-
Notifications
You must be signed in to change notification settings - Fork 144
LoongArch, bpf: Set bpf_jit_bypass_spec_v1/v4() #9135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Upstream branch: f66b4aa |
13e07b5
to
ca6e071
Compare
Upstream branch: a633dab |
c9467f2
to
37ed887
Compare
Upstream branch: a633dab |
37ed887
to
77d304a
Compare
ca6e071
to
2f8bb38
Compare
Upstream branch: 85cd83f |
77d304a
to
8bf8d89
Compare
2f8bb38
to
dd96e0b
Compare
Upstream branch: f5527f0 |
8bf8d89
to
e2ec5d7
Compare
dd96e0b
to
9860b87
Compare
Upstream branch: bd07bd1 |
e2ec5d7
to
25b4d90
Compare
9860b87
to
7801208
Compare
Upstream branch: cd7312a |
JITs can set bpf_jit_bypass_spec_v1/v4() if they want the verifier to skip analysis/patching for the respective vulnerability, it is safe to set both bpf_jit_bypass_spec_v1/v4(), because there is no speculation barrier instruction for LoongArch. Suggested-by: Luis Gerhorst <[email protected]> Signed-off-by: Tiezhu Yang <[email protected]> Acked-by: Luis Gerhorst <[email protected]>
25b4d90
to
0bfca55
Compare
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=972807 irrelevant now. Closing PR. |
Pull request for series with
subject: LoongArch, bpf: Set bpf_jit_bypass_spec_v1/v4()
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=972807