Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1021457yba; Thu, 4 Apr 2019 02:36:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqznZlEkeyAfQrdy6stOnpA0thaJQpPzy+o0l9NRrGsD089P27iZXzJjQH2U0V3DRNvKcWDJ X-Received: by 2002:a63:fc0b:: with SMTP id j11mr4883257pgi.74.1554370606143; Thu, 04 Apr 2019 02:36:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554370606; cv=none; d=google.com; s=arc-20160816; b=f+p1aBZbRxZBwmq3hVxII+eCyys6KABF1PBEX9qb5OpV919QlXCfoAS+w5rt1R2zSZ 97e364oFRDpbrWRe7DgpLHuZdKu6pSSaUWk461mKs82euoMAxX/cvi418frJDI2YQ+Lv xj2EZZqkytA0P/oegzQfdSczuk14QNBmYN4GlBqSKW6JTjYMoo7j7urFrNXXo/ctULrS ynmbF2hJgf0f0xvZ4iybI0in2IVwc57o5N+ohZTbUbC/H+IBv3iF3qsB8YLEb28QcdQU Ou3uAyNARGRkMDQNNLo9nuDyVGaVM0LcoJZvkm9s6qcCetTGQnhODTjVqNtw4VMsUYxa dQxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sduCjL3clqP1AHVkU0Hl0E9oIrkN/Q33YQWc+EfzvoU=; b=fTukrEghMoPoL8jvUJF8u99p63XKyM+bWTaSvcENjJZytH7Xx7neqU46nv9MWCF3Cf 9dYpDgmbOjJdU4bFAP982RpqsWDVd1W4MhI24EjB571JtZgnVj0Us0GGxwdZwBUbjXsP n7E1UCjMGLOwnD9g5ocDOhFe9rWL/RQEJzNKdZBq9PkGhcS6rRZhRR+Mgha8F5JE8BQK no/1OEHjfVQKFm0iAhlVwTt5Z55XLhGg8Z/dO8AYz9zAH3CZLu6+xSjogae6Pb93GXK9 Q+6wONmTTNc85De31ruM/RbDEeVvN6bu7xdLDeqyiLTYv24wVh00zSsRPwMzQ4EFAP9g C1SQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2OxpsvSS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z11si15863620pfa.153.2019.04.04.02.36.31; Thu, 04 Apr 2019 02:36:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2OxpsvSS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732631AbfDDJfH (ORCPT + 99 others); Thu, 4 Apr 2019 05:35:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:45252 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732358AbfDDJGl (ORCPT ); Thu, 4 Apr 2019 05:06:41 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 047CA218FF; Thu, 4 Apr 2019 09:06:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554368800; bh=1b6XqWC6eXD8aicezeUNaB2us//gmAIg4pzhMlVJ2N8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2OxpsvSS+C9SAEbBOul/IgtEnnRjJWtRPW6mk1ENbrxEh4cdDh3BgdWVCGtByvITk VRaaNHBtmxCPvMLK1hEYA9h+cm+J8B/nVCzUNohUafmRrhCQ++fdGlkKNK6vXJd6Tz Cp5yUPhiRE0ecszbqYjSlQJZ1wDJBbkhs7QJWY68= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hans de Goede , Kalle Valo , Sasha Levin Subject: [PATCH 4.19 175/187] brcmfmac: Use firmware_request_nowarn for the clm_blob Date: Thu, 4 Apr 2019 10:48:32 +0200 Message-Id: <20190404084611.350544499@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084603.119654039@linuxfoundation.org> References: <20190404084603.119654039@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 4ad0be160544ffbdafb7cec39bb8e6dd0a97317a ] The linux-firmware brcmfmac firmware files contain an embedded table with per country allowed channels and strength info. For recent hardware these versions of the firmware are specially build for linux-firmware, the firmware files directly available from Cypress rely on a separate clm_blob file for this info. For some unknown reason Cypress refuses to provide the standard firmware files + clm_blob files it uses elsewhere for inclusion into linux-firmware, instead relying on these special builds with the clm_blob info embedded. This means that the linux-firmware firmware versions often lag behind, but I digress. The brcmfmac driver does support the separate clm_blob file and always tries to load this. Currently we use request_firmware for this. This means that on any standard install, using the standard combo of linux-kernel + linux-firmware, we will get a warning: "Direct firmware load for ... failed with error -2" On top of this, brcmfmac itself prints: "no clm_blob available (err=-2), device may have limited channels available". This commit switches to firmware_request_nowarn, fixing almost any brcmfmac device logging the warning (it leaves the brcmfmac info message in place). Signed-off-by: Hans de Goede Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c index cd3651069d0c..27893af63ebc 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c @@ -149,7 +149,7 @@ static int brcmf_c_process_clm_blob(struct brcmf_if *ifp) return err; } - err = request_firmware(&clm, clm_name, bus->dev); + err = firmware_request_nowarn(&clm, clm_name, bus->dev); if (err) { brcmf_info("no clm_blob available (err=%d), device may have limited channels available\n", err); -- 2.19.1