aboutsummaryrefslogtreecommitdiff
path: root/secure_fw
diff options
context:
space:
mode:
authorshejia01 <jianliang.shen@arm.com>2021-04-21 10:04:07 +0800
committerAnton Komlev <Anton.Komlev@arm.com>2021-05-06 00:34:13 +0200
commit01a497c2c03f95a11aab48714b5fb3a907195f5b (patch)
tree3266a247eb8989de0c99205574af1ef4e6e101a3 /secure_fw
parentbc8493014af69c9a5a568426362bce7f94fadc9e (diff)
downloadtrusted-firmware-m-01a497c2c03f95a11aab48714b5fb3a907195f5b.tar.gz
Build: Fix some build warnings.
The GNU Arm Embedded Toolchain 9-2020-q2 update carries out more strict inspections.This patch redefines variables in spm_func.c to avoid the warnings. Signed-off-by: Jianliang Shen <jianliang.shen@arm.com> Change-Id: Idc3ac7e0fa240af6620c626f23329bc1f2c37df2
Diffstat (limited to 'secure_fw')
-rw-r--r--secure_fw/spm/cmsis_func/spm_func.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/secure_fw/spm/cmsis_func/spm_func.c b/secure_fw/spm/cmsis_func/spm_func.c
index b85463f10..8f77cdb01 100644
--- a/secure_fw/spm/cmsis_func/spm_func.c
+++ b/secure_fw/spm/cmsis_func/spm_func.c
@@ -55,7 +55,7 @@ REGION_DECLARE_T(Image$$, TFM_SECURE_STACK, $$ZI$$Limit, struct iovec_args_t)[];
static uint32_t *tfm_secure_stack_seal =
((uint32_t *)&REGION_NAME(Image$$, TFM_SECURE_STACK, $$ZI$$Limit)[-1]) - 2;
-REGION_DECLARE_T(Image$$, ARM_LIB_STACK_SEAL, $$ZI$$Base, uint32_t);
+REGION_DECLARE_T(Image$$, ARM_LIB_STACK_SEAL, $$ZI$$Base, uint32_t)[];
/*
* Function to seal the psp stacks for Function model of TF-M.
@@ -86,8 +86,8 @@ void tfm_spm_seal_psp_stacks(void)
* Seal the ARM_LIB_STACK by writing the seal value to the reserved
* region.
*/
- uint32_t *arm_lib_stck_seal_base = (uint32_t *)&REGION_NAME(Image$$,
- ARM_LIB_STACK_SEAL, $$ZI$$Base);
+ uint32_t *arm_lib_stck_seal_base =
+ ((uint32_t *)&REGION_NAME(Image$$, ARM_LIB_STACK_SEAL, $$ZI$$Base)[-1]) - 2;
*(arm_lib_stck_seal_base) = TFM_STACK_SEAL_VALUE;
*(arm_lib_stck_seal_base + 1) = TFM_STACK_SEAL_VALUE;
@@ -802,7 +802,7 @@ enum tfm_status_e tfm_spm_sfn_request_handler(
struct tfm_sfn_req_s *desc_ptr, uint32_t excReturn)
{
enum tfm_status_e res;
- struct iovec_params_t iovecs;
+ struct iovec_params_t iovecs = {0};
res = tfm_check_sfn_req_integrity(desc_ptr);
if (res != TFM_SUCCESS) {