Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp5239384rdb; Sat, 30 Dec 2023 11:44:18 -0800 (PST) X-Google-Smtp-Source: AGHT+IGbTKTBM0OQNF6jSx0BI0ZRTO7fon1ygd9GyTdeEv6QkB4si+uFHLqgr+2W51Z/PoDDP/I8 X-Received: by 2002:a05:6870:3927:b0:1fb:75b:130e with SMTP id b39-20020a056870392700b001fb075b130emr16929950oap.96.1703965457965; Sat, 30 Dec 2023 11:44:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703965457; cv=none; d=google.com; s=arc-20160816; b=th1L0SeL5HUe3C8Pl3CnHXiTx/Q2BoooqChBRw+eS3SdGpD/3FN7gxPV+klU6k3nRw 2FFaeXDsjslav1DffHksQQDFWDSO6V2wWNWdQK2F7sCWqC4NDyopJZuYd61EBLYCnfi7 ftQM4dBctTrxZ01ABxvDyfkV4Nb73KcrtKB894EyCp0S7purEbl6dgFXlaruEVDszgOs apc8DRQPbpqaykB51qus1/XUrOdK4zKrXy5DDgkPV5N8EHU6LpQ+bnti3IsAbQ/u7c0d Ql3qG/0rGHPm9Z26ZBdbpJ5tM/crLqkNCZO046OTWKmA1XmdQThjqajcnxXhNVsSkfVF R8Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:feedback-id:references :in-reply-to:message-id:subject:cc:from:to:date:dkim-signature; bh=OxoL4VxT9E+VrhbDUVt3Q/iTv0P+LTHXnaE7vR1Zcp8=; fh=usVY1xGC1l0oBoSyXjwgXuBGsW5XKyiMpa4trnyGzY8=; b=ZOO6vJcn6nbwC7U3druFj4mEnN3DwiWIKVYLe7LHuB+iLl1YOHpZh8APiRI9sa5z/8 v+FeyzkYs7mI29mfNH0Ju/J+ehwEPW6ZeUW/BgfV6GqvhlgTYBLAIgPY38NIFQkmCp64 MsK7O987382WldbkwFhjO/L+B7xNp0XToZjwnGbhoio+5ua1IboPoVMyZufmvm1yDIlP o5ZNqu/POZf5PXQIgN3NX/hCRhyjKm4qo1AKxbIQi5v9R49C0sFYIkCHBhjj5vrSFwVf enRm2O5aBAGDKzcpsA3G9rjLR6mx4qgovw5kUONc1m1uQXQnIG6PqwBXUmsie/RjfYMz UEJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@protonmail.com header.s=protonmail3 header.b=UpIzOKKa; spf=pass (google.com: domain of linux-kernel+bounces-13579-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13579-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=protonmail.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id q17-20020a631f51000000b005ce0be7966fsi11694963pgm.898.2023.12.30.11.44.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 30 Dec 2023 11:44:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-13579-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@protonmail.com header.s=protonmail3 header.b=UpIzOKKa; spf=pass (google.com: domain of linux-kernel+bounces-13579-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13579-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=protonmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 795C0283EE6 for ; Sat, 30 Dec 2023 19:44:17 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3D919C122; Sat, 30 Dec 2023 19:44:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=protonmail.com header.i=@protonmail.com header.b="UpIzOKKa" X-Original-To: linux-kernel@vger.kernel.org Received: from mail-4322.protonmail.ch (mail-4322.protonmail.ch [185.70.43.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 13B6BBE4E for ; Sat, 30 Dec 2023 19:44:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=protonmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=protonmail.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1703965448; x=1704224648; bh=OxoL4VxT9E+VrhbDUVt3Q/iTv0P+LTHXnaE7vR1Zcp8=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=UpIzOKKa3eUpZlB7iWpRGGRr8FX5M1RYLpR/IErm8OvBcDO6sXQ3qsS3ULqE2fpVm CH15YZKyfHTWm4/NwimAJs/H+w3FouEzn6SZt8h3ND5xk/8V7ihzYplEm1XACZtLzR b1DXEz3rqBkrzohFLAK+5LPu/478KtSat8Gmk++JL57xNr77Sjglwkmtw5458LJr48 rJRJQVfgvkeaMJ5sfgDwka7V69wm6WXuOaiazXdCiDj17KL1rtipJY9DXOSk/VJjsS cx39UIlPrgq2NQYBqm/C2hKzOp5W3/K8bJjL99Rah45OpBDvM2Nsu+LMEvY0WbRrpi ozzMhgb9IbLVA== Date: Sat, 30 Dec 2023 19:43:45 +0000 To: Larry Finger From: Rahul Rameshbabu Cc: Kalle Valo , linux-wireless@vger.kernel.org, b43-dev@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH wireless 3/5] wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled Message-ID: <877ckvwk5v.fsf@protonmail.com> In-Reply-To: References: <20231230045105.91351-1-sergeantsagara@protonmail.com> <20231230045105.91351-4-sergeantsagara@protonmail.com> Feedback-ID: 26003777:user:proton Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On Sat, 30 Dec, 2023 12:04:02 -0600 "Larry Finger" wrote: > On 12/29/23 22:51, Rahul Rameshbabu wrote: >> +=09=09if (dev->qos_enabled) >> +=09=09=09ieee80211_stop_queue(dev->wl->hw, >> +=09=09=09=09=09 skb_get_queue_mapping(skb)); >> +=09=09else >> +=09=09=09ieee80211_stop_queue(dev->wl->hw, 0); > > This code sequence occurs in several places. Would it be better to put th= is in a > routine specific to b43, thus it would only be used once? Right, I am waiting to converge on the discussion in the second patch in this series before making this refactor, but I agree that this pattern is prevelant and should be refactored if this is the approach taken. > > We certainly could try extracting firmware from a newer binary. Any sugge= stions? Unfortunately, new firmware would not prevent the need to fix up the code with regards to QoS being disabled via the kernel parameter or using OpenFW. That said, new firmware could help us drop the fifth patch in this series. I am thinking about using b43-fwcutter to extract proprietary fw from a newer release of broadcom-wl to see if that makes a difference. That said, I am a bit puzzled since the device I am testing on released in early 2011, and I used firmware released in late 2012. -- Thanks, Rahul Rameshbabu