diff --git a/bl1/bl1_main.c b/bl1/bl1_main.c index 64b363c5f0be8b470a713281d3319618d4d14014..047cd6fb86da8e46c91afd669e62b8b9c9c7ffc0 100644 --- a/bl1/bl1_main.c +++ b/bl1/bl1_main.c @@ -74,8 +74,8 @@ void bl1_calc_bl2_mem_layout(const meminfo_t *bl1_mem_layout, * populates a new memory layout for BL2 that ensures that BL1's data sections * resident in secure RAM are not visible to BL2. ******************************************************************************/ -void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout, - meminfo_t *bl2_mem_layout) +void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout, + struct meminfo *bl2_mem_layout) { bl1_calc_bl2_mem_layout(bl1_mem_layout, bl2_mem_layout); } diff --git a/include/plat/arm/common/plat_arm.h b/include/plat/arm/common/plat_arm.h index 33f2c7dbef447a1bcb82511bbe94de47bae24fb2..2d406308ac56a0c9802507e9f3dd037826d11702 100644 --- a/include/plat/arm/common/plat_arm.h +++ b/include/plat/arm/common/plat_arm.h @@ -86,7 +86,7 @@ void arm_setup_page_tables(uintptr_t total_base, * Use this macro to instantiate lock before it is used in below * arm_lock_xxx() macros */ -#define ARM_INSTANTIATE_LOCK DEFINE_BAKERY_LOCK(arm_lock) +#define ARM_INSTANTIATE_LOCK static DEFINE_BAKERY_LOCK(arm_lock) #define ARM_LOCK_GET_INSTANCE (&arm_lock) /* * These are wrapper macros to the Coherent Memory Bakery Lock API. diff --git a/plat/arm/board/fvp/fvp_bl2u_setup.c b/plat/arm/board/fvp/fvp_bl2u_setup.c index 361e84de2ac2b99f15720012c95ceca2011b0620..b9ab3f36e8701b830825ca82ae4d1e04bc6563c1 100644 --- a/plat/arm/board/fvp/fvp_bl2u_setup.c +++ b/plat/arm/board/fvp/fvp_bl2u_setup.c @@ -9,7 +9,7 @@ #include "fvp_def.h" #include "fvp_private.h" -void bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info) +void bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info) { arm_bl2u_early_platform_setup(mem_layout, plat_info); diff --git a/plat/arm/common/arm_bl1_setup.c b/plat/arm/common/arm_bl1_setup.c index d141f647ec02d977355fae966e06fc4228e0d96a..1c900b728c84f916e2be1fe8d1014dcf05cad353 100644 --- a/plat/arm/common/arm_bl1_setup.c +++ b/plat/arm/common/arm_bl1_setup.c @@ -27,7 +27,7 @@ /* Data structure which holds the extents of the trusted SRAM for BL1*/ static meminfo_t bl1_tzram_layout; -meminfo_t *bl1_plat_sec_mem_layout(void) +struct meminfo *bl1_plat_sec_mem_layout(void) { return &bl1_tzram_layout; } diff --git a/plat/arm/common/arm_bl2_setup.c b/plat/arm/common/arm_bl2_setup.c index 3aa99f80562aa8affd90105842a8ae2f2fe2deb4..33c2fe85ef97acdc2bcec8861365b613da5946ce 100644 --- a/plat/arm/common/arm_bl2_setup.c +++ b/plat/arm/common/arm_bl2_setup.c @@ -172,7 +172,8 @@ struct entry_point_info *bl2_plat_get_bl31_ep_info(void) * in x0. This memory layout is sitting at the base of the free trusted SRAM. * Copy it to a safe location before its reclaimed by later BL2 functionality. ******************************************************************************/ -void arm_bl2_early_platform_setup(uintptr_t tb_fw_config, meminfo_t *mem_layout) +void arm_bl2_early_platform_setup(uintptr_t tb_fw_config, + struct meminfo *mem_layout) { /* Initialize the console to provide early debug support */ arm_console_boot_init(); diff --git a/plat/arm/common/arm_bl2u_setup.c b/plat/arm/common/arm_bl2u_setup.c index cd691e5c358e3bbaa0d600d78986fcde32585315..dce00e5bd4fb4601817dfd1f7a1d1cc6858f4630 100644 --- a/plat/arm/common/arm_bl2u_setup.c +++ b/plat/arm/common/arm_bl2u_setup.c @@ -32,7 +32,7 @@ void bl2u_platform_setup(void) arm_bl2u_platform_setup(); } -void arm_bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info) +void arm_bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info) { /* Initialize the console to provide early debug support */ arm_console_boot_init(); @@ -46,7 +46,7 @@ void arm_bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info) * In case of ARM FVP platforms x1 is not used. * In both cases, x0 contains the extents of the memory available to BL2U ******************************************************************************/ -void bl2u_early_platform_setup(meminfo_t *mem_layout, void *plat_info) +void bl2u_early_platform_setup(struct meminfo *mem_layout, void *plat_info) { arm_bl2u_early_platform_setup(mem_layout, plat_info); } diff --git a/plat/arm/common/arm_bl31_setup.c b/plat/arm/common/arm_bl31_setup.c index 6346f0fffd2bf440f8804ec1c73f121df8788210..b1f95c9576c7b548f23f5895b5d379a1790ecc7f 100644 --- a/plat/arm/common/arm_bl31_setup.c +++ b/plat/arm/common/arm_bl31_setup.c @@ -44,7 +44,7 @@ CASSERT(BL31_BASE >= ARM_TB_FW_CONFIG_LIMIT, assert_bl31_base_overflows); * while BL32 corresponds to the secure image type. A NULL pointer is returned * if the image does not exist. ******************************************************************************/ -entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) +struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type) { entry_point_info_t *next_image_info; diff --git a/plat/arm/common/arm_common.c b/plat/arm/common/arm_common.c index 32fd9ee68c95a33bac88cd5d222fb774131dddf3..270abb2bda197fd4787e6183243a7e3c87d64c00 100644 --- a/plat/arm/common/arm_common.c +++ b/plat/arm/common/arm_common.c @@ -14,8 +14,6 @@ #include <platform.h> #include <secure_partition.h> -extern const mmap_region_t plat_arm_mmap[]; - /* Weak definitions may be overridden in specific ARM standard platform */ #pragma weak plat_get_ns_image_entrypoint #pragma weak plat_arm_get_mmap diff --git a/plat/arm/common/arm_image_load.c b/plat/arm/common/arm_image_load.c index 916fa8dc89014e94ed7dd4ea6bc19b513b0f375c..4f86efdf9254ab80c49ad17f2f7a2e339756baf4 100644 --- a/plat/arm/common/arm_image_load.c +++ b/plat/arm/common/arm_image_load.c @@ -28,7 +28,7 @@ void plat_flush_next_bl_params(void) /******************************************************************************* * This function returns the list of loadable images. ******************************************************************************/ -bl_load_info_t *plat_get_bl_image_load_info(void) +struct bl_load_info *plat_get_bl_image_load_info(void) { return get_bl_load_info_from_mem_params_desc(); } @@ -36,7 +36,7 @@ bl_load_info_t *plat_get_bl_image_load_info(void) /******************************************************************************* * This function returns the list of executable images. ******************************************************************************/ -bl_params_t *plat_get_next_bl_params(void) +struct bl_params *plat_get_next_bl_params(void) { bl_params_t *next_bl_params = get_next_bl_params_from_mem_params_desc(); diff --git a/plat/arm/common/arm_pm.c b/plat/arm/common/arm_pm.c index 4632099e7f49611bff6dea3fbdedc72866678770..4fdb10a5090d01e913ecd15f4c2fb7068501a243 100644 --- a/plat/arm/common/arm_pm.c +++ b/plat/arm/common/arm_pm.c @@ -17,9 +17,6 @@ /* Allow ARM Standard platforms to override this function */ #pragma weak plat_arm_psci_override_pm_ops -/* Standard ARM platforms are expected to export plat_arm_psci_pm_ops */ -extern plat_psci_ops_t plat_arm_psci_pm_ops; - #if ARM_RECOM_STATE_ID_ENC extern unsigned int arm_pm_idle_states[]; #endif /* __ARM_RECOM_STATE_ID_ENC__ */ diff --git a/plat/common/plat_bl1_common.c b/plat/common/plat_bl1_common.c index c5bbe74381d83e0bc0e7453f54d57f66e45629c8..6777979952d8a63980b4df8897434c3768ecfad4 100644 --- a/plat/common/plat_bl1_common.c +++ b/plat/common/plat_bl1_common.c @@ -34,7 +34,7 @@ unsigned int bl1_plat_get_next_image_id(void) } void bl1_plat_set_ep_info(unsigned int image_id, - entry_point_info_t *ep_info) + struct entry_point_info *ep_info) { } @@ -48,7 +48,7 @@ int bl1_plat_handle_pre_image_load(unsigned int image_id) * Following is the default definition that always * returns BL2 image details. */ -image_desc_t *bl1_plat_get_image_desc(unsigned int image_id) +struct image_desc *bl1_plat_get_image_desc(unsigned int image_id) { static image_desc_t bl2_img_desc = BL2_IMAGE_DESC; return &bl2_img_desc; diff --git a/services/spd/opteed/opteed_main.c b/services/spd/opteed/opteed_main.c index 01ec2a26d10ba180497e02c0af869c2301acd311..59d6ed29411fcc530a16bca2738969042e79a77e 100644 --- a/services/spd/opteed/opteed_main.c +++ b/services/spd/opteed/opteed_main.c @@ -34,7 +34,7 @@ * Address of the entrypoint vector table in OPTEE. It is * initialised once on the primary core after a cold boot. ******************************************************************************/ -optee_vectors_t *optee_vector_table; +struct optee_vectors *optee_vector_table; /******************************************************************************* * Array to keep track of per-cpu OPTEE state diff --git a/services/spd/opteed/opteed_private.h b/services/spd/opteed/opteed_private.h index b77b6d342174c77f2167195fa6fe55552d7cdfa1..a5f0a4168ebbda734d4c97a27ee7b5ab594f6d5e 100644 --- a/services/spd/opteed/opteed_private.h +++ b/services/spd/opteed/opteed_private.h @@ -144,7 +144,7 @@ uint64_t opteed_enter_sp(uint64_t *c_rt_ctx); void __dead2 opteed_exit_sp(uint64_t c_rt_ctx, uint64_t ret); uint64_t opteed_synchronous_sp_entry(optee_context_t *optee_ctx); void __dead2 opteed_synchronous_sp_exit(optee_context_t *optee_ctx, uint64_t ret); -void opteed_init_optee_ep_state(struct entry_point_info *optee_ep, +void opteed_init_optee_ep_state(struct entry_point_info *optee_entry_point, uint32_t rw, uint64_t pc, uint64_t pageable_part,