Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Jul 2013 14:09:42 -0400
From:      John Baldwin <jhb@freebsd.org>
To:        Marcel Moolenaar <marcel@freebsd.org>
Cc:        svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org
Subject:   Re: svn commit: r253161 - head/sys/dev/uart
Message-ID:  <201307101409.42228.jhb@freebsd.org>
In-Reply-To: <201307101405.44158.jhb@freebsd.org>
References:  <201307101742.r6AHgKOm024113@svn.freebsd.org> <201307101405.44158.jhb@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday, July 10, 2013 2:05:43 pm John Baldwin wrote:
> On Wednesday, July 10, 2013 1:42:20 pm Marcel Moolenaar wrote:
> > Author: marcel
> > Date: Wed Jul 10 17:42:20 2013
> > New Revision: 253161
> > URL: http://svnweb.freebsd.org/changeset/base/253161
> > 
> > Log:
> >   Protect against broken hardware. In this particular case, protect against
> >   H/W not de-asserting the interrupt at all. On x86, and because of the
> >   following conditions, this results in a hard hang with interrupts disabled:
> >   1.  The uart(4) driver uses a spin lock to protect against concurrent
> >       access to the H/W. Spin locks disable and restore interrupts.
> >   2.  Restoring the interrupt on x86 always writes the flags register. Even
> >       if we're restoring the interrupt from disabled to disabled.
> >   3.  The x86 CPU has a short window in which interrupts are enabled when the
> >       flags register is written.
> 
> Do you have proof of this?  I have never seen anything like this documented.
> It would be fundamentally broken if true.  In fact, if anything the evidence
> I have seen is the exact opposite: that Intel is very careful to prevent races
> of this sort.  Specifically, Intel CPUs have long had a feature of disabling
> interrupts for the instruction following POP SS to permit atomic loads of
> SS:ESP (for code that doesn't use LSS).  I highly doubt your claim is true.
> 
> In fact, I think you might be confused by the VME bits (VIP and VIF). The
> POPF instruction is documented to clear VIP and VIF, but those flags only
> matter when operating in virtual 86 mode.  They are not relevant to our
> kernel.  I think you need to find a real explanation for the hang you are
> seeing.

Also, to be clear, if CPUs behave the way you described, our x86 ports would
have been horribly unstable since at least 5.0.  We depend on nested unlocks
not transparently enabling interrupts to prevent nested interrupt frames
(which can quickly exhaust the kernel stack and lead to a double fault, back
when doing early ithread work these were not hard to provoke).

I have not see a single report of a double fault due to this type of
recursion since 5.0 was released 

-- 
John Baldwin



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307101409.42228.jhb>