diff options
author | Antonio Nino Diaz <antonio.ninodiaz@arm.com> | 2019-02-28 13:35:21 +0000 |
---|---|---|
committer | Antonio Nino Diaz <antonio.ninodiaz@arm.com> | 2019-02-28 13:35:21 +0000 |
commit | 73308618fee8afc4518c592956b31864e57e48e7 (patch) | |
tree | d3aa4921ae1a58dc4f15c4fd311cdf2b58093cbb /bl31 | |
parent | 1baa28bb2dc79f23c550d67604324afd222221c3 (diff) |
Minor changes to documentation and comments
Fix some typos and clarify some sentences.
Change-Id: Id276d1ced9a991b4eddc5c47ad9a825e6b29ef74
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
Diffstat (limited to 'bl31')
-rw-r--r-- | bl31/bl31_main.c | 2 | ||||
-rw-r--r-- | bl31/ehf.c | 8 |
2 files changed, 5 insertions, 5 deletions
diff --git a/bl31/bl31_main.c b/bl31/bl31_main.c index aca16d67..856ea9f6 100644 --- a/bl31/bl31_main.c +++ b/bl31/bl31_main.c @@ -90,7 +90,7 @@ void bl31_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, * function calls runtime_svc_init() which initializes all registered runtime * services. The run time services would setup enough context for the core to * switch to the next exception level. When this function returns, the core will - * switch to the programmed exception level via. an ERET. + * switch to the programmed exception level via an ERET. ******************************************************************************/ void bl31_main(void) { @@ -314,9 +314,9 @@ static void *ehf_entering_normal_world(const void *arg) /* * Program Priority Mask to the original Non-secure priority such that - * Non-secure interrupts may preempt Secure execution, viz. during Yielding SMC - * calls. The 'preempt_ret_code' parameter indicates the Yielding SMC's return - * value in case the call was preempted. + * Non-secure interrupts may preempt Secure execution (for example, during + * Yielding SMC calls). The 'preempt_ret_code' parameter indicates the Yielding + * SMC's return value in case the call was preempted. * * This API is expected to be invoked before delegating a yielding SMC to Secure * EL1. I.e. within the window of secure execution after Non-secure context is @@ -360,7 +360,7 @@ void ehf_allow_ns_preemption(uint64_t preempt_ret_code) /* * Return whether Secure execution has explicitly allowed Non-secure interrupts - * to preempt itself, viz. during Yielding SMC calls. + * to preempt itself (for example, during Yielding SMC calls). */ unsigned int ehf_is_ns_preemption_allowed(void) { |