Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7997132rwl; Tue, 10 Jan 2023 07:52:13 -0800 (PST) X-Google-Smtp-Source: AMrXdXuyGd2RPSRSpn+zIF3fWiDy0ozRcuRf3phgW9QhHJjxA3oBdXgumEdOnpZFqRL2iPUgKpYj X-Received: by 2002:a17:906:ccd2:b0:84d:45ff:d27d with SMTP id ot18-20020a170906ccd200b0084d45ffd27dmr8060370ejb.38.1673365933564; Tue, 10 Jan 2023 07:52:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673365933; cv=none; d=google.com; s=arc-20160816; b=P/zES8sCuXSY7NMu+g0gmQxTNcjflSNmqhmpSAs6/1/DGjfsPxshSbMjbTb7kM9svU Hb2hmQX8LW1a6LiBbZehZxCUDYumz6s+tVdoPRadMGWY8GuF8fKl/1cVm8WLfWnDq/xC aKRqsJjOKQ31yTFCDsr3eEYvijXyWM/vURBB0zTzuzOiY+pDz1+zJWo9hWtoRySu6qUX OlF+/uoYciAOf+b6Ykprzg8vBIFssYvpWBEvRM8Z2jLKOz+SFq+TEiqjnfyxQ/ujXbA6 KwXuyj8LGwkAdRQjeKLGITZzYLhjuoJvTnEJOOyMVkzLHV3tvjRHTFd/IFtgWsgwz/hC JyjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=L8Mo5wVs6/XeLrMdbL/ruWYw5O4F5dViS58dUCHAj7o=; b=PMcio7yNBpsU+QLc9XPDwMj9/UFv06943MiG0ul91T4W8SDUW0cGyAyO5JRW4RnzyA oQBze/xhgNMKNT8udYpXK623U3Kj1VrHR3bUCJVnCWqsInRJTJIRpnW4H/tUBb562XkQ v1ZrhsfGxqG11gJcrvUxlIgLNMix/J96SazLJjoKln+dtf6A/+49RvpXtfYMcpNdfcuI DJgTd+toDro86Lsp1fV4DRijL/h0jg44+Ui4mmpHwpN0afGWVGYgZHHn8ihGkrwY2Cqm nI5cnJDXOXoDQREx1wmetsFGqi/2cfkS38rBkONy7jXU7X/OI3NU0vaRbRxJcKopC81R BBww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GF6YoIxA; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hw19-20020a170907a0d300b007c0f7afccccsi9571068ejc.696.2023.01.10.07.51.39; Tue, 10 Jan 2023 07:52:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GF6YoIxA; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234031AbjAJPth (ORCPT + 99 others); Tue, 10 Jan 2023 10:49:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51000 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234695AbjAJPt1 (ORCPT ); Tue, 10 Jan 2023 10:49:27 -0500 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A7A4944C5B for ; Tue, 10 Jan 2023 07:49:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673365765; x=1704901765; h=from:to:cc:subject:date:message-id; bh=klDJ3cXO3vOmIiwnOoIGpsEH2vvVWuW494w103h4vC4=; b=GF6YoIxA7ovqH0Jw3leInXSX1VYmvkiEkCoG99v7wMZA0rJwliu2KTry XoZb0AcSVepbsNmX/Rse8sE2232h9ibpVIWSWqCUcNtBO5Q0LOEKi0/g4 R3mJ7Yc/sa/x3MhHskd8P2wTb58+/qxDGmpiDCVDdUuOiW8WD9TIgHMiS Jbz5PCaFKA3N0lL6xZgaX0/CSPrHJXZGHnZnSaCb562qZzp4/jORaV10k 5HpQ2Cc5Z0L4Xbp8xDtfGBrTHyGX9p/NbILni2uMeVy/3wNG77WVTaTdl pxPLcR4f1YYRpLCD3z928nIjAO8sl4ikrRuQ0LXBSOIBsOE1vmO2nbBUy w==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="310977121" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="310977121" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 07:49:16 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="745812943" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="745812943" Received: from intel-lenovo-legion-y540-15irh-pg0.iind.intel.com ([10.224.186.95]) by FMSMGA003.fm.intel.com with ESMTP; 10 Jan 2023 07:49:13 -0800 From: Kiran K To: linux-bluetooth@vger.kernel.org Cc: ravishankar.srivatsa@intel.com, Kiran K , Chethan Tumkur Narayan Subject: [PATCH v1] btintel: Add recovery when secure verification of firmware fails Date: Tue, 10 Jan 2023 21:29:05 +0530 Message-Id: <20230110155905.18203-1-kiran.k@intel.com> X-Mailer: git-send-email 2.17.1 X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org On warm reboot stress test case, firmware download failure has been observed with failure in secure verification of firmware and BT becomes completely inaccessible. This can happen due to a race condition in TOP registers when Wifi driver is also getting loaded at the same time. This patch adds a work around to load the BT firmware again when secure verify failure is observed. Signed-off-by: Kiran K Signed-off-by: Chethan Tumkur Narayan --- drivers/bluetooth/btintel.c | 20 ++++++++++++++++---- drivers/bluetooth/btintel.h | 1 + 2 files changed, 17 insertions(+), 4 deletions(-) diff --git a/drivers/bluetooth/btintel.c b/drivers/bluetooth/btintel.c index d4e2cb9a4eb4..3f2976fb056a 100644 --- a/drivers/bluetooth/btintel.c +++ b/drivers/bluetooth/btintel.c @@ -1700,6 +1700,11 @@ static int btintel_download_wait(struct hci_dev *hdev, ktime_t calltime, int mse return -ETIMEDOUT; } + if (btintel_test_flag(hdev, INTEL_FIRMWARE_VERIFY_FAILED)) { + bt_dev_err(hdev, "Firmware secure verification failed"); + return -EAGAIN; + } + if (btintel_test_flag(hdev, INTEL_FIRMWARE_FAILED)) { bt_dev_err(hdev, "Firmware loading failed"); return -ENOEXEC; @@ -1961,7 +1966,7 @@ static int btintel_download_fw(struct hci_dev *hdev, * of this device. */ err = btintel_download_wait(hdev, calltime, 5000); - if (err == -ETIMEDOUT) + if (err == -ETIMEDOUT || err == -EAGAIN) btintel_reset_to_bootloader(hdev); done: @@ -2153,7 +2158,7 @@ static int btintel_prepare_fw_download_tlv(struct hci_dev *hdev, * of this device. */ err = btintel_download_wait(hdev, calltime, 5000); - if (err == -ETIMEDOUT) + if (err == -ETIMEDOUT || err == -EAGAIN) btintel_reset_to_bootloader(hdev); done: @@ -2644,8 +2649,15 @@ void btintel_secure_send_result(struct hci_dev *hdev, if (len != sizeof(*evt)) return; - if (evt->result) - btintel_set_flag(hdev, INTEL_FIRMWARE_FAILED); + if (evt->result) { + bt_dev_err(hdev, "Intel Secure Send Results event result: %u status: %u", + evt->result, evt->status); + + if (evt->result == 3) + btintel_set_flag(hdev, INTEL_FIRMWARE_VERIFY_FAILED); + else + btintel_set_flag(hdev, INTEL_FIRMWARE_FAILED); + } if (btintel_test_and_clear_flag(hdev, INTEL_DOWNLOADING) && btintel_test_flag(hdev, INTEL_FIRMWARE_LOADED)) diff --git a/drivers/bluetooth/btintel.h b/drivers/bluetooth/btintel.h index e0060e58573c..10e5be7e451a 100644 --- a/drivers/bluetooth/btintel.h +++ b/drivers/bluetooth/btintel.h @@ -147,6 +147,7 @@ enum { INTEL_BOOTLOADER, INTEL_DOWNLOADING, INTEL_FIRMWARE_LOADED, + INTEL_FIRMWARE_VERIFY_FAILED, INTEL_FIRMWARE_FAILED, INTEL_BOOTING, INTEL_BROKEN_INITIAL_NCMD, -- 2.17.1