Merge "Fix restoration of PAuth context" into integration
diff --git a/docs/change-log.rst b/docs/change-log.rst
index d652ff6..1aca22b 100644
--- a/docs/change-log.rst
+++ b/docs/change-log.rst
@@ -1,14 +1,16 @@
+Trusted Firmware-A Release Notes
+================================
-.. section-numbering::
- :suffix: .
+This document contains a summary of the new features, changes, fixes and known
+issues in each release of Trusted Firmware-A.
.. contents::
-Trusted Firmware-A - version 2.1
-================================
+Version 2.1
+-----------
New Features
-------------
+^^^^^^^^^^^^
- Architecture
- Support for ARMv8.3 pointer authentication in the normal and secure worlds
@@ -198,7 +200,7 @@
Changed
--------
+^^^^^^^
- Build System
- Warning levels are now selectable with ``W=<1,2,3>``
@@ -311,7 +313,7 @@
Resolved Issues
----------------
+^^^^^^^^^^^^^^^
- Architecture
- Incorrect check for SSBS feature detection
@@ -401,7 +403,7 @@
Deprecations
-------------
+^^^^^^^^^^^^
- Common Code
- ``plat_crash_console_init`` function
@@ -424,7 +426,7 @@
Known Issues
-------------
+^^^^^^^^^^^^
- Build System Issues
- dtb: DTB creation not supported when building on a Windows host.
@@ -448,11 +450,11 @@
- mediatek/mt6795: This platform does not build in this release
-Trusted Firmware-A - version 2.0
-================================
+Version 2.0
+-----------
New Features
-------------
+^^^^^^^^^^^^
- Removal of a number of deprecated APIs
@@ -469,12 +471,12 @@
- This release is otherwise unchanged from 1.6 release
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- No issues known at 1.6 release resolved in 2.0 release
Known Issues
-------------
+^^^^^^^^^^^^
- DTB creation not supported when building on a Windows host. This step in the
build process is skipped when running on a Windows host. Known issue from
@@ -487,11 +489,11 @@
confirmed to be working after the removal of the deprecated interfaces
although they do build.
-Trusted Firmware-A - version 1.6
-================================
+Version 1.6
+-----------
New Features
-------------
+^^^^^^^^^^^^
- Addressing Speculation Security Vulnerabilities
@@ -760,22 +762,22 @@
- STMicroelectronics STM32MP1 Platform
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- No issues known at 1.5 release resolved in 1.6 release
Known Issues
-------------
+^^^^^^^^^^^^
- DTB creation not supported when building on a Windows host. This step in the
build process is skipped when running on a Windows host. Known issue from
1.5 version.
-Trusted Firmware-A - version 1.5
-================================
+Version 1.5
+-----------
New features
-------------
+^^^^^^^^^^^^
- Added new firmware support to enable RAS (Reliability, Availability, and
Serviceability) functionality.
@@ -1044,7 +1046,7 @@
facilitate transfer by DMA.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- TF-A can be built with optimisations disabled (-O0).
@@ -1052,16 +1054,16 @@
running TF-A in AArch32 execution mode (resolving `tf-issue#501`_).
Known Issues
-------------
+^^^^^^^^^^^^
- DTB creation not supported when building on a Windows host. This step in the
build process is skipped when running on a Windows host.
-Trusted Firmware-A - version 1.4
-================================
+Version 1.4
+-----------
New features
-------------
+^^^^^^^^^^^^
- Enabled support for platforms with hardware assisted coherency.
@@ -1318,7 +1320,7 @@
pre-empted SMC during PSCI power management requests.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- TF-A can be built with the latest mbed TLS version (v2.4.2). The earlier
version 2.3.0 cannot be used due to build warnings that the TF-A build
@@ -1332,7 +1334,7 @@
shutdown request using the PSCI SYSTEM_OFF API.
Known Issues
-------------
+^^^^^^^^^^^^
- Building TF-A with compiler optimisations disabled (-O0) fails.
@@ -1346,12 +1348,12 @@
platform, please use GCC compiler version of at least 5.0. See `PR#1002`_ for
more details.
-Trusted Firmware-A - version 1.3
-================================
+Version 1.3
+-----------
New features
-------------
+^^^^^^^^^^^^
- Added support for running TF-A in AArch32 execution state.
@@ -1552,10 +1554,10 @@
interrupts and then restoring after resume.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Known issues
-------------
+^^^^^^^^^^^^
- The version of the AEMv8 Base FVP used in this release resets the model
instead of terminating its execution in response to a shutdown request using
@@ -1569,11 +1571,11 @@
- TBBR is not currently supported when running TF-A in AArch32 state.
-Trusted Firmware-A - version 1.2
-================================
+Version 1.2
+-----------
New features
-------------
+^^^^^^^^^^^^
- The Trusted Board Boot implementation on Arm platforms now conforms to the
mandatory requirements of the TBBR specification.
@@ -1690,7 +1692,7 @@
common driver. The standalone CCI-400 driver has been deprecated.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- The Trusted Board Boot implementation has been redesigned to provide greater
modularity and scalability. See the `Authentication Framework`_ document.
@@ -1705,7 +1707,7 @@
- GICv3 is now fully supported and stable.
Known issues
-------------
+^^^^^^^^^^^^
- The version of the AEMv8 Base FVP used in this release resets the model
instead of terminating its execution in response to a shutdown request using
@@ -1721,11 +1723,11 @@
- Building TF-A with compiler optimisations disabled (``-O0``) fails.
-Trusted Firmware-A - version 1.1
-================================
+Version 1.1
+-----------
New features
-------------
+^^^^^^^^^^^^
- A prototype implementation of Trusted Board Boot has been added. Boot
loader images are verified by BL1 and BL2 during the cold boot path. BL1 and
@@ -1828,7 +1830,7 @@
added. Details of using it with TF-A can be found in `OP-TEE Dispatcher`_
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- The Juno port has been aligned with the FVP port as follows.
@@ -1855,7 +1857,7 @@
the Cortex-A57-A53 Base FVPs.
Known issues
-------------
+^^^^^^^^^^^^
- The Trusted Board Boot implementation is a prototype. There are issues with
the modularity and scalability of the design. Support for a Trusted
@@ -1883,11 +1885,11 @@
- The Juno-specific firmware design documentation is incomplete.
-Trusted Firmware-A - version 1.0
-================================
+Version 1.0
+-----------
New features
-------------
+^^^^^^^^^^^^
- It is now possible to map higher physical addresses using non-flat virtual
to physical address mappings in the MMU setup.
@@ -2009,7 +2011,7 @@
Juno platform.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- Removed the concept of top/bottom image loading. The image loader now
automatically detects the position of the image inside the current memory
@@ -2023,7 +2025,7 @@
resolved. This TF-A version uses Linaro toolchain 14.07 (based on GCC 4.9).
Known issues
-------------
+^^^^^^^^^^^^
- GICv3 support is experimental. The Linux kernel patches to support this are
not widely available. There are known issues with GICv3 initialization in
@@ -2063,11 +2065,11 @@
A similar change can be made to the other Cortex-A57-A53 Base FVP variants.
-Trusted Firmware-A - version 0.4
-================================
+Version 0.4
+-----------
New features
-------------
+^^^^^^^^^^^^
- Makefile improvements:
@@ -2145,7 +2147,7 @@
interrupt handling during TSP processing.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- Now support use of the model parameter ``-C bp.secure_memory=1`` in the Base
FVPs (see **New features**).
@@ -2164,7 +2166,7 @@
checking.
Known issues
-------------
+^^^^^^^^^^^^
- GICv3 support is experimental. The Linux kernel patches to support this are
not widely available. There are known issues with GICv3 initialization in
@@ -2193,11 +2195,11 @@
- The firmware design documentation for the Test Secure-EL1 Payload (TSP) and
its dispatcher (TSPD) is incomplete. Similarly for the PSCI section.
-Trusted Firmware-A - version 0.3
-================================
+Version 0.3
+-----------
New features
-------------
+^^^^^^^^^^^^
- Support for Foundation FVP Version 2.0 added.
The documented UEFI configuration disables some devices that are unavailable
@@ -2274,7 +2276,7 @@
NOTE: The TSP/TSPD is not built by default.
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- Support has been added for switching context between secure and normal
worlds in EL3.
@@ -2299,7 +2301,7 @@
in this release, for both Foundation and Base FVPs.
Known issues
-------------
+^^^^^^^^^^^^
The following is a list of issues which are expected to be fixed in the future
releases of TF-A.
@@ -2347,11 +2349,11 @@
- The firmware design documentation for the Test Secure-EL1 Payload (TSP) and
its dispatcher (TSPD) is incomplete. Similarly for the PSCI section.
-Trusted Firmware-A - version 0.2
-================================
+Version 0.2
+-----------
New features
-------------
+^^^^^^^^^^^^
- First source release.
@@ -2359,13 +2361,13 @@
by default since there are known issues (see below).
Issues resolved since last release
-----------------------------------
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- The "psci" nodes in the FDTs provided in this release now fully comply
with the recommendations made in the PSCI specification.
Known issues
-------------
+^^^^^^^^^^^^
The following is a list of issues which are expected to be fixed in the future
releases of TF-A.
@@ -2427,5 +2429,3 @@
.. _OP-TEE Dispatcher: optee-dispatcher.rst
.. _tf-issue#501: https://github.com/ARM-software/tf-issues/issues/501
.. _PR#1002: https://github.com/ARM-software/arm-trusted-firmware/pull/1002#issuecomment-312650193
-.. _mbed TLS releases: https://tls.mbed.org/tech-updates/releases
-.. _Firmware Design: firmware-design.rst
diff --git a/plat/imx/imx8m/imx8mm/platform.mk b/plat/imx/imx8m/imx8mm/platform.mk
index d50af20..d87624e 100644
--- a/plat/imx/imx8m/imx8mm/platform.mk
+++ b/plat/imx/imx8m/imx8mm/platform.mk
@@ -28,7 +28,6 @@
lib/xlat_tables/aarch64/xlat_tables.c \
lib/xlat_tables/xlat_tables_common.c \
lib/cpus/aarch64/cortex_a53.S \
- drivers/console/aarch64/console.S \
drivers/arm/tzc/tzc380.c \
drivers/delay_timer/delay_timer.c \
drivers/delay_timer/generic_delay_timer.c \
diff --git a/plat/imx/imx8m/imx8mq/platform.mk b/plat/imx/imx8m/imx8mq/platform.mk
index 7004c56..89c2da0 100644
--- a/plat/imx/imx8m/imx8mq/platform.mk
+++ b/plat/imx/imx8m/imx8mq/platform.mk
@@ -28,7 +28,6 @@
lib/xlat_tables/aarch64/xlat_tables.c \
lib/xlat_tables/xlat_tables_common.c \
lib/cpus/aarch64/cortex_a53.S \
- drivers/console/aarch64/console.S \
drivers/arm/tzc/tzc380.c \
drivers/delay_timer/delay_timer.c \
drivers/delay_timer/generic_delay_timer.c \