- caa2e05 fix(security): apply SMCCC_ARCH_WORKAROUND_3 to A73/A75/A72/A57 by Bipin Ravi · 2 years, 9 months ago
- 48e6b57 fix(gpt_rme): rework delegating/undelegating sequence by Robert Wakim · 3 years, 1 month ago
- e05753c Merge "feat(ff-a): forward FFA_VERSION from SPMD to SPMC" into integration by Olivier Deprez · 2 years, 9 months ago
- eecb4b0 feat(spm): add FFA_MSG_SEND2 forwarding in SPMD by Federico Recanati · 2 years, 10 months ago
- 9460a23 feat(ff-a): forward FFA_VERSION from SPMD to SPMC by Daniel Boulby · 3 years ago
- 60786e7 test(el3-runtime): dit is retained on world switch by Daniel Boulby · 3 years, 1 month ago
- 8341ddd Merge "fix(trp): Distinguish between cold and warm boot" into integration by Bipin Ravi · 3 years ago
- 50746c8 fix(trp): Distinguish between cold and warm boot by Mark Dykes · 3 years ago
- 3764d34 Merge "fix(rmmd/sve): enable/disable SVE/FPU for Realms" into integration by Alexei Fedorov · 3 years ago
- c25225a fix(rmmd/sve): enable/disable SVE/FPU for Realms by Subhasish Ghosh · 3 years ago
- 8cc642c fix(rmmd): align RMI and GTSI FIDs with SMCCC by Subhasish Ghosh · 3 years ago
- fccd3ea fix(rmmd): preserve x4-x7 as per SMCCCv1.1 by Soby Mathew · 3 years ago
- 247e5c3 fix(spm_mm): do not compile if SVE/SME is enabled by Manish Pandey · 3 years ago
- 9baade3 feat(sme): enable SME functionality by johpow01 · 3 years, 5 months ago
- 3d2b7b7 Merge "fix(sdei): fix assert while kdump issue" into integration by Manish Pandey · 3 years ago
- 9174a75 fix(gpt_rme): use correct print format for uint64_t by Manish Pandey · 3 years, 1 month ago
- ba100f2 fix(spmd): error macro to use correct print format by Olivier Deprez · 3 years, 1 month ago
- 9147d62 Merge "feat(SPMD): route secure interrupts to SPMC" into integration by Olivier Deprez · 3 years, 1 month ago
- 927ebea Merge "fix: libc: use long for 64-bit types on aarch64" into integration by Manish Pandey · 3 years, 1 month ago
- e5dcf98 fix: libc: use long for 64-bit types on aarch64 by Scott Branden · 4 years, 3 months ago
- fd73e52 feat(ff-a): feature retrieval through FFA_FEATURES call by J-Alves · 3 years, 1 month ago
- cceb785 fix(sdei): fix assert while kdump issue by Ming Huang · 3 years, 3 months ago
- a664c49 feat(SPMD): route secure interrupts to SPMC by Olivier Deprez · 4 years, 4 months ago
- ab5d76b fix(sdei): print event number in hex format by Vasyl Gomonovych · 3 years, 3 months ago
- 9d13402 refactor(gpt): productize and refactor GPT library by johpow01 · 3 years, 5 months ago
- 4d37db8 feat(rme): add ENABLE_RME build option and support for RMM image by Zelalem Aweke · 3 years, 5 months ago
- c8bc23e feat(rme): add Test Realm Payload (TRP) by Zelalem Aweke · 3 years, 5 months ago
- 13dc8f1 feat(rme): add RMM dispatcher (RMMD) by Zelalem Aweke · 3 years, 5 months ago
- 2e56717 Merge "feat(ff-a): adding notifications SMC IDs" into integration by Olivier Deprez · 3 years, 2 months ago
- 2621cfd feat(ff-a): adding notifications SMC IDs by J-Alves · 3 years, 9 months ago
- 4ab7a4a refactor(spmd): boot interface and pass core id by Olivier Deprez · 3 years, 5 months ago
- 07f45d1 services: Fix pmr_el1 rewrote issue in sdei_disaptch_event() by Ming Huang · 3 years, 7 months ago
- 44b4333 fix(sdei): set SPSR for SDEI based on TakeException by Daniel Boulby · 4 years ago
- 15937e2 Merge "feat(spmd): add support for FFA_SPM_ID_GET" into integration by Olivier Deprez · 3 years, 5 months ago
- 9a2e5be perf(spmd): omit sel1 context save if sel2 present by Olivier Deprez · 3 years, 6 months ago
- c73254b Merge changes from topic "Arm_PCI_Config_Space_Interface" into integration by Manish Pandey · 3 years, 6 months ago
- c8c3e0d SMCCC/PCI: Handle std svc boilerplate by Jeremy Linton · 4 years ago
- 6b19fe1 SMCCC: Hoist SMC_32 sanitization by Jeremy Linton · 3 years, 8 months ago
- 27f35df feat(spmd): add support for FFA_SPM_ID_GET by Daniel Boulby · 3 years, 10 months ago
- e619fa9 fix(services): drop warning on unimplemented calls by Andre Przywara · 3 years, 7 months ago
- 591d3d1 Merge changes from topic "od/ns-interrupts" into integration by Olivier Deprez · 3 years, 7 months ago
- ae18caf spmd: add FFA_INTERRUPT forwarding by Olivier Deprez · 3 years, 8 months ago
- 18ac54a services: spm_mm: Use sp_boot_info to set SP context by Mayur Gudmeti · 3 years, 9 months ago
- 64ff993 SPM: Fix error codes size in SPMD handler by J-Alves · 3 years, 9 months ago
- ae34f4d Bug fix in tspd interrupt handling when TSP_NS_INTR_ASYNC_PREEMPT is enabled by Madhukar Pappireddy · 4 years, 2 months ago
- e799f48 SPMD: lock the g_spmd_pm structure by Olivier Deprez · 3 years, 9 months ago
- eae4596 FF-A: implement FFA_SECONDARY_EP_REGISTER by Olivier Deprez · 3 years, 10 months ago
- c55ff34 SDEI: updata the affinity of shared event by Tony Xie · 3 years, 11 months ago
- 95dfb87 Revert "spmd: ensure SIMD context is saved/restored on SPMC entry/exit" by Max Shvetsov · 3 years, 9 months ago
- d734f71 spmd: ensure SIMD context is saved/restored on SPMC entry/exit by Olivier Deprez · 4 years ago
- 56f55c9 services: TRNG: Fix -O0 compilation by Andre Przywara · 3 years, 10 months ago
- 26c5b5c Add TRNG Firmware Interface service by Jimmy Brisson · 4 years, 5 months ago
- c082f03 Aarch64: Add support for FEAT_PANx extensions by Alexei Fedorov · 4 years ago
- 05b3370 spmd: Fix signedness comparison warning by Andre Przywara · 4 years, 2 months ago
- 7f76a26 Merge "spmd: remove assert for SPMC PC value" into integration by Mark Dykes · 4 years, 2 months ago
- f80c64d Fix: fixing coverity issue for SPM Core. by Max Shvetsov · 4 years, 3 months ago
- ed1bf28 spmd: remove assert for SPMC PC value by Varun Wadekar · 4 years, 3 months ago
- 88e51e4 spd: trusty: allow clients to retrieve service UUID by Varun Wadekar · 5 years ago
- 93dff70 SPMD: Dont forward PARTITION_INFO_GET from secure FF-A instance by Ruari Phipps · 4 years, 4 months ago
- 73ef0dc SPMC: embed secondary core ep info into to SPMC context by Olivier Deprez · 4 years, 5 months ago
- c7631a5 SPMD: secondary cores PM on and off SPD hooks relayed to SPMC by Olivier Deprez · 4 years, 8 months ago
- 33e4412 SPMD: handle SPMC message to register secondary core entry point by Olivier Deprez · 4 years, 7 months ago
- ebc3477 SPMD: introduce SPMC to SPMD messages by Olivier Deprez · 4 years, 7 months ago
- 9afca12 SPMD: register the SPD PM hooks by Olivier Deprez · 5 years ago
- be67111 SPMD: add generic SPD PM handlers by Olivier Deprez · 5 years ago
- 7c01633 SPMD: enhance SPMC internal boot states by Olivier Deprez · 5 years ago
- 87a9ee7 SPMD: entry point info get helper by Olivier Deprez · 5 years ago
- bde5c95 Add wrapper for AT instruction by Manish V Badarkhe · 4 years, 4 months ago
- 80f13ee SMCCC: Introduce function to check SMCCC function availability by Manish V Badarkhe · 4 years, 4 months ago
- 4c95c70 FFA Version interface update by J-Alves · 4 years, 6 months ago
- 813b50b xlat_tables_v2: add base table section name parameter for spm_mm by Masahisa Kojima · 4 years, 6 months ago
- 2672cde SPCI is now called PSA FF-A by J-Alves · 4 years, 7 months ago
- d0dbd5e plat/arm/fvp: Support performing SDEI platform setup in runtime by Balint Dobszay · 5 years ago
- 69ca84a SPMD: extract SPMC DTB header size from SPMD by Olivier Deprez · 4 years, 10 months ago
- 2bae35f SPMD: code/comments cleanup by Olivier Deprez · 4 years, 7 months ago
- 709bc37 Fix SMCCC_ARCH_SOC_ID implementation by Manish V Badarkhe · 4 years, 7 months ago
- 95867b1 spd: tlkd: support new TLK SMCs for RPMB service by Mustafa Yigit Bilgen · 6 years ago
- f09264a tlkd: remove system off/reset handlers by Varun Wadekar · 6 years ago
- bebb0d7 spd: trusty: disable error messages seen during boot by Varun Wadekar · 6 years ago
- f809c6e Implement SMCCC_ARCH_SOC_ID SMC call by Manish V Badarkhe · 4 years, 9 months ago
- 38a4c87 Merge "SPMD: Add support for SPCI_ID_GET" into integration by Sandrine Bailleux · 4 years, 9 months ago
- e79062e SPMD: Add support for SPCI_ID_GET by Max Shvetsov · 4 years, 9 months ago
- 079e20e spd: tlkd: secure timer interrupt handler by Varun Wadekar · 6 years ago
- e7fd80e SPMD: add command line parameter to run SPM at S-EL2 or S-EL1 by Max Shvetsov · 4 years, 9 months ago
- 41ff36a SPMD: smc handler qualify secure origin using booleans by Olivier Deprez · 5 years ago
- 745889c SPMD: SPMC init, SMC handler cosmetic changes by Max Shvetsov · 4 years, 9 months ago
- c9e2c92 SPMD: Adds partially supported EL2 registers. by Max Shvetsov · 4 years, 9 months ago
- bdf502d SPMD: save/restore EL2 system registers. by Max Shvetsov · 4 years, 9 months ago
- 1333517 Use consistent SMCCC error code by Manish V Badarkhe · 4 years, 9 months ago
- 2d9c87d Merge "coverity: fix MISRA violations" into integration by Mark Dykes · 4 years, 9 months ago
- 91d8061 coverity: fix MISRA violations by Zelalem · 4 years, 10 months ago
- 8bd1e93 trusty: generic-arm64-smcall: Support gicr address by Arve Hjønnevåg · 5 years ago
- 743822a trusty: Allow gic base to be specified with GICD_BASE by Arve Hjønnevåg · 7 years ago
- 41ba13f trusty: Allow getting trusty memsize from BL32_MEM_SIZE instead of TSP_SEC_MEM_SIZE by Arve Hjønnevåg · 7 years ago
- 3e1f197 SPMD: hook SPMD into standard services framework by Achin Gupta · 5 years ago
- 86f2353 SPMD: add SPM dispatcher based upon SPCI Beta 0 spec by Achin Gupta · 5 years ago
- 0f7e601 Prevent speculative execution past ERET by Anthony Steinhauser · 4 years, 11 months ago
- 49cabec spm-mm: Rename aarch64 assembly files by Paul Beesley · 5 years ago
- e449d6a spm-mm: Rename source files by Paul Beesley · 5 years ago
- a24ed07 spm-mm: Rename spm_shim_private.h by Paul Beesley · 5 years ago