HSE_ReadAdkp returning HSE_SRV_RSP_INVALID_ADDR

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 
已解决

HSE_ReadAdkp returning HSE_SRV_RSP_INVALID_ADDR

跳至解决方案
1,172 次查看
Bhushan1312
Contributor I

Hello Team,

I am trying to set ADKP for S32K314 platform.

Though I am able to confirm HSE Flag Enabled and HSE FW Version using below functions:

HSEFwFlg = checkHseFwFeatureFlagEnabled();
 
(void)HSE_GetVersion_Example(&gHseFwVersion);
 
I am getting HSE_SRV_RSP_INVALID_ADDR (0x55A5A26AUL) for check_DebugPasswordProgrammed_Status() function where HSE_ReadAdkp() is called. I guess expected response when ADKP is not programmed is HSE_SRV_RSP_NOT_ALLOWED.
 
Please guide me in this.
 
Thanks,
 
Bhushan
0 项奖励
回复
1 解答
1,131 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Hi @Bhushan1312 

Yes, I confirmed that reading of HSE_APP_DEBUG_KEY_ATTR_ID will return error code HSE_SRV_RSP_NOT_ALLOWED when ADKP is not programmed yet.

Try to disable data cache to see if it makes a difference. All data objects used for communication with HSE must be forced to non-cacheable memory and it is quite common root cause.

Also notice that HSE can’t see DTCM memory at 0x2000_0000. This address range is visible only for core. HSE can see only DTCM backdoor addresses at 0x2100_0000. My recommendation is to use only normal RAM for communication with HSE, not DTCM.

There’s an option to enable DTCM support in Autosar Crypto driver. Then the driver checks all used addresses and it adds corresponding offset when necessary. If Crypto driver is not used, this is up to user. The best option is  - do not use DTCM for communication with HSE.

Regards,

Lukas

在原帖中查看解决方案

0 项奖励
回复
2 回复数
1,132 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Hi @Bhushan1312 

Yes, I confirmed that reading of HSE_APP_DEBUG_KEY_ATTR_ID will return error code HSE_SRV_RSP_NOT_ALLOWED when ADKP is not programmed yet.

Try to disable data cache to see if it makes a difference. All data objects used for communication with HSE must be forced to non-cacheable memory and it is quite common root cause.

Also notice that HSE can’t see DTCM memory at 0x2000_0000. This address range is visible only for core. HSE can see only DTCM backdoor addresses at 0x2100_0000. My recommendation is to use only normal RAM for communication with HSE, not DTCM.

There’s an option to enable DTCM support in Autosar Crypto driver. Then the driver checks all used addresses and it adds corresponding offset when necessary. If Crypto driver is not used, this is up to user. The best option is  - do not use DTCM for communication with HSE.

Regards,

Lukas

0 项奖励
回复
1,104 次查看
Bhushan1312
Contributor I

Thank You @lukaszadrapa ..

I moved HSE related data variables to Non-Cacheable SRAM and it worked for me.

 

0 项奖励
回复
%3CLINGO-SUB%20id%3D%22lingo-sub-2263698%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3EHSE_ReadAdkp%20%E8%BF%94%E5%9B%9E%20HSE_SRV_RSP_INVALID_ADDR%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2263698%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%E4%BD%A0%E5%A5%BD%EF%BC%8C%E5%9B%A2%E9%98%9F%E3%80%81%3C%2FP%3E%3CP%3E%E6%88%91%E6%AD%A3%E5%9C%A8%E5%B0%9D%E8%AF%95%E4%B8%BA%20S32K314%20%E5%B9%B3%E5%8F%B0%E8%AE%BE%E7%BD%AE%20ADKP%E3%80%82%3C%2FP%3E%3CP%3E%E8%99%BD%E7%84%B6%E6%88%91%E5%8F%AF%E4%BB%A5%E4%BD%BF%E7%94%A8%E4%BB%A5%E4%B8%8B%E5%8A%9F%E8%83%BD%E7%A1%AE%E8%AE%A4%20HSE%20%E6%A0%87%E8%AE%B0%E5%B7%B2%E5%90%AF%E7%94%A8%E5%92%8C%20HSE%20FW%20%E7%89%88%E6%9C%AC%EF%BC%9A%3C%2FP%3E%3CDIV%3E%3CSPAN%3EHSEFwFlg%20%3D%20checkHseFwFeatureFlagEnabled()%EF%BC%9B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E(void)HSE_GetVersion_Example(%26amp%3BgHseFwVersion)%EF%BC%9B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%E5%9C%A8%E8%B0%83%E7%94%A8%20HSE_ReadAdkp()%20%E7%9A%84%20check_DebugPasswordProgrammed_Status()%20%E5%87%BD%E6%95%B0%E4%B8%AD%EF%BC%8C%E6%88%91%E6%A3%80%E6%B5%8B%E5%88%B0%20HSE_SRV_RSP_INVALID_ADDR%20(0x55A5A26AUL)%E3%80%82%E6%88%91%E7%8C%9C%20ADKP%20%E6%9C%AA%E7%BC%96%E7%A8%8B%E6%97%B6%E7%9A%84%E9%A2%84%E6%9C%9F%E5%93%8D%E5%BA%94%E6%98%AF%20HSE_SRV_RSP_NOT_ALLOWED%E3%80%82%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%E8%AF%B7%E4%B8%BA%E6%88%91%E6%8C%87%E7%82%B9%E8%BF%B7%E6%B4%A5%E3%80%82%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%E8%B0%A2%E8%B0%A2%EF%BC%81%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%E5%B8%83%E5%B0%9A%3C%2FSPAN%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2264487%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20HSE_ReadAdkp%20returning%20HSE_SRV_RSP_INVALID_ADDR%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2264487%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%3CSPAN%3E%E4%BD%A0%E5%A5%BD%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F258016%22%20target%3D%22_blank%22%3E%40Bhushan1312%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%E6%98%AF%E7%9A%84%EF%BC%8C%E6%88%91%E7%A1%AE%E8%AE%A4%20%3C%2FSPAN%3E%3CSPAN%3E%E5%BD%93%20ADKP%20%E5%B0%9A%E6%9C%AA%E7%BC%96%E7%A8%8B%E6%97%B6%EF%BC%8C%3C%2FSPAN%3E%E8%AF%BB%E5%8F%96%20HSE_APP_DEBUG_KEY_ATTR_ID%20%E5%B0%86%E8%BF%94%E5%9B%9E%E9%94%99%E8%AF%AF%E4%BB%A3%E7%A0%81%20HSE_SRV_RSP_NOT_ALLOWED%E3%80%82%3C%2FP%3E%0A%3CP%3E%E5%B0%9D%E8%AF%95%E7%A6%81%E7%94%A8%E6%95%B0%E6%8D%AE%E7%BC%93%E5%AD%98%EF%BC%8C%E7%9C%8B%E7%9C%8B%E6%98%AF%E5%90%A6%E4%BC%9A%E6%9C%89%E5%BD%B1%E5%93%8D%E3%80%82%E7%94%A8%E4%BA%8E%E4%B8%8E%20HSE%20%E9%80%9A%E4%BF%A1%E7%9A%84%E6%89%80%E6%9C%89%E6%95%B0%E6%8D%AE%E5%AF%B9%E8%B1%A1%E9%83%BD%E5%BF%85%E9%A1%BB%E5%BC%BA%E5%88%B6%E4%BD%BF%E7%94%A8%E9%9D%9E%E9%AB%98%E9%80%9F%E7%BC%93%E5%AD%98%E5%86%85%E5%AD%98%EF%BC%8C%E8%BF%99%E6%98%AF%E4%B8%80%E4%B8%AA%E7%9B%B8%E5%BD%93%E5%B8%B8%E8%A7%81%E7%9A%84%E6%A0%B9%E6%9C%AC%E5%8E%9F%E5%9B%A0%E3%80%82%3C%2FP%3E%0A%3CP%3E%E8%BF%98%E6%B3%A8%E6%84%8F%E5%88%B0%20HSE%20%E6%97%A0%E6%B3%95%E7%9C%8B%E5%88%B0%E4%BD%8D%E4%BA%8E%200x2000_0000%20%E7%9A%84%20DTCM%20%E5%86%85%E5%AD%98%E3%80%82%E8%AF%A5%E5%9C%B0%E5%9D%80%E8%8C%83%E5%9B%B4%E5%8F%AA%E5%AF%B9%E6%A0%B8%E5%BF%83%E5%8F%AF%E8%A7%81%E3%80%82HSE%20%E5%8F%AA%E8%83%BD%E7%9C%8B%E5%88%B0%200x2100_0000%20%E7%9A%84%20DTCM%20%E5%90%8E%E9%97%A8%E5%9C%B0%E5%9D%80%E3%80%82%E6%88%91%E7%9A%84%E5%BB%BA%E8%AE%AE%E6%98%AF%E5%8F%AA%E4%BD%BF%E7%94%A8%E6%99%AE%E9%80%9A%20RAM%20%E4%B8%8E%20HSE%20%E9%80%9A%E4%BF%A1%EF%BC%8C%E8%80%8C%E4%B8%8D%E6%98%AF%20DTCM%E3%80%82%3C%2FP%3E%0A%3CP%3EAutosar%20Crypto%20%E9%A9%B1%E5%8A%A8%E7%A8%8B%E5%BA%8F%E4%B8%AD%E6%9C%89%E4%B8%80%E4%B8%AA%E5%90%AF%E7%94%A8%20DTCM%20%E6%94%AF%E6%8C%81%E7%9A%84%E9%80%89%E9%A1%B9%E3%80%82%E7%84%B6%E5%90%8E%EF%BC%8C%E9%A9%B1%E5%8A%A8%E7%A8%8B%E5%BA%8F%E4%BC%9A%E6%A3%80%E6%9F%A5%E6%89%80%E6%9C%89%E4%BD%BF%E7%94%A8%E8%BF%87%E7%9A%84%E5%9C%B0%E5%9D%80%EF%BC%8C%E5%B9%B6%E5%9C%A8%E5%BF%85%E8%A6%81%E6%97%B6%E6%B7%BB%E5%8A%A0%E7%9B%B8%E5%BA%94%E7%9A%84%E5%81%8F%E7%A7%BB%E9%87%8F%E3%80%82%E5%A6%82%E6%9E%9C%E4%B8%8D%E4%BD%BF%E7%94%A8%20Crypto%20%E9%A9%B1%E5%8A%A8%E7%A8%8B%E5%BA%8F%EF%BC%8C%E5%88%99%E7%94%B1%E7%94%A8%E6%88%B7%E8%87%AA%E8%A1%8C%E5%86%B3%E5%AE%9A%E3%80%82%E6%9C%80%E5%A5%BD%E7%9A%84%E9%80%89%E6%8B%A9%E6%98%AF%EF%BC%9A%E4%B8%8D%E4%BD%BF%E7%94%A8%20DTCM%20%E4%B8%8E%20HSE%20%E9%80%9A%E4%BF%A1%E3%80%82%3C%2FP%3E%0A%3CP%3E%E6%AD%A4%E8%87%B4%EF%BC%8C%3C%2FP%3E%0A%3CP%3ELukas%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2265702%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20HSE_ReadAdkp%20returning%20HSE_SRV_RSP_INVALID_ADDR%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2265702%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%E6%84%9F%E8%B0%A2%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F37795%22%20target%3D%22_blank%22%3E%40lukaszadrapa%3C%2FA%3E...%3C%2FP%3E%3CP%3E%E6%88%91%E5%B0%86%E4%B8%8E%20HSE%20%E7%9B%B8%E5%85%B3%E7%9A%84%E6%95%B0%E6%8D%AE%E5%8F%98%E9%87%8F%E7%A7%BB%E5%88%B0%E4%BA%86%E9%9D%9E%E9%AB%98%E9%80%9F%E7%BC%93%E5%AD%98%20SRAM%20%E4%B8%AD%EF%BC%8C%E7%BB%93%E6%9E%9C%E6%88%90%E5%8A%9F%E4%BA%86%E3%80%82%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E