docs: remove PSA wording for SPM chapters

PSA wording is not longer associated with FF-A.

Change-Id: Id7c53b9c6c8f383543f6a32a15eb15b7749d8658
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
This commit is contained in:
Olivier Deprez 2021-04-21 11:22:23 +02:00
parent 08e7cc533e
commit 1b17f4f1f8
5 changed files with 15 additions and 17 deletions

View File

@ -108,7 +108,7 @@ Still to come
- Refinements to Position Independent Executable (PIE) support. - Refinements to Position Independent Executable (PIE) support.
- Continued support for the PSA FF-A v1.0 (formally known as SPCI) specification, to enable the - Continued support for the FF-A v1.0 (formally known as SPCI) specification, to enable the
use of secure partition management in the secure world. use of secure partition management in the secure world.
- Documentation enhancements. - Documentation enhancements.
@ -126,4 +126,4 @@ Still to come
-------------- --------------
*Copyright (c) 2019-2020, Arm Limited. All rights reserved.* *Copyright (c) 2019-2021, Arm Limited. All rights reserved.*

View File

@ -1,8 +1,8 @@
PSA FF-A manifest binding to device tree FF-A manifest binding to device tree
======================================== ========================================
This document defines the nodes and properties used to define a partition, This document defines the nodes and properties used to define a partition,
according to the PSA FF-A specification. according to the FF-A specification.
Version 1.0 Version 1.0
----------- -----------
@ -25,9 +25,9 @@ Partition Properties
- Must be two 16 bits values (X, Y), concatenated as 31:16 -> X, - Must be two 16 bits values (X, Y), concatenated as 31:16 -> X,
15:0 -> Y, where: 15:0 -> Y, where:
- X is the major version of PSA-FF-A expected by the partition at the FFA - X is the major version of FF-A expected by the partition at the FFA
instance it will execute. instance it will execute.
- Y is the minor version of PSA-FF-A expected by the partition at the FFA - Y is the minor version of FF-A expected by the partition at the FFA
instance it will execute. instance it will execute.
- uuid [mandatory] - uuid [mandatory]

View File

@ -19,6 +19,6 @@ Components
sdei sdei
secure-partition-manager secure-partition-manager
secure-partition-manager-mm secure-partition-manager-mm
psa-ffa-manifest-binding ffa-manifest-binding
xlat-tables-lib-v2-design xlat-tables-lib-v2-design
cot-binding cot-binding

View File

@ -6,7 +6,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification (:ref:`Secure Partition Manager`). - SPM based on the FF-A specification (:ref:`Secure Partition Manager`).
- SPM based on the MM interface. - SPM based on the MM interface.
Both implementations differ in their architectures and only one can be selected Both implementations differ in their architectures and only one can be selected
@ -822,7 +822,7 @@ Error Codes
-------------- --------------
*Copyright (c) 2017-2020, Arm Limited and Contributors. All rights reserved.* *Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved.*
.. _Armv8-A ARM: https://developer.arm.com/docs/ddi0487/latest/arm-architecture-reference-manual-armv8-for-armv8-a-architecture-profile .. _Armv8-A ARM: https://developer.arm.com/docs/ddi0487/latest/arm-architecture-reference-manual-armv8-for-armv8-a-architecture-profile
.. _instructions in the EDK2 repository: https://github.com/tianocore/edk2-staging/blob/AArch64StandaloneMm/HowtoBuild.MD .. _instructions in the EDK2 repository: https://github.com/tianocore/edk2-staging/blob/AArch64StandaloneMm/HowtoBuild.MD

View File

@ -33,8 +33,6 @@ Acronyms
+--------+-----------------------------------+ +--------+-----------------------------------+
| PVM | Primary VM | | PVM | Primary VM |
+--------+-----------------------------------+ +--------+-----------------------------------+
| PSA | Platform Security Architecture |
+--------+-----------------------------------+
| SMMU | System Memory Management Unit | | SMMU | System Memory Management Unit |
+--------+-----------------------------------+ +--------+-----------------------------------+
| SP | Secure Partition | | SP | Secure Partition |
@ -61,7 +59,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification `[1]`_. - SPM based on the FF-A specification `[1]`_.
- SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_. - SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_.
Both implementations differ in their architectures and only one can be selected Both implementations differ in their architectures and only one can be selected
@ -69,7 +67,7 @@ at build time.
This document: This document:
- describes the PSA FF-A implementation where the Secure Partition Manager - describes the FF-A implementation where the Secure Partition Manager
resides at EL3 and S-EL2 (or EL3 and S-EL1). resides at EL3 and S-EL2 (or EL3 and S-EL1).
- is not an architecture specification and it might provide assumptions - is not an architecture specification and it might provide assumptions
on sections mandated as implementation-defined in the specification. on sections mandated as implementation-defined in the specification.
@ -565,7 +563,7 @@ either *(under discussion)*:
- Re-purposing the ``PSCI_CPU_ON`` function id. It is - Re-purposing the ``PSCI_CPU_ON`` function id. It is
assumed that even if the input arguments are the same as the ones defined in assumed that even if the input arguments are the same as the ones defined in
the PSCI standard, the usage deviates by the fact the secondary EC is not the PSCI standard, the usage deviates by the fact the secondary EC is not
woken up immediately. At least for the PSA-FF-A EAC where only woken up immediately. At least for the FF-A EAC where only
direct messaging is allowed, it is only after the first direct direct messaging is allowed, it is only after the first direct
message invocation that the secondary EC is entered. This option message invocation that the secondary EC is entered. This option
might be preferred when the same code base is re-used for a VM or might be preferred when the same code base is re-used for a VM or
@ -949,7 +947,7 @@ References
.. _[1]: .. _[1]:
[1] `Platform Security Architecture Firmware Framework for Arm® v8-A 1.0 Platform Design Document <https://developer.arm.com/docs/den0077/latest>`__ [1] `Arm Firmware Framework for Armv8-A <https://developer.arm.com/docs/den0077/latest>`__
.. _[2]: .. _[2]:
@ -970,7 +968,7 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
.. _[6]: .. _[6]:
[6] https://trustedfirmware-a.readthedocs.io/en/latest/components/psa-ffa-manifest-binding.html [6] https://trustedfirmware-a.readthedocs.io/en/latest/components/ffa-manifest-binding.html
.. _[7]: .. _[7]:
@ -982,4 +980,4 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
-------------- --------------
*Copyright (c) 2020, Arm Limited and Contributors. All rights reserved.* *Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.*