From: Jason Ekstrand Date: Sun, 13 Jan 2019 02:26:53 +0000 (-0600) Subject: intel/eu: Stop overriding exec sizes in send_indirect_message X-Git-Tag: upstream/19.0.0~462 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=0a7ac6d5432e6e683e38deaff43df7da8c58b468;p=platform%2Fupstream%2Fmesa.git intel/eu: Stop overriding exec sizes in send_indirect_message For a long time, we based exec sizes on destination register widths. We've not been doing that since 1ca3a9442760b6f7 but a few remnants accidentally remained. Reviewed-by: Anuj Phogat --- diff --git a/src/intel/compiler/brw_eu_emit.c b/src/intel/compiler/brw_eu_emit.c index 45e2552..0b4cd4d 100644 --- a/src/intel/compiler/brw_eu_emit.c +++ b/src/intel/compiler/brw_eu_emit.c @@ -2473,9 +2473,6 @@ brw_send_indirect_message(struct brw_codegen *p, brw_set_src1(p, send, addr); } - if (dst.width < BRW_EXECUTE_8) - brw_inst_set_exec_size(devinfo, send, dst.width); - brw_set_dest(p, send, dst); brw_set_src0(p, send, retype(payload, BRW_REGISTER_TYPE_UD)); brw_inst_set_sfid(devinfo, send, sfid);