Gitiles
Code Review
Sign In
git01.mediatek.com
/
filogic
/
atf
/
029fba4a97083d7945808be96ef7bc61a74ffc81
/
services
69ca84a
SPMD: extract SPMC DTB header size from SPMD
by Olivier Deprez
· Fri Feb 07 15:44:43 2020 +0100
2bae35f
SPMD: code/comments cleanup
by Olivier Deprez
· Thu Apr 16 13:39:06 2020 +0200
709bc37
Fix SMCCC_ARCH_SOC_ID implementation
by Manish V Badarkhe
· Tue Apr 28 13:25:56 2020 +0100
95867b1
spd: tlkd: support new TLK SMCs for RPMB service
by Mustafa Yigit Bilgen
· Mon Dec 03 15:53:38 2018 -0800
f09264a
tlkd: remove system off/reset handlers
by Varun Wadekar
· Mon Nov 05 15:12:55 2018 -0800
bebb0d7
spd: trusty: disable error messages seen during boot
by Varun Wadekar
· Tue Oct 16 15:39:55 2018 -0700
f809c6e
Implement SMCCC_ARCH_SOC_ID SMC call
by Manish V Badarkhe
· Sat Feb 22 08:43:00 2020 +0000
38a4c87
Merge "SPMD: Add support for SPCI_ID_GET" into integration
by Sandrine Bailleux
· Fri Mar 13 14:29:50 2020 +0000
e79062e
SPMD: Add support for SPCI_ID_GET
by Max Shvetsov
· Thu Mar 12 15:16:40 2020 +0000
079e20e
spd: tlkd: secure timer interrupt handler
by Varun Wadekar
· Fri Aug 10 09:55:25 2018 -0700
e7fd80e
SPMD: add command line parameter to run SPM at S-EL2 or S-EL1
by Max Shvetsov
· Tue Feb 25 13:55:00 2020 +0000
41ff36a
SPMD: smc handler qualify secure origin using booleans
by Olivier Deprez
· Mon Dec 23 16:21:12 2019 +0100
745889c
SPMD: SPMC init, SMC handler cosmetic changes
by Max Shvetsov
· Thu Feb 27 14:54:21 2020 +0000
c9e2c92
SPMD: Adds partially supported EL2 registers.
by Max Shvetsov
· Mon Feb 17 16:15:47 2020 +0000
bdf502d
SPMD: save/restore EL2 system registers.
by Max Shvetsov
· Tue Feb 25 13:56:19 2020 +0000
1333517
Use consistent SMCCC error code
by Manish V Badarkhe
· Wed Feb 19 13:36:50 2020 +0000
2d9c87d
Merge "coverity: fix MISRA violations" into integration
by Mark Dykes
· Tue Feb 18 19:19:00 2020 +0000
91d8061
coverity: fix MISRA violations
by Zelalem
· Wed Feb 12 10:37:03 2020 -0600
8bd1e93
trusty: generic-arm64-smcall: Support gicr address
by Arve Hjønnevåg
· Fri Nov 15 14:25:43 2019 -0800
743822a
trusty: Allow gic base to be specified with GICD_BASE
by Arve Hjønnevåg
· Wed Apr 11 16:09:35 2018 -0700
41ba13f
trusty: Allow getting trusty memsize from BL32_MEM_SIZE instead of TSP_SEC_MEM_SIZE
by Arve Hjønnevåg
· Wed Apr 11 16:10:53 2018 -0700
3e1f197
SPMD: hook SPMD into standard services framework
by Achin Gupta
· Fri Oct 11 15:49:00 2019 +0100
86f2353
SPMD: add SPM dispatcher based upon SPCI Beta 0 spec
by Achin Gupta
· Fri Oct 11 15:41:16 2019 +0100
0f7e601
Prevent speculative execution past ERET
by Anthony Steinhauser
· Tue Jan 07 15:44:06 2020 -0800
49cabec
spm-mm: Rename aarch64 assembly files
by Paul Beesley
· Tue Oct 15 16:14:14 2019 +0000
e449d6a
spm-mm: Rename source files
by Paul Beesley
· Tue Oct 15 16:13:10 2019 +0000
a24ed07
spm-mm: Rename spm_shim_private.h
by Paul Beesley
· Tue Oct 15 16:11:46 2019 +0000
15a96a9
spm-mm: Rename spm_private.h
by Paul Beesley
· Tue Oct 15 14:23:23 2019 +0000
72f9ec6
spm-mm: Rename component makefile
by Paul Beesley
· Tue Oct 15 14:20:34 2019 +0000
e08d7b1
spm-mm: Remove mm_svc.h header
by Paul Beesley
· Tue Oct 15 14:11:41 2019 +0000
e9754e6
spm-mm: Refactor spm_svc.h and its contents
by Paul Beesley
· Tue Oct 15 12:51:55 2019 +0000
45f4028
spm-mm: Refactor secure_partition.h and its contents
by Paul Beesley
· Tue Oct 15 10:57:42 2019 +0000
db4e25a
spm: Remove SPM Alpha 1 prototype and support files
by Paul Beesley
· Mon Oct 14 15:27:12 2019 +0000
fe975b4
Remove dependency between SPM_MM and ENABLE_SPM build flags
by Paul Beesley
· Mon Sep 16 11:29:03 2019 +0000
7d0e3ba
Enable -Wshadow always
by Justin Chadwell
· Tue Sep 17 15:21:50 2019 +0100
1da61af
Merge changes from topic "jc/coverity-fixes" into integration
by Paul Beesley
· Tue Aug 13 11:20:25 2019 +0000
a6420cb
Fix Coverity #343017, Missing unlock
by Justin Chadwell
· Tue Jul 23 09:54:07 2019 +0100
594b357
spd: opteed: enable NS_TIMER_SWITCH
by Sumit Garg
· Mon Aug 05 14:34:48 2019 +0530
8e0ef0f
Switch AARCH32/AARCH64 to __aarch64__
by Julius Werner
· Tue Jul 09 14:02:43 2019 -0700
53456fc
Replace __ASSEMBLY__ with compiler-builtin __ASSEMBLER__
by Julius Werner
· Tue Jul 09 13:49:11 2019 -0700
63801cd
Remove references to old project name from common files
by John Tsichritzis
· Fri Jul 05 14:22:12 2019 +0100
b0c9ed1
services/spm: Fix service UUID lookup
by Paul Beesley
· Mon Apr 08 15:24:43 2019 +0100
ffbf32a
Makefile: remove extra include paths in INCLUDES
by Ambroise Vincent
· Thu Mar 28 09:01:18 2019 +0000
7cb362a
SPM: Adjust size of virtual address space per partition
by Antonio Nino Diaz
· Wed Mar 27 13:45:52 2019 +0000
18e312d
SPM: Refactor xlat context creation
by Antonio Nino Diaz
· Wed Mar 27 13:04:46 2019 +0000
37f97a5
SPM: Move shim layer to TTBR1_EL1
by Antonio Nino Diaz
· Wed Mar 27 11:10:31 2019 +0000
eef3238
SPM: Ignore empty regions in resource description
by Antonio Nino Diaz
· Fri Mar 29 13:48:50 2019 +0000
c456927
SPM: Create SPCI auxiliary function
by Ambroise Vincent
· Wed Feb 27 16:01:48 2019 +0000
a88a35d
Remove several warnings reported with W=2
by Ambroise Vincent
· Thu Feb 14 09:48:21 2019 +0000
b237bca
Remove several warnings reported with W=1
by Ambroise Vincent
· Wed Feb 13 15:58:00 2019 +0000
b091eb9
Ensure proper ID register is checked for feature detection
by Dimitris Papastamos
· Wed Feb 27 11:46:48 2019 +0000
dfc1d3c
trusty: Include file with GIC definitions
by Antonio Nino Diaz
· Wed Feb 27 15:11:18 2019 +0000
4c73585
Merge pull request #1824 from antonio-nino-diaz-arm/an/move-dyn-xlat
by Antonio Niño Díaz
· Mon Feb 18 10:52:23 2019 +0000
6b5aa6e
SPM: Remove unnecessary register save
by Antonio Nino Diaz
· Thu Feb 14 11:40:19 2019 +0000
60ef675
fvp: trusty: Move dynamic xlat enable to platform
by Antonio Nino Diaz
· Tue Feb 12 13:32:03 2019 +0000
31a157f
Sanitize SPD include paths
by Antonio Nino Diaz
· Mon Feb 11 11:57:57 2019 +0000
5d783bb
Merge pull request #1810 from antonio-nino-diaz-arm/an/setjmp
by Antonio Niño Díaz
· Mon Feb 11 09:58:53 2019 +0000
4586d1c
Make setjmp.h prototypes comply with the C standard
by Antonio Nino Diaz
· Fri Feb 08 13:10:45 2019 +0000
95a3368
trusty: Require dynamic translation tables
by Antonio Nino Diaz
· Wed Feb 06 13:27:52 2019 +0000
be57abb
spd: trusty: memmap trusty's code memory before peeking
by Varun Wadekar
· Thu Jan 03 10:44:22 2019 -0800
ea50cd7
spd: trusty: pass max affinity level to Trusty
by Stephen Wolfe
· Thu Mar 29 12:32:08 2018 -0700
51b4a1f
spd: tlkd: remove unwanted assert on System Suspend entry
by Mihir Joshi
· Thu Mar 01 14:36:24 2018 -0800
518230c
tlkd: support new TLK SMCs
by Mihir Joshi
· Mon Jan 22 14:02:16 2018 -0800
0e402d3
Remove support for the SMC Calling Convention 2.0
by Antonio Nino Diaz
· Wed Jan 30 16:01:49 2019 +0000
22d7ddf
Merge pull request #1781 from dtwlin/m2
by Antonio Niño Díaz
· Fri Jan 25 10:30:36 2019 +0000
72f6fed
spd: trusty: trusty_setup should bail on unknown image
by David Lin
· Thu Jan 24 14:15:57 2019 -0800
50b328a
spd: trusty : fix defects flagged by MISRA scan
by Anthony Zhou
· Tue Sep 19 16:36:22 2017 +0800
8338d36
SPM: Rename folder of SPM based on MM
by Antonio Nino Diaz
· Mon Jan 21 11:52:57 2019 +0000
cbccdbf
SPM: Rename SPM_DEPRECATED flag to SPM_MM
by Antonio Nino Diaz
· Mon Jan 21 11:53:29 2019 +0000
bb87f85
Merge pull request #1738 from ardbiesheuvel/synquacer-spm
by Soby Mathew
· Wed Jan 16 16:01:42 2019 +0000
0b42916
services/spm_deprecated: fix return code polarity of spm_init()
by Ard Biesheuvel
· Tue Jan 01 11:03:08 2019 +0100
f9234da
services/spm_deprecated: disable alignment checking for S-EL0
by Ard Biesheuvel
· Thu Jan 03 12:03:49 2019 +0100
1fbc97b
Correct typographical errors
by Paul Beesley
· Fri Jan 11 18:26:51 2019 +0000
923cd77
services/spm_deprecated: permit timer sysreg access at S-EL0
by Ard Biesheuvel
· Tue Jan 01 11:01:41 2019 +0100
8b034fc
services/spm_deprecated: update ARM platform specific asserts
by Ard Biesheuvel
· Sat Dec 29 19:43:21 2018 +0100
e0f9063
Sanitise includes across codebase
by Antonio Nino Diaz
· Fri Dec 14 00:18:21 2018 +0000
52143ae
Merge pull request #1712 from jeenu-arm/ssbs
by Soby Mathew
· Wed Dec 12 09:43:49 2018 +0000
73085f6
SPM: Rename files for consistency
by Antonio Nino Diaz
· Thu Nov 15 08:57:18 2018 +0000
b05de3f
SPM: Remove remaining SMC interfaces
by Antonio Nino Diaz
· Fri Nov 30 10:53:26 2018 +0000
124a1fc
SPM: Migrate mem attr get/set helpers to SPRT
by Antonio Nino Diaz
· Fri Nov 30 10:52:09 2018 +0000
fb76396
SPM: Allow preemption in non-blocking requests
by Antonio Nino Diaz
· Tue Jul 03 16:54:33 2018 +0100
143091f
SPM: Support non-blocking calls
by Antonio Nino Diaz
· Thu Nov 08 14:22:51 2018 +0000
8903641
SPM: Implement global response buffer helpers
by Antonio Nino Diaz
· Thu Oct 18 14:54:57 2018 +0100
44ef4eb
SPM: Prevent simultaneous blocking calls
by Antonio Nino Diaz
· Tue Jul 03 19:54:59 2018 +0100
8c83ad8
SPM: Support blocking calls
by Antonio Nino Diaz
· Thu Nov 08 14:21:19 2018 +0000
9bf1d23
SPM: Introduce SPRT C host library
by Antonio Nino Diaz
· Thu Nov 08 09:21:48 2018 +0000
b5b585a
SPM: Implement SPCI open/close handle SMCs
by Antonio Nino Diaz
· Thu Nov 08 14:20:07 2018 +0000
f939a6a
SPM: Introduce SMC handlers for SPCI and SPRT
by Antonio Nino Diaz
· Thu Nov 08 14:12:40 2018 +0000
675d155
SPM: Support multiple xlat tables contexts
by Antonio Nino Diaz
· Tue Oct 30 11:36:47 2018 +0000
8cc23f9
SPM: Support multiple partitions
by Antonio Nino Diaz
· Tue Oct 30 11:35:30 2018 +0000
5c673e8
SPM: Remove old SMC interfaces
by Antonio Nino Diaz
· Tue Oct 30 12:50:41 2018 +0000
bb7d1cd
SPM: Map memory regions from RD
by Antonio Nino Diaz
· Tue Oct 30 11:34:23 2018 +0000
fa5dd1a
SPM: Read entrypoint from resource descriptor
by Antonio Nino Diaz
· Tue Jun 26 10:34:25 2018 +0100
840627f
SPM: Load image and RD from SP package
by Antonio Nino Diaz
· Tue Nov 27 08:36:02 2018 +0000
fe7b2be
SPM: Remove SP memory mappings definitions
by Antonio Nino Diaz
· Tue Oct 30 11:54:20 2018 +0000
d6cf9a2
SPM: Deprecate boot info struct
by Antonio Nino Diaz
· Tue Oct 30 11:52:45 2018 +0000
8cd7ea3
SPM: Deprecate the current implementation
by Antonio Nino Diaz
· Tue Oct 30 11:08:08 2018 +0000
aa00aff
AArch64: Use SSBS for CVE_2018_3639 mitigation
by Jeenu Viswambharan
· Thu Nov 15 11:38:03 2018 +0000
744bb2b
SDEI: Unconditionally resume Secure if it was interrupted
by Jeenu Viswambharan
· Thu Oct 11 09:50:26 2018 +0100
e77f9e8
SPM: Raise running priority of the core while in Secure Partition
by Sughosh Ganu
· Wed Nov 14 11:06:24 2018 +0530
Next »