1. 99b5b2e build: remove `MAKE_BUILD_STRINGS` function by Chris Kay · Fri Mar 08 16:08:31 2024 +0000
  2. c1be66f refactor(mte): remove mte, mte_perm by Govindraj Raja · Thu Mar 07 14:42:20 2024 -0600
  3. d7b63ac feat(mte): add mte2 feat by Govindraj Raja · Fri Jan 26 10:08:37 2024 -0600
  4. 24d3a4e refactor(mte): deprecate CTX_INCLUDE_MTE_REGS by Govindraj Raja · Thu Dec 21 13:57:49 2023 -0600
  5. 55ca30d fix(tsp): flush uart console by Govindraj Raja · Mon May 22 13:22:42 2023 -0500
  6. 1f55c41 refactor(cpufeat): enable FEAT_DIT for FEAT_STATE_CHECKED by Andre Przywara · Thu Jan 26 16:47:52 2023 +0000
  7. e3878ca feat(tsp): enable test cases for EL3 SPMC by Marc Bonnici · Thu Dec 23 20:14:34 2021 +0000
  8. 6b4ec24 feat(tsp): add FF-A support to the TSP by Achin Gupta · Mon Oct 04 20:13:36 2021 +0100
  9. 60786e7 test(el3-runtime): dit is retained on world switch by Daniel Boulby · Fri Oct 22 11:37:34 2021 +0100
  10. e5dcf98 fix: libc: use long for 64-bit types on aarch64 by Scott Branden · Tue Aug 25 13:49:32 2020 -0700
  11. 7d616ee TSP: Fix GCC 11.0.0 compilation error. by Alexei Fedorov · Fri Nov 13 12:36:49 2020 +0000
  12. 2598c41 Bug fix: Protect TSP prints with lock by Madhukar Pappireddy · Fri Mar 20 01:46:21 2020 -0500
  13. c4b47a2 TSP: corrected log information by Manish Pandey · Fri Mar 06 14:36:25 2020 +0000
  14. f41355c Refactor ARMv8.3 Pointer Authentication support code by Alexei Fedorov · Fri Sep 13 14:11:59 2019 +0100
  15. 1c7c13a Enable MTE support in both secure and non-secure worlds by Justin Chadwell · Thu Jul 18 14:25:33 2019 +0100
  16. e61ece0 TSP: Enable pointer authentication support by Antonio Nino Diaz · Tue Feb 26 11:41:03 2019 +0000
  17. de97ff3 Remove duplicated definitions of linker symbols by Antonio Nino Diaz · Fri Jan 25 13:28:38 2019 +0000
  18. 1fbc97b Correct typographical errors by Paul Beesley · Fri Jan 11 18:26:51 2019 +0000
  19. e0f9063 Sanitise includes across codebase by Antonio Nino Diaz · Fri Dec 14 00:18:21 2018 +0000
  20. e93a0f4 types: use int-ll64 for both aarch32 and aarch64 by Masahiro Yamada · Fri Feb 02 15:09:36 2018 +0900
  21. f251a4c Merge pull request #925 from dp-arm/dp/spdx by davidcunado-arm · Thu May 04 16:35:19 2017 +0100
  22. fa3cf0b Use SPDX license identifiers by dp-arm · Wed May 03 09:38:09 2017 +0100
  23. 28f69ab Update terminology: standard SMC to yielding SMC by David Cunado · Wed Apr 05 11:34:03 2017 +0100
  24. f212965 Abort preempted TSP STD SMC after PSCI CPU suspend by Douglas Raillard · Thu Nov 24 15:43:19 2016 +0000
  25. bdba5e5 TSP: Print BL32_BASE rather than __RO_START__ by Sandrine Bailleux · Thu Jun 16 14:24:26 2016 +0100
  26. 9a0ff9b Pass the target suspend level to SPD suspend hooks by Achin Gupta · Mon Sep 07 20:43:27 2015 +0100
  27. da43b66 PSCI: Migrate SPDs and TSP to the new platform and framework API by Soby Mathew · Wed Jul 08 21:45:46 2015 +0100
  28. f05c1b5 Add linker symbol declarations to bl_common.h by Dan Handley · Mon Apr 27 11:49:22 2015 +0100
  29. 8723adf Enable type-checking of arguments passed to printf() et al. by Sandrine Bailleux · Thu Feb 05 15:42:31 2015 +0000
  30. f512157 Save 'power_state' early in PSCI CPU_SUSPEND call by Soby Mathew · Tue Sep 30 11:19:51 2014 +0100
  31. 2ae2043 Remove coherent memory from the BL memory maps by Soby Mathew · Thu Jan 08 18:02:44 2015 +0000
  32. 4dc4a47 Add support for PSCI SYSTEM_OFF and SYSTEM_RESET APIs by Juan Castillo · Tue Aug 12 11:17:06 2014 +0100
  33. 4fd2f5c Clarify platform porting interface to TSP by Dan Handley · Mon Aug 04 11:41:20 2014 +0100
  34. e2c27f5 Move TSP private declarations into separate header by Dan Handley · Fri Aug 01 17:58:27 2014 +0100
  35. 91b624e Rationalize console log output by Dan Handley · Tue Jul 29 17:14:00 2014 +0100
  36. 04be3a5 Add support for printing version at runtime by Juan Castillo · Mon Jun 30 11:41:46 2014 +0100
  37. afe7e2f Implement a leaner printf for Trusted Firmware by Soby Mathew · Thu Jun 12 17:23:58 2014 +0100
  38. 7ce42df Move BL porting functions into platform.h by Dan Handley · Thu May 15 14:11:36 2014 +0100
  39. ed6ff95 Split platform.h into separate headers by Dan Handley · Wed May 14 17:44:19 2014 +0100
  40. 891c4ca Use a vector table for TSP entrypoints by Andrew Thoelke · Tue May 20 21:43:27 2014 +0100
  41. 9f71f70 Non-Secure Interrupt support during Standard SMC processing in TSP by Soby Mathew · Fri May 09 20:49:17 2014 +0100
  42. bbc33f2 Enable secure timer to generate S-EL1 interrupts by Achin Gupta · Fri May 09 13:33:42 2014 +0100
  43. 7671789 Add support for synchronous FIQ handling in TSP by Achin Gupta · Fri May 09 11:42:56 2014 +0100
  44. d8c9d26 Rework memory information passing to BL3-x images by Vikram Kanigiri · Fri May 16 18:48:12 2014 +0100
  45. 2bd4ef2 Reduce deep nesting of header files by Dan Handley · Wed Apr 09 13:14:54 2014 +0100
  46. e2712bc Always use named structs in header files by Dan Handley · Thu Apr 10 15:37:22 2014 +0100
  47. ecf0a71 Generate build time and date message at link time. by Jon Medhurst · Mon Feb 17 12:18:24 2014 +0000
  48. 916a2c1 Rework arithmetic operations in Test Secure Payload by Achin Gupta · Sun Feb 09 23:11:46 2014 +0000
  49. 607084e Add power management support in the SPD by Achin Gupta · Sun Feb 09 18:24:19 2014 +0000
  50. 7c88f3f Add Test Secure Payload (BL3-2) image by Achin Gupta · Tue Feb 18 18:09:12 2014 +0000