blob: 4bd1edf1224a115263efd6387e1d335920854fc3 [file] [log] [blame]
Austin Schuh41baf202022-01-01 14:33:40 -08001/*
2 * The MIT License (MIT)
3 *
4 * Copyright (c) 2019 Nathan Conrad
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 *
24 * This file is part of the TinyUSB stack.
25 */
26
27/*
28 * This library is not fully reentrant, though it is reentrant from the view
29 * of either the application layer or the USB stack. Due to its locking,
30 * it is not safe to call its functions from interrupts.
31 *
32 * The one exception is that its functions may not be called from the application
33 * until the USB stack is initialized. This should not be a problem since the
34 * device shouldn't be sending messages until it receives a request from the
35 * host.
36 */
37
38
39/*
40 * In the case of single-CPU "no OS", this task is never preempted other than by
41 * interrupts, and the USBTMC code isn't called by interrupts, so all is OK. For "no OS",
42 * the mutex structure's main effect is to disable the USB interrupts.
43 * With an OS, this class driver uses the OSAL to perform locking. The code uses a single lock
44 * and does not call outside of this class with a lock held, so deadlocks won't happen.
45 */
46
47//Limitations:
48// "vendor-specific" commands are not handled.
49// Dealing with "termchar" must be handled by the application layer,
50// though additional error checking is does in this module.
51// talkOnly and listenOnly are NOT supported. They're not permitted
52// in USB488, anyway.
53
54/* Supported:
55 *
56 * Notification pulse
57 * Trigger
58 * Read status byte (both by interrupt endpoint and control message)
59 *
60 */
61
62
63// TODO:
64// USBTMC 3.2.2 error conditions not strictly followed
65// No local lock-out, REN, or GTL.
66// Clear message available status byte at the correct time? (488 4.3.1.3)
67
68
69#include "tusb_option.h"
70
71#if (TUSB_OPT_DEVICE_ENABLED && CFG_TUD_USBTMC)
72
73#include "device/usbd.h"
74#include "device/usbd_pvt.h"
75
76#include "usbtmc_device.h"
77
78#ifdef xDEBUG
79#include "uart_util.h"
80static char logMsg[150];
81#endif
82
83/*
84 * The state machine does not allow simultaneous reading and writing. This is
85 * consistent with USBTMC.
86 */
87
88typedef enum
89{
90 STATE_CLOSED, // Endpoints have not yet been opened since USB reset
91 STATE_NAK, // Bulk-out endpoint is in NAK state.
92 STATE_IDLE, // Bulk-out endpoint is waiting for CMD.
93 STATE_RCV, // Bulk-out is receiving DEV_DEP message
94 STATE_TX_REQUESTED,
95 STATE_TX_INITIATED,
96 STATE_TX_SHORTED,
97 STATE_CLEARING,
98 STATE_ABORTING_BULK_IN,
99 STATE_ABORTING_BULK_IN_SHORTED, // aborting, and short packet has been queued for transmission
100 STATE_ABORTING_BULK_IN_ABORTED, // aborting, and short packet has been transmitted
101 STATE_ABORTING_BULK_OUT,
102 STATE_NUM_STATES
103} usbtmcd_state_enum;
104
105#if (CFG_TUD_USBTMC_ENABLE_488)
106 typedef usbtmc_response_capabilities_488_t usbtmc_capabilities_specific_t;
107#else
108 typedef usbtmc_response_capabilities_t usbtmc_capabilities_specific_t;
109#endif
110
111
112typedef struct
113{
114 volatile usbtmcd_state_enum state;
115
116 uint8_t itf_id;
117 uint8_t rhport;
118 uint8_t ep_bulk_in;
119 uint8_t ep_bulk_out;
120 uint8_t ep_int_in;
121 // IN buffer is only used for first packet, not the remainder
122 // in order to deal with prepending header
123 CFG_TUSB_MEM_ALIGN uint8_t ep_bulk_in_buf[USBTMCD_MAX_PACKET_SIZE];
124 // OUT buffer receives one packet at a time
125 CFG_TUSB_MEM_ALIGN uint8_t ep_bulk_out_buf[USBTMCD_MAX_PACKET_SIZE];
126 uint32_t transfer_size_remaining; // also used for requested length for bulk IN.
127 uint32_t transfer_size_sent; // To keep track of data bytes that have been queued in FIFO (not header bytes)
128
129 uint8_t lastBulkOutTag; // used for aborts (mostly)
130 uint8_t lastBulkInTag; // used for aborts (mostly)
131
132 uint8_t const * devInBuffer; // pointer to application-layer used for transmissions
133
134 usbtmc_capabilities_specific_t const * capabilities;
135} usbtmc_interface_state_t;
136
137CFG_TUSB_MEM_SECTION static usbtmc_interface_state_t usbtmc_state =
138{
139 .itf_id = 0xFF,
140};
141
142// We need all headers to fit in a single packet in this implementation.
143TU_VERIFY_STATIC(USBTMCD_MAX_PACKET_SIZE >= 32u,"USBTMC dev EP packet size too small");
144TU_VERIFY_STATIC(
145 (sizeof(usbtmc_state.ep_bulk_in_buf) % USBTMCD_MAX_PACKET_SIZE) == 0,
146 "packet buffer must be a multiple of the packet size");
147
148static bool handle_devMsgOutStart(uint8_t rhport, void *data, size_t len);
149static bool handle_devMsgOut(uint8_t rhport, void *data, size_t len, size_t packetLen);
150
151static uint8_t termChar;
152static uint8_t termCharRequested = false;
153
154
155osal_mutex_def_t usbtmcLockBuffer;
156static osal_mutex_t usbtmcLock;
157
158// Our own private lock, mostly for the state variable.
159#define criticalEnter() do {osal_mutex_lock(usbtmcLock,OSAL_TIMEOUT_WAIT_FOREVER); } while (0)
160#define criticalLeave() do {osal_mutex_unlock(usbtmcLock); } while (0)
161
162bool atomicChangeState(usbtmcd_state_enum expectedState, usbtmcd_state_enum newState)
163{
164 bool ret = true;
165 criticalEnter();
166 usbtmcd_state_enum oldState = usbtmc_state.state;
167 if (oldState == expectedState)
168 {
169 usbtmc_state.state = newState;
170 }
171 else
172 {
173 ret = false;
174 }
175 criticalLeave();
176 return ret;
177}
178
179// called from app
180// We keep a reference to the buffer, so it MUST not change until the app is
181// notified that the transfer is complete.
182// length of data is specified in the hdr.
183
184// We can't just send the whole thing at once because we need to concatanate the
185// header with the data.
186bool tud_usbtmc_transmit_dev_msg_data(
187 const void * data, size_t len,
188 bool endOfMessage,
189 bool usingTermChar)
190{
191 const unsigned int txBufLen = sizeof(usbtmc_state.ep_bulk_in_buf);
192
193#ifndef NDEBUG
194 TU_ASSERT(len > 0u);
195 TU_ASSERT(len <= usbtmc_state.transfer_size_remaining);
196 TU_ASSERT(usbtmc_state.transfer_size_sent == 0u);
197 if(usingTermChar)
198 {
199 TU_ASSERT(usbtmc_state.capabilities->bmDevCapabilities.canEndBulkInOnTermChar);
200 TU_ASSERT(termCharRequested);
201 TU_ASSERT(((uint8_t const*)data)[len-1u] == termChar);
202 }
203#endif
204
205 TU_VERIFY(usbtmc_state.state == STATE_TX_REQUESTED);
206 usbtmc_msg_dev_dep_msg_in_header_t *hdr = (usbtmc_msg_dev_dep_msg_in_header_t*)usbtmc_state.ep_bulk_in_buf;
207 tu_varclr(hdr);
208 hdr->header.MsgID = USBTMC_MSGID_DEV_DEP_MSG_IN;
209 hdr->header.bTag = usbtmc_state.lastBulkInTag;
210 hdr->header.bTagInverse = (uint8_t)~(usbtmc_state.lastBulkInTag);
211 hdr->TransferSize = len;
212 hdr->bmTransferAttributes.EOM = endOfMessage;
213 hdr->bmTransferAttributes.UsingTermChar = usingTermChar;
214
215 // Copy in the header
216 const size_t headerLen = sizeof(*hdr);
217 const size_t dataLen = ((headerLen + hdr->TransferSize) <= txBufLen) ?
218 len : (txBufLen - headerLen);
219 const size_t packetLen = headerLen + dataLen;
220
221 memcpy((uint8_t*)(usbtmc_state.ep_bulk_in_buf) + headerLen, data, dataLen);
222 usbtmc_state.transfer_size_remaining = len - dataLen;
223 usbtmc_state.transfer_size_sent = dataLen;
224 usbtmc_state.devInBuffer = (uint8_t const*) data + (dataLen);
225
226 bool stateChanged =
227 atomicChangeState(STATE_TX_REQUESTED, (packetLen >= txBufLen) ? STATE_TX_INITIATED : STATE_TX_SHORTED);
228 TU_VERIFY(stateChanged);
229 TU_VERIFY(usbd_edpt_xfer(usbtmc_state.rhport, usbtmc_state.ep_bulk_in, usbtmc_state.ep_bulk_in_buf, (uint16_t)packetLen));
230 return true;
231}
232
233void usbtmcd_init_cb(void)
234{
235 usbtmc_state.capabilities = tud_usbtmc_get_capabilities_cb();
236#ifndef NDEBUG
237# if CFG_TUD_USBTMC_ENABLE_488
238 if(usbtmc_state.capabilities->bmIntfcCapabilities488.supportsTrigger)
239 TU_ASSERT(&tud_usbtmc_msg_trigger_cb != NULL,);
240 // Per USB488 spec: table 8
241 TU_ASSERT(!usbtmc_state.capabilities->bmIntfcCapabilities.listenOnly,);
242 TU_ASSERT(!usbtmc_state.capabilities->bmIntfcCapabilities.talkOnly,);
243# endif
244 if(usbtmc_state.capabilities->bmIntfcCapabilities.supportsIndicatorPulse)
245 TU_ASSERT(&tud_usbtmc_indicator_pulse_cb != NULL,);
246#endif
247
248 usbtmcLock = osal_mutex_create(&usbtmcLockBuffer);
249}
250
251uint16_t usbtmcd_open_cb(uint8_t rhport, tusb_desc_interface_t const * itf_desc, uint16_t max_len)
252{
253 (void)rhport;
254
255 uint16_t drv_len;
256 uint8_t const * p_desc;
257 uint8_t found_endpoints = 0;
258
259 TU_VERIFY(itf_desc->bInterfaceClass == TUD_USBTMC_APP_CLASS , 0);
260 TU_VERIFY(itf_desc->bInterfaceSubClass == TUD_USBTMC_APP_SUBCLASS, 0);
261
262#ifndef NDEBUG
263 // Only 2 or 3 endpoints are allowed for USBTMC.
264 TU_ASSERT((itf_desc->bNumEndpoints == 2) || (itf_desc->bNumEndpoints ==3), 0);
265#endif
266
267 TU_ASSERT(usbtmc_state.state == STATE_CLOSED, 0);
268
269 // Interface
270 drv_len = 0u;
271 p_desc = (uint8_t const *) itf_desc;
272
273 usbtmc_state.itf_id = itf_desc->bInterfaceNumber;
274 usbtmc_state.rhport = rhport;
275
276 while (found_endpoints < itf_desc->bNumEndpoints && drv_len <= max_len)
277 {
278 if ( TUSB_DESC_ENDPOINT == p_desc[DESC_OFFSET_TYPE])
279 {
280 tusb_desc_endpoint_t const *ep_desc = (tusb_desc_endpoint_t const *)p_desc;
281 switch(ep_desc->bmAttributes.xfer) {
282 case TUSB_XFER_BULK:
283 TU_ASSERT(tu_edpt_packet_size(ep_desc) == USBTMCD_MAX_PACKET_SIZE, 0);
284 if (tu_edpt_dir(ep_desc->bEndpointAddress) == TUSB_DIR_IN)
285 {
286 usbtmc_state.ep_bulk_in = ep_desc->bEndpointAddress;
287 } else {
288 usbtmc_state.ep_bulk_out = ep_desc->bEndpointAddress;
289 }
290
291 break;
292 case TUSB_XFER_INTERRUPT:
293#ifndef NDEBUG
294 TU_ASSERT(tu_edpt_dir(ep_desc->bEndpointAddress) == TUSB_DIR_IN, 0);
295 TU_ASSERT(usbtmc_state.ep_int_in == 0, 0);
296#endif
297 usbtmc_state.ep_int_in = ep_desc->bEndpointAddress;
298 break;
299 default:
300 TU_ASSERT(false, 0);
301 }
302 TU_ASSERT( usbd_edpt_open(rhport, ep_desc), 0);
303 found_endpoints++;
304 }
305
306 drv_len += tu_desc_len(p_desc);
307 p_desc = tu_desc_next(p_desc);
308 }
309
310 // bulk endpoints are required, but interrupt IN is optional
311#ifndef NDEBUG
312 TU_ASSERT(usbtmc_state.ep_bulk_in != 0, 0);
313 TU_ASSERT(usbtmc_state.ep_bulk_out != 0, 0);
314 if (itf_desc->bNumEndpoints == 2)
315 {
316 TU_ASSERT(usbtmc_state.ep_int_in == 0, 0);
317 }
318 else if (itf_desc->bNumEndpoints == 3)
319 {
320 TU_ASSERT(usbtmc_state.ep_int_in != 0, 0);
321 }
322#if (CFG_TUD_USBTMC_ENABLE_488)
323 if(usbtmc_state.capabilities->bmIntfcCapabilities488.is488_2 ||
324 usbtmc_state.capabilities->bmDevCapabilities488.SR1)
325 {
326 TU_ASSERT(usbtmc_state.ep_int_in != 0, 0);
327 }
328#endif
329#endif
330 atomicChangeState(STATE_CLOSED, STATE_NAK);
331 tud_usbtmc_open_cb(itf_desc->iInterface);
332
333 return drv_len;
334}
335// Tell USBTMC class to set its bulk-in EP to ACK so that it can
336// receive USBTMC commands.
337// Returns false if it was already in an ACK state or is busy
338// processing a command (such as a clear). Returns true if it was
339// in the NAK state and successfully transitioned to the ACK wait
340// state.
341bool tud_usbtmc_start_bus_read()
342{
343 usbtmcd_state_enum oldState = usbtmc_state.state;
344 switch(oldState)
345 {
346 // These may transition to IDLE
347 case STATE_NAK:
348 case STATE_ABORTING_BULK_IN_ABORTED:
349 TU_VERIFY(atomicChangeState(oldState, STATE_IDLE));
350 break;
351 // When receiving, let it remain receiving
352 case STATE_RCV:
353 break;
354 default:
355 TU_VERIFY(false);
356 }
357 TU_VERIFY(usbd_edpt_xfer(usbtmc_state.rhport, usbtmc_state.ep_bulk_out, usbtmc_state.ep_bulk_out_buf, 64));
358 return true;
359}
360
361void usbtmcd_reset_cb(uint8_t rhport)
362{
363 (void)rhport;
364 usbtmc_capabilities_specific_t const * capabilities = tud_usbtmc_get_capabilities_cb();
365
366 criticalEnter();
367 tu_varclr(&usbtmc_state);
368 usbtmc_state.capabilities = capabilities;
369 usbtmc_state.itf_id = 0xFFu;
370 criticalLeave();
371}
372
373static bool handle_devMsgOutStart(uint8_t rhport, void *data, size_t len)
374{
375 (void)rhport;
376 // return true upon failure, as we can assume error is being handled elsewhere.
377 TU_VERIFY(atomicChangeState(STATE_IDLE, STATE_RCV), true);
378 usbtmc_state.transfer_size_sent = 0u;
379
380 // must be a header, should have been confirmed before calling here.
381 usbtmc_msg_request_dev_dep_out *msg = (usbtmc_msg_request_dev_dep_out*)data;
382 usbtmc_state.transfer_size_remaining = msg->TransferSize;
383 TU_VERIFY(tud_usbtmc_msgBulkOut_start_cb(msg));
384
385 TU_VERIFY(handle_devMsgOut(rhport, (uint8_t*)data + sizeof(*msg), len - sizeof(*msg), len));
386 usbtmc_state.lastBulkOutTag = msg->header.bTag;
387 return true;
388}
389
390static bool handle_devMsgOut(uint8_t rhport, void *data, size_t len, size_t packetLen)
391{
392 (void)rhport;
393 // return true upon failure, as we can assume error is being handled elsewhere.
394 TU_VERIFY(usbtmc_state.state == STATE_RCV,true);
395
396 bool shortPacket = (packetLen < USBTMCD_MAX_PACKET_SIZE);
397
398 // Packet is to be considered complete when we get enough data or at a short packet.
399 bool atEnd = false;
400 if(len >= usbtmc_state.transfer_size_remaining || shortPacket)
401 {
402 atEnd = true;
403 TU_VERIFY(atomicChangeState(STATE_RCV, STATE_NAK));
404 }
405
406 len = tu_min32(len, usbtmc_state.transfer_size_remaining);
407
408 usbtmc_state.transfer_size_remaining -= len;
409 usbtmc_state.transfer_size_sent += len;
410
411 // App may (should?) call the wait_for_bus() command at this point
412 if(!tud_usbtmc_msg_data_cb(data, len, atEnd))
413 {
414 // TODO: Go to an error state upon failure other than just stalling the EP?
415 return false;
416 }
417
418
419 return true;
420}
421
422static bool handle_devMsgIn(void *data, size_t len)
423{
424 TU_VERIFY(len == sizeof(usbtmc_msg_request_dev_dep_in));
425 usbtmc_msg_request_dev_dep_in *msg = (usbtmc_msg_request_dev_dep_in*)data;
426 bool stateChanged = atomicChangeState(STATE_IDLE, STATE_TX_REQUESTED);
427 TU_VERIFY(stateChanged);
428 usbtmc_state.lastBulkInTag = msg->header.bTag;
429 usbtmc_state.transfer_size_remaining = msg->TransferSize;
430 usbtmc_state.transfer_size_sent = 0u;
431
432 termCharRequested = msg->bmTransferAttributes.TermCharEnabled;
433 termChar = msg->TermChar;
434
435 if(termCharRequested)
436 TU_VERIFY(usbtmc_state.capabilities->bmDevCapabilities.canEndBulkInOnTermChar);
437
438 TU_VERIFY(tud_usbtmc_msgBulkIn_request_cb(msg));
439 return true;
440}
441
442bool usbtmcd_xfer_cb(uint8_t rhport, uint8_t ep_addr, xfer_result_t result, uint32_t xferred_bytes)
443{
444 TU_VERIFY(result == XFER_RESULT_SUCCESS);
445 //uart_tx_str_sync("TMC XFER CB\r\n");
446 if(usbtmc_state.state == STATE_CLEARING) {
447 return true; /* I think we can ignore everything here */
448 }
449
450 if(ep_addr == usbtmc_state.ep_bulk_out)
451 {
452 usbtmc_msg_generic_t *msg = NULL;
453
454 switch(usbtmc_state.state)
455 {
456 case STATE_IDLE:
457 TU_VERIFY(xferred_bytes >= sizeof(usbtmc_msg_generic_t));
458 msg = (usbtmc_msg_generic_t*)(usbtmc_state.ep_bulk_out_buf);
459 uint8_t invInvTag = (uint8_t)~(msg->header.bTagInverse);
460 TU_VERIFY(msg->header.bTag == invInvTag);
461 TU_VERIFY(msg->header.bTag != 0x00);
462
463 switch(msg->header.MsgID) {
464 case USBTMC_MSGID_DEV_DEP_MSG_OUT:
465 if(!handle_devMsgOutStart(rhport, msg, xferred_bytes))
466 {
467 usbd_edpt_stall(rhport, usbtmc_state.ep_bulk_out);
468 TU_VERIFY(false);
469 }
470 break;
471
472 case USBTMC_MSGID_DEV_DEP_MSG_IN:
473 TU_VERIFY(handle_devMsgIn(msg, xferred_bytes));
474 break;
475
476#if (CFG_TUD_USBTMC_ENABLE_488)
477 case USBTMC_MSGID_USB488_TRIGGER:
478 // Spec says we halt the EP if we didn't declare we support it.
479 TU_VERIFY(usbtmc_state.capabilities->bmIntfcCapabilities488.supportsTrigger);
480 TU_VERIFY(tud_usbtmc_msg_trigger_cb(msg));
481
482 break;
483#endif
484 case USBTMC_MSGID_VENDOR_SPECIFIC_MSG_OUT:
485 case USBTMC_MSGID_VENDOR_SPECIFIC_IN:
486 default:
487 usbd_edpt_stall(rhport, usbtmc_state.ep_bulk_out);
488 TU_VERIFY(false);
489 return false;
490 }
491 return true;
492
493 case STATE_RCV:
494 if(!handle_devMsgOut(rhport, usbtmc_state.ep_bulk_out_buf, xferred_bytes, xferred_bytes))
495 {
496 usbd_edpt_stall(rhport, usbtmc_state.ep_bulk_out);
497 TU_VERIFY(false);
498 }
499 return true;
500
501 case STATE_ABORTING_BULK_OUT:
502 TU_VERIFY(false);
503 return false; // Should be stalled by now, shouldn't have received a packet.
504
505 case STATE_TX_REQUESTED:
506 case STATE_TX_INITIATED:
507 case STATE_ABORTING_BULK_IN:
508 case STATE_ABORTING_BULK_IN_SHORTED:
509 case STATE_ABORTING_BULK_IN_ABORTED:
510 default:
511 TU_VERIFY(false);
512 }
513 }
514 else if(ep_addr == usbtmc_state.ep_bulk_in)
515 {
516 switch(usbtmc_state.state) {
517 case STATE_TX_SHORTED:
518 TU_VERIFY(atomicChangeState(STATE_TX_SHORTED, STATE_NAK));
519 TU_VERIFY(tud_usbtmc_msgBulkIn_complete_cb());
520 break;
521
522 case STATE_TX_INITIATED:
523 if(usbtmc_state.transfer_size_remaining >=sizeof(usbtmc_state.ep_bulk_in_buf))
524 {
525 // FIXME! This removes const below!
526 TU_VERIFY( usbd_edpt_xfer(rhport, usbtmc_state.ep_bulk_in,
527 (void*)(uintptr_t) usbtmc_state.devInBuffer, sizeof(usbtmc_state.ep_bulk_in_buf)));
528 usbtmc_state.devInBuffer += sizeof(usbtmc_state.ep_bulk_in_buf);
529 usbtmc_state.transfer_size_remaining -= sizeof(usbtmc_state.ep_bulk_in_buf);
530 usbtmc_state.transfer_size_sent += sizeof(usbtmc_state.ep_bulk_in_buf);
531 }
532 else // last packet
533 {
534 size_t packetLen = usbtmc_state.transfer_size_remaining;
535 memcpy(usbtmc_state.ep_bulk_in_buf, usbtmc_state.devInBuffer, usbtmc_state.transfer_size_remaining);
536 usbtmc_state.transfer_size_sent += sizeof(usbtmc_state.transfer_size_remaining);
537 usbtmc_state.transfer_size_remaining = 0;
538 usbtmc_state.devInBuffer = NULL;
539 TU_VERIFY( usbd_edpt_xfer(rhport, usbtmc_state.ep_bulk_in, usbtmc_state.ep_bulk_in_buf, (uint16_t)packetLen) );
540 if(((packetLen % USBTMCD_MAX_PACKET_SIZE) != 0) || (packetLen == 0 ))
541 {
542 usbtmc_state.state = STATE_TX_SHORTED;
543 }
544 }
545 return true;
546
547 case STATE_ABORTING_BULK_IN:
548 // need to send short packet (ZLP?)
549 TU_VERIFY( usbd_edpt_xfer(rhport, usbtmc_state.ep_bulk_in, usbtmc_state.ep_bulk_in_buf,(uint16_t)0u));
550 usbtmc_state.state = STATE_ABORTING_BULK_IN_SHORTED;
551 return true;
552
553 case STATE_ABORTING_BULK_IN_SHORTED:
554 /* Done. :)*/
555 usbtmc_state.state = STATE_ABORTING_BULK_IN_ABORTED;
556 return true;
557
558 default:
559 TU_ASSERT(false);
560 return false;
561 }
562 }
563 else if (ep_addr == usbtmc_state.ep_int_in) {
564 // Good?
565 return true;
566 }
567 return false;
568}
569
570// Invoked when a control transfer occurred on an interface of this class
571// Driver response accordingly to the request and the transfer stage (setup/data/ack)
572// return false to stall control endpoint (e.g unsupported request)
573bool usbtmcd_control_xfer_cb(uint8_t rhport, uint8_t stage, tusb_control_request_t const * request)
574{
575 // nothing to do with DATA and ACK stage
576 if ( stage != CONTROL_STAGE_SETUP ) return true;
577
578 uint8_t tmcStatusCode = USBTMC_STATUS_FAILED;
579#if (CFG_TUD_USBTMC_ENABLE_488)
580 uint8_t bTag;
581#endif
582
583 if((request->bmRequestType_bit.type == TUSB_REQ_TYPE_STANDARD) &&
584 (request->bmRequestType_bit.recipient == TUSB_REQ_RCPT_ENDPOINT) &&
585 (request->bRequest == TUSB_REQ_CLEAR_FEATURE) &&
586 (request->wValue == TUSB_REQ_FEATURE_EDPT_HALT))
587 {
588 uint32_t ep_addr = (request->wIndex);
589
590 if(ep_addr == usbtmc_state.ep_bulk_out)
591 {
592 criticalEnter();
593 usbtmc_state.state = STATE_NAK; // USBD core has placed EP in NAK state for us
594 criticalLeave();
595 tud_usbtmc_bulkOut_clearFeature_cb();
596 }
597 else if (ep_addr == usbtmc_state.ep_bulk_in)
598 {
599 tud_usbtmc_bulkIn_clearFeature_cb();
600 }
601 else
602 {
603 return false;
604 }
605 return true;
606 }
607
608 // Otherwise, we only handle class requests.
609 if(request->bmRequestType_bit.type != TUSB_REQ_TYPE_CLASS)
610 {
611 return false;
612 }
613
614 // Verification that we own the interface is unneeded since it's been routed to us specifically.
615
616 switch(request->bRequest)
617 {
618 // USBTMC required requests
619 case USBTMC_bREQUEST_INITIATE_ABORT_BULK_OUT:
620 {
621 usbtmc_initiate_abort_rsp_t rsp = {
622 .bTag = usbtmc_state.lastBulkOutTag,
623 };
624 TU_VERIFY(request->bmRequestType == 0xA2); // in,class,interface
625 TU_VERIFY(request->wLength == sizeof(rsp));
626 TU_VERIFY(request->wIndex == usbtmc_state.ep_bulk_out);
627
628 // wValue is the requested bTag to abort
629 if(usbtmc_state.state != STATE_RCV)
630 {
631 rsp.USBTMC_status = USBTMC_STATUS_FAILED;
632 }
633 else if(usbtmc_state.lastBulkOutTag == (request->wValue & 0x7Fu))
634 {
635 rsp.USBTMC_status = USBTMC_STATUS_TRANSFER_NOT_IN_PROGRESS;
636 }
637 else
638 {
639 rsp.USBTMC_status = USBTMC_STATUS_SUCCESS;
640 // Check if we've queued a short packet
641 criticalEnter();
642 usbtmc_state.state = STATE_ABORTING_BULK_OUT;
643 criticalLeave();
644 TU_VERIFY(tud_usbtmc_initiate_abort_bulk_out_cb(&(rsp.USBTMC_status)));
645 usbd_edpt_stall(rhport, usbtmc_state.ep_bulk_out);
646 }
647 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&rsp,sizeof(rsp)));
648 return true;
649 }
650
651 case USBTMC_bREQUEST_CHECK_ABORT_BULK_OUT_STATUS:
652 {
653 usbtmc_check_abort_bulk_rsp_t rsp = {
654 .USBTMC_status = USBTMC_STATUS_SUCCESS,
655 .NBYTES_RXD_TXD = usbtmc_state.transfer_size_sent
656 };
657 TU_VERIFY(request->bmRequestType == 0xA2); // in,class,EP
658 TU_VERIFY(request->wLength == sizeof(rsp));
659 TU_VERIFY(request->wIndex == usbtmc_state.ep_bulk_out);
660 TU_VERIFY(tud_usbtmc_check_abort_bulk_out_cb(&rsp));
661 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&rsp,sizeof(rsp)));
662 return true;
663 }
664
665 case USBTMC_bREQUEST_INITIATE_ABORT_BULK_IN:
666 {
667 usbtmc_initiate_abort_rsp_t rsp = {
668 .bTag = usbtmc_state.lastBulkInTag,
669 };
670 TU_VERIFY(request->bmRequestType == 0xA2); // in,class,interface
671 TU_VERIFY(request->wLength == sizeof(rsp));
672 TU_VERIFY(request->wIndex == usbtmc_state.ep_bulk_in);
673 // wValue is the requested bTag to abort
674 if((usbtmc_state.state == STATE_TX_REQUESTED || usbtmc_state.state == STATE_TX_INITIATED) &&
675 usbtmc_state.lastBulkInTag == (request->wValue & 0x7Fu))
676 {
677 rsp.USBTMC_status = USBTMC_STATUS_SUCCESS;
678 usbtmc_state.transfer_size_remaining = 0u;
679 // Check if we've queued a short packet
680 criticalEnter();
681 usbtmc_state.state = ((usbtmc_state.transfer_size_sent % USBTMCD_MAX_PACKET_SIZE) == 0) ?
682 STATE_ABORTING_BULK_IN : STATE_ABORTING_BULK_IN_SHORTED;
683 criticalLeave();
684 if(usbtmc_state.transfer_size_sent == 0)
685 {
686 // Send short packet, nothing is in the buffer yet
687 TU_VERIFY( usbd_edpt_xfer(rhport, usbtmc_state.ep_bulk_in, usbtmc_state.ep_bulk_in_buf,(uint16_t)0u));
688 usbtmc_state.state = STATE_ABORTING_BULK_IN_SHORTED;
689 }
690 TU_VERIFY(tud_usbtmc_initiate_abort_bulk_in_cb(&(rsp.USBTMC_status)));
691 }
692 else if((usbtmc_state.state == STATE_TX_REQUESTED || usbtmc_state.state == STATE_TX_INITIATED))
693 { // FIXME: Unsure how to check if the OUT endpoint fifo is non-empty....
694 rsp.USBTMC_status = USBTMC_STATUS_TRANSFER_NOT_IN_PROGRESS;
695 }
696 else
697 {
698 rsp.USBTMC_status = USBTMC_STATUS_FAILED;
699 }
700 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&rsp,sizeof(rsp)));
701 return true;
702 }
703
704 case USBTMC_bREQUEST_CHECK_ABORT_BULK_IN_STATUS:
705 {
706 TU_VERIFY(request->bmRequestType == 0xA2); // in,class,EP
707 TU_VERIFY(request->wLength == 8u);
708
709 usbtmc_check_abort_bulk_rsp_t rsp =
710 {
711 .USBTMC_status = USBTMC_STATUS_FAILED,
712 .bmAbortBulkIn =
713 {
714 .BulkInFifoBytes = (usbtmc_state.state != STATE_ABORTING_BULK_IN_ABORTED)
715 },
716 .NBYTES_RXD_TXD = usbtmc_state.transfer_size_sent,
717 };
718 TU_VERIFY(tud_usbtmc_check_abort_bulk_in_cb(&rsp));
719 criticalEnter();
720 switch(usbtmc_state.state)
721 {
722 case STATE_ABORTING_BULK_IN_ABORTED:
723 rsp.USBTMC_status = USBTMC_STATUS_SUCCESS;
724 usbtmc_state.state = STATE_IDLE;
725 break;
726 case STATE_ABORTING_BULK_IN:
727 case STATE_ABORTING_BULK_OUT:
728 rsp.USBTMC_status = USBTMC_STATUS_PENDING;
729 break;
730 default:
731 break;
732 }
733 criticalLeave();
734 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&rsp,sizeof(rsp)));
735
736 return true;
737 }
738
739 case USBTMC_bREQUEST_INITIATE_CLEAR:
740 {
741 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
742 TU_VERIFY(request->wLength == sizeof(tmcStatusCode));
743 // After receiving an INITIATE_CLEAR request, the device must Halt the Bulk-OUT endpoint, queue the
744 // control endpoint response shown in Table 31, and clear all input buffers and output buffers.
745 usbd_edpt_stall(rhport, usbtmc_state.ep_bulk_out);
746 usbtmc_state.transfer_size_remaining = 0;
747 criticalEnter();
748 usbtmc_state.state = STATE_CLEARING;
749 criticalLeave();
750 TU_VERIFY(tud_usbtmc_initiate_clear_cb(&tmcStatusCode));
751 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&tmcStatusCode,sizeof(tmcStatusCode)));
752 return true;
753 }
754
755 case USBTMC_bREQUEST_CHECK_CLEAR_STATUS:
756 {
757 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
758 usbtmc_get_clear_status_rsp_t clearStatusRsp = {0};
759 TU_VERIFY(request->wLength == sizeof(clearStatusRsp));
760
761 if(usbd_edpt_busy(rhport, usbtmc_state.ep_bulk_in))
762 {
763 // Stuff stuck in TX buffer?
764 clearStatusRsp.bmClear.BulkInFifoBytes = 1;
765 clearStatusRsp.USBTMC_status = USBTMC_STATUS_PENDING;
766 }
767 else
768 {
769 // Let app check if it's clear
770 TU_VERIFY(tud_usbtmc_check_clear_cb(&clearStatusRsp));
771 }
772 if(clearStatusRsp.USBTMC_status == USBTMC_STATUS_SUCCESS)
773 {
774 criticalEnter();
775 usbtmc_state.state = STATE_IDLE;
776 criticalLeave();
777 }
778 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&clearStatusRsp,sizeof(clearStatusRsp)));
779 return true;
780 }
781
782 case USBTMC_bREQUEST_GET_CAPABILITIES:
783 {
784 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
785 TU_VERIFY(request->wLength == sizeof(*(usbtmc_state.capabilities)));
786 TU_VERIFY(tud_control_xfer(rhport, request, (void*)(uintptr_t) usbtmc_state.capabilities, sizeof(*usbtmc_state.capabilities)));
787 return true;
788 }
789 // USBTMC Optional Requests
790
791 case USBTMC_bREQUEST_INDICATOR_PULSE: // Optional
792 {
793 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
794 TU_VERIFY(request->wLength == sizeof(tmcStatusCode));
795 TU_VERIFY(usbtmc_state.capabilities->bmIntfcCapabilities.supportsIndicatorPulse);
796 TU_VERIFY(tud_usbtmc_indicator_pulse_cb(request, &tmcStatusCode));
797 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&tmcStatusCode, sizeof(tmcStatusCode)));
798 return true;
799 }
800#if (CFG_TUD_USBTMC_ENABLE_488)
801
802 // USB488 required requests
803 case USB488_bREQUEST_READ_STATUS_BYTE:
804 {
805 usbtmc_read_stb_rsp_488_t rsp;
806 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
807 TU_VERIFY(request->wLength == sizeof(rsp)); // in,class,interface
808
809 bTag = request->wValue & 0x7F;
810 TU_VERIFY(request->bmRequestType == 0xA1);
811 TU_VERIFY((request->wValue & (~0x7F)) == 0u); // Other bits are required to be zero
812 TU_VERIFY(bTag >= 0x02 && bTag <= 127);
813 TU_VERIFY(request->wIndex == usbtmc_state.itf_id);
814 TU_VERIFY(request->wLength == 0x0003);
815 rsp.bTag = (uint8_t)bTag;
816 if(usbtmc_state.ep_int_in != 0)
817 {
818 rsp.USBTMC_status = USBTMC_STATUS_SUCCESS;
819 rsp.statusByte = 0x00; // Use interrupt endpoint, instead.
820
821 usbtmc_read_stb_interrupt_488_t intMsg =
822 {
823 .bNotify1 = {
824 .one = 1,
825 .bTag = bTag & 0x7Fu,
826 },
827 .StatusByte = tud_usbtmc_get_stb_cb(&(rsp.USBTMC_status))
828 };
829 usbd_edpt_xfer(rhport, usbtmc_state.ep_int_in, (void*)&intMsg, sizeof(intMsg));
830 }
831 else
832 {
833 rsp.statusByte = tud_usbtmc_get_stb_cb(&(rsp.USBTMC_status));
834 }
835 TU_VERIFY(tud_control_xfer(rhport, request, (void*)&rsp, sizeof(rsp)));
836 return true;
837 }
838 // USB488 optional requests
839 case USB488_bREQUEST_REN_CONTROL:
840 case USB488_bREQUEST_GO_TO_LOCAL:
841 case USB488_bREQUEST_LOCAL_LOCKOUT:
842 {
843 TU_VERIFY(request->bmRequestType == 0xA1); // in,class,interface
844 TU_VERIFY(false);
845 return false;
846 }
847#endif
848
849 default:
850 TU_VERIFY(false);
851 return false;
852 }
853 TU_VERIFY(false);
854}
855
856#endif /* CFG_TUD_TSMC */