.. # SPDX-FileCopyrightText: Copyright 2024-2026 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT ############# Release notes ############# .. important:: This page contains release notes for ``arm-zena-css``. For common releases and shared content, refer to the `Software Reference Stack release notes `__. ********** v2.2 ********** New features ------------ * Introduced NI-710AE FMU support. * Introduced Primary compute standalone reset support. * Introduced Cortex-A720AE CPU core RAS FFH support in Linux. * Added platform-specific rasdaemon integration for RAS logging on RD-Aspen. * Introduced System Monitoring Control Framework. * Introduced safety boot support for SI clusters. * RSE firmware images Encryption and Decryption. * Added support for Linux boot to shell on the Arm Zena CSS Cfg0 RTL. * Introduced Secure Firmware Update using capsule-on-disk mechanism. * Introduced a Platform Fault Detection Interface for Safety Island Cluster 1. * Introduced PFDI monitoring support for Safety Island (SI) cluster 1. * SystemReady Devicetree v3.1.1 compliance. * Added HIPC support for Baremetal Architecture. Changed ------- * Upgraded openSUSE version to 16.0. * Implemented Linux sniff tests for unattended openSUSE installations. * Upgraded SystemReady Devicetree ACS version to 3.1.1. * Upgraded Trusted Services version to 1.3.0. * Upgraded U-Boot version to 2026.01. * Replaced Fedora Server with Rocky Linux 10.1. * SystemReady builds use upstream Linux device tree (zena-css-fvp.dts) Resolved issues --------------- * Fixed an intermittent timeout in the Platform Fault Detection Interface (PFDI) Architecture Compliance Suite (ACS) when running on the Primary Compute. The issue is resolved in version 3.1.1, which is used in this release. * Fixed the exclusion of the System Memory Management Unit (SMMU) node from the Primary Compute device tree. Dependencies ------------ The versions of the main components used in the Reference Software Stack: .. cspell:disable .. list-table:: Component versions :widths: 20 40 40 :header-rows: 1 * - Component - Version - Source * - Arm Zena CSS FVP (FVP_RD_Aspen) - 11.31.25 - `FVP Cfg1 download (arm64 host) `__ `FVP Cfg2 download (arm64 host) `__ `FVP Cfg1 download (x86 host) `__ `FVP Cfg2 download (x86 host) `__ * - RSE (Trusted Firmware-M) - 48bdbb5415ab9241b3dfcc51280b32cfbf285c1a (based on main branch post v2.2.2) - `Trusted Firmware-M repository `__ * - SCP-firmware - 07181be79ae968be1479f0c714325ac1a31fe075 (based on main branch post v2.16.0) - `SCP-Firmware repository `__ * - Trusted Firmware-A - bacd68ff6d993d7a65791c8693de2e1e738bc4cf (based on master branch post v2.14.0) - `Trusted Firmware-A repository `__ * - OP-TEE - 4936f055618d2a6a57ad6be12d557f2fb47a6e88 (based on master branch post v4.7.0) - `OP-TEE repository `__ * - Trusted Services - a5db25bc3f2892781a07620af5d6625900988281 (based on integration branch post v1.3.0) - `Trusted Services repository `__ * - U-Boot - 2026.01 - `U-Boot repository `__ * - Xen - 4.21 - `Xen repository `__ * - Linux Kernel - 6.18.5 - `Linux repository `__ and `Linux preempt-rt repository `__ * - Zephyr - 4.1.0 - `Zephyr repository `__ Third-party Yocto layers used to build the Reference Software Stack: .. code-block:: yaml :substitutions: URL: |meta-arm repository| layers: meta-arm, meta-arm-bsp, meta-arm-systemready, meta-arm-toolchain branch: walnascar revision: 21894cc2ea3197e6bfc1a56d889f757a09dc8b31 URL: |poky repository| layers: meta, meta-poky branch: walnascar tag: yocto-5.2.3 revision: a704e5171ce4f87e27408934b593e5a186ac1960 URL: |meta-cassini repository| layers: meta-cassini-distro, meta-cassini-tests branch: walnascar revision: 4dad481980fb8a700cce8402bece7cf1bebbdee3 URL: |meta-clang repository| layers: meta-clang branch: walnascar revision: 003cba92e982bdd565a6889f28799f8bba14957e URL: |meta-ewaol repository| layers: meta-ewaol branch: walnascar revision: 4ba5f48c4e10ad2a0271bb2287a66688e6c2fa15 URL: |meta-bluechi repository| layers: meta-bluechi branch: walnascar revision: f5f1f43f93939198d64124d85e61370df4fb2c77 URL: |meta-openembedded repository| layers: meta-filesystems, meta-networking, meta-oe, meta-python, meta-perl branch: walnascar revision: 80ab58cc404959ae2f0e8b2e68935b3bfd8e8cfe URL: |meta-ptx repository| layers: meta-ptx branch: walnascar revision: 23e46e92946ca0a1b1da4cf3ad212169d46b0af8 URL: |meta-secure-core repository| layers: meta-secure-core-common, meta-efi-secure-boot, meta-signing-key, meta-integrity branch: walnascar revision: 243281acbb4d3839b80b795030a7f4900e254735 URL: |meta-security repository| layers: meta-parsec branch: walnascar revision: 1f7eeb8e84811fa79b98f236ade42dc52d44cfc6 URL: |meta-virtualization repository| layers: meta-virtualization branch: walnascar revision: 898239e810acbb7db93299f20deec8afe434f11b URL: |meta-zephyr repository| layers: meta-zephyr-core branch: walnascar revision: 3617fcdfd0f232dcaff4a153e667c26445b2077c URL: |meta-mender repository| layers: meta-mender branch: walnascar revision: cbe7fa19997a5fb462a925552b92a1e19408ed63 .. _RD-Aspen_limitations: Limitations ----------- * OP-TEE v4.7.0 doesn't support FF-A Notification pending interrupt and Schedule Receiver interrupt. When Linux FF-A driver discovers that those 2 FF-A features are not supported, it outputs the following error message in Application Processor (AP) Non-secure world terminal and terminates notification feature setup. FF-A notification feature is not mandatory and FF-A communication in AP is not affected. .. cspell:disable .. code-block:: console ARM FF-A: Notification setup failed -95, not enabled .. cspell:enable * Trusted Services (TS) Logging Service is not enabled in CSS-Aspen. TS System Management Mode Gateway (SMM Gateway) secure partition outputs the following error messages in AP Secure world terminal, when it attempts to discover Logging Service during its initialization. SMM Gateway functionalities are not changed or affected when Logging Service is not enabled in TS v1.3.0. .. cspell:disable .. code-block:: console E/SMMGW: open_session:90 sp_msg_send_direct_req(): error -4 E/SMMGW: find_and_open_session:168 no SP found supporting protocol version 1 and the requested service E/SMMGW: close_session:442 session is already closed E/SMMGW: ts_rpc_caller_sp_deinit:524 failed to close session E/SMMGW: sp_init:162 Logging service discovery failed, falling back to console log .. cspell:enable * In the HIPC, the ``iperf`` parameter ``-l/–length`` should be less than 1473 (IP and UDP overhead) in the case of Zephyr running as a UDP server since it does not support IP fragmentation. * FMU software module uses only aggregated outputs from the Fault Management Unit (FMU). The system connects this fault signal to the interrupt controller. When the interrupt controller receives the signal, the FMU software parses the FMU tree. It then locates the corresponding error record. The parsing logic assumes that each leaf FMU provides one critical signal and one non-critical signal. This assumption does not hold for the NI-710AE FMU. This FMU can generate two non-critical faults: corrected errors (CE) and uncorrected errors (UE). The parsing tree supports only one non-critical signal. The system discards the second fault. As a result, the driver cannot identify the fault source or access the error record for the second non-critical fault. * There are 4 unsupported test-cases out of 64 in PSA Crypto API test suite. Failed test cases are skipped. * RSA is not supported by the current TF-M CryptoCell driver. * CSS-Aspen FVP doesn’t include a TrustZone Address Space Controller (TZC). Trusted Firmware-A doesn’t program TZC to set up security configurations for DRAM or peripherals. * PCIe configuration is excluded. * The flash device of TF-M Protected Storage (PS) in CSS-Aspen does not support the Replay-Protected Monotonic Counter (RPMC) feature. Instead PS Non-Volatile Counters (NV Counters) are implemented with a limited size in RSE OTP memory. Exceeding 512 writes to PS will cause the PS NV Counters to overflow and may trigger a system panic. Supporting an increase in the number of writes will require an increase in the NV Counter size. * RSE flash is implemented as part of the wider system rather than within the CSS. The Internal Trusted Storage (ITS) is located in this external flash memory and therefore requires confidentiality, integrity protection, and replay protection against attackers with physical access to the device. These protections are typically achieved through a combination of software-based encryption and authentication, along with hardware features such as flash devices that include replay protection mechanisms or by writing replay protection values through the PSA Internal Trusted Storage (ITS) API. * Disabled Fault Management Unit interrupts in the RTL build. These interrupts are currently not enabled due to limitations in the RTL implementation. Known issues ------------ * When CSS-Aspen starts for the first time, TS SE-Proxy secure partition outputs the following error messages in AP Secure world terminal. .. cspell:disable .. code-block:: console E/SEPROXY: secure_storage_ipc_remove:115 ipc_remove: failed to psa_call: -140 E/SEPROXY: secure_storage_ipc_remove:115 ipc_remove: failed to psa_call: -140 .. cspell:enable This is normal and expected behavior. When SMM Gateway stores new variables, it calls SE-Proxy to remove 2 SMM variable indexes from RSE Protected Storage (PS) flash and store new ones. On the first boot, the default PS implementation erases PS flash to create an empty flash layout. Those 2 SMM variable indexes don't exist in PS flash when SMM Gateway attempts to remove them for the first time. As a result, PS returns the error code ``PSA_ERROR_DOES_NOT_EXIST`` (``-140``) to SE-Proxy. SMM Gateway will create SMM variable indexes in PS flash if they don't exist. On subsequent boots, those SMM variable indexes are preserved in PS flash and therefore SE-Proxy does not report this error. * Baremetal CFG2 and STL automated tests may intermittently fail when executed in sequence. Re-running the tests typically resolves the issue. * After a successful Secure Firmware Update (Secure FWU), any subsequent update attempt will fail. The following message is observed in the AP non-secure world terminal: .. cspell:disable .. code-block:: console Firmware update failed: Applying capsule fw.cap failed. .. cspell:enable Secure FWU is unable to write images to the ``FIP_B`` firmware image bank in AP Flash. This is due to a conflict in the ATU mappings. Specifically, the mapping for the AP Flash region corresponding to ``FIP_B`` overlaps with another existing ATU mapping. Previous releases ================= For information about previous releases, see: * `v2.1.1 release notes `__