Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 1 | Trusted Firmware-A Documentation |
| 2 | ================================ |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 3 | |
| 4 | .. toctree:: |
| 5 | :maxdepth: 1 |
Paul Beesley | a879009 | 2019-03-07 17:03:22 +0000 | [diff] [blame] | 6 | :hidden: |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 7 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 8 | Home<self> |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 9 | about/index |
Paul Beesley | ea22512 | 2019-02-11 17:54:45 +0000 | [diff] [blame] | 10 | getting_started/index |
| 11 | process/index |
| 12 | components/index |
| 13 | design/index |
| 14 | plat/index |
| 15 | perf/index |
| 16 | security_advisories/index |
Balint Dobszay | 637f473 | 2019-11-13 12:48:00 +0100 | [diff] [blame] | 17 | design_documents/index |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 18 | change-log |
laurenw-arm | 462ab37 | 2020-01-17 10:26:21 -0600 | [diff] [blame] | 19 | change-log-upcoming |
Paul Beesley | 606d807 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 20 | glossary |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 21 | license |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 22 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 23 | Trusted Firmware-A (TF-A) provides a reference implementation of secure world |
| 24 | software for `Armv7-A and Armv8-A`_, including a `Secure Monitor`_ executing |
| 25 | at Exception Level 3 (EL3). It implements various Arm interface standards, |
| 26 | such as: |
| 27 | |
| 28 | - The `Power State Coordination Interface (PSCI)`_ |
| 29 | - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ |
| 30 | - `SMC Calling Convention`_ |
| 31 | - `System Control and Management Interface (SCMI)`_ |
| 32 | - `Software Delegated Exception Interface (SDEI)`_ |
| 33 | |
| 34 | Where possible, the code is designed for reuse or porting to other Armv7-A and |
| 35 | Armv8-A model and hardware platforms. |
| 36 | |
| 37 | This release provides a suitable starting point for productization of secure |
| 38 | world boot and runtime firmware, in either the AArch32 or AArch64 execution |
| 39 | states. |
| 40 | |
| 41 | Users are encouraged to do their own security validation, including penetration |
| 42 | testing, on any secure world code derived from TF-A. |
| 43 | |
Paul Beesley | d4414b6 | 2019-09-23 15:40:21 +0000 | [diff] [blame] | 44 | In collaboration with interested parties, we will continue to enhance |TF-A| |
| 45 | with reference implementations of Arm standards to benefit developers working |
| 46 | with Armv7-A and Armv8-A TrustZone technology. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 47 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 48 | Getting Started |
| 49 | --------------- |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 50 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 51 | The |TF-A| documentation contains guidance for obtaining and building the |
| 52 | software for existing, supported platforms, as well as supporting information |
| 53 | for porting the software to a new platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 54 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 55 | The **About** chapter gives a high-level overview of |TF-A| features as well as |
| 56 | some information on the project and how it is organized. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 57 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 58 | Refer to the documents in the **Getting Started** chapter for information about |
| 59 | the prerequisites and requirements for building |TF-A|. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 60 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 61 | The **Processes & Policies** chapter explains the project's release schedule |
| 62 | and process, how security disclosures are handled, and the guidelines for |
| 63 | contributing to the project (including the coding style). |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 64 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 65 | The **Components** chapter holds documents that explain specific components |
| 66 | that make up the |TF-A| software, the :ref:`Exception Handling Framework`, for |
| 67 | example. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 68 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 69 | In the **System Design** chapter you will find documents that explain the |
| 70 | design of portions of the software that involve more than one component, such |
| 71 | as the :ref:`Trusted Board Boot` process. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 72 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 73 | **Platform Ports** provides a list of the supported hardware and software-model |
| 74 | platforms that are supported upstream in |TF-A|. Most of these platforms also |
| 75 | have additional documentation that has been provided by the maintainers of the |
| 76 | platform. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 77 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 78 | The results of any performance evaluations are added to the |
| 79 | **Performance & Testing** chapter. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 80 | |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 81 | **Security Advisories** holds a list of documents relating to |CVE| entries that |
| 82 | have previously been raised against the software. |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 83 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 84 | -------------- |
| 85 | |
Balint Dobszay | 637f473 | 2019-11-13 12:48:00 +0100 | [diff] [blame] | 86 | *Copyright (c) 2013-2020, Arm Limited and Contributors. All rights reserved.* |
Paul Beesley | 22994f7 | 2019-01-23 15:39:39 +0000 | [diff] [blame] | 87 | |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 88 | .. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile |
| 89 | .. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 90 | .. _Power State Coordination Interface (PSCI): http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf |
Paul Beesley | cb23802 | 2019-03-07 15:25:14 +0000 | [diff] [blame] | 91 | .. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest/trusted-board-boot-requirements-client-tbbr-client-armv8-a |
Paul Beesley | 48f12a4 | 2019-10-16 13:35:47 +0000 | [diff] [blame] | 92 | .. _System Control and Management Interface (SCMI): http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf |
| 93 | .. _Software Delegated Exception Interface (SDEI): http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf |
laurenw-arm | 03e7e61 | 2020-04-16 10:02:17 -0500 | [diff] [blame] | 94 | .. _SMC Calling Convention: https://developer.arm.com/docs/den0028/latest |