1*8cc36aecSPaul BeesleyTrusted Firmware-A 2*8cc36aecSPaul Beesley================== 36f625747SDouglas Raillard 4*8cc36aecSPaul BeesleyTrusted Firmware-A is a reference implementation of secure world software for 5*8cc36aecSPaul Beesley`Arm A-Profile architectures`_ (Armv8-A and Armv7-A), including an 6*8cc36aecSPaul BeesleyException Level 3 (EL3)`Secure Monitor`_. It provides a suitable starting point 7*8cc36aecSPaul Beesleyfor productization of secure world boot and runtime firmware, in either the 8*8cc36aecSPaul Beesley|AArch32| or |AArch64| execution states. 90668dd71SJohn Tsichritzis 10*8cc36aecSPaul Beesley|TF-A| implements Arm interface standards, including: 110668dd71SJohn Tsichritzis 12*8cc36aecSPaul Beesley- `Power State Coordination Interface (PSCI)`_ 13c1491ebaSSandrine Bailleux- `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ 144bf3349bSDan Handley- `SMC Calling Convention`_ 153c6261bdSPaul Beesley- `System Control and Management Interface (SCMI)`_ 165b0b7276SDan Handley- `Software Delegated Exception Interface (SDEI)`_ 174bf3349bSDan Handley 18*8cc36aecSPaul BeesleyThe code is designed to be portable and reusable across hardware platforms and 19*8cc36aecSPaul Beesleysoftware models that are based on the Armv8-A and Armv7-A architectures. 206f625747SDouglas Raillard 21*8cc36aecSPaul BeesleyIn collaboration with interested parties, we will continue to enhance |TF-A| 22*8cc36aecSPaul Beesleywith reference implementations of Arm standards to benefit developers working 23*8cc36aecSPaul Beesleywith Armv7-A and Armv8-A TrustZone technology. 24ca7145c5SPaul Beesley 25ca7145c5SPaul BeesleyUsers are encouraged to do their own security validation, including penetration 26ca7145c5SPaul Beesleytesting, on any secure world code derived from TF-A. 27ca7145c5SPaul Beesley 28*8cc36aecSPaul BeesleyRead More 29ca7145c5SPaul Beesley--------- 306f625747SDouglas Raillard 31*8cc36aecSPaul BeesleyTo find out more about Trusted Firmware-A, please `view the full documentation`_ 32*8cc36aecSPaul Beesleythat is available through `trustedfirmware.org`_. 33d0f9809dSJoel Hutton 346f625747SDouglas Raillard-------------- 356f625747SDouglas Raillard 3691ce07b1SAntonio Nino Diaz*Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.* 376f625747SDouglas Raillard 385b0b7276SDan Handley.. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile 396f625747SDouglas Raillard.. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php 404bf3349bSDan Handley.. _Power State Coordination Interface (PSCI): PSCI_ 414bf3349bSDan Handley.. _PSCI: http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf 42c1491ebaSSandrine Bailleux.. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest/trusted-board-boot-requirements-client-tbbr-client-armv8-a 434bf3349bSDan Handley.. _SMC Calling Convention: http://infocenter.arm.com/help/topic/com.arm.doc.den0028b/ARM_DEN0028B_SMC_Calling_Convention.pdf 443c6261bdSPaul Beesley.. _System Control and Management Interface (SCMI): SCMI_ 454bf3349bSDan Handley.. _SCMI: http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf 46ed811260Sdanh-arm.. _Software Delegated Exception Interface (SDEI): SDEI_ 475b0b7276SDan Handley.. _SDEI: http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf 48*8cc36aecSPaul Beesley.. _Arm A-Profile architectures: https://developer.arm.com/architectures/cpu-architecture/a-profile 49*8cc36aecSPaul Beesley.. _view the full documentation: https://www.trustedfirmware.org/docs/tf-a 50*8cc36aecSPaul Beesley.. _trustedfirmware.org: http://www.trustedfirmware.org 51*8cc36aecSPaul Beesley 52