xref: /illumos-gate/usr/src/uts/common/pcmcia/cs/cs.c (revision 8b80e8cb6855118d46f605e91b5ed4ce83417395)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 /*
30  * PCMCIA Card Services
31  *	The PCMCIA Card Services is a loadable module which
32  *	presents the Card Services interface to client device
33  *	drivers.
34  *
35  *	Card Services uses Socket Services-like calls into the
36  *	PCMCIA nexus driver to manipulate socket and adapter
37  *	resources.
38  *
39  * Note that a bunch of comments are not indented correctly with the
40  *	code that they are commenting on. This is because cstyle is
41  *	is inflexible concerning 4-column indenting.
42  */
43 
44 #if defined(DEBUG)
45 #define	CS_DEBUG
46 #endif
47 
48 #include <sys/types.h>
49 #include <sys/systm.h>
50 #include <sys/user.h>
51 #include <sys/buf.h>
52 #include <sys/file.h>
53 #include <sys/uio.h>
54 #include <sys/conf.h>
55 #include <sys/stat.h>
56 #include <sys/autoconf.h>
57 #include <sys/vtoc.h>
58 #include <sys/dkio.h>
59 #include <sys/ddi.h>
60 #include <sys/sunddi.h>
61 #include <sys/debug.h>
62 #include <sys/varargs.h>
63 #include <sys/var.h>
64 #include <sys/proc.h>
65 #include <sys/thread.h>
66 #include <sys/utsname.h>
67 #include <sys/vtrace.h>
68 #include <sys/kstat.h>
69 #include <sys/kmem.h>
70 #include <sys/modctl.h>
71 #include <sys/kobj.h>
72 #include <sys/callb.h>
73 #include <sys/time.h>
74 
75 #include <sys/pctypes.h>
76 #include <pcmcia/sys/cs_types.h>
77 #include <sys/pcmcia.h>
78 #include <sys/sservice.h>
79 #include <pcmcia/sys/cis.h>
80 #include <pcmcia/sys/cis_handlers.h>
81 #include <pcmcia/sys/cs.h>
82 #include <pcmcia/sys/cs_priv.h>
83 #include <pcmcia/sys/cs_stubs.h>
84 
85 /*
86  * The cs_strings header file is where all of the major strings that
87  *	Card Services uses are located.
88  */
89 #include <pcmcia/sys/cs_strings.h>
90 
91 
92 /*
93  * Function declarations
94  *
95  * The main Card Services entry point
96  */
97 int CardServices(int function, ...);
98 
99 /*
100  * functions and globals used by Socket Services
101  *
102  * WAS: void *(*cis_parser)(int, ...) = NULL;
103  */
104 void *(*cis_parser)(int, ...) = NULL;
105 csfunction_t *cs_socket_services = NULL;
106 
107 /*
108  * event handling functions
109  */
110 static event_t ss_to_cs_events(cs_socket_t *, event_t);
111 static event_t cs_cse2sbm(event_t);
112 static void cs_event_thread(uint32_t);
113 static int cs_card_insertion(cs_socket_t *, event_t);
114 static int cs_card_removal(cs_socket_t *);
115 static void cs_ss_thread(uint32_t);
116 void cs_ready_timeout(void *);
117 static int cs_card_for_client(client_t *);
118 static int cs_request_socket_mask(client_handle_t, request_socket_mask_t *);
119 static int cs_release_socket_mask(client_handle_t, release_socket_mask_t *);
120 static int cs_get_event_mask(client_handle_t, sockevent_t *);
121 static int cs_set_event_mask(client_handle_t, sockevent_t *);
122 static int cs_event2text(event2text_t *, int);
123 static int cs_read_event_status(cs_socket_t *, client_t *, event_t *,
124 						get_ss_status_t *, int);
125 uint32_t cs_socket_event_softintr(caddr_t);
126 void cs_event_softintr_timeout(void *);
127 static int cs_get_status(client_handle_t, get_status_t *);
128 static uint32_t cs_sbm2cse(uint32_t);
129 static unsigned cs_merge_event_masks(cs_socket_t *, client_t *);
130 static int cs_set_socket_event_mask(cs_socket_t *, unsigned);
131 
132 /*
133  * SS<->CS communication and internal socket and window  handling functions
134  */
135 static uint32_t cs_add_socket(uint32_t);
136 static uint32_t cs_drop_socket(uint32_t);
137 static cs_socket_t *cs_get_sp(uint32_t);
138 static cs_socket_t *cs_find_sp(uint32_t);
139 static cs_window_t *cs_get_wp(uint32_t);
140 static cs_window_t *cs_find_wp(uint32_t);
141 static int cs_add_windows(int, uint32_t);
142 static uint32_t cs_ss_init();
143 static void cs_set_acc_attributes(set_window_t *, uint32_t);
144 
145 /*
146  * CIS handling functions
147  */
148 cistpl_callout_t *cis_cistpl_std_callout;
149 static int cs_parse_tuple(client_handle_t,  tuple_t *, cisparse_t *, cisdata_t);
150 static int cs_get_tuple_data(client_handle_t, tuple_t *);
151 static int cs_validate_cis(client_handle_t, cisinfo_t *);
152 static int cs_get_firstnext_tuple(client_handle_t, tuple_t *, uint32_t);
153 static int cs_create_cis(cs_socket_t *);
154 static int cs_destroy_cis(cs_socket_t *);
155 
156 /*
157  * client handling functions
158  */
159 unsigned cs_create_next_client_minor(unsigned, unsigned);
160 static client_t *cs_find_client(client_handle_t, int *);
161 static client_handle_t cs_create_client_handle(unsigned, client_t *);
162 static int cs_destroy_client_handle(client_handle_t);
163 static int cs_register_client(client_handle_t *, client_reg_t *);
164 static int cs_deregister_client(client_handle_t);
165 static int cs_deregister_mtd(client_handle_t);
166 static void cs_clear_superclient_lock(int);
167 static int cs_add_client_to_socket(unsigned, client_handle_t *,
168 						client_reg_t *, int);
169 static int cs_get_client_info(client_handle_t, client_info_t *);
170 static int cs_get_firstnext_client(get_firstnext_client_t *, uint32_t);
171 
172 /*
173  * window handling functions
174  */
175 static int cs_request_window(client_handle_t, window_handle_t *, win_req_t *);
176 static int cs_release_window(window_handle_t);
177 static int cs_modify_window(window_handle_t, modify_win_t *);
178 static int cs_modify_mem_window(window_handle_t, modify_win_t *, win_req_t *,
179 									int);
180 static int cs_map_mem_page(window_handle_t, map_mem_page_t *);
181 static int cs_find_mem_window(uint32_t, win_req_t *, uint32_t *);
182 static int cs_memwin_space_and_map_ok(inquire_window_t *, win_req_t *);
183 static int cs_valid_window_speed(inquire_window_t *, uint32_t);
184 static window_handle_t cs_create_window_handle(uint32_t);
185 static cs_window_t *cs_find_window(window_handle_t);
186 static int cs_find_io_win(uint32_t, iowin_char_t *, uint32_t *, uint32_t *);
187 
188 /*
189  * IO, IRQ and configuration handling functions
190  */
191 static int cs_request_io(client_handle_t, io_req_t *);
192 static int cs_release_io(client_handle_t, io_req_t *);
193 static int cs_allocate_io_win(uint32_t, uint32_t, uint32_t *);
194 static int cs_setup_io_win(uint32_t, uint32_t, baseaddru_t *,
195 					uint32_t *, uint32_t, uint32_t);
196 static int cs_request_irq(client_handle_t, irq_req_t *);
197 static int cs_release_irq(client_handle_t, irq_req_t *);
198 static int cs_request_configuration(client_handle_t, config_req_t *);
199 static int cs_release_configuration(client_handle_t, release_config_t *);
200 static int cs_modify_configuration(client_handle_t, modify_config_t *);
201 static int cs_access_configuration_register(client_handle_t,
202 						access_config_reg_t *);
203 
204 /*
205  * RESET and general info functions
206  */
207 static int cs_reset_function(client_handle_t, reset_function_t *);
208 static int cs_get_configuration_info(client_handle_t *,
209 						get_configuration_info_t *);
210 static int cs_get_cardservices_info(client_handle_t,
211 						get_cardservices_info_t *);
212 static int cs_get_physical_adapter_info(client_handle_t,
213 						get_physical_adapter_info_t *);
214 
215 /*
216  * general functions
217  */
218 static uint32_t cs_get_socket(client_handle_t, uint32_t *, uint32_t *,
219 					cs_socket_t **, client_t **);
220 static int cs_convert_speed(convert_speed_t *);
221 static int cs_convert_size(convert_size_t *);
222 static char *cs_error2text(int, int);
223 static int cs_map_log_socket(client_handle_t, map_log_socket_t *);
224 static int cs_convert_powerlevel(uint32_t, uint32_t, uint32_t, unsigned *);
225 static int cs_make_device_node(client_handle_t, make_device_node_t *);
226 static int cs_remove_device_node(client_handle_t, remove_device_node_t *);
227 static int cs_ddi_info(cs_ddi_info_t *);
228 static int cs_init_cis_window(cs_socket_t *, uint32_t *, acc_handle_t *,
229 				uint32_t);
230 static int cs_sys_ctl(cs_sys_ctl_t *);
231 
232 /*
233  * global variables
234  */
235 static int cs_max_client_handles = CS_MAX_CLIENTS;
236 static client_t cs_socket_services_client;	/* global SS client */
237 static client_types_t client_types[MAX_CLIENT_TYPES];
238 static cs_globals_t cs_globals;
239 int cs_reset_timeout_time = RESET_TIMEOUT_TIME;
240 int cs_rc1_delay = CS_RC1_DELAY;
241 int cs_rc2_delay = CS_RC2_DELAY;
242 int cs_rq_delay = CS_RQ_DELAY;
243 
244 #ifdef	CS_DEBUG
245 int	cs_debug = 0;
246 #endif
247 
248 /*
249  * cs_init - Initialize CS internal structures, databases, and state,
250  *		and register with SS
251  *
252  * XXX - Need to make sure that if we fail at any point that we free
253  *		any resources that we allocated, as well as kill any
254  *		threads that may have been started.
255  */
256 int
257 cs_init()
258 {
259 	client_types_t *ct;
260 	client_t *client;
261 
262 	/*
263 	 * Initialize the CS global structure
264 	 */
265 	bzero((caddr_t)&cs_globals, sizeof (cs_globals_t));
266 
267 	mutex_init(&cs_globals.global_lock, NULL, MUTEX_DRIVER, NULL);
268 	mutex_init(&cs_globals.window_lock, NULL, MUTEX_DRIVER, NULL);
269 
270 	cs_globals.init_state = GLOBAL_INIT_STATE_MUTEX;
271 
272 	/*
273 	 * Set up the global Socket Services client, since we're going to
274 	 *	need it once we register with SS.
275 	 */
276 	client = &cs_socket_services_client;
277 	bzero((caddr_t)client, sizeof (client_t));
278 	client->client_handle = CS_SS_CLIENT_HANDLE;
279 	client->flags |= (INFO_SOCKET_SERVICES | CLIENT_CARD_INSERTED);
280 
281 	/*
282 	 * Setup the client type structure - this is used in the socket event
283 	 *	thread to sequence the delivery of events to all clients on
284 	 *	the socket.
285 	 */
286 	ct = &client_types[0];
287 	ct->type = INFO_IO_CLIENT;
288 	ct->order = CLIENT_EVENTS_LIFO;
289 	ct->next = &client_types[1];
290 
291 	ct = ct->next;
292 	ct->type = INFO_MTD_CLIENT;
293 	ct->order = CLIENT_EVENTS_FIFO;
294 	ct->next = &client_types[2];
295 
296 	ct = ct->next;
297 	ct->type = INFO_MEM_CLIENT;
298 	ct->order = CLIENT_EVENTS_FIFO;
299 	ct->next = NULL;
300 
301 	return (CS_SUCCESS);
302 }
303 
304 /*
305  * cs_deinit - Deinitialize CS
306  *
307  * This function cleans up any allocated resources, stops any running threads,
308  *	destroys any mutexes and condition variables, and finally frees up the
309  *	global socket and window structure arrays.
310  */
311 int
312 cs_deinit()
313 {
314 	cs_socket_t *sp;
315 	int sn, have_clients = 0, have_sockets = 0;
316 	cs_register_cardservices_t rcs;
317 
318 #if defined(CS_DEBUG)
319 	if (cs_debug > 1)
320 	    cmn_err(CE_CONT, "CS: cs_deinit\n");
321 #endif
322 
323 	/*
324 	 * Deregister with the Card Services kernel stubs module
325 	 */
326 	rcs.magic = CS_STUBS_MAGIC;
327 	rcs.function = CS_ENTRY_DEREGISTER;
328 	(void) csx_register_cardservices(&rcs);
329 
330 	/*
331 	 * Set the GLOBAL_INIT_STATE_NO_CLIENTS flag to prevent new clients
332 	 *	from registering.
333 	 */
334 	mutex_enter(&cs_globals.global_lock);
335 	cs_globals.init_state |= GLOBAL_INIT_STATE_NO_CLIENTS;
336 	mutex_exit(&cs_globals.global_lock);
337 
338 	/*
339 	 * Go through each socket and make sure that there are no clients
340 	 *	on any of the sockets.  If there are, we can't deinit until
341 	 *	all the clients for every socket are gone.
342 	 */
343 	for (sn = 0; sn < cs_globals.max_socket_num; sn++) {
344 	    if ((sp = cs_get_sp(sn)) != NULL) {
345 		have_sockets++;
346 		if (sp->client_list) {
347 		    cmn_err(CE_CONT, "cs_deinit: cannot unload module since "
348 				"socket %d has registered clients\n", sn);
349 		    have_clients++;
350 		}
351 	    }
352 	}
353 
354 	/*
355 	 * We don't allow unload if there are any clients registered
356 	 *	or if there are still sockets that are active.
357 	 */
358 	if ((have_clients > 0) || (have_sockets > 0))
359 	    return (BAD_FUNCTION);
360 
361 #ifdef	XXX
362 	/*
363 	 * If one or more sockets have been added, we need to deallocate
364 	 *	the resources associated with those sockets.
365 	 */
366 
367 	/*
368 	 * First, tell Socket Services that we're leaving, so that we
369 	 *	don't get any more event callbacks.
370 	 */
371 	SocketServices(CSUnregister);
372 
373 	/*
374 	 * Wait for the soft int timer to tell us it's done
375 	 */
376 	mutex_enter(&cs_globals.global_lock);
377 	cs_globals.init_state |= GLOBAL_INIT_STATE_UNLOADING;
378 	mutex_exit(&cs_globals.global_lock);
379 	UNTIMEOUT(cs_globals.sotfint_tmo);
380 
381 	/*
382 	 * Remove the soft interrupt handler.
383 	 */
384 	mutex_enter(&cs_globals.global_lock);
385 	if (cs_globals.init_state & GLOBAL_INIT_STATE_SOFTINTR) {
386 	    ddi_remove_softintr(cs_globals.softint_id);
387 	    cs_globals.init_state &= ~GLOBAL_INIT_STATE_SOFTINTR;
388 	}
389 	mutex_exit(&cs_globals.global_lock);
390 
391 	return (CS_SUCCESS);
392 
393 	/*
394 	 * Go through each socket and free any resource allocated to that
395 	 *	socket, as well as any mutexs and condition variables.
396 	 */
397 	for (sn = 0; sn < cs_globals.max_socket_num; sn++) {
398 	    set_socket_t set_socket;
399 
400 	    if ((sp = cs_get_sp(sn)) != NULL) {
401 
402 		/*
403 		 * untimeout possible pending ready/busy timer
404 		 */
405 		UNTIMEOUT(sp->rdybsy_tmo_id);
406 
407 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
408 		    mutex_enter(&sp->lock);
409 		sp->flags = SOCKET_UNLOAD_MODULE;
410 		if (sp->init_state & SOCKET_INIT_STATE_SOFTINTR)
411 		    sp->init_state &= ~SOCKET_INIT_STATE_SOFTINTR;
412 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
413 		    mutex_exit(&sp->lock);
414 
415 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
416 		    mutex_enter(&sp->cis_lock);
417 		(void) cs_destroy_cis(sp);
418 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
419 		    mutex_exit(&sp->cis_lock);
420 
421 		/*
422 		 * Tell the event handler thread that we want it to exit, then
423 		 *	wait around until it tells us that it has exited.
424 		 */
425 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
426 		    mutex_enter(&sp->client_lock);
427 		if (sp->init_state & SOCKET_INIT_STATE_THREAD) {
428 		    sp->thread_state = SOCKET_THREAD_EXIT;
429 		    cv_broadcast(&sp->thread_cv);
430 		    cv_wait(&sp->caller_cv, &sp->client_lock);
431 		}
432 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
433 		    mutex_exit(&sp->client_lock);
434 
435 		/*
436 		 * Tell the SS work thread that we want it to exit, then
437 		 *	wait around until it tells us that it has exited.
438 		 */
439 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
440 		    mutex_enter(&sp->ss_thread_lock);
441 		if (sp->init_state & SOCKET_INIT_STATE_SS_THREAD) {
442 		    sp->ss_thread_state = SOCKET_THREAD_EXIT;
443 		    cv_broadcast(&sp->ss_thread_cv);
444 		    cv_wait(&sp->ss_caller_cv, &sp->ss_thread_lock);
445 		}
446 
447 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX)
448 		    mutex_exit(&sp->ss_thread_lock);
449 
450 		/*
451 		 * Free the mutexii and condition variables that we used.
452 		 */
453 		if (sp->init_state & SOCKET_INIT_STATE_MUTEX) {
454 		    mutex_destroy(&sp->lock);
455 		    mutex_destroy(&sp->client_lock);
456 		    mutex_destroy(&sp->cis_lock);
457 		    mutex_destroy(&sp->ss_thread_lock);
458 		}
459 
460 		if (sp->init_state & SOCKET_INIT_STATE_CV) {
461 		    cv_destroy(&sp->thread_cv);
462 		    cv_destroy(&sp->caller_cv);
463 		    cv_destroy(&sp->reset_cv);
464 		    cv_destroy(&sp->ss_thread_cv);
465 		    cv_destroy(&sp->ss_caller_cv);
466 		}
467 
468 #ifdef	USE_IOMMAP_WINDOW
469 		/*
470 		 * Free the memory-mapped IO structure if we allocated one.
471 		 */
472 		if (sp->io_mmap_window)
473 		    kmem_free(sp->io_mmap_window, sizeof (io_mmap_window_t));
474 #endif	/* USE_IOMMAP_WINDOW */
475 
476 		/*
477 		 * Return the socket to memory-only mode and turn off the
478 		 *	socket power.
479 		 */
480 		sp->event_mask = 0;
481 		set_socket.socket = sp->socket_num;
482 		set_socket.SCIntMask = 0;
483 		set_socket.IREQRouting = 0;
484 		set_socket.IFType = IF_MEMORY;
485 		set_socket.CtlInd = 0; /* turn off controls and indicators */
486 		set_socket.State = (unsigned)~0; /* clear latched state bits */
487 
488 		(void) cs_convert_powerlevel(sp->socket_num, 0, VCC,
489 						&set_socket.VccLevel);
490 		(void) cs_convert_powerlevel(sp->socket_num, 0, VPP1,
491 						&set_socket.Vpp1Level);
492 		(void) cs_convert_powerlevel(sp->socket_num, 0, VPP2,
493 						&set_socket.Vpp2Level);
494 
495 		/*
496 		 * If we fail this call, there's not much we can do, so
497 		 *	just continue with the resource deallocation.
498 		 */
499 		if ((ret =
500 			SocketServices(SS_SetSocket, &set_socket)) != SUCCESS) {
501 		    cmn_err(CE_CONT,
502 			"cs_deinit: socket %d SS_SetSocket failure %d\n",
503 							sp->socket_num, ret);
504 		}
505 	    } /* cs_get_sp */
506 	} /* for (sn) */
507 #endif	/* XXX */
508 
509 	/*
510 	 * Destroy the global mutexii.
511 	 */
512 	mutex_destroy(&cs_globals.global_lock);
513 	mutex_destroy(&cs_globals.window_lock);
514 
515 #ifdef	XXX
516 	/*
517 	 * Free the global "super-client" structure
518 	 */
519 	if (cs_globals.sclient_list)
520 	    kmem_free(cs_globals.sclient_list,
521 		(cs_globals.num_sockets * sizeof (struct sclient_list_t)));
522 	cs_globals.sclient_list = NULL;
523 #endif	/* XXX */
524 
525 	return (CS_SUCCESS);
526 }
527 
528 /*
529  * ==== drip, drip, drip - the Card Services waterfall :-) ====
530  */
531 
532 /*
533  * CardServices - general Card Services entry point for CS clients
534  *			and Socket Services; the address of this
535  *			function is handed to SS via the CSRegister
536  *			SS call
537  */
538 int
539 CardServices(int function, ...)
540 {
541 	va_list arglist;
542 	int retcode = CS_UNSUPPORTED_FUNCTION;
543 
544 	cs_socket_t	*socp;
545 	uint32_t	*offp;
546 	acc_handle_t	*hp;
547 	client_handle_t	ch;
548 	client_handle_t	*chp;
549 	window_handle_t	wh;
550 	window_handle_t	*whp;
551 	tuple_t		*tuple;
552 	cisparse_t	*cisparse;
553 
554 #ifdef	CS_DEBUG
555 	if (cs_debug > 127) {
556 	    cmn_err(CE_CONT, "CardServices: called for function %s (0x%x)\n",
557 				cs_error2text(function, CSFUN2TEXT_FUNCTION),
558 				function);
559 	}
560 #endif
561 
562 	va_start(arglist, function);
563 
564 	/*
565 	 * Here's the Card Services waterfall
566 	 */
567 	switch (function) {
568 	/*
569 	 * We got here as a result of the CIS module calling us
570 	 *	in response to cs_ss_init() calling the CIS module
571 	 *	at CIS_PARSER(CISP_CIS_SETUP, ...)
572 	 */
573 	    case CISRegister: {
574 		cisregister_t *cisr;
575 
576 		    cisr = va_arg(arglist, cisregister_t *);
577 
578 		    if (cisr->cis_magic != PCCS_MAGIC ||
579 			cisr->cis_version != PCCS_VERSION) {
580 			    cmn_err(CE_WARN,
581 				"CS: CISRegister (%lx, %lx, %lx, %lx) *ERROR*",
582 					(long)cisr->cis_magic,
583 					(long)cisr->cis_version,
584 					(long)cisr->cis_parser,
585 					(long)cisr->cistpl_std_callout);
586 			retcode = CS_BAD_ARGS;
587 		    } else {
588 			/*
589 			 * Replace the CIS Parser entry point if
590 			 *	necessary.
591 			 */
592 			if (cisr->cis_parser != NULL)
593 			    cis_parser = cisr->cis_parser;
594 			cis_cistpl_std_callout = cisr->cistpl_std_callout;
595 			retcode = CS_SUCCESS;
596 		    }
597 		}
598 		break;
599 	    case CISUnregister:	/* XXX - should we do some more checking */
600 		/* XXX - need to protect this by a mutex */
601 		cis_parser = NULL;
602 		cis_cistpl_std_callout = NULL;
603 		retcode = CS_SUCCESS;
604 		break;
605 	    case InitCISWindow:
606 		socp	= va_arg(arglist, cs_socket_t *);
607 		offp	= va_arg(arglist, uint32_t *);
608 		hp	= va_arg(arglist, acc_handle_t *);
609 		retcode = cs_init_cis_window(socp, offp, hp,
610 				va_arg(arglist, uint32_t));
611 		break;
612 	    case RegisterClient:
613 		chp = va_arg(arglist, client_handle_t *),
614 		retcode = cs_register_client(chp,
615 				va_arg(arglist, client_reg_t *));
616 		break;
617 	    case DeregisterClient:
618 		retcode = cs_deregister_client(
619 				va_arg(arglist, client_handle_t));
620 		break;
621 	    case GetStatus:
622 		ch = va_arg(arglist, client_handle_t);
623 		retcode = cs_get_status(ch,
624 				va_arg(arglist, get_status_t *));
625 		break;
626 	    case ResetFunction:
627 		ch = va_arg(arglist, client_handle_t);
628 		retcode = cs_reset_function(ch,
629 				va_arg(arglist, reset_function_t *));
630 		break;
631 	    case SetEventMask:
632 		ch = va_arg(arglist, client_handle_t);
633 		retcode = cs_set_event_mask(ch,
634 				va_arg(arglist, sockevent_t *));
635 		break;
636 	    case GetEventMask:
637 		ch = va_arg(arglist, client_handle_t);
638 		retcode = cs_get_event_mask(ch,
639 				va_arg(arglist, sockevent_t *));
640 		break;
641 	    case RequestIO:
642 		ch = va_arg(arglist, client_handle_t);
643 		retcode = cs_request_io(ch,
644 				va_arg(arglist, io_req_t *));
645 		break;
646 	    case ReleaseIO:
647 		ch = va_arg(arglist, client_handle_t);
648 		retcode = cs_release_io(ch,
649 				va_arg(arglist, io_req_t *));
650 		break;
651 	    case RequestIRQ:
652 		ch = va_arg(arglist, client_handle_t);
653 		retcode = cs_request_irq(ch,
654 				va_arg(arglist, irq_req_t *));
655 		break;
656 	    case ReleaseIRQ:
657 		ch = va_arg(arglist, client_handle_t);
658 		retcode = cs_release_irq(ch,
659 				va_arg(arglist, irq_req_t *));
660 		break;
661 	    case RequestWindow:
662 		ch = va_arg(arglist, client_handle_t);
663 		whp = va_arg(arglist, window_handle_t *);
664 		retcode = cs_request_window(ch, whp,
665 				va_arg(arglist, win_req_t *));
666 		break;
667 	    case ReleaseWindow:
668 		retcode = cs_release_window(
669 				va_arg(arglist, window_handle_t));
670 		break;
671 	    case ModifyWindow:
672 		wh = va_arg(arglist, window_handle_t);
673 		retcode = cs_modify_window(wh,
674 				va_arg(arglist, modify_win_t *));
675 		break;
676 	    case MapMemPage:
677 		wh = va_arg(arglist, window_handle_t);
678 		retcode = cs_map_mem_page(wh,
679 				va_arg(arglist, map_mem_page_t *));
680 		break;
681 	    case RequestSocketMask:
682 		ch = va_arg(arglist, client_handle_t);
683 		retcode = cs_request_socket_mask(ch,
684 				va_arg(arglist, request_socket_mask_t *));
685 		break;
686 	    case ReleaseSocketMask:
687 		ch = va_arg(arglist, client_handle_t);
688 		retcode = cs_release_socket_mask(ch,
689 				va_arg(arglist, release_socket_mask_t *));
690 		break;
691 	    case RequestConfiguration:
692 		ch = va_arg(arglist, client_handle_t);
693 		retcode = cs_request_configuration(ch,
694 				va_arg(arglist, config_req_t *));
695 		break;
696 	    case GetPhysicalAdapterInfo:
697 		ch = va_arg(arglist, client_handle_t);
698 		retcode = cs_get_physical_adapter_info(ch,
699 				va_arg(arglist, get_physical_adapter_info_t *));
700 		break;
701 	    case GetCardServicesInfo:
702 		ch = va_arg(arglist, client_handle_t);
703 		retcode = cs_get_cardservices_info(ch,
704 				va_arg(arglist, get_cardservices_info_t *));
705 		break;
706 	    case GetConfigurationInfo:
707 		chp = va_arg(arglist, client_handle_t *);
708 		retcode = cs_get_configuration_info(chp,
709 				va_arg(arglist, get_configuration_info_t *));
710 		break;
711 	    case ModifyConfiguration:
712 		ch = va_arg(arglist, client_handle_t);
713 		retcode = cs_modify_configuration(ch,
714 				va_arg(arglist, modify_config_t *));
715 		break;
716 	    case AccessConfigurationRegister:
717 		ch = va_arg(arglist, client_handle_t);
718 		retcode = cs_access_configuration_register(ch,
719 				va_arg(arglist, access_config_reg_t *));
720 		break;
721 	    case ReleaseConfiguration:
722 		ch = va_arg(arglist, client_handle_t);
723 		retcode = cs_release_configuration(ch,
724 				va_arg(arglist, release_config_t *));
725 		break;
726 	    case OpenMemory:
727 		cmn_err(CE_CONT, "CS: OpenMemory\n");
728 		break;
729 	    case ReadMemory:
730 		cmn_err(CE_CONT, "CS: ReadMemory\n");
731 		break;
732 	    case WriteMemory:
733 		cmn_err(CE_CONT, "CS: WriteMemory\n");
734 		break;
735 	    case CopyMemory:
736 		cmn_err(CE_CONT, "CS: CopyMemory\n");
737 		break;
738 	    case RegisterEraseQueue:
739 		cmn_err(CE_CONT, "CS: RegisterEraseQueue\n");
740 		break;
741 	    case CheckEraseQueue:
742 		cmn_err(CE_CONT, "CS: CheckEraseQueue\n");
743 		break;
744 	    case DeregisterEraseQueue:
745 		cmn_err(CE_CONT, "CS: DeregisterEraseQueue\n");
746 		break;
747 	    case CloseMemory:
748 		cmn_err(CE_CONT, "CS: CloseMemory\n");
749 		break;
750 	    case GetFirstRegion:
751 		cmn_err(CE_CONT, "CS: GetFirstRegion\n");
752 		break;
753 	    case GetNextRegion:
754 		cmn_err(CE_CONT, "CS: GetNextRegion\n");
755 		break;
756 	    case GetFirstPartition:
757 		cmn_err(CE_CONT, "CS: GetFirstPartition\n");
758 		break;
759 	    case GetNextPartition:
760 		cmn_err(CE_CONT, "CS: GetNextPartition\n");
761 		break;
762 	    case ReturnSSEntry:
763 		cmn_err(CE_CONT, "CS: ReturnSSEntry\n");
764 		break;
765 	    case MapLogSocket:
766 		ch = va_arg(arglist, client_handle_t);
767 		retcode = cs_map_log_socket(ch,
768 				va_arg(arglist, map_log_socket_t *));
769 		break;
770 	    case MapPhySocket:
771 		cmn_err(CE_CONT, "CS: MapPhySocket\n");
772 		break;
773 	    case MapLogWindow:
774 		cmn_err(CE_CONT, "CS: MapLogWindow\n");
775 		break;
776 	    case MapPhyWindow:
777 		cmn_err(CE_CONT, "CS: MapPhyWindow\n");
778 		break;
779 	    case RegisterMTD:
780 		cmn_err(CE_CONT, "CS: RegisterMTD\n");
781 		break;
782 	    case RegisterTimer:
783 		cmn_err(CE_CONT, "CS: RegisterTimer\n");
784 		break;
785 	    case SetRegion:
786 		cmn_err(CE_CONT, "CS: SetRegion\n");
787 		break;
788 	    case RequestExclusive:
789 		cmn_err(CE_CONT, "CS: RequestExclusive\n");
790 		break;
791 	    case ReleaseExclusive:
792 		cmn_err(CE_CONT, "CS: ReleaseExclusive\n");
793 		break;
794 	    case GetFirstClient:
795 		retcode = cs_get_firstnext_client(
796 				va_arg(arglist, get_firstnext_client_t *),
797 				CS_GET_FIRST_FLAG);
798 		break;
799 	    case GetNextClient:
800 		retcode = cs_get_firstnext_client(
801 				va_arg(arglist, get_firstnext_client_t *),
802 				CS_GET_NEXT_FLAG);
803 		break;
804 	    case GetClientInfo:
805 		ch = va_arg(arglist, client_handle_t);
806 		retcode = cs_get_client_info(ch,
807 				va_arg(arglist, client_info_t *));
808 		break;
809 	    case AddSocketServices:
810 		cmn_err(CE_CONT, "CS: AddSocketServices\n");
811 		break;
812 	    case ReplaceSocketServices:
813 		cmn_err(CE_CONT, "CS: ReplaceSocketServices\n");
814 		break;
815 	    case VendorSpecific:
816 		cmn_err(CE_CONT, "CS: VendorSpecific\n");
817 		break;
818 	    case AdjustResourceInfo:
819 		cmn_err(CE_CONT, "CS: AdjustResourceInfo\n");
820 		break;
821 	    case ValidateCIS:
822 		ch = va_arg(arglist, client_handle_t);
823 		retcode = cs_validate_cis(ch,
824 				va_arg(arglist, cisinfo_t *));
825 		break;
826 	    case GetFirstTuple:
827 		ch = va_arg(arglist, client_handle_t);
828 		retcode = cs_get_firstnext_tuple(ch,
829 				va_arg(arglist, tuple_t *),
830 				CS_GET_FIRST_FLAG);
831 		break;
832 	    case GetNextTuple:
833 		ch = va_arg(arglist, client_handle_t);
834 		retcode = cs_get_firstnext_tuple(ch,
835 				va_arg(arglist, tuple_t *),
836 				CS_GET_NEXT_FLAG);
837 		break;
838 	    case GetTupleData:
839 		ch = va_arg(arglist, client_handle_t);
840 		retcode = cs_get_tuple_data(ch,
841 				va_arg(arglist, tuple_t *));
842 		break;
843 	    case ParseTuple:
844 		ch = va_arg(arglist, client_handle_t);
845 		tuple = va_arg(arglist, tuple_t *);
846 		cisparse = va_arg(arglist, cisparse_t *);
847 		retcode = cs_parse_tuple(ch, tuple, cisparse,
848 				va_arg(arglist, uint_t));
849 		break;
850 	    case MakeDeviceNode:
851 		ch = va_arg(arglist, client_handle_t);
852 		retcode = cs_make_device_node(ch,
853 				va_arg(arglist, make_device_node_t *));
854 		break;
855 	    case RemoveDeviceNode:
856 		ch = va_arg(arglist, client_handle_t);
857 		retcode = cs_remove_device_node(ch,
858 				va_arg(arglist, remove_device_node_t *));
859 		break;
860 	    case ConvertSpeed:
861 		retcode = cs_convert_speed(
862 				va_arg(arglist, convert_speed_t *));
863 		break;
864 	    case ConvertSize:
865 		retcode = cs_convert_size(
866 				va_arg(arglist, convert_size_t *));
867 		break;
868 	    case Event2Text:
869 		retcode = cs_event2text(
870 				va_arg(arglist, event2text_t *), 1);
871 		break;
872 	    case Error2Text: {
873 		error2text_t *cft;
874 
875 		cft = va_arg(arglist, error2text_t *);
876 		(void) strcpy(cft->text,
877 				cs_error2text(cft->item, CSFUN2TEXT_RETURN));
878 		retcode = CS_SUCCESS;
879 		}
880 		break;
881 	    case CS_DDI_Info:
882 		retcode = cs_ddi_info(va_arg(arglist, cs_ddi_info_t *));
883 		break;
884 	    case CS_Sys_Ctl:
885 		retcode = cs_sys_ctl(va_arg(arglist, cs_sys_ctl_t *));
886 		break;
887 	    default:
888 		cmn_err(CE_CONT, "CS: {unknown function %d}\n", function);
889 		break;
890 	} /* switch(function) */
891 
892 	va_end(arglist);
893 
894 #ifdef	CS_DEBUG
895 	if (cs_debug > 127) {
896 	    cmn_err(CE_CONT, "CardServices: returning %s (0x%x)\n",
897 				cs_error2text(retcode, CSFUN2TEXT_RETURN),
898 				retcode);
899 	}
900 #endif
901 
902 	return (retcode);
903 }
904 
905 /*
906  * ==== tuple and CIS handling section ====
907  */
908 
909 /*
910  * cs_parse_tuple - This function supports the CS ParseTuple function call.
911  *
912  *    returns:	CS_SUCCESS - if tuple parsed sucessfully
913  *		CS_NO_CARD - if no card in socket
914  *		CS_BAD_ARGS - if passed CIS list pointer is NULL
915  *		CS_UNKNOWN_TUPLE - if unknown tuple passed to CIS parser
916  *		CS_BAD_CIS - if generic parser error
917  *		CS_NO_CIS - if no CIS for card/function
918  *
919  *    See notes for the cs_get_firstnext_tuple function.
920  */
921 static int
922 cs_parse_tuple(client_handle_t client_handle, tuple_t *tuple,
923 				cisparse_t *cisparse, cisdata_t cisdata)
924 {
925 	cs_socket_t *sp;
926 	client_t *client;
927 	uint32_t fn;
928 	int ret;
929 
930 	if ((ret = cs_get_socket(client_handle, &tuple->Socket,
931 					&fn, &sp, &client)) != CS_SUCCESS)
932 	    return (ret);
933 
934 	/*
935 	 * If there's no card in the socket or the card in the socket is not
936 	 *	for this client, then return an error.
937 	 */
938 	if (!(client->flags & CLIENT_CARD_INSERTED))
939 	    return (CS_NO_CARD);
940 
941 	/*
942 	 * Sanity check to be sure that we've got a non-NULL CIS list
943 	 *	pointer.
944 	 */
945 	if (!(tuple->CISOffset))
946 	    return (CS_BAD_ARGS);
947 
948 	mutex_enter(&sp->cis_lock);
949 
950 	/*
951 	 * Check to see if there is a valid CIS for this function.
952 	 *	There is an implicit assumption here that if this
953 	 *	is a multi-function CIS and the specified function
954 	 *	number is not CS_GLOBAL_CIS that in order for there
955 	 *	to be a valid function-specific CIS, there also must
956 	 *	be a valid global CIS. This means that we don't need
957 	 *	to know whether this tuple came from the global CIS
958 	 *	or from the function-specific CIS.
959 	 */
960 	if ((sp->cis_flags & CW_VALID_CIS) &&
961 				(sp->cis[fn].flags & CW_VALID_CIS)) {
962 	    ret = (int)(uintptr_t)CIS_PARSER(CISP_CIS_PARSE_TUPLE,
963 				cis_cistpl_std_callout,
964 				tuple->CISOffset,
965 				(tuple->Attributes & TUPLE_RETURN_NAME)?
966 							HANDTPL_RETURN_NAME:
967 							HANDTPL_PARSE_LTUPLE,
968 				cisparse, cisdata);
969 	    mutex_exit(&sp->cis_lock);
970 	    if (ret == CISTPLF_UNKNOWN)
971 		return (CS_UNKNOWN_TUPLE);
972 	    if (ret != CISTPLF_NOERROR)
973 		return (CS_BAD_CIS);
974 	    ret = CS_SUCCESS;
975 	} else {
976 	    mutex_exit(&sp->cis_lock);
977 	    ret = CS_NO_CIS;
978 	} /* if (CW_VALID_CIS) */
979 
980 	return (ret);
981 }
982 
983 /*
984  * cs_get_firstnext_tuple - returns the first/next tuple of the specified type
985  *				this is to support the GetFirstTuple and
986  *				GetNextTuple function call
987  *
988  *    flags - one of:
989  *		CS_GET_FIRST_FLAG causes function to support GetFirstTuple
990  *		CS_GET_NEXT_FLAG causes function to support GetNextTuple
991  *
992  *	tuple_t->Attributes flags:
993  *		TUPLE_RETURN_LINK - XXX Not implemented, see notes below.
994  *		TUPLE_RETURN_IGNORED_TUPLES - return tuples with
995  *				CISTPLF_IGNORE_TUPLE set in the
996  *				cistpl_t->flags member.
997  *
998  *    Notes for regular PC card driver callers:
999  *
1000  *	On a single-function card, the caller will get back all the tuples in
1001  *	the CIS.
1002  *
1003  *	On a multi-function card, the caller will get the tuples from the
1004  *	global CIS followed by the tuples in the function-specific CIS. The
1005  *	caller will not get any tuples from a function-specific CIS that
1006  *	does not belong to the caller's function.
1007  *
1008  *    Notes for Socket Services, the "super-client" or CSI driver callers:
1009  *
1010  *	On a single-function card, the operation is the same as for regular
1011  *	PC card driver callers with the addition that if the function number
1012  *	is set to CS_GLOBAL_CIS this function will return CS_NO_CIS.
1013  *
1014  *	On a multi-function card, the operation is the same as for regular
1015  *	PC card driver callers with the addition that if the function number
1016  *	is set to CS_GLOBAL_CIS the caller will only get tuples from the
1017  *	global CIS. If a particular function nubmer does not exist, this
1018  *	function will return CS_NO_CIS for that function.
1019  *
1020  *    General notes:
1021  *
1022  *	On both a single-function card and a multi-function card, if the tuple
1023  *	comes from the global CIS chain, the CISTPLF_GLOBAL_CIS flag will be
1024  *	set in the tuple_t->flags member.
1025  *
1026  *	On a multi-function card, if the tuple comes from the function-specific
1027  *	CIS chain, the CISTPLF_MF_CIS flag will be set in the tuple_t->flags
1028  *	member.
1029  *
1030  *	For other flags that are set in the tuple_t->flags member, see the
1031  *	comments for the cis_list_lcreate function in the cis.c file.
1032  *
1033  *	The CIS parser may not include all the tuples that are in the CIS in
1034  *	the private CIS list that it creates and maintains. See the CIS
1035  *	parser documentation for a list of tuples that the parser does not
1036  *	include in the list.
1037  *
1038  *	If a tuple has the CISTPLF_IGNORE_TUPLE flag set and the flags
1039  *	parameter CIS_GET_LTUPLE_IGNORE is not set, that tuple will not
1040  *	be returned to the caller. Instead, the next tuple that matches
1041  *	the calling criteria will be returned (or NULL if no other tuples
1042  *	match the calling criteria). If CIS_GET_LTUPLE_IGNORE is set in
1043  *	the flags paramter, tuples in the CIS list that match the calling
1044  *	criteria will be returned.
1045  *
1046  * XXX The PC Card 95 Standard says that if the TUPLE_RETURN_LINK flag in
1047  *	the tuple_t->Attributes member is not set, then we don't return
1048  *	any of the link tuples. This function ignores this flag and always
1049  *	returns link tuples.
1050  *
1051  *    Return codes:
1052  *		CS_SUCCESS - if tuple sucessfully found and returned
1053  *		CS_NO_CARD - if no card inserted
1054  *		CS_NO_CIS - if no CIS for the specified card/function
1055  *		CS_NO_MORE_ITEMS - if tuple not found or no more tuples
1056  *					to return
1057  *
1058  *    See notes for cs_get_socket for a description of valid client, socket
1059  *	and function number combinations.
1060  */
1061 static int
1062 cs_get_firstnext_tuple(client_handle_t client_handle,
1063     tuple_t *tuple, uint32_t flags)
1064 {
1065 	cs_socket_t *sp;
1066 	client_t *client;
1067 	uint32_t fn;
1068 	int ret;
1069 
1070 	if ((ret = cs_get_socket(client_handle, &tuple->Socket, &fn,
1071 						&sp, &client)) != CS_SUCCESS)
1072 	    return (ret);
1073 
1074 	/*
1075 	 * If there's no card in the socket or the card in the socket is not
1076 	 *	for this client, then return an error.
1077 	 */
1078 	if (!(client->flags & CLIENT_CARD_INSERTED))
1079 	    return (CS_NO_CARD);
1080 
1081 	mutex_enter(&sp->cis_lock);
1082 
1083 	/*
1084 	 * If there's no CIS on this card or no CIS for the specified
1085 	 *	function, then we can't do much.
1086 	 */
1087 	if ((!(sp->cis_flags & CW_VALID_CIS)) ||
1088 				(!(sp->cis[fn].flags & CW_VALID_CIS))) {
1089 	    mutex_exit(&sp->cis_lock);
1090 	    return (CS_NO_CIS);
1091 	}
1092 
1093 	/*
1094 	 * This will set the CIS_GET_LTUPLE_IGNORE flag if the
1095 	 *	TUPLE_RETURN_IGNORED_TUPLES flag is set. The
1096 	 *	assumption here is that the CIS_GET_LTUPLE_IGNORE
1097 	 *	flag and the TUPLE_RETURN_IGNORED_TUPLES flag
1098 	 *	shares the same bit position. If this ever changes,
1099 	 *	we'll ahve to re-work this section of code.
1100 	 */
1101 	if (tuple->Attributes & TUPLE_RETURN_IGNORED_TUPLES)
1102 	    flags |= CIS_GET_LTUPLE_IGNORE;
1103 
1104 	/*
1105 	 * Are we GetFirstTuple or GetNextTuple?
1106 	 */
1107 	if ((flags & CIS_GET_LTUPLE_OPMASK) & CS_GET_FIRST_FLAG) {
1108 	/*
1109 	 * Initialize the tuple structure; we need this information when
1110 	 *	we have to process a GetNextTuple or ParseTuple call.
1111 	 * If this card has a multi-function CIS, then we always start out
1112 	 *	delivering tuples from the global CIS chain. If this card does
1113 	 *	not have a multi-function CIS, then the function 0 CIS chain
1114 	 *	will contain the complete CIS list.
1115 	 * If this is a multi-function card, then use the GET_FIRST_LTUPLE
1116 	 *	macro to return the first tuple in the CIS list - we do this
1117 	 *	since we don't want to return tuples with CISTPLF_IGNORE_TUPLE
1118 	 *	set unless CIS_GET_LTUPLE_IGNORE is set in the flags parameter.
1119 	 * Note that we don't have to cross over into the fucntion-specific
1120 	 *	CIS chain if GET_FIRST_LTUPLE returns NULL, since a MF CIS will
1121 	 *	always have at least a CISTPL_LONGLINK_MFC tuple in the global
1122 	 *	CIS chain - the test for NULL is just a sanity check.
1123 	 */
1124 	    if (sp->cis_flags & CW_MULTI_FUNCTION_CIS) {
1125 		if ((tuple->CISOffset =
1126 			GET_FIRST_LTUPLE(sp->cis[CS_GLOBAL_CIS].cis,
1127 							flags)) == NULL) {
1128 		    mutex_exit(&sp->cis_lock);
1129 		    return (CS_NO_MORE_ITEMS);
1130 		} /* GET_FIRST_LTUPLE */
1131 	    } else {
1132 		tuple->CISOffset = sp->cis[0].cis;
1133 	    } /* CW_MULTI_FUNCTION_CIS */
1134 	} else {
1135 	    cistpl_t *tp;
1136 
1137 		/*
1138 		 * Check to be sure that we have a non-NULL tuple list pointer.
1139 		 *	This is necessary in the case where the caller calls us
1140 		 *	with get next tuple requests but we don't have any more
1141 		 *	tuples to give back.
1142 		 */
1143 	    if (tuple->CISOffset == NULL) {
1144 		mutex_exit(&sp->cis_lock);
1145 		return (CS_NO_MORE_ITEMS);
1146 	    }
1147 
1148 		/*
1149 		 * Point to the next tuple in the list.  If we're searching for
1150 		 *	a particular tuple, FIND_LTUPLE_FWD will find it.
1151 		 *
1152 		 * If there are no more tuples in the chain that we're looking
1153 		 *	at, then if we're looking at the global portion of a
1154 		 *	multi-function CIS, switch to the function-specific list
1155 		 *	and start looking there.
1156 		 */
1157 	    if ((tp = GET_NEXT_TUPLE(tuple->CISOffset, flags)) == NULL) {
1158 		if (sp->cis_flags & CW_MULTI_FUNCTION_CIS) {
1159 		    if ((tuple->CISOffset->flags & CISTPLF_GLOBAL_CIS) &&
1160 							(fn != CS_GLOBAL_CIS)) {
1161 			tp = GET_FIRST_LTUPLE(sp->cis[fn].cis, flags);
1162 		    } /* CISTPLF_GLOBAL_CIS */
1163 		} /* CW_MULTI_FUNCTION_CIS */
1164 	    } /* GET_NEXT_TUPLE */
1165 
1166 		/*
1167 		 * If there are no more tuples in the chain, then return.
1168 		 */
1169 	    if ((tuple->CISOffset = tp) == NULL) {
1170 		mutex_exit(&sp->cis_lock);
1171 		return (CS_NO_MORE_ITEMS);
1172 	    }
1173 	} /* CS_GET_FIRST_FLAG */
1174 
1175 	/*
1176 	 * Check if we want to get the first of a particular type of tuple
1177 	 *	or just the first tuple in the chain.
1178 	 * If there are no more tuples of the type we're searching for in
1179 	 *	the chain that we're looking at, then if we're looking at
1180 	 *	the global portion of a multi-function CIS, switch to the
1181 	 *	function-specific list and start looking there.
1182 	 */
1183 	if (tuple->DesiredTuple != RETURN_FIRST_TUPLE) {
1184 	    cistpl_t *tp;
1185 
1186 	    if ((tp = FIND_LTUPLE_FWD(tuple->CISOffset,
1187 					tuple->DesiredTuple, flags)) == NULL) {
1188 		if (sp->cis_flags & CW_MULTI_FUNCTION_CIS) {
1189 		    if ((tuple->CISOffset->flags & CISTPLF_GLOBAL_CIS) &&
1190 							(fn != CS_GLOBAL_CIS)) {
1191 			tp = FIND_FIRST_LTUPLE(sp->cis[fn].cis,
1192 						tuple->DesiredTuple, flags);
1193 		    } /* CISTPLF_GLOBAL_CIS */
1194 		} /* CW_MULTI_FUNCTION_CIS */
1195 	    } /* FIND_LTUPLE_FWD */
1196 
1197 		/*
1198 		 * If there are no more tuples in the chain, then return.
1199 		 */
1200 	    if ((tuple->CISOffset = tp) == NULL) {
1201 		mutex_exit(&sp->cis_lock);
1202 		return (CS_NO_MORE_ITEMS);
1203 	    }
1204 	} /* !RETURN_FIRST_TUPLE */
1205 
1206 	/*
1207 	 * We've got a tuple, now fill out the rest of the tuple_t
1208 	 *	structure.  Callers can use the flags member to
1209 	 *	determine whether or not the tuple data was copied
1210 	 *	to the linked list or if it's still on the card.
1211 	 */
1212 	tuple->Flags = tuple->CISOffset->flags;
1213 	tuple->TupleCode = tuple->CISOffset->type;
1214 	tuple->TupleLink = tuple->CISOffset->len;
1215 	tuple->TupleDataLen = tuple->CISOffset->len;
1216 
1217 	mutex_exit(&sp->cis_lock);
1218 
1219 	return (CS_SUCCESS);
1220 }
1221 
1222 /*
1223  * cs_get_tuple_data - get the data portion of a tuple; this is to
1224  *	support the GetTupleData function call.
1225  *
1226  *    Note that if the data body of a tuple was not read from the CIS,
1227  *	then this function will return CS_NO_MORE_ITEMS.
1228  *
1229  *    For flags that are set in the tuple_t->flags member, see the
1230  *	comments for the cis_list_lcreate function in the cis.c file.
1231  *	These flags are copied into the tuple_t->flags member by the
1232  *	cs_get_firstnext_tuple function call.
1233  *
1234  *    See notes for the cs_get_firstnext_tuple function.
1235  */
1236 static int
1237 cs_get_tuple_data(client_handle_t client_handle, tuple_t *tuple)
1238 {
1239 	cs_socket_t *sp;
1240 	client_t *client;
1241 	int ret, nbytes;
1242 	uint32_t fn, flags;
1243 	cisdata_t *tsd, *tdd;
1244 	uint32_t newoffset;
1245 	acc_handle_t cis_handle;
1246 
1247 	if ((ret = cs_get_socket(client_handle, &tuple->Socket, &fn,
1248 						&sp, &client)) != CS_SUCCESS)
1249 	    return (ret);
1250 
1251 	/*
1252 	 * If there's no card in the socket or the card in the socket is not
1253 	 *	for this client, then return an error.
1254 	 */
1255 	if (!(client->flags & CLIENT_CARD_INSERTED))
1256 	    return (CS_NO_CARD);
1257 
1258 	mutex_enter(&sp->cis_lock);
1259 
1260 	if ((sp->cis_flags & CW_VALID_CIS) &&
1261 				(sp->cis[fn].flags & CW_VALID_CIS)) {
1262 
1263 		/*
1264 		 * Check to be sure that we have a non-NULL pointer to
1265 		 *	a CIS list.
1266 		 */
1267 	    if (!(tuple->CISOffset)) {
1268 		mutex_exit(&sp->cis_lock);
1269 		return (CS_NO_MORE_ITEMS);
1270 	    }
1271 
1272 	/*
1273 	 * Since the tuple data buffer that the caller calls us with
1274 	 *	is preallocated in the tuple_t structure, we ignore any
1275 	 *	TupleDataMax value that the caller has setup and use the
1276 	 *	actual size of the tuple data buffer in the structure.
1277 	 */
1278 	    tuple->TupleDataMax = sizeof (tuple->TupleData);
1279 
1280 	/*
1281 	 * Make sure the requested offset is not past the end of the
1282 	 *	tuple data body nor past the end of the user-supplied
1283 	 *	buffer.
1284 	 */
1285 	    if ((int)tuple->TupleOffset >= min((int)tuple->TupleLink,
1286 						(int)tuple->TupleDataMax)) {
1287 		mutex_exit(&sp->cis_lock);
1288 		return (CS_NO_MORE_ITEMS);
1289 	    }
1290 
1291 	    tuple->TupleDataLen = tuple->TupleLink;
1292 
1293 	    if ((nbytes = min((int)tuple->TupleDataMax -
1294 						(int)tuple->TupleOffset,
1295 						(int)tuple->TupleDataLen -
1296 						(int)tuple->TupleOffset)) < 1) {
1297 		mutex_exit(&sp->cis_lock);
1298 		return (CS_BAD_ARGS);
1299 	    }
1300 
1301 	/*
1302 	 * The tuple data destination is always the tuple_t->TupleData
1303 	 *	buffer in the tuple_t structure no matter where we read the
1304 	 *	tuple data from.
1305 	 */
1306 	    tdd = tuple->TupleData;
1307 	    bzero((caddr_t)tdd, sizeof (tuple->TupleData));
1308 
1309 	/*
1310 	 * Do we have a copy of the tuple data?  If not, we have to
1311 	 *	get a pointer to the CIS and read the tuple data from the
1312 	 *	card itself.
1313 	 */
1314 	    switch (tuple->CISOffset->flags & CISTPLF_SPACE_MASK) {
1315 		case CISTPLF_LM_SPACE:
1316 		    tsd = (tuple->CISOffset->data +
1317 					(unsigned)tuple->TupleOffset);
1318 		    while (nbytes--)
1319 			*tdd++ = *tsd++;
1320 		    break;
1321 		case CISTPLF_AM_SPACE:
1322 		case CISTPLF_CM_SPACE:
1323 		    newoffset = tuple->CISOffset->offset;
1324 
1325 		/*
1326 		 * Setup the proper space flags as well as setup the
1327 		 *	address offset to point to the start of the tuple
1328 		 *	data area; we need to do the latter since the
1329 		 *	cis_store_cis_addr function in cis.c sets up the
1330 		 *	tuple->CISOffset->offset offset to point to the
1331 		 *	start of the tuple.
1332 		 */
1333 		    if (tuple->CISOffset->flags & CISTPLF_AM_SPACE) {
1334 			flags = CISTPLF_AM_SPACE;
1335 			newoffset += ((tuple->TupleOffset * 2) + 4);
1336 		    } else {
1337 			flags = CISTPLF_CM_SPACE;
1338 			newoffset += (tuple->TupleOffset + 2);
1339 		    }
1340 
1341 		    if (cs_init_cis_window(sp, &newoffset, &cis_handle,
1342 							flags) != CS_SUCCESS) {
1343 			mutex_exit(&sp->cis_lock);
1344 			cmn_err(CE_CONT, "cs_get_tuple_data: socket %d "
1345 						"can't init CIS window\n",
1346 							sp->socket_num);
1347 			return (CS_GENERAL_FAILURE);
1348 		    } /* cs_init_cis_window */
1349 		    while (nbytes--) {
1350 			*tdd++ = csx_Get8(cis_handle, newoffset++);
1351 			if (tuple->CISOffset->flags & CISTPLF_AM_SPACE)
1352 			    newoffset++;
1353 		    } /* while */
1354 		    break;
1355 		default:
1356 		    mutex_exit(&sp->cis_lock);
1357 		    return (CS_GENERAL_FAILURE);
1358 	    } /* switch */
1359 
1360 	    ret = CS_SUCCESS;
1361 	} else {
1362 	    ret = CS_NO_CIS;
1363 	} /* if (CW_VALID_CIS) */
1364 
1365 	mutex_exit(&sp->cis_lock);
1366 
1367 	return (ret);
1368 }
1369 
1370 /*
1371  * cs_validate_cis - validates the CIS on a card in the given socket; this
1372  *			is to support the ValidateCIS function call.
1373  *
1374  *    Notes for regular PC card driver callers:
1375  *
1376  *	Regular PC card drivers calling ValidateCIS will get the meaning of
1377  *	the structure members as specified in the standard.
1378  *
1379  *    Notes for Socket Services, the "super-client" or CSI driver callers:
1380  *
1381  *		with: Function Number = CS_GLOBAL_CIS
1382  *
1383  *	For a single-function card, CS_NO_CIS will be returned and the
1384  *	cisinfo_t->Chains and cisinfo_t->Tuples members will be set to 0.
1385  *
1386  *	For a multi-function card, cisinfo_t->Chains will contain a count of
1387  *	the number of CIS chains in the global portion of the CIS, and
1388  *	cisinfo_t->Tuples will contain a count of the number of tuples in
1389  *	the global portion of the CIS.
1390  *
1391  *		with: 0 <= Function Number < CIS_MAX_FUNCTIONS
1392  *
1393  *	For a single-function card, if the function number is equal to 0 and
1394  *	has a CIS, cisinfo_t->Chains will contain a count of the number of
1395  *	CIS chains in the CIS, and cisinfo_t->Tuples will contain a count of
1396  *	the number of tuples in the CIS. If the card does not have a CIS, or
1397  *	if the function number is not equal to 0, CS_NO_CIS will be returned
1398  *	and the cisinfo_t->Chains and cisinfo_t->Tuples members will be set
1399  *	to 0.
1400  *
1401  *	For a multi-function card, cisinfo_t->Chains will contain a count of
1402  *	the number of CIS chains in the global and function-specific
1403  *	portions of the CIS, and cisinfo_t->Tuples will contain a count of
1404  *	the number of tuples in the global and function-specific portions of
1405  *	the CIS. If the function does not exist or has no CIS, CS_NO_CIS
1406  *	will be returned and the cisinfo_t->Chains and cisinfo_t->Tuples
1407  *	members will be set to 0.
1408  *
1409  *    General notes:
1410  *
1411  *	If the card does not have a CIS, or if the function does not exist
1412  *	or has no CIS, CS_NO_CIS will be returned and the cisinfo_t->Chains
1413  *	and cisinfo_t->Tuples members will be set to 0.
1414  *
1415  *	Most of the work of validating the CIS has already been done by the
1416  *	CIS parser module, so we don't have to do much here except for
1417  *	looking at the various flags and tuple/chain counts that were already
1418  *	setup by the CIS parser.
1419  *
1420  *    See notes for the cs_get_firstnext_tuple function.
1421  */
1422 static int
1423 cs_validate_cis(client_handle_t client_handle, cisinfo_t *cisinfo)
1424 {
1425 	cs_socket_t *sp;
1426 	client_t *client;
1427 	uint32_t fn;
1428 	int ret;
1429 
1430 	if ((ret = cs_get_socket(client_handle, &cisinfo->Socket, &fn,
1431 						&sp, &client)) != CS_SUCCESS)
1432 	    return (ret);
1433 
1434 	/*
1435 	 * If there's no card in the socket or the card in the socket is not
1436 	 *	for this client, then return an error.
1437 	 */
1438 	if (!(client->flags & CLIENT_CARD_INSERTED))
1439 	    return (CS_NO_CARD);
1440 
1441 	mutex_enter(&sp->cis_lock);
1442 	if ((sp->cis_flags & CW_VALID_CIS) &&
1443 				(sp->cis[fn].flags & CW_VALID_CIS)) {
1444 	    cisinfo->Chains = sp->cis[fn].nchains;
1445 	    cisinfo->Tuples = sp->cis[fn].ntuples;
1446 
1447 	    if ((fn != CS_GLOBAL_CIS) &&
1448 			(sp->cis[CS_GLOBAL_CIS].flags & CW_VALID_CIS)) {
1449 		cisinfo->Chains += sp->cis[CS_GLOBAL_CIS].nchains;
1450 		cisinfo->Tuples += sp->cis[CS_GLOBAL_CIS].ntuples;
1451 	    } /* !CS_GLOBAL_CIS */
1452 
1453 	    ret = CS_SUCCESS;
1454 	} else {
1455 	    cisinfo->Chains = 0;
1456 	    cisinfo->Tuples = 0;
1457 	    ret = CS_NO_CIS;
1458 	}
1459 	mutex_exit(&sp->cis_lock);
1460 
1461 	return (ret);
1462 }
1463 
1464 /*
1465  * cs_init_cis_window - initializes the CIS window for the passed socket
1466  *
1467  *	calling: *sp - pointer to the per-socket structure
1468  *		 *offset - offset from start of AM or CM space
1469  *		 *hp - pointer to acc_handle_t to store modified
1470  *				window access handle in
1471  *		 flags - one of:
1472  *				CISTPLF_AM_SPACE - set window to AM space
1473  *				CISTPLF_CM_SPACE - set window to CM space
1474  *
1475  *	returns: CS_SUCCESS if CIS window was set up
1476  *		 *offset - contains adjusted offset to use to access
1477  *				requested space
1478  *		 CS_BAD_WINDOW if CIS window could not be setup
1479  *		 CS_GENERAL_FAILURE if socket has a CIS window number
1480  *					but the window flags are wrong
1481  *
1482  *	Note: This function will check to be sure that there is a valid
1483  *		CIS window allocated to this socket.
1484  *	      If there is an error in setting up the window hardware, the
1485  *		CIS window information for this socket is cleared.
1486  *	      This function is also used by routines that need to get
1487  *		a pointer to the base of AM space to access the card's
1488  *		configuration registers.
1489  *	      The passed offset is the un-window-size-aligned offset.
1490  */
1491 int
1492 cs_init_cis_window(cs_socket_t *sp, uint32_t *offset,
1493     acc_handle_t *hp, uint32_t flags)
1494 {
1495 	set_window_t sw;
1496 	get_window_t gw;
1497 	inquire_window_t iw;
1498 	set_page_t set_page;
1499 	cs_window_t *cw;
1500 
1501 	/*
1502 	 * Check to be sure that we have a valid CIS window
1503 	 */
1504 	if (!SOCKET_HAS_CIS_WINDOW(sp)) {
1505 	    cmn_err(CE_CONT,
1506 			"cs_init_cis_window: socket %d has no CIS window\n",
1507 				sp->socket_num);
1508 	    return (CS_BAD_WINDOW);
1509 	}
1510 
1511 	/*
1512 	 * Check to be sure that this window is allocated for CIS use
1513 	 */
1514 	if ((cw = cs_get_wp(sp->cis_win_num)) == NULL)
1515 	    return (CS_BAD_WINDOW);
1516 
1517 	if (!(cw->state & CW_CIS)) {
1518 	    cmn_err(CE_CONT,
1519 		"cs_init_cis_window: socket %d invalid CIS window state 0x%x\n",
1520 				sp->socket_num, cw->state);
1521 	    return (CS_BAD_WINDOW);
1522 	}
1523 
1524 	/*
1525 	 * Get the characteristics of this window - we use this to
1526 	 *	determine whether we need to re-map the window or
1527 	 *	just move the window offset on the card.
1528 	 */
1529 	iw.window = sp->cis_win_num;
1530 	SocketServices(SS_InquireWindow, &iw);
1531 
1532 	/*
1533 	 * We've got a window, now set up the hardware. If we've got
1534 	 *	a variable sized window, then all we need to do is to
1535 	 *	get a valid mapping to the base of the window using
1536 	 *	the current window size; if we've got a fixed-size
1537 	 *	window, then we need to get a mapping to the window
1538 	 *	starting at offset zero of the window.
1539 	 */
1540 	if (iw.mem_win_char.MemWndCaps & WC_SIZE) {
1541 	    sw.WindowSize = sp->cis_win_size;
1542 	    set_page.offset = ((*offset / sp->cis_win_size) *
1543 						sp->cis_win_size);
1544 	} else {
1545 	    set_page.offset = ((*offset / iw.mem_win_char.MinSize) *
1546 						iw.mem_win_char.MinSize);
1547 	    sw.WindowSize = (((*offset & ~(PAGESIZE - 1)) &
1548 					(set_page.offset - 1)) + PAGESIZE);
1549 	}
1550 
1551 	/*
1552 	 * Return a normalized base offset; this takes care of the case
1553 	 *	where the required offset is greater than the window size.
1554 	 * BugID 1236404
1555 	 *	code was:
1556 	 *		*offset = *offset & (set_page.offset - 1);
1557 	 */
1558 	*offset = *offset - set_page.offset;
1559 
1560 #ifdef	CS_DEBUG
1561 	if (cs_debug > 1)
1562 	    cmn_err(CE_CONT, "cs_init_cis_window: WindowSize 0x%x "
1563 							"offset 0x%x\n",
1564 							(int)sw.WindowSize,
1565 							(int)set_page.offset);
1566 	if (cs_debug > 1)
1567 	    cmn_err(CE_CONT, "\t*offset = 0x%x space = %s\n",
1568 							(int)*offset,
1569 					(flags & CISTPLF_AM_SPACE)?
1570 					"CISTPLF_AM_SPACE":"CISTPLF_CM_SPACE");
1571 #endif
1572 
1573 	sw.window = sp->cis_win_num;
1574 	sw.socket = sp->socket_num;
1575 	sw.state = (WS_ENABLED | WS_EXACT_MAPIN);
1576 	sw.attr.devacc_attr_version = DDI_DEVICE_ATTR_V0;
1577 	sw.attr.devacc_attr_endian_flags = DDI_NEVERSWAP_ACC;
1578 	sw.attr.devacc_attr_dataorder = DDI_STRICTORDER_ACC;
1579 
1580 	/*
1581 	 * The PCMCIA SS spec specifies this be expressed in
1582 	 *	a device speed format per 5.2.7.1.3 but
1583 	 *	our implementation of SS_SetWindow uses
1584 	 *	actual nanoseconds.
1585 	 */
1586 	sw.speed = CIS_DEFAULT_SPEED;
1587 	sw.base = 0;
1588 	/*
1589 	 * Set up the window - if this fails, then just set the
1590 	 *	CIS window number back to it's initialized value so
1591 	 *	that we'll fail when we break out of the loop.
1592 	 */
1593 	if (SocketServices(SS_SetWindow, &sw) != SUCCESS) {
1594 	    sp->cis_win_num = PCMCIA_MAX_WINDOWS;
1595 	    cw->state = 0; /* XXX do we really want to do this? */
1596 	    return (CS_BAD_WINDOW);
1597 	} else {
1598 		set_page.window = sp->cis_win_num;
1599 		set_page.page = 0;
1600 		set_page.state = PS_ENABLED;
1601 		if (flags & CISTPLF_AM_SPACE)
1602 		    set_page.state |= PS_ATTRIBUTE;
1603 
1604 		if (SocketServices(SS_SetPage, &set_page) != SUCCESS) {
1605 		    sp->cis_win_num = PCMCIA_MAX_WINDOWS;
1606 		    cw->state = 0; /* XXX do we really want to do this? */
1607 		    return (CS_BAD_WINDOW);
1608 		} /* if (SS_SetPage) */
1609 	} /* if (SS_SetWindow) */
1610 
1611 	/*
1612 	 * Get the window information for the CIS window for this socket.
1613 	 */
1614 	gw.window = sp->cis_win_num;
1615 	gw.socket = sp->socket_num; /* XXX - SS_GetWindow should set this */
1616 	if (SocketServices(SS_GetWindow, &gw) != SUCCESS)
1617 	    return (CS_BAD_WINDOW);
1618 
1619 	*hp = (acc_handle_t)gw.handle;
1620 
1621 	return (CS_SUCCESS);
1622 }
1623 
1624 /*
1625  * ==== client registration/deregistration section ====
1626  */
1627 
1628 /*
1629  * cs_register_client - This supports the RegisterClient call.
1630  *
1631  * Upon successful registration, the client_handle_t * handle argument will
1632  *	contain the new client handle and we return CS_SUCCESS.
1633  */
1634 static int
1635 cs_register_client(client_handle_t *ch, client_reg_t *cr)
1636 {
1637 	uint32_t sn;
1638 	int super_client = 0;
1639 	sclient_reg_t *scr = cr->priv;
1640 	struct sclient_list_t *scli;
1641 
1642 	/*
1643 	 * See if we're not supposed to register any new clients.
1644 	 */
1645 	if (cs_globals.init_state & GLOBAL_INIT_STATE_NO_CLIENTS)
1646 	    return (CS_OUT_OF_RESOURCE);
1647 
1648 	/*
1649 	 * Do a version check - if the client expects a later version of
1650 	 *	Card Services than what we are, return CS_BAD_VERSION.
1651 	 * XXX - How do we specify just a PARTICULAR version of CS??
1652 	 */
1653 	if (CS_VERSION < cr->Version)
1654 	    return (CS_BAD_VERSION);
1655 
1656 	/*
1657 	 * Check to be sure that the client has given us a valid set of
1658 	 *	client type flags.  We also use this opportunity to see
1659 	 *	if the registering client is Socket Services or is a
1660 	 *	"super-client" or a CSI client.
1661 	 *
1662 	 * Note that SS can not set any flag in the Attributes field other
1663 	 *	than the INFO_SOCKET_SERVICES flag.
1664 	 *
1665 	 * Valid combinations of cr->Attributes and cr->EventMask flags:
1666 	 *
1667 	 *  for Socket Services:
1668 	 *	cr->Attributes:
1669 	 *	    set:
1670 	 *		INFO_SOCKET_SERVICES
1671 	 *	    clear:
1672 	 *		{all other flags}
1673 	 *	cr->EventMask:
1674 	 *	    don't care:
1675 	 *		{all flags}
1676 	 *
1677 	 *  for regular clients:
1678 	 *	cr->Attributes:
1679 	 *	    only one of:
1680 	 *		INFO_IO_CLIENT
1681 	 *		INFO_MTD_CLIENT
1682 	 *		INFO_MEM_CLIENT
1683 	 *	    don't care:
1684 	 *		INFO_CARD_SHARE
1685 	 *		INFO_CARD_EXCL
1686 	 *	cr->EventMask:
1687 	 *	    clear:
1688 	 *		CS_EVENT_ALL_CLIENTS
1689 	 *	    don't care:
1690 	 *		{all other flags}
1691 	 *
1692 	 *  for CSI clients:
1693 	 *	cr->Attributes:
1694 	 *	    set:
1695 	 *		INFO_IO_CLIENT
1696 	 *		INFO_CSI_CLIENT
1697 	 *	    clear:
1698 	 *		INFO_MTD_CLIENT
1699 	 *		INFO_MEM_CLIENT
1700 	 *	    don't care:
1701 	 *		INFO_CARD_SHARE
1702 	 *		INFO_CARD_EXCL
1703 	 *	cr->EventMask:
1704 	 *	    don't care:
1705 	 *		{all flags}
1706 	 *
1707 	 *  for "super-clients":
1708 	 *	cr->Attributes:
1709 	 *	    set:
1710 	 *		INFO_IO_CLIENT
1711 	 *		INFO_MTD_CLIENT
1712 	 *		INFO_SOCKET_SERVICES
1713 	 *		INFO_CARD_SHARE
1714 	 *	    clear:
1715 	 *		INFO_MEM_CLIENT
1716 	 *		INFO_CARD_EXCL
1717 	 *	cr->EventMask:
1718 	 *	    don't care:
1719 	 *		{all flags}
1720 	 */
1721 	switch (cr->Attributes & INFO_CLIENT_TYPE_MASK) {
1722 	/*
1723 	 * Check first to see if this is Socket Services registering; if
1724 	 *	so, we don't do anything but return the client handle that is
1725 	 *	in the global SS client.
1726 	 */
1727 	    case INFO_SOCKET_SERVICES:
1728 		*ch = cs_socket_services_client.client_handle;
1729 		return (CS_SUCCESS);
1730 		/* NOTREACHED */
1731 	    /* CSI clients */
1732 	    case (INFO_CSI_CLIENT | INFO_IO_CLIENT):
1733 		break;
1734 	    /* regular clients */
1735 	    case INFO_IO_CLIENT:
1736 	    case INFO_MTD_CLIENT:
1737 	    case INFO_MEM_CLIENT:
1738 		if (cr->EventMask & CS_EVENT_ALL_CLIENTS)
1739 		    return (CS_BAD_ATTRIBUTE);
1740 		break;
1741 	    /* "super-client" clients */
1742 	    case (INFO_IO_CLIENT | INFO_MTD_CLIENT | INFO_SOCKET_SERVICES):
1743 		if ((!(cr->Attributes & INFO_CARD_SHARE)) ||
1744 				(cr->Attributes & INFO_CARD_EXCL))
1745 		    return (CS_BAD_ATTRIBUTE);
1746 		/*
1747 		 * We only allow one "super-client" per system.
1748 		 */
1749 		mutex_enter(&cs_globals.global_lock);
1750 		if (cs_globals.flags & GLOBAL_SUPER_CLIENT_REGISTERED) {
1751 		    mutex_exit(&cs_globals.global_lock);
1752 		    return (CS_NO_MORE_ITEMS);
1753 		}
1754 		cs_globals.flags |= GLOBAL_SUPER_CLIENT_REGISTERED;
1755 		mutex_exit(&cs_globals.global_lock);
1756 		super_client = CLIENT_SUPER_CLIENT;
1757 		break;
1758 	    default:
1759 		return (CS_BAD_ATTRIBUTE);
1760 	} /* switch (cr->Attributes) */
1761 
1762 	/*
1763 	 * Now, actually create the client node on the socket; this will
1764 	 *	also return the new client handle if there were no errors
1765 	 *	creating the client node.
1766 	 * The DIP2SOCKET_NUM macro will return the socket and function
1767 	 *	number using the encoding specified in the cs_priv.h file.
1768 	 */
1769 	if (super_client != CLIENT_SUPER_CLIENT) {
1770 	    if (cr->Attributes & INFO_CSI_CLIENT)
1771 		sn = (uint32_t)(uintptr_t)cr->priv;
1772 	    else
1773 		sn = DIP2SOCKET_NUM(cr->dip);
1774 	    return (cs_add_client_to_socket(sn, ch, cr, super_client));
1775 	} /* CLIENT_SUPER_CLIENT */
1776 
1777 	/*
1778 	 * This registering client is a "super-client", so we create one
1779 	 *	client node for each socket in the system.  We use the
1780 	 *	client_reg_t.priv structure member to point to a struct
1781 	 *	that the "super-client" client knows about.  The client
1782 	 *	handle pointer is not used in this case.
1783 	 * We return CS_SUCCESS if at least one client node could be
1784 	 *	created.  The client must check the error codes in the
1785 	 *	error code array to determine which clients could not
1786 	 *	be created on which sockets.
1787 	 * We return CS_BAD_HANDLE if no client nodes could be created.
1788 	 */
1789 	scr->num_clients = 0;
1790 	scr->max_socket_num = cs_globals.max_socket_num;
1791 	scr->num_sockets = cs_globals.num_sockets;
1792 	scr->num_windows = cs_globals.num_windows;
1793 
1794 	*(scr->sclient_list) = cs_globals.sclient_list;
1795 
1796 	for (sn = 0; sn < scr->num_sockets; sn++) {
1797 	    scli = scr->sclient_list[sn];
1798 	    if ((scli->error = cs_add_client_to_socket(sn, &scli->client_handle,
1799 					    cr, super_client)) == CS_SUCCESS) {
1800 		scr->num_clients++;
1801 	    }
1802 	}
1803 
1804 	/*
1805 	 * If we couldn't create any client nodes at all, then
1806 	 *	return an error.
1807 	 */
1808 	if (!scr->num_clients) {
1809 	/*
1810 	 * XXX - The global superclient lock now gets
1811 	 * cleared in cs_deregister_client
1812 	 */
1813 	    /* cs_clear_superclient_lock(super_client); */
1814 	    return (CS_BAD_HANDLE);
1815 	}
1816 
1817 	return (CS_SUCCESS);
1818 }
1819 
1820 /*
1821  * cs_add_client_to_socket - this function creates the client node on the
1822  *				requested socket.
1823  *
1824  * Note that if we return an error, there is no state that can be cleaned
1825  *	up.  The only way that we can return an error with allocated resources
1826  *	would be if one of the client handle functions had an internal error.
1827  *	Since we wouldn't get a valid client handle in this case anyway, there
1828  *	would be no way to find out what was allocated and what wasn't.
1829  */
1830 static int
1831 cs_add_client_to_socket(unsigned sn, client_handle_t *ch,
1832 					client_reg_t *cr, int super_client)
1833 {
1834 	cs_socket_t *sp;
1835 	client_t *client, *cclp;
1836 	int error, cie = 1;
1837 	int client_lock_acquired;
1838 
1839 	if (cr->event_handler == NULL)
1840 	    return (CS_BAD_ARGS);
1841 
1842 	if ((sp = cs_get_sp(sn)) == NULL)
1843 	    return (CS_BAD_SOCKET);
1844 
1845 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
1846 
1847 	/*
1848 	 * Run through all of the registered clients and compare the passed
1849 	 *	dip to the dip of each client to make sure that this client
1850 	 *	is not trying to register more than once.  If they are, then
1851 	 *	display a message and return an error.
1852 	 * XXX - we should really check all the sockets in case the client
1853 	 *	manipulates the instance number in the dip.
1854 	 * XXX - if we check each socket, we ned to also check for the
1855 	 *	"super-client" since it will use the same dip for all
1856 	 *	of it's client nodes.
1857 	 */
1858 	mutex_enter(&sp->lock);
1859 	client = sp->client_list;
1860 	while (client) {
1861 	    if (!(cr->Attributes & INFO_CSI_CLIENT) &&
1862 						(client->dip == cr->dip)) {
1863 		mutex_exit(&sp->lock);
1864 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
1865 		cmn_err(CE_CONT, "cs_add_client_to_socket: socket %d "
1866 					"function 0x%x\n"
1867 					"\tclient already registered with "
1868 					"handle 0x%x\n",
1869 						(int)CS_GET_SOCKET_NUMBER(sn),
1870 						(int)CS_GET_FUNCTION_NUMBER(sn),
1871 						(int)client->client_handle);
1872 		return (CS_BAD_HANDLE);
1873 	    }
1874 	    client = client->next;
1875 	} /* while (client) */
1876 	mutex_exit(&sp->lock);
1877 
1878 	/*
1879 	 * Create a unique client handle then make sure that we can find it.
1880 	 *	This has the side effect of getting us a pointer to the
1881 	 *	client structure as well.
1882 	 * Create a client list entry - cs_create_client_handle will use this
1883 	 *	as the new client node.
1884 	 * We do it here so that we can grab the sp->lock mutex for the
1885 	 *	duration of our manipulation of the client list.
1886 	 * If this function fails, then it will not have added the newly
1887 	 *	allocated client node to the client list on this socket,
1888 	 *	so we have to free the node that we allocated.
1889 	 */
1890 	cclp = (client_t *)kmem_zalloc(sizeof (client_t), KM_SLEEP);
1891 
1892 	mutex_enter(&sp->lock);
1893 	if (!(*ch = cs_create_client_handle(sn, cclp))) {
1894 	    mutex_exit(&sp->lock);
1895 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
1896 	    kmem_free(cclp, sizeof (client_t));
1897 	    return (CS_OUT_OF_RESOURCE);
1898 	}
1899 
1900 	/*
1901 	 *  Make sure that this is a valid client handle.  We should never
1902 	 *	fail this since we just got a valid client handle.
1903 	 * If this fails, then we have an internal error so don't bother
1904 	 *	trying to clean up the allocated client handle since the
1905 	 *	whole system is probably hosed anyway and will shortly
1906 	 *	esplode.
1907 	 * It doesn't make sense to call cs_deregister_client at this point
1908 	 *	to clean up this broken client since the deregistration
1909 	 *	code will also call cs_find_client and most likely fail.
1910 	 */
1911 	if (!(client = cs_find_client(*ch, &error))) {
1912 	    mutex_exit(&sp->lock);
1913 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
1914 	    cmn_err(CE_CONT, "cs_add_client_to_socket: socket %d function 0x%x "
1915 				"invalid client handle created handle 0x%x\n",
1916 						(int)CS_GET_SOCKET_NUMBER(sn),
1917 						(int)CS_GET_FUNCTION_NUMBER(sn),
1918 						(int)*ch);
1919 	    return (error);
1920 	}
1921 
1922 	/*
1923 	 * Save the DDI information.
1924 	 */
1925 	client->dip = cr->dip;
1926 	cr->driver_name[MODMAXNAMELEN - 1] = NULL;
1927 	client->driver_name = (char *)kmem_zalloc(strlen(cr->driver_name) + 1,
1928 								KM_SLEEP);
1929 	(void) strcpy(client->driver_name, cr->driver_name);
1930 	client->instance = ddi_get_instance(cr->dip);
1931 
1932 	/*
1933 	 * Copy over the interesting items that the client gave us.
1934 	 */
1935 	client->flags = (cr->Attributes & INFO_CLIENT_TYPE_MASK);
1936 	client->event_callback_handler = cr->event_handler;
1937 	bcopy((caddr_t)&cr->event_callback_args,
1938 				(caddr_t)&client->event_callback_args,
1939 				sizeof (event_callback_args_t));
1940 	/*
1941 	 * Set the client handle since the client needs a client handle
1942 	 *	when they call us for their event handler.
1943 	 */
1944 	client->event_callback_args.client_handle = *ch;
1945 
1946 	/*
1947 	 * Initialize the IO window numbers; if an IO window number is equal
1948 	 *	to PCMCIA_MAX_WINDOWS it means that IO range is not in use.
1949 	 */
1950 	client->io_alloc.Window1 = PCMCIA_MAX_WINDOWS;
1951 	client->io_alloc.Window2 = PCMCIA_MAX_WINDOWS;
1952 
1953 	/*
1954 	 * Give the client the iblock and idevice cookies to use in
1955 	 *	the client's event handler high priority mutex.
1956 	 */
1957 	cr->iblk_cookie = sp->iblk;
1958 	cr->idev_cookie = sp->idev;
1959 
1960 	/*
1961 	 * Set up the global event mask information; we copy this directly
1962 	 *	from the client; since we are the only source of events,
1963 	 *	any bogus bits that the client puts in here won't matter
1964 	 *	because we'll never look at them.
1965 	 */
1966 	client->global_mask = cr->EventMask;
1967 
1968 	/*
1969 	 * If this client registered as a CSI client, set the appropriate
1970 	 *	flag in the client's flags area.
1971 	 */
1972 	if (cr->Attributes & INFO_CSI_CLIENT)
1973 	    client->flags |= CLIENT_CSI_CLIENT;
1974 
1975 	/*
1976 	 * If this client registered as a "super-client" set the appropriate
1977 	 *	flag in the client's flags area.
1978 	 */
1979 	if (super_client == CLIENT_SUPER_CLIENT)
1980 	    client->flags |= CLIENT_SUPER_CLIENT;
1981 
1982 	/*
1983 	 * Save other misc information that this client gave us - it is
1984 	 *	used in the GetClientInfo function.
1985 	 */
1986 	client->flags |= (cr->Attributes & INFO_CARD_FLAGS_MASK);
1987 
1988 	/*
1989 	 * Determine if we should give artificial card insertion events and
1990 	 *	a registration complete event. Since we don't differentiate
1991 	 *	between sharable and exclusive use cards when giving clients
1992 	 *	event notification, we modify the definition of the share/excl
1993 	 *	flags as follows:
1994 	 *
1995 	 *	    If either INFO_CARD_SHARE or INFO_CARD_EXCL is set,
1996 	 *	    the client will receive artificial card insertion
1997 	 *	    events (if the client's card is currently in the
1998 	 *	    socket) and a registration complete event.
1999 	 *
2000 	 *	    If neither of the INFO_CARD_SHARE or INFO_CARD_EXCL is
2001 	 *	    set, the client will not receive an artificial card
2002 	 *	    insertion event nor a registration complete event
2003 	 *	    due to the client's call to register client.
2004 	 *
2005 	 *	    The client's event mask is not affected by the setting
2006 	 *	    of these two bits.
2007 	 */
2008 	if (cr->Attributes & (INFO_CARD_SHARE | INFO_CARD_EXCL))
2009 	    client->pending_events = CS_EVENT_REGISTRATION_COMPLETE;
2010 
2011 	/*
2012 	 * Check to see if the card for this client is currently in
2013 	 *	the socket. If it is, then set CLIENT_CARD_INSERTED
2014 	 *	since clients that are calling GetStatus at attach
2015 	 *	time will typically check to see if their card is
2016 	 *	currently installed.
2017 	 * If this is the CSI client, we also need to check to see
2018 	 *	if there is any card inserted in the socket, since
2019 	 *	the cs_card_for_client function will always return
2020 	 *	TRUE for a CSI client.
2021 	 * XXX What about super-clients?
2022 	 */
2023 	if (client->flags & CLIENT_CSI_CLIENT) {
2024 	    get_ss_status_t get_ss_status;
2025 
2026 	    get_ss_status.socket = sp->socket_num;
2027 
2028 	    if (SocketServices(SS_GetStatus, &get_ss_status) != SUCCESS) {
2029 		mutex_exit(&sp->lock);
2030 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2031 		return (CS_BAD_SOCKET);
2032 	    } /* SS_GetStatus */
2033 
2034 	    if (!(cs_sbm2cse(get_ss_status.CardState) &
2035 			CS_EVENT_CARD_INSERTION))
2036 		cie = 0;
2037 
2038 	} /* CLIENT_CSI_CLIENT */
2039 
2040 	if (cs_card_for_client(client) && (cie != 0)) {
2041 	    client->pending_events |= CS_EVENT_CARD_INSERTION;
2042 	    client->flags |= CLIENT_CARD_INSERTED;
2043 	} /* cs_card_for_client */
2044 
2045 	sp->num_clients++;
2046 	mutex_exit(&sp->lock);
2047 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2048 
2049 	return (CS_SUCCESS);
2050 }
2051 
2052 /*
2053  * cs_deregister_client - This supports the DeregisterClient call.
2054  */
2055 static int
2056 cs_deregister_client(client_handle_t client_handle)
2057 {
2058 	cs_socket_t *sp;
2059 	client_t *client;
2060 	int error, super_client = 0;
2061 	int client_lock_acquired;
2062 
2063 	/*
2064 	 * Check to see if this is the Socket Services client handle; if it
2065 	 *	is, we don't do anything except for return success.
2066 	 */
2067 	if (CLIENT_HANDLE_IS_SS(client_handle))
2068 	    return (CS_SUCCESS);
2069 
2070 	/*
2071 	 * Get a pointer to this client's socket structure.
2072 	 */
2073 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
2074 	    return (CS_BAD_SOCKET);
2075 
2076 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
2077 
2078 	/*
2079 	 *  Make sure that this is a valid client handle.
2080 	 */
2081 	if (!(client = cs_find_client(client_handle, &error))) {
2082 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2083 	    return (error);
2084 	}
2085 
2086 	/*
2087 	 * Make sure that any resources allocated by this client are
2088 	 *	not still allocated, and that if this is an MTD that
2089 	 *	no MTD operations are still in progress.
2090 	 */
2091 	if (client->flags &    (CLIENT_IO_ALLOCATED	|
2092 				CLIENT_IRQ_ALLOCATED	|
2093 				CLIENT_WIN_ALLOCATED	|
2094 				REQ_CONFIGURATION_DONE	|
2095 				REQ_SOCKET_MASK_DONE	|
2096 				REQ_IO_DONE		|
2097 				REQ_IRQ_DONE)) {
2098 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2099 	    return (CS_BUSY);
2100 	}
2101 
2102 	if (client->flags & CLIENT_MTD_IN_PROGRESS) {
2103 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2104 	    return (CS_IN_USE);
2105 	}
2106 
2107 	/*
2108 	 * Any previously allocated resources are not allocated anymore, and
2109 	 *	no MTD operations are in progress, so if this is an MTD client
2110 	 *	then do any MTD-specific client deregistration, and then
2111 	 *	nuke this client.
2112 	 * We expect cs_deregister_mtd to never fail.
2113 	 */
2114 	if (client->flags & INFO_MTD_CLIENT)
2115 	    (void) cs_deregister_mtd(client_handle);
2116 
2117 	if (client->flags & CLIENT_SUPER_CLIENT)
2118 	    super_client = CLIENT_SUPER_CLIENT;
2119 
2120 	kmem_free(client->driver_name, strlen(client->driver_name) + 1);
2121 
2122 	error = cs_destroy_client_handle(client_handle);
2123 
2124 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
2125 
2126 	/*
2127 	 * If this was the "super-client" deregistering, then this
2128 	 *	will clear the global "super-client" lock.
2129 	 * XXX - move this outside the per-socket code.
2130 	 */
2131 	cs_clear_superclient_lock(super_client);
2132 
2133 	return (error);
2134 }
2135 
2136 /*
2137  * cs_create_next_client_minor - returns the next available client minor
2138  *					number or 0 if none available
2139  *
2140  * Note that cs_find_client will always return a valid pointer to the
2141  *	global Socket Services client which has a client minor number
2142  *	of 0; this means that this function can never return a 0 as the
2143  *	next valid available client minor number.
2144  */
2145 unsigned
2146 cs_create_next_client_minor(unsigned socket_num, unsigned next_minor)
2147 {
2148 	unsigned max_client_handles = cs_max_client_handles;
2149 
2150 	do {
2151 	    next_minor &= CS_MAX_CLIENTS_MASK;
2152 	    if (!cs_find_client(MAKE_CLIENT_HANDLE(
2153 					CS_GET_SOCKET_NUMBER(socket_num),
2154 					CS_GET_FUNCTION_NUMBER(socket_num),
2155 							next_minor), NULL)) {
2156 		return (next_minor);
2157 	    }
2158 	    next_minor++;
2159 	} while (max_client_handles--);
2160 
2161 	return (0);
2162 }
2163 
2164 /*
2165  * cs_find_client - finds the client pointer associated with the client handle
2166  *			or NULL if client not found
2167  *
2168  * returns:	(client_t *)NULL - if client not found or an error occured
2169  *					If the error argument is not NULL,
2170  *					it is set to:
2171  *			CS_BAD_SOCKET - socket number in client_handle_t is
2172  *						invalid
2173  *			CS_BAD_HANDLE - client not found
2174  *			If no error, the error argument is not modified.
2175  *		(client_t *) - pointer to client_t structure
2176  *
2177  * Note that each socket always has a pseudo client with a client minor number
2178  *	of 0; this client minor number is used for Socket Services access to
2179  *	Card Services functions. The client pointer returned for client minor
2180  *	number 0 is the global Socket Services client pointer.
2181  */
2182 static client_t *
2183 cs_find_client(client_handle_t client_handle, int *error)
2184 {
2185 	cs_socket_t *sp;
2186 	client_t *clp;
2187 
2188 	/*
2189 	 * If we are being asked to see if a client with a minor number
2190 	 *	of 0 exists, always return a pointer to the global Socket
2191 	 *	Services client, since this client always exists, and is
2192 	 *	only for use by Socket Services.  There is no socket
2193 	 *	associated with this special client handle.
2194 	 */
2195 	if (CLIENT_HANDLE_IS_SS(client_handle))
2196 	    return (&cs_socket_services_client);
2197 
2198 	/*
2199 	 * Check to be sure that the socket number is in range
2200 	 */
2201 	if (!(CHECK_SOCKET_NUM(GET_CLIENT_SOCKET(client_handle),
2202 					cs_globals.max_socket_num))) {
2203 	    if (error)
2204 		*error = CS_BAD_SOCKET;
2205 	    return (NULL);
2206 	}
2207 
2208 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL) {
2209 	    if (error)
2210 		*error = CS_BAD_SOCKET;
2211 	    return (NULL);
2212 	}
2213 
2214 	clp = sp->client_list;
2215 
2216 	while (clp) {
2217 	    if (clp->client_handle == client_handle)
2218 		return (clp);
2219 	    clp = clp->next;
2220 	}
2221 
2222 	if (error)
2223 	    *error = CS_BAD_HANDLE;
2224 
2225 	return (NULL);
2226 }
2227 
2228 /*
2229  * cs_destroy_client_handle - destroys client handle and client structure of
2230  *				passed client handle
2231  *
2232  * returns:	CS_SUCCESS - if client handle sucessfully destroyed
2233  *		CS_BAD_HANDLE - if client handle is invalid or if trying
2234  *					to destroy global SS client
2235  *		{other errors} - other errors from cs_find_client()
2236  */
2237 static int
2238 cs_destroy_client_handle(client_handle_t client_handle)
2239 {
2240 	client_t *clp;
2241 	cs_socket_t *sp;
2242 	int error = CS_BAD_HANDLE;
2243 
2244 	/*
2245 	 * See if we were passed a valid client handle or if we're being asked
2246 	 *	to destroy the Socket Services client
2247 	 */
2248 	if ((!(clp = cs_find_client(client_handle, &error))) ||
2249 			(CLIENT_HANDLE_IS_SS(client_handle)))
2250 	    return (error);
2251 
2252 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
2253 	    return (CS_BAD_SOCKET);
2254 
2255 	/*
2256 	 * Recycle this client's minor number.  This will most likely
2257 	 *	be the next client minor number we use, but it is also
2258 	 *	a hint to cs_create_client_handle, and that function
2259 	 *	may actually create a new client handle using a minor
2260 	 *	number different that this number.
2261 	 */
2262 	mutex_enter(&sp->lock);
2263 	sp->next_cl_minor = GET_CLIENT_MINOR(client_handle);
2264 
2265 	/*
2266 	 * See if we're the first or not in the client list; if we're
2267 	 *	not first, then just adjust the client behind us to
2268 	 *	point to the client ahead of us; this could be NULL
2269 	 *	if we're the last client in the list.
2270 	 */
2271 	if (clp->prev) {
2272 	    clp->prev->next = clp->next;
2273 	} else {
2274 	/*
2275 	 * We are first, so adjust the client list head pointer
2276 	 *	in the socket to point to the client structure that
2277 	 *	follows us; this could turn out to be NULL if we're
2278 	 *	the only client on this socket.
2279 	 */
2280 	    sp->client_list = clp->next;
2281 	}
2282 
2283 	/*
2284 	 * If we're not the last client in the list, point the next
2285 	 *	client to the client behind us; this could turn out
2286 	 *	to be NULL if we're the first client on this socket.
2287 	 */
2288 	if (clp->next)
2289 	    clp->next->prev = clp->prev;
2290 
2291 	sp->num_clients--;
2292 	mutex_exit(&sp->lock);
2293 
2294 	/*
2295 	 * Free this client's memory.
2296 	 */
2297 	kmem_free(clp, sizeof (client_t));
2298 
2299 	return (CS_SUCCESS);
2300 }
2301 
2302 /*
2303  * cs_create_client_handle - create a new client handle for the passed
2304  *				socket and function number
2305  *
2306  * returns:	0 -  if can't create client for some reason
2307  *		client_handle_t - new client handle
2308  */
2309 static client_handle_t
2310 cs_create_client_handle(unsigned socket_num, client_t *cclp)
2311 {
2312 	client_t *clp;
2313 	cs_socket_t *sp;
2314 	unsigned next_minor;
2315 	client_handle_t client_handle;
2316 
2317 	if ((sp = cs_get_sp(socket_num)) == NULL)
2318 	    return (0);
2319 
2320 	/*
2321 	 * Get the next available minor number that we can use.  We use the
2322 	 *	next_cl_minor number as a hint to cs_create_next_client_minor
2323 	 *	and in most cases this will be the minor number we get back.
2324 	 * If for some reason we can't get a minor number, return an error.
2325 	 *	The only way we could get an error would be if there are
2326 	 *	already the maximum number of clients for this socket. Since
2327 	 *	the maximum number of clients per socket is pretty large,
2328 	 *	this error is unlikely to occur.
2329 	 */
2330 	if (!(next_minor =
2331 		cs_create_next_client_minor(socket_num, sp->next_cl_minor)))
2332 	    return (0);
2333 
2334 	/*
2335 	 * Got a new client minor number, now create a new client handle.
2336 	 */
2337 	client_handle = MAKE_CLIENT_HANDLE(CS_GET_SOCKET_NUMBER(socket_num),
2338 					CS_GET_FUNCTION_NUMBER(socket_num),
2339 					next_minor);
2340 
2341 	/*
2342 	 * If this client handle exists, then we have an internal
2343 	 *	error; this should never happen, BTW.  This is really
2344 	 *	a double-check on the cs_create_next_client_minor
2345 	 *	function, which also calls cs_find_client.
2346 	 */
2347 	if (cs_find_client(client_handle, NULL)) {
2348 	    cmn_err(CE_CONT,
2349 		"cs_create_client_handle: duplicate client handle 0x%x\n",
2350 							(int)client_handle);
2351 	    return (0);
2352 	}
2353 
2354 	/*
2355 	 * If we don't have any clients on this socket yet, create
2356 	 *	a new client and hang it on the socket client list.
2357 	 */
2358 	if (!sp->client_list) {
2359 	    sp->client_list = cclp;
2360 	    clp = sp->client_list;
2361 	} else {
2362 	/*
2363 	 * There are other clients on this socket, so look for
2364 	 *	the last client and add our new client after it.
2365 	 */
2366 	    clp = sp->client_list;
2367 	    while (clp->next) {
2368 		clp = clp->next;
2369 	    }
2370 
2371 	    clp->next = cclp;
2372 	    clp->next->prev = clp;
2373 	    clp = clp->next;
2374 	} /* if (!sp->client_list) */
2375 
2376 	/*
2377 	 * Assign the new client handle to this new client structure.
2378 	 */
2379 	clp->client_handle = client_handle;
2380 
2381 	/*
2382 	 * Create the next available client minor number for this socket
2383 	 *	and save it away.
2384 	 */
2385 	sp->next_cl_minor =
2386 		cs_create_next_client_minor(socket_num, sp->next_cl_minor);
2387 
2388 	return (client_handle);
2389 }
2390 
2391 /*
2392  * cs_clear_superclient_lock - clears the global "super-client" lock
2393  *
2394  * Note: this function uses the cs_globals.global_lock so observe proper
2395  *		nexting of locks!!
2396  */
2397 static void
2398 cs_clear_superclient_lock(int super_client)
2399 {
2400 
2401 	/*
2402 	 * If this was a "super-client" registering then we need
2403 	 *	to clear the GLOBAL_SUPER_CLIENT_REGISTERED flag
2404 	 *	so that other "super-clients" can register.
2405 	 */
2406 	if (super_client == CLIENT_SUPER_CLIENT) {
2407 	    mutex_enter(&cs_globals.global_lock);
2408 	    cs_globals.flags &= ~GLOBAL_SUPER_CLIENT_REGISTERED;
2409 	    mutex_exit(&cs_globals.global_lock);
2410 	}
2411 }
2412 
2413 /*
2414  * ==== event handling section ====
2415  */
2416 
2417 /*
2418  * cs_event - CS event hi-priority callback handler
2419  *
2420  *	This function gets called by SS and is passed the event type in
2421  *		the "event" argument, and the socket number in the "sn"
2422  *		argument. The "sn" argument is a valid logical socket
2423  *		number for all events except the PCE_SS_READY event.
2424  *
2425  *	The PCE_SS_INIT_STATE, PCE_ADD_SOCKET and PCE_DROP_SOCKET events
2426  *		are never called at high priority. These events return
2427  *		the following return codes:
2428  *
2429  *			CS_SUCCESS - operation sucessful
2430  *			CS_BAD_SOCKET - unable to complete operation
2431  *			CS_UNSUPPORTED_FUNCTION - bad subfunction of
2432  *							PCE_SS_INIT_STATE
2433  *
2434  *		The caller MUST look at these return codes!
2435  *
2436  *	This function is called at high-priority interrupt time for standard
2437  *		Card Services events, and the only standard Card Services
2438  *		event that it handles directly is the CS_EVENT_CARD_REMOVAL
2439  *		event, which gets shuttled right into the client's event
2440  *		handler.  All other events are just queued up and the socket
2441  *		event thread is woken up via the soft interrupt handler.
2442  *	Note that CS_EVENT_CARD_INSERTION events are not set in the clients'
2443  *		event field, since the CS card insertion/card ready processing
2444  *		code is responsible for setting this event in a client's
2445  *		event field.
2446  *
2447  */
2448 /*ARGSUSED*/
2449 uint32_t
2450 cs_event(event_t event, uint32_t sn, uint32_t arg)
2451 {
2452 	client_t *client;
2453 	cs_socket_t *sp;
2454 	client_types_t *ct;
2455 	uint32_t ret = CS_SUCCESS;
2456 
2457 	/*
2458 	 * Handle special SS<->CS events
2459 	 */
2460 	switch (event) {
2461 	    case PCE_SS_INIT_STATE:
2462 		mutex_enter(&cs_globals.global_lock);
2463 		switch (sn) {
2464 		    case PCE_SS_STATE_INIT:
2465 			if ((ret = cs_ss_init()) == CS_SUCCESS)
2466 			    cs_globals.init_state |= GLOBAL_INIT_STATE_SS_READY;
2467 			break;
2468 		    case PCE_SS_STATE_DEINIT:
2469 			cs_globals.init_state &= ~GLOBAL_INIT_STATE_SS_READY;
2470 			break;
2471 		    default:
2472 			ret = CS_UNSUPPORTED_FUNCTION;
2473 			cmn_err(CE_CONT, "cs_event: PCE_SS_INIT_STATE invalid "
2474 						"directive: 0x%x\n", sn);
2475 			break;
2476 		} /* switch (sn) */
2477 		mutex_exit(&cs_globals.global_lock);
2478 		return (ret);
2479 	    case PCE_ADD_SOCKET:
2480 		return (cs_add_socket(sn));
2481 	    case PCE_DROP_SOCKET:
2482 		return (cs_drop_socket(sn));
2483 	} /* switch (event) */
2484 
2485 	if ((sp = cs_get_sp(sn)) == NULL)
2486 	    return (CS_BAD_SOCKET);
2487 
2488 	/*
2489 	 * Check to see if CS wants to unload - we do this since it's possible
2490 	 *	to disable certain sockets.  Do NOT acquire any locks yet.
2491 	 */
2492 	if (sp->flags & SOCKET_UNLOAD_MODULE) {
2493 	    if (event == PCE_CARD_INSERT)
2494 		cmn_err(CE_CONT, "PCMCIA: socket %d disabled - please "
2495 							"remove card\n", sn);
2496 	    return (CS_SUCCESS);
2497 	}
2498 
2499 	mutex_enter(&sp->lock);
2500 
2501 #ifdef	CS_DEBUG
2502 	if (cs_debug > 1) {
2503 	    event2text_t event2text;
2504 
2505 	    event2text.event = event;
2506 	    (void) cs_event2text(&event2text, 0);
2507 	    cmn_err(CE_CONT, "cs_event: event=%s (x%x), socket=0x%x\n",
2508 				event2text.text, (int)event, (int)sn);
2509 	}
2510 #endif
2511 
2512 	/*
2513 	 * Convert SS events to CS events; handle the PRR if necessary.
2514 	 */
2515 	sp->events |= ss_to_cs_events(sp, event);
2516 
2517 	/*
2518 	 * We want to maintain the required event dispatching order as
2519 	 *	specified in the PCMCIA spec, so we cycle through all
2520 	 *	clients on this socket to make sure that they are
2521 	 *	notified in the correct order of any high-priority
2522 	 *	events.
2523 	 */
2524 	ct = &client_types[0];
2525 	while (ct) {
2526 	/*
2527 	 * Point to the head of the client list for this socket, and go
2528 	 *	through each client to set up the client events as well as
2529 	 *	call the client's event handler directly if we have a high
2530 	 *	priority event that we need to tell the client about.
2531 	 */
2532 	    client = sp->client_list;
2533 
2534 	    if (ct->order & CLIENT_EVENTS_LIFO) {
2535 		client_t *clp = NULL;
2536 
2537 		while (client) {
2538 		    clp = client;
2539 		    client = client->next;
2540 		}
2541 		client = clp;
2542 	    }
2543 
2544 	    while (client) {
2545 		client->events |= ((sp->events & ~CS_EVENT_CARD_INSERTION) &
2546 				    (client->event_mask | client->global_mask));
2547 		if (client->flags & ct->type) {
2548 #ifdef	CS_DEBUG
2549 		    if (cs_debug > 1) {
2550 			cmn_err(CE_CONT, "cs_event: socket %d client [%s] "
2551 						"events 0x%x flags 0x%x\n",
2552 						sn, client->driver_name,
2553 						(int)client->events,
2554 						(int)client->flags);
2555 		    }
2556 #endif
2557 
2558 		/*
2559 		 * Handle the suspend and card removal events
2560 		 *	specially here so that the client can receive
2561 		 *	these events at high-priority.
2562 		 */
2563 		    if (client->events & CS_EVENT_PM_SUSPEND) {
2564 			if (client->flags & CLIENT_CARD_INSERTED) {
2565 			    CLIENT_EVENT_CALLBACK(client, CS_EVENT_PM_SUSPEND,
2566 							CS_EVENT_PRI_HIGH);
2567 			} /* if (CLIENT_CARD_INSERTED) */
2568 			client->events &= ~CS_EVENT_PM_SUSPEND;
2569 		    } /* if (CS_EVENT_PM_SUSPEND) */
2570 
2571 		    if (client->events & CS_EVENT_CARD_REMOVAL) {
2572 			if (client->flags & CLIENT_CARD_INSERTED) {
2573 			    client->flags &= ~(CLIENT_CARD_INSERTED |
2574 						CLIENT_SENT_INSERTION);
2575 			    CLIENT_EVENT_CALLBACK(client,
2576 							CS_EVENT_CARD_REMOVAL,
2577 							CS_EVENT_PRI_HIGH);
2578 			/*
2579 			 * Check to see if the client wants low priority
2580 			 *	removal events as well.
2581 			 */
2582 			    if ((client->event_mask | client->global_mask) &
2583 						CS_EVENT_CARD_REMOVAL_LOWP) {
2584 				client->events |= CS_EVENT_CARD_REMOVAL_LOWP;
2585 			    }
2586 			} /* if (CLIENT_CARD_INSERTED) */
2587 			client->events &= ~CS_EVENT_CARD_REMOVAL;
2588 		    } /* if (CS_EVENT_CARD_REMOVAL) */
2589 
2590 		} /* if (ct->type) */
2591 		if (ct->order & CLIENT_EVENTS_LIFO) {
2592 		    client = client->prev;
2593 		} else {
2594 		    client = client->next;
2595 		}
2596 	    } /* while (client) */
2597 
2598 	    ct = ct->next;
2599 	} /* while (ct) */
2600 
2601 	/*
2602 	 * Set the SOCKET_NEEDS_THREAD flag so that the soft interrupt
2603 	 *	handler will wakeup this socket's event thread.
2604 	 */
2605 	if (sp->events)
2606 	    sp->flags |= SOCKET_NEEDS_THREAD;
2607 
2608 	/*
2609 	 * Fire off a soft interrupt that will cause the socket thread
2610 	 *	to be woken up and any remaining events to be sent to
2611 	 *	the clients on this socket.
2612 	 */
2613 	if ((sp->init_state & SOCKET_INIT_STATE_SOFTINTR) &&
2614 			!(cs_globals.init_state & GLOBAL_INIT_STATE_UNLOADING))
2615 	    ddi_trigger_softintr(sp->softint_id);
2616 
2617 	mutex_exit(&sp->lock);
2618 
2619 	return (CS_SUCCESS);
2620 }
2621 
2622 /*
2623  * cs_card_insertion - handle card insertion and card ready events
2624  *
2625  * We read the CIS, if present, and store it away, then tell SS that
2626  *	we have read the CIS and it's ready to be parsed.  Since card
2627  *	insertion and card ready events are pretty closely intertwined,
2628  *	we handle both here.  For card ready events that are not the
2629  *	result of a card insertion event, we expect that the caller has
2630  *	already done the appropriate processing and that we will not be
2631  *	called unless we received a card ready event right after a card
2632  *	insertion event, i.e. that the SOCKET_WAIT_FOR_READY flag in
2633  *	sp->thread_state was set or if we get a CARD_READY event right
2634  *	after a CARD_INSERTION event.
2635  *
2636  *    calling:	sp - pointer to socket structure
2637  *		event - event to handle, one of:
2638  *				CS_EVENT_CARD_INSERTION
2639  *				CS_EVENT_CARD_READY
2640  *				CS_EVENT_SS_UPDATED
2641  */
2642 static int
2643 cs_card_insertion(cs_socket_t *sp, event_t event)
2644 {
2645 	int ret;
2646 
2647 	/*
2648 	 * Since we're only called while waiting for the card insertion
2649 	 *	and card ready sequence to occur, we may have a pending
2650 	 *	card ready timer that hasn't gone off yet if we got a
2651 	 *	real card ready event.
2652 	 */
2653 	UNTIMEOUT(sp->rdybsy_tmo_id);
2654 
2655 #ifdef	CS_DEBUG
2656 	if (cs_debug > 1) {
2657 	    cmn_err(CE_CONT, "cs_card_insertion: event=0x%x, socket=0x%x\n",
2658 						(int)event, sp->socket_num);
2659 	}
2660 #endif
2661 
2662 	/*
2663 	 * Handle card insertion processing
2664 	 */
2665 	if (event & CS_EVENT_CARD_INSERTION) {
2666 	    set_socket_t set_socket;
2667 	    get_ss_status_t gs;
2668 
2669 	/*
2670 	 * Check to be sure that we have a valid CIS window
2671 	 */
2672 	    if (!SOCKET_HAS_CIS_WINDOW(sp)) {
2673 		cmn_err(CE_CONT,
2674 			"cs_card_insertion: socket %d has no "
2675 							"CIS window\n",
2676 				sp->socket_num);
2677 		return (CS_GENERAL_FAILURE);
2678 	    }
2679 
2680 	/*
2681 	 * Apply power to the socket, enable card detect and card ready
2682 	 *	events, then reset the socket.
2683 	 */
2684 	    mutex_enter(&sp->lock);
2685 	    sp->event_mask =   (CS_EVENT_CARD_REMOVAL   |
2686 				CS_EVENT_CARD_READY);
2687 	    mutex_exit(&sp->lock);
2688 	    set_socket.socket = sp->socket_num;
2689 	    set_socket.SCIntMask = (SBM_CD | SBM_RDYBSY);
2690 	    set_socket.IREQRouting = 0;
2691 	    set_socket.IFType = IF_MEMORY;
2692 	    set_socket.CtlInd = 0; /* turn off controls and indicators */
2693 	    set_socket.State = (unsigned)~0;	/* clear latched state bits */
2694 
2695 	    (void) cs_convert_powerlevel(sp->socket_num, 50, VCC,
2696 						&set_socket.VccLevel);
2697 	    (void) cs_convert_powerlevel(sp->socket_num, 50, VPP1,
2698 						&set_socket.Vpp1Level);
2699 	    (void) cs_convert_powerlevel(sp->socket_num, 50, VPP2,
2700 						&set_socket.Vpp2Level);
2701 
2702 	    if ((ret = SocketServices(SS_SetSocket, &set_socket)) != SUCCESS) {
2703 		cmn_err(CE_CONT,
2704 		    "cs_card_insertion: socket %d SS_SetSocket failure %d\n",
2705 				sp->socket_num, ret);
2706 		return (ret);
2707 	    }
2708 
2709 	/*
2710 	 * Clear the ready and ready_timeout events since they are now
2711 	 *	bogus since we're about to reset the socket.
2712 	 * XXX - should these be cleared right after the RESET??
2713 	 */
2714 	    mutex_enter(&sp->lock);
2715 
2716 	    sp->events &= ~(CS_EVENT_CARD_READY | CS_EVENT_READY_TIMEOUT);
2717 	    mutex_exit(&sp->lock);
2718 
2719 	    SocketServices(SS_ResetSocket, sp->socket_num,
2720 						RESET_MODE_CARD_ONLY);
2721 
2722 	/*
2723 	 * We are required by the PCMCIA spec to wait some number of
2724 	 *	milliseconds after reset before we access the card, so
2725 	 *	we set up a timer here that will wake us up and allow us
2726 	 *	to continue with our card initialization.
2727 	 */
2728 	    mutex_enter(&sp->lock);
2729 	    sp->thread_state |= SOCKET_RESET_TIMER;
2730 	    (void) timeout(cs_ready_timeout, sp,
2731 		drv_usectohz(cs_reset_timeout_time * 1000));
2732 	    cv_wait(&sp->reset_cv, &sp->lock);
2733 	    sp->thread_state &= ~SOCKET_RESET_TIMER;
2734 	    mutex_exit(&sp->lock);
2735 
2736 #ifdef	CS_DEBUG
2737 	    if (cs_debug > 2) {
2738 		cmn_err(CE_CONT, "cs_card_insertion: socket %d out of RESET "
2739 		    "for %d mS sp->events 0x%x\n",
2740 		    sp->socket_num, cs_reset_timeout_time, (int)sp->events);
2741 	    }
2742 #endif
2743 
2744 	/*
2745 	 * If we have a pending CS_EVENT_CARD_REMOVAL event it
2746 	 *	means that we likely got CD line bounce on the
2747 	 *	insertion, so terminate this processing.
2748 	 */
2749 	    if (sp->events & CS_EVENT_CARD_REMOVAL) {
2750 #ifdef	CS_DEBUG
2751 		if (cs_debug > 0) {
2752 		    cmn_err(CE_CONT, "cs_card_insertion: socket %d "
2753 						"CS_EVENT_CARD_REMOVAL event "
2754 						"terminating insertion "
2755 						"processing\n",
2756 							sp->socket_num);
2757 		}
2758 #endif
2759 	    return (CS_SUCCESS);
2760 	    } /* if (CS_EVENT_CARD_REMOVAL) */
2761 
2762 	/*
2763 	 * If we got a card ready event after the reset, then don't
2764 	 *	bother setting up a card ready timer, since we'll blast
2765 	 *	right on through to the card ready processing.
2766 	 * Get the current card status to see if it's ready; if it
2767 	 *	is, we probably won't get a card ready event.
2768 	 */
2769 	    gs.socket = sp->socket_num;
2770 	    gs.CardState = 0;
2771 	    if ((ret = SocketServices(SS_GetStatus, &gs)) != SUCCESS) {
2772 		cmn_err(CE_CONT,
2773 		    "cs_card_insertion: socket %d SS_GetStatus failure %d\n",
2774 				sp->socket_num, ret);
2775 		return (ret);
2776 	    }
2777 
2778 	    mutex_enter(&sp->lock);
2779 	    if ((sp->events & CS_EVENT_CARD_READY) ||
2780 					(gs.CardState & SBM_RDYBSY)) {
2781 		event = CS_EVENT_CARD_READY;
2782 #ifdef	CS_DEBUG
2783 		if (cs_debug > 1) {
2784 		    cmn_err(CE_CONT, "cs_card_insertion: socket %d card "
2785 						"READY\n", sp->socket_num);
2786 		}
2787 #endif
2788 
2789 	    } else {
2790 #ifdef	CS_DEBUG
2791 		if (cs_debug > 1) {
2792 		    cmn_err(CE_CONT, "cs_card_insertion: socket %d setting "
2793 					"READY timer\n", sp->socket_num);
2794 		}
2795 #endif
2796 
2797 		sp->rdybsy_tmo_id = timeout(cs_ready_timeout, sp,
2798 		    READY_TIMEOUT_TIME);
2799 		sp->thread_state |= SOCKET_WAIT_FOR_READY;
2800 
2801 	    } /* if (CS_EVENT_CARD_READY) */
2802 
2803 	    mutex_exit(&sp->lock);
2804 
2805 	} /* if (CS_EVENT_CARD_INSERTION) */
2806 
2807 	/*
2808 	 * Handle card ready processing.  This is only card ready processing
2809 	 *	for card ready events in conjunction with a card insertion.
2810 	 */
2811 	if (event == CS_EVENT_CARD_READY) {
2812 	    get_socket_t get_socket;
2813 	    set_socket_t set_socket;
2814 
2815 	/*
2816 	 * The only events that we want to see now are card removal
2817 	 *	events.
2818 	 */
2819 	    mutex_enter(&sp->lock);
2820 	    sp->event_mask = CS_EVENT_CARD_REMOVAL;
2821 	    mutex_exit(&sp->lock);
2822 	    get_socket.socket = sp->socket_num;
2823 	    if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS) {
2824 		cmn_err(CE_CONT,
2825 			"cs_card_insertion: socket %d SS_GetSocket failed\n",
2826 							sp->socket_num);
2827 		return (CS_BAD_SOCKET);
2828 	    }
2829 
2830 	    set_socket.socket = sp->socket_num;
2831 	    set_socket.SCIntMask = SBM_CD;
2832 	    set_socket.VccLevel = get_socket.VccLevel;
2833 	    set_socket.Vpp1Level = get_socket.Vpp1Level;
2834 	    set_socket.Vpp2Level = get_socket.Vpp2Level;
2835 	    set_socket.IREQRouting = get_socket.IRQRouting;
2836 	    set_socket.IFType = get_socket.IFType;
2837 	    set_socket.CtlInd = get_socket.CtlInd;
2838 	    /* XXX (is ~0 correct here?) to reset latched values */
2839 	    set_socket.State = (unsigned)~0;
2840 
2841 	    if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS) {
2842 		cmn_err(CE_CONT,
2843 			"cs_card_insertion: socket %d SS_SetSocket failed\n",
2844 							sp->socket_num);
2845 
2846 		return (CS_BAD_SOCKET);
2847 	    }
2848 
2849 		/*
2850 		 * Grab the cis_lock mutex to protect the CIS-to-be and
2851 		 *	the CIS window, then fire off the CIS parser to
2852 		 *	create a local copy of the card's CIS.
2853 		 */
2854 		mutex_enter(&sp->cis_lock);
2855 
2856 		if ((ret = cs_create_cis(sp)) != CS_SUCCESS) {
2857 		    mutex_exit(&sp->cis_lock);
2858 		    return (ret);
2859 		}
2860 
2861 		mutex_exit(&sp->cis_lock);
2862 
2863 		/*
2864 		 * If we have a pending CS_EVENT_CARD_REMOVAL event it
2865 		 *	means that we likely got CD line bounce on the
2866 		 *	insertion, so destroy the CIS and terminate this
2867 		 *	processing. We'll get called back to handle the
2868 		 *	insertion again later.
2869 		 */
2870 		if (sp->events & CS_EVENT_CARD_REMOVAL) {
2871 		    mutex_enter(&sp->cis_lock);
2872 		    (void) cs_destroy_cis(sp);
2873 		    mutex_exit(&sp->cis_lock);
2874 		} else {
2875 			/*
2876 			 * Schedule the call to the Socket Services work thread.
2877 			 */
2878 		    mutex_enter(&sp->ss_thread_lock);
2879 		    sp->ss_thread_state |= SOCKET_THREAD_CSCISInit;
2880 		    cv_broadcast(&sp->ss_thread_cv);
2881 		    mutex_exit(&sp->ss_thread_lock);
2882 		} /* if (CS_EVENT_CARD_REMOVAL) */
2883 	} /* if (CS_EVENT_CARD_READY) */
2884 
2885 	/*
2886 	 * Socket Services has parsed the CIS and has done any other
2887 	 *	work to get the client driver loaded and attached if
2888 	 *	necessary, so setup the per-client state.
2889 	 */
2890 	if (event == CS_EVENT_SS_UPDATED) {
2891 	    client_t *client;
2892 
2893 	/*
2894 	 * Now that we and SS are done handling the card insertion
2895 	 *	semantics, go through each client on this socket and set
2896 	 *	the CS_EVENT_CARD_INSERTION event in each client's event
2897 	 *	field.  We do this here instead of in cs_event so that
2898 	 *	when a client gets a CS_EVENT_CARD_INSERTION event, the
2899 	 *	card insertion and ready processing has already been done
2900 	 *	and SocketServices has had a chance to create a dip for
2901 	 *	the card in this socket.
2902 	 */
2903 	    mutex_enter(&sp->lock);
2904 	    client = sp->client_list;
2905 	    while (client) {
2906 		client->events |= (CS_EVENT_CARD_INSERTION &
2907 				(client->event_mask | client->global_mask));
2908 		client = client->next;
2909 	    } /* while (client) */
2910 
2911 	    mutex_exit(&sp->lock);
2912 
2913 	} /* if (CS_EVENT_SS_UPDATED) */
2914 
2915 	return (CS_SUCCESS);
2916 }
2917 
2918 /*
2919  * cs_card_removal - handle card removal events
2920  *
2921  * Destroy the CIS.
2922  *
2923  *    calling:	sp - pointer to socket structure
2924  *
2925  */
2926 static int
2927 cs_card_removal(cs_socket_t *sp)
2928 {
2929 	set_socket_t set_socket;
2930 	int ret;
2931 
2932 #ifdef	CS_DEBUG
2933 	if (cs_debug > 0) {
2934 	    cmn_err(CE_CONT, "cs_card_removal: socket %d\n", sp->socket_num);
2935 	}
2936 #endif
2937 
2938 	/*
2939 	 * Remove any pending card ready timer
2940 	 */
2941 	UNTIMEOUT(sp->rdybsy_tmo_id);
2942 
2943 	/*
2944 	 * Clear various flags so that everyone else knows that there's
2945 	 *	nothing on this socket anymore.  Note that we clear the
2946 	 *	SOCKET_CARD_INSERTED and SOCKET_IS_IO flags in the
2947 	 *	ss_to_cs_events event mapping function.
2948 	 */
2949 	mutex_enter(&sp->lock);
2950 	sp->thread_state &= ~(SOCKET_WAIT_FOR_READY | SOCKET_RESET_TIMER);
2951 
2952 	/*
2953 	 * Turn off socket power and set the socket back to memory mode.
2954 	 * Disable all socket events except for CARD_INSERTION events.
2955 	 */
2956 	sp->event_mask = CS_EVENT_CARD_INSERTION;
2957 	mutex_exit(&sp->lock);
2958 	set_socket.socket = sp->socket_num;
2959 	set_socket.SCIntMask = SBM_CD;
2960 	set_socket.IREQRouting = 0;
2961 	set_socket.IFType = IF_MEMORY;
2962 	set_socket.CtlInd = 0; /* turn off controls and indicators */
2963 	set_socket.State = (unsigned)~0;	/* clear latched state bits */
2964 
2965 	(void) cs_convert_powerlevel(sp->socket_num, 0, VCC,
2966 					&set_socket.VccLevel);
2967 	(void) cs_convert_powerlevel(sp->socket_num, 0, VPP1,
2968 					&set_socket.Vpp1Level);
2969 	(void) cs_convert_powerlevel(sp->socket_num, 0, VPP2,
2970 					&set_socket.Vpp2Level);
2971 
2972 	if ((ret = SocketServices(SS_SetSocket, &set_socket)) != SUCCESS) {
2973 	    cmn_err(CE_CONT,
2974 		"cs_card_removal: socket %d SS_SetSocket failure %d\n",
2975 				sp->socket_num, ret);
2976 	    return (ret);
2977 	}
2978 
2979 #ifdef	CS_DEBUG
2980 	if (cs_debug > 2) {
2981 	    cmn_err(CE_CONT, "cs_card_removal: socket %d "
2982 					"calling cs_destroy_cis\n",
2983 							sp->socket_num);
2984 	}
2985 #endif
2986 
2987 	/*
2988 	 * Destroy the CIS and tell Socket Services that we're done
2989 	 *	handling the card removal event.
2990 	 */
2991 	mutex_enter(&sp->cis_lock);
2992 	(void) cs_destroy_cis(sp);
2993 	mutex_exit(&sp->cis_lock);
2994 
2995 #ifdef	CS_DEBUG
2996 	if (cs_debug > 2) {
2997 	    cmn_err(CE_CONT, "cs_card_removal: calling CSCardRemoved\n");
2998 	}
2999 #endif
3000 
3001 	SocketServices(CSCardRemoved, sp->socket_num);
3002 
3003 	return (CS_SUCCESS);
3004 }
3005 
3006 /*
3007  * ss_to_cs_events - convert Socket Services events to Card Services event
3008  *			masks; this function will not read the PRR if the
3009  *			socket is in IO mode; this happens in cs_event_thread
3010  *
3011  * This function returns a bit mask of events.
3012  *
3013  * Note that we do some simple hysterious on card insertion and card removal
3014  *	events to prevent spurious insertion and removal events from being
3015  *	propogated down the chain.
3016  */
3017 static event_t
3018 ss_to_cs_events(cs_socket_t *sp, event_t event)
3019 {
3020 	event_t revent = 0;
3021 
3022 	switch (event) {
3023 	    case PCE_CARD_STATUS_CHANGE:
3024 		revent |= CS_EVENT_STATUS_CHANGE;
3025 		break;
3026 	    case PCE_CARD_REMOVAL:
3027 		if (sp->flags & SOCKET_CARD_INSERTED) {
3028 		    sp->flags &= ~(SOCKET_CARD_INSERTED | SOCKET_IS_IO);
3029 		    revent |= CS_EVENT_CARD_REMOVAL;
3030 			/*
3031 			 * If we're processing a removal event, it makes
3032 			 *	no sense to keep any insertion or ready events,
3033 			 *	so nuke them here.  This will not clear any
3034 			 *	insertion events in the per-client event field.
3035 			 */
3036 		    sp->events &= ~(CS_EVENT_CARD_INSERTION |
3037 				    CS_EVENT_CARD_READY |
3038 				    CS_EVENT_READY_TIMEOUT);
3039 
3040 		/*
3041 		 * We also don't need to wait for READY anymore since
3042 		 *	it probably won't show up, or if it does, it will
3043 		 *	be a bogus READY event as the card is sliding out
3044 		 *	of the socket.  Since we never do a cv_wait on the
3045 		 *	card ready timer, it's OK for that timer to either
3046 		 *	never go off (via an UNTIMEOUT in cs_card_removal)
3047 		 *	or to go off but not do a cv_broadcast (since the
3048 		 *	SOCKET_WAIT_FOR_READY flag is cleared here).
3049 		 */
3050 		    sp->thread_state &= ~SOCKET_WAIT_FOR_READY;
3051 
3052 		}
3053 		break;
3054 	    case PCE_CARD_INSERT:
3055 		if (!(sp->flags & SOCKET_CARD_INSERTED)) {
3056 		    sp->flags |= SOCKET_CARD_INSERTED;
3057 		    revent |= CS_EVENT_CARD_INSERTION;
3058 		}
3059 		break;
3060 	    case PCE_CARD_READY:
3061 		if (sp->flags & SOCKET_CARD_INSERTED)
3062 		    revent |= CS_EVENT_CARD_READY;
3063 		break;
3064 	    case PCE_CARD_BATTERY_WARN:
3065 		if (sp->flags & SOCKET_CARD_INSERTED)
3066 		    revent |= CS_EVENT_BATTERY_LOW;
3067 		break;
3068 	    case PCE_CARD_BATTERY_DEAD:
3069 		if (sp->flags & SOCKET_CARD_INSERTED)
3070 		    revent |= CS_EVENT_BATTERY_DEAD;
3071 		break;
3072 	    case PCE_CARD_WRITE_PROTECT:
3073 		if (sp->flags & SOCKET_CARD_INSERTED)
3074 		    revent |= CS_EVENT_WRITE_PROTECT;
3075 		break;
3076 	    case PCE_PM_RESUME:
3077 		revent |= CS_EVENT_PM_RESUME;
3078 		break;
3079 	    case PCE_PM_SUSPEND:
3080 		revent |= CS_EVENT_PM_SUSPEND;
3081 		break;
3082 	    default:
3083 		cmn_err(CE_CONT, "ss_to_cs_events: unknown event 0x%x\n",
3084 								(int)event);
3085 		break;
3086 	} /* switch(event) */
3087 
3088 	return (revent);
3089 }
3090 
3091 /*
3092  * cs_ready_timeout - general purpose READY/BUSY and RESET timer
3093  *
3094  * Note that we really only expect one of the two events to be asserted when
3095  *	we are called.  XXX - Perhaps this might be a problem later on??
3096  *
3097  *	There is also the problem of cv_broadcast dropping the interrupt
3098  *	priority, even though we have our high-priority mutex held.  If
3099  *	we hold our high-priority mutex (sp->lock) over a cv_broadcast, and
3100  *	we get a high-priority interrupt during this time, the system will
3101  *	deadlock or panic.  Thanks to Andy Banta for finding this out in
3102  *	the SPC/S (stc.c) driver.
3103  *
3104  * This callback routine can not grab the sp->client_lock mutex or deadlock
3105  *	will result.
3106  */
3107 void
3108 cs_ready_timeout(void *arg)
3109 {
3110 	cs_socket_t *sp = arg;
3111 	kcondvar_t *cvp = NULL;
3112 
3113 	mutex_enter(&sp->lock);
3114 
3115 	if (sp->thread_state & SOCKET_RESET_TIMER) {
3116 #ifdef	CS_DEBUG
3117 	if (cs_debug > 1) {
3118 	    cmn_err(CE_CONT, "cs_ready_timeout: SOCKET_RESET_TIMER socket %d\n",
3119 							sp->socket_num);
3120 	}
3121 #endif
3122 
3123 	    cvp = &sp->reset_cv;
3124 	}
3125 
3126 	if (sp->thread_state & SOCKET_WAIT_FOR_READY) {
3127 	    sp->events |= CS_EVENT_READY_TIMEOUT;
3128 	    cvp = &sp->thread_cv;
3129 
3130 #ifdef	CS_DEBUG
3131 	    if (cs_debug > 1) {
3132 		cmn_err(CE_CONT, "cs_ready_timeout: SOCKET_WAIT_FOR_READY "
3133 						"socket %d\n", sp->socket_num);
3134 	    }
3135 #endif
3136 
3137 	}
3138 
3139 	mutex_exit(&sp->lock);
3140 
3141 	if (cvp)
3142 	    cv_broadcast(cvp);
3143 }
3144 
3145 /*
3146  * cs_event_softintr_timeout - wrapper function to call cs_socket_event_softintr
3147  */
3148 /* ARGSUSED */
3149 void
3150 cs_event_softintr_timeout(void *arg)
3151 {
3152 
3153 	/*
3154 	 * If we're trying to unload this module, then don't do
3155 	 *	anything but exit.
3156 	 * We acquire the cs_globals.global_lock mutex here so that
3157 	 *	we can correctly synchronize with cs_deinit when it
3158 	 *	is telling us to shut down. XXX - is this bogus??
3159 	 */
3160 	mutex_enter(&cs_globals.global_lock);
3161 	if (!(cs_globals.init_state & GLOBAL_INIT_STATE_UNLOADING)) {
3162 	    mutex_exit(&cs_globals.global_lock);
3163 	    (void) cs_socket_event_softintr(NULL);
3164 	    cs_globals.sotfint_tmo = timeout(cs_event_softintr_timeout,
3165 		NULL, SOFTINT_TIMEOUT_TIME);
3166 	} else {
3167 	    mutex_exit(&cs_globals.global_lock);
3168 	}
3169 }
3170 
3171 /*
3172  * cs_socket_event_softintr - This function just does a cv_broadcast on behalf
3173  *				of the high-priority interrupt handler.
3174  *
3175  *	Note: There is no calling argument.
3176  */
3177 /*ARGSUSED*/
3178 uint32_t
3179 cs_socket_event_softintr(caddr_t notused)
3180 {
3181 	cs_socket_t *sp;
3182 	uint32_t sn;
3183 	int ret = DDI_INTR_UNCLAIMED;
3184 
3185 	/*
3186 	 * If the module is on it's way out, then don't bother
3187 	 *	to do anything else except return.
3188 	 */
3189 	mutex_enter(&cs_globals.global_lock);
3190 	if ((cs_globals.init_state & GLOBAL_INIT_STATE_UNLOADING) ||
3191 				(cs_globals.init_state & GLOBAL_IN_SOFTINTR)) {
3192 		mutex_exit(&cs_globals.global_lock);
3193 
3194 		/*
3195 		 * Note that we return DDI_INTR_UNCLAIMED here
3196 		 *	since we don't want to be constantly
3197 		 *	called back.
3198 		 */
3199 		return (ret);
3200 	} else {
3201 	    cs_globals.init_state |= GLOBAL_IN_SOFTINTR;
3202 	    mutex_exit(&cs_globals.global_lock);
3203 	}
3204 
3205 	/*
3206 	 * Go through each socket and dispatch the appropriate events.
3207 	 *	We have to funnel everything through this one routine because
3208 	 *	we can't do a cv_broadcast from a high level interrupt handler
3209 	 *	and we also can't have more than one soft interrupt handler
3210 	 *	on a single dip and using the same handler address.
3211 	 */
3212 	for (sn = 0; sn < cs_globals.max_socket_num; sn++) {
3213 	    if ((sp = cs_get_sp(sn)) != NULL) {
3214 		if (sp->init_state & SOCKET_INIT_STATE_READY) {
3215 			/*
3216 			 * If we're being asked to unload CS, then don't bother
3217 			 *	waking up the socket event thread handler.
3218 			 */
3219 		    if (!(sp->flags & SOCKET_UNLOAD_MODULE) &&
3220 					(sp->flags & SOCKET_NEEDS_THREAD)) {
3221 			ret = DDI_INTR_CLAIMED;
3222 			mutex_enter(&sp->client_lock);
3223 			cv_broadcast(&sp->thread_cv);
3224 			mutex_exit(&sp->client_lock);
3225 		    } /* if (SOCKET_NEEDS_THREAD) */
3226 		} /* if (SOCKET_INIT_STATE_READY) */
3227 	    } /* cs_get_sp */
3228 	} /* for (sn) */
3229 
3230 	mutex_enter(&cs_globals.global_lock);
3231 	cs_globals.init_state &= ~GLOBAL_IN_SOFTINTR;
3232 	mutex_exit(&cs_globals.global_lock);
3233 
3234 	return (ret);
3235 }
3236 
3237 /*
3238  * cs_event_thread - This is the per-socket event thread.
3239  */
3240 static void
3241 cs_event_thread(uint32_t sn)
3242 {
3243 	cs_socket_t	*sp;
3244 	client_t	*client;
3245 	client_types_t	*ct;
3246 
3247 	if ((sp = cs_get_sp(sn)) == NULL)
3248 	    return;
3249 
3250 #ifdef	CS_DEBUG
3251 	if (cs_debug > 1) {
3252 	    cmn_err(CE_CONT, "cs_event_thread: socket %d thread started\n",
3253 								sp->socket_num);
3254 	}
3255 #endif
3256 
3257 	CALLB_CPR_INIT(&sp->cprinfo_cs, &sp->client_lock,
3258 					callb_generic_cpr, "cs_event_thread");
3259 
3260 	mutex_enter(&sp->client_lock);
3261 
3262 	for (;;) {
3263 
3264 	    CALLB_CPR_SAFE_BEGIN(&sp->cprinfo_cs);
3265 	    cv_wait(&sp->thread_cv, &sp->client_lock);
3266 	    CALLB_CPR_SAFE_END(&sp->cprinfo_cs, &sp->client_lock);
3267 
3268 	    mutex_enter(&sp->lock);
3269 	    sp->flags &= ~SOCKET_NEEDS_THREAD;
3270 	    mutex_exit(&sp->lock);
3271 
3272 	/*
3273 	 * Check to see if there are any special thread operations that
3274 	 *	we are being asked to perform.
3275 	 */
3276 	    if (sp->thread_state & SOCKET_THREAD_EXIT) {
3277 #ifdef	CS_DEBUG
3278 		if (cs_debug > 1) {
3279 		    cmn_err(CE_CONT, "cs_event_thread: socket %d "
3280 							"SOCKET_THREAD_EXIT\n",
3281 							sp->socket_num);
3282 		}
3283 #endif
3284 		CALLB_CPR_EXIT(&sp->cprinfo_cs);
3285 		cv_broadcast(&sp->caller_cv);	/* wakes up cs_deinit */
3286 		mutex_exit(&sp->client_lock);
3287 		return;
3288 	    } /* if (SOCKET_THREAD_EXIT) */
3289 
3290 #ifdef	CS_DEBUG
3291 	    if (cs_debug > 1) {
3292 		cmn_err(CE_CONT, "cs_event_thread: socket %d sp->events 0x%x\n",
3293 							sp->socket_num,
3294 							(int)sp->events);
3295 	    }
3296 #endif
3297 
3298 	/*
3299 	 * Handle CS_EVENT_CARD_INSERTION events
3300 	 */
3301 	    if (sp->events & CS_EVENT_CARD_INSERTION) {
3302 		mutex_enter(&sp->lock);
3303 		sp->events &= ~CS_EVENT_CARD_INSERTION;
3304 		mutex_exit(&sp->lock);
3305 
3306 		/*
3307 		 * If we have a pending CS_EVENT_CARD_REMOVAL event it
3308 		 *	means that we likely got CD line bounce on the
3309 		 *	insertion, so terminate this processing.
3310 		 */
3311 		if ((sp->events & CS_EVENT_CARD_REMOVAL) == 0) {
3312 		    (void) cs_card_insertion(sp, CS_EVENT_CARD_INSERTION);
3313 		}
3314 #ifdef	CS_DEBUG
3315 		else if (cs_debug > 0) {
3316 			cmn_err(CE_CONT, "cs_event_thread: socket %d "
3317 					"CS_EVENT_CARD_REMOVAL event "
3318 					"terminating "
3319 					"CS_EVENT_CARD_INSERTION "
3320 					"processing\n", sp->socket_num);
3321 		    }
3322 #endif
3323 	} /* if (CS_EVENT_CARD_INSERTION) */
3324 
3325 	/*
3326 	 * Handle CS_EVENT_CARD_READY and CS_EVENT_READY_TIMEOUT events
3327 	 */
3328 	    if (sp->events & (CS_EVENT_CARD_READY | CS_EVENT_READY_TIMEOUT)) {
3329 		mutex_enter(&sp->lock);
3330 		sp->events &= ~(CS_EVENT_CARD_READY | CS_EVENT_READY_TIMEOUT);
3331 		mutex_exit(&sp->lock);
3332 		if (sp->thread_state & SOCKET_WAIT_FOR_READY) {
3333 		    mutex_enter(&sp->lock);
3334 		    sp->thread_state &= ~SOCKET_WAIT_FOR_READY;
3335 		    mutex_exit(&sp->lock);
3336 		    (void) cs_card_insertion(sp, CS_EVENT_CARD_READY);
3337 		} /* if (SOCKET_WAIT_FOR_READY) */
3338 	    } /* if (CS_EVENT_CARD_READY) */
3339 
3340 	/*
3341 	 * Handle CS_EVENT_SS_UPDATED events
3342 	 */
3343 	    if (sp->events & CS_EVENT_SS_UPDATED) {
3344 		mutex_enter(&sp->lock);
3345 		sp->events &= ~CS_EVENT_SS_UPDATED;
3346 		mutex_exit(&sp->lock);
3347 		(void) cs_card_insertion(sp, CS_EVENT_SS_UPDATED);
3348 	    } /* if (CS_EVENT_SS_UPDATED) */
3349 
3350 	/*
3351 	 * Handle CS_EVENT_STATUS_CHANGE events
3352 	 */
3353 	    if (sp->events & CS_EVENT_STATUS_CHANGE) {
3354 		event_t revent;
3355 
3356 		mutex_enter(&sp->cis_lock);
3357 		mutex_enter(&sp->lock);
3358 		sp->events &= ~CS_EVENT_STATUS_CHANGE;
3359 
3360 		/*
3361 		 * Go through each client and add any events that we saw to
3362 		 *	the client's event list if the client has that event
3363 		 *	enabled in their event mask.
3364 		 * Remove any events that may be pending for this client if
3365 		 *	the client's event mask says that the client doesn't
3366 		 *	want to see those events anymore. This handles the
3367 		 *	case where the client had an event enabled in it's
3368 		 *	event mask when the event came in but between that
3369 		 *	time and the time we're called here the client
3370 		 *	disabled that event.
3371 		 */
3372 		client = sp->client_list;
3373 
3374 		while (client) {
3375 			/*
3376 			 * Read the PRR (if it exists) and check for any events.
3377 			 * The PRR will only be read if the socket is in IO
3378 			 * mode, if there is a card in the socket, and if there
3379 			 * is a PRR.
3380 			 * We don't have to clear revent before we call the
3381 			 * cs_read_event_status function since it will
3382 			 * clear it before adding any current events.
3383 			 */
3384 		    if (client->flags & CLIENT_CARD_INSERTED) {
3385 			(void) cs_read_event_status(sp, client,
3386 							&revent, NULL, 0);
3387 
3388 			client->events = ((client->events | revent) &
3389 						(client->event_mask |
3390 							client->global_mask));
3391 		    } /* CLIENT_CARD_INSERTED */
3392 		    client = client->next;
3393 		} /* while (client) */
3394 
3395 		mutex_exit(&sp->lock);
3396 		mutex_exit(&sp->cis_lock);
3397 	    } /* if (CS_EVENT_STATUS_CHANGE) */
3398 
3399 	/*
3400 	 * We want to maintain the required event dispatching order as
3401 	 *	specified in the PCMCIA spec, so we cycle through all
3402 	 *	clients on this socket to make sure that they are
3403 	 *	notified in the correct order.
3404 	 */
3405 	    ct = &client_types[0];
3406 	    while (ct) {
3407 		/*
3408 		 * Point to the head of the client list for this socket, and go
3409 		 *	through each client to set up the client events as well
3410 		 *	as call the client's event handler directly if we have
3411 		 *	a high priority event that we need to tell the client
3412 		 *	about.
3413 		 */
3414 		client = sp->client_list;
3415 
3416 		if (ct->order & CLIENT_EVENTS_LIFO) {
3417 		    client_t *clp = NULL;
3418 
3419 		    while (client) {
3420 			clp = client;
3421 			client = client->next;
3422 		    }
3423 		    client = clp;
3424 		}
3425 
3426 		while (client) {
3427 		    if (client->flags & ct->type) {
3428 			    uint32_t bit = 0;
3429 			    event_t event;
3430 
3431 			while (client->events) {
3432 
3433 			    switch (event = CS_BIT_GET(client->events, bit)) {
3434 				/*
3435 				 * Clients always receive registration complete
3436 				 *	events, even if there is no card of
3437 				 *	their type currently in the socket.
3438 				 */
3439 				case CS_EVENT_REGISTRATION_COMPLETE:
3440 				    CLIENT_EVENT_CALLBACK(client, event,
3441 							CS_EVENT_PRI_LOW);
3442 				    break;
3443 				/*
3444 				 * The client only gets a card insertion event
3445 				 *	if there is currently a card in the
3446 				 *	socket that the client can control.
3447 				 *	The nexus determines this. We also
3448 				 *	prevent the client from receiving
3449 				 *	multiple CS_EVENT_CARD_INSERTION
3450 				 *	events without receiving intervening
3451 				 *	CS_EVENT_CARD_REMOVAL events.
3452 				 */
3453 				case CS_EVENT_CARD_INSERTION:
3454 				    if (cs_card_for_client(client)) {
3455 					int send_insertion;
3456 
3457 					mutex_enter(&sp->lock);
3458 					send_insertion = client->flags;
3459 					client->flags |=
3460 						(CLIENT_CARD_INSERTED |
3461 						CLIENT_SENT_INSERTION);
3462 					mutex_exit(&sp->lock);
3463 					if (!(send_insertion &
3464 						    CLIENT_SENT_INSERTION)) {
3465 					    CLIENT_EVENT_CALLBACK(client,
3466 						event, CS_EVENT_PRI_LOW);
3467 					} /* if (!CLIENT_SENT_INSERTION) */
3468 				    }
3469 				    break;
3470 				/*
3471 				 * The CS_EVENT_CARD_REMOVAL_LOWP is a low
3472 				 *	priority CS_EVENT_CARD_REMOVAL event.
3473 				 */
3474 				case CS_EVENT_CARD_REMOVAL_LOWP:
3475 				    mutex_enter(&sp->lock);
3476 				    client->flags &= ~CLIENT_SENT_INSERTION;
3477 				    mutex_exit(&sp->lock);
3478 				    CLIENT_EVENT_CALLBACK(client,
3479 							CS_EVENT_CARD_REMOVAL,
3480 							CS_EVENT_PRI_LOW);
3481 				    break;
3482 				/*
3483 				 * The hardware card removal events are handed
3484 				 *	to the client in cs_event at high
3485 				 *	priority interrupt time; this card
3486 				 *	removal event is a software-generated
3487 				 *	event.
3488 				 */
3489 				case CS_EVENT_CARD_REMOVAL:
3490 				    if (client->flags & CLIENT_CARD_INSERTED) {
3491 					mutex_enter(&sp->lock);
3492 					client->flags &=
3493 						~(CLIENT_CARD_INSERTED |
3494 						CLIENT_SENT_INSERTION);
3495 					mutex_exit(&sp->lock);
3496 					CLIENT_EVENT_CALLBACK(client, event,
3497 							CS_EVENT_PRI_LOW);
3498 				    }
3499 				    break;
3500 				/*
3501 				 * Write protect events require the info field
3502 				 *	of the client's event callback args to
3503 				 *	be zero if the card is not write
3504 				 *	protected and one if it is.
3505 				 */
3506 				case CS_EVENT_WRITE_PROTECT:
3507 				    if (client->flags & CLIENT_CARD_INSERTED) {
3508 					get_ss_status_t gs;
3509 
3510 					mutex_enter(&sp->cis_lock);
3511 					mutex_enter(&sp->lock);
3512 					(void) cs_read_event_status(sp, client,
3513 									NULL,
3514 									&gs, 0);
3515 					if (gs.CardState & SBM_WP) {
3516 					    client->event_callback_args.info =
3517 						(void *)
3518 						CS_EVENT_WRITE_PROTECT_WPON;
3519 					} else {
3520 					    client->event_callback_args.info =
3521 						(void *)
3522 						CS_EVENT_WRITE_PROTECT_WPOFF;
3523 					}
3524 					mutex_exit(&sp->lock);
3525 					mutex_exit(&sp->cis_lock);
3526 					CLIENT_EVENT_CALLBACK(client, event,
3527 							CS_EVENT_PRI_LOW);
3528 				    } /* CLIENT_CARD_INSERTED */
3529 				    break;
3530 				case CS_EVENT_CLIENT_INFO:
3531 				    CLIENT_EVENT_CALLBACK(client, event,
3532 							CS_EVENT_PRI_LOW);
3533 				    break;
3534 				case 0:
3535 				    break;
3536 				default:
3537 				    if (client->flags & CLIENT_CARD_INSERTED) {
3538 					CLIENT_EVENT_CALLBACK(client, event,
3539 							CS_EVENT_PRI_LOW);
3540 				    }
3541 				    break;
3542 			    } /* switch */
3543 			    mutex_enter(&sp->lock);
3544 			    CS_BIT_CLEAR(client->events, bit);
3545 			    mutex_exit(&sp->lock);
3546 			    bit++;
3547 			} /* while (client->events) */
3548 		    } /* if (ct->type) */
3549 		    if (ct->order & CLIENT_EVENTS_LIFO) {
3550 			client = client->prev;
3551 		    } else {
3552 			client = client->next;
3553 		    }
3554 		} /* while (client) */
3555 
3556 		ct = ct->next;
3557 	    } /* while (ct) */
3558 
3559 	/*
3560 	 * Handle CS_EVENT_CARD_REMOVAL events
3561 	 */
3562 	    if (sp->events & CS_EVENT_CARD_REMOVAL) {
3563 		mutex_enter(&sp->lock);
3564 		sp->events &= ~CS_EVENT_CARD_REMOVAL;
3565 		mutex_exit(&sp->lock);
3566 		(void) cs_card_removal(sp);
3567 	    } /* if (CS_EVENT_CARD_REMOVAL) */
3568 
3569 		/*
3570 		 * If someone is waiting for us to complete, signal them now.
3571 		 */
3572 	    if (sp->thread_state & SOCKET_WAIT_SYNC) {
3573 		mutex_enter(&sp->lock);
3574 		sp->thread_state &= ~SOCKET_WAIT_SYNC;
3575 		mutex_exit(&sp->lock);
3576 		cv_broadcast(&sp->caller_cv);
3577 	    } /* SOCKET_WAIT_SYNC */
3578 
3579 	} /* for (;;) */
3580 }
3581 
3582 /*
3583  * cs_card_for_client - checks to see if a card that the client can control
3584  *			is currently inserted in the socket.  Socket Services
3585  *			has to tell us if this is the case.
3586  */
3587 static int
3588 cs_card_for_client(client_t *client)
3589 {
3590 
3591 	/*
3592 	 * If the client has set the CS_EVENT_ALL_CLIENTS it means that they
3593 	 *	want to get all events for all clients, irrespective of
3594 	 *	whether or not there is a card in the socket.  Such clients
3595 	 *	have to be very careful if they touch the card hardware in
3596 	 *	any way to prevent causing problems for other clients on the
3597 	 *	same socket.  This flag will typically only be set by the
3598 	 *	"super-client" or CSI types of clients that wish to get
3599 	 *	information on other clients or cards in the system.
3600 	 * Note that the CS_EVENT_ALL_CLIENTS must be set in either the
3601 	 *	client's global event mask or client event mask.
3602 	 * The client must also have registered as a "super-client" or as a
3603 	 *	CSI client for this socket.
3604 	 */
3605 	if ((client->flags & (CLIENT_SUPER_CLIENT | CLIENT_CSI_CLIENT)) &&
3606 			((client->global_mask | client->event_mask) &
3607 							CS_EVENT_ALL_CLIENTS))
3608 	    return (1);
3609 
3610 	/*
3611 	 * Look for the PCM_DEV_ACTIVE property on this client's dip; if
3612 	 *	it's found, it means that this client can control the card
3613 	 *	that is currently in the socket.  This is a boolean
3614 	 *	property managed by Socket Services.
3615 	 */
3616 	if (ddi_getprop(DDI_DEV_T_ANY, client->dip,    (DDI_PROP_CANSLEEP |
3617 							DDI_PROP_NOTPROM),
3618 							PCM_DEV_ACTIVE, NULL)) {
3619 #ifdef	CS_DEBUG
3620 	    if (cs_debug > 1) {
3621 		cmn_err(CE_CONT, "cs_card_for_client: client handle 0x%x "
3622 					"driver [%s] says %s found\n",
3623 						(int)client->client_handle,
3624 						client->driver_name,
3625 						PCM_DEV_ACTIVE);
3626 	    }
3627 #endif
3628 	    return (1);
3629 	}
3630 
3631 	return (0);
3632 }
3633 
3634 /*
3635  * cs_ss_thread - This is the Socket Services work thread. We fire off
3636  *			any calls to Socket Services here that we want
3637  *			to run on a thread that is seperate from the
3638  *			per-socket event thread.
3639  */
3640 static void
3641 cs_ss_thread(uint32_t sn)
3642 {
3643 	cs_socket_t *sp;
3644 
3645 	if ((sp = cs_get_sp(sn)) == NULL)
3646 	    return;
3647 
3648 	/*
3649 	 * Tell CPR that we've started a new thread.
3650 	 */
3651 	CALLB_CPR_INIT(&sp->cprinfo_ss, &sp->ss_thread_lock,
3652 					callb_generic_cpr, "cs_ss_thread");
3653 
3654 	mutex_enter(&sp->ss_thread_lock);
3655 
3656 	for (;;) {
3657 
3658 	    CALLB_CPR_SAFE_BEGIN(&sp->cprinfo_ss);
3659 	    cv_wait(&sp->ss_thread_cv, &sp->ss_thread_lock);
3660 	    CALLB_CPR_SAFE_END(&sp->cprinfo_ss, &sp->ss_thread_lock);
3661 
3662 		/*
3663 		 * Check to see if there are any special thread operations
3664 		 * that we are being asked to perform.
3665 		 */
3666 	    if (sp->ss_thread_state & SOCKET_THREAD_EXIT) {
3667 #ifdef	CS_DEBUG
3668 		if (cs_debug > 1) {
3669 		    cmn_err(CE_CONT, "cs_ss_thread: socket %d "
3670 					"SOCKET_THREAD_EXIT\n",
3671 						sp->socket_num);
3672 		}
3673 #endif
3674 		CALLB_CPR_EXIT(&sp->cprinfo_ss);
3675 		cv_broadcast(&sp->ss_caller_cv);	/* wake up cs_deinit */
3676 		mutex_exit(&sp->ss_thread_lock);
3677 		return;
3678 	    } /* if (SOCKET_THREAD_EXIT) */
3679 
3680 #ifdef	CS_DEBUG
3681 	    if (cs_debug > 1) {
3682 		cmn_err(CE_CONT, "cs_ss_thread: socket %d "
3683 					"ss_thread_state = 0x%x\n",
3684 						(int)sp->socket_num,
3685 						(int)sp->ss_thread_state);
3686 	    }
3687 #endif
3688 
3689 		/*
3690 		 * Call SocketServices(CSCISInit) to have SS parse the
3691 		 *	CIS and load/attach any client drivers necessary.
3692 		 */
3693 	    if (sp->ss_thread_state & SOCKET_THREAD_CSCISInit) {
3694 
3695 		sp->ss_thread_state &= ~SOCKET_THREAD_CSCISInit;
3696 
3697 		if (!(sp->flags & SOCKET_CARD_INSERTED)) {
3698 		    cmn_err(CE_CONT, "cs_ss_thread %d "
3699 					"card NOT inserted\n",
3700 					sp->socket_num);
3701 		}
3702 
3703 #ifdef	CS_DEBUG
3704 		if (cs_debug > 1) {
3705 		    cmn_err(CE_CONT, "cs_ss_thread: socket %d calling "
3706 						"CSCISInit\n", sp->socket_num);
3707 		}
3708 #endif
3709 
3710 		/*
3711 		 * Tell SS that we have a complete CIS and that it can now
3712 		 *	be parsed.
3713 		 * Note that in some cases the client driver may block in
3714 		 *	their attach routine, causing this call to block until
3715 		 *	the client completes their attach.
3716 		 */
3717 		SocketServices(CSCISInit, sp->socket_num);
3718 
3719 		/*
3720 		 * Set the CS_EVENT_SS_UPDATED event for this socket so that the
3721 		 *	event thread can continue any card insertion processing
3722 		 *	that it has to do.
3723 		 */
3724 		mutex_enter(&sp->lock);
3725 		sp->events |= CS_EVENT_SS_UPDATED;
3726 		mutex_exit(&sp->lock);
3727 
3728 		/*
3729 		 * Wake up this socket's event thread so that clients can
3730 		 *	continue any card insertion or attach processing
3731 		 *	that they need to do.
3732 		 */
3733 		cv_broadcast(&sp->thread_cv);
3734 	    } /* if ST_CSCISInit */
3735 
3736 	} /* for (;;) */
3737 }
3738 
3739 /*
3740  * cs_request_socket_mask - set the client's event mask as well as causes
3741  *				any events pending from RegisterClient to
3742  *				be scheduled to be sent to the client
3743  */
3744 static int
3745 cs_request_socket_mask(client_handle_t client_handle,
3746 					request_socket_mask_t *se)
3747 {
3748 	cs_socket_t *sp;
3749 	client_t *client;
3750 	int error;
3751 	int client_lock_acquired;
3752 
3753 	/*
3754 	 * Check to see if this is the Socket Services client handle; if it
3755 	 *	is, we don't do anything except for return success.
3756 	 */
3757 	if (CLIENT_HANDLE_IS_SS(client_handle))
3758 	    return (CS_SUCCESS);
3759 
3760 	/*
3761 	 * Get a pointer to this client's socket structure.
3762 	 */
3763 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
3764 	    return (CS_BAD_SOCKET);
3765 
3766 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
3767 
3768 	/*
3769 	 *  Make sure that this is a valid client handle.
3770 	 */
3771 	if (!(client = cs_find_client(client_handle, &error))) {
3772 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3773 	    return (error);
3774 	}
3775 
3776 	mutex_enter(&sp->lock);
3777 
3778 	/*
3779 	 * If this client has already done a RequestSocketMask without
3780 	 *	a corresponding ReleaseSocketMask, then return an error.
3781 	 */
3782 	if (client->flags & REQ_SOCKET_MASK_DONE) {
3783 	    mutex_exit(&sp->lock);
3784 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3785 	    return (CS_IN_USE);
3786 	}
3787 
3788 	/*
3789 	 * Set up the event mask information; we copy this directly from
3790 	 *	the client; since we are the only source of events, any
3791 	 *	bogus bits that the client puts in here won't matter
3792 	 *	because we'll never look at them.
3793 	 */
3794 	client->event_mask = se->EventMask;
3795 
3796 	/*
3797 	 * If RegisterClient left us some events to process, set these
3798 	 *	events up here.
3799 	 */
3800 	if (client->pending_events) {
3801 	    client->events |= client->pending_events;
3802 	    client->pending_events = 0;
3803 #ifdef	CS_DEBUG
3804 	    if (cs_debug > 1) {
3805 		cmn_err(CE_CONT, "cs_request_socket_mask: client_handle = 0x%x "
3806 				"driver_name = [%s] events = 0x%x\n",
3807 					(int)client->client_handle,
3808 					client->driver_name,
3809 					(int)client->events);
3810 	    }
3811 #endif
3812 	}
3813 
3814 	client->flags |= REQ_SOCKET_MASK_DONE;
3815 
3816 	/*
3817 	 * Merge all the clients' event masks and set the socket
3818 	 *	to generate the appropriate events.
3819 	 */
3820 	(void) cs_set_socket_event_mask(sp, cs_merge_event_masks(sp, client));
3821 
3822 	mutex_exit(&sp->lock);
3823 
3824 	/*
3825 	 * Wakeup the event thread if there are any client events to process.
3826 	 */
3827 	if (client->events) {
3828 	    cv_broadcast(&sp->thread_cv);
3829 #ifdef	CS_DEBUG
3830 	    if (cs_debug > 1) {
3831 		cmn_err(CE_CONT, "cs_request_socket_mask: did cv_broadcast for "
3832 				"client_handle = 0x%x "
3833 				"driver_name = [%s] events = 0x%x\n",
3834 					(int)client->client_handle,
3835 					client->driver_name,
3836 					(int)client->events);
3837 	    }
3838 #endif
3839 
3840 	}
3841 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3842 
3843 	return (CS_SUCCESS);
3844 }
3845 
3846 /*
3847  * cs_release_socket_mask - clear the client's event mask
3848  *
3849  * Once this function returns, the client is guaranteed
3850  *	not to get any more event callbacks.
3851  */
3852 /*ARGSUSED*/
3853 static int
3854 cs_release_socket_mask(client_handle_t client_handle,
3855 					release_socket_mask_t *rsm)
3856 {
3857 	cs_socket_t *sp;
3858 	client_t *client;
3859 	int error;
3860 	int client_lock_acquired;
3861 
3862 	/*
3863 	 * Check to see if this is the Socket Services client handle; if it
3864 	 *	is, we don't do anything except for return success.
3865 	 */
3866 	if (CLIENT_HANDLE_IS_SS(client_handle))
3867 	    return (CS_SUCCESS);
3868 
3869 	/*
3870 	 * Get a pointer to this client's socket structure.
3871 	 */
3872 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
3873 	    return (CS_BAD_SOCKET);
3874 
3875 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
3876 
3877 	/*
3878 	 *  Make sure that this is a valid client handle.
3879 	 */
3880 	if (!(client = cs_find_client(client_handle, &error))) {
3881 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3882 	    return (error);
3883 	}
3884 
3885 	mutex_enter(&sp->lock);
3886 
3887 	/*
3888 	 * If this client has already done a RequestSocketMask without
3889 	 *	a corresponding ReleaseSocketMask, then return an error.
3890 	 */
3891 	if (!(client->flags & REQ_SOCKET_MASK_DONE)) {
3892 	    mutex_exit(&sp->lock);
3893 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3894 	    return (CS_BAD_SOCKET);
3895 	}
3896 
3897 	/*
3898 	 * Clear both the client event mask and the global event mask.
3899 	 *	We clear both since the semantics of this function are
3900 	 *	that once it returns, the client will not be called at
3901 	 *	it's event handler for any events until RequestSocketMask
3902 	 *	is called again.
3903 	 */
3904 	client->event_mask = 0;
3905 	client->global_mask = 0;
3906 	client->flags &= ~REQ_SOCKET_MASK_DONE;
3907 
3908 	/*
3909 	 * Merge all the clients' event masks and set the socket
3910 	 *	to generate the appropriate events.
3911 	 */
3912 	(void) cs_set_socket_event_mask(sp, cs_merge_event_masks(sp, client));
3913 
3914 	mutex_exit(&sp->lock);
3915 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3916 
3917 	return (CS_SUCCESS);
3918 }
3919 
3920 /*
3921  * cs_get_event_mask - return the event mask for this client
3922  */
3923 static int
3924 cs_get_event_mask(client_handle_t client_handle, sockevent_t *se)
3925 {
3926 	cs_socket_t *sp;
3927 	client_t *client;
3928 	int error;
3929 	int client_lock_acquired;
3930 
3931 	/*
3932 	 * Check to see if this is the Socket Services client handle; if it
3933 	 *	is, we don't do anything except for return success.
3934 	 */
3935 	if (CLIENT_HANDLE_IS_SS(client_handle))
3936 	    return (CS_SUCCESS);
3937 
3938 	/*
3939 	 * Get a pointer to this client's socket structure.
3940 	 */
3941 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
3942 	    return (CS_BAD_SOCKET);
3943 
3944 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
3945 
3946 	/*
3947 	 *  Make sure that this is a valid client handle.
3948 	 */
3949 	if (!(client = cs_find_client(client_handle, &error))) {
3950 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3951 	    return (error);
3952 	}
3953 
3954 	mutex_enter(&sp->lock);
3955 
3956 #ifdef	XXX
3957 	/*
3958 	 * If there's no card in the socket or the card in the socket is not
3959 	 *	for this client, then return an error.
3960 	 * XXX - how can a client get their event masks if their card
3961 	 *	goes away?
3962 	 */
3963 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
3964 	    mutex_exit(&sp->lock);
3965 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3966 	    return (CS_NO_CARD);
3967 	}
3968 #endif
3969 
3970 	/*
3971 	 * We are only allowed to get the client event mask if a
3972 	 *	RequestSocketMask has been called previously.  We
3973 	 *	are allowed to get the global event mask at any
3974 	 *	time.
3975 	 * The global event mask is initially set by the client
3976 	 *	in the call to RegisterClient.  The client event
3977 	 *	mask is set by the client in calls to SetEventMask
3978 	 *	and RequestSocketMask and gotten in calls to
3979 	 *	GetEventMask.
3980 	 */
3981 	if (se->Attributes & CONF_EVENT_MASK_CLIENT) {
3982 	    if (!(client->flags & REQ_SOCKET_MASK_DONE)) {
3983 		mutex_exit(&sp->lock);
3984 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3985 		return (CS_BAD_SOCKET);
3986 	    }
3987 	    se->EventMask = client->event_mask;
3988 	} else {
3989 	    se->EventMask = client->global_mask;
3990 	}
3991 
3992 	mutex_exit(&sp->lock);
3993 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
3994 
3995 	return (CS_SUCCESS);
3996 }
3997 
3998 /*
3999  * cs_set_event_mask - set the event mask for this client
4000  */
4001 static int
4002 cs_set_event_mask(client_handle_t client_handle, sockevent_t *se)
4003 {
4004 	cs_socket_t *sp;
4005 	client_t *client;
4006 	int error;
4007 	int client_lock_acquired;
4008 
4009 	/*
4010 	 * Check to see if this is the Socket Services client handle; if it
4011 	 *	is, we don't do anything except for return success.
4012 	 */
4013 	if (CLIENT_HANDLE_IS_SS(client_handle))
4014 	    return (CS_SUCCESS);
4015 
4016 	/*
4017 	 * Get a pointer to this client's socket structure.
4018 	 */
4019 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
4020 	    return (CS_BAD_SOCKET);
4021 
4022 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
4023 
4024 	/*
4025 	 *  Make sure that this is a valid client handle.
4026 	 */
4027 	if (!(client = cs_find_client(client_handle, &error))) {
4028 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4029 	    return (error);
4030 	}
4031 
4032 	mutex_enter(&sp->lock);
4033 
4034 #ifdef	XXX
4035 	/*
4036 	 * If there's no card in the socket or the card in the socket is not
4037 	 *	for this client, then return an error.
4038 	 */
4039 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
4040 	    mutex_exit(&sp->lock);
4041 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4042 	    return (CS_NO_CARD);
4043 	}
4044 #endif
4045 
4046 	/*
4047 	 * We are only allowed to set the client event mask if a
4048 	 *	RequestSocketMask has been called previously.  We
4049 	 *	are allowed to set the global event mask at any
4050 	 *	time.
4051 	 * The global event mask is initially set by the client
4052 	 *	in the call to RegisterClient.  The client event
4053 	 *	mask is set by the client in calls to SetEventMask
4054 	 *	and RequestSocketMask and gotten in calls to
4055 	 *	GetEventMask.
4056 	 */
4057 	if (se->Attributes & CONF_EVENT_MASK_CLIENT) {
4058 	    if (!(client->flags & REQ_SOCKET_MASK_DONE)) {
4059 		mutex_exit(&sp->lock);
4060 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4061 		return (CS_BAD_SOCKET);
4062 	    }
4063 	    client->event_mask = se->EventMask;
4064 	} else {
4065 	    client->global_mask = se->EventMask;
4066 	}
4067 
4068 	/*
4069 	 * Merge all the clients' event masks and set the socket
4070 	 *	to generate the appropriate events.
4071 	 */
4072 	(void) cs_set_socket_event_mask(sp, cs_merge_event_masks(sp, client));
4073 
4074 	mutex_exit(&sp->lock);
4075 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4076 
4077 	return (CS_SUCCESS);
4078 }
4079 
4080 /*
4081  * cs_read_event_status - handles PRR events and returns card status
4082  *
4083  *	calling: *sp - socket struct point
4084  *		 *client - client to check events on
4085  *		 *revent - pointer to event mask to update; if NULL, will
4086  *				not be updated, if non-NULL, will be updated
4087  *				with CS-format events; it is NOT necessary
4088  *				to clear this value before calling this
4089  *				function
4090  *		 *gs - pointer to a get_ss_status_t used for the SS GetStatus
4091  *				call; it is not necessary to initialize any
4092  *				members in this structure; set to NULL if
4093  *				not used
4094  *		flags - if CS_RES_IGNORE_NO_CARD is set, the check for a
4095  *				card present will not be done
4096  *
4097  *	returns: CS_SUCCESS
4098  *		 CS_NO_CARD - if no card is in the socket and the flags arg
4099  *				is not set to CS_RES_IGNORE_NO_CARD
4100  *		 CS_BAD_SOCKET - if the SS_GetStatus function returned an
4101  *					error
4102  *
4103  *	Note that if the client that configured this socket has told us that
4104  *		the READY pin in the PRR isn't valid and the socket is in IO
4105  *		mode, we always return that the card is READY.
4106  *
4107  *	Note that if gs is not NULL, the current card state will be returned
4108  *		in the gs->CardState member; this will always reflect the
4109  *		current card state and the state will come from both the
4110  *		SS_GetStatus call and the PRR, whichever is appropriate for
4111  *		the mode that the socket is currently in.
4112  */
4113 static int
4114 cs_read_event_status(cs_socket_t *sp, client_t *client, event_t *revent,
4115 						get_ss_status_t *gs, int flags)
4116 {
4117 	cfg_regs_t prrd = 0;
4118 
4119 	/*
4120 	 * SOCKET_IS_IO will only be set if a RequestConfiguration
4121 	 *	has been done by at least one client on this socket.
4122 	 * If there isn't a card in the socket or the caller wants to ignore
4123 	 *	whether the card is in the socket or not, get the current
4124 	 *	card status.
4125 	 */
4126 	if ((sp->flags & SOCKET_CARD_INSERTED) ||
4127 					(flags & CS_RES_IGNORE_NO_CARD)) {
4128 	    if (sp->flags & SOCKET_IS_IO) {
4129 		if (client->present & CONFIG_PINREPL_REG_PRESENT) {
4130 		    acc_handle_t cis_handle;
4131 		    uint32_t newoffset = client->config_regs_offset;
4132 
4133 			/*
4134 			 * Get a handle to the CIS window
4135 			 */
4136 		    if (cs_init_cis_window(sp, &newoffset, &cis_handle,
4137 					CISTPLF_AM_SPACE) != CS_SUCCESS) {
4138 			cmn_err(CE_CONT, "cs_read_event_status: socket %d "
4139 					    "can't init CIS window\n",
4140 							sp->socket_num);
4141 			return (CS_GENERAL_FAILURE);
4142 		    } /* cs_init_cis_window */
4143 
4144 		    prrd = csx_Get8(cis_handle, client->config_regs.prr_p);
4145 		    prrd &= client->pin;
4146 
4147 #ifdef	CS_DEBUG
4148 		    if (cs_debug > 1) {
4149 			cmn_err(CE_CONT, "cs_read_event_status: "
4150 						"prrd 0x%x client->pin 0x%x\n",
4151 								(int)prrd,
4152 								client->pin);
4153 			cmn_err(CE_CONT, "PRR(1) = [%s%s%s%s%s%s%s%s]\n",
4154 						((prrd & PRR_WP_STATUS)?
4155 							"PRR_WP_STATUS ":""),
4156 						((prrd & PRR_READY_STATUS)?
4157 							"PRR_READY_STATUS ":""),
4158 						((prrd & PRR_BVD2_STATUS)?
4159 							"PRR_BVD2_STATUS ":""),
4160 						((prrd & PRR_BVD1_STATUS)?
4161 							"PRR_BVD1_STATUS ":""),
4162 						((prrd & PRR_WP_EVENT)?
4163 							"PRR_WP_EVENT ":""),
4164 						((prrd & PRR_READY_EVENT)?
4165 							"PRR_READY_EVENT ":""),
4166 						((prrd & PRR_BVD2_EVENT)?
4167 							"PRR_BVD2_EVENT ":""),
4168 						((prrd & PRR_BVD1_EVENT)?
4169 							"PRR_BVD1_EVENT ":""));
4170 		    }
4171 #endif
4172 
4173 			/*
4174 			 * The caller wants the event changes sent back and
4175 			 * the PRR event change bits cleared.
4176 			 */
4177 		    if (revent) {
4178 			get_socket_t get_socket;
4179 			set_socket_t set_socket;
4180 
4181 			/*
4182 			 * Bug ID: 1193636 - Card Services sends bogus
4183 			 *	events on CS_EVENT_STATUS_CHANGE events
4184 			 * Clear this before we OR-in any values.
4185 			 */
4186 			*revent = 0;
4187 
4188 			PRR_EVENT(prrd, PRR_WP_EVENT, PRR_WP_STATUS,
4189 					CS_EVENT_WRITE_PROTECT, *revent);
4190 
4191 			PRR_EVENT(prrd, PRR_READY_EVENT, PRR_READY_STATUS,
4192 					CS_EVENT_CARD_READY, *revent);
4193 
4194 			PRR_EVENT(prrd, PRR_BVD2_EVENT, PRR_BVD2_STATUS,
4195 					CS_EVENT_BATTERY_LOW, *revent);
4196 
4197 			PRR_EVENT(prrd, PRR_BVD1_EVENT, PRR_BVD1_STATUS,
4198 					CS_EVENT_BATTERY_DEAD, *revent);
4199 
4200 
4201 #ifdef	CS_DEBUG
4202 			if (cs_debug > 1) {
4203 
4204 			    cmn_err(CE_CONT, "PRR() = [%s%s%s%s%s%s%s%s]\n",
4205 						((prrd & PRR_WP_STATUS)?
4206 							"PRR_WP_STATUS ":""),
4207 						((prrd & PRR_READY_STATUS)?
4208 							"PRR_READY_STATUS ":""),
4209 						((prrd & PRR_BVD2_STATUS)?
4210 							"PRR_BVD2_STATUS ":""),
4211 						((prrd & PRR_BVD1_STATUS)?
4212 							"PRR_BVD1_STATUS ":""),
4213 						((prrd & PRR_WP_EVENT)?
4214 							"PRR_WP_EVENT ":""),
4215 						((prrd & PRR_READY_EVENT)?
4216 							"PRR_READY_EVENT ":""),
4217 						((prrd & PRR_BVD2_EVENT)?
4218 							"PRR_BVD2_EVENT ":""),
4219 						((prrd & PRR_BVD1_EVENT)?
4220 							"PRR_BVD1_EVENT ":""));
4221 			}
4222 #endif
4223 
4224 			if (prrd)
4225 			    csx_Put8(cis_handle, client->config_regs.prr_p,
4226 				prrd);
4227 
4228 			/*
4229 			 * We now have to reenable the status change interrupts
4230 			 *	if there are any valid bits in the PRR. Since
4231 			 *	the BVD1 signal becomes the STATUS_CHANGE
4232 			 *	signal when the socket is in IO mode, we just
4233 			 *	have to set the SBM_BVD1 enable bit in the
4234 			 *	event mask.
4235 			 */
4236 			if (client->pin) {
4237 			    get_socket.socket = sp->socket_num;
4238 			    SocketServices(SS_GetSocket, &get_socket);
4239 			    set_socket.socket = sp->socket_num;
4240 			    set_socket.SCIntMask =
4241 					get_socket.SCIntMask | SBM_BVD1;
4242 			    set_socket.VccLevel = get_socket.VccLevel;
4243 			    set_socket.Vpp1Level = get_socket.Vpp1Level;
4244 			    set_socket.Vpp2Level = get_socket.Vpp2Level;
4245 			    set_socket.IREQRouting = get_socket.IRQRouting;
4246 			    set_socket.IFType = get_socket.IFType;
4247 			    set_socket.CtlInd = get_socket.CtlInd;
4248 			    set_socket.State = get_socket.state;
4249 			    SocketServices(SS_SetSocket, &set_socket);
4250 			} /* if (client->pin) */
4251 		    } /* if (revent) */
4252 
4253 		} /* if (CONFIG_PINREPL_REG_PRESENT) */
4254 	    } /* if (SOCKET_IS_IO) */
4255 
4256 	/*
4257 	 * The caller wants the current card state; we just read
4258 	 *	it and return a copy of it but do not clear any of
4259 	 *	the event changed bits (if we're reading the PRR).
4260 	 */
4261 	    if (gs) {
4262 		gs->socket = sp->socket_num;
4263 		gs->CardState = 0;
4264 		if (SocketServices(SS_GetStatus, gs) != SUCCESS)
4265 		    return (CS_BAD_SOCKET);
4266 		if (sp->flags & SOCKET_IS_IO) {
4267 		/*
4268 		 * If the socket is in IO mode, then clear the
4269 		 *	gs->CardState bits that are now in the PRR
4270 		 */
4271 		    gs->CardState &= ~(SBM_WP | SBM_BVD1 |
4272 						SBM_BVD2 | SBM_RDYBSY);
4273 
4274 		/*
4275 		 * Convert PRR status to SS_GetStatus status
4276 		 */
4277 		    if (prrd & PRR_WP_STATUS)
4278 			gs->CardState |= SBM_WP;
4279 		    if (prrd & PRR_BVD2_STATUS)
4280 			gs->CardState |= SBM_BVD2;
4281 		    if (prrd & PRR_BVD1_STATUS)
4282 			gs->CardState |= SBM_BVD1;
4283 
4284 		/*
4285 		 * If the client has indicated that there is no
4286 		 *	PRR or that the READY bit in the PRR isn't
4287 		 *	valid, then we simulate the READY bit by
4288 		 *	always returning READY.
4289 		 */
4290 		    if (!(client->present & CONFIG_PINREPL_REG_PRESENT) ||
4291 			((client->present & CONFIG_PINREPL_REG_PRESENT) &&
4292 			!((client->pin &
4293 			    (PRR_READY_STATUS | PRR_READY_EVENT)) ==
4294 				(PRR_READY_STATUS | PRR_READY_EVENT))) ||
4295 				(prrd & PRR_READY_STATUS))
4296 			gs->CardState |= SBM_RDYBSY;
4297 
4298 #ifdef	CS_DEBUG
4299 			if (cs_debug > 1) {
4300 			    cmn_err(CE_CONT, "cs_read_event_status: prrd 0x%x "
4301 				"client->pin 0x%x "
4302 				"gs->CardState 0x%x\n",
4303 				prrd, client->pin, gs->CardState);
4304 			}
4305 #endif
4306 
4307 		} /* if (SOCKET_IS_IO) */
4308 	    } /* if (gs) */
4309 	    return (CS_SUCCESS);
4310 	} /* if (SOCKET_CARD_INSERTED) */
4311 
4312 	return (CS_NO_CARD);
4313 }
4314 
4315 /*
4316  * cs_get_status - gets live card status and latched card status changes
4317  *			supports the GetStatus CS call
4318  *
4319  *	returns: CS_SUCCESS
4320  *		 CS_BAD_HANDLE if the passed client handle is invalid
4321  *
4322  *	Note: This function resets the latched status values maintained
4323  *		by Socket Services
4324  */
4325 static int
4326 cs_get_status(client_handle_t client_handle, get_status_t *gs)
4327 {
4328 	cs_socket_t *sp;
4329 	client_t *client;
4330 	get_ss_status_t get_ss_status;
4331 	get_socket_t get_socket;
4332 	set_socket_t set_socket;
4333 	int error;
4334 	int client_lock_acquired;
4335 
4336 	/*
4337 	 * Check to see if this is the Socket Services client handle; if it
4338 	 *	is, we don't do anything except for return success.
4339 	 */
4340 	if (CLIENT_HANDLE_IS_SS(client_handle))
4341 	    return (CS_SUCCESS);
4342 
4343 	/*
4344 	 * Get a pointer to this client's socket structure.
4345 	 */
4346 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
4347 	    return (CS_BAD_SOCKET);
4348 
4349 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
4350 
4351 	/*
4352 	 *  Make sure that this is a valid client handle.
4353 	 */
4354 	if (!(client = cs_find_client(client_handle, &error))) {
4355 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4356 	    return (error);
4357 	}
4358 
4359 	/*
4360 	 * Get the current card status as well as the latched card
4361 	 *	state.  Set the CS_RES_IGNORE_NO_CARD so that even
4362 	 *	if there is no card in the socket we'll still get
4363 	 *	a valid status.
4364 	 * Note that it is not necessary to initialize any values
4365 	 *	in the get_ss_status structure.
4366 	 */
4367 	mutex_enter(&sp->cis_lock);
4368 	if ((error = cs_read_event_status(sp, client, NULL, &get_ss_status,
4369 					CS_RES_IGNORE_NO_CARD)) != CS_SUCCESS) {
4370 	    mutex_exit(&sp->cis_lock);
4371 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4372 	    return (error);
4373 	}
4374 
4375 	mutex_exit(&sp->cis_lock);
4376 
4377 	gs->raw_CardState = cs_sbm2cse(get_ss_status.CardState);
4378 
4379 	/*
4380 	 * Assign the "live" card state to the "real" card state. If there's
4381 	 *	no card in the socket or the card in the socket is not
4382 	 *	for this client, then we lie and tell the caller that the
4383 	 *	card is not inserted.
4384 	 */
4385 	gs->CardState = gs->raw_CardState;
4386 	if (!(client->flags & CLIENT_CARD_INSERTED))
4387 	    gs->CardState &= ~CS_EVENT_CARD_INSERTION;
4388 
4389 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4390 
4391 	get_socket.socket = sp->socket_num;
4392 	if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS)
4393 	    return (CS_BAD_SOCKET);
4394 
4395 	gs->SocketState = cs_sbm2cse(get_socket.state);
4396 
4397 	set_socket.socket = sp->socket_num;
4398 	set_socket.SCIntMask = get_socket.SCIntMask;
4399 	set_socket.VccLevel = get_socket.VccLevel;
4400 	set_socket.Vpp1Level = get_socket.Vpp1Level;
4401 	set_socket.Vpp2Level = get_socket.Vpp2Level;
4402 	set_socket.IREQRouting = get_socket.IRQRouting;
4403 	set_socket.IFType = get_socket.IFType;
4404 	set_socket.CtlInd = get_socket.CtlInd;
4405 	/* XXX (is ~0 correct here?) reset latched values */
4406 	set_socket.State = (unsigned)~0;
4407 
4408 	if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS)
4409 	    return (CS_BAD_SOCKET);
4410 
4411 	return (CS_SUCCESS);
4412 }
4413 
4414 /*
4415  * cs_cse2sbm - converts a CS event mask to an SS (SBM_XXX) event mask
4416  */
4417 static event_t
4418 cs_cse2sbm(event_t event_mask)
4419 {
4420 	event_t sbm_event = 0;
4421 
4422 	/*
4423 	 * XXX - we need to handle PM_CHANGE and RESET here as well
4424 	 */
4425 	if (event_mask & CS_EVENT_WRITE_PROTECT)
4426 	    sbm_event |= SBM_WP;
4427 	if (event_mask & CS_EVENT_BATTERY_DEAD)
4428 	    sbm_event |= SBM_BVD1;
4429 	if (event_mask & CS_EVENT_BATTERY_LOW)
4430 	    sbm_event |= SBM_BVD2;
4431 	if (event_mask & CS_EVENT_CARD_READY)
4432 	    sbm_event |= SBM_RDYBSY;
4433 	if (event_mask & CS_EVENT_CARD_LOCK)
4434 	    sbm_event |= SBM_LOCKED;
4435 	if (event_mask & CS_EVENT_EJECTION_REQUEST)
4436 	    sbm_event |= SBM_EJECT;
4437 	if (event_mask & CS_EVENT_INSERTION_REQUEST)
4438 	    sbm_event |= SBM_INSERT;
4439 	if (event_mask & (CS_EVENT_CARD_INSERTION | CS_EVENT_CARD_REMOVAL))
4440 	    sbm_event |= SBM_CD;
4441 
4442 	return (sbm_event);
4443 }
4444 
4445 /*
4446  * cs_sbm2cse - converts SBM_xxx state to CS event bits
4447  *
4448  * This function should never set any of the following bits:
4449  *
4450  *		CS_EVENT_MTD_REQUEST
4451  *		CS_EVENT_CLIENT_INFO
4452  *		CS_EVENT_TIMER_EXPIRED
4453  *		CS_EVENT_CARD_REMOVAL
4454  *		CS_EVENT_CARD_REMOVAL_LOWP
4455  *		CS_EVENT_ALL_CLIENTS
4456  *		CS_EVENT_READY_TIMEOUT
4457  *
4458  *	These bits are defined in the CS_STATUS_XXX series and are
4459  *	used by GetStatus.
4460  */
4461 static uint32_t
4462 cs_sbm2cse(uint32_t state)
4463 {
4464 	uint32_t rstate = 0;
4465 
4466 	/*
4467 	 * XXX - we need to handle PM_CHANGE and RESET here as well
4468 	 */
4469 	if (state & SBM_WP)
4470 	    rstate |= CS_EVENT_WRITE_PROTECT;
4471 	if (state & SBM_BVD1)
4472 	    rstate |= CS_EVENT_BATTERY_DEAD;
4473 	if (state & SBM_BVD2)
4474 	    rstate |= CS_EVENT_BATTERY_LOW;
4475 	if (state & SBM_RDYBSY)
4476 	    rstate |= CS_EVENT_CARD_READY;
4477 	if (state & SBM_LOCKED)
4478 	    rstate |= CS_EVENT_CARD_LOCK;
4479 	if (state & SBM_EJECT)
4480 	    rstate |= CS_EVENT_EJECTION_REQUEST;
4481 	if (state & SBM_INSERT)
4482 	    rstate |= CS_EVENT_INSERTION_REQUEST;
4483 	if (state & SBM_CD)
4484 	    rstate |= CS_EVENT_CARD_INSERTION;
4485 
4486 	return (rstate);
4487 }
4488 
4489 /*
4490  * cs_merge_event_masks - merge the CS global socket event mask with the
4491  *				passed client's event masks
4492  */
4493 static unsigned
4494 cs_merge_event_masks(cs_socket_t *sp, client_t *client)
4495 {
4496 	unsigned SCIntMask;
4497 	uint32_t event_mask;
4498 
4499 	/*
4500 	 * We always want to see card detect and status change events.
4501 	 */
4502 	SCIntMask = SBM_CD;
4503 
4504 	event_mask = client->event_mask | client->global_mask |
4505 							sp->event_mask;
4506 
4507 	if (!(sp->flags & SOCKET_IS_IO)) {
4508 	    SCIntMask |= cs_cse2sbm(event_mask);
4509 	} else {
4510 		/*
4511 		 * If the socket is in IO mode and there is a PRR present,
4512 		 *	then we may need to enable PCE_CARD_STATUS_CHANGE
4513 		 *	events.
4514 		 */
4515 	    if (client->present & CONFIG_PINREPL_REG_PRESENT) {
4516 
4517 		SCIntMask |= (cs_cse2sbm(event_mask) &
4518 				~(SBM_WP | SBM_BVD1 | SBM_BVD2 | SBM_RDYBSY));
4519 
4520 		if ((client->pin & (PRR_WP_STATUS | PRR_WP_EVENT)) ==
4521 					(PRR_WP_STATUS | PRR_WP_EVENT))
4522 		    if (event_mask & CS_EVENT_WRITE_PROTECT)
4523 			SCIntMask |= SBM_BVD1;
4524 
4525 		if ((client->pin & (PRR_READY_STATUS | PRR_READY_EVENT)) ==
4526 					(PRR_READY_STATUS | PRR_READY_EVENT))
4527 		    if (event_mask & CS_EVENT_CARD_READY)
4528 			    SCIntMask |= SBM_BVD1;
4529 
4530 		if ((client->pin & (PRR_BVD2_STATUS | PRR_BVD2_EVENT)) ==
4531 					(PRR_BVD2_STATUS | PRR_BVD2_EVENT))
4532 		    if (event_mask & CS_EVENT_BATTERY_LOW)
4533 			    SCIntMask |= SBM_BVD1;
4534 
4535 		if ((client->pin & (PRR_BVD1_STATUS | PRR_BVD1_EVENT)) ==
4536 					(PRR_BVD1_STATUS | PRR_BVD1_EVENT))
4537 		    if (event_mask & CS_EVENT_BATTERY_DEAD)
4538 			    SCIntMask |= SBM_BVD1;
4539 
4540 	    } /* if (CONFIG_PINREPL_REG_PRESENT) */
4541 	} /* if (!SOCKET_IS_IO) */
4542 
4543 	return (SCIntMask);
4544 }
4545 
4546 /*
4547  * cs_set_socket_event_mask - set the event mask for the socket
4548  */
4549 static int
4550 cs_set_socket_event_mask(cs_socket_t *sp, unsigned event_mask)
4551 {
4552 	get_socket_t get_socket;
4553 	set_socket_t set_socket;
4554 
4555 	get_socket.socket = sp->socket_num;
4556 	if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS)
4557 	    return (CS_BAD_SOCKET);
4558 
4559 	set_socket.socket = sp->socket_num;
4560 	set_socket.SCIntMask = event_mask;
4561 	set_socket.VccLevel = get_socket.VccLevel;
4562 	set_socket.Vpp1Level = get_socket.Vpp1Level;
4563 	set_socket.Vpp2Level = get_socket.Vpp2Level;
4564 	set_socket.IREQRouting = get_socket.IRQRouting;
4565 	set_socket.IFType = get_socket.IFType;
4566 	set_socket.CtlInd = get_socket.CtlInd;
4567 	/* XXX (is ~0 correct here?) reset latched values */
4568 	set_socket.State = (unsigned)~0;
4569 
4570 	if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS)
4571 	    return (CS_BAD_SOCKET);
4572 
4573 	return (CS_SUCCESS);
4574 }
4575 
4576 /*
4577  * ==== MTD handling section ====
4578  */
4579 static int
4580 cs_deregister_mtd(client_handle_t client_handle)
4581 {
4582 
4583 	cmn_err(CE_CONT, "cs_deregister_mtd: client_handle 0x%x\n",
4584 							(int)client_handle);
4585 
4586 	return (CS_SUCCESS);
4587 }
4588 
4589 /*
4590  * ==== memory window handling section ====
4591  */
4592 
4593 /*
4594  * cs_request_window  - searches through window list for the socket to find a
4595  *			memory window that matches the requested criteria;
4596  *			this is RequestWindow
4597  *
4598  * calling:  cs_request_window(client_handle_t, *window_handle_t, win_req_t *)
4599  *
4600  *	On sucessful return, the window_handle_t * pointed to will
4601  *		contain a valid window handle for this window.
4602  *
4603  *	returns: CS_SUCCESS - if window found
4604  *		 CS_OUT_OF_RESOURCE - if no windows match requirements
4605  *		 CS_BAD_HANDLE - client handle is invalid
4606  *		 CS_BAD_SIZE - if requested size can not be met
4607  *		 CS_BAD_WINDOW - if an internal error occured
4608  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
4609  *		 CS_NO_CARD - if no card is in socket
4610  *		 CS_BAD_ATTRIBUTE - if any of the unsupported Attrbute
4611  *					flags are set
4612  */
4613 static int
4614 cs_request_window(client_handle_t client_handle,
4615 				window_handle_t *wh,
4616 				win_req_t *rw)
4617 {
4618 	cs_socket_t *sp;
4619 	cs_window_t *cw;
4620 	client_t *client;
4621 	modify_win_t mw;
4622 	inquire_window_t iw;
4623 	uint32_t aw;
4624 	int error;
4625 	int client_lock_acquired;
4626 	uint32_t socket_num;
4627 
4628 	/*
4629 	 * Check to see if this is the Socket Services client handle; if it
4630 	 *	is, we don't support SS using this call.
4631 	 */
4632 	if (CLIENT_HANDLE_IS_SS(client_handle))
4633 	    return (CS_UNSUPPORTED_FUNCTION);
4634 
4635 	/*
4636 	 * Make sure that none of the unsupported flags are set.
4637 	 */
4638 	if (rw->Attributes &   (/* Compatability */
4639 				WIN_PAGED |
4640 				WIN_SHARED |
4641 				WIN_FIRST_SHARED |
4642 				WIN_BINDING_SPECIFIC |
4643 				/* CS internal */
4644 				WIN_DATA_WIDTH_VALID |
4645 				/* IO window flags */
4646 				WIN_MEMORY_TYPE_IO |
4647 				/* CardBus flags */
4648 				WIN_DATA_WIDTH_32 |
4649 				WIN_PREFETCH_CACHE_MASK |
4650 				WIN_BAR_MASK))
4651 	    return (CS_BAD_ATTRIBUTE);
4652 
4653 	mutex_enter(&cs_globals.window_lock);
4654 
4655 	/*
4656 	 * Get a pointer to this client's socket structure.
4657 	 */
4658 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
4659 	    return (CS_BAD_SOCKET);
4660 
4661 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
4662 
4663 	/*
4664 	 *  Make sure that this is a valid client handle.
4665 	 */
4666 	if (!(client = cs_find_client(client_handle, &error))) {
4667 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4668 	    mutex_exit(&cs_globals.window_lock);
4669 	    return (error);
4670 	}
4671 
4672 	mutex_enter(&sp->lock);
4673 
4674 	/*
4675 	 * If there's no card in the socket or the card in the socket is not
4676 	 *	for this client, then return an error.
4677 	 */
4678 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
4679 	    mutex_exit(&sp->lock);
4680 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4681 	    mutex_exit(&cs_globals.window_lock);
4682 	    return (CS_NO_CARD);
4683 	}
4684 
4685 	mutex_exit(&sp->lock);
4686 
4687 	socket_num = CS_MAKE_SOCKET_NUMBER(GET_CLIENT_SOCKET(client_handle),
4688 	    GET_CLIENT_FUNCTION(client_handle));
4689 
4690 
4691 	/*
4692 	 * See if we can find a window that matches the caller's criteria.
4693 	 *	If we can't, then thre's not much more that we can do except
4694 	 *	for return an error.
4695 	 */
4696 	if ((error = cs_find_mem_window(sp->socket_num, rw, &aw)) !=
4697 								CS_SUCCESS) {
4698 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4699 	    mutex_exit(&cs_globals.window_lock);
4700 	    return (error);
4701 	}
4702 
4703 	/*
4704 	 * We got a window, now synthesize a new window handle for this
4705 	 *	client and get a pointer to the global window structs
4706 	 *	and assign this window to this client.
4707 	 * We don't have to check for errors from cs_create_window_handle
4708 	 *	since that function always returns a valid window handle
4709 	 *	if it is given a valid window number.
4710 	 */
4711 	*wh = cs_create_window_handle(aw);
4712 	if ((cw = cs_get_wp(aw)) == NULL) {
4713 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4714 	    mutex_exit(&cs_globals.window_lock);
4715 	    return (CS_BAD_WINDOW);
4716 	}
4717 
4718 	cw->window_handle = *wh;
4719 	cw->client_handle = client_handle;
4720 	cw->socket_num = sp->socket_num;
4721 	cw->state |= (CW_ALLOCATED | CW_MEM);
4722 
4723 	mw.Attributes = (
4724 				rw->Attributes |
4725 				WIN_DATA_WIDTH_VALID |
4726 				WIN_ACCESS_SPEED_VALID);
4727 	mw.AccessSpeed = rw->win_params.AccessSpeed;
4728 
4729 	if ((error = cs_modify_mem_window(*wh, &mw, rw, socket_num)) !=
4730 	    CS_SUCCESS) {
4731 	    cw->state = 0;
4732 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4733 	    mutex_exit(&cs_globals.window_lock);
4734 	    return (error);
4735 	}
4736 
4737 	/*
4738 	 * Get any required card offset and pass it back to the client.
4739 	 *	This is not defined in the current PCMCIA spec.  It is
4740 	 *	an aid to clients that want to use it to generate an
4741 	 *	optimum card offset.
4742 	 */
4743 	iw.window = GET_WINDOW_NUMBER(*wh);
4744 	SocketServices(SS_InquireWindow, &iw);
4745 
4746 	if (iw.mem_win_char.MemWndCaps & WC_CALIGN)
4747 	    rw->ReqOffset = rw->Size;
4748 	else
4749 	    rw->ReqOffset = iw.mem_win_char.ReqOffset;
4750 
4751 	/*
4752 	 * Increment the client's memory window count; this is how we know
4753 	 *	when a client has any allocated memory windows.
4754 	 */
4755 	client->memwin_count++;
4756 
4757 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4758 	mutex_exit(&cs_globals.window_lock);
4759 
4760 	return (CS_SUCCESS);
4761 }
4762 
4763 /*
4764  * cs_release_window - deallocates the window associated with the passed
4765  *			window handle; this is ReleaseWindow
4766  *
4767  *	returns: CS_SUCCESS if window handle is valid and window was
4768  *			sucessfully deallocated
4769  *		 CS_BAD_HANDLE if window handle is invalid or if window
4770  *			handle is valid but window is not allocated
4771  */
4772 static int
4773 cs_release_window(window_handle_t wh)
4774 {
4775 	cs_socket_t *sp;
4776 	cs_window_t *cw;
4777 	client_t *client;
4778 	int error;
4779 	int client_lock_acquired;
4780 
4781 	mutex_enter(&cs_globals.window_lock);
4782 
4783 	if (!(cw = cs_find_window(wh))) {
4784 	    mutex_exit(&cs_globals.window_lock);
4785 	    return (CS_BAD_HANDLE);
4786 	}
4787 
4788 	/*
4789 	 * Check to see if this is the Socket Services client handle; if it
4790 	 *	is, we don't support SS using this call.
4791 	 */
4792 	if (CLIENT_HANDLE_IS_SS(cw->client_handle)) {
4793 	    mutex_exit(&cs_globals.window_lock);
4794 	    return (CS_UNSUPPORTED_FUNCTION);
4795 	}
4796 
4797 	/*
4798 	 * Get a pointer to this client's socket structure.
4799 	 */
4800 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(cw->client_handle))) == NULL)
4801 	    return (CS_BAD_SOCKET);
4802 
4803 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
4804 
4805 	/*
4806 	 *  Make sure that this is a valid client handle.
4807 	 */
4808 	if (!(client = cs_find_client(cw->client_handle, &error))) {
4809 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4810 	    mutex_exit(&cs_globals.window_lock);
4811 	    return (error);
4812 	}
4813 
4814 	/*
4815 	 * Mark this window as not in use anymore.
4816 	 */
4817 	cw->state &= ~CW_WIN_IN_USE;
4818 
4819 	/*
4820 	 * Decrement the client's memory window count; this is how we know
4821 	 *	when a client has any allocated memory windows.
4822 	 */
4823 	if (!(--(client->memwin_count)))
4824 	    client->flags &= ~CLIENT_WIN_ALLOCATED;
4825 
4826 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4827 	mutex_exit(&cs_globals.window_lock);
4828 
4829 	return (CS_SUCCESS);
4830 }
4831 
4832 /*
4833  * cs_modify_window - modifies a window's characteristics; this is ModifyWindow
4834  */
4835 static int
4836 cs_modify_window(window_handle_t wh, modify_win_t *mw)
4837 {
4838 	cs_socket_t *sp;
4839 	cs_window_t *cw;
4840 	client_t *client;
4841 	int error;
4842 	int client_lock_acquired;
4843 
4844 	mutex_enter(&cs_globals.window_lock);
4845 
4846 	/*
4847 	 * Do some sanity checking - make sure that we can find a pointer
4848 	 *	to the window structure, and if we can, get the client that
4849 	 *	has allocated that window.
4850 	 */
4851 	if (!(cw = cs_find_window(wh))) {
4852 	    mutex_exit(&cs_globals.window_lock);
4853 	    return (CS_BAD_HANDLE);
4854 	}
4855 
4856 	/*
4857 	 * Get a pointer to this client's socket structure.
4858 	 */
4859 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(cw->client_handle))) == NULL)
4860 	    return (CS_BAD_SOCKET);
4861 
4862 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
4863 
4864 	if (!(client = cs_find_client(cw->client_handle, &error))) {
4865 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4866 	    mutex_exit(&cs_globals.window_lock);
4867 	    return (error);
4868 	}
4869 
4870 	mutex_enter(&sp->lock);
4871 
4872 	/*
4873 	 * If there's no card in the socket or the card in the socket is not
4874 	 *	for this client, then return an error.
4875 	 */
4876 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
4877 	    mutex_exit(&sp->lock);
4878 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4879 	    mutex_exit(&cs_globals.window_lock);
4880 	    return (CS_NO_CARD);
4881 	}
4882 
4883 	mutex_exit(&sp->lock);
4884 
4885 	mw->Attributes &= (
4886 				WIN_MEMORY_TYPE_MASK |
4887 				WIN_ENABLE |
4888 				WIN_ACCESS_SPEED_VALID |
4889 				WIN_ACC_ENDIAN_MASK |
4890 				WIN_ACC_ORDER_MASK);
4891 
4892 	mw->Attributes &= ~WIN_DATA_WIDTH_VALID;
4893 
4894 	if ((error = cs_modify_mem_window(wh, mw, NULL, NULL)) != CS_SUCCESS) {
4895 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4896 	    mutex_exit(&cs_globals.window_lock);
4897 	    return (error);
4898 	}
4899 
4900 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
4901 	mutex_exit(&cs_globals.window_lock);
4902 
4903 	return (CS_SUCCESS);
4904 }
4905 
4906 /*
4907  * cs_modify_mem_window - modifies a window's characteristics; used internally
4908  *				by Card Services
4909  *
4910  *    If *wr is NULL, it means that we're being called by ModifyWindow
4911  *    If *wr is non-NULL, it means that we are being called by RequestWindow
4912  *	and so we can't use SS_GetWindow.
4913  */
4914 static int
4915 cs_modify_mem_window(window_handle_t wh, modify_win_t *mw,
4916 						win_req_t *wr, int sn)
4917 {
4918 	get_window_t gw;
4919 	set_window_t sw;
4920 	set_page_t set_page;
4921 	get_page_t get_page;
4922 
4923 	/*
4924 	 * If the win_req_t struct pointer is NULL, it means that
4925 	 *	we're being called by ModifyWindow, so get the
4926 	 *	current window characteristics.
4927 	 */
4928 	if (!wr) {
4929 	    gw.window = GET_WINDOW_NUMBER(wh);
4930 	    if (SocketServices(SS_GetWindow, &gw) != SUCCESS)
4931 		return (CS_BAD_WINDOW);
4932 	    sw.state = gw.state;
4933 	    sw.socket = gw.socket;
4934 	    sw.WindowSize = gw.size;
4935 	} else {
4936 	    sw.state = 0;
4937 	    sw.socket = sn;
4938 	    sw.WindowSize = wr->Size;
4939 	}
4940 
4941 	/*
4942 	 * If we're being called by RequestWindow, we must always have
4943 	 *	WIN_ACCESS_SPEED_VALID set since get_window_t is not
4944 	 *	defined.
4945 	 */
4946 	if (mw->Attributes & WIN_ACCESS_SPEED_VALID) {
4947 	    convert_speed_t convert_speed;
4948 
4949 	    convert_speed.Attributes = CONVERT_DEVSPEED_TO_NS;
4950 	    convert_speed.devspeed = mw->AccessSpeed;
4951 
4952 	    if (cs_convert_speed(&convert_speed) != CS_SUCCESS)
4953 		return (CS_BAD_SPEED);
4954 
4955 	    sw.speed = convert_speed.nS;
4956 	} else {
4957 	    sw.speed = gw.speed;
4958 	}
4959 
4960 	if (!wr) {
4961 	    get_page.window = GET_WINDOW_NUMBER(wh);
4962 	    get_page.page = 0;
4963 	    if (SocketServices(SS_GetPage, &get_page) != SUCCESS)
4964 		return (CS_BAD_WINDOW);
4965 	    set_page.state = get_page.state;
4966 	    set_page.offset = get_page.offset;
4967 	} else {
4968 	    set_page.state = 0;
4969 	    set_page.offset = 0;
4970 	}
4971 
4972 	if (mw->Attributes & WIN_ENABLE) {
4973 	    sw.state |= WS_ENABLED;
4974 	    set_page.state |= PS_ENABLED;
4975 	} else {
4976 	    sw.state &= ~WS_ENABLED;
4977 	    set_page.state &= ~PS_ENABLED;
4978 	}
4979 
4980 	if (mw->Attributes & WIN_DATA_WIDTH_VALID) {
4981 	    if (mw->Attributes & WIN_DATA_WIDTH_16)
4982 		sw.state |= WS_16BIT;
4983 	    else
4984 		sw.state &= ~WS_16BIT;
4985 	}
4986 
4987 	sw.window = GET_WINDOW_NUMBER(wh);
4988 	sw.base = 0;
4989 
4990 	cs_set_acc_attributes(&sw, mw->Attributes);
4991 
4992 	if (SocketServices(SS_SetWindow, &sw) != SUCCESS)
4993 	    return (CS_BAD_WINDOW);
4994 
4995 	if (mw->Attributes & WIN_MEMORY_TYPE_AM)
4996 	    set_page.state |= PS_ATTRIBUTE;
4997 	else
4998 	    set_page.state &= ~PS_ATTRIBUTE;
4999 
5000 	set_page.window = GET_WINDOW_NUMBER(wh);
5001 	set_page.page = 0;
5002 	if (SocketServices(SS_SetPage, &set_page) != SUCCESS)
5003 	    return (CS_BAD_OFFSET);
5004 
5005 	/*
5006 	 * Return the current base address of this window
5007 	 */
5008 	if (wr) {
5009 	    gw.window = GET_WINDOW_NUMBER(wh);
5010 	    if (SocketServices(SS_GetWindow, &gw) != SUCCESS)
5011 		return (CS_BAD_WINDOW);
5012 
5013 	    wr->Base.handle = (acc_handle_t)gw.handle;
5014 	}
5015 
5016 	return (CS_SUCCESS);
5017 }
5018 
5019 /*
5020  * cs_map_mem_page - sets the card offset of the mapped window
5021  */
5022 static int
5023 cs_map_mem_page(window_handle_t wh, map_mem_page_t *mmp)
5024 {
5025 	cs_socket_t *sp;
5026 	cs_window_t *cw;
5027 	client_t *client;
5028 	inquire_window_t iw;
5029 	get_window_t gw;
5030 	set_page_t set_page;
5031 	get_page_t get_page;
5032 	int error;
5033 	uint32_t size;
5034 	int client_lock_acquired;
5035 
5036 	/*
5037 	 * We don't support paged windows, so never allow a page number
5038 	 *	of other than 0
5039 	 */
5040 	if (mmp->Page)
5041 	    return (CS_BAD_PAGE);
5042 
5043 	mutex_enter(&cs_globals.window_lock);
5044 
5045 	/*
5046 	 * Do some sanity checking - make sure that we can find a pointer
5047 	 *	to the window structure, and if we can, get the client that
5048 	 *	has allocated that window.
5049 	 */
5050 	if (!(cw = cs_find_window(wh))) {
5051 	    mutex_exit(&cs_globals.window_lock);
5052 	    return (CS_BAD_HANDLE);
5053 	}
5054 
5055 	/*
5056 	 * Get a pointer to this client's socket structure.
5057 	 */
5058 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(cw->client_handle))) == NULL)
5059 	    return (CS_BAD_SOCKET);
5060 
5061 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
5062 
5063 	if (!(client = cs_find_client(cw->client_handle, &error))) {
5064 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5065 	    mutex_exit(&cs_globals.window_lock);
5066 	    return (error);
5067 	}
5068 
5069 	mutex_enter(&sp->lock);
5070 
5071 	/*
5072 	 * If there's no card in the socket or the card in the socket is not
5073 	 *	for this client, then return an error.
5074 	 */
5075 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
5076 	    mutex_exit(&sp->lock);
5077 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5078 	    mutex_exit(&cs_globals.window_lock);
5079 	    return (CS_NO_CARD);
5080 	}
5081 
5082 	mutex_exit(&sp->lock);
5083 
5084 	gw.window = GET_WINDOW_NUMBER(wh);
5085 	SocketServices(SS_GetWindow, &gw);
5086 
5087 	iw.window = GET_WINDOW_NUMBER(wh);
5088 	SocketServices(SS_InquireWindow, &iw);
5089 
5090 	if (iw.mem_win_char.MemWndCaps & WC_CALIGN)
5091 	    size = gw.size;
5092 	else
5093 	    size = iw.mem_win_char.ReqOffset;
5094 
5095 	if (((mmp->CardOffset/size)*size) != mmp->CardOffset) {
5096 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5097 	    mutex_exit(&cs_globals.window_lock);
5098 	    return (CS_BAD_OFFSET);
5099 	}
5100 
5101 	get_page.window = GET_WINDOW_NUMBER(wh);
5102 	get_page.page = 0;
5103 	SocketServices(SS_GetPage, &get_page);
5104 
5105 	set_page.window = GET_WINDOW_NUMBER(wh);
5106 	set_page.page = 0;
5107 	set_page.state = get_page.state;
5108 	set_page.offset = mmp->CardOffset;
5109 	if (SocketServices(SS_SetPage, &set_page) != SUCCESS) {
5110 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5111 	    mutex_exit(&cs_globals.window_lock);
5112 	    return (CS_BAD_OFFSET);
5113 	}
5114 
5115 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5116 	mutex_exit(&cs_globals.window_lock);
5117 
5118 	return (CS_SUCCESS);
5119 }
5120 
5121 /*
5122  * cs_find_window - finds the window associated with the passed window
5123  *			handle; if the window handle is invalid or no
5124  *			windows match the passed window handle, NULL
5125  *			is returned.  Note that the window must be
5126  *			allocated for this function to return a valid
5127  *			window pointer.
5128  *
5129  *	returns: cs_window_t * pointer to the found window
5130  *		 NULL if window handle invalid or window not allocated
5131  */
5132 cs_window_t *
5133 cs_find_window(window_handle_t wh)
5134 {
5135 	cs_window_t *cw;
5136 
5137 	if ((GET_WINDOW_NUMBER(wh) > cs_globals.num_windows) ||
5138 			(GET_WINDOW_MAGIC(wh) != WINDOW_HANDLE_MAGIC))
5139 	    return ((cs_window_t *)NULL);
5140 
5141 	if ((cw = cs_get_wp(GET_WINDOW_NUMBER(wh))) == NULL)
5142 	    return (NULL);
5143 
5144 	if ((cw->state & CW_ALLOCATED) && (cw->state & CW_MEM))
5145 	    return (cw);
5146 
5147 	return ((cs_window_t *)NULL);
5148 }
5149 
5150 /*
5151  * cs_create_window_handle - creates a unique window handle based on the
5152  *				passed window number.
5153  */
5154 static window_handle_t
5155 cs_create_window_handle(uint32_t aw)
5156 {
5157 	return (WINDOW_HANDLE_MAGIC | (aw & WINDOW_HANDLE_MASK));
5158 }
5159 
5160 /*
5161  * cs_find_mem_window - tries to find a memory window matching the caller's
5162  *			criteria
5163  *
5164  *	We return the first window that matches the requested criteria.
5165  *
5166  *	returns: CS_SUCCESS - if memory window found
5167  *		 CS_OUT_OF_RESOURCE - if no windows match requirements
5168  *		 CS_BAD_SIZE - if requested size can not be met
5169  *		 CS_BAD_WINDOW - if an internal error occured
5170  */
5171 /* BEGIN CSTYLED */
5172 static int
5173 cs_find_mem_window(uint32_t sn, win_req_t *rw, uint32_t *assigned_window)
5174 {
5175 	uint32_t wn;
5176 	int error = CS_OUT_OF_RESOURCE;
5177 	uint32_t window_num = PCMCIA_MAX_WINDOWS;
5178 	uint32_t min_size = UINT_MAX;
5179 	inquire_window_t inquire_window, *iw;
5180 	uint32_t MinSize, MaxSize, ReqGran, MemWndCaps, WndCaps;
5181 	uint32_t tws;
5182 
5183 	iw = &inquire_window;
5184 
5185 	for (wn = 0; wn < cs_globals.num_windows; wn++) {
5186 	    cs_window_t *cw;
5187 
5188 	    /*
5189 	     * If we can't get a pointer to this window, we should contine
5190 	     *	with scanning the next window, since this window might have
5191 	     *	been dropped.
5192 	     */
5193 	    if ((cw = cs_get_wp(wn)) != NULL) {
5194 	      iw->window = wn;
5195 
5196 	      if (SocketServices(SS_InquireWindow, iw) != SUCCESS)
5197 		return (CS_BAD_WINDOW);
5198 
5199 	      MinSize = iw->mem_win_char.MinSize;
5200 	      MaxSize = iw->mem_win_char.MaxSize;
5201 	      ReqGran = iw->mem_win_char.ReqGran;
5202 	      MemWndCaps = iw->mem_win_char.MemWndCaps;
5203 	      WndCaps = iw->WndCaps;
5204 
5205 	      if (WINDOW_FOR_SOCKET(iw->Sockets, sn) &&
5206 					WINDOW_AVAILABLE_FOR_MEM(cw) &&
5207 					WndCaps & (WC_COMMON|WC_ATTRIBUTE)) {
5208 		if ((error = cs_valid_window_speed(iw, rw->win_params.AccessSpeed)) ==
5209 					CS_SUCCESS) {
5210 		    error = CS_OUT_OF_RESOURCE;
5211 		    if (cs_memwin_space_and_map_ok(iw, rw)) {
5212 			error = CS_BAD_SIZE;
5213 			if (!rw->Size) {
5214 			    min_size = min(min_size, MinSize);
5215 			    window_num = wn;
5216 			    goto found_window;
5217 			} else {
5218 			    if (!(MemWndCaps & WC_SIZE)) {
5219 				if (rw->Size == MinSize) {
5220 				    min_size = MinSize;
5221 				    window_num = wn;
5222 				    goto found_window;
5223 				}
5224 			    } else { /* WC_SIZE */
5225 			      if (!ReqGran) {
5226 				error = CS_BAD_WINDOW;
5227 			      } else {
5228 				if ((rw->Size >= MinSize) &&
5229 							(rw->Size <= MaxSize)) {
5230 				    if (MemWndCaps & WC_POW2) {
5231 				      unsigned rg = ReqGran;
5232 					for (tws = MinSize; tws <= MaxSize;
5233 								rg = (rg<<1)) {
5234 					    if (rw->Size == tws) {
5235 						min_size = tws;
5236 						window_num = wn;
5237 						goto found_window;
5238 					    }
5239 					    tws += rg;
5240 					  } /* for (tws) */
5241 				    } else {
5242 					for (tws = MinSize; tws <= MaxSize;
5243 							tws += ReqGran) {
5244 					    if (rw->Size == tws) {
5245 						min_size = tws;
5246 						window_num = wn;
5247 						goto found_window;
5248 					    }
5249 					  } /* for (tws) */
5250 				    } /* if (!WC_POW2) */
5251 				} /* if (Size >= MinSize) */
5252 			      } /* if (!ReqGran) */
5253 			    } /* if (WC_SIZE) */
5254 			} /* if (rw->Size) */
5255 		    } /* if (cs_space_and_map_ok) */
5256 		} /* if (cs_valid_window_speed) */
5257 	      } /* if (WINDOW_FOR_SOCKET) */
5258 	    } /* if (cs_get_wp) */
5259 	} /* for (wn) */
5260 
5261 	/*
5262 	 * If we got here and the window_num wasn't set by any window
5263 	 *	 matches in the above code, it means that we didn't
5264 	 *	find a window matching the caller's criteria.
5265 	 * If the error is CS_BAD_TYPE, it means that the last reason
5266 	 *	that we couldn't match a window was because the caller's
5267 	 *	requested speed was out of range of the last window that
5268 	 *	we checked.  We convert this error code to CS_OUT_OF_RESOURCE
5269 	 *	to conform to the RequestWindow section of the PCMCIA
5270 	 *	Card Services spec.
5271 	 */
5272 	if (window_num == PCMCIA_MAX_WINDOWS) {
5273 	    if (error == CS_BAD_TYPE)
5274 		error = CS_OUT_OF_RESOURCE;
5275 	    return (error);
5276 	}
5277 
5278 found_window:
5279 	rw->Size = min_size;
5280 	*assigned_window = window_num;
5281 	iw->window = window_num;
5282 	SocketServices(SS_InquireWindow, iw);
5283 	MemWndCaps = iw->mem_win_char.MemWndCaps;
5284 
5285 	if (MemWndCaps & WC_CALIGN)
5286 	    rw->Attributes |= WIN_OFFSET_SIZE;
5287 	else
5288 	    rw->Attributes &= ~WIN_OFFSET_SIZE;
5289 	return (CS_SUCCESS);
5290 }
5291 /* END CSTYLED */
5292 
5293 /*
5294  * cs_memwin_space_and_map_ok - checks to see if the passed window mapping
5295  *				capabilities and window speeds are in the
5296  *				range of the passed window.
5297  *
5298  *	returns: 0 - if the capabilities are out of range
5299  *		 1 - if the capabilities are in range
5300  */
5301 static int
5302 cs_memwin_space_and_map_ok(inquire_window_t *iw, win_req_t *rw)
5303 {
5304 
5305 #ifdef	CS_DEBUG
5306 	if (cs_debug > 240)
5307 	    printf("-> s&m_ok: Attributes 0x%x AccessSpeed 0x%x "
5308 					"WndCaps 0x%x MemWndCaps 0x%x\n",
5309 					(int)rw->Attributes,
5310 					(int)rw->win_params.AccessSpeed,
5311 					iw->WndCaps,
5312 					iw->mem_win_char.MemWndCaps);
5313 #endif
5314 
5315 	if (rw->win_params.AccessSpeed & WIN_USE_WAIT) {
5316 	    if (!(iw->WndCaps & WC_WAIT))
5317 		return (0);
5318 	}
5319 
5320 	if (rw->Attributes & WIN_DATA_WIDTH_16) {
5321 	    if (!(iw->mem_win_char.MemWndCaps & WC_16BIT))
5322 		return (0);
5323 	} else {
5324 	    if (!(iw->mem_win_char.MemWndCaps & WC_8BIT))
5325 		return (0);
5326 	}
5327 
5328 	if (rw->Attributes & WIN_MEMORY_TYPE_AM) {
5329 	    if (!(iw->WndCaps & WC_ATTRIBUTE))
5330 		return (0);
5331 	}
5332 
5333 	if (rw->Attributes & WIN_MEMORY_TYPE_CM) {
5334 	    if (!(iw->WndCaps & WC_COMMON))
5335 		return (0);
5336 	}
5337 
5338 	return (1);
5339 }
5340 
5341 /*
5342  * cs_valid_window_speed - checks to see if requested window speed
5343  *				is in range of passed window
5344  *
5345  *	The inquire_window_t struct gives us speeds in nS, and we
5346  *	get speeds in the AccessSpeed variable as a devspeed code.
5347  *
5348  *	returns: CS_BAD_SPEED - if AccessSpeed is invalid devspeed code
5349  *		 CS_BAD_TYPE -	if AccessSpeed is not in range of valid
5350  *				speed for this window
5351  *		 CS_SUCCESS -	if window speed is in range
5352  */
5353 static int
5354 cs_valid_window_speed(inquire_window_t *iw, uint32_t AccessSpeed)
5355 {
5356 	convert_speed_t convert_speed, *cs;
5357 
5358 	cs = &convert_speed;
5359 
5360 	cs->Attributes = CONVERT_DEVSPEED_TO_NS;
5361 	cs->devspeed = AccessSpeed;
5362 
5363 	if (cs_convert_speed(cs) != CS_SUCCESS)
5364 	    return (CS_BAD_SPEED);
5365 
5366 	if ((cs->nS < iw->mem_win_char.Fastest) ||
5367 		(cs->nS > iw->mem_win_char.Slowest))
5368 	    return (CS_BAD_TYPE);
5369 
5370 	return (CS_SUCCESS);
5371 }
5372 
5373 /*
5374  * ==== IO window handling section ====
5375  */
5376 
5377 /*
5378  * cs_request_io - provides IO resources for clients; this is RequestIO
5379  *
5380  *	calling: cs_request_io(client_handle_t, io_req_t *)
5381  *
5382  *	returns: CS_SUCCESS - if IO resources available for client
5383  *		 CS_OUT_OF_RESOURCE - if no windows match requirements
5384  *		 CS_BAD_HANDLE - client handle is invalid
5385  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
5386  *		 CS_NO_CARD - if no card is in socket
5387  *		 CS_BAD_ATTRIBUTE - if any of the unsupported Attribute
5388  *					flags are set
5389  *		 CS_BAD_BASE - if either or both base port addresses
5390  *					are invalid or out of range
5391  *		 CS_CONFIGURATION_LOCKED - a RequestConfiguration has
5392  *					already been done
5393  *		 CS_IN_USE - IO ports already in use or function has
5394  *					already been called
5395  *		 CS_BAD_WINDOW - if failure while trying to set window
5396  *					characteristics
5397  */
5398 static int
5399 cs_request_io(client_handle_t client_handle, io_req_t *ior)
5400 {
5401 	cs_socket_t *sp;
5402 	client_t *client;
5403 	int error;
5404 	int client_lock_acquired;
5405 	uint32_t socket_num;
5406 
5407 	/*
5408 	 * Check to see if this is the Socket Services client handle; if it
5409 	 *	is, we don't support SS using this call.
5410 	 */
5411 	if (CLIENT_HANDLE_IS_SS(client_handle))
5412 	    return (CS_UNSUPPORTED_FUNCTION);
5413 
5414 	/*
5415 	 * If the client has only requested one IO range, then make sure
5416 	 *	that the Attributes2 filed is clear.
5417 	 */
5418 	if (!ior->NumPorts2)
5419 	    ior->Attributes2 = 0;
5420 
5421 	/*
5422 	 * Make sure that none of the unsupported or reserved flags are set.
5423 	 */
5424 	if ((ior->Attributes1 | ior->Attributes2) &    (IO_SHARED |
5425 							IO_FIRST_SHARED |
5426 							IO_FORCE_ALIAS_ACCESS |
5427 							IO_DEALLOCATE_WINDOW |
5428 							IO_DISABLE_WINDOW))
5429 	    return (CS_BAD_ATTRIBUTE);
5430 
5431 	/*
5432 	 * Make sure that we have a port count for the first region.
5433 	 */
5434 	if (!ior->NumPorts1)
5435 	    return (CS_BAD_BASE);
5436 
5437 	/*
5438 	 * If we're being asked for multiple IO ranges, then both base port
5439 	 *	members must be non-zero.
5440 	 */
5441 	if ((ior->NumPorts2) && !(ior->BasePort1.base && ior->BasePort2.base))
5442 	    return (CS_BAD_BASE);
5443 
5444 	mutex_enter(&cs_globals.window_lock);
5445 
5446 	/*
5447 	 * Get a pointer to this client's socket structure.
5448 	 */
5449 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
5450 	    return (CS_BAD_SOCKET);
5451 
5452 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
5453 
5454 	/*
5455 	 *  Make sure that this is a valid client handle.
5456 	 */
5457 	if (!(client = cs_find_client(client_handle, &error))) {
5458 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5459 	    mutex_exit(&cs_globals.window_lock);
5460 	    return (error);
5461 	}
5462 
5463 	/*
5464 	 * If RequestConfiguration has already been done, we don't allow
5465 	 *	this call.
5466 	 */
5467 	if (client->flags & REQ_CONFIGURATION_DONE) {
5468 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5469 	    mutex_exit(&cs_globals.window_lock);
5470 	    return (CS_CONFIGURATION_LOCKED);
5471 	}
5472 
5473 	/*
5474 	 * If RequestIO has already been done, we don't allow this call.
5475 	 */
5476 	if (client->flags & REQ_IO_DONE) {
5477 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5478 	    mutex_exit(&cs_globals.window_lock);
5479 	    return (CS_IN_USE);
5480 	}
5481 
5482 	mutex_enter(&sp->lock);
5483 
5484 	/*
5485 	 * If there's no card in the socket or the card in the socket is not
5486 	 *	for this client, then return an error.
5487 	 */
5488 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
5489 	    mutex_exit(&sp->lock);
5490 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5491 	    mutex_exit(&cs_globals.window_lock);
5492 	    return (CS_NO_CARD);
5493 	}
5494 
5495 	mutex_exit(&sp->lock);
5496 
5497 	/*
5498 	 * If we're only being asked for one IO range, then set BasePort2 to
5499 	 *	zero, since we use it later on.
5500 	 */
5501 	if (!ior->NumPorts2)
5502 	    ior->BasePort2.base = 0;
5503 
5504 	/*
5505 	 * See if we can allow Card Services to select the base address
5506 	 *	value for this card; if the client has specified a non-zero
5507 	 *	base IO address but the card doesn't decode enough IO
5508 	 *	address lines to uniquely use that address, then we have
5509 	 *	the flexibility to choose an alternative base address.
5510 	 * Note that if the client specifies that the card decodes zero
5511 	 *	IO address lines, then we have to use the NumPortsX
5512 	 *	values to figure out how many address lines the card
5513 	 *	actually decodes, and we have to round the NumPortsX
5514 	 *	values up to the closest power of two.
5515 	 */
5516 	if (ior->IOAddrLines) {
5517 	    ior->BasePort1.base = IOADDR_FROBNITZ(ior->BasePort1.base,
5518 		ior->IOAddrLines);
5519 	    ior->BasePort2.base = IOADDR_FROBNITZ(ior->BasePort2.base,
5520 		ior->IOAddrLines);
5521 	} else {
5522 	    ior->BasePort1.base = ior->BasePort1.base &
5523 				((IONUMPORTS_FROBNITZ(ior->NumPorts1) +
5524 				IONUMPORTS_FROBNITZ(ior->NumPorts2)) - 1);
5525 	    ior->BasePort2.base = ior->BasePort2.base &
5526 				((IONUMPORTS_FROBNITZ(ior->NumPorts1) +
5527 				IONUMPORTS_FROBNITZ(ior->NumPorts2)) - 1);
5528 	}
5529 
5530 	socket_num = CS_MAKE_SOCKET_NUMBER(GET_CLIENT_SOCKET(client_handle),
5531 	    GET_CLIENT_FUNCTION(client_handle));
5532 
5533 
5534 #ifdef	USE_IOMMAP_WINDOW
5535 	/*
5536 	 * Here is where the code diverges, depending on the type of IO windows
5537 	 *	that this socket supports.  If this socket supportes memory
5538 	 *	mapped IO windows, as determined by cs_init allocating an
5539 	 *	io_mmap_window_t structure on the socket structure, then we
5540 	 *	use one IO window for all the clients on this socket.  We can
5541 	 *	do this safely since a memory mapped IO window implies that
5542 	 *	only this socket shares the complete IO space of the card.
5543 	 * See the next major block of code for a description of what we do
5544 	 *	if a socket doesn't support memory mapped IO windows.
5545 	 */
5546 	if (sp->io_mmap_window) {
5547 	    cs_window_t *cw;
5548 	    io_mmap_window_t *imw = sp->io_mmap_window;
5549 	    uint32_t offset;
5550 
5551 		/*
5552 		 * If we haven't allocated an IO window yet, do it now.
5553 		 * Try to allocate the IO window that cs_init found for us;
5554 		 * if that fails, then call cs_find_io_win to find a window.
5555 		 */
5556 	    if (!imw->count) {
5557 		set_window_t set_window;
5558 
5559 		if (!WINDOW_AVAILABLE_FOR_IO(imw->number)) {
5560 		    iowin_char_t iowin_char;
5561 
5562 		    iowin_char.IOWndCaps = (WC_IO_RANGE_PER_WINDOW |
5563 					    WC_8BIT |
5564 					    WC_16BIT);
5565 		    if ((error = cs_find_io_win(sp->socket_num, &iowin_char,
5566 				    &imw->number, &imw->size)) != CS_SUCCESS) {
5567 			EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5568 			mutex_exit(&cs_globals.window_lock);
5569 		    } /* cs_find_io_win */
5570 		} /* if (!WINDOW_AVAILABLE_FOR_IO) */
5571 
5572 		set_window.socket = socket_num;
5573 		set_window.window = imw->number;
5574 		set_window.speed = IO_WIN_SPEED;
5575 		set_window.base.base = 0;
5576 		set_window.WindowSize = imw->size;
5577 		set_window.state = (WS_ENABLED | WS_16BIT |
5578 				    WS_EXACT_MAPIN | WS_IO);
5579 
5580 		/* XXX - what to d here? XXX */
5581 		cs_set_acc_attributes(&set_window, Attributes);
5582 
5583 		if (SocketServices(SS_SetWindow, &set_window) != SUCCESS) {
5584 		    (void) cs_setup_io_win(socket_num, imw->number,
5585 						NULL, NULL, NULL,
5586 						(IO_DEALLOCATE_WINDOW |
5587 						IO_DISABLE_WINDOW));
5588 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5589 		    mutex_exit(&cs_globals.window_lock);
5590 		    return (CS_BAD_WINDOW);
5591 		}
5592 
5593 		imw->handle = set_window.base.handle;
5594 		imw->size = set_window.WindowSize;
5595 
5596 		/*
5597 		 * Check the caller's port requirements to be sure that they
5598 		 *	fit within our found IO window.
5599 		 */
5600 		if ((ior->BasePort1.base + ior->NumPorts1 +
5601 			ior->BasePort2.base + ior->NumPorts2) > imw->size) {
5602 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5603 		    mutex_exit(&cs_globals.window_lock);
5604 		    return (CS_BAD_BASE);
5605 		}
5606 
5607 		if ((cw = cs_get_wp(imw->number)) == NULL) {
5608 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5609 		    mutex_exit(&cs_globals.window_lock);
5610 		    return (CS_BAD_WINDOW)
5611 		}
5612 		cw->state |= (CW_ALLOCATED | CW_IO);
5613 
5614 	    } /* if (!imw->count) */
5615 
5616 	    imw->count++;
5617 
5618 		/*
5619 		 * All common access handles for this type of adapter are
5620 		 * duped.  We never give the original back to the caller.
5621 		 */
5622 	    /* XXX need to set endianess and data ordering flags */
5623 	    csx_DupHandle(imw->handle, &ior->BasePort1.handle, 0);
5624 	    csx_GetHandleOffset(ior->BasePort1.handle, &offset);
5625 	    csx_SetHandleOffset(ior->BasePort1.handle,
5626 		ior->BasePort1.base + offset);
5627 
5628 	    if (ior->NumPorts2) {
5629 		/* XXX need to set endianess and data ordering flags */
5630 		csx_DupHandle(imw->handle, &ior->BasePort2.handle, 0);
5631 		csx_GetHandleOffset(ior->BasePort2.handle, &offset);
5632 		csx_SetHandleOffset(ior->BasePort2.handle,
5633 		    ior->BasePort1.base + offset);
5634 	    }
5635 
5636 		/*
5637 		 * We don't really use these two values if we've got a memory
5638 		 * mapped IO window since the assigned window number is stored
5639 		 * in imw->number.
5640 		 */
5641 	    client->io_alloc.Window1 = imw->number;
5642 	    client->io_alloc.Window2 = PCMCIA_MAX_WINDOWS;
5643 
5644 	/*
5645 	 * This socket supports only IO port IO windows.
5646 	 */
5647 	} else {
5648 #else	/* USE_IOMMAP_WINDOW */
5649 	{
5650 #endif	/* USE_IOMMAP_WINDOW */
5651 	    baseaddru_t baseaddru;
5652 
5653 	    baseaddru.base = ior->BasePort1.base;
5654 
5655 	    if ((error = cs_allocate_io_win(sp->socket_num, ior->Attributes1,
5656 		&client->io_alloc.Window1)) != CS_SUCCESS) {
5657 
5658 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5659 		mutex_exit(&cs_globals.window_lock);
5660 		return (error);
5661 	    } /* if (cs_allocate_io_win(1)) */
5662 
5663 		/*
5664 		 * Setup the window hardware; if this fails, then we need to
5665 		 *	deallocate the previously allocated window.
5666 		 */
5667 	    if ((error = cs_setup_io_win(socket_num,
5668 						client->io_alloc.Window1,
5669 						&baseaddru,
5670 						&ior->NumPorts1,
5671 						ior->IOAddrLines,
5672 						ior->Attributes1)) !=
5673 								CS_SUCCESS) {
5674 		(void) cs_setup_io_win(socket_num, client->io_alloc.Window1,
5675 					NULL, NULL, NULL,
5676 					(
5677 						IO_DEALLOCATE_WINDOW |
5678 						IO_DISABLE_WINDOW));
5679 
5680 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5681 		mutex_exit(&cs_globals.window_lock);
5682 		return (error);
5683 	    } /* if (cs_setup_io_win(1)) */
5684 
5685 	    ior->BasePort1.handle = (acc_handle_t)baseaddru.handle;
5686 	    ior->BasePort1.base = baseaddru.base;
5687 
5688 		/*
5689 		 * See if the client wants two IO ranges.
5690 		 */
5691 	    if (ior->NumPorts2) {
5692 		baseaddru_t baseaddru;
5693 
5694 		baseaddru.base = ior->BasePort2.base;
5695 
5696 		/*
5697 		 * If we fail to allocate this window, then we must deallocate
5698 		 *	the previous IO window that is already allocated.
5699 		 */
5700 		if ((error = cs_allocate_io_win(sp->socket_num,
5701 						ior->Attributes2,
5702 						&client->io_alloc.Window2)) !=
5703 								CS_SUCCESS) {
5704 		    (void) cs_setup_io_win(socket_num,
5705 						client->io_alloc.Window2,
5706 						NULL, NULL, NULL,
5707 						(
5708 							IO_DEALLOCATE_WINDOW |
5709 							IO_DISABLE_WINDOW));
5710 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5711 		    mutex_exit(&cs_globals.window_lock);
5712 		    return (error);
5713 		} /* if (cs_allocate_io_win(2)) */
5714 		/*
5715 		 * Setup the window hardware; if this fails, then we need to
5716 		 *	deallocate the previously allocated window.
5717 		 */
5718 		if ((error = cs_setup_io_win(socket_num,
5719 						client->io_alloc.Window2,
5720 						&baseaddru,
5721 						&ior->NumPorts2,
5722 						ior->IOAddrLines,
5723 						ior->Attributes2)) !=
5724 								CS_SUCCESS) {
5725 		    (void) cs_setup_io_win(socket_num,
5726 						client->io_alloc.Window1,
5727 						NULL, NULL, NULL,
5728 						(
5729 							IO_DEALLOCATE_WINDOW |
5730 							IO_DISABLE_WINDOW));
5731 		    (void) cs_setup_io_win(socket_num,
5732 						client->io_alloc.Window2,
5733 						NULL, NULL, NULL,
5734 						(
5735 							IO_DEALLOCATE_WINDOW |
5736 							IO_DISABLE_WINDOW));
5737 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5738 		    mutex_exit(&cs_globals.window_lock);
5739 		    return (error);
5740 		} /* if (cs_setup_io_win(2)) */
5741 
5742 		ior->BasePort2.handle = (acc_handle_t)baseaddru.handle;
5743 		ior->BasePort2.base = baseaddru.base;
5744 
5745 	    } else {
5746 		client->io_alloc.Window2 = PCMCIA_MAX_WINDOWS;
5747 	    } /* if (ior->NumPorts2) */
5748 	} /* if (sp->io_mmap_window) */
5749 
5750 	/*
5751 	 * Save a copy of the client's port information so that we
5752 	 *	can use it in the RequestConfiguration call.  We set
5753 	 *	the IO window number(s) allocated in the respective
5754 	 *	section of code, above.
5755 	 */
5756 	client->io_alloc.BasePort1.base = ior->BasePort1.base;
5757 	client->io_alloc.BasePort1.handle = ior->BasePort1.handle;
5758 	client->io_alloc.NumPorts1 = ior->NumPorts1;
5759 	client->io_alloc.Attributes1 = ior->Attributes1;
5760 	client->io_alloc.BasePort2.base = ior->BasePort2.base;
5761 	client->io_alloc.BasePort2.handle = ior->BasePort2.handle;
5762 	client->io_alloc.NumPorts2 = ior->NumPorts2;
5763 	client->io_alloc.Attributes2 = ior->Attributes2;
5764 	client->io_alloc.IOAddrLines = ior->IOAddrLines;
5765 
5766 	/*
5767 	 * Mark this client as having done a successful RequestIO call.
5768 	 */
5769 	client->flags |= (REQ_IO_DONE | CLIENT_IO_ALLOCATED);
5770 
5771 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5772 	mutex_exit(&cs_globals.window_lock);
5773 
5774 	return (CS_SUCCESS);
5775 }
5776 
5777 /*
5778  * cs_release_io - releases IO resources allocated by RequestIO; this is
5779  *			ReleaseIO
5780  *
5781  *	calling: cs_release_io(client_handle_t, io_req_t *)
5782  *
5783  *	returns: CS_SUCCESS - if IO resources sucessfully deallocated
5784  *		 CS_BAD_HANDLE - client handle is invalid
5785  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
5786  *		 CS_CONFIGURATION_LOCKED - a RequestConfiguration has been
5787  *				done without a ReleaseConfiguration
5788  *		 CS_IN_USE - no RequestIO has been done
5789  */
5790 static int
5791 cs_release_io(client_handle_t client_handle, io_req_t *ior)
5792 {
5793 	cs_socket_t *sp;
5794 	client_t *client;
5795 	int error;
5796 	int client_lock_acquired;
5797 	uint32_t socket_num;
5798 
5799 #ifdef	lint
5800 	ior = NULL;
5801 #endif
5802 
5803 	/*
5804 	 * Check to see if this is the Socket Services client handle; if it
5805 	 *	is, we don't support SS using this call.
5806 	 */
5807 	if (CLIENT_HANDLE_IS_SS(client_handle))
5808 	    return (CS_UNSUPPORTED_FUNCTION);
5809 
5810 	mutex_enter(&cs_globals.window_lock);
5811 
5812 	/*
5813 	 * Get a pointer to this client's socket structure.
5814 	 */
5815 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
5816 	    return (CS_BAD_SOCKET);
5817 
5818 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
5819 
5820 	/*
5821 	 *  Make sure that this is a valid client handle.
5822 	 */
5823 	if (!(client = cs_find_client(client_handle, &error))) {
5824 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5825 	    mutex_exit(&cs_globals.window_lock);
5826 	    return (error);
5827 	}
5828 
5829 	/*
5830 	 * If RequestConfiguration has already been done, we don't allow
5831 	 *	this call.
5832 	 */
5833 	if (client->flags & REQ_CONFIGURATION_DONE) {
5834 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5835 	    mutex_exit(&cs_globals.window_lock);
5836 	    return (CS_CONFIGURATION_LOCKED);
5837 	}
5838 
5839 	/*
5840 	 * If RequestIO has not been done, we don't allow this call.
5841 	 */
5842 	if (!(client->flags & REQ_IO_DONE)) {
5843 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5844 	    mutex_exit(&cs_globals.window_lock);
5845 	    return (CS_IN_USE);
5846 	}
5847 
5848 	socket_num = CS_MAKE_SOCKET_NUMBER(GET_CLIENT_SOCKET(client_handle),
5849 	    GET_CLIENT_FUNCTION(client_handle));
5850 
5851 #ifdef	XXX
5852 	/*
5853 	 * Check the passed IO allocation with the stored allocation; if
5854 	 *	they don't match, then return an error.
5855 	 */
5856 	if ((client->io_alloc.BasePort1 != ior->BasePort1) ||
5857 	    (client->io_alloc.NumPorts1 != ior->NumPorts1) ||
5858 	    (client->io_alloc.Attributes1 != ior->Attributes1) ||
5859 	    (client->io_alloc.BasePort2 != ior->BasePort2) ||
5860 	    (client->io_alloc.NumPorts2 != ior->NumPorts2) ||
5861 	    (client->io_alloc.Attributes2 != ior->Attributes2) ||
5862 	    (client->io_alloc.IOAddrLines != ior->IOAddrLines)) {
5863 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5864 		mutex_exit(&cs_globals.window_lock);
5865 		return (CS_BAD_ARGS);
5866 	}
5867 #endif
5868 
5869 #ifdef	USE_IOMMAP_WINDOW
5870 	/*
5871 	 * The code diverges here depending on if this socket supports
5872 	 *	memory mapped IO windows or not.  See comments in the
5873 	 *	cs_request_io function for a description of what's
5874 	 *	going on here.
5875 	 */
5876 	if (sp->io_mmap_window) {
5877 	    io_mmap_window_t *imw = sp->io_mmap_window;
5878 
5879 		/*
5880 		 * We should never see this; if we do, it's an internal
5881 		 *	consistency error.
5882 		 */
5883 	    if (!imw->count) {
5884 		cmn_err(CE_CONT, "cs_release_io: socket %d !imw->count\n",
5885 							    sp->socket_num);
5886 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5887 		mutex_exit(&cs_globals.window_lock);
5888 		return (CS_GENERAL_FAILURE);
5889 	    }
5890 
5891 		/*
5892 		 * All common access handles for this type of adapter are
5893 		 *	duped. We never give the original back to the caller,
5894 		 *	so it's OK to unconditionally free the handle here.
5895 		 */
5896 	    csx_FreeHandle(&ior->BasePort1.handle);
5897 
5898 		/*
5899 		 * If the IO window referance count is zero, then deallocate
5900 		 * and disable this window.
5901 		 */
5902 	    if (!--(imw->count)) {
5903 		(void) cs_setup_io_win(socket_num, imw->number, NULL,
5904 								NULL, NULL,
5905 						(
5906 							IO_DEALLOCATE_WINDOW |
5907 							IO_DISABLE_WINDOW));
5908 	    } /* if (imw->count) */
5909 	} else {
5910 #endif	/* USE_IOMMAP_WINDOW */
5911 	    (void) cs_setup_io_win(socket_num, client->io_alloc.Window1,
5912 						NULL, NULL, NULL,
5913 						(
5914 							IO_DEALLOCATE_WINDOW |
5915 							IO_DISABLE_WINDOW));
5916 	    if (client->io_alloc.Window2 != PCMCIA_MAX_WINDOWS)
5917 		(void) cs_setup_io_win(socket_num, client->io_alloc.Window2,
5918 						NULL, NULL, NULL,
5919 						(
5920 							IO_DEALLOCATE_WINDOW |
5921 							IO_DISABLE_WINDOW));
5922 #ifdef	USE_IOMMAP_WINDOW
5923 	} /* if (sp->io_mmap_window) */
5924 #endif	/* USE_IOMMAP_WINDOW */
5925 
5926 	/*
5927 	 * Mark the client as not having any IO resources allocated.
5928 	 */
5929 	client->flags &= ~(REQ_IO_DONE | CLIENT_IO_ALLOCATED);
5930 
5931 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
5932 	mutex_exit(&cs_globals.window_lock);
5933 	return (CS_SUCCESS);
5934 }
5935 
5936 /*
5937  * cs_find_io_win - finds an IO window that matches the parameters specified
5938  *			in the flags argument
5939  *
5940  *	calling: sn - socket number to look for IO window on
5941  *		 *iwc - other window characteristics to match
5942  *		 *assigned_window - pointer to where we return the assigned
5943  *					window number if we found a window or
5944  *					undefined otherwise
5945  *		 *size - if non-NULL, the found window size will be stored here
5946  *
5947  *	returns: CS_SUCCESS - if IO window found
5948  *		 CS_OUT_OF_RESOURCE - if no windows match requirements
5949  */
5950 static int
5951 cs_find_io_win(uint32_t sn, iowin_char_t *iwc, uint32_t *assigned_window,
5952     uint32_t *size)
5953 {
5954 	inquire_window_t inquire_window, *iw;
5955 	unsigned wn;
5956 
5957 	iw = &inquire_window;
5958 
5959 	for (wn = 0; wn < cs_globals.num_windows; wn++) {
5960 	    iowin_char_t *iowc;
5961 	    cs_window_t *cw;
5962 
5963 	    if ((cw = cs_get_wp(wn)) != NULL) {
5964 
5965 		iw->window = wn;
5966 		SocketServices(SS_InquireWindow, iw);
5967 
5968 		iowc = &iw->iowin_char;
5969 
5970 		if (WINDOW_FOR_SOCKET(iw->Sockets, sn) &&
5971 		    WINDOW_AVAILABLE_FOR_IO(cw) &&
5972 		    (iw->WndCaps & WC_IO) &&
5973 		    ((iowc->IOWndCaps & iwc->IOWndCaps) == iwc->IOWndCaps)) {
5974 
5975 			*assigned_window = wn;
5976 
5977 			if (size)
5978 			    *size = iw->iowin_char.ReqGran;
5979 			return (CS_SUCCESS);
5980 		    } /* if (WINDOW_FOR_SOCKET) */
5981 	    } /* cs_get_wp */
5982 	} /* for (wn) */
5983 
5984 	return (CS_OUT_OF_RESOURCE);
5985 }
5986 
5987 /*
5988  * cs_allocate_io_win - finds and allocates an IO window
5989  *
5990  *	calling: sn - socket number to look for window on
5991  *		 Attributes - window attributes in io_req_t.Attributes format
5992  *		 *assigned_window - pointer to return assigned window number
5993  *
5994  *	returns: CS_SUCCESS - IO window found and allocated
5995  *		 CS_OUT_OF_RESOURCE - if cs_find_io_win couldn't find a
5996  *				window that matches the passed criteria
5997  *
5998  * Note: This fucntion will find and allocate an IO window.  The caller is
5999  *	responsible for deallocating the window.
6000  */
6001 static int
6002 cs_allocate_io_win(uint32_t sn, uint32_t Attributes, uint32_t *assigned_window)
6003 {
6004 	iowin_char_t iowin_char;
6005 	cs_window_t *cw;
6006 
6007 	iowin_char.IOWndCaps =
6008 		((Attributes & IO_DATA_PATH_WIDTH_16)?WC_16BIT:WC_8BIT);
6009 
6010 	if (cs_find_io_win(sn, &iowin_char, assigned_window, NULL) ==
6011 								CS_SUCCESS) {
6012 	    if ((cw = cs_get_wp(*assigned_window)) == NULL)
6013 		return (CS_OUT_OF_RESOURCE);
6014 
6015 	    cw->state = (cw->state & CW_WINDOW_VALID) | (CW_ALLOCATED | CW_IO);
6016 	    return (CS_SUCCESS);
6017 	}
6018 
6019 	return (CS_OUT_OF_RESOURCE);
6020 }
6021 
6022 /*
6023  * cs_setup_io_win - setup and destroy an IO window
6024  *
6025  *	calling: sn - socket number
6026  *		 wn - window number
6027  * XXX Base - pointer to XXX
6028  *		 *NumPorts - pointer to number of allocated ports to return
6029  *		 IOAddrLines - number of IO address lines decoded by this card
6030  *		 Attributes - either io_req_t attributes, or a combination of
6031  *				the following flags:
6032  *				    IO_DEALLOCATE_WINDOW - deallocate the window
6033  *				    IO_DISABLE_WINDOW - disable the window
6034  *				When either of these two flags are set, *Base
6035  *				    and NumPorts should be NULL.
6036  *
6037  *	returns: CS_SUCCESS - if no failure
6038  *		 CS_BAD_WINDOW - if error while trying to configure window
6039  *
6040  * Note: We use the IOAddrLines value to determine what base address to pass
6041  *		to Socket Services.
6042  */
6043 static int
6044 cs_setup_io_win(uint32_t sn, uint32_t wn, baseaddru_t *Base, uint32_t *NumPorts,
6045     uint32_t IOAddrLines, uint32_t Attributes)
6046 {
6047 	set_window_t set_window;
6048 
6049 	if (Attributes & (IO_DEALLOCATE_WINDOW | IO_DISABLE_WINDOW)) {
6050 
6051 	    if (Attributes & IO_DEALLOCATE_WINDOW) {
6052 		cs_window_t *cw;
6053 
6054 		if ((cw = cs_get_wp(wn)) == NULL)
6055 		    return (CS_BAD_WINDOW);
6056 		cw->state &= CW_WINDOW_VALID;
6057 
6058 	    } /* IO_DEALLOCATE_WINDOW */
6059 
6060 	    if (Attributes & IO_DISABLE_WINDOW) {
6061 		get_window_t get_window;
6062 
6063 		get_window.window = wn;
6064 
6065 		SocketServices(SS_GetWindow, &get_window);
6066 
6067 		set_window.socket = get_window.socket;
6068 		set_window.window = get_window.window;
6069 		set_window.speed = get_window.speed;
6070 		set_window.base = 0;
6071 		set_window.WindowSize = get_window.size;
6072 		set_window.state = get_window.state & ~WS_ENABLED;
6073 
6074 		cs_set_acc_attributes(&set_window, Attributes);
6075 
6076 		SocketServices(SS_SetWindow, &set_window);
6077 	    } /* IO_DISABLE_WINDOW */
6078 
6079 	    return (CS_SUCCESS);
6080 
6081 	} /* if (IO_DEALLOCATE_WINDOW | IO_DISABLE_WINDOW) */
6082 
6083 	/*
6084 	 * See if we can allow Socket Services to select the base address
6085 	 *	value for this card; if the client has specified a non-zero
6086 	 *	base IO address but the card doesn't decode enough IO
6087 	 *	address lines to uniquely use that address, then we have
6088 	 *	the flexibility to choose an alternative base address.
6089 	 * XXX - Is this really correct in all cases?
6090 	 */
6091 	if (!IOAddrLines)
6092 	    Base->base = 0;
6093 	else
6094 	    Base->base = IOADDR_FROBNITZ(Base->base, IOAddrLines);
6095 
6096 	set_window.socket = sn;
6097 	set_window.window = wn;
6098 	set_window.speed = IO_WIN_SPEED;
6099 	set_window.base = Base->base;
6100 	set_window.WindowSize = *NumPorts;
6101 	set_window.state = (WS_ENABLED | WS_IO |
6102 			((Attributes & IO_DATA_PATH_WIDTH_16)?WS_16BIT:0));
6103 
6104 	cs_set_acc_attributes(&set_window, Attributes);
6105 
6106 	if (SocketServices(SS_SetWindow, &set_window) != SUCCESS)
6107 	    return (CS_BAD_WINDOW);
6108 
6109 	Base->base = set_window.base;
6110 	Base->handle = set_window.handle;
6111 	*NumPorts = set_window.WindowSize;
6112 
6113 	return (CS_SUCCESS);
6114 }
6115 
6116 /*
6117  * ==== IRQ handling functions ====
6118  */
6119 
6120 /*
6121  * cs_request_irq - add's client's IRQ handler; supports RequestIRQ
6122  *
6123  *	calling: irq_req_t.Attributes - must have the IRQ_TYPE_EXCLUSIVE
6124  *			flag set, and all other flags clear, or
6125  *			CS_BAD_ATTRIBUTE will be returned
6126  *
6127  *	returns: CS_SUCCESS - if IRQ resources available for client
6128  *		 CS_BAD_IRQ - if IRQ can not be allocated
6129  *		 CS_BAD_HANDLE - client handle is invalid
6130  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
6131  *		 CS_NO_CARD - if no card is in socket
6132  *		 CS_BAD_ATTRIBUTE - if any of the unsupported Attribute
6133  *					flags are set
6134  *		 CS_CONFIGURATION_LOCKED - a RequestConfiguration has
6135  *					already been done
6136  *		 CS_IN_USE - IRQ ports already in use or function has
6137  *					already been called
6138  *
6139  * Note: We only allow level-mode interrupts.
6140  */
6141 static int
6142 cs_request_irq(client_handle_t client_handle, irq_req_t *irqr)
6143 {
6144 	cs_socket_t *sp;
6145 	client_t *client;
6146 	set_irq_handler_t set_irq_handler;
6147 	int error;
6148 	int client_lock_acquired;
6149 
6150 	/*
6151 	 * Check to see if this is the Socket Services client handle; if it
6152 	 *	is, we don't support SS using this call.
6153 	 */
6154 	if (CLIENT_HANDLE_IS_SS(client_handle))
6155 	    return (CS_UNSUPPORTED_FUNCTION);
6156 
6157 	/*
6158 	 * Make sure that none of the unsupported or reserved flags are set.
6159 	 */
6160 	if ((irqr->Attributes &	(IRQ_TYPE_TIME | IRQ_TYPE_DYNAMIC_SHARING |
6161 				IRQ_FIRST_SHARED | IRQ_PULSE_ALLOCATED |
6162 				IRQ_FORCED_PULSE)) ||
6163 		!(irqr->Attributes & IRQ_TYPE_EXCLUSIVE))
6164 	    return (CS_BAD_ATTRIBUTE);
6165 
6166 	/*
6167 	 * Get a pointer to this client's socket structure.
6168 	 */
6169 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
6170 	    return (CS_BAD_SOCKET);
6171 
6172 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
6173 
6174 	/*
6175 	 *  Make sure that this is a valid client handle.
6176 	 */
6177 	if (!(client = cs_find_client(client_handle, &error))) {
6178 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6179 	    return (error);
6180 	}
6181 
6182 	/*
6183 	 * If RequestConfiguration has already been done, we don't allow
6184 	 *	this call.
6185 	 */
6186 	if (client->flags & REQ_CONFIGURATION_DONE) {
6187 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6188 	    return (CS_CONFIGURATION_LOCKED);
6189 	}
6190 
6191 	/*
6192 	 * If RequestIRQ has already been done, we don't allow this call.
6193 	 */
6194 	if (client->flags & REQ_IRQ_DONE) {
6195 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6196 	    return (CS_IN_USE);
6197 	}
6198 
6199 	/*
6200 	 * If there's no card in the socket or the card in the socket is not
6201 	 *	for this client, then return an error.
6202 	 */
6203 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
6204 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6205 	    return (CS_NO_CARD);
6206 	}
6207 
6208 	/*
6209 	 * Set up the parameters and ask Socket Services to give us an IRQ
6210 	 *	for this client.  We don't really do much, since the IRQ
6211 	 *	resources are managed by SS and the kernel.  We also don't
6212 	 *	care which IRQ level we are given.
6213 	 */
6214 	set_irq_handler.socket =
6215 		CS_MAKE_SOCKET_NUMBER(GET_CLIENT_SOCKET(client_handle),
6216 					GET_CLIENT_FUNCTION(client_handle));
6217 	set_irq_handler.irq = IRQ_ANY;
6218 
6219 	set_irq_handler.handler_id = client_handle;
6220 	set_irq_handler.handler = (f_t *)irqr->irq_handler;
6221 	set_irq_handler.arg1 = irqr->irq_handler_arg;
6222 	set_irq_handler.arg2 = NULL;
6223 
6224 	if ((error = SocketServices(SS_SetIRQHandler,
6225 					&set_irq_handler)) != SUCCESS) {
6226 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6227 	    return (CS_BAD_IRQ);
6228 	}
6229 
6230 	irqr->iblk_cookie = set_irq_handler.iblk_cookie;
6231 	irqr->idev_cookie = set_irq_handler.idev_cookie;
6232 
6233 	/*
6234 	 * Save the allocated IRQ information for this client.
6235 	 */
6236 	client->irq_alloc.Attributes = irqr->Attributes;
6237 	client->irq_alloc.irq = set_irq_handler.irq;
6238 	client->irq_alloc.handler_id = set_irq_handler.handler_id;
6239 	client->irq_alloc.irq_handler = (f_t *)set_irq_handler.handler;
6240 	client->irq_alloc.irq_handler_arg1 = set_irq_handler.arg1;
6241 	client->irq_alloc.irq_handler_arg2 = set_irq_handler.arg2;
6242 
6243 #ifdef	CS_DEBUG
6244 	if (cs_debug > 0)
6245 	    cmn_err(CE_CONT, "cs_request_irq: socket %d irqr->Attributes 0x%x "
6246 						"set_irq_handler.irq 0x%x\n",
6247 						sp->socket_num,
6248 						(int)irqr->Attributes,
6249 						set_irq_handler.irq);
6250 #endif
6251 
6252 	/*
6253 	 * Mark this client as having done a successful RequestIRQ call.
6254 	 */
6255 	client->flags |= (REQ_IRQ_DONE | CLIENT_IRQ_ALLOCATED);
6256 
6257 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6258 	return (CS_SUCCESS);
6259 }
6260 
6261 /*
6262  * cs_release_irq - releases IRQ resources allocated by RequestIRQ; this is
6263  *			ReleaseIRQ
6264  *
6265  *	calling: cs_release_irq(client_handle_t, irq_req_t *)
6266  *
6267  *	returns: CS_SUCCESS - if IRQ resources sucessfully deallocated
6268  *		 CS_BAD_IRQ - if IRQ can not be deallocated
6269  *		 CS_BAD_HANDLE - client handle is invalid
6270  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
6271  *		 CS_CONFIGURATION_LOCKED - a RequestConfiguration has been
6272  *				done without a ReleaseConfiguration
6273  *		 CS_IN_USE - no RequestIRQ has been done
6274  */
6275 static int
6276 cs_release_irq(client_handle_t client_handle, irq_req_t *irqr)
6277 {
6278 	cs_socket_t *sp;
6279 	client_t *client;
6280 	clear_irq_handler_t clear_irq_handler;
6281 	int error;
6282 	int client_lock_acquired;
6283 
6284 #ifdef	lint
6285 	irqr = NULL;
6286 #endif
6287 
6288 	/*
6289 	 * Check to see if this is the Socket Services client handle; if it
6290 	 *	is, we don't support SS using this call.
6291 	 */
6292 	if (CLIENT_HANDLE_IS_SS(client_handle))
6293 	    return (CS_UNSUPPORTED_FUNCTION);
6294 
6295 	/*
6296 	 * Get a pointer to this client's socket structure.
6297 	 */
6298 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
6299 	    return (CS_BAD_SOCKET);
6300 
6301 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
6302 
6303 	/*
6304 	 *  Make sure that this is a valid client handle.
6305 	 */
6306 	if (!(client = cs_find_client(client_handle, &error))) {
6307 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6308 	    return (error);
6309 	}
6310 
6311 	/*
6312 	 * If RequestConfiguration has already been done, we don't allow
6313 	 *	this call.
6314 	 */
6315 	if (client->flags & REQ_CONFIGURATION_DONE) {
6316 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6317 	    return (CS_CONFIGURATION_LOCKED);
6318 	}
6319 
6320 	/*
6321 	 * If RequestIRQ has not been done, we don't allow this call.
6322 	 */
6323 	if (!(client->flags & REQ_IRQ_DONE)) {
6324 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6325 	    return (CS_IN_USE);
6326 	}
6327 
6328 	/*
6329 	 * Tell Socket Services that we want to deregister this client's
6330 	 *	IRQ handler.
6331 	 */
6332 	clear_irq_handler.socket =
6333 		CS_MAKE_SOCKET_NUMBER(GET_CLIENT_SOCKET(client_handle),
6334 				GET_CLIENT_FUNCTION(client_handle));
6335 	clear_irq_handler.handler_id = client->irq_alloc.handler_id;
6336 	clear_irq_handler.handler = (f_t *)client->irq_alloc.irq_handler;
6337 
6338 	/*
6339 	 * At this point, we should never fail this SS call; if we do, it
6340 	 *	means that there is an internal consistancy error in either
6341 	 *	Card Services or Socket Services.
6342 	 */
6343 	if ((error = SocketServices(SS_ClearIRQHandler, &clear_irq_handler)) !=
6344 								SUCCESS) {
6345 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6346 	    return (CS_BAD_IRQ);
6347 	}
6348 
6349 	/*
6350 	 * Mark the client as not having any IRQ resources allocated.
6351 	 */
6352 	client->flags &= ~(REQ_IRQ_DONE | CLIENT_IRQ_ALLOCATED);
6353 
6354 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6355 	return (CS_SUCCESS);
6356 }
6357 
6358 /*
6359  * ==== configuration handling functions ====
6360  */
6361 
6362 /*
6363  * cs_request_configuration - sets up socket and card configuration on behalf
6364  *		of the client; this is RequestConfiguration
6365  *
6366  *	returns: CS_SUCCESS - if configuration sucessfully set
6367  *		 CS_BAD_SOCKET - if Socket Services returns an error
6368  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
6369  *		 CS_BAD_ATTRIBUTE - if any unsupported or reserved flags
6370  *					are set
6371  *		 CS_BAD_TYPE - if the socket doesn't support a mem and IO
6372  *				interface (SOCKET_INTERFACE_MEMORY_AND_IO set)
6373  *		 CS_CONFIGURATION_LOCKED - a RequestConfiguration has
6374  *					already been done
6375  *		 CS_BAD_VCC - if Vcc value is not supported by socket
6376  *		 CS_BAD_VPP1 - if Vpp1 value is not supported by socket
6377  *		 CS_BAD_VPP2 - if Vpp2 value is not supported by socket
6378  *
6379  * Bug ID: 1193637 - Card Services RequestConfiguration does not conform
6380  *	to PCMCIA standard
6381  * We allow clients to do a RequestConfiguration even if they haven't
6382  *	done a RequestIO or RequestIRQ.
6383  */
6384 static int
6385 cs_request_configuration(client_handle_t client_handle, config_req_t *cr)
6386 {
6387 	cs_socket_t *sp;
6388 	client_t *client;
6389 	volatile config_regs_t *crt;
6390 	set_socket_t set_socket;
6391 	get_socket_t get_socket;
6392 	acc_handle_t cis_handle;
6393 	int error;
6394 	uint32_t newoffset;
6395 	int client_lock_acquired;
6396 
6397 	/*
6398 	 * Check to see if this is the Socket Services client handle; if it
6399 	 *	is, we don't support SS using this call.
6400 	 */
6401 	if (CLIENT_HANDLE_IS_SS(client_handle))
6402 	    return (CS_UNSUPPORTED_FUNCTION);
6403 
6404 #ifdef	XXX
6405 	/*
6406 	 * If the client specifies Vcc = 0 and any non-zero value for
6407 	 *	either of the Vpp members, that's an illegal condition.
6408 	 */
6409 	if (!(cr->Vcc) && (cr->Vpp1 || cr->Vpp2))
6410 	    return (CS_BAD_VCC);
6411 #endif
6412 
6413 	/*
6414 	 * Get a pointer to this client's socket structure.
6415 	 */
6416 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
6417 	    return (CS_BAD_SOCKET);
6418 
6419 	/*
6420 	 * If the client is asking for a memory and IO interface on this
6421 	 *	socket, then check the socket capabilities to be sure that
6422 	 *	this socket supports this configuration.
6423 	 */
6424 	if (cr->IntType & SOCKET_INTERFACE_MEMORY_AND_IO) {
6425 	    inquire_socket_t inquire_socket;
6426 
6427 	    inquire_socket.socket = sp->socket_num;
6428 
6429 	    if (SocketServices(SS_InquireSocket, &inquire_socket) != SUCCESS)
6430 		return (CS_BAD_SOCKET);
6431 
6432 	    if (!(inquire_socket.SocketCaps & IF_IO))
6433 		return (CS_BAD_TYPE);
6434 
6435 	} /* if (SOCKET_INTERFACE_MEMORY_AND_IO) */
6436 
6437 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
6438 
6439 	/*
6440 	 *  Make sure that this is a valid client handle.
6441 	 */
6442 	if (!(client = cs_find_client(client_handle, &error))) {
6443 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6444 	    return (error);
6445 	}
6446 
6447 	/*
6448 	 * If RequestConfiguration has already been done, we don't allow
6449 	 *	this call.
6450 	 */
6451 	if (client->flags & REQ_CONFIGURATION_DONE) {
6452 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6453 	    return (CS_CONFIGURATION_LOCKED);
6454 	}
6455 
6456 	/*
6457 	 * If there's no card in the socket or the card in the socket is not
6458 	 *	for this client, then return an error.
6459 	 */
6460 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
6461 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6462 	    return (CS_NO_CARD);
6463 	}
6464 
6465 	/*
6466 	 * At this point, most of the client's calling parameters have been
6467 	 *	validated, so we can go ahead and configure the socket and
6468 	 *	the card.
6469 	 */
6470 	mutex_enter(&sp->cis_lock);
6471 
6472 	/*
6473 	 * Configure the socket with the interface type and voltages requested
6474 	 *	by the client.
6475 	 */
6476 	get_socket.socket = sp->socket_num;
6477 
6478 	if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS) {
6479 	    mutex_exit(&sp->cis_lock);
6480 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6481 	    return (CS_BAD_SOCKET);
6482 	}
6483 
6484 #ifdef	CS_DEBUG
6485 	if (cs_debug > 0)
6486 	    cmn_err(CE_CONT, "cs_request_configuration: socket %d "
6487 					"client->irq_alloc.irq 0x%x "
6488 					"get_socket.IRQRouting 0x%x\n",
6489 						sp->socket_num,
6490 						(int)client->irq_alloc.irq,
6491 						get_socket.IRQRouting);
6492 #endif
6493 
6494 	bzero(&set_socket, sizeof (set_socket));
6495 	set_socket.socket = sp->socket_num;
6496 	set_socket.IREQRouting = client->irq_alloc.irq & ~IRQ_ENABLE;
6497 
6498 	set_socket.CtlInd = get_socket.CtlInd;
6499 	set_socket.State = 0;	/* don't reset latched values */
6500 
6501 	if (cs_convert_powerlevel(sp->socket_num, cr->Vcc, VCC,
6502 					&set_socket.VccLevel) != CS_SUCCESS) {
6503 	    mutex_exit(&sp->cis_lock);
6504 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6505 	    return (CS_BAD_VCC);
6506 	}
6507 
6508 	if (cs_convert_powerlevel(sp->socket_num, cr->Vpp1, VPP1,
6509 					&set_socket.Vpp1Level) != CS_SUCCESS) {
6510 	    mutex_exit(&sp->cis_lock);
6511 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6512 	    return (CS_BAD_VPP);
6513 	}
6514 
6515 	if (cs_convert_powerlevel(sp->socket_num, cr->Vpp2, VPP2,
6516 					&set_socket.Vpp2Level) != CS_SUCCESS) {
6517 	    mutex_exit(&sp->cis_lock);
6518 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6519 	    return (CS_BAD_VPP);
6520 	}
6521 
6522 	if (!(cr->IntType & SOCKET_INTERFACE_MEMORY_AND_IO))
6523 		set_socket.IFType = IF_MEMORY;
6524 	else {
6525 		set_socket.IFType = IF_IO;
6526 
6527 		/*
6528 		 * The Cirrus Logic PD6710/672X/others? adapters will write
6529 		 * protect the CIS if the socket is in MEMORY mode and the
6530 		 * WP/IOCS16 pin is true.  When this happens, the CIS registers
6531 		 * will fail to be written.  Go ahead and set the socket,
6532 		 * even though the event mask isn't complete yet, so we can
6533 		 * configure the adapter.  Afterwards, set the socket again
6534 		 * to make sure the event mask is correct.
6535 		 */
6536 		if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS) {
6537 			sp->flags &= ~SOCKET_IS_IO;
6538 			mutex_exit(&sp->cis_lock);
6539 			EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6540 			return (CS_BAD_SOCKET);
6541 		}
6542 	}
6543 
6544 	if (cs_rc2_delay)
6545 	    drv_usecwait(cs_rc2_delay * 1000);
6546 
6547 	/*
6548 	 * Get a pointer to a window that contains the configuration
6549 	 *	registers.
6550 	 */
6551 	mutex_enter(&sp->lock);
6552 	client->config_regs_offset = cr->ConfigBase;
6553 	newoffset = client->config_regs_offset;
6554 	mutex_exit(&sp->lock);
6555 	if (cs_init_cis_window(sp, &newoffset, &cis_handle,
6556 					CISTPLF_AM_SPACE) != CS_SUCCESS) {
6557 	    mutex_exit(&sp->cis_lock);
6558 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6559 	    cmn_err(CE_CONT, "cs_request_configuration: socket %d can't init "
6560 				"CIS window\n", sp->socket_num);
6561 	    return (CS_GENERAL_FAILURE);
6562 	}
6563 
6564 	/*
6565 	 * Setup the config register pointers.
6566 	 * Note that these pointers are not the complete virtual address;
6567 	 *	the complete address is constructed each time the registers
6568 	 *	are accessed.
6569 	 */
6570 	mutex_enter(&sp->lock);
6571 	crt = &client->config_regs;
6572 	client->present = cr->Present;
6573 
6574 	bzero((char *)crt, sizeof (config_regs_t));
6575 
6576 	/* Configuration Option Register */
6577 	if (client->present & CONFIG_OPTION_REG_PRESENT)
6578 	    crt->cor_p = (newoffset + CONFIG_OPTION_REG_OFFSET);
6579 
6580 	/* Configuration and Status Register */
6581 	if (client->present & CONFIG_STATUS_REG_PRESENT)
6582 	    crt->ccsr_p = (newoffset + CONFIG_STATUS_REG_OFFSET);
6583 
6584 	/* Pin Replacement Register */
6585 	if (client->present & CONFIG_PINREPL_REG_PRESENT)
6586 	    crt->prr_p = (newoffset + CONFIG_PINREPL_REG_OFFSET);
6587 
6588 	/* Socket and Copy Register */
6589 	if (client->present & CONFIG_COPY_REG_PRESENT)
6590 	    crt->scr_p = (newoffset + CONFIG_COPY_REG_OFFSET);
6591 
6592 	/* Extended Status Register */
6593 	if (client->present & CONFIG_EXSTAT_REG_PRESENT)
6594 	    crt->exstat_p = (newoffset + CONFIG_EXSTAT_REG_OFFSET);
6595 
6596 	/* IO Base 0 Register */
6597 	if (client->present & CONFIG_IOBASE0_REG_PRESENT)
6598 	    crt->iobase0_p = (newoffset + CONFIG_IOBASE0_REG_OFFSET);
6599 
6600 	/* IO Base 1 Register */
6601 	if (client->present & CONFIG_IOBASE1_REG_PRESENT)
6602 	    crt->iobase1_p = (newoffset + CONFIG_IOBASE1_REG_OFFSET);
6603 
6604 	/* IO Base 2 Register */
6605 	if (client->present & CONFIG_IOBASE2_REG_PRESENT)
6606 	    crt->iobase2_p = (newoffset + CONFIG_IOBASE2_REG_OFFSET);
6607 
6608 	/* IO Base 3 Register */
6609 	if (client->present & CONFIG_IOBASE3_REG_PRESENT)
6610 	    crt->iobase3_p = (newoffset + CONFIG_IOBASE3_REG_OFFSET);
6611 
6612 	/* IO Limit Register */
6613 	if (client->present & CONFIG_IOLIMIT_REG_PRESENT)
6614 	    crt->iolimit_p = (newoffset + CONFIG_IOLIMIT_REG_OFFSET);
6615 
6616 	/*
6617 	 * Setup the bits in the PRR mask that are valid; this is easy, just
6618 	 *	copy the Pin value that the client gave us.  Note that for
6619 	 *	this to work, the client must set both of the XXX_STATUS
6620 	 *	and the XXX_EVENT bits in the Pin member.
6621 	 */
6622 	client->pin = cr->Pin;
6623 
6624 #ifdef	CS_DEBUG
6625 	if (cs_debug > 128)
6626 	    cmn_err(CE_CONT, "cs_request_configuration: client->pin 0x%x "
6627 		"client->config_regs_offset 0x%x newoffset 0x%x cor_p 0x%x "
6628 		"ccsr_p 0x%x prr_p 0x%x scr_p 0x%x\n",
6629 		client->pin, (int)client->config_regs_offset, newoffset,
6630 		(int)crt->cor_p, (int)crt->ccsr_p, (int)crt->prr_p,
6631 		(int)crt->scr_p);
6632 #endif
6633 
6634 	/*
6635 	 * If the socket isn't in IO mode, WP is asserted,  and we're going to
6636 	 * write any of the config registers, issue a warning.
6637 	 */
6638 	if ((client->present != 0) &&
6639 	    (!(cr->IntType & SOCKET_INTERFACE_MEMORY_AND_IO)) &&
6640 	    (get_socket.state & SBM_WP)) {
6641 		cmn_err(CE_NOTE, "!cs_request_configuration: attempting to "
6642 		    "write CIS config regs with WP set\n");
6643 	}
6644 
6645 	/*
6646 	 * Write any configuration registers that the client tells us are
6647 	 *	present to the card; save a copy of what we wrote so that we
6648 	 *	can return them if the client calls GetConfigurationInfo.
6649 	 * The order in which we write the configuration registers is
6650 	 *	specified by the PCMCIA spec; we must write the socket/copy
6651 	 *	register first (if it exists), and then we can write the
6652 	 *	registers in any arbitrary order.
6653 	 */
6654 	/* Socket and Copy Register */
6655 	if (client->present & CONFIG_COPY_REG_PRESENT) {
6656 	    crt->scr = cr->Copy;
6657 	    csx_Put8(cis_handle, crt->scr_p, crt->scr);
6658 	}
6659 
6660 	/* Pin Replacement Register */
6661 	if (client->present & CONFIG_PINREPL_REG_PRESENT) {
6662 	    crt->prr = cr->Pin;
6663 	    csx_Put8(cis_handle, crt->prr_p, crt->prr);
6664 	}
6665 
6666 	/* Configuration and Status Register */
6667 	/* XXX should we set CCSR_SIG_CHG in the CCSR? XXX */
6668 	if (client->present & CONFIG_STATUS_REG_PRESENT) {
6669 	    crt->ccsr = cr->Status;
6670 	    csx_Put8(cis_handle, crt->ccsr_p, crt->ccsr);
6671 	}
6672 
6673 	/* Extended Status Register */
6674 	if (client->present & CONFIG_EXSTAT_REG_PRESENT) {
6675 	    crt->exstat = cr->ExtendedStatus;
6676 	    csx_Put8(cis_handle, crt->exstat_p, crt->exstat);
6677 	}
6678 
6679 	/*
6680 	 * If any IO base and limit registers exist, and this client
6681 	 *	has done a RequestIO, setup the IO Base and IO Limit
6682 	 *	registers.
6683 	 */
6684 	if (client->flags & REQ_IO_DONE) {
6685 	    if (client->present & CONFIG_IOBASE0_REG_PRESENT) {
6686 		uint32_t base = client->io_alloc.BasePort1.base;
6687 		uint32_t present = (client->present &
6688 					CONFIG_IOBASE_REG_MASK) >>
6689 						CONFIG_IOBASE_REG_SHIFT;
6690 		uint32_t reg = crt->iobase0_p;
6691 
6692 		do {
6693 		    csx_Put8(cis_handle, reg, base & 0x0ff);
6694 		    reg = reg + 2;
6695 		    base = base >> 8;
6696 		    present = present >> 1;
6697 		} while (present);
6698 	    } /* CONFIG_IOBASE0_REG_PRESENT */
6699 
6700 	    if (client->present & CONFIG_IOLIMIT_REG_PRESENT) {
6701 		uint32_t np = client->io_alloc.NumPorts1 +
6702 					client->io_alloc.NumPorts2;
6703 		uint32_t limit, do_bit = 0;
6704 		int lm;
6705 
6706 		limit = (IONUMPORTS_FROBNITZ(np) - 1);
6707 
6708 		for (lm = 7; lm >= 0; lm--) {
6709 		    if (limit & (1 << lm))
6710 			do_bit = 1;
6711 		    if (do_bit)
6712 			limit |= (1 << lm);
6713 		} /* for */
6714 
6715 		csx_Put8(cis_handle, crt->iolimit_p, limit);
6716 	    } /* CONFIG_IOLIMIT_REG_PRESENT */
6717 	} /* REQ_IO_DONE */
6718 
6719 	/*
6720 	 * Mark the socket as being in IO mode.
6721 	 */
6722 	if (cr->IntType & SOCKET_INTERFACE_MEMORY_AND_IO)
6723 	    sp->flags |= SOCKET_IS_IO;
6724 
6725 	mutex_exit(&sp->lock);
6726 
6727 	/*
6728 	 * Enable the interrupt if needed
6729 	 */
6730 	if (cr->Attributes & CONF_ENABLE_IRQ_STEERING)
6731 	    set_socket.IREQRouting |= IRQ_ENABLE;
6732 
6733 	/*
6734 	 * Now that we know if the PRR is present and if it is, which
6735 	 *	bits in the PRR are valid, we can construct the correct
6736 	 *	socket event mask.
6737 	 */
6738 	set_socket.SCIntMask = cs_merge_event_masks(sp, client);
6739 
6740 	/*
6741 	 * Configuration Option Register - we handle this specially since
6742 	 *	we don't allow the client to manipulate the RESET or
6743 	 *	INTERRUPT bits (although a client can manipulate these
6744 	 *	bits via an AccessConfigurationRegister call - explain
6745 	 *	THAT logic to me).
6746 	 * XXX - we force level-mode interrupts (COR_LEVEL_IRQ)
6747 	 * XXX - we always enable the function on a multi-function card
6748 	 */
6749 	if (client->present & CONFIG_OPTION_REG_PRESENT) {
6750 	    crt->cor = (cr->ConfigIndex & ~COR_SOFT_RESET) | COR_LEVEL_IRQ;
6751 	    if (client->present & CONFIG_IOBASE0_REG_PRESENT)
6752 		crt->cor |= COR_ENABLE_BASE_LIMIT;
6753 	    if (sp->cis_flags & CW_MULTI_FUNCTION_CIS) {
6754 		crt->cor |= COR_ENABLE_FUNCTION;
6755 		crt->cor &= ~COR_ENABLE_IREQ_ROUTING;
6756 		if (cr->Attributes & CONF_ENABLE_IRQ_STEERING)
6757 		    crt->cor |= COR_ENABLE_IREQ_ROUTING;
6758 	    } /* CW_MULTI_FUNCTION_CIS */
6759 
6760 #ifdef  CS_DEBUG
6761 	if (cs_debug > 0)
6762 		cmn_err(CE_CONT, "cs_request_configuration "
6763 		    "cor=x%x ConfigIndex=x%x Attributes=x%x flags=x%x\n"
6764 		    "present=x%x cis_handle=%p cor_p=x%x\n",
6765 		    crt->cor, cr->ConfigIndex, cr->Attributes, sp->cis_flags,
6766 		    client->present, cis_handle, crt->cor_p);
6767 #endif
6768 
6769 	    csx_Put8(cis_handle, crt->cor_p, crt->cor);
6770 	} /* CONFIG_OPTION_REG_PRESENT */
6771 
6772 	if (cs_rc1_delay)
6773 	    drv_usecwait(cs_rc1_delay * 1000);
6774 
6775 	/*
6776 	 * Set the socket to the parameters that the client requested.
6777 	 */
6778 	if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS) {
6779 	    if (client->present & CONFIG_OPTION_REG_PRESENT) {
6780 		crt->cor = 0; /* XXX is 0 the right thing here? */
6781 		csx_Put8(cis_handle, crt->cor_p, crt->cor);
6782 	    }
6783 	    sp->flags &= ~SOCKET_IS_IO;
6784 	    mutex_exit(&sp->cis_lock);
6785 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6786 	    return (CS_BAD_SOCKET);
6787 	}
6788 
6789 	if (cs_rc2_delay)
6790 	    drv_usecwait(cs_rc2_delay * 1000);
6791 
6792 	/*
6793 	 * Mark this client as having done a successful RequestConfiguration
6794 	 *	call.
6795 	 */
6796 	client->flags |= REQ_CONFIGURATION_DONE;
6797 
6798 	mutex_exit(&sp->cis_lock);
6799 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6800 
6801 	return (CS_SUCCESS);
6802 }
6803 
6804 /*
6805  * cs_release_configuration - releases configuration previously set via the
6806  *		RequestConfiguration call; this is ReleaseConfiguration
6807  *
6808  *	returns: CS_SUCCESS - if configuration sucessfully released
6809  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
6810  *		 CS_BAD_SOCKET - if Socket Services returns an error
6811  *		 CS_BAD_HANDLE - a RequestConfiguration has not been done
6812  */
6813 /*ARGSUSED*/
6814 static int
6815 cs_release_configuration(client_handle_t client_handle, release_config_t *rcfg)
6816 {
6817 	cs_socket_t *sp;
6818 	client_t *client;
6819 	volatile config_regs_t *crt;
6820 	set_socket_t set_socket;
6821 	get_socket_t get_socket;
6822 	acc_handle_t cis_handle;
6823 	int error;
6824 	uint32_t newoffset;
6825 	int client_lock_acquired;
6826 
6827 	/*
6828 	 * Check to see if this is the Socket Services client handle; if it
6829 	 *	is, we don't support SS using this call.
6830 	 */
6831 	if (CLIENT_HANDLE_IS_SS(client_handle))
6832 	    return (CS_UNSUPPORTED_FUNCTION);
6833 
6834 	/*
6835 	 * Get a pointer to this client's socket structure.
6836 	 */
6837 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
6838 	    return (CS_BAD_SOCKET);
6839 
6840 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
6841 
6842 	/*
6843 	 *  Make sure that this is a valid client handle.
6844 	 */
6845 	if (!(client = cs_find_client(client_handle, &error))) {
6846 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6847 	    return (error);
6848 	}
6849 
6850 	/*
6851 	 * If RequestConfiguration has not been done, we don't allow
6852 	 *	this call.
6853 	 */
6854 	if (!(client->flags & REQ_CONFIGURATION_DONE)) {
6855 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6856 	    return (CS_BAD_HANDLE);
6857 	}
6858 
6859 #ifdef  CS_DEBUG
6860 	if (cs_debug > 0)
6861 		cmn_err(CE_CONT, "cs_release_configuration: "
6862 		    "flags=0x%x CW_MULTI_FUNCTION_CIS =0x%x \n",
6863 		    sp->cis_flags, CW_MULTI_FUNCTION_CIS);
6864 
6865 #endif
6866 	mutex_enter(&sp->cis_lock);
6867 
6868 	/*
6869 	 * Set the card back to a memory-only interface byte writing a zero
6870 	 *	to the COR.  Note that we don't update our soft copy of the
6871 	 *	COR state since the PCMCIA spec only requires us to maintain
6872 	 *	the last value that was written to that register during a
6873 	 *	call to RequestConfiguration.
6874 	 */
6875 	crt = &client->config_regs;
6876 
6877 	newoffset = client->config_regs_offset;
6878 	if (cs_init_cis_window(sp, &newoffset, &cis_handle,
6879 					CISTPLF_AM_SPACE) != CS_SUCCESS) {
6880 	    mutex_exit(&sp->cis_lock);
6881 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6882 	    cmn_err(CE_CONT, "cs_release_configuration: socket %d can't init "
6883 				"CIS window\n", sp->socket_num);
6884 	    return (CS_GENERAL_FAILURE);
6885 	}
6886 
6887 	if (sp->cis_flags & CW_MULTI_FUNCTION_CIS) {
6888 		/*
6889 		 * For the Multifunction cards do not reset the socket
6890 		 * to a memory only interface but do clear the
6891 		 * Configuration Option Register and  mark this client
6892 		 * as not having a configuration by clearing the
6893 		 * REQ_CONFIGURATION_DONE flag.
6894 		 */
6895 		client->flags &= ~REQ_CONFIGURATION_DONE;
6896 		csx_Put8(cis_handle, crt->cor_p, 0);
6897 
6898 		mutex_exit(&sp->cis_lock);
6899 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6900 		return (CS_SUCCESS);
6901 	}
6902 
6903 	/*
6904 	 * Set the socket back to a memory-only interface; don't change
6905 	 *	any other parameter of the socket.
6906 	 */
6907 	get_socket.socket = sp->socket_num;
6908 
6909 	if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS) {
6910 	    mutex_exit(&sp->cis_lock);
6911 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6912 	    return (CS_BAD_SOCKET);
6913 	}
6914 
6915 	mutex_enter(&sp->lock);
6916 	sp->flags &= ~SOCKET_IS_IO;
6917 	set_socket.SCIntMask = cs_merge_event_masks(sp, client);
6918 	mutex_exit(&sp->lock);
6919 
6920 	set_socket.socket = sp->socket_num;
6921 	set_socket.IREQRouting = 0;
6922 	set_socket.CtlInd = get_socket.CtlInd;
6923 	set_socket.State = 0;	/* don't reset latched values */
6924 	set_socket.VccLevel = get_socket.VccLevel;
6925 	set_socket.Vpp1Level = get_socket.Vpp1Level;
6926 	set_socket.Vpp2Level = get_socket.Vpp2Level;
6927 	set_socket.IFType = IF_MEMORY;
6928 
6929 	if (client->present & CONFIG_OPTION_REG_PRESENT)
6930 	    csx_Put8(cis_handle, crt->cor_p, 0);
6931 
6932 	if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS) {
6933 	    mutex_exit(&sp->cis_lock);
6934 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6935 	    return (CS_BAD_SOCKET);
6936 	}
6937 
6938 	/*
6939 	 * Mark this client as not having a configuration.
6940 	 */
6941 	client->flags &= ~REQ_CONFIGURATION_DONE;
6942 
6943 	mutex_exit(&sp->cis_lock);
6944 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6945 
6946 	return (CS_SUCCESS);
6947 }
6948 
6949 /*
6950  * cs_modify_configuration - modifies a configuration established by
6951  *		RequestConfiguration; this is ModifyConfiguration
6952  *
6953  *	returns: CS_SUCCESS - if configuration sucessfully modified
6954  *		 CS_BAD_SOCKET - if Socket Services returns an error
6955  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
6956  *		 CS_BAD_HANDLE - a RequestConfiguration has not been done
6957  *		 CS_NO_CARD - if no card in socket
6958  *		 CS_BAD_ATTRIBUTE - if any unsupported or reserved flags
6959  *					are set
6960  *		 CS_BAD_VCC - if Vcc value is not supported by socket
6961  *		 CS_BAD_VPP1 - if Vpp1 value is not supported by socket
6962  *		 CS_BAD_VPP2 - if Vpp2 value is not supported by socket
6963  */
6964 static int
6965 cs_modify_configuration(client_handle_t client_handle, modify_config_t *mc)
6966 {
6967 	cs_socket_t *sp;
6968 	client_t *client;
6969 	set_socket_t set_socket;
6970 	get_socket_t get_socket;
6971 	int error;
6972 	int client_lock_acquired;
6973 
6974 	/*
6975 	 * Check to see if this is the Socket Services client handle; if it
6976 	 *	is, we don't support SS using this call.
6977 	 */
6978 	if (CLIENT_HANDLE_IS_SS(client_handle))
6979 	    return (CS_UNSUPPORTED_FUNCTION);
6980 
6981 	/*
6982 	 * Get a pointer to this client's socket structure.
6983 	 */
6984 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
6985 	    return (CS_BAD_SOCKET);
6986 
6987 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
6988 
6989 	/*
6990 	 *  Make sure that this is a valid client handle.
6991 	 */
6992 	if (!(client = cs_find_client(client_handle, &error))) {
6993 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
6994 	    return (error);
6995 	}
6996 
6997 	/*
6998 	 * If RequestConfiguration has not been done, we don't allow
6999 	 *	this call.
7000 	 */
7001 	if (!(client->flags & REQ_CONFIGURATION_DONE)) {
7002 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7003 	    return (CS_BAD_HANDLE);
7004 	}
7005 
7006 	/*
7007 	 * If there's no card in the socket or the card in the socket is not
7008 	 *	for this client, then return an error.
7009 	 */
7010 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
7011 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7012 	    return (CS_NO_CARD);
7013 	}
7014 
7015 	/*
7016 	 * Get the current socket parameters so that we can modify them.
7017 	 */
7018 	get_socket.socket = sp->socket_num;
7019 
7020 	if (SocketServices(SS_GetSocket, &get_socket) != SUCCESS) {
7021 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7022 	    return (CS_BAD_SOCKET);
7023 	}
7024 
7025 #ifdef	CS_DEBUG
7026 	if (cs_debug > 0)
7027 	    cmn_err(CE_CONT, "cs_modify_configuration: socket %d "
7028 				"client->irq_alloc.irq 0x%x "
7029 				"get_socket.IRQRouting 0x%x\n",
7030 				sp->socket_num, (int)client->irq_alloc.irq,
7031 				get_socket.IRQRouting);
7032 #endif
7033 
7034 	set_socket.socket = sp->socket_num;
7035 	set_socket.SCIntMask = get_socket.SCIntMask;
7036 	set_socket.CtlInd = get_socket.CtlInd;
7037 	set_socket.State = 0;	/* don't reset latched values */
7038 	set_socket.IFType = get_socket.IFType;
7039 
7040 	set_socket.IREQRouting = get_socket.IRQRouting;
7041 
7042 	/*
7043 	 * Modify the IRQ routing if the client wants it modified.
7044 	 */
7045 	if (mc->Attributes & CONF_IRQ_CHANGE_VALID) {
7046 	    set_socket.IREQRouting &= ~IRQ_ENABLE;
7047 
7048 	    if ((sp->cis_flags & CW_MULTI_FUNCTION_CIS) &&
7049 			(client->present & CONFIG_OPTION_REG_PRESENT)) {
7050 		config_regs_t *crt = &client->config_regs;
7051 		acc_handle_t cis_handle;
7052 		uint32_t newoffset = client->config_regs_offset;
7053 
7054 		/*
7055 		 * Get a pointer to a window that contains the configuration
7056 		 *	registers.
7057 		 */
7058 		if (cs_init_cis_window(sp, &newoffset, &cis_handle,
7059 					CISTPLF_AM_SPACE) != CS_SUCCESS) {
7060 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7061 		    cmn_err(CE_CONT,
7062 			"cs_modify_configuration: socket %d can't init "
7063 			"CIS window\n", sp->socket_num);
7064 		    return (CS_GENERAL_FAILURE);
7065 		} /* cs_init_cis_window */
7066 
7067 		crt->cor &= ~COR_ENABLE_IREQ_ROUTING;
7068 
7069 		if (mc->Attributes & CONF_ENABLE_IRQ_STEERING)
7070 		    crt->cor |= COR_ENABLE_IREQ_ROUTING;
7071 
7072 #ifdef  CS_DEBUG
7073 		if (cs_debug > 0)
7074 			cmn_err(CE_CONT, "cs_modify_configuration:"
7075 			    " cor_p=0x%x cor=0x%x\n",
7076 			    crt->cor_p, crt->cor);
7077 #endif
7078 		csx_Put8(cis_handle, crt->cor_p, crt->cor);
7079 
7080 	    } /* CW_MULTI_FUNCTION_CIS */
7081 
7082 	    if (mc->Attributes & CONF_ENABLE_IRQ_STEERING)
7083 		set_socket.IREQRouting |= IRQ_ENABLE;
7084 
7085 	} /* CONF_IRQ_CHANGE_VALID */
7086 
7087 	/*
7088 	 * Modify the voltage levels that the client specifies.
7089 	 */
7090 	set_socket.VccLevel = get_socket.VccLevel;
7091 
7092 	if (mc->Attributes & CONF_VPP1_CHANGE_VALID) {
7093 	    if (cs_convert_powerlevel(sp->socket_num, mc->Vpp1, VPP1,
7094 					&set_socket.Vpp1Level) != CS_SUCCESS) {
7095 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7096 		return (CS_BAD_VPP);
7097 	    }
7098 	} else {
7099 	    set_socket.Vpp1Level = get_socket.Vpp1Level;
7100 	}
7101 
7102 	if (mc->Attributes & CONF_VPP2_CHANGE_VALID) {
7103 	    if (cs_convert_powerlevel(sp->socket_num, mc->Vpp2, VPP2,
7104 					&set_socket.Vpp2Level) != CS_SUCCESS) {
7105 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7106 		return (CS_BAD_VPP);
7107 	    }
7108 	} else {
7109 	    set_socket.Vpp2Level = get_socket.Vpp2Level;
7110 	}
7111 
7112 	/*
7113 	 * Setup the modified socket configuration.
7114 	 */
7115 	if (SocketServices(SS_SetSocket, &set_socket) != SUCCESS) {
7116 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7117 	    return (CS_BAD_SOCKET);
7118 	}
7119 
7120 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7121 	return (CS_SUCCESS);
7122 }
7123 
7124 /*
7125  * cs_access_configuration_register - provides a client access to the card's
7126  *		configuration registers; this is AccessConfigurationRegister
7127  *
7128  *	returns: CS_SUCCESS - if register accessed successfully
7129  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
7130  *		 CS_BAD_ARGS - if arguments are out of range
7131  *		 CS_NO_CARD - if no card in socket
7132  *		 CS_BAD_BASE - if no config registers base address
7133  *		 CS_UNSUPPORTED_MODE - if no RequestConfiguration has
7134  *				been done yet
7135  */
7136 static int
7137 cs_access_configuration_register(client_handle_t client_handle,
7138 						access_config_reg_t *acr)
7139 {
7140 	cs_socket_t *sp;
7141 	client_t *client;
7142 	acc_handle_t cis_handle;
7143 	int error;
7144 	uint32_t newoffset;
7145 	int client_lock_acquired;
7146 
7147 	/*
7148 	 * Check to see if this is the Socket Services client handle; if it
7149 	 *	is, we don't support SS using this call.
7150 	 */
7151 	if (CLIENT_HANDLE_IS_SS(client_handle))
7152 	    return (CS_UNSUPPORTED_FUNCTION);
7153 
7154 	/*
7155 	 * Make sure that the specifed offset is in range.
7156 	 */
7157 	if (acr->Offset > ((CISTPL_CONFIG_MAX_CONFIG_REGS * 2) - 2))
7158 	    return (CS_BAD_ARGS);
7159 
7160 	/*
7161 	 * Get a pointer to this client's socket structure.
7162 	 */
7163 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
7164 	    return (CS_BAD_SOCKET);
7165 
7166 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7167 
7168 	/*
7169 	 *  Make sure that this is a valid client handle.
7170 	 */
7171 	if (!(client = cs_find_client(client_handle, &error))) {
7172 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7173 	    return (error);
7174 	}
7175 
7176 	/*
7177 	 * If there's no card in the socket or the card in the socket is not
7178 	 *	for this client, then return an error.
7179 	 */
7180 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
7181 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7182 	    return (CS_NO_CARD);
7183 	}
7184 
7185 	/*
7186 	 * If RequestConfiguration has not been done, we don't allow
7187 	 *	this call.
7188 	 */
7189 	if (!(client->flags & REQ_CONFIGURATION_DONE)) {
7190 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7191 	    return (CS_UNSUPPORTED_MODE);
7192 	}
7193 
7194 	mutex_enter(&sp->cis_lock);
7195 
7196 	/*
7197 	 * Get a pointer to the CIS window
7198 	 */
7199 	newoffset = client->config_regs_offset + acr->Offset;
7200 	if (cs_init_cis_window(sp, &newoffset, &cis_handle,
7201 					CISTPLF_AM_SPACE) != CS_SUCCESS) {
7202 	    mutex_exit(&sp->cis_lock);
7203 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7204 	    cmn_err(CE_CONT, "cs_ACR: socket %d can't init CIS window\n",
7205 							sp->socket_num);
7206 	    return (CS_GENERAL_FAILURE);
7207 	}
7208 
7209 	/*
7210 	 * Create the address for the config register that the client
7211 	 *	wants to access.
7212 	 */
7213 	mutex_enter(&sp->lock);
7214 
7215 #ifdef	CS_DEBUG
7216 	if (cs_debug > 1) {
7217 	    cmn_err(CE_CONT, "cs_ACR: config_regs_offset 0x%x "
7218 		"Offset 0x%x newoffset 0x%x\n",
7219 		(int)client->config_regs_offset,
7220 		(int)acr->Offset, newoffset);
7221 	}
7222 #endif
7223 
7224 	/*
7225 	 * Determine what the client wants us to do.  The client is
7226 	 *	allowed to specify any valid offset, even if it would
7227 	 *	cause an unimplemented configuration register to be
7228 	 *	accessed.
7229 	 */
7230 	error = CS_SUCCESS;
7231 	switch (acr->Action) {
7232 	    case CONFIG_REG_READ:
7233 		acr->Value = csx_Get8(cis_handle, newoffset);
7234 		break;
7235 	    case CONFIG_REG_WRITE:
7236 		csx_Put8(cis_handle, newoffset, acr->Value);
7237 		break;
7238 	    default:
7239 		error = CS_BAD_ARGS;
7240 		break;
7241 	} /* switch */
7242 
7243 	mutex_exit(&sp->lock);
7244 	mutex_exit(&sp->cis_lock);
7245 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7246 
7247 	return (error);
7248 }
7249 
7250 /*
7251  * ==== RESET and general info functions ====
7252  */
7253 
7254 /*
7255  * cs_reset_function - RESET the requested function on the card; this
7256  *			is ResetFunction
7257  *
7258  *    Note: We don't support this functionality yet, and the standard
7259  *		says it's OK to reutrn CS_IN_USE if we can't do this
7260  *		operation.
7261  */
7262 /*ARGSUSED*/
7263 static int
7264 cs_reset_function(client_handle_t ch, reset_function_t *rf)
7265 {
7266 	return (CS_IN_USE);
7267 }
7268 
7269 /*
7270  * cs_get_configuration_info - return configuration info for the passed
7271  *				socket and function number to the caller;
7272  *				this is GetConfigurationInfo
7273  */
7274 /*ARGSUSED*/
7275 static int
7276 cs_get_configuration_info(client_handle_t *chp, get_configuration_info_t *gci)
7277 {
7278 	cs_socket_t *sp;
7279 	uint32_t fn;
7280 	client_t *client;
7281 	int client_lock_acquired;
7282 
7283 	/*
7284 	 * Get a pointer to this client's socket structure.
7285 	 */
7286 	if ((sp = cs_get_sp(CS_GET_SOCKET_NUMBER(gci->Socket))) == NULL)
7287 	    return (CS_BAD_SOCKET);
7288 
7289 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7290 	mutex_enter(&sp->lock);
7291 
7292 	fn = CS_GET_FUNCTION_NUMBER(gci->Socket);
7293 
7294 	client = sp->client_list;
7295 	while (client) {
7296 
7297 	    if (GET_CLIENT_FUNCTION(client->client_handle) == fn) {
7298 
7299 		/*
7300 		 * If there's no card in the socket or the card in the
7301 		 *	socket is not for this client, then return
7302 		 *	an error.
7303 		 */
7304 		if (!(client->flags & CLIENT_CARD_INSERTED)) {
7305 		    mutex_exit(&sp->lock);
7306 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7307 		    return (CS_NO_CARD);
7308 		}
7309 
7310 		mutex_exit(&sp->lock);
7311 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7312 		return (CS_SUCCESS);
7313 
7314 	    } /* GET_CLIENT_FUNCTION == fn */
7315 
7316 	    client = client->next;
7317 	} /* while (client) */
7318 
7319 	mutex_exit(&sp->lock);
7320 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7321 
7322 	return (CS_BAD_SOCKET);
7323 }
7324 
7325 /*
7326  * cs_get_cardservices_info - return info about Card Services to the
7327  *	caller; this is GetCardServicesInfo
7328  */
7329 /*ARGSUSED*/
7330 static int
7331 cs_get_cardservices_info(client_handle_t ch, get_cardservices_info_t *gcsi)
7332 {
7333 	gcsi->Signature[0] = 'C';
7334 	gcsi->Signature[1] = 'S';
7335 	gcsi->NumSockets = cs_globals.num_sockets;
7336 	gcsi->Revision = CS_INTERNAL_REVISION_LEVEL;
7337 	gcsi->CSLevel = CS_VERSION;
7338 	gcsi->FuncsPerSocket = CIS_MAX_FUNCTIONS;
7339 	(void) strncpy(gcsi->VendorString,
7340 					CS_GET_CARDSERVICES_INFO_VENDOR_STRING,
7341 					CS_GET_CARDSERVICES_INFO_MAX_VS_LEN);
7342 
7343 	return (CS_SUCCESS);
7344 }
7345 
7346 /*
7347  * cs_get_physical_adapter_info - returns information about the requested
7348  *					physical adapter; this is
7349  *					GetPhysicalAdapterInfo
7350  *
7351  *	calling: client_handle_t:
7352  *			NULL - use map_log_socket_t->LogSocket member
7353  *				to specify logical socket number
7354  *			!NULL - extract logical socket number from
7355  *				client_handle_t
7356  *
7357  *	returns: CS_SUCCESS
7358  *		 CS_BAD_SOCKET - if client_handle_t is NULL and invalid
7359  *					socket number is specified in
7360  *					map_log_socket_t->LogSocket
7361  *		 CS_BAD_HANDLE - if client_handle_t is !NULL and invalid
7362  *					client handle is specified
7363  */
7364 static int
7365 cs_get_physical_adapter_info(client_handle_t ch,
7366 					get_physical_adapter_info_t *gpai)
7367 {
7368 	cs_socket_t *sp;
7369 	int client_lock_acquired;
7370 
7371 	if (ch == NULL)
7372 	    gpai->PhySocket = CS_GET_SOCKET_NUMBER(gpai->LogSocket);
7373 	else
7374 	    gpai->PhySocket = GET_CLIENT_SOCKET(ch);
7375 
7376 	/*
7377 	 * Determine if the passed socket number is valid or not.
7378 	 */
7379 	if ((sp = cs_get_sp(CS_GET_SOCKET_NUMBER(gpai->PhySocket))) == NULL)
7380 	    return ((ch == NULL) ? CS_BAD_SOCKET : CS_BAD_HANDLE);
7381 
7382 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7383 
7384 	/*
7385 	 * If we were passed a client handle, determine if it's valid or not.
7386 	 */
7387 	if (ch != NULL) {
7388 	    if (cs_find_client(ch, NULL) == NULL) {
7389 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7390 		return (CS_BAD_HANDLE);
7391 	    } /* cs_find_client */
7392 	} /* ch != NULL */
7393 
7394 	gpai->flags = sp->adapter.flags;
7395 	(void) strcpy(gpai->name, sp->adapter.name);
7396 	gpai->major = sp->adapter.major;
7397 	gpai->minor = sp->adapter.minor;
7398 	gpai->instance = sp->adapter.instance;
7399 	gpai->number = sp->adapter.number;
7400 	gpai->num_sockets = sp->adapter.num_sockets;
7401 	gpai->first_socket = sp->adapter.first_socket;
7402 
7403 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7404 
7405 	return (CS_SUCCESS);
7406 }
7407 
7408 /*
7409  * ==== general functions ====
7410  */
7411 
7412 /*
7413  * cs_map_log_socket - returns the physical socket number associated with
7414  *			either the passed client handle or the passed
7415  *			logical socket number; this is MapLogSocket
7416  *
7417  *	calling: client_handle_t:
7418  *			NULL - use map_log_socket_t->LogSocket member
7419  *				to specify logical socket number
7420  *			!NULL - extract logical socket number from
7421  *				client_handle_t
7422  *
7423  *	returns: CS_SUCCESS
7424  *		 CS_BAD_SOCKET - if client_handle_t is NULL and invalid
7425  *					socket number is specified in
7426  *					map_log_socket_t->LogSocket
7427  *		 CS_BAD_HANDLE - if client_handle_t is !NULL and invalid
7428  *					client handle is specified
7429  *
7430  * Note: We provide this function since the instance number of a client
7431  *		driver doesn't necessary correspond to the physical
7432  *		socket number
7433  */
7434 static int
7435 cs_map_log_socket(client_handle_t ch, map_log_socket_t *mls)
7436 {
7437 	cs_socket_t *sp;
7438 	int client_lock_acquired;
7439 
7440 	if (ch == NULL)
7441 	    mls->PhySocket = CS_GET_SOCKET_NUMBER(mls->LogSocket);
7442 	else
7443 	    mls->PhySocket = GET_CLIENT_SOCKET(ch);
7444 
7445 	/*
7446 	 * Determine if the passed socket number is valid or not.
7447 	 */
7448 	if ((sp = cs_get_sp(CS_GET_SOCKET_NUMBER(mls->PhySocket))) == NULL)
7449 	    return ((ch == NULL) ? CS_BAD_SOCKET : CS_BAD_HANDLE);
7450 
7451 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7452 
7453 	/*
7454 	 * If we were passed a client handle, determine if it's valid or not.
7455 	 */
7456 	if (ch != NULL) {
7457 	    if (cs_find_client(ch, NULL) == NULL) {
7458 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7459 		return (CS_BAD_HANDLE);
7460 	    } /* cs_find_client */
7461 	} /* ch != NULL */
7462 
7463 	mls->PhyAdapter = sp->adapter.number;
7464 
7465 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7466 
7467 	return (CS_SUCCESS);
7468 }
7469 
7470 /*
7471  * cs_convert_speed - convers nS to devspeed and devspeed to nS
7472  *
7473  * The actual function is is in the CIS parser module; this
7474  *	is only a wrapper.
7475  */
7476 static int
7477 cs_convert_speed(convert_speed_t *cs)
7478 {
7479 	return ((int)(uintptr_t)CIS_PARSER(CISP_CIS_CONV_DEVSPEED, cs));
7480 }
7481 
7482 /*
7483  * cs_convert_size - converts a devsize value to a size in bytes value
7484  *			or a size in bytes value to a devsize value
7485  *
7486  * The actual function is is in the CIS parser module; this
7487  *	is only a wrapper.
7488  */
7489 static int
7490 cs_convert_size(convert_size_t *cs)
7491 {
7492 	return ((int)(uintptr_t)CIS_PARSER(CISP_CIS_CONV_DEVSIZE, cs));
7493 }
7494 
7495 /*
7496  * cs_convert_powerlevel - converts a power level in tenths of a volt
7497  *			to a power table entry for the specified socket
7498  *
7499  *	returns: CS_SUCCESS - if volts converted to a valid power level
7500  *		 CS_BAD_ADAPTER - if SS_InquireAdapter fails
7501  *		 CS_BAD_ARGS - if volts are not supported on this socket
7502  *				and adapter
7503  */
7504 static int
7505 cs_convert_powerlevel(uint32_t sn, uint32_t volts, uint32_t flags, unsigned *pl)
7506 {
7507 	inquire_adapter_t inquire_adapter;
7508 	int i;
7509 
7510 #ifdef	lint
7511 	if (sn == 0)
7512 	    panic("lint panic");
7513 #endif
7514 
7515 	*pl = 0;
7516 
7517 	if (SocketServices(SS_InquireAdapter, &inquire_adapter) != SUCCESS)
7518 	    return (CS_BAD_ADAPTER);
7519 
7520 	for (i = 0; (i < inquire_adapter.NumPower); i++) {
7521 	    if ((inquire_adapter.power_entry[i].ValidSignals & flags) &&
7522 		(inquire_adapter.power_entry[i].PowerLevel == volts)) {
7523 		*pl = i;
7524 		return (CS_SUCCESS);
7525 	    }
7526 	}
7527 
7528 	return (CS_BAD_ARGS);
7529 }
7530 
7531 /*
7532  * cs_event2text - returns text string(s) associated with the event; this
7533  *			function supports the Event2Text CS call.
7534  *
7535  *	calling: event2text_t * - pointer to event2text struct
7536  *		 int event_source - specifies event type in event2text_t:
7537  *					0 - SS event
7538  *					1 - CS event
7539  *
7540  *	returns: CS_SUCCESS
7541  */
7542 static int
7543 cs_event2text(event2text_t *e2t, int event_source)
7544 {
7545 	event_t event;
7546 	char *sepchar = "|";
7547 
7548 	/*
7549 	 * If event_source is 0, this is a SS event
7550 	 */
7551 	if (!event_source) {
7552 	    for (event = 0; event < MAX_SS_EVENTS; event++) {
7553 		if (cs_ss_event_text[event].ss_event == e2t->event) {
7554 		    (void) strcpy(e2t->text, cs_ss_event_text[event].text);
7555 		    return (CS_SUCCESS);
7556 		}
7557 	    }
7558 	    (void) strcpy(e2t->text, cs_ss_event_text[MAX_CS_EVENTS].text);
7559 	    return (CS_SUCCESS);
7560 	} else {
7561 		/*
7562 		 * This is a CS event
7563 		 */
7564 	    e2t->text[0] = '\0';
7565 	    for (event = 0; event < MAX_CS_EVENTS; event++) {
7566 		if (cs_ss_event_text[event].cs_event & e2t->event) {
7567 		    (void) strcat(e2t->text, cs_ss_event_text[event].text);
7568 		    (void) strcat(e2t->text, sepchar);
7569 		} /* if (cs_ss_event_text) */
7570 	    } /* for (event) */
7571 	    if (e2t->text[0])
7572 		e2t->text[strlen(e2t->text)-1] = NULL;
7573 	} /* if (!event_source) */
7574 
7575 	return (CS_SUCCESS);
7576 }
7577 
7578 /*
7579  * cs_error2text - returns a pointer to a text string containing the name
7580  *			of the passed Card Services function or return code
7581  *
7582  *	This function supports the Error2Text CS call.
7583  */
7584 static char *
7585 cs_error2text(int function, int type)
7586 {
7587 	cs_csfunc2text_strings_t *cfs;
7588 	int end_marker;
7589 
7590 	if (type == CSFUN2TEXT_FUNCTION) {
7591 	    cfs = cs_csfunc2text_funcstrings;
7592 	    end_marker = CSFuncListEnd;
7593 	} else {
7594 	    cfs = cs_csfunc2text_returnstrings;
7595 	    end_marker = CS_ERRORLIST_END;
7596 	}
7597 
7598 	while (cfs->item != end_marker) {
7599 	    if (cfs->item == function)
7600 		return (cfs->text);
7601 	    cfs++;
7602 	}
7603 
7604 	return (cfs->text);
7605 }
7606 
7607 /*
7608  * cs_make_device_node - creates/removes device nodes on a client's behalf;
7609  *				this is MakeDeviceNode and RemoveDeviceNode
7610  *
7611  *	returns: CS_SUCCESS - if all device nodes successfully created/removed
7612  *		 CS_BAD_ATTRIBUTE - if NumDevNodes is not zero when Action
7613  *				is REMOVAL_ALL_DEVICES
7614  *		 CS_BAD_ARGS - if an invalid Action code is specified
7615  *		 CS_UNSUPPORTED_FUNCTION - if SS is trying to call us
7616  *		 CS_OUT_OF_RESOURCE - if can't create/remove device node
7617  */
7618 static int
7619 cs_make_device_node(client_handle_t client_handle, make_device_node_t *mdn)
7620 {
7621 	cs_socket_t *sp;
7622 	client_t *client;
7623 	ss_make_device_node_t ss_make_device_node;
7624 	int error, i;
7625 	int client_lock_acquired;
7626 
7627 	/*
7628 	 * Check to see if this is the Socket Services client handle; if it
7629 	 *	is, we don't support SS using this call.
7630 	 */
7631 	if (CLIENT_HANDLE_IS_SS(client_handle))
7632 	    return (CS_UNSUPPORTED_FUNCTION);
7633 
7634 	/*
7635 	 * Get a pointer to this client's socket structure.
7636 	 */
7637 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
7638 	    return (CS_BAD_SOCKET);
7639 
7640 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7641 
7642 	/*
7643 	 *  Make sure that this is a valid client handle.
7644 	 */
7645 	if (!(client = cs_find_client(client_handle, &error))) {
7646 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7647 	    return (error);
7648 	}
7649 
7650 #ifdef	XXX
7651 	/*
7652 	 * If there's no card in the socket or the card in the socket is not
7653 	 *	for this client, then return an error.
7654 	 */
7655 	if (!(client->flags & CLIENT_CARD_INSERTED)) {
7656 	    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7657 	    return (CS_NO_CARD);
7658 	}
7659 #endif
7660 
7661 	/*
7662 	 * Setup the client's dip, since we use it later on.
7663 	 */
7664 	ss_make_device_node.dip = client->dip;
7665 
7666 	/*
7667 	 * Make sure that we're being given a valid Action.  Set the default
7668 	 *	error code as well.
7669 	 */
7670 	error = CS_BAD_ARGS;	/* for default case */
7671 	switch (mdn->Action) {
7672 	    case CREATE_DEVICE_NODE:
7673 	    case REMOVE_DEVICE_NODE:
7674 		break;
7675 	    case REMOVAL_ALL_DEVICE_NODES:
7676 		if (mdn->NumDevNodes) {
7677 		    error = CS_BAD_ATTRIBUTE;
7678 		} else {
7679 		    ss_make_device_node.flags = SS_CSINITDEV_REMOVE_DEVICE;
7680 		    ss_make_device_node.name = NULL;
7681 		    SocketServices(CSInitDev, &ss_make_device_node);
7682 		    error = CS_SUCCESS;
7683 		}
7684 		/* fall-through case */
7685 	    default:
7686 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7687 		return (error);
7688 		/* NOTREACHED */
7689 	} /* switch */
7690 
7691 	/*
7692 	 * Loop through the device node descriptions and create or destroy
7693 	 *	the device node.
7694 	 */
7695 	for (i = 0; i < mdn->NumDevNodes; i++) {
7696 	    devnode_desc_t *devnode_desc = &mdn->devnode_desc[i];
7697 
7698 	    ss_make_device_node.name = devnode_desc->name;
7699 	    ss_make_device_node.spec_type = devnode_desc->spec_type;
7700 	    ss_make_device_node.minor_num = devnode_desc->minor_num;
7701 	    ss_make_device_node.node_type = devnode_desc->node_type;
7702 
7703 	/*
7704 	 * Set the appropriate flag for the action that we want
7705 	 *	SS to perform. Note that if we ever OR-in the flag
7706 	 *	here, we need to be sure to clear the flags member
7707 	 *	since we sometimes OR-in other flags below.
7708 	 */
7709 	    if (mdn->Action == CREATE_DEVICE_NODE) {
7710 		ss_make_device_node.flags = SS_CSINITDEV_CREATE_DEVICE;
7711 	    } else {
7712 		ss_make_device_node.flags = SS_CSINITDEV_REMOVE_DEVICE;
7713 	    }
7714 
7715 	/*
7716 	 * If this is not the last device to process, then we need
7717 	 *	to tell SS that more device process requests are on
7718 	 *	their way after this one.
7719 	 */
7720 	    if (i < (mdn->NumDevNodes - 1))
7721 		ss_make_device_node.flags |= SS_CSINITDEV_MORE_DEVICES;
7722 
7723 	    if (SocketServices(CSInitDev, &ss_make_device_node) != SUCCESS) {
7724 		EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7725 		return (CS_OUT_OF_RESOURCE);
7726 	    } /* CSInitDev */
7727 	} /* for (mdn->NumDevNodes) */
7728 
7729 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7730 	return (CS_SUCCESS);
7731 }
7732 
7733 /*
7734  * cs_remove_device_node - removes device nodes
7735  *
7736  *	(see cs_make_device_node for a description of the calling
7737  *		and return parameters)
7738  */
7739 static int
7740 cs_remove_device_node(client_handle_t client_handle, remove_device_node_t *rdn)
7741 {
7742 
7743 	/*
7744 	 * XXX - Note the assumption here that the make_device_node_t and
7745 	 *	remove_device_node_t structures are identical.
7746 	 */
7747 	return (cs_make_device_node(client_handle, (make_device_node_t *)rdn));
7748 }
7749 
7750 /*
7751  * cs_ddi_info - this function is used by clients that need to support
7752  *			the xxx_getinfo function; this is CS_DDI_Info
7753  */
7754 static int
7755 cs_ddi_info(cs_ddi_info_t *cdi)
7756 {
7757 	cs_socket_t *sp;
7758 	client_t *client;
7759 	int client_lock_acquired;
7760 
7761 	if (cdi->driver_name == NULL)
7762 	    return (CS_BAD_ATTRIBUTE);
7763 
7764 #ifdef	CS_DEBUG
7765 	if (cs_debug > 0) {
7766 	    cmn_err(CE_CONT, "cs_ddi_info: socket %d client [%s]\n",
7767 					(int)cdi->Socket, cdi->driver_name);
7768 	}
7769 #endif
7770 
7771 	/*
7772 	 * Check to see if the socket number is in range - the system
7773 	 *	framework may cause a client driver to call us with
7774 	 *	a socket number that used to be present but isn't
7775 	 *	anymore. This is not a bug, and it's OK to return
7776 	 *	an error if the socket number is out of range.
7777 	 */
7778 	if (!CHECK_SOCKET_NUM(cdi->Socket, cs_globals.max_socket_num)) {
7779 
7780 #ifdef	CS_DEBUG
7781 	    if (cs_debug > 0) {
7782 		cmn_err(CE_CONT, "cs_ddi_info: socket %d client [%s] "
7783 						"SOCKET IS OUT OF RANGE\n",
7784 							(int)cdi->Socket,
7785 							cdi->driver_name);
7786 	    }
7787 #endif
7788 
7789 	    return (CS_BAD_SOCKET);
7790 	} /* if (!CHECK_SOCKET_NUM) */
7791 
7792 	/*
7793 	 * Get a pointer to this client's socket structure.
7794 	 */
7795 	if ((sp = cs_get_sp(cdi->Socket)) == NULL)
7796 	    return (CS_BAD_SOCKET);
7797 
7798 	EVENT_THREAD_MUTEX_ENTER(client_lock_acquired, sp);
7799 
7800 	client = sp->client_list;
7801 	while (client) {
7802 
7803 #ifdef	CS_DEBUG
7804 	    if (cs_debug > 0) {
7805 		cmn_err(CE_CONT, "cs_ddi_info: socket %d checking client [%s] "
7806 							"handle 0x%x\n",
7807 						(int)cdi->Socket,
7808 						client->driver_name,
7809 						(int)client->client_handle);
7810 	    }
7811 #endif
7812 
7813 	    if (client->driver_name != NULL) {
7814 		if (!(strcmp(client->driver_name, cdi->driver_name))) {
7815 		    cdi->dip = client->dip;
7816 		    cdi->instance = client->instance;
7817 
7818 #ifdef	CS_DEBUG
7819 		    if (cs_debug > 0) {
7820 			cmn_err(CE_CONT, "cs_ddi_info: found client [%s] "
7821 						"instance %d handle 0x%x\n",
7822 					client->driver_name, client->instance,
7823 					(int)client->client_handle);
7824 		    }
7825 #endif
7826 
7827 		    EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7828 		    return (CS_SUCCESS);
7829 		} /* strcmp */
7830 	    } /* driver_name != NULL */
7831 	    client = client->next;
7832 	} /* while (client) */
7833 
7834 	EVENT_THREAD_MUTEX_EXIT(client_lock_acquired, sp);
7835 	return (CS_BAD_SOCKET);
7836 }
7837 
7838 /*
7839  * cs_sys_ctl - Card Services system control; this is CS_Sys_Ctl
7840  */
7841 static int
7842 cs_sys_ctl(cs_sys_ctl_t *csc)
7843 {
7844 	cs_socket_t *sp;
7845 	client_t *cp;
7846 	int sn, ret = CS_UNSUPPORTED_MODE;
7847 
7848 	switch (csc->Action) {
7849 	    case CS_SYS_CTL_SEND_EVENT:
7850 		if (csc->Flags & CS_SYS_CTL_EVENT_SOCKET)
7851 		    sn = CS_GET_SOCKET_NUMBER(csc->Socket);
7852 		else
7853 		    sn = GET_CLIENT_SOCKET(csc->client_handle);
7854 		if ((sp = cs_get_sp(sn)) == NULL)
7855 		    return (CS_BAD_SOCKET);
7856 		mutex_enter(&sp->client_lock);
7857 		mutex_enter(&sp->lock);
7858 		csc->Events &= CS_EVENT_CLIENT_EVENTS_MASK;
7859 		if (csc->Flags & CS_SYS_CTL_EVENT_SOCKET)
7860 		    sp->events |= csc->Events;
7861 		if (csc->Flags & CS_SYS_CTL_EVENT_CLIENT) {
7862 		    if ((cp = cs_find_client(csc->client_handle, &ret)) ==
7863 									NULL) {
7864 			mutex_exit(&sp->lock);
7865 			mutex_exit(&sp->client_lock);
7866 			return (ret);
7867 		    } /* cs_find_client */
7868 			/*
7869 			 * Setup the events that we want to send to the client.
7870 			 */
7871 		    cp->events |= (csc->Events &
7872 					(cp->event_mask | cp->global_mask));
7873 		} /* CS_SYS_CTL_EVENT_CLIENT */
7874 
7875 		if (csc->Flags & CS_SYS_CTL_WAIT_SYNC) {
7876 		    sp->thread_state |= SOCKET_WAIT_SYNC;
7877 		    mutex_exit(&sp->lock);
7878 		    cv_broadcast(&sp->thread_cv);
7879 		    cv_wait(&sp->caller_cv, &sp->client_lock);
7880 		} else {
7881 		    mutex_exit(&sp->lock);
7882 		    cv_broadcast(&sp->thread_cv);
7883 		} /* CS_SYS_CTL_WAIT_SYNC */
7884 		mutex_exit(&sp->client_lock);
7885 		ret = CS_SUCCESS;
7886 		break;
7887 	    default:
7888 		break;
7889 	} /* switch */
7890 
7891 	return (ret);
7892 }
7893 
7894 /*
7895  * cs_get_sp - returns pointer to per-socket structure for passed
7896  *		socket number
7897  *
7898  *	return:	(cs_socket_t *) - pointer to socket structure
7899  *		NULL - invalid socket number passed in
7900  */
7901 static cs_socket_t *
7902 cs_get_sp(uint32_t sn)
7903 {
7904 	cs_socket_t *sp = cs_globals.sp;
7905 
7906 	if (!(cs_globals.init_state & GLOBAL_INIT_STATE_SS_READY))
7907 	    return (NULL);
7908 
7909 	if ((sp = cs_find_sp(sn)) == NULL)
7910 	    return (NULL);
7911 
7912 	if (sp->flags & SOCKET_IS_VALID)
7913 	    return (sp);
7914 
7915 	return (NULL);
7916 }
7917 
7918 /*
7919  * cs_find_sp - searches socket list and returns pointer to passed socket
7920  *			number
7921  *
7922  *	return:	(cs_socket_t *) - pointer to socket structure if found
7923  *		NULL - socket not found
7924  */
7925 static cs_socket_t *
7926 cs_find_sp(uint32_t sn)
7927 {
7928 	cs_socket_t *sp = cs_globals.sp;
7929 
7930 	while (sp) {
7931 	    if (sp->socket_num == CS_GET_SOCKET_NUMBER(sn))
7932 		return (sp);
7933 	    sp = sp->next;
7934 	} /* while */
7935 
7936 	return (NULL);
7937 }
7938 
7939 /*
7940  * cs_add_socket - add a socket
7941  *
7942  *	call:	sn - socket number to add
7943  *
7944  *	return:	CS_SUCCESS - operation sucessful
7945  *		CS_BAD_SOCKET - unable to add socket
7946  *		CS_BAD_WINDOW - unable to get CIS window for socket
7947  *
7948  * We get called here once for each socket that the framework wants to
7949  *	add. When we are called, the framework guarentees that until we
7950  *	complete this routine, no other adapter instances will be allowed
7951  *	to attach and thus no other PCE_ADD_SOCKET events will occur.
7952  *	It is safe to call SS_InquireAdapter to get the number of
7953  *	windows that the framework currently knows about.
7954  */
7955 static uint32_t
7956 cs_add_socket(uint32_t sn)
7957 {
7958 	cs_socket_t *sp;
7959 	sservice_t sservice;
7960 	get_cookies_and_dip_t *gcad;
7961 	win_req_t win_req;
7962 	convert_speed_t convert_speed;
7963 	set_socket_t set_socket;
7964 	cs_window_t *cw;
7965 	inquire_adapter_t inquire_adapter;
7966 	inquire_window_t inquire_window;
7967 	int ret, added_windows;
7968 
7969 	if (!(cs_globals.init_state & GLOBAL_INIT_STATE_SS_READY))
7970 	    return (CS_BAD_SOCKET);
7971 
7972 	/*
7973 	 * See if this socket has already been added - if it has, we
7974 	 *	fail this. If we can't find the socket, then allocate
7975 	 *	a new socket structure. If we do find the socket, then
7976 	 *	check to see if it's already added; if it is, then
7977 	 *	this is an error and return CS_BAD_SOCKET; if not,
7978 	 *	then traverse the socket structure list and add this
7979 	 *	next socket strcture to the end of the list.
7980 	 * XXX What about locking this list while we update it? Is
7981 	 *	that necessary since we're using the SOCKET_IS_VALID
7982 	 *	flag and since we never delete a socket from the
7983 	 *	list once it's been added?
7984 	 */
7985 	if ((sp = cs_find_sp(sn)) == NULL) {
7986 	    cs_socket_t *spp = cs_globals.sp;
7987 
7988 	    sp = (cs_socket_t *)kmem_zalloc(sizeof (cs_socket_t), KM_SLEEP);
7989 
7990 	    if (cs_globals.sp == NULL)
7991 		cs_globals.sp = sp;
7992 	    else
7993 		while (spp) {
7994 		    if (spp->next == NULL) {
7995 			spp->next = sp;
7996 			break;
7997 		    } /* if */
7998 		    spp = spp->next;
7999 		} /* while */
8000 
8001 	} else {
8002 	    if (sp->flags & SOCKET_IS_VALID)
8003 		return (CS_BAD_SOCKET);
8004 	} /* cs_find_sp */
8005 
8006 	/*
8007 	 * Setup the socket number
8008 	 */
8009 	sp->socket_num = sn;
8010 
8011 	/*
8012 	 * Find out how many windows the framework knows about
8013 	 *	so far. If this number of windows is greater
8014 	 *	than our current window count, bump up our
8015 	 *	current window count.
8016 	 * XXX Note that there is a BIG assumption here and that
8017 	 *	is that once the framework tells us that it has
8018 	 *	a window (as reflected in the NumWindows
8019 	 *	value) it can NEVER remove that window.
8020 	 *	When we really get the drop socket and drop
8021 	 *	window mechanism working correctly, we'll have
8022 	 *	to revisit this.
8023 	 */
8024 	SocketServices(SS_InquireAdapter, &inquire_adapter);
8025 
8026 	mutex_enter(&cs_globals.window_lock);
8027 	added_windows = inquire_adapter.NumWindows - cs_globals.num_windows;
8028 	if (added_windows > 0) {
8029 	    if (cs_add_windows(added_windows,
8030 				cs_globals.num_windows) != CS_SUCCESS) {
8031 		mutex_exit(&cs_globals.window_lock);
8032 		return (CS_BAD_WINDOW);
8033 	    } /* cs_add_windows */
8034 
8035 	    cs_globals.num_windows = inquire_adapter.NumWindows;
8036 
8037 	} /* if (added_windows) */
8038 
8039 	/*
8040 	 * Find a window that we can use for this socket's CIS window.
8041 	 */
8042 	sp->cis_win_num = PCMCIA_MAX_WINDOWS;
8043 
8044 	convert_speed.Attributes = CONVERT_NS_TO_DEVSPEED;
8045 	convert_speed.nS = CIS_DEFAULT_SPEED;
8046 	(void) cs_convert_speed(&convert_speed);
8047 
8048 	win_req.win_params.AccessSpeed = convert_speed.devspeed;
8049 	win_req.Attributes = (WIN_MEMORY_TYPE_AM | WIN_DATA_WIDTH_8);
8050 	win_req.Attributes = (WIN_MEMORY_TYPE_AM | WIN_MEMORY_TYPE_CM);
8051 	win_req.Base.base = 0;
8052 	win_req.Size = 0;
8053 
8054 	if ((ret = cs_find_mem_window(sp->socket_num, &win_req,
8055 					&sp->cis_win_num)) != CS_SUCCESS) {
8056 	    mutex_exit(&cs_globals.window_lock);
8057 	    sp->cis_win_num = PCMCIA_MAX_WINDOWS;
8058 	    cmn_err(CE_CONT, "cs_add_socket: socket %d can't get CIS "
8059 						"window - error 0x%x\n",
8060 						sp->socket_num, ret);
8061 	    return (CS_BAD_WINDOW);
8062 	} /* cs_find_mem_window */
8063 
8064 	if ((cw = cs_get_wp(sp->cis_win_num)) == NULL) {
8065 	    mutex_exit(&cs_globals.window_lock);
8066 	    return (CS_BAD_WINDOW);
8067 	}
8068 
8069 	inquire_window.window = sp->cis_win_num;
8070 	SocketServices(SS_InquireWindow, &inquire_window);
8071 
8072 	/*
8073 	 * If the CIS window is a variable sized window, then use
8074 	 *	the size that cs_find_mem_window returned to us,
8075 	 *	since this will be the minimum size that we can
8076 	 *	set this window to. If the CIS window is a fixed
8077 	 *	sized window, then use the system pagesize as the
8078 	 *	CIS window size.
8079 	 */
8080 	if (inquire_window.mem_win_char.MemWndCaps & WC_SIZE) {
8081 	    sp->cis_win_size = win_req.Size;
8082 	} else {
8083 	    sp->cis_win_size = PAGESIZE;
8084 	}
8085 
8086 	cw->state |= (CW_CIS | CW_ALLOCATED);
8087 	cw->socket_num = sp->socket_num;
8088 
8089 	mutex_exit(&cs_globals.window_lock);
8090 
8091 #if defined(CS_DEBUG)
8092 	    if (cs_debug > 1) {
8093 		cmn_err(CE_CONT, "cs_add_socket: socket %d using CIS window %d "
8094 					"size 0x%x\n", (int)sp->socket_num,
8095 					(int)sp->cis_win_num,
8096 					(int)sp->cis_win_size);
8097 	    }
8098 #endif
8099 
8100 	/*
8101 	 * Get the adapter information associated with this socket so
8102 	 *	that we can initialize the mutexes, condition variables,
8103 	 *	soft interrupt handler and per-socket adapter info.
8104 	 */
8105 	gcad = &sservice.get_cookies;
8106 	gcad->socket = sp->socket_num;
8107 	if (SocketServices(CSGetCookiesAndDip, &sservice) != SUCCESS) {
8108 	    cmn_err(CE_CONT, "cs_add_socket: socket %d CSGetCookiesAndDip "
8109 						"failure\n", sp->socket_num);
8110 	    return (CS_BAD_SOCKET);
8111 	} /* CSGetCookiesAndDip */
8112 
8113 	/*
8114 	 * Save the iblock and idev cookies for RegisterClient
8115 	 */
8116 	sp->iblk = gcad->iblock;
8117 	sp->idev = gcad->idevice;
8118 
8119 	/*
8120 	 * Setup the per-socket adapter info
8121 	 */
8122 	sp->adapter.flags = 0;
8123 	(void) strcpy(sp->adapter.name, gcad->adapter_info.name);
8124 	sp->adapter.major = gcad->adapter_info.major;
8125 	sp->adapter.minor = gcad->adapter_info.minor;
8126 	sp->adapter.instance = ddi_get_instance(gcad->dip);
8127 	sp->adapter.number = gcad->adapter_info.number;
8128 	sp->adapter.num_sockets = gcad->adapter_info.num_sockets;
8129 	sp->adapter.first_socket = gcad->adapter_info.first_socket;
8130 
8131 	/* Setup for cs_event and cs_event_thread */
8132 	mutex_init(&sp->lock, NULL, MUTEX_DRIVER, *(gcad->iblock));
8133 	mutex_init(&sp->client_lock, NULL, MUTEX_DRIVER, NULL);
8134 	mutex_init(&sp->cis_lock, NULL, MUTEX_DRIVER, NULL);
8135 
8136 	/* Setup for Socket Services work thread */
8137 	mutex_init(&sp->ss_thread_lock, NULL, MUTEX_DRIVER, NULL);
8138 
8139 	sp->init_state |= SOCKET_INIT_STATE_MUTEX;
8140 
8141 	/* Setup for cs_event_thread */
8142 	cv_init(&sp->thread_cv, NULL, CV_DRIVER, NULL);
8143 	cv_init(&sp->caller_cv, NULL, CV_DRIVER, NULL);
8144 	cv_init(&sp->reset_cv, NULL, CV_DRIVER, NULL);
8145 
8146 	/* Setup for Socket Services work thread */
8147 	cv_init(&sp->ss_thread_cv, NULL, CV_DRIVER, NULL);
8148 	cv_init(&sp->ss_caller_cv, NULL, CV_DRIVER, NULL);
8149 
8150 	sp->init_state |= SOCKET_INIT_STATE_CV;
8151 
8152 	/*
8153 	 * If we haven't installed it yet, then install the soft interrupt
8154 	 *	handler and save away the softint id.
8155 	 */
8156 	if (!(cs_globals.init_state & GLOBAL_INIT_STATE_SOFTINTR)) {
8157 	    if (ddi_add_softintr(gcad->dip, DDI_SOFTINT_HIGH,
8158 						&sp->softint_id,
8159 						NULL, NULL,
8160 						cs_socket_event_softintr,
8161 						(caddr_t)NULL) != DDI_SUCCESS) {
8162 		    cmn_err(CE_CONT, "cs_add_socket: socket %d can't add "
8163 						"softintr\n", sp->socket_num);
8164 		    return (CS_BAD_SOCKET);
8165 	    } /* ddi_add_softintr */
8166 
8167 	    mutex_enter(&cs_globals.global_lock);
8168 	    cs_globals.softint_id = sp->softint_id;
8169 	    cs_globals.init_state |= GLOBAL_INIT_STATE_SOFTINTR;
8170 	    /* XXX this timer is hokey at best... */
8171 	    cs_globals.sotfint_tmo = timeout(cs_event_softintr_timeout,
8172 		NULL, SOFTINT_TIMEOUT_TIME);
8173 	    mutex_exit(&cs_globals.global_lock);
8174 	} else {
8175 		/*
8176 		 * We've already added the soft interrupt handler, so just
8177 		 *	store away the softint id.
8178 		 */
8179 	    sp->softint_id = cs_globals.softint_id;
8180 	} /* if (!GLOBAL_INIT_STATE_SOFTINTR) */
8181 
8182 	/*
8183 	 * While this next flag doesn't really describe a per-socket
8184 	 *	resource, we still set it for each socket.  When the soft
8185 	 *	interrupt handler finally gets removed in cs_deinit, this
8186 	 *	flag will get cleared.
8187 	 */
8188 	sp->init_state |= SOCKET_INIT_STATE_SOFTINTR;
8189 
8190 	/*
8191 	 * Socket Services defaults all sockets to power off and
8192 	 *	clears all event masks.  We want to receive at least
8193 	 *	card insertion events, so enable them.  Turn off power
8194 	 *	to the socket as well.  We will turn it on again when
8195 	 *	we get a card insertion event.
8196 	 */
8197 	sp->event_mask = CS_EVENT_CARD_INSERTION;
8198 	set_socket.socket = sp->socket_num;
8199 	set_socket.SCIntMask = SBM_CD;
8200 	set_socket.IREQRouting = 0;
8201 	set_socket.IFType = IF_MEMORY;
8202 	set_socket.CtlInd = 0; /* turn off controls and indicators */
8203 	set_socket.State = (unsigned)~0;	/* clear latched state bits */
8204 
8205 	(void) cs_convert_powerlevel(sp->socket_num, 0, VCC,
8206 						&set_socket.VccLevel);
8207 	(void) cs_convert_powerlevel(sp->socket_num, 0, VPP1,
8208 						&set_socket.Vpp1Level);
8209 	(void) cs_convert_powerlevel(sp->socket_num, 0, VPP2,
8210 						&set_socket.Vpp2Level);
8211 
8212 	if ((ret = SocketServices(SS_SetSocket, &set_socket)) != SUCCESS) {
8213 	    cmn_err(CE_CONT, "cs_add_socket: socket %d SS_SetSocket "
8214 					"failure %d\n", sp->socket_num, ret);
8215 		return (CS_BAD_SOCKET);
8216 	} /* SS_SetSocket */
8217 
8218 	/*
8219 	 * The various socket-specific variables are now set up, so
8220 	 *	increment the global socket count and also mark the
8221 	 *	socket as available. We need to set this before we
8222 	 *	start any of the per-socket threads so that the threads
8223 	 *	can get a valid socket pointer when they start.
8224 	 */
8225 	mutex_enter(&cs_globals.global_lock);
8226 	cs_globals.num_sockets++;
8227 	cs_globals.max_socket_num =
8228 			max(cs_globals.max_socket_num, sp->socket_num + 1);
8229 	mutex_exit(&cs_globals.global_lock);
8230 	sp->flags = SOCKET_IS_VALID;
8231 
8232 	/*
8233 	 * Create the per-socket event handler thread.
8234 	 */
8235 	sp->event_thread = CREATE_SOCKET_EVENT_THREAD(cs_event_thread,
8236 		(uintptr_t)sn);
8237 
8238 	mutex_enter(&sp->lock);
8239 	sp->init_state |= SOCKET_INIT_STATE_THREAD;
8240 	mutex_exit(&sp->lock);
8241 
8242 	/*
8243 	 * Create the per-socket Socket Services work thread.
8244 	 */
8245 	sp->ss_thread = CREATE_SOCKET_EVENT_THREAD(cs_ss_thread,
8246 		(uintptr_t)sn);
8247 
8248 	mutex_enter(&sp->lock);
8249 	sp->init_state |= (SOCKET_INIT_STATE_SS_THREAD |
8250 						SOCKET_INIT_STATE_READY);
8251 	sp->event_mask = CS_EVENT_CARD_INSERTION;
8252 	mutex_exit(&sp->lock);
8253 
8254 	return (CS_SUCCESS);
8255 }
8256 
8257 /*
8258  * cs_drop_socket - drop a socket
8259  *
8260  *	call:	sn - socket number to drop
8261  *
8262  *	return:	CS_SUCCESS - operation sucessful
8263  *		CS_BAD_SOCKET - unable to drop socket
8264  */
8265 /*ARGSUSED*/
8266 static uint32_t
8267 cs_drop_socket(uint32_t sn)
8268 {
8269 #ifdef	XXX
8270 	cs_socket_t *sp;
8271 
8272 	/*
8273 	 * Tell the socket event thread to exit and then wait for it
8274 	 *	to do so.
8275 	 */
8276 	mutex_enter(&sp->client_lock);
8277 	sp->thread_state |= SOCKET_THREAD_EXIT;
8278 	cv_broadcast(&sp->thread_cv);
8279 	cv_wait(&sp->caller_cv, &sp->client_lock);
8280 	mutex_exit(&sp->client_lock);
8281 
8282 	/*
8283 	 * Tell the socket SS thread to exit and then wait for it
8284 	 *	to do so.
8285 	 */
8286 
8287 	/*
8288 	 * Mark the socket as dropped.
8289 	 */
8290 	sp->flags &= ~SOCKET_IS_VALID;
8291 
8292 #endif	/* XXX */
8293 
8294 	/* XXX for now don't allow dropping sockets XXX */
8295 	return (CS_BAD_SOCKET);
8296 }
8297 
8298 /*
8299  * cs_get_socket - returns the socket and function numbers and a pointer
8300  *			to the socket structure
8301  *
8302  * calling:	client_handle_t client_handle - client handle to extract
8303  *						socket number from
8304  *		uint32_t *socket -  pointer to socket number to use if
8305  *					client_handle is for the SS client;
8306  *					this value will be filled in on
8307  *					return with the correct socket
8308  *					and function numbers if we
8309  *					return CS_SUCCESS
8310  *		uint32_t *function - pointer to return function number into
8311  *					if not NULL
8312  *		cs_socket_t **sp - pointer to a pointer where a pointer
8313  *					to the socket struct will be
8314  *					placed if this is non-NULL
8315  *		client_t **clp - pointer to a pointer where a pointer
8316  *					to the client struct will be
8317  *					placed if this is non-NULL
8318  *
8319  *    The socket and function numbers are derived as follows:
8320  *
8321  *	Client Type		Socket Number		Function Number
8322  *	PC card client		From client_handle	From client_handle
8323  *	Socket Services client	From *socket		From *socket
8324  *	CSI client		From client_handle	From *socket
8325  */
8326 static uint32_t
8327 cs_get_socket(client_handle_t client_handle, uint32_t *socket,
8328     uint32_t *function, cs_socket_t **csp, client_t **clp)
8329 {
8330 	cs_socket_t *sp;
8331 	client_t *client;
8332 	uint32_t sn, fn;
8333 	int ret;
8334 
8335 	sn = *socket;
8336 
8337 	/*
8338 	 * If this is the Socket Services client, then return the
8339 	 *	socket and function numbers specified in the passed
8340 	 *	socket number parameter, otherwise extract the socket
8341 	 *	and function numbers from the client handle.
8342 	 */
8343 	if (CLIENT_HANDLE_IS_SS(client_handle)) {
8344 	    fn = CS_GET_FUNCTION_NUMBER(sn);
8345 	    sn = CS_GET_SOCKET_NUMBER(sn);
8346 	} else {
8347 	    fn = GET_CLIENT_FUNCTION(client_handle);
8348 	    sn = GET_CLIENT_SOCKET(client_handle);
8349 	}
8350 
8351 	/*
8352 	 * Check to be sure that the socket number is in range
8353 	 */
8354 	if (!(CHECK_SOCKET_NUM(sn, cs_globals.max_socket_num)))
8355 	    return (CS_BAD_SOCKET);
8356 
8357 	if ((sp = cs_get_sp(sn)) == NULL)
8358 	    return (CS_BAD_SOCKET);
8359 
8360 	/*
8361 	 * If we were given a pointer, then fill it in with a pointer
8362 	 *	to this socket.
8363 	 */
8364 	if (csp)
8365 	    *csp = sp;
8366 
8367 	/*
8368 	 * Search for the client; if it's not found, return an error.
8369 	 */
8370 	mutex_enter(&sp->lock);
8371 	if (!(client = cs_find_client(client_handle, &ret))) {
8372 	    mutex_exit(&sp->lock);
8373 	    return (ret);
8374 	}
8375 
8376 	/*
8377 	 * If we're a CIS client, then extract the function number
8378 	 *	from the socket number.
8379 	 */
8380 	if (client->flags & CLIENT_CSI_CLIENT)
8381 	    fn = CS_GET_FUNCTION_NUMBER(*socket);
8382 
8383 	mutex_exit(&sp->lock);
8384 
8385 	/*
8386 	 * Return the found client pointer if the caller wants it.
8387 	 */
8388 	if (clp)
8389 	    *clp = client;
8390 
8391 	/*
8392 	 * Return a socket number that is made up of the socket number
8393 	 *	and the function number.
8394 	 */
8395 	*socket = CS_MAKE_SOCKET_NUMBER(sn, fn);
8396 
8397 	/*
8398 	 * Return the function number if the caller wants it.
8399 	 */
8400 	if (function)
8401 	    *function = fn;
8402 
8403 	return (CS_SUCCESS);
8404 }
8405 
8406 /*
8407  * cs_get_wp - returns pointer to passed window number
8408  *
8409  *	return: (cs_window_t *) - pointer to window structure
8410  *		NULL - if invalid window number passed in
8411  */
8412 static cs_window_t *
8413 cs_get_wp(uint32_t wn)
8414 {
8415 	cs_window_t *cw;
8416 
8417 	if (!(cs_globals.init_state & GLOBAL_INIT_STATE_SS_READY))
8418 	    return (NULL);
8419 
8420 	if ((cw = cs_find_wp(wn)) == NULL)
8421 	    return (NULL);
8422 
8423 	if (cw->state & CW_WINDOW_VALID)
8424 	    return (cw);
8425 
8426 #ifdef  CS_DEBUG
8427 	if (cs_debug > 0) {
8428 		cmn_err(CE_CONT, "cs_get_wp(): wn=%d  cw=%p\n",
8429 		    (int)wn, (void *)cw);
8430 	}
8431 #endif
8432 
8433 	return (NULL);
8434 }
8435 
8436 /*
8437  * cs_find_wp - searches window list and returns pointer to passed window
8438  *			number
8439  *
8440  *	return: (cs_window_t *) - pointer to window structure
8441  *		NULL - window not found
8442  */
8443 static cs_window_t *
8444 cs_find_wp(uint32_t wn)
8445 {
8446 	cs_window_t *cw = cs_globals.cw;
8447 
8448 	while (cw) {
8449 	    if (cw->window_num == wn)
8450 		return (cw);
8451 	    cw = cw->next;
8452 	} /* while */
8453 
8454 #ifdef  CS_DEBUG
8455 	if (cs_debug > 0) {
8456 		cmn_err(CE_CONT, "cs_find_wp(): wn=%d  window_num=%d cw=%p\n",
8457 		    (int)wn, (int)cw->window_num, (void *)cw);
8458 	}
8459 #endif
8460 
8461 	return (NULL);
8462 }
8463 
8464 /*
8465  * cs_add_windows - adds number of windows specified in "aw" to
8466  *			the global window list; start the window
8467  *			numbering at "bn"
8468  *
8469  *	return: CS_SUCCESS - if windows added sucessfully
8470  *		CS_BAD_WINDOW - if unable to add windows
8471  *
8472  * Note: The window list must be protected by a lock by the caller.
8473  */
8474 static int
8475 cs_add_windows(int aw, uint32_t bn)
8476 {
8477 	cs_window_t *cwp = cs_globals.cw;
8478 	cs_window_t *cw, *cwpp;
8479 
8480 	if (aw <= 0)
8481 	    return (CS_BAD_WINDOW);
8482 
8483 	while (cwp) {
8484 	    cwpp = cwp;
8485 	    cwp = cwp->next;
8486 	}
8487 
8488 	while (aw--) {
8489 	    cw = (cs_window_t *)kmem_zalloc(sizeof (cs_window_t), KM_SLEEP);
8490 
8491 	    if (cs_globals.cw == NULL) {
8492 		cs_globals.cw = cw;
8493 		cwpp = cs_globals.cw;
8494 	    } else {
8495 		cwpp->next = cw;
8496 		cwpp = cwpp->next;
8497 	    }
8498 
8499 	    cwpp->window_num = bn++;
8500 	    cwpp->state = CW_WINDOW_VALID;
8501 
8502 	} /* while (aw) */
8503 
8504 	return (CS_SUCCESS);
8505 }
8506 
8507 /*
8508  * cs_ss_init - initialize CS items that need to wait until we receive
8509  *			a PCE_SS_INIT_STATE/PCE_SS_STATE_INIT event
8510  *
8511  *	return: CS_SUCESS - if sucessfully initialized
8512  *		(various) if error initializing
8513  *
8514  *	At this point, we expect that Socket Services has setup the
8515  *	following global variables for us:
8516  *
8517  *		cs_socket_services - Socket Services entry point
8518  *		cis_parser - CIS parser entry point
8519  */
8520 static uint32_t
8521 cs_ss_init()
8522 {
8523 	cs_register_cardservices_t rcs;
8524 	csregister_t csr;
8525 	uint32_t ret;
8526 
8527 	/*
8528 	 * Fill out the parameters for CISP_CIS_SETUP
8529 	 */
8530 	csr.cs_magic = PCCS_MAGIC;
8531 	csr.cs_version = PCCS_VERSION;
8532 	csr.cs_card_services = CardServices;
8533 	csr.cs_event = NULL;
8534 
8535 	/*
8536 	 * Call into the CIS module and tell it what the private
8537 	 *	Card Services entry point is. The CIS module will
8538 	 *	call us back at CardServices(CISRegister, ...)
8539 	 *	with the address of various CIS-specific global
8540 	 *	data structures.
8541 	 */
8542 	CIS_PARSER(CISP_CIS_SETUP, &csr);
8543 
8544 	/*
8545 	 * Register with the Card Services kernel stubs module
8546 	 */
8547 	rcs.magic = CS_STUBS_MAGIC;
8548 	rcs.function = CS_ENTRY_REGISTER;
8549 	rcs.cardservices = CardServices;
8550 
8551 	if ((ret = csx_register_cardservices(&rcs)) != CS_SUCCESS) {
8552 	    cmn_err(CE_CONT, "cs_ss_init: can't register with "
8553 					"cs_stubs, retcode = 0x%x\n", ret);
8554 		return (ret);
8555 	} /* csx_register_cardservices */
8556 
8557 	return (CS_SUCCESS);
8558 }
8559 
8560 /*
8561  * cs_create_cis - reads CIS on card in socket and creates CIS lists
8562  *
8563  * Most of the work is done in the CIS module in the CISP_CIS_LIST_CREATE
8564  *	function.
8565  *
8566  * This function returns:
8567  *
8568  *	CS_SUCCESS - if the CIS lists were created sucessfully
8569  *	CS_BAD_WINDOW or CS_GENERAL_FAILURE - if CIS window could
8570  *			not be setup
8571  *	CS_BAD_CIS - if error creating CIS chains
8572  *	CS_BAD_OFFSET - if the CIS parser tried to read past the
8573  *			boundries of the allocated CIS window
8574  */
8575 static int
8576 cs_create_cis(cs_socket_t *sp)
8577 {
8578 	uint32_t ret;
8579 
8580 	ret = (uint32_t)(uintptr_t)CIS_PARSER(CISP_CIS_LIST_CREATE,
8581 	    cis_cistpl_std_callout, sp);
8582 
8583 #ifdef	CS_DEBUG
8584 	if (ret == CS_NO_CIS) {
8585 	    if (cs_debug > 0)
8586 		cmn_err(CE_CONT, "cs_create_cis: socket %d has no CIS\n",
8587 								sp->socket_num);
8588 	} else if (ret != CS_SUCCESS) {
8589 	    if (cs_debug > 0)
8590 		cmn_err(CE_CONT, "cs_create_cis: socket %d ERROR = 0x%x\n",
8591 							sp->socket_num, ret);
8592 	    return (ret);
8593 	}
8594 #else
8595 	if (ret != CS_NO_CIS)
8596 	    if (ret != CS_SUCCESS)
8597 		return (ret);
8598 #endif
8599 
8600 	/*
8601 	 * If this card didn't have any CIS at all, there's not much
8602 	 *	else for us to do.
8603 	 */
8604 	if (!(sp->cis_flags & CW_VALID_CIS))
8605 	    return (CS_SUCCESS);
8606 
8607 	/*
8608 	 * If this is a single-function card, we need to move the CIS list
8609 	 *	that is currently on CS_GLOBAL_CIS to the function zero
8610 	 *	CIS list.
8611 	 */
8612 	if (!(sp->cis_flags & CW_MULTI_FUNCTION_CIS)) {
8613 	    bcopy((caddr_t)&sp->cis[CS_GLOBAL_CIS],
8614 				(caddr_t)&sp->cis[0], sizeof (cis_info_t));
8615 	    bzero((caddr_t)&sp->cis[CS_GLOBAL_CIS], sizeof (cis_info_t));
8616 	} /* !CW_MULTI_FUNCTION_CIS */
8617 
8618 	return (CS_SUCCESS);
8619 }
8620 
8621 /*
8622  * cs_destroy_cis - destroys CIS list for socket
8623  */
8624 static int
8625 cs_destroy_cis(cs_socket_t *sp)
8626 {
8627 	CIS_PARSER(CISP_CIS_LIST_DESTROY, sp);
8628 
8629 	return (CS_SUCCESS);
8630 }
8631 
8632 /*
8633  * cs_get_client_info - This function is GetClientInfo.
8634  *
8635  *    calling:	client_handle_t - client handle to get client info on
8636  *		client_info_t * - pointer to a client_info_t structure
8637  *					to return client information in
8638  *
8639  *    returns:	CS_SUCCESS - if client info retreived from client
8640  *		CS_BAD_SOCKET, CS_BAD_HANDLE - if invalid client
8641  *					handle passed in
8642  *		CS_NO_MORE_ITEMS - if client does not handle the
8643  *					CS_EVENT_CLIENT_INFO event
8644  *					or if invalid client info
8645  *					retreived from client
8646  */
8647 static int
8648 cs_get_client_info(client_handle_t client_handle, client_info_t *ci)
8649 {
8650 	cs_socket_t *sp;
8651 	client_t *client;
8652 	client_info_t *cinfo;
8653 	int ret = CS_SUCCESS;
8654 
8655 	if (CLIENT_HANDLE_IS_SS(client_handle)) {
8656 	    ci->Attributes = (CS_CLIENT_INFO_SOCKET_SERVICES |
8657 						CS_CLIENT_INFO_VALID);
8658 	    return (CS_SUCCESS);
8659 	} /* CLIENT_HANDLE_IS_SS */
8660 
8661 	if ((sp = cs_get_sp(GET_CLIENT_SOCKET(client_handle))) == NULL)
8662 	    return (CS_BAD_SOCKET);
8663 
8664 	mutex_enter(&sp->client_lock);
8665 	mutex_enter(&sp->lock);
8666 
8667 	if ((client = cs_find_client(client_handle, &ret)) == NULL) {
8668 	    mutex_exit(&sp->lock);
8669 	    mutex_exit(&sp->client_lock);
8670 	    return (ret);
8671 	} /* cs_find_client */
8672 
8673 	/*
8674 	 * If this client is not handling CS_EVENT_CLIENT_INFO events,
8675 	 *	then don't bother to even wake up the event thread.
8676 	 */
8677 	if (!((client->event_mask | client->global_mask) &
8678 					CS_EVENT_CLIENT_INFO)) {
8679 	    mutex_exit(&sp->lock);
8680 	    mutex_exit(&sp->client_lock);
8681 	    return (CS_NO_MORE_ITEMS);
8682 	} /* !CS_EVENT_CLIENT_INFO */
8683 
8684 	cinfo = &client->event_callback_args.client_info;
8685 
8686 	bzero((caddr_t)cinfo, sizeof (client_info_t));
8687 	cinfo->Attributes = (ci->Attributes & CS_CLIENT_INFO_SUBSVC_MASK);
8688 
8689 	client->events |= CS_EVENT_CLIENT_INFO;
8690 
8691 	sp->thread_state |= SOCKET_WAIT_SYNC;
8692 	mutex_exit(&sp->lock);
8693 	cv_broadcast(&sp->thread_cv);
8694 	cv_wait(&sp->caller_cv, &sp->client_lock);
8695 
8696 	if (cinfo->Attributes & CS_CLIENT_INFO_VALID) {
8697 	    bcopy((caddr_t)cinfo, (caddr_t)ci, sizeof (client_info_t));
8698 	    ci->Attributes &= (CS_CLIENT_INFO_FLAGS_MASK |
8699 					CS_CLIENT_INFO_SUBSVC_MASK);
8700 	    ci->Attributes &= ~(CS_CLIENT_INFO_CLIENT_MASK |
8701 						INFO_CARD_FLAGS_MASK |
8702 						CS_CLIENT_INFO_CLIENT_ACTIVE);
8703 	    ci->Attributes |= (client->flags & (CS_CLIENT_INFO_CLIENT_MASK |
8704 						INFO_CARD_FLAGS_MASK));
8705 	    (void) strcpy(ci->DriverName, client->driver_name);
8706 	    if (cs_card_for_client(client))
8707 		ci->Attributes |= CS_CLIENT_INFO_CLIENT_ACTIVE;
8708 	} else {
8709 	    ret = CS_NO_MORE_ITEMS;
8710 	} /* CS_CLIENT_INFO_VALID */
8711 
8712 	mutex_exit(&sp->client_lock);
8713 
8714 	return (ret);
8715 }
8716 
8717 /*
8718  * cs_get_firstnext_client - This function is GetFirstClient and
8719  *				GetNextClient
8720  *
8721  *    calling:	get_firstnext_client_t * - pointer to a get_firstnext_client_t
8722  *					structure to return client handle and
8723  *					attributes in
8724  *		flags - one of the following:
8725  *				CS_GET_FIRST_FLAG - get first client handle
8726  *				CS_GET_NEXT_FLAG - get next client handle
8727  *
8728  *    returns:	CS_SUCCESS - if client info retreived from client
8729  *		CS_BAD_SOCKET, CS_BAD_HANDLE - if invalid client
8730  *					handle passed in
8731  *		CS_NO_MORE_ITEMS - if client does not handle the
8732  *					CS_EVENT_CLIENT_INFO event
8733  *					or if invalid client info
8734  *					retreived from client
8735  */
8736 static int
8737 cs_get_firstnext_client(get_firstnext_client_t *fnc, uint32_t flags)
8738 {
8739 	cs_socket_t *sp;
8740 	client_t *client;
8741 	uint32_t sn = 0;
8742 	int ret = CS_SUCCESS;
8743 
8744 	switch (flags) {
8745 	    case CS_GET_FIRST_FLAG:
8746 		if (fnc->Attributes & CS_GET_FIRSTNEXT_CLIENT_ALL_CLIENTS) {
8747 		    while (sn < cs_globals.max_socket_num) {
8748 			if ((sp = cs_get_sp(sn)) != NULL) {
8749 			    mutex_enter(&sp->client_lock);
8750 			    if ((client = sp->client_list) != NULL)
8751 				break;
8752 			    mutex_exit(&sp->client_lock);
8753 			} /* if */
8754 			sn++;
8755 		    } /* while */
8756 
8757 		    if (sn == cs_globals.max_socket_num)
8758 			return (CS_NO_MORE_ITEMS);
8759 		} else if (fnc->Attributes &
8760 					CS_GET_FIRSTNEXT_CLIENT_SOCKET_ONLY) {
8761 		    if ((sp = cs_get_sp(CS_GET_SOCKET_NUMBER(fnc->Socket))) ==
8762 									NULL)
8763 			return (CS_BAD_SOCKET);
8764 		    mutex_enter(&sp->client_lock);
8765 		    if ((client = sp->client_list) == NULL) {
8766 			mutex_exit(&sp->client_lock);
8767 			return (CS_NO_MORE_ITEMS);
8768 		    }
8769 		} else {
8770 		    return (CS_BAD_ATTRIBUTE);
8771 		}
8772 
8773 		fnc->client_handle = client->client_handle;
8774 		fnc->num_clients = sp->num_clients;
8775 		mutex_exit(&sp->client_lock);
8776 		break;
8777 	    case CS_GET_NEXT_FLAG:
8778 		if (fnc->Attributes & CS_GET_FIRSTNEXT_CLIENT_ALL_CLIENTS) {
8779 		    sn = GET_CLIENT_SOCKET(fnc->client_handle);
8780 
8781 		    if ((sp = cs_get_sp(sn)) == NULL)
8782 			return (CS_BAD_SOCKET);
8783 
8784 		    mutex_enter(&sp->client_lock);
8785 		    if ((client = cs_find_client(fnc->client_handle,
8786 				&ret)) == NULL) {
8787 			mutex_exit(&sp->client_lock);
8788 			return (ret);
8789 		    }
8790 		    if ((client = client->next) == NULL) {
8791 			mutex_exit(&sp->client_lock);
8792 			sn++;
8793 			while (sn < cs_globals.max_socket_num) {
8794 			    if ((sp = cs_get_sp(sn)) != NULL) {
8795 				mutex_enter(&sp->client_lock);
8796 				if ((client = sp->client_list) != NULL)
8797 				    break;
8798 				mutex_exit(&sp->client_lock);
8799 			    } /* if */
8800 			    sn++;
8801 			} /* while */
8802 
8803 			if (sn == cs_globals.max_socket_num)
8804 			    return (CS_NO_MORE_ITEMS);
8805 		    } /* client = client->next */
8806 
8807 		} else if (fnc->Attributes &
8808 					CS_GET_FIRSTNEXT_CLIENT_SOCKET_ONLY) {
8809 		    sp = cs_get_sp(GET_CLIENT_SOCKET(fnc->client_handle));
8810 		    if (sp == NULL)
8811 			return (CS_BAD_SOCKET);
8812 		    mutex_enter(&sp->client_lock);
8813 		    if ((client = cs_find_client(fnc->client_handle,
8814 				&ret)) == NULL) {
8815 			mutex_exit(&sp->client_lock);
8816 			return (ret);
8817 		    }
8818 		    if ((client = client->next) == NULL) {
8819 			mutex_exit(&sp->client_lock);
8820 			return (CS_NO_MORE_ITEMS);
8821 		    }
8822 		} else {
8823 		    return (CS_BAD_ATTRIBUTE);
8824 		}
8825 
8826 		fnc->client_handle = client->client_handle;
8827 		fnc->num_clients = sp->num_clients;
8828 		mutex_exit(&sp->client_lock);
8829 		break;
8830 	    default:
8831 		ret = CS_BAD_ATTRIBUTE;
8832 		break;
8833 
8834 	} /* switch */
8835 
8836 	return (ret);
8837 }
8838 
8839 /*
8840  * cs_set_acc_attributes - converts Card Services endianness and
8841  *				data ordering values to values
8842  *				that Socket Services understands
8843  *
8844  *	calling: *sw - pointer to a set_window_t to set attributes in
8845  *		 Attributes - CS attributes
8846  */
8847 static void
8848 cs_set_acc_attributes(set_window_t *sw, uint32_t Attributes)
8849 {
8850 	sw->attr.devacc_attr_version = DDI_DEVICE_ATTR_V0;
8851 
8852 	switch (Attributes & WIN_ACC_ENDIAN_MASK) {
8853 	    case WIN_ACC_LITTLE_ENDIAN:
8854 		sw->attr.devacc_attr_endian_flags = DDI_STRUCTURE_LE_ACC;
8855 		break;
8856 	    case WIN_ACC_BIG_ENDIAN:
8857 		sw->attr.devacc_attr_endian_flags = DDI_STRUCTURE_BE_ACC;
8858 		break;
8859 	    case WIN_ACC_NEVER_SWAP:
8860 	    default:
8861 		sw->attr.devacc_attr_endian_flags = DDI_NEVERSWAP_ACC;
8862 		break;
8863 	} /* switch */
8864 
8865 	switch (Attributes & WIN_ACC_ORDER_MASK) {
8866 	    case WIN_ACC_UNORDERED_OK:
8867 		sw->attr.devacc_attr_dataorder = DDI_UNORDERED_OK_ACC;
8868 		break;
8869 	    case WIN_ACC_MERGING_OK:
8870 		sw->attr.devacc_attr_dataorder = DDI_MERGING_OK_ACC;
8871 		break;
8872 	    case WIN_ACC_LOADCACHING_OK:
8873 		sw->attr.devacc_attr_dataorder = DDI_LOADCACHING_OK_ACC;
8874 		break;
8875 	    case WIN_ACC_STORECACHING_OK:
8876 		sw->attr.devacc_attr_dataorder = DDI_STORECACHING_OK_ACC;
8877 		break;
8878 	    case WIN_ACC_STRICT_ORDER:
8879 	    default:
8880 		sw->attr.devacc_attr_dataorder = DDI_STRICTORDER_ACC;
8881 		break;
8882 	} /* switch */
8883 }
8884