Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4642478rwb; Tue, 17 Jan 2023 03:42:41 -0800 (PST) X-Google-Smtp-Source: AMrXdXuYaxW6DDZECYCy5VP5DUrS7ptpQ3lmvLz+QpnlD4Dj5U4wi/4w9X5CGRIkTWebRqlIlsC7 X-Received: by 2002:a17:902:d2cb:b0:194:8292:b1a1 with SMTP id n11-20020a170902d2cb00b001948292b1a1mr4524052plc.66.1673955761437; Tue, 17 Jan 2023 03:42:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673955761; cv=none; d=google.com; s=arc-20160816; b=Ay38J0WbhWnGkeA73wsXBTG30mPc5BgvgomirDBW5AxWOM8SQGz6yKuco5FRbvi3ga M4013TK2hYQjX5JhPXgPMsWwbsQaLOXfoUz4hHFAAInz3yZI1OLixxbtgz9CO8jGBdKp Rw+ChwV3XDTSNbs5/Sim66T4y2lPxEkk+Fz4yUe0UUdmDBxWYlDhxCJ/76fY+CqmTxMo ehKTFppDpRM14yjYxK1ne8NAsKYK3CMN8CgWFzIVXf3888iJ2bYG8PJ7ReRwnqeMrzM9 UW+/P8BBVG131sRwlt6ozrWKweyT3ENe2EoeH/B0r6A2ksOH8Ws02LmS3kxN9+7Qw7BL /YdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :authenticated-by; bh=7ADGwxj2Cu8wzSF2uXwVPjq/XPbW655hnTuaoSP9Eug=; b=LEDyHSH1PZrcR2IX8yNK7AFBJcdo0mbKAIwMd2m5Jiu39+T2/7UWIEer+pwO5+wtgE RYt9lULCSBJ5GMcCCuj8z/GCrQO1p8MsuO1mLkYlopVXzGORkUrJd0yO3TeV7oFSjUTF oaNpV40aOA4Idiidtj7dAuL4rx4ZR5JNOO0KzkisZ/MJbOW0hJe7gUdBZ5fMUM1P7BIl qm5zL6Gqeu1AVhKyI41KMhRXYFGqrIEAUQdGWJwRXOItCGDI7mx90e7PGYNm/9/Xz/R7 ZVXjdLW8LAeWSrvmyzQ3cOoP2m8tSk1pBsnqscUZFfQnVDxmLlm65w28HQlsQLpMH5tE dBgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w4-20020a170902e88400b00188c7b09446si35340130plg.44.2023.01.17.03.42.30; Tue, 17 Jan 2023 03:42:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236637AbjAQLmD (ORCPT + 63 others); Tue, 17 Jan 2023 06:42:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56354 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231452AbjAQLl5 (ORCPT ); Tue, 17 Jan 2023 06:41:57 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 93FE9234CE for ; Tue, 17 Jan 2023 03:41:56 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 30HBfnjY7012239, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 30HBfnjY7012239 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Tue, 17 Jan 2023 19:41:49 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.32; Tue, 17 Jan 2023 19:41:50 +0800 Received: from localhost (172.16.17.65) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Tue, 17 Jan 2023 19:41:49 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 7/8] wifi: rtw89: coex: Fix test fail when coexist with raspberryPI A2DP idle Date: Tue, 17 Jan 2023 19:41:08 +0800 Message-ID: <20230117114109.4298-8-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230117114109.4298-1-pkshih@realtek.com> References: <20230117114109.4298-1-pkshih@realtek.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.16.17.65] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 01/17/2023 11:09:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIzLzEvMTcgpFekyCAwOToxNDowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-Attachment-Filter-Triggered-Rules: Clean X-KSE-Attachment-Filter-Triggered-Filters: Clean X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Ching-Te Ku The origin code will enable TDMA WL:BT = 50:50 to prevent Wi-Fi throughput suddenly drop to 0 in the moment while A2DP pause. And this protection just a short moment, and will turn to Bluetooth idle case when A2DP turn into sniff mode. But the raspberryPI simulated A2DP device will not turn into sniff mode. So the protection will bring the throughput drop. Signed-off-by: Ching-Te Ku Signed-off-by: Ping-Ke Shih --- drivers/net/wireless/realtek/rtw89/coex.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/realtek/rtw89/coex.c b/drivers/net/wireless/realtek/rtw89/coex.c index c0e8a0b2e0b75..89214f2db9851 100644 --- a/drivers/net/wireless/realtek/rtw89/coex.c +++ b/drivers/net/wireless/realtek/rtw89/coex.c @@ -3847,7 +3847,7 @@ static void _action_by_bt(struct rtw89_dev *rtwdev) case BTC_BT_NOPROFILE: if (_check_freerun(rtwdev)) _action_freerun(rtwdev); - else if (a2dp.active || pan.active) + else if (pan.active) _action_bt_pan(rtwdev); else _action_bt_idle(rtwdev); -- 2.25.1