David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 1 | ************* |
| 2 | Version 1.3.0 |
| 3 | ************* |
| 4 | |
| 5 | New major features |
| 6 | ================== |
| 7 | |
| 8 | - Support stateless RoT Service defined in FF-M 1.1 [1]_. |
| 9 | - Support Second-Level Interrupt Handling (SLIH) defined in FF-M 1.1 [1]_. |
| 10 | - Add Firmware Update (FWU) secure service, following Platform Security |
| 11 | Architecture Firmware Update API [2]_. |
| 12 | - Migrate to Mbed TLS v2.25.0. |
| 13 | - Update MCUboot version to v1.7.2. |
| 14 | - Add a TF-M generic threat model [3]_ . |
| 15 | - Implement Fault Injection Handling library to mitigate physical attacks [4]_. |
| 16 | - Add Profile Large [5]_. |
| 17 | - Enable code sharing between boot loader and TF-M [6]_. |
| 18 | - Support Armv8.1-M Privileged Execute Never (PXN) attribute and Thread |
| 19 | reentrancy disabled (TRD) feature. |
| 20 | - New platforms added. |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 21 | See :ref:`docs/releases/1.3.0:New platforms supported` for |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 22 | details. |
| 23 | - Add a TF-M security landing page [7]_. |
| 24 | - Enhance dual-cpu non-secure mailbox reference implementation. |
| 25 | |
| 26 | New security advisories |
| 27 | ======================= |
| 28 | |
| 29 | Invoking secure functions from non-secure handler mode |
| 30 | ------------------------------------------------------ |
| 31 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 32 | Refer to :doc:`Advisory TFMV-2</docs/security/security_advisories/svc_caller_sp_fetching_vulnerability>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 33 | for more details. |
| 34 | The mitigation is included in this release. |
| 35 | |
| 36 | New platforms supported |
| 37 | ======================= |
| 38 | |
| 39 | - Cortex-M23 based system: |
| 40 | |
| 41 | - `Nuvoton M2354. |
| 42 | <https://www.nuvoton.com/board/numaker-m2354/>`_ |
| 43 | |
| 44 | - Cortex-M55 based system: |
| 45 | |
| 46 | - `FPGA image loaded on MPS3 board (AN547). |
| 47 | <https://developer.arm.com/products/system-design/development-boards/cortex-m-prototyping-systems/mps3>`_ |
| 48 | |
| 49 | - Secure Enclave system: |
| 50 | |
Summer Qin | 2de23d0 | 2021-05-14 13:44:14 +0800 | [diff] [blame] | 51 | - :doc:`Musca-B1 Secure Enclave. </platform/ext/target/arm/musca_b1/secure_enclave/readme>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 52 | |
| 53 | Deprecated platforms |
| 54 | ==================== |
| 55 | |
| 56 | The following platforms have been removed from TF-M code base. |
| 57 | |
| 58 | - SSE-200_AWS |
| 59 | - AN539 |
| 60 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 61 | See :doc:`Platform deprecation and removal </platform/ext/platform_deprecation>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 62 | for other platforms under deprecation process. |
| 63 | |
| 64 | Tested platforms |
| 65 | ================ |
| 66 | |
| 67 | The following platforms are successfully tested in this release. |
| 68 | |
| 69 | - AN519 |
| 70 | - AN521 |
| 71 | - AN524 |
| 72 | - AN547 |
| 73 | - LPCXpresso55S69 |
| 74 | - MPS2 SSE300 |
| 75 | - Musca-B1 |
| 76 | - Musca-B1 Secure Enclave |
| 77 | - Musca-S1 |
| 78 | - M2351 |
| 79 | - M2354 |
| 80 | - nrf5340dk |
| 81 | - nrf9160dk |
| 82 | - NUCLEO-L552ZE-Q |
| 83 | - PSoC 64 |
| 84 | - STM32L562E-DK |
| 85 | |
| 86 | Known issues |
| 87 | ============ |
| 88 | |
| 89 | Some open issues exist and will not be fixed in this release. |
| 90 | |
| 91 | .. list-table:: |
| 92 | |
| 93 | * - **Descriptions** |
| 94 | - **Issue links** |
| 95 | |
| 96 | * - | PSA Arch Crypto test suite have several known failures. |
| 97 | - See this `link <https://developer.trustedfirmware.org/w/tf_m/release/psa_arch_crypto_test_failure_analysis_in_tf-m_v1.3_release/>`_ |
| 98 | for detailed analysis of the failures. |
| 99 | |
| 100 | * - | Protected Storage Regression test 4001 is stuck on SSE-300 in isolation |
| 101 | | level 2 when PXN is enabled. |
| 102 | - https://developer.trustedfirmware.org/T902 |
| 103 | |
| 104 | * - | IPC Regression test fail when non-secure regression test is enabled and |
| 105 | | secure regression test is disabled. |
| 106 | - https://developer.trustedfirmware.org/T903 |
| 107 | |
| 108 | * - | Panic test in PSA Arch IPC test suite generates inconsistent results |
| 109 | | between Armclang and GNUARM. |
| 110 | - https://developer.trustedfirmware.org/T909 |
| 111 | |
| 112 | Issues fixed since 1.2.0 |
| 113 | ======================== |
| 114 | |
| 115 | Issues fixed by TF-M since v1.2.0 are listed below. |
| 116 | |
| 117 | .. list-table:: |
| 118 | |
| 119 | * - **Descriptions** |
| 120 | - **Issue links** |
| 121 | |
| 122 | * - | Dual-cpu NS mailbox initialization shall be executed after CMSIS-RTOS |
| 123 | | RTX kernel initialization |
| 124 | - https://developer.trustedfirmware.org/T904 |
| 125 | |
| 126 | Issues closed since 1.2.0 |
| 127 | ========================= |
| 128 | |
| 129 | The following issues are closed since v1.2.0. These issues are related to |
| 130 | platform hardware limitations or 3rd-party tools and therefore won't be fixed by |
| 131 | TF-M. |
| 132 | |
| 133 | .. list-table:: |
| 134 | |
| 135 | * - **Descriptions** |
| 136 | - **Issue links** |
| 137 | |
| 138 | * - | ``psa_verify_rsa()`` fails when PSA Crypto processes RSASSA-PSS |
| 139 | | algorithm in CryptoCell-312. |
| 140 | | Mbed TLS implementation of ``psa_verify_rsa()`` always passes |
| 141 | | ``MBEDTLS_MD_NONE`` to ``mbedtls_rsa_rsassa_pss_verify()``. |
| 142 | | However, CryptoCell-312 doesn't support MD5 and uses other algorithms |
| 143 | | instead. Therefore, Mbed TLS implementation may fail when input |
| 144 | | algorithm doesn't match other parameters. |
| 145 | - https://github.com/ARMmbed/mbedtls/issues/3990 |
| 146 | |
| 147 | * - | Regression tests fail with GNU Arm Embedded toolchain version |
| 148 | | 10-2020-q4-major. |
| 149 | | The support for CMSE feature is broken in version 10-2020-q4-major. The |
| 150 | | fix will be available in future release version. |
Summer Qin | 6d5c91c | 2021-05-24 15:32:44 +0800 | [diff] [blame] | 151 | | A note is added in :ref:`docs/getting_started/tfm_getting_started:Install a toolchain`. |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 152 | - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99157 |
| 153 | |
| 154 | Reference |
| 155 | ========= |
| 156 | |
| 157 | .. [1] `Arm Firmware Framework for M 1.1 Extensions <https://developer.arm.com/documentation/aes0039/latest>`_ |
| 158 | |
| 159 | .. [2] `PSA Firmware Update API <https://developer.arm.com/documentation/ihi0093/latest/>`_ |
| 160 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 161 | .. [3] :doc:`TF-M generic threat model </docs/security/threat_models/generic_threat_model>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 162 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 163 | .. [4] :doc:`TF-M physical attack mitigation </docs/technical_references/tfm_physical_attack_mitigation>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 164 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 165 | .. [5] :doc:`TF-M Profile Large design </docs/technical_references/profiles/tfm_profile_large>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 166 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 167 | .. [6] :doc:`Code sharing between independently linked XIP binaries </docs/technical_references/code_sharing>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 168 | |
Summer Qin | abf6698 | 2021-04-06 17:22:15 +0800 | [diff] [blame] | 169 | .. [7] :doc:`Security Handling </docs/security/security>` |
David Hu | aa7d90a | 2021-03-24 15:45:45 +0800 | [diff] [blame] | 170 | |
| 171 | -------------- |
| 172 | |
| 173 | *Copyright (c) 2021, Arm Limited. All rights reserved.* |