secure_fw: Fix spelling typos
Signed-off-by: Antonio de Angelis <antonio.deangelis@arm.com>
Change-Id: I58da18eb39f746c169e7e401d921b84e13d70345
diff --git a/secure_fw/spm/include/bitops.h b/secure_fw/spm/include/bitops.h
index ed3ddd9..ce3aef4 100644
--- a/secure_fw/spm/include/bitops.h
+++ b/secure_fw/spm/include/bitops.h
@@ -9,7 +9,7 @@
#include <stdint.h>
-/* Check if there is only one bit availiable in a 32bit number */
+/* Check if there is only one bit available in a 32bit number */
#define IS_ONLY_ONE_BIT_IN_UINT32(n) \
((uint32_t)(n) && !((uint32_t)(n) & ((uint32_t)(n)-1)))
#endif /* __BITOPS_H__ */
diff --git a/secure_fw/spm/include/load/partition_defs.h b/secure_fw/spm/include/load/partition_defs.h
index 4ae9170..6d05bc9 100644
--- a/secure_fw/spm/include/load/partition_defs.h
+++ b/secure_fw/spm/include/load/partition_defs.h
@@ -33,7 +33,7 @@
* +---------+--+--+---+---+----------+
*
* Field Desc Value
- * Priority, bits[7:0]: Partition Priority Lowest, low, normal, high, hightest
+ * Priority, bits[7:0]: Partition Priority Lowest, low, normal, high, highest
* A/P, bit[8]: ARoT or PRoT domain 1: PRoT 0: ARoT
* I/S, bit[9]: IPC or SFN typed partition 1: IPC 0: SFN
* MB, bit[10]: NS Agent Mailbox or not 1: NS Agent mailbox 0: Not
diff --git a/secure_fw/spm/include/tfm_arch.h b/secure_fw/spm/include/tfm_arch.h
index 2d2f928..b321169 100644
--- a/secure_fw/spm/include/tfm_arch.h
+++ b/secure_fw/spm/include/tfm_arch.h
@@ -138,8 +138,8 @@
struct tfm_additional_context_t addi_ctx;
uint32_t exc_return; /* exception return value on SVC_PREPARE_DEPRIV_FLIH */
uint32_t dummy; /* dummy value for 8 bytes aligned */
- uint32_t psp; /* PSP when interrupt exception ocurrs */
- uint32_t psplim; /* PSPLIM when interrupt exception ocurrs when */
+ uint32_t psp; /* PSP when interrupt exception occurs */
+ uint32_t psplim; /* PSPLIM when interrupt exception occurs when */
struct tfm_state_context_t state_ctx; /* ctx on SVC_PREPARE_DEPRIV_FLIH */
};
@@ -322,7 +322,7 @@
* target PSA API to avoid using up the Secure Partitions' stacks. The NS agent
* shares the stack with the SPM so it doesn't need to switch.
*
- * The stack check process destroyes the caller registers so the input args and
+ * The stack check process destroys the caller registers so the input args and
* the target PSA API address are stored in the caller stack at the beginning.
* They are loaded again before the PSA API is called. This function is
* non-preemptive except for the target PSA API execution.
diff --git a/secure_fw/spm/include/tfm_core_trustzone.h b/secure_fw/spm/include/tfm_core_trustzone.h
index 4bb56cb..4de4dd6 100644
--- a/secure_fw/spm/include/tfm_core_trustzone.h
+++ b/secure_fw/spm/include/tfm_core_trustzone.h
@@ -29,7 +29,7 @@
#define TFM_BASIC_FP_CONTEXT_WORDS 18
/*
- * The numbers in 32bit words while addtional FP involved in preempted context:
+ * The numbers in 32bit words while additional FP involved in preempted context:
* S16 - S31
*/
#define TFM_ADDTIONAL_FP_CONTEXT_WORDS 16