This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

TMDXIDK5718: ddr3 writing and reading

Part Number: TMDXIDK5718
Other Parts Discussed in Thread: TPIC2810

Hi,

I am trying to write to the locations in ddr3 it is showing like this.

root@am57xx-evm:/usr/include/linux# devmem2 0x4843E20A w 0x00000001             
/dev/mem opened.[  677.863057] ------------[ cut here ]------------             
[  677.868933] WARNING: CPU: 0 PID: 1163 at drivers/bus/omap_l3_noc.c:147 l3_int
errupt_handler+0x330/0x380                                                      
[  677.878371] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read)
: Data Access in User mode during Functional access                             
[  677.889984] Modules linked in: xfrm_user xfrm4_tunnel ipcomp xfrm_ipcomp esp4
 ah4 af_key xfrm_algo xhci_plat_hcd xhci_hcd rpmsg_proto rpmsg_rpc dwc3 udc_core
 ti_prueth pru_rproc pruss irq_pruss_intc snd_soc_omap_hdmi pvrsrvkm(O) c_can_pl
atform c_can ahci_platform libahci_platform can_dev pruss_soc_bus libahci omap_a
es_driver omap_sham libata omap_wdt phy_omap_usb2 ti_vip ti_vpe ti_sc ti_csc ti_
vpdma dwc3_omap rtc_omap omap_des gpio_pisosr omap_hdq rtc_palmas extcon_palmas
ov2659 des_generic v4l2_fwnode crypto_engine wire omap_crypto gpio_tpic2810 omap
_remoteproc virtio_rpmsg_bus remoteproc sch_fq_codel uio_module_drv(O) uio ftdi_
sio usbserial usbcore usb_common jailhouse(O) gdbserverproxy(O) cryptodev(O) cme
mk(O)                                                                           
[  677.953517] CPU: 0 PID: 1163 Comm: devmem2 Tainted: G           O      4.19.9
4-gbe5389fd85 #9                                                                
[  677.962078] Hardware name: Generic DRA72X (Flattened Device Tree)            
[  677.968197] Backtrace:                                                       
[  677.970662] [<c020ca34>] (dump_backtrace) from [<c020cd6c>] (show_stack+0x18/
0x1c)                                                                           
[  677.978269]  r7:c0dfdec4 r6:60060193 r5:00000000 r4:c12506dc                 
[  677.983961] [<c020cd54>] (show_stack) from [<c0a15124>] (dump_stack+0x9c/0xb0
)                                                                               
[  677.991219] [<c0a15088>] (dump_stack) from [<c022e100>] (__warn+0xdc/0xf8)   
[  677.998125]  r7:c0dfdec4 r6:00000009 r5:00000000 r4:ec7c7dbc                 
[  678.003812] [<c022e024>] (__warn) from [<c022dd38>] (warn_slowpath_fmt+0x50/0
x6c)                                                                            
[  678.011330]  r9:ef1f6840 r8:f0882564 r7:c0dfddf0 r6:c0dfdd30 r5:c0dfde94 r4:c
1204c48                                                                         
[  678.019111] [<c022dcec>] (warn_slowpath_fmt) from [<c056711c>] (l3_interrupt_
handler+0x330/0x380)                                                            
[  678.028022]  r3:ef1f5e80 r2:c0dfde94                                         
[  678.031612]  r5:00000002 r4:80080003                                         
[  678.035211] [<c0566dec>] (l3_interrupt_handler) from [<c02895ec>] (__handle_i
rq_event_percpu+0x68/0x140)                                                     
[  678.044735]  r10:c12522f8 r9:ef1f8c00 r8:00000017 r7:ec7c7ee8 r6:00000000 r5:
ef1f8c68                                                                        
[  678.052597]  r4:ef1fe340                                                     
[  678.055146] [<c0289584>] (__handle_irq_event_percpu) from [<c02896f8>] (handl
e_irq_event_percpu+0x34/0x88)                                                   
[  678.064843]  r10:00000004 r9:4843e20a r8:ef008000 r7:00000001 r6:ef1f8c00 r5:
ef1f8c68                                                                        
[  678.072706]  r4:c1204c48                                                     
[  678.075255] [<c02896c4>] (handle_irq_event_percpu) from [<c028978c>] (handle_
irq_event+0x40/0x64)                                                            
[  678.084166]  r6:c120a434 r5:ef1f8c68 r4:ef1f8c00                             
[  678.088808] [<c028974c>] (handle_irq_event) from [<c028d4dc>] (handle_fasteoi
_irq+0xc0/0x168)                                                                
[  678.097370]  r7:00000001 r6:c120a434 r5:ef1f8c68 r4:ef1f8c00                 
[  678.103056] [<c028d41c>] (handle_fasteoi_irq) from [<c02887e8>] (generic_hand
le_irq+0x2c/0x3c)                                                               
[  678.111706]  r7:00000001 r6:00000000 r5:00000000 r4:c1068cfc                 
[  678.117395] [<c02887bc>] (generic_handle_irq) from [<c0288e4c>] (__handle_dom
ain_irq+0x64/0xbc)                                                              
[  678.126135] [<c0288de8>] (__handle_domain_irq) from [<c0565458>] (gic_handle_
irq+0x44/0x80)                                                                  
[  678.134524]  r9:4843e20a r8:fa213000 r7:ec7c7fb0 r6:fa212000 r5:fa21200c r4:c
1205104                                                                         
[  678.142305] [<c0565414>] (gic_handle_irq) from [<c0201d68>] (__irq_usr+0x48/0
x60)                                                                            
[  678.149820] Exception stack(0xec7c7fb0 to 0xec7c7ff8)                        
[  678.154894] 7fa0:                                     beddda00 00010c10 00000
008 beddda00                                                                    
[  678.163109] 7fc0: 00021064 b6f58000 00001000 b6f58208 00000000 4843e20a 00000
004 bedddbf4                                                                    
[  678.171323] 7fe0: 00021048 beddd9e4 00021008 b6f40334 20060010 ffffffff      
[  678.177968]  r9:4843e20a r8:30c5387d r7:30c5387d r6:ffffffff r5:20060010 r4:b
6f40334                                                                         
[  678.185743] ---[ end trace 17fa80a143e6ef5e ]---                             
                                                                                
Memory mapped at address 0xb6f58000.                                            
[  678.190528] Unhandled fault: asynchronous external abort (0x1211) at 0x000000
00                                                                              
[  678.201270] pgd = c85016aa                                                   
[  678.203987] [00000000] *pgd=acc65003, *pmd=bac82003                          
Read at address  0x4843E20A (0xb6f58208): 0x00000000[  678.218421] ------------[
 cut here ]------------                                                         
[  678.227559] WARNING: CPU: 0 PID: 1163 at drivers/bus/omap_l3_noc.c:147 l3_int
errupt_handler+0x330/0x380                                                      
[  678.236991] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Idle)
: Data Access in User mode during Functional access                             
[  678.248600] Modules linked in: xfrm_user xfrm4_tunnel ipcomp xfrm_ipcomp esp4
 ah4 af_key xfrm_algo xhci_plat_hcd xhci_hcd rpmsg_proto rpmsg_rpc dwc3 udc_core
 ti_prueth pru_rproc pruss irq_pruss_intc snd_soc_omap_hdmi pvrsrvkm(O) c_can_pl
atform c_can ahci_platform libahci_platform can_dev pruss_soc_bus libahci omap_a
es_driver omap_sham libata omap_wdt phy_omap_usb2 ti_vip ti_vpe ti_sc ti_csc ti_
vpdma dwc3_omap rtc_omap omap_des gpio_pisosr omap_hdq rtc_palmas extcon_palmas
ov2659 des_generic v4l2_fwnode crypto_engine wire omap_crypto gpio_tpic2810 omap
_remoteproc virtio_rpmsg_bus remoteproc sch_fq_codel uio_module_drv(O) uio ftdi_
sio usbserial usbcore usb_common jailhouse(O) gdbserverproxy(O) cryptodev(O) cme
mk(O)                                                                           
[  678.312092] CPU: 0 PID: 1163 Comm: devmem2 Tainted: G        W  O      4.19.9
4-gbe5389fd85 #9                                                                
[  678.320649] Hardware name: Generic DRA72X (Flattened Device Tree)            
[  678.326764] Backtrace:                                                       
[  678.329222] [<c020ca34>] (dump_backtrace) from [<c020cd6c>] (show_stack+0x18/
0x1c)                                                                           
[  678.336822]  r7:c0dfdec4 r6:60060193 r5:00000000 r4:c12506dc                 
[  678.342508] [<c020cd54>] (show_stack) from [<c0a15124>] (dump_stack+0x9c/0xb0
)                                                                               
[  678.349761] [<c0a15088>] (dump_stack) from [<c022e100>] (__warn+0xdc/0xf8)   
[  678.356662]  r7:c0dfdec4 r6:00000009 r5:00000000 r4:ec7c7dbc                 
[  678.362344] [<c022e024>] (__warn) from [<c022dd38>] (warn_slowpath_fmt+0x50/0
x6c)                                                                            
[  678.369857]  r9:ef1f6840 r8:f0882564 r7:c0dfddf0 r6:c0dfdd30 r5:c0dfde94 r4:c
1204c48                                                                         
[  678.377633] [<c022dcec>] (warn_slowpath_fmt) from [<c056711c>] (l3_interrupt_
handler+0x330/0x380)                                                            
[  678.386540]  r3:ef1f5e80 r2:c0dfde94                                         
[  678.390126]  r5:00000000 r4:80080003                                         
[  678.393717] [<c0566dec>] (l3_interrupt_handler) from [<c02895ec>] (__handle_i
rq_event_percpu+0x68/0x140)                                                     
[  678.403235]  r10:c12522f8 r9:ef1f8c00 r8:00000017 r7:ec7c7ee8 r6:00000000 r5:
ef1f8c68                                                                        
[  678.411093]  r4:ef1fe340                                                     
[  678.413637] [<c0289584>] (__handle_irq_event_percpu) from [<c02896f8>] (handl
e_irq_event_percpu+0x34/0x88)                                                   
[  678.423329]  r10:00000001 r9:4843e20a r8:ef008000 r7:00000001 r6:ef1f8c00 r5:
ef1f8c68                                                                        
[  678.431187]  r4:c1204c48                                                     
[  678.433730] [<c02896c4>] (handle_irq_event_percpu) from [<c028978c>] (handle_
irq_event+0x40/0x64)                                                            
[  678.442636]  r6:c120a434 r5:ef1f8c68 r4:ef1f8c00                             
[  678.447272] [<c028974c>] (handle_irq_event) from [<c028d4dc>] (handle_fasteoi
_irq+0xc0/0x168)                                                                
[  678.455831]  r7:00000001 r6:c120a434 r5:ef1f8c68 r4:ef1f8c00                 
[  678.461512] [<c028d41c>] (handle_fasteoi_irq) from [<c02887e8>] (generic_hand
le_irq+0x2c/0x3c)                                                               
[  678.470157]  r7:00000001 r6:00000000 r5:00000000 r4:c1068cfc                 
[  678.475840] [<c02887bc>] (generic_handle_irq) from [<c0288e4c>] (__handle_dom
ain_irq+0x64/0xbc)                                                              
[  678.484575] [<c0288de8>] (__handle_domain_irq) from [<c0565458>] (gic_handle_
irq+0x44/0x80)                                                                  
[  678.492960]  r9:4843e20a r8:fa213000 r7:ec7c7fb0 r6:fa212000 r5:fa21200c r4:c
1205104                                                                         
[  678.500736] [<c0565414>] (gic_handle_irq) from [<c0201d68>] (__irq_usr+0x48/0
x60)                                                                            
[  678.508247] Exception stack(0xec7c7fb0 to 0xec7c7ff8)                        
[  678.513318] 7fa0:                                     beddd910 fbad8000 00000
000 00000000                                                                    
[  678.521528] 7fc0: 00000000 beddd910 ffffffff beddd9e0 beddda00 4843e20a 00000
001 00000001                                                                    
[  678.529738] 7fe0: 00021048 beddd8f8 b6e3e4a0 b6e3e4f8 a0060010 ffffffff      
[  678.536379]  r9:4843e20a r8:30c5387d r7:30c5387d r6:ffffffff r5:a0060010 r4:b
6e3e4f8                                                                         
[  678.544150] ---[ end trace 17fa80a143e6ef5f ]---                             
                                                                                
Write at address 0x4843E20A (0xb6f58208): 0x00000001, readback 0x00000001

after writing when i try to read it is showing all zeros in that location. I am using 6.03.00.106 sdk using linux.

anyone can guide me to get out from this.

regards

K.Bhardwaj