..
# SPDX-FileCopyrightText: Copyright 2023-2024 Arm Limited and/or its
# affiliates
#
# SPDX-License-Identifier: MIT
#############
Release Notes
#############
****
v1.0
****
New Features
============
Implementation of the :ref:`Use-Cases `.
The main components versions used in the Reference Software Stack:
..
cspell:disable
.. list-table::
:header-rows: 1
* - Component
- Version
- Source
* - Kronos Reference Design FVP (FVP_RD_Kronos)
- 11.25.15
- `FVP download (arm64 host) `_
`FVP download (x86 host) `_
* - RSS (Trusted Firmware-M)
- 53aa78efef274b9e46e63b429078ae1863609728 (based on master branch post v1.8.1)
- `Trusted Firmware-M repository`_
* - SCP-firmware
- cc4c9e017348d92054f74026ee1beb081403c168 (based on master branch post v2.13.0)
- `SCP-Firmware repository`_
* - Trusted Firmware-A
- 2.8.0
- `Trusted Firmware-A repository`_
* - OP-TEE
- 3.22.0
- `OP-TEE repository`_
* - Trusted Services
- 08b3d39471f4914186bd23793dc920e83b0e3197 (based on main branch, pre v1.0.0)
- `Trusted Services repository`_
* - U-Boot
- 2023.07.02
- `U-Boot repository`_
* - Xen
- 4.18
- `Xen repository`_
* - Linux Kernel
- 6.1.73
- `Linux repository`_ and `Linux preempt-rt repository`_
* - Zephyr
- 3.5.0
- `Zephyr repository`_
* - Safety Island Actuation Demo
- v2.0
- `Actuation repository`_
* - Mbed TLS
- 1ec69067fa1351427f904362c1221b31538c8b57 (based on 3.5.0)
- `Mbed TLS repository`_
* - Critical Application Monitoring
- v1.0
- `Critical Application Monitoring repository`_
..
cspell:enable
Third-party Yocto layers used to build the Reference Software Stack:
.. code-block:: yaml
:substitutions:
URL: |meta-arm repository|
layers: meta-arm, meta-arm-bsp, meta-arm-systemready, meta-arm-toolchain
branch: kronos-nanbield
revision: 5e4851a884985b952b33f6f88a8724fbbe5300ec
URL: |meta-cassini repository|
layers: meta-cassini-distro
branch: nanbield
revision: v1.1.0
URL: |meta-clang repository|
layers: meta-clang
branch: nanbield
revision: 5170ec9cdfe215fcef146fa9142521bfad1d7d6c
URL: |meta-openembedded repository|
layers: meta-filesystems, meta-networking, meta-oe, meta-python
branch: nanbield
revision: da9063bdfbe130f424ba487f167da68e0ce90e7d
URL: |meta-security repository|
layers: meta-parsec
branch: nanbield
revision: 5938fa58396968cc6412b398d403e37da5b27fce
URL: |meta-virtualization repository|
layers: meta-virtualization
branch: nanbield
revision: ac125d881f34ff356390e19e02964f8980d4ec38
URL: |meta-zephyr repository|
layers: meta-zephyr-core
branch: nanbield
revision: fa76b75bd65da63abcc2d65dd5d4eb24296f2f65
URL: |poky repository|
layers: meta, meta-poky
branch: nanbield
revision: 1a5c00f00c14cee3ba5d39c8c8db7a9738469eab
Changed
=======
Initial version.
.. _releasenotes_limitations:
Limitations
===========
* In the HIPC, the iperf parameter "-l/--length" should be less than 1473 (IP
and UDP overhead) in the case of Zephyr running as a UDP server since it does
not support IP fragmentation.
* `PSA Secure Storage API`_ defines two interfaces for storages: Internal
Trusted Storage (ITS) API and Protected Storage (PS) API. For now the
Reference Software Stack supports the ITS API on Safety Island only.
* PSA Protected Storage Optional APIs ``psa_ps_create`` and ``psa_ps_extended``
are not supported by Kronos Reference Software Stack as they are not
implemented in the Protected Storage Service provided by Trusted Firmware-M.
* PSA Secure Storage APIs Architecture Test Suite only runs on
Cluster 2 in the Safety Island due to the following limitations:
* Trusted Firmware-M supports a single partition only, this causes
tests running simultaneously on different entities to interfere
with each other due to accessing the same assets, resulting in failures.
* Trusted Firmware-M has no support against Denial of Service attacks,
where a test running on one entity might take up all the storage
on the RSS resulting in denial of service for tests running on other
entities.
Resolved and Known Issues
=========================
.. _releasenotes_knownissues:
Known Issues
------------
* The automated validation might fail due to the encoding issues in the logs.
This has been observed on an AWS aarch64 Graviton 2 build host. On the test logs,
the error message that appears is a typical timeout error.
The console log appears normal, but some characters are either corrupted or
replaced with \00, \x00 or ^@ characters. This issue is likely caused by encoding
mismatches or inconsistencies in the logging process, and it could occur in any of
the test suites. A workaround is to trigger the "Automated Validation" again. When
this issue occurs, something similar to the following would be observed in the logs:
.. cspell:disable
.. code-block:: text
52 28 bytes from 192.168.1.2 to 192.168.1.1: icmp_seq=7 ttl=64 time=0.00 ^@s^M
or
fault set_critical f\00u@2a570000 0x10000600 0
or
System shutdown complet\x00
.. cspell:enable
* The automated validation might rarely fail due to timeouts related to the
host CPU frequency and throttling, if this happens then simply running the
automated validation again would fix such as issue.
* Refer to `Critical Application Monitoring Known Issues `_
for CAM-related known issues.