The fault address is 0x00000004AC100004. Is that in the address range of the GIC for this platform? What does that Physical address map to you on the STM32MP25?Thanks,Andrew FishOn Apr 21, 2024, at 10:07 PM, Ba Gia Bao Phan <phanbagiabao2001@gmail.com> wrote:Hi Everyone,
I'm working on a project with edk2, and these guys are trying to port edk2 to STM32MP25 platforms. I had no issue compiling and booting the image on my device. Then I've come across an issue at very early stages of booting. I was given a Synchronous Exception listed briefly below.
Synchronous Exception at 0x000000010A63501C
PC 0x00010A63501C (0x00010A633000+0x0000201C) [ 0] ArmGicDxe.dll
PC 0x00010A6350CC (0x00010A633000+0x000020CC) [ 0] ArmGicDxe.dll
PC 0x00010A63657C (0x00010A633000+0x0000357C) [ 0] ArmGicDxe.dll
PC 0x00010A85853C (0x00010A851000+0x0000753C) [ 1] DxeCore.dll
PC 0x00010A8666DC (0x00010A851000+0x000156DC) [ 1] DxeCore.dll
PC 0x00010A85BF14 (0x00010A851000+0x0000AF14) [ 1] DxeCore.dll
PC 0x000084006EBC
PC 0x00008400700C
[ 0] /local/home/phanbagi/Documents/RPi3/Build/STM32MP25/DEBUG_GCC5/AARCH64/ArmPkg/Drivers/ArmGic/ArmGicDxe/DEBUG/ArmGicDxe.dll
[ 1] /local/home/phanbagi/Documents/RPi3/Build/STM32MP25/DEBUG_GCC5/AARCH64/MdeModulePkg/Core/Dxe/DxeMain/DEBUG/DxeCore.dll
X0 0x00000004AC100004 X1 0x0000000000000000 X2 0x0000000000000000 X3 0x4F46A76E3FDDA605
X4 0x083D1B53F41229AD X5 0x00000000003CF238 X6 0x0000000000000080 X7 0x0000000000000000
X8 0x000000010A850688 X9 0x0000000400000000 X10 0x0000000109E9F000 X11 0x000000010A297FFF
X12 0x0000000000000000 X13 0x000000000000000E X14 0x00000000000000FF X15 0x0000000000000002
X16 0x000000010AFFFAD0 X17 0x0000000000395790 X18 0x0000000000000000 X19 0x00000004AC100004
X20 0x000000010A638000 X21 0x000000010A638000 X22 0x000000010A638000 X23 0x000000010A6380A8
X24 0x000000010A876448 X25 0x000000010A873026 X26 0x000000010A877000 X27 0x800000000000000E
X28 0x0000000000000001 FP 0x000000010AFFFA50 LR 0x000000010A6350CC
V0 0xAFAFAFAFAFAFAFAF AFAFAFAFAFAFAFAF V1 0xFFFFFF80FFFFFFD0 000000010AFFFA30
V2 0x00000007AAAA0000 000000000E001858 V3 0x0000100000000000 0000000000000100
V4 0x0000000000000000 0000000000000000 V5 0x0000000000000000 0000000000000000
V6 0x0000000000000000 0000000000000000 V7 0x0000000000000000 0000000000000000
V8 0x0000000000000000 0000000000000000 V9 0x0000000000000000 0000000000000000
V10 0x0000000000000000 0000000000000000 V11 0x0000000000000000 0000000000000000
V12 0x0000000000000000 0000000000000000 V13 0x0000000000000000 0000000000000000
V14 0x0000000000000000 0000000000000000 V15 0x0000000000000000 0000000000000000
V16 0x6145998C70863CB0 9004002B4AC68640 V17 0x646586E820A5D596 AA30249EC11F1469
V18 0x5756252D20E5B421 336EEAEC2122B3AB V19 0x6285C083AAECD063 020A72C37700322A
V20 0x40846C68BA2085FB 20966526601C44BB V21 0x818208204CD0A89D 6D84E94813E14B24
V22 0x2362CBA9962AF073 E83ED49CD4A13F98 V23 0x0C1123CD73F5C5B0 C3E9222891467015
V24 0x02B1194895858177 1B028BE1A860D73B V25 0x542AB00936183D90 752F1D1CCC4D2345
V26 0x03D02013962356F3 0CCA6F83842045EA V27 0x9DF9D2A28D44915E 2892460B223FD84C
V28 0x61A2CC120A809CD8 AC33034803D74C10 V29 0x7A1089709810B030 88B3298EEB68B450
V30 0xD20F81310E0896C0 20E2BA370E2AC6F9 V31 0x6C3BBEA030B2BB50 2C2A91AAF201EF50
SP 0x000000010AFFFA50 ELR 0x000000010A63501C SPSR 0x400003C5 FPSR 0x00000000
ESR 0x96000005 FAR 0x00000004AC100004
ESR : EC 0x25 IL 0x1 ISS 0x00000005
Data abort: Translation fault, first level
By using objdump to determine where the wrong source code is, I found out that the program stopped around the code below.
UINT32
EFIAPI
MmioRead32 (
IN UINTN Address
)
{
UINT32 Value;
BOOLEAN Flag;
ASSERT ((Address & 3) == 0);
Flag = FilterBeforeMmIoRead (FilterWidth32, Address, &Value);
if (Flag) {
MemoryFence ();
if (IsTdxGuest ()) {
Value = TdMmioRead32 (Address);
} else {
Value = *(volatile UINT32 *)Address;
}
MemoryFence ();
}
FilterAfterMmIoRead (FilterWidth32, Address, &Value);
return Value;
}
Output of objdump:
UINT32
EFIAPI
MmioRead32 (
IN UINTN Address
)
{
1fec: a9be7bfd stp x29, x30, [sp, #-32]!
1ff0: 910003fd mov x29, sp
1ff4: f9000bf3 str x19, [sp, #16]
1ff8: aa0003f3 mov x19, x0
UINT32 Value;
BOOLEAN Flag;
ASSERT ((Address & 3) == 0);
1ffc: f240041f tst x0, #0x3
2000: 540000e0 b.eq 201c <MmioRead32+0x30> // b.none
2004: b0000002 adrp x2, 3000 <MmioAndThenOr32.isra.0>
2008: b0000000 adrp x0, 3000 <MmioAndThenOr32.isra.0>
200c: 913ac442 add x2, x2, #0xeb1
2010: 913b1000 add x0, x0, #0xec4
2014: d2804461 mov x1, #0x223 // #547
2018: 97ffff7a bl 1e00 <DebugAssert>
Flag = FilterBeforeMmIoRead (FilterWidth32, Address, &Value);
if (Flag) {
Value = *(volatile UINT32 *)Address;
201c: b9400260 ldr w0, [x19]
}
FilterAfterMmIoRead (FilterWidth32, Address, &Value);
return Value;
}Thanks--PHAN Ba Gia BaoEtudiant en 5A STI - INSA Centre Val de Loire
You receive all messages sent to this group.
View/Reply Online (#118303) |
|
Mute This Topic
| New Topic
Your Subscription |
Contact Group Owner |
Unsubscribe
[rebecca@openfw.io]