• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..--

.husky/25-Apr-2025-338224

bl1/25-Apr-2025-2,3561,298

bl2/25-Apr-2025-1,490782

bl2u/25-Apr-2025-477206

bl31/25-Apr-2025-3,5901,848

bl32/25-Apr-2025-3,7712,138

common/25-Apr-2025-3,6822,123

docs/25-Apr-2025-56,41242,464

drivers/25-Apr-2025-158,747121,645

fdts/25-Apr-2025-13,88012,127

include/25-Apr-2025-71,63444,235

lib/25-Apr-2025-60,82538,419

licenses/25-Apr-2025-225186

make_helpers/25-Apr-2025-2,6051,186

plat/25-Apr-2025-359,984238,356

services/25-Apr-2025-24,32414,040

tools/25-Apr-2025-14,35010,718

.checkpatch.confD25-Apr-20252.8 KiB9217

.commitlintrc.jsD25-Apr-20251.9 KiB7345

.cz-adapter.cjsD25-Apr-2025347 1613

.cz.jsonD25-Apr-202536 43

.editorconfigD25-Apr-20251.9 KiB7355

.gitignoreD25-Apr-20251 KiB5649

.gitreviewD25-Apr-2025110 65

.nvmrcD25-Apr-20259 21

.readthedocs.yamlD25-Apr-2025685 3318

.versionrc.cjsD25-Apr-20254.9 KiB152126

Android.bpD25-Apr-2025153 65

MakefileD25-Apr-202554 KiB1,7831,280

changelog.yamlD25-Apr-202527.3 KiB1,439979

dco.txtD25-Apr-20251.4 KiB3828

license.rstD25-Apr-202521 21

package-lock.jsonD25-Apr-2025176.9 KiB4,9184,917

package.jsonD25-Apr-2025586 2524

poetry.lockD25-Apr-202552.9 KiB889796

pyproject.tomlD25-Apr-2025733 3428

readme.rstD25-Apr-20252.6 KiB5239

readme.rst

1Trusted Firmware-A
2==================
3
4Trusted Firmware-A (TF-A) is a reference implementation of secure world software
5for `Arm A-Profile architectures`_ (Armv8-A and Armv7-A), including an Exception
6Level 3 (EL3) `Secure Monitor`_. It provides a suitable starting point for
7productization of secure world boot and runtime firmware, in either the AArch32
8or AArch64 execution states.
9
10TF-A implements Arm interface standards, including:
11
12-  `Power State Coordination Interface (PSCI)`_
13-  `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_
14-  `SMC Calling Convention`_
15-  `System Control and Management Interface (SCMI)`_
16-  `Software Delegated Exception Interface (SDEI)`_
17
18The code is designed to be portable and reusable across hardware platforms and
19software models that are based on the Armv8-A and Armv7-A architectures.
20
21In collaboration with interested parties, we will continue to enhance TF-A
22with reference implementations of Arm standards to benefit developers working
23with Armv7-A and Armv8-A TrustZone technology.
24
25Users are encouraged to do their own security validation, including penetration
26testing, on any secure world code derived from TF-A.
27
28More Info and Documentation
29---------------------------
30
31To find out more about Trusted Firmware-A, please `view the full documentation`_
32that is available through `trustedfirmware.org`_.
33
34--------------
35
36*Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.*
37
38.. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile
39.. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php
40.. _Power State Coordination Interface (PSCI): PSCI_
41.. _PSCI: http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf
42.. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest
43.. _SMC Calling Convention: http://infocenter.arm.com/help/topic/com.arm.doc.den0028b/ARM_DEN0028B_SMC_Calling_Convention.pdf
44.. _System Control and Management Interface (SCMI): SCMI_
45.. _SCMI: http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf
46.. _Software Delegated Exception Interface (SDEI): SDEI_
47.. _SDEI: http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf
48.. _Arm A-Profile architectures: https://developer.arm.com/architectures/cpu-architecture/a-profile
49.. _view the full documentation: https://www.trustedfirmware.org/docs/tf-a
50.. _trustedfirmware.org: http://www.trustedfirmware.org
51
52