diff options
author | Cindy H Kao <evans@localhost.localdomain> | 2009-08-18 22:27:18 -0400 |
---|---|---|
committer | Inaky Perez-Gonzalez <inaky@linux.intel.com> | 2009-10-19 02:55:47 -0400 |
commit | 8d8fe198c6a756ae96617548af4776e7a86c0d3e (patch) | |
tree | a3ff223523a46a5d4efd3bdea705622a766601d4 /drivers/net/wimax | |
parent | 77e1251a7cc64c1e483a31c41c139fdf8121e75e (diff) |
wimax/i2400m: don't write to memory allocated by request_firmware()
In kernel 2.6.31, the firmware requested to ram could be marked
with read only attribute, and we can't write any thing directly
to the memory when setting up the last JUMP brh cmd.
Changed so that the scratch buffer is used.
Signed-off-by: Cindy H Kao <cindy.h.kao@intel.com>
Signed-off-by: Inaky Perez-Gonzalez <inaky@linux.intel.com>
Diffstat (limited to 'drivers/net/wimax')
-rw-r--r-- | drivers/net/wimax/i2400m/fw.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/drivers/net/wimax/i2400m/fw.c b/drivers/net/wimax/i2400m/fw.c index 0018cdbd0156..92d4d605dc2d 100644 --- a/drivers/net/wimax/i2400m/fw.c +++ b/drivers/net/wimax/i2400m/fw.c | |||
@@ -533,6 +533,10 @@ int i2400m_dnload_finalize(struct i2400m *i2400m, | |||
533 | struct i2400m_bootrom_header jump_ack; | 533 | struct i2400m_bootrom_header jump_ack; |
534 | d_printf(1, dev, "unsecure boot, jumping to 0x%08x\n", | 534 | d_printf(1, dev, "unsecure boot, jumping to 0x%08x\n", |
535 | le32_to_cpu(cmd->target_addr)); | 535 | le32_to_cpu(cmd->target_addr)); |
536 | cmd_buf = i2400m->bm_cmd_buf; | ||
537 | memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd)); | ||
538 | cmd = &cmd_buf->cmd; | ||
539 | /* now cmd points to the actual bootrom_header in cmd_buf */ | ||
536 | i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP); | 540 | i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP); |
537 | cmd->data_size = 0; | 541 | cmd->data_size = 0; |
538 | ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd), | 542 | ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd), |