[PATCH] arm/gicv3: Fix building arm/r52

Kinsey Moore kinsey.moore at oarcorp.com
Tue Jun 28 03:38:30 UTC 2022


On 6/27/2022 01:27, Sebastian Huber wrote:
> On 27/06/2022 05:02, Chris Johns wrote:
>> On 24/6/2022 7:44 pm, Sebastian Huber wrote:
>>> On 20.06.22 04:03, chrisj at rtems.org wrote:
>>>> From: Chris Johns <chrisj at rtems.org>
>>>>
>>>> ---
>>>>    bsps/include/dev/irq/arm-gicv3.h | 5 +++++
>>>>    1 file changed, 5 insertions(+)
>>>>
>>>> diff --git a/bsps/include/dev/irq/arm-gicv3.h 
>>>> b/bsps/include/dev/irq/arm-gicv3.h
>>>> index a79368ebdf..aac02fa191 100644
>>>> --- a/bsps/include/dev/irq/arm-gicv3.h
>>>> +++ b/bsps/include/dev/irq/arm-gicv3.h
>>>> @@ -335,7 +335,12 @@ static void gicv3_init_cpu_interface(uint32_t 
>>>> cpu_index)
>>>>      }
>>>>        /* Enable interrupt groups 0 and 1 */
>>>> +#ifdef ARM_MULTILIB_ARCH_V4
>>>> +  WRITE_SR(ICC_IGRPEN0, 0x1);
>>>> +  WRITE_SR(ICC_IGRPEN1, 0x1);
>>>> +#else
>>>>      gic_icc_write(IGRPEN1, 1);
>>>> +#endif
>>>>      WRITE_SR(ICC_CTLR, 0x0);
>>>>    }
>>>
>>> I have a different patch to fix this:
>>>
>>> https://lists.rtems.org/pipermail/devel/2022-June/072056.html
>>
>> Does this change work on a real aarch64 with a suitably configured 
>> TF-A? The
>> security profile of the TF-A needs to disable EL1 access to these 
>> registers to
>> see the issue.
>
> I don't have a hardware to test this change. I can do tests on a 
> Cortex-R52 hardware.
>
> For the Cortex-R52, group 0 interrupts are signaled through FIQ 
> exceptions and group 1 interrupts are signaled through IRQ exceptions. 
> This processor has no secore/non-secure states.
I have reverified that this code works on my ZCU102 (ZynqMP) dev board 
with just the write to IGRPEN1, but I'm not sure it's what Chris would 
consider a suitably configured TF-A since it's a bit stale.


Kinsey



More information about the devel mailing list