[PATCH] bsp/clock_isr: move the Fast Idle clock code into normal clock driver

2023-01-12 Thread Zhu Zhongjie
From: Zhongjie Zhu Fast Idle is not supported in SMP and n ISRs per tick, so move the code into the normal clock driver, make this more clearly. --- bsps/shared/dev/clock/clockimpl.h | 119 +- 1 file changed, 51 insertions(+), 68 deletions(-) diff --git

[PATCH 3/5] bsps/microblaze: Add device tree support to AXI interrupt controller

2023-01-12 Thread Alex White
From: Ryan Long --- .../microblaze_fpga/include/bsp/intc.h| 2 -- bsps/microblaze/microblaze_fpga/irq/irq.c | 36 ++- 2 files changed, 19 insertions(+), 19 deletions(-) diff --git a/bsps/microblaze/microblaze_fpga/include/bsp/intc.h

[PATCH 5/5] bsps/microblaze: Add device tree support to UART Lite

2023-01-12 Thread Alex White
From: Ryan Long --- .../microblaze_fpga/console/console-io.c | 19 ++-- .../microblaze_fpga/console/debug-io.c| 29 +++ bsps/microblaze/shared/dev/serial/uartlite.c | 9 +- 3 files changed, 49 insertions(+), 8 deletions(-) diff --git

[PATCH 4/5] bsps/microblaze: Add device tree support to JFFS2 QSPI

2023-01-12 Thread Alex White
From: Ryan Long --- bsps/microblaze/microblaze_fpga/fs/jffs2_qspi.c | 17 +++-- 1 file changed, 15 insertions(+), 2 deletions(-) diff --git a/bsps/microblaze/microblaze_fpga/fs/jffs2_qspi.c b/bsps/microblaze/microblaze_fpga/fs/jffs2_qspi.c index 39328b6b7c..49859a03f1 100644 ---

[PATCH 1/5] bsps/microblaze: Add device tree getter

2023-01-12 Thread Alex White
This allows drivers to read configuration data from the device tree if the BSP is built with device tree support. --- .../include/bsp/microblaze-fdt-support.h | 65 + bsps/microblaze/microblaze_fpga/fdt/bsp_fdt.c | 23 -- bsps/microblaze/microblaze_fpga/include/bsp.h | 3

[PATCH 0/5] bsps/microblaze: Add device tree support

2023-01-12 Thread Alex White
This patch set adds device tree support to the following MicroBlaze BSP drivers: - AXI Interrupt Controller - JFFS2 QSPI - AXI UART Lite - AXI Timer clock Previously, the only way to configure the above drivers was to use build configuration options. Now when a device tree is present, the BSP

[PATCH 2/5] bsps/microblaze: Add device tree support to timer

2023-01-12 Thread Alex White
--- bsps/microblaze/microblaze_fpga/clock/clock.c | 50 --- .../microblaze_fpga/include/bsp/timer.h | 2 - 2 files changed, 32 insertions(+), 20 deletions(-) diff --git a/bsps/microblaze/microblaze_fpga/clock/clock.c b/bsps/microblaze/microblaze_fpga/clock/clock.c index

Re: [PATCH v1 4/4] testsuites/libtest/dl11: Add DL test for TLS

2023-01-12 Thread Kinsey Moore
On Thu, Jan 12, 2023 at 5:11 PM Joel Sherrill wrote: > Will this need to be added as an expected fail on other architectures? > > Just wondering how many bsp test configuration files need touching > I suppose I could set it to enabled for only AArch64 for now. It would definitely fail on other

Re: [PATCH v1 4/4] testsuites/libtest/dl11: Add DL test for TLS

2023-01-12 Thread Joel Sherrill
Will this need to be added as an expected fail on other architectures? Just wondering how many bsp test configuration files need touching On Thu, Jan 12, 2023, 4:55 PM Kinsey Moore wrote: > This adds a test verifying basic TLS functionality in loadable modules > now that at least one

Re: [PATCH v1 1/4] cpukit/libdl: Use correct mask for reloc type

2023-01-12 Thread Kinsey Moore
On 1/12/2023 4:54 PM, Kinsey Moore wrote: The mask 0xff is used by ELF32 while ELF64 uses 0x. These are automatically selected based on the build type when using ELF_R_TYPE(). --- cpukit/libdl/rtl-rap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git

[PATCH v1 4/4] testsuites/libtest/dl11: Add DL test for TLS

2023-01-12 Thread Kinsey Moore
This adds a test verifying basic TLS functionality in loadable modules now that at least one architecture supports it. --- spec/build/testsuites/libtests/dl11.yml | 38 +++ spec/build/testsuites/libtests/grp.yml | 2 + testsuites/libtests/dl11/dl-load.c | 142

[PATCH v1 1/4] cpukit/libdl: Use correct mask for reloc type

2023-01-12 Thread Kinsey Moore
The mask 0xff is used by ELF32 while ELF64 uses 0x. These are automatically selected based on the build type when using ELF_R_TYPE(). --- cpukit/libdl/rtl-rap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cpukit/libdl/rtl-rap.c b/cpukit/libdl/rtl-rap.c index

[PATCH v1 2/4] cpukit/libdl: Print the missing AArch64 reloc type

2023-01-12 Thread Kinsey Moore
This prints the relocation type that was found to be missing in addition to its address to aid in bug reports. --- cpukit/libdl/rtl-mdreloc-aarch64.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cpukit/libdl/rtl-mdreloc-aarch64.c b/cpukit/libdl/rtl-mdreloc-aarch64.c

[PATCH v1 3/4] cpukit/libdl: Add AArch64 TLS reloc support

2023-01-12 Thread Kinsey Moore
This adds basic TLS relocation support for AArch64 to libdl. This lets loadable modules use TLS symbols hosted in the main binary. This does not allow loadable modules to host their own TLS symbols. --- cpukit/libdl/rtl-mdreloc-aarch64.c | 38 ++ 1 file changed, 38

[PATCH rtems-tools] linkers/rtems-syms: Generate TLS symbols

2023-01-12 Thread Kinsey Moore
When generating the symbol table for loadable modules, include TLS symbols so that the modules can reference them. --- linkers/rtems-syms.cpp | 5 + rtemstoolkit/rld-elf.cpp | 1 + rtemstoolkit/rld-symbols.cpp | 3 +++ 3 files changed, 9 insertions(+) diff --git

Re: [PATCH 1/3] build: Format build items

2023-01-12 Thread Kinsey Moore
On 1/12/2023 10:38 AM, Sebastian Huber wrote: On 12.01.23 16:52, Kinsey Moore wrote: Annotation of expected test states with a description could get quite repetitive, but I suppose that's better than losing the information. I'm fine with this going in for now with a ticket to address this

Re: [PATCH 1/3] build: Format build items

2023-01-12 Thread Sebastian Huber
On 12.01.23 16:52, Kinsey Moore wrote: Annotation of expected test states with a description could get quite repetitive, but I suppose that's better than losing the information. I'm fine with this going in for now with a ticket to address this issue and we can pull the annotations back in when

Re: [PATCH 1/3] build: Format build items

2023-01-12 Thread Sebastian Huber
On 12.01.23 15:44, Kinsey Moore wrote: The other two patches look fine to me. The use of dump() that results in this patch does several things: * Removal of whitespace This is fine for whitespace at the base level of indentation. Whitespace within an indented block may be more important for

Re: [PATCH 0/3] build: Use enabled by for defaults

2023-01-12 Thread Sebastian Huber
On 12.01.23 13:03, Sebastian Huber wrote: Merge the "default" and "default-by-variant" attributes. Use an "enabled-by" expression to select the default value based on the enabled set. This makes it possible to select default values depending on other options. For example you could choose

[PATCH 2/3] build: Replace variant patterns with a list

2023-01-12 Thread Sebastian Huber
Replace the variant patterns in the default-by-variant list with an explicit list of matching BSPs. The change was tested by comparing the output of ./waf bspdefaults before and after the change. --- .../bsps/aarch64/xilinx-zynqmp/optclki2c0.yml | 8 +++

[PATCH 1/3] build: Format build items

2023-01-12 Thread Sebastian Huber
Use yaml.dump(data, default_flow_style=False, allow_unicode=True) to format all build items. --- spec/build/bsps/aarch64/a53/optramlen.yml | 2 +- spec/build/bsps/aarch64/a53/tsta53.yml| 22 +++- spec/build/bsps/aarch64/a72/optramlen.yml | 2 +-

[PATCH 0/3] build: Use enabled by for defaults

2023-01-12 Thread Sebastian Huber
Merge the "default" and "default-by-variant" attributes. Use an "enabled-by" expression to select the default value based on the enabled set. This makes it possible to select default values depending on other options. For example you could choose memory settings based on whether RTEMS_SMP is