
|
|
|
|
__u16 lmp_subver;
|
|
|
|
__u16 hci_rev;
|
2018-08-02 14:57:16 +00:00
|
|
|
__u8 hci_ver;
|
|
|
|
__u8 hci_bus;
|
2018-02-11 18:24:33 +00:00
|
|
|
bool config_needed;
|
2018-08-02 14:57:13 +00:00
|
|
|
bool has_rom_version;
|
2021-09-28 18:10:50 +00:00
|
|
|
bool has_msft_ext;
|
2018-02-11 18:24:33 +00:00
|
|
|
char *fw_name;
|
|
|
|
char *cfg_name;
|
|
|
|
};
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
struct btrtl_device_info {
|
|
|
|
const struct id_table *ic_info;
|
|
|
|
u8 rom_version;
|
|
|
|
u8 *fw_data;
|
|
|
|
int fw_len;
|
|
|
|
u8 *cfg_data;
|
|
|
|
int cfg_len;
|
2020-10-26 08:28:38 +00:00
|
|
|
bool drop_fw;
|
2021-01-27 03:01:52 +00:00
|
|
|
int project_id;
|
2018-08-02 14:57:13 +00:00
|
|
|
};
|
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
static const struct id_table ic_id_table[] = {
|
2020-11-04 12:04:14 +00:00
|
|
|
/* 8723A */
|
|
|
|
{ IC_INFO(RTL_ROM_LMP_8723A, 0xb, 0x6, HCI_USB),
|
2018-08-02 14:57:13 +00:00
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = false,
|
|
|
|
.fw_name = "rtl_bt/rtl8723a_fw.bin",
|
|
|
|
.cfg_name = NULL },
|
|
|
|
|
2018-08-02 14:57:16 +00:00
|
|
|
/* 8723BS */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8723B, 0xb, 0x6, HCI_UART),
|
2018-08-02 14:57:16 +00:00
|
|
|
.config_needed = true,
|
|
|
|
.has_rom_version = true,
|
|
|
|
.fw_name = "rtl_bt/rtl8723bs_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8723bs_config" },
|
2018-08-02 14:57:16 +00:00
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
/* 8723B */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8723B, 0xb, 0x6, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = false,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8723b_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8723b_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
|
|
|
|
/* 8723D */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8723B, 0xd, 0x8, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = true,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8723d_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8723d_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
|
2018-08-02 14:57:16 +00:00
|
|
|
/* 8723DS */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8723B, 0xd, 0x8, HCI_UART),
|
2018-08-02 14:57:16 +00:00
|
|
|
.config_needed = true,
|
|
|
|
.has_rom_version = true,
|
|
|
|
.fw_name = "rtl_bt/rtl8723ds_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8723ds_config" },
|
2018-08-02 14:57:16 +00:00
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
/* 8821A */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8821A, 0xa, 0x6, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = false,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8821a_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8821a_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
|
|
|
|
/* 8821C */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8821A, 0xc, 0x8, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = false,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2021-09-29 17:48:19 +00:00
|
|
|
.has_msft_ext = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8821c_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8821c_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
|
|
|
|
/* 8761A */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8761A, 0xa, 0x6, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = false,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8761a_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8761a_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
|
2020-04-11 01:34:27 +00:00
|
|
|
/* 8761B */
|
2021-05-28 15:26:44 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8761A, 0xb, 0xa, HCI_UART),
|
2020-04-11 01:34:27 +00:00
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = true,
|
2021-09-28 18:10:50 +00:00
|
|
|
.has_msft_ext = true,
|
2020-04-11 01:34:27 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8761b_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8761b_config" },
|
|
|
|
|
2021-05-28 15:26:44 +00:00
|
|
|
/* 8761BU */
|
|
|
|
{ IC_INFO(RTL_ROM_LMP_8761A, 0xb, 0xa, HCI_USB),
|
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = true,
|
|
|
|
.fw_name = "rtl_bt/rtl8761bu_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8761bu_config" },
|
|
|
|
|
2022-01-26 07:39:04 +00:00
|
|
|
/* 8822C with UART interface */
|
|
|
|
{ IC_INFO(RTL_ROM_LMP_8822B, 0xc, 0x8, HCI_UART),
|
|
|
|
.config_needed = true,
|
|
|
|
.has_rom_version = true,
|
|
|
|
.has_msft_ext = true,
|
|
|
|
.fw_name = "rtl_bt/rtl8822cs_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8822cs_config" },
|
|
|
|
|
2020-02-17 08:14:55 +00:00
|
|
|
/* 8822C with UART interface */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8822B, 0xc, 0xa, HCI_UART),
|
2020-02-17 08:14:55 +00:00
|
|
|
.config_needed = true,
|
|
|
|
.has_rom_version = true,
|
2021-09-28 18:10:50 +00:00
|
|
|
.has_msft_ext = true,
|
2020-02-17 08:14:55 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8822cs_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8822cs_config" },
|
|
|
|
|
2018-09-08 17:05:59 +00:00
|
|
|
/* 8822C with USB interface */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8822B, 0xc, 0xa, HCI_USB),
|
2018-09-08 17:05:59 +00:00
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = true,
|
2021-09-28 18:10:50 +00:00
|
|
|
.has_msft_ext = true,
|
2018-09-08 17:05:59 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8822cu_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8822cu_config" },
|
|
|
|
|
2018-02-11 18:24:33 +00:00
|
|
|
/* 8822B */
|
2020-11-04 12:04:14 +00:00
|
|
|
{ IC_INFO(RTL_ROM_LMP_8822B, 0xb, 0x7, HCI_USB),
|
2018-02-11 18:24:33 +00:00
|
|
|
.config_needed = true,
|
2018-08-02 14:57:13 +00:00
|
|
|
.has_rom_version = true,
|
2021-09-28 18:10:50 +00:00
|
|
|
.has_msft_ext = true,
|
2018-02-11 18:24:33 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8822b_fw.bin",
|
2018-08-02 14:57:17 +00:00
|
|
|
.cfg_name = "rtl_bt/rtl8822b_config" },
|
2020-11-10 03:38:37 +00:00
|
|
|
|
|
|
|
/* 8852A */
|
|
|
|
{ IC_INFO(RTL_ROM_LMP_8852A, 0xa, 0xb, HCI_USB),
|
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = true,
|
2021-09-28 18:10:50 +00:00
|
|
|
.has_msft_ext = true,
|
2020-11-10 03:38:37 +00:00
|
|
|
.fw_name = "rtl_bt/rtl8852au_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8852au_config" },
|
2022-03-14 06:54:22 +00:00
|
|
|
|
|
|
|
/* 8852B */
|
|
|
|
{ IC_INFO(RTL_ROM_LMP_8852A, 0xb, 0xb, HCI_USB),
|
|
|
|
.config_needed = false,
|
|
|
|
.has_rom_version = true,
|
|
|
|
.has_msft_ext = true,
|
|
|
|
.fw_name = "rtl_bt/rtl8852bu_fw.bin",
|
|
|
|
.cfg_name = "rtl_bt/rtl8852bu_config" },
|
2018-02-11 18:24:33 +00:00
|
|
|
};
|
|
|
|
|
2018-08-02 14:57:16 +00:00
|
|
|
static const struct id_table *btrtl_match_ic(u16 lmp_subver, u16 hci_rev,
|
|
|
|
u8 hci_ver, u8 hci_bus)
|
2018-08-02 14:57:13 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(ic_id_table); i++) {
|
|
|
|
if ((ic_id_table[i].match_flags & IC_MATCH_FL_LMPSUBV) &&
|
|
|
|
(ic_id_table[i].lmp_subver != lmp_subver))
|
|
|
|
continue;
|
|
|
|
if ((ic_id_table[i].match_flags & IC_MATCH_FL_HCIREV) &&
|
|
|
|
(ic_id_table[i].hci_rev != hci_rev))
|
|
|
|
continue;
|
2018-08-02 14:57:16 +00:00
|
|
|
if ((ic_id_table[i].match_flags & IC_MATCH_FL_HCIVER) &&
|
|
|
|
(ic_id_table[i].hci_ver != hci_ver))
|
|
|
|
continue;
|
|
|
|
if ((ic_id_table[i].match_flags & IC_MATCH_FL_HCIBUS) &&
|
|
|
|
(ic_id_table[i].hci_bus != hci_bus))
|
|
|
|
continue;
|
2018-08-02 14:57:13 +00:00
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i >= ARRAY_SIZE(ic_id_table))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return &ic_id_table[i];
|
|
|
|
}
|
|
|
|
|
2019-08-31 08:36:02 +00:00
|
|
|
static struct sk_buff *btrtl_read_local_version(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_READ_LOCAL_VERSION, 0, NULL,
|
|
|
|
HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
rtl_dev_err(hdev, "HCI_OP_READ_LOCAL_VERSION failed (%ld)",
|
|
|
|
PTR_ERR(skb));
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (skb->len != sizeof(struct hci_rp_read_local_version)) {
|
|
|
|
rtl_dev_err(hdev, "HCI_OP_READ_LOCAL_VERSION event length mismatch");
|
|
|
|
kfree_skb(skb);
|
|
|
|
return ERR_PTR(-EIO);
|
|
|
|
}
|
|
|
|
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2015-05-14 08:49:09 +00:00
|
|
|
static int rtl_read_rom_version(struct hci_dev *hdev, u8 *version)
|
|
|
|
{
|
|
|
|
struct rtl_rom_version_evt *rom_version;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
/* Read RTL ROM version command */
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc6d, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "Read ROM version failed (%ld)",
|
2018-08-02 14:57:14 +00:00
|
|
|
PTR_ERR(skb));
|
2015-05-14 08:49:09 +00:00
|
|
|
return PTR_ERR(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (skb->len != sizeof(*rom_version)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "version event length mismatch");
|
2015-05-14 08:49:09 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
rom_version = (struct rtl_rom_version_evt *)skb->data;
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "rom_version status=%x version=%x",
|
2018-08-02 14:57:14 +00:00
|
|
|
rom_version->status, rom_version->version);
|
2015-05-14 08:49:09 +00:00
|
|
|
|
|
|
|
*version = rom_version->version;
|
|
|
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
static int rtlbt_parse_firmware(struct hci_dev *hdev,
|
|
|
|
struct btrtl_device_info *btrtl_dev,
|
2018-02-11 18:24:33 +00:00
|
|
|
unsigned char **_buf)
|
2015-05-14 08:49:09 +00:00
|
|
|
{
|
2018-09-26 08:32:08 +00:00
|
|
|
static const u8 extension_sig[] = { 0x51, 0x04, 0xfd, 0x77 };
|
2015-05-14 08:49:09 +00:00
|
|
|
struct rtl_epatch_header *epatch_info;
|
|
|
|
unsigned char *buf;
|
2018-08-02 14:57:13 +00:00
|
|
|
int i, len;
|
2015-05-14 08:49:09 +00:00
|
|
|
size_t min_size;
|
2018-08-02 14:57:13 +00:00
|
|
|
u8 opcode, length, data;
|
2015-05-14 08:49:09 +00:00
|
|
|
int project_id = -1;
|
|
|
|
const unsigned char *fwptr, *chip_id_base;
|
|
|
|
const unsigned char *patch_length_base, *patch_offset_base;
|
|
|
|
u32 patch_offset = 0;
|
|
|
|
u16 patch_length, num_patches;
|
2016-09-09 15:02:05 +00:00
|
|
|
static const struct {
|
|
|
|
__u16 lmp_subver;
|
|
|
|
__u8 id;
|
|
|
|
} project_id_to_lmp_subver[] = {
|
|
|
|
{ RTL_ROM_LMP_8723A, 0 },
|
|
|
|
{ RTL_ROM_LMP_8723B, 1 },
|
|
|
|
{ RTL_ROM_LMP_8821A, 2 },
|
|
|
|
{ RTL_ROM_LMP_8761A, 3 },
|
|
|
|
{ RTL_ROM_LMP_8822B, 8 },
|
2018-02-11 18:24:33 +00:00
|
|
|
{ RTL_ROM_LMP_8723B, 9 }, /* 8723D */
|
|
|
|
{ RTL_ROM_LMP_8821A, 10 }, /* 8821C */
|
2018-09-08 17:05:59 +00:00
|
|
|
{ RTL_ROM_LMP_8822B, 13 }, /* 8822C */
|
2020-04-11 01:34:27 +00:00
|
|
|
{ RTL_ROM_LMP_8761A, 14 }, /* 8761B */
|
2020-11-10 03:38:37 +00:00
|
|
|
{ RTL_ROM_LMP_8852A, 18 }, /* 8852A */
|
2022-03-14 06:54:22 +00:00
|
|
|
{ RTL_ROM_LMP_8852A, 20 }, /* 8852B */
|
2015-05-14 08:49:09 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
min_size = sizeof(struct rtl_epatch_header) + sizeof(extension_sig) + 3;
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->fw_len < min_size)
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
fwptr = btrtl_dev->fw_data + btrtl_dev->fw_len - sizeof(extension_sig);
|
2015-05-14 08:49:09 +00:00
|
|
|
if (memcmp(fwptr, extension_sig, sizeof(extension_sig)) != 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "extension section signature mismatch");
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Loop from the end of the firmware parsing instructions, until
|
|
|
|
* we find an instruction that identifies the "project ID" for the
|
|
|
|
* hardware supported by this firwmare file.
|
|
|
|
* Once we have that, we double-check that that project_id is suitable
|
|
|
|
* for the hardware we are working with.
|
|
|
|
*/
|
2018-08-02 14:57:13 +00:00
|
|
|
while (fwptr >= btrtl_dev->fw_data + (sizeof(*epatch_info) + 3)) {
|
2015-05-14 08:49:09 +00:00
|
|
|
opcode = *--fwptr;
|
|
|
|
length = *--fwptr;
|
|
|
|
data = *--fwptr;
|
|
|
|
|
|
|
|
BT_DBG("check op=%x len=%x data=%x", opcode, length, data);
|
|
|
|
|
|
|
|
if (opcode == 0xff) /* EOF */
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (length == 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "found instruction with length 0");
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (opcode == 0 && length == 1) {
|
|
|
|
project_id = data;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
fwptr -= length;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (project_id < 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "failed to find version instruction");
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2016-09-09 15:02:05 +00:00
|
|
|
/* Find project_id in table */
|
|
|
|
for (i = 0; i < ARRAY_SIZE(project_id_to_lmp_subver); i++) {
|
2021-01-27 03:01:52 +00:00
|
|
|
if (project_id == project_id_to_lmp_subver[i].id) {
|
|
|
|
btrtl_dev->project_id = project_id;
|
2016-09-09 15:02:05 +00:00
|
|
|
break;
|
2021-01-27 03:01:52 +00:00
|
|
|
}
|
2016-09-09 15:02:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (i >= ARRAY_SIZE(project_id_to_lmp_subver)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "unknown project id %d", project_id);
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->ic_info->lmp_subver !=
|
|
|
|
project_id_to_lmp_subver[i].lmp_subver) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "firmware is for %x but this is a %x",
|
2018-08-02 14:57:14 +00:00
|
|
|
project_id_to_lmp_subver[i].lmp_subver,
|
|
|
|
btrtl_dev->ic_info->lmp_subver);
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
epatch_info = (struct rtl_epatch_header *)btrtl_dev->fw_data;
|
2015-05-14 08:49:09 +00:00
|
|
|
if (memcmp(epatch_info->signature, RTL_EPATCH_SIGNATURE, 8) != 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "bad EPATCH signature");
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
num_patches = le16_to_cpu(epatch_info->num_patches);
|
|
|
|
BT_DBG("fw_version=%x, num_patches=%d",
|
|
|
|
le32_to_cpu(epatch_info->fw_version), num_patches);
|
|
|
|
|
|
|
|
/* After the rtl_epatch_header there is a funky patch metadata section.
|
|
|
|
* Assuming 2 patches, the layout is:
|
|
|
|
* ChipID1 ChipID2 PatchLength1 PatchLength2 PatchOffset1 PatchOffset2
|
|
|
|
*
|
|
|
|
* Find the right patch for this chip.
|
|
|
|
*/
|
|
|
|
min_size += 8 * num_patches;
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->fw_len < min_size)
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
chip_id_base = btrtl_dev->fw_data + sizeof(struct rtl_epatch_header);
|
2015-05-14 08:49:09 +00:00
|
|
|
patch_length_base = chip_id_base + (sizeof(u16) * num_patches);
|
|
|
|
patch_offset_base = patch_length_base + (sizeof(u16) * num_patches);
|
|
|
|
for (i = 0; i < num_patches; i++) {
|
|
|
|
u16 chip_id = get_unaligned_le16(chip_id_base +
|
|
|
|
(i * sizeof(u16)));
|
2018-08-02 14:57:13 +00:00
|
|
|
if (chip_id == btrtl_dev->rom_version + 1) {
|
2015-05-14 08:49:09 +00:00
|
|
|
patch_length = get_unaligned_le16(patch_length_base +
|
|
|
|
(i * sizeof(u16)));
|
|
|
|
patch_offset = get_unaligned_le32(patch_offset_base +
|
|
|
|
(i * sizeof(u32)));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!patch_offset) {
|
2018-08-02 14:57:14 +00:00
|
|
|
rtl_dev_err(hdev, "didn't find patch for chip id %d",
|
|
|
|
btrtl_dev->rom_version);
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
BT_DBG("length=%x offset=%x index %d", patch_length, patch_offset, i);
|
|
|
|
min_size = patch_offset + patch_length;
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->fw_len < min_size)
|
2015-05-14 08:49:09 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* Copy the firmware into a new buffer and write the version at
|
|
|
|
* the end.
|
|
|
|
*/
|
|
|
|
len = patch_length;
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
buf = kvmalloc(patch_length, GFP_KERNEL);
|
2015-05-14 08:49:09 +00:00
|
|
|
if (!buf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
memcpy(buf, btrtl_dev->fw_data + patch_offset, patch_length - 4);
|
2015-05-14 08:49:09 +00:00
|
|
|
memcpy(buf + patch_length - 4, &epatch_info->fw_version, 4);
|
|
|
|
|
|
|
|
*_buf = buf;
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rtl_download_firmware(struct hci_dev *hdev,
|
|
|
|
const unsigned char *data, int fw_len)
|
|
|
|
{
|
|
|
|
struct rtl_download_cmd *dl_cmd;
|
|
|
|
int frag_num = fw_len / RTL_FRAG_LEN + 1;
|
|
|
|
int frag_len = RTL_FRAG_LEN;
|
|
|
|
int ret = 0;
|
|
|
|
int i;
|
2019-08-31 08:36:02 +00:00
|
|
|
struct sk_buff *skb;
|
|
|
|
struct hci_rp_read_local_version *rp;
|
2015-05-14 08:49:09 +00:00
|
|
|
|
|
|
|
dl_cmd = kmalloc(sizeof(struct rtl_download_cmd), GFP_KERNEL);
|
|
|
|
if (!dl_cmd)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
for (i = 0; i < frag_num; i++) {
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
BT_DBG("download fw (%d/%d)", i, frag_num);
|
|
|
|
|
2019-09-05 05:21:57 +00:00
|
|
|
if (i > 0x7f)
|
|
|
|
dl_cmd->index = (i & 0x7f) + 1;
|
|
|
|
else
|
|
|
|
dl_cmd->index = i;
|
|
|
|
|
2015-05-14 08:49:09 +00:00
|
|
|
if (i == (frag_num - 1)) {
|
|
|
|
dl_cmd->index |= 0x80; /* data end */
|
|
|
|
frag_len = fw_len % RTL_FRAG_LEN;
|
|
|
|
}
|
|
|
|
memcpy(dl_cmd->data, data, frag_len);
|
|
|
|
|
|
|
|
/* Send download command */
|
|
|
|
skb = __hci_cmd_sync(hdev, 0xfc20, frag_len + 1, dl_cmd,
|
|
|
|
HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "download fw command failed (%ld)",
|
2018-08-02 14:57:14 +00:00
|
|
|
PTR_ERR(skb));
|
2019-09-18 08:56:41 +00:00
|
|
|
ret = PTR_ERR(skb);
|
2015-05-14 08:49:09 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (skb->len != sizeof(struct rtl_download_response)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "download fw event length mismatch");
|
2015-05-14 08:49:09 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
ret = -EIO;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
data += RTL_FRAG_LEN;
|
|
|
|
}
|
|
|
|
|
2019-08-31 08:36:02 +00:00
|
|
|
skb = btrtl_read_local_version(hdev);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
rtl_dev_err(hdev, "read local version failed");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
rp = (struct hci_rp_read_local_version *)skb->data;
|
|
|
|
rtl_dev_info(hdev, "fw version 0x%04x%04x",
|
|
|
|
__le16_to_cpu(rp->hci_rev), __le16_to_cpu(rp->lmp_subver));
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
2015-05-14 08:49:09 +00:00
|
|
|
out:
|
|
|
|
kfree(dl_cmd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
static int rtl_load_file(struct hci_dev *hdev, const char *name, u8 **buff)
|
2016-09-09 15:02:05 +00:00
|
|
|
{
|
|
|
|
const struct firmware *fw;
|
|
|
|
int ret;
|
|
|
|
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "loading %s", name);
|
2016-09-09 15:02:05 +00:00
|
|
|
ret = request_firmware(&fw, name, &hdev->dev);
|
2017-02-20 02:04:57 +00:00
|
|
|
if (ret < 0)
|
2016-09-09 15:02:05 +00:00
|
|
|
return ret;
|
|
|
|
ret = fw->size;
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
*buff = kvmalloc(fw->size, GFP_KERNEL);
|
|
|
|
if (*buff)
|
|
|
|
memcpy(*buff, fw->data, ret);
|
|
|
|
else
|
2017-07-28 14:41:11 +00:00
|
|
|
ret = -ENOMEM;
|
2016-09-09 15:02:05 +00:00
|
|
|
|
|
|
|
release_firmware(fw);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
static int btrtl_setup_rtl8723a(struct hci_dev *hdev,
|
|
|
|
struct btrtl_device_info *btrtl_dev)
|
2015-05-14 08:49:09 +00:00
|
|
|
{
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->fw_len < 8)
|
|
|
|
return -EINVAL;
|
2015-05-14 08:49:09 +00:00
|
|
|
|
|
|
|
/* Check that the firmware doesn't have the epatch signature
|
|
|
|
* (which is only for RTL8723B and newer).
|
|
|
|
*/
|
2018-08-02 14:57:13 +00:00
|
|
|
if (!memcmp(btrtl_dev->fw_data, RTL_EPATCH_SIGNATURE, 8)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "unexpected EPATCH signature!");
|
2018-08-02 14:57:13 +00:00
|
|
|
return -EINVAL;
|
2015-05-14 08:49:09 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
return rtl_download_firmware(hdev, btrtl_dev->fw_data,
|
|
|
|
btrtl_dev->fw_len);
|
2015-05-14 08:49:09 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
static int btrtl_setup_rtl8723b(struct hci_dev *hdev,
|
|
|
|
struct btrtl_device_info *btrtl_dev)
|
2015-05-14 08:49:09 +00:00
|
|
|
{
|
|
|
|
unsigned char *fw_data = NULL;
|
|
|
|
int ret;
|
2016-09-09 15:02:05 +00:00
|
|
|
u8 *tbuff;
|
2015-05-14 08:49:09 +00:00
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
ret = rtlbt_parse_firmware(hdev, btrtl_dev, &fw_data);
|
2015-05-14 08:49:09 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
if (btrtl_dev->cfg_len > 0) {
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
tbuff = kvzalloc(ret + btrtl_dev->cfg_len, GFP_KERNEL);
|
2016-09-09 15:02:05 +00:00
|
|
|
if (!tbuff) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(tbuff, fw_data, ret);
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
kvfree(fw_data);
|
2016-09-09 15:02:05 +00:00
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
memcpy(tbuff + ret, btrtl_dev->cfg_data, btrtl_dev->cfg_len);
|
|
|
|
ret += btrtl_dev->cfg_len;
|
2016-09-09 15:02:05 +00:00
|
|
|
|
|
|
|
fw_data = tbuff;
|
|
|
|
}
|
|
|
|
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "cfg_sz %d, total sz %d", btrtl_dev->cfg_len, ret);
|
2016-09-09 15:02:05 +00:00
|
|
|
|
2015-05-14 08:49:09 +00:00
|
|
|
ret = rtl_download_firmware(hdev, fw_data, ret);
|
|
|
|
|
|
|
|
out:
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
kvfree(fw_data);
|
2015-05-14 08:49:09 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
void btrtl_free(struct btrtl_device_info *btrtl_dev)
|
|
|
|
{
|
Bluetooth: btrtl: Use kvmalloc for FW allocations
Currently, kmemdup is applied to the firmware data, and it invokes
kmalloc under the hood. The firmware size and patch_length are big (more
than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc
may fail to allocate a contiguous chunk under high memory usage and
fragmentation:
Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821
Bluetooth: hci0: RTL: rom_version status=0 version=1
Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin
kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
<stack trace follows>
As firmware load happens on each resume, Bluetooth will stop working
after several iterations, when the kernel fails to allocate an order-4
page.
This patch replaces kmemdup with kvmalloc+memcpy. It's not required to
have a contiguous chunk here, because it's not mapped to the device
directly.
Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-01-24 17:15:35 +00:00
|
|
|
kvfree(btrtl_dev->fw_data);
|
|
|
|
kvfree(btrtl_dev->cfg_data);
|
2018-08-02 14:57:13 +00:00
|
|
|
kfree(btrtl_dev);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(btrtl_free);
|
|
|
|
|
2018-08-02 14:57:17 +00:00
|
|
|
struct btrtl_device_info *btrtl_initialize(struct hci_dev *hdev,
|
|
|
|
const char *postfix)
|
2015-05-14 08:49:09 +00:00
|
|
|
{
|
2018-08-02 14:57:13 +00:00
|
|
|
struct btrtl_device_info *btrtl_dev;
|
2015-05-14 08:49:09 +00:00
|
|
|
struct sk_buff *skb;
|
|
|
|
struct hci_rp_read_local_version *resp;
|
2018-08-02 14:57:17 +00:00
|
|
|
char cfg_name[40];
|
2018-02-11 18:24:33 +00:00
|
|
|
u16 hci_rev, lmp_subver;
|
2018-08-02 14:57:16 +00:00
|
|
|
u8 hci_ver;
|
2018-08-02 14:57:13 +00:00
|
|
|
int ret;
|
2020-10-26 08:28:38 +00:00
|
|
|
u16 opcode;
|
|
|
|
u8 cmd[2];
|
2018-08-02 14:57:13 +00:00
|
|
|
|
|
|
|
btrtl_dev = kzalloc(sizeof(*btrtl_dev), GFP_KERNEL);
|
|
|
|
if (!btrtl_dev) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err_alloc;
|
|
|
|
}
|
2015-05-14 08:49:09 +00:00
|
|
|
|
|
|
|
skb = btrtl_read_local_version(hdev);
|
2018-08-02 14:57:13 +00:00
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
goto err_free;
|
|
|
|
}
|
2015-05-14 08:49:09 +00:00
|
|
|
|
|
|
|
resp = (struct hci_rp_read_local_version *)skb->data;
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "examining hci_ver=%02x hci_rev=%04x lmp_ver=%02x lmp_subver=%04x",
|
2018-08-02 14:57:14 +00:00
|
|
|
resp->hci_ver, resp->hci_rev,
|
|
|
|
resp->lmp_ver, resp->lmp_subver);
|
2015-05-14 08:49:09 +00:00
|
|
|
|
2018-08-02 14:57:16 +00:00
|
|
|
hci_ver = resp->hci_ver;
|
2018-02-11 18:24:33 +00:00
|
|
|
hci_rev = le16_to_cpu(resp->hci_rev);
|
2015-05-14 08:49:09 +00:00
|
|
|
lmp_subver = le16_to_cpu(resp->lmp_subver);
|
2020-10-26 08:28:38 +00:00
|
|
|
|
2021-09-30 10:36:34 +00:00
|
|
|
btrtl_dev->ic_info = btrtl_match_ic(lmp_subver, hci_rev, hci_ver,
|
|
|
|
hdev->bus);
|
|
|
|
|
|
|
|
if (!btrtl_dev->ic_info)
|
2020-10-26 08:28:38 +00:00
|
|
|
btrtl_dev->drop_fw = true;
|
|
|
|
|
|
|
|
if (btrtl_dev->drop_fw) {
|
|
|
|
opcode = hci_opcode_pack(0x3f, 0x66);
|
|
|
|
cmd[0] = opcode & 0xff;
|
|
|
|
cmd[1] = opcode >> 8;
|
|
|
|
|
|
|
|
skb = bt_skb_alloc(sizeof(cmd), GFP_KERNEL);
|
2020-11-10 12:39:15 +00:00
|
|
|
if (!skb)
|
2020-10-26 08:28:38 +00:00
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
skb_put_data(skb, cmd, sizeof(cmd));
|
|
|
|
hci_skb_pkt_type(skb) = HCI_COMMAND_PKT;
|
|
|
|
|
|
|
|
hdev->send(hdev, skb);
|
|
|
|
|
|
|
|
/* Ensure the above vendor command is sent to controller and
|
|
|
|
* process has done.
|
|
|
|
*/
|
|
|
|
msleep(200);
|
|
|
|
|
|
|
|
/* Read the local version again. Expect to have the vanilla
|
|
|
|
* version as cold boot.
|
|
|
|
*/
|
|
|
|
skb = btrtl_read_local_version(hdev);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
goto err_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = (struct hci_rp_read_local_version *)skb->data;
|
|
|
|
rtl_dev_info(hdev, "examining hci_ver=%02x hci_rev=%04x lmp_ver=%02x lmp_subver=%04x",
|
|
|
|
resp->hci_ver, resp->hci_rev,
|
|
|
|
resp->lmp_ver, resp->lmp_subver);
|
|
|
|
|
|
|
|
hci_ver = resp->hci_ver;
|
|
|
|
hci_rev = le16_to_cpu(resp->hci_rev);
|
|
|
|
lmp_subver = le16_to_cpu(resp->lmp_subver);
|
2021-09-30 10:36:34 +00:00
|
|
|
|
|
|
|
btrtl_dev->ic_info = btrtl_match_ic(lmp_subver, hci_rev, hci_ver,
|
|
|
|
hdev->bus);
|
2020-10-26 08:28:38 +00:00
|
|
|
}
|
|
|
|
out_free:
|
2015-05-14 08:49:09 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
if (!btrtl_dev->ic_info) {
|
2019-08-31 08:41:13 +00:00
|
|
|
rtl_dev_info(hdev, "unknown IC info, lmp subver %04x, hci rev %04x, hci ver %04x",
|
2018-08-02 14:57:16 +00:00
|
|
|
lmp_subver, hci_rev, hci_ver);
|
2019-01-27 08:33:59 +00:00
|
|
|
return btrtl_dev;
|
2018-08-02 14:57:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (btrtl_dev->ic_info->has_rom_version) {
|
|
|
|
ret = rtl_read_rom_version(hdev, &btrtl_dev->rom_version);
|
|
|
|
if (ret)
|
|
|
|
goto err_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
btrtl_dev->fw_len = rtl_load_file(hdev, btrtl_dev->ic_info->fw_name,
|
|
|
|
&btrtl_dev->fw_data);
|
|
|
|
if (btrtl_dev->fw_len < 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "firmware file %s not found",
|
2018-08-02 14:57:13 +00:00
|
|
|
btrtl_dev->ic_info->fw_name);
|
|
|
|
ret = btrtl_dev->fw_len;
|
|
|
|
goto err_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (btrtl_dev->ic_info->cfg_name) {
|
2018-08-02 14:57:17 +00:00
|
|
|
if (postfix) {
|
|
|
|
snprintf(cfg_name, sizeof(cfg_name), "%s-%s.bin",
|
|
|
|
btrtl_dev->ic_info->cfg_name, postfix);
|
|
|
|
} else {
|
|
|
|
snprintf(cfg_name, sizeof(cfg_name), "%s.bin",
|
|
|
|
btrtl_dev->ic_info->cfg_name);
|
|
|
|
}
|
|
|
|
btrtl_dev->cfg_len = rtl_load_file(hdev, cfg_name,
|
2018-08-02 14:57:13 +00:00
|
|
|
&btrtl_dev->cfg_data);
|
|
|
|
if (btrtl_dev->ic_info->config_needed &&
|
|
|
|
btrtl_dev->cfg_len <= 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "mandatory config file %s not found",
|
2018-08-02 14:57:13 +00:00
|
|
|
btrtl_dev->ic_info->cfg_name);
|
|
|
|
ret = btrtl_dev->cfg_len;
|
|
|
|
goto err_free;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-13 08:37:03 +00:00
|
|
|
/* The following chips supports the Microsoft vendor extension,
|
|
|
|
* therefore set the corresponding VsMsftOpCode.
|
2020-12-17 22:53:21 +00:00
|
|
|
*/
|
2021-09-28 18:10:50 +00:00
|
|
|
if (btrtl_dev->ic_info->has_msft_ext)
|
2020-12-17 22:53:21 +00:00
|
|
|
hci_set_msft_opcode(hdev, 0xFCF0);
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
return btrtl_dev;
|
|
|
|
|
|
|
|
err_free:
|
|
|
|
btrtl_free(btrtl_dev);
|
|
|
|
err_alloc:
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(btrtl_initialize);
|
|
|
|
|
|
|
|
int btrtl_download_firmware(struct hci_dev *hdev,
|
|
|
|
struct btrtl_device_info *btrtl_dev)
|
|
|
|
{
|
2015-05-14 08:49:09 +00:00
|
|
|
/* Match a set of subver values that correspond to stock firmware,
|
|
|
|
* which is not compatible with standard btusb.
|
|
|
|
* If matched, upload an alternative firmware that does conform to
|
|
|
|
* standard btusb. Once that firmware is uploaded, the subver changes
|
|
|
|
* to a different value.
|
|
|
|
*/
|
2019-01-27 08:33:59 +00:00
|
|
|
if (!btrtl_dev->ic_info) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "assuming no firmware upload needed");
|
2019-01-27 08:33:59 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-02 14:57:13 +00:00
|
|
|
switch (btrtl_dev->ic_info->lmp_subver) {
|
2015-05-14 08:49:09 +00:00
|
|
|
case RTL_ROM_LMP_8723A:
|
2018-08-02 14:57:13 +00:00
|
|
|
return btrtl_setup_rtl8723a(hdev, btrtl_dev);
|
2015-05-14 08:49:09 +00:00
|
|
|
case RTL_ROM_LMP_8723B:
|
|
|
|
case RTL_ROM_LMP_8821A:
|
|
|
|
case RTL_ROM_LMP_8761A:
|
2016-09-09 15:02:05 +00:00
|
|
|
case RTL_ROM_LMP_8822B:
|
2020-11-10 03:38:37 +00:00
|
|
|
case RTL_ROM_LMP_8852A:
|
2018-08-02 14:57:13 +00:00
|
|
|
return btrtl_setup_rtl8723b(hdev, btrtl_dev);
|
2015-05-14 08:49:09 +00:00
|
|
|
default:
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_info(hdev, "assuming no firmware upload needed");
|
2015-05-14 08:49:09 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2018-08-02 14:57:13 +00:00
|
|
|
EXPORT_SYMBOL_GPL(btrtl_download_firmware);
|
|
|
|
|
2021-05-27 07:19:54 +00:00
|
|
|
void btrtl_set_quirks(struct hci_dev *hdev, struct btrtl_device_info *btrtl_dev)
|
2018-08-02 14:57:13 +00:00
|
|
|
{
|
2019-08-30 12:02:14 +00:00
|
|
|
/* Enable controller to do both LE scan and BR/EDR inquiry
|
|
|
|
* simultaneously.
|
|
|
|
*/
|
|
|
|
set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks);
|
|
|
|
|
2020-12-22 18:16:27 +00:00
|
|
|
/* Enable central-peripheral role (able to create new connections with
|
|
|
|
* an existing connection in slave role).
|
|
|
|
*/
|
2021-01-27 03:01:52 +00:00
|
|
|
/* Enable WBS supported for the specific Realtek devices. */
|
|
|
|
switch (btrtl_dev->project_id) {
|
|
|
|
case CHIP_ID_8822C:
|
|
|
|
case CHIP_ID_8852A:
|
2022-03-14 06:54:22 +00:00
|
|
|
case CHIP_ID_8852B:
|
2020-12-22 18:16:27 +00:00
|
|
|
set_bit(HCI_QUIRK_VALID_LE_STATES, &hdev->quirks);
|
2021-01-27 03:01:52 +00:00
|
|
|
set_bit(HCI_QUIRK_WIDEBAND_SPEECH_SUPPORTED, &hdev->quirks);
|
2021-09-26 07:07:48 +00:00
|
|
|
hci_set_aosp_capable(hdev);
|
2020-12-22 18:16:27 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
rtl_dev_dbg(hdev, "Central-peripheral role not enabled.");
|
2021-01-27 03:01:52 +00:00
|
|
|
rtl_dev_dbg(hdev, "WBS supported not enabled.");
|
2020-12-22 18:16:27 +00:00
|
|
|
break;
|
|
|
|
}
|
2021-05-27 07:19:54 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(btrtl_set_quirks);
|
|
|
|
|
|
|
|
int btrtl_setup_realtek(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct btrtl_device_info *btrtl_dev;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
btrtl_dev = btrtl_initialize(hdev, NULL);
|
|
|
|
if (IS_ERR(btrtl_dev))
|
|
|
|
return PTR_ERR(btrtl_dev);
|
|
|
|
|
|
|
|
ret = btrtl_download_firmware(hdev, btrtl_dev);
|
|
|
|
|
|
|
|
btrtl_set_quirks(hdev, btrtl_dev);
|
2020-12-22 18:16:27 +00:00
|
|
|
|
|
|
|
btrtl_free(btrtl_dev);
|
2018-08-02 14:57:13 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2015-05-14 08:49:09 +00:00
|
|
|
EXPORT_SYMBOL_GPL(btrtl_setup_realtek);
|
|
|
|
|
2019-06-25 08:30:51 +00:00
|
|
|
int btrtl_shutdown_realtek(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* According to the vendor driver, BT must be reset on close to avoid
|
|
|
|
* firmware crash.
|
|
|
|
*/
|
|
|
|
skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT);
|
|
|
|
if (IS_ERR(skb)) {
|
|
|
|
ret = PTR_ERR(skb);
|
|
|
|
bt_dev_err(hdev, "HCI reset during shutdown failed");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(btrtl_shutdown_realtek);
|
|
|
|
|
2018-08-02 14:57:15 +00:00
|
|
|
static unsigned int btrtl_convert_baudrate(u32 device_baudrate)
|
|
|
|
{
|
|
|
|
switch (device_baudrate) {
|
|
|
|
case 0x0252a00a:
|
|
|
|
return 230400;
|
|
|
|
|
|
|
|
case 0x05f75004:
|
|
|
|
return 921600;
|
|
|
|
|
|
|
|
case 0x00005004:
|
|
|
|
return 1000000;
|
|
|
|
|
|
|
|
case 0x04928002:
|
|
|
|
case 0x01128002:
|
|
|
|
return 1500000;
|
|
|
|
|
|
|
|
case 0x00005002:
|
|
|
|
return 2000000;
|
|
|
|
|
|
|
|
case 0x0000b001:
|
|
|
|
return 2500000;
|
|
|
|
|
|
|
|
case 0x04928001:
|
|
|
|
return 3000000;
|
|
|
|
|
|
|
|
case 0x052a6001:
|
|
|
|
return 3500000;
|
|
|
|
|
|
|
|
case 0x00005001:
|
|
|
|
return 4000000;
|
|
|
|
|
|
|
|
case 0x0252c014:
|
|
|
|
default:
|
|
|
|
return 115200;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int btrtl_get_uart_settings(struct hci_dev *hdev,
|
|
|
|
struct btrtl_device_info *btrtl_dev,
|
|
|
|
unsigned int *controller_baudrate,
|
|
|
|
u32 *device_baudrate, bool *flow_control)
|
|
|
|
{
|
|
|
|
struct rtl_vendor_config *config;
|
|
|
|
struct rtl_vendor_config_entry *entry;
|
|
|
|
int i, total_data_len;
|
|
|
|
bool found = false;
|
|
|
|
|
|
|
|
total_data_len = btrtl_dev->cfg_len - sizeof(*config);
|
|
|
|
if (total_data_len <= 0) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_warn(hdev, "no config loaded");
|
2018-08-02 14:57:15 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
config = (struct rtl_vendor_config *)btrtl_dev->cfg_data;
|
|
|
|
if (le32_to_cpu(config->signature) != RTL_CONFIG_MAGIC) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "invalid config magic");
|
2018-08-02 14:57:15 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (total_data_len < le16_to_cpu(config->total_len)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "config is too short");
|
2018-08-02 14:57:15 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < total_data_len; ) {
|
|
|
|
entry = ((void *)config->entry) + i;
|
|
|
|
|
|
|
|
switch (le16_to_cpu(entry->offset)) {
|
|
|
|
case 0xc:
|
|
|
|
if (entry->len < sizeof(*device_baudrate)) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "invalid UART config entry");
|
2018-08-02 14:57:15 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
*device_baudrate = get_unaligned_le32(entry->data);
|
|
|
|
*controller_baudrate = btrtl_convert_baudrate(
|
|
|
|
*device_baudrate);
|
|
|
|
|
|
|
|
if (entry->len >= 13)
|
|
|
|
*flow_control = !!(entry->data[12] & BIT(2));
|
|
|
|
else
|
|
|
|
*flow_control = false;
|
|
|
|
|
|
|
|
found = true;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_dbg(hdev, "skipping config entry 0x%x (len %u)",
|
2018-08-02 14:57:15 +00:00
|
|
|
le16_to_cpu(entry->offset), entry->len);
|
|
|
|
break;
|
2019-10-25 09:26:53 +00:00
|
|
|
}
|
2018-08-02 14:57:15 +00:00
|
|
|
|
|
|
|
i += sizeof(*entry) + entry->len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found) {
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_err(hdev, "no UART config entry found");
|
2018-08-02 14:57:15 +00:00
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
2019-08-31 08:46:11 +00:00
|
|
|
rtl_dev_dbg(hdev, "device baudrate = 0x%08x", *device_baudrate);
|
|
|
|
rtl_dev_dbg(hdev, "controller baudrate = %u", *controller_baudrate);
|
|
|
|
rtl_dev_dbg(hdev, "flow control %d", *flow_control);
|
2018-08-02 14:57:15 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(btrtl_get_uart_settings);
|
|
|
|
|
2015-05-14 08:49:09 +00:00
|
|
|
MODULE_AUTHOR("Daniel Drake <drake@endlessm.com>");
|
|
|
|
MODULE_DESCRIPTION("Bluetooth support for Realtek devices ver " VERSION);
|
|
|
|
MODULE_VERSION(VERSION);
|
|
|
|
MODULE_LICENSE("GPL");
|
2018-08-02 14:57:12 +00:00
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723a_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723b_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723b_config.bin");
|
2018-08-02 14:57:16 +00:00
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723bs_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723bs_config.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723ds_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8723ds_config.bin");
|
2018-08-02 14:57:12 +00:00
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8761a_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8761a_config.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8821a_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8821a_config.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8822b_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8822b_config.bin");
|
2020-11-10 03:38:37 +00:00
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8852au_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8852au_config.bin");
|
2022-03-14 06:54:22 +00:00
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8852bu_fw.bin");
|
|
|
|
MODULE_FIRMWARE("rtl_bt/rtl8852bu_config.bin");
|