From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C01BDC43613 for ; Thu, 20 Jun 2019 23:53:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 92AE72084E for ; Thu, 20 Jun 2019 23:53:13 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="MqnTR4Iq" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725911AbfFTXxN (ORCPT ); Thu, 20 Jun 2019 19:53:13 -0400 Received: from mail-pl1-f195.google.com ([209.85.214.195]:38119 "EHLO mail-pl1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725906AbfFTXxN (ORCPT ); Thu, 20 Jun 2019 19:53:13 -0400 Received: by mail-pl1-f195.google.com with SMTP id g4so2042526plb.5 for ; Thu, 20 Jun 2019 16:53:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=Fp0ZtYWqWsiKMMkGKYexvg5EbTvON0HXd5h9Im2In88=; b=MqnTR4IqFtQc2OTdYSIns9YM6ANvfKzyuf0TyX4dKE/beockvQc632WP1hHVKQoWus 4W/RhxwbMSfNfUNWnb09wG6kURarVqKbcvFIZnEGRciQ6TN8EYcYOA7LinerHrakwT9R ndlw73dYVk4mrOhaA7QTKs5q9DxCmwWTaKgDk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=Fp0ZtYWqWsiKMMkGKYexvg5EbTvON0HXd5h9Im2In88=; b=hsMAo9H6KTvxx9bYo39RBI19hWEle1Xcigv8XsBAb6xVStD9Ukuhsuc/NxQDnboYgF 0wJNWYnxoiZMWCoe0fFtCFtBMGcRRqdQeJwMz3WEn/fE0Mzt4QDQEo9V32BADhLIFT1n T4ifTZm6lybrhN66P9C4Yapqjh3wZk4sVj29WSLQsql+QgenCAsiopoFsjwGR5PTKw1M XOKGWkjA97kPTdW5LqiR0vd3/Kj4KwYaLl7ber3xfjc6RtTDTU9VVjtKcem9yYIee41j N8aqP/D027nxymtPPLVGUbG/gb5bGM8WHrLko0QAUrcn+YWyt0OSUYyA++O0IiNZS+TL z0VQ== X-Gm-Message-State: APjAAAVlI0mtvQTIXe7w0EYwbvL4h1KvNWsCyVJggD/GG2iuyBClIRJQ LzROxZQQOl4cTqCVc68ctrUEqA== X-Google-Smtp-Source: APXvYqzsOLms4jAiCQ/1lB8IoyemUiFtxiUqzoDNLCKXzDUoLa2IeKt9zb0amJcaqV2xpG7LN4MJJQ== X-Received: by 2002:a17:902:e58b:: with SMTP id cl11mr105813294plb.24.1561074792495; Thu, 20 Jun 2019 16:53:12 -0700 (PDT) Received: from localhost ([2620:15c:202:1:75a:3f6e:21d:9374]) by smtp.gmail.com with ESMTPSA id m19sm14994187pjn.3.2019.06.20.16.53.11 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 20 Jun 2019 16:53:11 -0700 (PDT) Date: Thu, 20 Jun 2019 16:53:10 -0700 From: Matthias Kaehlcke To: Marcel Holtmann , Johan Hedberg Cc: linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, Balakrishna Godavarthi , Harish Bandi , Rocky Liao Subject: Re: [PATCH v9] Bluetooth: btqca: inject command complete event during fw download Message-ID: <20190620235310.GA137143@google.com> References: <20190528214322.171922-1-mka@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20190528214322.171922-1-mka@chromium.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org On Tue, May 28, 2019 at 02:43:22PM -0700, Matthias Kaehlcke wrote: > From: Balakrishna Godavarthi > > Latest qualcomm chips are not sending an command complete event for > every firmware packet sent to chip. They only respond with a vendor > specific event for the last firmware packet. This optimization will > decrease the BT ON time. Due to this we are seeing a timeout error > message logs on the console during firmware download. Now we are > injecting a command complete event once we receive an vendor specific > event for the last RAM firmware packet. > > Signed-off-by: Balakrishna Godavarthi > Tested-by: Matthias Kaehlcke > Reviewed-by: Matthias Kaehlcke > Signed-off-by: Matthias Kaehlcke ping This patch has been floating around in different versions since the end of 2018 without receiving much attention. If maintainers don't like it let's discuss how to improve it, just ignoring it isn't really helpful. Thanks Matthias