-
47e04a7...
by
Liam Girdwood <email address hidden>
on 2020-08-15
-
zephyr: trace: formatting specifier differences.
This is WIP, there are the following differences between Zephyr and
SOF wrt printf type formatters.
%s -> %p
%u -> %llu
Signed-off-by: Liam Girdwood <email address hidden>
-
995da5a...
by
Liam Girdwood <email address hidden>
on 2020-07-10
-
agent: trace: throttle agent warnings if too verbose
This should probably be made a higher level API where we can throttle
noisy trace output.
Signed-off-by: Liam Girdwood <email address hidden>
-
f24662a...
by
Liam Girdwood <email address hidden>
on 2020-06-15
-
zephyr: agent: Use Zephyr clocks and complain more loudly.
Signed-off-by: Liam Girdwood <email address hidden>
-
e85a2b2...
by
Liam Girdwood <email address hidden>
on 2020-06-09
-
zephyr: cavs: zephyr has it's own memory map for secondary cores
Secondary core memory PM needs to be implemented for Zephyr.
Signed-off-by: Liam Girdwood <email address hidden>
-
5b941e3...
by
Liam Girdwood <email address hidden>
on 2020-05-03
-
zephyr: dont use uncache region for zephyr yet
Disable use of uncache region on Zephyr until it's ready.
Signed-off-by: Liam Girdwood <email address hidden>
-
4758413...
by
Mohana Datta Yelugoti <email address hidden>
on 2020-08-11
-
testbench: check array size in component parsing
There may be a situation where size of all elements of the
snd_tplg_vendor_array is greater than the private data size.
If we take a look at array structure
struct snd_soc_tplg_vendor_array {
__le32 size; /* size in bytes of the array, including all elements */
__le32 type; /* SND_SOC_TPLG_TUPLE_TYPE_ */
__le32 num_elems; /* number of elements in array */
union {
struct snd_soc_tplg_vendor_uuid_elem uuid[0];
struct snd_soc_tplg_vendor_value_elem value[0];
struct snd_soc_tplg_vendor_string_elem string[0];
};
} __attribute__((packed));
and assume of private data size is size.
If num_elems * sizeof(..._elem) > size occurs, this is bad
because, we first try to allocate _size_ bytes via malloc to array
pointer. Since the num_elems * sizeof(..._elem) is greater than
size, we get a segmentation fault when we try to memcpy the
remaining size in the subsequent functions (read tplg_read_array()).
We fix this problem by checking for whether array size falls
within the bounds of private data size.
Signed-off-by: Mohana Datta Yelugoti <email address hidden>
-
4b2edf8...
by
Liam Girdwood <email address hidden>
on 2020-06-23
-
zephyr: wrapper: complete zephyr support for working audio
This patch finalises the wrapper to allow LL scheduling of
timer domain audio, EDF sccheduling of IPC, trace re-direction
and kconfig build support.
There are still many items that are WIP and have been marked with
TODO: comments.
Signed-off-by: Liam Girdwood <email address hidden>
-
37aab61...
by
Liam Girdwood <email address hidden>
on 2020-07-06
-
init: move slave core init to src/init.c
It's generic code and not xtensa specific.
Signed-off-by: Liam Girdwood <email address hidden>
-
3049956...
by
Adrian Bonislawski <email address hidden>
on 2020-08-11
-
ext_manifest: add platform-specific config elem
At initial version it will add CAVS_LPRO for CAVS platforms,
OUTBOX_SIZE and INBOX_SIZE
Signed-off-by: Adrian Bonislawski <email address hidden>
-
79fe66d...
by
Adrian Bonislawski <email address hidden>
on 2020-08-11
-
ext_manifest: add simple config data element with IPC_MSG_SIZE
To avoid lots of single value structures this will introduce config data element
which will contain several simple token/value pairs
At initial version it will contain IPC_MSG_SIZE elem
which will inform kernel about maximum IPC msg size
Signed-off-by: Adrian Bonislawski <email address hidden>