Received: by 10.192.165.148 with SMTP id m20csp3833572imm; Mon, 23 Apr 2018 13:15:00 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/JfgbX7XoeVXGVbMPV/T8dNahKNTve1NRbsXxlx7IzDWSJ8kmZ2+MEcbjyK2pzyVvY6KQh X-Received: by 10.99.156.9 with SMTP id f9mr11393437pge.274.1524514500515; Mon, 23 Apr 2018 13:15:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524514500; cv=none; d=google.com; s=arc-20160816; b=hmOOwqVP1B0eK+2iYjDKvQz2QuHZ1KSgZWKZSV0BYiYhGQ+Lg4CmYTDQfZUo6yjCdN PwHxN8KlIxgMYzxyOctIwFFUgMNYWAVp6aNvq3Y8+T8qMe+9KXeLVefdKQwuHGZmmq7O t+XqA5xu+n2k+vtM9itS3SLe08RMNnIC8170NH5z28SJTtpRvKVH5PU09pRoMaDf1kUg 1s7oNFvGkLcAve+iHLHofC+MGz24XQZyeq5f/T4oQ7k3QnvRFe1zJSihej7gor6j8/aH wtObVEseJAv1eEo5s9GzNseRLMJ+LdR2DZInkI/lFO/Y1IPfvdlyfIH3imBoW0eDLUwW JChg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=jKkPtOxxsOO/OOaOXa1om3vVQfSWXWBuAWW8jjohDgs=; b=xw5dauJZFfQYaHqwrk82UXM23jMZO3JURaspDd67XenMLpGnUN61PNLAOe4uvnW/UG 7ptvFJktCiHMBp/4jLC/yu3KWBG8F101emJC7O4YumzqsKHyM2GIwBcxHnGnZRncDMbA 8+hHZPvEI+i39izMIFoGJ3gXWGBFrxFolqKrITqr6XyVuiX6bf5LzWyjEKOTEJ1WqLy6 sCgZDJobCyMuQKycD5KWsdedqBdhHUysyDnGF1mPQcvJCmnojo8EzngHlkhL31Q7cYzI 0GTv6wtrZ7ubhPO5F85oiq6bVBaDFtygUfqD1KOCDJDvulq7GXKyPKPoNvUd1qQ2s2k0 tXBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZQ2qhiaV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4si9833718pgv.549.2018.04.23.13.14.44; Mon, 23 Apr 2018 13:15:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZQ2qhiaV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932399AbeDWUNN (ORCPT + 99 others); Mon, 23 Apr 2018 16:13:13 -0400 Received: from mail-it0-f65.google.com ([209.85.214.65]:50243 "EHLO mail-it0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932306AbeDWUM1 (ORCPT ); Mon, 23 Apr 2018 16:12:27 -0400 Received: by mail-it0-f65.google.com with SMTP id p3-v6so12138344itc.0; Mon, 23 Apr 2018 13:12:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=jKkPtOxxsOO/OOaOXa1om3vVQfSWXWBuAWW8jjohDgs=; b=ZQ2qhiaVBGDVUFV2DRH1EQKfpvLP/n4UdLLGGFeGs2taUY8WX+M2uEv+5jlredqyTm A0SZvD9XnFov8Rvuo5B2yFRLu36E34UaKqBUxjd2Tyew8tROMpqCOe4gQx9MLHr/f3tq Y9cwkNQtrhN1iFDmro2KTjHQC7BABZy2mlrYqLq8LQKkJ5tn8nN/3TZeY9Ln9k1kPzn0 gQNNWg/4oOU3+P8ALKQZ56Zs0rl6mxOqm6dqPXH3VO879puWCuGNWb3D+R9epLQMC4Hv 4c2nK6XIjTLrwWhF46cOVjaD1mkXbVYT839Yr2kXTlW+rWbD5WyqvOt+GUQCXzGRBHUZ horQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=jKkPtOxxsOO/OOaOXa1om3vVQfSWXWBuAWW8jjohDgs=; b=tNOvkbBc2+G2iQ1AMoHdr9eRoIvh0RWTxhmVmP3BW5jpBKcw1BEmf52pd5IsoA2zcG dUhdC3YS+MRhrZvivGtjjBZYRWvFgEZmmQPL7cRtQvKQNRiEZNaVG5q7gWRQuJg5sdct daU+IJHCxdMNChTCPd6EnMFQ8YmQwnOBuIWRtpU2fi3It672cdInXwoGCOsZIaupO50c 6LPUBJdBa6fPNQg4GfyguTcMI/nQn1MSF05ff86sceCnrlmcrDrIBuS0g7CzGIyJa2Rb pGfU2yCi6vwl4tnmXYtZ0/Qod9czvkn14vavvJRdRxdxEDc/ZAysvcpu+XvC3g5+acYo OcXA== X-Gm-Message-State: ALQs6tBKQgMM2tRXljVCx9bU+54Y9sI0Dp80YbXxJqDEGmIyfxSCkR2O MR4eVMYv1o/4ZgZ9WuYzHEqAchJ5Vbw= X-Received: by 2002:a24:b953:: with SMTP id k19-v6mr10534266iti.140.1524514346193; Mon, 23 Apr 2018 13:12:26 -0700 (PDT) Received: from localhost.localdomain (184-175-36-239.dsl.teksavvy.com. [184.175.36.239]) by smtp.gmail.com with ESMTPSA id k130-v6sm1632551itb.0.2018.04.23.13.12.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 23 Apr 2018 13:12:25 -0700 (PDT) From: Andres Rodriguez To: linux-kernel@vger.kernel.org Cc: andresx7@gmail.com, gregkh@linuxfoundation.org, mcgrof@kernel.org, alexdeucher@gmail.com, christian.koenig@amd.com, kvalo@codeaurora.org, arend.vanspriel@broadcom.com, linux-wireless@vger.kernel.org, ath10k@lists.infradead.org, hdegoede@redhat.com Subject: [PATCH 9/9] ath10k: re-enable the firmware fallback mechanism for testmode Date: Mon, 23 Apr 2018 16:12:05 -0400 Message-Id: <20180423201205.20533-10-andresx7@gmail.com> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180423201205.20533-1-andresx7@gmail.com> References: <20180423201205.20533-1-andresx7@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The ath10k testmode uses request_firmware_direct() in order to avoid producing firmware load warnings. Disabling the fallback mechanism was a side effect of disabling warnings. We now have a new API that allows us to avoid warnings while keeping the fallback mechanism enabled. So use that instead. Signed-off-by: Andres Rodriguez --- drivers/net/wireless/ath/ath10k/testmode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/ath/ath10k/testmode.c b/drivers/net/wireless/ath/ath10k/testmode.c index 568810b41657..0beb91be1b1c 100644 --- a/drivers/net/wireless/ath/ath10k/testmode.c +++ b/drivers/net/wireless/ath/ath10k/testmode.c @@ -157,7 +157,7 @@ static int ath10k_tm_fetch_utf_firmware_api_1(struct ath10k *ar, ar->hw_params.fw.dir, ATH10K_FW_UTF_FILE); /* load utf firmware image */ - ret = request_firmware_direct(&fw_file->firmware, filename, ar->dev); + ret = request_firmware_nowarn(&fw_file->firmware, filename, ar->dev); ath10k_dbg(ar, ATH10K_DBG_TESTMODE, "testmode fw request '%s': %d\n", filename, ret); -- 2.14.1