changelog: introduce SPMD, add secure partition loading and tooling

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I250c3aa199d4e5efa68aa32bf5a1694835be56b7
diff --git a/docs/change-log-upcoming.rst b/docs/change-log-upcoming.rst
index 14d21f0..72dfb50 100644
--- a/docs/change-log-upcoming.rst
+++ b/docs/change-log-upcoming.rst
@@ -20,12 +20,23 @@
 ^^^^^^^^^^^^
 
 - Arm Architecture
+   - Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC
+     components.
+   - Build option to support EL2 context save and restore in the secure world
+     (CTX_INCLUDE_EL2_REGS).
    - Example: "Add support for Branch Target Identification (BTI)"
 
+- BL-specific
+   - Enhanced BL2 bootloader flow to load secure partitions based on firmware
+     configuration data (fconf).
+
 - Build System
    - Add support for documentation build as a target in Makefile
    - Add ``COT`` build option to select the chain of trust to use when the
      Trusted Boot feature is enabled (default: ``tbbr``).
+   - Added creation and injection of secure partition packages into the FIP.
+   - Build option to support SPMC component loading and run at S-EL1
+     or S-EL2 (SPMD_SPM_AT_SEL2).
 
 - CPU Support
    - Example: "cortex-a55: Workaround for erratum 1221012"
@@ -53,6 +64,9 @@
    - Add support for optional firmware encryption feature (experimental).
    - Introduce a new `dualroot` chain of trust.
 
+- SPCI
+   - Introduced the SPM Dispatcher (SPMD) component as a new standard service.
+
 - Tools
    - Example: "fiptool: Add support to build fiptool on Windows."
 
@@ -85,6 +99,7 @@
    - Example: "Refactor SPSR initialisation code"
 
 - Tools
+   - sptool updated to accomodate building secure partition packages.
    - Example: "cert_create: Remove RSA PKCS#1 v1.5 support"