From nobody Sun Feb 8 22:18:31 2026 Received: from canpmsgout04.his.huawei.com (canpmsgout04.his.huawei.com [113.46.200.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C31CE14AD20 for ; Sat, 27 Dec 2025 09:25:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=113.46.200.219 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766827506; cv=none; b=F3cTGwRVGwrO6qGUD0qSZPva9zdPQ9ynEQntwVYJiLCM1QcTDe/Nn6ADmP0mAhBqFwWOqZzn1FniQoBy62PR8vRCzL4/Q1bLL4SVzW4A7DfLH9+cPLMfZal2Js5l/pe6GxteUQbtKMBlnc/FU11J8Mcky1/gt8Tolq2goqCuOZ8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766827506; c=relaxed/simple; bh=rwKemtGtM5NPCzRStMLdmV1Y7ft/L2dLmIJs0MJdMog=; h=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type; b=u8rm0xgQEG5q0mH+zkEpYB58LK4ey4J5pWG2gEZLuxI958g0JfQplTo1f3DJw3jVtotSJmaJFaDzrWd8iXG6lxZuqZvXpQHhpy7qtMnNUsJMh8UQDj7ODd6g6iPLDZGUtg0c09D1NdDreqYFtZcsXu27jcloPUXKv2FsdP0wK0M= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com; spf=pass smtp.mailfrom=huawei.com; dkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com header.b=PBI2kFBt; arc=none smtp.client-ip=113.46.200.219 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com header.b="PBI2kFBt" dkim-signature: v=1; a=rsa-sha256; d=huawei.com; s=dkim; c=relaxed/relaxed; q=dns/txt; h=From; bh=MC190JDsuOBd4MEKKHCaYvp0ToUbGIR7G1lcWWgrwQc=; b=PBI2kFBtOjbmlMC81d3cP/X0aLaudO1Kh1YpcceIOBFYHqJP+51F+LO7hhSwFEpcDhE953KaO 3ofN8pAXkWtyIX1baM9/1DFl9e7cooTY8LzVf4UQSKhIY/Il4F+7eMR3PtXgWybMMYVsrtbTlja Eb09EaIn4oL/gAlENptcNxQ= Received: from mail.maildlp.com (unknown [172.19.162.197]) by canpmsgout04.his.huawei.com (SkyGuard) with ESMTPS id 4ddcS715Bfz1prRC; Sat, 27 Dec 2025 17:21:43 +0800 (CST) Received: from dggpemf500013.china.huawei.com (unknown [7.185.36.188]) by mail.maildlp.com (Postfix) with ESMTPS id E75FA40363; Sat, 27 Dec 2025 17:24:53 +0800 (CST) Received: from huawei.com (10.50.163.32) by dggpemf500013.china.huawei.com (7.185.36.188) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Sat, 27 Dec 2025 17:24:53 +0800 From: Jinqian Yang To: , CC: , , , , , Jinqian Yang Subject: [PATCH] arm64: Add support for TSV110 Spectre-BHB mitigation Date: Sat, 27 Dec 2025 17:24:48 +0800 Message-ID: <20251227092448.732059-1-yangjinqian1@huawei.com> X-Mailer: git-send-email 2.33.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: kwepems200001.china.huawei.com (7.221.188.67) To dggpemf500013.china.huawei.com (7.185.36.188) Content-Type: text/plain; charset="utf-8" The TSV110 processor is vulnerable to the Spectre-BHB (Branch History Buffer) attack, which can be exploited to leak information through branch prediction side channels. This commit adds the MIDR of TSV110 to the list for software mitigation. Signed-off-by: Jinqian Yang Reviewed-by: Zenghui Yu --- arch/arm64/kernel/proton-pack.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/kernel/proton-pack.c b/arch/arm64/kernel/proton-pac= k.c index 80a580e019c5..b3801f532b10 100644 --- a/arch/arm64/kernel/proton-pack.c +++ b/arch/arm64/kernel/proton-pack.c @@ -887,6 +887,7 @@ static u8 spectre_bhb_loop_affected(void) MIDR_ALL_VERSIONS(MIDR_CORTEX_X2), MIDR_ALL_VERSIONS(MIDR_NEOVERSE_N2), MIDR_ALL_VERSIONS(MIDR_NEOVERSE_V1), + MIDR_ALL_VERSIONS(MIDR_HISI_TSV110), {}, }; static const struct midr_range spectre_bhb_k24_list[] =3D { --=20 2.33.0