]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressPassthru.c
MdeModulePkg NvmExpressDxe: Add check on the attributes of NVME controller
[mirror_edk2.git] / MdeModulePkg / Bus / Pci / NvmExpressDxe / NvmExpressPassthru.c
CommitLineData
eb290d02
FT
1/** @file\r
2 NvmExpressDxe driver is used to manage non-volatile memory subsystem which follows\r
3 NVM Express specification.\r
4\r
35f910f0 5 (C) Copyright 2014 Hewlett-Packard Development Company, L.P.<BR>\r
946f48eb 6 Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.<BR>\r
eb290d02
FT
7 This program and the accompanying materials\r
8 are licensed and made available under the terms and conditions of the BSD License\r
9 which accompanies this distribution. The full text of the license may be found at\r
10 http://opensource.org/licenses/bsd-license.php.\r
11\r
12 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
13 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14\r
15**/\r
16\r
17#include "NvmExpress.h"\r
18\r
eb290d02
FT
19/**\r
20 Dump the execution status from a given completion queue entry.\r
21\r
22 @param[in] Cq A pointer to the NVME_CQ item.\r
23\r
24**/\r
25VOID\r
26NvmeDumpStatus (\r
27 IN NVME_CQ *Cq\r
28 )\r
29{\r
30 DEBUG ((EFI_D_VERBOSE, "Dump NVMe Completion Entry Status from [0x%x]:\n", Cq));\r
31\r
32 DEBUG ((EFI_D_VERBOSE, " SQ Identifier : [0x%x], Phase Tag : [%d], Cmd Identifier : [0x%x]\n", Cq->Sqid, Cq->Pt, Cq->Cid));\r
33\r
34 DEBUG ((EFI_D_VERBOSE, " NVMe Cmd Execution Result - "));\r
35\r
36 switch (Cq->Sct) {\r
37 case 0x0:\r
38 switch (Cq->Sc) {\r
39 case 0x0:\r
40 DEBUG ((EFI_D_VERBOSE, "Successful Completion\n"));\r
41 break;\r
42 case 0x1:\r
43 DEBUG ((EFI_D_VERBOSE, "Invalid Command Opcode\n"));\r
44 break;\r
45 case 0x2:\r
46 DEBUG ((EFI_D_VERBOSE, "Invalid Field in Command\n"));\r
47 break;\r
48 case 0x3:\r
49 DEBUG ((EFI_D_VERBOSE, "Command ID Conflict\n"));\r
50 break;\r
51 case 0x4:\r
52 DEBUG ((EFI_D_VERBOSE, "Data Transfer Error\n"));\r
53 break;\r
54 case 0x5:\r
55 DEBUG ((EFI_D_VERBOSE, "Commands Aborted due to Power Loss Notification\n"));\r
56 break;\r
57 case 0x6:\r
58 DEBUG ((EFI_D_VERBOSE, "Internal Device Error\n"));\r
59 break;\r
60 case 0x7:\r
61 DEBUG ((EFI_D_VERBOSE, "Command Abort Requested\n"));\r
62 break;\r
63 case 0x8:\r
64 DEBUG ((EFI_D_VERBOSE, "Command Aborted due to SQ Deletion\n"));\r
65 break;\r
66 case 0x9:\r
67 DEBUG ((EFI_D_VERBOSE, "Command Aborted due to Failed Fused Command\n"));\r
68 break;\r
69 case 0xA:\r
70 DEBUG ((EFI_D_VERBOSE, "Command Aborted due to Missing Fused Command\n"));\r
71 break;\r
72 case 0xB:\r
73 DEBUG ((EFI_D_VERBOSE, "Invalid Namespace or Format\n"));\r
74 break;\r
75 case 0xC:\r
76 DEBUG ((EFI_D_VERBOSE, "Command Sequence Error\n"));\r
77 break;\r
78 case 0xD:\r
79 DEBUG ((EFI_D_VERBOSE, "Invalid SGL Last Segment Descriptor\n"));\r
80 break;\r
81 case 0xE:\r
82 DEBUG ((EFI_D_VERBOSE, "Invalid Number of SGL Descriptors\n"));\r
83 break;\r
84 case 0xF:\r
85 DEBUG ((EFI_D_VERBOSE, "Data SGL Length Invalid\n"));\r
86 break;\r
87 case 0x10:\r
88 DEBUG ((EFI_D_VERBOSE, "Metadata SGL Length Invalid\n"));\r
89 break;\r
90 case 0x11:\r
91 DEBUG ((EFI_D_VERBOSE, "SGL Descriptor Type Invalid\n"));\r
92 break;\r
93 case 0x80:\r
94 DEBUG ((EFI_D_VERBOSE, "LBA Out of Range\n"));\r
95 break;\r
96 case 0x81:\r
97 DEBUG ((EFI_D_VERBOSE, "Capacity Exceeded\n"));\r
98 break;\r
99 case 0x82:\r
100 DEBUG ((EFI_D_VERBOSE, "Namespace Not Ready\n"));\r
101 break;\r
102 case 0x83:\r
103 DEBUG ((EFI_D_VERBOSE, "Reservation Conflict\n"));\r
104 break;\r
105 }\r
106 break;\r
107\r
108 case 0x1:\r
109 switch (Cq->Sc) {\r
110 case 0x0:\r
111 DEBUG ((EFI_D_VERBOSE, "Completion Queue Invalid\n"));\r
112 break;\r
113 case 0x1:\r
114 DEBUG ((EFI_D_VERBOSE, "Invalid Queue Identifier\n"));\r
115 break;\r
116 case 0x2:\r
117 DEBUG ((EFI_D_VERBOSE, "Maximum Queue Size Exceeded\n"));\r
118 break;\r
119 case 0x3:\r
120 DEBUG ((EFI_D_VERBOSE, "Abort Command Limit Exceeded\n"));\r
121 break;\r
122 case 0x5:\r
123 DEBUG ((EFI_D_VERBOSE, "Asynchronous Event Request Limit Exceeded\n"));\r
124 break;\r
125 case 0x6:\r
126 DEBUG ((EFI_D_VERBOSE, "Invalid Firmware Slot\n"));\r
127 break;\r
128 case 0x7:\r
129 DEBUG ((EFI_D_VERBOSE, "Invalid Firmware Image\n"));\r
130 break;\r
131 case 0x8:\r
132 DEBUG ((EFI_D_VERBOSE, "Invalid Interrupt Vector\n"));\r
133 break;\r
134 case 0x9:\r
135 DEBUG ((EFI_D_VERBOSE, "Invalid Log Page\n"));\r
136 break;\r
137 case 0xA:\r
138 DEBUG ((EFI_D_VERBOSE, "Invalid Format\n"));\r
139 break;\r
140 case 0xB:\r
141 DEBUG ((EFI_D_VERBOSE, "Firmware Application Requires Conventional Reset\n"));\r
142 break;\r
143 case 0xC:\r
144 DEBUG ((EFI_D_VERBOSE, "Invalid Queue Deletion\n"));\r
145 break;\r
146 case 0xD:\r
147 DEBUG ((EFI_D_VERBOSE, "Feature Identifier Not Saveable\n"));\r
148 break;\r
149 case 0xE:\r
150 DEBUG ((EFI_D_VERBOSE, "Feature Not Changeable\n"));\r
151 break;\r
152 case 0xF:\r
153 DEBUG ((EFI_D_VERBOSE, "Feature Not Namespace Specific\n"));\r
154 break;\r
155 case 0x10:\r
156 DEBUG ((EFI_D_VERBOSE, "Firmware Application Requires NVM Subsystem Reset\n"));\r
157 break;\r
158 case 0x80:\r
159 DEBUG ((EFI_D_VERBOSE, "Conflicting Attributes\n"));\r
160 break;\r
161 case 0x81:\r
162 DEBUG ((EFI_D_VERBOSE, "Invalid Protection Information\n"));\r
163 break;\r
164 case 0x82:\r
165 DEBUG ((EFI_D_VERBOSE, "Attempted Write to Read Only Range\n"));\r
166 break;\r
167 }\r
168 break;\r
169\r
170 case 0x2:\r
171 switch (Cq->Sc) {\r
172 case 0x80:\r
173 DEBUG ((EFI_D_VERBOSE, "Write Fault\n"));\r
174 break;\r
175 case 0x81:\r
176 DEBUG ((EFI_D_VERBOSE, "Unrecovered Read Error\n"));\r
177 break;\r
178 case 0x82:\r
179 DEBUG ((EFI_D_VERBOSE, "End-to-end Guard Check Error\n"));\r
180 break;\r
181 case 0x83:\r
182 DEBUG ((EFI_D_VERBOSE, "End-to-end Application Tag Check Error\n"));\r
183 break;\r
184 case 0x84:\r
185 DEBUG ((EFI_D_VERBOSE, "End-to-end Reference Tag Check Error\n"));\r
186 break;\r
187 case 0x85:\r
188 DEBUG ((EFI_D_VERBOSE, "Compare Failure\n"));\r
189 break;\r
190 case 0x86:\r
191 DEBUG ((EFI_D_VERBOSE, "Access Denied\n"));\r
192 break;\r
193 }\r
194 break;\r
195\r
196 default:\r
197 break;\r
198 }\r
199}\r
200\r
201/**\r
202 Create PRP lists for data transfer which is larger than 2 memory pages.\r
203 Note here we calcuate the number of required PRP lists and allocate them at one time.\r
204\r
205 @param[in] PciIo A pointer to the EFI_PCI_IO_PROTOCOL instance.\r
206 @param[in] PhysicalAddr The physical base address of data buffer.\r
207 @param[in] Pages The number of pages to be transfered.\r
208 @param[out] PrpListHost The host base address of PRP lists.\r
209 @param[in,out] PrpListNo The number of PRP List.\r
210 @param[out] Mapping The mapping value returned from PciIo.Map().\r
211\r
212 @retval The pointer to the first PRP List of the PRP lists.\r
213\r
214**/\r
215VOID*\r
216NvmeCreatePrpList (\r
217 IN EFI_PCI_IO_PROTOCOL *PciIo,\r
218 IN EFI_PHYSICAL_ADDRESS PhysicalAddr,\r
219 IN UINTN Pages,\r
220 OUT VOID **PrpListHost,\r
221 IN OUT UINTN *PrpListNo,\r
222 OUT VOID **Mapping\r
223 )\r
224{\r
225 UINTN PrpEntryNo;\r
226 UINT64 PrpListBase;\r
227 UINTN PrpListIndex;\r
228 UINTN PrpEntryIndex;\r
229 UINT64 Remainder;\r
230 EFI_PHYSICAL_ADDRESS PrpListPhyAddr;\r
231 UINTN Bytes;\r
232 EFI_STATUS Status;\r
233\r
234 //\r
235 // The number of Prp Entry in a memory page.\r
236 //\r
237 PrpEntryNo = EFI_PAGE_SIZE / sizeof (UINT64);\r
238\r
239 //\r
240 // Calculate total PrpList number.\r
241 //\r
769402ef
FT
242 *PrpListNo = (UINTN)DivU64x64Remainder ((UINT64)Pages, (UINT64)PrpEntryNo - 1, &Remainder);\r
243 if (*PrpListNo == 0) {\r
244 *PrpListNo = 1;\r
a9ec6d65 245 } else if ((Remainder != 0) && (Remainder != 1)) {\r
eb290d02 246 *PrpListNo += 1;\r
769402ef
FT
247 } else if (Remainder == 1) {\r
248 Remainder = PrpEntryNo;\r
249 } else if (Remainder == 0) {\r
250 Remainder = PrpEntryNo - 1;\r
eb290d02
FT
251 }\r
252\r
253 Status = PciIo->AllocateBuffer (\r
254 PciIo,\r
255 AllocateAnyPages,\r
256 EfiBootServicesData,\r
257 *PrpListNo,\r
258 PrpListHost,\r
259 0\r
260 );\r
261\r
262 if (EFI_ERROR (Status)) {\r
263 return NULL;\r
264 }\r
265\r
266 Bytes = EFI_PAGES_TO_SIZE (*PrpListNo);\r
267 Status = PciIo->Map (\r
268 PciIo,\r
269 EfiPciIoOperationBusMasterCommonBuffer,\r
270 *PrpListHost,\r
271 &Bytes,\r
272 &PrpListPhyAddr,\r
273 Mapping\r
274 );\r
275\r
276 if (EFI_ERROR (Status) || (Bytes != EFI_PAGES_TO_SIZE (*PrpListNo))) {\r
277 DEBUG ((EFI_D_ERROR, "NvmeCreatePrpList: create PrpList failure!\n"));\r
278 goto EXIT;\r
279 }\r
280 //\r
281 // Fill all PRP lists except of last one.\r
282 //\r
283 ZeroMem (*PrpListHost, Bytes);\r
284 for (PrpListIndex = 0; PrpListIndex < *PrpListNo - 1; ++PrpListIndex) {\r
769402ef 285 PrpListBase = *(UINT64*)PrpListHost + PrpListIndex * EFI_PAGE_SIZE;\r
eb290d02
FT
286\r
287 for (PrpEntryIndex = 0; PrpEntryIndex < PrpEntryNo; ++PrpEntryIndex) {\r
288 if (PrpEntryIndex != PrpEntryNo - 1) {\r
289 //\r
290 // Fill all PRP entries except of last one.\r
291 //\r
292 *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PhysicalAddr;\r
293 PhysicalAddr += EFI_PAGE_SIZE;\r
294 } else {\r
295 //\r
296 // Fill last PRP entries with next PRP List pointer.\r
297 //\r
298 *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PrpListPhyAddr + (PrpListIndex + 1) * EFI_PAGE_SIZE;\r
299 }\r
300 }\r
301 }\r
302 //\r
303 // Fill last PRP list.\r
304 //\r
305 PrpListBase = *(UINT64*)PrpListHost + PrpListIndex * EFI_PAGE_SIZE;\r
769402ef 306 for (PrpEntryIndex = 0; PrpEntryIndex < Remainder; ++PrpEntryIndex) {\r
eb290d02
FT
307 *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PhysicalAddr;\r
308 PhysicalAddr += EFI_PAGE_SIZE;\r
309 }\r
310\r
311 return (VOID*)(UINTN)PrpListPhyAddr;\r
312\r
313EXIT:\r
314 PciIo->FreeBuffer (PciIo, *PrpListNo, *PrpListHost);\r
315 return NULL;\r
316}\r
317\r
318\r
319/**\r
320 Sends an NVM Express Command Packet to an NVM Express controller or namespace. This function supports\r
d6c55989 321 both blocking I/O and non-blocking I/O. The blocking I/O functionality is required, and the non-blocking\r
eb290d02
FT
322 I/O functionality is optional.\r
323\r
d6c55989
FT
324\r
325 @param[in] This A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.\r
326 @param[in] NamespaceId A 32 bit namespace ID as defined in the NVMe specification to which the NVM Express Command\r
327 Packet will be sent. A value of 0 denotes the NVM Express controller, a value of all 0xFF's\r
328 (all bytes are 0xFF) in the namespace ID specifies that the command packet should be sent to\r
329 all valid namespaces.\r
330 @param[in,out] Packet A pointer to the NVM Express Command Packet.\r
331 @param[in] Event If non-blocking I/O is not supported then Event is ignored, and blocking I/O is performed.\r
332 If Event is NULL, then blocking I/O is performed. If Event is not NULL and non-blocking I/O\r
333 is supported, then non-blocking I/O is performed, and Event will be signaled when the NVM\r
eb290d02
FT
334 Express Command Packet completes.\r
335\r
336 @retval EFI_SUCCESS The NVM Express Command Packet was sent by the host. TransferLength bytes were transferred\r
337 to, or from DataBuffer.\r
338 @retval EFI_BAD_BUFFER_SIZE The NVM Express Command Packet was not executed. The number of bytes that could be transferred\r
339 is returned in TransferLength.\r
340 @retval EFI_NOT_READY The NVM Express Command Packet could not be sent because the controller is not ready. The caller\r
341 may retry again later.\r
342 @retval EFI_DEVICE_ERROR A device error occurred while attempting to send the NVM Express Command Packet.\r
d6c55989 343 @retval EFI_INVALID_PARAMETER NamespaceId or the contents of EFI_NVM_EXPRESS_PASS_THRU_COMMAND_PACKET are invalid. The NVM\r
eb290d02 344 Express Command Packet was not sent, so no additional status information is available.\r
d6c55989
FT
345 @retval EFI_UNSUPPORTED The command described by the NVM Express Command Packet is not supported by the NVM Express\r
346 controller. The NVM Express Command Packet was not sent so no additional status information\r
347 is available.\r
eb290d02
FT
348 @retval EFI_TIMEOUT A timeout occurred while waiting for the NVM Express Command Packet to execute.\r
349\r
350**/\r
351EFI_STATUS\r
352EFIAPI\r
353NvmExpressPassThru (\r
d6c55989 354 IN EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL *This,\r
eb290d02 355 IN UINT32 NamespaceId,\r
d6c55989 356 IN OUT EFI_NVM_EXPRESS_PASS_THRU_COMMAND_PACKET *Packet,\r
eb290d02
FT
357 IN EFI_EVENT Event OPTIONAL\r
358 )\r
359{\r
3c52deaf
HW
360 NVME_CONTROLLER_PRIVATE_DATA *Private;\r
361 EFI_STATUS Status;\r
362 EFI_PCI_IO_PROTOCOL *PciIo;\r
363 NVME_SQ *Sq;\r
364 NVME_CQ *Cq;\r
365 UINT16 QueueId;\r
366 UINT32 Bytes;\r
367 UINT16 Offset;\r
368 EFI_EVENT TimerEvent;\r
369 EFI_PCI_IO_PROTOCOL_OPERATION Flag;\r
370 EFI_PHYSICAL_ADDRESS PhyAddr;\r
371 VOID *MapData;\r
372 VOID *MapMeta;\r
373 VOID *MapPrpList;\r
374 UINTN MapLength;\r
375 UINT64 *Prp;\r
376 VOID *PrpListHost;\r
377 UINTN PrpListNo;\r
491f6026 378 UINT32 Attributes;\r
3c52deaf
HW
379 UINT32 IoAlign;\r
380 UINT32 Data;\r
381 NVME_PASS_THRU_ASYNC_REQ *AsyncRequest;\r
382 EFI_TPL OldTpl;\r
eb290d02
FT
383\r
384 //\r
385 // check the data fields in Packet parameter.\r
386 //\r
387 if ((This == NULL) || (Packet == NULL)) {\r
388 return EFI_INVALID_PARAMETER;\r
389 }\r
390\r
d6c55989 391 if ((Packet->NvmeCmd == NULL) || (Packet->NvmeCompletion == NULL)) {\r
eb290d02
FT
392 return EFI_INVALID_PARAMETER;\r
393 }\r
394\r
d6c55989 395 if (Packet->QueueType != NVME_ADMIN_QUEUE && Packet->QueueType != NVME_IO_QUEUE) {\r
eb290d02
FT
396 return EFI_INVALID_PARAMETER;\r
397 }\r
398\r
491f6026
HW
399 //\r
400 // 'Attributes' with neither EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_LOGICAL nor\r
401 // EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_PHYSICAL set is an illegal\r
402 // configuration.\r
403 //\r
404 Attributes = This->Mode->Attributes;\r
405 if ((Attributes & (EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_PHYSICAL |\r
406 EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_LOGICAL)) == 0) {\r
407 return EFI_INVALID_PARAMETER;\r
408 }\r
409\r
3c52deaf
HW
410 //\r
411 // Buffer alignment check for TransferBuffer & MetadataBuffer.\r
412 //\r
491f6026 413 IoAlign = This->Mode->IoAlign;\r
3c52deaf
HW
414 if (IoAlign > 0 && (((UINTN) Packet->TransferBuffer & (IoAlign - 1)) != 0)) {\r
415 return EFI_INVALID_PARAMETER;\r
416 }\r
417\r
418 if (IoAlign > 0 && (((UINTN) Packet->MetadataBuffer & (IoAlign - 1)) != 0)) {\r
419 return EFI_INVALID_PARAMETER;\r
420 }\r
421\r
eb290d02
FT
422 Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);\r
423 PciIo = Private->PciIo;\r
424 MapData = NULL;\r
425 MapMeta = NULL;\r
426 MapPrpList = NULL;\r
427 PrpListHost = NULL;\r
428 PrpListNo = 0;\r
429 Prp = NULL;\r
430 TimerEvent = NULL;\r
431 Status = EFI_SUCCESS;\r
432\r
758ea946
HW
433 if (Packet->QueueType == NVME_ADMIN_QUEUE) {\r
434 QueueId = 0;\r
435 } else {\r
436 if (Event == NULL) {\r
437 QueueId = 1;\r
438 } else {\r
439 QueueId = 2;\r
440\r
441 //\r
442 // Submission queue full check.\r
443 //\r
444 if ((Private->SqTdbl[QueueId].Sqt + 1) % (NVME_ASYNC_CSQ_SIZE + 1) ==\r
445 Private->AsyncSqHead) {\r
446 return EFI_NOT_READY;\r
447 }\r
448 }\r
449 }\r
450 Sq = Private->SqBuffer[QueueId] + Private->SqTdbl[QueueId].Sqt;\r
451 Cq = Private->CqBuffer[QueueId] + Private->CqHdbl[QueueId].Cqh;\r
eb290d02
FT
452\r
453 if (Packet->NvmeCmd->Nsid != NamespaceId) {\r
454 return EFI_INVALID_PARAMETER;\r
455 }\r
456\r
457 ZeroMem (Sq, sizeof (NVME_SQ));\r
d6c55989
FT
458 Sq->Opc = (UINT8)Packet->NvmeCmd->Cdw0.Opcode;\r
459 Sq->Fuse = (UINT8)Packet->NvmeCmd->Cdw0.FusedOperation;\r
758ea946 460 Sq->Cid = Private->Cid[QueueId]++;\r
eb290d02
FT
461 Sq->Nsid = Packet->NvmeCmd->Nsid;\r
462\r
463 //\r
464 // Currently we only support PRP for data transfer, SGL is NOT supported.\r
465 //\r
7b8883c6
FT
466 ASSERT (Sq->Psdt == 0);\r
467 if (Sq->Psdt != 0) {\r
eb290d02
FT
468 DEBUG ((EFI_D_ERROR, "NvmExpressPassThru: doesn't support SGL mechanism\n"));\r
469 return EFI_UNSUPPORTED;\r
470 }\r
471\r
472 Sq->Prp[0] = (UINT64)(UINTN)Packet->TransferBuffer;\r
473 //\r
474 // If the NVMe cmd has data in or out, then mapping the user buffer to the PCI controller specific addresses.\r
475 // Note here we don't handle data buffer for CreateIOSubmitionQueue and CreateIOCompletionQueue cmds because\r
476 // these two cmds are special which requires their data buffer must support simultaneous access by both the\r
477 // processor and a PCI Bus Master. It's caller's responsbility to ensure this.\r
478 //\r
754b489b 479 if (((Sq->Opc & (BIT0 | BIT1)) != 0) && (Sq->Opc != NVME_ADMIN_CRIOCQ_CMD) && (Sq->Opc != NVME_ADMIN_CRIOSQ_CMD)) {\r
eb290d02
FT
480 if ((Sq->Opc & BIT0) != 0) {\r
481 Flag = EfiPciIoOperationBusMasterRead;\r
482 } else {\r
483 Flag = EfiPciIoOperationBusMasterWrite;\r
484 }\r
485\r
486 MapLength = Packet->TransferLength;\r
487 Status = PciIo->Map (\r
488 PciIo,\r
489 Flag,\r
490 Packet->TransferBuffer,\r
491 &MapLength,\r
492 &PhyAddr,\r
493 &MapData\r
494 );\r
495 if (EFI_ERROR (Status) || (Packet->TransferLength != MapLength)) {\r
496 return EFI_OUT_OF_RESOURCES;\r
497 }\r
498\r
499 Sq->Prp[0] = PhyAddr;\r
500 Sq->Prp[1] = 0;\r
501\r
502 MapLength = Packet->MetadataLength;\r
503 if(Packet->MetadataBuffer != NULL) {\r
504 MapLength = Packet->MetadataLength;\r
505 Status = PciIo->Map (\r
506 PciIo,\r
507 Flag,\r
508 Packet->MetadataBuffer,\r
509 &MapLength,\r
510 &PhyAddr,\r
511 &MapMeta\r
512 );\r
513 if (EFI_ERROR (Status) || (Packet->MetadataLength != MapLength)) {\r
514 PciIo->Unmap (\r
515 PciIo,\r
516 MapData\r
517 );\r
518\r
519 return EFI_OUT_OF_RESOURCES;\r
520 }\r
521 Sq->Mptr = PhyAddr;\r
522 }\r
523 }\r
524 //\r
525 // If the buffer size spans more than two memory pages (page size as defined in CC.Mps),\r
526 // then build a PRP list in the second PRP submission queue entry.\r
527 //\r
528 Offset = ((UINT16)Sq->Prp[0]) & (EFI_PAGE_SIZE - 1);\r
529 Bytes = Packet->TransferLength;\r
530\r
531 if ((Offset + Bytes) > (EFI_PAGE_SIZE * 2)) {\r
532 //\r
533 // Create PrpList for remaining data buffer.\r
534 //\r
535 PhyAddr = (Sq->Prp[0] + EFI_PAGE_SIZE) & ~(EFI_PAGE_SIZE - 1);\r
536 Prp = NvmeCreatePrpList (PciIo, PhyAddr, EFI_SIZE_TO_PAGES(Offset + Bytes) - 1, &PrpListHost, &PrpListNo, &MapPrpList);\r
537 if (Prp == NULL) {\r
538 goto EXIT;\r
539 }\r
540\r
541 Sq->Prp[1] = (UINT64)(UINTN)Prp;\r
542 } else if ((Offset + Bytes) > EFI_PAGE_SIZE) {\r
543 Sq->Prp[1] = (Sq->Prp[0] + EFI_PAGE_SIZE) & ~(EFI_PAGE_SIZE - 1);\r
544 }\r
545\r
d6c55989
FT
546 if(Packet->NvmeCmd->Flags & CDW2_VALID) {\r
547 Sq->Rsvd2 = (UINT64)Packet->NvmeCmd->Cdw2;\r
548 }\r
549 if(Packet->NvmeCmd->Flags & CDW3_VALID) {\r
550 Sq->Rsvd2 |= LShiftU64 ((UINT64)Packet->NvmeCmd->Cdw3, 32);\r
551 }\r
eb290d02
FT
552 if(Packet->NvmeCmd->Flags & CDW10_VALID) {\r
553 Sq->Payload.Raw.Cdw10 = Packet->NvmeCmd->Cdw10;\r
554 }\r
555 if(Packet->NvmeCmd->Flags & CDW11_VALID) {\r
556 Sq->Payload.Raw.Cdw11 = Packet->NvmeCmd->Cdw11;\r
557 }\r
558 if(Packet->NvmeCmd->Flags & CDW12_VALID) {\r
559 Sq->Payload.Raw.Cdw12 = Packet->NvmeCmd->Cdw12;\r
560 }\r
561 if(Packet->NvmeCmd->Flags & CDW13_VALID) {\r
562 Sq->Payload.Raw.Cdw13 = Packet->NvmeCmd->Cdw13;\r
563 }\r
564 if(Packet->NvmeCmd->Flags & CDW14_VALID) {\r
565 Sq->Payload.Raw.Cdw14 = Packet->NvmeCmd->Cdw14;\r
566 }\r
567 if(Packet->NvmeCmd->Flags & CDW15_VALID) {\r
568 Sq->Payload.Raw.Cdw15 = Packet->NvmeCmd->Cdw15;\r
569 }\r
570\r
571 //\r
572 // Ring the submission queue doorbell.\r
573 //\r
758ea946
HW
574 if (Event != NULL) {\r
575 Private->SqTdbl[QueueId].Sqt =\r
576 (Private->SqTdbl[QueueId].Sqt + 1) % (NVME_ASYNC_CSQ_SIZE + 1);\r
577 } else {\r
578 Private->SqTdbl[QueueId].Sqt ^= 1;\r
579 }\r
580 Data = ReadUnaligned32 ((UINT32*)&Private->SqTdbl[QueueId]);\r
eb290d02
FT
581 PciIo->Mem.Write (\r
582 PciIo,\r
583 EfiPciIoWidthUint32,\r
584 NVME_BAR,\r
758ea946 585 NVME_SQTDBL_OFFSET(QueueId, Private->Cap.Dstrd),\r
eb290d02 586 1,\r
7b8883c6 587 &Data\r
eb290d02
FT
588 );\r
589\r
758ea946
HW
590 //\r
591 // For non-blocking requests, return directly if the command is placed\r
592 // in the submission queue.\r
593 //\r
594 if (Event != NULL) {\r
595 AsyncRequest = AllocateZeroPool (sizeof (NVME_PASS_THRU_ASYNC_REQ));\r
596 if (AsyncRequest == NULL) {\r
597 Status = EFI_DEVICE_ERROR;\r
598 goto EXIT;\r
599 }\r
600\r
601 AsyncRequest->Signature = NVME_PASS_THRU_ASYNC_REQ_SIG;\r
602 AsyncRequest->Packet = Packet;\r
603 AsyncRequest->CommandId = Sq->Cid;\r
604 AsyncRequest->CallerEvent = Event;\r
605\r
606 OldTpl = gBS->RaiseTPL (TPL_NOTIFY);\r
607 InsertTailList (&Private->AsyncPassThruQueue, &AsyncRequest->Link);\r
608 gBS->RestoreTPL (OldTpl);\r
609\r
610 return EFI_SUCCESS;\r
611 }\r
612\r
eb290d02
FT
613 Status = gBS->CreateEvent (\r
614 EVT_TIMER,\r
615 TPL_CALLBACK,\r
616 NULL,\r
617 NULL,\r
618 &TimerEvent\r
619 );\r
620 if (EFI_ERROR (Status)) {\r
621 goto EXIT;\r
622 }\r
623\r
624 Status = gBS->SetTimer(TimerEvent, TimerRelative, Packet->CommandTimeout);\r
625\r
626 if (EFI_ERROR(Status)) {\r
eb290d02
FT
627 goto EXIT;\r
628 }\r
629\r
630 //\r
631 // Wait for completion queue to get filled in.\r
632 //\r
633 Status = EFI_TIMEOUT;\r
eb290d02 634 while (EFI_ERROR (gBS->CheckEvent (TimerEvent))) {\r
758ea946 635 if (Cq->Pt != Private->Pt[QueueId]) {\r
eb290d02 636 Status = EFI_SUCCESS;\r
eb290d02
FT
637 break;\r
638 }\r
639 }\r
640\r
eb290d02 641 //\r
754b489b 642 // Check the NVMe cmd execution result\r
eb290d02 643 //\r
754b489b
TF
644 if (Status != EFI_TIMEOUT) {\r
645 if ((Cq->Sct == 0) && (Cq->Sc == 0)) {\r
646 Status = EFI_SUCCESS;\r
647 } else {\r
648 Status = EFI_DEVICE_ERROR;\r
649 //\r
650 // Copy the Respose Queue entry for this command to the callers response buffer\r
651 //\r
652 CopyMem(Packet->NvmeCompletion, Cq, sizeof(EFI_NVM_EXPRESS_COMPLETION));\r
653 \r
654 //\r
655 // Dump every completion entry status for debugging.\r
656 //\r
657 DEBUG_CODE_BEGIN();\r
658 NvmeDumpStatus(Cq);\r
659 DEBUG_CODE_END();\r
660 }\r
661 }\r
eb290d02 662\r
758ea946
HW
663 if ((Private->CqHdbl[QueueId].Cqh ^= 1) == 0) {\r
664 Private->Pt[QueueId] ^= 1;\r
754b489b 665 }\r
eb290d02 666\r
758ea946 667 Data = ReadUnaligned32 ((UINT32*)&Private->CqHdbl[QueueId]);\r
eb290d02
FT
668 PciIo->Mem.Write (\r
669 PciIo,\r
670 EfiPciIoWidthUint32,\r
671 NVME_BAR,\r
758ea946 672 NVME_CQHDBL_OFFSET(QueueId, Private->Cap.Dstrd),\r
eb290d02 673 1,\r
7b8883c6 674 &Data\r
eb290d02
FT
675 );\r
676\r
677EXIT:\r
678 if (MapData != NULL) {\r
679 PciIo->Unmap (\r
680 PciIo,\r
681 MapData\r
682 );\r
683 }\r
684\r
685 if (MapMeta != NULL) {\r
686 PciIo->Unmap (\r
687 PciIo,\r
688 MapMeta\r
689 );\r
690 }\r
691\r
692 if (MapPrpList != NULL) {\r
693 PciIo->Unmap (\r
694 PciIo,\r
695 MapPrpList\r
696 );\r
697 }\r
698\r
699 if (Prp != NULL) {\r
700 PciIo->FreeBuffer (PciIo, PrpListNo, PrpListHost);\r
701 }\r
702\r
703 if (TimerEvent != NULL) {\r
704 gBS->CloseEvent (TimerEvent);\r
705 }\r
706 return Status;\r
707}\r
708\r
709/**\r
d6c55989 710 Used to retrieve the next namespace ID for this NVM Express controller.\r
eb290d02 711\r
d6c55989
FT
712 The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.GetNextNamespace() function retrieves the next valid\r
713 namespace ID on this NVM Express controller.\r
eb290d02 714\r
d6c55989
FT
715 If on input the value pointed to by NamespaceId is 0xFFFFFFFF, then the first valid namespace\r
716 ID defined on the NVM Express controller is returned in the location pointed to by NamespaceId\r
717 and a status of EFI_SUCCESS is returned.\r
eb290d02 718\r
d6c55989
FT
719 If on input the value pointed to by NamespaceId is an invalid namespace ID other than 0xFFFFFFFF,\r
720 then EFI_INVALID_PARAMETER is returned.\r
eb290d02 721\r
d6c55989
FT
722 If on input the value pointed to by NamespaceId is a valid namespace ID, then the next valid\r
723 namespace ID on the NVM Express controller is returned in the location pointed to by NamespaceId,\r
724 and EFI_SUCCESS is returned.\r
eb290d02 725\r
d6c55989
FT
726 If the value pointed to by NamespaceId is the namespace ID of the last namespace on the NVM\r
727 Express controller, then EFI_NOT_FOUND is returned.\r
728\r
729 @param[in] This A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.\r
eb290d02
FT
730 @param[in,out] NamespaceId On input, a pointer to a legal NamespaceId for an NVM Express\r
731 namespace present on the NVM Express controller. On output, a\r
732 pointer to the next NamespaceId of an NVM Express namespace on\r
733 an NVM Express controller. An input value of 0xFFFFFFFF retrieves\r
734 the first NamespaceId for an NVM Express namespace present on an\r
735 NVM Express controller.\r
eb290d02 736\r
d6c55989 737 @retval EFI_SUCCESS The Namespace ID of the next Namespace was returned.\r
eb290d02 738 @retval EFI_NOT_FOUND There are no more namespaces defined on this controller.\r
d6c55989 739 @retval EFI_INVALID_PARAMETER NamespaceId is an invalid value other than 0xFFFFFFFF.\r
eb290d02
FT
740\r
741**/\r
742EFI_STATUS\r
743EFIAPI\r
744NvmExpressGetNextNamespace (\r
d6c55989
FT
745 IN EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL *This,\r
746 IN OUT UINT32 *NamespaceId\r
eb290d02
FT
747 )\r
748{\r
749 NVME_CONTROLLER_PRIVATE_DATA *Private;\r
750 NVME_ADMIN_NAMESPACE_DATA *NamespaceData;\r
751 UINT32 NextNamespaceId;\r
752 EFI_STATUS Status;\r
753\r
754 if ((This == NULL) || (NamespaceId == NULL)) {\r
755 return EFI_INVALID_PARAMETER;\r
756 }\r
757\r
758 NamespaceData = NULL;\r
759 Status = EFI_NOT_FOUND;\r
760\r
761 Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);\r
762 //\r
763 // If the NamespaceId input value is 0xFFFFFFFF, then get the first valid namespace ID\r
764 //\r
765 if (*NamespaceId == 0xFFFFFFFF) {\r
766 //\r
767 // Start with the first namespace ID\r
768 //\r
769 NextNamespaceId = 1;\r
770 //\r
771 // Allocate buffer for Identify Namespace data.\r
772 //\r
773 NamespaceData = (NVME_ADMIN_NAMESPACE_DATA *)AllocateZeroPool (sizeof (NVME_ADMIN_NAMESPACE_DATA));\r
774\r
775 if (NamespaceData == NULL) {\r
776 return EFI_NOT_FOUND;\r
777 }\r
778\r
779 Status = NvmeIdentifyNamespace (Private, NextNamespaceId, NamespaceData);\r
780 if (EFI_ERROR(Status)) {\r
781 goto Done;\r
782 }\r
783\r
784 *NamespaceId = NextNamespaceId;\r
eb290d02 785 } else {\r
114358ea 786 if (*NamespaceId > Private->ControllerData->Nn) {\r
eb290d02
FT
787 return EFI_INVALID_PARAMETER;\r
788 }\r
789\r
790 NextNamespaceId = *NamespaceId + 1;\r
114358ea
HW
791 if (NextNamespaceId > Private->ControllerData->Nn) {\r
792 return EFI_NOT_FOUND;\r
793 }\r
794\r
eb290d02
FT
795 //\r
796 // Allocate buffer for Identify Namespace data.\r
797 //\r
798 NamespaceData = (NVME_ADMIN_NAMESPACE_DATA *)AllocateZeroPool (sizeof (NVME_ADMIN_NAMESPACE_DATA));\r
799 if (NamespaceData == NULL) {\r
800 return EFI_NOT_FOUND;\r
801 }\r
802\r
803 Status = NvmeIdentifyNamespace (Private, NextNamespaceId, NamespaceData);\r
804 if (EFI_ERROR(Status)) {\r
805 goto Done;\r
806 }\r
807\r
808 *NamespaceId = NextNamespaceId;\r
eb290d02
FT
809 }\r
810\r
811Done:\r
812 if (NamespaceData != NULL) {\r
813 FreePool(NamespaceData);\r
814 }\r
815\r
816 return Status;\r
817}\r
818\r
819/**\r
d6c55989
FT
820 Used to translate a device path node to a namespace ID.\r
821\r
822 The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.GetNamespace() function determines the namespace ID associated with the\r
823 namespace described by DevicePath.\r
eb290d02 824\r
d6c55989
FT
825 If DevicePath is a device path node type that the NVM Express Pass Thru driver supports, then the NVM Express\r
826 Pass Thru driver will attempt to translate the contents DevicePath into a namespace ID.\r
eb290d02 827\r
d6c55989
FT
828 If this translation is successful, then that namespace ID is returned in NamespaceId, and EFI_SUCCESS is returned\r
829\r
830 @param[in] This A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.\r
eb290d02
FT
831 @param[in] DevicePath A pointer to the device path node that describes an NVM Express namespace on\r
832 the NVM Express controller.\r
833 @param[out] NamespaceId The NVM Express namespace ID contained in the device path node.\r
eb290d02 834\r
d6c55989
FT
835 @retval EFI_SUCCESS DevicePath was successfully translated to NamespaceId.\r
836 @retval EFI_INVALID_PARAMETER If DevicePath or NamespaceId are NULL, then EFI_INVALID_PARAMETER is returned.\r
eb290d02
FT
837 @retval EFI_UNSUPPORTED If DevicePath is not a device path node type that the NVM Express Pass Thru driver\r
838 supports, then EFI_UNSUPPORTED is returned.\r
d6c55989
FT
839 @retval EFI_NOT_FOUND If DevicePath is a device path node type that the NVM Express Pass Thru driver\r
840 supports, but there is not a valid translation from DevicePath to a namespace ID,\r
841 then EFI_NOT_FOUND is returned.\r
eb290d02
FT
842**/\r
843EFI_STATUS\r
844EFIAPI\r
845NvmExpressGetNamespace (\r
d6c55989 846 IN EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL *This,\r
eb290d02 847 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,\r
d6c55989 848 OUT UINT32 *NamespaceId\r
eb290d02
FT
849 )\r
850{\r
851 NVME_NAMESPACE_DEVICE_PATH *Node;\r
284dc9bf 852 NVME_CONTROLLER_PRIVATE_DATA *Private;\r
eb290d02 853\r
d6c55989 854 if ((This == NULL) || (DevicePath == NULL) || (NamespaceId == NULL)) {\r
eb290d02
FT
855 return EFI_INVALID_PARAMETER;\r
856 }\r
857\r
858 if (DevicePath->Type != MESSAGING_DEVICE_PATH) {\r
859 return EFI_UNSUPPORTED;\r
860 }\r
861\r
284dc9bf
HW
862 Node = (NVME_NAMESPACE_DEVICE_PATH *)DevicePath;\r
863 Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);\r
eb290d02
FT
864\r
865 if (DevicePath->SubType == MSG_NVME_NAMESPACE_DP) {\r
866 if (DevicePathNodeLength(DevicePath) != sizeof(NVME_NAMESPACE_DEVICE_PATH)) {\r
867 return EFI_NOT_FOUND;\r
868 }\r
869\r
284dc9bf
HW
870 //\r
871 // Check NamespaceId in the device path node is valid or not.\r
872 //\r
873 if ((Node->NamespaceId == 0) ||\r
874 (Node->NamespaceId > Private->ControllerData->Nn)) {\r
875 return EFI_NOT_FOUND;\r
876 }\r
877\r
d6c55989 878 *NamespaceId = Node->NamespaceId;\r
eb290d02
FT
879\r
880 return EFI_SUCCESS;\r
881 } else {\r
882 return EFI_UNSUPPORTED;\r
883 }\r
884}\r
885\r
886/**\r
887 Used to allocate and build a device path node for an NVM Express namespace on an NVM Express controller.\r
888\r
d6c55989 889 The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.BuildDevicePath() function allocates and builds a single device\r
eb290d02
FT
890 path node for the NVM Express namespace specified by NamespaceId.\r
891\r
d6c55989 892 If the NamespaceId is not valid, then EFI_NOT_FOUND is returned.\r
eb290d02
FT
893\r
894 If DevicePath is NULL, then EFI_INVALID_PARAMETER is returned.\r
895\r
896 If there are not enough resources to allocate the device path node, then EFI_OUT_OF_RESOURCES is returned.\r
897\r
898 Otherwise, DevicePath is allocated with the boot service AllocatePool(), the contents of DevicePath are\r
899 initialized to describe the NVM Express namespace specified by NamespaceId, and EFI_SUCCESS is returned.\r
900\r
d6c55989 901 @param[in] This A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.\r
eb290d02
FT
902 @param[in] NamespaceId The NVM Express namespace ID for which a device path node is to be\r
903 allocated and built. Caller must set the NamespaceId to zero if the\r
904 device path node will contain a valid UUID.\r
eb290d02
FT
905 @param[in,out] DevicePath A pointer to a single device path node that describes the NVM Express\r
906 namespace specified by NamespaceId. This function is responsible for\r
907 allocating the buffer DevicePath with the boot service AllocatePool().\r
908 It is the caller's responsibility to free DevicePath when the caller\r
909 is finished with DevicePath.\r
910 @retval EFI_SUCCESS The device path node that describes the NVM Express namespace specified\r
911 by NamespaceId was allocated and returned in DevicePath.\r
d6c55989 912 @retval EFI_NOT_FOUND The NamespaceId is not valid.\r
eb290d02
FT
913 @retval EFI_INVALID_PARAMETER DevicePath is NULL.\r
914 @retval EFI_OUT_OF_RESOURCES There are not enough resources to allocate the DevicePath node.\r
915\r
916**/\r
917EFI_STATUS\r
918EFIAPI\r
919NvmExpressBuildDevicePath (\r
d6c55989 920 IN EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL *This,\r
eb290d02 921 IN UINT32 NamespaceId,\r
eb290d02
FT
922 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath\r
923 )\r
924{\r
eb290d02 925 NVME_NAMESPACE_DEVICE_PATH *Node;\r
d6c55989
FT
926 NVME_CONTROLLER_PRIVATE_DATA *Private;\r
927 EFI_STATUS Status;\r
928 NVME_ADMIN_NAMESPACE_DATA *NamespaceData;\r
eb290d02
FT
929\r
930 //\r
931 // Validate parameters\r
932 //\r
933 if ((This == NULL) || (DevicePath == NULL)) {\r
934 return EFI_INVALID_PARAMETER;\r
935 }\r
936\r
d6c55989
FT
937 Status = EFI_SUCCESS;\r
938 Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);\r
eb290d02 939\r
946f48eb
HW
940 //\r
941 // Check NamespaceId is valid or not.\r
942 //\r
943 if ((NamespaceId == 0) ||\r
944 (NamespaceId > Private->ControllerData->Nn)) {\r
945 return EFI_NOT_FOUND;\r
946 }\r
947\r
d6c55989 948 Node = (NVME_NAMESPACE_DEVICE_PATH *)AllocateZeroPool (sizeof (NVME_NAMESPACE_DEVICE_PATH));\r
eb290d02
FT
949 if (Node == NULL) {\r
950 return EFI_OUT_OF_RESOURCES;\r
951 }\r
952\r
953 Node->Header.Type = MESSAGING_DEVICE_PATH;\r
954 Node->Header.SubType = MSG_NVME_NAMESPACE_DP;\r
955 SetDevicePathNodeLength (&Node->Header, sizeof (NVME_NAMESPACE_DEVICE_PATH));\r
956 Node->NamespaceId = NamespaceId;\r
d6c55989
FT
957\r
958 //\r
959 // Allocate a buffer for Identify Namespace data.\r
960 //\r
961 NamespaceData = NULL;\r
962 NamespaceData = AllocateZeroPool(sizeof (NVME_ADMIN_NAMESPACE_DATA));\r
963 if(NamespaceData == NULL) {\r
964 Status = EFI_OUT_OF_RESOURCES;\r
965 goto Exit;\r
966 }\r
967\r
968 //\r
969 // Get UUID from specified Identify Namespace data.\r
970 //\r
971 Status = NvmeIdentifyNamespace (\r
972 Private,\r
973 NamespaceId,\r
974 (VOID *)NamespaceData\r
975 );\r
976\r
977 if (EFI_ERROR(Status)) {\r
978 goto Exit;\r
979 }\r
980\r
981 Node->NamespaceUuid = NamespaceData->Eui64;\r
eb290d02
FT
982\r
983 *DevicePath = (EFI_DEVICE_PATH_PROTOCOL *)Node;\r
d6c55989
FT
984\r
985Exit:\r
986 if(NamespaceData != NULL) {\r
987 FreePool (NamespaceData);\r
988 }\r
989\r
990 if (EFI_ERROR (Status)) {\r
991 FreePool (Node);\r
992 }\r
993\r
994 return Status;\r
eb290d02
FT
995}\r
996\r