Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-30 Thread Bertrand Marquis
> On 29 Oct 2020, at 23:32, Stefano Stabellini wrote: > > On Thu, 29 Oct 2020, Bertrand Marquis wrote: >> Hi Julien, >> >>> On 28 Oct 2020, at 18:39, Julien Grall wrote: >>> >>> Hi Bertrand, >>> >>> On 26/10/2020 16:21, Bertrand Marquis wrote: When a Cortex A57 processor is affected b

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-29 Thread Stefano Stabellini
On Thu, 29 Oct 2020, Bertrand Marquis wrote: > Hi Julien, > > > On 28 Oct 2020, at 18:39, Julien Grall wrote: > > > > Hi Bertrand, > > > > On 26/10/2020 16:21, Bertrand Marquis wrote: > >> When a Cortex A57 processor is affected by CPU errata 832075, a guest > >> not implementing the workaround

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-29 Thread Bertrand Marquis
Hi Julien, > On 28 Oct 2020, at 18:39, Julien Grall wrote: > > Hi Bertrand, > > On 26/10/2020 16:21, Bertrand Marquis wrote: >> When a Cortex A57 processor is affected by CPU errata 832075, a guest >> not implementing the workaround for it could deadlock the system. >> Add a warning during boot

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread Stefano Stabellini
On Wed, 28 Oct 2020, Julien Grall wrote: > Hi Bertrand, > > On 26/10/2020 16:21, Bertrand Marquis wrote: > > When a Cortex A57 processor is affected by CPU errata 832075, a guest > > not implementing the workaround for it could deadlock the system. > > Add a warning during boot informing the user

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread Julien Grall
Hi Bertrand, On 26/10/2020 16:21, Bertrand Marquis wrote: When a Cortex A57 processor is affected by CPU errata 832075, a guest not implementing the workaround for it could deadlock the system. Add a warning during boot informing the user that only trusted guests should be executed on the system

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread Julien Grall
Hi, On 28/10/2020 08:43, Bertrand Marquis wrote: On 27 Oct 2020, at 22:44, Stefano Stabellini wrote: On Mon, 26 Oct 2020, Bertrand Marquis wrote: When a Cortex A57 processor is affected by CPU errata 832075, a guest not implementing the workaround for it could deadlock the system. Add a wa

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread Bertrand Marquis
Hi George, > On 28 Oct 2020, at 09:43, George Dunlap wrote: > > > >> On Oct 28, 2020, at 8:43 AM, Bertrand Marquis >> wrote: >> >> >> >>> On 27 Oct 2020, at 22:44, Stefano Stabellini wrote: >>> >>> On Mon, 26 Oct 2020, Bertrand Marquis wrote: When a Cortex A57 processor is affected

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread George Dunlap
> On Oct 28, 2020, at 8:43 AM, Bertrand Marquis > wrote: > > > >> On 27 Oct 2020, at 22:44, Stefano Stabellini wrote: >> >> On Mon, 26 Oct 2020, Bertrand Marquis wrote: >>> When a Cortex A57 processor is affected by CPU errata 832075, a guest >>> not implementing the workaround for it coul

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-28 Thread Bertrand Marquis
> On 27 Oct 2020, at 22:44, Stefano Stabellini wrote: > > On Mon, 26 Oct 2020, Bertrand Marquis wrote: >> When a Cortex A57 processor is affected by CPU errata 832075, a guest >> not implementing the workaround for it could deadlock the system. >> Add a warning during boot informing the user t

Re: [PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-27 Thread Stefano Stabellini
On Mon, 26 Oct 2020, Bertrand Marquis wrote: > When a Cortex A57 processor is affected by CPU errata 832075, a guest > not implementing the workaround for it could deadlock the system. > Add a warning during boot informing the user that only trusted guests > should be executed on the system. > An e

[PATCH v2 3/3] xen/arm: Warn user on cpu errata 832075

2020-10-26 Thread Bertrand Marquis
When a Cortex A57 processor is affected by CPU errata 832075, a guest not implementing the workaround for it could deadlock the system. Add a warning during boot informing the user that only trusted guests should be executed on the system. An equivalent warning is already given to the user by KVM o