Searched hist:"8907 afb476ac6754a4d1ba8d2dd16dbb0fd4d428" (Results 1 – 7 of 7) sorted by relevance
/openbmc/linux/drivers/gpu/drm/msm/adreno/ |
H A D | a5xx_preempt.c | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
H A D | a5xx_gpu.h | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
H A D | a5xx_power.c | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
H A D | adreno_pm4.xml.h | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
H A D | a5xx_gpu.c | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
H A D | adreno_gpu.c | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|
/openbmc/linux/drivers/gpu/drm/msm/ |
H A D | msm_gpu.h | diff 8907afb476ac6754a4d1ba8d2dd16dbb0fd4d428 Mon Sep 14 17:40:21 CDT 2020 Jordan Crouse <jcrouse@codeaurora.org> drm/msm: Allow a5xx to mark the RPTR shadow as privileged
Newer microcode versions have support for the CP_WHERE_AM_I opcode which allows the RPTR shadow memory to be marked as privileged to protect it from corruption. Move the RPTR shadow into its own buffer and protect it it if the current microcode version supports the new feature.
We can also re-enable preemption for those targets that support CP_WHERE_AM_I. Start out by preemptively assuming that we can enable preemption and disable it in a5xx_hw_init if the microcode version comes back as too old.
Signed-off-by: Jordan Crouse <jcrouse@codeaurora.org> Signed-off-by: Rob Clark <robdclark@chromium.org>
|