0% found this document useful (0 votes)
37 views1 page

Mod Menu Crash 2022 08 27-18 13 20

An app crash occurred on August 27, 2022 at 6:13:20 PM. The crash was caused by a null pointer dereference in an app called Neomonsters running on an Xiaomi 2107113SG device with Android 12. The Unity version was 2020.3.17f1 and the crash originated from the libunity.so library.

Uploaded by

Trần CH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views1 page

Mod Menu Crash 2022 08 27-18 13 20

An app crash occurred on August 27, 2022 at 6:13:20 PM. The crash was caused by a null pointer dereference in an app called Neomonsters running on an Xiaomi 2107113SG device with Android 12. The Unity version was 2020.3.17f1 and the crash originated from the libunity.so library.

Uploaded by

Trần CH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

************* Crash Head ****************

Time Of Crash : 2022_08_27-18_13_20


Device Manufacturer: Xiaomi
Device Model : 2107113SG
Android Version : 12
Android SDK : 31
App VersionName : 2.30
App VersionCode : 142
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [main]


Unity version : 2020.3.17f1
Device model : Xiaomi 2107113SG
Device fingerprint:
Xiaomi/vili_global/vili:12/SKQ1.211006.001/V13.0.6.0.SKDMIXM:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : armeabi-v7a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2020.3.17f1 (a4537701e4ab)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'armeabi-v7a'
Build fingerprint:
'Xiaomi/vili_global/vili:12/SKQ1.211006.001/V13.0.6.0.SKDMIXM:user/release-keys'
Revision: '0'
ABI: 'arm'
Timestamp: 2022-08-27 18:13:14+0700
pid: 10211, tid: 10268, name: Thread-11 >>> com.pockettrend.neomonsters <<<
uid: 10362
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
Cause: null pointer dereference
r0 00000000 r1 00000000 r2 00000000 r3 00000000
r4 b4506094 r5 00000000 r6 ec5881a4 r7 ec5884b0
r8 00005d24 r9 b38fa3a1 r10 00005000 r11 00000000
ip ec584c88 sp c1797140 lr b3b93dd0 pc b3b93dd4

backtrace:
#00 pc 002dfdd4
/data/app/~~5SKYPnHAHPeqPb-7MUHupA==/com.pockettrend.neomonsters-DuildS6VhgvAr-
_6IJs1sQ==/lib/arm/libunity.so (BuildId: ca8cf3f9666ffb2a6e72a0991732f817c8499342)
#01 pc 000463b7
/data/app/~~5SKYPnHAHPeqPb-7MUHupA==/com.pockettrend.neomonsters-DuildS6VhgvAr-
_6IJs1sQ==/lib/arm/libunity.so (BuildId: ca8cf3f9666ffb2a6e72a0991732f817c8499342)
#02 pc 000aa803 /apex/com.android.runtime/lib/bionic/libc.so
(__pthread_rwlock_timedrdlock(pthread_rwlock_internal_t*, bool, timespec const*)
+588) (BuildId: 14ccc210ec59d35990c4377f0f48f77e)
#03 pc 000a7e57 /apex/com.android.runtime/lib/bionic/libc.so
(pthread_attr_destroy+6) (BuildId: 14ccc210ec59d35990c4377f0f48f77e)

at libunity.0x2dfdd4(Native Method)
at libunity.0x463b7(Native Method)
at libc.__pthread_rwlock_timedrdlock(pthread_rwlock_internal_t*, bool,
timespec const*)(__pthread_rwlock_timedrdlock:588)
at libc.pthread_attr_destroy(pthread_attr_destroy:6)

You might also like