0% found this document useful (0 votes)
15 views2 pages

Mod Menu Crash 2023 12 11-15 09 31

A crash occurred on a Google Pixel 7 device running Android 14 while using an app built with Unity version 2021.3.4f1. The crash was caused by a null pointer dereference, resulting in a fatal exception in the UnityMain thread. The crash log provides detailed information about the device, app version, and the specific error encountered.

Uploaded by

Sovahless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Mod Menu Crash 2023 12 11-15 09 31

A crash occurred on a Google Pixel 7 device running Android 14 while using an app built with Unity version 2021.3.4f1. The crash was caused by a null pointer dereference, resulting in a fatal exception in the UnityMain thread. The crash log provides detailed information about the device, app version, and the specific error encountered.

Uploaded by

Sovahless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

************* Crash Head ****************

Time Of Crash : 2023_12_11-15_09_31


Device Manufacturer: Google
Device Model : Pixel 7
Android Version : 14
Android SDK : 34
App VersionName : 1.0.6
App VersionCode : 10
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [UnityMain]


Unity version : 2021.3.4f1
Device model : Google Pixel 7
Device fingerprint:
google/panther/panther:14/UP1A.231105.003/11010452:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : arm64-v8a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2021.3.4f1 (cb45f9cae8b7)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'arm64-v8a'
Build fingerprint:
'google/panther/panther:14/UP1A.231105.003/11010452:user/release-keys'
Revision: 'MP1.0'
ABI: 'arm64'
Timestamp: 2023-12-11 15:09:31+0100
pid: 24113, tid: 24213, name: UnityMain >>>
jp.co.infinibrain.taimanin.rpgxextasyntk <<<
uid: 10361
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
Cause: null pointer dereference
x0 0000000000000000 x1 000000700022c300 x2 0000000000000018 x3
000005a868ece4ff
x4 00ffffffffffffff x5 0000000005b3e318 x6 0000000000000000 x7
0000000000000000
x8 0000000080000081 x9 0000000000000001 x10 0000000000000064 x11
0000006f6dd8e8f0
x12 00000073560d6090 x13 000000007fffffff x14 0000000005b3e318 x15
000005a868ed173c
x16 0000006f6dccb638 x17 00000073484d7b30 x18 0000006ee04b8d48 x19
0000000000000000
x20 0000006ee0217f30 x21 00000070df899b10 x22 0000000000000068 x23
0000000000000002
x24 0000006ee0217ec8 x25 000000700022c690 x26 000000700022c694 x27
000000700022c690
x28 000000700022c590 x29 000000700022c694
sp 000000700022c360 lr 0000006f6c91c220 pc 0000006f6c91c220

backtrace:
#00 pc 0000000000457220
/data/app/~~XooCEb8r01vDTHmz1InhDQ==/jp.co.infinibrain.taimanin.rpgxextasyntk-
X0pahdPvn0L7GD3_6dv1TA==/lib/arm64/libunity.so (BuildId:
a6dcae678d4f5224b9bb142aec3a1d30e484e961)
#01 pc 0000000000458274
/data/app/~~XooCEb8r01vDTHmz1InhDQ==/jp.co.infinibrain.taimanin.rpgxextasyntk-
X0pahdPvn0L7GD3_6dv1TA==/lib/arm64/libunity.so (BuildId:
a6dcae678d4f5224b9bb142aec3a1d30e484e961)
#02 pc 00000000005ef78c
/data/app/~~XooCEb8r01vDTHmz1InhDQ==/jp.co.infinibrain.taimanin.rpgxextasyntk-
X0pahdPvn0L7GD3_6dv1TA==/lib/arm64/libunity.so (BuildId:
a6dcae678d4f5224b9bb142aec3a1d30e484e961)
#03 pc 000000000060686c
/data/app/~~XooCEb8r01vDTHmz1InhDQ==/jp.co.infinibrain.taimanin.rpgxextasyntk-
X0pahdPvn0L7GD3_6dv1TA==/lib/arm64/libunity.so (BuildId:
a6dcae678d4f5224b9bb142aec3a1d30e484e961)
#04 pc 0000000000355830 /apex/com.android.art/lib64/libart.so
(art_quick_generic_jni_trampoline+144) (BuildId: 735f12f804f88d62a2cb437261076ff7)
#05 pc 00000000005ba6b0 /apex/com.android.art/lib64/libart.so
(nterp_helper+4016) (BuildId: 735f12f804f88d62a2cb437261076ff7)
#06 pc 00000000005b9734 /apex/com.android.art/lib64/libart.so
(nterp_helper+52) (BuildId: 735f12f804f88d62a2cb437261076ff7)
#07 pc 00000000009757fc
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat

at libunity.0x457220(Native Method)
at libunity.0x458274(Native Method)
at libunity.0x5ef78c(Native Method)
at libunity.0x60686c(Native Method)
at
libart.art_quick_generic_jni_trampoline(art_quick_generic_jni_trampoline:144)
at libart.nterp_helper(nterp_helper:4016)
at libart.nterp_helper(nterp_helper:52)
at boot.0x9757fc(Native Method)

You might also like