mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-08 05:43:53 +00:00
refactor(bl)!: remove unused plat_try_next_boot_source
The plat_try_next_boot_source() API is not used by any upstream platform and not used by platforms that asked for this API. It is then removed. It will be replaced with a more generic interface in next patch. Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I298c7acace8c5efb3c66422d8d9280ecd08e5ade
This commit is contained in:
parent
c4b215ff0b
commit
2c303e393b
4 changed files with 2 additions and 41 deletions
|
@ -211,18 +211,7 @@ int load_auth_image(unsigned int image_id, image_info_t *image_data)
|
|||
{
|
||||
int err;
|
||||
|
||||
/*
|
||||
* All firmware banks should be part of the same non-volatile storage as per
|
||||
* PSA FWU specification, hence don't check for any alternate boot source
|
||||
* when PSA FWU is enabled.
|
||||
*/
|
||||
#if PSA_FWU_SUPPORT
|
||||
err = load_auth_image_internal(image_id, image_data);
|
||||
#else
|
||||
do {
|
||||
err = load_auth_image_internal(image_id, image_data);
|
||||
} while ((err != 0) && (plat_try_next_boot_source() != 0));
|
||||
#endif /* PSA_FWU_SUPPORT */
|
||||
|
||||
if (err == 0) {
|
||||
/*
|
||||
|
|
|
@ -1607,9 +1607,6 @@ This function executes with the MMU and data caches enabled. It is responsible
|
|||
for performing any remaining platform-specific setup that can occur after the
|
||||
MMU and data cache have been enabled.
|
||||
|
||||
if support for multiple boot sources is required, it initializes the boot
|
||||
sequence used by plat_try_next_boot_source().
|
||||
|
||||
In Arm standard platforms, this function initializes the storage abstraction
|
||||
layer used to load the next bootloader image.
|
||||
|
||||
|
@ -1892,25 +1889,7 @@ Function : bl2_plat_preload_setup [optional]
|
|||
|
||||
This optional function performs any BL2 platform initialization
|
||||
required before image loading, that is not done later in
|
||||
bl2_platform_setup(). Specifically, if support for multiple
|
||||
boot sources is required, it initializes the boot sequence used by
|
||||
plat_try_next_boot_source().
|
||||
|
||||
Function : plat_try_next_boot_source() [optional]
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
::
|
||||
|
||||
Argument : void
|
||||
Return : int
|
||||
|
||||
This optional function passes to the next boot source in the redundancy
|
||||
sequence.
|
||||
|
||||
This function moves the current boot redundancy source to the next
|
||||
element in the boot sequence. If there are no more boot sources then it
|
||||
must return 0, otherwise it must return 1. The default implementation
|
||||
of this always returns 0.
|
||||
bl2_platform_setup().
|
||||
|
||||
Boot Loader Stage 2 (BL2) at EL3
|
||||
--------------------------------
|
||||
|
|
|
@ -154,7 +154,6 @@ void plat_panic_handler(void) __dead2;
|
|||
void plat_system_reset(void) __dead2;
|
||||
const char *plat_log_get_prefix(unsigned int log_level);
|
||||
void bl2_plat_preload_setup(void);
|
||||
int plat_try_next_boot_source(void);
|
||||
|
||||
#if MEASURED_BOOT
|
||||
int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data);
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
* Copyright (c) 2018-2024, Arm Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
@ -24,7 +24,6 @@
|
|||
#pragma weak bl2_plat_preload_setup
|
||||
#pragma weak bl2_plat_handle_pre_image_load
|
||||
#pragma weak bl2_plat_handle_post_image_load
|
||||
#pragma weak plat_try_next_boot_source
|
||||
#pragma weak plat_get_enc_key_info
|
||||
#pragma weak plat_is_smccc_feature_available
|
||||
#pragma weak plat_get_soc_version
|
||||
|
@ -69,11 +68,6 @@ int bl2_plat_handle_post_image_load(unsigned int image_id)
|
|||
return 0;
|
||||
}
|
||||
|
||||
int plat_try_next_boot_source(void)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* Weak implementation to provide dummy decryption key only for test purposes,
|
||||
* platforms must override this API for any real world firmware encryption
|
||||
|
|
Loading…
Add table
Reference in a new issue