Commit 3a287945 authored by Dan Handley's avatar Dan Handley
Browse files

Update readme.md for v1.3



Update the release notes (readme.md) for the ARM Trusted Firmware
v1.3 release.

Change-Id: Ia1f4eb1897e63eeab7d69a593ba0ad91d50043f5
Signed-off-by: default avatarDan Handley <dan.handley@arm.com>
parent d4e748f3
ARM Trusted Firmware - version 1.2 ARM Trusted Firmware - version 1.3
================================== ==================================
ARM Trusted Firmware provides a reference implementation of secure world ARM Trusted Firmware provides a reference implementation of secure world
...@@ -17,17 +17,25 @@ to the benefit of all developers working with ARMv8-A TrustZone technology. ...@@ -17,17 +17,25 @@ to the benefit of all developers working with ARMv8-A TrustZone technology.
License License
------- -------
The software is provided under a BSD 3-Clause [license]. Certain source files The software is provided under a BSD-3-Clause [license]. Contributions to this
are derived from FreeBSD code: the original license is included in these project are accepted under the same license with developer sign-off as
source files. described in the [Contributing Guidelines].
This project contains code from other projects as listed below. The original
license text is included in those source files.
* The stdlib source code is derived from FreeBSD code.
* The libfdt source code is dual licensed. It is used by this project under
the terms of the BSD-2-Clause license.
This Release This Release
------------ ------------
This release provides a suitable starting point for productization of secure This release provides a suitable starting point for productization of secure
world boot and runtime firmware. Future versions will contain new features, world boot and runtime firmware, executing in either the AArch32 or AArch64
optimizations and quality improvements. execution state.
Users are encouraged to do their own security validation, including penetration Users are encouraged to do their own security validation, including penetration
testing, on any secure world code derived from ARM Trusted Firmware. testing, on any secure world code derived from ARM Trusted Firmware.
...@@ -42,7 +50,7 @@ testing, on any secure world code derived from ARM Trusted Firmware. ...@@ -42,7 +50,7 @@ testing, on any secure world code derived from ARM Trusted Firmware.
* Library support for CPU specific reset and power down sequences. This * Library support for CPU specific reset and power down sequences. This
includes support for errata workarounds. includes support for errata workarounds.
* Drivers for both the version 2.0 and version 3.0 ARM Generic Interrupt * Drivers for both versions 2.0 and 3.0 of the ARM Generic Interrupt
Controller specifications (GICv2 and GICv3). The latter also enables GICv3 Controller specifications (GICv2 and GICv3). The latter also enables GICv3
hardware systems that do not contain legacy GICv2 support. hardware systems that do not contain legacy GICv2 support.
...@@ -53,18 +61,26 @@ testing, on any secure world code derived from ARM Trusted Firmware. ...@@ -53,18 +61,26 @@ testing, on any secure world code derived from ARM Trusted Firmware.
* SMC (Secure Monitor Call) handling, conforming to the [SMC Calling * SMC (Secure Monitor Call) handling, conforming to the [SMC Calling
Convention][SMCCC] using an EL3 runtime services framework. Convention][SMCCC] using an EL3 runtime services framework.
* SMC handling relating to [PSCI] for the Secondary CPU Boot, CPU Hotplug, * [PSCI] library support for the Secondary CPU Boot, CPU Hotplug, CPU Idle
CPU Idle and System Shutdown/Reset/Suspend use-cases. and System Shutdown/Reset/Suspend use-cases.
This library is pre-integrated with the provided AArch64 EL3 Runtime
Software, and is also suitable for integration into other EL3 Runtime
Software.
* A minimal AArch32 Secure Payload to demonstrate [PSCI] library integration
on platforms with AArch32 EL3 Runtime Software.
* Secure Monitor library code such as world switching, EL1 context management * Secure Monitor library code such as world switching, EL1 context management
and interrupt routing. This must be integrated with a Secure-EL1 Payload and interrupt routing.
Dispatcher (SPD) component to customize the interaction with a Secure-EL1 When using the provided AArch64 EL3 Runtime Software, this must be
Payload (SP), for example a Secure OS. integrated with a Secure-EL1 Payload Dispatcher (SPD) component to
customize the interaction with a Secure-EL1 Payload (SP), for example a
Secure OS.
* A Test Secure-EL1 Payload and Dispatcher to demonstrate Secure Monitor * A Test Secure-EL1 Payload and Dispatcher to demonstrate AArch64 Secure
functionality and Secure-EL1 interaction with PSCI. Monitor functionality and Secure-EL1 interaction with PSCI.
* SPDs for the [OP-TEE Secure OS] and [NVidia Trusted Little Kernel] * AArch64 SPDs for the [OP-TEE Secure OS] and [NVidia Trusted Little Kernel]
[NVidia TLK]. [NVidia TLK].
* A Trusted Board Boot implementation, conforming to all mandatory TBBR * A Trusted Board Boot implementation, conforming to all mandatory TBBR
...@@ -72,11 +88,12 @@ testing, on any secure world code derived from ARM Trusted Firmware. ...@@ -72,11 +88,12 @@ testing, on any secure world code derived from ARM Trusted Firmware.
Firmware Update (or recovery mode) boot flow, and packaging of the various Firmware Update (or recovery mode) boot flow, and packaging of the various
firmware images into a Firmware Image Package (FIP) to be loaded from firmware images into a Firmware Image Package (FIP) to be loaded from
non-volatile storage. non-volatile storage.
The TBBR implementation is currently only supported in the AArch64 build.
* Support for alternative boot flows. Some platforms have their own boot * Support for alternative boot flows. Some platforms have their own boot
firmware and only require the ARM Trusted Firmware Secure Monitor firmware and only require the AArch64 EL3 Runtime Software provided by this
functionality. Other platforms require minimal initialization before project. Other platforms require minimal initialization before booting
booting into an arbitrary EL3 payload. into an arbitrary EL3 payload.
For a full description of functionality and implementation details, please For a full description of functionality and implementation details, please
see the [Firmware Design] and supporting documentation. The [Change Log] see the [Firmware Design] and supporting documentation. The [Change Log]
...@@ -84,36 +101,46 @@ provides details of changes made since the last release. ...@@ -84,36 +101,46 @@ provides details of changes made since the last release.
### Platforms ### Platforms
This release of the Trusted Firmware has been tested on variants r0 and r1 of The AArch64 build of this release has been tested on variants r0, r1 and r2
the [Juno ARM Development Platform] [Juno] with [Linaro Release 15.10] of the [Juno ARM Development Platform] [Juno] with [Linaro Release 16.06].
[Linaro Release Notes].
The AArch64 build of this release has been tested on the following ARM
[FVP]s (64-bit host machine only):
The Trusted Firmware has also been tested on the 64-bit Linux versions of the * `Foundation_Platform` (Version 10.1, Build 10.1.32)
following ARM [FVP]s: * `FVP_Base_AEMv8A-AEMv8A` (Version 7.7, Build 0.8.7701)
* `FVP_Base_Cortex-A57x4-A53x4` (Version 7.7, Build 0.8.7701)
* `FVP_Base_Cortex-A57x1-A53x1` (Version 7.7, Build 0.8.7701)
* `FVP_Base_Cortex-A57x2-A53x4` (Version 7.7, Build 0.8.7701)
* `Foundation_Platform` (Version 9.4, Build 9.4.59) The AArch32 build of this release has been tested on the following ARM
* `FVP_Base_AEMv8A-AEMv8A` (Version 7.0, Build 0.8.7004) [FVP]s (64-bit host machine only):
* `FVP_Base_Cortex-A57x4-A53x4` (Version 7.0, Build 0.8.7004)
* `FVP_Base_Cortex-A57x1-A53x1` (Version 7.0, Build 0.8.7004) * `FVP_Base_AEMv8A-AEMv8A` (Version 7.7, Build 0.8.7701)
* `FVP_Base_Cortex-A57x2-A53x4` (Version 7.0, Build 0.8.7004) * `FVP_Base_Cortex-A32x4` (Version 10.1, Build 10.1.32)
The Foundation FVP can be downloaded free of charge. The Base FVPs can be The Foundation FVP can be downloaded free of charge. The Base FVPs can be
licensed from ARM: see [www.arm.com/fvp] [FVP]. licensed from ARM: see [www.arm.com/fvp] [FVP].
This release also contains the following platform support: This release also contains the following platform support:
* MediaTek MT6795 and MT8173 SoCs
* NVidia T210 and T132 SoCs * NVidia T210 and T132 SoCs
* MediaTek MT8173 SoC * QEMU emulator
* RockChip RK3368 and RK3399 SoCs
* Xilinx Zynq UltraScale + MPSoC
### Still to Come ### Still to Come
* Complete implementation of the [PSCI] v1.0 specification. * AArch32 TBBR support and ongoing TBBR alignment.
* Support for new CPUs and System IP.
* More platform support. * More platform support.
* Optimization and quality improvements. * Ongoing support for new architectural features, CPUs and System IP.
* Ongoing [PSCI] alignment and feature support.
* Ongoing security hardening, optimization and quality improvements.
For a full list of detailed issues in the current code, please see the [Change For a full list of detailed issues in the current code, please see the [Change
Log] and the [GitHub issue tracker]. Log] and the [GitHub issue tracker].
...@@ -147,7 +174,7 @@ ARM licensees may contact ARM directly via their partner managers. ...@@ -147,7 +174,7 @@ ARM licensees may contact ARM directly via their partner managers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
_Copyright (c) 2013-2015, ARM Limited and Contributors. All rights reserved._ _Copyright (c) 2013-2016, ARM Limited and Contributors. All rights reserved._
[License]: ./license.md "BSD license for ARM Trusted Firmware" [License]: ./license.md "BSD license for ARM Trusted Firmware"
...@@ -167,4 +194,4 @@ _Copyright (c) 2013-2015, ARM Limited and Contributors. All rights reserved._ ...@@ -167,4 +194,4 @@ _Copyright (c) 2013-2015, ARM Limited and Contributors. All rights reserved._
[GitHub issue tracker]: https://github.com/ARM-software/tf-issues/issues [GitHub issue tracker]: https://github.com/ARM-software/tf-issues/issues
[OP-TEE Secure OS]: https://github.com/OP-TEE/optee_os [OP-TEE Secure OS]: https://github.com/OP-TEE/optee_os
[NVidia TLK]: http://nv-tegra.nvidia.com/gitweb/?p=3rdparty/ote_partner/tlk.git;a=summary [NVidia TLK]: http://nv-tegra.nvidia.com/gitweb/?p=3rdparty/ote_partner/tlk.git;a=summary
[Linaro Release Notes]: https://community.arm.com/docs/DOC-10952#jive_content_id_Linaro_Release_1510 [Linaro Release 16.06]: https://community.arm.com/docs/DOC-10952#jive_content_id_Linaro_Release_1606
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment