blob: f3d56638cfac68bb79004b47703482c1a0a20136 [file] [log] [blame]
Julian Halle76ade82020-11-25 03:07:21 +01001Change Log & Release Notes
2==========================
3
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +01004This document contains a summary of the new features, changes, fixes and known issues in each release of Trusted
5Services.
Julian Halle76ade82020-11-25 03:07:21 +01006
Gyorgy Szing08129852024-04-06 08:16:29 +02007Version <next>
8--------------
9
10- Trustedfirmware.org has deprecated Phabricator, the wiki and issue tracking provider. This functionality has been
11 moved to GitHub. See the `Trusted Services organization`_. The project wiki has been moved
12 `to here <https://github.com/Trusted-Services/trusted-services/wiki>`_
13
14
15Feature Highlights
16^^^^^^^^^^^^^^^^^^
17
18- Add documentation covering the :ref:`OP-TEE SPMC tests`.
19- Extend the :ref:`UEFI SMM Services` to support Authenticated Variables.
20- Introduce a work in progress RPMB implementation and integrate it to the Block Storage service. The current
21 configuration uses an SWd RAM buffer for data storage, and is not connected to the RPMB provider running in the NWd.
22 This is the first baseline to implement a scenario where the RPMB owner is an S-EL0 SP.
23- Introduce the :ref:`Logging Service`.
24- Add crypto key store partitioning support to the Crypto Service. This feature allows isolating clients running in
25 different SPs.
26
27Updated external components
28^^^^^^^^^^^^^^^^^^^^^^^^^^^
29
30- MbedTLS version int the Crypto service is updated to v3.5.1.
31
32Breaking changes
33^^^^^^^^^^^^^^^^
34
35Resolved issues
36^^^^^^^^^^^^^^^
37
38- Fix psa-ps-api-test test case 414.
39- Crypto key store partitioning has been implemented, and clients accessing the crypto service from different FF-A
40 endpoints can not access each other's assets anymore.
41
42Known limitations
43^^^^^^^^^^^^^^^^^
44
45- UEFI private variable authentication is not implemented in an UEFI compliant way. Currently such variables are
46 authenticated by the certificates stored on the `DB` variable which is incorrect. Instead an implementation defined
47 variable should be used to store the needed certificates. The plan is to follow ``EDK2`` use ``certdb`` and
48 ``certdbv`` variables for this purpose.
49
Gyorgy Szing30731ce2023-09-27 12:24:18 +020050Version 1.0.0
51-------------
52
53The first stabilised release of the project from previously prototype releases ready for product use.
54
55Feature Highlights
56^^^^^^^^^^^^^^^^^^
57
58- Introduce the :doc:`Block Storage Service </services/block-storage-service-description>`. The Block Storage service
59 can be used to share a block-oriented storage device such as a QSPI flash between a set of independent secure world
60 clients.
61
62- Introduce the :doc:`Firmware Update Service </services/fwu/index>`. The FWU service implements the Update Agent
63 defined in the `Arm FWU-A specification`_ and allows replacing FW components with newer versions.
64
65- Refactor FF-A UUID policy. Reinterpret the FF-A UUID to identify the protocol supported by TS SP instead of the
66 service. This removes the maintenance burden of keeping an up to date UUID list in the service locator. All SPs start
67 using the same protocol UUID, and implement a new discovery service (see the next point).
68
69- Overhaul the RPC protocol. The main driver is to remove the single shared memory region limitation, which does not
70 allow separating shared regions of clients running over Linux in the user-space. The second driver is to add
71 versioning support to the RPC layer.
72
73 - Allow multiple shared memory regions between endpoints.
74 - Implement the discovery service in the RPC layer.
75 - Allow assigning a UUID to interfaces. This mechanism replaces the protocol identifier used earlier. Each protocol
76 of a service is represented as a dedicated interface.
77 - Add versioning support to the RPC layer.
78
79- Refactor the discovery service. The is removing the runtime overhead of memory sharing during the discovery and
80 decreases code size and duplication using the same code for service discovery.
81
82 - Implement the discovery service in the RPC layer for efficiency reasons.
83 - Implement service identity discovery for all services.
84 - Remove the encoding type entity and use service UUIDs to represent the serialization type.
85 - Service property discovery is to be implemented in the future.
86
87- Add support for the Corstone-1000 platform. For more information about this platform please see: `Corstone-1000 product homepage`_
88
89- SPs now indicate support of :term:`Normal World` interrupt preemption capability in their SP manifest and allow the SPMC to enable
90 preemption if possible. This removes NWd interrupts being disabled for long periods due to long service calls.
91
92- Add support for the Armv8-A CRC32 feature for :term:`Secure World` and :term:`Normal World` components.
93
94- Extend FF-A support with:
95
96 - FF-A v1.1 boot protocol between the SPM and SPs.
97 - FF-A v1.2 FFA_CONSOLE_LOG call. This allows SPs to emit log messages in an SPMC agonistic way.
98
99- Improve the build system to allow setting the build steps of external components to be verbose.
100
101- Add support for runtime (dynamic) psa-acs test case configuration.
102
103Updated external components
104^^^^^^^^^^^^^^^^^^^^^^^^^^^
105
106- MbedTLS version integration into the Crypto service is updated to v3.4.0.
107- The PSA Arch test is updated to version `74dc6646ff594e131a726a5305aba77bac30eceb`.
108
109Breaking changes
110^^^^^^^^^^^^^^^^
111
112- The new RPC ABI is not backwards compatible and needs recent version of all depending components.
113
114Resolved issues
115^^^^^^^^^^^^^^^
116
117- The new RPC version allows having multiple shared memory regions between endpoints. This allows each NWd client
118 running in Linux user-space to use a dedicated buffer.
119
120Known limitations
121^^^^^^^^^^^^^^^^^
122
123 - Crypto key store partitioning by client is not yet supported. This means multiple clients running at the same FF-A
124 endpoint use a shared key space.
125 - The full firmware update process implementation and testing is work-in-progress. The FWU process relies on the
126 cooperation of multiple FW components owned by multiple FW projects. Some 3rd party components do not implement the
127 needed features yet and thus, the FWU service was validated in "isolation" and exercised by TS test on the FVP
128 platform and on the host PC only.
129 - Service property discovery is not implemented yet.
130 - Discovering the maximum payload size of a service is not supported yet and buffer sizes are hardcoded.
131
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100132Version 1.0.0-Beta
133------------------
Julian Halle76ade82020-11-25 03:07:21 +0100134
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100135The first tagged release of the project.
Julian Halle76ade82020-11-25 03:07:21 +0100136
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100137Feature Highlights
138^^^^^^^^^^^^^^^^^^
Julian Halle76ade82020-11-25 03:07:21 +0100139
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100140The project supports the following services:
Julian Halle76ade82020-11-25 03:07:21 +0100141
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100142 - Secure Storage
143 - Crypto
144 - Initial Attestation
145 - Smm Variable
146
147Services may be accessed using client components that implement "`Psacertified v1.0 APIs`_". The project includes deployments
148that integrate `PSA API certification tests`_ with API clients to facilitate end-to-end PSA certification testing.
149
150Known limitations
151'''''''''''''''''
152
153 - Crypto key store partitioning by client is not yet supported.
154 - Discovery support is only currently integrated into the Crypto service provider. In case of services not supporting
155 this feature yet, communication parameters (e.g. maximum buffer size) and supported feature set needs to be hardcode
156 to the service provider and service client.
157
158Supported Trusted Environments
159''''''''''''''''''''''''''''''
160
161In the default configuration each service is deployed to a dedicated FF-A Secure Partition and executes isolated.
162Service implementations are platform, trusted environment and service deployment agonistic. With appropriate enablement
163work services can be enabled to work in any combination of these.
164
165The reference integration uses the SPMC implemented in OP-TEE OS to manage TS SPs. This release supports `OP-TEE v3.19`_.
166
167Supported Integration Systems
168'''''''''''''''''''''''''''''
169
170The reference solution uses the OP-TEE integration methodology. This relies on the google repo tool for high-level dependency
171management and a set of makefiles to capture the build configuration information. For details please refer to
172`OP-TEE git repo documentation`_.
173
174The project is officially enabled in `Yocto meta-arm`_.
175
176Supported Target Platforms
177''''''''''''''''''''''''''
178
179The only reference platform supported by this release is the `AEM FVP`_ build using the OP-TEE integration method.
180
181Known limitations:
182
183 - Non-volatile backend secure storage is not currently provided.
184
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100185Test Report
186^^^^^^^^^^^
187
Imre Kis92eeced2024-01-31 13:38:57 +0100188Please find the Test Report covering this release in the `project wiki`_.
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100189
190
Julian Halle76ade82020-11-25 03:07:21 +0100191--------------
192
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100193.. _`FF-A Specification v1.0`: https://developer.arm.com/documentation/den0077/a
194.. _`Psacertified v1.0 APIs`: https://www.psacertified.org/development-resources/building-in-security/specifications-implementations/
195.. _`OP-TEE v3.19`: https://github.com/OP-TEE/optee_os/tree/3.19.0
196.. _`Yocto meta-arm` : https://gitlab.oss.arm.com/engineering/yocto/meta-arm/-/tree/master/meta-arm/recipes-security/trusted-services
Imre Kis92eeced2024-01-31 13:38:57 +0100197.. _`project wiki`: https://github.com/Trusted-Services/trusted-services/wiki/Trusted-Services-test-reports
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100198.. _`AEM FVP`: https://developer.arm.com/-/media/Files/downloads/ecosystem-models/FVP_Base_RevC-2xAEMvA_11.18_16_Linux64.tgz
199.. _`PSA API certification tests`: https://github.com/ARM-software/psa-arch-tests
200.. _`OP-TEE git repo documentation`: https://optee.readthedocs.io/en/latest/building/gits/build.html
Gyorgy Szing30731ce2023-09-27 12:24:18 +0200201.. _`Corstone-1000 product homepage`: https://developer.arm.com/Processors/Corstone-1000
202.. _`Arm FWU-A specification`: https://developer.arm.com/documentation/den0118
Gyorgy Szing08129852024-04-06 08:16:29 +0200203.. _`Trusted Services organization`: https://github.com/Trusted-Services
204
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +0100205
Imre Kis92eeced2024-01-31 13:38:57 +0100206*Copyright (c) 2020-2024, Arm Limited and Contributors. All rights reserved.*
Julian Halle76ade82020-11-25 03:07:21 +0100207
208SPDX-License-Identifier: BSD-3-Clause