[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075


  • To: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • From: George Dunlap <George.Dunlap@xxxxxxxxxx>
  • Date: Wed, 28 Oct 2020 09:43:21 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=O4RYG2lbV+VmbSfi+1QhZafhH9q9sQLvL4b+ZywryoM=; b=L31DMdX8701CB6zQN5g2zgdW0CJPyFp8RDvALoYPsJb+LYeZ1GzvDXfvnAT8HVINQFOKl4+HHn9Lv7YYD1WdgYLLNs3Ay6j9OvF2WF05xqRbpjqBGEcilGmdxJ/7zFx3gBEWI01We445iM0BpFQ3sPe09Rf5Z2ExT5pBFt56qeOkjgGtWCGks5lxJyPDPXVaWV/1FbvmKjkUt5or1as9DxTY+15KIb2qS+Y7vCRgRvAp6Qrkbhivtoq/1cZsWqPVLAmNIe++b9KO8maNRueaWWJtavcVw3+gDg0k9hOf5QSBGdBCiuva60mwauXGS7PvYOUvnzMat4xIpWSIFlgbSA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h6Wr2vAiE78cZ0ODJ+kE+O0iwwQJEN+C/SPDwB5bQzwVc/nvvIf6VwF8vY8wu3NSslsHvD8GvgzysS9RBgJo912MRhBYBi2EMQUK9yXrfX2OwuiCDWLgL6uvfP/kpE+0ed3XBeY3XxuWoFvoj8c3QfR9anX90ooAUTjb4PtTAc3WiD1skC2ID9jslibJhPZ2rfV982aafzsK4B1Le+O06XhHL8Ra7ASjBd3RIDmlFWHLCYIH6fMu2TbjbrzdGQgGQ31n5I8Yh1EeUUTB3SATAZyCigx4TCM22L4Cv2EkH/RGlrONGVmwIqfb4grw/owrkn/0udtpt65tqlWb0jP4xw==
  • Authentication-results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, "open list:X86" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Wei Liu <wl@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Wed, 28 Oct 2020 09:43:35 +0000
  • Ironport-sdr: ijaz0sh9MrHa1LWvW8HjU0wA0PLbsrczsBrm0tcB6NxxNXomZpfp3Yl3QeszbzCGavcYX15X8I gtrieAueYReX6lxbDJAMu7SU2eh+Zf2CQf5YkLxzF9N2XaRVMw0/i09c7Ru0l73e5C01RfPgId Mvjt4SJnh1S1WyAFIUTKON1p0MY9QHzjcRcZ+kWB/Ppf/qO0jgHGdw9dYVE+ITDoiso47vUmgx 0IYW4+IItAO/HG52b8byZwLMXB7cb5KM+ss8Ib91O46rADymd7s+F0KF7Qpz0ME5B5wCADrbRI WU0=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHWq7QzrIonuj7b9kK48A0ZtEUXrqmsDfmAgACngICAABCpgA==
  • Thread-topic: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075


> On Oct 28, 2020, at 8:43 AM, Bertrand Marquis <Bertrand.Marquis@xxxxxxx> 
> wrote:
> 
> 
> 
>> On 27 Oct 2020, at 22:44, Stefano Stabellini <sstabellini@xxxxxxxxxx> wrote:
>> 
>> On Mon, 26 Oct 2020, Bertrand Marquis wrote:
>>> When a Cortex A57 processor is affected by CPU errata 832075, a guest
>>> not implementing the workaround for it could deadlock the system.
>>> Add a warning during boot informing the user that only trusted guests
>>> should be executed on the system.
>>> An equivalent warning is already given to the user by KVM on cores
>>> affected by this errata.
>>> 
>>> Also taint the hypervisor as unsecure when this errata applies and
>>> mention Cortex A57 r0p0 - r1p2 as not security supported in SUPPORT.md
>>> 
>>> Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
>>> ---
>>> SUPPORT.md               |  1 +
>>> xen/arch/arm/cpuerrata.c | 13 +++++++++++++
>>> 2 files changed, 14 insertions(+)
>>> 
>>> diff --git a/SUPPORT.md b/SUPPORT.md
>>> index 5fbe5fc444..f7a3b046b0 100644
>>> --- a/SUPPORT.md
>>> +++ b/SUPPORT.md
>>> @@ -38,6 +38,7 @@ supported in this document.
>>> ### ARM v8
>>> 
>>>    Status: Supported
>>> +    Status, Cortex A57 r0p0 - r1p2, not security supported (Errata 832075)

I think this should be:

8<—

    Status, Cortex A57 r0p0-r1p1: Supported, not security supported

For the Cortex A57 r0p0 - r1p1, see Errata 832075.

—>8

 -George


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.