fix: disable indirect detection if any stack calls

Don't know if kernels will be initialized in the order needed to check
for indirect accesses in stack calls.

Remove now unused functionPointerWithIndirectAccessExists and reading
this value from zebin.

Related-To: NEO-12235

Signed-off-by: Dominik Dabek <dominik.dabek@intel.com>
This commit is contained in:
Dominik Dabek
2024-08-07 13:06:36 +00:00
committed by Compute-Runtime-Automation
parent 1fa06df956
commit ad229377b9
11 changed files with 4 additions and 26 deletions

View File

@@ -496,9 +496,6 @@ DecodeError decodeZeInfoKernels(ProgramInfo &dst, Yaml::YamlParser &parser, cons
if (DecodeError::success != zeInfoErr) {
return zeInfoErr;
}
if (kernelInfo->kernelDescriptor.kernelMetadata.kernelName == Zebin::Elf::SectionNames::externalFunctions) {
dst.functionPointerWithIndirectAccessExists |= kernelInfo->kernelDescriptor.kernelAttributes.hasIndirectStatelessAccess;
}
dst.kernelInfos.push_back(kernelInfo.release());
}