Upstream fork of ATF with a couple of rk3399 patches to remove HDCP blob and increase BAUD_RATE.
Go to file
Nina Wu 0f40824729 mediatek: mt8192: Add reboot function for PSCI
Add system_reset function in psci ops

Change-Id: If85be70b8ae9d6487e02626356f0ff1e78b76de9
Signed-off-by: Nina Wu <nina-cm.wu@mediatek.com>
2020-10-28 17:21:55 +08:00
bl1 Increase type widths to satisfy width requirements 2020-10-12 10:55:03 -05:00
bl2 TF-A: Add support for Measured Boot driver in BL1 and BL2 2020-07-21 20:33:20 +00:00
bl2u linker_script: move .data section to bl_common.ld.h 2020-04-25 20:09:08 +09:00
bl31 Increase type widths to satisfy width requirements 2020-10-12 10:55:03 -05:00
bl32 Merge "Increase type widths to satisfy width requirements" into integration 2020-10-18 14:51:00 +00:00
common Merge "Increase type widths to satisfy width requirements" into integration 2020-10-18 14:51:00 +00:00
docs Merge changes from topic "tc0_sel2_spmc" into integration 2020-10-21 21:03:14 +00:00
drivers Merge "Increase type widths to satisfy width requirements" into integration 2020-10-18 14:51:00 +00:00
fdts plat: tc0: Add TZC DRAM1 region for SPMC and trusted OS 2020-10-20 20:07:06 +00:00
include plat: arm: Make BL32_BASE platform dependent when SPD_spmd is enabled 2020-10-20 20:06:59 +00:00
lib lib: el3_runtime: Fix SPE system registers in el2_sysregs_context 2020-10-20 20:06:48 +00:00
make_helpers lib: el3_runtime: Conditionally save/restore EL2 NEVE registers 2020-10-20 20:06:43 +00:00
plat mediatek: mt8192: Add reboot function for PSCI 2020-10-28 17:21:55 +08:00
services spmd: Fix signedness comparison warning 2020-10-02 12:14:02 +00:00
tools Update makefile to build fiptool for Windows 2020-09-14 15:06:56 +01:00
.checkpatch.conf Re-apply GIT_COMMIT_ID check for checkpatch 2019-07-12 11:06:24 +01:00
.editorconfig doc: Final, pre-release fixes and updates 2019-10-22 13:15:02 +00:00
.gitignore Ignore the ctags file 2020-01-22 16:08:27 +00:00
.gitreview Specify integration as the default branch for git-review 2020-04-02 07:57:17 +00:00
Makefile lib: el3_runtime: Conditionally save/restore EL2 NEVE registers 2020-10-20 20:06:43 +00:00
dco.txt Drop requirement for CLA in contribution.md 2016-09-27 21:52:03 +01:00
license.rst doc: De-duplicate readme and license files 2019-10-08 16:36:15 +00:00
readme.rst doc: Formatting fixes for readme.rst 2019-10-09 15:37:59 +00:00

readme.rst

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> </head>

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.

</html>