blob: 9e281cb05f9e1f232e73d6bd2ee12128deb854bd [file] [log] [blame]
David Huaa7d90a2021-03-24 15:45:45 +08001*************
2Version 1.3.0
3*************
4
5New major features
6==================
7
8 - Support stateless RoT Service defined in FF-M 1.1 [1]_.
9 - Support Second-Level Interrupt Handling (SLIH) defined in FF-M 1.1 [1]_.
10 - Add Firmware Update (FWU) secure service, following Platform Security
11 Architecture Firmware Update API [2]_.
12 - Migrate to Mbed TLS v2.25.0.
13 - Update MCUboot version to v1.7.2.
14 - Add a TF-M generic threat model [3]_ .
15 - Implement Fault Injection Handling library to mitigate physical attacks [4]_.
16 - Add Profile Large [5]_.
17 - Enable code sharing between boot loader and TF-M [6]_.
18 - Support Armv8.1-M Privileged Execute Never (PXN) attribute and Thread
19 reentrancy disabled (TRD) feature.
20 - New platforms added.
Summer Qinabf66982021-04-06 17:22:15 +080021 See :ref:`docs/releases/1.3.0:New platforms supported` for
David Huaa7d90a2021-03-24 15:45:45 +080022 details.
23 - Add a TF-M security landing page [7]_.
24 - Enhance dual-cpu non-secure mailbox reference implementation.
25
26New security advisories
27=======================
28
29Invoking secure functions from non-secure handler mode
30------------------------------------------------------
31
Summer Qinabf66982021-04-06 17:22:15 +080032Refer to :doc:`Advisory TFMV-2</docs/security/security_advisories/svc_caller_sp_fetching_vulnerability>`
David Huaa7d90a2021-03-24 15:45:45 +080033for more details.
34The mitigation is included in this release.
35
36New platforms supported
37=======================
38
39 - Cortex-M23 based system:
40
41 - `Nuvoton M2354.
42 <https://www.nuvoton.com/board/numaker-m2354/>`_
43
44 - Cortex-M55 based system:
45
46 - `FPGA image loaded on MPS3 board (AN547).
47 <https://developer.arm.com/products/system-design/development-boards/cortex-m-prototyping-systems/mps3>`_
48
49 - Secure Enclave system:
50
Summer Qin2de23d02021-05-14 13:44:14 +080051 - :doc:`Musca-B1 Secure Enclave. </platform/ext/target/arm/musca_b1/secure_enclave/readme>`
David Huaa7d90a2021-03-24 15:45:45 +080052
53Deprecated platforms
54====================
55
56The following platforms have been removed from TF-M code base.
57
58 - SSE-200_AWS
59 - AN539
60
Summer Qinabf66982021-04-06 17:22:15 +080061See :doc:`Platform deprecation and removal </platform/ext/platform_deprecation>`
David Huaa7d90a2021-03-24 15:45:45 +080062for other platforms under deprecation process.
63
64Tested platforms
65================
66
67The following platforms are successfully tested in this release.
68
69- AN519
70- AN521
71- AN524
72- AN547
73- LPCXpresso55S69
74- MPS2 SSE300
75- Musca-B1
76- Musca-B1 Secure Enclave
77- Musca-S1
78- M2351
79- M2354
80- nrf5340dk
81- nrf9160dk
82- NUCLEO-L552ZE-Q
83- PSoC 64
84- STM32L562E-DK
85
86Known issues
87============
88
89Some open issues exist and will not be fixed in this release.
90
91.. list-table::
92
93 * - **Descriptions**
94 - **Issue links**
95
96 * - | PSA Arch Crypto test suite have several known failures.
97 - See this `link <https://developer.trustedfirmware.org/w/tf_m/release/psa_arch_crypto_test_failure_analysis_in_tf-m_v1.3_release/>`_
98 for detailed analysis of the failures.
99
100 * - | Protected Storage Regression test 4001 is stuck on SSE-300 in isolation
101 | level 2 when PXN is enabled.
102 - https://developer.trustedfirmware.org/T902
103
104 * - | IPC Regression test fail when non-secure regression test is enabled and
105 | secure regression test is disabled.
106 - https://developer.trustedfirmware.org/T903
107
108 * - | Panic test in PSA Arch IPC test suite generates inconsistent results
109 | between Armclang and GNUARM.
110 - https://developer.trustedfirmware.org/T909
111
112Issues fixed since 1.2.0
113========================
114
115Issues fixed by TF-M since v1.2.0 are listed below.
116
117.. list-table::
118
119 * - **Descriptions**
120 - **Issue links**
121
122 * - | Dual-cpu NS mailbox initialization shall be executed after CMSIS-RTOS
123 | RTX kernel initialization
124 - https://developer.trustedfirmware.org/T904
125
126Issues closed since 1.2.0
127=========================
128
129The following issues are closed since v1.2.0. These issues are related to
130platform hardware limitations or 3rd-party tools and therefore won't be fixed by
131TF-M.
132
133.. list-table::
134
135 * - **Descriptions**
136 - **Issue links**
137
138 * - | ``psa_verify_rsa()`` fails when PSA Crypto processes RSASSA-PSS
139 | algorithm in CryptoCell-312.
140 | Mbed TLS implementation of ``psa_verify_rsa()`` always passes
141 | ``MBEDTLS_MD_NONE`` to ``mbedtls_rsa_rsassa_pss_verify()``.
142 | However, CryptoCell-312 doesn't support MD5 and uses other algorithms
143 | instead. Therefore, Mbed TLS implementation may fail when input
144 | algorithm doesn't match other parameters.
145 - https://github.com/ARMmbed/mbedtls/issues/3990
146
147 * - | Regression tests fail with GNU Arm Embedded toolchain version
148 | 10-2020-q4-major.
149 | The support for CMSE feature is broken in version 10-2020-q4-major. The
150 | fix will be available in future release version.
Summer Qin6d5c91c2021-05-24 15:32:44 +0800151 | A note is added in :ref:`docs/getting_started/tfm_getting_started:Install a toolchain`.
David Huaa7d90a2021-03-24 15:45:45 +0800152 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99157
153
154Reference
155=========
156
157 .. [1] `Arm Firmware Framework for M 1.1 Extensions <https://developer.arm.com/documentation/aes0039/latest>`_
158
159 .. [2] `PSA Firmware Update API <https://developer.arm.com/documentation/ihi0093/latest/>`_
160
Summer Qinabf66982021-04-06 17:22:15 +0800161 .. [3] :doc:`TF-M generic threat model </docs/security/threat_models/generic_threat_model>`
David Huaa7d90a2021-03-24 15:45:45 +0800162
Summer Qinabf66982021-04-06 17:22:15 +0800163 .. [4] :doc:`TF-M physical attack mitigation </docs/technical_references/tfm_physical_attack_mitigation>`
David Huaa7d90a2021-03-24 15:45:45 +0800164
Summer Qinabf66982021-04-06 17:22:15 +0800165 .. [5] :doc:`TF-M Profile Large design </docs/technical_references/profiles/tfm_profile_large>`
David Huaa7d90a2021-03-24 15:45:45 +0800166
Summer Qinabf66982021-04-06 17:22:15 +0800167 .. [6] :doc:`Code sharing between independently linked XIP binaries </docs/technical_references/code_sharing>`
David Huaa7d90a2021-03-24 15:45:45 +0800168
Summer Qinabf66982021-04-06 17:22:15 +0800169 .. [7] :doc:`Security Handling </docs/security/security>`
David Huaa7d90a2021-03-24 15:45:45 +0800170
171--------------
172
173*Copyright (c) 2021, Arm Limited. All rights reserved.*