]> git.ipfire.org Git - thirdparty/u-boot.git/commitdiff
spl: Rename jump_to_image_no_args()
authorSimon Glass <sjg@chromium.org>
Wed, 28 May 2025 12:32:08 +0000 (06:32 -0600)
committerTom Rini <trini@konsulko.com>
Fri, 13 Jun 2025 19:22:53 +0000 (13:22 -0600)
This function is currently a misnomer at times as we have cases where it
passes arguments to the image. In preparation for making that be a more
common case rename this function to jump_to_image(...). In order to do
this, rename jump_to_image in board_init_r(...) to jumper so that we do
not have a conflict.

Signed-off-by: Simon Glass <sjg@chromium.org>
[trini: Reword the commit message, adding missing cases of
        jump_to_image_no_args()]
Signed-off-by: Tom Rini <trini@konsulko.com>
16 files changed:
arch/arm/mach-imx/imx8ulp/soc.c
arch/arm/mach-imx/spl.c
arch/arm/mach-k3/r5/common.c
arch/arm/mach-omap2/boot-common.c
arch/arm/mach-stm32mp/stm32mp1/cpu.c
arch/arm/mach-tegra/spl.c
arch/mips/lib/spl.c
arch/riscv/lib/spl.c
arch/sandbox/cpu/spl.c
arch/x86/lib/spl.c
arch/x86/lib/tpl.c
board/freescale/common/fsl_chain_of_trust.c
board/renesas/common/rcar64-spl.c
common/spl/spl.c
drivers/usb/gadget/f_sdp.c
include/spl.h

index b5dc45296d1a571e3007cc94d3988de7347ab531..2b042300103ab998c91a6f3f8804b29f13b44a60 100644 (file)
@@ -806,7 +806,7 @@ int imx8ulp_dm_post_init(void)
 EVENT_SPY_SIMPLE(EVT_DM_POST_INIT_F, imx8ulp_dm_post_init);
 
 #if defined(CONFIG_XPL_BUILD)
-__weak void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+__weak void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        debug("image entry point: 0x%lx\n", spl_image->entry_point);
 
index bc291dcd1296c3dbfdc308eaf8fd6444e829e14f..518d9cb126219359e256597c89a4c4f90919f9cf 100644 (file)
@@ -276,7 +276,7 @@ u32 spl_mmc_boot_mode(struct mmc *mmc, const u32 boot_device)
  * +------------+ + CSF_PAD_SIZE
  */
 
-__weak void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+__weak void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(void);
        uint32_t offset;
index fa146549f13725bd0abb9839149eeff3ef44324c..6ac2973bd67ab35f540def1a100b90c77fd65c2a 100644 (file)
@@ -137,7 +137,7 @@ void release_resources_for_core_shutdown(void)
        }
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(void);
        struct ti_sci_handle *ti_sci = get_ti_sci_handle();
index ddd7eeaf052176d5fe025bd117f6640fc9ddd7b9..95b44c8b1e573fdc3dc8877bab230d4655cd338f 100644 (file)
@@ -291,7 +291,7 @@ void spl_soc_init(void)
                spl_boot_ipu();
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(u32 *);
        image_entry_noargs_t image_entry =
index 9ab5a3ede528ec0939b8cfeb94d39331ef5a4b4e..8c09d91de0581db9e88a7502b80b5151e4c905e1 100644 (file)
@@ -349,7 +349,7 @@ uintptr_t get_stm32mp_bl2_dtb(void)
 }
 
 #ifdef CONFIG_XPL_BUILD
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_stm32_t)(u32 romapi);
        uintptr_t romapi = get_stm32mp_rom_api_table();
index 5df0eb28c96f4a4a20fcf408707b3924586466bb..b3a039217c2efe2cdeb2825576a1340e51ac0105 100644 (file)
@@ -43,7 +43,7 @@ u32 spl_boot_device(void)
        return BOOT_DEVICE_RAM;
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        debug("image entry point: 0x%lX\n", spl_image->entry_point);
 
index b4087546dd1dc9c58f2aa1e5c26f14720adc912c..4949b17bd593877bc9020effe04bfc394ddd9748 100644 (file)
@@ -7,7 +7,7 @@
 #include <log.h>
 #include <spl.h>
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(void);
        image_entry_noargs_t image_entry =
index 9a7a4f6ac8d3b95ac1cc25a770b628058d205c29..38a5ab27dd82e051c7ed6a58ebb450235a9108ee 100644 (file)
@@ -36,7 +36,7 @@ __weak void board_init_f(ulong dummy)
                panic("spl_board_init_f() failed: %d\n", ret);
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_riscv_t)(ulong hart, void *dtb);
        void *fdt_blob;
index ecc03785463eb589e03e7099e238c416c07f924b..7ee4975523e30a1e3fb845ac19c71da93ef36290 100644 (file)
@@ -74,7 +74,7 @@ static int spl_board_load_file(struct spl_image_info *spl_image,
        }
 
        /*
-        * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
+        * Set up spl_image to boot from jump_to_image(). Allocate this
         * outsdide the RAM buffer (i.e. don't use strdup()).
         */
        spl_image->arg = os_malloc(strlen(fname) + 1);
@@ -112,7 +112,7 @@ static int load_from_image(struct spl_image_info *spl_image,
        log_info("Reading from pos %lx size %lx\n", pos, size);
 
        /*
-        * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
+        * Set up spl_image to boot from jump_to_image(). Allocate this
         * outside the RAM buffer (i.e. don't use strdup()).
         */
        fname = state->prog_fname ? state->prog_fname : state->argv[0];
@@ -159,7 +159,7 @@ void spl_board_init(void)
        }
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        switch (spl_image->flags) {
        case SPL_SANDBOXF_ARG_IS_FNAME: {
index 6a6cad310bcc08eac6161790b174212e1e358054..01ff034d6654e3b7f8390bc667a71bc5ad73a651 100644 (file)
@@ -277,7 +277,7 @@ int spl_spi_load_image(void)
 }
 
 #ifdef CONFIG_X86_RUN_64BIT
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        int ret;
 
index f7df7e03621e2fbd8cefc33245b0f40ff63343ef..06c9e4d02c163ef8abfded47f8e4f257444e2a18 100644 (file)
@@ -101,7 +101,7 @@ int spl_spi_load_image(void)
        return -EPERM;
 }
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        debug("Jumping to %s at %lx\n", xpl_name(xpl_next_phase()),
              (ulong)spl_image->entry_point);
index 194a0907e72c7d4560244e65e60ab611f37a36c6..3d44357caf7d5bf97294d667c09ccdc4388732da 100644 (file)
@@ -134,7 +134,7 @@ void spl_validate_uboot(uint32_t hdr_addr, uintptr_t img_addr)
 /* Override weak funtion defined in SPL framework to enable validation
  * of main u-boot image before jumping to u-boot image.
  */
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(void);
        uint32_t hdr_addr;
index 76f2bde924e3c0b60448b189778462c7663287b9..d8f05d2ffbe92628f5efe5835557082e30a776ef 100644 (file)
@@ -6,7 +6,7 @@
 #include <image.h>
 #include <spl.h>
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        debug("image entry point: 0x%lx\n", spl_image->entry_point);
        if (spl_image->os == IH_OS_ARM_TRUSTED_FIRMWARE) {
index 76fd56dfe4be6713ed414afaffb60804f446838c..d8e26605d20f4ad732942807ccec8908e2471ddc 100644 (file)
@@ -392,7 +392,7 @@ int spl_load(struct spl_image_info *spl_image,
 }
 #endif
 
-__weak void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
+__weak void __noreturn jump_to_image(struct spl_image_info *spl_image)
 {
        typedef void __noreturn (*image_entry_noargs_t)(void);
 
@@ -689,7 +689,7 @@ void board_init_r(gd_t *dummy1, ulong dummy2)
                BOOT_DEVICE_NONE,
                BOOT_DEVICE_NONE,
        };
-       spl_jump_to_image_t jump_to_image = &jump_to_image_no_args;
+       spl_jump_to_image_t jumper = &jump_to_image;
        struct spl_image_info spl_image;
        int ret, os;
 
@@ -783,20 +783,20 @@ void board_init_r(gd_t *dummy1, ulong dummy2)
        } else if (CONFIG_IS_ENABLED(ATF) && os == IH_OS_ARM_TRUSTED_FIRMWARE) {
                debug("Jumping to U-Boot via ARM Trusted Firmware\n");
                spl_fixup_fdt(spl_image_fdt_addr(&spl_image));
-               jump_to_image = &spl_invoke_atf;
+               jumper = &spl_invoke_atf;
        } else if (CONFIG_IS_ENABLED(OPTEE_IMAGE) && os == IH_OS_TEE) {
                debug("Jumping to U-Boot via OP-TEE\n");
                spl_board_prepare_for_optee(spl_image_fdt_addr(&spl_image));
-               jump_to_image = &jump_to_image_optee;
+               jumper = &jump_to_image_optee;
        } else if (CONFIG_IS_ENABLED(OPENSBI) && os == IH_OS_OPENSBI) {
                debug("Jumping to U-Boot via RISC-V OpenSBI\n");
-               jump_to_image = &spl_invoke_opensbi;
+               jumper = &spl_invoke_opensbi;
        } else if (CONFIG_IS_ENABLED(OS_BOOT) && os == IH_OS_LINUX) {
                debug("Jumping to Linux\n");
                if (IS_ENABLED(CONFIG_SPL_OS_BOOT))
                        spl_fixup_fdt((void *)SPL_PAYLOAD_ARGS_ADDR);
                spl_board_prepare_for_linux();
-               jump_to_image = &jump_to_image_linux;
+               jumper = &jump_to_image_linux;
        } else {
                debug("Unsupported OS image.. Jumping nevertheless..\n");
        }
@@ -848,7 +848,7 @@ void board_init_r(gd_t *dummy1, ulong dummy2)
        if (CONFIG_IS_ENABLED(RELOC_LOADER)) {
                int ret;
 
-               ret = spl_reloc_jump(&spl_image, jump_to_image);
+               ret = spl_reloc_jump(&spl_image, jumper);
                if (ret) {
                        if (xpl_phase() == PHASE_VPL)
                                printf("jump failed %d\n", ret);
@@ -856,7 +856,7 @@ void board_init_r(gd_t *dummy1, ulong dummy2)
                }
        }
 
-       jump_to_image(&spl_image);
+       jumper(&spl_image);
 }
 
 /*
index 36934b1bcf7ad0aedb44276f39c4356924bdaa3f..647001d8dd0c9c843e6a4f34934c28bdbc13315c 100644 (file)
@@ -863,7 +863,7 @@ static int sdp_handle_in_ep(struct spl_image_info *spl_image,
                        struct spl_boot_device bootdev = {};
                        spl_parse_image_header(&spl_image, &bootdev, header);
                        spl_board_prepare_for_boot();
-                       jump_to_image_no_args(&spl_image);
+                       jump_to_image(&spl_image);
 #else
                        /* In U-Boot, allow jumps to scripts */
                        cmd_source_script(sdp_func->jmp_address, NULL, NULL);
index 850c64d4b1938df773841ca1ede0019fb912e64a..7c10c7f792e578f29110079d367a1eba4f5ba750 100644 (file)
@@ -865,7 +865,7 @@ int spl_load_image_fat_os(struct spl_image_info *spl_image,
                          struct spl_boot_device *bootdev,
                          struct blk_desc *block_dev, int partition);
 
-void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image);
+void __noreturn jump_to_image(struct spl_image_info *spl_image);
 
 /* SPL EXT image functions */
 int spl_load_image_ext(struct spl_image_info *spl_image,