Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp11878342rwl; Tue, 3 Jan 2023 06:07:31 -0800 (PST) X-Google-Smtp-Source: AMrXdXs1/odO7fluT1ettdlxjDLzpyiPAqIEMmQgyZW9vNXhXSdyGV0QZ0sMzLA+S6XVsmtqWHdM X-Received: by 2002:a05:6402:321a:b0:48b:b23f:1f40 with SMTP id g26-20020a056402321a00b0048bb23f1f40mr12751044eda.30.1672754851554; Tue, 03 Jan 2023 06:07:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672754851; cv=none; d=google.com; s=arc-20160816; b=qi6n4QI5JHsP4ljtIlMCkcCSjnZlU3pqazyEi17nOKP+r5KZyGY1INBnEOBov2AQUA SvXjslg9TFufu5SCKmQ6XFAiVuGkuRAXc+S1WWteXMv0/k9w2gyM45Z75Ket4O/diXYa idNXBtwGSJfLSJwHF7JBEIXS7VBndLNkaaiRdgQLJTVVtbrsb0WrNEef9s75L4J4ahZM 1bG/BFcpIBVkn+jEhXbM5RgdcJj32/HEE+8Wncgeg4fvSlALZPlXNPYrpmSVXhQK3brd QB5BddLVTvLC1hpCkLiPlPiqtH9jKm3Ivknxepa/PQ+vlkF9TWz6CZvIXVjpNhfUfVHO u4Kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :authenticated-by; bh=pEu/9IIwnkKy27+iJMF77XPSr7uTI9QEMQebh/rfNFU=; b=Q8BnmUyEiAGe4i2kj01Kn3PnsXmYj22FKkfEKULuWHwQrc2RYGNK+BzhtCG4RyfCwz GhYBTGATTDMylRR++6eIvnkFBvlm/lnAyO9ny223jbEU7XqGMtkrWnrGvvUg8QwFT7YX QWYJZxPgFmvUXHabzWP8xPHcSOaBsVibYqlhsF24MHprNWiLAL8QbPS/SVPGFNgY8CKw Nn2BOMIdqC4NKmCngTiFaT9xZqV7Unz7wc8jC1ksxba8IJJXEaMuxjt8EHiz8WG5b9KF qdHmgw9dYvqOboakplQmn4njBaJ+EliUBvG2CAoaeu4wdAXCUWVWqYVfQvcmSm2MvEls Kaug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m13-20020a50cc0d000000b004520e27e5b9si24174325edi.626.2023.01.03.06.07.13; Tue, 03 Jan 2023 06:07:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237598AbjACODg (ORCPT + 67 others); Tue, 3 Jan 2023 09:03:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52752 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237714AbjACODU (ORCPT ); Tue, 3 Jan 2023 09:03:20 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DA86A1056B for ; Tue, 3 Jan 2023 06:03:18 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 303E2FxN4016808, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 303E2FxN4016808 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Tue, 3 Jan 2023 22:02:15 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.32; Tue, 3 Jan 2023 22:03:10 +0800 Received: from localhost (172.16.19.22) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Tue, 3 Jan 2023 22:03:10 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 6/7] wifi: rtw89: coex: only read Bluetooth counter of report version 1 for RTL8852A Date: Tue, 3 Jan 2023 22:02:37 +0800 Message-ID: <20230103140238.15601-7-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230103140238.15601-1-pkshih@realtek.com> References: <20230103140238.15601-1-pkshih@realtek.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.16.19.22] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 01/03/2023 13:50:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIzLzEvMyCkVaTIIDAxOjA0OjAw?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-Attachment-Filter-Triggered-Rules: Clean X-KSE-Attachment-Filter-Triggered-Filters: Clean X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Ching-Te Ku Only when firmware control report version is 1, need to get the counter by reading the register. The other version will monitor the counter at firmware. And upstream branch only RTL8852A has this old version. Signed-off-by: Ching-Te Ku Signed-off-by: Ping-Ke Shih --- drivers/net/wireless/realtek/rtw89/rtw8852a.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/wireless/realtek/rtw89/rtw8852a.c b/drivers/net/wireless/realtek/rtw89/rtw8852a.c index 1875c2537ddbd..1800a56091be4 100644 --- a/drivers/net/wireless/realtek/rtw89/rtw8852a.c +++ b/drivers/net/wireless/realtek/rtw89/rtw8852a.c @@ -1878,9 +1878,13 @@ static void rtw8852a_btc_update_bt_cnt(struct rtw89_dev *rtwdev) { struct rtw89_btc *btc = &rtwdev->btc; + const struct rtw89_btc_ver *ver = btc->ver; struct rtw89_btc_cx *cx = &btc->cx; u32 val; + if (ver->fcxbtcrpt != 1) + return; + val = rtw89_read32(rtwdev, R_AX_BT_STAST_HIGH); cx->cnt_bt[BTC_BCNT_HIPRI_TX] = FIELD_GET(B_AX_STATIS_BT_HI_TX_MASK, val); cx->cnt_bt[BTC_BCNT_HIPRI_RX] = FIELD_GET(B_AX_STATIS_BT_HI_RX_MASK, val); -- 2.25.1