raspberry BSP: Maybe there is a bug in the linker file?

Christian Mauderer list at c-mauderer.de
Fri Dec 20 20:12:34 UTC 2019


On 20/12/2019 19:19, Niteesh wrote:
> How do you test a patch? Do you checkout that particular commit and
> build and the BSP again?.

Basically yes: You check out the version that you want fixed and apply
the patch. In that case I have gone back and forward a few times to find
the commit that introduced the second bug.

> @Christian Mauderer <mailto:list at c-mauderer.de>  how did you build it
> for the rpi1? Did you follow the steps as in previous threads?

Basically the same steps like for every BSP:
1. Build a recent toolchain using RSB.
2. Build the BSP.
3. Test it on the board.

For the rpi1 the BSP is "raspberrypi" instead of "raspberrypi2". And I
didn't install the BSP because I only wanted the tests and no extra
application.

For testing it I used the guide that you found: Objcopy into a binary
file and replace the kernel.img with it.

> and how did you come to the conclusion that these changes cause the
> exceptions,

I had a look at the history of the raspberry BSP (`gitk
bsps/arm/raspberrypi` or `git log bsps/arm/raspberrypi`) and looked for
suspicious patches. For the raspberry there are not much patches in the
last year so that was quite easy. Then I just tested before and after
some of the patches to find the ones that introduced the bugs.

Again: In this case it was necessary to backport Sebastians patch so
that I have been able to test before / after the one that introduces the
exception.

I haven't had a detailled look at the exception yet but I assume it's
some problem that the wrong variant is used or that my RPi1 is an early
model with less RAM or something like that.

> as a beginner these ideas
> will help in the future.
> On Fri, Dec 20, 2019 at 2:46 PM Christian Mauderer <list at c-mauderer.de
> <mailto:list at c-mauderer.de>> wrote:
> 
>     On 20/12/2019 09:22, Christian Mauderer wrote:
>     > On 20/12/2019 07:33, Sebastian Huber wrote:
>     >> On 19/12/2019 15:28, Niteesh wrote:
>     >>> As far as I know, 0x8000 is a fixed address where the bootloader
>     jumps
>     >>> to after loading the application assuming the CPU is in 32bit mode.
>     >>> For 64bit mode, it jumps to 0x80000.
>     >>
>     >> Would you mind testing this patch:
>     >>
>     >> https://lists.rtems.org/pipermail/devel/2019-December/056551.html
>     >>
>     >
>     > On the Pi 1 now the binary has three time the size (with a lot of 0x00
>     > in it) and at least RTEMS starts. But it runs into an exception quite
>     > fast. I'll investigate that a bit.
>     >
>     > @Niteesh: For the Pi 3 I would expect that it still doesn't print
>     > anything on the console due to the different UART pins.
>     >
>     > The output on the Pi 1 is:
>     >
>     > executing�
>     > *** FATAL ***
>     > fatal source: 9 (RTEMS_FATAL_SOURCE_EXCEPTION)
>     >
>     > R0   = 0xfc037f80 R8  = 0x00000000
>     > R1   = 0xfc345980 R9  = 0x00000010
>     > R2   = 0x00000001 R10 = 0xfc037f8a
>     > R3   = 0x03fc8080 R11 = 0x0030da00
>     > R4   = 0xfc037f80 R12 = 0xfc345988
>     > R5   = 0x00000008 SP  = 0x00300ba8
>     > R6   = 0x0030d9fe LR  = 0x00205a78
>     > R7   = 0x00305218 PC  = 0x00205ac8
>     > CPSR = 0x600001d3 VEC = 0x00000004
>     > RTEMS version: 5.0.0.254f38583fe68c3e17dfe274a2deeb00a5a538d6
>     > RTEMS tools: 7.5.0 20191114 (RTEMS 5, RSB 5 (6c65fc237b9e modified),
>     > Newlib d14714c69)
> 
>     The exception seems to be caused by some of the changes in bspstart.c
>     and bspgetworkarea.c in patch a4d7e4cee77d16b0e34ef543f0804e7eb2954137.
>     So the fix for the linker command file is fine.
> 


More information about the devel mailing list