Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 1 | Trusted Firmware-A Documentation |
| 2 | ================================ |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 3 | |
| 4 | .. toctree:: |
| 5 | :maxdepth: 1 |
Boyan Karatotev | 6d269a5 | 2022-10-27 15:12:36 +0100 | [diff] [blame] | 6 | :numbered: |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 7 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 8 | Home<self> |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 9 | about/index |
Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 10 | getting_started/index |
| 11 | process/index |
| 12 | components/index |
| 13 | design/index |
Sandrine Bailleux | f17ddaa | 2023-02-08 14:07:29 +0100 | [diff] [blame] | 14 | porting-guide |
Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 15 | plat/index |
| 16 | perf/index |
| 17 | security_advisories/index |
Balint Dobszay | 637f473 | 2019-11-13 12:48:00 +0100 | [diff] [blame] | 18 | design_documents/index |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 19 | threat_model/index |
Harrison Mutai | e9bc488 | 2023-02-23 10:33:58 +0000 | [diff] [blame] | 20 | tools/index |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 21 | change-log |
Paul Beesley | 606d807 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 22 | glossary |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 23 | license |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 24 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 25 | Trusted Firmware-A (TF-A) provides a reference implementation of secure world |
| 26 | software for `Armv7-A and Armv8-A`_, including a `Secure Monitor`_ executing |
| 27 | at Exception Level 3 (EL3). It implements various Arm interface standards, |
| 28 | such as: |
| 29 | |
| 30 | - The `Power State Coordination Interface (PSCI)`_ |
| 31 | - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ |
| 32 | - `SMC Calling Convention`_ |
| 33 | - `System Control and Management Interface (SCMI)`_ |
| 34 | - `Software Delegated Exception Interface (SDEI)`_ |
Manish V Badarkhe | da87af1 | 2021-06-20 21:14:46 +0100 | [diff] [blame] | 35 | - `PSA FW update specification`_ |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 36 | |
| 37 | Where possible, the code is designed for reuse or porting to other Armv7-A and |
| 38 | Armv8-A model and hardware platforms. |
| 39 | |
| 40 | This release provides a suitable starting point for productization of secure |
| 41 | world boot and runtime firmware, in either the AArch32 or AArch64 execution |
| 42 | states. |
| 43 | |
| 44 | Users are encouraged to do their own security validation, including penetration |
| 45 | testing, on any secure world code derived from TF-A. |
| 46 | |
Paul Beesley | d4414b6 | 2019-09-23 15:40:21 +0000 | [diff] [blame] | 47 | In collaboration with interested parties, we will continue to enhance |TF-A| |
| 48 | with reference implementations of Arm standards to benefit developers working |
| 49 | with Armv7-A and Armv8-A TrustZone technology. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 50 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 51 | Getting Started |
| 52 | --------------- |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 53 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 54 | The |TF-A| documentation contains guidance for obtaining and building the |
| 55 | software for existing, supported platforms, as well as supporting information |
| 56 | for porting the software to a new platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 57 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 58 | The **About** chapter gives a high-level overview of |TF-A| features as well as |
| 59 | some information on the project and how it is organized. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 60 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 61 | Refer to the documents in the **Getting Started** chapter for information about |
| 62 | the prerequisites and requirements for building |TF-A|. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 63 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 64 | The **Processes & Policies** chapter explains the project's release schedule |
| 65 | and process, how security disclosures are handled, and the guidelines for |
| 66 | contributing to the project (including the coding style). |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 67 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 68 | The **Components** chapter holds documents that explain specific components |
| 69 | that make up the |TF-A| software, the :ref:`Exception Handling Framework`, for |
| 70 | example. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 71 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 72 | In the **System Design** chapter you will find documents that explain the |
| 73 | design of portions of the software that involve more than one component, such |
| 74 | as the :ref:`Trusted Board Boot` process. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 75 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 76 | **Platform Ports** provides a list of the supported hardware and software-model |
| 77 | platforms that are supported upstream in |TF-A|. Most of these platforms also |
| 78 | have additional documentation that has been provided by the maintainers of the |
| 79 | platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 80 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 81 | The results of any performance evaluations are added to the |
| 82 | **Performance & Testing** chapter. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 83 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 84 | **Security Advisories** holds a list of documents relating to |CVE| entries that |
| 85 | have previously been raised against the software. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 86 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 87 | -------------- |
| 88 | |
Sandrine Bailleux | f17ddaa | 2023-02-08 14:07:29 +0100 | [diff] [blame] | 89 | *Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved.* |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 90 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 91 | .. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile |
| 92 | .. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php |
Manish V Badarkhe | 9d24e9b | 2023-06-15 09:14:33 +0100 | [diff] [blame] | 93 | .. _Power State Coordination Interface (PSCI): https://developer.arm.com/documentation/den0022/latest/ |
Sandrine Bailleux | f238417 | 2024-02-02 11:16:12 +0100 | [diff] [blame] | 94 | .. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 95 | .. _System Control and Management Interface (SCMI): http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf |
| 96 | .. _Software Delegated Exception Interface (SDEI): http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf |
laurenw-arm | 03e7e61 | 2020-04-16 10:02:17 -0500 | [diff] [blame] | 97 | .. _SMC Calling Convention: https://developer.arm.com/docs/den0028/latest |
Sughosh Ganu | f01e1e7 | 2024-02-01 12:25:09 +0530 | [diff] [blame] | 98 | .. _PSA FW update specification: https://developer.arm.com/documentation/den0118/latest/ |