@odeprez / Arm might be able to comment on this.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Sep 7 2020
Sep 2 2020
Sep 1 2020
patch link:
https://review.trustedfirmware.org/c/TF-M/tf-m-tests/+/5498
https://review.trustedfirmware.org/c/TF-M/tf-m-tests/+/5528
Another side patch:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5497
Aug 31 2020
The fix for this issue had been merged.
Aug 30 2020
Got it! Thanks for sharing such info... I concur that innovation is our companion. It encourages us to do things we have to manage, facilitate our lives. Concerning me I downloaded https://topspying.com/spy-on-a-cell-phone-without-accessing-it/ not to stress over the individual existence of my kids. You know, they are youthful and others may exploit them, so I don't imagine that spy on their mobile phones is the most exceedingly awful thought. I'm understanding when I'm getting to their own information and see that it is nothing to stress over
Aug 29 2020
what about SMMUV3.x ?
Aug 28 2020
Aug 27 2020
Attaching the test logs running the regression configurations:
Attaching the logs applying the changes and running the regression configs:
For Musca-S1:
Aug 26 2020
I've tested the scripts on OS X by changing readlink to greadlink (available via brew install coreutils), since the OS X system readlink doesn't support the -f option, and this works fine on OS X. A simple platform check is required to two of the scripts, similar to what you see here: https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/platform/ext/target/nxp/lpcxpresso55s69/scripts/build.sh#n11
Change for this issue: https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5443
Aug 25 2020
Aug 24 2020
Aug 21 2020
patch link:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5391
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5440
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5441
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5442
Aug 20 2020
As the first version is table, close this task.
Aug 19 2020
I believe this has been covered.
Aug 18 2020
patch link:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5330
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5369
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5370
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5375
Aug 17 2020
merged
The interrupt will trigger in Secure side without this change, but the secure side interrupt of UART3 is a dead loop at the moment.
Aug 13 2020
patch link:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5283
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5328
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5329
Aug 12 2020
Proposed solution:
Aug 10 2020
Aug 6 2020
Aug 5 2020
Use separate source for different models:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5101