Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp329915ybb; Wed, 25 Mar 2020 00:04:18 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuzgVyHIqJs6LzrTIKrhIQRm2T7Xq7mOB5key1TWGsya6AlABF/6CVIGiLKE94i4bilWgjR X-Received: by 2002:a05:6830:1da6:: with SMTP id z6mr1344682oti.124.1585119858059; Wed, 25 Mar 2020 00:04:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585119858; cv=none; d=google.com; s=arc-20160816; b=hXcLmYusn+ItnrbWAWcNv8ByG/iRLf4WGPXrALFPKekGLm2ruRwkLnpFTr5LRDVEcw lUmT1IOaHRIal9seiR99tsv4+5c+G+dbGqOP9YUBpBiYeTMpV4JSqdYup1SIcQunXscO wNiyVAyof2imdOF5A46HIUMaMfR20bAerodoKaJ3OLVetiqijorFxZikmsq7r5BKuPqc r5f65cqWH3EMvYoRT6MKSW0iH2//F3d6M7dN67fwIHhg+07/V9agdXsCF8jH0kJl12W5 i0UYFT3Z47LqMxvES0LQdYq55aofpWdcWaJwLuD6iv9W6sItvJZtW7zkGjGs2kIl2V2t +mMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Qcq5vrjZaaxUecQ+MN/hNrxkpIRWmwyvSkwcuBIBglM=; b=wfyMtw902XjAcjMWyrKjJr3CpLJBeuTXQlfe4Ftscf3t++QNJMe4poK9NbyJaE+3/Y 9YHFsyrK/4nEtAow03+mN6ACMB0tyaPHJOEfo430ecMFXWNQC1Hdi3LnA+campGNqLJJ cP0vJzVAJnQx04VgDyS2LygSj528eVYNbjJKQCuafFlkJcMr/5abPGjB9fp/B4uHbr5b esL576a4KPgLK496RaLSNbZJYTmmleFiFlZyryz2BvL1l5rr0MX+huyDwzwAratXLEY0 6lIQSMzs06zlQsXGEoxU3KfQtxMro0r7lwCuJjThEkNCjdEOQGt2lG44ul74QI2+floj RjAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=dhmArywJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s200si9405688oie.188.2020.03.25.00.04.06; Wed, 25 Mar 2020 00:04:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=dhmArywJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727357AbgCYHDs (ORCPT + 99 others); Wed, 25 Mar 2020 03:03:48 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:46693 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727281AbgCYHDp (ORCPT ); Wed, 25 Mar 2020 03:03:45 -0400 Received: by mail-pg1-f194.google.com with SMTP id k191so691809pgc.13 for ; Wed, 25 Mar 2020 00:03:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Qcq5vrjZaaxUecQ+MN/hNrxkpIRWmwyvSkwcuBIBglM=; b=dhmArywJt/DihP0cdNXOX7mfpiBNidjkNvyh0NmfMEE5l+7gintMXj8bN5EOTRwom6 gpWGPhJctGzXN7L6Ku3hLOBf0nUGcxbeSyIaAEjbo57fgT4Fav81hl1BLmoN52B2VJb8 lXGD5aw/Z0IoHEg/jOusEADKAjbdcFk7XDSKU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Qcq5vrjZaaxUecQ+MN/hNrxkpIRWmwyvSkwcuBIBglM=; b=GJWTmwKqnEevR2q4smTGCDTddnfXJMVa9GW6XmJd7SifUIB3ZPo2ol/QpU/wFu7zwL muZYn4Dx6Wk5XKBOB/F8QI7JY5CY5nGWagaaz9TGcfx5Gy+jjDdmh7aiQbrdV/D2AS3c 78YU3oZ1isjfUZrdrXOExWa8Gh/lHhKCGCEFHizjhEtrIUx+ic//9ZnVdSUpZs+THuoh izH8KCe2JUzTB1Jx91G/DScHaWv1MNHJcJFYL2OdzHhrvJzz3tVyN+h27Zp9pTOz2LpX MMTYVQ/6lC88GUSLZ9Gwed/FYEajFi1n5SHgIO7QRik0mvv4piVBcgybpspUixbpi4Uv LTbA== X-Gm-Message-State: ANhLgQ3SBo3BPbhFweI9BpItFkpz+AG9WtB9zM+Fv79vjha8cdvrovSW f9VQN15QeVr9XwwyIPiw7wjnbA== X-Received: by 2002:a63:c40a:: with SMTP id h10mr1654902pgd.291.1585119823848; Wed, 25 Mar 2020 00:03:43 -0700 (PDT) Received: from mcchou0.mtv.corp.google.com ([2620:15c:202:201:b46:ac84:1014:9555]) by smtp.gmail.com with ESMTPSA id i34sm566240pgm.83.2020.03.25.00.03.42 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Mar 2020 00:03:43 -0700 (PDT) From: Miao-chen Chou To: Bluetooth Kernel Mailing List Cc: Luiz Augusto von Dentz , Marcel Holtmann , Alain Michaud , Miao-chen Chou , "David S. Miller" , Jakub Kicinski , Johan Hedberg , linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH v2 2/2] Bluetooth: btusb: Read the supported features of Microsoft vendor extension Date: Wed, 25 Mar 2020 00:03:36 -0700 Message-Id: <20200325000332.v2.2.I4e01733fa5b818028dc9188ca91438fc54aa5028@changeid> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200325070336.1097-1-mcchou@chromium.org> References: <20200325070336.1097-1-mcchou@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This adds a new header to facilitate the opcode and packet structures of vendor extension(s). For now, we add only the HCI_VS_MSFT_Read_Supported_Features command from Microsoft vendor extension. See https://docs.microsoft.com/en-us/windows-hardware/drivers/ bluetooth/microsoft-defined-bluetooth-hci-commands-and-events# microsoft-defined-bluetooth-hci-events for more details. Upon initialization of a hci_dev, we issue a HCI_VS_MSFT_Read_Supported_Features command to read the supported features of Microsoft vendor extension if the opcode of Microsoft vendor extension is valid. See https://docs.microsoft.com/en-us/windows-hardware/drivers/ bluetooth/microsoft-defined-bluetooth-hci-commands-and-events# hci_vs_msft_read_supported_features for more details. This was verified on a device with Intel ThhunderPeak BT controller where the Microsoft vendor extension features are 0x000000000000003f. Signed-off-by: Miao-chen Chou --- Changes in v2: - Issue a HCI_VS_MSFT_Read_Supported_Features command with __hci_cmd_sync() instead of constructing a request. drivers/bluetooth/btusb.c | 3 ++ include/net/bluetooth/hci_core.h | 4 ++ include/net/bluetooth/vendor_hci.h | 51 +++++++++++++++++++ net/bluetooth/hci_core.c | 78 ++++++++++++++++++++++++++++++ 4 files changed, 136 insertions(+) create mode 100644 include/net/bluetooth/vendor_hci.h diff --git a/drivers/bluetooth/btusb.c b/drivers/bluetooth/btusb.c index 4c49f394f174..410d50dbd4e2 100644 --- a/drivers/bluetooth/btusb.c +++ b/drivers/bluetooth/btusb.c @@ -3738,6 +3738,9 @@ static int btusb_probe(struct usb_interface *intf, hdev->notify = btusb_notify; hdev->msft_ext.opcode = HCI_OP_NOP; + hdev->msft_ext.features = 0; + hdev->msft_ext.evt_prefix_len = 0; + hdev->msft_ext.evt_prefix = NULL; #ifdef CONFIG_PM err = btusb_config_oob_wake(hdev); diff --git a/include/net/bluetooth/hci_core.h b/include/net/bluetooth/hci_core.h index 0ec3d9b41d81..f2876c5067a4 100644 --- a/include/net/bluetooth/hci_core.h +++ b/include/net/bluetooth/hci_core.h @@ -30,6 +30,7 @@ #include #include +#include /* HCI priority */ #define HCI_PRIO_MAX 7 @@ -246,6 +247,9 @@ struct amp_assoc { struct msft_vnd_ext { __u16 opcode; + __u64 features; + __u8 evt_prefix_len; + void *evt_prefix; }; struct hci_dev { diff --git a/include/net/bluetooth/vendor_hci.h b/include/net/bluetooth/vendor_hci.h new file mode 100644 index 000000000000..89a6795e672c --- /dev/null +++ b/include/net/bluetooth/vendor_hci.h @@ -0,0 +1,51 @@ +/* SPDX-License-Identifier: GPL-2.0-or-later */ +/* + * BlueZ - Bluetooth protocol stack for Linux + * Copyright (C) 2020 Google Corporation + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation; + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS + * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. + * IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY + * CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES + * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + * ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, + * COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS + * SOFTWARE IS DISCLAIMED. + */ + +#ifndef __VENDOR_HCI_H +#define __VENDOR_HCI_H + +#define MSFT_EVT_PREFIX_MAX_LEN 255 + +struct msft_cmd_cmp_info { + __u8 status; + __u8 sub_opcode; +} __packed; + +/* Microsoft Vendor HCI subcommands */ +#define MSFT_OP_READ_SUPPORTED_FEATURES 0x00 +#define MSFT_FEATURE_MASK_RSSI_MONITOR_BREDR_CONN 0x0000000000000001 +#define MSFT_FEATURE_MASK_RSSI_MONITOR_LE_CONN 0x0000000000000002 +#define MSFT_FEATURE_MASK_RSSI_MONITOR_LE_ADV 0x0000000000000004 +#define MSFT_FEATURE_MASK_ADV_MONITOR_LE_ADV 0x0000000000000008 +#define MSFT_FEATURE_MASK_VERIFY_CURVE 0x0000000000000010 +#define MSFT_FEATURE_MASK_CONCURRENT_ADV_MONITOR 0x0000000000000020 +struct msft_cp_read_supported_features { + __u8 sub_opcode; +} __packed; +struct msft_rp_read_supported_features { + __u64 features; + __u8 evt_prefix_len; + __u8 evt_prefix[0]; +} __packed; + +#endif /* __VENDOR_HCI_H */ diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index dbd2ad3a26ed..1ea32d10ed08 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c @@ -1407,6 +1407,76 @@ static void hci_dev_get_bd_addr_from_property(struct hci_dev *hdev) bacpy(&hdev->public_addr, &ba); } +static void process_msft_vnd_ext_cmd_complete(struct hci_dev *hdev, + struct sk_buff *skb) +{ + struct msft_cmd_cmp_info *info = (void *)skb->data; + const u8 status = info->status; + const u16 sub_opcode = __le16_to_cpu(info->sub_opcode); + + skb_pull(skb, sizeof(*info)); + + if (IS_ERR(skb)) { + BT_WARN("%s: Microsoft extension response packet invalid", + hdev->name); + return; + } + + if (status) { + BT_WARN("%s: Microsoft extension sub command 0x%2.2x failed", + hdev->name, sub_opcode); + return; + } + + BT_DBG("%s: status 0x%2.2x sub opcode 0x%2.2x", hdev->name, status, + sub_opcode); + + switch (sub_opcode) { + case MSFT_OP_READ_SUPPORTED_FEATURES: { + struct msft_rp_read_supported_features *rp = (void *)skb->data; + u8 prefix_len = rp->evt_prefix_len; + + hdev->msft_ext.features = __le64_to_cpu(rp->features); + hdev->msft_ext.evt_prefix_len = prefix_len; + hdev->msft_ext.evt_prefix = kmalloc(prefix_len, GFP_ATOMIC); + if (!hdev->msft_ext.evt_prefix) { + BT_WARN("%s: Microsoft extension invalid event prefix", + hdev->name); + return; + } + + memcpy(hdev->msft_ext.evt_prefix, rp->evt_prefix, prefix_len); + BT_INFO("%s: Microsoft extension features 0x%016llx", + hdev->name, hdev->msft_ext.features); + break; + } + default: + BT_WARN("%s: Microsoft extension unknown sub opcode 0x%2.2x", + hdev->name, sub_opcode); + break; + } +} + +static void read_vendor_extension_features(struct hci_dev *hdev) +{ + struct sk_buff *skb; + const u16 msft_opcode = hdev->msft_ext.opcode; + + if (msft_opcode != HCI_OP_NOP) { + struct msft_cp_read_supported_features cp; + + cp.sub_opcode = MSFT_OP_READ_SUPPORTED_FEATURES; + skb = __hci_cmd_sync(hdev, msft_opcode, sizeof(cp), &cp, + HCI_CMD_TIMEOUT); + + process_msft_vnd_ext_cmd_complete(hdev, skb); + if (skb) { + kfree_skb(skb); + skb = NULL; + } + } +} + static int hci_dev_do_open(struct hci_dev *hdev) { int ret = 0; @@ -1554,6 +1624,11 @@ static int hci_dev_do_open(struct hci_dev *hdev) } } + /* Check features supported by HCI extensions after the init procedure + * completed. + */ + read_vendor_extension_features(hdev); + /* If the HCI Reset command is clearing all diagnostic settings, * then they need to be reprogrammed after the init procedure * completed. @@ -1733,6 +1808,9 @@ int hci_dev_do_close(struct hci_dev *hdev) cancel_delayed_work_sync(&adv_instance->rpa_expired_cb); } + kfree(hdev->msft_ext.evt_prefix); + hdev->msft_ext.evt_prefix = NULL; + /* Avoid potential lockdep warnings from the *_flush() calls by * ensuring the workqueue is empty up front. */ -- 2.24.1