mirror of
				https://github.com/acidanthera/audk.git
				synced 2025-10-31 19:23:54 +01:00 
			
		
		
		
	Lower the priority of the DEBUG print in EmmcReadWrite(), which is emitted for each read or write operation to the eMMC device, which clutters up the log output of builds created with DEBUG_INFO enabled. Suggested-by: Pipat Methavanitpong <methavanitpong.pipat@socionext.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Reviewed-by: Laszlo Ersek <lersek@redhat.com> Reviewed-by: Star Zeng <star.zeng@intel.com>
		
			
				
	
	
		
			2168 lines
		
	
	
		
			81 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			2168 lines
		
	
	
		
			81 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   The helper functions for BlockIo and BlockIo2 protocol.
 | |
| 
 | |
|   Copyright (c) 2015 - 2017, Intel Corporation. All rights reserved.<BR>
 | |
|   This program and the accompanying materials
 | |
|   are licensed and made available under the terms and conditions of the BSD License
 | |
|   which accompanies this distribution.  The full text of the license may be found at
 | |
|   http://opensource.org/licenses/bsd-license.php
 | |
| 
 | |
|   THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
 | |
|   WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | |
| 
 | |
| **/
 | |
| 
 | |
| #include "EmmcDxe.h"
 | |
| 
 | |
| /**
 | |
|   Nonblocking I/O callback funtion when the event is signaled.
 | |
| 
 | |
|   @param[in]  Event     The Event this notify function registered to.
 | |
|   @param[in]  Context   Pointer to the context data registered to the
 | |
|                         Event.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| EFIAPI
 | |
| AsyncIoCallback (
 | |
|   IN EFI_EVENT                Event,
 | |
|   IN VOID                     *Context
 | |
|   )
 | |
| {
 | |
|   EMMC_REQUEST                *Request;
 | |
|   EFI_STATUS                  Status;
 | |
| 
 | |
|   Status = gBS->CloseEvent (Event);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   Request = (EMMC_REQUEST *) Context;
 | |
| 
 | |
|   DEBUG_CODE_BEGIN ();
 | |
|     DEBUG ((EFI_D_INFO, "Emmc Async Request: CmdIndex[%d] Arg[%08x] %r\n",
 | |
|             Request->SdMmcCmdBlk.CommandIndex, Request->SdMmcCmdBlk.CommandArgument,
 | |
|             Request->Packet.TransactionStatus));
 | |
|   DEBUG_CODE_END ();
 | |
| 
 | |
|   if (EFI_ERROR (Request->Packet.TransactionStatus)) {
 | |
|     Request->Token->TransactionStatus = Request->Packet.TransactionStatus;
 | |
|   }
 | |
| 
 | |
|   RemoveEntryList (&Request->Link);
 | |
| 
 | |
|   if (Request->IsEnd) {
 | |
|     gBS->SignalEvent (Request->Token->Event);
 | |
|   }
 | |
| 
 | |
|   FreePool (Request);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send command SELECT to the device to select/deselect the device.
 | |
| 
 | |
|   @param[in]  Device            A pointer to the EMMC_DEVICE instance.
 | |
|   @param[in]  Rca               The relative device address to use.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcSelect (
 | |
|   IN     EMMC_DEVICE                  *Device,
 | |
|   IN     UINT16                       Rca
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL       *PassThru;
 | |
|   EFI_SD_MMC_COMMAND_BLOCK            SdMmcCmdBlk;
 | |
|   EFI_SD_MMC_STATUS_BLOCK             SdMmcStatusBlk;
 | |
|   EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet;
 | |
| 
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk));
 | |
|   ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk));
 | |
|   ZeroMem (&Packet, sizeof (Packet));
 | |
|   Packet.SdMmcCmdBlk    = &SdMmcCmdBlk;
 | |
|   Packet.SdMmcStatusBlk = &SdMmcStatusBlk;
 | |
|   Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SdMmcCmdBlk.CommandIndex = EMMC_SELECT_DESELECT_CARD;
 | |
|   SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16;
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL);
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send command SEND_STATUS to the device to get device status.
 | |
| 
 | |
|   @param[in]  Device            A pointer to the EMMC_DEVICE instance.
 | |
|   @param[in]  Rca               The relative device address to use.
 | |
|   @param[out] DevStatus         The buffer to store the device status.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcSendStatus (
 | |
|   IN     EMMC_DEVICE                  *Device,
 | |
|   IN     UINT16                       Rca,
 | |
|      OUT UINT32                       *DevStatus
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL       *PassThru;
 | |
|   EFI_SD_MMC_COMMAND_BLOCK            SdMmcCmdBlk;
 | |
|   EFI_SD_MMC_STATUS_BLOCK             SdMmcStatusBlk;
 | |
|   EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet;
 | |
| 
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk));
 | |
|   ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk));
 | |
|   ZeroMem (&Packet, sizeof (Packet));
 | |
|   Packet.SdMmcCmdBlk    = &SdMmcCmdBlk;
 | |
|   Packet.SdMmcStatusBlk = &SdMmcStatusBlk;
 | |
|   Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SdMmcCmdBlk.CommandIndex = EMMC_SEND_STATUS;
 | |
|   SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16;
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     CopyMem (DevStatus, &SdMmcStatusBlk.Resp0, sizeof (UINT32));
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send command SEND_CSD to the device to get the CSD register data.
 | |
| 
 | |
|   @param[in]  Device            A pointer to the EMMC_DEVICE instance.
 | |
|   @param[in]  Rca               The relative device address to use.
 | |
|   @param[out] Csd               The buffer to store the EMMC_CSD register data.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcGetCsd (
 | |
|   IN     EMMC_DEVICE                  *Device,
 | |
|   IN     UINT16                       Rca,
 | |
|      OUT EMMC_CSD                     *Csd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL       *PassThru;
 | |
|   EFI_SD_MMC_COMMAND_BLOCK            SdMmcCmdBlk;
 | |
|   EFI_SD_MMC_STATUS_BLOCK             SdMmcStatusBlk;
 | |
|   EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet;
 | |
| 
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk));
 | |
|   ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk));
 | |
|   ZeroMem (&Packet, sizeof (Packet));
 | |
|   ZeroMem (Csd, sizeof (EMMC_CSD));
 | |
| 
 | |
|   Packet.SdMmcCmdBlk    = &SdMmcCmdBlk;
 | |
|   Packet.SdMmcStatusBlk = &SdMmcStatusBlk;
 | |
|   Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SdMmcCmdBlk.CommandIndex = EMMC_SEND_CSD;
 | |
|   SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR2;
 | |
|   SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16;
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     //
 | |
|     // For details, refer to SD Host Controller Simplified Spec 3.0 Table 2-12.
 | |
|     //
 | |
|     CopyMem (((UINT8*)Csd) + 1, &SdMmcStatusBlk.Resp0, sizeof (EMMC_CSD) - 1);
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send command SEND_CID to the device to get the CID register data.
 | |
| 
 | |
|   @param[in]  Device            A pointer to the EMMC_DEVICE instance.
 | |
|   @param[in]  Rca               The relative device address to use.
 | |
|   @param[out] Cid               The buffer to store the EMMC_CID register data.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcGetCid (
 | |
|   IN     EMMC_DEVICE            *Device,
 | |
|   IN     UINT16                 Rca,
 | |
|      OUT EMMC_CID               *Cid
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL       *PassThru;
 | |
|   EFI_SD_MMC_COMMAND_BLOCK            SdMmcCmdBlk;
 | |
|   EFI_SD_MMC_STATUS_BLOCK             SdMmcStatusBlk;
 | |
|   EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet;
 | |
| 
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk));
 | |
|   ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk));
 | |
|   ZeroMem (&Packet, sizeof (Packet));
 | |
|   ZeroMem (Cid, sizeof (EMMC_CID));
 | |
| 
 | |
|   Packet.SdMmcCmdBlk    = &SdMmcCmdBlk;
 | |
|   Packet.SdMmcStatusBlk = &SdMmcStatusBlk;
 | |
|   Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SdMmcCmdBlk.CommandIndex = EMMC_SEND_CID;
 | |
|   SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR2;
 | |
|   SdMmcCmdBlk.CommandArgument = (UINT32)Rca << 16;
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     //
 | |
|     // For details, refer to SD Host Controller Simplified Spec 3.0 Table 2-12.
 | |
|     //
 | |
|     CopyMem (((UINT8*)Cid) + 1, &SdMmcStatusBlk.Resp0, sizeof (EMMC_CID) - 1);
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send command SEND_EXT_CSD to the device to get the EXT_CSD register data.
 | |
| 
 | |
|   @param[in]  Device            A pointer to the EMMC_DEVICE instance.
 | |
|   @param[out] ExtCsd            The buffer to store the EXT_CSD register data.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcGetExtCsd (
 | |
|   IN     EMMC_DEVICE                  *Device,
 | |
|      OUT EMMC_EXT_CSD                 *ExtCsd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL       *PassThru;
 | |
|   EFI_SD_MMC_COMMAND_BLOCK            SdMmcCmdBlk;
 | |
|   EFI_SD_MMC_STATUS_BLOCK             SdMmcStatusBlk;
 | |
|   EFI_SD_MMC_PASS_THRU_COMMAND_PACKET Packet;
 | |
| 
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ZeroMem (&SdMmcCmdBlk, sizeof (SdMmcCmdBlk));
 | |
|   ZeroMem (&SdMmcStatusBlk, sizeof (SdMmcStatusBlk));
 | |
|   ZeroMem (&Packet, sizeof (Packet));
 | |
|   ZeroMem (ExtCsd, sizeof (EMMC_EXT_CSD));
 | |
|   Packet.SdMmcCmdBlk    = &SdMmcCmdBlk;
 | |
|   Packet.SdMmcStatusBlk = &SdMmcStatusBlk;
 | |
|   Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SdMmcCmdBlk.CommandIndex = EMMC_SEND_EXT_CSD;
 | |
|   SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAdtc;
 | |
|   SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   SdMmcCmdBlk.CommandArgument = 0x00000000;
 | |
|   Packet.InDataBuffer     = ExtCsd;
 | |
|   Packet.InTransferLength = sizeof (EMMC_EXT_CSD);
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &Packet, NULL);
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Set the specified EXT_CSD register field through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  Offset            The offset of the specified field in EXT_CSD register.
 | |
|   @param[in]  Value             The byte value written to the field specified by Offset.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcSetExtCsd (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  UINT8                     Offset,
 | |
|   IN  UINT8                     Value,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   EMMC_DEVICE                   *Device;
 | |
|   EMMC_REQUEST                  *SetExtCsdReq;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru;
 | |
|   UINT32                        CommandArgument;
 | |
|   EFI_TPL                       OldTpl;
 | |
| 
 | |
|   SetExtCsdReq = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   SetExtCsdReq = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (SetExtCsdReq == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   SetExtCsdReq->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &SetExtCsdReq->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   SetExtCsdReq->Packet.SdMmcCmdBlk    = &SetExtCsdReq->SdMmcCmdBlk;
 | |
|   SetExtCsdReq->Packet.SdMmcStatusBlk = &SetExtCsdReq->SdMmcStatusBlk;
 | |
|   SetExtCsdReq->Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SetExtCsdReq->SdMmcCmdBlk.CommandIndex = EMMC_SWITCH;
 | |
|   SetExtCsdReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SetExtCsdReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1b;
 | |
|   //
 | |
|   // Write the Value to the field specified by Offset.
 | |
|   //
 | |
|   CommandArgument = (Value << 8) | (Offset << 16) | BIT24 | BIT25;
 | |
|   SetExtCsdReq->SdMmcCmdBlk.CommandArgument = CommandArgument;
 | |
| 
 | |
|   SetExtCsdReq->IsEnd = IsEnd;
 | |
|   SetExtCsdReq->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     SetExtCsdReq,
 | |
|                     &SetExtCsdReq->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     SetExtCsdReq->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &SetExtCsdReq->Packet, SetExtCsdReq->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (SetExtCsdReq != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&SetExtCsdReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (SetExtCsdReq->Event != NULL) {
 | |
|         gBS->CloseEvent (SetExtCsdReq->Event);
 | |
|       }
 | |
|       FreePool (SetExtCsdReq);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (SetExtCsdReq != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&SetExtCsdReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (SetExtCsdReq);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Set the number of blocks for a block read/write cmd through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  BlockNum          The number of blocks for transfer.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcSetBlkCount (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  UINT16                    BlockNum,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   EMMC_DEVICE                   *Device;
 | |
|   EMMC_REQUEST                  *SetBlkCntReq;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru;
 | |
|   EFI_TPL                       OldTpl;
 | |
| 
 | |
|   SetBlkCntReq = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   SetBlkCntReq = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (SetBlkCntReq == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   SetBlkCntReq->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &SetBlkCntReq->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   SetBlkCntReq->Packet.SdMmcCmdBlk    = &SetBlkCntReq->SdMmcCmdBlk;
 | |
|   SetBlkCntReq->Packet.SdMmcStatusBlk = &SetBlkCntReq->SdMmcStatusBlk;
 | |
|   SetBlkCntReq->Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   SetBlkCntReq->SdMmcCmdBlk.CommandIndex = EMMC_SET_BLOCK_COUNT;
 | |
|   SetBlkCntReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   SetBlkCntReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   SetBlkCntReq->SdMmcCmdBlk.CommandArgument = BlockNum;
 | |
| 
 | |
|   SetBlkCntReq->IsEnd = IsEnd;
 | |
|   SetBlkCntReq->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     SetBlkCntReq,
 | |
|                     &SetBlkCntReq->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     SetBlkCntReq->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &SetBlkCntReq->Packet, SetBlkCntReq->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (SetBlkCntReq != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&SetBlkCntReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (SetBlkCntReq->Event != NULL) {
 | |
|         gBS->CloseEvent (SetBlkCntReq->Event);
 | |
|       }
 | |
|       FreePool (SetBlkCntReq);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (SetBlkCntReq != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&SetBlkCntReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (SetBlkCntReq);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Read blocks through security protocol cmds with the way of sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition                    A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  SecurityProtocolId           The value of the "Security Protocol" parameter of
 | |
|                                            the security protocol command to be sent.
 | |
|   @param[in]  SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
 | |
|                                            of the security protocol command to be sent.
 | |
|   @param[in]  PayloadBufferSize            Size in bytes of the payload data buffer.
 | |
|   @param[out] PayloadBuffer                A pointer to a destination buffer to store the security
 | |
|                                            protocol command specific payload data for the security
 | |
|                                            protocol command. The caller is responsible for having
 | |
|                                            either implicit or explicit ownership of the buffer.
 | |
|   @param[in]  IsRead                       Indicates it is a read or write operation.
 | |
|   @param[in]  Timeout                      The timeout value, in 100ns units.
 | |
|   @param[in]  Token                        A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd                        A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                            This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS                      The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES             The request could not be executed due to a lack of resources.
 | |
|   @retval Others                           The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcProtocolInOut (
 | |
|   IN     EMMC_PARTITION            *Partition,
 | |
|   IN     UINT8                     SecurityProtocol,
 | |
|   IN     UINT16                    SecurityProtocolSpecificData,
 | |
|   IN     UINTN                     PayloadBufferSize,
 | |
|      OUT VOID                      *PayloadBuffer,
 | |
|   IN     BOOLEAN                   IsRead,
 | |
|   IN     UINT64                    Timeout,
 | |
|   IN     EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN     BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   EMMC_DEVICE                   *Device;
 | |
|   EMMC_REQUEST                  *ProtocolReq;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru;
 | |
|   EFI_TPL                       OldTpl;
 | |
| 
 | |
|   ProtocolReq = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   ProtocolReq = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (ProtocolReq == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   ProtocolReq->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &ProtocolReq->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   ProtocolReq->Packet.SdMmcCmdBlk    = &ProtocolReq->SdMmcCmdBlk;
 | |
|   ProtocolReq->Packet.SdMmcStatusBlk = &ProtocolReq->SdMmcStatusBlk;
 | |
| 
 | |
|   if (IsRead) {
 | |
|     ProtocolReq->Packet.InDataBuffer     = PayloadBuffer;
 | |
|     ProtocolReq->Packet.InTransferLength = (UINT32)PayloadBufferSize;
 | |
| 
 | |
|     ProtocolReq->SdMmcCmdBlk.CommandIndex = EMMC_PROTOCOL_RD;
 | |
|     ProtocolReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAdtc;
 | |
|     ProtocolReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   } else {
 | |
|     ProtocolReq->Packet.OutDataBuffer     = PayloadBuffer;
 | |
|     ProtocolReq->Packet.OutTransferLength = (UINT32)PayloadBufferSize;
 | |
| 
 | |
|     ProtocolReq->SdMmcCmdBlk.CommandIndex = EMMC_PROTOCOL_WR;
 | |
|     ProtocolReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAdtc;
 | |
|     ProtocolReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   }
 | |
| 
 | |
|   ProtocolReq->SdMmcCmdBlk.CommandArgument = (SecurityProtocol << 8) | (SecurityProtocolSpecificData << 16);
 | |
|   //
 | |
|   // Convert to 1 microsecond unit.
 | |
|   //
 | |
|   ProtocolReq->Packet.Timeout = DivU64x32 (Timeout, 10) + 1;
 | |
| 
 | |
|   ProtocolReq->IsEnd = IsEnd;
 | |
|   ProtocolReq->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     ProtocolReq,
 | |
|                     &ProtocolReq->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     ProtocolReq->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &ProtocolReq->Packet, ProtocolReq->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (ProtocolReq != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&ProtocolReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (ProtocolReq->Event != NULL) {
 | |
|         gBS->CloseEvent (ProtocolReq->Event);
 | |
|       }
 | |
|       FreePool (ProtocolReq);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (ProtocolReq != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&ProtocolReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (ProtocolReq);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Read/write multiple blocks through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  Lba               The starting logical block address to be read/written.
 | |
|                                 The caller is responsible for reading/writing to only
 | |
|                                 legitimate locations.
 | |
|   @param[in]  Buffer            A pointer to the destination/source buffer for the data.
 | |
|   @param[in]  BufferSize        Size of Buffer, must be a multiple of device block size.
 | |
|   @param[in]  IsRead            Indicates it is a read or write operation.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcRwMultiBlocks (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  EFI_LBA                   Lba,
 | |
|   IN  VOID                      *Buffer,
 | |
|   IN  UINTN                     BufferSize,
 | |
|   IN  BOOLEAN                   IsRead,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   EMMC_DEVICE                   *Device;
 | |
|   EMMC_REQUEST                  *RwMultiBlkReq;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru;
 | |
|   EFI_TPL                       OldTpl;
 | |
| 
 | |
|   RwMultiBlkReq = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   RwMultiBlkReq = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (RwMultiBlkReq == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   RwMultiBlkReq->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &RwMultiBlkReq->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   RwMultiBlkReq->Packet.SdMmcCmdBlk    = &RwMultiBlkReq->SdMmcCmdBlk;
 | |
|   RwMultiBlkReq->Packet.SdMmcStatusBlk = &RwMultiBlkReq->SdMmcStatusBlk;
 | |
|   //
 | |
|   // Calculate timeout value through the below formula.
 | |
|   // Timeout = (transfer size) / (2MB/s).
 | |
|   // Taking 2MB/s as divisor is because it's nearest to the eMMC lowest
 | |
|   // transfer speed (2.4MB/s).
 | |
|   // Refer to eMMC 5.0 spec section 6.9.1 for details.
 | |
|   //
 | |
|   RwMultiBlkReq->Packet.Timeout = (BufferSize / (2 * 1024 * 1024) + 1) * 1000 * 1000;
 | |
| 
 | |
|   if (IsRead) {
 | |
|     RwMultiBlkReq->Packet.InDataBuffer     = Buffer;
 | |
|     RwMultiBlkReq->Packet.InTransferLength = (UINT32)BufferSize;
 | |
| 
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandIndex = EMMC_READ_MULTIPLE_BLOCK;
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAdtc;
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   } else {
 | |
|     RwMultiBlkReq->Packet.OutDataBuffer     = Buffer;
 | |
|     RwMultiBlkReq->Packet.OutTransferLength = (UINT32)BufferSize;
 | |
| 
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandIndex = EMMC_WRITE_MULTIPLE_BLOCK;
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAdtc;
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
|   }
 | |
| 
 | |
|   if (Partition->Device->SectorAddressing) {
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandArgument = (UINT32)Lba;
 | |
|   } else {
 | |
|     RwMultiBlkReq->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (Lba, Partition->BlockMedia.BlockSize);
 | |
|   }
 | |
| 
 | |
|   RwMultiBlkReq->IsEnd = IsEnd;
 | |
|   RwMultiBlkReq->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     RwMultiBlkReq,
 | |
|                     &RwMultiBlkReq->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     RwMultiBlkReq->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &RwMultiBlkReq->Packet, RwMultiBlkReq->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (RwMultiBlkReq != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&RwMultiBlkReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (RwMultiBlkReq->Event != NULL) {
 | |
|         gBS->CloseEvent (RwMultiBlkReq->Event);
 | |
|       }
 | |
|       FreePool (RwMultiBlkReq);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (RwMultiBlkReq != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&RwMultiBlkReq->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (RwMultiBlkReq);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function transfers data from/to EMMC device.
 | |
| 
 | |
|   @param[in]       Partition    A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]       MediaId      The media ID that the read/write request is for.
 | |
|   @param[in]       Lba          The starting logical block address to be read/written.
 | |
|                                 The caller is responsible for reading/writing to only
 | |
|                                 legitimate locations.
 | |
|   @param[in, out]  Buffer       A pointer to the destination/source buffer for the data.
 | |
|   @param[in]       BufferSize   Size of Buffer, must be a multiple of device block size.
 | |
|   @param[in]       IsRead       Indicates it is a read or write operation.
 | |
|   @param[in, out]  Token        A pointer to the token associated with the transaction.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The data was read/written correctly to the device.
 | |
|   @retval EFI_WRITE_PROTECTED   The device can not be read/written to.
 | |
|   @retval EFI_DEVICE_ERROR      The device reported an error while performing the read/write.
 | |
|   @retval EFI_NO_MEDIA          There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHNAGED     The MediaId does not matched the current device.
 | |
|   @retval EFI_BAD_BUFFER_SIZE   The Buffer was not a multiple of the block size of the device.
 | |
|   @retval EFI_INVALID_PARAMETER The read/write request contains LBAs that are not valid,
 | |
|                                 or the buffer is not on proper alignment.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcReadWrite (
 | |
|   IN     EMMC_PARTITION                 *Partition,
 | |
|   IN     UINT32                         MediaId,
 | |
|   IN     EFI_LBA                        Lba,
 | |
|   IN OUT VOID                           *Buffer,
 | |
|   IN     UINTN                          BufferSize,
 | |
|   IN     BOOLEAN                        IsRead,
 | |
|   IN OUT EFI_BLOCK_IO2_TOKEN            *Token
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                            Status;
 | |
|   EMMC_DEVICE                           *Device;
 | |
|   EFI_BLOCK_IO_MEDIA                    *Media;
 | |
|   UINTN                                 BlockSize;
 | |
|   UINTN                                 BlockNum;
 | |
|   UINTN                                 IoAlign;
 | |
|   UINT8                                 PartitionConfig;
 | |
|   UINTN                                 Remaining;
 | |
|   UINT32                                MaxBlock;
 | |
|   BOOLEAN                               LastRw;
 | |
| 
 | |
|   Status = EFI_SUCCESS;
 | |
|   Device = Partition->Device;
 | |
|   Media  = &Partition->BlockMedia;
 | |
|   LastRw = FALSE;
 | |
| 
 | |
|   if (MediaId != Media->MediaId) {
 | |
|     return EFI_MEDIA_CHANGED;
 | |
|   }
 | |
| 
 | |
|   if (!IsRead && Media->ReadOnly) {
 | |
|     return EFI_WRITE_PROTECTED;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check parameters.
 | |
|   //
 | |
|   if (Buffer == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if (BufferSize == 0) {
 | |
|     if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|       Token->TransactionStatus = EFI_SUCCESS;
 | |
|       gBS->SignalEvent (Token->Event);
 | |
|     }
 | |
|     return EFI_SUCCESS;
 | |
|   }
 | |
| 
 | |
|   BlockSize = Media->BlockSize;
 | |
|   if ((BufferSize % BlockSize) != 0) {
 | |
|     return EFI_BAD_BUFFER_SIZE;
 | |
|   }
 | |
| 
 | |
|   BlockNum  = BufferSize / BlockSize;
 | |
|   if ((Lba + BlockNum - 1) > Media->LastBlock) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   IoAlign = Media->IoAlign;
 | |
|   if (IoAlign > 0 && (((UINTN) Buffer & (IoAlign - 1)) != 0)) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Token->TransactionStatus = EFI_SUCCESS;
 | |
|   }
 | |
|   //
 | |
|   // Check if needs to switch partition access.
 | |
|   //
 | |
|   PartitionConfig = Device->ExtCsd.PartitionConfig;
 | |
|   if ((PartitionConfig & 0x7) != Partition->PartitionType) {
 | |
|     PartitionConfig &= (UINT8)~0x7;
 | |
|     PartitionConfig |= Partition->PartitionType;
 | |
|     Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, Token, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
|     Device->ExtCsd.PartitionConfig = PartitionConfig;
 | |
|   }
 | |
|   //
 | |
|   // Start to execute data transfer. The max block number in single cmd is 65535 blocks.
 | |
|   //
 | |
|   Remaining = BlockNum;
 | |
|   MaxBlock  = 0xFFFF;
 | |
| 
 | |
|   while (Remaining > 0) {
 | |
|     if (Remaining <= MaxBlock) {
 | |
|       BlockNum = Remaining;
 | |
|       LastRw   = TRUE;
 | |
|     } else {
 | |
|       BlockNum = MaxBlock;
 | |
|     }
 | |
|     Status = EmmcSetBlkCount (Partition, (UINT16)BlockNum, Token, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
| 
 | |
|     BufferSize = BlockNum * BlockSize;
 | |
|     Status = EmmcRwMultiBlocks (Partition, Lba, Buffer, BufferSize, IsRead, Token, LastRw);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
|     DEBUG ((DEBUG_BLKIO,
 | |
|       "Emmc%a(): Part %d Lba 0x%x BlkNo 0x%x Event %p with %r\n",
 | |
|       IsRead ? "Read " : "Write", Partition->PartitionType, Lba, BlockNum,
 | |
|       (Token != NULL) ? Token->Event : NULL, Status));
 | |
| 
 | |
|     Lba   += BlockNum;
 | |
|     Buffer = (UINT8*)Buffer + BufferSize;
 | |
|     Remaining -= BlockNum;
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Reset the Block Device.
 | |
| 
 | |
|   @param  This                 Indicates a pointer to the calling context.
 | |
|   @param  ExtendedVerification Driver may perform diagnostics on reset.
 | |
| 
 | |
|   @retval EFI_SUCCESS          The device was reset.
 | |
|   @retval EFI_DEVICE_ERROR     The device is not functioning properly and could
 | |
|                                not be reset.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcReset (
 | |
|   IN  EFI_BLOCK_IO_PROTOCOL     *This,
 | |
|   IN  BOOLEAN                   ExtendedVerification
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   EMMC_PARTITION                *Partition;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL *PassThru;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This);
 | |
| 
 | |
|   PassThru = Partition->Device->Private->PassThru;
 | |
|   Status   = PassThru->ResetDevice (PassThru, Partition->Device->Slot);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     Status = EFI_DEVICE_ERROR;
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Read BufferSize bytes from Lba into Buffer.
 | |
| 
 | |
|   @param  This       Indicates a pointer to the calling context.
 | |
|   @param  MediaId    Id of the media, changes every time the media is replaced.
 | |
|   @param  Lba        The starting Logical Block Address to read from
 | |
|   @param  BufferSize Size of Buffer, must be a multiple of device block size.
 | |
|   @param  Buffer     A pointer to the destination buffer for the data. The caller is
 | |
|                      responsible for either having implicit or explicit ownership of the buffer.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The data was read correctly from the device.
 | |
|   @retval EFI_DEVICE_ERROR      The device reported an error while performing the read.
 | |
|   @retval EFI_NO_MEDIA          There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED     The MediaId does not matched the current device.
 | |
|   @retval EFI_BAD_BUFFER_SIZE   The Buffer was not a multiple of the block size of the device.
 | |
|   @retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid,
 | |
|                                 or the buffer is not on proper alignment.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcReadBlocks (
 | |
|   IN     EFI_BLOCK_IO_PROTOCOL  *This,
 | |
|   IN     UINT32                 MediaId,
 | |
|   IN     EFI_LBA                Lba,
 | |
|   IN     UINTN                  BufferSize,
 | |
|      OUT VOID                   *Buffer
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
|   EMMC_PARTITION         *Partition;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This);
 | |
| 
 | |
|   Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, TRUE, NULL);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Write BufferSize bytes from Lba into Buffer.
 | |
| 
 | |
|   @param  This       Indicates a pointer to the calling context.
 | |
|   @param  MediaId    The media ID that the write request is for.
 | |
|   @param  Lba        The starting logical block address to be written. The caller is
 | |
|                      responsible for writing to only legitimate locations.
 | |
|   @param  BufferSize Size of Buffer, must be a multiple of device block size.
 | |
|   @param  Buffer     A pointer to the source buffer for the data.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The data was written correctly to the device.
 | |
|   @retval EFI_WRITE_PROTECTED   The device can not be written to.
 | |
|   @retval EFI_DEVICE_ERROR      The device reported an error while performing the write.
 | |
|   @retval EFI_NO_MEDIA          There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHNAGED     The MediaId does not matched the current device.
 | |
|   @retval EFI_BAD_BUFFER_SIZE   The Buffer was not a multiple of the block size of the device.
 | |
|   @retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid,
 | |
|                                 or the buffer is not on proper alignment.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcWriteBlocks (
 | |
|   IN  EFI_BLOCK_IO_PROTOCOL   *This,
 | |
|   IN  UINT32                  MediaId,
 | |
|   IN  EFI_LBA                 Lba,
 | |
|   IN  UINTN                   BufferSize,
 | |
|   IN  VOID                    *Buffer
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
|   EMMC_PARTITION         *Partition;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO (This);
 | |
| 
 | |
|   Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, FALSE, NULL);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Flush the Block Device.
 | |
| 
 | |
|   @param  This              Indicates a pointer to the calling context.
 | |
| 
 | |
|   @retval EFI_SUCCESS       All outstanding data was written to the device
 | |
|   @retval EFI_DEVICE_ERROR  The device reported an error while writing back the data
 | |
|   @retval EFI_NO_MEDIA      There is no media in the device.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcFlushBlocks (
 | |
|   IN  EFI_BLOCK_IO_PROTOCOL   *This
 | |
|   )
 | |
| {
 | |
|   //
 | |
|   // return directly
 | |
|   //
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Reset the Block Device.
 | |
| 
 | |
|   @param[in]  This                 Indicates a pointer to the calling context.
 | |
|   @param[in]  ExtendedVerification Driver may perform diagnostics on reset.
 | |
| 
 | |
|   @retval EFI_SUCCESS              The device was reset.
 | |
|   @retval EFI_DEVICE_ERROR         The device is not functioning properly and could
 | |
|                                    not be reset.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcResetEx (
 | |
|   IN  EFI_BLOCK_IO2_PROTOCOL  *This,
 | |
|   IN  BOOLEAN                 ExtendedVerification
 | |
|   )
 | |
| {
 | |
|   EMMC_PARTITION              *Partition;
 | |
|   LIST_ENTRY                  *Link;
 | |
|   LIST_ENTRY                  *NextLink;
 | |
|   EMMC_REQUEST                *Request;
 | |
|   EFI_TPL                     OldTpl;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This);
 | |
| 
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   for (Link = GetFirstNode (&Partition->Queue);
 | |
|        !IsNull (&Partition->Queue, Link);
 | |
|        Link = NextLink) {
 | |
|     NextLink = GetNextNode (&Partition->Queue, Link);
 | |
|     RemoveEntryList (Link);
 | |
| 
 | |
|     Request = EMMC_REQUEST_FROM_LINK (Link);
 | |
| 
 | |
|     gBS->CloseEvent (Request->Event);
 | |
|     Request->Token->TransactionStatus = EFI_ABORTED;
 | |
| 
 | |
|     if (Request->IsEnd) {
 | |
|       gBS->SignalEvent (Request->Token->Event);
 | |
|     }
 | |
| 
 | |
|     FreePool (Request);
 | |
|   }
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Read BufferSize bytes from Lba into Buffer.
 | |
| 
 | |
|   @param[in]       This         Indicates a pointer to the calling context.
 | |
|   @param[in]       MediaId      Id of the media, changes every time the media is replaced.
 | |
|   @param[in]       Lba          The starting Logical Block Address to read from.
 | |
|   @param[in, out]  Token        A pointer to the token associated with the transaction.
 | |
|   @param[in]       BufferSize   Size of Buffer, must be a multiple of device block size.
 | |
|   @param[out]      Buffer       A pointer to the destination buffer for the data. The caller is
 | |
|                                 responsible for either having implicit or explicit ownership of the buffer.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The read request was queued if Event is not NULL.
 | |
|                                 The data was read correctly from the device if
 | |
|                                 the Event is NULL.
 | |
|   @retval EFI_DEVICE_ERROR      The device reported an error while performing
 | |
|                                 the read.
 | |
|   @retval EFI_NO_MEDIA          There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED     The MediaId is not for the current media.
 | |
|   @retval EFI_BAD_BUFFER_SIZE   The BufferSize parameter is not a multiple of the
 | |
|                                 intrinsic block size of the device.
 | |
|   @retval EFI_INVALID_PARAMETER The read request contains LBAs that are not valid,
 | |
|                                 or the buffer is not on proper alignment.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be completed due to a lack
 | |
|                                 of resources.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcReadBlocksEx (
 | |
|   IN     EFI_BLOCK_IO2_PROTOCOL *This,
 | |
|   IN     UINT32                 MediaId,
 | |
|   IN     EFI_LBA                Lba,
 | |
|   IN OUT EFI_BLOCK_IO2_TOKEN    *Token,
 | |
|   IN     UINTN                  BufferSize,
 | |
|      OUT VOID                   *Buffer
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
|   EMMC_PARTITION         *Partition;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This);
 | |
| 
 | |
|   Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, TRUE, Token);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Write BufferSize bytes from Lba into Buffer.
 | |
| 
 | |
|   @param[in]       This         Indicates a pointer to the calling context.
 | |
|   @param[in]       MediaId      The media ID that the write request is for.
 | |
|   @param[in]       Lba          The starting logical block address to be written. The
 | |
|                                 caller is responsible for writing to only legitimate
 | |
|                                 locations.
 | |
|   @param[in, out]  Token        A pointer to the token associated with the transaction.
 | |
|   @param[in]       BufferSize   Size of Buffer, must be a multiple of device block size.
 | |
|   @param[in]       Buffer       A pointer to the source buffer for the data.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The data was written correctly to the device.
 | |
|   @retval EFI_WRITE_PROTECTED   The device can not be written to.
 | |
|   @retval EFI_DEVICE_ERROR      The device reported an error while performing the write.
 | |
|   @retval EFI_NO_MEDIA          There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHNAGED     The MediaId does not matched the current device.
 | |
|   @retval EFI_BAD_BUFFER_SIZE   The Buffer was not a multiple of the block size of the device.
 | |
|   @retval EFI_INVALID_PARAMETER The write request contains LBAs that are not valid,
 | |
|                                 or the buffer is not on proper alignment.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcWriteBlocksEx (
 | |
|   IN     EFI_BLOCK_IO2_PROTOCOL *This,
 | |
|   IN     UINT32                 MediaId,
 | |
|   IN     EFI_LBA                Lba,
 | |
|   IN OUT EFI_BLOCK_IO2_TOKEN    *Token,
 | |
|   IN     UINTN                  BufferSize,
 | |
|   IN     VOID                   *Buffer
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
|   EMMC_PARTITION         *Partition;
 | |
| 
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_BLKIO2 (This);
 | |
| 
 | |
|   Status = EmmcReadWrite (Partition, MediaId, Lba, Buffer, BufferSize, FALSE, Token);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Flush the Block Device.
 | |
| 
 | |
|   @param[in]       This     Indicates a pointer to the calling context.
 | |
|   @param[in, out]  Token    A pointer to the token associated with the transaction.
 | |
| 
 | |
|   @retval EFI_SUCCESS       All outstanding data was written to the device
 | |
|   @retval EFI_DEVICE_ERROR  The device reported an error while writing back the data
 | |
|   @retval EFI_NO_MEDIA      There is no media in the device.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcFlushBlocksEx (
 | |
|   IN     EFI_BLOCK_IO2_PROTOCOL  *This,
 | |
|   IN OUT EFI_BLOCK_IO2_TOKEN     *Token
 | |
|   )
 | |
| {
 | |
|   //
 | |
|   // Signal event and return directly.
 | |
|   //
 | |
|   if (Token != NULL && Token->Event != NULL) {
 | |
|     Token->TransactionStatus = EFI_SUCCESS;
 | |
|     gBS->SignalEvent (Token->Event);
 | |
|   }
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send a security protocol command to a device that receives data and/or the result
 | |
|   of one or more commands sent by SendData.
 | |
| 
 | |
|   The ReceiveData function sends a security protocol command to the given MediaId.
 | |
|   The security protocol command sent is defined by SecurityProtocolId and contains
 | |
|   the security protocol specific data SecurityProtocolSpecificData. The function
 | |
|   returns the data from the security protocol command in PayloadBuffer.
 | |
| 
 | |
|   For devices supporting the SCSI command set, the security protocol command is sent
 | |
|   using the SECURITY PROTOCOL IN command defined in SPC-4.
 | |
| 
 | |
|   For devices supporting the ATA command set, the security protocol command is sent
 | |
|   using one of the TRUSTED RECEIVE commands defined in ATA8-ACS if PayloadBufferSize
 | |
|   is non-zero.
 | |
| 
 | |
|   If the PayloadBufferSize is zero, the security protocol command is sent using the
 | |
|   Trusted Non-Data command defined in ATA8-ACS.
 | |
| 
 | |
|   If PayloadBufferSize is too small to store the available data from the security
 | |
|   protocol command, the function shall copy PayloadBufferSize bytes into the
 | |
|   PayloadBuffer and return EFI_WARN_BUFFER_TOO_SMALL.
 | |
| 
 | |
|   If PayloadBuffer or PayloadTransferSize is NULL and PayloadBufferSize is non-zero,
 | |
|   the function shall return EFI_INVALID_PARAMETER.
 | |
| 
 | |
|   If the given MediaId does not support security protocol commands, the function shall
 | |
|   return EFI_UNSUPPORTED. If there is no media in the device, the function returns
 | |
|   EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the device,
 | |
|   the function returns EFI_MEDIA_CHANGED.
 | |
| 
 | |
|   If the security protocol fails to complete within the Timeout period, the function
 | |
|   shall return EFI_TIMEOUT.
 | |
| 
 | |
|   If the security protocol command completes without an error, the function shall
 | |
|   return EFI_SUCCESS. If the security protocol command completes with an error, the
 | |
|   function shall return EFI_DEVICE_ERROR.
 | |
| 
 | |
|   @param[in]  This                         Indicates a pointer to the calling context.
 | |
|   @param[in]  MediaId                      ID of the medium to receive data from.
 | |
|   @param[in]  Timeout                      The timeout, in 100ns units, to use for the execution
 | |
|                                            of the security protocol command. A Timeout value of 0
 | |
|                                            means that this function will wait indefinitely for the
 | |
|                                            security protocol command to execute. If Timeout is greater
 | |
|                                            than zero, then this function will return EFI_TIMEOUT
 | |
|                                            if the time required to execute the receive data command
 | |
|                                            is greater than Timeout.
 | |
|   @param[in]  SecurityProtocolId           The value of the "Security Protocol" parameter of
 | |
|                                            the security protocol command to be sent.
 | |
|   @param[in]  SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
 | |
|                                            of the security protocol command to be sent.
 | |
|   @param[in]  PayloadBufferSize            Size in bytes of the payload data buffer.
 | |
|   @param[out] PayloadBuffer                A pointer to a destination buffer to store the security
 | |
|                                            protocol command specific payload data for the security
 | |
|                                            protocol command. The caller is responsible for having
 | |
|                                            either implicit or explicit ownership of the buffer.
 | |
|   @param[out] PayloadTransferSize          A pointer to a buffer to store the size in bytes of the
 | |
|                                            data written to the payload data buffer.
 | |
|   @param[in]  IsRead                       Indicates it is a read or write operation.
 | |
| 
 | |
|   @retval EFI_SUCCESS                  The security protocol command completed successfully.
 | |
|   @retval EFI_WARN_BUFFER_TOO_SMALL    The PayloadBufferSize was too small to store the available
 | |
|                                        data from the device. The PayloadBuffer contains the truncated data.
 | |
|   @retval EFI_UNSUPPORTED              The given MediaId does not support security protocol commands.
 | |
|   @retval EFI_DEVICE_ERROR             The security protocol command completed with an error.
 | |
|   @retval EFI_NO_MEDIA                 There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED            The MediaId is not for the current media.
 | |
|   @retval EFI_INVALID_PARAMETER        The PayloadBuffer or PayloadTransferSize is NULL and
 | |
|                                        PayloadBufferSize is non-zero.
 | |
|   @retval EFI_TIMEOUT                  A timeout occurred while waiting for the security
 | |
|                                        protocol command to execute.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcSecurityProtocolInOut (
 | |
|   IN     EFI_STORAGE_SECURITY_COMMAND_PROTOCOL    *This,
 | |
|   IN     UINT32                                   MediaId,
 | |
|   IN     UINT64                                   Timeout,
 | |
|   IN     UINT8                                    SecurityProtocolId,
 | |
|   IN     UINT16                                   SecurityProtocolSpecificData,
 | |
|   IN     UINTN                                    PayloadBufferSize,
 | |
|      OUT VOID                                     *PayloadBuffer,
 | |
|      OUT UINTN                                    *PayloadTransferSize,
 | |
|   IN     BOOLEAN                                  IsRead
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                       Status;
 | |
|   EMMC_PARTITION                   *Partition;
 | |
|   EMMC_DEVICE                      *Device;
 | |
|   EFI_BLOCK_IO_MEDIA               *Media;
 | |
|   UINTN                            BlockSize;
 | |
|   UINTN                            BlockNum;
 | |
|   UINTN                            IoAlign;
 | |
|   UINTN                            Remaining;
 | |
|   UINT32                           MaxBlock;
 | |
|   UINT8                            PartitionConfig;
 | |
| 
 | |
|   Status    = EFI_SUCCESS;
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_SSP (This);
 | |
|   Device    = Partition->Device;
 | |
|   Media     = &Partition->BlockMedia;
 | |
| 
 | |
|   if (PayloadTransferSize != NULL) {
 | |
|     *PayloadTransferSize = 0;
 | |
|   }
 | |
| 
 | |
|   if ((PayloadBuffer == NULL) && (PayloadBufferSize != 0)) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if (MediaId != Media->MediaId) {
 | |
|     return EFI_MEDIA_CHANGED;
 | |
|   }
 | |
| 
 | |
|   if (PayloadBufferSize == 0) {
 | |
|     return EFI_SUCCESS;
 | |
|   }
 | |
| 
 | |
|   BlockSize = Media->BlockSize;
 | |
|   if ((PayloadBufferSize % BlockSize) != 0) {
 | |
|     return EFI_BAD_BUFFER_SIZE;
 | |
|   }
 | |
| 
 | |
|   BlockNum  = PayloadBufferSize / BlockSize;
 | |
| 
 | |
|   IoAlign = Media->IoAlign;
 | |
|   if (IoAlign > 0 && (((UINTN) PayloadBuffer & (IoAlign - 1)) != 0)) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Security protocol interface is synchronous transfer.
 | |
|   // Waiting for async I/O list to be empty before any operation.
 | |
|   //
 | |
|   while (!IsListEmpty (&Partition->Queue));
 | |
| 
 | |
|   //
 | |
|   // Check if needs to switch partition access.
 | |
|   //
 | |
|   PartitionConfig = Device->ExtCsd.PartitionConfig;
 | |
|   if ((PartitionConfig & 0x7) != Partition->PartitionType) {
 | |
|     PartitionConfig &= (UINT8)~0x7;
 | |
|     PartitionConfig |= Partition->PartitionType;
 | |
|     Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, NULL, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
|     Device->ExtCsd.PartitionConfig = PartitionConfig;
 | |
|   }
 | |
|   //
 | |
|   // Start to execute data transfer. The max block number in single cmd is 65535 blocks.
 | |
|   //
 | |
|   Remaining = BlockNum;
 | |
|   MaxBlock  = 0xFFFF;
 | |
| 
 | |
|   while (Remaining > 0) {
 | |
|     if (Remaining <= MaxBlock) {
 | |
|       BlockNum = Remaining;
 | |
|     } else {
 | |
|       BlockNum = MaxBlock;
 | |
|     }
 | |
| 
 | |
|     Status = EmmcSetBlkCount (Partition, (UINT16)BlockNum, NULL, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
| 
 | |
|     PayloadBufferSize = BlockNum * BlockSize;
 | |
|     Status = EmmcProtocolInOut (Partition, SecurityProtocolId, SecurityProtocolSpecificData, PayloadBufferSize, PayloadBuffer, IsRead, Timeout, NULL, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
| 
 | |
|     PayloadBuffer = (UINT8*)PayloadBuffer + PayloadBufferSize;
 | |
|     Remaining    -= BlockNum;
 | |
|     if (PayloadTransferSize != NULL) {
 | |
|       *PayloadTransferSize += PayloadBufferSize;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send a security protocol command to a device that receives data and/or the result
 | |
|   of one or more commands sent by SendData.
 | |
| 
 | |
|   The ReceiveData function sends a security protocol command to the given MediaId.
 | |
|   The security protocol command sent is defined by SecurityProtocolId and contains
 | |
|   the security protocol specific data SecurityProtocolSpecificData. The function
 | |
|   returns the data from the security protocol command in PayloadBuffer.
 | |
| 
 | |
|   For devices supporting the SCSI command set, the security protocol command is sent
 | |
|   using the SECURITY PROTOCOL IN command defined in SPC-4.
 | |
| 
 | |
|   For devices supporting the ATA command set, the security protocol command is sent
 | |
|   using one of the TRUSTED RECEIVE commands defined in ATA8-ACS if PayloadBufferSize
 | |
|   is non-zero.
 | |
| 
 | |
|   If the PayloadBufferSize is zero, the security protocol command is sent using the
 | |
|   Trusted Non-Data command defined in ATA8-ACS.
 | |
| 
 | |
|   If PayloadBufferSize is too small to store the available data from the security
 | |
|   protocol command, the function shall copy PayloadBufferSize bytes into the
 | |
|   PayloadBuffer and return EFI_WARN_BUFFER_TOO_SMALL.
 | |
| 
 | |
|   If PayloadBuffer or PayloadTransferSize is NULL and PayloadBufferSize is non-zero,
 | |
|   the function shall return EFI_INVALID_PARAMETER.
 | |
| 
 | |
|   If the given MediaId does not support security protocol commands, the function shall
 | |
|   return EFI_UNSUPPORTED. If there is no media in the device, the function returns
 | |
|   EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the device,
 | |
|   the function returns EFI_MEDIA_CHANGED.
 | |
| 
 | |
|   If the security protocol fails to complete within the Timeout period, the function
 | |
|   shall return EFI_TIMEOUT.
 | |
| 
 | |
|   If the security protocol command completes without an error, the function shall
 | |
|   return EFI_SUCCESS. If the security protocol command completes with an error, the
 | |
|   function shall return EFI_DEVICE_ERROR.
 | |
| 
 | |
|   @param  This                         Indicates a pointer to the calling context.
 | |
|   @param  MediaId                      ID of the medium to receive data from.
 | |
|   @param  Timeout                      The timeout, in 100ns units, to use for the execution
 | |
|                                        of the security protocol command. A Timeout value of 0
 | |
|                                        means that this function will wait indefinitely for the
 | |
|                                        security protocol command to execute. If Timeout is greater
 | |
|                                        than zero, then this function will return EFI_TIMEOUT
 | |
|                                        if the time required to execute the receive data command
 | |
|                                        is greater than Timeout.
 | |
|   @param  SecurityProtocolId           The value of the "Security Protocol" parameter of
 | |
|                                        the security protocol command to be sent.
 | |
|   @param  SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
 | |
|                                        of the security protocol command to be sent.
 | |
|   @param  PayloadBufferSize            Size in bytes of the payload data buffer.
 | |
|   @param  PayloadBuffer                A pointer to a destination buffer to store the security
 | |
|                                        protocol command specific payload data for the security
 | |
|                                        protocol command. The caller is responsible for having
 | |
|                                        either implicit or explicit ownership of the buffer.
 | |
|   @param  PayloadTransferSize          A pointer to a buffer to store the size in bytes of the
 | |
|                                        data written to the payload data buffer.
 | |
| 
 | |
|   @retval EFI_SUCCESS                  The security protocol command completed successfully.
 | |
|   @retval EFI_WARN_BUFFER_TOO_SMALL    The PayloadBufferSize was too small to store the available
 | |
|                                        data from the device. The PayloadBuffer contains the truncated data.
 | |
|   @retval EFI_UNSUPPORTED              The given MediaId does not support security protocol commands.
 | |
|   @retval EFI_DEVICE_ERROR             The security protocol command completed with an error.
 | |
|   @retval EFI_NO_MEDIA                 There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED            The MediaId is not for the current media.
 | |
|   @retval EFI_INVALID_PARAMETER        The PayloadBuffer or PayloadTransferSize is NULL and
 | |
|                                        PayloadBufferSize is non-zero.
 | |
|   @retval EFI_TIMEOUT                  A timeout occurred while waiting for the security
 | |
|                                        protocol command to execute.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcSecurityProtocolIn (
 | |
|   IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL    *This,
 | |
|   IN UINT32                                   MediaId,
 | |
|   IN UINT64                                   Timeout,
 | |
|   IN UINT8                                    SecurityProtocolId,
 | |
|   IN UINT16                                   SecurityProtocolSpecificData,
 | |
|   IN UINTN                                    PayloadBufferSize,
 | |
|   OUT VOID                                    *PayloadBuffer,
 | |
|   OUT UINTN                                   *PayloadTransferSize
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                  Status;
 | |
| 
 | |
|   if ((PayloadTransferSize == NULL) && PayloadBufferSize != 0) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   Status = EmmcSecurityProtocolInOut (
 | |
|              This,
 | |
|              MediaId,
 | |
|              Timeout,
 | |
|              SecurityProtocolId,
 | |
|              SecurityProtocolSpecificData,
 | |
|              PayloadBufferSize,
 | |
|              PayloadBuffer,
 | |
|              PayloadTransferSize,
 | |
|              TRUE
 | |
|              );
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Send a security protocol command to a device.
 | |
| 
 | |
|   The SendData function sends a security protocol command containing the payload
 | |
|   PayloadBuffer to the given MediaId. The security protocol command sent is
 | |
|   defined by SecurityProtocolId and contains the security protocol specific data
 | |
|   SecurityProtocolSpecificData. If the underlying protocol command requires a
 | |
|   specific padding for the command payload, the SendData function shall add padding
 | |
|   bytes to the command payload to satisfy the padding requirements.
 | |
| 
 | |
|   For devices supporting the SCSI command set, the security protocol command is sent
 | |
|   using the SECURITY PROTOCOL OUT command defined in SPC-4.
 | |
| 
 | |
|   For devices supporting the ATA command set, the security protocol command is sent
 | |
|   using one of the TRUSTED SEND commands defined in ATA8-ACS if PayloadBufferSize
 | |
|   is non-zero. If the PayloadBufferSize is zero, the security protocol command is
 | |
|   sent using the Trusted Non-Data command defined in ATA8-ACS.
 | |
| 
 | |
|   If PayloadBuffer is NULL and PayloadBufferSize is non-zero, the function shall
 | |
|   return EFI_INVALID_PARAMETER.
 | |
| 
 | |
|   If the given MediaId does not support security protocol commands, the function
 | |
|   shall return EFI_UNSUPPORTED. If there is no media in the device, the function
 | |
|   returns EFI_NO_MEDIA. If the MediaId is not the ID for the current media in the
 | |
|   device, the function returns EFI_MEDIA_CHANGED.
 | |
| 
 | |
|   If the security protocol fails to complete within the Timeout period, the function
 | |
|   shall return EFI_TIMEOUT.
 | |
| 
 | |
|   If the security protocol command completes without an error, the function shall return
 | |
|   EFI_SUCCESS. If the security protocol command completes with an error, the function
 | |
|   shall return EFI_DEVICE_ERROR.
 | |
| 
 | |
|   @param  This                         Indicates a pointer to the calling context.
 | |
|   @param  MediaId                      ID of the medium to receive data from.
 | |
|   @param  Timeout                      The timeout, in 100ns units, to use for the execution
 | |
|                                        of the security protocol command. A Timeout value of 0
 | |
|                                        means that this function will wait indefinitely for the
 | |
|                                        security protocol command to execute. If Timeout is greater
 | |
|                                        than zero, then this function will return EFI_TIMEOUT
 | |
|                                        if the time required to execute the receive data command
 | |
|                                        is greater than Timeout.
 | |
|   @param  SecurityProtocolId           The value of the "Security Protocol" parameter of
 | |
|                                        the security protocol command to be sent.
 | |
|   @param  SecurityProtocolSpecificData The value of the "Security Protocol Specific" parameter
 | |
|                                        of the security protocol command to be sent.
 | |
|   @param  PayloadBufferSize            Size in bytes of the payload data buffer.
 | |
|   @param  PayloadBuffer                A pointer to a destination buffer to store the security
 | |
|                                        protocol command specific payload data for the security
 | |
|                                        protocol command.
 | |
| 
 | |
|   @retval EFI_SUCCESS                  The security protocol command completed successfully.
 | |
|   @retval EFI_UNSUPPORTED              The given MediaId does not support security protocol commands.
 | |
|   @retval EFI_DEVICE_ERROR             The security protocol command completed with an error.
 | |
|   @retval EFI_NO_MEDIA                 There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED            The MediaId is not for the current media.
 | |
|   @retval EFI_INVALID_PARAMETER        The PayloadBuffer is NULL and PayloadBufferSize is non-zero.
 | |
|   @retval EFI_TIMEOUT                  A timeout occurred while waiting for the security
 | |
|                                        protocol command to execute.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcSecurityProtocolOut (
 | |
|   IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL    *This,
 | |
|   IN UINT32                                   MediaId,
 | |
|   IN UINT64                                   Timeout,
 | |
|   IN UINT8                                    SecurityProtocolId,
 | |
|   IN UINT16                                   SecurityProtocolSpecificData,
 | |
|   IN UINTN                                    PayloadBufferSize,
 | |
|   IN VOID                                     *PayloadBuffer
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS          Status;
 | |
| 
 | |
|   Status = EmmcSecurityProtocolInOut (
 | |
|              This,
 | |
|              MediaId,
 | |
|              Timeout,
 | |
|              SecurityProtocolId,
 | |
|              SecurityProtocolSpecificData,
 | |
|              PayloadBufferSize,
 | |
|              PayloadBuffer,
 | |
|              NULL,
 | |
|              FALSE
 | |
|              );
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Set the erase start address through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  StartLba          The starting logical block address to be erased.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcEraseBlockStart (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  EFI_LBA                   StartLba,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                           Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL        *PassThru;
 | |
|   EMMC_DEVICE                          *Device;
 | |
|   EMMC_REQUEST                         *EraseBlockStart;
 | |
|   EFI_TPL                              OldTpl;
 | |
| 
 | |
|   EraseBlockStart = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   EraseBlockStart = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (EraseBlockStart == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   EraseBlockStart->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &EraseBlockStart->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   EraseBlockStart->Packet.SdMmcCmdBlk    = &EraseBlockStart->SdMmcCmdBlk;
 | |
|   EraseBlockStart->Packet.SdMmcStatusBlk = &EraseBlockStart->SdMmcStatusBlk;
 | |
|   EraseBlockStart->Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   EraseBlockStart->SdMmcCmdBlk.CommandIndex = EMMC_ERASE_GROUP_START;
 | |
|   EraseBlockStart->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   EraseBlockStart->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
| 
 | |
|   if (Device->SectorAddressing) {
 | |
|     EraseBlockStart->SdMmcCmdBlk.CommandArgument = (UINT32)StartLba;
 | |
|   } else {
 | |
|     EraseBlockStart->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (StartLba, Partition->BlockMedia.BlockSize);
 | |
|   }
 | |
| 
 | |
|   EraseBlockStart->IsEnd = IsEnd;
 | |
|   EraseBlockStart->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     EraseBlockStart,
 | |
|                     &EraseBlockStart->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     EraseBlockStart->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlockStart->Packet, EraseBlockStart->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (EraseBlockStart != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlockStart->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (EraseBlockStart->Event != NULL) {
 | |
|         gBS->CloseEvent (EraseBlockStart->Event);
 | |
|       }
 | |
|       FreePool (EraseBlockStart);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (EraseBlockStart != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlockStart->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (EraseBlockStart);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Set the erase end address through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  EndLba            The ending logical block address to be erased.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcEraseBlockEnd (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  EFI_LBA                   EndLba,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                           Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL        *PassThru;
 | |
|   EMMC_DEVICE                          *Device;
 | |
|   EMMC_REQUEST                         *EraseBlockEnd;
 | |
|   EFI_TPL                              OldTpl;
 | |
| 
 | |
|   EraseBlockEnd = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   EraseBlockEnd = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (EraseBlockEnd == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   EraseBlockEnd->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &EraseBlockEnd->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   EraseBlockEnd->Packet.SdMmcCmdBlk    = &EraseBlockEnd->SdMmcCmdBlk;
 | |
|   EraseBlockEnd->Packet.SdMmcStatusBlk = &EraseBlockEnd->SdMmcStatusBlk;
 | |
|   EraseBlockEnd->Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   EraseBlockEnd->SdMmcCmdBlk.CommandIndex = EMMC_ERASE_GROUP_END;
 | |
|   EraseBlockEnd->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   EraseBlockEnd->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1;
 | |
| 
 | |
|   if (Device->SectorAddressing) {
 | |
|     EraseBlockEnd->SdMmcCmdBlk.CommandArgument = (UINT32)EndLba;
 | |
|   } else {
 | |
|     EraseBlockEnd->SdMmcCmdBlk.CommandArgument = (UINT32)MultU64x32 (EndLba, Partition->BlockMedia.BlockSize);
 | |
|   }
 | |
| 
 | |
|   EraseBlockEnd->IsEnd = IsEnd;
 | |
|   EraseBlockEnd->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     EraseBlockEnd,
 | |
|                     &EraseBlockEnd->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     EraseBlockEnd->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlockEnd->Packet, EraseBlockEnd->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (EraseBlockEnd != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlockEnd->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (EraseBlockEnd->Event != NULL) {
 | |
|         gBS->CloseEvent (EraseBlockEnd->Event);
 | |
|       }
 | |
|       FreePool (EraseBlockEnd);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (EraseBlockEnd != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlockEnd->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (EraseBlockEnd);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Erase specified blocks through sync or async I/O request.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  Token             A pointer to the token associated with the transaction.
 | |
|   @param[in]  IsEnd             A boolean to show whether it's the last cmd in a series of cmds.
 | |
|                                 This parameter is only meaningful in async I/O request.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcEraseBlock (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  EFI_BLOCK_IO2_TOKEN       *Token,
 | |
|   IN  BOOLEAN                   IsEnd
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                           Status;
 | |
|   EFI_SD_MMC_PASS_THRU_PROTOCOL        *PassThru;
 | |
|   EMMC_DEVICE                          *Device;
 | |
|   EMMC_REQUEST                         *EraseBlock;
 | |
|   EFI_TPL                              OldTpl;
 | |
| 
 | |
|   EraseBlock = NULL;
 | |
| 
 | |
|   Device   = Partition->Device;
 | |
|   PassThru = Device->Private->PassThru;
 | |
| 
 | |
|   EraseBlock = AllocateZeroPool (sizeof (EMMC_REQUEST));
 | |
|   if (EraseBlock == NULL) {
 | |
|     Status = EFI_OUT_OF_RESOURCES;
 | |
|     goto Error;
 | |
|   }
 | |
| 
 | |
|   EraseBlock->Signature = EMMC_REQUEST_SIGNATURE;
 | |
|   OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|   InsertTailList (&Partition->Queue, &EraseBlock->Link);
 | |
|   gBS->RestoreTPL (OldTpl);
 | |
|   EraseBlock->Packet.SdMmcCmdBlk    = &EraseBlock->SdMmcCmdBlk;
 | |
|   EraseBlock->Packet.SdMmcStatusBlk = &EraseBlock->SdMmcStatusBlk;
 | |
|   EraseBlock->Packet.Timeout        = EMMC_GENERIC_TIMEOUT;
 | |
| 
 | |
|   EraseBlock->SdMmcCmdBlk.CommandIndex = EMMC_ERASE;
 | |
|   EraseBlock->SdMmcCmdBlk.CommandType  = SdMmcCommandTypeAc;
 | |
|   EraseBlock->SdMmcCmdBlk.ResponseType = SdMmcResponseTypeR1b;
 | |
|   if ((Device->ExtCsd.SecFeatureSupport & BIT4) != 0) {
 | |
|     //
 | |
|     // Perform a Trim operation which applies the erase operation to write blocks
 | |
|     // instead of erase groups. (Spec JESD84-B51, eMMC Electrical Standard 5.1,
 | |
|     // Section 6.6.10 and 6.10.4)
 | |
|     //
 | |
|     EraseBlock->SdMmcCmdBlk.CommandArgument = 1;
 | |
|   }
 | |
| 
 | |
|   EraseBlock->IsEnd = IsEnd;
 | |
|   EraseBlock->Token = Token;
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Status = gBS->CreateEvent (
 | |
|                     EVT_NOTIFY_SIGNAL,
 | |
|                     TPL_NOTIFY,
 | |
|                     AsyncIoCallback,
 | |
|                     EraseBlock,
 | |
|                     &EraseBlock->Event
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Error;
 | |
|     }
 | |
|   } else {
 | |
|     EraseBlock->Event = NULL;
 | |
|   }
 | |
| 
 | |
|   Status = PassThru->PassThru (PassThru, Device->Slot, &EraseBlock->Packet, EraseBlock->Event);
 | |
| 
 | |
| Error:
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     //
 | |
|     // For asynchronous operation, only free request and event in error case.
 | |
|     // The request and event will be freed in asynchronous callback for success case.
 | |
|     //
 | |
|     if (EFI_ERROR (Status) && (EraseBlock != NULL)) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlock->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       if (EraseBlock->Event != NULL) {
 | |
|         gBS->CloseEvent (EraseBlock->Event);
 | |
|       }
 | |
|       FreePool (EraseBlock);
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For synchronous operation, free request whatever the execution result is.
 | |
|     //
 | |
|     if (EraseBlock != NULL) {
 | |
|       OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
 | |
|       RemoveEntryList (&EraseBlock->Link);
 | |
|       gBS->RestoreTPL (OldTpl);
 | |
|       FreePool (EraseBlock);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Write zeros to specified blocks.
 | |
| 
 | |
|   @param[in]  Partition         A pointer to the EMMC_PARTITION instance.
 | |
|   @param[in]  StartLba          The starting logical block address to write zeros.
 | |
|   @param[in]  Size              The size in bytes to fill with zeros. This must be a multiple of
 | |
|                                 the physical block size of the device.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The request is executed successfully.
 | |
|   @retval EFI_OUT_OF_RESOURCES  The request could not be executed due to a lack of resources.
 | |
|   @retval Others                The request could not be executed successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EmmcWriteZeros (
 | |
|   IN  EMMC_PARTITION            *Partition,
 | |
|   IN  EFI_LBA                   StartLba,
 | |
|   IN  UINTN                     Size
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                           Status;
 | |
|   UINT8                                *Buffer;
 | |
|   UINT32                               MediaId;
 | |
| 
 | |
|   Buffer = AllocateZeroPool (Size);
 | |
|   if (Buffer == NULL) {
 | |
|     return EFI_OUT_OF_RESOURCES;
 | |
|   }
 | |
| 
 | |
|   MediaId = Partition->BlockMedia.MediaId;
 | |
| 
 | |
|   Status = EmmcReadWrite (Partition, MediaId, StartLba, Buffer, Size, FALSE, NULL);
 | |
|   FreePool (Buffer);
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Erase a specified number of device blocks.
 | |
| 
 | |
|   @param[in]       This           Indicates a pointer to the calling context.
 | |
|   @param[in]       MediaId        The media ID that the erase request is for.
 | |
|   @param[in]       Lba            The starting logical block address to be
 | |
|                                   erased. The caller is responsible for erasing
 | |
|                                   only legitimate locations.
 | |
|   @param[in, out]  Token          A pointer to the token associated with the
 | |
|                                   transaction.
 | |
|   @param[in]       Size           The size in bytes to be erased. This must be
 | |
|                                   a multiple of the physical block size of the
 | |
|                                   device.
 | |
| 
 | |
|   @retval EFI_SUCCESS             The erase request was queued if Event is not
 | |
|                                   NULL. The data was erased correctly to the
 | |
|                                   device if the Event is NULL.to the device.
 | |
|   @retval EFI_WRITE_PROTECTED     The device cannot be erased due to write
 | |
|                                   protection.
 | |
|   @retval EFI_DEVICE_ERROR        The device reported an error while attempting
 | |
|                                   to perform the erase operation.
 | |
|   @retval EFI_INVALID_PARAMETER   The erase request contains LBAs that are not
 | |
|                                   valid.
 | |
|   @retval EFI_NO_MEDIA            There is no media in the device.
 | |
|   @retval EFI_MEDIA_CHANGED       The MediaId is not for the current media.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| EmmcEraseBlocks (
 | |
|   IN     EFI_ERASE_BLOCK_PROTOCOL      *This,
 | |
|   IN     UINT32                        MediaId,
 | |
|   IN     EFI_LBA                       Lba,
 | |
|   IN OUT EFI_ERASE_BLOCK_TOKEN         *Token,
 | |
|   IN     UINTN                         Size
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                            Status;
 | |
|   EFI_BLOCK_IO_MEDIA                    *Media;
 | |
|   UINTN                                 BlockSize;
 | |
|   UINTN                                 BlockNum;
 | |
|   EFI_LBA                               FirstLba;
 | |
|   EFI_LBA                               LastLba;
 | |
|   EFI_LBA                               StartGroupLba;
 | |
|   EFI_LBA                               EndGroupLba;
 | |
|   UINT32                                EraseGroupSize;
 | |
|   UINT32                                Remainder;
 | |
|   UINTN                                 WriteZeroSize;
 | |
|   UINT8                                 PartitionConfig;
 | |
|   EMMC_PARTITION                        *Partition;
 | |
|   EMMC_DEVICE                           *Device;
 | |
| 
 | |
|   Status    = EFI_SUCCESS;
 | |
|   Partition = EMMC_PARTITION_DATA_FROM_ERASEBLK (This);
 | |
|   Device    = Partition->Device;
 | |
|   Media     = &Partition->BlockMedia;
 | |
| 
 | |
|   if (MediaId != Media->MediaId) {
 | |
|     return EFI_MEDIA_CHANGED;
 | |
|   }
 | |
| 
 | |
|   if (Media->ReadOnly) {
 | |
|     return EFI_WRITE_PROTECTED;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check parameters.
 | |
|   //
 | |
|   BlockSize = Media->BlockSize;
 | |
|   if ((Size % BlockSize) != 0) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   BlockNum  = Size / BlockSize;
 | |
|   if ((Lba + BlockNum - 1) > Media->LastBlock) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|     Token->TransactionStatus = EFI_SUCCESS;
 | |
|   }
 | |
| 
 | |
|   FirstLba = Lba;
 | |
|   LastLba  = Lba + BlockNum - 1;
 | |
| 
 | |
|   //
 | |
|   // Check if needs to switch partition access.
 | |
|   //
 | |
|   PartitionConfig = Device->ExtCsd.PartitionConfig;
 | |
|   if ((PartitionConfig & 0x7) != Partition->PartitionType) {
 | |
|     PartitionConfig &= (UINT8)~0x7;
 | |
|     PartitionConfig |= Partition->PartitionType;
 | |
|     Status = EmmcSetExtCsd (Partition, OFFSET_OF (EMMC_EXT_CSD, PartitionConfig), PartitionConfig, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
|     Device->ExtCsd.PartitionConfig = PartitionConfig;
 | |
|   }
 | |
| 
 | |
|   if ((Device->ExtCsd.SecFeatureSupport & BIT4) == 0) {
 | |
|     //
 | |
|     // If the Trim operation is not supported by the device, handle the erase
 | |
|     // of blocks that do not form a complete erase group separately.
 | |
|     //
 | |
|     EraseGroupSize = This->EraseLengthGranularity;
 | |
| 
 | |
|     DivU64x32Remainder (FirstLba, EraseGroupSize, &Remainder);
 | |
|     StartGroupLba = (Remainder == 0) ? FirstLba : (FirstLba + EraseGroupSize - Remainder);
 | |
| 
 | |
|     DivU64x32Remainder (LastLba + 1, EraseGroupSize, &Remainder);
 | |
|     EndGroupLba = LastLba + 1 - Remainder;
 | |
| 
 | |
|     //
 | |
|     // If the size to erase is smaller than the erase group size, the whole
 | |
|     // erase operation is performed by writting zeros.
 | |
|     //
 | |
|     if (BlockNum < EraseGroupSize) {
 | |
|       Status = EmmcWriteZeros (Partition, FirstLba, Size);
 | |
|       if (EFI_ERROR (Status)) {
 | |
|         return Status;
 | |
|       }
 | |
| 
 | |
|       DEBUG ((
 | |
|         DEBUG_INFO,
 | |
|         "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n",
 | |
|         Lba,
 | |
|         BlockNum,
 | |
|         (Token != NULL) ? Token->Event : NULL,
 | |
|         Status
 | |
|         ));
 | |
| 
 | |
|       if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|         Token->TransactionStatus = EFI_SUCCESS;
 | |
|         gBS->SignalEvent (Token->Event);
 | |
|       }
 | |
|       return EFI_SUCCESS;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // If the starting LBA to erase is not aligned with the start of an erase
 | |
|     // group, write zeros to erase the data from starting LBA to the end of the
 | |
|     // current erase group.
 | |
|     //
 | |
|     if (StartGroupLba > FirstLba) {
 | |
|       WriteZeroSize = (UINTN)(StartGroupLba - FirstLba) * BlockSize;
 | |
|       Status = EmmcWriteZeros (Partition, FirstLba, WriteZeroSize);
 | |
|       if (EFI_ERROR (Status)) {
 | |
|         return Status;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // If the ending LBA to erase is not aligned with the end of an erase
 | |
|     // group, write zeros to erase the data from the start of the erase group
 | |
|     // to the ending LBA.
 | |
|     //
 | |
|     if (EndGroupLba <= LastLba) {
 | |
|       WriteZeroSize = (UINTN)(LastLba + 1 - EndGroupLba) * BlockSize;
 | |
|       Status = EmmcWriteZeros (Partition, EndGroupLba, WriteZeroSize);
 | |
|       if (EFI_ERROR (Status)) {
 | |
|         return Status;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Check whether there is erase group to erase.
 | |
|     //
 | |
|     if (EndGroupLba <= StartGroupLba) {
 | |
|       DEBUG ((
 | |
|         DEBUG_INFO,
 | |
|         "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n",
 | |
|         Lba,
 | |
|         BlockNum,
 | |
|         (Token != NULL) ? Token->Event : NULL,
 | |
|         Status
 | |
|         ));
 | |
| 
 | |
|       if ((Token != NULL) && (Token->Event != NULL)) {
 | |
|         Token->TransactionStatus = EFI_SUCCESS;
 | |
|         gBS->SignalEvent (Token->Event);
 | |
|       }
 | |
|       return EFI_SUCCESS;
 | |
|     }
 | |
| 
 | |
|     FirstLba = StartGroupLba;
 | |
|     LastLba  = EndGroupLba - 1;
 | |
|   }
 | |
| 
 | |
|   Status = EmmcEraseBlockStart (Partition, FirstLba, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   Status = EmmcEraseBlockEnd (Partition, LastLba, (EFI_BLOCK_IO2_TOKEN*)Token, FALSE);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   Status = EmmcEraseBlock (Partition, (EFI_BLOCK_IO2_TOKEN*)Token, TRUE);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   DEBUG ((
 | |
|     DEBUG_INFO,
 | |
|     "EmmcEraseBlocks(): Lba 0x%x BlkNo 0x%x Event %p with %r\n",
 | |
|     Lba,
 | |
|     BlockNum,
 | |
|     (Token != NULL) ? Token->Event : NULL,
 | |
|     Status
 | |
|     ));
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 |