mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-11-30 12:43:41 +01:00
6b33696c93
Signed-off-by: SergeySlice <sergey.slice@gmail.com>
2002 lines
71 KiB
C
2002 lines
71 KiB
C
/** @file
|
|
This file implements protocol interfaces for ATA bus driver.
|
|
|
|
This file implements protocol interfaces: Driver Binding protocol,
|
|
Block IO protocol and DiskInfo protocol.
|
|
|
|
Copyright (c) 2009 - 2012, Intel Corporation. All rights reserved.<BR>
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
|
**/
|
|
|
|
#include "AtaBus.h"
|
|
|
|
#ifndef DEBUG_ALL
|
|
#define DEBUG_ATABUS 0
|
|
#else
|
|
#define DEBUG_ATABUS DEBUG_ALL
|
|
#endif
|
|
|
|
#if DEBUG_ATABUS==0
|
|
#define DBG(...)
|
|
#else
|
|
//#define DBG(...) DebugLog(DEBUG_ATABUS, __VA_ARGS__)
|
|
#define DBG(...) Print(__VA_ARGS__)
|
|
#endif
|
|
|
|
UINT8 mMorControl;
|
|
BOOLEAN mHasMor;
|
|
|
|
//
|
|
// ATA Bus Driver Binding Protocol Instance
|
|
//
|
|
EFI_DRIVER_BINDING_PROTOCOL gAtaBusDriverBinding = {
|
|
AtaBusDriverBindingSupported,
|
|
AtaBusDriverBindingStart,
|
|
AtaBusDriverBindingStop,
|
|
0x10,
|
|
NULL,
|
|
NULL
|
|
};
|
|
|
|
//
|
|
// Template for ATA Child Device.
|
|
//
|
|
ATA_DEVICE gAtaDeviceTemplate = {
|
|
ATA_DEVICE_SIGNATURE, // Signature
|
|
NULL, // Handle
|
|
{ // BlockIo
|
|
EFI_BLOCK_IO_PROTOCOL_REVISION,
|
|
NULL,
|
|
AtaBlockIoReset,
|
|
AtaBlockIoReadBlocks,
|
|
AtaBlockIoWriteBlocks,
|
|
AtaBlockIoFlushBlocks
|
|
},
|
|
{ // BlockIo2
|
|
NULL,
|
|
AtaBlockIoResetEx,
|
|
AtaBlockIoReadBlocksEx,
|
|
AtaBlockIoWriteBlocksEx,
|
|
AtaBlockIoFlushBlocksEx
|
|
},
|
|
{ // BlockMedia
|
|
0, // MediaId
|
|
FALSE, // RemovableMedia
|
|
TRUE, // MediaPresent
|
|
FALSE, // LogicPartition
|
|
FALSE, // ReadOnly
|
|
FALSE, // WritingCache
|
|
0x200, // BlockSize
|
|
0, // IoAlign
|
|
0, // LastBlock
|
|
0, // LowestAlignedLba
|
|
1 // LogicalBlocksPerPhysicalBlock
|
|
},
|
|
{ // DiskInfo
|
|
EFI_DISK_INFO_IDE_INTERFACE_GUID,
|
|
AtaDiskInfoInquiry,
|
|
AtaDiskInfoIdentify,
|
|
AtaDiskInfoSenseData,
|
|
AtaDiskInfoWhichIde
|
|
},
|
|
NULL, // DevicePath
|
|
{
|
|
AtaStorageSecurityReceiveData,
|
|
AtaStorageSecuritySendData
|
|
},
|
|
NULL, // AtaBusDriverData
|
|
0, // Port
|
|
0, // PortMultiplierPort
|
|
{ 0, }, // Packet
|
|
{{ 0}, }, // Acb
|
|
NULL, // Asb
|
|
FALSE, // UdmaValid
|
|
FALSE, // Lba48Bit
|
|
NULL, // IdentifyData
|
|
NULL, // ExitBootServiceEvent
|
|
NULL, // ControllerNameTable
|
|
{L'\0', }, // ModelName
|
|
{NULL, NULL}, // AtaTaskList
|
|
{NULL, NULL} // AtaSubTaskList
|
|
};
|
|
|
|
/**
|
|
Allocates an aligned buffer for ATA device.
|
|
|
|
This function allocates an aligned buffer for the ATA device to perform
|
|
ATA pass through operations. The alignment requirement is from ATA pass
|
|
through interface.
|
|
|
|
@param AtaDevice The ATA child device involved for the operation.
|
|
@param BufferSize The request buffer size.
|
|
|
|
@return A pointer to the aligned buffer or NULL if the allocation fails.
|
|
|
|
**/
|
|
VOID *
|
|
AllocateAlignedBuffer (
|
|
IN ATA_DEVICE *AtaDevice,
|
|
IN UINTN BufferSize
|
|
)
|
|
{
|
|
return AllocateAlignedPages (EFI_SIZE_TO_PAGES (BufferSize), AtaDevice->AtaBusDriverData->AtaPassThru->Mode->IoAlign);
|
|
}
|
|
|
|
/**
|
|
Frees an aligned buffer for ATA device.
|
|
|
|
This function frees an aligned buffer for the ATA device to perform
|
|
ATA pass through operations.
|
|
|
|
@param Buffer The aligned buffer to be freed.
|
|
@param BufferSize The request buffer size.
|
|
|
|
**/
|
|
VOID
|
|
FreeAlignedBuffer (
|
|
IN VOID *Buffer,
|
|
IN UINTN BufferSize
|
|
)
|
|
{
|
|
if (Buffer != NULL) {
|
|
FreeAlignedPages (Buffer, EFI_SIZE_TO_PAGES (BufferSize));
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
Release all the resources allocated for the ATA device.
|
|
|
|
This function releases all the resources allocated for the ATA device.
|
|
|
|
@param AtaDevice The ATA child device involved for the operation.
|
|
|
|
**/
|
|
VOID
|
|
ReleaseAtaResources (
|
|
IN ATA_DEVICE *AtaDevice
|
|
)
|
|
{
|
|
ATA_BUS_ASYN_SUB_TASK *SubTask;
|
|
ATA_BUS_ASYN_TASK *AtaTask;
|
|
LIST_ENTRY *Entry;
|
|
LIST_ENTRY *DelEntry;
|
|
EFI_TPL OldTpl;
|
|
|
|
FreeUnicodeStringTable (AtaDevice->ControllerNameTable);
|
|
FreeAlignedBuffer (AtaDevice->Asb, sizeof (EFI_ATA_STATUS_BLOCK));
|
|
FreeAlignedBuffer (AtaDevice->IdentifyData, sizeof (ATA_IDENTIFY_DATA));
|
|
if (AtaDevice->DevicePath != NULL) {
|
|
FreePool(AtaDevice->DevicePath);
|
|
}
|
|
OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
|
|
if (!IsListEmpty (&AtaDevice->AtaSubTaskList)) {
|
|
//
|
|
// Free the Subtask list.
|
|
//
|
|
for(Entry = AtaDevice->AtaSubTaskList.ForwardLink;
|
|
Entry != (&AtaDevice->AtaSubTaskList);
|
|
) {
|
|
DelEntry = Entry;
|
|
Entry = Entry->ForwardLink;
|
|
SubTask = ATA_AYNS_SUB_TASK_FROM_ENTRY (DelEntry);
|
|
|
|
RemoveEntryList (DelEntry);
|
|
FreeAtaSubTask (SubTask);
|
|
}
|
|
}
|
|
if (!IsListEmpty (&AtaDevice->AtaTaskList)) {
|
|
//
|
|
// Free the Subtask list.
|
|
//
|
|
for(Entry = AtaDevice->AtaTaskList.ForwardLink;
|
|
Entry != (&AtaDevice->AtaTaskList);
|
|
) {
|
|
DelEntry = Entry;
|
|
Entry = Entry->ForwardLink;
|
|
AtaTask = ATA_AYNS_TASK_FROM_ENTRY (DelEntry);
|
|
|
|
RemoveEntryList (DelEntry);
|
|
FreePool(AtaTask);
|
|
}
|
|
}
|
|
if (AtaDevice->ExitBootServiceEvent != NULL) {
|
|
gBS->CloseEvent (AtaDevice->ExitBootServiceEvent);
|
|
AtaDevice->ExitBootServiceEvent = NULL;
|
|
}
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
FreePool(AtaDevice);
|
|
}
|
|
|
|
/**
|
|
The is an event(generally the event is exitBootService event) call back function.
|
|
Clear pending IDE interrupt before OS loader/kernel take control of the IDE device.
|
|
|
|
@param Event Pointer to this event
|
|
@param Context Event handler private data
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
ClearInterrupt (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
// UINT64 IoPortForBmis;
|
|
// UINT8 RegisterValue;
|
|
ATA_DEVICE *AtaDev;
|
|
// ATA_BUS_DRIVER_DATA *AtaBusDriverData;
|
|
// EFI_ATA_PASS_THRU_PROTOCOL *AtaPassThru;
|
|
|
|
//
|
|
// Get our context
|
|
//
|
|
AtaDev = (ATA_DEVICE *) Context;
|
|
// AtaBusDriverData = AtaDev->AtaBusDriverData;
|
|
// AtaPassThru = AtaBusDriverData->AtaPassThru;
|
|
//
|
|
// Obtain IDE IO port registers' base addresses in case switch native<->legacy
|
|
//
|
|
/* Status = ReassignIdeResources (IdeDev);
|
|
if (EFI_ERROR(Status)) {
|
|
return;
|
|
}*/
|
|
|
|
//
|
|
// Check whether interrupt is pending
|
|
//
|
|
|
|
//
|
|
// Reset IDE device to force it de-assert interrupt pin
|
|
// Note: this will reset all devices on this IDE channel
|
|
//
|
|
// AtaSoftReset (PciIo, IdeRegisters, Timeout);
|
|
// Status = AtaDev->BlockIo.Reset(AtaDev->BlockIo, FALSE);
|
|
// Status = AtaPassThru->ResetPort(AtaPassThru->ResetPort, 0);
|
|
Status = ResetAtaDevice(AtaDev);
|
|
if (EFI_ERROR(Status)) {
|
|
return;
|
|
}
|
|
/*
|
|
//
|
|
// Get base address of IDE Bus Master Status Register
|
|
//
|
|
if (IdePrimary == IdeDev->Channel) {
|
|
IoPortForBmis = IdeDev->IoPort->BusMasterBaseAddr + BMISP_OFFSET;
|
|
} else {
|
|
if (IdeSecondary == IdeDev->Channel) {
|
|
IoPortForBmis = IdeDev->IoPort->BusMasterBaseAddr + BMISS_OFFSET;
|
|
} else {
|
|
return;
|
|
}
|
|
}
|
|
//
|
|
// Read BMIS register and clear ERROR and INTR bit
|
|
//
|
|
IdeDev->PciIo->Io.Read (
|
|
IdeDev->PciIo,
|
|
EfiPciIoWidthUint8,
|
|
EFI_PCI_IO_PASS_THROUGH_BAR,
|
|
IoPortForBmis,
|
|
1,
|
|
&RegisterValue
|
|
);
|
|
|
|
RegisterValue |= (BMIS_INTERRUPT | BMIS_ERROR);
|
|
|
|
IdeDev->PciIo->Io.Write (
|
|
IdeDev->PciIo,
|
|
EfiPciIoWidthUint8,
|
|
EFI_PCI_IO_PASS_THROUGH_BAR,
|
|
IoPortForBmis,
|
|
1,
|
|
&RegisterValue
|
|
);
|
|
|
|
//
|
|
// Select the other device on this channel to ensure this device to release the interrupt pin
|
|
//
|
|
if (IdeDev->Device == 0) {
|
|
RegisterValue = (1 << 4) | 0xe0;
|
|
} else {
|
|
RegisterValue = (0 << 4) | 0xe0;
|
|
}
|
|
IdeWritePortB (IdeDev->PciIo, IdeDev->IoPort->Head, RegisterValue);
|
|
*/
|
|
}
|
|
|
|
/**
|
|
Registers an ATA device.
|
|
|
|
This function allocates an ATA device structure for the ATA device specified by
|
|
Port and PortMultiplierPort if the ATA device is identified as a valid one.
|
|
Then it will create child handle and install Block IO and Disk Info protocol on
|
|
it.
|
|
|
|
@param AtaBusDriverData The parent ATA bus driver data structure.
|
|
@param Port The port number of the ATA device.
|
|
@param PortMultiplierPort The port multiplier port number of the ATA device.
|
|
|
|
@retval EFI_SUCCESS The ATA device is successfully registered.
|
|
@retval EFI_OUT_OF_RESOURCES There is not enough memory to allocate the ATA device
|
|
and related data structures.
|
|
@return Others Some error occurs when registering the ATA device.
|
|
**/
|
|
EFI_STATUS
|
|
RegisterAtaDevice (
|
|
IN OUT ATA_BUS_DRIVER_DATA *AtaBusDriverData,
|
|
IN UINT16 Port,
|
|
IN UINT16 PortMultiplierPort
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *AtaDevice;
|
|
EFI_ATA_PASS_THRU_PROTOCOL *AtaPassThru;
|
|
EFI_DEVICE_PATH_PROTOCOL *NewDevicePathNode;
|
|
EFI_DEVICE_PATH_PROTOCOL *DevicePath;
|
|
EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath;
|
|
EFI_HANDLE DeviceHandle;
|
|
|
|
AtaDevice = NULL;
|
|
NewDevicePathNode = NULL;
|
|
DevicePath = NULL;
|
|
RemainingDevicePath = NULL;
|
|
|
|
//
|
|
// Build device path
|
|
//
|
|
AtaPassThru = AtaBusDriverData->AtaPassThru;
|
|
Status = AtaPassThru->BuildDevicePath (AtaPassThru, Port, PortMultiplierPort, &NewDevicePathNode);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
DevicePath = AppendDevicePathNode (AtaBusDriverData->ParentDevicePath, NewDevicePathNode);
|
|
if (DevicePath == NULL) {
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
|
|
DeviceHandle = NULL;
|
|
RemainingDevicePath = DevicePath;
|
|
Status = gBS->LocateDevicePath (&gEfiDevicePathProtocolGuid, &RemainingDevicePath, &DeviceHandle);
|
|
if (!EFI_ERROR(Status) && (DeviceHandle != NULL) && IsDevicePathEnd(RemainingDevicePath)) {
|
|
Status = EFI_ALREADY_STARTED;
|
|
FreePool(DevicePath);
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Allocate ATA device from the template.
|
|
//
|
|
AtaDevice = AllocateCopyPool(sizeof (ATA_DEVICE), &gAtaDeviceTemplate);
|
|
if (AtaDevice == NULL) {
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Initializes ATA device structures and allocates the required buffer.
|
|
//
|
|
AtaDevice->BlockIo.Media = &AtaDevice->BlockMedia;
|
|
AtaDevice->BlockIo2.Media = &AtaDevice->BlockMedia;
|
|
AtaDevice->AtaBusDriverData = AtaBusDriverData;
|
|
AtaDevice->DevicePath = DevicePath;
|
|
AtaDevice->Port = Port;
|
|
AtaDevice->PortMultiplierPort = PortMultiplierPort;
|
|
AtaDevice->Asb = AllocateAlignedBuffer (AtaDevice, sizeof (EFI_ATA_STATUS_BLOCK));
|
|
if (AtaDevice->Asb == NULL) {
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
AtaDevice->IdentifyData = AllocateAlignedBuffer (AtaDevice, sizeof (ATA_IDENTIFY_DATA));
|
|
if (AtaDevice->IdentifyData == NULL) {
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Initial Ata Task List
|
|
//
|
|
InitializeListHead (&AtaDevice->AtaTaskList);
|
|
InitializeListHead (&AtaDevice->AtaSubTaskList);
|
|
|
|
//
|
|
// Try to identify the ATA device via the ATA pass through command.
|
|
//
|
|
Status = DiscoverAtaDevice (AtaDevice);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Build controller name for Component Name (2) protocol.
|
|
//
|
|
Status = AddUnicodeString2 (
|
|
"eng",
|
|
gAtaBusComponentName.SupportedLanguages,
|
|
&AtaDevice->ControllerNameTable,
|
|
AtaDevice->ModelName,
|
|
TRUE
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
Status = AddUnicodeString2 (
|
|
"en",
|
|
gAtaBusComponentName2.SupportedLanguages,
|
|
&AtaDevice->ControllerNameTable,
|
|
AtaDevice->ModelName,
|
|
FALSE
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Update to AHCI interface GUID based on device path node. The default one
|
|
// is IDE interface GUID copied from template.
|
|
//
|
|
if (NewDevicePathNode->SubType == MSG_SATA_DP) {
|
|
CopyGuid (&AtaDevice->DiskInfo.Interface, &gEfiDiskInfoAhciInterfaceGuid);
|
|
}
|
|
|
|
Status = gBS->InstallMultipleProtocolInterfaces (
|
|
&AtaDevice->Handle,
|
|
&gEfiDevicePathProtocolGuid,
|
|
AtaDevice->DevicePath,
|
|
&gEfiBlockIoProtocolGuid,
|
|
&AtaDevice->BlockIo,
|
|
&gEfiBlockIo2ProtocolGuid,
|
|
&AtaDevice->BlockIo2,
|
|
&gEfiDiskInfoProtocolGuid,
|
|
&AtaDevice->DiskInfo,
|
|
NULL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// See if the ata device support trust computing feature or not.
|
|
// If yes, then install Storage Security Protocol at the ata device handle.
|
|
//
|
|
if ((AtaDevice->IdentifyData->trusted_computing_support & BIT0) != 0) {
|
|
// DEBUG ((EFI_D_INFO, "Found TCG support in Port %x PortMultiplierPort %x\n", Port, PortMultiplierPort));
|
|
DBG(L"Found TCG support in Port %x PortMultiplierPort %x\n", Port, PortMultiplierPort);
|
|
Status = gBS->InstallProtocolInterface (
|
|
&AtaDevice->Handle,
|
|
&gEfiStorageSecurityCommandProtocolGuid,
|
|
EFI_NATIVE_INTERFACE,
|
|
&AtaDevice->StorageSecurity
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Done;
|
|
}
|
|
DEBUG ((EFI_D_INFO, "Successfully Install Storage Security Protocol on the ATA device\n"));
|
|
}
|
|
|
|
if (mHasMor) {
|
|
if (((mMorControl & 0x01) == 0x01) && ((AtaDevice->IdentifyData->trusted_computing_support & BIT0) != 0)) {
|
|
DEBUG ((EFI_D_INFO,
|
|
"mMorControl = %x, AtaDevice->IdentifyData->trusted_computing_support & BIT0 = %x\n",
|
|
mMorControl,
|
|
(AtaDevice->IdentifyData->trusted_computing_support & BIT0)
|
|
));
|
|
DEBUG ((EFI_D_INFO, "Try to lock device by sending TPer Reset command...\n"));
|
|
InitiateTPerReset(AtaDevice);
|
|
}
|
|
}
|
|
|
|
gBS->OpenProtocol (
|
|
AtaBusDriverData->Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
(VOID **) &AtaPassThru,
|
|
AtaBusDriverData->DriverBindingHandle,
|
|
AtaDevice->Handle,
|
|
EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER
|
|
);
|
|
//Slice - here we want to create event... really?
|
|
//
|
|
// Create event to clear pending IDE interrupt
|
|
//
|
|
Status = gBS->CreateEventEx (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
ClearInterrupt,
|
|
AtaDevice,
|
|
&gEfiEventExitBootServicesGuid,
|
|
&AtaDevice->ExitBootServiceEvent
|
|
);
|
|
|
|
Done:
|
|
if (NewDevicePathNode != NULL) {
|
|
FreePool(NewDevicePathNode);
|
|
}
|
|
|
|
if (EFI_ERROR(Status) && (AtaDevice != NULL)) {
|
|
ReleaseAtaResources (AtaDevice);
|
|
// DEBUG ((EFI_D_ERROR | EFI_D_INIT, "Failed to initialize Port %x PortMultiplierPort %x, status = %r\n", Port, PortMultiplierPort, Status));
|
|
DBG(L"Failed to initialize Port %x PortMultiplierPort %x, status = %r\n", Port, PortMultiplierPort, Status);
|
|
}
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Unregisters an ATA device.
|
|
|
|
This function removes the protocols installed on the controller handle and
|
|
frees the resources allocated for the ATA device.
|
|
|
|
@param This The pointer to EFI_DRIVER_BINDING_PROTOCOL instance.
|
|
@param Controller The controller handle of the ATA device.
|
|
@param Handle The child handle.
|
|
|
|
@retval EFI_SUCCESS The ATA device is successfully unregistered.
|
|
@return Others Some error occurs when unregistering the ATA device.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
UnregisterAtaDevice (
|
|
IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
|
IN EFI_HANDLE Controller,
|
|
IN EFI_HANDLE Handle
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_BLOCK_IO_PROTOCOL *BlockIo;
|
|
EFI_BLOCK_IO2_PROTOCOL *BlockIo2;
|
|
ATA_DEVICE *AtaDevice;
|
|
EFI_ATA_PASS_THRU_PROTOCOL *AtaPassThru;
|
|
EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *StorageSecurity;
|
|
|
|
BlockIo2 = NULL;
|
|
BlockIo = NULL;
|
|
|
|
Status = gBS->OpenProtocol (
|
|
Handle,
|
|
&gEfiBlockIoProtocolGuid,
|
|
(VOID **) &BlockIo,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
//
|
|
// Locate BlockIo2 protocol
|
|
//
|
|
Status = gBS->OpenProtocol (
|
|
Handle,
|
|
&gEfiBlockIo2ProtocolGuid,
|
|
(VOID **) &BlockIo2,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Get AtaDevice data.
|
|
//
|
|
if (BlockIo != NULL) {
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO (BlockIo);
|
|
} else {
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO2 (BlockIo2);
|
|
}
|
|
|
|
//
|
|
// Close the child handle
|
|
//
|
|
gBS->CloseProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
This->DriverBindingHandle,
|
|
Handle
|
|
);
|
|
|
|
//
|
|
// The Ata Bus driver installs the BlockIo and BlockIo2 in the DriverBindingStart().
|
|
// Here should uninstall both of them.
|
|
//
|
|
Status = gBS->UninstallMultipleProtocolInterfaces (
|
|
Handle,
|
|
&gEfiDevicePathProtocolGuid,
|
|
AtaDevice->DevicePath,
|
|
&gEfiBlockIoProtocolGuid,
|
|
&AtaDevice->BlockIo,
|
|
&gEfiBlockIo2ProtocolGuid,
|
|
&AtaDevice->BlockIo2,
|
|
&gEfiDiskInfoProtocolGuid,
|
|
&AtaDevice->DiskInfo,
|
|
NULL
|
|
);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
(VOID **) &AtaPassThru,
|
|
This->DriverBindingHandle,
|
|
Handle,
|
|
EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER
|
|
);
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// If Storage Security Command Protocol is installed, then uninstall this protocol.
|
|
//
|
|
Status = gBS->OpenProtocol (
|
|
Handle,
|
|
&gEfiStorageSecurityCommandProtocolGuid,
|
|
(VOID **) &StorageSecurity,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
|
|
if (!EFI_ERROR(Status)) {
|
|
Status = gBS->UninstallProtocolInterface (
|
|
Handle,
|
|
&gEfiStorageSecurityCommandProtocolGuid,
|
|
&AtaDevice->StorageSecurity
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
(VOID **) &AtaPassThru,
|
|
This->DriverBindingHandle,
|
|
Handle,
|
|
EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER
|
|
);
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
ReleaseAtaResources (AtaDevice);
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
Tests to see if this driver supports a given controller. If a child device is provided,
|
|
it further tests to see if this driver supports creating a handle for the specified child device.
|
|
|
|
This function checks to see if the driver specified by This supports the device specified by
|
|
ControllerHandle. Drivers will typically use the device path attached to
|
|
ControllerHandle and/or the services from the bus I/O abstraction attached to
|
|
ControllerHandle to determine if the driver supports ControllerHandle. This function
|
|
may be called many times during platform initialization. In order to reduce boot times, the tests
|
|
performed by this function must be very small, and take as little time as possible to execute. This
|
|
function must not change the state of any hardware devices, and this function must be aware that the
|
|
device specified by ControllerHandle may already be managed by the same driver or a
|
|
different driver. This function must match its calls to AllocatePages() with FreePages(),
|
|
AllocatePool() with FreePool(), and OpenProtocol() with CloseProtocol().
|
|
Since ControllerHandle may have been previously started by the same driver, if a protocol is
|
|
already in the opened state, then it must not be closed with CloseProtocol(). This is required
|
|
to guarantee the state of ControllerHandle is not modified by this function.
|
|
|
|
@param[in] This A pointer to the EFI_DRIVER_BINDING_PROTOCOL instance.
|
|
@param[in] ControllerHandle The handle of the controller to test. This handle
|
|
must support a protocol interface that supplies
|
|
an I/O abstraction to the driver.
|
|
@param[in] RemainingDevicePath A pointer to the remaining portion of a device path. This
|
|
parameter is ignored by device drivers, and is optional for bus
|
|
drivers. For bus drivers, if this parameter is not NULL, then
|
|
the bus driver must determine if the bus controller specified
|
|
by ControllerHandle and the child controller specified
|
|
by RemainingDevicePath are both supported by this
|
|
bus driver.
|
|
|
|
@retval EFI_SUCCESS The device specified by ControllerHandle and
|
|
RemainingDevicePath is supported by the driver specified by This.
|
|
@retval EFI_ALREADY_STARTED The device specified by ControllerHandle and
|
|
RemainingDevicePath is already being managed by the driver
|
|
specified by This.
|
|
@retval EFI_ACCESS_DENIED The device specified by ControllerHandle and
|
|
RemainingDevicePath is already being managed by a different
|
|
driver or an application that requires exclusive access.
|
|
Currently not implemented.
|
|
@retval EFI_UNSUPPORTED The device specified by ControllerHandle and
|
|
RemainingDevicePath is not supported by the driver specified by This.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBusDriverBindingSupported (
|
|
IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
|
IN EFI_HANDLE Controller,
|
|
IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_DEVICE_PATH_PROTOCOL *ParentDevicePath;
|
|
EFI_ATA_PASS_THRU_PROTOCOL *AtaPassThru;
|
|
UINT16 Port;
|
|
UINT16 PortMultiplierPort;
|
|
|
|
//
|
|
// Test EFI_ATA_PASS_THRU_PROTOCOL on controller handle.
|
|
//
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
(VOID **) &AtaPassThru,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_BY_DRIVER
|
|
);
|
|
|
|
if (Status == EFI_ALREADY_STARTED) {
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// Test RemainingDevicePath is valid or not.
|
|
//
|
|
if ((RemainingDevicePath != NULL) && !IsDevicePathEnd (RemainingDevicePath)) {
|
|
Status = AtaPassThru->GetDevice (AtaPassThru, RemainingDevicePath, &Port, &PortMultiplierPort);
|
|
if (EFI_ERROR(Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Close the I/O Abstraction(s) used to perform the supported test
|
|
//
|
|
gBS->CloseProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
This->DriverBindingHandle,
|
|
Controller
|
|
);
|
|
|
|
//
|
|
// Open the EFI Device Path protocol needed to perform the supported test
|
|
//
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiDevicePathProtocolGuid,
|
|
(VOID **) &ParentDevicePath,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Starts a device controller or a bus controller.
|
|
|
|
The Start() function is designed to be invoked from the EFI boot service ConnectController().
|
|
As a result, much of the error checking on the parameters to Start() has been moved into this
|
|
common boot service. It is legal to call Start() from other locations,
|
|
but the following calling restrictions must be followed or the system behavior will not be deterministic.
|
|
1. ControllerHandle must be a valid EFI_HANDLE.
|
|
2. If RemainingDevicePath is not NULL, then it must be a pointer to a naturally aligned
|
|
EFI_DEVICE_PATH_PROTOCOL.
|
|
3. Prior to calling Start(), the Supported() function for the driver specified by This must
|
|
have been called with the same calling parameters, and Supported() must have returned EFI_SUCCESS.
|
|
|
|
@param[in] This A pointer to the EFI_DRIVER_BINDING_PROTOCOL instance.
|
|
@param[in] ControllerHandle The handle of the controller to start. This handle
|
|
must support a protocol interface that supplies
|
|
an I/O abstraction to the driver.
|
|
@param[in] RemainingDevicePath A pointer to the remaining portion of a device path. This
|
|
parameter is ignored by device drivers, and is optional for bus
|
|
drivers. For a bus driver, if this parameter is NULL, then handles
|
|
for all the children of Controller are created by this driver.
|
|
If this parameter is not NULL and the first Device Path Node is
|
|
not the End of Device Path Node, then only the handle for the
|
|
child device specified by the first Device Path Node of
|
|
RemainingDevicePath is created by this driver.
|
|
If the first Device Path Node of RemainingDevicePath is
|
|
the End of Device Path Node, no child handle is created by this
|
|
driver.
|
|
|
|
@retval EFI_SUCCESS The device was started.
|
|
@retval EFI_DEVICE_ERROR The device could not be started due to a device error.Currently not implemented.
|
|
@retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack of resources.
|
|
@retval Others The driver failded to start the device.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBusDriverBindingStart (
|
|
IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
|
IN EFI_HANDLE Controller,
|
|
IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_ATA_PASS_THRU_PROTOCOL *AtaPassThru;
|
|
EFI_DEVICE_PATH_PROTOCOL *ParentDevicePath;
|
|
ATA_BUS_DRIVER_DATA *AtaBusDriverData;
|
|
UINT16 Port;
|
|
UINT16 PortMultiplierPort;
|
|
|
|
AtaBusDriverData = NULL;
|
|
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiDevicePathProtocolGuid,
|
|
(VOID **) &ParentDevicePath,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
return Status;
|
|
}
|
|
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
(VOID **) &AtaPassThru,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_BY_DRIVER
|
|
);
|
|
if ((EFI_ERROR(Status)) && (Status != EFI_ALREADY_STARTED)) {
|
|
goto ErrorExit;
|
|
}
|
|
|
|
//
|
|
// Check EFI_ALREADY_STARTED to reuse the original ATA_BUS_DRIVER_DATA.
|
|
//
|
|
if (Status != EFI_ALREADY_STARTED) {
|
|
AtaBusDriverData = AllocateZeroPool(sizeof (ATA_BUS_DRIVER_DATA));
|
|
if (AtaBusDriverData == NULL) {
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto ErrorExit;
|
|
}
|
|
|
|
AtaBusDriverData->AtaPassThru = AtaPassThru;
|
|
AtaBusDriverData->Controller = Controller;
|
|
AtaBusDriverData->ParentDevicePath = ParentDevicePath;
|
|
AtaBusDriverData->DriverBindingHandle = This->DriverBindingHandle;
|
|
|
|
Status = gBS->InstallMultipleProtocolInterfaces (
|
|
&Controller,
|
|
&gEfiCallerIdGuid,
|
|
AtaBusDriverData,
|
|
NULL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto ErrorExit;
|
|
}
|
|
|
|
} else {
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiCallerIdGuid,
|
|
(VOID **) &AtaBusDriverData,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
AtaBusDriverData = NULL;
|
|
goto ErrorExit;
|
|
}
|
|
}
|
|
|
|
if (RemainingDevicePath == NULL) {
|
|
Port = 0xFFFF;
|
|
while (TRUE) {
|
|
Status = AtaPassThru->GetNextPort (AtaPassThru, &Port);
|
|
if (EFI_ERROR(Status)) {
|
|
//
|
|
// We cannot find more legal port then we are done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
PortMultiplierPort = 0xFFFF;
|
|
while (TRUE) {
|
|
Status = AtaPassThru->GetNextDevice (AtaPassThru, Port, &PortMultiplierPort);
|
|
if (EFI_ERROR(Status)) {
|
|
//
|
|
// We cannot find more legal port multiplier port number for ATA device
|
|
// on the port, then we are done.
|
|
//
|
|
break;
|
|
}
|
|
RegisterAtaDevice (AtaBusDriverData, Port, PortMultiplierPort);
|
|
}
|
|
}
|
|
Status = EFI_SUCCESS;
|
|
} else if (!IsDevicePathEnd (RemainingDevicePath)) {
|
|
Status = AtaPassThru->GetDevice (AtaPassThru, RemainingDevicePath, &Port, &PortMultiplierPort);
|
|
if (!EFI_ERROR(Status)) {
|
|
Status = RegisterAtaDevice (AtaBusDriverData,Port, PortMultiplierPort);
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
|
|
ErrorExit:
|
|
|
|
if (AtaBusDriverData != NULL) {
|
|
gBS->UninstallMultipleProtocolInterfaces (
|
|
Controller,
|
|
&gEfiCallerIdGuid,
|
|
AtaBusDriverData,
|
|
NULL
|
|
);
|
|
FreePool(AtaBusDriverData);
|
|
}
|
|
|
|
gBS->CloseProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
This->DriverBindingHandle,
|
|
Controller
|
|
);
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
|
/**
|
|
Stops a device controller or a bus controller.
|
|
|
|
The Stop() function is designed to be invoked from the EFI boot service DisconnectController().
|
|
As a result, much of the error checking on the parameters to Stop() has been moved
|
|
into this common boot service. It is legal to call Stop() from other locations,
|
|
but the following calling restrictions must be followed or the system behavior will not be deterministic.
|
|
1. ControllerHandle must be a valid EFI_HANDLE that was used on a previous call to this
|
|
same driver's Start() function.
|
|
2. The first NumberOfChildren handles of ChildHandleBuffer must all be a valid
|
|
EFI_HANDLE. In addition, all of these handles must have been created in this driver's
|
|
Start() function, and the Start() function must have called OpenProtocol() on
|
|
ControllerHandle with an Attribute of EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER.
|
|
|
|
@param[in] This A pointer to the EFI_DRIVER_BINDING_PROTOCOL instance.
|
|
@param[in] ControllerHandle A handle to the device being stopped. The handle must
|
|
support a bus specific I/O protocol for the driver
|
|
to use to stop the device.
|
|
@param[in] NumberOfChildren The number of child device handles in ChildHandleBuffer.
|
|
@param[in] ChildHandleBuffer An array of child handles to be freed. May be NULL
|
|
if NumberOfChildren is 0.
|
|
|
|
@retval EFI_SUCCESS The device was stopped.
|
|
@retval EFI_DEVICE_ERROR The device could not be stopped due to a device error.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBusDriverBindingStop (
|
|
IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
|
IN EFI_HANDLE Controller,
|
|
IN UINTN NumberOfChildren,
|
|
IN EFI_HANDLE *ChildHandleBuffer
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
BOOLEAN AllChildrenStopped;
|
|
UINTN Index;
|
|
ATA_BUS_DRIVER_DATA *AtaBusDriverData;
|
|
|
|
if (NumberOfChildren == 0) {
|
|
Status = gBS->OpenProtocol (
|
|
Controller,
|
|
&gEfiCallerIdGuid,
|
|
(VOID **) &AtaBusDriverData,
|
|
This->DriverBindingHandle,
|
|
Controller,
|
|
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
|
);
|
|
if (!EFI_ERROR(Status)) {
|
|
gBS->UninstallMultipleProtocolInterfaces (
|
|
Controller,
|
|
&gEfiCallerIdGuid,
|
|
AtaBusDriverData,
|
|
NULL
|
|
);
|
|
FreePool(AtaBusDriverData);
|
|
}
|
|
|
|
gBS->CloseProtocol (
|
|
Controller,
|
|
&gEfiAtaPassThruProtocolGuid,
|
|
This->DriverBindingHandle,
|
|
Controller
|
|
);
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
AllChildrenStopped = TRUE;
|
|
|
|
for (Index = 0; Index < NumberOfChildren; Index++) {
|
|
|
|
Status = UnregisterAtaDevice (This, Controller, ChildHandleBuffer[Index]);
|
|
if (EFI_ERROR(Status)) {
|
|
AllChildrenStopped = FALSE;
|
|
}
|
|
}
|
|
|
|
if (!AllChildrenStopped) {
|
|
return EFI_DEVICE_ERROR;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
Reset the Block Device.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
@param ExtendedVerification Driver may perform diagnostics on reset.
|
|
|
|
@retval EFI_SUCCESS The device was reset.
|
|
@retval EFI_DEVICE_ERROR The device is not functioning properly and could
|
|
not be reset.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoReset (
|
|
IN EFI_BLOCK_IO_PROTOCOL *This,
|
|
IN BOOLEAN ExtendedVerification
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *AtaDevice;
|
|
EFI_TPL OldTpl;
|
|
|
|
OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
|
|
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO (This);
|
|
|
|
Status = ResetAtaDevice (AtaDevice);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
Status = EFI_DEVICE_ERROR;
|
|
}
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Read/Write BufferSize bytes from Lba from/into Buffer.
|
|
|
|
@param[in] This Indicates a pointer to the calling context. Either be
|
|
block I/O or block I/O2.
|
|
@param[in] MediaId The media ID that the read/write request is for.
|
|
@param[in] Lba The starting logical block address to be read/written.
|
|
The caller is responsible for reading/writing to only
|
|
legitimate locations.
|
|
@param[in, out] Token A pointer to the token associated with the transaction.
|
|
@param[in] BufferSize Size of Buffer, must be a multiple of device block size.
|
|
@param[out] Buffer A pointer to the destination/source buffer for the data.
|
|
@param[in] IsBlockIo2 Indicate the calling is from BlockIO or BlockIO2. TURE is
|
|
from BlockIO2, FALSE is for BlockIO.
|
|
@param[in] IsWrite Indicates whether it is a write operation.
|
|
|
|
@retval EFI_SUCCESS The data was read/written correctly to the device.
|
|
@retval EFI_WRITE_PROTECTED The device can not be read/written to.
|
|
@retval EFI_DEVICE_ERROR The device reported an error while performing the read/write.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device.
|
|
@retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device.
|
|
@retval EFI_INVALID_PARAMETER The read/write request contains LBAs that are not valid,
|
|
or the buffer is not on proper alignment.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
BlockIoReadWrite (
|
|
IN VOID *This,
|
|
IN UINT32 MediaId,
|
|
IN EFI_LBA Lba,
|
|
IN OUT EFI_BLOCK_IO2_TOKEN *Token,
|
|
IN UINTN BufferSize,
|
|
OUT VOID *Buffer,
|
|
IN BOOLEAN IsBlockIo2,
|
|
IN BOOLEAN IsWrite
|
|
)
|
|
{
|
|
ATA_DEVICE *AtaDevice;
|
|
EFI_STATUS Status;
|
|
EFI_TPL OldTpl;
|
|
EFI_BLOCK_IO_MEDIA *Media;
|
|
UINTN BlockSize;
|
|
UINTN NumberOfBlocks;
|
|
UINTN IoAlign;
|
|
|
|
if (IsBlockIo2) {
|
|
Media = ((EFI_BLOCK_IO2_PROTOCOL *) This)->Media;
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO2 (This);
|
|
} else {
|
|
Media = ((EFI_BLOCK_IO_PROTOCOL *) This)->Media;
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO (This);
|
|
}
|
|
|
|
if (MediaId != Media->MediaId) {
|
|
return EFI_MEDIA_CHANGED;
|
|
}
|
|
|
|
//
|
|
// Check parameters.
|
|
//
|
|
if (Buffer == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (BufferSize == 0) {
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
BlockSize = Media->BlockSize;
|
|
if ((BufferSize % BlockSize) != 0) {
|
|
return EFI_BAD_BUFFER_SIZE;
|
|
}
|
|
|
|
NumberOfBlocks = BufferSize / BlockSize;
|
|
if ((Lba + NumberOfBlocks - 1) > Media->LastBlock) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
IoAlign = Media->IoAlign;
|
|
if (IoAlign > 0 && (((UINTN) Buffer & (IoAlign - 1)) != 0)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
|
|
|
|
//
|
|
// Invoke low level AtaDevice Access Routine.
|
|
//
|
|
Status = AccessAtaDevice (AtaDevice, Buffer, Lba, NumberOfBlocks, IsWrite, Token);
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Read BufferSize bytes from Lba into Buffer.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
@param MediaId Id of the media, changes every time the media is replaced.
|
|
@param Lba The starting Logical Block Address to read from
|
|
@param BufferSize Size of Buffer, must be a multiple of device block size.
|
|
@param Buffer A pointer to the destination buffer for the data. The caller is
|
|
responsible for either having implicit or explicit ownership of the buffer.
|
|
|
|
@retval EFI_SUCCESS The data was read correctly from the device.
|
|
@retval EFI_DEVICE_ERROR The device reported an error while performing the read.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHANGED The MediaId does not matched the current device.
|
|
@retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device.
|
|
@retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid,
|
|
or the buffer is not on proper alignment.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoReadBlocks (
|
|
IN EFI_BLOCK_IO_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN EFI_LBA Lba,
|
|
IN UINTN BufferSize,
|
|
OUT VOID *Buffer
|
|
)
|
|
{
|
|
return BlockIoReadWrite ((VOID *) This, MediaId, Lba, NULL, BufferSize, Buffer, FALSE, FALSE);
|
|
}
|
|
|
|
|
|
/**
|
|
Write BufferSize bytes from Lba into Buffer.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
@param MediaId The media ID that the write request is for.
|
|
@param Lba The starting logical block address to be written. The caller is
|
|
responsible for writing to only legitimate locations.
|
|
@param BufferSize Size of Buffer, must be a multiple of device block size.
|
|
@param Buffer A pointer to the source buffer for the data.
|
|
|
|
@retval EFI_SUCCESS The data was written correctly to the device.
|
|
@retval EFI_WRITE_PROTECTED The device can not be written to.
|
|
@retval EFI_DEVICE_ERROR The device reported an error while performing the write.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device.
|
|
@retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device.
|
|
@retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid,
|
|
or the buffer is not on proper alignment.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoWriteBlocks (
|
|
IN EFI_BLOCK_IO_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN EFI_LBA Lba,
|
|
IN UINTN BufferSize,
|
|
IN VOID *Buffer
|
|
)
|
|
{
|
|
return BlockIoReadWrite ((VOID *) This, MediaId, Lba, NULL, BufferSize, Buffer, FALSE, TRUE);
|
|
}
|
|
|
|
|
|
/**
|
|
Flush the Block Device.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
|
|
@retval EFI_SUCCESS All outstanding data was written to the device
|
|
@retval EFI_DEVICE_ERROR The device reported an error while writing back the data
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoFlushBlocks (
|
|
IN EFI_BLOCK_IO_PROTOCOL *This
|
|
)
|
|
{
|
|
//
|
|
// return directly
|
|
//
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Reset the Block Device.
|
|
|
|
@param[in] This Indicates a pointer to the calling context.
|
|
@param[in] ExtendedVerification Driver may perform diagnostics on reset.
|
|
|
|
@retval EFI_SUCCESS The device was reset.
|
|
@retval EFI_DEVICE_ERROR The device is not functioning properly and could
|
|
not be reset.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoResetEx (
|
|
IN EFI_BLOCK_IO2_PROTOCOL *This,
|
|
IN BOOLEAN ExtendedVerification
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *AtaDevice;
|
|
EFI_TPL OldTpl;
|
|
|
|
OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
|
|
|
|
AtaDevice = ATA_DEVICE_FROM_BLOCK_IO2 (This);
|
|
|
|
Status = ResetAtaDevice (AtaDevice);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
Status = EFI_DEVICE_ERROR;
|
|
}
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Read BufferSize bytes from Lba into Buffer.
|
|
|
|
@param[in] This Indicates a pointer to the calling context.
|
|
@param[in] MediaId Id of the media, changes every time the media is replaced.
|
|
@param[in] Lba The starting Logical Block Address to read from.
|
|
@param[in, out] Token A pointer to the token associated with the transaction.
|
|
@param[in] BufferSize Size of Buffer, must be a multiple of device block size.
|
|
@param[out] Buffer A pointer to the destination buffer for the data. The caller is
|
|
responsible for either having implicit or explicit ownership of the buffer.
|
|
|
|
@retval EFI_SUCCESS The read request was queued if Event is not NULL.
|
|
The data was read correctly from the device if
|
|
the Event is NULL.
|
|
@retval EFI_DEVICE_ERROR The device reported an error while performing
|
|
the read.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
|
@retval EFI_BAD_BUFFER_SIZE The BufferSize parameter is not a multiple of the
|
|
intrinsic block size of the device.
|
|
@retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid,
|
|
or the buffer is not on proper alignment.
|
|
@retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack
|
|
of resources.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoReadBlocksEx (
|
|
IN EFI_BLOCK_IO2_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN EFI_LBA Lba,
|
|
IN OUT EFI_BLOCK_IO2_TOKEN *Token,
|
|
IN UINTN BufferSize,
|
|
OUT VOID *Buffer
|
|
)
|
|
{
|
|
return BlockIoReadWrite ((VOID *) This, MediaId, Lba, Token, BufferSize, Buffer, TRUE, FALSE);
|
|
}
|
|
|
|
|
|
/**
|
|
Write BufferSize bytes from Lba into Buffer.
|
|
|
|
@param[in] This Indicates a pointer to the calling context.
|
|
@param[in] MediaId The media ID that the write request is for.
|
|
@param[in] Lba The starting logical block address to be written. The
|
|
caller is responsible for writing to only legitimate
|
|
locations.
|
|
@param[in, out] Token A pointer to the token associated with the transaction.
|
|
@param[in] BufferSize Size of Buffer, must be a multiple of device block size.
|
|
@param[in] Buffer A pointer to the source buffer for the data.
|
|
|
|
@retval EFI_SUCCESS The data was written correctly to the device.
|
|
@retval EFI_WRITE_PROTECTED The device can not be written to.
|
|
@retval EFI_DEVICE_ERROR The device reported an error while performing the write.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device.
|
|
@retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device.
|
|
@retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid,
|
|
or the buffer is not on proper alignment.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoWriteBlocksEx (
|
|
IN EFI_BLOCK_IO2_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN EFI_LBA Lba,
|
|
IN OUT EFI_BLOCK_IO2_TOKEN *Token,
|
|
IN UINTN BufferSize,
|
|
IN VOID *Buffer
|
|
)
|
|
{
|
|
return BlockIoReadWrite ((VOID *) This, MediaId, Lba, Token, BufferSize, Buffer, TRUE, TRUE);
|
|
}
|
|
|
|
|
|
/**
|
|
Flush the Block Device.
|
|
|
|
@param[in] This Indicates a pointer to the calling context.
|
|
@param[in, out] Token A pointer to the token associated with the transaction.
|
|
|
|
@retval EFI_SUCCESS All outstanding data was written to the device
|
|
@retval EFI_DEVICE_ERROR The device reported an error while writing back the data
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaBlockIoFlushBlocksEx (
|
|
IN EFI_BLOCK_IO2_PROTOCOL *This,
|
|
IN OUT EFI_BLOCK_IO2_TOKEN *Token
|
|
)
|
|
{
|
|
//
|
|
// Signal event and return directly.
|
|
//
|
|
if (Token != NULL && Token->Event != NULL) {
|
|
Token->TransactionStatus = EFI_SUCCESS;
|
|
gBS->SignalEvent (Token->Event);
|
|
}
|
|
return EFI_SUCCESS;
|
|
}
|
|
/**
|
|
Provides inquiry information for the controller type.
|
|
|
|
This function is used by the IDE bus driver to get inquiry data. Data format
|
|
of Identify data is defined by the Interface GUID.
|
|
|
|
@param[in] This Pointer to the EFI_DISK_INFO_PROTOCOL instance.
|
|
@param[in, out] InquiryData Pointer to a buffer for the inquiry data.
|
|
@param[in, out] InquiryDataSize Pointer to the value for the inquiry data size.
|
|
|
|
@retval EFI_SUCCESS The command was accepted without any errors.
|
|
@retval EFI_NOT_FOUND Device does not support this data class
|
|
@retval EFI_DEVICE_ERROR Error reading InquiryData from device
|
|
@retval EFI_BUFFER_TOO_SMALL InquiryDataSize not big enough
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaDiskInfoInquiry (
|
|
IN EFI_DISK_INFO_PROTOCOL *This,
|
|
IN OUT VOID *InquiryData,
|
|
IN OUT UINT32 *InquiryDataSize
|
|
)
|
|
{
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
|
|
/**
|
|
Provides identify information for the controller type.
|
|
|
|
This function is used by the IDE bus driver to get identify data. Data format
|
|
of Identify data is defined by the Interface GUID.
|
|
|
|
@param[in] This Pointer to the EFI_DISK_INFO_PROTOCOL
|
|
instance.
|
|
@param[in, out] IdentifyData Pointer to a buffer for the identify data.
|
|
@param[in, out] IdentifyDataSize Pointer to the value for the identify data
|
|
size.
|
|
|
|
@retval EFI_SUCCESS The command was accepted without any errors.
|
|
@retval EFI_NOT_FOUND Device does not support this data class
|
|
@retval EFI_DEVICE_ERROR Error reading IdentifyData from device
|
|
@retval EFI_BUFFER_TOO_SMALL IdentifyDataSize not big enough
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaDiskInfoIdentify (
|
|
IN EFI_DISK_INFO_PROTOCOL *This,
|
|
IN OUT VOID *IdentifyData,
|
|
IN OUT UINT32 *IdentifyDataSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *AtaDevice;
|
|
|
|
AtaDevice = ATA_DEVICE_FROM_DISK_INFO (This);
|
|
|
|
Status = EFI_BUFFER_TOO_SMALL;
|
|
if (*IdentifyDataSize >= sizeof (ATA_IDENTIFY_DATA)) {
|
|
Status = EFI_SUCCESS;
|
|
CopyMem(IdentifyData, AtaDevice->IdentifyData, sizeof (ATA_IDENTIFY_DATA));
|
|
}
|
|
*IdentifyDataSize = sizeof (ATA_IDENTIFY_DATA);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Provides sense data information for the controller type.
|
|
|
|
This function is used by the IDE bus driver to get sense data.
|
|
Data format of Sense data is defined by the Interface GUID.
|
|
|
|
@param[in] This Pointer to the EFI_DISK_INFO_PROTOCOL instance.
|
|
@param[in, out] SenseData Pointer to the SenseData.
|
|
@param[in, out] SenseDataSize Size of SenseData in bytes.
|
|
@param[out] SenseDataNumber Pointer to the value for the sense data size.
|
|
|
|
@retval EFI_SUCCESS The command was accepted without any errors.
|
|
@retval EFI_NOT_FOUND Device does not support this data class.
|
|
@retval EFI_DEVICE_ERROR Error reading SenseData from device.
|
|
@retval EFI_BUFFER_TOO_SMALL SenseDataSize not big enough.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaDiskInfoSenseData (
|
|
IN EFI_DISK_INFO_PROTOCOL *This,
|
|
IN OUT VOID *SenseData,
|
|
IN OUT UINT32 *SenseDataSize,
|
|
OUT UINT8 *SenseDataNumber
|
|
)
|
|
{
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
|
|
/**
|
|
This function is used by the IDE bus driver to get controller information.
|
|
|
|
@param[in] This Pointer to the EFI_DISK_INFO_PROTOCOL instance.
|
|
@param[out] IdeChannel Pointer to the Ide Channel number. Primary or secondary.
|
|
@param[out] IdeDevice Pointer to the Ide Device number. Master or slave.
|
|
|
|
@retval EFI_SUCCESS IdeChannel and IdeDevice are valid.
|
|
@retval EFI_UNSUPPORTED This is not an IDE device.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaDiskInfoWhichIde (
|
|
IN EFI_DISK_INFO_PROTOCOL *This,
|
|
OUT UINT32 *IdeChannel,
|
|
OUT UINT32 *IdeDevice
|
|
)
|
|
{
|
|
ATA_DEVICE *AtaDevice;
|
|
|
|
AtaDevice = ATA_DEVICE_FROM_DISK_INFO (This);
|
|
*IdeChannel = AtaDevice->Port;
|
|
*IdeDevice = AtaDevice->PortMultiplierPort;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Send a security protocol command to a device that receives data and/or the result
|
|
of one or more commands sent by SendData.
|
|
|
|
The ReceiveData function sends a security protocol command to the given MediaId.
|
|
The security protocol command sent is defined by SecurityProtocolId and contains
|
|
the security protocol specific data SecurityProtocolSpecificData. The function
|
|
returns the data from the security protocol command in PayloadBuffer.
|
|
|
|
For devices supporting the SCSI command set, the security protocol command is sent
|
|
using the SECURITY PROTOCOL IN command defined in SPC-4.
|
|
|
|
For devices supporting the ATA command set, the security protocol command is sent
|
|
using one of the TRUSTED RECEIVE commands defined in ATA8-ACS if PayloadBufferSize
|
|
is non-zero.
|
|
|
|
If the PayloadBufferSize is zero, the security protocol command is sent using the
|
|
Trusted Non-Data command defined in ATA8-ACS.
|
|
|
|
If PayloadBufferSize is too small to store the available data from the security
|
|
protocol command, the function shall copy PayloadBufferSize bytes into the
|
|
PayloadBuffer and return EFI_WARN_BUFFER_TOO_SMALL.
|
|
|
|
If PayloadBuffer or PayloadTransferSize is NULL and PayloadBufferSize is non-zero,
|
|
the function shall return EFI_INVALID_PARAMETER.
|
|
|
|
If the given MediaId does not support security protocol commands, the function shall
|
|
return EFI_UNSUPPORTED. If there is no media in the device, the function returns
|
|
EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the device,
|
|
the function returns EFI_MEDIA_CHANGED.
|
|
|
|
If the security protocol fails to complete within the Timeout period, the function
|
|
shall return EFI_TIMEOUT.
|
|
|
|
If the security protocol command completes without an error, the function shall
|
|
return EFI_SUCCESS. If the security protocol command completes with an error, the
|
|
function shall return EFI_DEVICE_ERROR.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
@param MediaId ID of the medium to receive data from.
|
|
@param Timeout The timeout, in 100ns units, to use for the execution
|
|
of the security protocol command. A Timeout value of 0
|
|
means that this function will wait indefinitely for the
|
|
security protocol command to execute. If Timeout is greater
|
|
than zero, then this function will return EFI_TIMEOUT
|
|
if the time required to execute the receive data command
|
|
is greater than Timeout.
|
|
@param SecurityProtocolId The value of the "Security Protocol" parameter of
|
|
the security protocol command to be sent.
|
|
@param SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
|
|
of the security protocol command to be sent.
|
|
@param PayloadBufferSize Size in bytes of the payload data buffer.
|
|
@param PayloadBuffer A pointer to a destination buffer to store the security
|
|
protocol command specific payload data for the security
|
|
protocol command. The caller is responsible for having
|
|
either implicit or explicit ownership of the buffer.
|
|
@param PayloadTransferSize A pointer to a buffer to store the size in bytes of the
|
|
data written to the payload data buffer.
|
|
|
|
@retval EFI_SUCCESS The security protocol command completed successfully.
|
|
@retval EFI_WARN_BUFFER_TOO_SMALL The PayloadBufferSize was too small to store the available
|
|
data from the device. The PayloadBuffer contains the truncated data.
|
|
@retval EFI_UNSUPPORTED The given MediaId does not support security protocol commands.
|
|
@retval EFI_DEVICE_ERROR The security protocol command completed with an error.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
|
@retval EFI_INVALID_PARAMETER The PayloadBuffer or PayloadTransferSize is NULL and
|
|
PayloadBufferSize is non-zero.
|
|
@retval EFI_TIMEOUT A timeout occurred while waiting for the security
|
|
protocol command to execute.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaStorageSecurityReceiveData (
|
|
IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN UINT64 Timeout,
|
|
IN UINT8 SecurityProtocolId,
|
|
IN UINT16 SecurityProtocolSpecificData,
|
|
IN UINTN PayloadBufferSize,
|
|
OUT VOID *PayloadBuffer,
|
|
OUT UINTN *PayloadTransferSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *Private;
|
|
EFI_TPL OldTpl;
|
|
|
|
// DEBUG ((EFI_D_INFO, "EFI Storage Security Protocol - Read"));
|
|
if ((PayloadBuffer == NULL || PayloadTransferSize == NULL) && PayloadBufferSize != 0) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Status = EFI_SUCCESS;
|
|
Private = ATA_DEVICE_FROM_STORAGE_SECURITY (This);
|
|
|
|
if (MediaId != Private->BlockIo.Media->MediaId) {
|
|
return EFI_MEDIA_CHANGED;
|
|
}
|
|
|
|
if (!Private->BlockIo.Media->MediaPresent) {
|
|
return EFI_NO_MEDIA;
|
|
}
|
|
|
|
OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
|
|
|
|
Status = TrustTransferAtaDevice (
|
|
Private,
|
|
PayloadBuffer,
|
|
SecurityProtocolId,
|
|
SecurityProtocolSpecificData,
|
|
PayloadBufferSize,
|
|
FALSE,
|
|
Timeout,
|
|
PayloadTransferSize
|
|
);
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Send a security protocol command to a device.
|
|
|
|
The SendData function sends a security protocol command containing the payload
|
|
PayloadBuffer to the given MediaId. The security protocol command sent is
|
|
defined by SecurityProtocolId and contains the security protocol specific data
|
|
SecurityProtocolSpecificData. If the underlying protocol command requires a
|
|
specific padding for the command payload, the SendData function shall add padding
|
|
bytes to the command payload to satisfy the padding requirements.
|
|
|
|
For devices supporting the SCSI command set, the security protocol command is sent
|
|
using the SECURITY PROTOCOL OUT command defined in SPC-4.
|
|
|
|
For devices supporting the ATA command set, the security protocol command is sent
|
|
using one of the TRUSTED SEND commands defined in ATA8-ACS if PayloadBufferSize
|
|
is non-zero. If the PayloadBufferSize is zero, the security protocol command is
|
|
sent using the Trusted Non-Data command defined in ATA8-ACS.
|
|
|
|
If PayloadBuffer is NULL and PayloadBufferSize is non-zero, the function shall
|
|
return EFI_INVALID_PARAMETER.
|
|
|
|
If the given MediaId does not support security protocol commands, the function
|
|
shall return EFI_UNSUPPORTED. If there is no media in the device, the function
|
|
returns EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the
|
|
device, the function returns EFI_MEDIA_CHANGED.
|
|
|
|
If the security protocol fails to complete within the Timeout period, the function
|
|
shall return EFI_TIMEOUT.
|
|
|
|
If the security protocol command completes without an error, the function shall return
|
|
EFI_SUCCESS. If the security protocol command completes with an error, the function
|
|
shall return EFI_DEVICE_ERROR.
|
|
|
|
@param This Indicates a pointer to the calling context.
|
|
@param MediaId ID of the medium to receive data from.
|
|
@param Timeout The timeout, in 100ns units, to use for the execution
|
|
of the security protocol command. A Timeout value of 0
|
|
means that this function will wait indefinitely for the
|
|
security protocol command to execute. If Timeout is greater
|
|
than zero, then this function will return EFI_TIMEOUT
|
|
if the time required to execute the receive data command
|
|
is greater than Timeout.
|
|
@param SecurityProtocolId The value of the "Security Protocol" parameter of
|
|
the security protocol command to be sent.
|
|
@param SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
|
|
of the security protocol command to be sent.
|
|
@param PayloadBufferSize Size in bytes of the payload data buffer.
|
|
@param PayloadBuffer A pointer to a destination buffer to store the security
|
|
protocol command specific payload data for the security
|
|
protocol command.
|
|
|
|
@retval EFI_SUCCESS The security protocol command completed successfully.
|
|
@retval EFI_UNSUPPORTED The given MediaId does not support security protocol commands.
|
|
@retval EFI_DEVICE_ERROR The security protocol command completed with an error.
|
|
@retval EFI_NO_MEDIA There is no media in the device.
|
|
@retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
|
@retval EFI_INVALID_PARAMETER The PayloadBuffer is NULL and PayloadBufferSize is non-zero.
|
|
@retval EFI_TIMEOUT A timeout occurred while waiting for the security
|
|
protocol command to execute.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
AtaStorageSecuritySendData (
|
|
IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *This,
|
|
IN UINT32 MediaId,
|
|
IN UINT64 Timeout,
|
|
IN UINT8 SecurityProtocolId,
|
|
IN UINT16 SecurityProtocolSpecificData,
|
|
IN UINTN PayloadBufferSize,
|
|
IN VOID *PayloadBuffer
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
ATA_DEVICE *Private;
|
|
EFI_TPL OldTpl;
|
|
|
|
// DEBUG ((EFI_D_INFO, "EFI Storage Security Protocol - Send"));
|
|
if ((PayloadBuffer == NULL) && (PayloadBufferSize != 0)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Status = EFI_SUCCESS;
|
|
Private = ATA_DEVICE_FROM_STORAGE_SECURITY (This);
|
|
|
|
if (MediaId != Private->BlockIo.Media->MediaId) {
|
|
return EFI_MEDIA_CHANGED;
|
|
}
|
|
|
|
OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
|
|
Status = TrustTransferAtaDevice (
|
|
Private,
|
|
PayloadBuffer,
|
|
SecurityProtocolId,
|
|
SecurityProtocolSpecificData,
|
|
PayloadBufferSize,
|
|
TRUE,
|
|
Timeout,
|
|
NULL
|
|
);
|
|
|
|
gBS->RestoreTPL (OldTpl);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
The user Entry Point for module AtaBus. The user code starts with this function.
|
|
|
|
@param[in] ImageHandle The firmware allocated handle for the EFI image.
|
|
@param[in] SystemTable A pointer to the EFI System Table.
|
|
|
|
@retval EFI_SUCCESS The entry point is executed successfully.
|
|
@retval other Some error occurs when executing this entry point.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
InitializeAtaBus(
|
|
IN EFI_HANDLE ImageHandle,
|
|
IN EFI_SYSTEM_TABLE *SystemTable
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN DataSize;
|
|
|
|
//
|
|
// Install driver model protocol(s).
|
|
//
|
|
Status = EfiLibInstallDriverBindingComponentName2 (
|
|
ImageHandle,
|
|
SystemTable,
|
|
&gAtaBusDriverBinding,
|
|
ImageHandle,
|
|
&gAtaBusComponentName,
|
|
&gAtaBusComponentName2
|
|
);
|
|
// ASSERT_EFI_ERROR(Status);
|
|
if (EFI_ERROR(Status)) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// Get the MorControl bit.
|
|
//
|
|
DataSize = sizeof (mMorControl);
|
|
Status = gRT->GetVariable (
|
|
MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,
|
|
&gEfiMemoryOverwriteControlDataGuid,
|
|
NULL,
|
|
&DataSize,
|
|
&mMorControl
|
|
);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
// DEBUG ((EFI_D_INFO, "AtaBus:gEfiMemoryOverwriteControlDataGuid doesn't exist!!***\n"));
|
|
mHasMor = FALSE;
|
|
mMorControl = 0;
|
|
Status = EFI_SUCCESS;
|
|
} else {
|
|
// DEBUG ((EFI_D_INFO, "AtaBus:Get the gEfiMemoryOverwriteControlDataGuid = %x!!***\n", mMorControl));
|
|
mHasMor = TRUE;
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Send TPer Reset command to reset eDrive to lock all protected bands.
|
|
Typically, there are 2 mechanism for resetting eDrive. They are:
|
|
1. TPer Reset through IEEE 1667 protocol.
|
|
2. TPer Reset through native TCG protocol.
|
|
This routine will detect what protocol the attached eDrive comform to, TCG or
|
|
IEEE 1667 protocol. Then send out TPer Reset command separately.
|
|
|
|
@param[in] AtaDevice ATA_DEVICE pointer.
|
|
|
|
**/
|
|
VOID
|
|
InitiateTPerReset (
|
|
IN ATA_DEVICE *AtaDevice
|
|
)
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
UINT8 *Buffer;
|
|
UINTN XferSize;
|
|
UINTN Len;
|
|
UINTN Index;
|
|
BOOLEAN TcgFlag;
|
|
BOOLEAN IeeeFlag;
|
|
EFI_BLOCK_IO_PROTOCOL *BlockIo;
|
|
EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *Ssp;
|
|
SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *Data;
|
|
|
|
// Buffer = NULL;
|
|
if (!AtaDevice) {
|
|
return;
|
|
}
|
|
TcgFlag = FALSE;
|
|
IeeeFlag = FALSE;
|
|
Ssp = &AtaDevice->StorageSecurity;
|
|
BlockIo = &AtaDevice->BlockIo;
|
|
|
|
//
|
|
// ATA8-ACS 7.57.6.1 indicates the Transfer Length field requirements a multiple of 512.
|
|
// If the length of the TRUSTED RECEIVE parameter data is greater than the Transfer Length,
|
|
// then the device shall return the TRUSTED RECEIVE parameter data truncated to the requested Transfer Length.
|
|
//
|
|
Len = ROUNDUP512(sizeof(SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA));
|
|
Buffer = AllocateZeroPool(Len);
|
|
|
|
if (Buffer == NULL) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// When the Security Protocol field is set to 00h, and SP Specific is set to 0000h in a TRUSTED RECEIVE
|
|
// command, the device basic information data shall be returned.
|
|
//
|
|
Status = Ssp->ReceiveData (
|
|
Ssp,
|
|
BlockIo->Media->MediaId,
|
|
100000000, // Timeout 10-sec
|
|
0, // SecurityProtocol
|
|
0, // SecurityProtocolSpecifcData
|
|
Len, // PayloadBufferSize,
|
|
Buffer, // PayloadBuffer
|
|
&XferSize
|
|
);
|
|
if (EFI_ERROR(Status)) {
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// In returned data, the ListLength field indicates the total length, in bytes,
|
|
// of the supported security protocol list.
|
|
//
|
|
Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;
|
|
Len = ROUNDUP512(sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA) +
|
|
(Data->SupportedSecurityListLength[0] << 8) +
|
|
(Data->SupportedSecurityListLength[1])
|
|
);
|
|
|
|
//
|
|
// Free original buffer and allocate new buffer.
|
|
//
|
|
FreePool(Buffer);
|
|
Buffer = AllocateZeroPool(Len);
|
|
if (Buffer == NULL) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Read full supported security protocol list from device.
|
|
//
|
|
Status = Ssp->ReceiveData (
|
|
Ssp,
|
|
BlockIo->Media->MediaId,
|
|
100000000, // Timeout 10-sec
|
|
0, // SecurityProtocol
|
|
0, // SecurityProtocolSpecifcData
|
|
Len, // PayloadBufferSize,
|
|
Buffer, // PayloadBuffer
|
|
&XferSize
|
|
);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
goto Exit;
|
|
}
|
|
|
|
Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;
|
|
Len = (Data->SupportedSecurityListLength[0] << 8) + Data->SupportedSecurityListLength[1];
|
|
|
|
//
|
|
// Iterate full supported security protocol list to check if TCG or IEEE 1667 protocol
|
|
// is supported.
|
|
//
|
|
for (Index = 0; Index < Len; Index++) {
|
|
if (Data->SupportedSecurityProtocol[Index] == SECURITY_PROTOCOL_TCG) {
|
|
//
|
|
// Found a TCG device.
|
|
//
|
|
TcgFlag = TRUE;
|
|
DEBUG ((EFI_D_INFO, "This device is a TCG protocol device\n"));
|
|
break;
|
|
}
|
|
|
|
if (Data->SupportedSecurityProtocol[Index] == SECURITY_PROTOCOL_IEEE1667) {
|
|
//
|
|
// Found a IEEE 1667 device.
|
|
//
|
|
IeeeFlag = TRUE;
|
|
DEBUG ((EFI_D_INFO, "This device is a IEEE 1667 protocol device\n"));
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!TcgFlag && !IeeeFlag) {
|
|
DEBUG ((EFI_D_INFO, "Neither a TCG nor IEEE 1667 protocol device is found\n"));
|
|
goto Exit;
|
|
}
|
|
|
|
if (TcgFlag) {
|
|
//
|
|
// As long as TCG protocol is supported, send out a TPer Reset
|
|
// TCG command to the device via the TrustedSend command with a non-zero Transfer Length.
|
|
//
|
|
Status = Ssp->SendData (
|
|
Ssp,
|
|
BlockIo->Media->MediaId,
|
|
100000000, // Timeout 10-sec
|
|
SECURITY_PROTOCOL_TCG, // SecurityProtocol
|
|
0x0400, // SecurityProtocolSpecifcData
|
|
512, // PayloadBufferSize,
|
|
Buffer // PayloadBuffer
|
|
);
|
|
|
|
if (!EFI_ERROR(Status)) {
|
|
DEBUG ((EFI_D_INFO, "Send TPer Reset Command Successfully !\n"));
|
|
} else {
|
|
DEBUG ((EFI_D_INFO, "Send TPer Reset Command Fail !\n"));
|
|
}
|
|
}
|
|
|
|
if (IeeeFlag) {
|
|
//
|
|
// TBD : Perform a TPer Reset via IEEE 1667 Protocol
|
|
//
|
|
DEBUG ((EFI_D_INFO, "IEEE 1667 Protocol didn't support yet!\n"));
|
|
}
|
|
|
|
Exit:
|
|
|
|
if (Buffer != NULL) {
|
|
FreePool(Buffer);
|
|
}
|
|
}
|