0% found this document useful (0 votes)
70 views3 pages

Mod Menu Crash 2023 04 30-12 48 52

An app called Block Strike crashed on a Samsung device running Android 13. The crash report provided details of the app and device, and included a stack trace showing the crash occurred in the IL2CPP scripting backend library due to an illegal instruction at address 0x999999.

Uploaded by

rosca7689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views3 pages

Mod Menu Crash 2023 04 30-12 48 52

An app called Block Strike crashed on a Samsung device running Android 13. The crash report provided details of the app and device, and included a stack trace showing the crash occurred in the IL2CPP scripting backend library due to an illegal instruction at address 0x999999.

Uploaded by

rosca7689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

************* Crash Head ****************

Time Of Crash : 2023_04_30-12_48_52


Device Manufacturer: samsung
Device Model : SM-A037M
Android Version : 13
Android SDK : 33
App VersionName : 6.0.9 V30
App VersionCode : 1903
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [UnityMain]


Unity version : 2021.2.8f1
Device model : samsung SM-A037M
Device fingerprint:
samsung/a03sub/a03s:13/TP1A.220624.014/A037MUBS4CWD1:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : armeabi-v7a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2021.2.8f1 (d0e5f0a7b06a)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'armeabi-v7a'
Build fingerprint:
'samsung/a03sub/a03s:13/TP1A.220624.014/A037MUBS4CWD1:user/release-keys'
Revision: '0'
ABI: 'arm'
Timestamp: 2023-04-30 12:48:52-0300
pid: 6085, tid: 6207, name: UnityMain >>> com.blockstrayker.blockstrike <<<
uid: 10329
signal 4 (SIGILL), code 1 (ILL_ILLOPC), fault addr 0xb35128f0 (*pc=0x999999)
r0 00999999 r1 0000001c r2 00000000 r3 00000000
r4 0000001c r5 00000001 r6 b589c888 r7 b58b7aec
r8 00000004 r9 b58a0020 r10 b58b73b0 r11 b58babfc
ip b212a7b0 sp b757d560 lr b3647d80 pc b35128f0

backtrace:
#00 pc 008cd8f0
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#01 pc 009f64bc
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#02 pc 009fb660
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#03 pc 02450948
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#04 pc 01539068
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#05 pc 002f3ca8
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#06 pc 0152fa58
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#07 pc 01526688
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#08 pc 015286ac
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#09 pc 01526ab8
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#10 pc 0046619c
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#11 pc 00465fe8
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libil2cpp.so (BuildId:
856eb96306776a2f84264163a030adcb8e983b0d)
#12 pc 001c95b1
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#13 pc 001d3c71
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#14 pc 001dd181
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#15 pc 000cab89
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#16 pc 0013a7a5
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#17 pc 0013a7c7
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#18 pc 0013a95b
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#19 pc 002283db
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#20 pc 002378ed
/data/app/~~zKioAic6-er2vn7GTW-7LQ==/com.blockstrayker.blockstrike-
gXHlnq1MMUoxLXt4AfGABA==/lib/arm/libunity.so (BuildId:
485584053e1270a3c562bed56b324608a12cd8fd)
#21 pc 003bd19d /apex/com.android.art/lib/libart.so
(art_quick_alloc_string_from_bytes_region_tlab_instrumented+44) (BuildId:
8eff3d645f7efa78c717c8db9f4bff37)

at libil2cpp.0x8cd8f0(Native Method)
at libil2cpp.0x9f64bc(Native Method)
at libil2cpp.0x9fb660(Native Method)
at libil2cpp.0x2450948(Native Method)
at libil2cpp.0x1539068(Native Method)
at libil2cpp.0x2f3ca8(Native Method)
at libil2cpp.0x152fa58(Native Method)
at libil2cpp.0x1526688(Native Method)
at libil2cpp.0x15286ac(Native Method)
at libil2cpp.0x1526ab8(Native Method)
at libil2cpp.0x46619c(Native Method)
at libil2cpp.0x465fe8(Native Method)
at libunity.0x1c95b1(Native Method)
at libunity.0x1d3c71(Native Method)
at libunity.0x1dd181(Native Method)
at libunity.0xcab89(Native Method)
at libunity.0x13a7a5(Native Method)
at libunity.0x13a7c7(Native Method)
at libunity.0x13a95b(Native Method)
at libunity.0x2283db(Native Method)
at libunity.0x2378ed(Native Method)
at
libart.art_quick_alloc_string_from_bytes_region_tlab_instrumented(art_quick_alloc_s
tring_from_bytes_region_tlab_instrumented:44)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy