Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 1 | Trusted Firmware-A Documentation |
| 2 | ================================ |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 3 | |
| 4 | .. toctree:: |
| 5 | :maxdepth: 1 |
Boyan Karatotev | 6d269a5 | 2022-10-27 15:12:36 +0100 | [diff] [blame] | 6 | :numbered: |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 7 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 8 | Home<self> |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 9 | about/index |
Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 10 | getting_started/index |
| 11 | process/index |
| 12 | components/index |
| 13 | design/index |
| 14 | plat/index |
| 15 | perf/index |
| 16 | security_advisories/index |
Balint Dobszay | 637f473 | 2019-11-13 12:48:00 +0100 | [diff] [blame] | 17 | design_documents/index |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 18 | threat_model/index |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 19 | change-log |
Paul Beesley | 606d807 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 20 | glossary |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 21 | license |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 22 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 23 | Trusted Firmware-A (TF-A) provides a reference implementation of secure world |
| 24 | software for `Armv7-A and Armv8-A`_, including a `Secure Monitor`_ executing |
| 25 | at Exception Level 3 (EL3). It implements various Arm interface standards, |
| 26 | such as: |
| 27 | |
| 28 | - The `Power State Coordination Interface (PSCI)`_ |
| 29 | - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ |
| 30 | - `SMC Calling Convention`_ |
| 31 | - `System Control and Management Interface (SCMI)`_ |
| 32 | - `Software Delegated Exception Interface (SDEI)`_ |
Manish V Badarkhe | da87af1 | 2021-06-20 21:14:46 +0100 | [diff] [blame] | 33 | - `PSA FW update specification`_ |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 34 | |
| 35 | Where possible, the code is designed for reuse or porting to other Armv7-A and |
| 36 | Armv8-A model and hardware platforms. |
| 37 | |
| 38 | This release provides a suitable starting point for productization of secure |
| 39 | world boot and runtime firmware, in either the AArch32 or AArch64 execution |
| 40 | states. |
| 41 | |
| 42 | Users are encouraged to do their own security validation, including penetration |
| 43 | testing, on any secure world code derived from TF-A. |
| 44 | |
Paul Beesley | d4414b6 | 2019-09-23 15:40:21 +0000 | [diff] [blame] | 45 | In collaboration with interested parties, we will continue to enhance |TF-A| |
| 46 | with reference implementations of Arm standards to benefit developers working |
| 47 | with Armv7-A and Armv8-A TrustZone technology. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 48 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 49 | Getting Started |
| 50 | --------------- |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 51 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 52 | The |TF-A| documentation contains guidance for obtaining and building the |
| 53 | software for existing, supported platforms, as well as supporting information |
| 54 | for porting the software to a new platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 55 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 56 | The **About** chapter gives a high-level overview of |TF-A| features as well as |
| 57 | some information on the project and how it is organized. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 58 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 59 | Refer to the documents in the **Getting Started** chapter for information about |
| 60 | the prerequisites and requirements for building |TF-A|. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 61 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 62 | The **Processes & Policies** chapter explains the project's release schedule |
| 63 | and process, how security disclosures are handled, and the guidelines for |
| 64 | contributing to the project (including the coding style). |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 65 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 66 | The **Components** chapter holds documents that explain specific components |
| 67 | that make up the |TF-A| software, the :ref:`Exception Handling Framework`, for |
| 68 | example. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 69 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 70 | In the **System Design** chapter you will find documents that explain the |
| 71 | design of portions of the software that involve more than one component, such |
| 72 | as the :ref:`Trusted Board Boot` process. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 73 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 74 | **Platform Ports** provides a list of the supported hardware and software-model |
| 75 | platforms that are supported upstream in |TF-A|. Most of these platforms also |
| 76 | have additional documentation that has been provided by the maintainers of the |
| 77 | platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 78 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 79 | The results of any performance evaluations are added to the |
| 80 | **Performance & Testing** chapter. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 81 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 82 | **Security Advisories** holds a list of documents relating to |CVE| entries that |
| 83 | have previously been raised against the software. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 84 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 85 | -------------- |
| 86 | |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 87 | *Copyright (c) 2013-2021, Arm Limited and Contributors. All rights reserved.* |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 88 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 89 | .. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile |
| 90 | .. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 91 | .. _Power State Coordination Interface (PSCI): http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 92 | .. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest/trusted-board-boot-requirements-client-tbbr-client-armv8-a |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 93 | .. _System Control and Management Interface (SCMI): http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf |
| 94 | .. _Software Delegated Exception Interface (SDEI): http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf |
laurenw-arm | 03e7e61 | 2020-04-16 10:02:17 -0500 | [diff] [blame] | 95 | .. _SMC Calling Convention: https://developer.arm.com/docs/den0028/latest |
Manish V Badarkhe | da87af1 | 2021-06-20 21:14:46 +0100 | [diff] [blame] | 96 | .. _PSA FW update specification: https://developer.arm.com/documentation/den0118/a/ |