linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Marc Zyngier <maz@kernel.org>
To: Joakim Tjernlund <Joakim.Tjernlund@infinera.com>
Cc: "robin.murphy@arm.com" <robin.murphy@arm.com>,
	"linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>
Subject: Re: SError Interrupt on CPU0, code 0xbf000000 makes kernel panic
Date: Thu, 24 Mar 2022 15:25:56 +0000	[thread overview]
Message-ID: <87mthf5q4b.wl-maz@kernel.org> (raw)
In-Reply-To: <f3bb3396ac913d86ada52007281024df37725dad.camel@infinera.com>

On Thu, 24 Mar 2022 15:11:42 +0000,
Joakim Tjernlund <Joakim.Tjernlund@infinera.com> wrote:
> 
> On Thu, 2022-03-24 at 15:05 +0000, Robin Murphy wrote:

> > Well, except when it is... try that on a Qualcomm SoC where the EL2
> > firmware will trap you and reset the system before you even know you've 
> > done anything wrong. If you know enough to know that an error triggered 
> > by accessing some address is truly benign, you know enough to avoid 
> > making that access in the first place.
> 
> of course the error will be dealt with but why make bug finding
> harder than it has to be?

Maybe that was not clear enough from our earlier replies. Let me try
again.

There is *nothing* more the kernel can do. We don't even know what
caused the access (read, write, earthquake or foreign power invasion).

By the time we get the SError interrupt, we could well be running
something altogether different because all of that is totally
asynchronous *by nature*. You're just lucky that you get the response
quickly enough that the kernel is still running the offending
userspace.

	M.

-- 
Without deviation from the norm, progress is not possible.

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2022-03-24 15:27 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-03-24 12:10 SError Interrupt on CPU0, code 0xbf000000 makes kernel panic Joakim Tjernlund
2022-03-24 13:16 ` Robin Murphy
2022-03-24 14:01   ` Joakim Tjernlund
2022-03-24 14:17     ` Marc Zyngier
2022-03-24 14:50       ` Joakim Tjernlund
2022-03-24 15:05         ` Robin Murphy
2022-03-24 15:11           ` Joakim Tjernlund
2022-03-24 15:25             ` Marc Zyngier [this message]
2022-03-24 15:42               ` Joakim Tjernlund
2022-03-24 15:54                 ` Robin Murphy

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87mthf5q4b.wl-maz@kernel.org \
    --to=maz@kernel.org \
    --cc=Joakim.Tjernlund@infinera.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=robin.murphy@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).