Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1479660pxb; Thu, 4 Mar 2021 12:24:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJxN4omh26yMUxwlgglW8jclwq72narmWkVONsjqoiNRs1o1nPATM61p3RWxAIk9qjgZlH0i X-Received: by 2002:aa7:d588:: with SMTP id r8mr6393239edq.88.1614889464264; Thu, 04 Mar 2021 12:24:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614889464; cv=none; d=google.com; s=arc-20160816; b=s6HzBMpaCgxEb3ojIh8PIyEB9etvGfkmvS9N1O301H5GkcKMzp5pMQhrVYqblTsDjm My0OKLTA2cvOBWwT/lTjsDdTJWJxNlva99xu9OLTUD2/1TTaoa61sm0bPwcc8fAAcf71 LRYUY84uLi/+akZNfauDYrkGXira3D/PCtnsfsdvY8Cl0902xfhACR1KqkDS/C7ooCBY qp+aiRIbohoacMkPGCekBHZat43QXvLJkqWYQNW3vOEJmbupVtOlp+eRRwVYP5D1QD6F uxUpQX9V8/S53gUuA6OLxZ87Aa0NPZDsYPcVuq2A0DbSFaklZcOqGi4f5/u5JjnKWtnW ouAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date; bh=o0yednTLCFISAfn4FZf0IfOqJvOJm3Pc7YJG4538LIQ=; b=mj7ZBnpJ6t25yoiUed+V/g2x5RLyabrSG2xYh8p+rTGV4+sqHmPDrl270+uSGH1Evy Pm3wWcYSTv5lhaTGBmQEMnqxtaqN0O6AXbkMnrkAhgZT1Xc798f8PO19hWbX2fcrZNGL eEVF9FLd9l89tWcgnqlHsT3zyBZlRimfBqU8TsWRJ3ghm9EdNNKF1jpbDaivVm+fBN71 zo1vh0BAFVQSEQABh7pdn9+5hTXAE9hj0kbS4CWQ2G1vjbr2+jMvp42eBC6mPlKy2Di5 okyQf7OyIU84TlOTgfaomd4U8hxWmAVKPSAs1WSRl10nfEbAXftBvG0B7gTrKNDQZyDT InQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b26si157301ejb.374.2021.03.04.12.24.01; Thu, 04 Mar 2021 12:24:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1576231AbhCBTx6 (ORCPT + 99 others); Tue, 2 Mar 2021 14:53:58 -0500 Received: from mx2.suse.de ([195.135.220.15]:55088 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349729AbhCBRY7 (ORCPT ); Tue, 2 Mar 2021 12:24:59 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id E00FFAE72; Tue, 2 Mar 2021 17:23:03 +0000 (UTC) Date: Tue, 02 Mar 2021 18:23:03 +0100 Message-ID: From: Takashi Iwai To: Mark Brown Cc: Jon Hunter , linux-tegra@vger.kernel.org, alsa-devel@alsa-project.org, Liam Girdwood , linux-kernel@vger.kernel.org Subject: Re: [PATCH] ASoC: soc-core: Prevent warning if no DMI table is present In-Reply-To: <20210302124913.GC4522@sirena.org.uk> References: <20210302092712.310705-1-jonathanh@nvidia.com> <20210302124913.GC4522@sirena.org.uk> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 Emacs/25.3 (x86_64-suse-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 02 Mar 2021 13:49:13 +0100, Mark Brown wrote: > > On Tue, Mar 02, 2021 at 09:27:12AM +0000, Jon Hunter wrote: > > Many systems do not provide a DMI table and on these systems a warning, > > such as the following, is printed on boot ... > > > > WARNING KERN tegra-audio-graph-card sound: ASoC: no DMI vendor name! > > > > If DMI support is enabled in the kernel, there is no simple way to > > detect if a DMI table is table or not. Note that the variable > > 'dmi_available' is not exported and so cannot be used by kernel modules. > > We could fix that, or provide an accessor function? Or only warn if > we're on an ACPI system (which we can check from a module). This really > does feel like something we should be warning about on systems that are > supposed to have DMI information available as standard. I had the same feeling when I took a look at the patch, but later changed mind, since the error will pop up also if a system has an unmatured BIOS with some bogus vendor DMI string, too. That is, users of such a machine gets always an error message although this isn't any serious problem unless you need a dedicated UCM profile (which can't be used on such a system in anyway). So, I agree that exporting dmi_avilable could improve the situation a bit, but the error level needs still reconsideration. Takashi