|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075
> On 27 Oct 2020, at 22:44, Stefano Stabellini <sstabellini@xxxxxxxxxx> wrote:
>
> On Mon, 26 Oct 2020, Bertrand Marquis wrote:
>> When a Cortex A57 processor is affected by CPU errata 832075, a guest
>> not implementing the workaround for it could deadlock the system.
>> Add a warning during boot informing the user that only trusted guests
>> should be executed on the system.
>> An equivalent warning is already given to the user by KVM on cores
>> affected by this errata.
>>
>> Also taint the hypervisor as unsecure when this errata applies and
>> mention Cortex A57 r0p0 - r1p2 as not security supported in SUPPORT.md
>>
>> Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
>> ---
>> SUPPORT.md | 1 +
>> xen/arch/arm/cpuerrata.c | 13 +++++++++++++
>> 2 files changed, 14 insertions(+)
>>
>> diff --git a/SUPPORT.md b/SUPPORT.md
>> index 5fbe5fc444..f7a3b046b0 100644
>> --- a/SUPPORT.md
>> +++ b/SUPPORT.md
>> @@ -38,6 +38,7 @@ supported in this document.
>> ### ARM v8
>>
>> Status: Supported
>> + Status, Cortex A57 r0p0 - r1p2, not security supported (Errata 832075)
>>
>> ## Host hardware support
>>
>> diff --git a/xen/arch/arm/cpuerrata.c b/xen/arch/arm/cpuerrata.c
>> index 0430069a84..b35e8cd0b9 100644
>> --- a/xen/arch/arm/cpuerrata.c
>> +++ b/xen/arch/arm/cpuerrata.c
>> @@ -503,6 +503,19 @@ void check_local_cpu_errata(void)
>> void __init enable_errata_workarounds(void)
>> {
>> enable_cpu_capabilities(arm_errata);
>> +
>> +#ifdef CONFIG_ARM64_ERRATUM_832075
>> + if ( cpus_have_cap(ARM64_WORKAROUND_DEVICE_LOAD_ACQUIRE) )
>> + {
>> + printk_once("**** This CPU is affected by the errata 832075. ****\n"
>> + "**** Guests without CPU erratum workarounds ****\n"
>> + "**** can deadlock the system! ****\n"
>> + "**** Only trusted guests should be used.
>> ****\n");
>
> These can be on 2 lines, no need to be on 4 lines.
I can fix that in a v3.
>
>
> I know that Julien wrote about printing the warning from
> enable_errata_workarounds but to me it looks more natural if we did it
> from the .enable function specific to ARM64_WORKAROUND_DEVICE_LOAD_ACQUIRE.
I have no preference either here but i kind of like this way because if we had
more warnings
they would allow be at the same place.
I will wait for Julien answer on this before sending a v3 for this patch.
Cheers
Bertrand
>
> That said, I don't feel strongly about it, I am fine either way. Julien,
> do you have a preference?
>
>
> Other than that, it is fine.
>
>
>> + /* Taint the machine has being insecure */
>> + add_taint(TAINT_MACHINE_UNSECURE);
>> + }
>> +#endif
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |