Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
adam.huang
Arm Trusted Firmware
Commits
8013bb57
Unverified
Commit
8013bb57
authored
Jan 16, 2019
by
Antonio Niño Díaz
Committed by
GitHub
Jan 16, 2019
Browse files
Merge pull request #1758 from pbeesley-arm/pb/spelling
Correct typographical errors
parents
9f0f203d
8aabea33
Changes
28
Show whitespace changes
Inline
Side-by-side
plat/arm/common/arm_gicv3.c
View file @
8013bb57
/*
* Copyright (c) 2015-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2015-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -151,7 +151,7 @@ void plat_arm_gic_save(void)
* If an ITS is available, save its context before
* the Redistributor using:
* gicv3_its_save_disable(gits_base, &its_ctx[i])
* Addition
n
aly, an implementation-defined sequence may
* Additiona
l
ly, an implementation-defined sequence may
* be required to save the whole ITS state.
*/
...
...
plat/arm/common/tsp/arm_tsp_setup.c
View file @
8013bb57
/*
* Copyright (c) 2015-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2015-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -77,7 +77,7 @@ void tsp_platform_setup(void)
void
tsp_plat_arch_setup
(
void
)
{
#if USE_COHERENT_MEM
/* Ensure ARM platforms dont use coherent memory in TSP */
/* Ensure ARM platforms don
'
t use coherent memory in TSP */
assert
((
BL_COHERENT_RAM_END
-
BL_COHERENT_RAM_BASE
)
==
0U
);
#endif
...
...
plat/arm/css/drivers/mhu/css_mhu_doorbell.c
View file @
8013bb57
/*
* Copyright (c) 2014-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2014-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -32,7 +32,7 @@ void mhuv2_ring_doorbell(struct scmi_channel_plat_info *plat_info)
plat_info
->
db_modify_mask
,
plat_info
->
db_preserve_mask
);
/* clear the access request for the rece
v
ier */
/* clear the access request for the recei
v
er */
MHU_V2_CLEAR_REQUEST
(
MHUV2_BASE_ADDR
);
return
;
...
...
services/spd/opteed/teesmc_opteed.h
View file @
8013bb57
/*
* Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2014
-2019
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -10,13 +10,13 @@
#define TEESMC_OPTEED_H
/*
* This file specif
y
SMC function IDs used when returning from TEE to the
* This file specif
ies
SMC function IDs used when returning from TEE to the
* secure monitor.
*
* All SMC Function IDs indicates SMC32 Calling Convention but will carry
* full 64 bit values in the argument registers if invoked from Aarch64
* mode. This violates the SMC Calling Convention, but since this
* convention only coveres API towards Norm
w
al World it's something that
* convention only coveres API towards Normal World it's something that
* only concerns the OP-TEE Dispatcher in ARM Trusted Firmware and OP-TEE
* OS at Secure EL1.
*/
...
...
services/spd/tlkd/tlkd_main.c
View file @
8013bb57
/*
* Copyright (c) 2015-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2015-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -341,7 +341,7 @@ static uintptr_t tlkd_smc_handler(uint32_t smc_fid,
/*
* SP has been successfully initialized. Register power
* managemnt hooks with PSCI
* managem
e
nt hooks with PSCI
*/
psci_register_spd_pm_hook
(
&
tlkd_pm_ops
);
...
...
services/spd/trusty/trusty.c
View file @
8013bb57
/*
* Copyright (c) 2016-201
7
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2016-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -100,7 +100,7 @@ static struct args trusty_context_switch(uint32_t security_state, uint64_t r0,
/*
* To avoid the additional overhead in PSCI flow, skip FP context
* saving/restoring in case of CPU suspend and resume, ass
s
uming that
* saving/restoring in case of CPU suspend and resume, assuming that
* when it's needed the PSCI caller has preserved FP context before
* going here.
*/
...
...
@@ -302,7 +302,7 @@ static int32_t trusty_init(void)
/*
* Adjust secondary cpu entry point for 32 bit images to the
* end of exeption vectors
* end of ex
c
eption vectors
*/
if
((
cpu
!=
0
)
&&
(
reg_width
==
MODE_RW_32
))
{
INFO
(
"trusty: cpu %d, adjust entry point to 0x%lx
\n
"
,
...
...
services/spd/tspd/tspd_main.c
View file @
8013bb57
/*
* Copyright (c) 2013-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2013-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -375,7 +375,7 @@ static uintptr_t tspd_smc_handler(uint32_t smc_fid,
/*
* TSP has been successfully initialized. Register power
* managemnt hooks with PSCI
* managem
e
nt hooks with PSCI
*/
psci_register_spd_pm_hook
(
&
tspd_pm
);
...
...
services/std_svc/sdei/sdei_private.h
View file @
8013bb57
/*
* Copyright (c) 2017-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2017-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -54,7 +54,7 @@
/*
* 'info' parameter to SDEI_EVENT_GET_INFO SMC.
*
* Note that the SDEI v1.0 speification mistakenly enumerates the
* Note that the SDEI v1.0 spe
c
ification mistakenly enumerates the
* SDEI_INFO_EV_SIGNALED as SDEI_INFO_SIGNALED. This will be corrected in a
* future version.
*/
...
...
Prev
1
2
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment