]> CyberLeo.Net >> Repos - FreeBSD/stable/10.git/blob - sys/dev/sfxge/common/efx_vpd.c
MFC r293814
[FreeBSD/stable/10.git] / sys / dev / sfxge / common / efx_vpd.c
1 /*-
2  * Copyright (c) 2009-2015 Solarflare Communications Inc.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions are met:
7  *
8  * 1. Redistributions of source code must retain the above copyright notice,
9  *    this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright notice,
11  *    this list of conditions and the following disclaimer in the documentation
12  *    and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
16  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
17  * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
18  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
19  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
20  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
21  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
22  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
23  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
24  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25  *
26  * The views and conclusions contained in the software and documentation are
27  * those of the authors and should not be interpreted as representing official
28  * policies, either expressed or implied, of the FreeBSD Project.
29  */
30
31 #include <sys/cdefs.h>
32 __FBSDID("$FreeBSD$");
33
34 #include "efx.h"
35 #include "efx_impl.h"
36
37 #if EFSYS_OPT_VPD
38
39 #define TAG_TYPE_LBN 7
40 #define TAG_TYPE_WIDTH 1
41 #define TAG_TYPE_LARGE_ITEM_DECODE 1
42 #define TAG_TYPE_SMALL_ITEM_DECODE 0
43
44 #define TAG_SMALL_ITEM_NAME_LBN 3
45 #define TAG_SMALL_ITEM_NAME_WIDTH 4
46 #define TAG_SMALL_ITEM_SIZE_LBN 0
47 #define TAG_SMALL_ITEM_SIZE_WIDTH 3
48
49 #define TAG_LARGE_ITEM_NAME_LBN 0
50 #define TAG_LARGE_ITEM_NAME_WIDTH 7
51
52 #define TAG_NAME_END_DECODE 0x0f
53 #define TAG_NAME_ID_STRING_DECODE 0x02
54 #define TAG_NAME_VPD_R_DECODE 0x10
55 #define TAG_NAME_VPD_W_DECODE 0x11
56
57 #if EFSYS_OPT_FALCON
58
59 static efx_vpd_ops_t    __efx_vpd_falcon_ops = {
60         NULL,                   /* evpdo_init */
61         falcon_vpd_size,        /* evpdo_size */
62         falcon_vpd_read,        /* evpdo_read */
63         falcon_vpd_verify,      /* evpdo_verify */
64         NULL,                   /* evpdo_reinit */
65         falcon_vpd_get,         /* evpdo_get */
66         falcon_vpd_set,         /* evpdo_set */
67         falcon_vpd_next,        /* evpdo_next */
68         falcon_vpd_write,       /* evpdo_write */
69         NULL,                   /* evpdo_fini */
70 };
71
72 #endif  /* EFSYS_OPT_FALCON */
73
74 #if EFSYS_OPT_SIENA
75
76 static efx_vpd_ops_t    __efx_vpd_siena_ops = {
77         siena_vpd_init,         /* evpdo_init */
78         siena_vpd_size,         /* evpdo_size */
79         siena_vpd_read,         /* evpdo_read */
80         siena_vpd_verify,       /* evpdo_verify */
81         siena_vpd_reinit,       /* evpdo_reinit */
82         siena_vpd_get,          /* evpdo_get */
83         siena_vpd_set,          /* evpdo_set */
84         siena_vpd_next,         /* evpdo_next */
85         siena_vpd_write,        /* evpdo_write */
86         siena_vpd_fini,         /* evpdo_fini */
87 };
88
89 #endif  /* EFSYS_OPT_SIENA */
90
91 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD
92
93 static efx_vpd_ops_t    __efx_vpd_ef10_ops = {
94         ef10_vpd_init,          /* evpdo_init */
95         ef10_vpd_size,          /* evpdo_size */
96         ef10_vpd_read,          /* evpdo_read */
97         ef10_vpd_verify,        /* evpdo_verify */
98         ef10_vpd_reinit,        /* evpdo_reinit */
99         ef10_vpd_get,           /* evpdo_get */
100         ef10_vpd_set,           /* evpdo_set */
101         ef10_vpd_next,          /* evpdo_next */
102         ef10_vpd_write,         /* evpdo_write */
103         ef10_vpd_fini,          /* evpdo_fini */
104 };
105
106 #endif  /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD */
107
108         __checkReturn           efx_rc_t
109 efx_vpd_init(
110         __in                    efx_nic_t *enp)
111 {
112         efx_vpd_ops_t *evpdop;
113         efx_rc_t rc;
114
115         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
116         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
117         EFSYS_ASSERT(!(enp->en_mod_flags & EFX_MOD_VPD));
118
119         switch (enp->en_family) {
120 #if EFSYS_OPT_FALCON
121         case EFX_FAMILY_FALCON:
122                 evpdop = (efx_vpd_ops_t *)&__efx_vpd_falcon_ops;
123                 break;
124 #endif  /* EFSYS_OPT_FALCON */
125
126 #if EFSYS_OPT_SIENA
127         case EFX_FAMILY_SIENA:
128                 evpdop = (efx_vpd_ops_t *)&__efx_vpd_siena_ops;
129                 break;
130 #endif  /* EFSYS_OPT_SIENA */
131
132 #if EFSYS_OPT_HUNTINGTON
133         case EFX_FAMILY_HUNTINGTON:
134                 evpdop = (efx_vpd_ops_t *)&__efx_vpd_ef10_ops;
135                 break;
136 #endif  /* EFSYS_OPT_HUNTINGTON */
137
138 #if EFSYS_OPT_MEDFORD
139         case EFX_FAMILY_MEDFORD:
140                 evpdop = (efx_vpd_ops_t *)&__efx_vpd_ef10_ops;
141                 break;
142 #endif  /* EFSYS_OPT_MEDFORD */
143
144         default:
145                 EFSYS_ASSERT(0);
146                 rc = ENOTSUP;
147                 goto fail1;
148         }
149
150         if (evpdop->evpdo_init != NULL) {
151                 if ((rc = evpdop->evpdo_init(enp)) != 0)
152                         goto fail2;
153         }
154
155         enp->en_evpdop = evpdop;
156         enp->en_mod_flags |= EFX_MOD_VPD;
157
158         return (0);
159
160 fail2:
161         EFSYS_PROBE(fail2);
162 fail1:
163         EFSYS_PROBE1(fail1, efx_rc_t, rc);
164
165         return (rc);
166 }
167
168         __checkReturn           efx_rc_t
169 efx_vpd_size(
170         __in                    efx_nic_t *enp,
171         __out                   size_t *sizep)
172 {
173         efx_vpd_ops_t *evpdop = enp->en_evpdop;
174         efx_rc_t rc;
175
176         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
177         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
178
179         if ((rc = evpdop->evpdo_size(enp, sizep)) != 0)
180                 goto fail1;
181
182         return (0);
183
184 fail1:
185         EFSYS_PROBE1(fail1, efx_rc_t, rc);
186
187         return (rc);
188 }
189
190         __checkReturn           efx_rc_t
191 efx_vpd_read(
192         __in                    efx_nic_t *enp,
193         __out_bcount(size)      caddr_t data,
194         __in                    size_t size)
195 {
196         efx_vpd_ops_t *evpdop = enp->en_evpdop;
197         efx_rc_t rc;
198
199         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
200         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
201
202         if ((rc = evpdop->evpdo_read(enp, data, size)) != 0)
203                 goto fail1;
204
205         return (0);
206
207 fail1:
208         EFSYS_PROBE1(fail1, efx_rc_t, rc);
209
210         return (rc);
211 }
212
213         __checkReturn           efx_rc_t
214 efx_vpd_verify(
215         __in                    efx_nic_t *enp,
216         __in_bcount(size)       caddr_t data,
217         __in                    size_t size)
218 {
219         efx_vpd_ops_t *evpdop = enp->en_evpdop;
220         efx_rc_t rc;
221
222         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
223         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
224
225         if ((rc = evpdop->evpdo_verify(enp, data, size)) != 0)
226                 goto fail1;
227
228         return (0);
229
230 fail1:
231         EFSYS_PROBE1(fail1, efx_rc_t, rc);
232
233         return (rc);
234 }
235
236         __checkReturn           efx_rc_t
237 efx_vpd_reinit(
238         __in                    efx_nic_t *enp,
239         __in_bcount(size)       caddr_t data,
240         __in                    size_t size)
241 {
242         efx_vpd_ops_t *evpdop = enp->en_evpdop;
243         efx_rc_t rc;
244
245         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
246         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
247
248         if (evpdop->evpdo_reinit == NULL) {
249                 rc = ENOTSUP;
250                 goto fail1;
251         }
252
253         if ((rc = evpdop->evpdo_reinit(enp, data, size)) != 0)
254                 goto fail2;
255
256         return (0);
257
258 fail2:
259         EFSYS_PROBE(fail2);
260 fail1:
261         EFSYS_PROBE1(fail1, efx_rc_t, rc);
262
263         return (rc);
264 }
265
266         __checkReturn           efx_rc_t
267 efx_vpd_get(
268         __in                    efx_nic_t *enp,
269         __in_bcount(size)       caddr_t data,
270         __in                    size_t size,
271         __inout                 efx_vpd_value_t *evvp)
272 {
273         efx_vpd_ops_t *evpdop = enp->en_evpdop;
274         efx_rc_t rc;
275
276         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
277         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
278
279         if ((rc = evpdop->evpdo_get(enp, data, size, evvp)) != 0)
280                 goto fail1;
281
282         return (0);
283
284 fail1:
285         EFSYS_PROBE1(fail1, efx_rc_t, rc);
286
287         return (rc);
288 }
289
290         __checkReturn           efx_rc_t
291 efx_vpd_set(
292         __in                    efx_nic_t *enp,
293         __inout_bcount(size)    caddr_t data,
294         __in                    size_t size,
295         __in                    efx_vpd_value_t *evvp)
296 {
297         efx_vpd_ops_t *evpdop = enp->en_evpdop;
298         efx_rc_t rc;
299
300         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
301         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
302
303         if ((rc = evpdop->evpdo_set(enp, data, size, evvp)) != 0)
304                 goto fail1;
305
306         return (0);
307
308 fail1:
309         EFSYS_PROBE1(fail1, efx_rc_t, rc);
310
311         return (rc);
312 }
313
314         __checkReturn           efx_rc_t
315 efx_vpd_next(
316         __in                    efx_nic_t *enp,
317         __inout_bcount(size)    caddr_t data,
318         __in                    size_t size,
319         __out                   efx_vpd_value_t *evvp,
320         __inout                 unsigned int *contp)
321 {
322         efx_vpd_ops_t *evpdop = enp->en_evpdop;
323         efx_rc_t rc;
324
325         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
326         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
327
328         if ((rc = evpdop->evpdo_next(enp, data, size, evvp, contp)) != 0)
329                 goto fail1;
330
331         return (0);
332
333 fail1:
334         EFSYS_PROBE1(fail1, efx_rc_t, rc);
335
336         return (rc);
337 }
338
339         __checkReturn           efx_rc_t
340 efx_vpd_write(
341         __in                    efx_nic_t *enp,
342         __in_bcount(size)       caddr_t data,
343         __in                    size_t size)
344 {
345         efx_vpd_ops_t *evpdop = enp->en_evpdop;
346         efx_rc_t rc;
347
348         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
349         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
350
351         if ((rc = evpdop->evpdo_write(enp, data, size)) != 0)
352                 goto fail1;
353
354         return (0);
355
356 fail1:
357         EFSYS_PROBE1(fail1, efx_rc_t, rc);
358
359         return (rc);
360 }
361
362 static  __checkReturn           efx_rc_t
363 efx_vpd_next_tag(
364         __in                    caddr_t data,
365         __in                    size_t size,
366         __inout                 unsigned int *offsetp,
367         __out                   efx_vpd_tag_t *tagp,
368         __out                   uint16_t *lengthp)
369 {
370         efx_byte_t byte;
371         efx_word_t word;
372         uint8_t name;
373         uint16_t length;
374         size_t headlen;
375         efx_rc_t rc;
376
377         if (*offsetp >= size) {
378                 rc = EFAULT;
379                 goto fail1;
380         }
381
382         EFX_POPULATE_BYTE_1(byte, EFX_BYTE_0, data[*offsetp]);
383
384         switch (EFX_BYTE_FIELD(byte, TAG_TYPE)) {
385         case TAG_TYPE_SMALL_ITEM_DECODE:
386                 headlen = 1;
387
388                 name = EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_NAME);
389                 length = (uint16_t)EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_SIZE);
390
391                 break;
392
393         case TAG_TYPE_LARGE_ITEM_DECODE:
394                 headlen = 3;
395
396                 if (*offsetp + headlen > size) {
397                         rc = EFAULT;
398                         goto fail2;
399                 }
400
401                 name = EFX_BYTE_FIELD(byte, TAG_LARGE_ITEM_NAME);
402                 EFX_POPULATE_WORD_2(word,
403                                     EFX_BYTE_0, data[*offsetp + 1],
404                                     EFX_BYTE_1, data[*offsetp + 2]);
405                 length = EFX_WORD_FIELD(word, EFX_WORD_0);
406
407                 break;
408
409         default:
410                 rc = EFAULT;
411                 goto fail2;
412         }
413
414         if (*offsetp + headlen + length > size) {
415                 rc = EFAULT;
416                 goto fail3;
417         }
418
419         EFX_STATIC_ASSERT(TAG_NAME_END_DECODE == EFX_VPD_END);
420         EFX_STATIC_ASSERT(TAG_NAME_ID_STRING_DECODE == EFX_VPD_ID);
421         EFX_STATIC_ASSERT(TAG_NAME_VPD_R_DECODE == EFX_VPD_RO);
422         EFX_STATIC_ASSERT(TAG_NAME_VPD_W_DECODE == EFX_VPD_RW);
423         if (name != EFX_VPD_END && name != EFX_VPD_ID &&
424             name != EFX_VPD_RO) {
425                 rc = EFAULT;
426                 goto fail4;
427         }
428
429         *tagp = name;
430         *lengthp = length;
431         *offsetp += headlen;
432
433         return (0);
434
435 fail4:
436         EFSYS_PROBE(fail4);
437 fail3:
438         EFSYS_PROBE(fail3);
439 fail2:
440         EFSYS_PROBE(fail2);
441 fail1:
442         EFSYS_PROBE1(fail1, efx_rc_t, rc);
443
444         return (rc);
445 }
446
447 static  __checkReturn           efx_rc_t
448 efx_vpd_next_keyword(
449         __in_bcount(size)       caddr_t tag,
450         __in                    size_t size,
451         __in                    unsigned int pos,
452         __out                   efx_vpd_keyword_t *keywordp,
453         __out                   uint8_t *lengthp)
454 {
455         efx_vpd_keyword_t keyword;
456         uint8_t length;
457         efx_rc_t rc;
458
459         if (pos + 3U > size) {
460                 rc = EFAULT;
461                 goto fail1;
462         }
463
464         keyword = EFX_VPD_KEYWORD(tag[pos], tag[pos + 1]);
465         length = tag[pos + 2];
466
467         if (length == 0 || pos + 3U + length > size) {
468                 rc = EFAULT;
469                 goto fail2;
470         }
471
472         *keywordp = keyword;
473         *lengthp = length;
474
475         return (0);
476
477 fail2:
478         EFSYS_PROBE(fail2);
479 fail1:
480         EFSYS_PROBE1(fail1, efx_rc_t, rc);
481
482         return (rc);
483 }
484
485         __checkReturn           efx_rc_t
486 efx_vpd_hunk_length(
487         __in_bcount(size)       caddr_t data,
488         __in                    size_t size,
489         __out                   size_t *lengthp)
490 {
491         efx_vpd_tag_t tag;
492         unsigned int offset;
493         uint16_t taglen;
494         efx_rc_t rc;
495
496         offset = 0;
497         _NOTE(CONSTANTCONDITION)
498         while (1) {
499                 if ((rc = efx_vpd_next_tag(data, size, &offset,
500                     &tag, &taglen)) != 0)
501                         goto fail1;
502                 offset += taglen;
503                 if (tag == EFX_VPD_END)
504                         break;
505         }
506
507         *lengthp = offset;
508
509         return (0);
510
511 fail1:
512         EFSYS_PROBE1(fail1, efx_rc_t, rc);
513
514         return (rc);
515 }
516
517         __checkReturn           efx_rc_t
518 efx_vpd_hunk_verify(
519         __in_bcount(size)       caddr_t data,
520         __in                    size_t size,
521         __out_opt               boolean_t *cksummedp)
522 {
523         efx_vpd_tag_t tag;
524         efx_vpd_keyword_t keyword;
525         unsigned int offset;
526         unsigned int pos;
527         unsigned int i;
528         uint16_t taglen;
529         uint8_t keylen;
530         uint8_t cksum;
531         boolean_t cksummed = B_FALSE;
532         efx_rc_t rc;
533
534         /*
535          * Parse every tag,keyword in the existing VPD. If the csum is present,
536          * the assert it is correct, and is the final keyword in the RO block.
537          */
538         offset = 0;
539         _NOTE(CONSTANTCONDITION)
540         while (1) {
541                 if ((rc = efx_vpd_next_tag(data, size, &offset,
542                     &tag, &taglen)) != 0)
543                         goto fail1;
544                 if (tag == EFX_VPD_END)
545                         break;
546                 else if (tag == EFX_VPD_ID)
547                         goto done;
548
549                 for (pos = 0; pos != taglen; pos += 3 + keylen) {
550                         /* RV keyword must be the last in the block */
551                         if (cksummed) {
552                                 rc = EFAULT;
553                                 goto fail2;
554                         }
555
556                         if ((rc = efx_vpd_next_keyword(data + offset,
557                             taglen, pos, &keyword, &keylen)) != 0)
558                                 goto fail3;
559
560                         if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
561                                 cksum = 0;
562                                 for (i = 0; i < offset + pos + 4; i++)
563                                         cksum += data[i];
564
565                                 if (cksum != 0) {
566                                         rc = EFAULT;
567                                         goto fail4;
568                                 }
569
570                                 cksummed = B_TRUE;
571                         }
572                 }
573
574         done:
575                 offset += taglen;
576         }
577
578         if (!cksummed) {
579                 rc = EFAULT;
580                 goto fail5;
581         }
582
583         if (cksummedp != NULL)
584                 *cksummedp = cksummed;
585
586         return (0);
587
588 fail5:
589         EFSYS_PROBE(fail5);
590 fail4:
591         EFSYS_PROBE(fail4);
592 fail3:
593         EFSYS_PROBE(fail3);
594 fail2:
595         EFSYS_PROBE(fail2);
596 fail1:
597         EFSYS_PROBE1(fail1, efx_rc_t, rc);
598
599         return (rc);
600 }
601
602 static  uint8_t __efx_vpd_blank_pid[] = {
603         /* Large resource type ID length 1 */
604         0x82, 0x01, 0x00,
605         /* Product name ' ' */
606         0x32,
607 };
608
609 static uint8_t __efx_vpd_blank_r[] = {
610         /* Large resource type VPD-R length 4 */
611         0x90, 0x04, 0x00,
612         /* RV keyword length 1 */
613         'R', 'V', 0x01,
614         /* RV payload checksum */
615         0x00,
616 };
617
618         __checkReturn           efx_rc_t
619 efx_vpd_hunk_reinit(
620         __in_bcount(size)       caddr_t data,
621         __in                    size_t size,
622         __in                    boolean_t wantpid)
623 {
624         unsigned int offset = 0;
625         unsigned int pos;
626         efx_byte_t byte;
627         uint8_t cksum;
628         efx_rc_t rc;
629
630         if (size < 0x100) {
631                 rc = ENOSPC;
632                 goto fail1;
633         }
634
635         if (wantpid) {
636                 memcpy(data + offset, __efx_vpd_blank_pid,
637                     sizeof (__efx_vpd_blank_pid));
638                 offset += sizeof (__efx_vpd_blank_pid);
639         }
640
641         memcpy(data + offset, __efx_vpd_blank_r, sizeof (__efx_vpd_blank_r));
642         offset += sizeof (__efx_vpd_blank_r);
643
644         /* Update checksum */
645         cksum = 0;
646         for (pos = 0; pos < offset; pos++)
647                 cksum += data[pos];
648         data[offset - 1] -= cksum;
649
650         /* Append trailing tag */
651         EFX_POPULATE_BYTE_3(byte,
652                             TAG_TYPE, TAG_TYPE_SMALL_ITEM_DECODE,
653                             TAG_SMALL_ITEM_NAME, TAG_NAME_END_DECODE,
654                             TAG_SMALL_ITEM_SIZE, 0);
655         data[offset] = EFX_BYTE_FIELD(byte, EFX_BYTE_0);
656         offset++;
657
658         return (0);
659
660 fail1:
661         EFSYS_PROBE1(fail1, efx_rc_t, rc);
662
663         return (rc);
664 }
665
666         __checkReturn                   efx_rc_t
667 efx_vpd_hunk_next(
668         __in_bcount(size)               caddr_t data,
669         __in                            size_t size,
670         __out                           efx_vpd_tag_t *tagp,
671         __out                           efx_vpd_keyword_t *keywordp,
672         __out_bcount_opt(*paylenp)      unsigned int *payloadp,
673         __out_opt                       uint8_t *paylenp,
674         __inout                         unsigned int *contp)
675 {
676         efx_vpd_tag_t tag;
677         efx_vpd_keyword_t keyword = 0;
678         unsigned int offset;
679         unsigned int pos;
680         unsigned int index;
681         uint16_t taglen;
682         uint8_t keylen;
683         uint8_t paylen;
684         efx_rc_t rc;
685
686         offset = index = 0;
687         _NOTE(CONSTANTCONDITION)
688         while (1) {
689                 if ((rc = efx_vpd_next_tag(data, size, &offset,
690                     &tag, &taglen)) != 0)
691                         goto fail1;
692                 if (tag == EFX_VPD_END)
693                         break;
694
695                 if (tag == EFX_VPD_ID) {
696                         if (index == *contp) {
697                                 EFSYS_ASSERT3U(taglen, <, 0x100);
698                                 paylen = (uint8_t)MIN(taglen, 0xff);
699
700                                 goto done;
701                         }
702                 } else {
703                         for (pos = 0; pos != taglen; pos += 3 + keylen) {
704                                 if ((rc = efx_vpd_next_keyword(data + offset,
705                                     taglen, pos, &keyword, &keylen)) != 0)
706                                         goto fail2;
707
708                                 if (index == *contp) {
709                                         offset += pos + 3;
710                                         paylen = keylen;
711
712                                         goto done;
713                                 }
714                         }
715                 }
716
717                 offset += taglen;
718         }
719
720         *contp = 0;
721         return (0);
722
723 done:
724         *tagp = tag;
725         *keywordp = keyword;
726         if (payloadp != NULL)
727                 *payloadp = offset;
728         if (paylenp != NULL)
729                 *paylenp = paylen;
730
731         ++(*contp);
732         return (0);
733
734 fail2:
735         EFSYS_PROBE(fail2);
736 fail1:
737         EFSYS_PROBE1(fail1, efx_rc_t, rc);
738
739         return (rc);
740 }
741
742         __checkReturn           efx_rc_t
743 efx_vpd_hunk_get(
744         __in_bcount(size)       caddr_t data,
745         __in                    size_t size,
746         __in                    efx_vpd_tag_t tag,
747         __in                    efx_vpd_keyword_t keyword,
748         __out                   unsigned int *payloadp,
749         __out                   uint8_t *paylenp)
750 {
751         efx_vpd_tag_t itag;
752         efx_vpd_keyword_t ikeyword;
753         unsigned int offset;
754         unsigned int pos;
755         uint16_t taglen;
756         uint8_t keylen;
757         efx_rc_t rc;
758
759         offset = 0;
760         _NOTE(CONSTANTCONDITION)
761         while (1) {
762                 if ((rc = efx_vpd_next_tag(data, size, &offset,
763                     &itag, &taglen)) != 0)
764                         goto fail1;
765                 if (itag == EFX_VPD_END)
766                         break;
767
768                 if (itag == tag) {
769                         if (itag == EFX_VPD_ID) {
770                                 EFSYS_ASSERT3U(taglen, <, 0x100);
771
772                                 *paylenp = (uint8_t)MIN(taglen, 0xff);
773                                 *payloadp = offset;
774                                 return (0);
775                         }
776
777                         for (pos = 0; pos != taglen; pos += 3 + keylen) {
778                                 if ((rc = efx_vpd_next_keyword(data + offset,
779                                     taglen, pos, &ikeyword, &keylen)) != 0)
780                                         goto fail2;
781
782                                 if (ikeyword == keyword) {
783                                         *paylenp = keylen;
784                                         *payloadp = offset + pos + 3;
785                                         return (0);
786                                 }
787                         }
788                 }
789
790                 offset += taglen;
791         }
792
793         /* Not an error */
794         return (ENOENT);
795
796 fail2:
797         EFSYS_PROBE(fail2);
798 fail1:
799         EFSYS_PROBE1(fail1, efx_rc_t, rc);
800
801         return (rc);
802 }
803
804         __checkReturn           efx_rc_t
805 efx_vpd_hunk_set(
806         __in_bcount(size)       caddr_t data,
807         __in                    size_t size,
808         __in                    efx_vpd_value_t *evvp)
809 {
810         efx_word_t word;
811         efx_vpd_tag_t tag;
812         efx_vpd_keyword_t keyword;
813         unsigned int offset;
814         unsigned int pos;
815         unsigned int taghead;
816         unsigned int source;
817         unsigned int dest;
818         unsigned int i;
819         uint16_t taglen;
820         uint8_t keylen;
821         uint8_t cksum;
822         size_t used;
823         efx_rc_t rc;
824
825         switch (evvp->evv_tag) {
826         case EFX_VPD_ID:
827                 if (evvp->evv_keyword != 0) {
828                         rc = EINVAL;
829                         goto fail1;
830                 }
831
832                 /* Can't delete the ID keyword */
833                 if (evvp->evv_length == 0) {
834                         rc = EINVAL;
835                         goto fail1;
836                 }
837                 break;
838
839         case EFX_VPD_RO:
840                 if (evvp->evv_keyword == EFX_VPD_KEYWORD('R', 'V')) {
841                         rc = EINVAL;
842                         goto fail1;
843                 }
844                 break;
845
846         default:
847                 rc = EINVAL;
848                 goto fail1;
849         }
850
851         /* Determine total size of all current tags */
852         if ((rc = efx_vpd_hunk_length(data, size, &used)) != 0)
853                 goto fail2;
854
855         offset = 0;
856         _NOTE(CONSTANTCONDITION)
857         while (1) {
858                 taghead = offset;
859                 if ((rc = efx_vpd_next_tag(data, size, &offset,
860                     &tag, &taglen)) != 0)
861                         goto fail3;
862                 if (tag == EFX_VPD_END)
863                         break;
864                 else if (tag != evvp->evv_tag) {
865                         offset += taglen;
866                         continue;
867                 }
868
869                 /* We only support modifying large resource tags */
870                 if (offset - taghead != 3) {
871                         rc = EINVAL;
872                         goto fail4;
873                 }
874
875                 /*
876                  * Work out the offset of the byte immediately after the
877                  * old (=source) and new (=dest) new keyword/tag
878                  */
879                 pos = 0;
880                 if (tag == EFX_VPD_ID) {
881                         source = offset + taglen;
882                         dest = offset + evvp->evv_length;
883                         goto check_space;
884                 }
885
886                 EFSYS_ASSERT3U(tag, ==, EFX_VPD_RO);
887                 source = dest = 0;
888                 for (pos = 0; pos != taglen; pos += 3 + keylen) {
889                         if ((rc = efx_vpd_next_keyword(data + offset,
890                             taglen, pos, &keyword, &keylen)) != 0)
891                                 goto fail5;
892
893                         if (keyword == evvp->evv_keyword &&
894                             evvp->evv_length == 0) {
895                                 /* Deleting this keyword */
896                                 source = offset + pos + 3 + keylen;
897                                 dest = offset + pos;
898                                 break;
899
900                         } else if (keyword == evvp->evv_keyword) {
901                                 /* Adjusting this keyword */
902                                 source = offset + pos + 3 + keylen;
903                                 dest = offset + pos + 3 + evvp->evv_length;
904                                 break;
905
906                         } else if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
907                                 /* The RV keyword must be at the end */
908                                 EFSYS_ASSERT3U(pos + 3 + keylen, ==, taglen);
909
910                                 /*
911                                  * The keyword doesn't already exist. If the
912                                  * user deleting a non-existant keyword then
913                                  * this is a no-op.
914                                  */
915                                 if (evvp->evv_length == 0)
916                                         return (0);
917
918                                 /* Insert this keyword before the RV keyword */
919                                 source = offset + pos;
920                                 dest = offset + pos + 3 + evvp->evv_length;
921                                 break;
922                         }
923                 }
924
925         check_space:
926                 if (used + dest > size + source) {
927                         rc = ENOSPC;
928                         goto fail6;
929                 }
930
931                 /* Move trailing data */
932                 (void) memmove(data + dest, data + source, used - source);
933
934                 /* Copy contents */
935                 memcpy(data + dest - evvp->evv_length, evvp->evv_value,
936                     evvp->evv_length);
937
938                 /* Insert new keyword header if required */
939                 if (tag != EFX_VPD_ID && evvp->evv_length > 0) {
940                         EFX_POPULATE_WORD_1(word, EFX_WORD_0,
941                                             evvp->evv_keyword);
942                         data[offset + pos + 0] =
943                             EFX_WORD_FIELD(word, EFX_BYTE_0);
944                         data[offset + pos + 1] =
945                             EFX_WORD_FIELD(word, EFX_BYTE_1);
946                         data[offset + pos + 2] = evvp->evv_length;
947                 }
948
949                 /* Modify tag length (large resource type) */
950                 taglen += (dest - source);
951                 EFX_POPULATE_WORD_1(word, EFX_WORD_0, taglen);
952                 data[offset - 2] = EFX_WORD_FIELD(word, EFX_BYTE_0);
953                 data[offset - 1] = EFX_WORD_FIELD(word, EFX_BYTE_1);
954
955                 goto checksum;
956         }
957
958         /* Unable to find the matching tag */
959         rc = ENOENT;
960         goto fail7;
961
962 checksum:
963         /* Find the RV tag, and update the checksum */
964         offset = 0;
965         _NOTE(CONSTANTCONDITION)
966         while (1) {
967                 if ((rc = efx_vpd_next_tag(data, size, &offset,
968                     &tag, &taglen)) != 0)
969                         goto fail8;
970                 if (tag == EFX_VPD_END)
971                         break;
972                 if (tag == EFX_VPD_RO) {
973                         for (pos = 0; pos != taglen; pos += 3 + keylen) {
974                                 if ((rc = efx_vpd_next_keyword(data + offset,
975                                     taglen, pos, &keyword, &keylen)) != 0)
976                                         goto fail9;
977
978                                 if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
979                                         cksum = 0;
980                                         for (i = 0; i < offset + pos + 3; i++)
981                                                 cksum += data[i];
982                                         data[i] = -cksum;
983                                         break;
984                                 }
985                         }
986                 }
987
988                 offset += taglen;
989         }
990
991         /* Zero out the unused portion */
992         (void) memset(data + offset + taglen, 0xff, size - offset - taglen);
993
994         return (0);
995
996 fail9:
997         EFSYS_PROBE(fail9);
998 fail8:
999         EFSYS_PROBE(fail8);
1000 fail7:
1001         EFSYS_PROBE(fail7);
1002 fail6:
1003         EFSYS_PROBE(fail6);
1004 fail5:
1005         EFSYS_PROBE(fail5);
1006 fail4:
1007         EFSYS_PROBE(fail4);
1008 fail3:
1009         EFSYS_PROBE(fail3);
1010 fail2:
1011         EFSYS_PROBE(fail2);
1012 fail1:
1013         EFSYS_PROBE1(fail1, efx_rc_t, rc);
1014
1015         return (rc);
1016 }
1017
1018                                 void
1019 efx_vpd_fini(
1020         __in                    efx_nic_t *enp)
1021 {
1022         efx_vpd_ops_t *evpdop = enp->en_evpdop;
1023
1024         EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
1025         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
1026         EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
1027
1028         if (evpdop->evpdo_fini != NULL)
1029                 evpdop->evpdo_fini(enp);
1030
1031         enp->en_evpdop = NULL;
1032         enp->en_mod_flags &= ~EFX_MOD_VPD;
1033 }
1034
1035 #endif  /* EFSYS_OPT_VPD */