Docs: Remove Library Model documentation
Library Model is deprecated, so remove the related description and
documentations.
Signed-off-by: Summer Qin <summer.qin@arm.com>
Change-Id: I3c9d1bba97c011183bea17bfd5ea7d9ec834802b
diff --git a/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst b/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
index 2f4b68b..1dc5ebb 100644
--- a/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
+++ b/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
@@ -396,10 +396,6 @@
+----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
|TOTAL_CODE_SRAM_SIZE | Size of the S code | if no XIP on flash |
+----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
- |CMSE_VENEER_REGION_START | Start of the veneer Code | if library mode and not multicore |
- +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
- |CMSE_VENEER_REGION_SIZE | Size of the veneer Code | if library mode and not multicore |
- +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
CMSIS_Driver/Config/cmsis_driver_config.h:
------------------------------------------
@@ -446,14 +442,6 @@
Refer to the CMSIS `USART <https://www.keil.com/pack/doc/CMSIS/Driver/html/group__usart__interface__gr.html>`_
documentation.
-spm_hal.c:
-----------
-
- (location as defined in CMakeLists.txt)
-
- This file should contain all the functions required by the SPM component.
- Refer to Functions_ for each of them
-
target_cfg.[ch]:
----------------
@@ -544,33 +532,6 @@
enum tfm_platform_err_t tfm_platform_hal_ioctl(tfm_platform_ioctl_req_t request, psa_invec *in_vec, psa_outvec *out_vec);
-tfm_spm_hal_configure_default_isolation:
-----------------------------------------
-
- This function is called by SPM to setup the isolation level, it's called
- during the partition initialisation but before calling the init of each
- partition.
-
-.. code-block:: c
-
- enum tfm_plat_err_t tfm_spm_hal_configure_default_isolation(bool privileged, const struct platform_data_t *platform_data);
-
-.. Note::
-
- When Fault Injection Hardening (FIH) is enabled this function will return
- fih_int.
-
-tfm_spm_hal_set_secure_irq_priority:
-------------------------------------
-
- This function sets the priority for the IRQ passed in the parameter.
- The precision of the priority value might be adjusted to match the
- available priority bits in the underlying target platform.
-
-.. code-block:: c
-
- enum tfm_plat_err_t tfm_spm_hal_set_secure_irq_priority(IRQn_Type irq_line, uint32_t priority);
-
tfm_spm_hal_get_mem_security_attr:
----------------------------------
@@ -628,15 +589,6 @@
void tfm_hal_irq_disable(uint32_t irq_num);
-tfm_spm_hal_set_irq_target_state:
----------------------------------
-
- This function sets the target_state for the IRQ.
-
-.. code-block:: c
-
- enum irq_target_state_t tfm_spm_hal_set_irq_target_state(IRQn_Type irq_line, enum irq_target_state_t target_state);
-
Annex
=====
@@ -735,7 +687,6 @@
)
target_sources(tfm_spm
PRIVATE
- spm_hal.c
target_cfg.c
tfm_hal_isolation.c
tfm_hal_platform.c
diff --git a/docs/integration_guide/services/tfm_attestation_integration_guide.rst b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
index 2be9cf5..f48cec9 100644
--- a/docs/integration_guide/services/tfm_attestation_integration_guide.rst
+++ b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
@@ -242,8 +242,6 @@
partition manager implementation (SPM). Implementations in TF-M project can be
found here:
-- ``interface/src/tfm_initial_attestation_func_api.c``: non-secure interface
- implementation for library model
- ``interface/src/tfm_initial_attestation_ipc_api.c``: non-secure interface
implementation for IPC model
- ``secure_fw/partitions/initial_attestation/tfm_attestation_secure_api.c``:
diff --git a/docs/integration_guide/services/tfm_secure_partition_addition.rst b/docs/integration_guide/services/tfm_secure_partition_addition.rst
index 5137203..b4e1d95 100644
--- a/docs/integration_guide/services/tfm_secure_partition_addition.rst
+++ b/docs/integration_guide/services/tfm_secure_partition_addition.rst
@@ -18,7 +18,6 @@
IPC Interprocess communication
IPC model The secure IPC framework
irqs Interrupt requests
- Library model The secure function call framework
MMIO Memory Mapped I/O
PSA Platform Security Architecture
RoT Root of Trust
@@ -47,8 +46,7 @@
source-level implementation is not included in this document.
.. Note::
- If not otherwise specified, the steps are identical for Library, IPC and SFN
- model.
+ If not otherwise specified, the steps are identical for IPC and SFN model.
The IPC and SFN model conforms to the *PSA Firmware Framework for M (FF-M) v
1.1* changes. Refer to `PSA Firmware Framework specification`_ and
@@ -196,8 +194,6 @@
crypto 0x00000 0x080-0x09F
firmware_update 0x00000 0x0A0-0x0BF
tfm_secure_client 0x0000F 0x000-0x01F
- core_test 0x0000F 0x020-0x03F
- core_test_2 0x0000F 0x040-0x05F
tfm_ipc_client 0x0000F 0x060-0x07F
tfm_ipc_service 0x0000F 0x080-0x09F
tfm_slih_test_service 0x0000F 0x0A0-0x0AF
@@ -289,26 +285,6 @@
#define TFM_PERIPHERAL_A (&tfm_peripheral_A)
-Library model support
----------------------
-For the library model, the user needs to add a ``secure_functions`` item. The
-main difference between ``secure_function`` and ``services`` is the extra
-``signal`` key for secure function entry. This is not required in FF-M v1.0.
-
-The ``signal`` must be the upper case of the secure function name.
-
-.. code-block:: yaml
-
- "secure_functions": [
- {
- "name": "TFM_EXAMPLE_A",
- "signal": "EXAMPLE_A_FUNC",
- "sid": "0x00000000",
- "non_secure_clients": true,
- "version": 1,
- "version_policy": "STRICT"
- },
-
Add configuration
=================
The following configuration tasks are required for the newly added secure
diff --git a/docs/integration_guide/tfm_fpu_support.rst b/docs/integration_guide/tfm_fpu_support.rst
index cde89dd..520146e 100644
--- a/docs/integration_guide/tfm_fpu_support.rst
+++ b/docs/integration_guide/tfm_fpu_support.rst
@@ -15,7 +15,7 @@
2021.10`` and later version shall be used to mitigate VLLDM instruction
security vulnerability [4]_.
* Support Inter-Process Communication (IPC) [5]_ model in TF-M, and doesn't
- support LIBRARY or SFN model.
+ support SFN model.
* Support Armv8-M mainline.
* Support isolation level 1,2,3.
* Does not support use FPU in First-Level Interrupt Handling (FLIH) [6]_ at