Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2255881imm; Wed, 3 Oct 2018 00:36:29 -0700 (PDT) X-Google-Smtp-Source: ACcGV60hBwZxZ6D1liRPWDvY4Wlgf4qD8v9nDUBOwVgibLzTSHumx4O9Fqy6O1NRX5y1U56HF6Un X-Received: by 2002:a63:4860:: with SMTP id x32-v6mr174921pgk.375.1538552189827; Wed, 03 Oct 2018 00:36:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538552189; cv=none; d=google.com; s=arc-20160816; b=lvtjVIS0AGAyko5p3UJ81kbQCXxgMsfOfLkDx8ixkWYe/qhH30U6RQc9FeXMnGc4Jo T2lJD43nE9CdjrVYv5DgAzCW0uuUe2gQiUnzLOpdTsFhZr/oDmIQ5ZIZ/zxTLU2qSE/K njk3HgffKmAvI8P5SaYbUGE9vU98Tz0EyJXPZWvCcm3WfB/6c0PDAftV3C52liumFBtA UlQZVtF8Tz741mkPsCF0fJ+Yt1JjqotoiakKRhn9pwVo6t6abYwntCgIZMst9xdMq7Kv Q2YOsjt9ix+mqRtb+4dwsQDR+Hswjkap5pxpZNEN4A1Lie2L5g0NnwXWosfofa8XLpyA BBrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=8YOqVBCwRC9qs1LZpCb8zuILEBCEroisFmxJFpCpLfc=; b=AyvU6RyyvUkhROzx9+VpDK5o4hQ3vvFbTaF8bzxwTNldlP1d6mDJh9UJYRBC/+WoiH Z+eRQ5uu/ytY/HynFEagTWqt1/8zCRbO/G7YC6uhM9f3cHf8N3U7B2OiW+zvQ1Mh5nzD 5YgYme0kGG03ByeCzV0j65cqmilabMWk0s0ngGoPqFoVJmcpuA4UYjs3vnzW63SDRxPp CfZoTi2PKXnEmec6jEt50j2al/M9VYMyS6KD/v+IHRnXpQsLqrJNAn+c8lBos0YTSKf7 bvycp40NpgwlhKW62Ph7BN4581CCE9a1ccYOTPAStai00ADhT7+y6+884AirNCneSWq5 Cc8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q24-v6si699574pgb.11.2018.10.03.00.36.14; Wed, 03 Oct 2018 00:36:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727092AbeJCOXQ (ORCPT + 99 others); Wed, 3 Oct 2018 10:23:16 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:56136 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726672AbeJCOXP (ORCPT ); Wed, 3 Oct 2018 10:23:15 -0400 Received: from 61-220-137-37.hinet-ip.hinet.net ([61.220.137.37] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from ) id 1g7bhR-00088O-Sf; Wed, 03 Oct 2018 07:36:02 +0000 From: Kai-Heng Feng To: Marcel Holtmann , Johan Hedberg Cc: Kai-Heng Feng , linux-kernel@vger.kernel.org, linux-bluetooth@vger.kernel.org Subject: [RESEND] [PATCH 1/3] Bluetooth: btintel: Add firmware lock function Date: Wed, 3 Oct 2018 15:35:54 +0800 Message-Id: <20181003073556.28154-1-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When Intel 8260 starts to load Bluetooth firmware and WiFi firmware, by calling btintel_download_firmware() and iwl_pcie_load_given_ucode_8000() respectively, the Bluetooth btintel_download_firmware() aborts half way: [ 11.950216] Bluetooth: hci0: Failed to send firmware data (-38) Let btusb and iwlwifi load firmwares exclusively can avoid the issue, so introduce a lock to use in btusb and iwlwifi. Signed-off-by: Kai-Heng Feng --- drivers/bluetooth/btintel.c | 14 ++++++++++++++ drivers/bluetooth/btintel.h | 10 ++++++++++ include/linux/intel-wifi-bt.h | 8 ++++++++ 3 files changed, 32 insertions(+) create mode 100644 include/linux/intel-wifi-bt.h diff --git a/drivers/bluetooth/btintel.c b/drivers/bluetooth/btintel.c index 5270d5513201..2d2a983a6641 100644 --- a/drivers/bluetooth/btintel.c +++ b/drivers/bluetooth/btintel.c @@ -35,6 +35,8 @@ #define BDADDR_INTEL (&(bdaddr_t) {{0x00, 0x8b, 0x9e, 0x19, 0x03, 0x00}}) +static DEFINE_MUTEX(firmware_lock); + int btintel_check_bdaddr(struct hci_dev *hdev) { struct hci_rp_read_bd_addr *bda; @@ -724,6 +726,18 @@ int btintel_download_firmware(struct hci_dev *hdev, const struct firmware *fw, } EXPORT_SYMBOL_GPL(btintel_download_firmware); +void btintel_firmware_lock(void) +{ + mutex_lock(&firmware_lock); +} +EXPORT_SYMBOL_GPL(btintel_firmware_lock); + +void btintel_firmware_unlock(void) +{ + mutex_unlock(&firmware_lock); +} +EXPORT_SYMBOL_GPL(btintel_firmware_unlock); + MODULE_AUTHOR("Marcel Holtmann "); MODULE_DESCRIPTION("Bluetooth support for Intel devices ver " VERSION); MODULE_VERSION(VERSION); diff --git a/drivers/bluetooth/btintel.h b/drivers/bluetooth/btintel.h index 41c642cc523f..1373ffc2b575 100644 --- a/drivers/bluetooth/btintel.h +++ b/drivers/bluetooth/btintel.h @@ -102,6 +102,8 @@ int btintel_read_boot_params(struct hci_dev *hdev, struct intel_boot_params *params); int btintel_download_firmware(struct hci_dev *dev, const struct firmware *fw, u32 *boot_param); +void btintel_firmware_lock(void); +void btintel_firmware_unlock(void); #else static inline int btintel_check_bdaddr(struct hci_dev *hdev) @@ -196,4 +198,12 @@ static inline int btintel_download_firmware(struct hci_dev *dev, { return -EOPNOTSUPP; } + +static inline void btintel_firmware_lock(void) +{ +} + +static inline void btintel_firmware_unlock(void) +{ +} #endif diff --git a/include/linux/intel-wifi-bt.h b/include/linux/intel-wifi-bt.h new file mode 100644 index 000000000000..260ed628d19b --- /dev/null +++ b/include/linux/intel-wifi-bt.h @@ -0,0 +1,8 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef __INTEL_WIFI_BT_H__ +#define __INTEL_WIFI_BT_H__ + +void btintel_firmware_lock(void); +void btintel_firmware_unlock(void); + +#endif -- 2.17.1