Unverified Commit 8013bb57 authored by Antonio Niño Díaz's avatar Antonio Niño Díaz Committed by GitHub
Browse files

Merge pull request #1758 from pbeesley-arm/pb/spelling

Correct typographical errors
parents 9f0f203d 8aabea33
/* /*
* Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -151,7 +151,7 @@ void plat_arm_gic_save(void) ...@@ -151,7 +151,7 @@ void plat_arm_gic_save(void)
* If an ITS is available, save its context before * If an ITS is available, save its context before
* the Redistributor using: * the Redistributor using:
* gicv3_its_save_disable(gits_base, &its_ctx[i]) * gicv3_its_save_disable(gits_base, &its_ctx[i])
* Additionnaly, an implementation-defined sequence may * Additionally, an implementation-defined sequence may
* be required to save the whole ITS state. * be required to save the whole ITS state.
*/ */
......
/* /*
* Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -77,7 +77,7 @@ void tsp_platform_setup(void) ...@@ -77,7 +77,7 @@ void tsp_platform_setup(void)
void tsp_plat_arch_setup(void) void tsp_plat_arch_setup(void)
{ {
#if USE_COHERENT_MEM #if USE_COHERENT_MEM
/* Ensure ARM platforms dont use coherent memory in TSP */ /* Ensure ARM platforms don't use coherent memory in TSP */
assert((BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE) == 0U); assert((BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE) == 0U);
#endif #endif
......
/* /*
* Copyright (c) 2014-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2014-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -32,7 +32,7 @@ void mhuv2_ring_doorbell(struct scmi_channel_plat_info *plat_info) ...@@ -32,7 +32,7 @@ void mhuv2_ring_doorbell(struct scmi_channel_plat_info *plat_info)
plat_info->db_modify_mask, plat_info->db_modify_mask,
plat_info->db_preserve_mask); plat_info->db_preserve_mask);
/* clear the access request for the recevier */ /* clear the access request for the receiver */
MHU_V2_CLEAR_REQUEST(MHUV2_BASE_ADDR); MHU_V2_CLEAR_REQUEST(MHUV2_BASE_ADDR);
return; return;
......
/* /*
* Copyright (c) 2014, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2014-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -10,13 +10,13 @@ ...@@ -10,13 +10,13 @@
#define TEESMC_OPTEED_H #define TEESMC_OPTEED_H
/* /*
* This file specify SMC function IDs used when returning from TEE to the * This file specifies SMC function IDs used when returning from TEE to the
* secure monitor. * secure monitor.
* *
* All SMC Function IDs indicates SMC32 Calling Convention but will carry * All SMC Function IDs indicates SMC32 Calling Convention but will carry
* full 64 bit values in the argument registers if invoked from Aarch64 * full 64 bit values in the argument registers if invoked from Aarch64
* mode. This violates the SMC Calling Convention, but since this * mode. This violates the SMC Calling Convention, but since this
* convention only coveres API towards Normwal World it's something that * convention only coveres API towards Normal World it's something that
* only concerns the OP-TEE Dispatcher in ARM Trusted Firmware and OP-TEE * only concerns the OP-TEE Dispatcher in ARM Trusted Firmware and OP-TEE
* OS at Secure EL1. * OS at Secure EL1.
*/ */
......
/* /*
* Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -341,7 +341,7 @@ static uintptr_t tlkd_smc_handler(uint32_t smc_fid, ...@@ -341,7 +341,7 @@ static uintptr_t tlkd_smc_handler(uint32_t smc_fid,
/* /*
* SP has been successfully initialized. Register power * SP has been successfully initialized. Register power
* managemnt hooks with PSCI * management hooks with PSCI
*/ */
psci_register_spd_pm_hook(&tlkd_pm_ops); psci_register_spd_pm_hook(&tlkd_pm_ops);
......
/* /*
* Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2016-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -100,7 +100,7 @@ static struct args trusty_context_switch(uint32_t security_state, uint64_t r0, ...@@ -100,7 +100,7 @@ static struct args trusty_context_switch(uint32_t security_state, uint64_t r0,
/* /*
* To avoid the additional overhead in PSCI flow, skip FP context * To avoid the additional overhead in PSCI flow, skip FP context
* saving/restoring in case of CPU suspend and resume, asssuming that * saving/restoring in case of CPU suspend and resume, assuming that
* when it's needed the PSCI caller has preserved FP context before * when it's needed the PSCI caller has preserved FP context before
* going here. * going here.
*/ */
...@@ -302,7 +302,7 @@ static int32_t trusty_init(void) ...@@ -302,7 +302,7 @@ static int32_t trusty_init(void)
/* /*
* Adjust secondary cpu entry point for 32 bit images to the * Adjust secondary cpu entry point for 32 bit images to the
* end of exeption vectors * end of exception vectors
*/ */
if ((cpu != 0) && (reg_width == MODE_RW_32)) { if ((cpu != 0) && (reg_width == MODE_RW_32)) {
INFO("trusty: cpu %d, adjust entry point to 0x%lx\n", INFO("trusty: cpu %d, adjust entry point to 0x%lx\n",
......
/* /*
* Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -375,7 +375,7 @@ static uintptr_t tspd_smc_handler(uint32_t smc_fid, ...@@ -375,7 +375,7 @@ static uintptr_t tspd_smc_handler(uint32_t smc_fid,
/* /*
* TSP has been successfully initialized. Register power * TSP has been successfully initialized. Register power
* managemnt hooks with PSCI * management hooks with PSCI
*/ */
psci_register_spd_pm_hook(&tspd_pm); psci_register_spd_pm_hook(&tspd_pm);
......
/* /*
* Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
...@@ -54,7 +54,7 @@ ...@@ -54,7 +54,7 @@
/* /*
* 'info' parameter to SDEI_EVENT_GET_INFO SMC. * 'info' parameter to SDEI_EVENT_GET_INFO SMC.
* *
* Note that the SDEI v1.0 speification mistakenly enumerates the * Note that the SDEI v1.0 specification mistakenly enumerates the
* SDEI_INFO_EV_SIGNALED as SDEI_INFO_SIGNALED. This will be corrected in a * SDEI_INFO_EV_SIGNALED as SDEI_INFO_SIGNALED. This will be corrected in a
* future version. * future version.
*/ */
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment