* arm64: issue with invalid mode handling
@ 2017-01-18 15:56 Mark Salter
2017-01-18 16:10 ` Mark Rutland
0 siblings, 1 reply; 2+ messages in thread
From: Mark Salter @ 2017-01-18 15:56 UTC (permalink / raw)
To: linux-arm-kernel
Recently, I've run across some bug reports with:
Internal error: Attempting to execute userspace memory: 8600000f
But the real problem comes before just before this. Something like:
Bad mode in Error handler detected on CPU0, code 0xbe000000 -- SError?
or
Bad mode in FIQ handler detected on CPU0, code 0x56000000 -- SVC (AArch64)
In handling the bad mode exceptions happening in userspace, the kernel
ends up trying to send SIGILL to the task but there is no path back to
userspace. In entry.S, there is:
.macro inv_entry, el, reason, regsize = 64
kernel_entry \el, \regsize
mov x0, sp
mov x1, #\reason
mrs x2, esr_el1
b bad_mode
^^^^^
which SError and others use. When bad_mode() returns, the LR actually
contains the userspace address and the above internal error results.
So, what is the intent here? Should the kernel actually try to kill the
task and keep going for these sorts of things or should it panic?
--Mark
^ permalink raw reply [flat|nested] 2+ messages in thread
* arm64: issue with invalid mode handling
2017-01-18 15:56 arm64: issue with invalid mode handling Mark Salter
@ 2017-01-18 16:10 ` Mark Rutland
0 siblings, 0 replies; 2+ messages in thread
From: Mark Rutland @ 2017-01-18 16:10 UTC (permalink / raw)
To: linux-arm-kernel
Hi Mark,
On Wed, Jan 18, 2017 at 10:56:51AM -0500, Mark Salter wrote:
> Recently, I've run across some bug reports with:
>
> Internal error: Attempting to execute userspace memory: 8600000f
>
> But the real problem comes before just before this. Something like:
>
> Bad mode in Error handler detected on CPU0, code 0xbe000000 -- SError?
>
> or
>
> Bad mode in FIQ handler detected on CPU0, code 0x56000000 -- SVC (AArch64)
>
> In handling the bad mode exceptions happening in userspace, the kernel
> ends up trying to send SIGILL to the task but there is no path back to
> userspace. In entry.S, there is:
>
> .macro inv_entry, el, reason, regsize = 64
> kernel_entry \el, \regsize
> mov x0, sp
> mov x1, #\reason
> mrs x2, esr_el1
> b bad_mode
> ^^^^^
>
> which SError and others use. When bad_mode() returns, the LR actually
> contains the userspace address and the above internal error results.
Thanks for the report, it's much appreciated.
> So, what is the intent here? Should the kernel actually try to kill the
> task and keep going for these sorts of things or should it panic?
This was an unintended consequence of commit 9955ac47f4ba1c95 ("arm64:
don't kill the kernel on a bad esr from el0"), which was intended to
cater for certain synchronous exceptions.
We should treat SError as fatal; I'll spin a patch to correct that and
to avoid the erroneous return.
Thanks,
Mark.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-01-18 16:10 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-01-18 15:56 arm64: issue with invalid mode handling Mark Salter
2017-01-18 16:10 ` Mark Rutland
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).