Docs: Remove Library Model documentation

Library Model is deprecated, so remove the related description and
documentations.

Signed-off-by: Summer Qin <summer.qin@arm.com>
Change-Id: I3c9d1bba97c011183bea17bfd5ea7d9ec834802b
diff --git a/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst b/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
index 2f4b68b..1dc5ebb 100644
--- a/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
+++ b/docs/integration_guide/platform/porting_TFM_to_a_new_hardware.rst
@@ -396,10 +396,6 @@
     +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
     |TOTAL_CODE_SRAM_SIZE              | Size of the S code                                                    | if no XIP on flash                |
     +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
-    |CMSE_VENEER_REGION_START          | Start of the veneer Code                                              | if library mode and not multicore |
-    +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
-    |CMSE_VENEER_REGION_SIZE           | Size of the veneer Code                                               | if library mode and not multicore |
-    +----------------------------------+-----------------------------------------------------------------------+-----------------------------------+
 
 CMSIS_Driver/Config/cmsis_driver_config.h:
 ------------------------------------------
@@ -446,14 +442,6 @@
     Refer to the CMSIS `USART <https://www.keil.com/pack/doc/CMSIS/Driver/html/group__usart__interface__gr.html>`_
     documentation.
 
-spm_hal.c:
-----------
-
-    (location as defined in CMakeLists.txt)
-
-    This file should contain all the functions required by the SPM component.
-    Refer to Functions_ for each of them
-
 target_cfg.[ch]:
 ----------------
 
@@ -544,33 +532,6 @@
 
     enum tfm_platform_err_t tfm_platform_hal_ioctl(tfm_platform_ioctl_req_t request, psa_invec  *in_vec, psa_outvec *out_vec);
 
-tfm_spm_hal_configure_default_isolation:
-----------------------------------------
-
-    This function is called by SPM to setup the isolation level, it's called
-    during the partition initialisation but before calling the init of each
-    partition.
-
-.. code-block:: c
-
-    enum tfm_plat_err_t tfm_spm_hal_configure_default_isolation(bool privileged, const struct platform_data_t *platform_data);
-
-.. Note::
-
-   When Fault Injection Hardening (FIH) is enabled this function will return
-   fih_int.
-
-tfm_spm_hal_set_secure_irq_priority:
-------------------------------------
-
-    This function sets the priority for the IRQ passed in the parameter.
-    The precision of the priority value might be adjusted to match the
-    available priority bits in the underlying target platform.
-
-.. code-block:: c
-
-    enum tfm_plat_err_t tfm_spm_hal_set_secure_irq_priority(IRQn_Type irq_line, uint32_t priority);
-
 tfm_spm_hal_get_mem_security_attr:
 ----------------------------------
 
@@ -628,15 +589,6 @@
 
     void tfm_hal_irq_disable(uint32_t irq_num);
 
-tfm_spm_hal_set_irq_target_state:
----------------------------------
-
-    This function sets the target_state for the IRQ.
-
-.. code-block:: c
-
-    enum irq_target_state_t tfm_spm_hal_set_irq_target_state(IRQn_Type irq_line, enum irq_target_state_t target_state);
-
 Annex
 =====
 
@@ -735,7 +687,6 @@
     )
     target_sources(tfm_spm
         PRIVATE
-            spm_hal.c
             target_cfg.c
             tfm_hal_isolation.c
             tfm_hal_platform.c
diff --git a/docs/integration_guide/services/tfm_attestation_integration_guide.rst b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
index 2be9cf5..f48cec9 100644
--- a/docs/integration_guide/services/tfm_attestation_integration_guide.rst
+++ b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
@@ -242,8 +242,6 @@
 partition manager implementation (SPM). Implementations in TF-M project can be
 found here:
 
--  ``interface/src/tfm_initial_attestation_func_api.c``: non-secure interface
-   implementation for library model
 -  ``interface/src/tfm_initial_attestation_ipc_api.c``: non-secure interface
    implementation for IPC model
 -  ``secure_fw/partitions/initial_attestation/tfm_attestation_secure_api.c``:
diff --git a/docs/integration_guide/services/tfm_secure_partition_addition.rst b/docs/integration_guide/services/tfm_secure_partition_addition.rst
index 5137203..b4e1d95 100644
--- a/docs/integration_guide/services/tfm_secure_partition_addition.rst
+++ b/docs/integration_guide/services/tfm_secure_partition_addition.rst
@@ -18,7 +18,6 @@
    IPC                Interprocess communication
    IPC model          The secure IPC framework
    irqs               Interrupt requests
-   Library model      The secure function call framework
    MMIO               Memory Mapped I/O
    PSA                Platform Security Architecture
    RoT                Root of Trust
@@ -47,8 +46,7 @@
 source-level implementation is not included in this document.
 
 .. Note::
-   If not otherwise specified, the steps are identical for Library, IPC and SFN
-   model.
+   If not otherwise specified, the steps are identical for IPC and SFN model.
 
    The IPC and SFN model conforms to the *PSA Firmware Framework for M (FF-M) v
    1.1* changes. Refer to `PSA Firmware Framework specification`_ and
@@ -196,8 +194,6 @@
    crypto                      0x00000                0x080-0x09F
    firmware_update             0x00000                0x0A0-0x0BF
    tfm_secure_client           0x0000F                0x000-0x01F
-   core_test                   0x0000F                0x020-0x03F
-   core_test_2                 0x0000F                0x040-0x05F
    tfm_ipc_client              0x0000F                0x060-0x07F
    tfm_ipc_service             0x0000F                0x080-0x09F
    tfm_slih_test_service       0x0000F                0x0A0-0x0AF
@@ -289,26 +285,6 @@
    #define TFM_PERIPHERAL_A                 (&tfm_peripheral_A)
 
 
-Library model support
----------------------
-For the library model, the user needs to add a ``secure_functions`` item. The
-main difference between ``secure_function`` and ``services`` is the extra
-``signal`` key for secure function entry. This is not required in FF-M v1.0.
-
-The ``signal`` must be the upper case of the secure function name.
-
-.. code-block:: yaml
-
-  "secure_functions": [
-    {
-      "name": "TFM_EXAMPLE_A",
-      "signal": "EXAMPLE_A_FUNC",
-      "sid": "0x00000000",
-      "non_secure_clients": true,
-      "version": 1,
-      "version_policy": "STRICT"
-    },
-
 Add configuration
 =================
 The following configuration tasks are required for the newly added secure
diff --git a/docs/integration_guide/tfm_fpu_support.rst b/docs/integration_guide/tfm_fpu_support.rst
index cde89dd..520146e 100644
--- a/docs/integration_guide/tfm_fpu_support.rst
+++ b/docs/integration_guide/tfm_fpu_support.rst
@@ -15,7 +15,7 @@
   2021.10`` and later version shall be used to mitigate VLLDM instruction
   security vulnerability [4]_.
 * Support Inter-Process Communication (IPC) [5]_ model in TF-M, and doesn't
-  support LIBRARY or SFN model.
+  support SFN model.
 * Support Armv8-M mainline.
 * Support isolation level 1,2,3.
 * Does not support use FPU in First-Level Interrupt Handling (FLIH) [6]_ at