OpenCloudOS-Kernel/Documentation/arch
Mark Rutland 3c38faa39e arm64: errata: Expand speculative SSBS workaround once more
[ Upstream commit 081eb7932c2b244f63317a982c5e3990e2c7fbdd ]

A number of Arm Ltd CPUs suffer from errata whereby an MSR to the SSBS
special-purpose register does not affect subsequent speculative
instructions, permitting speculative store bypassing for a window of
time.

We worked around this for a number of CPUs in commits:

* 7187bb7d0b5c7dfa ("arm64: errata: Add workaround for Arm errata 3194386 and 3312417")
* 75b3c43eab594bfb ("arm64: errata: Expand speculative SSBS workaround")
* 145502cac7ea70b5 ("arm64: errata: Expand speculative SSBS workaround (again)")

Since then, a (hopefully final) batch of updates have been published,
with two more affected CPUs. For the affected CPUs the existing
mitigation is sufficient, as described in their respective Software
Developer Errata Notice (SDEN) documents:

* Cortex-A715 (MP148) SDEN v15.0, erratum 3456084
  https://developer.arm.com/documentation/SDEN-2148827/1500/

* Neoverse-N3 (MP195) SDEN v5.0, erratum 3456111
  https://developer.arm.com/documentation/SDEN-3050973/0500/

Enable the existing mitigation by adding the relevant MIDRs to
erratum_spec_ssbs_list, and update silicon-errata.rst and the
Kconfig text accordingly.

Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Cc: James Morse <james.morse@arm.com>
Cc: Will Deacon <will@kernel.org>
Link: https://lore.kernel.org/r/20240930111705.3352047-3-mark.rutland@arm.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
[ Mark: fix conflict in silicon-errata.rst ]
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-10-10 11:58:02 +02:00
..
arc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
arm docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
arm64 arm64: errata: Expand speculative SSBS workaround once more 2024-10-10 11:58:02 +02:00
ia64 Documentation/arch/ia64/features.rst: fix kernel-feat directive 2024-02-23 09:25:28 +01:00
loongarch docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
m68k docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
mips docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
nios2 docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
openrisc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
parisc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
s390 docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
sh docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
sparc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
x86 x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT 2024-04-03 15:28:50 +02:00
xtensa docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
index.rst Documentation work keeps chugging along; stuff for 6.6 includes: 2023-08-30 20:05:42 -07:00