0% found this document useful (0 votes)
5 views3 pages

Aml Crashlog

This document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV). The log includes configuration variables, the fault address, and register values at the time of the crash. It also provides a stack trace with hexadecimal data for debugging purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

Aml Crashlog

This document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV). The log includes configuration variables, the fault address, and register values at the time of the crash. It also provides a stack trace with hexadecimal data for debugging purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

!!! THIS IS A CRASH LOG !!!

If you are experiencing a crash, give us this file.


>>> DO NOT SEND US A SCREENSHOT OF THIS FILE <<<

Config variables: | g_bSimplerCrashLog = 0 | g_bNoSPInLog = 0 | g_bNoModsInLog = 0


| g_bDumpAllThreads = 1 | g_bEHUnwind = 0 | g_bMoreRegsInfo = 1 |
Exception Signal 11 - SIGSEGV (SEGV_ACCERR)
Fault address: 0xE23E6058
An overall reason of the crash:
- An application tried to access the memory address that is unaccessible, protected
or just wrong
Library base: 0xE2152000
libSCAnd.so + 0x294058

----------------------------------------------------
Registers:
R0: 4006968064 0xEED57B00
R1: 3795738712 0xE23E6058 (libSCAnd.so + 0x294058)
R2: 3976320832 0xED01D740
R3: 15 0xF
R4: 3998248640 0xEE506EC0
R5: 3980878016 0xED4760C0
R6: 3998248772 0xEE506F44
R7: 4289783744 0xFFB0E7C0
R8: 3998248640 0xEE506EC0
R9: 3980878016 0xED4760C0
R10: 3980878240 0xED4761A0
R11: 3980875552 0xED475720
R12: 3956622764 0xEBD545AC (libc.so + 0xBC5AC)
SP: 4289783704 0xFFB0E798
LR: 3794903381 0xE231A155 (libSCAnd.so + 0x1C8155)
PC: 3795738712 0xE23E6058 (libSCAnd.so + 0x294058)
CPSR: 2684747792 0xA0060010

----------------------------------------------------
Printing 1296 bytes of stack:
04 00 00 00 B8 E7 B0 FF 00 7B D5 EE 20 8A 43 EF (SP+0x000) [.........{....C.]
6F 15 3C E2 C0 6E 50 EE 00 00 00 00 B3 9F 31 E2 (SP+0x010) [o.<..nP.......1.]
B3 9F 31 E2 FF 07 34 E2 00 7B D5 EE 00 00 00 00 (SP+0x020) [..1...4..{......]
AD 07 34 E2 A5 2A 34 E2 00 00 00 00 00 00 00 00 (SP+0x030) [..4..*4.........]
20 57 47 ED 00 00 00 00 00 00 00 00 60 5C 47 ED (SP+0x040) [.WG.........`\G.]
98 6F 50 EE 00 5F 47 ED 00 C0 28 42 00 00 00 00 (SP+0x050) [.oP.._G...(B....]
88 6F 50 EE 20 5E 47 ED 00 00 E1 41 00 C0 28 42 (SP+0x060) [.oP..^G....A..(B]
1C E8 B0 FF 77 EB 00 EA 00 00 00 00 E0 2B 25 14 (SP+0x070) [....w........+%.]
00 B4 25 14 00 00 00 00 00 B4 25 14 03 00 00 00 (SP+0x080) [..%.......%.....]
02 00 00 00 C6 2F 00 00 58 E8 B0 FF 2B 16 9C 9F (SP+0x090) [...../..X...+...]
00 00 00 00 51 F9 55 EA BC E9 B0 FF 00 00 00 00 (SP+0x0A0) [....Q.U.........]
98 E8 B0 FF 58 E8 B0 FF 08 00 00 00 00 CE 5A F0 (SP+0x0B0) [....X.........Z.]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0C0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0D0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0E0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0F0) [................]
00 00 00 00 E0 2B 25 14 00 B4 25 14 00 00 00 00 (SP+0x100) [.....+%...%.....]
8F BD F3 0C 00 00 00 00 00 CE 5A F0 E8 E8 B0 FF (SP+0x110) [..........Z.....]
00 E9 B0 FF C6 2F 00 00 BC E9 B0 FF BC E9 B0 FF (SP+0x120) [...../..........]
9C CE 5A F0 D5 30 1C EA BC E9 B0 FF 28 16 9C 9F (SP+0x130) [..Z..0......(...]
A0 9F A1 9F B5 88 00 00 0A 00 00 00 F0 DF 24 14 (SP+0x140) [..............$.]
00 7B D5 EE A0 61 47 ED 00 00 00 00 28 16 9C 9F (SP+0x150) [.{...aG.....(...]
FC 5D 65 A6 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x160) [.]e.............]
C0 60 47 ED 20 5E 47 ED C0 60 47 ED 00 00 00 00 (SP+0x170) [.`G..^G..`G.....]
00 7A D5 EE 80 B8 2A F0 00 00 00 00 00 00 00 00 (SP+0x180) [.z....*.........]
00 5F 47 ED 00 00 00 00 00 7A D5 EE 00 5F 47 ED (SP+0x190) [._G......z..._G.]
00 00 00 00 20 5E 47 ED 00 00 00 00 00 00 00 00 (SP+0x1A0) [.....^G.........]
00 00 00 00 00 00 00 00 60 5C 47 ED 00 00 00 00 (SP+0x1B0) [........`\G.....]
00 00 00 00 20 5E 47 ED 00 00 00 00 20 57 47 ED (SP+0x1C0) [.....^G......WG.]
00 00 00 00 00 00 00 00 60 5C 47 ED 00 00 00 00 (SP+0x1D0) [........`\G.....]
40 56 47 ED 00 00 00 00 00 00 00 00 20 57 47 ED (SP+0x1E0) [@VG..........WG.]
40 56 47 ED 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x1F0) [@VG.............]
00 CF 5B EA 00 00 00 00 80 BB 2A F0 80 BB 2A F0 (SP+0x200) [..[.......*...*.]
B8 B0 D5 EC D0 E9 B0 FF C8 E9 B0 FF C0 E9 B0 FF (SP+0x210) [................]
00 00 00 00 01 00 00 00 70 00 86 E4 00 CE 5A F0 (SP+0x220) [........p.....Z.]
00 F4 56 F0 00 B3 51 F0 00 CE 5A F0 00 5C 00 00 (SP+0x230) [..V...Q...Z..\..]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x240) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x250) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x260) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x270) [................]
00 00 00 00 00 00 00 00 00 80 04 44 00 00 8C 42 (SP+0x280) [...........D...B]
00 7E 8B EC 01 00 00 00 00 00 00 00 00 11 00 EA (SP+0x290) [.~..............]
00 54 3A 44 00 E0 C4 42 44 65 74 61 69 6C 73 00 (SP+0x2A0) [.T:D...BDetails.]
38 EA B0 FF 38 EA B0 FF 8F BD F3 0C 00 7E 8B EC (SP+0x2B0) [8...8........~..]
C0 6E 50 EE 88 E0 46 E2 00 00 00 00 B0 EA B0 FF (SP+0x2C0) [.nP...F.........]
00 00 00 00 80 EA B0 FF DE C8 CA 9F B1 27 32 E2 (SP+0x2D0) [.............'2.]
00 00 00 00 00 00 00 00 00 00 80 3F 00 00 80 3F (SP+0x2E0) [...........?...?]
00 8B 17 ED 00 C0 0C 45 00 00 87 44 00 00 00 00 (SP+0x2F0) [.......E...D....]
00 7E 8B EC 00 8B 17 ED 00 00 00 00 A3 23 32 E2 (SP+0x300) [.~...........#2.]
9C E2 46 E2 20 00 00 00 00 00 00 00 00 00 00 00 (SP+0x310) [..F.............]
00 C0 0C 45 00 00 87 44 5F 9D EF EC 40 9D EF EC (SP+0x320) [...E...D_...@...]
53 6F 63 69 8F BD F3 0C 00 7E 8B EC 40 E1 46 E2 (SP+0x330) [[email protected].]
00 7E 8B EC 00 00 00 00 40 EB B0 FF 00 CE 5A F0 (SP+0x340) [[email protected].]
00 11 00 EA F3 D8 2F E2 00 C0 0C 45 00 00 87 44 (SP+0x350) [....../....E...D]
58 EB B0 FF 0B 0C 32 E2 01 00 00 00 01 00 00 00 (SP+0x360) [X.....2.........]
00 00 80 44 00 00 40 44 00 00 F0 43 00 00 A0 43 (SP+0x370) [[email protected]]
00 00 80 44 00 00 40 44 00 00 80 44 00 00 40 44 (SP+0x380) [[email protected]..@D]
6A 73 6F 6E 00 97 33 EA 00 CE 5A F0 00 F4 56 F0 (SP+0x390) [json..3...Z...V.]
2C EB B0 FF 28 EB B0 FF 20 FB B7 EC 00 11 00 EA (SP+0x3A0) [,...(...........]
00 CE 5A F0 00 F4 56 F0 18 FB B7 EC 08 FB B7 EC (SP+0x3B0) [..Z...V.........]
73 6F 63 69 61 6C 20 63 6C 75 62 00 00 F4 56 F0 (SP+0x3C0) [social.club...V.]
63 EB B0 FF 58 EB B0 FF C6 2E 00 00 8F BD F3 0C (SP+0x3D0) [c...X...........]
00 00 00 00 00 F4 56 F0 07 00 00 00 07 00 00 00 (SP+0x3E0) [......V.........]
04 47 65 A6 7F E2 BA 71 04 47 65 A6 00 00 00 00 (SP+0x3F0) [.Ge....q.Ge.....]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x400) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x410) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x420) [................]
00 00 00 00 00 00 00 00 00 00 00 00 20 EC B0 FF (SP+0x430) [................]
08 EC B0 FF 10 00 00 00 00 00 00 00 00 11 00 EA (SP+0x440) [................]
DE C8 CA 9F 70 A8 00 EA F4 47 65 A6 A8 3F 24 14 (SP+0x450) [....p....Ge..?$.]
A8 8F 0D 14 00 00 00 00 DE C8 CA 9F 3C EC B0 FF (SP+0x460) [............<...]
A8 3F 24 14 A8 8F 0D 14 78 3F 24 14 00 00 00 00 (SP+0x470) [.?$.....x?$.....]
00 00 00 00 00 00 00 00 A8 3F 24 14 A8 8F 0D 14 (SP+0x480) [.........?$.....]
78 3F 24 14 38 04 00 00 CC 08 00 00 38 04 00 00 (SP+0x490) [x?$.8.......8...]
38 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4A0) [8...............]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4B0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4C0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4D0) [................]
00 00 00 00 4C C2 39 71 D8 EC B0 FF B8 EC B0 FF (SP+0x4E0) [....L.9q........]
02 00 00 00 00 00 00 00 00 CE 5A F0 00 11 00 EA (SP+0x4F0) [..........Z.....]
62 B8 CA 9F C0 9D 00 EA 54 41 64 A6 C8 CE 0B 14 (SP+0x500) [b.......TAd.....]
----------------------------------------------------
List of loaded mods (count=1):
AML Core (RusJJ aka [-=KILL MAN=-], version 1.2.1)
- GUID: net.rusjj.aml | Base: 0x0 | Path: localpath (core)

You might also like