blob: 83e283ddd3e8d5c88203d2a0dc91eaf35c39cc0f [file] [log] [blame]
Galanakis, Minos41f85972019-09-30 15:56:40 +01001###################################
2Glossary of terms and abbreviations
3###################################
Gyorgy Szingdb9783c2019-04-17 21:08:48 +02004
Gyorgy Szingdb9783c2019-04-17 21:08:48 +02005.. glossary::
Anton Komlev8e448342022-04-06 10:19:35 +01006 :sorted:
Ken Liub8592cd2020-05-13 18:04:44 +08007
Edison Ai589d3b12020-05-18 13:49:19 +08008 Application RoT
Edison Ai589d3b12020-05-18 13:49:19 +08009 `PSA term`_. The security domain in which additional security services
10 are implemented.
11
12 HAL
Anton Komlev8e448342022-04-06 10:19:35 +010013 Hardware Abstraction Layer:
Edison Ai589d3b12020-05-18 13:49:19 +080014 Interface to abstract hardware-oriented operations and provides a set of
15 APIs to the upper layers.
16
17 RoT
Anton Komlev8e448342022-04-06 10:19:35 +010018 Root of Trust:
Edison Ai589d3b12020-05-18 13:49:19 +080019 `PSA term`_. This is the minimal set of software, hardware and data that
20 is implicitly trusted in the platform there is no software or hardware
21 at a deeper level that can verify that the Root of Trust is authentic
22 and unmodified.
23
24 RoT Service
Edison Ai589d3b12020-05-18 13:49:19 +080025 `PSA term`_. A set of related security operations that are implemented
26 in a Secure Partition.
27
Anton Komlev8e448342022-04-06 10:19:35 +010028 NSPE
29 Non Secure Processing Enviroment:
Edison Ai589d3b12020-05-18 13:49:19 +080030 `PSA term`_. In TF-M this means non secure domain typically running an
31 OS using services provided by TF-M.
32
33 PSA
34 `PSA term`_. Platform Security Architecture.
35
36 PSA-FF
37 `PSA term`_. Platform Security Architecture Firmware Framework.
38
39 PSA-FF-M
40 `PSA term`_. Platform Security Architecture Firmware Framework for M.
41
42 PSA RoT
Edison Ai589d3b12020-05-18 13:49:19 +080043 `PSA term`_. This defines the most trusted security domain within a PSA
44 system.
Ken Liub8592cd2020-05-13 18:04:44 +080045
Anton Komlev8e448342022-04-06 10:19:35 +010046 SFN
47 Secure Function:
Edison Ai1e385842020-05-18 13:16:41 +080048 The function entry to a secure service. Multiple SFN per SS are
49 permitted.
Ken Liub8592cd2020-05-13 18:04:44 +080050
Anton Komlev8e448342022-04-06 10:19:35 +010051 SP
Anton Komlev91281f02022-04-22 09:24:20 +010052 Secure Partition
Ken Liub8592cd2020-05-13 18:04:44 +080053 A logical container for secure services.
54
Anton Komlev8e448342022-04-06 10:19:35 +010055 SPE
56 Secure Processing Environment:
Edison Ai589d3b12020-05-18 13:49:19 +080057 `PSA term`_. In TF-M this means the secure domain protected by TF-M.
Edison Ai1e385842020-05-18 13:16:41 +080058
Anton Komlev8e448342022-04-06 10:19:35 +010059 SPM
Anton Komlev91281f02022-04-22 09:24:20 +010060 Secure Partition Manager
Edison Ai1e385842020-05-18 13:16:41 +080061 The TF-M component responsible for enumeration, management and isolation
62 of multiple Secure Partitions within the TEE.
Ken Liub8592cd2020-05-13 18:04:44 +080063
Anton Komlev8e448342022-04-06 10:19:35 +010064 SPRT
65 Secure Partition Runtime:
Edison Ai1e385842020-05-18 13:16:41 +080066 The TF-M component responsible for Secure Partition runtime
67 functionalities.
Ken Liub8592cd2020-05-13 18:04:44 +080068
Anton Komlev8e448342022-04-06 10:19:35 +010069 SPRTL
70 Secure Partition Runtime Library:
Ken Liub8592cd2020-05-13 18:04:44 +080071 A library contains the SPRT code and data.
72
Anton Komlev8e448342022-04-06 10:19:35 +010073 SS
74 Secure Service:
Edison Ai1e385842020-05-18 13:16:41 +080075 A component within the TEE that is atomic from a security/trust point of
76 view, i.e. which is viewed as a single entity from a TF-M point of view.
Ken Liub8592cd2020-05-13 18:04:44 +080077
Anton Komlev8e448342022-04-06 10:19:35 +010078 PS
Anton Komlev91281f02022-04-22 09:24:20 +010079 Protected Storage
80 One of PSA services provided by TF-M.
Kevin Pengc6d74502020-03-04 16:55:37 +080081
Anton Komlev8e448342022-04-06 10:19:35 +010082 ITS
Anton Komlev91281f02022-04-22 09:24:20 +010083 Internal Trusted Storage
84 One of PSA services provided by TF-M.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +020085
Edison Ai1e385842020-05-18 13:16:41 +080086 TFM
87 TF-M
Anton Komlev8e448342022-04-06 10:19:35 +010088 Trusted Firmware-M or Trusted Firmware for M-class.
Edison Ai1e385842020-05-18 13:16:41 +080089 ARM TF-M provides a reference implementation of secure world software
90 for ARMv8-M.
91
Edison Ai589d3b12020-05-18 13:49:19 +080092 TBSA-M
Anton Komlev8e448342022-04-06 10:19:35 +010093 Trusted Base System Architecture for Armv6-M, Armv7-M and Armv8-M.
Edison Ai589d3b12020-05-18 13:49:19 +080094 TBSA term. See `Trusted Base System Architecture for Armv6-M, Armv7-M
95 and Armv8-M`_
96
Anton Komlev8e448342022-04-06 10:19:35 +010097 MPC
98 Memory Protection Controller:
Ken Liub8592cd2020-05-13 18:04:44 +080099 Bus slave-side security controller for memory regions.
100
Anton Komlev8e448342022-04-06 10:19:35 +0100101 PPC
102 Peripheral Protection Controller:
Ken Liub8592cd2020-05-13 18:04:44 +0800103 Bus slave-side security controller for peripheral access.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200104
Anton Komlev8e448342022-04-06 10:19:35 +0100105 S/NS
106 Secure/Non-secure:
Ken Liub8592cd2020-05-13 18:04:44 +0800107 The separation provided by TrustZone hardware components in the system.
108
Anton Komlev8e448342022-04-06 10:19:35 +0100109 SAU
110 Secure Attribution Unit:
Edison Ai1e385842020-05-18 13:16:41 +0800111 Hardware component providing isolation between Secure, Non-secure
112 Callable and Non-secure addresses.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200113
Ken Liub8592cd2020-05-13 18:04:44 +0800114 AAPCS
Anton Komlev8e448342022-04-06 10:19:35 +0100115 ARM Architecture Procedure Call Standard:
Edison Ai1e385842020-05-18 13:16:41 +0800116 The AAPCS defines how subroutines can be separately written, separately
117 compiled, and separately assembled to work together. It describes a
118 contract between a calling routine and a called routine
Ken Liub8592cd2020-05-13 18:04:44 +0800119
Anton Komlev8e448342022-04-06 10:19:35 +0100120 MPU
121 Memory Protection Unit:
Ken Liub8592cd2020-05-13 18:04:44 +0800122 Hardware component providing privilege control.
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200123
Edison Ai1e385842020-05-18 13:16:41 +0800124 SVC
Anton Komlev8e448342022-04-06 10:19:35 +0100125 SuperVisor Call:
Edison Ai1e385842020-05-18 13:16:41 +0800126 ARMv7M assembly instruction to call a privileged handler function
127
Anton Komlev8e448342022-04-06 10:19:35 +0100128.. rubric:: Reference
Edison Ai589d3b12020-05-18 13:49:19 +0800129
130| `PSA Firmware_Framework for M`_
131
132.. _PSA Firmware_Framework for M: https://pages.arm.com/psa-resources-ff.html
133
134.. _PSA term: `PSA Firmware_Framework for M`_
135
136| `Trusted Base System Architecture for Armv6-M, Armv7-M and Armv8-M`_
137
138.. _Trusted Base System Architecture for Armv6-M, Armv7-M and Armv8-M: https://pages.arm.com/psa-resources-tbsa-m.html
139
Gyorgy Szingdb9783c2019-04-17 21:08:48 +0200140--------------
141
Ken Liub8592cd2020-05-13 18:04:44 +0800142*Copyright (c) 2017-2020, Arm Limited. All rights reserved.*