2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2007-2016 Solarflare Communications Inc.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are met:
10 * 1. Redistributions of source code must retain the above copyright notice,
11 * this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright notice,
13 * this list of conditions and the following disclaimer in the documentation
14 * and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
17 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
18 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
20 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
21 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
22 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
23 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
24 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
25 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
26 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 * The views and conclusions contained in the software and documentation are
29 * those of the authors and should not be interpreted as representing official
30 * policies, either expressed or implied, of the FreeBSD Project.
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
44 static __checkReturn efx_rc_t
52 static __checkReturn efx_rc_t
56 static __checkReturn efx_rc_t
59 __inout efx_filter_spec_t *spec,
60 __in boolean_t may_replace);
62 static __checkReturn efx_rc_t
65 __inout efx_filter_spec_t *spec);
67 static __checkReturn efx_rc_t
68 siena_filter_supported_filters(
70 __out_ecount(buffer_length) uint32_t *buffer,
71 __in size_t buffer_length,
72 __out size_t *list_lengthp);
74 #endif /* EFSYS_OPT_SIENA */
77 static const efx_filter_ops_t __efx_filter_siena_ops = {
78 siena_filter_init, /* efo_init */
79 siena_filter_fini, /* efo_fini */
80 siena_filter_restore, /* efo_restore */
81 siena_filter_add, /* efo_add */
82 siena_filter_delete, /* efo_delete */
83 siena_filter_supported_filters, /* efo_supported_filters */
84 NULL, /* efo_reconfigure */
86 #endif /* EFSYS_OPT_SIENA */
88 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD
89 static const efx_filter_ops_t __efx_filter_ef10_ops = {
90 ef10_filter_init, /* efo_init */
91 ef10_filter_fini, /* efo_fini */
92 ef10_filter_restore, /* efo_restore */
93 ef10_filter_add, /* efo_add */
94 ef10_filter_delete, /* efo_delete */
95 ef10_filter_supported_filters, /* efo_supported_filters */
96 ef10_filter_reconfigure, /* efo_reconfigure */
98 #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD */
100 __checkReturn efx_rc_t
103 __inout efx_filter_spec_t *spec)
105 const efx_filter_ops_t *efop = enp->en_efop;
107 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
108 EFSYS_ASSERT3P(spec, !=, NULL);
109 EFSYS_ASSERT3U(spec->efs_flags, &, EFX_FILTER_FLAG_RX);
111 return (efop->efo_add(enp, spec, B_FALSE));
114 __checkReturn efx_rc_t
117 __inout efx_filter_spec_t *spec)
119 const efx_filter_ops_t *efop = enp->en_efop;
121 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
122 EFSYS_ASSERT3P(spec, !=, NULL);
123 EFSYS_ASSERT3U(spec->efs_flags, &, EFX_FILTER_FLAG_RX);
125 return (efop->efo_delete(enp, spec));
128 __checkReturn efx_rc_t
134 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
136 if ((rc = enp->en_efop->efo_restore(enp)) != 0)
142 EFSYS_PROBE1(fail1, efx_rc_t, rc);
147 __checkReturn efx_rc_t
151 const efx_filter_ops_t *efop;
154 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
155 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
156 EFSYS_ASSERT(!(enp->en_mod_flags & EFX_MOD_FILTER));
158 switch (enp->en_family) {
160 case EFX_FAMILY_SIENA:
161 efop = &__efx_filter_siena_ops;
163 #endif /* EFSYS_OPT_SIENA */
165 #if EFSYS_OPT_HUNTINGTON
166 case EFX_FAMILY_HUNTINGTON:
167 efop = &__efx_filter_ef10_ops;
169 #endif /* EFSYS_OPT_HUNTINGTON */
171 #if EFSYS_OPT_MEDFORD
172 case EFX_FAMILY_MEDFORD:
173 efop = &__efx_filter_ef10_ops;
175 #endif /* EFSYS_OPT_MEDFORD */
183 if ((rc = efop->efo_init(enp)) != 0)
187 enp->en_mod_flags |= EFX_MOD_FILTER;
193 EFSYS_PROBE1(fail1, efx_rc_t, rc);
196 enp->en_mod_flags &= ~EFX_MOD_FILTER;
204 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
205 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
206 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
208 enp->en_efop->efo_fini(enp);
211 enp->en_mod_flags &= ~EFX_MOD_FILTER;
215 * Query the possible combinations of match flags which can be filtered on.
216 * These are returned as a list, of which each 32 bit element is a bitmask
217 * formed of EFX_FILTER_MATCH flags.
219 * The combinations are ordered in priority from highest to lowest.
221 * If the provided buffer is too short to hold the list, the call with fail with
222 * ENOSPC and *list_lengthp will be set to the buffer length required.
224 __checkReturn efx_rc_t
225 efx_filter_supported_filters(
227 __out_ecount(buffer_length) uint32_t *buffer,
228 __in size_t buffer_length,
229 __out size_t *list_lengthp)
233 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
234 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
235 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
236 EFSYS_ASSERT(enp->en_efop->efo_supported_filters != NULL);
238 if (buffer == NULL) {
243 rc = enp->en_efop->efo_supported_filters(enp, buffer, buffer_length,
253 EFSYS_PROBE1(fail1, efx_rc_t, rc);
258 __checkReturn efx_rc_t
259 efx_filter_reconfigure(
261 __in_ecount(6) uint8_t const *mac_addr,
262 __in boolean_t all_unicst,
263 __in boolean_t mulcst,
264 __in boolean_t all_mulcst,
265 __in boolean_t brdcst,
266 __in_ecount(6*count) uint8_t const *addrs,
271 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
272 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
273 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_FILTER);
275 if (enp->en_efop->efo_reconfigure != NULL) {
276 if ((rc = enp->en_efop->efo_reconfigure(enp, mac_addr,
286 EFSYS_PROBE1(fail1, efx_rc_t, rc);
292 efx_filter_spec_init_rx(
293 __out efx_filter_spec_t *spec,
294 __in efx_filter_priority_t priority,
295 __in efx_filter_flags_t flags,
298 EFSYS_ASSERT3P(spec, !=, NULL);
299 EFSYS_ASSERT3P(erp, !=, NULL);
300 EFSYS_ASSERT((flags & ~(EFX_FILTER_FLAG_RX_RSS |
301 EFX_FILTER_FLAG_RX_SCATTER)) == 0);
303 memset(spec, 0, sizeof (*spec));
304 spec->efs_priority = priority;
305 spec->efs_flags = EFX_FILTER_FLAG_RX | flags;
306 spec->efs_rss_context = EFX_RSS_CONTEXT_DEFAULT;
307 spec->efs_dmaq_id = (uint16_t)erp->er_index;
311 efx_filter_spec_init_tx(
312 __out efx_filter_spec_t *spec,
315 EFSYS_ASSERT3P(spec, !=, NULL);
316 EFSYS_ASSERT3P(etp, !=, NULL);
318 memset(spec, 0, sizeof (*spec));
319 spec->efs_priority = EFX_FILTER_PRI_REQUIRED;
320 spec->efs_flags = EFX_FILTER_FLAG_TX;
321 spec->efs_dmaq_id = (uint16_t)etp->et_index;
326 * Specify IPv4 host, transport protocol and port in a filter specification
328 __checkReturn efx_rc_t
329 efx_filter_spec_set_ipv4_local(
330 __inout efx_filter_spec_t *spec,
335 EFSYS_ASSERT3P(spec, !=, NULL);
337 spec->efs_match_flags |=
338 EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
339 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT;
340 spec->efs_ether_type = EFX_ETHER_TYPE_IPV4;
341 spec->efs_ip_proto = proto;
342 spec->efs_loc_host.eo_u32[0] = host;
343 spec->efs_loc_port = port;
348 * Specify IPv4 hosts, transport protocol and ports in a filter specification
350 __checkReturn efx_rc_t
351 efx_filter_spec_set_ipv4_full(
352 __inout efx_filter_spec_t *spec,
359 EFSYS_ASSERT3P(spec, !=, NULL);
361 spec->efs_match_flags |=
362 EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
363 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT |
364 EFX_FILTER_MATCH_REM_HOST | EFX_FILTER_MATCH_REM_PORT;
365 spec->efs_ether_type = EFX_ETHER_TYPE_IPV4;
366 spec->efs_ip_proto = proto;
367 spec->efs_loc_host.eo_u32[0] = lhost;
368 spec->efs_loc_port = lport;
369 spec->efs_rem_host.eo_u32[0] = rhost;
370 spec->efs_rem_port = rport;
375 * Specify local Ethernet address and/or VID in filter specification
377 __checkReturn efx_rc_t
378 efx_filter_spec_set_eth_local(
379 __inout efx_filter_spec_t *spec,
381 __in const uint8_t *addr)
383 EFSYS_ASSERT3P(spec, !=, NULL);
384 EFSYS_ASSERT3P(addr, !=, NULL);
386 if (vid == EFX_FILTER_SPEC_VID_UNSPEC && addr == NULL)
389 if (vid != EFX_FILTER_SPEC_VID_UNSPEC) {
390 spec->efs_match_flags |= EFX_FILTER_MATCH_OUTER_VID;
391 spec->efs_outer_vid = vid;
394 spec->efs_match_flags |= EFX_FILTER_MATCH_LOC_MAC;
395 memcpy(spec->efs_loc_mac, addr, EFX_MAC_ADDR_LEN);
401 efx_filter_spec_set_ether_type(
402 __inout efx_filter_spec_t *spec,
403 __in uint16_t ether_type)
405 EFSYS_ASSERT3P(spec, !=, NULL);
407 spec->efs_ether_type = ether_type;
408 spec->efs_match_flags |= EFX_FILTER_MATCH_ETHER_TYPE;
412 * Specify matching otherwise-unmatched unicast in a filter specification
414 __checkReturn efx_rc_t
415 efx_filter_spec_set_uc_def(
416 __inout efx_filter_spec_t *spec)
418 EFSYS_ASSERT3P(spec, !=, NULL);
420 spec->efs_match_flags |= EFX_FILTER_MATCH_UNKNOWN_UCAST_DST;
425 * Specify matching otherwise-unmatched multicast in a filter specification
427 __checkReturn efx_rc_t
428 efx_filter_spec_set_mc_def(
429 __inout efx_filter_spec_t *spec)
431 EFSYS_ASSERT3P(spec, !=, NULL);
433 spec->efs_match_flags |= EFX_FILTER_MATCH_UNKNOWN_MCAST_DST;
438 __checkReturn efx_rc_t
439 efx_filter_spec_set_encap_type(
440 __inout efx_filter_spec_t *spec,
441 __in efx_tunnel_protocol_t encap_type,
442 __in efx_filter_inner_frame_match_t inner_frame_match)
444 uint32_t match_flags = 0;
448 EFSYS_ASSERT3P(spec, !=, NULL);
450 switch (encap_type) {
451 case EFX_TUNNEL_PROTOCOL_VXLAN:
452 case EFX_TUNNEL_PROTOCOL_GENEVE:
453 ip_proto = EFX_IPPROTO_UDP;
455 case EFX_TUNNEL_PROTOCOL_NVGRE:
456 ip_proto = EFX_IPPROTO_GRE;
464 switch (inner_frame_match) {
465 case EFX_FILTER_INNER_FRAME_MATCH_UNKNOWN_MCAST_DST:
466 match_flags |= EFX_FILTER_MATCH_IFRM_UNKNOWN_MCAST_DST;
468 case EFX_FILTER_INNER_FRAME_MATCH_UNKNOWN_UCAST_DST:
469 match_flags |= EFX_FILTER_MATCH_IFRM_UNKNOWN_UCAST_DST;
471 case EFX_FILTER_INNER_FRAME_MATCH_OTHER:
472 /* This is for when specific inner frames are to be matched. */
480 spec->efs_encap_type = encap_type;
481 spec->efs_ip_proto = ip_proto;
482 spec->efs_match_flags |= (match_flags | EFX_FILTER_MATCH_IP_PROTO);
489 EFSYS_PROBE1(fail1, efx_rc_t, rc);
494 #if EFSYS_OPT_RX_SCALE
495 __checkReturn efx_rc_t
496 efx_filter_spec_set_rss_context(
497 __inout efx_filter_spec_t *spec,
498 __in uint32_t rss_context)
502 EFSYS_ASSERT3P(spec, !=, NULL);
504 /* The filter must have been created with EFX_FILTER_FLAG_RX_RSS. */
505 if ((spec->efs_flags & EFX_FILTER_FLAG_RX_RSS) == 0) {
510 spec->efs_rss_context = rss_context;
515 EFSYS_PROBE1(fail1, efx_rc_t, rc);
524 * "Fudge factors" - difference between programmed value and actual depth.
525 * Due to pipelined implementation we need to program H/W with a value that
526 * is larger than the hop limit we want.
528 #define FILTER_CTL_SRCH_FUDGE_WILD 3
529 #define FILTER_CTL_SRCH_FUDGE_FULL 1
532 * Hard maximum hop limit. Hardware will time-out beyond 200-something.
533 * We also need to avoid infinite loops in efx_filter_search() when the
536 #define FILTER_CTL_SRCH_MAX 200
538 static __checkReturn efx_rc_t
539 siena_filter_spec_from_gen_spec(
540 __out siena_filter_spec_t *sf_spec,
541 __in efx_filter_spec_t *gen_spec)
544 boolean_t is_full = B_FALSE;
546 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX)
547 EFSYS_ASSERT3U(gen_spec->efs_flags, ==, EFX_FILTER_FLAG_TX);
549 EFSYS_ASSERT3U(gen_spec->efs_flags, &, EFX_FILTER_FLAG_RX);
551 /* Siena only has one RSS context */
552 if ((gen_spec->efs_flags & EFX_FILTER_FLAG_RX_RSS) &&
553 gen_spec->efs_rss_context != EFX_RSS_CONTEXT_DEFAULT) {
558 sf_spec->sfs_flags = gen_spec->efs_flags;
559 sf_spec->sfs_dmaq_id = gen_spec->efs_dmaq_id;
561 switch (gen_spec->efs_match_flags) {
562 case EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
563 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT |
564 EFX_FILTER_MATCH_REM_HOST | EFX_FILTER_MATCH_REM_PORT:
567 case EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
568 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT: {
569 uint32_t rhost, host1, host2;
570 uint16_t rport, port1, port2;
572 if (gen_spec->efs_ether_type != EFX_ETHER_TYPE_IPV4) {
576 if (gen_spec->efs_loc_port == 0 ||
577 (is_full && gen_spec->efs_rem_port == 0)) {
581 switch (gen_spec->efs_ip_proto) {
582 case EFX_IPPROTO_TCP:
583 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX) {
584 sf_spec->sfs_type = (is_full ?
585 EFX_SIENA_FILTER_TX_TCP_FULL :
586 EFX_SIENA_FILTER_TX_TCP_WILD);
588 sf_spec->sfs_type = (is_full ?
589 EFX_SIENA_FILTER_RX_TCP_FULL :
590 EFX_SIENA_FILTER_RX_TCP_WILD);
593 case EFX_IPPROTO_UDP:
594 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX) {
595 sf_spec->sfs_type = (is_full ?
596 EFX_SIENA_FILTER_TX_UDP_FULL :
597 EFX_SIENA_FILTER_TX_UDP_WILD);
599 sf_spec->sfs_type = (is_full ?
600 EFX_SIENA_FILTER_RX_UDP_FULL :
601 EFX_SIENA_FILTER_RX_UDP_WILD);
609 * The filter is constructed in terms of source and destination,
610 * with the odd wrinkle that the ports are swapped in a UDP
611 * wildcard filter. We need to convert from local and remote
612 * addresses (zero for a wildcard).
614 rhost = is_full ? gen_spec->efs_rem_host.eo_u32[0] : 0;
615 rport = is_full ? gen_spec->efs_rem_port : 0;
616 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX) {
617 host1 = gen_spec->efs_loc_host.eo_u32[0];
621 host2 = gen_spec->efs_loc_host.eo_u32[0];
623 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX) {
624 if (sf_spec->sfs_type ==
625 EFX_SIENA_FILTER_TX_UDP_WILD) {
627 port2 = gen_spec->efs_loc_port;
629 port1 = gen_spec->efs_loc_port;
633 if (sf_spec->sfs_type ==
634 EFX_SIENA_FILTER_RX_UDP_WILD) {
635 port1 = gen_spec->efs_loc_port;
639 port2 = gen_spec->efs_loc_port;
642 sf_spec->sfs_dword[0] = (host1 << 16) | port1;
643 sf_spec->sfs_dword[1] = (port2 << 16) | (host1 >> 16);
644 sf_spec->sfs_dword[2] = host2;
648 case EFX_FILTER_MATCH_LOC_MAC | EFX_FILTER_MATCH_OUTER_VID:
651 case EFX_FILTER_MATCH_LOC_MAC:
652 if (gen_spec->efs_flags & EFX_FILTER_FLAG_TX) {
653 sf_spec->sfs_type = (is_full ?
654 EFX_SIENA_FILTER_TX_MAC_FULL :
655 EFX_SIENA_FILTER_TX_MAC_WILD);
657 sf_spec->sfs_type = (is_full ?
658 EFX_SIENA_FILTER_RX_MAC_FULL :
659 EFX_SIENA_FILTER_RX_MAC_WILD);
661 sf_spec->sfs_dword[0] = is_full ? gen_spec->efs_outer_vid : 0;
662 sf_spec->sfs_dword[1] =
663 gen_spec->efs_loc_mac[2] << 24 |
664 gen_spec->efs_loc_mac[3] << 16 |
665 gen_spec->efs_loc_mac[4] << 8 |
666 gen_spec->efs_loc_mac[5];
667 sf_spec->sfs_dword[2] =
668 gen_spec->efs_loc_mac[0] << 8 |
669 gen_spec->efs_loc_mac[1];
673 EFSYS_ASSERT(B_FALSE);
689 EFSYS_PROBE1(fail1, efx_rc_t, rc);
695 * The filter hash function is LFSR polynomial x^16 + x^3 + 1 of a 32-bit
696 * key derived from the n-tuple.
699 siena_filter_tbl_hash(
704 /* First 16 rounds */
705 tmp = 0x1fff ^ (uint16_t)(key >> 16);
706 tmp = tmp ^ tmp >> 3 ^ tmp >> 6;
707 tmp = tmp ^ tmp >> 9;
710 tmp = tmp ^ tmp << 13 ^ (uint16_t)(key & 0xffff);
711 tmp = tmp ^ tmp >> 3 ^ tmp >> 6;
712 tmp = tmp ^ tmp >> 9;
718 * To allow for hash collisions, filter search continues at these
719 * increments from the first possible entry selected by the hash.
722 siena_filter_tbl_increment(
725 return ((uint16_t)(key * 2 - 1));
728 static __checkReturn boolean_t
729 siena_filter_test_used(
730 __in siena_filter_tbl_t *sftp,
731 __in unsigned int index)
733 EFSYS_ASSERT3P(sftp->sft_bitmap, !=, NULL);
734 return ((sftp->sft_bitmap[index / 32] & (1 << (index % 32))) != 0);
738 siena_filter_set_used(
739 __in siena_filter_tbl_t *sftp,
740 __in unsigned int index)
742 EFSYS_ASSERT3P(sftp->sft_bitmap, !=, NULL);
743 sftp->sft_bitmap[index / 32] |= (1 << (index % 32));
748 siena_filter_clear_used(
749 __in siena_filter_tbl_t *sftp,
750 __in unsigned int index)
752 EFSYS_ASSERT3P(sftp->sft_bitmap, !=, NULL);
753 sftp->sft_bitmap[index / 32] &= ~(1 << (index % 32));
756 EFSYS_ASSERT3U(sftp->sft_used, >=, 0);
760 static siena_filter_tbl_id_t
762 __in siena_filter_type_t type)
764 siena_filter_tbl_id_t tbl_id;
767 case EFX_SIENA_FILTER_RX_TCP_FULL:
768 case EFX_SIENA_FILTER_RX_TCP_WILD:
769 case EFX_SIENA_FILTER_RX_UDP_FULL:
770 case EFX_SIENA_FILTER_RX_UDP_WILD:
771 tbl_id = EFX_SIENA_FILTER_TBL_RX_IP;
774 case EFX_SIENA_FILTER_RX_MAC_FULL:
775 case EFX_SIENA_FILTER_RX_MAC_WILD:
776 tbl_id = EFX_SIENA_FILTER_TBL_RX_MAC;
779 case EFX_SIENA_FILTER_TX_TCP_FULL:
780 case EFX_SIENA_FILTER_TX_TCP_WILD:
781 case EFX_SIENA_FILTER_TX_UDP_FULL:
782 case EFX_SIENA_FILTER_TX_UDP_WILD:
783 tbl_id = EFX_SIENA_FILTER_TBL_TX_IP;
786 case EFX_SIENA_FILTER_TX_MAC_FULL:
787 case EFX_SIENA_FILTER_TX_MAC_WILD:
788 tbl_id = EFX_SIENA_FILTER_TBL_TX_MAC;
792 EFSYS_ASSERT(B_FALSE);
793 tbl_id = EFX_SIENA_FILTER_NTBLS;
800 siena_filter_reset_search_depth(
801 __inout siena_filter_t *sfp,
802 __in siena_filter_tbl_id_t tbl_id)
805 case EFX_SIENA_FILTER_TBL_RX_IP:
806 sfp->sf_depth[EFX_SIENA_FILTER_RX_TCP_FULL] = 0;
807 sfp->sf_depth[EFX_SIENA_FILTER_RX_TCP_WILD] = 0;
808 sfp->sf_depth[EFX_SIENA_FILTER_RX_UDP_FULL] = 0;
809 sfp->sf_depth[EFX_SIENA_FILTER_RX_UDP_WILD] = 0;
812 case EFX_SIENA_FILTER_TBL_RX_MAC:
813 sfp->sf_depth[EFX_SIENA_FILTER_RX_MAC_FULL] = 0;
814 sfp->sf_depth[EFX_SIENA_FILTER_RX_MAC_WILD] = 0;
817 case EFX_SIENA_FILTER_TBL_TX_IP:
818 sfp->sf_depth[EFX_SIENA_FILTER_TX_TCP_FULL] = 0;
819 sfp->sf_depth[EFX_SIENA_FILTER_TX_TCP_WILD] = 0;
820 sfp->sf_depth[EFX_SIENA_FILTER_TX_UDP_FULL] = 0;
821 sfp->sf_depth[EFX_SIENA_FILTER_TX_UDP_WILD] = 0;
824 case EFX_SIENA_FILTER_TBL_TX_MAC:
825 sfp->sf_depth[EFX_SIENA_FILTER_TX_MAC_FULL] = 0;
826 sfp->sf_depth[EFX_SIENA_FILTER_TX_MAC_WILD] = 0;
830 EFSYS_ASSERT(B_FALSE);
836 siena_filter_push_rx_limits(
839 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
842 EFX_BAR_READO(enp, FR_AZ_RX_FILTER_CTL_REG, &oword);
844 EFX_SET_OWORD_FIELD(oword, FRF_AZ_TCP_FULL_SRCH_LIMIT,
845 sfp->sf_depth[EFX_SIENA_FILTER_RX_TCP_FULL] +
846 FILTER_CTL_SRCH_FUDGE_FULL);
847 EFX_SET_OWORD_FIELD(oword, FRF_AZ_TCP_WILD_SRCH_LIMIT,
848 sfp->sf_depth[EFX_SIENA_FILTER_RX_TCP_WILD] +
849 FILTER_CTL_SRCH_FUDGE_WILD);
850 EFX_SET_OWORD_FIELD(oword, FRF_AZ_UDP_FULL_SRCH_LIMIT,
851 sfp->sf_depth[EFX_SIENA_FILTER_RX_UDP_FULL] +
852 FILTER_CTL_SRCH_FUDGE_FULL);
853 EFX_SET_OWORD_FIELD(oword, FRF_AZ_UDP_WILD_SRCH_LIMIT,
854 sfp->sf_depth[EFX_SIENA_FILTER_RX_UDP_WILD] +
855 FILTER_CTL_SRCH_FUDGE_WILD);
857 if (sfp->sf_tbl[EFX_SIENA_FILTER_TBL_RX_MAC].sft_size) {
858 EFX_SET_OWORD_FIELD(oword,
859 FRF_CZ_ETHERNET_FULL_SEARCH_LIMIT,
860 sfp->sf_depth[EFX_SIENA_FILTER_RX_MAC_FULL] +
861 FILTER_CTL_SRCH_FUDGE_FULL);
862 EFX_SET_OWORD_FIELD(oword,
863 FRF_CZ_ETHERNET_WILDCARD_SEARCH_LIMIT,
864 sfp->sf_depth[EFX_SIENA_FILTER_RX_MAC_WILD] +
865 FILTER_CTL_SRCH_FUDGE_WILD);
868 EFX_BAR_WRITEO(enp, FR_AZ_RX_FILTER_CTL_REG, &oword);
872 siena_filter_push_tx_limits(
875 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
878 EFX_BAR_READO(enp, FR_AZ_TX_CFG_REG, &oword);
880 if (sfp->sf_tbl[EFX_SIENA_FILTER_TBL_TX_IP].sft_size != 0) {
881 EFX_SET_OWORD_FIELD(oword,
882 FRF_CZ_TX_TCPIP_FILTER_FULL_SEARCH_RANGE,
883 sfp->sf_depth[EFX_SIENA_FILTER_TX_TCP_FULL] +
884 FILTER_CTL_SRCH_FUDGE_FULL);
885 EFX_SET_OWORD_FIELD(oword,
886 FRF_CZ_TX_TCPIP_FILTER_WILD_SEARCH_RANGE,
887 sfp->sf_depth[EFX_SIENA_FILTER_TX_TCP_WILD] +
888 FILTER_CTL_SRCH_FUDGE_WILD);
889 EFX_SET_OWORD_FIELD(oword,
890 FRF_CZ_TX_UDPIP_FILTER_FULL_SEARCH_RANGE,
891 sfp->sf_depth[EFX_SIENA_FILTER_TX_UDP_FULL] +
892 FILTER_CTL_SRCH_FUDGE_FULL);
893 EFX_SET_OWORD_FIELD(oword,
894 FRF_CZ_TX_UDPIP_FILTER_WILD_SEARCH_RANGE,
895 sfp->sf_depth[EFX_SIENA_FILTER_TX_UDP_WILD] +
896 FILTER_CTL_SRCH_FUDGE_WILD);
899 if (sfp->sf_tbl[EFX_SIENA_FILTER_TBL_TX_MAC].sft_size != 0) {
901 oword, FRF_CZ_TX_ETH_FILTER_FULL_SEARCH_RANGE,
902 sfp->sf_depth[EFX_SIENA_FILTER_TX_MAC_FULL] +
903 FILTER_CTL_SRCH_FUDGE_FULL);
905 oword, FRF_CZ_TX_ETH_FILTER_WILD_SEARCH_RANGE,
906 sfp->sf_depth[EFX_SIENA_FILTER_TX_MAC_WILD] +
907 FILTER_CTL_SRCH_FUDGE_WILD);
910 EFX_BAR_WRITEO(enp, FR_AZ_TX_CFG_REG, &oword);
913 /* Build a filter entry and return its n-tuple key. */
914 static __checkReturn uint32_t
916 __out efx_oword_t *filter,
917 __in siena_filter_spec_t *spec)
921 uint8_t type = spec->sfs_type;
922 uint32_t flags = spec->sfs_flags;
924 switch (siena_filter_tbl_id(type)) {
925 case EFX_SIENA_FILTER_TBL_RX_IP: {
926 boolean_t is_udp = (type == EFX_SIENA_FILTER_RX_UDP_FULL ||
927 type == EFX_SIENA_FILTER_RX_UDP_WILD);
928 EFX_POPULATE_OWORD_7(*filter,
930 (flags & EFX_FILTER_FLAG_RX_RSS) ? 1 : 0,
932 (flags & EFX_FILTER_FLAG_RX_SCATTER) ? 1 : 0,
933 FRF_AZ_TCP_UDP, is_udp,
934 FRF_AZ_RXQ_ID, spec->sfs_dmaq_id,
935 EFX_DWORD_2, spec->sfs_dword[2],
936 EFX_DWORD_1, spec->sfs_dword[1],
937 EFX_DWORD_0, spec->sfs_dword[0]);
942 case EFX_SIENA_FILTER_TBL_RX_MAC: {
943 boolean_t is_wild = (type == EFX_SIENA_FILTER_RX_MAC_WILD);
944 EFX_POPULATE_OWORD_7(*filter,
946 (flags & EFX_FILTER_FLAG_RX_RSS) ? 1 : 0,
947 FRF_CZ_RMFT_SCATTER_EN,
948 (flags & EFX_FILTER_FLAG_RX_SCATTER) ? 1 : 0,
949 FRF_CZ_RMFT_RXQ_ID, spec->sfs_dmaq_id,
950 FRF_CZ_RMFT_WILDCARD_MATCH, is_wild,
951 FRF_CZ_RMFT_DEST_MAC_DW1, spec->sfs_dword[2],
952 FRF_CZ_RMFT_DEST_MAC_DW0, spec->sfs_dword[1],
953 FRF_CZ_RMFT_VLAN_ID, spec->sfs_dword[0]);
958 case EFX_SIENA_FILTER_TBL_TX_IP: {
959 boolean_t is_udp = (type == EFX_SIENA_FILTER_TX_UDP_FULL ||
960 type == EFX_SIENA_FILTER_TX_UDP_WILD);
961 EFX_POPULATE_OWORD_5(*filter,
962 FRF_CZ_TIFT_TCP_UDP, is_udp,
963 FRF_CZ_TIFT_TXQ_ID, spec->sfs_dmaq_id,
964 EFX_DWORD_2, spec->sfs_dword[2],
965 EFX_DWORD_1, spec->sfs_dword[1],
966 EFX_DWORD_0, spec->sfs_dword[0]);
967 dword3 = is_udp | spec->sfs_dmaq_id << 1;
971 case EFX_SIENA_FILTER_TBL_TX_MAC: {
972 boolean_t is_wild = (type == EFX_SIENA_FILTER_TX_MAC_WILD);
973 EFX_POPULATE_OWORD_5(*filter,
974 FRF_CZ_TMFT_TXQ_ID, spec->sfs_dmaq_id,
975 FRF_CZ_TMFT_WILDCARD_MATCH, is_wild,
976 FRF_CZ_TMFT_SRC_MAC_DW1, spec->sfs_dword[2],
977 FRF_CZ_TMFT_SRC_MAC_DW0, spec->sfs_dword[1],
978 FRF_CZ_TMFT_VLAN_ID, spec->sfs_dword[0]);
979 dword3 = is_wild | spec->sfs_dmaq_id << 1;
984 EFSYS_ASSERT(B_FALSE);
997 static __checkReturn efx_rc_t
998 siena_filter_push_entry(
999 __inout efx_nic_t *enp,
1000 __in siena_filter_type_t type,
1002 __in efx_oword_t *eop)
1007 case EFX_SIENA_FILTER_RX_TCP_FULL:
1008 case EFX_SIENA_FILTER_RX_TCP_WILD:
1009 case EFX_SIENA_FILTER_RX_UDP_FULL:
1010 case EFX_SIENA_FILTER_RX_UDP_WILD:
1011 EFX_BAR_TBL_WRITEO(enp, FR_AZ_RX_FILTER_TBL0, index,
1015 case EFX_SIENA_FILTER_RX_MAC_FULL:
1016 case EFX_SIENA_FILTER_RX_MAC_WILD:
1017 EFX_BAR_TBL_WRITEO(enp, FR_CZ_RX_MAC_FILTER_TBL0, index,
1021 case EFX_SIENA_FILTER_TX_TCP_FULL:
1022 case EFX_SIENA_FILTER_TX_TCP_WILD:
1023 case EFX_SIENA_FILTER_TX_UDP_FULL:
1024 case EFX_SIENA_FILTER_TX_UDP_WILD:
1025 EFX_BAR_TBL_WRITEO(enp, FR_CZ_TX_FILTER_TBL0, index,
1029 case EFX_SIENA_FILTER_TX_MAC_FULL:
1030 case EFX_SIENA_FILTER_TX_MAC_WILD:
1031 EFX_BAR_TBL_WRITEO(enp, FR_CZ_TX_MAC_FILTER_TBL0, index,
1036 EFSYS_ASSERT(B_FALSE);
1047 static __checkReturn boolean_t
1049 __in const siena_filter_spec_t *left,
1050 __in const siena_filter_spec_t *right)
1052 siena_filter_tbl_id_t tbl_id;
1054 tbl_id = siena_filter_tbl_id(left->sfs_type);
1057 if (left->sfs_type != right->sfs_type)
1060 if (memcmp(left->sfs_dword, right->sfs_dword,
1061 sizeof (left->sfs_dword)))
1064 if ((tbl_id == EFX_SIENA_FILTER_TBL_TX_IP ||
1065 tbl_id == EFX_SIENA_FILTER_TBL_TX_MAC) &&
1066 left->sfs_dmaq_id != right->sfs_dmaq_id)
1072 static __checkReturn efx_rc_t
1073 siena_filter_search(
1074 __in siena_filter_tbl_t *sftp,
1075 __in siena_filter_spec_t *spec,
1077 __in boolean_t for_insert,
1078 __out int *filter_index,
1079 __out unsigned int *depth_required)
1081 unsigned int hash, incr, filter_idx, depth;
1083 hash = siena_filter_tbl_hash(key);
1084 incr = siena_filter_tbl_increment(key);
1086 filter_idx = hash & (sftp->sft_size - 1);
1091 * Return success if entry is used and matches this spec
1092 * or entry is unused and we are trying to insert.
1094 if (siena_filter_test_used(sftp, filter_idx) ?
1095 siena_filter_equal(spec,
1096 &sftp->sft_spec[filter_idx]) :
1098 *filter_index = filter_idx;
1099 *depth_required = depth;
1103 /* Return failure if we reached the maximum search depth */
1104 if (depth == FILTER_CTL_SRCH_MAX)
1105 return (for_insert ? EBUSY : ENOENT);
1107 filter_idx = (filter_idx + incr) & (sftp->sft_size - 1);
1113 siena_filter_clear_entry(
1114 __in efx_nic_t *enp,
1115 __in siena_filter_tbl_t *sftp,
1120 if (siena_filter_test_used(sftp, index)) {
1121 siena_filter_clear_used(sftp, index);
1123 EFX_ZERO_OWORD(filter);
1124 siena_filter_push_entry(enp,
1125 sftp->sft_spec[index].sfs_type,
1128 memset(&sftp->sft_spec[index],
1129 0, sizeof (sftp->sft_spec[0]));
1134 siena_filter_tbl_clear(
1135 __in efx_nic_t *enp,
1136 __in siena_filter_tbl_id_t tbl_id)
1138 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
1139 siena_filter_tbl_t *sftp = &sfp->sf_tbl[tbl_id];
1141 efsys_lock_state_t state;
1143 EFSYS_LOCK(enp->en_eslp, state);
1145 for (index = 0; index < sftp->sft_size; ++index) {
1146 siena_filter_clear_entry(enp, sftp, index);
1149 if (sftp->sft_used == 0)
1150 siena_filter_reset_search_depth(sfp, tbl_id);
1152 EFSYS_UNLOCK(enp->en_eslp, state);
1155 static __checkReturn efx_rc_t
1157 __in efx_nic_t *enp)
1159 siena_filter_t *sfp;
1160 siena_filter_tbl_t *sftp;
1164 EFSYS_KMEM_ALLOC(enp->en_esip, sizeof (siena_filter_t), sfp);
1171 enp->en_filter.ef_siena_filter = sfp;
1173 switch (enp->en_family) {
1174 case EFX_FAMILY_SIENA:
1175 sftp = &sfp->sf_tbl[EFX_SIENA_FILTER_TBL_RX_IP];
1176 sftp->sft_size = FR_AZ_RX_FILTER_TBL0_ROWS;
1178 sftp = &sfp->sf_tbl[EFX_SIENA_FILTER_TBL_RX_MAC];
1179 sftp->sft_size = FR_CZ_RX_MAC_FILTER_TBL0_ROWS;
1181 sftp = &sfp->sf_tbl[EFX_SIENA_FILTER_TBL_TX_IP];
1182 sftp->sft_size = FR_CZ_TX_FILTER_TBL0_ROWS;
1184 sftp = &sfp->sf_tbl[EFX_SIENA_FILTER_TBL_TX_MAC];
1185 sftp->sft_size = FR_CZ_TX_MAC_FILTER_TBL0_ROWS;
1193 for (tbl_id = 0; tbl_id < EFX_SIENA_FILTER_NTBLS; tbl_id++) {
1194 unsigned int bitmap_size;
1196 sftp = &sfp->sf_tbl[tbl_id];
1197 if (sftp->sft_size == 0)
1200 EFX_STATIC_ASSERT(sizeof (sftp->sft_bitmap[0]) ==
1203 (sftp->sft_size + (sizeof (uint32_t) * 8) - 1) / 8;
1205 EFSYS_KMEM_ALLOC(enp->en_esip, bitmap_size, sftp->sft_bitmap);
1206 if (!sftp->sft_bitmap) {
1211 EFSYS_KMEM_ALLOC(enp->en_esip,
1212 sftp->sft_size * sizeof (*sftp->sft_spec),
1214 if (!sftp->sft_spec) {
1218 memset(sftp->sft_spec, 0,
1219 sftp->sft_size * sizeof (*sftp->sft_spec));
1232 siena_filter_fini(enp);
1235 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1241 __in efx_nic_t *enp)
1243 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
1244 siena_filter_tbl_id_t tbl_id;
1246 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
1247 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
1252 for (tbl_id = 0; tbl_id < EFX_SIENA_FILTER_NTBLS; tbl_id++) {
1253 siena_filter_tbl_t *sftp = &sfp->sf_tbl[tbl_id];
1254 unsigned int bitmap_size;
1256 EFX_STATIC_ASSERT(sizeof (sftp->sft_bitmap[0]) ==
1259 (sftp->sft_size + (sizeof (uint32_t) * 8) - 1) / 8;
1261 if (sftp->sft_bitmap != NULL) {
1262 EFSYS_KMEM_FREE(enp->en_esip, bitmap_size,
1264 sftp->sft_bitmap = NULL;
1267 if (sftp->sft_spec != NULL) {
1268 EFSYS_KMEM_FREE(enp->en_esip, sftp->sft_size *
1269 sizeof (*sftp->sft_spec), sftp->sft_spec);
1270 sftp->sft_spec = NULL;
1274 EFSYS_KMEM_FREE(enp->en_esip, sizeof (siena_filter_t),
1275 enp->en_filter.ef_siena_filter);
1278 /* Restore filter state after a reset */
1279 static __checkReturn efx_rc_t
1280 siena_filter_restore(
1281 __in efx_nic_t *enp)
1283 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
1284 siena_filter_tbl_id_t tbl_id;
1285 siena_filter_tbl_t *sftp;
1286 siena_filter_spec_t *spec;
1289 efsys_lock_state_t state;
1293 EFSYS_LOCK(enp->en_eslp, state);
1295 for (tbl_id = 0; tbl_id < EFX_SIENA_FILTER_NTBLS; tbl_id++) {
1296 sftp = &sfp->sf_tbl[tbl_id];
1297 for (filter_idx = 0;
1298 filter_idx < sftp->sft_size;
1300 if (!siena_filter_test_used(sftp, filter_idx))
1303 spec = &sftp->sft_spec[filter_idx];
1304 if ((key = siena_filter_build(&filter, spec)) == 0) {
1308 if ((rc = siena_filter_push_entry(enp,
1309 spec->sfs_type, filter_idx, &filter)) != 0)
1314 siena_filter_push_rx_limits(enp);
1315 siena_filter_push_tx_limits(enp);
1317 EFSYS_UNLOCK(enp->en_eslp, state);
1325 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1327 EFSYS_UNLOCK(enp->en_eslp, state);
1332 static __checkReturn efx_rc_t
1334 __in efx_nic_t *enp,
1335 __inout efx_filter_spec_t *spec,
1336 __in boolean_t may_replace)
1339 siena_filter_spec_t sf_spec;
1340 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
1341 siena_filter_tbl_id_t tbl_id;
1342 siena_filter_tbl_t *sftp;
1343 siena_filter_spec_t *saved_sf_spec;
1347 efsys_lock_state_t state;
1351 EFSYS_ASSERT3P(spec, !=, NULL);
1353 if ((rc = siena_filter_spec_from_gen_spec(&sf_spec, spec)) != 0)
1356 tbl_id = siena_filter_tbl_id(sf_spec.sfs_type);
1357 sftp = &sfp->sf_tbl[tbl_id];
1359 if (sftp->sft_size == 0) {
1364 key = siena_filter_build(&filter, &sf_spec);
1366 EFSYS_LOCK(enp->en_eslp, state);
1368 rc = siena_filter_search(sftp, &sf_spec, key, B_TRUE,
1369 &filter_idx, &depth);
1373 EFSYS_ASSERT3U(filter_idx, <, sftp->sft_size);
1374 saved_sf_spec = &sftp->sft_spec[filter_idx];
1376 if (siena_filter_test_used(sftp, filter_idx)) {
1377 if (may_replace == B_FALSE) {
1382 siena_filter_set_used(sftp, filter_idx);
1383 *saved_sf_spec = sf_spec;
1385 if (sfp->sf_depth[sf_spec.sfs_type] < depth) {
1386 sfp->sf_depth[sf_spec.sfs_type] = depth;
1387 if (tbl_id == EFX_SIENA_FILTER_TBL_TX_IP ||
1388 tbl_id == EFX_SIENA_FILTER_TBL_TX_MAC)
1389 siena_filter_push_tx_limits(enp);
1391 siena_filter_push_rx_limits(enp);
1394 siena_filter_push_entry(enp, sf_spec.sfs_type,
1395 filter_idx, &filter);
1397 EFSYS_UNLOCK(enp->en_eslp, state);
1404 EFSYS_UNLOCK(enp->en_eslp, state);
1411 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1415 static __checkReturn efx_rc_t
1416 siena_filter_delete(
1417 __in efx_nic_t *enp,
1418 __inout efx_filter_spec_t *spec)
1421 siena_filter_spec_t sf_spec;
1422 siena_filter_t *sfp = enp->en_filter.ef_siena_filter;
1423 siena_filter_tbl_id_t tbl_id;
1424 siena_filter_tbl_t *sftp;
1428 efsys_lock_state_t state;
1431 EFSYS_ASSERT3P(spec, !=, NULL);
1433 if ((rc = siena_filter_spec_from_gen_spec(&sf_spec, spec)) != 0)
1436 tbl_id = siena_filter_tbl_id(sf_spec.sfs_type);
1437 sftp = &sfp->sf_tbl[tbl_id];
1439 key = siena_filter_build(&filter, &sf_spec);
1441 EFSYS_LOCK(enp->en_eslp, state);
1443 rc = siena_filter_search(sftp, &sf_spec, key, B_FALSE,
1444 &filter_idx, &depth);
1448 siena_filter_clear_entry(enp, sftp, filter_idx);
1449 if (sftp->sft_used == 0)
1450 siena_filter_reset_search_depth(sfp, tbl_id);
1452 EFSYS_UNLOCK(enp->en_eslp, state);
1456 EFSYS_UNLOCK(enp->en_eslp, state);
1460 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1464 #define SIENA_MAX_SUPPORTED_MATCHES 4
1466 static __checkReturn efx_rc_t
1467 siena_filter_supported_filters(
1468 __in efx_nic_t *enp,
1469 __out_ecount(buffer_length) uint32_t *buffer,
1470 __in size_t buffer_length,
1471 __out size_t *list_lengthp)
1474 uint32_t rx_matches[SIENA_MAX_SUPPORTED_MATCHES];
1478 rx_matches[index++] =
1479 EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
1480 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT |
1481 EFX_FILTER_MATCH_REM_HOST | EFX_FILTER_MATCH_REM_PORT;
1483 rx_matches[index++] =
1484 EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_IP_PROTO |
1485 EFX_FILTER_MATCH_LOC_HOST | EFX_FILTER_MATCH_LOC_PORT;
1487 if (enp->en_features & EFX_FEATURE_MAC_HEADER_FILTERS) {
1488 rx_matches[index++] =
1489 EFX_FILTER_MATCH_OUTER_VID | EFX_FILTER_MATCH_LOC_MAC;
1491 rx_matches[index++] = EFX_FILTER_MATCH_LOC_MAC;
1494 EFSYS_ASSERT3U(index, <=, SIENA_MAX_SUPPORTED_MATCHES);
1495 list_length = index;
1497 *list_lengthp = list_length;
1499 if (buffer_length < list_length) {
1504 memcpy(buffer, rx_matches, list_length * sizeof (rx_matches[0]));
1509 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1514 #undef MAX_SUPPORTED
1516 #endif /* EFSYS_OPT_SIENA */
1518 #endif /* EFSYS_OPT_FILTER */