mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-03 09:59:44 +00:00
0060517ae0
There are a number of places where U-Boot intentionally and legally accesses physical address 0x0000, for example when installing exception vectors on systems where these are located in low memory. Add "cppcheck-suppress nullPointer" comments to silence cppcheck where this is intentional and legal. Signed-off-by: Wolfgang Denk <wd@denx.de>
65 lines
1.2 KiB
C
65 lines
1.2 KiB
C
/*
|
|
* (C) Copyright 2010
|
|
* Renesas Solutions Corp.
|
|
* Nobuhiro Iwamatsu <nobuhiro.iwamatsu.yj@renesas.com>
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0+
|
|
*/
|
|
|
|
/*
|
|
* Linux SuperH zImage loading and boot
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <asm/io.h>
|
|
#include <asm/zimage.h>
|
|
|
|
int do_sh_zimageboot (cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
|
|
{
|
|
ulong (*zboot_entry)(int, char * const []) = NULL;
|
|
char *s0, *s1;
|
|
unsigned char *param = NULL;
|
|
char *cmdline;
|
|
char *bootargs;
|
|
|
|
disable_interrupts();
|
|
|
|
if (argc >= 3) {
|
|
/* argv[1] holds the address of the zImage */
|
|
s0 = argv[1];
|
|
/* argv[2] holds the address of zero page */
|
|
s1 = argv[2];
|
|
} else {
|
|
goto exit;
|
|
}
|
|
|
|
if (s0)
|
|
zboot_entry = (ulong (*)(int, char * const []))simple_strtoul(s0, NULL, 16);
|
|
|
|
/* empty_zero_page */
|
|
if (s1)
|
|
param = (unsigned char*)simple_strtoul(s1, NULL, 16);
|
|
|
|
/* Linux kernel command line */
|
|
cmdline = (char *)param + COMMAND_LINE;
|
|
bootargs = getenv("bootargs");
|
|
|
|
/* Clear zero page */
|
|
/* cppcheck-suppress nullPointer */
|
|
memset(param, 0, 0x1000);
|
|
|
|
/* Set commandline */
|
|
strcpy(cmdline, bootargs);
|
|
|
|
/* Boot */
|
|
zboot_entry(0, NULL);
|
|
|
|
exit:
|
|
return -1;
|
|
}
|
|
|
|
U_BOOT_CMD(
|
|
zimageboot, 3, 0, do_sh_zimageboot,
|
|
"Boot zImage for Renesas SH",
|
|
""
|
|
);
|