bl: security_state should be of type unsigned int
authorEtienne Carriere <etienne.carriere@st.com>
Wed, 7 Jun 2017 14:45:42 +0000 (16:45 +0200)
committerEtienne Carriere <etienne.carriere@st.com>
Fri, 23 Jun 2017 07:26:44 +0000 (09:26 +0200)
security_state is either 0 or 1. Prevent sign conversion potential
error (setting -Werror=sign-conversion results in a build error).

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
bl1/aarch32/bl1_context_mgmt.c
bl32/sp_min/sp_min_main.c
include/lib/aarch32/smcc_helpers.h

index cbf5cb698d02605814fbf782eae64d6dbbf42b46..10c90f9c34f60d299a1c0770862e5d76e703ebcb 100644 (file)
@@ -26,13 +26,13 @@ static void *bl1_next_cpu_context_ptr;
 static void *bl1_next_smc_context_ptr;
 
 /* Following functions are used for SMC context handling */
-void *smc_get_ctx(int security_state)
+void *smc_get_ctx(unsigned int security_state)
 {
        assert(sec_state_is_valid(security_state));
        return &bl1_smc_context[security_state];
 }
 
-void smc_set_next_ctx(int security_state)
+void smc_set_next_ctx(unsigned int security_state)
 {
        assert(sec_state_is_valid(security_state));
        bl1_next_smc_context_ptr = &bl1_smc_context[security_state];
index 45ad03f994da2b7547e16b1dd464967b3c7a8da2..ed8c3e68cd0454ed984a0997156da87117602bcd 100644 (file)
@@ -33,13 +33,13 @@ static smc_ctx_t sp_min_smc_context[PLATFORM_CORE_COUNT];
 /******************************************************************************
  * Define the smcc helper library API's
  *****************************************************************************/
-void *smc_get_ctx(int security_state)
+void *smc_get_ctx(unsigned int security_state)
 {
        assert(security_state == NON_SECURE);
        return &sp_min_smc_context[plat_my_core_pos()];
 }
 
-void smc_set_next_ctx(int security_state)
+void smc_set_next_ctx(unsigned int security_state)
 {
        assert(security_state == NON_SECURE);
        /* SP_MIN stores only non secure smc context. Nothing to do here */
index 5fb5a964872ecb9bd27c6eae9e8a2eaf61b00e3b..1bc84381098ed493d8874d627dbfd69418dd8630 100644 (file)
@@ -144,10 +144,10 @@ CASSERT(SMC_CTX_SIZE == sizeof(smc_ctx_t), assert_smc_ctx_size_mismatch);
  */
 
 /* Get the pointer to `smc_ctx_t` corresponding to the security state. */
-void *smc_get_ctx(int security_state);
+void *smc_get_ctx(unsigned int security_state);
 
 /* Set the next `smc_ctx_t` corresponding to the security state. */
-void smc_set_next_ctx(int security_state);
+void smc_set_next_ctx(unsigned int security_state);
 
 /* Get the pointer to next `smc_ctx_t` already set by `smc_set_next_ctx()`. */
 void *smc_get_next_ctx(void);