Commit 1b17f4f1 authored by Olivier Deprez's avatar Olivier Deprez
Browse files

docs: remove PSA wording for SPM chapters



PSA wording is not longer associated with FF-A.

Change-Id: Id7c53b9c6c8f383543f6a32a15eb15b7749d8658
Signed-off-by: default avatarOlivier Deprez <olivier.deprez@arm.com>
parent 08e7cc53
...@@ -108,7 +108,7 @@ Still to come ...@@ -108,7 +108,7 @@ Still to come
- Refinements to Position Independent Executable (PIE) support. - Refinements to Position Independent Executable (PIE) support.
- Continued support for the PSA FF-A v1.0 (formally known as SPCI) specification, to enable the - Continued support for the FF-A v1.0 (formally known as SPCI) specification, to enable the
use of secure partition management in the secure world. use of secure partition management in the secure world.
- Documentation enhancements. - Documentation enhancements.
...@@ -126,4 +126,4 @@ Still to come ...@@ -126,4 +126,4 @@ Still to come
-------------- --------------
*Copyright (c) 2019-2020, Arm Limited. All rights reserved.* *Copyright (c) 2019-2021, Arm Limited. All rights reserved.*
PSA FF-A manifest binding to device tree FF-A manifest binding to device tree
======================================== ========================================
This document defines the nodes and properties used to define a partition, This document defines the nodes and properties used to define a partition,
according to the PSA FF-A specification. according to the FF-A specification.
Version 1.0 Version 1.0
----------- -----------
...@@ -25,9 +25,9 @@ Partition Properties ...@@ -25,9 +25,9 @@ Partition Properties
- Must be two 16 bits values (X, Y), concatenated as 31:16 -> X, - Must be two 16 bits values (X, Y), concatenated as 31:16 -> X,
15:0 -> Y, where: 15:0 -> Y, where:
- X is the major version of PSA-FF-A expected by the partition at the FFA - X is the major version of FF-A expected by the partition at the FFA
instance it will execute. instance it will execute.
- Y is the minor version of PSA-FF-A expected by the partition at the FFA - Y is the minor version of FF-A expected by the partition at the FFA
instance it will execute. instance it will execute.
- uuid [mandatory] - uuid [mandatory]
......
...@@ -19,6 +19,6 @@ Components ...@@ -19,6 +19,6 @@ Components
sdei sdei
secure-partition-manager secure-partition-manager
secure-partition-manager-mm secure-partition-manager-mm
psa-ffa-manifest-binding ffa-manifest-binding
xlat-tables-lib-v2-design xlat-tables-lib-v2-design
cot-binding cot-binding
...@@ -6,7 +6,7 @@ Foreword ...@@ -6,7 +6,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification (:ref:`Secure Partition Manager`). - SPM based on the FF-A specification (:ref:`Secure Partition Manager`).
- SPM based on the MM interface. - SPM based on the MM interface.
Both implementations differ in their architectures and only one can be selected Both implementations differ in their architectures and only one can be selected
...@@ -822,7 +822,7 @@ Error Codes ...@@ -822,7 +822,7 @@ Error Codes
-------------- --------------
*Copyright (c) 2017-2020, Arm Limited and Contributors. All rights reserved.* *Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved.*
.. _Armv8-A ARM: https://developer.arm.com/docs/ddi0487/latest/arm-architecture-reference-manual-armv8-for-armv8-a-architecture-profile .. _Armv8-A ARM: https://developer.arm.com/docs/ddi0487/latest/arm-architecture-reference-manual-armv8-for-armv8-a-architecture-profile
.. _instructions in the EDK2 repository: https://github.com/tianocore/edk2-staging/blob/AArch64StandaloneMm/HowtoBuild.MD .. _instructions in the EDK2 repository: https://github.com/tianocore/edk2-staging/blob/AArch64StandaloneMm/HowtoBuild.MD
......
...@@ -33,8 +33,6 @@ Acronyms ...@@ -33,8 +33,6 @@ Acronyms
+--------+-----------------------------------+ +--------+-----------------------------------+
| PVM | Primary VM | | PVM | Primary VM |
+--------+-----------------------------------+ +--------+-----------------------------------+
| PSA | Platform Security Architecture |
+--------+-----------------------------------+
| SMMU | System Memory Management Unit | | SMMU | System Memory Management Unit |
+--------+-----------------------------------+ +--------+-----------------------------------+
| SP | Secure Partition | | SP | Secure Partition |
...@@ -61,7 +59,7 @@ Foreword ...@@ -61,7 +59,7 @@ Foreword
Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
- SPM based on the PSA FF-A specification `[1]`_. - SPM based on the FF-A specification `[1]`_.
- SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_. - SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_.
Both implementations differ in their architectures and only one can be selected Both implementations differ in their architectures and only one can be selected
...@@ -69,7 +67,7 @@ at build time. ...@@ -69,7 +67,7 @@ at build time.
This document: This document:
- describes the PSA FF-A implementation where the Secure Partition Manager - describes the FF-A implementation where the Secure Partition Manager
resides at EL3 and S-EL2 (or EL3 and S-EL1). resides at EL3 and S-EL2 (or EL3 and S-EL1).
- is not an architecture specification and it might provide assumptions - is not an architecture specification and it might provide assumptions
on sections mandated as implementation-defined in the specification. on sections mandated as implementation-defined in the specification.
...@@ -565,7 +563,7 @@ either *(under discussion)*: ...@@ -565,7 +563,7 @@ either *(under discussion)*:
- Re-purposing the ``PSCI_CPU_ON`` function id. It is - Re-purposing the ``PSCI_CPU_ON`` function id. It is
assumed that even if the input arguments are the same as the ones defined in assumed that even if the input arguments are the same as the ones defined in
the PSCI standard, the usage deviates by the fact the secondary EC is not the PSCI standard, the usage deviates by the fact the secondary EC is not
woken up immediately. At least for the PSA-FF-A EAC where only woken up immediately. At least for the FF-A EAC where only
direct messaging is allowed, it is only after the first direct direct messaging is allowed, it is only after the first direct
message invocation that the secondary EC is entered. This option message invocation that the secondary EC is entered. This option
might be preferred when the same code base is re-used for a VM or might be preferred when the same code base is re-used for a VM or
...@@ -949,7 +947,7 @@ References ...@@ -949,7 +947,7 @@ References
.. _[1]: .. _[1]:
[1] `Platform Security Architecture Firmware Framework for Arm® v8-A 1.0 Platform Design Document <https://developer.arm.com/docs/den0077/latest>`__ [1] `Arm Firmware Framework for Armv8-A <https://developer.arm.com/docs/den0077/latest>`__
.. _[2]: .. _[2]:
...@@ -970,7 +968,7 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require ...@@ -970,7 +968,7 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
.. _[6]: .. _[6]:
[6] https://trustedfirmware-a.readthedocs.io/en/latest/components/psa-ffa-manifest-binding.html [6] https://trustedfirmware-a.readthedocs.io/en/latest/components/ffa-manifest-binding.html
.. _[7]: .. _[7]:
...@@ -982,4 +980,4 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require ...@@ -982,4 +980,4 @@ Client <https://developer.arm.com/docs/den0006/latest/trusted-board-boot-require
-------------- --------------
*Copyright (c) 2020, Arm Limited and Contributors. All rights reserved.* *Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.*
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment