From patchwork Mon Mar 6 12:49:24 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Huth X-Patchwork-Id: 1752416 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=JrGS4yBJ; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=edy1lQiK; dkim-atps=neutral Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PVdhR45bSz23j7 for ; Mon, 6 Mar 2023 23:49:59 +1100 (AEDT) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4PVdhR2xPBz3bjb for ; Mon, 6 Mar 2023 23:49:59 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=JrGS4yBJ; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=edy1lQiK; dkim-atps=neutral X-Original-To: slof@lists.ozlabs.org Delivered-To: slof@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=thuth@redhat.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=JrGS4yBJ; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=edy1lQiK; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4PVdh82yb2z3bjW for ; Mon, 6 Mar 2023 23:49:44 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106981; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dPgxxSozfRhUNNLXQVmUP1x7nvhM5npAcMmvsMWNRLw=; b=JrGS4yBJ5/dUZBEm8z84DslNdII2QY4/Wh7nG53c7dWJh6vuvmzILFgtjngMWZRJySvGzs k8hgOBIu6hXHTrom5jvRGrDMk53OYp8rGCgK58WEnHq9rPX2MD1IZ2aZ369k6/zAHP7FIK S2G0fBNXyunh1/25MVZbJyDVh7LaETg= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106982; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dPgxxSozfRhUNNLXQVmUP1x7nvhM5npAcMmvsMWNRLw=; b=edy1lQiKfoZIFOi/bgM4YK74J5sM3QUkmvMnAdIg8ZMO+2jEL1eZT0be4KCQcHej32vYsV VtV08ky/9UNOU5utE9EL1S3rDKVK6x/WIrmBwza51nHY2MpysuMt2tYr2j6yWXbz+Z5NUM x2bfTjDwCdTYj7ZBlwfmlCfZxQFKeD0= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-126-NOByoOgyPeKIMcGfQn8sEA-1; Mon, 06 Mar 2023 07:49:32 -0500 X-MC-Unique: NOByoOgyPeKIMcGfQn8sEA-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id A0792800B23; Mon, 6 Mar 2023 12:49:31 +0000 (UTC) Received: from thuth.com (unknown [10.39.193.101]) by smtp.corp.redhat.com (Postfix) with ESMTP id D8FBD492C3E; Mon, 6 Mar 2023 12:49:30 +0000 (UTC) From: Thomas Huth To: slof@lists.ozlabs.org Date: Mon, 6 Mar 2023 13:49:24 +0100 Message-Id: <20230306124927.410534-2-thuth@redhat.com> In-Reply-To: <20230306124927.410534-1-thuth@redhat.com> References: <20230306124927.410534-1-thuth@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [SLOF] [PATCH 1/4] Fix typos in the board-js2x folder X-BeenThere: slof@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Patches for https://github.com/aik/SLOF" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "SLOF" Found with the "codespell" utility. I kept "busses" which codespell also complains about since it seems to be an old but still valid plural of the word "bus". Signed-off-by: Thomas Huth --- board-js2x/include/nvramlog.h | 2 +- board-js2x/llfw/u4mem.c | 10 +++++----- board-js2x/rtas/rtas_flash.c | 2 +- board-js2x/slof/OF.fs | 8 ++++---- board-js2x/slof/citrine-disk.fs | 2 +- board-js2x/slof/pci-bridge_1022_7460.fs | 4 ++-- board-js2x/slof/pci-class_03.fs | 5 ++--- board-js2x/slof/rtas.fs | 4 ++-- 8 files changed, 18 insertions(+), 19 deletions(-) diff --git a/board-js2x/include/nvramlog.h b/board-js2x/include/nvramlog.h index 5d6c5d1..ce2fbd4 100644 --- a/board-js2x/include/nvramlog.h +++ b/board-js2x/include/nvramlog.h @@ -21,7 +21,7 @@ * 01h - checksum ( 1 byte) * 02h - length ( 2 byte) value = 1st_byte*256 + 2nd_byte * 04h - name (12 byte) - * space for partiton header = 16 byte + * space for partition header = 16 byte * * Log Header * 10h - offset ( 2 byte) from Partition Header to Data Section diff --git a/board-js2x/llfw/u4mem.c b/board-js2x/llfw/u4mem.c index 68bba56..74c5590 100644 --- a/board-js2x/llfw/u4mem.c +++ b/board-js2x/llfw/u4mem.c @@ -265,7 +265,7 @@ static const uint32_t SUBVER = 1; #define I2C_START 0x50 /* - * Index to the speed dependend DIMM settings + * Index to the speed dependent DIMM settings */ enum { @@ -937,7 +937,7 @@ ddr2_setupDIMMcfg( void ) uint32_t i, j, e, b; /* - * check wether on board DIMM slot population is valid + * check whether on board DIMM slot population is valid */ e = 0; b = 0; @@ -1156,7 +1156,7 @@ ddr2_setupDIMMcfg( void ) } /* - * check wether cl values are supported by U4 + * check whether cl values are supported by U4 */ for( i = 0; i < m_gendimm.m_clcnt_u32; i++ ) { @@ -1487,7 +1487,7 @@ u4_group2banks( uint32_t *bidx ) */ /* - * check wether DIMM banks may be grouped + * check whether DIMM banks may be grouped */ if( ( ( ( bidx[0] + bidx[1] ) & 0x1 ) != 0 ) && ( u4_Dcmp( &m_dimm[didx0], &m_dimm[didx1] ) == 0 ) ) { @@ -2461,7 +2461,7 @@ u4_MemInitSequence( uint32_t tRP, uint32_t tWR, uint32_t tRFC, uint32_t CL, } /* - * static DIMM configuartion settings + * static DIMM configuration settings */ static reg_statics_t reg_statics_maui[NUM_SPEED_IDX] = { { /* 400 Mhz */ diff --git a/board-js2x/rtas/rtas_flash.c b/board-js2x/rtas/rtas_flash.c index 189878d..aa61603 100644 --- a/board-js2x/rtas/rtas_flash.c +++ b/board-js2x/rtas/rtas_flash.c @@ -496,7 +496,7 @@ rtas_update_flash(rtas_args_t *rtas_args) #endif /* from SLOF we pass a second (unofficial) parameter, if this parameter is 1, we do not - * check wether we are on permanent side. Needed for update-flash -c to work! */ + * check whether we are on permanent side. Needed for update-flash -c to work! */ if ((rtas_args->nargs > 1) && (rtas_args->args[1] == 1)) perm_check = 0; diff --git a/board-js2x/slof/OF.fs b/board-js2x/slof/OF.fs index f8cde85..dcc67a5 100644 --- a/board-js2x/slof/OF.fs +++ b/board-js2x/slof/OF.fs @@ -26,8 +26,8 @@ uni-n-version 4 rshift dup 3 = CONSTANT u3? 4 = CONSTANT u4? \ if (f4000682 >> 4) == 1... it is a bimini... f4000682 rb@ 4 rshift 1 = CONSTANT bimini? -\ to decide wether vga initialisation using bios emulation should be attempted, -\ we need to know wether a vga-device was found during pci-scan. +\ to decide whether vga initialisation using bios emulation should be attempted, +\ we need to know whether a vga-device was found during pci-scan. \ If it is found, this value will be set to the device's phandle 0 value vga-device-node? @@ -331,7 +331,7 @@ check-for-nvramrc 8a8 cp -\ check wether a VGA device was found during pci scan, if it was +\ check whether a VGA device was found during pci scan, if it was \ try to initialize it and create the needed device-nodes 0 value biosemu-vmem 100000 value biosemu-vmem-size @@ -538,7 +538,7 @@ cr #include "copyright-oss.fs" cr -\ this CATCH is to ensure the code bellow always executes: boot may ABORT! +\ this CATCH is to ensure the code below always executes: boot may ABORT! ' start-it CATCH drop : boot diff --git a/board-js2x/slof/citrine-disk.fs b/board-js2x/slof/citrine-disk.fs index 146e7ec..a0c280e 100644 --- a/board-js2x/slof/citrine-disk.fs +++ b/board-js2x/slof/citrine-disk.fs @@ -29,7 +29,7 @@ get-parent CONSTANT ppack 0 pci-alias-disk -\ Requiered interface for deblocker +\ Required interface for deblocker 200 CONSTANT block-size 40000 CONSTANT max-transfer diff --git a/board-js2x/slof/pci-bridge_1022_7460.fs b/board-js2x/slof/pci-bridge_1022_7460.fs index 67fe64e..d705f0d 100644 --- a/board-js2x/slof/pci-bridge_1022_7460.fs +++ b/board-js2x/slof/pci-bridge_1022_7460.fs @@ -108,7 +108,7 @@ INCLUDE freq.fs pci-next-mmio @ 100000 #aligned ( base ) - \ Sequence prescribed for resetting the EHCI contoller + \ Sequence prescribed for resetting the EHCI controller \ If Run/Stop bit (ECAP30 bit 0) is 1 \ Set Run/Stop bit to 0 @@ -179,7 +179,7 @@ my-space pci-class-name type cr : pci-bridge-generic-setup-amd8111 ( addr -- ) pci-device-slots >r \ save the slot array on return stack dup pci-common-props \ set the common properties before scanning the bus - s" pci" device-type \ the type is allways "pci" + s" pci" device-type \ the type is always "pci" dup pci-bridge-probe-amd8111 \ find all device connected to it dup assign-all-bridge-bars \ set up all memory access BARs dup pci-set-irq-line \ set the interrupt pin diff --git a/board-js2x/slof/pci-class_03.fs b/board-js2x/slof/pci-class_03.fs index 05c8eb6..86f7265 100644 --- a/board-js2x/slof/pci-class_03.fs +++ b/board-js2x/slof/pci-class_03.fs @@ -44,12 +44,11 @@ my-space a1000000 or encode-int+ \ non-relocatable, aliased I/O space s" reg" property \ store "reg" property -\ check wether we have already found a vga-device (vga-device-node? != 0) and if -\ this device has Expansion ROM +\ check whether we have already found a vga-device (vga-device-node? != 0) +\ and if this device has an expansion ROM vga-device-node? 0= 30 config-l@ 0<> AND IF \ remember this vga device's phandle get-node to vga-device-node? THEN cr - diff --git a/board-js2x/slof/rtas.fs b/board-js2x/slof/rtas.fs index 0a90c29..a4130c6 100644 --- a/board-js2x/slof/rtas.fs +++ b/board-js2x/slof/rtas.fs @@ -202,8 +202,8 @@ blist 50 erase 2 rtas-cb rtas>nargs l! 1 rtas-cb rtas>nret l! rtas-cb rtas>args0 l! - \ special unofficial parameter: if this is set to 1, the rtas function will not check, wether - \ we are on the perm side... this is needed for "update-flash -c" to work... + \ special unofficial parameter: if this is set to 1, the rtas function will not check + \ whether we are on the perm side... this is needed for "update-flash -c" to work... 1 rtas-cb rtas>args1 l! enter-rtas rtas-cb rtas>args2 l@ From patchwork Mon Mar 6 12:49:25 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Huth X-Patchwork-Id: 1752412 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim-atps=neutral Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PVdhC39Ztz23j7 for ; Mon, 6 Mar 2023 23:49:47 +1100 (AEDT) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4PVdhB4pyLz3cC5 for ; Mon, 6 Mar 2023 23:49:46 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim-atps=neutral X-Original-To: slof@lists.ozlabs.org Delivered-To: slof@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=thuth@redhat.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ga1cT/KZ; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4PVdh369L3z3bjd for ; Mon, 6 Mar 2023 23:49:38 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106974; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=LyPyXBHUuzMXGmgfmqxDstodYMofJiLankakgZe5h+k=; b=ga1cT/KZ6qOHLJCgjOlZnHTfPLieMoy4BZ16wQGNeOT9h5qeWBT7OWDAVnZ2Ug6MPWCwPH XBCousAb9UqaFthBFT+7yGgoAYUL6cmDzIeI/NZjzl/lDvojFgf5h1vfFCY1U3Gl6NKnpM Qdzev2pEYitnVKwjV4Yu5zfc74hM/mE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106974; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=LyPyXBHUuzMXGmgfmqxDstodYMofJiLankakgZe5h+k=; b=ga1cT/KZ6qOHLJCgjOlZnHTfPLieMoy4BZ16wQGNeOT9h5qeWBT7OWDAVnZ2Ug6MPWCwPH XBCousAb9UqaFthBFT+7yGgoAYUL6cmDzIeI/NZjzl/lDvojFgf5h1vfFCY1U3Gl6NKnpM Qdzev2pEYitnVKwjV4Yu5zfc74hM/mE= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-140-atndSbu8PtGZKQ4SArxlGw-1; Mon, 06 Mar 2023 07:49:32 -0500 X-MC-Unique: atndSbu8PtGZKQ4SArxlGw-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7EC281C02D35; Mon, 6 Mar 2023 12:49:32 +0000 (UTC) Received: from thuth.com (unknown [10.39.193.101]) by smtp.corp.redhat.com (Postfix) with ESMTP id DFB1F492C3E; Mon, 6 Mar 2023 12:49:31 +0000 (UTC) From: Thomas Huth To: slof@lists.ozlabs.org Date: Mon, 6 Mar 2023 13:49:25 +0100 Message-Id: <20230306124927.410534-3-thuth@redhat.com> In-Reply-To: <20230306124927.410534-1-thuth@redhat.com> References: <20230306124927.410534-1-thuth@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [SLOF] [PATCH 2/4] Fix typos in the llfw folder X-BeenThere: slof@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Patches for https://github.com/aik/SLOF" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "SLOF" Signed-off-by: Thomas Huth --- llfw/boot_abort.S | 2 +- llfw/nvramlog.S | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/llfw/boot_abort.S b/llfw/boot_abort.S index 47a9178..e447696 100644 --- a/llfw/boot_abort.S +++ b/llfw/boot_abort.S @@ -48,7 +48,7 @@ ASM_ENTRY(msg_e_ierror) * Boot Abort Handler * * Input: - * R3 - capability informatin (i/o etc.) + * R3 - capability information (i/o etc.) * R4 - handling suggestion * R5 - error string reference * R6 - error number diff --git a/llfw/nvramlog.S b/llfw/nvramlog.S index 42dd5fc..317ccce 100644 --- a/llfw/nvramlog.S +++ b/llfw/nvramlog.S @@ -42,7 +42,7 @@ * last initialisation. * Flags are not checked! * - * Retrun 0 if no manimulation was found 1 else + * Return 0 if no manipulation was found, otherwise return 1 * * input: * r3 - NVRAM Base Address @@ -91,8 +91,8 @@ ASM_ENTRY(checkLogHeaderData) /***************************************************************************** * checkLogPartition: check Partition Header entries and Checksum * check also the NVRAM-Log-Partition CRC - * if Partition is not ok set the following bits to 1 - * bit 1: if Partiton Header Checksum is corrupt + * if partition is not ok set the following bits to 1 + * bit 1: if partition header checksum is corrupt * bit 2: if CRC is corrupt * bit 3: if Header entries are corrupt * @@ -312,7 +312,7 @@ ENTRY(writeLogByteBE1) * calPartitionHeaderChecksum: calculate the Checksum of the * Partition Header as described in .... * - * input: r3 - NVRAM BASE adresse + * input: r3 - NVRAM BASE address * * output: R3 - the calculated checksum as 8 bit value * R4 - NVRAM log address From patchwork Mon Mar 6 12:49:26 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Huth X-Patchwork-Id: 1752414 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim-atps=neutral Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PVdhL1J49z23j7 for ; Mon, 6 Mar 2023 23:49:54 +1100 (AEDT) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4PVdhK6vWxz3c4x for ; Mon, 6 Mar 2023 23:49:53 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim-atps=neutral X-Original-To: slof@lists.ozlabs.org Delivered-To: slof@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com (client-ip=170.10.129.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=thuth@redhat.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SFH7i9Nj; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4PVdh35pLwz3bjW for ; Mon, 6 Mar 2023 23:49:38 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=3pUGOuseTcDQlgh4U4mUDVyRQGM8/vA3UFeh7qW/yW0=; b=SFH7i9NjoXaUQr9eptqi7QEaN+qZizUcdMAtEHbixtBvXGUd+0YyZ5BqmzU4IuifH87PU2 1FRK3DMvmKhY8ZQvXRvMHzeXCkkeBfZ/cZl57HPgqL08flwF/6Gr78SvLJ2tCfZRsAlnE9 UF64HVg6VB3Domd3cQUp6nsLOBTWWig= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=3pUGOuseTcDQlgh4U4mUDVyRQGM8/vA3UFeh7qW/yW0=; b=SFH7i9NjoXaUQr9eptqi7QEaN+qZizUcdMAtEHbixtBvXGUd+0YyZ5BqmzU4IuifH87PU2 1FRK3DMvmKhY8ZQvXRvMHzeXCkkeBfZ/cZl57HPgqL08flwF/6Gr78SvLJ2tCfZRsAlnE9 UF64HVg6VB3Domd3cQUp6nsLOBTWWig= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-465-gH4jFiHbMvGS-Ya-iB61vQ-1; Mon, 06 Mar 2023 07:49:33 -0500 X-MC-Unique: gH4jFiHbMvGS-Ya-iB61vQ-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 5CAE11C02D31; Mon, 6 Mar 2023 12:49:33 +0000 (UTC) Received: from thuth.com (unknown [10.39.193.101]) by smtp.corp.redhat.com (Postfix) with ESMTP id BFED1492C3E; Mon, 6 Mar 2023 12:49:32 +0000 (UTC) From: Thomas Huth To: slof@lists.ozlabs.org Date: Mon, 6 Mar 2023 13:49:26 +0100 Message-Id: <20230306124927.410534-4-thuth@redhat.com> In-Reply-To: <20230306124927.410534-1-thuth@redhat.com> References: <20230306124927.410534-1-thuth@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [SLOF] [PATCH 3/4] Fix typos in the clients folder X-BeenThere: slof@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Patches for https://github.com/aik/SLOF" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "SLOF" Found with the "codespell" utility Signed-off-by: Thomas Huth --- clients/net-snk/app/biosemu/biosemu.c | 2 +- clients/net-snk/app/biosemu/biosemu.h | 2 +- clients/net-snk/app/biosemu/device.c | 4 ++-- clients/net-snk/app/biosemu/device.h | 2 +- clients/net-snk/app/biosemu/vbe.c | 4 ++-- clients/net-snk/kernel/entry.S | 2 +- clients/net-snk/kernel/init.c | 2 +- clients/net-snk/libc/time/ftime.c | 2 +- 8 files changed, 10 insertions(+), 10 deletions(-) diff --git a/clients/net-snk/app/biosemu/biosemu.c b/clients/net-snk/app/biosemu/biosemu.c index 82a763a..eff1d89 100644 --- a/clients/net-snk/app/biosemu/biosemu.c +++ b/clients/net-snk/app/biosemu/biosemu.c @@ -322,7 +322,7 @@ biosemu(char argc, char **argv) } } #endif - // check wether the stack is "clean" i.e. containing the HLT instruction + // check whether the stack is "clean" i.e. containing the HLT instruction // we pushed before executing, and pointing to the original stack address... // indicating that the initialization probably was successful if ((pop_word() == 0xf4f4) && (M.x86.R_SS == STACK_SEGMENT) diff --git a/clients/net-snk/app/biosemu/biosemu.h b/clients/net-snk/app/biosemu/biosemu.h index 28b7ab8..8524efe 100644 --- a/clients/net-snk/app/biosemu/biosemu.h +++ b/clients/net-snk/app/biosemu/biosemu.h @@ -23,7 +23,7 @@ #define VBE_SEGMENT 0x3000 #define PMM_CONV_SEGMENT 0x4000 // 4000:xxxx is PMM conventional memory area, extended memory area - // will be anything beyound MIN_REQUIRED_MEMORY_SIZE + // will be anything beyond MIN_REQUIRED_MEMORY_SIZE #define PNP_DATA_SEGMENT 0x5000 #define OPTION_ROM_CODE_SEGMENT 0xc000 diff --git a/clients/net-snk/app/biosemu/device.c b/clients/net-snk/app/biosemu/device.c index 514b87e..20e45d8 100644 --- a/clients/net-snk/app/biosemu/device.c +++ b/clients/net-snk/app/biosemu/device.c @@ -28,7 +28,7 @@ typedef struct { } __attribute__ ((__packed__)) assigned_address_t; -// scan all adresses assigned to the device ("assigned-addresses" and "reg") +// scan all addresses assigned to the device ("assigned-addresses" and "reg") // store in translate_address_array for faster translation using dev_translate_address static void dev_get_addr_info(void) @@ -174,7 +174,7 @@ dev_get_device_vendor_id(void) bios_device.pci_device_id, bios_device.pci_vendor_id); } -/* check, wether the device has a valid Expansion ROM, also search the PCI Data Structure and +/* check whether the device has a valid expansion ROM, also search the PCI Data Structure and * any Expansion ROM Header (using dev_scan_exp_header()) for needed information */ uint8_t dev_check_exprom(void) diff --git a/clients/net-snk/app/biosemu/device.h b/clients/net-snk/app/biosemu/device.h index 425dd3c..65c17ae 100644 --- a/clients/net-snk/app/biosemu/device.h +++ b/clients/net-snk/app/biosemu/device.h @@ -141,7 +141,7 @@ in16le(void *addr) return val; } -/* debug function, dumps HID1 and HID4 to detect wether caches are on/off */ +/* debug function, dumps HID1 and HID4 to detect whether caches are on/off */ static inline void dumpHID(void) { diff --git a/clients/net-snk/app/biosemu/vbe.c b/clients/net-snk/app/biosemu/vbe.c index 957a1f2..f85314b 100644 --- a/clients/net-snk/app/biosemu/vbe.c +++ b/clients/net-snk/app/biosemu/vbe.c @@ -154,7 +154,7 @@ vbe_info(vbe_info_t * info) // offset 4: 16bit le containing VbeVersion info->version = in16le(vbe_info_buffer + 4); - // offset 6: 32bit le containg segment:offset of OEM String in virtual Mem. + // offset 6: 32bit le containing segment:offset of OEM String in virtual Mem. info->oem_string_ptr = biosmem + ((in16le(vbe_info_buffer + 8) << 4) + in16le(vbe_info_buffer + 6)); @@ -245,7 +245,7 @@ vbe_get_mode_info(vbe_mode_info_t * mode_info) // offset 27: 8bit le memory model mode_info->memory_model = *(mode_info->mode_info_block + 27); - // offset 40: 32bit le containg offset of frame buffer memory ptr + // offset 40: 32bit le containing offset of frame buffer memory ptr mode_info->framebuffer_address = in32le(mode_info->mode_info_block + 40); diff --git a/clients/net-snk/kernel/entry.S b/clients/net-snk/kernel/entry.S index bf10542..2fb18c0 100644 --- a/clients/net-snk/kernel/entry.S +++ b/clients/net-snk/kernel/entry.S @@ -33,7 +33,7 @@ Function: r5: prom entry Output: -Decription: Main entry point, called from OF +Description: Main entry point, called from OF */ C_ENTRY(_entry) diff --git a/clients/net-snk/kernel/init.c b/clients/net-snk/kernel/init.c index 1376b64..139572b 100644 --- a/clients/net-snk/kernel/init.c +++ b/clients/net-snk/kernel/init.c @@ -52,7 +52,7 @@ int _start_kernel(unsigned long p0, unsigned long p1) for(rc=0; rc X-Patchwork-Id: 1752415 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=bdBhAJgv; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=T5/LX/df; dkim-atps=neutral Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PVdhN63Wtz23j7 for ; Mon, 6 Mar 2023 23:49:56 +1100 (AEDT) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4PVdhN4wBLz3bjv for ; Mon, 6 Mar 2023 23:49:56 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=bdBhAJgv; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=T5/LX/df; dkim-atps=neutral X-Original-To: slof@lists.ozlabs.org Delivered-To: slof@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com (client-ip=170.10.129.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=thuth@redhat.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=bdBhAJgv; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=T5/LX/df; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4PVdh4050hz3bjv for ; Mon, 6 Mar 2023 23:49:38 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hVTc1FyuK63Fukhoob2IuSN5lKd0pIPT+lY+XuG1bMI=; b=bdBhAJgvYfHmq0Ojbz0xOKcohIq8a+OVomkS+uzWnRu8cM1YOiVEWCbM+++NdkMYpiiOWj xDCpuoj+JgSkAk1ji1YR/FucCrammMj5vFaTRdeq69lJbBVv2dZ98E8a2C7LU7tpNWW0JE +81h8v+11Q6VEDryWauVtn22kUKEl8w= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678106976; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hVTc1FyuK63Fukhoob2IuSN5lKd0pIPT+lY+XuG1bMI=; b=T5/LX/dfCVc34hwaKBFYBOAnhjQB3XRbk5tDamGoclkEDdfxC/43RpeaanfLxlliTzXBGI hW/qkxudcX/dpHVuYGQFnr1KhVUjbMr5bIqjjpxwecJvKIPR/f6Hl56or7kzSbBAmKmimc pii9e4bx5i2KBnC07LzXx7rdeG16SeA= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-623-KayG-vPwMCOcBd8Ldvbg_w-1; Mon, 06 Mar 2023 07:49:34 -0500 X-MC-Unique: KayG-vPwMCOcBd8Ldvbg_w-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 38F52182360F; Mon, 6 Mar 2023 12:49:34 +0000 (UTC) Received: from thuth.com (unknown [10.39.193.101]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9DC1E492B00; Mon, 6 Mar 2023 12:49:33 +0000 (UTC) From: Thomas Huth To: slof@lists.ozlabs.org Date: Mon, 6 Mar 2023 13:49:27 +0100 Message-Id: <20230306124927.410534-5-thuth@redhat.com> In-Reply-To: <20230306124927.410534-1-thuth@redhat.com> References: <20230306124927.410534-1-thuth@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [SLOF] [PATCH 4/4] Fix remaining typos in various folders X-BeenThere: slof@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Patches for https://github.com/aik/SLOF" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: slof-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "SLOF" Found with the "codespell" utility Signed-off-by: Thomas Huth --- README | 4 ++-- include/libelf.h | 2 +- other-licence/x86emu/x86emu_changes.diff | 4 ++-- other-licence/x86emu/x86emu_download.sh | 2 +- romfs/tools/crclib.c | 4 ++-- rtas/reloc.S | 2 +- rtas/rtas_call.c | 2 +- rtas/rtas_entry.S | 5 ++--- slof/fs/base.fs | 2 +- tools/create_reloc_table.sh | 2 +- tools/sloffs.c | 2 +- 11 files changed, 15 insertions(+), 16 deletions(-) diff --git a/README b/README index 4cee1b3..01942ae 100644 --- a/README +++ b/README @@ -99,7 +99,7 @@ The SLOF source code is structured into the following directories: - llfw : The Low-Level Firmware - this part is platform-specific firmware that is responsible to boot the system from the reset vector to a state where it is possible to run the Open Firmware Forth engine - (i.e. it sets up the necessary CPU registers, intializes the memory, + (i.e. it sets up the necessary CPU registers, initializes the memory, does some board-specific hardware configuration, etc.) - slof : The code for the Open Firmware environment, including the Forth @@ -232,7 +232,7 @@ To add primitives: * 2x 256 MB, slots 3/4 * 2x 256 MB, slots 1/2 - On a JS20 SLOF wil always report 0.5 GB even if there is much more memory + On a JS20 SLOF will always report 0.5 GB even if there is much more memory available. On a JS21 all memory configurations should work. diff --git a/include/libelf.h b/include/libelf.h index 29a4d04..5be3a32 100644 --- a/include/libelf.h +++ b/include/libelf.h @@ -56,7 +56,7 @@ struct ehdr { #define SHT_SHLIB 10 /* Reserved */ #define SHT_DYNSYM 11 /* Dynamic loader symbol table */ -/* Section attributs (sh_flags) */ +/* Section attributes (sh_flags) */ #define SHF_WRITE 0x1 #define SHF_ALLOC 0x2 #define SHF_EXECINSTR 0x4 diff --git a/other-licence/x86emu/x86emu_changes.diff b/other-licence/x86emu/x86emu_changes.diff index 52b971a..c4aa363 100644 --- a/other-licence/x86emu/x86emu_changes.diff +++ b/other-licence/x86emu/x86emu_changes.diff @@ -816,8 +816,8 @@ diff -u -u -r1.1 -r1.4 #define SYSMODE_PREFIX_REPNE 0x00000100 #define SYSMODE_PREFIX_DATA 0x00000200 #define SYSMODE_PREFIX_ADDR 0x00000400 -+//phueper: for REP(E|NE) Instructions, we need to decide wether it should be using -+//the 32bit ECX register as or the 16bit CX register as count register ++// for REP(E|NE) Instructions, we need to decide whether it should be using ++// the 32bit ECX register or the 16bit CX register as count register +#define SYSMODE_32BIT_REP 0x00000800 #define SYSMODE_INTR_PENDING 0x10000000 #define SYSMODE_EXTRN_INTR 0x20000000 diff --git a/other-licence/x86emu/x86emu_download.sh b/other-licence/x86emu/x86emu_download.sh index d4feff9..0044738 100755 --- a/other-licence/x86emu/x86emu_download.sh +++ b/other-licence/x86emu/x86emu_download.sh @@ -18,7 +18,7 @@ SVN=`which svn` PATCH=`which patch` DIFF_FILE=./x86emu_changes.diff -# check wether svn, patch, ... is available... +# check whether svn, patch, ... is available... if [ ! -x $SVN ]; then echo "subversion executable not found!" diff --git a/romfs/tools/crclib.c b/romfs/tools/crclib.c index b8a66e3..7584a65 100644 --- a/romfs/tools/crclib.c +++ b/romfs/tools/crclib.c @@ -17,7 +17,7 @@ uint64_t ui64Generator1; /** - * calculate standart ethernet 32 bit CRC + * calculate standard ethernet 32 bit CRC * generator polynome is 0x104C11DB7 * this algorithm can be used for encoding and decoding */ @@ -205,7 +205,7 @@ calCRCword(unsigned char *cPtr, uint32_t ui32NoWords, uint64_t AccumCRC) createCRCParameter(&ui64Mask, &uiRegisterLength); if ((ui32NoWords % 2) != 0) { - /* if Data string does not end at word boundery add one byte */ + /* if Data string does not end at word boundary add one byte */ ui32NoWords++; cPtr[ui32NoWords] = 0; } diff --git a/rtas/reloc.S b/rtas/reloc.S index 1b5b59a..8e2e936 100644 --- a/rtas/reloc.S +++ b/rtas/reloc.S @@ -19,7 +19,7 @@ Function: r4: Configuration Output: r3: Entry point for rtas calls -Decription: Called by OpenFirmware to instantiate rtas, needs to copy +Description: Called by OpenFirmware to instantiate rtas, needs to copy itself to destination, also do a relocations. */ diff --git a/rtas/rtas_call.c b/rtas/rtas_call.c index 8c7532c..61671d4 100644 --- a/rtas/rtas_call.c +++ b/rtas/rtas_call.c @@ -38,7 +38,7 @@ Function: rtas_call rtas_args: pointer to RTAS arguments structure Output: -Decription: Handle RTAS call. This C function is called +Description: Handle RTAS call. This C function is called from the asm function rtas_entry. */ diff --git a/rtas/rtas_entry.S b/rtas/rtas_entry.S index 424137b..50411dc 100644 --- a/rtas/rtas_entry.S +++ b/rtas/rtas_entry.S @@ -20,9 +20,8 @@ Function: r4: base address Output: -Decription: Main entry point, called from OS. Second parameter is not - used. - +Description: + Main entry point, called from OS. Second parameter is not used. */ .globl rtas_entry rtas_entry: diff --git a/slof/fs/base.fs b/slof/fs/base.fs index d7f4e37..13a8aa2 100644 --- a/slof/fs/base.fs +++ b/slof/fs/base.fs @@ -488,7 +488,7 @@ constant ; \ peek/poke minimal implementation, just to support FCode drivers -\ Any implmentation with full error detection will be platform specific +\ Any implementation with full error detection will be platform specific : cpeek ( addr -- false | byte true ) c@ true ; : cpoke ( byte addr -- success? ) c! true ; : wpeek ( addr -- false | word true ) w@ true ; diff --git a/tools/create_reloc_table.sh b/tools/create_reloc_table.sh index d4790dd..77dfb87 100755 --- a/tools/create_reloc_table.sh +++ b/tools/create_reloc_table.sh @@ -37,7 +37,7 @@ while [ $# -gt 0 ] ; do done if [ -z $LDSFILE ]; then - echo "Please specifiy an lds file with the --lds option" + echo "Please specify an lds file with the --lds option" exit 42 fi diff --git a/tools/sloffs.c b/tools/sloffs.c index 264b0ea..f4a5fb8 100644 --- a/tools/sloffs.c +++ b/tools/sloffs.c @@ -248,7 +248,7 @@ update_modification_time(struct stH *header) date = cpu_to_be64(strtoll(dastr, NULL, 16)); /* this does not match the definition from - * struct stH, but we immitate the bug from + * struct stH, but we imitate the bug from * flash image creation in create_crc.c. * The date is in mdate and time in padding2. */ memcpy(&(header->mdate), &date, 8);