0% found this document useful (0 votes)
3 views3 pages

Aml Crashlog

The document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV) caused by an attempt to access an inaccessible memory address. It includes configuration variables, register states, and a portion of the stack memory at the time of the crash. Users are instructed to provide this log file for troubleshooting instead of a screenshot.

Uploaded by

hck488046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Aml Crashlog

The document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV) caused by an attempt to access an inaccessible memory address. It includes configuration variables, register states, and a portion of the stack memory at the time of the crash. Users are instructed to provide this log file for troubleshooting instead of a screenshot.

Uploaded by

hck488046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

!!! THIS IS A CRASH LOG !!!

If you are experiencing a crash, give us this file.


>>> DO NOT SEND US A SCREENSHOT OF THIS FILE <<<

Config variables: | g_bSimplerCrashLog = 0 | g_bNoSPInLog = 0 | g_bNoModsInLog = 0


| g_bDumpAllThreads = 1 | g_bEHUnwind = 0 | g_bMoreRegsInfo = 1 |
Exception Signal 11 - SIGSEGV (SEGV_ACCERR)
Fault address: 0xBFA30058
An overall reason of the crash:
- An application tried to access the memory address that is unaccessible, protected
or just wrong
Library base: 0xBF79C000
libSCAnd.so + 0x294058

----------------------------------------------------
Registers:
R0: 3469169920 0xCEC75500
R1: 3215130712 0xBFA30058 (libSCAnd.so + 0x294058)
R2: 3298520512 0xC49B6DC0
R3: 117 0x75
R4: 3467760704 0xCEB1D440
R5: 3298584000 0xC49C65C0
R6: 3467760836 0xCEB1D4C4
R7: 4292567392 0xFFDB6160
R8: 3467760704 0xCEB1D440
R9: 3298584000 0xC49C65C0
R10: 3298584224 0xC49C66A0
R11: 3298581984 0xC49C5DE0
R12: 3982439392 0xED5F33E0 (libc.so + 0xB33E0)
SP: 4292567352 0xFFDB6138
LR: 3214295381 0xBF964155 (libSCAnd.so + 0x1C8155)
PC: 3215130712 0xBFA30058 (libSCAnd.so + 0x294058)
CPSR: 2684616720 0xA0040010

----------------------------------------------------
Printing 1296 bytes of stack:
04 00 00 00 58 61 DB FF 00 55 C7 CE 00 1B 9A C4 (SP+0x000) [....Xa...U......]
6F B5 A0 BF 40 D4 B1 CE 00 00 00 00 B3 3F 96 BF (SP+0x010) [o...@........?..]
B3 3F 96 BF FF A7 98 BF 00 55 C7 CE 00 00 00 00 (SP+0x020) [.?.......U......]
AD A7 98 BF A5 CA 98 BF 00 00 00 00 00 00 00 00 (SP+0x030) [................]
E0 5D 9C C4 00 00 00 00 00 00 00 00 20 63 9C C4 (SP+0x040) [.]...........c..]
18 D5 B1 CE E0 64 9C C4 00 C0 28 42 00 00 00 00 (SP+0x050) [.....d....(B....]
08 D5 B1 CE 00 64 9C C4 00 00 E1 41 00 C0 28 42 (SP+0x060) [.....d.....A..(B]
BC 61 DB FF 77 E9 24 E8 00 00 00 00 A0 7C 44 14 (SP+0x070) [.a..w.$......|D.]
60 38 45 14 00 00 00 00 60 38 45 14 03 00 00 00 (SP+0x080) [`8E.....`8E.....]
02 00 00 00 C6 2D 00 00 F8 61 DB FF 2B 56 02 C0 (SP+0x090) [.....-...a..+V..]
00 00 00 00 91 F3 79 E8 5C 63 DB FF 00 00 00 00 (SP+0x0A0) [......y.\c......]
38 62 DB FF F8 61 DB FF 08 00 00 00 00 2E CF EE (SP+0x0B0) [8b...a..........]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0C0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0D0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0E0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0F0) [................]
00 00 00 00 A0 7C 44 14 60 38 45 14 00 00 00 00 (SP+0x100) [.....|D.`8E.....]
94 DE BF A7 00 00 00 00 00 2E CF EE 88 62 DB FF (SP+0x110) [.............b..]
A0 62 DB FF C6 2D 00 00 5C 63 DB FF 5C 63 DB FF (SP+0x120) [.b...-..\c..\c..]
9C 2E CF EE 35 2D 40 E8 5C 63 DB FF 28 56 02 C0 (SP+0x130) [....5-@.\c..(V..]
A0 DF 07 C0 B5 88 00 00 0A 00 00 00 80 79 44 14 (SP+0x140) [.............yD.]
00 55 C7 CE A0 66 9C C4 00 00 00 00 28 56 02 C0 (SP+0x150) [.U...f......(V..]
E4 C1 CC EB 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x160) [................]
C0 65 9C C4 00 64 9C C4 C0 65 9C C4 00 00 00 00 (SP+0x170) [.e...d...e......]
00 52 C7 CE 00 B4 B8 CE 00 00 00 00 00 00 00 00 (SP+0x180) [.R..............]
E0 64 9C C4 00 00 00 00 00 52 C7 CE E0 64 9C C4 (SP+0x190) [.d.......R...d..]
00 00 00 00 00 64 9C C4 00 00 00 00 00 00 00 00 (SP+0x1A0) [.....d..........]
00 00 00 00 00 00 00 00 20 63 9C C4 00 00 00 00 (SP+0x1B0) [.........c......]
00 00 00 00 00 64 9C C4 00 00 00 00 E0 5D 9C C4 (SP+0x1C0) [.....d.......]..]
00 00 00 00 00 00 00 00 20 63 9C C4 00 00 00 00 (SP+0x1D0) [.........c......]
00 5D 9C C4 00 00 00 00 00 00 00 00 E0 5D 9C C4 (SP+0x1E0) [.]...........]..]
00 5D 9C C4 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x1F0) [.]..............]
40 C9 7F E8 00 00 00 00 00 B7 B8 CE 00 B7 B8 CE (SP+0x200) [@...............]
58 F6 BA CE 70 63 DB FF 68 63 DB FF 60 63 DB FF (SP+0x210) [X...pc..hc..`c..]
00 00 00 00 01 00 00 00 70 80 E9 E2 00 2E CF EE (SP+0x220) [........p.......]
00 48 C9 EE 00 85 C9 EE 00 2E CF EE 00 5C 00 00 (SP+0x230) [.H...........\..]
50 CE EC 6F 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x240) [P..o............]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x250) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x260) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x270) [................]
00 00 00 00 00 00 00 00 00 80 04 44 00 00 8C 42 (SP+0x280) [...........D...B]
80 2F 9F C4 01 00 00 00 94 DE BF A7 04 01 00 00 (SP+0x290) [./..............]
00 54 3A 44 00 E0 C4 42 44 65 74 61 69 6C 73 00 (SP+0x2A0) [.T:D...BDetails.]
D8 63 DB FF D8 63 DB FF 94 DE BF A7 80 2F 9F C4 (SP+0x2B0) [.c...c......./..]
40 D4 B1 CE 88 80 AB BF 00 00 00 00 50 64 DB FF (SP+0x2C0) [@...........Pd..]
00 00 00 00 20 64 DB FF 00 2E CF EE B1 C7 96 BF (SP+0x2D0) [.....d..........]
00 00 00 00 00 00 00 00 00 00 80 3F 00 00 80 3F (SP+0x2E0) [...........?...?]
40 07 9F CE 00 10 06 45 00 00 87 44 00 00 00 00 (SP+0x2F0) [@......E...D....]
80 2F 9F C4 40 07 9F CE 00 00 00 00 A3 C3 96 BF (SP+0x300) [./..@...........]
78 64 DB FF 20 00 00 00 00 00 00 00 00 00 00 00 (SP+0x310) [xd..............]
00 10 06 45 00 00 87 44 DF 63 99 C4 C0 63 99 C4 (SP+0x320) [...E...D.c...c..]
53 6F 63 69 94 DE BF A7 80 2F 9F C4 40 81 AB BF (SP+0x330) [Soci...../..@...]
80 2F 9F C4 00 00 00 00 E0 64 DB FF 00 2E CF EE (SP+0x340) [./.......d......]
40 65 DB FF F3 78 94 BF 00 10 06 45 00 00 87 44 (SP+0x350) [@e...x.....E...D]
F8 64 DB FF 0B AC 96 BF 01 00 00 00 01 00 00 00 (SP+0x360) [.d..............]
00 00 80 44 00 00 40 44 00 00 F0 43 00 00 A0 43 (SP+0x370) [...D..@D...C...C]
00 00 80 44 00 00 40 44 00 00 80 44 00 00 40 44 (SP+0x380) [...D..@D...D..@D]
6A 73 6F 6E 00 93 57 E8 00 2E CF EE 00 48 C9 EE (SP+0x390) [json..W......H..]
CC 64 DB FF C8 64 DB FF 20 40 C2 CE 80 C3 CD EE (SP+0x3A0) [.d...d...@......]
00 2E CF EE 00 48 C9 EE 18 40 C2 CE 08 40 C2 CE (SP+0x3B0) [.....H...@...@..]
73 6F 63 69 61 6C 20 63 6C 75 62 00 00 48 C9 EE (SP+0x3C0) [social.club..H..]
03 65 DB FF F8 64 DB FF 26 2D 00 00 94 DE BF A7 (SP+0x3D0) [.e...d..&-......]
89 6A AD EB E0 65 DB FF C8 65 DB FF 10 00 00 00 (SP+0x3E0) [.j...e...e......]
00 00 00 00 AF 5D 25 E8 C4 B4 CC EB 01 00 00 00 (SP+0x3F0) [.....]%.........]
08 48 1E 14 07 00 00 00 D4 B3 CC EB 00 00 00 00 (SP+0x400) [.H..............]
00 00 00 00 00 00 00 00 00 00 87 44 00 00 00 00 (SP+0x410) [...........D....]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x420) [................]
69 74 79 57 72 61 70 70 65 72 5F 73 65 74 43 75 (SP+0x430) [ityWrapper_setCu]
72 72 65 6E 74 53 63 72 65 65 6E 53 69 7A 65 5F (SP+0x440) [rrentScreenSize_]
38 55 44 14 C0 0A 24 E8 81 5D 25 E8 E0 65 DB FF (SP+0x450) [8UD...$..]%..e..]
C8 65 DB FF 10 00 00 00 00 00 00 00 00 0F 24 E8 (SP+0x460) [.e............$.]
DE 08 31 C0 70 A6 24 E8 C4 B4 CC EB 38 55 44 14 (SP+0x470) [..1.p.$.....8UD.]
08 48 1E 14 00 00 00 00 DE 08 31 C0 FC 65 DB FF (SP+0x480) [.H........1..e..]
38 55 44 14 08 48 1E 14 08 55 44 14 00 00 00 00 (SP+0x490) [8UD..H...UD.....]
00 00 00 00 00 00 00 00 38 55 44 14 08 48 1E 14 (SP+0x4A0) [........8UD..H..]
08 55 44 14 38 04 00 00 61 08 00 00 38 04 00 00 (SP+0x4B0) [.UD.8...a...8...]
4C 87 C9 43 50 CE EC 6F 00 00 00 00 00 00 00 00 (SP+0x4C0) [L..CP..o........]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4D0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4E0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4F0) [................]
00 00 00 00 2C AD EF 6F 98 66 DB FF 78 66 DB FF (SP+0x500) [....,..o.f..xf..]
----------------------------------------------------
List of loaded mods (count=1):
AML Core (RusJJ aka [-=KILL MAN=-], version 1.2.2)
- GUID: net.rusjj.aml | Base: 0x0 | Path: localpath (core)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy