Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3388310ybd; Tue, 25 Jun 2019 01:32:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqzgI/ivI7Z0NWFf0UvK2Nv8/IiI63PG6iT8zjpEYsXleU0MD5gPiW2pENYwKZ5KRyuTbXqi X-Received: by 2002:a63:d53:: with SMTP id 19mr3008805pgn.453.1561451573180; Tue, 25 Jun 2019 01:32:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561451573; cv=none; d=google.com; s=arc-20160816; b=aIjXfNhNX22RGYz0IvQguXBOqK6yvQ2mN7BO0H55vvCNzdkUwArxmOYAWwM2Zayv/j 4nd8e9/03cBHHtwFtUR7famQbjPOjOMNVYdEfdBB6UaggfeaczZWI8EkRF3x3DmIKvgQ B7lzZAE1zBjsYgJJEfpqQrssm2ti77v670BSWPCHrWVrl6WE3K2k5zsTcA6i+CBi9xRt SNtu2D4Ff1QeuHEA+U4YBHXYZHkCZIRJqQkdAi40QBWtzd4w7fdS9cOx3/fyTih7zWyU 45IyidfsY6aDbV2xwUeJ4+MTWmZe3oN8O91d5AxUZWrDlZsVCMFeU45yHHoriUO0qVTE iMWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9eMlPVY24HiKoID6dzydanFhmPA3RfckjVd3enlhBYw=; b=wiQLe7RxKxa2bVo/um9y7Q2oDAzYt9+SAdV5HXabz2hb+zw3gewceITxzGGJRYc44l Gy1SQTSAvPgtzQ5g/IUxJQ3+y4XrSHAJUfSPy9c3NOJO2Y/f7PydJkCawmPFpP77UAIG NigYh8/EcMVXyXcwnKbBN6ejwgJGq2qMvQdqSnqDFmAxb3P28nvWvKLaylcc2+B7YWIJ uoY6+iS0uY3ZeSSVRz9plQm597vgy8QUFhNQS0GDwCj1MuIS+qQsYYKRQSbr0KGMYgYV MSWXnT6lTJVkyfafgMWeDVEA28m/tWCC0zqp7tEpxoXG+mifHNyxeQ5PPKuDU9Yz3XV5 HTcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@endlessm-com.20150623.gappssmtp.com header.s=20150623 header.b=GAvjog6f; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d24si12758889pgk.186.2019.06.25.01.32.25; Tue, 25 Jun 2019 01:32:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@endlessm-com.20150623.gappssmtp.com header.s=20150623 header.b=GAvjog6f; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730434AbfFYIcR (ORCPT + 99 others); Tue, 25 Jun 2019 04:32:17 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:36078 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729607AbfFYIcR (ORCPT ); Tue, 25 Jun 2019 04:32:17 -0400 Received: by mail-pg1-f195.google.com with SMTP id f21so8598831pgi.3 for ; Tue, 25 Jun 2019 01:32:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=endlessm-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9eMlPVY24HiKoID6dzydanFhmPA3RfckjVd3enlhBYw=; b=GAvjog6fXTPDm8Zj/MWi+YqqZvAXOnu6RbEkNm5o349sRyL41W4ik/hRY7MZ9xx+Zj r+V8ygpCfaszrP2WT6vlf1gDMbfTIs6+qs5J326zeINqVZZwq8Vf7W6723NjW72iLWIx 6yuJ1584bkhDREJNIlLoAoShh0kDZZ0uf6vrqc5AdAVNJHk+rlQ0r9NYo727QxUYthpT hKfzg66UwBRtiZMHKY6+q5n6qOJINCNxIDrudolIg/5so4DrZaQjwBuExdv8TC8axN1Y lctI9cz/YQHcsY/eJ0s/O/2ESh/2GN0Kv39qjif83PqLKjwhz8/chzwX5YcX8e8EYr1/ lFvg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9eMlPVY24HiKoID6dzydanFhmPA3RfckjVd3enlhBYw=; b=HqbytdbMbvEG+w2a07H+bcWlJ115vDWZaSC6b3hm1B3Ajp1NsRzt/2erNiCRuaIde5 yQvH7Z6zt4WC1X+GMZl+5kYIDXG81GxVQQPIX3x428nIMNPbbOkTeapamxwDMNxAxd22 zm/ZG4ATIxfQDyBKn3RaOkPa2ZG3C12YCu4ai6CnuzU77xS5OhzI8OIbGDce8pu6BQ2j pJt/puSeDf4M8rmtBj+N14iXrVqgiWWpCjSbq3wgZb+7kjvMx5Fcl7Dwl975i7KQNBT2 S+lbUNLZmCGUEROkPL8lgLG6x7PFaDdThzkgJTnkTUr8QZaRs4EvWrkhmrn5KTQRWbtI s8Sw== X-Gm-Message-State: APjAAAVHNxbv65N1acUS69pYIRFUn+M3p7MieiI6xd4T0sV8z3UjugTH 0R0+sV1jf9I9YV6fOd1oigDlFg== X-Received: by 2002:a17:90a:ca0f:: with SMTP id x15mr29575281pjt.82.1561451536737; Tue, 25 Jun 2019 01:32:16 -0700 (PDT) Received: from localhost.localdomain (123-204-46-122.static.seed.net.tw. [123.204.46.122]) by smtp.gmail.com with ESMTPSA id v13sm14533710pfe.105.2019.06.25.01.32.14 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 25 Jun 2019 01:32:16 -0700 (PDT) From: Jian-Hong Pan To: Daniel Drake , Johan Hedberg , Marcel Holtmann Cc: linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, Jian-Hong Pan Subject: [PATCH v3] Bluetooth: btrtl: HCI reset on close for Realtek BT chip Date: Tue, 25 Jun 2019 16:30:51 +0800 Message-Id: <20190625083051.7525-1-jian-hong@endlessm.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Realtek RTL8822BE BT chip on ASUS X420FA cannot be turned on correctly after on-off several times. Bluetooth daemon sets BT mode failed when this issue happens. Scanning must be active while turning off for this bug to be hit. bluetoothd[1576]: Failed to set mode: Failed (0x03) If BT is turned off, then turned on again, it works correctly again. According to the vendor driver, the HCI_QUIRK_RESET_ON_CLOSE flag is set during probing. So, this patch makes Realtek's BT reset on close to fix this issue. Link: https://bugzilla.kernel.org/show_bug.cgi?id=203429 Signed-off-by: Jian-Hong Pan --- v2: - According to the vendor driver, it makes "all" Realtek's BT reset on close. So, this version makes it the same. - Change to the new subject for all Realtek BT chips. v3: - Fix the commit message and add the bug link. - Have btrtl_shutdown_realtek() which sends HCI reset command and as the callback function of hdev->shutdown for Realtek BT instead of setting HCI_QUIRK_RESET_ON_CLOSE flag. drivers/bluetooth/btrtl.c | 20 ++++++++++++++++++++ drivers/bluetooth/btrtl.h | 6 ++++++ drivers/bluetooth/btusb.c | 1 + 3 files changed, 27 insertions(+) diff --git a/drivers/bluetooth/btrtl.c b/drivers/bluetooth/btrtl.c index 208feef63de4..d04b443cad1f 100644 --- a/drivers/bluetooth/btrtl.c +++ b/drivers/bluetooth/btrtl.c @@ -637,6 +637,26 @@ int btrtl_setup_realtek(struct hci_dev *hdev) } EXPORT_SYMBOL_GPL(btrtl_setup_realtek); +int btrtl_shutdown_realtek(struct hci_dev *hdev) +{ + struct sk_buff *skb; + int ret; + + /* According to the vendor driver, BT must be reset on close to avoid + * firmware crash. + */ + skb = __hci_cmd_sync(hdev, HCI_OP_RESET, 0, NULL, HCI_INIT_TIMEOUT); + if (IS_ERR(skb)) { + ret = PTR_ERR(skb); + bt_dev_err(hdev, "HCI reset during shutdown failed"); + return ret; + } + kfree_skb(skb); + + return 0; +} +EXPORT_SYMBOL_GPL(btrtl_shutdown_realtek); + static unsigned int btrtl_convert_baudrate(u32 device_baudrate) { switch (device_baudrate) { diff --git a/drivers/bluetooth/btrtl.h b/drivers/bluetooth/btrtl.h index f1676144fce8..10ad40c3e42c 100644 --- a/drivers/bluetooth/btrtl.h +++ b/drivers/bluetooth/btrtl.h @@ -55,6 +55,7 @@ void btrtl_free(struct btrtl_device_info *btrtl_dev); int btrtl_download_firmware(struct hci_dev *hdev, struct btrtl_device_info *btrtl_dev); int btrtl_setup_realtek(struct hci_dev *hdev); +int btrtl_shutdown_realtek(struct hci_dev *hdev); int btrtl_get_uart_settings(struct hci_dev *hdev, struct btrtl_device_info *btrtl_dev, unsigned int *controller_baudrate, @@ -83,6 +84,11 @@ static inline int btrtl_setup_realtek(struct hci_dev *hdev) return -EOPNOTSUPP; } +static inline int btrtl_shutdown_realtek(struct hci_dev *hdev) +{ + return -EOPNOTSUPP; +} + static inline int btrtl_get_uart_settings(struct hci_dev *hdev, struct btrtl_device_info *btrtl_dev, unsigned int *controller_baudrate, diff --git a/drivers/bluetooth/btusb.c b/drivers/bluetooth/btusb.c index 50aed5259c2b..342e1de6bcba 100644 --- a/drivers/bluetooth/btusb.c +++ b/drivers/bluetooth/btusb.c @@ -3184,6 +3184,7 @@ static int btusb_probe(struct usb_interface *intf, #ifdef CONFIG_BT_HCIBTUSB_RTL if (id->driver_info & BTUSB_REALTEK) { hdev->setup = btrtl_setup_realtek; + hdev->shutdown = btrtl_shutdown_realtek; /* Realtek devices lose their updated firmware over suspend, * but the USB hub doesn't notice any status change. -- 2.22.0