SDAA104 September 2025 F29H850TU , F29H859TU-Q1
As explained in section 3.2, error address and program counter addresses can be used for debugging source of the error. This section showcases interpretation of error address and program counter taking esm multicore example (esm_ex1_cpu1_cpu3) from the F29 SDK.
The program counter (PC) address can be copied to the CCS disassembly view to find the source code where the error occurred. For this example, when looking at the corresponding PC address CCS disassembly view for the EAM captured PC address (0x10402C14) as shown in Figure 4-7, points to the data write operation to location 0x20000000 (M0 RAM) also logged in the High Priority Address register in EAM. Hence with the PC address and error address information, user can pin-point the issue to a specific CPU3 source code write operation to memory location that caused the error.
The error occurred on CPU3 DW (data write) bus which also matches the expected behavior from the code perspective since the CPU3 application code has write operation for the M0RAM_data to M0RAM which is not allowed from CPU3 code. CPU3 only has read data permission for M0RAM hence write operation in this case caused security violation error on CPU3 DW bus.
Figure 4-7 Disassembly View of Program
Counter| Memory | Interleaved | CPU1 | CPU2 | CPU3 | HSM | RTDMA1 | RTDMA2 |
|---|---|---|---|---|---|---|---|
| M0 RAM | Yes | 0WS data (read and write) | 0WS data (read-only) | 3WS data (read-only) | - | - | - |