PCI: Restrict VPD read permission to root
[deliverable/linux.git] / drivers / pci / access.c
CommitLineData
94e61088 1#include <linux/delay.h>
1da177e4
LT
2#include <linux/pci.h>
3#include <linux/module.h>
f6a57033 4#include <linux/sched.h>
1da177e4 5#include <linux/ioport.h>
7ea7e98f 6#include <linux/wait.h>
1da177e4 7
48b19148
AB
8#include "pci.h"
9
1da177e4
LT
10/*
11 * This interrupt-safe spinlock protects all accesses to PCI
12 * configuration space.
13 */
14
15static DEFINE_SPINLOCK(pci_lock);
16
17/*
18 * Wrappers for all PCI configuration access functions. They just check
19 * alignment, do locking and call the low-level functions pointed to
20 * by pci_dev->ops.
21 */
22
23#define PCI_byte_BAD 0
24#define PCI_word_BAD (pos & 1)
25#define PCI_dword_BAD (pos & 3)
26
27#define PCI_OP_READ(size,type,len) \
28int pci_bus_read_config_##size \
29 (struct pci_bus *bus, unsigned int devfn, int pos, type *value) \
30{ \
31 int res; \
32 unsigned long flags; \
33 u32 data = 0; \
34 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
35 spin_lock_irqsave(&pci_lock, flags); \
36 res = bus->ops->read(bus, devfn, pos, len, &data); \
37 *value = (type)data; \
38 spin_unlock_irqrestore(&pci_lock, flags); \
39 return res; \
40}
41
42#define PCI_OP_WRITE(size,type,len) \
43int pci_bus_write_config_##size \
44 (struct pci_bus *bus, unsigned int devfn, int pos, type value) \
45{ \
46 int res; \
47 unsigned long flags; \
48 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
49 spin_lock_irqsave(&pci_lock, flags); \
50 res = bus->ops->write(bus, devfn, pos, len, value); \
51 spin_unlock_irqrestore(&pci_lock, flags); \
52 return res; \
53}
54
55PCI_OP_READ(byte, u8, 1)
56PCI_OP_READ(word, u16, 2)
57PCI_OP_READ(dword, u32, 4)
58PCI_OP_WRITE(byte, u8, 1)
59PCI_OP_WRITE(word, u16, 2)
60PCI_OP_WRITE(dword, u32, 4)
61
62EXPORT_SYMBOL(pci_bus_read_config_byte);
63EXPORT_SYMBOL(pci_bus_read_config_word);
64EXPORT_SYMBOL(pci_bus_read_config_dword);
65EXPORT_SYMBOL(pci_bus_write_config_byte);
66EXPORT_SYMBOL(pci_bus_write_config_word);
67EXPORT_SYMBOL(pci_bus_write_config_dword);
e04b0ea2 68
7ea7e98f
MW
69/*
70 * The following routines are to prevent the user from accessing PCI config
71 * space when it's unsafe to do so. Some devices require this during BIST and
72 * we're required to prevent it during D-state transitions.
73 *
74 * We have a bit per device to indicate it's blocked and a global wait queue
75 * for callers to sleep on until devices are unblocked.
76 */
77static DECLARE_WAIT_QUEUE_HEAD(pci_ucfg_wait);
e04b0ea2 78
7ea7e98f
MW
79static noinline void pci_wait_ucfg(struct pci_dev *dev)
80{
81 DECLARE_WAITQUEUE(wait, current);
82
83 __add_wait_queue(&pci_ucfg_wait, &wait);
84 do {
85 set_current_state(TASK_UNINTERRUPTIBLE);
86 spin_unlock_irq(&pci_lock);
87 schedule();
88 spin_lock_irq(&pci_lock);
89 } while (dev->block_ucfg_access);
90 __remove_wait_queue(&pci_ucfg_wait, &wait);
e04b0ea2
BK
91}
92
93#define PCI_USER_READ_CONFIG(size,type) \
94int pci_user_read_config_##size \
95 (struct pci_dev *dev, int pos, type *val) \
96{ \
e04b0ea2
BK
97 int ret = 0; \
98 u32 data = -1; \
99 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
7ea7e98f
MW
100 spin_lock_irq(&pci_lock); \
101 if (unlikely(dev->block_ucfg_access)) pci_wait_ucfg(dev); \
102 ret = dev->bus->ops->read(dev->bus, dev->devfn, \
e04b0ea2 103 pos, sizeof(type), &data); \
7ea7e98f 104 spin_unlock_irq(&pci_lock); \
e04b0ea2
BK
105 *val = (type)data; \
106 return ret; \
107}
108
109#define PCI_USER_WRITE_CONFIG(size,type) \
110int pci_user_write_config_##size \
111 (struct pci_dev *dev, int pos, type val) \
112{ \
e04b0ea2
BK
113 int ret = -EIO; \
114 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
7ea7e98f
MW
115 spin_lock_irq(&pci_lock); \
116 if (unlikely(dev->block_ucfg_access)) pci_wait_ucfg(dev); \
117 ret = dev->bus->ops->write(dev->bus, dev->devfn, \
e04b0ea2 118 pos, sizeof(type), val); \
7ea7e98f 119 spin_unlock_irq(&pci_lock); \
e04b0ea2
BK
120 return ret; \
121}
122
123PCI_USER_READ_CONFIG(byte, u8)
124PCI_USER_READ_CONFIG(word, u16)
125PCI_USER_READ_CONFIG(dword, u32)
126PCI_USER_WRITE_CONFIG(byte, u8)
127PCI_USER_WRITE_CONFIG(word, u16)
128PCI_USER_WRITE_CONFIG(dword, u32)
129
94e61088
BH
130/* VPD access through PCI 2.2+ VPD capability */
131
132#define PCI_VPD_PCI22_SIZE (PCI_VPD_ADDR_MASK + 1)
133
134struct pci_vpd_pci22 {
135 struct pci_vpd base;
136 spinlock_t lock; /* controls access to hardware and the flags */
137 u8 cap;
138 bool busy;
139 bool flag; /* value of F bit to wait for */
140};
141
142/* Wait for last operation to complete */
143static int pci_vpd_pci22_wait(struct pci_dev *dev)
144{
145 struct pci_vpd_pci22 *vpd =
146 container_of(dev->vpd, struct pci_vpd_pci22, base);
147 u16 flag, status;
148 int wait;
149 int ret;
150
151 if (!vpd->busy)
152 return 0;
153
154 flag = vpd->flag ? PCI_VPD_ADDR_F : 0;
155 wait = vpd->flag ? 10 : 1000; /* read: 100 us; write: 10 ms */
156 for (;;) {
157 ret = pci_user_read_config_word(dev,
158 vpd->cap + PCI_VPD_ADDR,
159 &status);
160 if (ret < 0)
161 return ret;
162 if ((status & PCI_VPD_ADDR_F) == flag) {
163 vpd->busy = false;
164 return 0;
165 }
166 if (wait-- == 0)
167 return -ETIMEDOUT;
168 udelay(10);
169 }
170}
171
172static int pci_vpd_pci22_read(struct pci_dev *dev, int pos, int size,
173 char *buf)
174{
175 struct pci_vpd_pci22 *vpd =
176 container_of(dev->vpd, struct pci_vpd_pci22, base);
177 u32 val;
178 int ret;
179 int begin, end, i;
180
181 if (pos < 0 || pos > PCI_VPD_PCI22_SIZE ||
182 size > PCI_VPD_PCI22_SIZE - pos)
183 return -EINVAL;
184 if (size == 0)
185 return 0;
186
187 spin_lock_irq(&vpd->lock);
188 ret = pci_vpd_pci22_wait(dev);
189 if (ret < 0)
190 goto out;
191 ret = pci_user_write_config_word(dev, vpd->cap + PCI_VPD_ADDR,
192 pos & ~3);
193 if (ret < 0)
194 goto out;
195 vpd->busy = true;
196 vpd->flag = 1;
197 ret = pci_vpd_pci22_wait(dev);
198 if (ret < 0)
199 goto out;
200 ret = pci_user_read_config_dword(dev, vpd->cap + PCI_VPD_DATA,
201 &val);
202out:
203 spin_unlock_irq(&vpd->lock);
204 if (ret < 0)
205 return ret;
206
207 /* Convert to bytes */
208 begin = pos & 3;
209 end = min(4, begin + size);
210 for (i = 0; i < end; ++i) {
211 if (i >= begin)
212 *buf++ = val;
213 val >>= 8;
214 }
215 return end - begin;
216}
217
218static int pci_vpd_pci22_write(struct pci_dev *dev, int pos, int size,
219 const char *buf)
220{
221 struct pci_vpd_pci22 *vpd =
222 container_of(dev->vpd, struct pci_vpd_pci22, base);
223 u32 val;
224 int ret;
225
226 if (pos < 0 || pos > PCI_VPD_PCI22_SIZE || pos & 3 ||
227 size > PCI_VPD_PCI22_SIZE - pos || size < 4)
228 return -EINVAL;
229
230 val = (u8) *buf++;
231 val |= ((u8) *buf++) << 8;
232 val |= ((u8) *buf++) << 16;
233 val |= ((u32)(u8) *buf++) << 24;
234
235 spin_lock_irq(&vpd->lock);
236 ret = pci_vpd_pci22_wait(dev);
237 if (ret < 0)
238 goto out;
239 ret = pci_user_write_config_dword(dev, vpd->cap + PCI_VPD_DATA,
240 val);
241 if (ret < 0)
242 goto out;
243 ret = pci_user_write_config_word(dev, vpd->cap + PCI_VPD_ADDR,
244 pos | PCI_VPD_ADDR_F);
245 if (ret < 0)
246 goto out;
247 vpd->busy = true;
248 vpd->flag = 0;
249 ret = pci_vpd_pci22_wait(dev);
250out:
251 spin_unlock_irq(&vpd->lock);
252 if (ret < 0)
253 return ret;
254
255 return 4;
256}
257
258static int pci_vpd_pci22_get_size(struct pci_dev *dev)
259{
260 return PCI_VPD_PCI22_SIZE;
261}
262
263static void pci_vpd_pci22_release(struct pci_dev *dev)
264{
265 kfree(container_of(dev->vpd, struct pci_vpd_pci22, base));
266}
267
268static struct pci_vpd_ops pci_vpd_pci22_ops = {
269 .read = pci_vpd_pci22_read,
270 .write = pci_vpd_pci22_write,
271 .get_size = pci_vpd_pci22_get_size,
272 .release = pci_vpd_pci22_release,
273};
274
275int pci_vpd_pci22_init(struct pci_dev *dev)
276{
277 struct pci_vpd_pci22 *vpd;
278 u8 cap;
279
280 cap = pci_find_capability(dev, PCI_CAP_ID_VPD);
281 if (!cap)
282 return -ENODEV;
283 vpd = kzalloc(sizeof(*vpd), GFP_ATOMIC);
284 if (!vpd)
285 return -ENOMEM;
286
287 vpd->base.ops = &pci_vpd_pci22_ops;
288 spin_lock_init(&vpd->lock);
289 vpd->cap = cap;
290 vpd->busy = false;
291 dev->vpd = &vpd->base;
292 return 0;
293}
294
e04b0ea2
BK
295/**
296 * pci_block_user_cfg_access - Block userspace PCI config reads/writes
297 * @dev: pci device struct
298 *
7ea7e98f
MW
299 * When user access is blocked, any reads or writes to config space will
300 * sleep until access is unblocked again. We don't allow nesting of
301 * block/unblock calls.
302 */
e04b0ea2
BK
303void pci_block_user_cfg_access(struct pci_dev *dev)
304{
305 unsigned long flags;
7ea7e98f 306 int was_blocked;
e04b0ea2 307
e04b0ea2 308 spin_lock_irqsave(&pci_lock, flags);
7ea7e98f 309 was_blocked = dev->block_ucfg_access;
e04b0ea2
BK
310 dev->block_ucfg_access = 1;
311 spin_unlock_irqrestore(&pci_lock, flags);
7ea7e98f
MW
312
313 /* If we BUG() inside the pci_lock, we're guaranteed to hose
314 * the machine */
315 BUG_ON(was_blocked);
e04b0ea2
BK
316}
317EXPORT_SYMBOL_GPL(pci_block_user_cfg_access);
318
319/**
320 * pci_unblock_user_cfg_access - Unblock userspace PCI config reads/writes
321 * @dev: pci device struct
322 *
323 * This function allows userspace PCI config accesses to resume.
7ea7e98f 324 */
e04b0ea2
BK
325void pci_unblock_user_cfg_access(struct pci_dev *dev)
326{
327 unsigned long flags;
328
e04b0ea2 329 spin_lock_irqsave(&pci_lock, flags);
7ea7e98f
MW
330
331 /* This indicates a problem in the caller, but we don't need
332 * to kill them, unlike a double-block above. */
333 WARN_ON(!dev->block_ucfg_access);
334
e04b0ea2 335 dev->block_ucfg_access = 0;
7ea7e98f 336 wake_up_all(&pci_ucfg_wait);
e04b0ea2
BK
337 spin_unlock_irqrestore(&pci_lock, flags);
338}
339EXPORT_SYMBOL_GPL(pci_unblock_user_cfg_access);
This page took 0.557154 seconds and 5 git commands to generate.