Hi George, > On 28 Oct 2020, at 09:43, George Dunlap <george.dun...@citrix.com> wrote: > > > >> On Oct 28, 2020, at 8:43 AM, Bertrand Marquis <bertrand.marq...@arm.com> >> wrote: >> >> >> >>> On 27 Oct 2020, at 22:44, Stefano Stabellini <sstabell...@kernel.org> wrote: >>> >>> On Mon, 26 Oct 2020, Bertrand Marquis wrote: >>>> When a Cortex A57 processor is affected by CPU errata 832075, a guest >>>> not implementing the workaround for it could deadlock the system. >>>> Add a warning during boot informing the user that only trusted guests >>>> should be executed on the system. >>>> An equivalent warning is already given to the user by KVM on cores >>>> affected by this errata. >>>> >>>> Also taint the hypervisor as unsecure when this errata applies and >>>> mention Cortex A57 r0p0 - r1p2 as not security supported in SUPPORT.md >>>> >>>> Signed-off-by: Bertrand Marquis <bertrand.marq...@arm.com> >>>> --- >>>> SUPPORT.md | 1 + >>>> xen/arch/arm/cpuerrata.c | 13 +++++++++++++ >>>> 2 files changed, 14 insertions(+) >>>> >>>> diff --git a/SUPPORT.md b/SUPPORT.md >>>> index 5fbe5fc444..f7a3b046b0 100644 >>>> --- a/SUPPORT.md >>>> +++ b/SUPPORT.md >>>> @@ -38,6 +38,7 @@ supported in this document. >>>> ### ARM v8 >>>> >>>> Status: Supported >>>> + Status, Cortex A57 r0p0 - r1p2, not security supported (Errata 832075) > > I think this should be: > > 8<— > > Status, Cortex A57 r0p0-r1p1: Supported, not security supported > > For the Cortex A57 r0p0 - r1p1, see Errata 832075. > > —>8 >
Ok I will fix that. Thanks for the review Cheers Bertrand > -George