diff options
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch')
-rw-r--r-- | meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch new file mode 100644 index 00000000..320b7709 --- /dev/null +++ b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0035-crypto-ccp-Fix-sparse-use-plain-integer-as-NULL-poin.patch @@ -0,0 +1,65 @@ +From 8ac2dab92c8b700b785d14cbfd95dfb811894b9f Mon Sep 17 00:00:00 2001 +From: Brijesh Singh <brijesh.singh@amd.com> +Date: Thu, 15 Feb 2018 13:34:44 -0600 +Subject: [PATCH 35/95] crypto: ccp - Fix sparse, use plain integer as NULL + pointer + +Fix sparse warning: Using plain integer as NULL pointer. Replaces +assignment of 0 to pointer with NULL assignment. + +Fixes: 200664d5237f (Add Secure Encrypted Virtualization ...) +Cc: Borislav Petkov <bp@suse.de> +Cc: Herbert Xu <herbert@gondor.apana.org.au> +Cc: Gary Hook <gary.hook@amd.com> +Cc: Tom Lendacky <thomas.lendacky@amd.com> +Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> +Acked-by: Gary R Hook <gary.hook@amd.com> +Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> +Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com> +--- + drivers/crypto/ccp/psp-dev.c | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/drivers/crypto/ccp/psp-dev.c b/drivers/crypto/ccp/psp-dev.c +index fcfa5b1..b3afb6c 100644 +--- a/drivers/crypto/ccp/psp-dev.c ++++ b/drivers/crypto/ccp/psp-dev.c +@@ -211,7 +211,7 @@ static int __sev_platform_shutdown_locked(int *error) + { + int ret; + +- ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, 0, error); ++ ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, NULL, error); + if (ret) + return ret; + +@@ -271,7 +271,7 @@ static int sev_ioctl_do_reset(struct sev_issue_cmd *argp) + return rc; + } + +- return __sev_do_cmd_locked(SEV_CMD_FACTORY_RESET, 0, &argp->error); ++ return __sev_do_cmd_locked(SEV_CMD_FACTORY_RESET, NULL, &argp->error); + } + + static int sev_ioctl_do_platform_status(struct sev_issue_cmd *argp) +@@ -299,7 +299,7 @@ static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp) + return rc; + } + +- return __sev_do_cmd_locked(cmd, 0, &argp->error); ++ return __sev_do_cmd_locked(cmd, NULL, &argp->error); + } + + static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp) +@@ -624,7 +624,7 @@ EXPORT_SYMBOL_GPL(sev_guest_decommission); + + int sev_guest_df_flush(int *error) + { +- return sev_do_cmd(SEV_CMD_DF_FLUSH, 0, error); ++ return sev_do_cmd(SEV_CMD_DF_FLUSH, NULL, error); + } + EXPORT_SYMBOL_GPL(sev_guest_df_flush); + +-- +2.7.4 + |