{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":66834057,"defaultBranch":"master","name":"build","ownerLogin":"etienne-lms","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2016-08-29T10:27:14.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/19990310?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1718349200.0","currentOid":""},"activityList":{"items":[{"before":"106dfd47b341e30936207d75ef7da286c2f19b4e","after":"287d5f8f75c0c61919179573ed66d390df46a8eb","ref":"refs/heads/stm32-stmm","pushedAt":"2024-06-14T16:36:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: embed StMM upon WITH_STMM=y\n\nAdd WITH_STMM build directive that, when enabled (WITH_STMM=y), enables\nand embeds StMM service in OP-TEE and enable StMM support in U-Boot\nthanks to a config fragment. When enabled, it also default enables\nWITH_RPMB_TEST for embed RPMB secure storage test configuration in\nOP-TEE OS.\n\nAcked-by: Jens Wiklander \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: embed StMM upon WITH_STMM=y"}},{"before":"3c01b3c30868cbdab4d0f3f68954e6329ccffb3d","after":"106dfd47b341e30936207d75ef7da286c2f19b4e","ref":"refs/heads/stm32-stmm","pushedAt":"2024-06-14T09:27:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"[review] stm32mp1: embed StMM upon WITH_STMM=y\n\nSimplify WITH_RPMB_TEST default value regarding WITH_STMM.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"[review] stm32mp1: embed StMM upon WITH_STMM=y"}},{"before":"0e6837f79e65502f96a1627a640000fc1b8bda75","after":"b0fec8fbbe1faa88492eddc36b70c8f1596e2514","ref":"refs/heads/stm32-emmc","pushedAt":"2024-06-14T07:30:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: retrieve unique eMMC CID for tee-supplicant\n\nRetrieve the eMMC CID if only one eMMC device is found. We expect\nit to be used for OP-TEE RPMB secure storage. This change allows\nOS based on Linux kernel v6.2 or later to be more reliable on\nidentifying the eMMC mmcblk device as since Linux kernel v6.2 the\ndevice index assigned by the kernel may change from one cold boot\nto another when they are several mmcblk devices on the platform,\nfor example a plugged SD card and a soldered eMMC device.\n\nReviewed-by: Jerome Forissier \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: retrieve unique eMMC CID for tee-supplicant"}},{"before":null,"after":"3c01b3c30868cbdab4d0f3f68954e6329ccffb3d","ref":"refs/heads/stm32-stmm","pushedAt":"2024-06-14T07:13:20.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: embed StMM upon WITH_STMM=y\n\nAdd WITH_STMM build directive that, when enabled (WITH_STMM=y), enables\nand embeds StMM service in OP-TEE and enable StMM support in U-Boot\nthanks to a config fragment. When enabled, it also default enables\nWITH_RPMB_TEST for embed RPMB secure storage test configuration in\nOP-TEE OS.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: embed StMM upon WITH_STMM=y"}},{"before":"75599ae6693e45c62f70fc2c8f70e76a56c3ca88","after":"0e6837f79e65502f96a1627a640000fc1b8bda75","ref":"refs/heads/stm32-emmc","pushedAt":"2024-06-14T06:15:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: retrieve unique eMMC CID for tee-supplicant\n\nRetrieve the eMMC CID if only one eMMC device is found. We expect\nit to be used for OP-TEE RPMB secure storage. This change allows\nOS based on Linux kernel v6.2 or later to be more reliable on\nidentifying the eMMC mmcblk device as since Linux kernel v6.2 the\ndevice index assigned by the kernel may change from one cold boot\nto another when they are several mmcblk devices on the platform,\nfor example a plugged SD card and a soldered eMMC device.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: retrieve unique eMMC CID for tee-supplicant"}},{"before":null,"after":"75599ae6693e45c62f70fc2c8f70e76a56c3ca88","ref":"refs/heads/stm32-emmc","pushedAt":"2024-06-13T16:36:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: retrieve unique eMMC CID for tee-supplicant\n\nRetrieve the eMMC CID if only one eMMC device is found. We expect\nit to be used for OP-TEE RPMB secure storage. This change allows\nOS based on Linux kernel v6.2 or later to be more reliable on\nidentifying the eMMC mmcblk device as since Linux kernel v6.2 the\ndevice index assigned by the kernel may change from one cold boot\nto another when they are several mmcblk devices on the platform,\nfor example a plugged SD card and a soldered eMMC device.\n\nThanks to Linaro for proposing the identification sequence [1].\n\nLink: https://github.com/OP-TEE/optee_client/pull/381#issuecomment-2166032817 [1]\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: retrieve unique eMMC CID for tee-supplicant"}},{"before":"3cdc2d0107394d2a378dccb2f8c1b9a772c9b16b","after":"a483ae69a054019f12dfe068eec83835848f4ced","ref":"refs/heads/stm32","pushedAt":"2024-05-27T09:31:38.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: define rootfs from its partition UUID\n\nChange stm32mp1 SDcard image to define the rootfs partition by its\nGPT partition UUID instead of its mmcblk device and partition indices.\nThis is required for Linux kernel v6.2 onward that do not guarantee\ndevice indices when several devices of a same driver are initialized.\n\nSigned-off-by: Etienne Carriere \nAcked-by: Jerome Forissier ","shortMessageHtmlLink":"stm32mp1: define rootfs from its partition UUID"}},{"before":null,"after":"b2b1f1eb7db8dccfaa40f19adb2eba8b03bba4f4","ref":"refs/heads/stm32-rpmb","pushedAt":"2024-05-24T15:25:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: use tee-supplicant option --unique-rpmb\n\nUse tee-supplicant recently added option --unique-rpmb to let\ntee-supplicant find the unique RPMB partition device file since Linux\nkernels v6.2 and later do not guaranty the mmcblk device index passed\nto OP-TEE configuration option CFG_RPMB_FS_DEV_ID is reliable.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: use tee-supplicant option --unique-rpmb"}},{"before":null,"after":"3cdc2d0107394d2a378dccb2f8c1b9a772c9b16b","ref":"refs/heads/stm32","pushedAt":"2024-05-24T15:24:58.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: define rootfs from its partition UUID\n\nChange stm32mp1 SDcard image to define the rootfs partition by its\nGPT partition UUID instead of its mmcblk device and partition indices.\nThis is required for Linux kernel v6.2 onward that do not guarantee\ndevice indices when several devices of a same driver are initialized.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: define rootfs from its partition UUID"}},{"before":"4ed34bcd631311bf3c0b8037cb5a4dbcd5aecf43","after":null,"ref":"refs/heads/stm32","pushedAt":"2024-05-24T15:24:52.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"}},{"before":"c22800709e5121e86015dad7faf34dcf96ce0854","after":null,"ref":"refs/heads/stm32-rpmb","pushedAt":"2024-05-24T15:21:56.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"}},{"before":"656f77f5651580d337fc42b9a02ba3eb9f5950dc","after":null,"ref":"refs/heads/ta-devkit","pushedAt":"2024-05-24T15:21:50.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"}},{"before":"f108b5ab83c72d46710dc1017678e1f4dfbd45b6","after":"656f77f5651580d337fc42b9a02ba3eb9f5950dc","ref":"refs/heads/ta-devkit","pushedAt":"2024-02-01T11:13:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"common: target optee-os-devkit builds the devkit\n\nAdd build target optee-os-devkit to get the TA devkit be built\nand installed. It can be used as a dependency when building external\nTAs that need to be linked to OP-TEE as early TAs in which case\nbuilding OP-TEE core depends on such TAs being already built.\n\nAcked-by: Jerome Forissier \nAcked-by: Jens Wiklander \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"common: target optee-os-devkit builds the devkit"}},{"before":null,"after":"f108b5ab83c72d46710dc1017678e1f4dfbd45b6","ref":"refs/heads/ta-devkit","pushedAt":"2024-01-30T16:53:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"common: target optee-os-devkit builds the devkit\n\nAdds build target optee-os-devkit to get the TA devkit be built\nand installed. It can be later used as a dependency when building\nexternal TAs that need to build linked to OP-TEE as early TAs where\nbuilding OP-TEE core depends on such TAs being already built. This\napplies to ftpm hence replace the dependency of ftpm make target with\na dependency on optee-os-devkit.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"common: target optee-os-devkit builds the devkit"}},{"before":"ed8e6a905eedb3f535d2e43ad2ef6460868ab8a5","after":"c22800709e5121e86015dad7faf34dcf96ce0854","ref":"refs/heads/stm32-rpmb","pushedAt":"2024-01-24T13:02:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: factorize RPMB test S30optee script\n\nS30optee init script does not depend on target platform hence use a\ngeneric directory names (overlay-rootfs-rpmb/) to store this file instead\nof a platform depend directory name (./overlay-STM32MP157C_EV1-rpmb/).\n\nReviewed-by: Igor Opaniuk \nAcked-by: Jerome Forissier \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: factorize RPMB test S30optee script"}},{"before":"a41d22684663d03a3249371bb3c07c8732c8874e","after":"ed8e6a905eedb3f535d2e43ad2ef6460868ab8a5","ref":"refs/heads/stm32-rpmb","pushedAt":"2024-01-19T12:08:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: factorize RPMB test S30optee scritpt\n\nS30optee init script does not depend on target platform hence use a\ngeneric directory names (overlay-rootfs-rpmb/) to store this file instead\nof a platform depend directory name (./overlay-STM32MP157C_EV1-rpmb/).\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: factorize RPMB test S30optee scritpt"}},{"before":null,"after":"a41d22684663d03a3249371bb3c07c8732c8874e","ref":"refs/heads/stm32-rpmb","pushedAt":"2024-01-19T11:49:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: factorize RPMB test S30optee scritpt\n\nS30optee init script does not depend on target paltform hence use a\ngeneric directory names (overlay-rootfs-rpmb/) to store this file instead\nof a platform depend directory name (overlay(STM32MP157C_EV1-rpmb).\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: factorize RPMB test S30optee scritpt"}},{"before":"eb836bd6e513ddbb1208b5ae161b7d67743483a9","after":"4ed34bcd631311bf3c0b8037cb5a4dbcd5aecf43","ref":"refs/heads/stm32","pushedAt":"2024-01-17T16:17:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: factorize RPMB test S30optee scritpt\n\nS30optee init script does not depend on target paltform hence use a\ngeneric directory names (overlay-rootfs-rpmb/) to store this file instead\nof a platform depend directory name (overlay(STM32MP157C_EV1-rpmb).\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: factorize RPMB test S30optee scritpt"}},{"before":"cb1e474a453fd726aa8c53d16db0a6fc5b62250c","after":"eb836bd6e513ddbb1208b5ae161b7d67743483a9","ref":"refs/heads/stm32","pushedAt":"2024-01-17T11:25:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards\n\nDefine 157x_xxx_SCMI platform flavors for STM32MP15 ST boards where RCC\nsecure hardening is enabled and non-secure needs to use SCMI service.\nThese are board DTS file ending with -scmi.dts.\n\nThe default stm32mp1 platform flavor is now 157C_DK2_SCMI.\n\nAcked-by: Gatien Chevallier \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards"}},{"before":"9e32c38c16065ea8703900d14530bf44de2a0f10","after":"cb1e474a453fd726aa8c53d16db0a6fc5b62250c","ref":"refs/heads/stm32","pushedAt":"2023-12-12T14:53:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards\n\nDefine 157x_xxx_SCMI platform flavors for STM32MP15 ST boards where RCC\nsecure hardening is enabled and non-secure needs to use SCMI service.\nThese are board DTS file ending with -scmi.dts.\n\nThe default stm32mp1 platform flavor is now 157C_DK2_SCMI.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards"}},{"before":"4dd3a3d3f238ae37e03e39e0f5014eb45c43e16f","after":"9e32c38c16065ea8703900d14530bf44de2a0f10","ref":"refs/heads/stm32","pushedAt":"2023-12-12T14:23:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards\n\nDefine 157x_xxx_SCMI platform flavors for STM32MP15 ST boards where RCC\nsecure hardening is enabled and non-secure needs to use SCMI service.\nThese are board DTS file ending with -scmi.dts.\n\nThe default stm32mp1 platform flavor is now 157C_DK2_SCMI.\n\nSigned-off-by: Etienne Carriere \n-tz/overlay-STM32MP157C-EV1/boot/extlinux/extlinux.conf","shortMessageHtmlLink":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards"}},{"before":"350c5dcc199c21545a6fcdc3a7d0c2c11640c8c2","after":"4dd3a3d3f238ae37e03e39e0f5014eb45c43e16f","ref":"refs/heads/stm32","pushedAt":"2023-12-12T10:14:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards\n\nDefine 157x_xxx_SCMI platform flavors for STM32MP15 ST boards where RCC\nsecure hardening is enabled and non-secure needs to use SCMI service.\nThese are board DTS file ending with -scmi.dts.\n\nThe default stm32mp1 platform flavor is now 157C_DK2_SCMI.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards"}},{"before":null,"after":"350c5dcc199c21545a6fcdc3a7d0c2c11640c8c2","ref":"refs/heads/stm32","pushedAt":"2023-12-12T09:10:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards\n\nDefine 157x_xxx_ SCMI platform flavors for STM32MP15 ST boards where RCC\nsecure hardening is enabled and non-secure needs to use SCMI service.\nThese are board DTS file ending with -scmi.dts.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: *_SCMI flavor for STM32MP15 ST boards"}},{"before":"70727087d74065759e478f7af06a0fdce12bdd03","after":null,"ref":"refs/heads/stm32","pushedAt":"2023-12-04T11:31:45.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"}},{"before":"7aabe0f3235b9a7a0b0de5c9c6a42e1326ccdcdc","after":"70727087d74065759e478f7af06a0fdce12bdd03","ref":"refs/heads/stm32","pushedAt":"2023-12-04T08:04:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager\n\nAdd build config switch WITH_SRAM1_PAGER_POOL=y|n to assign\nsecure SRAM1 to OP-TEE pager page pool. This relaxes pressure on pager\nwhen used on STM32MP15 platforms. When enabled, CFG_TEE_CORE_DEBUG\nis default enabled, as it is default disabled in the platform\nconf.mk file when pager is enabled.\n\nThe switch is default enabled for ST boards based on STM32MP15 chip.\n\nAcked-by: Jerome Forissier \nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager"}},{"before":null,"after":"7aabe0f3235b9a7a0b0de5c9c6a42e1326ccdcdc","ref":"refs/heads/PR704-prev","pushedAt":"2023-12-04T08:03:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage\n\nMore details in the inline comment describing WITH_RPMB_TEST\nand remove the WARNING trace message.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage"}},{"before":"a2967f43af3b3b100ad205801a4ac758c4ebca67","after":"7aabe0f3235b9a7a0b0de5c9c6a42e1326ccdcdc","ref":"refs/heads/stm32","pushedAt":"2023-11-30T09:43:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage\n\nMore details in the inline comment describing WITH_RPMB_TEST\nand remove the WARNING trace message.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage"}},{"before":"bbbae977a76af3b5945a3868dca4088240bd9c68","after":"a2967f43af3b3b100ad205801a4ac758c4ebca67","ref":"refs/heads/stm32","pushedAt":"2023-11-30T08:25:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage\n\nFix access rights and initd service trace message in board specific\nS30optee.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"[review] stm32mp1: WITH_RPMB_TEST=y enables RPMB secure storage"}},{"before":"c300ba5aeea9a025b7956f62415c623a58eb4058","after":"bbbae977a76af3b5945a3868dca4088240bd9c68","ref":"refs/heads/stm32","pushedAt":"2023-11-29T16:48:21.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"[review] stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager\n\nDiscard enabling CFG_TEE_CORE_DEBUG when WITH_SRAM1_PAGER_POOL=y.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"[review] stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager"}},{"before":"35d899dddd79801f877e61fdc8aa741cd15d7159","after":"c300ba5aeea9a025b7956f62415c623a58eb4058","ref":"refs/heads/stm32","pushedAt":"2023-11-24T17:00:57.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"etienne-lms","name":"Etienne Carriere","path":"/etienne-lms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19990310?s=80&v=4"},"commit":{"message":"stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager\n\nAdd build config switch WITH_SRAM1_PAGER_POOL=y|n to assign\nsecure SRAM1 to OP-TEE pager page pool. This relaxes pressure on pager\nwhen used on STM32MP15 platforms. When enabled, CFG_TEE_CORE_DEBUG\nis default enabled, as it is default disabled in the platform\nconf.mk file when pager is enabled.\n\nThe switch is default enabled for ST boards based on STM32MP15 chip.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"stm32mp1: WITH_SRAM1_PAGER_POOL=y uses SRAM1 for the pager"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNi0xNFQxNjozNjoxNy4wMDAwMDBazwAAAARlqmZU","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMS0yNFQxNzowMDo1Ny4wMDAwMDBazwAAAAO3DgNt"}},"title":"Activity ยท etienne-lms/build"}