1 #include <linux/delay.h>
3 #include <linux/module.h>
4 #include <linux/sched.h>
5 #include <linux/ioport.h>
6 #include <linux/wait.h>
11 * This interrupt-safe spinlock protects all accesses to PCI
12 * configuration space.
15 static DEFINE_SPINLOCK(pci_lock
);
18 * Wrappers for all PCI configuration access functions. They just check
19 * alignment, do locking and call the low-level functions pointed to
23 #define PCI_byte_BAD 0
24 #define PCI_word_BAD (pos & 1)
25 #define PCI_dword_BAD (pos & 3)
27 #define PCI_OP_READ(size,type,len) \
28 int pci_bus_read_config_##size \
29 (struct pci_bus *bus, unsigned int devfn, int pos, type *value) \
32 unsigned long flags; \
34 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
35 spin_lock_irqsave(&pci_lock, flags); \
36 res = bus->ops->read(bus, devfn, pos, len, &data); \
37 *value = (type)data; \
38 spin_unlock_irqrestore(&pci_lock, flags); \
42 #define PCI_OP_WRITE(size,type,len) \
43 int pci_bus_write_config_##size \
44 (struct pci_bus *bus, unsigned int devfn, int pos, type value) \
47 unsigned long flags; \
48 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
49 spin_lock_irqsave(&pci_lock, flags); \
50 res = bus->ops->write(bus, devfn, pos, len, value); \
51 spin_unlock_irqrestore(&pci_lock, flags); \
55 PCI_OP_READ(byte
, u8
, 1)
56 PCI_OP_READ(word
, u16
, 2)
57 PCI_OP_READ(dword
, u32
, 4)
58 PCI_OP_WRITE(byte
, u8
, 1)
59 PCI_OP_WRITE(word
, u16
, 2)
60 PCI_OP_WRITE(dword
, u32
, 4)
62 EXPORT_SYMBOL(pci_bus_read_config_byte
);
63 EXPORT_SYMBOL(pci_bus_read_config_word
);
64 EXPORT_SYMBOL(pci_bus_read_config_dword
);
65 EXPORT_SYMBOL(pci_bus_write_config_byte
);
66 EXPORT_SYMBOL(pci_bus_write_config_word
);
67 EXPORT_SYMBOL(pci_bus_write_config_dword
);
70 * The following routines are to prevent the user from accessing PCI config
71 * space when it's unsafe to do so. Some devices require this during BIST and
72 * we're required to prevent it during D-state transitions.
74 * We have a bit per device to indicate it's blocked and a global wait queue
75 * for callers to sleep on until devices are unblocked.
77 static DECLARE_WAIT_QUEUE_HEAD(pci_ucfg_wait
);
79 static noinline
void pci_wait_ucfg(struct pci_dev
*dev
)
81 DECLARE_WAITQUEUE(wait
, current
);
83 __add_wait_queue(&pci_ucfg_wait
, &wait
);
85 set_current_state(TASK_UNINTERRUPTIBLE
);
86 spin_unlock_irq(&pci_lock
);
88 spin_lock_irq(&pci_lock
);
89 } while (dev
->block_ucfg_access
);
90 __remove_wait_queue(&pci_ucfg_wait
, &wait
);
93 #define PCI_USER_READ_CONFIG(size,type) \
94 int pci_user_read_config_##size \
95 (struct pci_dev *dev, int pos, type *val) \
99 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
100 spin_lock_irq(&pci_lock); \
101 if (unlikely(dev->block_ucfg_access)) pci_wait_ucfg(dev); \
102 ret = dev->bus->ops->read(dev->bus, dev->devfn, \
103 pos, sizeof(type), &data); \
104 spin_unlock_irq(&pci_lock); \
109 #define PCI_USER_WRITE_CONFIG(size,type) \
110 int pci_user_write_config_##size \
111 (struct pci_dev *dev, int pos, type val) \
114 if (PCI_##size##_BAD) return PCIBIOS_BAD_REGISTER_NUMBER; \
115 spin_lock_irq(&pci_lock); \
116 if (unlikely(dev->block_ucfg_access)) pci_wait_ucfg(dev); \
117 ret = dev->bus->ops->write(dev->bus, dev->devfn, \
118 pos, sizeof(type), val); \
119 spin_unlock_irq(&pci_lock); \
123 PCI_USER_READ_CONFIG(byte
, u8
)
124 PCI_USER_READ_CONFIG(word
, u16
)
125 PCI_USER_READ_CONFIG(dword
, u32
)
126 PCI_USER_WRITE_CONFIG(byte
, u8
)
127 PCI_USER_WRITE_CONFIG(word
, u16
)
128 PCI_USER_WRITE_CONFIG(dword
, u32
)
130 /* VPD access through PCI 2.2+ VPD capability */
132 #define PCI_VPD_PCI22_SIZE (PCI_VPD_ADDR_MASK + 1)
134 struct pci_vpd_pci22
{
136 spinlock_t lock
; /* controls access to hardware and the flags */
139 bool flag
; /* value of F bit to wait for */
142 /* Wait for last operation to complete */
143 static int pci_vpd_pci22_wait(struct pci_dev
*dev
)
145 struct pci_vpd_pci22
*vpd
=
146 container_of(dev
->vpd
, struct pci_vpd_pci22
, base
);
154 flag
= vpd
->flag
? PCI_VPD_ADDR_F
: 0;
155 wait
= vpd
->flag
? 10 : 1000; /* read: 100 us; write: 10 ms */
157 ret
= pci_user_read_config_word(dev
,
158 vpd
->cap
+ PCI_VPD_ADDR
,
162 if ((status
& PCI_VPD_ADDR_F
) == flag
) {
172 static int pci_vpd_pci22_read(struct pci_dev
*dev
, int pos
, int size
,
175 struct pci_vpd_pci22
*vpd
=
176 container_of(dev
->vpd
, struct pci_vpd_pci22
, base
);
181 if (pos
< 0 || pos
> PCI_VPD_PCI22_SIZE
||
182 size
> PCI_VPD_PCI22_SIZE
- pos
)
187 spin_lock_irq(&vpd
->lock
);
188 ret
= pci_vpd_pci22_wait(dev
);
191 ret
= pci_user_write_config_word(dev
, vpd
->cap
+ PCI_VPD_ADDR
,
197 ret
= pci_vpd_pci22_wait(dev
);
200 ret
= pci_user_read_config_dword(dev
, vpd
->cap
+ PCI_VPD_DATA
,
203 spin_unlock_irq(&vpd
->lock
);
207 /* Convert to bytes */
209 end
= min(4, begin
+ size
);
210 for (i
= 0; i
< end
; ++i
) {
218 static int pci_vpd_pci22_write(struct pci_dev
*dev
, int pos
, int size
,
221 struct pci_vpd_pci22
*vpd
=
222 container_of(dev
->vpd
, struct pci_vpd_pci22
, base
);
226 if (pos
< 0 || pos
> PCI_VPD_PCI22_SIZE
|| pos
& 3 ||
227 size
> PCI_VPD_PCI22_SIZE
- pos
|| size
< 4)
231 val
|= ((u8
) *buf
++) << 8;
232 val
|= ((u8
) *buf
++) << 16;
233 val
|= ((u32
)(u8
) *buf
++) << 24;
235 spin_lock_irq(&vpd
->lock
);
236 ret
= pci_vpd_pci22_wait(dev
);
239 ret
= pci_user_write_config_dword(dev
, vpd
->cap
+ PCI_VPD_DATA
,
243 ret
= pci_user_write_config_word(dev
, vpd
->cap
+ PCI_VPD_ADDR
,
244 pos
| PCI_VPD_ADDR_F
);
249 ret
= pci_vpd_pci22_wait(dev
);
251 spin_unlock_irq(&vpd
->lock
);
258 static int pci_vpd_pci22_get_size(struct pci_dev
*dev
)
260 return PCI_VPD_PCI22_SIZE
;
263 static void pci_vpd_pci22_release(struct pci_dev
*dev
)
265 kfree(container_of(dev
->vpd
, struct pci_vpd_pci22
, base
));
268 static struct pci_vpd_ops pci_vpd_pci22_ops
= {
269 .read
= pci_vpd_pci22_read
,
270 .write
= pci_vpd_pci22_write
,
271 .get_size
= pci_vpd_pci22_get_size
,
272 .release
= pci_vpd_pci22_release
,
275 int pci_vpd_pci22_init(struct pci_dev
*dev
)
277 struct pci_vpd_pci22
*vpd
;
280 cap
= pci_find_capability(dev
, PCI_CAP_ID_VPD
);
283 vpd
= kzalloc(sizeof(*vpd
), GFP_ATOMIC
);
287 vpd
->base
.ops
= &pci_vpd_pci22_ops
;
288 spin_lock_init(&vpd
->lock
);
291 dev
->vpd
= &vpd
->base
;
296 * pci_block_user_cfg_access - Block userspace PCI config reads/writes
297 * @dev: pci device struct
299 * When user access is blocked, any reads or writes to config space will
300 * sleep until access is unblocked again. We don't allow nesting of
301 * block/unblock calls.
303 void pci_block_user_cfg_access(struct pci_dev
*dev
)
308 spin_lock_irqsave(&pci_lock
, flags
);
309 was_blocked
= dev
->block_ucfg_access
;
310 dev
->block_ucfg_access
= 1;
311 spin_unlock_irqrestore(&pci_lock
, flags
);
313 /* If we BUG() inside the pci_lock, we're guaranteed to hose
317 EXPORT_SYMBOL_GPL(pci_block_user_cfg_access
);
320 * pci_unblock_user_cfg_access - Unblock userspace PCI config reads/writes
321 * @dev: pci device struct
323 * This function allows userspace PCI config accesses to resume.
325 void pci_unblock_user_cfg_access(struct pci_dev
*dev
)
329 spin_lock_irqsave(&pci_lock
, flags
);
331 /* This indicates a problem in the caller, but we don't need
332 * to kill them, unlike a double-block above. */
333 WARN_ON(!dev
->block_ucfg_access
);
335 dev
->block_ucfg_access
= 0;
336 wake_up_all(&pci_ucfg_wait
);
337 spin_unlock_irqrestore(&pci_lock
, flags
);
339 EXPORT_SYMBOL_GPL(pci_unblock_user_cfg_access
);