From nobody Mon Jan 26 22:50:21 2026 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AC0A132AAA1; Mon, 26 Jan 2026 16:24:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.168.131 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769444699; cv=none; b=NajWeg0F5bZ/kOcaMn18fBp+16v/cR6KFzBcNymTfCrhdMXWNkgMvwptkxRzJPoS52EItNpOCsGMy12K0dfSseBR+rDo+lVrxziJj0RGNtvPHRfCNhjCEJGmoxRMpfVBJfCzbjeuSoFPDEF7Y2g/Et++Hwz6Bc6gKWu0xlWJoVQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769444699; c=relaxed/simple; bh=YP9VlNLjv+QY4ZiKV39oRjxOdB1OgcmVihLNwtblaho=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=aZ04uKQbiy3EN5sJK82/5isOKBAPXOjB8o/FOJ/t7cCUH8wx9Z0zdoXEhbQELenLGZH/46a5602ICI6SkU78tRZcVcKy9kGyjvs7CiFLWiYE7+RvdL8WIK89b9ZdKAnpeLfUlWEjNYzZdmCvMgiftbNLn3IATJxgKdELvDag+io= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com; spf=pass smtp.mailfrom=qualcomm.com; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b=dNXUKHiU; arc=none smtp.client-ip=205.220.168.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=qualcomm.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b="dNXUKHiU" Received: from pps.filterd (m0279867.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 60QDwK7X1361512; Mon, 26 Jan 2026 16:24:52 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=+2N4Wexb8a+ AfmV6JypKsVfS7OKkW1K5xiA+W3qqjpE=; b=dNXUKHiUmxrm5M8vx6LB6z7cF+m 9SaJCoGjbQM5w/SsR1XMAzyhDMtbXNErSRWeE9CjyGPQazN9LjlyluBeSVazRVKl 6Kv4583fwOA46E7t7YksTbuaDSZkrUWz6TC7NKZuWbGa0ckfUOFhvy3yrpW2k4Dk QUjryttfztThDxHQAb/nnWtsV8i+HS5dmEJmQoFLJxHWFL6Qo9uqBdjptabQMYdA GVOaV6RfgAwUVTrQG8HuIYcK5DiZktoqkY5hRsMdWtDkmmCVowepE95y+Q8e7cXo bWoJ0NmhGg1e76wvU9OpAwdrAS10JdBu3OVC9XdFPSTAliJ6gtOxsU0+IKw== Received: from aptaippmta01.qualcomm.com (tpe-colo-wan-fw-bordernet.qualcomm.com [103.229.16.4]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4bx0v31tdn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:52 +0000 (GMT) Received: from pps.filterd (APTAIPPMTA01.qualcomm.com [127.0.0.1]) by APTAIPPMTA01.qualcomm.com (8.18.1.2/8.18.1.2) with ESMTP id 60QGOomK011432; Mon, 26 Jan 2026 16:24:50 GMT Received: from pps.reinject (localhost [127.0.0.1]) by APTAIPPMTA01.qualcomm.com (PPS) with ESMTPS id 4bvq5kwex7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:50 +0000 Received: from APTAIPPMTA01.qualcomm.com (APTAIPPMTA01.qualcomm.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 60QGOoeT011422; Mon, 26 Jan 2026 16:24:50 GMT Received: from bt-iot-sh02-lnx.ap.qualcomm.com (smtphost-taiwan.qualcomm.com [10.249.136.33]) by APTAIPPMTA01.qualcomm.com (PPS) with ESMTPS id 60QGOoGW011419 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:50 +0000 Received: by bt-iot-sh02-lnx.ap.qualcomm.com (Postfix, from userid 4766378) id 451BF2396D; Tue, 27 Jan 2026 00:24:49 +0800 (CST) From: Mengshi Wu To: Bartosz Golaszewski , Marcel Holtmann , Luiz Augusto von Dentz Cc: linux-arm-msm@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, shuai.zhang@oss.qualcomm.com, cheng.jiang@oss.qualcomm.com, chezhou@qti.qualcomm.com, wei.deng@oss.qualcomm.com, yiboz@qti.qualcomm.com, Mengshi Wu Subject: [PATCH v2 1/2] Bluetooth: hci_qca: Refactor HFP hardware offload capability handling Date: Tue, 27 Jan 2026 00:24:43 +0800 Message-Id: <20260126162444.4194293-2-mengshi.wu@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260126162444.4194293-1-mengshi.wu@oss.qualcomm.com> References: <20260126162444.4194293-1-mengshi.wu@oss.qualcomm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-QCInternal: smtphost X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTI2MDEzNiBTYWx0ZWRfX+W4e+C8kWmt2 TDSp0Y4F9Ba+PuHi0rfOH0a/M3f07Z0blj9pIpb8H0ZHCMUsOOtgQOsbKJz78upwxW8uG6RjjFI AcMviGQHaiUVyWH5/TyQAe96vlCFMiAwuURxQ7ki7IihLDxp9//wfj2Pu3M7xtZxCfq68m4MHBQ cWQ/lrEb272ugxA+TEF5LmxdMODZGWBA0SLOEdxnrRut8APE7cd9Dk0QTmsOtgAdur8X1pf8vAn VrslDnlVP0BANni7aP1Rozhj3UhMrRNLlJ5zBjaqWJHdGHXZ8i7qlQ/0yp77Veef+MAgC7jxeDM lEDOZqUmwHzHIAqWFcKoITU2Pp1VJOYmdqDQBvzmCtmcQg6xVzATGWsnaEbUcz6h6h3qbdzSEGr F3bekAlqRwNZqRcgcUv83u9TCiHOjuTpd0h9fmwAbolVK5vm/YK2TyFf23WcNHxg8CLXwmbzNRK Acyt7wQ+QsB9iIw+Eow== X-Proofpoint-GUID: XzR1Eecov9_lPg3tdkcj5BJIKnrZBw5x X-Proofpoint-ORIG-GUID: XzR1Eecov9_lPg3tdkcj5BJIKnrZBw5x X-Authority-Analysis: v=2.4 cv=JYyxbEKV c=1 sm=1 tr=0 ts=69779554 cx=c_pps a=nuhDOHQX5FNHPW3J6Bj6AA==:117 a=nuhDOHQX5FNHPW3J6Bj6AA==:17 a=vUbySO9Y5rIA:10 a=VkNPw1HP01LnGYTKEx00:22 a=EUspDBNiAAAA:8 a=GUYL8w94h2HILO5x9hMA:9 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.20,FMLib:17.12.100.49 definitions=2026-01-26_04,2026-01-26_01,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 lowpriorityscore=0 adultscore=0 bulkscore=0 clxscore=1015 impostorscore=0 phishscore=0 suspectscore=0 malwarescore=0 priorityscore=1501 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2601150000 definitions=main-2601260136 Content-Type: text/plain; charset="utf-8" Replace SoC-specific check with capability-based approach for HFP hardware offload configuration. Add QCA_CAP_HFP_HW_OFFLOAD capability flag and support_hfp_hw_offload field to qca_serdev structure. Add QCA_CAP_HFP_HW_OFFLOAD capability flag to QCA2066 device data structures. Signed-off-by: Mengshi Wu Reviewed-by: Dmitry Baryshkov --- drivers/bluetooth/hci_qca.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c index 888176b0f..b99fdda88 100644 --- a/drivers/bluetooth/hci_qca.c +++ b/drivers/bluetooth/hci_qca.c @@ -87,6 +87,7 @@ enum qca_flags { enum qca_capabilities { QCA_CAP_WIDEBAND_SPEECH =3D BIT(0), QCA_CAP_VALID_LE_STATES =3D BIT(1), + QCA_CAP_HFP_HW_OFFLOAD =3D BIT(2), }; =20 /* HCI_IBS transmit side sleep protocol states */ @@ -229,6 +230,7 @@ struct qca_serdev { u32 init_speed; u32 oper_speed; bool bdaddr_property_broken; + bool support_hfp_hw_offload; const char *firmware_name[2]; }; =20 @@ -1879,7 +1881,7 @@ static int qca_setup(struct hci_uart *hu) const char *rampatch_name =3D qca_get_rampatch_name(hu); int ret; struct qca_btsoc_version ver; - struct qca_serdev *qcadev; + struct qca_serdev *qcadev =3D serdev_device_get_drvdata(hu->serdev); const char *soc_name; =20 ret =3D qca_check_speeds(hu); @@ -1943,7 +1945,6 @@ static int qca_setup(struct hci_uart *hu) case QCA_WCN6750: case QCA_WCN6855: case QCA_WCN7850: - qcadev =3D serdev_device_get_drvdata(hu->serdev); if (qcadev->bdaddr_property_broken) hci_set_quirk(hdev, HCI_QUIRK_BDADDR_PROPERTY_BROKEN); =20 @@ -2033,7 +2034,7 @@ static int qca_setup(struct hci_uart *hu) else hu->hdev->set_bdaddr =3D qca_set_bdaddr; =20 - if (soc_type =3D=3D QCA_QCA2066) + if (qcadev->support_hfp_hw_offload) qca_configure_hfp_offload(hdev); =20 qca->fw_version =3D le16_to_cpu(ver.patch_ver); @@ -2117,7 +2118,8 @@ static const struct qca_device_data qca_soc_data_wcn3= 998 __maybe_unused =3D { static const struct qca_device_data qca_soc_data_qca2066 __maybe_unused = =3D { .soc_type =3D QCA_QCA2066, .num_vregs =3D 0, - .capabilities =3D QCA_CAP_WIDEBAND_SPEECH | QCA_CAP_VALID_LE_STATES, + .capabilities =3D QCA_CAP_WIDEBAND_SPEECH | QCA_CAP_VALID_LE_STATES | + QCA_CAP_HFP_HW_OFFLOAD, }; =20 static const struct qca_device_data qca_soc_data_qca6390 __maybe_unused = =3D { @@ -2502,6 +2504,9 @@ static int qca_serdev_probe(struct serdev_device *ser= dev) =20 if (!(data->capabilities & QCA_CAP_VALID_LE_STATES)) hci_set_quirk(hdev, HCI_QUIRK_BROKEN_LE_STATES); + + if (data->capabilities & QCA_CAP_HFP_HW_OFFLOAD) + qcadev->support_hfp_hw_offload =3D true; } =20 return 0; --=20 2.34.1 From nobody Mon Jan 26 22:50:21 2026 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 812C033A9F1; Mon, 26 Jan 2026 16:24:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.168.131 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769444699; cv=none; b=TVhZ5B4usOFAKC/KJ3o0S7W8KfAs0eGD05AUCzfxZLRKC7rkTH9q4fOp+fKfSsuoxjyg3Imv8iLiV6K0bIxrVpfsQSRc1fEskuauX3NP5eaSvZI6WMIfwYyO+SkxisqKoF3C3IF0ivmiP8x4cu4fw5hoWuBrK29p0oQnL+m+ggA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769444699; c=relaxed/simple; bh=+nlZgQe8BQvGe9/2ZtExcDHoXD9HTdQMD0c7ZT4143Y=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=o/pappZWIZcDd/FIX16ybeU3w8Ox3uLj/ReZb6RTVN5Es9A27isjFLRNYkLpC/Tq4fzkPMy7vl3/SC23+j9SjtDnMd9fQM1yFtm8BMW4Yl2shOikHSngV+A48cYbaU8/LS3yiZ7PEVCGpK6u+tdq7Xa1doqHXT+ymzYflEOBga8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com; spf=pass smtp.mailfrom=qualcomm.com; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b=Cgyc/lsj; arc=none smtp.client-ip=205.220.168.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=qualcomm.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b="Cgyc/lsj" Received: from pps.filterd (m0279862.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 60QBHPFs2536581; Mon, 26 Jan 2026 16:24:53 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=IbCbhUQC6Rm KMCr86YPTQwfl0t1JmH7pg8KfTHGd1zU=; b=Cgyc/lsjbUeayxxFKmnXGU0ndXD DfmJ8TrEFx1gtzHAm+IEGupNa2imaiP3AzMQmscjZlnNJlvqSN2yLCXlvo5OsDQN oXU6LXjZRZayjaZYrJIeMfoJy+YAlMtR3AdLOUWZhgdPpXqUN9G/l1gwBmg3en+U AJyq6ENnIh1bAUtXnd00hqHiE/g27NYtRwkja/SNgHu+Tv37Ap4V1iv3zcJ8bZ8z hiZTCi3diT171QRZTpz8DD5iK0XJ8fvAw8qLksEtU2Ybe2TJ6PjOMFgWOOLCFU63 NQriUx3QGLp2/0C8PKLbDbCt1h8UQU/4AMKNNqfMN0tHEMKk3hwrRrZHnHQ== Received: from aptaippmta02.qualcomm.com (tpe-colo-wan-fw-bordernet.qualcomm.com [103.229.16.4]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4bvwtyck23-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:53 +0000 (GMT) Received: from pps.filterd (APTAIPPMTA02.qualcomm.com [127.0.0.1]) by APTAIPPMTA02.qualcomm.com (8.18.1.2/8.18.1.2) with ESMTP id 60QGOp7L020937; Mon, 26 Jan 2026 16:24:51 GMT Received: from pps.reinject (localhost [127.0.0.1]) by APTAIPPMTA02.qualcomm.com (PPS) with ESMTPS id 4bvq5kweyq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:51 +0000 Received: from APTAIPPMTA02.qualcomm.com (APTAIPPMTA02.qualcomm.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 60QGOppw020932; Mon, 26 Jan 2026 16:24:51 GMT Received: from bt-iot-sh02-lnx.ap.qualcomm.com (smtphost-taiwan.qualcomm.com [10.249.136.33]) by APTAIPPMTA02.qualcomm.com (PPS) with ESMTPS id 60QGOpjG020908 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 26 Jan 2026 16:24:51 +0000 Received: by bt-iot-sh02-lnx.ap.qualcomm.com (Postfix, from userid 4766378) id 52F0823960; Tue, 27 Jan 2026 00:24:50 +0800 (CST) From: Mengshi Wu To: Bartosz Golaszewski , Marcel Holtmann , Luiz Augusto von Dentz Cc: linux-arm-msm@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, shuai.zhang@oss.qualcomm.com, cheng.jiang@oss.qualcomm.com, chezhou@qti.qualcomm.com, wei.deng@oss.qualcomm.com, yiboz@qti.qualcomm.com, Mengshi Wu Subject: [PATCH v2 2/2] Bluetooth: hci_qca: Enable HFP hardware offload for WCN6855 Date: Tue, 27 Jan 2026 00:24:44 +0800 Message-Id: <20260126162444.4194293-3-mengshi.wu@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260126162444.4194293-1-mengshi.wu@oss.qualcomm.com> References: <20260126162444.4194293-1-mengshi.wu@oss.qualcomm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-QCInternal: smtphost X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: ruX935OCqIm9CnSV82vi-2UsjlQDG6zh X-Authority-Analysis: v=2.4 cv=BteQAIX5 c=1 sm=1 tr=0 ts=69779555 cx=c_pps a=nuhDOHQX5FNHPW3J6Bj6AA==:117 a=nuhDOHQX5FNHPW3J6Bj6AA==:17 a=vUbySO9Y5rIA:10 a=VkNPw1HP01LnGYTKEx00:22 a=EUspDBNiAAAA:8 a=RcekqmAwbsI-zVS566AA:9 X-Proofpoint-ORIG-GUID: ruX935OCqIm9CnSV82vi-2UsjlQDG6zh X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTI2MDEzNiBTYWx0ZWRfX0VL+7HB4XpSg iOl131BPOgbbxqddjQTxiINlcN0sATbrSGCHiXHzzTy2HW6Dh5xiaO5gHIQFYuGs2oVGOMkgeLi i8SEQZc9NpsarnmcFHesiNsUlcOAjxcwmsBKR5fsWZS+chS5haOgweUwFPE05n5hqB0kWKE2kAn eWpiDmQt1UHiEbADtUkF4C01vbYlhxzzqsW4lM5a2Is9wk/C9jiBkOOypiVmk8UfowuCkMaPiBl ajPiFoO6VxF6Rnp4M0YOuq0m7mzGz1jeF7RLLQ07gugtbO6BcmVj0ZKDxqpPZJOswf3/inp0T7e sHnui5pVYj1vwDUAaa9hMCIgyz8DNVsVYK/GgjIpTIoC1TBuA++MEpgReSdFy7buUohAbtUZuY1 VIo/Dk1am+Q8MW3gfbk0Ati9FKk+uZYbG1s75/qOUCHYQ/ZWIlTTRKVjQcsdCoTROS+QETy5+Ld n/8Opoes7JxZvcRidww== X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.20,FMLib:17.12.100.49 definitions=2026-01-26_04,2026-01-26_01,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 priorityscore=1501 suspectscore=0 clxscore=1015 phishscore=0 lowpriorityscore=0 adultscore=0 spamscore=0 bulkscore=0 malwarescore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2601150000 definitions=main-2601260136 Content-Type: text/plain; charset="utf-8" Add QCA_CAP_HFP_HW_OFFLOAD capability flag to WCN6855 device data structures to enable Hands-Free Profile (HFP) hardware offload support on these Qualcomm Bluetooth chipsets. Signed-off-by: Mengshi Wu --- drivers/bluetooth/hci_qca.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c index b99fdda88..212a92bbf 100644 --- a/drivers/bluetooth/hci_qca.c +++ b/drivers/bluetooth/hci_qca.c @@ -2155,7 +2155,8 @@ static const struct qca_device_data qca_soc_data_wcn6= 855 __maybe_unused =3D { { "vddrfa1p2", 257000 }, }, .num_vregs =3D 6, - .capabilities =3D QCA_CAP_WIDEBAND_SPEECH | QCA_CAP_VALID_LE_STATES, + .capabilities =3D QCA_CAP_WIDEBAND_SPEECH | QCA_CAP_VALID_LE_STATES | + QCA_CAP_HFP_HW_OFFLOAD, }; =20 static const struct qca_device_data qca_soc_data_wcn7850 __maybe_unused = =3D { --=20 2.34.1