From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 95BCBC433FE for ; Wed, 26 Oct 2022 16:49:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233607AbiJZQt6 (ORCPT ); Wed, 26 Oct 2022 12:49:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52986 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233406AbiJZQt4 (ORCPT ); Wed, 26 Oct 2022 12:49:56 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6683920F64; Wed, 26 Oct 2022 09:49:54 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E0623B82387; Wed, 26 Oct 2022 16:49:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 18337C433C1; Wed, 26 Oct 2022 16:49:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1666802991; bh=wI+cvFDQv9ZooHzHXWYl831/q37TuDOpJJZQ1J1lXJc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=PbZT13GCid6tWyeW7jo2Ic577BY/WUwCWs3Ag0SuhntISOkHolOsk323ad//quKnA D8OnfJ5+3yBwW58WbWGv5x9a3QYEadIVoxH+NtpqI5yLWGubIFkodn+bzUqAlPN8mB WdBrdheU1/8R10KQpkek6RSMORny1SWSgwj41P+0= Date: Wed, 26 Oct 2022 18:49:49 +0200 From: Greg Kroah-Hartman To: Florian Fainelli Cc: stable@vger.kernel.org, James Morse , Ard Biesheuvel , Will Deacon , Catalin Marinas , Jonathan Corbet , Zenghui Yu , Ionela Voinescu , Shreyas K K , Marc Zyngier , Joey Gouly , Reiji Watanabe , Alexandru Elisei , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:DOCUMENTATION" , open list , Sasha Levin Subject: Re: [PATCH stable 4.19] arm64: errata: Remove AES hwcap for COMPAT tasks Message-ID: References: <20221020230110.1255660-1-f.fainelli@gmail.com> <20221020230110.1255660-3-f.fainelli@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221020230110.1255660-3-f.fainelli@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org On Thu, Oct 20, 2022 at 04:01:07PM -0700, Florian Fainelli wrote: > From: James Morse > > commit 44b3834b2eed595af07021b1c64e6f9bc396398b upstream > > Cortex-A57 and Cortex-A72 have an erratum where an interrupt that > occurs between a pair of AES instructions in aarch32 mode may corrupt > the ELR. The task will subsequently produce the wrong AES result. > > The AES instructions are part of the cryptographic extensions, which are > optional. User-space software will detect the support for these > instructions from the hwcaps. If the platform doesn't support these > instructions a software implementation should be used. > > Remove the hwcap bits on affected parts to indicate user-space should > not use the AES instructions. > > Acked-by: Ard Biesheuvel > Signed-off-by: James Morse > Link: https://lore.kernel.org/r/20220714161523.279570-3-james.morse@arm.com > Signed-off-by: Will Deacon > [florian: resolved conflicts in arch/arm64/tools/cpucaps and cpu_errata.c] > Signed-off-by: Florian Fainelli > Change-Id: I651a0db2e9d2f304d210ae979ae586e7dcc9744d No need for Change-Id: in upstream patches :)