From patchwork Tue Sep 10 03:04:14 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jacobe Zang X-Patchwork-Id: 827322 Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2097.outbound.protection.outlook.com [40.107.255.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CC7D9181D00; Tue, 10 Sep 2024 03:05:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.97 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725937551; cv=fail; b=UeprwZIwD5zRRvGq53TPdMA6UJpqEIIG5s0mVMM+zHx/FI+dbwsxv9vWbheBpv0ql3KCtW9i5wWDo0RV2pvd/Zg6p8Nx02joV2QwdCGzpfyBQ2aqOMIQSjaS1nhqVvAAf0JxfJZ+1JeDijd8Tryc4ZWDcoYLf+Ju9LHK0uGBTrY= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725937551; c=relaxed/simple; bh=eaPDKg4EgZjhgoZGjOIrFz/PouRc4pgRKLayAeEjx7s=; h=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To: To:Cc:MIME-Version; b=ptQvLcRC0mRVOiQySx3kpyMNr6L+tctWqzD2ePV0sqmOP6B5a4bBHYoYlXDZ7+YK9uNIn5fxPj1j4zqPTWDWd8H0k20Xr5BWfcLEd01quDZCKEuUO4e75KShIYB1WBqt0q03EgmqV9NjLM3eoolhpXNJ002O3UGAXTWArLZMQBM= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=wesion.com; spf=pass smtp.mailfrom=wesion.com; arc=fail smtp.client-ip=40.107.255.97 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=wesion.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=wesion.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WrlW/u3Uv8qjPHJCMoHtt10DqgFznE4Wozb2Ktx2ARbfJVQQwt9cXAqPKjpjg7v0y1VM7/eGNf4cz+L7byVlryPF1RIQBiKOUGNQ1mM1Q32BpPujpiW4N9zg3IEEa4RAdoRQiPDks6AKxO5SymxhmuO/oSfN0TmWnMQzxY2KGKWvfp2BPHZ0oLFAUFL+Fc9WOKk7dyUl5Hl1S9DZwcJaFBjyDLajk11m4b4dHsqxUOTIwkAmI37gE4eYRFmnsAkINyE1dYBl/EX3052dzDZhjrQobuFv+Q7ZlnetxwkTQnNTYTBZHPM0WcmRQmGImblxabyN5zlJDf16h4awq6IY5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iIa/19ZSdmiXE/+0Ze0XxBHm6vHkH0nd5ZiJsa5DkWA=; b=xU30arzq64KyrnjYoeVM7zf4mmV7HvOIUf3sA5A9r3mMWXOk6nJiFtKhreMCaCa/0KZRz4o7PVdaRIoDGcrLtt6ko3hfp/1Vvuql/kMNJnMJiEBxw8pWapNjcWystOGJAIR6HHRRZHnUs8Kwy+6dOdKM21jyHOc74YHZ0TUBcZxLNNX37GbFI76NBOWZT5TnlfYpjCeTmKfCczXePK0txvZqz/NKS+bp8rd+lMnMOMZh1zH6sMDdvNDnwoY+BI5uLjG6K7/K75n+mGzZ4upWSuTe7vAUKqUC425PZnE4mvXQVFBMX7gBIEtqsoIsyMZN/93VncXOM64cF7s2WaF0WA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wesion.com; dmarc=pass action=none header.from=wesion.com; dkim=pass header.d=wesion.com; arc=none Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=wesion.com; Received: from TYZPR03MB7001.apcprd03.prod.outlook.com (2603:1096:400:26a::14) by SEZPR03MB8442.apcprd03.prod.outlook.com (2603:1096:101:21d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7939.23; Tue, 10 Sep 2024 03:05:45 +0000 Received: from TYZPR03MB7001.apcprd03.prod.outlook.com ([fe80::78dd:5e68:1a9c:36c0]) by TYZPR03MB7001.apcprd03.prod.outlook.com ([fe80::78dd:5e68:1a9c:36c0%4]) with mapi id 15.20.7939.022; Tue, 10 Sep 2024 03:05:45 +0000 From: Jacobe Zang Date: Tue, 10 Sep 2024 11:04:14 +0800 Subject: [PATCH v14 4/4] wifi: brcmfmac: add flag for random seed during firmware download Message-Id: <20240910-wireless-mainline-v14-4-9d80fea5326d@wesion.com> References: <20240910-wireless-mainline-v14-0-9d80fea5326d@wesion.com> In-Reply-To: <20240910-wireless-mainline-v14-0-9d80fea5326d@wesion.com> To: Kalle Valo , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Rob Herring , Krzysztof Kozlowski , Conor Dooley , van Spriel , Arend van Spriel Cc: linux-wireless@vger.kernel.org, netdev@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, brcm80211@lists.linux.dev, brcm80211-dev-list.pdl@broadcom.com, nick@khadas.com, Jacobe Zang , Ondrej Jirman X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725937530; l=6614; i=jacobe.zang@wesion.com; s=20240828; h=from:subject:message-id; bh=eaPDKg4EgZjhgoZGjOIrFz/PouRc4pgRKLayAeEjx7s=; b=ybBsYhJi28XgyZE8MkJ1Fh9bwJnv2zBJOvOgRj/u52fjUFj3p3qw3pBn55DxddHuo3MuI1++a Q4OlTuP+D8GBHoT6tXwf22OumhKX3Zc+eSwB5Vsf/9tKi5ToE8asxLu X-Developer-Key: i=jacobe.zang@wesion.com; a=ed25519; pk=CkP5TjIqHSwHJwZXTGtadoXZucYvakXcO3HjbR6FoeU= X-ClientProxiedBy: SI1PR02CA0047.apcprd02.prod.outlook.com (2603:1096:4:1f5::15) To TYZPR03MB7001.apcprd03.prod.outlook.com (2603:1096:400:26a::14) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: TYZPR03MB7001:EE_|SEZPR03MB8442:EE_ X-MS-Office365-Filtering-Correlation-Id: 59c6b97e-811f-402e-49e3-08dcd1457694 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|366016|7416014|376014|52116014|1800799024|921020|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?H1G9pTtXiQ1AEr0Q+S34pFL4Wb504KH?= =?utf-8?q?+KOrmEKft9NJj9oHmLFbQIftYDCKTBaSZm4SiwStrb4Nwq0aLFtnwZr0D119cqnxW?= =?utf-8?q?J7i51hQS7AVaIBrnD2GnaZPyRfZ+hCNN6a8aaCyzDC8jXQxs1viAJ23tyUNxdprcl?= =?utf-8?q?L/xRlYiJGgvjO3STR5JFzz2BxXBhsfi4lu5dleTonxHB3Fqwf/bK8ZTuwNoj4WyLe?= =?utf-8?q?U23wHZEWHoLRZAfC/bx+au63ay7mewEnU0oMrAjEe5zZwNnJTO+1D53KeA+BcyaoG?= =?utf-8?q?FZgRYJKu0TGa3oi0ggColIx0xbSdXytUYTSCvnsLTmdAz+dIGLRF9yZm81OdPf4XV?= =?utf-8?q?YED/a919h//yXlobFVZEsJOGv7LlIGF8/auDqwBUui1kaFSVNvKeZheg8tcpBQErg?= =?utf-8?q?+z8azh7KIpnm1aynDed21nRwJi/3w4x6o2eaAfiQLQwP+5sPxf1E6hcWl9xwFFANP?= =?utf-8?q?3kujfX6yJb//7RUvfO+OVV9B2n61y34J1itRQ0Gx0oX+dIFz9d1gZnNVfF98ZScTT?= =?utf-8?q?fnqzpSUSw4nwhFRvkUQ31Vqf0COebu5nSeZLanXml0aRwnuQmN2ShvpFbUjcAWm4L?= =?utf-8?q?BMcPR5kd27jl9zU+jIBtmO8ugdebuUysZN+jY0amtF2WQEVTAuHTmqXCpBa+3l7Q5?= =?utf-8?q?ECNfrxbZB/4BKfdnmbd4WIIrbsX/DNGthtubX56qxYsCyLBjkcC8eW4wNdIroFNar?= =?utf-8?q?IqTuHYwY/wSQNz1Bh1rW+S03eBMcGCP4nY+RBk+aJljV8AjqNju3KuLaeZYuSJdcN?= =?utf-8?q?H1rSkbreC3KH6gs4+TnzjWG6+4RlVRD9RwvborUCZnjDJ+g7oD9Dq7goJn3fQWkkP?= =?utf-8?q?PM6O6UnSECgz/UPdETmqVfzu7tCoiCobyuepWHPZEkYy25Gmr0MZ26jfdnPVaocJ+?= =?utf-8?q?3kor2G9BO3vXumJFYCS+5b7zckDIKmlQWxWcpOJXtB6bsIRVSF+yXoULd36E5D3yy?= =?utf-8?q?AUXU//fenyhkrgKbUJK2AEXYLvep521z2iu7HOPPAjA8GPWuuMu6PdcZ+xrodGK5s?= =?utf-8?q?hR60TGzAymIzatlG8Ait/HLGYmGd3/8Dfz9J5wXfZtVoPGzOH1aDCF0ot8qKsIj0B?= =?utf-8?q?vXcagl9zQVrG5aQ75vZ2t1g70PPbKw9aVp1muwM0p/QrsuvSUeCfgKa4Q3pkUCjL2?= =?utf-8?q?tIZ8Fhv1mT7iQQKPEZ+3yRikU9yjhUWvES6ejan/8Ep73OOWvEp7AFEJ4KZd4mvWR?= =?utf-8?q?RP723JsorJmhsF0YfK7ChJI7ahZlrzEPfljndrjVzKuUXEx8LXyVFrVhNqB1HnHTq?= =?utf-8?q?ZYtY3nDYyqgz7K/WZ5kwAnjEB/M57y1imU7UthMIuFXds6OCrnPvF2NhSKOGceAkA?= =?utf-8?q?WMNyCKs8Y9s16Xa7kTuh7GQ3/4B+VZmhsRDI/pA4YK0BB+G1sA3XPj4=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TYZPR03MB7001.apcprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(366016)(7416014)(376014)(52116014)(1800799024)(921020)(38350700014); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?Y7eCA/yYW1FJRTPQswXPeKxRM/rb?= =?utf-8?q?p6jET/fzKxfmrBB4vX4FTwO5ZMDq0xnS6qOxdMGsJ1SAhWQurpJdy4yz83npIgvuK?= =?utf-8?q?NpJ39u/F55jKAWruZ0WThvA2XqRQvmSJzmQTF93pcqImvZlMtDJ4qJMUZCwpAG9nD?= =?utf-8?q?psTbRS3Acg2TrQpd9CEnp0J6XytjDQ5scrXaiPYc+u0dWZ7syRuCUmWMKeNe64TJS?= =?utf-8?q?3BwaiMcSUrvsHYl6rkudTmdjSoft4kbWnxb/tdqdvBKLDCjkJJU25FPk8bTpCym7O?= =?utf-8?q?3qqZcqVIoEBc2N2h6yGkD6CgwG4rB0t9qlNH9rRZ0mrBjkGGdOf0/feRH2P/BoMSt?= =?utf-8?q?HG5dM6x499HRKXsQgH7f7Z4tJS9vWshN/F0auF93BN6GdOhVNLuCMx06dXRdtiwcS?= =?utf-8?q?1OS0hPJ8RlEczwxGXWzwj2P3VZT4Z1z58l69TaCYF0tmOUOWhC+zjBI+T6kIo8rId?= =?utf-8?q?D9dUi+hEm7VkFl04pksoMpm986//imB8Eot8ScYaj6AqkkvJfXVbOi7kssWptDUWG?= =?utf-8?q?ZkAMQk3167LQQulCDhiyEm5NzVkqxSEtFZuXhu3Hx5caVvhBa6XueiREhEwco0uJK?= =?utf-8?q?Fls7/1lhX/sQ2DkLcaBkuaP3nodp1BgFHwlj8T4C/27c2eS/eIEBWvToZiLI6848w?= =?utf-8?q?xZb9BQHTuIj1xVx7hi6TacU+nWv41OoTvWAdAepqGkGEXX9WbmLdJe5kTWfTN0NpO?= =?utf-8?q?673ZCKY3/tcRuOSsEsLNJMlTkMLGb+0PWC9+pQHktx7bceepCA+BiE3AzJ+lWqCUX?= =?utf-8?q?jl5TEydh7X5zfa8dvMln+mMY/8+6Sqm5z9u6y45LbGw4fzQiExfvDMFlhf7YdQf/g?= =?utf-8?q?3G5niMENrbufQReqFvtCvQ3qp2KVYSdMTf4Vz+NjsYgy0NkOabRICMOKXRz+nw5vy?= =?utf-8?q?X4kW9ULx27MmFIMZMuBUHyD+JUjQKy5RY6YpvwtOFsB3YM3TDv6A6y5D7xAOON6cy?= =?utf-8?q?ZN6g7dh6XjKZrAg2P/ilnIfCePf4cxETnvLYxh3CIeEtes4Rq/dhInCeyDymDvlSV?= =?utf-8?q?H5Xcl4JcVpqjRPzmywu4qFj6t8InrGolVZudLUYb5os9sEX6l8rSL8Bnc6a6zN0eV?= =?utf-8?q?pQkn6XsTSLDt9syT8cEW+x3k83DloICeX+mXW4p4CdpdB6RQuqX8g7cP4JQlDaWDR?= =?utf-8?q?NrIyHHYzJQ3cRXtA7lSqG8O+Bc7qqwfHmDtTT7rWr0gKc1YPwxot8EnY0dtIVNXsb?= =?utf-8?q?BmMAnQI1nUFx3JLEvhVlU0puBgV/L4u5ggcCZ4qkMp54kiv+ZFXJLDD7LmwFv9yp9?= =?utf-8?q?YpsSkOXod1Qo4Ia1vaoIgBDQ1WLxwDRkxmlStIPYsdBagXL1RR8Y9m2vvOI9YUtU8?= =?utf-8?q?4sdyTU/MSSfuC0KbMJaW6zG8se3PIH/Viv/gqOiMpAfpDutB/qGhd048fw9O1kApH?= =?utf-8?q?0LAqg0bemd/GGGR/0DUTRCj5gzoTLqXTMUXKGpRcV4OtqWGnVnhI+N/bt8022+Ljd?= =?utf-8?q?W/BXjXeiP4OIB4cA2tREaaNbaMG9lA8nOrpugeN0+bVar9SexaW9jyJcc6GcHd4Kd?= =?utf-8?q?kmH2UKnPU+pP?= X-OriginatorOrg: wesion.com X-MS-Exchange-CrossTenant-Network-Message-Id: 59c6b97e-811f-402e-49e3-08dcd1457694 X-MS-Exchange-CrossTenant-AuthSource: TYZPR03MB7001.apcprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Sep 2024 03:05:45.2966 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 2dc3bd76-7ac2-4780-a5b7-6c6cc6b5af9b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: UJKu7YQMST++oeBNxrq1ODwW8RZaqVPAZo2Z0AJo596Fh13DcmOHKgpQD3JlpcKfhdPxIf7osZLD8IpoPaNipw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEZPR03MB8442 Providing the random seed to firmware was tied to the fact that the device has a valid OTP, which worked for some Apple chips. However, it turns out the BCM43752 device also needs the random seed in order to get firmware running. Suspect it is simply tied to the firmware branch used for the device. Introducing a mechanism to allow setting it for a device through the device table. Co-developed-by: Ondrej Jirman Signed-off-by: Ondrej Jirman Co-developed-by: Arend van Spriel Signed-off-by: Arend van Spriel Signed-off-by: Jacobe Zang Reviewed-by: Sebastian Reichel Tested-by: Sebastian Reichel # On RK3588 EVB1 Acked-by: Arend van Spriel --- .../wireless/broadcom/brcm80211/brcmfmac/pcie.c | 52 ++++++++++++++++++---- .../broadcom/brcm80211/include/brcm_hw_ids.h | 2 + 2 files changed, 46 insertions(+), 8 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c index 190e8990618c5..c0fdaa4dceda4 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c @@ -66,6 +66,7 @@ BRCMF_FW_DEF(4365C, "brcmfmac4365c-pcie"); BRCMF_FW_DEF(4366B, "brcmfmac4366b-pcie"); BRCMF_FW_DEF(4366C, "brcmfmac4366c-pcie"); BRCMF_FW_DEF(4371, "brcmfmac4371-pcie"); +BRCMF_FW_CLM_DEF(43752, "brcmfmac43752-pcie"); BRCMF_FW_CLM_DEF(4377B3, "brcmfmac4377b3-pcie"); BRCMF_FW_CLM_DEF(4378B1, "brcmfmac4378b1-pcie"); BRCMF_FW_CLM_DEF(4378B3, "brcmfmac4378b3-pcie"); @@ -104,6 +105,7 @@ static const struct brcmf_firmware_mapping brcmf_pcie_fwnames[] = { BRCMF_FW_ENTRY(BRCM_CC_43664_CHIP_ID, 0xFFFFFFF0, 4366C), BRCMF_FW_ENTRY(BRCM_CC_43666_CHIP_ID, 0xFFFFFFF0, 4366C), BRCMF_FW_ENTRY(BRCM_CC_4371_CHIP_ID, 0xFFFFFFFF, 4371), + BRCMF_FW_ENTRY(BRCM_CC_43752_CHIP_ID, 0xFFFFFFFF, 43752), BRCMF_FW_ENTRY(BRCM_CC_4377_CHIP_ID, 0xFFFFFFFF, 4377B3), /* revision ID 4 */ BRCMF_FW_ENTRY(BRCM_CC_4378_CHIP_ID, 0x0000000F, 4378B1), /* revision ID 3 */ BRCMF_FW_ENTRY(BRCM_CC_4378_CHIP_ID, 0xFFFFFFE0, 4378B3), /* revision ID 5 */ @@ -353,6 +355,7 @@ struct brcmf_pciedev_info { u16 value); struct brcmf_mp_device *settings; struct brcmf_otp_params otp; + bool fwseed; #ifdef DEBUG u32 console_interval; bool console_active; @@ -1715,14 +1718,14 @@ static int brcmf_pcie_download_fw_nvram(struct brcmf_pciedev_info *devinfo, memcpy_toio(devinfo->tcm + address, nvram, nvram_len); brcmf_fw_nvram_free(nvram); - if (devinfo->otp.valid) { + if (devinfo->fwseed) { size_t rand_len = BRCMF_RANDOM_SEED_LENGTH; struct brcmf_random_seed_footer footer = { .length = cpu_to_le32(rand_len), .magic = cpu_to_le32(BRCMF_RANDOM_SEED_MAGIC), }; - /* Some Apple chips/firmwares expect a buffer of random + /* Some chips/firmwares expect a buffer of random * data to be present before NVRAM */ brcmf_dbg(PCIE, "Download random seed\n"); @@ -2394,6 +2397,37 @@ static void brcmf_pcie_debugfs_create(struct device *dev) } #endif +struct brcmf_pcie_drvdata { + enum brcmf_fwvendor vendor; + bool fw_seed; +}; + +enum { + BRCMF_DRVDATA_CYW, + BRCMF_DRVDATA_BCA, + BRCMF_DRVDATA_WCC, + BRCMF_DRVDATA_WCC_SEED, +}; + +static const struct brcmf_pcie_drvdata drvdata[] = { + [BRCMF_DRVDATA_CYW] = { + .vendor = BRCMF_FWVENDOR_CYW, + .fw_seed = false, + }, + [BRCMF_DRVDATA_BCA] = { + .vendor = BRCMF_FWVENDOR_BCA, + .fw_seed = false, + }, + [BRCMF_DRVDATA_WCC] = { + .vendor = BRCMF_FWVENDOR_WCC, + .fw_seed = false, + }, + [BRCMF_DRVDATA_WCC_SEED] = { + .vendor = BRCMF_FWVENDOR_WCC, + .fw_seed = true, + }, +}; + /* Forward declaration for pci_match_id() call */ static const struct pci_device_id brcmf_pcie_devid_table[]; @@ -2475,9 +2509,10 @@ brcmf_pcie_probe(struct pci_dev *pdev, const struct pci_device_id *id) bus->bus_priv.pcie = pcie_bus_dev; bus->ops = &brcmf_pcie_bus_ops; bus->proto_type = BRCMF_PROTO_MSGBUF; - bus->fwvid = id->driver_data; bus->chip = devinfo->coreid; bus->wowl_supported = pci_pme_capable(pdev, PCI_D3hot); + bus->fwvid = drvdata[id->driver_data].vendor; + devinfo->fwseed = drvdata[id->driver_data].fw_seed; dev_set_drvdata(&pdev->dev, bus); ret = brcmf_alloc(&devinfo->pdev->dev, devinfo->settings); @@ -2663,14 +2698,14 @@ static const struct dev_pm_ops brcmf_pciedrvr_pm = { BRCM_PCIE_VENDOR_ID_BROADCOM, (dev_id), \ PCI_ANY_ID, PCI_ANY_ID, \ PCI_CLASS_NETWORK_OTHER << 8, 0xffff00, \ - BRCMF_FWVENDOR_ ## fw_vend \ + BRCMF_DRVDATA_ ## fw_vend \ } #define BRCMF_PCIE_DEVICE_SUB(dev_id, subvend, subdev, fw_vend) \ { \ BRCM_PCIE_VENDOR_ID_BROADCOM, (dev_id), \ (subvend), (subdev), \ PCI_CLASS_NETWORK_OTHER << 8, 0xffff00, \ - BRCMF_FWVENDOR_ ## fw_vend \ + BRCMF_DRVDATA_ ## fw_vend \ } static const struct pci_device_id brcmf_pcie_devid_table[] = { @@ -2698,9 +2733,10 @@ static const struct pci_device_id brcmf_pcie_devid_table[] = { BRCMF_PCIE_DEVICE(BRCM_PCIE_4366_5G_DEVICE_ID, BCA), BRCMF_PCIE_DEVICE(BRCM_PCIE_4371_DEVICE_ID, WCC), BRCMF_PCIE_DEVICE(BRCM_PCIE_43596_DEVICE_ID, CYW), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4377_DEVICE_ID, WCC), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4378_DEVICE_ID, WCC), - BRCMF_PCIE_DEVICE(BRCM_PCIE_4387_DEVICE_ID, WCC), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4377_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4378_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_4387_DEVICE_ID, WCC_SEED), + BRCMF_PCIE_DEVICE(BRCM_PCIE_43752_DEVICE_ID, WCC_SEED), { /* end: all zeroes */ } }; diff --git a/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h b/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h index 44684bf1b9acc..c1e22c589d85e 100644 --- a/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h +++ b/drivers/net/wireless/broadcom/brcm80211/include/brcm_hw_ids.h @@ -52,6 +52,7 @@ #define BRCM_CC_43664_CHIP_ID 43664 #define BRCM_CC_43666_CHIP_ID 43666 #define BRCM_CC_4371_CHIP_ID 0x4371 +#define BRCM_CC_43752_CHIP_ID 43752 #define BRCM_CC_4377_CHIP_ID 0x4377 #define BRCM_CC_4378_CHIP_ID 0x4378 #define BRCM_CC_4387_CHIP_ID 0x4387 @@ -94,6 +95,7 @@ #define BRCM_PCIE_4366_5G_DEVICE_ID 0x43c5 #define BRCM_PCIE_4371_DEVICE_ID 0x440d #define BRCM_PCIE_43596_DEVICE_ID 0x4415 +#define BRCM_PCIE_43752_DEVICE_ID 0x449d #define BRCM_PCIE_4377_DEVICE_ID 0x4488 #define BRCM_PCIE_4378_DEVICE_ID 0x4425 #define BRCM_PCIE_4387_DEVICE_ID 0x4433