aboutsummaryrefslogtreecommitdiffstats
path: root/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch')
-rw-r--r--meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch65
1 files changed, 65 insertions, 0 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch
new file mode 100644
index 00000000..320b7709
--- /dev/null
+++ b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch
@@ -0,0 +1,65 @@
+From 8ac2dab92c8b700b785d14cbfd95dfb811894b9f Mon Sep 17 00:00:00 2001
+From: Brijesh Singh <brijesh.singh@amd.com>
+Date: Thu, 15 Feb 2018 13:34:44 -0600
+Subject: [PATCH 35/95] crypto: ccp - Fix sparse, use plain integer as NULL
+ pointer
+
+Fix sparse warning: Using plain integer as NULL pointer. Replaces
+assignment of 0 to pointer with NULL assignment.
+
+Fixes: 200664d5237f (Add Secure Encrypted Virtualization ...)
+Cc: Borislav Petkov <bp@suse.de>
+Cc: Herbert Xu <herbert@gondor.apana.org.au>
+Cc: Gary Hook <gary.hook@amd.com>
+Cc: Tom Lendacky <thomas.lendacky@amd.com>
+Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Acked-by: Gary R Hook <gary.hook@amd.com>
+Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
+Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com>
+---
+ drivers/crypto/ccp/psp-dev.c | 8 ++++----
+ 1 file changed, 4 insertions(+), 4 deletions(-)
+
+diff --git a/drivers/crypto/ccp/psp-dev.c b/drivers/crypto/ccp/psp-dev.c
+index fcfa5b1..b3afb6c 100644
+--- a/drivers/crypto/ccp/psp-dev.c
++++ b/drivers/crypto/ccp/psp-dev.c
+@@ -211,7 +211,7 @@ static int __sev_platform_shutdown_locked(int *error)
+ {
+ int ret;
+
+- ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, 0, error);
++ ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, NULL, error);
+ if (ret)
+ return ret;
+
+@@ -271,7 +271,7 @@ static int sev_ioctl_do_reset(struct sev_issue_cmd *argp)
+ return rc;
+ }
+
+- return __sev_do_cmd_locked(SEV_CMD_FACTORY_RESET, 0, &argp->error);
++ return __sev_do_cmd_locked(SEV_CMD_FACTORY_RESET, NULL, &argp->error);
+ }
+
+ static int sev_ioctl_do_platform_status(struct sev_issue_cmd *argp)
+@@ -299,7 +299,7 @@ static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp)
+ return rc;
+ }
+
+- return __sev_do_cmd_locked(cmd, 0, &argp->error);
++ return __sev_do_cmd_locked(cmd, NULL, &argp->error);
+ }
+
+ static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp)
+@@ -624,7 +624,7 @@ EXPORT_SYMBOL_GPL(sev_guest_decommission);
+
+ int sev_guest_df_flush(int *error)
+ {
+- return sev_do_cmd(SEV_CMD_DF_FLUSH, 0, error);
++ return sev_do_cmd(SEV_CMD_DF_FLUSH, NULL, error);
+ }
+ EXPORT_SYMBOL_GPL(sev_guest_df_flush);
+
+--
+2.7.4
+