Skip to content

Commit

Permalink
interpunction
Browse files Browse the repository at this point in the history
Signed-off-by: Wojciech Ozga <[email protected]>
  • Loading branch information
wojciechozga committed Aug 5, 2024
1 parent 75bc691 commit aa2c534
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 10 deletions.
2 changes: 1 addition & 1 deletion src/refarch.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -352,7 +352,7 @@ confidential supervisor domain for the hart via M-mode `mttp` CSR (See
Supervisor Domains specification <<R20>> for CSR definition)
* Locate the per-hart THCS (located within TSM-driver memory data region)
* Save operating VMM csr context into the THCS.hssa (Hart Supervisor State
Area) fields : sstatus, stvec, scounteren, sscratch, satp (and other x
Area) fields: sstatus, stvec, scounteren, sscratch, satp (and other x
state other than a0, a1 - see <<appendix_a>>). Note that
any v/f register state must be saved by the caller.
* Save THCS.hssa.pc as mepc+4 to ensure that a subsequent resumption
Expand Down
8 changes: 4 additions & 4 deletions src/sbi_cove.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Supervisor Domain Identifier for the callee. `a6` bits [16..25] are reserved for
future use. `a6` bits [0..15] are used by the host to specify the CoVE functions
as allocated in <<table_cove_fid_namespaces>>.

[caption="CoVE FID : "]
[caption="CoVE FID: "]
[title="Format of register a6 for CoVE SBI Extension"]
[id=cove-fid]
[wavedrom, ,svg]
Expand Down Expand Up @@ -576,7 +576,7 @@ end group
deactivate TVM
Host -> TSM : Destroy TVM
Host -> TSM: Destroy TVM
TSM -> TSM: verifies all vcpus exited. Updates TVM state as "TVM_DESTROYED"
TSM -> TSM: clear ownership of confidential memory assigned to TVM
TSM --> Host: Return from vcpu_run to Host
Expand Down Expand Up @@ -806,7 +806,7 @@ struct tsm_info {
/*
* The number of 4KB pages which must be donated to the TSM for storing TVM
* state in sbi_covh_create_tvm_vcpu(). `0` if the TSM does not support the
* dynamic page conversion capability.
* dynamic memory allocation capability.
*/
unsigned long tvm_state_pages;
/*
Expand All @@ -815,7 +815,7 @@ struct tsm_info {
unsigned long tvm_max_vcpus;
/*
* The number of 4KB pages which must be donated to the TSM when creating
* a new vCPU. `0` if the TSM does not support the dynamic page conversion
* a new vCPU. `0` if the TSM does not support the dynamic memory allocation
* capability.
*/
unsigned long tvm_vcpu_state_pages;
Expand Down
10 changes: 5 additions & 5 deletions src/swlifecycle.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -347,19 +347,19 @@ memory pages will fault (including implicit accesses).
....
@startuml
VMM -> TSM : sbi_covh_convert_pages[_range](TVM, GPA)
VMM -> TSM: sbi_covh_convert_pages[_range](TVM, GPA)
activate VMM
activate TSM
TSM -> VMM :
TSM -> VMM:
deactivate VMM
deactivate TSM
activate TVM
VMM -> TSM : sbi_covh_global_fence(TVM)
VMM -> TSM: sbi_covh_global_fence(TVM)
activate VMM
activate TSM
TSM -> VMM :
TSM -> VMM:
deactivate VMM
deactivate TSM
Expand All @@ -373,7 +373,7 @@ TSM -> VMM: ecall/mret (scause = interrupt)
activate VMM
deactivate TSM
VMM -> TSM : sbi_covh_local_fence(TVM, virtual_hart, hart)
VMM -> TSM: sbi_covh_local_fence(TVM, virtual_hart, hart)
deactivate VMM
activate TSM
note right
Expand Down

0 comments on commit aa2c534

Please sign in to comment.