1. 26 Mar, 2021 3 commits
    • Nishanth Menon's avatar
      plat: ti: k3: board: Let explicitly map our SEC_SRAM_BASE to 0x0 · 3dd87efb
      Nishanth Menon authored
      
      
      ENABLE_PIE (position independent executable) is default on K3
      platform to handle variant RAM configurations in the system. This,
      unfortunately does cause confusion while reading the code, so, lets
      make things explicit by selecting 0x0 as the "SEC_SRAM_BASE" out of
      which we compute the BL31_BASE depending on usage.
      
      Lets also document a warning while at it to help folks copying code
      over to a custom K3 platform and optimizing size by disabling PIE to
      modify the defaults.
      Signed-off-by: default avatarNishanth Menon <nm@ti.com>
      Change-Id: I8e67a9210e907e266ff6a78ba4d02e3259bb2b21
      3dd87efb
    • Nishanth Menon's avatar
      plat: ti: k3: board: Lets cast our macros · f5872a00
      Nishanth Menon authored
      
      
      Lets cast our macros to the right types and reduce a few MISRA
      warnings.
      Signed-off-by: default avatarNishanth Menon <nm@ti.com>
      Change-Id: I0dc06072713fe7c9440eca0635094c5f3ceb7f1c
      f5872a00
    • Nishanth Menon's avatar
      plat: ti: k3: board: lite: Increase SRAM size to account for additional table · 2fb5312f
      Nishanth Menon authored
      
      
      We actually have additional table entries than what we accounted for in
      our size. MAX_XLAT_TABLES is 8, but really we could be using upto 10
      depending on the platform. So, we need an extra 8K space in.
      
      This gets exposed with DEBUG=1 and assert checks trigger, which for some
      reason completely escaped testing previously.
      
      ASSERT: lib/xlat_tables_v2/xlat_tables_core.c:97
      BACKTRACE: START: assert
      Signed-off-by: default avatarNishanth Menon <nm@ti.com>
      Change-Id: I5c5d04440ef1fccfaf2317066f3abbc0ec645903
      2fb5312f
  2. 23 Dec, 2020 1 commit