[kernel] r15002 - in dists/trunk/linux-2.6/debian: . patches/features/all patches/series

Ben Hutchings benh at alioth.debian.org
Tue Jan 26 13:01:28 UTC 2010


Author: benh
Date: Tue Jan 26 13:01:12 2010
New Revision: 15002

Log:
Add 3w-sas driver for LSI 3ware 9750 SAS controllers

Added:
   dists/trunk/linux-2.6/debian/patches/features/all/SCSI-3w-sas-Add-new-driver-for-LSI-3ware-9750.patch
Modified:
   dists/trunk/linux-2.6/debian/changelog
   dists/trunk/linux-2.6/debian/patches/series/6

Modified: dists/trunk/linux-2.6/debian/changelog
==============================================================================
--- dists/trunk/linux-2.6/debian/changelog	Tue Jan 26 03:17:07 2010	(r15001)
+++ dists/trunk/linux-2.6/debian/changelog	Tue Jan 26 13:01:12 2010	(r15002)
@@ -49,6 +49,7 @@
   * clockevent: Don't remove broadcast device on halt or CPU hotplug
     (Closes: #566547)
   * postinst: Enable escape sequences in debconf notes (Closes: #566539)
+  * Add 3w-sas driver for LSI 3ware 9750 SAS controllers
 
   [ Ian Campbell ]
   * xen: Enable up to 32G of guest memory on i386.

Added: dists/trunk/linux-2.6/debian/patches/features/all/SCSI-3w-sas-Add-new-driver-for-LSI-3ware-9750.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ dists/trunk/linux-2.6/debian/patches/features/all/SCSI-3w-sas-Add-new-driver-for-LSI-3ware-9750.patch	Tue Jan 26 13:01:12 2010	(r15002)
@@ -0,0 +1,2389 @@
+From bc8548932ca011c384ca7ccd6572a305911195ff Mon Sep 17 00:00:00 2001
+From: adam radford <aradford at gmail.com>
+Date: Fri, 23 Oct 2009 14:52:33 -0700
+Subject: [PATCH] [SCSI] 3w-sas: Add new driver for LSI 3ware 9750
+
+commit f619106bdd9d197c947f07108af57946f19a7f7e upstream
+
+[jejb: fix up for new queue depth code]
+[bwh: undo the above]
+Signed-off-by: Adam Radford <aradford at gmail.com>
+Signed-off-by: James Bottomley <James.Bottomley at suse.de>
+---
+ drivers/scsi/3w-sas.c | 1924 +++++++++++++++++++++++++++++++++++++++++++++++++
+ drivers/scsi/3w-sas.h |  396 ++++++++++
+ drivers/scsi/Kconfig  |   11 +
+ drivers/scsi/Makefile |    1 +
+ 4 files changed, 2332 insertions(+), 0 deletions(-)
+ create mode 100644 drivers/scsi/3w-sas.c
+ create mode 100644 drivers/scsi/3w-sas.h
+
+diff --git a/drivers/scsi/3w-sas.c b/drivers/scsi/3w-sas.c
+new file mode 100644
+index 0000000..4d314d7
+--- /dev/null
++++ b/drivers/scsi/3w-sas.c
+@@ -0,0 +1,1924 @@
++/*
++   3w-sas.c -- LSI 3ware SAS/SATA-RAID Controller device driver for Linux.
++
++   Written By: Adam Radford <linuxraid at lsi.com>
++
++   Copyright (C) 2009 LSI Corporation.
++
++   This program is free software; you can redistribute it and/or modify
++   it under the terms of the GNU General Public License as published by
++   the Free Software Foundation; version 2 of the License.
++
++   This program is distributed in the hope that it will be useful,
++   but WITHOUT ANY WARRANTY; without even the implied warranty of
++   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++   GNU General Public License for more details.
++
++   NO WARRANTY
++   THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
++   CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT
++   LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT,
++   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is
++   solely responsible for determining the appropriateness of using and
++   distributing the Program and assumes all risks associated with its
++   exercise of rights under this Agreement, including but not limited to
++   the risks and costs of program errors, damage to or loss of data,
++   programs or equipment, and unavailability or interruption of operations.
++
++   DISCLAIMER OF LIABILITY
++   NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY
++   DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
++   DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND
++   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
++   TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
++   USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED
++   HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES
++
++   You should have received a copy of the GNU General Public License
++   along with this program; if not, write to the Free Software
++   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
++
++   Controllers supported by this driver:
++
++   LSI 3ware 9750 6Gb/s SAS/SATA-RAID
++
++   Bugs/Comments/Suggestions should be mailed to:
++   linuxraid at lsi.com
++
++   For more information, goto:
++   http://www.lsi.com
++
++   History
++   -------
++   3.26.02.000 - Initial driver release.
++*/
++
++#include <linux/module.h>
++#include <linux/reboot.h>
++#include <linux/spinlock.h>
++#include <linux/interrupt.h>
++#include <linux/moduleparam.h>
++#include <linux/errno.h>
++#include <linux/types.h>
++#include <linux/delay.h>
++#include <linux/pci.h>
++#include <linux/time.h>
++#include <linux/mutex.h>
++#include <linux/smp_lock.h>
++#include <asm/io.h>
++#include <asm/irq.h>
++#include <asm/uaccess.h>
++#include <scsi/scsi.h>
++#include <scsi/scsi_host.h>
++#include <scsi/scsi_tcq.h>
++#include <scsi/scsi_cmnd.h>
++#include "3w-sas.h"
++
++/* Globals */
++#define TW_DRIVER_VERSION "3.26.02.000"
++static TW_Device_Extension *twl_device_extension_list[TW_MAX_SLOT];
++static unsigned int twl_device_extension_count;
++static int twl_major = -1;
++extern struct timezone sys_tz;
++
++/* Module parameters */
++MODULE_AUTHOR ("LSI");
++MODULE_DESCRIPTION ("LSI 3ware SAS/SATA-RAID Linux Driver");
++MODULE_LICENSE("GPL");
++MODULE_VERSION(TW_DRIVER_VERSION);
++
++static int use_msi;
++module_param(use_msi, int, S_IRUGO);
++MODULE_PARM_DESC(use_msi, "Use Message Signaled Interrupts. Default: 0");
++
++/* Function prototypes */
++static int twl_reset_device_extension(TW_Device_Extension *tw_dev, int ioctl_reset);
++
++/* Functions */
++
++/* This function returns AENs through sysfs */
++static ssize_t twl_sysfs_aen_read(struct kobject *kobj,
++				  struct bin_attribute *bin_attr,
++				  char *outbuf, loff_t offset, size_t count)
++{
++	struct device *dev = container_of(kobj, struct device, kobj);
++	struct Scsi_Host *shost = class_to_shost(dev);
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)shost->hostdata;
++	unsigned long flags = 0;
++	ssize_t ret;
++
++	if (!capable(CAP_SYS_ADMIN))
++		return -EACCES;
++
++	spin_lock_irqsave(tw_dev->host->host_lock, flags);
++	ret = memory_read_from_buffer(outbuf, count, &offset, tw_dev->event_queue[0], sizeof(TW_Event) * TW_Q_LENGTH);
++	spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++
++	return ret;
++} /* End twl_sysfs_aen_read() */
++
++/* aen_read sysfs attribute initializer */
++static struct bin_attribute twl_sysfs_aen_read_attr = {
++	.attr = {
++		.name = "3ware_aen_read",
++		.mode = S_IRUSR,
++	}, 
++	.size = 0,
++	.read = twl_sysfs_aen_read
++};
++
++/* This function returns driver compatibility info through sysfs */
++static ssize_t twl_sysfs_compat_info(struct kobject *kobj,
++				     struct bin_attribute *bin_attr,
++				     char *outbuf, loff_t offset, size_t count)
++{
++	struct device *dev = container_of(kobj, struct device, kobj);
++	struct Scsi_Host *shost = class_to_shost(dev);
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)shost->hostdata;
++	unsigned long flags = 0;
++	ssize_t ret;
++
++	if (!capable(CAP_SYS_ADMIN))
++		return -EACCES;
++
++	spin_lock_irqsave(tw_dev->host->host_lock, flags);
++	ret = memory_read_from_buffer(outbuf, count, &offset, &tw_dev->tw_compat_info, sizeof(TW_Compatibility_Info));
++	spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++
++	return ret;
++} /* End twl_sysfs_compat_info() */
++
++/* compat_info sysfs attribute initializer */
++static struct bin_attribute twl_sysfs_compat_info_attr = {
++	.attr = {
++		.name = "3ware_compat_info",
++		.mode = S_IRUSR,
++	}, 
++	.size = 0,
++	.read = twl_sysfs_compat_info
++};
++
++/* Show some statistics about the card */
++static ssize_t twl_show_stats(struct device *dev,
++			      struct device_attribute *attr, char *buf)
++{
++	struct Scsi_Host *host = class_to_shost(dev);
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)host->hostdata;
++	unsigned long flags = 0;
++	ssize_t len;
++
++	spin_lock_irqsave(tw_dev->host->host_lock, flags);
++	len = snprintf(buf, PAGE_SIZE, "3w-sas Driver version: %s\n"
++		       "Current commands posted:   %4d\n"
++		       "Max commands posted:       %4d\n"
++		       "Last sgl length:           %4d\n"
++		       "Max sgl length:            %4d\n"
++		       "Last sector count:         %4d\n"
++		       "Max sector count:          %4d\n"
++		       "SCSI Host Resets:          %4d\n"
++		       "AEN's:                     %4d\n", 
++		       TW_DRIVER_VERSION,
++		       tw_dev->posted_request_count,
++		       tw_dev->max_posted_request_count,
++		       tw_dev->sgl_entries,
++		       tw_dev->max_sgl_entries,
++		       tw_dev->sector_count,
++		       tw_dev->max_sector_count,
++		       tw_dev->num_resets,
++		       tw_dev->aen_count);
++	spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++	return len;
++} /* End twl_show_stats() */
++
++/* This function will set a devices queue depth */
++static int twl_change_queue_depth(struct scsi_device *sdev, int queue_depth,
++				  int reason)
++{
++	if (reason != SCSI_QDEPTH_DEFAULT)
++		return -EOPNOTSUPP;
++
++	if (queue_depth > TW_Q_LENGTH-2)
++		queue_depth = TW_Q_LENGTH-2;
++	scsi_adjust_queue_depth(sdev, MSG_ORDERED_TAG, queue_depth);
++	return queue_depth;
++} /* End twl_change_queue_depth() */
++
++/* stats sysfs attribute initializer */
++static struct device_attribute twl_host_stats_attr = {
++	.attr = {
++		.name = 	"3ware_stats",
++		.mode =		S_IRUGO,
++	},
++	.show = twl_show_stats
++};
++
++/* Host attributes initializer */
++static struct device_attribute *twl_host_attrs[] = {
++	&twl_host_stats_attr,
++	NULL,
++};
++
++/* This function will look up an AEN severity string */
++static char *twl_aen_severity_lookup(unsigned char severity_code)
++{
++	char *retval = NULL;
++
++	if ((severity_code < (unsigned char) TW_AEN_SEVERITY_ERROR) ||
++	    (severity_code > (unsigned char) TW_AEN_SEVERITY_DEBUG))
++		goto out;
++
++	retval = twl_aen_severity_table[severity_code];
++out:
++	return retval;
++} /* End twl_aen_severity_lookup() */
++
++/* This function will queue an event */
++static void twl_aen_queue_event(TW_Device_Extension *tw_dev, TW_Command_Apache_Header *header)
++{
++	u32 local_time;
++	struct timeval time;
++	TW_Event *event;
++	unsigned short aen;
++	char host[16];
++	char *error_str;
++
++	tw_dev->aen_count++;
++
++	/* Fill out event info */
++	event = tw_dev->event_queue[tw_dev->error_index];
++
++	host[0] = '\0';
++	if (tw_dev->host)
++		sprintf(host, " scsi%d:", tw_dev->host->host_no);
++
++	aen = le16_to_cpu(header->status_block.error);
++	memset(event, 0, sizeof(TW_Event));
++
++	event->severity = TW_SEV_OUT(header->status_block.severity__reserved);
++	do_gettimeofday(&time);
++	local_time = (u32)(time.tv_sec - (sys_tz.tz_minuteswest * 60));
++	event->time_stamp_sec = local_time;
++	event->aen_code = aen;
++	event->retrieved = TW_AEN_NOT_RETRIEVED;
++	event->sequence_id = tw_dev->error_sequence_id;
++	tw_dev->error_sequence_id++;
++
++	/* Check for embedded error string */
++	error_str = &(header->err_specific_desc[strlen(header->err_specific_desc)+1]);
++
++	header->err_specific_desc[sizeof(header->err_specific_desc) - 1] = '\0';
++	event->parameter_len = strlen(header->err_specific_desc);
++	memcpy(event->parameter_data, header->err_specific_desc, event->parameter_len + 1 + strlen(error_str));
++	if (event->severity != TW_AEN_SEVERITY_DEBUG)
++		printk(KERN_WARNING "3w-sas:%s AEN: %s (0x%02X:0x%04X): %s:%s.\n",
++		       host,
++		       twl_aen_severity_lookup(TW_SEV_OUT(header->status_block.severity__reserved)),
++		       TW_MESSAGE_SOURCE_CONTROLLER_EVENT, aen, error_str,
++		       header->err_specific_desc);
++	else
++		tw_dev->aen_count--;
++
++	tw_dev->error_index = (tw_dev->error_index + 1 ) % TW_Q_LENGTH;
++} /* End twl_aen_queue_event() */
++
++/* This function will attempt to post a command packet to the board */
++static int twl_post_command_packet(TW_Device_Extension *tw_dev, int request_id)
++{
++	dma_addr_t command_que_value;
++
++	command_que_value = tw_dev->command_packet_phys[request_id];
++	command_que_value += TW_COMMAND_OFFSET;
++
++	/* First write upper 4 bytes */
++	writel((u32)((u64)command_que_value >> 32), TWL_HIBQPH_REG_ADDR(tw_dev));
++	/* Then the lower 4 bytes */
++	writel((u32)(command_que_value | TWL_PULL_MODE), TWL_HIBQPL_REG_ADDR(tw_dev));
++
++	tw_dev->state[request_id] = TW_S_POSTED;
++	tw_dev->posted_request_count++;
++	if (tw_dev->posted_request_count > tw_dev->max_posted_request_count)
++		tw_dev->max_posted_request_count = tw_dev->posted_request_count;
++
++	return 0;
++} /* End twl_post_command_packet() */
++
++/* This function will perform a pci-dma mapping for a scatter gather list */
++static int twl_map_scsi_sg_data(TW_Device_Extension *tw_dev, int request_id)
++{
++	int use_sg;
++	struct scsi_cmnd *cmd = tw_dev->srb[request_id];
++
++	use_sg = scsi_dma_map(cmd);
++	if (!use_sg)
++		return 0;
++	else if (use_sg < 0) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1, "Failed to map scatter gather list");
++		return 0;
++	}
++
++	cmd->SCp.phase = TW_PHASE_SGLIST;
++	cmd->SCp.have_data_in = use_sg;
++
++	return use_sg;
++} /* End twl_map_scsi_sg_data() */
++
++/* This function hands scsi cdb's to the firmware */
++static int twl_scsiop_execute_scsi(TW_Device_Extension *tw_dev, int request_id, char *cdb, int use_sg, TW_SG_Entry_ISO *sglistarg)
++{
++	TW_Command_Full *full_command_packet;
++	TW_Command_Apache *command_packet;
++	int i, sg_count;
++	struct scsi_cmnd *srb = NULL;
++	struct scatterlist *sglist = NULL, *sg;
++	int retval = 1;
++
++	if (tw_dev->srb[request_id]) {
++		srb = tw_dev->srb[request_id];
++		if (scsi_sglist(srb))
++			sglist = scsi_sglist(srb);
++	}
++
++	/* Initialize command packet */
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	full_command_packet->header.header_desc.size_header = 128;
++	full_command_packet->header.status_block.error = 0;
++	full_command_packet->header.status_block.severity__reserved = 0;
++
++	command_packet = &full_command_packet->command.newcommand;
++	command_packet->status = 0;
++	command_packet->opcode__reserved = TW_OPRES_IN(0, TW_OP_EXECUTE_SCSI);
++
++	/* We forced 16 byte cdb use earlier */
++	if (!cdb)
++		memcpy(command_packet->cdb, srb->cmnd, TW_MAX_CDB_LEN);
++	else
++		memcpy(command_packet->cdb, cdb, TW_MAX_CDB_LEN);
++
++	if (srb) {
++		command_packet->unit = srb->device->id;
++		command_packet->request_id__lunl =
++			cpu_to_le16(TW_REQ_LUN_IN(srb->device->lun, request_id));
++	} else {
++		command_packet->request_id__lunl =
++			cpu_to_le16(TW_REQ_LUN_IN(0, request_id));
++		command_packet->unit = 0;
++	}
++
++	command_packet->sgl_offset = 16;
++
++	if (!sglistarg) {
++		/* Map sglist from scsi layer to cmd packet */
++		if (scsi_sg_count(srb)) {
++			sg_count = twl_map_scsi_sg_data(tw_dev, request_id);
++			if (sg_count == 0)
++				goto out;
++
++			scsi_for_each_sg(srb, sg, sg_count, i) {
++				command_packet->sg_list[i].address = TW_CPU_TO_SGL(sg_dma_address(sg));
++				command_packet->sg_list[i].length = TW_CPU_TO_SGL(sg_dma_len(sg));
++			}
++			command_packet->sgl_entries__lunh = cpu_to_le16(TW_REQ_LUN_IN((srb->device->lun >> 4), scsi_sg_count(tw_dev->srb[request_id])));
++		}
++	} else {
++		/* Internal cdb post */
++		for (i = 0; i < use_sg; i++) {
++			command_packet->sg_list[i].address = TW_CPU_TO_SGL(sglistarg[i].address);
++			command_packet->sg_list[i].length = TW_CPU_TO_SGL(sglistarg[i].length);
++		}
++		command_packet->sgl_entries__lunh = cpu_to_le16(TW_REQ_LUN_IN(0, use_sg));
++	}
++
++	/* Update some stats */
++	if (srb) {
++		tw_dev->sector_count = scsi_bufflen(srb) / 512;
++		if (tw_dev->sector_count > tw_dev->max_sector_count)
++			tw_dev->max_sector_count = tw_dev->sector_count;
++		tw_dev->sgl_entries = scsi_sg_count(srb);
++		if (tw_dev->sgl_entries > tw_dev->max_sgl_entries)
++			tw_dev->max_sgl_entries = tw_dev->sgl_entries;
++	}
++
++	/* Now post the command to the board */
++	retval = twl_post_command_packet(tw_dev, request_id);
++
++out:
++	return retval;
++} /* End twl_scsiop_execute_scsi() */
++
++/* This function will read the aen queue from the isr */
++static int twl_aen_read_queue(TW_Device_Extension *tw_dev, int request_id)
++{
++	char cdb[TW_MAX_CDB_LEN];
++	TW_SG_Entry_ISO sglist[1];
++	TW_Command_Full *full_command_packet;
++	int retval = 1;
++
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	memset(full_command_packet, 0, sizeof(TW_Command_Full));
++
++	/* Initialize cdb */
++	memset(&cdb, 0, TW_MAX_CDB_LEN);
++	cdb[0] = REQUEST_SENSE; /* opcode */
++	cdb[4] = TW_ALLOCATION_LENGTH; /* allocation length */
++
++	/* Initialize sglist */
++	memset(&sglist, 0, sizeof(TW_SG_Entry_ISO));
++	sglist[0].length = TW_SECTOR_SIZE;
++	sglist[0].address = tw_dev->generic_buffer_phys[request_id];
++
++	/* Mark internal command */
++	tw_dev->srb[request_id] = NULL;
++
++	/* Now post the command packet */
++	if (twl_scsiop_execute_scsi(tw_dev, request_id, cdb, 1, sglist)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x2, "Post failed while reading AEN queue");
++		goto out;
++	}
++	retval = 0;
++out:
++	return retval;
++} /* End twl_aen_read_queue() */
++
++/* This function will sync firmware time with the host time */
++static void twl_aen_sync_time(TW_Device_Extension *tw_dev, int request_id)
++{
++	u32 schedulertime;
++	struct timeval utc;
++	TW_Command_Full *full_command_packet;
++	TW_Command *command_packet;
++	TW_Param_Apache *param;
++	u32 local_time;
++
++	/* Fill out the command packet */
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	memset(full_command_packet, 0, sizeof(TW_Command_Full));
++	command_packet = &full_command_packet->command.oldcommand;
++	command_packet->opcode__sgloffset = TW_OPSGL_IN(2, TW_OP_SET_PARAM);
++	command_packet->request_id = request_id;
++	command_packet->byte8_offset.param.sgl[0].address = TW_CPU_TO_SGL(tw_dev->generic_buffer_phys[request_id]);
++	command_packet->byte8_offset.param.sgl[0].length = TW_CPU_TO_SGL(TW_SECTOR_SIZE);
++	command_packet->size = TW_COMMAND_SIZE;
++	command_packet->byte6_offset.parameter_count = cpu_to_le16(1);
++
++	/* Setup the param */
++	param = (TW_Param_Apache *)tw_dev->generic_buffer_virt[request_id];
++	memset(param, 0, TW_SECTOR_SIZE);
++	param->table_id = cpu_to_le16(TW_TIMEKEEP_TABLE | 0x8000); /* Controller time keep table */
++	param->parameter_id = cpu_to_le16(0x3); /* SchedulerTime */
++	param->parameter_size_bytes = cpu_to_le16(4);
++
++	/* Convert system time in UTC to local time seconds since last 
++           Sunday 12:00AM */
++	do_gettimeofday(&utc);
++	local_time = (u32)(utc.tv_sec - (sys_tz.tz_minuteswest * 60));
++	schedulertime = local_time - (3 * 86400);
++	schedulertime = cpu_to_le32(schedulertime % 604800);
++
++	memcpy(param->data, &schedulertime, sizeof(u32));
++
++	/* Mark internal command */
++	tw_dev->srb[request_id] = NULL;
++
++	/* Now post the command */
++	twl_post_command_packet(tw_dev, request_id);
++} /* End twl_aen_sync_time() */
++
++/* This function will assign an available request id */
++static void twl_get_request_id(TW_Device_Extension *tw_dev, int *request_id)
++{
++	*request_id = tw_dev->free_queue[tw_dev->free_head];
++	tw_dev->free_head = (tw_dev->free_head + 1) % TW_Q_LENGTH;
++	tw_dev->state[*request_id] = TW_S_STARTED;
++} /* End twl_get_request_id() */
++
++/* This function will free a request id */
++static void twl_free_request_id(TW_Device_Extension *tw_dev, int request_id)
++{
++	tw_dev->free_queue[tw_dev->free_tail] = request_id;
++	tw_dev->state[request_id] = TW_S_FINISHED;
++	tw_dev->free_tail = (tw_dev->free_tail + 1) % TW_Q_LENGTH;
++} /* End twl_free_request_id() */
++
++/* This function will complete an aen request from the isr */
++static int twl_aen_complete(TW_Device_Extension *tw_dev, int request_id)
++{
++	TW_Command_Full *full_command_packet;
++	TW_Command *command_packet;
++	TW_Command_Apache_Header *header;
++	unsigned short aen;
++	int retval = 1;
++
++	header = (TW_Command_Apache_Header *)tw_dev->generic_buffer_virt[request_id];
++	tw_dev->posted_request_count--;
++	aen = le16_to_cpu(header->status_block.error);
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	command_packet = &full_command_packet->command.oldcommand;
++
++	/* First check for internal completion of set param for time sync */
++	if (TW_OP_OUT(command_packet->opcode__sgloffset) == TW_OP_SET_PARAM) {
++		/* Keep reading the queue in case there are more aen's */
++		if (twl_aen_read_queue(tw_dev, request_id))
++			goto out2;
++	        else {
++			retval = 0;
++			goto out;
++		}
++	}
++
++	switch (aen) {
++	case TW_AEN_QUEUE_EMPTY:
++		/* Quit reading the queue if this is the last one */
++		break;
++	case TW_AEN_SYNC_TIME_WITH_HOST:
++		twl_aen_sync_time(tw_dev, request_id);
++		retval = 0;
++		goto out;
++	default:
++		twl_aen_queue_event(tw_dev, header);
++
++		/* If there are more aen's, keep reading the queue */
++		if (twl_aen_read_queue(tw_dev, request_id))
++			goto out2;
++		else {
++			retval = 0;
++			goto out;
++		}
++	}
++	retval = 0;
++out2:
++	tw_dev->state[request_id] = TW_S_COMPLETED;
++	twl_free_request_id(tw_dev, request_id);
++	clear_bit(TW_IN_ATTENTION_LOOP, &tw_dev->flags);
++out:
++	return retval;
++} /* End twl_aen_complete() */
++
++/* This function will poll for a response */
++static int twl_poll_response(TW_Device_Extension *tw_dev, int request_id, int seconds)
++{
++	unsigned long before;
++	dma_addr_t mfa;
++	u32 regh, regl;
++	u32 response;
++	int retval = 1;
++	int found = 0;
++
++	before = jiffies;
++
++	while (!found) {
++		if (sizeof(dma_addr_t) > 4) {
++			regh = readl(TWL_HOBQPH_REG_ADDR(tw_dev));
++			regl = readl(TWL_HOBQPL_REG_ADDR(tw_dev));
++			mfa = ((u64)regh << 32) | regl;
++		} else
++			mfa = readl(TWL_HOBQPL_REG_ADDR(tw_dev));
++
++		response = (u32)mfa;
++
++		if (TW_RESID_OUT(response) == request_id)
++			found = 1;
++
++		if (time_after(jiffies, before + HZ * seconds))
++			goto out;
++
++		msleep(50);
++	}
++	retval = 0;
++out: 
++	return retval;
++} /* End twl_poll_response() */
++
++/* This function will drain the aen queue */
++static int twl_aen_drain_queue(TW_Device_Extension *tw_dev, int no_check_reset)
++{
++	int request_id = 0;
++	char cdb[TW_MAX_CDB_LEN];
++	TW_SG_Entry_ISO sglist[1];
++	int finished = 0, count = 0;
++	TW_Command_Full *full_command_packet;
++	TW_Command_Apache_Header *header;
++	unsigned short aen;
++	int first_reset = 0, queue = 0, retval = 1;
++
++	if (no_check_reset)
++		first_reset = 0;
++	else
++		first_reset = 1;
++
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	memset(full_command_packet, 0, sizeof(TW_Command_Full));
++
++	/* Initialize cdb */
++	memset(&cdb, 0, TW_MAX_CDB_LEN);
++	cdb[0] = REQUEST_SENSE; /* opcode */
++	cdb[4] = TW_ALLOCATION_LENGTH; /* allocation length */
++
++	/* Initialize sglist */
++	memset(&sglist, 0, sizeof(TW_SG_Entry_ISO));
++	sglist[0].length = TW_SECTOR_SIZE;
++	sglist[0].address = tw_dev->generic_buffer_phys[request_id];
++
++	/* Mark internal command */
++	tw_dev->srb[request_id] = NULL;
++
++	do {
++		/* Send command to the board */
++		if (twl_scsiop_execute_scsi(tw_dev, request_id, cdb, 1, sglist)) {
++			TW_PRINTK(tw_dev->host, TW_DRIVER, 0x3, "Error posting request sense");
++			goto out;
++		}
++
++		/* Now poll for completion */
++		if (twl_poll_response(tw_dev, request_id, 30)) {
++			TW_PRINTK(tw_dev->host, TW_DRIVER, 0x4, "No valid response while draining AEN queue");
++			tw_dev->posted_request_count--;
++			goto out;
++		}
++
++		tw_dev->posted_request_count--;
++		header = (TW_Command_Apache_Header *)tw_dev->generic_buffer_virt[request_id];
++		aen = le16_to_cpu(header->status_block.error);
++		queue = 0;
++		count++;
++
++		switch (aen) {
++		case TW_AEN_QUEUE_EMPTY:
++			if (first_reset != 1)
++				goto out;
++			else
++				finished = 1;
++			break;
++		case TW_AEN_SOFT_RESET:
++			if (first_reset == 0)
++				first_reset = 1;
++			else
++				queue = 1;
++			break;
++		case TW_AEN_SYNC_TIME_WITH_HOST:
++			break;
++		default:
++			queue = 1;
++		}
++
++		/* Now queue an event info */
++		if (queue)
++			twl_aen_queue_event(tw_dev, header);
++	} while ((finished == 0) && (count < TW_MAX_AEN_DRAIN));
++
++	if (count == TW_MAX_AEN_DRAIN)
++		goto out;
++
++	retval = 0;
++out:
++	tw_dev->state[request_id] = TW_S_INITIAL;
++	return retval;
++} /* End twl_aen_drain_queue() */
++
++/* This function will allocate memory and check if it is correctly aligned */
++static int twl_allocate_memory(TW_Device_Extension *tw_dev, int size, int which)
++{
++	int i;
++	dma_addr_t dma_handle;
++	unsigned long *cpu_addr;
++	int retval = 1;
++
++	cpu_addr = pci_alloc_consistent(tw_dev->tw_pci_dev, size*TW_Q_LENGTH, &dma_handle);
++	if (!cpu_addr) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x5, "Memory allocation failed");
++		goto out;
++	}
++
++	memset(cpu_addr, 0, size*TW_Q_LENGTH);
++
++	for (i = 0; i < TW_Q_LENGTH; i++) {
++		switch(which) {
++		case 0:
++			tw_dev->command_packet_phys[i] = dma_handle+(i*size);
++			tw_dev->command_packet_virt[i] = (TW_Command_Full *)((unsigned char *)cpu_addr + (i*size));
++			break;
++		case 1:
++			tw_dev->generic_buffer_phys[i] = dma_handle+(i*size);
++			tw_dev->generic_buffer_virt[i] = (unsigned long *)((unsigned char *)cpu_addr + (i*size));
++			break;
++		case 2:
++			tw_dev->sense_buffer_phys[i] = dma_handle+(i*size);
++			tw_dev->sense_buffer_virt[i] = (TW_Command_Apache_Header *)((unsigned char *)cpu_addr + (i*size));
++			break;
++		}
++	}
++	retval = 0;
++out:
++	return retval;
++} /* End twl_allocate_memory() */
++
++/* This function will load the request id and various sgls for ioctls */
++static void twl_load_sgl(TW_Device_Extension *tw_dev, TW_Command_Full *full_command_packet, int request_id, dma_addr_t dma_handle, int length)
++{
++	TW_Command *oldcommand;
++	TW_Command_Apache *newcommand;
++	TW_SG_Entry_ISO *sgl;
++	unsigned int pae = 0;
++
++	if ((sizeof(long) < 8) && (sizeof(dma_addr_t) > 4))
++		pae = 1;
++
++	if (TW_OP_OUT(full_command_packet->command.newcommand.opcode__reserved) == TW_OP_EXECUTE_SCSI) {
++		newcommand = &full_command_packet->command.newcommand;
++		newcommand->request_id__lunl =
++			cpu_to_le16(TW_REQ_LUN_IN(TW_LUN_OUT(newcommand->request_id__lunl), request_id));
++		if (length) {
++			newcommand->sg_list[0].address = TW_CPU_TO_SGL(dma_handle + sizeof(TW_Ioctl_Buf_Apache) - 1);
++			newcommand->sg_list[0].length = TW_CPU_TO_SGL(length);
++		}
++		newcommand->sgl_entries__lunh =
++			cpu_to_le16(TW_REQ_LUN_IN(TW_LUN_OUT(newcommand->sgl_entries__lunh), length ? 1 : 0));
++	} else {
++		oldcommand = &full_command_packet->command.oldcommand;
++		oldcommand->request_id = request_id;
++
++		if (TW_SGL_OUT(oldcommand->opcode__sgloffset)) {
++			/* Load the sg list */
++			sgl = (TW_SG_Entry_ISO *)((u32 *)oldcommand+oldcommand->size - (sizeof(TW_SG_Entry_ISO)/4) + pae + (sizeof(dma_addr_t) > 4 ? 1 : 0));
++			sgl->address = TW_CPU_TO_SGL(dma_handle + sizeof(TW_Ioctl_Buf_Apache) - 1);
++			sgl->length = TW_CPU_TO_SGL(length);
++			oldcommand->size += pae;
++			oldcommand->size += sizeof(dma_addr_t) > 4 ? 1 : 0;
++		}
++	}
++} /* End twl_load_sgl() */
++
++/* This function handles ioctl for the character device
++   This interface is used by smartmontools open source software */
++static int twl_chrdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg)
++{
++	long timeout;
++	unsigned long *cpu_addr, data_buffer_length_adjusted = 0, flags = 0;
++	dma_addr_t dma_handle;
++	int request_id = 0;
++	TW_Ioctl_Driver_Command driver_command;
++	TW_Ioctl_Buf_Apache *tw_ioctl;
++	TW_Command_Full *full_command_packet;
++	TW_Device_Extension *tw_dev = twl_device_extension_list[iminor(inode)];
++	int retval = -EFAULT;
++	void __user *argp = (void __user *)arg;
++
++	/* Only let one of these through at a time */
++	if (mutex_lock_interruptible(&tw_dev->ioctl_lock)) {
++		retval = -EINTR;
++		goto out;
++	}
++
++	/* First copy down the driver command */
++	if (copy_from_user(&driver_command, argp, sizeof(TW_Ioctl_Driver_Command)))
++		goto out2;
++
++	/* Check data buffer size */
++	if (driver_command.buffer_length > TW_MAX_SECTORS * 2048) {
++		retval = -EINVAL;
++		goto out2;
++	}
++
++	/* Hardware can only do multiple of 512 byte transfers */
++	data_buffer_length_adjusted = (driver_command.buffer_length + 511) & ~511;
++
++	/* Now allocate ioctl buf memory */
++	cpu_addr = dma_alloc_coherent(&tw_dev->tw_pci_dev->dev, data_buffer_length_adjusted+sizeof(TW_Ioctl_Buf_Apache) - 1, &dma_handle, GFP_KERNEL);
++	if (!cpu_addr) {
++		retval = -ENOMEM;
++		goto out2;
++	}
++
++	tw_ioctl = (TW_Ioctl_Buf_Apache *)cpu_addr;
++
++	/* Now copy down the entire ioctl */
++	if (copy_from_user(tw_ioctl, argp, driver_command.buffer_length + sizeof(TW_Ioctl_Buf_Apache) - 1))
++		goto out3;
++
++	/* See which ioctl we are doing */
++	switch (cmd) {
++	case TW_IOCTL_FIRMWARE_PASS_THROUGH:
++		spin_lock_irqsave(tw_dev->host->host_lock, flags);
++		twl_get_request_id(tw_dev, &request_id);
++
++		/* Flag internal command */
++		tw_dev->srb[request_id] = NULL;
++
++		/* Flag chrdev ioctl */
++		tw_dev->chrdev_request_id = request_id;
++
++		full_command_packet = (TW_Command_Full *)&tw_ioctl->firmware_command;
++
++		/* Load request id and sglist for both command types */
++		twl_load_sgl(tw_dev, full_command_packet, request_id, dma_handle, data_buffer_length_adjusted);
++
++		memcpy(tw_dev->command_packet_virt[request_id], &(tw_ioctl->firmware_command), sizeof(TW_Command_Full));
++
++		/* Now post the command packet to the controller */
++		twl_post_command_packet(tw_dev, request_id);
++		spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++
++		timeout = TW_IOCTL_CHRDEV_TIMEOUT*HZ;
++
++		/* Now wait for command to complete */
++		timeout = wait_event_timeout(tw_dev->ioctl_wqueue, tw_dev->chrdev_request_id == TW_IOCTL_CHRDEV_FREE, timeout);
++
++		/* We timed out, and didn't get an interrupt */
++		if (tw_dev->chrdev_request_id != TW_IOCTL_CHRDEV_FREE) {
++			/* Now we need to reset the board */
++			printk(KERN_WARNING "3w-sas: scsi%d: WARNING: (0x%02X:0x%04X): Character ioctl (0x%x) timed out, resetting card.\n",
++			       tw_dev->host->host_no, TW_DRIVER, 0x6,
++			       cmd);
++			retval = -EIO;
++			twl_reset_device_extension(tw_dev, 1);
++			goto out3;
++		}
++
++		/* Now copy in the command packet response */
++		memcpy(&(tw_ioctl->firmware_command), tw_dev->command_packet_virt[request_id], sizeof(TW_Command_Full));
++		
++		/* Now complete the io */
++		spin_lock_irqsave(tw_dev->host->host_lock, flags);
++		tw_dev->posted_request_count--;
++		tw_dev->state[request_id] = TW_S_COMPLETED;
++		twl_free_request_id(tw_dev, request_id);
++		spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++		break;
++	default:
++		retval = -ENOTTY;
++		goto out3;
++	}
++
++	/* Now copy the entire response to userspace */
++	if (copy_to_user(argp, tw_ioctl, sizeof(TW_Ioctl_Buf_Apache) + driver_command.buffer_length - 1) == 0)
++		retval = 0;
++out3:
++	/* Now free ioctl buf memory */
++	dma_free_coherent(&tw_dev->tw_pci_dev->dev, data_buffer_length_adjusted+sizeof(TW_Ioctl_Buf_Apache) - 1, cpu_addr, dma_handle);
++out2:
++	mutex_unlock(&tw_dev->ioctl_lock);
++out:
++	return retval;
++} /* End twl_chrdev_ioctl() */
++
++/* This function handles open for the character device */
++static int twl_chrdev_open(struct inode *inode, struct file *file)
++{
++	unsigned int minor_number;
++	int retval = -ENODEV;
++
++	if (!capable(CAP_SYS_ADMIN)) {
++		retval = -EACCES;
++		goto out;
++	}
++
++	cycle_kernel_lock();
++	minor_number = iminor(inode);
++	if (minor_number >= twl_device_extension_count)
++		goto out;
++	retval = 0;
++out:
++	return retval;
++} /* End twl_chrdev_open() */
++
++/* File operations struct for character device */
++static const struct file_operations twl_fops = {
++	.owner		= THIS_MODULE,
++	.ioctl		= twl_chrdev_ioctl,
++	.open		= twl_chrdev_open,
++	.release	= NULL
++};
++
++/* This function passes sense data from firmware to scsi layer */
++static int twl_fill_sense(TW_Device_Extension *tw_dev, int i, int request_id, int copy_sense, int print_host)
++{
++	TW_Command_Apache_Header *header;
++	TW_Command_Full *full_command_packet;
++	unsigned short error;
++	char *error_str;
++	int retval = 1;
++
++	header = tw_dev->sense_buffer_virt[i];
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++
++	/* Get embedded firmware error string */
++	error_str = &(header->err_specific_desc[strlen(header->err_specific_desc) + 1]);
++
++	/* Don't print error for Logical unit not supported during rollcall */
++	error = le16_to_cpu(header->status_block.error);
++	if ((error != TW_ERROR_LOGICAL_UNIT_NOT_SUPPORTED) && (error != TW_ERROR_UNIT_OFFLINE) && (error != TW_ERROR_INVALID_FIELD_IN_CDB)) {
++		if (print_host)
++			printk(KERN_WARNING "3w-sas: scsi%d: ERROR: (0x%02X:0x%04X): %s:%s.\n",
++			       tw_dev->host->host_no,
++			       TW_MESSAGE_SOURCE_CONTROLLER_ERROR,
++			       header->status_block.error,
++			       error_str, 
++			       header->err_specific_desc);
++		else
++			printk(KERN_WARNING "3w-sas: ERROR: (0x%02X:0x%04X): %s:%s.\n",
++			       TW_MESSAGE_SOURCE_CONTROLLER_ERROR,
++			       header->status_block.error,
++			       error_str,
++			       header->err_specific_desc);
++	}
++
++	if (copy_sense) {
++		memcpy(tw_dev->srb[request_id]->sense_buffer, header->sense_data, TW_SENSE_DATA_LENGTH);
++		tw_dev->srb[request_id]->result = (full_command_packet->command.newcommand.status << 1);
++		goto out;
++	}
++out:
++	return retval;
++} /* End twl_fill_sense() */
++
++/* This function will free up device extension resources */
++static void twl_free_device_extension(TW_Device_Extension *tw_dev)
++{
++	if (tw_dev->command_packet_virt[0])
++		pci_free_consistent(tw_dev->tw_pci_dev,
++				    sizeof(TW_Command_Full)*TW_Q_LENGTH,
++				    tw_dev->command_packet_virt[0],
++				    tw_dev->command_packet_phys[0]);
++
++	if (tw_dev->generic_buffer_virt[0])
++		pci_free_consistent(tw_dev->tw_pci_dev,
++				    TW_SECTOR_SIZE*TW_Q_LENGTH,
++				    tw_dev->generic_buffer_virt[0],
++				    tw_dev->generic_buffer_phys[0]);
++
++	if (tw_dev->sense_buffer_virt[0])
++		pci_free_consistent(tw_dev->tw_pci_dev,
++				    sizeof(TW_Command_Apache_Header)*
++				    TW_Q_LENGTH,
++				    tw_dev->sense_buffer_virt[0],
++				    tw_dev->sense_buffer_phys[0]);
++
++	kfree(tw_dev->event_queue[0]);
++} /* End twl_free_device_extension() */
++
++/* This function will get parameter table entries from the firmware */
++static void *twl_get_param(TW_Device_Extension *tw_dev, int request_id, int table_id, int parameter_id, int parameter_size_bytes)
++{
++	TW_Command_Full *full_command_packet;
++	TW_Command *command_packet;
++	TW_Param_Apache *param;
++	void *retval = NULL;
++
++	/* Setup the command packet */
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	memset(full_command_packet, 0, sizeof(TW_Command_Full));
++	command_packet = &full_command_packet->command.oldcommand;
++
++	command_packet->opcode__sgloffset = TW_OPSGL_IN(2, TW_OP_GET_PARAM);
++	command_packet->size              = TW_COMMAND_SIZE;
++	command_packet->request_id        = request_id;
++	command_packet->byte6_offset.block_count = cpu_to_le16(1);
++
++	/* Now setup the param */
++	param = (TW_Param_Apache *)tw_dev->generic_buffer_virt[request_id];
++	memset(param, 0, TW_SECTOR_SIZE);
++	param->table_id = cpu_to_le16(table_id | 0x8000);
++	param->parameter_id = cpu_to_le16(parameter_id);
++	param->parameter_size_bytes = cpu_to_le16(parameter_size_bytes);
++
++	command_packet->byte8_offset.param.sgl[0].address = TW_CPU_TO_SGL(tw_dev->generic_buffer_phys[request_id]);
++	command_packet->byte8_offset.param.sgl[0].length = TW_CPU_TO_SGL(TW_SECTOR_SIZE);
++
++	/* Post the command packet to the board */
++	twl_post_command_packet(tw_dev, request_id);
++
++	/* Poll for completion */
++	if (twl_poll_response(tw_dev, request_id, 30))
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x7, "No valid response during get param")
++	else
++		retval = (void *)&(param->data[0]);
++
++	tw_dev->posted_request_count--;
++	tw_dev->state[request_id] = TW_S_INITIAL;
++
++	return retval;
++} /* End twl_get_param() */
++
++/* This function will send an initconnection command to controller */
++static int twl_initconnection(TW_Device_Extension *tw_dev, int message_credits,
++ 			      u32 set_features, unsigned short current_fw_srl, 
++			      unsigned short current_fw_arch_id, 
++			      unsigned short current_fw_branch, 
++			      unsigned short current_fw_build, 
++			      unsigned short *fw_on_ctlr_srl, 
++			      unsigned short *fw_on_ctlr_arch_id, 
++			      unsigned short *fw_on_ctlr_branch, 
++			      unsigned short *fw_on_ctlr_build, 
++			      u32 *init_connect_result)
++{
++	TW_Command_Full *full_command_packet;
++	TW_Initconnect *tw_initconnect;
++	int request_id = 0, retval = 1;
++
++	/* Initialize InitConnection command packet */
++	full_command_packet = tw_dev->command_packet_virt[request_id];
++	memset(full_command_packet, 0, sizeof(TW_Command_Full));
++	full_command_packet->header.header_desc.size_header = 128;
++	
++	tw_initconnect = (TW_Initconnect *)&full_command_packet->command.oldcommand;
++	tw_initconnect->opcode__reserved = TW_OPRES_IN(0, TW_OP_INIT_CONNECTION);
++	tw_initconnect->request_id = request_id;
++	tw_initconnect->message_credits = cpu_to_le16(message_credits);
++	tw_initconnect->features = set_features;
++
++	/* Turn on 64-bit sgl support if we need to */
++	tw_initconnect->features |= sizeof(dma_addr_t) > 4 ? 1 : 0;
++
++	tw_initconnect->features = cpu_to_le32(tw_initconnect->features);
++
++	if (set_features & TW_EXTENDED_INIT_CONNECT) {
++		tw_initconnect->size = TW_INIT_COMMAND_PACKET_SIZE_EXTENDED;
++		tw_initconnect->fw_srl = cpu_to_le16(current_fw_srl);
++		tw_initconnect->fw_arch_id = cpu_to_le16(current_fw_arch_id);
++		tw_initconnect->fw_branch = cpu_to_le16(current_fw_branch);
++		tw_initconnect->fw_build = cpu_to_le16(current_fw_build);
++	} else 
++		tw_initconnect->size = TW_INIT_COMMAND_PACKET_SIZE;
++
++	/* Send command packet to the board */
++	twl_post_command_packet(tw_dev, request_id);
++
++	/* Poll for completion */
++	if (twl_poll_response(tw_dev, request_id, 30)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x8, "No valid response during init connection");
++	} else {
++		if (set_features & TW_EXTENDED_INIT_CONNECT) {
++			*fw_on_ctlr_srl = le16_to_cpu(tw_initconnect->fw_srl);
++			*fw_on_ctlr_arch_id = le16_to_cpu(tw_initconnect->fw_arch_id);
++			*fw_on_ctlr_branch = le16_to_cpu(tw_initconnect->fw_branch);
++			*fw_on_ctlr_build = le16_to_cpu(tw_initconnect->fw_build);
++			*init_connect_result = le32_to_cpu(tw_initconnect->result);
++		}
++		retval = 0;
++	}
++
++	tw_dev->posted_request_count--;
++	tw_dev->state[request_id] = TW_S_INITIAL;
++
++	return retval;
++} /* End twl_initconnection() */
++
++/* This function will initialize the fields of a device extension */
++static int twl_initialize_device_extension(TW_Device_Extension *tw_dev)
++{
++	int i, retval = 1;
++
++	/* Initialize command packet buffers */
++	if (twl_allocate_memory(tw_dev, sizeof(TW_Command_Full), 0)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x9, "Command packet memory allocation failed");
++		goto out;
++	}
++
++	/* Initialize generic buffer */
++	if (twl_allocate_memory(tw_dev, TW_SECTOR_SIZE, 1)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0xa, "Generic memory allocation failed");
++		goto out;
++	}
++
++	/* Allocate sense buffers */
++	if (twl_allocate_memory(tw_dev, sizeof(TW_Command_Apache_Header), 2)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0xb, "Sense buffer allocation failed");
++		goto out;
++	}
++
++	/* Allocate event info space */
++	tw_dev->event_queue[0] = kcalloc(TW_Q_LENGTH, sizeof(TW_Event), GFP_KERNEL);
++	if (!tw_dev->event_queue[0]) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0xc, "Event info memory allocation failed");
++		goto out;
++	}
++
++	for (i = 0; i < TW_Q_LENGTH; i++) {
++		tw_dev->event_queue[i] = (TW_Event *)((unsigned char *)tw_dev->event_queue[0] + (i * sizeof(TW_Event)));
++		tw_dev->free_queue[i] = i;
++		tw_dev->state[i] = TW_S_INITIAL;
++	}
++
++	tw_dev->free_head = TW_Q_START;
++	tw_dev->free_tail = TW_Q_START;
++	tw_dev->error_sequence_id = 1;
++	tw_dev->chrdev_request_id = TW_IOCTL_CHRDEV_FREE;
++
++	mutex_init(&tw_dev->ioctl_lock);
++	init_waitqueue_head(&tw_dev->ioctl_wqueue);
++
++	retval = 0;
++out:
++	return retval;
++} /* End twl_initialize_device_extension() */
++
++/* This function will perform a pci-dma unmap */
++static void twl_unmap_scsi_data(TW_Device_Extension *tw_dev, int request_id)
++{
++	struct scsi_cmnd *cmd = tw_dev->srb[request_id];
++
++	if (cmd->SCp.phase == TW_PHASE_SGLIST)
++		scsi_dma_unmap(cmd);
++} /* End twl_unmap_scsi_data() */
++
++/* This function will handle attention interrupts */
++static int twl_handle_attention_interrupt(TW_Device_Extension *tw_dev)
++{
++	int retval = 1;
++	u32 request_id, doorbell;
++
++	/* Read doorbell status */
++	doorbell = readl(TWL_HOBDB_REG_ADDR(tw_dev));
++
++	/* Check for controller errors */
++	if (doorbell & TWL_DOORBELL_CONTROLLER_ERROR) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0xd, "Microcontroller Error: clearing");
++		goto out;
++	}
++
++	/* Check if we need to perform an AEN drain */
++	if (doorbell & TWL_DOORBELL_ATTENTION_INTERRUPT) {
++		if (!(test_and_set_bit(TW_IN_ATTENTION_LOOP, &tw_dev->flags))) {
++			twl_get_request_id(tw_dev, &request_id);
++			if (twl_aen_read_queue(tw_dev, request_id)) {
++				tw_dev->state[request_id] = TW_S_COMPLETED;
++				twl_free_request_id(tw_dev, request_id);
++				clear_bit(TW_IN_ATTENTION_LOOP, &tw_dev->flags);
++			}
++		}
++	}
++
++	retval = 0;
++out:
++	/* Clear doorbell interrupt */
++	TWL_CLEAR_DB_INTERRUPT(tw_dev);
++
++	/* Make sure the clear was flushed by reading it back */
++	readl(TWL_HOBDBC_REG_ADDR(tw_dev));
++
++	return retval;
++} /* End twl_handle_attention_interrupt() */
++
++/* Interrupt service routine */
++static irqreturn_t twl_interrupt(int irq, void *dev_instance)
++{
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)dev_instance;
++	int i, handled = 0, error = 0;
++	dma_addr_t mfa = 0;
++	u32 reg, regl, regh, response, request_id = 0;
++	struct scsi_cmnd *cmd;
++	TW_Command_Full *full_command_packet;
++
++	spin_lock(tw_dev->host->host_lock);
++
++	/* Read host interrupt status */
++	reg = readl(TWL_HISTAT_REG_ADDR(tw_dev));
++
++	/* Check if this is our interrupt, otherwise bail */
++	if (!(reg & TWL_HISTATUS_VALID_INTERRUPT))
++		goto twl_interrupt_bail;
++
++	handled = 1;
++
++	/* If we are resetting, bail */
++	if (test_bit(TW_IN_RESET, &tw_dev->flags))
++		goto twl_interrupt_bail;
++
++	/* Attention interrupt */
++	if (reg & TWL_HISTATUS_ATTENTION_INTERRUPT) {
++		if (twl_handle_attention_interrupt(tw_dev)) {
++			TWL_MASK_INTERRUPTS(tw_dev);
++			goto twl_interrupt_bail;
++		}
++	}
++
++	/* Response interrupt */
++	while (reg & TWL_HISTATUS_RESPONSE_INTERRUPT) {
++		if (sizeof(dma_addr_t) > 4) {
++			regh = readl(TWL_HOBQPH_REG_ADDR(tw_dev));
++			regl = readl(TWL_HOBQPL_REG_ADDR(tw_dev));
++			mfa = ((u64)regh << 32) | regl;
++		} else
++			mfa = readl(TWL_HOBQPL_REG_ADDR(tw_dev));
++
++		error = 0;
++		response = (u32)mfa;
++
++		/* Check for command packet error */
++		if (!TW_NOTMFA_OUT(response)) {
++			for (i=0;i<TW_Q_LENGTH;i++) {
++				if (tw_dev->sense_buffer_phys[i] == mfa) {
++					request_id = le16_to_cpu(tw_dev->sense_buffer_virt[i]->header_desc.request_id);
++					if (tw_dev->srb[request_id] != NULL)
++						error = twl_fill_sense(tw_dev, i, request_id, 1, 1);
++					else {
++						/* Skip ioctl error prints */
++						if (request_id != tw_dev->chrdev_request_id)
++							error = twl_fill_sense(tw_dev, i, request_id, 0, 1);
++						else
++							memcpy(tw_dev->command_packet_virt[request_id], tw_dev->sense_buffer_virt[i], sizeof(TW_Command_Apache_Header));
++					}
++
++					/* Now re-post the sense buffer */
++					writel((u32)((u64)tw_dev->sense_buffer_phys[i] >> 32), TWL_HOBQPH_REG_ADDR(tw_dev));
++					writel((u32)tw_dev->sense_buffer_phys[i], TWL_HOBQPL_REG_ADDR(tw_dev));
++					break;
++				}
++			}
++		} else
++			request_id = TW_RESID_OUT(response);
++
++		full_command_packet = tw_dev->command_packet_virt[request_id];
++
++		/* Check for correct state */
++		if (tw_dev->state[request_id] != TW_S_POSTED) {
++			if (tw_dev->srb[request_id] != NULL) {
++				TW_PRINTK(tw_dev->host, TW_DRIVER, 0xe, "Received a request id that wasn't posted");
++				TWL_MASK_INTERRUPTS(tw_dev);
++				goto twl_interrupt_bail;
++			}
++		}
++
++		/* Check for internal command completion */
++		if (tw_dev->srb[request_id] == NULL) {
++			if (request_id != tw_dev->chrdev_request_id) {
++				if (twl_aen_complete(tw_dev, request_id))
++					TW_PRINTK(tw_dev->host, TW_DRIVER, 0xf, "Error completing AEN during attention interrupt");
++			} else {
++				tw_dev->chrdev_request_id = TW_IOCTL_CHRDEV_FREE;
++				wake_up(&tw_dev->ioctl_wqueue);
++			}
++		} else {
++			cmd = tw_dev->srb[request_id];
++
++			if (!error)
++				cmd->result = (DID_OK << 16);
++			
++			/* Report residual bytes for single sgl */
++			if ((scsi_sg_count(cmd) <= 1) && (full_command_packet->command.newcommand.status == 0)) {
++				if (full_command_packet->command.newcommand.sg_list[0].length < scsi_bufflen(tw_dev->srb[request_id]))
++					scsi_set_resid(cmd, scsi_bufflen(cmd) - full_command_packet->command.newcommand.sg_list[0].length);
++			}
++
++			/* Now complete the io */
++			tw_dev->state[request_id] = TW_S_COMPLETED;
++			twl_free_request_id(tw_dev, request_id);
++			tw_dev->posted_request_count--;
++			tw_dev->srb[request_id]->scsi_done(tw_dev->srb[request_id]);
++			twl_unmap_scsi_data(tw_dev, request_id);
++		}
++
++		/* Check for another response interrupt */
++		reg = readl(TWL_HISTAT_REG_ADDR(tw_dev));
++	}
++
++twl_interrupt_bail:
++	spin_unlock(tw_dev->host->host_lock);
++	return IRQ_RETVAL(handled);
++} /* End twl_interrupt() */
++
++/* This function will poll for a register change */
++static int twl_poll_register(TW_Device_Extension *tw_dev, void *reg, u32 value, u32 result, int seconds)
++{
++	unsigned long before;
++	int retval = 1;
++	u32 reg_value;
++
++	reg_value = readl(reg);
++	before = jiffies;
++
++        while ((reg_value & value) != result) {
++		reg_value = readl(reg);
++		if (time_after(jiffies, before + HZ * seconds))
++			goto out;
++		msleep(50);
++	}
++	retval = 0;
++out:
++	return retval;
++} /* End twl_poll_register() */
++
++/* This function will reset a controller */
++static int twl_reset_sequence(TW_Device_Extension *tw_dev, int soft_reset)
++{
++	int retval = 1;
++	int i = 0;
++	u32 status = 0;
++	unsigned short fw_on_ctlr_srl = 0, fw_on_ctlr_arch_id = 0;
++	unsigned short fw_on_ctlr_branch = 0, fw_on_ctlr_build = 0;
++	u32 init_connect_result = 0;
++	int tries = 0;
++	int do_soft_reset = soft_reset;
++
++	while (tries < TW_MAX_RESET_TRIES) {
++		/* Do a soft reset if one is needed */
++		if (do_soft_reset) {
++			TWL_SOFT_RESET(tw_dev);
++
++			/* Make sure controller is in a good state */
++			if (twl_poll_register(tw_dev, TWL_SCRPD3_REG_ADDR(tw_dev), TWL_CONTROLLER_READY, 0x0, 30)) {
++				TW_PRINTK(tw_dev->host, TW_DRIVER, 0x10, "Controller never went non-ready during reset sequence");
++				tries++;
++				continue;
++			}
++			if (twl_poll_register(tw_dev, TWL_SCRPD3_REG_ADDR(tw_dev), TWL_CONTROLLER_READY, TWL_CONTROLLER_READY, 60)) {
++				TW_PRINTK(tw_dev->host, TW_DRIVER, 0x11, "Controller not ready during reset sequence");
++				tries++;
++				continue;
++			}
++		}
++
++		/* Initconnect */
++		if (twl_initconnection(tw_dev, TW_INIT_MESSAGE_CREDITS,
++				       TW_EXTENDED_INIT_CONNECT, TW_CURRENT_DRIVER_SRL,
++				       TW_9750_ARCH_ID, TW_CURRENT_DRIVER_BRANCH,
++				       TW_CURRENT_DRIVER_BUILD, &fw_on_ctlr_srl,
++				       &fw_on_ctlr_arch_id, &fw_on_ctlr_branch,
++				       &fw_on_ctlr_build, &init_connect_result)) {
++			TW_PRINTK(tw_dev->host, TW_DRIVER, 0x12, "Initconnection failed while checking SRL");
++			do_soft_reset = 1;
++			tries++;
++			continue;
++		}
++
++		/* Load sense buffers */
++		while (i < TW_Q_LENGTH) {
++			writel((u32)((u64)tw_dev->sense_buffer_phys[i] >> 32), TWL_HOBQPH_REG_ADDR(tw_dev));
++			writel((u32)tw_dev->sense_buffer_phys[i], TWL_HOBQPL_REG_ADDR(tw_dev));
++
++			/* Check status for over-run after each write */
++			status = readl(TWL_STATUS_REG_ADDR(tw_dev));
++			if (!(status & TWL_STATUS_OVERRUN_SUBMIT))
++			    i++;
++		}
++
++		/* Now check status */
++		status = readl(TWL_STATUS_REG_ADDR(tw_dev));
++		if (status) {
++			TW_PRINTK(tw_dev->host, TW_DRIVER, 0x13, "Bad controller status after loading sense buffers");
++			do_soft_reset = 1;
++			tries++;
++			continue;
++		}
++
++		/* Drain the AEN queue */
++		if (twl_aen_drain_queue(tw_dev, soft_reset)) {
++			TW_PRINTK(tw_dev->host, TW_DRIVER, 0x14, "AEN drain failed during reset sequence");
++			do_soft_reset = 1;
++			tries++;
++			continue;
++		}
++
++		/* Load rest of compatibility struct */
++		strncpy(tw_dev->tw_compat_info.driver_version, TW_DRIVER_VERSION, strlen(TW_DRIVER_VERSION));
++		tw_dev->tw_compat_info.driver_srl_high = TW_CURRENT_DRIVER_SRL;
++		tw_dev->tw_compat_info.driver_branch_high = TW_CURRENT_DRIVER_BRANCH;
++		tw_dev->tw_compat_info.driver_build_high = TW_CURRENT_DRIVER_BUILD;
++		tw_dev->tw_compat_info.driver_srl_low = TW_BASE_FW_SRL;
++		tw_dev->tw_compat_info.driver_branch_low = TW_BASE_FW_BRANCH;
++		tw_dev->tw_compat_info.driver_build_low = TW_BASE_FW_BUILD;
++		tw_dev->tw_compat_info.fw_on_ctlr_srl = fw_on_ctlr_srl;
++		tw_dev->tw_compat_info.fw_on_ctlr_branch = fw_on_ctlr_branch;
++		tw_dev->tw_compat_info.fw_on_ctlr_build = fw_on_ctlr_build;
++
++		/* If we got here, controller is in a good state */
++		retval = 0;
++		goto out;
++	}
++out:
++	return retval;
++} /* End twl_reset_sequence() */
++
++/* This function will reset a device extension */
++static int twl_reset_device_extension(TW_Device_Extension *tw_dev, int ioctl_reset)
++{
++	int i = 0, retval = 1;
++	unsigned long flags = 0;
++
++	/* Block SCSI requests while we are resetting */
++	if (ioctl_reset)
++		scsi_block_requests(tw_dev->host);
++
++	set_bit(TW_IN_RESET, &tw_dev->flags);
++	TWL_MASK_INTERRUPTS(tw_dev);
++	TWL_CLEAR_DB_INTERRUPT(tw_dev);
++
++	spin_lock_irqsave(tw_dev->host->host_lock, flags);
++
++	/* Abort all requests that are in progress */
++	for (i = 0; i < TW_Q_LENGTH; i++) {
++		if ((tw_dev->state[i] != TW_S_FINISHED) &&
++		    (tw_dev->state[i] != TW_S_INITIAL) &&
++		    (tw_dev->state[i] != TW_S_COMPLETED)) {
++			if (tw_dev->srb[i]) {
++				tw_dev->srb[i]->result = (DID_RESET << 16);
++				tw_dev->srb[i]->scsi_done(tw_dev->srb[i]);
++				twl_unmap_scsi_data(tw_dev, i);
++			}
++		}
++	}
++
++	/* Reset queues and counts */
++	for (i = 0; i < TW_Q_LENGTH; i++) {
++		tw_dev->free_queue[i] = i;
++		tw_dev->state[i] = TW_S_INITIAL;
++	}
++	tw_dev->free_head = TW_Q_START;
++	tw_dev->free_tail = TW_Q_START;
++	tw_dev->posted_request_count = 0;
++
++	spin_unlock_irqrestore(tw_dev->host->host_lock, flags);
++
++	if (twl_reset_sequence(tw_dev, 1))
++		goto out;
++
++	TWL_UNMASK_INTERRUPTS(tw_dev);
++
++	clear_bit(TW_IN_RESET, &tw_dev->flags);
++	tw_dev->chrdev_request_id = TW_IOCTL_CHRDEV_FREE;
++
++	retval = 0;
++out:
++	if (ioctl_reset)
++		scsi_unblock_requests(tw_dev->host);
++	return retval;
++} /* End twl_reset_device_extension() */
++
++/* This funciton returns unit geometry in cylinders/heads/sectors */
++static int twl_scsi_biosparam(struct scsi_device *sdev, struct block_device *bdev, sector_t capacity, int geom[])
++{
++	int heads, sectors;
++	TW_Device_Extension *tw_dev;
++
++	tw_dev = (TW_Device_Extension *)sdev->host->hostdata;
++
++	if (capacity >= 0x200000) {
++		heads = 255;
++		sectors = 63;
++	} else {
++		heads = 64;
++		sectors = 32;
++	}
++
++	geom[0] = heads;
++	geom[1] = sectors;
++	geom[2] = sector_div(capacity, heads * sectors); /* cylinders */
++
++	return 0;
++} /* End twl_scsi_biosparam() */
++
++/* This is the new scsi eh reset function */
++static int twl_scsi_eh_reset(struct scsi_cmnd *SCpnt)
++{
++	TW_Device_Extension *tw_dev = NULL;
++	int retval = FAILED;
++
++	tw_dev = (TW_Device_Extension *)SCpnt->device->host->hostdata;
++
++	tw_dev->num_resets++;
++
++	sdev_printk(KERN_WARNING, SCpnt->device,
++		"WARNING: (0x%02X:0x%04X): Command (0x%x) timed out, resetting card.\n",
++		TW_DRIVER, 0x2c, SCpnt->cmnd[0]);
++
++	/* Make sure we are not issuing an ioctl or resetting from ioctl */
++	mutex_lock(&tw_dev->ioctl_lock);
++
++	/* Now reset the card and some of the device extension data */
++	if (twl_reset_device_extension(tw_dev, 0)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x15, "Controller reset failed during scsi host reset");
++		goto out;
++	}
++
++	retval = SUCCESS;
++out:
++	mutex_unlock(&tw_dev->ioctl_lock);
++	return retval;
++} /* End twl_scsi_eh_reset() */
++
++/* This is the main scsi queue function to handle scsi opcodes */
++static int twl_scsi_queue(struct scsi_cmnd *SCpnt, void (*done)(struct scsi_cmnd *))
++{
++	int request_id, retval;
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)SCpnt->device->host->hostdata;
++
++	/* If we are resetting due to timed out ioctl, report as busy */
++	if (test_bit(TW_IN_RESET, &tw_dev->flags)) {
++		retval = SCSI_MLQUEUE_HOST_BUSY;
++		goto out;
++	}
++
++	/* Save done function into scsi_cmnd struct */
++	SCpnt->scsi_done = done;
++		
++	/* Get a free request id */
++	twl_get_request_id(tw_dev, &request_id);
++
++	/* Save the scsi command for use by the ISR */
++	tw_dev->srb[request_id] = SCpnt;
++
++	/* Initialize phase to zero */
++	SCpnt->SCp.phase = TW_PHASE_INITIAL;
++
++	retval = twl_scsiop_execute_scsi(tw_dev, request_id, NULL, 0, NULL);
++	if (retval) {
++		tw_dev->state[request_id] = TW_S_COMPLETED;
++		twl_free_request_id(tw_dev, request_id);
++		SCpnt->result = (DID_ERROR << 16);
++		done(SCpnt);
++		retval = 0;
++	}
++out:
++	return retval;
++} /* End twl_scsi_queue() */
++
++/* This function tells the controller to shut down */
++static void __twl_shutdown(TW_Device_Extension *tw_dev)
++{
++	/* Disable interrupts */
++	TWL_MASK_INTERRUPTS(tw_dev);
++
++	/* Free up the IRQ */
++	free_irq(tw_dev->tw_pci_dev->irq, tw_dev);
++
++	printk(KERN_WARNING "3w-sas: Shutting down host %d.\n", tw_dev->host->host_no);
++
++	/* Tell the card we are shutting down */
++	if (twl_initconnection(tw_dev, 1, 0, 0, 0, 0, 0, NULL, NULL, NULL, NULL, NULL)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x16, "Connection shutdown failed");
++	} else {
++		printk(KERN_WARNING "3w-sas: Shutdown complete.\n");
++	}
++
++	/* Clear doorbell interrupt just before exit */
++	TWL_CLEAR_DB_INTERRUPT(tw_dev);
++} /* End __twl_shutdown() */
++
++/* Wrapper for __twl_shutdown */
++static void twl_shutdown(struct pci_dev *pdev)
++{
++	struct Scsi_Host *host = pci_get_drvdata(pdev);
++	TW_Device_Extension *tw_dev;
++
++	if (!host)
++		return;
++
++	tw_dev = (TW_Device_Extension *)host->hostdata;
++
++	if (tw_dev->online) 
++		__twl_shutdown(tw_dev);
++} /* End twl_shutdown() */
++
++/* This function configures unit settings when a unit is coming on-line */
++static int twl_slave_configure(struct scsi_device *sdev)
++{
++	/* Force 60 second timeout */
++	blk_queue_rq_timeout(sdev->request_queue, 60 * HZ);
++
++	return 0;
++} /* End twl_slave_configure() */
++
++/* scsi_host_template initializer */
++static struct scsi_host_template driver_template = {
++	.module			= THIS_MODULE,
++	.name			= "3w-sas",
++	.queuecommand		= twl_scsi_queue,
++	.eh_host_reset_handler	= twl_scsi_eh_reset,
++	.bios_param		= twl_scsi_biosparam,
++	.change_queue_depth	= twl_change_queue_depth,
++	.can_queue		= TW_Q_LENGTH-2,
++	.slave_configure	= twl_slave_configure,
++	.this_id		= -1,
++	.sg_tablesize		= TW_LIBERATOR_MAX_SGL_LENGTH,
++	.max_sectors		= TW_MAX_SECTORS,
++	.cmd_per_lun		= TW_MAX_CMDS_PER_LUN,
++	.use_clustering		= ENABLE_CLUSTERING,
++	.shost_attrs		= twl_host_attrs,
++	.emulated		= 1
++};
++
++/* This function will probe and initialize a card */
++static int __devinit twl_probe(struct pci_dev *pdev, const struct pci_device_id *dev_id)
++{
++	struct Scsi_Host *host = NULL;
++	TW_Device_Extension *tw_dev;
++	int retval = -ENODEV;
++	int *ptr_phycount, phycount=0;
++
++	retval = pci_enable_device(pdev);
++	if (retval) {
++		TW_PRINTK(host, TW_DRIVER, 0x17, "Failed to enable pci device");
++		goto out_disable_device;
++	}
++
++	pci_set_master(pdev);
++	pci_try_set_mwi(pdev);
++
++	if (pci_set_dma_mask(pdev, DMA_BIT_MASK(64))
++	    || pci_set_consistent_dma_mask(pdev, DMA_BIT_MASK(64)))
++		if (pci_set_dma_mask(pdev, DMA_BIT_MASK(32))
++		    || pci_set_consistent_dma_mask(pdev, DMA_BIT_MASK(32))) {
++			TW_PRINTK(host, TW_DRIVER, 0x18, "Failed to set dma mask");
++			retval = -ENODEV;
++			goto out_disable_device;
++		}
++
++	host = scsi_host_alloc(&driver_template, sizeof(TW_Device_Extension));
++	if (!host) {
++		TW_PRINTK(host, TW_DRIVER, 0x19, "Failed to allocate memory for device extension");
++		retval = -ENOMEM;
++		goto out_disable_device;
++	}
++	tw_dev = shost_priv(host);
++
++	/* Save values to device extension */
++	tw_dev->host = host;
++	tw_dev->tw_pci_dev = pdev;
++
++	if (twl_initialize_device_extension(tw_dev)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1a, "Failed to initialize device extension");
++		goto out_free_device_extension;
++	}
++
++	/* Request IO regions */
++	retval = pci_request_regions(pdev, "3w-sas");
++	if (retval) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1b, "Failed to get mem region");
++		goto out_free_device_extension;
++	}
++
++	/* Save base address, use region 1 */
++	tw_dev->base_addr = pci_iomap(pdev, 1, 0);
++	if (!tw_dev->base_addr) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1c, "Failed to ioremap");
++		goto out_release_mem_region;
++	}
++
++	/* Disable interrupts on the card */
++	TWL_MASK_INTERRUPTS(tw_dev);
++
++	/* Initialize the card */
++	if (twl_reset_sequence(tw_dev, 0)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1d, "Controller reset failed during probe");
++		goto out_iounmap;
++	}
++
++	/* Set host specific parameters */
++	host->max_id = TW_MAX_UNITS;
++	host->max_cmd_len = TW_MAX_CDB_LEN;
++	host->max_lun = TW_MAX_LUNS;
++	host->max_channel = 0;
++
++	/* Register the card with the kernel SCSI layer */
++	retval = scsi_add_host(host, &pdev->dev);
++	if (retval) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1e, "scsi add host failed");
++		goto out_iounmap;
++	}
++
++	pci_set_drvdata(pdev, host);
++
++	printk(KERN_WARNING "3w-sas: scsi%d: Found an LSI 3ware %s Controller at 0x%llx, IRQ: %d.\n",
++	       host->host_no,
++	       (char *)twl_get_param(tw_dev, 1, TW_VERSION_TABLE,
++				     TW_PARAM_MODEL, TW_PARAM_MODEL_LENGTH),
++	       (u64)pci_resource_start(pdev, 1), pdev->irq);
++
++	ptr_phycount = twl_get_param(tw_dev, 2, TW_PARAM_PHY_SUMMARY_TABLE,
++				     TW_PARAM_PHYCOUNT, TW_PARAM_PHYCOUNT_LENGTH);
++	if (ptr_phycount)
++		phycount = le32_to_cpu(*(int *)ptr_phycount);
++
++	printk(KERN_WARNING "3w-sas: scsi%d: Firmware %s, BIOS %s, Phys: %d.\n",
++	       host->host_no,
++	       (char *)twl_get_param(tw_dev, 1, TW_VERSION_TABLE,
++				     TW_PARAM_FWVER, TW_PARAM_FWVER_LENGTH),
++	       (char *)twl_get_param(tw_dev, 2, TW_VERSION_TABLE,
++				     TW_PARAM_BIOSVER, TW_PARAM_BIOSVER_LENGTH),
++	       phycount);
++
++	/* Try to enable MSI */
++	if (use_msi && !pci_enable_msi(pdev))
++		set_bit(TW_USING_MSI, &tw_dev->flags);
++
++	/* Now setup the interrupt handler */
++	retval = request_irq(pdev->irq, twl_interrupt, IRQF_SHARED, "3w-sas", tw_dev);
++	if (retval) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x1f, "Error requesting IRQ");
++		goto out_remove_host;
++	}
++
++	twl_device_extension_list[twl_device_extension_count] = tw_dev;
++	twl_device_extension_count++;
++
++	/* Re-enable interrupts on the card */
++	TWL_UNMASK_INTERRUPTS(tw_dev);
++	
++	/* Finally, scan the host */
++	scsi_scan_host(host);
++
++	/* Add sysfs binary files */
++	if (sysfs_create_bin_file(&host->shost_dev.kobj, &twl_sysfs_aen_read_attr))
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x20, "Failed to create sysfs binary file: 3ware_aen_read");
++	if (sysfs_create_bin_file(&host->shost_dev.kobj, &twl_sysfs_compat_info_attr))
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x21, "Failed to create sysfs binary file: 3ware_compat_info");
++
++	if (twl_major == -1) {
++		if ((twl_major = register_chrdev (0, "twl", &twl_fops)) < 0)
++			TW_PRINTK(host, TW_DRIVER, 0x22, "Failed to register character device");
++	}
++	tw_dev->online = 1;
++	return 0;
++
++out_remove_host:
++	if (test_bit(TW_USING_MSI, &tw_dev->flags))
++		pci_disable_msi(pdev);
++	scsi_remove_host(host);
++out_iounmap:
++	iounmap(tw_dev->base_addr);
++out_release_mem_region:
++	pci_release_regions(pdev);
++out_free_device_extension:
++	twl_free_device_extension(tw_dev);
++	scsi_host_put(host);
++out_disable_device:
++	pci_disable_device(pdev);
++
++	return retval;
++} /* End twl_probe() */
++
++/* This function is called to remove a device */
++static void twl_remove(struct pci_dev *pdev)
++{
++	struct Scsi_Host *host = pci_get_drvdata(pdev);
++	TW_Device_Extension *tw_dev;
++
++	if (!host)
++		return;
++
++	tw_dev = (TW_Device_Extension *)host->hostdata;
++
++	if (!tw_dev->online)
++		return;
++
++	/* Remove sysfs binary files */
++	sysfs_remove_bin_file(&host->shost_dev.kobj, &twl_sysfs_aen_read_attr);
++	sysfs_remove_bin_file(&host->shost_dev.kobj, &twl_sysfs_compat_info_attr);
++
++	scsi_remove_host(tw_dev->host);
++
++	/* Unregister character device */
++	if (twl_major >= 0) {
++		unregister_chrdev(twl_major, "twl");
++		twl_major = -1;
++	}
++
++	/* Shutdown the card */
++	__twl_shutdown(tw_dev);
++
++	/* Disable MSI if enabled */
++	if (test_bit(TW_USING_MSI, &tw_dev->flags))
++		pci_disable_msi(pdev);
++
++	/* Free IO remapping */
++	iounmap(tw_dev->base_addr);
++
++	/* Free up the mem region */
++	pci_release_regions(pdev);
++
++	/* Free up device extension resources */
++	twl_free_device_extension(tw_dev);
++
++	scsi_host_put(tw_dev->host);
++	pci_disable_device(pdev);
++	twl_device_extension_count--;
++} /* End twl_remove() */
++
++#ifdef CONFIG_PM
++/* This function is called on PCI suspend */
++static int twl_suspend(struct pci_dev *pdev, pm_message_t state)
++{
++	struct Scsi_Host *host = pci_get_drvdata(pdev);
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)host->hostdata;
++
++	printk(KERN_WARNING "3w-sas: Suspending host %d.\n", tw_dev->host->host_no);
++	/* Disable interrupts */
++	TWL_MASK_INTERRUPTS(tw_dev);
++
++	free_irq(tw_dev->tw_pci_dev->irq, tw_dev);
++
++	/* Tell the card we are shutting down */
++	if (twl_initconnection(tw_dev, 1, 0, 0, 0, 0, 0, NULL, NULL, NULL, NULL, NULL)) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x23, "Connection shutdown failed during suspend");
++	} else {
++		printk(KERN_WARNING "3w-sas: Suspend complete.\n");
++	}
++
++	/* Clear doorbell interrupt */
++	TWL_CLEAR_DB_INTERRUPT(tw_dev);
++
++	pci_save_state(pdev);
++	pci_disable_device(pdev);
++	pci_set_power_state(pdev, pci_choose_state(pdev, state));
++
++	return 0;
++} /* End twl_suspend() */
++
++/* This function is called on PCI resume */
++static int twl_resume(struct pci_dev *pdev)
++{
++	int retval = 0;
++	struct Scsi_Host *host = pci_get_drvdata(pdev);
++	TW_Device_Extension *tw_dev = (TW_Device_Extension *)host->hostdata;
++
++	printk(KERN_WARNING "3w-sas: Resuming host %d.\n", tw_dev->host->host_no);
++	pci_set_power_state(pdev, PCI_D0);
++	pci_enable_wake(pdev, PCI_D0, 0);
++	pci_restore_state(pdev);
++
++	retval = pci_enable_device(pdev);
++	if (retval) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x24, "Enable device failed during resume");
++		return retval;
++	}
++
++	pci_set_master(pdev);
++	pci_try_set_mwi(pdev);
++
++	if (pci_set_dma_mask(pdev, DMA_BIT_MASK(64))
++	    || pci_set_consistent_dma_mask(pdev, DMA_BIT_MASK(64)))
++		if (pci_set_dma_mask(pdev, DMA_BIT_MASK(32))
++		    || pci_set_consistent_dma_mask(pdev, DMA_BIT_MASK(32))) {
++			TW_PRINTK(host, TW_DRIVER, 0x25, "Failed to set dma mask during resume");
++			retval = -ENODEV;
++			goto out_disable_device;
++		}
++
++	/* Initialize the card */
++	if (twl_reset_sequence(tw_dev, 0)) {
++		retval = -ENODEV;
++		goto out_disable_device;
++	}
++
++	/* Now setup the interrupt handler */
++	retval = request_irq(pdev->irq, twl_interrupt, IRQF_SHARED, "3w-sas", tw_dev);
++	if (retval) {
++		TW_PRINTK(tw_dev->host, TW_DRIVER, 0x26, "Error requesting IRQ during resume");
++		retval = -ENODEV;
++		goto out_disable_device;
++	}
++
++	/* Now enable MSI if enabled */
++	if (test_bit(TW_USING_MSI, &tw_dev->flags))
++		pci_enable_msi(pdev);
++
++	/* Re-enable interrupts on the card */
++	TWL_UNMASK_INTERRUPTS(tw_dev);
++
++	printk(KERN_WARNING "3w-sas: Resume complete.\n");
++	return 0;
++
++out_disable_device:
++	scsi_remove_host(host);
++	pci_disable_device(pdev);
++
++	return retval;
++} /* End twl_resume() */
++#endif
++
++/* PCI Devices supported by this driver */
++static struct pci_device_id twl_pci_tbl[] __devinitdata = {
++	{ PCI_VDEVICE(3WARE, PCI_DEVICE_ID_3WARE_9750) },
++	{ }
++};
++MODULE_DEVICE_TABLE(pci, twl_pci_tbl);
++
++/* pci_driver initializer */
++static struct pci_driver twl_driver = {
++	.name		= "3w-sas",
++	.id_table	= twl_pci_tbl,
++	.probe		= twl_probe,
++	.remove		= twl_remove,
++#ifdef CONFIG_PM
++	.suspend	= twl_suspend,
++	.resume		= twl_resume,
++#endif
++	.shutdown	= twl_shutdown
++};
++
++/* This function is called on driver initialization */
++static int __init twl_init(void)
++{
++	printk(KERN_INFO "LSI 3ware SAS/SATA-RAID Controller device driver for Linux v%s.\n", TW_DRIVER_VERSION);
++
++	return pci_register_driver(&twl_driver);
++} /* End twl_init() */
++
++/* This function is called on driver exit */
++static void __exit twl_exit(void)
++{
++	pci_unregister_driver(&twl_driver);
++} /* End twl_exit() */
++
++module_init(twl_init);
++module_exit(twl_exit);
++
+diff --git a/drivers/scsi/3w-sas.h b/drivers/scsi/3w-sas.h
+new file mode 100644
+index 0000000..d474892
+--- /dev/null
++++ b/drivers/scsi/3w-sas.h
+@@ -0,0 +1,396 @@
++/*
++   3w-sas.h -- LSI 3ware SAS/SATA-RAID Controller device driver for Linux.
++
++   Written By: Adam Radford <linuxraid at lsi.com>
++
++   Copyright (C) 2009 LSI Corporation.
++
++   This program is free software; you can redistribute it and/or modify
++   it under the terms of the GNU General Public License as published by
++   the Free Software Foundation; version 2 of the License.
++
++   This program is distributed in the hope that it will be useful,
++   but WITHOUT ANY WARRANTY; without even the implied warranty of
++   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++   GNU General Public License for more details.
++
++   NO WARRANTY
++   THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
++   CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT
++   LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT,
++   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is
++   solely responsible for determining the appropriateness of using and
++   distributing the Program and assumes all risks associated with its
++   exercise of rights under this Agreement, including but not limited to
++   the risks and costs of program errors, damage to or loss of data,
++   programs or equipment, and unavailability or interruption of operations.
++
++   DISCLAIMER OF LIABILITY
++   NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY
++   DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
++   DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND
++   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
++   TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
++   USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED
++   HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES
++
++   You should have received a copy of the GNU General Public License
++   along with this program; if not, write to the Free Software
++   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
++
++   Bugs/Comments/Suggestions should be mailed to:
++   linuxraid at lsi.com
++
++   For more information, goto:
++   http://www.lsi.com
++*/
++
++#ifndef _3W_SAS_H
++#define _3W_SAS_H
++
++/* AEN severity table */
++static char *twl_aen_severity_table[] =
++{
++	"None", "ERROR", "WARNING", "INFO", "DEBUG", NULL
++};
++
++/* Liberator register offsets */
++#define TWL_STATUS                         0x0  /* Status */
++#define TWL_HIBDB                          0x20 /* Inbound doorbell */
++#define TWL_HISTAT                         0x30 /* Host interrupt status */
++#define TWL_HIMASK                         0x34 /* Host interrupt mask */
++#define TWL_HOBDB			   0x9C /* Outbound doorbell */
++#define TWL_HOBDBC                         0xA0 /* Outbound doorbell clear */
++#define TWL_SCRPD3                         0xBC /* Scratchpad */
++#define TWL_HIBQPL                         0xC0 /* Host inbound Q low */
++#define TWL_HIBQPH                         0xC4 /* Host inbound Q high */
++#define TWL_HOBQPL                         0xC8 /* Host outbound Q low */
++#define TWL_HOBQPH                         0xCC /* Host outbound Q high */
++#define TWL_HISTATUS_VALID_INTERRUPT	   0xC
++#define TWL_HISTATUS_ATTENTION_INTERRUPT   0x4
++#define TWL_HISTATUS_RESPONSE_INTERRUPT	   0x8
++#define TWL_STATUS_OVERRUN_SUBMIT	   0x2000
++#define TWL_ISSUE_SOFT_RESET		   0x100
++#define TWL_CONTROLLER_READY		   0x2000
++#define TWL_DOORBELL_CONTROLLER_ERROR	   0x200000
++#define TWL_DOORBELL_ATTENTION_INTERRUPT   0x40000
++#define TWL_PULL_MODE			   0x1
++
++/* Command packet opcodes used by the driver */
++#define TW_OP_INIT_CONNECTION 0x1
++#define TW_OP_GET_PARAM	      0x12
++#define TW_OP_SET_PARAM	      0x13
++#define TW_OP_EXECUTE_SCSI    0x10
++
++/* Asynchronous Event Notification (AEN) codes used by the driver */
++#define TW_AEN_QUEUE_EMPTY       0x0000
++#define TW_AEN_SOFT_RESET        0x0001
++#define TW_AEN_SYNC_TIME_WITH_HOST 0x031
++#define TW_AEN_SEVERITY_ERROR    0x1
++#define TW_AEN_SEVERITY_DEBUG    0x4
++#define TW_AEN_NOT_RETRIEVED 0x1
++
++/* Command state defines */
++#define TW_S_INITIAL   0x1  /* Initial state */
++#define TW_S_STARTED   0x2  /* Id in use */
++#define TW_S_POSTED    0x4  /* Posted to the controller */
++#define TW_S_COMPLETED 0x8  /* Completed by isr */
++#define TW_S_FINISHED  0x10 /* I/O completely done */
++
++/* Compatibility defines */
++#define TW_9750_ARCH_ID 10
++#define TW_CURRENT_DRIVER_SRL 40
++#define TW_CURRENT_DRIVER_BUILD 0
++#define TW_CURRENT_DRIVER_BRANCH 0
++
++/* Phase defines */
++#define TW_PHASE_INITIAL 0
++#define TW_PHASE_SGLIST  2
++
++/* Misc defines */
++#define TW_SECTOR_SIZE                        512
++#define TW_MAX_UNITS			      32
++#define TW_INIT_MESSAGE_CREDITS		      0x100
++#define TW_INIT_COMMAND_PACKET_SIZE	      0x3
++#define TW_INIT_COMMAND_PACKET_SIZE_EXTENDED  0x6
++#define TW_EXTENDED_INIT_CONNECT	      0x2
++#define TW_BASE_FW_SRL			      24
++#define TW_BASE_FW_BRANCH		      0
++#define TW_BASE_FW_BUILD		      1
++#define TW_Q_LENGTH			      256
++#define TW_Q_START			      0
++#define TW_MAX_SLOT			      32
++#define TW_MAX_RESET_TRIES		      2
++#define TW_MAX_CMDS_PER_LUN		      254
++#define TW_MAX_AEN_DRAIN		      255
++#define TW_IN_RESET                           2
++#define TW_USING_MSI			      3
++#define TW_IN_ATTENTION_LOOP		      4
++#define TW_MAX_SECTORS                        256
++#define TW_MAX_CDB_LEN                        16
++#define TW_IOCTL_CHRDEV_TIMEOUT               60 /* 60 seconds */
++#define TW_IOCTL_CHRDEV_FREE                  -1
++#define TW_COMMAND_OFFSET                     128 /* 128 bytes */
++#define TW_VERSION_TABLE                      0x0402
++#define TW_TIMEKEEP_TABLE		      0x040A
++#define TW_INFORMATION_TABLE		      0x0403
++#define TW_PARAM_FWVER			      3
++#define TW_PARAM_FWVER_LENGTH		      16
++#define TW_PARAM_BIOSVER		      4
++#define TW_PARAM_BIOSVER_LENGTH		      16
++#define TW_PARAM_MODEL			      8
++#define TW_PARAM_MODEL_LENGTH		      16
++#define TW_PARAM_PHY_SUMMARY_TABLE	      1
++#define TW_PARAM_PHYCOUNT		      2
++#define TW_PARAM_PHYCOUNT_LENGTH	      1
++#define TW_IOCTL_FIRMWARE_PASS_THROUGH        0x108  // Used by smartmontools
++#define TW_ALLOCATION_LENGTH		      128
++#define TW_SENSE_DATA_LENGTH		      18
++#define TW_ERROR_LOGICAL_UNIT_NOT_SUPPORTED   0x10a
++#define TW_ERROR_INVALID_FIELD_IN_CDB	      0x10d
++#define TW_ERROR_UNIT_OFFLINE                 0x128
++#define TW_MESSAGE_SOURCE_CONTROLLER_ERROR    3
++#define TW_MESSAGE_SOURCE_CONTROLLER_EVENT    4
++#define TW_DRIVER 			      6
++#ifndef PCI_DEVICE_ID_3WARE_9750
++#define PCI_DEVICE_ID_3WARE_9750 0x1010
++#endif
++
++/* Bitmask macros to eliminate bitfields */
++
++/* opcode: 5, reserved: 3 */
++#define TW_OPRES_IN(x,y) ((x << 5) | (y & 0x1f))
++#define TW_OP_OUT(x) (x & 0x1f)
++
++/* opcode: 5, sgloffset: 3 */
++#define TW_OPSGL_IN(x,y) ((x << 5) | (y & 0x1f))
++#define TW_SGL_OUT(x) ((x >> 5) & 0x7)
++
++/* severity: 3, reserved: 5 */
++#define TW_SEV_OUT(x) (x & 0x7)
++
++/* not_mfa: 1, reserved: 7, status: 8, request_id: 16 */
++#define TW_RESID_OUT(x) ((x >> 16) & 0xffff)
++#define TW_NOTMFA_OUT(x) (x & 0x1)
++
++/* request_id: 12, lun: 4 */
++#define TW_REQ_LUN_IN(lun, request_id) (((lun << 12) & 0xf000) | (request_id & 0xfff))
++#define TW_LUN_OUT(lun) ((lun >> 12) & 0xf)
++
++/* Register access macros */
++#define TWL_STATUS_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_STATUS)
++#define TWL_HOBQPL_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HOBQPL)
++#define TWL_HOBQPH_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HOBQPH)
++#define TWL_HOBDB_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HOBDB)
++#define TWL_HOBDBC_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HOBDBC)
++#define TWL_HIMASK_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HIMASK)
++#define TWL_HISTAT_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HISTAT)
++#define TWL_HIBQPH_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HIBQPH)
++#define TWL_HIBQPL_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HIBQPL)
++#define TWL_HIBDB_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_HIBDB)
++#define TWL_SCRPD3_REG_ADDR(x) ((unsigned char __iomem *)x->base_addr + TWL_SCRPD3)
++#define TWL_MASK_INTERRUPTS(x) (writel(~0, TWL_HIMASK_REG_ADDR(tw_dev)))
++#define TWL_UNMASK_INTERRUPTS(x) (writel(~TWL_HISTATUS_VALID_INTERRUPT, TWL_HIMASK_REG_ADDR(tw_dev)))
++#define TWL_CLEAR_DB_INTERRUPT(x) (writel(~0, TWL_HOBDBC_REG_ADDR(tw_dev)))
++#define TWL_SOFT_RESET(x) (writel(TWL_ISSUE_SOFT_RESET, TWL_HIBDB_REG_ADDR(tw_dev)))
++
++/* Macros */
++#define TW_PRINTK(h,a,b,c) { \
++if (h) \
++printk(KERN_WARNING "3w-sas: scsi%d: ERROR: (0x%02X:0x%04X): %s.\n",h->host_no,a,b,c); \
++else \
++printk(KERN_WARNING "3w-sas: ERROR: (0x%02X:0x%04X): %s.\n",a,b,c); \
++}
++#define TW_MAX_LUNS 16
++#define TW_COMMAND_SIZE (sizeof(dma_addr_t) > 4 ? 6 : 4)
++#define TW_LIBERATOR_MAX_SGL_LENGTH (sizeof(dma_addr_t) > 4 ? 46 : 92)
++#define TW_LIBERATOR_MAX_SGL_LENGTH_OLD (sizeof(dma_addr_t) > 4 ? 47 : 94)
++#define TW_PADDING_LENGTH_LIBERATOR 136
++#define TW_PADDING_LENGTH_LIBERATOR_OLD 132
++#define TW_CPU_TO_SGL(x) (sizeof(dma_addr_t) > 4 ? cpu_to_le64(x) : cpu_to_le32(x))
++
++#pragma pack(1)
++
++/* SGL entry */
++typedef struct TAG_TW_SG_Entry_ISO {
++	dma_addr_t address;
++	dma_addr_t length;
++} TW_SG_Entry_ISO;
++
++/* Old Command Packet with ISO SGL */
++typedef struct TW_Command {
++	unsigned char opcode__sgloffset;
++	unsigned char size;
++	unsigned char request_id;
++	unsigned char unit__hostid;
++	/* Second DWORD */
++	unsigned char status;
++	unsigned char flags;
++	union {
++		unsigned short block_count;
++		unsigned short parameter_count;
++	} byte6_offset;
++	union {
++		struct {
++			u32 lba;
++			TW_SG_Entry_ISO sgl[TW_LIBERATOR_MAX_SGL_LENGTH_OLD];
++			unsigned char padding[TW_PADDING_LENGTH_LIBERATOR_OLD];
++		} io;
++		struct {
++			TW_SG_Entry_ISO sgl[TW_LIBERATOR_MAX_SGL_LENGTH_OLD];
++			u32 padding;
++			unsigned char padding2[TW_PADDING_LENGTH_LIBERATOR_OLD];
++		} param;
++	} byte8_offset;
++} TW_Command;
++
++/* New Command Packet with ISO SGL */
++typedef struct TAG_TW_Command_Apache {
++	unsigned char opcode__reserved;
++	unsigned char unit;
++	unsigned short request_id__lunl;
++	unsigned char status;
++	unsigned char sgl_offset;
++	unsigned short sgl_entries__lunh;
++	unsigned char cdb[16];
++	TW_SG_Entry_ISO sg_list[TW_LIBERATOR_MAX_SGL_LENGTH];
++	unsigned char padding[TW_PADDING_LENGTH_LIBERATOR];
++} TW_Command_Apache;
++
++/* New command packet header */
++typedef struct TAG_TW_Command_Apache_Header {
++	unsigned char sense_data[TW_SENSE_DATA_LENGTH];
++	struct {
++		char reserved[4];
++		unsigned short error;
++		unsigned char padding;
++		unsigned char severity__reserved;
++	} status_block;
++	unsigned char err_specific_desc[98];
++	struct {
++		unsigned char size_header;
++		unsigned short request_id;
++		unsigned char size_sense;
++	} header_desc;
++} TW_Command_Apache_Header;
++
++/* This struct is a union of the 2 command packets */
++typedef struct TAG_TW_Command_Full {
++	TW_Command_Apache_Header header;
++	union {
++		TW_Command oldcommand;
++		TW_Command_Apache newcommand;
++	} command;
++} TW_Command_Full;
++
++/* Initconnection structure */
++typedef struct TAG_TW_Initconnect {
++	unsigned char opcode__reserved;
++	unsigned char size;
++	unsigned char request_id;
++	unsigned char res2;
++	unsigned char status;
++	unsigned char flags;
++	unsigned short message_credits;
++	u32 features;
++	unsigned short fw_srl;
++	unsigned short fw_arch_id;
++	unsigned short fw_branch;
++	unsigned short fw_build;
++	u32 result;
++} TW_Initconnect;
++
++/* Event info structure */
++typedef struct TAG_TW_Event
++{
++	unsigned int sequence_id;
++	unsigned int time_stamp_sec;
++	unsigned short aen_code;
++	unsigned char severity;
++	unsigned char retrieved;
++	unsigned char repeat_count;
++	unsigned char parameter_len;
++	unsigned char parameter_data[98];
++} TW_Event;
++
++typedef struct TAG_TW_Ioctl_Driver_Command {
++	unsigned int control_code;
++	unsigned int status;
++	unsigned int unique_id;
++	unsigned int sequence_id;
++	unsigned int os_specific;
++	unsigned int buffer_length;
++} TW_Ioctl_Driver_Command;
++
++typedef struct TAG_TW_Ioctl_Apache {
++	TW_Ioctl_Driver_Command driver_command;
++        char padding[488];
++	TW_Command_Full firmware_command;
++	char data_buffer[1];
++} TW_Ioctl_Buf_Apache;
++
++/* GetParam descriptor */
++typedef struct {
++	unsigned short	table_id;
++	unsigned short	parameter_id;
++	unsigned short	parameter_size_bytes;
++	unsigned short  actual_parameter_size_bytes;
++	unsigned char	data[1];
++} TW_Param_Apache;
++
++/* Compatibility information structure */
++typedef struct TAG_TW_Compatibility_Info
++{
++	char driver_version[32];
++	unsigned short working_srl;
++	unsigned short working_branch;
++	unsigned short working_build;
++	unsigned short driver_srl_high;
++	unsigned short driver_branch_high;
++	unsigned short driver_build_high;
++	unsigned short driver_srl_low;
++	unsigned short driver_branch_low;
++	unsigned short driver_build_low;
++	unsigned short fw_on_ctlr_srl;
++	unsigned short fw_on_ctlr_branch;
++	unsigned short fw_on_ctlr_build;
++} TW_Compatibility_Info;
++
++#pragma pack()
++
++typedef struct TAG_TW_Device_Extension {
++	void                     __iomem *base_addr;
++	unsigned long	       	*generic_buffer_virt[TW_Q_LENGTH];
++	dma_addr_t	       	generic_buffer_phys[TW_Q_LENGTH];
++	TW_Command_Full	       	*command_packet_virt[TW_Q_LENGTH];
++	dma_addr_t		command_packet_phys[TW_Q_LENGTH];
++	TW_Command_Apache_Header *sense_buffer_virt[TW_Q_LENGTH];
++	dma_addr_t		sense_buffer_phys[TW_Q_LENGTH];
++	struct pci_dev		*tw_pci_dev;
++	struct scsi_cmnd	*srb[TW_Q_LENGTH];
++	unsigned char		free_queue[TW_Q_LENGTH];
++	unsigned char		free_head;
++	unsigned char		free_tail;
++	int     		state[TW_Q_LENGTH];
++	unsigned int		posted_request_count;
++	unsigned int		max_posted_request_count;
++	unsigned int		max_sgl_entries;
++	unsigned int		sgl_entries;
++	unsigned int		num_resets;
++	unsigned int		sector_count;
++	unsigned int		max_sector_count;
++	unsigned int		aen_count;
++	struct Scsi_Host	*host;
++	long			flags;
++	TW_Event                *event_queue[TW_Q_LENGTH];
++	unsigned char           error_index;
++	unsigned int            error_sequence_id;
++	int			chrdev_request_id;
++	wait_queue_head_t	ioctl_wqueue;
++	struct mutex		ioctl_lock;
++	TW_Compatibility_Info	tw_compat_info;
++	char			online;
++} TW_Device_Extension;
++
++#endif /* _3W_SAS_H */
++
+diff --git a/drivers/scsi/Kconfig b/drivers/scsi/Kconfig
+index 3fd99c8..991fa1f 100644
+--- a/drivers/scsi/Kconfig
++++ b/drivers/scsi/Kconfig
+@@ -399,6 +399,17 @@ config SCSI_3W_9XXX
+ 	  Please read the comments at the top of
+ 	  <file:drivers/scsi/3w-9xxx.c>.
+ 
++config SCSI_3W_SAS
++	tristate "3ware 97xx SAS/SATA-RAID support"
++	depends on PCI && SCSI
++	help
++	  This driver supports the LSI 3ware 9750 6Gb/s SAS/SATA-RAID cards.
++
++	  <http://www.lsi.com>
++
++	  Please read the comments at the top of
++	  <file:drivers/scsi/3w-sas.c>.
++
+ config SCSI_7000FASST
+ 	tristate "7000FASST SCSI support"
+ 	depends on ISA && SCSI && ISA_DMA_API
+diff --git a/drivers/scsi/Makefile b/drivers/scsi/Makefile
+index 3ad61db..4f0cca9 100644
+--- a/drivers/scsi/Makefile
++++ b/drivers/scsi/Makefile
+@@ -113,6 +113,7 @@ obj-$(CONFIG_SCSI_MESH)		+= mesh.o
+ obj-$(CONFIG_SCSI_MAC53C94)	+= mac53c94.o
+ obj-$(CONFIG_BLK_DEV_3W_XXXX_RAID) += 3w-xxxx.o
+ obj-$(CONFIG_SCSI_3W_9XXX)	+= 3w-9xxx.o
++obj-$(CONFIG_SCSI_3W_SAS)	+= 3w-sas.o
+ obj-$(CONFIG_SCSI_PPA)		+= ppa.o
+ obj-$(CONFIG_SCSI_IMM)		+= imm.o
+ obj-$(CONFIG_JAZZ_ESP)		+= esp_scsi.o	jazz_esp.o
+-- 
+1.6.6
+

Modified: dists/trunk/linux-2.6/debian/patches/series/6
==============================================================================
--- dists/trunk/linux-2.6/debian/patches/series/6	Tue Jan 26 03:17:07 2010	(r15001)
+++ dists/trunk/linux-2.6/debian/patches/series/6	Tue Jan 26 13:01:12 2010	(r15002)
@@ -32,3 +32,4 @@
 + bugfix/all/stable/2.6.32.6.patch
 + bugfix/all/clockevents-Dont-remove-broadcast-device.patch
 + bugfix/all/clockevents-Add-missing-include.patch
++ features/all/SCSI-3w-sas-Add-new-driver-for-LSI-3ware-9750.patch



More information about the Kernel-svn-changes mailing list