arm-trusted-firmware/plat/fvp
Sandrine Bailleux ba592e2802 Fix violations to the coding style
All coding style violations have been fixed in a previous patch and
since then, each individual patch has been checked in this regard.
However, the latest version of the checkpatch.pl script from the Linux
kernel is more advanced and it is able to flag new errors in the
Trusted Firmware codebase. This patch fixes them.

Change-Id: I1f332f2440984be85d36b231bb83260368987077
2015-03-05 12:02:07 +00:00
..
aarch64 Minimize MAX_MMAP_REGIONS for each BL stage 2015-02-12 12:27:37 +00:00
drivers/pwrc Move bakery algorithm implementation out of coherent memory 2015-01-22 10:57:44 +00:00
include Merge pull request #259 from soby-mathew/sm/plat_max_afflvl 2015-02-25 09:54:41 -08:00
tsp Remove coherent memory from the BL memory maps 2015-01-22 10:57:44 +00:00
bl1_fvp_setup.c Remove coherent memory from the BL memory maps 2015-01-22 10:57:44 +00:00
bl2_fvp_setup.c FVP: initialize IO framework in bl2_early_platform_setup() 2015-01-28 18:27:54 +00:00
bl31_fvp_setup.c Remove coherent memory from the BL memory maps 2015-01-22 10:57:44 +00:00
fvp_def.h Minimize MAX_MMAP_REGIONS for each BL stage 2015-02-12 12:27:37 +00:00
fvp_io_storage.c TBB: authenticate BL3-x images and certificates 2015-01-28 18:27:54 +00:00
fvp_pm.c Fix violations to the coding style 2015-03-05 12:02:07 +00:00
fvp_private.h Remove coherent memory from the BL memory maps 2015-01-22 10:57:44 +00:00
fvp_security.c FVP: map non-secure DRAM1 in the MMU 2015-01-21 09:44:40 +00:00
fvp_topology.c Export maximum affinity using PLATFORM_MAX_AFFLVL macro 2015-02-12 15:12:52 +00:00
fvp_trusted_boot.c TBB: add a platform specific function to validate the ROTPK 2015-01-28 18:26:59 +00:00
platform.mk TBB: add a platform specific function to validate the ROTPK 2015-01-28 18:26:59 +00:00