1. 29 Oct, 2021 1 commit
    • Marcel Holtmann's avatar
      Bluetooth: Add helper for serialized HCI command execution · 6a98e383
      Marcel Holtmann authored
      The usage of __hci_cmd_sync() within the hdev->setup() callback allows for
      a nice and simple serialized execution of HCI commands. More importantly
      it allows for result processing before issueing the next command.
      
      With the current usage of hci_req_run() it is possible to batch up
      commands and execute them, but it is impossible to react to their
      results or errors.
      
      This is an attempt to generalize the hdev->setup() handling and provide
      a simple way of running multiple HCI commands from a single function
      context.
      
      There are multiple struct work that are decdicated to certain tasks
      already used right now. It is add a lot of bloat to hci_dev struct and
      extra handling code. So it might be possible to put all of these behind
      a common HCI command infrastructure and just execute the HCI commands
      from the same work context in a serialized fashion.
      
      For example updating the white list and resolving list can be done now
      without having to know the list size ahead of time. Also preparing for
      suspend or resume shouldn't require a state machine anymore. There are
      other tasks that should be simplified as well.
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      6a98e383
  2. 28 Oct, 2021 1 commit
  3. 25 Oct, 2021 13 commits
  4. 22 Oct, 2021 1 commit
  5. 20 Oct, 2021 2 commits
  6. 14 Oct, 2021 1 commit
  7. 13 Oct, 2021 5 commits
    • Mark-YW.Chen's avatar
      Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() · 60c6a63a
      Mark-YW.Chen authored
      Driver should free `usb->setup_packet` to avoid the leak.
      
      $ cat /sys/kernel/debug/kmemleak
      unreferenced object 0xffffffa564a58080 (size 128):
          backtrace:
              [<000000007eb8dd70>] kmem_cache_alloc_trace+0x22c/0x384
              [<000000008a44191d>] btusb_mtk_hci_wmt_sync+0x1ec/0x994
          [btusb]
              [<00000000ca7189a3>] btusb_mtk_setup+0x6b8/0x13cc
          [btusb]
              [<00000000c6105069>] hci_dev_do_open+0x290/0x974
          [bluetooth]
              [<00000000a583f8b8>] hci_power_on+0xdc/0x3cc [bluetooth]
              [<000000005d80e687>] process_one_work+0x514/0xc80
              [<00000000f4d57637>] worker_thread+0x818/0xd0c
              [<00000000dc7bdb55>] kthread+0x2f8/0x3b8
              [<00000000f9999513>] ret_from_fork+0x10/0x30
      
      Fixes: a1c49c43 ("Bluetooth: btusb: Add protocol support for MediaTek MT7668U USB devices")
      Signed-off-by: default avatarMark-YW.Chen <mark-yw.chen@mediatek.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      60c6a63a
    • Wei Yongjun's avatar
      Bluetooth: Fix memory leak of hci device · 75d9b855
      Wei Yongjun authored
      Fault injection test reported memory leak of hci device as follows:
      
      unreferenced object 0xffff88800b858000 (size 8192):
        comm "kworker/0:2", pid 167, jiffies 4294955747 (age 557.148s)
        hex dump (first 32 bytes):
          00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
          00 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de  .............N..
        backtrace:
          [<0000000070eb1059>] kmem_cache_alloc_trace mm/slub.c:3208
          [<00000000015eb521>] hci_alloc_dev_priv include/linux/slab.h:591
          [<00000000dcfc1e21>] bpa10x_probe include/net/bluetooth/hci_core.h:1240
          [<000000005d3028c7>] usb_probe_interface drivers/usb/core/driver.c:397
          [<00000000cbac9243>] really_probe drivers/base/dd.c:517
          [<0000000024cab3f0>] __driver_probe_device drivers/base/dd.c:751
          [<00000000202135cb>] driver_probe_device drivers/base/dd.c:782
          [<000000000761f2bc>] __device_attach_driver drivers/base/dd.c:899
          [<00000000f7d63134>] bus_for_each_drv drivers/base/bus.c:427
          [<00000000c9551f0b>] __device_attach drivers/base/dd.c:971
          [<000000007f79bd16>] bus_probe_device drivers/base/bus.c:487
          [<000000007bb8b95a>] device_add drivers/base/core.c:3364
          [<000000009564d9ea>] usb_set_configuration drivers/usb/core/message.c:2171
          [<00000000e4657087>] usb_generic_driver_probe drivers/usb/core/generic.c:239
          [<0000000071ede518>] usb_probe_device drivers/usb/core/driver.c:294
          [<00000000cbac9243>] really_probe drivers/base/dd.c:517
      
      hci_alloc_dev() do not init the device's flag. And hci_free_dev()
      using put_device() to free the memory allocated for this device,
      but it calls just put_device(dev) only in case of HCI_UNREGISTER
      flag is set, So any error handing before hci_register_dev() success
      will cause memory leak.
      
      To avoid this behaviour we can using kfree() to release dev before
      hci_register_dev() success.
      Signed-off-by: default avatarWei Yongjun <weiyongjun1@huawei.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      75d9b855
    • Kiran K's avatar
      Bluetooth: btintel: Fix bdaddress comparison with garbage value · 89350531
      Kiran K authored
      Intel Read Verision(TLV) data is parsed into a local structure variable
      and it contains a field for bd address. Bd address is returned only in
      bootloader mode and hence bd address in TLV structure needs to be validated
      only if controller is present in boot loader mode.
      Signed-off-by: default avatarKiran K <kiran.k@intel.com>
      Reviewed-by: default avatarTedd Ho-Jeong An <tedd.an@intel.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      89350531
    • Wei Yongjun's avatar
      Bluetooth: Fix debugfs entry leak in hci_register_dev() · 5a4bb6a8
      Wei Yongjun authored
      Fault injection test report debugfs entry leak as follows:
      
      debugfs: Directory 'hci0' with parent 'bluetooth' already present!
      
      When register_pm_notifier() failed in hci_register_dev(), the debugfs
      create by debugfs_create_dir() do not removed in the error handing path.
      
      Add the remove debugfs code to fix it.
      Signed-off-by: default avatarWei Yongjun <weiyongjun1@huawei.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      5a4bb6a8
    • David Yang's avatar
      Bluetooth: btusb: Fix application of sizeof to pointer · dc1650fc
      David Yang authored
      The coccinelle check report:
      "./drivers/bluetooth/btusb.c:2239:36-42:
      ERROR: application of sizeof to pointer".
      Using the real size to fix it.
      
      Fixes: 5a87679f ("Bluetooth: btusb: Support public address configuration for MediaTek Chip.")
      Reported-by: default avatarZeal Robot <zealci@zte.com.cn>
      Signed-off-by: default avatarDavid Yang <davidcomponentone@gmail.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      dc1650fc
  8. 12 Oct, 2021 2 commits
  9. 07 Oct, 2021 3 commits
  10. 06 Oct, 2021 2 commits
    • Luiz Augusto von Dentz's avatar
      Bluetooth: Fix handling of SUSPEND_DISCONNECTING · 83775456
      Luiz Augusto von Dentz authored
      When SUSPEND_DISCONNECTING bit is set that means Disconnect is pending
      but the code was evaluating if the list is empty before calling
      hci_conn_del which does the actual cleanup and remove the connection
      from the list thus the bit is never cleared causing the suspend
      procedure to always timeout when there are connections to be
      disconnected:
      
      Suspend/Resume - Success 5 (Pairing - Legacy) - waiting done
        Set the system into Suspend via force_suspend
      = mgmt-tester: Suspend/Resume - Success 5 (Pairing -..   17:03:13.200458
      = mgmt-tester: Set the system into Suspend via force_suspend    17:03:13.205812
      < HCI Command: Write Scan E.. (0x03|0x001a) plen 1  #122 [hci0] 17:03:13.213561
              Scan enable: No Scans (0x00)
      > HCI Event: Command Complete (0x0e) plen 4         #123 [hci0] 17:03:13.214710
            Write Scan Enable (0x03|0x001a) ncmd 1
              Status: Success (0x00)
      < HCI Command: Disconnect (0x01|0x0006) plen 3      #124 [hci0] 17:03:13.215830
              Handle: 42
              Reason: Remote Device Terminated due to Power Off (0x15)
      > HCI Event: Command Status (0x0f) plen 4           #125 [hci0] 17:03:13.216602
            Disconnect (0x01|0x0006) ncmd 1
              Status: Success (0x00)
      > HCI Event: Disconnect Complete (0x05) plen 4      #126 [hci0] 17:03:13.217342
              Status: Success (0x00)
              Handle: 42
              Reason: Remote Device Terminated due to Power Off (0x15)
      @ MGMT Event: Device Disconn.. (0x000c) plen 8  {0x0002} [hci0] 17:03:13.217688
              BR/EDR Address: 00:AA:01:01:00:00 (Intel Corporation)
              Reason: Connection terminated by local host for suspend (0x05)
      @ MGMT Event: Device Disconn.. (0x000c) plen 8  {0x0001} [hci0] 17:03:13.217688
              BR/EDR Address: 00:AA:01:01:00:00 (Intel Corporation)
              Reason: Connection terminated by local host for suspend (0x05)
      Suspend/Resume - Success 5 (Pairing - Legacy) - test timed out
      = mgmt-tester: Suspend/Resume - Success 5 (Pairing -..   17:03:13.939317
      Suspend/Resume - Success 5 (Pairing - Legacy) - teardown
      = mgmt-tester: Suspend/Resume - Success 5 (Pairing -..   17:03:13.947267
      [   13.284291] Bluetooth: hci0: Timed out waiting for suspend events
      [   13.287324] Bluetooth: hci0: Suspend timeout bit: 6
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      83775456
    • Luiz Augusto von Dentz's avatar
      Bluetooth: hci_vhci: Fix calling hci_{suspend,resume}_dev · d16e6d19
      Luiz Augusto von Dentz authored
      Defer calls to hci_{suspend,resume}_dev to work so it doesn't block the
      processing of the events.
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      d16e6d19
  11. 05 Oct, 2021 9 commits