changelog: introduce SPMD, add secure partition loading and tooling
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I250c3aa199d4e5efa68aa32bf5a1694835be56b7
diff --git a/docs/change-log-upcoming.rst b/docs/change-log-upcoming.rst
index 14d21f0..72dfb50 100644
--- a/docs/change-log-upcoming.rst
+++ b/docs/change-log-upcoming.rst
@@ -20,12 +20,23 @@
^^^^^^^^^^^^
- Arm Architecture
+ - Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC
+ components.
+ - Build option to support EL2 context save and restore in the secure world
+ (CTX_INCLUDE_EL2_REGS).
- Example: "Add support for Branch Target Identification (BTI)"
+- BL-specific
+ - Enhanced BL2 bootloader flow to load secure partitions based on firmware
+ configuration data (fconf).
+
- Build System
- Add support for documentation build as a target in Makefile
- Add ``COT`` build option to select the chain of trust to use when the
Trusted Boot feature is enabled (default: ``tbbr``).
+ - Added creation and injection of secure partition packages into the FIP.
+ - Build option to support SPMC component loading and run at S-EL1
+ or S-EL2 (SPMD_SPM_AT_SEL2).
- CPU Support
- Example: "cortex-a55: Workaround for erratum 1221012"
@@ -53,6 +64,9 @@
- Add support for optional firmware encryption feature (experimental).
- Introduce a new `dualroot` chain of trust.
+- SPCI
+ - Introduced the SPM Dispatcher (SPMD) component as a new standard service.
+
- Tools
- Example: "fiptool: Add support to build fiptool on Windows."
@@ -85,6 +99,7 @@
- Example: "Refactor SPSR initialisation code"
- Tools
+ - sptool updated to accomodate building secure partition packages.
- Example: "cert_create: Remove RSA PKCS#1 v1.5 support"