Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp35129imm; Wed, 3 Oct 2018 11:26:09 -0700 (PDT) X-Google-Smtp-Source: ACcGV60RhqXcT6Q+ZSLDiZXETjaEGRnz5XvyOXKKYXrrZW/lQPsTXEL4gRJRx7MfIp54a3/m4jWh X-Received: by 2002:a63:c912:: with SMTP id o18-v6mr2441315pgg.331.1538591169847; Wed, 03 Oct 2018 11:26:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538591169; cv=none; d=google.com; s=arc-20160816; b=SBVwdDZ7GUBRFCKUM/nXP6yv9YOwOKClKJjfn+1VCRo0IHZ6CXtFm3S8iE4iCkDH3l v5z2QRBZGobF3+RDaEZbACOjnZ9C4wt4U0KbfRhCmJogWb4Kbe2+9ybpOozUFMlVkivk A76zbMCd46JTcV4VBSe9zMklmGngiL2fcsXKECuAM6ki5kjlonliHvIclsCvwdDyHjQR 3vRjhPRVpBmnT4D02WiBJTJXjPB1yCr+rXNmGo47gYQXdhX9MwjeHRG5RWD31Jgv6OrF ggAKZaus3+zJiTK9ZivQ8pZAEVAo2KB+J1L48fBZW8LIcp/FBkoXMk0ap27gQNe+qIdS kAUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=no+q58IvoUy7gx1HTAj6ZH53RmauKsTZkMFMySCZzKo=; b=Er/dJWnKXZE2Eg4OFZaTAFrKL3W3P8PZjAFY9083qPipPzaGD4laMIg78HeVbsUN1g poT1hd7KiEH1Np7KPZPz+Qfo5huuf65a1qVrW16lkyvddp/VP2EGPgxonJUcypsK233b XD/vHQDRdm2pzTdfGSg+LyokPWGUS8ZspgLafoaSF7g8AK3sOMQ+P5/yaeGuHUHj/lZ/ cUsbhmtsFWRXjowpHpJB/3fVKJ10U1SgJ0hwqnZpHhx8FX3bjcbuOjceajsgAXtkQLIE BvJL2CBY9T8euNRpcAUqidz6LN3H2z4g82RVBzfug1BWmLOJgabhc/4Clpp/AuZiIQj8 wVpQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h4-v6si2144975pgj.507.2018.10.03.11.25.30; Wed, 03 Oct 2018 11:26:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727319AbeJDBOw convert rfc822-to-8bit (ORCPT + 99 others); Wed, 3 Oct 2018 21:14:52 -0400 Received: from coyote.holtmann.net ([212.227.132.17]:47832 "EHLO mail.holtmann.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726851AbeJDBOw (ORCPT ); Wed, 3 Oct 2018 21:14:52 -0400 Received: from marcel-macbook.fritz.box (p4FEFC9BB.dip0.t-ipconnect.de [79.239.201.187]) by mail.holtmann.org (Postfix) with ESMTPSA id 7465ECF359; Wed, 3 Oct 2018 20:32:37 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 12.0 \(3445.100.39\)) Subject: Re: [PATCH 3/3] iwlwifi: Load firmware exclusively for Intel WiFi From: Marcel Holtmann In-Reply-To: <24BAAAAB-17E4-4820-A09A-50984B8EBA40@canonical.com> Date: Wed, 3 Oct 2018 20:25:18 +0200 Cc: Matt Chen , Luciano Coelho , LKML , Johannes Berg , "Grumbach, Emmanuel" , linuxwifi@intel.com, Kalle Valo , "David S. Miller" , linux-wireless , netdev@vger.kernel.org Content-Transfer-Encoding: 8BIT Message-Id: <910F8A29-3141-422F-87EE-7BFBCDE9060C@holtmann.org> References: <20181003071513.13004-3-kai.heng.feng@canonical.com> <2787bccf20b6f647de9f4cafae5fd223e771b167.camel@intel.com> <81B978A9-270E-4C0B-BE67-D05899B1BC3B@canonical.com> <24BAAAAB-17E4-4820-A09A-50984B8EBA40@canonical.com> To: Kai Heng Feng X-Mailer: Apple Mail (2.3445.100.39) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Kai-Heng, >> I think Canonical were facing some wifi fw load error from some 8260 >> earlier module during the BT still loading the fw. >> I believe we had later 8260 sku that fixed this issue. > > But there are already 8260 that is affected by this bug in the wild. > > Search "Bluetooth: hci0: Failed to send firmware data (-38)” and there are lots of user are affected. which SKUs are these actually. What are the initial details about the boot loader. For the Bluetooth side, you should be able to grab them from dmesg or by running btmon. So I am not in favor of this kind of hack and creating dependencies between drivers. If you only have a hammer, then everything looks like a nail. And this is a massive hammer trying to squash everything. This problem needs to be debugged. And this starts by providing affected SKU information and firmware information. So get the details about the SKU and its Bluetooth and WiFi boot loaders. Regards Marcel