Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4642087rwb; Tue, 17 Jan 2023 03:42:17 -0800 (PST) X-Google-Smtp-Source: AMrXdXsT2O+jRR7LUVo7gVtg4ZxfgPXF369alO9PBDmsIQ2eAmtiUEmmzZNSUMPZr9VA2XyFR8yH X-Received: by 2002:a17:902:bd85:b0:194:9984:8085 with SMTP id q5-20020a170902bd8500b0019499848085mr2723561pls.40.1673955736966; Tue, 17 Jan 2023 03:42:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673955736; cv=none; d=google.com; s=arc-20160816; b=0tQGX964iEeWQcQJ2IdJoynBln/tSSA78fBQdf2UIr2hy0eV1UkXnXpcgZ40/Dg846 zHyhSIr60GZwBkb2cm27E1bDPgchNHV9e9OmpARznlizHglTGZnjP11y42SU1X8SnOuX pb4y0JDlJzCJpbr01KwL9rulZOeLY4ln3Mr2EnSApZv+zGV4CccLXtzsl69lqnOlGM1s M1sBUOgeDC5DQMqHaL48WgEvu4fLZeBCqo589fePAD6hpV7echGbgcGhvdx1ueWnvUj5 x4IQ+UZ0XYgRqaEJNSsdsOKVwHDha1yiOhIMcVZpO+G9DlF9MZYBGQyGQ5rJ4JVkiMgN Jbgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:authenticated-by; bh=yGkfGm4Mf1RcDYHpltHvmrHG5PEexbWPnb37Mmeqdjc=; b=g/HbQF53eKHETX4R6BNR1FOPyfInfpqd8orjz1UbfJZDSvjrYwEFa4CpsH2mqk7Dvj jHTQ3pJ3vAZWEXQHRnACLH2ZrJ4da4a/JHRd8sOIlVzYAuGQOnCC1s1unbveLver5R4V 0C9pUz0H0oO64foEwEknWWicQ9swQlzfRymKBnMmTaBFxwVym6a1rlHX3QR3HMP+s+UX 1fwVmtW/w6IojGgOf0sxq7FZiN0d84GQE+68tRWlV6PLPrhYE97oL6ztZ1vqF+LmTnEC YfLrygeboloFRDHDxetwdo6cqhwhq0lSw8KSy78QTXbzS+EOnjFPDY17Y8yvi9Jy5To8 k0lA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o21-20020a170903301500b0017486813f81si29087821pla.528.2023.01.17.03.42.06; Tue, 17 Jan 2023 03:42:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236273AbjAQLl6 (ORCPT + 63 others); Tue, 17 Jan 2023 06:41:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56334 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236323AbjAQLl4 (ORCPT ); Tue, 17 Jan 2023 06:41:56 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B9DEB9012 for ; Tue, 17 Jan 2023 03:41:55 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 30HBffqC7012209, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36506.realtek.com.tw[172.21.6.27]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 30HBffqC7012209 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Tue, 17 Jan 2023 19:41:41 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36506.realtek.com.tw (172.21.6.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9; Tue, 17 Jan 2023 19:41:41 +0800 Received: from localhost (172.16.17.65) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Tue, 17 Jan 2023 19:41:41 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 0/8] wifi: rtw89: coex: the last patchset to adapt BTC version Date: Tue, 17 Jan 2023 19:41:01 +0800 Message-ID: <20230117114109.4298-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.16.17.65] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 01/17/2023 11:09:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIzLzEvMTcgpFekyCAwOToxNDowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org This patchset is to add some fixes and refinements found during adapting BTC version. After these, we can support all current firmware and will continue to update to support newer ones in the future. Ching-Te Ku (8): wifi: rtw89: coex: Update Wi-Fi external control TDMA parameters/tables wifi: rtw89: coex: Clear Bluetooth HW PTA counter when radio state change wifi: rtw89: coex: Force to update TDMA parameter when radio state change wifi: rtw89: coex: Refine coexistence log wifi: rtw89: coex: Set Bluetooth background scan PTA request priority wifi: rtw89: coex: Correct A2DP exist variable source wifi: rtw89: coex: Fix test fail when coexist with raspberryPI A2DP idle wifi: rtw89: coex: Update Wi-Fi Bluetooth coexistence version to 7.0.0 drivers/net/wireless/realtek/rtw89/coex.c | 212 ++++++++++++---------- 1 file changed, 113 insertions(+), 99 deletions(-) -- 2.25.1