fix: disable indirect detection if any stack calls

Don't know if kernels will be initialized in the order needed to check
for indirect accesses in stack calls.

Remove now unused functionPointerWithIndirectAccessExists and reading
this value from zebin.

Related-To: NEO-12235

Signed-off-by: Dominik Dabek <dominik.dabek@intel.com>
This commit is contained in:
Dominik Dabek
2024-08-07 13:06:36 +00:00
committed by Compute-Runtime-Automation
parent 1fa06df956
commit ad229377b9
11 changed files with 4 additions and 26 deletions

View File

@@ -496,9 +496,6 @@ DecodeError decodeZeInfoKernels(ProgramInfo &dst, Yaml::YamlParser &parser, cons
if (DecodeError::success != zeInfoErr) {
return zeInfoErr;
}
if (kernelInfo->kernelDescriptor.kernelMetadata.kernelName == Zebin::Elf::SectionNames::externalFunctions) {
dst.functionPointerWithIndirectAccessExists |= kernelInfo->kernelDescriptor.kernelAttributes.hasIndirectStatelessAccess;
}
dst.kernelInfos.push_back(kernelInfo.release());
}

View File

@@ -48,7 +48,6 @@ struct ProgramInfo {
uint32_t minScratchSpaceSize = 0U;
uint32_t indirectDetectionVersion = 0U;
size_t kernelMiscInfoPos = std::string::npos;
bool functionPointerWithIndirectAccessExists = false;
};
size_t getMaxInlineSlmNeeded(const ProgramInfo &programInfo);