Name Last commit Last update
.husky
bl1 libc: Fix all includes in codebase
bl2 DSU erratum 936184 workaround
bl2u Add atexit function to libc
bl31 Fix MISRA defects in BL31 common code
bl32 libc: Fix all includes in codebase
common Merge pull request #1549 from danielboulby-arm/db/pointer
docs Merge pull request #1515 from bryanodonoghue/atf-master+linaro-warp7-squash-v4
drivers marvell: drivers: use anonymous union in I2C driver
fdts stm32mp1: Add device tree files
include Merge pull request #1515 from bryanodonoghue/atf-master+linaro-warp7-squash-v4
lib cpus: denver: Implement static workaround for CVE-2018-3639
licenses
make_helpers Allow manually setting the AArch32 instruction set
plat Merge pull request #1558 from jenswi-linaro/qemu-update
services opteed: pass power level on suspend
tools fix: tools: Fix doimage syntax breaking secure mode build
.checkpatch.conf checkpatch: Ignore SPDX_LICENSE_TAG
.cz.json
.editorconfig Add .editorconfig file
.gitignore tools: Add stm32image tool into TF-A
.gitreview
Makefile backtrace: Introduce backtrace function
commitlint.config.js
dco.txt Drop requirement for CLA in contribution.md
license.rst Update Arm TF references to TF-A
package-lock.json
package.json
readme.rst libc: Introduce files from SCC

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.