blob: f80c61484ffe8143b85d1e4eb29b4f9b3c19b5bd [file] [log] [blame]
Galanakis, Minos41f85972019-09-30 15:56:40 +01001###################################
2Glossary of terms and abbreviations
3###################################
Gyorgy Szingdb9783c2019-04-17 21:08:48 +02004
Gyorgy Szingdb9783c2019-04-17 21:08:48 +02005.. glossary::
Anton Komlev8e448342022-04-06 10:19:35 +01006 :sorted:
Ken Liub8592cd2020-05-13 18:04:44 +08007
Edison Ai589d3b12020-05-18 13:49:19 +08008 Application RoT
Edison Ai589d3b12020-05-18 13:49:19 +08009 `PSA term`_. The security domain in which additional security services
10 are implemented.
11
12 HAL
Anton Komlev8e448342022-04-06 10:19:35 +010013 Hardware Abstraction Layer:
Edison Ai589d3b12020-05-18 13:49:19 +080014 Interface to abstract hardware-oriented operations and provides a set of
15 APIs to the upper layers.
16
17 RoT
Anton Komlev8e448342022-04-06 10:19:35 +010018 Root of Trust:
Edison Ai589d3b12020-05-18 13:49:19 +080019 `PSA term`_. This is the minimal set of software, hardware and data that
20 is implicitly trusted in the platform there is no software or hardware
21 at a deeper level that can verify that the Root of Trust is authentic
22 and unmodified.
23
24 RoT Service
Edison Ai589d3b12020-05-18 13:49:19 +080025 `PSA term`_. A set of related security operations that are implemented
26 in a Secure Partition.
27
Anton Komlev8e448342022-04-06 10:19:35 +010028 NSPE
29 Non Secure Processing Enviroment:
Edison Ai589d3b12020-05-18 13:49:19 +080030 `PSA term`_. In TF-M this means non secure domain typically running an
31 OS using services provided by TF-M.
32
33 PSA
34 `PSA term`_. Platform Security Architecture.
35
36 PSA-FF
37 `PSA term`_. Platform Security Architecture Firmware Framework.
38
39 PSA-FF-M
40 `PSA term`_. Platform Security Architecture Firmware Framework for M.
41
42 PSA RoT
Edison Ai589d3b12020-05-18 13:49:19 +080043 `PSA term`_. This defines the most trusted security domain within a PSA
44 system.
Ken Liub8592cd2020-05-13 18:04:44 +080045
Anton Komlev8e448342022-04-06 10:19:35 +010046 SFN
47 Secure Function:
Edison Ai1e385842020-05-18 13:16:41 +080048 The function entry to a secure service. Multiple SFN per SS are
49 permitted.
Ken Liub8592cd2020-05-13 18:04:44 +080050
Anton Komlev8e448342022-04-06 10:19:35 +010051 SP
Anton Komlev91281f02022-04-22 09:24:20 +010052 Secure Partition
Ken Liub8592cd2020-05-13 18:04:44 +080053 A logical container for secure services.
54
Anton Komlev8e448342022-04-06 10:19:35 +010055 SPE
56 Secure Processing Environment:
Edison Ai589d3b12020-05-18 13:49:19 +080057 `PSA term`_. In TF-M this means the secure domain protected by TF-M.
Edison Ai1e385842020-05-18 13:16:41 +080058
Anton Komlev8e448342022-04-06 10:19:35 +010059 SPM
Anton Komlev91281f02022-04-22 09:24:20 +010060 Secure Partition Manager
Edison Ai1e385842020-05-18 13:16:41 +080061 The TF-M component responsible for enumeration, management and isolation
62 of multiple Secure Partitions within the TEE.
Ken Liub8592cd2020-05-13 18:04:44 +080063
Anton Komlev8e448342022-04-06 10:19:35 +010064 SPRT
65 Secure Partition Runtime:
Edison Ai1e385842020-05-18 13:16:41 +080066 The TF-M component responsible for Secure Partition runtime
67 functionalities.
Ken Liub8592cd2020-05-13 18:04:44 +080068
Anton Komlev8e448342022-04-06 10:19:35 +010069 SPRTL
70 Secure Partition Runtime Library:
Ken Liub8592cd2020-05-13 18:04:44 +080071 A library contains the SPRT code and data.
72
Anton Komlev8e448342022-04-06 10:19:35 +010073 SS
74 Secure Service:
Edison Ai1e385842020-05-18 13:16:41 +080075 A component within the TEE that is atomic from a security/trust point of
76 view, i.e. which is viewed as a single entity from a TF-M point of view.
Ken Liub8592cd2020-05-13 18:04:44 +080077
Anton Komlev8e448342022-04-06 10:19:35 +010078 PS
Anton Komlev91281f02022-04-22 09:24:20 +010079 Protected Storage
80 One of PSA services provided by TF-M.
Kevin Pengc6d74502020-03-04 16:55:37 +080081
Anton Komlev8e448342022-04-06 10:19:35 +010082 ITS
Anton Komlev91281f02022-04-22 09:24:20 +010083 Internal Trusted Storage
84 One of PSA services provided by TF-M.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +020085
Edison Ai1e385842020-05-18 13:16:41 +080086 TFM
87 TF-M
Anton Komlev8e448342022-04-06 10:19:35 +010088 Trusted Firmware-M or Trusted Firmware for M-class.
Edison Ai1e385842020-05-18 13:16:41 +080089 ARM TF-M provides a reference implementation of secure world software
90 for ARMv8-M.
91
Edison Ai589d3b12020-05-18 13:49:19 +080092 TBSA-M
Anton Komlevfb835402022-08-09 13:04:04 +010093 Trusted Base System Architecture for M.
94 TBSA term. See `Trusted Base System Architecture for M`_
Edison Ai589d3b12020-05-18 13:49:19 +080095
Anton Komlev8e448342022-04-06 10:19:35 +010096 MPC
97 Memory Protection Controller:
Ken Liub8592cd2020-05-13 18:04:44 +080098 Bus slave-side security controller for memory regions.
99
Anton Komlev8e448342022-04-06 10:19:35 +0100100 PPC
101 Peripheral Protection Controller:
Ken Liub8592cd2020-05-13 18:04:44 +0800102 Bus slave-side security controller for peripheral access.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200103
Anton Komlev8e448342022-04-06 10:19:35 +0100104 S/NS
105 Secure/Non-secure:
Ken Liub8592cd2020-05-13 18:04:44 +0800106 The separation provided by TrustZone hardware components in the system.
107
Anton Komlev8e448342022-04-06 10:19:35 +0100108 SAU
109 Secure Attribution Unit:
Edison Ai1e385842020-05-18 13:16:41 +0800110 Hardware component providing isolation between Secure, Non-secure
111 Callable and Non-secure addresses.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200112
Ken Liub8592cd2020-05-13 18:04:44 +0800113 AAPCS
Anton Komlev8e448342022-04-06 10:19:35 +0100114 ARM Architecture Procedure Call Standard:
Edison Ai1e385842020-05-18 13:16:41 +0800115 The AAPCS defines how subroutines can be separately written, separately
116 compiled, and separately assembled to work together. It describes a
117 contract between a calling routine and a called routine
Ken Liub8592cd2020-05-13 18:04:44 +0800118
Anton Komlev8e448342022-04-06 10:19:35 +0100119 MPU
120 Memory Protection Unit:
Ken Liub8592cd2020-05-13 18:04:44 +0800121 Hardware component providing privilege control.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200122
Edison Ai1e385842020-05-18 13:16:41 +0800123 SVC
Anton Komlev8e448342022-04-06 10:19:35 +0100124 SuperVisor Call:
Edison Ai1e385842020-05-18 13:16:41 +0800125 ARMv7M assembly instruction to call a privileged handler function
126
Anton Komlev8e448342022-04-06 10:19:35 +0100127.. rubric:: Reference
Edison Ai589d3b12020-05-18 13:49:19 +0800128
Anton Komlevfb835402022-08-09 13:04:04 +0100129| `Firmware Framework for M (FF-M)`_
Edison Ai589d3b12020-05-18 13:49:19 +0800130
Anton Komlevfb835402022-08-09 13:04:04 +0100131.. _Firmware Framework for M (FF-M):
132 https://www.arm.com/architecture/security-features/platform-security
Edison Ai589d3b12020-05-18 13:49:19 +0800133
Anton Komlevfb835402022-08-09 13:04:04 +0100134.. _PSA term: `Firmware Framework for M (FF-M)`_
Edison Ai589d3b12020-05-18 13:49:19 +0800135
Anton Komlevfb835402022-08-09 13:04:04 +0100136| `Trusted Base System Architecture for M`_
Edison Ai589d3b12020-05-18 13:49:19 +0800137
Anton Komlevfb835402022-08-09 13:04:04 +0100138.. _Trusted Base System Architecture for M:
139 https://www.arm.com/architecture/security-features/platform-security
Edison Ai589d3b12020-05-18 13:49:19 +0800140
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200141--------------
142
Anton Komlevfb835402022-08-09 13:04:04 +0100143*Copyright (c) 2017-2022, Arm Limited. All rights reserved.*