aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMate Toth-Pal <mate.toth-pal@arm.com>2020-06-15 13:48:34 +0200
committerAnton Komlev <Anton.Komlev@arm.com>2020-07-08 20:07:41 +0000
commit955235a96ea78ea2196d3ea78eb7015bfdc6b00c (patch)
tree49f8b17ff587d5aba88c7f979a1086450ccc2dae
parente0e2d8433ab46ecde9e7b14cc244de86acf760bd (diff)
downloadtrusted-firmware-m-955235a96ea78ea2196d3ea78eb7015bfdc6b00c.tar.gz
Doc: Add changelog for 1.1 release
Create changelog document for 1.1 release and add it to the main changelog document. Add 1.1 release to readme.rst Update version number in tfm_version.h Update version number in Doxygen CMake files. Change-Id: Icb81ab1e5994228772884c7a1dcb878533dcfa33 Signed-off-by: Mate Toth-Pal <mate.toth-pal@arm.com>
-rw-r--r--cmake/Common/BuildDoxygenDoc.cmake2
-rw-r--r--cmake/Common/BuildSphinxDoc.cmake4
-rw-r--r--docs/introduction/readme.rst28
-rw-r--r--docs/reference/changelog.rst1
-rw-r--r--docs/reference/releases/1.1.rst126
-rw-r--r--secure_fw/spm/include/tfm_version.h2
6 files changed, 146 insertions, 17 deletions
diff --git a/cmake/Common/BuildDoxygenDoc.cmake b/cmake/Common/BuildDoxygenDoc.cmake
index 79f536ecc..d1b7cb0e8 100644
--- a/cmake/Common/BuildDoxygenDoc.cmake
+++ b/cmake/Common/BuildDoxygenDoc.cmake
@@ -85,7 +85,7 @@ if (NOT NODOC)
#Version ID of TF-M.
#TODO: this shall not be hard-coded here. A process need to defined for
# versioning the document (and TF-M).
- set(DOXYCFG_TFM_VERSION "v1.0")
+ set(DOXYCFG_TFM_VERSION "v1.1")
#Using add_custom_command allows CMake to generate proper clean commands
#for document generation.
diff --git a/cmake/Common/BuildSphinxDoc.cmake b/cmake/Common/BuildSphinxDoc.cmake
index 65487446a..ab08319c3 100644
--- a/cmake/Common/BuildSphinxDoc.cmake
+++ b/cmake/Common/BuildSphinxDoc.cmake
@@ -84,8 +84,8 @@ if (NOT SPHINX_NODOC)
#Version ID of TF-M.
#TODO: this shall not be hard-coded here. We need a process to define the
# version number of the document (and TF-M).
- set(SPHINXCFG_TFM_VERSION "v1.0")
- set(SPHINXCFG_TFM_VERSION_FULL "Version 1.0")
+ set(SPHINXCFG_TFM_VERSION "v1.1")
+ set(SPHINXCFG_TFM_VERSION_FULL "Version 1.1")
get_filename_component(_NDX_FILE_DIR ${SPHINX_CONFIGURED_INDEX_FILE} DIRECTORY )
diff --git a/docs/introduction/readme.rst b/docs/introduction/readme.rst
index 00fc78060..7e214c2ef 100644
--- a/docs/introduction/readme.rst
+++ b/docs/introduction/readme.rst
@@ -167,19 +167,21 @@ For this release, feedback is requested via email to
###############
Version history
###############
-+-------------+--------------+--------------------+---------------+
-| Version | Date | Description | PSA-arch tag |
-+=============+==============+====================+===============+
-| v1.0-beta | 2019-02-15 | 1.0-beta release | - |
-+-------------+--------------+--------------------+---------------+
-| v1.0-RC1 | 2019-05-31 | 1.0-RC1 release | v19.06_API0.9 |
-+-------------+--------------+--------------------+---------------+
-| v1.0-RC2 | 2019-10-09 | 1.0-RC2 release | v19.06_API0.9 |
-+-------------+--------------+--------------------+---------------+
-| v1.0-RC3 | 2019-11-29 | 1.0-RC3 release | v19.06_API0.9 |
-+-------------+--------------+--------------------+---------------+
-| v1.0 | 2020-03-27 | 1.0 release | v20.03_API1.0 |
-+-------------+--------------+--------------------+---------------+
++-------------+--------------+--------------------+-------------------+
+| Version | Date | Description | PSA-arch tag/hash |
++=============+==============+====================+===================+
+| v1.0-beta | 2019-02-15 | 1.0-beta release | - |
++-------------+--------------+--------------------+-------------------+
+| v1.0-RC1 | 2019-05-31 | 1.0-RC1 release | v19.06_API0.9 |
++-------------+--------------+--------------------+-------------------+
+| v1.0-RC2 | 2019-10-09 | 1.0-RC2 release | v19.06_API0.9 |
++-------------+--------------+--------------------+-------------------+
+| v1.0-RC3 | 2019-11-29 | 1.0-RC3 release | v19.06_API0.9 |
++-------------+--------------+--------------------+-------------------+
+| v1.0 | 2020-03-27 | 1.0 release | v20.03_API1.0 |
++-------------+--------------+--------------------+-------------------+
+| v1.1 | 2020-07-15 | 1.1 release | 1f960947 |
++-------------+--------------+--------------------+-------------------+
.. _Cortex-M33: https://developer.arm.com/ip-products/processors/cortex-m/cortex-m33
.. _Cortex-M23: https://developer.arm.com/ip-products/processors/cortex-m/cortex-m23
diff --git a/docs/reference/changelog.rst b/docs/reference/changelog.rst
index 25022616e..7e4e538a7 100644
--- a/docs/reference/changelog.rst
+++ b/docs/reference/changelog.rst
@@ -5,6 +5,7 @@ Change Log & Release Notes
This document contains a summary of the new features, changes, fixes and known
issues in each release of Trusted Firmware-M.
+.. include:: ../reference/releases/1.1.rst
.. include:: ../reference/releases/1.0.rst
--------------
diff --git a/docs/reference/releases/1.1.rst b/docs/reference/releases/1.1.rst
new file mode 100644
index 000000000..4a9d7f980
--- /dev/null
+++ b/docs/reference/releases/1.1.rst
@@ -0,0 +1,126 @@
+***********
+Version 1.1
+***********
+
+New Features
+============
+
+- Upgraded MCUBoot to v1.6.0., default is now the upstream MCUBoot instead of
+ the TF-M fork.
+
+- TF-Fuzz tool for fuzz testing PSA APIs.
+
+- Updated Source code folder structure.
+
+- IAR compiler support.
+
+- LPCXpresso55S69-EVK board support.
+
+- Add Profile Small.
+
+- Enable Ninja CMake Generator.
+
+- FVP_SSE300_MPS2 platform support.
+
+- Rename SST(Secure STorage) to PS(Protected Storage) and partition moved from
+ PSA Root of Trust to Application Root of Trust.
+
+- NUCLEO-L552ZE-Q and DISCO-L562QE platform support.
+
+- Restructure documentation to make it more user-friendly.
+
+- Enable Attestation service to use symmetric key algorithm.
+
+- Use CMSIS for testing from
+ `tf-m-tests <https://git.trustedfirmware.org/TF-M/tf-m-tests.git>`__
+ repository. This removes dependency on the external ``CMSIS_5`` repo.
+
+New Platforms supported
+=======================
+
+- Cortex-M33 based system:
+
+ - `LPCXpresso55S69-EVK.
+ <https://www.nxp.com/products/processors-and-microcontrollers/arm-microcontrollers/general-purpose-mcus/lpc5500-cortex-m33/lpcxpresso55s69-development-board:LPC55S69-EVK>`__
+
+ - `NUCLEO-L552ZE-Q.
+ <https://www.st.com/content/st_com/en/products/evaluation-tools/product-evaluation-tools/mcu-mpu-eval-tools/stm32-mcu-mpu-eval-tools/stm32-nucleo-boards/nucleo-l552ze-q.html>`__
+
+ - `DISCO-L562QE.
+ <https://www.st.com/content/st_com/en/products/evaluation-tools/product-evaluation-tools/mcu-mpu-eval-tools/stm32-mcu-mpu-eval-tools/stm32-discovery-kits/stm32l562e-dk.html>`__
+
+- Cortex-M55 based SSE-300 system:
+
+ - `Fast model FVP_SSE300_MPS2.
+ <https://developer.arm.com/tools-and-software/open-source-software/arm-platforms-software/arm-ecosystem-fvps>`__
+
+
+New Platforms limitations
+=========================
+
+- LPCXpresso55S69-EVK doesn't support BL2.
+
+- LPCXpresso55S69-EVK doesn't support ARMCLANG and IARARM toolchain. Patch
+ with support for IARARM is available at
+ `review.trustedfirmware.org #4023 <https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/4023>`__
+
+- FVP_SSE300_MPS2 doesn't support GNUARM and IARARM toolchain. Patch with
+ support for IARARM is available at
+ `review.trustedfirmware.org #4574 <https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/4574>`__
+
+Known issues
+============
+
+Some open issues exist and will not be fixed in this release.
+
+.. list-table::
+
+ * - | All the supported GNUARM toolchain versions generate corrupt veneer
+ | code for Armv8-M baseline architecture, when the -Os optimization flag
+ | is used. This affects the AN519 and AN539 platforms built with GNUARM
+ | toolchain and Minsizerel build type.
+ - Issue: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95646
+
+ * - | AN521 FVP soft reset via AIRCR does not reset MPC / PPC / MPU and will
+ | cause boot failure. This is known issue for AN521 FVP. This will cause
+ | the system to not boot after a warm reset during PSA Arch FF testing.
+ - Issue: https://developer.trustedfirmware.org/T692
+
+ * - | There are 2 additional failures for PSA-Arch Crypto tests with CC-312
+ | other than the known failures. This is due to limitation of CC-312
+ | implementation as it does not support MD_NONE hashing mode causing the
+ | additional failures.
+ - Issue: https://developer.trustedfirmware.org/T691
+
+ * - | Boot up fails if there is unexpected data in flash on Musca-A. The boot
+ | is successful and the tests pass if all the associated (PS/ITS/NV
+ | Counter) flash areas are erased.
+ - Issue: https://developer.trustedfirmware.org/T694
+
+ * - | When PS/ITS are using Flash on Musca-B1, PSA Arch FF test fails due to
+ | known warm reset limitation in the platform. There is an issue with
+ | Musca-B1 QSPI flash that causes this failure. The fix is under
+ | investigation.
+ - Issue: https://developer.trustedfirmware.org/T696
+
+Issues fixed since 1.0
+======================
+
+.. list-table::
+
+ * - | PSA Arch Crypto tests have several known failures.
+ - See this link for detailed analysis of the failures : https://github.com/ARM-software/psa-arch-tests/blob/master/api-tests/docs/test_failure_analysis.md
+
+ * - | The eflash driver on Musca-B1 can return random failures hence
+ | triggering random failures during PSA Arch ITS and PSA Arch PS tests.
+ | This happens when ITS/SST is configured to use flash.
+ - Issue: https://developer.trustedfirmware.org/T697
+
+ * - | Release build of PSA Arch Crypto tests have a different number of tests
+ | when built for AN521 FVP. This is an issue in the PSA Arch Crypto
+ | tests.
+ - Issue for PSA Arch Tests project : https://github.com/ARM-software/psa-arch-tests/issues/169
+
+--------------
+
+*Copyright (c) 2020, Arm Limited. All rights reserved.*
diff --git a/secure_fw/spm/include/tfm_version.h b/secure_fw/spm/include/tfm_version.h
index 461ba9741..086a37700 100644
--- a/secure_fw/spm/include/tfm_version.h
+++ b/secure_fw/spm/include/tfm_version.h
@@ -12,7 +12,7 @@
* Defines for TFM version.
*/
#define VERSION_MAJOR 1
-#define VERSION_MINOR 0
+#define VERSION_MINOR 1
#define VERSION_STRING ""
#endif /* __TFM_VERSION_H__ */