From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 978DFCCD18E for ; Tue, 14 Oct 2025 11:57:02 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 4B9F78323A; Tue, 14 Oct 2025 13:56:38 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=infi.wang Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=infi.wang header.i=@infi.wang header.b="SvoNXy2u"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 733038206E; Tue, 14 Oct 2025 13:56:37 +0200 (CEST) Received: from outbound.mr.icloud.com (p-west2-cluster6-host7-snip4-10.eps.apple.com [57.103.70.53]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 4FED88323A for ; Tue, 14 Oct 2025 13:56:35 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=infi.wang Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=root@infi.wang Received: from outbound.mr.icloud.com (unknown [127.0.0.2]) by p00-icloudmta-asmtp-us-west-2a-20-percent-2 (Postfix) with ESMTPS id 3EBE6180013A; Tue, 14 Oct 2025 11:56:32 +0000 (UTC) Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=infi.wang; s=sig1; bh=qmE5QsssH9x+uSEse8jFZh/M8CP6bu3IDNxinA8nZbM=; h=From:To:Subject:Date:Message-ID:MIME-Version:x-icloud-hme; b=SvoNXy2uoJTbItWUNPeJxWX6gNnn4Vt5fLP45zDPXQlxqbnrytAYByAciVc4/nn2Yiv2IlpzJj/C0xjsXxvmJAMNhuVyRiyB5q/rU6gAW9mtMIcq3KG7UwaP4s1J/1x4vLaCOiLtfqtnEhRTJwP/CgnpTytUcJmzKOXExPXqUNncs/SwnBiAMcc/SMsIa0spSdrbGULJarCJZpYCXUXCsOP2r3B37MB8Cf0OB8rCfNJJu8u7bauBgehPe+/7rJkuIlex0k9mOYSh8M8m0akQ/IsK8HZs2kQeMkZvaWY6T8vHv+XckUjwL8BelicqrMr0MBqukR36xgqbnvMsVuO8rQ== mail-alias-created-date: 1549370554000 Received: from debian.. (unknown [17.57.152.38]) by p00-icloudmta-asmtp-us-west-2a-20-percent-2 (Postfix) with ESMTPSA id BA320180B850; Tue, 14 Oct 2025 11:56:28 +0000 (UTC) From: Beiyan Yun To: u-boot@lists.denx.de Cc: Tom Rini , Yao Zi , Beiyan Yun , Ilias Apalodimas , Jerome Forissier , Joe Hershberger , "Lucien.Jheng" , Marek Vasut , Paul Barker , Ramon Fried , Romain Gantois , Siddharth Vadapalli , Weijie Gao Subject: [PATCH v2 4/4] net: phy: aquantia: use generic firmware loader Date: Tue, 14 Oct 2025 19:54:00 +0800 Message-ID: <20251014115604.194150-5-root@infi.wang> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20251014115604.194150-1-root@infi.wang> References: <20251014115604.194150-1-root@infi.wang> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-ORIG-GUID: v51_-pKksMzbuaqb09nJi865ZhM37Whd X-Proofpoint-GUID: v51_-pKksMzbuaqb09nJi865ZhM37Whd X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMDE0MDA5MyBTYWx0ZWRfX55XE3jlGLxNK AtqFBLyypjEmMS7eF4sojf+Hxuj2bOphWFdKnbDdfIkSxa/41GqeeLblI17r6UAB4mX0Y2VkcbR NiDjl/lUohrjT1h+aCYGWvaYvoY/5QEYJh2nVTOXAoQLnsBYO14v+KVG+PBI9i+L5/yjLGCKyYf S2MUP9eEAvkkV7rNPBnW7FO8y0iJ7TsiaBXZbOKKdKcSefg65qG3ifOkZDWa1dfnX1E9XG6+3VM qxu9IULvx6tiY3ZTuiS5oOdKfIKqSnnjqlGh9QOHn1xwm35EiyODeVlse6QN5trW2Tq8FvK9k= X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-10-14_02,2025-10-13_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxlogscore=739 bulkscore=0 clxscore=1030 adultscore=0 mlxscore=0 spamscore=0 malwarescore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.22.0-2506270000 definitions=main-2510140093 X-JNJ: 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 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Aquantia PHYs are being used w/o SPI flash in some routers recently. Current firmware loader only attempts to load from FS on top of MMC, limiting the use on many devices. Removed the old firmware loader, migrate to generic firmware loader to allow a wider range and runtime override of firmware source. (e.g., USB). Tested on Buffalo WXR18000BE10P with UBIFS. Tested-by: Beiyan Yun Signed-off-by: Beiyan Yun --- Changes in v2: - Add support for script based loader drivers/net/phy/Kconfig | 23 ++++--- drivers/net/phy/aquantia.c | 133 ++++++++++++++++++++----------------- 2 files changed, 87 insertions(+), 69 deletions(-) diff --git a/drivers/net/phy/Kconfig b/drivers/net/phy/Kconfig index 185c6a3156e..00d6a01e260 100644 --- a/drivers/net/phy/Kconfig +++ b/drivers/net/phy/Kconfig @@ -1,4 +1,3 @@ - config BITBANGMII bool "Bit-banged ethernet MII management channel support" @@ -90,23 +89,29 @@ menuconfig PHY_AQUANTIA config PHY_AQUANTIA_UPLOAD_FW bool "Aquantia firmware loading support" depends on PHY_AQUANTIA + select FS_LOADER help Aquantia PHYs use firmware which can be either loaded automatically from storage directly attached to the phy or loaded by the boot loader - via MDIO commands. The firmware is loaded from a file, specified by - the PHY_AQUANTIA_FW_PART and PHY_AQUANTIA_FW_NAME options. + via MDIO commands. + + This option enables loading the firmware using the generic + file system firmware loader framework. -config PHY_AQUANTIA_FW_PART - string "Aquantia firmware partition" +config PHY_AQUANTIA_FW_MAX_SIZE + hex "Max firmware size" depends on PHY_AQUANTIA_UPLOAD_FW + default 0x80000 help - Partition containing the firmware file. + The maximum size of the Aquantia PHY firmware. This is used to + allocate a buffer to load the firmware into. -config PHY_AQUANTIA_FW_NAME - string "Aquantia firmware filename" +config PHY_AQUANTIA_FW_LOADER_SCRIPT + string "Aquantia firmware loader script" depends on PHY_AQUANTIA_UPLOAD_FW + default "aqr_phy_load_firmware" help - Firmware filename. + The firmware loading script variable name. config PHY_ATHEROS bool "Atheros Ethernet PHYs support" diff --git a/drivers/net/phy/aquantia.c b/drivers/net/phy/aquantia.c index d9df0e23a45..98ee7ae10e7 100644 --- a/drivers/net/phy/aquantia.c +++ b/drivers/net/phy/aquantia.c @@ -17,6 +17,10 @@ #include #include #include +#if (IS_ENABLED(CONFIG_PHY_AQUANTIA_UPLOAD_FW)) +#include +#include +#endif #define AQUNTIA_10G_CTL 0x20 #define AQUNTIA_VENDOR_P1 0xc400 @@ -127,53 +131,7 @@ struct fw_header { #pragma pack() -#if defined(CONFIG_PHY_AQUANTIA_UPLOAD_FW) -static int aquantia_read_fw(u8 **fw_addr, size_t *fw_length) -{ - loff_t length, read; - int ret; - void *addr = NULL; - - *fw_addr = NULL; - *fw_length = 0; - debug("Loading Aquantia microcode from %s %s\n", - CONFIG_PHY_AQUANTIA_FW_PART, CONFIG_PHY_AQUANTIA_FW_NAME); - ret = fs_set_blk_dev("mmc", CONFIG_PHY_AQUANTIA_FW_PART, FS_TYPE_ANY); - if (ret < 0) - goto cleanup; - - ret = fs_size(CONFIG_PHY_AQUANTIA_FW_NAME, &length); - if (ret < 0) - goto cleanup; - - addr = malloc(length); - if (!addr) { - ret = -ENOMEM; - goto cleanup; - } - - ret = fs_set_blk_dev("mmc", CONFIG_PHY_AQUANTIA_FW_PART, FS_TYPE_ANY); - if (ret < 0) - goto cleanup; - - ret = fs_read(CONFIG_PHY_AQUANTIA_FW_NAME, (ulong)addr, 0, length, - &read); - if (ret < 0) - goto cleanup; - - *fw_addr = addr; - *fw_length = length; - debug("Found Aquantia microcode.\n"); - -cleanup: - if (ret < 0) { - printf("loading firmware file %s %s failed with error %d\n", - CONFIG_PHY_AQUANTIA_FW_PART, - CONFIG_PHY_AQUANTIA_FW_NAME, ret); - free(addr); - } - return ret; -} +#if (IS_ENABLED(CONFIG_PHY_AQUANTIA_UPLOAD_FW)) /* load data into the phy's memory */ static int aquantia_load_memory(struct phy_device *phydev, u32 addr, @@ -218,27 +176,27 @@ static u32 unpack_u24(const u8 *data) return (data[2] << 16) + (data[1] << 8) + data[0]; } -static int aquantia_upload_firmware(struct phy_device *phydev) +/* Common firmware upload implementation */ +static int aquantia_do_upload_firmware(struct phy_device *phydev, + const u8 *addr, size_t fw_length) { int ret; - u8 *addr = NULL; - size_t fw_length = 0; u16 calculated_crc, read_crc; char version[VERSION_STRING_SIZE]; u32 primary_offset, iram_offset, iram_size, dram_offset, dram_size; const struct fw_header *header; - ret = aquantia_read_fw(&addr, &fw_length); - if (ret != 0) - return ret; + if (!addr || !fw_length) { + printf("%s: Invalid firmware data\n", phydev->dev->name); + return -EINVAL; + } - read_crc = (addr[fw_length - 2] << 8) | addr[fw_length - 1]; + read_crc = (addr[fw_length - 2] << 8) | addr[fw_length - 1]; calculated_crc = crc16_ccitt(0, addr, fw_length - 2); if (read_crc != calculated_crc) { printf("%s bad firmware crc: file 0x%04x calculated 0x%04x\n", phydev->dev->name, read_crc, calculated_crc); - ret = -EINVAL; - goto done; + return -EINVAL; } /* Find the DRAM and IRAM sections within the firmware file. */ @@ -268,14 +226,14 @@ static int aquantia_upload_firmware(struct phy_device *phydev) ret = aquantia_load_memory(phydev, DRAM_BASE_ADDR, &addr[dram_offset], dram_size); if (ret != 0) - goto done; + return ret; debug("loading iram 0x%08x from offset=%d size=%d\n", IRAM_BASE_ADDR, iram_offset, iram_size); ret = aquantia_load_memory(phydev, IRAM_BASE_ADDR, &addr[iram_offset], iram_size); if (ret != 0) - goto done; + return ret; /* make sure soft reset and low power mode are clear */ phy_write(phydev, MDIO_MMD_VEND1, GLOBAL_STANDARD_CONTROL, 0); @@ -289,8 +247,63 @@ static int aquantia_upload_firmware(struct phy_device *phydev) phy_write(phydev, MDIO_MMD_VEND1, UP_CONTROL, UP_RUN_STALL_OVERRIDE); printf("%s firmware loading done.\n", phydev->dev->name); -done: - free(addr); + return 0; +} + +static int aquantia_upload_firmware(struct phy_device *phydev) +{ + int ret; + ofnode node; + struct udevice *loader_dev; + const char *fw_name; + u8 *fw_addr = NULL; + size_t fw_length; + + fw_addr = malloc(CONFIG_PHY_AQUANTIA_FW_MAX_SIZE); + if (!fw_addr) { + printf("Failed to allocate memory for firmware\n"); + return -ENOMEM; + } + + /* First, try to load firmware via script */ + ret = request_firmware_into_buf_via_script(fw_addr, + CONFIG_PHY_AQUANTIA_FW_MAX_SIZE, + CONFIG_PHY_AQUANTIA_FW_LOADER_SCRIPT, + &fw_length); + if (ret) { + /* Fallback to DT specified firmware */ + node = phy_get_ofnode(phydev); + if (!ofnode_valid(node)) { + printf("Failed to get PHY node\n"); + ret = -EINVAL; + goto out; + } + + fw_name = ofnode_read_string(node, "firmware-name"); + if (!fw_name) { + printf("Failed to get firmware name\n"); + ret = -ENOENT; + goto out; + } + + ret = get_fs_loader(&loader_dev); + if (ret) { + printf("Failed to get fs_loader instance: %d\n", ret); + goto out; + } + + ret = request_firmware_into_buf(loader_dev, fw_name, fw_addr, + CONFIG_PHY_AQUANTIA_FW_MAX_SIZE, 0); + if (ret < 0) { + printf("Failed to load firmware %s: %d\n", fw_name, ret); + goto out; + } + fw_length = ret; + } + + ret = aquantia_do_upload_firmware(phydev, fw_addr, fw_length); +out: + free(fw_addr); return ret; } #else -- 2.47.3