{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":55159029,"defaultBranch":"gendrv","name":"linux-1","ownerLogin":"jenswi-linaro","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2016-03-31T14:56:07.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/6150306?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1724920164.0","currentOid":""},"activityList":{"items":[{"before":"d22391b07a787ba206b999e8c7a25d374ae8a8fc","after":"ca48f451a7e842e487f2779cdd536c813bf3e56d","ref":"refs/heads/prototype/sdp-v1","pushedAt":"2024-08-29T12:09:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"dma-buf: heaps: add Linaro restricted dmabuf heap support\n\nAdd a Linaro restricted heap using the linaro,restricted-heap bindings\nimplemented based on the generic restricted heap.\n\nThe bindings defines a range of physical restricted memory. The heap\nmanages this address range using genalloc. The allocated dma-buf file\ndescriptor can later be registered with the TEE subsystem for later use\nvia Trusted Applications in the secure world.\n\nCo-developed-by: Olivier Masse \nSigned-off-by: Olivier Masse \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"dma-buf: heaps: add Linaro restricted dmabuf heap support"}},{"before":null,"after":"d22391b07a787ba206b999e8c7a25d374ae8a8fc","ref":"refs/heads/prototype/sdp-v1","pushedAt":"2024-08-29T08:29:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"dma-buf: heaps: add Linaro restricted dmabuf heap support\n\nAdd a Linaro restricted heap using the linaro,restricted-heap bindings\nimplemented based on the generic restricted heap.\n\nThe bindings defines a range of physical restricted memory. The heap\nmanages this address range using genalloc. The allocated dma-buf file\ndescriptor can later be registered with the TEE subsystem for later use\nvia Trusted Applications in the secure world.\n\nCo-developed-by: Olivier Masse \nSigned-off-by: Olivier Masse \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"dma-buf: heaps: add Linaro restricted dmabuf heap support"}},{"before":null,"after":"7dceefbf7311eca3c531939ada590df163d032c5","ref":"refs/heads/posted/rpmb_optee_v7","pushedAt":"2024-05-29T13:43:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: probe RPMB device using RPMB subsystem\n\nAdds support in the OP-TEE drivers (both SMC and FF-A ABIs) to probe and\nuse an RPMB device via the RPMB subsystem instead of passing the RPMB\nframes via tee-supplicant in user space. A fallback mechanism is kept to\nroute RPMB frames via tee-supplicant if the RPMB subsystem isn't\navailable.\n\nThe OP-TEE RPC ABI is extended to support iterating over all RPMB\ndevices until one is found with the expected RPMB key already\nprogrammed.\n\nSigned-off-by: Jens Wiklander \nTested-by: Manuel Traut ","shortMessageHtmlLink":"optee: probe RPMB device using RPMB subsystem"}},{"before":"c7816122ea50d151ac3e19f88e1859201ad1cbc7","after":"de86e77009d43ae20e292cf78ce799cd1262f1a8","ref":"refs/heads/xen-notif2","pushedAt":"2024-03-07T09:49:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"firmware: arm_ffa: fix ffa_notification_info_get()\n\nFFA_NOTIFICATION_INFO_GET retries information about pending\nnotifications. Notifications can be either global or per VCPU. Global\nnotifications are represented by the VM ID only, or 0 in the absence of\na hypervisor. ffa_notification_info_get() incorrectly expect no ID at all\nfor global notifications. Fix this by checking for 1 ID instead of 0.\n\nFixes: 3522be48d82b (\"firmware: arm_ffa: Implement the NOTIFICATION_INFO_GET interface\")\nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"firmware: arm_ffa: fix ffa_notification_info_get()"}},{"before":"827c6e09ef66b0ea127edc67bc88518aaa7ca92a","after":null,"ref":"refs/heads/optee-updates-from-upstream","pushedAt":"2024-01-31T09:52:58.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"}},{"before":"c279ebb50204cd3744b9b824f3d1a66a42eee5f2","after":"827c6e09ef66b0ea127edc67bc88518aaa7ca92a","ref":"refs/heads/optee-updates-from-upstream","pushedAt":"2024-01-30T12:44:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: add missing description of RPC argument reference\n\nAdds missing inline description comment for RPC optional arguments\nreference.\n\nReported-by: kernel test robot \nCloses: https://lore.kernel.org/lkml/202310192021.fvb6JDOY-lkp@intel.com/\nSigned-off-by: Etienne Carriere \nReviewed-by: Sumit Garg \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: add missing description of RPC argument reference"}},{"before":null,"after":"c279ebb50204cd3744b9b824f3d1a66a42eee5f2","ref":"refs/heads/optee-updates-from-upstream","pushedAt":"2024-01-30T11:42:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: add missing description of RPC argument reference\n\nAdds missing inline description comment for RPC optional arguments\nreference.\n\nReported-by: kernel test robot \nCloses: https://lore.kernel.org/lkml/202310192021.fvb6JDOY-lkp@intel.com/\nSigned-off-by: Etienne Carriere \nReviewed-by: Sumit Garg \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: add missing description of RPC argument reference"}},{"before":"b309d979dc8bd7540ffbbf881770dbefac579f40","after":null,"ref":"refs/heads/rpbm_optee_rfc1_base","pushedAt":"2024-01-29T15:30:32.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"}},{"before":"2870e30bb74ff88ca7a2c10c837d227ee1299a07","after":null,"ref":"refs/heads/rpmb_optee_rfc1","pushedAt":"2024-01-29T15:29:47.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"}},{"before":"f00abf7ef49af690ef5027587f24dc8103dd4093","after":"2870e30bb74ff88ca7a2c10c837d227ee1299a07","ref":"refs/heads/rpmb_optee_rfc1","pushedAt":"2024-01-29T13:41:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: probe RPMB device using RPMB subsystem\n\nAdds support in the OP-TEE drivers (both SMC and FF-A ABIs) to probe and\nuse an RPMB device via the RPBM subsystem instead of passing the RPMB\nframes via tee-supplicant in user space. A fallback mechanism is kept to\nroute RPMB frames via tee-supplicant if the RPMB subsystem isn't\navailable.\n\nThe OP-TEE RPC ABI is extended to support iterating over all RPMB\ndevices until one is found with the expected RPMB key already\nprogrammed.\n\nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: probe RPMB device using RPMB subsystem"}},{"before":null,"after":"b309d979dc8bd7540ffbbf881770dbefac579f40","ref":"refs/heads/rpbm_optee_rfc1_base","pushedAt":"2024-01-29T13:39:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: allocate shared memory with alloc_pages_exact()\n\nAllocate memory to share with the secure world using alloc_pages_exact()\ninstead of alloc_pages() for more efficient memory usage.\n\nReviewed-by: Sumit Garg \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: allocate shared memory with alloc_pages_exact()"}},{"before":null,"after":"f00abf7ef49af690ef5027587f24dc8103dd4093","ref":"refs/heads/rpmb_optee_rfc1","pushedAt":"2024-01-29T11:28:33.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: probe RPMB device using RPMB subsystem\n\nAdds support in the OP-TEE drivers (both SMC and FF-A ABIs) to probe and\nuse an RPMB device via the RPBM subsystem instead of passing the RPMB\nframes via tee-supplicant in user space. A fallback mechanism is kept to\nroute RPMB frames via tee-supplicant if the RPMB subsystem isn't\navailable.\n\nThe OP-TEE RPC ABI is extended to support iterating over all RPMB\ndevices until one is found with the expected RPMB key already\nprogrammed.\n\nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: probe RPMB device using RPMB subsystem"}},{"before":null,"after":"c7816122ea50d151ac3e19f88e1859201ad1cbc7","ref":"refs/heads/xen-notif2","pushedAt":"2024-01-11T10:40:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"xen-notif-fix","shortMessageHtmlLink":"xen-notif-fix"}},{"before":null,"after":"ff028982bfcbd276336ae4d88574cfe7dfb2fd73","ref":"refs/heads/alex-rpmb-rebase","pushedAt":"2023-11-17T09:28:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"[fixup] rpmb: add Replay Protected Memory Block (RPMB) subsystem","shortMessageHtmlLink":"[fixup] rpmb: add Replay Protected Memory Block (RPMB) subsystem"}},{"before":"1e569f46c91899dc60736059f8870fe92b712da5","after":null,"ref":"refs/heads/swg_system_thread","pushedAt":"2023-10-24T11:36:59.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"}},{"before":null,"after":"1e569f46c91899dc60736059f8870fe92b712da5","ref":"refs/heads/swg_system_thread","pushedAt":"2023-10-24T06:47:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"firmware: arm_scmi: optee: use optee system invocation\n\nChanges SCMI optee transport to call tee_client_system_session()\nto request optee driver to provision an entry context in OP-TEE\nfor processing OP-TEE messages. This prevents possible deadlock\nin case OP-TEE threads are all consumed while these may be waiting\nfor a clock or regulator to be enable which SCMI OP-TEE service which\nrequires a free thread context to execute.\n\nCc: Sudeep Holla \nCc: Cristian Marussi \nAcked-by: Sudeep Holla \nReviewed-by: Sumit Garg \nSigned-off-by: Etienne Carriere \nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"firmware: arm_scmi: optee: use optee system invocation"}},{"before":null,"after":"23031500312a1ddf0e7b8e034f3f530cf64ea3d1","ref":"refs/heads/notif_wip","pushedAt":"2023-10-19T08:42:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"optee: ffa_abi: add asynchronous notifications\n\nAdds support for asynchronous notifications from OP-TEE in secure world\nwhen communicating via FF-A. In principle from OP-TEE and kernel driver\npoint of view this works in the same way as for the SMC ABI based\nimplementation.\n\nThe OP-TEE FF-A ABI is expanded in OPTEE_FFA_EXCHANGE_CAPABILITIES with\nthe capability OPTEE_FFA_SEC_CAP_ASYNC_NOTIF to indicate that OP-TEE\nsupports asynchronous notifications. OPTEE_FFA_ENABLE_ASYNC_NOTIF is\nalso added to tell that the driver has successfully initialized these\nnotifications.\n\nNotification capability is negotiated while the driver is initialized.\nIf both sides supports these notifications then they are enabled.\n\nThe notification concept in this driver is merged with the FF-A concept,\nthe lower 64 values are reserved for FF-A as asynchronous notifications\nwhile the synchronous notifications uses the higher values.\n\nSo a FF-A notification has to be allocated for each discrete\nasynchronous notification value needed. Only one asynchronous\nnotification value is used at the moment, the \"do bottom half\"\nnotification.\n\nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"optee: ffa_abi: add asynchronous notifications"}},{"before":"31efef61e61f601fdf2f5bf0469b556520da792b","after":null,"ref":"refs/heads/keyctl","pushedAt":"2023-08-24T09:35:13.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"}},{"before":null,"after":"31efef61e61f601fdf2f5bf0469b556520da792b","ref":"refs/heads/keyctl","pushedAt":"2023-08-24T09:33:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"KEYS: trusted: tee: Refactor register SHM usage\n\nThe OP-TEE driver using the old SMC based ABI permits overlapping shared\nbuffers, but with the new FF-A based ABI each physical page may only\nbe registered once.\n\nAs the key and blob buffer are allocated adjancently, there is no need\nfor redundant register shared memory invocation. Also, it is incompatibile\nwith FF-A based ABI limitation. So refactor register shared memory\nimplementation to use only single invocation to register both key and blob\nbuffers.\n\nFixes: 4615e5a34b95 (\"optee: add FF-A support\")\nReported-by: Jens Wiklander \nSigned-off-by: Sumit Garg \nTested-by: Jens Wiklander \nReviewed-by: Jens Wiklander ","shortMessageHtmlLink":"KEYS: trusted: tee: Refactor register SHM usage"}},{"before":"7ad5e02cb140073a002bf9beba0cc6bfcff3ffa8","after":"1b372e0c0bf3827e04223510619d7ad490840321","ref":"refs/heads/rfc_sys_threads","pushedAt":"2023-03-16T10:01:48.753Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"[review] tee: optee: support tracking system threads\n\nAddressing a comment.\n\nSigned-off-by: Jens Wiklander ","shortMessageHtmlLink":"[review] tee: optee: support tracking system threads"}},{"before":"f975bd22401c56b4f8a604e27656fea3aa09d49b","after":"7ad5e02cb140073a002bf9beba0cc6bfcff3ffa8","ref":"refs/heads/rfc_sys_threads","pushedAt":"2023-03-15T09:31:29.544Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"firmware: arm_scmi: optee: use optee system invocation\n\nChanges SCMI optee transport to call tee_client_system_session()\nto request optee driver to provision an entry context in OP-TEE\nfor processing OP-TEE messages. This prevents possible deadlock\nin case OP-TEE threads are all consumed while these may be waiting\nfor a clock or regulator to be enable which SCMI OP-TEE service which\nrequires a free thread context to execute.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"firmware: arm_scmi: optee: use optee system invocation"}},{"before":null,"after":"f975bd22401c56b4f8a604e27656fea3aa09d49b","ref":"refs/heads/rfc_sys_threads","pushedAt":"2023-03-15T09:23:17.290Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jenswi-linaro","name":"Jens Wiklander","path":"/jenswi-linaro","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6150306?s=80&v=4"},"commit":{"message":"firmware: arm_scmi: optee: use optee system invocation\n\nChanges SCMI optee transport to call tee_client_system_session()\nto request optee driver to provision an entry context in OP-TEE\nfor processing OP-TEE messages. This prevents possible deadlock\nin case OP-TEE threads are all consumed while these may be waiting\nfor a clock or regulator to be enable which SCMI OP-TEE service which\nrequires a free thread context to execute.\n\nSigned-off-by: Etienne Carriere ","shortMessageHtmlLink":"firmware: arm_scmi: optee: use optee system invocation"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0yOVQxMjowOTo0Ny4wMDAwMDBazwAAAASnkTaD","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wMy0xNVQwOToyMzoxNy4yOTAwNzlazwAAAAMD0Gzt"}},"title":"Activity ยท jenswi-linaro/linux-1"}