Commit 1b17f4f1 authored by Olivier Deprez's avatar Olivier Deprez
Browse files

docs: remove PSA wording for SPM chapters



PSA wording is not longer associated with FF-A.

Change-Id: Id7c53b9c6c8f383543f6a32a15eb15b7749d8658
Signed-off-by: default avatarOlivier Deprez <olivier.deprez@arm.com>
parent 08e7cc53
......@@ -108,7 +108,7 @@ Still to come
- Refinements to Position Independent Executable (PIE) support.
- Continued support for the PSA FF-A v1.0 (formally known as SPCI) specification, to enable the
- Continued support for the FF-A v1.0 (formally known as SPCI) specification, to enable the
use of secure partition management in the secure world.
- Documentation enhancements.
......@@ -126,4 +126,4 @@ Still to come
--------------
*Copyright (c) 2019-2020, Arm Limited. All rights reserved.*
*Copyright (c) 2019-2021, Arm Limited. All rights reserved.*
PSA FF-A manifest binding to device tree
FF-A manifest binding to device tree
========================================
This document defines the nodes and properties used to define a partition,
according to the PSA FF-A specification.
according to the FF-A specification.
Version 1.0
-----------
......@@ -25,9 +25,9 @@ Partition Properties
- Must be two 16 bits values (X, Y), concatenated as 31:16 -> X,
15:0 -> Y, where:
- X is the major version of PSA-FF-A expected by the partition at the FFA
- X is the major version of FF-A expected by the partition at the FFA
instance it will execute.
- Y is the minor version of PSA-FF-A expected by the partition at the FFA
- Y is the minor version of FF-A expected by the partition at the FFA
instance it will execute.
- uuid [mandatory]
......
......@@ -19,6 +19,6 @@ Components
sdei
secure-partition-manager
secure-partition-manager-mm
psa-ffa-manifest-binding
ffa-manifest-binding
xlat-tables-lib-v2-design
cot-binding
......@@ -6,7 +6,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification (:ref:`Secure Partition Manager`).
- SPM based on the FF-A specification (:ref:`Secure Partition Manager`).
- SPM based on the MM interface.
Both implementations differ in their architectures and only one can be selected
......@@ -822,7 +822,7 @@ Error Codes
--------------
*Copyright (c) 2017-2020, Arm Limited and Contributors. All rights reserved.*
*Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved.*
.. _Armv8-A ARM: https://developer.arm.com/docs/ddi0487/latest/arm-architecture-reference-manual-armv8-for-armv8-a-architecture-profile
.. _instructions in the EDK2 repository: https://github.com/tianocore/edk2-staging/blob/AArch64StandaloneMm/HowtoBuild.MD
......
......@@ -33,8 +33,6 @@ Acronyms
+--------+-----------------------------------+
| PVM | Primary VM |
+--------+-----------------------------------+
| PSA | Platform Security Architecture |
+--------+-----------------------------------+
| SMMU | System Memory Management Unit |
+--------+-----------------------------------+
| SP | Secure Partition |
......@@ -61,7 +59,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification `[1]`_.
- SPM based on the FF-A specification `[1]`_.
- SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_.
Both implementations differ in their architectures and only one can be selected
......@@ -69,7 +67,7 @@ at build time.
This document:
- describes the PSA FF-A implementation where the Secure Partition Manager
- describes the FF-A implementation where the Secure Partition Manager
resides at EL3 and S-EL2 (or EL3 and S-EL1).
- is not an architecture specification and it might provide assumptions
on sections mandated as implementation-defined in the specification.
......@@ -565,7 +563,7 @@ either *(under discussion)*:
- Re-purposing the ``PSCI_CPU_ON`` function id. It is
assumed that even if the input arguments are the same as the ones defined in
the PSCI standard, the usage deviates by the fact the secondary EC is not
woken up immediately. At least for the PSA-FF-A EAC where only
woken up immediately. At least for the FF-A EAC where only
direct messaging is allowed, it is only after the first direct
message invocation that the secondary EC is entered. This option
might be preferred when the same code base is re-used for a VM or
......@@ -949,7 +947,7 @@ References
.. _[1]:
[1] `Platform Security Architecture Firmware Framework for Arm® v8-A 1.0 Platform Design Document <https://developer.arm.com/docs/den0077/latest>`__
[1] `Arm Firmware Framework for Armv8-A <https://developer.arm.com/docs/den0077/latest>`__
.. _[2]:
......@@ -970,7 +968,7 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
.. _[6]:
[6] https://trustedfirmware-a.readthedocs.io/en/latest/components/psa-ffa-manifest-binding.html
[6] https://trustedfirmware-a.readthedocs.io/en/latest/components/ffa-manifest-binding.html
.. _[7]:
......@@ -982,4 +980,4 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
--------------
*Copyright (c) 2020, Arm Limited and Contributors. All rights reserved.*
*Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.*
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment