
MCASP_PDIR:
root@am57xx-evm:~# devmem2 0x48468014
/dev/mem opened.
[   74.585102] ------------[ cut here ]------------
[   74.591236] WARNING: CPU: 0 PID: 864 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x248/0x34c()
[   74.600759] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[   74.612369] Modules linked in: ipv6 gdbserverproxy(O) cryptodev(O) cmemk(O) omapdrm_pvr(O) evdev snd_soc_simple_card joydev snd_soc_tlv320)
[   74.633384] CPU: 0 PID: 864 Comm: devmem2 Tainted: G           O    4.1.13-g8dc6617 #108
[   74.641507] Hardware name: Generic DRA72X (Flattened Device Tree)
[   74.647623] Backtrace: 
[   74.650095] [<c0013018>] (dump_backtrace) from [<c001323c>] (show_stack+0x18/0x1c)
[   74.657694]  r7:c030ff28 r6:00000093 r5:c09edc8c r4:00000000
[   74.663417] [<c0013224>] (show_stack) from [<c0701b3c>] (dump_stack+0x9c/0xdc)
[   74.670675] [<c0701aa0>] (dump_stack) from [<c0039748>] (warn_slowpath_common+0x88/0xb8)
[   74.678797]  r5:00000009 r4:ec841e00
[   74.682405] [<c00396c0>] (warn_slowpath_common) from [<c00397b0>] (warn_slowpath_fmt+0x38/0x40)
[   74.691138]  r8:c08d528c r7:00000002 r6:ee963510 r5:c08d534c r4:c08d53f0
[   74.697910] [<c003977c>] (warn_slowpath_fmt) from [<c030ff28>] (l3_interrupt_handler+0x248/0x34c)
[   74.706817]  r3:ee963380 r2:c08d53f0
[   74.710419]  r4:80080003
[   74.712975] [<c030fce0>] (l3_interrupt_handler) from [<c0079ac4>] (handle_irq_event_percpu+0x80/0x13c)
[   74.722318]  r10:c0a1e569 r9:ee949780 r8:00000017 r7:00000000 r6:00000000 r5:ee9497e0
[   74.730218]  r4:ee963880
[   74.732772] [<c0079a44>] (handle_irq_event_percpu) from [<c0079bc4>] (handle_irq_event+0x44/0x64)
[   74.741679]  r10:be83bb14 r9:00000003 r8:ee806000 r7:00000000 r6:ee963880 r5:ee9497e0
[   74.749579]  r4:ee949780
[   74.752133] [<c0079b80>] (handle_irq_event) from [<c007c8f0>] (handle_fasteoi_irq+0xb8/0x17c)
[   74.760692]  r7:00000000 r6:c09d5dfc r5:ee9497e0 r4:ee949780
[   74.766409] [<c007c838>] (handle_fasteoi_irq) from [<c0079128>] (generic_handle_irq+0x34/0x44)
[   74.775054]  r7:00000000 r6:00000000 r5:00000017 r4:00000017
[   74.780770] [<c00790f4>] (generic_handle_irq) from [<c0079400>] (__handle_domain_irq+0x64/0xbc)
[   74.789503]  r5:00000017 r4:c09cad2c
[   74.793109] [<c007939c>] (__handle_domain_irq) from [<c00094ac>] (gic_handle_irq+0x2c/0x64)
[   74.801492]  r9:00000003 r8:30c5387d r7:fa212000 r6:ec841fb0 r5:c09d0950 r4:fa21200c
[   74.809312] [<c0009480>] (gic_handle_irq) from [<c0708428>] (__irq_usr+0x48/0x60)
[   74.816823] Exception stack(0xec841fb0 to 0xec841ff8)
[   74.821896] 1fa0:                                     b6fab960 00000078 00020e74 0001057c
[   74.830110] 1fc0: 000105f4 b6fa7000 00020f78 48468014 00000002 00000003 be83bb14 b6fa7014
[   74.838321] 1fe0: 00020f5c be83baa8 00010400 b6f8da8c 000b0030 ffffffff
[   74.844960]  r7:30c5387d r6:ffffffff r5:000b0030 r4:b6f8da8c
[   74.850673] ---[ end trace 8c645446aaf99540 ]---

Memory mapped at address 0xb6fa7000.
[   74.855492] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[   74.866176] pgd = ec909380
[   74.868892] [00000000] *pgd=ade6d003, *pmd=ac870003, *pte=00000000

Read at address  0x48468014 (0xb6fa7014): 0x00000000


MCASP_GBLCTL

root@am57xx-evm:~# devmem2 0x48468044
/dev/mem opened.[  134.157179] ------------[ cut here ]------------
[  134.163128] WARNING: CPU: 0 PID: 902 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x248/0x34c()
[  134.172649] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  134.184259] Modules linked in: ipv6 gdbserverproxy(O) cryptodev(O) cmemk(O) omapdrm_pvr(O) evdev snd_soc_simple_card joydev snd_soc_tlv320)
[  134.205273] CPU: 0 PID: 902 Comm: devmem2 Tainted: G        W  O    4.1.13-g8dc6617 #108
[  134.213397] Hardware name: Generic DRA72X (Flattened Device Tree)
[  134.219512] Backtrace: 
[  134.221986] [<c0013018>] (dump_backtrace) from [<c001323c>] (show_stack+0x18/0x1c)
[  134.229585]  r7:c030ff28 r6:00000093 r5:c09edc8c r4:00000000
[  134.235310] [<c0013224>] (show_stack) from [<c0701b3c>] (dump_stack+0x9c/0xdc)
[  134.242568] [<c0701aa0>] (dump_stack) from [<c0039748>] (warn_slowpath_common+0x88/0xb8)
[  134.250690]  r5:00000009 r4:dfa3de00
[  134.254297] [<c00396c0>] (warn_slowpath_common) from [<c00397b0>] (warn_slowpath_fmt+0x38/0x40)
[  134.263029]  r8:c08d528c r7:00000002 r6:ee963510 r5:c08d534c r4:c08d53f0
[  134.269799] [<c003977c>] (warn_slowpath_fmt) from [<c030ff28>] (l3_interrupt_handler+0x248/0x34c)
[  134.278706]  r3:ee963380 r2:c08d53f0
[  134.282306]  r4:80080003
[  134.284860] [<c030fce0>] (l3_interrupt_handler) from [<c0079ac4>] (handle_irq_event_percpu+0x80/0x13c)
[  134.294203]  r10:c0a1e569 r9:ee949780 r8:00000017 r7:00000000 r6:00000000 r5:ee9497e0
[  134.302102]  r4:ee963880
[  134.304656] [<c0079a44>] (handle_irq_event_percpu) from [<c0079bc4>] (handle_irq_event+0x44/0x64)
[  134.313563]  r10:be8d1b14 r9:00000003 r8:ee806000 r7:00000000 r6:ee963880 r5:ee9497e0
[  134.321462]  r4:ee949780
[  134.324015] [<c0079b80>] (handle_irq_event) from [<c007c8f0>] (handle_fasteoi_irq+0xb8/0x17c)
[  134.332572]  r7:00000000 r6:c09d5dfc r5:ee9497e0 r4:ee949780
[  134.338289] [<c007c838>] (handle_fasteoi_irq) from [<c0079128>] (generic_handle_irq+0x34/0x44)
[  134.346933]  r7:00000000 r6:00000000 r5:00000017 r4:00000017
[  134.352650] [<c00790f4>] (generic_handle_irq) from [<c0079400>] (__handle_domain_irq+0x64/0xbc)
[  134.361382]  r5:00000017 r4:c09cad2c
[  134.364988] [<c007939c>] (__handle_domain_irq) from [<c00094ac>] (gic_handle_irq+0x2c/0x64)
[  134.373371]  r9:00000003 r8:30c5387d r7:fa212000 r6:dfa3dfb0 r5:c09d0950 r4:fa21200c
[  134.381189] [<c0009480>] (gic_handle_irq) from [<c0708428>] (__irq_usr+0x48/0x60)
[  134.388702] Exception stack(0xdfa3dfb0 to 0xdfa3dff8)
[  134.393774] dfa0:                                     be8d1b14 00010d84 00000008 00000000
[  134.401987] dfc0: 00020f84 b6fb9000 00020f78 48468044 00000002 00000003 be8d1b14 b6fb9044
[  134.410198] dfe0: 00020f5c be8d1af4 00020f1c b6fa448c 600b0010 ffffffff
[  134.416836]  r7:30c5387d r6:ffffffff r5:600b0010 r4:b6fa448c
[  134.422547] ---[ end trace 8c645446aaf99541 ]---

Memory mapped at address 0xb6fb9000.
[  134.427272] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  134.438049] pgd = edf87240
[  134.440765] [00000000] *pgd=add57003, *pmd=adc70003, *pte=00000000
Read at address  0x48468044 (0xb6fb9044): 0x00000000
QSocketNotifier: Invalid socket 10 and type 'Read', disabling...


MCASP_ACLKXCTL
root@am57xx-evm:~# devmem2 0x484680B0
/dev/mem opened.[  150.696636] ------------[ cut here ]------------
[  150.702614] WARNING: CPU: 0 PID: 914 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x248/0x34c()
[  150.712136] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  150.723746] Modules linked in: ipv6 gdbserverproxy(O) cryptodev(O) cmemk(O) omapdrm_pvr(O) evdev snd_soc_simple_card joydev snd_soc_tlv320)
[  150.744767] CPU: 0 PID: 914 Comm: devmem2 Tainted: G        W  O    4.1.13-g8dc6617 #108
[  150.752889] Hardware name: Generic DRA72X (Flattened Device Tree)
[  150.759006] Backtrace: 
[  150.761478] [<c0013018>] (dump_backtrace) from [<c001323c>] (show_stack+0x18/0x1c)
[  150.769077]  r7:c030ff28 r6:00000093 r5:c09edc8c r4:00000000
[  150.774802] [<c0013224>] (show_stack) from [<c0701b3c>] (dump_stack+0x9c/0xdc)
[  150.782060] [<c0701aa0>] (dump_stack) from [<c0039748>] (warn_slowpath_common+0x88/0xb8)
[  150.790182]  r5:00000009 r4:df9f1e00
[  150.793791] [<c00396c0>] (warn_slowpath_common) from [<c00397b0>] (warn_slowpath_fmt+0x38/0x40)
[  150.802522]  r8:c08d528c r7:00000002 r6:ee963510 r5:c08d534c r4:c08d53f0
[  150.809292] [<c003977c>] (warn_slowpath_fmt) from [<c030ff28>] (l3_interrupt_handler+0x248/0x34c)
[  150.818200]  r3:ee963380 r2:c08d53f0
[  150.821803]  r4:80080003
[  150.824358] [<c030fce0>] (l3_interrupt_handler) from [<c0079ac4>] (handle_irq_event_percpu+0x80/0x13c)
[  150.833701]  r10:c0a1e569 r9:ee949780 r8:00000017 r7:00000000 r6:00000000 r5:ee9497e0
[  150.841604]  r4:ee963880
[  150.844158] [<c0079a44>] (handle_irq_event_percpu) from [<c0079bc4>] (handle_irq_event+0x44/0x64)
[  150.853064]  r10:bef20b14 r9:00000003 r8:ee806000 r7:00000000 r6:ee963880 r5:ee9497e0
[  150.860963]  r4:ee949780
[  150.863516] [<c0079b80>] (handle_irq_event) from [<c007c8f0>] (handle_fasteoi_irq+0xb8/0x17c)
[  150.872073]  r7:00000000 r6:c09d5dfc r5:ee9497e0 r4:ee949780
[  150.877788] [<c007c838>] (handle_fasteoi_irq) from [<c0079128>] (generic_handle_irq+0x34/0x44)
[  150.886433]  r7:00000000 r6:00000000 r5:00000017 r4:00000017
[  150.892150] [<c00790f4>] (generic_handle_irq) from [<c0079400>] (__handle_domain_irq+0x64/0xbc)
[  150.900881]  r5:00000017 r4:c09cad2c
[  150.904489] [<c007939c>] (__handle_domain_irq) from [<c00094ac>] (gic_handle_irq+0x2c/0x64)
[  150.912871]  r9:00000003 r8:30c5387d r7:fa212000 r6:df9f1fb0 r5:c09d0950 r4:fa21200c
[  150.920692] [<c0009480>] (gic_handle_irq) from [<c0708428>] (__irq_usr+0x48/0x60)
[  150.928203] Exception stack(0xdf9f1fb0 to 0xdf9f1ff8)
[  150.933276] 1fa0:                                     bef20b14 00010d84 00000008 00000000
[  150.941489] 1fc0: 00020f84 b6f3c000 00020f78 484680b0 00000002 00000003 bef20b14 b6f3c0b0
[  150.949701] 1fe0: 00020f5c bef20af4 00020f1c b6f2748c 600b0010 ffffffff
[  150.956340]  r7:30c5387d r6:ffffffff r5:600b0010 r4:b6f2748c
[  150.962051] ---[ end trace 8c645446aaf99542 ]---

Memory mapped at address 0xb6f3c000.
[  150.966770] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  150.977549] pgd = edf877c0
[  150.980264] [00000000] *pgd=adfa7003, *pmd=adc79003, *pte=00000000
Read at address  0x484680B0 (0xb6f3c0b0): 0x00000000



MCASP_AHCLKXCTL
root@am57xx-evm:~# devmem2 0x484680B4
/dev/mem opened.[  164.506689] ------------[ cut here ]------------
[  164.512639] WARNING: CPU: 0 PID: 915 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x248/0x34c()
[  164.522160] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  164.533771] Modules linked in: ipv6 gdbserverproxy(O) cryptodev(O) cmemk(O) omapdrm_pvr(O) evdev snd_soc_simple_card joydev snd_soc_tlv320)
[  164.554786] CPU: 0 PID: 915 Comm: devmem2 Tainted: G        W  O    4.1.13-g8dc6617 #108
[  164.562909] Hardware name: Generic DRA72X (Flattened Device Tree)
[  164.569024] Backtrace: 
[  164.571497] [<c0013018>] (dump_backtrace) from [<c001323c>] (show_stack+0x18/0x1c)
[  164.579096]  r7:c030ff28 r6:00000093 r5:c09edc8c r4:00000000
[  164.584818] [<c0013224>] (show_stack) from [<c0701b3c>] (dump_stack+0x9c/0xdc)
[  164.592076] [<c0701aa0>] (dump_stack) from [<c0039748>] (warn_slowpath_common+0x88/0xb8)
[  164.600197]  r5:00000009 r4:df9ade00
[  164.603805] [<c00396c0>] (warn_slowpath_common) from [<c00397b0>] (warn_slowpath_fmt+0x38/0x40)
[  164.612537]  r8:c08d528c r7:00000002 r6:ee963510 r5:c08d534c r4:c08d53f0
[  164.619310] [<c003977c>] (warn_slowpath_fmt) from [<c030ff28>] (l3_interrupt_handler+0x248/0x34c)
[  164.628215]  r3:ee963380 r2:c08d53f0
[  164.631817]  r4:80080003
[  164.634373] [<c030fce0>] (l3_interrupt_handler) from [<c0079ac4>] (handle_irq_event_percpu+0x80/0x13c)
[  164.643716]  r10:c0a1e569 r9:ee949780 r8:00000017 r7:00000000 r6:00000000 r5:ee9497e0
[  164.651617]  r4:ee963880
[  164.654171] [<c0079a44>] (handle_irq_event_percpu) from [<c0079bc4>] (handle_irq_event+0x44/0x64)
[  164.663078]  r10:beb8fb14 r9:00000003 r8:ee806000 r7:00000000 r6:ee963880 r5:ee9497e0
[  164.670978]  r4:ee949780
[  164.673531] [<c0079b80>] (handle_irq_event) from [<c007c8f0>] (handle_fasteoi_irq+0xb8/0x17c)
[  164.682089]  r7:00000000 r6:c09d5dfc r5:ee9497e0 r4:ee949780
[  164.687806] [<c007c838>] (handle_fasteoi_irq) from [<c0079128>] (generic_handle_irq+0x34/0x44)
[  164.696450]  r7:00000000 r6:00000000 r5:00000017 r4:00000017
[  164.702167] [<c00790f4>] (generic_handle_irq) from [<c0079400>] (__handle_domain_irq+0x64/0xbc)
[  164.710899]  r5:00000017 r4:c09cad2c
[  164.714506] [<c007939c>] (__handle_domain_irq) from [<c00094ac>] (gic_handle_irq+0x2c/0x64)
[  164.722889]  r9:00000003 r8:30c5387d r7:fa212000 r6:df9adfb0 r5:c09d0950 r4:fa21200c
[  164.730708] [<c0009480>] (gic_handle_irq) from [<c0708428>] (__irq_usr+0x48/0x60)
[  164.738220] Exception stack(0xdf9adfb0 to 0xdf9adff8)
[  164.743292] dfa0:                                     b6f7e960 00010320 000102a0 00000016
[  164.751504] dfc0: 00000000 00020f5c 00000008 484680b4 00000002 00000003 beb8fb14 b6f7a0b4
[  164.759716] dfe0: 00020f5c beb8faa8 00010400 b6f60aa2 600b0030 ffffffff
[  164.766355]  r7:30c5387d r6:ffffffff r5:600b0030 r4:b6f60aa2
[  164.772068] ---[ end trace 8c645446aaf99543 ]---

Memory mapped at address 0xb6f7a000.
[  164.776804] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  164.787555] pgd = ec824180
[  164.790269] [00000000] *pgd=adfa7003, *pmd=9faa6003, *pte=00000000
Bus error




CTRL_CORE_PAD_XREF_CLK2:
root@am57xx-evm:~# devmem2 0x4A00369C
/dev/mem opened.
Memory mapped at address 0xb6f1d000.
Read at address  0x4A00369C (0xb6f1d69c): 0x00010003



CM_L4PER2_MCASP3_CLKCTRL:
root@am57xx-evm:~# devmem2 0x4A009868
/dev/mem opened.
Memory mapped at address 0xb6ff1000.
Read at address  0x4A009868 (0xb6ff1868): 0x07030000




CM_CLKSEL_PER_ABE_X1_GFCLK_MCASP_AUX:
root@am57xx-evm:~# devmem2 0x4AE06138
/dev/mem opened.
Memory mapped at address 0xb6f2e000.
Read at address  0x4AE06138 (0xb6f2e138): 0x00000000


CM_CLKSEL_ABE_PLL_REF:
root@am57xx-evm:~# devmem2 0x4AE0610C
/dev/mem opened.
Memory mapped at address 0xb6f65000.
Read at address  0x4AE0610C (0xb6f6510c): 0x00000000


CM_CLKSEL_ABE_PLL_SYS:
root@am57xx-evm:~# devmem2 0x4AE06118
/dev/mem opened.
Memory mapped at address 0xb6fad000.
Read at address  0x4AE06118 (0xb6fad118): 0x00000000


DPLL_ABE registers:


CM_CLKSEL_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051EC
/dev/mem opened.
Memory mapped at address 0xb6f18000.
Read at address  0x4A0051EC (0xb6f181ec): 0x00800000



CM_CLKMODE_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051E0
/dev/mem opened.
Memory mapped at address 0xb6f68000.
Read at address  0x4A0051E0 (0xb6f681e0): 0x00000005


CM_DIV_M2_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051F0
/dev/mem opened.
Memory mapped at address 0xb6f89000.
Read at address  0x4A0051F0 (0xb6f891f0): 0x00000001


CM_DIV_M3_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051F4
/dev/mem opened.
Memory mapped at address 0xb6f77000.
Read at address  0x4A0051F4 (0xb6f771f4): 0x00000001


CM_AUTOIDLE_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051E8
/dev/mem opened.
Memory mapped at address 0xb6f34000.
Read at address  0x4A0051E8 (0xb6f341e8): 0x00000001


CM_IDLEST_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051E4
/dev/mem opened.
Memory mapped at address 0xb6fb0000.
Read at address  0x4A0051E4 (0xb6fb01e4): 0x00000002


























