Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 1 | Glossary |
2 | ======== | ||||
3 | |||||
4 | This glossary provides definitions for terms and abbreviations used in the TF-A | ||||
5 | documentation. | ||||
6 | |||||
7 | You can find additional definitions in the `Arm Glossary`_. | ||||
8 | |||||
9 | .. glossary:: | ||||
10 | :sorted: | ||||
11 | |||||
12 | AArch32 | ||||
13 | 32-bit execution state of the ARMv8 ISA | ||||
14 | |||||
15 | AArch64 | ||||
16 | 64-bit execution state of the ARMv8 ISA | ||||
17 | |||||
Chris Kay | 9cf7564 | 2021-08-17 16:24:57 +0100 | [diff] [blame] | 18 | AMU |
19 | Activity Monitor Unit, a hardware monitoring unit introduced by FEAT_AMUv1 | ||||
20 | that exposes CPU core runtime metrics as a set of counter registers. | ||||
21 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 22 | API |
23 | Application Programming Interface | ||||
24 | |||||
Manish V Badarkhe | e008a29 | 2020-07-31 08:38:49 +0100 | [diff] [blame] | 25 | AT |
26 | Address Translation | ||||
27 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 28 | BTI |
29 | Branch Target Identification. An Armv8.5 extension providing additional | ||||
30 | control flow integrity around indirect branches and their targets. | ||||
31 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 32 | CoT |
33 | COT | ||||
34 | Chain of Trust | ||||
35 | |||||
36 | CSS | ||||
37 | Compute Sub-System | ||||
38 | |||||
39 | CVE | ||||
40 | Common Vulnerabilities and Exposures. A CVE document is commonly used to | ||||
41 | describe a publicly-known security vulnerability. | ||||
42 | |||||
Tamas Ban | 584052c | 2023-06-06 13:14:45 +0200 | [diff] [blame] | 43 | DICE |
44 | Device Identifier Composition Engine | ||||
45 | |||||
Manish V Badarkhe | 50a43b0 | 2022-06-29 14:09:47 +0100 | [diff] [blame] | 46 | DCE |
47 | DRTM Configuration Environment | ||||
48 | |||||
49 | D-CRTM | ||||
50 | Dynamic Code Root of Trust for Measurement | ||||
51 | |||||
52 | DLME | ||||
53 | Dynamically Launched Measured Environment | ||||
54 | |||||
55 | DRTM | ||||
56 | Dynamic Root of Trust for Measurement | ||||
57 | |||||
Tamas Ban | 584052c | 2023-06-06 13:14:45 +0200 | [diff] [blame] | 58 | DPE |
59 | DICE Protection Environment | ||||
60 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 61 | DS-5 |
62 | Arm Development Studio 5 | ||||
63 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 64 | DSU |
65 | DynamIQ Shared Unit | ||||
66 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 67 | DT |
68 | Device Tree | ||||
69 | |||||
Louis Mayencourt | 326150b | 2019-11-08 15:09:15 +0000 | [diff] [blame] | 70 | DTB |
71 | Device Tree Blob | ||||
72 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 73 | EL |
74 | Exception Level | ||||
75 | |||||
76 | EHF | ||||
77 | Exception Handling Framework | ||||
78 | |||||
Sona Mathew | e5d9b6f | 2023-03-15 09:40:36 -0500 | [diff] [blame] | 79 | ERRATA_ABI |
80 | Errata management firmware interface | ||||
81 | |||||
Louis Mayencourt | 326150b | 2019-11-08 15:09:15 +0000 | [diff] [blame] | 82 | FCONF |
83 | Firmware Configuration Framework | ||||
84 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 85 | FDT |
86 | Flattened Device Tree | ||||
87 | |||||
Olivier Deprez | 8a5bd3c | 2021-09-01 10:25:21 +0200 | [diff] [blame] | 88 | FF-A |
89 | Firmware Framework for Arm A-profile | ||||
J-Alves | 662af36 | 2020-05-07 18:42:25 +0100 | [diff] [blame] | 90 | |
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 91 | FIP |
92 | Firmware Image Package | ||||
93 | |||||
94 | FVP | ||||
95 | Fixed Virtual Platform | ||||
96 | |||||
97 | FWU | ||||
98 | FirmWare Update | ||||
99 | |||||
100 | GIC | ||||
101 | Generic Interrupt Controller | ||||
102 | |||||
Tamas Ban | 3849d27 | 2024-09-02 13:35:21 +0200 | [diff] [blame] | 103 | HES |
104 | Arm CCA Hardware Enforced Security | ||||
105 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 106 | ISA |
107 | Instruction Set Architecture | ||||
108 | |||||
109 | Linaro | ||||
110 | A collaborative engineering organization consolidating | ||||
111 | and optimizing open source software and tools for the Arm architecture. | ||||
112 | |||||
Shruti Gupta | 2015511 | 2022-09-27 14:21:13 +0100 | [diff] [blame] | 113 | LSP |
114 | A logical secure partition managed by SPM | ||||
115 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 116 | MMU |
117 | Memory Management Unit | ||||
118 | |||||
119 | MPAM | ||||
120 | Memory Partitioning And Monitoring. An optional Armv8.4 extension. | ||||
121 | |||||
Chris Kay | 6812078 | 2021-05-05 13:38:30 +0100 | [diff] [blame] | 122 | MPMM |
123 | Maximum Power Mitigation Mechanism, an optional power management mechanism | ||||
124 | supported by some Arm Armv9-A cores. | ||||
125 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 126 | MPIDR |
127 | Multiprocessor Affinity Register | ||||
128 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 129 | MTE |
130 | Memory Tagging Extension. An optional Armv8.5 extension that enables | ||||
131 | hardware-assisted memory tagging. | ||||
132 | |||||
Govindraj Raja | f00f71e | 2024-12-12 17:16:03 -0600 | [diff] [blame] | 133 | LTS |
134 | Long-Term Support | ||||
135 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 136 | OEN |
137 | Owning Entity Number | ||||
138 | |||||
139 | OP-TEE | ||||
140 | Open Portable Trusted Execution Environment. An example of a :term:`TEE` | ||||
141 | |||||
142 | OTE | ||||
143 | Open-source Trusted Execution Environment | ||||
144 | |||||
Abhi Singh | 07c2d18 | 2024-10-08 16:04:00 -0500 | [diff] [blame] | 145 | PCR |
146 | Platform Configuration Register | ||||
147 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 148 | PDD |
149 | Platform Design Document | ||||
150 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 151 | PAUTH |
152 | Pointer Authentication. An optional extension introduced in Armv8.3. | ||||
153 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 154 | PMF |
155 | Performance Measurement Framework | ||||
156 | |||||
J-Alves | 662af36 | 2020-05-07 18:42:25 +0100 | [diff] [blame] | 157 | PSA |
158 | Platform Security Architecture | ||||
159 | |||||
Manish V Badarkhe | 34bb883 | 2023-12-21 17:54:30 +0000 | [diff] [blame] | 160 | PSR |
161 | Platform Security Requirements | ||||
162 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 163 | PSCI |
164 | Power State Coordination Interface | ||||
165 | |||||
166 | RAS | ||||
167 | Reliability, Availability, and Serviceability extensions. A mandatory | ||||
168 | extension for the Armv8.2 architecture and later. An optional extension to | ||||
169 | the base Armv8 architecture. | ||||
170 | |||||
171 | ROT | ||||
172 | Root of Trust | ||||
173 | |||||
Tamas Ban | 3849d27 | 2024-09-02 13:35:21 +0200 | [diff] [blame] | 174 | RSE |
175 | Runtime Security Engine | ||||
176 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 177 | SCMI |
178 | System Control and Management Interface | ||||
179 | |||||
180 | SCP | ||||
181 | System Control Processor | ||||
182 | |||||
183 | SDEI | ||||
184 | Software Delegated Exception Interface | ||||
185 | |||||
186 | SDS | ||||
187 | Shared Data Storage | ||||
188 | |||||
189 | SEA | ||||
190 | Synchronous External Abort | ||||
191 | |||||
192 | SiP | ||||
193 | SIP | ||||
194 | Silicon Provider | ||||
195 | |||||
196 | SMC | ||||
197 | Secure Monitor Call | ||||
198 | |||||
199 | SMCCC | ||||
200 | :term:`SMC` Calling Convention | ||||
201 | |||||
202 | SoC | ||||
203 | System on Chip | ||||
204 | |||||
205 | SP | ||||
206 | Secure Partition | ||||
207 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 208 | SPD |
209 | Secure Payload Dispatcher | ||||
210 | |||||
211 | SPM | ||||
212 | Secure Partition Manager | ||||
213 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 214 | SRTM |
215 | Static Root of Trust for Measurement | ||||
216 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 217 | SSBS |
218 | Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration | ||||
219 | bit can be set by software to allow or prevent the hardware from | ||||
220 | performing speculative operations. | ||||
221 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 222 | SVE |
223 | Scalable Vector Extension | ||||
224 | |||||
225 | TBB | ||||
226 | Trusted Board Boot | ||||
227 | |||||
228 | TBBR | ||||
229 | Trusted Board Boot Requirements | ||||
230 | |||||
Manish V Badarkhe | 50a43b0 | 2022-06-29 14:09:47 +0100 | [diff] [blame] | 231 | TCB |
232 | Trusted Compute Base | ||||
233 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 234 | TCG |
235 | Trusted Computing Group | ||||
236 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 237 | TEE |
238 | Trusted Execution Environment | ||||
239 | |||||
240 | TF-A | ||||
241 | Trusted Firmware-A | ||||
242 | |||||
243 | TF-M | ||||
244 | Trusted Firmware-M | ||||
245 | |||||
246 | TLB | ||||
247 | Translation Lookaside Buffer | ||||
248 | |||||
249 | TLK | ||||
250 | Trusted Little Kernel. A Trusted OS from NVIDIA. | ||||
251 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 252 | TPM |
253 | Trusted Platform Module | ||||
254 | |||||
Jimmy Brisson | 7dfb991 | 2020-06-22 14:18:42 -0500 | [diff] [blame] | 255 | TRNG |
Sandrine Bailleux | 6fc9c1c | 2023-04-27 13:29:13 +0200 | [diff] [blame] | 256 | True Random Number Generator (hardware based) |
Jimmy Brisson | 7dfb991 | 2020-06-22 14:18:42 -0500 | [diff] [blame] | 257 | |
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 258 | TSP |
259 | Test Secure Payload | ||||
260 | |||||
261 | TZC | ||||
262 | TrustZone Controller | ||||
263 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 264 | UBSAN |
265 | Undefined Behavior Sanitizer | ||||
266 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 267 | UEFI |
268 | Unified Extensible Firmware Interface | ||||
269 | |||||
270 | WDOG | ||||
271 | Watchdog | ||||
272 | |||||
273 | XLAT | ||||
274 | Translation (abbr.). For example, "XLAT table". | ||||
275 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 276 | .. _`Arm Glossary`: https://developer.arm.com/support/arm-glossary |