Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp6022722rwb; Tue, 17 Jan 2023 23:30:08 -0800 (PST) X-Google-Smtp-Source: AMrXdXtnuMpty/4QrhHDdS4P2wAgrG83dG42z6PsKWydZvwspvgtYZqGU+ma6p3U0e0hd3KrmmD0 X-Received: by 2002:a17:90b:808:b0:228:dec4:afaf with SMTP id bk8-20020a17090b080800b00228dec4afafmr6523074pjb.34.1674027008721; Tue, 17 Jan 2023 23:30:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674027008; cv=none; d=google.com; s=arc-20160816; b=oPRTtRot+H/O8oID/zILIkIkB6MFwF1EojDBvplBbHujQc8JZTJqutsi9XKI84V7xQ +gMWStZ2sTJhbv7p7rruINmRFenxnxG3IrsIh554z/0heA3oU0OvwCh8UJO8fv4aua3F xWrxC5i1rpsponAAKQi3cs23f4QOPlXmge/74AgcdwF6B1n8qpVoV3M5A3SJCuyiN/Nt l3qqdcfBi1wWh/NAn+3GMgu91rBtb9I1TwT/sbVnrzWPmWG6ZzGmYQu9+alcczs0yFhn Vdj04OK4eeulLrQsEesMAp71Pn9pW2pGsH1xWrqDfTDokBxuvkpCM6nNM9ggkoaoKWby jX2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:subject:cc:to:from:dkim-signature; bh=b6hnmIIeaySXa9pKsj932J0+8+iAzjIA8UsyrsQfjlE=; b=KKsNHTlx2kvWJcGgywCkd79eoh8WCe4khWjSCsQZhDUjst/6q46uUxYGSm+KwqpAXr esR0ZjBA4TmcfjAKW29vxD0siLTz+gDtQolC383EEqoLU21Z1Vy02ZLyLH3yANoO+uF7 YUVUshtWqdYcJvpc4GJ2Y7G3dn1j+PpObAUJIde0JiZ7qiIRZyOj70i+QfKDoQqOsXuE hmJeccV5R6FM7nsLkTSOOZpa0XN0tQwAenMtFoB/Ri9eDnYffENxEYBsVYOjb35TmCi3 fOm0ewkoxEyCvGusnp70R3tfX6yectmqkZeHGXKbpWQ8oMqNRpMsc7hBfTlvoV/a7poC cShA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=izLqVWSO; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y23-20020a17090aca9700b00208606154f7si1353247pjt.117.2023.01.17.23.30.01; Tue, 17 Jan 2023 23:30:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=izLqVWSO; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229722AbjARHEu (ORCPT + 63 others); Wed, 18 Jan 2023 02:04:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56806 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230008AbjARHDo (ORCPT ); Wed, 18 Jan 2023 02:03:44 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1740866FA4 for ; Tue, 17 Jan 2023 22:33:52 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 2B918616B6 for ; Wed, 18 Jan 2023 06:33:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 95DEAC433EF; Wed, 18 Jan 2023 06:33:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1674023598; bh=RwxYuosURc59hD10m17FwTIIVzMWVJAUePzyWZQet/I=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=izLqVWSOTToFPMXZnCqI/Ofl4R0SLw3T8xaFmbi7F7/lk4ycfvPhHLfgHZSuAol6s gebvr5/RaFAIXsRrgUFhzMHumlBwrkRQqh4z+kqL/m0ZvfTv02z39uN60JgQ1idw5a jWEVekZl5xmwI4T6tXj44kQsicYjZcVKroImkdlj+fP77YhD1d/DprxV4m5k7PdMkS tL0kowc2plnIxE1Nt20BLMoCVVpwsMRNuG+H3EWuBFsihy3Cs/RURKwAMwiKpEG+wm vSbZTXRZqlBq05AD+ufSLWw/9SWXysvBBUslXecHWUHqFwmiZRu/qETMy0jx4wCK8k QPosAAxhb3G+g== From: Kalle Valo To: Maharaja Kennadyrajan Cc: , , Abinaya Kalaiselvan Subject: Re: [PATCH] wifi: ath11k: Add tx ack signal support for mgmt packets References: <20221219053844.4084486-1-quic_mkenna@quicinc.com> Date: Wed, 18 Jan 2023 08:33:14 +0200 In-Reply-To: <20221219053844.4084486-1-quic_mkenna@quicinc.com> (Maharaja Kennadyrajan's message of "Mon, 19 Dec 2022 11:08:44 +0530") Message-ID: <87fsc8xsgl.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Maharaja Kennadyrajan writes: > From: Abinaya Kalaiselvan > > Add support to notify tx ack signal values for mgmt > packets to userspace through NL interface. > > Advertise NL80211_EXT_FEATURE_ACK_SIGNAL_SUPPORT flag > to enable this feature and it will be used for data > packets as well. > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1 > > Signed-off-by: Abinaya Kalaiselvan > Signed-off-by: Maharaja Kennadyrajan [...] > --- a/drivers/net/wireless/ath/ath11k/wmi.h > +++ b/drivers/net/wireless/ath/ath11k/wmi.h > @@ -2309,6 +2309,7 @@ struct wmi_init_cmd { > } __packed; > > #define WMI_RSRC_CFG_FLAG1_BSS_CHANNEL_INFO_64 BIT(5) > +#define WMI_RSRC_CFG_FLAG1_ACK_RSSI BIT(18) > > struct wmi_resource_config { > u32 tlv_header; > @@ -4541,6 +4542,8 @@ struct wmi_mgmt_tx_compl_event { > u32 desc_id; > u32 status; > u32 pdev_id; > + u32 ppdu_id; > + u32 ack_rssi; > } __packed; Adding these two fields increases the minimum length for WMI_TAG_MGMT_TX_COMPL_EVENT: [WMI_TAG_MGMT_TX_COMPL_EVENT] = { .min_len = sizeof(struct wmi_mgmt_tx_compl_event) }, If we have a firmware version which doesn't include ppdu_id and ack_rssi in WMI_TAG_MGMT_TX_COMPL_EVENT ath11k will drop those events. Not sure what to do. Is it certain that all ath11k firmware versions have ppdu_id and ack_rssi? Or should handle so in ath11k that ppdu_id and ack_rssi can be optional in the event? -- https://patchwork.kernel.org/project/linux-wireless/list/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches