2 * Copyright (c) 2008-2015 Solarflare Communications Inc.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
16 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
17 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
18 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
19 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
20 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
21 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
22 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
23 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
24 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 * The views and conclusions contained in the software and documentation are
27 * those of the authors and should not be interpreted as representing official
28 * policies, either expressed or implied, of the FreeBSD Project.
31 #include <sys/cdefs.h>
32 __FBSDID("$FreeBSD$");
40 * There are three versions of the MCDI interface:
41 * - MCDIv0: Siena BootROM. Transport uses MCDIv1 headers.
42 * - MCDIv1: Siena firmware and Huntington BootROM.
43 * - MCDIv2: EF10 firmware (Huntington/Medford) and Medford BootROM.
44 * Transport uses MCDIv2 headers.
46 * MCDIv2 Header NOT_EPOCH flag
47 * ----------------------------
48 * A new epoch begins at initial startup or after an MC reboot, and defines when
49 * the MC should reject stale MCDI requests.
51 * The first MCDI request sent by the host should contain NOT_EPOCH=0, and all
52 * subsequent requests (until the next MC reboot) should contain NOT_EPOCH=1.
54 * After rebooting the MC will fail all requests with NOT_EPOCH=1 by writing a
55 * response with ERROR=1 and DATALEN=0 until a request is seen with NOT_EPOCH=0.
62 static efx_mcdi_ops_t __efx_mcdi_siena_ops = {
63 siena_mcdi_init, /* emco_init */
64 siena_mcdi_send_request, /* emco_send_request */
65 siena_mcdi_poll_reboot, /* emco_poll_reboot */
66 siena_mcdi_poll_response, /* emco_poll_response */
67 siena_mcdi_read_response, /* emco_read_response */
68 siena_mcdi_fini, /* emco_fini */
69 siena_mcdi_feature_supported, /* emco_feature_supported */
72 #endif /* EFSYS_OPT_SIENA */
74 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD
76 static efx_mcdi_ops_t __efx_mcdi_ef10_ops = {
77 ef10_mcdi_init, /* emco_init */
78 ef10_mcdi_send_request, /* emco_send_request */
79 ef10_mcdi_poll_reboot, /* emco_poll_reboot */
80 ef10_mcdi_poll_response, /* emco_poll_response */
81 ef10_mcdi_read_response, /* emco_read_response */
82 ef10_mcdi_fini, /* emco_fini */
83 ef10_mcdi_feature_supported, /* emco_feature_supported */
86 #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD */
90 __checkReturn efx_rc_t
93 __in const efx_mcdi_transport_t *emtp)
95 efx_mcdi_ops_t *emcop;
98 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
99 EFSYS_ASSERT3U(enp->en_mod_flags, ==, 0);
101 switch (enp->en_family) {
103 case EFX_FAMILY_SIENA:
104 emcop = (efx_mcdi_ops_t *)&__efx_mcdi_siena_ops;
106 #endif /* EFSYS_OPT_SIENA */
108 #if EFSYS_OPT_HUNTINGTON
109 case EFX_FAMILY_HUNTINGTON:
110 emcop = (efx_mcdi_ops_t *)&__efx_mcdi_ef10_ops;
112 #endif /* EFSYS_OPT_HUNTINGTON */
114 #if EFSYS_OPT_MEDFORD
115 case EFX_FAMILY_MEDFORD:
116 emcop = (efx_mcdi_ops_t *)&__efx_mcdi_ef10_ops;
118 #endif /* EFSYS_OPT_MEDFORD */
126 if (enp->en_features & EFX_FEATURE_MCDI_DMA) {
127 /* MCDI requires a DMA buffer in host memory */
128 if ((emtp == NULL) || (emtp->emt_dma_mem) == NULL) {
133 enp->en_mcdi.em_emtp = emtp;
135 if (emcop != NULL && emcop->emco_init != NULL) {
136 if ((rc = emcop->emco_init(enp, emtp)) != 0)
140 enp->en_mcdi.em_emcop = emcop;
141 enp->en_mod_flags |= EFX_MOD_MCDI;
150 EFSYS_PROBE1(fail1, efx_rc_t, rc);
152 enp->en_mcdi.em_emcop = NULL;
153 enp->en_mcdi.em_emtp = NULL;
154 enp->en_mod_flags &= ~EFX_MOD_MCDI;
163 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
164 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
166 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
167 EFSYS_ASSERT3U(enp->en_mod_flags, ==, EFX_MOD_MCDI);
169 if (emcop != NULL && emcop->emco_fini != NULL)
170 emcop->emco_fini(enp);
173 emip->emi_aborted = 0;
175 enp->en_mcdi.em_emcop = NULL;
176 enp->en_mod_flags &= ~EFX_MOD_MCDI;
183 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
186 /* Start a new epoch (allow fresh MCDI requests to succeed) */
187 EFSYS_LOCK(enp->en_eslp, state);
188 emip->emi_new_epoch = B_TRUE;
189 EFSYS_UNLOCK(enp->en_eslp, state);
193 efx_mcdi_send_request(
200 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
202 emcop->emco_send_request(enp, hdrp, hdr_len, sdup, sdu_len);
206 efx_mcdi_poll_reboot(
209 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
212 rc = emcop->emco_poll_reboot(enp);
217 efx_mcdi_poll_response(
220 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
223 available = emcop->emco_poll_response(enp);
228 efx_mcdi_read_response(
234 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
236 emcop->emco_read_response(enp, bufferp, offset, length);
240 efx_mcdi_request_start(
242 __in efx_mcdi_req_t *emrp,
243 __in boolean_t ev_cpl)
245 #if EFSYS_OPT_MCDI_LOGGING
246 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
248 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
251 unsigned int max_version;
257 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
258 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
259 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
262 * efx_mcdi_request_start() is naturally serialised against both
263 * efx_mcdi_request_poll() and efx_mcdi_ev_cpl()/efx_mcdi_ev_death(),
264 * by virtue of there only being one outstanding MCDI request.
265 * Unfortunately, upper layers may also call efx_mcdi_request_abort()
266 * at any time, to timeout a pending mcdi request, That request may
267 * then subsequently complete, meaning efx_mcdi_ev_cpl() or
268 * efx_mcdi_ev_death() may end up running in parallel with
269 * efx_mcdi_request_start(). This race is handled by ensuring that
270 * %emi_pending_req, %emi_ev_cpl and %emi_seq are protected by the
273 EFSYS_LOCK(enp->en_eslp, state);
274 EFSYS_ASSERT(emip->emi_pending_req == NULL);
275 emip->emi_pending_req = emrp;
276 emip->emi_ev_cpl = ev_cpl;
277 emip->emi_poll_cnt = 0;
278 seq = emip->emi_seq++ & EFX_MASK32(MCDI_HEADER_SEQ);
279 new_epoch = emip->emi_new_epoch;
280 max_version = emip->emi_max_version;
281 EFSYS_UNLOCK(enp->en_eslp, state);
285 xflags |= MCDI_HEADER_XFLAGS_EVREQ;
288 * Huntington firmware supports MCDIv2, but the Huntington BootROM only
289 * supports MCDIv1. Use MCDIv1 headers for MCDIv1 commands where
290 * possible to support this.
292 if ((max_version >= 2) &&
293 ((emrp->emr_cmd > MC_CMD_CMD_SPACE_ESCAPE_7) ||
294 (emrp->emr_in_length > MCDI_CTL_SDU_LEN_MAX_V1))) {
295 /* Construct MCDI v2 header */
296 hdr_len = sizeof (hdr);
297 EFX_POPULATE_DWORD_8(hdr[0],
298 MCDI_HEADER_CODE, MC_CMD_V2_EXTN,
299 MCDI_HEADER_RESYNC, 1,
300 MCDI_HEADER_DATALEN, 0,
301 MCDI_HEADER_SEQ, seq,
302 MCDI_HEADER_NOT_EPOCH, new_epoch ? 0 : 1,
303 MCDI_HEADER_ERROR, 0,
304 MCDI_HEADER_RESPONSE, 0,
305 MCDI_HEADER_XFLAGS, xflags);
307 EFX_POPULATE_DWORD_2(hdr[1],
308 MC_CMD_V2_EXTN_IN_EXTENDED_CMD, emrp->emr_cmd,
309 MC_CMD_V2_EXTN_IN_ACTUAL_LEN, emrp->emr_in_length);
311 /* Construct MCDI v1 header */
312 hdr_len = sizeof (hdr[0]);
313 EFX_POPULATE_DWORD_8(hdr[0],
314 MCDI_HEADER_CODE, emrp->emr_cmd,
315 MCDI_HEADER_RESYNC, 1,
316 MCDI_HEADER_DATALEN, emrp->emr_in_length,
317 MCDI_HEADER_SEQ, seq,
318 MCDI_HEADER_NOT_EPOCH, new_epoch ? 0 : 1,
319 MCDI_HEADER_ERROR, 0,
320 MCDI_HEADER_RESPONSE, 0,
321 MCDI_HEADER_XFLAGS, xflags);
324 #if EFSYS_OPT_MCDI_LOGGING
325 if (emtp->emt_logger != NULL) {
326 emtp->emt_logger(emtp->emt_context, EFX_LOG_MCDI_REQUEST,
328 emrp->emr_in_buf, emrp->emr_in_length);
330 #endif /* EFSYS_OPT_MCDI_LOGGING */
332 efx_mcdi_send_request(enp, &hdr[0], hdr_len,
333 emrp->emr_in_buf, emrp->emr_in_length);
338 efx_mcdi_read_response_header(
340 __inout efx_mcdi_req_t *emrp)
342 #if EFSYS_OPT_MCDI_LOGGING
343 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
344 #endif /* EFSYS_OPT_MCDI_LOGGING */
345 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
347 unsigned int hdr_len;
348 unsigned int data_len;
354 EFSYS_ASSERT(emrp != NULL);
356 efx_mcdi_read_response(enp, &hdr[0], 0, sizeof (hdr[0]));
357 hdr_len = sizeof (hdr[0]);
359 cmd = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_CODE);
360 seq = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_SEQ);
361 error = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_ERROR);
363 if (cmd != MC_CMD_V2_EXTN) {
364 data_len = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_DATALEN);
366 efx_mcdi_read_response(enp, &hdr[1], hdr_len, sizeof (hdr[1]));
367 hdr_len += sizeof (hdr[1]);
369 cmd = EFX_DWORD_FIELD(hdr[1], MC_CMD_V2_EXTN_IN_EXTENDED_CMD);
371 EFX_DWORD_FIELD(hdr[1], MC_CMD_V2_EXTN_IN_ACTUAL_LEN);
374 if (error && (data_len == 0)) {
375 /* The MC has rebooted since the request was sent. */
376 EFSYS_SPIN(EFX_MCDI_STATUS_SLEEP_US);
377 efx_mcdi_poll_reboot(enp);
381 if ((cmd != emrp->emr_cmd) ||
382 (seq != ((emip->emi_seq - 1) & EFX_MASK32(MCDI_HEADER_SEQ)))) {
383 /* Response is for a different request */
389 unsigned int err_len = MIN(data_len, sizeof (err));
390 int err_code = MC_CMD_ERR_EPROTO;
393 /* Read error code (and arg num for MCDI v2 commands) */
394 efx_mcdi_read_response(enp, &err, hdr_len, err_len);
396 if (err_len >= (MC_CMD_ERR_CODE_OFST + sizeof (efx_dword_t)))
397 err_code = EFX_DWORD_FIELD(err[0], EFX_DWORD_0);
399 if (err_len >= (MC_CMD_ERR_ARG_OFST + sizeof (efx_dword_t)))
400 err_arg = EFX_DWORD_FIELD(err[1], EFX_DWORD_0);
402 emrp->emr_err_code = err_code;
403 emrp->emr_err_arg = err_arg;
405 #if EFSYS_OPT_MCDI_PROXY_AUTH
406 if ((err_code == MC_CMD_ERR_PROXY_PENDING) &&
407 (err_len == sizeof (err))) {
409 * The MCDI request would normally fail with EPERM, but
410 * firmware has forwarded it to an authorization agent
411 * attached to a privileged PF.
413 * Save the authorization request handle. The client
414 * must wait for a PROXY_RESPONSE event, or timeout.
416 emrp->emr_proxy_handle = err_arg;
418 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
420 #if EFSYS_OPT_MCDI_LOGGING
421 if (emtp->emt_logger != NULL) {
422 emtp->emt_logger(emtp->emt_context,
423 EFX_LOG_MCDI_RESPONSE,
427 #endif /* EFSYS_OPT_MCDI_LOGGING */
429 if (!emrp->emr_quiet) {
430 EFSYS_PROBE3(mcdi_err_arg, int, emrp->emr_cmd,
431 int, err_code, int, err_arg);
434 rc = efx_mcdi_request_errcode(err_code);
439 emrp->emr_out_length_used = data_len;
440 #if EFSYS_OPT_MCDI_PROXY_AUTH
441 emrp->emr_proxy_handle = 0;
442 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
449 emrp->emr_out_length_used = 0;
453 efx_mcdi_finish_response(
455 __in efx_mcdi_req_t *emrp)
457 #if EFSYS_OPT_MCDI_LOGGING
458 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
459 #endif /* EFSYS_OPT_MCDI_LOGGING */
461 unsigned int hdr_len;
464 if (emrp->emr_out_buf == NULL)
467 /* Read the command header to detect MCDI response format */
468 hdr_len = sizeof (hdr[0]);
469 efx_mcdi_read_response(enp, &hdr[0], 0, hdr_len);
470 if (EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_CODE) == MC_CMD_V2_EXTN) {
472 * Read the actual payload length. The length given in the event
473 * is only correct for responses with the V1 format.
475 efx_mcdi_read_response(enp, &hdr[1], hdr_len, sizeof (hdr[1]));
476 hdr_len += sizeof (hdr[1]);
478 emrp->emr_out_length_used = EFX_DWORD_FIELD(hdr[1],
479 MC_CMD_V2_EXTN_IN_ACTUAL_LEN);
482 /* Copy payload out into caller supplied buffer */
483 bytes = MIN(emrp->emr_out_length_used, emrp->emr_out_length);
484 efx_mcdi_read_response(enp, emrp->emr_out_buf, hdr_len, bytes);
486 #if EFSYS_OPT_MCDI_LOGGING
487 if (emtp->emt_logger != NULL) {
488 emtp->emt_logger(emtp->emt_context,
489 EFX_LOG_MCDI_RESPONSE,
491 emrp->emr_out_buf, bytes);
493 #endif /* EFSYS_OPT_MCDI_LOGGING */
497 __checkReturn boolean_t
498 efx_mcdi_request_poll(
501 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
502 efx_mcdi_req_t *emrp;
506 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
507 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
508 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
510 /* Serialise against post-watchdog efx_mcdi_ev* */
511 EFSYS_LOCK(enp->en_eslp, state);
513 EFSYS_ASSERT(emip->emi_pending_req != NULL);
514 EFSYS_ASSERT(!emip->emi_ev_cpl);
515 emrp = emip->emi_pending_req;
517 /* Check for reboot atomically w.r.t efx_mcdi_request_start */
518 if (emip->emi_poll_cnt++ == 0) {
519 if ((rc = efx_mcdi_poll_reboot(enp)) != 0) {
520 emip->emi_pending_req = NULL;
521 EFSYS_UNLOCK(enp->en_eslp, state);
526 /* Check if a response is available */
527 if (efx_mcdi_poll_response(enp) == B_FALSE) {
528 EFSYS_UNLOCK(enp->en_eslp, state);
532 /* Read the response header */
533 efx_mcdi_read_response_header(enp, emrp);
535 /* Request complete */
536 emip->emi_pending_req = NULL;
538 EFSYS_UNLOCK(enp->en_eslp, state);
540 if ((rc = emrp->emr_rc) != 0)
543 efx_mcdi_finish_response(enp, emrp);
547 if (!emrp->emr_quiet)
550 if (!emrp->emr_quiet)
551 EFSYS_PROBE1(fail1, efx_rc_t, rc);
553 /* Reboot/Assertion */
554 if (rc == EIO || rc == EINTR)
555 efx_mcdi_raise_exception(enp, emrp, rc);
560 __checkReturn boolean_t
561 efx_mcdi_request_abort(
564 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
565 efx_mcdi_req_t *emrp;
569 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
570 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
571 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
574 * efx_mcdi_ev_* may have already completed this event, and be
575 * spinning/blocked on the upper layer lock. So it *is* legitimate
576 * to for emi_pending_req to be NULL. If there is a pending event
577 * completed request, then provide a "credit" to allow
578 * efx_mcdi_ev_cpl() to accept a single spurious completion.
580 EFSYS_LOCK(enp->en_eslp, state);
581 emrp = emip->emi_pending_req;
582 aborted = (emrp != NULL);
584 emip->emi_pending_req = NULL;
586 /* Error the request */
587 emrp->emr_out_length_used = 0;
588 emrp->emr_rc = ETIMEDOUT;
590 /* Provide a credit for seqno/emr_pending_req mismatches */
591 if (emip->emi_ev_cpl)
595 * The upper layer has called us, so we don't
596 * need to complete the request.
599 EFSYS_UNLOCK(enp->en_eslp, state);
604 __checkReturn efx_rc_t
605 efx_mcdi_request_errcode(
606 __in unsigned int err)
611 case MC_CMD_ERR_EPERM:
613 case MC_CMD_ERR_ENOENT:
615 case MC_CMD_ERR_EINTR:
617 case MC_CMD_ERR_EACCES:
619 case MC_CMD_ERR_EBUSY:
621 case MC_CMD_ERR_EINVAL:
623 case MC_CMD_ERR_EDEADLK:
625 case MC_CMD_ERR_ENOSYS:
627 case MC_CMD_ERR_ETIME:
629 case MC_CMD_ERR_ENOTSUP:
631 case MC_CMD_ERR_EALREADY:
635 #ifdef MC_CMD_ERR_EAGAIN
636 case MC_CMD_ERR_EAGAIN:
639 #ifdef MC_CMD_ERR_ENOSPC
640 case MC_CMD_ERR_ENOSPC:
644 case MC_CMD_ERR_ALLOC_FAIL:
646 case MC_CMD_ERR_NO_VADAPTOR:
648 case MC_CMD_ERR_NO_EVB_PORT:
650 case MC_CMD_ERR_NO_VSWITCH:
652 case MC_CMD_ERR_VLAN_LIMIT:
654 case MC_CMD_ERR_BAD_PCI_FUNC:
656 case MC_CMD_ERR_BAD_VLAN_MODE:
658 case MC_CMD_ERR_BAD_VSWITCH_TYPE:
660 case MC_CMD_ERR_BAD_VPORT_TYPE:
662 case MC_CMD_ERR_MAC_EXIST:
665 case MC_CMD_ERR_PROXY_PENDING:
669 EFSYS_PROBE1(mc_pcol_error, int, err);
675 efx_mcdi_raise_exception(
677 __in_opt efx_mcdi_req_t *emrp,
680 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
681 efx_mcdi_exception_t exception;
683 /* Reboot or Assertion failure only */
684 EFSYS_ASSERT(rc == EIO || rc == EINTR);
687 * If MC_CMD_REBOOT causes a reboot (dependent on parameters),
688 * then the EIO is not worthy of an exception.
690 if (emrp != NULL && emrp->emr_cmd == MC_CMD_REBOOT && rc == EIO)
693 exception = (rc == EIO)
694 ? EFX_MCDI_EXCEPTION_MC_REBOOT
695 : EFX_MCDI_EXCEPTION_MC_BADASSERT;
697 emtp->emt_exception(emtp->emt_context, exception);
703 __inout efx_mcdi_req_t *emrp)
705 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
707 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
708 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
710 emrp->emr_quiet = B_FALSE;
711 emtp->emt_execute(emtp->emt_context, emrp);
715 efx_mcdi_execute_quiet(
717 __inout efx_mcdi_req_t *emrp)
719 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
721 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
722 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
724 emrp->emr_quiet = B_TRUE;
725 emtp->emt_execute(emtp->emt_context, emrp);
731 __in unsigned int seq,
732 __in unsigned int outlen,
735 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
736 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
737 efx_mcdi_req_t *emrp;
740 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
741 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
744 * Serialise against efx_mcdi_request_poll()/efx_mcdi_request_start()
745 * when we're completing an aborted request.
747 EFSYS_LOCK(enp->en_eslp, state);
748 if (emip->emi_pending_req == NULL || !emip->emi_ev_cpl ||
749 (seq != ((emip->emi_seq - 1) & EFX_MASK32(MCDI_HEADER_SEQ)))) {
750 EFSYS_ASSERT(emip->emi_aborted > 0);
751 if (emip->emi_aborted > 0)
753 EFSYS_UNLOCK(enp->en_eslp, state);
757 emrp = emip->emi_pending_req;
758 emip->emi_pending_req = NULL;
759 EFSYS_UNLOCK(enp->en_eslp, state);
761 if (emip->emi_max_version >= 2) {
762 /* MCDIv2 response details do not fit into an event. */
763 efx_mcdi_read_response_header(enp, emrp);
766 if (!emrp->emr_quiet) {
767 EFSYS_PROBE2(mcdi_err, int, emrp->emr_cmd,
770 emrp->emr_out_length_used = 0;
771 emrp->emr_rc = efx_mcdi_request_errcode(errcode);
773 emrp->emr_out_length_used = outlen;
778 efx_mcdi_finish_response(enp, emrp);
781 emtp->emt_ev_cpl(emtp->emt_context);
784 #if EFSYS_OPT_MCDI_PROXY_AUTH
786 __checkReturn efx_rc_t
787 efx_mcdi_get_proxy_handle(
789 __in efx_mcdi_req_t *emrp,
790 __out uint32_t *handlep)
792 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
796 * Return proxy handle from MCDI request that returned with error
797 * MC_MCD_ERR_PROXY_PENDING. This handle is used to wait for a matching
798 * PROXY_RESPONSE event.
800 if ((emrp == NULL) || (handlep == NULL)) {
804 if ((emrp->emr_rc != 0) &&
805 (emrp->emr_err_code == MC_CMD_ERR_PROXY_PENDING)) {
806 *handlep = emrp->emr_proxy_handle;
815 EFSYS_PROBE1(fail1, efx_rc_t, rc);
820 efx_mcdi_ev_proxy_response(
822 __in unsigned int handle,
823 __in unsigned int status)
825 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
829 * Handle results of an authorization request for a privileged MCDI
830 * command. If authorization was granted then we must re-issue the
831 * original MCDI request. If authorization failed or timed out,
832 * then the original MCDI request should be completed with the
833 * result code from this event.
835 rc = (status == 0) ? 0 : efx_mcdi_request_errcode(status);
837 emtp->emt_ev_proxy_response(emtp->emt_context, handle, rc);
839 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
846 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
847 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
848 efx_mcdi_req_t *emrp = NULL;
853 * The MCDI request (if there is one) has been terminated, either
854 * by a BADASSERT or REBOOT event.
856 * If there is an outstanding event-completed MCDI operation, then we
857 * will never receive the completion event (because both MCDI
858 * completions and BADASSERT events are sent to the same evq). So
859 * complete this MCDI op.
861 * This function might run in parallel with efx_mcdi_request_poll()
862 * for poll completed mcdi requests, and also with
863 * efx_mcdi_request_start() for post-watchdog completions.
865 EFSYS_LOCK(enp->en_eslp, state);
866 emrp = emip->emi_pending_req;
867 ev_cpl = emip->emi_ev_cpl;
868 if (emrp != NULL && emip->emi_ev_cpl) {
869 emip->emi_pending_req = NULL;
871 emrp->emr_out_length_used = 0;
877 * Since we're running in parallel with a request, consume the
878 * status word before dropping the lock.
880 if (rc == EIO || rc == EINTR) {
881 EFSYS_SPIN(EFX_MCDI_STATUS_SLEEP_US);
882 (void) efx_mcdi_poll_reboot(enp);
883 emip->emi_new_epoch = B_TRUE;
886 EFSYS_UNLOCK(enp->en_eslp, state);
888 efx_mcdi_raise_exception(enp, emrp, rc);
890 if (emrp != NULL && ev_cpl)
891 emtp->emt_ev_cpl(emtp->emt_context);
894 __checkReturn efx_rc_t
897 __out_ecount_opt(4) uint16_t versionp[4],
898 __out_opt uint32_t *buildp,
899 __out_opt efx_mcdi_boot_t *statusp)
902 uint8_t payload[MAX(MAX(MC_CMD_GET_VERSION_IN_LEN,
903 MC_CMD_GET_VERSION_OUT_LEN),
904 MAX(MC_CMD_GET_BOOT_STATUS_IN_LEN,
905 MC_CMD_GET_BOOT_STATUS_OUT_LEN))];
906 efx_word_t *ver_words;
909 efx_mcdi_boot_t status;
912 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
914 (void) memset(payload, 0, sizeof (payload));
915 req.emr_cmd = MC_CMD_GET_VERSION;
916 req.emr_in_buf = payload;
917 req.emr_in_length = MC_CMD_GET_VERSION_IN_LEN;
918 req.emr_out_buf = payload;
919 req.emr_out_length = MC_CMD_GET_VERSION_OUT_LEN;
921 efx_mcdi_execute(enp, &req);
923 if (req.emr_rc != 0) {
928 /* bootrom support */
929 if (req.emr_out_length_used == MC_CMD_GET_VERSION_V0_OUT_LEN) {
930 version[0] = version[1] = version[2] = version[3] = 0;
931 build = MCDI_OUT_DWORD(req, GET_VERSION_OUT_FIRMWARE);
936 if (req.emr_out_length_used < MC_CMD_GET_VERSION_OUT_LEN) {
941 ver_words = MCDI_OUT2(req, efx_word_t, GET_VERSION_OUT_VERSION);
942 version[0] = EFX_WORD_FIELD(ver_words[0], EFX_WORD_0);
943 version[1] = EFX_WORD_FIELD(ver_words[1], EFX_WORD_0);
944 version[2] = EFX_WORD_FIELD(ver_words[2], EFX_WORD_0);
945 version[3] = EFX_WORD_FIELD(ver_words[3], EFX_WORD_0);
946 build = MCDI_OUT_DWORD(req, GET_VERSION_OUT_FIRMWARE);
949 /* The bootrom doesn't understand BOOT_STATUS */
950 if (MC_FW_VERSION_IS_BOOTLOADER(build)) {
951 status = EFX_MCDI_BOOT_ROM;
955 (void) memset(payload, 0, sizeof (payload));
956 req.emr_cmd = MC_CMD_GET_BOOT_STATUS;
957 req.emr_in_buf = payload;
958 req.emr_in_length = MC_CMD_GET_BOOT_STATUS_IN_LEN;
959 req.emr_out_buf = payload;
960 req.emr_out_length = MC_CMD_GET_BOOT_STATUS_OUT_LEN;
962 efx_mcdi_execute_quiet(enp, &req);
964 if (req.emr_rc == EACCES) {
965 /* Unprivileged functions cannot access BOOT_STATUS */
966 status = EFX_MCDI_BOOT_PRIMARY;
967 version[0] = version[1] = version[2] = version[3] = 0;
972 if (req.emr_rc != 0) {
977 if (req.emr_out_length_used < MC_CMD_GET_BOOT_STATUS_OUT_LEN) {
982 if (MCDI_OUT_DWORD_FIELD(req, GET_BOOT_STATUS_OUT_FLAGS,
983 GET_BOOT_STATUS_OUT_FLAGS_PRIMARY))
984 status = EFX_MCDI_BOOT_PRIMARY;
986 status = EFX_MCDI_BOOT_SECONDARY;
989 if (versionp != NULL)
990 memcpy(versionp, version, sizeof (version));
1005 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1010 static __checkReturn efx_rc_t
1012 __in efx_nic_t *enp,
1013 __in boolean_t after_assertion)
1015 uint8_t payload[MAX(MC_CMD_REBOOT_IN_LEN, MC_CMD_REBOOT_OUT_LEN)];
1020 * We could require the caller to have caused en_mod_flags=0 to
1021 * call this function. This doesn't help the other port though,
1022 * who's about to get the MC ripped out from underneath them.
1023 * Since they have to cope with the subsequent fallout of MCDI
1024 * failures, we should as well.
1026 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
1028 (void) memset(payload, 0, sizeof (payload));
1029 req.emr_cmd = MC_CMD_REBOOT;
1030 req.emr_in_buf = payload;
1031 req.emr_in_length = MC_CMD_REBOOT_IN_LEN;
1032 req.emr_out_buf = payload;
1033 req.emr_out_length = MC_CMD_REBOOT_OUT_LEN;
1035 MCDI_IN_SET_DWORD(req, REBOOT_IN_FLAGS,
1036 (after_assertion ? MC_CMD_REBOOT_FLAGS_AFTER_ASSERTION : 0));
1038 efx_mcdi_execute_quiet(enp, &req);
1040 if (req.emr_rc == EACCES) {
1041 /* Unprivileged functions cannot reboot the MC. */
1045 /* A successful reboot request returns EIO. */
1046 if (req.emr_rc != 0 && req.emr_rc != EIO) {
1055 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1060 __checkReturn efx_rc_t
1062 __in efx_nic_t *enp)
1064 return (efx_mcdi_do_reboot(enp, B_FALSE));
1067 __checkReturn efx_rc_t
1068 efx_mcdi_exit_assertion_handler(
1069 __in efx_nic_t *enp)
1071 return (efx_mcdi_do_reboot(enp, B_TRUE));
1074 __checkReturn efx_rc_t
1075 efx_mcdi_read_assertion(
1076 __in efx_nic_t *enp)
1079 uint8_t payload[MAX(MC_CMD_GET_ASSERTS_IN_LEN,
1080 MC_CMD_GET_ASSERTS_OUT_LEN)];
1089 * Before we attempt to chat to the MC, we should verify that the MC
1090 * isn't in it's assertion handler, either due to a previous reboot,
1091 * or because we're reinitializing due to an eec_exception().
1093 * Use GET_ASSERTS to read any assertion state that may be present.
1094 * Retry this command twice. Once because a boot-time assertion failure
1095 * might cause the 1st MCDI request to fail. And once again because
1096 * we might race with efx_mcdi_exit_assertion_handler() running on
1097 * partner port(s) on the same NIC.
1101 (void) memset(payload, 0, sizeof (payload));
1102 req.emr_cmd = MC_CMD_GET_ASSERTS;
1103 req.emr_in_buf = payload;
1104 req.emr_in_length = MC_CMD_GET_ASSERTS_IN_LEN;
1105 req.emr_out_buf = payload;
1106 req.emr_out_length = MC_CMD_GET_ASSERTS_OUT_LEN;
1108 MCDI_IN_SET_DWORD(req, GET_ASSERTS_IN_CLEAR, 1);
1109 efx_mcdi_execute_quiet(enp, &req);
1111 } while ((req.emr_rc == EINTR || req.emr_rc == EIO) && retry-- > 0);
1113 if (req.emr_rc != 0) {
1114 if (req.emr_rc == EACCES) {
1115 /* Unprivileged functions cannot clear assertions. */
1122 if (req.emr_out_length_used < MC_CMD_GET_ASSERTS_OUT_LEN) {
1127 /* Print out any assertion state recorded */
1128 flags = MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_GLOBAL_FLAGS);
1129 if (flags == MC_CMD_GET_ASSERTS_FLAGS_NO_FAILS)
1132 reason = (flags == MC_CMD_GET_ASSERTS_FLAGS_SYS_FAIL)
1133 ? "system-level assertion"
1134 : (flags == MC_CMD_GET_ASSERTS_FLAGS_THR_FAIL)
1135 ? "thread-level assertion"
1136 : (flags == MC_CMD_GET_ASSERTS_FLAGS_WDOG_FIRED)
1138 : (flags == MC_CMD_GET_ASSERTS_FLAGS_ADDR_TRAP)
1139 ? "illegal address trap"
1140 : "unknown assertion";
1141 EFSYS_PROBE3(mcpu_assertion,
1142 const char *, reason, unsigned int,
1143 MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_SAVED_PC_OFFS),
1145 MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_THREAD_OFFS));
1147 /* Print out the registers (r1 ... r31) */
1148 ofst = MC_CMD_GET_ASSERTS_OUT_GP_REGS_OFFS_OFST;
1150 index < 1 + MC_CMD_GET_ASSERTS_OUT_GP_REGS_OFFS_NUM;
1152 EFSYS_PROBE2(mcpu_register, unsigned int, index, unsigned int,
1153 EFX_DWORD_FIELD(*MCDI_OUT(req, efx_dword_t, ofst),
1155 ofst += sizeof (efx_dword_t);
1157 EFSYS_ASSERT(ofst <= MC_CMD_GET_ASSERTS_OUT_LEN);
1165 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1172 * Internal routines for for specific MCDI requests.
1175 __checkReturn efx_rc_t
1176 efx_mcdi_drv_attach(
1177 __in efx_nic_t *enp,
1178 __in boolean_t attach)
1180 efx_nic_cfg_t *encp = &(enp->en_nic_cfg);
1182 uint8_t payload[MAX(MC_CMD_DRV_ATTACH_IN_LEN,
1183 MC_CMD_DRV_ATTACH_EXT_OUT_LEN)];
1187 (void) memset(payload, 0, sizeof (payload));
1188 req.emr_cmd = MC_CMD_DRV_ATTACH;
1189 req.emr_in_buf = payload;
1190 req.emr_in_length = MC_CMD_DRV_ATTACH_IN_LEN;
1191 req.emr_out_buf = payload;
1192 req.emr_out_length = MC_CMD_DRV_ATTACH_EXT_OUT_LEN;
1195 * Use DONT_CARE for the datapath firmware type to ensure that the
1196 * driver can attach to an unprivileged function. The datapath firmware
1197 * type to use is controlled by the 'sfboot' utility.
1199 MCDI_IN_SET_DWORD(req, DRV_ATTACH_IN_NEW_STATE, attach ? 1 : 0);
1200 MCDI_IN_SET_DWORD(req, DRV_ATTACH_IN_UPDATE, 1);
1201 MCDI_IN_SET_DWORD(req, DRV_ATTACH_IN_FIRMWARE_ID, MC_CMD_FW_DONT_CARE);
1203 efx_mcdi_execute(enp, &req);
1205 if (req.emr_rc != 0) {
1210 if (req.emr_out_length_used < MC_CMD_DRV_ATTACH_OUT_LEN) {
1215 if (attach == B_FALSE) {
1217 } else if (enp->en_family == EFX_FAMILY_SIENA) {
1218 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
1220 /* Create synthetic privileges for Siena functions */
1221 flags = EFX_NIC_FUNC_LINKCTRL | EFX_NIC_FUNC_TRUSTED;
1222 if (emip->emi_port == 1)
1223 flags |= EFX_NIC_FUNC_PRIMARY;
1225 EFX_STATIC_ASSERT(EFX_NIC_FUNC_PRIMARY ==
1226 (1u << MC_CMD_DRV_ATTACH_EXT_OUT_FLAG_PRIMARY));
1227 EFX_STATIC_ASSERT(EFX_NIC_FUNC_LINKCTRL ==
1228 (1u << MC_CMD_DRV_ATTACH_EXT_OUT_FLAG_LINKCTRL));
1229 EFX_STATIC_ASSERT(EFX_NIC_FUNC_TRUSTED ==
1230 (1u << MC_CMD_DRV_ATTACH_EXT_OUT_FLAG_TRUSTED));
1232 /* Save function privilege flags (EF10 and later) */
1233 if (req.emr_out_length_used < MC_CMD_DRV_ATTACH_EXT_OUT_LEN) {
1237 flags = MCDI_OUT_DWORD(req, DRV_ATTACH_EXT_OUT_FUNC_FLAGS);
1239 encp->enc_func_flags = flags;
1248 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1253 __checkReturn efx_rc_t
1254 efx_mcdi_get_board_cfg(
1255 __in efx_nic_t *enp,
1256 __out_opt uint32_t *board_typep,
1257 __out_opt efx_dword_t *capabilitiesp,
1258 __out_ecount_opt(6) uint8_t mac_addrp[6])
1260 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
1262 uint8_t payload[MAX(MC_CMD_GET_BOARD_CFG_IN_LEN,
1263 MC_CMD_GET_BOARD_CFG_OUT_LENMIN)];
1266 (void) memset(payload, 0, sizeof (payload));
1267 req.emr_cmd = MC_CMD_GET_BOARD_CFG;
1268 req.emr_in_buf = payload;
1269 req.emr_in_length = MC_CMD_GET_BOARD_CFG_IN_LEN;
1270 req.emr_out_buf = payload;
1271 req.emr_out_length = MC_CMD_GET_BOARD_CFG_OUT_LENMIN;
1273 efx_mcdi_execute(enp, &req);
1275 if (req.emr_rc != 0) {
1280 if (req.emr_out_length_used < MC_CMD_GET_BOARD_CFG_OUT_LENMIN) {
1285 if (mac_addrp != NULL) {
1288 if (emip->emi_port == 1) {
1289 addrp = MCDI_OUT2(req, uint8_t,
1290 GET_BOARD_CFG_OUT_MAC_ADDR_BASE_PORT0);
1291 } else if (emip->emi_port == 2) {
1292 addrp = MCDI_OUT2(req, uint8_t,
1293 GET_BOARD_CFG_OUT_MAC_ADDR_BASE_PORT1);
1299 EFX_MAC_ADDR_COPY(mac_addrp, addrp);
1302 if (capabilitiesp != NULL) {
1303 if (emip->emi_port == 1) {
1304 *capabilitiesp = *MCDI_OUT2(req, efx_dword_t,
1305 GET_BOARD_CFG_OUT_CAPABILITIES_PORT0);
1306 } else if (emip->emi_port == 2) {
1307 *capabilitiesp = *MCDI_OUT2(req, efx_dword_t,
1308 GET_BOARD_CFG_OUT_CAPABILITIES_PORT1);
1315 if (board_typep != NULL) {
1316 *board_typep = MCDI_OUT_DWORD(req,
1317 GET_BOARD_CFG_OUT_BOARD_TYPE);
1329 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1334 __checkReturn efx_rc_t
1335 efx_mcdi_get_resource_limits(
1336 __in efx_nic_t *enp,
1337 __out_opt uint32_t *nevqp,
1338 __out_opt uint32_t *nrxqp,
1339 __out_opt uint32_t *ntxqp)
1342 uint8_t payload[MAX(MC_CMD_GET_RESOURCE_LIMITS_IN_LEN,
1343 MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN)];
1346 (void) memset(payload, 0, sizeof (payload));
1347 req.emr_cmd = MC_CMD_GET_RESOURCE_LIMITS;
1348 req.emr_in_buf = payload;
1349 req.emr_in_length = MC_CMD_GET_RESOURCE_LIMITS_IN_LEN;
1350 req.emr_out_buf = payload;
1351 req.emr_out_length = MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN;
1353 efx_mcdi_execute(enp, &req);
1355 if (req.emr_rc != 0) {
1360 if (req.emr_out_length_used < MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN) {
1366 *nevqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_EVQ);
1368 *nrxqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_RXQ);
1370 *ntxqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_TXQ);
1377 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1382 __checkReturn efx_rc_t
1383 efx_mcdi_get_phy_cfg(
1384 __in efx_nic_t *enp)
1386 efx_port_t *epp = &(enp->en_port);
1387 efx_nic_cfg_t *encp = &(enp->en_nic_cfg);
1389 uint8_t payload[MAX(MC_CMD_GET_PHY_CFG_IN_LEN,
1390 MC_CMD_GET_PHY_CFG_OUT_LEN)];
1393 (void) memset(payload, 0, sizeof (payload));
1394 req.emr_cmd = MC_CMD_GET_PHY_CFG;
1395 req.emr_in_buf = payload;
1396 req.emr_in_length = MC_CMD_GET_PHY_CFG_IN_LEN;
1397 req.emr_out_buf = payload;
1398 req.emr_out_length = MC_CMD_GET_PHY_CFG_OUT_LEN;
1400 efx_mcdi_execute(enp, &req);
1402 if (req.emr_rc != 0) {
1407 if (req.emr_out_length_used < MC_CMD_GET_PHY_CFG_OUT_LEN) {
1412 encp->enc_phy_type = MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_TYPE);
1414 (void) strncpy(encp->enc_phy_name,
1415 MCDI_OUT2(req, char, GET_PHY_CFG_OUT_NAME),
1416 MIN(sizeof (encp->enc_phy_name) - 1,
1417 MC_CMD_GET_PHY_CFG_OUT_NAME_LEN));
1418 #endif /* EFSYS_OPT_NAMES */
1419 (void) memset(encp->enc_phy_revision, 0,
1420 sizeof (encp->enc_phy_revision));
1421 memcpy(encp->enc_phy_revision,
1422 MCDI_OUT2(req, char, GET_PHY_CFG_OUT_REVISION),
1423 MIN(sizeof (encp->enc_phy_revision) - 1,
1424 MC_CMD_GET_PHY_CFG_OUT_REVISION_LEN));
1425 #if EFSYS_OPT_PHY_LED_CONTROL
1426 encp->enc_led_mask = ((1 << EFX_PHY_LED_DEFAULT) |
1427 (1 << EFX_PHY_LED_OFF) |
1428 (1 << EFX_PHY_LED_ON));
1429 #endif /* EFSYS_OPT_PHY_LED_CONTROL */
1431 #if EFSYS_OPT_PHY_PROPS
1432 encp->enc_phy_nprops = 0;
1433 #endif /* EFSYS_OPT_PHY_PROPS */
1435 /* Get the media type of the fixed port, if recognised. */
1436 EFX_STATIC_ASSERT(MC_CMD_MEDIA_XAUI == EFX_PHY_MEDIA_XAUI);
1437 EFX_STATIC_ASSERT(MC_CMD_MEDIA_CX4 == EFX_PHY_MEDIA_CX4);
1438 EFX_STATIC_ASSERT(MC_CMD_MEDIA_KX4 == EFX_PHY_MEDIA_KX4);
1439 EFX_STATIC_ASSERT(MC_CMD_MEDIA_XFP == EFX_PHY_MEDIA_XFP);
1440 EFX_STATIC_ASSERT(MC_CMD_MEDIA_SFP_PLUS == EFX_PHY_MEDIA_SFP_PLUS);
1441 EFX_STATIC_ASSERT(MC_CMD_MEDIA_BASE_T == EFX_PHY_MEDIA_BASE_T);
1442 EFX_STATIC_ASSERT(MC_CMD_MEDIA_QSFP_PLUS == EFX_PHY_MEDIA_QSFP_PLUS);
1443 epp->ep_fixed_port_type =
1444 MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_MEDIA_TYPE);
1445 if (epp->ep_fixed_port_type >= EFX_PHY_MEDIA_NTYPES)
1446 epp->ep_fixed_port_type = EFX_PHY_MEDIA_INVALID;
1448 epp->ep_phy_cap_mask =
1449 MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_SUPPORTED_CAP);
1450 #if EFSYS_OPT_PHY_FLAGS
1451 encp->enc_phy_flags_mask = MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_FLAGS);
1452 #endif /* EFSYS_OPT_PHY_FLAGS */
1454 encp->enc_port = (uint8_t)MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_PRT);
1456 /* Populate internal state */
1457 encp->enc_mcdi_mdio_channel =
1458 (uint8_t)MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_CHANNEL);
1460 #if EFSYS_OPT_PHY_STATS
1461 encp->enc_mcdi_phy_stat_mask =
1462 MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_STATS_MASK);
1463 #endif /* EFSYS_OPT_PHY_STATS */
1466 encp->enc_bist_mask = 0;
1467 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1468 GET_PHY_CFG_OUT_BIST_CABLE_SHORT))
1469 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_CABLE_SHORT);
1470 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1471 GET_PHY_CFG_OUT_BIST_CABLE_LONG))
1472 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_CABLE_LONG);
1473 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1474 GET_PHY_CFG_OUT_BIST))
1475 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_NORMAL);
1476 #endif /* EFSYS_OPT_BIST */
1483 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1488 __checkReturn efx_rc_t
1489 efx_mcdi_firmware_update_supported(
1490 __in efx_nic_t *enp,
1491 __out boolean_t *supportedp)
1493 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1496 if (emcop != NULL) {
1497 if ((rc = emcop->emco_feature_supported(enp,
1498 EFX_MCDI_FEATURE_FW_UPDATE, supportedp)) != 0)
1501 /* Earlier devices always supported updates */
1502 *supportedp = B_TRUE;
1508 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1513 __checkReturn efx_rc_t
1514 efx_mcdi_macaddr_change_supported(
1515 __in efx_nic_t *enp,
1516 __out boolean_t *supportedp)
1518 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1521 if (emcop != NULL) {
1522 if ((rc = emcop->emco_feature_supported(enp,
1523 EFX_MCDI_FEATURE_MACADDR_CHANGE, supportedp)) != 0)
1526 /* Earlier devices always supported MAC changes */
1527 *supportedp = B_TRUE;
1533 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1538 __checkReturn efx_rc_t
1539 efx_mcdi_link_control_supported(
1540 __in efx_nic_t *enp,
1541 __out boolean_t *supportedp)
1543 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1546 if (emcop != NULL) {
1547 if ((rc = emcop->emco_feature_supported(enp,
1548 EFX_MCDI_FEATURE_LINK_CONTROL, supportedp)) != 0)
1551 /* Earlier devices always supported link control */
1552 *supportedp = B_TRUE;
1558 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1563 __checkReturn efx_rc_t
1564 efx_mcdi_mac_spoofing_supported(
1565 __in efx_nic_t *enp,
1566 __out boolean_t *supportedp)
1568 efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1571 if (emcop != NULL) {
1572 if ((rc = emcop->emco_feature_supported(enp,
1573 EFX_MCDI_FEATURE_MAC_SPOOFING, supportedp)) != 0)
1576 /* Earlier devices always supported MAC spoofing */
1577 *supportedp = B_TRUE;
1583 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1590 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD
1592 * Enter bist offline mode. This is a fw mode which puts the NIC into a state
1593 * where memory BIST tests can be run and not much else can interfere or happen.
1594 * A reboot is required to exit this mode.
1596 __checkReturn efx_rc_t
1597 efx_mcdi_bist_enable_offline(
1598 __in efx_nic_t *enp)
1603 EFX_STATIC_ASSERT(MC_CMD_ENABLE_OFFLINE_BIST_IN_LEN == 0);
1604 EFX_STATIC_ASSERT(MC_CMD_ENABLE_OFFLINE_BIST_OUT_LEN == 0);
1606 req.emr_cmd = MC_CMD_ENABLE_OFFLINE_BIST;
1607 req.emr_in_buf = NULL;
1608 req.emr_in_length = 0;
1609 req.emr_out_buf = NULL;
1610 req.emr_out_length = 0;
1612 efx_mcdi_execute(enp, &req);
1614 if (req.emr_rc != 0) {
1622 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1626 #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD */
1628 __checkReturn efx_rc_t
1629 efx_mcdi_bist_start(
1630 __in efx_nic_t *enp,
1631 __in efx_bist_type_t type)
1634 uint8_t payload[MAX(MC_CMD_START_BIST_IN_LEN,
1635 MC_CMD_START_BIST_OUT_LEN)];
1638 (void) memset(payload, 0, sizeof (payload));
1639 req.emr_cmd = MC_CMD_START_BIST;
1640 req.emr_in_buf = payload;
1641 req.emr_in_length = MC_CMD_START_BIST_IN_LEN;
1642 req.emr_out_buf = payload;
1643 req.emr_out_length = MC_CMD_START_BIST_OUT_LEN;
1646 case EFX_BIST_TYPE_PHY_NORMAL:
1647 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE, MC_CMD_PHY_BIST);
1649 case EFX_BIST_TYPE_PHY_CABLE_SHORT:
1650 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1651 MC_CMD_PHY_BIST_CABLE_SHORT);
1653 case EFX_BIST_TYPE_PHY_CABLE_LONG:
1654 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1655 MC_CMD_PHY_BIST_CABLE_LONG);
1657 case EFX_BIST_TYPE_MC_MEM:
1658 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1659 MC_CMD_MC_MEM_BIST);
1661 case EFX_BIST_TYPE_SAT_MEM:
1662 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1663 MC_CMD_PORT_MEM_BIST);
1665 case EFX_BIST_TYPE_REG:
1666 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1673 efx_mcdi_execute(enp, &req);
1675 if (req.emr_rc != 0) {
1683 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1688 #endif /* EFSYS_OPT_BIST */
1691 /* Enable logging of some events (e.g. link state changes) */
1692 __checkReturn efx_rc_t
1694 __in efx_nic_t *enp)
1697 uint8_t payload[MAX(MC_CMD_LOG_CTRL_IN_LEN,
1698 MC_CMD_LOG_CTRL_OUT_LEN)];
1701 (void) memset(payload, 0, sizeof (payload));
1702 req.emr_cmd = MC_CMD_LOG_CTRL;
1703 req.emr_in_buf = payload;
1704 req.emr_in_length = MC_CMD_LOG_CTRL_IN_LEN;
1705 req.emr_out_buf = payload;
1706 req.emr_out_length = MC_CMD_LOG_CTRL_OUT_LEN;
1708 MCDI_IN_SET_DWORD(req, LOG_CTRL_IN_LOG_DEST,
1709 MC_CMD_LOG_CTRL_IN_LOG_DEST_EVQ);
1710 MCDI_IN_SET_DWORD(req, LOG_CTRL_IN_LOG_DEST_EVQ, 0);
1712 efx_mcdi_execute(enp, &req);
1714 if (req.emr_rc != 0) {
1722 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1728 #if EFSYS_OPT_MAC_STATS
1730 typedef enum efx_stats_action_e
1734 EFX_STATS_ENABLE_NOEVENTS,
1735 EFX_STATS_ENABLE_EVENTS,
1737 } efx_stats_action_t;
1739 static __checkReturn efx_rc_t
1741 __in efx_nic_t *enp,
1742 __in_opt efsys_mem_t *esmp,
1743 __in efx_stats_action_t action)
1746 uint8_t payload[MAX(MC_CMD_MAC_STATS_IN_LEN,
1747 MC_CMD_MAC_STATS_OUT_DMA_LEN)];
1748 int clear = (action == EFX_STATS_CLEAR);
1749 int upload = (action == EFX_STATS_UPLOAD);
1750 int enable = (action == EFX_STATS_ENABLE_NOEVENTS);
1751 int events = (action == EFX_STATS_ENABLE_EVENTS);
1752 int disable = (action == EFX_STATS_DISABLE);
1755 (void) memset(payload, 0, sizeof (payload));
1756 req.emr_cmd = MC_CMD_MAC_STATS;
1757 req.emr_in_buf = payload;
1758 req.emr_in_length = MC_CMD_MAC_STATS_IN_LEN;
1759 req.emr_out_buf = payload;
1760 req.emr_out_length = MC_CMD_MAC_STATS_OUT_DMA_LEN;
1762 MCDI_IN_POPULATE_DWORD_6(req, MAC_STATS_IN_CMD,
1763 MAC_STATS_IN_DMA, upload,
1764 MAC_STATS_IN_CLEAR, clear,
1765 MAC_STATS_IN_PERIODIC_CHANGE, enable | events | disable,
1766 MAC_STATS_IN_PERIODIC_ENABLE, enable | events,
1767 MAC_STATS_IN_PERIODIC_NOEVENT, !events,
1768 MAC_STATS_IN_PERIOD_MS, (enable | events) ? 1000: 0);
1771 int bytes = MC_CMD_MAC_NSTATS * sizeof (uint64_t);
1773 EFX_STATIC_ASSERT(MC_CMD_MAC_NSTATS * sizeof (uint64_t) <=
1774 EFX_MAC_STATS_SIZE);
1776 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_ADDR_LO,
1777 EFSYS_MEM_ADDR(esmp) & 0xffffffff);
1778 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_ADDR_HI,
1779 EFSYS_MEM_ADDR(esmp) >> 32);
1780 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_LEN, bytes);
1782 EFSYS_ASSERT(!upload && !enable && !events);
1786 * NOTE: Do not use EVB_PORT_ID_ASSIGNED when disabling periodic stats,
1787 * as this may fail (and leave periodic DMA enabled) if the
1788 * vadapter has already been deleted.
1790 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_PORT_ID,
1791 (disable ? EVB_PORT_ID_NULL : enp->en_vport_id));
1793 efx_mcdi_execute(enp, &req);
1795 if (req.emr_rc != 0) {
1796 /* EF10: Expect ENOENT if no DMA queues are initialised */
1797 if ((req.emr_rc != ENOENT) ||
1798 (enp->en_rx_qcount + enp->en_tx_qcount != 0)) {
1807 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1812 __checkReturn efx_rc_t
1813 efx_mcdi_mac_stats_clear(
1814 __in efx_nic_t *enp)
1818 if ((rc = efx_mcdi_mac_stats(enp, NULL, EFX_STATS_CLEAR)) != 0)
1824 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1829 __checkReturn efx_rc_t
1830 efx_mcdi_mac_stats_upload(
1831 __in efx_nic_t *enp,
1832 __in efsys_mem_t *esmp)
1837 * The MC DMAs aggregate statistics for our convenience, so we can
1838 * avoid having to pull the statistics buffer into the cache to
1839 * maintain cumulative statistics.
1841 if ((rc = efx_mcdi_mac_stats(enp, esmp, EFX_STATS_UPLOAD)) != 0)
1847 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1852 __checkReturn efx_rc_t
1853 efx_mcdi_mac_stats_periodic(
1854 __in efx_nic_t *enp,
1855 __in efsys_mem_t *esmp,
1856 __in uint16_t period,
1857 __in boolean_t events)
1862 * The MC DMAs aggregate statistics for our convenience, so we can
1863 * avoid having to pull the statistics buffer into the cache to
1864 * maintain cumulative statistics.
1865 * Huntington uses a fixed 1sec period, so use that on Siena too.
1868 rc = efx_mcdi_mac_stats(enp, NULL, EFX_STATS_DISABLE);
1870 rc = efx_mcdi_mac_stats(enp, esmp, EFX_STATS_ENABLE_EVENTS);
1872 rc = efx_mcdi_mac_stats(enp, esmp, EFX_STATS_ENABLE_NOEVENTS);
1880 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1885 #endif /* EFSYS_OPT_MAC_STATS */
1887 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD
1890 * This function returns the pf and vf number of a function. If it is a pf the
1891 * vf number is 0xffff. The vf number is the index of the vf on that
1892 * function. So if you have 3 vfs on pf 0 the 3 vfs will return (pf=0,vf=0),
1893 * (pf=0,vf=1), (pf=0,vf=2) aand the pf will return (pf=0, vf=0xffff).
1895 __checkReturn efx_rc_t
1896 efx_mcdi_get_function_info(
1897 __in efx_nic_t *enp,
1898 __out uint32_t *pfp,
1899 __out_opt uint32_t *vfp)
1902 uint8_t payload[MAX(MC_CMD_GET_FUNCTION_INFO_IN_LEN,
1903 MC_CMD_GET_FUNCTION_INFO_OUT_LEN)];
1906 (void) memset(payload, 0, sizeof (payload));
1907 req.emr_cmd = MC_CMD_GET_FUNCTION_INFO;
1908 req.emr_in_buf = payload;
1909 req.emr_in_length = MC_CMD_GET_FUNCTION_INFO_IN_LEN;
1910 req.emr_out_buf = payload;
1911 req.emr_out_length = MC_CMD_GET_FUNCTION_INFO_OUT_LEN;
1913 efx_mcdi_execute(enp, &req);
1915 if (req.emr_rc != 0) {
1920 if (req.emr_out_length_used < MC_CMD_GET_FUNCTION_INFO_OUT_LEN) {
1925 *pfp = MCDI_OUT_DWORD(req, GET_FUNCTION_INFO_OUT_PF);
1927 *vfp = MCDI_OUT_DWORD(req, GET_FUNCTION_INFO_OUT_VF);
1934 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1939 __checkReturn efx_rc_t
1940 efx_mcdi_privilege_mask(
1941 __in efx_nic_t *enp,
1944 __out uint32_t *maskp)
1947 uint8_t payload[MAX(MC_CMD_PRIVILEGE_MASK_IN_LEN,
1948 MC_CMD_PRIVILEGE_MASK_OUT_LEN)];
1951 (void) memset(payload, 0, sizeof (payload));
1952 req.emr_cmd = MC_CMD_PRIVILEGE_MASK;
1953 req.emr_in_buf = payload;
1954 req.emr_in_length = MC_CMD_PRIVILEGE_MASK_IN_LEN;
1955 req.emr_out_buf = payload;
1956 req.emr_out_length = MC_CMD_PRIVILEGE_MASK_OUT_LEN;
1958 MCDI_IN_POPULATE_DWORD_2(req, PRIVILEGE_MASK_IN_FUNCTION,
1959 PRIVILEGE_MASK_IN_FUNCTION_PF, pf,
1960 PRIVILEGE_MASK_IN_FUNCTION_VF, vf);
1962 efx_mcdi_execute(enp, &req);
1964 if (req.emr_rc != 0) {
1969 if (req.emr_out_length_used < MC_CMD_PRIVILEGE_MASK_OUT_LEN) {
1974 *maskp = MCDI_OUT_DWORD(req, PRIVILEGE_MASK_OUT_OLD_MASK);
1981 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1986 #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD */
1988 __checkReturn efx_rc_t
1989 efx_mcdi_set_workaround(
1990 __in efx_nic_t *enp,
1992 __in boolean_t enabled,
1993 __out_opt uint32_t *flagsp)
1996 uint8_t payload[MAX(MC_CMD_WORKAROUND_IN_LEN,
1997 MC_CMD_WORKAROUND_EXT_OUT_LEN)];
2000 (void) memset(payload, 0, sizeof (payload));
2001 req.emr_cmd = MC_CMD_WORKAROUND;
2002 req.emr_in_buf = payload;
2003 req.emr_in_length = MC_CMD_WORKAROUND_IN_LEN;
2004 req.emr_out_buf = payload;
2005 req.emr_out_length = MC_CMD_WORKAROUND_OUT_LEN;
2007 MCDI_IN_SET_DWORD(req, WORKAROUND_IN_TYPE, type);
2008 MCDI_IN_SET_DWORD(req, WORKAROUND_IN_ENABLED, enabled ? 1 : 0);
2010 efx_mcdi_execute_quiet(enp, &req);
2012 if (req.emr_rc != 0) {
2017 if (flagsp != NULL) {
2018 if (req.emr_out_length_used >= MC_CMD_WORKAROUND_EXT_OUT_LEN)
2019 *flagsp = MCDI_OUT_DWORD(req, WORKAROUND_EXT_OUT_FLAGS);
2027 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2033 __checkReturn efx_rc_t
2034 efx_mcdi_get_workarounds(
2035 __in efx_nic_t *enp,
2036 __out_opt uint32_t *implementedp,
2037 __out_opt uint32_t *enabledp)
2040 uint8_t payload[MC_CMD_GET_WORKAROUNDS_OUT_LEN];
2043 (void) memset(payload, 0, sizeof (payload));
2044 req.emr_cmd = MC_CMD_GET_WORKAROUNDS;
2045 req.emr_in_buf = NULL;
2046 req.emr_in_length = 0;
2047 req.emr_out_buf = payload;
2048 req.emr_out_length = MC_CMD_GET_WORKAROUNDS_OUT_LEN;
2050 efx_mcdi_execute(enp, &req);
2052 if (req.emr_rc != 0) {
2057 if (implementedp != NULL) {
2059 MCDI_OUT_DWORD(req, GET_WORKAROUNDS_OUT_IMPLEMENTED);
2062 if (enabledp != NULL) {
2063 *enabledp = MCDI_OUT_DWORD(req, GET_WORKAROUNDS_OUT_ENABLED);
2069 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2075 * Size of media information page in accordance with SFF-8472 and SFF-8436.
2076 * It is used in MCDI interface as well.
2078 #define EFX_PHY_MEDIA_INFO_PAGE_SIZE 0x80
2080 static __checkReturn efx_rc_t
2081 efx_mcdi_get_phy_media_info(
2082 __in efx_nic_t *enp,
2083 __in uint32_t mcdi_page,
2084 __in uint8_t offset,
2086 __out_bcount(len) uint8_t *data)
2089 uint8_t payload[MAX(MC_CMD_GET_PHY_MEDIA_INFO_IN_LEN,
2090 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(
2091 EFX_PHY_MEDIA_INFO_PAGE_SIZE))];
2094 EFSYS_ASSERT((uint32_t)offset + len <= EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2096 (void) memset(payload, 0, sizeof (payload));
2097 req.emr_cmd = MC_CMD_GET_PHY_MEDIA_INFO;
2098 req.emr_in_buf = payload;
2099 req.emr_in_length = MC_CMD_GET_PHY_MEDIA_INFO_IN_LEN;
2100 req.emr_out_buf = payload;
2101 req.emr_out_length =
2102 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2104 MCDI_IN_SET_DWORD(req, GET_PHY_MEDIA_INFO_IN_PAGE, mcdi_page);
2106 efx_mcdi_execute(enp, &req);
2108 if (req.emr_rc != 0) {
2113 if (req.emr_out_length_used !=
2114 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(EFX_PHY_MEDIA_INFO_PAGE_SIZE)) {
2119 if (MCDI_OUT_DWORD(req, GET_PHY_MEDIA_INFO_OUT_DATALEN) !=
2120 EFX_PHY_MEDIA_INFO_PAGE_SIZE) {
2126 MCDI_OUT2(req, uint8_t, GET_PHY_MEDIA_INFO_OUT_DATA) + offset,
2136 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2142 * 2-wire device address of the base information in accordance with SFF-8472
2143 * Diagnostic Monitoring Interface for Optical Transceivers section
2144 * 4 Memory Organization.
2146 #define EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_BASE 0xA0
2149 * 2-wire device address of the digital diagnostics monitoring interface
2150 * in accordance with SFF-8472 Diagnostic Monitoring Interface for Optical
2151 * Transceivers section 4 Memory Organization.
2153 #define EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_DDM 0xA2
2156 * Hard wired 2-wire device address for QSFP+ in accordance with SFF-8436
2157 * QSFP+ 10 Gbs 4X PLUGGABLE TRANSCEIVER section 7.4 Device Addressing and
2160 #define EFX_PHY_MEDIA_INFO_DEV_ADDR_QSFP 0xA0
2162 __checkReturn efx_rc_t
2163 efx_mcdi_phy_module_get_info(
2164 __in efx_nic_t *enp,
2165 __in uint8_t dev_addr,
2166 __in uint8_t offset,
2168 __out_bcount(len) uint8_t *data)
2170 efx_port_t *epp = &(enp->en_port);
2172 uint32_t mcdi_lower_page;
2173 uint32_t mcdi_upper_page;
2175 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
2178 * Map device address to MC_CMD_GET_PHY_MEDIA_INFO pages.
2179 * Offset plus length interface allows to access page 0 only.
2180 * I.e. non-zero upper pages are not accessible.
2181 * See SFF-8472 section 4 Memory Organization and SFF-8436 section 7.6
2182 * QSFP+ Memory Map for details on how information is structured
2185 switch (epp->ep_fixed_port_type) {
2186 case EFX_PHY_MEDIA_SFP_PLUS:
2188 * In accordance with SFF-8472 Diagnostic Monitoring
2189 * Interface for Optical Transceivers section 4 Memory
2190 * Organization two 2-wire addresses are defined.
2193 /* Base information */
2194 case EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_BASE:
2196 * MCDI page 0 should be used to access lower
2197 * page 0 (0x00 - 0x7f) at the device address 0xA0.
2199 mcdi_lower_page = 0;
2201 * MCDI page 1 should be used to access upper
2202 * page 0 (0x80 - 0xff) at the device address 0xA0.
2204 mcdi_upper_page = 1;
2207 case EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_DDM:
2209 * MCDI page 2 should be used to access lower
2210 * page 0 (0x00 - 0x7f) at the device address 0xA2.
2212 mcdi_lower_page = 2;
2214 * MCDI page 3 should be used to access upper
2215 * page 0 (0x80 - 0xff) at the device address 0xA2.
2217 mcdi_upper_page = 3;
2224 case EFX_PHY_MEDIA_QSFP_PLUS:
2226 case EFX_PHY_MEDIA_INFO_DEV_ADDR_QSFP:
2228 * MCDI page -1 should be used to access lower page 0
2231 mcdi_lower_page = (uint32_t)-1;
2233 * MCDI page 0 should be used to access upper page 0
2236 mcdi_upper_page = 0;
2248 if (offset < EFX_PHY_MEDIA_INFO_PAGE_SIZE) {
2250 MIN(len, EFX_PHY_MEDIA_INFO_PAGE_SIZE - offset);
2252 rc = efx_mcdi_get_phy_media_info(enp,
2253 mcdi_lower_page, offset, read_len, data);
2262 offset -= EFX_PHY_MEDIA_INFO_PAGE_SIZE;
2266 EFSYS_ASSERT3U(len, <=, EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2267 EFSYS_ASSERT3U(offset, <, EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2269 rc = efx_mcdi_get_phy_media_info(enp,
2270 mcdi_upper_page, offset, len, data);
2282 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2287 #endif /* EFSYS_OPT_MCDI */