Other Parts Discussed in Thread: TPS65218
Hi,
How can I debug this backtrace
[ 448.501855] -----------[ cut here ]-----------
[ 448.506782] WARNING: CPU: 0 PID: 1318 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x24c/0x394()
[ 448.516910] 44000000.ocp:L3 Standard Error: MASTER M1 (128-bit) TARGET EMIF (Read Link): At Address: 0x6C826680 : Data Access in User mode during Functional access
[ 448.532360] Modules linked in: uinput usb_f_ecm u_ether usb_f_acm u_serial libcomposite configfs bcmdhd cfg80211 xhci_plat_hcd xhci_hcd usbcore printer_core(O) vfi_sysmode vfi_powerbutton evdev omapdrm joydev mousedev dwc3 syscopyarea sysfillrect sysimgblt fb_sys_fops panel_gpm udc_core ti_am335x_adc atmf_rotate drm_kms_helper kfifo_buf phy_omap_usb2 fb gpio_vf6111(O) vfraptor_matrix_keypad pwm_beeper drm snd_soc_tlv320aic31xx snd_soc_davinci_mcasp snd_soc_edma snd_soc_simple_card snd_soc_core rtc_vf2111_sec pn512(O) snd_compress snd_pcm_dmaengine snd_pcm omapdss rtc_pcf85063 pinctrl_wkup atmel_mxt_ts vf2111_swcharger platinfomod(O) printer_io(O) rtc_vfsetget vfi_panel_probe bq27xxx_battery vbus_flt_mon gpio_tps65218 ti_magadc snd_timer matrix_keymap omap_hsmmc snd bq2416x_charger dwc3_omap mmc_core extcon_class soundcore regmap_spi ti_am335x_tscadc scr(O) regmap_mmio phy_omap_control iio_ntc_thermistor omap_ocp2scp pwm_bl backlight ntc_thermistor vf6111(O)
[ 448.622557] CPU: 0 PID: 1318 Comm: sysmode Tainted: G W O 3.14.43 #1
[ 448.630013] Backtrace:
[ 448.632632] [<c010a6a0>] (dump_backtrace+0x0/0x10c) from [<c010a83c>] (show_stack+0x18/0x1c)
[ 448.641559] r6:00000093 r5:00000009 r4:dad5fbf0 r3:454ace40
[ 448.647582] [<c010a824>] (show_stack+0x0/0x1c) from [<c04aee64>] (dump_stack+0x20/0x28)
[ 448.656063] [<c04aee44>] (dump_stack+0x0/0x28) from [<c0132de4>] (warn_slowpath_common+0x6c/0x8c)
[ 448.665459] [<c0132d78>] (warn_slowpath_common+0x0/0x8c) from [<c0132ea8>] (warn_slowpath_fmt+0x38/0x40)
[ 448.675487] r8:c05b0288 r7:c05afe90 r6:c04da6a4 r5:80080001 r4:dd90c650
[ 448.682619] [<c0132e74>] (warn_slowpath_fmt+0x4/0x40) from [<c0327330>] (l3_interrupt_handler+0x24c/0x394)
[ 448.692832] r3:dd90c8c0 r2:c05aff5c
[ 448.696638] [<c03270e4>] (l3_interrupt_handler+0x0/0x394) from [<c01696dc>] (handle_irq_event_percpu+0x54/0x1c4)
[ 448.707400] r10:dd807e00 r9:c073ca5b r8:0000003a r7:00000000 r6:00000000 r5:dd90c2c0
[ 448.715710] r4:dd90c2c0
[ 448.718401] [<c0169688>] (handle_irq_event_percpu+0x0/0x1c4) from [<c01698a4>] (handle_irq_event+0x58/0x8c)
[ 448.728704] r10:00000000 r9:00000000 r8:00000000 r7:dad5fdb4 r6:00000000 r5:dd90c2c0
[ 448.737017] r4:dd807e00
[ 448.739711] [<c016984c>] (handle_irq_event+0x0/0x8c) from [<c016c548>] (handle_fasteoi_irq+0x7c/0x160)
[ 448.749554] r5:0000003a r4:dd807e00
[ 448.753357] [<c016c4cc>] (handle_fasteoi_irq+0x0/0x160) from [<c0168f30>] (generic_handle_irq+0x28/0x38)
[ 448.763382] r4:0000003a r3:c016c4cc
[ 448.767181] [<c0168f08>] (generic_handle_irq+0x0/0x38) from [<c0107880>] (handle_IRQ+0x38/0x8c)
[ 448.776384] r4:c072a8b0 r3:00000218
[ 448.780179] [<c0107848>] (handle_IRQ+0x0/0x8c) from [<c0100808>] (gic_handle_irq+0x3c/0x54)
[ 448.789010] r6:dad5fd80 r5:c070841c r4:fa24010c r3:00000100
[ 448.795028] [<c01007cc>] (gic_handle_irq+0x0/0x54) from [<c010b5b8>] (__irq_svc+0x78/0xd4)
[ 448.803770] Exception stack(0xdad5fd80 to 0xdad5fdc8)
[ 448.809119] fd80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 448.817774] fda0: 00000000 00000000 00000000 00000000 00000000 dad5fdd0 c0120f78 c0120ebc
[ 448.826425] fdc0: 600f0193 ffffffff
[ 448.830113] r6:ffffffff r5:600f0193 r4:c0120ebc r3:c0120f78