| /** @file | |
| The helper functions for BlockIo and BlockIo2 protocol. | |
| Copyright (c) 2015 - 2017, Intel Corporation. All rights reserved.<BR> | |
| This program and the accompanying materials | |
| are licensed and made available under the terms and conditions of the BSD License | |
| which accompanies this distribution. The full text of the license may be found at | |
| http://opensource.org/licenses/bsd-license.php | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
| **/ | |
| #include "EmmcDxe.h" | |
| /** | |
| Nonblocking I/O callback funtion when the event is signaled. | |
| @param[in] Event The Event this notify function registered to. | |
| @param[in] Context Pointer to the context data registered to the | |
| Event. | |
| **/ | |
| VOID | |
| EFIAPI | |
| AsyncIoCallback ( | |
| IN EFI_EVENT Event, | |
| IN VOID *Context | |
| ) | |
| { | |
| EMMC_REQUEST *Request; | |
| EFI_STATUS Status; | |
| Status = gBS->CloseEvent (Event); | |
| if (EFI_ERROR (Status)) { | |
| return; | |
| } | |
| Request = (EMMC_REQUEST *) Context; | |
| DEBUG_CODE_BEGIN (); | |
| DEBUG ((EFI_D_INFO, "Emmc Async Request: CmdIndex[%d] Arg[%08x] %r\n", | |
| Request->SdMmcCmdBlk.CommandIndex, Request->SdMmcCmdBlk.CommandArgument, | |
| Request->Packet.TransactionStatus)); | |
| DEBUG_CODE_END (); | |
| if (EFI_ERROR (Request->Packet.TransactionStatus)) { | |
| Request->Token->TransactionStatus = Request->Packet.TransactionStatus; | |
| } | |
| RemoveEntryList (&Request->Link); | |
| if (Request->IsEnd) { | |
| gBS->SignalEvent (Request->Token->Event); | |
| } | |
| FreePool (Request); | |
| } | |
| /** | |
| Send command SELECT to the device to select/deselect the device. | |
| @param[in] Device A pointer to the EMMC_DEVICE instance. | |
| @param[in] Rca The relative device address to use. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcSelect ( | |
| IN EMMC_DEVICE *Device, | |
| IN UINT16 Rca | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_SD_MMC_COMMAND_BLOCK SdMmcCmdBlk; | |
| EFI_SD_MMC_STATUS_BLOCK SdMmcStatusBlk; | |
| EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet; | |
| PassThru = Device->Private->PassThru; | |
| ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk)); | |
| ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk)); | |
| ZeroMem (&Packet, sizeof (Packet)); | |
| Packet.SdMmcCmdBlk = &SdMmcCmdBlk; | |
| Packet.SdMmcStatusBlk = &SdMmcStatusBlk; | |
| Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SdMmcCmdBlk.CommandIndex = EMMC_SELECT_DESELECT_CARD; | |
| SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16; | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL); | |
| return Status; | |
| } | |
| /** | |
| Send command SEND_STATUS to the device to get device status. | |
| @param[in] Device A pointer to the EMMC_DEVICE instance. | |
| @param[in] Rca The relative device address to use. | |
| @param[out] DevStatus The buffer to store the device status. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcSendStatus ( | |
| IN EMMC_DEVICE *Device, | |
| IN UINT16 Rca, | |
| OUT UINT32 *DevStatus | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_SD_MMC_COMMAND_BLOCK SdMmcCmdBlk; | |
| EFI_SD_MMC_STATUS_BLOCK SdMmcStatusBlk; | |
| EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet; | |
| PassThru = Device->Private->PassThru; | |
| ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk)); | |
| ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk)); | |
| ZeroMem (&Packet, sizeof (Packet)); | |
| Packet.SdMmcCmdBlk = &SdMmcCmdBlk; | |
| Packet.SdMmcStatusBlk = &SdMmcStatusBlk; | |
| Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SdMmcCmdBlk.CommandIndex = EMMC_SEND_STATUS; | |
| SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16; | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL); | |
| if (!EFI_ERROR (Status)) { | |
| CopyMem (DevStatus, &SdMmcStatusBlk.Resp0, sizeof (UINT32)); | |
| } | |
| return Status; | |
| } | |
| /** | |
| Send command SEND_CSD to the device to get the CSD register data. | |
| @param[in] Device A pointer to the EMMC_DEVICE instance. | |
| @param[in] Rca The relative device address to use. | |
| @param[out] Csd The buffer to store the EMMC_CSD register data. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcGetCsd ( | |
| IN EMMC_DEVICE *Device, | |
| IN UINT16 Rca, | |
| OUT EMMC_CSD *Csd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_SD_MMC_COMMAND_BLOCK SdMmcCmdBlk; | |
| EFI_SD_MMC_STATUS_BLOCK SdMmcStatusBlk; | |
| EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet; | |
| PassThru = Device->Private->PassThru; | |
| ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk)); | |
| ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk)); | |
| ZeroMem (&Packet, sizeof (Packet)); | |
| ZeroMem (Csd, sizeof (EMMC_CSD)); | |
| Packet.SdMmcCmdBlk = &SdMmcCmdBlk; | |
| Packet.SdMmcStatusBlk = &SdMmcStatusBlk; | |
| Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SdMmcCmdBlk.CommandIndex = EMMC_SEND_CSD; | |
| SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR2; | |
| SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16; | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // For details, refer to SD Host Controller Simplified Spec 3.0 Table 2-12. | |
| // | |
| CopyMem (((UINT8*)Csd) + 1, &SdMmcStatusBlk.Resp0, sizeof (EMMC_CSD) - 1); | |
| } | |
| return Status; | |
| } | |
| /** | |
| Send command SEND_CID to the device to get the CID register data. | |
| @param[in] Device A pointer to the EMMC_DEVICE instance. | |
| @param[in] Rca The relative device address to use. | |
| @param[out] Cid The buffer to store the EMMC_CID register data. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcGetCid ( | |
| IN EMMC_DEVICE *Device, | |
| IN UINT16 Rca, | |
| OUT EMMC_CID *Cid | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_SD_MMC_COMMAND_BLOCK SdMmcCmdBlk; | |
| EFI_SD_MMC_STATUS_BLOCK SdMmcStatusBlk; | |
| EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet; | |
| PassThru = Device->Private->PassThru; | |
| ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk)); | |
| ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk)); | |
| ZeroMem (&Packet, sizeof (Packet)); | |
| ZeroMem (Cid, sizeof (EMMC_CID)); | |
| Packet.SdMmcCmdBlk = &SdMmcCmdBlk; | |
| Packet.SdMmcStatusBlk = &SdMmcStatusBlk; | |
| Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SdMmcCmdBlk.CommandIndex = EMMC_SEND_CID; | |
| SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR2; | |
| SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16; | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // For details, refer to SD Host Controller Simplified Spec 3.0 Table 2-12. | |
| // | |
| CopyMem (((UINT8*)Cid) + 1, &SdMmcStatusBlk.Resp0, sizeof (EMMC_CID) - 1); | |
| } | |
| return Status; | |
| } | |
| /** | |
| Send command SEND_EXT_CSD to the device to get the EXT_CSD register data. | |
| @param[in] Device A pointer to the EMMC_DEVICE instance. | |
| @param[out] ExtCsd The buffer to store the EXT_CSD register data. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcGetExtCsd ( | |
| IN EMMC_DEVICE *Device, | |
| OUT EMMC_EXT_CSD *ExtCsd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_SD_MMC_COMMAND_BLOCK SdMmcCmdBlk; | |
| EFI_SD_MMC_STATUS_BLOCK SdMmcStatusBlk; | |
| EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet; | |
| PassThru = Device->Private->PassThru; | |
| ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk)); | |
| ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk)); | |
| ZeroMem (&Packet, sizeof (Packet)); | |
| ZeroMem (ExtCsd, sizeof (EMMC_EXT_CSD)); | |
| Packet.SdMmcCmdBlk = &SdMmcCmdBlk; | |
| Packet.SdMmcStatusBlk = &SdMmcStatusBlk; | |
| Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SdMmcCmdBlk.CommandIndex = EMMC_SEND_EXT_CSD; | |
| SdMmcCmdBlk.CommandType = SdMmcCommandTypeAdtc; | |
| SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| SdMmcCmdBlk.CommandArgument = 0x00000000; | |
| Packet.InDataBuffer = ExtCsd; | |
| Packet.InTransferLength = sizeof (EMMC_EXT_CSD); | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL); | |
| return Status; | |
| } | |
| /** | |
| Set the specified EXT_CSD register field through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] Offset The offset of the specified field in EXT_CSD register. | |
| @param[in] Value The byte value written to the field specified by Offset. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcSetExtCsd ( | |
| IN EMMC_PARTITION *Partition, | |
| IN UINT8 Offset, | |
| IN UINT8 Value, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *SetExtCsdReq; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| UINT32 CommandArgument; | |
| EFI_TPL OldTpl; | |
| SetExtCsdReq = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| SetExtCsdReq = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (SetExtCsdReq == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| SetExtCsdReq->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &SetExtCsdReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| SetExtCsdReq->Packet.SdMmcCmdBlk = &SetExtCsdReq->SdMmcCmdBlk; | |
| SetExtCsdReq->Packet.SdMmcStatusBlk = &SetExtCsdReq->SdMmcStatusBlk; | |
| SetExtCsdReq->Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SetExtCsdReq->SdMmcCmdBlk.CommandIndex = EMMC_SWITCH; | |
| SetExtCsdReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SetExtCsdReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1b; | |
| // | |
| // Write the Value to the field specified by Offset. | |
| // | |
| CommandArgument = (Value << 8) | (Offset << 16) | BIT24 | BIT25; | |
| SetExtCsdReq->SdMmcCmdBlk.CommandArgument = CommandArgument; | |
| SetExtCsdReq->IsEnd = IsEnd; | |
| SetExtCsdReq->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| SetExtCsdReq, | |
| &SetExtCsdReq->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| SetExtCsdReq->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &SetExtCsdReq->Packet, SetExtCsdReq->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (SetExtCsdReq != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&SetExtCsdReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (SetExtCsdReq->Event != NULL) { | |
| gBS->CloseEvent (SetExtCsdReq->Event); | |
| } | |
| FreePool (SetExtCsdReq); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (SetExtCsdReq != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&SetExtCsdReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (SetExtCsdReq); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Set the number of blocks for a block read/write cmd through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] BlockNum The number of blocks for transfer. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcSetBlkCount ( | |
| IN EMMC_PARTITION *Partition, | |
| IN UINT16 BlockNum, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *SetBlkCntReq; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_TPL OldTpl; | |
| SetBlkCntReq = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| SetBlkCntReq = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (SetBlkCntReq == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| SetBlkCntReq->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &SetBlkCntReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| SetBlkCntReq->Packet.SdMmcCmdBlk = &SetBlkCntReq->SdMmcCmdBlk; | |
| SetBlkCntReq->Packet.SdMmcStatusBlk = &SetBlkCntReq->SdMmcStatusBlk; | |
| SetBlkCntReq->Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| SetBlkCntReq->SdMmcCmdBlk.CommandIndex = EMMC_SET_BLOCK_COUNT; | |
| SetBlkCntReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| SetBlkCntReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| SetBlkCntReq->SdMmcCmdBlk.CommandArgument = BlockNum; | |
| SetBlkCntReq->IsEnd = IsEnd; | |
| SetBlkCntReq->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| SetBlkCntReq, | |
| &SetBlkCntReq->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| SetBlkCntReq->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &SetBlkCntReq->Packet, SetBlkCntReq->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (SetBlkCntReq != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&SetBlkCntReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (SetBlkCntReq->Event != NULL) { | |
| gBS->CloseEvent (SetBlkCntReq->Event); | |
| } | |
| FreePool (SetBlkCntReq); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (SetBlkCntReq != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&SetBlkCntReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (SetBlkCntReq); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Read blocks through security protocol cmds with the way of sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] SecurityProtocolId The value of the "Security Protocol" parameter of | |
| the security protocol command to be sent. | |
| @param[in] SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter | |
| of the security protocol command to be sent. | |
| @param[in] PayloadBufferSize Size in bytes of the payload data buffer. | |
| @param[out] PayloadBuffer A pointer to a destination buffer to store the security | |
| protocol command specific payload data for the security | |
| protocol command. The caller is responsible for having | |
| either implicit or explicit ownership of the buffer. | |
| @param[in] IsRead Indicates it is a read or write operation. | |
| @param[in] Timeout The timeout value, in 100ns units. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcProtocolInOut ( | |
| IN EMMC_PARTITION *Partition, | |
| IN UINT8 SecurityProtocol, | |
| IN UINT16 SecurityProtocolSpecificData, | |
| IN UINTN PayloadBufferSize, | |
| OUT VOID *PayloadBuffer, | |
| IN BOOLEAN IsRead, | |
| IN UINT64 Timeout, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *ProtocolReq; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_TPL OldTpl; | |
| ProtocolReq = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| ProtocolReq = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (ProtocolReq == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| ProtocolReq->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &ProtocolReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| ProtocolReq->Packet.SdMmcCmdBlk = &ProtocolReq->SdMmcCmdBlk; | |
| ProtocolReq->Packet.SdMmcStatusBlk = &ProtocolReq->SdMmcStatusBlk; | |
| if (IsRead) { | |
| ProtocolReq->Packet.InDataBuffer = PayloadBuffer; | |
| ProtocolReq->Packet.InTransferLength = (UINT32)PayloadBufferSize; | |
| ProtocolReq->SdMmcCmdBlk.CommandIndex = EMMC_PROTOCOL_RD; | |
| ProtocolReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAdtc; | |
| ProtocolReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| } else { | |
| ProtocolReq->Packet.OutDataBuffer = PayloadBuffer; | |
| ProtocolReq->Packet.OutTransferLength = (UINT32)PayloadBufferSize; | |
| ProtocolReq->SdMmcCmdBlk.CommandIndex = EMMC_PROTOCOL_WR; | |
| ProtocolReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAdtc; | |
| ProtocolReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| } | |
| ProtocolReq->SdMmcCmdBlk.CommandArgument = (SecurityProtocol << 8) | (SecurityProtocolSpecificData << 16); | |
| // | |
| // Convert to 1 microsecond unit. | |
| // | |
| ProtocolReq->Packet.Timeout = DivU64x32 (Timeout, 10) + 1; | |
| ProtocolReq->IsEnd = IsEnd; | |
| ProtocolReq->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| ProtocolReq, | |
| &ProtocolReq->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| ProtocolReq->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &ProtocolReq->Packet, ProtocolReq->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (ProtocolReq != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&ProtocolReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (ProtocolReq->Event != NULL) { | |
| gBS->CloseEvent (ProtocolReq->Event); | |
| } | |
| FreePool (ProtocolReq); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (ProtocolReq != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&ProtocolReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (ProtocolReq); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Read/write multiple blocks through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] Lba The starting logical block address to be read/written. | |
| The caller is responsible for reading/writing to only | |
| legitimate locations. | |
| @param[in] Buffer A pointer to the destination/source buffer for the data. | |
| @param[in] BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param[in] IsRead Indicates it is a read or write operation. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcRwMultiBlocks ( | |
| IN EMMC_PARTITION *Partition, | |
| IN EFI_LBA Lba, | |
| IN VOID *Buffer, | |
| IN UINTN BufferSize, | |
| IN BOOLEAN IsRead, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *RwMultiBlkReq; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EFI_TPL OldTpl; | |
| RwMultiBlkReq = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| RwMultiBlkReq = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (RwMultiBlkReq == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| RwMultiBlkReq->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &RwMultiBlkReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| RwMultiBlkReq->Packet.SdMmcCmdBlk = &RwMultiBlkReq->SdMmcCmdBlk; | |
| RwMultiBlkReq->Packet.SdMmcStatusBlk = &RwMultiBlkReq->SdMmcStatusBlk; | |
| // | |
| // Calculate timeout value through the below formula. | |
| // Timeout = (transfer size) / (2MB/s). | |
| // Taking 2MB/s as divisor is because it's nearest to the eMMC lowest | |
| // transfer speed (2.4MB/s). | |
| // Refer to eMMC 5.0 spec section 6.9.1 for details. | |
| // | |
| RwMultiBlkReq->Packet.Timeout = (BufferSize / (2 * 1024 * 1024) + 1) * 1000 * 1000; | |
| if (IsRead) { | |
| RwMultiBlkReq->Packet.InDataBuffer = Buffer; | |
| RwMultiBlkReq->Packet.InTransferLength = (UINT32)BufferSize; | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandIndex = EMMC_READ_MULTIPLE_BLOCK; | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAdtc; | |
| RwMultiBlkReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| } else { | |
| RwMultiBlkReq->Packet.OutDataBuffer = Buffer; | |
| RwMultiBlkReq->Packet.OutTransferLength = (UINT32)BufferSize; | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandIndex = EMMC_WRITE_MULTIPLE_BLOCK; | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAdtc; | |
| RwMultiBlkReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| } | |
| if (Partition->Device->SectorAddressing) { | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandArgument = (UINT32)Lba; | |
| } else { | |
| RwMultiBlkReq->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (Lba, Partition->BlockMedia.BlockSize); | |
| } | |
| RwMultiBlkReq->IsEnd = IsEnd; | |
| RwMultiBlkReq->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| RwMultiBlkReq, | |
| &RwMultiBlkReq->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| RwMultiBlkReq->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &RwMultiBlkReq->Packet, RwMultiBlkReq->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (RwMultiBlkReq != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&RwMultiBlkReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (RwMultiBlkReq->Event != NULL) { | |
| gBS->CloseEvent (RwMultiBlkReq->Event); | |
| } | |
| FreePool (RwMultiBlkReq); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (RwMultiBlkReq != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&RwMultiBlkReq->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (RwMultiBlkReq); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| This function transfers data from/to EMMC device. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] MediaId The media ID that the read/write request is for. | |
| @param[in] Lba The starting logical block address to be read/written. | |
| The caller is responsible for reading/writing to only | |
| legitimate locations. | |
| @param[in, out] Buffer A pointer to the destination/source buffer for the data. | |
| @param[in] BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param[in] IsRead Indicates it is a read or write operation. | |
| @param[in, out] Token A pointer to the token associated with the transaction. | |
| @retval EFI_SUCCESS The data was read/written correctly to the device. | |
| @retval EFI_WRITE_PROTECTED The device can not be read/written to. | |
| @retval EFI_DEVICE_ERROR The device reported an error while performing the read/write. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device. | |
| @retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device. | |
| @retval EFI_INVALID_PARAMETER The read/write request contains LBAs that are not valid, | |
| or the buffer is not on proper alignment. | |
| **/ | |
| EFI_STATUS | |
| EmmcReadWrite ( | |
| IN EMMC_PARTITION *Partition, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN OUT VOID *Buffer, | |
| IN UINTN BufferSize, | |
| IN BOOLEAN IsRead, | |
| IN OUT EFI_BLOCK_IO2_TOKEN *Token | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_DEVICE *Device; | |
| EFI_BLOCK_IO_MEDIA *Media; | |
| UINTN BlockSize; | |
| UINTN BlockNum; | |
| UINTN IoAlign; | |
| UINT8 PartitionConfig; | |
| UINTN Remaining; | |
| UINT32 MaxBlock; | |
| BOOLEAN LastRw; | |
| Status = EFI_SUCCESS; | |
| Device = Partition->Device; | |
| Media = &Partition->BlockMedia; | |
| LastRw = FALSE; | |
| if (MediaId != Media->MediaId) { | |
| return EFI_MEDIA_CHANGED; | |
| } | |
| if (!IsRead && Media->ReadOnly) { | |
| return EFI_WRITE_PROTECTED; | |
| } | |
| // | |
| // Check parameters. | |
| // | |
| if (Buffer == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if (BufferSize == 0) { | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| gBS->SignalEvent (Token->Event); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| BlockSize = Media->BlockSize; | |
| if ((BufferSize % BlockSize) != 0) { | |
| return EFI_BAD_BUFFER_SIZE; | |
| } | |
| BlockNum = BufferSize / BlockSize; | |
| if ((Lba + BlockNum - 1) > Media->LastBlock) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| IoAlign = Media->IoAlign; | |
| if (IoAlign > 0 && (((UINTN) Buffer & (IoAlign - 1)) != 0)) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| } | |
| // | |
| // Check if needs to switch partition access. | |
| // | |
| PartitionConfig = Device->ExtCsd.PartitionConfig; | |
| if ((PartitionConfig & 0x7) != Partition->PartitionType) { | |
| PartitionConfig &= (UINT8)~0x7; | |
| PartitionConfig |= Partition->PartitionType; | |
| Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, Token, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Device->ExtCsd.PartitionConfig = PartitionConfig; | |
| } | |
| // | |
| // Start to execute data transfer. The max block number in single cmd is 65535 blocks. | |
| // | |
| Remaining = BlockNum; | |
| MaxBlock = 0xFFFF; | |
| while (Remaining > 0) { | |
| if (Remaining <= MaxBlock) { | |
| BlockNum = Remaining; | |
| LastRw = TRUE; | |
| } else { | |
| BlockNum = MaxBlock; | |
| } | |
| Status = EmmcSetBlkCount (Partition, (UINT16)BlockNum, Token, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| BufferSize = BlockNum * BlockSize; | |
| Status = EmmcRwMultiBlocks (Partition, Lba, Buffer, BufferSize, IsRead, Token, LastRw); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| DEBUG ((EFI_D_INFO, "Emmc%a(): Part %d Lba 0x%x BlkNo 0x%x Event %p with %r\n", IsRead ? "Read " : "Write", Partition->PartitionType, Lba, BlockNum, (Token != NULL) ? Token->Event : NULL, Status)); | |
| Lba += BlockNum; | |
| Buffer = (UINT8*)Buffer + BufferSize; | |
| Remaining -= BlockNum; | |
| } | |
| return Status; | |
| } | |
| /** | |
| Reset the Block Device. | |
| @param This Indicates a pointer to the calling context. | |
| @param ExtendedVerification Driver may perform diagnostics on reset. | |
| @retval EFI_SUCCESS The device was reset. | |
| @retval EFI_DEVICE_ERROR The device is not functioning properly and could | |
| not be reset. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcReset ( | |
| IN EFI_BLOCK_IO_PROTOCOL *This, | |
| IN BOOLEAN ExtendedVerification | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This); | |
| PassThru = Partition->Device->Private->PassThru; | |
| Status = PassThru->ResetDevice (PassThru, Partition->Device->Slot); | |
| if (EFI_ERROR (Status)) { | |
| Status = EFI_DEVICE_ERROR; | |
| } | |
| return Status; | |
| } | |
| /** | |
| Read BufferSize bytes from Lba into Buffer. | |
| @param This Indicates a pointer to the calling context. | |
| @param MediaId Id of the media, changes every time the media is replaced. | |
| @param Lba The starting Logical Block Address to read from | |
| @param BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param Buffer A pointer to the destination buffer for the data. The caller is | |
| responsible for either having implicit or explicit ownership of the buffer. | |
| @retval EFI_SUCCESS The data was read correctly from the device. | |
| @retval EFI_DEVICE_ERROR The device reported an error while performing the read. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId does not matched the current device. | |
| @retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device. | |
| @retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid, | |
| or the buffer is not on proper alignment. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcReadBlocks ( | |
| IN EFI_BLOCK_IO_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN UINTN BufferSize, | |
| OUT VOID *Buffer | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This); | |
| Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, TRUE, NULL); | |
| return Status; | |
| } | |
| /** | |
| Write BufferSize bytes from Lba into Buffer. | |
| @param This Indicates a pointer to the calling context. | |
| @param MediaId The media ID that the write request is for. | |
| @param Lba The starting logical block address to be written. The caller is | |
| responsible for writing to only legitimate locations. | |
| @param BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param Buffer A pointer to the source buffer for the data. | |
| @retval EFI_SUCCESS The data was written correctly to the device. | |
| @retval EFI_WRITE_PROTECTED The device can not be written to. | |
| @retval EFI_DEVICE_ERROR The device reported an error while performing the write. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device. | |
| @retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device. | |
| @retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid, | |
| or the buffer is not on proper alignment. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcWriteBlocks ( | |
| IN EFI_BLOCK_IO_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN UINTN BufferSize, | |
| IN VOID *Buffer | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This); | |
| Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, FALSE, NULL); | |
| return Status; | |
| } | |
| /** | |
| Flush the Block Device. | |
| @param This Indicates a pointer to the calling context. | |
| @retval EFI_SUCCESS All outstanding data was written to the device | |
| @retval EFI_DEVICE_ERROR The device reported an error while writing back the data | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcFlushBlocks ( | |
| IN EFI_BLOCK_IO_PROTOCOL *This | |
| ) | |
| { | |
| // | |
| // return directly | |
| // | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Reset the Block Device. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in] ExtendedVerification Driver may perform diagnostics on reset. | |
| @retval EFI_SUCCESS The device was reset. | |
| @retval EFI_DEVICE_ERROR The device is not functioning properly and could | |
| not be reset. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcResetEx ( | |
| IN EFI_BLOCK_IO2_PROTOCOL *This, | |
| IN BOOLEAN ExtendedVerification | |
| ) | |
| { | |
| EMMC_PARTITION *Partition; | |
| LIST_ENTRY *Link; | |
| LIST_ENTRY *NextLink; | |
| EMMC_REQUEST *Request; | |
| EFI_TPL OldTpl; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This); | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| for (Link = GetFirstNode (&Partition->Queue); | |
| !IsNull (&Partition->Queue, Link); | |
| Link = NextLink) { | |
| NextLink = GetNextNode (&Partition->Queue, Link); | |
| RemoveEntryList (Link); | |
| Request = EMMC_REQUEST_FROM_LINK (Link); | |
| gBS->CloseEvent (Request->Event); | |
| Request->Token->TransactionStatus = EFI_ABORTED; | |
| if (Request->IsEnd) { | |
| gBS->SignalEvent (Request->Token->Event); | |
| } | |
| FreePool (Request); | |
| } | |
| gBS->RestoreTPL (OldTpl); | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Read BufferSize bytes from Lba into Buffer. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in] MediaId Id of the media, changes every time the media is replaced. | |
| @param[in] Lba The starting Logical Block Address to read from. | |
| @param[in, out] Token A pointer to the token associated with the transaction. | |
| @param[in] BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param[out] Buffer A pointer to the destination buffer for the data. The caller is | |
| responsible for either having implicit or explicit ownership of the buffer. | |
| @retval EFI_SUCCESS The read request was queued if Event is not NULL. | |
| The data was read correctly from the device if | |
| the Event is NULL. | |
| @retval EFI_DEVICE_ERROR The device reported an error while performing | |
| the read. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId is not for the current media. | |
| @retval EFI_BAD_BUFFER_SIZE The BufferSize parameter is not a multiple of the | |
| intrinsic block size of the device. | |
| @retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid, | |
| or the buffer is not on proper alignment. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack | |
| of resources. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcReadBlocksEx ( | |
| IN EFI_BLOCK_IO2_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN OUT EFI_BLOCK_IO2_TOKEN *Token, | |
| IN UINTN BufferSize, | |
| OUT VOID *Buffer | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This); | |
| Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, TRUE, Token); | |
| return Status; | |
| } | |
| /** | |
| Write BufferSize bytes from Lba into Buffer. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in] MediaId The media ID that the write request is for. | |
| @param[in] Lba The starting logical block address to be written. The | |
| caller is responsible for writing to only legitimate | |
| locations. | |
| @param[in, out] Token A pointer to the token associated with the transaction. | |
| @param[in] BufferSize Size of Buffer, must be a multiple of device block size. | |
| @param[in] Buffer A pointer to the source buffer for the data. | |
| @retval EFI_SUCCESS The data was written correctly to the device. | |
| @retval EFI_WRITE_PROTECTED The device can not be written to. | |
| @retval EFI_DEVICE_ERROR The device reported an error while performing the write. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHNAGED The MediaId does not matched the current device. | |
| @retval EFI_BAD_BUFFER_SIZE The Buffer was not a multiple of the block size of the device. | |
| @retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid, | |
| or the buffer is not on proper alignment. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcWriteBlocksEx ( | |
| IN EFI_BLOCK_IO2_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN OUT EFI_BLOCK_IO2_TOKEN *Token, | |
| IN UINTN BufferSize, | |
| IN VOID *Buffer | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This); | |
| Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, FALSE, Token); | |
| return Status; | |
| } | |
| /** | |
| Flush the Block Device. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in, out] Token A pointer to the token associated with the transaction. | |
| @retval EFI_SUCCESS All outstanding data was written to the device | |
| @retval EFI_DEVICE_ERROR The device reported an error while writing back the data | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcFlushBlocksEx ( | |
| IN EFI_BLOCK_IO2_PROTOCOL *This, | |
| IN OUT EFI_BLOCK_IO2_TOKEN *Token | |
| ) | |
| { | |
| // | |
| // Signal event and return directly. | |
| // | |
| if (Token != NULL && Token->Event != NULL) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| gBS->SignalEvent (Token->Event); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Send a security protocol command to a device that receives data and/or the result | |
| of one or more commands sent by SendData. | |
| The ReceiveData function sends a security protocol command to the given MediaId. | |
| The security protocol command sent is defined by SecurityProtocolId and contains | |
| the security protocol specific data SecurityProtocolSpecificData. The function | |
| returns the data from the security protocol command in PayloadBuffer. | |
| For devices supporting the SCSI command set, the security protocol command is sent | |
| using the SECURITY PROTOCOL IN command defined in SPC-4. | |
| For devices supporting the ATA command set, the security protocol command is sent | |
| using one of the TRUSTED RECEIVE commands defined in ATA8-ACS if PayloadBufferSize | |
| is non-zero. | |
| If the PayloadBufferSize is zero, the security protocol command is sent using the | |
| Trusted Non-Data command defined in ATA8-ACS. | |
| If PayloadBufferSize is too small to store the available data from the security | |
| protocol command, the function shall copy PayloadBufferSize bytes into the | |
| PayloadBuffer and return EFI_WARN_BUFFER_TOO_SMALL. | |
| If PayloadBuffer or PayloadTransferSize is NULL and PayloadBufferSize is non-zero, | |
| the function shall return EFI_INVALID_PARAMETER. | |
| If the given MediaId does not support security protocol commands, the function shall | |
| return EFI_UNSUPPORTED. If there is no media in the device, the function returns | |
| EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the device, | |
| the function returns EFI_MEDIA_CHANGED. | |
| If the security protocol fails to complete within the Timeout period, the function | |
| shall return EFI_TIMEOUT. | |
| If the security protocol command completes without an error, the function shall | |
| return EFI_SUCCESS. If the security protocol command completes with an error, the | |
| function shall return EFI_DEVICE_ERROR. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in] MediaId ID of the medium to receive data from. | |
| @param[in] Timeout The timeout, in 100ns units, to use for the execution | |
| of the security protocol command. A Timeout value of 0 | |
| means that this function will wait indefinitely for the | |
| security protocol command to execute. If Timeout is greater | |
| than zero, then this function will return EFI_TIMEOUT | |
| if the time required to execute the receive data command | |
| is greater than Timeout. | |
| @param[in] SecurityProtocolId The value of the "Security Protocol" parameter of | |
| the security protocol command to be sent. | |
| @param[in] SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter | |
| of the security protocol command to be sent. | |
| @param[in] PayloadBufferSize Size in bytes of the payload data buffer. | |
| @param[out] PayloadBuffer A pointer to a destination buffer to store the security | |
| protocol command specific payload data for the security | |
| protocol command. The caller is responsible for having | |
| either implicit or explicit ownership of the buffer. | |
| @param[out] PayloadTransferSize A pointer to a buffer to store the size in bytes of the | |
| data written to the payload data buffer. | |
| @param[in] IsRead Indicates it is a read or write operation. | |
| @retval EFI_SUCCESS The security protocol command completed successfully. | |
| @retval EFI_WARN_BUFFER_TOO_SMALL The PayloadBufferSize was too small to store the available | |
| data from the device. The PayloadBuffer contains the truncated data. | |
| @retval EFI_UNSUPPORTED The given MediaId does not support security protocol commands. | |
| @retval EFI_DEVICE_ERROR The security protocol command completed with an error. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId is not for the current media. | |
| @retval EFI_INVALID_PARAMETER The PayloadBuffer or PayloadTransferSize is NULL and | |
| PayloadBufferSize is non-zero. | |
| @retval EFI_TIMEOUT A timeout occurred while waiting for the security | |
| protocol command to execute. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcSecurityProtocolInOut ( | |
| IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN UINT64 Timeout, | |
| IN UINT8 SecurityProtocolId, | |
| IN UINT16 SecurityProtocolSpecificData, | |
| IN UINTN PayloadBufferSize, | |
| OUT VOID *PayloadBuffer, | |
| OUT UINTN *PayloadTransferSize, | |
| IN BOOLEAN IsRead | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EMMC_PARTITION *Partition; | |
| EMMC_DEVICE *Device; | |
| EFI_BLOCK_IO_MEDIA *Media; | |
| UINTN BlockSize; | |
| UINTN BlockNum; | |
| UINTN IoAlign; | |
| UINTN Remaining; | |
| UINT32 MaxBlock; | |
| UINT8 PartitionConfig; | |
| Status = EFI_SUCCESS; | |
| Partition = EMMC_PARTITION_DATA_FROM_SSP (This); | |
| Device = Partition->Device; | |
| Media = &Partition->BlockMedia; | |
| if (PayloadTransferSize != NULL) { | |
| *PayloadTransferSize = 0; | |
| } | |
| if ((PayloadBuffer == NULL) && (PayloadBufferSize != 0)) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if (MediaId != Media->MediaId) { | |
| return EFI_MEDIA_CHANGED; | |
| } | |
| if (PayloadBufferSize == 0) { | |
| return EFI_SUCCESS; | |
| } | |
| BlockSize = Media->BlockSize; | |
| if ((PayloadBufferSize % BlockSize) != 0) { | |
| return EFI_BAD_BUFFER_SIZE; | |
| } | |
| BlockNum = PayloadBufferSize / BlockSize; | |
| IoAlign = Media->IoAlign; | |
| if (IoAlign > 0 && (((UINTN) PayloadBuffer & (IoAlign - 1)) != 0)) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Security protocol interface is synchronous transfer. | |
| // Waiting for async I/O list to be empty before any operation. | |
| // | |
| while (!IsListEmpty (&Partition->Queue)); | |
| // | |
| // Check if needs to switch partition access. | |
| // | |
| PartitionConfig = Device->ExtCsd.PartitionConfig; | |
| if ((PartitionConfig & 0x7) != Partition->PartitionType) { | |
| PartitionConfig &= (UINT8)~0x7; | |
| PartitionConfig |= Partition->PartitionType; | |
| Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, NULL, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Device->ExtCsd.PartitionConfig = PartitionConfig; | |
| } | |
| // | |
| // Start to execute data transfer. The max block number in single cmd is 65535 blocks. | |
| // | |
| Remaining = BlockNum; | |
| MaxBlock = 0xFFFF; | |
| while (Remaining > 0) { | |
| if (Remaining <= MaxBlock) { | |
| BlockNum = Remaining; | |
| } else { | |
| BlockNum = MaxBlock; | |
| } | |
| Status = EmmcSetBlkCount (Partition, (UINT16)BlockNum, NULL, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| PayloadBufferSize = BlockNum * BlockSize; | |
| Status = EmmcProtocolInOut (Partition, SecurityProtocolId, SecurityProtocolSpecificData, PayloadBufferSize, PayloadBuffer, IsRead, Timeout, NULL, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| PayloadBuffer = (UINT8*)PayloadBuffer + PayloadBufferSize; | |
| Remaining -= BlockNum; | |
| if (PayloadTransferSize != NULL) { | |
| *PayloadTransferSize += PayloadBufferSize; | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Send a security protocol command to a device that receives data and/or the result | |
| of one or more commands sent by SendData. | |
| The ReceiveData function sends a security protocol command to the given MediaId. | |
| The security protocol command sent is defined by SecurityProtocolId and contains | |
| the security protocol specific data SecurityProtocolSpecificData. The function | |
| returns the data from the security protocol command in PayloadBuffer. | |
| For devices supporting the SCSI command set, the security protocol command is sent | |
| using the SECURITY PROTOCOL IN command defined in SPC-4. | |
| For devices supporting the ATA command set, the security protocol command is sent | |
| using one of the TRUSTED RECEIVE commands defined in ATA8-ACS if PayloadBufferSize | |
| is non-zero. | |
| If the PayloadBufferSize is zero, the security protocol command is sent using the | |
| Trusted Non-Data command defined in ATA8-ACS. | |
| If PayloadBufferSize is too small to store the available data from the security | |
| protocol command, the function shall copy PayloadBufferSize bytes into the | |
| PayloadBuffer and return EFI_WARN_BUFFER_TOO_SMALL. | |
| If PayloadBuffer or PayloadTransferSize is NULL and PayloadBufferSize is non-zero, | |
| the function shall return EFI_INVALID_PARAMETER. | |
| If the given MediaId does not support security protocol commands, the function shall | |
| return EFI_UNSUPPORTED. If there is no media in the device, the function returns | |
| EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the device, | |
| the function returns EFI_MEDIA_CHANGED. | |
| If the security protocol fails to complete within the Timeout period, the function | |
| shall return EFI_TIMEOUT. | |
| If the security protocol command completes without an error, the function shall | |
| return EFI_SUCCESS. If the security protocol command completes with an error, the | |
| function shall return EFI_DEVICE_ERROR. | |
| @param This Indicates a pointer to the calling context. | |
| @param MediaId ID of the medium to receive data from. | |
| @param Timeout The timeout, in 100ns units, to use for the execution | |
| of the security protocol command. A Timeout value of 0 | |
| means that this function will wait indefinitely for the | |
| security protocol command to execute. If Timeout is greater | |
| than zero, then this function will return EFI_TIMEOUT | |
| if the time required to execute the receive data command | |
| is greater than Timeout. | |
| @param SecurityProtocolId The value of the "Security Protocol" parameter of | |
| the security protocol command to be sent. | |
| @param SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter | |
| of the security protocol command to be sent. | |
| @param PayloadBufferSize Size in bytes of the payload data buffer. | |
| @param PayloadBuffer A pointer to a destination buffer to store the security | |
| protocol command specific payload data for the security | |
| protocol command. The caller is responsible for having | |
| either implicit or explicit ownership of the buffer. | |
| @param PayloadTransferSize A pointer to a buffer to store the size in bytes of the | |
| data written to the payload data buffer. | |
| @retval EFI_SUCCESS The security protocol command completed successfully. | |
| @retval EFI_WARN_BUFFER_TOO_SMALL The PayloadBufferSize was too small to store the available | |
| data from the device. The PayloadBuffer contains the truncated data. | |
| @retval EFI_UNSUPPORTED The given MediaId does not support security protocol commands. | |
| @retval EFI_DEVICE_ERROR The security protocol command completed with an error. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId is not for the current media. | |
| @retval EFI_INVALID_PARAMETER The PayloadBuffer or PayloadTransferSize is NULL and | |
| PayloadBufferSize is non-zero. | |
| @retval EFI_TIMEOUT A timeout occurred while waiting for the security | |
| protocol command to execute. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcSecurityProtocolIn ( | |
| IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN UINT64 Timeout, | |
| IN UINT8 SecurityProtocolId, | |
| IN UINT16 SecurityProtocolSpecificData, | |
| IN UINTN PayloadBufferSize, | |
| OUT VOID *PayloadBuffer, | |
| OUT UINTN *PayloadTransferSize | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| if ((PayloadTransferSize == NULL) && PayloadBufferSize != 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| Status = EmmcSecurityProtocolInOut ( | |
| This, | |
| MediaId, | |
| Timeout, | |
| SecurityProtocolId, | |
| SecurityProtocolSpecificData, | |
| PayloadBufferSize, | |
| PayloadBuffer, | |
| PayloadTransferSize, | |
| TRUE | |
| ); | |
| return Status; | |
| } | |
| /** | |
| Send a security protocol command to a device. | |
| The SendData function sends a security protocol command containing the payload | |
| PayloadBuffer to the given MediaId. The security protocol command sent is | |
| defined by SecurityProtocolId and contains the security protocol specific data | |
| SecurityProtocolSpecificData. If the underlying protocol command requires a | |
| specific padding for the command payload, the SendData function shall add padding | |
| bytes to the command payload to satisfy the padding requirements. | |
| For devices supporting the SCSI command set, the security protocol command is sent | |
| using the SECURITY PROTOCOL OUT command defined in SPC-4. | |
| For devices supporting the ATA command set, the security protocol command is sent | |
| using one of the TRUSTED SEND commands defined in ATA8-ACS if PayloadBufferSize | |
| is non-zero. If the PayloadBufferSize is zero, the security protocol command is | |
| sent using the Trusted Non-Data command defined in ATA8-ACS. | |
| If PayloadBuffer is NULL and PayloadBufferSize is non-zero, the function shall | |
| return EFI_INVALID_PARAMETER. | |
| If the given MediaId does not support security protocol commands, the function | |
| shall return EFI_UNSUPPORTED. If there is no media in the device, the function | |
| returns EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the | |
| device, the function returns EFI_MEDIA_CHANGED. | |
| If the security protocol fails to complete within the Timeout period, the function | |
| shall return EFI_TIMEOUT. | |
| If the security protocol command completes without an error, the function shall return | |
| EFI_SUCCESS. If the security protocol command completes with an error, the function | |
| shall return EFI_DEVICE_ERROR. | |
| @param This Indicates a pointer to the calling context. | |
| @param MediaId ID of the medium to receive data from. | |
| @param Timeout The timeout, in 100ns units, to use for the execution | |
| of the security protocol command. A Timeout value of 0 | |
| means that this function will wait indefinitely for the | |
| security protocol command to execute. If Timeout is greater | |
| than zero, then this function will return EFI_TIMEOUT | |
| if the time required to execute the receive data command | |
| is greater than Timeout. | |
| @param SecurityProtocolId The value of the "Security Protocol" parameter of | |
| the security protocol command to be sent. | |
| @param SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter | |
| of the security protocol command to be sent. | |
| @param PayloadBufferSize Size in bytes of the payload data buffer. | |
| @param PayloadBuffer A pointer to a destination buffer to store the security | |
| protocol command specific payload data for the security | |
| protocol command. | |
| @retval EFI_SUCCESS The security protocol command completed successfully. | |
| @retval EFI_UNSUPPORTED The given MediaId does not support security protocol commands. | |
| @retval EFI_DEVICE_ERROR The security protocol command completed with an error. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId is not for the current media. | |
| @retval EFI_INVALID_PARAMETER The PayloadBuffer is NULL and PayloadBufferSize is non-zero. | |
| @retval EFI_TIMEOUT A timeout occurred while waiting for the security | |
| protocol command to execute. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcSecurityProtocolOut ( | |
| IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN UINT64 Timeout, | |
| IN UINT8 SecurityProtocolId, | |
| IN UINT16 SecurityProtocolSpecificData, | |
| IN UINTN PayloadBufferSize, | |
| IN VOID *PayloadBuffer | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| Status = EmmcSecurityProtocolInOut ( | |
| This, | |
| MediaId, | |
| Timeout, | |
| SecurityProtocolId, | |
| SecurityProtocolSpecificData, | |
| PayloadBufferSize, | |
| PayloadBuffer, | |
| NULL, | |
| FALSE | |
| ); | |
| return Status; | |
| } | |
| /** | |
| Set the erase start address through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] StartLba The starting logical block address to be erased. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcEraseBlockStart ( | |
| IN EMMC_PARTITION *Partition, | |
| IN EFI_LBA StartLba, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *EraseBlockStart; | |
| EFI_TPL OldTpl; | |
| EraseBlockStart = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| EraseBlockStart = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (EraseBlockStart == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| EraseBlockStart->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &EraseBlockStart->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| EraseBlockStart->Packet.SdMmcCmdBlk = &EraseBlockStart->SdMmcCmdBlk; | |
| EraseBlockStart->Packet.SdMmcStatusBlk = &EraseBlockStart->SdMmcStatusBlk; | |
| EraseBlockStart->Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| EraseBlockStart->SdMmcCmdBlk.CommandIndex = EMMC_ERASE_GROUP_START; | |
| EraseBlockStart->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| EraseBlockStart->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| if (Device->SectorAddressing) { | |
| EraseBlockStart->SdMmcCmdBlk.CommandArgument = (UINT32)StartLba; | |
| } else { | |
| EraseBlockStart->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (StartLba, Partition->BlockMedia.BlockSize); | |
| } | |
| EraseBlockStart->IsEnd = IsEnd; | |
| EraseBlockStart->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| EraseBlockStart, | |
| &EraseBlockStart->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| EraseBlockStart->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlockStart->Packet, EraseBlockStart->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (EraseBlockStart != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlockStart->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (EraseBlockStart->Event != NULL) { | |
| gBS->CloseEvent (EraseBlockStart->Event); | |
| } | |
| FreePool (EraseBlockStart); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (EraseBlockStart != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlockStart->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (EraseBlockStart); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Set the erase end address through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] EndLba The ending logical block address to be erased. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcEraseBlockEnd ( | |
| IN EMMC_PARTITION *Partition, | |
| IN EFI_LBA EndLba, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *EraseBlockEnd; | |
| EFI_TPL OldTpl; | |
| EraseBlockEnd = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| EraseBlockEnd = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (EraseBlockEnd == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| EraseBlockEnd->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &EraseBlockEnd->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| EraseBlockEnd->Packet.SdMmcCmdBlk = &EraseBlockEnd->SdMmcCmdBlk; | |
| EraseBlockEnd->Packet.SdMmcStatusBlk = &EraseBlockEnd->SdMmcStatusBlk; | |
| EraseBlockEnd->Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| EraseBlockEnd->SdMmcCmdBlk.CommandIndex = EMMC_ERASE_GROUP_END; | |
| EraseBlockEnd->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| EraseBlockEnd->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1; | |
| if (Device->SectorAddressing) { | |
| EraseBlockEnd->SdMmcCmdBlk.CommandArgument = (UINT32)EndLba; | |
| } else { | |
| EraseBlockEnd->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (EndLba, Partition->BlockMedia.BlockSize); | |
| } | |
| EraseBlockEnd->IsEnd = IsEnd; | |
| EraseBlockEnd->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| EraseBlockEnd, | |
| &EraseBlockEnd->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| EraseBlockEnd->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlockEnd->Packet, EraseBlockEnd->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (EraseBlockEnd != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlockEnd->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (EraseBlockEnd->Event != NULL) { | |
| gBS->CloseEvent (EraseBlockEnd->Event); | |
| } | |
| FreePool (EraseBlockEnd); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (EraseBlockEnd != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlockEnd->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (EraseBlockEnd); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Erase specified blocks through sync or async I/O request. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] Token A pointer to the token associated with the transaction. | |
| @param[in] IsEnd A boolean to show whether it's the last cmd in a series of cmds. | |
| This parameter is only meaningful in async I/O request. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcEraseBlock ( | |
| IN EMMC_PARTITION *Partition, | |
| IN EFI_BLOCK_IO2_TOKEN *Token, | |
| IN BOOLEAN IsEnd | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru; | |
| EMMC_DEVICE *Device; | |
| EMMC_REQUEST *EraseBlock; | |
| EFI_TPL OldTpl; | |
| EraseBlock = NULL; | |
| Device = Partition->Device; | |
| PassThru = Device->Private->PassThru; | |
| EraseBlock = AllocateZeroPool (sizeof (EMMC_REQUEST)); | |
| if (EraseBlock == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Error; | |
| } | |
| EraseBlock->Signature = EMMC_REQUEST_SIGNATURE; | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| InsertTailList (&Partition->Queue, &EraseBlock->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| EraseBlock->Packet.SdMmcCmdBlk = &EraseBlock->SdMmcCmdBlk; | |
| EraseBlock->Packet.SdMmcStatusBlk = &EraseBlock->SdMmcStatusBlk; | |
| EraseBlock->Packet.Timeout = EMMC_GENERIC_TIMEOUT; | |
| EraseBlock->SdMmcCmdBlk.CommandIndex = EMMC_ERASE; | |
| EraseBlock->SdMmcCmdBlk.CommandType = SdMmcCommandTypeAc; | |
| EraseBlock->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1b; | |
| if ((Device->ExtCsd.SecFeatureSupport & BIT4) != 0) { | |
| // | |
| // Perform a Trim operation which applies the erase operation to write blocks | |
| // instead of erase groups. (Spec JESD84-B51, eMMC Electrical Standard 5.1, | |
| // Section 6.6.10 and 6.10.4) | |
| // | |
| EraseBlock->SdMmcCmdBlk.CommandArgument = 1; | |
| } | |
| EraseBlock->IsEnd = IsEnd; | |
| EraseBlock->Token = Token; | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Status = gBS->CreateEvent ( | |
| EVT_NOTIFY_SIGNAL, | |
| TPL_NOTIFY, | |
| AsyncIoCallback, | |
| EraseBlock, | |
| &EraseBlock->Event | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Error; | |
| } | |
| } else { | |
| EraseBlock->Event = NULL; | |
| } | |
| Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlock->Packet, EraseBlock->Event); | |
| Error: | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| // | |
| // For asynchronous operation, only free request and event in error case. | |
| // The request and event will be freed in asynchronous callback for success case. | |
| // | |
| if (EFI_ERROR (Status) && (EraseBlock != NULL)) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlock->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| if (EraseBlock->Event != NULL) { | |
| gBS->CloseEvent (EraseBlock->Event); | |
| } | |
| FreePool (EraseBlock); | |
| } | |
| } else { | |
| // | |
| // For synchronous operation, free request whatever the execution result is. | |
| // | |
| if (EraseBlock != NULL) { | |
| OldTpl = gBS->RaiseTPL (TPL_NOTIFY); | |
| RemoveEntryList (&EraseBlock->Link); | |
| gBS->RestoreTPL (OldTpl); | |
| FreePool (EraseBlock); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Write zeros to specified blocks. | |
| @param[in] Partition A pointer to the EMMC_PARTITION instance. | |
| @param[in] StartLba The starting logical block address to write zeros. | |
| @param[in] Size The size in bytes to fill with zeros. This must be a multiple of | |
| the physical block size of the device. | |
| @retval EFI_SUCCESS The request is executed successfully. | |
| @retval EFI_OUT_OF_RESOURCES The request could not be executed due to a lack of resources. | |
| @retval Others The request could not be executed successfully. | |
| **/ | |
| EFI_STATUS | |
| EmmcWriteZeros ( | |
| IN EMMC_PARTITION *Partition, | |
| IN EFI_LBA StartLba, | |
| IN UINTN Size | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINT8 *Buffer; | |
| UINT32 MediaId; | |
| Buffer = AllocateZeroPool (Size); | |
| if (Buffer == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| MediaId = Partition->BlockMedia.MediaId; | |
| Status = EmmcReadWrite (Partition, MediaId, StartLba, Buffer, Size, FALSE, NULL); | |
| FreePool (Buffer); | |
| return Status; | |
| } | |
| /** | |
| Erase a specified number of device blocks. | |
| @param[in] This Indicates a pointer to the calling context. | |
| @param[in] MediaId The media ID that the erase request is for. | |
| @param[in] Lba The starting logical block address to be | |
| erased. The caller is responsible for erasing | |
| only legitimate locations. | |
| @param[in, out] Token A pointer to the token associated with the | |
| transaction. | |
| @param[in] Size The size in bytes to be erased. This must be | |
| a multiple of the physical block size of the | |
| device. | |
| @retval EFI_SUCCESS The erase request was queued if Event is not | |
| NULL. The data was erased correctly to the | |
| device if the Event is NULL.to the device. | |
| @retval EFI_WRITE_PROTECTED The device cannot be erased due to write | |
| protection. | |
| @retval EFI_DEVICE_ERROR The device reported an error while attempting | |
| to perform the erase operation. | |
| @retval EFI_INVALID_PARAMETER The erase request contains LBAs that are not | |
| valid. | |
| @retval EFI_NO_MEDIA There is no media in the device. | |
| @retval EFI_MEDIA_CHANGED The MediaId is not for the current media. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EmmcEraseBlocks ( | |
| IN EFI_ERASE_BLOCK_PROTOCOL *This, | |
| IN UINT32 MediaId, | |
| IN EFI_LBA Lba, | |
| IN OUT EFI_ERASE_BLOCK_TOKEN *Token, | |
| IN UINTN Size | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_BLOCK_IO_MEDIA *Media; | |
| UINTN BlockSize; | |
| UINTN BlockNum; | |
| EFI_LBA FirstLba; | |
| EFI_LBA LastLba; | |
| EFI_LBA StartGroupLba; | |
| EFI_LBA EndGroupLba; | |
| UINT32 EraseGroupSize; | |
| UINT32 Remainder; | |
| UINTN WriteZeroSize; | |
| UINT8 PartitionConfig; | |
| EMMC_PARTITION *Partition; | |
| EMMC_DEVICE *Device; | |
| Status = EFI_SUCCESS; | |
| Partition = EMMC_PARTITION_DATA_FROM_ERASEBLK (This); | |
| Device = Partition->Device; | |
| Media = &Partition->BlockMedia; | |
| if (MediaId != Media->MediaId) { | |
| return EFI_MEDIA_CHANGED; | |
| } | |
| if (Media->ReadOnly) { | |
| return EFI_WRITE_PROTECTED; | |
| } | |
| // | |
| // Check parameters. | |
| // | |
| BlockSize = Media->BlockSize; | |
| if ((Size % BlockSize) != 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| BlockNum = Size / BlockSize; | |
| if ((Lba + BlockNum - 1) > Media->LastBlock) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| } | |
| FirstLba = Lba; | |
| LastLba = Lba + BlockNum - 1; | |
| // | |
| // Check if needs to switch partition access. | |
| // | |
| PartitionConfig = Device->ExtCsd.PartitionConfig; | |
| if ((PartitionConfig & 0x7) != Partition->PartitionType) { | |
| PartitionConfig &= (UINT8)~0x7; | |
| PartitionConfig |= Partition->PartitionType; | |
| Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Device->ExtCsd.PartitionConfig = PartitionConfig; | |
| } | |
| if ((Device->ExtCsd.SecFeatureSupport & BIT4) == 0) { | |
| // | |
| // If the Trim operation is not supported by the device, handle the erase | |
| // of blocks that do not form a complete erase group separately. | |
| // | |
| EraseGroupSize = This->EraseLengthGranularity; | |
| DivU64x32Remainder (FirstLba, EraseGroupSize, &Remainder); | |
| StartGroupLba = (Remainder == 0) ? FirstLba : (FirstLba + EraseGroupSize - Remainder); | |
| DivU64x32Remainder (LastLba + 1, EraseGroupSize, &Remainder); | |
| EndGroupLba = LastLba + 1 - Remainder; | |
| // | |
| // If the size to erase is smaller than the erase group size, the whole | |
| // erase operation is performed by writting zeros. | |
| // | |
| if (BlockNum < EraseGroupSize) { | |
| Status = EmmcWriteZeros (Partition, FirstLba, Size); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| DEBUG (( | |
| DEBUG_INFO, | |
| "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n", | |
| Lba, | |
| BlockNum, | |
| (Token != NULL) ? Token->Event : NULL, | |
| Status | |
| )); | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| gBS->SignalEvent (Token->Event); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| // | |
| // If the starting LBA to erase is not aligned with the start of an erase | |
| // group, write zeros to erase the data from starting LBA to the end of the | |
| // current erase group. | |
| // | |
| if (StartGroupLba > FirstLba) { | |
| WriteZeroSize = (UINTN)(StartGroupLba - FirstLba) * BlockSize; | |
| Status = EmmcWriteZeros (Partition, FirstLba, WriteZeroSize); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| } | |
| // | |
| // If the ending LBA to erase is not aligned with the end of an erase | |
| // group, write zeros to erase the data from the start of the erase group | |
| // to the ending LBA. | |
| // | |
| if (EndGroupLba <= LastLba) { | |
| WriteZeroSize = (UINTN)(LastLba + 1 - EndGroupLba) * BlockSize; | |
| Status = EmmcWriteZeros (Partition, EndGroupLba, WriteZeroSize); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| } | |
| // | |
| // Check whether there is erase group to erase. | |
| // | |
| if (EndGroupLba <= StartGroupLba) { | |
| DEBUG (( | |
| DEBUG_INFO, | |
| "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n", | |
| Lba, | |
| BlockNum, | |
| (Token != NULL) ? Token->Event : NULL, | |
| Status | |
| )); | |
| if ((Token != NULL) && (Token->Event != NULL)) { | |
| Token->TransactionStatus = EFI_SUCCESS; | |
| gBS->SignalEvent (Token->Event); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| FirstLba = StartGroupLba; | |
| LastLba = EndGroupLba - 1; | |
| } | |
| Status = EmmcEraseBlockStart (Partition, FirstLba, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Status = EmmcEraseBlockEnd (Partition, LastLba, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Status = EmmcEraseBlock (Partition, (EFI_BLOCK_IO2_TOKEN*)Token, TRUE); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| DEBUG (( | |
| DEBUG_INFO, | |
| "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n", | |
| Lba, | |
| BlockNum, | |
| (Token != NULL) ? Token->Event : NULL, | |
| Status | |
| )); | |
| return Status; | |
| } | |