Message ID | 20240110-arm-errata-a510-v1-0-d02bc51aeeee@kernel.org |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:2411:b0:101:2151:f287 with SMTP id m17csp940883dyi; Wed, 10 Jan 2024 09:30:38 -0800 (PST) X-Google-Smtp-Source: AGHT+IEnK1krasntmBYQeJ5uE2ToG4IGMpkDJu7bgxTIejjNXQq7juea7MP7gN8uENsNjA9jJKad X-Received: by 2002:a05:6870:b95:b0:206:2e5b:e993 with SMTP id lg21-20020a0568700b9500b002062e5be993mr1112769oab.49.1704907837864; Wed, 10 Jan 2024 09:30:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704907837; cv=none; d=google.com; s=arc-20160816; b=xHPL8LVEpuj28XmFCVLVc6mBiscKOHh1DnZ/8nBrz2SkFDz1Cq0p8NormSyFbxYzzS KptUID/pamV8walDztHtdjBJLWdn4Ag/NAsFxF5xmPtpOGM/InS6kP3tSQZMAwoi5eZc m75kmATdZ73qOsfz/KGsPk9vWQoMdQ91bwqZq3rlNzSiy2Am8Rn6eGKnI2/fCmvQQiT0 I041jMI/qykwVOAYwIlSoW9CTcSLcUTGfUK2SLT4mra/lDSHvLW8/mC385G8iNCRCugT dzpRK3jrJi2n3LrHkbNXqO44dZvXNBC7iULmZP8ayIHd/lOuP1u3kFbOOQFYAMpY71IK Tb0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:from :dkim-signature; bh=GSW3AHyNI4kCb5tsOFmxuVwOd4SXa/T0sj+PmSarjUw=; fh=BtiBzfyGCXG0105aiYJfh9JjVYJ0Lc+4+J30WZyrfGs=; b=rGqmKZvuDTn7KW6oDCn8C19hTphhdrKYTF5mFqp1kRg5iytkgWhVeBJOG26crboE1H DiEG0AB3fEuWuVzUNItGPWIsdjemHbHVDHupED91AHnyJ4Yt4Yd2liazvrjC0DSxUkfb SVE/mV9yteH3ZDFp/FtaAyCzE9FbTT00nY+Wc0dBMCHHnkZHsr+5MOqvKDK3eSc8Hm86 31Dj8bmkGEeBhphHJgfsRvybTvdJxH00MHv6qlmOYMYF/kddKhqn7czIS9H3VFoAZw4X l7vjit3uxvNOvpgIkmQ79Gdse+LnTss+UMTQLdpp3hBfsHz0u7S3/shmv+4loZAn09a3 KUtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qBarvP5B; spf=pass (google.com: domain of linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id n16-20020a634d50000000b005ce107e6eb6si4101872pgl.657.2024.01.10.09.30.37 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 09:30:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qBarvP5B; spf=pass (google.com: domain of linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22536-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id E3C322836CA for <ouuuleilei@gmail.com>; Wed, 10 Jan 2024 17:30:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B24864D129; Wed, 10 Jan 2024 17:29:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="qBarvP5B" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0BDC24CDF5 for <linux-kernel@vger.kernel.org>; Wed, 10 Jan 2024 17:29:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2A763C433F1; Wed, 10 Jan 2024 17:29:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704907789; bh=bs26RKWgi7kqNcbQdz2YXo3TwzsgW9dgH547QBX5bPo=; h=From:Subject:Date:To:Cc:From; b=qBarvP5Bv8UVYmar7xviZ+TB/2xX57G7D0DNZrNj4MwiBFoyRj1A9IZlGwU62AfE9 RoNOkNQPIOjU+SnQgY5OjK7jBrJ7yMmVcwDR8CCeIxyfR//I0PF82PGRd+/YspgvJ+ IA+CQA7GR1k5h7ZO0yv4tQo7aStYbU3MhfK2jPoQr/F3gGdr7Z8aIvYpAolsbuNxOC rCoMvG4DPUryI5xr372YlRIgo7bEeVTIpGUepyWFROBkoN9cWeXV8AAAK/k6B+Cqpu rN11ahfFwYBG0ne5EG9AAz7O7Eb4iuBBovHuN4PtL/QqpZPfqhhhuhZfNOeO6oA9Of 4Do6XIh1j+T3w== Received: (nullmailer pid 2134034 invoked by uid 1000); Wed, 10 Jan 2024 17:29:48 -0000 From: Rob Herring <robh@kernel.org> Subject: [PATCH 0/2] arm64: Cortex-A510 erratum 3117295 workaround Date: Wed, 10 Jan 2024 11:29:19 -0600 Message-Id: <20240110-arm-errata-a510-v1-0-d02bc51aeeee@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-B4-Tracking: v=1; b=H4sIAO/TnmUC/x3MMQqAMAxA0auUzBaaqoNeRRxCjZrBKqmIUHp3i +Mb/s+QWIUTjCaD8iNJzliBjYGwU9zYylIN3vnOITpLelhWpZss9dW+DcHjwAHZQa0u5VXe/zj NpXyTmFQXYQAAAA== To: Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will@kernel.org> Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org X-Mailer: b4 0.13-dev X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1787725440570413438 X-GMAIL-MSGID: 1787725440570413438 |
Series |
arm64: Cortex-A510 erratum 3117295 workaround
|
|
Message
Rob Herring
Jan. 10, 2024, 5:29 p.m. UTC
This short series enables the existing speculative unprivileged load
workaround from Cortex-A520 on Cortex-A510 cores which are also affected
by the erratum. The erratum number is 3117295 and details are available
in the SDEN[1].
Rob
[1] https://developer.arm.com/documentation/SDEN1873361/latest/
Signed-off-by: Rob Herring <robh@kernel.org>
---
Rob Herring (2):
arm64: Rename ARM64_WORKAROUND_2966298
arm64: errata: Add Cortex-A510 speculative unprivileged load workaround
Documentation/arch/arm64/silicon-errata.rst | 2 ++
arch/arm64/Kconfig | 18 ++++++++++++++++++
arch/arm64/kernel/cpu_errata.c | 21 +++++++++++++++++----
arch/arm64/kernel/entry.S | 2 +-
arch/arm64/tools/cpucaps | 2 +-
5 files changed, 39 insertions(+), 6 deletions(-)
---
base-commit: b85ea95d086471afb4ad062012a4d73cd328fa86
change-id: 20240110-arm-errata-a510-23cc219ec1e0
Best regards,
Comments
On Wed, 10 Jan 2024 11:29:19 -0600, Rob Herring wrote: > This short series enables the existing speculative unprivileged load > workaround from Cortex-A520 on Cortex-A510 cores which are also affected > by the erratum. The erratum number is 3117295 and details are available > in the SDEN[1]. > > Rob > > [...] Applied to arm64 (for-next/core), thanks! [1/2] arm64: Rename ARM64_WORKAROUND_2966298 https://git.kernel.org/arm64/c/546b7cde9b1d [2/2] arm64: errata: Add Cortex-A510 speculative unprivileged load workaround https://git.kernel.org/arm64/c/f827bcdafa2a Cheers,