Trusted Firmware-A Documentation
Trusted Firmware-A (TF-A) provides a reference implementation of secure worldsoftware forArmv7-A and Armv8-A, including aSecure Monitor executingat Exception Level 3 (EL3). It implements various Arm interface standards,such as:
Where possible, the code is designed for reuse or porting to other Armv7-A andArmv8-A model and hardware platforms.
This release provides a suitable starting point for productization of secureworld boot and runtime firmware, in either the AArch32 or AArch64 executionstates.
Users are encouraged to do their own security validation, including penetrationtesting, on any secure world code derived from TF-A.
In collaboration with interested parties, we will continue to enhanceTF-Awith reference implementations of Arm standards to benefit developers workingwith Armv7-A and Armv8-A TrustZone technology.
Getting Started
TheTF-A documentation contains guidance for obtaining and building thesoftware for existing, supported platforms, as well as supporting informationfor porting the software to a new platform.
TheAbout chapter gives a high-level overview ofTF-A features as well assome information on the project and how it is organized.
Refer to the documents in theGetting Started chapter for information aboutthe prerequisites and requirements for buildingTF-A.
TheProcesses & Policies chapter explains the project’s release scheduleand process, how security disclosures are handled, and the guidelines forcontributing to the project (including the coding style).
TheComponents chapter holds documents that explain specific componentsthat make up theTF-A software, theException Handling Framework, forexample.
In theSystem Design chapter you will find documents that explain thedesign of portions of the software that involve more than one component, suchas theTrusted Board Boot process.
Platform Ports provides a list of the supported hardware and software-modelplatforms that are supported upstream inTF-A. Most of these platforms alsohave additional documentation that has been provided by the maintainers of theplatform.
The results of any performance evaluations are added to thePerformance & Testing chapter.
Security Advisories holds a list of documents relating toCVE entries thathave previously been raised against the software.
Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved.