The sectype member of _virDomainSecDef struct is already declared
as of virDomainLaunchSecurity type. There's no need to typecast
it to the very same type when passing it to switch().
Signed-off-by: Michal Privoznik <mprivozn(a)redhat.com>
---
src/conf/domain_conf.c | 6 +++---
src/qemu/qemu_command.c | 4 ++--
src/qemu/qemu_firmware.c | 2 +-
src/qemu/qemu_namespace.c | 2 +-
src/qemu/qemu_process.c | 2 +-
src/qemu/qemu_validate.c | 2 +-
6 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c
index 264f182d05..102a011be8 100644
--- a/src/conf/domain_conf.c
+++ b/src/conf/domain_conf.c
@@ -3830,7 +3830,7 @@ virDomainSecDefFree(virDomainSecDef *def)
if (!def)
return;
- switch ((virDomainLaunchSecurity) def->sectype) {
+ switch (def->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
g_free(def->data.sev.dh_cert);
g_free(def->data.sev.session);
@@ -13690,7 +13690,7 @@ virDomainSecDefParseXML(xmlNodePtr lsecNode,
&sec->sectype) < 0)
return NULL;
- switch ((virDomainLaunchSecurity) sec->sectype) {
+ switch (sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
if (virDomainSEVDefParseXML(&sec->data.sev, ctxt) < 0)
return NULL;
@@ -26695,7 +26695,7 @@ virDomainSecDefFormat(virBuffer *buf, virDomainSecDef *sec)
virBufferAsprintf(&attrBuf, " type='%s'",
virDomainLaunchSecurityTypeToString(sec->sectype));
- switch ((virDomainLaunchSecurity) sec->sectype) {
+ switch (sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
virDomainSEVDefFormat(&attrBuf, &childBuf, &sec->data.sev);
break;
diff --git a/src/qemu/qemu_command.c b/src/qemu/qemu_command.c
index a32cb8f8e9..1879fa608c 100644
--- a/src/qemu/qemu_command.c
+++ b/src/qemu/qemu_command.c
@@ -7054,7 +7054,7 @@ qemuBuildMachineCommandLine(virCommand *cmd,
qemuAppendLoadparmMachineParm(&buf, def);
if (def->sec) {
- switch ((virDomainLaunchSecurity) def->sec->sectype) {
+ switch (def->sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_CONFIDENTAL_GUEST_SUPPORT)) {
virBufferAddLit(&buf,
",confidential-guest-support=lsec0");
@@ -9777,7 +9777,7 @@ qemuBuildSecCommandLine(virDomainObj *vm, virCommand *cmd,
if (!sec)
return 0;
- switch ((virDomainLaunchSecurity) sec->sectype) {
+ switch (sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
return qemuBuildSEVCommandLine(vm, cmd, &sec->data.sev);
break;
diff --git a/src/qemu/qemu_firmware.c b/src/qemu/qemu_firmware.c
index 78844e3066..8946dc1aa5 100644
--- a/src/qemu/qemu_firmware.c
+++ b/src/qemu/qemu_firmware.c
@@ -1323,7 +1323,7 @@ qemuFirmwareMatchDomain(const virDomainDef *def,
}
if (def->sec) {
- switch ((virDomainLaunchSecurity) def->sec->sectype) {
+ switch (def->sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
if (!supportsSEV) {
VIR_DEBUG("Domain requires SEV, firmware '%s' doesn't
support it",
diff --git a/src/qemu/qemu_namespace.c b/src/qemu/qemu_namespace.c
index 915d44310f..fb7c9329dd 100644
--- a/src/qemu/qemu_namespace.c
+++ b/src/qemu/qemu_namespace.c
@@ -651,7 +651,7 @@ qemuDomainSetupLaunchSecurity(virDomainObj *vm,
if (!sec)
return 0;
- switch ((virDomainLaunchSecurity) sec->sectype) {
+ switch (sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
VIR_DEBUG("Setting up launch security for SEV");
diff --git a/src/qemu/qemu_process.c b/src/qemu/qemu_process.c
index 9886a11245..f730cd1828 100644
--- a/src/qemu/qemu_process.c
+++ b/src/qemu/qemu_process.c
@@ -6806,7 +6806,7 @@ qemuProcessPrepareLaunchSecurityGuestInput(virDomainObj *vm)
if (!sec)
return 0;
- switch ((virDomainLaunchSecurity) sec->sectype) {
+ switch (sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
return qemuProcessPrepareSEVGuestInput(vm);
case VIR_DOMAIN_LAUNCH_SECURITY_PV:
diff --git a/src/qemu/qemu_validate.c b/src/qemu/qemu_validate.c
index a00ec8e940..05ee477456 100644
--- a/src/qemu/qemu_validate.c
+++ b/src/qemu/qemu_validate.c
@@ -1310,7 +1310,7 @@ qemuValidateDomainDef(const virDomainDef *def,
return -1;
if (def->sec) {
- switch ((virDomainLaunchSecurity) def->sec->sectype) {
+ switch (def->sec->sectype) {
case VIR_DOMAIN_LAUNCH_SECURITY_SEV:
if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SEV_GUEST)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
--
2.44.2