0% found this document useful (0 votes)
28 views1 page

Mod Menu Crash 2023 04 29-19 10 08

The document summarizes a crash report from an Android application called "gflashcards_new" running on a Xiaomi device. It includes details about the time and date of the crash, the device model, Android and Unity versions, and provides a stack trace pointing to a null pointer dereference as the root cause.

Uploaded by

Angel Casco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views1 page

Mod Menu Crash 2023 04 29-19 10 08

The document summarizes a crash report from an Android application called "gflashcards_new" running on a Xiaomi device. It includes details about the time and date of the crash, the device model, Android and Unity versions, and provides a stack trace pointing to a null pointer dereference as the root cause.

Uploaded by

Angel Casco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

************* Crash Head ****************

Time Of Crash : 2023_04_29-19_10_08


Device Manufacturer: Xiaomi
Device Model : 2201117TL
Android Version : 12
Android SDK : 31
App VersionName : 4.12.0
App VersionCode : 1575042287
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [UnityMain]


Unity version : 2021.3.13f1
Device model : Xiaomi 2201117TL
Device fingerprint:
Redmi/spes_global/spes:12/SKQ1.211103.001/V13.0.8.0.SGCMIXM:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : armeabi-v7a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2021.3.13f1 (9e7d58001ecf)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'armeabi-v7a'
Build fingerprint:
'Redmi/spes_global/spes:12/SKQ1.211103.001/V13.0.8.0.SGCMIXM:user/release-keys'
Revision: '0'
ABI: 'arm'
Timestamp: 2023-04-29 19:10:07-0600
pid: 15639, tid: 15639, name: gflashcards_new >>> ai.mybuddy.talkingflashcards_new
<<<
uid: 10376
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x4
Cause: null pointer dereference
r0 00000004 r1 ff8e6c84 r2 00000000 r3 ff8e6ccd
r4 00000000 r5 00000004 r6 ff8e6c84 r7 ff8e6c18
r8 ff8e6ccd r9 00000000 r10 f0ecc274 r11 ff8e6c84
ip ab3b221c sp ff8e6c00 lr ab26e435 pc f0eba946

backtrace:
#00 pc 000a8946 /apex/com.android.runtime/lib/bionic/libc.so
(__allocate_thread_mapping(unsigned int, unsigned int)+66) (BuildId:
4234821ffd43945c8e56d9f087ea40e8)
#01 pc 007fbccb [stack]

at libc.__allocate_thread_mapping(unsigned int, unsigned int)


(__allocate_thread_mapping:66)
at [stack].0x7fbccb(Native Method)

You might also like