From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753411AbcBCK67 (ORCPT ); Wed, 3 Feb 2016 05:58:59 -0500 Received: from mail-wm0-f67.google.com ([74.125.82.67]:35158 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751241AbcBCK6z (ORCPT ); Wed, 3 Feb 2016 05:58:55 -0500 Date: Wed, 3 Feb 2016 11:58:51 +0100 From: Ingo Molnar To: Ard Biesheuvel Cc: Matt Fleming , "H . Peter Anvin" , Thomas Gleixner , "linux-efi@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Linus Torvalds , Andy Lutomirski , Peter Zijlstra Subject: Re: [PATCH 07/14] efi: runtime-wrappers: Run UEFI Runtime Services with interrupts enabled Message-ID: <20160203105851.GA22159@gmail.com> References: <1454364428-494-1-git-send-email-matt@codeblueprint.co.uk> <1454364428-494-8-git-send-email-matt@codeblueprint.co.uk> <20160203094340.GA15890@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Ard Biesheuvel wrote: > > More fundamentally, this makes me nervous: > > > > > The UEFI spec allows Runtime Services to be invoked with interrupts > > > enabled. [...] > > > > So what really matters is not what the spec says, but how Windows executes > > UEFI firmware code in practice. > > > > If major versions of Windows calls UEFI firmware with interrupts disabled, > > then frankly I don't think we should interrupt them under Linux either, > > regardless of what the spec says ... > > > > Random firmware code getting interrupted by the OS changes timings and might > > have other side effects the firmware code might not expect - so the question > > is, does Windows already de facto allow the IRQ preemption of firmware calls? > > > > Good question. I will try to find out. Note that if there's a reasonable (but not 100%) case in favor of keeping irqs enabled, we can try your patch, with the possibility that we might have to revert it, should it cause problems. In practice we probably already interrupt EFI services with NMI interrupts, which can be pretty heavy as well if they for example generate printks. So I'm not against this change in a strong fashion - I'm just a bit cautious and it would be nice to know how Windows behaves here. Thanks, Ingo