Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1009292yba; Thu, 4 Apr 2019 02:19:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqzPFYazHYnoSqX06HApX9qgpjspSC9IE9jflSckmhnmEUxy/astqqFfBWTxIdMUSH5XLQns X-Received: by 2002:a65:64c9:: with SMTP id t9mr4645829pgv.221.1554369582519; Thu, 04 Apr 2019 02:19:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554369582; cv=none; d=google.com; s=arc-20160816; b=R2h3te6YmYvg607WEQmSkBzaUmevKU7iJKtY3Gr5y3wZr0dopEUnpxMNY0cWpDZk7D uhX3QNCYhqlcj7TWHhQFKhCg4jREW8TNH/Lq4pCK+kP6tKz489NwU/mRuNdXyaUOF0CK YjATs/fDE1ITtmN6+CKEPn/6kVvTyHORwFxSj2am49BsQjjSY29Bc45Ysh9qPoeszJcN TXZjlj2ziU9FBTuFQIVOrOvwjzmuxBw/lW1tV57tFy7m0hf6Y3PhMAstijWzI5mxleYA 9c4vG4D+dcleiuTAd/uVd7sviDsxL5LukJPU8njuUFi/WqXsgplmqJGGb6F2r5g0Th57 rjow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IfgUiMVbk/pmKDydJH6utwyOaYlgi0YBWxqmzbtzCjk=; b=eSfoH1yyrAV2PyWemcQDgRDYVICX6QxyO6tgav5LKJuS45hokUVd9Jzop0FxC7hoEt Y52wzUXiVIJQPcO+Sk4ZdbV9LuyJfKug6qc9iBgoDKC6kwZCOME7D2G2hGlJnq/IvB6W 3Jfmid8w2YO7SSZmo4/9aC45dC7DMhobWnrTFNW1j5sosqS8lDEcd10WuiG23JIfCpw1 A0pUcRFK7bc7+QWcHA5/9eCL1ijJmOIol8gpZu4QhUvDt39yxfPknixNEPAUbTS1qcvk oVxvQtNMBGdwuGxh4xMXc8hgS+/tVTVC7MjfQ+2wd4f7MlOH2tSifv6NwWZOvEUY4NeW SBRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="cLB/ypuO"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s26si16182659pgm.223.2019.04.04.02.19.27; Thu, 04 Apr 2019 02:19:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="cLB/ypuO"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388243AbfDDJRf (ORCPT + 99 others); Thu, 4 Apr 2019 05:17:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:59222 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388199AbfDDJRc (ORCPT ); Thu, 4 Apr 2019 05:17:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5F9262075E; Thu, 4 Apr 2019 09:17:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554369451; bh=9jLA0YSxUlc/+mgRq34SmclPETWQAPpErWHL4ApI4y8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cLB/ypuOkzYCnSfmd6ttIIequYvsO4Wh8n7Qux4NWX1+yoV1QqEbaG/IBRFsi4HEh KXhWKLSN+n1xvGlVd3dFLc78YXasvZMwbpgOaRf/avte7G7yS1iHvnBP3WCiS88tQZ 0VW43vbC+RfeyT387t7jktABPcRaJyG7PPlMIh0A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hans de Goede , Kalle Valo , Sasha Levin Subject: [PATCH 5.0 229/246] brcmfmac: Use firmware_request_nowarn for the clm_blob Date: Thu, 4 Apr 2019 10:48:49 +0200 Message-Id: <20190404084627.269619402@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084619.236418459@linuxfoundation.org> References: <20190404084619.236418459@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 4ad0be160544ffbdafb7cec39bb8e6dd0a97317a ] The linux-firmware brcmfmac firmware files contain an embedded table with per country allowed channels and strength info. For recent hardware these versions of the firmware are specially build for linux-firmware, the firmware files directly available from Cypress rely on a separate clm_blob file for this info. For some unknown reason Cypress refuses to provide the standard firmware files + clm_blob files it uses elsewhere for inclusion into linux-firmware, instead relying on these special builds with the clm_blob info embedded. This means that the linux-firmware firmware versions often lag behind, but I digress. The brcmfmac driver does support the separate clm_blob file and always tries to load this. Currently we use request_firmware for this. This means that on any standard install, using the standard combo of linux-kernel + linux-firmware, we will get a warning: "Direct firmware load for ... failed with error -2" On top of this, brcmfmac itself prints: "no clm_blob available (err=-2), device may have limited channels available". This commit switches to firmware_request_nowarn, fixing almost any brcmfmac device logging the warning (it leaves the brcmfmac info message in place). Signed-off-by: Hans de Goede Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c index 1f1e95a15a17..0ce1d8174e6d 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c @@ -149,7 +149,7 @@ static int brcmf_c_process_clm_blob(struct brcmf_if *ifp) return err; } - err = request_firmware(&clm, clm_name, bus->dev); + err = firmware_request_nowarn(&clm, clm_name, bus->dev); if (err) { brcmf_info("no clm_blob available (err=%d), device may have limited channels available\n", err); -- 2.19.1