aboutsummaryrefslogtreecommitdiff
path: root/hw/fsp
diff options
context:
space:
mode:
authorBenjamin Herrenschmidt <benh@kernel.crashing.org>2014-12-09 13:09:50 +1100
committerBenjamin Herrenschmidt <benh@kernel.crashing.org>2014-12-09 13:20:55 +1100
commit396a9769134c3621b7807f8e781d22baf0738f13 (patch)
tree4ab6d142e0479e2336926539d1ab2e1ef7f28ef0 /hw/fsp
parent43d263b3eaa0d6cef59c87ca955cf0cd1e129589 (diff)
downloadskiboot-396a9769134c3621b7807f8e781d22baf0738f13.zip
skiboot-396a9769134c3621b7807f8e781d22baf0738f13.tar.gz
skiboot-396a9769134c3621b7807f8e781d22baf0738f13.tar.bz2
fsp: Avoid NULL dereference in case of invalid class_resp bits
When handling timeouts, we appear to do an occasional NULL dereference in fsp_timeout_poll() due to fsp_cmdclass_resp_bitmask being out of sync (bit set but class queue empty). The cause for the discrepancy will be sorted out separately but the code should be more robust. Additionally, add a lock to ensure we don't race on the timer calculations otherwise we might get spurrious dual detection of the timeout. Fixes SW288484 Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Diffstat (limited to 'hw/fsp')
-rw-r--r--hw/fsp/fsp.c27
1 files changed, 19 insertions, 8 deletions
diff --git a/hw/fsp/fsp.c b/hw/fsp/fsp.c
index ba2f01b..c1eb53a 100644
--- a/hw/fsp/fsp.c
+++ b/hw/fsp/fsp.c
@@ -89,6 +89,7 @@ static void *fsp_inbound_buf = NULL;
static u32 fsp_inbound_off;
static struct lock fsp_lock = LOCK_UNLOCKED;
+static struct lock fsp_poll_lock = LOCK_UNLOCKED;
static u64 fsp_cmdclass_resp_bitmask;
static u64 timeout_timer;
@@ -1930,11 +1931,14 @@ static void fsp_timeout_poll(void *data __unused)
* So every 30secs, check if there is any message
* waiting for a response from the FSP
*/
- if ((tb_compare(now, timeout_timer) == TB_AAFTERB) ||
- (tb_compare(now, timeout_timer) == TB_AEQUALB))
- timeout_timer = now + secs_to_tb(30);
- else
+ if (tb_compare(now, timeout_timer) == TB_ABEFOREB)
+ return;
+ if (!try_lock(&fsp_poll_lock))
return;
+ if (tb_compare(now, timeout_timer) == TB_ABEFOREB) {
+ unlock(&fsp_poll_lock);
+ return;
+ }
while (cmdclass_resp_bitmask) {
u64 time_sent = 0;
@@ -1950,18 +1954,25 @@ static void fsp_timeout_poll(void *data __unused)
/* Now check if the response has timed out */
if (tb_compare(time_to_comp, timeout_val) == TB_AAFTERB) {
- u64 resetbit = 0;
u32 w0, w1;
enum fsp_msg_state mstate;
/* Take the FSP lock now and re-check */
lock(&fsp_lock);
- if (!(fsp_cmdclass_resp_bitmask & (1 << index)) ||
+ if (!(fsp_cmdclass_resp_bitmask & (1ull << index)) ||
time_sent != cmdclass->timesent) {
unlock(&fsp_lock);
goto next_bit;
}
req = list_top(&cmdclass->msgq, struct fsp_msg, link);
+ if (!req) {
+ printf("FSP: Timeout state mismatch on class %d\n",
+ index);
+ fsp_cmdclass_resp_bitmask &= ~(1ull << index);
+ cmdclass->timesent = 0;
+ unlock(&fsp_lock);
+ goto next_bit;
+ }
w0 = req->word0;
w1 = req->word1;
mstate = req->state;
@@ -1969,8 +1980,7 @@ static void fsp_timeout_poll(void *data __unused)
" word0 = %x, word1 = %x state: %d\n",
w0, w1, mstate);
fsp_reg_dump();
- resetbit = ~fsp_get_class_bit(req->word0 & 0xff);
- fsp_cmdclass_resp_bitmask &= resetbit;
+ fsp_cmdclass_resp_bitmask &= ~(1ull << index);
cmdclass->timesent = 0;
if (req->resp)
req->resp->state = fsp_msg_timeout;
@@ -1985,6 +1995,7 @@ static void fsp_timeout_poll(void *data __unused)
cmdclass_resp_bitmask = cmdclass_resp_bitmask >> 1;
index++;
}
+ unlock(&fsp_poll_lock);
}
void fsp_opl(void)