The patch set is submit to https://review.trustedfirmware.org/q/topic:%22remove-deprecated-test%22+(status:open%20OR%20status:merged) for review.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Dec 13 2019
Dec 12 2019
The change to CI scripts is merged.
patches to implement panic-related functions:
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2779/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2780/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2781/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2782/
Dec 11 2019
Hi Antonio, it looks like the patch is forgotten by reviewers.
Patch set has been uploaded to https://review.trustedfirmware.org/q/topic:%22template_plat_files%22+(status:open%20OR%20status:merged) for review.
CI should be updated to remove the tracking of deprecated test cases, before the patch set is uploaded.
The patch to modify CI scripts is under review on https://review.trustedfirmware.org/c/ci/tf-m-ci-scripts/+/2745.
Dec 10 2019
https://review.trustedfirmware.org/c/trusted-firmware-m/+/2608
https://review.trustedfirmware.org/c/trusted-firmware-m/+/2609
https://review.trustedfirmware.org/c/trusted-firmware-m/+/2610
https://review.trustedfirmware.org/c/trusted-firmware-m/+/2673
https://review.trustedfirmware.org/c/trusted-firmware-m/+/2672
Dec 9 2019
besides CMSIS USART driver compliant work, also remove printing with SVC together.
Dec 6 2019
Related changes:
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2679/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2742/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2954/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3139/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3140/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3141/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3142/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3143/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3144/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3145/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3146/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3147/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/3148/
Patch had been merged into the master branch.
The patch for address this: https://review.trustedfirmware.org/c/trusted-firmware-m/+/2738/
The topic of the patches for this:
https://review.trustedfirmware.org/q/topic:%22out_of_tree_build%22+(status:open%20OR%20status:merged)
Dec 5 2019
Patch submitted for review as https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/2724
Snapcraft distributes builds for the latest stable versions of CMake: https://snapcraft.io/cmake
Perhaps consider recommended it be installed through that? On Ubuntu it is as simple as sudo snap install cmake --classic.
Changes for this issue had been merged.
Dec 4 2019
Snapcraft distributes builds for the latest stable versions of CMake: https://snapcraft.io/cmake
Dec 3 2019
Thanks @jwerner. Will try this.
Hi, @RobertRostohar
If we remove the "FILE _stdout" declaration from uart_stdout.c as mentioned(It prevents Clib mutex initialization), ARMCLANG image will not output anything anymore.
As the example shown in the link:
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100073_0613_00_en/chr1358938930615.html
"FILE _stdout" is needed for retargeting.
We do not have the same environment(CMSIS-Pack with MDK environment) to reproduce the output in your environment.
Wonder if you knew the root cause of why "FILE __stdout" prevents Clib mutex initialization?
Dec 2 2019
You'll probably want to write a function like this:
CC312 support on Musca-B1 was merged to master:
Hi Sandeep, could you please send a mail to the mailing list for this.
Nov 29 2019
Change for this issue: https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2661/
Sure, I've worked out some patches and are testing and refining them, will submit them for review if no issues found.
@kevin-peng-hao can you update some progress?
Nov 28 2019
Change for the following documents
- Code Generation With Jinja2
- Non-Secure Interrupt Handling
- Non-secure Client Management
- Secure Partition Interrupt Handling
- Uniform Secure Service Signature
Nov 27 2019
Issue for this change: https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/2651/
Working on the proposal.
@kevin-peng-hao has sent out the design in TF-M mailing list for review. Please check @ademars .
@KenLSoft will look at the UART interrupt support in SVC issue.