Name Last commit Last update
.husky
bl1 bl2-el3: Don't compile BL1 when BL2_AT_EL3 is defined in FVP
bl2 bl2-el3: Don't compile BL1 when BL2_AT_EL3 is defined in FVP
bl2u Replace magic numbers in linkerscripts by PAGE_SIZE
bl31 Merge pull request #1193 from jwerner-chromium/JW_coreboot
bl32 sp_min: Implement workaround for CVE-2017-5715
common Add support to left-pad with zeroes in tf_printf
docs Merge pull request #1246 from sandrine-bailleux-arm/topics/sb/fix-cnp-doc
drivers Merge pull request #1236 from dbasehore/gic-save-restore
fdts Add Linux DTS for FVP with threaded CPUs
include Merge pull request #1235 from jwerner-chromium/JW_udelay
lib Merge pull request #1228 from dp-arm/dp/cve_2017_5715
licenses
make_helpers Build: support pre-tool image processing
plat Build: change the first parameter of TOOL_ADD_IMG to lowercase
services Merge pull request #1219 from antonio-nino-diaz-arm/an/mm-version
tools fiptool: Fix use after free
.checkpatch.conf Mandate 'Signed-off-by' line in commit messages
.cz.json
.editorconfig
.gitignore fip: move headers shared between TF and fiptool to include/tools_share
.gitreview
Makefile Build: change the first parameter of TOOL_ADD_IMG to lowercase
commitlint.config.js
dco.txt Drop requirement for CLA in contribution.md
license.rst Convert documentation to reStructuredText
package-lock.json
package.json
readme.rst Clarify third party license info in readme

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.