mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 17:44:19 +00:00
Fix some violations to MISRA rule 8.3
Wherever we use 'struct foo' and 'foo_t' interchangeably in a function's declaration and definition, use 'struct foo' consistently for both, as per the TF-A coding guidelines [1]. [1] https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Coding-Guidelines#avoid-anonymous-typedefs-of-structsenums-in-header-files Change-Id: I7998eb24a26746e87e9b6425529926406745b721 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
This commit is contained in:
parent
df4c512d47
commit
6c77e74915
10 changed files with 15 additions and 14 deletions
|
@ -74,8 +74,8 @@ void bl1_calc_bl2_mem_layout(const meminfo_t *bl1_mem_layout,
|
|||
* populates a new memory layout for BL2 that ensures that BL1's data sections
|
||||
* resident in secure RAM are not visible to BL2.
|
||||
******************************************************************************/
|
||||
void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout,
|
||||
meminfo_t *bl2_mem_layout)
|
||||
void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout,
|
||||
struct meminfo *bl2_mem_layout)
|
||||
{
|
||||
bl1_calc_bl2_mem_layout(bl1_mem_layout, bl2_mem_layout);
|
||||
}
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
#include "fvp_def.h"
|
||||
#include "fvp_private.h"
|
||||
|
||||
void bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info)
|
||||
void bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info)
|
||||
{
|
||||
arm_bl2u_early_platform_setup(mem_layout, plat_info);
|
||||
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
/* Data structure which holds the extents of the trusted SRAM for BL1*/
|
||||
static meminfo_t bl1_tzram_layout;
|
||||
|
||||
meminfo_t *bl1_plat_sec_mem_layout(void)
|
||||
struct meminfo *bl1_plat_sec_mem_layout(void)
|
||||
{
|
||||
return &bl1_tzram_layout;
|
||||
}
|
||||
|
|
|
@ -172,7 +172,8 @@ struct entry_point_info *bl2_plat_get_bl31_ep_info(void)
|
|||
* in x0. This memory layout is sitting at the base of the free trusted SRAM.
|
||||
* Copy it to a safe location before its reclaimed by later BL2 functionality.
|
||||
******************************************************************************/
|
||||
void arm_bl2_early_platform_setup(uintptr_t tb_fw_config, meminfo_t *mem_layout)
|
||||
void arm_bl2_early_platform_setup(uintptr_t tb_fw_config,
|
||||
struct meminfo *mem_layout)
|
||||
{
|
||||
/* Initialize the console to provide early debug support */
|
||||
arm_console_boot_init();
|
||||
|
|
|
@ -32,7 +32,7 @@ void bl2u_platform_setup(void)
|
|||
arm_bl2u_platform_setup();
|
||||
}
|
||||
|
||||
void arm_bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info)
|
||||
void arm_bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info)
|
||||
{
|
||||
/* Initialize the console to provide early debug support */
|
||||
arm_console_boot_init();
|
||||
|
@ -46,7 +46,7 @@ void arm_bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info)
|
|||
* In case of ARM FVP platforms x1 is not used.
|
||||
* In both cases, x0 contains the extents of the memory available to BL2U
|
||||
******************************************************************************/
|
||||
void bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info)
|
||||
void bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info)
|
||||
{
|
||||
arm_bl2u_early_platform_setup(mem_layout, plat_info);
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@ CASSERT(BL31_BASE >= ARM_TB_FW_CONFIG_LIMIT, assert_bl31_base_overflows);
|
|||
* while BL32 corresponds to the secure image type. A NULL pointer is returned
|
||||
* if the image does not exist.
|
||||
******************************************************************************/
|
||||
entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
|
||||
struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type)
|
||||
{
|
||||
entry_point_info_t *next_image_info;
|
||||
|
||||
|
|
|
@ -28,7 +28,7 @@ void plat_flush_next_bl_params(void)
|
|||
/*******************************************************************************
|
||||
* This function returns the list of loadable images.
|
||||
******************************************************************************/
|
||||
bl_load_info_t *plat_get_bl_image_load_info(void)
|
||||
struct bl_load_info *plat_get_bl_image_load_info(void)
|
||||
{
|
||||
return get_bl_load_info_from_mem_params_desc();
|
||||
}
|
||||
|
@ -36,7 +36,7 @@ bl_load_info_t *plat_get_bl_image_load_info(void)
|
|||
/*******************************************************************************
|
||||
* This function returns the list of executable images.
|
||||
******************************************************************************/
|
||||
bl_params_t *plat_get_next_bl_params(void)
|
||||
struct bl_params *plat_get_next_bl_params(void)
|
||||
{
|
||||
bl_params_t *next_bl_params = get_next_bl_params_from_mem_params_desc();
|
||||
|
||||
|
|
|
@ -34,7 +34,7 @@ unsigned int bl1_plat_get_next_image_id(void)
|
|||
}
|
||||
|
||||
void bl1_plat_set_ep_info(unsigned int image_id,
|
||||
entry_point_info_t *ep_info)
|
||||
struct entry_point_info *ep_info)
|
||||
{
|
||||
|
||||
}
|
||||
|
@ -48,7 +48,7 @@ int bl1_plat_handle_pre_image_load(unsigned int image_id)
|
|||
* Following is the default definition that always
|
||||
* returns BL2 image details.
|
||||
*/
|
||||
image_desc_t *bl1_plat_get_image_desc(unsigned int image_id)
|
||||
struct image_desc *bl1_plat_get_image_desc(unsigned int image_id)
|
||||
{
|
||||
static image_desc_t bl2_img_desc = BL2_IMAGE_DESC;
|
||||
return &bl2_img_desc;
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
* Address of the entrypoint vector table in OPTEE. It is
|
||||
* initialised once on the primary core after a cold boot.
|
||||
******************************************************************************/
|
||||
optee_vectors_t *optee_vector_table;
|
||||
struct optee_vectors *optee_vector_table;
|
||||
|
||||
/*******************************************************************************
|
||||
* Array to keep track of per-cpu OPTEE state
|
||||
|
|
|
@ -144,7 +144,7 @@ uint64_t opteed_enter_sp(uint64_t *c_rt_ctx);
|
|||
void __dead2 opteed_exit_sp(uint64_t c_rt_ctx, uint64_t ret);
|
||||
uint64_t opteed_synchronous_sp_entry(optee_context_t *optee_ctx);
|
||||
void __dead2 opteed_synchronous_sp_exit(optee_context_t *optee_ctx, uint64_t ret);
|
||||
void opteed_init_optee_ep_state(struct entry_point_info *optee_ep,
|
||||
void opteed_init_optee_ep_state(struct entry_point_info *optee_entry_point,
|
||||
uint32_t rw,
|
||||
uint64_t pc,
|
||||
uint64_t pageable_part,
|
||||
|
|
Loading…
Add table
Reference in a new issue