mirror of
https://github.com/brain-hackers/u-boot-brain
synced 2024-06-09 23:36:03 +09:00
![Simon Glass](/assets/img/avatar_default.png)
At present if one of the initcalls fails on sandbox the address printing is not help, e.g.: initcall sequence 0000557678967c80 failed at call 00005576709dfe1f (err=-96) This is because U-Boot gets relocated high into memory and the relocation offset (gd->reloc_off) does not work correctly for sandbox. Add support for finding the base address of the text region (at least on Linux) and use that to set the relocation offset. This makes the output better: initcall sequence 0000560775957c80 failed at call 0000000000048134 (err=-96) Then you use can use grep to see which init call failed, e.g.: $ grep 0000000000048134 u-boot.map stdio_add_devices Of course another option is to run it with a debugger such as gdb: $ gdb u-boot ... (gdb) br initcall.h:41 Breakpoint 1 at 0x4db9d: initcall.h:41. (2 locations) Note that two locations are reported, since this function is used in both board_init_f() and board_init_r(). (gdb) r Starting program: /tmp/b/sandbox/u-boot [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". U-Boot 2018.09-00264-ge0c2ba9814-dirty (Sep 22 2018 - 12:21:46 -0600) DRAM: 128 MiB MMC: Breakpoint 1, initcall_run_list (init_sequence=0x5555559619e0 <init_sequence_f>) at /scratch/sglass/cosarm/src/third_party/u-boot/files/include/initcall.h:41 41 printf("initcall sequence %p failed at call %p (err=%d)\n", (gdb) print *init_fnc_ptr $1 = (const init_fnc_t) 0x55555559c114 <stdio_add_devices> (gdb) Signed-off-by: Simon Glass <sjg@chromium.org>
51 lines
1.1 KiB
C
51 lines
1.1 KiB
C
/* SPDX-License-Identifier: GPL-2.0+ */
|
|
/*
|
|
* Copyright (c) 2011 The Chromium OS Authors.
|
|
*/
|
|
|
|
#ifndef __INITCALL_H
|
|
#define __INITCALL_H
|
|
|
|
typedef int (*init_fnc_t)(void);
|
|
|
|
#include <common.h>
|
|
#include <initcall.h>
|
|
#include <efi.h>
|
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
|
|
|
static inline int initcall_run_list(const init_fnc_t init_sequence[])
|
|
{
|
|
const init_fnc_t *init_fnc_ptr;
|
|
|
|
for (init_fnc_ptr = init_sequence; *init_fnc_ptr; ++init_fnc_ptr) {
|
|
unsigned long reloc_ofs = 0;
|
|
int ret;
|
|
|
|
/*
|
|
* Sandbox is relocated by the OS, so symbols always appear at
|
|
* the relocated address.
|
|
*/
|
|
if (IS_ENABLED(CONFIG_SANDBOX) || (gd->flags & GD_FLG_RELOC))
|
|
reloc_ofs = gd->reloc_off;
|
|
#ifdef CONFIG_EFI_APP
|
|
reloc_ofs = (unsigned long)image_base;
|
|
#endif
|
|
debug("initcall: %p", (char *)*init_fnc_ptr - reloc_ofs);
|
|
if (reloc_ofs)
|
|
debug(" (relocated to %p)\n", (char *)*init_fnc_ptr);
|
|
else
|
|
debug("\n");
|
|
ret = (*init_fnc_ptr)();
|
|
if (ret) {
|
|
printf("initcall sequence %p failed at call %p (err=%d)\n",
|
|
init_sequence,
|
|
(char *)*init_fnc_ptr - reloc_ofs, ret);
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#endif
|