blob: 1c28632b1ee666e255865ab82fa184bb48d192a7 [file] [log] [blame]
David Huc78be622020-10-26 14:41:41 +08001*************
2Version 1.2.0
3*************
4
5New features
6============
7
8 - A new build system based on Modern CMake.
9 - First implementation of level 3 isolation on Musca-B1 and AN521.
10 - Remove MCUBoot fork from TF-M.
11 - Move test and app code to tf-m-tests repo.
12 - Add Profile Medium.
13 - Migrate support to Mbed TLS v2.24.
14 - New platforms added.
15 See :ref:`docs/reference/releases/1.2.0:New platforms supported` for
16 details.
17 - New SPM HAL APIs including isolation API and logging API.
18 - Update MCUboot version to 1.7.0-rc1.
19 - Initial ITS/PS HAL for dynamic filesystem configuration.
20 - Remove auto-generated files from the source tree.
21
22New security advisories
23=======================
24
25Stack sealing
26-------------
27
28Refer to :doc:`Advisory TFMV-1</docs/reference/security_advisories/stack_seal_vulnerability>`
29for more details.
30A common mitigation is included in this release.
31
32New platforms supported
33=======================
34
35- Cortex-M33 based system:
36
37 - `Nordic nRF9160 DK (nordic_nrf/nrf9160dk_nrf9160).
38 <https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF9160-DK>`_
39 - `Nordic nRF5340 PDK (nordic_nrf/nrf5340pdk_nrf5340_cpuapp).
40 <https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF5340-PDK>`_
41 - `Nordic nRF5340 DK (nordic_nrf/nrf5340dk_nrf5340_cpuapp).
42 <https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF5340-PDK>`_
43
44- Cortex-M23 based system:
45
46 - `Nuvoton M2351.
47 <https://www.nuvoton.com/products/iot-solution/iot-platform/numaker-pfm-m2351/>`_
48
49- Cortex-M55 based system:
50
51 - `Corstone-300 Ethos-U55 FVP (Cortex-M55 plus Ethos-U55 SSE-300 MPS3).
52 <https://developer.arm.com/tools-and-software/open-source-software/arm-platforms-software/arm-ecosystem-fvps>`_
53
54Tested platforms
55================
56
57The following platforms are successfully tested in this release.
58
59 - AN519
60 - AN521
61 - Musca-B1
62 - MPS2 SSE300
63 - PSoC 64
64 - M2351
65 - nrf5340dk
66 - nrf5340pdk
67 - nrf9160dk
68 - LPCXpresso55S69
69 - NUCLEO-L552ZE-Q
70 - STM32L562E-DK
71
72Known issues
73============
74
75Some open issues exist and will not be fixed in this release.
76
77.. list-table::
78
79 * - **Descriptions**
80 - **Issue links**
81
82 * - | PSA Arch Crypto tests have several known failures.
83 - See this link for detailed analysis of the failures:
84 https://developer.trustedfirmware.org/w/tf_m/release/psa_arch_crypto_test_failure_analysis_in_tf-m_v1.2_release/
85
86Issues fixed since 1.1
87======================
88
89Issues fixed by TF-M since v1.1 are listed below.
90
91.. list-table::
92
93 * - **Descriptions**
94 - **Issue links**
95
96 * - | The eflash driver on Musca-B1 can return random failures hence
97 | triggering random failures during PSA Arch ITS and PSA Arch PS tests.
98 | This happens when ITS/SST is configured to use flash.
99 - https://developer.trustedfirmware.org/T697
100
101Issues closed since 1.1
102=======================
103
104The following issues are closed since v1.1. These issues are related to platform
105hardware limitations or 3rd-party tools and therefore won't be fixed by TF-M.
106
107.. list-table::
108
109 * - **Descriptions**
110 - **Issue links**
111
112 * - | All the supported GNUARM toolchain versions generate corrupt veneer
113 | code for Armv8-M baseline architecture, when the -Os optimization flag
114 | is used. This affects the Armv8-M baseline platforms built with GNUARM
115 | toolchain and Minsizerel build type.
116 | It relies on an official release of GNUARM toolchain to fix this issue.
117 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95646
118
119 * - | AN521 FVP soft reset via AIRCR does not reset MPC / PPC / MPU and will
120 | cause boot failure. This is a known issue for AN521 FVP. This will
121 | cause the system to fail to boot after a warm reset during PSA Arch FF
122 | testing.
123 - https://developer.trustedfirmware.org/T692
124
125 * - | There are 2 additional failures for PSA-Arch Crypto tests with CC-312
126 | other than the known failures. This is due to limitation of CC-312
127 | implementation as it does not support MD_NONE hashing mode causing the
128 | additional failures.
129 - https://developer.trustedfirmware.org/T691
130
131 * - | Boot up fails if there is unexpected data in flash on Musca-A. The boot
132 | is successful and the tests pass if all the associated (PS/ITS/NV
133 | Counter) flash areas are erased.
134 - https://developer.trustedfirmware.org/T694
135
136 * - | If the flash is not erased, boot fails on Musca-B1 when SST is using
137 | flash for Minsizerel config.
138 - https://developer.trustedfirmware.org/T695
139
140--------------
141
142*Copyright (c) 2020, Arm Limited. All rights reserved.*