/arm-trusted-firmware

ARM Trusted Firmware (or TF-A) repository with platform support for selected Microchip SoC's

Primary LanguageCOtherNOASSERTION

Microchip/UNG Trusted Firmware-A

This software has been modified by Microchip Technology Inc. to add support for the following SoC:

  • lan966x_b0: LAN966X revision B - BL1 secure bootrom

Specifically, the platform lan966x_sr is an internal development platform and should not be used (and is not supported).

It is possible to build the software by following the normal TFA guidelines, but the (Ruby) wrapper scripts/build.rb script is offered as it ensures using the proper options for the platform. Refer to the script help (--help option).

You should be able to compile the software using Ubuntu 22.04, but in order to shield you from platform software issues, you should consider using docker, along with a wrapper script - see https://github.com/microchip-ung/docker-run for more info. So with docker install, just run dr ./scripts/build.rb .... (At first run it docker will download a docker image, but after that the overhead is minimal).

Warning

The keys found in the keys/ directory are purely for demonstration purposes and must be replaced with own keys before software deployment.

Orignial TF-A Readme file below:

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.