Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 *
4 * Bluetooth HCI UART driver
5 *
6 * Copyright (C) 2002-2003 Fabrizio Gennari <fabrizio.gennari@philips.com>
7 * Copyright (C) 2004-2005 Marcel Holtmann <marcel@holtmann.org>
8 */
9
10#include <linux/module.h>
11
12#include <linux/kernel.h>
13#include <linux/init.h>
14#include <linux/types.h>
15#include <linux/fcntl.h>
16#include <linux/interrupt.h>
17#include <linux/ptrace.h>
18#include <linux/poll.h>
19
20#include <linux/slab.h>
21#include <linux/tty.h>
22#include <linux/errno.h>
23#include <linux/string.h>
24#include <linux/signal.h>
25#include <linux/ioctl.h>
26#include <linux/skbuff.h>
27#include <linux/bitrev.h>
28#include <asm/unaligned.h>
29
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
32
33#include "hci_uart.h"
34
35static bool txcrc = true;
36static bool hciextn = true;
37
38#define BCSP_TXWINSIZE 4
39
40#define BCSP_ACK_PKT 0x05
41#define BCSP_LE_PKT 0x06
42
43struct bcsp_struct {
44 struct sk_buff_head unack; /* Unack'ed packets queue */
45 struct sk_buff_head rel; /* Reliable packets queue */
46 struct sk_buff_head unrel; /* Unreliable packets queue */
47
48 unsigned long rx_count;
49 struct sk_buff *rx_skb;
50 u8 rxseq_txack; /* rxseq == txack. */
51 u8 rxack; /* Last packet sent by us that the peer ack'ed */
52 struct timer_list tbcsp;
53 struct hci_uart *hu;
54
55 enum {
56 BCSP_W4_PKT_DELIMITER,
57 BCSP_W4_PKT_START,
58 BCSP_W4_BCSP_HDR,
59 BCSP_W4_DATA,
60 BCSP_W4_CRC
61 } rx_state;
62
63 enum {
64 BCSP_ESCSTATE_NOESC,
65 BCSP_ESCSTATE_ESC
66 } rx_esc_state;
67
68 u8 use_crc;
69 u16 message_crc;
70 u8 txack_req; /* Do we need to send ack's to the peer? */
71
72 /* Reliable packet sequence number - used to assign seq to each rel pkt. */
73 u8 msgq_txseq;
74};
75
76/* ---- BCSP CRC calculation ---- */
77
78/* Table for calculating CRC for polynomial 0x1021, LSB processed first,
79 * initial value 0xffff, bits shifted in reverse order.
80 */
81
82static const u16 crc_table[] = {
83 0x0000, 0x1081, 0x2102, 0x3183,
84 0x4204, 0x5285, 0x6306, 0x7387,
85 0x8408, 0x9489, 0xa50a, 0xb58b,
86 0xc60c, 0xd68d, 0xe70e, 0xf78f
87};
88
89/* Initialise the crc calculator */
90#define BCSP_CRC_INIT(x) x = 0xffff
91
92/* Update crc with next data byte
93 *
94 * Implementation note
95 * The data byte is treated as two nibbles. The crc is generated
96 * in reverse, i.e., bits are fed into the register from the top.
97 */
98static void bcsp_crc_update(u16 *crc, u8 d)
99{
100 u16 reg = *crc;
101
102 reg = (reg >> 4) ^ crc_table[(reg ^ d) & 0x000f];
103 reg = (reg >> 4) ^ crc_table[(reg ^ (d >> 4)) & 0x000f];
104
105 *crc = reg;
106}
107
108/* ---- BCSP core ---- */
109
110static void bcsp_slip_msgdelim(struct sk_buff *skb)
111{
112 const char pkt_delim = 0xc0;
113
114 skb_put_data(skb, &pkt_delim, 1);
115}
116
117static void bcsp_slip_one_byte(struct sk_buff *skb, u8 c)
118{
119 const char esc_c0[2] = { 0xdb, 0xdc };
120 const char esc_db[2] = { 0xdb, 0xdd };
121
122 switch (c) {
123 case 0xc0:
124 skb_put_data(skb, &esc_c0, 2);
125 break;
126 case 0xdb:
127 skb_put_data(skb, &esc_db, 2);
128 break;
129 default:
130 skb_put_data(skb, &c, 1);
131 }
132}
133
134static int bcsp_enqueue(struct hci_uart *hu, struct sk_buff *skb)
135{
136 struct bcsp_struct *bcsp = hu->priv;
137
138 if (skb->len > 0xFFF) {
139 BT_ERR("Packet too long");
140 kfree_skb(skb);
141 return 0;
142 }
143
144 switch (hci_skb_pkt_type(skb)) {
145 case HCI_ACLDATA_PKT:
146 case HCI_COMMAND_PKT:
147 skb_queue_tail(&bcsp->rel, skb);
148 break;
149
150 case HCI_SCODATA_PKT:
151 skb_queue_tail(&bcsp->unrel, skb);
152 break;
153
154 default:
155 BT_ERR("Unknown packet type");
156 kfree_skb(skb);
157 break;
158 }
159
160 return 0;
161}
162
163static struct sk_buff *bcsp_prepare_pkt(struct bcsp_struct *bcsp, u8 *data,
164 int len, int pkt_type)
165{
166 struct sk_buff *nskb;
167 u8 hdr[4], chan;
168 u16 BCSP_CRC_INIT(bcsp_txmsg_crc);
169 int rel, i;
170
171 switch (pkt_type) {
172 case HCI_ACLDATA_PKT:
173 chan = 6; /* BCSP ACL channel */
174 rel = 1; /* reliable channel */
175 break;
176 case HCI_COMMAND_PKT:
177 chan = 5; /* BCSP cmd/evt channel */
178 rel = 1; /* reliable channel */
179 break;
180 case HCI_SCODATA_PKT:
181 chan = 7; /* BCSP SCO channel */
182 rel = 0; /* unreliable channel */
183 break;
184 case BCSP_LE_PKT:
185 chan = 1; /* BCSP LE channel */
186 rel = 0; /* unreliable channel */
187 break;
188 case BCSP_ACK_PKT:
189 chan = 0; /* BCSP internal channel */
190 rel = 0; /* unreliable channel */
191 break;
192 default:
193 BT_ERR("Unknown packet type");
194 return NULL;
195 }
196
197 if (hciextn && chan == 5) {
198 __le16 opcode = ((struct hci_command_hdr *)data)->opcode;
199
200 /* Vendor specific commands */
201 if (hci_opcode_ogf(__le16_to_cpu(opcode)) == 0x3f) {
202 u8 desc = *(data + HCI_COMMAND_HDR_SIZE);
203
204 if ((desc & 0xf0) == 0xc0) {
205 data += HCI_COMMAND_HDR_SIZE + 1;
206 len -= HCI_COMMAND_HDR_SIZE + 1;
207 chan = desc & 0x0f;
208 }
209 }
210 }
211
212 /* Max len of packet: (original len +4(bcsp hdr) +2(crc))*2
213 * (because bytes 0xc0 and 0xdb are escaped, worst case is
214 * when the packet is all made of 0xc0 and 0xdb :) )
215 * + 2 (0xc0 delimiters at start and end).
216 */
217
218 nskb = alloc_skb((len + 6) * 2 + 2, GFP_ATOMIC);
219 if (!nskb)
220 return NULL;
221
222 hci_skb_pkt_type(nskb) = pkt_type;
223
224 bcsp_slip_msgdelim(nskb);
225
226 hdr[0] = bcsp->rxseq_txack << 3;
227 bcsp->txack_req = 0;
228 BT_DBG("We request packet no %u to card", bcsp->rxseq_txack);
229
230 if (rel) {
231 hdr[0] |= 0x80 + bcsp->msgq_txseq;
232 BT_DBG("Sending packet with seqno %u", bcsp->msgq_txseq);
233 bcsp->msgq_txseq = (bcsp->msgq_txseq + 1) & 0x07;
234 }
235
236 if (bcsp->use_crc)
237 hdr[0] |= 0x40;
238
239 hdr[1] = ((len << 4) & 0xff) | chan;
240 hdr[2] = len >> 4;
241 hdr[3] = ~(hdr[0] + hdr[1] + hdr[2]);
242
243 /* Put BCSP header */
244 for (i = 0; i < 4; i++) {
245 bcsp_slip_one_byte(nskb, hdr[i]);
246
247 if (bcsp->use_crc)
248 bcsp_crc_update(&bcsp_txmsg_crc, hdr[i]);
249 }
250
251 /* Put payload */
252 for (i = 0; i < len; i++) {
253 bcsp_slip_one_byte(nskb, data[i]);
254
255 if (bcsp->use_crc)
256 bcsp_crc_update(&bcsp_txmsg_crc, data[i]);
257 }
258
259 /* Put CRC */
260 if (bcsp->use_crc) {
261 bcsp_txmsg_crc = bitrev16(bcsp_txmsg_crc);
262 bcsp_slip_one_byte(nskb, (u8)((bcsp_txmsg_crc >> 8) & 0x00ff));
263 bcsp_slip_one_byte(nskb, (u8)(bcsp_txmsg_crc & 0x00ff));
264 }
265
266 bcsp_slip_msgdelim(nskb);
267 return nskb;
268}
269
270/* This is a rewrite of pkt_avail in ABCSP */
271static struct sk_buff *bcsp_dequeue(struct hci_uart *hu)
272{
273 struct bcsp_struct *bcsp = hu->priv;
274 unsigned long flags;
275 struct sk_buff *skb;
276
277 /* First of all, check for unreliable messages in the queue,
278 * since they have priority
279 */
280
281 skb = skb_dequeue(&bcsp->unrel);
282 if (skb != NULL) {
283 struct sk_buff *nskb;
284
285 nskb = bcsp_prepare_pkt(bcsp, skb->data, skb->len,
286 hci_skb_pkt_type(skb));
287 if (nskb) {
288 kfree_skb(skb);
289 return nskb;
290 } else {
291 skb_queue_head(&bcsp->unrel, skb);
292 BT_ERR("Could not dequeue pkt because alloc_skb failed");
293 }
294 }
295
296 /* Now, try to send a reliable pkt. We can only send a
297 * reliable packet if the number of packets sent but not yet ack'ed
298 * is < than the winsize
299 */
300
301 spin_lock_irqsave_nested(&bcsp->unack.lock, flags, SINGLE_DEPTH_NESTING);
302
303 if (bcsp->unack.qlen < BCSP_TXWINSIZE) {
304 skb = skb_dequeue(&bcsp->rel);
305 if (skb != NULL) {
306 struct sk_buff *nskb;
307
308 nskb = bcsp_prepare_pkt(bcsp, skb->data, skb->len,
309 hci_skb_pkt_type(skb));
310 if (nskb) {
311 __skb_queue_tail(&bcsp->unack, skb);
312 mod_timer(&bcsp->tbcsp, jiffies + HZ / 4);
313 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
314 return nskb;
315 } else {
316 skb_queue_head(&bcsp->rel, skb);
317 BT_ERR("Could not dequeue pkt because alloc_skb failed");
318 }
319 }
320 }
321
322 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
323
324 /* We could not send a reliable packet, either because there are
325 * none or because there are too many unack'ed pkts. Did we receive
326 * any packets we have not acknowledged yet ?
327 */
328
329 if (bcsp->txack_req) {
330 /* if so, craft an empty ACK pkt and send it on BCSP unreliable
331 * channel 0
332 */
333 struct sk_buff *nskb = bcsp_prepare_pkt(bcsp, NULL, 0, BCSP_ACK_PKT);
334 return nskb;
335 }
336
337 /* We have nothing to send */
338 return NULL;
339}
340
341static int bcsp_flush(struct hci_uart *hu)
342{
343 BT_DBG("hu %p", hu);
344 return 0;
345}
346
347/* Remove ack'ed packets */
348static void bcsp_pkt_cull(struct bcsp_struct *bcsp)
349{
350 struct sk_buff *skb, *tmp;
351 unsigned long flags;
352 int i, pkts_to_be_removed;
353 u8 seqno;
354
355 spin_lock_irqsave(&bcsp->unack.lock, flags);
356
357 pkts_to_be_removed = skb_queue_len(&bcsp->unack);
358 seqno = bcsp->msgq_txseq;
359
360 while (pkts_to_be_removed) {
361 if (bcsp->rxack == seqno)
362 break;
363 pkts_to_be_removed--;
364 seqno = (seqno - 1) & 0x07;
365 }
366
367 if (bcsp->rxack != seqno)
368 BT_ERR("Peer acked invalid packet");
369
370 BT_DBG("Removing %u pkts out of %u, up to seqno %u",
371 pkts_to_be_removed, skb_queue_len(&bcsp->unack),
372 (seqno - 1) & 0x07);
373
374 i = 0;
375 skb_queue_walk_safe(&bcsp->unack, skb, tmp) {
376 if (i >= pkts_to_be_removed)
377 break;
378 i++;
379
380 __skb_unlink(skb, &bcsp->unack);
381 dev_kfree_skb_irq(skb);
382 }
383
384 if (skb_queue_empty(&bcsp->unack))
385 del_timer(&bcsp->tbcsp);
386
387 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
388
389 if (i != pkts_to_be_removed)
390 BT_ERR("Removed only %u out of %u pkts", i, pkts_to_be_removed);
391}
392
393/* Handle BCSP link-establishment packets. When we
394 * detect a "sync" packet, symptom that the BT module has reset,
395 * we do nothing :) (yet)
396 */
397static void bcsp_handle_le_pkt(struct hci_uart *hu)
398{
399 struct bcsp_struct *bcsp = hu->priv;
400 u8 conf_pkt[4] = { 0xad, 0xef, 0xac, 0xed };
401 u8 conf_rsp_pkt[4] = { 0xde, 0xad, 0xd0, 0xd0 };
402 u8 sync_pkt[4] = { 0xda, 0xdc, 0xed, 0xed };
403
404 /* spot "conf" pkts and reply with a "conf rsp" pkt */
405 if (bcsp->rx_skb->data[1] >> 4 == 4 && bcsp->rx_skb->data[2] == 0 &&
406 !memcmp(&bcsp->rx_skb->data[4], conf_pkt, 4)) {
407 struct sk_buff *nskb = alloc_skb(4, GFP_ATOMIC);
408
409 BT_DBG("Found a LE conf pkt");
410 if (!nskb)
411 return;
412 skb_put_data(nskb, conf_rsp_pkt, 4);
413 hci_skb_pkt_type(nskb) = BCSP_LE_PKT;
414
415 skb_queue_head(&bcsp->unrel, nskb);
416 hci_uart_tx_wakeup(hu);
417 }
418 /* Spot "sync" pkts. If we find one...disaster! */
419 else if (bcsp->rx_skb->data[1] >> 4 == 4 && bcsp->rx_skb->data[2] == 0 &&
420 !memcmp(&bcsp->rx_skb->data[4], sync_pkt, 4)) {
421 BT_ERR("Found a LE sync pkt, card has reset");
422 }
423}
424
425static inline void bcsp_unslip_one_byte(struct bcsp_struct *bcsp, unsigned char byte)
426{
427 const u8 c0 = 0xc0, db = 0xdb;
428
429 switch (bcsp->rx_esc_state) {
430 case BCSP_ESCSTATE_NOESC:
431 switch (byte) {
432 case 0xdb:
433 bcsp->rx_esc_state = BCSP_ESCSTATE_ESC;
434 break;
435 default:
436 skb_put_data(bcsp->rx_skb, &byte, 1);
437 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
438 bcsp->rx_state != BCSP_W4_CRC)
439 bcsp_crc_update(&bcsp->message_crc, byte);
440 bcsp->rx_count--;
441 }
442 break;
443
444 case BCSP_ESCSTATE_ESC:
445 switch (byte) {
446 case 0xdc:
447 skb_put_data(bcsp->rx_skb, &c0, 1);
448 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
449 bcsp->rx_state != BCSP_W4_CRC)
450 bcsp_crc_update(&bcsp->message_crc, 0xc0);
451 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
452 bcsp->rx_count--;
453 break;
454
455 case 0xdd:
456 skb_put_data(bcsp->rx_skb, &db, 1);
457 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
458 bcsp->rx_state != BCSP_W4_CRC)
459 bcsp_crc_update(&bcsp->message_crc, 0xdb);
460 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
461 bcsp->rx_count--;
462 break;
463
464 default:
465 BT_ERR("Invalid byte %02x after esc byte", byte);
466 kfree_skb(bcsp->rx_skb);
467 bcsp->rx_skb = NULL;
468 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
469 bcsp->rx_count = 0;
470 }
471 }
472}
473
474static void bcsp_complete_rx_pkt(struct hci_uart *hu)
475{
476 struct bcsp_struct *bcsp = hu->priv;
477 int pass_up = 0;
478
479 if (bcsp->rx_skb->data[0] & 0x80) { /* reliable pkt */
480 BT_DBG("Received seqno %u from card", bcsp->rxseq_txack);
481
482 /* check the rx sequence number is as expected */
483 if ((bcsp->rx_skb->data[0] & 0x07) == bcsp->rxseq_txack) {
484 bcsp->rxseq_txack++;
485 bcsp->rxseq_txack %= 0x8;
486 } else {
487 /* handle re-transmitted packet or
488 * when packet was missed
489 */
490 BT_ERR("Out-of-order packet arrived, got %u expected %u",
491 bcsp->rx_skb->data[0] & 0x07, bcsp->rxseq_txack);
492
493 /* do not process out-of-order packet payload */
494 pass_up = 2;
495 }
496
497 /* send current txack value to all received reliable packets */
498 bcsp->txack_req = 1;
499
500 /* If needed, transmit an ack pkt */
501 hci_uart_tx_wakeup(hu);
502 }
503
504 bcsp->rxack = (bcsp->rx_skb->data[0] >> 3) & 0x07;
505 BT_DBG("Request for pkt %u from card", bcsp->rxack);
506
507 /* handle received ACK indications,
508 * including those from out-of-order packets
509 */
510 bcsp_pkt_cull(bcsp);
511
512 if (pass_up != 2) {
513 if ((bcsp->rx_skb->data[1] & 0x0f) == 6 &&
514 (bcsp->rx_skb->data[0] & 0x80)) {
515 hci_skb_pkt_type(bcsp->rx_skb) = HCI_ACLDATA_PKT;
516 pass_up = 1;
517 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 5 &&
518 (bcsp->rx_skb->data[0] & 0x80)) {
519 hci_skb_pkt_type(bcsp->rx_skb) = HCI_EVENT_PKT;
520 pass_up = 1;
521 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 7) {
522 hci_skb_pkt_type(bcsp->rx_skb) = HCI_SCODATA_PKT;
523 pass_up = 1;
524 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 1 &&
525 !(bcsp->rx_skb->data[0] & 0x80)) {
526 bcsp_handle_le_pkt(hu);
527 pass_up = 0;
528 } else {
529 pass_up = 0;
530 }
531 }
532
533 if (pass_up == 0) {
534 struct hci_event_hdr hdr;
535 u8 desc = (bcsp->rx_skb->data[1] & 0x0f);
536
537 if (desc != 0 && desc != 1) {
538 if (hciextn) {
539 desc |= 0xc0;
540 skb_pull(bcsp->rx_skb, 4);
541 memcpy(skb_push(bcsp->rx_skb, 1), &desc, 1);
542
543 hdr.evt = 0xff;
544 hdr.plen = bcsp->rx_skb->len;
545 memcpy(skb_push(bcsp->rx_skb, HCI_EVENT_HDR_SIZE), &hdr, HCI_EVENT_HDR_SIZE);
546 hci_skb_pkt_type(bcsp->rx_skb) = HCI_EVENT_PKT;
547
548 hci_recv_frame(hu->hdev, bcsp->rx_skb);
549 } else {
550 BT_ERR("Packet for unknown channel (%u %s)",
551 bcsp->rx_skb->data[1] & 0x0f,
552 bcsp->rx_skb->data[0] & 0x80 ?
553 "reliable" : "unreliable");
554 kfree_skb(bcsp->rx_skb);
555 }
556 } else
557 kfree_skb(bcsp->rx_skb);
558 } else if (pass_up == 1) {
559 /* Pull out BCSP hdr */
560 skb_pull(bcsp->rx_skb, 4);
561
562 hci_recv_frame(hu->hdev, bcsp->rx_skb);
563 } else {
564 /* ignore packet payload of already ACKed re-transmitted
565 * packets or when a packet was missed in the BCSP window
566 */
567 kfree_skb(bcsp->rx_skb);
568 }
569
570 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
571 bcsp->rx_skb = NULL;
572}
573
574static u16 bscp_get_crc(struct bcsp_struct *bcsp)
575{
576 return get_unaligned_be16(&bcsp->rx_skb->data[bcsp->rx_skb->len - 2]);
577}
578
579/* Recv data */
580static int bcsp_recv(struct hci_uart *hu, const void *data, int count)
581{
582 struct bcsp_struct *bcsp = hu->priv;
583 const unsigned char *ptr;
584
585 BT_DBG("hu %p count %d rx_state %d rx_count %ld",
586 hu, count, bcsp->rx_state, bcsp->rx_count);
587
588 ptr = data;
589 while (count) {
590 if (bcsp->rx_count) {
591 if (*ptr == 0xc0) {
592 BT_ERR("Short BCSP packet");
593 kfree_skb(bcsp->rx_skb);
594 bcsp->rx_skb = NULL;
595 bcsp->rx_state = BCSP_W4_PKT_START;
596 bcsp->rx_count = 0;
597 } else
598 bcsp_unslip_one_byte(bcsp, *ptr);
599
600 ptr++; count--;
601 continue;
602 }
603
604 switch (bcsp->rx_state) {
605 case BCSP_W4_BCSP_HDR:
606 if ((0xff & (u8)~(bcsp->rx_skb->data[0] + bcsp->rx_skb->data[1] +
607 bcsp->rx_skb->data[2])) != bcsp->rx_skb->data[3]) {
608 BT_ERR("Error in BCSP hdr checksum");
609 kfree_skb(bcsp->rx_skb);
610 bcsp->rx_skb = NULL;
611 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
612 bcsp->rx_count = 0;
613 continue;
614 }
615 bcsp->rx_state = BCSP_W4_DATA;
616 bcsp->rx_count = (bcsp->rx_skb->data[1] >> 4) +
617 (bcsp->rx_skb->data[2] << 4); /* May be 0 */
618 continue;
619
620 case BCSP_W4_DATA:
621 if (bcsp->rx_skb->data[0] & 0x40) { /* pkt with crc */
622 bcsp->rx_state = BCSP_W4_CRC;
623 bcsp->rx_count = 2;
624 } else
625 bcsp_complete_rx_pkt(hu);
626 continue;
627
628 case BCSP_W4_CRC:
629 if (bitrev16(bcsp->message_crc) != bscp_get_crc(bcsp)) {
630 BT_ERR("Checksum failed: computed %04x received %04x",
631 bitrev16(bcsp->message_crc),
632 bscp_get_crc(bcsp));
633
634 kfree_skb(bcsp->rx_skb);
635 bcsp->rx_skb = NULL;
636 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
637 bcsp->rx_count = 0;
638 continue;
639 }
640 skb_trim(bcsp->rx_skb, bcsp->rx_skb->len - 2);
641 bcsp_complete_rx_pkt(hu);
642 continue;
643
644 case BCSP_W4_PKT_DELIMITER:
645 switch (*ptr) {
646 case 0xc0:
647 bcsp->rx_state = BCSP_W4_PKT_START;
648 break;
649 default:
650 /*BT_ERR("Ignoring byte %02x", *ptr);*/
651 break;
652 }
653 ptr++; count--;
654 break;
655
656 case BCSP_W4_PKT_START:
657 switch (*ptr) {
658 case 0xc0:
659 ptr++; count--;
660 break;
661
662 default:
663 bcsp->rx_state = BCSP_W4_BCSP_HDR;
664 bcsp->rx_count = 4;
665 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
666 BCSP_CRC_INIT(bcsp->message_crc);
667
668 /* Do not increment ptr or decrement count
669 * Allocate packet. Max len of a BCSP pkt=
670 * 0xFFF (payload) +4 (header) +2 (crc)
671 */
672
673 bcsp->rx_skb = bt_skb_alloc(0x1005, GFP_ATOMIC);
674 if (!bcsp->rx_skb) {
675 BT_ERR("Can't allocate mem for new packet");
676 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
677 bcsp->rx_count = 0;
678 return 0;
679 }
680 break;
681 }
682 break;
683 }
684 }
685 return count;
686}
687
688 /* Arrange to retransmit all messages in the relq. */
689static void bcsp_timed_event(struct timer_list *t)
690{
691 struct bcsp_struct *bcsp = from_timer(bcsp, t, tbcsp);
692 struct hci_uart *hu = bcsp->hu;
693 struct sk_buff *skb;
694 unsigned long flags;
695
696 BT_DBG("hu %p retransmitting %u pkts", hu, bcsp->unack.qlen);
697
698 spin_lock_irqsave_nested(&bcsp->unack.lock, flags, SINGLE_DEPTH_NESTING);
699
700 while ((skb = __skb_dequeue_tail(&bcsp->unack)) != NULL) {
701 bcsp->msgq_txseq = (bcsp->msgq_txseq - 1) & 0x07;
702 skb_queue_head(&bcsp->rel, skb);
703 }
704
705 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
706
707 hci_uart_tx_wakeup(hu);
708}
709
710static int bcsp_open(struct hci_uart *hu)
711{
712 struct bcsp_struct *bcsp;
713
714 BT_DBG("hu %p", hu);
715
716 bcsp = kzalloc(sizeof(*bcsp), GFP_KERNEL);
717 if (!bcsp)
718 return -ENOMEM;
719
720 hu->priv = bcsp;
721 bcsp->hu = hu;
722 skb_queue_head_init(&bcsp->unack);
723 skb_queue_head_init(&bcsp->rel);
724 skb_queue_head_init(&bcsp->unrel);
725
726 timer_setup(&bcsp->tbcsp, bcsp_timed_event, 0);
727
728 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
729
730 if (txcrc)
731 bcsp->use_crc = 1;
732
733 return 0;
734}
735
736static int bcsp_close(struct hci_uart *hu)
737{
738 struct bcsp_struct *bcsp = hu->priv;
739
740 timer_shutdown_sync(&bcsp->tbcsp);
741
742 hu->priv = NULL;
743
744 BT_DBG("hu %p", hu);
745
746 skb_queue_purge(&bcsp->unack);
747 skb_queue_purge(&bcsp->rel);
748 skb_queue_purge(&bcsp->unrel);
749
750 if (bcsp->rx_skb) {
751 kfree_skb(bcsp->rx_skb);
752 bcsp->rx_skb = NULL;
753 }
754
755 kfree(bcsp);
756 return 0;
757}
758
759static const struct hci_uart_proto bcsp = {
760 .id = HCI_UART_BCSP,
761 .name = "BCSP",
762 .open = bcsp_open,
763 .close = bcsp_close,
764 .enqueue = bcsp_enqueue,
765 .dequeue = bcsp_dequeue,
766 .recv = bcsp_recv,
767 .flush = bcsp_flush
768};
769
770int __init bcsp_init(void)
771{
772 return hci_uart_register_proto(&bcsp);
773}
774
775int __exit bcsp_deinit(void)
776{
777 return hci_uart_unregister_proto(&bcsp);
778}
779
780module_param(txcrc, bool, 0644);
781MODULE_PARM_DESC(txcrc, "Transmit CRC with every BCSP packet");
782
783module_param(hciextn, bool, 0644);
784MODULE_PARM_DESC(hciextn, "Convert HCI Extensions into BCSP packets");
1/*
2 *
3 * Bluetooth HCI UART driver
4 *
5 * Copyright (C) 2002-2003 Fabrizio Gennari <fabrizio.gennari@philips.com>
6 * Copyright (C) 2004-2005 Marcel Holtmann <marcel@holtmann.org>
7 *
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 *
23 */
24
25#include <linux/module.h>
26
27#include <linux/kernel.h>
28#include <linux/init.h>
29#include <linux/types.h>
30#include <linux/fcntl.h>
31#include <linux/interrupt.h>
32#include <linux/ptrace.h>
33#include <linux/poll.h>
34
35#include <linux/slab.h>
36#include <linux/tty.h>
37#include <linux/errno.h>
38#include <linux/string.h>
39#include <linux/signal.h>
40#include <linux/ioctl.h>
41#include <linux/skbuff.h>
42#include <linux/bitrev.h>
43#include <asm/unaligned.h>
44
45#include <net/bluetooth/bluetooth.h>
46#include <net/bluetooth/hci_core.h>
47
48#include "hci_uart.h"
49
50static bool txcrc = true;
51static bool hciextn = true;
52
53#define BCSP_TXWINSIZE 4
54
55#define BCSP_ACK_PKT 0x05
56#define BCSP_LE_PKT 0x06
57
58struct bcsp_struct {
59 struct sk_buff_head unack; /* Unack'ed packets queue */
60 struct sk_buff_head rel; /* Reliable packets queue */
61 struct sk_buff_head unrel; /* Unreliable packets queue */
62
63 unsigned long rx_count;
64 struct sk_buff *rx_skb;
65 u8 rxseq_txack; /* rxseq == txack. */
66 u8 rxack; /* Last packet sent by us that the peer ack'ed */
67 struct timer_list tbcsp;
68 struct hci_uart *hu;
69
70 enum {
71 BCSP_W4_PKT_DELIMITER,
72 BCSP_W4_PKT_START,
73 BCSP_W4_BCSP_HDR,
74 BCSP_W4_DATA,
75 BCSP_W4_CRC
76 } rx_state;
77
78 enum {
79 BCSP_ESCSTATE_NOESC,
80 BCSP_ESCSTATE_ESC
81 } rx_esc_state;
82
83 u8 use_crc;
84 u16 message_crc;
85 u8 txack_req; /* Do we need to send ack's to the peer? */
86
87 /* Reliable packet sequence number - used to assign seq to each rel pkt. */
88 u8 msgq_txseq;
89};
90
91/* ---- BCSP CRC calculation ---- */
92
93/* Table for calculating CRC for polynomial 0x1021, LSB processed first,
94 * initial value 0xffff, bits shifted in reverse order.
95 */
96
97static const u16 crc_table[] = {
98 0x0000, 0x1081, 0x2102, 0x3183,
99 0x4204, 0x5285, 0x6306, 0x7387,
100 0x8408, 0x9489, 0xa50a, 0xb58b,
101 0xc60c, 0xd68d, 0xe70e, 0xf78f
102};
103
104/* Initialise the crc calculator */
105#define BCSP_CRC_INIT(x) x = 0xffff
106
107/* Update crc with next data byte
108 *
109 * Implementation note
110 * The data byte is treated as two nibbles. The crc is generated
111 * in reverse, i.e., bits are fed into the register from the top.
112 */
113static void bcsp_crc_update(u16 *crc, u8 d)
114{
115 u16 reg = *crc;
116
117 reg = (reg >> 4) ^ crc_table[(reg ^ d) & 0x000f];
118 reg = (reg >> 4) ^ crc_table[(reg ^ (d >> 4)) & 0x000f];
119
120 *crc = reg;
121}
122
123/* ---- BCSP core ---- */
124
125static void bcsp_slip_msgdelim(struct sk_buff *skb)
126{
127 const char pkt_delim = 0xc0;
128
129 skb_put_data(skb, &pkt_delim, 1);
130}
131
132static void bcsp_slip_one_byte(struct sk_buff *skb, u8 c)
133{
134 const char esc_c0[2] = { 0xdb, 0xdc };
135 const char esc_db[2] = { 0xdb, 0xdd };
136
137 switch (c) {
138 case 0xc0:
139 skb_put_data(skb, &esc_c0, 2);
140 break;
141 case 0xdb:
142 skb_put_data(skb, &esc_db, 2);
143 break;
144 default:
145 skb_put_data(skb, &c, 1);
146 }
147}
148
149static int bcsp_enqueue(struct hci_uart *hu, struct sk_buff *skb)
150{
151 struct bcsp_struct *bcsp = hu->priv;
152
153 if (skb->len > 0xFFF) {
154 BT_ERR("Packet too long");
155 kfree_skb(skb);
156 return 0;
157 }
158
159 switch (hci_skb_pkt_type(skb)) {
160 case HCI_ACLDATA_PKT:
161 case HCI_COMMAND_PKT:
162 skb_queue_tail(&bcsp->rel, skb);
163 break;
164
165 case HCI_SCODATA_PKT:
166 skb_queue_tail(&bcsp->unrel, skb);
167 break;
168
169 default:
170 BT_ERR("Unknown packet type");
171 kfree_skb(skb);
172 break;
173 }
174
175 return 0;
176}
177
178static struct sk_buff *bcsp_prepare_pkt(struct bcsp_struct *bcsp, u8 *data,
179 int len, int pkt_type)
180{
181 struct sk_buff *nskb;
182 u8 hdr[4], chan;
183 u16 BCSP_CRC_INIT(bcsp_txmsg_crc);
184 int rel, i;
185
186 switch (pkt_type) {
187 case HCI_ACLDATA_PKT:
188 chan = 6; /* BCSP ACL channel */
189 rel = 1; /* reliable channel */
190 break;
191 case HCI_COMMAND_PKT:
192 chan = 5; /* BCSP cmd/evt channel */
193 rel = 1; /* reliable channel */
194 break;
195 case HCI_SCODATA_PKT:
196 chan = 7; /* BCSP SCO channel */
197 rel = 0; /* unreliable channel */
198 break;
199 case BCSP_LE_PKT:
200 chan = 1; /* BCSP LE channel */
201 rel = 0; /* unreliable channel */
202 break;
203 case BCSP_ACK_PKT:
204 chan = 0; /* BCSP internal channel */
205 rel = 0; /* unreliable channel */
206 break;
207 default:
208 BT_ERR("Unknown packet type");
209 return NULL;
210 }
211
212 if (hciextn && chan == 5) {
213 __le16 opcode = ((struct hci_command_hdr *)data)->opcode;
214
215 /* Vendor specific commands */
216 if (hci_opcode_ogf(__le16_to_cpu(opcode)) == 0x3f) {
217 u8 desc = *(data + HCI_COMMAND_HDR_SIZE);
218
219 if ((desc & 0xf0) == 0xc0) {
220 data += HCI_COMMAND_HDR_SIZE + 1;
221 len -= HCI_COMMAND_HDR_SIZE + 1;
222 chan = desc & 0x0f;
223 }
224 }
225 }
226
227 /* Max len of packet: (original len +4(bcsp hdr) +2(crc))*2
228 * (because bytes 0xc0 and 0xdb are escaped, worst case is
229 * when the packet is all made of 0xc0 and 0xdb :) )
230 * + 2 (0xc0 delimiters at start and end).
231 */
232
233 nskb = alloc_skb((len + 6) * 2 + 2, GFP_ATOMIC);
234 if (!nskb)
235 return NULL;
236
237 hci_skb_pkt_type(nskb) = pkt_type;
238
239 bcsp_slip_msgdelim(nskb);
240
241 hdr[0] = bcsp->rxseq_txack << 3;
242 bcsp->txack_req = 0;
243 BT_DBG("We request packet no %u to card", bcsp->rxseq_txack);
244
245 if (rel) {
246 hdr[0] |= 0x80 + bcsp->msgq_txseq;
247 BT_DBG("Sending packet with seqno %u", bcsp->msgq_txseq);
248 bcsp->msgq_txseq = (bcsp->msgq_txseq + 1) & 0x07;
249 }
250
251 if (bcsp->use_crc)
252 hdr[0] |= 0x40;
253
254 hdr[1] = ((len << 4) & 0xff) | chan;
255 hdr[2] = len >> 4;
256 hdr[3] = ~(hdr[0] + hdr[1] + hdr[2]);
257
258 /* Put BCSP header */
259 for (i = 0; i < 4; i++) {
260 bcsp_slip_one_byte(nskb, hdr[i]);
261
262 if (bcsp->use_crc)
263 bcsp_crc_update(&bcsp_txmsg_crc, hdr[i]);
264 }
265
266 /* Put payload */
267 for (i = 0; i < len; i++) {
268 bcsp_slip_one_byte(nskb, data[i]);
269
270 if (bcsp->use_crc)
271 bcsp_crc_update(&bcsp_txmsg_crc, data[i]);
272 }
273
274 /* Put CRC */
275 if (bcsp->use_crc) {
276 bcsp_txmsg_crc = bitrev16(bcsp_txmsg_crc);
277 bcsp_slip_one_byte(nskb, (u8)((bcsp_txmsg_crc >> 8) & 0x00ff));
278 bcsp_slip_one_byte(nskb, (u8)(bcsp_txmsg_crc & 0x00ff));
279 }
280
281 bcsp_slip_msgdelim(nskb);
282 return nskb;
283}
284
285/* This is a rewrite of pkt_avail in ABCSP */
286static struct sk_buff *bcsp_dequeue(struct hci_uart *hu)
287{
288 struct bcsp_struct *bcsp = hu->priv;
289 unsigned long flags;
290 struct sk_buff *skb;
291
292 /* First of all, check for unreliable messages in the queue,
293 * since they have priority
294 */
295
296 skb = skb_dequeue(&bcsp->unrel);
297 if (skb != NULL) {
298 struct sk_buff *nskb;
299
300 nskb = bcsp_prepare_pkt(bcsp, skb->data, skb->len,
301 hci_skb_pkt_type(skb));
302 if (nskb) {
303 kfree_skb(skb);
304 return nskb;
305 } else {
306 skb_queue_head(&bcsp->unrel, skb);
307 BT_ERR("Could not dequeue pkt because alloc_skb failed");
308 }
309 }
310
311 /* Now, try to send a reliable pkt. We can only send a
312 * reliable packet if the number of packets sent but not yet ack'ed
313 * is < than the winsize
314 */
315
316 spin_lock_irqsave_nested(&bcsp->unack.lock, flags, SINGLE_DEPTH_NESTING);
317
318 if (bcsp->unack.qlen < BCSP_TXWINSIZE) {
319 skb = skb_dequeue(&bcsp->rel);
320 if (skb != NULL) {
321 struct sk_buff *nskb;
322
323 nskb = bcsp_prepare_pkt(bcsp, skb->data, skb->len,
324 hci_skb_pkt_type(skb));
325 if (nskb) {
326 __skb_queue_tail(&bcsp->unack, skb);
327 mod_timer(&bcsp->tbcsp, jiffies + HZ / 4);
328 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
329 return nskb;
330 } else {
331 skb_queue_head(&bcsp->rel, skb);
332 BT_ERR("Could not dequeue pkt because alloc_skb failed");
333 }
334 }
335 }
336
337 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
338
339 /* We could not send a reliable packet, either because there are
340 * none or because there are too many unack'ed pkts. Did we receive
341 * any packets we have not acknowledged yet ?
342 */
343
344 if (bcsp->txack_req) {
345 /* if so, craft an empty ACK pkt and send it on BCSP unreliable
346 * channel 0
347 */
348 struct sk_buff *nskb = bcsp_prepare_pkt(bcsp, NULL, 0, BCSP_ACK_PKT);
349 return nskb;
350 }
351
352 /* We have nothing to send */
353 return NULL;
354}
355
356static int bcsp_flush(struct hci_uart *hu)
357{
358 BT_DBG("hu %p", hu);
359 return 0;
360}
361
362/* Remove ack'ed packets */
363static void bcsp_pkt_cull(struct bcsp_struct *bcsp)
364{
365 struct sk_buff *skb, *tmp;
366 unsigned long flags;
367 int i, pkts_to_be_removed;
368 u8 seqno;
369
370 spin_lock_irqsave(&bcsp->unack.lock, flags);
371
372 pkts_to_be_removed = skb_queue_len(&bcsp->unack);
373 seqno = bcsp->msgq_txseq;
374
375 while (pkts_to_be_removed) {
376 if (bcsp->rxack == seqno)
377 break;
378 pkts_to_be_removed--;
379 seqno = (seqno - 1) & 0x07;
380 }
381
382 if (bcsp->rxack != seqno)
383 BT_ERR("Peer acked invalid packet");
384
385 BT_DBG("Removing %u pkts out of %u, up to seqno %u",
386 pkts_to_be_removed, skb_queue_len(&bcsp->unack),
387 (seqno - 1) & 0x07);
388
389 i = 0;
390 skb_queue_walk_safe(&bcsp->unack, skb, tmp) {
391 if (i >= pkts_to_be_removed)
392 break;
393 i++;
394
395 __skb_unlink(skb, &bcsp->unack);
396 kfree_skb(skb);
397 }
398
399 if (skb_queue_empty(&bcsp->unack))
400 del_timer(&bcsp->tbcsp);
401
402 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
403
404 if (i != pkts_to_be_removed)
405 BT_ERR("Removed only %u out of %u pkts", i, pkts_to_be_removed);
406}
407
408/* Handle BCSP link-establishment packets. When we
409 * detect a "sync" packet, symptom that the BT module has reset,
410 * we do nothing :) (yet)
411 */
412static void bcsp_handle_le_pkt(struct hci_uart *hu)
413{
414 struct bcsp_struct *bcsp = hu->priv;
415 u8 conf_pkt[4] = { 0xad, 0xef, 0xac, 0xed };
416 u8 conf_rsp_pkt[4] = { 0xde, 0xad, 0xd0, 0xd0 };
417 u8 sync_pkt[4] = { 0xda, 0xdc, 0xed, 0xed };
418
419 /* spot "conf" pkts and reply with a "conf rsp" pkt */
420 if (bcsp->rx_skb->data[1] >> 4 == 4 && bcsp->rx_skb->data[2] == 0 &&
421 !memcmp(&bcsp->rx_skb->data[4], conf_pkt, 4)) {
422 struct sk_buff *nskb = alloc_skb(4, GFP_ATOMIC);
423
424 BT_DBG("Found a LE conf pkt");
425 if (!nskb)
426 return;
427 skb_put_data(nskb, conf_rsp_pkt, 4);
428 hci_skb_pkt_type(nskb) = BCSP_LE_PKT;
429
430 skb_queue_head(&bcsp->unrel, nskb);
431 hci_uart_tx_wakeup(hu);
432 }
433 /* Spot "sync" pkts. If we find one...disaster! */
434 else if (bcsp->rx_skb->data[1] >> 4 == 4 && bcsp->rx_skb->data[2] == 0 &&
435 !memcmp(&bcsp->rx_skb->data[4], sync_pkt, 4)) {
436 BT_ERR("Found a LE sync pkt, card has reset");
437 }
438}
439
440static inline void bcsp_unslip_one_byte(struct bcsp_struct *bcsp, unsigned char byte)
441{
442 const u8 c0 = 0xc0, db = 0xdb;
443
444 switch (bcsp->rx_esc_state) {
445 case BCSP_ESCSTATE_NOESC:
446 switch (byte) {
447 case 0xdb:
448 bcsp->rx_esc_state = BCSP_ESCSTATE_ESC;
449 break;
450 default:
451 skb_put_data(bcsp->rx_skb, &byte, 1);
452 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
453 bcsp->rx_state != BCSP_W4_CRC)
454 bcsp_crc_update(&bcsp->message_crc, byte);
455 bcsp->rx_count--;
456 }
457 break;
458
459 case BCSP_ESCSTATE_ESC:
460 switch (byte) {
461 case 0xdc:
462 skb_put_data(bcsp->rx_skb, &c0, 1);
463 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
464 bcsp->rx_state != BCSP_W4_CRC)
465 bcsp_crc_update(&bcsp->message_crc, 0xc0);
466 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
467 bcsp->rx_count--;
468 break;
469
470 case 0xdd:
471 skb_put_data(bcsp->rx_skb, &db, 1);
472 if ((bcsp->rx_skb->data[0] & 0x40) != 0 &&
473 bcsp->rx_state != BCSP_W4_CRC)
474 bcsp_crc_update(&bcsp->message_crc, 0xdb);
475 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
476 bcsp->rx_count--;
477 break;
478
479 default:
480 BT_ERR("Invalid byte %02x after esc byte", byte);
481 kfree_skb(bcsp->rx_skb);
482 bcsp->rx_skb = NULL;
483 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
484 bcsp->rx_count = 0;
485 }
486 }
487}
488
489static void bcsp_complete_rx_pkt(struct hci_uart *hu)
490{
491 struct bcsp_struct *bcsp = hu->priv;
492 int pass_up = 0;
493
494 if (bcsp->rx_skb->data[0] & 0x80) { /* reliable pkt */
495 BT_DBG("Received seqno %u from card", bcsp->rxseq_txack);
496
497 /* check the rx sequence number is as expected */
498 if ((bcsp->rx_skb->data[0] & 0x07) == bcsp->rxseq_txack) {
499 bcsp->rxseq_txack++;
500 bcsp->rxseq_txack %= 0x8;
501 } else {
502 /* handle re-transmitted packet or
503 * when packet was missed
504 */
505 BT_ERR("Out-of-order packet arrived, got %u expected %u",
506 bcsp->rx_skb->data[0] & 0x07, bcsp->rxseq_txack);
507
508 /* do not process out-of-order packet payload */
509 pass_up = 2;
510 }
511
512 /* send current txack value to all received reliable packets */
513 bcsp->txack_req = 1;
514
515 /* If needed, transmit an ack pkt */
516 hci_uart_tx_wakeup(hu);
517 }
518
519 bcsp->rxack = (bcsp->rx_skb->data[0] >> 3) & 0x07;
520 BT_DBG("Request for pkt %u from card", bcsp->rxack);
521
522 /* handle received ACK indications,
523 * including those from out-of-order packets
524 */
525 bcsp_pkt_cull(bcsp);
526
527 if (pass_up != 2) {
528 if ((bcsp->rx_skb->data[1] & 0x0f) == 6 &&
529 (bcsp->rx_skb->data[0] & 0x80)) {
530 hci_skb_pkt_type(bcsp->rx_skb) = HCI_ACLDATA_PKT;
531 pass_up = 1;
532 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 5 &&
533 (bcsp->rx_skb->data[0] & 0x80)) {
534 hci_skb_pkt_type(bcsp->rx_skb) = HCI_EVENT_PKT;
535 pass_up = 1;
536 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 7) {
537 hci_skb_pkt_type(bcsp->rx_skb) = HCI_SCODATA_PKT;
538 pass_up = 1;
539 } else if ((bcsp->rx_skb->data[1] & 0x0f) == 1 &&
540 !(bcsp->rx_skb->data[0] & 0x80)) {
541 bcsp_handle_le_pkt(hu);
542 pass_up = 0;
543 } else {
544 pass_up = 0;
545 }
546 }
547
548 if (pass_up == 0) {
549 struct hci_event_hdr hdr;
550 u8 desc = (bcsp->rx_skb->data[1] & 0x0f);
551
552 if (desc != 0 && desc != 1) {
553 if (hciextn) {
554 desc |= 0xc0;
555 skb_pull(bcsp->rx_skb, 4);
556 memcpy(skb_push(bcsp->rx_skb, 1), &desc, 1);
557
558 hdr.evt = 0xff;
559 hdr.plen = bcsp->rx_skb->len;
560 memcpy(skb_push(bcsp->rx_skb, HCI_EVENT_HDR_SIZE), &hdr, HCI_EVENT_HDR_SIZE);
561 hci_skb_pkt_type(bcsp->rx_skb) = HCI_EVENT_PKT;
562
563 hci_recv_frame(hu->hdev, bcsp->rx_skb);
564 } else {
565 BT_ERR("Packet for unknown channel (%u %s)",
566 bcsp->rx_skb->data[1] & 0x0f,
567 bcsp->rx_skb->data[0] & 0x80 ?
568 "reliable" : "unreliable");
569 kfree_skb(bcsp->rx_skb);
570 }
571 } else
572 kfree_skb(bcsp->rx_skb);
573 } else if (pass_up == 1) {
574 /* Pull out BCSP hdr */
575 skb_pull(bcsp->rx_skb, 4);
576
577 hci_recv_frame(hu->hdev, bcsp->rx_skb);
578 } else {
579 /* ignore packet payload of already ACKed re-transmitted
580 * packets or when a packet was missed in the BCSP window
581 */
582 kfree_skb(bcsp->rx_skb);
583 }
584
585 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
586 bcsp->rx_skb = NULL;
587}
588
589static u16 bscp_get_crc(struct bcsp_struct *bcsp)
590{
591 return get_unaligned_be16(&bcsp->rx_skb->data[bcsp->rx_skb->len - 2]);
592}
593
594/* Recv data */
595static int bcsp_recv(struct hci_uart *hu, const void *data, int count)
596{
597 struct bcsp_struct *bcsp = hu->priv;
598 const unsigned char *ptr;
599
600 BT_DBG("hu %p count %d rx_state %d rx_count %ld",
601 hu, count, bcsp->rx_state, bcsp->rx_count);
602
603 ptr = data;
604 while (count) {
605 if (bcsp->rx_count) {
606 if (*ptr == 0xc0) {
607 BT_ERR("Short BCSP packet");
608 kfree_skb(bcsp->rx_skb);
609 bcsp->rx_state = BCSP_W4_PKT_START;
610 bcsp->rx_count = 0;
611 } else
612 bcsp_unslip_one_byte(bcsp, *ptr);
613
614 ptr++; count--;
615 continue;
616 }
617
618 switch (bcsp->rx_state) {
619 case BCSP_W4_BCSP_HDR:
620 if ((0xff & (u8)~(bcsp->rx_skb->data[0] + bcsp->rx_skb->data[1] +
621 bcsp->rx_skb->data[2])) != bcsp->rx_skb->data[3]) {
622 BT_ERR("Error in BCSP hdr checksum");
623 kfree_skb(bcsp->rx_skb);
624 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
625 bcsp->rx_count = 0;
626 continue;
627 }
628 bcsp->rx_state = BCSP_W4_DATA;
629 bcsp->rx_count = (bcsp->rx_skb->data[1] >> 4) +
630 (bcsp->rx_skb->data[2] << 4); /* May be 0 */
631 continue;
632
633 case BCSP_W4_DATA:
634 if (bcsp->rx_skb->data[0] & 0x40) { /* pkt with crc */
635 bcsp->rx_state = BCSP_W4_CRC;
636 bcsp->rx_count = 2;
637 } else
638 bcsp_complete_rx_pkt(hu);
639 continue;
640
641 case BCSP_W4_CRC:
642 if (bitrev16(bcsp->message_crc) != bscp_get_crc(bcsp)) {
643 BT_ERR("Checksum failed: computed %04x received %04x",
644 bitrev16(bcsp->message_crc),
645 bscp_get_crc(bcsp));
646
647 kfree_skb(bcsp->rx_skb);
648 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
649 bcsp->rx_count = 0;
650 continue;
651 }
652 skb_trim(bcsp->rx_skb, bcsp->rx_skb->len - 2);
653 bcsp_complete_rx_pkt(hu);
654 continue;
655
656 case BCSP_W4_PKT_DELIMITER:
657 switch (*ptr) {
658 case 0xc0:
659 bcsp->rx_state = BCSP_W4_PKT_START;
660 break;
661 default:
662 /*BT_ERR("Ignoring byte %02x", *ptr);*/
663 break;
664 }
665 ptr++; count--;
666 break;
667
668 case BCSP_W4_PKT_START:
669 switch (*ptr) {
670 case 0xc0:
671 ptr++; count--;
672 break;
673
674 default:
675 bcsp->rx_state = BCSP_W4_BCSP_HDR;
676 bcsp->rx_count = 4;
677 bcsp->rx_esc_state = BCSP_ESCSTATE_NOESC;
678 BCSP_CRC_INIT(bcsp->message_crc);
679
680 /* Do not increment ptr or decrement count
681 * Allocate packet. Max len of a BCSP pkt=
682 * 0xFFF (payload) +4 (header) +2 (crc)
683 */
684
685 bcsp->rx_skb = bt_skb_alloc(0x1005, GFP_ATOMIC);
686 if (!bcsp->rx_skb) {
687 BT_ERR("Can't allocate mem for new packet");
688 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
689 bcsp->rx_count = 0;
690 return 0;
691 }
692 break;
693 }
694 break;
695 }
696 }
697 return count;
698}
699
700 /* Arrange to retransmit all messages in the relq. */
701static void bcsp_timed_event(struct timer_list *t)
702{
703 struct bcsp_struct *bcsp = from_timer(bcsp, t, tbcsp);
704 struct hci_uart *hu = bcsp->hu;
705 struct sk_buff *skb;
706 unsigned long flags;
707
708 BT_DBG("hu %p retransmitting %u pkts", hu, bcsp->unack.qlen);
709
710 spin_lock_irqsave_nested(&bcsp->unack.lock, flags, SINGLE_DEPTH_NESTING);
711
712 while ((skb = __skb_dequeue_tail(&bcsp->unack)) != NULL) {
713 bcsp->msgq_txseq = (bcsp->msgq_txseq - 1) & 0x07;
714 skb_queue_head(&bcsp->rel, skb);
715 }
716
717 spin_unlock_irqrestore(&bcsp->unack.lock, flags);
718
719 hci_uart_tx_wakeup(hu);
720}
721
722static int bcsp_open(struct hci_uart *hu)
723{
724 struct bcsp_struct *bcsp;
725
726 BT_DBG("hu %p", hu);
727
728 bcsp = kzalloc(sizeof(*bcsp), GFP_KERNEL);
729 if (!bcsp)
730 return -ENOMEM;
731
732 hu->priv = bcsp;
733 bcsp->hu = hu;
734 skb_queue_head_init(&bcsp->unack);
735 skb_queue_head_init(&bcsp->rel);
736 skb_queue_head_init(&bcsp->unrel);
737
738 timer_setup(&bcsp->tbcsp, bcsp_timed_event, 0);
739
740 bcsp->rx_state = BCSP_W4_PKT_DELIMITER;
741
742 if (txcrc)
743 bcsp->use_crc = 1;
744
745 return 0;
746}
747
748static int bcsp_close(struct hci_uart *hu)
749{
750 struct bcsp_struct *bcsp = hu->priv;
751
752 del_timer_sync(&bcsp->tbcsp);
753
754 hu->priv = NULL;
755
756 BT_DBG("hu %p", hu);
757
758 skb_queue_purge(&bcsp->unack);
759 skb_queue_purge(&bcsp->rel);
760 skb_queue_purge(&bcsp->unrel);
761
762 kfree(bcsp);
763 return 0;
764}
765
766static const struct hci_uart_proto bcsp = {
767 .id = HCI_UART_BCSP,
768 .name = "BCSP",
769 .open = bcsp_open,
770 .close = bcsp_close,
771 .enqueue = bcsp_enqueue,
772 .dequeue = bcsp_dequeue,
773 .recv = bcsp_recv,
774 .flush = bcsp_flush
775};
776
777int __init bcsp_init(void)
778{
779 return hci_uart_register_proto(&bcsp);
780}
781
782int __exit bcsp_deinit(void)
783{
784 return hci_uart_unregister_proto(&bcsp);
785}
786
787module_param(txcrc, bool, 0644);
788MODULE_PARM_DESC(txcrc, "Transmit CRC with every BCSP packet");
789
790module_param(hciextn, bool, 0644);
791MODULE_PARM_DESC(hciextn, "Convert HCI Extensions into BCSP packets");