Chris Wilson 149c86e74f drm/i915: Allocate context objects from stolen
As we never expose context objects directly to userspace, we can forgo
allocating a first-class GEM object for them and prefer to use the
limited resource of reserved/stolen memory for them. Note this means
that their initial contents are undefined.

However, a downside of using stolen objects for execlists is that we
cannot access the physical address directly (thanks MCH!) which prevents
their use.

Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk>
Signed-off-by: Daniel Vetter <daniel.vetter@ffwll.ch>
2015-04-10 10:41:24 +02:00
..
2015-04-10 10:41:11 +02:00
2015-03-09 19:58:30 +10:00
2015-04-10 10:41:11 +02:00
2015-04-10 10:36:13 +02:00
2015-04-10 10:41:11 +02:00
2015-03-26 13:04:23 +01:00
2015-03-20 11:48:15 +01:00