From patchwork Wed Aug 28 08:49:26 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jacobe Zang X-Patchwork-Id: 823504 Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2095.outbound.protection.outlook.com [40.107.255.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4ADFA16B392; Wed, 28 Aug 2024 08:49:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.95 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724835000; cv=fail; b=oMDdju5pTwerOhlgW420HjoU0DHvAYcPuV38hgc3k1daQX7xyY2b8Mp+/pMpAtl66g8MMjAGag5oLeBSV+F3beGP4X6n1swNAupnJjWkTtPvSb9ML6FKHy2LqGZFpWVeRQC0wklI5nFH5Bg2PpUOvkOLKlaQrGRaod/Cm3E2Rrg= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724835000; c=relaxed/simple; bh=eaPDKg4EgZjhgoZGjOIrFz/PouRc4pgRKLayAeEjx7s=; h=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To: To:Cc:MIME-Version; b=vAZOV491czqyovr1K16FV0FnMS33g+h+GZMptBdDeS3J5f1qBw4eadf+t3xjR+ohaei0LRa31DvGMYNaga+DEuH+gDRSidvmG9vYbqfxS22wtuSN7IISpP9/sxdR9mwHA8rWr1RRyZy5zCZZjDB7h9EhBEQsg5wQpUeUjgjUaSo= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=wesion.com; spf=pass smtp.mailfrom=wesion.com; arc=fail smtp.client-ip=40.107.255.95 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=wesion.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=wesion.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=RNz1Gr2t/P72mbp4I7QhTpIRsegNtevQVdDOll1oILqEKvj0NA3vwbt1uHkpG4Q5QWwbPRDCwsldQhW1fxgLQUElxlomoL8rwiXaO6kXQfAJVwcMDBaqud7FibMNLgax1iPBrT22X+CXVaISNZTu2ZuS77BTGZCv2a9K4geT2/GGVLKNH3JgrPcLufuccGd3nEwPd4NBT8K8lV2geQFQQHHFgPzzpYOTLePRjdm7LwMBEfZgEHPHixdz998XAUIRzmhpiiQSdvv1yynN+kxb9xyc3cQmuMnkaB8nu2nduWovDa9JY3A/PhvyCTknRkoIKxSt4lPkvAM+yuRwjM5USQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iIa/19ZSdmiXE/+0Ze0XxBHm6vHkH0nd5ZiJsa5DkWA=; b=v5vBkyhw/UXEonxoQDSI6ELwNgyu9BdvAMOHe3zurKGVevhhLtOtNDS0D+l8cvJe7eiqVnRueflwCTEBK3t1TdfGLM17v1J/GH6SeLcW8LLRaPbrqJaK/U5qysFyQPEuC7qHJO0mMCwYkSNkj/HRwvswk/Dm7Fvfwjl6mD4baXQTZpvIWA7R0gyzU0WMJo88womqilAsGZnEKYI+Wg1WEOiYr6l8iXQRzefCG67QUnCNfw2rS0fO/cVeRG8xS2p2HA6HI+Ff9cvdpm4qKcRcyMfV44OCKoj2aAWTVGQo9RPalF6AhKwOhz75K7B6IKnm4/lIn32X7rRLTdi0hvdJkA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wesion.com; dmarc=pass action=none header.from=wesion.com; dkim=pass header.d=wesion.com; arc=none Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=wesion.com; Received: from TYZPR03MB7001.apcprd03.prod.outlook.com (2603:1096:400:26a::14) by JH0PR03MB7382.apcprd03.prod.outlook.com (2603:1096:990:12::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7897.25; Wed, 28 Aug 2024 08:49:53 +0000 Received: from TYZPR03MB7001.apcprd03.prod.outlook.com ([fe80::78dd:5e68:1a9c:36c0]) by TYZPR03MB7001.apcprd03.prod.outlook.com ([fe80::78dd:5e68:1a9c:36c0%4]) with mapi id 15.20.7875.019; Wed, 28 Aug 2024 08:49:53 +0000 From: Jacobe Zang Date: Wed, 28 Aug 2024 16:49:26 +0800 Subject: [PATCH v13 5/5] wifi: brcmfmac: add flag for random seed during firmware download Message-Id: <20240828-wireless-mainline-v13-5-9998b19cfe7e@wesion.com> References: <20240828-wireless-mainline-v13-0-9998b19cfe7e@wesion.com> In-Reply-To: <20240828-wireless-mainline-v13-0-9998b19cfe7e@wesion.com> To: Kalle Valo , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Rob Herring , Krzysztof Kozlowski , Conor Dooley , van Spriel , Arend van Spriel Cc: linux-wireless@vger.kernel.org, netdev@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, brcm80211@lists.linux.dev, brcm80211-dev-list.pdl@broadcom.com, Jacobe Zang , Ondrej Jirman X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1724834980; l=6614; i=jacobe.zang@wesion.com; s=20240828; h=from:subject:message-id; bh=eaPDKg4EgZjhgoZGjOIrFz/PouRc4pgRKLayAeEjx7s=; b=kiLGdUKWb0oysGKrbbOhlEA2XsGkNy97sBdjuxpQBh0k2MJ855MJU0tYB18RuHkYf278dZcEO a81tRLqFUrnBl3qh9XL3Rj1+QYYUhX+aXhPGtlbCgXjS3V4Zbe0V8Qo X-Developer-Key: i=jacobe.zang@wesion.com; a=ed25519; pk=CkP5TjIqHSwHJwZXTGtadoXZucYvakXcO3HjbR6FoeU= X-ClientProxiedBy: TYCP301CA0076.JPNP301.PROD.OUTLOOK.COM (2603:1096:405:7b::10) To TYZPR03MB7001.apcprd03.prod.outlook.com (2603:1096:400:26a::14) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: TYZPR03MB7001:EE_|JH0PR03MB7382:EE_ X-MS-Office365-Filtering-Correlation-Id: 8f6dbb9b-a6dc-4793-91e1-08dcc73e6265 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|7416014|52116014|376014|366016|1800799024|38350700014|921020; X-Microsoft-Antispam-Message-Info: =?utf-8?q?wNTyf1+/onHOt53oBTNJbQg8TBT82hR?= =?utf-8?q?rYnDEr9Qg6B/7i0szK4nCnNZrALq84Q9unj+NVN9zUqsZFQmsMrnOkTVFYWK8VSWN?= =?utf-8?q?w0vtYkua7mVBNEYGu1MX530ya0UCTqID4sNitApOSf6OA6qc04brT2iEDx8yQ9MHi?= =?utf-8?q?/mIewcJQafNmBnRZMeN4WRoAzV5cYX+HXbR8EgJcUBneGzJH3z6tDiceMeVs+mDbI?= =?utf-8?q?Akd68PREBYJP/C5r99x4E8BeLsEpc9h0SewW0GhZVpYbG0wRF8A6gnt9/iZco+clU?= =?utf-8?q?akicPMX8oDqJLF3nTDu8qzs7wljfszGVrhjo3dszu+Otl2AyHTjCpGSSBonp28qOn?= =?utf-8?q?3ggJ8aT2oB4mmK0QFhU89gWLWCQ7Qd5rpgs9tOne3NHZxiguMa+wFBaPpKKK6Si/w?= =?utf-8?q?qNBbI6GDlhWtu5UCB7AZssml41OHR3ladsnI9c0/fHtEzl20V5zQTcgsnysTRZwCZ?= =?utf-8?q?Zg0wwKqj4YExu0as7hjN4M4brCB+8d1J3V7HDI/i9f5BiqtyXLdnHSMRx6ecjdcM3?= =?utf-8?q?uAJYt8Jwt6tPgNToL6+VDL0n+toLVsIHCtWg05coIpkQLDifcHKV6E/uSeYc3KfHT?= =?utf-8?q?6IbMp7gTJPy5txu954SUnPoBHPvSNLFTegKwhmnJje8hAVkPNl2e8T1xQSrxs0oFF?= =?utf-8?q?j/vUPPNsVIUIYpRvJo/GgbYbY2UoVsHCkdk7EAnkuhrIVyr7etWQFbshkmS80msWr?= =?utf-8?q?hA4FvfGBkAXOM7XgyyU0EjrH3/dRwWBmPbkj471d9H5m/SWGe+j5OLKqyC6iYXSGa?= =?utf-8?q?ImsMMsclypgPVMq7hXsAnHQmGbTJZvS6VjJNzdU3ui+y+cVWjzA4OqDQs1hMu1UJo?= =?utf-8?q?nllQsEoHxHl1h/nOkBMnKSRwWNShV7CH/trxX5RWL2qiUtujASXKLW1AK17k1u3Fw?= =?utf-8?q?O/cltNzHB3opDxgl30Yw2DTmqGqaQbKRNBdFypLfuH0iZ/QslvHWBsk8Awc9kE5DZ?= =?utf-8?q?2SvL4YVp+ittNj02NnkTvDca4nbeItCyebH4jxB2pTiYkfUnTMt+zapSRR9kSe0cb?= =?utf-8?q?EGv9oYcenPliI9YkAX32KFfT+D772fZDnydO6L2QM3wGVH3PF9NzscubuvZ3T0qCy?= =?utf-8?q?VZX2Ydh2dMYo5zyoUAzQ+jKCvHa3X2Yu1OA5iO2kKE/uGjxETnbq6XjdTg3j6UhJc?= =?utf-8?q?TR+tnp7PZRMBNnq0Lfu4F/YGM2Z48C5nFpVvbkVeZmhfvmHy21z3ralJYDvehAgOu?= =?utf-8?q?ku3tcNpKMWwVDQp9ZGD6eKRxf4tDC8L5cJ3RFJXFT7Ui5pvTaC4MjA3PTd6FE+7xT?= =?utf-8?q?Tr5Mzi6S0BOTmqkLaKsr2FZrSwYMknHxO057lEqI7tn7FgHnYOkeLgFW3UTXHv2bX?= =?utf-8?q?9OpGflrv/gM+9vYD8P++/woyLvRpehDm48no+8vCGbWk9uNC+Uutkjg=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TYZPR03MB7001.apcprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(7416014)(52116014)(376014)(366016)(1800799024)(38350700014)(921020); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?r72nHaMuQGVil0wqAwKVy9aowvBW?= =?utf-8?q?cIXLXV9CwvWTf8+OLczulh2TXzrz221aJZTOQ0gts1nc/S6ySLzUfH/i9i0SHjNJm?= =?utf-8?q?TnzmAsXjiQANmud+VfcZ5hM/oCNGpOYrdRWWvdlpFEHrc7NRWeyRUfeX0tt7ybnQm?= =?utf-8?q?/m5n2XFUQna8sB+zkYxqriJd249x2Yzxp/zJDKIG7/gp8myyaoNFblw3HXwtGZ9r3?= =?utf-8?q?7HLbUODFmj4E+W1msmFA4r5DNxwrZqHQfxNT4We4/j1v4ZwVO1JqM6L7IFiXrbOuV?= =?utf-8?q?pVse+xFAuJEix1PigBhk9/ySc3YGbic4hCBPet0w7+m2ZqZXZKx3SC55HPlBmWyzz?= =?utf-8?q?/wBGJVs9rC/ugggeUL2Gwl/hBxZQaviu//VNmkWm9N3H6jO7tCOcVBu1ygsg/h5qr?= =?utf-8?q?TESLRgClrEvYI7DkBw2n45yuNeoJka2MmKOlt3Ni9xpMqCzi0cVuomv7aEGmk1QPQ?= =?utf-8?q?L6/d16pEXG/ipLx1hO/SNpOHh/RUMs6lmmrcGvDZA2cBni9ooB6DeG3sGQ1vK/3PM?= =?utf-8?q?z/uen3rNrjbCgVgDAY0WDRTNTt7c7aDcFbX3S2qTZiCBnI/ocQsz/tVVcD7tFtnCd?= =?utf-8?q?cBTBlFYofbWT85xMgq4F7DeJT8jvh+K5Ildjv0UmZOFEupqU8kgq6SpE//ROo+U0O?= =?utf-8?q?xev//tlf88IDPNXZh5tSnXrrRoCp/OZvPTOh7CxhWO120ABAUsuFIptfSz/xS3WwB?= =?utf-8?q?/lEf/K2nxUZPR690Yqsafgbyw0mi3kZKj3JLXgBHCHhgWHmRY1euA590RC1tHf97D?= =?utf-8?q?1LdBM0CbUhR+dofaNtP1NPuezj2wOskq+WV/0lKSKUmaPuss4bc08DwgS/TjXKpqg?= =?utf-8?q?TKCQlAnMmXJkG32/e7GWRaE5Ib8wfMe6Ay1ayZUdHQEjbtHrnVU+f+sBrMHDT8qgB?= =?utf-8?q?rvPDrFC8O4fwPpYeiDlCsPd++3k/KMVjrRqlev5PQx8uVHyDP0EP0WliG/8LWY0b9?= =?utf-8?q?5UVdNsxWLae2kVCe8fsaf7YTbhWcT7j3GVSceaX4/pTwaUSPXurc+Yg3QIPpsGF7U?= =?utf-8?q?0HHa0eSIAH3LzLAxrswlp7Hnl+rto7tS5lhcREoiRjbrYfqWZEBcX26Zv7a/bH0b9?= =?utf-8?q?388Cz+Xej55Eob8QPKTzwc7TJdCpIS0cpnCQ9Wj4NqfNDgTXPDj9j1+s9SqOS8ES3?= =?utf-8?q?iyx/yu+r+PIxi+NAFuoCb4UUe/sFagQ3XKFRAOBAMfCbpy2Rss2OxI6a8S7dVtqDt?= =?utf-8?q?3pzzGxmtdhi3Bolrpo26dWX+qU2t7BNtwo9V+7Fjz1jHjhRsIJdRrDn9o6Np2ps3U?= =?utf-8?q?xDiYG4ZF08zP43mMW5TjOaEOmptDLpXtrH3VJssh3zZs92AgUMrWZobk4p32I4mAA?= =?utf-8?q?MIunFt6ifdqcdYu/07N76+KQPArbwbhIFbFMAOatoSioH6+eU6SUj24qiXjsNODle?= =?utf-8?q?cgQh6IfkFS2yMgxh6kaZMXsu343sOFy8i/XGRikdI4Cak5e+1n3U2ITM96zDr4M3R?= =?utf-8?q?iUYyD76LfJdPgAG4/ocaR344jp11a79PkGUie8R/8E2OUDm+FwrDwST0O/z7H8hGR?= =?utf-8?q?I22k5TdyRHQm?= X-OriginatorOrg: wesion.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8f6dbb9b-a6dc-4793-91e1-08dcc73e6265 X-MS-Exchange-CrossTenant-AuthSource: TYZPR03MB7001.apcprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Aug 2024 08:49:53.3043 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 2dc3bd76-7ac2-4780-a5b7-6c6cc6b5af9b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: YLIjaulDdLYiuUWCBxZ/s5VOutAGQh2GXXfUy2B4MpkvwK5EXql6qMt5HfZRDkdmnl0KdQ1PXEf8v0vuw3SaVQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: JH0PR03MB7382 Providing the random seed to firmware was tied to the fact that the device has a valid OTP, which worked for some Apple chips. However, it turns out the BCM43752 device also needs the random seed in order to get firmware running. Suspect it is simply tied to the firmware branch used for the device. Introducing a mechanism to allow setting it for a device through the device table. Co-developed-by: Ondrej Jirman Signed-off-by: Ondrej Jirman Co-developed-by: Arend van Spriel Signed-off-by: Arend van Spriel Signed-off-by: Jacobe Zang --- .../wireless/broadcom/brcm80211/brcmfmac/pcie.c | 52 ++++++++++++++++++---- .../broadcom/brcm80211/include/brcm_hw_ids.h | 2 + 2 files changed, 46 insertions(+), 8 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c index 190e8990618c5..c0fdaa4dceda4 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c @@ -66,6 +66,7 @@ BRCMF_FW_DEF(4365C, "brcmfmac4365c-pcie"); BRCMF_FW_DEF(4366B, "brcmfmac4366b-pcie"); BRCMF_FW_DEF(4366C, "brcmfmac4366c-pcie"); BRCMF_FW_DEF(4371, "brcmfmac4371-pcie"); +BRCMF_FW_CLM_DEF(43752, "brcmfmac43752-pcie"); BRCMF_FW_CLM_DEF(4377B3, "brcmfmac4377b3-pcie"); BRCMF_FW_CLM_DEF(4378B1, "brcmfmac4378b1-pcie"); BRCMF_FW_CLM_DEF(4378B3, "brcmfmac4378b3-pcie"); @@ -104,6 +105,7 @@ static const struct brcmf_firmware_mapping brcmf_pcie_fwnames[] = { BRCMF_FW_ENTRY(BRCM_CC_43664_CHIP_ID, 0xFFFFFFF0, 4366C), BRCMF_FW_ENTRY(BRCM_CC_43666_CHIP_ID, 0xFFFFFFF0, 4366C), BRCMF_FW_ENTRY(BRCM_CC_4371_CHIP_ID, 0xFFFFFFFF, 4371), + BRCMF_FW_ENTRY(BRCM_CC_43752_CHIP_ID, 0xFFFFFFFF, 43752), BRCMF_FW_ENTRY(BRCM_CC_4377_CHIP_ID, 0xFFFFFFFF, 4377B3), /* revision ID 4 */ BRCMF_FW_ENTRY(BRCM_CC_4378_CHIP_ID, 0x0000000F, 4378B1), /* revision ID 3 */ BRCMF_FW_ENTRY(BRCM_CC_4378_CHIP_ID, 0xFFFFFFE0, 4378B3), /* revision ID 5 */ @@ -353,6 +355,7 @@ struct brcmf_pciedev_info { u16 value); struct brcmf_mp_device *settings; struct brcmf_otp_params otp; + bool fwseed; #ifdef DEBUG u32 console_interval; bool console_active; @@ -1715,14 +1718,14 @@ static int brcmf_pcie_download_fw_nvram(struct brcmf_pciedev_info *devinfo, memcpy_toio(devinfo->tcm + address, nvram, nvram_len); brcmf_fw_nvram_free(nvram); - if (devinfo->otp.valid) { + if (devinfo->fwseed) { size_t rand_len = BRCMF_RANDOM_SEED_LENGTH; struct brcmf_random_seed_footer footer = { .length = cpu_to_le32(rand_len), .magic = cpu_to_le32(BRCMF_RANDOM_SEED_MAGIC), }; - /* Some Apple chips/firmwares expect a buffer of random + /* Some chips/firmwares expect a buffer of random * data to be present before NVRAM */ brcmf_dbg(PCIE, "Download random seed\n"); @@ -2394,6 +2397,37 @@ static void brcmf_pcie_debugfs_create(struct device *dev) } #endif +struct brcmf_pcie_drvdata { + enum brcmf_fwvendor vendor; + bool fw_seed; +}; + +enum { + BRCMF_DRVDATA_CYW, + BRCMF_DRVDATA_BCA, + BRCMF_DRVDATA_WCC, + BRCMF_DRVDATA_WCC_SEED, +}; + +static const struct brcmf_pcie_drvdata drvdata[] = { + [BRCMF_DRVDATA_CYW] = { + .vendor = BRCMF_FWVENDOR_CYW, + .fw_seed = false, + }, + [BRCMF_DRVDATA_BCA] = { + .vendor = BRCMF_FWVENDOR_BCA, + .fw_seed = false, + }, + [BRCMF_DRVDATA_WCC] = { + .vendor = BRCMF_FWVENDOR_WCC, + .fw_seed = false, + }, + [BRCMF_DRVDATA_WCC_SEED] = { + .vendor = BRCMF_FWVENDOR_WCC, + .fw_seed = true, + }, +}; + /* Forward declaration for pci_match_id() call */ static const struct pci_device_id brcmf_pcie_devid_table[]; @@ -2475,9 +2509,10 @@ brcmf_pcie_probe(struct pci_dev *pdev, const struct pci_device_id *id) bus->bus_priv.pcie = pcie_bus_dev; bus->ops = &brcmf_pcie_bus_ops; bus->proto_type = BRCMF_PROTO_MSGBUF; - bus->fwvid = id->driver_data; bus->chip = devinfo->coreid; bus->wowl_supported = pci_pme_capable(pdev, PCI_D3hot); + bus->fwvid = drvdata[id->driver_data].vendor; + devinfo->fwseed = drvdata[id->driver_data].fw_seed; dev_set_drvdata(&pdev->dev, bus); ret = brcmf_alloc(&devinfo->pdev->dev, devinfo->settings); @@ -2663,14 +2698,14 @@ static const struct dev_pm_ops brcmf_pciedrvr_pm = { BRCM_PCIE_VENDOR_ID_BROADCOM, (dev_id), \ PCI_ANY_ID, PCI_ANY_ID, \ PCI_CLASS_NETWORK_OTHER << 8, 0xffff00, \ - BRCMF_FWVENDOR_ ## fw_vend \ + BRCMF_DRVDATA_ ## fw_vend \ } #define BRCMF_PCIE_DEVICE_SUB(dev_id, subvend, subdev, fw_vend) \ { \ BRCM_PCIE_VENDOR_ID_BROADCOM, (dev_id), \ (subvend), (subdev), \ PCI_CLASS_NETWORK_OTHER << 8, 0xffff00, \ - BRCMF_FWVENDOR_ ## fw_vend \ + BRCMF_DRVDATA_ ## fw_vend \ } static const struct pci_device_id brcmf_pcie_devid_table[] = { @@ -2698,9 +2733,10 @@ static const struct pci_device_id brcmf_pcie_devid_table[] = { BRCMF_PCIE_DEVICE(BRCM_PCIE_4366_5G_DEVICE_ID, BCA), BRCMF_PCIE_DEVICE(BRCM_PCIE_4371_DEVICE_ID, WCC), BRCMF_PCIE_DEVICE(BRCM_PCIE_43596_DEVICE_ID, CYW), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4377_DEVICE_ID, WCC), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4378_DEVICE_ID, WCC), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4387_DEVICE_ID, WCC), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4377_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4378_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4387_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_43752_DEVICE_ID, WCC_SEED), { /* end: all zeroes */ } }; diff --git a/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h b/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h index 44684bf1b9acc..c1e22c589d85e 100644 --- a/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h +++ b/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h @@ -52,6 +52,7 @@ #define BRCM_CC_43664_CHIP_ID 43664 #define BRCM_CC_43666_CHIP_ID 43666 #define BRCM_CC_4371_CHIP_ID 0x4371 +#define BRCM_CC_43752_CHIP_ID 43752 #define BRCM_CC_4377_CHIP_ID 0x4377 #define BRCM_CC_4378_CHIP_ID 0x4378 #define BRCM_CC_4387_CHIP_ID 0x4387 @@ -94,6 +95,7 @@ #define BRCM_PCIE_4366_5G_DEVICE_ID 0x43c5 #define BRCM_PCIE_4371_DEVICE_ID 0x440d #define BRCM_PCIE_43596_DEVICE_ID 0x4415 +#define BRCM_PCIE_43752_DEVICE_ID 0x449d #define BRCM_PCIE_4377_DEVICE_ID 0x4488 #define BRCM_PCIE_4378_DEVICE_ID 0x4425 #define BRCM_PCIE_4387_DEVICE_ID 0x4433