| 312eec3e | 13-Mar-2023 |
Andrew Davis <afd@ti.com> |
feat(ti): synchronize access to secure proxy threads
When communicating with the system controller over secure proxy we clear a thread, write our message, then wait for a response. This must not be
feat(ti): synchronize access to secure proxy threads
When communicating with the system controller over secure proxy we clear a thread, write our message, then wait for a response. This must not be interrupted by a different transfer on the same thread. Take a lock during this sequence to prevent contention.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: I7789f017fde7180ab6b4ac07458464b967c8e580
show more ...
|
| 6688fd7a | 16-May-2022 |
Andrew Davis <afd@ti.com> |
refactor(ti): refactor ti_sci_{setup,do}_xfer to allow zero size response
This allows us to use the common xfer setup path even for no-wait messages. Then factor that out of each no-wait function.
refactor(ti): refactor ti_sci_{setup,do}_xfer to allow zero size response
This allows us to use the common xfer setup path even for no-wait messages. Then factor that out of each no-wait function.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: Ib17d3facd293f3fc91dda56b2906121b43250261
show more ...
|
| 2fcd408b | 27-Sep-2022 |
Andrew Davis <afd@ti.com> |
feat(ti): do not handle EAs in EL3
This could be useful if we had extra information to print or when RAS extensions are available, neither apply here so lets not trap these in EL3 for now.
Signed-o
feat(ti): do not handle EAs in EL3
This could be useful if we had extra information to print or when RAS extensions are available, neither apply here so lets not trap these in EL3 for now.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: Ia0334eb845686964e794afe45c7777ea64fd6b0b
show more ...
|
| 5668db72 | 12-Jan-2023 |
Andrew Davis <afd@ti.com> |
feat(ti): set snoop-delayed exclusive handling on A72 cores
Snoop requests should not be responded to during atomic operations. This can be handled by the interconnect using its global monitor or by
feat(ti): set snoop-delayed exclusive handling on A72 cores
Snoop requests should not be responded to during atomic operations. This can be handled by the interconnect using its global monitor or by the core's SCU delaying to check for the corresponding atomic monitor state.
TI SoCs take the second approach. Set the snoop-delayed exclusive handling bit to inform the core it needs to delay responses to perform this check.
As J784s4 is currently the only SoC with multiple A72 clusters, limit this delay to only that device.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: I875f64e4f53d47a9a0ccbf3415edc565be7f84d9
show more ...
|
| 10d5cf1b | 01-Sep-2022 |
Andrew Davis <afd@ti.com> |
feat(ti): disable L2 dataless UniqueClean evictions
Do this early before we enable caching as a workaround for ARM A72 Errata #854172.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: Ic878fdb49
feat(ti): disable L2 dataless UniqueClean evictions
Do this early before we enable caching as a workaround for ARM A72 Errata #854172.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: Ic878fdb49e598da0ea6ade012712f8f57023678e
show more ...
|
| 81858a35 | 10-Jan-2023 |
Andrew Davis <afd@ti.com> |
feat(ti): set L2 cache ECC and and parity on A72 cores
The Cortex-A72 based cores on K3 platforms have cache ECC and parity protection, enable these.
Signed-off-by: Andrew Davis <afd@ti.com> Change
feat(ti): set L2 cache ECC and and parity on A72 cores
The Cortex-A72 based cores on K3 platforms have cache ECC and parity protection, enable these.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: Icd00bc4aa9c1c48f0fb2a10ea66e75e0b146ef3c
show more ...
|
| a9f46fad | 11-Feb-2022 |
Dave Gerlach <d-gerlach@ti.com> |
feat(ti): allow build config of low power mode support
Not all K3 platforms support low power mode, so to allow these features to be included for platforms that do in build and therefore reported in
feat(ti): allow build config of low power mode support
Not all K3 platforms support low power mode, so to allow these features to be included for platforms that do in build and therefore reported in the PSCI caps, define K3_PM_SYSTEM_SUSPEND flag that can be set during build that will cause appropriate space and functionality to be included in build for system suspend support.
Change-Id: I821fbbd5232d91de6c40f63254b855e285d9b3e8 Signed-off-by: Dave Gerlach <d-gerlach@ti.com>
show more ...
|
| 38164e64 | 07-Jan-2022 |
Dave Gerlach <d-gerlach@ti.com> |
feat(ti): increase SEC_SRAM_SIZE to 128k
Increase the lite platform SEC_SRAM_SIZE to 128k to allow space for GIC context.
Change-Id: I6414309757ce9a9b7b3a9233a401312bfc459a3b Signed-off-by: Dave Ge
feat(ti): increase SEC_SRAM_SIZE to 128k
Increase the lite platform SEC_SRAM_SIZE to 128k to allow space for GIC context.
Change-Id: I6414309757ce9a9b7b3a9233a401312bfc459a3b Signed-off-by: Dave Gerlach <d-gerlach@ti.com>
show more ...
|
| 2393c276 | 30-Nov-2021 |
Dave Gerlach <d-gerlach@ti.com> |
feat(ti): add PSCI handlers for system suspend
Add necessary K3 PSCI handlers to enable system suspend to be reported in the PSCI capabilities when asked during OS boot.
Additionally, have the hand
feat(ti): add PSCI handlers for system suspend
Add necessary K3 PSCI handlers to enable system suspend to be reported in the PSCI capabilities when asked during OS boot.
Additionally, have the handlers provide information that all domains should be off and also have the power domain suspend handler invoke the TISCI_MSG_ENTER_SLEEP message to enter system suspend.
Change-Id: I351a16167770e9909e8ca525ee0d74fa93331194 Signed-off-by: Dave Gerlach <d-gerlach@ti.com>
show more ...
|
| b40a4677 | 07-Jan-2022 |
Dave Gerlach <d-gerlach@ti.com> |
feat(ti): add gic save and restore calls
Add functions to save and restore GICv3 redist and dist contexts during low power mode and then call these during the suspend entry and finish psci handlers.
feat(ti): add gic save and restore calls
Add functions to save and restore GICv3 redist and dist contexts during low power mode and then call these during the suspend entry and finish psci handlers.
Change-Id: I26c2c0f3b7fc925de3b349499fa42d2405441577 Signed-off-by: Dave Gerlach <d-gerlach@ti.com>
show more ...
|