diff options
| author | Tiezhu Yang <[email protected]> | 2025-08-05 11:00:22 +0000 |
|---|---|---|
| committer | Huacai Chen <[email protected]> | 2025-08-05 11:00:22 +0000 |
| commit | 8568df83ea7d9afed0b40ee3a5f8287df008b1c9 (patch) | |
| tree | 239e1a1a830bf92d589596decb5e13fe8a4501e1 /drivers/gpu/drm/amd/amdgpu/amdgpu_sync.c | |
| parent | LoongArch: BPF: Fix the tailcall hierarchy (diff) | |
| download | kernel-8568df83ea7d9afed0b40ee3a5f8287df008b1c9.tar.gz kernel-8568df83ea7d9afed0b40ee3a5f8287df008b1c9.zip | |
LoongArch: BPF: Set bpf_jit_bypass_spec_v1/v4()
JITs can set bpf_jit_bypass_spec_v1/v4() if they want the verifier to
skip analysis/patching for the respective vulnerability, it is safe to
set both bpf_jit_bypass_spec_v1/v4(), because there is no speculation
barrier instruction for LoongArch.
Suggested-by: Luis Gerhorst <[email protected]>
Signed-off-by: Tiezhu Yang <[email protected]>
Signed-off-by: Huacai Chen <[email protected]>
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_sync.c')
0 files changed, 0 insertions, 0 deletions
