]> git.ipfire.org Git - thirdparty/mdadm.git/commitdiff
read platform capabilities from EFI
authorLabun, Marcin <Marcin.Labun@intel.com>
Thu, 10 Mar 2011 00:45:35 +0000 (11:45 +1100)
committerNeilBrown <neilb@suse.de>
Thu, 10 Mar 2011 00:45:35 +0000 (11:45 +1100)
If operating system is installed using efi, IMSM platform capabilities are
 not available via option ROM, but are stored as efi variables. New
 mechanism has been introduced to obtain capabilities by variables.

Signed-off-by: Przemyslaw Czarnowski <przemyslaw.hawrylewicz.czarnowski@intel.com>
Signed-off-by: Marcin Labun <marcin.labun@intel.com>
Signed-off-by: NeilBrown <neilb@suse.de>
platform-intel.c

index f5f57b796786aff7313bb7487f4ae044f60c6da4..b679ec73c7ced36c6493a86904687d8a61d7d809 100644 (file)
@@ -304,6 +304,67 @@ static const struct imsm_orom *find_imsm_hba_orom(enum sys_dev_type hba_id)
   (c) & 0xff, ((c) >> 8) & 0xff, \
   (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7) }})
 
+
+#define SYS_EFI_VAR_PATH "/sys/firmware/efi/vars"
+#define SCU_PROP "RstScuV"
+#define AHCI_PROP "RstSataV"
+
+#define VENDOR_GUID \
+       EFI_GUID(0x193dfefa, 0xa445, 0x4302, 0x99, 0xd8, 0xef, 0x3a, 0xad, 0x1a, 0x04, 0xc6)
+
+int populated_efi[SYS_DEV_MAX] = { 0, 0 };
+
+static struct imsm_orom imsm_efi[SYS_DEV_MAX];
+
+const struct imsm_orom *find_imsm_efi(enum sys_dev_type hba_id)
+{
+       int dfd=-1;
+       char path[PATH_MAX];
+       char buf[GUID_STR_MAX];
+       int n;
+
+       if (hba_id >= SYS_DEV_MAX)
+               return NULL;
+
+       dprintf("EFI CAP: %p,  pid: %d pop: %d\n",
+               &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]);
+
+       /* it's static data so we only need to read it once */
+       if (populated_efi[hba_id]) {
+               dprintf("EFI CAP: %p, pid: %d pop: %d\n",
+                       &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]);
+               return &imsm_efi[hba_id];
+       }
+       if (check_env("IMSM_TEST_AHCI_EFI") ||
+           check_env("IMSM_TEST_SCU_EFI")) {
+               dprintf("OROM CAP: %p,  pid: %d pop: %d\n",
+                       &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]);
+               return imsm_platform_test(hba_id, &populated_efi[hba_id], &imsm_efi[hba_id]);
+       }
+       /* OROM test is set, return that there is no EFI capabilities */
+       if (check_env("IMSM_TEST_OROM")) {
+               return NULL;
+       }
+       if (hba_id == SYS_DEV_SAS)
+               snprintf(path, PATH_MAX, "%s/%s-%s", SYS_EFI_VAR_PATH, SCU_PROP, guid_str(buf, VENDOR_GUID));
+       else
+               snprintf(path, PATH_MAX, "%s/%s-%s", SYS_EFI_VAR_PATH, AHCI_PROP, guid_str(buf, VENDOR_GUID));
+
+       dprintf("EFI VAR: path=%s\n", path);
+
+       if ((dfd = open(path, O_RDONLY)) < 0) {
+               populated_efi[hba_id] = 0;
+               return NULL;
+       }
+       n = read(dfd, &imsm_efi[hba_id], sizeof(imsm_efi[0]));
+       close(dfd);
+       if (n  <  (int) (sizeof(imsm_efi[0]))) {
+               return NULL;
+       }
+       populated_efi[hba_id] = 1;
+       return &imsm_efi[hba_id];
+}
+
 /*
  * backward interface compatibility
  */
@@ -316,6 +377,9 @@ const struct imsm_orom *find_imsm_capability(enum sys_dev_type hba_id)
 {
        const struct imsm_orom *cap=NULL;
 
+
+       if ((cap = find_imsm_efi(hba_id)) != NULL)
+               return cap;
        if ((cap = find_imsm_hba_orom(hba_id)) != NULL)
                return cap;
        return NULL;