Commit 62c17070 authored by Olivier Deprez's avatar Olivier Deprez
Browse files

changelog: introduce SPMD, add secure partition loading and tooling


Signed-off-by: default avatarOlivier Deprez <olivier.deprez@arm.com>
Change-Id: I250c3aa199d4e5efa68aa32bf5a1694835be56b7
parent 22193a3e
......@@ -20,12 +20,23 @@ New Features
^^^^^^^^^^^^
- Arm Architecture
- Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC
components.
- Build option to support EL2 context save and restore in the secure world
(CTX_INCLUDE_EL2_REGS).
- Example: "Add support for Branch Target Identification (BTI)"
- BL-specific
- Enhanced BL2 bootloader flow to load secure partitions based on firmware
configuration data (fconf).
- Build System
- Add support for documentation build as a target in Makefile
- Add ``COT`` build option to select the chain of trust to use when the
Trusted Boot feature is enabled (default: ``tbbr``).
- Added creation and injection of secure partition packages into the FIP.
- Build option to support SPMC component loading and run at S-EL1
or S-EL2 (SPMD_SPM_AT_SEL2).
- CPU Support
- Example: "cortex-a55: Workaround for erratum 1221012"
......@@ -53,6 +64,9 @@ New Features
- Add support for optional firmware encryption feature (experimental).
- Introduce a new `dualroot` chain of trust.
- SPCI
- Introduced the SPM Dispatcher (SPMD) component as a new standard service.
- Tools
- Example: "fiptool: Add support to build fiptool on Windows."
......@@ -85,6 +99,7 @@ Changed
- Example: "Refactor SPSR initialisation code"
- Tools
- sptool updated to accomodate building secure partition packages.
- Example: "cert_create: Remove RSA PKCS#1 v1.5 support"
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment