0% found this document useful (0 votes)
39 views

Mod Menu Crash 2023 11 06-19 52 25

The document summarizes a crash report from a Samsung device running Android 13. It includes details of the crash such as the time, app and device information, and a stack trace pointing to a null pointer dereference in the Unity library causing the crash.

Uploaded by

Xavier Combes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Mod Menu Crash 2023 11 06-19 52 25

The document summarizes a crash report from a Samsung device running Android 13. It includes details of the crash such as the time, app and device information, and a stack trace pointing to a null pointer dereference in the Unity library causing the crash.

Uploaded by

Xavier Combes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

************* Crash Head ****************

Time Of Crash : 2023_11_06-19_52_25


Device Manufacturer: samsung
Device Model : SM-S906E
Android Version : 13
Android SDK : 33
App VersionName : 1.3.1
App VersionCode : 1314
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [main]


Unity version : 2020.3.43f1c1
Device model : samsung SM-S906E
Device fingerprint:
samsung/g0qxxx/g0q:13/TP1A.220624.014/S906EXXS3CWB5:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : arm64-v8a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2020.3.43f1c1 (525e3bb6a170)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'arm64-v8a'
Build fingerprint:
'samsung/g0qxxx/g0q:13/TP1A.220624.014/S906EXXS3CWB5:user/release-keys'
Revision: '13'
ABI: 'arm64'
Timestamp: 2023-11-06 19:52:23+1100
pid: 6636, tid: 7063, name: Filter0 >>> com.easyfun.lovechat <<<
uid: 10640
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
Cause: null pointer dereference
x0 0000000000000000 x1 000000716e08a9e3 x2 0000000000000018 x3
00002d267c31b156
x4 00ffffffffffffff x5 0000000024335496 x6 0000000000000000 x7
7f7f7f7f7f7f7f7f
x8 000000716e371000 x9 00000000007f2815 x10 000000003b9aca00 x11
0295390f5121fb3d
x12 000000755186b030 x13 000000007fffffff x14 0000000024335496 x15
00002d267c32bc77
x16 00241a7ef94ff2b5 x17 0000000034155555 x18 000000708b3e8000 x19
000000708c909bf8
x20 000000716e08a9e3 x21 00000070c048bd68 x22 000000716e08a9e3 x23
0004b19b194ba5f0
x24 0004b19b1947b25e x25 000000708c909cb0 x26 000000708c909ff8 x27
00000000000fc000
x28 00000000000fe000 x29 000000708c909c50
sp 000000708c909b70 lr 000000716da211e8 pc 000000716da211e8

backtrace:
#00 pc 00000000005f31e8
/data/app/~~E-ZJnZM8igLPCOh3-O_iJw==/com.easyfun.lovechat-
m7tM2gg0b_qjifJeq9FxHg==/lib/arm64/libunity.so (BuildId:
5f6e5295ba68b6237342827f4312c958b4bd2d02)
#01 pc 00000000007be5b0
/data/app/~~E-ZJnZM8igLPCOh3-O_iJw==/com.easyfun.lovechat-
m7tM2gg0b_qjifJeq9FxHg==/lib/arm64/libunity.so (BuildId:
5f6e5295ba68b6237342827f4312c958b4bd2d02)
#02 pc 00000000005f64a8
/data/app/~~E-ZJnZM8igLPCOh3-O_iJw==/com.easyfun.lovechat-
m7tM2gg0b_qjifJeq9FxHg==/lib/arm64/libunity.so (BuildId:
5f6e5295ba68b6237342827f4312c958b4bd2d02)
#03 pc 00000000000bb6e8 /apex/com.android.runtime/lib64/bionic/libc.so
(__pthread_start(void*)+208) (BuildId: 54071c506231d1ab2d3653b44eddcea5)
#04 pc 0000000000054fdc /apex/com.android.runtime/lib64/bionic/libc.so
(__start_thread+68) (BuildId: 54071c506231d1ab2d3653b44eddcea5)

at libunity.0x5f31e8(Native Method)
at libunity.0x7be5b0(Native Method)
at libunity.0x5f64a8(Native Method)
at libc.__pthread_start(void*)(__pthread_start:208)
at libc.__start_thread(__start_thread:68)

You might also like