From: Labun, Marcin Date: Thu, 10 Mar 2011 00:45:35 +0000 (+1100) Subject: read platform capabilities from EFI X-Git-Tag: mdadm-3.2.1~62 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5a6baf6653107632707be296254d919f0395c6ff;p=thirdparty%2Fmdadm.git read platform capabilities from EFI If operating system is installed using efi, IMSM platform capabilities are not available via option ROM, but are stored as efi variables. New mechanism has been introduced to obtain capabilities by variables. Signed-off-by: Przemyslaw Czarnowski Signed-off-by: Marcin Labun Signed-off-by: NeilBrown --- diff --git a/platform-intel.c b/platform-intel.c index f5f57b79..b679ec73 100644 --- a/platform-intel.c +++ b/platform-intel.c @@ -304,6 +304,67 @@ static const struct imsm_orom *find_imsm_hba_orom(enum sys_dev_type hba_id) (c) & 0xff, ((c) >> 8) & 0xff, \ (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7) }}) + +#define SYS_EFI_VAR_PATH "/sys/firmware/efi/vars" +#define SCU_PROP "RstScuV" +#define AHCI_PROP "RstSataV" + +#define VENDOR_GUID \ + EFI_GUID(0x193dfefa, 0xa445, 0x4302, 0x99, 0xd8, 0xef, 0x3a, 0xad, 0x1a, 0x04, 0xc6) + +int populated_efi[SYS_DEV_MAX] = { 0, 0 }; + +static struct imsm_orom imsm_efi[SYS_DEV_MAX]; + +const struct imsm_orom *find_imsm_efi(enum sys_dev_type hba_id) +{ + int dfd=-1; + char path[PATH_MAX]; + char buf[GUID_STR_MAX]; + int n; + + if (hba_id >= SYS_DEV_MAX) + return NULL; + + dprintf("EFI CAP: %p, pid: %d pop: %d\n", + &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]); + + /* it's static data so we only need to read it once */ + if (populated_efi[hba_id]) { + dprintf("EFI CAP: %p, pid: %d pop: %d\n", + &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]); + return &imsm_efi[hba_id]; + } + if (check_env("IMSM_TEST_AHCI_EFI") || + check_env("IMSM_TEST_SCU_EFI")) { + dprintf("OROM CAP: %p, pid: %d pop: %d\n", + &imsm_efi[hba_id], (int) getpid(), populated_efi[hba_id]); + return imsm_platform_test(hba_id, &populated_efi[hba_id], &imsm_efi[hba_id]); + } + /* OROM test is set, return that there is no EFI capabilities */ + if (check_env("IMSM_TEST_OROM")) { + return NULL; + } + if (hba_id == SYS_DEV_SAS) + snprintf(path, PATH_MAX, "%s/%s-%s", SYS_EFI_VAR_PATH, SCU_PROP, guid_str(buf, VENDOR_GUID)); + else + snprintf(path, PATH_MAX, "%s/%s-%s", SYS_EFI_VAR_PATH, AHCI_PROP, guid_str(buf, VENDOR_GUID)); + + dprintf("EFI VAR: path=%s\n", path); + + if ((dfd = open(path, O_RDONLY)) < 0) { + populated_efi[hba_id] = 0; + return NULL; + } + n = read(dfd, &imsm_efi[hba_id], sizeof(imsm_efi[0])); + close(dfd); + if (n < (int) (sizeof(imsm_efi[0]))) { + return NULL; + } + populated_efi[hba_id] = 1; + return &imsm_efi[hba_id]; +} + /* * backward interface compatibility */ @@ -316,6 +377,9 @@ const struct imsm_orom *find_imsm_capability(enum sys_dev_type hba_id) { const struct imsm_orom *cap=NULL; + + if ((cap = find_imsm_efi(hba_id)) != NULL) + return cap; if ((cap = find_imsm_hba_orom(hba_id)) != NULL) return cap; return NULL;