]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/VirtioScsiDxe/VirtioScsi.c
OvmfPkg: Removed magic values for the Virtio Sub-System ID in the PCI device drivers
[mirror_edk2.git] / OvmfPkg / VirtioScsiDxe / VirtioScsi.c
CommitLineData
37078a63 1/** @file\r
2\r
3 This driver produces Extended SCSI Pass Thru Protocol instances for\r
4 virtio-scsi devices.\r
5\r
6 The implementation is basic:\r
7\r
8 - No hotplug / hot-unplug.\r
9\r
10 - Although EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() could be a good match\r
11 for multiple in-flight virtio-scsi requests, we stick to synchronous\r
12 requests for now.\r
13\r
14 - Timeouts are not supported for EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru().\r
15\r
16 - Only one channel is supported. (At the time of this writing, host-side\r
17 virtio-scsi supports a single channel too.)\r
18\r
19 - Only one request queue is used (for the one synchronous request).\r
20\r
21 - The ResetChannel() and ResetTargetLun() functions of\r
22 EFI_EXT_SCSI_PASS_THRU_PROTOCOL are not supported (which is allowed by the\r
23 UEFI 2.3.1 Errata C specification), although\r
24 VIRTIO_SCSI_T_TMF_LOGICAL_UNIT_RESET could be a good match. That would\r
25 however require client code for the control queue, which is deemed\r
26 unreasonable for now.\r
27\r
28 Copyright (C) 2012, Red Hat, Inc.\r
29 Copyright (c) 2012, Intel Corporation. All rights reserved.<BR>\r
30\r
31 This program and the accompanying materials are licensed and made available\r
32 under the terms and conditions of the BSD License which accompanies this\r
33 distribution. The full text of the license may be found at\r
34 http://opensource.org/licenses/bsd-license.php\r
35\r
36 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT\r
37 WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
38\r
39**/\r
40\r
41#include <IndustryStandard/Pci.h>\r
42#include <IndustryStandard/VirtioScsi.h>\r
43#include <Library/BaseMemoryLib.h>\r
44#include <Library/DebugLib.h>\r
45#include <Library/MemoryAllocationLib.h>\r
46#include <Library/UefiBootServicesTableLib.h>\r
47#include <Library/UefiLib.h>\r
48#include <Library/VirtioLib.h>\r
49\r
50#include "VirtioScsi.h"\r
51\r
52/**\r
53\r
54 Convenience macros to read and write region 0 IO space elements of the\r
55 virtio-scsi PCI device, for configuration purposes.\r
56\r
57 The following macros make it possible to specify only the "core parameters"\r
58 for such accesses and to derive the rest. By the time VIRTIO_CFG_WRITE()\r
59 returns, the transaction will have been completed.\r
60\r
61 @param[in] Dev Pointer to the VSCSI_DEV structure whose PCI IO space\r
62 we're accessing. Dev->PciIo must be valid.\r
63\r
64 @param[in] Field A field name from VSCSI_HDR, identifying the virtio-scsi\r
65 configuration item to access.\r
66\r
67 @param[in] Value (VIRTIO_CFG_WRITE() only.) The value to write to the\r
68 selected configuration item.\r
69\r
70 @param[out] Pointer (VIRTIO_CFG_READ() only.) The object to receive the\r
71 value read from the configuration item. Its type must be\r
72 one of UINT8, UINT16, UINT32, UINT64.\r
73\r
74\r
75 @return Status codes returned by VirtioWrite() / VirtioRead().\r
76\r
77**/\r
78\r
79#define VIRTIO_CFG_WRITE(Dev, Field, Value) (VirtioWrite ( \\r
80 (Dev)->PciIo, \\r
81 OFFSET_OF_VSCSI (Field), \\r
82 SIZE_OF_VSCSI (Field), \\r
83 (Value) \\r
84 ))\r
85\r
86#define VIRTIO_CFG_READ(Dev, Field, Pointer) (VirtioRead ( \\r
87 (Dev)->PciIo, \\r
88 OFFSET_OF_VSCSI (Field), \\r
89 SIZE_OF_VSCSI (Field), \\r
90 sizeof *(Pointer), \\r
91 (Pointer) \\r
92 ))\r
93\r
94\r
95//\r
96// UEFI Spec 2.3.1 + Errata C, 14.7 Extended SCSI Pass Thru Protocol specifies\r
97// the PassThru() interface. Beside returning a status code, the function must\r
98// set some fields in the EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET in/out\r
99// parameter on return. The following is a full list of those fields, for\r
100// easier validation of PopulateRequest(), ParseResponse(), and\r
101// VirtioScsiPassThru() below.\r
102//\r
103// - InTransferLength\r
104// - OutTransferLength\r
105// - HostAdapterStatus\r
106// - TargetStatus\r
107// - SenseDataLength\r
108// - SenseData\r
109//\r
110// On any return from the PassThru() interface, these fields must be set,\r
111// except if the returned status code is explicitly exempt. (Actually the\r
112// implementation here conservatively sets these fields even in case not all\r
113// of them would be required by the specification.)\r
114//\r
115\r
116/**\r
117\r
118 Populate a virtio-scsi request from the Extended SCSI Pass Thru Protocol\r
119 packet.\r
120\r
121 The caller is responsible for pre-zeroing the virtio-scsi request. The\r
122 Extended SCSI Pass Thru Protocol packet is modified, to be forwarded outwards\r
123 by VirtioScsiPassThru(), if invalid or unsupported parameters are detected.\r
124\r
125 @param[in] Dev The virtio-scsi host device the packet targets.\r
126\r
127 @param[in] Target The SCSI target controlled by the virtio-scsi host\r
128 device.\r
129\r
130 @param[in] Lun The Logical Unit Number under the SCSI target.\r
131\r
132 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet the\r
133 function translates to a virtio-scsi request. On\r
134 failure this parameter relays error contents.\r
135\r
136 @param[out] Request The pre-zeroed virtio-scsi request to populate. This\r
137 parameter is volatile-qualified because we expect the\r
138 caller to append it to a virtio ring, thus\r
139 assignments to Request must be visible when the\r
140 function returns.\r
141\r
142\r
143 @retval EFI_SUCCESS The Extended SCSI Pass Thru Protocol packet was valid,\r
144 Request has been populated.\r
145\r
146 @return Otherwise, invalid or unsupported parameters were\r
147 detected. Status codes are meant for direct forwarding\r
148 by the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru()\r
149 implementation.\r
150\r
151**/\r
152STATIC\r
153EFI_STATUS\r
154EFIAPI\r
155PopulateRequest (\r
156 IN CONST VSCSI_DEV *Dev,\r
157 IN UINT16 Target,\r
158 IN UINT64 Lun,\r
159 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
160 OUT volatile VIRTIO_SCSI_REQ *Request\r
161 )\r
162{\r
163 UINTN Idx;\r
164\r
165 if (\r
166 //\r
167 // bidirectional transfer was requested, but the host doesn't support it\r
168 //\r
169 (Packet->InTransferLength > 0 && Packet->OutTransferLength > 0 &&\r
170 !Dev->InOutSupported) ||\r
171\r
172 //\r
173 // a target / LUN was addressed that's impossible to encode for the host\r
174 //\r
175 Target > 0xFF || Lun >= 0x4000 ||\r
176\r
177 //\r
178 // Command Descriptor Block bigger than VIRTIO_SCSI_CDB_SIZE\r
179 //\r
180 Packet->CdbLength > VIRTIO_SCSI_CDB_SIZE ||\r
181\r
182 //\r
183 // From virtio-0.9.5, 2.3.2 Descriptor Table:\r
184 // "no descriptor chain may be more than 2^32 bytes long in total".\r
185 //\r
186 (UINT64) Packet->InTransferLength + Packet->OutTransferLength > SIZE_1GB\r
187 ) {\r
188\r
189 //\r
190 // this error code doesn't require updates to the Packet output fields\r
191 //\r
192 return EFI_UNSUPPORTED;\r
193 }\r
194\r
195 if (\r
196 //\r
197 // addressed invalid device\r
198 //\r
199 Target > Dev->MaxTarget || Lun > Dev->MaxLun ||\r
200\r
201 //\r
202 // invalid direction (there doesn't seem to be a macro for the "no data\r
203 // transferred" "direction", eg. for TEST UNIT READY)\r
204 //\r
205 Packet->DataDirection > EFI_EXT_SCSI_DATA_DIRECTION_BIDIRECTIONAL ||\r
206\r
207 //\r
208 // trying to receive, but destination pointer is NULL, or contradicting\r
209 // transfer direction\r
210 //\r
211 (Packet->InTransferLength > 0 &&\r
212 (Packet->InDataBuffer == NULL ||\r
213 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_WRITE\r
214 )\r
215 ) ||\r
216\r
217 //\r
218 // trying to send, but source pointer is NULL, or contradicting transfer\r
219 // direction\r
220 //\r
221 (Packet->OutTransferLength > 0 &&\r
222 (Packet->OutDataBuffer == NULL ||\r
223 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_READ\r
224 )\r
225 )\r
226 ) {\r
227\r
228 //\r
229 // this error code doesn't require updates to the Packet output fields\r
230 //\r
231 return EFI_INVALID_PARAMETER;\r
232 }\r
233\r
234 //\r
235 // Catch oversized requests eagerly. If this condition evaluates to false,\r
236 // then the combined size of a bidirectional request will not exceed the\r
237 // virtio-scsi device's transfer limit either.\r
238 //\r
239 if (ALIGN_VALUE (Packet->OutTransferLength, 512) / 512\r
240 > Dev->MaxSectors / 2 ||\r
241 ALIGN_VALUE (Packet->InTransferLength, 512) / 512\r
242 > Dev->MaxSectors / 2) {\r
243 Packet->InTransferLength = (Dev->MaxSectors / 2) * 512;\r
244 Packet->OutTransferLength = (Dev->MaxSectors / 2) * 512;\r
245 Packet->HostAdapterStatus =\r
246 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
247 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
248 Packet->SenseDataLength = 0;\r
249 return EFI_BAD_BUFFER_SIZE;\r
250 }\r
251\r
252 //\r
253 // target & LUN encoding: see virtio-0.9.5, Appendix I: SCSI Host Device,\r
254 // Device Operation: request queues\r
255 //\r
256 Request->Lun[0] = 1;\r
257 Request->Lun[1] = (UINT8) Target;\r
258 Request->Lun[2] = (UINT8) ((Lun >> 8) | 0x40);\r
259 Request->Lun[3] = (UINT8) Lun;\r
260\r
261 //\r
262 // CopyMem() would cast away the "volatile" qualifier before access, which is\r
263 // undefined behavior (ISO C99 6.7.3p5)\r
264 //\r
265 for (Idx = 0; Idx < Packet->CdbLength; ++Idx) {\r
266 Request->Cdb[Idx] = ((UINT8 *) Packet->Cdb)[Idx];\r
267 }\r
268\r
269 return EFI_SUCCESS;\r
270}\r
271\r
272\r
273/**\r
274\r
275 Parse the virtio-scsi device's response, translate it to an EFI status code,\r
276 and update the Extended SCSI Pass Thru Protocol packet, to be returned by\r
277 the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() implementation.\r
278\r
279 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet that has\r
280 been translated to a virtio-scsi request with\r
281 PopulateRequest(), and processed by the host. On\r
282 output this parameter is updated with response or\r
283 error contents.\r
284\r
285 @param[in] Response The virtio-scsi response structure to parse. We expect\r
286 it to come from a virtio ring, thus it is qualified\r
287 volatile.\r
288\r
289\r
290 @return PassThru() status codes mandated by UEFI Spec 2.3.1 + Errata C, 14.7\r
291 Extended SCSI Pass Thru Protocol.\r
292\r
293**/\r
294STATIC\r
295EFI_STATUS\r
296EFIAPI\r
297ParseResponse (\r
298 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
299 IN CONST volatile VIRTIO_SCSI_RESP *Response\r
300 )\r
301{\r
302 UINTN ResponseSenseLen;\r
303 UINTN Idx;\r
304\r
305 //\r
306 // return sense data (length and contents) in all cases, truncated if needed\r
307 //\r
308 ResponseSenseLen = MIN (Response->SenseLen, VIRTIO_SCSI_SENSE_SIZE);\r
309 if (Packet->SenseDataLength > ResponseSenseLen) {\r
310 Packet->SenseDataLength = (UINT8) ResponseSenseLen;\r
311 }\r
312 for (Idx = 0; Idx < Packet->SenseDataLength; ++Idx) {\r
313 ((UINT8 *) Packet->SenseData)[Idx] = Response->Sense[Idx];\r
314 }\r
315\r
316 //\r
317 // Report actual transfer lengths. The logic below covers all three\r
318 // DataDirections (read, write, bidirectional).\r
319 //\r
320 // -+- @ 0\r
321 // |\r
322 // | write ^ @ Residual (unprocessed)\r
323 // | |\r
324 // -+- @ OutTransferLength -+- @ InTransferLength\r
325 // | |\r
326 // | read |\r
327 // | |\r
328 // V @ OutTransferLength + InTransferLength -+- @ 0\r
329 //\r
330 if (Response->Residual <= Packet->InTransferLength) {\r
331 Packet->InTransferLength -= Response->Residual;\r
332 }\r
333 else {\r
334 Packet->OutTransferLength -= Response->Residual - Packet->InTransferLength;\r
335 Packet->InTransferLength = 0;\r
336 }\r
337\r
338 //\r
339 // report target status in all cases\r
340 //\r
341 Packet->TargetStatus = Response->Status;\r
342\r
343 //\r
344 // host adapter status and function return value depend on virtio-scsi\r
345 // response code\r
346 //\r
347 switch (Response->Response) {\r
348 case VIRTIO_SCSI_S_OK:\r
349 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
350 return EFI_SUCCESS;\r
351\r
352 case VIRTIO_SCSI_S_OVERRUN:\r
353 Packet->HostAdapterStatus =\r
354 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
355 break;\r
356\r
357 case VIRTIO_SCSI_S_BAD_TARGET:\r
358 //\r
359 // This is non-intuitive but explicitly required by the\r
360 // EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() specification for\r
361 // disconnected (but otherwise valid) target / LUN addresses.\r
362 //\r
363 Packet->HostAdapterStatus =\r
364 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_TIMEOUT_COMMAND;\r
365 return EFI_TIMEOUT;\r
366\r
367 case VIRTIO_SCSI_S_RESET:\r
368 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_BUS_RESET;\r
369 break;\r
370\r
371 case VIRTIO_SCSI_S_BUSY:\r
372 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
373 return EFI_NOT_READY;\r
374\r
375 //\r
376 // Lump together the rest. The mapping for VIRTIO_SCSI_S_ABORTED is\r
377 // intentional as well, not an oversight.\r
378 //\r
379 case VIRTIO_SCSI_S_ABORTED:\r
380 case VIRTIO_SCSI_S_TRANSPORT_FAILURE:\r
381 case VIRTIO_SCSI_S_TARGET_FAILURE:\r
382 case VIRTIO_SCSI_S_NEXUS_FAILURE:\r
383 case VIRTIO_SCSI_S_FAILURE:\r
384 default:\r
385 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
386 }\r
387\r
388 return EFI_DEVICE_ERROR;\r
389}\r
390\r
391\r
392//\r
393// The next seven functions implement EFI_EXT_SCSI_PASS_THRU_PROTOCOL\r
394// for the virtio-scsi HBA. Refer to UEFI Spec 2.3.1 + Errata C, sections\r
395// - 14.1 SCSI Driver Model Overview,\r
396// - 14.7 Extended SCSI Pass Thru Protocol.\r
397//\r
398\r
399EFI_STATUS\r
400EFIAPI\r
401VirtioScsiPassThru (\r
402 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
403 IN UINT8 *Target,\r
404 IN UINT64 Lun,\r
405 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
406 IN EFI_EVENT Event OPTIONAL\r
407 )\r
408{\r
409 VSCSI_DEV *Dev;\r
410 UINT16 TargetValue;\r
411 EFI_STATUS Status;\r
412 volatile VIRTIO_SCSI_REQ Request;\r
413 volatile VIRTIO_SCSI_RESP Response;\r
414 DESC_INDICES Indices;\r
415\r
151304d9 416 ZeroMem ((VOID*) &Request, sizeof (Request));\r
417 ZeroMem ((VOID*) &Response, sizeof (Response));\r
37078a63 418\r
419 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
420 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
421\r
422 Status = PopulateRequest (Dev, TargetValue, Lun, Packet, &Request);\r
423 if (EFI_ERROR (Status)) {\r
424 return Status;\r
425 }\r
426\r
427 VirtioPrepare (&Dev->Ring, &Indices);\r
428\r
429 //\r
430 // preset a host status for ourselves that we do not accept as success\r
431 //\r
432 Response.Response = VIRTIO_SCSI_S_FAILURE;\r
433\r
434 //\r
435 // ensured by VirtioScsiInit() -- this predicate, in combination with the\r
436 // lock-step progress, ensures we don't have to track free descriptors.\r
437 //\r
438 ASSERT (Dev->Ring.QueueSize >= 4);\r
439\r
440 //\r
441 // enqueue Request\r
442 //\r
443 VirtioAppendDesc (&Dev->Ring, (UINTN) &Request, sizeof Request,\r
444 VRING_DESC_F_NEXT, &Indices);\r
445\r
446 //\r
447 // enqueue "dataout" if any\r
448 //\r
449 if (Packet->OutTransferLength > 0) {\r
450 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->OutDataBuffer,\r
451 Packet->OutTransferLength, VRING_DESC_F_NEXT, &Indices);\r
452 }\r
453\r
454 //\r
455 // enqueue Response, to be written by the host\r
456 //\r
457 VirtioAppendDesc (&Dev->Ring, (UINTN) &Response, sizeof Response,\r
458 VRING_DESC_F_WRITE | (Packet->InTransferLength > 0 ?\r
459 VRING_DESC_F_NEXT : 0),\r
460 &Indices);\r
461\r
462 //\r
463 // enqueue "datain" if any, to be written by the host\r
464 //\r
465 if (Packet->InTransferLength > 0) {\r
466 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->InDataBuffer,\r
467 Packet->InTransferLength, VRING_DESC_F_WRITE, &Indices);\r
468 }\r
469\r
470 // If kicking the host fails, we must fake a host adapter error.\r
471 // EFI_NOT_READY would save us the effort, but it would also suggest that the\r
472 // caller retry.\r
473 //\r
474 if (VirtioFlush (Dev->PciIo, VIRTIO_SCSI_REQUEST_QUEUE, &Dev->Ring,\r
475 &Indices) != EFI_SUCCESS) {\r
476 Packet->InTransferLength = 0;\r
477 Packet->OutTransferLength = 0;\r
478 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
479 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
480 Packet->SenseDataLength = 0;\r
481 return EFI_DEVICE_ERROR;\r
482 }\r
483\r
484 return ParseResponse (Packet, &Response);\r
485}\r
486\r
487\r
488EFI_STATUS\r
489EFIAPI\r
490VirtioScsiGetNextTargetLun (\r
491 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
492 IN OUT UINT8 **TargetPointer,\r
493 IN OUT UINT64 *Lun\r
494 )\r
495{\r
496 UINT8 *Target;\r
497 UINTN Idx;\r
498 UINT16 LastTarget;\r
499 VSCSI_DEV *Dev;\r
500\r
501 //\r
502 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
503 //\r
504 Target = *TargetPointer;\r
505\r
506 //\r
507 // Search for first non-0xFF byte. If not found, return first target & LUN.\r
508 //\r
509 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
510 ;\r
511 if (Idx == TARGET_MAX_BYTES) {\r
512 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
513 *Lun = 0;\r
514 return EFI_SUCCESS;\r
515 }\r
516\r
517 //\r
518 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
519 //\r
520 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
521\r
522 //\r
523 // increment (target, LUN) pair if valid on input\r
524 //\r
525 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
526 if (LastTarget > Dev->MaxTarget || *Lun > Dev->MaxLun) {\r
527 return EFI_INVALID_PARAMETER;\r
528 }\r
529\r
530 if (*Lun < Dev->MaxLun) {\r
531 ++*Lun;\r
532 return EFI_SUCCESS;\r
533 }\r
534\r
535 if (LastTarget < Dev->MaxTarget) {\r
536 *Lun = 0;\r
537 ++LastTarget;\r
538 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
539 return EFI_SUCCESS;\r
540 }\r
541\r
542 return EFI_NOT_FOUND;\r
543}\r
544\r
545\r
546EFI_STATUS\r
547EFIAPI\r
548VirtioScsiBuildDevicePath (\r
549 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
550 IN UINT8 *Target,\r
551 IN UINT64 Lun,\r
552 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath\r
553 )\r
554{\r
555 UINT16 TargetValue;\r
556 VSCSI_DEV *Dev;\r
557 SCSI_DEVICE_PATH *ScsiDevicePath;\r
558\r
559 if (DevicePath == NULL) {\r
560 return EFI_INVALID_PARAMETER;\r
561 }\r
562\r
563 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
564 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
565 if (TargetValue > Dev->MaxTarget || Lun > Dev->MaxLun || Lun > 0xFFFF) {\r
566 return EFI_NOT_FOUND;\r
567 }\r
568\r
569 ScsiDevicePath = AllocatePool (sizeof *ScsiDevicePath);\r
570 if (ScsiDevicePath == NULL) {\r
571 return EFI_OUT_OF_RESOURCES;\r
572 }\r
573\r
574 ScsiDevicePath->Header.Type = MESSAGING_DEVICE_PATH;\r
575 ScsiDevicePath->Header.SubType = MSG_SCSI_DP;\r
576 ScsiDevicePath->Header.Length[0] = (UINT8) sizeof *ScsiDevicePath;\r
577 ScsiDevicePath->Header.Length[1] = (UINT8) (sizeof *ScsiDevicePath >> 8);\r
578 ScsiDevicePath->Pun = TargetValue;\r
579 ScsiDevicePath->Lun = (UINT16) Lun;\r
580\r
581 *DevicePath = &ScsiDevicePath->Header;\r
582 return EFI_SUCCESS;\r
583}\r
584\r
585\r
586EFI_STATUS\r
587EFIAPI\r
588VirtioScsiGetTargetLun (\r
589 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
590 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,\r
591 OUT UINT8 **TargetPointer,\r
592 OUT UINT64 *Lun\r
593 )\r
594{\r
595 SCSI_DEVICE_PATH *ScsiDevicePath;\r
596 VSCSI_DEV *Dev;\r
597 UINT8 *Target;\r
598\r
599 if (DevicePath == NULL || TargetPointer == NULL || *TargetPointer == NULL ||\r
600 Lun == NULL) {\r
601 return EFI_INVALID_PARAMETER;\r
602 }\r
603\r
604 if (DevicePath->Type != MESSAGING_DEVICE_PATH ||\r
605 DevicePath->SubType != MSG_SCSI_DP) {\r
606 return EFI_UNSUPPORTED;\r
607 }\r
608\r
609 ScsiDevicePath = (SCSI_DEVICE_PATH *) DevicePath;\r
610 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
611 if (ScsiDevicePath->Pun > Dev->MaxTarget ||\r
612 ScsiDevicePath->Lun > Dev->MaxLun) {\r
613 return EFI_NOT_FOUND;\r
614 }\r
615\r
616 //\r
617 // a) the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
618 // b) see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
619 // c) ScsiDevicePath->Pun is an UINT16\r
620 //\r
621 Target = *TargetPointer;\r
622 CopyMem (Target, &ScsiDevicePath->Pun, 2);\r
623 SetMem (Target + 2, TARGET_MAX_BYTES - 2, 0x00);\r
624\r
625 *Lun = ScsiDevicePath->Lun;\r
626 return EFI_SUCCESS;\r
627}\r
628\r
629\r
630EFI_STATUS\r
631EFIAPI\r
632VirtioScsiResetChannel (\r
633 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This\r
634 )\r
635{\r
636 return EFI_UNSUPPORTED;\r
637}\r
638\r
639\r
640EFI_STATUS\r
641EFIAPI\r
642VirtioScsiResetTargetLun (\r
643 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
644 IN UINT8 *Target,\r
645 IN UINT64 Lun\r
646 )\r
647{\r
648 return EFI_UNSUPPORTED;\r
649}\r
650\r
651\r
652EFI_STATUS\r
653EFIAPI\r
654VirtioScsiGetNextTarget (\r
655 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
656 IN OUT UINT8 **TargetPointer\r
657 )\r
658{\r
659 UINT8 *Target;\r
660 UINTN Idx;\r
661 UINT16 LastTarget;\r
662 VSCSI_DEV *Dev;\r
663\r
664 //\r
665 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
666 //\r
667 Target = *TargetPointer;\r
668\r
669 //\r
670 // Search for first non-0xFF byte. If not found, return first target.\r
671 //\r
672 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
673 ;\r
674 if (Idx == TARGET_MAX_BYTES) {\r
675 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
676 return EFI_SUCCESS;\r
677 }\r
678\r
679 //\r
680 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
681 //\r
682 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
683\r
684 //\r
685 // increment target if valid on input\r
686 //\r
687 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
688 if (LastTarget > Dev->MaxTarget) {\r
689 return EFI_INVALID_PARAMETER;\r
690 }\r
691\r
692 if (LastTarget < Dev->MaxTarget) {\r
693 ++LastTarget;\r
694 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
695 return EFI_SUCCESS;\r
696 }\r
697\r
698 return EFI_NOT_FOUND;\r
699}\r
700\r
701\r
702STATIC\r
703EFI_STATUS\r
704EFIAPI\r
705VirtioScsiInit (\r
706 IN OUT VSCSI_DEV *Dev\r
707 )\r
708{\r
709 UINT8 NextDevStat;\r
710 EFI_STATUS Status;\r
711\r
712 UINT32 Features;\r
713 UINT16 MaxChannel; // for validation only\r
714 UINT32 NumQueues; // for validation only\r
715 UINT16 QueueSize;\r
716\r
717 //\r
718 // Execute virtio-0.9.5, 2.2.1 Device Initialization Sequence.\r
719 //\r
720 NextDevStat = 0; // step 1 -- reset device\r
721 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, NextDevStat);\r
722 if (EFI_ERROR (Status)) {\r
723 goto Failed;\r
724 }\r
725\r
726 NextDevStat |= VSTAT_ACK; // step 2 -- acknowledge device presence\r
727 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, NextDevStat);\r
728 if (EFI_ERROR (Status)) {\r
729 goto Failed;\r
730 }\r
731\r
732 NextDevStat |= VSTAT_DRIVER; // step 3 -- we know how to drive it\r
733 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, NextDevStat);\r
734 if (EFI_ERROR (Status)) {\r
735 goto Failed;\r
736 }\r
737\r
738 //\r
739 // step 4a -- retrieve and validate features\r
740 //\r
741 Status = VIRTIO_CFG_READ (Dev, Generic.VhdrDeviceFeatureBits, &Features);\r
742 if (EFI_ERROR (Status)) {\r
743 goto Failed;\r
744 }\r
745 Dev->InOutSupported = !!(Features & VIRTIO_SCSI_F_INOUT);\r
746\r
747 Status = VIRTIO_CFG_READ (Dev, VhdrMaxChannel, &MaxChannel);\r
748 if (EFI_ERROR (Status)) {\r
749 goto Failed;\r
750 }\r
751 if (MaxChannel != 0) {\r
752 //\r
753 // this driver is for a single-channel virtio-scsi HBA\r
754 //\r
755 Status = EFI_UNSUPPORTED;\r
756 goto Failed;\r
757 }\r
758\r
759 Status = VIRTIO_CFG_READ (Dev, VhdrNumQueues, &NumQueues);\r
760 if (EFI_ERROR (Status)) {\r
761 goto Failed;\r
762 }\r
763 if (NumQueues < 1) {\r
764 Status = EFI_UNSUPPORTED;\r
765 goto Failed;\r
766 }\r
767\r
768 Status = VIRTIO_CFG_READ (Dev, VhdrMaxTarget, &Dev->MaxTarget);\r
769 if (EFI_ERROR (Status)) {\r
770 goto Failed;\r
771 }\r
772 if (Dev->MaxTarget > PcdGet16 (PcdVirtioScsiMaxTargetLimit)) {\r
773 Dev->MaxTarget = PcdGet16 (PcdVirtioScsiMaxTargetLimit);\r
774 }\r
775\r
776 Status = VIRTIO_CFG_READ (Dev, VhdrMaxLun, &Dev->MaxLun);\r
777 if (EFI_ERROR (Status)) {\r
778 goto Failed;\r
779 }\r
780 if (Dev->MaxLun > PcdGet32 (PcdVirtioScsiMaxLunLimit)) {\r
781 Dev->MaxLun = PcdGet32 (PcdVirtioScsiMaxLunLimit);\r
782 }\r
783\r
784 Status = VIRTIO_CFG_READ (Dev, VhdrMaxSectors, &Dev->MaxSectors);\r
785 if (EFI_ERROR (Status)) {\r
786 goto Failed;\r
787 }\r
788 if (Dev->MaxSectors < 2) {\r
789 //\r
790 // We must be able to halve it for bidirectional transfers\r
791 // (see EFI_BAD_BUFFER_SIZE in PopulateRequest()).\r
792 //\r
793 Status = EFI_UNSUPPORTED;\r
794 goto Failed;\r
795 }\r
796\r
797 //\r
798 // step 4b -- allocate request virtqueue\r
799 //\r
800 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrQueueSelect,\r
801 VIRTIO_SCSI_REQUEST_QUEUE);\r
802 if (EFI_ERROR (Status)) {\r
803 goto Failed;\r
804 }\r
805 Status = VIRTIO_CFG_READ (Dev, Generic.VhdrQueueSize, &QueueSize);\r
806 if (EFI_ERROR (Status)) {\r
807 goto Failed;\r
808 }\r
809 //\r
810 // VirtioScsiPassThru() uses at most four descriptors\r
811 //\r
812 if (QueueSize < 4) {\r
813 Status = EFI_UNSUPPORTED;\r
814 goto Failed;\r
815 }\r
816\r
817 Status = VirtioRingInit (QueueSize, &Dev->Ring);\r
818 if (EFI_ERROR (Status)) {\r
819 goto Failed;\r
820 }\r
821\r
822 //\r
823 // step 4c -- Report GPFN (guest-physical frame number) of queue. If anything\r
824 // fails from here on, we must release the ring resources.\r
825 //\r
826 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrQueueAddress,\r
827 (UINTN) Dev->Ring.Base >> EFI_PAGE_SHIFT);\r
828 if (EFI_ERROR (Status)) {\r
829 goto ReleaseQueue;\r
830 }\r
831\r
832 //\r
833 // step 5 -- Report understood features and guest-tuneables. We want none of\r
834 // the known (or unknown) VIRTIO_SCSI_F_* or VIRTIO_F_* capabilities (see\r
835 // virtio-0.9.5, Appendices B and I), except bidirectional transfers.\r
836 //\r
837 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrGuestFeatureBits,\r
838 Features & VIRTIO_SCSI_F_INOUT);\r
839 if (EFI_ERROR (Status)) {\r
840 goto ReleaseQueue;\r
841 }\r
842\r
843 //\r
844 // We expect these maximum sizes from the host. Since they are\r
845 // guest-negotiable, ask for them rather than just checking them.\r
846 //\r
847 Status = VIRTIO_CFG_WRITE (Dev, VhdrCdbSize, VIRTIO_SCSI_CDB_SIZE);\r
848 if (EFI_ERROR (Status)) {\r
849 goto ReleaseQueue;\r
850 }\r
851 Status = VIRTIO_CFG_WRITE (Dev, VhdrSenseSize, VIRTIO_SCSI_SENSE_SIZE);\r
852 if (EFI_ERROR (Status)) {\r
853 goto ReleaseQueue;\r
854 }\r
855\r
856 //\r
857 // step 6 -- initialization complete\r
858 //\r
859 NextDevStat |= VSTAT_DRIVER_OK;\r
860 Status = VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, NextDevStat);\r
861 if (EFI_ERROR (Status)) {\r
862 goto ReleaseQueue;\r
863 }\r
864\r
865 //\r
866 // populate the exported interface's attributes\r
867 //\r
868 Dev->PassThru.Mode = &Dev->PassThruMode;\r
869 Dev->PassThru.PassThru = &VirtioScsiPassThru;\r
870 Dev->PassThru.GetNextTargetLun = &VirtioScsiGetNextTargetLun;\r
871 Dev->PassThru.BuildDevicePath = &VirtioScsiBuildDevicePath;\r
872 Dev->PassThru.GetTargetLun = &VirtioScsiGetTargetLun;\r
873 Dev->PassThru.ResetChannel = &VirtioScsiResetChannel;\r
874 Dev->PassThru.ResetTargetLun = &VirtioScsiResetTargetLun;\r
875 Dev->PassThru.GetNextTarget = &VirtioScsiGetNextTarget;\r
876\r
877 //\r
878 // AdapterId is a target for which no handle will be created during bus scan.\r
879 // Prevent any conflict with real devices.\r
880 //\r
881 Dev->PassThruMode.AdapterId = 0xFFFFFFFF;\r
882\r
883 //\r
884 // Set both physical and logical attributes for non-RAID SCSI channel. See\r
885 // Driver Writer's Guide for UEFI 2.3.1 v1.01, 20.1.5 Implementing Extended\r
886 // SCSI Pass Thru Protocol.\r
887 //\r
888 Dev->PassThruMode.Attributes = EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_PHYSICAL |\r
889 EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_LOGICAL;\r
890\r
891 //\r
892 // no restriction on transfer buffer alignment\r
893 //\r
894 Dev->PassThruMode.IoAlign = 0;\r
895\r
896 return EFI_SUCCESS;\r
897\r
898ReleaseQueue:\r
899 VirtioRingUninit (&Dev->Ring);\r
900\r
901Failed:\r
902 //\r
903 // Notify the host about our failure to setup: virtio-0.9.5, 2.2.2.1 Device\r
904 // Status. PCI IO access failure here should not mask the original error.\r
905 //\r
906 NextDevStat |= VSTAT_FAILED;\r
907 VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, NextDevStat);\r
908\r
909 Dev->InOutSupported = FALSE;\r
910 Dev->MaxTarget = 0;\r
911 Dev->MaxLun = 0;\r
912 Dev->MaxSectors = 0;\r
913\r
914 return Status; // reached only via Failed above\r
915}\r
916\r
917\r
918\r
919STATIC\r
920VOID\r
921EFIAPI\r
922VirtioScsiUninit (\r
923 IN OUT VSCSI_DEV *Dev\r
924 )\r
925{\r
926 //\r
927 // Reset the virtual device -- see virtio-0.9.5, 2.2.2.1 Device Status. When\r
928 // VIRTIO_CFG_WRITE() returns, the host will have learned to stay away from\r
929 // the old comms area.\r
930 //\r
931 VIRTIO_CFG_WRITE (Dev, Generic.VhdrDeviceStatus, 0);\r
932\r
933 Dev->InOutSupported = FALSE;\r
934 Dev->MaxTarget = 0;\r
935 Dev->MaxLun = 0;\r
936 Dev->MaxSectors = 0;\r
937\r
938 VirtioRingUninit (&Dev->Ring);\r
939\r
940 SetMem (&Dev->PassThru, sizeof Dev->PassThru, 0x00);\r
941 SetMem (&Dev->PassThruMode, sizeof Dev->PassThruMode, 0x00);\r
942}\r
943\r
944\r
945//\r
946// Probe, start and stop functions of this driver, called by the DXE core for\r
947// specific devices.\r
948//\r
949// The following specifications document these interfaces:\r
950// - Driver Writer's Guide for UEFI 2.3.1 v1.01, 9 Driver Binding Protocol\r
951// - UEFI Spec 2.3.1 + Errata C, 10.1 EFI Driver Binding Protocol\r
952//\r
953// The implementation follows:\r
954// - Driver Writer's Guide for UEFI 2.3.1 v1.01\r
955// - 5.1.3.4 OpenProtocol() and CloseProtocol()\r
956// - 18 PCI Driver Design Guidelines\r
957// - 18.3 PCI drivers\r
958// - UEFI Spec 2.3.1 + Errata C\r
959// - 6.3 Protocol Handler Services\r
960// - 13.4 EFI PCI I/O Protocol\r
961//\r
962\r
963EFI_STATUS\r
964EFIAPI\r
965VirtioScsiDriverBindingSupported (\r
966 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
967 IN EFI_HANDLE DeviceHandle,\r
968 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
969 )\r
970{\r
971 EFI_STATUS Status;\r
972 EFI_PCI_IO_PROTOCOL *PciIo;\r
973 PCI_TYPE00 Pci;\r
974\r
975 //\r
976 // Attempt to open the device with the PciIo set of interfaces. On success,\r
977 // the protocol is "instantiated" for the PCI device. Covers duplicate open\r
978 // attempts (EFI_ALREADY_STARTED).\r
979 //\r
980 Status = gBS->OpenProtocol (\r
981 DeviceHandle, // candidate device\r
982 &gEfiPciIoProtocolGuid, // for generic PCI access\r
983 (VOID **)&PciIo, // handle to instantiate\r
984 This->DriverBindingHandle, // requestor driver identity\r
985 DeviceHandle, // ControllerHandle, according to\r
986 // the UEFI Driver Model\r
987 EFI_OPEN_PROTOCOL_BY_DRIVER // get exclusive PciIo access to\r
988 // the device; to be released\r
989 );\r
990 if (EFI_ERROR (Status)) {\r
991 return Status;\r
992 }\r
993\r
994 //\r
995 // Read entire PCI configuration header for more extensive check ahead.\r
996 //\r
997 Status = PciIo->Pci.Read (\r
998 PciIo, // (protocol, device)\r
999 // handle\r
1000 EfiPciIoWidthUint32, // access width & copy\r
1001 // mode\r
1002 0, // Offset\r
1003 sizeof Pci / sizeof (UINT32), // Count\r
1004 &Pci // target buffer\r
1005 );\r
1006\r
1007 if (Status == EFI_SUCCESS) {\r
1008 //\r
1009 // virtio-0.9.5, 2.1 PCI Discovery\r
1010 //\r
1011 Status = (Pci.Hdr.VendorId == 0x1AF4 &&\r
1012 Pci.Hdr.DeviceId >= 0x1000 && Pci.Hdr.DeviceId <= 0x103F &&\r
1013 Pci.Hdr.RevisionID == 0x00 &&\r
43e54972 1014 Pci.Device.SubsystemID == VIRTIO_SUBSYSTEM_SCSI_HOST) ? EFI_SUCCESS : EFI_UNSUPPORTED;\r
37078a63 1015 }\r
1016\r
1017 //\r
1018 // We needed PCI IO access only transitorily, to see whether we support the\r
1019 // device or not.\r
1020 //\r
1021 gBS->CloseProtocol (DeviceHandle, &gEfiPciIoProtocolGuid,\r
1022 This->DriverBindingHandle, DeviceHandle);\r
1023 return Status;\r
1024}\r
1025\r
1026\r
1027EFI_STATUS\r
1028EFIAPI\r
1029VirtioScsiDriverBindingStart (\r
1030 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1031 IN EFI_HANDLE DeviceHandle,\r
1032 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
1033 )\r
1034{\r
1035 VSCSI_DEV *Dev;\r
1036 EFI_STATUS Status;\r
1037\r
1038 Dev = (VSCSI_DEV *) AllocateZeroPool (sizeof *Dev);\r
1039 if (Dev == NULL) {\r
1040 return EFI_OUT_OF_RESOURCES;\r
1041 }\r
1042\r
1043 Status = gBS->OpenProtocol (DeviceHandle, &gEfiPciIoProtocolGuid,\r
1044 (VOID **)&Dev->PciIo, This->DriverBindingHandle,\r
1045 DeviceHandle, EFI_OPEN_PROTOCOL_BY_DRIVER);\r
1046 if (EFI_ERROR (Status)) {\r
1047 goto FreeVirtioScsi;\r
1048 }\r
1049\r
1050 //\r
1051 // We must retain and ultimately restore the original PCI attributes of the\r
1052 // device. See Driver Writer's Guide for UEFI 2.3.1 v1.01, 18.3 PCI drivers /\r
1053 // 18.3.2 Start() and Stop().\r
1054 //\r
1055 // The third parameter ("Attributes", input) is ignored by the Get operation.\r
1056 // The fourth parameter ("Result", output) is ignored by the Enable and Set\r
1057 // operations.\r
1058 //\r
1059 // For virtio-scsi we only need IO space access.\r
1060 //\r
1061 Status = Dev->PciIo->Attributes (Dev->PciIo, EfiPciIoAttributeOperationGet,\r
1062 0, &Dev->OriginalPciAttributes);\r
1063 if (EFI_ERROR (Status)) {\r
1064 goto ClosePciIo;\r
1065 }\r
1066\r
1067 Status = Dev->PciIo->Attributes (Dev->PciIo,\r
1068 EfiPciIoAttributeOperationEnable,\r
1069 EFI_PCI_IO_ATTRIBUTE_IO, NULL);\r
1070 if (EFI_ERROR (Status)) {\r
1071 goto ClosePciIo;\r
1072 }\r
1073\r
1074 //\r
1075 // PCI IO access granted, configure virtio-scsi device.\r
1076 //\r
1077 Status = VirtioScsiInit (Dev);\r
1078 if (EFI_ERROR (Status)) {\r
1079 goto RestorePciAttributes;\r
1080 }\r
1081\r
1082 //\r
1083 // Setup complete, attempt to export the driver instance's PassThru\r
1084 // interface.\r
1085 //\r
1086 Dev->Signature = VSCSI_SIG;\r
1087 Status = gBS->InstallProtocolInterface (&DeviceHandle,\r
1088 &gEfiExtScsiPassThruProtocolGuid, EFI_NATIVE_INTERFACE,\r
1089 &Dev->PassThru);\r
1090 if (EFI_ERROR (Status)) {\r
1091 goto UninitDev;\r
1092 }\r
1093\r
1094 return EFI_SUCCESS;\r
1095\r
1096UninitDev:\r
1097 VirtioScsiUninit (Dev);\r
1098\r
1099RestorePciAttributes:\r
1100 Dev->PciIo->Attributes (Dev->PciIo, EfiPciIoAttributeOperationSet,\r
1101 Dev->OriginalPciAttributes, NULL);\r
1102\r
1103ClosePciIo:\r
1104 gBS->CloseProtocol (DeviceHandle, &gEfiPciIoProtocolGuid,\r
1105 This->DriverBindingHandle, DeviceHandle);\r
1106\r
1107FreeVirtioScsi:\r
1108 FreePool (Dev);\r
1109\r
1110 return Status;\r
1111}\r
1112\r
1113\r
1114EFI_STATUS\r
1115EFIAPI\r
1116VirtioScsiDriverBindingStop (\r
1117 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1118 IN EFI_HANDLE DeviceHandle,\r
1119 IN UINTN NumberOfChildren,\r
1120 IN EFI_HANDLE *ChildHandleBuffer\r
1121 )\r
1122{\r
1123 EFI_STATUS Status;\r
1124 EFI_EXT_SCSI_PASS_THRU_PROTOCOL *PassThru;\r
1125 VSCSI_DEV *Dev;\r
1126\r
1127 Status = gBS->OpenProtocol (\r
1128 DeviceHandle, // candidate device\r
1129 &gEfiExtScsiPassThruProtocolGuid, // retrieve the SCSI iface\r
1130 (VOID **)&PassThru, // target pointer\r
1131 This->DriverBindingHandle, // requestor driver ident.\r
1132 DeviceHandle, // lookup req. for dev.\r
1133 EFI_OPEN_PROTOCOL_GET_PROTOCOL // lookup only, no new ref.\r
1134 );\r
1135 if (EFI_ERROR (Status)) {\r
1136 return Status;\r
1137 }\r
1138\r
1139 Dev = VIRTIO_SCSI_FROM_PASS_THRU (PassThru);\r
1140\r
1141 //\r
1142 // Handle Stop() requests for in-use driver instances gracefully.\r
1143 //\r
1144 Status = gBS->UninstallProtocolInterface (DeviceHandle,\r
1145 &gEfiExtScsiPassThruProtocolGuid, &Dev->PassThru);\r
1146 if (EFI_ERROR (Status)) {\r
1147 return Status;\r
1148 }\r
1149\r
1150 VirtioScsiUninit (Dev);\r
1151\r
1152 Dev->PciIo->Attributes (Dev->PciIo, EfiPciIoAttributeOperationSet,\r
1153 Dev->OriginalPciAttributes, NULL);\r
1154\r
1155 gBS->CloseProtocol (DeviceHandle, &gEfiPciIoProtocolGuid,\r
1156 This->DriverBindingHandle, DeviceHandle);\r
1157\r
1158 FreePool (Dev);\r
1159\r
1160 return EFI_SUCCESS;\r
1161}\r
1162\r
1163\r
1164//\r
1165// The static object that groups the Supported() (ie. probe), Start() and\r
1166// Stop() functions of the driver together. Refer to UEFI Spec 2.3.1 + Errata\r
1167// C, 10.1 EFI Driver Binding Protocol.\r
1168//\r
1169STATIC EFI_DRIVER_BINDING_PROTOCOL gDriverBinding = {\r
1170 &VirtioScsiDriverBindingSupported,\r
1171 &VirtioScsiDriverBindingStart,\r
1172 &VirtioScsiDriverBindingStop,\r
1173 0x10, // Version, must be in [0x10 .. 0xFFFFFFEF] for IHV-developed drivers\r
1174 NULL, // ImageHandle, to be overwritten by\r
1175 // EfiLibInstallDriverBindingComponentName2() in VirtioScsiEntryPoint()\r
1176 NULL // DriverBindingHandle, ditto\r
1177};\r
1178\r
1179\r
1180//\r
1181// The purpose of the following scaffolding (EFI_COMPONENT_NAME_PROTOCOL and\r
1182// EFI_COMPONENT_NAME2_PROTOCOL implementation) is to format the driver's name\r
1183// in English, for display on standard console devices. This is recommended for\r
1184// UEFI drivers that follow the UEFI Driver Model. Refer to the Driver Writer's\r
1185// Guide for UEFI 2.3.1 v1.01, 11 UEFI Driver and Controller Names.\r
1186//\r
1187// Device type names ("Virtio SCSI Host Device") are not formatted because the\r
1188// driver supports only that device type. Therefore the driver name suffices\r
1189// for unambiguous identification.\r
1190//\r
1191\r
1192STATIC\r
1193EFI_UNICODE_STRING_TABLE mDriverNameTable[] = {\r
1194 { "eng;en", L"Virtio SCSI Host Driver" },\r
1195 { NULL, NULL }\r
1196};\r
1197\r
1198STATIC\r
1199EFI_COMPONENT_NAME_PROTOCOL gComponentName;\r
1200\r
1201EFI_STATUS\r
1202EFIAPI\r
1203VirtioScsiGetDriverName (\r
1204 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1205 IN CHAR8 *Language,\r
1206 OUT CHAR16 **DriverName\r
1207 )\r
1208{\r
1209 return LookupUnicodeString2 (\r
1210 Language,\r
1211 This->SupportedLanguages,\r
1212 mDriverNameTable,\r
1213 DriverName,\r
1214 (BOOLEAN)(This == &gComponentName) // Iso639Language\r
1215 );\r
1216}\r
1217\r
1218EFI_STATUS\r
1219EFIAPI\r
1220VirtioScsiGetDeviceName (\r
1221 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1222 IN EFI_HANDLE DeviceHandle,\r
1223 IN EFI_HANDLE ChildHandle,\r
1224 IN CHAR8 *Language,\r
1225 OUT CHAR16 **ControllerName\r
1226 )\r
1227{\r
1228 return EFI_UNSUPPORTED;\r
1229}\r
1230\r
1231STATIC\r
1232EFI_COMPONENT_NAME_PROTOCOL gComponentName = {\r
1233 &VirtioScsiGetDriverName,\r
1234 &VirtioScsiGetDeviceName,\r
1235 "eng" // SupportedLanguages, ISO 639-2 language codes\r
1236};\r
1237\r
1238STATIC\r
1239EFI_COMPONENT_NAME2_PROTOCOL gComponentName2 = {\r
1240 (EFI_COMPONENT_NAME2_GET_DRIVER_NAME) &VirtioScsiGetDriverName,\r
1241 (EFI_COMPONENT_NAME2_GET_CONTROLLER_NAME) &VirtioScsiGetDeviceName,\r
1242 "en" // SupportedLanguages, RFC 4646 language codes\r
1243};\r
1244\r
1245\r
1246//\r
1247// Entry point of this driver.\r
1248//\r
1249EFI_STATUS\r
1250EFIAPI\r
1251VirtioScsiEntryPoint (\r
1252 IN EFI_HANDLE ImageHandle,\r
1253 IN EFI_SYSTEM_TABLE *SystemTable\r
1254 )\r
1255{\r
1256 return EfiLibInstallDriverBindingComponentName2 (\r
1257 ImageHandle,\r
1258 SystemTable,\r
1259 &gDriverBinding,\r
1260 ImageHandle,\r
1261 &gComponentName,\r
1262 &gComponentName2\r
1263 );\r
1264}\r