linux-stable/Documentation/arch/arm64
Rob Herring f5da59f2bb arm64: errata: Add Cortex-A510 speculative unprivileged load workaround
commit f827bcdafa upstream.

Implement the workaround for ARM Cortex-A510 erratum 3117295. On an
affected Cortex-A510 core, a speculatively executed unprivileged load
might leak data from a privileged load via a cache side channel. The
issue only exists for loads within a translation regime with the same
translation (e.g. same ASID and VMID). Therefore, the issue only affects
the return to EL0.

The erratum and workaround are the same as ARM Cortex-A520 erratum
2966298, so reuse the existing workaround.

Cc: stable@vger.kernel.org
Signed-off-by: Rob Herring <robh@kernel.org>
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Link: https://lore.kernel.org/r/20240110-arm-errata-a510-v1-2-d02bc51aeeee@kernel.org
Signed-off-by: Will Deacon <will@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-01-31 16:18:55 -08:00
..
acpi_object_usage.rst Documentation: Fix typos 2023-08-18 11:29:03 -06:00
amu.rst
arm-acpi.rst Documentation: Fix typos 2023-08-18 11:29:03 -06:00
asymmetric-32bit.rst
booting.rst
cpu-feature-registers.rst arm64: Document missing userspace visible fields in ID_AA64ISAR2_EL1 2023-09-18 11:59:02 +01:00
elf_hwcaps.rst arm64/hbc: Document HWCAP2_HBC 2023-09-18 10:47:53 +01:00
features.rst docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
hugetlbpage.rst
index.rst
kasan-offsets.sh
kdump.rst
legacy_instructions.rst
memory-tagging-extension.rst
memory.rst
perf.rst
pointer-authentication.rst
ptdump.rst
silicon-errata.rst arm64: errata: Add Cortex-A510 speculative unprivileged load workaround 2024-01-31 16:18:55 -08:00
sme.rst
sve.rst
tagged-address-abi.rst
tagged-pointers.rst