Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp560087rwb; Wed, 18 Jan 2023 22:53:58 -0800 (PST) X-Google-Smtp-Source: AMrXdXuqgg5sJZ3VVJDAW5whPm574wUmlkzJXk/BoU9ay5GFptfbD0EQ4g5XSXOsd9hzZ8CQJZjf X-Received: by 2002:a05:6402:4447:b0:497:c96b:4dea with SMTP id o7-20020a056402444700b00497c96b4deamr10416460edb.5.1674111238438; Wed, 18 Jan 2023 22:53:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674111238; cv=none; d=google.com; s=arc-20160816; b=XrTRRaucVVG7nY618/R6YrD5tkhqMEYFW20yHHYOIfDtqW/93lkurG/SV281GpMrA9 WUbNF5CBEP41NYh2kLITAo9lLUXnKT4c9+aI/tN0cjgci5gR9pAiYbj8rl/wKgx2oQ3S YHGkkPvIg+eYeoTVzBCe6dmm/dOWxvOBSVH2HxumDpHWYkoKsi7PK4O+tk9G6QfOWb/r +QNmIPmMRbbn77u+Z7wPIn3w8wVY+Aib3r+68K5aLaQdw+1pXMxsJ2eU5O6RbO1UU2h2 8f8afE+KecpQz4yKf1D/XZROvBOXC1t7pYlEz3CvfcBQRGxmv13K33fKAWb9pRqQpfm8 MHow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:authenticated-by; bh=EuxhKPt7P9+NNFroQJZkfc9TKVEgZx0P6i0H+i3MZrE=; b=EcUkSXHs+YUin0wXOeYI+VwqnxFsbCqUSrYmiEyt3H66lnVN5zwEP03BlD7wfYAM4x XmT+gzxWRrFXjFto+VPNeKqkL8XJSy0i83PBDViAJ40E85PB07vtXdfidIA5sCMNb+tU I7KGU8AdfS767l0V060c1BOXMBcR+p4KsZUj/XLWrPeIZfnXfHyh8lMcPpLoP1EzxEEi 3XhlS8ddm9KFiNpixLk9UgfrGyPgdFG9ARIP8YnveIwv2qLBFWTo4saDU4a4WXFVB4N9 S8wUWt6Q07kLSiQwWQEai22trgrkSZwKUPhWPx6MYRiUaBF5fpCPe4KnE+qAR/VsouFe Y3Pw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b20-20020a056402351400b0047d7499c995si45339656edd.134.2023.01.18.22.53.41; Wed, 18 Jan 2023 22:53:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229792AbjASGZg (ORCPT + 63 others); Thu, 19 Jan 2023 01:25:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52002 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229626AbjASGZb (ORCPT ); Thu, 19 Jan 2023 01:25:31 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 32C3B5C0FD for ; Wed, 18 Jan 2023 22:25:28 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 30J6PDdS4005731, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 30J6PDdS4005731 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Thu, 19 Jan 2023 14:25:13 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.32; Thu, 19 Jan 2023 14:25:14 +0800 Received: from localhost (172.21.69.188) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Thu, 19 Jan 2023 14:25:13 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 0/3] wifi: rtw89: fix and generalize TSF functions Date: Thu, 19 Jan 2023 14:24:50 +0800 Message-ID: <20230119062453.58341-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.21.69.188] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 01/19/2023 06:07:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIzLzEvMTkgpFekyCAwMzozNzowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-Attachment-Filter-Triggered-Rules: Clean X-KSE-Attachment-Filter-Triggered-Filters: Clean X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org For multiple VIF, we need to organize TSF to make interfaces operate properly, as well as time slot of BT coexistence mechanism. Normally, we only handle to avoid issuing conflicts of beacon in AP mode (or GO). So, use this patchset to prepare things for MCC. Zong-Zhe Yang (3): wifi: rtw89: correct unit for port offset and refine macro wifi: rtw89: split out generic part of rtw89_mac_port_tsf_sync() wifi: rtw89: mac: add function to get TSF drivers/net/wireless/realtek/rtw89/mac.c | 51 +++++++++++++++++++----- drivers/net/wireless/realtek/rtw89/mac.h | 17 +++++++- 2 files changed, 56 insertions(+), 12 deletions(-) -- 2.25.1