]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/VirtioScsiDxe/VirtioScsi.c
OvmfPkg/VirtioScsiDxe: add helper to create a fake host adapter error
[mirror_edk2.git] / OvmfPkg / VirtioScsiDxe / VirtioScsi.c
CommitLineData
37078a63 1/** @file\r
2\r
3 This driver produces Extended SCSI Pass Thru Protocol instances for\r
4 virtio-scsi devices.\r
5\r
6 The implementation is basic:\r
7\r
8 - No hotplug / hot-unplug.\r
9\r
10 - Although EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() could be a good match\r
11 for multiple in-flight virtio-scsi requests, we stick to synchronous\r
12 requests for now.\r
13\r
14 - Timeouts are not supported for EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru().\r
15\r
16 - Only one channel is supported. (At the time of this writing, host-side\r
17 virtio-scsi supports a single channel too.)\r
18\r
19 - Only one request queue is used (for the one synchronous request).\r
20\r
21 - The ResetChannel() and ResetTargetLun() functions of\r
22 EFI_EXT_SCSI_PASS_THRU_PROTOCOL are not supported (which is allowed by the\r
23 UEFI 2.3.1 Errata C specification), although\r
24 VIRTIO_SCSI_T_TMF_LOGICAL_UNIT_RESET could be a good match. That would\r
25 however require client code for the control queue, which is deemed\r
26 unreasonable for now.\r
27\r
28 Copyright (C) 2012, Red Hat, Inc.\r
c4046161 29 Copyright (c) 2012 - 2014, Intel Corporation. All rights reserved.<BR>\r
fc2c1543 30 Copyright (c) 2017, AMD Inc, All rights reserved.<BR>\r
37078a63 31\r
32 This program and the accompanying materials are licensed and made available\r
33 under the terms and conditions of the BSD License which accompanies this\r
34 distribution. The full text of the license may be found at\r
35 http://opensource.org/licenses/bsd-license.php\r
36\r
37 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT\r
38 WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
39\r
40**/\r
41\r
37078a63 42#include <IndustryStandard/VirtioScsi.h>\r
43#include <Library/BaseMemoryLib.h>\r
44#include <Library/DebugLib.h>\r
45#include <Library/MemoryAllocationLib.h>\r
46#include <Library/UefiBootServicesTableLib.h>\r
47#include <Library/UefiLib.h>\r
48#include <Library/VirtioLib.h>\r
49\r
50#include "VirtioScsi.h"\r
51\r
52/**\r
53\r
56f65ed8
OM
54 Convenience macros to read and write configuration elements of the\r
55 virtio-scsi VirtIo device.\r
37078a63 56\r
57 The following macros make it possible to specify only the "core parameters"\r
58 for such accesses and to derive the rest. By the time VIRTIO_CFG_WRITE()\r
59 returns, the transaction will have been completed.\r
60\r
56f65ed8 61 @param[in] Dev Pointer to the VSCSI_DEV structure.\r
37078a63 62\r
63 @param[in] Field A field name from VSCSI_HDR, identifying the virtio-scsi\r
64 configuration item to access.\r
65\r
66 @param[in] Value (VIRTIO_CFG_WRITE() only.) The value to write to the\r
67 selected configuration item.\r
68\r
69 @param[out] Pointer (VIRTIO_CFG_READ() only.) The object to receive the\r
70 value read from the configuration item. Its type must be\r
71 one of UINT8, UINT16, UINT32, UINT64.\r
72\r
73\r
ece77e40 74 @return Status codes returned by Virtio->WriteDevice() / Virtio->ReadDevice().\r
37078a63 75\r
76**/\r
77\r
ece77e40
OM
78#define VIRTIO_CFG_WRITE(Dev, Field, Value) ((Dev)->VirtIo->WriteDevice ( \\r
79 (Dev)->VirtIo, \\r
80 OFFSET_OF_VSCSI (Field), \\r
81 SIZE_OF_VSCSI (Field), \\r
82 (Value) \\r
37078a63 83 ))\r
84\r
ece77e40
OM
85#define VIRTIO_CFG_READ(Dev, Field, Pointer) ((Dev)->VirtIo->ReadDevice ( \\r
86 (Dev)->VirtIo, \\r
87 OFFSET_OF_VSCSI (Field), \\r
88 SIZE_OF_VSCSI (Field), \\r
89 sizeof *(Pointer), \\r
90 (Pointer) \\r
37078a63 91 ))\r
92\r
93\r
94//\r
95// UEFI Spec 2.3.1 + Errata C, 14.7 Extended SCSI Pass Thru Protocol specifies\r
96// the PassThru() interface. Beside returning a status code, the function must\r
97// set some fields in the EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET in/out\r
98// parameter on return. The following is a full list of those fields, for\r
99// easier validation of PopulateRequest(), ParseResponse(), and\r
1b15eb06 100// ReportHostAdapterError() below.\r
37078a63 101//\r
102// - InTransferLength\r
103// - OutTransferLength\r
104// - HostAdapterStatus\r
105// - TargetStatus\r
106// - SenseDataLength\r
107// - SenseData\r
108//\r
109// On any return from the PassThru() interface, these fields must be set,\r
110// except if the returned status code is explicitly exempt. (Actually the\r
111// implementation here conservatively sets these fields even in case not all\r
112// of them would be required by the specification.)\r
113//\r
114\r
115/**\r
116\r
117 Populate a virtio-scsi request from the Extended SCSI Pass Thru Protocol\r
118 packet.\r
119\r
120 The caller is responsible for pre-zeroing the virtio-scsi request. The\r
121 Extended SCSI Pass Thru Protocol packet is modified, to be forwarded outwards\r
122 by VirtioScsiPassThru(), if invalid or unsupported parameters are detected.\r
123\r
124 @param[in] Dev The virtio-scsi host device the packet targets.\r
125\r
126 @param[in] Target The SCSI target controlled by the virtio-scsi host\r
127 device.\r
128\r
129 @param[in] Lun The Logical Unit Number under the SCSI target.\r
130\r
131 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet the\r
132 function translates to a virtio-scsi request. On\r
133 failure this parameter relays error contents.\r
134\r
135 @param[out] Request The pre-zeroed virtio-scsi request to populate. This\r
136 parameter is volatile-qualified because we expect the\r
137 caller to append it to a virtio ring, thus\r
138 assignments to Request must be visible when the\r
139 function returns.\r
140\r
141\r
142 @retval EFI_SUCCESS The Extended SCSI Pass Thru Protocol packet was valid,\r
143 Request has been populated.\r
144\r
145 @return Otherwise, invalid or unsupported parameters were\r
146 detected. Status codes are meant for direct forwarding\r
147 by the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru()\r
148 implementation.\r
149\r
150**/\r
151STATIC\r
152EFI_STATUS\r
153EFIAPI\r
154PopulateRequest (\r
155 IN CONST VSCSI_DEV *Dev,\r
156 IN UINT16 Target,\r
157 IN UINT64 Lun,\r
158 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
159 OUT volatile VIRTIO_SCSI_REQ *Request\r
160 )\r
161{\r
162 UINTN Idx;\r
163\r
164 if (\r
165 //\r
166 // bidirectional transfer was requested, but the host doesn't support it\r
167 //\r
168 (Packet->InTransferLength > 0 && Packet->OutTransferLength > 0 &&\r
169 !Dev->InOutSupported) ||\r
170\r
171 //\r
172 // a target / LUN was addressed that's impossible to encode for the host\r
173 //\r
174 Target > 0xFF || Lun >= 0x4000 ||\r
175\r
176 //\r
177 // Command Descriptor Block bigger than VIRTIO_SCSI_CDB_SIZE\r
178 //\r
179 Packet->CdbLength > VIRTIO_SCSI_CDB_SIZE ||\r
180\r
181 //\r
182 // From virtio-0.9.5, 2.3.2 Descriptor Table:\r
183 // "no descriptor chain may be more than 2^32 bytes long in total".\r
184 //\r
185 (UINT64) Packet->InTransferLength + Packet->OutTransferLength > SIZE_1GB\r
186 ) {\r
187\r
188 //\r
189 // this error code doesn't require updates to the Packet output fields\r
190 //\r
191 return EFI_UNSUPPORTED;\r
192 }\r
193\r
194 if (\r
195 //\r
196 // addressed invalid device\r
197 //\r
198 Target > Dev->MaxTarget || Lun > Dev->MaxLun ||\r
199\r
200 //\r
201 // invalid direction (there doesn't seem to be a macro for the "no data\r
202 // transferred" "direction", eg. for TEST UNIT READY)\r
203 //\r
204 Packet->DataDirection > EFI_EXT_SCSI_DATA_DIRECTION_BIDIRECTIONAL ||\r
205\r
206 //\r
207 // trying to receive, but destination pointer is NULL, or contradicting\r
208 // transfer direction\r
209 //\r
210 (Packet->InTransferLength > 0 &&\r
211 (Packet->InDataBuffer == NULL ||\r
212 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_WRITE\r
213 )\r
214 ) ||\r
215\r
216 //\r
217 // trying to send, but source pointer is NULL, or contradicting transfer\r
218 // direction\r
219 //\r
220 (Packet->OutTransferLength > 0 &&\r
221 (Packet->OutDataBuffer == NULL ||\r
222 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_READ\r
223 )\r
224 )\r
225 ) {\r
226\r
227 //\r
228 // this error code doesn't require updates to the Packet output fields\r
229 //\r
230 return EFI_INVALID_PARAMETER;\r
231 }\r
232\r
233 //\r
234 // Catch oversized requests eagerly. If this condition evaluates to false,\r
235 // then the combined size of a bidirectional request will not exceed the\r
236 // virtio-scsi device's transfer limit either.\r
237 //\r
238 if (ALIGN_VALUE (Packet->OutTransferLength, 512) / 512\r
239 > Dev->MaxSectors / 2 ||\r
240 ALIGN_VALUE (Packet->InTransferLength, 512) / 512\r
241 > Dev->MaxSectors / 2) {\r
242 Packet->InTransferLength = (Dev->MaxSectors / 2) * 512;\r
243 Packet->OutTransferLength = (Dev->MaxSectors / 2) * 512;\r
244 Packet->HostAdapterStatus =\r
245 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
246 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
247 Packet->SenseDataLength = 0;\r
248 return EFI_BAD_BUFFER_SIZE;\r
249 }\r
250\r
251 //\r
252 // target & LUN encoding: see virtio-0.9.5, Appendix I: SCSI Host Device,\r
253 // Device Operation: request queues\r
254 //\r
255 Request->Lun[0] = 1;\r
256 Request->Lun[1] = (UINT8) Target;\r
faba4a14 257 Request->Lun[2] = (UINT8) (((UINT32)Lun >> 8) | 0x40);\r
37078a63 258 Request->Lun[3] = (UINT8) Lun;\r
259\r
260 //\r
261 // CopyMem() would cast away the "volatile" qualifier before access, which is\r
262 // undefined behavior (ISO C99 6.7.3p5)\r
263 //\r
264 for (Idx = 0; Idx < Packet->CdbLength; ++Idx) {\r
265 Request->Cdb[Idx] = ((UINT8 *) Packet->Cdb)[Idx];\r
266 }\r
267\r
268 return EFI_SUCCESS;\r
269}\r
270\r
271\r
272/**\r
273\r
274 Parse the virtio-scsi device's response, translate it to an EFI status code,\r
275 and update the Extended SCSI Pass Thru Protocol packet, to be returned by\r
276 the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() implementation.\r
277\r
278 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet that has\r
279 been translated to a virtio-scsi request with\r
280 PopulateRequest(), and processed by the host. On\r
281 output this parameter is updated with response or\r
282 error contents.\r
283\r
284 @param[in] Response The virtio-scsi response structure to parse. We expect\r
285 it to come from a virtio ring, thus it is qualified\r
286 volatile.\r
287\r
288\r
289 @return PassThru() status codes mandated by UEFI Spec 2.3.1 + Errata C, 14.7\r
290 Extended SCSI Pass Thru Protocol.\r
291\r
292**/\r
293STATIC\r
294EFI_STATUS\r
295EFIAPI\r
296ParseResponse (\r
297 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
298 IN CONST volatile VIRTIO_SCSI_RESP *Response\r
299 )\r
300{\r
301 UINTN ResponseSenseLen;\r
302 UINTN Idx;\r
303\r
304 //\r
305 // return sense data (length and contents) in all cases, truncated if needed\r
306 //\r
307 ResponseSenseLen = MIN (Response->SenseLen, VIRTIO_SCSI_SENSE_SIZE);\r
308 if (Packet->SenseDataLength > ResponseSenseLen) {\r
309 Packet->SenseDataLength = (UINT8) ResponseSenseLen;\r
310 }\r
311 for (Idx = 0; Idx < Packet->SenseDataLength; ++Idx) {\r
312 ((UINT8 *) Packet->SenseData)[Idx] = Response->Sense[Idx];\r
313 }\r
314\r
315 //\r
316 // Report actual transfer lengths. The logic below covers all three\r
317 // DataDirections (read, write, bidirectional).\r
318 //\r
319 // -+- @ 0\r
320 // |\r
321 // | write ^ @ Residual (unprocessed)\r
322 // | |\r
323 // -+- @ OutTransferLength -+- @ InTransferLength\r
324 // | |\r
325 // | read |\r
326 // | |\r
327 // V @ OutTransferLength + InTransferLength -+- @ 0\r
328 //\r
329 if (Response->Residual <= Packet->InTransferLength) {\r
330 Packet->InTransferLength -= Response->Residual;\r
331 }\r
332 else {\r
333 Packet->OutTransferLength -= Response->Residual - Packet->InTransferLength;\r
334 Packet->InTransferLength = 0;\r
335 }\r
336\r
337 //\r
338 // report target status in all cases\r
339 //\r
340 Packet->TargetStatus = Response->Status;\r
341\r
342 //\r
343 // host adapter status and function return value depend on virtio-scsi\r
344 // response code\r
345 //\r
346 switch (Response->Response) {\r
347 case VIRTIO_SCSI_S_OK:\r
348 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
349 return EFI_SUCCESS;\r
350\r
351 case VIRTIO_SCSI_S_OVERRUN:\r
352 Packet->HostAdapterStatus =\r
353 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
354 break;\r
355\r
356 case VIRTIO_SCSI_S_BAD_TARGET:\r
357 //\r
358 // This is non-intuitive but explicitly required by the\r
359 // EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() specification for\r
360 // disconnected (but otherwise valid) target / LUN addresses.\r
361 //\r
362 Packet->HostAdapterStatus =\r
363 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_TIMEOUT_COMMAND;\r
364 return EFI_TIMEOUT;\r
365\r
366 case VIRTIO_SCSI_S_RESET:\r
367 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_BUS_RESET;\r
368 break;\r
369\r
370 case VIRTIO_SCSI_S_BUSY:\r
371 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
372 return EFI_NOT_READY;\r
373\r
374 //\r
375 // Lump together the rest. The mapping for VIRTIO_SCSI_S_ABORTED is\r
376 // intentional as well, not an oversight.\r
377 //\r
378 case VIRTIO_SCSI_S_ABORTED:\r
379 case VIRTIO_SCSI_S_TRANSPORT_FAILURE:\r
380 case VIRTIO_SCSI_S_TARGET_FAILURE:\r
381 case VIRTIO_SCSI_S_NEXUS_FAILURE:\r
382 case VIRTIO_SCSI_S_FAILURE:\r
383 default:\r
384 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
385 }\r
386\r
387 return EFI_DEVICE_ERROR;\r
388}\r
389\r
390\r
1b15eb06
BS
391/**\r
392\r
393 The function can be used to create a fake host adapter error.\r
394\r
395 When VirtioScsiPassThru() is failed due to some reasons then this function\r
396 can be called to construct a host adapter error.\r
397\r
398 @param[out] Packet The Extended SCSI Pass Thru Protocol packet that the host\r
399 adapter error shall be placed in.\r
400\r
401\r
402 @retval EFI_DEVICE_ERROR The function returns this status code\r
403 unconditionally, to be propagated by\r
404 VirtioScsiPassThru().\r
405\r
406**/\r
407STATIC\r
408EFI_STATUS\r
409ReportHostAdapterError (\r
410 OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet\r
411 )\r
412{\r
413 Packet->InTransferLength = 0;\r
414 Packet->OutTransferLength = 0;\r
415 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
416 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
417 Packet->SenseDataLength = 0;\r
418 return EFI_DEVICE_ERROR;\r
419}\r
420\r
421\r
37078a63 422//\r
423// The next seven functions implement EFI_EXT_SCSI_PASS_THRU_PROTOCOL\r
424// for the virtio-scsi HBA. Refer to UEFI Spec 2.3.1 + Errata C, sections\r
425// - 14.1 SCSI Driver Model Overview,\r
426// - 14.7 Extended SCSI Pass Thru Protocol.\r
427//\r
428\r
429EFI_STATUS\r
430EFIAPI\r
431VirtioScsiPassThru (\r
432 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
433 IN UINT8 *Target,\r
434 IN UINT64 Lun,\r
435 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
436 IN EFI_EVENT Event OPTIONAL\r
437 )\r
438{\r
439 VSCSI_DEV *Dev;\r
440 UINT16 TargetValue;\r
441 EFI_STATUS Status;\r
442 volatile VIRTIO_SCSI_REQ Request;\r
443 volatile VIRTIO_SCSI_RESP Response;\r
444 DESC_INDICES Indices;\r
445\r
151304d9 446 ZeroMem ((VOID*) &Request, sizeof (Request));\r
447 ZeroMem ((VOID*) &Response, sizeof (Response));\r
37078a63 448\r
449 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
450 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
451\r
452 Status = PopulateRequest (Dev, TargetValue, Lun, Packet, &Request);\r
453 if (EFI_ERROR (Status)) {\r
454 return Status;\r
455 }\r
456\r
457 VirtioPrepare (&Dev->Ring, &Indices);\r
458\r
459 //\r
460 // preset a host status for ourselves that we do not accept as success\r
461 //\r
462 Response.Response = VIRTIO_SCSI_S_FAILURE;\r
463\r
464 //\r
465 // ensured by VirtioScsiInit() -- this predicate, in combination with the\r
466 // lock-step progress, ensures we don't have to track free descriptors.\r
467 //\r
468 ASSERT (Dev->Ring.QueueSize >= 4);\r
469\r
470 //\r
471 // enqueue Request\r
472 //\r
473 VirtioAppendDesc (&Dev->Ring, (UINTN) &Request, sizeof Request,\r
474 VRING_DESC_F_NEXT, &Indices);\r
475\r
476 //\r
477 // enqueue "dataout" if any\r
478 //\r
479 if (Packet->OutTransferLength > 0) {\r
480 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->OutDataBuffer,\r
481 Packet->OutTransferLength, VRING_DESC_F_NEXT, &Indices);\r
482 }\r
483\r
484 //\r
485 // enqueue Response, to be written by the host\r
486 //\r
487 VirtioAppendDesc (&Dev->Ring, (UINTN) &Response, sizeof Response,\r
488 VRING_DESC_F_WRITE | (Packet->InTransferLength > 0 ?\r
489 VRING_DESC_F_NEXT : 0),\r
490 &Indices);\r
491\r
492 //\r
493 // enqueue "datain" if any, to be written by the host\r
494 //\r
495 if (Packet->InTransferLength > 0) {\r
496 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->InDataBuffer,\r
497 Packet->InTransferLength, VRING_DESC_F_WRITE, &Indices);\r
498 }\r
499\r
500 // If kicking the host fails, we must fake a host adapter error.\r
501 // EFI_NOT_READY would save us the effort, but it would also suggest that the\r
502 // caller retry.\r
503 //\r
56f65ed8 504 if (VirtioFlush (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE, &Dev->Ring,\r
8bc951a2 505 &Indices, NULL) != EFI_SUCCESS) {\r
1b15eb06 506 return ReportHostAdapterError (Packet);\r
37078a63 507 }\r
508\r
509 return ParseResponse (Packet, &Response);\r
510}\r
511\r
512\r
513EFI_STATUS\r
514EFIAPI\r
515VirtioScsiGetNextTargetLun (\r
516 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
517 IN OUT UINT8 **TargetPointer,\r
518 IN OUT UINT64 *Lun\r
519 )\r
520{\r
521 UINT8 *Target;\r
522 UINTN Idx;\r
523 UINT16 LastTarget;\r
524 VSCSI_DEV *Dev;\r
525\r
526 //\r
527 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
528 //\r
529 Target = *TargetPointer;\r
530\r
531 //\r
532 // Search for first non-0xFF byte. If not found, return first target & LUN.\r
533 //\r
534 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
535 ;\r
536 if (Idx == TARGET_MAX_BYTES) {\r
537 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
538 *Lun = 0;\r
539 return EFI_SUCCESS;\r
540 }\r
541\r
542 //\r
543 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
544 //\r
545 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
546\r
547 //\r
548 // increment (target, LUN) pair if valid on input\r
549 //\r
550 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
551 if (LastTarget > Dev->MaxTarget || *Lun > Dev->MaxLun) {\r
552 return EFI_INVALID_PARAMETER;\r
553 }\r
554\r
555 if (*Lun < Dev->MaxLun) {\r
556 ++*Lun;\r
557 return EFI_SUCCESS;\r
558 }\r
559\r
560 if (LastTarget < Dev->MaxTarget) {\r
561 *Lun = 0;\r
562 ++LastTarget;\r
563 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
564 return EFI_SUCCESS;\r
565 }\r
566\r
567 return EFI_NOT_FOUND;\r
568}\r
569\r
570\r
571EFI_STATUS\r
572EFIAPI\r
573VirtioScsiBuildDevicePath (\r
574 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
575 IN UINT8 *Target,\r
576 IN UINT64 Lun,\r
577 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath\r
578 )\r
579{\r
580 UINT16 TargetValue;\r
581 VSCSI_DEV *Dev;\r
582 SCSI_DEVICE_PATH *ScsiDevicePath;\r
583\r
584 if (DevicePath == NULL) {\r
585 return EFI_INVALID_PARAMETER;\r
586 }\r
587\r
588 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
589 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
590 if (TargetValue > Dev->MaxTarget || Lun > Dev->MaxLun || Lun > 0xFFFF) {\r
591 return EFI_NOT_FOUND;\r
592 }\r
593\r
594 ScsiDevicePath = AllocatePool (sizeof *ScsiDevicePath);\r
595 if (ScsiDevicePath == NULL) {\r
596 return EFI_OUT_OF_RESOURCES;\r
597 }\r
598\r
599 ScsiDevicePath->Header.Type = MESSAGING_DEVICE_PATH;\r
600 ScsiDevicePath->Header.SubType = MSG_SCSI_DP;\r
601 ScsiDevicePath->Header.Length[0] = (UINT8) sizeof *ScsiDevicePath;\r
602 ScsiDevicePath->Header.Length[1] = (UINT8) (sizeof *ScsiDevicePath >> 8);\r
603 ScsiDevicePath->Pun = TargetValue;\r
604 ScsiDevicePath->Lun = (UINT16) Lun;\r
605\r
606 *DevicePath = &ScsiDevicePath->Header;\r
607 return EFI_SUCCESS;\r
608}\r
609\r
610\r
611EFI_STATUS\r
612EFIAPI\r
613VirtioScsiGetTargetLun (\r
614 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
615 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,\r
616 OUT UINT8 **TargetPointer,\r
617 OUT UINT64 *Lun\r
618 )\r
619{\r
620 SCSI_DEVICE_PATH *ScsiDevicePath;\r
621 VSCSI_DEV *Dev;\r
622 UINT8 *Target;\r
623\r
624 if (DevicePath == NULL || TargetPointer == NULL || *TargetPointer == NULL ||\r
625 Lun == NULL) {\r
626 return EFI_INVALID_PARAMETER;\r
627 }\r
628\r
629 if (DevicePath->Type != MESSAGING_DEVICE_PATH ||\r
630 DevicePath->SubType != MSG_SCSI_DP) {\r
631 return EFI_UNSUPPORTED;\r
632 }\r
633\r
634 ScsiDevicePath = (SCSI_DEVICE_PATH *) DevicePath;\r
635 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
636 if (ScsiDevicePath->Pun > Dev->MaxTarget ||\r
637 ScsiDevicePath->Lun > Dev->MaxLun) {\r
638 return EFI_NOT_FOUND;\r
639 }\r
640\r
641 //\r
642 // a) the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
643 // b) see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
644 // c) ScsiDevicePath->Pun is an UINT16\r
645 //\r
646 Target = *TargetPointer;\r
647 CopyMem (Target, &ScsiDevicePath->Pun, 2);\r
648 SetMem (Target + 2, TARGET_MAX_BYTES - 2, 0x00);\r
649\r
650 *Lun = ScsiDevicePath->Lun;\r
651 return EFI_SUCCESS;\r
652}\r
653\r
654\r
655EFI_STATUS\r
656EFIAPI\r
657VirtioScsiResetChannel (\r
658 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This\r
659 )\r
660{\r
661 return EFI_UNSUPPORTED;\r
662}\r
663\r
664\r
665EFI_STATUS\r
666EFIAPI\r
667VirtioScsiResetTargetLun (\r
668 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
669 IN UINT8 *Target,\r
670 IN UINT64 Lun\r
671 )\r
672{\r
673 return EFI_UNSUPPORTED;\r
674}\r
675\r
676\r
677EFI_STATUS\r
678EFIAPI\r
679VirtioScsiGetNextTarget (\r
680 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
681 IN OUT UINT8 **TargetPointer\r
682 )\r
683{\r
684 UINT8 *Target;\r
685 UINTN Idx;\r
686 UINT16 LastTarget;\r
687 VSCSI_DEV *Dev;\r
688\r
689 //\r
690 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
691 //\r
692 Target = *TargetPointer;\r
693\r
694 //\r
695 // Search for first non-0xFF byte. If not found, return first target.\r
696 //\r
697 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
698 ;\r
699 if (Idx == TARGET_MAX_BYTES) {\r
700 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
701 return EFI_SUCCESS;\r
702 }\r
703\r
704 //\r
705 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
706 //\r
707 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
708\r
709 //\r
710 // increment target if valid on input\r
711 //\r
712 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
713 if (LastTarget > Dev->MaxTarget) {\r
714 return EFI_INVALID_PARAMETER;\r
715 }\r
716\r
717 if (LastTarget < Dev->MaxTarget) {\r
718 ++LastTarget;\r
719 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
720 return EFI_SUCCESS;\r
721 }\r
722\r
723 return EFI_NOT_FOUND;\r
724}\r
725\r
726\r
727STATIC\r
728EFI_STATUS\r
729EFIAPI\r
730VirtioScsiInit (\r
731 IN OUT VSCSI_DEV *Dev\r
732 )\r
733{\r
734 UINT8 NextDevStat;\r
735 EFI_STATUS Status;\r
fc2168fe 736 UINT64 RingBaseShift;\r
bc8fde6f 737 UINT64 Features;\r
37078a63 738 UINT16 MaxChannel; // for validation only\r
739 UINT32 NumQueues; // for validation only\r
740 UINT16 QueueSize;\r
741\r
742 //\r
743 // Execute virtio-0.9.5, 2.2.1 Device Initialization Sequence.\r
744 //\r
745 NextDevStat = 0; // step 1 -- reset device\r
56f65ed8 746 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 747 if (EFI_ERROR (Status)) {\r
748 goto Failed;\r
749 }\r
750\r
751 NextDevStat |= VSTAT_ACK; // step 2 -- acknowledge device presence\r
56f65ed8 752 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 753 if (EFI_ERROR (Status)) {\r
754 goto Failed;\r
755 }\r
756\r
757 NextDevStat |= VSTAT_DRIVER; // step 3 -- we know how to drive it\r
56f65ed8
OM
758 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
759 if (EFI_ERROR (Status)) {\r
760 goto Failed;\r
761 }\r
762\r
763 //\r
764 // Set Page Size - MMIO VirtIo Specific\r
765 //\r
766 Status = Dev->VirtIo->SetPageSize (Dev->VirtIo, EFI_PAGE_SIZE);\r
37078a63 767 if (EFI_ERROR (Status)) {\r
768 goto Failed;\r
769 }\r
770\r
771 //\r
772 // step 4a -- retrieve and validate features\r
773 //\r
56f65ed8 774 Status = Dev->VirtIo->GetDeviceFeatures (Dev->VirtIo, &Features);\r
37078a63 775 if (EFI_ERROR (Status)) {\r
776 goto Failed;\r
777 }\r
c4046161 778 Dev->InOutSupported = (BOOLEAN) ((Features & VIRTIO_SCSI_F_INOUT) != 0);\r
37078a63 779\r
56f65ed8 780 Status = VIRTIO_CFG_READ (Dev, MaxChannel, &MaxChannel);\r
37078a63 781 if (EFI_ERROR (Status)) {\r
782 goto Failed;\r
783 }\r
784 if (MaxChannel != 0) {\r
785 //\r
786 // this driver is for a single-channel virtio-scsi HBA\r
787 //\r
788 Status = EFI_UNSUPPORTED;\r
789 goto Failed;\r
790 }\r
791\r
56f65ed8 792 Status = VIRTIO_CFG_READ (Dev, NumQueues, &NumQueues);\r
37078a63 793 if (EFI_ERROR (Status)) {\r
794 goto Failed;\r
795 }\r
796 if (NumQueues < 1) {\r
797 Status = EFI_UNSUPPORTED;\r
798 goto Failed;\r
799 }\r
800\r
56f65ed8 801 Status = VIRTIO_CFG_READ (Dev, MaxTarget, &Dev->MaxTarget);\r
37078a63 802 if (EFI_ERROR (Status)) {\r
803 goto Failed;\r
804 }\r
805 if (Dev->MaxTarget > PcdGet16 (PcdVirtioScsiMaxTargetLimit)) {\r
806 Dev->MaxTarget = PcdGet16 (PcdVirtioScsiMaxTargetLimit);\r
807 }\r
808\r
56f65ed8 809 Status = VIRTIO_CFG_READ (Dev, MaxLun, &Dev->MaxLun);\r
37078a63 810 if (EFI_ERROR (Status)) {\r
811 goto Failed;\r
812 }\r
813 if (Dev->MaxLun > PcdGet32 (PcdVirtioScsiMaxLunLimit)) {\r
814 Dev->MaxLun = PcdGet32 (PcdVirtioScsiMaxLunLimit);\r
815 }\r
816\r
56f65ed8 817 Status = VIRTIO_CFG_READ (Dev, MaxSectors, &Dev->MaxSectors);\r
37078a63 818 if (EFI_ERROR (Status)) {\r
819 goto Failed;\r
820 }\r
821 if (Dev->MaxSectors < 2) {\r
822 //\r
823 // We must be able to halve it for bidirectional transfers\r
824 // (see EFI_BAD_BUFFER_SIZE in PopulateRequest()).\r
825 //\r
826 Status = EFI_UNSUPPORTED;\r
827 goto Failed;\r
828 }\r
829\r
39c2d339
LE
830 Features &= VIRTIO_SCSI_F_INOUT | VIRTIO_F_VERSION_1;\r
831\r
832 //\r
833 // In virtio-1.0, feature negotiation is expected to complete before queue\r
834 // discovery, and the device can also reject the selected set of features.\r
835 //\r
836 if (Dev->VirtIo->Revision >= VIRTIO_SPEC_REVISION (1, 0, 0)) {\r
837 Status = Virtio10WriteFeatures (Dev->VirtIo, Features, &NextDevStat);\r
838 if (EFI_ERROR (Status)) {\r
839 goto Failed;\r
840 }\r
841 }\r
842\r
37078a63 843 //\r
844 // step 4b -- allocate request virtqueue\r
845 //\r
56f65ed8 846 Status = Dev->VirtIo->SetQueueSel (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE);\r
37078a63 847 if (EFI_ERROR (Status)) {\r
848 goto Failed;\r
849 }\r
56f65ed8 850 Status = Dev->VirtIo->GetQueueNumMax (Dev->VirtIo, &QueueSize);\r
37078a63 851 if (EFI_ERROR (Status)) {\r
852 goto Failed;\r
853 }\r
854 //\r
855 // VirtioScsiPassThru() uses at most four descriptors\r
856 //\r
857 if (QueueSize < 4) {\r
858 Status = EFI_UNSUPPORTED;\r
859 goto Failed;\r
860 }\r
861\r
fc2c1543 862 Status = VirtioRingInit (Dev->VirtIo, QueueSize, &Dev->Ring);\r
37078a63 863 if (EFI_ERROR (Status)) {\r
864 goto Failed;\r
865 }\r
866\r
fc2168fe
BS
867 //\r
868 // If anything fails from here on, we must release the ring resources\r
869 //\r
870 Status = VirtioRingMap (\r
871 Dev->VirtIo,\r
872 &Dev->Ring,\r
873 &RingBaseShift,\r
874 &Dev->RingMap\r
875 );\r
876 if (EFI_ERROR (Status)) {\r
877 goto ReleaseQueue;\r
878 }\r
879\r
37078a63 880 //\r
56f65ed8 881 // Additional steps for MMIO: align the queue appropriately, and set the\r
fc2168fe 882 // size. If anything fails from here on, we must unmap the ring resources.\r
37078a63 883 //\r
56f65ed8
OM
884 Status = Dev->VirtIo->SetQueueNum (Dev->VirtIo, QueueSize);\r
885 if (EFI_ERROR (Status)) {\r
fc2168fe 886 goto UnmapQueue;\r
56f65ed8
OM
887 }\r
888\r
889 Status = Dev->VirtIo->SetQueueAlign (Dev->VirtIo, EFI_PAGE_SIZE);\r
890 if (EFI_ERROR (Status)) {\r
fc2168fe 891 goto UnmapQueue;\r
56f65ed8
OM
892 }\r
893\r
894 //\r
895 // step 4c -- Report GPFN (guest-physical frame number) of queue.\r
896 //\r
fc2168fe
BS
897 Status = Dev->VirtIo->SetQueueAddress (\r
898 Dev->VirtIo,\r
899 &Dev->Ring,\r
900 RingBaseShift\r
901 );\r
37078a63 902 if (EFI_ERROR (Status)) {\r
fc2168fe 903 goto UnmapQueue;\r
37078a63 904 }\r
905\r
906 //\r
39c2d339 907 // step 5 -- Report understood features and guest-tuneables.\r
37078a63 908 //\r
39c2d339
LE
909 if (Dev->VirtIo->Revision < VIRTIO_SPEC_REVISION (1, 0, 0)) {\r
910 Features &= ~(UINT64)VIRTIO_F_VERSION_1;\r
911 Status = Dev->VirtIo->SetGuestFeatures (Dev->VirtIo, Features);\r
912 if (EFI_ERROR (Status)) {\r
fc2168fe 913 goto UnmapQueue;\r
39c2d339 914 }\r
37078a63 915 }\r
916\r
917 //\r
918 // We expect these maximum sizes from the host. Since they are\r
919 // guest-negotiable, ask for them rather than just checking them.\r
920 //\r
56f65ed8 921 Status = VIRTIO_CFG_WRITE (Dev, CdbSize, VIRTIO_SCSI_CDB_SIZE);\r
37078a63 922 if (EFI_ERROR (Status)) {\r
fc2168fe 923 goto UnmapQueue;\r
37078a63 924 }\r
56f65ed8 925 Status = VIRTIO_CFG_WRITE (Dev, SenseSize, VIRTIO_SCSI_SENSE_SIZE);\r
37078a63 926 if (EFI_ERROR (Status)) {\r
fc2168fe 927 goto UnmapQueue;\r
37078a63 928 }\r
929\r
930 //\r
931 // step 6 -- initialization complete\r
932 //\r
933 NextDevStat |= VSTAT_DRIVER_OK;\r
56f65ed8 934 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 935 if (EFI_ERROR (Status)) {\r
fc2168fe 936 goto UnmapQueue;\r
37078a63 937 }\r
938\r
939 //\r
940 // populate the exported interface's attributes\r
941 //\r
942 Dev->PassThru.Mode = &Dev->PassThruMode;\r
943 Dev->PassThru.PassThru = &VirtioScsiPassThru;\r
944 Dev->PassThru.GetNextTargetLun = &VirtioScsiGetNextTargetLun;\r
945 Dev->PassThru.BuildDevicePath = &VirtioScsiBuildDevicePath;\r
946 Dev->PassThru.GetTargetLun = &VirtioScsiGetTargetLun;\r
947 Dev->PassThru.ResetChannel = &VirtioScsiResetChannel;\r
948 Dev->PassThru.ResetTargetLun = &VirtioScsiResetTargetLun;\r
949 Dev->PassThru.GetNextTarget = &VirtioScsiGetNextTarget;\r
950\r
951 //\r
952 // AdapterId is a target for which no handle will be created during bus scan.\r
953 // Prevent any conflict with real devices.\r
954 //\r
955 Dev->PassThruMode.AdapterId = 0xFFFFFFFF;\r
956\r
957 //\r
958 // Set both physical and logical attributes for non-RAID SCSI channel. See\r
959 // Driver Writer's Guide for UEFI 2.3.1 v1.01, 20.1.5 Implementing Extended\r
960 // SCSI Pass Thru Protocol.\r
961 //\r
962 Dev->PassThruMode.Attributes = EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_PHYSICAL |\r
963 EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_LOGICAL;\r
964\r
965 //\r
966 // no restriction on transfer buffer alignment\r
967 //\r
968 Dev->PassThruMode.IoAlign = 0;\r
969\r
970 return EFI_SUCCESS;\r
971\r
fc2168fe
BS
972UnmapQueue:\r
973 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RingMap);\r
974\r
37078a63 975ReleaseQueue:\r
fc2c1543 976 VirtioRingUninit (Dev->VirtIo, &Dev->Ring);\r
37078a63 977\r
978Failed:\r
979 //\r
980 // Notify the host about our failure to setup: virtio-0.9.5, 2.2.2.1 Device\r
56f65ed8 981 // Status. VirtIo access failure here should not mask the original error.\r
37078a63 982 //\r
983 NextDevStat |= VSTAT_FAILED;\r
56f65ed8 984 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 985\r
986 Dev->InOutSupported = FALSE;\r
987 Dev->MaxTarget = 0;\r
988 Dev->MaxLun = 0;\r
989 Dev->MaxSectors = 0;\r
990\r
991 return Status; // reached only via Failed above\r
992}\r
993\r
994\r
37078a63 995STATIC\r
996VOID\r
997EFIAPI\r
998VirtioScsiUninit (\r
999 IN OUT VSCSI_DEV *Dev\r
1000 )\r
1001{\r
1002 //\r
1003 // Reset the virtual device -- see virtio-0.9.5, 2.2.2.1 Device Status. When\r
1004 // VIRTIO_CFG_WRITE() returns, the host will have learned to stay away from\r
1005 // the old comms area.\r
1006 //\r
56f65ed8 1007 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);\r
37078a63 1008\r
1009 Dev->InOutSupported = FALSE;\r
1010 Dev->MaxTarget = 0;\r
1011 Dev->MaxLun = 0;\r
1012 Dev->MaxSectors = 0;\r
1013\r
fc2168fe 1014 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RingMap);\r
fc2c1543 1015 VirtioRingUninit (Dev->VirtIo, &Dev->Ring);\r
37078a63 1016\r
1017 SetMem (&Dev->PassThru, sizeof Dev->PassThru, 0x00);\r
1018 SetMem (&Dev->PassThruMode, sizeof Dev->PassThruMode, 0x00);\r
1019}\r
1020\r
1021\r
fbc80813
LE
1022//\r
1023// Event notification function enqueued by ExitBootServices().\r
1024//\r
1025\r
1026STATIC\r
1027VOID\r
1028EFIAPI\r
1029VirtioScsiExitBoot (\r
1030 IN EFI_EVENT Event,\r
1031 IN VOID *Context\r
1032 )\r
1033{\r
1034 VSCSI_DEV *Dev;\r
1035\r
1036 //\r
1037 // Reset the device. This causes the hypervisor to forget about the virtio\r
1038 // ring.\r
1039 //\r
1040 // We allocated said ring in EfiBootServicesData type memory, and code\r
1041 // executing after ExitBootServices() is permitted to overwrite it.\r
1042 //\r
1043 Dev = Context;\r
1044 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);\r
fc2168fe
BS
1045\r
1046 //\r
1047 // Unmap the ring buffer so that hypervisor will not be able to get\r
1048 // readable data after device reset.\r
1049 //\r
1050 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RingMap);\r
fbc80813
LE
1051}\r
1052\r
1053\r
37078a63 1054//\r
1055// Probe, start and stop functions of this driver, called by the DXE core for\r
1056// specific devices.\r
1057//\r
1058// The following specifications document these interfaces:\r
1059// - Driver Writer's Guide for UEFI 2.3.1 v1.01, 9 Driver Binding Protocol\r
1060// - UEFI Spec 2.3.1 + Errata C, 10.1 EFI Driver Binding Protocol\r
1061//\r
1062// The implementation follows:\r
1063// - Driver Writer's Guide for UEFI 2.3.1 v1.01\r
1064// - 5.1.3.4 OpenProtocol() and CloseProtocol()\r
37078a63 1065// - UEFI Spec 2.3.1 + Errata C\r
1066// - 6.3 Protocol Handler Services\r
37078a63 1067//\r
1068\r
1069EFI_STATUS\r
1070EFIAPI\r
1071VirtioScsiDriverBindingSupported (\r
1072 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1073 IN EFI_HANDLE DeviceHandle,\r
1074 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
1075 )\r
1076{\r
56f65ed8
OM
1077 EFI_STATUS Status;\r
1078 VIRTIO_DEVICE_PROTOCOL *VirtIo;\r
37078a63 1079\r
1080 //\r
56f65ed8
OM
1081 // Attempt to open the device with the VirtIo set of interfaces. On success,\r
1082 // the protocol is "instantiated" for the VirtIo device. Covers duplicate open\r
37078a63 1083 // attempts (EFI_ALREADY_STARTED).\r
1084 //\r
1085 Status = gBS->OpenProtocol (\r
1086 DeviceHandle, // candidate device\r
56f65ed8
OM
1087 &gVirtioDeviceProtocolGuid, // for generic VirtIo access\r
1088 (VOID **)&VirtIo, // handle to instantiate\r
37078a63 1089 This->DriverBindingHandle, // requestor driver identity\r
1090 DeviceHandle, // ControllerHandle, according to\r
1091 // the UEFI Driver Model\r
56f65ed8 1092 EFI_OPEN_PROTOCOL_BY_DRIVER // get exclusive VirtIo access to\r
37078a63 1093 // the device; to be released\r
1094 );\r
1095 if (EFI_ERROR (Status)) {\r
1096 return Status;\r
1097 }\r
1098\r
56f65ed8
OM
1099 if (VirtIo->SubSystemDeviceId != VIRTIO_SUBSYSTEM_SCSI_HOST) {\r
1100 Status = EFI_UNSUPPORTED;\r
37078a63 1101 }\r
1102\r
1103 //\r
56f65ed8 1104 // We needed VirtIo access only transitorily, to see whether we support the\r
37078a63 1105 // device or not.\r
1106 //\r
56f65ed8 1107 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1108 This->DriverBindingHandle, DeviceHandle);\r
1109 return Status;\r
1110}\r
1111\r
1112\r
1113EFI_STATUS\r
1114EFIAPI\r
1115VirtioScsiDriverBindingStart (\r
1116 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1117 IN EFI_HANDLE DeviceHandle,\r
1118 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
1119 )\r
1120{\r
1121 VSCSI_DEV *Dev;\r
1122 EFI_STATUS Status;\r
1123\r
1124 Dev = (VSCSI_DEV *) AllocateZeroPool (sizeof *Dev);\r
1125 if (Dev == NULL) {\r
1126 return EFI_OUT_OF_RESOURCES;\r
1127 }\r
1128\r
56f65ed8
OM
1129 Status = gBS->OpenProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
1130 (VOID **)&Dev->VirtIo, This->DriverBindingHandle,\r
37078a63 1131 DeviceHandle, EFI_OPEN_PROTOCOL_BY_DRIVER);\r
1132 if (EFI_ERROR (Status)) {\r
1133 goto FreeVirtioScsi;\r
1134 }\r
1135\r
1136 //\r
56f65ed8 1137 // VirtIo access granted, configure virtio-scsi device.\r
37078a63 1138 //\r
1139 Status = VirtioScsiInit (Dev);\r
1140 if (EFI_ERROR (Status)) {\r
56f65ed8 1141 goto CloseVirtIo;\r
37078a63 1142 }\r
1143\r
fbc80813
LE
1144 Status = gBS->CreateEvent (EVT_SIGNAL_EXIT_BOOT_SERVICES, TPL_CALLBACK,\r
1145 &VirtioScsiExitBoot, Dev, &Dev->ExitBoot);\r
1146 if (EFI_ERROR (Status)) {\r
1147 goto UninitDev;\r
1148 }\r
1149\r
37078a63 1150 //\r
1151 // Setup complete, attempt to export the driver instance's PassThru\r
1152 // interface.\r
1153 //\r
1154 Dev->Signature = VSCSI_SIG;\r
1155 Status = gBS->InstallProtocolInterface (&DeviceHandle,\r
1156 &gEfiExtScsiPassThruProtocolGuid, EFI_NATIVE_INTERFACE,\r
1157 &Dev->PassThru);\r
1158 if (EFI_ERROR (Status)) {\r
fbc80813 1159 goto CloseExitBoot;\r
37078a63 1160 }\r
1161\r
1162 return EFI_SUCCESS;\r
1163\r
fbc80813
LE
1164CloseExitBoot:\r
1165 gBS->CloseEvent (Dev->ExitBoot);\r
1166\r
37078a63 1167UninitDev:\r
1168 VirtioScsiUninit (Dev);\r
1169\r
56f65ed8
OM
1170CloseVirtIo:\r
1171 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1172 This->DriverBindingHandle, DeviceHandle);\r
1173\r
1174FreeVirtioScsi:\r
1175 FreePool (Dev);\r
1176\r
1177 return Status;\r
1178}\r
1179\r
1180\r
1181EFI_STATUS\r
1182EFIAPI\r
1183VirtioScsiDriverBindingStop (\r
1184 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1185 IN EFI_HANDLE DeviceHandle,\r
1186 IN UINTN NumberOfChildren,\r
1187 IN EFI_HANDLE *ChildHandleBuffer\r
1188 )\r
1189{\r
1190 EFI_STATUS Status;\r
1191 EFI_EXT_SCSI_PASS_THRU_PROTOCOL *PassThru;\r
1192 VSCSI_DEV *Dev;\r
1193\r
1194 Status = gBS->OpenProtocol (\r
1195 DeviceHandle, // candidate device\r
1196 &gEfiExtScsiPassThruProtocolGuid, // retrieve the SCSI iface\r
1197 (VOID **)&PassThru, // target pointer\r
1198 This->DriverBindingHandle, // requestor driver ident.\r
1199 DeviceHandle, // lookup req. for dev.\r
1200 EFI_OPEN_PROTOCOL_GET_PROTOCOL // lookup only, no new ref.\r
1201 );\r
1202 if (EFI_ERROR (Status)) {\r
1203 return Status;\r
1204 }\r
1205\r
1206 Dev = VIRTIO_SCSI_FROM_PASS_THRU (PassThru);\r
1207\r
1208 //\r
1209 // Handle Stop() requests for in-use driver instances gracefully.\r
1210 //\r
1211 Status = gBS->UninstallProtocolInterface (DeviceHandle,\r
1212 &gEfiExtScsiPassThruProtocolGuid, &Dev->PassThru);\r
1213 if (EFI_ERROR (Status)) {\r
1214 return Status;\r
1215 }\r
1216\r
fbc80813
LE
1217 gBS->CloseEvent (Dev->ExitBoot);\r
1218\r
37078a63 1219 VirtioScsiUninit (Dev);\r
1220\r
56f65ed8 1221 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1222 This->DriverBindingHandle, DeviceHandle);\r
1223\r
1224 FreePool (Dev);\r
1225\r
1226 return EFI_SUCCESS;\r
1227}\r
1228\r
1229\r
1230//\r
1231// The static object that groups the Supported() (ie. probe), Start() and\r
1232// Stop() functions of the driver together. Refer to UEFI Spec 2.3.1 + Errata\r
1233// C, 10.1 EFI Driver Binding Protocol.\r
1234//\r
1235STATIC EFI_DRIVER_BINDING_PROTOCOL gDriverBinding = {\r
1236 &VirtioScsiDriverBindingSupported,\r
1237 &VirtioScsiDriverBindingStart,\r
1238 &VirtioScsiDriverBindingStop,\r
1239 0x10, // Version, must be in [0x10 .. 0xFFFFFFEF] for IHV-developed drivers\r
1240 NULL, // ImageHandle, to be overwritten by\r
1241 // EfiLibInstallDriverBindingComponentName2() in VirtioScsiEntryPoint()\r
1242 NULL // DriverBindingHandle, ditto\r
1243};\r
1244\r
1245\r
1246//\r
1247// The purpose of the following scaffolding (EFI_COMPONENT_NAME_PROTOCOL and\r
1248// EFI_COMPONENT_NAME2_PROTOCOL implementation) is to format the driver's name\r
1249// in English, for display on standard console devices. This is recommended for\r
1250// UEFI drivers that follow the UEFI Driver Model. Refer to the Driver Writer's\r
1251// Guide for UEFI 2.3.1 v1.01, 11 UEFI Driver and Controller Names.\r
1252//\r
1253// Device type names ("Virtio SCSI Host Device") are not formatted because the\r
1254// driver supports only that device type. Therefore the driver name suffices\r
1255// for unambiguous identification.\r
1256//\r
1257\r
1258STATIC\r
1259EFI_UNICODE_STRING_TABLE mDriverNameTable[] = {\r
1260 { "eng;en", L"Virtio SCSI Host Driver" },\r
1261 { NULL, NULL }\r
1262};\r
1263\r
1264STATIC\r
1265EFI_COMPONENT_NAME_PROTOCOL gComponentName;\r
1266\r
1267EFI_STATUS\r
1268EFIAPI\r
1269VirtioScsiGetDriverName (\r
1270 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1271 IN CHAR8 *Language,\r
1272 OUT CHAR16 **DriverName\r
1273 )\r
1274{\r
1275 return LookupUnicodeString2 (\r
1276 Language,\r
1277 This->SupportedLanguages,\r
1278 mDriverNameTable,\r
1279 DriverName,\r
1280 (BOOLEAN)(This == &gComponentName) // Iso639Language\r
1281 );\r
1282}\r
1283\r
1284EFI_STATUS\r
1285EFIAPI\r
1286VirtioScsiGetDeviceName (\r
1287 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1288 IN EFI_HANDLE DeviceHandle,\r
1289 IN EFI_HANDLE ChildHandle,\r
1290 IN CHAR8 *Language,\r
1291 OUT CHAR16 **ControllerName\r
1292 )\r
1293{\r
1294 return EFI_UNSUPPORTED;\r
1295}\r
1296\r
1297STATIC\r
1298EFI_COMPONENT_NAME_PROTOCOL gComponentName = {\r
1299 &VirtioScsiGetDriverName,\r
1300 &VirtioScsiGetDeviceName,\r
1301 "eng" // SupportedLanguages, ISO 639-2 language codes\r
1302};\r
1303\r
1304STATIC\r
1305EFI_COMPONENT_NAME2_PROTOCOL gComponentName2 = {\r
1306 (EFI_COMPONENT_NAME2_GET_DRIVER_NAME) &VirtioScsiGetDriverName,\r
1307 (EFI_COMPONENT_NAME2_GET_CONTROLLER_NAME) &VirtioScsiGetDeviceName,\r
1308 "en" // SupportedLanguages, RFC 4646 language codes\r
1309};\r
1310\r
1311\r
1312//\r
1313// Entry point of this driver.\r
1314//\r
1315EFI_STATUS\r
1316EFIAPI\r
1317VirtioScsiEntryPoint (\r
1318 IN EFI_HANDLE ImageHandle,\r
1319 IN EFI_SYSTEM_TABLE *SystemTable\r
1320 )\r
1321{\r
1322 return EfiLibInstallDriverBindingComponentName2 (\r
1323 ImageHandle,\r
1324 SystemTable,\r
1325 &gDriverBinding,\r
1326 ImageHandle,\r
1327 &gComponentName,\r
1328 &gComponentName2\r
1329 );\r
1330}\r