u-boot启动详解

1. U-Boot启动流程分析

参考文献1 超详细分析Bootloader(Uboot)到内核的启动流程

1.1 U-boot主要目录结构:

- board 目标板相关文件,主要包含SDRAM、FLASH驱动;
- common 独立于处理器体系结构的通用代码,如内存大小探测与故障检测;
- cpu 与处理器相关的文件。如mpc8xx子目录下含串口、网口、LCD驱动及中断初始化等文件;
- driver 通用设备驱动,如CFI FLASH驱动(目前对INTEL FLASH支持较好)
- doc U-Boot的说明文档;
- examples可在U-Boot下运行的示例程序;如hello_world.c,timer.c;
- include U-Boot头文件;尤其configs子目录下与目标板相关的配置头文件是移植过程中经常要修改的文件;
- lib_xxx 处理器体系相关的文件,如lib_ppc, lib_arm目录分别包含与PowerPC、ARM体系结构相关的文件;
- net 与网络功能相关的文件目录,如bootp,nfs,tftp;
- post 上电自检文件目录。尚有待于进一步完善;
- rtc RTC驱动程序;
- tools 用于创建U-Boot S-RECORD和BIN镜像文件的工具;

1.2 第一阶段

总体调用关系:

u-boot.lds
	start.S
		_main
			board_init_f
			relocate_code
			board_init_r
				....
				main_loop
  1. u-boot.lds(arch/arm/cpu/u-boot.lds)

对于任何程序,入口函数是在链接时决定的,uboot的入口是由链接脚本决定的。uboot下armv7链接脚本默认目录为arch/arm/cpu/u-boot.lds。这个可以在配置文件中与CONFIG_SYS_LDSCRIPT来指定。入口地址也是由连接器决定的,在配置文件中可以由CONFIG_SYS_TEXT_BASE指定。这个会在编译时加在ld连接器的选项-Ttext中.

/* SPDX-License-Identifier: GPL-2.0+ */
/*
* Copyright (c) 2004-2008 Texas Instruments
*
* (C) Copyright 2002
* Gary Jennejohn, DENX Software Engineering, <garyj@denx.de>
*/

#include <config.h>
#include <asm/psci.h>

OUTPUT_FORMAT("elf32-littlearm", "elf32-littlearm", "elf32-littlearm")
OUTPUT_ARCH(arm)
ENTRY(_start)
SECTIONS
{
   
#ifndef CONFIG_CMDLINE
  /DISCARD/ : {
    *(.u_boot_list_2_cmd_*) }
#endif
#if defined(CONFIG_ARMV7_SECURE_BASE) && defined(CONFIG_ARMV7_NONSEC)
  /*
   * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not
   * bundle with u-boot, and code offsets are fixed. Secure zone
   * only needs to be copied from the loading address to
   * CONFIG_ARMV7_SECURE_BASE, which is the linking and running
   * address for secure code.
   *
   * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will
   * be included in u-boot address space, and some absolute address
   * were used in secure code. The absolute addresses of the secure
   * code also needs to be relocated along with the accompanying u-boot
   * code.
   *
   * So DISCARD is only for CONFIG_ARMV7_SECURE_BASE.
   */
  /DISCARD/ : {
    *(.rel._secure*) }
#endif
  . = 0x00000000;

  . = ALIGN(4);
  .text :
  {
   
  	*(.__image_copy_start)
  	*(.vectors)
  	CPUDIR/start.o (.text*) //对应的就是start.S文件
  }

  /* This needs to come before *(.text*) */
  .__efi_runtime_start : {
   
  	*(.__efi_runtime_start)
  }

  .efi_runtime : {
   
  	*(.text.efi_runtime*)
  	*(.rodata.efi_runtime*)
  	*(.data.efi_runtime*)
  }

  .__efi_runtime_stop : {
   
  	*(.__efi_runtime_stop)
  }

  .text_rest :
  {
   
  	*(.text*)
  }

#ifdef CONFIG_ARMV7_NONSEC

  /* Align the secure section only if we're going to use it in situ */
  .__secure_start
#ifndef CONFIG_ARMV7_SECURE_BASE
  	ALIGN(CONSTANT(COMMONPAGESIZE))
#endif
  : {
   
  	KEEP(*(.__secure_start))
  }

#ifndef CONFIG_ARMV7_SECURE_BASE
#define CONFIG_ARMV7_SECURE_BASE
#define __ARMV7_PSCI_STACK_IN_RAM
#endif

  .secure_text CONFIG_ARMV7_SECURE_BASE :
  	AT(ADDR(.__secure_start) + SIZEOF(.__secure_start))
  {
   
  	*(._secure.text)
  }

  .secure_data : AT(LOADADDR(.secure_text) + SIZEOF(.secure_text))
  {
   
  	*(._secure.data)
  }

#ifdef CONFIG_ARMV7_PSCI
  .secure_stack ALIGN(ADDR(.secure_data) + SIZEOF(.secure_data),
  		    CONSTANT(COMMONPAGESIZE)) (NOLOAD) :
#ifdef __ARMV7_PSCI_STACK_IN_RAM
  	AT(ADDR(.secure_stack))
#else
  	AT(LOADADDR(.secure_data) + SIZEOF(.secure_data))
#endif
  {
   
  	KEEP(*(.__secure_stack_start))

  	/* Skip addreses for stack */
  	. = . + CONFIG_ARMV7_PSCI_NR_CPUS * ARM_PSCI_STACK_SIZE;

  	/* Align end of stack section to page boundary */
  	. = ALIGN(CONSTANT(COMMONPAGESIZE));

  	KEEP(*(.__secure_stack_end))

#ifdef CONFIG_ARMV7_SECURE_MAX_SIZE
  	/*
  	 * We are not checking (__secure_end - __secure_start) here,
  	 * as these are the load addresses, and do not include the
  	 * stack section. Instead, use the end of the stack section
  	 * and the start of the text section.
  	 */
  	ASSERT((. - ADDR(.secure_text)) <= CONFIG_ARMV7_SECURE_MAX_SIZE,
  	       "Error: secure section exceeds secure memory size");
#endif
  }

#ifndef __ARMV7_PSCI_STACK_IN_RAM
  /* Reset VMA but don't allocate space if we have secure SRAM */
  . = L
  • 0
    点赞
  • 9
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值