1. 18 Dec, 2017 1 commit
  2. 14 Dec, 2017 1 commit
  3. 12 Dec, 2017 5 commits
  4. 11 Dec, 2017 1 commit
  5. 10 Dec, 2017 1 commit
  6. 09 Dec, 2017 7 commits
  7. 08 Dec, 2017 1 commit
  8. 06 Dec, 2017 10 commits
  9. 05 Dec, 2017 5 commits
  10. 04 Dec, 2017 1 commit
  11. 02 Dec, 2017 1 commit
  12. 01 Dec, 2017 3 commits
  13. 30 Nov, 2017 3 commits
    • David Cunado's avatar
      Do not enable SVE on pre-v8.2 platforms · 3872fc2d
      David Cunado authored
      
      Pre-v8.2 platforms such as the Juno platform does not have
      the Scalable Vector Extensions implemented and so the build
      option ENABLE_SVE is set to zero.
      
      This has a minor performance improvement with no functional
      impact.
      
      Change-Id: Ib072735db7a0247406f8b60e325b7e28b1e04ad1
      Signed-off-by: default avatarDavid Cunado <david.cunado@arm.com>
      3872fc2d
    • David Cunado's avatar
      Enable SVE for Non-secure world · 1a853370
      David Cunado authored
      This patch adds a new build option, ENABLE_SVE_FOR_NS, which when set
      to one EL3 will check to see if the Scalable Vector Extension (SVE) is
      implemented when entering and exiting the Non-secure world.
      
      If SVE is implemented, EL3 will do the following:
      
      - Entry to Non-secure world: SIMD, FP and SVE functionality is enabled.
      
      - Exit from Non-secure world: SIMD, FP and SVE functionality is
        disabled. As SIMD and FP registers are part of the SVE Z-registers
        then any use of SIMD / FP functionality would corrupt the SVE
        registers.
      
      The build option default is 1. The SVE functionality is only supported
      on AArch64 and so the build option is set to zero when the target
      archiecture is AArch32.
      
      This build option is not compatible with the CTX_INCLUDE_FPREGS - an
      assert will be raised on platforms where SVE is implemented and both
      ENABLE_SVE_FOR_NS and CTX_INCLUDE_FPREGS are set to 1.
      
      Also note this change prevents secure world use of FP&SIMD registers on
      SVE-enabled platforms. ...
      1a853370
    • Siva Durga Prasad Paladugu's avatar
      Update Xilinx maintainer details · c503be26
      Siva Durga Prasad Paladugu authored
      
      This patch updates Xilinx maintainers details
      as sorenb is no more the maintainer for xilinx
      and the email id is invalid now.
      Signed-off-by: default avatarSiva Durga Prasad Paladugu <sivadur@xilinx.com>
      c503be26