Received: by 2002:ac2:5a04:0:0:0:0:0 with SMTP id q4csp1996lfn; Tue, 15 Feb 2022 07:42:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJws/3zpvf2I/Jv0lahGwM33T1izmgRlZF44RXglVM/4ZTJFdBwla+oDBL6q8dvBOkBsTr9A X-Received: by 2002:a17:907:7f02:: with SMTP id qf2mr3527368ejc.513.1644939777157; Tue, 15 Feb 2022 07:42:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644939777; cv=none; d=google.com; s=arc-20160816; b=kRnZU3m7pL+zplAaOtBaPMhsAHoLL6EFi0+LAPCLwMScyrNMHLb9ER53CCGH4Q01Iu i6HYQRC/C0c697AldQyVAaC5c7TEe1N86Z4cYuNIckcBFl+cyb61asInwv10Ec73CHgT N4dfwBNw05dUjsPdGZ1U1hO11haDdtcipeBYXIkCs4zrs67eT/SSOI1mVGmuj1ISp91m BkfmThAsKwdnJsegnU1oJiWCWNyk8c6g65ukqfldykpsz/WAU22Y5t5pxB9S3Plkodx4 lzqWGoIX5tbo9AufSBTMK6nwIHolSY2/2l3pES62cJN/C+VkMxvWjRXwQjnoJiWJCuju Sh1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5pLk2TtiVET/mS6ZsI1zq61AicplaTsASGX27V0i7pA=; b=ggd0Ns1pShsrOJgF5ufPEnrc8LlZyo3hMMTmOu9edtKCD1e2bsJPkV6CVoBOvD1HWS e2iXe0DUFrBxGBDceKTo5RSOfUaT5vNsvk0QxPpoBGGJNRe2Tii6WZRYX518os7poGCA UF4VKQRwvD7abuQOvRzzyygpcIeoJpnuyAAd8AqQBrnQgZaLakbmM3VuCaRSAoW7RdBA 1fgtVM25AjnqWtQ60qZzuaNIhbZDYtQwx3NKQGI+6ApsQXE1K/fz5NJ7CW5pAD0uG+I/ lebPul/713+0bZNKhW99DeuFl3AqrstIpaLlDEKsp3llnv+JekSKPhu/hokSdivdvpLB aVBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=TOYkrgg7; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gb41si31412636ejc.425.2022.02.15.07.42.31; Tue, 15 Feb 2022 07:42:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=TOYkrgg7; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238356AbiBONgD (ORCPT + 99 others); Tue, 15 Feb 2022 08:36:03 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:60632 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238333AbiBONgC (ORCPT ); Tue, 15 Feb 2022 08:36:02 -0500 Received: from mail-pl1-x636.google.com (mail-pl1-x636.google.com [IPv6:2607:f8b0:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 51EC1106CB4 for ; Tue, 15 Feb 2022 05:35:47 -0800 (PST) Received: by mail-pl1-x636.google.com with SMTP id l9so11504174plg.0 for ; Tue, 15 Feb 2022 05:35:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=5pLk2TtiVET/mS6ZsI1zq61AicplaTsASGX27V0i7pA=; b=TOYkrgg7lJgb5vHU3Se8S54lQ2+4qeDdNQXoguuZRBbzn3aMvIy1paiTDUYrdVDxxM wlc0SSFYU+IUydgX7REd3c01+ESnZSkQGjDdKVtLuaG4Lk27mUyjGmDvMR2kMGawj5cU /BAri+54hTOiuE741J9/AU6AnBTgfYAS+yjRo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=5pLk2TtiVET/mS6ZsI1zq61AicplaTsASGX27V0i7pA=; b=x1KY3ezNYnOK8vGYiT8BVCA+c6QY5RRCwlkmS85FImtICMw+s9QUQEPdtSicBYVaiy xOfa73HllGh8VFjoWsnTV8fnBSZEM66u2/t5CRdG1UnznowF4meA65Ab+gr3QaMm4ePP LUvxaBxGSBsn4xYGWOrTW2GZjIcyqvvnhtxz0cYT3do6a/TyMFMuy+ll/2aEIEzu4NL8 ET+7KA0smKCPMB+Xrm/Zvip1udL7P2uML1KvdOzzwS2ThmxgPJaJabYIzRkZR+2mopR7 4wElXyoTjYV6KtRdoXLr3ppOQ4+ip9WA2MaEsmPd/XCI8XcyzyjLyJ4bqg7CwVaAukIm gl8g== X-Gm-Message-State: AOAM531GTOhqteAqh9SAaRj+KBcw5qpOPiGDMWTCcS3nQbwy8hEIpDdf DqI5IMaiDCDoMDs7gLnUm72OxA9HMjfp+g== X-Received: by 2002:a17:902:d4d2:: with SMTP id o18mr4380527plg.70.1644932146467; Tue, 15 Feb 2022 05:35:46 -0800 (PST) Received: from localhost (208.158.221.35.bc.googleusercontent.com. [35.221.158.208]) by smtp.gmail.com with UTF8SMTPSA id h5sm41531249pfi.111.2022.02.15.05.35.44 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 15 Feb 2022 05:35:46 -0800 (PST) From: Joseph Hwang To: linux-bluetooth@vger.kernel.org, marcel@holtmann.org, luiz.dentz@gmail.com, pali@kernel.org Cc: chromeos-bluetooth-upstreaming@chromium.org, josephsih@google.com, Joseph Hwang , Archie Pusaka , "David S. Miller" , Jakub Kicinski , Johan Hedberg , linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH v4 2/3] Bluetooth: btintel: surface Intel telemetry events through mgmt Date: Tue, 15 Feb 2022 21:35:31 +0800 Message-Id: <20220215213519.v4.2.I63681490281b2392aa1ac05dff91a126394ab649@changeid> X-Mailer: git-send-email 2.35.1.265.g69c8d7142f-goog In-Reply-To: <20220215213519.v4.1.I2015b42d2d0a502334c9c3a2983438b89716d4f0@changeid> References: <20220215213519.v4.1.I2015b42d2d0a502334c9c3a2983438b89716d4f0@changeid> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org When receiving a HCI vendor event, the kernel checks if it is an Intel telemetry event. If yes, the event is sent to bluez user space through the mgmt socket. Signed-off-by: Joseph Hwang Reviewed-by: Archie Pusaka --- (no changes since v3) Changes in v3: - Move intel_vendor_evt() from hci_event.c to the btintel driver. Changes in v2: - Drop the pull_quality_report_data function from hci_dev. Do not bother hci_dev with it. Do not bleed the details into the core. drivers/bluetooth/btintel.c | 37 +++++++++++++++++++++++++++++++- drivers/bluetooth/btintel.h | 7 ++++++ include/net/bluetooth/hci_core.h | 2 ++ net/bluetooth/hci_event.c | 12 +++++++++++ 4 files changed, 57 insertions(+), 1 deletion(-) diff --git a/drivers/bluetooth/btintel.c b/drivers/bluetooth/btintel.c index 06514ed66022..c7732da2752f 100644 --- a/drivers/bluetooth/btintel.c +++ b/drivers/bluetooth/btintel.c @@ -2401,9 +2401,12 @@ static int btintel_setup_combined(struct hci_dev *hdev) set_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks); set_bit(HCI_QUIRK_NON_PERSISTENT_DIAG, &hdev->quirks); - /* Set up the quality report callback for Intel devices */ + /* Set up the quality report callbacks for Intel devices */ hdev->set_quality_report = btintel_set_quality_report; + /* Set up the vendor specific callback for Intel devices */ + hdev->vendor_evt = btintel_vendor_evt; + /* For Legacy device, check the HW platform value and size */ if (skb->len == sizeof(ver) && skb->data[1] == 0x37) { bt_dev_dbg(hdev, "Read the legacy Intel version information"); @@ -2650,6 +2653,38 @@ void btintel_secure_send_result(struct hci_dev *hdev, } EXPORT_SYMBOL_GPL(btintel_secure_send_result); +#define INTEL_PREFIX 0x8087 +#define TELEMETRY_CODE 0x03 + +struct intel_prefix_evt_data { + __le16 vendor_prefix; + __u8 code; + __u8 data[]; /* a number of struct intel_tlv subevents */ +} __packed; + +static bool is_quality_report_evt(struct sk_buff *skb) +{ + struct intel_prefix_evt_data *ev; + u16 vendor_prefix; + + if (skb->len < sizeof(struct intel_prefix_evt_data)) + return false; + + ev = (struct intel_prefix_evt_data *)skb->data; + vendor_prefix = __le16_to_cpu(ev->vendor_prefix); + + return vendor_prefix == INTEL_PREFIX && ev->code == TELEMETRY_CODE; +} + +void btintel_vendor_evt(struct hci_dev *hdev, void *data, struct sk_buff *skb) +{ + /* Only interested in the telemetry event for now. */ + if (hdev->set_quality_report && is_quality_report_evt(skb)) + mgmt_quality_report(hdev, skb->data, skb->len, + QUALITY_SPEC_INTEL_TELEMETRY); +} +EXPORT_SYMBOL_GPL(btintel_vendor_evt); + MODULE_AUTHOR("Marcel Holtmann "); MODULE_DESCRIPTION("Bluetooth support for Intel devices ver " VERSION); MODULE_VERSION(VERSION); diff --git a/drivers/bluetooth/btintel.h b/drivers/bluetooth/btintel.h index e0060e58573c..82dc278b09eb 100644 --- a/drivers/bluetooth/btintel.h +++ b/drivers/bluetooth/btintel.h @@ -211,6 +211,7 @@ void btintel_bootup(struct hci_dev *hdev, const void *ptr, unsigned int len); void btintel_secure_send_result(struct hci_dev *hdev, const void *ptr, unsigned int len); int btintel_set_quality_report(struct hci_dev *hdev, bool enable); +void btintel_vendor_evt(struct hci_dev *hdev, void *data, struct sk_buff *skb); #else static inline int btintel_check_bdaddr(struct hci_dev *hdev) @@ -306,4 +307,10 @@ static inline int btintel_set_quality_report(struct hci_dev *hdev, bool enable) { return -ENODEV; } + +static inline void btintel_vendor_evt(struct hci_dev *hdev, void *data, + struct sk_buff *skb) +{ +} + #endif diff --git a/include/net/bluetooth/hci_core.h b/include/net/bluetooth/hci_core.h index ea83619ac4de..3505ffe20779 100644 --- a/include/net/bluetooth/hci_core.h +++ b/include/net/bluetooth/hci_core.h @@ -635,6 +635,8 @@ struct hci_dev { void (*cmd_timeout)(struct hci_dev *hdev); bool (*wakeup)(struct hci_dev *hdev); int (*set_quality_report)(struct hci_dev *hdev, bool enable); + void (*vendor_evt)(struct hci_dev *hdev, void *data, + struct sk_buff *skb); int (*get_data_path_id)(struct hci_dev *hdev, __u8 *data_path); int (*get_codec_config_data)(struct hci_dev *hdev, __u8 type, struct bt_codec *codec, __u8 *vnd_len, diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c index 6468ea0f71bd..e34dea0f0c2e 100644 --- a/net/bluetooth/hci_event.c +++ b/net/bluetooth/hci_event.c @@ -4250,6 +4250,7 @@ static void hci_num_comp_blocks_evt(struct hci_dev *hdev, void *data, * space to avoid collision. */ static unsigned char AOSP_BQR_PREFIX[] = { 0x58 }; +static unsigned char INTEL_PREFIX[] = { 0x87, 0x80 }; /* Some vendor prefixes are fixed values and lengths. */ #define FIXED_EVT_PREFIX(_prefix, _vendor_func) \ @@ -4273,6 +4274,16 @@ static unsigned char AOSP_BQR_PREFIX[] = { 0x58 }; .get_prefix_len = _prefix_len_func, \ } +/* Every vendor that handles particular vendor events in its driver should + * 1. set up the vendor_evt callback in its driver and + * 2. add an entry in struct vendor_event_prefix. + */ +static void vendor_evt(struct hci_dev *hdev, void *data, struct sk_buff *skb) +{ + if (hdev->vendor_evt) + hdev->vendor_evt(hdev, data, skb); +} + /* Every distinct vendor specification must have a well-defined vendor * event prefix to determine if a vendor event meets the specification. * If an event prefix is fixed, it should be delcared with FIXED_EVT_PREFIX. @@ -4287,6 +4298,7 @@ struct vendor_event_prefix { __u8 (*get_prefix_len)(struct hci_dev *hdev); } evt_prefixes[] = { FIXED_EVT_PREFIX(AOSP_BQR_PREFIX, aosp_quality_report_evt), + FIXED_EVT_PREFIX(INTEL_PREFIX, vendor_evt), DYNAMIC_EVT_PREFIX(get_msft_evt_prefix, get_msft_evt_prefix_len, msft_vendor_evt), -- 2.35.1.265.g69c8d7142f-goog