]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/VirtioScsiDxe/VirtioScsi.c
OvmfPkg:Fix VS2012 build failure
[mirror_edk2.git] / OvmfPkg / VirtioScsiDxe / VirtioScsi.c
CommitLineData
37078a63 1/** @file\r
2\r
3 This driver produces Extended SCSI Pass Thru Protocol instances for\r
4 virtio-scsi devices.\r
5\r
6 The implementation is basic:\r
7\r
8 - No hotplug / hot-unplug.\r
9\r
10 - Although EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() could be a good match\r
11 for multiple in-flight virtio-scsi requests, we stick to synchronous\r
12 requests for now.\r
13\r
14 - Timeouts are not supported for EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru().\r
15\r
16 - Only one channel is supported. (At the time of this writing, host-side\r
17 virtio-scsi supports a single channel too.)\r
18\r
19 - Only one request queue is used (for the one synchronous request).\r
20\r
21 - The ResetChannel() and ResetTargetLun() functions of\r
22 EFI_EXT_SCSI_PASS_THRU_PROTOCOL are not supported (which is allowed by the\r
23 UEFI 2.3.1 Errata C specification), although\r
24 VIRTIO_SCSI_T_TMF_LOGICAL_UNIT_RESET could be a good match. That would\r
25 however require client code for the control queue, which is deemed\r
26 unreasonable for now.\r
27\r
28 Copyright (C) 2012, Red Hat, Inc.\r
699a2c30 29 Copyright (c) 2012 - 2018, Intel Corporation. All rights reserved.<BR>\r
fc2c1543 30 Copyright (c) 2017, AMD Inc, All rights reserved.<BR>\r
37078a63 31\r
32 This program and the accompanying materials are licensed and made available\r
33 under the terms and conditions of the BSD License which accompanies this\r
34 distribution. The full text of the license may be found at\r
35 http://opensource.org/licenses/bsd-license.php\r
36\r
37 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT\r
38 WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
39\r
40**/\r
41\r
37078a63 42#include <IndustryStandard/VirtioScsi.h>\r
43#include <Library/BaseMemoryLib.h>\r
44#include <Library/DebugLib.h>\r
45#include <Library/MemoryAllocationLib.h>\r
46#include <Library/UefiBootServicesTableLib.h>\r
47#include <Library/UefiLib.h>\r
48#include <Library/VirtioLib.h>\r
49\r
50#include "VirtioScsi.h"\r
51\r
52/**\r
53\r
56f65ed8
OM
54 Convenience macros to read and write configuration elements of the\r
55 virtio-scsi VirtIo device.\r
37078a63 56\r
57 The following macros make it possible to specify only the "core parameters"\r
58 for such accesses and to derive the rest. By the time VIRTIO_CFG_WRITE()\r
59 returns, the transaction will have been completed.\r
60\r
56f65ed8 61 @param[in] Dev Pointer to the VSCSI_DEV structure.\r
37078a63 62\r
63 @param[in] Field A field name from VSCSI_HDR, identifying the virtio-scsi\r
64 configuration item to access.\r
65\r
66 @param[in] Value (VIRTIO_CFG_WRITE() only.) The value to write to the\r
67 selected configuration item.\r
68\r
69 @param[out] Pointer (VIRTIO_CFG_READ() only.) The object to receive the\r
70 value read from the configuration item. Its type must be\r
71 one of UINT8, UINT16, UINT32, UINT64.\r
72\r
73\r
ece77e40 74 @return Status codes returned by Virtio->WriteDevice() / Virtio->ReadDevice().\r
37078a63 75\r
76**/\r
77\r
ece77e40
OM
78#define VIRTIO_CFG_WRITE(Dev, Field, Value) ((Dev)->VirtIo->WriteDevice ( \\r
79 (Dev)->VirtIo, \\r
80 OFFSET_OF_VSCSI (Field), \\r
81 SIZE_OF_VSCSI (Field), \\r
82 (Value) \\r
37078a63 83 ))\r
84\r
ece77e40
OM
85#define VIRTIO_CFG_READ(Dev, Field, Pointer) ((Dev)->VirtIo->ReadDevice ( \\r
86 (Dev)->VirtIo, \\r
87 OFFSET_OF_VSCSI (Field), \\r
88 SIZE_OF_VSCSI (Field), \\r
89 sizeof *(Pointer), \\r
90 (Pointer) \\r
37078a63 91 ))\r
92\r
93\r
94//\r
95// UEFI Spec 2.3.1 + Errata C, 14.7 Extended SCSI Pass Thru Protocol specifies\r
96// the PassThru() interface. Beside returning a status code, the function must\r
97// set some fields in the EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET in/out\r
98// parameter on return. The following is a full list of those fields, for\r
99// easier validation of PopulateRequest(), ParseResponse(), and\r
1b15eb06 100// ReportHostAdapterError() below.\r
37078a63 101//\r
102// - InTransferLength\r
103// - OutTransferLength\r
104// - HostAdapterStatus\r
105// - TargetStatus\r
106// - SenseDataLength\r
107// - SenseData\r
108//\r
109// On any return from the PassThru() interface, these fields must be set,\r
110// except if the returned status code is explicitly exempt. (Actually the\r
111// implementation here conservatively sets these fields even in case not all\r
112// of them would be required by the specification.)\r
113//\r
114\r
115/**\r
116\r
117 Populate a virtio-scsi request from the Extended SCSI Pass Thru Protocol\r
118 packet.\r
119\r
120 The caller is responsible for pre-zeroing the virtio-scsi request. The\r
121 Extended SCSI Pass Thru Protocol packet is modified, to be forwarded outwards\r
122 by VirtioScsiPassThru(), if invalid or unsupported parameters are detected.\r
123\r
124 @param[in] Dev The virtio-scsi host device the packet targets.\r
125\r
126 @param[in] Target The SCSI target controlled by the virtio-scsi host\r
127 device.\r
128\r
129 @param[in] Lun The Logical Unit Number under the SCSI target.\r
130\r
131 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet the\r
132 function translates to a virtio-scsi request. On\r
133 failure this parameter relays error contents.\r
134\r
135 @param[out] Request The pre-zeroed virtio-scsi request to populate. This\r
136 parameter is volatile-qualified because we expect the\r
137 caller to append it to a virtio ring, thus\r
138 assignments to Request must be visible when the\r
139 function returns.\r
140\r
141\r
142 @retval EFI_SUCCESS The Extended SCSI Pass Thru Protocol packet was valid,\r
143 Request has been populated.\r
144\r
145 @return Otherwise, invalid or unsupported parameters were\r
146 detected. Status codes are meant for direct forwarding\r
147 by the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru()\r
148 implementation.\r
149\r
150**/\r
151STATIC\r
152EFI_STATUS\r
153EFIAPI\r
154PopulateRequest (\r
155 IN CONST VSCSI_DEV *Dev,\r
156 IN UINT16 Target,\r
157 IN UINT64 Lun,\r
158 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
159 OUT volatile VIRTIO_SCSI_REQ *Request\r
160 )\r
161{\r
162 UINTN Idx;\r
163\r
164 if (\r
165 //\r
166 // bidirectional transfer was requested, but the host doesn't support it\r
167 //\r
168 (Packet->InTransferLength > 0 && Packet->OutTransferLength > 0 &&\r
169 !Dev->InOutSupported) ||\r
170\r
171 //\r
172 // a target / LUN was addressed that's impossible to encode for the host\r
173 //\r
174 Target > 0xFF || Lun >= 0x4000 ||\r
175\r
176 //\r
177 // Command Descriptor Block bigger than VIRTIO_SCSI_CDB_SIZE\r
178 //\r
179 Packet->CdbLength > VIRTIO_SCSI_CDB_SIZE ||\r
180\r
181 //\r
182 // From virtio-0.9.5, 2.3.2 Descriptor Table:\r
183 // "no descriptor chain may be more than 2^32 bytes long in total".\r
184 //\r
185 (UINT64) Packet->InTransferLength + Packet->OutTransferLength > SIZE_1GB\r
186 ) {\r
187\r
188 //\r
189 // this error code doesn't require updates to the Packet output fields\r
190 //\r
191 return EFI_UNSUPPORTED;\r
192 }\r
193\r
194 if (\r
195 //\r
196 // addressed invalid device\r
197 //\r
198 Target > Dev->MaxTarget || Lun > Dev->MaxLun ||\r
199\r
200 //\r
201 // invalid direction (there doesn't seem to be a macro for the "no data\r
202 // transferred" "direction", eg. for TEST UNIT READY)\r
203 //\r
204 Packet->DataDirection > EFI_EXT_SCSI_DATA_DIRECTION_BIDIRECTIONAL ||\r
205\r
206 //\r
207 // trying to receive, but destination pointer is NULL, or contradicting\r
208 // transfer direction\r
209 //\r
210 (Packet->InTransferLength > 0 &&\r
211 (Packet->InDataBuffer == NULL ||\r
212 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_WRITE\r
213 )\r
214 ) ||\r
215\r
216 //\r
217 // trying to send, but source pointer is NULL, or contradicting transfer\r
218 // direction\r
219 //\r
220 (Packet->OutTransferLength > 0 &&\r
221 (Packet->OutDataBuffer == NULL ||\r
222 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_READ\r
223 )\r
224 )\r
225 ) {\r
226\r
227 //\r
228 // this error code doesn't require updates to the Packet output fields\r
229 //\r
230 return EFI_INVALID_PARAMETER;\r
231 }\r
232\r
233 //\r
234 // Catch oversized requests eagerly. If this condition evaluates to false,\r
235 // then the combined size of a bidirectional request will not exceed the\r
236 // virtio-scsi device's transfer limit either.\r
237 //\r
238 if (ALIGN_VALUE (Packet->OutTransferLength, 512) / 512\r
239 > Dev->MaxSectors / 2 ||\r
240 ALIGN_VALUE (Packet->InTransferLength, 512) / 512\r
241 > Dev->MaxSectors / 2) {\r
242 Packet->InTransferLength = (Dev->MaxSectors / 2) * 512;\r
243 Packet->OutTransferLength = (Dev->MaxSectors / 2) * 512;\r
244 Packet->HostAdapterStatus =\r
245 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
246 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
247 Packet->SenseDataLength = 0;\r
248 return EFI_BAD_BUFFER_SIZE;\r
249 }\r
250\r
251 //\r
252 // target & LUN encoding: see virtio-0.9.5, Appendix I: SCSI Host Device,\r
253 // Device Operation: request queues\r
254 //\r
255 Request->Lun[0] = 1;\r
256 Request->Lun[1] = (UINT8) Target;\r
faba4a14 257 Request->Lun[2] = (UINT8) (((UINT32)Lun >> 8) | 0x40);\r
37078a63 258 Request->Lun[3] = (UINT8) Lun;\r
259\r
260 //\r
261 // CopyMem() would cast away the "volatile" qualifier before access, which is\r
262 // undefined behavior (ISO C99 6.7.3p5)\r
263 //\r
264 for (Idx = 0; Idx < Packet->CdbLength; ++Idx) {\r
265 Request->Cdb[Idx] = ((UINT8 *) Packet->Cdb)[Idx];\r
266 }\r
267\r
268 return EFI_SUCCESS;\r
269}\r
270\r
271\r
272/**\r
273\r
274 Parse the virtio-scsi device's response, translate it to an EFI status code,\r
275 and update the Extended SCSI Pass Thru Protocol packet, to be returned by\r
276 the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() implementation.\r
277\r
278 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet that has\r
279 been translated to a virtio-scsi request with\r
280 PopulateRequest(), and processed by the host. On\r
281 output this parameter is updated with response or\r
282 error contents.\r
283\r
284 @param[in] Response The virtio-scsi response structure to parse. We expect\r
285 it to come from a virtio ring, thus it is qualified\r
286 volatile.\r
287\r
288\r
289 @return PassThru() status codes mandated by UEFI Spec 2.3.1 + Errata C, 14.7\r
290 Extended SCSI Pass Thru Protocol.\r
291\r
292**/\r
293STATIC\r
294EFI_STATUS\r
295EFIAPI\r
296ParseResponse (\r
297 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
298 IN CONST volatile VIRTIO_SCSI_RESP *Response\r
299 )\r
300{\r
301 UINTN ResponseSenseLen;\r
302 UINTN Idx;\r
303\r
304 //\r
305 // return sense data (length and contents) in all cases, truncated if needed\r
306 //\r
307 ResponseSenseLen = MIN (Response->SenseLen, VIRTIO_SCSI_SENSE_SIZE);\r
308 if (Packet->SenseDataLength > ResponseSenseLen) {\r
309 Packet->SenseDataLength = (UINT8) ResponseSenseLen;\r
310 }\r
311 for (Idx = 0; Idx < Packet->SenseDataLength; ++Idx) {\r
312 ((UINT8 *) Packet->SenseData)[Idx] = Response->Sense[Idx];\r
313 }\r
314\r
315 //\r
316 // Report actual transfer lengths. The logic below covers all three\r
317 // DataDirections (read, write, bidirectional).\r
318 //\r
319 // -+- @ 0\r
320 // |\r
321 // | write ^ @ Residual (unprocessed)\r
322 // | |\r
323 // -+- @ OutTransferLength -+- @ InTransferLength\r
324 // | |\r
325 // | read |\r
326 // | |\r
327 // V @ OutTransferLength + InTransferLength -+- @ 0\r
328 //\r
329 if (Response->Residual <= Packet->InTransferLength) {\r
330 Packet->InTransferLength -= Response->Residual;\r
331 }\r
332 else {\r
333 Packet->OutTransferLength -= Response->Residual - Packet->InTransferLength;\r
334 Packet->InTransferLength = 0;\r
335 }\r
336\r
337 //\r
338 // report target status in all cases\r
339 //\r
340 Packet->TargetStatus = Response->Status;\r
341\r
342 //\r
343 // host adapter status and function return value depend on virtio-scsi\r
344 // response code\r
345 //\r
346 switch (Response->Response) {\r
347 case VIRTIO_SCSI_S_OK:\r
348 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
349 return EFI_SUCCESS;\r
350\r
351 case VIRTIO_SCSI_S_OVERRUN:\r
352 Packet->HostAdapterStatus =\r
353 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;\r
354 break;\r
355\r
356 case VIRTIO_SCSI_S_BAD_TARGET:\r
357 //\r
358 // This is non-intuitive but explicitly required by the\r
359 // EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() specification for\r
360 // disconnected (but otherwise valid) target / LUN addresses.\r
361 //\r
362 Packet->HostAdapterStatus =\r
363 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_TIMEOUT_COMMAND;\r
364 return EFI_TIMEOUT;\r
365\r
366 case VIRTIO_SCSI_S_RESET:\r
367 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_BUS_RESET;\r
368 break;\r
369\r
370 case VIRTIO_SCSI_S_BUSY:\r
371 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;\r
372 return EFI_NOT_READY;\r
373\r
374 //\r
375 // Lump together the rest. The mapping for VIRTIO_SCSI_S_ABORTED is\r
376 // intentional as well, not an oversight.\r
377 //\r
378 case VIRTIO_SCSI_S_ABORTED:\r
379 case VIRTIO_SCSI_S_TRANSPORT_FAILURE:\r
380 case VIRTIO_SCSI_S_TARGET_FAILURE:\r
381 case VIRTIO_SCSI_S_NEXUS_FAILURE:\r
382 case VIRTIO_SCSI_S_FAILURE:\r
383 default:\r
384 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
385 }\r
386\r
387 return EFI_DEVICE_ERROR;\r
388}\r
389\r
390\r
1b15eb06
BS
391/**\r
392\r
393 The function can be used to create a fake host adapter error.\r
394\r
395 When VirtioScsiPassThru() is failed due to some reasons then this function\r
396 can be called to construct a host adapter error.\r
397\r
398 @param[out] Packet The Extended SCSI Pass Thru Protocol packet that the host\r
399 adapter error shall be placed in.\r
400\r
401\r
402 @retval EFI_DEVICE_ERROR The function returns this status code\r
403 unconditionally, to be propagated by\r
404 VirtioScsiPassThru().\r
405\r
406**/\r
407STATIC\r
408EFI_STATUS\r
409ReportHostAdapterError (\r
410 OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet\r
411 )\r
412{\r
413 Packet->InTransferLength = 0;\r
414 Packet->OutTransferLength = 0;\r
415 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;\r
416 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;\r
417 Packet->SenseDataLength = 0;\r
418 return EFI_DEVICE_ERROR;\r
419}\r
420\r
421\r
37078a63 422//\r
423// The next seven functions implement EFI_EXT_SCSI_PASS_THRU_PROTOCOL\r
424// for the virtio-scsi HBA. Refer to UEFI Spec 2.3.1 + Errata C, sections\r
425// - 14.1 SCSI Driver Model Overview,\r
426// - 14.7 Extended SCSI Pass Thru Protocol.\r
427//\r
428\r
429EFI_STATUS\r
430EFIAPI\r
431VirtioScsiPassThru (\r
432 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
433 IN UINT8 *Target,\r
434 IN UINT64 Lun,\r
435 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,\r
436 IN EFI_EVENT Event OPTIONAL\r
437 )\r
438{\r
439 VSCSI_DEV *Dev;\r
440 UINT16 TargetValue;\r
441 EFI_STATUS Status;\r
442 volatile VIRTIO_SCSI_REQ Request;\r
9d0d5050
BS
443 volatile VIRTIO_SCSI_RESP *Response;\r
444 VOID *ResponseBuffer;\r
37078a63 445 DESC_INDICES Indices;\r
9d0d5050
BS
446 VOID *RequestMapping;\r
447 VOID *ResponseMapping;\r
448 VOID *InDataMapping;\r
449 VOID *OutDataMapping;\r
450 EFI_PHYSICAL_ADDRESS RequestDeviceAddress;\r
451 EFI_PHYSICAL_ADDRESS ResponseDeviceAddress;\r
452 EFI_PHYSICAL_ADDRESS InDataDeviceAddress;\r
453 EFI_PHYSICAL_ADDRESS OutDataDeviceAddress;\r
454 VOID *InDataBuffer;\r
455 UINTN InDataNumPages;\r
456 BOOLEAN OutDataBufferIsMapped;\r
37078a63 457\r
699a2c30
DB
458 //\r
459 // Set InDataMapping,OutDataMapping,InDataDeviceAddress and OutDataDeviceAddress to\r
460 // suppress incorrect compiler/analyzer warnings.\r
461 //\r
462 InDataMapping = NULL;\r
463 OutDataMapping = NULL;\r
464 InDataDeviceAddress = 0;\r
465 OutDataDeviceAddress = 0;\r
466\r
151304d9 467 ZeroMem ((VOID*) &Request, sizeof (Request));\r
37078a63 468\r
469 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
470 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
471\r
9d0d5050
BS
472 InDataBuffer = NULL;\r
473 OutDataBufferIsMapped = FALSE;\r
474 InDataNumPages = 0;\r
475\r
37078a63 476 Status = PopulateRequest (Dev, TargetValue, Lun, Packet, &Request);\r
477 if (EFI_ERROR (Status)) {\r
478 return Status;\r
479 }\r
480\r
9d0d5050
BS
481 //\r
482 // Map the virtio-scsi Request header buffer\r
483 //\r
484 Status = VirtioMapAllBytesInSharedBuffer (\r
485 Dev->VirtIo,\r
486 VirtioOperationBusMasterRead,\r
487 (VOID *) &Request,\r
488 sizeof Request,\r
489 &RequestDeviceAddress,\r
490 &RequestMapping);\r
491 if (EFI_ERROR (Status)) {\r
492 return ReportHostAdapterError (Packet);\r
493 }\r
494\r
495 //\r
496 // Map the input buffer\r
497 //\r
498 if (Packet->InTransferLength > 0) {\r
499 //\r
500 // Allocate a intermediate input buffer. This is mainly to handle the\r
501 // following case:\r
502 // * caller submits a bi-directional request\r
503 // * we perform the request fine\r
504 // * but we fail to unmap the "InDataMapping"\r
505 //\r
506 // In that case simply returing the EFI_DEVICE_ERROR is not sufficient. In\r
507 // addition to the error code we also need to update Packet fields\r
508 // accordingly so that we report the full loss of the incoming transfer.\r
509 //\r
510 // We allocate a temporary buffer and map it with BusMasterCommonBuffer. If\r
511 // the Virtio request is successful then we copy the data from temporary\r
512 // buffer into Packet->InDataBuffer.\r
513 //\r
514 InDataNumPages = EFI_SIZE_TO_PAGES ((UINTN)Packet->InTransferLength);\r
515 Status = Dev->VirtIo->AllocateSharedPages (\r
516 Dev->VirtIo,\r
517 InDataNumPages,\r
518 &InDataBuffer\r
519 );\r
520 if (EFI_ERROR (Status)) {\r
521 Status = ReportHostAdapterError (Packet);\r
522 goto UnmapRequestBuffer;\r
523 }\r
524\r
525 ZeroMem (InDataBuffer, Packet->InTransferLength);\r
526\r
527 Status = VirtioMapAllBytesInSharedBuffer (\r
528 Dev->VirtIo,\r
529 VirtioOperationBusMasterCommonBuffer,\r
530 InDataBuffer,\r
531 Packet->InTransferLength,\r
532 &InDataDeviceAddress,\r
533 &InDataMapping\r
534 );\r
535 if (EFI_ERROR (Status)) {\r
536 Status = ReportHostAdapterError (Packet);\r
537 goto FreeInDataBuffer;\r
538 }\r
539 }\r
540\r
541 //\r
542 // Map the output buffer\r
543 //\r
544 if (Packet->OutTransferLength > 0) {\r
545 Status = VirtioMapAllBytesInSharedBuffer (\r
546 Dev->VirtIo,\r
547 VirtioOperationBusMasterRead,\r
548 Packet->OutDataBuffer,\r
549 Packet->OutTransferLength,\r
550 &OutDataDeviceAddress,\r
551 &OutDataMapping\r
552 );\r
553 if (EFI_ERROR (Status)) {\r
554 Status = ReportHostAdapterError (Packet);\r
555 goto UnmapInDataBuffer;\r
556 }\r
557\r
558 OutDataBufferIsMapped = TRUE;\r
559 }\r
560\r
561 //\r
562 // Response header is bi-direction (we preset with host status and expect\r
563 // the device to update it). Allocate a response buffer which can be mapped\r
564 // to access equally by both processor and device.\r
565 //\r
566 Status = Dev->VirtIo->AllocateSharedPages (\r
567 Dev->VirtIo,\r
568 EFI_SIZE_TO_PAGES (sizeof *Response),\r
569 &ResponseBuffer\r
570 );\r
571 if (EFI_ERROR (Status)) {\r
572 Status = ReportHostAdapterError (Packet);\r
573 goto UnmapOutDataBuffer;\r
574 }\r
575\r
576 Response = ResponseBuffer;\r
577\r
578 ZeroMem ((VOID *)Response, sizeof (*Response));\r
37078a63 579\r
580 //\r
581 // preset a host status for ourselves that we do not accept as success\r
582 //\r
9d0d5050
BS
583 Response->Response = VIRTIO_SCSI_S_FAILURE;\r
584\r
585 //\r
586 // Map the response buffer with BusMasterCommonBuffer so that response\r
587 // buffer can be accessed by both host and device.\r
588 //\r
589 Status = VirtioMapAllBytesInSharedBuffer (\r
590 Dev->VirtIo,\r
591 VirtioOperationBusMasterCommonBuffer,\r
592 ResponseBuffer,\r
593 sizeof (*Response),\r
594 &ResponseDeviceAddress,\r
595 &ResponseMapping\r
596 );\r
597 if (EFI_ERROR (Status)) {\r
598 Status = ReportHostAdapterError (Packet);\r
599 goto FreeResponseBuffer;\r
600 }\r
601\r
602 VirtioPrepare (&Dev->Ring, &Indices);\r
37078a63 603\r
604 //\r
605 // ensured by VirtioScsiInit() -- this predicate, in combination with the\r
606 // lock-step progress, ensures we don't have to track free descriptors.\r
607 //\r
608 ASSERT (Dev->Ring.QueueSize >= 4);\r
609\r
610 //\r
611 // enqueue Request\r
612 //\r
9d0d5050
BS
613 VirtioAppendDesc (\r
614 &Dev->Ring,\r
615 RequestDeviceAddress,\r
616 sizeof Request,\r
617 VRING_DESC_F_NEXT,\r
618 &Indices\r
619 );\r
37078a63 620\r
621 //\r
622 // enqueue "dataout" if any\r
623 //\r
624 if (Packet->OutTransferLength > 0) {\r
9d0d5050
BS
625 VirtioAppendDesc (\r
626 &Dev->Ring,\r
627 OutDataDeviceAddress,\r
628 Packet->OutTransferLength,\r
629 VRING_DESC_F_NEXT,\r
630 &Indices\r
631 );\r
37078a63 632 }\r
633\r
634 //\r
635 // enqueue Response, to be written by the host\r
636 //\r
9d0d5050
BS
637 VirtioAppendDesc (\r
638 &Dev->Ring,\r
639 ResponseDeviceAddress,\r
640 sizeof *Response,\r
641 VRING_DESC_F_WRITE | (Packet->InTransferLength > 0 ? VRING_DESC_F_NEXT : 0),\r
642 &Indices\r
643 );\r
37078a63 644\r
645 //\r
646 // enqueue "datain" if any, to be written by the host\r
647 //\r
648 if (Packet->InTransferLength > 0) {\r
9d0d5050
BS
649 VirtioAppendDesc (\r
650 &Dev->Ring,\r
651 InDataDeviceAddress,\r
652 Packet->InTransferLength,\r
653 VRING_DESC_F_WRITE,\r
654 &Indices\r
655 );\r
37078a63 656 }\r
657\r
658 // If kicking the host fails, we must fake a host adapter error.\r
659 // EFI_NOT_READY would save us the effort, but it would also suggest that the\r
660 // caller retry.\r
661 //\r
56f65ed8 662 if (VirtioFlush (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE, &Dev->Ring,\r
8bc951a2 663 &Indices, NULL) != EFI_SUCCESS) {\r
9d0d5050
BS
664 Status = ReportHostAdapterError (Packet);\r
665 goto UnmapResponseBuffer;\r
37078a63 666 }\r
667\r
9d0d5050
BS
668 Status = ParseResponse (Packet, Response);\r
669\r
670 //\r
671 // If virtio request was successful and it was a CPU read request then we\r
672 // have used an intermediate buffer. Copy the data from intermediate buffer\r
673 // to the final buffer.\r
674 //\r
675 if (InDataBuffer != NULL) {\r
676 CopyMem (Packet->InDataBuffer, InDataBuffer, Packet->InTransferLength);\r
677 }\r
678\r
679UnmapResponseBuffer:\r
680 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, ResponseMapping);\r
681\r
682FreeResponseBuffer:\r
683 Dev->VirtIo->FreeSharedPages (\r
684 Dev->VirtIo,\r
685 EFI_SIZE_TO_PAGES (sizeof *Response),\r
686 ResponseBuffer\r
687 );\r
688\r
689UnmapOutDataBuffer:\r
690 if (OutDataBufferIsMapped) {\r
691 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, OutDataMapping);\r
692 }\r
693\r
694UnmapInDataBuffer:\r
695 if (InDataBuffer != NULL) {\r
696 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, InDataMapping);\r
697 }\r
698\r
699FreeInDataBuffer:\r
700 if (InDataBuffer != NULL) {\r
701 Dev->VirtIo->FreeSharedPages (Dev->VirtIo, InDataNumPages, InDataBuffer);\r
702 }\r
703\r
704UnmapRequestBuffer:\r
705 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, RequestMapping);\r
706\r
707 return Status;\r
37078a63 708}\r
709\r
710\r
711EFI_STATUS\r
712EFIAPI\r
713VirtioScsiGetNextTargetLun (\r
714 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
715 IN OUT UINT8 **TargetPointer,\r
716 IN OUT UINT64 *Lun\r
717 )\r
718{\r
719 UINT8 *Target;\r
720 UINTN Idx;\r
721 UINT16 LastTarget;\r
722 VSCSI_DEV *Dev;\r
723\r
724 //\r
725 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
726 //\r
727 Target = *TargetPointer;\r
728\r
729 //\r
730 // Search for first non-0xFF byte. If not found, return first target & LUN.\r
731 //\r
732 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
733 ;\r
734 if (Idx == TARGET_MAX_BYTES) {\r
735 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
736 *Lun = 0;\r
737 return EFI_SUCCESS;\r
738 }\r
739\r
740 //\r
741 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
742 //\r
743 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
744\r
745 //\r
746 // increment (target, LUN) pair if valid on input\r
747 //\r
748 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
749 if (LastTarget > Dev->MaxTarget || *Lun > Dev->MaxLun) {\r
750 return EFI_INVALID_PARAMETER;\r
751 }\r
752\r
753 if (*Lun < Dev->MaxLun) {\r
754 ++*Lun;\r
755 return EFI_SUCCESS;\r
756 }\r
757\r
758 if (LastTarget < Dev->MaxTarget) {\r
759 *Lun = 0;\r
760 ++LastTarget;\r
761 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
762 return EFI_SUCCESS;\r
763 }\r
764\r
765 return EFI_NOT_FOUND;\r
766}\r
767\r
768\r
769EFI_STATUS\r
770EFIAPI\r
771VirtioScsiBuildDevicePath (\r
772 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
773 IN UINT8 *Target,\r
774 IN UINT64 Lun,\r
775 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath\r
776 )\r
777{\r
778 UINT16 TargetValue;\r
779 VSCSI_DEV *Dev;\r
780 SCSI_DEVICE_PATH *ScsiDevicePath;\r
781\r
782 if (DevicePath == NULL) {\r
783 return EFI_INVALID_PARAMETER;\r
784 }\r
785\r
786 CopyMem (&TargetValue, Target, sizeof TargetValue);\r
787 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
788 if (TargetValue > Dev->MaxTarget || Lun > Dev->MaxLun || Lun > 0xFFFF) {\r
789 return EFI_NOT_FOUND;\r
790 }\r
791\r
792 ScsiDevicePath = AllocatePool (sizeof *ScsiDevicePath);\r
793 if (ScsiDevicePath == NULL) {\r
794 return EFI_OUT_OF_RESOURCES;\r
795 }\r
796\r
797 ScsiDevicePath->Header.Type = MESSAGING_DEVICE_PATH;\r
798 ScsiDevicePath->Header.SubType = MSG_SCSI_DP;\r
799 ScsiDevicePath->Header.Length[0] = (UINT8) sizeof *ScsiDevicePath;\r
800 ScsiDevicePath->Header.Length[1] = (UINT8) (sizeof *ScsiDevicePath >> 8);\r
801 ScsiDevicePath->Pun = TargetValue;\r
802 ScsiDevicePath->Lun = (UINT16) Lun;\r
803\r
804 *DevicePath = &ScsiDevicePath->Header;\r
805 return EFI_SUCCESS;\r
806}\r
807\r
808\r
809EFI_STATUS\r
810EFIAPI\r
811VirtioScsiGetTargetLun (\r
812 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
813 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,\r
814 OUT UINT8 **TargetPointer,\r
815 OUT UINT64 *Lun\r
816 )\r
817{\r
818 SCSI_DEVICE_PATH *ScsiDevicePath;\r
819 VSCSI_DEV *Dev;\r
820 UINT8 *Target;\r
821\r
822 if (DevicePath == NULL || TargetPointer == NULL || *TargetPointer == NULL ||\r
823 Lun == NULL) {\r
824 return EFI_INVALID_PARAMETER;\r
825 }\r
826\r
827 if (DevicePath->Type != MESSAGING_DEVICE_PATH ||\r
828 DevicePath->SubType != MSG_SCSI_DP) {\r
829 return EFI_UNSUPPORTED;\r
830 }\r
831\r
832 ScsiDevicePath = (SCSI_DEVICE_PATH *) DevicePath;\r
833 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
834 if (ScsiDevicePath->Pun > Dev->MaxTarget ||\r
835 ScsiDevicePath->Lun > Dev->MaxLun) {\r
836 return EFI_NOT_FOUND;\r
837 }\r
838\r
839 //\r
840 // a) the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
841 // b) see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
842 // c) ScsiDevicePath->Pun is an UINT16\r
843 //\r
844 Target = *TargetPointer;\r
845 CopyMem (Target, &ScsiDevicePath->Pun, 2);\r
846 SetMem (Target + 2, TARGET_MAX_BYTES - 2, 0x00);\r
847\r
848 *Lun = ScsiDevicePath->Lun;\r
849 return EFI_SUCCESS;\r
850}\r
851\r
852\r
853EFI_STATUS\r
854EFIAPI\r
855VirtioScsiResetChannel (\r
856 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This\r
857 )\r
858{\r
859 return EFI_UNSUPPORTED;\r
860}\r
861\r
862\r
863EFI_STATUS\r
864EFIAPI\r
865VirtioScsiResetTargetLun (\r
866 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
867 IN UINT8 *Target,\r
868 IN UINT64 Lun\r
869 )\r
870{\r
871 return EFI_UNSUPPORTED;\r
872}\r
873\r
874\r
875EFI_STATUS\r
876EFIAPI\r
877VirtioScsiGetNextTarget (\r
878 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,\r
879 IN OUT UINT8 **TargetPointer\r
880 )\r
881{\r
882 UINT8 *Target;\r
883 UINTN Idx;\r
884 UINT16 LastTarget;\r
885 VSCSI_DEV *Dev;\r
886\r
887 //\r
888 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer\r
889 //\r
890 Target = *TargetPointer;\r
891\r
892 //\r
893 // Search for first non-0xFF byte. If not found, return first target.\r
894 //\r
895 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)\r
896 ;\r
897 if (Idx == TARGET_MAX_BYTES) {\r
898 SetMem (Target, TARGET_MAX_BYTES, 0x00);\r
899 return EFI_SUCCESS;\r
900 }\r
901\r
902 //\r
903 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"\r
904 //\r
905 CopyMem (&LastTarget, Target, sizeof LastTarget);\r
906\r
907 //\r
908 // increment target if valid on input\r
909 //\r
910 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);\r
911 if (LastTarget > Dev->MaxTarget) {\r
912 return EFI_INVALID_PARAMETER;\r
913 }\r
914\r
915 if (LastTarget < Dev->MaxTarget) {\r
916 ++LastTarget;\r
917 CopyMem (Target, &LastTarget, sizeof LastTarget);\r
918 return EFI_SUCCESS;\r
919 }\r
920\r
921 return EFI_NOT_FOUND;\r
922}\r
923\r
924\r
925STATIC\r
926EFI_STATUS\r
927EFIAPI\r
928VirtioScsiInit (\r
929 IN OUT VSCSI_DEV *Dev\r
930 )\r
931{\r
932 UINT8 NextDevStat;\r
933 EFI_STATUS Status;\r
fc2168fe 934 UINT64 RingBaseShift;\r
bc8fde6f 935 UINT64 Features;\r
37078a63 936 UINT16 MaxChannel; // for validation only\r
937 UINT32 NumQueues; // for validation only\r
938 UINT16 QueueSize;\r
939\r
940 //\r
941 // Execute virtio-0.9.5, 2.2.1 Device Initialization Sequence.\r
942 //\r
943 NextDevStat = 0; // step 1 -- reset device\r
56f65ed8 944 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 945 if (EFI_ERROR (Status)) {\r
946 goto Failed;\r
947 }\r
948\r
949 NextDevStat |= VSTAT_ACK; // step 2 -- acknowledge device presence\r
56f65ed8 950 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 951 if (EFI_ERROR (Status)) {\r
952 goto Failed;\r
953 }\r
954\r
955 NextDevStat |= VSTAT_DRIVER; // step 3 -- we know how to drive it\r
56f65ed8
OM
956 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
957 if (EFI_ERROR (Status)) {\r
958 goto Failed;\r
959 }\r
960\r
961 //\r
962 // Set Page Size - MMIO VirtIo Specific\r
963 //\r
964 Status = Dev->VirtIo->SetPageSize (Dev->VirtIo, EFI_PAGE_SIZE);\r
37078a63 965 if (EFI_ERROR (Status)) {\r
966 goto Failed;\r
967 }\r
968\r
969 //\r
970 // step 4a -- retrieve and validate features\r
971 //\r
56f65ed8 972 Status = Dev->VirtIo->GetDeviceFeatures (Dev->VirtIo, &Features);\r
37078a63 973 if (EFI_ERROR (Status)) {\r
974 goto Failed;\r
975 }\r
c4046161 976 Dev->InOutSupported = (BOOLEAN) ((Features & VIRTIO_SCSI_F_INOUT) != 0);\r
37078a63 977\r
56f65ed8 978 Status = VIRTIO_CFG_READ (Dev, MaxChannel, &MaxChannel);\r
37078a63 979 if (EFI_ERROR (Status)) {\r
980 goto Failed;\r
981 }\r
982 if (MaxChannel != 0) {\r
983 //\r
984 // this driver is for a single-channel virtio-scsi HBA\r
985 //\r
986 Status = EFI_UNSUPPORTED;\r
987 goto Failed;\r
988 }\r
989\r
56f65ed8 990 Status = VIRTIO_CFG_READ (Dev, NumQueues, &NumQueues);\r
37078a63 991 if (EFI_ERROR (Status)) {\r
992 goto Failed;\r
993 }\r
994 if (NumQueues < 1) {\r
995 Status = EFI_UNSUPPORTED;\r
996 goto Failed;\r
997 }\r
998\r
56f65ed8 999 Status = VIRTIO_CFG_READ (Dev, MaxTarget, &Dev->MaxTarget);\r
37078a63 1000 if (EFI_ERROR (Status)) {\r
1001 goto Failed;\r
1002 }\r
1003 if (Dev->MaxTarget > PcdGet16 (PcdVirtioScsiMaxTargetLimit)) {\r
1004 Dev->MaxTarget = PcdGet16 (PcdVirtioScsiMaxTargetLimit);\r
1005 }\r
1006\r
56f65ed8 1007 Status = VIRTIO_CFG_READ (Dev, MaxLun, &Dev->MaxLun);\r
37078a63 1008 if (EFI_ERROR (Status)) {\r
1009 goto Failed;\r
1010 }\r
1011 if (Dev->MaxLun > PcdGet32 (PcdVirtioScsiMaxLunLimit)) {\r
1012 Dev->MaxLun = PcdGet32 (PcdVirtioScsiMaxLunLimit);\r
1013 }\r
1014\r
56f65ed8 1015 Status = VIRTIO_CFG_READ (Dev, MaxSectors, &Dev->MaxSectors);\r
37078a63 1016 if (EFI_ERROR (Status)) {\r
1017 goto Failed;\r
1018 }\r
1019 if (Dev->MaxSectors < 2) {\r
1020 //\r
1021 // We must be able to halve it for bidirectional transfers\r
1022 // (see EFI_BAD_BUFFER_SIZE in PopulateRequest()).\r
1023 //\r
1024 Status = EFI_UNSUPPORTED;\r
1025 goto Failed;\r
1026 }\r
1027\r
17cbf735
BS
1028 Features &= VIRTIO_SCSI_F_INOUT | VIRTIO_F_VERSION_1 |\r
1029 VIRTIO_F_IOMMU_PLATFORM;\r
39c2d339
LE
1030\r
1031 //\r
1032 // In virtio-1.0, feature negotiation is expected to complete before queue\r
1033 // discovery, and the device can also reject the selected set of features.\r
1034 //\r
1035 if (Dev->VirtIo->Revision >= VIRTIO_SPEC_REVISION (1, 0, 0)) {\r
1036 Status = Virtio10WriteFeatures (Dev->VirtIo, Features, &NextDevStat);\r
1037 if (EFI_ERROR (Status)) {\r
1038 goto Failed;\r
1039 }\r
1040 }\r
1041\r
37078a63 1042 //\r
1043 // step 4b -- allocate request virtqueue\r
1044 //\r
56f65ed8 1045 Status = Dev->VirtIo->SetQueueSel (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE);\r
37078a63 1046 if (EFI_ERROR (Status)) {\r
1047 goto Failed;\r
1048 }\r
56f65ed8 1049 Status = Dev->VirtIo->GetQueueNumMax (Dev->VirtIo, &QueueSize);\r
37078a63 1050 if (EFI_ERROR (Status)) {\r
1051 goto Failed;\r
1052 }\r
1053 //\r
1054 // VirtioScsiPassThru() uses at most four descriptors\r
1055 //\r
1056 if (QueueSize < 4) {\r
1057 Status = EFI_UNSUPPORTED;\r
1058 goto Failed;\r
1059 }\r
1060\r
fc2c1543 1061 Status = VirtioRingInit (Dev->VirtIo, QueueSize, &Dev->Ring);\r
37078a63 1062 if (EFI_ERROR (Status)) {\r
1063 goto Failed;\r
1064 }\r
1065\r
fc2168fe
BS
1066 //\r
1067 // If anything fails from here on, we must release the ring resources\r
1068 //\r
1069 Status = VirtioRingMap (\r
1070 Dev->VirtIo,\r
1071 &Dev->Ring,\r
1072 &RingBaseShift,\r
1073 &Dev->RingMap\r
1074 );\r
1075 if (EFI_ERROR (Status)) {\r
1076 goto ReleaseQueue;\r
1077 }\r
1078\r
37078a63 1079 //\r
56f65ed8 1080 // Additional steps for MMIO: align the queue appropriately, and set the\r
fc2168fe 1081 // size. If anything fails from here on, we must unmap the ring resources.\r
37078a63 1082 //\r
56f65ed8
OM
1083 Status = Dev->VirtIo->SetQueueNum (Dev->VirtIo, QueueSize);\r
1084 if (EFI_ERROR (Status)) {\r
fc2168fe 1085 goto UnmapQueue;\r
56f65ed8
OM
1086 }\r
1087\r
1088 Status = Dev->VirtIo->SetQueueAlign (Dev->VirtIo, EFI_PAGE_SIZE);\r
1089 if (EFI_ERROR (Status)) {\r
fc2168fe 1090 goto UnmapQueue;\r
56f65ed8
OM
1091 }\r
1092\r
1093 //\r
1094 // step 4c -- Report GPFN (guest-physical frame number) of queue.\r
1095 //\r
fc2168fe
BS
1096 Status = Dev->VirtIo->SetQueueAddress (\r
1097 Dev->VirtIo,\r
1098 &Dev->Ring,\r
1099 RingBaseShift\r
1100 );\r
37078a63 1101 if (EFI_ERROR (Status)) {\r
fc2168fe 1102 goto UnmapQueue;\r
37078a63 1103 }\r
1104\r
1105 //\r
39c2d339 1106 // step 5 -- Report understood features and guest-tuneables.\r
37078a63 1107 //\r
39c2d339 1108 if (Dev->VirtIo->Revision < VIRTIO_SPEC_REVISION (1, 0, 0)) {\r
17cbf735 1109 Features &= ~(UINT64)(VIRTIO_F_VERSION_1 | VIRTIO_F_IOMMU_PLATFORM);\r
39c2d339
LE
1110 Status = Dev->VirtIo->SetGuestFeatures (Dev->VirtIo, Features);\r
1111 if (EFI_ERROR (Status)) {\r
fc2168fe 1112 goto UnmapQueue;\r
39c2d339 1113 }\r
37078a63 1114 }\r
1115\r
1116 //\r
1117 // We expect these maximum sizes from the host. Since they are\r
1118 // guest-negotiable, ask for them rather than just checking them.\r
1119 //\r
56f65ed8 1120 Status = VIRTIO_CFG_WRITE (Dev, CdbSize, VIRTIO_SCSI_CDB_SIZE);\r
37078a63 1121 if (EFI_ERROR (Status)) {\r
fc2168fe 1122 goto UnmapQueue;\r
37078a63 1123 }\r
56f65ed8 1124 Status = VIRTIO_CFG_WRITE (Dev, SenseSize, VIRTIO_SCSI_SENSE_SIZE);\r
37078a63 1125 if (EFI_ERROR (Status)) {\r
fc2168fe 1126 goto UnmapQueue;\r
37078a63 1127 }\r
1128\r
1129 //\r
1130 // step 6 -- initialization complete\r
1131 //\r
1132 NextDevStat |= VSTAT_DRIVER_OK;\r
56f65ed8 1133 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 1134 if (EFI_ERROR (Status)) {\r
fc2168fe 1135 goto UnmapQueue;\r
37078a63 1136 }\r
1137\r
1138 //\r
1139 // populate the exported interface's attributes\r
1140 //\r
1141 Dev->PassThru.Mode = &Dev->PassThruMode;\r
1142 Dev->PassThru.PassThru = &VirtioScsiPassThru;\r
1143 Dev->PassThru.GetNextTargetLun = &VirtioScsiGetNextTargetLun;\r
1144 Dev->PassThru.BuildDevicePath = &VirtioScsiBuildDevicePath;\r
1145 Dev->PassThru.GetTargetLun = &VirtioScsiGetTargetLun;\r
1146 Dev->PassThru.ResetChannel = &VirtioScsiResetChannel;\r
1147 Dev->PassThru.ResetTargetLun = &VirtioScsiResetTargetLun;\r
1148 Dev->PassThru.GetNextTarget = &VirtioScsiGetNextTarget;\r
1149\r
1150 //\r
1151 // AdapterId is a target for which no handle will be created during bus scan.\r
1152 // Prevent any conflict with real devices.\r
1153 //\r
1154 Dev->PassThruMode.AdapterId = 0xFFFFFFFF;\r
1155\r
1156 //\r
1157 // Set both physical and logical attributes for non-RAID SCSI channel. See\r
1158 // Driver Writer's Guide for UEFI 2.3.1 v1.01, 20.1.5 Implementing Extended\r
1159 // SCSI Pass Thru Protocol.\r
1160 //\r
1161 Dev->PassThruMode.Attributes = EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_PHYSICAL |\r
1162 EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_LOGICAL;\r
1163\r
1164 //\r
1165 // no restriction on transfer buffer alignment\r
1166 //\r
1167 Dev->PassThruMode.IoAlign = 0;\r
1168\r
1169 return EFI_SUCCESS;\r
1170\r
fc2168fe
BS
1171UnmapQueue:\r
1172 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RingMap);\r
1173\r
37078a63 1174ReleaseQueue:\r
fc2c1543 1175 VirtioRingUninit (Dev->VirtIo, &Dev->Ring);\r
37078a63 1176\r
1177Failed:\r
1178 //\r
1179 // Notify the host about our failure to setup: virtio-0.9.5, 2.2.2.1 Device\r
56f65ed8 1180 // Status. VirtIo access failure here should not mask the original error.\r
37078a63 1181 //\r
1182 NextDevStat |= VSTAT_FAILED;\r
56f65ed8 1183 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);\r
37078a63 1184\r
1185 Dev->InOutSupported = FALSE;\r
1186 Dev->MaxTarget = 0;\r
1187 Dev->MaxLun = 0;\r
1188 Dev->MaxSectors = 0;\r
1189\r
1190 return Status; // reached only via Failed above\r
1191}\r
1192\r
1193\r
37078a63 1194STATIC\r
1195VOID\r
1196EFIAPI\r
1197VirtioScsiUninit (\r
1198 IN OUT VSCSI_DEV *Dev\r
1199 )\r
1200{\r
1201 //\r
1202 // Reset the virtual device -- see virtio-0.9.5, 2.2.2.1 Device Status. When\r
1203 // VIRTIO_CFG_WRITE() returns, the host will have learned to stay away from\r
1204 // the old comms area.\r
1205 //\r
56f65ed8 1206 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);\r
37078a63 1207\r
1208 Dev->InOutSupported = FALSE;\r
1209 Dev->MaxTarget = 0;\r
1210 Dev->MaxLun = 0;\r
1211 Dev->MaxSectors = 0;\r
1212\r
fc2168fe 1213 Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RingMap);\r
fc2c1543 1214 VirtioRingUninit (Dev->VirtIo, &Dev->Ring);\r
37078a63 1215\r
1216 SetMem (&Dev->PassThru, sizeof Dev->PassThru, 0x00);\r
1217 SetMem (&Dev->PassThruMode, sizeof Dev->PassThruMode, 0x00);\r
1218}\r
1219\r
1220\r
fbc80813
LE
1221//\r
1222// Event notification function enqueued by ExitBootServices().\r
1223//\r
1224\r
1225STATIC\r
1226VOID\r
1227EFIAPI\r
1228VirtioScsiExitBoot (\r
1229 IN EFI_EVENT Event,\r
1230 IN VOID *Context\r
1231 )\r
1232{\r
1233 VSCSI_DEV *Dev;\r
1234\r
bf99bdd1 1235 DEBUG ((DEBUG_VERBOSE, "%a: Context=0x%p\n", __FUNCTION__, Context));\r
fbc80813
LE
1236 //\r
1237 // Reset the device. This causes the hypervisor to forget about the virtio\r
1238 // ring.\r
1239 //\r
1240 // We allocated said ring in EfiBootServicesData type memory, and code\r
1241 // executing after ExitBootServices() is permitted to overwrite it.\r
1242 //\r
1243 Dev = Context;\r
1244 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);\r
1245}\r
1246\r
1247\r
37078a63 1248//\r
1249// Probe, start and stop functions of this driver, called by the DXE core for\r
1250// specific devices.\r
1251//\r
1252// The following specifications document these interfaces:\r
1253// - Driver Writer's Guide for UEFI 2.3.1 v1.01, 9 Driver Binding Protocol\r
1254// - UEFI Spec 2.3.1 + Errata C, 10.1 EFI Driver Binding Protocol\r
1255//\r
1256// The implementation follows:\r
1257// - Driver Writer's Guide for UEFI 2.3.1 v1.01\r
1258// - 5.1.3.4 OpenProtocol() and CloseProtocol()\r
37078a63 1259// - UEFI Spec 2.3.1 + Errata C\r
1260// - 6.3 Protocol Handler Services\r
37078a63 1261//\r
1262\r
1263EFI_STATUS\r
1264EFIAPI\r
1265VirtioScsiDriverBindingSupported (\r
1266 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1267 IN EFI_HANDLE DeviceHandle,\r
1268 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
1269 )\r
1270{\r
56f65ed8
OM
1271 EFI_STATUS Status;\r
1272 VIRTIO_DEVICE_PROTOCOL *VirtIo;\r
37078a63 1273\r
1274 //\r
56f65ed8
OM
1275 // Attempt to open the device with the VirtIo set of interfaces. On success,\r
1276 // the protocol is "instantiated" for the VirtIo device. Covers duplicate open\r
37078a63 1277 // attempts (EFI_ALREADY_STARTED).\r
1278 //\r
1279 Status = gBS->OpenProtocol (\r
1280 DeviceHandle, // candidate device\r
56f65ed8
OM
1281 &gVirtioDeviceProtocolGuid, // for generic VirtIo access\r
1282 (VOID **)&VirtIo, // handle to instantiate\r
37078a63 1283 This->DriverBindingHandle, // requestor driver identity\r
1284 DeviceHandle, // ControllerHandle, according to\r
1285 // the UEFI Driver Model\r
56f65ed8 1286 EFI_OPEN_PROTOCOL_BY_DRIVER // get exclusive VirtIo access to\r
37078a63 1287 // the device; to be released\r
1288 );\r
1289 if (EFI_ERROR (Status)) {\r
1290 return Status;\r
1291 }\r
1292\r
56f65ed8
OM
1293 if (VirtIo->SubSystemDeviceId != VIRTIO_SUBSYSTEM_SCSI_HOST) {\r
1294 Status = EFI_UNSUPPORTED;\r
37078a63 1295 }\r
1296\r
1297 //\r
56f65ed8 1298 // We needed VirtIo access only transitorily, to see whether we support the\r
37078a63 1299 // device or not.\r
1300 //\r
56f65ed8 1301 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1302 This->DriverBindingHandle, DeviceHandle);\r
1303 return Status;\r
1304}\r
1305\r
1306\r
1307EFI_STATUS\r
1308EFIAPI\r
1309VirtioScsiDriverBindingStart (\r
1310 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1311 IN EFI_HANDLE DeviceHandle,\r
1312 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath\r
1313 )\r
1314{\r
1315 VSCSI_DEV *Dev;\r
1316 EFI_STATUS Status;\r
1317\r
1318 Dev = (VSCSI_DEV *) AllocateZeroPool (sizeof *Dev);\r
1319 if (Dev == NULL) {\r
1320 return EFI_OUT_OF_RESOURCES;\r
1321 }\r
1322\r
56f65ed8
OM
1323 Status = gBS->OpenProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
1324 (VOID **)&Dev->VirtIo, This->DriverBindingHandle,\r
37078a63 1325 DeviceHandle, EFI_OPEN_PROTOCOL_BY_DRIVER);\r
1326 if (EFI_ERROR (Status)) {\r
1327 goto FreeVirtioScsi;\r
1328 }\r
1329\r
1330 //\r
56f65ed8 1331 // VirtIo access granted, configure virtio-scsi device.\r
37078a63 1332 //\r
1333 Status = VirtioScsiInit (Dev);\r
1334 if (EFI_ERROR (Status)) {\r
56f65ed8 1335 goto CloseVirtIo;\r
37078a63 1336 }\r
1337\r
fbc80813
LE
1338 Status = gBS->CreateEvent (EVT_SIGNAL_EXIT_BOOT_SERVICES, TPL_CALLBACK,\r
1339 &VirtioScsiExitBoot, Dev, &Dev->ExitBoot);\r
1340 if (EFI_ERROR (Status)) {\r
1341 goto UninitDev;\r
1342 }\r
1343\r
37078a63 1344 //\r
1345 // Setup complete, attempt to export the driver instance's PassThru\r
1346 // interface.\r
1347 //\r
1348 Dev->Signature = VSCSI_SIG;\r
1349 Status = gBS->InstallProtocolInterface (&DeviceHandle,\r
1350 &gEfiExtScsiPassThruProtocolGuid, EFI_NATIVE_INTERFACE,\r
1351 &Dev->PassThru);\r
1352 if (EFI_ERROR (Status)) {\r
fbc80813 1353 goto CloseExitBoot;\r
37078a63 1354 }\r
1355\r
1356 return EFI_SUCCESS;\r
1357\r
fbc80813
LE
1358CloseExitBoot:\r
1359 gBS->CloseEvent (Dev->ExitBoot);\r
1360\r
37078a63 1361UninitDev:\r
1362 VirtioScsiUninit (Dev);\r
1363\r
56f65ed8
OM
1364CloseVirtIo:\r
1365 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1366 This->DriverBindingHandle, DeviceHandle);\r
1367\r
1368FreeVirtioScsi:\r
1369 FreePool (Dev);\r
1370\r
1371 return Status;\r
1372}\r
1373\r
1374\r
1375EFI_STATUS\r
1376EFIAPI\r
1377VirtioScsiDriverBindingStop (\r
1378 IN EFI_DRIVER_BINDING_PROTOCOL *This,\r
1379 IN EFI_HANDLE DeviceHandle,\r
1380 IN UINTN NumberOfChildren,\r
1381 IN EFI_HANDLE *ChildHandleBuffer\r
1382 )\r
1383{\r
1384 EFI_STATUS Status;\r
1385 EFI_EXT_SCSI_PASS_THRU_PROTOCOL *PassThru;\r
1386 VSCSI_DEV *Dev;\r
1387\r
1388 Status = gBS->OpenProtocol (\r
1389 DeviceHandle, // candidate device\r
1390 &gEfiExtScsiPassThruProtocolGuid, // retrieve the SCSI iface\r
1391 (VOID **)&PassThru, // target pointer\r
1392 This->DriverBindingHandle, // requestor driver ident.\r
1393 DeviceHandle, // lookup req. for dev.\r
1394 EFI_OPEN_PROTOCOL_GET_PROTOCOL // lookup only, no new ref.\r
1395 );\r
1396 if (EFI_ERROR (Status)) {\r
1397 return Status;\r
1398 }\r
1399\r
1400 Dev = VIRTIO_SCSI_FROM_PASS_THRU (PassThru);\r
1401\r
1402 //\r
1403 // Handle Stop() requests for in-use driver instances gracefully.\r
1404 //\r
1405 Status = gBS->UninstallProtocolInterface (DeviceHandle,\r
1406 &gEfiExtScsiPassThruProtocolGuid, &Dev->PassThru);\r
1407 if (EFI_ERROR (Status)) {\r
1408 return Status;\r
1409 }\r
1410\r
fbc80813
LE
1411 gBS->CloseEvent (Dev->ExitBoot);\r
1412\r
37078a63 1413 VirtioScsiUninit (Dev);\r
1414\r
56f65ed8 1415 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,\r
37078a63 1416 This->DriverBindingHandle, DeviceHandle);\r
1417\r
1418 FreePool (Dev);\r
1419\r
1420 return EFI_SUCCESS;\r
1421}\r
1422\r
1423\r
1424//\r
1425// The static object that groups the Supported() (ie. probe), Start() and\r
1426// Stop() functions of the driver together. Refer to UEFI Spec 2.3.1 + Errata\r
1427// C, 10.1 EFI Driver Binding Protocol.\r
1428//\r
1429STATIC EFI_DRIVER_BINDING_PROTOCOL gDriverBinding = {\r
1430 &VirtioScsiDriverBindingSupported,\r
1431 &VirtioScsiDriverBindingStart,\r
1432 &VirtioScsiDriverBindingStop,\r
1433 0x10, // Version, must be in [0x10 .. 0xFFFFFFEF] for IHV-developed drivers\r
1434 NULL, // ImageHandle, to be overwritten by\r
1435 // EfiLibInstallDriverBindingComponentName2() in VirtioScsiEntryPoint()\r
1436 NULL // DriverBindingHandle, ditto\r
1437};\r
1438\r
1439\r
1440//\r
1441// The purpose of the following scaffolding (EFI_COMPONENT_NAME_PROTOCOL and\r
1442// EFI_COMPONENT_NAME2_PROTOCOL implementation) is to format the driver's name\r
1443// in English, for display on standard console devices. This is recommended for\r
1444// UEFI drivers that follow the UEFI Driver Model. Refer to the Driver Writer's\r
1445// Guide for UEFI 2.3.1 v1.01, 11 UEFI Driver and Controller Names.\r
1446//\r
1447// Device type names ("Virtio SCSI Host Device") are not formatted because the\r
1448// driver supports only that device type. Therefore the driver name suffices\r
1449// for unambiguous identification.\r
1450//\r
1451\r
1452STATIC\r
1453EFI_UNICODE_STRING_TABLE mDriverNameTable[] = {\r
1454 { "eng;en", L"Virtio SCSI Host Driver" },\r
1455 { NULL, NULL }\r
1456};\r
1457\r
1458STATIC\r
1459EFI_COMPONENT_NAME_PROTOCOL gComponentName;\r
1460\r
1461EFI_STATUS\r
1462EFIAPI\r
1463VirtioScsiGetDriverName (\r
1464 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1465 IN CHAR8 *Language,\r
1466 OUT CHAR16 **DriverName\r
1467 )\r
1468{\r
1469 return LookupUnicodeString2 (\r
1470 Language,\r
1471 This->SupportedLanguages,\r
1472 mDriverNameTable,\r
1473 DriverName,\r
1474 (BOOLEAN)(This == &gComponentName) // Iso639Language\r
1475 );\r
1476}\r
1477\r
1478EFI_STATUS\r
1479EFIAPI\r
1480VirtioScsiGetDeviceName (\r
1481 IN EFI_COMPONENT_NAME_PROTOCOL *This,\r
1482 IN EFI_HANDLE DeviceHandle,\r
1483 IN EFI_HANDLE ChildHandle,\r
1484 IN CHAR8 *Language,\r
1485 OUT CHAR16 **ControllerName\r
1486 )\r
1487{\r
1488 return EFI_UNSUPPORTED;\r
1489}\r
1490\r
1491STATIC\r
1492EFI_COMPONENT_NAME_PROTOCOL gComponentName = {\r
1493 &VirtioScsiGetDriverName,\r
1494 &VirtioScsiGetDeviceName,\r
1495 "eng" // SupportedLanguages, ISO 639-2 language codes\r
1496};\r
1497\r
1498STATIC\r
1499EFI_COMPONENT_NAME2_PROTOCOL gComponentName2 = {\r
1500 (EFI_COMPONENT_NAME2_GET_DRIVER_NAME) &VirtioScsiGetDriverName,\r
1501 (EFI_COMPONENT_NAME2_GET_CONTROLLER_NAME) &VirtioScsiGetDeviceName,\r
1502 "en" // SupportedLanguages, RFC 4646 language codes\r
1503};\r
1504\r
1505\r
1506//\r
1507// Entry point of this driver.\r
1508//\r
1509EFI_STATUS\r
1510EFIAPI\r
1511VirtioScsiEntryPoint (\r
1512 IN EFI_HANDLE ImageHandle,\r
1513 IN EFI_SYSTEM_TABLE *SystemTable\r
1514 )\r
1515{\r
1516 return EfiLibInstallDriverBindingComponentName2 (\r
1517 ImageHandle,\r
1518 SystemTable,\r
1519 &gDriverBinding,\r
1520 ImageHandle,\r
1521 &gComponentName,\r
1522 &gComponentName2\r
1523 );\r
1524}\r