xref: /freebsd/sys/dev/sfxge/common/efx_vpd.c (revision 6be3386466ab79a84b48429ae66244f21526d3df)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2009-2016 Solarflare Communications Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright notice,
11  *    this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright notice,
13  *    this list of conditions and the following disclaimer in the documentation
14  *    and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
17  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
18  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
20  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
21  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
22  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
23  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
24  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
25  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
26  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27  *
28  * The views and conclusions contained in the software and documentation are
29  * those of the authors and should not be interpreted as representing official
30  * policies, either expressed or implied, of the FreeBSD Project.
31  */
32 
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
35 
36 #include "efx.h"
37 #include "efx_impl.h"
38 
39 #if EFSYS_OPT_VPD
40 
41 #define	TAG_TYPE_LBN 7
42 #define	TAG_TYPE_WIDTH 1
43 #define	TAG_TYPE_LARGE_ITEM_DECODE 1
44 #define	TAG_TYPE_SMALL_ITEM_DECODE 0
45 
46 #define	TAG_SMALL_ITEM_NAME_LBN 3
47 #define	TAG_SMALL_ITEM_NAME_WIDTH 4
48 #define	TAG_SMALL_ITEM_SIZE_LBN 0
49 #define	TAG_SMALL_ITEM_SIZE_WIDTH 3
50 
51 #define	TAG_LARGE_ITEM_NAME_LBN 0
52 #define	TAG_LARGE_ITEM_NAME_WIDTH 7
53 
54 #define	TAG_NAME_END_DECODE 0x0f
55 #define	TAG_NAME_ID_STRING_DECODE 0x02
56 #define	TAG_NAME_VPD_R_DECODE 0x10
57 #define	TAG_NAME_VPD_W_DECODE 0x11
58 
59 #if EFSYS_OPT_SIENA
60 
61 static const efx_vpd_ops_t	__efx_vpd_siena_ops = {
62 	siena_vpd_init,		/* evpdo_init */
63 	siena_vpd_size,		/* evpdo_size */
64 	siena_vpd_read,		/* evpdo_read */
65 	siena_vpd_verify,	/* evpdo_verify */
66 	siena_vpd_reinit,	/* evpdo_reinit */
67 	siena_vpd_get,		/* evpdo_get */
68 	siena_vpd_set,		/* evpdo_set */
69 	siena_vpd_next,		/* evpdo_next */
70 	siena_vpd_write,	/* evpdo_write */
71 	siena_vpd_fini,		/* evpdo_fini */
72 };
73 
74 #endif	/* EFSYS_OPT_SIENA */
75 
76 #if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2
77 
78 static const efx_vpd_ops_t	__efx_vpd_ef10_ops = {
79 	ef10_vpd_init,		/* evpdo_init */
80 	ef10_vpd_size,		/* evpdo_size */
81 	ef10_vpd_read,		/* evpdo_read */
82 	ef10_vpd_verify,	/* evpdo_verify */
83 	ef10_vpd_reinit,	/* evpdo_reinit */
84 	ef10_vpd_get,		/* evpdo_get */
85 	ef10_vpd_set,		/* evpdo_set */
86 	ef10_vpd_next,		/* evpdo_next */
87 	ef10_vpd_write,		/* evpdo_write */
88 	ef10_vpd_fini,		/* evpdo_fini */
89 };
90 
91 #endif	/* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2 */
92 
93 	__checkReturn		efx_rc_t
94 efx_vpd_init(
95 	__in			efx_nic_t *enp)
96 {
97 	const efx_vpd_ops_t *evpdop;
98 	efx_rc_t rc;
99 
100 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
101 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
102 	EFSYS_ASSERT(!(enp->en_mod_flags & EFX_MOD_VPD));
103 
104 	switch (enp->en_family) {
105 #if EFSYS_OPT_SIENA
106 	case EFX_FAMILY_SIENA:
107 		evpdop = &__efx_vpd_siena_ops;
108 		break;
109 #endif	/* EFSYS_OPT_SIENA */
110 
111 #if EFSYS_OPT_HUNTINGTON
112 	case EFX_FAMILY_HUNTINGTON:
113 		evpdop = &__efx_vpd_ef10_ops;
114 		break;
115 #endif	/* EFSYS_OPT_HUNTINGTON */
116 
117 #if EFSYS_OPT_MEDFORD
118 	case EFX_FAMILY_MEDFORD:
119 		evpdop = &__efx_vpd_ef10_ops;
120 		break;
121 #endif	/* EFSYS_OPT_MEDFORD */
122 
123 #if EFSYS_OPT_MEDFORD2
124 	case EFX_FAMILY_MEDFORD2:
125 		evpdop = &__efx_vpd_ef10_ops;
126 		break;
127 #endif	/* EFSYS_OPT_MEDFORD2 */
128 
129 	default:
130 		EFSYS_ASSERT(0);
131 		rc = ENOTSUP;
132 		goto fail1;
133 	}
134 
135 	if (evpdop->evpdo_init != NULL) {
136 		if ((rc = evpdop->evpdo_init(enp)) != 0)
137 			goto fail2;
138 	}
139 
140 	enp->en_evpdop = evpdop;
141 	enp->en_mod_flags |= EFX_MOD_VPD;
142 
143 	return (0);
144 
145 fail2:
146 	EFSYS_PROBE(fail2);
147 fail1:
148 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
149 
150 	return (rc);
151 }
152 
153 	__checkReturn		efx_rc_t
154 efx_vpd_size(
155 	__in			efx_nic_t *enp,
156 	__out			size_t *sizep)
157 {
158 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
159 	efx_rc_t rc;
160 
161 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
162 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
163 
164 	if ((rc = evpdop->evpdo_size(enp, sizep)) != 0)
165 		goto fail1;
166 
167 	return (0);
168 
169 fail1:
170 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
171 
172 	return (rc);
173 }
174 
175 	__checkReturn		efx_rc_t
176 efx_vpd_read(
177 	__in			efx_nic_t *enp,
178 	__out_bcount(size)	caddr_t data,
179 	__in			size_t size)
180 {
181 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
182 	efx_rc_t rc;
183 
184 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
185 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
186 
187 	if ((rc = evpdop->evpdo_read(enp, data, size)) != 0)
188 		goto fail1;
189 
190 	return (0);
191 
192 fail1:
193 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
194 
195 	return (rc);
196 }
197 
198 	__checkReturn		efx_rc_t
199 efx_vpd_verify(
200 	__in			efx_nic_t *enp,
201 	__in_bcount(size)	caddr_t data,
202 	__in			size_t size)
203 {
204 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
205 	efx_rc_t rc;
206 
207 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
208 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
209 
210 	if ((rc = evpdop->evpdo_verify(enp, data, size)) != 0)
211 		goto fail1;
212 
213 	return (0);
214 
215 fail1:
216 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
217 
218 	return (rc);
219 }
220 
221 	__checkReturn		efx_rc_t
222 efx_vpd_reinit(
223 	__in			efx_nic_t *enp,
224 	__in_bcount(size)	caddr_t data,
225 	__in			size_t size)
226 {
227 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
228 	efx_rc_t rc;
229 
230 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
231 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
232 
233 	if (evpdop->evpdo_reinit == NULL) {
234 		rc = ENOTSUP;
235 		goto fail1;
236 	}
237 
238 	if ((rc = evpdop->evpdo_reinit(enp, data, size)) != 0)
239 		goto fail2;
240 
241 	return (0);
242 
243 fail2:
244 	EFSYS_PROBE(fail2);
245 fail1:
246 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
247 
248 	return (rc);
249 }
250 
251 	__checkReturn		efx_rc_t
252 efx_vpd_get(
253 	__in			efx_nic_t *enp,
254 	__in_bcount(size)	caddr_t data,
255 	__in			size_t size,
256 	__inout			efx_vpd_value_t *evvp)
257 {
258 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
259 	efx_rc_t rc;
260 
261 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
262 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
263 
264 	if ((rc = evpdop->evpdo_get(enp, data, size, evvp)) != 0) {
265 		if (rc == ENOENT)
266 			return (rc);
267 
268 		goto fail1;
269 	}
270 
271 	return (0);
272 
273 fail1:
274 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
275 
276 	return (rc);
277 }
278 
279 	__checkReturn		efx_rc_t
280 efx_vpd_set(
281 	__in			efx_nic_t *enp,
282 	__inout_bcount(size)	caddr_t data,
283 	__in			size_t size,
284 	__in			efx_vpd_value_t *evvp)
285 {
286 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
287 	efx_rc_t rc;
288 
289 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
290 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
291 
292 	if ((rc = evpdop->evpdo_set(enp, data, size, evvp)) != 0)
293 		goto fail1;
294 
295 	return (0);
296 
297 fail1:
298 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
299 
300 	return (rc);
301 }
302 
303 	__checkReturn		efx_rc_t
304 efx_vpd_next(
305 	__in			efx_nic_t *enp,
306 	__inout_bcount(size)	caddr_t data,
307 	__in			size_t size,
308 	__out			efx_vpd_value_t *evvp,
309 	__inout			unsigned int *contp)
310 {
311 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
312 	efx_rc_t rc;
313 
314 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
315 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
316 
317 	if ((rc = evpdop->evpdo_next(enp, data, size, evvp, contp)) != 0)
318 		goto fail1;
319 
320 	return (0);
321 
322 fail1:
323 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
324 
325 	return (rc);
326 }
327 
328 	__checkReturn		efx_rc_t
329 efx_vpd_write(
330 	__in			efx_nic_t *enp,
331 	__in_bcount(size)	caddr_t data,
332 	__in			size_t size)
333 {
334 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
335 	efx_rc_t rc;
336 
337 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
338 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
339 
340 	if ((rc = evpdop->evpdo_write(enp, data, size)) != 0)
341 		goto fail1;
342 
343 	return (0);
344 
345 fail1:
346 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
347 
348 	return (rc);
349 }
350 
351 static	__checkReturn		efx_rc_t
352 efx_vpd_next_tag(
353 	__in			caddr_t data,
354 	__in			size_t size,
355 	__inout			unsigned int *offsetp,
356 	__out			efx_vpd_tag_t *tagp,
357 	__out			uint16_t *lengthp)
358 {
359 	efx_byte_t byte;
360 	efx_word_t word;
361 	uint8_t name;
362 	uint16_t length;
363 	size_t headlen;
364 	efx_rc_t rc;
365 
366 	if (*offsetp >= size) {
367 		rc = EFAULT;
368 		goto fail1;
369 	}
370 
371 	EFX_POPULATE_BYTE_1(byte, EFX_BYTE_0, data[*offsetp]);
372 
373 	switch (EFX_BYTE_FIELD(byte, TAG_TYPE)) {
374 	case TAG_TYPE_SMALL_ITEM_DECODE:
375 		headlen = 1;
376 
377 		name = EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_NAME);
378 		length = (uint16_t)EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_SIZE);
379 
380 		break;
381 
382 	case TAG_TYPE_LARGE_ITEM_DECODE:
383 		headlen = 3;
384 
385 		if (*offsetp + headlen > size) {
386 			rc = EFAULT;
387 			goto fail2;
388 		}
389 
390 		name = EFX_BYTE_FIELD(byte, TAG_LARGE_ITEM_NAME);
391 		EFX_POPULATE_WORD_2(word,
392 				    EFX_BYTE_0, data[*offsetp + 1],
393 				    EFX_BYTE_1, data[*offsetp + 2]);
394 		length = EFX_WORD_FIELD(word, EFX_WORD_0);
395 
396 		break;
397 
398 	default:
399 		rc = EFAULT;
400 		goto fail2;
401 	}
402 
403 	if (*offsetp + headlen + length > size) {
404 		rc = EFAULT;
405 		goto fail3;
406 	}
407 
408 	EFX_STATIC_ASSERT(TAG_NAME_END_DECODE == EFX_VPD_END);
409 	EFX_STATIC_ASSERT(TAG_NAME_ID_STRING_DECODE == EFX_VPD_ID);
410 	EFX_STATIC_ASSERT(TAG_NAME_VPD_R_DECODE == EFX_VPD_RO);
411 	EFX_STATIC_ASSERT(TAG_NAME_VPD_W_DECODE == EFX_VPD_RW);
412 	if (name != EFX_VPD_END && name != EFX_VPD_ID &&
413 	    name != EFX_VPD_RO) {
414 		rc = EFAULT;
415 		goto fail4;
416 	}
417 
418 	*tagp = name;
419 	*lengthp = length;
420 	*offsetp += headlen;
421 
422 	return (0);
423 
424 fail4:
425 	EFSYS_PROBE(fail4);
426 fail3:
427 	EFSYS_PROBE(fail3);
428 fail2:
429 	EFSYS_PROBE(fail2);
430 fail1:
431 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
432 
433 	return (rc);
434 }
435 
436 static	__checkReturn		efx_rc_t
437 efx_vpd_next_keyword(
438 	__in_bcount(size)	caddr_t tag,
439 	__in			size_t size,
440 	__in			unsigned int pos,
441 	__out			efx_vpd_keyword_t *keywordp,
442 	__out			uint8_t *lengthp)
443 {
444 	efx_vpd_keyword_t keyword;
445 	uint8_t length;
446 	efx_rc_t rc;
447 
448 	if (pos + 3U > size) {
449 		rc = EFAULT;
450 		goto fail1;
451 	}
452 
453 	keyword = EFX_VPD_KEYWORD(tag[pos], tag[pos + 1]);
454 	length = tag[pos + 2];
455 
456 	if (length == 0 || pos + 3U + length > size) {
457 		rc = EFAULT;
458 		goto fail2;
459 	}
460 
461 	*keywordp = keyword;
462 	*lengthp = length;
463 
464 	return (0);
465 
466 fail2:
467 	EFSYS_PROBE(fail2);
468 fail1:
469 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
470 
471 	return (rc);
472 }
473 
474 	__checkReturn		efx_rc_t
475 efx_vpd_hunk_length(
476 	__in_bcount(size)	caddr_t data,
477 	__in			size_t size,
478 	__out			size_t *lengthp)
479 {
480 	efx_vpd_tag_t tag;
481 	unsigned int offset;
482 	uint16_t taglen;
483 	efx_rc_t rc;
484 
485 	offset = 0;
486 	_NOTE(CONSTANTCONDITION)
487 	while (1) {
488 		if ((rc = efx_vpd_next_tag(data, size, &offset,
489 		    &tag, &taglen)) != 0)
490 			goto fail1;
491 		offset += taglen;
492 		if (tag == EFX_VPD_END)
493 			break;
494 	}
495 
496 	*lengthp = offset;
497 
498 	return (0);
499 
500 fail1:
501 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
502 
503 	return (rc);
504 }
505 
506 	__checkReturn		efx_rc_t
507 efx_vpd_hunk_verify(
508 	__in_bcount(size)	caddr_t data,
509 	__in			size_t size,
510 	__out_opt		boolean_t *cksummedp)
511 {
512 	efx_vpd_tag_t tag;
513 	efx_vpd_keyword_t keyword;
514 	unsigned int offset;
515 	unsigned int pos;
516 	unsigned int i;
517 	uint16_t taglen;
518 	uint8_t keylen;
519 	uint8_t cksum;
520 	boolean_t cksummed = B_FALSE;
521 	efx_rc_t rc;
522 
523 	/*
524 	 * Parse every tag,keyword in the existing VPD. If the csum is present,
525 	 * the assert it is correct, and is the final keyword in the RO block.
526 	 */
527 	offset = 0;
528 	_NOTE(CONSTANTCONDITION)
529 	while (1) {
530 		if ((rc = efx_vpd_next_tag(data, size, &offset,
531 		    &tag, &taglen)) != 0)
532 			goto fail1;
533 		if (tag == EFX_VPD_END)
534 			break;
535 		else if (tag == EFX_VPD_ID)
536 			goto done;
537 
538 		for (pos = 0; pos != taglen; pos += 3 + keylen) {
539 			/* RV keyword must be the last in the block */
540 			if (cksummed) {
541 				rc = EFAULT;
542 				goto fail2;
543 			}
544 
545 			if ((rc = efx_vpd_next_keyword(data + offset,
546 			    taglen, pos, &keyword, &keylen)) != 0)
547 				goto fail3;
548 
549 			if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
550 				cksum = 0;
551 				for (i = 0; i < offset + pos + 4; i++)
552 					cksum += data[i];
553 
554 				if (cksum != 0) {
555 					rc = EFAULT;
556 					goto fail4;
557 				}
558 
559 				cksummed = B_TRUE;
560 			}
561 		}
562 
563 	done:
564 		offset += taglen;
565 	}
566 
567 	if (!cksummed) {
568 		rc = EFAULT;
569 		goto fail5;
570 	}
571 
572 	if (cksummedp != NULL)
573 		*cksummedp = cksummed;
574 
575 	return (0);
576 
577 fail5:
578 	EFSYS_PROBE(fail5);
579 fail4:
580 	EFSYS_PROBE(fail4);
581 fail3:
582 	EFSYS_PROBE(fail3);
583 fail2:
584 	EFSYS_PROBE(fail2);
585 fail1:
586 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
587 
588 	return (rc);
589 }
590 
591 static	uint8_t	__efx_vpd_blank_pid[] = {
592 	/* Large resource type ID length 1 */
593 	0x82, 0x01, 0x00,
594 	/* Product name ' ' */
595 	0x32,
596 };
597 
598 static uint8_t __efx_vpd_blank_r[] = {
599 	/* Large resource type VPD-R length 4 */
600 	0x90, 0x04, 0x00,
601 	/* RV keyword length 1 */
602 	'R', 'V', 0x01,
603 	/* RV payload checksum */
604 	0x00,
605 };
606 
607 	__checkReturn		efx_rc_t
608 efx_vpd_hunk_reinit(
609 	__in_bcount(size)	caddr_t data,
610 	__in			size_t size,
611 	__in			boolean_t wantpid)
612 {
613 	unsigned int offset = 0;
614 	unsigned int pos;
615 	efx_byte_t byte;
616 	uint8_t cksum;
617 	efx_rc_t rc;
618 
619 	if (size < 0x100) {
620 		rc = ENOSPC;
621 		goto fail1;
622 	}
623 
624 	if (wantpid) {
625 		memcpy(data + offset, __efx_vpd_blank_pid,
626 		    sizeof (__efx_vpd_blank_pid));
627 		offset += sizeof (__efx_vpd_blank_pid);
628 	}
629 
630 	memcpy(data + offset, __efx_vpd_blank_r, sizeof (__efx_vpd_blank_r));
631 	offset += sizeof (__efx_vpd_blank_r);
632 
633 	/* Update checksum */
634 	cksum = 0;
635 	for (pos = 0; pos < offset; pos++)
636 		cksum += data[pos];
637 	data[offset - 1] -= cksum;
638 
639 	/* Append trailing tag */
640 	EFX_POPULATE_BYTE_3(byte,
641 			    TAG_TYPE, TAG_TYPE_SMALL_ITEM_DECODE,
642 			    TAG_SMALL_ITEM_NAME, TAG_NAME_END_DECODE,
643 			    TAG_SMALL_ITEM_SIZE, 0);
644 	data[offset] = EFX_BYTE_FIELD(byte, EFX_BYTE_0);
645 	offset++;
646 
647 	return (0);
648 
649 fail1:
650 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
651 
652 	return (rc);
653 }
654 
655 	__checkReturn			efx_rc_t
656 efx_vpd_hunk_next(
657 	__in_bcount(size)		caddr_t data,
658 	__in				size_t size,
659 	__out				efx_vpd_tag_t *tagp,
660 	__out				efx_vpd_keyword_t *keywordp,
661 	__out_opt			unsigned int *payloadp,
662 	__out_opt			uint8_t *paylenp,
663 	__inout				unsigned int *contp)
664 {
665 	efx_vpd_tag_t tag;
666 	efx_vpd_keyword_t keyword = 0;
667 	unsigned int offset;
668 	unsigned int pos;
669 	unsigned int index;
670 	uint16_t taglen;
671 	uint8_t keylen;
672 	uint8_t paylen;
673 	efx_rc_t rc;
674 
675 	offset = index = 0;
676 	_NOTE(CONSTANTCONDITION)
677 	while (1) {
678 		if ((rc = efx_vpd_next_tag(data, size, &offset,
679 		    &tag, &taglen)) != 0)
680 			goto fail1;
681 
682 		if (tag == EFX_VPD_END) {
683 			keyword = 0;
684 			paylen = 0;
685 			index = 0;
686 			break;
687 		}
688 
689 		if (tag == EFX_VPD_ID) {
690 			if (index++ == *contp) {
691 				EFSYS_ASSERT3U(taglen, <, 0x100);
692 				keyword = 0;
693 				paylen = (uint8_t)MIN(taglen, 0xff);
694 
695 				goto done;
696 			}
697 		} else {
698 			for (pos = 0; pos != taglen; pos += 3 + keylen) {
699 				if ((rc = efx_vpd_next_keyword(data + offset,
700 				    taglen, pos, &keyword, &keylen)) != 0)
701 					goto fail2;
702 
703 				if (index++ == *contp) {
704 					offset += pos + 3;
705 					paylen = keylen;
706 
707 					goto done;
708 				}
709 			}
710 		}
711 
712 		offset += taglen;
713 	}
714 
715 done:
716 	*tagp = tag;
717 	*keywordp = keyword;
718 	if (payloadp != NULL)
719 		*payloadp = offset;
720 	if (paylenp != NULL)
721 		*paylenp = paylen;
722 
723 	*contp = index;
724 	return (0);
725 
726 fail2:
727 	EFSYS_PROBE(fail2);
728 fail1:
729 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
730 
731 	return (rc);
732 }
733 
734 	__checkReturn		efx_rc_t
735 efx_vpd_hunk_get(
736 	__in_bcount(size)	caddr_t data,
737 	__in			size_t size,
738 	__in			efx_vpd_tag_t tag,
739 	__in			efx_vpd_keyword_t keyword,
740 	__out			unsigned int *payloadp,
741 	__out			uint8_t *paylenp)
742 {
743 	efx_vpd_tag_t itag;
744 	efx_vpd_keyword_t ikeyword;
745 	unsigned int offset;
746 	unsigned int pos;
747 	uint16_t taglen;
748 	uint8_t keylen;
749 	efx_rc_t rc;
750 
751 	offset = 0;
752 	_NOTE(CONSTANTCONDITION)
753 	while (1) {
754 		if ((rc = efx_vpd_next_tag(data, size, &offset,
755 		    &itag, &taglen)) != 0)
756 			goto fail1;
757 		if (itag == EFX_VPD_END)
758 			break;
759 
760 		if (itag == tag) {
761 			if (itag == EFX_VPD_ID) {
762 				EFSYS_ASSERT3U(taglen, <, 0x100);
763 
764 				*paylenp = (uint8_t)MIN(taglen, 0xff);
765 				*payloadp = offset;
766 				return (0);
767 			}
768 
769 			for (pos = 0; pos != taglen; pos += 3 + keylen) {
770 				if ((rc = efx_vpd_next_keyword(data + offset,
771 				    taglen, pos, &ikeyword, &keylen)) != 0)
772 					goto fail2;
773 
774 				if (ikeyword == keyword) {
775 					*paylenp = keylen;
776 					*payloadp = offset + pos + 3;
777 					return (0);
778 				}
779 			}
780 		}
781 
782 		offset += taglen;
783 	}
784 
785 	/* Not an error */
786 	return (ENOENT);
787 
788 fail2:
789 	EFSYS_PROBE(fail2);
790 fail1:
791 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
792 
793 	return (rc);
794 }
795 
796 	__checkReturn		efx_rc_t
797 efx_vpd_hunk_set(
798 	__in_bcount(size)	caddr_t data,
799 	__in			size_t size,
800 	__in			efx_vpd_value_t *evvp)
801 {
802 	efx_word_t word;
803 	efx_vpd_tag_t tag;
804 	efx_vpd_keyword_t keyword;
805 	unsigned int offset;
806 	unsigned int pos;
807 	unsigned int taghead;
808 	unsigned int source;
809 	unsigned int dest;
810 	unsigned int i;
811 	uint16_t taglen;
812 	uint8_t keylen;
813 	uint8_t cksum;
814 	size_t used;
815 	efx_rc_t rc;
816 
817 	switch (evvp->evv_tag) {
818 	case EFX_VPD_ID:
819 		if (evvp->evv_keyword != 0) {
820 			rc = EINVAL;
821 			goto fail1;
822 		}
823 
824 		/* Can't delete the ID keyword */
825 		if (evvp->evv_length == 0) {
826 			rc = EINVAL;
827 			goto fail1;
828 		}
829 		break;
830 
831 	case EFX_VPD_RO:
832 		if (evvp->evv_keyword == EFX_VPD_KEYWORD('R', 'V')) {
833 			rc = EINVAL;
834 			goto fail1;
835 		}
836 		break;
837 
838 	default:
839 		rc = EINVAL;
840 		goto fail1;
841 	}
842 
843 	/* Determine total size of all current tags */
844 	if ((rc = efx_vpd_hunk_length(data, size, &used)) != 0)
845 		goto fail2;
846 
847 	offset = 0;
848 	_NOTE(CONSTANTCONDITION)
849 	while (1) {
850 		taghead = offset;
851 		if ((rc = efx_vpd_next_tag(data, size, &offset,
852 		    &tag, &taglen)) != 0)
853 			goto fail3;
854 		if (tag == EFX_VPD_END)
855 			break;
856 		else if (tag != evvp->evv_tag) {
857 			offset += taglen;
858 			continue;
859 		}
860 
861 		/* We only support modifying large resource tags */
862 		if (offset - taghead != 3) {
863 			rc = EINVAL;
864 			goto fail4;
865 		}
866 
867 		/*
868 		 * Work out the offset of the byte immediately after the
869 		 * old (=source) and new (=dest) new keyword/tag
870 		 */
871 		pos = 0;
872 		if (tag == EFX_VPD_ID) {
873 			source = offset + taglen;
874 			dest = offset + evvp->evv_length;
875 			goto check_space;
876 		}
877 
878 		EFSYS_ASSERT3U(tag, ==, EFX_VPD_RO);
879 		source = dest = 0;
880 		for (pos = 0; pos != taglen; pos += 3 + keylen) {
881 			if ((rc = efx_vpd_next_keyword(data + offset,
882 			    taglen, pos, &keyword, &keylen)) != 0)
883 				goto fail5;
884 
885 			if (keyword == evvp->evv_keyword &&
886 			    evvp->evv_length == 0) {
887 				/* Deleting this keyword */
888 				source = offset + pos + 3 + keylen;
889 				dest = offset + pos;
890 				break;
891 
892 			} else if (keyword == evvp->evv_keyword) {
893 				/* Adjusting this keyword */
894 				source = offset + pos + 3 + keylen;
895 				dest = offset + pos + 3 + evvp->evv_length;
896 				break;
897 
898 			} else if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
899 				/* The RV keyword must be at the end */
900 				EFSYS_ASSERT3U(pos + 3 + keylen, ==, taglen);
901 
902 				/*
903 				 * The keyword doesn't already exist. If the
904 				 * user deleting a non-existant keyword then
905 				 * this is a no-op.
906 				 */
907 				if (evvp->evv_length == 0)
908 					return (0);
909 
910 				/* Insert this keyword before the RV keyword */
911 				source = offset + pos;
912 				dest = offset + pos + 3 + evvp->evv_length;
913 				break;
914 			}
915 		}
916 
917 	check_space:
918 		if (used + dest > size + source) {
919 			rc = ENOSPC;
920 			goto fail6;
921 		}
922 
923 		/* Move trailing data */
924 		(void) memmove(data + dest, data + source, used - source);
925 
926 		/* Copy contents */
927 		memcpy(data + dest - evvp->evv_length, evvp->evv_value,
928 		    evvp->evv_length);
929 
930 		/* Insert new keyword header if required */
931 		if (tag != EFX_VPD_ID && evvp->evv_length > 0) {
932 			EFX_POPULATE_WORD_1(word, EFX_WORD_0,
933 					    evvp->evv_keyword);
934 			data[offset + pos + 0] =
935 			    EFX_WORD_FIELD(word, EFX_BYTE_0);
936 			data[offset + pos + 1] =
937 			    EFX_WORD_FIELD(word, EFX_BYTE_1);
938 			data[offset + pos + 2] = evvp->evv_length;
939 		}
940 
941 		/* Modify tag length (large resource type) */
942 		taglen += (uint16_t)(dest - source);
943 		EFX_POPULATE_WORD_1(word, EFX_WORD_0, taglen);
944 		data[offset - 2] = EFX_WORD_FIELD(word, EFX_BYTE_0);
945 		data[offset - 1] = EFX_WORD_FIELD(word, EFX_BYTE_1);
946 
947 		goto checksum;
948 	}
949 
950 	/* Unable to find the matching tag */
951 	rc = ENOENT;
952 	goto fail7;
953 
954 checksum:
955 	/* Find the RV tag, and update the checksum */
956 	offset = 0;
957 	_NOTE(CONSTANTCONDITION)
958 	while (1) {
959 		if ((rc = efx_vpd_next_tag(data, size, &offset,
960 		    &tag, &taglen)) != 0)
961 			goto fail8;
962 		if (tag == EFX_VPD_END)
963 			break;
964 		if (tag == EFX_VPD_RO) {
965 			for (pos = 0; pos != taglen; pos += 3 + keylen) {
966 				if ((rc = efx_vpd_next_keyword(data + offset,
967 				    taglen, pos, &keyword, &keylen)) != 0)
968 					goto fail9;
969 
970 				if (keyword == EFX_VPD_KEYWORD('R', 'V')) {
971 					cksum = 0;
972 					for (i = 0; i < offset + pos + 3; i++)
973 						cksum += data[i];
974 					data[i] = -cksum;
975 					break;
976 				}
977 			}
978 		}
979 
980 		offset += taglen;
981 	}
982 
983 	/* Zero out the unused portion */
984 	(void) memset(data + offset + taglen, 0xff, size - offset - taglen);
985 
986 	return (0);
987 
988 fail9:
989 	EFSYS_PROBE(fail9);
990 fail8:
991 	EFSYS_PROBE(fail8);
992 fail7:
993 	EFSYS_PROBE(fail7);
994 fail6:
995 	EFSYS_PROBE(fail6);
996 fail5:
997 	EFSYS_PROBE(fail5);
998 fail4:
999 	EFSYS_PROBE(fail4);
1000 fail3:
1001 	EFSYS_PROBE(fail3);
1002 fail2:
1003 	EFSYS_PROBE(fail2);
1004 fail1:
1005 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1006 
1007 	return (rc);
1008 }
1009 
1010 				void
1011 efx_vpd_fini(
1012 	__in			efx_nic_t *enp)
1013 {
1014 	const efx_vpd_ops_t *evpdop = enp->en_evpdop;
1015 
1016 	EFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);
1017 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);
1018 	EFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_VPD);
1019 
1020 	if (evpdop->evpdo_fini != NULL)
1021 		evpdop->evpdo_fini(enp);
1022 
1023 	enp->en_evpdop = NULL;
1024 	enp->en_mod_flags &= ~EFX_MOD_VPD;
1025 }
1026 
1027 #endif	/* EFSYS_OPT_VPD */
1028