MISRA fix: Use boolean essential type

Change the return type of "arm_io_is_toc_valid()" and
"plat_arm_bl1_fwu_needed()" to bool, to match function behavior.

Change-Id: I503fba211219a241cb263149ef36ca14e3362a1c
Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
This commit is contained in:
Louis Mayencourt 2020-01-29 11:42:31 +00:00
parent 326150b986
commit d6dcbcad18
5 changed files with 15 additions and 33 deletions

View File

@ -6,6 +6,7 @@
#ifndef PLAT_ARM_H #ifndef PLAT_ARM_H
#define PLAT_ARM_H #define PLAT_ARM_H
#include <stdbool.h>
#include <stdint.h> #include <stdint.h>
#include <drivers/arm/tzc_common.h> #include <drivers/arm/tzc_common.h>
@ -222,7 +223,7 @@ void arm_sp_min_early_platform_setup(void *from_bl2, uintptr_t tos_fw_config,
void arm_sp_min_plat_runtime_setup(void); void arm_sp_min_plat_runtime_setup(void);
/* FIP TOC validity check */ /* FIP TOC validity check */
int arm_io_is_toc_valid(void); bool arm_io_is_toc_valid(void);
/* Utility functions for Dynamic Config */ /* Utility functions for Dynamic Config */
void arm_bl2_dyn_cfg_init(void); void arm_bl2_dyn_cfg_init(void);
@ -254,7 +255,7 @@ void plat_arm_interconnect_init(void);
void plat_arm_interconnect_enter_coherency(void); void plat_arm_interconnect_enter_coherency(void);
void plat_arm_interconnect_exit_coherency(void); void plat_arm_interconnect_exit_coherency(void);
void plat_arm_program_trusted_mailbox(uintptr_t address); void plat_arm_program_trusted_mailbox(uintptr_t address);
int plat_arm_bl1_fwu_needed(void); bool plat_arm_bl1_fwu_needed(void);
__dead2 void plat_arm_error_handler(int err); __dead2 void plat_arm_error_handler(int err);
/* /*

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
@ -60,17 +60,13 @@ static int is_watchdog_reset(void)
* The following function checks if Firmware update is needed, * The following function checks if Firmware update is needed,
* by checking if TOC in FIP image is valid or watchdog reset happened. * by checking if TOC in FIP image is valid or watchdog reset happened.
******************************************************************************/ ******************************************************************************/
int plat_arm_bl1_fwu_needed(void) bool plat_arm_bl1_fwu_needed(void)
{ {
const int32_t *nv_flags_ptr = (const int32_t *)V2M_SYS_NVFLAGS_ADDR; const int32_t *nv_flags_ptr = (const int32_t *)V2M_SYS_NVFLAGS_ADDR;
/* Check if TOC is invalid or watchdog reset happened. */ /* Check if TOC is invalid or watchdog reset happened. */
if ((arm_io_is_toc_valid() != 1) || return (!arm_io_is_toc_valid() || (((*nv_flags_ptr == -EAUTH) ||
(((*nv_flags_ptr == -EAUTH) || (*nv_flags_ptr == -ENOENT)) (*nv_flags_ptr == -ENOENT)) && is_watchdog_reset()));
&& is_watchdog_reset()))
return 1;
return 0;
} }
/******************************************************************************* /*******************************************************************************

View File

@ -188,9 +188,9 @@ void bl1_plat_prepare_exit(entry_point_info_t *ep_info)
* On Arm platforms, the FWU process is triggered when the FIP image has * On Arm platforms, the FWU process is triggered when the FIP image has
* been tampered with. * been tampered with.
*/ */
int plat_arm_bl1_fwu_needed(void) bool plat_arm_bl1_fwu_needed(void)
{ {
return (arm_io_is_toc_valid() != 1); return !arm_io_is_toc_valid();
} }
/******************************************************************************* /*******************************************************************************
@ -199,8 +199,5 @@ int plat_arm_bl1_fwu_needed(void)
******************************************************************************/ ******************************************************************************/
unsigned int bl1_plat_get_next_image_id(void) unsigned int bl1_plat_get_next_image_id(void)
{ {
if (plat_arm_bl1_fwu_needed() != 0) return plat_arm_bl1_fwu_needed() ? NS_BL1U_IMAGE_ID : BL2_IMAGE_ID;
return NS_BL1U_IMAGE_ID;
return BL2_IMAGE_ID;
} }

View File

@ -128,15 +128,7 @@ int plat_get_image_source(unsigned int image_id, uintptr_t *dev_handle,
* See if a Firmware Image Package is available, * See if a Firmware Image Package is available,
* by checking if TOC is valid or not. * by checking if TOC is valid or not.
*/ */
int arm_io_is_toc_valid(void) bool arm_io_is_toc_valid(void)
{ {
int result; return (io_dev_init(fip_dev_handle, (uintptr_t)FIP_IMAGE_ID) == 0);
result = io_dev_init(fip_dev_handle, (uintptr_t)FIP_IMAGE_ID);
if (result == 0) {
return 1UL;
} else {
return 0UL;
}
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
* *
* SPDX-License-Identifier: BSD-3-Clause * SPDX-License-Identifier: BSD-3-Clause
*/ */
@ -357,12 +357,8 @@ int plat_get_image_source(unsigned int image_id, uintptr_t *dev_handle,
* See if a Firmware Image Package is available, * See if a Firmware Image Package is available,
* by checking if TOC is valid or not. * by checking if TOC is valid or not.
*/ */
int arm_io_is_toc_valid(void) bool arm_io_is_toc_valid(void)
{ {
int result; return (io_dev_init(fip_dev_handle, (uintptr_t)FIP_IMAGE_ID) == 0);
result = io_dev_init(fip_dev_handle, (uintptr_t)FIP_IMAGE_ID);
return (result == 0);
} }