Name Last commit Last update
.husky
bl1 Replace magic numbers in linkerscripts by PAGE_SIZE
bl2 Replace magic numbers in linkerscripts by PAGE_SIZE
bl2u Replace magic numbers in linkerscripts by PAGE_SIZE
bl31 Merge pull request #1178 from davidcunado-arm/dc/enable_sve
bl32 Merge pull request #1174 from antonio-nino-diaz-arm/an/page-size
common Add support to left-pad with zeroes in tf_printf
docs Merge pull request #1204 from davidcunado-arm/rv/fip_tool
drivers Merge pull request #1194 from robertovargas-arm/io-fix
fdts Add Linux DTS for FVP with threaded CPUs
include Move TSP to TZC secured DRAM
lib Merge pull request #1178 from davidcunado-arm/dc/enable_sve
licenses
make_helpers Build: specify check_* targets as .PHONY
plat Merge pull request #1207 from hzhuang1/isp_clk
services SPM: Allow secondary CPUs to use the Secure Partition
tools Add padding at the end of the last entry
.checkpatch.conf Mandate 'Signed-off-by' line in commit messages
.cz.json
.editorconfig
.gitignore fip: move headers shared between TF and fiptool to include/tools_share
.gitreview
Makefile Disable PIE compilation option
commitlint.config.js
dco.txt Drop requirement for CLA in contribution.md
license.rst Convert documentation to reStructuredText
package-lock.json
package.json
readme.rst Clarify third party license info in readme

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.