[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <174319246800.4193737.16068593925893722302.b4-ty@arm.com>
Date: Fri, 28 Mar 2025 20:08:56 +0000
From: Catalin Marinas <catalin.marinas@....com>
To: will@...nel.org,
mark.rutland@....com,
oliver.upton@...ux.dev,
maz@...nel.org,
Jinqian Yang <yangjinqian1@...wei.com>
Cc: linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org,
wangzhou1@...ilicon.com,
shameerali.kolothum.thodi@...wei.com,
liuyonglong@...wei.com,
jiangkunkun@...wei.com,
yangjinqian1@...wei.comm,
xueshan2@...wei.com
Subject: Re: [PATCH] arm64: Add support for HIP09 Spectre-BHB mitigation
On Tue, 25 Mar 2025 22:19:00 +0800, Jinqian Yang wrote:
> The HIP09 processor is vulnerable to the Spectre-BHB (Branch History
> Buffer) attack, which can be exploited to leak information through
> branch prediction side channels. This commit adds the MIDR of HIP09
> to the list for software mitigation.
>
>
Applied to arm64 (for-next/core), thanks! Please check that I added it
in the right place as it was conflicting with the current for-next/core.
[1/1] arm64: Add support for HIP09 Spectre-BHB mitigation
https://git.kernel.org/arm64/c/e18c09b204e8
--
Catalin
Powered by blists - more mailing lists