1 /* SPDX-License-Identifier: BSD-3-Clause
3 * Copyright(c) 2019-2020 Xilinx, Inc.
4 * Copyright(c) 2008-2019 Solarflare Communications Inc.
13 * There are three versions of the MCDI interface:
14 * - MCDIv0: Siena BootROM. Transport uses MCDIv1 headers.
15 * - MCDIv1: Siena firmware and Huntington BootROM.
16 * - MCDIv2: EF10 firmware (Huntington/Medford) and Medford BootROM.
17 * Transport uses MCDIv2 headers.
19 * MCDIv2 Header NOT_EPOCH flag
20 * ----------------------------
21 * A new epoch begins at initial startup or after an MC reboot, and defines when
22 * the MC should reject stale MCDI requests.
24 * The first MCDI request sent by the host should contain NOT_EPOCH=0, and all
25 * subsequent requests (until the next MC reboot) should contain NOT_EPOCH=1.
27 * After rebooting the MC will fail all requests with NOT_EPOCH=1 by writing a
28 * response with ERROR=1 and DATALEN=0 until a request is seen with NOT_EPOCH=0.
35 static const efx_mcdi_ops_t __efx_mcdi_siena_ops = {
36 siena_mcdi_init, /* emco_init */
37 siena_mcdi_send_request, /* emco_send_request */
38 siena_mcdi_poll_reboot, /* emco_poll_reboot */
39 siena_mcdi_poll_response, /* emco_poll_response */
40 siena_mcdi_read_response, /* emco_read_response */
41 siena_mcdi_fini, /* emco_fini */
42 siena_mcdi_feature_supported, /* emco_feature_supported */
43 siena_mcdi_get_timeout, /* emco_get_timeout */
46 #endif /* EFSYS_OPT_SIENA */
50 static const efx_mcdi_ops_t __efx_mcdi_ef10_ops = {
51 ef10_mcdi_init, /* emco_init */
52 ef10_mcdi_send_request, /* emco_send_request */
53 ef10_mcdi_poll_reboot, /* emco_poll_reboot */
54 ef10_mcdi_poll_response, /* emco_poll_response */
55 ef10_mcdi_read_response, /* emco_read_response */
56 ef10_mcdi_fini, /* emco_fini */
57 ef10_mcdi_feature_supported, /* emco_feature_supported */
58 ef10_mcdi_get_timeout, /* emco_get_timeout */
61 #endif /* EFX_OPTS_EF10() */
65 __checkReturn efx_rc_t
68 __in const efx_mcdi_transport_t *emtp)
70 const efx_mcdi_ops_t *emcop;
73 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
74 EFSYS_ASSERT3U(enp->en_mod_flags, ==, 0);
76 switch (enp->en_family) {
78 case EFX_FAMILY_SIENA:
79 emcop = &__efx_mcdi_siena_ops;
81 #endif /* EFSYS_OPT_SIENA */
83 #if EFSYS_OPT_HUNTINGTON
84 case EFX_FAMILY_HUNTINGTON:
85 emcop = &__efx_mcdi_ef10_ops;
87 #endif /* EFSYS_OPT_HUNTINGTON */
90 case EFX_FAMILY_MEDFORD:
91 emcop = &__efx_mcdi_ef10_ops;
93 #endif /* EFSYS_OPT_MEDFORD */
95 #if EFSYS_OPT_MEDFORD2
96 case EFX_FAMILY_MEDFORD2:
97 emcop = &__efx_mcdi_ef10_ops;
99 #endif /* EFSYS_OPT_MEDFORD2 */
107 if (enp->en_features & EFX_FEATURE_MCDI_DMA) {
108 /* MCDI requires a DMA buffer in host memory */
109 if ((emtp == NULL) || (emtp->emt_dma_mem) == NULL) {
114 enp->en_mcdi.em_emtp = emtp;
116 if (emcop != NULL && emcop->emco_init != NULL) {
117 if ((rc = emcop->emco_init(enp, emtp)) != 0)
121 enp->en_mcdi.em_emcop = emcop;
122 enp->en_mod_flags |= EFX_MOD_MCDI;
131 EFSYS_PROBE1(fail1, efx_rc_t, rc);
133 enp->en_mcdi.em_emcop = NULL;
134 enp->en_mcdi.em_emtp = NULL;
135 enp->en_mod_flags &= ~EFX_MOD_MCDI;
144 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
145 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
147 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
148 EFSYS_ASSERT3U(enp->en_mod_flags, ==, EFX_MOD_MCDI);
150 if (emcop != NULL && emcop->emco_fini != NULL)
151 emcop->emco_fini(enp);
154 emip->emi_aborted = 0;
156 enp->en_mcdi.em_emcop = NULL;
157 enp->en_mod_flags &= ~EFX_MOD_MCDI;
164 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
165 efsys_lock_state_t state;
167 /* Start a new epoch (allow fresh MCDI requests to succeed) */
168 EFSYS_LOCK(enp->en_eslp, state);
169 emip->emi_new_epoch = B_TRUE;
170 EFSYS_UNLOCK(enp->en_eslp, state);
174 efx_mcdi_send_request(
181 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
183 emcop->emco_send_request(enp, hdrp, hdr_len, sdup, sdu_len);
187 efx_mcdi_poll_reboot(
190 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
193 rc = emcop->emco_poll_reboot(enp);
198 efx_mcdi_poll_response(
201 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
204 available = emcop->emco_poll_response(enp);
209 efx_mcdi_read_response(
215 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
217 emcop->emco_read_response(enp, bufferp, offset, length);
221 efx_mcdi_request_start(
223 __in efx_mcdi_req_t *emrp,
224 __in boolean_t ev_cpl)
226 #if EFSYS_OPT_MCDI_LOGGING
227 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
229 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
232 unsigned int max_version;
236 efsys_lock_state_t state;
238 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
239 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
240 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
243 * efx_mcdi_request_start() is naturally serialised against both
244 * efx_mcdi_request_poll() and efx_mcdi_ev_cpl()/efx_mcdi_ev_death(),
245 * by virtue of there only being one outstanding MCDI request.
246 * Unfortunately, upper layers may also call efx_mcdi_request_abort()
247 * at any time, to timeout a pending mcdi request, That request may
248 * then subsequently complete, meaning efx_mcdi_ev_cpl() or
249 * efx_mcdi_ev_death() may end up running in parallel with
250 * efx_mcdi_request_start(). This race is handled by ensuring that
251 * %emi_pending_req, %emi_ev_cpl and %emi_seq are protected by the
254 EFSYS_LOCK(enp->en_eslp, state);
255 EFSYS_ASSERT(emip->emi_pending_req == NULL);
256 emip->emi_pending_req = emrp;
257 emip->emi_ev_cpl = ev_cpl;
258 emip->emi_poll_cnt = 0;
259 seq = emip->emi_seq++ & EFX_MASK32(MCDI_HEADER_SEQ);
260 new_epoch = emip->emi_new_epoch;
261 max_version = emip->emi_max_version;
262 EFSYS_UNLOCK(enp->en_eslp, state);
266 xflags |= MCDI_HEADER_XFLAGS_EVREQ;
269 * Huntington firmware supports MCDIv2, but the Huntington BootROM only
270 * supports MCDIv1. Use MCDIv1 headers for MCDIv1 commands where
271 * possible to support this.
273 if ((max_version >= 2) &&
274 ((emrp->emr_cmd > MC_CMD_CMD_SPACE_ESCAPE_7) ||
275 (emrp->emr_in_length > MCDI_CTL_SDU_LEN_MAX_V1) ||
276 (emrp->emr_out_length > MCDI_CTL_SDU_LEN_MAX_V1))) {
277 /* Construct MCDI v2 header */
278 hdr_len = sizeof (hdr);
279 EFX_POPULATE_DWORD_8(hdr[0],
280 MCDI_HEADER_CODE, MC_CMD_V2_EXTN,
281 MCDI_HEADER_RESYNC, 1,
282 MCDI_HEADER_DATALEN, 0,
283 MCDI_HEADER_SEQ, seq,
284 MCDI_HEADER_NOT_EPOCH, new_epoch ? 0 : 1,
285 MCDI_HEADER_ERROR, 0,
286 MCDI_HEADER_RESPONSE, 0,
287 MCDI_HEADER_XFLAGS, xflags);
289 EFX_POPULATE_DWORD_2(hdr[1],
290 MC_CMD_V2_EXTN_IN_EXTENDED_CMD, emrp->emr_cmd,
291 MC_CMD_V2_EXTN_IN_ACTUAL_LEN, emrp->emr_in_length);
293 /* Construct MCDI v1 header */
294 hdr_len = sizeof (hdr[0]);
295 EFX_POPULATE_DWORD_8(hdr[0],
296 MCDI_HEADER_CODE, emrp->emr_cmd,
297 MCDI_HEADER_RESYNC, 1,
298 MCDI_HEADER_DATALEN, emrp->emr_in_length,
299 MCDI_HEADER_SEQ, seq,
300 MCDI_HEADER_NOT_EPOCH, new_epoch ? 0 : 1,
301 MCDI_HEADER_ERROR, 0,
302 MCDI_HEADER_RESPONSE, 0,
303 MCDI_HEADER_XFLAGS, xflags);
306 #if EFSYS_OPT_MCDI_LOGGING
307 if (emtp->emt_logger != NULL) {
308 emtp->emt_logger(emtp->emt_context, EFX_LOG_MCDI_REQUEST,
310 emrp->emr_in_buf, emrp->emr_in_length);
312 #endif /* EFSYS_OPT_MCDI_LOGGING */
314 efx_mcdi_send_request(enp, &hdr[0], hdr_len,
315 emrp->emr_in_buf, emrp->emr_in_length);
320 efx_mcdi_read_response_header(
322 __inout efx_mcdi_req_t *emrp)
324 #if EFSYS_OPT_MCDI_LOGGING
325 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
326 #endif /* EFSYS_OPT_MCDI_LOGGING */
327 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
329 unsigned int hdr_len;
330 unsigned int data_len;
336 EFSYS_ASSERT(emrp != NULL);
338 efx_mcdi_read_response(enp, &hdr[0], 0, sizeof (hdr[0]));
339 hdr_len = sizeof (hdr[0]);
341 cmd = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_CODE);
342 seq = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_SEQ);
343 error = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_ERROR);
345 if (cmd != MC_CMD_V2_EXTN) {
346 data_len = EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_DATALEN);
348 efx_mcdi_read_response(enp, &hdr[1], hdr_len, sizeof (hdr[1]));
349 hdr_len += sizeof (hdr[1]);
351 cmd = EFX_DWORD_FIELD(hdr[1], MC_CMD_V2_EXTN_IN_EXTENDED_CMD);
353 EFX_DWORD_FIELD(hdr[1], MC_CMD_V2_EXTN_IN_ACTUAL_LEN);
356 if (error && (data_len == 0)) {
357 /* The MC has rebooted since the request was sent. */
358 EFSYS_SPIN(EFX_MCDI_STATUS_SLEEP_US);
359 efx_mcdi_poll_reboot(enp);
363 #if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER
364 if (((cmd != emrp->emr_cmd) && (emrp->emr_cmd != MC_CMD_PROXY_CMD)) ||
366 if ((cmd != emrp->emr_cmd) ||
368 (seq != ((emip->emi_seq - 1) & EFX_MASK32(MCDI_HEADER_SEQ)))) {
369 /* Response is for a different request */
375 unsigned int err_len = MIN(data_len, sizeof (err));
376 int err_code = MC_CMD_ERR_EPROTO;
379 /* Read error code (and arg num for MCDI v2 commands) */
380 efx_mcdi_read_response(enp, &err, hdr_len, err_len);
382 if (err_len >= (MC_CMD_ERR_CODE_OFST + sizeof (efx_dword_t)))
383 err_code = EFX_DWORD_FIELD(err[0], EFX_DWORD_0);
385 if (err_len >= (MC_CMD_ERR_ARG_OFST + sizeof (efx_dword_t)))
386 err_arg = EFX_DWORD_FIELD(err[1], EFX_DWORD_0);
388 emrp->emr_err_code = err_code;
389 emrp->emr_err_arg = err_arg;
391 #if EFSYS_OPT_MCDI_PROXY_AUTH
392 if ((err_code == MC_CMD_ERR_PROXY_PENDING) &&
393 (err_len == sizeof (err))) {
395 * The MCDI request would normally fail with EPERM, but
396 * firmware has forwarded it to an authorization agent
397 * attached to a privileged PF.
399 * Save the authorization request handle. The client
400 * must wait for a PROXY_RESPONSE event, or timeout.
402 emrp->emr_proxy_handle = err_arg;
404 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
406 #if EFSYS_OPT_MCDI_LOGGING
407 if (emtp->emt_logger != NULL) {
408 emtp->emt_logger(emtp->emt_context,
409 EFX_LOG_MCDI_RESPONSE,
413 #endif /* EFSYS_OPT_MCDI_LOGGING */
415 if (!emrp->emr_quiet) {
416 EFSYS_PROBE3(mcdi_err_arg, int, emrp->emr_cmd,
417 int, err_code, int, err_arg);
420 rc = efx_mcdi_request_errcode(err_code);
425 emrp->emr_out_length_used = data_len;
426 #if EFSYS_OPT_MCDI_PROXY_AUTH
427 emrp->emr_proxy_handle = 0;
428 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
435 emrp->emr_out_length_used = 0;
439 efx_mcdi_finish_response(
441 __in efx_mcdi_req_t *emrp)
443 #if EFSYS_OPT_MCDI_LOGGING
444 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
445 #endif /* EFSYS_OPT_MCDI_LOGGING */
447 unsigned int hdr_len;
449 unsigned int resp_off;
450 #if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER
451 unsigned int resp_cmd;
452 boolean_t proxied_cmd_resp = B_FALSE;
453 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */
455 if (emrp->emr_out_buf == NULL)
458 /* Read the command header to detect MCDI response format */
459 hdr_len = sizeof (hdr[0]);
460 efx_mcdi_read_response(enp, &hdr[0], 0, hdr_len);
461 if (EFX_DWORD_FIELD(hdr[0], MCDI_HEADER_CODE) == MC_CMD_V2_EXTN) {
463 * Read the actual payload length. The length given in the event
464 * is only correct for responses with the V1 format.
466 efx_mcdi_read_response(enp, &hdr[1], hdr_len, sizeof (hdr[1]));
467 hdr_len += sizeof (hdr[1]);
470 emrp->emr_out_length_used = EFX_DWORD_FIELD(hdr[1],
471 MC_CMD_V2_EXTN_IN_ACTUAL_LEN);
472 #if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER
474 * A proxy MCDI command is executed by PF on behalf of
475 * one of its VFs. The command to be proxied follows
476 * immediately afterward in the host buffer.
477 * PROXY_CMD inner call complete response should be copied to
478 * output buffer so that it can be returned to the requesting
479 * function in MC_CMD_PROXY_COMPLETE payload.
482 EFX_DWORD_FIELD(hdr[1], MC_CMD_V2_EXTN_IN_EXTENDED_CMD);
483 proxied_cmd_resp = ((emrp->emr_cmd == MC_CMD_PROXY_CMD) &&
484 (resp_cmd != MC_CMD_PROXY_CMD));
485 if (proxied_cmd_resp) {
487 emrp->emr_out_length_used += hdr_len;
489 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */
494 /* Copy payload out into caller supplied buffer */
495 bytes = MIN(emrp->emr_out_length_used, emrp->emr_out_length);
496 efx_mcdi_read_response(enp, emrp->emr_out_buf, resp_off, bytes);
498 #if EFSYS_OPT_MCDI_LOGGING
499 if (emtp->emt_logger != NULL) {
500 emtp->emt_logger(emtp->emt_context,
501 EFX_LOG_MCDI_RESPONSE,
503 emrp->emr_out_buf, bytes);
505 #endif /* EFSYS_OPT_MCDI_LOGGING */
509 __checkReturn boolean_t
510 efx_mcdi_request_poll(
513 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
514 efx_mcdi_req_t *emrp;
515 efsys_lock_state_t state;
518 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
519 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
520 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
522 /* Serialise against post-watchdog efx_mcdi_ev* */
523 EFSYS_LOCK(enp->en_eslp, state);
525 EFSYS_ASSERT(emip->emi_pending_req != NULL);
526 EFSYS_ASSERT(!emip->emi_ev_cpl);
527 emrp = emip->emi_pending_req;
529 /* Check if hardware is unavailable */
530 if (efx_nic_hw_unavailable(enp)) {
531 EFSYS_UNLOCK(enp->en_eslp, state);
535 /* Check for reboot atomically w.r.t efx_mcdi_request_start */
536 if (emip->emi_poll_cnt++ == 0) {
537 if ((rc = efx_mcdi_poll_reboot(enp)) != 0) {
538 emip->emi_pending_req = NULL;
539 EFSYS_UNLOCK(enp->en_eslp, state);
541 /* Reboot/Assertion */
542 if (rc == EIO || rc == EINTR)
543 efx_mcdi_raise_exception(enp, emrp, rc);
549 /* Check if a response is available */
550 if (efx_mcdi_poll_response(enp) == B_FALSE) {
551 EFSYS_UNLOCK(enp->en_eslp, state);
555 /* Read the response header */
556 efx_mcdi_read_response_header(enp, emrp);
558 /* Request complete */
559 emip->emi_pending_req = NULL;
561 /* Ensure stale MCDI requests fail after an MC reboot. */
562 emip->emi_new_epoch = B_FALSE;
564 EFSYS_UNLOCK(enp->en_eslp, state);
566 if ((rc = emrp->emr_rc) != 0)
569 efx_mcdi_finish_response(enp, emrp);
573 if (!emrp->emr_quiet)
576 if (!emrp->emr_quiet)
577 EFSYS_PROBE1(fail1, efx_rc_t, rc);
582 __checkReturn boolean_t
583 efx_mcdi_request_abort(
586 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
587 efx_mcdi_req_t *emrp;
589 efsys_lock_state_t state;
591 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
592 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
593 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
596 * efx_mcdi_ev_* may have already completed this event, and be
597 * spinning/blocked on the upper layer lock. So it *is* legitimate
598 * to for emi_pending_req to be NULL. If there is a pending event
599 * completed request, then provide a "credit" to allow
600 * efx_mcdi_ev_cpl() to accept a single spurious completion.
602 EFSYS_LOCK(enp->en_eslp, state);
603 emrp = emip->emi_pending_req;
604 aborted = (emrp != NULL);
606 emip->emi_pending_req = NULL;
608 /* Error the request */
609 emrp->emr_out_length_used = 0;
610 emrp->emr_rc = ETIMEDOUT;
612 /* Provide a credit for seqno/emr_pending_req mismatches */
613 if (emip->emi_ev_cpl)
617 * The upper layer has called us, so we don't
618 * need to complete the request.
621 EFSYS_UNLOCK(enp->en_eslp, state);
627 efx_mcdi_get_timeout(
629 __in efx_mcdi_req_t *emrp,
630 __out uint32_t *timeoutp)
632 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
634 emcop->emco_get_timeout(enp, emrp, timeoutp);
637 __checkReturn efx_rc_t
638 efx_mcdi_request_errcode(
639 __in unsigned int err)
644 case MC_CMD_ERR_EPERM:
646 case MC_CMD_ERR_ENOENT:
648 case MC_CMD_ERR_EINTR:
650 case MC_CMD_ERR_EACCES:
652 case MC_CMD_ERR_EBUSY:
654 case MC_CMD_ERR_EINVAL:
656 case MC_CMD_ERR_EDEADLK:
658 case MC_CMD_ERR_ENOSYS:
660 case MC_CMD_ERR_ETIME:
662 case MC_CMD_ERR_ENOTSUP:
664 case MC_CMD_ERR_EALREADY:
668 case MC_CMD_ERR_EEXIST:
670 #ifdef MC_CMD_ERR_EAGAIN
671 case MC_CMD_ERR_EAGAIN:
674 #ifdef MC_CMD_ERR_ENOSPC
675 case MC_CMD_ERR_ENOSPC:
678 case MC_CMD_ERR_ERANGE:
681 case MC_CMD_ERR_ALLOC_FAIL:
683 case MC_CMD_ERR_NO_VADAPTOR:
685 case MC_CMD_ERR_NO_EVB_PORT:
687 case MC_CMD_ERR_NO_VSWITCH:
689 case MC_CMD_ERR_VLAN_LIMIT:
691 case MC_CMD_ERR_BAD_PCI_FUNC:
693 case MC_CMD_ERR_BAD_VLAN_MODE:
695 case MC_CMD_ERR_BAD_VSWITCH_TYPE:
697 case MC_CMD_ERR_BAD_VPORT_TYPE:
699 case MC_CMD_ERR_MAC_EXIST:
702 case MC_CMD_ERR_PROXY_PENDING:
706 EFSYS_PROBE1(mc_pcol_error, int, err);
712 efx_mcdi_raise_exception(
714 __in_opt efx_mcdi_req_t *emrp,
717 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
718 efx_mcdi_exception_t exception;
720 /* Reboot or Assertion failure only */
721 EFSYS_ASSERT(rc == EIO || rc == EINTR);
724 * If MC_CMD_REBOOT causes a reboot (dependent on parameters),
725 * then the EIO is not worthy of an exception.
727 if (emrp != NULL && emrp->emr_cmd == MC_CMD_REBOOT && rc == EIO)
730 exception = (rc == EIO)
731 ? EFX_MCDI_EXCEPTION_MC_REBOOT
732 : EFX_MCDI_EXCEPTION_MC_BADASSERT;
734 emtp->emt_exception(emtp->emt_context, exception);
740 __inout efx_mcdi_req_t *emrp)
742 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
744 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
745 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
747 emrp->emr_quiet = B_FALSE;
748 emtp->emt_execute(emtp->emt_context, emrp);
752 efx_mcdi_execute_quiet(
754 __inout efx_mcdi_req_t *emrp)
756 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
758 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
759 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
761 emrp->emr_quiet = B_TRUE;
762 emtp->emt_execute(emtp->emt_context, emrp);
768 __in unsigned int seq,
769 __in unsigned int outlen,
772 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
773 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
774 efx_mcdi_req_t *emrp;
775 efsys_lock_state_t state;
777 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_MCDI);
778 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
781 * Serialise against efx_mcdi_request_poll()/efx_mcdi_request_start()
782 * when we're completing an aborted request.
784 EFSYS_LOCK(enp->en_eslp, state);
785 if (emip->emi_pending_req == NULL || !emip->emi_ev_cpl ||
786 (seq != ((emip->emi_seq - 1) & EFX_MASK32(MCDI_HEADER_SEQ)))) {
787 EFSYS_ASSERT(emip->emi_aborted > 0);
788 if (emip->emi_aborted > 0)
790 EFSYS_UNLOCK(enp->en_eslp, state);
794 emrp = emip->emi_pending_req;
795 emip->emi_pending_req = NULL;
796 EFSYS_UNLOCK(enp->en_eslp, state);
798 if (emip->emi_max_version >= 2) {
799 /* MCDIv2 response details do not fit into an event. */
800 efx_mcdi_read_response_header(enp, emrp);
803 if (!emrp->emr_quiet) {
804 EFSYS_PROBE2(mcdi_err, int, emrp->emr_cmd,
807 emrp->emr_out_length_used = 0;
808 emrp->emr_rc = efx_mcdi_request_errcode(errcode);
810 emrp->emr_out_length_used = outlen;
814 if (emrp->emr_rc == 0)
815 efx_mcdi_finish_response(enp, emrp);
817 emtp->emt_ev_cpl(emtp->emt_context);
820 #if EFSYS_OPT_MCDI_PROXY_AUTH
822 __checkReturn efx_rc_t
823 efx_mcdi_get_proxy_handle(
825 __in efx_mcdi_req_t *emrp,
826 __out uint32_t *handlep)
830 _NOTE(ARGUNUSED(enp))
833 * Return proxy handle from MCDI request that returned with error
834 * MC_MCD_ERR_PROXY_PENDING. This handle is used to wait for a matching
835 * PROXY_RESPONSE event.
837 if ((emrp == NULL) || (handlep == NULL)) {
841 if ((emrp->emr_rc != 0) &&
842 (emrp->emr_err_code == MC_CMD_ERR_PROXY_PENDING)) {
843 *handlep = emrp->emr_proxy_handle;
852 EFSYS_PROBE1(fail1, efx_rc_t, rc);
857 efx_mcdi_ev_proxy_response(
859 __in unsigned int handle,
860 __in unsigned int status)
862 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
866 * Handle results of an authorization request for a privileged MCDI
867 * command. If authorization was granted then we must re-issue the
868 * original MCDI request. If authorization failed or timed out,
869 * then the original MCDI request should be completed with the
870 * result code from this event.
872 rc = (status == 0) ? 0 : efx_mcdi_request_errcode(status);
874 emtp->emt_ev_proxy_response(emtp->emt_context, handle, rc);
876 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH */
878 #if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER
880 efx_mcdi_ev_proxy_request(
882 __in unsigned int index)
884 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
886 if (emtp->emt_ev_proxy_request != NULL)
887 emtp->emt_ev_proxy_request(emtp->emt_context, index);
889 #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */
895 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
896 const efx_mcdi_transport_t *emtp = enp->en_mcdi.em_emtp;
897 efx_mcdi_req_t *emrp = NULL;
899 efsys_lock_state_t state;
902 * The MCDI request (if there is one) has been terminated, either
903 * by a BADASSERT or REBOOT event.
905 * If there is an outstanding event-completed MCDI operation, then we
906 * will never receive the completion event (because both MCDI
907 * completions and BADASSERT events are sent to the same evq). So
908 * complete this MCDI op.
910 * This function might run in parallel with efx_mcdi_request_poll()
911 * for poll completed mcdi requests, and also with
912 * efx_mcdi_request_start() for post-watchdog completions.
914 EFSYS_LOCK(enp->en_eslp, state);
915 emrp = emip->emi_pending_req;
916 ev_cpl = emip->emi_ev_cpl;
917 if (emrp != NULL && emip->emi_ev_cpl) {
918 emip->emi_pending_req = NULL;
920 emrp->emr_out_length_used = 0;
926 * Since we're running in parallel with a request, consume the
927 * status word before dropping the lock.
929 if (rc == EIO || rc == EINTR) {
930 EFSYS_SPIN(EFX_MCDI_STATUS_SLEEP_US);
931 (void) efx_mcdi_poll_reboot(enp);
932 emip->emi_new_epoch = B_TRUE;
935 EFSYS_UNLOCK(enp->en_eslp, state);
937 efx_mcdi_raise_exception(enp, emrp, rc);
939 if (emrp != NULL && ev_cpl)
940 emtp->emt_ev_cpl(emtp->emt_context);
943 __checkReturn efx_rc_t
946 __out_ecount_opt(4) uint16_t versionp[4],
947 __out_opt uint32_t *buildp,
948 __out_opt efx_mcdi_boot_t *statusp)
951 EFX_MCDI_DECLARE_BUF(payload,
952 MAX(MC_CMD_GET_VERSION_IN_LEN, MC_CMD_GET_BOOT_STATUS_IN_LEN),
953 MAX(MC_CMD_GET_VERSION_OUT_LEN,
954 MC_CMD_GET_BOOT_STATUS_OUT_LEN));
955 efx_word_t *ver_words;
958 efx_mcdi_boot_t status;
961 EFSYS_ASSERT3U(enp->en_features, &, EFX_FEATURE_MCDI);
963 req.emr_cmd = MC_CMD_GET_VERSION;
964 req.emr_in_buf = payload;
965 req.emr_in_length = MC_CMD_GET_VERSION_IN_LEN;
966 req.emr_out_buf = payload;
967 req.emr_out_length = MC_CMD_GET_VERSION_OUT_LEN;
969 efx_mcdi_execute(enp, &req);
971 if (req.emr_rc != 0) {
976 /* bootrom support */
977 if (req.emr_out_length_used == MC_CMD_GET_VERSION_V0_OUT_LEN) {
978 version[0] = version[1] = version[2] = version[3] = 0;
979 build = MCDI_OUT_DWORD(req, GET_VERSION_OUT_FIRMWARE);
984 if (req.emr_out_length_used < MC_CMD_GET_VERSION_OUT_LEN) {
989 ver_words = MCDI_OUT2(req, efx_word_t, GET_VERSION_OUT_VERSION);
990 version[0] = EFX_WORD_FIELD(ver_words[0], EFX_WORD_0);
991 version[1] = EFX_WORD_FIELD(ver_words[1], EFX_WORD_0);
992 version[2] = EFX_WORD_FIELD(ver_words[2], EFX_WORD_0);
993 version[3] = EFX_WORD_FIELD(ver_words[3], EFX_WORD_0);
994 build = MCDI_OUT_DWORD(req, GET_VERSION_OUT_FIRMWARE);
997 /* The bootrom doesn't understand BOOT_STATUS */
998 if (MC_FW_VERSION_IS_BOOTLOADER(build)) {
999 status = EFX_MCDI_BOOT_ROM;
1003 (void) memset(payload, 0, sizeof (payload));
1004 req.emr_cmd = MC_CMD_GET_BOOT_STATUS;
1005 req.emr_in_buf = payload;
1006 req.emr_in_length = MC_CMD_GET_BOOT_STATUS_IN_LEN;
1007 req.emr_out_buf = payload;
1008 req.emr_out_length = MC_CMD_GET_BOOT_STATUS_OUT_LEN;
1010 efx_mcdi_execute_quiet(enp, &req);
1012 if (req.emr_rc == EACCES) {
1013 /* Unprivileged functions cannot access BOOT_STATUS */
1014 status = EFX_MCDI_BOOT_PRIMARY;
1015 version[0] = version[1] = version[2] = version[3] = 0;
1020 if (req.emr_rc != 0) {
1025 if (req.emr_out_length_used < MC_CMD_GET_BOOT_STATUS_OUT_LEN) {
1030 if (MCDI_OUT_DWORD_FIELD(req, GET_BOOT_STATUS_OUT_FLAGS,
1031 GET_BOOT_STATUS_OUT_FLAGS_PRIMARY))
1032 status = EFX_MCDI_BOOT_PRIMARY;
1034 status = EFX_MCDI_BOOT_SECONDARY;
1037 if (versionp != NULL)
1038 memcpy(versionp, version, sizeof (version));
1041 if (statusp != NULL)
1053 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1058 __checkReturn efx_rc_t
1059 efx_mcdi_get_capabilities(
1060 __in efx_nic_t *enp,
1061 __out_opt uint32_t *flagsp,
1062 __out_opt uint16_t *rx_dpcpu_fw_idp,
1063 __out_opt uint16_t *tx_dpcpu_fw_idp,
1064 __out_opt uint32_t *flags2p,
1065 __out_opt uint32_t *tso2ncp)
1068 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_CAPABILITIES_IN_LEN,
1069 MC_CMD_GET_CAPABILITIES_V2_OUT_LEN);
1070 boolean_t v2_capable;
1073 req.emr_cmd = MC_CMD_GET_CAPABILITIES;
1074 req.emr_in_buf = payload;
1075 req.emr_in_length = MC_CMD_GET_CAPABILITIES_IN_LEN;
1076 req.emr_out_buf = payload;
1077 req.emr_out_length = MC_CMD_GET_CAPABILITIES_V2_OUT_LEN;
1079 efx_mcdi_execute_quiet(enp, &req);
1081 if (req.emr_rc != 0) {
1086 if (req.emr_out_length_used < MC_CMD_GET_CAPABILITIES_OUT_LEN) {
1092 *flagsp = MCDI_OUT_DWORD(req, GET_CAPABILITIES_OUT_FLAGS1);
1094 if (rx_dpcpu_fw_idp != NULL)
1095 *rx_dpcpu_fw_idp = MCDI_OUT_WORD(req,
1096 GET_CAPABILITIES_OUT_RX_DPCPU_FW_ID);
1098 if (tx_dpcpu_fw_idp != NULL)
1099 *tx_dpcpu_fw_idp = MCDI_OUT_WORD(req,
1100 GET_CAPABILITIES_OUT_TX_DPCPU_FW_ID);
1102 if (req.emr_out_length_used < MC_CMD_GET_CAPABILITIES_V2_OUT_LEN)
1103 v2_capable = B_FALSE;
1105 v2_capable = B_TRUE;
1107 if (flags2p != NULL) {
1108 *flags2p = (v2_capable) ?
1109 MCDI_OUT_DWORD(req, GET_CAPABILITIES_V2_OUT_FLAGS2) :
1113 if (tso2ncp != NULL) {
1114 *tso2ncp = (v2_capable) ?
1116 GET_CAPABILITIES_V2_OUT_TX_TSO_V2_N_CONTEXTS) :
1125 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1130 static __checkReturn efx_rc_t
1132 __in efx_nic_t *enp,
1133 __in boolean_t after_assertion)
1135 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_REBOOT_IN_LEN,
1136 MC_CMD_REBOOT_OUT_LEN);
1141 * We could require the caller to have caused en_mod_flags=0 to
1142 * call this function. This doesn't help the other port though,
1143 * who's about to get the MC ripped out from underneath them.
1144 * Since they have to cope with the subsequent fallout of MCDI
1145 * failures, we should as well.
1147 EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
1149 req.emr_cmd = MC_CMD_REBOOT;
1150 req.emr_in_buf = payload;
1151 req.emr_in_length = MC_CMD_REBOOT_IN_LEN;
1152 req.emr_out_buf = payload;
1153 req.emr_out_length = MC_CMD_REBOOT_OUT_LEN;
1155 MCDI_IN_SET_DWORD(req, REBOOT_IN_FLAGS,
1156 (after_assertion ? MC_CMD_REBOOT_FLAGS_AFTER_ASSERTION : 0));
1158 efx_mcdi_execute_quiet(enp, &req);
1160 if (req.emr_rc == EACCES) {
1161 /* Unprivileged functions cannot reboot the MC. */
1165 /* A successful reboot request returns EIO. */
1166 if (req.emr_rc != 0 && req.emr_rc != EIO) {
1175 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1180 __checkReturn efx_rc_t
1182 __in efx_nic_t *enp)
1184 return (efx_mcdi_do_reboot(enp, B_FALSE));
1187 __checkReturn efx_rc_t
1188 efx_mcdi_exit_assertion_handler(
1189 __in efx_nic_t *enp)
1191 return (efx_mcdi_do_reboot(enp, B_TRUE));
1194 __checkReturn efx_rc_t
1195 efx_mcdi_read_assertion(
1196 __in efx_nic_t *enp)
1199 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_ASSERTS_IN_LEN,
1200 MC_CMD_GET_ASSERTS_OUT_LEN);
1209 * Before we attempt to chat to the MC, we should verify that the MC
1210 * isn't in it's assertion handler, either due to a previous reboot,
1211 * or because we're reinitializing due to an eec_exception().
1213 * Use GET_ASSERTS to read any assertion state that may be present.
1214 * Retry this command twice. Once because a boot-time assertion failure
1215 * might cause the 1st MCDI request to fail. And once again because
1216 * we might race with efx_mcdi_exit_assertion_handler() running on
1217 * partner port(s) on the same NIC.
1221 (void) memset(payload, 0, sizeof (payload));
1222 req.emr_cmd = MC_CMD_GET_ASSERTS;
1223 req.emr_in_buf = payload;
1224 req.emr_in_length = MC_CMD_GET_ASSERTS_IN_LEN;
1225 req.emr_out_buf = payload;
1226 req.emr_out_length = MC_CMD_GET_ASSERTS_OUT_LEN;
1228 MCDI_IN_SET_DWORD(req, GET_ASSERTS_IN_CLEAR, 1);
1229 efx_mcdi_execute_quiet(enp, &req);
1231 } while ((req.emr_rc == EINTR || req.emr_rc == EIO) && retry-- > 0);
1233 if (req.emr_rc != 0) {
1234 if (req.emr_rc == EACCES) {
1235 /* Unprivileged functions cannot clear assertions. */
1242 if (req.emr_out_length_used < MC_CMD_GET_ASSERTS_OUT_LEN) {
1247 /* Print out any assertion state recorded */
1248 flags = MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_GLOBAL_FLAGS);
1249 if (flags == MC_CMD_GET_ASSERTS_FLAGS_NO_FAILS)
1252 reason = (flags == MC_CMD_GET_ASSERTS_FLAGS_SYS_FAIL)
1253 ? "system-level assertion"
1254 : (flags == MC_CMD_GET_ASSERTS_FLAGS_THR_FAIL)
1255 ? "thread-level assertion"
1256 : (flags == MC_CMD_GET_ASSERTS_FLAGS_WDOG_FIRED)
1258 : (flags == MC_CMD_GET_ASSERTS_FLAGS_ADDR_TRAP)
1259 ? "illegal address trap"
1260 : "unknown assertion";
1261 EFSYS_PROBE3(mcpu_assertion,
1262 const char *, reason, unsigned int,
1263 MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_SAVED_PC_OFFS),
1265 MCDI_OUT_DWORD(req, GET_ASSERTS_OUT_THREAD_OFFS));
1267 /* Print out the registers (r1 ... r31) */
1268 ofst = MC_CMD_GET_ASSERTS_OUT_GP_REGS_OFFS_OFST;
1270 index < 1 + MC_CMD_GET_ASSERTS_OUT_GP_REGS_OFFS_NUM;
1272 EFSYS_PROBE2(mcpu_register, unsigned int, index, unsigned int,
1273 EFX_DWORD_FIELD(*MCDI_OUT(req, efx_dword_t, ofst),
1275 ofst += sizeof (efx_dword_t);
1277 EFSYS_ASSERT(ofst <= MC_CMD_GET_ASSERTS_OUT_LEN);
1285 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1292 * Internal routines for for specific MCDI requests.
1295 __checkReturn efx_rc_t
1296 efx_mcdi_drv_attach(
1297 __in efx_nic_t *enp,
1298 __in boolean_t attach)
1301 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_DRV_ATTACH_IN_V2_LEN,
1302 MC_CMD_DRV_ATTACH_EXT_OUT_LEN);
1305 req.emr_cmd = MC_CMD_DRV_ATTACH;
1306 req.emr_in_buf = payload;
1307 if (enp->en_drv_version[0] == '\0') {
1308 req.emr_in_length = MC_CMD_DRV_ATTACH_IN_LEN;
1310 req.emr_in_length = MC_CMD_DRV_ATTACH_IN_V2_LEN;
1312 req.emr_out_buf = payload;
1313 req.emr_out_length = MC_CMD_DRV_ATTACH_EXT_OUT_LEN;
1316 * Typically, client drivers use DONT_CARE for the datapath firmware
1317 * type to ensure that the driver can attach to an unprivileged
1318 * function. The datapath firmware type to use is controlled by the
1320 * If a client driver wishes to attach with a specific datapath firmware
1321 * type, that can be passed in second argument of efx_nic_probe API. One
1322 * such example is the ESXi native driver that attempts attaching with
1323 * FULL_FEATURED datapath firmware type first and fall backs to
1324 * DONT_CARE datapath firmware type if MC_CMD_DRV_ATTACH fails.
1326 MCDI_IN_POPULATE_DWORD_2(req, DRV_ATTACH_IN_NEW_STATE,
1327 DRV_ATTACH_IN_ATTACH, attach ? 1 : 0,
1328 DRV_ATTACH_IN_SUBVARIANT_AWARE, EFSYS_OPT_FW_SUBVARIANT_AWARE);
1329 MCDI_IN_SET_DWORD(req, DRV_ATTACH_IN_UPDATE, 1);
1330 MCDI_IN_SET_DWORD(req, DRV_ATTACH_IN_FIRMWARE_ID, enp->efv);
1332 if (req.emr_in_length >= MC_CMD_DRV_ATTACH_IN_V2_LEN) {
1333 EFX_STATIC_ASSERT(sizeof (enp->en_drv_version) ==
1334 MC_CMD_DRV_ATTACH_IN_V2_DRIVER_VERSION_LEN);
1335 memcpy(MCDI_IN2(req, char, DRV_ATTACH_IN_V2_DRIVER_VERSION),
1336 enp->en_drv_version,
1337 MC_CMD_DRV_ATTACH_IN_V2_DRIVER_VERSION_LEN);
1340 efx_mcdi_execute(enp, &req);
1342 if (req.emr_rc != 0) {
1347 if (req.emr_out_length_used < MC_CMD_DRV_ATTACH_OUT_LEN) {
1357 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1362 __checkReturn efx_rc_t
1363 efx_mcdi_get_board_cfg(
1364 __in efx_nic_t *enp,
1365 __out_opt uint32_t *board_typep,
1366 __out_opt efx_dword_t *capabilitiesp,
1367 __out_ecount_opt(6) uint8_t mac_addrp[6])
1369 efx_mcdi_iface_t *emip = &(enp->en_mcdi.em_emip);
1371 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_BOARD_CFG_IN_LEN,
1372 MC_CMD_GET_BOARD_CFG_OUT_LENMIN);
1375 req.emr_cmd = MC_CMD_GET_BOARD_CFG;
1376 req.emr_in_buf = payload;
1377 req.emr_in_length = MC_CMD_GET_BOARD_CFG_IN_LEN;
1378 req.emr_out_buf = payload;
1379 req.emr_out_length = MC_CMD_GET_BOARD_CFG_OUT_LENMIN;
1381 efx_mcdi_execute(enp, &req);
1383 if (req.emr_rc != 0) {
1388 if (req.emr_out_length_used < MC_CMD_GET_BOARD_CFG_OUT_LENMIN) {
1393 if (mac_addrp != NULL) {
1396 if (emip->emi_port == 1) {
1397 addrp = MCDI_OUT2(req, uint8_t,
1398 GET_BOARD_CFG_OUT_MAC_ADDR_BASE_PORT0);
1399 } else if (emip->emi_port == 2) {
1400 addrp = MCDI_OUT2(req, uint8_t,
1401 GET_BOARD_CFG_OUT_MAC_ADDR_BASE_PORT1);
1407 EFX_MAC_ADDR_COPY(mac_addrp, addrp);
1410 if (capabilitiesp != NULL) {
1411 if (emip->emi_port == 1) {
1412 *capabilitiesp = *MCDI_OUT2(req, efx_dword_t,
1413 GET_BOARD_CFG_OUT_CAPABILITIES_PORT0);
1414 } else if (emip->emi_port == 2) {
1415 *capabilitiesp = *MCDI_OUT2(req, efx_dword_t,
1416 GET_BOARD_CFG_OUT_CAPABILITIES_PORT1);
1423 if (board_typep != NULL) {
1424 *board_typep = MCDI_OUT_DWORD(req,
1425 GET_BOARD_CFG_OUT_BOARD_TYPE);
1437 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1442 __checkReturn efx_rc_t
1443 efx_mcdi_get_resource_limits(
1444 __in efx_nic_t *enp,
1445 __out_opt uint32_t *nevqp,
1446 __out_opt uint32_t *nrxqp,
1447 __out_opt uint32_t *ntxqp)
1450 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_RESOURCE_LIMITS_IN_LEN,
1451 MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN);
1454 req.emr_cmd = MC_CMD_GET_RESOURCE_LIMITS;
1455 req.emr_in_buf = payload;
1456 req.emr_in_length = MC_CMD_GET_RESOURCE_LIMITS_IN_LEN;
1457 req.emr_out_buf = payload;
1458 req.emr_out_length = MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN;
1460 efx_mcdi_execute(enp, &req);
1462 if (req.emr_rc != 0) {
1467 if (req.emr_out_length_used < MC_CMD_GET_RESOURCE_LIMITS_OUT_LEN) {
1473 *nevqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_EVQ);
1475 *nrxqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_RXQ);
1477 *ntxqp = MCDI_OUT_DWORD(req, GET_RESOURCE_LIMITS_OUT_TXQ);
1484 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1489 __checkReturn efx_rc_t
1490 efx_mcdi_get_phy_cfg(
1491 __in efx_nic_t *enp)
1493 efx_port_t *epp = &(enp->en_port);
1494 efx_nic_cfg_t *encp = &(enp->en_nic_cfg);
1496 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_PHY_CFG_IN_LEN,
1497 MC_CMD_GET_PHY_CFG_OUT_LEN);
1502 uint32_t phy_media_type;
1505 req.emr_cmd = MC_CMD_GET_PHY_CFG;
1506 req.emr_in_buf = payload;
1507 req.emr_in_length = MC_CMD_GET_PHY_CFG_IN_LEN;
1508 req.emr_out_buf = payload;
1509 req.emr_out_length = MC_CMD_GET_PHY_CFG_OUT_LEN;
1511 efx_mcdi_execute(enp, &req);
1513 if (req.emr_rc != 0) {
1518 if (req.emr_out_length_used < MC_CMD_GET_PHY_CFG_OUT_LEN) {
1523 encp->enc_phy_type = MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_TYPE);
1525 namep = MCDI_OUT2(req, char, GET_PHY_CFG_OUT_NAME);
1526 namelen = MIN(sizeof (encp->enc_phy_name) - 1,
1527 strnlen(namep, MC_CMD_GET_PHY_CFG_OUT_NAME_LEN));
1528 (void) memset(encp->enc_phy_name, 0,
1529 sizeof (encp->enc_phy_name));
1530 memcpy(encp->enc_phy_name, namep, namelen);
1531 #endif /* EFSYS_OPT_NAMES */
1532 (void) memset(encp->enc_phy_revision, 0,
1533 sizeof (encp->enc_phy_revision));
1534 memcpy(encp->enc_phy_revision,
1535 MCDI_OUT2(req, char, GET_PHY_CFG_OUT_REVISION),
1536 MIN(sizeof (encp->enc_phy_revision) - 1,
1537 MC_CMD_GET_PHY_CFG_OUT_REVISION_LEN));
1538 #if EFSYS_OPT_PHY_LED_CONTROL
1539 encp->enc_led_mask = ((1 << EFX_PHY_LED_DEFAULT) |
1540 (1 << EFX_PHY_LED_OFF) |
1541 (1 << EFX_PHY_LED_ON));
1542 #endif /* EFSYS_OPT_PHY_LED_CONTROL */
1544 /* Get the media type of the fixed port, if recognised. */
1545 EFX_STATIC_ASSERT(MC_CMD_MEDIA_XAUI == EFX_PHY_MEDIA_XAUI);
1546 EFX_STATIC_ASSERT(MC_CMD_MEDIA_CX4 == EFX_PHY_MEDIA_CX4);
1547 EFX_STATIC_ASSERT(MC_CMD_MEDIA_KX4 == EFX_PHY_MEDIA_KX4);
1548 EFX_STATIC_ASSERT(MC_CMD_MEDIA_XFP == EFX_PHY_MEDIA_XFP);
1549 EFX_STATIC_ASSERT(MC_CMD_MEDIA_SFP_PLUS == EFX_PHY_MEDIA_SFP_PLUS);
1550 EFX_STATIC_ASSERT(MC_CMD_MEDIA_BASE_T == EFX_PHY_MEDIA_BASE_T);
1551 EFX_STATIC_ASSERT(MC_CMD_MEDIA_QSFP_PLUS == EFX_PHY_MEDIA_QSFP_PLUS);
1552 phy_media_type = MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_MEDIA_TYPE);
1553 epp->ep_fixed_port_type = (efx_phy_media_type_t)phy_media_type;
1554 if (epp->ep_fixed_port_type >= EFX_PHY_MEDIA_NTYPES)
1555 epp->ep_fixed_port_type = EFX_PHY_MEDIA_INVALID;
1557 epp->ep_phy_cap_mask =
1558 MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_SUPPORTED_CAP);
1559 #if EFSYS_OPT_PHY_FLAGS
1560 encp->enc_phy_flags_mask = MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_FLAGS);
1561 #endif /* EFSYS_OPT_PHY_FLAGS */
1563 encp->enc_port = (uint8_t)MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_PRT);
1565 /* Populate internal state */
1566 encp->enc_mcdi_mdio_channel =
1567 (uint8_t)MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_CHANNEL);
1569 #if EFSYS_OPT_PHY_STATS
1570 encp->enc_mcdi_phy_stat_mask =
1571 MCDI_OUT_DWORD(req, GET_PHY_CFG_OUT_STATS_MASK);
1572 #endif /* EFSYS_OPT_PHY_STATS */
1575 encp->enc_bist_mask = 0;
1576 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1577 GET_PHY_CFG_OUT_BIST_CABLE_SHORT))
1578 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_CABLE_SHORT);
1579 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1580 GET_PHY_CFG_OUT_BIST_CABLE_LONG))
1581 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_CABLE_LONG);
1582 if (MCDI_OUT_DWORD_FIELD(req, GET_PHY_CFG_OUT_FLAGS,
1583 GET_PHY_CFG_OUT_BIST))
1584 encp->enc_bist_mask |= (1 << EFX_BIST_TYPE_PHY_NORMAL);
1585 #endif /* EFSYS_OPT_BIST */
1592 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1597 __checkReturn efx_rc_t
1598 efx_mcdi_firmware_update_supported(
1599 __in efx_nic_t *enp,
1600 __out boolean_t *supportedp)
1602 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1605 if (emcop != NULL) {
1606 if ((rc = emcop->emco_feature_supported(enp,
1607 EFX_MCDI_FEATURE_FW_UPDATE, supportedp)) != 0)
1610 /* Earlier devices always supported updates */
1611 *supportedp = B_TRUE;
1617 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1622 __checkReturn efx_rc_t
1623 efx_mcdi_macaddr_change_supported(
1624 __in efx_nic_t *enp,
1625 __out boolean_t *supportedp)
1627 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1630 if (emcop != NULL) {
1631 if ((rc = emcop->emco_feature_supported(enp,
1632 EFX_MCDI_FEATURE_MACADDR_CHANGE, supportedp)) != 0)
1635 /* Earlier devices always supported MAC changes */
1636 *supportedp = B_TRUE;
1642 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1647 __checkReturn efx_rc_t
1648 efx_mcdi_link_control_supported(
1649 __in efx_nic_t *enp,
1650 __out boolean_t *supportedp)
1652 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1655 if (emcop != NULL) {
1656 if ((rc = emcop->emco_feature_supported(enp,
1657 EFX_MCDI_FEATURE_LINK_CONTROL, supportedp)) != 0)
1660 /* Earlier devices always supported link control */
1661 *supportedp = B_TRUE;
1667 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1672 __checkReturn efx_rc_t
1673 efx_mcdi_mac_spoofing_supported(
1674 __in efx_nic_t *enp,
1675 __out boolean_t *supportedp)
1677 const efx_mcdi_ops_t *emcop = enp->en_mcdi.em_emcop;
1680 if (emcop != NULL) {
1681 if ((rc = emcop->emco_feature_supported(enp,
1682 EFX_MCDI_FEATURE_MAC_SPOOFING, supportedp)) != 0)
1685 /* Earlier devices always supported MAC spoofing */
1686 *supportedp = B_TRUE;
1692 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1701 * Enter bist offline mode. This is a fw mode which puts the NIC into a state
1702 * where memory BIST tests can be run and not much else can interfere or happen.
1703 * A reboot is required to exit this mode.
1705 __checkReturn efx_rc_t
1706 efx_mcdi_bist_enable_offline(
1707 __in efx_nic_t *enp)
1712 EFX_STATIC_ASSERT(MC_CMD_ENABLE_OFFLINE_BIST_IN_LEN == 0);
1713 EFX_STATIC_ASSERT(MC_CMD_ENABLE_OFFLINE_BIST_OUT_LEN == 0);
1715 req.emr_cmd = MC_CMD_ENABLE_OFFLINE_BIST;
1716 req.emr_in_buf = NULL;
1717 req.emr_in_length = 0;
1718 req.emr_out_buf = NULL;
1719 req.emr_out_length = 0;
1721 efx_mcdi_execute(enp, &req);
1723 if (req.emr_rc != 0) {
1731 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1735 #endif /* EFX_OPTS_EF10() */
1737 __checkReturn efx_rc_t
1738 efx_mcdi_bist_start(
1739 __in efx_nic_t *enp,
1740 __in efx_bist_type_t type)
1743 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_START_BIST_IN_LEN,
1744 MC_CMD_START_BIST_OUT_LEN);
1747 req.emr_cmd = MC_CMD_START_BIST;
1748 req.emr_in_buf = payload;
1749 req.emr_in_length = MC_CMD_START_BIST_IN_LEN;
1750 req.emr_out_buf = payload;
1751 req.emr_out_length = MC_CMD_START_BIST_OUT_LEN;
1754 case EFX_BIST_TYPE_PHY_NORMAL:
1755 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE, MC_CMD_PHY_BIST);
1757 case EFX_BIST_TYPE_PHY_CABLE_SHORT:
1758 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1759 MC_CMD_PHY_BIST_CABLE_SHORT);
1761 case EFX_BIST_TYPE_PHY_CABLE_LONG:
1762 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1763 MC_CMD_PHY_BIST_CABLE_LONG);
1765 case EFX_BIST_TYPE_MC_MEM:
1766 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1767 MC_CMD_MC_MEM_BIST);
1769 case EFX_BIST_TYPE_SAT_MEM:
1770 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1771 MC_CMD_PORT_MEM_BIST);
1773 case EFX_BIST_TYPE_REG:
1774 MCDI_IN_SET_DWORD(req, START_BIST_IN_TYPE,
1781 efx_mcdi_execute(enp, &req);
1783 if (req.emr_rc != 0) {
1791 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1796 #endif /* EFSYS_OPT_BIST */
1799 /* Enable logging of some events (e.g. link state changes) */
1800 __checkReturn efx_rc_t
1802 __in efx_nic_t *enp)
1805 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_LOG_CTRL_IN_LEN,
1806 MC_CMD_LOG_CTRL_OUT_LEN);
1809 req.emr_cmd = MC_CMD_LOG_CTRL;
1810 req.emr_in_buf = payload;
1811 req.emr_in_length = MC_CMD_LOG_CTRL_IN_LEN;
1812 req.emr_out_buf = payload;
1813 req.emr_out_length = MC_CMD_LOG_CTRL_OUT_LEN;
1815 MCDI_IN_SET_DWORD(req, LOG_CTRL_IN_LOG_DEST,
1816 MC_CMD_LOG_CTRL_IN_LOG_DEST_EVQ);
1817 MCDI_IN_SET_DWORD(req, LOG_CTRL_IN_LOG_DEST_EVQ, 0);
1819 efx_mcdi_execute(enp, &req);
1821 if (req.emr_rc != 0) {
1829 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1835 #if EFSYS_OPT_MAC_STATS
1837 __checkReturn efx_rc_t
1839 __in efx_nic_t *enp,
1840 __in uint32_t vport_id,
1841 __in_opt efsys_mem_t *esmp,
1842 __in efx_stats_action_t action,
1843 __in uint16_t period_ms)
1846 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_MAC_STATS_IN_LEN,
1847 MC_CMD_MAC_STATS_V2_OUT_DMA_LEN);
1848 int clear = (action == EFX_STATS_CLEAR);
1849 int upload = (action == EFX_STATS_UPLOAD);
1850 int enable = (action == EFX_STATS_ENABLE_NOEVENTS);
1851 int events = (action == EFX_STATS_ENABLE_EVENTS);
1852 int disable = (action == EFX_STATS_DISABLE);
1855 req.emr_cmd = MC_CMD_MAC_STATS;
1856 req.emr_in_buf = payload;
1857 req.emr_in_length = MC_CMD_MAC_STATS_IN_LEN;
1858 req.emr_out_buf = payload;
1859 req.emr_out_length = MC_CMD_MAC_STATS_V2_OUT_DMA_LEN;
1861 MCDI_IN_POPULATE_DWORD_6(req, MAC_STATS_IN_CMD,
1862 MAC_STATS_IN_DMA, upload,
1863 MAC_STATS_IN_CLEAR, clear,
1864 MAC_STATS_IN_PERIODIC_CHANGE, enable | events | disable,
1865 MAC_STATS_IN_PERIODIC_ENABLE, enable | events,
1866 MAC_STATS_IN_PERIODIC_NOEVENT, !events,
1867 MAC_STATS_IN_PERIOD_MS, (enable | events) ? period_ms : 0);
1869 if (enable || events || upload) {
1870 const efx_nic_cfg_t *encp = &enp->en_nic_cfg;
1873 /* Periodic stats or stats upload require a DMA buffer */
1879 if (encp->enc_mac_stats_nstats < MC_CMD_MAC_NSTATS) {
1880 /* MAC stats count too small for legacy MAC stats */
1885 bytes = encp->enc_mac_stats_nstats * sizeof (efx_qword_t);
1887 if (EFSYS_MEM_SIZE(esmp) < bytes) {
1888 /* DMA buffer too small */
1893 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_ADDR_LO,
1894 EFSYS_MEM_ADDR(esmp) & 0xffffffff);
1895 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_ADDR_HI,
1896 EFSYS_MEM_ADDR(esmp) >> 32);
1897 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_DMA_LEN, bytes);
1901 * NOTE: Do not use EVB_PORT_ID_ASSIGNED when disabling periodic stats,
1902 * as this may fail (and leave periodic DMA enabled) if the
1903 * vadapter has already been deleted.
1905 MCDI_IN_SET_DWORD(req, MAC_STATS_IN_PORT_ID,
1906 (disable ? EVB_PORT_ID_NULL : vport_id));
1908 efx_mcdi_execute(enp, &req);
1910 if (req.emr_rc != 0) {
1911 /* EF10: Expect ENOENT if no DMA queues are initialised */
1912 if ((req.emr_rc != ENOENT) ||
1913 (enp->en_rx_qcount + enp->en_tx_qcount != 0)) {
1928 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1933 __checkReturn efx_rc_t
1934 efx_mcdi_mac_stats_clear(
1935 __in efx_nic_t *enp)
1939 if ((rc = efx_mcdi_mac_stats(enp, enp->en_vport_id, NULL,
1940 EFX_STATS_CLEAR, 0)) != 0)
1946 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1951 __checkReturn efx_rc_t
1952 efx_mcdi_mac_stats_upload(
1953 __in efx_nic_t *enp,
1954 __in efsys_mem_t *esmp)
1959 * The MC DMAs aggregate statistics for our convenience, so we can
1960 * avoid having to pull the statistics buffer into the cache to
1961 * maintain cumulative statistics.
1963 if ((rc = efx_mcdi_mac_stats(enp, enp->en_vport_id, esmp,
1964 EFX_STATS_UPLOAD, 0)) != 0)
1970 EFSYS_PROBE1(fail1, efx_rc_t, rc);
1975 __checkReturn efx_rc_t
1976 efx_mcdi_mac_stats_periodic(
1977 __in efx_nic_t *enp,
1978 __in efsys_mem_t *esmp,
1979 __in uint16_t period_ms,
1980 __in boolean_t events)
1985 * The MC DMAs aggregate statistics for our convenience, so we can
1986 * avoid having to pull the statistics buffer into the cache to
1987 * maintain cumulative statistics.
1988 * Huntington uses a fixed 1sec period.
1989 * Medford uses a fixed 1sec period before v6.2.1.1033 firmware.
1992 rc = efx_mcdi_mac_stats(enp, enp->en_vport_id, NULL,
1993 EFX_STATS_DISABLE, 0);
1995 rc = efx_mcdi_mac_stats(enp, enp->en_vport_id, esmp,
1996 EFX_STATS_ENABLE_EVENTS, period_ms);
1998 rc = efx_mcdi_mac_stats(enp, enp->en_vport_id, esmp,
1999 EFX_STATS_ENABLE_NOEVENTS, period_ms);
2007 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2012 #endif /* EFSYS_OPT_MAC_STATS */
2017 * This function returns the pf and vf number of a function. If it is a pf the
2018 * vf number is 0xffff. The vf number is the index of the vf on that
2019 * function. So if you have 3 vfs on pf 0 the 3 vfs will return (pf=0,vf=0),
2020 * (pf=0,vf=1), (pf=0,vf=2) aand the pf will return (pf=0, vf=0xffff).
2022 __checkReturn efx_rc_t
2023 efx_mcdi_get_function_info(
2024 __in efx_nic_t *enp,
2025 __out uint32_t *pfp,
2026 __out_opt uint32_t *vfp)
2029 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_FUNCTION_INFO_IN_LEN,
2030 MC_CMD_GET_FUNCTION_INFO_OUT_LEN);
2033 req.emr_cmd = MC_CMD_GET_FUNCTION_INFO;
2034 req.emr_in_buf = payload;
2035 req.emr_in_length = MC_CMD_GET_FUNCTION_INFO_IN_LEN;
2036 req.emr_out_buf = payload;
2037 req.emr_out_length = MC_CMD_GET_FUNCTION_INFO_OUT_LEN;
2039 efx_mcdi_execute(enp, &req);
2041 if (req.emr_rc != 0) {
2046 if (req.emr_out_length_used < MC_CMD_GET_FUNCTION_INFO_OUT_LEN) {
2051 *pfp = MCDI_OUT_DWORD(req, GET_FUNCTION_INFO_OUT_PF);
2053 *vfp = MCDI_OUT_DWORD(req, GET_FUNCTION_INFO_OUT_VF);
2060 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2065 __checkReturn efx_rc_t
2066 efx_mcdi_privilege_mask(
2067 __in efx_nic_t *enp,
2070 __out uint32_t *maskp)
2073 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_PRIVILEGE_MASK_IN_LEN,
2074 MC_CMD_PRIVILEGE_MASK_OUT_LEN);
2077 req.emr_cmd = MC_CMD_PRIVILEGE_MASK;
2078 req.emr_in_buf = payload;
2079 req.emr_in_length = MC_CMD_PRIVILEGE_MASK_IN_LEN;
2080 req.emr_out_buf = payload;
2081 req.emr_out_length = MC_CMD_PRIVILEGE_MASK_OUT_LEN;
2083 MCDI_IN_POPULATE_DWORD_2(req, PRIVILEGE_MASK_IN_FUNCTION,
2084 PRIVILEGE_MASK_IN_FUNCTION_PF, pf,
2085 PRIVILEGE_MASK_IN_FUNCTION_VF, vf);
2087 efx_mcdi_execute(enp, &req);
2089 if (req.emr_rc != 0) {
2094 if (req.emr_out_length_used < MC_CMD_PRIVILEGE_MASK_OUT_LEN) {
2099 *maskp = MCDI_OUT_DWORD(req, PRIVILEGE_MASK_OUT_OLD_MASK);
2106 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2111 #endif /* EFX_OPTS_EF10() */
2113 __checkReturn efx_rc_t
2114 efx_mcdi_set_workaround(
2115 __in efx_nic_t *enp,
2117 __in boolean_t enabled,
2118 __out_opt uint32_t *flagsp)
2121 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_WORKAROUND_IN_LEN,
2122 MC_CMD_WORKAROUND_EXT_OUT_LEN);
2125 req.emr_cmd = MC_CMD_WORKAROUND;
2126 req.emr_in_buf = payload;
2127 req.emr_in_length = MC_CMD_WORKAROUND_IN_LEN;
2128 req.emr_out_buf = payload;
2129 req.emr_out_length = MC_CMD_WORKAROUND_OUT_LEN;
2131 MCDI_IN_SET_DWORD(req, WORKAROUND_IN_TYPE, type);
2132 MCDI_IN_SET_DWORD(req, WORKAROUND_IN_ENABLED, enabled ? 1 : 0);
2134 efx_mcdi_execute_quiet(enp, &req);
2136 if (req.emr_rc != 0) {
2141 if (flagsp != NULL) {
2142 if (req.emr_out_length_used >= MC_CMD_WORKAROUND_EXT_OUT_LEN)
2143 *flagsp = MCDI_OUT_DWORD(req, WORKAROUND_EXT_OUT_FLAGS);
2151 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2157 __checkReturn efx_rc_t
2158 efx_mcdi_get_workarounds(
2159 __in efx_nic_t *enp,
2160 __out_opt uint32_t *implementedp,
2161 __out_opt uint32_t *enabledp)
2164 EFX_MCDI_DECLARE_BUF(payload, 0, MC_CMD_GET_WORKAROUNDS_OUT_LEN);
2167 req.emr_cmd = MC_CMD_GET_WORKAROUNDS;
2168 req.emr_in_buf = NULL;
2169 req.emr_in_length = 0;
2170 req.emr_out_buf = payload;
2171 req.emr_out_length = MC_CMD_GET_WORKAROUNDS_OUT_LEN;
2173 efx_mcdi_execute(enp, &req);
2175 if (req.emr_rc != 0) {
2180 if (implementedp != NULL) {
2182 MCDI_OUT_DWORD(req, GET_WORKAROUNDS_OUT_IMPLEMENTED);
2185 if (enabledp != NULL) {
2186 *enabledp = MCDI_OUT_DWORD(req, GET_WORKAROUNDS_OUT_ENABLED);
2192 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2198 * Size of media information page in accordance with SFF-8472 and SFF-8436.
2199 * It is used in MCDI interface as well.
2201 #define EFX_PHY_MEDIA_INFO_PAGE_SIZE 0x80
2204 * Transceiver identifiers from SFF-8024 Table 4-1.
2206 #define EFX_SFF_TRANSCEIVER_ID_SFP 0x03 /* SFP/SFP+/SFP28 */
2207 #define EFX_SFF_TRANSCEIVER_ID_QSFP 0x0c /* QSFP */
2208 #define EFX_SFF_TRANSCEIVER_ID_QSFP_PLUS 0x0d /* QSFP+ or later */
2209 #define EFX_SFF_TRANSCEIVER_ID_QSFP28 0x11 /* QSFP28 or later */
2211 static __checkReturn efx_rc_t
2212 efx_mcdi_get_phy_media_info(
2213 __in efx_nic_t *enp,
2214 __in uint32_t mcdi_page,
2215 __in uint8_t offset,
2217 __out_bcount(len) uint8_t *data)
2220 EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_PHY_MEDIA_INFO_IN_LEN,
2221 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(
2222 EFX_PHY_MEDIA_INFO_PAGE_SIZE));
2225 EFSYS_ASSERT((uint32_t)offset + len <= EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2227 req.emr_cmd = MC_CMD_GET_PHY_MEDIA_INFO;
2228 req.emr_in_buf = payload;
2229 req.emr_in_length = MC_CMD_GET_PHY_MEDIA_INFO_IN_LEN;
2230 req.emr_out_buf = payload;
2231 req.emr_out_length =
2232 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2234 MCDI_IN_SET_DWORD(req, GET_PHY_MEDIA_INFO_IN_PAGE, mcdi_page);
2236 efx_mcdi_execute(enp, &req);
2238 if (req.emr_rc != 0) {
2243 if (req.emr_out_length_used !=
2244 MC_CMD_GET_PHY_MEDIA_INFO_OUT_LEN(EFX_PHY_MEDIA_INFO_PAGE_SIZE)) {
2249 if (MCDI_OUT_DWORD(req, GET_PHY_MEDIA_INFO_OUT_DATALEN) !=
2250 EFX_PHY_MEDIA_INFO_PAGE_SIZE) {
2256 MCDI_OUT2(req, uint8_t, GET_PHY_MEDIA_INFO_OUT_DATA) + offset,
2266 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2271 __checkReturn efx_rc_t
2272 efx_mcdi_phy_module_get_info(
2273 __in efx_nic_t *enp,
2274 __in uint8_t dev_addr,
2277 __out_bcount(len) uint8_t *data)
2279 efx_port_t *epp = &(enp->en_port);
2281 uint32_t mcdi_lower_page;
2282 uint32_t mcdi_upper_page;
2285 EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
2288 * Map device address to MC_CMD_GET_PHY_MEDIA_INFO pages.
2289 * Offset plus length interface allows to access page 0 only.
2290 * I.e. non-zero upper pages are not accessible.
2291 * See SFF-8472 section 4 Memory Organization and SFF-8436 section 7.6
2292 * QSFP+ Memory Map for details on how information is structured
2295 switch (epp->ep_fixed_port_type) {
2296 case EFX_PHY_MEDIA_SFP_PLUS:
2297 case EFX_PHY_MEDIA_QSFP_PLUS:
2298 /* Port type supports modules */
2306 * For all supported port types, MCDI page 0 offset 0 holds the
2307 * transceiver identifier. Probe to determine the data layout.
2308 * Definitions from SFF-8024 Table 4-1.
2310 rc = efx_mcdi_get_phy_media_info(enp,
2311 0, 0, sizeof(id), &id);
2316 case EFX_SFF_TRANSCEIVER_ID_SFP:
2318 * In accordance with SFF-8472 Diagnostic Monitoring
2319 * Interface for Optical Transceivers section 4 Memory
2320 * Organization two 2-wire addresses are defined.
2323 /* Base information */
2324 case EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_BASE:
2326 * MCDI page 0 should be used to access lower
2327 * page 0 (0x00 - 0x7f) at the device address 0xA0.
2329 mcdi_lower_page = 0;
2331 * MCDI page 1 should be used to access upper
2332 * page 0 (0x80 - 0xff) at the device address 0xA0.
2334 mcdi_upper_page = 1;
2337 case EFX_PHY_MEDIA_INFO_DEV_ADDR_SFP_DDM:
2339 * MCDI page 2 should be used to access lower
2340 * page 0 (0x00 - 0x7f) at the device address 0xA2.
2342 mcdi_lower_page = 2;
2344 * MCDI page 3 should be used to access upper
2345 * page 0 (0x80 - 0xff) at the device address 0xA2.
2347 mcdi_upper_page = 3;
2354 case EFX_SFF_TRANSCEIVER_ID_QSFP:
2355 case EFX_SFF_TRANSCEIVER_ID_QSFP_PLUS:
2356 case EFX_SFF_TRANSCEIVER_ID_QSFP28:
2358 case EFX_PHY_MEDIA_INFO_DEV_ADDR_QSFP:
2360 * MCDI page -1 should be used to access lower page 0
2363 mcdi_lower_page = (uint32_t)-1;
2365 * MCDI page 0 should be used to access upper page 0
2368 mcdi_upper_page = 0;
2380 EFX_STATIC_ASSERT(EFX_PHY_MEDIA_INFO_PAGE_SIZE <= 0xFF);
2382 if (offset < EFX_PHY_MEDIA_INFO_PAGE_SIZE) {
2384 MIN(len, EFX_PHY_MEDIA_INFO_PAGE_SIZE - offset);
2386 rc = efx_mcdi_get_phy_media_info(enp,
2387 mcdi_lower_page, (uint8_t)offset, (uint8_t)read_len, data);
2396 offset -= EFX_PHY_MEDIA_INFO_PAGE_SIZE;
2400 EFSYS_ASSERT3U(len, <=, EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2401 EFSYS_ASSERT3U(offset, <, EFX_PHY_MEDIA_INFO_PAGE_SIZE);
2403 rc = efx_mcdi_get_phy_media_info(enp,
2404 mcdi_upper_page, (uint8_t)offset, (uint8_t)len, data);
2420 EFSYS_PROBE1(fail1, efx_rc_t, rc);
2425 #endif /* EFSYS_OPT_MCDI */