MCASP_PDIR
root@am57xx-evm:~# devmem2 0x48468014
/dev/mem opened.[  134.421388] ------------[ cut here ]------------
[  134.427362] WARNING: CPU: 0 PID: 783 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x254/0x370
[  134.436711] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  134.448323] Modules linked in: hid_multitouch usbhid xhci_plat_hcd xhci_hcd usbcore dwc3 udc_core usb_common snd_soc_simple_card snd_soc_s)
[  134.491246] CPU: 0 PID: 783 Comm: devmem2 Tainted: G        W  O    4.14.79-gbde58ab01e #179
[  134.499719] Hardware name: Generic DRA72X (Flattened Device Tree)
[  134.505837] Backtrace: 
[  134.508303] [<c020b4dc>] (dump_backtrace) from [<c020b7c0>] (show_stack+0x18/0x1c)
[  134.515907]  r7:00000009 r6:600b0193 r5:00000000 r4:c1053d10
[  134.521598] [<c020b7a8>] (show_stack) from [<c0931628>] (dump_stack+0x90/0xa4)
[  134.528855] [<c0931598>] (dump_stack) from [<c022b9cc>] (__warn+0xec/0x104)
[  134.535847]  r7:00000009 r6:c0bd492c r5:00000000 r4:ee153dd0
[  134.541531] [<c022b8e0>] (__warn) from [<c022ba24>] (warn_slowpath_fmt+0x40/0x48)
[  134.549048]  r9:0000001a r8:ef1c3910 r7:c0bd4798 r6:00000002 r5:c0bd4858 r4:c0bd48fc
[  134.556827] [<c022b9e8>] (warn_slowpath_fmt) from [<c051bd20>] (l3_interrupt_handler+0x254/0x370)
[  134.565736]  r3:ef1c3780 r2:c0bd48fc
[  134.569324]  r4:80080003
[  134.571872] [<c051bacc>] (l3_interrupt_handler) from [<c027f5a4>] (__handle_irq_event_percpu+0x6c/0x134)
[  134.581394]  r10:c105570d r9:ef1c2200 r8:00000017 r7:ee153ef4 r6:00000000 r5:ef1c2200
[  134.589256]  r4:ef1c3c80
[  134.591803] [<c027f538>] (__handle_irq_event_percpu) from [<c027f690>] (handle_irq_event_percpu+0x24/0x60)
[  134.601499]  r10:00000002 r9:00000001 r8:ef008000 r7:00000000 r6:c10093ac r5:ef1c2200
[  134.609360]  r4:ef1c2200
[  134.611905] [<c027f66c>] (handle_irq_event_percpu) from [<c027f70c>] (handle_irq_event+0x40/0x64)
[  134.620814]  r5:ef1c2264 r4:ef1c2200
[  134.624408] [<c027f6cc>] (handle_irq_event) from [<c0283020>] (handle_fasteoi_irq+0xac/0x160)
[  134.632969]  r7:00000000 r6:c10093ac r5:ef1c2264 r4:ef1c2200
[  134.638656] [<c0282f74>] (handle_fasteoi_irq) from [<c027e7f4>] (generic_handle_irq+0x2c/0x3c)
[  134.647304]  r7:00000000 r6:00000000 r5:00000017 r4:c0e64b3c
[  134.652988] [<c027e7c8>] (generic_handle_irq) from [<c027ed7c>] (__handle_domain_irq+0x64/0xbc)
[  134.661727] [<c027ed18>] (__handle_domain_irq) from [<c0201474>] (gic_handle_irq+0x44/0x80)
[  134.670115]  r9:00000001 r8:fa213000 r7:fa212000 r6:ee153fb0 r5:fa21200c r4:c1004000
[  134.677893] [<c0201430>] (gic_handle_irq) from [<c020c6e8>] (__irq_usr+0x48/0x60)
[  134.685407] Exception stack(0xee153fb0 to 0xee153ff8)
[  134.690479] 3fa0:                                     000103e3 b6fee960 bed5ab6c b6feeb18
[  134.698693] 3fc0: 00000000 00021048 b6febd40 b6fec200 00000000 00000001 00000002 bed5abc0
[  134.706904] 3fe0: 000103cc bed5ab58 b6fd0efb b6fcd27c 200b0030 ffffffff
[  134.713548]  r9:00000001 r8:30c5387d r7:30c5387d r6:ffffffff r5:200b0030 r4:b6fcd27c
[  134.721323] ---[ end trace 71387217c816ea2b ]---

Memory mapped at address 0xb6fea000.
[  134.726043] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  134.736825] pgd = ed950100
[  134.739541] [00000000] *pgd=ad979003, *pmd=be24c003
Read at address  0x48468014 (0xb6fea014): 0x00000000





MCASP_GBLCTL

root@am57xx-evm:~# devmem2 0x48468044
/dev/mem opened.[   85.017567] ------------[ cut here ]------------
[   85.023451] WARNING: CPU: 0 PID: 772 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x254/0x370
[   85.032799] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[   85.044411] Modules linked in: hid_multitouch usbhid xhci_plat_hcd xhci_hcd usbcore dwc3 udc_core usb_common snd_soc_simple_card snd_soc_s)
[   85.087334] CPU: 0 PID: 772 Comm: devmem2 Tainted: G           O    4.14.79-gbde58ab01e #179
[   85.095806] Hardware name: Generic DRA72X (Flattened Device Tree)
[   85.101924] Backtrace: 
[   85.104389] [<c020b4dc>] (dump_backtrace) from [<c020b7c0>] (show_stack+0x18/0x1c)
[   85.111993]  r7:00000009 r6:600b0193 r5:00000000 r4:c1053d10
[   85.117684] [<c020b7a8>] (show_stack) from [<c0931628>] (dump_stack+0x90/0xa4)
[   85.124941] [<c0931598>] (dump_stack) from [<c022b9cc>] (__warn+0xec/0x104)
[   85.131934]  r7:00000009 r6:c0bd492c r5:00000000 r4:ee3ffdd0
[   85.137619] [<c022b8e0>] (__warn) from [<c022ba24>] (warn_slowpath_fmt+0x40/0x48)
[   85.145136]  r9:0000001a r8:ef1c3910 r7:c0bd4798 r6:00000002 r5:c0bd4858 r4:c0bd48fc
[   85.152915] [<c022b9e8>] (warn_slowpath_fmt) from [<c051bd20>] (l3_interrupt_handler+0x254/0x370)
[   85.161824]  r3:ef1c3780 r2:c0bd48fc
[   85.165411]  r4:80080003
[   85.167960] [<c051bacc>] (l3_interrupt_handler) from [<c027f5a4>] (__handle_irq_event_percpu+0x6c/0x134)
[   85.177483]  r10:c105570d r9:ef1c2200 r8:00000017 r7:ee3ffef4 r6:00000000 r5:ef1c2200
[   85.185344]  r4:ef1c3c80
[   85.187891] [<c027f538>] (__handle_irq_event_percpu) from [<c027f690>] (handle_irq_event_percpu+0x24/0x60)
[   85.197587]  r10:00000002 r9:48468044 r8:ef008000 r7:00000000 r6:c10093ac r5:ef1c2200
[   85.205448]  r4:ef1c2200
[   85.207995] [<c027f66c>] (handle_irq_event_percpu) from [<c027f70c>] (handle_irq_event+0x40/0x64)
[   85.216905]  r5:ef1c2264 r4:ef1c2200
[   85.220499] [<c027f6cc>] (handle_irq_event) from [<c0283020>] (handle_fasteoi_irq+0xac/0x160)
[   85.229060]  r7:00000000 r6:c10093ac r5:ef1c2264 r4:ef1c2200
[   85.234747] [<c0282f74>] (handle_fasteoi_irq) from [<c027e7f4>] (generic_handle_irq+0x2c/0x3c)
[   85.243395]  r7:00000000 r6:00000000 r5:00000017 r4:c0e64b3c
[   85.249079] [<c027e7c8>] (generic_handle_irq) from [<c027ed7c>] (__handle_domain_irq+0x64/0xbc)
[   85.257817] [<c027ed18>] (__handle_domain_irq) from [<c0201474>] (gic_handle_irq+0x44/0x80)
[   85.266205]  r9:48468044 r8:fa213000 r7:fa212000 r6:ee3fffb0 r5:fa21200c r4:c1004000
[   85.273984] [<c0201430>] (gic_handle_irq) from [<c020c6e8>] (__irq_usr+0x48/0x60)
[   85.281497] Exception stack(0xee3fffb0 to 0xee3ffff8)
[   85.286570] ffa0:                                     b6f8b960 00000078 000104f0 00020f60
[   85.294785] ffc0: 00020f58 b6f87000 00001000 b6f87044 00000000 48468044 00000002 bea56bc0
[   85.302997] ffe0: 00021048 bea56b58 b6f725bc b6f6de7e 600b0030 ffffffff
[   85.309641]  r9:48468044 r8:30c5387d r7:30c5387d r6:ffffffff r5:600b0030 r4:b6f6de7e
[   85.317416] ---[ end trace 71387217c816ea2a ]---

Memory mapped at address 0xb6f87000.
[   85.322300] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[   85.332926] pgd = ee109b00
[   85.335643] [00000000] *pgd=ae286003, *pmd=be08e003
Read at address  0x48468044 (0xb6f87044): 0x00000000









MCASP_ACLKXCTL
root@am57xx-evm:~# devmem2 0x484680B0
/dev/mem opened.[  198.414559] ------------[ cut here ]------------
[  198.420484] WARNING: CPU: 0 PID: 795 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x254/0x370
[  198.429832] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  198.441443] Modules linked in: hid_multitouch usbhid xhci_plat_hcd xhci_hcd usbcore dwc3 udc_core usb_common snd_soc_simple_card snd_soc_s)
[  198.484359] CPU: 0 PID: 795 Comm: devmem2 Tainted: G        W  O    4.14.79-gbde58ab01e #179
[  198.492833] Hardware name: Generic DRA72X (Flattened Device Tree)
[  198.498951] Backtrace: 
[  198.501416] [<c020b4dc>] (dump_backtrace) from [<c020b7c0>] (show_stack+0x18/0x1c)
[  198.509020]  r7:00000009 r6:600b0193 r5:00000000 r4:c1053d10
[  198.514710] [<c020b7a8>] (show_stack) from [<c0931628>] (dump_stack+0x90/0xa4)
[  198.521966] [<c0931598>] (dump_stack) from [<c022b9cc>] (__warn+0xec/0x104)
[  198.528958]  r7:00000009 r6:c0bd492c r5:00000000 r4:ee29ddd0
[  198.534642] [<c022b8e0>] (__warn) from [<c022ba24>] (warn_slowpath_fmt+0x40/0x48)
[  198.542157]  r9:0000001a r8:ef1c3910 r7:c0bd4798 r6:00000002 r5:c0bd4858 r4:c0bd48fc
[  198.549936] [<c022b9e8>] (warn_slowpath_fmt) from [<c051bd20>] (l3_interrupt_handler+0x254/0x370)
[  198.558844]  r3:ef1c3780 r2:c0bd48fc
[  198.562432]  r4:80080003
[  198.564980] [<c051bacc>] (l3_interrupt_handler) from [<c027f5a4>] (__handle_irq_event_percpu+0x6c/0x134)
[  198.574501]  r10:c105570d r9:ef1c2200 r8:00000017 r7:ee29def4 r6:00000000 r5:ef1c2200
[  198.582362]  r4:ef1c3c80
[  198.584909] [<c027f538>] (__handle_irq_event_percpu) from [<c027f690>] (handle_irq_event_percpu+0x24/0x60)
[  198.594605]  r10:00000002 r9:484680b0 r8:ef008000 r7:00000000 r6:c10093ac r5:ef1c2200
[  198.602466]  r4:ef1c2200
[  198.605011] [<c027f66c>] (handle_irq_event_percpu) from [<c027f70c>] (handle_irq_event+0x40/0x64)
[  198.613920]  r5:ef1c2264 r4:ef1c2200
[  198.617514] [<c027f6cc>] (handle_irq_event) from [<c0283020>] (handle_fasteoi_irq+0xac/0x160)
[  198.626075]  r7:00000000 r6:c10093ac r5:ef1c2264 r4:ef1c2200
[  198.631760] [<c0282f74>] (handle_fasteoi_irq) from [<c027e7f4>] (generic_handle_irq+0x2c/0x3c)
[  198.640408]  r7:00000000 r6:00000000 r5:00000017 r4:c0e64b3c
[  198.646093] [<c027e7c8>] (generic_handle_irq) from [<c027ed7c>] (__handle_domain_irq+0x64/0xbc)
[  198.654831] [<c027ed18>] (__handle_domain_irq) from [<c0201474>] (gic_handle_irq+0x44/0x80)
[  198.663220]  r9:484680b0 r8:fa213000 r7:fa212000 r6:ee29dfb0 r5:fa21200c r4:c1004000
[  198.670997] [<c0201430>] (gic_handle_irq) from [<c020c6e8>] (__irq_usr+0x48/0x60)
[  198.678509] Exception stack(0xee29dfb0 to 0xee29dff8)
[  198.683582] dfa0:                                     b6f12960 00000078 00000008 00000015
[  198.691795] dfc0: 00021064 b6f0e000 00001000 b6f0e0b0 00000000 484680b0 00000002 beca6bc0
[  198.700007] dfe0: 00021048 beca6b90 b6ef95bc b6ef4e70 600b0030 ffffffff
[  198.706652]  r9:484680b0 r8:30c5387d r7:30c5387d r6:ffffffff r5:600b0030 r4:b6ef4e70
[  198.714426] ---[ end trace 71387217c816ea2c ]---

Memory mapped at address 0xb6f0e000.
[  198.719181] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  198.729931] pgd = ee0d43c0
[  198.732649] [00000000] *pgd=ae0b3003, *pmd=00000000
Read at address  0x484680B0 (0xb6f0e0b0): 0x00000000
root@am57xx-evm:~# [  198.788768] systemd[1]: systemd-journald.service: Failed with result 'core-dump'.
[  198.815159] systemd[1]: systemd-journald.service: Service has no hold-off time, scheduling restart.
[  198.834711] systemd[1]: Stopped Flush Journal to Persistent Storage.
[  198.851168] systemd[1]: Stopping Flush Journal to Persistent Storage...
[  198.857859] systemd[1]: Stopped Journal Service.
[  198.881809] systemd[1]: Starting Journal Service...
[  198.926327] systemd-journald[797]: File /run/log/journal/1eca13079d794ecb855d125e7498eff4/system.journal corrupted or uncleanly shut down,.
[  198.990629] systemd[1]: Started Journal Service.
[  199.777628] systemd-coredump[796]: MESSAGE=Process 80 (systemd-journal) of user 0 dumped core.
[  199.786363] systemd-coredump[796]: Coredump diverted to /var/lib/systemd/coredump/core.systemd-journal.0.26a36703c9784a93a37c782ba22fd1cf.z

root@am57xx-evm:~# 
root@am57xx-evm:~# [  305.120857] EXT4-fs (mmcblk0p2): error count since last fsck: 950
[  305.126994] EXT4-fs (mmcblk0p2): initial error at time 1544931248: ext4_iget:4873: inode 51470: block 1
[  305.136446] EXT4-fs (mmcblk0p2): last error at time 1544931246: ext4_iget:4873: inode 51470: block 1






MCASP_AHCLKXCTL
root@am57xx-evm:~# devmem2 0x484680B4
/dev/mem opened.[  807.854761] ------------[ cut here ]------------
[  807.860689] WARNING: CPU: 0 PID: 815 at drivers/bus/omap_l3_noc.c:147 l3_interrupt_handler+0x254/0x370
[  807.870038] 44000000.ocp:L3 Custom Error: MASTER MPU TARGET L4_PER2_P3 (Read): Data Access in User mode during Functional access
[  807.881649] Modules linked in: hid_multitouch usbhid xhci_plat_hcd xhci_hcd usbcore rpmsg_proto dwc3 udc_core usb_common snd_soc_simple_ca)
[  807.925622] CPU: 0 PID: 815 Comm: devmem2 Tainted: G        W  O    4.14.79-gbde58ab01e #159
[  807.934096] Hardware name: Generic DRA72X (Flattened Device Tree)
[  807.940213] Backtrace: 
[  807.942679] [<c020b4dc>] (dump_backtrace) from [<c020b7c0>] (show_stack+0x18/0x1c)
[  807.950283]  r7:00000009 r6:600b0193 r5:00000000 r4:c1053d10
[  807.955972] [<c020b7a8>] (show_stack) from [<c0931448>] (dump_stack+0x90/0xa4)
[  807.963228] [<c09313b8>] (dump_stack) from [<c022b9cc>] (__warn+0xec/0x104)
[  807.970220]  r7:00000009 r6:c0bd491c r5:00000000 r4:ef1cbdd0
[  807.975904] [<c022b8e0>] (__warn) from [<c022ba24>] (warn_slowpath_fmt+0x40/0x48)
[  807.983420]  r9:0000001a r8:ef1c4790 r7:c0bd4788 r6:00000002 r5:c0bd4848 r4:c0bd48ec
[  807.991198] [<c022b9e8>] (warn_slowpath_fmt) from [<c051bd20>] (l3_interrupt_handler+0x254/0x370)
[  808.000107]  r3:ef1c4600 r2:c0bd48ec
[  808.003696]  r4:80080003
[  808.006244] [<c051bacc>] (l3_interrupt_handler) from [<c027f5a4>] (__handle_irq_event_percpu+0x6c/0x134)
[  808.015765]  r10:c105570d r9:ef1c2200 r8:00000017 r7:ef1cbef4 r6:00000000 r5:ef1c2200
[  808.023627]  r4:ef1c4b00
[  808.026174] [<c027f538>] (__handle_irq_event_percpu) from [<c027f690>] (handle_irq_event_percpu+0x24/0x60)
[  808.035870]  r10:00000002 r9:484680b4 r8:ef008000 r7:00000000 r6:c10093ac r5:ef1c2200
[  808.043731]  r4:ef1c2200
[  808.046277] [<c027f66c>] (handle_irq_event_percpu) from [<c027f70c>] (handle_irq_event+0x40/0x64)
[  808.055185]  r5:ef1c2264 r4:ef1c2200
[  808.058780] [<c027f6cc>] (handle_irq_event) from [<c0283020>] (handle_fasteoi_irq+0xac/0x160)
[  808.067340]  r7:00000000 r6:c10093ac r5:ef1c2264 r4:ef1c2200
[  808.073027] [<c0282f74>] (handle_fasteoi_irq) from [<c027e7f4>] (generic_handle_irq+0x2c/0x3c)
[  808.081675]  r7:00000000 r6:00000000 r5:00000017 r4:c0e64b3c
[  808.087360] [<c027e7c8>] (generic_handle_irq) from [<c027ed7c>] (__handle_domain_irq+0x64/0xbc)
[  808.096098] [<c027ed18>] (__handle_domain_irq) from [<c0201474>] (gic_handle_irq+0x44/0x80)
[  808.104485]  r9:484680b4 r8:fa213000 r7:fa212000 r6:ef1cbfb0 r5:fa21200c r4:c1004000
[  808.112265] [<c0201430>] (gic_handle_irq) from [<c020c6e8>] (__irq_usr+0x48/0x60)
[  808.119777] Exception stack(0xef1cbfb0 to 0xef1cbff8)
[  808.124851] bfa0:                                     b6f9a960 00000078 00000008 00000015
[  808.133063] bfc0: 00021064 b6f96000 00001000 b6f960b4 00000000 484680b4 00000002 bef0ebc0
[  808.141275] bfe0: 00021048 bef0eb90 b6f815bc b6f7ce70 600b0030 ffffffff
[  808.147917]  r9:484680b4 r8:30c5387d r7:30c5387d r6:ffffffff r5:600b0030 r4:b6f7ce70
[  808.155693] ---[ end trace 3e1d647b3f97fdc3 ]---

Memory mapped at address 0xb6f96000.
[  808.160457] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
[  808.171203] pgd = ee7a3340
[  808.173919] [00000000] *pgd=ae07d003, *pmd=00000000
Read at address  0x484680B4 (0xb6f960b4): 0x00000000
root@am57xx-evm:~# [  808.221356] systemd[1]: systemd-journald.service: Failed with result 'core-dump'.
[  808.245473] systemd[1]: systemd-journald.service: Service has no hold-off time, scheduling restart.
[  808.271314] systemd[1]: Stopped Flush Journal to Persistent Storage.
[  808.277750] systemd[1]: Stopping Flush Journal to Persistent Storage...
[  808.301164] systemd[1]: Stopped Journal Service.
[  808.310308] systemd[1]: Starting Journal Service...
[  808.352158] systemd-journald[817]: File /run/log/journal/82aa6db00e7944af8ed8fb374ade267f/system.journal corrupted or uncleanly shut down,.
[  808.419543] systemd[1]: Started Journal Service.
[  809.203301] systemd-coredump[816]: MESSAGE=Process 80 (systemd-journal) of user 0 dumped core.
[  809.212063] systemd-coredump[816]: Coredump diverted to /var/lib/systemd/coredump/core.systemd-journal.0.c341779ac5964928860f25671aa72aec.z

root@am57xx-evm:~# 








CTRL_CORE_PAD_XREF_CLK2:
root@am57xx-evm:~# devmem2 0x4A00369C
/dev/mem opened.
Memory mapped at address 0xb6fae000.
Read at address  0x4A00369C (0xb6fae69c): 0x00010003
root@am57xx-evm:~# 




CM_L4PER2_MCASP3_CLKCTRL:
root@am57xx-evm:~# devmem2 0x4A009868
/dev/mem opened.
Memory mapped at address 0xb6f38000.
Read at address  0x4A009868 (0xb6f38868): 0x07030000




CM_CLKSEL_PER_ABE_X1_GFCLK_MCASP_AUX:
root@am57xx-evm:~# devmem2 0x4AE06138
/dev/mem opened.
Memory mapped at address 0xb6f7b000.
Read at address  0x4AE06138 (0xb6f7b138): 0x00000000





CM_CLKSEL_ABE_PLL_REF:
root@am57xx-evm:~# devmem2 0x4AE0610C
/dev/mem opened.
Memory mapped at address 0xb6f39000.
Read at address  0x4AE0610C (0xb6f3910c): 0x00000000





CM_CLKSEL_ABE_PLL_SYS:
root@am57xx-evm:~# devmem2 0x4AE06118
/dev/mem opened.
Memory mapped at address 0xb6f30000.
Read at address  0x4AE06118 (0xb6f30118): 0x00000000








DPLL_ABE registers:


CM_CLKSEL_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051EC
/dev/mem opened.
Memory mapped at address 0xb6f7c000.
Read at address  0x4A0051EC (0xb6f7c1ec): 0x00800501
root@am57xx-evm:~#



CM_CLKMODE_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051E0
/dev/mem opened.
Memory mapped at address 0xb6fdd000.
Read at address  0x4A0051E0 (0xb6fdd1e0): 0x00000007




CM_DIV_M2_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051F0
/dev/mem opened.
Memory mapped at address 0xb6ff2000.
Read at address  0x4A0051F0 (0xb6ff21f0): 0x00000001




CM_DIV_M3_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051F4
/dev/mem opened.
Memory mapped at address 0xb6f5b000.
Read at address  0x4A0051F4 (0xb6f5b1f4): 0x00000001




CM_AUTOIDLE_DPLL_ABE
root@am57xx-evm:~# devmem2 0x4A0051E8
/dev/mem opened.
Memory mapped at address 0xb6f4d000.
Read at address  0x4A0051E8 (0xb6f4d1e8): 0x00000001


CM_IDLEST_DPLL_ABE:
root@am57xx-evm:~# devmem2 0x4A0051E4
/dev/mem opened.
Memory mapped at address 0xb6fda000.
Read at address  0x4A0051E4 (0xb6fda1e4): 0x00000012





























