From patchwork Tue Jan 2 13:33:10 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Jonas_Dre=C3=9Fler?= X-Patchwork-Id: 184338 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:6f82:b0:100:9c79:88ff with SMTP id tb2csp4446541dyb; Tue, 2 Jan 2024 05:34:41 -0800 (PST) X-Google-Smtp-Source: AGHT+IFp5b30oH6UY/5qf7cB8lBUMiQHSldWySiS5zE3t+8Mnjz6kkfLFkb41vChMe0Lu/IODqbl X-Received: by 2002:a05:6512:3b0f:b0:50e:6b45:c915 with SMTP id f15-20020a0565123b0f00b0050e6b45c915mr9356046lfv.7.1704202481381; Tue, 02 Jan 2024 05:34:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704202481; cv=none; d=google.com; s=arc-20160816; b=i9V47eM7XJT+5nG+smfgxlQ7Vy2vbogfQ5PSrD335SDPsq8073QuL2FNLLUJEJECT+ Z7j8Bq05ECr8HoJnKwW8he0/LsctvdyRtnAIUuYH3BMy8bDbjz3O7P6TnezUHeLi4vAn CAE1D82yA0F9wETXjO1MBU++j/EgWT9Wejp78YG9A+mKakQYTXIvsZUX7kUIWbgKlTBd BDDCes/NiK2BqFEZIYT9s033QCxjbDGiwCM2dDzxTn4G6pfZvOkyMzNLRuFT42ONjo6/ LRwb6XlpkOoMeqavOd8kXezUkQEMGTJoB6BqZys1Z3rclRV0YJWmk2WHl7hVQg22Nsct bAPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=v1LJcC9ZvAsWCtzIkp4ijtyBiT7HQFW99bxrW6L9QN0=; fh=S5rf2bc7VLlSXYQ0EqFAIodb1qEiUfsxulvZhQKZRws=; b=geJSNrT9K5jnNaqKmQ/+bnGRbujhC/13qop80Q6zQx6hYoSZpQUQzZXnCIIBjmzq3C 0MSAgTV4S76gjrSRvktRCfMzWzALMCnZWwXNiF8W2JTstGaaTdBA+ovEu4XxWjmZQWf8 5NjR+qu71+BPO8aE8C20WjXh/ST5lqpsTBDtvL+81GrFnnNy88pW+7u+rf8fLf+8iwrT 8xCIBou7uA94ccuWz7UJ/uXQZKKmvVPP6YMHnlrZFzaq8n7IorjPBPucjmp+UV7HVNaC 7yVYq9NwDlpYPc/me2IXp2LdTTlmfEoBVCJQJWetTFrvePf5pIrUw6xYohKcOlR3YftM Zaeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-14406-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14406-ouuuleilei=gmail.com@vger.kernel.org" Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id n10-20020a170906700a00b00a26ea2ac390si4966537ejj.530.2024.01.02.05.34.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Jan 2024 05:34:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-14406-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-14406-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14406-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id F1D5C1F2160B for ; Tue, 2 Jan 2024 13:34:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BFAC812E52; Tue, 2 Jan 2024 13:33:40 +0000 (UTC) X-Original-To: linux-kernel@vger.kernel.org Received: from mout-p-101.mailbox.org (mout-p-101.mailbox.org [80.241.56.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9F1B711C85; Tue, 2 Jan 2024 13:33:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=v0yd.nl Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=v0yd.nl Received: from smtp2.mailbox.org (smtp2.mailbox.org [IPv6:2001:67c:2050:b231:465::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-101.mailbox.org (Postfix) with ESMTPS id 4T4DMD1n5Qz9sWC; Tue, 2 Jan 2024 14:33:28 +0100 (CET) From: =?utf-8?q?Jonas_Dre=C3=9Fler?= To: Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz Cc: =?utf-8?q?Jonas_Dre=C3=9Fler?= , asahi@lists.linux.dev, linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH 4/4] hci: Queue a HCI power-off command before rfkilling adapters Date: Tue, 2 Jan 2024 14:33:10 +0100 Message-ID: <20240102133311.6712-5-verdre@v0yd.nl> In-Reply-To: <20240102133311.6712-1-verdre@v0yd.nl> References: <20240102133311.6712-1-verdre@v0yd.nl> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Rspamd-Queue-Id: 4T4DMD1n5Qz9sWC X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1786985821014349529 X-GMAIL-MSGID: 1786985821014349529 On a lot of platforms (at least the MS Surface devices, M1 macbooks, and a few ThinkPads) firmware doesn't do its job when rfkilling a device and the bluetooth adapter is not actually shut down on rfkill. This leads to connected devices remaining in connected state and the bluetooth connection eventually timing out after rfkilling an adapter. Use the rfkill hook in the HCI driver to actually power the device off before rfkilling it. Note that the wifi subsystem is doing something similar by calling cfg80211_shutdown_all_interfaces() in it's rfkill set_block callback (see cfg80211_rfkill_set_block). Signed-off-by: Jonas Dreßler --- net/bluetooth/hci_core.c | 33 ++++++++++++++++++++++++++++++--- 1 file changed, 30 insertions(+), 3 deletions(-) diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index 1ec83985f..1c91d02f7 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c @@ -543,6 +543,23 @@ int hci_dev_open(__u16 dev) return err; } +static int set_powered_off_sync(struct hci_dev *hdev, void *data) +{ + return hci_set_powered_sync(hdev, false); +} + +static void set_powered_off_sync_complete(struct hci_dev *hdev, void *data, int err) +{ + if (err) + bt_dev_err(hdev, "Powering HCI device off before rfkilling failed (%d)", err); +} + +static int hci_dev_do_poweroff(struct hci_dev *hdev) +{ + return hci_cmd_sync_queue(hdev, set_powered_off_sync, + NULL, set_powered_off_sync_complete); +} + int hci_dev_do_close(struct hci_dev *hdev) { int err; @@ -943,17 +960,27 @@ int hci_get_dev_info(void __user *arg) static int hci_rfkill_set_block(void *data, bool blocked) { struct hci_dev *hdev = data; + int err; BT_DBG("%p name %s blocked %d", hdev, hdev->name, blocked); if (hci_dev_test_flag(hdev, HCI_USER_CHANNEL)) return -EBUSY; + if (blocked == hci_dev_test_flag(hdev, HCI_RFKILLED)) + return 0; + if (blocked) { - hci_dev_set_flag(hdev, HCI_RFKILLED); if (!hci_dev_test_flag(hdev, HCI_SETUP) && - !hci_dev_test_flag(hdev, HCI_CONFIG)) - hci_dev_do_close(hdev); + !hci_dev_test_flag(hdev, HCI_CONFIG)) { + err = hci_dev_do_poweroff(hdev); + if (err) { + bt_dev_err(hdev, "Powering off device before rfkilling failed (%d)", + err); + } + } + + hci_dev_set_flag(hdev, HCI_RFKILLED); } else { hci_dev_clear_flag(hdev, HCI_RFKILLED); }