Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 1 | Glossary |
2 | ======== | ||||
3 | |||||
4 | This glossary provides definitions for terms and abbreviations used in the TF-A | ||||
5 | documentation. | ||||
6 | |||||
7 | You can find additional definitions in the `Arm Glossary`_. | ||||
8 | |||||
9 | .. glossary:: | ||||
10 | :sorted: | ||||
11 | |||||
12 | AArch32 | ||||
13 | 32-bit execution state of the ARMv8 ISA | ||||
14 | |||||
15 | AArch64 | ||||
16 | 64-bit execution state of the ARMv8 ISA | ||||
17 | |||||
Chris Kay | 9cf7564 | 2021-08-17 16:24:57 +0100 | [diff] [blame] | 18 | AMU |
19 | Activity Monitor Unit, a hardware monitoring unit introduced by FEAT_AMUv1 | ||||
20 | that exposes CPU core runtime metrics as a set of counter registers. | ||||
21 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 22 | API |
23 | Application Programming Interface | ||||
24 | |||||
Manish V Badarkhe | e008a29 | 2020-07-31 08:38:49 +0100 | [diff] [blame] | 25 | AT |
26 | Address Translation | ||||
27 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 28 | BTI |
29 | Branch Target Identification. An Armv8.5 extension providing additional | ||||
30 | control flow integrity around indirect branches and their targets. | ||||
31 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 32 | CoT |
33 | COT | ||||
34 | Chain of Trust | ||||
35 | |||||
36 | CSS | ||||
37 | Compute Sub-System | ||||
38 | |||||
Abhi Singh | a2dd13c | 2024-10-21 13:21:42 -0500 | [diff] [blame] | 39 | CRB |
40 | Command Response Buffer | ||||
41 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 42 | CVE |
43 | Common Vulnerabilities and Exposures. A CVE document is commonly used to | ||||
44 | describe a publicly-known security vulnerability. | ||||
45 | |||||
Tamas Ban | 584052c | 2023-06-06 13:14:45 +0200 | [diff] [blame] | 46 | DICE |
47 | Device Identifier Composition Engine | ||||
48 | |||||
Manish V Badarkhe | 50a43b0 | 2022-06-29 14:09:47 +0100 | [diff] [blame] | 49 | DCE |
50 | DRTM Configuration Environment | ||||
51 | |||||
52 | D-CRTM | ||||
53 | Dynamic Code Root of Trust for Measurement | ||||
54 | |||||
55 | DLME | ||||
56 | Dynamically Launched Measured Environment | ||||
57 | |||||
58 | DRTM | ||||
59 | Dynamic Root of Trust for Measurement | ||||
60 | |||||
Tamas Ban | 584052c | 2023-06-06 13:14:45 +0200 | [diff] [blame] | 61 | DPE |
62 | DICE Protection Environment | ||||
63 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 64 | DS-5 |
65 | Arm Development Studio 5 | ||||
66 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 67 | DSU |
68 | DynamIQ Shared Unit | ||||
69 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 70 | DT |
71 | Device Tree | ||||
72 | |||||
Louis Mayencourt | 326150b | 2019-11-08 15:09:15 +0000 | [diff] [blame] | 73 | DTB |
74 | Device Tree Blob | ||||
75 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 76 | EL |
77 | Exception Level | ||||
78 | |||||
79 | EHF | ||||
80 | Exception Handling Framework | ||||
81 | |||||
Sona Mathew | e5d9b6f | 2023-03-15 09:40:36 -0500 | [diff] [blame] | 82 | ERRATA_ABI |
83 | Errata management firmware interface | ||||
84 | |||||
Louis Mayencourt | 326150b | 2019-11-08 15:09:15 +0000 | [diff] [blame] | 85 | FCONF |
86 | Firmware Configuration Framework | ||||
87 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 88 | FDT |
89 | Flattened Device Tree | ||||
90 | |||||
Olivier Deprez | 8a5bd3c | 2021-09-01 10:25:21 +0200 | [diff] [blame] | 91 | FF-A |
92 | Firmware Framework for Arm A-profile | ||||
J-Alves | 662af36 | 2020-05-07 18:42:25 +0100 | [diff] [blame] | 93 | |
Abhi Singh | a2dd13c | 2024-10-21 13:21:42 -0500 | [diff] [blame] | 94 | FIFO |
95 | First In, First Out | ||||
96 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 97 | FIP |
98 | Firmware Image Package | ||||
99 | |||||
100 | FVP | ||||
101 | Fixed Virtual Platform | ||||
102 | |||||
103 | FWU | ||||
104 | FirmWare Update | ||||
105 | |||||
106 | GIC | ||||
107 | Generic Interrupt Controller | ||||
108 | |||||
Tamas Ban | 3849d27 | 2024-09-02 13:35:21 +0200 | [diff] [blame] | 109 | HES |
110 | Arm CCA Hardware Enforced Security | ||||
111 | |||||
Abhi Singh | a2dd13c | 2024-10-21 13:21:42 -0500 | [diff] [blame] | 112 | I2C |
113 | Inter-Integrated Circuit Protocol | ||||
114 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 115 | ISA |
116 | Instruction Set Architecture | ||||
117 | |||||
118 | Linaro | ||||
119 | A collaborative engineering organization consolidating | ||||
120 | and optimizing open source software and tools for the Arm architecture. | ||||
121 | |||||
Shruti Gupta | 2015511 | 2022-09-27 14:21:13 +0100 | [diff] [blame] | 122 | LSP |
123 | A logical secure partition managed by SPM | ||||
124 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 125 | MMU |
126 | Memory Management Unit | ||||
127 | |||||
128 | MPAM | ||||
129 | Memory Partitioning And Monitoring. An optional Armv8.4 extension. | ||||
130 | |||||
Chris Kay | 6812078 | 2021-05-05 13:38:30 +0100 | [diff] [blame] | 131 | MPMM |
132 | Maximum Power Mitigation Mechanism, an optional power management mechanism | ||||
133 | supported by some Arm Armv9-A cores. | ||||
134 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 135 | MPIDR |
136 | Multiprocessor Affinity Register | ||||
137 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 138 | MTE |
139 | Memory Tagging Extension. An optional Armv8.5 extension that enables | ||||
140 | hardware-assisted memory tagging. | ||||
141 | |||||
Govindraj Raja | d39c2f3 | 2024-12-12 17:16:03 -0600 | [diff] [blame] | 142 | LTS |
143 | Long-Term Support | ||||
144 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 145 | OEN |
146 | Owning Entity Number | ||||
147 | |||||
148 | OP-TEE | ||||
149 | Open Portable Trusted Execution Environment. An example of a :term:`TEE` | ||||
150 | |||||
151 | OTE | ||||
152 | Open-source Trusted Execution Environment | ||||
153 | |||||
Abhi Singh | 07c2d18 | 2024-10-08 16:04:00 -0500 | [diff] [blame] | 154 | PCR |
155 | Platform Configuration Register | ||||
156 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 157 | PDD |
158 | Platform Design Document | ||||
159 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 160 | PAUTH |
161 | Pointer Authentication. An optional extension introduced in Armv8.3. | ||||
162 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 163 | PMF |
164 | Performance Measurement Framework | ||||
165 | |||||
J-Alves | 662af36 | 2020-05-07 18:42:25 +0100 | [diff] [blame] | 166 | PSA |
167 | Platform Security Architecture | ||||
168 | |||||
Manish V Badarkhe | 34bb883 | 2023-12-21 17:54:30 +0000 | [diff] [blame] | 169 | PSR |
170 | Platform Security Requirements | ||||
171 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 172 | PSCI |
173 | Power State Coordination Interface | ||||
174 | |||||
175 | RAS | ||||
176 | Reliability, Availability, and Serviceability extensions. A mandatory | ||||
177 | extension for the Armv8.2 architecture and later. An optional extension to | ||||
178 | the base Armv8 architecture. | ||||
179 | |||||
180 | ROT | ||||
181 | Root of Trust | ||||
182 | |||||
Tamas Ban | 3849d27 | 2024-09-02 13:35:21 +0200 | [diff] [blame] | 183 | RSE |
184 | Runtime Security Engine | ||||
185 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 186 | SCMI |
187 | System Control and Management Interface | ||||
188 | |||||
189 | SCP | ||||
190 | System Control Processor | ||||
191 | |||||
192 | SDEI | ||||
193 | Software Delegated Exception Interface | ||||
194 | |||||
195 | SDS | ||||
196 | Shared Data Storage | ||||
197 | |||||
198 | SEA | ||||
199 | Synchronous External Abort | ||||
200 | |||||
201 | SiP | ||||
202 | SIP | ||||
203 | Silicon Provider | ||||
204 | |||||
205 | SMC | ||||
206 | Secure Monitor Call | ||||
207 | |||||
208 | SMCCC | ||||
209 | :term:`SMC` Calling Convention | ||||
210 | |||||
211 | SoC | ||||
212 | System on Chip | ||||
213 | |||||
214 | SP | ||||
215 | Secure Partition | ||||
216 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 217 | SPD |
218 | Secure Payload Dispatcher | ||||
219 | |||||
220 | SPM | ||||
221 | Secure Partition Manager | ||||
222 | |||||
Abhi Singh | a2dd13c | 2024-10-21 13:21:42 -0500 | [diff] [blame] | 223 | SPI |
224 | Serial Peripheral Interface | ||||
225 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 226 | SRTM |
227 | Static Root of Trust for Measurement | ||||
228 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 229 | SSBS |
230 | Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration | ||||
231 | bit can be set by software to allow or prevent the hardware from | ||||
232 | performing speculative operations. | ||||
233 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 234 | SVE |
235 | Scalable Vector Extension | ||||
236 | |||||
237 | TBB | ||||
238 | Trusted Board Boot | ||||
239 | |||||
240 | TBBR | ||||
241 | Trusted Board Boot Requirements | ||||
242 | |||||
Manish V Badarkhe | 50a43b0 | 2022-06-29 14:09:47 +0100 | [diff] [blame] | 243 | TCB |
244 | Trusted Compute Base | ||||
245 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 246 | TCG |
247 | Trusted Computing Group | ||||
248 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 249 | TEE |
250 | Trusted Execution Environment | ||||
251 | |||||
252 | TF-A | ||||
253 | Trusted Firmware-A | ||||
254 | |||||
255 | TF-M | ||||
256 | Trusted Firmware-M | ||||
257 | |||||
258 | TLB | ||||
259 | Translation Lookaside Buffer | ||||
260 | |||||
261 | TLK | ||||
262 | Trusted Little Kernel. A Trusted OS from NVIDIA. | ||||
263 | |||||
Manish V Badarkhe | 7ccefbc | 2023-04-03 13:50:59 +0100 | [diff] [blame] | 264 | TPM |
265 | Trusted Platform Module | ||||
266 | |||||
Jimmy Brisson | 7dfb991 | 2020-06-22 14:18:42 -0500 | [diff] [blame] | 267 | TRNG |
Sandrine Bailleux | 6fc9c1c | 2023-04-27 13:29:13 +0200 | [diff] [blame] | 268 | True Random Number Generator (hardware based) |
Jimmy Brisson | 7dfb991 | 2020-06-22 14:18:42 -0500 | [diff] [blame] | 269 | |
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 270 | TSP |
271 | Test Secure Payload | ||||
272 | |||||
273 | TZC | ||||
274 | TrustZone Controller | ||||
275 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 276 | UBSAN |
277 | Undefined Behavior Sanitizer | ||||
278 | |||||
Paul Beesley | 8f62ca7 | 2019-03-13 13:58:02 +0000 | [diff] [blame] | 279 | UEFI |
280 | Unified Extensible Firmware Interface | ||||
281 | |||||
282 | WDOG | ||||
283 | Watchdog | ||||
284 | |||||
285 | XLAT | ||||
286 | Translation (abbr.). For example, "XLAT table". | ||||
287 | |||||
Paul Beesley | ff2d38c | 2019-10-17 13:19:02 +0000 | [diff] [blame] | 288 | .. _`Arm Glossary`: https://developer.arm.com/support/arm-glossary |