On Wed, 21 Nov 2018 at 14:48, Thomas Abraham <[email protected]> wrote:
>
> Hi Ard,
>
> On Wed, Nov 21, 2018 at 5:31 PM Ard Biesheuvel
> <[email protected]> wrote:
> >
> > Align edk2-platform with upcoming changes to EDK2 to get rid of per-bank
> > NOR flash GUIDs.
> >
> > Ard Biesheuvel (3):
> >   Platform/ARM: replace hardcoded VenHW() device paths referring to NOR
> >     flash
> >   Silicon/SynQuacer: drop per-bank NOR flash GUIDs
> >   Platform/ARM: drop per-bank NOR flash GUIDs
> >
> >  Platform/ARM/JunoPkg/ArmJuno.dec                   |  2 +-
> >  Platform/ARM/JunoPkg/ArmJuno.dsc                   |  2 +-
> >  .../JunoPkg/Library/NorFlashJunoLib/NorFlashJuno.c |  2 --
> >  .../ARM/SgiPkg/Library/NorFlashLib/NorFlashLib.c   |  2 --
> >  Platform/ARM/SgiPkg/SgiPlatform.dsc                |  2 +-
> >  Platform/ARM/VExpressPkg/ArmVExpress-CTA15-A7.dsc  |  2 +-
> >  Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc       |  2 +-
> >  .../NorFlashArmVExpressLib/NorFlashArmVExpress.c   |  4 ----
> >  .../SynQuacer/Drivers/Fip006Dxe/NorFlashDxe.c      | 14 +++++++-------
> >  .../SynQuacer/Drivers/Fip006Dxe/NorFlashDxe.h      |  3 +++
> >  .../NorFlashSynQuacerLib/NorFlashSynQuacer.c       |  6 ------
> >  11 files changed, 15 insertions(+), 26 deletions(-)
>
> Tested this patch series and "[PATCH v2 0/5] ArmPlatformPkg,
> ArmVirtPkg: discover NOR flash banks from DTB" patch series on the
> Juno board. With these patches applied, the boot fails on Juno board
> with the following messages. I have not yet tried to debug the issue
> but wanted to let you know this.
>
> [...]
> Loading driver at 0x000F830C000 EntryPoint=0x000F831B2AC IScsiDxe.efi
> add-symbol-file
> /home/thopan01/devel/juno/uefi/uefi/edk2/Build/ArmJuno/DEBUG_GCC5/AARCH64/MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe/DEBUG/Udp4Dxe.dll
> 0xF8300000
> Loading driver at 0x000F82FF000 EntryPoint=0x000F8306DF0 Udp4Dxe.efi
> add-symbol-file
> /home/thopan01/devel/juno/uefi/uefi/edk2/Build/ArmJuno/DEBUG_GCC5/AARCH64/Platform/ARM/Drivers/FdtPlatformDxe/FdtPlatformDxe/DEBUG/FdtPlatformDxe.dll
> 0xF82EE000
> Loading driver at 0x000F82ED000 EntryPoint=0x000F82F76EC FdtPlatformDxe.efi
> Found image: fip in block 5.
> Found image: norkern in block 20.
> Found image: ramdisk.img in block 116.
> Found image: hdlcdclk in block 151.
> Found image: selftest in block 152.
> Found image: board.dtb in block 156.
> Found image: scp_bl1 in block 249.
> Found image: bl1 in block 251.
> Found image: startup.nsh in block 252.
> ASSERT [BootMonFs]
> /home/thopan01/devel/juno/uefi/uefi/edk2/MdePkg/Library/BaseLib/String.c(173):
> ((UINTN) String & 0x00000001) == 0
>

Hi Thomas,

Thanks for testing.

Could you please apply this patch and re-test:

--- a/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc
+++ b/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc
@@ -299,7 +299,7 @@
 !if $(TARGET) == RELEASE
   gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x21
 !else
-  gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x2f
+  gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x3f
 !endif

   #  DEBUG_INIT      0x00000001  // Initialization

This will produce a backtrace when an ASSERT() is triggered, and from
this we can figure out what the call stack looks like exactly (The
ASSERT() occurs in StrLen (), which is called with a misaligned
unicode string, but I cannot figure out where the call is made)

Please share the backtrace and all the .dlls listed in it if you can please.
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to