|
|
|
ARM Trusted Firmware - version 0.3
|
|
|
|
==================================
|
|
|
|
|
|
|
|
New features
|
|
|
|
------------
|
|
|
|
|
|
|
|
* Support for Foundation FVP Version 2.0 added.
|
|
|
|
The documented UEFI configuration disables some devices that are unavailable
|
|
|
|
in the Foundation FVP, including MMC and CLCD. The resultant UEFI binary can
|
|
|
|
be used on the AEMv8 and Cortex-A57-A53 Base FVPs, as well as the Foundation
|
|
|
|
FVP.
|
|
|
|
|
|
|
|
NOTE: The software will not work on Version 1.0 of the Foundation FVP.
|
|
|
|
|
|
|
|
* Enabled third party contributions. Added a new contributing.md containing
|
|
|
|
instructions for how to contribute and updated copyright text in all files
|
|
|
|
to acknowledge contributors.
|
|
|
|
|
|
|
|
* The PSCI CPU_SUSPEND API has been stabilised to the extent where it can be
|
|
|
|
used for entry into power down states with the following restrictions:
|
|
|
|
- Entry into standby states is not supported.
|
|
|
|
- The API is only supported on the AEMv8 and Cortex-A57-A53 Base FVPs.
|
|
|
|
|
|
|
|
* The PSCI AFFINITY_INFO api has undergone limited testing on the Base FVPs to
|
|
|
|
allow experimental use.
|
|
|
|
|
|
|
|
* Required C library and runtime header files are now included locally in ARM
|
|
|
|
Trusted Firmware instead of depending on the toolchain standard include
|
|
|
|
paths. The local implementation has been cleaned up and reduced in scope.
|
|
|
|
|
|
|
|
* Added I/O abstraction framework, primarily to allow generic code to load
|
|
|
|
images in a platform-independent way. The existing image loading code has
|
|
|
|
been reworked to use the new framework. Semi-hosting and NOR flash I/O
|
|
|
|
drivers are provided.
|
|
|
|
|
|
|
|
* Introduced Firmware Image Package (FIP) handling code and tools. A FIP
|
|
|
|
combines multiple firmware images with a Table of Contents (ToC) into a
|
|
|
|
single binary image. The new FIP driver is another type of I/O driver. The
|
|
|
|
Makefile builds a FIP by default and the FVP platform code expect to load a
|
|
|
|
FIP from NOR flash, although some support for image loading using semi-
|
|
|
|
hosting is retained.
|
|
|
|
|
|
|
|
NOTE: Building a FIP by default is a non-backwards-compatible change.
|
|
|
|
|
|
|
|
NOTE: Generic BL2 code now loads a BL3-3 (non-trusted firmware) image into
|
|
|
|
DRAM instead of expecting this to be pre-loaded at known location. This is
|
|
|
|
also a non-backwards-compatible change.
|
|
|
|
|
|
|
|
NOTE: Some non-trusted firmware (e.g. UEFI) will need to be rebuilt so that
|
|
|
|
it knows the new location to execute from and no longer needs to copy
|
|
|
|
particular code modules to DRAM itself.
|
|
|
|
|
|
|
|
* Reworked BL2 to BL3-1 handover interface. A new composite structure
|
|
|
|
(bl31_args) holds the superset of information that needs to be passed from
|
|
|
|
BL2 to BL3-1, including information on how handover execution control to
|
|
|
|
BL3-2 (if present) and BL3-3 (non-trusted firmware).
|
|
|
|
|
|
|
|
* Added library support for CPU context management, allowing the saving and
|
|
|
|
restoring of
|
|
|
|
- Shared system registers between Secure-EL1 and EL1.
|
|
|
|
- VFP registers.
|
|
|
|
- Essential EL3 system registers.
|
|
|
|
|
|
|
|
* Added a framework for implementing EL3 runtime services. Reworked the PSCI
|
|
|
|
implementation to be one such runtime service.
|
|
|
|
|
|
|
|
* Reworked the exception handling logic, making use of both SP_EL0 and SP_EL3
|
|
|
|
stack pointers for determining the type of exception, managing general
|
|
|
|
purpose and system register context on exception entry/exit, and handling
|
|
|
|
SMCs. SMCs are directed to the correct EL3 runtime service.
|
|
|
|
|
|
|
|
* Added support for a Test Secure-EL1 Payload (TSP) and a corresponding
|
|
|
|
Dispatcher (TSPD), which is loaded as an EL3 runtime service. The TSPD
|
|
|
|
implements Secure Monitor functionality such as world switching and
|
|
|
|
EL1 context management, and is responsible for communication with the TSP.
|
|
|
|
NOTE: The TSPD does not yet contain support for secure world interrupts.
|
|
|
|
NOTE: The TSP/TSPD is not built by default.
|
|
|
|
|
|
|
|
|
|
|
|
Issues resolved since last release
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
* Support has been added for switching context between secure and normal
|
|
|
|
worlds in EL3.
|
|
|
|
|
|
|
|
* PSCI API calls `AFFINITY_INFO` & `PSCI_VERSION` have now been tested (to
|
|
|
|
a limited extent).
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware build artifacts are now placed in the `./build`
|
|
|
|
directory and sub-directories instead of being placed in the root of the
|
|
|
|
project.
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware is now free from build warnings. Build warnings
|
|
|
|
are now treated as errors.
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware now provides C library support locally within the
|
|
|
|
project to maintain compatibility between toolchains/systems.
|
|
|
|
|
|
|
|
* The PSCI locking code has been reworked so it no longer takes locks in an
|
|
|
|
incorrect sequence.
|
|
|
|
|
|
|
|
* The RAM-disk method of loading a Linux file-system has been confirmed to
|
|
|
|
work with the ARM Trusted Firmware and Linux kernel version (based on
|
|
|
|
version 3.13) used in this release, for both Foundation and Base FVPs.
|
|
|
|
|
|
|
|
|
|
|
|
Known issues
|
|
|
|
------------
|
|
|
|
|
|
|
|
The following is a list of issues which are expected to be fixed in the future
|
|
|
|
releases of the ARM Trusted Firmware.
|
|
|
|
|
|
|
|
* The TrustZone Address Space Controller (TZC-400) is not being programmed
|
|
|
|
yet. Use of model parameter `-C bp.secure_memory=1` is not supported.
|
|
|
|
|
|
|
|
* No support yet for secure world interrupt handling.
|
|
|
|
|
|
|
|
* GICv3 support is experimental. The Linux kernel patches to support this are
|
|
|
|
not widely available. There are known issues with GICv3 initialization in
|
|
|
|
the ARM Trusted Firmware.
|
|
|
|
|
|
|
|
* Dynamic image loading is not available yet. The current image loader
|
|
|
|
implementation (used to load BL2 and all subsequent images) has some
|
|
|
|
limitations. Changing BL2 or BL3-1 load addresses in certain ways can lead
|
|
|
|
to loading errors, even if the images should theoretically fit in memory.
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware uses too much on-chip Trusted SRAM. Currently the
|
|
|
|
Test Secure-EL1 Payload (BL3-2) executes in Trusted DRAM since there is not
|
|
|
|
enough SRAM. A number of RAM usage enhancements have been identified to
|
|
|
|
rectify this situation.
|
|
|
|
|
|
|
|
* CPU idle does not work on the advertised version of the Foundation FVP.
|
|
|
|
Some FVP fixes are required that are not available externally at the time
|
|
|
|
of writing.
|
|
|
|
|
|
|
|
* Various bugs in ARM Trusted Firmware, UEFI and the Linux kernel have been
|
|
|
|
observed when using Linaro toolchain versions later than 13.11. Although
|
|
|
|
most of these have been fixed, some remain at the time of writing. These
|
|
|
|
mainly seem to relate to a subtle change in the way the compiler converts
|
|
|
|
between 64-bit and 32-bit values (e.g. during casting operations), which
|
|
|
|
reveals previously hidden bugs in client code.
|
|
|
|
|
|
|
|
* The tested filesystem used for this release (Linaro AArch64 OpenEmbedded
|
|
|
|
14.01) does not report progress correctly in the console. It only seems to
|
|
|
|
produce error output, not standard output. It otherwise appears to function
|
|
|
|
correctly. Other filesystem versions on the same software stack do not
|
|
|
|
exhibit the problem.
|
|
|
|
|
|
|
|
* The Makefile structure doesn't make it easy to separate out parts of the
|
|
|
|
Trusted Firmware for re-use in platform ports, for example if only BL3-1 is
|
|
|
|
required in a platform port. Also, dependency checking in the Makefile is
|
|
|
|
flawed.
|
|
|
|
|
|
|
|
* The firmware design documentation for the Test Secure-EL1 Payload (TSP) and
|
|
|
|
its dispatcher (TSPD) is incomplete. Similarly for the PSCI section.
|
|
|
|
|
|
|
|
|
|
|
|
ARM Trusted Firmware - version 0.2
|
|
|
|
==================================
|
|
|
|
|
|
|
|
New features
|
|
|
|
------------
|
|
|
|
|
|
|
|
* First source release.
|
|
|
|
|
|
|
|
* Code for the PSCI suspend feature is supplied, although this is not enabled
|
|
|
|
by default since there are known issues (see below).
|
|
|
|
|
|
|
|
|
|
|
|
Issues resolved since last release
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
* The "psci" nodes in the FDTs provided in this release now fully comply
|
|
|
|
with the recommendations made in the PSCI specification.
|
|
|
|
|
|
|
|
|
|
|
|
Known issues
|
|
|
|
------------
|
|
|
|
|
|
|
|
The following is a list of issues which are expected to be fixed in the future
|
|
|
|
releases of the ARM Trusted Firmware.
|
|
|
|
|
|
|
|
* The TrustZone Address Space Controller (TZC-400) is not being programmed
|
|
|
|
yet. Use of model parameter `-C bp.secure_memory=1` is not supported.
|
|
|
|
|
|
|
|
* No support yet for secure world interrupt handling or for switching context
|
|
|
|
between secure and normal worlds in EL3.
|
|
|
|
|
|
|
|
* GICv3 support is experimental. The Linux kernel patches to support this are
|
|
|
|
not widely available. There are known issues with GICv3 initialization in
|
|
|
|
the ARM Trusted Firmware.
|
|
|
|
|
|
|
|
* Dynamic image loading is not available yet. The current image loader
|
|
|
|
implementation (used to load BL2 and all subsequent images) has some
|
|
|
|
limitations. Changing BL2 or BL3-1 load addresses in certain ways can lead
|
|
|
|
to loading errors, even if the images should theoretically fit in memory.
|
|
|
|
|
|
|
|
* Although support for PSCI `CPU_SUSPEND` is present, it is not yet stable
|
|
|
|
and ready for use.
|
|
|
|
|
|
|
|
* PSCI API calls `AFFINITY_INFO` & `PSCI_VERSION` are implemented but have not
|
|
|
|
been tested.
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware make files result in all build artifacts being
|
|
|
|
placed in the root of the project. These should be placed in appropriate
|
|
|
|
sub-directories.
|
|
|
|
|
|
|
|
* The compilation of ARM Trusted Firmware is not free from compilation
|
|
|
|
warnings. Some of these warnings have not been investigated yet so they
|
|
|
|
could mask real bugs.
|
|
|
|
|
|
|
|
* The ARM Trusted Firmware currently uses toolchain/system include files like
|
|
|
|
stdio.h. It should provide versions of these within the project to maintain
|
|
|
|
compatibility between toolchains/systems.
|
|
|
|
|
|
|
|
* The PSCI code takes some locks in an incorrect sequence. This may cause
|
|
|
|
problems with suspend and hotplug in certain conditions.
|
|
|
|
|
|
|
|
* The Linux kernel used in this release is based on version 3.12-rc4. Using
|
|
|
|
this kernel with the ARM Trusted Firmware fails to start the file-system as
|
|
|
|
a RAM-disk. It fails to execute user-space `init` from the RAM-disk. As an
|
|
|
|
alternative, the VirtioBlock mechanism can be used to provide a file-system
|
|
|
|
to the kernel.
|
|
|
|
|
|
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
_Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved._
|