mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-23 19:43:33 +00:00
268d25f310
EVT_DM_POST_INIT_F only works in U-Boot proper, not SPL. Signed-off-by: Bin Meng <bmeng@tinylab.org> Reviewed-by: Simon Glass <sjg@chromium.org> Polish the wording a bit Reviewed-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
89 lines
3.2 KiB
ReStructuredText
89 lines
3.2 KiB
ReStructuredText
.. SPDX-License-Identifier: GPL-2.0+
|
|
|
|
Events
|
|
======
|
|
|
|
U-Boot supports a way for various events to be handled by interested
|
|
subsystems. This provide a generic way to handle 'hooks' like setting up the
|
|
CPUs after driver model is active, or reading a partition table after a new
|
|
block device is probed.
|
|
|
|
Rather than using weak functions and direct calls across subsystemss, it is
|
|
often easier to use an event.
|
|
|
|
An event consists of a type (e.g. EVT_DM_POST_INIT_F) and some optional data,
|
|
in `union event_data`. An event spy can be created to watch for events of a
|
|
particular type. When the event is created, it is sent to each spy in turn.
|
|
|
|
|
|
Declaring a spy
|
|
---------------
|
|
|
|
To declare a spy, use something like this::
|
|
|
|
static int snow_setup_cpus(void *ctx, struct event *event)
|
|
{
|
|
/* do something */
|
|
return 0;
|
|
}
|
|
EVENT_SPY(EVT_DM_POST_INIT_F, snow_setup_cpus);
|
|
|
|
This function is called when EVT_DM_POST_INIT_F is emitted, i.e. after the
|
|
driver model is initialized (in U-Boot proper before and after relocation).
|
|
|
|
|
|
Debugging
|
|
---------
|
|
|
|
To assist with debugging events, enable `CONFIG_EVENT_DEBUG` and
|
|
`CONFIG_CMD_EVENT`. The :doc:`../usage/cmd/event` command can then be used to
|
|
provide a spy list.
|
|
|
|
It is also possible to list spy information from the U-Boot executable,, using
|
|
the `event_dump.py` script::
|
|
|
|
$ scripts/event_dump.py /tmp/b/sandbox/u-boot
|
|
Event type Id Source location
|
|
-------------------- ------------------------------ ------------------------------
|
|
EVT_MISC_INIT_F f:sandbox_misc_init_f arch/sandbox/cpu/start.c:125
|
|
|
|
This shows each event spy in U-Boot, along with the event type, function name
|
|
(or ID) and source location.
|
|
|
|
Note that if `CONFIG_EVENT_DEBUG` is not enabled, the event ID is missing, so
|
|
the function is shown instead (with an `f:` prefix as above). Since the ID is
|
|
generally the same as the function name, this does not matter much.
|
|
|
|
The event type is decoded by the symbol used by U-Boot for the event linker
|
|
list. Symbols have the form::
|
|
|
|
_u_boot_list_2_evspy_info_2_EVT_MISC_INIT_F
|
|
|
|
so the event type can be read from the end. To manually list spy information
|
|
in an image, use $(CROSS_COMPILE)nm::
|
|
|
|
nm u-boot |grep evspy |grep list
|
|
00000000002d6300 D _u_boot_list_2_evspy_info_2_EVT_MISC_INIT_F
|
|
|
|
Logging is also available. Events use category `LOGC_EVENT`, so you can enable
|
|
logging on that, or add `#define LOG_DEBUG` to the top of `common/event.c` to
|
|
see events being sent.
|
|
|
|
|
|
Dynamic events
|
|
--------------
|
|
|
|
Static events provide a way of dealing with events known at build time. In some
|
|
cases we want to attach an event handler at runtime. For example, we may wish
|
|
to be notified when a particular device is probed or removed.
|
|
|
|
This can be handled by enabling `CONFIG_EVENT_DYNAMIC`. It is then possible to
|
|
call `event_register()` to register a new handler for a particular event.
|
|
|
|
Dynamic event handlers are called after all the static event spy handlers have
|
|
been processed. Of course, since dynamic event handlers are created at runtime
|
|
it is not possible to use the `event_dump.py` to see them.
|
|
|
|
At present there is no way to list dynamic event handlers from the command line,
|
|
nor to deregister a dynamic event handler. These features can be added when
|
|
needed.
|