Skip to content

Commit

Permalink
kernel: documentation nits
Browse files Browse the repository at this point in the history
Co-authored-by: Brad Campbell <[email protected]>
  • Loading branch information
alevy and bradjc authored Nov 14, 2024
1 parent 08caaa5 commit c6156c8
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 3 deletions.
3 changes: 1 addition & 2 deletions kernel/src/syscall.rs
Original file line number Diff line number Diff line change
Expand Up @@ -377,8 +377,7 @@ impl Syscall {
/// and pointers. It is constructed by the scheduler and passed down to the
/// architecture to be encoded into registers. Architectures may use the various
/// helper functions defined in
/// [`utilities::arch_helpers`](crate::utilities::arch_helpers), but are free to
/// define their own ABI and encoding.
/// [`utilities::arch_helpers`](crate::utilities::arch_helpers).
///
/// Capsules do not use this struct. Capsules use higher level Rust types (e.g.
/// [`ReadWriteProcessBuffer`](crate::processbuffer::ReadWriteProcessBuffer) and
Expand Down
2 changes: 1 addition & 1 deletion kernel/src/utilities/capability_ptr.rs
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ impl CapabilityPtr {
/// ## Safety
///
/// Constructing a [`CapabilityPtr`] with metadata may convey authority to
/// dereference this pointer, such as on userspace. When these pointers
/// dereference this pointer, such as in userspace. When these pointers
/// serve as the only memory isolation primitive in the system, this method
/// can thus break Tock's isolation model. As semi-trusted kernel code can
/// name this type and method, it is thus marked as `unsafe`.
Expand Down

0 comments on commit c6156c8

Please sign in to comment.