<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>S32KのトピックRe: S32K312 TCM backdoor acess method problem</title>
    <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913879#M37997</link>
    <description>&lt;P&gt;The XBIC is sub-module verifying the integrity of the attribute information for XBAR transfers using an Error Detection Code (EDC). The XBIC integrity checking is independent from the memory's ECC that covers the address and data.&lt;/P&gt;
&lt;P&gt;For ECC error injection to the TCM data use EIM to simulate fault reading.&lt;/P&gt;
&lt;P&gt;According Table 264.EIM channel mapping - S32K3x1, S32K3x2, S32K344/S32K324/S32K314&lt;/P&gt;
&lt;P&gt;you may inject ECC error to frontdoor read access (channels 13-18) as well as to backdoor read access (channel 20).&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jul 2024 07:07:12 GMT</pubDate>
    <dc:creator>davidtosenovjan</dc:creator>
    <dc:date>2024-07-23T07:07:12Z</dc:date>
    <item>
      <title>S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1909608#M37755</link>
      <description>&lt;P&gt;Hello NXP experts,&lt;/P&gt;&lt;P&gt;As listed in RM&amp;nbsp;21 / 4649,&amp;nbsp;Figure 6. Block diagram – S32K312,&amp;nbsp; No backdoor access method available for CM7_0, but in the memory map, there'are TCM back door address.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="feman5012_0-1721120612414.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/288734i95B5084E95F76BE7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="feman5012_0-1721120612414.png" alt="feman5012_0-1721120612414.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="feman5012_1-1721120728452.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/288735i78FB390310E725EA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="feman5012_1-1721120728452.png" alt="feman5012_1-1721120728452.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And I can access the ITCM backdoor address, to change value of variables. &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;My question is&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;for S32K312, M7_0 core accessing TCM backdoor is realized by direct mode instead of backdoor mode, as you can see no backdoor switch is listed in the block diagram&lt;/STRONG&gt;&lt;/FONT&gt;, while like&amp;nbsp;&lt;/P&gt;&lt;P&gt;the blelow chips, there're rea switches around the TCM for user to select the backdoor mode.&lt;/P&gt;&lt;P&gt;page 22 / 4649, Figure 7. Block diagram – S32K322, S32K342 and S32K341,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="feman5012_2-1721120948337.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/288736i04EA3069790D9BB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="feman5012_2-1721120948337.png" alt="feman5012_2-1721120948337.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look forward&amp;nbsp; to your professional response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 09:11:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1909608#M37755</guid>
      <dc:creator>feman5012</dc:creator>
      <dc:date>2024-07-16T09:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1912231#M37849</link>
      <description>&lt;P&gt;Red arrows do no show backdoor access, it shows running in split-lock configuration i.e. running in decoupled or lockstep mode.&lt;/P&gt;
&lt;P&gt;Backdoor access marked below by yellow:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="davidtosenovjan_1-1721387817996.png" style="width: 569px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/289400i1E846932345A21DE/image-dimensions/569x547?v=v2" width="569" height="547" role="button" title="davidtosenovjan_1-1721387817996.png" alt="davidtosenovjan_1-1721387817996.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 11:19:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1912231#M37849</guid>
      <dc:creator>davidtosenovjan</dc:creator>
      <dc:date>2024-07-19T11:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913553#M37974</link>
      <description>&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get your point. Previously I misunderstood the backdoor path. The reason I'm curious about the backdoor access method is dueo to&amp;nbsp;&amp;nbsp;the TCM error injection.&amp;nbsp; TCM error inejction will use the backdoor address to write and read the same address. During this write and read, Specific EIM channel will invert 1 bit in the data path or address path, and XBIC will detect this kind of error thru the below red marked " &lt;SPAN class=""&gt;Crossbar Integrity Checker (TCM backdoor AHB Splitter)&lt;/SPAN&gt;", the below picture is truncted from&amp;nbsp;Figure 7. Block diagram – S32K322, S32K342 and S32K341, page&amp;nbsp;22 / 4649.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="feman5012_0-1721615666138.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/289533iAA35AC7F71867DFE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="feman5012_0-1721615666138.png" alt="feman5012_0-1721615666138.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However for&amp;nbsp;Figure 6. Block diagram – S32K312, no&amp;nbsp;Crossbar Integrity Checker (TCM backdoor AHB Splitter), does this mean no real detection in XBIC side for S32K312 EIM for TCM write and read?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="feman5012_1-1721616030708.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/289537i88C88F9E172B7F2C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="feman5012_1-1721616030708.png" alt="feman5012_1-1721616030708.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 02:47:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913553#M37974</guid>
      <dc:creator>feman5012</dc:creator>
      <dc:date>2024-07-22T02:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913879#M37997</link>
      <description>&lt;P&gt;The XBIC is sub-module verifying the integrity of the attribute information for XBAR transfers using an Error Detection Code (EDC). The XBIC integrity checking is independent from the memory's ECC that covers the address and data.&lt;/P&gt;
&lt;P&gt;For ECC error injection to the TCM data use EIM to simulate fault reading.&lt;/P&gt;
&lt;P&gt;According Table 264.EIM channel mapping - S32K3x1, S32K3x2, S32K344/S32K324/S32K314&lt;/P&gt;
&lt;P&gt;you may inject ECC error to frontdoor read access (channels 13-18) as well as to backdoor read access (channel 20).&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 07:07:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913879#M37997</guid>
      <dc:creator>davidtosenovjan</dc:creator>
      <dc:date>2024-07-23T07:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913962#M38001</link>
      <description>&lt;P&gt;&amp;nbsp;Hello David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your reply.&amp;nbsp; My question orgins from the SAF package&amp;nbsp;S32K3_SAF_1.0.4_D2312, I integrate it into S32K312 product.&amp;nbsp; As you know only&amp;nbsp; 344, 358, 388 are tested and provided with demo. While sCheck&amp;nbsp; item, for S32K312,&amp;nbsp;&lt;SPAN&gt;SCHECK_EDC_GASKETS_CM7_0 fails. For this check item, there're 6 sub item, 2 of 6, listed below really fail, others pass. I trace the code, everything is OK, and the configuration is set per the code. However for the below 2 items, the EIM injects the error, but no fault reported, it seems like the&amp;nbsp; ECC or EDC mechanism does not work. The below 2 items uses the ITCM backdoor address to inject the error, EIM channel used is 28, and 29.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;/* TCM CM7_0 32-bit address checker */&lt;BR /&gt;{&lt;BR /&gt;SCHECK_EDC_ADDR_CHECK_EIM_CHAN_ID, /* u8EimChannelId */&lt;BR /&gt;sCheck_Edc_au8Tcm0_32b_AddrCheckBits, /* pu8EimDataBits */&lt;BR /&gt;SCHECK_EDC_MSCM_CM7_0_TCM_BD_ADDR, /* u8MscmEnedcIdx */&lt;BR /&gt;EMCEM_DCM_NCF_1_AD_EDC_ERR_OUT, /* u8FaultId */&lt;BR /&gt;sCheck_Edc_Core_Read_TCM /* pfTest */&lt;BR /&gt;},&lt;/P&gt;&lt;P&gt;/* TCM CM7_0 write checker */&lt;BR /&gt;{&lt;BR /&gt;SCHECK_EDC_WDATA_CHECK_EIM_CHAN_ID, /* u8EimChannelId */&lt;BR /&gt;sCheck_Edc_au8Tcm0_32b_WriteCheckBits, /* pu8EimDataBits */&lt;BR /&gt;SCHECK_EDC_MSCM_CM7_0_TCM_BD_WRITE, /* u8MscmEnedcIdx */&lt;BR /&gt;EMCEM_DCM_NCF_1_WR_EDC_ERR_OUT, /* u8FaultId */&lt;BR /&gt;sCheck_Edc_Core_Write_TCM /* pfTest */&lt;BR /&gt;},&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Based on your above reply, I guess channel 20 maybe used for this kind of error. There're bug hidden in&amp;nbsp;S32K3_SAF_1.0.4_D2312 for the above 2 check item.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;you may inject ECC error to frontdoor read access (channels 13-18) as well as to backdoor read access (channel 20).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 09:52:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1913962#M38001</guid>
      <dc:creator>feman5012</dc:creator>
      <dc:date>2024-07-22T09:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1916038#M38157</link>
      <description>&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We consult the local NXP FAE, there're some error data in the RM, and the SAF 1.0.3 implements the wrong configuration. Thanks for your reply again.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 09:53:35 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/1916038#M38157</guid>
      <dc:creator>feman5012</dc:creator>
      <dc:date>2024-07-24T09:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: S32K312 TCM backdoor acess method problem</title>
      <link>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/2033259#M45408</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/204922"&gt;@feman5012&lt;/a&gt;&amp;nbsp; &amp;nbsp;Hi , i got the same result when i tried to make ED_gaskets_CM7_0 test on S32k312.&lt;BR /&gt;&lt;BR /&gt;Did you get any solution from NXP ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 14:46:41 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/S32K312-TCM-backdoor-acess-method-problem/m-p/2033259#M45408</guid>
      <dc:creator>mohamed_abdelrazek13</dc:creator>
      <dc:date>2025-01-23T14:46:41Z</dc:date>
    </item>
  </channel>
</rss>

