What does HackerNews think of arm-trusted-firmware?
Read-only mirror of Trusted Firmware-A
I'd think most of the referece documents can be discovered from that code base.
Relatedly, from the perspective of hands-on programming, the System Programmer's guide is the manual to start with: https://developer.arm.com/documentation/den0024/a/.
ROM code generally speaking is not open source, but has been dumped on occasion.
All of the really super-secret security and DRM critical stuff is in the vendor's hardware and code.
Don't believe the FSF's FUD. TrustZone is really not comparable at all to Intel's Management Engine or AMD's Secure Processor:
* TrustZone is an operating mode of the CPU, not a separate processor. Fundamentally, it's not all that different from supervisor mode; it's just more privileged. (If you really wanted, you could probably write an OS that ran parts of the kernel in TrustZone.)
* You don't have to have anything running under TrustZone. Indeed, most processors which support TrustZone (e.g, most Android phones) aren't using it at all.
* The TrustZone specification is publicly available [1]. You can read about it all you want. (If you're brave enough and have the right development tools, you can even write code to run in it.)
* ARM's reference implementation of a TrustZone OS is also publicly available [2]. If you're curious how it works, you can see for yourself. (This doesn't include the application code which may be present in specific implementations, of course.)
[1]: https://www.arm.com/products/processors/technologies/trustzo...
https://github.com/ARM-software/arm-trusted-firmware http://www.tianocore.org/edk2/ (for more platform support add git.linaro.org/uefi/OpenPlatformPkg.git)
hardware: https://www.96boards.org/
boot: https://github.com/ARM-software/arm-trusted-firmware
toolchain: http://releases.linaro.org/14.11/components/toolchain/binaries/
In particular, the ARM trusted firmware project is what is supposed to save us from todays proprietary boot madness