]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/VirtioScsiDxe/VirtioScsi.c
OvmfPkg: Fix VS2005 build warnings
[mirror_edk2.git] / OvmfPkg / VirtioScsiDxe / VirtioScsi.c
1 /** @file
2
3 This driver produces Extended SCSI Pass Thru Protocol instances for
4 virtio-scsi devices.
5
6 The implementation is basic:
7
8 - No hotplug / hot-unplug.
9
10 - Although EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() could be a good match
11 for multiple in-flight virtio-scsi requests, we stick to synchronous
12 requests for now.
13
14 - Timeouts are not supported for EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru().
15
16 - Only one channel is supported. (At the time of this writing, host-side
17 virtio-scsi supports a single channel too.)
18
19 - Only one request queue is used (for the one synchronous request).
20
21 - The ResetChannel() and ResetTargetLun() functions of
22 EFI_EXT_SCSI_PASS_THRU_PROTOCOL are not supported (which is allowed by the
23 UEFI 2.3.1 Errata C specification), although
24 VIRTIO_SCSI_T_TMF_LOGICAL_UNIT_RESET could be a good match. That would
25 however require client code for the control queue, which is deemed
26 unreasonable for now.
27
28 Copyright (C) 2012, Red Hat, Inc.
29 Copyright (c) 2012 - 2014, Intel Corporation. All rights reserved.<BR>
30
31 This program and the accompanying materials are licensed and made available
32 under the terms and conditions of the BSD License which accompanies this
33 distribution. The full text of the license may be found at
34 http://opensource.org/licenses/bsd-license.php
35
36 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT
37 WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
38
39 **/
40
41 #include <IndustryStandard/VirtioScsi.h>
42 #include <Library/BaseMemoryLib.h>
43 #include <Library/DebugLib.h>
44 #include <Library/MemoryAllocationLib.h>
45 #include <Library/UefiBootServicesTableLib.h>
46 #include <Library/UefiLib.h>
47 #include <Library/VirtioLib.h>
48
49 #include "VirtioScsi.h"
50
51 /**
52
53 Convenience macros to read and write configuration elements of the
54 virtio-scsi VirtIo device.
55
56 The following macros make it possible to specify only the "core parameters"
57 for such accesses and to derive the rest. By the time VIRTIO_CFG_WRITE()
58 returns, the transaction will have been completed.
59
60 @param[in] Dev Pointer to the VSCSI_DEV structure.
61
62 @param[in] Field A field name from VSCSI_HDR, identifying the virtio-scsi
63 configuration item to access.
64
65 @param[in] Value (VIRTIO_CFG_WRITE() only.) The value to write to the
66 selected configuration item.
67
68 @param[out] Pointer (VIRTIO_CFG_READ() only.) The object to receive the
69 value read from the configuration item. Its type must be
70 one of UINT8, UINT16, UINT32, UINT64.
71
72
73 @return Status codes returned by Virtio->WriteDevice() / Virtio->ReadDevice().
74
75 **/
76
77 #define VIRTIO_CFG_WRITE(Dev, Field, Value) ((Dev)->VirtIo->WriteDevice ( \
78 (Dev)->VirtIo, \
79 OFFSET_OF_VSCSI (Field), \
80 SIZE_OF_VSCSI (Field), \
81 (Value) \
82 ))
83
84 #define VIRTIO_CFG_READ(Dev, Field, Pointer) ((Dev)->VirtIo->ReadDevice ( \
85 (Dev)->VirtIo, \
86 OFFSET_OF_VSCSI (Field), \
87 SIZE_OF_VSCSI (Field), \
88 sizeof *(Pointer), \
89 (Pointer) \
90 ))
91
92
93 //
94 // UEFI Spec 2.3.1 + Errata C, 14.7 Extended SCSI Pass Thru Protocol specifies
95 // the PassThru() interface. Beside returning a status code, the function must
96 // set some fields in the EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET in/out
97 // parameter on return. The following is a full list of those fields, for
98 // easier validation of PopulateRequest(), ParseResponse(), and
99 // VirtioScsiPassThru() below.
100 //
101 // - InTransferLength
102 // - OutTransferLength
103 // - HostAdapterStatus
104 // - TargetStatus
105 // - SenseDataLength
106 // - SenseData
107 //
108 // On any return from the PassThru() interface, these fields must be set,
109 // except if the returned status code is explicitly exempt. (Actually the
110 // implementation here conservatively sets these fields even in case not all
111 // of them would be required by the specification.)
112 //
113
114 /**
115
116 Populate a virtio-scsi request from the Extended SCSI Pass Thru Protocol
117 packet.
118
119 The caller is responsible for pre-zeroing the virtio-scsi request. The
120 Extended SCSI Pass Thru Protocol packet is modified, to be forwarded outwards
121 by VirtioScsiPassThru(), if invalid or unsupported parameters are detected.
122
123 @param[in] Dev The virtio-scsi host device the packet targets.
124
125 @param[in] Target The SCSI target controlled by the virtio-scsi host
126 device.
127
128 @param[in] Lun The Logical Unit Number under the SCSI target.
129
130 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet the
131 function translates to a virtio-scsi request. On
132 failure this parameter relays error contents.
133
134 @param[out] Request The pre-zeroed virtio-scsi request to populate. This
135 parameter is volatile-qualified because we expect the
136 caller to append it to a virtio ring, thus
137 assignments to Request must be visible when the
138 function returns.
139
140
141 @retval EFI_SUCCESS The Extended SCSI Pass Thru Protocol packet was valid,
142 Request has been populated.
143
144 @return Otherwise, invalid or unsupported parameters were
145 detected. Status codes are meant for direct forwarding
146 by the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru()
147 implementation.
148
149 **/
150 STATIC
151 EFI_STATUS
152 EFIAPI
153 PopulateRequest (
154 IN CONST VSCSI_DEV *Dev,
155 IN UINT16 Target,
156 IN UINT64 Lun,
157 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
158 OUT volatile VIRTIO_SCSI_REQ *Request
159 )
160 {
161 UINTN Idx;
162
163 if (
164 //
165 // bidirectional transfer was requested, but the host doesn't support it
166 //
167 (Packet->InTransferLength > 0 && Packet->OutTransferLength > 0 &&
168 !Dev->InOutSupported) ||
169
170 //
171 // a target / LUN was addressed that's impossible to encode for the host
172 //
173 Target > 0xFF || Lun >= 0x4000 ||
174
175 //
176 // Command Descriptor Block bigger than VIRTIO_SCSI_CDB_SIZE
177 //
178 Packet->CdbLength > VIRTIO_SCSI_CDB_SIZE ||
179
180 //
181 // From virtio-0.9.5, 2.3.2 Descriptor Table:
182 // "no descriptor chain may be more than 2^32 bytes long in total".
183 //
184 (UINT64) Packet->InTransferLength + Packet->OutTransferLength > SIZE_1GB
185 ) {
186
187 //
188 // this error code doesn't require updates to the Packet output fields
189 //
190 return EFI_UNSUPPORTED;
191 }
192
193 if (
194 //
195 // addressed invalid device
196 //
197 Target > Dev->MaxTarget || Lun > Dev->MaxLun ||
198
199 //
200 // invalid direction (there doesn't seem to be a macro for the "no data
201 // transferred" "direction", eg. for TEST UNIT READY)
202 //
203 Packet->DataDirection > EFI_EXT_SCSI_DATA_DIRECTION_BIDIRECTIONAL ||
204
205 //
206 // trying to receive, but destination pointer is NULL, or contradicting
207 // transfer direction
208 //
209 (Packet->InTransferLength > 0 &&
210 (Packet->InDataBuffer == NULL ||
211 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_WRITE
212 )
213 ) ||
214
215 //
216 // trying to send, but source pointer is NULL, or contradicting transfer
217 // direction
218 //
219 (Packet->OutTransferLength > 0 &&
220 (Packet->OutDataBuffer == NULL ||
221 Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_READ
222 )
223 )
224 ) {
225
226 //
227 // this error code doesn't require updates to the Packet output fields
228 //
229 return EFI_INVALID_PARAMETER;
230 }
231
232 //
233 // Catch oversized requests eagerly. If this condition evaluates to false,
234 // then the combined size of a bidirectional request will not exceed the
235 // virtio-scsi device's transfer limit either.
236 //
237 if (ALIGN_VALUE (Packet->OutTransferLength, 512) / 512
238 > Dev->MaxSectors / 2 ||
239 ALIGN_VALUE (Packet->InTransferLength, 512) / 512
240 > Dev->MaxSectors / 2) {
241 Packet->InTransferLength = (Dev->MaxSectors / 2) * 512;
242 Packet->OutTransferLength = (Dev->MaxSectors / 2) * 512;
243 Packet->HostAdapterStatus =
244 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;
245 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;
246 Packet->SenseDataLength = 0;
247 return EFI_BAD_BUFFER_SIZE;
248 }
249
250 //
251 // target & LUN encoding: see virtio-0.9.5, Appendix I: SCSI Host Device,
252 // Device Operation: request queues
253 //
254 Request->Lun[0] = 1;
255 Request->Lun[1] = (UINT8) Target;
256 Request->Lun[2] = (UINT8) ((Lun >> 8) | 0x40);
257 Request->Lun[3] = (UINT8) Lun;
258
259 //
260 // CopyMem() would cast away the "volatile" qualifier before access, which is
261 // undefined behavior (ISO C99 6.7.3p5)
262 //
263 for (Idx = 0; Idx < Packet->CdbLength; ++Idx) {
264 Request->Cdb[Idx] = ((UINT8 *) Packet->Cdb)[Idx];
265 }
266
267 return EFI_SUCCESS;
268 }
269
270
271 /**
272
273 Parse the virtio-scsi device's response, translate it to an EFI status code,
274 and update the Extended SCSI Pass Thru Protocol packet, to be returned by
275 the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() implementation.
276
277 @param[in out] Packet The Extended SCSI Pass Thru Protocol packet that has
278 been translated to a virtio-scsi request with
279 PopulateRequest(), and processed by the host. On
280 output this parameter is updated with response or
281 error contents.
282
283 @param[in] Response The virtio-scsi response structure to parse. We expect
284 it to come from a virtio ring, thus it is qualified
285 volatile.
286
287
288 @return PassThru() status codes mandated by UEFI Spec 2.3.1 + Errata C, 14.7
289 Extended SCSI Pass Thru Protocol.
290
291 **/
292 STATIC
293 EFI_STATUS
294 EFIAPI
295 ParseResponse (
296 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
297 IN CONST volatile VIRTIO_SCSI_RESP *Response
298 )
299 {
300 UINTN ResponseSenseLen;
301 UINTN Idx;
302
303 //
304 // return sense data (length and contents) in all cases, truncated if needed
305 //
306 ResponseSenseLen = MIN (Response->SenseLen, VIRTIO_SCSI_SENSE_SIZE);
307 if (Packet->SenseDataLength > ResponseSenseLen) {
308 Packet->SenseDataLength = (UINT8) ResponseSenseLen;
309 }
310 for (Idx = 0; Idx < Packet->SenseDataLength; ++Idx) {
311 ((UINT8 *) Packet->SenseData)[Idx] = Response->Sense[Idx];
312 }
313
314 //
315 // Report actual transfer lengths. The logic below covers all three
316 // DataDirections (read, write, bidirectional).
317 //
318 // -+- @ 0
319 // |
320 // | write ^ @ Residual (unprocessed)
321 // | |
322 // -+- @ OutTransferLength -+- @ InTransferLength
323 // | |
324 // | read |
325 // | |
326 // V @ OutTransferLength + InTransferLength -+- @ 0
327 //
328 if (Response->Residual <= Packet->InTransferLength) {
329 Packet->InTransferLength -= Response->Residual;
330 }
331 else {
332 Packet->OutTransferLength -= Response->Residual - Packet->InTransferLength;
333 Packet->InTransferLength = 0;
334 }
335
336 //
337 // report target status in all cases
338 //
339 Packet->TargetStatus = Response->Status;
340
341 //
342 // host adapter status and function return value depend on virtio-scsi
343 // response code
344 //
345 switch (Response->Response) {
346 case VIRTIO_SCSI_S_OK:
347 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;
348 return EFI_SUCCESS;
349
350 case VIRTIO_SCSI_S_OVERRUN:
351 Packet->HostAdapterStatus =
352 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;
353 break;
354
355 case VIRTIO_SCSI_S_BAD_TARGET:
356 //
357 // This is non-intuitive but explicitly required by the
358 // EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() specification for
359 // disconnected (but otherwise valid) target / LUN addresses.
360 //
361 Packet->HostAdapterStatus =
362 EFI_EXT_SCSI_STATUS_HOST_ADAPTER_TIMEOUT_COMMAND;
363 return EFI_TIMEOUT;
364
365 case VIRTIO_SCSI_S_RESET:
366 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_BUS_RESET;
367 break;
368
369 case VIRTIO_SCSI_S_BUSY:
370 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;
371 return EFI_NOT_READY;
372
373 //
374 // Lump together the rest. The mapping for VIRTIO_SCSI_S_ABORTED is
375 // intentional as well, not an oversight.
376 //
377 case VIRTIO_SCSI_S_ABORTED:
378 case VIRTIO_SCSI_S_TRANSPORT_FAILURE:
379 case VIRTIO_SCSI_S_TARGET_FAILURE:
380 case VIRTIO_SCSI_S_NEXUS_FAILURE:
381 case VIRTIO_SCSI_S_FAILURE:
382 default:
383 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;
384 }
385
386 return EFI_DEVICE_ERROR;
387 }
388
389
390 //
391 // The next seven functions implement EFI_EXT_SCSI_PASS_THRU_PROTOCOL
392 // for the virtio-scsi HBA. Refer to UEFI Spec 2.3.1 + Errata C, sections
393 // - 14.1 SCSI Driver Model Overview,
394 // - 14.7 Extended SCSI Pass Thru Protocol.
395 //
396
397 EFI_STATUS
398 EFIAPI
399 VirtioScsiPassThru (
400 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
401 IN UINT8 *Target,
402 IN UINT64 Lun,
403 IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
404 IN EFI_EVENT Event OPTIONAL
405 )
406 {
407 VSCSI_DEV *Dev;
408 UINT16 TargetValue;
409 EFI_STATUS Status;
410 volatile VIRTIO_SCSI_REQ Request;
411 volatile VIRTIO_SCSI_RESP Response;
412 DESC_INDICES Indices;
413
414 ZeroMem ((VOID*) &Request, sizeof (Request));
415 ZeroMem ((VOID*) &Response, sizeof (Response));
416
417 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
418 CopyMem (&TargetValue, Target, sizeof TargetValue);
419
420 Status = PopulateRequest (Dev, TargetValue, Lun, Packet, &Request);
421 if (EFI_ERROR (Status)) {
422 return Status;
423 }
424
425 VirtioPrepare (&Dev->Ring, &Indices);
426
427 //
428 // preset a host status for ourselves that we do not accept as success
429 //
430 Response.Response = VIRTIO_SCSI_S_FAILURE;
431
432 //
433 // ensured by VirtioScsiInit() -- this predicate, in combination with the
434 // lock-step progress, ensures we don't have to track free descriptors.
435 //
436 ASSERT (Dev->Ring.QueueSize >= 4);
437
438 //
439 // enqueue Request
440 //
441 VirtioAppendDesc (&Dev->Ring, (UINTN) &Request, sizeof Request,
442 VRING_DESC_F_NEXT, &Indices);
443
444 //
445 // enqueue "dataout" if any
446 //
447 if (Packet->OutTransferLength > 0) {
448 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->OutDataBuffer,
449 Packet->OutTransferLength, VRING_DESC_F_NEXT, &Indices);
450 }
451
452 //
453 // enqueue Response, to be written by the host
454 //
455 VirtioAppendDesc (&Dev->Ring, (UINTN) &Response, sizeof Response,
456 VRING_DESC_F_WRITE | (Packet->InTransferLength > 0 ?
457 VRING_DESC_F_NEXT : 0),
458 &Indices);
459
460 //
461 // enqueue "datain" if any, to be written by the host
462 //
463 if (Packet->InTransferLength > 0) {
464 VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->InDataBuffer,
465 Packet->InTransferLength, VRING_DESC_F_WRITE, &Indices);
466 }
467
468 // If kicking the host fails, we must fake a host adapter error.
469 // EFI_NOT_READY would save us the effort, but it would also suggest that the
470 // caller retry.
471 //
472 if (VirtioFlush (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE, &Dev->Ring,
473 &Indices) != EFI_SUCCESS) {
474 Packet->InTransferLength = 0;
475 Packet->OutTransferLength = 0;
476 Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;
477 Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;
478 Packet->SenseDataLength = 0;
479 return EFI_DEVICE_ERROR;
480 }
481
482 return ParseResponse (Packet, &Response);
483 }
484
485
486 EFI_STATUS
487 EFIAPI
488 VirtioScsiGetNextTargetLun (
489 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
490 IN OUT UINT8 **TargetPointer,
491 IN OUT UINT64 *Lun
492 )
493 {
494 UINT8 *Target;
495 UINTN Idx;
496 UINT16 LastTarget;
497 VSCSI_DEV *Dev;
498
499 //
500 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer
501 //
502 Target = *TargetPointer;
503
504 //
505 // Search for first non-0xFF byte. If not found, return first target & LUN.
506 //
507 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)
508 ;
509 if (Idx == TARGET_MAX_BYTES) {
510 SetMem (Target, TARGET_MAX_BYTES, 0x00);
511 *Lun = 0;
512 return EFI_SUCCESS;
513 }
514
515 //
516 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"
517 //
518 CopyMem (&LastTarget, Target, sizeof LastTarget);
519
520 //
521 // increment (target, LUN) pair if valid on input
522 //
523 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
524 if (LastTarget > Dev->MaxTarget || *Lun > Dev->MaxLun) {
525 return EFI_INVALID_PARAMETER;
526 }
527
528 if (*Lun < Dev->MaxLun) {
529 ++*Lun;
530 return EFI_SUCCESS;
531 }
532
533 if (LastTarget < Dev->MaxTarget) {
534 *Lun = 0;
535 ++LastTarget;
536 CopyMem (Target, &LastTarget, sizeof LastTarget);
537 return EFI_SUCCESS;
538 }
539
540 return EFI_NOT_FOUND;
541 }
542
543
544 EFI_STATUS
545 EFIAPI
546 VirtioScsiBuildDevicePath (
547 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
548 IN UINT8 *Target,
549 IN UINT64 Lun,
550 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath
551 )
552 {
553 UINT16 TargetValue;
554 VSCSI_DEV *Dev;
555 SCSI_DEVICE_PATH *ScsiDevicePath;
556
557 if (DevicePath == NULL) {
558 return EFI_INVALID_PARAMETER;
559 }
560
561 CopyMem (&TargetValue, Target, sizeof TargetValue);
562 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
563 if (TargetValue > Dev->MaxTarget || Lun > Dev->MaxLun || Lun > 0xFFFF) {
564 return EFI_NOT_FOUND;
565 }
566
567 ScsiDevicePath = AllocatePool (sizeof *ScsiDevicePath);
568 if (ScsiDevicePath == NULL) {
569 return EFI_OUT_OF_RESOURCES;
570 }
571
572 ScsiDevicePath->Header.Type = MESSAGING_DEVICE_PATH;
573 ScsiDevicePath->Header.SubType = MSG_SCSI_DP;
574 ScsiDevicePath->Header.Length[0] = (UINT8) sizeof *ScsiDevicePath;
575 ScsiDevicePath->Header.Length[1] = (UINT8) (sizeof *ScsiDevicePath >> 8);
576 ScsiDevicePath->Pun = TargetValue;
577 ScsiDevicePath->Lun = (UINT16) Lun;
578
579 *DevicePath = &ScsiDevicePath->Header;
580 return EFI_SUCCESS;
581 }
582
583
584 EFI_STATUS
585 EFIAPI
586 VirtioScsiGetTargetLun (
587 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
588 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
589 OUT UINT8 **TargetPointer,
590 OUT UINT64 *Lun
591 )
592 {
593 SCSI_DEVICE_PATH *ScsiDevicePath;
594 VSCSI_DEV *Dev;
595 UINT8 *Target;
596
597 if (DevicePath == NULL || TargetPointer == NULL || *TargetPointer == NULL ||
598 Lun == NULL) {
599 return EFI_INVALID_PARAMETER;
600 }
601
602 if (DevicePath->Type != MESSAGING_DEVICE_PATH ||
603 DevicePath->SubType != MSG_SCSI_DP) {
604 return EFI_UNSUPPORTED;
605 }
606
607 ScsiDevicePath = (SCSI_DEVICE_PATH *) DevicePath;
608 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
609 if (ScsiDevicePath->Pun > Dev->MaxTarget ||
610 ScsiDevicePath->Lun > Dev->MaxLun) {
611 return EFI_NOT_FOUND;
612 }
613
614 //
615 // a) the TargetPointer input parameter is unnecessarily a pointer-to-pointer
616 // b) see the TARGET_MAX_BYTES check in "VirtioScsi.h"
617 // c) ScsiDevicePath->Pun is an UINT16
618 //
619 Target = *TargetPointer;
620 CopyMem (Target, &ScsiDevicePath->Pun, 2);
621 SetMem (Target + 2, TARGET_MAX_BYTES - 2, 0x00);
622
623 *Lun = ScsiDevicePath->Lun;
624 return EFI_SUCCESS;
625 }
626
627
628 EFI_STATUS
629 EFIAPI
630 VirtioScsiResetChannel (
631 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This
632 )
633 {
634 return EFI_UNSUPPORTED;
635 }
636
637
638 EFI_STATUS
639 EFIAPI
640 VirtioScsiResetTargetLun (
641 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
642 IN UINT8 *Target,
643 IN UINT64 Lun
644 )
645 {
646 return EFI_UNSUPPORTED;
647 }
648
649
650 EFI_STATUS
651 EFIAPI
652 VirtioScsiGetNextTarget (
653 IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
654 IN OUT UINT8 **TargetPointer
655 )
656 {
657 UINT8 *Target;
658 UINTN Idx;
659 UINT16 LastTarget;
660 VSCSI_DEV *Dev;
661
662 //
663 // the TargetPointer input parameter is unnecessarily a pointer-to-pointer
664 //
665 Target = *TargetPointer;
666
667 //
668 // Search for first non-0xFF byte. If not found, return first target.
669 //
670 for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)
671 ;
672 if (Idx == TARGET_MAX_BYTES) {
673 SetMem (Target, TARGET_MAX_BYTES, 0x00);
674 return EFI_SUCCESS;
675 }
676
677 //
678 // see the TARGET_MAX_BYTES check in "VirtioScsi.h"
679 //
680 CopyMem (&LastTarget, Target, sizeof LastTarget);
681
682 //
683 // increment target if valid on input
684 //
685 Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
686 if (LastTarget > Dev->MaxTarget) {
687 return EFI_INVALID_PARAMETER;
688 }
689
690 if (LastTarget < Dev->MaxTarget) {
691 ++LastTarget;
692 CopyMem (Target, &LastTarget, sizeof LastTarget);
693 return EFI_SUCCESS;
694 }
695
696 return EFI_NOT_FOUND;
697 }
698
699
700 STATIC
701 EFI_STATUS
702 EFIAPI
703 VirtioScsiInit (
704 IN OUT VSCSI_DEV *Dev
705 )
706 {
707 UINT8 NextDevStat;
708 EFI_STATUS Status;
709
710 UINT32 Features;
711 UINT16 MaxChannel; // for validation only
712 UINT32 NumQueues; // for validation only
713 UINT16 QueueSize;
714
715 //
716 // Execute virtio-0.9.5, 2.2.1 Device Initialization Sequence.
717 //
718 NextDevStat = 0; // step 1 -- reset device
719 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
720 if (EFI_ERROR (Status)) {
721 goto Failed;
722 }
723
724 NextDevStat |= VSTAT_ACK; // step 2 -- acknowledge device presence
725 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
726 if (EFI_ERROR (Status)) {
727 goto Failed;
728 }
729
730 NextDevStat |= VSTAT_DRIVER; // step 3 -- we know how to drive it
731 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
732 if (EFI_ERROR (Status)) {
733 goto Failed;
734 }
735
736 //
737 // Set Page Size - MMIO VirtIo Specific
738 //
739 Status = Dev->VirtIo->SetPageSize (Dev->VirtIo, EFI_PAGE_SIZE);
740 if (EFI_ERROR (Status)) {
741 goto Failed;
742 }
743
744 //
745 // step 4a -- retrieve and validate features
746 //
747 Status = Dev->VirtIo->GetDeviceFeatures (Dev->VirtIo, &Features);
748 if (EFI_ERROR (Status)) {
749 goto Failed;
750 }
751 Dev->InOutSupported = (BOOLEAN) ((Features & VIRTIO_SCSI_F_INOUT) != 0);
752
753 Status = VIRTIO_CFG_READ (Dev, MaxChannel, &MaxChannel);
754 if (EFI_ERROR (Status)) {
755 goto Failed;
756 }
757 if (MaxChannel != 0) {
758 //
759 // this driver is for a single-channel virtio-scsi HBA
760 //
761 Status = EFI_UNSUPPORTED;
762 goto Failed;
763 }
764
765 Status = VIRTIO_CFG_READ (Dev, NumQueues, &NumQueues);
766 if (EFI_ERROR (Status)) {
767 goto Failed;
768 }
769 if (NumQueues < 1) {
770 Status = EFI_UNSUPPORTED;
771 goto Failed;
772 }
773
774 Status = VIRTIO_CFG_READ (Dev, MaxTarget, &Dev->MaxTarget);
775 if (EFI_ERROR (Status)) {
776 goto Failed;
777 }
778 if (Dev->MaxTarget > PcdGet16 (PcdVirtioScsiMaxTargetLimit)) {
779 Dev->MaxTarget = PcdGet16 (PcdVirtioScsiMaxTargetLimit);
780 }
781
782 Status = VIRTIO_CFG_READ (Dev, MaxLun, &Dev->MaxLun);
783 if (EFI_ERROR (Status)) {
784 goto Failed;
785 }
786 if (Dev->MaxLun > PcdGet32 (PcdVirtioScsiMaxLunLimit)) {
787 Dev->MaxLun = PcdGet32 (PcdVirtioScsiMaxLunLimit);
788 }
789
790 Status = VIRTIO_CFG_READ (Dev, MaxSectors, &Dev->MaxSectors);
791 if (EFI_ERROR (Status)) {
792 goto Failed;
793 }
794 if (Dev->MaxSectors < 2) {
795 //
796 // We must be able to halve it for bidirectional transfers
797 // (see EFI_BAD_BUFFER_SIZE in PopulateRequest()).
798 //
799 Status = EFI_UNSUPPORTED;
800 goto Failed;
801 }
802
803 //
804 // step 4b -- allocate request virtqueue
805 //
806 Status = Dev->VirtIo->SetQueueSel (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE);
807 if (EFI_ERROR (Status)) {
808 goto Failed;
809 }
810 Status = Dev->VirtIo->GetQueueNumMax (Dev->VirtIo, &QueueSize);
811 if (EFI_ERROR (Status)) {
812 goto Failed;
813 }
814 //
815 // VirtioScsiPassThru() uses at most four descriptors
816 //
817 if (QueueSize < 4) {
818 Status = EFI_UNSUPPORTED;
819 goto Failed;
820 }
821
822 Status = VirtioRingInit (QueueSize, &Dev->Ring);
823 if (EFI_ERROR (Status)) {
824 goto Failed;
825 }
826
827 //
828 // Additional steps for MMIO: align the queue appropriately, and set the
829 // size. If anything fails from here on, we must release the ring resources.
830 //
831 Status = Dev->VirtIo->SetQueueNum (Dev->VirtIo, QueueSize);
832 if (EFI_ERROR (Status)) {
833 goto ReleaseQueue;
834 }
835
836 Status = Dev->VirtIo->SetQueueAlign (Dev->VirtIo, EFI_PAGE_SIZE);
837 if (EFI_ERROR (Status)) {
838 goto ReleaseQueue;
839 }
840
841 //
842 // step 4c -- Report GPFN (guest-physical frame number) of queue.
843 //
844 Status = Dev->VirtIo->SetQueueAddress (Dev->VirtIo,
845 (UINT32) ((UINTN) Dev->Ring.Base >> EFI_PAGE_SHIFT));
846 if (EFI_ERROR (Status)) {
847 goto ReleaseQueue;
848 }
849
850 //
851 // step 5 -- Report understood features and guest-tuneables. We want none of
852 // the known (or unknown) VIRTIO_SCSI_F_* or VIRTIO_F_* capabilities (see
853 // virtio-0.9.5, Appendices B and I), except bidirectional transfers.
854 //
855 Status = Dev->VirtIo->SetGuestFeatures (Dev->VirtIo,
856 Features & VIRTIO_SCSI_F_INOUT);
857 if (EFI_ERROR (Status)) {
858 goto ReleaseQueue;
859 }
860
861 //
862 // We expect these maximum sizes from the host. Since they are
863 // guest-negotiable, ask for them rather than just checking them.
864 //
865 Status = VIRTIO_CFG_WRITE (Dev, CdbSize, VIRTIO_SCSI_CDB_SIZE);
866 if (EFI_ERROR (Status)) {
867 goto ReleaseQueue;
868 }
869 Status = VIRTIO_CFG_WRITE (Dev, SenseSize, VIRTIO_SCSI_SENSE_SIZE);
870 if (EFI_ERROR (Status)) {
871 goto ReleaseQueue;
872 }
873
874 //
875 // step 6 -- initialization complete
876 //
877 NextDevStat |= VSTAT_DRIVER_OK;
878 Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
879 if (EFI_ERROR (Status)) {
880 goto ReleaseQueue;
881 }
882
883 //
884 // populate the exported interface's attributes
885 //
886 Dev->PassThru.Mode = &Dev->PassThruMode;
887 Dev->PassThru.PassThru = &VirtioScsiPassThru;
888 Dev->PassThru.GetNextTargetLun = &VirtioScsiGetNextTargetLun;
889 Dev->PassThru.BuildDevicePath = &VirtioScsiBuildDevicePath;
890 Dev->PassThru.GetTargetLun = &VirtioScsiGetTargetLun;
891 Dev->PassThru.ResetChannel = &VirtioScsiResetChannel;
892 Dev->PassThru.ResetTargetLun = &VirtioScsiResetTargetLun;
893 Dev->PassThru.GetNextTarget = &VirtioScsiGetNextTarget;
894
895 //
896 // AdapterId is a target for which no handle will be created during bus scan.
897 // Prevent any conflict with real devices.
898 //
899 Dev->PassThruMode.AdapterId = 0xFFFFFFFF;
900
901 //
902 // Set both physical and logical attributes for non-RAID SCSI channel. See
903 // Driver Writer's Guide for UEFI 2.3.1 v1.01, 20.1.5 Implementing Extended
904 // SCSI Pass Thru Protocol.
905 //
906 Dev->PassThruMode.Attributes = EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_PHYSICAL |
907 EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_LOGICAL;
908
909 //
910 // no restriction on transfer buffer alignment
911 //
912 Dev->PassThruMode.IoAlign = 0;
913
914 return EFI_SUCCESS;
915
916 ReleaseQueue:
917 VirtioRingUninit (&Dev->Ring);
918
919 Failed:
920 //
921 // Notify the host about our failure to setup: virtio-0.9.5, 2.2.2.1 Device
922 // Status. VirtIo access failure here should not mask the original error.
923 //
924 NextDevStat |= VSTAT_FAILED;
925 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
926
927 Dev->InOutSupported = FALSE;
928 Dev->MaxTarget = 0;
929 Dev->MaxLun = 0;
930 Dev->MaxSectors = 0;
931
932 return Status; // reached only via Failed above
933 }
934
935
936
937 STATIC
938 VOID
939 EFIAPI
940 VirtioScsiUninit (
941 IN OUT VSCSI_DEV *Dev
942 )
943 {
944 //
945 // Reset the virtual device -- see virtio-0.9.5, 2.2.2.1 Device Status. When
946 // VIRTIO_CFG_WRITE() returns, the host will have learned to stay away from
947 // the old comms area.
948 //
949 Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);
950
951 Dev->InOutSupported = FALSE;
952 Dev->MaxTarget = 0;
953 Dev->MaxLun = 0;
954 Dev->MaxSectors = 0;
955
956 VirtioRingUninit (&Dev->Ring);
957
958 SetMem (&Dev->PassThru, sizeof Dev->PassThru, 0x00);
959 SetMem (&Dev->PassThruMode, sizeof Dev->PassThruMode, 0x00);
960 }
961
962
963 //
964 // Probe, start and stop functions of this driver, called by the DXE core for
965 // specific devices.
966 //
967 // The following specifications document these interfaces:
968 // - Driver Writer's Guide for UEFI 2.3.1 v1.01, 9 Driver Binding Protocol
969 // - UEFI Spec 2.3.1 + Errata C, 10.1 EFI Driver Binding Protocol
970 //
971 // The implementation follows:
972 // - Driver Writer's Guide for UEFI 2.3.1 v1.01
973 // - 5.1.3.4 OpenProtocol() and CloseProtocol()
974 // - UEFI Spec 2.3.1 + Errata C
975 // - 6.3 Protocol Handler Services
976 //
977
978 EFI_STATUS
979 EFIAPI
980 VirtioScsiDriverBindingSupported (
981 IN EFI_DRIVER_BINDING_PROTOCOL *This,
982 IN EFI_HANDLE DeviceHandle,
983 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
984 )
985 {
986 EFI_STATUS Status;
987 VIRTIO_DEVICE_PROTOCOL *VirtIo;
988
989 //
990 // Attempt to open the device with the VirtIo set of interfaces. On success,
991 // the protocol is "instantiated" for the VirtIo device. Covers duplicate open
992 // attempts (EFI_ALREADY_STARTED).
993 //
994 Status = gBS->OpenProtocol (
995 DeviceHandle, // candidate device
996 &gVirtioDeviceProtocolGuid, // for generic VirtIo access
997 (VOID **)&VirtIo, // handle to instantiate
998 This->DriverBindingHandle, // requestor driver identity
999 DeviceHandle, // ControllerHandle, according to
1000 // the UEFI Driver Model
1001 EFI_OPEN_PROTOCOL_BY_DRIVER // get exclusive VirtIo access to
1002 // the device; to be released
1003 );
1004 if (EFI_ERROR (Status)) {
1005 return Status;
1006 }
1007
1008 if (VirtIo->SubSystemDeviceId != VIRTIO_SUBSYSTEM_SCSI_HOST) {
1009 Status = EFI_UNSUPPORTED;
1010 }
1011
1012 //
1013 // We needed VirtIo access only transitorily, to see whether we support the
1014 // device or not.
1015 //
1016 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
1017 This->DriverBindingHandle, DeviceHandle);
1018 return Status;
1019 }
1020
1021
1022 EFI_STATUS
1023 EFIAPI
1024 VirtioScsiDriverBindingStart (
1025 IN EFI_DRIVER_BINDING_PROTOCOL *This,
1026 IN EFI_HANDLE DeviceHandle,
1027 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
1028 )
1029 {
1030 VSCSI_DEV *Dev;
1031 EFI_STATUS Status;
1032
1033 Dev = (VSCSI_DEV *) AllocateZeroPool (sizeof *Dev);
1034 if (Dev == NULL) {
1035 return EFI_OUT_OF_RESOURCES;
1036 }
1037
1038 Status = gBS->OpenProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
1039 (VOID **)&Dev->VirtIo, This->DriverBindingHandle,
1040 DeviceHandle, EFI_OPEN_PROTOCOL_BY_DRIVER);
1041 if (EFI_ERROR (Status)) {
1042 goto FreeVirtioScsi;
1043 }
1044
1045 //
1046 // VirtIo access granted, configure virtio-scsi device.
1047 //
1048 Status = VirtioScsiInit (Dev);
1049 if (EFI_ERROR (Status)) {
1050 goto CloseVirtIo;
1051 }
1052
1053 //
1054 // Setup complete, attempt to export the driver instance's PassThru
1055 // interface.
1056 //
1057 Dev->Signature = VSCSI_SIG;
1058 Status = gBS->InstallProtocolInterface (&DeviceHandle,
1059 &gEfiExtScsiPassThruProtocolGuid, EFI_NATIVE_INTERFACE,
1060 &Dev->PassThru);
1061 if (EFI_ERROR (Status)) {
1062 goto UninitDev;
1063 }
1064
1065 return EFI_SUCCESS;
1066
1067 UninitDev:
1068 VirtioScsiUninit (Dev);
1069
1070 CloseVirtIo:
1071 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
1072 This->DriverBindingHandle, DeviceHandle);
1073
1074 FreeVirtioScsi:
1075 FreePool (Dev);
1076
1077 return Status;
1078 }
1079
1080
1081 EFI_STATUS
1082 EFIAPI
1083 VirtioScsiDriverBindingStop (
1084 IN EFI_DRIVER_BINDING_PROTOCOL *This,
1085 IN EFI_HANDLE DeviceHandle,
1086 IN UINTN NumberOfChildren,
1087 IN EFI_HANDLE *ChildHandleBuffer
1088 )
1089 {
1090 EFI_STATUS Status;
1091 EFI_EXT_SCSI_PASS_THRU_PROTOCOL *PassThru;
1092 VSCSI_DEV *Dev;
1093
1094 Status = gBS->OpenProtocol (
1095 DeviceHandle, // candidate device
1096 &gEfiExtScsiPassThruProtocolGuid, // retrieve the SCSI iface
1097 (VOID **)&PassThru, // target pointer
1098 This->DriverBindingHandle, // requestor driver ident.
1099 DeviceHandle, // lookup req. for dev.
1100 EFI_OPEN_PROTOCOL_GET_PROTOCOL // lookup only, no new ref.
1101 );
1102 if (EFI_ERROR (Status)) {
1103 return Status;
1104 }
1105
1106 Dev = VIRTIO_SCSI_FROM_PASS_THRU (PassThru);
1107
1108 //
1109 // Handle Stop() requests for in-use driver instances gracefully.
1110 //
1111 Status = gBS->UninstallProtocolInterface (DeviceHandle,
1112 &gEfiExtScsiPassThruProtocolGuid, &Dev->PassThru);
1113 if (EFI_ERROR (Status)) {
1114 return Status;
1115 }
1116
1117 VirtioScsiUninit (Dev);
1118
1119 gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
1120 This->DriverBindingHandle, DeviceHandle);
1121
1122 FreePool (Dev);
1123
1124 return EFI_SUCCESS;
1125 }
1126
1127
1128 //
1129 // The static object that groups the Supported() (ie. probe), Start() and
1130 // Stop() functions of the driver together. Refer to UEFI Spec 2.3.1 + Errata
1131 // C, 10.1 EFI Driver Binding Protocol.
1132 //
1133 STATIC EFI_DRIVER_BINDING_PROTOCOL gDriverBinding = {
1134 &VirtioScsiDriverBindingSupported,
1135 &VirtioScsiDriverBindingStart,
1136 &VirtioScsiDriverBindingStop,
1137 0x10, // Version, must be in [0x10 .. 0xFFFFFFEF] for IHV-developed drivers
1138 NULL, // ImageHandle, to be overwritten by
1139 // EfiLibInstallDriverBindingComponentName2() in VirtioScsiEntryPoint()
1140 NULL // DriverBindingHandle, ditto
1141 };
1142
1143
1144 //
1145 // The purpose of the following scaffolding (EFI_COMPONENT_NAME_PROTOCOL and
1146 // EFI_COMPONENT_NAME2_PROTOCOL implementation) is to format the driver's name
1147 // in English, for display on standard console devices. This is recommended for
1148 // UEFI drivers that follow the UEFI Driver Model. Refer to the Driver Writer's
1149 // Guide for UEFI 2.3.1 v1.01, 11 UEFI Driver and Controller Names.
1150 //
1151 // Device type names ("Virtio SCSI Host Device") are not formatted because the
1152 // driver supports only that device type. Therefore the driver name suffices
1153 // for unambiguous identification.
1154 //
1155
1156 STATIC
1157 EFI_UNICODE_STRING_TABLE mDriverNameTable[] = {
1158 { "eng;en", L"Virtio SCSI Host Driver" },
1159 { NULL, NULL }
1160 };
1161
1162 STATIC
1163 EFI_COMPONENT_NAME_PROTOCOL gComponentName;
1164
1165 EFI_STATUS
1166 EFIAPI
1167 VirtioScsiGetDriverName (
1168 IN EFI_COMPONENT_NAME_PROTOCOL *This,
1169 IN CHAR8 *Language,
1170 OUT CHAR16 **DriverName
1171 )
1172 {
1173 return LookupUnicodeString2 (
1174 Language,
1175 This->SupportedLanguages,
1176 mDriverNameTable,
1177 DriverName,
1178 (BOOLEAN)(This == &gComponentName) // Iso639Language
1179 );
1180 }
1181
1182 EFI_STATUS
1183 EFIAPI
1184 VirtioScsiGetDeviceName (
1185 IN EFI_COMPONENT_NAME_PROTOCOL *This,
1186 IN EFI_HANDLE DeviceHandle,
1187 IN EFI_HANDLE ChildHandle,
1188 IN CHAR8 *Language,
1189 OUT CHAR16 **ControllerName
1190 )
1191 {
1192 return EFI_UNSUPPORTED;
1193 }
1194
1195 STATIC
1196 EFI_COMPONENT_NAME_PROTOCOL gComponentName = {
1197 &VirtioScsiGetDriverName,
1198 &VirtioScsiGetDeviceName,
1199 "eng" // SupportedLanguages, ISO 639-2 language codes
1200 };
1201
1202 STATIC
1203 EFI_COMPONENT_NAME2_PROTOCOL gComponentName2 = {
1204 (EFI_COMPONENT_NAME2_GET_DRIVER_NAME) &VirtioScsiGetDriverName,
1205 (EFI_COMPONENT_NAME2_GET_CONTROLLER_NAME) &VirtioScsiGetDeviceName,
1206 "en" // SupportedLanguages, RFC 4646 language codes
1207 };
1208
1209
1210 //
1211 // Entry point of this driver.
1212 //
1213 EFI_STATUS
1214 EFIAPI
1215 VirtioScsiEntryPoint (
1216 IN EFI_HANDLE ImageHandle,
1217 IN EFI_SYSTEM_TABLE *SystemTable
1218 )
1219 {
1220 return EfiLibInstallDriverBindingComponentName2 (
1221 ImageHandle,
1222 SystemTable,
1223 &gDriverBinding,
1224 ImageHandle,
1225 &gComponentName,
1226 &gComponentName2
1227 );
1228 }