SError Interrupt on CPU0, code 0xbf000000 makes kernel panic
Joakim Tjernlund
Joakim.Tjernlund at infinera.com
Thu Mar 24 05:10:37 PDT 2022
We have a custom SOC, CPU A53, that when an app accesses non existing address space reports:
# > devmem 0x20000000 w 0x1000 #this will open /dev/mem and write
[ 37.570886] SError Interrupt on CPU0, code 0xbf000000 -- SError
[ 37.571974] CPU: 0 PID: 72 Comm: devmem Not tainted 5.15.26-g18447c6fff6f-dirty #26
[ 37.573150] Hardware name: infinera,xr (DT)
[ 37.573599] pstate: 60000010 (nZCv q A32 LE aif -DIT -SSBS)
[ 37.574705] pc : 000000000098775c
[ 37.575063] lr : 0000000000986918
[ 37.575392] sp : 00000000ffd140a8
[ 37.575725] x12: 0000000000a36c10
[ 37.576443] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000020
[ 37.577872] x8 : 00000000ffd141c0 x7 : 00000000ffd14104 x6 : 0000000000986c9c
[ 37.579278] x5 : 000000000000001f x4 : 0000000000000004 x3 : 0000000000a37020
[ 37.580635] x2 : 0000000000000003 x1 : 0000000000001000 x0 : 0000000000000000
[ 37.582164] Kernel panic - not syncing: Asynchronous SError Interrupt
[ 37.582685] Kernel Offset: disabled
[ 37.582932] CPU features: 0x00001001,20000842
[ 37.583509] Memory Limit: none
[ 37.630058] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---
and the kernel panics. This is a surprise as I expected the app to just be killed bus a SIGBUS.
Is this what to expect?
I see that kernel looks for the RAS extension but we don't have that.
Can anything be done not to panic the kernel for such accesses?
Can one build a som sort of blacklisted address spaces which the MMU will block?
Jocke
More information about the linux-arm-kernel
mailing list