1/** @file
2  NvmExpressDxe driver is used to manage non-volatile memory subsystem which follows
3  NVM Express specification.
4
5  (C) Copyright 2014 Hewlett-Packard Development Company, L.P.<BR>
6  Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.<BR>
7  This program and the accompanying materials
8  are licensed and made available under the terms and conditions of the BSD License
9  which accompanies this distribution.  The full text of the license may be found at
10  http://opensource.org/licenses/bsd-license.php.
11
12  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
13  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
14
15**/
16
17#include "NvmExpress.h"
18
19/**
20  Dump the execution status from a given completion queue entry.
21
22  @param[in]     Cq               A pointer to the NVME_CQ item.
23
24**/
25VOID
26NvmeDumpStatus (
27  IN NVME_CQ             *Cq
28  )
29{
30  DEBUG ((EFI_D_VERBOSE, "Dump NVMe Completion Entry Status from [0x%x]:\n", Cq));
31
32  DEBUG ((EFI_D_VERBOSE, "  SQ Identifier : [0x%x], Phase Tag : [%d], Cmd Identifier : [0x%x]\n", Cq->Sqid, Cq->Pt, Cq->Cid));
33
34  DEBUG ((EFI_D_VERBOSE, "  NVMe Cmd Execution Result - "));
35
36  switch (Cq->Sct) {
37    case 0x0:
38      switch (Cq->Sc) {
39        case 0x0:
40          DEBUG ((EFI_D_VERBOSE, "Successful Completion\n"));
41          break;
42        case 0x1:
43          DEBUG ((EFI_D_VERBOSE, "Invalid Command Opcode\n"));
44          break;
45        case 0x2:
46          DEBUG ((EFI_D_VERBOSE, "Invalid Field in Command\n"));
47          break;
48        case 0x3:
49          DEBUG ((EFI_D_VERBOSE, "Command ID Conflict\n"));
50          break;
51        case 0x4:
52          DEBUG ((EFI_D_VERBOSE, "Data Transfer Error\n"));
53          break;
54        case 0x5:
55          DEBUG ((EFI_D_VERBOSE, "Commands Aborted due to Power Loss Notification\n"));
56          break;
57        case 0x6:
58          DEBUG ((EFI_D_VERBOSE, "Internal Device Error\n"));
59          break;
60        case 0x7:
61          DEBUG ((EFI_D_VERBOSE, "Command Abort Requested\n"));
62          break;
63        case 0x8:
64          DEBUG ((EFI_D_VERBOSE, "Command Aborted due to SQ Deletion\n"));
65          break;
66        case 0x9:
67          DEBUG ((EFI_D_VERBOSE, "Command Aborted due to Failed Fused Command\n"));
68          break;
69        case 0xA:
70          DEBUG ((EFI_D_VERBOSE, "Command Aborted due to Missing Fused Command\n"));
71          break;
72        case 0xB:
73          DEBUG ((EFI_D_VERBOSE, "Invalid Namespace or Format\n"));
74          break;
75        case 0xC:
76          DEBUG ((EFI_D_VERBOSE, "Command Sequence Error\n"));
77          break;
78        case 0xD:
79          DEBUG ((EFI_D_VERBOSE, "Invalid SGL Last Segment Descriptor\n"));
80          break;
81        case 0xE:
82          DEBUG ((EFI_D_VERBOSE, "Invalid Number of SGL Descriptors\n"));
83          break;
84        case 0xF:
85          DEBUG ((EFI_D_VERBOSE, "Data SGL Length Invalid\n"));
86          break;
87        case 0x10:
88          DEBUG ((EFI_D_VERBOSE, "Metadata SGL Length Invalid\n"));
89          break;
90        case 0x11:
91          DEBUG ((EFI_D_VERBOSE, "SGL Descriptor Type Invalid\n"));
92          break;
93        case 0x80:
94          DEBUG ((EFI_D_VERBOSE, "LBA Out of Range\n"));
95          break;
96        case 0x81:
97          DEBUG ((EFI_D_VERBOSE, "Capacity Exceeded\n"));
98          break;
99        case 0x82:
100          DEBUG ((EFI_D_VERBOSE, "Namespace Not Ready\n"));
101          break;
102        case 0x83:
103          DEBUG ((EFI_D_VERBOSE, "Reservation Conflict\n"));
104          break;
105      }
106      break;
107
108    case 0x1:
109      switch (Cq->Sc) {
110        case 0x0:
111          DEBUG ((EFI_D_VERBOSE, "Completion Queue Invalid\n"));
112          break;
113        case 0x1:
114          DEBUG ((EFI_D_VERBOSE, "Invalid Queue Identifier\n"));
115          break;
116        case 0x2:
117          DEBUG ((EFI_D_VERBOSE, "Maximum Queue Size Exceeded\n"));
118          break;
119        case 0x3:
120          DEBUG ((EFI_D_VERBOSE, "Abort Command Limit Exceeded\n"));
121          break;
122        case 0x5:
123          DEBUG ((EFI_D_VERBOSE, "Asynchronous Event Request Limit Exceeded\n"));
124          break;
125        case 0x6:
126          DEBUG ((EFI_D_VERBOSE, "Invalid Firmware Slot\n"));
127          break;
128        case 0x7:
129          DEBUG ((EFI_D_VERBOSE, "Invalid Firmware Image\n"));
130          break;
131        case 0x8:
132          DEBUG ((EFI_D_VERBOSE, "Invalid Interrupt Vector\n"));
133          break;
134        case 0x9:
135          DEBUG ((EFI_D_VERBOSE, "Invalid Log Page\n"));
136          break;
137        case 0xA:
138          DEBUG ((EFI_D_VERBOSE, "Invalid Format\n"));
139          break;
140        case 0xB:
141          DEBUG ((EFI_D_VERBOSE, "Firmware Application Requires Conventional Reset\n"));
142          break;
143        case 0xC:
144          DEBUG ((EFI_D_VERBOSE, "Invalid Queue Deletion\n"));
145          break;
146        case 0xD:
147          DEBUG ((EFI_D_VERBOSE, "Feature Identifier Not Saveable\n"));
148          break;
149        case 0xE:
150          DEBUG ((EFI_D_VERBOSE, "Feature Not Changeable\n"));
151          break;
152        case 0xF:
153          DEBUG ((EFI_D_VERBOSE, "Feature Not Namespace Specific\n"));
154          break;
155        case 0x10:
156          DEBUG ((EFI_D_VERBOSE, "Firmware Application Requires NVM Subsystem Reset\n"));
157          break;
158        case 0x80:
159          DEBUG ((EFI_D_VERBOSE, "Conflicting Attributes\n"));
160          break;
161        case 0x81:
162          DEBUG ((EFI_D_VERBOSE, "Invalid Protection Information\n"));
163          break;
164        case 0x82:
165          DEBUG ((EFI_D_VERBOSE, "Attempted Write to Read Only Range\n"));
166          break;
167      }
168      break;
169
170    case 0x2:
171      switch (Cq->Sc) {
172        case 0x80:
173          DEBUG ((EFI_D_VERBOSE, "Write Fault\n"));
174          break;
175        case 0x81:
176          DEBUG ((EFI_D_VERBOSE, "Unrecovered Read Error\n"));
177          break;
178        case 0x82:
179          DEBUG ((EFI_D_VERBOSE, "End-to-end Guard Check Error\n"));
180          break;
181        case 0x83:
182          DEBUG ((EFI_D_VERBOSE, "End-to-end Application Tag Check Error\n"));
183          break;
184        case 0x84:
185          DEBUG ((EFI_D_VERBOSE, "End-to-end Reference Tag Check Error\n"));
186          break;
187        case 0x85:
188          DEBUG ((EFI_D_VERBOSE, "Compare Failure\n"));
189          break;
190        case 0x86:
191          DEBUG ((EFI_D_VERBOSE, "Access Denied\n"));
192          break;
193      }
194      break;
195
196    default:
197      break;
198  }
199}
200
201/**
202  Create PRP lists for data transfer which is larger than 2 memory pages.
203  Note here we calcuate the number of required PRP lists and allocate them at one time.
204
205  @param[in]     PciIo               A pointer to the EFI_PCI_IO_PROTOCOL instance.
206  @param[in]     PhysicalAddr        The physical base address of data buffer.
207  @param[in]     Pages               The number of pages to be transfered.
208  @param[out]    PrpListHost         The host base address of PRP lists.
209  @param[in,out] PrpListNo           The number of PRP List.
210  @param[out]    Mapping             The mapping value returned from PciIo.Map().
211
212  @retval The pointer to the first PRP List of the PRP lists.
213
214**/
215VOID*
216NvmeCreatePrpList (
217  IN     EFI_PCI_IO_PROTOCOL          *PciIo,
218  IN     EFI_PHYSICAL_ADDRESS         PhysicalAddr,
219  IN     UINTN                        Pages,
220     OUT VOID                         **PrpListHost,
221  IN OUT UINTN                        *PrpListNo,
222     OUT VOID                         **Mapping
223  )
224{
225  UINTN                       PrpEntryNo;
226  UINT64                      PrpListBase;
227  UINTN                       PrpListIndex;
228  UINTN                       PrpEntryIndex;
229  UINT64                      Remainder;
230  EFI_PHYSICAL_ADDRESS        PrpListPhyAddr;
231  UINTN                       Bytes;
232  EFI_STATUS                  Status;
233
234  //
235  // The number of Prp Entry in a memory page.
236  //
237  PrpEntryNo = EFI_PAGE_SIZE / sizeof (UINT64);
238
239  //
240  // Calculate total PrpList number.
241  //
242  *PrpListNo = (UINTN)DivU64x64Remainder ((UINT64)Pages, (UINT64)PrpEntryNo - 1, &Remainder);
243  if (*PrpListNo == 0) {
244    *PrpListNo = 1;
245  } else if ((Remainder != 0) && (Remainder != 1)) {
246    *PrpListNo += 1;
247  } else if (Remainder == 1) {
248    Remainder = PrpEntryNo;
249  } else if (Remainder == 0) {
250    Remainder = PrpEntryNo - 1;
251  }
252
253  Status = PciIo->AllocateBuffer (
254                    PciIo,
255                    AllocateAnyPages,
256                    EfiBootServicesData,
257                    *PrpListNo,
258                    PrpListHost,
259                    0
260                    );
261
262  if (EFI_ERROR (Status)) {
263    return NULL;
264  }
265
266  Bytes = EFI_PAGES_TO_SIZE (*PrpListNo);
267  Status = PciIo->Map (
268                    PciIo,
269                    EfiPciIoOperationBusMasterCommonBuffer,
270                    *PrpListHost,
271                    &Bytes,
272                    &PrpListPhyAddr,
273                    Mapping
274                    );
275
276  if (EFI_ERROR (Status) || (Bytes != EFI_PAGES_TO_SIZE (*PrpListNo))) {
277    DEBUG ((EFI_D_ERROR, "NvmeCreatePrpList: create PrpList failure!\n"));
278    goto EXIT;
279  }
280  //
281  // Fill all PRP lists except of last one.
282  //
283  ZeroMem (*PrpListHost, Bytes);
284  for (PrpListIndex = 0; PrpListIndex < *PrpListNo - 1; ++PrpListIndex) {
285    PrpListBase = *(UINT64*)PrpListHost + PrpListIndex * EFI_PAGE_SIZE;
286
287    for (PrpEntryIndex = 0; PrpEntryIndex < PrpEntryNo; ++PrpEntryIndex) {
288      if (PrpEntryIndex != PrpEntryNo - 1) {
289        //
290        // Fill all PRP entries except of last one.
291        //
292        *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PhysicalAddr;
293        PhysicalAddr += EFI_PAGE_SIZE;
294      } else {
295        //
296        // Fill last PRP entries with next PRP List pointer.
297        //
298        *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PrpListPhyAddr + (PrpListIndex + 1) * EFI_PAGE_SIZE;
299      }
300    }
301  }
302  //
303  // Fill last PRP list.
304  //
305  PrpListBase = *(UINT64*)PrpListHost + PrpListIndex * EFI_PAGE_SIZE;
306  for (PrpEntryIndex = 0; PrpEntryIndex < Remainder; ++PrpEntryIndex) {
307    *((UINT64*)(UINTN)PrpListBase + PrpEntryIndex) = PhysicalAddr;
308    PhysicalAddr += EFI_PAGE_SIZE;
309  }
310
311  return (VOID*)(UINTN)PrpListPhyAddr;
312
313EXIT:
314  PciIo->FreeBuffer (PciIo, *PrpListNo, *PrpListHost);
315  return NULL;
316}
317
318
319/**
320  Sends an NVM Express Command Packet to an NVM Express controller or namespace. This function supports
321  both blocking I/O and non-blocking I/O. The blocking I/O functionality is required, and the non-blocking
322  I/O functionality is optional.
323
324
325  @param[in]     This                A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.
326  @param[in]     NamespaceId         A 32 bit namespace ID as defined in the NVMe specification to which the NVM Express Command
327                                     Packet will be sent.  A value of 0 denotes the NVM Express controller, a value of all 0xFF's
328                                     (all bytes are 0xFF) in the namespace ID specifies that the command packet should be sent to
329                                     all valid namespaces.
330  @param[in,out] Packet              A pointer to the NVM Express Command Packet.
331  @param[in]     Event               If non-blocking I/O is not supported then Event is ignored, and blocking I/O is performed.
332                                     If Event is NULL, then blocking I/O is performed. If Event is not NULL and non-blocking I/O
333                                     is supported, then non-blocking I/O is performed, and Event will be signaled when the NVM
334                                     Express Command Packet completes.
335
336  @retval EFI_SUCCESS                The NVM Express Command Packet was sent by the host. TransferLength bytes were transferred
337                                     to, or from DataBuffer.
338  @retval EFI_BAD_BUFFER_SIZE        The NVM Express Command Packet was not executed. The number of bytes that could be transferred
339                                     is returned in TransferLength.
340  @retval EFI_NOT_READY              The NVM Express Command Packet could not be sent because the controller is not ready. The caller
341                                     may retry again later.
342  @retval EFI_DEVICE_ERROR           A device error occurred while attempting to send the NVM Express Command Packet.
343  @retval EFI_INVALID_PARAMETER      NamespaceId or the contents of EFI_NVM_EXPRESS_PASS_THRU_COMMAND_PACKET are invalid. The NVM
344                                     Express Command Packet was not sent, so no additional status information is available.
345  @retval EFI_UNSUPPORTED            The command described by the NVM Express Command Packet is not supported by the NVM Express
346                                     controller. The NVM Express Command Packet was not sent so no additional status information
347                                     is available.
348  @retval EFI_TIMEOUT                A timeout occurred while waiting for the NVM Express Command Packet to execute.
349
350**/
351EFI_STATUS
352EFIAPI
353NvmExpressPassThru (
354  IN     EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL          *This,
355  IN     UINT32                                      NamespaceId,
356  IN OUT EFI_NVM_EXPRESS_PASS_THRU_COMMAND_PACKET    *Packet,
357  IN     EFI_EVENT                                   Event OPTIONAL
358  )
359{
360  NVME_CONTROLLER_PRIVATE_DATA   *Private;
361  EFI_STATUS                     Status;
362  EFI_PCI_IO_PROTOCOL            *PciIo;
363  NVME_SQ                        *Sq;
364  NVME_CQ                        *Cq;
365  UINT16                         QueueId;
366  UINT32                         Bytes;
367  UINT16                         Offset;
368  EFI_EVENT                      TimerEvent;
369  EFI_PCI_IO_PROTOCOL_OPERATION  Flag;
370  EFI_PHYSICAL_ADDRESS           PhyAddr;
371  VOID                           *MapData;
372  VOID                           *MapMeta;
373  VOID                           *MapPrpList;
374  UINTN                          MapLength;
375  UINT64                         *Prp;
376  VOID                           *PrpListHost;
377  UINTN                          PrpListNo;
378  UINT32                         Attributes;
379  UINT32                         IoAlign;
380  UINT32                         MaxTransLen;
381  UINT32                         Data;
382  NVME_PASS_THRU_ASYNC_REQ       *AsyncRequest;
383  EFI_TPL                        OldTpl;
384
385  //
386  // check the data fields in Packet parameter.
387  //
388  if ((This == NULL) || (Packet == NULL)) {
389    return EFI_INVALID_PARAMETER;
390  }
391
392  if ((Packet->NvmeCmd == NULL) || (Packet->NvmeCompletion == NULL)) {
393    return EFI_INVALID_PARAMETER;
394  }
395
396  if (Packet->QueueType != NVME_ADMIN_QUEUE && Packet->QueueType != NVME_IO_QUEUE) {
397    return EFI_INVALID_PARAMETER;
398  }
399
400  //
401  // 'Attributes' with neither EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_LOGICAL nor
402  // EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_PHYSICAL set is an illegal
403  // configuration.
404  //
405  Attributes  = This->Mode->Attributes;
406  if ((Attributes & (EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_PHYSICAL |
407    EFI_NVM_EXPRESS_PASS_THRU_ATTRIBUTES_LOGICAL)) == 0) {
408    return EFI_INVALID_PARAMETER;
409  }
410
411  //
412  // Buffer alignment check for TransferBuffer & MetadataBuffer.
413  //
414  IoAlign     = This->Mode->IoAlign;
415  if (IoAlign > 0 && (((UINTN) Packet->TransferBuffer & (IoAlign - 1)) != 0)) {
416    return EFI_INVALID_PARAMETER;
417  }
418
419  if (IoAlign > 0 && (((UINTN) Packet->MetadataBuffer & (IoAlign - 1)) != 0)) {
420    return EFI_INVALID_PARAMETER;
421  }
422
423  Private     = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);
424
425  //
426  // Check NamespaceId is valid or not.
427  //
428  if ((NamespaceId > Private->ControllerData->Nn) &&
429      (NamespaceId != (UINT32) -1)) {
430    return EFI_INVALID_PARAMETER;
431  }
432
433  //
434  // Check whether TransferLength exceeds the maximum data transfer size.
435  //
436  if (Private->ControllerData->Mdts != 0) {
437    MaxTransLen = (1 << (Private->ControllerData->Mdts)) *
438                  (1 << (Private->Cap.Mpsmin + 12));
439    if (Packet->TransferLength > MaxTransLen) {
440      Packet->TransferLength = MaxTransLen;
441      return EFI_BAD_BUFFER_SIZE;
442    }
443  }
444
445  PciIo       = Private->PciIo;
446  MapData     = NULL;
447  MapMeta     = NULL;
448  MapPrpList  = NULL;
449  PrpListHost = NULL;
450  PrpListNo   = 0;
451  Prp         = NULL;
452  TimerEvent  = NULL;
453  Status      = EFI_SUCCESS;
454
455  if (Packet->QueueType == NVME_ADMIN_QUEUE) {
456    QueueId = 0;
457  } else {
458    if (Event == NULL) {
459      QueueId = 1;
460    } else {
461      QueueId = 2;
462
463      //
464      // Submission queue full check.
465      //
466      if ((Private->SqTdbl[QueueId].Sqt + 1) % (NVME_ASYNC_CSQ_SIZE + 1) ==
467          Private->AsyncSqHead) {
468        return EFI_NOT_READY;
469      }
470    }
471  }
472  Sq  = Private->SqBuffer[QueueId] + Private->SqTdbl[QueueId].Sqt;
473  Cq  = Private->CqBuffer[QueueId] + Private->CqHdbl[QueueId].Cqh;
474
475  if (Packet->NvmeCmd->Nsid != NamespaceId) {
476    return EFI_INVALID_PARAMETER;
477  }
478
479  ZeroMem (Sq, sizeof (NVME_SQ));
480  Sq->Opc  = (UINT8)Packet->NvmeCmd->Cdw0.Opcode;
481  Sq->Fuse = (UINT8)Packet->NvmeCmd->Cdw0.FusedOperation;
482  Sq->Cid  = Private->Cid[QueueId]++;
483  Sq->Nsid = Packet->NvmeCmd->Nsid;
484
485  //
486  // Currently we only support PRP for data transfer, SGL is NOT supported.
487  //
488  ASSERT (Sq->Psdt == 0);
489  if (Sq->Psdt != 0) {
490    DEBUG ((EFI_D_ERROR, "NvmExpressPassThru: doesn't support SGL mechanism\n"));
491    return EFI_UNSUPPORTED;
492  }
493
494  Sq->Prp[0] = (UINT64)(UINTN)Packet->TransferBuffer;
495  //
496  // If the NVMe cmd has data in or out, then mapping the user buffer to the PCI controller specific addresses.
497  // Note here we don't handle data buffer for CreateIOSubmitionQueue and CreateIOCompletionQueue cmds because
498  // these two cmds are special which requires their data buffer must support simultaneous access by both the
499  // processor and a PCI Bus Master. It's caller's responsbility to ensure this.
500  //
501  if (((Sq->Opc & (BIT0 | BIT1)) != 0) && (Sq->Opc != NVME_ADMIN_CRIOCQ_CMD) && (Sq->Opc != NVME_ADMIN_CRIOSQ_CMD)) {
502    if ((Packet->TransferLength == 0) || (Packet->TransferBuffer == NULL)) {
503      return EFI_INVALID_PARAMETER;
504    }
505
506    if ((Sq->Opc & BIT0) != 0) {
507      Flag = EfiPciIoOperationBusMasterRead;
508    } else {
509      Flag = EfiPciIoOperationBusMasterWrite;
510    }
511
512    MapLength = Packet->TransferLength;
513    Status = PciIo->Map (
514                      PciIo,
515                      Flag,
516                      Packet->TransferBuffer,
517                      &MapLength,
518                      &PhyAddr,
519                      &MapData
520                      );
521    if (EFI_ERROR (Status) || (Packet->TransferLength != MapLength)) {
522      return EFI_OUT_OF_RESOURCES;
523    }
524
525    Sq->Prp[0] = PhyAddr;
526    Sq->Prp[1] = 0;
527
528    if((Packet->MetadataLength != 0) && (Packet->MetadataBuffer != NULL)) {
529      MapLength = Packet->MetadataLength;
530      Status = PciIo->Map (
531                        PciIo,
532                        Flag,
533                        Packet->MetadataBuffer,
534                        &MapLength,
535                        &PhyAddr,
536                        &MapMeta
537                        );
538      if (EFI_ERROR (Status) || (Packet->MetadataLength != MapLength)) {
539        PciIo->Unmap (
540                 PciIo,
541                 MapData
542                 );
543
544        return EFI_OUT_OF_RESOURCES;
545      }
546      Sq->Mptr = PhyAddr;
547    }
548  }
549  //
550  // If the buffer size spans more than two memory pages (page size as defined in CC.Mps),
551  // then build a PRP list in the second PRP submission queue entry.
552  //
553  Offset = ((UINT16)Sq->Prp[0]) & (EFI_PAGE_SIZE - 1);
554  Bytes  = Packet->TransferLength;
555
556  if ((Offset + Bytes) > (EFI_PAGE_SIZE * 2)) {
557    //
558    // Create PrpList for remaining data buffer.
559    //
560    PhyAddr = (Sq->Prp[0] + EFI_PAGE_SIZE) & ~(EFI_PAGE_SIZE - 1);
561    Prp = NvmeCreatePrpList (PciIo, PhyAddr, EFI_SIZE_TO_PAGES(Offset + Bytes) - 1, &PrpListHost, &PrpListNo, &MapPrpList);
562    if (Prp == NULL) {
563      goto EXIT;
564    }
565
566    Sq->Prp[1] = (UINT64)(UINTN)Prp;
567  } else if ((Offset + Bytes) > EFI_PAGE_SIZE) {
568    Sq->Prp[1] = (Sq->Prp[0] + EFI_PAGE_SIZE) & ~(EFI_PAGE_SIZE - 1);
569  }
570
571  if(Packet->NvmeCmd->Flags & CDW2_VALID) {
572    Sq->Rsvd2 = (UINT64)Packet->NvmeCmd->Cdw2;
573  }
574  if(Packet->NvmeCmd->Flags & CDW3_VALID) {
575    Sq->Rsvd2 |= LShiftU64 ((UINT64)Packet->NvmeCmd->Cdw3, 32);
576  }
577  if(Packet->NvmeCmd->Flags & CDW10_VALID) {
578    Sq->Payload.Raw.Cdw10 = Packet->NvmeCmd->Cdw10;
579  }
580  if(Packet->NvmeCmd->Flags & CDW11_VALID) {
581    Sq->Payload.Raw.Cdw11 = Packet->NvmeCmd->Cdw11;
582  }
583  if(Packet->NvmeCmd->Flags & CDW12_VALID) {
584    Sq->Payload.Raw.Cdw12 = Packet->NvmeCmd->Cdw12;
585  }
586  if(Packet->NvmeCmd->Flags & CDW13_VALID) {
587    Sq->Payload.Raw.Cdw13 = Packet->NvmeCmd->Cdw13;
588  }
589  if(Packet->NvmeCmd->Flags & CDW14_VALID) {
590    Sq->Payload.Raw.Cdw14 = Packet->NvmeCmd->Cdw14;
591  }
592  if(Packet->NvmeCmd->Flags & CDW15_VALID) {
593    Sq->Payload.Raw.Cdw15 = Packet->NvmeCmd->Cdw15;
594  }
595
596  //
597  // Ring the submission queue doorbell.
598  //
599  if ((Event != NULL) && (QueueId != 0)) {
600    Private->SqTdbl[QueueId].Sqt =
601      (Private->SqTdbl[QueueId].Sqt + 1) % (NVME_ASYNC_CSQ_SIZE + 1);
602  } else {
603    Private->SqTdbl[QueueId].Sqt ^= 1;
604  }
605  Data = ReadUnaligned32 ((UINT32*)&Private->SqTdbl[QueueId]);
606  PciIo->Mem.Write (
607               PciIo,
608               EfiPciIoWidthUint32,
609               NVME_BAR,
610               NVME_SQTDBL_OFFSET(QueueId, Private->Cap.Dstrd),
611               1,
612               &Data
613               );
614
615  //
616  // For non-blocking requests, return directly if the command is placed
617  // in the submission queue.
618  //
619  if ((Event != NULL) && (QueueId != 0)) {
620    AsyncRequest = AllocateZeroPool (sizeof (NVME_PASS_THRU_ASYNC_REQ));
621    if (AsyncRequest == NULL) {
622      Status = EFI_DEVICE_ERROR;
623      goto EXIT;
624    }
625
626    AsyncRequest->Signature     = NVME_PASS_THRU_ASYNC_REQ_SIG;
627    AsyncRequest->Packet        = Packet;
628    AsyncRequest->CommandId     = Sq->Cid;
629    AsyncRequest->CallerEvent   = Event;
630
631    OldTpl = gBS->RaiseTPL (TPL_NOTIFY);
632    InsertTailList (&Private->AsyncPassThruQueue, &AsyncRequest->Link);
633    gBS->RestoreTPL (OldTpl);
634
635    return EFI_SUCCESS;
636  }
637
638  Status = gBS->CreateEvent (
639                  EVT_TIMER,
640                  TPL_CALLBACK,
641                  NULL,
642                  NULL,
643                  &TimerEvent
644                  );
645  if (EFI_ERROR (Status)) {
646    goto EXIT;
647  }
648
649  Status = gBS->SetTimer(TimerEvent, TimerRelative, Packet->CommandTimeout);
650
651  if (EFI_ERROR(Status)) {
652    goto EXIT;
653  }
654
655  //
656  // Wait for completion queue to get filled in.
657  //
658  Status = EFI_TIMEOUT;
659  while (EFI_ERROR (gBS->CheckEvent (TimerEvent))) {
660    if (Cq->Pt != Private->Pt[QueueId]) {
661      Status = EFI_SUCCESS;
662      break;
663    }
664  }
665
666  //
667  // Check the NVMe cmd execution result
668  //
669  if (Status != EFI_TIMEOUT) {
670    if ((Cq->Sct == 0) && (Cq->Sc == 0)) {
671      Status = EFI_SUCCESS;
672    } else {
673      Status = EFI_DEVICE_ERROR;
674      //
675      // Copy the Respose Queue entry for this command to the callers response buffer
676      //
677      CopyMem(Packet->NvmeCompletion, Cq, sizeof(EFI_NVM_EXPRESS_COMPLETION));
678
679      //
680      // Dump every completion entry status for debugging.
681      //
682      DEBUG_CODE_BEGIN();
683        NvmeDumpStatus(Cq);
684      DEBUG_CODE_END();
685    }
686  }
687
688  if ((Private->CqHdbl[QueueId].Cqh ^= 1) == 0) {
689    Private->Pt[QueueId] ^= 1;
690  }
691
692  Data = ReadUnaligned32 ((UINT32*)&Private->CqHdbl[QueueId]);
693  PciIo->Mem.Write (
694               PciIo,
695               EfiPciIoWidthUint32,
696               NVME_BAR,
697               NVME_CQHDBL_OFFSET(QueueId, Private->Cap.Dstrd),
698               1,
699               &Data
700               );
701
702  //
703  // For now, the code does not support the non-blocking feature for admin queue.
704  // If Event is not NULL for admin queue, signal the caller's event here.
705  //
706  if (Event != NULL) {
707    ASSERT (QueueId == 0);
708    gBS->SignalEvent (Event);
709  }
710
711EXIT:
712  if (MapData != NULL) {
713    PciIo->Unmap (
714             PciIo,
715             MapData
716             );
717  }
718
719  if (MapMeta != NULL) {
720    PciIo->Unmap (
721             PciIo,
722             MapMeta
723             );
724  }
725
726  if (MapPrpList != NULL) {
727    PciIo->Unmap (
728             PciIo,
729             MapPrpList
730             );
731  }
732
733  if (Prp != NULL) {
734    PciIo->FreeBuffer (PciIo, PrpListNo, PrpListHost);
735  }
736
737  if (TimerEvent != NULL) {
738    gBS->CloseEvent (TimerEvent);
739  }
740  return Status;
741}
742
743/**
744  Used to retrieve the next namespace ID for this NVM Express controller.
745
746  The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.GetNextNamespace() function retrieves the next valid
747  namespace ID on this NVM Express controller.
748
749  If on input the value pointed to by NamespaceId is 0xFFFFFFFF, then the first valid namespace
750  ID defined on the NVM Express controller is returned in the location pointed to by NamespaceId
751  and a status of EFI_SUCCESS is returned.
752
753  If on input the value pointed to by NamespaceId is an invalid namespace ID other than 0xFFFFFFFF,
754  then EFI_INVALID_PARAMETER is returned.
755
756  If on input the value pointed to by NamespaceId is a valid namespace ID, then the next valid
757  namespace ID on the NVM Express controller is returned in the location pointed to by NamespaceId,
758  and EFI_SUCCESS is returned.
759
760  If the value pointed to by NamespaceId is the namespace ID of the last namespace on the NVM
761  Express controller, then EFI_NOT_FOUND is returned.
762
763  @param[in]     This           A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.
764  @param[in,out] NamespaceId    On input, a pointer to a legal NamespaceId for an NVM Express
765                                namespace present on the NVM Express controller. On output, a
766                                pointer to the next NamespaceId of an NVM Express namespace on
767                                an NVM Express controller. An input value of 0xFFFFFFFF retrieves
768                                the first NamespaceId for an NVM Express namespace present on an
769                                NVM Express controller.
770
771  @retval EFI_SUCCESS           The Namespace ID of the next Namespace was returned.
772  @retval EFI_NOT_FOUND         There are no more namespaces defined on this controller.
773  @retval EFI_INVALID_PARAMETER NamespaceId is an invalid value other than 0xFFFFFFFF.
774
775**/
776EFI_STATUS
777EFIAPI
778NvmExpressGetNextNamespace (
779  IN     EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL          *This,
780  IN OUT UINT32                                      *NamespaceId
781  )
782{
783  NVME_CONTROLLER_PRIVATE_DATA     *Private;
784  NVME_ADMIN_NAMESPACE_DATA        *NamespaceData;
785  UINT32                           NextNamespaceId;
786  EFI_STATUS                       Status;
787
788  if ((This == NULL) || (NamespaceId == NULL)) {
789    return EFI_INVALID_PARAMETER;
790  }
791
792  NamespaceData = NULL;
793  Status        = EFI_NOT_FOUND;
794
795  Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);
796  //
797  // If the NamespaceId input value is 0xFFFFFFFF, then get the first valid namespace ID
798  //
799  if (*NamespaceId == 0xFFFFFFFF) {
800    //
801    // Start with the first namespace ID
802    //
803    NextNamespaceId = 1;
804    //
805    // Allocate buffer for Identify Namespace data.
806    //
807    NamespaceData = (NVME_ADMIN_NAMESPACE_DATA *)AllocateZeroPool (sizeof (NVME_ADMIN_NAMESPACE_DATA));
808
809    if (NamespaceData == NULL) {
810      return EFI_NOT_FOUND;
811    }
812
813    Status = NvmeIdentifyNamespace (Private, NextNamespaceId, NamespaceData);
814    if (EFI_ERROR(Status)) {
815      goto Done;
816    }
817
818    *NamespaceId = NextNamespaceId;
819  } else {
820    if (*NamespaceId > Private->ControllerData->Nn) {
821      return EFI_INVALID_PARAMETER;
822    }
823
824    NextNamespaceId = *NamespaceId + 1;
825    if (NextNamespaceId > Private->ControllerData->Nn) {
826      return EFI_NOT_FOUND;
827    }
828
829    //
830    // Allocate buffer for Identify Namespace data.
831    //
832    NamespaceData = (NVME_ADMIN_NAMESPACE_DATA *)AllocateZeroPool (sizeof (NVME_ADMIN_NAMESPACE_DATA));
833    if (NamespaceData == NULL) {
834      return EFI_NOT_FOUND;
835    }
836
837    Status = NvmeIdentifyNamespace (Private, NextNamespaceId, NamespaceData);
838    if (EFI_ERROR(Status)) {
839      goto Done;
840    }
841
842    *NamespaceId = NextNamespaceId;
843  }
844
845Done:
846  if (NamespaceData != NULL) {
847    FreePool(NamespaceData);
848  }
849
850  return Status;
851}
852
853/**
854  Used to translate a device path node to a namespace ID.
855
856  The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.GetNamespace() function determines the namespace ID associated with the
857  namespace described by DevicePath.
858
859  If DevicePath is a device path node type that the NVM Express Pass Thru driver supports, then the NVM Express
860  Pass Thru driver will attempt to translate the contents DevicePath into a namespace ID.
861
862  If this translation is successful, then that namespace ID is returned in NamespaceId, and EFI_SUCCESS is returned
863
864  @param[in]  This                A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.
865  @param[in]  DevicePath          A pointer to the device path node that describes an NVM Express namespace on
866                                  the NVM Express controller.
867  @param[out] NamespaceId         The NVM Express namespace ID contained in the device path node.
868
869  @retval EFI_SUCCESS             DevicePath was successfully translated to NamespaceId.
870  @retval EFI_INVALID_PARAMETER   If DevicePath or NamespaceId are NULL, then EFI_INVALID_PARAMETER is returned.
871  @retval EFI_UNSUPPORTED         If DevicePath is not a device path node type that the NVM Express Pass Thru driver
872                                  supports, then EFI_UNSUPPORTED is returned.
873  @retval EFI_NOT_FOUND           If DevicePath is a device path node type that the NVM Express Pass Thru driver
874                                  supports, but there is not a valid translation from DevicePath to a namespace ID,
875                                  then EFI_NOT_FOUND is returned.
876**/
877EFI_STATUS
878EFIAPI
879NvmExpressGetNamespace (
880  IN     EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL          *This,
881  IN     EFI_DEVICE_PATH_PROTOCOL                    *DevicePath,
882     OUT UINT32                                      *NamespaceId
883  )
884{
885  NVME_NAMESPACE_DEVICE_PATH       *Node;
886  NVME_CONTROLLER_PRIVATE_DATA     *Private;
887
888  if ((This == NULL) || (DevicePath == NULL) || (NamespaceId == NULL)) {
889    return EFI_INVALID_PARAMETER;
890  }
891
892  if (DevicePath->Type != MESSAGING_DEVICE_PATH) {
893    return EFI_UNSUPPORTED;
894  }
895
896  Node    = (NVME_NAMESPACE_DEVICE_PATH *)DevicePath;
897  Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);
898
899  if (DevicePath->SubType == MSG_NVME_NAMESPACE_DP) {
900    if (DevicePathNodeLength(DevicePath) != sizeof(NVME_NAMESPACE_DEVICE_PATH)) {
901      return EFI_NOT_FOUND;
902    }
903
904    //
905    // Check NamespaceId in the device path node is valid or not.
906    //
907    if ((Node->NamespaceId == 0) ||
908      (Node->NamespaceId > Private->ControllerData->Nn)) {
909      return EFI_NOT_FOUND;
910    }
911
912    *NamespaceId = Node->NamespaceId;
913
914    return EFI_SUCCESS;
915  } else {
916    return EFI_UNSUPPORTED;
917  }
918}
919
920/**
921  Used to allocate and build a device path node for an NVM Express namespace on an NVM Express controller.
922
923  The EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL.BuildDevicePath() function allocates and builds a single device
924  path node for the NVM Express namespace specified by NamespaceId.
925
926  If the NamespaceId is not valid, then EFI_NOT_FOUND is returned.
927
928  If DevicePath is NULL, then EFI_INVALID_PARAMETER is returned.
929
930  If there are not enough resources to allocate the device path node, then EFI_OUT_OF_RESOURCES is returned.
931
932  Otherwise, DevicePath is allocated with the boot service AllocatePool(), the contents of DevicePath are
933  initialized to describe the NVM Express namespace specified by NamespaceId, and EFI_SUCCESS is returned.
934
935  @param[in]     This                A pointer to the EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL instance.
936  @param[in]     NamespaceId         The NVM Express namespace ID  for which a device path node is to be
937                                     allocated and built. Caller must set the NamespaceId to zero if the
938                                     device path node will contain a valid UUID.
939  @param[in,out] DevicePath          A pointer to a single device path node that describes the NVM Express
940                                     namespace specified by NamespaceId. This function is responsible for
941                                     allocating the buffer DevicePath with the boot service AllocatePool().
942                                     It is the caller's responsibility to free DevicePath when the caller
943                                     is finished with DevicePath.
944  @retval EFI_SUCCESS                The device path node that describes the NVM Express namespace specified
945                                     by NamespaceId was allocated and returned in DevicePath.
946  @retval EFI_NOT_FOUND              The NamespaceId is not valid.
947  @retval EFI_INVALID_PARAMETER      DevicePath is NULL.
948  @retval EFI_OUT_OF_RESOURCES       There are not enough resources to allocate the DevicePath node.
949
950**/
951EFI_STATUS
952EFIAPI
953NvmExpressBuildDevicePath (
954  IN     EFI_NVM_EXPRESS_PASS_THRU_PROTOCOL          *This,
955  IN     UINT32                                      NamespaceId,
956  IN OUT EFI_DEVICE_PATH_PROTOCOL                    **DevicePath
957  )
958{
959  NVME_NAMESPACE_DEVICE_PATH     *Node;
960  NVME_CONTROLLER_PRIVATE_DATA   *Private;
961  EFI_STATUS                     Status;
962  NVME_ADMIN_NAMESPACE_DATA      *NamespaceData;
963
964  //
965  // Validate parameters
966  //
967  if ((This == NULL) || (DevicePath == NULL)) {
968    return EFI_INVALID_PARAMETER;
969  }
970
971  Status  = EFI_SUCCESS;
972  Private = NVME_CONTROLLER_PRIVATE_DATA_FROM_PASS_THRU (This);
973
974  //
975  // Check NamespaceId is valid or not.
976  //
977  if ((NamespaceId == 0) ||
978    (NamespaceId > Private->ControllerData->Nn)) {
979    return EFI_NOT_FOUND;
980  }
981
982  Node = (NVME_NAMESPACE_DEVICE_PATH *)AllocateZeroPool (sizeof (NVME_NAMESPACE_DEVICE_PATH));
983  if (Node == NULL) {
984    return EFI_OUT_OF_RESOURCES;
985  }
986
987  Node->Header.Type    = MESSAGING_DEVICE_PATH;
988  Node->Header.SubType = MSG_NVME_NAMESPACE_DP;
989  SetDevicePathNodeLength (&Node->Header, sizeof (NVME_NAMESPACE_DEVICE_PATH));
990  Node->NamespaceId    = NamespaceId;
991
992  //
993  // Allocate a buffer for Identify Namespace data.
994  //
995  NamespaceData = NULL;
996  NamespaceData = AllocateZeroPool(sizeof (NVME_ADMIN_NAMESPACE_DATA));
997  if(NamespaceData == NULL) {
998    Status = EFI_OUT_OF_RESOURCES;
999    goto Exit;
1000  }
1001
1002  //
1003  // Get UUID from specified Identify Namespace data.
1004  //
1005  Status = NvmeIdentifyNamespace (
1006             Private,
1007             NamespaceId,
1008             (VOID *)NamespaceData
1009             );
1010
1011  if (EFI_ERROR(Status)) {
1012    goto Exit;
1013  }
1014
1015  Node->NamespaceUuid = NamespaceData->Eui64;
1016
1017  *DevicePath = (EFI_DEVICE_PATH_PROTOCOL *)Node;
1018
1019Exit:
1020  if(NamespaceData != NULL) {
1021    FreePool (NamespaceData);
1022  }
1023
1024  if (EFI_ERROR (Status)) {
1025    FreePool (Node);
1026  }
1027
1028  return Status;
1029}
1030
1031