Vishal Bhoj | 82c8071 | 2015-12-15 21:13:33 +0530 | [diff] [blame^] | 1 | /** @file
|
| 2 |
|
| 3 | This driver produces Extended SCSI Pass Thru Protocol instances for
|
| 4 | virtio-scsi devices.
|
| 5 |
|
| 6 | The implementation is basic:
|
| 7 |
|
| 8 | - No hotplug / hot-unplug.
|
| 9 |
|
| 10 | - Although EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() could be a good match
|
| 11 | for multiple in-flight virtio-scsi requests, we stick to synchronous
|
| 12 | requests for now.
|
| 13 |
|
| 14 | - Timeouts are not supported for EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru().
|
| 15 |
|
| 16 | - Only one channel is supported. (At the time of this writing, host-side
|
| 17 | virtio-scsi supports a single channel too.)
|
| 18 |
|
| 19 | - Only one request queue is used (for the one synchronous request).
|
| 20 |
|
| 21 | - The ResetChannel() and ResetTargetLun() functions of
|
| 22 | EFI_EXT_SCSI_PASS_THRU_PROTOCOL are not supported (which is allowed by the
|
| 23 | UEFI 2.3.1 Errata C specification), although
|
| 24 | VIRTIO_SCSI_T_TMF_LOGICAL_UNIT_RESET could be a good match. That would
|
| 25 | however require client code for the control queue, which is deemed
|
| 26 | unreasonable for now.
|
| 27 |
|
| 28 | Copyright (C) 2012, Red Hat, Inc.
|
| 29 | Copyright (c) 2012 - 2014, Intel Corporation. All rights reserved.<BR>
|
| 30 |
|
| 31 | This program and the accompanying materials are licensed and made available
|
| 32 | under the terms and conditions of the BSD License which accompanies this
|
| 33 | distribution. The full text of the license may be found at
|
| 34 | http://opensource.org/licenses/bsd-license.php
|
| 35 |
|
| 36 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT
|
| 37 | WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
| 38 |
|
| 39 | **/
|
| 40 |
|
| 41 | #include <IndustryStandard/VirtioScsi.h>
|
| 42 | #include <Library/BaseMemoryLib.h>
|
| 43 | #include <Library/DebugLib.h>
|
| 44 | #include <Library/MemoryAllocationLib.h>
|
| 45 | #include <Library/UefiBootServicesTableLib.h>
|
| 46 | #include <Library/UefiLib.h>
|
| 47 | #include <Library/VirtioLib.h>
|
| 48 |
|
| 49 | #include "VirtioScsi.h"
|
| 50 |
|
| 51 | /**
|
| 52 |
|
| 53 | Convenience macros to read and write configuration elements of the
|
| 54 | virtio-scsi VirtIo device.
|
| 55 |
|
| 56 | The following macros make it possible to specify only the "core parameters"
|
| 57 | for such accesses and to derive the rest. By the time VIRTIO_CFG_WRITE()
|
| 58 | returns, the transaction will have been completed.
|
| 59 |
|
| 60 | @param[in] Dev Pointer to the VSCSI_DEV structure.
|
| 61 |
|
| 62 | @param[in] Field A field name from VSCSI_HDR, identifying the virtio-scsi
|
| 63 | configuration item to access.
|
| 64 |
|
| 65 | @param[in] Value (VIRTIO_CFG_WRITE() only.) The value to write to the
|
| 66 | selected configuration item.
|
| 67 |
|
| 68 | @param[out] Pointer (VIRTIO_CFG_READ() only.) The object to receive the
|
| 69 | value read from the configuration item. Its type must be
|
| 70 | one of UINT8, UINT16, UINT32, UINT64.
|
| 71 |
|
| 72 |
|
| 73 | @return Status codes returned by Virtio->WriteDevice() / Virtio->ReadDevice().
|
| 74 |
|
| 75 | **/
|
| 76 |
|
| 77 | #define VIRTIO_CFG_WRITE(Dev, Field, Value) ((Dev)->VirtIo->WriteDevice ( \
|
| 78 | (Dev)->VirtIo, \
|
| 79 | OFFSET_OF_VSCSI (Field), \
|
| 80 | SIZE_OF_VSCSI (Field), \
|
| 81 | (Value) \
|
| 82 | ))
|
| 83 |
|
| 84 | #define VIRTIO_CFG_READ(Dev, Field, Pointer) ((Dev)->VirtIo->ReadDevice ( \
|
| 85 | (Dev)->VirtIo, \
|
| 86 | OFFSET_OF_VSCSI (Field), \
|
| 87 | SIZE_OF_VSCSI (Field), \
|
| 88 | sizeof *(Pointer), \
|
| 89 | (Pointer) \
|
| 90 | ))
|
| 91 |
|
| 92 |
|
| 93 | //
|
| 94 | // UEFI Spec 2.3.1 + Errata C, 14.7 Extended SCSI Pass Thru Protocol specifies
|
| 95 | // the PassThru() interface. Beside returning a status code, the function must
|
| 96 | // set some fields in the EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET in/out
|
| 97 | // parameter on return. The following is a full list of those fields, for
|
| 98 | // easier validation of PopulateRequest(), ParseResponse(), and
|
| 99 | // VirtioScsiPassThru() below.
|
| 100 | //
|
| 101 | // - InTransferLength
|
| 102 | // - OutTransferLength
|
| 103 | // - HostAdapterStatus
|
| 104 | // - TargetStatus
|
| 105 | // - SenseDataLength
|
| 106 | // - SenseData
|
| 107 | //
|
| 108 | // On any return from the PassThru() interface, these fields must be set,
|
| 109 | // except if the returned status code is explicitly exempt. (Actually the
|
| 110 | // implementation here conservatively sets these fields even in case not all
|
| 111 | // of them would be required by the specification.)
|
| 112 | //
|
| 113 |
|
| 114 | /**
|
| 115 |
|
| 116 | Populate a virtio-scsi request from the Extended SCSI Pass Thru Protocol
|
| 117 | packet.
|
| 118 |
|
| 119 | The caller is responsible for pre-zeroing the virtio-scsi request. The
|
| 120 | Extended SCSI Pass Thru Protocol packet is modified, to be forwarded outwards
|
| 121 | by VirtioScsiPassThru(), if invalid or unsupported parameters are detected.
|
| 122 |
|
| 123 | @param[in] Dev The virtio-scsi host device the packet targets.
|
| 124 |
|
| 125 | @param[in] Target The SCSI target controlled by the virtio-scsi host
|
| 126 | device.
|
| 127 |
|
| 128 | @param[in] Lun The Logical Unit Number under the SCSI target.
|
| 129 |
|
| 130 | @param[in out] Packet The Extended SCSI Pass Thru Protocol packet the
|
| 131 | function translates to a virtio-scsi request. On
|
| 132 | failure this parameter relays error contents.
|
| 133 |
|
| 134 | @param[out] Request The pre-zeroed virtio-scsi request to populate. This
|
| 135 | parameter is volatile-qualified because we expect the
|
| 136 | caller to append it to a virtio ring, thus
|
| 137 | assignments to Request must be visible when the
|
| 138 | function returns.
|
| 139 |
|
| 140 |
|
| 141 | @retval EFI_SUCCESS The Extended SCSI Pass Thru Protocol packet was valid,
|
| 142 | Request has been populated.
|
| 143 |
|
| 144 | @return Otherwise, invalid or unsupported parameters were
|
| 145 | detected. Status codes are meant for direct forwarding
|
| 146 | by the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru()
|
| 147 | implementation.
|
| 148 |
|
| 149 | **/
|
| 150 | STATIC
|
| 151 | EFI_STATUS
|
| 152 | EFIAPI
|
| 153 | PopulateRequest (
|
| 154 | IN CONST VSCSI_DEV *Dev,
|
| 155 | IN UINT16 Target,
|
| 156 | IN UINT64 Lun,
|
| 157 | IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
|
| 158 | OUT volatile VIRTIO_SCSI_REQ *Request
|
| 159 | )
|
| 160 | {
|
| 161 | UINTN Idx;
|
| 162 |
|
| 163 | if (
|
| 164 | //
|
| 165 | // bidirectional transfer was requested, but the host doesn't support it
|
| 166 | //
|
| 167 | (Packet->InTransferLength > 0 && Packet->OutTransferLength > 0 &&
|
| 168 | !Dev->InOutSupported) ||
|
| 169 |
|
| 170 | //
|
| 171 | // a target / LUN was addressed that's impossible to encode for the host
|
| 172 | //
|
| 173 | Target > 0xFF || Lun >= 0x4000 ||
|
| 174 |
|
| 175 | //
|
| 176 | // Command Descriptor Block bigger than VIRTIO_SCSI_CDB_SIZE
|
| 177 | //
|
| 178 | Packet->CdbLength > VIRTIO_SCSI_CDB_SIZE ||
|
| 179 |
|
| 180 | //
|
| 181 | // From virtio-0.9.5, 2.3.2 Descriptor Table:
|
| 182 | // "no descriptor chain may be more than 2^32 bytes long in total".
|
| 183 | //
|
| 184 | (UINT64) Packet->InTransferLength + Packet->OutTransferLength > SIZE_1GB
|
| 185 | ) {
|
| 186 |
|
| 187 | //
|
| 188 | // this error code doesn't require updates to the Packet output fields
|
| 189 | //
|
| 190 | return EFI_UNSUPPORTED;
|
| 191 | }
|
| 192 |
|
| 193 | if (
|
| 194 | //
|
| 195 | // addressed invalid device
|
| 196 | //
|
| 197 | Target > Dev->MaxTarget || Lun > Dev->MaxLun ||
|
| 198 |
|
| 199 | //
|
| 200 | // invalid direction (there doesn't seem to be a macro for the "no data
|
| 201 | // transferred" "direction", eg. for TEST UNIT READY)
|
| 202 | //
|
| 203 | Packet->DataDirection > EFI_EXT_SCSI_DATA_DIRECTION_BIDIRECTIONAL ||
|
| 204 |
|
| 205 | //
|
| 206 | // trying to receive, but destination pointer is NULL, or contradicting
|
| 207 | // transfer direction
|
| 208 | //
|
| 209 | (Packet->InTransferLength > 0 &&
|
| 210 | (Packet->InDataBuffer == NULL ||
|
| 211 | Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_WRITE
|
| 212 | )
|
| 213 | ) ||
|
| 214 |
|
| 215 | //
|
| 216 | // trying to send, but source pointer is NULL, or contradicting transfer
|
| 217 | // direction
|
| 218 | //
|
| 219 | (Packet->OutTransferLength > 0 &&
|
| 220 | (Packet->OutDataBuffer == NULL ||
|
| 221 | Packet->DataDirection == EFI_EXT_SCSI_DATA_DIRECTION_READ
|
| 222 | )
|
| 223 | )
|
| 224 | ) {
|
| 225 |
|
| 226 | //
|
| 227 | // this error code doesn't require updates to the Packet output fields
|
| 228 | //
|
| 229 | return EFI_INVALID_PARAMETER;
|
| 230 | }
|
| 231 |
|
| 232 | //
|
| 233 | // Catch oversized requests eagerly. If this condition evaluates to false,
|
| 234 | // then the combined size of a bidirectional request will not exceed the
|
| 235 | // virtio-scsi device's transfer limit either.
|
| 236 | //
|
| 237 | if (ALIGN_VALUE (Packet->OutTransferLength, 512) / 512
|
| 238 | > Dev->MaxSectors / 2 ||
|
| 239 | ALIGN_VALUE (Packet->InTransferLength, 512) / 512
|
| 240 | > Dev->MaxSectors / 2) {
|
| 241 | Packet->InTransferLength = (Dev->MaxSectors / 2) * 512;
|
| 242 | Packet->OutTransferLength = (Dev->MaxSectors / 2) * 512;
|
| 243 | Packet->HostAdapterStatus =
|
| 244 | EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;
|
| 245 | Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;
|
| 246 | Packet->SenseDataLength = 0;
|
| 247 | return EFI_BAD_BUFFER_SIZE;
|
| 248 | }
|
| 249 |
|
| 250 | //
|
| 251 | // target & LUN encoding: see virtio-0.9.5, Appendix I: SCSI Host Device,
|
| 252 | // Device Operation: request queues
|
| 253 | //
|
| 254 | Request->Lun[0] = 1;
|
| 255 | Request->Lun[1] = (UINT8) Target;
|
| 256 | Request->Lun[2] = (UINT8) (((UINT32)Lun >> 8) | 0x40);
|
| 257 | Request->Lun[3] = (UINT8) Lun;
|
| 258 |
|
| 259 | //
|
| 260 | // CopyMem() would cast away the "volatile" qualifier before access, which is
|
| 261 | // undefined behavior (ISO C99 6.7.3p5)
|
| 262 | //
|
| 263 | for (Idx = 0; Idx < Packet->CdbLength; ++Idx) {
|
| 264 | Request->Cdb[Idx] = ((UINT8 *) Packet->Cdb)[Idx];
|
| 265 | }
|
| 266 |
|
| 267 | return EFI_SUCCESS;
|
| 268 | }
|
| 269 |
|
| 270 |
|
| 271 | /**
|
| 272 |
|
| 273 | Parse the virtio-scsi device's response, translate it to an EFI status code,
|
| 274 | and update the Extended SCSI Pass Thru Protocol packet, to be returned by
|
| 275 | the EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() implementation.
|
| 276 |
|
| 277 | @param[in out] Packet The Extended SCSI Pass Thru Protocol packet that has
|
| 278 | been translated to a virtio-scsi request with
|
| 279 | PopulateRequest(), and processed by the host. On
|
| 280 | output this parameter is updated with response or
|
| 281 | error contents.
|
| 282 |
|
| 283 | @param[in] Response The virtio-scsi response structure to parse. We expect
|
| 284 | it to come from a virtio ring, thus it is qualified
|
| 285 | volatile.
|
| 286 |
|
| 287 |
|
| 288 | @return PassThru() status codes mandated by UEFI Spec 2.3.1 + Errata C, 14.7
|
| 289 | Extended SCSI Pass Thru Protocol.
|
| 290 |
|
| 291 | **/
|
| 292 | STATIC
|
| 293 | EFI_STATUS
|
| 294 | EFIAPI
|
| 295 | ParseResponse (
|
| 296 | IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
|
| 297 | IN CONST volatile VIRTIO_SCSI_RESP *Response
|
| 298 | )
|
| 299 | {
|
| 300 | UINTN ResponseSenseLen;
|
| 301 | UINTN Idx;
|
| 302 |
|
| 303 | //
|
| 304 | // return sense data (length and contents) in all cases, truncated if needed
|
| 305 | //
|
| 306 | ResponseSenseLen = MIN (Response->SenseLen, VIRTIO_SCSI_SENSE_SIZE);
|
| 307 | if (Packet->SenseDataLength > ResponseSenseLen) {
|
| 308 | Packet->SenseDataLength = (UINT8) ResponseSenseLen;
|
| 309 | }
|
| 310 | for (Idx = 0; Idx < Packet->SenseDataLength; ++Idx) {
|
| 311 | ((UINT8 *) Packet->SenseData)[Idx] = Response->Sense[Idx];
|
| 312 | }
|
| 313 |
|
| 314 | //
|
| 315 | // Report actual transfer lengths. The logic below covers all three
|
| 316 | // DataDirections (read, write, bidirectional).
|
| 317 | //
|
| 318 | // -+- @ 0
|
| 319 | // |
|
| 320 | // | write ^ @ Residual (unprocessed)
|
| 321 | // | |
|
| 322 | // -+- @ OutTransferLength -+- @ InTransferLength
|
| 323 | // | |
|
| 324 | // | read |
|
| 325 | // | |
|
| 326 | // V @ OutTransferLength + InTransferLength -+- @ 0
|
| 327 | //
|
| 328 | if (Response->Residual <= Packet->InTransferLength) {
|
| 329 | Packet->InTransferLength -= Response->Residual;
|
| 330 | }
|
| 331 | else {
|
| 332 | Packet->OutTransferLength -= Response->Residual - Packet->InTransferLength;
|
| 333 | Packet->InTransferLength = 0;
|
| 334 | }
|
| 335 |
|
| 336 | //
|
| 337 | // report target status in all cases
|
| 338 | //
|
| 339 | Packet->TargetStatus = Response->Status;
|
| 340 |
|
| 341 | //
|
| 342 | // host adapter status and function return value depend on virtio-scsi
|
| 343 | // response code
|
| 344 | //
|
| 345 | switch (Response->Response) {
|
| 346 | case VIRTIO_SCSI_S_OK:
|
| 347 | Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;
|
| 348 | return EFI_SUCCESS;
|
| 349 |
|
| 350 | case VIRTIO_SCSI_S_OVERRUN:
|
| 351 | Packet->HostAdapterStatus =
|
| 352 | EFI_EXT_SCSI_STATUS_HOST_ADAPTER_DATA_OVERRUN_UNDERRUN;
|
| 353 | break;
|
| 354 |
|
| 355 | case VIRTIO_SCSI_S_BAD_TARGET:
|
| 356 | //
|
| 357 | // This is non-intuitive but explicitly required by the
|
| 358 | // EFI_EXT_SCSI_PASS_THRU_PROTOCOL.PassThru() specification for
|
| 359 | // disconnected (but otherwise valid) target / LUN addresses.
|
| 360 | //
|
| 361 | Packet->HostAdapterStatus =
|
| 362 | EFI_EXT_SCSI_STATUS_HOST_ADAPTER_TIMEOUT_COMMAND;
|
| 363 | return EFI_TIMEOUT;
|
| 364 |
|
| 365 | case VIRTIO_SCSI_S_RESET:
|
| 366 | Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_BUS_RESET;
|
| 367 | break;
|
| 368 |
|
| 369 | case VIRTIO_SCSI_S_BUSY:
|
| 370 | Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OK;
|
| 371 | return EFI_NOT_READY;
|
| 372 |
|
| 373 | //
|
| 374 | // Lump together the rest. The mapping for VIRTIO_SCSI_S_ABORTED is
|
| 375 | // intentional as well, not an oversight.
|
| 376 | //
|
| 377 | case VIRTIO_SCSI_S_ABORTED:
|
| 378 | case VIRTIO_SCSI_S_TRANSPORT_FAILURE:
|
| 379 | case VIRTIO_SCSI_S_TARGET_FAILURE:
|
| 380 | case VIRTIO_SCSI_S_NEXUS_FAILURE:
|
| 381 | case VIRTIO_SCSI_S_FAILURE:
|
| 382 | default:
|
| 383 | Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;
|
| 384 | }
|
| 385 |
|
| 386 | return EFI_DEVICE_ERROR;
|
| 387 | }
|
| 388 |
|
| 389 |
|
| 390 | //
|
| 391 | // The next seven functions implement EFI_EXT_SCSI_PASS_THRU_PROTOCOL
|
| 392 | // for the virtio-scsi HBA. Refer to UEFI Spec 2.3.1 + Errata C, sections
|
| 393 | // - 14.1 SCSI Driver Model Overview,
|
| 394 | // - 14.7 Extended SCSI Pass Thru Protocol.
|
| 395 | //
|
| 396 |
|
| 397 | EFI_STATUS
|
| 398 | EFIAPI
|
| 399 | VirtioScsiPassThru (
|
| 400 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 401 | IN UINT8 *Target,
|
| 402 | IN UINT64 Lun,
|
| 403 | IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet,
|
| 404 | IN EFI_EVENT Event OPTIONAL
|
| 405 | )
|
| 406 | {
|
| 407 | VSCSI_DEV *Dev;
|
| 408 | UINT16 TargetValue;
|
| 409 | EFI_STATUS Status;
|
| 410 | volatile VIRTIO_SCSI_REQ Request;
|
| 411 | volatile VIRTIO_SCSI_RESP Response;
|
| 412 | DESC_INDICES Indices;
|
| 413 |
|
| 414 | ZeroMem ((VOID*) &Request, sizeof (Request));
|
| 415 | ZeroMem ((VOID*) &Response, sizeof (Response));
|
| 416 |
|
| 417 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
|
| 418 | CopyMem (&TargetValue, Target, sizeof TargetValue);
|
| 419 |
|
| 420 | Status = PopulateRequest (Dev, TargetValue, Lun, Packet, &Request);
|
| 421 | if (EFI_ERROR (Status)) {
|
| 422 | return Status;
|
| 423 | }
|
| 424 |
|
| 425 | VirtioPrepare (&Dev->Ring, &Indices);
|
| 426 |
|
| 427 | //
|
| 428 | // preset a host status for ourselves that we do not accept as success
|
| 429 | //
|
| 430 | Response.Response = VIRTIO_SCSI_S_FAILURE;
|
| 431 |
|
| 432 | //
|
| 433 | // ensured by VirtioScsiInit() -- this predicate, in combination with the
|
| 434 | // lock-step progress, ensures we don't have to track free descriptors.
|
| 435 | //
|
| 436 | ASSERT (Dev->Ring.QueueSize >= 4);
|
| 437 |
|
| 438 | //
|
| 439 | // enqueue Request
|
| 440 | //
|
| 441 | VirtioAppendDesc (&Dev->Ring, (UINTN) &Request, sizeof Request,
|
| 442 | VRING_DESC_F_NEXT, &Indices);
|
| 443 |
|
| 444 | //
|
| 445 | // enqueue "dataout" if any
|
| 446 | //
|
| 447 | if (Packet->OutTransferLength > 0) {
|
| 448 | VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->OutDataBuffer,
|
| 449 | Packet->OutTransferLength, VRING_DESC_F_NEXT, &Indices);
|
| 450 | }
|
| 451 |
|
| 452 | //
|
| 453 | // enqueue Response, to be written by the host
|
| 454 | //
|
| 455 | VirtioAppendDesc (&Dev->Ring, (UINTN) &Response, sizeof Response,
|
| 456 | VRING_DESC_F_WRITE | (Packet->InTransferLength > 0 ?
|
| 457 | VRING_DESC_F_NEXT : 0),
|
| 458 | &Indices);
|
| 459 |
|
| 460 | //
|
| 461 | // enqueue "datain" if any, to be written by the host
|
| 462 | //
|
| 463 | if (Packet->InTransferLength > 0) {
|
| 464 | VirtioAppendDesc (&Dev->Ring, (UINTN) Packet->InDataBuffer,
|
| 465 | Packet->InTransferLength, VRING_DESC_F_WRITE, &Indices);
|
| 466 | }
|
| 467 |
|
| 468 | // If kicking the host fails, we must fake a host adapter error.
|
| 469 | // EFI_NOT_READY would save us the effort, but it would also suggest that the
|
| 470 | // caller retry.
|
| 471 | //
|
| 472 | if (VirtioFlush (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE, &Dev->Ring,
|
| 473 | &Indices) != EFI_SUCCESS) {
|
| 474 | Packet->InTransferLength = 0;
|
| 475 | Packet->OutTransferLength = 0;
|
| 476 | Packet->HostAdapterStatus = EFI_EXT_SCSI_STATUS_HOST_ADAPTER_OTHER;
|
| 477 | Packet->TargetStatus = EFI_EXT_SCSI_STATUS_TARGET_GOOD;
|
| 478 | Packet->SenseDataLength = 0;
|
| 479 | return EFI_DEVICE_ERROR;
|
| 480 | }
|
| 481 |
|
| 482 | return ParseResponse (Packet, &Response);
|
| 483 | }
|
| 484 |
|
| 485 |
|
| 486 | EFI_STATUS
|
| 487 | EFIAPI
|
| 488 | VirtioScsiGetNextTargetLun (
|
| 489 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 490 | IN OUT UINT8 **TargetPointer,
|
| 491 | IN OUT UINT64 *Lun
|
| 492 | )
|
| 493 | {
|
| 494 | UINT8 *Target;
|
| 495 | UINTN Idx;
|
| 496 | UINT16 LastTarget;
|
| 497 | VSCSI_DEV *Dev;
|
| 498 |
|
| 499 | //
|
| 500 | // the TargetPointer input parameter is unnecessarily a pointer-to-pointer
|
| 501 | //
|
| 502 | Target = *TargetPointer;
|
| 503 |
|
| 504 | //
|
| 505 | // Search for first non-0xFF byte. If not found, return first target & LUN.
|
| 506 | //
|
| 507 | for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)
|
| 508 | ;
|
| 509 | if (Idx == TARGET_MAX_BYTES) {
|
| 510 | SetMem (Target, TARGET_MAX_BYTES, 0x00);
|
| 511 | *Lun = 0;
|
| 512 | return EFI_SUCCESS;
|
| 513 | }
|
| 514 |
|
| 515 | //
|
| 516 | // see the TARGET_MAX_BYTES check in "VirtioScsi.h"
|
| 517 | //
|
| 518 | CopyMem (&LastTarget, Target, sizeof LastTarget);
|
| 519 |
|
| 520 | //
|
| 521 | // increment (target, LUN) pair if valid on input
|
| 522 | //
|
| 523 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
|
| 524 | if (LastTarget > Dev->MaxTarget || *Lun > Dev->MaxLun) {
|
| 525 | return EFI_INVALID_PARAMETER;
|
| 526 | }
|
| 527 |
|
| 528 | if (*Lun < Dev->MaxLun) {
|
| 529 | ++*Lun;
|
| 530 | return EFI_SUCCESS;
|
| 531 | }
|
| 532 |
|
| 533 | if (LastTarget < Dev->MaxTarget) {
|
| 534 | *Lun = 0;
|
| 535 | ++LastTarget;
|
| 536 | CopyMem (Target, &LastTarget, sizeof LastTarget);
|
| 537 | return EFI_SUCCESS;
|
| 538 | }
|
| 539 |
|
| 540 | return EFI_NOT_FOUND;
|
| 541 | }
|
| 542 |
|
| 543 |
|
| 544 | EFI_STATUS
|
| 545 | EFIAPI
|
| 546 | VirtioScsiBuildDevicePath (
|
| 547 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 548 | IN UINT8 *Target,
|
| 549 | IN UINT64 Lun,
|
| 550 | IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath
|
| 551 | )
|
| 552 | {
|
| 553 | UINT16 TargetValue;
|
| 554 | VSCSI_DEV *Dev;
|
| 555 | SCSI_DEVICE_PATH *ScsiDevicePath;
|
| 556 |
|
| 557 | if (DevicePath == NULL) {
|
| 558 | return EFI_INVALID_PARAMETER;
|
| 559 | }
|
| 560 |
|
| 561 | CopyMem (&TargetValue, Target, sizeof TargetValue);
|
| 562 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
|
| 563 | if (TargetValue > Dev->MaxTarget || Lun > Dev->MaxLun || Lun > 0xFFFF) {
|
| 564 | return EFI_NOT_FOUND;
|
| 565 | }
|
| 566 |
|
| 567 | ScsiDevicePath = AllocatePool (sizeof *ScsiDevicePath);
|
| 568 | if (ScsiDevicePath == NULL) {
|
| 569 | return EFI_OUT_OF_RESOURCES;
|
| 570 | }
|
| 571 |
|
| 572 | ScsiDevicePath->Header.Type = MESSAGING_DEVICE_PATH;
|
| 573 | ScsiDevicePath->Header.SubType = MSG_SCSI_DP;
|
| 574 | ScsiDevicePath->Header.Length[0] = (UINT8) sizeof *ScsiDevicePath;
|
| 575 | ScsiDevicePath->Header.Length[1] = (UINT8) (sizeof *ScsiDevicePath >> 8);
|
| 576 | ScsiDevicePath->Pun = TargetValue;
|
| 577 | ScsiDevicePath->Lun = (UINT16) Lun;
|
| 578 |
|
| 579 | *DevicePath = &ScsiDevicePath->Header;
|
| 580 | return EFI_SUCCESS;
|
| 581 | }
|
| 582 |
|
| 583 |
|
| 584 | EFI_STATUS
|
| 585 | EFIAPI
|
| 586 | VirtioScsiGetTargetLun (
|
| 587 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 588 | IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
|
| 589 | OUT UINT8 **TargetPointer,
|
| 590 | OUT UINT64 *Lun
|
| 591 | )
|
| 592 | {
|
| 593 | SCSI_DEVICE_PATH *ScsiDevicePath;
|
| 594 | VSCSI_DEV *Dev;
|
| 595 | UINT8 *Target;
|
| 596 |
|
| 597 | if (DevicePath == NULL || TargetPointer == NULL || *TargetPointer == NULL ||
|
| 598 | Lun == NULL) {
|
| 599 | return EFI_INVALID_PARAMETER;
|
| 600 | }
|
| 601 |
|
| 602 | if (DevicePath->Type != MESSAGING_DEVICE_PATH ||
|
| 603 | DevicePath->SubType != MSG_SCSI_DP) {
|
| 604 | return EFI_UNSUPPORTED;
|
| 605 | }
|
| 606 |
|
| 607 | ScsiDevicePath = (SCSI_DEVICE_PATH *) DevicePath;
|
| 608 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
|
| 609 | if (ScsiDevicePath->Pun > Dev->MaxTarget ||
|
| 610 | ScsiDevicePath->Lun > Dev->MaxLun) {
|
| 611 | return EFI_NOT_FOUND;
|
| 612 | }
|
| 613 |
|
| 614 | //
|
| 615 | // a) the TargetPointer input parameter is unnecessarily a pointer-to-pointer
|
| 616 | // b) see the TARGET_MAX_BYTES check in "VirtioScsi.h"
|
| 617 | // c) ScsiDevicePath->Pun is an UINT16
|
| 618 | //
|
| 619 | Target = *TargetPointer;
|
| 620 | CopyMem (Target, &ScsiDevicePath->Pun, 2);
|
| 621 | SetMem (Target + 2, TARGET_MAX_BYTES - 2, 0x00);
|
| 622 |
|
| 623 | *Lun = ScsiDevicePath->Lun;
|
| 624 | return EFI_SUCCESS;
|
| 625 | }
|
| 626 |
|
| 627 |
|
| 628 | EFI_STATUS
|
| 629 | EFIAPI
|
| 630 | VirtioScsiResetChannel (
|
| 631 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This
|
| 632 | )
|
| 633 | {
|
| 634 | return EFI_UNSUPPORTED;
|
| 635 | }
|
| 636 |
|
| 637 |
|
| 638 | EFI_STATUS
|
| 639 | EFIAPI
|
| 640 | VirtioScsiResetTargetLun (
|
| 641 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 642 | IN UINT8 *Target,
|
| 643 | IN UINT64 Lun
|
| 644 | )
|
| 645 | {
|
| 646 | return EFI_UNSUPPORTED;
|
| 647 | }
|
| 648 |
|
| 649 |
|
| 650 | EFI_STATUS
|
| 651 | EFIAPI
|
| 652 | VirtioScsiGetNextTarget (
|
| 653 | IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This,
|
| 654 | IN OUT UINT8 **TargetPointer
|
| 655 | )
|
| 656 | {
|
| 657 | UINT8 *Target;
|
| 658 | UINTN Idx;
|
| 659 | UINT16 LastTarget;
|
| 660 | VSCSI_DEV *Dev;
|
| 661 |
|
| 662 | //
|
| 663 | // the TargetPointer input parameter is unnecessarily a pointer-to-pointer
|
| 664 | //
|
| 665 | Target = *TargetPointer;
|
| 666 |
|
| 667 | //
|
| 668 | // Search for first non-0xFF byte. If not found, return first target.
|
| 669 | //
|
| 670 | for (Idx = 0; Idx < TARGET_MAX_BYTES && Target[Idx] == 0xFF; ++Idx)
|
| 671 | ;
|
| 672 | if (Idx == TARGET_MAX_BYTES) {
|
| 673 | SetMem (Target, TARGET_MAX_BYTES, 0x00);
|
| 674 | return EFI_SUCCESS;
|
| 675 | }
|
| 676 |
|
| 677 | //
|
| 678 | // see the TARGET_MAX_BYTES check in "VirtioScsi.h"
|
| 679 | //
|
| 680 | CopyMem (&LastTarget, Target, sizeof LastTarget);
|
| 681 |
|
| 682 | //
|
| 683 | // increment target if valid on input
|
| 684 | //
|
| 685 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (This);
|
| 686 | if (LastTarget > Dev->MaxTarget) {
|
| 687 | return EFI_INVALID_PARAMETER;
|
| 688 | }
|
| 689 |
|
| 690 | if (LastTarget < Dev->MaxTarget) {
|
| 691 | ++LastTarget;
|
| 692 | CopyMem (Target, &LastTarget, sizeof LastTarget);
|
| 693 | return EFI_SUCCESS;
|
| 694 | }
|
| 695 |
|
| 696 | return EFI_NOT_FOUND;
|
| 697 | }
|
| 698 |
|
| 699 |
|
| 700 | STATIC
|
| 701 | EFI_STATUS
|
| 702 | EFIAPI
|
| 703 | VirtioScsiInit (
|
| 704 | IN OUT VSCSI_DEV *Dev
|
| 705 | )
|
| 706 | {
|
| 707 | UINT8 NextDevStat;
|
| 708 | EFI_STATUS Status;
|
| 709 |
|
| 710 | UINT32 Features;
|
| 711 | UINT16 MaxChannel; // for validation only
|
| 712 | UINT32 NumQueues; // for validation only
|
| 713 | UINT16 QueueSize;
|
| 714 |
|
| 715 | //
|
| 716 | // Execute virtio-0.9.5, 2.2.1 Device Initialization Sequence.
|
| 717 | //
|
| 718 | NextDevStat = 0; // step 1 -- reset device
|
| 719 | Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
|
| 720 | if (EFI_ERROR (Status)) {
|
| 721 | goto Failed;
|
| 722 | }
|
| 723 |
|
| 724 | NextDevStat |= VSTAT_ACK; // step 2 -- acknowledge device presence
|
| 725 | Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
|
| 726 | if (EFI_ERROR (Status)) {
|
| 727 | goto Failed;
|
| 728 | }
|
| 729 |
|
| 730 | NextDevStat |= VSTAT_DRIVER; // step 3 -- we know how to drive it
|
| 731 | Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
|
| 732 | if (EFI_ERROR (Status)) {
|
| 733 | goto Failed;
|
| 734 | }
|
| 735 |
|
| 736 | //
|
| 737 | // Set Page Size - MMIO VirtIo Specific
|
| 738 | //
|
| 739 | Status = Dev->VirtIo->SetPageSize (Dev->VirtIo, EFI_PAGE_SIZE);
|
| 740 | if (EFI_ERROR (Status)) {
|
| 741 | goto Failed;
|
| 742 | }
|
| 743 |
|
| 744 | //
|
| 745 | // step 4a -- retrieve and validate features
|
| 746 | //
|
| 747 | Status = Dev->VirtIo->GetDeviceFeatures (Dev->VirtIo, &Features);
|
| 748 | if (EFI_ERROR (Status)) {
|
| 749 | goto Failed;
|
| 750 | }
|
| 751 | Dev->InOutSupported = (BOOLEAN) ((Features & VIRTIO_SCSI_F_INOUT) != 0);
|
| 752 |
|
| 753 | Status = VIRTIO_CFG_READ (Dev, MaxChannel, &MaxChannel);
|
| 754 | if (EFI_ERROR (Status)) {
|
| 755 | goto Failed;
|
| 756 | }
|
| 757 | if (MaxChannel != 0) {
|
| 758 | //
|
| 759 | // this driver is for a single-channel virtio-scsi HBA
|
| 760 | //
|
| 761 | Status = EFI_UNSUPPORTED;
|
| 762 | goto Failed;
|
| 763 | }
|
| 764 |
|
| 765 | Status = VIRTIO_CFG_READ (Dev, NumQueues, &NumQueues);
|
| 766 | if (EFI_ERROR (Status)) {
|
| 767 | goto Failed;
|
| 768 | }
|
| 769 | if (NumQueues < 1) {
|
| 770 | Status = EFI_UNSUPPORTED;
|
| 771 | goto Failed;
|
| 772 | }
|
| 773 |
|
| 774 | Status = VIRTIO_CFG_READ (Dev, MaxTarget, &Dev->MaxTarget);
|
| 775 | if (EFI_ERROR (Status)) {
|
| 776 | goto Failed;
|
| 777 | }
|
| 778 | if (Dev->MaxTarget > PcdGet16 (PcdVirtioScsiMaxTargetLimit)) {
|
| 779 | Dev->MaxTarget = PcdGet16 (PcdVirtioScsiMaxTargetLimit);
|
| 780 | }
|
| 781 |
|
| 782 | Status = VIRTIO_CFG_READ (Dev, MaxLun, &Dev->MaxLun);
|
| 783 | if (EFI_ERROR (Status)) {
|
| 784 | goto Failed;
|
| 785 | }
|
| 786 | if (Dev->MaxLun > PcdGet32 (PcdVirtioScsiMaxLunLimit)) {
|
| 787 | Dev->MaxLun = PcdGet32 (PcdVirtioScsiMaxLunLimit);
|
| 788 | }
|
| 789 |
|
| 790 | Status = VIRTIO_CFG_READ (Dev, MaxSectors, &Dev->MaxSectors);
|
| 791 | if (EFI_ERROR (Status)) {
|
| 792 | goto Failed;
|
| 793 | }
|
| 794 | if (Dev->MaxSectors < 2) {
|
| 795 | //
|
| 796 | // We must be able to halve it for bidirectional transfers
|
| 797 | // (see EFI_BAD_BUFFER_SIZE in PopulateRequest()).
|
| 798 | //
|
| 799 | Status = EFI_UNSUPPORTED;
|
| 800 | goto Failed;
|
| 801 | }
|
| 802 |
|
| 803 | //
|
| 804 | // step 4b -- allocate request virtqueue
|
| 805 | //
|
| 806 | Status = Dev->VirtIo->SetQueueSel (Dev->VirtIo, VIRTIO_SCSI_REQUEST_QUEUE);
|
| 807 | if (EFI_ERROR (Status)) {
|
| 808 | goto Failed;
|
| 809 | }
|
| 810 | Status = Dev->VirtIo->GetQueueNumMax (Dev->VirtIo, &QueueSize);
|
| 811 | if (EFI_ERROR (Status)) {
|
| 812 | goto Failed;
|
| 813 | }
|
| 814 | //
|
| 815 | // VirtioScsiPassThru() uses at most four descriptors
|
| 816 | //
|
| 817 | if (QueueSize < 4) {
|
| 818 | Status = EFI_UNSUPPORTED;
|
| 819 | goto Failed;
|
| 820 | }
|
| 821 |
|
| 822 | Status = VirtioRingInit (QueueSize, &Dev->Ring);
|
| 823 | if (EFI_ERROR (Status)) {
|
| 824 | goto Failed;
|
| 825 | }
|
| 826 |
|
| 827 | //
|
| 828 | // Additional steps for MMIO: align the queue appropriately, and set the
|
| 829 | // size. If anything fails from here on, we must release the ring resources.
|
| 830 | //
|
| 831 | Status = Dev->VirtIo->SetQueueNum (Dev->VirtIo, QueueSize);
|
| 832 | if (EFI_ERROR (Status)) {
|
| 833 | goto ReleaseQueue;
|
| 834 | }
|
| 835 |
|
| 836 | Status = Dev->VirtIo->SetQueueAlign (Dev->VirtIo, EFI_PAGE_SIZE);
|
| 837 | if (EFI_ERROR (Status)) {
|
| 838 | goto ReleaseQueue;
|
| 839 | }
|
| 840 |
|
| 841 | //
|
| 842 | // step 4c -- Report GPFN (guest-physical frame number) of queue.
|
| 843 | //
|
| 844 | Status = Dev->VirtIo->SetQueueAddress (Dev->VirtIo,
|
| 845 | (UINT32) ((UINTN) Dev->Ring.Base >> EFI_PAGE_SHIFT));
|
| 846 | if (EFI_ERROR (Status)) {
|
| 847 | goto ReleaseQueue;
|
| 848 | }
|
| 849 |
|
| 850 | //
|
| 851 | // step 5 -- Report understood features and guest-tuneables. We want none of
|
| 852 | // the known (or unknown) VIRTIO_SCSI_F_* or VIRTIO_F_* capabilities (see
|
| 853 | // virtio-0.9.5, Appendices B and I), except bidirectional transfers.
|
| 854 | //
|
| 855 | Status = Dev->VirtIo->SetGuestFeatures (Dev->VirtIo,
|
| 856 | Features & VIRTIO_SCSI_F_INOUT);
|
| 857 | if (EFI_ERROR (Status)) {
|
| 858 | goto ReleaseQueue;
|
| 859 | }
|
| 860 |
|
| 861 | //
|
| 862 | // We expect these maximum sizes from the host. Since they are
|
| 863 | // guest-negotiable, ask for them rather than just checking them.
|
| 864 | //
|
| 865 | Status = VIRTIO_CFG_WRITE (Dev, CdbSize, VIRTIO_SCSI_CDB_SIZE);
|
| 866 | if (EFI_ERROR (Status)) {
|
| 867 | goto ReleaseQueue;
|
| 868 | }
|
| 869 | Status = VIRTIO_CFG_WRITE (Dev, SenseSize, VIRTIO_SCSI_SENSE_SIZE);
|
| 870 | if (EFI_ERROR (Status)) {
|
| 871 | goto ReleaseQueue;
|
| 872 | }
|
| 873 |
|
| 874 | //
|
| 875 | // step 6 -- initialization complete
|
| 876 | //
|
| 877 | NextDevStat |= VSTAT_DRIVER_OK;
|
| 878 | Status = Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
|
| 879 | if (EFI_ERROR (Status)) {
|
| 880 | goto ReleaseQueue;
|
| 881 | }
|
| 882 |
|
| 883 | //
|
| 884 | // populate the exported interface's attributes
|
| 885 | //
|
| 886 | Dev->PassThru.Mode = &Dev->PassThruMode;
|
| 887 | Dev->PassThru.PassThru = &VirtioScsiPassThru;
|
| 888 | Dev->PassThru.GetNextTargetLun = &VirtioScsiGetNextTargetLun;
|
| 889 | Dev->PassThru.BuildDevicePath = &VirtioScsiBuildDevicePath;
|
| 890 | Dev->PassThru.GetTargetLun = &VirtioScsiGetTargetLun;
|
| 891 | Dev->PassThru.ResetChannel = &VirtioScsiResetChannel;
|
| 892 | Dev->PassThru.ResetTargetLun = &VirtioScsiResetTargetLun;
|
| 893 | Dev->PassThru.GetNextTarget = &VirtioScsiGetNextTarget;
|
| 894 |
|
| 895 | //
|
| 896 | // AdapterId is a target for which no handle will be created during bus scan.
|
| 897 | // Prevent any conflict with real devices.
|
| 898 | //
|
| 899 | Dev->PassThruMode.AdapterId = 0xFFFFFFFF;
|
| 900 |
|
| 901 | //
|
| 902 | // Set both physical and logical attributes for non-RAID SCSI channel. See
|
| 903 | // Driver Writer's Guide for UEFI 2.3.1 v1.01, 20.1.5 Implementing Extended
|
| 904 | // SCSI Pass Thru Protocol.
|
| 905 | //
|
| 906 | Dev->PassThruMode.Attributes = EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_PHYSICAL |
|
| 907 | EFI_EXT_SCSI_PASS_THRU_ATTRIBUTES_LOGICAL;
|
| 908 |
|
| 909 | //
|
| 910 | // no restriction on transfer buffer alignment
|
| 911 | //
|
| 912 | Dev->PassThruMode.IoAlign = 0;
|
| 913 |
|
| 914 | return EFI_SUCCESS;
|
| 915 |
|
| 916 | ReleaseQueue:
|
| 917 | VirtioRingUninit (&Dev->Ring);
|
| 918 |
|
| 919 | Failed:
|
| 920 | //
|
| 921 | // Notify the host about our failure to setup: virtio-0.9.5, 2.2.2.1 Device
|
| 922 | // Status. VirtIo access failure here should not mask the original error.
|
| 923 | //
|
| 924 | NextDevStat |= VSTAT_FAILED;
|
| 925 | Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, NextDevStat);
|
| 926 |
|
| 927 | Dev->InOutSupported = FALSE;
|
| 928 | Dev->MaxTarget = 0;
|
| 929 | Dev->MaxLun = 0;
|
| 930 | Dev->MaxSectors = 0;
|
| 931 |
|
| 932 | return Status; // reached only via Failed above
|
| 933 | }
|
| 934 |
|
| 935 |
|
| 936 |
|
| 937 | STATIC
|
| 938 | VOID
|
| 939 | EFIAPI
|
| 940 | VirtioScsiUninit (
|
| 941 | IN OUT VSCSI_DEV *Dev
|
| 942 | )
|
| 943 | {
|
| 944 | //
|
| 945 | // Reset the virtual device -- see virtio-0.9.5, 2.2.2.1 Device Status. When
|
| 946 | // VIRTIO_CFG_WRITE() returns, the host will have learned to stay away from
|
| 947 | // the old comms area.
|
| 948 | //
|
| 949 | Dev->VirtIo->SetDeviceStatus (Dev->VirtIo, 0);
|
| 950 |
|
| 951 | Dev->InOutSupported = FALSE;
|
| 952 | Dev->MaxTarget = 0;
|
| 953 | Dev->MaxLun = 0;
|
| 954 | Dev->MaxSectors = 0;
|
| 955 |
|
| 956 | VirtioRingUninit (&Dev->Ring);
|
| 957 |
|
| 958 | SetMem (&Dev->PassThru, sizeof Dev->PassThru, 0x00);
|
| 959 | SetMem (&Dev->PassThruMode, sizeof Dev->PassThruMode, 0x00);
|
| 960 | }
|
| 961 |
|
| 962 |
|
| 963 | //
|
| 964 | // Probe, start and stop functions of this driver, called by the DXE core for
|
| 965 | // specific devices.
|
| 966 | //
|
| 967 | // The following specifications document these interfaces:
|
| 968 | // - Driver Writer's Guide for UEFI 2.3.1 v1.01, 9 Driver Binding Protocol
|
| 969 | // - UEFI Spec 2.3.1 + Errata C, 10.1 EFI Driver Binding Protocol
|
| 970 | //
|
| 971 | // The implementation follows:
|
| 972 | // - Driver Writer's Guide for UEFI 2.3.1 v1.01
|
| 973 | // - 5.1.3.4 OpenProtocol() and CloseProtocol()
|
| 974 | // - UEFI Spec 2.3.1 + Errata C
|
| 975 | // - 6.3 Protocol Handler Services
|
| 976 | //
|
| 977 |
|
| 978 | EFI_STATUS
|
| 979 | EFIAPI
|
| 980 | VirtioScsiDriverBindingSupported (
|
| 981 | IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
| 982 | IN EFI_HANDLE DeviceHandle,
|
| 983 | IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
|
| 984 | )
|
| 985 | {
|
| 986 | EFI_STATUS Status;
|
| 987 | VIRTIO_DEVICE_PROTOCOL *VirtIo;
|
| 988 |
|
| 989 | //
|
| 990 | // Attempt to open the device with the VirtIo set of interfaces. On success,
|
| 991 | // the protocol is "instantiated" for the VirtIo device. Covers duplicate open
|
| 992 | // attempts (EFI_ALREADY_STARTED).
|
| 993 | //
|
| 994 | Status = gBS->OpenProtocol (
|
| 995 | DeviceHandle, // candidate device
|
| 996 | &gVirtioDeviceProtocolGuid, // for generic VirtIo access
|
| 997 | (VOID **)&VirtIo, // handle to instantiate
|
| 998 | This->DriverBindingHandle, // requestor driver identity
|
| 999 | DeviceHandle, // ControllerHandle, according to
|
| 1000 | // the UEFI Driver Model
|
| 1001 | EFI_OPEN_PROTOCOL_BY_DRIVER // get exclusive VirtIo access to
|
| 1002 | // the device; to be released
|
| 1003 | );
|
| 1004 | if (EFI_ERROR (Status)) {
|
| 1005 | return Status;
|
| 1006 | }
|
| 1007 |
|
| 1008 | if (VirtIo->SubSystemDeviceId != VIRTIO_SUBSYSTEM_SCSI_HOST) {
|
| 1009 | Status = EFI_UNSUPPORTED;
|
| 1010 | }
|
| 1011 |
|
| 1012 | //
|
| 1013 | // We needed VirtIo access only transitorily, to see whether we support the
|
| 1014 | // device or not.
|
| 1015 | //
|
| 1016 | gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
|
| 1017 | This->DriverBindingHandle, DeviceHandle);
|
| 1018 | return Status;
|
| 1019 | }
|
| 1020 |
|
| 1021 |
|
| 1022 | EFI_STATUS
|
| 1023 | EFIAPI
|
| 1024 | VirtioScsiDriverBindingStart (
|
| 1025 | IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
| 1026 | IN EFI_HANDLE DeviceHandle,
|
| 1027 | IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath
|
| 1028 | )
|
| 1029 | {
|
| 1030 | VSCSI_DEV *Dev;
|
| 1031 | EFI_STATUS Status;
|
| 1032 |
|
| 1033 | Dev = (VSCSI_DEV *) AllocateZeroPool (sizeof *Dev);
|
| 1034 | if (Dev == NULL) {
|
| 1035 | return EFI_OUT_OF_RESOURCES;
|
| 1036 | }
|
| 1037 |
|
| 1038 | Status = gBS->OpenProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
|
| 1039 | (VOID **)&Dev->VirtIo, This->DriverBindingHandle,
|
| 1040 | DeviceHandle, EFI_OPEN_PROTOCOL_BY_DRIVER);
|
| 1041 | if (EFI_ERROR (Status)) {
|
| 1042 | goto FreeVirtioScsi;
|
| 1043 | }
|
| 1044 |
|
| 1045 | //
|
| 1046 | // VirtIo access granted, configure virtio-scsi device.
|
| 1047 | //
|
| 1048 | Status = VirtioScsiInit (Dev);
|
| 1049 | if (EFI_ERROR (Status)) {
|
| 1050 | goto CloseVirtIo;
|
| 1051 | }
|
| 1052 |
|
| 1053 | //
|
| 1054 | // Setup complete, attempt to export the driver instance's PassThru
|
| 1055 | // interface.
|
| 1056 | //
|
| 1057 | Dev->Signature = VSCSI_SIG;
|
| 1058 | Status = gBS->InstallProtocolInterface (&DeviceHandle,
|
| 1059 | &gEfiExtScsiPassThruProtocolGuid, EFI_NATIVE_INTERFACE,
|
| 1060 | &Dev->PassThru);
|
| 1061 | if (EFI_ERROR (Status)) {
|
| 1062 | goto UninitDev;
|
| 1063 | }
|
| 1064 |
|
| 1065 | return EFI_SUCCESS;
|
| 1066 |
|
| 1067 | UninitDev:
|
| 1068 | VirtioScsiUninit (Dev);
|
| 1069 |
|
| 1070 | CloseVirtIo:
|
| 1071 | gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
|
| 1072 | This->DriverBindingHandle, DeviceHandle);
|
| 1073 |
|
| 1074 | FreeVirtioScsi:
|
| 1075 | FreePool (Dev);
|
| 1076 |
|
| 1077 | return Status;
|
| 1078 | }
|
| 1079 |
|
| 1080 |
|
| 1081 | EFI_STATUS
|
| 1082 | EFIAPI
|
| 1083 | VirtioScsiDriverBindingStop (
|
| 1084 | IN EFI_DRIVER_BINDING_PROTOCOL *This,
|
| 1085 | IN EFI_HANDLE DeviceHandle,
|
| 1086 | IN UINTN NumberOfChildren,
|
| 1087 | IN EFI_HANDLE *ChildHandleBuffer
|
| 1088 | )
|
| 1089 | {
|
| 1090 | EFI_STATUS Status;
|
| 1091 | EFI_EXT_SCSI_PASS_THRU_PROTOCOL *PassThru;
|
| 1092 | VSCSI_DEV *Dev;
|
| 1093 |
|
| 1094 | Status = gBS->OpenProtocol (
|
| 1095 | DeviceHandle, // candidate device
|
| 1096 | &gEfiExtScsiPassThruProtocolGuid, // retrieve the SCSI iface
|
| 1097 | (VOID **)&PassThru, // target pointer
|
| 1098 | This->DriverBindingHandle, // requestor driver ident.
|
| 1099 | DeviceHandle, // lookup req. for dev.
|
| 1100 | EFI_OPEN_PROTOCOL_GET_PROTOCOL // lookup only, no new ref.
|
| 1101 | );
|
| 1102 | if (EFI_ERROR (Status)) {
|
| 1103 | return Status;
|
| 1104 | }
|
| 1105 |
|
| 1106 | Dev = VIRTIO_SCSI_FROM_PASS_THRU (PassThru);
|
| 1107 |
|
| 1108 | //
|
| 1109 | // Handle Stop() requests for in-use driver instances gracefully.
|
| 1110 | //
|
| 1111 | Status = gBS->UninstallProtocolInterface (DeviceHandle,
|
| 1112 | &gEfiExtScsiPassThruProtocolGuid, &Dev->PassThru);
|
| 1113 | if (EFI_ERROR (Status)) {
|
| 1114 | return Status;
|
| 1115 | }
|
| 1116 |
|
| 1117 | VirtioScsiUninit (Dev);
|
| 1118 |
|
| 1119 | gBS->CloseProtocol (DeviceHandle, &gVirtioDeviceProtocolGuid,
|
| 1120 | This->DriverBindingHandle, DeviceHandle);
|
| 1121 |
|
| 1122 | FreePool (Dev);
|
| 1123 |
|
| 1124 | return EFI_SUCCESS;
|
| 1125 | }
|
| 1126 |
|
| 1127 |
|
| 1128 | //
|
| 1129 | // The static object that groups the Supported() (ie. probe), Start() and
|
| 1130 | // Stop() functions of the driver together. Refer to UEFI Spec 2.3.1 + Errata
|
| 1131 | // C, 10.1 EFI Driver Binding Protocol.
|
| 1132 | //
|
| 1133 | STATIC EFI_DRIVER_BINDING_PROTOCOL gDriverBinding = {
|
| 1134 | &VirtioScsiDriverBindingSupported,
|
| 1135 | &VirtioScsiDriverBindingStart,
|
| 1136 | &VirtioScsiDriverBindingStop,
|
| 1137 | 0x10, // Version, must be in [0x10 .. 0xFFFFFFEF] for IHV-developed drivers
|
| 1138 | NULL, // ImageHandle, to be overwritten by
|
| 1139 | // EfiLibInstallDriverBindingComponentName2() in VirtioScsiEntryPoint()
|
| 1140 | NULL // DriverBindingHandle, ditto
|
| 1141 | };
|
| 1142 |
|
| 1143 |
|
| 1144 | //
|
| 1145 | // The purpose of the following scaffolding (EFI_COMPONENT_NAME_PROTOCOL and
|
| 1146 | // EFI_COMPONENT_NAME2_PROTOCOL implementation) is to format the driver's name
|
| 1147 | // in English, for display on standard console devices. This is recommended for
|
| 1148 | // UEFI drivers that follow the UEFI Driver Model. Refer to the Driver Writer's
|
| 1149 | // Guide for UEFI 2.3.1 v1.01, 11 UEFI Driver and Controller Names.
|
| 1150 | //
|
| 1151 | // Device type names ("Virtio SCSI Host Device") are not formatted because the
|
| 1152 | // driver supports only that device type. Therefore the driver name suffices
|
| 1153 | // for unambiguous identification.
|
| 1154 | //
|
| 1155 |
|
| 1156 | STATIC
|
| 1157 | EFI_UNICODE_STRING_TABLE mDriverNameTable[] = {
|
| 1158 | { "eng;en", L"Virtio SCSI Host Driver" },
|
| 1159 | { NULL, NULL }
|
| 1160 | };
|
| 1161 |
|
| 1162 | STATIC
|
| 1163 | EFI_COMPONENT_NAME_PROTOCOL gComponentName;
|
| 1164 |
|
| 1165 | EFI_STATUS
|
| 1166 | EFIAPI
|
| 1167 | VirtioScsiGetDriverName (
|
| 1168 | IN EFI_COMPONENT_NAME_PROTOCOL *This,
|
| 1169 | IN CHAR8 *Language,
|
| 1170 | OUT CHAR16 **DriverName
|
| 1171 | )
|
| 1172 | {
|
| 1173 | return LookupUnicodeString2 (
|
| 1174 | Language,
|
| 1175 | This->SupportedLanguages,
|
| 1176 | mDriverNameTable,
|
| 1177 | DriverName,
|
| 1178 | (BOOLEAN)(This == &gComponentName) // Iso639Language
|
| 1179 | );
|
| 1180 | }
|
| 1181 |
|
| 1182 | EFI_STATUS
|
| 1183 | EFIAPI
|
| 1184 | VirtioScsiGetDeviceName (
|
| 1185 | IN EFI_COMPONENT_NAME_PROTOCOL *This,
|
| 1186 | IN EFI_HANDLE DeviceHandle,
|
| 1187 | IN EFI_HANDLE ChildHandle,
|
| 1188 | IN CHAR8 *Language,
|
| 1189 | OUT CHAR16 **ControllerName
|
| 1190 | )
|
| 1191 | {
|
| 1192 | return EFI_UNSUPPORTED;
|
| 1193 | }
|
| 1194 |
|
| 1195 | STATIC
|
| 1196 | EFI_COMPONENT_NAME_PROTOCOL gComponentName = {
|
| 1197 | &VirtioScsiGetDriverName,
|
| 1198 | &VirtioScsiGetDeviceName,
|
| 1199 | "eng" // SupportedLanguages, ISO 639-2 language codes
|
| 1200 | };
|
| 1201 |
|
| 1202 | STATIC
|
| 1203 | EFI_COMPONENT_NAME2_PROTOCOL gComponentName2 = {
|
| 1204 | (EFI_COMPONENT_NAME2_GET_DRIVER_NAME) &VirtioScsiGetDriverName,
|
| 1205 | (EFI_COMPONENT_NAME2_GET_CONTROLLER_NAME) &VirtioScsiGetDeviceName,
|
| 1206 | "en" // SupportedLanguages, RFC 4646 language codes
|
| 1207 | };
|
| 1208 |
|
| 1209 |
|
| 1210 | //
|
| 1211 | // Entry point of this driver.
|
| 1212 | //
|
| 1213 | EFI_STATUS
|
| 1214 | EFIAPI
|
| 1215 | VirtioScsiEntryPoint (
|
| 1216 | IN EFI_HANDLE ImageHandle,
|
| 1217 | IN EFI_SYSTEM_TABLE *SystemTable
|
| 1218 | )
|
| 1219 | {
|
| 1220 | return EfiLibInstallDriverBindingComponentName2 (
|
| 1221 | ImageHandle,
|
| 1222 | SystemTable,
|
| 1223 | &gDriverBinding,
|
| 1224 | ImageHandle,
|
| 1225 | &gComponentName,
|
| 1226 | &gComponentName2
|
| 1227 | );
|
| 1228 | }
|