Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1743963imu; Thu, 17 Jan 2019 02:31:06 -0800 (PST) X-Google-Smtp-Source: ALg8bN4hrQed169luVxh9+T88o/VGU5e16ZOADmUOnZGb6GDqZqeVjZuytdGNs2LSuGRe0BkZ7/a X-Received: by 2002:a63:7d06:: with SMTP id y6mr12838315pgc.171.1547721066804; Thu, 17 Jan 2019 02:31:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547721066; cv=none; d=google.com; s=arc-20160816; b=I9pZLhEjsP9tDqqfkLFmf7hJGQqVypBvQ+l5+dbu6P3XfmR7OecRipzeDggZZCgvhp /A5slLekuUMOMqFFQcOGckcD8g0mtNSMiHkjw+9ahLXjxV3Orq2ywuc1zZMqGDYcWwaR EIclo0OzbqGCSiqmEXYWvEXNvMmWX0MD20NmIgH23C8r7XWRYNRvT7cQ00LGOvjLc2NT lLGyQ0xkI1k30+kd2SW5x62ve7GSGxQ2sVSBdeUmyOd+5srPPbqYV5Ee84TCC2rtLjmr 2JDJ1h2IbqQPq217Vwbb5UMf53kqSZeUo2oF5k8hla/ZmF2XYkV/w9m+Mk0CVGDn8WLI T4AA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature:dkim-signature; bh=Bzi6PbomNDO7jLNSc3Up3uDcuGRIKvu351vswf5a4ks=; b=Fg2GgEwjv2q7jedLu6dDGgPdNkvlY/4piBYjUb5PHUDA4RMge58HlerIRaKUdtZLnO KDWg8NbGYso4nOQ+b7W8XoGc/nWggtT0KZteaoybekd4B+xRSr4LvliHkOqb/O4PLENK YDsPEc78rUH7RMNytSD6fY0CqF5HA8sNFRsoxzgm+rQjtl49WQFuo+sdyHE4gYTIvIRM MUX6IP0hSCszRo1tccQTjHWO3N9mMg6KVT8ZkApqoqf9sZuIFWDlfXEjynG5GRGgoUUR 2xBx2jo1E6DjlVKwJLg41Y/LdXSz487lBJPZhxQWqB4Ja3BxarXVU6WiYMWX/rFRO42V VcXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=WLlFwYtX; dkim=pass header.i=@codeaurora.org header.s=default header.b=gBkjD5R6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j186si1371370pfb.174.2019.01.17.02.30.51; Thu, 17 Jan 2019 02:31:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=WLlFwYtX; dkim=pass header.i=@codeaurora.org header.s=default header.b=gBkjD5R6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728095AbfAQK1z (ORCPT + 99 others); Thu, 17 Jan 2019 05:27:55 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:39288 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727929AbfAQK1y (ORCPT ); Thu, 17 Jan 2019 05:27:54 -0500 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 6E63460A0A; Thu, 17 Jan 2019 10:27:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1547720873; bh=NOsk1mAdMP9C98CozzoBaA3CYvF+HcfMMSA7Tf0HRMY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=WLlFwYtXWMuJW042vYCGtfcTeQD5PgxPXs6GjPsJrwbZrn6iKNqTSXNxa6t6b5hUT TylTSNt2KqaYnzsjFVp5dCNXGrSAZ/2WGpnuUCMv0Bu1sjZbaNMoyzF438MN3lWCTw K1RCilKFoWrpNyqSMcvhJMluLkkUU9Nwo0xdFrHc= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.codeaurora.org (Postfix) with ESMTP id 2EBB460A08; Thu, 17 Jan 2019 10:27:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1547720869; bh=NOsk1mAdMP9C98CozzoBaA3CYvF+HcfMMSA7Tf0HRMY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=gBkjD5R6AHPCWR7OlblBly/tJY6Vr3jjzsJkos6UICNvyKMT6+mB/op78pbVa6kjS snlDAHhpNoZkSXKTTQxwcfqiTWjU4D3XDZRup/590Q7Sn1SZV7qoMiQxHaa7KvgHBq fLn9YMsMTaOhBK2bUC0mAXA6+knZj6b1JlssqhGs= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 17 Jan 2019 15:57:48 +0530 From: Balakrishna Godavarthi To: Matthias Kaehlcke Cc: marcel@holtmann.org, johan.hedberg@gmail.com, linux-kernel@vger.kernel.org, linux-bluetooth@vger.kernel.org, hemantg@codeaurora.org, linux-arm-msm@vger.kernel.org Subject: Re: [PATCH v8 3/3] Bluetooth: hci_qca: Disable IBS state machine and flush Tx buffer In-Reply-To: <20190116230801.GT261387@google.com> References: <20190116114603.500-1-bgodavar@codeaurora.org> <20190116114603.500-4-bgodavar@codeaurora.org> <20190116230801.GT261387@google.com> Message-ID: <5b507ee20e9e4ba022334433aa2f3691@codeaurora.org> X-Sender: bgodavar@codeaurora.org User-Agent: Roundcube Webmail/1.2.5 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019-01-17 04:38, Matthias Kaehlcke wrote: > On Wed, Jan 16, 2019 at 05:16:03PM +0530, Balakrishna Godavarthi wrote: >> During hci down we observed IBS sleep commands are queued in the Tx >> buffer and hci_uart_write_work is sending data to the chip which is >> not required as the chip is powered off. This patch will disable IBS >> and flush the Tx buffer before we turn off the chip. >> >> Signed-off-by: Balakrishna Godavarthi >> --- >> drivers/bluetooth/hci_qca.c | 8 ++++++++ >> 1 file changed, 8 insertions(+) >> >> diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c >> index 7e4afcf40da2..7330ba71ada4 100644 >> --- a/drivers/bluetooth/hci_qca.c >> +++ b/drivers/bluetooth/hci_qca.c >> @@ -1275,6 +1275,14 @@ static const struct qca_vreg_data qca_soc_data >> = { >> >> static void qca_power_shutdown(struct hci_uart *hu) >> { >> + struct qca_data *qca = hu->priv; >> + >> + /* From this point we go into power off state. But serial port is >> + * still open, stop queueing the IBS data and flush all the buffered >> + * data in skb's. >> + */ >> + clear_bit(STATE_IN_BAND_SLEEP_ENABLED, &qca->flags); >> + qca_flush(hu); >> host_set_baudrate(hu, 2400); >> qca_send_power_pulse(hu, QCA_WCN3990_POWEROFF_PULSE); >> qca_power_setup(hu, false); > > Due to a race-condition there could be an IBS sleep command queued > even after clearing the bit and flushing the queue. > > In qca_enqueue() we have this: > > static int qca_enqueue(struct hci_uart *hu, struct sk_buff *skb) > { > ... > > /* Don't go to sleep in middle of patch download or > * Out-Of-Band(GPIOs control) sleep is selected. > */ > if (!test_bit(STATE_IN_BAND_SLEEP_ENABLED, &qca->flags)) { > skb_queue_tail(&qca->txq, skb); > return 0; > } > > spin_lock_irqsave(&qca->hci_ibs_lock, flags); > } > > With process X executing qca_power_shutdown() and process Y running > qca_enqueue() this could happen: > > [X] test_bit(STATE_IN_BAND_SLEEP_ENABLED) => set > [Y] clear_bit(STATE_IN_BAND_SLEEP_ENABLED) > [Y] qca_flush(hu); > [X] skb_queue_tail(&qca->txq, skb); > > The following should fix this race: > > --- a/drivers/bluetooth/hci_qca.c > +++ b/drivers/bluetooth/hci_qca.c > @@ -770,16 +770,17 @@ static int qca_enqueue(struct hci_uart *hu, > struct sk_buff *skb) > /* Prepend skb with frame type */ > memcpy(skb_push(skb, 1), &hci_skb_pkt_type(skb), 1); > > + spin_lock_irqsave(&qca->hci_ibs_lock, flags); > + > /* Don't go to sleep in middle of patch download or > * Out-Of-Band(GPIOs control) sleep is selected. > */ > if (!test_bit(STATE_IN_BAND_SLEEP_ENABLED, &qca->flags)) { > skb_queue_tail(&qca->txq, skb); > + spin_unlock_irqrestore(&qca->hci_ibs_lock, flags); > return 0; > } > > - spin_lock_irqsave(&qca->hci_ibs_lock, flags); > - > /* Act according to current state */ > switch (qca->tx_ibs_state) { > case HCI_IBS_TX_AWAKE: > @@ -1275,13 +1276,17 @@ static const struct qca_vreg_data qca_soc_data > = { > static void qca_power_shutdown(struct hci_uart *hu) > { > struct qca_data *qca = hu->priv; > + unsigned long flags; > > /* From this point we go into power off state. But serial port is > * still open, stop queueing the IBS data and flush all the buffered > * data in skb's. > */ > + spin_lock_irqsave(&qca->hci_ibs_lock, flags); > clear_bit(STATE_IN_BAND_SLEEP_ENABLED, &qca->flags); > qca_flush(hu); > + spin_unlock_irqrestore(&qca->hci_ibs_lock, flags); > + [Bala]: Thanks for catch this. yes you are rite, we will have an byte queued in the skb. will update with the lock. > host_set_baudrate(hu, 2400); > qca_send_power_pulse(hu, QCA_WCN3990_POWEROFF_PULSE); > qca_power_setup(hu, false); > > Cheers > > Matthias -- Regards Balakrishna.