Hi George,

> On 28 Oct 2020, at 09:43, George Dunlap <george.dun...@citrix.com> wrote:
> 
> 
> 
>> On Oct 28, 2020, at 8:43 AM, Bertrand Marquis <bertrand.marq...@arm.com> 
>> wrote:
>> 
>> 
>> 
>>> On 27 Oct 2020, at 22:44, Stefano Stabellini <sstabell...@kernel.org> wrote:
>>> 
>>> On Mon, 26 Oct 2020, Bertrand Marquis wrote:
>>>> When a Cortex A57 processor is affected by CPU errata 832075, a guest
>>>> not implementing the workaround for it could deadlock the system.
>>>> Add a warning during boot informing the user that only trusted guests
>>>> should be executed on the system.
>>>> An equivalent warning is already given to the user by KVM on cores
>>>> affected by this errata.
>>>> 
>>>> Also taint the hypervisor as unsecure when this errata applies and
>>>> mention Cortex A57 r0p0 - r1p2 as not security supported in SUPPORT.md
>>>> 
>>>> Signed-off-by: Bertrand Marquis <bertrand.marq...@arm.com>
>>>> ---
>>>> SUPPORT.md               |  1 +
>>>> xen/arch/arm/cpuerrata.c | 13 +++++++++++++
>>>> 2 files changed, 14 insertions(+)
>>>> 
>>>> diff --git a/SUPPORT.md b/SUPPORT.md
>>>> index 5fbe5fc444..f7a3b046b0 100644
>>>> --- a/SUPPORT.md
>>>> +++ b/SUPPORT.md
>>>> @@ -38,6 +38,7 @@ supported in this document.
>>>> ### ARM v8
>>>> 
>>>>   Status: Supported
>>>> +    Status, Cortex A57 r0p0 - r1p2, not security supported (Errata 832075)
> 
> I think this should be:
> 
> 8<—
> 
>    Status, Cortex A57 r0p0-r1p1: Supported, not security supported
> 
> For the Cortex A57 r0p0 - r1p1, see Errata 832075.
> 
> —>8
> 

Ok I will fix that.

Thanks for the review

Cheers
Bertrand

> -George

Reply via email to